Results 11 to 20 of about 1,063,587 (296)

Abductive Coding: Theory Building and Qualitative (Re)Analysis

open access: yesSociological Methods & Research, 2022
Qualitative secondary analysis has generated heated debate regarding the epistemology of qualitative research. We argue that shifting to an abductive approach provides a fruitful avenue for qualitative secondary analysts who are oriented towards theory ...
L. Vila‐Henninger   +7 more
semanticscholar   +1 more source

GRASP: The Future?

open access: yesAtoms, 2022
The theoretical foundations of relativistic electronic structure theory within quantum electrodynamics (QED) and the computational basis of the atomic structure code GRASP are briefly surveyed.
Ian Grant, Harry Quiney
doaj   +1 more source

Implementation of Relativistic Coupled Cluster Theory for Massively Parallel GPU-Accelerated Computing Architectures [PDF]

open access: yesJournal of Chemical Theory and Computation, 2021
In this paper, we report reimplementation of the core algorithms of relativistic coupled cluster theory aimed at modern heterogeneous high-performance computational infrastructures.
Johann V Pototschnig   +7 more
semanticscholar   +1 more source

Patched Network and Its Vertex-Edge Metric-Based Dimension

open access: yesIEEE Access, 2023
The p-type networks are designed with the help of CVNET at topo group Cluj and also given support by nano studio. Such networks develop new p-type surfaces and also represent the decorations of the surfaces.
Sidra Bukhari   +3 more
doaj   +1 more source

Design of Anti-Eavesdropping Scheme for SLT-LT Codes Based on Random Symbol Sets

open access: yesIEEE Access, 2022
In recent years, physical layer security technology has provided a new way to solve the problem of secure transmissions in wireless communications from an information theory perspective by using physical layer security coding and the inherent ...
Si Zhang   +3 more
doaj   +1 more source

Improving Hamiltonian encodings with the Gray code [PDF]

open access: yes, 2020
Due to the limitations of present-day quantum hardware, it is especially critical to design algorithms that make the best possible use of available resources.
Olivia Di Matteo   +5 more
semanticscholar   +1 more source

Cofinality spectrum theorems in model theory, set theory and general topology [PDF]

open access: yes, 2012
We connect and solve two longstanding open problems in quite different areas: the modeltheoretic question of whether SOP2 is maximal in Keisler’s order, and the question from general topology/set theory of whether p = t, the oldest problem on cardinal ...
M. Malliaris, S. Shelah
semanticscholar   +1 more source

Contract theory in the amended French civil code and in Qatari Civil code: A comparative study

open access: yesInternational Review of Law, 2021
This paper seeks to determine the relationship between the Qatari Civil Code of 2004 and the French Civil Code; as the Qatari Civil Code is influenced by the provisions of the French Civil Code prior to the 2016 reform concerning the theory of contract ...
Faouzi Belknani
doaj   +2 more sources

Locally-Constrained de Bruijn Codes: Properties, Enumeration, Code Constructions, and Applications

open access: yesIEEE Transactions on Information Theory, 2021
The de Bruijn graph, its sequences, and their various generalizations, have found many applications in information theory, including many new ones in the last decade. In this paper, motivated by a coding problem for emerging memory technologies, a set of
Y. Chee   +6 more
semanticscholar   +1 more source

Noncommutative coding theory and algebraic sets for skew PBW extensions

open access: yes, 2023
arXiv admin note: text overlap with arXiv:2106 ...
Lezama, Oswaldo, Gallego, Claudia
openaire   +2 more sources

Home - About - Disclaimer - Privacy