Results 21 to 30 of about 37,558,898 (309)

Improved Conflict Detection for Graph Transformation with Attributes [PDF]

open access: yesElectronic Proceedings in Theoretical Computer Science, 2015
In graph transformation, a conflict describes a situation where two alternative transformations cannot be arbitrarily serialized. When enriching graphs with attributes, existing conflict detection techniques typically report a conflict whenever at least ...
Géza Kulcsár   +4 more
doaj   +1 more source

One Time, Two Times, or No Time? [PDF]

open access: yes, 2021
Contemporary research programs in fundamental physics appear to suggest that there could be two (physical) times---or none at all. This essay articulates these possibilities in the context of quantum gravity, and in particular of cosmological models developed in an approach called `loop quantum gravity', and explains how they could nevertheless ...
openaire   +2 more sources

Experimental Observation of the Suppression of the Dephasing in a Floquet Engineering Optical Lattice Clock

open access: yesApplied Sciences, 2022
Accurately manipulating quantum states is a fundamental strategy for improving the performance of quantum metrology, computing, and simulation. However, the quantum state is susceptible to dephasing due to the temperature and density of the atomic ...
Feng Guo   +3 more
doaj   +1 more source

Accurate Settling-Time Modeling and Design Procedures for Two-Stage Miller-Compensated Amplifiers for Switched-Capacitor Circuits [PDF]

open access: yes, 2009
We present modeling techniques for accurate estimation of settling errors in switched-capacitor (SC) circuits built with Miller-compensated operational transconductance amplifiers (OTAs).
Delgado Restituto, Manuel   +2 more
core   +1 more source

Recover the abnormal positioning, velocity and timing services caused by BDS satellite orbital maneuvers

open access: yesSatellite Navigation, 2021
The BeiDou Navigation Satellite System (BDS) provides global Positioning, Velocity, And Timing (PVT) services that are widely used in various areas. The BDS satellites frequently need the orbit maneuvers due to various perturbations to keep satellites in
Rui Tu   +5 more
doaj   +1 more source

Complexity of ITL model checking: some well-behaved fragments of the interval logic HS

open access: yes, 2015
Model checking has been successfully used in many computer science fields, including artificial intelligence, theoretical computer science, and databases.
Molinari, A., Montanari, A., Peron, A.
core   +1 more source

A Quantum-Based Microwave Magnetic Field Sensor

open access: yesSensors, 2018
In this paper, a quantum-based method for measuring the microwave magnetic field in free space is presented by exploring atomic Rabi resonance in the clock transition of 133Cs.
Hao Shi   +5 more
doaj   +1 more source

An Evaluation of the Zeeman Shift of the 87Sr Optical Lattice Clock at the National Time Service Center

open access: yesApplied Sciences, 2020
The Zeeman shift plays an important role in the evaluation of optical lattice clocks since a strong bias magnetic field is applied for departing Zeeman sublevels and defining a quantization axis.
Xiaotong Lu   +4 more
doaj   +1 more source

382 mW External-Cavity Frequency Doubling 461 nm Laser Based on Quasi-Phase Matching

open access: yesPhotonics, 2023
To rapidly improve strontium optical clocks, a high-power, high-efficiency, and high-beam-quality 461 nm laser is required. In blue lasers based on periodically poled KTiOPO4 crystals, the optical absorption in the crystals can induce thermal effects ...
Yingxin Chen   +3 more
doaj   +1 more source

Sustainable Urban Drainage Systems: Themes of Public Perception—A Case Study

open access: yesLand, 2022
Climate adaptation measures address the challenges that densification and climate change impose on the urban environment. Sustainable urban drainage system (SUDS) constructs include the introduction of natural elements, such as riparian buffers ...
Bridget Thodesen   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy