Results 61 to 70 of about 1,200 (188)
In moderately hole‐doped Sr1−xKxFe2As2${\rm Sr}_{1-x}{\rm K}_x{\rm Fe}_2{\rm As}_2$ system the pairing state is s+−${\rm s}^{+-}$ wave pairing state mediated by spin fluctuations. As the SDW order parameter increases, TC${\rm T}_C$ decreases and TM${\rm T}_M$ increases. As temperature increases, the SDW order parameter decreases and vanishes at TM${\rm
Gedefaw Mebratie +2 more
wiley +1 more source
ABSTRACT The analysis of certain properties of the underlying graph of a public transport network generates insights about the network's structure. Hereby, the choice of the graph representation depends on a trade‐off between complexity reduction and information preservation to adequately model a public transport network.
Michael Palk +2 more
wiley +1 more source
A Bound of Fast Algebraic Immunity of Constructions With BPR Using a Four-Disjoint-Part Support
Boolean functions are used for stream cipher ought to be a high fast algebraic immunity (FAI) to effectively against fast algebraic attacks. In the previous research methods, there is no suitable method to gain the FAI of Boolean functions using ...
Kai Xu, Ying Zhang, Jing Wang
doaj +1 more source
Initial State Privacy of Nonlinear Systems on Riemannian Manifolds
ABSTRACT In this paper, we investigate initial state privacy protection for discrete‐time nonlinear closed systems. By capturing Riemannian geometric structures inherent in such privacy challenges, we refine the concept of differential privacy through the introduction of an initial state adjacency set based on Riemannian distances.
Le Liu, Yu Kawano, Antai Xie, Ming Cao
wiley +1 more source
This paper investigates the consensus problems of the third-order discrete-time Connected Vehicle Systems (CVSs) under cyber-attacks. First, the necessary and sufficient conditions for consensus of third-order discrete-time CVSs are derived in the ...
Zeming Li, Ziyuan Li, Yonggui Liu
doaj +1 more source
Hydrogen‐based direct reduced iron (H‐DRI) melts differently from scrap and carbon‐bearing DRI. This work combines differential scanning calorimetry experiments, FactSage thermodynamics, and simple composition‐based regression to predict solidus, liquidus, heat capacity, and enthalpy for H‐DRI.
Ankur Agnihotri +3 more
wiley +1 more source
A Method for Specifying Complete Signature Randomization and an Algebraic Algorithm Based on It
To eliminate the limitations of signature randomization in known algebraic algorithms with a hidden group, the security of which is based on the computational complexity of solving large systems of power equations, a method for ensuring complete ...
Alexandr Moldovyan +3 more
doaj +1 more source
Abstract This study examines the adaptive market hypothesis in the prewar and wartime Japanese stock market using a new market capitalization‐weighted price index. First, we find that the degree of market efficiency varies over time and with major historical events. This implies that the hypothesis is supported in this market.
Kenichi Hirayama, Akihiko Noda
wiley +1 more source
A novel method for developing post-quantum cryptoschemes and a practical signature algorithm [PDF]
Purpose – The practical purpose of this research is to propose a candidate for post-quantum signature standard that is free of significant drawback of the finalists of the NIST world competition, which consists in the large size of the signature and the ...
Nikolay Andreevich Moldovyan +1 more
doaj +1 more source
Why did Putin invade Ukraine? A theory of degenerate autocracy
Abstract Many dictatorships end up with a series of disastrous decisions such as Hitler's attack on the Soviet Union or Saddam Hussein's aggression against Kuwait. Even if a certain policy choice is not ultimately fatal for the regime, such as Mao's Big Leap Forward or the Pol Pot's collectivization drive, they typically involve both a miscalculation ...
Georgy Egorov, Konstantin Sonin
wiley +1 more source

