Suggested Topics within your search.
Showing 21 - 40 results of 236 for search 'computational number theory', query time: 0.12s Refine Results
  1. 21

    The electroweak effective field theory from on-shell amplitudes by Gauthier Durieux, Teppei Kitahara, Yael Shadmi, Yaniv Weiss

    Published 2020-01-01
    “…We supplement our bottom-up derivations with a matching of three- and fourpoint amplitude coefficients onto the standard-model effective field theory (SMEFT) in the broken electroweak phase. This establishes the correspondence with the usual Lagrangian approach and paves the way for SMEFT computations in the on-shell formalism.…”
    Get full text
    Article
  2. 22

    Efficient discrimination between real and complex quantum theories by Josep Batle, Tomasz Białecki, Tomasz Rybotycki, Jakub Tworzydło, Adam Bednorz

    Published 2025-01-01
    “…We improve the test to show the impossibility of a quantum theory based on real numbers by a larger ratio of complex-to-real bound on a Bell-type parameter. …”
    Get full text
    Article
  3. 23

    OPTIMIZATION PROBLEM FOR NUMBER OF LOGIC GATES NEEDED TO IMPLEMENT MULTIPLE BOOLEAN FUNCTIONS USING DECODER by M. Onai, H. Skopyk

    Published 2024-12-01
    “…LEs group multiple input signals and process them using binary logic operators like AND or NOR. Purpose. Develop a computer program that, based on provided functions, will find a solution associated with approximately minimal number of logic gates. …”
    Get full text
    Article
  4. 24
  5. 25
  6. 26

    Identification of gas outburst precursors based on outburst percolation theory by Yulin Ma, Mingyu Chen

    Published 2025-01-01
    “…A percolation factor a which can make a significant contribution to the research on premonitory information of gas outbursts is introduced to determine whether percolation occurs in coal rock, and supports the outburst percolation theory. It was found that percolation probability and correlation length increase with greater porosity, and that the number of pore clusters decreases as porosity increases. …”
    Get full text
    Article
  7. 27
  8. 28
  9. 29

    Botnets’ similarity analysis based on communication features and D-S evidence theory by ZANG Tian-ning1, YUN Xiao-chun1, ZHANG Yong-zheng2, MEN Chao-guang1, CUI Xiang2

    Published 2011-01-01
    “…A potential hidden relationship may exist among different zombie groups.A method to analyze the relationship among botnets was proposed based on the communication activities.The method extracted several communication fea-tures of botnet,including the number of flows per hour,the number of packets per flow,the number of flows per IP and the packet payloads.It defined similarity statistical functions of the communication features,and built the analysis model of botnets relationship based on the advanced dempster-shafer(D-S) evidence theory to synthetically evaluate the simi-larities between different zombie groups.The experiments were conducted using several botnet traces.The results show that the method is valid and efficient,even in the case of encrypted botnet communication messages.Moreover,the ideal processing results is achieved by applying our method to analyze the data captured from the security monitoring platform of computer network,as well as compare with similar work.…”
    Get full text
    Article
  10. 30

    Caveats: Numerical Requirements in Graph Theory Based Quantitation of Tissue Architecture by J. Sudbø, R. Marcelpoil, A. Reith

    Published 2000-01-01
    “…By these methods, neighborhood relations between a number of objects (e.g., cells) are explored and inherent to these methods are therefore certain requirements as to the number of objects to be included in the analysis. …”
    Get full text
    Article
  11. 31

    MECHANICAL STATE ANALYSIS USING QUANTUM THEORY AND MATHEMATICAL MORPHOLOGICAL FILTER by SHI Ying

    Published 2018-01-01
    “…Aiming at the erosion operator for the mathematical morphological filter( MMF),the quantum-inspired weighting structuring element( QWSE) is proposed based on the quantum theory to extract fault information of mechanical vibration signal.Firstly,after analyzing the system with multiple quantum bits,a method which is employed to map the quantum space to the real number space is presented and the calculation formula of the QWSE is obtained. …”
    Get full text
    Article
  12. 32
  13. 33

    Complexity of Computation of Dominating Sets in Geo-Mathmetics Algorithm : A Review by Şakir Işleyen

    Published 2021-02-01
    “…The dominant sets problem by testing whether γ (G) ≤ K of a given graph is G and K input; It is an electronic card NP machines decision problem in computational complexity theory. Infographics, powerful infographics plus graphic mapping. …”
    Get full text
    Article
  14. 34

    Reliability factors for steel elements designed on the basis of computer numerical models by V. V. Nadolski

    Published 2024-10-01
    “…The proposed method for determining reliability factors and their values are based on the methods of reliability theory and probability theory. Statistical characteristics of random variables and accuracy of the computer model are based on the systematization, analysis and generalization of existing studies.Results. …”
    Get full text
    Article
  15. 35
  16. 36
  17. 37

    Service migration optimization method for resource competition in mobile edge computing scenarios by WANG Haiyan, ZHANG Lin, LUO Jian

    Published 2024-08-01
    “…To tackle the problem of resource competition among service migrations caused by limited edge server resources in mobile edge computing (MEC) scenarios, a service migration optimization method for resource competition based on Lyapunov and game theory (OMRC-LG) was proposed. …”
    Get full text
    Article
  18. 38

    Generation of an optimal triangulated irregular network for topographic surface via optimal transport theory by Feng Li, Haihong Zhu, Wei Li, Chengcheng Liu, Jianfang Ma, Lin Li

    Published 2025-01-01
    “…This study proposed a novel curvature-based geodesic centroidal Voronoi tessellation method for generating a topographic triangulated irregular network (TIN) DEM based on optimal transport theory. This study is the first to present a globally optimized digital representation of the Earth’s surface with a predetermined number of vertices, which is crucial for computational feasibility. …”
    Get full text
    Article
  19. 39

    Multi-user channel estimation for uplink OFDMA systems based on the random-set theory by Yuan JING, Bin NIU, Ying-ying TAI

    Published 2012-01-01
    “…For the uplink OFDMA systems,a random-set theory based multi-user channel estimation algorithm was proposed.In the proposed algorithm,states of the users the multi-path channels were modeled and described by a finite random set.Then the Bayes filtering was utilized to formulate the problem of multi-user channel estimation.To obtain both the accepted channel estimation performance and low computational complexity,the Rao-Blackwellized particle filtering algorithm was applied to approximately solve this Bayes filtering problem with small number of particles.Simulation results show the effectiveness of the proposed algorithm.…”
    Get full text
    Article
  20. 40

    Free Vibration of Composite Cylindrical Shells Based on Third-Order Shear Deformation Theory by Muneerah Saad AL Nuwairan, Saira Javed

    Published 2021-01-01
    “…The focus of this study is to analyse the free vibration of cylindrical shells under third-order shear deformation theory (TSDT). The constitutive equations of the cylindrical shells are obtained using third-order shear deformation theory (TSDT). …”
    Get full text
    Article