Добірка наукової літератури з теми "Primitives de diffusion"

Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями

Оберіть тип джерела:

Ознайомтеся зі списками актуальних статей, книг, дисертацій, тез та інших наукових джерел на тему "Primitives de diffusion".

Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.

Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.

Статті в журналах з теми "Primitives de diffusion":

1

Ye, Heng-Qing, and David D. Yao. "Diffusion Approximation for Fair Resource Control—Interchange of Limits Under a Moment Condition." Mathematics of Operations Research 46, no. 3 (August 2021): 869–94. http://dx.doi.org/10.1287/moor.2020.1065.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
In a prior study [Ye HQ, Yao DD (2016) Diffusion limit of fair resource control–Stationary and interchange of limits. Math. Oper. Res. 41(4):1161–1207.] focusing on a class of stochastic processing network with fair resource control, we justified the diffusion approximation (in the context of the interchange of limits) provided that the pth moment of the workloads are bounded. To this end, we introduced the so-called bounded workload condition, which requires the workload process be bounded by a free process plus the initial workload. This condition is for a derived process, the workload, as opposed to primitives such as arrival processes and service requirements; as such, it could be difficult to verify. In this paper, we establish the interchange of limits under a moment condition of suitable order on the primitives directly: the required order is [Formula: see text] on the moments of the primitive processes so as to bound the pth moment of the workload. This moment condition is trivial to verify, and indeed automatically holds in networks where the primitives have moments of all orders, for instance, renewal arrivals with phase-type interarrival times and independent and identically distributed phase-type service times.
2

Zhang, Leo Yu, Yushu Zhang, Yuansheng Liu, Anjia Yang, and Guanrong Chen. "Security Analysis of Some Diffusion Mechanisms Used in Chaotic Ciphers." International Journal of Bifurcation and Chaos 27, no. 10 (September 2017): 1750155. http://dx.doi.org/10.1142/s0218127417501553.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
As a variant of the substitution–permutation network, the permutation–diffusion structure has received extensive attention in the field of chaotic cryptography over the last three decades. Because of the high implementation speed and nonlinearity over GF([Formula: see text]), the Galois field of two elements, mixing modulo addition/multiplication and Exclusive OR becomes very popular in various designs to achieve the desired diffusion effect. This paper reports that some diffusion mechanisms based on modulo addition/multiplication and Exclusive OR are not resistant to plaintext attacks as claimed. By cracking several recently proposed chaotic ciphers as examples, it is demonstrated that a good understanding of the strength and weakness of these crypto-primitives is crucial for designing more practical chaotic encryption algorithms in the future.
3

Bollu, Tejapratap, Samuel C. Whitehead, Nikil Prasad, Jackson Walker, Nitin Shyamkumar, Raghav Subramaniam, Brian Kardon, Itai Cohen, and Jesse H. Goldberg. "Automated home cage training of mice in a hold-still center-out reach task." Journal of Neurophysiology 121, no. 2 (February 1, 2019): 500–512. http://dx.doi.org/10.1152/jn.00667.2018.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
An obstacle to understanding neural mechanisms of movement is the complex, distributed nature of the mammalian motor system. Here we present a novel behavioral paradigm for high-throughput dissection of neural circuits underlying mouse forelimb control. Custom touch-sensing joysticks were used to quantify mouse forelimb trajectories with micron-millisecond spatiotemporal resolution. Joysticks were integrated into computer-controlled, rack-mountable home cages, enabling batches of mice to be trained in parallel. Closed loop behavioral analysis enabled online control of reward delivery for automated training. We used this system to show that mice can learn, with no human handling, a direction-specific hold-still center-out reach task in which a mouse first held its right forepaw still before reaching out to learned spatial targets. Stabilogram diffusion analysis of submillimeter-scale micromovements produced during the hold demonstrate that an active control process, akin to upright balance, was implemented to maintain forepaw stability. Trajectory decomposition methods, previously used in primates, were used to segment hundreds of thousands of forelimb trajectories into millions of constituent kinematic primitives. This system enables rapid dissection of neural circuits for controlling motion primitives from which forelimb sequences are built. NEW & NOTEWORTHY A novel joystick design resolves mouse forelimb kinematics with micron-millisecond precision. Home cage training is used to train mice in a hold-still center-out reach task. Analytical methods, previously used in primates, are used to decompose mouse forelimb trajectories into kinematic primitives.
4

