Showing 861 - 880 results of 1,844 for search '"exponentiation"', query time: 0.05s Refine Results
  1. 861

    Effects of Brinkman number on thermal-driven convective spherical Dynamos by MI Ngwueke, TM Abbey

    Published 2013-07-01
    “…The consequence of this exponential dependence of viscosity on temperature is considered to be a thermaldriven convective phenomenon. …”
    Get full text
    Article
  2. 862

    Application of adsorption potential theory in prediction of CO and CH adsorption on carbon molecular sieves by Xue Song, Li’ao Wang, Yifu Li, Yunmin Zeng, Xinyuan Zhan, Jian Gong

    Published 2018-12-01
    “…The methods to obtain the adsorption density in the adsorbed phase, including Ozawa’s method and the empirical method, and the methods to calculate the virtual saturation vapor pressure, including Dubinin’s method and Amankwah’s method, were discussed. A functional exponential form proposed in this study could describe the adsorption characteristic curve better than the cubic polynomial and logarithmic function used in the previous literature. …”
    Get full text
    Article
  3. 863

    Optimal Quantum Circuit Cuts with Application to Clustered Hamiltonian Simulation by Aram W. Harrow, Angus Lowe

    Published 2025-01-01
    “…Specifically we show that interactions can be removed at a cost, which is exponential in the sum of their strengths times the evolution time, and vanishing in the limit of weak interactions. …”
    Get full text
    Article
  4. 864

    Delay-Dependent Synchronization for Complex Dynamical Networks with Interval Time-Varying and Switched Coupling Delays by T. Botmart, P. Niamsup

    Published 2013-01-01
    “…We investigate the local exponential synchronization for complex dynamical networks with interval time-varying delays in the dynamical nodes and the switched coupling term simultaneously. …”
    Get full text
    Article
  5. 865

    Triple receiver public key encryption cryptosystem by Liutao ZHAO, Lin ZHONG, Jidong LIU, Caiqun WANG, Dan WU

    Published 2020-12-01
    “…A triple receiver public key cryptosystem was proposed.In the cryptosystem,a sender encrypted a message and sent to three receivers,while the three receivers were able to decrypt the message with their own private keys.Based on bilinear map,two triple receiver public key encryption schemes with different security were constructed.If the gap bilinear Diffie-Hellman (GBDH) problem and the computational Diffie-Hellman (CDH) problem were proved formally to be intractable,then the two schemes proposed were semantically secure against chosen-plaintext attacks and against adaptive chosen ciphertext attacks respectively.The proposed scheme only added an exponential operation and a hash operation,and constructed three independent receivers which had a high efficiency.Analyses show that proposed scheme can improve the security of TLS protocol and apply to hierarchical public key cryptosystems.…”
    Get full text
    Article
  6. 866

    Code-based generalized signcryption scheme with multi-receiver by Yiliang HAN, Zhong WANG

    Published 2020-01-01
    “…In order to solve the problem of secure transmission of messages with multiple receivers,a code-based generalized signcryption scheme with multi-receiver was designed.Firstly,a multi-encrypted McEliece scheme that can meet the security of IND-CCA2 was designed.Combined with the CFS signature scheme,the multi-receiver signcryption and generalized signcryption scheme based on code were designed.The security analysis shows that the multi-receiver generalized signcryption scheme can meet the security of IND-CCA2 in terms of confidentiality and can meet EUF-CMA security in terms of unforgeability.Compared with other similar multi-receiver signcryption schemes,the proposed scheme does not include exponential,bilinear pairing operations,etc.,and has high computational efficiency and the advantage of anti-quantum computing.Compared with the method of signing-then-encrypting method,the proposed scheme has the smaller private key and higher efficiency.…”
    Get full text
    Article
  7. 867

    Disorder-free Sachdev-Ye-Kitaev models: Integrability and a precursor of chaos by Soshun Ozaki, Hosho Katsura

    Published 2025-01-01
    “…From the solutions, we find that out-of-time-order correlators (OTOCs) in these models exhibit exponential growth at early times, resembling that of many-body quantum chaotic systems, such as those with disorder or external kick terms, despite their large N behavior differing from that of typical chaotic systems. …”
    Get full text
    Article
  8. 868

    Periodontal microsurgery: Achieving unprecedented levels of precision – A narrative review by C. Cynthia Leslie, Anitha Vijayarangan, Agila Elumalai

    Published 2024-12-01
    “…With the introduction of contemporary technological advancements, like microsurgery, periodontology has experienced exponential growth. Microsurgery is linked to better visual perception, ergonomic advantages, lower patient complications, faster healing, and increased patient acceptability in periodontal therapy. …”
    Get full text
    Article
  9. 869

    New visions for sustainability during a pandemic Towards sustainable wellbeing in a changing planet by Adriana GALVANI, Maria SOTELO PEREZ, Alan LEW

    Published 2020-02-01
    “…In recent decades, the human mind has been producing exponential changes, though some of these have been delivered in perhaps less than desirable directions. …”
    Get full text
    Article
  10. 870

    Beat Phenomenon Analysis of Concrete Beam with Piezoelectric Sensors by Xu Li, Linsheng Huo, Hongnan Li

