Suggested Topics within your search.
Suggested Topics within your search.
- Mathematics 20
- Calculus 6
- Engineering mathematics 6
- Mathematical analysis 5
- Mathematical statistics 5
- Business mathematics 4
- Engineering 3
- MATHEMATICS / Mathematical Analysis 3
- Mathematical models 3
- Algebra, Abstract 2
- Application software 2
- Computer-assisted instruction 2
- Data processing 2
- Differential equations 2
- Education, Elementary 2
- Educational technology 2
- Functional differential equations 2
- Geometry, Analytic 2
- History 2
- Internet in education 2
- Number theory 2
- Numerical analysis 2
- Probabilities 2
- Problems, exercises, etc 2
- Study and teaching 2
- mathematics 2
- Analysis 1
- Anesthesia 1
- Biological and Medical Physics, Biophysics 1
- Biological physics 1
-
19581
The role of educational institutions in transformations to achieve sustainable development
Published 2025-01-01Get full text
Article -
19582
Performance Modelling of Dual Air/Water Collector in Solar Water and Space Heating Application
Published 2019-01-01“…In the present work, the detailed mathematical model of a dual air/water solar collector (DAWC) has been developed and experimentally verified. …”
Get full text
Article -
19583
Experimental Snap Loading of Synthetic Ropes
Published 2005-01-01“…The effects of the type of rope, drop height, drop weight, whether the rope has been subjected to static precycling, and the number of previous dynamic tests are examined. A mathematical model is proposed for the rope force as a function of the displacement and velocity of the weight.…”
Get full text
Article -
19584
Case studies in numerical simulation of crack trajectories in brittle materials
Published 2012-03-01“…The “diffusion approximation” of the crack diffusion model represents cracktrajectories as a one-dimensional Wiener process with advantage of well-developed mathematical formalismand simplicity of creating computer generated realizations (fractal dimension d = 1.5). …”
Get full text
Article -
19585
Toward location privacy protection in Spatial crowdsourcing
Published 2019-03-01“…Our scheme is based on mathematical transformation to the location while providing privacy protection to workers and requesters. …”
Get full text
Article -
19586
A culturally relevant, imbued, and sustaining pedagogy framework for culturally connected math curriculum
Published 2025-01-01“…These three courses seek to revitalize mathematical ways of knowing embedded within the Turtle Mountain language(s) and culture(s). …”
Get full text
Article -
19587
Performance analysis and optimization of cooperative spectrum sensing for maximizing secondary throughput
Published 2011-01-01“…The relationship among SU,detection threshold,bandwidth,spectrum utilization and secondary throughput in cognitive radio networks was analyzed,which indicates the lower false alarm probability,higher spectrum utilization and larger secondary throughput with less SU in C-CSS(censoring based cooperative spectrum sensing),besides,the required detection threshold for maximizing the secondary throughput different with the traditional CSS under given SU number and the objective demand.Based on the NP criticism,an optimal cooperative spectrum sensing algorithm for maximizing the secondary throughput was proposed by solving the mathematic model to obtain the optimal party of SU and detection threshold.Theoretical analysis and simulation results show that the maximized secondary throughput achieved by the proposed optimal algorithm,while maintaining the given detection probability.…”
Get full text
Article -
19588
Identifying Initial Condition in Degenerate Parabolic Equation with Singular Potential
Published 2017-01-01“…This problem can be formulated in a least-squares framework, an iterative procedure which minimizes the difference between the given measurements and the value at sensor locations of a reconstructed field. The mathematical model leads to a nonconvex minimization problem. …”
Get full text
Article -
19589
Low-Complexity Architecture of Orthogonal <italic>N</italic>-Continuous Precoding for Sidelobe Suppression of OFDM Signals and Its Analysis
Published 2025-01-01“…Comprehensive theoretical analyses justify its performance and have mathematical representations parallel with the counterparts of related precoding schemes. …”
Get full text
Article -
19590
Integral fault analysis of the ARIA cipher
Published 2019-02-01“…ARIA is a Korean standard block cipher,which is flexible to provide security for software and hardware implementation.Since its introduction,some research of fault analysis is devoted to attacking the last two rounds of ARIA.It is an open problem to know whether provoking faults at some former rounds of ARIA allowed recovering the secret key.An answer was given to solve this problem by showing a novel integral differential fault analysis on two rounds earlier of ARIA.The mathematical analysis and simulating experiments show that the attack can successfully recover its secret key by fault injections.The results in this study describe that the integral fault analysis is a strong threaten to the security of ARIA.The results are beneficial to the analysis of the same type of other block ciphers.…”
Get full text
Article -
19591
FATIGUE LIFE PREDICTION FOR ROW ANGULAR CONTACT BALL BEARINGS UNDER THERMO-MECHANICAL COUPLING BASED ON FEM
Published 2018-01-01“…Based on the L-P fatigue life and Hertz contact theory,an mathematical model was established with the combination of Goodman formula,material P-S-N curves and EM modify rule. …”
Get full text
Article -
19592
Applications of information navigation method in wireless sensor networks
Published 2012-11-01“…For adapting to a novel architecture of WSNs,which supports information query and navigation systems through construction of the virtual potential field.Under the premise of diffusion equation and poisson-based formula,a novel method was proposed which can accomplish the navigation more conveniently and more efficiently.In order to guarantee the accuracy of navigation,the relative knowledge of information transmission and the partial differential process(diffusion equation)in electric potential field was utilized,meanwhile gradient descent method was also applied in the process of application.A complete mathematical derivation was used.Tiny-OS simulations show the method can efficiently overcome the original WSNs weakness that network configuration abilities of information navigation are not good enough.Simultaneously,during the process of explore the navigation computation,structures of diffusion equation are more flexible and adaptability.…”
Get full text
Article -
19593
Modeling of Random Delays in Networked Control Systems
Published 2013-01-01“…In order to compensate for random delays which may lead to performance degradation and instability of NCSs, it is necessary to establish the mathematical model of random delays before compensation. …”
Get full text
Article -
19594
Two-level cache based streaming media scheduling algorithm for mobile network
Published 2007-01-01“…A novel caching system architecture for mobile streaming was proposed,which was named 2CMSA(two-level cache mobile streaming architecture).In this system,limitations for mobile streaming system such as small memory size in mobile terminal and low bandwidth in wireless access network were avoided.According to the 2CMSA,a scheduling algorithm of 2CMSS(two-level cache based mobile streaming scheduling) was designed;mathematical models were also achieved to analyze the performance of this scheduling algorithm.Simulation experiment proves that,comparing to the original mobile streaming system,by using the new two-level cache architecture and cache based scheduling algorithm,the network transmission cost and the client startup delay of the mobile streaming services can be decreased effectively.…”
Get full text
Article -
19595
Theoretical analysis of expansion process of wet water vapor in working chamber of piston long-stroke linear drive of compressor unit
Published 2022-03-01“…The study is carried out on the basis of the developed mathematical model, which includes both the basic thermodynamic equations and the equations describing the process of heat exchange of the working substance with the walls of the working chamber during the expansion process. …”
Get full text
Article -
19596
Research of Cycloidal Pump for Hybrid Transmission(E-CVT)
Published 2020-04-01“…The oil pump equipped with E-CVT has the function of providing cooling lubrication flow and brake flow.In order to study the use characteristics of cycloidal pump as the power source of E-CVT hydraulic system,the mathematical model is established based on theoretical analysis,and the multi-domain simulation model including signal domain,hydraulic domain and mechanical domain is built by AMESim platform.The model is verified by experimental data.Based on the simulation model,the effects of oil temperature,rotation speed and load pressure on volumetric efficiency and flow characteristics are dynamically studied.At the same time,the low oil temperature start failure of the oil pump in the E-CVT is predicted by the model connection filter,oil sump and pipeline,which provides a reference for the subsequent fuel pump motor related strategy design.…”
Get full text
Article -
19597
Some features of implementation of design model of high-pressure centrifugal compressor stage with inlet guide vanes
Published 2019-06-01“…The analysis of implementation features of the mathematical model of a transonic centrifugal compressor stage with an input guide vanes (IGV) and a semi-open axial-radial impeller has been carried out. …”
Get full text
Article -
19598
Optimization Design of Mixed Discrete Variable based on Variable Transformation Method
Published 2015-01-01“…The deficiency of mixed discrete variables for the current optimal design is analyzed.A variable transformation method for mixed discrete variables is proposed,that is nominal variables are set,and software or algorithm of continuous variables could be called for mathematical model.The variables transformation program is written according to their relationship with real variables.Then,the nominal variables are put into the objective function and constraint condition,and the optimal solution is got.The variables of the optimal solution and real variables have the same type,so,it needn’t to be rounded and ensured the accuracy of the optimization.The variable transformation method is applied into optimization design of spur gear transmission,and compared with the existent ordinary optimization methods.The obtained results show that the variable transformation method is simple and feasible and the optimum solution of the variable transformation method is superior to solutions of other algorithm.…”
Get full text
Article -
19599
Adaptive weighted progressive iterative approximation based on coordinate decomposition.
Published 2025-01-01“…Numerical experiment results indicate that this vector decomposition technique is a critical mathematical operation for improving algorithm efficiency and precisely adjusting the shapes of curves or surfaces to approximate the data set.…”
Get full text
Article -
19600
Investigation of applicability of Peng–Robinson and GERG-2008 equations of state of real gas for calculating properties of Freons for refrigeration machines and compressors
Published 2021-03-01“…As a result of this work, data have been obtained to evaluate the accuracy of the Peng–Robinson and GERG-2008 equations of state for each of the three CFCs, to evaluate the effectiveness of these equations, and to provide recommendations for the calculation and application of these equations in the design and mathematical modelling of refrigeration machines…”
Get full text
Article