Noura, Hassan, Christophe Guyeux, Ali Chehab, Mohammad Mansour, and Raphaël Couturier. "Efficient Chaotic Encryption Scheme with OFB Mode." International Journal of Bifurcation and Chaos 29, no. 05 (May 2019): 1950059. http://dx.doi.org/10.1142/s0218127419500597.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Data confidentiality is mandatory during transmission or when storing sensitive information, especially in financial, medical and military applications. In this context, several cipher solutions and techniques have been presented in the literature. However, existing solutions are mainly based on static structures, where the confusion and diffusion primitives are fixed and independent of the secret key. In this article, we propose a new block cipher scheme that is based on the Substitution Permutation Networks (SPN). The proposed cipher consists of three operations: round-key addition, substitution, and bits’ permutation. Moreover, the substitution operation is applied at the byte level and it is based on a dynamically generated S-box, while the diffusion primitives are applied at the bit level using a dynamically generated P-box. Such key-dependent design ensures better cryptographic strength and system performance when compared, for instance, to DES, 3DES, RC5, and PRESENT schemes, among others, due to its key expansion algorithm. Thorough analysis show that the proposed scheme exhibits a high degree of randomness, key and plain-text sensitivity, and it satisfies the avalanche effect. From a theoretical perspective, we have formulated the Output Feedback mode of operation as a discrete dynamical system on a topological space. We prove that the dynamics of this system (in terms of sensitivity to the initial vector, etc.) are directly related to the strong connectivity of a graph. By doing so, we are able to characterize the conditions under which this mode evolves chaotically, as defined in Devaney’s theory. In particular, such theoretical investigations allow us to link the avalanche effect and key sensitivity of the cipher with the sensitivity of the whole process, that is, with the mode of operation.
5

DORINI, LEYZA BALDO, and NEUCIMAR JERÔNIMO LEITE. "A SELF-DUAL FILTERING TOGGLE OPERATOR FOR SPECKLE NOISE FILTERING." International Journal of Image and Graphics 13, no. 03 (July 2013): 1350015. http://dx.doi.org/10.1142/s0219467813500150.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
In this work, we formalize an alternative way to build self-dual morphological filters that extends some results obtained for morphological centers to a different class of toggle operators. Thus, a wider range of primitives can be considered without causing oscillations, a common problem in toggle mappings. We also show that the combination of the morphological filters generated by using the proposed approach with the well-known anisotropic diffusion technique yields sound results where homogeneous regions are smoothed without degrading edge information. We explore the filtering of speckle noise, an interference pattern that causes a granular aspect in the image, thus limiting its interpretation and making it difficult further image processing tasks. Experimental tests on both synthetic and real-world images show promising results when compared to some well-known methods related to this type of filtering.
6

Richman, Karen. "Peasants, Migrants and the Discovery of African Traditions: Ritual and Social Change In Lowland Haiti." Journal of Religion in Africa 37, no. 3 (2007): 371–97. http://dx.doi.org/10.1163/157006607x211978.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
AbstractObservers of Haitian popular religion have defined Vodou as the authentic African religion of Haitian peasants. In fact, Vodou's congregational forms and practices evolved in and around Port-au-Prince during the twentieth century as the local peasantry was being coerced into wage labor. This paper deals with the incorporation of these ritual innovations in a particular hamlet in Léogane. The agents of ritual diffusion appear to have been not only redundant peasants and neophyte proletarians circulating between the capital city and the nearby plain, but also ethnologists who moved between privileged sites of the Vodou laboratory. The scientific valorization of the heroic slave religion was a centerpiece of the Haitian ethnologists' counter-narrative to European cultural hegemony and North American colonialism. Though their approach to Vodou was part of counter-hegemonic, nationalist discourse, it nonetheless recapitulated a modern view of tradition-bound primitives.
7

Martynova, Inna A. "METHODOLOGICAL SUPPORT FOR THE DIVIDING OF FACTORIAL SETS SUBSTITUTIONS." АВТОМАТИЗАЦИЯ ПРОЦЕССОВ УПРАВЛЕНИЯ 63, no. 1 (2021): 91–97. http://dx.doi.org/10.35752/1991-2927-2021-1-63-91-97.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
The substitution and permutation functions are the main functions of information cryptographic systems that provide diffusion and mixing of information. It is required to analyze these cryptographic primitives while creating new algorithms for data transformation using such functions. A new scale of notation has been proposed for performing such analysis. This is the factorial sets statistical series notation scale. This scale of notation helps to index the factorial sets statistical series elements and establish a one-to-one correspondence between the number and a specific type of substitution. The use of this system provides a way to find new characteristics and properties of substitutions. Since substitutions of the factorial sets form a cyclic group, the operation on elements of this group can be determined. In the general case, the operation used is a multiplication of substitutions, but this paper suggests another operation for group determination. The article presents a capability for dividing the factorial sets substitutions. Two methods for implementing the substitution division operations are proposed such as a method of successive transition and a method of group transition, which are implemented through non commutative operation of multiplying on inverted substitutions.
8

Klisch, J., H. Husstedt, S. Hennings, V. v. Velthoven, A. Pagenstecher, and M. Schumacher. "Supratentorial primitive neuroectodermal tumours: diffusion-weighted MRI." Neuroradiology 42, no. 6 (June 21, 2000): 393–98. http://dx.doi.org/10.1007/s002340000318.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Ruggiero, G. A., Y. Ourmières, E. Cosme, J. Blum, D. Auroux, and J. Verron. "Data assimilation experiments using the diffusive back and forth nudging for the NEMO ocean model." Nonlinear Processes in Geophysics Discussions 1, no. 2 (July 16, 2014): 1073–131. http://dx.doi.org/10.5194/npgd-1-1073-2014.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Abstract. The Diffusive Back and Forth Nudging (DBFN) is an easy-to-implement iterative data assimilation method based on the well-known Nudging method. It consists in a sequence of forward and backward model integrations, within a given time window, both of them using a feedback term to the observations. Therefore in the DBFN, the Nudging asymptotic behavior is translated into an infinite number of iterations within a bounded time domain. In this method, the backward integration is carried out thanks to what is called backward model, which is basically the forward model with reversed time step sign. To maintain numeral stability the diffusion terms also have their sign reversed, giving a diffusive character to the algorithm. In this article the DBFN performance to control a primitive equation ocean model is investigated. In this kind of model non-resolved scales are modeled by diffusion operators which dissipate energy that cascade from large to small scales. Thus, in this article the DBFN approximations and their consequences on the data assimilation system set-up are analyzed. Our main result is that the DBFN may provide results which are comparable to those produced by a 4Dvar implementation with a much simpler implementation and a shorter CPU time for convergence.
10

Ruggiero, G. A., Y. Ourmières, E. Cosme, J. Blum, D. Auroux, and J. Verron. "Data assimilation experiments using diffusive back-and-forth nudging for the NEMO ocean model." Nonlinear Processes in Geophysics 22, no. 2 (April 29, 2015): 233–48. http://dx.doi.org/10.5194/npg-22-233-2015.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Abstract. The diffusive back-and-forth nudging (DBFN) is an easy-to-implement iterative data assimilation method based on the well-known nudging method. It consists of a sequence of forward and backward model integrations, within a given time window, both of them using a feedback term to the observations. Therefore, in the DBFN, the nudging asymptotic behaviour is translated into an infinite number of iterations within a bounded time domain. In this method, the backward integration is carried out thanks to what is called backward model, which is basically the forward model with reversed time step sign. To maintain numeral stability, the diffusion terms also have their sign reversed, giving a diffusive character to the algorithm. In this article the DBFN performance to control a primitive equation ocean model is investigated. In this kind of model non-resolved scales are modelled by diffusion operators which dissipate energy that cascade from large to small scales. Thus, in this article, the DBFN approximations and their consequences for the data assimilation system set-up are analysed. Our main result is that the DBFN may provide results which are comparable to those produced by a 4Dvar implementation with a much simpler implementation and a shorter CPU time for convergence. The conducted sensitivity tests show that the 4Dvar profits of long assimilation windows to propagate surface information downwards, and that for the DBFN, it is worth using short assimilation windows to reduce the impact of diffusion-induced errors. Moreover, the DBFN is less sensitive to the first guess than the 4Dvar.

Дисертації з теми "Primitives de diffusion":

1

Verardi, Virginia. "L'introduction et la diffusion de la technologie du bronze en Syrie-Mésopotamie, (IVe-Ier millénaires): genèse d'un artisanat." Doctoral thesis, Universite Libre de Bruxelles, 2005. http://hdl.handle.net/2013/ULB-DIPOT:oai:dipot.ulb.ac.be:2013/211061.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
L’arrivée d’un nouveau matériau et d’un nouvel artisanat s’accompagne toujours de profondes transformations dans la société qui l’adopte. Notre étude porte sur l’introduction de la technologie du bronze en Syrie-Mésopotamie, sur sa diffusion progressive et sur ses incidences sociales durant toute l’histoire proche-orientale du quatrième au second millénaire. Cet artisanat, consistant, dans sa définition simple, en la mise au point d’un alliage de cuivre et d’étain, est arrivé très tôt dans cette région pourtant dénuée de tout minerai. Les vestiges archéologiques et les données textuelles révèlent la rapidité des transformations qui en découlèrent, touchant la structure sociale et les mentalités et s’accompagnant de nouvelles conceptions dans l’organisation de l’habitat.
Doctorat en philosophie et lettres, Orientation langue et littérature
info:eu-repo/semantics/nonPublished
2

Auvolat, Alex. "Probabilistic methods for collaboration systems in large-scale trustless networks." Thesis, Rennes 1, 2021. http://www.theses.fr/2021REN1S125.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Internet est un outil formidable pour l'éducation, la communication et la collaboration, mais ses usages majoritaires sont actuellement sous monopole de grandes multinationales (GAFAM), ce qui a des conséquences sur le respect des droits humains et des libertés individuelles. Cette thèse propose des outils pour le développement d'applications décentralisées : des applications sur Internet qui fournissent des fonctionnalités similaires aux plateformes des GAFAM, mais de manière décentralisée, afin de rendre le pouvoir aux utilisateur pour décider démocratiquement de leur fonctionnement et de leurs usages. Nous nous concentrons sur les algorithmes épidémiques qui sont particulièrement adaptés dans le cadre de réseaux ouverts à large échelle. Nous proposons des contributions sur la diffusion causale de messages tolérante aux nœuds Byzantins, la diffusion causale épidémique à l'aide d'un stockage d'événements synchronisé par anti-entropie, l'échantillonnage aléatoire de pairs résistants aux attaques Byzantines et aux attaques Sybil, ainsi qu'un nouvel algorithme épidémique de diffusion totalement ordonnée qui tolère les nœuds malicieux et fournit un débit de messages élevé
The Internet is a formidable tool for education, communication and collaboration, however it is currently being monopolized by large corporations (GAFAM), which has consequences for many social issues such as respect of human rights and individual freedoms. This thesis focuses on ways to build decentralized applications: Internet applications that provide levels of functionality similar to those provided by the GAFAM, but that function in a decentralized manner, empowering the users to democratically decide of their functioning and their uses. We focus on epidemic algorithms, which are particularly suited to the context of very large open networks. We make contributions on causal broadcast in presence of Byzantine nodes, epidemic causal broadcast using an event store synchronized with an anti-entropy algorithm, random peer sampling in presence of Byzantine nodes and Sybil attacks, as well as a new epidemic total order broadcast which is tolerant to malicious nodes and provides high throughput message delivery
3

Gaultier, Marjorie. "La diffusion du christianisme dans la cité de Salone : de la persécution de Dioclétien au pontificat de Grégoire le Grand (304-604)." Paris 12, 2006. https://athena.u-pec.fr/primo-explore/search?query=any,exact,990002459420204611&vid=upec.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Capitale de Dalmatie, Salone livre à la persécution de Dioclétien des martyrs, vénérés au IVe siècle, son Église dispose d'édifices culturels et pénètre dans l'"ager". Au Ve siècle, métropole ecclésiastique, elle connaît un essor et s'engage dans les conflits religieux. L'évangélisation touche deux ports de l'"ager", dotés de basiliques et de baptistères. La nomination de l'empereur déchu Glycerius à l'épiscopat de Salone atteste de l'influence de ce siège. Sous le gouvernement ostrogothique, le christianisme pénètre "vici" et "villae resticae" et se propage dans deux nouvelles zones de l'"ager". Les lettres du pape Gélase I révèlent que la Dalmatie est traversée par des hérésies, vecteurs de la lutte d'influence qui oppose la Papauté à Constantinople. Au VIe siècle, l'Église, présente sur tout le territoire, sait utiliser l'opposition entre les deux "partes". Ce jeu d'influence trouve son paroxysme dans le schisme de Maximus, opposé au pape Grégoire le Grand dont la ténacité soumet cet évêque au primat romain
Salone, the capital of Dalmatia, gives over martyrs to Diocletian persecution. Worshipped in the 4th century, the Church has few religious buildings at its disposal. As an ecclesiastical metropolis in the 5th century, it becomes influent and gets involved in religious conflicts. Evangelisation spreads to two ports of "ager", which had basilicas and baptisteres. The nomination of fallen emperor Glycerius at the episcopat of Salone proves how influent this siege was. Under the Ostrogothic government, christianism invades "vici" and "villae rusticae" and spreads to new places. Letters from Pope Gelase reveal that Damatia is threatened by heresy, which was the main factor of the struggle opposing the Pope and Constantinople. In the 6th century, the Church had extended its autority all over the territory and knew how to take benefit of the opposition between the two "partes". This game of influence gets to a climatic point with the schism of Maximus, who was opposed to Pope Gregory the Great, Whose tenacity submits this bishop to roman primate
4

Chen, Qingshan. "Analysis and computation of the inviscid primitive equations and of the corner singularities for some nonlinear diffusive equations." [Bloomington, Ind.] : Indiana University, 2009. http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqdiss&rft_dat=xri:pqdiss:3373499.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Thesis (Ph.D.)--Indiana University, Dept. of Mathematics, 2009.
Title from PDF t.p. (viewed on Jul 8, 2010). Source: Dissertation Abstracts International, Volume: 70-10, Section: B, page: 6247. Adviser: Roger Temam.
5

Simonot, Lionel. "Etude expérimentale et modélisation de la diffusion de la lumière dans une couche de peinture colorée et translucide." Phd thesis, Université Pierre et Marie Curie - Paris VI, 2002. http://tel.archives-ouvertes.fr/tel-00002238.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Les glacis sont des couches picturales translucides volontairement colorées utilisées dès le XVe siècle par les Primitifs Flamands. Constituée de pigments dispersés dans un liant à base d'huile de lin cuite, une couche de glacis donne à un tableau un caractère saisissant car la couleur se construit à l'intérieur du volume constitué par la couche. Pour comprendre cet effet visuel particulier et le décrire quantitativement, nous étudions la répartition angulaire et spectrale de la lumière diffusée par des glacis : expérimentalement, par des mesures goniospectrophotométriques en rétrodiffusion et bidirectionnelles sur des échantillons réalisés par un peintre contemporain ; en proposant une modélisation de la diffusion multiple incohérente de la lumière au sein de la matière ; ceci amène à résoudre l'équation de transfert radiatif (ETR) et à déterminer les propriétés physiques du glacis. Une nouvelle méthode de résolution de l'ETR, la méthode de la fonction auxiliaire, permet d'exprimer les flux lumineux diffusés en fonction des angles d'incidence et d'observation. Contrairement à la première et seule modélisation appliquée aux œuvres d'art existant et datant de 1931, nous obtenons une modélisation bidirectionnelle validée par comparaison avec les résultats expérimentaux. Dans le cas particulier des vernis, couches non diffusantes, une expression analytique du facteur de réflectance est obtenue. Les flux lumineux mesurés et simulés permettent de chiffrer l'apparence visuelle des glacis. Il est alors possible de quantifier la modulation de leur couleur en fonction du nombre de couches superposées ou bien le brillant favorisé par la surface externe lisse des fines couches de glacis. Des applications sont alors envisageables pour la conservation et la restauration des œuvres d'art comme, par exemple, la prédiction de l'aspect visuel d'une restauration.
6

Burda, Jan. "Návrh a měření parametrů akustických difúzních prvků." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2018. http://www.nusl.cz/ntk/nusl-377009.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
This work focuses on the issue of acoustic diffusers. The introductory chapter describes the necessary theory of the sound distribution through enclosed space. Acoustic fields are also described. A description of the different diffusion element types and theirs design methods follows. It focuses mainly on design, which uses pseudo-random mathematical sequences. The aim of the work is to produce several types of acoustic diffusors and to verify their diffusion properties by means of measurements. The work uses the AFMG Reflex to simulate the diffusion properties of the proposed elements. Further, the thesis contains a description of the diffusion properties measurement process by the boundary plane method and the process of evaluating the measured data using the Matlab program.
7

"Crustal Storage and Ascent Rates of the Mt. Shasta Primitive Magnesian Andesite." Master's thesis, 2019. http://hdl.handle.net/2286/R.I.55589.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
abstract: Primitive arc magmas provide a critical glimpse into the geochemical evolution of subduction zone magmas, as they represent the most unadulterated mantle-derived magmas observed in nature in these tectonic environments and are the precursors of the more abundant andesites and dacites typical in arcs. To date, the study of primitive arc magmas has largely focused on their origins at depth, while significantly less is known about pre-eruptive crustal storage and ascent history. This study examines the crustal storage and ascent history of the Mt. Shasta primitive magnesian andesite (PMA), the demonstrated dominant parent magma for the abundant mixed andesites erupted at Mt. Shasta. Petrographic and geochemical observations of the PMA identify a mid-crustal magma mixing event with a less evolved relative of the PMA recorded in multiple populations of reversely zoned clinopyroxene and orthopyroxene phenocrysts. Prior phase equilibrium experiments and thermobarometric calculations as part of this study suggest the PMA experienced storage, mixing with a less evolved version of itself, and subsequent crystallization at 5kbar and 975°C. Modeling of Fe-Mg interdiffusion between the rims and cores of the reversely-zoned clinopyroxene and orthopyroxenes suggest this mixing, crystallization and subsequent ascent occurred within 10 years, or ~2.9 (+6.5 / -2.5) years, prior to eruption. Ascent from 5kbar or ~15 km, with no meaningful shallower storage, suggests minimum crustal transit rates of ~5 km/year. This rate is comparable to only a couple of other similar types of crustal transit rates (and slower than the much faster, syn-eruptive ascent rates measured through methods like olivine-hosted melt embayment volatile gradients and U-series isotope measurements on other arc magmas). The results of this study help to constrain the pre-eruptive history and ascent rates of hydrous primitive arc magmas, illuminating their magmatic processes during ascent. When combined with geophysical signals of magma movement, mixing to eruption timescales such as this have the power to inform volcanic hazard models for monogenetic, cinder cone eruptions in the Southern Cascades.
Dissertation/Thesis
Masters Thesis Geological Sciences 2019
8

Moore, Aerona. "Primitive melt recharge, and magma-mush mixing in the weeks and months preceding the 2005-06 eruption, EPR, 9˚46’N-9˚56’N." Thesis, 2013. http://hdl.handle.net/1828/4698.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
At fast spreading ridges such as the East Pacific Rise (EPR) volcanic eruptions are predicted to occur on a decadal timescale. Due to the limited ability to observe submarine eruptions, little is known about the magmatic processes occurring in the underlying magma chamber leading up to a volcanic event, including differentiation and magma mixing. The recent 2005-06 eruption at 9˚46’N-9˚56’N along the EPR provides a unique opportunity to gain a better understanding of rates of magma transport and magma replenishment associated with a typical eruption. This study examines the geochemistry of phenocrysts from the 2005-06 eruption in order to determine if they are in equilibrium with their host melt, or if magma mixing occurred prior to eruption. A diffusion model is used to model those crystals which are out of equilibrium with their erupted host to determine timescales of magma mixing. The major and trace element contents of plagioclase and olivine phenocrysts provides evidence for melts both more evolved (> 3.5 wt % MgO) and more primitive (< 8.8 wt % MgO) than those found within the host lava (7.7-8.3 wt % MgO; Goss et al., 2010). Glomerocrysts and resorbed crystals in equilibrium with evolved melts (3.5-6.5 wt % MgO) suggests an origin in a roof mush zone, and were disrupted and entrained into their host melt within days of eruption. Modelling of the zoning profiles of phenocrysts suggest the 2005-06 eruption was likely triggered by an influx of hotter, more primitive melt (~ 9.0 wt % MgO) which was injected into the melt lens a few weeks to months prior to the eruption. With decreasing time before eruption, there is an overall increase in the number of crystals with modelled timescales representing mixing events in the magma chamber. This increase in modelled timescales appears to correlate with the increase in seismic activity recorded prior to the eruption (Tolstoy et al., 2006). This suggests magma mixing events within the underlying magma chamber may be linked to seismic activity at fast spreading ridges.
Graduate
0372
0996

Книги з теми "Primitives de diffusion":

1

Gamble, Harry Y. Books and readers in the early church: A history of early Christian texts. New Haven: Yale University Press, 1995.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Gamble, Harry Y. Books and Readers in the Early Church: A History of Early Christian Texts. Yale University Press, 1997.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.

