نتایج جستجو برای: malkin

تعداد نتایج: 106  

1996
D. A. Trifonov

A complete set of solutions |z, u, v sa of the eigenvalue equation (ua 2 + va †2)|z, u, v = z|z, u, v ([a, a † ] = 1) are constructed and discussed. These and only these states minimize the Schrödinger uncertainty inequality for the squared amplitude (s.a.) quadratures. Some general properties of Schrödinger intelligent states (SIS) |z, u, v for any two observables X, Y are discussed, the sets ...

Journal: :J. Inf. Sci. Eng. 2010
Dai-Rui Lin Chih-I Wang D. J. Guan

The key exposures carry very serious problems, it is regarded a total break down of the system. In order to avoid this undesirable situation, the goal of forward security is to protect against this kind of threat. A protocol is said to provide forward secrecy if compromising long-term secret keys does not compromise past secret keys that were previously established. Bellare and Miner first prop...

Journal: :Clinical chemistry 1958
A GROSSMANN G F GROSSMANN

T HAS BEEN OUR EXPERIENCE (1) that accurate measurement on large numbers of samples in a minimum amount of working time per specimen can be achieved consistently in the analysis of protein-bound iodine by means of alkaline incineration. However, with the use of incineration, where many samples may be exposed simultaneously in enclosed spaces such as centrifuges, drying ovens, and muffle furnace...

Journal: :Biophysical journal 1969
J C Munday Govindjee

The fluorescence transient of Chlorella pyrenoidosa, excited by saturating light absorbed mainly by system II, has a dip D between the peak I at 75 msec and the large peak P at 400 msec (the times depend on light intensity). This dip is observed in aerobic cells and in anaerobic cells where it is prominent. In anaerobic cells, the I-D decline is hastened almost equally by absorption of either 7...

2017
Mohammad Hajiabadi Bruce M. Kapron

We address the problems of whether t-circular-secure encryption can be based on (t − 1)-circular-secure encryption or on semantic (CPA) security, if t = 1. While for t = 1 a folklore construction, based on CPA-secure encryption, can be used to build a 1-circular-secure encryption with the same secret-key and message space, no such constructions are known for the bit-encryption case, which is of...

2012
Martin Grohe Martin Otto

We give a new, simplified and detailed account of the correspondence between levels of the Sherali–Adams relaxation of graph isomorphism and levels of pebble-game equivalence with counting (higher-dimensional Weisfeiler–Lehman colour refinement). The correspondence between basic colour refinement and fractional isomorphism, due to Tinhofer [22, 23] and Ramana, Scheinerman and Ullman [17], is re...

2008
Selina Chu

My thesis aims to contribute towards building autonomous agents that are able to understand their surrounding environment through the use of both audio and visual information. To capture a more complete description of a scene, the fusion of audio and visual information can be advantageous in enhancing the system’s context awareness. The goal of this work is on the characterization of unstructur...

2006
FLORENT SCHAFFHAUSER

Dans cette note, on présente l’énoncé et les principales idées de la démonstration d’un théorème de convexité réel pour les applications moment à valeurs dans un groupe de Lie. Ce résultat est un analogue quasi-hamiltonien du théorème de O’Shea et Sjamaar dans le cadre hamiltonien usuel. On démontre que l’image par l’application moment du lieu des points fixes d’une involution renversant la 2-f...

2006
STEPHEN MALKIN Stephen Malkin

THE ATTRITIOUS AND FRACTURE WEAR OF GRINDING WHEELS by Stephen Malkin Submitted to the Department of Mechanical Engineering February 1968, in partial fulfillment of the requirements for the degree of Doctor of Science A detailed investigation is made of the nature and extent-of grinding wheel wear in finish grinding. The wear is broadly classified as either attritious or fracture wear. Attritio...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید