Zobrazeno 1 - 10
of 10
pro vyhledávání: '"Hossain, Akash"'
Autor:
Hossain, Akash
This thesis is a contribution to the model theory of valued fields. We study forking in valued fields and some of their reducts. We focus particularly on pseudo-local fields, the ultraproducts of residue characteristic zero of the p-adic valued field
Externí odkaz:
http://arxiv.org/abs/2409.16393
Autor:
Hossain, Akash
In their article about distality in valued fields, Aschenbrenner, Chernikov, Gehret and Ziegler proved resplendent Ax-Kochen-Ershov principles for quantifier elimination in pure short exact sequences of Abelian structures. We study how their work rel
Externí odkaz:
http://arxiv.org/abs/2409.10148
Autor:
Hossain, Akash
We give a characterization of forking in regular ordered Abelian groups. In particular, we prove that the type of C over AB does not fork over A if and only if the type over AB of each C-definable singleton does not fork over A in these structures.
Externí odkaz:
http://arxiv.org/abs/2312.12279
Autor:
Hossain, Akash
We study the behaviour of forking in valued fields, and we give several sufficient conditions for parameter sets in a Henselian valued field of residue characteristic zero to be an extension base. Notably, we consider arbitrary (potentially imaginary
Externí odkaz:
http://arxiv.org/abs/2210.01567
Autor:
Hossain, Akash, Laroussinie, Francois
QCTL extends the temporal logic CTL with quantifications over atomic propositions. This extension is known to be very expressive: QCTL allows us to express complex properties over Kripke structures (it is as expressive as MSO). Several semantics exis
Externí odkaz:
http://arxiv.org/abs/1906.10005
Autor:
Hossain, Akash, Laroussinie, François
Publikováno v:
In Information and Computation October 2021 280
Autor:
Nasima Begum, Md Azim Hossain Akash, Sayma Rahman, Jungpil Shin, Md Rashedul Islam, Md Ezharul Islam
Publikováno v:
Future Internet, Vol 13, Iss 9, p 231 (2021)
Handwriting analysis is playing an important role in user authentication or online writer identification for more than a decade. It has a significant role in different applications such as e-security, signature biometrics, e-health, gesture analysis,
Externí odkaz:
https://doaj.org/article/6121eca51b3d4f96891580697c8bd562
Publikováno v:
Future Internet
Volume 13
Issue 9
Future Internet, Vol 13, Iss 231, p 231 (2021)
Volume 13
Issue 9
Future Internet, Vol 13, Iss 231, p 231 (2021)
Handwriting analysis is playing an important role in user authentication or online writer identification for more than a decade. It has a significant role in different applications such as e-security, signature biometrics, e-health, gesture analysis,
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Autor:
Md. Azim Hossain Akash, Nasima Begum, Jungpil Shin, Amiruzzaman, Sayma Rahman, Rashedul Islam
Publikováno v:
ICKII
Identifying a user or a person through handwriting-data is a popular technique. Many researches have been done in this area most of which are image or pattern-based analysis. The accuracy level depends on the quality of the image or pattern. In this