Results 61 to 70 of about 13,596 (196)

A Study of Determinants and Inverses for Periodic Tridiagonal Toeplitz Matrices with Perturbed Corners Involving Mersenne Numbers

open access: yesMathematics, 2019
In this paper, we study periodic tridiagonal Toeplitz matrices with perturbed corners. By using some matrix transformations, the Schur complement and matrix decompositions techniques, as well as the Sherman-Morrison-Woodbury formula, we derive explicit ...
Yunlan Wei   +3 more
doaj   +1 more source

Keystroke Dynamics-Based Authentication Using Unique Keypad

open access: yesSensors, 2021
Authentication methods using personal identification number (PIN) and unlock patterns are widely used in smartphone user authentication. However, these authentication methods are vulnerable to shoulder-surfing attacks, and PIN authentication, in ...
Maro Choi   +3 more
doaj   +1 more source

StorjLedger: An Innovative Distributed Storage Ecosystem That Overcomes Blockchain Trade‐Offs Using Erasure‐Coded Sharding and Proof‐of‐Storage Consensus

open access: yesEngineering Reports, Volume 7, Issue 10, October 2025.
StorjLedger leverages erasure‐coded sharding and Proof‐of‐Storage to deliver nearly 1000 transactions per second with sub‐second latency, 98% data redundancy, and 76% lower storage costs, resolving the blockchain trilemma by harmonizing scalability, security, and decentralization.
Saha Reno, Koushik Roy
wiley   +1 more source

On the number of $N$-free elements with prescribed trace [PDF]

open access: yes, 2015
In this paper we derive a formula for the number of $N$-free elements over a finite field $\mathbb{F}_q$ with prescribed trace, in particular trace zero, in terms of Gaussian periods.
Tuxanidy, Aleksandr, Wang, Qiang
core  

An Ultra-light PRNG Passing Strict Randomness Tests and Suitable for Low Cost Tags

open access: yesAdvances in Electrical and Computer Engineering, 2016
A pseudo-random number generator for low-cost RFID tags is presented. The scheme is simple, sequential and secure, yet has a high performance. Despite its lowest hardware complexity, our proposal represents a better alternative than previous proposals ...
OZCANHAN, M. H.   +2 more
doaj   +1 more source

Prime-Field Masking in Hardware and its Soundness against Low-Noise SCA Attacks

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2023
A recent study suggests that arithmetic masking in prime fields leads to stronger security guarantees against passive physical adversaries than Boolean masking.
Gaëtan Cassiers   +4 more
doaj   +1 more source

Application for Determining Repeatability and Reproducibility in an Honest Gauge R&R Study

open access: yesQuality and Reliability Engineering International, Volume 41, Issue 5, Page 1953-1970, July 2025.
ABSTRACT The analysis of variance (ANOVA) method and the range method are employed to conduct gauge repeatability and reproducibility studies. While the range method does not account for the statistical nature of the data, unlike the ANOVA method, it is, on the one hand, faster and, on the other hand, simpler to implement.
Alban Petitjean, Olivier Musset
wiley   +1 more source

Groups with triangle‐free graphs on p$p$‐regular classes

open access: yesMathematische Nachrichten, Volume 298, Issue 6, Page 1796-1807, June 2025.
Abstract Let p$p$ be a prime. In this paper, we classify the p$p$‐structure of those finite p$p$‐separable groups such that, given any three non‐central conjugacy classes of p$p$‐regular elements, two of them necessarily have coprime lengths.
M. J. Felipe   +2 more
wiley   +1 more source

Fuchs' problem for indecomposable abelian groups

open access: yes, 2015
More than 50 years ago, Laszlo Fuchs asked which abelian groups can be the group of units of a commutative ring. Though progress has been made, the question remains open.
Chebolu, Sunil K., Lockridge, Keir
core   +1 more source

Kenelm Digby's logic of common and natural notions

open access: yesThe Southern Journal of Philosophy, Volume 63, Issue 2, Page 157-173, June 2025.
Abstract In this article, I take a fresh look at the logic of common and natural notions contained in the Two Treatises published in 1644 by Kenelm Digby (1603–1665). Digby's doctrine of common notions was an attempt to retrofit Aristotelianism in order to bring it out of the shadows of scholasticism and into the age of the new experimental and ...
Mogens Lærke
wiley   +1 more source

Home - About - Disclaimer - Privacy