Results 41 to 50 of about 1,121,268 (317)
A construction of the polylogarithm motive [PDF]
Classical polylogarithms give rise to a variation of mixed Hodge-Tate structures on the punctured projective line $S=\mathbb{P}^1\setminus \{0, 1, \infty\}$, which is an extension of the symmetric power of the Kummer variation by a trivial variation.
Clément Dupont, Javier Fresán
doaj +1 more source
ALGEBRAIC CRYPTANALYSIS ON NTRU-HPS AND NTRU-HRSS
NTRU is a lattice-based public-key cryptosystem designed by Hoffstein, Pipher, and Silverman in 1996. NTRU published on Algorithmic Number Theory Symposium (ANTS) in 1998.
Fadila Paradise, Kiki Ariyanti Sugeng
doaj +1 more source
An analogue of Bauer’s theorem for closed orbits of skew products [PDF]
In this article we prove an analogue of Bauer’s theorem from algebraic number theory in the context of hyperbolic ...
Parry, William, Pollicott, Mark
core +2 more sources
Quantum algorithms for problems in number theory, algebraic geometry, and group theory
Quantum computers can execute algorithms that sometimes dramatically outperform classical computation. Undoubtedly the best-known example of this is Shor's discovery of an efficient quantum algorithm for factoring integers, whereas the same problem ...
Sasaki, Yoshitaka, van Dam, Wim
core +1 more source
Altered Dynamic Functional Network Connectivity in Post‐Stroke Aphasia
ABSTRACT Objective Previous studies examining post‐stroke aphasia (PSA) patients via resting‐state functional magnetic resonance imaging (rs‐fMRI) have predominantly focused on static functional connectivity. In contrast, the current investigation aims to elucidate the alterations in dynamic functional network connectivity (dFNC) among PSA patients ...
Guihua Xu +6 more
wiley +1 more source
On novel security systems based on the 2-cyclic refined integers and the foundations of 2-cyclic refined number theory [PDF]
Integers play a basic role in the structures of asymmetric crypto-algorithms. Many famous public key crypto-schemes use the basics of number theory to share keys and decrypt and encrypt messages and multimedia.
Mohammad Abobala +2 more
doaj +1 more source
A Q‐Learning Algorithm to Solve the Two‐Player Zero‐Sum Game Problem for Nonlinear Systems
A Q‐learning algorithm to solve the two‐player zero‐sum game problem for nonlinear systems. ABSTRACT This paper deals with the two‐player zero‐sum game problem, which is a bounded L2$$ {L}_2 $$‐gain robust control problem. Finding an analytical solution to the complex Hamilton‐Jacobi‐Issacs (HJI) equation is a challenging task.
Afreen Islam +2 more
wiley +1 more source
Unprecedented Spin‐Lifetime of Itinerant Electrons in Natural Graphite Crystals
Graphite exhibits extraordinary spintronic potential, with electron spin lifetimes reaching 1,000 ns at room temperature ‐ over 100 times longer than graphene‐based devices. Magnetic resonance spectroscopy reveals strong anisotropy: out‐of‐plane spins live 50 times longer than their in‐plane counterparts.
Bence G. Márkus +5 more
wiley +1 more source
This paper considers the birth of algebraic proof by looking at the works of Cardano, Viète, Harriot and Pell. The transition from geometric to algebraic proof was mediated by appeals to the Eudoxan theory of proportions in book V of Euclid.
Brendan Larvor
doaj +1 more source
Spatiotemporally Resolved Orbital Hall Effect in a Topological Semimetal
Real‐space mapping of orbital angular momentum (OAM) transport is achieved using contact‐free polarimetric terahertz spectroscopy. This principle is applied to the topological semimetal Td‐WTe2, revealing the spatial separation of electrons into two distinct regions characterized by opposite out‐of‐plane OAM (±Lz).
Byung Cheol Park +8 more
wiley +1 more source

