Skip to main content
Single frequency estimation is a long-studied problem with application domains including radar, sonar, telecommunications, astronomy and medicine. One method of estimation, called phase unwrapping, attempts to estimate the frequency by... more
    • by 
    •   16  
      Number TheorySignal ProcessingAlgorithmMultidisciplinary
Let V denote V (n, q), the vector space of dimension n over GF(q). A subspace partition of V is a collection Π of subspaces of V such that every nonzero vector in V is contained in exactly one subspace belonging to Π. The set P (V) of all... more
    • by 
    •   4  
      Applied MathematicsPure MathematicsDiscrete MathematicsLattice
The role colouring of a graph is an assignment of colours to the vertices which obeys the rule that two vertices are coloured the same only if their neighbourhoods have the same colour set.
    • by 
    •   5  
      EconomicsMathematical Models for Social SciencesMathematical SciencesLattice
Lattices are regular arrangements of points in n-dimensional space, whose study appeared in the 19th century in both number theory and crystallography. Since the appearance of the celebrated Lenstra-Lenstra-Lovász lattice basis reduction... more
    • by 
    •   4  
      Number TheoryCryptographyLatticePublic Key
In this study, quantitative models for monomer/water and the corresponding polymer/water interfaces were developed. The monomer/water interface was modeled within the framework proposed by Fu and Li (Chem. Eng. Sci. 44 (1989) 1519) for... more
    • by 
    •   11  
      EngineeringWaterPredictionGibbs Free Energy
    • by 
    •   14  
      DesignBibliographyTheoryStress
Let L be a D-lattice, i.e. a lattice ordered effect algebra, and let BV be the Banach space of all real-valued functions of bounded variation on L (vanishing at 0) endowed with the variation norm. We prove the existence of a continuous... more
    • by 
    •   7  
      Applied MathematicsPure MathematicsMathematical AnalysisBounded Variation
As said by Archimedes give me a long enough lever and a fulcrum and I shall move the world A bell crank lever is a connector component which is used to change the direction of force applied on to a component. the motion of it can be... more
    • by 
    •   6  
      ToleranceBellAnalyzeLattice
    • by 
    •   11  
      Distributed ComputingSynchronizationParallel & Distributed ComputingEfficient Algorithm for ECG Coding
We introduce the framework of ordered read-write locks, ORWL, that are characterized by two main features: a strict FIFO policy for access and the attribution of access to lock-handles instead of processes or threads. These two properties... more
    • by 
    •   8  
      Distributed ComputingSynchronizationParallel & Distributed ComputingLattice
    • by  and +1
    •   8  
      TopologyRepresentation TheoryBoolean AlgebraRelational Algebra
This paper describes a technique for identiÿcation of the knowledge structures implicit in scientiÿc data and further develops the supporting methodology for analysis of fuzzy relational structures using the mathematical theory of Fuzzy... more
    • by 
    •   14  
      Fuzzy LogicPure MathematicsKnowledgeCase Study
    • by 
    •   6  
      SemanticsProof TheoryModelingParaconsistent logic
Louis Hjelmslev en sus Prolegómenos a una teoría del lenguaje anticipa los fundamentos de una teoría semiótica axiomáticamente consistente. El andamiaje teórico construido por Hjelmslev busca conformar un 'álgebra lingüística'... more
    • by 
    •   7  
      SemioticsLinguisticsOrderDiagram
Third-generation low-emittance storage-ring light sources based on double- and triple-bend cells and undulator magnets have been in operation around the world for more than two decades. On the horizon is a new generation based on the... more
    • by 
    •   3  
      Synchrotron RadiationLatticeOptical physics
New notions are introduced in algebra in order to better study the congruences in number theory. For example, the <special semigroups> make an important such contribution.
    • by 
    •   9  
      MathematicsNumber TheoryAlgebraRing
This is a survey of results obtained during the last 45 years regarding the intersection behaviour of all longest paths, or all longest cycles, in connected graphs. Planar graphs and graphs of higher connectivity receive special... more
    • by 
    •   3  
      LatticeTorusKlein Bottle
    • by 
    •   5  
      StructureLatticeX-RayMSE
De nombreux modèles ont été proposés pour la modélisation de données multidimensionnelles dans les entrepôts. Ces propositions considèrent une même fonction d'agrégation pour déterminer les valeurs d'une mesure aux différents niveaux de... more
    • by 
    •   9  
      ModelingHolismData Warehouseexpert System
There are five known classes of lattice equations that hold in every infinite dimensional Hilbert space underlying quantum systems: generalised orthoarguesian, Mayet's EA, Godowski, Mayet-Godowski, and Mayet's E equations. We obtain a... more
    • by 
    •   4  
      Mathematical PhysicsAlgorithmsLatticeHilbert Space
We investigate the dissolution of artificial fractures with three-dimensional, pore-scale numerical simulations. The fluid velocity in the fracture space was determined from a lattice-Boltzmann method, and a stochastic solver was used for... more
    • by 
    •   17  
      FractureMultidisciplinaryTransportNumerical Simulation
NTRU is a very efficient public-key cryptosystem based on polynomial arithmetic. Its security is related to the hardness of lattice problems in a very special class of lattices. This article is motivated by an interesting peculiar... more
    • by 
    •   12  
      Computer SecurityAlgorithmicsCryptologyArithmetics
Lattice-based signature schemes following the Goldreich–Goldwasser–Halevi (GGH) design have the unusual property that each signature leaks information on the signer’s secret key, but this does not necessarily imply that such schemes are... more
    • by 
    •   20  
      Digital SignatureMathematical ProgrammingLearning problemsCryptography
The main results of this paper interpret mixed volumes of lattice polytopes as mixed multiplicities of ideals and mixed multiplicities of ideals as Samuel's multiplicities. In particular, we can give a purely algebraic proof of... more
    • by 
    •   6  
      Pure MathematicsMultiplicityVolumeLattice
In his grammar of ancient Sanskrit, Pān. ini represents the phonological classes as intervals of a list. This representation method and especially the actual list constructed by Pān. ini, which is called thé Sivasūtras, earns universal... more
    • by 
    •   7  
      SemanticsLinguisticsKnowledge RepresentationGrammar
Setting n i = n (for all i) in these expressions yields a new proof of a recent result of Duchi and Sulanke [9] relating the total number of chains to the central Delannoy numbers. We also give a novel derivation of the generating... more
    • by 
    •   10  
      Applied MathematicsCombinatoricsPure MathematicsDiscrete Mathematics
Third-generation low-emittance storage-ring light sources based on double- and triple-bend cells and undulator magnets have been in operation around the world for more than two decades. On the horizon is a new generation based on the... more
    • by  and +1
    •   3  
      Synchrotron RadiationLatticeOptical physics
In this study, magnesia stabilized zirconia based nanocrystalline ceramics were produced through a polymer precursor route using gadolinium and boron. The powders were characterized during the various steps by structural and morphological... more
    • by 
    •   45  
      Materials ScienceComposite Materials and StructuresMaterials CharacterisationNanomaterials
We consider special subclasses of the class of Lindelöf Σ-spaces obtained by imposing restrictions on the weight of the elements of compact covers that admit countable networks: A space X is in the class LΣ( � κ) if it admits a cover by... more
    • by 
    •   3  
      Pure MathematicsLatticeabsoluteness
In this paper, we present a new methodology to adapt any kind of lattice reduction algorithms to deal with the modular knapsack problem. In general, the modular knapsack problem can be solved using a lattice reduction algorithm, when its... more
    • by 
    •   3  
      ReductionLatticeKnapsack
Several authors have examined connections among 132-avoiding permutations, continued fractions, and Chebyshev polynomials of the second kind. In this paper we find analogues for some of these results for permutations π avoiding 132 and... more
    • by 
    •   7  
      Applied MathematicsCombinatoricsDiscrete MathematicsEnumeration
We hypothesize that anisotropy in soil properties arises from pore-scale heterogeneity caused by the alignment of aspherical soil particles. We developed a method to predict the permeability tensor from particle shape and packing... more
    • by  and +1
    •   24  
      Environmental EngineeringCivil EngineeringAlgorithmsHydraulics
In this paper, we provide an unified view of two definitions of digital lines in 3D via the use of lattice theory and specific projections of the lattice Z 3. We use this unified vision to explain the extension of the definition of Voss... more
    • by 
    •   4  
      Discrete GeometryLattice TheoryImage ProcessingLattice
We describe a novel volumetric global illumination framework based on the Face-Centered Cubic (FCC) lattice. An FCC lattice has important advantages over a Cartesian lattice. It has higher packing density in the frequency domain, which... more
    • by 
    •   15  
      VisualizationLight ScatteringData VisualisationSampling
An elementary, pedagogical introduction to the large-N limit of QCD and to its phenomenological implications is presented, and a survey of lattice results in the 't Hooft limit is briefly discussed.
