Results 61 to 70 of about 103,432 (283)

Interlacing Families IV: Bipartite Ramanujan Graphs of All Sizes

open access: yes, 2015
We prove that there exist bipartite Ramanujan graphs of every degree and every number of vertices. The proof is based on analyzing the expected characteristic polynomial of a union of random perfect matchings, and involves three ingredients: (1) a ...
Marcus, Adam W.   +2 more
core   +1 more source

Nucleation‐Controlled Reconstruction of CuOx for Selective CO2 Electroreduction

open access: yesAdvanced Functional Materials, EarlyView.
The ratio of oxygen vacancies (Ov) and exposed Cu2O (111)/(200) of CuOx precatalyst is modulated by nucleation control of Cu(OH)2 precursor. Low Ov ratio and high ratio of Cu2O (111)/(200) in slow‐nucleated CuOx reconstructs to high‐coordinated oxide‐derived copper (OD‐Cu) during electrochemical CO2 reduction reaction (CO2RR) and exhibits enhanced ...
Ying Ying Ch'ng   +14 more
wiley   +1 more source

Matrix and tensor witnesses of hidden symmetry algebras

open access: yesJournal of High Energy Physics, 2023
Permutation group algebras, and their generalizations called permutation centralizer algebras (PCAs), play a central role as hidden symmetries in the combinatorics of large N gauge theories and matrix models with manifest continuous gauge symmetries ...
Sanjaye Ramgoolam, Lewis Sword
doaj   +1 more source

Permutation-invariant qudit codes from polynomials

open access: yes, 2017
A permutation-invariant quantum code on $N$ qudits is any subspace stabilized by the matrix representation of the symmetric group $S_N$ as permutation matrices that permute the underlying $N$ subsystems.
Ouyang, Yingkai
core   +1 more source

Melt Electrowriting High Resolution Poly(ethylene‐co‐vinyl acetate) Scaffolds for Soft Tissue Engineering

open access: yesAdvanced Healthcare Materials, EarlyView.
This work pioneers melt electrowriting (MEW) of polyethylene vinyl acetate (PEVA) to fabricate ultra‐compliant, high‐resolution scaffolds. By integrating microscale precision with soft tissue‐like biomechanics, PEVA overcomes stiffness‐driven limitations of conventional MEW polymers, establishing a mechanically biomimetic platform for soft tissue ...
Finn Snow   +9 more
wiley   +1 more source

Capturing Polynomial Time using Modular Decomposition [PDF]

open access: yesLogical Methods in Computer Science, 2019
The question of whether there is a logic that captures polynomial time is one of the main open problems in descriptive complexity theory and database theory.
Berit Grußien
doaj   +1 more source

An Innovative FPGA Implementations of the Secure Frequency Hopping Communication System Based on the Improved ZUC Algorithm

open access: yesIEEE Access, 2022
Frequency Hopping (FH) is a significant anti-interception and anti-interference, so some wireless communication systems extensively use it. Then it can offer better security performance of the system via combining cryptographic algorithms with FH.
Wang Jinpeng   +4 more
doaj   +1 more source

Straightening rule for an $m'$-truncated polynomial ring

open access: yes, 2018
We consider a certain quotient of a polynomial ring categorified by both the isomorphic Green rings of the symmetric groups and Schur algebras generated by the signed Young permutation modules and mixed powers respectively.
Lim, Kay Jin
core   +1 more source

Microscopic Insights into Magnetic Warping and Time‐Reversal Symmetry Breaking in Topological Surface States of Rare‐Earth‐Doped Bi2Te3

open access: yesAdvanced Materials, EarlyView.
Magnetic doping of the topological insulator Bi2Te3 with erbium adatoms induces out‐of‐plane magnetism and breaks time‐reversal symmetry, opening a Dirac gap and driving a Fermi surface transition from hexagonal to star‐of‐David geometry. Microscopy, spectroscopy, and magnetic dichroism reveal atomically controlled magnetic interactions that tailor the
Beatriz Muñiz Cano   +18 more
wiley   +1 more source

Attacking scheme against the permutation-based multi-polynomial scheme for pair-wise key establishment in wireless sensor networks

open access: yesTongxin xuebao, 2015
An attacking scheme was proposed against the permutation-based multi-polynomial scheme proposed by Guo,et al for pair-wise key establishment in wireless sensor networks.Attacks on polynomials were carried out by constructing a black-box to integrally ...
Ai-wen WANG   +4 more
doaj   +2 more sources

Home - About - Disclaimer - Privacy