نتایج جستجو برای: reverse hill
تعداد نتایج: 128258 فیلتر نتایج به سال:
Chemical reaction systems operating in nonequilibrium open-system states arise in a great number of contexts, including the study of living organisms, in which chemical reactions, in general, are far from equilibrium. Here we introduce a theorem that relates forward and reverse fluxes and free energy for any chemical process operating in a steady state. This relationship, which is a generalizat...
ANSYS FLUENT tools were used as part of a standard turbulence k-ε model to simulate the air flow around number typical obstacles (a solid cube, hemisphere, and 2D hill) which form potential terrain in NPP emission dispersion area roughly correspond geometry buildings structures within this area. For reproducibility, non-uniform spatial grid is plotted computational region condenses near obstacl...
in this report, experimental investigation of waste water treatment by reverse osmosis to enable its reuse in cooling tower is presented. a polyamide spiral wound ro membrane followed by three filters as ro pretreatment (two activated carbon and one cartridge filter) and samples of tehran refinery treated waste water have been used. the effect of operating conditions such as pressure difference...
BACKGROUND In addition to Bankart repair engaging Hill-Sachs defects in glenohumeral instability have been treated successfully with remplissage procedure. The purpose of this study was to compare three remplissage techniques regarding (I) ability of preventing Hill-Sachs defect from engaging, (II) influence on glenohumeral rotational torque, and (III) resulting tendon coverage over the Hill-Sa...
Information security is a fast growing research field which includes numerous problems in it. Partial image encryption is one of the important problems in the field of image information security. This paper describes the partial image encryption in two ways using hill cipher technique. First encryption technique uses two slightly different keys to construct two self-invertible matrices, which a...
A new method for image encryption with two stages has been described in the present study. In first stage, each pixel of image is converted to its equivalent eight bit binary number and in that eight bit number, number of bits equal to the length of password are rotated and then reversed. In second stage, extended hill cipher technique is applied by using involutory matrix generated by same pas...
|This paper is concerned with function optimization in binary search spaces. It focuses on how hill-climbers can work together and/or use their past trials in order to speed up the search. A hill-climber is viewed as a set of mutations. The challenge is twofold: one must determine how many bits should be mutated, and which bits should preferably be mutated, or in other words, which climbing dir...
Much human learning appears to be gradual and unconscious, suggesting a very limited form of search through the space of hypotheses. We propose hill climbing as a framework for such learning and consider a number of systems that learn in this manner. We focus on CLASSIT, a model of concept formation that incrementally acquires a conceptual hierarchy, and MAGGIE, a model of skill improvement tha...
The relationship between the boundaries for Hill and Lagrange stability in orbital element space is modified in the case of resonantly interacting planets. Hill stability requires the ordering of the planets to remain constant while Lagrange stability also requires all planets to remain bound to the central star. The Hill stability boundary is defined analytically, but no equations exist to def...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید