نتایج جستجو برای: standard k

تعداد نتایج: 872959  

ژورنال: :مدلسازی در مهندسی 0
محسن طاهریان mohsen taheriyan [email protected] سیف اله سعدالدین seyfollah saedodin پارک علم و فناوری دانشگاه سمنان محمد صادق ولی پور mohammad sadegh valipour mechanical engineering, semnan university, semnan, iranدانشکده مهندسی مکانیک، دانشگاه سمنان

یکی از ساده ترین وسایلی که برای مکش و پمپ کردن سیال بکار می روند جت اجکتورها هستند. در این تحقیق با استفاده از دینامیک سیالات محاسباتی به شبیه سازی عددی جت اجکتور مادون صوت هوا-هوا پرداخته شده است. معادلات ناویراستوکس، پیوستگی و انرژی با شرایط مرزی بدون لغزش در دیواره حاکم می باشند. شبیه سازی عددی به صورت سه بعدی صورت گرفته و جریان پایا، لزج و مغشوش فرض شده است. به منظور شبیه سازی اغتشاشات از م...

2001
T. M. Aliev

Using the most general, model–independent form of effective Hamiltonian, the exclusive, rare B → Kνν̄ decay is analyzed. The sensitivity of the branching ratios and missing mass–squared spectrum to the new Wilson coefficients is discussed. PACS number(s): 12.60.–i, 13.20.He e-mail: [email protected] e-mail: [email protected] e-mail: [email protected]

2007
Vincenzo Cirigliano

I present a brief overview of the theoretical status of K 3 decays and their use as probes of lepton universality, light quark mass ratios, and CKM unitarity. I discuss in some detail the constraints imposed on the light quark masses by current measurements of the ratio of charged to neutral K 3 rates. * Speaker. † I would like to thank the organizers for partial financial support and the stimu...

Journal: :IEICE Transactions 2004
Swee-Huay Heng Kaoru Kurosawa

We present and analyze an adaptive chosen ciphertext secure (IND-CCA) identity-based encryption scheme (IBE) based on the well studied Decisional Diffie-Hellman (DDH) assumption. The scheme is provably secure in the standard model assuming the adversary can corrupt up to a maximum of k users adaptively. This is contrary to the Boneh-Franklin scheme which holds in the random-oracle model.

2004
Peter E. Trapa

The first part of these notes is an updating (and correction) of [Khat] and is devoted to a paremetrization of the irreducible representations of the (generally disconnected) maximal compact subgroup of a real group in Harish-Chandra’s class. The second part describes how to use that paremetrization of the first part to compute K-type multiplicities in standards modules. (By Frobenius reciproci...

2008
THOMAS MARKWIG

Abstract. In this paper we study standard bases for submodules of K[[t1, . . . , tm]][x1, . . . , xn] s respectively of their localisation with respect to a t-local monomial ordering. The main step is to prove the existence of a division with remainder generalising and combining the division theorems of Grauert and Mora. Everything else then translates naturally. Setting either m = 0 or n = 0 w...

2008
Christopher Smith

with X = νν̄, ll, λq = V ∗ qsVqd. Without the dependence of the loop functions y q on the quark masses, CKM unitarity would imply vanishing FCNC (GIM mechanism). Now, looking at these dependences, combined with the scaling of the CKM elements, one can readily get a handle on the importance of each quark contribution. For X = νν̄, only the Z penguin and W box enter, y q ∼ m 2 q, and light quark co...

2016
Pooja Pandey Ishpreet Singh

Clustering in data mining is very important to discover distribution patterns and this importance tends to increase as the amount of data grows. It is one of the main analytical methods in data mining and its method influences its results directly. K-means is a typical clustering algorithm[3]. It mainly consists of two phases i.e. initializing random clusters and to find the nearest neighbour. ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید