Results 61 to 70 of about 30,832 (233)
Asymptotics for the Spectrum of the Laplacian in Thin Bars with Varying Cross Sections
ABSTRACT We consider spectral problems for the Laplace operator in 3D rod structures with a small cross section of diameter O(ε)$$ O\left(\varepsilon \right) $$, ε$$ \varepsilon $$ being a positive parameter. The boundary conditions are Dirichlet (Neumann, respectively) on the bases of this structure, and Neumann on the lateral boundary.
Pablo Benavent‐Ocejo +2 more
wiley +1 more source
Policy-based encryption schemes from bilinear pairings
The concept of policy-based cryptography is a promising paradigm for trust establishment and authorization in largescale open environments like the Internet and Mobile Networks. It aims at providing a framework for performing cryptographic operations with respect to policies formalized as monotone Boolean expressions written in standard normal forms. A
Walid Bagga, Refik Molva, Stefano Crosta
openaire +3 more sources
ABSTRACT Nonlinear differential equations play a fundamental role in modeling complex physical phenomena across solid‐state physics, hydrodynamics, plasma physics, nonlinear optics, and biological systems. This study focuses on the Shynaray II‐A equation, a relatively less‐explored parametric nonlinear partial differential equation that describes ...
Aamir Farooq +4 more
wiley +1 more source
BV Yang-Mills as a Homotopy Chern-Simons via SFT
We show explicitly how BV Yang-Mills action emerges as a homotopy generalization of Chern-Simons theory from the algebraic constructions arising from String Field Theory.Comment: LaTeX2e, 22 pages, minor revisions, typos corrected, references added ...
Zeitlin, Anton M.
core +1 more source
Efficient Certificateless Signcryption from Bilinear Pairings
Certificateless public key cryptography is an attractive paradigm which combines advantages of both traditional certificate-based and ID-based public key cryptosystems. In this paper, the author formalizes the definition and the security model for certificateless signcryption (CLSC), and proposes a CLSC scheme that is proved to be secure in the random ...
openaire +1 more source
ABSTRACT In this second part of our series of papers, we develop an abstract framework suitable for de Rham complexes that depend on a parameter belonging to an arbitrary Banach space. Our primary focus is on spectral perturbation problems and the differentiability of eigenvalues with respect to perturbations of the involved parameters. As a byproduct,
Pier Domenico Lamberti +2 more
wiley +1 more source
With introduction of smart things into our lives, cloud computing is used in many different areas and changes the communication method. However, cloud computing should guarantee the complete security assurance in terms of privacy protection ...
Demet Cidem Dogan, Huseyin Altindis
doaj +1 more source
Neural network with signal parameters featuring for near‐surface velocity model building
Abstract This study presents a method that integrates spectral recomposition (SR) with a neural network to improve near‐surface seismic analysis. The approach incorporates SR‐derived wavelet‐timing attributes into a fully convolutional network (FCN) to enhance the characterization of shallow subsurface structures. Field evaluation was conducted using S‐
Nelson Ricardo Coelho Flores Zuniga
wiley +1 more source
Every Binary Self-Dual Code Arises From Hilbert Symbols
In this paper we construct binary self-dual codes using the \'etale cohomology of $\mathbb{Z}/2$ on the spectra of rings of $S$-integers of global fields.
Chinburg, Ted, Zhang, Ying
core +1 more source
Wilting wildflowers and bummed‐out bees: Climate change threatens US state symbols
Abstract Species designated as state symbols in the United States carry cultural importance, embody historical heritage and maintain long‐standing linkages to Indigenous traditions. However, they are threatened by climate change and even face the risk of local or global extinction.
Xuezhen Ge +3 more
wiley +1 more source