    Published 2012-09-01
    “…As the damping ratios increased, the amplitude of beat signal will die out in an exponential decay. Meanwhile, the damping has a tiny influence on the beat frequency of system response, the amplitudes of beat signal both in the time and frequency domain are changed with the variation of impact direction. …”
    Get full text
    Article
  11. 871

    Upper processing gain bound of the spreading signal in multipath fading channels by Wan-zhi MA, Jun WANG, You-xi TANG

    Published 2012-03-01
    “…Using the joint algorithm of coherent detection and non-coherent detection,the upper processing gain bound of the spreading signal,which is two-dimensional spread spectrum signal relative to BPSK and transmitted in rich scattering multipath fading channel,was sought.Firstly,the expression of the processing gain of the spreading signal was calculated.Secondly,with increasing signal bandwidth or symbol period unlimitedly,the processing gain was bounded.At last,it was obtained that the upper processing gain bound is determined by the channel parameters and signal noise io.By analysis and simulation,the processing gain of the spreading signal,relative to BPSK and transmits in rich scattering multipath fading channel,is not more than 30dB,when the signal noise ratio is 20dB,the maximum doppler shift is 100Hz,and the negative exponential factor is 5×10<sup>−6</sup>.…”
    Get full text
    Article
  12. 872

    On the Investigation of Effective Factors on Electronic Structure Properties of Transition Metal Complexes: Robust Modeling Using GPR Approach by Jianjun Wang, Mohammad Mahdi Molla Jafari

    Published 2022-01-01
    “…The coefficients of determination were calculated to be 0.986 for the exponential and Matern kernel functions, suggesting the highest predictive power of these methods. …”
    Get full text
    Article
  13. 873

    Research on Dynamic and Complexity of Energy-Saving Investment about Multichannel and Multienergy Supply Chain by Fang Wu

    Published 2020-01-01
    “…The energy loss rate is an exponential function of line loss investment. Through the bifurcation graph, Lyapunov exponent, and the basin of parameter, the complex characteristics of the investment market are analyzed. …”
    Get full text
    Article
  14. 874

    Modeling of Lightning Strokes Using Two-Peaked Channel-Base Currents by V. Javor

    Published 2012-01-01
    “…For the three “engineering” models: transmission line model (without the peak current decay), transmission line model with linear decay, and transmission line model with exponential decay with height, the comparison of electric and magnetic field components at different distances from the lightning channel-base is presented in the case of a perfectly conducting ground. …”
    Get full text
    Article
  15. 875

    Contraction Mapping Theory and Approach to LMI-Based Stability Criteria of T-S Fuzzy Impulsive Time-Delays Integrodifferential Equations by Ruofeng Rao, Shouming Zhong

    Published 2016-01-01
    “…In this paper, Banach fixed point theorem is employed to derive LMI-based exponential stability of impulsive Takagi-Sugeno (T-S) fuzzy integrodifferential equations, originated from Cohen-Grossberg Neural Networks (CGNNs). …”
    Get full text
    Article
  16. 876

    Investigation on Shear Wave Velocity and Triaxial Mechanical Performance of Tailings Core from Tailings Dam by Pengfei Luo

    Published 2021-01-01
    “…The results showed the following. (1) The linear function fitting could characterize the quantitative relationship between shear wave velocity and hole depth. (2) The corresponding static pressure coefficient increased as the confining pressure increased. The exponential fitting could characterize the quantitative function relation between the static pressure coefficient and the confining pressure. (3) The cohesion and internal friction angle of the tailings sample were 20 kPa and 41°, respectively, and the logarithmic fitting could better characterize the quantitative relation between shear peak strength and confining pressure. …”
    Get full text
    Article
  17. 877

    Optimal receiver and blind demodulation performance bounds for single channel co-frequency mixed signals by YU Hongyi, ZHA Renpeng, SHEN Zhixiang, SHEN Caiyao, HU Yunpeng

    Published 2024-12-01
    “…Since the complexity of the optimal receiver grows exponentially with the equivalent symbol rate sampling channel length, the impact of the truncation error on the blind demodulation performance was further analyzed for the channel truncation problem in practical applications. …”
    Get full text
    Article
  18. 878

    Energy-aware path strategy for embedded network by Yang-Hsin Fan

    Published 2017-10-01
    “…In addition, low-cost and speed time-to-market characteristics make the increase in embedded network being exponential. As a result, a new battleground of energy saving become a significant challenge as a huge amount of embedded systems collaborate with tasks. …”
    Get full text
    Article
  19. 879

    Stochastic Generator of a New Family of Lifetime Distributions with Illustration by Amjad Al-Nasser, Ahmad Hanandeh

    Published 2025-02-01
    “…The proposed distribution was tested on real-life data, the results showed that the ET-exponential distribution performed better than other well-known distributions in modeling data. …”
    Get full text
    Article
  20. 880

    Research of Transmission Error Modeling and Its Parameter Sensitivity of the Cable-driven Sheave by Xu Chuntian, Wang Peng

    Published 2018-01-01
    “…Then,in view of the complicated nonlinear relations between the parameters and transmission error of the cable-driven sheaves,a method for fitting data with an exponential curve is proposed,by which this model is simplified as relations between the transmission error and single factor. …”
    Get full text
    Article