نتایج جستجو برای: characteristic based scheme
تعداد نتایج: 3187217 فیلتر نتایج به سال:
The Macaulayfication of a Noetherian scheme X is a birational proper morphism Y → X such that Y is a CohenMacaulay scheme. Of course, a desingularization is a Macaulayfication and Hironaka gave a desingularization of arbitrary algebraic variety over a field of characteristic 0. In 1978 Faltings gave a Macaulayfication of a quasi-projective scheme whose nonCohen-Macaulay locus is of dimension 0 ...
Conventional Galerkin-based finite element algorithms perform poorly when modeling advective transport. Here we develop and test a characteristic Galerkin scheme to solve the unsteady three-dimensional advective transport equation. The algorithm uses tracking of the Gaussian quadrature points to project the information from the Eulerian background grid to the Lagrangian grid. Numerical experime...
Abstract. In this article, a characteristic scheme is considered for the viscoelastic Oldroyd fluid flows based on the lowest equal-order finite element pair. The diffusion term in these equations is discretized by using finite element method, the temporal differentiation and advection terms are treated by characteristic scheme and the integral term is handled by applying right rectangle rule. ...
We present a key exchange scheme similar to that of Diie and Hellman using the infrastructure of quadratic function elds of even characteristic. This is a modiication of the results of Scheidler, Stein and Williams who used quadratic function elds of odd characteristic. We also extend these results to give a digital signature scheme similar to that of ElGamal. These schemes are possible in this...
We propose a new threshold signature scheme based on conic curve. The security of the proposed threshold signature scheme is based on the difficulty of computing the DLP in conic curve groups. It can resist some of the known attacks. Since an exciting characteristic of conic is both encoding and decoding over conic are easily implemented, it can be used in the mobile payment system with the lim...
In this paper, we propose a scheme composed of the spatial and inter-slice analyses to achieve tumor region identification in MRI breast images. Our spatial analysis evaluates the intensity and size information of candidate regions, while the inter-slice analysis is based on the continuity characteristic to verify the static behavior of tumor regions. To find a precise region, a region growing ...
In the last few years multivariate public key cryptography has experienced an infusion of new ideas for encryption. Among these new strategies is the ABC Simple Matrix family of encryption schemes which utilize the structure of a large matrix algebra to construct effectively invertible systems of nonlinear equations hidden by an isomorphism of polynomials. One promising approach to cryptanalyzi...
In this paper, we introduce a method of threshold secret sharing scheme (TSSS) in which secret reconstruction is based on Babai's nearest plane algorithm. In order to supply secure public channels for transmitting shares to parties, we need to ensure that there are no quantum threats to these channels. A solution to this problem can be utilization of lattice-based cryptosystems for these channe...
internal turn-turn faults (ttf) are the most common failures in power transformers, which could seriously reduce their life expectancy. although common protection schemes such as current-baseddifferential protection are able to detect some of the internal faults, some other minor ones (such as ttfs andshort circuit near the neutral point) cannot be detected by such schemes. likewise, these rela...
We address the control plane architecture of how to provide advance quality of service (QoS) in optical burst switching networks based on dynamic wavelength assignment. Unlike existing QoS guaranteeing scheme, such as buffer-based and offset-time based scheme, our proposed dynamic virtual lambda partitioning (DVLP) scheme does not mandate any buffer or extra offset time, but can achieve better ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید