TWO-LOOP CROSSOVER SCALING FUNCTIONS OF THE O(N) MODEL
نویسندگان
چکیده
منابع مشابه
the effect of using model essays on the develpment of writing proficiency of iranina pre-intermediate efl learners
abstract the present study was conducted to investigate the effect of using model essays on the development of writing proficiency of iranian pre-intermediate efl learners. to fulfill the purpose of the study, 55 pre- intermediate learners of parsa language institute were chosen by means of administering proficiency test. based on the results of the pretest, two matched groups, one as the expe...
Crossover scaling in two dimensions
We determine the scaling functions describing the crossover from Ising-like critical behavior to classical critical behavior in two-dimensional systems with a variable interaction range. Since this crossover spans several decades in the reduced temperature as well as in the finite-size crossover variable, it has up to now largely evaded a satisfactory numerical determination. Using a dedicated ...
متن کاملa study on insurer solvency by panel data model: the case of iranian insurance market
the aim of this thesis is an approach for assessing insurer’s solvency for iranian insurance companies. we use of economic data with both time series and cross-sectional variation, thus by using the panel data model will survey the insurer solvency.
the evaluation and comparison of two esp textbooks available on the iranian market for teaching english to the students of medicine
abstract this study evaluated and compared medical terminology and english for the students of medicine (ii) as two representatives of the textbooks available on the iranian market for teaching english to the students of medicine. this research was performed on the basis of a teacher’s and a number of students’ attitudes and the students’ needs analysis for two reasons: first, to investigate...
15 صفحه اولstudy of hash functions based on chaotic maps
توابع درهم نقش بسیار مهم در سیستم های رمزنگاری و پروتکل های امنیتی دارند. در سیستم های رمزنگاری برای دستیابی به احراز درستی و اصالت داده دو روش مورد استفاده قرار می گیرند که عبارتند از توابع رمزنگاری کلیددار و توابع درهم ساز. توابع درهم ساز، توابعی هستند که هر متن با طول دلخواه را به دنباله ای با طول ثابت تبدیل می کنند. از جمله پرکاربردترین و معروف ترین توابع درهم می توان توابع درهم ساز md4, md...
ذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Modern Physics A
سال: 2010
ISSN: 0217-751X,1793-656X
DOI: 10.1142/s0217751x10050767