Gotowa bibliografia na temat „Symmetry key”

Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych

Wybierz rodzaj źródła:

Zobacz listy aktualnych artykułów, książek, rozpraw, streszczeń i innych źródeł naukowych na temat „Symmetry key”.

Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.

Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.

Artykuły w czasopismach na temat "Symmetry key"

1

Elliott, J. P. "Key to symmetry." Nature 313, no. 6001 (1985): 409. http://dx.doi.org/10.1038/313409b0.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Skinner, Mhairi. "Symmetry is key." Nature Reviews Cancer 9, no. 11 (2009): 769. http://dx.doi.org/10.1038/nrc2757.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

Li, Chunbiao, Jiayu Sun, Tianai Lu, and Tengfei Lei. "Symmetry Evolution in Chaotic System." Symmetry 12, no. 4 (2020): 574. http://dx.doi.org/10.3390/sym12040574.

Pełny tekst źródła
Streszczenie:
A comprehensive exploration of symmetry and conditional symmetry is made from the evolution of symmetry. Unlike other chaotic systems of conditional symmetry, in this work it is derived from the symmetric diffusionless Lorenz system. Transformation from symmetry and asymmetry to conditional symmetry is examined by constant planting and dimension growth, which proves that the offset boosting of some necessary variables is the key factor for reestablishing polarity balance in a dynamical system.
Style APA, Harvard, Vancouver, ISO itp.
4

Zhang, Hongjia, Junwen Huang, Xin Xu, Qiang Fang, and Yifei Shi. "Symmetry-Aware 6D Object Pose Estimation via Multitask Learning." Complexity 2020 (October 21, 2020): 1–7. http://dx.doi.org/10.1155/2020/8820500.

Pełny tekst źródła
Streszczenie:
Although 6D object pose estimation has been intensively explored in the past decades, the performance is still not fully satisfactory, especially when it comes to symmetric objects. In this paper, we study the problem of 6D object pose estimation by leveraging the information of object symmetry. To this end, a network is proposed that predicts 6D object pose and object reflectional symmetry as well as the key points simultaneously via a multitask learning scheme. Consequently, the pose estimation is aware of and regulated by the symmetry axis and the key points of the to-be-estimated objects.
Style APA, Harvard, Vancouver, ISO itp.
5

Senjanović, Goran. "Is left–right symmetry the key?" Modern Physics Letters A 32, no. 04 (2017): 1730004. http://dx.doi.org/10.1142/s021773231730004x.

Pełny tekst źródła
Streszczenie:
In collaboration with Jogesh Pati, Abdus Salam challenged the chiral gauge nature of the Standard Model by paving the road towards the left-right symmetric electro-weak theory. I describe here the logical and historical construction of this theory, by emphasising the pioneering and key role it played for neutrino mass. I show that it is a self-contained and predictive model with the Higgs origin of Majorana neutrino mass, in complete analogy with the SM situation regarding charged fermions.
Style APA, Harvard, Vancouver, ISO itp.
6

Mandal, Satyendra Nath, Subhankar Dutta, and Ritam Sarkar. "Block Based Symmetry Key Visual Cryptography." International Journal of Computer Network and Information Security 4, no. 9 (2012): 10–19. http://dx.doi.org/10.5815/ijcnis.2012.09.02.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
7

PIRANDOLA, STEFANO. "SYMMETRIC COLLECTIVE ATTACKS FOR THE EAVESDROPPING OF SYMMETRIC QUANTUM KEY DISTRIBUTION." International Journal of Quantum Information 06, supp01 (2008): 765–71. http://dx.doi.org/10.1142/s0219749908004080.

Pełny tekst źródła
Streszczenie:
We consider the collective eavesdropping of the BB84 and six-state protocols. Since these protocols are symmetric in the eigenstates of conjugate bases, we consider collective attacks having the same kind of symmetry. We then show how these symmetric collective attacks are sufficiently strong in order to minimize the Devetak–Winter rates. In fact, it is quite easy to construct simple examples able to reach the unconditionally secure key rates of these protocols.
Style APA, Harvard, Vancouver, ISO itp.
8

Sievers, Silvan, Martin Wehrle, Malte Helmert, and Michael Katz. "Strengthening Canonical Pattern Databases with Structural Symmetries." Proceedings of the International Symposium on Combinatorial Search 8, no. 1 (2021): 91–99. http://dx.doi.org/10.1609/socs.v8i1.18429.

Pełny tekst źródła
Streszczenie:
Symmetry-based state space pruning techniques have proved to greatly improve heuristic search based classical planners. Similarly, abstraction heuristics in general and pattern databases in particular are key ingredients of such planners. However, only little work has dealt with how the abstraction heuristics behave under symmetries. In this work, we investigate the symmetry properties of the popular canonical pattern databases heuristic. Exploiting structural symmetries, we strengthen the canonical pattern databases by adding symmetric pattern databases, making the resulting heuristic invaria
Style APA, Harvard, Vancouver, ISO itp.
9

Li, Weijun, Guoliang Yang, Zhangyou Xiong, Xiaojuan Zhu, and Xinyu Ma. "A Traffic Flow Prediction Model Based on Dynamic Graph Convolution and Adaptive Spatial Feature Extraction." Symmetry 17, no. 7 (2025): 1007. https://doi.org/10.3390/sym17071007.

Pełny tekst źródła
Streszczenie:
The inherent symmetry in traffic flow patterns plays a fundamental role in urban transportation systems. This study proposes a Dynamic Graph Convolutional Recurrent Adaptive Network (DGCRAN) for traffic flow prediction, leveraging symmetry principles in spatial–temporal dependencies. Unlike conventional models relying on static graph structures that often break real-world symmetry relationships, our approach introduces two key innovations respecting the dynamic symmetry of traffic networks: First, a Dynamic Graph Convolutional Recurrent Network (DGCRN) is proposed that preserves and adapts to
Style APA, Harvard, Vancouver, ISO itp.
10

Zheng Mingliang. "Disturbance Decoupling for a Class of Nonlinear Control Systems Based on Lie Symmetry Method." Journal of Electrical Systems 20, no. 3 (2024): 3650–61. https://doi.org/10.52783/jes.5252.

Pełny tekst źródła
Streszczenie:
To fully explore the inherent structural properties of symmetric nonlinear control systems, this paper introduces the Lie symmetry method to the disturbance decoupling problem for a class of SISO nonlinear control systems. Firstly, the state-space equations and the disturbance decoupling model for a class of SISO nonlinear control systems are defined; Secondly, the key technologies and algorithm approaches of Lie symmetry theory for differential equations are introduced, and the conditions and the properties of Lie symmetry for nonlinear control systems under group action are given in detail;
Style APA, Harvard, Vancouver, ISO itp.
Więcej źródeł

Rozprawy doktorskie na temat "Symmetry key"

1

Reyes, Elisabeth. "Evolutionary history of floral key innovations in angiosperms." Thesis, Université Paris-Saclay (ComUE), 2016. http://www.theses.fr/2016SACLS489/document.

Pełny tekst źródła
Streszczenie:
Les Angiospermes forment un clade connu pour sa grande diversité d’espèces et une répartition inégale de cette diversité en son sein. Ce travail se concentre sur la reconstruction d’états ancestraux de caractères floraux sur les phylogénies dans le but d’étudier leur impact sur la diversification. En premier lieu, nous nous sommes focalisés sur deux innovations-clés potentielles chez les Proteaceae, la symétrie bilatérale du périanthe et la présence dans les hotspots à climat méditerranéen. L’utilisation sur une phylogénie de modèles de diversification dépendants des états de caractère a permi
Style APA, Harvard, Vancouver, ISO itp.
2

Azam, Junaid. "Symmetric Key Management for Mobile Financial Applications : A Key Hierarchy Approach." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-143634.

Pełny tekst źródła
Streszczenie:
In recent times the usage of smart phones has significantly increased. Businesses are transforming to make more out of smart phones. As a consequence, there is an increasing demand to have more and more mobile applications. Among other areas, mobile applications are also being used to make financial transactions. Applications used for financial transactions need to be more reliable and have end-to-end security. To implement security we heavily depend on cryptography and the heart of cryptography is the keys which are used in cryptographic processes (encryption/decryption). Therefore, it is ess
Style APA, Harvard, Vancouver, ISO itp.
3

Talluri, Sai Raghu. "Towards Designing Energy Efficient Symmetric Key Protocols." UNF Digital Commons, 2018. https://digitalcommons.unf.edu/etd/853.

Pełny tekst źródła
Streszczenie:
Energy consumption by various modern symmetric key encryption protocols (DES, 3-DES, AES and, Blowfish) is studied from an algorithmic perspective. The work is directed towards redesigning or modifying the underlying algorithms for these protocols to make them consume less energy than they currently do. This research takes the approach of reducing energy consumption by parallelizing the consecutive memory accesses of symmetric key encryption algorithms. To achieve parallelization, an existing energy complexity model is applied to symmetric key encryption algorithms. Inspired by the popular DDR
Style APA, Harvard, Vancouver, ISO itp.
4

Čanda, Valér. "Scalable symmetric block ciphers based on group bases." [S.l.] : [s.n.], 2001. http://deposit.ddb.de/cgi-bin/dokserv?idn=962789755.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

Ghosh, Debeshi D. "Audio Watermarking Using DWT Algorithm and Symmetric Key Cryptography." Thesis, California State University, Long Beach, 2017. http://pqdtopen.proquest.com/#viewpdf?dispub=10263604.

Pełny tekst źródła
Streszczenie:
<p> Watermarking is the process of embedding information into a carrier signal such as audio, video, and images. It is widely used to protect proprietary information in the signal to prevent information theft or duplicity. In this project, an audio watermarking system with dual layer security has been implemented. The entire system is divided into two sections that are independent, but have been combined, to make a unique system that provides increased levels of robustness. The first part of the project involves encrypting an embedded image (watermark) using the XOR method of symmetric key cry
Style APA, Harvard, Vancouver, ISO itp.
6

Kamineni, Surya Bharat. "Experimental Analysis on the Feasibility of Voice Based Symmetric Key Generation for Embedded Devices." Scholar Commons, 2017. http://scholarcommons.usf.edu/etd/6874.

Pełny tekst źródła
Streszczenie:
In this thesis, we present results of an experimental study in order to generate a secure cryptographic key from the user’s voice which is to be shared between two mobile devices. We identified two security threats related to this problem, discussed the challenges to design the key generation/sharing mechanism, and proposed a new protocol based on bloom filters that overcomes the two main attacks by the intruder. One is when the attacker places its device in the close vicinity of the location where the user attempts to generate/share the key in order to derive the key from eavesdropping on com
Style APA, Harvard, Vancouver, ISO itp.
7

May, Lauren Jeanette. "Design, analysis and implementation of symmetric block ciphers." Thesis, Queensland University of Technology, 2002.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
8

Kasparek, Alexander J. "Secure Key Agreement for Wearable Medical Devices." Digital WPI, 2019. https://digitalcommons.wpi.edu/etd-theses/1333.

Pełny tekst źródła
Streszczenie:
In this thesis we explore if a proposed random binary sequence generation algorithm can be combined with a separately proposed symmetric key agreement protocol to provide usable security for communications in Wireless Body Area Networks (WBAN). Other previous works in this area fall short by only considering key generation between two of the same signals or allowing for key generation between two different types of signals but with the cost of a significant signal collection time requirement. We hoped to advance this area of research by making secure key generation more efficient with less sig
Style APA, Harvard, Vancouver, ISO itp.
9

Henricksen, Matthew. "Design, Implementation and Cryptanalysis of Modern Symmetric Ciphers." Thesis, Queensland University of Technology, 2005. https://eprints.qut.edu.au/16055/1/Matt_Henricksen_Thesis.pdf.

