Results 111 to 120 of about 2,582,876 (339)
Theorems based on Annamalai’s Binomial Coefficient and Identity
This paper presents a binomial theorem and proof based on Annamalai’s binomial identity. The factorial function defined for non-negative integers, denoted by n!, is the product of all positive integers less than or equal to n. This theorem uses the factorial function and Annamalai’s binomial identity.
openaire +1 more source
Non‐Hermitian Topological Lattice Photonics: An Analytic Perspective
This review establishes exact analytical solutions for non‐Hermitian Hatano–Nelson, Su–Schrieffer–Heeger, and generalized Rice–Mele models. We demonstrate non‐Hermitian skin effects via point‐gap topology, hybrid skin‐topological edge states in 2D lattices, and spin‐polarized boundary modes governed by dual bulk‐boundary correspondence.
Shihua Chen +6 more
wiley +1 more source
Numerical and Experimental Methods for Estimating the Propagation Loss in Microphotonic Waveguides
Finite‐element finite‐difference time domain, eigenmode‐expansion, and volume‐current simulations are benchmarked against cut‐back, ring‐resonator, and OFDR measurements to quantify waveguide propagation loss in integrated photonic circuits. Scattering, absorption, leakage, and back‐reflection contributions are dissected; error sources are ranked; and ...
Francesco Dell’Olio +4 more
wiley +1 more source
Determinants as Combinatorial Summation Formulas over an Algebra with a Unique $n$-ary Operation
Since the late 1980s the author has published a number of results on matrix functions, which were obtained using the generating functions, mixed discriminants (mixed volumes in $\mathbb R^n$), and the well-known polarization theorem (the most general ...
G.P. Egorychev
doaj +1 more source
Herein, the maximum violation of the three‐setting Clauser–Horne–Shimony–Holt (CHSH) inequality using nonmaximally entangled photons with orbital angular momentum is demonstrated. By mapping the optimization problem to maximizing a triangle's perimeter inscribed in an ellipse, the experiment validates the geometric approach and highlights the ...
Dongkai Zhang +2 more
wiley +1 more source
Generalized Picone's identity and its applications
In this article we give a generalized version of Picone's identity in a nonlinear setting for the p-Laplace operator. As applications we give a Sturmian Comparison principle and a Liouville type theorem.
Kaushik Bal
doaj
Impact of System‐Model Mismatch in Fourier Ptychographic Microscopy
This study investigates the robustness of Fourier ptychography microscope (FPM) reconstruction algorithms across various scenarios, each representing challenges encountered in practical FPM experiments, and deduces the extent to which FPM can provide diffraction‐limited resolution under the influence of various sources of error.
Tuo Yin +4 more
wiley +1 more source
Computing Equilibrium Free Energies Using Non-Equilibrium Molecular Dynamics
As shown by Jarzynski, free energy differences between equilibrium states can be expressed in terms of the statistics of work carried out on a system during non-equilibrium transformations.
Christoph Dellago, Gerhard Hummer
doaj +1 more source
Continuum Mechanics Modeling of Flexible Spring Joints in Surgical Robots
A new mechanical model of a tendon‐actuated helical extension spring joint in surgical robots is built using Cosserat rod theory. The model can implicitly handle the unknown contacts between adjacent coils and numerically predict spring shapes from straight to significantly bent under actuation forces.
Botian Sun +3 more
wiley +1 more source
Low-cost group-based identity security authentication protocol for NB-IoT nodes
To address the problem of huge number of signaling requests when large-scale devices request authentication in NB-IoT network, a low-cost group identity security authentication protocol based on Schnorr aggregate signature and Chinese reminder theorem ...
Xiangmao CHANG, Jun ZHAN, Zhiwei WANG
doaj +2 more sources

