Search results for "DERIVATION"

showing 10 items of 60 documents

Analytical Solutions for the Self- and Mutual Inductances of Concentric Coplanar Disk Coils

2013

In this paper, closed-form solutions are presented for the self- and mutual inductances of disk coils which lie concentrically in a plane. The solutions are given as generalized hypergeometric functions which are closely related to elliptic integrals. The method used is a Legendre polynomial expansion of the inductance integral, which renders all integrations straightforward. Excellent numerical agreement with previous studies is obtained. An asymptotic formula for the approach to the ring coil limit is also derived and numerically validated. The methods presented here can be applied to noncoaxial and noncoplanar cases.

PhysicsAssociated Legendre polynomialsPlane (geometry)Electromagnetic coilMathematical analysisElliptic integralAsymptotic formulaElectrical and Electronic EngineeringHypergeometric functionDerivation of self inductanceLegendre polynomialsElectronic Optical and Magnetic MaterialsIEEE Transactions on Magnetics
researchProduct

Magnetic field analysis and leakage inductance calculation in current transformers by means of 3-D integral methods

1996

This paper presents 3D integral approach to power current transformer magnetic field and inductance calculations. A minimization of the kernel norm has been carried out for the integral equation governing the field. The software package TRACAL3, based on the integral methods for field and inductance calculations, has been developed and implemented for personal computers. The application of the 3D mathematical models has been made for the leakage field in a current transformer. The results of calculations were compared with measurement data. The comparison yields good agreement.

PhysicsLeakage inductanceMathematical analysisEquivalent series inductanceMagnetic flux leakageDerivation of self inductanceIntegral equationCurrent transformerElectronic Optical and Magnetic Materialslaw.inventionInductancelawElectrical and Electronic EngineeringTransformerIEEE Transactions on Magnetics
researchProduct

PTCA of the left main stem following protective coronary artery bypass grafting.

1991

Percutaneous transluminal coronary angioplasty (PTCA) was performed in 14 patients with significant left main stem stenosis following protective coronary artery bypass grafting (CABG). The procedure was successful in 13/14 patients (93%), achieving a decrease in mean diameter stenosis from 74% +/- 7% to 31% +/- 12% (P less than 0.01). Accordingly, the absolute stenosis diameter increased from 0.9 mm +/- 0.3 mm to 2.4 mm +/- 0.5 mm (P less than 0.01). Dissection of the left main stem artery and a transient significant fall of blood pressure each occurred in one patient. No other serious complications were noted. Eight of 13 patients (62%) with successful PTCA underwent control angiography. R…

Pulmonary and Respiratory MedicineAdultMalemedicine.medical_specialtyDissection (medical)RestenosisRecurrenceInternal medicinemedicineHumansDerivationMyocardial infarctionAngioplasty Balloon CoronaryCoronary Artery BypassAgedmedicine.diagnostic_testbusiness.industryGeneral MedicineAortic Valve StenosisMiddle Agedmedicine.diseaseSurgeryStenosismedicine.anatomical_structureAngiographyCardiologySurgeryFemaleCardiology and Cardiovascular MedicinebusinessComplicationArteryFollow-Up StudiesEuropean journal of cardio-thoracic surgery : official journal of the European Association for Cardio-thoracic Surgery
researchProduct

An Original Risk Score to Predict Early Major Bleeding in Acute Pulmonary Embolism

2021

Background Improved prediction of the risk of early major bleeding in pulmonary embolism (PE) is needed to optimize acute management. Research Question Does a simple scoring system predict early major bleeding in acute PE patients, identifying patients with either high or low probability of early major bleeding? Study Design and Methods From a multicenter prospective registry including 2,754 patients, we performed post hoc multivariable logistic regression analysis to build a risk score to predict early (up to hospital discharge) major bleeding events. We validated the endpoint model internally, using bootstrapping in the derivation dataset by sampling with replacement for 500 iterations. P…

Pulmonary and Respiratory Medicinemedicine.medical_specialtyFramingham Risk ScoreAnemiabusiness.industryBleedCritical Care and Intensive Care Medicinemedicine.diseaseLogistic regressionPulmonary embolismBrier scoreInternal medicinemedicineDerivationCardiology and Cardiovascular MedicinebusinessMajor bleedingChest
researchProduct

On a time-depending Monge-Ampère type equation

2012

Abstract In this paper, we prove a comparison result between a solution u ( x , t ) , x ∈ Ω ⊂ R 2 , t ∈ ( 0 , T ) , of a time depending equation involving the Monge–Ampere operator in the plane and the solution of a conveniently symmetrized parabolic equation. To this aim, we prove a derivation formula for the integral of a smooth function g ( x , t ) over sublevel sets of u , { x ∈ Ω : u ( x , t ) ϑ } , ϑ ∈ R , having the same perimeter in R 2 .

Pure mathematicsDerivation formulaPlane (geometry)Applied MathematicsOperator (physics)Mathematical analysisComparison resultsSymmetrizationMonge-Ampère equationType equationSettore MAT/05 - Analisi MatematicaAmpereAnalysisMathematics
researchProduct

Solvable Extensions of Nilpotent Complex Lie Algebras of Type {2n,1,1}

2018

We investigate derivations of nilpotent complex Lie algebras of type {2n, 1, 1} with the aim to classify nilpotent complex Lie algebras the commutator ideals of which have codimension one and are nilpotent Lie algebras of type {2n, 1, 1}

Pure mathematicsGeneral Mathematics010102 general mathematicsType (model theory)01 natural sciencesNilpotentderivations of Lie algebras0103 physical sciencesLie algebraSettore MAT/03 - Geometria010307 mathematical physics0101 mathematicsNilpotent Lie algebraMathematicsMoscow Mathematical Journal
researchProduct

Representations and derivations of quasi ∗-algebras induced by local modifications of states

2009

Abstract The relationship between the GNS representations associated to states on a quasi ∗-algebra, which are local modifications of each other (in a sense which we will discuss) is examined. The role of local modifications on the spatiality of the corresponding induced derivations describing the dynamics of a given quantum system with infinite degrees of freedom is discussed.

Quasi *-algebrasPure mathematicsApplied MathematicsQuantum dynamicsDegrees of freedomAlgebras of unbounded operatorsDerivationsRepresentationSettore MAT/05 - Analisi MatematicaQuantum systemDerivationQuantum dynamicsRepresentation (mathematics)Settore MAT/07 - Fisica MatematicaAnalysisMathematicsJournal of Mathematical Analysis and Applications
researchProduct

Cracking the Code : The Impact of Orthographic Transparency and Morphological-Syllabic Complexity on Reading and Developmental Dyslexia

2019

Reading is an essential skill in modern societies, yet not all learners necessarily become proficient readers. Theoretical concepts (e.g., the orthographic depth hypothesis; the grain size theory) as well as empirical evidence suggest that certain orthographies are easier to learn than others. The present paper reviews the literature on orthographic transparency, morphological complexity, and syllabic complexity of alphabetic languages. These notions are elaborated to show that differences in reading acquisition reflect fundamental differences in the nature of the phonological recoding and reading strategies developing in response to the specific orthography to be learned. The present paper…

Reading modelsSyllabic complexityVISUAL WORD RECOGNITIONmedia_common.quotation_subjectlcsh:BF1-990050105 experimental psychologyCode (semiotics)PHONOLOGICAL AWARENESSDUAL-ROUTElukeminenDyslexiaDERIVATIONAL MORPHOLOGYPROFICIENT READERS03 medical and health sciences0302 clinical medicinePhonological awarenessmorphological complexity syllabic complexityReading (process)medicinereading modelsdysleksia0501 psychology and cognitive sciencesOrthographic transparencyFAMILIAL RISKEmpirical evidenceGeneral Psychologymedia_commonLITERACY ACQUISITIONOrthographic depth05 social sciencesDyslexiaDOUBLE-DEFICIT HYPOTHESISmedicine.diseaseMorphological complexityPHONEME AWARENESSorthographic transparencylcsh:PsychologySyllabic versePsychologylukihäiriötBEGINNING READERS030217 neurology & neurosurgeryOrthographyCognitive psychology
researchProduct

Locally nilpotent derivations of rings graded by an abelian group

2019

International audience

Russel cubic threefoldPure mathematicsAffine algebraic geometryPham-Brieskorn variety010102 general mathematics[MATH.MATH-AG] Mathematics [math]/Algebraic Geometry [math.AG]Locally nilpotent13A50Locally nilpotent derivation01 natural sciences[ MATH.MATH-AG ] Mathematics [math]/Algebraic Geometry [math.AG]Russell cubic threefold0103 physical sciences010307 mathematical physics[MATH.MATH-AG]Mathematics [math]/Algebraic Geometry [math.AG]0101 mathematicsAbelian group14R20MSC: Primary 14R20 ; Secondary 13A50ComputingMilieux_MISCELLANEOUSMathematics
researchProduct

A privacy enhanced device access protocol for an IoT context

2013

In this paper, we present the case for a device authentication protocol that authenticates a device/service class rather than an individual device. The devices in question are providing services available to the public. The proposed protocol is an online protocol, and it uses a pseudo-random temporary identity scheme to provide user privacy. This allows the Internet-of-Things device to have full assurance of the user, with respect to the request service, while permitting the user to remain anonymous with respect to the device. The user can then enjoy identity and location privacy in addition to untraceability with respect to device access. Copyright © 2013 John Wiley & Sons, Ltd.

Service (business)Challenge-Handshake Authentication ProtocolAuthenticationComputer Networks and CommunicationsComputer science020206 networking & telecommunicationsContext (language use)02 engineering and technologyComputer securitycomputer.software_genreAuthentication protocol0202 electrical engineering electronic engineering information engineeringIdentity (object-oriented programming)020201 artificial intelligence & image processingKey derivation functionProtocol (object-oriented programming)computerInformation SystemsSecurity and Communication Networks
researchProduct