Opening the ‘ Black Box ’ of the Hydrogen Economy

نویسندگان

  • Mike Hodson
  • Simon Marvin
چکیده

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Bisubstrate Kinetic Model for Enzymatic Decolorization of Reactive Black 5 by Coprinus cinereus Peroxidase

In this study, decolorization of the diazo dye, Reactive Black 5 (RB5) in a Coprinus cinereus peroxidase-catalyzed reaction has been investigated. A bisubstate kinetic model for the reaction rate based on the Ping-Pong mechanism was assumed for the enzymatic decolorization. Experiment...

متن کامل

Opening the Black Box : How Data

Opening the Black Box: How Data Mining Works with examples for Social Scientists in Higher Education Research Terrence Willett © 200

متن کامل

Expression of Genes Encoding Protein Kinases During Flower Opening in Two Cut Rose Cultivars with Different Longevity

Ethylene plays an important role in wide-ranging aspects of plant growth and development, includingfruit ripening, leaf and flower senescence. In this study, the expression patterns of two genes involved in theethylene signal transduction pathway (RhCTR1 and RhCTR2) were investigated during the flower openingstages in two Rosa hybrida cultivars, ‘Black magic’ and ‘Maroussia’, ...

متن کامل

On the round complexity of black-box constructions of commitments secure against selective opening attacks

Selective opening attacks against commitment schemes occur when the commitment scheme is repeated in parallel and an adversary can choose depending on the commit-phase transcript to see the values and openings to some subset of the committed bits. Commitments are secure under such attacks if one can prove that the remaining, unopened commitments stay secret. We prove the following black-box con...

متن کامل

Errata to (Nearly) Round-Optimal Black-Box Constructions of Commitments Secure against Selective Opening Attacks

Selective opening attacks against commitment schemes occur when the commitment scheme is repeated in parallel (or concurrently) and an adversary can choose depending on the commit-phase transcript to see the values and openings to some subset of the committed bits. Commitments are secure under such attacks if one can prove that the remaining, unopened commitments stay secret. We prove the follo...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2004