Results 91 to 100 of about 385,070 (322)

Beyond the Non‐Hermitian Skin Effect: Scaling‐Controlled Topology from Exceptional‐Bound Bands

open access: yesAdvanced Science, EarlyView.
ABSTRACT We establish a novel mechanism for topological transitions in non‐Hermitian systems that are controlled by the system size. Based on a new paradigm known as exceptional‐bound (EB) band engineering, its mechanism hinges on the unique critical scaling behavior near an exceptional point, totally unrelated to the well‐known non‐Hermitian skin ...
Mengjie Yang, Ching Hua Lee
wiley   +1 more source

Quadratic algebras with Ext algebras generated in two degrees

open access: yesJournal of Pure and Applied Algebra, 2010
We show that there exist non-Koszul graded algebras that appear to be Koszul up to any given cohomological degree. For any integer m>2 we exhibit a non-commutative quadratic algebra for which the corresponding bigraded Yoneda algebra is generated in degrees (1,1) and (m,m+1).
openaire   +2 more sources

Distinct Biotypes of Visual Perception in Major Depressive Disorder

open access: yesAdvanced Science, EarlyView.
In a discover dataset (272 acute MDD patients), this work identifies a novel depression biotype characterized by impaired visual motion perception, using machine learning clustering. An independent dataset confirms the robustness of this biotype through cross‐validation and demonstrates its generalizability.
Zhuoran Cai   +13 more
wiley   +1 more source

Review of algebraic attacks on stream ciphers

open access: yesTongxin xuebao, 2006
The basic theory and realizing methods of algebraic attacks on stream ciphers are presented.Then the algebraic attacks on stream ciphers with linear feedback shift register and the efficient techniques to decrease the degree of the nonlinear equations ...
ZHANG Long1, WU Wen-ling2, WEN Qiao-yan1
doaj   +2 more sources

Differentially 4-Uniform Permutations with the Best Known Nonlinearity from Butterflies

open access: yesIACR Transactions on Symmetric Cryptology, 2017
Many block ciphers use permutations defined over the finite field F22k with low differential uniformity, high nonlinearity, and high algebraic degree to provide confusion. Due to the lack of knowledge about the existence of almost perfect nonlinear (APN)
Shihui Fu, Xiutao Feng, Baofeng Wu
doaj   +1 more source

Modeling and Verification of 1/f Noise Mechanisms in FAPbBr3 Single‐Crystal X‐Ray Detectors

open access: yesAdvanced Electronic Materials, EarlyView.
We demonstratethat surface‐trap‐induced carrier number fluctuations are the dominantmechanism in FAPbBr3 Schottky devices, a conclusion supported by thedistinct defect profiles revealed by Drive‐Level Capacitance Profiling (DLCP). Throughnoise contribution decomposition, it is found that the 1/f noise of thedetector is the key noise source affecting ...
Zhongyu Yang   +6 more
wiley   +1 more source

Denumerability of the Algebraic Numbers

open access: yesDavao Research Journal, 2000
An algebraic number is a real number that is a root of a polynomial equation anXn + an-1Xn-1…+a0 where ai are integers. In this paper, using the fact that a polynomial equation of degree n has at most n roots, together with some results, the ...
Marleonie Bauyot
doaj   +1 more source

Corrigendum: Similarity degree of Fourier algebras

open access: yesJournal of Functional Analysis, 2019
6 ...
Hun Hee Lee, Ebrahim Samei, Nico Spronk
openaire   +3 more sources

Low‐Power Control Of Resistance Switching Transitions in First‐Order Memristors

open access: yesAdvanced Electronic Materials, EarlyView.
Joule losses are a serious concern in modern integrated circuit design. In this regard, minimizing the energy necessary for programming memristors should be handled with care. This manuscript presents an optimal control framework, allowing to derive energy‐efficient programming voltage protocols for resistance switching devices. Following this approach,
Valeriy A. Slipko   +3 more
wiley   +1 more source

Home - About - Disclaimer - Privacy