نتایج جستجو برای: bosanquet parameter

تعداد نتایج: 214967  

Journal: :iranian journal of science and technology (sciences) 2004
l. m. saha

a chaos control method suggested by erjaee has been reviewed. it has been shown that thistechnique can be applied in various evolutionary systems of 2-dimensional types. the method has beenapplied for cases of the henon map, as well as burger’s map. the limitations of the control techniquehave also been discussed by considering the standard map and the gumowski-mira map. the resultsobtained thr...

Journal: :روش های عددی در مهندسی (استقلال) 0
محمدرضا پژند و هادی اصغری m. rezaiee-pajand and h. asghari

this paper is on the elasto-plastic analysis of plane stress problems. a five-parameter yield surface is presented. this yield criterion uses associate flow along with mixed hardening rule. the analytical formulations are written and related computer program for non-linear analysis is prepared. finally, based on the formulations, numerical examples are solved.

Journal: :Electr. Notes Theor. Comput. Sci. 2003
Denis Béchet Annie Foret

This paper is concerned with learning categorial grammars in the model of Gold. We show that rigid and k-valued non-associative Lambek grammars are learnable from function-argument structured sentences. In fact, function-argument structures are natural syntactical decompositions of sentences in sub-components with the indication of the head of each sub-component. This result is interesting and ...

2013
T. V. K. Gupta J. Ramkumar Puneet Tandon

Abrasive Water Jet Machining is an unconventional machining process well known for machining hard to cut materials. The primary research focus on the process was for through cutting and a very limited literature is available on pocket milling using AWJM. The present work is an attempt to use this process for milling applications considering a set of various process parameters. Four different in...

2000
Frédéric Légaré

The results presented in the thesis show how to convert a statistically binding but computationally concealing quantum bit commitment scheme into a computationally binding but statistically concealing scheme. For a security parameter n, the construction of the statistically concealing scheme requires O(n) executions of the statistically binding scheme. As a consequence of the reduction, statist...

2014
J. Gaspar C. Minteer R. Sayler Y. Wamishe T. Kring

Bacterial Panicle Blight (BPB) is a seedand residue-borne disease caused by the pathogens Burkholderia glumae and B. gladioli. In recent years, the incidence and severity of BPB appears to be correlated with the increases in abundance of insect pests of rice in Arkansas, notably rice stink bug [Oebalus pugnax (F.); RSB]. The objective of this study was to investigate the extent to which the BPB...

Journal: :IACR Cryptology ePrint Archive 2013
Xiang Xie Rui Xue

In this work, we present two Key-Policy Attribute-Based Encryption (ABE) schemes for some subclass of circuits based on the Learning with Error (LWE) assumption. Our constructions are selectively secure in the standard model. More specifically, our first construction supports a subclass of circuits with polynomially bounded depth. We call this subclass the OR-restricted circuits which means tha...

2012
Malika Izabachène Benoît Libert

Off-line e-cash systems are the digital analogue of regular cash. One of the main desirable properties is anonymity: spending a coin should not reveal the identity of the spender and, at the same time, users should not be able to double-spend coins without being detected. Compact e-cash systems make it possible to store a wallet of O(2) coins using O(L+ λ) bits, where λ is the security paramete...

2015
Marcel Keller Emmanuela Orsini Peter Scholl

We describe an actively secure OT extension protocol in the random oracle model with efficiency very close to the passively secure IKNP protocol of Ishai et al. (Crypto 2003). For computational security parameter κ, our protocol requires κ base OTs, and is the first practical, actively secure protocol to match the cost of the passive IKNP extension in this regard. The added communication cost i...

2000
Paola Flocchini Evangelos Kranakis Nicola Santoro Danny Krizanc Flaminia L. Luccio

An anonymous ring network is a ring where all processors (vertices) are totally indistinguishable except for their input value. Initially, to each vertex of the ring is associated a value from a totally ordered set; thus, forming a multiset. In this paper we consider the problem of sorting such a distributed multiset and we investigate its relationship with the election problem. We focus on the...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید