نتایج جستجو برای: stream length
تعداد نتایج: 362831 فیلتر نتایج به سال:
Geographical information system (GIS) has emerged as an efficient tool in delineation of drainage pattern and ground water potential and its planning. GIS and image processing techniques can be employed for the identification of morphological features and analyzing properties of basin. The morphometric parameters of basin can address linear, areal and relief aspects. The present study deals mai...
[1] Subsurface flow within a single riffle of a low-gradient gravel bed stream was modeled in three dimensions using MODFLOW, a finite difference groundwater flow model. Model simulations showed that exchange flows can only occur in this low-gradient, gaining stream because of a zone of alluvial sediment around the stream that has much higher permeability than the surrounding catchment (K = 10 ...
This paper considers the queue length distribution in a class of FIFO single-server queues with (possibly correlated) multiple arrival streams, where the service time distribution of customers from each arrival stream may differ from one another among streams. It is widely recognized that the queue length distribution in a FIFO queue with multiple non-Poissonian arrival streams having different...
A new lightweight stream cipher, SVH, is proposed. The design targets hardware environments where gate count, power consumption and memory is very limited. It is based on dual pseudo-random transformation and output feedback. The block of key size is 64 bits and SVH can achieve sufficient security margin against known attacks, such as linear cryptanalysis, differential cryptanalysis, impossible...
This paper presents an attempt to characterize synchronous stream functions within the framework of co-iteration and to use this characterization in building a compiler for (higher order and recursive) synchronous dataow programs. First length-preserving functions are considered and we show that streams equipped with such functions form a Cartesian-closed category. Then this point of view is ex...
Time-memory-data (TMD) tradeoff attacks limit the security level of many classical stream ciphers (like E0, A5/1, Trivium, Grain) to 2 n, where n denotes the inner state length of the underlying keystream generator. In this paper, we present Lizard, a lightweight stream cipher for power-constrained devices like passive RFID tags. Its hardware efficiency results from combining a Grain-like desig...
In a turbulent boundary layer over a smooth flat plate with zero pressure gradient, the intermediate structure between the viscous sublayer and the free stream consists of two layers: one adjacent to the viscous sublayer and one adjacent to the free stream. When the level of turbulence in the free stream is low, the boundary between the two layers is sharp, and both have a self-similar structur...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید