نتایج جستجو برای: catenary modules

تعداد نتایج: 58478  

Journal: :Mathematical biosciences 2003
Anthony Y Aidoo

We study the effect of channel geometry on the potential barrier encountered by ions as they permeate the acetylcholine receptor channel. Among the various channel geometries which have been used to represent the acetylcholine receptor channel include the cylinder and the toroidal catenary. The main reasons for those choices appear to be the facilitation of separation of the Poisson equation, r...

2013
N. Yang D-S Jeng X. L. Zhou

This paper presents a semi-analytical approximation for a two-dimensional (2D) tension analysis of submarine cables during laying operations. In the analysis, based on geometric compatibility relations and equilibrium equations, a set of non-linear differential equations are obtained. The present model considers effects of ocean currents, cable ship motion, pay-out rate, water depth and materia...

2004
Lionel Garnier Sebti Foufou Marc Neveu

This paper focuses on the blending of a plane with surfaces of revolution relying on Dupin cyclides, which are algebraic surfaces of degree 4 discovered by the French mathematician Pierre-Charles Dupin early in the 19th century. A general algorithm is presented for the construction of two kinds of blends: pillar and recipient. This algorithm uses Rational Quadric Bézier Curves (RQBCs) to model ...

2009
A. GEROLDINGER D. J. GRYNKIEWICZ G. J. SCHAEFFER W. A. SCHMID

Let H be a Krull monoid with infinite cyclic class group G and let GP ⊂ G denote the set of classes containing prime divisors. We study under which conditions on GP some of the main finiteness properties of factorization theory—such as local tameness, the finiteness and rationality of the elasticity, the structure theorem for sets of lengths, the finiteness of the catenary degree, and the exist...

‎Highest weight modules of the double affine Lie algebra $widehat{widehat{mathfrak{sl}}}_{2}$ are studied under a‎ ‎new triangular decomposition‎. ‎Singular vectors of Verma modules are‎ ‎determined using a similar condition with horizontal affine Lie‎ ‎subalgebras‎, ‎and highest weight modules are described under the‎ ‎condition $c_1>0$ and $c_2=0$.

This paper is concerned with the relation between local cohomology modules defined by a pair of ideals and the Serre subcategories of the category of modules. We characterize the membership of local cohomology modules in a certain Serre subcategory from lower range or upper range.

Abstract. Certain facts about frames and generalized frames (g- frames) are extended for the g-frames for Hilbert C*-modules. It is shown that g-frames for Hilbert C*-modules share several useful properties with those for Hilbert spaces. The paper also character- izes the operators which preserve the class of g-frames for Hilbert C*-modules. Moreover, a necessary and suffcient condition is ob- ...

Journal: :I. J. Network Security 2015
Felipe dos Anjos Lima Edward David Moreno Dellano Oliveira D. dos Santos Wanderson Roger Azevedo Dias

This article shows the results obtained during simulations that measured runtime and energy consumption of a security module (SEMO) when it executes in ARM processor. For the simulations, we considered the impacts of four algorithms (i.e. RSA, SHA-1, Random Numbers Generator and AES). We have used the Sim-Panalyzer simulator and obtained an average energy consumption (x2 Joules) and runtime (x2...

2005
Gildas Avoine Felix Gärtner Rachid Guerraoui Marko Vukolić

The fair exchange problem is key to trading electronic items in systems of mutually untrusted parties. In modern variants of such systems, each party is equipped with a security module. The security modules trust each other but can only communicate by exchanging messages through their untrusted host parties, that could drop those messages. We describe a synchronous algorithm that ensures determ...

2010
Kenji Yamamoto Toshihiro Yamauchi

Security focused OS (Secure OS) is attracting attention as a method for minimizing damage caused by various intrusions. Secure OSes can restrict the damage due to an attack by using Mandatory Access Control (MAC). In some projects, secure OSes for Linux have been developed. In these OSes, different implementation methods have been adopted. However, there is no method for easily evaluating the p...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید