Suggested Topics within your search.
Suggested Topics within your search.
Axial Force Control
2
Force Control
2
Friction
2
Friction Stir Welding
2
Friction stir welding
2
QA75 Electronic computers. Computer science
2
Research & information: general
2
Rotational speed
2
Torque Control
2
Travel Force Control
2
Aluminum alloys
1
Axial flow
1
Computer software
1
Control strategies
1
Control techniques
1
Cosmology & the universe
1
Current forces
1
Finite element method
1
Force control
1
Friction stir process
1
Friction stir spot welding
1
Highest temperature
1
Hyperworks software
1
Intelligent control
1
MANET
1
Mathematics & science
1
Parameters selection
1
Physics
1
Process control
1
Process parameters
1
-
301
-
302“... of spacetime wormholes to ‘baby universes’ and an ensemble of theories. We revisit such ideas, using features...”
Get full text
Article -
303“...Abstract A spherically symmetric wormhole family of solutions, with null red-shift, in the context...”
Get full text
Article -
304“...) -dimensional wormhole. Applying external magnetic field along the axis direction of the wormhole, the Dirac...”
Get full text
Article -
305“...Abstract This paper discusses wormholes supported by general equation-of-state , resulting in a...”
Get full text
Article -
306
-
307
-
308
-
309“...Abstract We interpret the traversable wormhole in AdS/CFT in the context of quantum information...”
Get full text
Article -
310“...Abstract We study the matter perturbations of a new AdS wormhole in $$(3+1)$$ (3+1) -dimensional...”
Get full text
Article -
311by Edward A. Olszewski“... from the others, acquire intrinsic, finite curvature and are connected by a wormhole. The dyons possess...”
Published 2015-01-01
Get full text
Article -
312
-
313“...Abstract This study is devoted to explore the physical aspects of wormhole geometry under embedded...”
Get full text
Article -
314“.... In this thesis, we propose an efficient multicast communication in wormhole-routed torus networks. We first...”
Get full text
Others -
315“..., these characteristics will give rise to Wormhole attack which will increase the influences of network attacks. In recent...”
Get full text
Others -
316
-
317“... called wormhole attacks, and develop a wormhole-proof dynamic source routing protocol, which requires...”
Get full text
Others -
318
-
319“... multi-dimensional wormhole-routed torus/mesh, where there are an arbitrary number of source nodes each...”
Get full text
Others -
320“... the messages, can well exploit the communication parallelism and the characteristic of wormhole routing...”
Get full text
Others