-
21
The electroweak effective field theory from on-shell amplitudes
Published 2020-01-01“…We supplement our bottom-up derivations with a matching of three- and fourpoint amplitude coefficients onto the standard-model effective field theory (SMEFT) in the broken electroweak phase. This establishes the correspondence with the usual Lagrangian approach and paves the way for SMEFT computations in the on-shell formalism.…”
Get full text
Article -
22
Efficient discrimination between real and complex quantum theories
Published 2025-01-01“…We improve the test to show the impossibility of a quantum theory based on real numbers by a larger ratio of complex-to-real bound on a Bell-type parameter. …”
Get full text
Article -
23
OPTIMIZATION PROBLEM FOR NUMBER OF LOGIC GATES NEEDED TO IMPLEMENT MULTIPLE BOOLEAN FUNCTIONS USING DECODER
Published 2024-12-01“…LEs group multiple input signals and process them using binary logic operators like AND or NOR. Purpose. Develop a computer program that, based on provided functions, will find a solution associated with approximately minimal number of logic gates. …”
Get full text
Article -
24
The Referenced Vertex Ordering Problem: Theory, Applications, and Solution Methods
Published 2021-08-01Get full text
Article -
25
A Danger-Theory-Based Immune Network Optimization Algorithm
Published 2013-01-01Get full text
Article -
26
Identification of gas outburst precursors based on outburst percolation theory
Published 2025-01-01“…A percolation factor a which can make a significant contribution to the research on premonitory information of gas outbursts is introduced to determine whether percolation occurs in coal rock, and supports the outburst percolation theory. It was found that percolation probability and correlation length increase with greater porosity, and that the number of pore clusters decreases as porosity increases. …”
Get full text
Article -
27
One Kind New Hybrid Power Mean and Its Computational Formulae
Published 2022-01-01Get full text
Article -
28
Game-Theory-Based Approach for Energy Routing in a Smart Grid Network
Published 2016-01-01Get full text
Article -
29
Botnets’ similarity analysis based on communication features and D-S evidence theory
Published 2011-01-01“…A potential hidden relationship may exist among different zombie groups.A method to analyze the relationship among botnets was proposed based on the communication activities.The method extracted several communication fea-tures of botnet,including the number of flows per hour,the number of packets per flow,the number of flows per IP and the packet payloads.It defined similarity statistical functions of the communication features,and built the analysis model of botnets relationship based on the advanced dempster-shafer(D-S) evidence theory to synthetically evaluate the simi-larities between different zombie groups.The experiments were conducted using several botnet traces.The results show that the method is valid and efficient,even in the case of encrypted botnet communication messages.Moreover,the ideal processing results is achieved by applying our method to analyze the data captured from the security monitoring platform of computer network,as well as compare with similar work.…”
Get full text
Article -
30
Caveats: Numerical Requirements in Graph Theory Based Quantitation of Tissue Architecture
Published 2000-01-01“…By these methods, neighborhood relations between a number of objects (e.g., cells) are explored and inherent to these methods are therefore certain requirements as to the number of objects to be included in the analysis. …”
Get full text
Article -
31
MECHANICAL STATE ANALYSIS USING QUANTUM THEORY AND MATHEMATICAL MORPHOLOGICAL FILTER
Published 2018-01-01“…Aiming at the erosion operator for the mathematical morphological filter( MMF),the quantum-inspired weighting structuring element( QWSE) is proposed based on the quantum theory to extract fault information of mechanical vibration signal.Firstly,after analyzing the system with multiple quantum bits,a method which is employed to map the quantum space to the real number space is presented and the calculation formula of the QWSE is obtained. …”
Get full text
Article -
32
Privacy-Preserving Continual Federated Clustering via Adaptive Resonance Theory
Published 2024-01-01Get full text
Article -
33
Complexity of Computation of Dominating Sets in Geo-Mathmetics Algorithm : A Review
Published 2021-02-01“…The dominant sets problem by testing whether γ (G) ≤ K of a given graph is G and K input; It is an electronic card NP machines decision problem in computational complexity theory. Infographics, powerful infographics plus graphic mapping. …”
Get full text
Article -
34
Reliability factors for steel elements designed on the basis of computer numerical models
Published 2024-10-01“…The proposed method for determining reliability factors and their values are based on the methods of reliability theory and probability theory. Statistical characteristics of random variables and accuracy of the computer model are based on the systematization, analysis and generalization of existing studies.Results. …”
Get full text
Article -
35
First-order phase transition of the Schwinger model with a quantum computer
Published 2025-01-01Get full text
Article -
36
Beyond detection rate: understanding the vigilance decrement using signal detection theory
Published 2025-01-01Get full text
Article -
37
Service migration optimization method for resource competition in mobile edge computing scenarios
Published 2024-08-01“…To tackle the problem of resource competition among service migrations caused by limited edge server resources in mobile edge computing (MEC) scenarios, a service migration optimization method for resource competition based on Lyapunov and game theory (OMRC-LG) was proposed. …”
Get full text
Article -
38
Generation of an optimal triangulated irregular network for topographic surface via optimal transport theory
Published 2025-01-01“…This study proposed a novel curvature-based geodesic centroidal Voronoi tessellation method for generating a topographic triangulated irregular network (TIN) DEM based on optimal transport theory. This study is the first to present a globally optimized digital representation of the Earth’s surface with a predetermined number of vertices, which is crucial for computational feasibility. …”
Get full text
Article -
39
Multi-user channel estimation for uplink OFDMA systems based on the random-set theory
Published 2012-01-01“…For the uplink OFDMA systems,a random-set theory based multi-user channel estimation algorithm was proposed.In the proposed algorithm,states of the users the multi-path channels were modeled and described by a finite random set.Then the Bayes filtering was utilized to formulate the problem of multi-user channel estimation.To obtain both the accepted channel estimation performance and low computational complexity,the Rao-Blackwellized particle filtering algorithm was applied to approximately solve this Bayes filtering problem with small number of particles.Simulation results show the effectiveness of the proposed algorithm.…”
Get full text
Article -
40
Free Vibration of Composite Cylindrical Shells Based on Third-Order Shear Deformation Theory
Published 2021-01-01“…The focus of this study is to analyse the free vibration of cylindrical shells under third-order shear deformation theory (TSDT). The constitutive equations of the cylindrical shells are obtained using third-order shear deformation theory (TSDT). …”
Get full text
Article