Pełny tekst źródła
Streszczenie:
The main objective of this thesis is to examine the trade-offs between security and efficiency within symmetric ciphers. This includes the influence that block ciphers have on the new generation of word-based stream ciphers. By incorporating block-cipher like components into their designs, word-based stream ciphers have experienced hundreds-fold improvement in speed over bit-based stream ciphers, without any observable security degradation. The thesis also emphasizes the importance of keying issues in block and stream ciphers, showing that by reusing components of the principal cipher alg
Style APA, Harvard, Vancouver, ISO itp.
10

Henricksen, Matthew. "Design, Implementation and Cryptanalysis of Modern Symmetric Ciphers." Queensland University of Technology, 2005. http://eprints.qut.edu.au/16055/.

Pełny tekst źródła
Streszczenie:
The main objective of this thesis is to examine the trade-offs between security and efficiency within symmetric ciphers. This includes the influence that block ciphers have on the new generation of word-based stream ciphers. By incorporating block-cipher like components into their designs, word-based stream ciphers have experienced hundreds-fold improvement in speed over bit-based stream ciphers, without any observable security degradation. The thesis also emphasizes the importance of keying issues in block and stream ciphers, showing that by reusing components of the principal cipher alg
Style APA, Harvard, Vancouver, ISO itp.
Więcej źródeł

Książki na temat "Symmetry key"

1

I, MacGregor William, and National Institute of Standards and Technology (U.S.), eds. Symmetric key injection onto smart cards. U.S. Dept. of Commerce, National Institute of Standards and Technology, 2008.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Baksi, Anubhab. Classical and Physical Security of Symmetric Key Cryptographic Algorithms. Springer Singapore, 2022. http://dx.doi.org/10.1007/978-981-16-6522-6.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

Workshop on Japan Linear Collider (JLC) (4th 1993 KEK). Proceedings of the Fourth Workshop on Japan Linear Collider (JLC): KEK, March 22-23, 1993. Edited by Kurihara Y and Kō-enerugī Butsurigaku Kenkyūjo (Japan). National Laboratory for High Energy Physics, 1994.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
4

International Symposium on Surface and Interface: Properties of Different Symmetry Crossing (2000 Nagoya-shi, Japan). ISSI PDSC-2000: International Symposium on Surface and Interface: Properties of Different Symmetry Crossing 2000, Aichi-ken Sangyo Boueki-kan, Nagoya, Japan, 17-20 October 2000. North-Holland, 2001.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

International Symposium on Surface and Interface: Properties of Different Symmetry Crossing (2000 Nagoya-shi, Japan). ISSI PDSC-2000: International Symposium on Surface and Interface: Properties of Different Symmetry Crossing 2000, Aichi-ken Sangyo Boueki-kan, Nagoya, Japan, 17-20 October 2000. North-Holland, 2001.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
6

Sarkar, Rumu. A Fearful Symmetry. Praeger, 2010. http://dx.doi.org/10.5040/9798216968054.

Pełny tekst źródła
Streszczenie:
This title provides a new and original framework for analysis of global terrorism, with a view to understanding and resolving Islamic-based, fundamentalist jihadism. InA Fearful Symmetry: The New Soldier in the Age of Asymmetric ConflictProfessor Rumu Sarkar deploys a new set of analytical techniques to frame the phenomenon of global terrorism in a way that is both illuminating and fruitful in its practical applications for NATO, UN, and AU forces. With innovative conceptual tools developed in her essay, "Une Symétrie de la Peur," which was the Prix Fondation Saint-Cyr 2007 essay award winner,
Style APA, Harvard, Vancouver, ISO itp.
7

Moore, J. Key Curriculum Maths. KCP Publications Ltd., 1998.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
8

Moore, J. Key Curriculum Maths. KCP Publications Ltd., 1998.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
9

Moore, J. Key Curriculum Maths. KCP Publications Ltd., 1998.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
10

Moore, J. Key Curriculum Maths. KCP Publications Ltd., 1998.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
Więcej źródeł

Części książek na temat "Symmetry key"

1

Kim, Chang Boo, Young Chul Ahn, Bo Yeon Kim, Chong Du Cho, and Hyeon Gyu Beom. "Finite Element Analysis of Blower Impeller Using Cyclic Symmetry." In Key Engineering Materials. Trans Tech Publications Ltd., 2007. http://dx.doi.org/10.4028/0-87849-456-1.1082.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Hong, Kyung Min, Young June Kang, Nak Kyu Park, and Weon Jae Ryu. "A Study on the Vibration Characteristics of Symmetry and Asymmetry Laminated Composite Materials by Using ESPI." In Key Engineering Materials. Trans Tech Publications Ltd., 2007. http://dx.doi.org/10.4028/0-87849-456-1.2366.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

Li, Yujie, Benying Tan, Shuxue Ding, Christian Desrosiers, and Ahmad Chaddad. "Symmetry Structured Analysis Sparse Coding for Key Frame Extraction." In Machine Learning for Cyber Security. Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-20096-0_43.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
4

Jona-Lasinio, Giovanni. "Spontaneous Symmetry Breaking in Particle Physics." In Springer Proceedings in Physics. Springer International Publishing, 2023. http://dx.doi.org/10.1007/978-3-031-23042-4_17.

Pełny tekst źródła
Streszczenie:
AbstractI will review the appearance of spontaneous symmetry breaking (SSB) in particle physics at the end of the fifties and beginning of the sixties of the XXth century. I will recall Heisenberg non-linear spinor theory and the genesis of the first model (NJL) of fermion mass generation developed in collaboration with Yoichiro Nambu, based on the idea of spontaneous symmetry breaking. Both the non-linear spinor theory and the NJL model are invariant under a chiral transformation ($$\gamma _5$$ γ 5 —invariance) which was introduced by Bruno Touschek in 1957 and named by Heisenberg the Tousche
Style APA, Harvard, Vancouver, ISO itp.
5

Vishio, Anton. "16. A Myth of Recurrence in Iannis Xenakis’s La Légende d’Eer." In Meta-Xenakis. Open Book Publishers, 2024. http://dx.doi.org/10.11647/obp.0390.18.

Pełny tekst źródła
Streszczenie:
Xenakis’s La Légende d’Eer has received much analytical attention, detailing the life stages of its cosmic soundworld: its origin, flourishing, and eventual disintegration. Many analyses have suggested a kind of symmetry between the beginning and ending, as if the soundworld has returned to its initial state. In contrast, in this chapter I argue that the symmetry and any corresponding ideas about closure are ultimately illusory, that the intimations of the opening sounds in the closing minutes in fact highlight the tragic impossibility of ‘recurrence’. The work enacts this theme on a smaller s
Style APA, Harvard, Vancouver, ISO itp.
6

Sergeev, Alexander, Mikhail Sergeev, Nikolaj Balonin, and Anton Vostrikov. "Symmetry Indices as a Key to Finding Matrices of Cyclic Structure for Noise-Immune Coding." In Intelligent Decision Technologies. Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-5925-9_19.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
7

Delfs, Hans, and Helmut Knebl. "Symmetric-Key Encryption." In Information Security and Cryptography. Springer Berlin Heidelberg, 2002. http://dx.doi.org/10.1007/978-3-642-87126-9_2.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
8

Delfs, Hans, and Helmut Knebl. "Symmetric-Key Encryption." In Information Security and Cryptography. Springer Berlin Heidelberg, 2007. http://dx.doi.org/10.1007/3-540-49244-5_2.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
9

Delfs, Hans, and Helmut Knebl. "Symmetric-Key Cryptography." In Information Security and Cryptography. Springer Berlin Heidelberg, 2015. http://dx.doi.org/10.1007/978-3-662-47974-2_2.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
10

Sniatala, Pawel, S. S. Iyengar, and Sanjeev Kaushik Ramani. "Symmetric Key Cryptography." In Evolution of Smart Sensing Ecosystems with Tamper Evident Security. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-77764-7_7.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.

