نتایج جستجو برای: middle of square
تعداد نتایج: 21188061 فیلتر نتایج به سال:
We have reinvestigated the structural and thermodynamic properties of the squarewell and the square-shoulder system using two different theoretical frameworks, i.e., the optimized random-phase approximation and the Rogers–Young integral equation. We discuss the limits of applicability of the respective concepts and compare the results with ‘exact’ Monte Carlo simulation results and with data ob...
We i n v estigate, in the Shannon model, the security of constructions corresponding to double and two-key triple DES. That is, we consider F k1 F k2 and F k1 F ,1 k2 F k1 with the component functions being ideal ciphers. This models the resistance of these constructions to generic" attacks like meet in the middle attacks. We obtain the rst proof that composition actually increases the security...
These notes are based on scribe notes by Marios Papaefthymiou and Mike Kluger-man. 1 Euclidean TSP Consider the travelling salesman problem in the plane. Given n points in the plane, we would like to nd a tour that visits all of them and that minimizes the distance travelled, where the distance between two points is given by the Euclidean distance. This problem will be denoted by ETSP (Euclidea...
PATIENTS AND METHODS: Twenty patients underwent surgical treatment for malignant tumors of the external auditory canal and the middle ear. There were 16 males and four females, with a mean age of 66 years (range 37 to 79 years). Eight patients had primary, 12 patients had secondary temporal bone tumors. Primary tumors involved the middle ear or the ear canal, while secondary tumors originated f...
OBJECTIVE To determine the burden and factors associated with post-stroke depression in East central Nigeria. METHOD We carried out this cross-sectional study of 50 stroke survivors (mean age=54.8 ± 8.8 years), at the physiotherapy Department of the University of Nigeria Teaching Hospital, Enugu. Data were collected using Becks Depression Inventory , it was analyzed using Z-scores, Chi-square...
We investigate, in the Shannon model, the security of constructions corresponding to double and (two-key) triple DES. That is, we consider Fk1 (Fk2(·)) and Fk1(F −1 k2 (Fk1 (·))) with the component functions being ideal ciphers. This models the resistance of these constructions to “generic” attacks like meet in the middle attacks. We obtain the first proof that composition actually increases th...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید