نتایج جستجو برای: stream function

تعداد نتایج: 1264642  

2009
William T. Shaw

Stokes Paradox, Fluid dynamics, Stokes flow, Stream function, Biharmonic equation, Helmholtz equation, Low Reynolds number This paper proposes a solution to Stokes’ paradox for asymptotically uniform viscous flow around a cylinder. The existence of a global stream function satisfying a perturbative form of the two-dimensional Navier–Stokes equations for low Reynolds number is established. This ...

Journal: :CoRR 2007
Xiangao Huang Wei Huang Xiaozhou Liu Chao Wang Zhu jing Wang Tao Wang

In this letter we assert that we have reconstructed the nonlinear filter function of LILI-128 stream cipher on IBM notebook PC using MATLAB. Our reconstruction need approximately 13 12 2 ~ 2 bits and the attack consumes 5825.016 sec (using tic and toc sentences of MATLAB) or 5825.016/3600=1.6181hours. We got the expression of the nonlinear filter function of Lili-128 which has 46 items from lin...

Journal: :IACR Cryptology ePrint Archive 2015
Dibyendu Roy Sourav Mukhopadhyay

LILI-128 is a clock controlled stream cipher based on two LFSRs with one clock control function and one non-linear filter function. The clocking of the second LFSR is controlled by the first LFSR. In this paper we propose a fault algebraic attack on LILI-128 stream cipher. We first recover the state bits of the first LFSR by injecting a single bit fault in the first LFSR. After that we recover ...

2005
Noah R. Lottig M. E. Schreiber J. R. Webster

We investigated the influence of multiple disturbances on ecosystem structure and function in a headwater stream adjacent to an abandoned arsenic mine using an upstream (reference) and downstream (mine-influenced) comparative reach approach. In this study, floods were addressed as a pulse disturbance, and the abandoned arsenic mine was characterized as a press disturbance. Chronically elevated ...

Journal: :Proceedings of the National Academy of Sciences of the United States of America 1943
S Bergman

2010
Ronald G. Rehm Howard R. Baum

Model equations describing large scale buoyant convection in an enclosure are formulated with the vorticity and stream function as dependent variables. The mathematical model, based on earlier work of the authors, is unique in two respects. First, it neglects viscous and thermal conductivity effects. Second the fluid is taken to be thermally expandable: large density variations are allowed whil...

2011
S. Gilaie-Dotan S. Bentin M. Harel G. Rees A.P. Saygin

We explored the extent to which biological motion perception depends on ventral stream integration by studying LG, an unusual case of developmental visual agnosia. LG has significant ventral stream processing deficits but no discernable structural cortical abnormality. LG's intermediate visual areas and object-sensitive regions exhibit abnormal activation during visual object perception, in con...

2013
A. Veera Suneela Rani

In this paper we analyze the combine influence of radiation and dissipation on the convective heat and mass transfer flow of a viscous fluid through a porous medium in a rectangular cavity using Darcy model. Making use of the incompressibility the governing non-linear coupled equations for the momentum, energy and diffusion are derived in terms of the non-dimensional stream function, temperatur...

2012
Koji Nakazawa Shin-ya Katsumata

This paper proposes new mathematical models of the untyped Lambda-mu calculus. One is called the stream model, which is an extension of the lambda model, in which each term is interpreted as a function from streams to individual data. The other is called the stream combinatory algebra, which is an extension of the combinatory algebra, and it is proved that the extensional equality of the Lambda...

2011
Chungath Srinivasan K. V. Lakshmy Madathil Sethumadhavan

In stream cipher cryptography a pseudorandom sequence of bits of length equal to the message length is generated. This sequence is then bitwise XORed (addition modulo 2) with the message sequence and the resulting sequence is transmitted. At the receiving end, deciphering is done by generating the same pseudorandom sequence and bitwise XORing the cipher bits with the random bits. The seed of th...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید