نتایج جستجو برای: out scheme
تعداد نتایج: 1018417 فیلتر نتایج به سال:
We develop, implement and test a new third order accurate MUSCL type nite volume scheme for the two-dimensional Euler equations of com-pressible uid ow and compare the scheme with an anlogous second order scheme. It turns out that for many applications the third order scheme is less eecient than the second order one.
In 2003, Novikov and Kislev proposed a scheme for an authentication of the user from the remote autonomous object. Recently Yang et al. pointed out an evidence of man-in-middle attack. In this paper we show another evidence of man-in-middle-attack. We also pointed out that reflection attack can also be framed successfully on the scheme.
Recently, Fan et al. proposed an anonymous multireceiver encryption scheme (FHH) , and they declared that their scheme achieves confidentiality and anonymity. In this letter, We point out that the FHH scheme does not hold the defined security properties. In particular, we state that the FHH scheme does not hold the anonymity but achieves the weaker confidentiality of IND-CPA.
The paper proposes an algorithm to calculate the switching angles using harmonic elimination PWM (HEPWM) scheme for voltage source inverter. The algorithm is based on curve fittings of a certain polynomials functions. The resulting equations require only the addition and multiplication processes; therefore, it can be implemented efficiently on a microprocessor. An extensive angle error analysis...
We propose a storage efficient, fast and parallelizable out-of-core framework for streaming computations of high resolution level sets. The fundamental techniques are skewing and tiling transformations of streamed level set computations which allow for the combination of interface propagation, re-normalization and narrow-band rebuild into a single pass over the data stored on disk. When combine...
We introduce an unsplit staggered mesh scheme (USM) that solves multidimensional magnetohydrodynamics (MHD) by a constrained transport method with high-order Godunov fluxes, incorporating three new developments that enhance performance. The USM scheme handles multidimensional MHD terms, proportional to ∇ ·B, in a new directionally unsplit data reconstruction step. This reconstruction step maint...
One of the most common modalities to examine the human eye is the eye-fundus photograph. The evaluation of fundus photographs is carried out by medical experts during time-consuming visual inspection. Our aim is to accelerate this process using computer aided diagnosis. As a first step, it is necessary to segment structures in the images for tissue differentiation. As the eye is the only organ,...
In this paper, an iterative incremental relay selection (IIRS) scheme is considered for wireless cooperative networks in order to increase the reliability of transmission. Different from the conventional incremental relay selection which incrementally selects a best relay for only one iteration; the IIRS scheme iteratively applies the incremental relaying and relay selection processes. To evalu...
In the course of morphogenesis, tissues change shape and grow. How this is orchestrated is largely unknown, partly owing to the lack of experimental methods to visualize and quantify growth. Here, we describe a novel experimental approach to investigate the growth of tissues in vivo on a time-scale of days, as employed to study the Drosophila larval imaginal wing disc, the precursor of the adul...
Microfluidic devices have been used for in-vitro studies in the past while recently they have been extended for in-vivo studies in whole organisms. In this report we use a microfluidic device for high resolution fluorescence imaging of axonal transport in model systems Caenorhabditis elegans and Drosophila larvae. The device immobilized animals are compared with respect to the anesthetized anim...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید