Results 51 to 60 of about 31,786 (276)

THE GENERAL CHINESE REMAINDER THEOREM

open access: yesInternational Journal of Computing, 2014
The Chinese remainder theorem deals with systems of modular equations. The classical variant requires the modules to be pairwise coprime. In this paper we discuss the general variant, which does not require this restriction on modules. We have selected and implemented several algorithms for the general Chinese remainder theorem.
Sorin Iftene, Florin Chelaru
openaire   +2 more sources

Bioinspired Adaptive Leg‐Claw Enables Robust Perching and Grasping for UAVs

open access: yesAdvanced Science, EarlyView.
Inspired by owl limb morphology and bat roosting behavior, this study presents a bioinspired adaptive leg‐claw mechanism that enables UAVs to perform robust and versatile perching and grasping. The design integrates a four‐link tibial structure, tension‐driven deformable feet, and active control, enabling stable perching on various branches and ...
Tianyu Cheng   +6 more
wiley   +1 more source

CONSTRUCTION OF RESIDUE NUMBER SYSTEM USING DIAGONAL FUNCTION OF SPECIAL TYPE

open access: yesСовременная наука и инновации, 2022
Residue Number System (RNS) is a non-positional number system, which is a promising tool for increasing performance of digital devices. However, because of RNS is non-positional number system, magnitude comparison of numbers in RNS form is impossible, so
N. F. Semyonova   +4 more
doaj  

Algorithm of Information Embedding into Digital Images Based on the Chinese Remainder Theorem for Data Security

open access: yesCryptography, 2020
With the huge transfers of data involved in the modern world, it is both crucial and challenging to maintain the security of data. This paper proposes a novel algorithm of information embedding into digital images that could be used to protect ...
Oleg Evsutin, Kristina Dzhanashia
doaj   +1 more source

A Novel Method of Encryption using Modified RSA Algorithm and Chinese Remainder Theorem [PDF]

open access: yes, 2009
Security can only be as strong as the weakest link. In this world of cryptography, it is now well established, that the weakest link lies in the implementation of cryptographic algorithms.
Nayak, Partha Prittam, Patel, Sangeeta
core  

New High‐Tc Charge‐Transfer Multiferroicity in the Quasi‐2D Antiferromagnet CrSbS3

open access: yesAdvanced Science, EarlyView.
ABSTRACT Low‐dimensional magnets, particularly 2D systems, offer a rich platform for realizing unconventional multiferroic mechanisms, especially when multiple polarization channels coexist. In the quasi‐2D antiferromagnet CrSbS3, which crystallizes in the centrosymmetric orthorhombic space group Pnma and orders magnetically at TN ≈ 90 K, two ...
Hung‐Cheng Wu   +17 more
wiley   +1 more source

Modular polynomials via isogeny volcanoes

open access: yes, 2012
We present a new algorithm to compute the classical modular polynomial Phi_n in the rings Z[X,Y] and (Z/mZ)[X,Y], for a prime n and any positive integer m. Our approach uses the graph of n-isogenies to efficiently compute Phi_n mod p for many primes p of
Broker, Reinier   +2 more
core   +1 more source

Design of Optical Transducer for Recognition of Biomolecular Interactions between Bacterial Lipopolysaccharides and Amino Acids

open access: yesAdvanced Science, EarlyView.
A deep comprehension of biomolecular phenomena at interfaces is significant with their fundamental and practical importance. Our experimental and theoretical investigations reveal that specific amino acids (glutamic acid and aspartic acid) exhibit an orientational coupling with liquid crystals, which can recognize and optically report the interfacial ...
Yena Choi   +10 more
wiley   +1 more source

HYBRIDIZING HENSEL’S LEMMA, FUNDAMENTAL THEOREM OF ARITHMETIC, AND CHINESE REMAINDER THEOREM FOR SOLVING POLYNOMIAL CONGRUENCES

open access: yesBarekeng
Polynomial congruence can be solved by applying Hensel’s Lemma. However, Hensel’s Lemma itself does not apply to solving generalized polynomial congruences. The purpose of this research is to determine the recursive formula for the solution of polynomial
Eka Oktaviansyah   +2 more
doaj   +1 more source

Prediction of Structural Stability of Layered Oxide Cathode Materials: Combination of Machine Learning and Ab Initio Thermodynamics

open access: yesAdvanced Energy Materials, EarlyView.
In this work, we developed a phase‐stability predictor by combining machine learning and ab initio thermodynamics approaches, and identified the key factors determining the favorable phase for a given composition. Specifically, a lower TM ionic potential, higher Na content, and higher mixing entropy favor the O3 phase.
Liang‐Ting Wu   +6 more
wiley   +1 more source

Home - About - Disclaimer - Privacy