-
241
Average Analytic Ranks of Elliptic Curves over Number Fields
Published 2025-01-01Get full text
Article -
242
Optimization of fuzzy linear fractional programming problem with fuzzy numbers
Published 2021-03-01Get full text
Article -
243
Connection Number- Based Topological Indices of Cartesian Product of Graphs
Published 2023-01-01Get full text
Article -
244
Towards Noncommutative Linking Numbers via the Seiberg-Witten Map
Published 2015-01-01Get full text
Article -
245
Relations between the distinguishing number and some other graph parameters
Published 2024-11-01Get full text
Article -
246
Radio and Radial Radio Numbers of Certain Sunflower Extended Graphs
Published 2022-01-01Get full text
Article -
247
Genome Architecture and Its Roles in Human Copy Number Variation
Published 2014-12-01Get full text
Article -
248
Chinese Students Abroad: Dynamics of the Number and Aims of Educational Travel
Published 2020-07-01Get full text
Article -
249
Optimization Analysis of Switch Numbering in Metro Power Supply System
Published 2025-01-01Get full text
Article -
250
A probabilistic interpretation of the Miner number for fatigue life prediction
Published 2014-09-01“…A parallel calculation of the normalized variable V and the Miner number M is performed throughout the damage progression due to loading allowing probabilities of failure to be assigned to any value of the current Miner number. …”
Get full text
Article -
251
Does Reproductive Success in Orchids Affect the Evolution of Their Number of Flowers?
Published 2025-01-01Get full text
Article -
252
Approaches to improve wheat grain quality: breeding for falling number
Published 2015-12-01Get full text
Article -
253
-
254
Time-periodic dynamics in COVID-19 transmission considering the impact of population disbelief and fear
Published 2025-03-01Subjects: Get full text
Article -
255
Guess and determine attack on E<sub>0</sub>algorithm
Published 2012-11-01“…A guess and determine attack on E<sub>0</sub>was presented,the stream cipher that was used in the short-range wireless technology Bluetooth.In the attack,an ingenious assumption by linear approximation to diminish the number of values that have to be guessed was made.Futher more,a test equation to reduce the number of the guessed candidates was used.The guess and determine attack on E<sub>0</sub>with time complexity of O(2<sup>76</sup>)required about 988 keystream bit.Compared with long keystream attacks,short keystream attacks were more threatening to E<sub>0</sub>cipher which require less than 2 745 bit.This attack which belongs to short keystream attack was the fastest state recovery attack on E<sub>0</sub>so far compared with any other existed short keystream attacks.…”
Get full text
Article -
256
Intermetallic compound layer and fatigue crack evolution of Bi-contained Sn-1.0Ag-0.5Cu solder under thermal aging and thermal fatigue
Published 2025-01-01“…The Sn-1.0Ag-0.5Cu-xBi solder joints with different Bi content were prepared by reflow soldering. …”
Get full text
Article -
257
Seasonal Mathematical Model of Salmonellosis Transmission and the Role of Contaminated Environments and Food Products
Published 2025-01-01Subjects: Get full text
Article -
258
Isomorphic Universality and the Number of Pairwise Nonisomorphic Models in the Class of Banach Spaces
Published 2014-01-01“…An example of a very positive embedding is a positive onto embedding between C(K) and CL for 0-dimensional K and L such that the following requirement holds for all h≠0 and f≥0 in C(K): if 0≤Th≤Tf, then there are constants a≠0 and b with 0≤a·h+b≤f and a·h+b≠0.…”
Get full text
Article -
259
On strong laws of large numbers for arrays of rowwise independent random elements
Published 1993-01-01Get full text
Article -
260
Strong laws of large numbers for arrays of rowwise independent random elements
Published 1987-01-01Get full text
Article