Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content
    • by 
    •   16  
      Number TheorySignal ProcessingAlgorithmMultidisciplinary
    • by 
    •   4  
      Applied MathematicsPure MathematicsDiscrete MathematicsLattice
    • by 
    •   5  
      EconomicsMathematical Models for Social SciencesMathematical SciencesLattice
    • by 
    •   4  
      Number TheoryCryptographyLatticePublic Key
    • by 
    •   11  
      EngineeringWaterPredictionGibbs Free Energy
    • by 
    •   14  
      DesignBibliographyTheoryStress
    • by 
    •   7  
      Applied MathematicsPure MathematicsMathematical AnalysisBounded Variation
As said by Archimedes give me a long enough lever and a fulcrum and I shall move the world A bell crank lever is a connector component which is used to change the direction of force applied on to a component. the motion of it can be... more
    • by 
    •   7  
      ToleranceBellAutomotiveAnalyze
    • by 
    •   11  
      Distributed ComputingSynchronizationParallel & Distributed ComputingEfficient Algorithm for ECG Coding
    • by 
    •   8  
      Distributed ComputingSynchronizationParallel & Distributed ComputingLattice
    • by  and +1
    •   8  
      TopologyRepresentation TheoryBoolean AlgebraRelational Algebra
    • by 
    •   14  
      Fuzzy LogicPure MathematicsKnowledgeCase Study
    • by 
    •   6  
      SemanticsProof TheoryModelingParaconsistent logic
Louis Hjelmslev en sus Prolegómenos a una teoría del lenguaje anticipa los fundamentos de una teoría semiótica axiomáticamente consistente. El andamiaje teórico construido por Hjelmslev busca conformar un 'álgebra lingüística'... more
    • by 
    •   7  
      SemioticsLinguisticsOrderDiagram
Third-generation low-emittance storage-ring light sources based on double- and triple-bend cells and undulator magnets have been in operation around the world for more than two decades. On the horizon is a new generation based on the... more
    • by 
    •   3  
      Synchrotron RadiationLatticeOptical physics
    • by 
    •   9  
      MathematicsNumber TheoryAlgebraRing
    • by 
    •   3  
      LatticeTorusKlein Bottle
    • by 
    •   5  
      StructureLatticeX-RayMSE
    • by 
    •   9  
      ModelingHolismData Warehouseexpert System
    • by 
    •   4  
      Mathematical PhysicsAlgorithmsLatticeHilbert Space
    • by 
    •   17  
      FractureMultidisciplinaryTransportNumerical Simulation
    • by 
    •   12  
      Computer SecurityAlgorithmicsCryptologyArithmetics
Lattice-based signature schemes following the Goldreich–Goldwasser–Halevi (GGH) design have the unusual property that each signature leaks information on the signer’s secret key, but this does not necessarily imply that such schemes are... more
    • by 
    •   20  
      Digital SignatureMathematical ProgrammingLearning problemsCryptography
    • by 
    •   6  
      Pure MathematicsMultiplicityVolumeLattice
    • by 
    •   7  
      SemanticsLinguisticsKnowledge RepresentationGrammar
    • by 
    •   10  
      Applied MathematicsCombinatoricsPure MathematicsDiscrete Mathematics
Third-generation low-emittance storage-ring light sources based on double- and triple-bend cells and undulator magnets have been in operation around the world for more than two decades. On the horizon is a new generation based on the... more
    • by  and +1
    •   3  
      Synchrotron RadiationLatticeOptical physics
In this study, magnesia stabilized zirconia based nanocrystalline ceramics were produced through a polymer precursor route using gadolinium and boron. The powders were characterized during the various steps by structural and morphological... more
    • by 
    •   52  
      Materials ScienceComposite Materials and StructuresMaterials CharacterisationNanomaterials
We consider special subclasses of the class of Lindelöf Σ-spaces obtained by imposing restrictions on the weight of the elements of compact covers that admit countable networks: A space X is in the class LΣ( � κ) if it admits a cover by... more
    • by 
    •   3  
      Pure MathematicsLatticeabsoluteness
    • by 
    •   3  
      ReductionLatticeKnapsack
    • by 
    •   7  
      Applied MathematicsCombinatoricsDiscrete MathematicsEnumeration
    • by  and +1
    •   24  
      Environmental EngineeringCivil EngineeringAlgorithmsHydraulics
    • by 
    •   4  
      Discrete GeometryLattice TheoryImage ProcessingLattice
    • by 
    •   15  
      VisualizationLight ScatteringData VisualisationSampling
    • by 
    •   2  
      Quantum ChromodynamicsLattice
    • by 
    •   9  
      Applied MathematicsCombinatoricsPure MathematicsDiscrete Mathematics
    • by 
    •   14  
      Computer ScienceComputer NetworksRelationsGroups
In this paper, an optimal aggregation and counter-aggregation (drill-down) methodology is proposed on multidimensional data cube. The main idea is to aggregate on smaller cuboids after partitioning those depending on the cardinality of... more
    • by 
    •   7  
      Data MiningData WarehousingData WarehouseOLAP
    • by 
    •   9  
      EngineeringInformation TheoryMachine LearningProbability
    • by 
    •   7  
      Public key cryptographyLatticeGrobner basesMultivariate Tutte polynomial
Internet of things (IoT) deals with massive collected data. Most of these data are personality information that needs to be protected from hacking and unauthorized access. In other hand, these massive data needs processing speed. To meet... more
    • by 
    •   6  
      The Internet of ThingsParallel ProcessingData SecurityLattice
    • by 
    •   6  
      PhilosophySemanticsMathematical LogicPure Mathematics
    • by 
    •   5  
      HomogenizationAssemblyLatticeInterdisciplinary Engineering
This paper gives a isomorphic representation of the subtheories RT − , RT − EC, and RT of Asher and Vieu’s first-order ontology of mereotopology RT0. It corrects and extends previous work on the representation of these mereotopologies. We... more
    • by 
    •   18  
      Cognitive ScienceMathematicsLattice Theory (Order Theory)Computer Science
    • by 
    •   12  
      Signal ProcessingAudio Signal ProcessingPsychoacousticsCoding
    • by 
    •   7  
      Lambda CalculusPure MathematicsLatticeFixed Point Theorem
    • by 
    •   20  
      Fluid MechanicsHydraulicsEarthFracture
    • by 
    •   12  
      RelationsGroupsMatchingSpanning Trees
In this paper, we study the security of multi-prime RSA whose modulus is N = p1p2 pr for r 3 with small prime difference of size N . In ACISP 2013, Zhang and Takagi showed a Fermat-like factoring attack, which can directly factor N for... more
    • by 
    •   3  
      Computer ScienceCryptanalysisLattice
    • by 
    •   5  
      Number TheoryComputer ScienceCryptographyLattice