نتایج جستجو برای: Computational method
تعداد نتایج: 1825810 فیلتر نتایج به سال:
implicit and unobserved errors and vulnerabilities issues usually arise in cryptographic protocols and especially in authentication protocols. this may enable an attacker to make serious damages to the desired system, such as having the access to or changing secret documents, interfering in bank transactions, having access to users’ accounts, or may be having the control all over the syste...
the methods which are used to analyze microstrip antennas, are divited into three categories: empirical methods, semi-empirical methods and full-wave analysis. empirical and semi-empirical methods are generally based on some fundamental simplifying assumptions about quality of surface current distribution and substrate thickness. thses simplificatioms cause low accuracy in field evaluation. ful...
abstract: in this thesis, we focus to class of convex optimization problem whose objective function is given as a linear function and a convex function of a linear transformation of the decision variables and whose feasible region is a polytope. we show that there exists an optimal solution to this class of problems on a face of the constraint polytope of feasible region. based on this, we dev...
in this work, the first in the world of science, the focus was on the best angle of connection between carbon nanotubes and the most widely used group of antibiotics. while having the highest stability, in terms of energy, we have the best angle of to connect to the in vivo delivery of intraoperative antibiotic binding with carbon nanotubes not lost. it will never work in the world of science. ...
abstract biometric access control is an automatic system that intelligently provides the access of special actions to predefined individuals. it may use one or more unique features of humans, like fingerprint, iris, gesture, 2d and 3d face images. 2d face image is one of the important features with useful and reliable information for recognition of individuals and systems based on this ...
abstract type-ii fuzzy logic has shown its superiority over traditional fuzzy logic when dealing with uncertainty. type-ii fuzzy logic controllers are however newer and more promising approaches that have been recently applied to various fields due to their significant contribution especially when the noise (as an important instance of uncertainty) emerges. during the design of type- i fuz...
multiple gene silencing is being required to target and tangle metabolic pathways in eukaryotes and researchers have to develop a subtle method for construction of rna interference (rnai) cassettes. although, several vectors have been developed due to different screening and cloning strategies but still some potential limitations remain to be dissolved. here, we worked out a simple cloning stra...
in this article, we propose and analyze a computational method for numerical solution of general two point boundary value problems. method is tested on problems to ensure the computational eciency. we have compared numerical results with results obtained by other method in literature. we conclude that propose method is computationally ecient and eective.
in this paper by using concepts of graph theory, forces method and substructure ing method for analysis of structures, some methods have been introduced for optimal analysis of structures in a large scale, using substructuring method. planar rigid frames assuming linear behavior and small deformations, have been optimal analyzed, by using forces method. thus, a fortran power station computation...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید