نتایج جستجو برای: lattice parameters

تعداد نتایج: 665019  

1999
J. A. Kittl W. L. Johnson W. M. Keck

We have analyzed epitaxial, c-axis oriented YBa,CujO, _ 6 thin films grown in situ by sequential ion-beam sputtering on (100) SiTiOs and (100) MgO substrates. X-ray diffraction studies showed the presence of both homogeneous and inhomogeneous lattice distortions along the c-direction. The c-axis lattice parameters ranged from 11.72 to 12.00 A. The broadening of the (001) Bragg peaks in excess o...

1998
Pavlos M. Vranas

Domain Wall Fermions utilize an extra space time dimension to provide a method for restoring the regularization induced chiral symmetry breaking in lattice vector gauge theories even at finite lattice spacing. The breaking is restored at an exponential rate as the size of the extra dimension increases. Before this method can be used in dynamical simulations of lattice QCD, the dependence of the...

Journal: :IACR Cryptology ePrint Archive 2014
Jeffrey Hoffstein Jill Pipher John M. Schanck Joseph H. Silverman William Whyte

We introduce a class of lattice-based digital signature schemes based on modular properties of the coordinates of lattice vectors. We also suggest a method of making such schemes transcript secure via a rejection sampling technique of Lyubashevsky (2009). A particular instantiation of this approach is given, using NTRU lattices. Although the scheme is not supported by a formal security reductio...

1999
J. Corbett

The SPEAR 3 upgrade lattice will provide much reduced beam emittance to increase the brightness of synchrotron radiation beams from wigglers and undulators. Seven existing insertion devices will be used in the lattice. In this paper we review the wiggler parameters, outline the wiggler compensation scheme, and evaluate wiggler effect on the optics and dynamic aperture. Presented at the 1999 IEE...

2017
Mohamed Mahdi Tekitek M’Hamed Bouzidi François Dubois Pierre Lallemand M. M. Tekitek M. Bouzidi Mahdi Tekitek M’hamed Bouzidi

The Lattice Boltzmann Equation is briefly introduced using moments to clearly separate the propagation and collision steps in the dynamics. In order to identify unknown parameters we introduce a cost function and adapt control theory to the Lattice Boltzmann Equation to get expressions for the derivatives of the cost function vs. parameters. This leads to an equivalent of the adjoint method wit...

Journal: :IEEE Trans. Information Theory 1988
G. David Forney

Practically all known good constructive coding techniques for band-limited channels, including lattice codes and various recently proposed trellis-coded modulation schemes, can be characterized as coset codes. A coset code is defined by a lattice partition A / A and by a binary encoder C that selects a sequence of cosets of the lattice A'. The fundamental coding gain of a coset code, as well as...

Journal: :Computers & Mathematics with Applications 2011
François Dubois Pierre Lallemand

Using the Taylor expansion method, we show that it is possible to improve the lattice Boltzmann method for acoustic applications. We derive a formal expansion of the eigenvalues of the discrete approximation and fit the parameters of the scheme to enforce fourth order accuracy. The corresponding discrete equations are solved with the help of symbolic manipulation. The solutions are obtained in ...

2005
C. Tarantino

Bd and Bs meson systems play a fundamental role to test and improve our understanding of Standard Model flavor dynamics. The mixing parameters ∆md,s represent important constraints in the unitarity triangle analysis. Their theoretical estimates require non-perturbative calculations of B-meson decay constants and B-parameters; accurate results, recently obtained from the lattice, are reviewed. O...

1997
Rajan Gupta

Reliable estimates of the matrix elements of 4-fermion operators between hadronic states are essential in order to quantify strong interaction corrections to weak processes. Here we report on calculations of mixing elements of (i) ∆s = 2 operators between K and K̄0 states (BK) that arise in the calculation of the CP violation parameter ǫ. The value of BK is an essential input in pinning down the...

Journal: :IACR Cryptology ePrint Archive 2017
Dung Hoang Duong Masaya Yasuda Tsuyoshi Takagi

Albrecht et al. [1] at Crypto 2016 and Cheon et al. [4] at ANTS 2016 independently presented a subfield attack on overstretched NTRU problem. Their idea is to map the public key down to the subfield (by norm and trace map respectively) and hence obtain a lattice of smaller dimension for which a lattice reduction algorithm is efficiently applicable. At Eurocrypt 2017, Kirchner and Fouque propose...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید