نتایج جستجو برای: which under ideal assumption cannot withstand compressive forces

تعداد نتایج: 4288964  

Journal: :CoRR 2017
Deepak Garg Ajit Rajwade

Most existing bounds for signal reconstruction from compressive measurements make the assumption of additive signal-independent noise. However in many compressive imaging systems, the noise statistics are more accurately represented by Poisson or Poisson-Gaussian noise models. In this paper, we derive upper bounds for signal reconstruction error from compressive measurements which are corrupted...

This article reports the effects of various artificial aging methods and lubrication modes (dry, mist, wet) on the recorded cutting forces and chip morphology in drilling Al-Si-Mg (A356) cast alloys. In the course of this work, the work part sampled were as-received alloy (T0), solution heat-treated alloy (SHT) and then aged alloys at 155°C, 180°C, and 220°C (T4, T6, T61, T7), respectively. The...

2016
Ljubiša Stanković

The analysis of ISAR image recovery from a reduced set of data presented in [1] is extended in this correspondence to an important topic of signal nonsparsity (approximative sparsity). In real cases the ISAR images are noisy and only approximately sparse. Formula for the mean square error in the nonsparse ISAR, reconstructed under the sparsity assumption, is derived. The results are tested on e...

2009
Johannes A. Buchmann Richard Lindner

The security of many efficient cryptographic constructions, e.g. collision-resistant hash functions, digital signatures, identification schemes, and more recently public-key encryption has been proven assuming the hardness of worst-case computational problems in ideal lattices. These lattices correspond to ideals in the ring Z[ζ], where ζ is some fixed algebraic integer. Under the assumption th...

2013
Meir M. Barak Daniel E. Lieberman David Raichlen Herman Pontzer Anna G. Warrener Jean-Jacques Hublin

Although the earliest known hominins were apparently upright bipeds, there has been mixed evidence whether particular species of hominins including those in the genus Australopithecus walked with relatively extended hips, knees and ankles like modern humans, or with more flexed lower limb joints like apes when bipedal. Here we demonstrate in chimpanzees and humans a highly predictable and sensi...

Journal: :American journal of physiology. Cell physiology 2012
Kazuaki Nagayama Yuki Kimura Narutaka Makino Takeo Matsumoto

Actin stress fibers (SFs) of cells cultured on cyclically stretched substrate tend to reorient in the direction in which a normal strain of substrate becomes zero. However, little is known about the mechanism of this reorientation. Here we investigated the effects of cyclic stretch waveform on SF reorientation in osteoblastic cells. Cells adhering to silicone membranes were subjected to cyclic ...

Among the many force s to which hydraulic structures are exposed to, the forces induced by cavitation incident are of typical hydrodynamic unknown forces. The aim of this study is to define these forces as coupled fluid-structure interaction under two dynamic effects. The first dynamic effect which incorporates facilities for dealing with cavitation fluid is based on the appearance and bursting...

Journal: :Conservative Dentistry Journal: Collection of Journal Articles Dentistry Faculty, Airlangga University 2022

Background: Energy drink consumption has been popular in people age 18-35 years old. A few literature showed that this can cause damage to teeth and composite due its acidity. The use of fiber reinforced increasing good mechanical properties aesthetic. Fiber shaped fillers withstand mastication forces. restoration material face the complex oral environment succeed clinically. Compressive streng...

پایان نامه :0 1370

all analytical methods are generally based on the measurement of a parameter or parameters which are somehow related to the concentration of the species.an ideal analytical method is one in which the concentration of a species can be measured to a high degree precision and accuracy and with a high sensitivity. unfortunately finding such a method is very difficult or sometimes even impossible.in...

Journal: :Comput. J. 2005
Yuh-Min Tseng

By its very nature, a non-authenticated multi-party key agreement protocol cannot provide participant and message authentication, so it must rely on an authenticated network channel. This paper presents the inability of two famous multi-party key agreement protocols to withstand malicious participant attacks, even though their protocols are based on the authenticated network channel. This attac...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید