Diffusion in the CuSn binary system: application to Nb3Sn composites

1984 ◽  
Vol 19 (2) ◽  
pp. 497-500 ◽  
Author(s):  
S. F. Cogan ◽  
S. Kwon ◽  
J. D. Klein ◽  
R. M. Rose
1982 ◽  
Vol 69 ◽  
pp. 317-319
Author(s):  
Yoji Kondo ◽  
Jerry L. Modisette

AbstractWe have investigated the possibility of mass flow due to the heating of the cooler component in a close binary system. The heating may be caused by irradiation from the hotter companion or by other mechanisms such as the spacial coincidence of non-linear “g-mode” oscillations in the cooler star. The 2.4-day period binary U Cep, in which gas streaming has been observed, has been chosen for model calculations. Preliminary results show that such a heating of the lower atmosphere of the cooler star could lead to mass flow at an average rate of 10-9 to 10-7 solar mass per year without the star's necessarily filling its critical Roche surface.


1995 ◽  
Vol 92 ◽  
pp. 1871-1876 ◽  
Author(s):  
B Touzo ◽  
D Trumeau ◽  
D Massiot ◽  
I Farnan ◽  
JP Coutures

2020 ◽  
Vol 1 (9) ◽  
pp. 28-30
Author(s):  
D. M. Zlatopolski

The article describes a number of little-known methods for translating natural numbers from one number system to another. The first is a method for converting large numbers from the decimal system to the binary system, based on multiple divisions of a given number and all intermediate quotients by 64 (or another number equal to 2n ), followed by writing the last quotient and the resulting remainders in binary form. Then two methods of mutual translation of decimal and binary numbers are described, based on the so-called «Horner scheme». An optimal variant of converting numbers into the binary number system by the method of division by 2 is also given. In conclusion, a fragment of a manuscript from the beginning of the late 16th — early 17th centuries is published with translation into the binary system by the method of highlighting the maximum degree of number 2. Assignments for independent work of students are offered.


2020 ◽  
Vol 3 (2) ◽  
pp. 182-186
Author(s):  
Lisnayani Silalahi ◽  
Anita Sindar

Data security and confidentiality is currently a very important issue and continues to grow. Several cases concerning data security are now a job that requires handling and security costs that are so large. To maintain the security and confidentiality of messages, data, or information so that no one can read or understand it, except for the rightful recipients, a data security system application with an encryption method using an algorithm is designed. The SHA-1 cryptographic hash function that takes input and produces a 160-bit hash value which is known as the message iteration is usually rendered as a 40-digit long hexadecimal number.


2012 ◽  
Vol 3 (6) ◽  
pp. 415-418
Author(s):  
Anil Kumar K ◽  
◽  
Dr Srinivasu Ch Dr Srinivasu Ch

Sign in / Sign up

Export Citation Format

Share Document