-
841
The Comparative Study on the Damage Zones of Cylindrical and Spherical Charges in Rock and Soil
Published 2021-01-01“…It was observed that larger damage zones were generated by smaller values of the product of pressure and exponential expansion. However, the influence of soil media was complex, and larger damage zones were usually generated by the harder soil media.…”
Get full text
Article -
842
Using WPCA and EWMA Control Chart to Construct a Network Intrusion Detection Model
Published 2024-01-01“…This study develops a network intrusion detection model by integrating weighted principal component analysis into an exponentially weighted moving average control chart. …”
Get full text
Article -
843
Average Fracture Energy for Crack Propagation in Postfire Concrete
Published 2013-01-01“…In order to calculate the accurate fracture energy, the tails of load-displacement curves were best fitted using exponential and power functions. Three fracture energy quantities (fracture energy GF, stable fracture energy GFS, and unstable fracture energy GFU) with their variation tendency and their mutual relationship were determined to predict energy consumption for the complete fracture propagation. …”
Get full text
Article -
844
Final and peak epidemic sizes for SEIR models with quarantine and isolation
Published 2007-07-01“…Previous studieshave suggested (based on numerical observations) that a gammadistribution model (GDM) tends to predict a larger epidemic peakvalue and shorter duration than an exponential distribution model(EDM). By deriving analytic formulas for the maximum and finalepidemic sizes of the two models, we demonstrate that either GDM orEDM may predict a larger epidemic peak or final epidemic size,depending on control measures. …”
Get full text
Article -
845
A low complexity ZF precoding scheme based on weighted Gauss-Seidel in massive MIMO systems
Published 2019-03-01“…In massive MIMO systems,due to inversion of Hermitian matrix,the complexity of the traditional ZF precoding method increases exponentially with increase of the number of users.To solve this problem,a low complexity digital ZF precoding scheme based on weighted Gauss-Seidel (WGS) was proposed.That was weighted addtion the iteration results of previous step and Gausee-Seidel iteration results to accelerate the iterative convergence.The weighting factor was determined by the least mean square sum,and the weighting factor was proved to make the algorithm converge.The simulation results show that the WGS algorithm can approximate the performance of ZF precoding scheme with very few iterations,and reduce the complexity of ZF precoding from O(K <sup>3</sup>) to O(K<sup>2</sup>),where K is the number of users.…”
Get full text
Article -
846
Development of Strength-Maturity Relationship for Coral Sand Concrete Incorporating Bamboo Leaf Ash
Published 2024-01-01“…Calibration curves for predicting concrete strengths were developed using logarithmic, modified exponential, modified hyperbolic, and dose-response Hill models. …”
Get full text
Article -
847
Damage mechanical properties of sandstone under combined action of freeze-thaw and load
Published 2024-12-01“…The results indicate that: The quality loss rate of sandstone increases exponentially with the increase of freeze-thaw cycles, and the higher the loading level, the greater the quality loss rate, with a maximum quality loss of 0.37%. …”
Get full text
Article -
848
Development of a comprehensive model to predict stock prices in the stock market with an interpretive structural modeling approach
Published 2024-06-01“…On the other hand, the exchange rate, relative strength indicator, and exponential moving average were identified as the most influential indicators at the top levels (1 and 2) of the hierarchy. …”
Get full text
Article -
849
Cosmological Analysis of Modified Holographic Ricci Dark Energy in Chern-Simons Modified Gravity
Published 2019-01-01“…The quintessence and K-essence models represent exponentially increasing behaviors, while tachyon model shows decreasing behavior. …”
Get full text
Article -
850
Approximation algorithm to symmetric alpha stable distribution with bi-region curve model
Published 2013-01-01“…The symmetric alpha stable (S S) was used to model a non-Gaussian,heavy tail and impulsive noise of com-α munication channels.However,explicit expressions for the probability density functions (PDF) in terms of elementary functions are still unknown except for some special cases,which limits the application of the SαS distribution in practice,which the bi-region separated by the triple divergence was proposed Specially,within the triple divergence,a simple exponential function with two special parameters was constructed,the two parameters were determined by using Taylor serial expansion.Compared with conventional algorithms using the series expansion,the proposed algorithm avoids the selecting the number of the series items and the risk of series expansion divergence.Moreover,numerical results verify that the proposed approximation is closer to the actual SαS PDF than the conventional Cauchy-Gaussian mixture approximation.…”
Get full text
Article -
851
Generalized Aggressive Periodontitis and Its Treatment Options: Case Reports and Review of the Literature
Published 2012-01-01“…A vast array of treatment modalities is available which can be employed in the treatment of generalized aggressive periodontitis with varying success rates, but a definite guideline for the management is yet to be formulated. However, with the exponential rate of developments in periodontal research, regenerative therapy, tissue engineering, and genetic technologies, the future seems promising in regard to options at managing the disease. …”
Get full text
Article -
852
DEFORMATION-MECHANISM-BASED MODELING OF CREEP BEHAVIOR OF P91 STEEL
Published 2022-01-01“…Combined with the experimental data, it was found that the minimum creep rate has an obvious exponential relationship with the applied stress during creep, which was closely related to different deformation mechanisms. …”
Get full text
Article -
853
Diversity Perceptions in the UK Retail Industry: A Case of Tesco
Published 2023-03-01“…It can be argued that with exponential technological changes like the emergence of artificial intelligence, machine learning, the internet of things (IoT), etc. retailers around the world are facing continuous challenges in keeping their business model updated and relevant for sustainable business growth and profitability. …”
Get full text
Article -
854
Secure federated learning scheme based on adaptive Byzantine defense
Published 2024-08-01“…Through adaptive preliminary aggregation associated with incentives and global aggregation based on exponential weighted average, the global model was minimally perturbed on the premise of providing differential privacy perturbations for both the local model and the global model to achieve privacy protection. …”
Get full text
Article -
855
Online Parameter Estimation in Digital Twins for Real-Time Condition Monitoring
Published 2025-01-01“…The deterministic approach utilizes an exponential forgetting factor adaptive observer, while the stochastic approach involves an adaptive Kalman filter. …”
Get full text
Article -
856
Keeping It Open: A TEI-based Publication Pipeline for Historical Documents
Published 2024-11-01“…Following the emergence of numerous projects to make use of historical archives, books, or other materials, as well as the exponentially growing needs for digital tools tailored for those tasks, the DAHN project (Dispositif de soutien à l’Archivistique et aux Humanités Numériques) developed a complete open-source pipeline made of tools and methods making it possible to present a digital scholarly edition of scanned handwritten material. …”
Get full text
Article -
857
Design method of secure computing protocol for deep neural network
Published 2020-08-01“…Aiming at the information leakage problem in the process of deep neural network model calculation,a series of secure and efficient interactive computing protocols were designed between two non-collusive edge servers in combination with the additive secret sharing scheme.Since the nonlinear function cannot be split directly,a set of basic conversion protocols were proposed to realize the secure conversion of additive and multiplicative shares.After a few invokes,the power,comparison,exponential,logarithm,division and other low-level functions can be calculated securely.Due to the characteristics of data transfer and computation,the proposed protocols can be extended to array computation.Theoretical analysis ensures the correctness,efficiency and security of these protocols.The experimental results show that the error of these protocols is negligible,and the computational costs and communication overhead are better than the existing schemes.…”
Get full text
Article -
858
On the Dehn functions of a class of monadic one-relation monoids
Published 2024-09-01“…We give an infinite family of monoids $\Pi _N$ (for $N=2, 3,\,\dots $), each with a single defining relation of the form $bUa = a$, such that the Dehn function of $\Pi _N$ is at least exponential. More precisely, we prove that the Dehn function $\partial _N(n)$ of $\Pi _N$ satisfies $\partial _N(n) \succeq N^{n/4}$. …”
Get full text
Article -
859
Optimistic Mix-net protocol based on bilinear pairings
Published 2013-11-01“…An optimization method for the joint E mal decryption involved in the protocol was also proposed, which can reduce the number of exponentiations computed by each mix server. The Mix-net will shuffle and decrypt in-put ciphertexts much faster than all previous Mix-nets with public verifiability when all mix servers execute the mixing protocol honestly.…”
Get full text
Article -
860
Worldwide Increasing Incidences of Cutaneous Malignant Melanoma
Published 2011-01-01“…The CMM incidence may be increasing at an exponential rate around the world, but it definitely decreases with increasing latitude up to ~50°N where it reverses and increases with the increasing latitude. …”
Get full text
Article