Results 71 to 80 of about 12,362 (163)

Deep‐learning methods for contrast enhancement and artifact reduction in cryo‐electron tomography: a systematic analysis of the state of the art and proposed improvements

open access: yesActa Crystallographica Section D, Volume 82, Issue 3, Page 168-186, March 2026.
Cryo‐ET is a rapidly emerging technique that enables 3D visualization of complex biological structures, but present limits on signal‐to‐noise ratio and reconstruction quality pose challenges for downstream analysis. Here, we present a systematic analysis of state‐of‐the‐art deep‐learning methods for contrast enhancement and propose improvements in ...
Henry N. Jones   +2 more
wiley   +1 more source

Discrete logarithms in curves over finite fields [PDF]

open access: yes, 2007
A survey on algorithms for computing discrete logarithms in Jacobians of curves over finite ...
Andreas Enge   +4 more
core   +5 more sources

Numerical Study of a Nonlocal Nonlinear Schrödinger Equation (MMT Model)

open access: yesStudies in Applied Mathematics, Volume 156, Issue 3, March 2026.
ABSTRACT In this paper, we study a nonlocal nonlinear Schrödinger equation (MMT model). We investigate the effect of the nonlocal operator appearing in the nonlinearity on the long‐term behavior of solutions, and we identify the conditions under which the solutions of the Cauchy problem associated with this equation are bounded globally in time in the ...
Amin Esfahani, Gulcin M. Muslu
wiley   +1 more source

A Jacobian‐Free Newton‐Krylov Method for Cell‐Centred Finite Volume Solid Mechanics

open access: yesInternational Journal for Numerical Methods in Engineering, Volume 127, Issue 3, 15 February 2026.
ABSTRACT This study proposes a Jacobian‐free Newton‐Krylov approach for finite‐volume solid mechanics. Traditional Newton‐based approaches require explicit Jacobian matrix formation and storage, which can be computationally expensive and memory‐intensive.
Philip Cardiff   +3 more
wiley   +1 more source

Utilizing Cooperative Proton–Electron Mixed Conduction Induced via Chemical Dedoping of Self‐Doped Poly(3,4‐ethylenedioxythiophene) Nanofilms for In‐Material Physical Reservoirs

open access: yesAdvanced Science, Volume 13, Issue 12, 27 February 2026.
This study demonstrates a new concept for high‐performance in‐material physical reservoirs (PRs). An intrinsic and cooperative ion–electron state, induced by chemical dedoping in self‐doped poly(3,4‐ethylenedioxythiophene) (S‐PEDOT) nanofilms, enhances the performance of in‐material PRs.
Yuya Ishizaki‐Betchaku   +10 more
wiley   +1 more source

Cryptography: Mathematical Advancements on Cyber Security [PDF]

open access: yes, 2019
The origin of cryptography, the study of encoding and decoding messages, dates back to ancient times around 1900 BC. The ancient Egyptians enlisted the use of basic encryption techniques to conceal personal information.
Bower, Kristin
core   +1 more source

Edwards curves based security authentication protocol for mobile RFID systems

open access: yesTongxin xuebao, 2014
Existing work about RFID authentication protocols is usually difficult to adapt to mobile RFID systems.In order to solve the problem,an Edwards curves based security authentication protocol for mobile RFID systems is proposed.The protocol can improve the
Yu-long YANG   +3 more
doaj   +2 more sources

Character sums with division polynomials

open access: yes, 2011
We obtain nontrivial estimates of quadratic character sums of division polynomials $\Psi_n(P)$, $n=1,2, ...$, evaluated at a given point $P$ on an elliptic curve over a finite field of $q$ elements.
Igor E. Shparlinski   +5 more
core   +1 more source

Stopping time signatures for some algorithms in cryptography [PDF]

open access: yes, 2019
We consider the normalized distribution of the overall running times of some cryptographic algorithms, and what information they reveal about the algorithms.
Deift, Percy   +2 more
core   +1 more source

Revisiting Shor's quantum algorithm for computing general discrete logarithms

open access: yes, 2021
We heuristically demonstrate that Shor's algorithm for computing general discrete logarithms, modified to allow the semi-classical Fourier transform to be used with control qubit recycling, achieves a success probability of approximately 60% to 82% in a ...
Ekerå, Martin
core  

Home - About - Disclaimer - Privacy