نتایج جستجو برای: dexter et al introduced a new double

تعداد نتایج: 14028120  

2013
N. SUBRAMANIAN P. ANBALAGAN P. THIRUNAVUKARASU

The concept of fuzzy sets and fuzzy set operations were first introduced by Zadeh [30], fuzzy logic has become an important area of research in various branches of Mathematics such as metric and topological spaces, theory of functions, approximation theory etc. Subsequently several authors have discussed various aspects of the theory and applications of fuzzy sets. The concept of fuzzyiness has...

2009
P Nalawade

Combination of two-dimensional layered materials and intercalation technique offers a new area for developing nanohybrids with desired functionality. Layered double hydroxides (LDHs) are mineral and synthetic materials with positively charged brucite type layers of mixed metal hydroxides. Exchangeable anions located in interlayer spaces compensate for positive charge of brucite type layer. Sinc...

Journal: :Electr. Notes Theor. Comput. Sci. 2001
Peter Selinger

In this paper, we propose an adversary-centric, logical framework for formalizing cryptographic protocols. The formalism is inspired by the work of Compton and Dexter and of Cervesato et al., but we do not focus on proof search, but instead on logical validity. A novel contribution of this paper is a technique for giving very short proofs of protocol correctness through models of first-order lo...

Journal: :Insurance: Mathematics and Economics 1992

Journal: :Biostatistics 2002
Constantine E Frangakis Donald B Rubin Xiao-Hua Zhou

In many studies comparing a new 'target treatment' with a control target treatment, the received treatment does not always agree with assigned treatment-that is, the compliance is imperfect. An obvious example arises when ethical or practical constraints prevent even the randomized assignment of receipt of the new target treatment but allow the randomized assignment of the encouragement to rece...

Partial metric spaces were introduced by Matthews in 1994 as a part of the study of denotational semantics of data flow networks. In 2014 Asadi and {it et al.} [New Extension of $p$-Metric Spaces with Some fixed point Results on $M$-metric paces, J. Ineq. Appl. 2014 (2014): 18] extend the Partial metric spaces to $M$-metric spaces. In this work, we introduce the class of $F(psi,varphi)$-contrac...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه مازندران - دانشکده علوم 1393

بیش از سه دهه است که پژوهشگران سعی می کنند قطعات الکترونیکی با اندازه کوچکتر و کارایی هرچه بیشتر تولید کنند. در 20 سال اخیر کوشش های زیادی برای درک خواص رسانش الکترونی پلیمرهای همیوغ-? بعمل آمده است. این سیستم های نیمه رسانا نقش مهمی در طراحی سیستم های مولکولی برای کاربردهای الکترونیکی دارند. سیم های مولکولی واحدهای ساختاری بنیادی در طراحی قطعات الکترونیکی مولکولی هستند. یک سیم مولکولی شامل یک ...

Half lives alpha decay is the one of the most important parameters used for describing nuclear structure in nuclear dynamics; over the years, many studies have been done in this area. In this study, by using semi-empirical methods such as Viola-Seaborg (VSS), Royer, Parkhomenko and Sobiczewski (PSM), Brown, New Geiger-Nuttall (NGN), Poenaru et al. (UNIV) and Universal Decay Law (UDL), the half ...

1998
D. J. Den Hartog J. T. Chapman D. Craig G. Fiksel P. W. Fontana S. C. Prager J. S. Sarff

Plasma flow velocity fluctuations have been directly measured in the high temperature magnetically confined plasma in the Madison Symmetric Torus (MST) Reversed-Field Pinch (RFP) [R. N. Dexter et al., Fusion Tech. 19, 131 (1991)]. These measurements show that the flow velocity fluctuations are correlated with magnetic field fluctuations such that the electromotive force v ̃ H B ̃ approximately ba...

2012
Kai Samelin Henrich Christopher Pöhls Arne Bilzhause Joachim Posegga Hermann de Meer

In this paper, we present new attacks on the redactable signature scheme introduced by Kundu and Bertino at VLDB ’08. This extends the work done by Brzuska et al. at ACNS ’10 and Samelin et al. at ISPEC ’12. The attacks address unforgeability, transparency and privacy. Based on the ideas of Kundu and Bertino, we introduce a new provably secure construction. The corresponding security model is m...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید