Results 51 to 60 of about 10,250 (292)

Spectral‐Integrated Thermal Absorption Model for Broadband Laser‐Protective Reflectors Under Supercontinuum Irradiation

open access: yesAdvanced Science, EarlyView.
A universal laser absorption model based on spectral integration enables the design of ultrabroadband dielectric multilayer reflectors for laser protection. The model reveals exponential decay of absorption characterized by two coefficients, and a design that prioritizes short‐wavelength reflection minimizes heating.
Yukang Feng   +8 more
wiley   +1 more source

THE GENERAL CHINESE REMAINDER THEOREM

open access: yesInternational Journal of Computing, 2014
The Chinese remainder theorem deals with systems of modular equations. The classical variant requires the modules to be pairwise coprime. In this paper we discuss the general variant, which does not require this restriction on modules. We have selected and implemented several algorithms for the general Chinese remainder theorem.
Sorin Iftene, Florin Chelaru
openaire   +2 more sources

cuteHap: Haplotype‐Aware Structural Variant Detection in Phased Long‐Read Sequencing Data

open access: yesAdvanced Science, EarlyView.
cuteHap is a haplotype‐aware structural variant detection method designed for phased long‐read sequencing. By employing self‐adaptive clustering and credibility‐prioritized beam search algorithms, cuteHap generates accurate haplotype‐resolved calls and outperforms state‐of‐the‐art tools.
Shuqi Cao   +7 more
wiley   +1 more source

CONSTRUCTION OF RESIDUE NUMBER SYSTEM USING DIAGONAL FUNCTION OF SPECIAL TYPE

open access: yesСовременная наука и инновации, 2022
Residue Number System (RNS) is a non-positional number system, which is a promising tool for increasing performance of digital devices. However, because of RNS is non-positional number system, magnitude comparison of numbers in RNS form is impossible, so
N. F. Semyonova   +4 more
doaj  

Frequency Estimator Based on Spectrum Correction and Remainder Sifting for Undersampled Real-Valued Waveforms

open access: yesIEEE Access, 2019
Frequency estimation of undersampled waveforms receives increasing attention in communication, radar signal processing, instrumentation and measurements, and so on.
Xiangdong Huang   +3 more
doaj   +1 more source

Algorithm of Information Embedding into Digital Images Based on the Chinese Remainder Theorem for Data Security

open access: yesCryptography, 2020
With the huge transfers of data involved in the modern world, it is both crucial and challenging to maintain the security of data. This paper proposes a novel algorithm of information embedding into digital images that could be used to protect ...
Oleg Evsutin, Kristina Dzhanashia
doaj   +1 more source

Critical Limitations in Cryogenic Laser Cooling of Solids: Symmetry‐Related Fluorescence Trapping and Condensation‐Induced Parasitic Heating

open access: yesAdvanced Science, EarlyView.
This study uncovers two overlooked bottlenecks in cryogenic laser cooling of solids: symmetry‐driven fluorescence trapping and water vapor condensation. We demonstrate that breaking sample symmetry enhances fluorescence escape, while condensation dominates parasitic heating below 135 K.
Biao Zhong   +5 more
wiley   +1 more source

A Fully Self‐Powered Digital Wearable System for the Auxiliary Treatment of Plantar Fasciitis

open access: yesAdvanced Science, EarlyView.
This study reports a system‐level fully self‐powered digital wearable system (FS‐DWS) for the auxiliary treatment of plantar fasciitis. By integrating arch support, energy harvesting, wearable sensing, and machine learning‐driven closed‐loop visualized feedback, the system enables effective plantar pressure reduction and self‐powered, real‐time plantar
Jiacheng Hou   +10 more
wiley   +1 more source

HYBRIDIZING HENSEL’S LEMMA, FUNDAMENTAL THEOREM OF ARITHMETIC, AND CHINESE REMAINDER THEOREM FOR SOLVING POLYNOMIAL CONGRUENCES

open access: yesBarekeng
Polynomial congruence can be solved by applying Hensel’s Lemma. However, Hensel’s Lemma itself does not apply to solving generalized polynomial congruences. The purpose of this research is to determine the recursive formula for the solution of polynomial
Eka Oktaviansyah   +2 more
doaj   +1 more source

Verifiable (n,n) Threshold Quantum Secret Sharing Scheme [PDF]

open access: yesJisuanji gongcheng, 2017
This paper constructs a class of verifiable secret sharing scheme based on Chinese Remainder Theorem and Bell states.In the distribution phase,Alice distributes the shares to the participants through the quantum secure channel.In the recovery phase,Alice
MA Min,LI Zhihui,XU Tingting
doaj   +1 more source

Home - About - Disclaimer - Privacy