Частини книг з теми "Primitives de diffusion":

1

Junod, Pascal, and Serge Vaudenay. "Perfect Diffusion Primitives for Block Ciphers." In Selected Areas in Cryptography, 84–99. Berlin, Heidelberg: Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-30564-4_6.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Guo, Zhiyuan, Wenling Wu, and Si Gao. "Constructing Lightweight Optimal Diffusion Primitives with Feistel Structure." In Lecture Notes in Computer Science, 352–72. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-31301-6_21.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Carboni, Roberto. "Characterization and Modeling of Spin-Transfer Torque (STT) Magnetic Memory for Computing Applications." In Special Topics in Information Technology, 51–62. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-62476-7_5.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
AbstractWith the ubiquitous diffusion of mobile computing and Internet of Things (IoT), the amount of data exchanged and processed over the internet is increasing every day, demanding secure data communication/storage and new computing primitives. Although computing systems based on microelectronics steadily improved over the past 50 years thanks to the aggressive technological scaling, their improvement is now hindered by excessive power consumption and inherent performance limitation associated to the conventional computer architecture (von Neumann bottleneck). In this scenario, emerging memory technologies are gaining interest thanks to their non-volatility and low power/fast operation. In this chapter, experimental characterization and modeling of spin-transfer torque magnetic memory (STT-MRAM) are presented, with particular focus on cycling endurance and switching variability, which both present a challenge towards STT-based memory applications. Then, the switching variability in STT-MRAM is exploited for hardware security and computing primitives, such as true-random number generator (TRNG) and stochastic spiking neuron for neuromorphic and stochastic computing.
4

Uma, R., and P. Dhavachelvan. "ASIC Primitive Cells in Modified Gated Diffusion Input Technique." In Advances in Intelligent Systems and Computing, 467–74. New Delhi: Springer India, 2013. http://dx.doi.org/10.1007/978-81-322-0740-5_57.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Mathur, Chetan Nanjunda, Karthik Narayan, and K. P. Subbalakshmi. "High Diffusion Cipher: Encryption and Error Correction in a Single Cryptographic Primitive." In RoboCup 2005: Robot Soccer World Cup IX, 309–24. Berlin, Heidelberg: Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11767480_21.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Sudhakar, S., A. Akashwar, M. Ajay Someshwar, T. Dhaneshguru, and M. Prem Kumar. "Improving Security Using Modified S-Box for AES Cryptographic Primitives." In Recent Trends in Intensive Computing. IOS Press, 2021. http://dx.doi.org/10.3233/apc210288.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
The growing network traffic rate in wireless communication demands extended network capacity. Current crypto core methodologies are already reaching the maximum achievable network capacity limits. The combination of AES with other crypto cores and inventing new optimization models have emerged. In this paper, some of the prominent issues related to the existing AES core system, namely, lack of data rate, design complexity, reliability, and discriminative properties. In addition to that, this work also proposes a biometric key generation for AES core that constitutes simpler arithmetic such as substitution, modulo operation, and cyclic shifting for diffusion and confusion metrics which explore cipher transformation level. It is proved that in AES as compared to all other functions S-Box component directly influences the overall system performance both in terms of power consumption overhead, security measures, and path delay, etc.
7

Atkinson, Martin E. "Development of the heart, respiratory, and circulatory systems." In Anatomy for Dental Students. Oxford University Press, 2013. http://dx.doi.org/10.1093/oso/9780199234462.003.0020.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
The development of the circulatory and respiratory systems no longer occupies the time they once used to in dental curricula in the United Kingdom (UK). Apart from the intrinsic curiosity of knowing how two of the major body systems develop, the main reason that they were on the dental curricula was the same as any other aspect of developmental anatomy—the consequences of developmental abnormalities on the planning and execution of dental care. The diagnosis and treatment of developmental heart abnormalities has advanced so rapidly in recent years that people born with such conditions can now be treated so successfully that they can often live symptom-free for the rest of a normal lifespan. The adverse effects of heart defects on the functions of the circulatory and respiratory systems are less likely to be encountered and taken into account during dental treatment; people with problems that do impact on their general health are now most likely to be seen in specialist units. The same does not pertain in developing countries. This brief account is presented to provide an overview of the development of the two systems where knowledge of developmental defects and their consequences on the physiology of the circulatory and respiratory systems is required. The circulatory system must develop to a functional state before any other system in the body. The embryo does not need to grow very much before it reaches such a size that diffusion of nutrients from the surrounding fluids is no longer adequate to fulfil its nutritional requirements. The cardiovascular system must, therefore, be established and begin to function very early on in development. Even while the embryo is in the trilaminar stage, a primitive circulatory system is established that connects the embryo to the maternal circulation through the connecting stalk. The heart begins to develop soon after this as a single tube but an atrium and a ventricle can soon be distinguished. These chambers and the veins and arteries entering and leaving the heart are subsequently divided into two so that the right heart and pulmonary circulation and the left heart and systemic circulation are thus established.
8

"nanoscale iron particles were essentially suspended in solution. Therefore slow transport or diffusion of chlorinated methanes to the settled Aldrich iron surfaces may have caused the slow reaction for the commercial grade iron particles. A major advantage of the nanoscale particles for treatment of CT is the low yield of DCM. Yield of DCM was merely 55% with the nanoscale Fe, compared to 70% with the Aldrich iron. Reductions of CT by the nanoscale iron particles also tend to be more complete with higher yields of methane. For example, yield of methane was 41% for CT reaction with nanoscale iron particles, compared to only 23% with the Aldrich iron. This study demonstrated the potential of the nanoscale metal particles for transformation of CT. Combining the effects of larger surface area (~39 times) and higher surface reactivity (~5.3 times), performance of the nanoscale system versus conventional zero-valent iron barrier is expected to be appreciably (-206 times) higher. However, our knowledge on the underlying reaction mechanisms at the metal-solution interface is still primitive at the best. Important questions need to be investigated include: (1) the exact role of palladium for the dechlorination, (2) optimal amount of surface palladium coverage, (3) effects of naturally occurring oxidants (e.g., oxygen) and reductant (e.g., sulfide) on the long term performance of nanoscale iron particles, (4) cause for the slow DCM dechlorination. Clearly, for this technology to be fully optimized for environmental applications, a better understanding of the fundamental chemical mechanism is essential. REFERENCES 1. Wang, C. B. and Zhang, W. 1997. “Nanoscale Metal Particles for Dechlorination of PCE and PCBs,” Environ. Sci. Technol., 31(7):2154-2156. 2. Wang, C. B. and Zhang, W. 1997. “Catalytic Reduction of Chlorinated hydrocarbons by Pd/Fe, Pt/Fe, and Pd/Zn Bimetals,” 15th Meeting of the North American Catalysis Society, May 18-23, 1997, Chicago. 3. Lien, H and Zhang, W. 1998. “Transformation of Chlorinated Ethylenes in Aqueous Solution Using Nanoscale Bimetallic Particles,” submitted to Journal of Environmental Engineering. 4. Johson, T.L., M.M. Scherer, and P.G. Tratnyek. 1996. “Kinetics of halogenated organic compound degradation by iron metal,” Environ. Sci. Technol., 30(8):2634-2640." In Hazardous and Industrial Waste Proceedings, 30th Mid-Atlantic Conference, 73–94. CRC Press, 2014. http://dx.doi.org/10.1201/9781498709453-28.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.

Тези доповідей конференцій з теми "Primitives de diffusion":

1

"Diffusion Behaviour of Cryptographic Primitives in Feistel Networks." In 2nd International Workshop on Security In Information Systems. SciTePress - Science and and Technology Publications, 2004. http://dx.doi.org/10.5220/0002661300790087.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Jamel, Sapiee Haji, and Mustafa Mat Deris. "Diffusive primitives in THE design of modern cryptographic algorithms." In 2008 International Conference on Computer and Communication Engineering (ICCCE). IEEE, 2008. http://dx.doi.org/10.1109/iccce.2008.4580696.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Rizales, Johnny J. M., Paulo T. T. Esperanc¸a, and Andre´ Belfort Bueno. "Simulation of Flow Around Circular Cylinder Using a Collocation Spectral Method." In ASME 2005 24th International Conference on Offshore Mechanics and Arctic Engineering. ASMEDC, 2005. http://dx.doi.org/10.1115/omae2005-67152.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
The purpose of this paper is to develop a Fourier-Chebyshev collocation spectral method for computing unsteady two-dimensional viscous incompressible flow past a circular cylinder for low Reynolds numbers. The incompressible Navier-Stokes equations (INSE) are formulated in terms of the primitive variables, velocity and pressure. The incompressible Navier-Stokes equations in curvilinear coordinates are spectrally discretized and time integrated by a second-order mixed explicit/implicit time integration scheme. This scheme is a combination of the Crank-Nicolson scheme operating on the diffusive term and Adams-Bashforth scheme acting on the convective term. The projection method is used to split the solution of the INSE to the solution of two decoupled problems: the diffusion-convection equation (Burgers equation) to predict an intermediate velocity field and the Poisson equation for the pressure, it is used to correct the velocity field and satisfy the continuity equation. Finally, the numerical results obtained for the drag and lift coefficients around the circular cylinder are compared with results previously published.
4

Guo, Hongsheng, Gregory J. Smallwood, Cedric Galizzi, and Dany Escudie´. "A Numerical Study on a V-Shaped Laminar Stratified Flame." In ASME 2005 International Mechanical Engineering Congress and Exposition. ASMEDC, 2005. http://dx.doi.org/10.1115/imece2005-79607.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
A V-shaped laminar stratified flame was investigated by numerical simulation. The primitive variable method, in which the fully elliptic governing equations were solved with detailed chemistry and complex thermal and transport properties, was used. The results indicate that in addition to the primary premixed flame, the stratified charge in a combustor causes the formation of a diffusion flame. The diffusion flame is located between the primary premixed flame branches. The fuel is fully decomposed and converted to some intermediate species, like CO and H2, in the primary premixed flame branches. Due to the shortage of oxygen, the formed CO and H2 in the fuel rich region of the premixed flame branch is further transported to the downstream until they meet the oxygen from the fuel lean region. This leads to the formation of the diffusion flame. There is an interaction between the diffusion flame and the primary premixed flame branches. The interaction intensifies the burning speed of the primary premixed flame. Both the heat transfer and the diffusion of hydrogen and some radicals cause the interaction. With the increase of the stratified charge region, the diffusion flame zone is enlarged and the interaction is enhanced.
5

