-
161
Possibilities of using immersive learning based on abstract highly formalized mathematical models for training future mathematics teachers
Published 2024-12-01“…The study of the problem is considered using the example of the mathematics section “Number Theory”. The asymmetric RSA encryption system is chosen as the observed model. …”
Get full text
Article -
162
Survivability evaluation of network information system based on the cloud model and analytic hierarchy process
Published 2014-08-01“…Finally, the experimental results show that the proposed method achieves a satisfactory result in quantitative evaluation of complex qualitative indexes, and has certain advantages in terms of accu-racy and fuzzy computing.…”
Get full text
Article -
163
Canonical correlation analysis of big data based on cloud model
Published 2013-10-01“…The complexity of traditional CCA methods is too high meet the requirements to analyze big data due to their huge scale which is reaching the level of peta-byte.A novel approach to CCA was proposed to mine the big data by introducing the cloud model which is a brand-nowel theory about the uncertainty artificial intelligence.A distributed ar-chitecture based on cloud computing was established.All of the clouds distributing on the nodes of the distributed archi-tecture were combined to a center cloud via cloud operation (whe cloud is a synopsis of data and which is a concept coming from the cloud theory).A type of virtual sample of data called cloud drops created based on the center cloud.Fi-nally the computing of CCA was imposed on the cloud drops.The CCA was impose on the cloud drops with less volume,which improves the efficiency.Experimental results on real data sets indicate the effectiveness of this method.…”
Get full text
Article -
164
Free vibration analysis of aluminum foam metal sandwich panels: a comparative study between numerical and analytical modelling
Published 2025-01-01“…A mathematical model based on classical plate theory (CPT) was developed to compute the natural frequencies of supported rectangular sandwich plates. …”
Get full text
Article -
165
Multi-key fully homomorphic encryption scheme based on NTRU bootstrapping
Published 2024-12-01“…The proposed scheme was compared with the existing mainstream multi-key fully homomorphic encryption scheme in theory. The results show that the proposed scheme has better computational efficiency. …”
Get full text
Article -
166
-
167
Driving brain state transitions via Adaptive Local Energy Control Model
Published 2025-02-01Get full text
Article -
168
On Modeling Agent Behavior Change Through Multi-Typed Information Diffusion in Online Social Networks
Published 2025-01-01“…Therefore, this study introduces a computational model that combines subjective logic to represent opinion changes of individuals using multi-typed information and cumulative prospect theory to simulate individuals’ decision-making. …”
Get full text
Article -
169
Physical-layer security transmission method based on spatial modulation with finite alphabet inputs
Published 2015-02-01“…Addressing the problem of wireless physical layer security transmission for finite alphabet input systems,a spatial modulation secure transmission method is proposed.On the basis of information theory,the method utilizes the receive antenna indices of multiple-input multiple-output (MIMO) system to bear information,and randomizes the eavesdropper’s equivalent channel by switching the receive antennas,which can guarantee physical layer security transmission.First,the different receiving performances of the legitimate user and eavesdropper are analyzed in the spatial modulation secure transmission system.Second,the mutual information and secrecy mutual information of the transmission system are calculated,and two sufficient conditions that ensure positive secrecy mutual information are pointed out.Finally,an estimation algorithm of mutual information is provided.Moreover,the symmetry of finite alphabet set is exploited to decrease the computational complexity.Theoretical analysis and numerical simulation results verify the availability of the security transmission method.…”
Get full text
Article -
170
The algebraic extended atom-type graph-based model for precise ligand–receptor binding affinity prediction
Published 2025-01-01Get full text
Article -
171
CFD for turbulence: from fundamentals to geophysics and astrophysics
Published 2022-12-01“…In this paper, we review the role of CFD in the study of turbulence through both direct numerical simulations and the resolution of statistical multi-scale theories. With a historical perspective, we will discuss the evolution of the numerical modeling of turbulence from the first numerical experiments as proposed by Orszag and Patterson [1] to complex geophysical and plasma simulations where body forces such as Coriolis, the buoyancy force, or the Lorentz force can introduce strong anisotropies. …”
Get full text
Article -
172
Minor Prime Factorization for n-D Polynomial Matrices over Arbitrary Coefficient Field
Published 2018-01-01“…Two tractable criterions are presented for the existence of minor prime factorization, which can be realized by programming and complexity computations. On the theory and application, we shall obtain some new and interesting results, giving some constructive computational methods for carrying out the minor prime factorization.…”
Get full text
Article -
173
Adaptive Differentiator-Based Predefined-Time Control for Nonlinear Systems Subject to Pure-Feedback Form and Unknown Disturbance
Published 2021-01-01“…An adaptive predefined-time controller is designed by introducing the finite-time differentiator which is used to decrease the computational complexity problem appeared in the traditional backstepping control. …”
Get full text
Article -
174
On Topological Analysis of Niobium (II) Oxide Network via Curve Fitting and Entropy Measures
Published 2022-01-01Get full text
Article -
175
The Effect of Platform Data Quality on Tax Compliance in Digital Economy: A Multiagent Based Simulation
Published 2023-01-01Get full text
Article -
176
A Flexible Polynomial Expansion Method for Response Analysis with Random Parameters
Published 2018-01-01“…The generalized Polynomial Chaos Expansion Method (gPCEM), which is a random uncertainty analysis method by employing the orthogonal polynomial bases from the Askey scheme to represent the random space, has been widely used in engineering applications due to its good performance in both computational efficiency and accuracy. But in gPCEM, a nonlinear transformation of random variables should always be used to adapt the generalized Polynomial Chaos theory for the analysis of random problems with complicated probability distributions, which may introduce nonlinearity in the procedure of random uncertainty propagation as well as leading to approximation errors on the probability distribution function (PDF) of random variables. …”
Get full text
Article -
177
Solutions to All-Colors Problem on Graph Cellular Automata
Published 2019-01-01Get full text
Article -
178
-
179
Stability Analysis of the Bat Algorithm Described as a Stochastic Discrete-Time State-Space System
Published 2018-01-01Get full text
Article -
180
Bifurcation Analysis of a Discrete Basener–Ross Population Model: Exploring Multiple Scenarios
Published 2025-01-01Get full text
Article