نتایج جستجو برای: conjugate systems to x
تعداد نتایج: 11030245 فیلتر نتایج به سال:
abstract: country’s fiber optic network, as one of the most important communication infrastructures, is of high importance; therefore, ensuring security of the network and its data is essential. no remarkable research has been done on assessing security of the country’s fiber optic network. besides, according to an official statistics released by ertebatat zirsakht company, unwanted disconnec...
in this thesis, barium ferrite nano particles were prepared by sol-gel method. their structural and magnetic properties of samples have been investigated using thermo gravimetric analysis (tg-dta), x-ray powder diffractometer (xrd), fourier transform infrared (ftir), scanning electron microscopy (sem), field emission scanning electron microscopy (fesem), ac susceptometer, vibrating sample magne...
Small interfering RNA (siRNA) has been chemically conjugated to a variety of bioactive molecules, lipids, polymers, peptides, and inorganic nanostructured materials to enhance their pharmacokinetic behavior, cellular uptake, target specificity, and safety. To efficiently deliver siRNAs to the target cells and tissues, many different siRNA bioconjugates were synthesized and characterized, and th...
in chapter 1, charactrizations of fragmentability, which are obtained by namioka (37), ribarska (45) and kenderov-moors (32), are given. also the connection between fragmentability and its variants and other topics in banach spaces such as analytic space, the radone-nikodym property, differentiability of convex functions, kadec renorming are discussed. in chapter 2, we use game characterization...
We present a new minimal residual method, called global R-linear GMRES, to solve the R-linear matrix equations X + AXB = C and X + AXB = C, where C, X ∈ Cm×n, X denotes the complex conjugate of X, X its complex conjugate transpose, and A, B are complex matrices with appropriate dimensions. We show that the new method requires fewer matrix-matrix products than the global GMRES method applied to ...
Ciphers y = C(x, k) and = (, ) are isomorphic if there exists invertible computable in both directions map y ↔ , x ↔ , k ↔ . Cipher is vulnerable if and only if isomorphic cipher is vulnerable. Instead of computing the key of a cipher it is sufficient to find suitable isomorphic cipher and compute its key. If φ is arbitrary substitution and T is round substitution, its conjugate = φTφ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید