نتایج جستجو برای: di erential equation

تعداد نتایج: 482596  

Journal: :نظریه تقریب و کاربرد های آن 0
a. neamaty department of mathematics, university of mazandaran, babolsar, iran b. agheli department of mathematics, qaemshahr branch, islamic azad university, qaemshahr, iran r. darzi department of mathematics, neka branch, islamic azad university, neka, iran

in this work, we have applied elzaki transform and he's homotopy perturbation method to solvepartial di erential equation (pdes) with time-fractional derivative. with help he's homotopy per-turbation, we can handle the nonlinear terms. further, we have applied this suggested he's homotopyperturbation method in order to reformulate initial value problem. some illustrative examples...

2009
VINCENT GIOVANGIGLI

We investigate the derivation and the mathematical properties of a Saint-Venant model with an energy equation and with temperature-dependent transport coe±cients. These equations model shallow water °ows as well as thin viscous sheets over °uid substrates like oil slicks, atlantic waters in the Strait of Gilbraltar or °oat glasses. We exhibit an entropy function for the system of partial di®ere...

1995
Paul M. Furth Andreas G. Andreou

Three schemes for linearizing the transconductance of the basic di erential pair in subthreshold CMOS are examined: 1) multiple asymmetric di erential pairs, 2) source degeneration via symmetric di usors, and 3) source degeneration via a single di usor. Using a maximally at optimizing criterion, the linear range of the basic di erential pair can be increased by four-to-eight times.

1997
Mauno Rönkkö Anders P. Ravn

An action system framework is a predicate transformer based method for modelling and analysing distributed and reactive systems. The actions are statements in Dijkstra's guarded command language, and their semantics is given by predicate transformers. We extend conventional action systems with a di erential action consisting of a di erential equation and an evolution guard. The semantics is giv...

1998
V. LYUBASHENKO A. SUDBERY

We introduce and study the Koszul complex for a Hecke R-matrix. Its cohomologies, called the Berezinian, are used to de ne quantum superdeterminant for a Hecke R-matrix. Their behaviour with respect to Hecke sum of R-matrices is studied. Given a Hecke R-matrix in n-dimensional vector space, we construct a Hecke R-matrix in 2n-dimensional vector space commuting with a di erential. The notion of ...

Journal: :Journal of the Indian Mathematical Society 2022

We consider the di?erential equation f<sup>''</sup> +A(z)f<sup>'</sup> +B(z)f = 0, where A(z) and B(z) are entire complex functions. improve various restrictions on coe?cients prove that all non-trivial solutions of in?nite order.

1995
Gregory J. Reid Ping Lin Allan D. Wittkopf

dae and pdae are systems of ordinary and partial di erential-algebraic equations with constraints. They occur frequently in applications such as constrained multibody mechanics, space-craft control and incompressible uid dynamics. A dae has di erential index r if a minimum of r+1 di erentiations of it are required before no new constraints are obtained. While dae of low di erential index (0 or ...

1991
Xuejia Lai James L. Massey Sean Murphy

This paper considers the security of iterated block ciphers against the di erential cryptanalysis introduced by Biham and Shamir Di erential cryptanalysis is a chosen plaintext attack on secret key block ciphers that are based on iterating a cryptographically weak function r times e g the round Data Encryption Standard DES It is shown that the success of such attacks on an r round cipher depend...

1991
Xuejia Lai James L. Massey Sean Murphy

This paper considers the security of iterated block ciphers against the di erential cryptanalysis introduced by Biham and Shamir. Di erential cryptanalysis is a chosen-plaintext attack on secret-key block ciphers that are based on iterating a cryptographically weak function r times (e.g., the 16-round Data Encryption Standard (DES) ). It is shown that the success of such attacks on an r-round c...

1999
Benjamin Jun

Cryptosystem designers frequently assume that secrets will be manipulated in closed, reliable computing environments. Unfortunately, actual computers and microchips leak information about the operations they process. This paper examines speci c methods for analyzing power consumption measurements to nd secret keys from tamper resistant devices. We also discuss approaches for building cryptosyst...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید