2008
DOI: 10.1134/s1028335808020055
|View full text |Cite
|
Sign up to set email alerts
|

Structure formation in the weakly dissipative Kolmogorov-Arnold-Moser theory

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2011
2011
2023
2023

Publication Types

Select...
4

Relationship

2
2

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 3 publications
0
2
0
Order By: Relevance
“…When the parameters of the model are varied and the temperature on the boundary of the effective zone is increased, temperature fluctuations may be observed in the effective zone. This will lead to structuring of the counterflow along the radius of the effective channel, and agrees with data acquired in [5,[10][11][12]. Thus, the magnitude of the reduction in operating effectiveness is, of course, required in the recalculation that makes it possible to evaluate the operating effectiveness of the packing in a selected regime.…”
mentioning
confidence: 52%
“…When the parameters of the model are varied and the temperature on the boundary of the effective zone is increased, temperature fluctuations may be observed in the effective zone. This will lead to structuring of the counterflow along the radius of the effective channel, and agrees with data acquired in [5,[10][11][12]. Thus, the magnitude of the reduction in operating effectiveness is, of course, required in the recalculation that makes it possible to evaluate the operating effectiveness of the packing in a selected regime.…”
mentioning
confidence: 52%
“…The simplest example studied in sufficient detail to date is associated with Bogdanov-Takens bifurcation discovered in the 1970s [12,13,[24][25][26][27][28][29][30][31][32][33][34]. This bifurca tion occurs in the case of the degeneracy of dynamic systems in continuous time, dependent on two param eters.…”
Section: Weakly Dissipative Versionmentioning
confidence: 99%
“…Another encryption algorithm that is susceptible to side-channel attacks is the AES-Rijndael (Bonneau & Mironov, 2006;Bogdanov, 2008;Renauld, Standaert, & Veyrat-Charvillon, 2009). For example, in Renauld et al (2009), it is shown that a class of side-channel attacks known as algebraic side-channel can be applied to the AES-Rijndael algorithm implemented in 8-bit controllers.…”
Section: Unauthorized Access To Datamentioning
confidence: 99%