Mohamed Bourouissa - Temps mort

نویسندگان

چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Mohamed Shaban , G . F . Attia , Mohamed A

Tin oxide thin films were successfully fabricated by the sol-gel spin coating technique for varying number of cycles. The samples were characterized by X-ray diffraction (XRD) and scanning electron microscope (SEM). The effect of a number of cycles on the structural and optical properties of SnO2 films was studied. The crystallite size is changed from 7.7 to 31.1 nm by increasing the number of ...

متن کامل

Mohamed Barakat &

Abstract. In this work we announce the Maple package conley to compute connection and C-connection matrices. conley is based on our abstract homological algebra package homalg. We emphasize that the notion of braids is irrelevant for the definition and for the computation of such matrices. We introduce the notion of triangles that suffices to state the definition of (C)-connection matrices. The...

متن کامل

20-25 Mohamed Feature

ITE JOURNAL / MARCH 2001 THE ORLANDO-ORANGE COUNTY Expressway Authority (OOCEA) operates a 132-kilometer toll-road system in Orange County, FL, USA. This network includes 10 mainline toll plazas and 38 tollbooth ramps in operation. In mid-May 1994, the state-of-the-art electronic toll collection (ETC) system known as E-PASS that utilizes automated vehicle identification (AVI) technology was ins...

متن کامل

Mohamed Abbas-08

The accuracy of measuring the crossing moment of a given signal to a specific reference voltage plays a crucial role in determining the bandwidth of the signal that could be converted by a level-crossing ADC. This timing accuracy is mainly determined by delay dispersion of the comparator and the accuracy of the time-to-digital converter (TDC) comprising the levelcrossing ADC. With the pico-seco...

متن کامل

Cryptanalysis of ARMADILLO 2 ∗ Mohamed

ARMADILLO2 is the recommended variant of a multi-purpose cryptographic primitive dedicated to hardware which has been proposed by Badel et al. in [1]. In this paper we propose a meet-in-the-middle technique that allows us to invert the ARMADILLO2 function. Using this technique we are able to perform a key recovery attack on ARMADILLO2 in FIL-MAC application mode. A variant of this attack can al...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Critique d’art

سال: 2014

ISSN: 1246-8258,2265-9404

DOI: 10.4000/critiquedart.15450