Showing 361 - 380 results of 1,844 for search '"exponentiation"', query time: 0.06s Refine Results
  1. 361
  2. 362
  3. 363
  4. 364
  5. 365

    Power spectral analysis of voltage-gated channels in neurons by Christophe Magnani, Lee E. Moore

    Published 2025-01-01
    “…Importantly, it introduces a novel sequential chemical state model, named p2, which is more general than the Hodgkin–Huxley formulation, so that the probability for an ion channel to be open does not imply exponentiation. In particular, it is demonstrated that the p2 (without exponentiation) and n4 (with exponentiation) models can produce similar neuronal responses. …”
    Get full text
    Article
  6. 366

    The Ecological Model of Pastures Zoning of Kurdistan Province Emphasizing on the Climatic Elements of Temperature and Precipitation by Gholamali Mozafari, Farshad Safarpour

    Published 2013-05-01
    “…The results of the study showed that using the different informational layers corresponding ecological needs of pasture plants is an optimal method for providing an appropriate classification of pastures. 37824.2 hectare out of 2904642.7 hectare of the total area of Kurdistan province were classified as good with an exponentiation of degree 1, while 402891.3 hectare were classified as medium with an exponentiation of degree 2 and 411897.1 as poor with an exponentiation of degree 3.…”
    Get full text
    Article
  7. 367

    High-speed hardware architecture design and implementation of Ed25519 signature verification algorithm by Yiming XUE, Shurong LIU, Shuheng GUO, Yan LI, Cai’e HU

    Published 2022-03-01
    “…Aiming at the high performance requirements of signature verification for specific scenarios such as blockchain, a high-speed hardware architecture of Ed25519 was proposed.To reduce the number of calculations for point addition and point double, a multiple point multiplication algorithm based on interleaving NAF was conducted by using pre-computation and lookup tables.The modular multiplication operation was realized by using the Karatsuba multiplication and fast reduction method, and the point addition and point double operation was designed without modular addition and subtraction, which could effectively improve the performance of point addition and point double.Given that modular exponentiation was the most time-consuming operation in the decompression process, a new modular exponentiation approach was developed by parallelizing modular inverse and modular multiplication, and therefore the performance of the de-compression operation could be improved.The proposed architecture fully considers the use of resources and is implemented on the Zynq-7020 FPGA platform with 13 695 slices, achieving 8 347 verifications per second at 81.6 MHz.…”
    Get full text
    Article
  8. 368

    Efficient and fully simulated oblivious transfer protocol on elliptic curve by Jiashuo SONG, Zhenzhen LI, Haiyang DING, Zichen LI

    Published 2023-02-01
    “…Oblivious transfer protocol, an important technology in secure multi-party computation, is the research hotspot on network and information security.Based on the bilinear pairs and the difficult problems on elliptic curves, an efficient 1-out-of-N oblivious transfer protocol in the semi-honest model and in the standard malicious model were proposed respectively.The protocol in semi-honest model was designed.It only needed two rounds of interaction.The receiver needed two times of bilinear pair arithmetic and one time of multi point arithmetic, and the sender needed n times of multi point arithmetic and n times of modular exponentiation.The security of the protocol was based on the discrete logarithm problem on elliptic curves.A zero-knowledge proof protocol and the oblivious transfer protocol in the standard malicious model were proposed respectively.The oblivious transfer protocol only needed four rounds of interaction.The receiver needed three times of bilinear pair arithmetic and three times of multi point arithmetic, and the sender needed n+1 times of multi point arithmetic and n+1 times of modular exponentiation.Besides, it can resist malicious behaviors of the party.The results show that the average running time of the protocol in the semi-honest model and in the standard malicious model were 0.787 9 s and 1.205 6 s respectively, which can further demonstrate the efficiency of the protocol.…”
    Get full text
    Article
  9. 369

    Research of the small Qubit quantum computing attack to the RSA public key cryptography by Bao-nan WANG, Yu-hang CHEN, Bao YIN, Feng HU, Huan-guo ZHANG, Chao WANG

    Published 2017-10-01
    “…The small Qubit quantum algorithm attack to RSA was proposed,the need Qubit of the first quantum register from 2L to L1,it can be reduced to 2 Qubit,the overall space complexity denoted (L1,L),where 2L1≥r,r is the period of decomposed.Because of the reduce of the first quantum register,it reduces the algorithm’s complexity and success rates,and use the binary look-up table method to compute the modular exponentiation,it enhances the computing speed.The improved algorithm’s quantum circuit complexity is T=O(2L2).It have a significant improvement on the time complexity and space complexity.Although the success rate is reduced,the overall success solution time is still lower than the Shor algorithm and the current major improvements Shor algorithm.Completed a simulation experiment.Respectively use the 11、10、9 Qubit decomposing the quantum circuit 119.The new algorithm explore the reality of using a universal quantum computer device to decipher the public key cryptography.…”
    Get full text
    Article
  10. 370

    Multi-ciphertext batch auditable decryption outsourcing SM9-HIBE key encapsulation mechanism by Kuan LIU, Jianting NING, Wei WU, Shengmin XU, Chao LIN

    Published 2023-12-01
    “…The decryption operation of SM9-HIBE key encapsulation mechanism required two bilinear pairing operations, for the equipment requiring frequent decryption of massive data and with limited computing resources, such resourcing-consuming pairing operation will become an important bottleneck restricting the system deployment.To address the above issue, a decryption outsourcing key encapsulation mechanism OASM9-HIBE based on SM9-HIBE was proposed, which supported multi-ciphertext batch auditing.The Fujisaki-Okamoto transformation technology was utilized to prove the RCCA security of OASM9-HIBE under the random oracle model.All resourcing-consuming bilinear pairing operations were safely offloaded to the cloud server in OASM9-HIBE, the k-th hierarchical user only need to perform one simple exponentiation operation to complete the final decryption.The decryption efficiency of the original SM9-HIBE was effectively improved under the premise of not changing the downward proxy generation function of the user’s private key between hierarchical.OASM9-HIBE additively achieved the property of batch auditing of multi-transformed ciphertexts by employing the key blinding technology.Theoretical analysis and evaluation of experimental data highlight the feasibility and efficiency of OASM9-HIBE, OASM9-HIBE extends the application field of SM9 series algorithms.…”
    Get full text
    Article
  11. 371

    Engineering Circuit Analysis / by Hayt, William H. (William Hart), Jr., 1920-1999

    Published 2012
    Table of Contents: “…Mesh Analysis: A Comparison -- 4.6.Computer-Aided Circuit Analysis -- Summary And Review -- Reading Further -- Exercises -- ch. 5 Handy Circuit Analysis Techniques -- 5.1.Linearity and Superposition -- 5.2.Source Transformations -- 5.3.Thevenin and Norton Equivalent Circuits -- 5.4.Maximum Power Transfer -- 5.5.Delta-Wye Conversion -- 5.6.Selecting an Approach: A Summary of Various Techniques -- Summary And Review -- Reading Further -- Exercises -- ch. 6 The Operational Amplifier -- 6.1.Background -- 6.2.The Ideal Op Amp: A Cordial Introduction -- 6.3.Cascaded Stages -- 6.4.Circuits for Voltage and Current Sources -- 6.5.Practical Considerations -- 6.6.Comparators and the Instrumentation Amplifier -- Summary And Review -- Reading Further -- Exercises -- ch. 7 Capacitors And Inductors -- 7.1.The Capacitor -- 7.2.The Inductor -- 7.3.Inductance and Capacitance Combinations -- 7.4.Consequences of Linearity -- 7.5.Simple Op Amp Circuits with Capacitors -- 7.6.Duality -- 7.7.Modeling Capacitors and Inductors with PSpice -- Summary And Review -- Reading Further -- Exercises -- ch. 8 Basic Rl And Rc Circuits -- 8.1.The Source-Free RL Circuit -- 8.2.Properties of the Exponential Response -- 8.3.The Source-Free RC Circuit -- 8.4.A More General Perspective -- 8.5.The Unit-Step Function -- 8.6.Driven RL Circuits -- 8.7.Natural and Forced Response -- 8.8.Driven AC Circuits -- 8.9.Predicting the Response of Sequentially Switched Circuits -- Summary And Review -- Reading Further -- Exercises -- ch. 9 The Rcl Circuit -- 9.1.The Source-Free Parallel Circuit -- 9.2.The Overdamped Parallel RLC Circuit -- 9.3.Critical Damping -- 9.4.The Underdamped Parallel RLC Circuit -- 9.5.The Source-Free Series RLC Circuit -- 9.6.The Complete Response of the RLC Circuit -- 9.7.The Lossless LC Circuit -- Summary And Review -- Reading Further -- Exercises -- ch. 10 Sinusoidal Steady-State Analysis -- 10.1.Characteristics of Sinusoids -- 10.2.Forced Response to Sinusoidal Functions -- 10.3.The Complex Forcing Function -- 10.4.The Phasor -- 10.5.Impedance and Admittance -- 10.6.Nodal and Mesh Analysis -- 10.7.Superposition, Source Transformations and Thevenin's Theorem -- 10.8.Phasor Diagrams -- Summary And Review -- Reading Further -- Exercises -- ch. 11 Ac Circuit Power Analysis -- 11.1.Instantaneous Power -- 11.2.Average Power -- 11.3.Effective Values of Current and Voltage -- 11.4.Apparent Power and Power Factor -- 11.5.Complex Power -- Summary And Review -- Reading Further -- Exercises -- ch. 12 Polyphase Circuits -- 12.1.Polyphase Systems -- 12.2.Single-Phase Three-Wire Systems -- 12.3.Three-Phase Y-Y Connection -- 12.4.The Delta (A) Connection -- 12.5.Power Measurement in Three-Phase Systems -- Summary And Review -- Reading Further -- Exercises -- ch. 13 Magnetically Coupled Circuits -- 13.1.Mutual Inductance -- 13.2.Energy Considerations -- 13.3.The Linear Transformer -- 13.4.The Ideal Transformer -- Summary And Review -- Reading Further -- Exercises -- ch. 14 Complex Frequency And The Laplace Transform -- 14.1.Complex Frequency -- 14.2.The Damped Sinusoidal Forcing Function -- 14.3.Definition of the Laplace Transform -- 14.4.Laplace Transforms of Simple Time Functions -- 14.5.Inverse Transform Techniques -- 14.6.Basic Theorems for the Laplace Transform -- 14.7.The Initial-Value and Final-Value Theorems -- Summary And Review -- Reading Further -- Exercises -- ch. 15 Circuit Analysis In The s-Domain -- 15.1.Z(s) and Y(s) -- 15.2.Nodal and Mesh Analysis in the s-Domain -- 15.3.Additional Circuit Analysis Techniques -- 15.4.Poles, Zeros, and Transfer Functions -- 15.5.Convolution -- 15.6.The Complex-Frequency Plane -- 15.7.Natural Response and the s Plane -- 15.8.A Technique for Synthesizing the Voltage Ratio H(s) = V out/V in -- Summary And Review -- Reading Further -- Exercises -- ch. 16 Frequency Response -- 16.1.Parallel Resonance -- 16.2.Bandwidth and High-Q Circuits -- 16.3.Series Resonance -- 16.4.Other Resonant Forms -- 16.5.Scaling -- 16.6.Bode Diagrams -- 16.7.Basic Filter Design -- 16.8.Advanced Filter Design -- Summary And Review -- Reading Further -- Exercises -- ch. 17 Two-Port Networks -- 17.1.One-Port Networks -- 17.2.Admittance Parameters -- 17.3.Some Equivalent Networks -- 17.4.Impedance Parameters -- 17.5.Hybrid Parameters -- 17.6.Transmission Parameters -- Summary And Review -- Reading Further -- Exercises -- ch. 18 Fourier Circuit Analysis -- 18.1.Trigonometric Form of the Fourier Series -- 18.2.The Use of Symmetry -- 18.3.Complete Response to Periodic Forcing Functions -- 18.4.Complex Form of the Fourier Series -- 18.5.Definition of the Fourier Transform -- 18.6.Some Properties of the Fourier Transform -- 18.7.Fourier Transform Pairs for Some Simple Time Functions -- 18.8.The Fourier Transform of a General Periodic Time Function -- 18.9.The System Function and Response in the Frequency Domain -- 18.10.The Physical Significance of the System Function -- Summary And Review -- Reading Further -- Exercises.…”
    Publisher description
    Table of contents only
    View in OPAC
    Book
  12. 372

    Integrated 6-DOF Orbit-Attitude Dynamical Modeling and Control Using Geometric Mechanics by Ling Jiang, Yue Wang, Shijie Xu

    Published 2017-01-01
    “…In this paper, we will improve the current method by adopting exponential coordinates on the dynamical level, by giving the relation between the second-order derivative of exponential coordinates and spacecraft’s accelerations. …”
    Get full text
    Article
  13. 373

    Real Gel'fand-Mazur division algebras by Mati Abel, Olga Panova

    Published 2003-01-01
    “…We show that the complexification (A˜,τ˜) of a real locally pseudoconvex (locally absorbingly pseudoconvex, locally multiplicatively pseudoconvex, and exponentially galbed) algebra (A,τ) is a complex locally pseudoconvex (resp., locally absorbingly pseudoconvex, locally multiplicatively pseudoconvex, and exponentially galbed) algebra and all elements in the complexification (A˜,τ˜) of a commutative real exponentially galbed algebra (A,τ) with bounded elements are bounded if the multiplication in (A,τ) is jointly continuous. …”
    Get full text
    Article
  14. 374

    Approaching the Discrete Dynamical Systems by means of Skew-Evolution Semiflows by Codruţa Stoica

    Published 2016-01-01
    “…To this aim, we give definitions and characterizations for the properties of exponential stability and instability, and we extend these techniques to obtain a unified study of the properties of exponential dichotomy and trichotomy. …”
    Get full text
    Article
  15. 375

    Novel Stability Criteria of Nonlinear Uncertain Systems with Time-Varying Delay by Yali Dong, Shengwei Mei, Xueli Wang

    Published 2011-01-01
    “…The problem of robust exponential stabilization for dynamical nonlinear systems with uncertainties and time-varying delay is considered in the paper. …”
    Get full text
    Article
  16. 376

    Stabilization of a Class of Stochastic Systems with Time Delays by Jian Wang, Cuixia Li

    Published 2014-01-01
    “…The problem of exponential stability is investigated for a class of stochastic time-delay systems. …”
    Get full text
    Article
  17. 377

    Optimal Control of Linear Impulsive Antiperiodic Boundary Value Problem on Infinite Dimensional Spaces by JinRong Wang, YanLong Yang

    Published 2010-01-01
    “…A class of optimal control problems for infinite dimensional impulsive antiperiodic boundary value problem is considered. Using exponential stabilizability and discussing the impulsive evolution operators, without compactness and exponential stability of the semigroup governed by original principle operator, we present the existence of optimal controls. …”
    Get full text
    Article
  18. 378

    New Interaction Solutions for a (2 + 1)-Dimensional Vakhnenko Equation by Qing Meng, Bin He

    Published 2020-01-01
    “…By using Hirota’s transformation combined with the three-wave method and with symbolic computation, some interaction solutions which include interaction solutions between exponential and trigonometric functions and interaction solutions between exponential and trigonometric and hyperbolic functions are presented.…”
    Get full text
    Article
  19. 379
  20. 380

    Mean Estimation of a Sensitive Variable under Nonresponse Using Three-Stage RRT Model in Stratified Two-Phase Sampling by Ronald Onyango, Brian Oduor, Francis Odundo

    Published 2022-01-01
    “…From the numerical analysis, the proposed generalized class of exponential ratio-type estimators outperforms ordinary mean estimators, usual ratio estimators, and exponential ratio-type estimators. …”
    Get full text
    Article