    • by 
    •   2  
      Quantum ChromodynamicsLattice
It is shown how a log concave sequence generates a log super-modular function on the lattice being the direct product of two finite chains. The FKG inequality is applied to this function, and results in an inequality that is a... more
    • by 
    •   9  
      Applied MathematicsCombinatoricsPure MathematicsDiscrete Mathematics
Digital Logic: Logic functions, Minimization, Design and synthesis of combinational and sequential circuits; Number representation and computer arithmetic (fixed and floating point). Computer Organization and Architecture: Machine... more
    • by 
    •   14  
      Computer ScienceComputer NetworksRelationsGroups
In this paper, an optimal aggregation and counter-aggregation (drill-down) methodology is proposed on multidimensional data cube. The main idea is to aggregate on smaller cuboids after partitioning those depending on the cardinality of... more
    • by 
    •   7  
      Data MiningData WarehousingData WarehouseOLAP
Bayesian probability theory is an inference calculus, which originates from a generalization of inclusion on the Boolean lattice of logical assertions to a degree of inclusion represented by a real number. Dual to this lattice is the... more
    • by 
    •   9  
      EngineeringInformation TheoryMachine LearningProbability
Up to now, any attempt to use Gröbner bases in the design of public key cryptosystems has failed, as anticipated by a classical paper of B. Barkee et al.; we show why, and show that the only residual hope is to use binomial ideals, i.e.... more
    • by 
    •   7  
      Public key cryptographyLatticeGrobner basesMultivariate Tutte polynomial
Internet of things (IoT) deals with massive collected data. Most of these data are personality information that needs to be protected from hacking and unauthorized access. In other hand, these massive data needs processing speed. To meet... more
    • by 
    •   5  
      The Internet of ThingsParallel ProcessingData SecurityLattice
Introduction. Semilattice semantics for relevant logics were discovered independently by Routley and Urquhart over 10 years ago. A semilattice semantics was first published in [10], where the weak theory of implication of [8] and [3]... more
    • by 
    •   6  
      PhilosophySemanticsMathematical LogicPure Mathematics
A three dimensional, multigroup, neutron diffusion theory based computer code NEMSQR (Nodal Expansion Method for SQuare geometry) is developed for square geometry in order to perform reactor core calculation. The code is based on Nodal... more
    • by 
    •   5  
      HomogenizationAssemblyLatticeInterdisciplinary Engineering
This paper gives a isomorphic representation of the subtheories RT − , RT − EC, and RT of Asher and Vieu’s first-order ontology of mereotopology RT0. It corrects and extends previous work on the representation of these mereotopologies. We... more
    • by 
    •   18  
      Cognitive ScienceMathematicsLattice Theory (Order Theory)Computer Science
Cet article pr~sente une nouvelle mdthode de codage audionum6rique h faible retard et & d~bit rdduit pour des applications ~mergentes en tdldcommunication telles que l'audioconfgrence ou la vidgoconf(rence. Le codeur dgveloppd permet de... more
    • by 
    •   12  
      Signal ProcessingAudio Signal ProcessingPsychoacousticsCoding
The meaning of many k.inds of expressions In programming languages can be tak.en as elements of cerra in spaces of ••partial" objects. In this report these spaces are modeled in one universal domain Pw. the set of all subsets of the... more
    • by 
    •   7  
      Lambda CalculusPure MathematicsLatticeFixed Point Theorem
A detailed understanding of the coupling between fluid and solid mechanics is important for understanding many processes in Earth sciences. Numerical models are a popular means for exploring these processes, but most models do not... more
    • by 
    •   20  
      Fluid MechanicsHydraulicsEarthFracture
Digital Logic: Logic functions, Minimization, Design and synthesis of combinational and sequential circuits; Number representation and computer arithmetic (fixed and floating point). Computer Organization and Architecture: Machine... more
    • by 
    •   12  
      RelationsGroupsMatchingSpanning Trees
In this paper, we study the security of multi-prime RSA whose modulus is N = p1p2 pr for r 3 with small prime difference of size N . In ACISP 2013, Zhang and Takagi showed a Fermat-like factoring attack, which can directly factor N for... more
    • by 
    •   3  
      Computer ScienceCryptanalysisLattice
Lattices are regular arrangements of points in n-dimensional space, whose study appeared in the 19th century in both number theory and crystallography. Since the appearance of the celebrated Lenstra-Lenstra-Lovász lattice basis reduction... more
    • by 
    •   5  
      Number TheoryComputer ScienceCryptographyLattice