|
|
|
Koichiro Hirose, Koji Fukudome, Hiroya Mamori and Makoto Yamamoto
Ice crystal icing occurs in jet engine compressors, which can severely degrade jet engine performance. In this study, we developed an ice crystal trajectory simulation, considering the state changes of ice crystals with a forced convection model, indicat...
ver más
|
|
|
|
|
|
|
Kazuhide Hirose, Kohei Nakamura and Hisamatsu Nakano
We analyze three transmission-line antennas using the moment method. Each line antenna comprises a coplanar feed line, loops, and straight segments connecting the loops and feedline. First, we investigate bent and branched line antennas with loops on one...
ver más
|
|
|
|
|
|
|
Kaoru Uesugi, Kazuaki Nagayama and Euichi Hirose
While nanoscale nipple arrays are expected to reduce light reflection and/or dust contamination in some insects, similar structures have been reported in various marine invertebrates. To evaluate the anti-contamination property of the structure in aquati...
ver más
|
|
|
|
|
|
|
Bin Wang, Lei Wu, Ning Zhao, Tianran Liu and Naoki Hirose
The features of coastal upwelling in the southwestern Yellow Sea were investigated based on oceanology data from a research cruise and a regional circulation model. The observation data suggest that a relatively colder and saltier water core exists from ...
ver más
|
|
|
|
|
|
|
Euichi Hirose and Noburu Sensui
Ascidians are marine sessile chordates that comprise one of the major benthic animal groups in marine ecosystems. They sometimes cause biofouling problems on artificial structures underwater, and non-indigenous, invasive ascidian species can potentially ...
ver más
|
|
|
|
|
|
|
Jeong-Yeob Chae, Chanhyung Jeon, Pyeongjoong Kim, Naoki Hirose, Ahyoung Ku and Jae-Hun Park
Typhoon-induced strong winds can dramatically change the oceanic environment, occasionally resulting in sudden stratification changes. In July 2015, two consecutive typhoons, Chanhom and Nangka, passed over the Yellow and East/Japan Seas within a week. R...
ver más
|
|
|
|
|
|
|
Kazuki Nakamura, Koji Hori and Shoichi Hirose
Cryptographic hash functions play an essential role in various aspects of cryptography, such as message authentication codes, pseudorandom number generation, digital signatures, and so on. Thus, the security of their hardware implementations is an import...
ver más
|
|
|
|
|
|
|
Yuichi Komano and Shoichi Hirose
The re-keying scheme is a variant of the symmetric encryption scheme where a sender (respectively, receiver) encrypts (respectively, decrypts) plaintext with a temporal session key derived from a master secret key and publicly-shared randomness. It is on...
ver más
|
|
|
|
|
|
|
Rie Nakano and Edichi Hirose
Pág. 66 - 75
|
|
|
|
|
|
|
Shigehiko Tateno, Ryosuke Sinmyo, Kei Hirose, and Hideo Nishioka
|
|
|
|