Results 71 to 80 of about 31,786 (276)
Poisson statistics via the Chinese Remainder Theorem
32 pages.
Granville, Andrew, Kurlberg, Pär
openaire +3 more sources
Explaining the Origin of Negative Poisson's Ratio in Amorphous Networks With Machine Learning
This review summarizes how machine learning (ML) breaks the “vicious cycle” in designing auxetic amorphous networks. By transitioning from traditional “black‐box” optimization to an interpretable “AI‐Physics” closed‐loop paradigm, ML is shown to not only discover highly optimized structures—such as all‐convex polygon networks—but also unveil hidden ...
Shengyu Lu, Xiangying Shen
wiley +1 more source
Aiming at the problem that vehicles in the vehicular ad-hoc network (VANET) system were vulnerable to malicious attacks when communicating with each other on the public network, a mutual authentication key agreement protocol in the VANET was proposed.A ...
Haibo ZHANG +3 more
doaj +2 more sources
A new chinese remainder algorithm for image-based encryption
In this paper, a novel method for image encryption based on a Generalized Chinese Remainder Theorem (GCRT) is presented. The proposed method is based on the work developed by Jagannathan et al.
Sergio Duarte +2 more
doaj
An efficient and privacy protection group authentication scheme in the industrial internet of things
Industrial Internet of Things (IIoT) integrates the latest information and communication technology with the industrial economy, driving the intelligent transformation of the industry.
Tao Wan, Buhai Shi, Jiongen Xiao
doaj +1 more source
THE USE OF ERROR-CORRECTING CODES FOR THE DIAGNOSIS OF RNS MODULAR PROCESSORS
The article considers the principles of diagnosis modular process-ditch constructed on the basis of residual classes. The analysis methods for error detection using the Chinese remainder theorem.
Nikolay Ivanovich Chervyakov +2 more
doaj
Algorithms for CRT-variant of Approximate Greatest Common Divisor Problem
The approximate greatest common divisor problem (ACD) and its variants have been used to construct many cryptographic primitives. In particular, the variants of the ACD problem based on Chinese remainder theorem (CRT) are being used in the constructions ...
Cheon Jung Hee +4 more
doaj +1 more source
Clock Math — a System for Solving SLEs Exactly [PDF]
In this paper, we present a GPU-accelerated hybrid system that solves ill-conditioned systems of linear equations exactly. Exactly means without rounding errors due to using integer arithmetics. First, we scale floating-point numbers up to integers, then
Hladík , Jakub +2 more
core

