Results 51 to 60 of about 1,829,388 (272)

Linear Codes Arise From New Complete (n,r)-arcs in PG(2,29) [PDF]

open access: yesAl-Rafidain Journal of Computer Sciences and Mathematics, 2009
This paper presents the recently-discovered linear [n,3,d] codes over PG(2,29) that arises from a complete (n,r)-arcs which the paper[12] presented it for the first time.
Shuaa Aziz
doaj   +1 more source

Abelian varieties over finite fields as basic abelian varieties

open access: yes, 2016
In this note we show that any basic abelian variety with additional structures over an arbitrary algebraically closed field of characteristic $p>0$ is isogenous to another one defined over a finite field.
Yu, Chia-Fu
core   +1 more source

Investigation of Oxygen‐Free Wetting Behavior of Aluminum on Copper via Molecular Dynamics Simulations and Experiments

open access: yesAdvanced Engineering Materials, EarlyView.
The wettability of aluminum droplets (Al) on different copper substrates (Cu), where liquid Al spreads on solid Cu surfaces to form a liquid–solid interface, is studied numerically and experimentally. The experimental and numerical results show good agreement in the fast‐spreading regime.
Shan Lyu   +8 more
wiley   +1 more source

Verification of modular secret sharing

open access: yesЖурнал Белорусского государственного университета: Математика, информатика, 2018
In the present paper new scheme of secret verification are constructed. Verification with trusted party participation is conducted with help of an external device, which takes an arbitrary polynomial S(x), input element x0 ∈ Fpn and returns a value ξS(x0)
Maksim M. Vaskouski, Gennadii V. Matveev
doaj  

Mayfly optimistic hyperelliptic curve cryptosystem

open access: yesFrontiers in Computer Science
Various applications use asymmetric cryptography to secure communications between both parties, and it raises the main issue of generating vast amounts of computation and storage.
Ramireddy Nava Teja Reddy   +7 more
doaj   +1 more source

Computing character degrees via a Galois connection [PDF]

open access: yesInternational Journal of Group Theory, 2015
In a previous paper, the second author established that, given finite fields ...
Mark L. Lewis , John K. McVey
doaj  

Evaluating Energy Absorption Performance of Filled Lattice Structures

open access: yesAdvanced Engineering Materials, EarlyView.
Maximum stress must be considered to robustly evaluate energy absorber designs. This approach was applied to compare all types of absorbers in a single Ashby diagram and determine the utility of filling lattice voids with a second material. High‐performance fillers can improve the performance of lattices that are limited by buckling or catastrophic ...
Christian Bonney   +2 more
wiley   +1 more source

Numerical Modeling of Tank Cars Carrying Hazardous Materials With and Without Composite Metal Foam

open access: yesAdvanced Engineering Materials, EarlyView.
Large‐scale puncture models consisting of hazardous materials (HAZMATs) tank car with protective steel–steel composite metal foam (S–S CMF) are solved numerically. Tank car plate with added 10.91–13.33 mm thick S–S CMF layer does not puncture. Protective S–S CMF absorbs impact energy, reduces plate deformation, and prevents shear bands formation ...
Aman Kaushik, Afsaneh Rabiei
wiley   +1 more source

On an uncertainty principle for small index subgroups of finite fields

open access: yesOpen Mathematics
In this article, we continue the study of the nonvanishing minors property initiated by Garcia, Karaali, and Katz, for the compressed Fourier matrix attached to a subgroup HH of the multiplicative group of a finite field Fq{{\mathbb{F}}}_{q} and a ...
Padilla Diego Fernando Díaz   +1 more
doaj   +1 more source

Finite fields and cryptology [PDF]

open access: yesComputer Science Journal of Moldova, 2003
The problem of a computationally feasible method of finding the discrete logarithm in a (large) finite field is discussed, presenting the main algorithms in this direction.
Ennio Cortellini
doaj  

Home - About - Disclaimer - Privacy