Computational Fluid Dynamics
The Reynolds number formula in the upstream pipe. A computation methodic of the expansion flow with the convergence threshold for all equations. Velocity vector visualization. The function that calculates the shear stress in cylindrical coordinates.
Подобные документы
Анализ особенности использования программного компонента Solidworks Flow Simulation, на примере газодинамического расчета участка трубопровода с установленной диафрагмой. Получение картины распределения давления по длине трубы с помощью программы.
лабораторная работа, добавлен 12.01.2018Features of the design method of classification of text and graphic image area. Building descriptive functions that characterize the sizes of the objects in the image, which can be used for learning and classification using support vector machine.
статья, добавлен 23.02.2016One of the basic primitives in cryptography and of computer science is a pseudo-random generator. The number of important applications, including the construction of a private provably secure key cryptosystem. The construct a pseudo-random generator.
статья, добавлен 15.09.2012Research entities of the software defined networking which is currently one of the most promising technologies in mobile backhaul networks based on the open flow protocol. Characteristic apply Mininet software to verify the open flow protocol messages.
статья, добавлен 29.07.2016Analysis of the mobile banking information system based on biometric authentication. A function is proposed that ensures the closure of biometric template data in information networks. Estimation of the number of customer requests to the payment system.
статья, добавлен 29.09.2016Data flow diagrams as a hierarchy of functional processes related data flows. Familiarity with the main components of a data flow diagram: external entities, systems and subsystems, processes. Analysis of the structure of building hierarchy DFD.
статья, добавлен 25.03.2019Определение основных возможностей языка программирования высокого уровня, предназначенного для программирования в гибридной модели вычислений data-control flow – языка DCF. Анализ языка DCF как расширения языка последовательного программирования Си.
статья, добавлен 28.10.2018Support Vector Machine (SVM). Optimization problem (mainly Quadratic Programming). Interior Point Method. Mainstream methods to solve Quadratic Programming problem. Incomplete Cholesky factorization and Kronecker factorization. Reform SVM training.
статья, добавлен 30.08.2016Diagrammatic: state transition networks, JSD diagrams, flow charts. Textual: formal grammars, production rules, CSP. Graphical notations, state-transition and Petri nets, state charts flow charts. The procedure for the use state charts in UML, STN.
презентация, добавлен 28.12.2013Understanding program slicing as a technique for automatically decomposing programs by analyzing its control and data flow. Control flow analysis of binary executables and its problems. Interprocedural slicing using SDG and experimental results.
статья, добавлен 11.10.2014A proposed public key distribution protocol, which is based on diffie-hellman problem is a two-pass protocol and has many of desirable secrity; the protocol is an extension diffie-hellman key exchange using random numbers and establishes a shared key K.
курс лекций, добавлен 08.03.2014The algorithm and program in MAPLE for the solution ordinary differential equations of IV order in the form of generalized power series. Some examples of the solution differential equations IV order. The singular regular points of differential equation.
статья, добавлен 01.02.2019Особенности процесса выбора системы автоматизации для предприятия. Основные продукты Microsoft, используемые для обеспечения потребностей предприятий различный отраслей. Функциональные особенности и специфика применения системы Microsoft Dynamics AX.
статья, добавлен 10.05.2016Tools for Security and Insecurity. Unbiasing a Biased Coin. Combining Weak Sources of Entropy. Pseudorandom Number Generators. Random Permutation Generation. Sound Approach to Random Number Generation and Use. Computationally Secure Information Stealing.
книга, добавлен 08.03.2014Theory of condensation growth of aerosol particles under saturation conditions. Mathematical description of heat and mass transfer processes. The structure of mathematical models and the algorithm of pollution dynamics modeling in "clean rooms".
статья, добавлен 26.06.2016Жизненный цикл программного проекта. Вопросы практического применения метода Early Function Points на примере проектирования мобильного приложения. Расчет сроков создания программного проекта и количества участников, необходимых для его разработки.
статья, добавлен 28.07.2020Implementing two-party computation efficiently with security against malicious adversaries. Two generic constructions of probabilistic cryptosystems and their applications. Cramer-shoup satisfies a stronger plaintext awareness under a weaker assumption.
книга, добавлен 08.03.2014Hereditary Information and Protein Biosynthesis. Gel Electrophoresis and Direct Sequencing. Generalized Sux Trees and the Substring Problem. Ecient Computation of Overlaps. Denition and Scoring of Multiple Alignments. The FASTA and BLAST Heuristic.
учебное пособие, добавлен 25.11.2013Faster explicit formulas for computing pairings over ordinary curves. Secure authentication from a weak key, without leaking information. Towards a game theoretic view of secure computation. Concurrent composition in the bounded quantum storage model.
книга, добавлен 08.03.2014A new general mathematical problem, suitable for public-key cryptosystems, is proposed: morphism computation in a category of Abelian groups. The problem seems to be hard for solving with a quantum computer. A demonstrative example of encryption.
статья, добавлен 15.09.2012Signature schemes and anonymous credentials from bilinear maps. Asymptotically optimal communication for torus-based cryptography. Paradigm of hybrid encryption scheme. Pseudo-signatures, broadcast, and multi-party computation from correlated randomness.
книга, добавлен 08.03.2014Resistance of randomized projective coordinates against power analysis. Energy-efficient software implementation of long integer modular arithmetic. Special hardware sieving device for factoring 1024-bit integers. Hardware attacks and countermeasures.
курс лекций, добавлен 08.03.2014Course determination algorithm that proposed based on the correlation of pairs of images. The errors of course determination that are investigated for different threshold values of normalized correlation coefficient. Components of course errors.
статья, добавлен 26.10.2016The history and development of computational technologies from physical switches to the microprocessor. Principles batch processing of computer data. Browse famous innovators in the field of interactive paradigm shifts and their main achievements.
презентация, добавлен 28.12.2013Motivation from Genetic and Evolutionary Computation. Factorization of the Search Distribution. The Convex and Concave Lagrangian. FDA Factorizations and Region Graphs. Probabilistic Optimization and Linkage Learning. Learning Bayesian Networks from Data.
учебное пособие, добавлен 25.11.2013