Results 61 to 70 of about 10,337 (237)

Every Binary Self-Dual Code Arises From Hilbert Symbols

open access: yes, 2012
In this paper we construct binary self-dual codes using the \'etale cohomology of $\mathbb{Z}/2$ on the spectra of rings of $S$-integers of global fields.
Chinburg, Ted, Zhang, Ying
core   +1 more source

Analytical and Numerical Soliton Solutions of the Shynaray II‐A Equation Using the G′G,1G$$ \left(\frac{G^{\prime }}{G},\frac{1}{G}\right) $$‐Expansion Method and Regularization‐Based Neural Networks

open access: yesMathematical Methods in the Applied Sciences, EarlyView.
ABSTRACT Nonlinear differential equations play a fundamental role in modeling complex physical phenomena across solid‐state physics, hydrodynamics, plasma physics, nonlinear optics, and biological systems. This study focuses on the Shynaray II‐A equation, a relatively less‐explored parametric nonlinear partial differential equation that describes ...
Aamir Farooq   +4 more
wiley   +1 more source

Shape Derivatives of the Eigenvalues of the de Rham Complex for Lipschitz Deformations and Variable Coefficients: Part II

open access: yesMathematical Methods in the Applied Sciences, EarlyView.
ABSTRACT In this second part of our series of papers, we develop an abstract framework suitable for de Rham complexes that depend on a parameter belonging to an arbitrary Banach space. Our primary focus is on spectral perturbation problems and the differentiability of eigenvalues with respect to perturbations of the involved parameters. As a byproduct,
Pier Domenico Lamberti   +2 more
wiley   +1 more source

Neural network with signal parameters featuring for near‐surface velocity model building

open access: yesNear Surface Geophysics, EarlyView.
Abstract This study presents a method that integrates spectral recomposition (SR) with a neural network to improve near‐surface seismic analysis. The approach incorporates SR‐derived wavelet‐timing attributes into a fully convolutional network (FCN) to enhance the characterization of shallow subsurface structures. Field evaluation was conducted using S‐
Nelson Ricardo Coelho Flores Zuniga
wiley   +1 more source

Tightly-Secure Simulation-Sound Quasi-Adaptive NIZK Arguments

open access: yesIEEE Access
Quasi-adaptive non-interactive zero-knowledge (QA-NIZK) arguments are fundamental cryptographic primitives widely used in privacy-preserving technologies such as anonymous credentials, group signatures, e-cash, and blockchain-based applications.
Mojtaba Khalili
doaj   +1 more source

Wilting wildflowers and bummed‐out bees: Climate change threatens US state symbols

open access: yesPeople and Nature, EarlyView.
Abstract Species designated as state symbols in the United States carry cultural importance, embody historical heritage and maintain long‐standing linkages to Indigenous traditions. However, they are threatened by climate change and even face the risk of local or global extinction.
Xuezhen Ge   +3 more
wiley   +1 more source

Integrating identity-based cryptography in IMS service authentication

open access: yes, 2009
Nowadays, the IP Multimedia Subsystem (IMS) is a promising research field. Many ongoing works related to the security and the performances of its employment are presented to the research community. Although, the security and data privacy aspects are very
Abid, Mohamed   +3 more
core   +6 more sources

Reduced‐Order Modeling of Energetic Materials Using Physics‐Aware Recurrent Convolutional Neural Networks in a Latent Space (LatentPARC)

open access: yesPropellants, Explosives, Pyrotechnics, EarlyView.
Physics‐Aware Recurrent Convolutional Neural Networks (PARC) can reliably learn the thermomechanics of energetic materials as a function of morphology. This work introduces LatentPARC, which accelerates PARC by modeling the dynamics in a low‐dimensional latent space.
Zoë J. Gray   +5 more
wiley   +1 more source

Cryptography in the Cloud Computing: the Current State and Logical Tasks

open access: yesБезопасность информационных технологий, 2013
The current state of the cloud computing (CC) information security is analysed and logical problems of storage and data transmission security at CC are allocated.
Sergey Nikolaevich Kyazhin   +1 more
doaj  

A Short Linearly Homomorphic Proxy Signature Scheme

open access: yesIEEE Access, 2018
Linearly homomorphic signature schemes allow the performance of linear computations on authenticated data. They are important primitives for many applications, such as electronic voting, smart grids, electronic health records, and so on.
Qun Lin   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy