Results 61 to 70 of about 82,329 (274)

New simultaneous Diophantine attacks on generalized RSA key equations

open access: yesJournal of King Saud University: Computer and Information Sciences
RSA stands as a widely adopted method within asymmetric cryptography, commonly applied for digital signature validation and message encryption.
Wan Nur Aqlili Ruzai   +3 more
doaj   +1 more source

Multi‐State Probabilistic Computing Using Floating‐Body MOSFETs Based on the Potts Model for Solving Complex Combinatorial Optimization Problems

open access: yesAdvanced Materials, EarlyView.
This work introduces a multi‐state probabilistic computing system based on Potts‐model p‐bits using stochastic switching floating body metal oxide semiconductor field effect transistors (FB‐MOSFETs). By employing drain‐voltage sharing and one‐hot sampling, the system achieves controllable probabilistic behavior.
Sunwoo Cheong   +9 more
wiley   +1 more source

Factorization of cubic vertices involving three different higher spin fields

open access: yesNuclear Physics B, 2014
We derive a class of cubic interaction vertices for three higher spin fields, with integer spins λ1, λ2, λ3, by closing commutators of the Poincaré algebra in four-dimensional flat spacetime.
Y.S. Akshay, Sudarshan Ananth
doaj   +1 more source

Generative Models for Crystalline Materials

open access: yesAdvanced Materials, EarlyView.
Generative machine learning models are increasingly used in crystalline materials design. This review outlines major generative approaches and assesses their strengths and limitations. It also examines how generative models can be adapted to practical applications, discusses key experimental considerations for evaluating generated structures, and ...
Houssam Metni   +15 more
wiley   +1 more source

Interfaces in Large Area 2D Materials Integration: From Epitaxial Growth and Clean Transfer to Interface‐Dominated Performance

open access: yesAdvanced Materials Interfaces, EarlyView.
This Review proposes an interface‐centric framework for large‐area 2D materials integration, linking wafer‐scale single‐crystal epitaxy, clean transfer and deterministic stacking, and interface‐dominated structure–property–device correlations. We summarize how interfacial symmetry and energetics govern nucleation/coalescence and adhesion‐controlled ...
Han Chen   +4 more
wiley   +1 more source

Faster deterministic integer factorization [PDF]

open access: yesMathematics of Computation, 2013
The best known unconditional deterministic complexity bound for computing the prime factorization of an integer N is O(M_int(N^(1/4) log N)), where M_int(k) denotes the cost of multiplying k-bit integers. This result is due to Bostan--Gaudry--Schost, following the Pollard--Strassen approach.
Costa, Edgar, Harvey, David
openaire   +3 more sources

Ultra‐Durable Information‐Encoded Anti‐Counterfeiting Self‐Assembled Nanocrystal Labels

open access: yesAdvanced Optical Materials, EarlyView.
Ultra‐durable cost‐effective information‐encoded anti‐counterfeiting labels are fabricated to secure semiconductor chips. A novel method is used to self‐assemble colloidal quantum wells (CQWs) into color bars. Information can be encoded spatially, spectrally, and opto‐spatially.
Taha Haddadifam   +6 more
wiley   +1 more source

Continuum Mechanics Modeling of Flexible Spring Joints in Surgical Robots

open access: yesAdvanced Robotics Research, EarlyView.
A new mechanical model of a tendon‐actuated helical extension spring joint in surgical robots is built using Cosserat rod theory. The model can implicitly handle the unknown contacts between adjacent coils and numerically predict spring shapes from straight to significantly bent under actuation forces.
Botian Sun   +3 more
wiley   +1 more source

A New Secure Encryption Scheme Based on Group Factorization Problem

open access: yesIEEE Access, 2019
As special types of factorization of finite groups, logarithmic signatures and covers have been used as the main components of cryptographic keys for secret key cryptosystems such as $PGM$ and public key cryptosystems like $MST_{1}$ , $MST_{2 ...
Yue Cong   +5 more
doaj   +1 more source

Data‐Driven Bulldozer Blade Control for Autonomous Terrain Leveling

open access: yesAdvanced Robotics Research, EarlyView.
A simulation‐driven framework for autonomous bulldozer leveling is presented, combining high‐fidelity terramechanics simulation with a neural‐network‐based reduced‐order model. Gradient‐based optimization enables efficient, low‐level blade control that balances leveling quality and operation time.
Harry Zhang   +5 more
wiley   +1 more source

Home - About - Disclaimer - Privacy