نتایج جستجو برای: novel modification approach

تعداد نتایج: 2056368  

Journal: :Biochimica et Biophysica Acta (BBA) - Proteins and Proteomics 2012

Journal: :International Journal of Damage Mechanics 2005

2009
Kari TAMMI

Repetitive learning control was examined for active vibration control of rotor. A novel modification of a gradient-based repetitive learning control algorithm was developed. The stability of the algorithm was studied and the algorithm was tested on a rotor test rig. The experiments showed that repetitive learning control attenuated efficiently rotor vibrations excited by rotor unbalances. In ad...

Journal: :Organic letters 2011
Vijayakumar Ramalingam Adam R Urbach

The synthesis of [2]rotaxanes, each comprising a viologen core threaded through a cucurbit[8]uril (Q8, Figure 1) macrocycle and stoppered by tetraphenylmethane groups, and their binding to second guests as inclusion complexes in organic and aqueous media are described. Stoppering was observed to have little effect on binding. Chemical modification of the threaded guest was used to control solub...

Journal: :جستارهای ادبی 0

literature as an art or science is of different kinds; and these kinds can constitute new systems. novel is one of these different kinds of literature that is also divided to many different kinds. autobiography is also a branch of literature that has its own features and characteristics. there are also many capabilities in these variations and in their combination with the other kinds. “autobio...

Journal: :An International Journal of Otorhinolaryngology Clinics 2015

2006
Daniel Mesquita Jean-Denis Techer Lionel Torres Michel Robert Gaston Cambon Gilles Sassatelli Fernando Moraes

This work addresses the leakage information problem concerning cryptographic circuits. Physical implementations of cryptographic algorithms may let escape some side channel information, like electromagnetic emanations, temperature, computing time, and power consumption. With these information, an attacker can retrieve the data that is being computed, like cryptographic keys. This paper proposes...

Journal: :Journal of Mathematical Analysis and Applications 1987

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید