منابع مشابه
Kinematics of the most efficient cilium.
In a variety of biological processes, eukaryotic cells use cilia to transport flow. Although cilia have a remarkably conserved internal molecular structure, experimental observations report very diverse kinematics. To address this diversity, we determine numerically the kinematics and energetics of the most efficient cilium. Specifically, we compute the time-periodic deformation of a wall-bound...
متن کاملThe most intensive fluctuation in chaotic time series and relativity principle
Relativity principle in mechanics and principle of invariant speed of light lead to Einstein theory. The exponent of porder momentum, derived from a piece of multi-scale chaotic time series, varies with the order p and cannot exceeds a maximum, so there exists the principle of scale relativity. Its special case is the same one as Lorenz transformation from Einstein theory. 2002 Elsevier Science...
متن کاملestimating claims reserves using ibnr reserves
شرکت های بیمه در قبال بیمه گذاران متعهد می شوند که به ازای دریافت حق بیمه، خسارت وارده به بیمه گذاران را جبران نمایند. بنابراین بیمه گر همیشه مبالغی را بر عهده دارد که متعلق به بیمه گذاران است و مربوط به تعهدات آینده می باشد. این مبالغ را ذخایر فنی یا technical reserves گویند. بیمه گر موظف است در پایان سال مالی، هنگام بستن حساب ها، ذخایر فنی را محاسبه و نگهداری کند. پس از وقوع خسارت، بیمه گذار ...
The most Efficient Path Algorithm from Feeders to PCBs
SMT(Surface Mount Technology) machines are used to place electronic components onto a PCB(Printed Circuit Board). This study proposes a method of identifying the fastest path for picked up components to pass by a camera without stopping before being placed onto PCBs. The proposed method enables the gantry, responsible for moving the heads, to pass by the camera in the least amount of time possi...
متن کاملRFC 6628 Most Efficient Augmented PAKE for IKEv
This document describes an efficient augmented password-only authentication and key exchange (AugPAKE) protocol where a user remembers a low-entropy password and its verifier is registered in the intended server. In general, the user password is chosen from a small set of dictionary words that allows an attacker to perform exhaustive searches (i.e., off-line dictionary attacks). The AugPAKE pro...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: ASTIN Bulletin
سال: 1974
ISSN: 0515-0361,1783-1350
DOI: 10.1017/s0515036100009181