منابع مشابه
Mohamed Shaban , G . F . Attia , Mohamed A
Tin oxide thin films were successfully fabricated by the sol-gel spin coating technique for varying number of cycles. The samples were characterized by X-ray diffraction (XRD) and scanning electron microscope (SEM). The effect of a number of cycles on the structural and optical properties of SnO2 films was studied. The crystallite size is changed from 7.7 to 31.1 nm by increasing the number of ...
متن کاملMohamed Barakat &
Abstract. In this work we announce the Maple package conley to compute connection and C-connection matrices. conley is based on our abstract homological algebra package homalg. We emphasize that the notion of braids is irrelevant for the definition and for the computation of such matrices. We introduce the notion of triangles that suffices to state the definition of (C)-connection matrices. The...
متن کامل20-25 Mohamed Feature
ITE JOURNAL / MARCH 2001 THE ORLANDO-ORANGE COUNTY Expressway Authority (OOCEA) operates a 132-kilometer toll-road system in Orange County, FL, USA. This network includes 10 mainline toll plazas and 38 tollbooth ramps in operation. In mid-May 1994, the state-of-the-art electronic toll collection (ETC) system known as E-PASS that utilizes automated vehicle identification (AVI) technology was ins...
متن کاملMohamed Abbas-08
The accuracy of measuring the crossing moment of a given signal to a specific reference voltage plays a crucial role in determining the bandwidth of the signal that could be converted by a level-crossing ADC. This timing accuracy is mainly determined by delay dispersion of the comparator and the accuracy of the time-to-digital converter (TDC) comprising the levelcrossing ADC. With the pico-seco...
متن کاملCryptanalysis of ARMADILLO 2 ∗ Mohamed
ARMADILLO2 is the recommended variant of a multi-purpose cryptographic primitive dedicated to hardware which has been proposed by Badel et al. in [1]. In this paper we propose a meet-in-the-middle technique that allows us to invert the ARMADILLO2 function. Using this technique we are able to perform a key recovery attack on ARMADILLO2 in FIL-MAC application mode. A variant of this attack can al...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Critique d’art
سال: 2014
ISSN: 1246-8258,2265-9404
DOI: 10.4000/critiquedart.15450