Results 61 to 70 of about 10,903,755 (367)
Repetition-priming effect: a cognitive task for the definition of a clinical assessment [PDF]
This research aims to study how semantic priming words can influence behavioral measures (RTs, accuracy), to develop an experimental paradigm to differentiate visual neglect and hemianopia. 69 experimental subjects were involved in four experiments.
Silvia Pagani +5 more
doaj +1 more source
Time after time – circadian clocks through the lens of oscillator theory
Oscillator theory bridges physics and circadian biology. Damped oscillators require external drivers, while limit cycles emerge from delayed feedback and nonlinearities. Coupling enables tissue‐level coherence, and entrainment aligns internal clocks with environmental cues.
Marta del Olmo +2 more
wiley +1 more source
Massless Gauge Bosons other than the Photon
Gauge bosons associated with unbroken gauge symmetries, under which all standard model fields are singlets, may interact with ordinary matter via higher-dimensional operators.
Bogdan A. Dobrescu, G. G. Raffelt
core +1 more source
Inequivalent representations of matroids over prime fields
It is proved that for each prime field $GF(p)$, there is an integer $f(p)$ such that a 4-connected matroid has at most $f(p)$ inequivalent representations over $GF(p)$. We also prove a stronger theorem that obtains the same conclusion for matroids satisfying a connectivity condition, intermediate between 3-connectivity and 4-connectivity that we term "$
Geelen, Jim, Whittle, Geoff
openaire +2 more sources
Exponential sum estimates over prime fields [PDF]
In this paper, we prove some extensions of recent results given by Shkredov and Shparlinski on multiple character sums for some general families of polynomials over prime fields. The energies of polynomials in two and three variables are our main ingredients.
Koh, Doowon +3 more
openaire +2 more sources
— The security of elliptic curve cryptosystems depends on the difficulty of solving the Elliptic Curve Discrete Log Problem (ECDLP). Elliptic curves with large group order are used for elliptic curve cryptosystems not to solve ECDLP.
Tun Myat Aung, Ni Ni Hla
semanticscholar +1 more source
Multiple ETS family transcription factors bind mutant p53 via distinct interaction regions
Mutant p53 gain‐of‐function is thought to be mediated by interaction with other transcription factors. We identify multiple ETS transcription factors that can bind mutant p53 and found that this interaction can be promoted by a PXXPP motif. ETS proteins that strongly bound mutant p53 were upregulated in ovarian cancer compared to ETS proteins that ...
Stephanie A. Metcalf +6 more
wiley +1 more source
Minor Prime Factorization for n-D Polynomial Matrices over Arbitrary Coefficient Field
In this paper, we investigate two classes of multivariate (n-D) polynomial matrices whose coefficient field is arbitrary and the greatest common divisor of maximal order minors satisfy certain condition.
Jinwang Liu, Dongmei Li, Licui Zheng
doaj +1 more source
An Efficient Approach to Point-Counting on Elliptic Curves from a Prominent Family over the Prime Field Fp [PDF]
Yuri Borissov, Miroslav Markov
openalex +1 more source
Abstract — This paper begins by describing basic properties of finite field and elliptic curve cryptography over prime field and binary field. Then we discuss the discrete logarithm problem for elliptic curves and its properties.
Tun Myat Aung, Ni Ni Hla
semanticscholar +1 more source

