نتایج جستجو برای: parameter

تعداد نتایج: 214899  

Journal: :journal of fasting and health 0
mohsen mazidi biochemistry of nutrition research center , school of medicine, mashhad university of medical science, mashhad, iran. peyman rezaie biochemistry of nutrition research center , school of medicine, mashhad university of medical science, mashhad, iran. mohsen nematy biochemistry of nutrition research center , school of medicine, mashhad university of medical science, mashhad, iran.

ramadan fasting is prescribed by quran for every able‐bodied, adult muslim and is considered an obligatory act of worship. during ramadan, the majority of muslims eat two major meals- one before dawn (sahar) and another immediately after the sunset (iftar). islamic fasting, due to its particular nature, may cause metabolic and hormonal changes in the body, which are different from those in regu...

M. Rezaiee-Pajand and H. Asghari,

This paper is on the elasto-plastic analysis of plane stress problems. A five-parameter yield surface is presented. This yield criterion uses associate flow along with mixed hardening rule. The analytical formulations are written and related computer program for non-linear analysis is prepared. Finally, based on the formulations, numerical examples are solved.

Journal: :iranian journal of science and technology (sciences) 2004
l. m. saha

a chaos control method suggested by erjaee has been reviewed. it has been shown that thistechnique can be applied in various evolutionary systems of 2-dimensional types. the method has beenapplied for cases of the henon map, as well as burger’s map. the limitations of the control techniquehave also been discussed by considering the standard map and the gumowski-mira map. the resultsobtained thr...

Journal: :روش های عددی در مهندسی (استقلال) 0
محمدرضا پژند و هادی اصغری m. rezaiee-pajand and h. asghari

this paper is on the elasto-plastic analysis of plane stress problems. a five-parameter yield surface is presented. this yield criterion uses associate flow along with mixed hardening rule. the analytical formulations are written and related computer program for non-linear analysis is prepared. finally, based on the formulations, numerical examples are solved.

Journal: :Electr. Notes Theor. Comput. Sci. 2003
Denis Béchet Annie Foret

This paper is concerned with learning categorial grammars in the model of Gold. We show that rigid and k-valued non-associative Lambek grammars are learnable from function-argument structured sentences. In fact, function-argument structures are natural syntactical decompositions of sentences in sub-components with the indication of the head of each sub-component. This result is interesting and ...

2013
T. V. K. Gupta J. Ramkumar Puneet Tandon

Abrasive Water Jet Machining is an unconventional machining process well known for machining hard to cut materials. The primary research focus on the process was for through cutting and a very limited literature is available on pocket milling using AWJM. The present work is an attempt to use this process for milling applications considering a set of various process parameters. Four different in...

2000
Frédéric Légaré

The results presented in the thesis show how to convert a statistically binding but computationally concealing quantum bit commitment scheme into a computationally binding but statistically concealing scheme. For a security parameter n, the construction of the statistically concealing scheme requires O(n) executions of the statistically binding scheme. As a consequence of the reduction, statist...

2014
J. Gaspar C. Minteer R. Sayler Y. Wamishe T. Kring

Bacterial Panicle Blight (BPB) is a seedand residue-borne disease caused by the pathogens Burkholderia glumae and B. gladioli. In recent years, the incidence and severity of BPB appears to be correlated with the increases in abundance of insect pests of rice in Arkansas, notably rice stink bug [Oebalus pugnax (F.); RSB]. The objective of this study was to investigate the extent to which the BPB...

Journal: :IACR Cryptology ePrint Archive 2013
Xiang Xie Rui Xue

In this work, we present two Key-Policy Attribute-Based Encryption (ABE) schemes for some subclass of circuits based on the Learning with Error (LWE) assumption. Our constructions are selectively secure in the standard model. More specifically, our first construction supports a subclass of circuits with polynomially bounded depth. We call this subclass the OR-restricted circuits which means tha...

2012
Malika Izabachène Benoît Libert

Off-line e-cash systems are the digital analogue of regular cash. One of the main desirable properties is anonymity: spending a coin should not reveal the identity of the spender and, at the same time, users should not be able to double-spend coins without being detected. Compact e-cash systems make it possible to store a wallet of O(2) coins using O(L+ λ) bits, where λ is the security paramete...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید