-
861
Effects of Brinkman number on thermal-driven convective spherical Dynamos
Published 2013-07-01“…The consequence of this exponential dependence of viscosity on temperature is considered to be a thermaldriven convective phenomenon. …”
Get full text
Article -
862
Application of adsorption potential theory in prediction of CO and CH adsorption on carbon molecular sieves
Published 2018-12-01“…The methods to obtain the adsorption density in the adsorbed phase, including Ozawa’s method and the empirical method, and the methods to calculate the virtual saturation vapor pressure, including Dubinin’s method and Amankwah’s method, were discussed. A functional exponential form proposed in this study could describe the adsorption characteristic curve better than the cubic polynomial and logarithmic function used in the previous literature. …”
Get full text
Article -
863
Optimal Quantum Circuit Cuts with Application to Clustered Hamiltonian Simulation
Published 2025-01-01“…Specifically we show that interactions can be removed at a cost, which is exponential in the sum of their strengths times the evolution time, and vanishing in the limit of weak interactions. …”
Get full text
Article -
864
Delay-Dependent Synchronization for Complex Dynamical Networks with Interval Time-Varying and Switched Coupling Delays
Published 2013-01-01“…We investigate the local exponential synchronization for complex dynamical networks with interval time-varying delays in the dynamical nodes and the switched coupling term simultaneously. …”
Get full text
Article -
865
Triple receiver public key encryption cryptosystem
Published 2020-12-01“…A triple receiver public key cryptosystem was proposed.In the cryptosystem,a sender encrypted a message and sent to three receivers,while the three receivers were able to decrypt the message with their own private keys.Based on bilinear map,two triple receiver public key encryption schemes with different security were constructed.If the gap bilinear Diffie-Hellman (GBDH) problem and the computational Diffie-Hellman (CDH) problem were proved formally to be intractable,then the two schemes proposed were semantically secure against chosen-plaintext attacks and against adaptive chosen ciphertext attacks respectively.The proposed scheme only added an exponential operation and a hash operation,and constructed three independent receivers which had a high efficiency.Analyses show that proposed scheme can improve the security of TLS protocol and apply to hierarchical public key cryptosystems.…”
Get full text
Article -
866
Code-based generalized signcryption scheme with multi-receiver
Published 2020-01-01“…In order to solve the problem of secure transmission of messages with multiple receivers,a code-based generalized signcryption scheme with multi-receiver was designed.Firstly,a multi-encrypted McEliece scheme that can meet the security of IND-CCA2 was designed.Combined with the CFS signature scheme,the multi-receiver signcryption and generalized signcryption scheme based on code were designed.The security analysis shows that the multi-receiver generalized signcryption scheme can meet the security of IND-CCA2 in terms of confidentiality and can meet EUF-CMA security in terms of unforgeability.Compared with other similar multi-receiver signcryption schemes,the proposed scheme does not include exponential,bilinear pairing operations,etc.,and has high computational efficiency and the advantage of anti-quantum computing.Compared with the method of signing-then-encrypting method,the proposed scheme has the smaller private key and higher efficiency.…”
Get full text
Article -
867
Disorder-free Sachdev-Ye-Kitaev models: Integrability and a precursor of chaos
Published 2025-01-01“…From the solutions, we find that out-of-time-order correlators (OTOCs) in these models exhibit exponential growth at early times, resembling that of many-body quantum chaotic systems, such as those with disorder or external kick terms, despite their large N behavior differing from that of typical chaotic systems. …”
Get full text
Article -
868
Periodontal microsurgery: Achieving unprecedented levels of precision – A narrative review
Published 2024-12-01“…With the introduction of contemporary technological advancements, like microsurgery, periodontology has experienced exponential growth. Microsurgery is linked to better visual perception, ergonomic advantages, lower patient complications, faster healing, and increased patient acceptability in periodontal therapy. …”
Get full text
Article -
869
New visions for sustainability during a pandemic Towards sustainable wellbeing in a changing planet
Published 2020-02-01“…In recent decades, the human mind has been producing exponential changes, though some of these have been delivered in perhaps less than desirable directions. …”
Get full text
Article -
870
Beat Phenomenon Analysis of Concrete Beam with Piezoelectric Sensors
Published 2012-09-01“…As the damping ratios increased, the amplitude of beat signal will die out in an exponential decay. Meanwhile, the damping has a tiny influence on the beat frequency of system response, the amplitudes of beat signal both in the time and frequency domain are changed with the variation of impact direction. …”
Get full text
Article -
871
Upper processing gain bound of the spreading signal in multipath fading channels
Published 2012-03-01“…Using the joint algorithm of coherent detection and non-coherent detection,the upper processing gain bound of the spreading signal,which is two-dimensional spread spectrum signal relative to BPSK and transmitted in rich scattering multipath fading channel,was sought.Firstly,the expression of the processing gain of the spreading signal was calculated.Secondly,with increasing signal bandwidth or symbol period unlimitedly,the processing gain was bounded.At last,it was obtained that the upper processing gain bound is determined by the channel parameters and signal noise io.By analysis and simulation,the processing gain of the spreading signal,relative to BPSK and transmits in rich scattering multipath fading channel,is not more than 30dB,when the signal noise ratio is 20dB,the maximum doppler shift is 100Hz,and the negative exponential factor is 5×10<sup>−6</sup>.…”
Get full text
Article -
872
On the Investigation of Effective Factors on Electronic Structure Properties of Transition Metal Complexes: Robust Modeling Using GPR Approach
Published 2022-01-01“…The coefficients of determination were calculated to be 0.986 for the exponential and Matern kernel functions, suggesting the highest predictive power of these methods. …”
Get full text
Article -
873
Research on Dynamic and Complexity of Energy-Saving Investment about Multichannel and Multienergy Supply Chain
Published 2020-01-01“…The energy loss rate is an exponential function of line loss investment. Through the bifurcation graph, Lyapunov exponent, and the basin of parameter, the complex characteristics of the investment market are analyzed. …”
Get full text
Article -
874
Modeling of Lightning Strokes Using Two-Peaked Channel-Base Currents
Published 2012-01-01“…For the three “engineering” models: transmission line model (without the peak current decay), transmission line model with linear decay, and transmission line model with exponential decay with height, the comparison of electric and magnetic field components at different distances from the lightning channel-base is presented in the case of a perfectly conducting ground. …”
Get full text
Article -
875
Contraction Mapping Theory and Approach to LMI-Based Stability Criteria of T-S Fuzzy Impulsive Time-Delays Integrodifferential Equations
Published 2016-01-01“…In this paper, Banach fixed point theorem is employed to derive LMI-based exponential stability of impulsive Takagi-Sugeno (T-S) fuzzy integrodifferential equations, originated from Cohen-Grossberg Neural Networks (CGNNs). …”
Get full text
Article -
876
Investigation on Shear Wave Velocity and Triaxial Mechanical Performance of Tailings Core from Tailings Dam
Published 2021-01-01“…The results showed the following. (1) The linear function fitting could characterize the quantitative relationship between shear wave velocity and hole depth. (2) The corresponding static pressure coefficient increased as the confining pressure increased. The exponential fitting could characterize the quantitative function relation between the static pressure coefficient and the confining pressure. (3) The cohesion and internal friction angle of the tailings sample were 20 kPa and 41°, respectively, and the logarithmic fitting could better characterize the quantitative relation between shear peak strength and confining pressure. …”
Get full text
Article -
877
Optimal receiver and blind demodulation performance bounds for single channel co-frequency mixed signals
Published 2024-12-01“…Since the complexity of the optimal receiver grows exponentially with the equivalent symbol rate sampling channel length, the impact of the truncation error on the blind demodulation performance was further analyzed for the channel truncation problem in practical applications. …”
Get full text
Article -
878
Energy-aware path strategy for embedded network
Published 2017-10-01“…In addition, low-cost and speed time-to-market characteristics make the increase in embedded network being exponential. As a result, a new battleground of energy saving become a significant challenge as a huge amount of embedded systems collaborate with tasks. …”
Get full text
Article -
879
Stochastic Generator of a New Family of Lifetime Distributions with Illustration
Published 2025-02-01“…The proposed distribution was tested on real-life data, the results showed that the ET-exponential distribution performed better than other well-known distributions in modeling data. …”
Get full text
Article -
880
Research of Transmission Error Modeling and Its Parameter Sensitivity of the Cable-driven Sheave
Published 2018-01-01“…Then,in view of the complicated nonlinear relations between the parameters and transmission error of the cable-driven sheaves,a method for fitting data with an exponential curve is proposed,by which this model is simplified as relations between the transmission error and single factor. …”
Get full text
Article