نتایج جستجو برای: leakage formula
تعداد نتایج: 122724 فیلتر نتایج به سال:
The present paper investigates the effects of the trapezoidal teeth labyrinth seal on the leakage amount in gas turbines. The influences of increasing the number of teeth from 1 to 6 with step 1 and the tip clearance s=0.5 to 7.5 mm on the leakage flow at different pressure ratios of PR=1.5, 2 and 2.5 are examined, comprehensively. The analysis is performed numerically using a Finite-Volume...
Forward back biasing (FBB) technique is considered as a potential solution for aging compensation in silicon on insulator (SOI) MOSFET. However, traditional SOI devices under FBB would suffer from extra off-state leakage current $(I_{\mathrm{ off}})$ <...
This paper presents a proof of Stirling's formula using Haar wavelets and some properties of Hilbert space, such as Parseval's identity. The present paper shows a connection between Haar wavelets and certain sequences.
A marine oil spill is an environmental pollution incident that generally has the attributes of a high speed, widespread, and long duration. It seriously threatens ecological environment related industries. vital to determine source leakage so it may be stopped hazards can reduced. Oil accidents in sea are located offshore navigation channels. With rapid development remote-sensing techniques, le...
This article presents a wideband $2 \times 12$ -bit direct-digital RF modulator (DDRM) operating in 0.5-to-3-GHz band for 5G transmitters. The proposed digital Cartesian features an advanced IQ-mapping technique to boost power by 3 dB...
This study proposes a chosen-ciphertext side-channel attack against lattice-based key encapsulation mechanism (KEM), the third-round candidate of national institute standards and technology (NIST) standardization project. Unlike existing attacks that target operations, such as inverse NTT message encoding/decoding, we <inline-formula xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="h...
Authenticated encryption schemes in practice have to be robust against adversaries that have access to various types of leakage, for instance decryption leakage on invalid ciphertexts (protocol leakage), or leakage on the underlying primitives (side channel leakage). This work includes several novel contributions: we augment the notion of nonce-base authenticated encryption with the notion of c...
introduction : the aim of this study was to examine and compare the apical sealing ability of ah26, ah plus and ah plus jet using a fluid filtration model. materials and methods : 70 single-rooted teeth were dissected from the cement-enamel junction. canals were prepared with protaper rotary system and manual k files and irrigated with 5.25% naocl and 17% edta. ten teeth were assigned as contro...
abstract the aim of this experiment was the study of freezing tolerance of bellis perennis under controlled conditions and were arranged in a completely randomized design with three replications. plants after sowing and grow in the bed, at the middle of autumn (after hardening in natural conditions), in the 7-8 leaf stage put on the thermogradiant freezer with the 12 freezing temperatures (0,-2...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید