• No results found

Computer simulations of hard pear shaped particles

N/A
N/A
Protected

Academic year: 2020

Share "Computer simulations of hard pear shaped particles"

Copied!
33
0
0

Loading.... (view fulltext now)

Full text

Loading

Figure

Table 2: Coordinates for the pear shape Bezier points used for the PGHOmodel.
Table 3: Values of the ad,α and al,α for the PHGO model with k = 3, 4 and 5
Figure 1: Results from constant NPT simulations of the truncated Stoneexpansion model obtained using k = 3(a,b) and k = 5(c,d)
Figure 3: Particle mean square displacement curves obtained for the trun-cated Stone expansion model with k = 3 and k = 5.These data wereobtained from constant NVT MC simulations
+7

References

Related documents

(Note: Bachelor of Music in Music Education students do not enroll in applied lessons during the professional term and are thereby exempt from accompanying

?Peeps? Try to Peck Through a Pension Shell ?Peeps? Try to Peck Through a Pension Shell | 1 ?Peeps? Try to Peck Through a Pension Shell By Kerry Pechter Thu, Apr 5, 2018 A

[r]

It has also been found that women who are active smok- ers and slow acetylators due to their N-acetyltransferase 2 (NAT2) genotype were at increased risk of breast cancer

phenomenological study selected a leadership theory generated in the United States (e.g., Authentic Leadership Theory or ALT) to analyze the perceptions of leaders from three

Keywords: social sustainability, environmental sustainability, social wellbeing, place attachment, social cognitive theory, green space, safety, Urban Mind, London, urban

The mechanism of Detection & prevention of black hole attack on the context of AODV protocol is.. implemented by considering the working of AODV &

( 2011 ) used RNA-seq technology to sequence the leaf transcriptome of Taxus mairei , and obtained 36,493 unigenes, including hundreds of taxane biosynthetic genes and some genes