نتایج جستجو برای: energy identity
تعداد نتایج: 782142 فیلتر نتایج به سال:
We verify the QED Ward identity for the twoand three -point functions at non-equilibrium in the HTL limit. We use the Keldysh formalism of real time finite temperature field theory. We obtain the same Ward identity for the one loop self-energy and the one loop three-point vertex when both diagrams are constructed from HTL effective propagators and vertices. Supported by BMBF, GSI Darmstadt, DFG...
Radioactivity is the spontaneous emission of energy from unstable atoms. Radioactive sources have radionuclides. Radionuclide undergoes radioactive decay and emits gamma rays and subatomic particles, constituting the ionizing radiation. The gamma ray energy of a radionuclide is used to determine the identity of gamma emitters present in the source. This paper describes the hardware implementati...
We study harmonic maps from degenerating Riemann surfaces with uniformly bounded energy and show the so-called generalized energy identity. We find conditions that are both necessary and sufficient for the compactness in W 1,2 and C modulo bubbles of sequences of such maps. 2000 Mathematics Subject Classification: 58E20
A resistance network is a connected graph (G, c) with edges (and edge weights) determined by the conductance function cxy . The Dirichlet energy form E produces a Hilbert space structure (which we call the energy space HE) on the space of functions of finite energy. In a previous paper, we constructed a reproducing kernel {vx} for this Hilbert space and used it to prove a discrete Gauss-Green i...
The existence of cosmic rays of energies exceeding 10 eV is one of the mysteries of high energy astrophysics. The spectrum and the high energy to which it extends rule out almost all suggested source models. The challenges posed by observations to models for the origin of high energy cosmic rays are reviewed, and the implications of recent new experimental results are discussed. Large area high...
Various online systems offer a lightweight process for creating accounts (e.g., confirming an e-mail address), so that users can easily join them. With minimum effort, however, an attacker can subvert this process, obtain a multitude of fake accounts, and use them for malicious purposes. Puzzle-based solutions have been proposed to limit the spread of fake accounts, by establishing a price (in ...
Using communication services is a common part of everyday life in a personal or business context. Communication services include Internet services like voice services, chat service, and web 2.0 technologies (wikis, blogs, etc), but other usage areas like home energy management and eMobility are will be increasingly tackled. Such communication services typically authenticate participants. For th...
The convergence analysis on the general iterative methods for the symmetric and positive semidefinite problems is presented in this paper. First, formulated are refined necessary and sufficient conditions for the energy norm convergence for iterative methods. Some illustrative examples for the conditions are also provided. The sharp convergence rate identity for the Gauss-Seidel method for the ...
the present study is aimed at assessing the state of national identity among female students of ahwaz islamic azad university and explores the social factors affecting upon it. the statistical society consisted of 8532 students at the three levels of associate diploma undergraduate and master degrees. the research method in this study is a “survey” and collection of data has been carried out by...
Abstract Traditional geometric patterns in architecture and decoration are rooted in the cultural identity of each region and in cities such as Dezful, they display its special cultural and identity characteristics. In Dezful, the geometric patterns of the bricks, known as the khavoon chini are one of the hallmarks of the citychr('39')s cultural identity. Due to the hot climate of Dezful, the ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید