An elliptic second-order equation is solved by support of the finite element method that describes one thermal process. The solution is sought in the space . The finite-element approximation of the problem is provided...
An elliptic second-order equation is solved by support of the finite element method that describes one thermal process. The solution is sought in the space . The finite-element approximation of the problem is provided and the convergence rates are estimated.
Network Security is the most vital component in information security because it is responsible for securing all information passed through networked computers. Network Security refers to all hardware and software func...
详细信息
The paper is formulated and tested a fuzzy approach to the formation of a lexicological dictionary of intermediate language in bilingual education. To estimate the degree of assimilation of the new term it is selected...
详细信息
The paper is formulated and tested a fuzzy approach to the formation of a lexicological dictionary of intermediate language in bilingual education. To estimate the degree of assimilation of the new term it is selected block of evaluation criteria, which based on observations students range marks and aggregated for subsequent assignment of the degree of comprehensibility concerning to this term as part of lexicological dictionary.
In the article the detection of “missing” or “hidden” data during the processing of the well-defined queries to database is discussed and on terms of quality the importance is justified, the article also covers or...
详细信息
In the article the detection of “missing” or “hidden” data during the processing of the well-defined queries to database is discussed and on terms of quality the importance is justified, the article also covers organization, processing, and program implementation issues of fuzzy queries to database of information systems.
As a result of analysis of the existent methods and tools of computer aided design of the technical systems of many industrial areas, the primary purpose of the article that consists in the decision of different proje...
详细信息
As a result of analysis of the existent methods and tools of computer aided design of the technical systems of many industrial areas, the primary purpose of the article that consists in the decision of different project problems within the framework of one programmatic system with the use of comfortable programmatic interface is certain. Architecture of the program interface for computer designing and option of technical systems of different industrial areas on the basis of stage-by-stage automated designing principles with using programmatic and informative supports is worked out. In the article, the problem of computer designing, searching and option of elements of manipulator for flexible manufacture module is considered. As a method of logical simulation of the problem, production model of designing procedures of the program interface and intelligence option of a manipulator, its technical parameters are developed. On the basis of algorithmic scheme of searching, the option of a manipulator from data base is worked out.
Issues related to the curriculum design of C programming language is analysed. Aspects and necessity of programming for engineers is discussed. The enhanced outlay of programming for engineers and generating the curri...
详细信息
ISBN:
(纸本)9789881925329
Issues related to the curriculum design of C programming language is analysed. Aspects and necessity of programming for engineers is discussed. The enhanced outlay of programming for engineers and generating the curriculum is presented. Relativity and dependency briefly highlighted. A superlative teaching model of computer languages is discussed along with its principles. In-Lab monitoring technique is developed successfully using client-server architecture which ensures learner live workshop progress. It is shown how the programming for engineer's curriculum design and techniques help to create highest quality outcome.
Notice of Violation of IEEE Publication Principles "The Use of Cryptography in Network Security" by Zafar Jafarov in the Proceedings of the 9th International Conference on Application of information and Comm...
Notice of Violation of IEEE Publication Principles "The Use of Cryptography in Network Security" by Zafar Jafarov in the Proceedings of the 9th International Conference on Application of information and Communication Technologies (AICT), October 2015 After careful and considered review of the content and authorship of this paper by a duly constituted expert committee, this paper has been found to be in violation of IEEE’s Publication Principles. This paper is a duplication of the original text from the paper cited below. The original text was copied without attribution (including appropriate references to the original author(s) and/or paper title) and without permission. Due to the nature of this violation, reasonable effort should be made to remove all past references to this paper, and future references should be made to the following article: "Network Security Using Cryptographic Techniques" by Sumedha Kaushik, Ankur Singhal in the International Journal of Advanced Research in Computer Science and Software Engineering, Vol 2, Issue 12, December 2012 Network Security is the most vital component in information security because it is responsible for securing all information passed through networked computers. Network Security refers to all hardware and software functions, characteristics, features, operational procedures, accountability, measures, access control, and administrative and management policy required to provide an acceptable level of protection for Hardware and Software, and information in a network. Only one particular element underlies many of the security mechanisms in use: Cryptographic techniques; hence our focus is on this area Cryptography. Cryptography is an emerging technology, which is important for network security. Research on cryptography is still in its developing stages and a considerable research effort is still required for secured communication.
In this paper, we study properties of solutions to doubly nonlinear reaction-diffusion systems with variable density and source. We demonstrate the possibilities of the self-similar approach to studying the qualitativ...
详细信息
In this paper, we study properties of solutions to doubly nonlinear reaction-diffusion systems with variable density and source. We demonstrate the possibilities of the self-similar approach to studying the qualitative properties of solutions of such reaction-diffusion systems. We also study the finite speed of propagation (FSP) properties of solutions, an asymptotic behavior of the compactly supported solutions and free boundary asymptotic solutions in quick diffusive and critical cases.
We consider the canonical ensemble of N-vertex Erdős-Rényi (ER) random topological graphs with quenched vertex degree, and with fugacity μ for each closed triple of bonds. We claim complete defragmentation of la...
详细信息
We consider the canonical ensemble of N-vertex Erdős-Rényi (ER) random topological graphs with quenched vertex degree, and with fugacity μ for each closed triple of bonds. We claim complete defragmentation of large-N graphs into the collection of [p−1] almost full subgraphs (cliques) above critical fugacity, μc, where p is the ER bond formation probability. Evolution of the spectral density, ρ(λ), of the adjacency matrix with increasing μ leads to the formation of a multizonal support for μ>μc. Eigenvalue tunneling from the central zone to the side one means formation of a new clique in the defragmentation process. The adjacency matrix of the network ground state has a block-diagonal form, where the number of vertices in blocks fluctuates around the mean value Np. The spectral density of the whole network in this regime has triangular shape. We interpret the phenomena from the viewpoint of the conventional random matrix model and speculate about possible physical applications.
暂无评论