نتایج جستجو برای: zag product
تعداد نتایج: 281287 فیلتر نتایج به سال:
A convenient integral representation for zig-zag four-point and two-point planar Feynman diagrams relevant to the bi-scalar D-dimensional fishnet field theory is obtained. This gives a possibility evaluate exactly of series in special cases. In particular, we give fairly simple proof Broadhurst-Kreimer conjecture about values multi-loop which make significant contribution renormalization group ...
Clearly, any of the standard search algorithms (depth-first-search, breadth-first-search etc.) solve USTCONN in linear time. Thus, the time complexity of USTCONN is wellunderstood. What we would be interested in today’s lecture is the same complexity of USTCONN. It is to be noted that the standard search algorithms perform poorly with respect to space (this is because their implementation requi...
Assess the Accuracy of the Variational Asymptotic Plate and Shell Analysis Using the Generalized Uni
The accuracy of the Variational Asymptotic Plate and Shell Analysis (VAPAS) is assessed against several higher order, zig zag and layerwise theories generated by using the invariant axiomatic framework denoted as Generalized Unified Formulation (GUF). These theories are also compared against the elasticity solution developed for the case of a sandwich structure with high Face to Core Stiffness ...
The unsymmetrical phosphorus ylide, Ph2PCH2CH2PPh2@C(H)C(O)Ph is shown to react with Hg(II) halides to form polymeric products with the composition {HgX2[PPh2CH2CH2PPh2C(H)C(O)Ph]}n, where X = Cl (1), Br (2), I (3). The complexes have been characterized by elemental analysis, IR, H, P NMR spectra as well as by ESI mass spectra. In product 1 the ylide exhibits a P, C-bridging mode of coordinatio...
The validity of the Bianchi identity, which is intimately connected with the zig zag symmetry, is established, for piecewise continuous contours, in the context of Polakov’s gauge field-string connection in the large ’tHooft coupling limit, according to which the chromoelectric ‘string’ propagates in five dimensions with its ends attached on a Wilson loop in four dimensions. An explicit check i...
Communication has to be secure in order to be kept private. The latest developments in the field of digital communication have made secret communication possible. Image hiding is a method in which a secret image is hidden in a cover image thereby forming a hybrid or stego image. In this paper, data hiding is performed by taking difference value of three and two neighbouring pixels by adapting Z...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید