Results 11 to 20 of about 26,861 (248)

Enumeration of balanced ternary designs

open access: yesDiscrete Applied Mathematics, 2004
A \((V,B; \rho_1,\rho_2, R; K,\Lambda)\) balanced ternary design consists of a pair \(({\mathcal V}, {\mathcal B})\), where \({\mathcal V}\) is a \(V\)-set of points and \({\mathcal B}\) is a collection of \(B\) \(K\)-multisubsets of \({\mathcal V}\), called blocks, such that each point appears a total of \(R\) times in the blocks with no block ...
Kaski, Petteri, Östergård, Patric R.J
openaire   +2 more sources

Epitaxial designs for maximizing efficiency in resonant tunnelling diode based terahertz emitters [PDF]

open access: yes, 2018
We discuss the modelling of high current density InGaAs/AlAs/InP resonant tunneling diodes to maximize their efficiency as THz emitters. A figure of merit which contributes to the wall plug efficiency, the intrinsic resonator efficiency, is used for the ...
Baba, Răzvan   +3 more
core   +1 more source

Schaefer's theorem for graphs [PDF]

open access: yes, 2015
Schaefer's theorem is a complexity classification result for so-called Boolean constraint satisfaction problems: it states that every Boolean constraint satisfaction problem is either contained in one out of six classes and can be solved in polynomial ...
Bodirsky, Manuel, Pinsker, Michael
core   +2 more sources

Constructions of balanced ternary designs [PDF]

open access: yesJournal of the Australian Mathematical Society. Series A. Pure Mathematics and Statistics, 1990
AbstractA construction for balanced ternary designs is given. Based on the designs so obtained, a construction of partially balanced ternary designs is given, which gives balanced ternary designs and series of symmetric balanced ternary designs in special cases.
openaire   +1 more source

Group Divisible Codes and Their Application in the Construction of Optimal Constant-Composition Codes of Weight Three [PDF]

open access: yes, 2008
The concept of group divisible codes, a generalization of group divisible designs with constant block size, is introduced in this paper. This new class of codes is shown to be useful in recursive constructions for constant-weight and constant-composition
Chee, Yeow Meng   +2 more
core   +1 more source

About Some Properties and Constructions of Experimental Designs

open access: yesActa Universitatis Lodziensis. Folia Oeconomica, 2016
In this paper, we consider the problems related to the determining plan of the experiment performed according to the model of the chemical balance weighing design under additional assumption that the experimental errors are equally negatively correlated.
Bronisław Ceranka, Małgorzata Graczyk
doaj   +1 more source

Mechanisms of High Temperature Degradation of Thermal Barrier Coatings. [PDF]

open access: yes, 2009
Thermal barrier coatings (TBCs) are crucial for increasing the turbine inlet temperature (and hence efficiency) of gas turbine engines. The thesis describes PhD research aimed at improving understanding of the thermal cycling failure mechanisms of ...
Wu, Rudder T.C., Wu, Rudder T.C.
core   +1 more source

Ternary Syndrome Decoding with Large Weight [PDF]

open access: yes, 2019
The Syndrome Decoding problem is at the core of many code-based cryptosystems. In this paper, we study ternary Syndrome Decoding in large weight. This problem has been introduced in the Wave signature scheme but has never been thoroughly studied.
A Becker   +17 more
core   +4 more sources

Additive mixture effects of estrogenic chemicals in human cell-based assays can be influenced by inclusion of chemicals with differing effect profiles [PDF]

open access: yes, 2012
Copyright @ 2012 The Authors. This is an open-access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and 85 reproduction in any medium, provided the original author and source
Aditya Bhushan Pant   +3 more
core   +2 more sources

Optimization of Tree Modes for Parallel Hash Functions: A Case Study [PDF]

open access: yes, 2017
This paper focuses on parallel hash functions based on tree modes of operation for an inner Variable-Input-Length function. This inner function can be either a single-block-length (SBL) and prefix-free MD hash function, or a sponge-based hash function ...
Atighehchi, Kevin, Rolland, Robert
core   +1 more source

Home - About - Disclaimer - Privacy