نتایج جستجو برای: biswas milovic equation
تعداد نتایج: 230079 فیلتر نتایج به سال:
در این پایان نامه یک روش عددی برای حل معادلات کسری-زمانی و کسری-فضایی برگر egin{equation*} d_t^{alpha}u+varepsilon uu_{x}= u u_{xx}+eta d_x^{eta}u, end{equation*} معادله ی کسری-زمانی و کسری-فضایی پوآسن egin{equation*} d_x^{eta}u + d_t^{alpha}u = f(x,t), end{equation*} و معادله ی کسری-زمانی انتشار egin{equation*} d_t^alpha u+u=k abla^2 u + f(x,t), end{equation*} ...
Recently, Isalam and Biswas proposed a new group key agreement (GKA) protocol for imbalanced mobile networks. In this letter, we will show that Isalam et al.’s GKA protocol is not secure.
In this article we extend the proof given by Biswas and Gómez [BG] of a Torelli theorem for the moduli space of Higgs bundles with fixed determinant, to the parabolic situation.
has been introduced by several authors like Ahmed and Hamouly [1], Kohli and Kumar [5], Biswas [4], etc. Also the notion of fuzzy norm on a linear space was introduced by Katsaras [9]. Later on many other mathematicians like Felbin [3], Cheng and Mordeso [10], Bag and Samanta [6], etc, have given different definitions of fuzzy normed spaces. In recent past lots of work have been done in the top...
In this paper, we investigate the geometry of base complex manifold an effectively parametrized holomorphic family stable Higgs bundles over a fixed compact K\"{a}hler manifold. The starting point our study is Schumacher-Toma/Biswas-Schumacher's curvature formulas for Weil-Petersson-type metrics, in Sect. 2, give some applications their on geometric properties 3, calculate higher direct image b...
Submitted for the MAR13 Meeting of The American Physical Society Hydrogen microstructure of amorphous silicon via inversion of nuclear magnetic resonance spectra: A moment-based approach PARTHAPRATIM BISWAS, The University of Southern Mississippi, RAJENDRA TIMILSINA, The University of Tennessee at Knoxville — We present an inverse approach for reconstructing hydrogen microstructure in amorphous...
Semi-supervised clustering improves performance using constraints that indicate if two images belong to the same category or not. Success depends on how effectively these constraints can be propagated to the unsupervised data. Many algorithms use these constraints to learn Euclidean distances in a vector space. However, distances between images are often computed using classifiers or combinator...
The design of secure remote user authentication schemes for mobile applications is still an open and quite challenging problem, though many schemes have been published lately. Recently, Islam and Biswas pointed out that Lin and Hwang et al.’s password-based authentication scheme is vulnerable to various attacks, and then presented an improved scheme based on elliptic curve cryptography (ECC) to...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید