Showing 161 - 180 results of 378 for search '"Computational complexity theory', query time: 0.06s Refine Results
  1. 161

    Possibilities of using immersive learning based on abstract highly formalized mathematical models for training future mathematics teachers by Valentina A. Matveeva, Olga Yu. Zaslavskaya

    Published 2024-12-01
    “…The study of the problem is considered using the example of the mathematics section “Number Theory”. The asymmetric RSA encryption system is chosen as the observed model. …”
    Get full text
    Article
  2. 162

    Survivability evaluation of network information system based on the cloud model and analytic hierarchy process by Yan-hua LIU, Guo-long CHEN, Rui-fen WU

    Published 2014-08-01
    “…Finally, the experimental results show that the proposed method achieves a satisfactory result in quantitative evaluation of complex qualitative indexes, and has certain advantages in terms of accu-racy and fuzzy computing.…”
    Get full text
    Article
  3. 163

    Canonical correlation analysis of big data based on cloud model by Jing YANG, Wen-ping LI, Jian-pei ZHANG

    Published 2013-10-01
    “…The complexity of traditional CCA methods is too high meet the requirements to analyze big data due to their huge scale which is reaching the level of peta-byte.A novel approach to CCA was proposed to mine the big data by introducing the cloud model which is a brand-nowel theory about the uncertainty artificial intelligence.A distributed ar-chitecture based on cloud computing was established.All of the clouds distributing on the nodes of the distributed archi-tecture were combined to a center cloud via cloud operation (whe cloud is a synopsis of data and which is a concept coming from the cloud theory).A type of virtual sample of data called cloud drops created based on the center cloud.Fi-nally the computing of CCA was imposed on the cloud drops.The CCA was impose on the cloud drops with less volume,which improves the efficiency.Experimental results on real data sets indicate the effectiveness of this method.…”
    Get full text
    Article
  4. 164

    Free vibration analysis of aluminum foam metal sandwich panels: a comparative study between numerical and analytical modelling by Zahra Hamdan, Sadeq Bakhy, Muhsin Jweeg

    Published 2025-01-01
    “…A mathematical model based on classical plate theory (CPT) was developed to compute the natural frequencies of supported rectangular sandwich plates. …”
    Get full text
    Article
  5. 165

    Multi-key fully homomorphic encryption scheme based on NTRU bootstrapping by ZHENG Junhua, JIANG Hongwei, LIU Rong, LI Yixiu, LI Wen, WENG Jian

    Published 2024-12-01
    “…The proposed scheme was compared with the existing mainstream multi-key fully homomorphic encryption scheme in theory. The results show that the proposed scheme has better computational efficiency. …”
    Get full text
    Article
  6. 166
  7. 167
  8. 168

    On Modeling Agent Behavior Change Through Multi-Typed Information Diffusion in Online Social Networks by Masaaki Miyashita, Norihiko Shinomiya, Daisuke Kasamatsu, Genya Ishigaki

    Published 2025-01-01
    “…Therefore, this study introduces a computational model that combines subjective logic to represent opinion changes of individuals using multi-typed information and cumulative prospect theory to simulate individuals’ decision-making. …”
    Get full text
    Article
  9. 169

    Physical-layer security transmission method based on spatial modulation with finite alphabet inputs by Bo CUI, Lu LIU, Xiang-yu LI, Liang JIN

    Published 2015-02-01
    “…Addressing the problem of wireless physical layer security transmission for finite alphabet input systems,a spatial modulation secure transmission method is proposed.On the basis of information theory,the method utilizes the receive antenna indices of multiple-input multiple-output (MIMO) system to bear information,and randomizes the eavesdropper’s equivalent channel by switching the receive antennas,which can guarantee physical layer security transmission.First,the different receiving performances of the legitimate user and eavesdropper are analyzed in the spatial modulation secure transmission system.Second,the mutual information and secrecy mutual information of the transmission system are calculated,and two sufficient conditions that ensure positive secrecy mutual information are pointed out.Finally,an estimation algorithm of mutual information is provided.Moreover,the symmetry of finite alphabet set is exploited to decrease the computational complexity.Theoretical analysis and numerical simulation results verify the availability of the security transmission method.…”
    Get full text
    Article
  10. 170
  11. 171

    CFD for turbulence: from fundamentals to geophysics and astrophysics by Cambon, Claude, Alvarez Laguna, Alejandro, Zhou, Ye

    Published 2022-12-01
    “…In this paper, we review the role of CFD in the study of turbulence through both direct numerical simulations and the resolution of statistical multi-scale theories. With a historical perspective, we will discuss the evolution of the numerical modeling of turbulence from the first numerical experiments as proposed by Orszag and Patterson [1] to complex geophysical and plasma simulations where body forces such as Coriolis, the buoyancy force, or the Lorentz force can introduce strong anisotropies. …”
    Get full text
    Article
  12. 172

    Minor Prime Factorization for n-D Polynomial Matrices over Arbitrary Coefficient Field by Jinwang Liu, Dongmei Li, Licui Zheng

    Published 2018-01-01
    “…Two tractable criterions are presented for the existence of minor prime factorization, which can be realized by programming and complexity computations. On the theory and application, we shall obtain some new and interesting results, giving some constructive computational methods for carrying out the minor prime factorization.…”
    Get full text
    Article
  13. 173

    Adaptive Differentiator-Based Predefined-Time Control for Nonlinear Systems Subject to Pure-Feedback Form and Unknown Disturbance by Man Yang, Qiang Zhang, Ke Xu, Ming Chen

    Published 2021-01-01
    “…An adaptive predefined-time controller is designed by introducing the finite-time differentiator which is used to decrease the computational complexity problem appeared in the traditional backstepping control. …”
    Get full text
    Article
  14. 174
  15. 175
  16. 176

    A Flexible Polynomial Expansion Method for Response Analysis with Random Parameters by Rugao Gao, Keping Zhou, Yun Lin

    Published 2018-01-01
    “…The generalized Polynomial Chaos Expansion Method (gPCEM), which is a random uncertainty analysis method by employing the orthogonal polynomial bases from the Askey scheme to represent the random space, has been widely used in engineering applications due to its good performance in both computational efficiency and accuracy. But in gPCEM, a nonlinear transformation of random variables should always be used to adapt the generalized Polynomial Chaos theory for the analysis of random problems with complicated probability distributions, which may introduce nonlinearity in the procedure of random uncertainty propagation as well as leading to approximation errors on the probability distribution function (PDF) of random variables. …”
    Get full text
    Article
  17. 177
  18. 178
  19. 179
  20. 180