Results 61 to 70 of about 1,200 (188)

Gap Symmetry, Electronic Structure and Interplay Between Superconductivity and Spin Density Wave in Sr1−xKxFe2As2 Superconductor

open access: yesNano Select, EarlyView.
In moderately hole‐doped Sr1−xKxFe2As2${\rm Sr}_{1-x}{\rm K}_x{\rm Fe}_2{\rm As}_2$ system the pairing state is s+−${\rm s}^{+-}$ wave pairing state mediated by spin fluctuations. As the SDW order parameter increases, TC${\rm T}_C$ decreases and TM${\rm T}_M$ increases. As temperature increases, the SDW order parameter decreases and vanishes at TM${\rm
Gedefaw Mebratie   +2 more
wiley   +1 more source

Robustness Assessment of Public Transport Networks in Various Graph Representations: Systematic Review, Decision Support, and Case Study

open access: yesNetworks, EarlyView.
ABSTRACT The analysis of certain properties of the underlying graph of a public transport network generates insights about the network's structure. Hereby, the choice of the graph representation depends on a trade‐off between complexity reduction and information preservation to adequately model a public transport network.
Michael Palk   +2 more
wiley   +1 more source

A Bound of Fast Algebraic Immunity of Constructions With BPR Using a Four-Disjoint-Part Support

open access: yesIEEE Access, 2020
Boolean functions are used for stream cipher ought to be a high fast algebraic immunity (FAI) to effectively against fast algebraic attacks. In the previous research methods, there is no suitable method to gain the FAI of Boolean functions using ...
Kai Xu, Ying Zhang, Jing Wang
doaj   +1 more source

Initial State Privacy of Nonlinear Systems on Riemannian Manifolds

open access: yesInternational Journal of Robust and Nonlinear Control, EarlyView.
ABSTRACT In this paper, we investigate initial state privacy protection for discrete‐time nonlinear closed systems. By capturing Riemannian geometric structures inherent in such privacy challenges, we refine the concept of differential privacy through the introduction of an initial state adjacency set based on Riemannian distances.
Le Liu, Yu Kawano, Antai Xie, Ming Cao
wiley   +1 more source

Resilient Control Design of the Third-Order Discrete-Time Connected Vehicle Systems Against Cyber-Attacks

open access: yesIEEE Access, 2020
This paper investigates the consensus problems of the third-order discrete-time Connected Vehicle Systems (CVSs) under cyber-attacks. First, the necessary and sufficient conditions for consensus of third-order discrete-time CVSs are derived in the ...
Zeming Li, Ziyuan Li, Yonggui Liu
doaj   +1 more source

Modeling the Thermal Properties of Hydrogen‐Based Direct Reduced Iron Using Computational Thermodynamics and Machine Learning

open access: yessteel research international, EarlyView.
Hydrogen‐based direct reduced iron (H‐DRI) melts differently from scrap and carbon‐bearing DRI. This work combines differential scanning calorimetry experiments, FactSage thermodynamics, and simple composition‐based regression to predict solidus, liquidus, heat capacity, and enthalpy for H‐DRI.
Ankur Agnihotri   +3 more
wiley   +1 more source

A Method for Specifying Complete Signature Randomization and an Algebraic Algorithm Based on It

open access: yesMathematics
To eliminate the limitations of signature randomization in known algebraic algorithms with a hidden group, the security of which is based on the computational complexity of solving large systems of power equations, a method for ensuring complete ...
Alexandr Moldovyan   +3 more
doaj   +1 more source

Measuring the time‐varying market efficiency in the prewar and wartime Japanese stock market, 1924–1943

open access: yesAsia‐Pacific Economic History Review, Volume 65, Issue 1, Page 131-159, March 2025.
Abstract This study examines the adaptive market hypothesis in the prewar and wartime Japanese stock market using a new market capitalization‐weighted price index. First, we find that the degree of market efficiency varies over time and with major historical events. This implies that the hypothesis is supported in this market.
Kenichi Hirayama, Akihiko Noda
wiley   +1 more source

A novel method for developing post-quantum cryptoschemes and a practical signature algorithm [PDF]

open access: yesApplied Computing and Informatics
Purpose – The practical purpose of this research is to propose a candidate for post-quantum signature standard that is free of significant drawback of the finalists of the NIST world competition, which consists in the large size of the signature and the ...
Nikolay Andreevich Moldovyan   +1 more
doaj   +1 more source

Why did Putin invade Ukraine? A theory of degenerate autocracy

open access: yesAmerican Journal of Political Science, EarlyView.
Abstract Many dictatorships end up with a series of disastrous decisions such as Hitler's attack on the Soviet Union or Saddam Hussein's aggression against Kuwait. Even if a certain policy choice is not ultimately fatal for the regime, such as Mao's Big Leap Forward or the Pol Pot's collectivization drive, they typically involve both a miscalculation ...
Georgy Egorov, Konstantin Sonin
wiley   +1 more source

Home - About - Disclaimer - Privacy