Results 111 to 120 of about 2,582,876 (339)

Theorems based on Annamalai’s Binomial Coefficient and Identity

open access: yesSSRN Electronic Journal, 2022
This paper presents a binomial theorem and proof based on Annamalai’s binomial identity. The factorial function defined for non-negative integers, denoted by n!, is the product of all positive integers less than or equal to n. This theorem uses the factorial function and Annamalai’s binomial identity.
openaire   +1 more source

Non‐Hermitian Topological Lattice Photonics: An Analytic Perspective

open access: yesAdvanced Photonics Research, EarlyView.
This review establishes exact analytical solutions for non‐Hermitian Hatano–Nelson, Su–Schrieffer–Heeger, and generalized Rice–Mele models. We demonstrate non‐Hermitian skin effects via point‐gap topology, hybrid skin‐topological edge states in 2D lattices, and spin‐polarized boundary modes governed by dual bulk‐boundary correspondence.
Shihua Chen   +6 more
wiley   +1 more source

Numerical and Experimental Methods for Estimating the Propagation Loss in Microphotonic Waveguides

open access: yesAdvanced Photonics Research, EarlyView.
Finite‐element finite‐difference time domain, eigenmode‐expansion, and volume‐current simulations are benchmarked against cut‐back, ring‐resonator, and OFDR measurements to quantify waveguide propagation loss in integrated photonic circuits. Scattering, absorption, leakage, and back‐reflection contributions are dissected; error sources are ranked; and ...
Francesco Dell’Olio   +4 more
wiley   +1 more source

Determinants as Combinatorial Summation Formulas over an Algebra with a Unique $n$-ary Operation

open access: yesИзвестия Иркутского государственного университета: Серия "Математика", 2018
Since the late 1980s the author has published a number of results on matrix functions, which were obtained using the generating functions, mixed discriminants (mixed volumes in $\mathbb R^n$), and the well-known polarization theorem (the most general ...
G.P. Egorychev
doaj   +1 more source

Experimental Test of the Three‐Setting Clauser–Horne–Shimony–Holt Inequality with Nonmaximally Orbital Angular Momentum Entangled States

open access: yesAdvanced Photonics Research, EarlyView.
Herein, the maximum violation of the three‐setting Clauser–Horne–Shimony–Holt (CHSH) inequality using nonmaximally entangled photons with orbital angular momentum is demonstrated. By mapping the optimization problem to maximizing a triangle's perimeter inscribed in an ellipse, the experiment validates the geometric approach and highlights the ...
Dongkai Zhang   +2 more
wiley   +1 more source

Generalized Picone's identity and its applications

open access: yesElectronic Journal of Differential Equations, 2013
In this article we give a generalized version of Picone's identity in a nonlinear setting for the p-Laplace operator. As applications we give a Sturmian Comparison principle and a Liouville type theorem.
Kaushik Bal
doaj  

Impact of System‐Model Mismatch in Fourier Ptychographic Microscopy

open access: yesAdvanced Photonics Research, EarlyView.
This study investigates the robustness of Fourier ptychography microscope (FPM) reconstruction algorithms across various scenarios, each representing challenges encountered in practical FPM experiments, and deduces the extent to which FPM can provide diffraction‐limited resolution under the influence of various sources of error.
Tuo Yin   +4 more
wiley   +1 more source

Computing Equilibrium Free Energies Using Non-Equilibrium Molecular Dynamics

open access: yesEntropy, 2013
As shown by Jarzynski, free energy differences between equilibrium states can be expressed in terms of the statistics of work carried out on a system during non-equilibrium transformations.
Christoph Dellago, Gerhard Hummer
doaj   +1 more source

Continuum Mechanics Modeling of Flexible Spring Joints in Surgical Robots

open access: yesAdvanced Robotics Research, EarlyView.
A new mechanical model of a tendon‐actuated helical extension spring joint in surgical robots is built using Cosserat rod theory. The model can implicitly handle the unknown contacts between adjacent coils and numerically predict spring shapes from straight to significantly bent under actuation forces.
Botian Sun   +3 more
wiley   +1 more source

Low-cost group-based identity security authentication protocol for NB-IoT nodes

open access: yesTongxin xuebao, 2021
To address the problem of huge number of signaling requests when large-scale devices request authentication in NB-IoT network, a low-cost group identity security authentication protocol based on Schnorr aggregate signature and Chinese reminder theorem ...
Xiangmao CHANG, Jun ZHAN, Zhiwei WANG
doaj   +2 more sources

Home - About - Disclaimer - Privacy