Showing 381 - 400 results of 974 for search '"integer"', query time: 0.04s Refine Results
  1. 381

    Quartic Functional Equation: Ulam-Type Stability in β,p-Banach Space and Non-Archimedean β-Normed Space by Ravinder Kumar Sharma, Sumit Chandok

    Published 2022-01-01
    “…In this study, we use the alternative fixed-point approach and the direct method to examine the generalized Hyers–Ulam stability of the quartic functional equation  gu+mv+gu−mv=2m−17m−9gu+2m2−1m2gv−m−12g2u+m2gu+v+gu−v, with a fixed positive integer m/ge2 in the context of β,p-Banach space. …”
    Get full text
    Article
  2. 382

    Optimizing Crew Rostering with Multilicense on High-Speed Railway Lines by Zhiqiang Tian

    Published 2014-01-01
    “…This paper studies the crew rostering problem with the consideration of multilicense of crewmembers. A 0-1 integer programming model is established to minimize the number of crewmembers used and to maintain the working time balance and the income balance of crewmembers. …”
    Get full text
    Article
  3. 383

    On permutation polynomials over finite fields by R. A. Mollin, C. Small

    Published 1987-01-01
    “…We also give some results bearing on a conjecture of Carlitz which says essentially that for any even integer m, the cardinality of finite fields admitting permutation polynomials of degree m is bounded.…”
    Get full text
    Article
  4. 384

    Existence of Positive Solutions of a Discrete Elastic Beam Equation by Ruyun Ma, Jiemei Li, Chenghua Gao

    Published 2010-01-01
    “…Let T be an integer with T≥5 and let T2={2,3,…,T}. We consider the existence of positive solutions of the nonlinear boundary value problems of fourth-order difference equations Δ4u(t−2)−ra(t)f(u(t))=0, t∈T2, u(1)=u(T+1)=Δ2u(0)=Δ2u(T)=0, where r is a constant, a:T2→(0,∞),  and  f:[0,∞)→[0,∞) is continuous. …”
    Get full text
    Article
  5. 385

    Provably secure and efficient proxy signature scheme by Jie ZENG, Wei NIE

    Published 2014-08-01
    “…The security of proposed scheme is based on the hardness of shortest vector problem and small integer solution problem, and the scheme satisfies the security require-ments of a proxy signature scheme. …”
    Get full text
    Article
  6. 386

    Orthogonal Multiwavelet Frames in L2Rd by Liu Zhanwei, Hu Guoen, Wu Guochang

    Published 2012-01-01
    “…We characterize the orthogonal frames and orthogonal multiwavelet frames in L2Rd with matrix dilations of the form (Df)(x)=detAf(Ax), where A is an arbitrary expanding d×d matrix with integer coefficients. Firstly, through two arbitrarily multiwavelet frames, we give a simple construction of a pair of orthogonal multiwavelet frames. …”
    Get full text
    Article
  7. 387

    Cross-domain access control policy mapping mechanism for balancing interoperability and autonomy by Tianyi ZHU, Fenghua LI, Wei JIN, Yunchuan GUO, Liang FANG, Lin CHENG

    Published 2020-09-01
    “…Cross-domain access control can improves interoperability but reduces intra-domain autonomy.To balance inter-domain interoperability and intra-domain autonomy,a cross-domain access control policy mapping to the problem of multi-objective integer optimization programming was formulated.Both the maximization of inter-domain interoperability and the minimization of intra-domain autonomy were taken as the objectives.Further,seven constraints were designed to prevent typical cross-domain conflicts.To solve the optimization problem,a constrained NSGA-III algorithm was proposed.The experimental results show that the proposed algorithm can quickly converge and accurately find the policy mapping even in the large-scale datasets.…”
    Get full text
    Article
  8. 388

    Action of left identity on n-skew commuting 3-additive mappings by Suad Alrehaili, Faiza Shujat, Abu Zaid Ansari

    Published 2025-01-01
    “…In this paper, our aim is to prove the following result: consider a given integer [Formula: see text], and let [Formula: see text] be a [Formula: see text] torsion free ring possessing a left multiplicative identity e. …”
    Get full text
    Article
  9. 389

    An Operator-Difference Method for Telegraph Equations Arising in Transmission Lines by Mehmet Emir Koksal

    Published 2011-01-01
    “…Second-order unconditionally absolutely stable difference scheme in (Ashyralyev et al. 2011) generated by integer powers of space operator is modified for the equation. …”
    Get full text
    Article
  10. 390

    Dynamic spectrum allocation based on clone selection algorithm in cognitive heterogeneous wireless networks by Hua SHI, Jian-dong LI, Zhao LI

    Published 2012-07-01
    “…The system model of cognitive heterogeneous wireless networks was given.Based on this system model,the problem of dynamic spectrum allocation was formulated as a constrained 0-1 integer programming with maximizing the network utility in mind,and considering the demand for spectrum from various radio access networks、the interference between them and heterogeneous granularity channels because of the fact that different radio access technologies use channels with different widths.An intelligent algorithm named clone selection algorithm was applied to solve this problem within which a new coding scheme for the antibody was proposed based on the demand for spectrum and heterogeneous granularity channels.Simulation results show that the proposed method could improve the network utility and spectrum utilization compared with greedy allocation algorithm.…”
    Get full text
    Article
  11. 391

    Exploiting social reciprocity for auction-based spectrum allocation in femtocell networks by Feng Zhao, Haibo Tang, Hongbin Chen

    Published 2017-06-01
    “…Such a matter is formulated as an integer programming optimization problem, and a modified quantum genetic algorithm is developed to solve the optimization problem. …”
    Get full text
    Article
  12. 392

    Detection and elimination method for deception jamming based on an antenna array by Shuyan Ni, Jianhua Cui, Naiping Cheng, Yurong Liao

    Published 2018-05-01
    “…To estimate the jamming direction with high accuracy, meanwhile considering the feasibility of airborne installation, a novel configurated array combining medium-length baseline with short baseline is designed, and a fast method to solve the integer ambiguity is discussed. After jamming detection, the nulling of the array beam is pointed to the jamming source through the orthogonal vector weighting to suppress jamming. …”
    Get full text
    Article
  13. 393

    Some Bivariate Smooth Compactly Supported Tight Framelets with Three Generators by A. San Antolín, R. A. Zalik

    Published 2013-01-01
    “…For any dilation matrix with integer entries and , we construct a family of smooth compactly supported tight wavelet frames with three generators in . …”
    Get full text
    Article
  14. 394

    Archimedean unital groups with finite unit intervals by David J. Foulis

    Published 2003-01-01
    “…If G is torsion-free, then the canonical injection ρ is used to show that G is Archimedean if and only if its positive cone is determined by a finite number of homogeneous linear inequalities with integer coefficients.…”
    Get full text
    Article
  15. 395

    Novel Analysis of Fractional-Order Fifth-Order Korteweg–de Vries Equations by Ahmed B. Khoshaim, Muhammad Naeem, Ali Akgul, Nejib Ghanmi, Shamsullah Zaland

    Published 2022-01-01
    “…Furthermore, it is demonstrated that the fractional and integer-order solutions close in on the exact result. …”
    Get full text
    Article
  16. 396

    Data-driven data transmission of the Internet of things based on sensing spectrum by Xuanheng LI, Yi SUN, Jie WANG, Haixia ZHANG

    Published 2019-06-01
    “…Facing the problem of spectrum shortage caused by the mass data,in order to share as a solution,how operators use the sensing spectrum reasonably to transmit data was studied.Considering the limitation of Internet of things(IoT) devices,the ultra-dense cognitive heterogeneous network architecture was designed,based on traffic demand and perception cost,an optimal access control and perception decision method was designed to maximize network utility.Considering the uncertainty of the perceived spectrum,the optimal programming scheme was modeled as a mixed integer stochastic optimization problem,and a data-driven probabilistic solution method based on statistical characteristics was proposed.In the case of unknown probability distribution of available bandwidth,data transmission requirements meeting various service requests were counted.…”
    Get full text
    Article
  17. 397

    Multicast service protection algorithm based on elastic optical network by Jingjing WU, Jianfang ZHANG

    Published 2019-03-01
    “…With the rapid growth of the network traffic,the elastic optical network (EON) has been proposed as a promising solution due to its high spectrum efficiency and flexible bandwidth provision.Meanwhile,multicast routing and spectrum allocation,and the survivability of the network become more challenging than that in the conventional optical network.The routing for multicast traffic and its protection algorithm in EON was investigated.An integer linear programming (ILP) formulation with the objective to minimize total spectrum consumption was presented.In addition,a heuristic algorithm called multicast sub-tree protection algorithm (MSPA) to achieve sufficient protection and satisfy resources savings was designed.The simulation results demonstrate that comparing with the traditional multicast routing and protection algorithm,MSPA performs well in improving the blocking probability and the spectrum utilization of the network.…”
    Get full text
    Article
  18. 398

    Performance analysis of a MOE blind adaptive space-time multiuser detection algorithm by LU Ling-yun, XIAO Yang

    Published 2005-01-01
    “…Moreover, the performance of the improved MOE blind space-time multi-user detector was analyzed, according to the effect of white noise, data sample number and positive integer u in cost function. The theoretic analysis and simulation results show that the performance of the novel multi-user detection method asymptotically converge to the MMSE blind space-time multi-user detector on condition that smaller noise variance, larger enough data sample number and u → ∞ .…”
    Get full text
    Article
  19. 399

    Chaos-based encryption and message authentication algorithm for wireless sensor network by Tie-ming CHEN, Liang GE

    Published 2013-05-01
    “…As for the traditional digital chaos-based scheme being not directly applicable for WSN because some sensor node does not support the float type of computation,integer chaotic maps and its block encryption schemes are firstly in-troduced,and then a novel chaos-based message authentication code (MAC) scheme was proposed,which was length changeable with high-level hybrid chaotic security.At last,a security application solution for data communication on WSN employing the proposed chaos-based schemes is presented,and the performance evaluation on the real-world Mica2 node is analyzed to show that the new security solution is more applicable for WSN than the current most popular security scheme,TinySec.…”
    Get full text
    Article
  20. 400

    Adaptive routing and wavelength assignment method based on SDN by Zhongnan ZHAO, Jian WANG, Hongwei GUO

    Published 2019-09-01
    “…Routing and wavelength assignment is an important resource allocation method of all-optical network.Aiming at the problem of traditional method combined with the new architecture,an adaptive multi-objective routing and wavelength assignment method based on SDN was proposed,which could realize the allocation of link resources of all-optical network through self-regulation.Based on the SDN service function chain model,service scheduling time and link service quality were taken as the scheduling objective,routing and wavelength assignment problem was constructed as the 0-1 integer programming problem,meanwhile,binary hybrid topology particle swarm optimization algorithm was used to optimize the network resources for optimal scheduling.The simulation results show that the proposed method is superior to the traditional classical algorithms in the test of recovery time,blocking rate and resource utilization.…”
    Get full text
    Article