enow.com Web Search

Search results

  1. Results from the WOW.Com Content Network
  2. Self-reconfiguring modular robot - Wikipedia

    en.wikipedia.org/wiki/Self-reconfiguring_modular...

    Modular self-reconfiguring robotic systems or self-reconfigurable modular robots are autonomous kinematic machines with variable morphology. Beyond conventional actuation, sensing and control typically found in fixed-morphology robots, self-reconfiguring robots are also able to deliberately change their own shape by rearranging the connectivity of their parts, in order to adapt to new ...

  3. Lenstra–Lenstra–Lovász lattice basis reduction algorithm

    en.wikipedia.org/wiki/Lenstra–Lenstra–Lovász...

    An early successful application of the LLL algorithm was its use by Andrew Odlyzko and Herman te Riele in disproving Mertens conjecture. [5]The LLL algorithm has found numerous other applications in MIMO detection algorithms [6] and cryptanalysis of public-key encryption schemes: knapsack cryptosystems, RSA with particular settings, NTRUEncrypt, and so forth.

  4. Ammonium perchlorate composite propellant - Wikipedia

    en.wikipedia.org/wiki/Ammonium_perchlorate...

    Ammonium perchlorate composite propellant (APCP) is a solid rocket propellant.It differs from many traditional solid rocket propellants such as black powder or zinc-sulfur, not only in chemical composition and overall performance but also by being cast into shape, as opposed to powder pressing as with black powder.

  5. Vortex lattice method - Wikipedia

    en.wikipedia.org/wiki/Vortex_lattice_method

    The Vortex lattice method, (VLM), is a numerical method used in computational fluid dynamics, mainly in the early stages of aircraft design and in aerodynamic education at university level. The VLM models the lifting surfaces, such as a wing , of an aircraft as an infinitely thin sheet of discrete vortices to compute lift and induced drag .

  6. NTRU - Wikipedia

    en.wikipedia.org/wiki/NTRU

    NTRU is an open-source public-key cryptosystem that uses lattice-based cryptography to encrypt and decrypt data. It consists of two algorithms: NTRUEncrypt, which is used for encryption, and NTRUSign, which is used for digital signatures.

  7. Lattice Semiconductor - Wikipedia

    en.wikipedia.org/wiki/Lattice_Semiconductor

    Lattice's software offerings include design tools Diamond, [57] Radiant, [58] and Propel. [59] It also provides solution stacks designed to provide its customers with application-specific toolkits to help them more easily and quickly design with Lattice technology.

  8. Su–Schrieffer–Heeger model - Wikipedia

    en.wikipedia.org/wiki/Su–Schrieffer–Heeger_model

    In condensed matter physics, the Su–Schrieffer–Heeger (SSH) model or SSH chain is a one-dimensional lattice model that presents topological features. [1] It was devised by Wu-Pei Su, John Robert Schrieffer, and Alan J. Heeger in 1979, to describe the increase of electrical conductivity of polyacetylene polymer chain when doped, based on the existence of solitonic defects.

  9. Born–Landé equation - Wikipedia

    en.wikipedia.org/wiki/Born–Landé_equation

    The Born–Landé equation is a means of calculating the lattice energy of a crystalline ionic compound.In 1918 [1] Max Born and Alfred Landé proposed that the lattice energy could be derived from the electrostatic potential of the ionic lattice and a repulsive potential energy term.