نتایج جستجو برای: stream function

تعداد نتایج: 1264642  

Journal: Desert 2015

Modeling of stream flow–suspended sediment relationship is one of the most studied topics in hydrology due to itsessential application to water resources management. Recently, artificial intelligence has gained much popularity owing toits application in calibrating the nonlinear relationships inherent in the stream flow–suspended sediment relationship. Thisstudy made us of adaptive neuro-fuzzy ...

The recovery of high-quality, valuable end products from cheese whey is a very important industrial process. The aim of this study is to improve the recovered protein content of concentrate stream in cheese whey. The experiments were conducted by using ceramic ultrafiltration (UF) membrane followed by diafiltration (DF) process with a 15kDa molecular weight cut-off (MWCO). The volume concentrat...

Journal: :Journal of Mathematical Analysis and Applications 1997

2012
Alexandru Pîrjan

In this paper, I have researched and developed solutions for optimizing the stream compaction algorithmic function using the Compute Unified Device Architecture (CUDA). The stream compaction is a common parallel primitive, an essential building block for many data processing algorithms, whose optimization improves the performance of a wide class of parallel algorithms useful in data processing....

Journal: :IACR Cryptology ePrint Archive 2005
Magnus Daum

T-functions were introduced by Klimov and Shamir in a series of papers during the last few years. They are of great interest for cryptography as they may provide some new building blocks which can be used to construct efficient and secure schemes, for example block ciphers, stream ciphers or hash functions. In the present paper, we define the narrowness of a T-function and study how this proper...

Journal: :IACR Cryptology ePrint Archive 2015
S. M. Dehnavi A. Mahmoodi Rishakani M. R. Mirzaee Shamsabad

Linear mappings are crucial components of symmetric ciphers. A special type of linear mappings are (0,1)-matrices which have been used in symmetric ciphers such as ARIA, E2 and Camellia as diffusion layers with efficient implementation. Bitwise linear maps are also used in symmetric ciphers such as SHA family of hash functions and HC family of stream ciphers. In this article, we investigate a s...

پایان نامه :دانشگاه تربیت معلم - تهران - دانشکده علوم 1393

in this thesis, structural, electronical, and optical properties of inverse pervskite(ca3pbo) in cubic phase have been investigated.the calculation have been done based on density functional theory and according to generalized gradiant approximate (gga) as correlating potential. in order to calculate the configurations, implementing in the wien2k code have been used from 2013 version. first of ...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه فردوسی مشهد - دانشکده علوم 1377

chapter one is devoted to a moderate discussion on preliminaries, according to our requirements. chapter two which is based on our work in (24) is devoted introducting weighted semigroups (s, w), and studying some famous function spaces on them, especially the relations between go (s, w) and other function speces are invesigated. in fact this chapter is a complement to (32). one of the main fea...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید