نتایج جستجو برای: fractional di erential equations

تعداد نتایج: 542984  

1998
Jerome P. Gauntlett Neil D. Lambert Peter C. West

The vebrane worldvolume theory in eleven dimensions is known to contain BPS threebrane solitons which can also be interpreted as a vebrane whose worldvolume is wrapped around a Riemann surface. By considering con gurations of intersecting vebranes and hence intersecting threebrane solitons, we determine the Bogomol'nyi equations for more general BPS con gurations. We obtain di erential equation...

2001
R. M. Kiehn

A formal correspondence is established between the curvature theory of generalized implicit hypersurfaces, the classical theory of electromagnetism as expressed in terms of exterior di®erential systems, and thermodynamics. Starting with a generalized implicit surface whose normal ̄eld is represented by an exterior di®erential 1-form, it is possible to deduce the curvature invariants of the impl...

Journal: : 2022

"In this paper we investigate the existence of solutions initial value problems (IVP for short), partial hyperbolic functional and neutral differential inclusions fractional order involving Caputo derivative with finite delay by using nonlinear alternative Frigon type multivalued admissible contraction in Frechet spaces."

1999
Benjamin Jun

Cryptosystem designers frequently assume that secrets will be manipulated in closed, reliable computing environments. Unfortunately, actual computers and microchips leak information about the operations they process. This paper examines speci c methods for analyzing power consumption measurements to nd secret keys from tamper resistant devices. We also discuss approaches for building cryptosyst...

2009
Lejla Batina Benedikt Gierlichs Kerstin Lemke-Rust

We propose a new technique called Di erential Cluster Analysis for side-channel key recovery attacks. This technique uses cluster analysis to detect internal collisions and it combines features from previously known collision attacks and Di erential Power Analysis. It captures more general leakage features and can be applied to algorithmic collisions as well as implementation speci c collisions...

2002
Hitoshi Yanami Takeshi Shimoyama

We analyze the security of the SEED block cipher against di erential attacks. SEED is a 16-round Feistel cipher developed by the Korea Information Security Agency. The SEED proposers estimated their cipher against di erential cryptanalysis in a self-estimation document and found a six-round di erential characteristic with probability 2 130 . We present an improved method of examining the di ere...

2002
Hanne Gottliebsen Tom Kelsey Ursula Martin

We present hidden veri cation as a means to make the power of computational logic available to users of computer algebra systems while shielding them from its complexity. We have implemented in PVS a library of facts about elementary and transcendental functions, and automatic procedures to attempt proofs of continuity, convergence and di erentiability for functions in this class. These are cal...

Journal: :SIAM J. Scientific Computing 1999
Jan G. Verwer E. J. Spee Joke G. Blom Willem Hundsdorfer

A 2nd-order, L-stable Rosenbrock method from the eld of sti ordinary di erential equations is studied for application to atmospheric dispersion problems describing photochemistry, advective and turbulent di usive transport. Partial di erential equation problems of this type occur in the eld of air pollution modelling. The focal point of the paper is to examine the Rosenbrock method for reliable...

Journal: :SIAM J. Scientific Computing 1994
Hans Petter Langtangen

The reliability of dynamic systems modeled by white noise excited, stochastic, ordinary di erential equations can be computed from deterministic backward Kolmogorov equations. This paper discusses and compares some numerical solution methods for boundary value problems involving backward Kolmogorov equations. The numerical examples concern single degree of freedom oscillators subjected to white...

Journal: :Applied Mathematics and Computation 2001
J. M. Soriano

It is proven that an initial value problem of an autonomous system verifying some conditions has exactly one open continuously di€erentiable trajectory on R, whose limit set is not one point. The proof of the result is based upon continuation methods. 1. Preliminaries Di€erential equations play a key role in nature and technology because they control their processes. In time-dependent processes...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید