Results 31 to 40 of about 61,053 (210)

Geometric Engineering of N=2 CFT_{4}s based on Indefinite Singularities: Hyperbolic Case

open access: yes, 2003
Using Katz, Klemm and Vafa geometric engineering method of $\mathcal{N}=2$ supersymmetric QFT$_{4}$s and results on the classification of generalized Cartan matrices of Kac-Moody (KM) algebras, we study the un-explored class of $\mathcal{N}=2$ CFT$_{4}$s
A Belhaj   +32 more
core   +1 more source

A Unifying Approach to Self‐Organizing Systems Interacting via Conservation Laws

open access: yesAdvanced Intelligent Discovery, EarlyView.
The article develops a unified way to model and analyze self‐organizing systems whose interactions are constrained by conservation laws. It represents physical/biological/engineered networks as graphs and builds projection operators (from incidence/cycle structure) that enforce those constraints and decompose network variables into constrained versus ...
F. Barrows   +7 more
wiley   +1 more source

Birationally superrigid cyclic triple spaces

open access: yes, 2004
We prove the birational superrigidity and the nonrationality of a cyclic triple cover of $\mathbb{P}^{2n}$ branched over a nodal hypersurface of degree $3n$ for $n\ge 2$.
Cheltsov, Ivan
core   +2 more sources

Interpretability and Representability of Commutative Algebra, Algebraic Topology, and Topological Spectral Theory for Real‐World Data

open access: yesAdvanced Intelligent Discovery, EarlyView.
This article investigates how persistent homology, persistent Laplacians, and persistent commutative algebra reveal complementary geometric, topological, and algebraic invariants or signatures of real‐world data. By analyzing shapes, synthetic complexes, fullerenes, and biomolecules, the article shows how these mathematical frameworks enhance ...
Yiming Ren, Guo‐Wei Wei
wiley   +1 more source

SiOx‐Based Probabilistic Bits Enabling Invertible Logic Gate for Cryptographic Applications

open access: yesAdvanced Intelligent Systems, EarlyView.
To enable lightweight hardware encryption and decryption, a Ti/SiOx/Ti threshold switching device is engineered to generate controllable stochastic oscillations. By tuning the input voltage, the device produces a programmable spike probability governed by intrinsic switching dynamics, enabling probabilistic bits that construct an invertible ...
Jihyun Kim, Hyeonsik Choi, Jiyong Woo
wiley   +1 more source

Applications of Singularity Theory in Applied Algebraic Geometry and Algebraic Statistics

open access: yes
We survey recent applications of topology and singularity theory in the study of the algebraic complexity of concrete optimization problems in applied algebraic geometry and algebraic statistics.
Maxim, Laurentiu   +2 more
openaire   +2 more sources

Advanced Investigation of the Elimination of Methylene Blue From Wastewater Using Activated Carbon–Copper Oxide Nanowires: New Perspectives With Statistical Physical Modeling

open access: yesAsia-Pacific Journal of Chemical Engineering, EarlyView.
ABSTRACT In this study, the actual route of methylene blue (MB) dye adsorption by using fabricated polyfunctional activated carbon–copper oxide nanowires (AC@CuO‐NWs) from bulky wastewater bodies has been investigated. To better understand the exact pathway of the adsorption process, a prominent statistical physics formalism or grand canonical ...
Abdellatif Sakly   +7 more
wiley   +1 more source

Classification of N=2 supersymmetric CFT_{4}s: Indefinite Series

open access: yes, 2003
Using geometric engineering method of 4D $\mathcal{N}=2$ quiver gauge theories and results on the classification of Kac-Moody (KM) algebras, we show on explicit examples that there exist three sectors of $\mathcal{N}=2$ infrared CFT$_{4}$s.
A Belhaj   +13 more
core   +1 more source

Risk‐aware safe reinforcement learning for control of stochastic linear systems

open access: yesAsian Journal of Control, EarlyView.
Abstract This paper presents a risk‐aware safe reinforcement learning (RL) control design for stochastic discrete‐time linear systems. Rather than using a safety certifier to myopically intervene with the RL controller, a risk‐informed safe controller is also learned besides the RL controller, and the RL and safe controllers are combined together ...
Babak Esmaeili   +2 more
wiley   +1 more source

Home - About - Disclaimer - Privacy