نتایج جستجو برای: energy identity

تعداد نتایج: 782142  

Journal: :Annals of the Association of American Geographers 2011

2010
Gouranga C Nayak

Gouranga C Nayak ∗ 1 Department of Physics, University of Arizona, Tucson, AZ 85721, USA Abstract In this paper we derive a gauge fixing identity by varying the covariant gauge fixing term in Z[A, J, η, η̄] in the background field method of QCD in pure gauge. Using this gauge fixing identity we establish a relation between Z[J, η, η̄] in QCD and Z[A, J, η, η̄] in background field method of QCD in ...

M. S. Abolghasemi R. Ebrahimi Atani, T. Y. Rezapour,

Wireless sensor networks (WSNs) have many applications in the areas of commercial, military and environmental requirements. Regarding the deployment of low cost sensor nodes with restricted energy resources, these networks face a lot of security challenges. A basic approach for preparing a secure wireless communication in WSNs, is to propose an efficient cryptographic key management protocol be...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه علامه طباطبایی 1389

after the soviet union dissolution, a chaotic period was begun in the russia. russia lost its glory and felt disgrace. the first group of elites came to power under yeltsin; they tried to re-define russia’s identity as a european country and build a foreign policy on this baseline. therefore russia tried to become closer with the west especially with the u.s. according to their view the sovie...

Journal: :Nucleic Acids Research 2005
Xingyuan Li Zhili He Jizhong Zhou

The oligonucleotide specificity for microarray hybridization can be predicted by its sequence identity to non-targets, continuous stretch to non-targets, and/or binding free energy to non-targets. Most currently available programs only use one or two of these criteria, which may choose 'false' specific oligonucleotides or miss 'true' optimal probes in a considerable proportion. We have develope...

2008
Markus H. Thoma

We verify the QED Ward identity for the twoand three -point functions at non-equilibrium in the HTL limit. We use the Keldysh formalism of real time finite temperature field theory. We obtain an identity of the same form as the Ward identity for a set of one loop self-energy and one loop three-point vertex diagrams which are constructed from HTL effective propagators and vertices. Supported by ...

2010
Jan Zibuschka Matthias Herbert Heiko Rossnagel

Mashups empower users to easily combine and connect resources from independent Web-based sources and domains. However, these characteristics also introduce new and amplify existing security and privacy problems. This is especially critical in the emerging field of enterprise Mashups. Despite several contributions in the field of Mashup security the issue of protecting exchanged resources agains...

2007
Marit Hansen

User-controlled identity management systems assist individuals in managing their private sphere. An individual’s privacy can be supported by transparency on processing of personal data. After giving an overview on transparency properties as well as its relation to privacy and data protection regulation, this text introduces different transparency tools: Prior to an interaction, information on t...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید