-
321
Pseudorange estimation algorithm combining code and carrier phase based on Gaussian sum particle filtering
Published 2011-01-01“…According to the characteristic that code measurements yielded noisy but unambiguous pseudorange estimates and carrier phase measurements were almost noiseless but were affected by integer ambiguity,a novel Gaussian sum particle filter(GSPF) algorithm was proposed to combine the advantages of the two measurements.The theoretical analysis and simulation results show that the proposed algorithm is immune from cycle slips and produces smaller mean square errors.…”
Get full text
Article -
322
Tauberian conditions for a general limitable method
Published 2006-01-01“…We prove that if the classical control modulo of the oscillatory behavior of (un) in is a Tauberian condition for L, then the general control modulo of the oscillatory behavior of integer order m of (un) in or is also a Tauberian condition for L.…”
Get full text
Article -
323
On the Distribution Properties of the Smarandache Prime Part
Published 2021-01-01“…For each integer n, denote by ppn the largest prime ≤n and by Ppn the smallest prime ≥n, called as the Smarandache inferior prime part and superior prime part of n, respectively. …”
Get full text
Article -
324
New fractional cosine transform and its application
Published 2005-01-01“…It was a weighted combination of the first two integer-order cosine transforms of the original signal, and it has the same eigenvectors as the cosine transform’s, but the different eigenvalues which have a periodicity of two. …”
Get full text
Article -
325
Necessary and Sufficient Condition for the Existence of Solutions to a Discrete Second-Order Boundary Value Problem
Published 2012-01-01“…This paper is concerned with the existence of solutions for the discrete second-order boundary value problem Δ2u(t-1)+λ1u(t)+g(Δu(t))=f(t), t∈{1,2,…,T}, u(0)=u(T+1)=0, where T>1 is an integer, f:{1,…,T}→R, g:R→R is bounded and continuous, and λ1 is the first eigenvalue of the eigenvalue problem Δ2u(t-1)+λu(t)=0, t∈T, u(0)=u(T+1)=0.…”
Get full text
Article -
326
Three-dimensional Korteweg-de Vries equation and traveling wave solutions
Published 2000-01-01“…Solitary wave solutions for any positive integer n and cnoidal wave solutions for n=1 and n=2 are obtained. …”
Get full text
Article -
327
Signature Scheme Using the Root Extraction Problem on Quaternions
Published 2014-01-01“…The root extraction problem over quaternion rings modulo an RSA integer is defined, and the intractability of the problem is examined. …”
Get full text
Article -
328
AGQP-Injective Modules
Published 2008-01-01“…𝑀 is called almost general quasi-principally injective (or AGQP-injective for short) if, for any 0≠𝑠∈𝑆, there exist a positive integer 𝑛 and a left ideal 𝑋𝑠𝑛 of 𝑆 such that 𝑠𝑛≠0 and 𝐥𝑆(Ker(𝑠𝑛))=𝑆𝑠𝑛⊕𝑋𝑠𝑛. …”
Get full text
Article -
329
Lossless sharing visual cryptography
Published 2013-03-01“…The matrices translation algorithm and the integer programming model were designed. Furthermore, the pixel expansion optimization algorithm was realized. …”
Get full text
Article -
330
The Frobenius number associated with the number of representations for sequences of repunits
Published 2023-01-01“…The generalized Frobenius number is the largest integer represented in at most $p$ ways by a linear combination of nonnegative integers of given positive integers $a_1,a_2,\,\dots ,\,a_k$. …”
Get full text
Article -
331
MODELING MOVEMENT OF OBJECTS WITHOUT STOPS IN A NETWORK OF CROSSING ROUTES
Published 2018-03-01“…The problem is formulated in terms of disjunctive linear programming, mixed integer linear programming and graph theory. Several variants for representing constraints on convergence of objects are considered. …”
Get full text
Article -
332
A Linear Map Acts as a Leonard Pair with Each of the Generators of Usl2
Published 2020-01-01“…Let ℱ denote an algebraically closed field with a characteristic not two. Fix an integer d≥3; let x, y, and z be the equitable basis of sl2 over ℱ. …”
Get full text
Article -
333
Research and design of authenticated encryption algorithm based on AES round function
Published 2020-04-01“…The authenticated encryption algorithm guarantees the confidentiality and integrity of the information at the same time,and has extensive research and application prospects in the field of information security.With the mixed integer linear programming (MILP) method,the iterative structure with high efficiency and more active S boxes is searched.Based on this new round iterative function and the generalized Feistel structure,an authenticated encryption algorithm with the ability to resist collision attack,differential attack,linear attack and other attacks was designed and implemented,and the efficiency was twice that of AES-GCM.…”
Get full text
Article -
334
Nonstationary INAR(1) Process with th-Order Autocorrelation Innovation
Published 2013-01-01“…This paper is concerned with an integer-valued random walk process with qth-order autocorrelation. …”
Get full text
Article -
335
Symmetry Fermionic 𝑝-Adic 𝑞-Integral on ℤ𝑝 for Eulerian Polynomials
Published 2012-01-01“…In this paper, by applying the symmetry of the fermionic p-adic q-integral on ℤ𝑝, defined by Kim (2008), we show a symmetric relation between the q-extension of the alternating sum of integer powers and the Eulerian polynomials.…”
Get full text
Article -
336
Local newforms for generic representations of unramified even unitary groups I: Even conductor case
Published 2025-01-01“…In this paper, we define compact open subgroups of quasi-split even unitary groups for each even non-negative integer and establish the theory of local newforms for irreducible tempered generic representations with a certain condition on the central characters. …”
Get full text
Article -
337
Oscillation of a Class of Fractional Differential Equations with Damping Term
Published 2013-01-01“…Based on a certain variable transformation, the fractional differential equations are converted into another differential equations of integer order with respect to the new variable. Then, using Riccati transformation, inequality, and integration average technique, some new oscillatory criteria for the equations are established. …”
Get full text
Article -
338
Explicit Formulas Involving -Euler Numbers and Polynomials
Published 2012-01-01“…Also, we derive relations between the -Euler numbers and -Bernoulli numbers via the -adic -integral in the -adic integer ring.…”
Get full text
Article -
339
Bender–Knuth Billiards in Coxeter Groups
Published 2025-01-01“…We say W is futuristic if for every nonempty finite convex set $\mathscr {L}$ , every Coxeter element c and every $u\in W$ , there exists an integer $K\geq 0$ such that $\mathrm {Pro}_c^K(u)\in \mathscr {L}$ . …”
Get full text
Article -
340
A Class of Weak Dual Wavelet Frames for Reducing Subspaces of Sobolev Spaces
Published 2022-01-01“…In present paper, we will relax this restriction and only require the integer translation of the wavelet functions (or refinable functions) to form Bessel sequences. …”
Get full text
Article