Streszczenia konferencji na temat "Symmetry key"

1

Dai, Linjie, and Neil C. Greenham. "Nano Tweaks to Ultrafast Non-Equilibrium Dynamics." In Frontiers in Optics. Optica Publishing Group, 2024. https://doi.org/10.1364/fio.2024.jtu4a.69.

Pełny tekst źródła
Streszczenie:
Understanding and control of ultrafast non-equilibrium processes in semiconductors are key to leveraging quantum states. Here, we demonstrate the manipulation of interactions between carriers, phonons, and spins using quantum confinement and symmetry breaking through nanomorphology.
Style APA, Harvard, Vancouver, ISO itp.
2

Lin, Jie, Hoi-Kwong Lo, Jacob Johannsson, Mattia Montagna, and Manfred von Willich. "Distributed Symmetric Key Establishment: a Scalable Quantum-Safe Key Distribution Protocol." In 2024 IEEE 49th Conference on Local Computer Networks (LCN). IEEE, 2024. http://dx.doi.org/10.1109/lcn60385.2024.10639637.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

Bange, S., A. Jäckle, S. König, et al. "MEMS Gyro Compassing: Is Symmetry the Key?" In 2023 DGON Inertial Sensors and Systems (ISS). IEEE, 2023. http://dx.doi.org/10.1109/iss58390.2023.10361927.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
4

Han, Yang, Ming Gao, Ping-xing Chen, and Cheng-zu Li. "Novel Robust Quantum Key Distribution Protocol with Symmetry." In 2008 International Conference on Computer Science and Information Technology (ICCSIT). IEEE, 2008. http://dx.doi.org/10.1109/iccsit.2008.129.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

TONEV, D., G. DE ANGELIS, A. GADEA, et al. "TRANSITION PROBABILITIES: A KEY TO PROVE THE X(5) SYMMETRY." In Proceedings of the 8th International Spring Seminar on Nuclear Physics. WORLD SCIENTIFIC, 2005. http://dx.doi.org/10.1142/9789812702265_0036.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
6

Tabak, Iris. "Key Components in the "Teacher as Partner": What Makes Symmetry in Teacher-Student Interactions Work?" In 2020 AERA Annual Meeting. AERA, 2020. http://dx.doi.org/10.3102/1583314.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
7

Rodriguez, M., and N. W. Mureithi. "Cylinder Wake Dynamics in the Presence of Stream-Wise Harmonic Forcing." In ASME 2006 Pressure Vessels and Piping/ICPVT-11 Conference. ASMEDC, 2006. http://dx.doi.org/10.1115/pvp2006-icpvt-11-93847.

Pełny tekst źródła
Streszczenie:
The vortex wake flow dynamics downstream of a cylinder undergoing streamwise harmonic (fe/fs=1) forced oscillations has been investigated numerically using a CFD code for Re=1000. The steady-state of the wake flow has been analysed considering the amplitude of oscillations as a perturbation parameter. The resulting dynamics of the fluid lift and drag forces acting on the cylinder have been linked to the different vortex wake modes observed downstream of the cylinder. Forced oscillations lead to periodic, quasi-periodic and chaotic responses depending on the amplitude of oscillation of the cyli
Style APA, Harvard, Vancouver, ISO itp.
8

Stanishevskiy, YaroslaV. "THE SYMMETRY IN THE SYSTEMS OF KEY-RELATIONSHIP AND THE PROBLEM OF REVERSIBILITY OF THE RELATIONS BETWEEN THE TONALITIES." In SGEM 2014 Scientific SubConference on ARTS, PERFORMING ARTS, ARCHITECTURE AND DESIGN. Stef92 Technology, 2014. http://dx.doi.org/10.5593/sgemsocial2014/b41/s12.011.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
9

Sabo, Anica. "Understanding the Phenomenon of Symmetry in a Musical Work (Possible Aspects of Analytical Application)." In Iskošeni ugao Dragutina Gostuškog. Muzikološki institut SANU Beograd, 2024. https://doi.org/10.46793/dgost23.119s.

