Results 31 to 40 of about 1,829,388 (272)

On the multiplicative order of elements in Wiedemann's towers of finite fields

open access: yesKarpatsʹkì Matematičnì Publìkacìï, 2015
We consider recursive binary finite field extensions $E_{i+1} =E_{i} (x_{i+1} )$, $i\ge -1$, defined by D. Wiedemann. The main object of the paper is to give some proper divisors of the Fermat numbers $N_{i} $ that are not equal to the multiplicative ...
R. Popovych
doaj   +1 more source

Thermoreflectance Detection of Point Defects Resulting from Focused Ion Beam Milling

open access: yesAdvanced Engineering Materials, EarlyView.
Focused ion beam (FIB) milling is a common tool for nanoscale material processing, however irradiation damage, redeposition, and contamination can occur. We use several characterization tools to show FIB‐induced effects beyond 1 mm from the milled area.
Thomas W. Pfeifer   +3 more
wiley   +1 more source

Is BCH Code Useful to DNA Classification as an Alignment-Free Method?

open access: yesIEEE Access, 2021
Similarities between biological and digital communication systems have been investigated since biology also uses a discrete alphabet to represent and transmit information. The genetic information of an organism is encoded in DNA molecules by units called
Milena M. Arruda   +2 more
doaj   +1 more source

Casimir energy of finite width mirrors: renormalization, self-interaction limit and Lifshitz formula

open access: yes, 2009
We study the field theoretical model of a scalar field in presence of spacial inhomogeneities in form of one and two finite width mirrors (material slabs). The interaction of the scalar field with the defect is described with position-dependent mass term.
Fialkovsky, I. V.   +2 more
core   +1 more source

A Workflow to Accelerate Microstructure‐Sensitive Fatigue Life Predictions

open access: yesAdvanced Engineering Materials, EarlyView.
This study introduces a workflow to accelerate predictions of microstructure‐sensitive fatigue life. Results from frameworks with varying levels of simplification are benchmarked against published reference results. The analysis reveals a trade‐off between accuracy and model complexity, offering researchers a practical guide for selecting the optimal ...
Luca Loiodice   +2 more
wiley   +1 more source

Revisiting linearly extended discrete functions

open access: yesJournal of Mathematical Cryptology
The authors introduced a new family of cryptographic schemes in a previous research article, which includes many practical encryption schemes, such as the Feistel family. Given a finite field of order qq, any n>m≥0n\gt m\ge 0, the authors described a new
Gravel Claude, Panario Daniel
doaj   +1 more source

On Finite Noncommutativity in Quantum Field Theory

open access: yes, 2010
We consider various modifications of the Weyl-Moyal star-product, in order to obtain a finite range of nonlocality. The basic requirements are to preserve the commutation relations of the coordinates as well as the associativity of the new product.
ALI ZAHABI   +12 more
core   +1 more source

A Numerical–Experimental Approach for Multi‐Matrix Fiber‐Reinforced Plastics Characterization Using Finite Element Model Updating

open access: yesAdvanced Engineering Materials, EarlyView.
A numerical–experimental framework is developed for characterizing multi‐matrix fiber‐reinforced polymers (MM‐FRPs) combining epoxy and polyurethane matrices. Harmonic bending tests are integrated with finite element model updating (FEMU) to simultaneously identify elastic and viscoelastic material parameters.
Rodrigo M. Dartora   +4 more
wiley   +1 more source

Perfect verification of modular scheme

open access: yesЖурнал Белорусского государственного университета: Математика, информатика, 2018
Secret sharing schemes are used to distribute a secret value among a group of users so that only authorized set of them can reconstruct the original secret correctly.
Gennadii V. Matveev   +1 more
doaj  

A New Construction of Codebooks Meeting the Levenshtein Bound

open access: yesIEEE Access, 2020
Codebooks with low coherence have extensive applications in many fileds such as code division multiple access (CDMA) communication systems, MIMO communications, compressed sensing and so on. In this paper, based on additive characters over finite fields,
Li Han   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy