Computational Fluid Dynamics

The Reynolds number formula in the upstream pipe. A computation methodic of the expansion flow with the convergence threshold for all equations. Velocity vector visualization. The function that calculates the shear stress in cylindrical coordinates.

Подобные документы

  • Обзор программных модулей и компонентов системы SAP R/3. Создание заранее сконфигурированных отраслевых решений. Рассмотрение информационной системы Microsoft Dynamics (AXAPTA). Сравнение программных комплексов динамического управления предприятиями.

    контрольная работа, добавлен 03.05.2015

  • Модель организации управления качеством. Реализация информационного обеспечения. Требования, предъявляемые к информации, которая будет взаимодействовать с ним. Программный пакет Dynamics от Microsoft, его функциональные возможности и алгоритм внедрения.

    реферат, добавлен 20.01.2013

  • Data Flow Diagram как диаграмма потоков данных, стандарт бизнес моделирования для описания существующих на предприятиях потоков данных. Пример составления схемы потоков данных. Общая схема потоков данных предметной области, потоков данных подсистем.

    лабораторная работа, добавлен 03.02.2022

  • The first public key system - Diffie-Hellman key agreement. Solving discrete logarithm problem. Mutual identification with key establishment. Unicity distance for secret key cipher. Statistical tests for random and pseudo-random number generators.

    книга, добавлен 08.03.2014

  • A structured language as one of a variety of programming possibilities. Unions, enumerations, and user-defined types systems the standard function library. Exception handling and miscellaneous classes. An object-oriented expression parser in program.

    учебное пособие, добавлен 08.03.2014

  • Decoding techniques for fast correlation attacks. Description of cryptographic protection. Enforcement mechanism and decision function. Elgamal digital signature scheme. Conceptual model of an authorization architecture. Binary Euclidean algorithm.

    книга, добавлен 08.03.2014

  • Характеристика протоколу контролю передачі даних (TCP). Ієрархія протоколів, маршрутизація TCP/ІP, ІP адресація й імена об'єктів у мережі Іnternet. Реалізація TCP/ІP для Wіndows, атаки на мережі і захист від них. Пророкування TCP sequence number.

    курсовая работа, добавлен 01.03.2011

  • Privacy and Authentication in program. The random Number Generation. Message-Authentication Code Algorithms. Encrypt and Authenticate Modes. Goals of Public Key Cryptography. The process optimize 32-Bit Implementation. Performance of the Small Variant.

    книга, добавлен 08.03.2014

  • Arithmetic and number theory in C and C++. The fundamental operations in programs. Modular arithmetic: calculating with residue classes. Addition chains and windows. Cryptographic application of exponentiation. A modern the data encryption standard.

    книга, добавлен 08.03.2014

  • Finding Boolean functions with maximum algebraic immunity based on univariate polynomial representation. Algebraic techniques in differential cryptanalysis revisited. An efficient rational secret sharing scheme based on the chinese remainder theorem.

    книга, добавлен 08.03.2014

  • The comprehensive analysis of the American concept of threats to information security and determination of priority areas of the US’s activity in creating a secure national cyberspace. The number of incidents related to computer systems and networks.

    статья, добавлен 15.04.2024

  • A number of different techniques that people can use to hide information. The sound files and images that float about the network today. Measuring and encrypting information. Error correction and white noise. Analysis of hiding information in JPEG files.

    книга, добавлен 08.03.2014

  • FSMs are widely used in various application domains such as telecommunication systems, communication protocols and other systems. Existence of a separating sequence of two FSMs depends on the number of nondeterministic transitions in these FSMs.

    реферат, добавлен 20.08.2010

  • Basics of Contemporary Cryptography. Codes for Error Detection. Advances in Coding Theory and Cryptography. Encryption Basics. Authentication Codes in the Query Model. Collision in the DSA Function. Fuzzy Identity-based Encryption: Efficient Schemes.

    учебное пособие, добавлен 08.03.2014

  • Анализ управления базой поставщиков и альтернативы применения информационных технологий. Характеристика деятельности компании ЗАО "КРОК". Использование Microsoft Dynamics CRM в качестве мастер-системы по хранению информации о всех контрагентах компании.

    дипломная работа, добавлен 28.08.2016

  • Mathematical model of dynamics of tensions of respiratory gases taking into account hypometaboliс, that develops in the organism of man on a highland. Character of changes of the modes of functioning of organism at transients and in steady-states.

    статья, добавлен 30.01.2017

  • Conducting an informational study of trends in the development of cyber attacks. Analysis of the factors affecting the number of cyber attacks on the information security of web resources over the past few years and fluctuations in their intensity.

    статья, добавлен 27.10.2020

  • Learn the basic requirements when choosing a printer: manufacturer, print speed and quality, comfort of use. Types of home printers, their advantages and disadvantages. The principle of operation of multi-function devices, inkjet and laser printers.

    презентация, добавлен 07.03.2018

  • Понятие однонаправленной функции и конечных автоматов. Отношение размера памяти с входной - выходной последовательностью. Возможности построение однонаправленной функции с "секретом". Оценка количества операций при криптоанализе асинхронного алгоритма.

    статья, добавлен 15.09.2012

  • Computer science as the theory of representation, processing and use of the information, main directions of development of science, its subject, ikomponenty. Properties and coding information. Rules of conversion from binary to decimal number system.

    презентация, добавлен 18.11.2015

  • Mathematical methods for finding object boundaries and measuring the size, color, speed of bubbles in the flotation foam. The possibility of the search for this signature by measuring the deviations of the center of mass of a number of sequential images.

    статья, добавлен 14.01.2017

  • Analysis of data aggregated preferences. The ranking of the elements as separate and static elements. Evaluation of the algorithms, assumptions, weight and shifting implicit preferences. The essence of ranking elements as a function of their attributes.

    дипломная работа, добавлен 30.08.2016

  • The classical methods of active identification and adaptation of automatic control systems (ACS) were used. Test of ACS.Transient process which allows to obtain parameters of the object transfer function and calculate the conventional adjustment knob.

    статья, добавлен 30.07.2016

  • The main features of non-traditional social engineering. Characteristics of the main non-traditional design, which involves the formation of a number of new types of activities (involvement of users in design, complex management and project expertise).

    статья, добавлен 26.04.2023

  • Reducing the amount of required memory, reducing the time for data processing and reducing the number of copies of documents when updating information in the automation process. Analysis of the choice of technologies for application development.

    статья, добавлен 31.08.2022

Работы в архивах красиво оформлены согласно требованиям ВУЗов и содержат рисунки, диаграммы, формулы и т.д.
PPT, PPTX и PDF-файлы представлены только в архивах.
Рекомендуем скачать работу и оценить ее, кликнув по соответствующей звездочке.