Pełny tekst źródła
Streszczenie:
Dragutin Gostuški’s monograph Time of Art – A Contribution to the Foundation of a General Science of Forms was exceptionally important for the development of musicological scientific thought in Serbia. It mapped out the developmental paths of the sciences on arts in different ways and established some of the key principles necessary for understanding the nature of the sciences on art. Unlike the first part of the book, which examines stylistic-historical issues related to art, which is often written about and discussed in our musicological literature, the second part of the study, which consid
Style APA, Harvard, Vancouver, ISO itp.
10

Li, Zhi, Jie Lin, Danchen Zhou, Bo Zhang, and Hai Li. "Local Symmetry Based Hint Extraction of B-Rep Model for Machining Feature Recognition." In ASME 2018 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference. American Society of Mechanical Engineers, 2018. http://dx.doi.org/10.1115/detc2018-85509.

Pełny tekst źródła
Streszczenie:
Machining feature recognition is a key technology in design for manufacturing, inter-operation of neutral format solid models, and reuse of design models in down-streaming applications. Although many approaches have been proposed, the detection and processing of intersection features are still challenging. In this paper, we studied the local property of B-rep model and usage in intersection feature detection. To support hint based reasoning and processing, we proposed a symmetry property definition with relation to edges of solid models. This symmetry property is based on conventional edge con
Style APA, Harvard, Vancouver, ISO itp.

Raporty organizacyjne na temat "Symmetry key"

1

Hoyer, P., M. Pei, and S. Machani. Portable Symmetric Key Container (PSKC). RFC Editor, 2010. http://dx.doi.org/10.17487/rfc6030.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Turner, S. CMS Symmetric Key Management and Distribution. RFC Editor, 2008. http://dx.doi.org/10.17487/rfc5275.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

Doherty, A., M. Pei, S. Machani, and M. Nystrom. Dynamic Symmetric Key Provisioning Protocol (DSKPP). RFC Editor, 2010. http://dx.doi.org/10.17487/rfc6063.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
4

Cooper, David A., and William I. MacGregor. Symmetric key injection onto smart cards. National Institute of Standards and Technology, 2008. http://dx.doi.org/10.6028/nist.ir.7539.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

Turner, S., and R. Housley. Cryptographic Message Syntax (CMS) Symmetric Key Package Content Type. RFC Editor, 2010. http://dx.doi.org/10.17487/rfc6031.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
6

Smyshlyaev, S., ed. Re-keying Mechanisms for Symmetric Keys. RFC Editor, 2019. http://dx.doi.org/10.17487/rfc8645.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
7

Orman, H., and P. Hoffman. Determining Strengths For Public Keys Used For Exchanging Symmetric Keys. RFC Editor, 2004. http://dx.doi.org/10.17487/rfc3766.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
8

Housley, R., T. Polk, S. Hartman, and D. Zhang. Database of Long-Lived Symmetric Cryptographic Keys. RFC Editor, 2014. http://dx.doi.org/10.17487/rfc7210.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
9

Turner, S. Algorithms for Cryptographic Message Syntax (CMS) Protection of Symmetric Key Package Content Types. RFC Editor, 2011. http://dx.doi.org/10.17487/rfc6160.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
10

Kempf, J., and R. Koodli. Distributing a Symmetric Fast Mobile IPv6 (FMIPv6) Handover Key Using SEcure Neighbor Discovery (SEND). RFC Editor, 2008. http://dx.doi.org/10.17487/rfc5269.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
Oferujemy zniżki na wszystkie plany premium dla autorów, których prace zostały uwzględnione w tematycznych zestawieniach literatury. Skontaktuj się z nami, aby uzyskać unikalny kod promocyjny!