نتایج جستجو برای: malkin
تعداد نتایج: 106 فیلتر نتایج به سال:
A complete set of solutions |z, u, v sa of the eigenvalue equation (ua 2 + va †2)|z, u, v = z|z, u, v ([a, a † ] = 1) are constructed and discussed. These and only these states minimize the Schrödinger uncertainty inequality for the squared amplitude (s.a.) quadratures. Some general properties of Schrödinger intelligent states (SIS) |z, u, v for any two observables X, Y are discussed, the sets ...
The key exposures carry very serious problems, it is regarded a total break down of the system. In order to avoid this undesirable situation, the goal of forward security is to protect against this kind of threat. A protocol is said to provide forward secrecy if compromising long-term secret keys does not compromise past secret keys that were previously established. Bellare and Miner first prop...
T HAS BEEN OUR EXPERIENCE (1) that accurate measurement on large numbers of samples in a minimum amount of working time per specimen can be achieved consistently in the analysis of protein-bound iodine by means of alkaline incineration. However, with the use of incineration, where many samples may be exposed simultaneously in enclosed spaces such as centrifuges, drying ovens, and muffle furnace...
The fluorescence transient of Chlorella pyrenoidosa, excited by saturating light absorbed mainly by system II, has a dip D between the peak I at 75 msec and the large peak P at 400 msec (the times depend on light intensity). This dip is observed in aerobic cells and in anaerobic cells where it is prominent. In anaerobic cells, the I-D decline is hastened almost equally by absorption of either 7...
We address the problems of whether t-circular-secure encryption can be based on (t − 1)-circular-secure encryption or on semantic (CPA) security, if t = 1. While for t = 1 a folklore construction, based on CPA-secure encryption, can be used to build a 1-circular-secure encryption with the same secret-key and message space, no such constructions are known for the bit-encryption case, which is of...
We give a new, simplified and detailed account of the correspondence between levels of the Sherali–Adams relaxation of graph isomorphism and levels of pebble-game equivalence with counting (higher-dimensional Weisfeiler–Lehman colour refinement). The correspondence between basic colour refinement and fractional isomorphism, due to Tinhofer [22, 23] and Ramana, Scheinerman and Ullman [17], is re...
My thesis aims to contribute towards building autonomous agents that are able to understand their surrounding environment through the use of both audio and visual information. To capture a more complete description of a scene, the fusion of audio and visual information can be advantageous in enhancing the system’s context awareness. The goal of this work is on the characterization of unstructur...
Dans cette note, on présente l’énoncé et les principales idées de la démonstration d’un théorème de convexité réel pour les applications moment à valeurs dans un groupe de Lie. Ce résultat est un analogue quasi-hamiltonien du théorème de O’Shea et Sjamaar dans le cadre hamiltonien usuel. On démontre que l’image par l’application moment du lieu des points fixes d’une involution renversant la 2-f...
THE ATTRITIOUS AND FRACTURE WEAR OF GRINDING WHEELS by Stephen Malkin Submitted to the Department of Mechanical Engineering February 1968, in partial fulfillment of the requirements for the degree of Doctor of Science A detailed investigation is made of the nature and extent-of grinding wheel wear in finish grinding. The wear is broadly classified as either attritious or fracture wear. Attritio...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید