Results 61 to 70 of about 268,307 (331)

Topological representation zeta functions of unipotent groups

open access: yes, 2015
Inspired by work surrounding Igusa's local zeta function, we introduce topological representation zeta functions of unipotent algebraic groups over number fields.
Rossmann, Tobias
core   +1 more source

Review of Memristors for In‐Memory Computing and Spiking Neural Networks

open access: yesAdvanced Intelligent Systems, EarlyView.
Memristors uniquely enable energy‐efficient, brain‐inspired computing by acting as both memory and synaptic elements. This review highlights their physical mechanisms, integration in crossbar arrays, and role in spiking neural networks. Key challenges, including variability, relaxation, and stochastic switching, are discussed, alongside emerging ...
Mostafa Shooshtari   +2 more
wiley   +1 more source

Nonsplit conics in the reduction of an arithmetic curve

open access: yes, 2021
For an algebraic function field $F/K$ and a discrete valuation $v$ of $K$ with perfect residue field $k$, we bound the number of discrete valuations on $F$ extending $v$ whose residue fields are algebraic function fields of genus zero over $k$ but not ...
Becher, Karim Johannes, Grimm, David
core  

Universal Entanglement and an Information‐Complete Quantum Theory

open access: yesAdvanced Physics Research, EarlyView.
This Perspective summarize an informationcomplete quantum theory which describes a fully quantum world without any classical systems and concepts. Here spacetime/gravity, having to be a physical quantum system, universally entangles matter (matter fermions and their gauge fields) as an indivisible trinity, and encodes information‐complete physical ...
Zeng‐Bing Chen
wiley   +1 more source

Acoustic realization of projective mirror Chern insulators

open access: yesCommunications Physics, 2023
Symmetry plays a key role in classifying topological phases. Recent theory shows that in the presence of gauge fields, the algebraic structure of crystalline symmetries needs to be projectively represented, which brings extra chance for topological ...
Tianzi Li   +3 more
doaj   +1 more source

Efficient Dynamics: Reduced‐Order Modeling of the Time‐Dependent Schrödinger Equation

open access: yesAdvanced Physics Research, EarlyView.
Reduced‐order modeling (ROM) approaches for the time‐dependent Schrödinger equation are investigated, highlighting their ability to simulate quantum dynamics efficiently. Proper Orthogonal Decomposition, Dynamic Mode Decomposition, and Reduced Basis Methods are compared across canonical systems and extended to higher dimensions.
Kolade M. Owolabi
wiley   +1 more source

On the quantum security of high-dimensional RSA protocol

open access: yesJournal of Mathematical Cryptology
The idea of extending the classical RSA protocol using algebraic number fields was introduced by Takagi and Naito (Construction of RSA cryptosystem over the algebraic field using ideal theory and investigation of its security.
Rahmani Nour-eddine   +3 more
doaj   +1 more source

Deterministic Algorithms for Solving Boolean Polynomial Equations Based on Channel Coding Theory

open access: yesIEEE Access, 2020
Solving the satisfiability problems of Boolean polynomial equations is still an open challenge in the fields of mathematics and computer science.
Guangfu Wu   +5 more
doaj   +1 more source

Computing zeta functions via p-adic cohomology

open access: yes, 2004
We survey some recent applications of p-adic cohomology to machine computation of zeta functions of algebraic varieties over finite fields of small characteristic, and suggest some new avenues for further exploration.Comment: 18 pages; to appear in the ...
Kedlaya, Kiran S.
core   +1 more source

A compatibility criterion for optimal control and information aggregation in hierarchical network systems

open access: yesAsian Journal of Control, EarlyView.
Abstract Large swarms often adopt a hierarchical network structure that incorporates information aggregation. Although this approach offers significant advantages in terms of communication efficiency and computational complexity, it can also lead to degradation due to information constraints.
Kento Fujita, Daisuke Tsubakino
wiley   +1 more source

Home - About - Disclaimer - Privacy