Jevremovic, Tatjana, Mathieu Hursin, Nader Satvat, John Hopkins, Shanjie Xiao, and Godfree Gert. "Performance, Accuracy and Efficiency Evaluation of a Three-Dimensional Whole-Core Neutron Transport Code AGENT." In 14th International Conference on Nuclear Engineering. ASMEDC, 2006. http://dx.doi.org/10.1115/icone14-89561.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
The AGENT (Arbitrary GEometry Neutron Transport) an open-architecture reactor modeling tool is deterministic neutron transport code for two or three-dimensional heterogeneous neutronic design and analysis of the whole reactor cores regardless of geometry types and material configurations. The AGENT neutron transport methodology is applicable to all generations of nuclear power and research reactors. It combines three theories: (1) the theory of R-functions used to generate real three-dimensional whole-cores of square, hexagonal or triangular cross sections, (2) the planar method of characteristics used to solve isotropic neutron transport in non-homogenized 2D) reactor slices, and (3) the one-dimensional diffusion theory used to couple the planar and axial neutron tracks through the transverse leakage and angular mesh-wise flux values. The R-function-geometrical module allows a sequential building of the layers of geometry and automatic submeshing based on the network of domain functions. The simplicity of geometry description and selection of parameters for accurate treatment of neutron propagation is achieved through the Boolean algebraic hierarchically organized simple primitives into complex domains (both being represented with corresponding domain functions). The accuracy is comparable to Monte Carlo codes and is obtained by following neutron propagation through real geometrical domains that does not require homogenization or simplifications. The efficiency is maintained through a set of acceleration techniques introduced at all important calculation levels. The flux solution incorporates power iteration with two different acceleration techniques: Coarse Mesh Rebalancing (CMR) and Coarse Mesh Finite Difference (CMFD). The stand-alone originally developed graphical user interface of the AGENT code design environment allows the user to view and verify input data by displaying the geometry and material distribution. The user can also view the output data such as three-dimensional maps of the energy-dependent mesh-wise scalar flux, reaction rate and power peaking factor. The AGENT code is in a process of an extensive and rigorous testing for various reactor types through the evaluation of its performance (ability to model any reactor geometry type), accuracy (in comparison with Monte Carlo results and other deterministic solutions or experimental data) and efficiency (computational speed that is directly determined by the mathematical and numerical solution to the iterative approach of the flux convergence). This paper outlines main aspects of the theories unified into the AGENT code formalism and demonstrates the code performance, accuracy and efficiency using few representative examples. The AGENT code is a main part of the so called virtual reactor system developed for numerical simulations of research reactors. Few illustrative examples of the web interface are briefly outlined.
6

Marti´nez R., Johnny J., and Paulo T. T. Esperanc¸a. "Numerical Simulation of Flow Around a Circular Cylinder Using a Fourier-Chebyshev Collocation Spectral Method." In ASME 2003 22nd International Conference on Offshore Mechanics and Arctic Engineering. ASMEDC, 2003. http://dx.doi.org/10.1115/omae2003-37241.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Vortex-induced vibrations (VIV) of slender structural elements (marine cables, pipes and risers) are very important aspects to be considered in the design stage of many offshore structures, because the fatigue life of risers installed in deep water are often dominated by VIV effects. Despite the relatively fundamental nature of the problem, a small amount is known about the nature of the fluid-structure interaction. The purpose of this paper is to develop a Fourier-Chebyshev collocation spectral method for computing unsteady two-dimensional viscous incompressible flow past a circular cylinder for moderate Reynolds numbers. The incompressible Navier-Stokes equations (INSE) are formulated in terms of the primitive variables, velocity and pressure. The incompressible Navier-Stokes equations in curvilinear coordinates are spectrally discretized and time integrated by a second-order mixed explicit/implicit time integration scheme. This scheme is a combination of the Crank-Nicolson scheme operating on the diffusive term and Adams-Bashforth scheme acting on the convective term. The projection method is used to split the solution of the INSE to the solution of two decoupled problems: the diffusion-convection equation (Burgers equation) to predict an intermediate velocity field and the Poisson equation for the pressure, it is used to correct the velocity field and satisfy the continuity equation. Finally, the numerical results obtained for the drag and lift coefficients around the circular cylinder are compared with results previously published.
7

Priya N., Shanmuga, and N. Radha. "Design and Implementation of Primitive Cells, Full Adder, Full Subtractor, and Multiplier using Modified Gate Diffusion Input Logic." In 2020 International Conference on Electronics and Sustainable Communication Systems (ICESC). IEEE, 2020. http://dx.doi.org/10.1109/icesc48915.2020.9155913.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.

До бібліографії