Showing 661 - 680 results of 1,844 for search '"exponentiation"', query time: 0.04s Refine Results
  1. 661

    A Legendre Wavelet Spectral Collocation Method for Solving Oscillatory Initial Value Problems by A. Karimi Dizicheh, F. Ismail, M. Tavassoli Kajani, Mohammad Maleki

    Published 2013-01-01
    “…The proposed method is illustrated by some numerical examples, and the result is compared with the exponentially fitted Runge-Kutta method. Our proposed method is simple and highly accurate.…”
    Get full text
    Article
  2. 662

    SPECTRAL DISTRIBUTION OF SPONTANEOUS ELECTROLUMINESCENCE IN GREEN LIGHT EMITTING DIODES AT DIFFERENT EXCITATION LEVELS by D. S. Bobuchenko, D. S. Domanevskii, I. A. Khorunzhii, Yu. V. Trofimov, V. I. Tsvirko, R. D. Kakanakov

    Published 2015-04-01
    “…By means of the given model values of effective width of the forbidden zone, Fermi's level, parametre of a exponential tail of density of a condition are received.…”
    Get full text
    Article
  3. 663

    A Survey on Generalized Topological Indices for Silicon Carbide Structure by Sajid Mahboob Alam, Fahd Jarad, Abid Mahboob, Imran Siddique, Taner Altunok, Muhammad Waheed Rasheed

    Published 2022-01-01
    “…The application of graphs in chemical and molecular structures has exponentially increased during the last few years. Topological indices facilitate the collection of beneficial information and provide an approach to understanding the properties of chemical structure by providing information about algebraic graphs. …”
    Get full text
    Article
  4. 664

    Highly reliable access algorithm for PD-NOMA based IoT with delay guarantee by Chaonong XU, Jianxiong WU, Yongjun XU

    Published 2020-09-01
    “…A single-hop PD-NOMA network supporting k-successive interference cancellation (k-SIC) was considered.Given the real-time performance requirements,how to maximize the average reliability of uplink transmissions by the joint users grouping and power allocation was studied.A heuristic algorithm with complexity of O(nlogn) was presented,where n was the number of users.The algorithm was also proved to be the optimal if k=2.The performance evaluations reveal that the transmission reliability will increase exponentially with the linear degradation of the real-time performance guarantee.Besides,the transmission reliability is enhanced with respect to the random users grouping algorithm.…”
    Get full text
    Article
  5. 665

    On a Perturbed Risk Model with Time-Dependent Claim Sizes by Longfei Wei, Jia Hao, Shiyu Song, Zhenhua Bao

    Published 2024-01-01
    “…Explicit expressions can be obtained for exponential claim sizes. Finally, a numerical example is provided to measure the impact of the various dependence parameters in the risk model on the ruin probabilities.…”
    Get full text
    Article
  6. 666

    Geometrical Influences on the Vibration of Layered Plates by Saira Javed, F. H. H. Al Mukahal, S. B. A. El Sayed

    Published 2021-01-01
    “…The layered plates are supposed to have arbitrarily nonuniform thickness as linear, exponential, and sinusoidal. The spline approximation is used to approximate translational and angular displacement functions. …”
    Get full text
    Article
  7. 667

    A Correlation between the Kinetic and Thermodynamic Adsorption Characteristics of an Optical Brightener on a Pulp Surface by Greta Radeva, Stefka Veleva, Eva Valcheva

    Published 2008-09-01
    “…An attempt to find a correlation between the kinetic and thermodynamic terms (e.g. activation energy, pre-exponential factor, isosteric heat, entropy, etc.) of the chemisorption process involved in a commercial optical brightener/pulp system is presented. …”
    Get full text
    Article
  8. 668

    Android malware family classification method based on the image of bytecodeConstruction of MDS matrices by Yi-min YANG, Tie-ming CHEN

    Published 2016-06-01
    “…An Android malware family classification method based on the image of bytecode was proposed accord-ing to the exponential growth of Android malware.A bytecode file of Android malware was converted to a 256-level grayscale image and texture features was extracted from the image by GIST.The random forest algorithm was ap-plied to classify the extracted features.The method by the experimental data of 14 kinds of common Android mal-ware families was verified and was compared against the DREBIN on the same dataset.The experimental results show that the proposed method has high detection precision and low false positive rate.…”
    Get full text
    Article
  9. 669

    The Zeros of the Bergman Kernel for Some Reinhardt Domains by Jong-Do Park

    Published 2016-01-01
    “…We express the explicit closed form of the Bergman kernel for Dn using the exponential generating function for the Stirling number of the second kind. …”
    Get full text
    Article
  10. 670

    Statistical Analysis of Data From Electronic Component Lifetests (A Tutorial Paper) by J. Møltoft

    Published 1987-01-01
    “…Particular emphasis is given to analysis techniques using the assumptions of constant hazard rate (Exponential distribution), the Weibull distribution and mixed Weibull distributions. …”
    Get full text
    Article
  11. 671
  12. 672

    On application of optimal control to SEIR normalized models: Pros and cons by Maria do Rosário de Pinho, Filipa Nunes Nogueira

    Published 2017-01-01
    “…In this work we normalize a SEIR model that incorporates exponential natural birth and death, as well as disease-caused death. …”
    Get full text
    Article
  13. 673

    Modeling transcriptional co-regulation of mammalian circadian clock by Yanqin Wang, Xin Ni, Jie Yan, Ling Yang

    Published 2017-09-01
    “…Sufficient conditions are established for the asymptotic stability of the unique nontrivial positive equilibrium point of the model by studying an exponential polynomial characteristic equation with delay-dependent coefficients. …”
    Get full text
    Article
  14. 674

    Multiparticle Localization at Low Energy for Multidimensional Continuous Anderson Models by Trésor Ekanga

    Published 2020-01-01
    “…In addition, we prove the spectral exponential and the strong dynamical localization of the continuous multiparticle Anderson model at low energy. …”
    Get full text
    Article
  15. 675

    Design of Simplified Maximum-Likelihood Receivers for Multiuser CPM Systems by Li Bing, Baoming Bai

    Published 2014-01-01
    “…Analysis and numerical results show that the proposed receivers can approach the optimum multiuser receivers with significantly (even exponentially in some cases) reduced complexity and marginal performance degradation.…”
    Get full text
    Article
  16. 676

    Life cycle constrained backoff algorithm for ad hoc network by Ye-qun WANG, Guo-ce HUANG, Heng-yang ZHANG, Bo ZHENG, Yuan JING

    Published 2012-11-01
    “…Based on researching binary exponential backoff algorithm which defined in IEEE 802.11 standard,a life cycle constrained adaptive backoff algorithm(LCAB) was proposed.LCAB used life cycle instead of maximum retransmission times as the reference of packet dropping,and controlled process of backoff adaptively according to degree of network congestion.It fitted for real-time traffic such as VoIP which used widely in ad hoc network.A Markov model was introduced to analyze the performance of LCAB,and the normalized effective throughput of LCAB was obtained.The results show that the theoretic analysis is in accordance with the simulation,and the throughput of LCAB is better than that of BEB.…”
    Get full text
    Article
  17. 677

    Nonlinear Analysis of Return Time Series Model by Oriented Percolation Dynamic System by Anqi Pei, Jun Wang

    Published 2013-01-01
    “…And a scaling function of exponential parameter is introduced to analyze fluctuation behaviors of return intervals. …”
    Get full text
    Article
  18. 678

    An Integer Linear Programming Model for Partially Ordered Sets by Elsayed Badr, I.M. Selim, Hoda Mostafa, Hala Attiya

    Published 2022-01-01
    “…The simplex algorithm is one of the algorithms for solving linear programming problems with exponential time complexity. Fortunately, this algorithm solves real-world problems with polynomial time complexity. …”
    Get full text
    Article
  19. 679

    A Simulation-Based Study for Progressive Estimation of Population Mean through Traditional and Nontraditional Measures in Stratified Random Sampling by Maria Javed, Muhammad Irfan, Sajjad Haider Bhatti, Ronald Onyango

    Published 2021-01-01
    “…This study suggests a new optimal family of exponential-type estimators for estimating population mean in stratified random sampling. …”
    Get full text
    Article
  20. 680

    DiffPRFs:random forest under differential privacy by Hai-rong MU, Li-ping DING, Yu-ning SONG, Guo-qing LU

    Published 2016-09-01
    “…A differential privacy algorithm DiffPRFs based on random forests was proposed.Exponential mechanism was used to select split point and split attribute in each decision tree building process,and noise was added according to Laplace mechanism.Differential privacy protection requirement was satisfied through overall process.Compared to existed algorithms,the proposed method does not require pre-discretization of continuous attributes which significantly reduces the performance cost of preprocessing in large multi-dimensional dataset.Classification is achieved conveniently and efficiently while maintains the high accuracy.Experimental results demonstrate the effectiveness and superiority of the algorithm compared to other classification algorithms.…”
    Get full text
    Article