نتایج جستجو برای: pseudo time function
تعداد نتایج: 2925414 فیلتر نتایج به سال:
the release rate of potassium (k) from micaceous minerals plays a significant role in supplying k to plants. the objective of this study was to determine the most appropriate kinetic equation to describe potassium release from micaceous minerals as influenced by organic acids. muscovite and phlogopite were made to react with 0, 500, 2000 and 4000 ?m solutions of oxalic, citric and malic acids f...
Background and purpose: 2,4 dichlorophenol is one of the most important components of organochlorine. High resistance against degradation, creating odor and taste in water, high toxicity and being carcinogen have made this pollutant a great concern. Current study batch was done to investigate the adsorption of 2,4 dichlorophenol onto Magnetic Graphene Oxide Particles (MGO NPs). Materials and...
chapter one is devoted to a moderate discussion on preliminaries, according to our requirements. chapter two which is based on our work in (24) is devoted introducting weighted semigroups (s, w), and studying some famous function spaces on them, especially the relations between go (s, w) and other function speces are invesigated. in fact this chapter is a complement to (32). one of the main fea...
in this paper, a pointwise pseudo-metric function on the l-realline is constructed. it is proved that the topology induced by this pointwisepseudo-metric is the usual topology.
Abstract. Grøstl is one of the five finalists in the third round of SHA-3 competition hosted by NIST. In this paper, we use many techniques to improve the pseudo preimage attack on Grøstl hash function, such as subspace preimage attack and guess-and-determine technique. We present improved pseudo preimage attacks on 5-round Grøstl-256 and 8-round Grøstl-512 respectively. The complexity of the a...
Abstract The present paper is devoted to implementation of the immersed boundary technique into the Fourier pseudo-spectral solution of the vorticity-velocity formulation of the two-dimensional incompressible Navier-Stokes equations. The immersed boundary conditions are implemented via direct modification of the convection and diffusion terms, and therefore, in contrast to some other similar ...
fuzzy measures are suitable in analyzing human subjective evaluation processes. several different strategies have been proposed for distance of fuzzy numbers. the distances introduced for fuzzy numbers can be categorized in two groups:1. the crisp distances which explain crisp values for the distance between two fuzzy numbers.2. the fuzzy distance which introduce a fuzzy distance for normal fuz...
The Grøstl hash function is one of the 5 final round candidates of the SHA-3 competition hosted by NIST. In this paper, we study the preimage resistance of the Grøstl hash function. We propose pseudo preimage attacks on Grøstl hash function for both 256-bit and 512-bit versions, i.e., we need to choose the initial value in order to invert the hash function. Pseudo preimage attack on 5(out of 10...
Based on a recent improvement of the inclusion-exclusion principle, we present a new approach to network reliability problems. In particular, we give a new proof of a result of Shier, which expresses the reliability of a network as an alternating sum over chains in a semilattice, and a new proof of a result of Provan and Ball, which provides an algorithm for computing network reliability in pse...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید