Results 61 to 70 of about 10,337 (237)
Every Binary Self-Dual Code Arises From Hilbert Symbols
In this paper we construct binary self-dual codes using the \'etale cohomology of $\mathbb{Z}/2$ on the spectra of rings of $S$-integers of global fields.
Chinburg, Ted, Zhang, Ying
core +1 more source
ABSTRACT Nonlinear differential equations play a fundamental role in modeling complex physical phenomena across solid‐state physics, hydrodynamics, plasma physics, nonlinear optics, and biological systems. This study focuses on the Shynaray II‐A equation, a relatively less‐explored parametric nonlinear partial differential equation that describes ...
Aamir Farooq +4 more
wiley +1 more source
ABSTRACT In this second part of our series of papers, we develop an abstract framework suitable for de Rham complexes that depend on a parameter belonging to an arbitrary Banach space. Our primary focus is on spectral perturbation problems and the differentiability of eigenvalues with respect to perturbations of the involved parameters. As a byproduct,
Pier Domenico Lamberti +2 more
wiley +1 more source
Neural network with signal parameters featuring for near‐surface velocity model building
Abstract This study presents a method that integrates spectral recomposition (SR) with a neural network to improve near‐surface seismic analysis. The approach incorporates SR‐derived wavelet‐timing attributes into a fully convolutional network (FCN) to enhance the characterization of shallow subsurface structures. Field evaluation was conducted using S‐
Nelson Ricardo Coelho Flores Zuniga
wiley +1 more source
Tightly-Secure Simulation-Sound Quasi-Adaptive NIZK Arguments
Quasi-adaptive non-interactive zero-knowledge (QA-NIZK) arguments are fundamental cryptographic primitives widely used in privacy-preserving technologies such as anonymous credentials, group signatures, e-cash, and blockchain-based applications.
Mojtaba Khalili
doaj +1 more source
Wilting wildflowers and bummed‐out bees: Climate change threatens US state symbols
Abstract Species designated as state symbols in the United States carry cultural importance, embody historical heritage and maintain long‐standing linkages to Indigenous traditions. However, they are threatened by climate change and even face the risk of local or global extinction.
Xuezhen Ge +3 more
wiley +1 more source
Integrating identity-based cryptography in IMS service authentication
Nowadays, the IP Multimedia Subsystem (IMS) is a promising research field. Many ongoing works related to the security and the performances of its employment are presented to the research community. Although, the security and data privacy aspects are very
Abid, Mohamed +3 more
core +6 more sources
Physics‐Aware Recurrent Convolutional Neural Networks (PARC) can reliably learn the thermomechanics of energetic materials as a function of morphology. This work introduces LatentPARC, which accelerates PARC by modeling the dynamics in a low‐dimensional latent space.
Zoë J. Gray +5 more
wiley +1 more source
Cryptography in the Cloud Computing: the Current State and Logical Tasks
The current state of the cloud computing (CC) information security is analysed and logical problems of storage and data transmission security at CC are allocated.
Sergey Nikolaevich Kyazhin +1 more
doaj
A Short Linearly Homomorphic Proxy Signature Scheme
Linearly homomorphic signature schemes allow the performance of linear computations on authenticated data. They are important primitives for many applications, such as electronic voting, smart grids, electronic health records, and so on.
Qun Lin +4 more
doaj +1 more source

