Buscar
Mostrando ítems 21-30 de 11783
On the effect of the Δ(1232) in hypernuclear non-mesonic weak decay: A microscopic approach
(Elsevier Science, 2012-09)
The non-mesonic weak decay of Λ-hypernuclei is studied within a microscopic diagrammatic approach which includes, for the first time, the effect or the δ-baryon resonance. We adopt a nuclear matter formalism extended to ...
Existence of the weak solution for a stratified diffusion model via an iterative methodExistencia de la solución débil de un modelo de difusión estratificada vía un método iterativo
(Universidad de Costa Rica, Centro de Investigación en Matemática Pura y Aplicada (CIMPA), 2018)
Non-aqueous electrolytes for isotachophoresis of weak bases and its application to the comprehensive preconcentration of the 20 proteinogenic amino acids in column-coupling ITP/CE-MS
(Springer Heidelberg, 2014-11)
Isotachophoresis (ITP) has long been used alone but also as a preconcentration technique for capillary electrophoresis (CE). Unfortunately, up to now, its application is restricted to relatively strong acids and bases as ...
Weak-lensing measurement of the mass-richness relation using the SDSS data base
(Wiley Blackwell Publishing, Inc, 2017-02)
We study the mass-richness relation using galaxy catalogues and images from the Sloan Digital Sky Survey. We use two independent methods: In the first one, we calibrate the scaling relation with weak-lensing mass estimates. ...
Vortex lattice in the crossover of a Bose gas from weak coupling to unitarity
(2018-12-01)
The formation of a regular lattice of quantized vortices in a fluid under rotation is a smoking-gun signature of its superfluid nature. Here we study the vortex lattice in a dilute superfluid gas of bosonic atoms at zero ...
A practical approach for biometric authentication based on smartcards
(2010-10-18)
Cryptographic systems are safe. However, the management of cryptographic keys of these systems is a tough task. They are usually protected by the use of password-based authentication mechanisms, which is a weak link on ...
A practical approach for biometric authentication based on smartcards
(2010-10-18)
Cryptographic systems are safe. However, the management of cryptographic keys of these systems is a tough task. They are usually protected by the use of password-based authentication mechanisms, which is a weak link on ...
2-Graded polynomial identities for the Jordan algebra of the symmetric matrices of order two
(Academic Press Inc Elsevier ScienceSan DiegoEUA, 2011)
Weak properties and robustness of t-hill estimators
(2016)
We describe a novel method of heavy tails estimation based on transformed score (t-score). Based on a new score moment method we derive the t-Hill estimator, which estimates the extreme value index of a distribution function ...
ALGORITHM FOR PROBABILISTIC ANALYSIS of DISTRIBUTION SYSTEMS WITH DISTRIBUTED GENERATION
(Univ Nac Colombia, Fac Nac Minas, 2011-10-01)
In this paper an efficient algorithm for probabilistic analysis of unbalanced three-phase weakly-meshed distribution systems is presented. This algorithm uses the technique of Two-Point Estimate Method for calculating the ...