Results 61 to 70 of about 103,432 (283)
Interlacing Families IV: Bipartite Ramanujan Graphs of All Sizes
We prove that there exist bipartite Ramanujan graphs of every degree and every number of vertices. The proof is based on analyzing the expected characteristic polynomial of a union of random perfect matchings, and involves three ingredients: (1) a ...
Marcus, Adam W. +2 more
core +1 more source
Nucleation‐Controlled Reconstruction of CuOx for Selective CO2 Electroreduction
The ratio of oxygen vacancies (Ov) and exposed Cu2O (111)/(200) of CuOx precatalyst is modulated by nucleation control of Cu(OH)2 precursor. Low Ov ratio and high ratio of Cu2O (111)/(200) in slow‐nucleated CuOx reconstructs to high‐coordinated oxide‐derived copper (OD‐Cu) during electrochemical CO2 reduction reaction (CO2RR) and exhibits enhanced ...
Ying Ying Ch'ng +14 more
wiley +1 more source
Matrix and tensor witnesses of hidden symmetry algebras
Permutation group algebras, and their generalizations called permutation centralizer algebras (PCAs), play a central role as hidden symmetries in the combinatorics of large N gauge theories and matrix models with manifest continuous gauge symmetries ...
Sanjaye Ramgoolam, Lewis Sword
doaj +1 more source
Permutation-invariant qudit codes from polynomials
A permutation-invariant quantum code on $N$ qudits is any subspace stabilized by the matrix representation of the symmetric group $S_N$ as permutation matrices that permute the underlying $N$ subsystems.
Ouyang, Yingkai
core +1 more source
This work pioneers melt electrowriting (MEW) of polyethylene vinyl acetate (PEVA) to fabricate ultra‐compliant, high‐resolution scaffolds. By integrating microscale precision with soft tissue‐like biomechanics, PEVA overcomes stiffness‐driven limitations of conventional MEW polymers, establishing a mechanically biomimetic platform for soft tissue ...
Finn Snow +9 more
wiley +1 more source
Capturing Polynomial Time using Modular Decomposition [PDF]
The question of whether there is a logic that captures polynomial time is one of the main open problems in descriptive complexity theory and database theory.
Berit Grußien
doaj +1 more source
Frequency Hopping (FH) is a significant anti-interception and anti-interference, so some wireless communication systems extensively use it. Then it can offer better security performance of the system via combining cryptographic algorithms with FH.
Wang Jinpeng +4 more
doaj +1 more source
Straightening rule for an $m'$-truncated polynomial ring
We consider a certain quotient of a polynomial ring categorified by both the isomorphic Green rings of the symmetric groups and Schur algebras generated by the signed Young permutation modules and mixed powers respectively.
Lim, Kay Jin
core +1 more source
Magnetic doping of the topological insulator Bi2Te3 with erbium adatoms induces out‐of‐plane magnetism and breaks time‐reversal symmetry, opening a Dirac gap and driving a Fermi surface transition from hexagonal to star‐of‐David geometry. Microscopy, spectroscopy, and magnetic dichroism reveal atomically controlled magnetic interactions that tailor the
Beatriz Muñiz Cano +18 more
wiley +1 more source
An attacking scheme was proposed against the permutation-based multi-polynomial scheme proposed by Guo,et al for pair-wise key establishment in wireless sensor networks.Attacks on polynomials were carried out by constructing a black-box to integrally ...
Ai-wen WANG +4 more
doaj +2 more sources

