RationalizeRoots: Software package for the rationalization of square roots

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Smile Analyzer: A Software Package for Analyzing the Characteristics of the Speech and Smile

Taking into account the factors related to lip-tooth relationships in orthodontic diagnosis and treatment planning is of prime importance. Manual quantitative analysis of facial parameters on photographs during smile and speech is a difficult and time-consuming job. Since there is no comprehensive and user-friendly software package, we developed a software program called "Smile Analyzer" in the...

متن کامل

study of cohesive devices in the textbook of english for the students of apsychology by rastegarpour

this study investigates the cohesive devices used in the textbook of english for the students of psychology. the research questions and hypotheses in the present study are based on what frequency and distribution of grammatical and lexical cohesive devices are. then, to answer the questions all grammatical and lexical cohesive devices in reading comprehension passages from 6 units of 21units th...

the use of appropriate madm model for ranking the vendors of mci equipments using fuzzy approach

abstract nowadays, the science of decision making has been paid to more attention due to the complexity of the problems of suppliers selection. as known, one of the efficient tools in economic and human resources development is the extension of communication networks in developing countries. so, the proper selection of suppliers of tc equipments is of concern very much. in this study, a ...

15 صفحه اول

Roots of Square: Cryptanalysis of Double-Layer Square and Square+

Square is a multivariate quadratic encryption scheme proposed in 2009. It is a specialization of Hidden Field Equations by using only odd characteristic elds and also X as its central map. In addition, it uses embedding to reduce the number of variables in the public key. However, the system was broken at Asiacrypt 2009 using a di erential attack. At PQCrypto 2010 Clough and Ding proposed two n...

متن کامل

Algorithms for Square Roots of Graphs

The n-th power (n 1) of a graph G = (V; E), written G n , is deened to be the graph having V as its vertex set with two vertices u; v adjacent in G n if and only if there exists a path of length at most n between them. Similarly, graph H has an n-th root G if G n = H. For the case of n = 2, we say that G 2 is the square of G and G is the square root of G 2. Here we give a linear time algorithm ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Computer Physics Communications

سال: 2020

ISSN: 0010-4655

DOI: 10.1016/j.cpc.2020.107197