منابع مشابه
Patterns in Eigenvalues: the 70th Josiah Willard Gibbs Lecture
Typical large unitary matrices show remarkable patterns in their eigenvalue distribution. These same patterns appear in telephone encryption, the zeros of Riemann’s zeta function, a variety of physics problems, and in the study of Toeplitz operators. This paper surveys these applications and what is currently known about the patterns.
متن کاملThermal soaring flight of birds and unmanned aerial vehicles.
Thermal soaring saves much energy, but flying large distances in this form represents a great challenge for birds, people and unmanned aerial vehicles (UAVs). The solution is to make use of the so-called thermals, which are localized, warmer regions in the atmosphere moving upward with a speed exceeding the descent rate of birds and planes. Saving energy by exploiting the environment more effic...
متن کاملSoaring and non-soaring bats of the family pteropodidae (flying foxes, Pteropus spp.): wing morphology and flight performance.
On oceanic islands, some large diurnal megachiropteran bat species (flying foxes; Pteropus spp.) frequently use thermal or slope soaring during foraging flights to save energy. We compared the flight morphology and gliding/soaring performance of soaring versus non-soaring Pteropus species, one pair on American Samoa and one pair on the Comoro Islands, and two other soaring/flap-gliding species ...
متن کاملJosiah Willard Gibbs and the Extension of the Principles of Thermodynamics.
THE SCIENCE PRESS New York City: Grand Central Terminal. Lancaster, Pa. Garrison, N. Y. Annual Subscription, $6.oo. Single Copies, I5 Cts. SCIENCE Is the official organ of the American Association for the Advancement of Science. Information regarding membership in the Association may be secured from the office of the permanent secretary, in the Smithsonian Institution Building, Washington, D. C...
متن کاملWillard Thompson
Complexity theory has a profound influence on the field of cryptology. The time complexity of breaking a cipher system must be significant enough to thwart any adversary from succeeding. However, with the emergence of quantum computers an adversary may have no difficulty in breaking known cipher systems. If quantum computers would exist today new mechanisms for security would need to be built. ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Proceedings of the National Academy of Sciences
سال: 1945
ISSN: 0027-8424,1091-6490
DOI: 10.1073/pnas.31.8.233