نتایج جستجو برای: Algebraic generation
تعداد نتایج: 411247 فیلتر نتایج به سال:
in this paper, let $l$ be a completeresiduated lattice, and let {bf set} denote the category of setsand mappings, $lf$-{bf pos} denote the category of $lf$-posets and$lf$-monotone mappings, and $lf$-{bf cslat}$(sqcup)$, $lf$-{bfcslat}$(sqcap)$ denote the category of $lf$-completelattices and $lf$-join-preserving mappings and the category of$lf$-complete lattices and $lf$-meet-preserving mapping...
Tok tekutiny ostro lomeným potrubím v tvare V In this paper we study a viscous fluid flow over a V-shaped body for a range of Reynold's number from Re = 5 up to Re = 500. We solved the unsteady Naveir-stokes equations in the stream function vorticity formulation. The irregular physical domain is transformed into a rectangular shape using the elliptic grid generation. We applied the Finite difer...
A numerical method for solving linear integral equations of the second kind is formulated. Based on a special representation of vector forms of triangular functions and the related operational matrix of integration, the integral equation reduces to a linear system of algebraic equations. Generation of this system needs no integration, so all calculations can easily be implemented. Numerical res...
Methods are needed to help using formal speciications in a practical way. We herein present a method for the development of mixed systems, i.e. systems with both a static and a dynamic part. Our method helps the speciier providing means to structure the system in terms of communicating subcomponents and to give the sequential components using a semi-automatic concurrent automata generation with...
A New Method of Constructing a Lattice Basis and Its Applications to Cryptanalyse Short Exponent RSA
We provide a new method of constructing an optimal lattice. Applying our method to the cryptanalysis of the short exponent RSA, we obtain our results which extend Boneh and Durfee’s work. Our attack methods are based on a generalization to multivariate modular polynomial equation. The results illustrate the fact that one should be careful when using RSA key generation process with special param...
let $k$ be a field of characteristic$p>0$, $k[[x]]$, the ring of formal power series over $ k$,$k((x))$, the quotient field of $ k[[x]]$, and $ k(x)$ the fieldof rational functions over $k$. we shall give somecharacterizations of an algebraic function $fin k((x))$ over $k$.let $l$ be a field of characteristic zero. the power series $finl[[x]]$ is called differentially algebraic, if it satisfies...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید