Results 91 to 100 of about 2,490,029 (269)

Controlling phase separation of binary Bose-Einstein condensates via mixed-spin-channel Feshbach resonance

open access: yes, 2010
We investigate controlled phase separation of a binary Bose-Einstein condensate (BEC) in the proximity of mixed-spin-channel Feshbach resonance in the |F = 1, mF = +1> and |F = 2,mF = -1> states of 87Rb at a magnetic field of 9.10 G.
Hayashi, Taro   +5 more
core   +1 more source

The three-site Bose-Hubbard model subject to atom losses: the boson-pair dissipation channel and failure of the mean-field approach

open access: yes, 2010
We employ the perturbation series expansion for derivation of the reduced master equations for the three-site Bose-Hubbard model subject to strong atom losses from the central site.
D. S. Mogilevtsev   +6 more
core   +1 more source

Understanding the key drivers of and technology related issues associated with going multi-channel [PDF]

open access: yes, 2012
A multi-channel retail strategy is viewed by many academics and practitioners to be the success model for most retailers. Yet, while there are many drivers of, and advantages related to, using multiple channels to sell products and services to customers ...
Foster, C, Lewis, J, Whysall, P
core   +1 more source

Perencanaan Drainase Jalan Raya Semarang - Bawen Km 12+400 - Km 16+600 (Jamu Jago - Balai Pelatihan Transmigrasi Dan Penyandang Cacat Jateng) [PDF]

open access: yes, 2016
Flooding or inundation problem is often occurs in highways in Indonesia, including in Semarang - Bawen highway which national highway. When raining, inundation occurs along that highway, so disturbs people and causes damage to pavement. Inundation occurs
Atmojo, P. S. (Pranoto)   +3 more
core  

FOBOS 3: An Open-Source Platform for Side-Channel Analysis and Benchmarking [PDF]

open access: gold, 2023
Eduardo Ferrufino   +3 more
openalex   +1 more source

Ransomware Classification Using Hardware Performance Counters on a Non-Virtualized System

open access: yesIEEE Access
Ransomware is a type of malicious software designed to encrypt a user’s important data for the purpose of extortion, with a global annual impact of billions of dollars in damages.
Jennie E. Hill   +5 more
doaj   +1 more source

CPSGD: A Novel Optimization Algorithm and Its Application in Side-Channel Analysis

open access: yesMathematics
In recent years, side-channel analysis based on deep learning has garnered significant attention from researchers. A pivotal reason for this lies in the fact that deep learning-based side-channel analysis requires minimal preprocessing of side-channel ...
Yifan Zhang   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy