Results 61 to 70 of about 165,308 (288)

On the image of a noncommutative polynomial

open access: yes, 2013
Let $F$ be an algebraically closed field of characteristic zero. We consider the question which subsets of $M_n(F)$ can be images of noncommutative polynomials. We prove that a noncommutative polynomial $f$ has only finitely many similarity orbits modulo
Špenko, Špela
core   +1 more source

Investigation of Laser Ablation and Brush Pre‐Treatments for AlCu Cold Roll Bonding in Oxygen‐Free Conditions

open access: yesAdvanced Engineering Materials, EarlyView.
It is shown that laser ablation pretreatment under oxygen‐free conditions enables copper–aluminium bonding at significantly lower deformation degrees and improved properties compared to mechanical brushing. Laser ablation further increases interface contact area and induces favourable residual stress states and microstructural compatibility ...
Khemais Barienti   +11 more
wiley   +1 more source

Decoding Generalized Reed-Solomon Codes and Its Application to RLCE Encryption Schemes [PDF]

open access: yes, 2017
This paper compares the efficiency of various algorithms for implementing quantum resistant public key encryption scheme RLCE on 64-bit CPUs. By optimizing various algorithms for polynomial and matrix operations over finite fields, we obtained several ...
Wang, Yongge
core   +1 more source

Quantum Multiplication of Schur Polynomials

open access: yesJournal of Algebra, 1999
LaTeX, 20 pages with 11 ...
Bertram, Aaron   +2 more
openaire   +3 more sources

Surface Tension Measurement of Ti‐6Al‐4V by Falling Droplet Method in Oxygen‐Free Atmosphere

open access: yesAdvanced Engineering Materials, EarlyView.
In this article, the temperature‐dependent surface tension of free falling, oscillating Ti‐6Al‐4V droplets is investigated in both argon and monosilane doped, oxygen‐free atmosphere. Droplet temperature and oscillation are captured with one single high‐speed camera, and the surface tension is calculated with Rayleigh's formula.
Johannes May   +9 more
wiley   +1 more source

Secure Collaborative Publicly Verifiable Computation

open access: yesIEEE Access, 2017
Publicly Verifiable Computation (PVC) enables computationally weak trusted sources to outsource several computations to some more powerful public untrusted clouds.
Qiang Wang   +4 more
doaj   +1 more source

Predicting Atomic Charges in MOFs by Topological Charge Equilibration

open access: yesAdvanced Functional Materials, EarlyView.
An atomic charge prediction method is presented that is able to accurately reproduce ab‐initio‐derived reference charges for a large number of metal–organic frameworks. Based on a topological charge equilibration scheme, static charges that fulfill overall neutrality are quickly generated.
Babak Farhadi Jahromi   +2 more
wiley   +1 more source

Implementasi dan Pengukuran Kinerja Operasi Aritmatika Finite Field Berbasis Polinomial Biner

open access: yesJuTISI (Jurnal Teknik Informatika dan Sistem Informasi), 2015
Cryptography is one of the security techniques that secure information confidentiality and information integrity while electronic transaction processing.
Wenny Franciska Senjaya, Budi Rahardjo
doaj   +1 more source

Faster polynomial multiplication over finite fields [PDF]

open access: yes, 2014
Let p be a prime, and let M_p(n) denote the bit complexity of multiplying two polynomials in F_p[X] of degree less than n. For n large compared to p, we establish the bound M_p(n) = O(n log n 8^(log^* n) log p), where log^* is the iterated logarithm ...
Harvey, David   +2 more
core   +2 more sources

Automated Generation of Non-Linear Loop Invariants Utilizing Hypergeometric Sequences

open access: yes, 2017
Analyzing and reasoning about safety properties of software systems becomes an especially challenging task for programs with complex flow and, in particular, with loops or recursion.
Humenberger, Andreas   +2 more
core   +1 more source

Home - About - Disclaimer - Privacy