نتایج جستجو برای: box size

تعداد نتایج: 636070  

Journal: :Discrete Mathematics 2014
Andrei Asinowski Gill Barequet Toufik Mansour Ron Y. Pinter

A guillotine partition of a d-dimensional axis-aligned box B is a recursive partition of B by axis-aligned hyperplane cuts. The size of a guillotine partition is the number of boxes it contains. Two guillotine partitions are box-equivalent if their boxes satisfy compatible order relations with respect to the axes. (In many works, box-equivalent guillotine partitions are considered identical.) I...

Journal: :Soft matter 2015
Akash Arora David C Morse Frank S Bates Kevin D Dorfman

Lattice Monte Carlo (MC) simulations provide an efficient method for exploring the structure and phase behavior of block polymer melts. However, the results of such simulations may differ from the equilibrium behavior of a hypothetical infinite system as a consequence of the finite size of the simulation box. Standard finite-size scaling techniques cannot be employed to remove the effects of a ...

Journal: :طلوع بهداشت یزد 0
محمد رنجبر عزت آبادی دانشگاه علوم پزشکی و خدمات بهداشتی درمانی شهید صدوقی یزد محمد امین بهرامی دانشگاه علوم پزشکی و خدمات بهداشتی درمانی شهید صدوقی یزد جواد صادقی دانشگاه علوم پزشکی و خدمات بهداشتی درمانی شهید صدوقی یزد محمد مرادی دانشگاه علوم پزشکی و خدمات بهداشتی درمانی شهید صدوقی یزد رقیه معصومی دانشگاه علوم پزشکی و خدمات بهداشتی درمانی شهید صدوقی یزد نجمه باقیانی دانشگاه علوم پزشکی و خدمات بهداشتی درمانی شهید صدوقی یزد فرزانه هادی زاده

abstract introduction: the amount of waiting time is an indicator of level of access to hospital services and can be measured as one of the indicators of the effectiveness of hospital performance. this study aimed to determine the average waiting time in shahid rahnamoon and afshar clinics. methods: this descriptive, analytical, cross – sectional study was conducted with a simple size of 264 pa...

Journal: :International Journal of Evaluation and Research in Education 2021

<span lang="EN-US"><span>The present study aimed to investigate the metacognitive ability of students using e-portfolio assessment in project-based learning classes. The projects were a set out critical analysis based on selected references (project 1) and field activities theme content 2). Student consists three phases, planning, implementation, evaluation abilities that assessed t...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه صنعتی اصفهان - دانشکده ریاضی 1390

the main objective in sampling is to select a sample from a population in order to estimate some unknown population parameter, usually a total or a mean of some interesting variable. a simple way to take a sample of size n is to let all the possible samples have the same probability of being selected. this is called simple random sampling and then all units have the same probability of being ch...

2010
Ajay Kakkar

*Thapar University, Patiala, India **GNDU, Amritsar, India Ex-Principal, MIMIT, Malout, India Abstract: Cryptography is a technique used to avoid unauthorized access of data. It is the technique of scrambling data to make it indecipherable to all, except the intended person. It includes encryption algorithm and reliable key(s). It is clear that key design flaws account for 50 percent of securit...

2003
Liam Keliher Henk Meijer

A block cipher, which is an important cryptographic primitive, is a bijective mapping from {0, 1} to {0, 1} (N is called the block size), parameterized by a key. In the true random cipher, each key results in a distinct mapping, and every mapping is realized by some key—this is generally taken to be the ideal cipher model. We consider a fundamental block cipher architecture called a substitutio...

2008
L. KOVALCHUK

The paper discusses the Feistel cipher with a block size of n = 2m, where the addition of a round key and a part of an incoming massage in each round is carried out modulo 2m. In order to evaluate the security of such a cipher against differential and linear cryptanalyses, the new parameters of cipher s-boxes are introduced. The upper bounds of maximum average differential and linear probabilit...

2005
David Canright

A key step in the Advanced Encryption Standard (AES) algorithm is the “S-box.” Many implementations of AES have been proposed, for various goals, that effect the S-box in various ways. In particular, the most compact implementations to date of Satoh et al.[1] and Mentens et al.[2] perform the 8-bit Galois field inversion of the S-box using subfields of 4 bits and of 2 bits. Our work refines thi...

Journal: :Physical review. E, Statistical, nonlinear, and soft matter physics 2015
Yaouen Fily Aparna Baskaran Michael F Hagan

We study the dynamics of nonaligning, noninteracting self-propelled particles confined to a box in two dimensions. In the strong confinement limit, when the persistence length of the active particles is much larger than the size of the box, particles stay on the boundary and align with the local boundary normal. It is then possible to derive the steady-state density on the boundary for arbitrar...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید