Suggested Topics within your search.
Showing 141 - 160 results of 236 for search 'computational number theory', query time: 0.08s Refine Results
  1. 141

    Multi-valued mappings on Pompeiu-Hausdorff fuzzy b-metric spaces and a common fixed point result by Noreddine Makran, Stojan N. Radenović

    Published 2025-01-01
    “…Unlike traditional logic theory, where an element either belongs to the set or does not, in fuzzy logic, the affiliation of the element to the set is expressed as a number from the interval [0, 1]. …”
    Get full text
    Article
  2. 142

    Topological Aspects of Molecular Networks: Crystal Cubic Carbons by Muhammad Javaid, Aqsa Sattar, Ebenezer Bonyah

    Published 2022-01-01
    “…In this paper, we compute the connection number-based TIs of the structure of crystal cubic carbons which are one of the most significant and interesting composites in modern resources of science due to the involvement of carbon atoms.…”
    Get full text
    Article
  3. 143

    Modular representations of Loewy length two by M. E. Charkani, S. Bouhamidi

    Published 2003-01-01
    “…We study modular representations using some new results of the theory of extensions of modules. More precisely, we describe the K[G]-modules M such that J2M=0 and give some properties and isomorphism invariants which allow us to compute the number of isomorphism classes of K[G]-modules M such that dimK(M)=μ(M)+1, where μ(M) is the minimum number of generators of the K[G]-module M. …”
    Get full text
    Article
  4. 144
  5. 145

    Survey of code-based digital signatures by Yongcheng SONG, Xinyi HUANG, Wei WU, Haixia CHEN

    Published 2021-08-01
    “…The rapid development of quantum computing theory and practice brings great uncertainty to the security of cryptography based on hard problems in number theory.Code-based hard problem is recognized as NP-complete problem, the complexity increases exponentially, and there is currently no threat of quantum computing to code-based cryptographic algorithm.Therefore, code-based algorithm can resist the quantum algorithm attack, which is one of the main directions of quantum-resistant cryptography.It is still an open problem to design secure and efficient code-based signatures.For many years, international researchers use classical and new methods to construct code-based signatures, but existing constructions are weak in security or poor in performance.Code-based signatures were comprehensively summarized and analyzed, and future research directions were indicated.…”
    Get full text
    Article
  6. 146

    A Mathematical Model for Nipah Virus Infection by Assefa Denekew Zewdie, Sunita Gakkhar

    Published 2020-01-01
    “…The model is analyzed, and the reproduction number is computed. It is established that the disease-free state is globally asymptotically stable when the reproduction number is less than unity and unstable if it is greater than unity. …”
    Get full text
    Article
  7. 147
  8. 148

    Comparative Study of Generalized Quantitative-Qualitative Inaccuracy Fuzzy Measures for Noiseless Coding Theorem and 1:1 Codes by H. D. Arora, Anjali Dhiman

    Published 2015-01-01
    “…The study of codes is introduced in Information Theory, electrical engineering, mathematics, and computer sciences for the transmission of data through reliable and efficient methods. …”
    Get full text
    Article
  9. 149

    The Use of the Direct Optimized Probabilistic Calculation Method in Design of Bolt Reinforcement for Underground and Mining Workings by Martin Krejsa, Petr Janas, Işık Yilmaz, Marian Marschalko, Tomas Bouchal

    Published 2013-01-01
    “…Using this theory, it is possible to apply probabilistic computations based on the probability theory and mathematic statistics. …”
    Get full text
    Article
  10. 150
  11. 151

    FastEEC: Fast evaluation of N-point energy correlators by Ankita Budhraja, Wouter J. Waalewijn

    Published 2025-02-01
    “…While N-point energy correlators are interesting to study for larger values of N, their evaluation is computationally intensive, scaling like MN/N!, where M is the number of particles. …”
    Get full text
    Article
  12. 152

    Performance characteristics of the fork-join queuing system by V. I. Klimenok

    Published 2023-09-01
    “…Methods of probability theory, queuing theory and matrix theory are used.Results. …”
    Get full text
    Article
  13. 153

    Parameter estimation in a structured erythropoiesis model by Azmy S. Ackleh, Jeremy J. Thibodeaux

    Published 2008-09-01
    “…We develop a numerical method for estimating parameters in astructured erythropoiesis model consisting of a nonlinear system ofpartial differential equations. Convergence theory for the computedparameters is provided. Numerical results for estimating the growthrate of precursor cells as a function of the erythropoietinconcentration and the decay rate of erythropoietin as a function ofthe total number of precursor cells from computationally generateddata are provided. …”
    Get full text
    Article
  14. 154

    Research of Dimension Chain Optimum Design Method of Gearbox based on Statistical Process Control by Huo Chunjing, Shan Hongbo, Zhao Yimin, Gao Lili, Zhang Bin, Liu Chunwang, Ge Kai

    Published 2018-01-01
    “…Based on the theory of dimension chain,the dimension chain compute with extremum method and probability method is researched. …”
    Get full text
    Article
  15. 155

    Analysis of load balance performance of multipath in wireless ad hoc networks by WANG Hui, YU Neng-hai

    Published 2005-01-01
    “…This model took the number of paths, the way of route selecting and the density of the network nodes into account and could analyse or compute the load in different network conditions. …”
    Get full text
    Article
  16. 156

    Stochastic differential equations to model influenza transmission with continuous and discrete-time Markov chains by Kazi Mehedi Mohammad, Md. Kamrujjaman

    Published 2025-01-01
    “…This study take account into the modeling, mathematical analysis, developing theories and numerical simulation of Influenza virus transmission together with stochastic behavior. …”
    Get full text
    Article
  17. 157
  18. 158

    APG mergence and topological potential optimization based heuristic user association strategy by Zhirui HU, Meihua BI, Fangmin XU, Meilin HE, Changliang ZHENG

    Published 2022-06-01
    “…Methods:The network scalable degree was designed as a measure of scalability,and then a user association strategy to improve network scalable degree was studied by using optimization theory. 1) For modelling the optimization problem, firstly, the network coupling degree, representing the degree of association among nodes, was constructed to establish the mathematical relationship between the network scalable degree and AP group (APG).Thus,the problem of improving the network scalable degree was modeled as the problem of minimizing the network coupling degree.Then,a multi-objective optimization problem of minimum network coupling degree and maximum user rate was established to find the balance between network scalable degree and network service quality. 2) For solving the optimization problem,to avoid the high computational complexity,a heuristic user association strategy based on APG mergence and topological potential optimization was proposed.With the proposed algorithm,the number of APG could be reduced by APG mergence,and the number of APG that AP belongs to could be reduced by AP exiting APG. …”
    Get full text
    Article
  19. 159
  20. 160

    A Hierarchical Procedure for the Synthesis of ANFIS Networks by Massimo Panella

    Published 2012-01-01
    “…It is based on a hierarchical constructive procedure, by which the number of rules is progressively increased and the optimal one is automatically determined on the basis of learning theory in order to maximize the generalization capability of the resulting ANFIS network. …”
    Get full text
    Article