Results 21 to 30 of about 3,822,513 (334)

Abductive Coding: Theory Building and Qualitative (Re)Analysis

open access: yesSociological Methods & Research, 2022
Qualitative secondary analysis has generated heated debate regarding the epistemology of qualitative research. We argue that shifting to an abductive approach provides a fruitful avenue for qualitative secondary analysts who are oriented towards theory ...
L. Vila‐Henninger   +7 more
semanticscholar   +1 more source

Non-isometric quantum error correction in gravity

open access: yesJournal of High Energy Physics, 2023
We construct and study an ensemble of non-isometric error correcting codes in a toy model of an evaporating black hole in two-dimensional dilaton gravity. In the preferred bases of Euclidean path integral states in the bulk and Hamiltonian eigenstates in
Arjun Kar
doaj   +1 more source

Improving Hamiltonian encodings with the Gray code [PDF]

open access: yes, 2020
Due to the limitations of present-day quantum hardware, it is especially critical to design algorithms that make the best possible use of available resources.
Olivia Di Matteo   +5 more
semanticscholar   +1 more source

GRASP: The Future?

open access: yesAtoms, 2022
The theoretical foundations of relativistic electronic structure theory within quantum electrodynamics (QED) and the computational basis of the atomic structure code GRASP are briefly surveyed.
Ian Grant, Harry Quiney
doaj   +1 more source

Patched Network and Its Vertex-Edge Metric-Based Dimension

open access: yesIEEE Access, 2023
The p-type networks are designed with the help of CVNET at topo group Cluj and also given support by nano studio. Such networks develop new p-type surfaces and also represent the decorations of the surfaces.
Sidra Bukhari   +3 more
doaj   +1 more source

Design of Anti-Eavesdropping Scheme for SLT-LT Codes Based on Random Symbol Sets

open access: yesIEEE Access, 2022
In recent years, physical layer security technology has provided a new way to solve the problem of secure transmissions in wireless communications from an information theory perspective by using physical layer security coding and the inherent ...
Si Zhang   +3 more
doaj   +1 more source

Cofinality spectrum theorems in model theory, set theory and general topology [PDF]

open access: yes, 2012
We connect and solve two longstanding open problems in quite different areas: the modeltheoretic question of whether SOP2 is maximal in Keisler’s order, and the question from general topology/set theory of whether p = t, the oldest problem on cardinal ...
M. Malliaris, S. Shelah
semanticscholar   +1 more source

An Algorithmic Reduction Theory for Binary Codes: LLL and More

open access: yesIEEE Transactions on Information Theory, 2022
In this article, we propose an adaptation of the algorithmic reduction theory of lattices to binary codes. This includes the celebrated LLL algorithm (Lenstra, Lenstra, Lovasz, 1982), as well as adaptations of associated algorithms such as the Nearest ...
Thomas Debris-Alazard   +2 more
semanticscholar   +1 more source

Reducing the H0 tension with generalized Proca theory [PDF]

open access: yesJournal of Cosmology and Astroparticle Physics, 2020
We investigate the cosmological viability of the generalized proca theory. We first implement the background and linear perturbation equations of motion in the Boltzmann code and then study the constraints on the parameters of the generalized proca ...
A. D. Felice   +3 more
semanticscholar   +1 more source

Contract theory in the amended French civil code and in Qatari Civil code: A comparative study

open access: yesInternational Review of Law, 2021
This paper seeks to determine the relationship between the Qatari Civil Code of 2004 and the French Civil Code; as the Qatari Civil Code is influenced by the provisions of the French Civil Code prior to the 2016 reform concerning the theory of contract ...
فوزي بن أحمد بالكناني
doaj   +2 more sources

Home - About - Disclaimer - Privacy