Science topics: BioengineeringScheme
Science topic
Scheme - Science topic
Explore the latest publications in Scheme, and find Scheme experts.
Publications related to Scheme (10,000)
Sorted by most recent
We consider a minimizing movement scheme of Chambolle-type for the mean curvature flow equation with prescribed contact angle condition in a smooth bounded domain in R d (d ≥ 2). We prove that an approximate solution constructed by the proposed scheme converges to the level-set mean curvature flow with prescribed contact angle provided that the dom...
Mandelbrot sets, and Julia sets are two key concepts in fractal geometry. A useful tool to generate these fractal sets is the escape time algorithm, which is an iterative scheme based on a complex function paired with some well-known fixed point iteration methods. The existing literature primarily generates Mandelbrot and Julia sets through the use...
Optical coherence is a fundamental property of light, playing a key role in understanding interference, propagation, and
light-matter interactions for both classical and quantum light. Measuring the coherence properties of an optical field is
crucial for a wide range of applications. However, despite many proposed measurement schemes, significant c...
Quality of service (QoS) of wireless cellular networks affect due to more
power consumption, maximum bit error rate (BER), minimum throughput
and improper resource allocation. Improvement in QoS can be done by
reducing power consumption, BER and enhancing throughput. Hence there
is a need to address the approaches for reduction in power consump...
We develop a virtual element method to solve a convective Brinkman-Forchheimer problem coupled with a heat equation. This coupled model may allow for thermal diffusion and viscosity as a function of temperature. Under standard discretization assumptions, we prove the well posedness of the proposed numerical scheme. We also derive optimal error esti...
This paper describes a numerical scheme for solving a reaction-diffusion system, specifically the Gray-Scott model. The scheme is a two-step process, combining the Crank-Nicolson method in the first step with the second-order backward differentiation formula in the second step. This combination ensures unconditional stability in both $L^2$ and $H^1...
QKD has been extensively studied as a means to establish secure communication channels resistant to eavesdropping attacks, offering a promising solution to safeguarding shared keys. For instance, the BB84 protocol, a well-known QKD scheme, was specifically designed to counteract both noise and eavesdropping attacks through polarization states. Howe...
The performance of sequential Monte Carlo (SMC) samplers heavily depends on the tuning of the Markov kernels used in the path proposal. For SMC samplers with unadjusted Markov kernels, standard tuning objectives, such as the Metropolis-Hastings acceptance rate or the expected-squared jump distance, are no longer applicable. While stochastic gradien...
This paper proposes a new approach for convergence analysis of continuous action iterative dilemma (CAID) to reach a stable consensus outcome within the prescribed time. Unlike usual game theory, where players can only choose between two options, i.e., cooperation or defection, the CAID model lets players pick from varying options and make more nua...
In this work, we have presented the concept of "neutrosophic fuzzy bitopological ideal" (NFBI), which is a generalization of neutrosophic fuzzy ideal (NFI) that can deal with two topologies on a set. NFBI can capture the uncertainty, indeterminacy, and inconsistency of the security requirements and preferences of the entities in these applications....
In this paper we consider the numerical approximation of a semilinear reaction-diffusion model problem (PDEs) by means of reduced order methods (ROMs) based on proper orthogonal decomposition (POD). We focus on the time integration of the fully discrete reduced order model. Most of the analysis in the literature has been carried out for the implici...
In this paper, we propose first- and second-order low-regularity exponential-type integrators (LREIs) for the “good” Boussinesq equation. Compared to existing exponential-type integrators, our proposed LREIs achieve the desired convergence rates under lower regularity conditions. These new integrators are developed using a second-order approximatio...
It is proposed a few-atom Doppler-sensitive absorption spectroscopy scheme resolving the long-standing dilemma regarding the nature of an atomic quantum translational motion (superpositional or non-superpositional) and its measurement (collapsing or non-collapsing).
Blockchain faces problems such as network congestion, high data propagation latency, and low throughput. These problems seriously affect the large‐scale application of blockchain, so the performance optimization of blockchain networks is imminent. To reduce the propagation delay of transactions and blocks in the blockchain network and create condit...
In many high-dimensional problems, like sparse-PCA, planted clique, or clustering, the best known algorithms with polynomial time complexity fail to reach the statistical performance provably achievable by algorithms free of computational constraints. This observation has given rise to the conjecture of the existence, for some problems, of gaps --...
Nonlinear reaction-diffusion problems, such as the nonlinear generalized two-dimensional Burgers’ equation, play a crucial role in various fields, including developmental biology, population dynamics, engineering, and physics. This study focuses on the numerical solution of the two-dimensional Burgers’ equation using a collocation method based on b...
Gapless topological phases have attracted significant interest across both quantum and classical systems owing to their novel physics and promising applications. However, the search for ideal gapless topological nodes inside a clear bandgap is still lacking in elastic systems. The degenerate points are always hidden in the trivial bulk bands due to...
Continuous-variable (CV) systems have shown remarkable potential for quantum computation, particularly excelling in scalability and error correction through bosonic encoding. Within this framework, the foundational notion of computational universality was introduced in [Phys. Rev. Lett. 82, 1784 (1999)], and has proven especially successful since i...
Following D. Mbouna [Lett. Math. Phys. 114:54, 2024], a new method is provided to recognize and characterize a classical orthogonal polynomial sequence defined on a quadratic lattice only by the three-term recurrence relation. This characterization includes all orthogonal polynomials in the Askey scheme (including the para-Krawtchouk polynomials),...
We prove several results on reductive group schemes over LG-rings, e.g., existence of maximal tori and conjugacy of parabolic subgroups. These were proven in Demazure and Grothendieck (Séminaire de Géométrie Algébrique du Bois Marie:151-153, 1970) for the special case of semilocal rings. We apply these results to establish cancellation theorems for...
Aiming at the problem that the mechanism of how the amplitude parameter of the wavy leading edge profile affects the performance of transonic compressors remains unclear, this paper takes a single-stage transonic axial flow compressor as the research object and designs four schemes of different amplitudes of the wavy leading edge of the stator blad...
This work presents a novel interpolation scheme for sensitivity control in density-based multiphysics topology optimization, with a focus on acoustic structure interaction problems. We first demonstrate the necessity of the new interpolation in response to challenges identified from prior research, particularly the critical, yet largely unexplored,...
We present a numerical scheme that solves for the self-similar viscous fingers that emerge from the Saffman–Taylor instability in a divergent wedge. This is based on the formulation by Ben Amar (1991, Phys. Rev. A , vol. 44, pp. 3673–3685). It is demonstrated that there exists a countably infinite set of selected solutions, each with an associated...
In the paper we consider finitely repeated Prisoner’s Dilemma and propose the method of sustaining cooperation based on the \documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{documen...
Solving the Fermi–Hubbard model is a central task in the study of strongly correlated materials. Digital quantum computers can, in principle, be suitable for this purpose, but have so far been limited to quasi-one-dimensional models. This is because of exponential overheads caused by the interplay of noise and the non-locality of the mapping betwee...
This paper studies the linear-quadratic stochastic Stackelberg differential game for jump-diffusion systems under partial information. In our problem setup, given the complete information \documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usep...
Let L/\mathbb{Q}_{p} be a finite extension. We introduce L -typical prisms , a mild generalization of prisms. Following ideas of Bhatt, Scholze, and Wu, we show that certain vector bundles, called Laurent F -crystals, on the L -typical prismatic site of a formal scheme X over \operatorname{Spf}\mathcal{O}_{L} are equivalent to \mathcal{O}_{L} -line...
Development can always be visualized in terms of contributions from all sections of the society. Marginalization deprives a large section of people across the globe from participating in the development. It is a serious issue, and there are many factors that cause marginalization. This serious issue needs to be addressed at the policy level everywh...
Generating high-fidelity and biologically plausible synthetic single-cell RNA sequencing (scRNA-seq) data, especially with conditional control, is challenging due to its high dimensionality, sparsity, and complex biological variations. Existing generative models often struggle to capture these unique characteristics and ensure robustness to structu...
Transmitting quantum information between different nodes in quantum network is one of the central tasks in long-distance quantum communication. We present a protocol for four directional probabilistic controlled teleportation of arbitrary single-qudit states simultaneously from four senders to the four receivers under the controller’s control by us...
Conceptual frameworks (CFs) are essential to communicate about research. They enable the target audience to focus on something (inside the frame) and ignore other things (outside the frame). Prior studies have discussed how to build CFs, yet these are mainly focused on their specific research domain and conflate the construction of a CF with resear...
User authentication is a basic security mechanism under Internet-of-Things (IoT) environments, which means to verify whether the logging user is legitimate or not. Due to known limitations of existing password-based authentication, graphical password is one promising solution to enhance the current user authentication process in IoT. However, it is...
In this work, a physics-informed neural networks (PINNs) based algorithm is used for simulation of nonlinear 1D and 2D Burgers' type models. This scheme relies on a neural network built to approximate the problem solution and use a trial function that meets the initial data and boundary criteria. First of all, a brief mathematical formulation of th...
We construct positional numeral systems that work natively over nonderived polyadic $\left( m,n\right) $-rings whose addition takes $m$ arguments and multiplication takes $n$. In such rings, the length of an admissible additive word and a multiplicative tower are not arbitrary (as in the binary case), but \textquotedblleft quantized\textquotedblrig...
Accelerated optimization methods are typically parametrized by the Lipschitz smoothness and strong convexity parameters of a given problem, which are rarely known in practice. While the Lipschitz smoothness parameter L can be easily estimated by backtracking, directly estimating (i.e., without restarts) the strong convexity parameter m remains an o...
Fully Homomorphic Encryption (FHE) is a promising privacy-preserving technology enabling secure computation over encrypted data. A major limitation of current FHE schemes is their high runtime overhead. As a result, automatic optimization of circuits describing FHE computation has garnered significant attention in the logic synthesis community. Exi...
In MIN networks, the in-network caching plays a pivotal role in mitigating overall network traffic. This chapter introduces the cache management and access control schemes deployed on MIRs. The caching scheme includes a cache placement algorithm, a dual-layer caching model, and a cache space reallocation algorithm. Furthermore, the access control p...
While certified robustness is widely promoted as a solution to adversarial examples in Artificial Intelligence systems, significant challenges remain before these techniques can be meaningfully deployed in real-world applications. We identify critical gaps in current research, including the paradox of detection without distinction, the lack of clea...
As the core component of modern information technology, computer network technology is closely related to social production and daily life. This chapter analyzes the key challenges in network evolution and introduces the identifier extension mechanism based on identifier fallback. Furthermore, it discusses the theoretical foundation of complex netw...
This paper introduces a generalized continuous Bernoulli distribution based on the Marshall–Olkin technique for generating new distributions. We refer to the proposed distribution as the Marshall–Olkin continuous Bernoulli (MOCB) distribution. Useful statistical properties and mathematical expressions of the seven methods of parameter estimation fo...
The Burgers-Huxley equation arises in several problems in science. The compact finite difference scheme (CFDS) has been developed for the Burgers-Huxley equation. This scheme has been compared different methods for the Burgers-Huxley equation. Dispersive properties are investigated for the linearized equations to examine the nonlinear dynamics afte...
The advent of quantum computing poses significant threats to classical cryptographic systems, notably RSA encryption [1]. This paper explores the simulation of quantum attacks on RSA using Qiskit, focusing on the implementation of Shor's algorithm [1], [2]. Through detailed case studies, circuit analyses, and performance evaluations, the feasibilit...
Multiphoton blockade provides an efficient way to achieve entangled photon sources and leads to wide applications in modern quantum technologies. Here, we propose a scheme to realize multiphoton blockade by a multi-tone drive. Specifically, we demonstrate two-photon and three-photon blockades in a single-mode optical Kerr resonator using a two-tone...
Inspired by the recent works of M. Kontsevich--Y. Tschinkel and J. Nicaise--J. C. Ottem on specialization of birational types for smooth families (in the scheme category) and J. Koll{\'a}r's work on fiberwise bimeromorphism, we focus on characterizing the fiberwise bimeromorphism and utilizing the characterization to investigate the specialization...
The upcoming sixth-generation (6G) mobile is designed with several purposes, such as incredible improvements, ultra-fast speed, ultra-low latency, and massive connections within a small area. Bandwidth Efficiency and extensive coverage, besides sub-millisecond synchronization using a new sub-terahertz spectrum, are also considered. In order to main...
This study investigates the impact of measurement error on variable sampling schemes indexed by Acceptance Quality Limit (AQL) and Average Outgoing Quality Level (AOQL) while considering a known Coefficient of Variation (CV). We present procedures and tables for selecting appropriate variable sampling plans based on specified AQL and AOQL values. I...
Micro, Small, and Medium-Sized Enterprises is what MSME stands for. They include start-ups and other company endeavors with limited operations and relatively modest budgets. MSMEs not only contribute significantly to the creation of jobs at significantly lower capital costs than large industries, but they also aid in the industrialization of underd...
A partir d’exemples choisis dans des corpus français et israéliens, cet article analyse la façon dont l’émotion et le raisonnement s’inscrivent en discours dans le slogan de manifestation. Les replaçant dans le cadre des discours de l’action collective, il part des trois catégories de Micheli de l’émotion dite, montrée et étayée pour dévoiler la fa...
police benevolence, charity, urban poverty
A \(t{\text {-}\textsf{out}\text {-}\textsf{of}\text {-}}n\) threshold ring signature allows t parties to jointly sign a message on behalf of n parties without revealing the identities of the signers. In this paper, we introduce a new generic construction for threshold ring signature, called \(\mathsf {GC\text {-}TRS}\), which can be built on top o...
Although restorative justice organizations in Northern Ireland are now integral parts of the post-conflict landscape and are widely viewed as ‘respectable’, they faced significant initial challenges in gaining local legitimacy. Using a case study approach, this article explores the three primary critiques faced by a local restorative justice organi...
We show that given a simple abelian variety A$A$ and a normal variety V$V$ defined over a finitely generated field K$K$ of characteristic zero, the set of non‐constant morphisms V→A$V \rightarrow A$ satisfying certain tangency conditions imposed by a Campana orbifold divisor Δ$\Delta$ on A$A$ is finite. To do so, we study the geometry of the scheme...
Einstein–Podolsky–Rosen (EPR) steering is a key resource in the field of quantum information. It characterizes the ability of one party to exert remote influence on the state of another party through local operations. In this paper, we propose all-optical multipartite EPR steering swapping schemes with symmetric and asymmetric structures based on f...
Deep transformer-based neural networks have provided state-of-the-art performances in many computer vision applications, including the task of image super resolution. Specifically, transformer operations efficiently exploit the interactions between various features located at different spatial coordinates and contribute to improving the network per...
We present the complete 4-loop renormalisation of an Abelian chiral gauge theory in the Breitenlohner-Maison / `t Hooft-Veltman (BMHV) scheme. Employing a non-anticommuting $\gamma_5$ in dimensional regularisation, we determine the full set of symmetry restoring counterterms from the quantum action principle. Our calculation represents the highest-...
Recent advances in stochastic optimization have yielded the interacting particle Langevin algorithm (IPLA), which leverages the notion of interacting particle systems (IPS) to efficiently sample from approximate posterior densities. This becomes particularly crucial in relation to the framework of Expectation-Maximization (EM), where the E-step is...
The periodic system of chemical elements is represented within the framework
of the weight diagram of the Lie algebra of the fourth rank of the rotation group of an eight-dimensional pseudo-Euclidean space. Spin is interpreted as the fourth generator of the Cartan subalgebra, whose two eigenvalues correspond to two three-dimensional projections of...
In this paper, higher-order perturbation theory is applied and tailored to one-dimensional ring-shaped Bose–Hubbard systems. Spectral and geometrical properties are used to structurally simplify the contributions and reduce computational effort without sacrificing accuracy. For this, a guide for the computation of the individual perturbational orde...
This paper investigates a symmetric dual-wind discontinuous Galerkin (DWDG) method for solving an elliptic optimal control problem with control constraints. The governing constraint is an elliptic partial differential equation (PDE), which is discretized using the symmetric DWDG approach. We derive error estimates in the energy norm for both the st...
In this paper, we consider the bin covering problem with strong divisibility and rejection profit (the BC-SDRP problem, for short). Specifically, given a lot of identical bins with integer capacity L and a set \(A=\{a_{1},a_{2},\ldots ,a_{n}\}\) of n items with strongly divisible sizes, i.e., either \(s_{i}~|~s_{j}\) or \(s_{j}~|~s_{i}\) for each p...
External Quality Assessment (EQA) schemes are an important quality assurance tool and aim to ensure consistency among histopathologists. In this study, we use Shannon entropy as a novel metric to evaluate linguistic variability in the UK Liver Pathology EQA scheme. Analysing free‐text responses by participants over a decade, we aimed to quantify la...
The illusionist theory of consciousness denies the existence of the ‘phenomenal’ properties widely thought to render experience conscious. Central to the illusionist approach is what we call the distortion thesis — the claim that introspective mechanisms systematically misrepresent neural processes in a way that strongly inclines us to judge that t...
Distributed broadcast encryption (DBE) is a specific kind of broadcast encryption (BE) where users independently generate their own public and private keys, and a sender can efficiently create a ciphertext for a subset of users by using the public keys of the subset users. Previously proposed DBE schemes have been proven in the adaptive chosen-plai...
We construct a semi-Lagrangian scheme for first-order, time-dependent, and non-local Mean Field Games. The convergence of the scheme to a weak solution of the system is analyzed by exploiting a key monotonicity property. To solve the resulting discrete problem, we implement a Learning Value Algorithm, prove its convergence, and propose an accelerat...
Optical injection locking of the repetition frequency of a quantum cascade laser frequency comb is demonstrated using intensity modulated near-infrared light at 1.55 µm, illuminating the front facet of the laser. Compared to the traditional electrical modulation approach, the introduced technique presents benefits from several perspectives, such as...
Ultra-reliable low-latency communications (URLLC) demand decoding algorithms that simultaneously offer high reliability and low complexity under stringent latency constraints. While iterative decoding schemes for LDPC and Polar codes offer a good compromise between performance and complexity, they fall short in approaching the theoretical performan...
This study investigates the reinforcement mechanism of double-layer geogrid-reinforced ballast through a series of single-layer and double-layer pullout tests. The effects of geogrid layers, aperture size, and reinforcement depth were analyzed in detail. A coefficient of double-layer reinforcement effect (η) was introduced to evaluate the capacity...
We construct the motivic t-structure on 1-motives with integral coefficients over a scheme of characteristic zero or a Dedekind scheme. When we invert the residue characteristic exponents of the base, this t-structure induces a t-structure on the category of smooth 1-motives whose heart is the category of Deligne 1-motives with torsion which we pro...
Motivated by recent experimental advancements in the study of radiative decays of charmed mesons, we investigate the magnetic (transition) moments of vector mesons by applying the effective mass scheme, obtained from the one-gluon exchange interaction between quark-antiquark pairs. By incorporating high-precision experimental data from both heavy a...
In this paper, we study the stability of the fractional Sobolev trace inequality within both the functional and critical point settings. In the functional setting, we establish the following sharp estimate: \documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepack...
The fractional of Cauchy-type problem (FCT) is solved precisely in the current study utilizing the Laplace residual power series approach (LRPS). The Caputo operator is used to determine the fractional derivative. Firstly, we present a brand-new technique that combines the residual power series strategy with the Laplace transform technique. We prov...
Efficiently learning expectation values of a quantum state using classical shadow tomography has become a fundamental task in quantum information theory. In a classical shadows protocol, one measures a state in a chosen basis W after it has evolved under a unitary transformation randomly sampled from a chosen distribution U. In this work we study t...
The paper presents an analysis of Commitment Schemes (CSs) used in Multi-Party Computation (MPC) protocols. While the individual properties of CSs and the guarantees offered by MPC have been widely studied in isolation, their interrelation in concrete protocols and applications remains mostly underexplored. This paper presents the relation between...
We propose a quantum designated verifier multi- signature (QDVMS) scheme. In this scheme, multiple users can generate a valid signature by simultaneously signing the original message, and the designated verifier holds the exclusive capability to verify the signature’s validity. This scheme applies locally indistinguishable orthogonal product states...
Model predictive control (MPC) for tracking is a recently introduced approach, which extends standard MPC formulations by incorporating an artificial reference as an additional optimization variable, in order to track external and potentially time-varying references. In this work, we analyze the performance of such an MPC for tracking scheme withou...
We introduce a new restarting scheme for a continuous inertial dynamics with Hessian driven-damping, and establish a linear convergence rate for the function values along the restarted trajectories. The proposed routine is a generalization of existing speed restart schemes, and interpolates between speed and function value restarts, considerably de...
To meet the urgent market need for implementation of various heavy-load operations within complex and restricted underground environments, this paper proposes a new scientific structural development scheme for underground heavy-load robot. The scheme combines topology optimization and modular scale synthesis to achieve the optimal configuration for...
We simulate the Lipkin-Meshkov-Glick model using the variational-quantum-eigensolver algorithm on a neutral atom quantum computer. We test the ground-state energy of spin systems with up to 15 spins. Two different encoding schemes are used: an individual spin encoding where each spin is represented by one qubit, and an efficient Gray code encoding...
Keynes basically used chapter XI of the A Treatise on Probability to reiterate and reemphasize what he had originally covered in chapter X, which was his theory of groups.
Keynes starts out by repeating materials originally presented in earlier chapters that dealt with his argument form, where the argument form is Keynes’s Boolean, relational, prop...
The vortex beam interferometer has attracted great attention in optical metrology. Specifically, the common-path Fizeau vortex interferometer exhibits obvious advantages in high-precision optical surface profile measurement, but it has never been fully reported on. In this study, we propose a vortex beam–Fizeau interferometer and achieve high-preci...
Ground-state auxiliary-field quantum Monte Carlo (AFQMC) methods have become key numerical tools for studying quantum phases and phase transitions in interacting many-fermion systems. Despite the broad applicability, the efficiency of these algorithms is often limited by the bottleneck associated with the {\it local update} of the field configurati...
Double-error-correction (DEC) BCH codes, a class of binary cyclic codes, have been widely used for error correction in NOR flash memories. However, the decoding process of these codes involves the complicated cubic operations in binary extension fields. In order to address the problem, this paper proposes a DEC coding scheme for NOR flash memories...
The scarcity of annotated datasets remains a significant impediment to Natural Language Processing (NLP) advancement in low-resourced languages. In this work, we introduce a large-scale annotated Tigrinya Named Entity Recognition (NER) Corpus along with state-of-the-art models for Tigrinya NER. Our human-labeled Tigrinya NER Corpus (TiNC24) compris...
Reviews are valuable resources for customers making purchase decisions in online shopping. However, it is impractical for customers to go over the vast number of reviews and manually conclude the prominent opinions, which prompts the need for automated opinion summarization systems. Previous approaches, either extractive or abstractive, face challe...
This article presents an investigation into the exact solution of the damped forced Burger equation with constant coefficients, utilizing a homogenization technique. By introducing a suitable change of dependent variable, the partial differential equation is transformed into a homogeneous equation of a specific degree. Subsequently, shock waves are...
Key refreshing is a pragmatic countermeasure to side-channel attacks, designed to revoke and replace the key promptly when an attack is either anticipated or suspected. This system-level approach rekeys the device under attack and keeps paired devices protected if cryptography secures data in transit. The frequency of key refreshing is critical: to...
As an unsupervised feature representation paradigm, Self-Supervised Learning (SSL) uses the intrinsic structure of data to extract meaningful features without relying on manual annotation. Despite the success of SSL, there are still problems, such as limited model capacity or insufficient representation ability. Quantum SSL has become a promising a...
Though investigated extensively in the past, we take a detailed relook at the study of quasinormal modes (QNM) in a known family of wormholes (ultrastatic ($g_{00}=-1$), as well as spacetimes with different, non-constant $g_{00}$), which includes the familiar Bronnikov-Ellis spacetime as a special case. Our focus here is to go beyond the fundamenta...
Accurate determination of light power and wavelength is fundamental to nearly all optical and laser applications. However, simultaneous and precise measurements of these two parameters remain a critical challenge due to intrinsic cross-sensitivity in conventional devices. Here, we propose and demonstrate a dual-parameter decoupling strategy based o...
This paper argues that the concept of 'joint' management of forests needs to be looked at historically in order to uncover the degree of state intervention in what are generally known as community forest protection schemes. It looks at various threats to sustainability of JFM in one village in Sambalpur district of Orissa, highlighting the fact tha...
In the present article, two conclusive multiparty quantum state preparation (JRSP) schemes in the amplitude damping channel are proposed, which respectively prepare an arbitrary single-qubit state and single-qutrit state. To achieve this, the detailed procedures of using entanglement compensation in an amplitude-damped channel to share pure entangl...
To address the challenges of measuring the centre of mass of small drones and irregular devices—including measurement complexity, insufficient accuracy, and cumbersome procedures—this study presents a simple yet highly precise centre of mass measurement device. The device relies on a parallel mechanism and uses a three-point measurement principle t...
In this article, we introduce an efficient numerical method designed for solving the partial differential equation associated with pricing two-dimensional Asian options. Our approach begins with applying the Crank-Nicolson scheme, which effectively discretizes the time derivative, while the central difference scheme is employed for discretizing the...
The recent identification of possible 11 neutron-antineutron ($n$-$\bar{n}$) oscillation candidate events at Super-Kamiokande has renewed the interest in $\Delta B = 2$ transitions. In this work, we analyze the Renormalization Group (RG) running of mass dimension-9 six-quark operators, in $\bar{MS}$ scheme, that generate processes like $nn\to \pi^0...
Dimuon production in deeply inelastic scattering between neutrinos and nuclei plays an important role in constraining the strange-quark parton distribution functions (PDFs). Here, we present a self-contained calculation of this process consisting of a next-to-leading order semi-inclusive charmed-hadron production in the SACOT-$\chi$ general-mass va...
Segregated Runge-Kutta (SRK) schemes are time integration methods for the incompressible Navier-Stokes equations. In this approach, convection and diffusion can be independently treated either explicitly or implicitly, which in particular allows to construct implicit-explicit (IMEX) methods. Original SRK schemes (Colomes, Badia, IJNME, 2015) are de...
We investigate the current-voltage characteristics of an extended Su-Schrieffer-Heeger (SSH) chain under irradiation by arbitrarily polarized light, demonstrating its potential as a light-controlled rectifier. Irradiation of light induces anisotropy in the system, enabling directional current flow and active control of rectification behavior. Our a...