Showing 461 - 480 results of 974 for search '"integer"', query time: 0.03s Refine Results
  1. 461

    Multiplicity of Positive Solutions for Fractional Differential Equation with p-Laplacian Boundary Value Problems by Sabbavarapu Nageswara Rao

    Published 2016-01-01
    “…We investigate the existence of multiple positive solutions of fractional differential equations with p-Laplacian operator Da+β(ϕp(Da+αu(t)))=f(t,u(t)),  a<t<b, uja=0,  j=0,1,2,…,n-2, u(α1)(b)=ξu(α1)(η), ϕp(Da+αu(a))=0=Da+β1(ϕp(Da+αu(b))), where β∈(1,2], α∈(n-1,n],  n≥3, ξ∈(0,∞), η∈(a,b), β1∈(0,1], α1∈{1,2,…,α-2} is a fixed integer, and ϕp(s)=|s|p-2s,  p>1,  ϕp-1=ϕq,  (1/p)+(1/q)=1, by applying Leggett–Williams fixed point theorems and fixed point index theory.…”
    Get full text
    Article
  2. 462

    Numerical Characteristic of Gear System Attractor in Phase Space based on G-P Algorithm of Correlation Dimension by He Lin, Matthias Rätsch, Sanmin Wang, Guangshen Xu

    Published 2019-07-01
    “…The results show that the more complex of attractor structure generates the larger correlation dimension values, and causing strong vibration to the system, correlation dimension of chaotic attractor is between integer 1 and 2 with fractal characteristic.…”
    Get full text
    Article
  3. 463

    Resource management in blockchain-enabled heterogeneous edge computing system by Ping ZHANG, Shilin LI, Yiming LIU, Xiaoqi QIN, Xiaodong XU

    Published 2020-10-01
    “…In blockchain-enabled mobile edge computing (BMEC) systems,a new class of blockchain application related computation tasks was introduced to the system.Due to the differences of parallelism among computation tasks,heterogenous computing framework was introduced to suitably split various computation tasks on processors with vastly different processing power to achieve efficient task execution.Under the limited computation and communication resources,a system-wide utility maximization problem by jointly considering heterogeneous processor scheduling,computation and bandwidth resource allocation was formulated as a mixed-integer nonlinear programming problem.To solve the problem efficiently,the formulated problem was transformed into two sub-problems,namely application-driven heterogeneous processor scheduling and joint resource allocation,and a Lagrange-dual based algorithm was proposed.Simulation results show that the proposed scheme can effectively improve the system-wide utility of the BMEC system.…”
    Get full text
    Article
  4. 464

    Three-party password authenticated key agreement protocol with user anonymity based on lattice by Caifen WANG, Li CHEN

    Published 2018-02-01
    “…With the rapid development of quantum theory and the existence of polynomial algorithm in quantum computation based on discrete logarithm problem and large integer decomposition problem,the security of the algorithm was seriously threatened.Therefore,two authentication key agreement protocols were proposed rely on ring-learning-with-error (RLWE) assumption including lattice-based implicit authentication key agreement scheme and lattice-based explicit authentication key agreement scheme and proved its security.The implicit authentication key agreement protocol is less to communicate and faster to authentication,the explicit authentication key agreement protocol is more to secure.At the same time,bidirectional authentication of users and servers can resist unpredictable online dictionary attacks.The new protocol has higher efficiency and shorter key length than other password authentication key agreement protocols.It can resist quantum attacks.Therefore,the protocol is efficient,secure,and suitable for large-scale network communication.…”
    Get full text
    Article
  5. 465

    Conformable Fractional-Order Modeling and Analysis of HIV/AIDS Transmission Dynamics by Esam Y. Salah, Bhausaheb Sontakke, Mohammed S. Abdo, Wasfi Shatanawi, Kamaleldin Abodayeh, M. Daher Albalwi

    Published 2024-01-01
    “…Additionally, varied values of fractional orders are simulated numerically, demonstrating that the results generated by the conformable fractional derivative-based model are more physiologically plausible than integer-order derivatives.…”
    Get full text
    Article
  6. 466

    Network slicing deployment method based on isolation level by Qirun PAN, Kaizhi HUANG, Wei YOU

    Published 2020-04-01
    “…In order to balance the performance isolation requirements and security isolation requirements of network slicing,a network slice deployment method based on isolation level was proposed.The method first determined the isolation level of the network slice instance from the aspects of performance isolation and security isolation.When deploying the virtual nodes in the appropriate location,not only ensured that all network slice instances could reach their respective performance levels and security levels,but also isolated them.The gradation difference started to limit the coexistence condition of the virtual node.Then the integer linear programming method was used to model the problem,and the deployment cost was minimized as the objective function.Finally,the particle swarm optimization algorithm based on genetic algorithm was used to find the final deployment result.The simulation results show that the method has lower deployment cost and higher benefit-to-cost ratio,and can guarantee both performance and security.…”
    Get full text
    Article
  7. 467

    The Dynamic Spread of the Forward CDS with General Random Loss by Kun Tian, Dewen Xiong, Zhongxing Ye

    Published 2014-01-01
    “…We assume that the filtration F is generated by a d-dimensional Brownian motion W=(W1,…,Wd)′ as well as an integer-valued random measure μ(du,dy). The random variable τ~ is the default time and L is the default loss. …”
    Get full text
    Article
  8. 468

    On the Construction of Regular Solutions for a Class of Generalized Cauchy–Riemann Systems with Coefficients Bounded on the Entire Plane by S. Baizaev, R. N. Barotov

    Published 2024-10-01
    “…The coefficient for the conjugation of the desired function belongs to the H¨older space and, for |z| &gt; 1 , equals eimϕ , where m is an integer. For m ≤ 0 , the system was shown to have no nonzero solutions that grow no faster than a polynomial. …”
    Get full text
    Article
  9. 469

    Research on the Scheduling Problem of Movie Scenes by Yulian Liu, Qiuji Sun, Xiaotian Zhang, Yiwei Wu

    Published 2019-01-01
    “…This paper considers the factors affecting the cost of movie scenes shooting in the real world and constructs an integer linear programming model. A tabu search based method (TSBM) and a particle swarm optimization based method (PSOBM) are designed to solve larger-scale problems. …”
    Get full text
    Article
  10. 470

    Extensions of Some Parametric Families of D(16)-Triples by Alan Filipin

    Published 2007-01-01
    “…Let n be an integer. A set of m positive integers is called a D(n)-m-tuple if the product of any two of them increased by n is a perfect square. …”
    Get full text
    Article
  11. 471

    On Properties of Class A(n) and n-Paranormal Operators by Xiaochun Li, Fugen Gao

    Published 2014-01-01
    “…Let n be a positive integer, and an operator T∈B(ℋ) is called a class A(n) operator if T1+n2/1+n≥|T|2 and n-paranormal operator if T1+nx1/1+n≥||Tx|| for every unit vector x∈ℋ, which are common generalizations of class A and paranormal, respectively. …”
    Get full text
    Article
  12. 472

    Research of the Method of Determining k Value in VMD based on Kurtosis by Wu Wenxuan, Wang Zhijian, Zhang Jiping, Ma Weijin, Wang Junyuan

    Published 2018-01-01
    “…Basis on the question above,a method of determining k by kurtosis is proposed. Selecting an integer value of k between 2 and n,every k kurtosis of the maximum correlation coefficient is calculated,and the variation curve of kurtosis is plotted. …”
    Get full text
    Article
  13. 473

    Dynamical Analysis of Approximate Solutions of HIV-1 Model with an Arbitrary Order by Asma, Nigar Ali, Gul Zaman, Anwar Zeb, Vedat Suat Erturk, Il Hyo Jung

    Published 2019-01-01
    “…For this purpose, first, the proposed integer order model is converted into fractional order model. …”
    Get full text
    Article
  14. 474

    Interlayer phase coherence and composite fermions by Jolicoeur, Thierry

    Published 2025-01-01
    “…In bilayer systems there is a regime at integer filling of the lowest Landau level that displays a spontaneous breakdown of the U(1) relative phase between the two layers. …”
    Get full text
    Article
  15. 475

    Indoor EKF localization algorithm based on RFID carrier phase by Liangbo XIE, Xixi LIU, Yong WANG, Mu ZHOU, Zengshan TIAN

    Published 2022-03-01
    “…In order to solve the problem of low localization accuracy caused by indoor environment interference in the existing UHF RFID localization methods, an indoor extended Kalman filter (EKF) localization algorithm based on frequency hopping assisted RFID carrier phase was proposed.The virtual large bandwidth obtained by frequency hopping was used for rough distance estimation to realize multipath suppression, and the reliable dual frequency point selection and parameter optimization were completed through the phase after multipath suppression.Finally, EKF algorithm was used to realize high-precision and fast localization.Experimental results show that the average localization error of the proposed algorithm is 9.35 cm, and the real-time performance of the localization solution is nearly 10 times higher than the traditional integer solution method based on Chinese remainder theorem (CRT).…”
    Get full text
    Article
  16. 476

    A Note on Caputo’s Derivative Operator Interpretation in Economy by Hameed Ur Rehman, Maslina Darus, Jamal Salah

    Published 2018-01-01
    “…The reaction of economic agents due to recurrence identical alteration is minimized by using the modified Caputo’s derivative operator of order λ instead of integer order derivative n. The two sides of Caputo’s derivative are expressed by a brief time-line. …”
    Get full text
    Article
  17. 477

    Stabilization of the FO-BLDCM Chaotic System in the Sense of Lyapunov by Ping Zhou, Rongji Bai, Hao Cai

    Published 2015-01-01
    “…Based on an integer-order Brushless DC motors (IO-BLDCM) system, we give a fractional-order Brushless DC motors (FO-BLDCM) system in this paper. …”
    Get full text
    Article
  18. 478

    On close-to-convex functions of complex order by H. S. Al-Amiri, Thotage S. Fernando

    Published 1990-01-01
    “…The authors using the Ruscheweyh derivatives introduce the class K(b) of functions close-to-convex of complex order b, b≠0 and its generalization, the classes Kn(b) where n is a nonnegative integer. Here S*(b)⊂K(b)=K0(b). Sharp coefficient bounds are determined for Kn(b) as well as several sufficient conditions for functions to belong to Kn(b). …”
    Get full text
    Article
  19. 479

    On weakly prime-additive numbers with length $4k+3$ by Fang, Jin-Hui, Xue, Fang-Gang

    Published 2024-05-01
    “…If a positive integer $n$ has at least two distinct prime divisors and can be written as $n=p_1^{\alpha _1}+\dots +p_t^{\alpha _t}$, where $p_1<\dots 3$. …”
    Get full text
    Article
  20. 480

    Threshold Accepting Heuristic for Fair Flow Optimization in Wireless Mesh Networks by Jarosław Hurkała, Tomasz Śliwiński

    Published 2014-01-01
    “…In the underlaying optimization problem, the physical medium properties cause strong interference among simultaneously operating node devices, leading to nonlinearities in the mixed-integer pricing subproblem. That is where the threshold accepting procedure is applied. …”
    Get full text
    Article