Results 31 to 40 of about 150,415 (331)
Abstract Medium‐voltage DC (MVDC) electric railway systems have several advantages over conventional DC and AC railway electrification systems. These advantages include higher capacity, possibility of connecting to power networks at lower voltage, removal of neutral sections, smaller line voltage drops, and longer distances between traction power ...
Sina Sharifi+4 more
wiley +1 more source
6 pages, Latex, one new chapter and a new contributing author ...
Aste, Andreas, Chung, Won Sang
openaire +5 more sources
Of Commutators and Jacobians [PDF]
I discuss the prescribed Jacobian equation $Ju=\det\nabla u=f$ for an unknown vector-function $u$, and the connection of this problem to the boundedness of commutators of multiplication operators with singular integrals in general, and with the Beurling operator in particular. A conjecture of T. Iwaniec regarding the solvability for general datum $f\in
openaire +4 more sources
On Commuting and Noncommuting Complexes [PDF]
In this paper we study various simplicial complexes associated to the commutative structure of a finite group G. We define NC(G) (resp. C(G)) as the complex associated to the poset of pairwise non-commuting (resp. commuting) sets in G. We observe that NC(G) has only one positive dimensional connected component, which we call BNC(G), and we prove that ...
Jonathan Pakianathan, Ergün Yalçın
openaire +2 more sources
Eulerian dynamics with a commutator forcing II: Flocking [PDF]
We continue our study of one-dimensional class of Euler equations, introduced in [ 11 ], driven by a forcing with a commutator structure of the form \begin{document} $[{\mathcal L}_φ, u](ρ)$ \end{document} , where \begin{document} $u$ \end{document} is ...
R. Shvydkoy, E. Tadmor
semanticscholar +1 more source
T‐depth reduction method for efficient SHA‐256 quantum circuit construction
Abstract To perform a quantum brute force attack on a cryptosystem based on Grover's algorithm, it is necessary to implement a quantum circuit of the cryptographic algorithm. Therefore, an efficient quantum circuit design of a given cryptographic algorithm is essential, especially in terms of quantum security analysis, and it is well known that T‐depth
Jongheon Lee+3 more
wiley +1 more source
A comprehensive analytical description of the asymmetric active snubber
Abstract Power modules for several hundred amperes suffer from a high stray inductance compared to discrete setups at similar current density. The use of silicon carbide in such modules is beneficial but due to the high stray inductance, the switching speed must be reduced to keep the voltage overshoot below breakdown voltage.
Michael Schlüter, Martin Pfost
wiley +1 more source
The Sigma Commutator from Lattice QCD [PDF]
As a direct source of information on chiral symmetry breaking within QCD, the sigma commutator is of considerable importance. Since hadron structure is a non-perturbative problem, numerical calculations on a space-time lattice are currently the only ...
Leinweber, Derek B.+2 more
core +3 more sources
Carleman commutator approach in logarithmic convexity for parabolic equations [PDF]
In this paper we investigate on a new strategy combining the logarithmic convexity (or frequency function) and the Carleman commutator to obtain an observation estimate at one time for the heat equation in a bounded domain.
K. Phung
semanticscholar +1 more source
Abstract Due to the complicated transients and the possibility of transition from a minor fault in AC subsystems to a severe blocking event of a high‐voltage direct–current (HVDC) transmission line, the study of AC‐DC hybrid power systems requires both efficient and accurate electromagnetic transient (EMT) simulation.
Zeqi Hong+3 more
wiley +1 more source