نتایج جستجو برای: known yoshida and chaboche
تعداد نتایج: 16842536 فیلتر نتایج به سال:
In this paper a fraud detection method is proposed which user behaviors are modeled using two main components namely the un-normal trend analysis component and scenario based component. The extent of deviation of a transaction from his/her normal behavior is estimated using fuzzy membership functions. The results of applying all membership functions on a transaction will then be infused and a f...
The objective of this paper is twofold. First we do a survey on what call the Yoshida method for studying analytic first integrals quasi-homogeneous polynomial differential systems. After, apply all systems in R3 degree 2.
amounts of free taurine, alanine, glycine, and glutamic acid and smaller amounts of a number of other ninhydrin-reactive constituents being found (8@, 88, 85). A characteristic feature of the tumor patterns has been the finding that the level of glutamine has been generally below the level of detection of the chromatographic procedures. However, free glutamine appears when tumors be gin to regr...
This paper discusses a known-plaintext attack on a redundancy reducing cipher method which is proposed by Wayner. We also propose an extension of Wayner’s redundancy reducing cipher scheme so that the security will be improved greatly.
.................................................................................................... 4 CONTENTS ..................................................................................................... 5 LIST OF ORIGINAL PUBLICATIONS ........................................................... 7 ABBREVIATIONS ..............................................................................
the role in clinical anesthesia. Anesthesiology 1991; 74: 581±605 16 Angel A, Majeed AB. Alterations of `sleeping time' in the rat induced by drugs which modulate central monoaminergic systems. Br J Anaesth 1990; 64: 594±600 17 Mason ST, Angel A. Brain noradrenaline and anaesthesia: further characterization of the beta-receptor. Neuropharmacology 1983; 22: 1065±9 18 Smart D. Orexins: a new fami...
We prove that the set of DES permutations (encryption and decryption for each DES key) is not closed under functional composition. This implies that, in general, multiple DES-encryption is not equivalent to single DES-encryption, and that DES is not susceptible to a particular known-plaintext attack which requires, on average, 228 steps. We also show that the size of the subgroup generated by t...
As noted below, most researchers agree that young babies should sleep in the same room where their parents sleep. The point of disagreement is whether parents should be advised against sharing their beds. Some researchers think that the safest arrangement involves cosleeping without sharing the same bed—-i.e., placing a young infant in a crib or “side car” that is within arm’s reach of his parent.
Advanced hardening models accurately describe the transient plastic behavior (reyielding, stagnation, resumption...) after various strain-path changes (reverse, orthogonal...). However, a common drawback of these is that they usually predict monotonic loading with lower accuracy than regular isotropic models. Consequently, finite element predictions using may sometimes lose in accuracy, spite t...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید