نتایج جستجو برای: integrity approach

تعداد نتایج: 1352060  

2013
Daniel Krieg Joachim Stroth Matthias Kaschube Richard P. Feynman

1996
R. Cenni

The separated electromagnetic responses RL(q, ω) and RT (q, ω) for inclusive electron scattering off nuclei are studied within a functional scheme.

2017
Erin M. Bryant Jennifer Marmo Artemio Ramirez Artemio Ramirez

Journal: :journal of applied and computational mechanics 2014
hamid m. sedighi farhang daneshmand

this paper presents the high order frequency-amplitude relationship for nonlinear transversely vibrating beams with odd and even nonlinearities using homotopy perturbation method with an auxiliary term (hpmat). the governing equations of vibrating buckled beam, beam carrying an intermediate lumped mass and quintic nonlinear beam are investigated to exhibit the reliability and ability of the pro...

Journal: :iranian journal of pharmaceutical sciences 0
muhammad imran faculty of pharmacy, bhauddin zakaryia university, multan, pakistan. nazar muhammad ranjha faculty of pharmacy, bhauddin zakaryia university, multan, pakistan. rao khurram ayoub faculty of pharmacy, bhauddin zakaryia university, multan, pakistan.

the main objective of the present study was to formulate gastroretentive effervescent sustained release drug delivery systems of risperidone floating tablets with the help of methocel® k15, ethocel® standard 7fp premium, eudragit ® rs100 sustained release polymers to improve its safety profile, bioavailability and patient compliance. risperidone floating tablets were formulated by wet granulati...

1994
Rajashekar Kailar Virgil D. Gligor Stuart G. Stubblebine

We propose an approach for reasoning about message integrity protection in cryptographic protocols. The set of axioms presented herein relate design parameters and assumptions of message integrity protection mechanisms to generic message integrity threats. Comparison of threat properties derived using these axioms with the policy goals for integrity protection aids in assessing the strength (or...

Journal: :journal of algorithms and computation 0
mahmood shabankhah university of tehran, college of engineering, department of engineering science

many graph theoretical parameters have been used to describe the vulnerability of communication networks, including toughness, binding number, rate of disruption, neighbor-connectivity, integrity, mean integrity, edgeconnectivity vector, l-connectivity and tenacity. in this paper we discuss integrity and its properties in vulnerability calculation. the integrity of a graph g, i(g), is defined t...

Journal: :Journal of the Atomic Energy Society of Japan / Atomic Energy Society of Japan 1987

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید