Results 71 to 80 of about 31,786 (276)

Poisson statistics via the Chinese Remainder Theorem

open access: yesAdvances in Mathematics, 2008
32 pages.
Granville, Andrew, Kurlberg, Pär
openaire   +3 more sources

Explaining the Origin of Negative Poisson's Ratio in Amorphous Networks With Machine Learning

open access: yesAdvanced Intelligent Discovery, EarlyView.
This review summarizes how machine learning (ML) breaks the “vicious cycle” in designing auxetic amorphous networks. By transitioning from traditional “black‐box” optimization to an interpretable “AI‐Physics” closed‐loop paradigm, ML is shown to not only discover highly optimized structures—such as all‐convex polygon networks—but also unveil hidden ...
Shengyu Lu, Xiangying Shen
wiley   +1 more source

Intra-group mutual authentication key agreement protocol based on Chinese remainder theorem in VANET system

open access: yesTongxin xuebao, 2022
Aiming at the problem that vehicles in the vehicular ad-hoc network (VANET) system were vulnerable to malicious attacks when communicating with each other on the public network, a mutual authentication key agreement protocol in the VANET was proposed.A ...
Haibo ZHANG   +3 more
doaj   +2 more sources

A new chinese remainder algorithm for image-based encryption

open access: yesRevista Colombiana de Computación, 2009
In this paper, a novel method for image encryption based on a Generalized Chinese Remainder Theorem (GCRT) is presented. The proposed method is based on the work developed by Jagannathan et al.
Sergio Duarte   +2 more
doaj  

An efficient and privacy protection group authentication scheme in the industrial internet of things

open access: yesFrontiers in Physics
Industrial Internet of Things (IIoT) integrates the latest information and communication technology with the industrial economy, driving the intelligent transformation of the industry.
Tao Wan, Buhai Shi, Jiongen Xiao
doaj   +1 more source

THE USE OF ERROR-CORRECTING CODES FOR THE DIAGNOSIS OF RNS MODULAR PROCESSORS

open access: yesНаука. Инновации. Технологии, 2022
The article considers the principles of diagnosis modular process-ditch constructed on the basis of residual classes. The analysis methods for error detection using the Chinese remainder theorem.
Nikolay Ivanovich Chervyakov   +2 more
doaj  

Algorithms for CRT-variant of Approximate Greatest Common Divisor Problem

open access: yesJournal of Mathematical Cryptology, 2020
The approximate greatest common divisor problem (ACD) and its variants have been used to construct many cryptographic primitives. In particular, the variants of the ACD problem based on Chinese remainder theorem (CRT) are being used in the constructions ...
Cheon Jung Hee   +4 more
doaj   +1 more source

Clock Math — a System for Solving SLEs Exactly [PDF]

open access: yes, 2017
In this paper, we present a GPU-accelerated hybrid system that solves ill-conditioned systems of linear equations exactly. Exactly means without rounding errors due to using integer arithmetics. First, we scale floating-point numbers up to integers, then
Hladík , Jakub   +2 more
core  

Robustness in Chinese Remainder Theorem

open access: yes, 2017
12 ...
Xiao, Hanshen   +3 more
openaire   +2 more sources

Home - About - Disclaimer - Privacy