Results 41 to 50 of about 635,864 (319)

On novel security systems based on the 2-cyclic refined integers and the foundations of 2-cyclic refined number theory [PDF]

open access: yesJournal of Fuzzy Extension and Applications
Integers play a basic role in the structures of asymmetric crypto-algorithms. Many famous public key crypto-schemes use the basics of number theory to share keys and decrypt and encrypt messages and multimedia.
Mohammad Abobala   +2 more
doaj   +1 more source

On knots in algebraic number theory.

open access: yesJournal für die reine und angewandte Mathematik (Crelles Journal), 1979
Wolfram Jehne
openaire   +3 more sources

Proof in C17 Algebra

open access: yesPhilosophia Scientiæ, 2005
This paper considers the birth of algebraic proof by looking at the works of Cardano, Viète, Harriot and Pell. The transition from geometric to algebraic proof was mediated by appeals to the Eudoxan theory of proportions in book V of Euclid.
Brendan Larvor
doaj   +1 more source

Data‐driven forecasting of ship motions in waves using machine learning and dynamic mode decomposition

open access: yesInternational Journal of Adaptive Control and Signal Processing, EarlyView.
Summary Data‐driven forecasting of ship motions in waves is investigated through feedforward and recurrent neural networks as well as dynamic mode decomposition. The goal is to predict future ship motion variables based on past data collected on the field, using equation‐free approaches.
Matteo Diez   +2 more
wiley   +1 more source

A Q‐Learning Algorithm to Solve the Two‐Player Zero‐Sum Game Problem for Nonlinear Systems

open access: yesInternational Journal of Adaptive Control and Signal Processing, Volume 39, Issue 3, Page 566-581, March 2025.
A Q‐learning algorithm to solve the two‐player zero‐sum game problem for nonlinear systems. ABSTRACT This paper deals with the two‐player zero‐sum game problem, which is a bounded L2$$ {L}_2 $$‐gain robust control problem. Finding an analytical solution to the complex Hamilton‐Jacobi‐Issacs (HJI) equation is a challenging task.
Afreen Islam   +2 more
wiley   +1 more source

The nilpotent structure of open-closed string field theory

open access: yesJournal of High Energy Physics, 2023
In this note we revisit the homotopy-algebraic structure of oriented bosonic open-closed string field theory and we give a new compact formulation in terms of a single cyclic open-closed co-derivation which defines a single nilpotent structure describing
Carlo Maccaferri   +2 more
doaj   +1 more source

The analytic theory of algebraic numbers [PDF]

open access: yesBulletin of the American Mathematical Society, 1975
1. The basics of algebraic number theory. An algebraic number field is a field K = Q(a) where a is a zero of an irreducible (over Q) polynomial f(x) with integral coefficients. The degree of K, which we denote by n = n(K) = [K:Q], is the degree of ƒ(%). We write the roots of /(x) = 0 as a, a, • • • ,a ( n ) m such a way that for l^j^r1 = r1(K), a Q) is
openaire   +3 more sources

Hydrogel‐Based Capacitive Sensor Model for Ammonium Monitoring in Aquaculture

open access: yesAdvanced Engineering Materials, EarlyView.
Traditional techniques for monitoring aquaculture water quality, particularly ammonium levels, harm fish. This work presents a novel capacitive sensor with an ionic hydrogel transducer to monitor ammonium concentration in real time based on the ammonium‐induced hydrogel dissociation and osmotic pressure. Monitoring aquaculture water quality, especially
Mohammad Mirzaee   +3 more
wiley   +1 more source

Soft‐Layered Composites with Wrinkling‐Activated Multi‐Linear Elastic Behavior, Stress Mitigation, and Enhanced Strain Energy Storage

open access: yesAdvanced Engineering Materials, EarlyView.
In this study, exciting new bi‐/multi‐linear elastic behavior of soft elastic composites that accompany the activation of wrinkling in the embedded interfacial layers is analyzed. The new features and performance of these composite materials, including dramatic enhancements in energy storage, can be tailored by the concentration of interfacial layers ...
Narges Kaynia   +2 more
wiley   +1 more source

On solving norm equations in global function fields

open access: yesJournal of Mathematical Cryptology, 2009
The potential of solving norm equations is crucial for a variety of applications of algebraic number theory, especially in cryptography. In this article we develop general effective methods for that task in global function fields for the first time.
Gaál István, Pohst Michael E.
doaj   +1 more source

Home - About - Disclaimer - Privacy