-
141
Multi-valued mappings on Pompeiu-Hausdorff fuzzy b-metric spaces and a common fixed point result
Published 2025-01-01“…Unlike traditional logic theory, where an element either belongs to the set or does not, in fuzzy logic, the affiliation of the element to the set is expressed as a number from the interval [0, 1]. …”
Get full text
Article -
142
Topological Aspects of Molecular Networks: Crystal Cubic Carbons
Published 2022-01-01“…In this paper, we compute the connection number-based TIs of the structure of crystal cubic carbons which are one of the most significant and interesting composites in modern resources of science due to the involvement of carbon atoms.…”
Get full text
Article -
143
Modular representations of Loewy length two
Published 2003-01-01“…We study modular representations using some new results of the theory of extensions of modules. More precisely, we describe the K[G]-modules M such that J2M=0 and give some properties and isomorphism invariants which allow us to compute the number of isomorphism classes of K[G]-modules M such that dimK(M)=μ(M)+1, where μ(M) is the minimum number of generators of the K[G]-module M. …”
Get full text
Article -
144
Intelligent Topical Sentiment Analysis for the Classification of E-Learners and Their Topics of Interest
Published 2015-01-01Get full text
Article -
145
Survey of code-based digital signatures
Published 2021-08-01“…The rapid development of quantum computing theory and practice brings great uncertainty to the security of cryptography based on hard problems in number theory.Code-based hard problem is recognized as NP-complete problem, the complexity increases exponentially, and there is currently no threat of quantum computing to code-based cryptographic algorithm.Therefore, code-based algorithm can resist the quantum algorithm attack, which is one of the main directions of quantum-resistant cryptography.It is still an open problem to design secure and efficient code-based signatures.For many years, international researchers use classical and new methods to construct code-based signatures, but existing constructions are weak in security or poor in performance.Code-based signatures were comprehensively summarized and analyzed, and future research directions were indicated.…”
Get full text
Article -
146
A Mathematical Model for Nipah Virus Infection
Published 2020-01-01“…The model is analyzed, and the reproduction number is computed. It is established that the disease-free state is globally asymptotically stable when the reproduction number is less than unity and unstable if it is greater than unity. …”
Get full text
Article -
147
Equivalent Characterizations of Some Graph Problems by Covering-Based Rough Sets
Published 2013-01-01Get full text
Article -
148
Comparative Study of Generalized Quantitative-Qualitative Inaccuracy Fuzzy Measures for Noiseless Coding Theorem and 1:1 Codes
Published 2015-01-01“…The study of codes is introduced in Information Theory, electrical engineering, mathematics, and computer sciences for the transmission of data through reliable and efficient methods. …”
Get full text
Article -
149
The Use of the Direct Optimized Probabilistic Calculation Method in Design of Bolt Reinforcement for Underground and Mining Workings
Published 2013-01-01“…Using this theory, it is possible to apply probabilistic computations based on the probability theory and mathematic statistics. …”
Get full text
Article -
150
-
151
FastEEC: Fast evaluation of N-point energy correlators
Published 2025-02-01“…While N-point energy correlators are interesting to study for larger values of N, their evaluation is computationally intensive, scaling like MN/N!, where M is the number of particles. …”
Get full text
Article -
152
Performance characteristics of the fork-join queuing system
Published 2023-09-01“…Methods of probability theory, queuing theory and matrix theory are used.Results. …”
Get full text
Article -
153
Parameter estimation in a structured erythropoiesis model
Published 2008-09-01“…We develop a numerical method for estimating parameters in astructured erythropoiesis model consisting of a nonlinear system ofpartial differential equations. Convergence theory for the computedparameters is provided. Numerical results for estimating the growthrate of precursor cells as a function of the erythropoietinconcentration and the decay rate of erythropoietin as a function ofthe total number of precursor cells from computationally generateddata are provided. …”
Get full text
Article -
154
Research of Dimension Chain Optimum Design Method of Gearbox based on Statistical Process Control
Published 2018-01-01“…Based on the theory of dimension chain,the dimension chain compute with extremum method and probability method is researched. …”
Get full text
Article -
155
Analysis of load balance performance of multipath in wireless ad hoc networks
Published 2005-01-01“…This model took the number of paths, the way of route selecting and the density of the network nodes into account and could analyse or compute the load in different network conditions. …”
Get full text
Article -
156
Stochastic differential equations to model influenza transmission with continuous and discrete-time Markov chains
Published 2025-01-01“…This study take account into the modeling, mathematical analysis, developing theories and numerical simulation of Influenza virus transmission together with stochastic behavior. …”
Get full text
Article -
157
-
158
APG mergence and topological potential optimization based heuristic user association strategy
Published 2022-06-01“…Methods:The network scalable degree was designed as a measure of scalability,and then a user association strategy to improve network scalable degree was studied by using optimization theory. 1) For modelling the optimization problem, firstly, the network coupling degree, representing the degree of association among nodes, was constructed to establish the mathematical relationship between the network scalable degree and AP group (APG).Thus,the problem of improving the network scalable degree was modeled as the problem of minimizing the network coupling degree.Then,a multi-objective optimization problem of minimum network coupling degree and maximum user rate was established to find the balance between network scalable degree and network service quality. 2) For solving the optimization problem,to avoid the high computational complexity,a heuristic user association strategy based on APG mergence and topological potential optimization was proposed.With the proposed algorithm,the number of APG could be reduced by APG mergence,and the number of APG that AP belongs to could be reduced by AP exiting APG. …”
Get full text
Article -
159
A Real-Valued Negative Selection Algorithm Based on Grid for Anomaly Detection
Published 2013-01-01Get full text
Article -
160
A Hierarchical Procedure for the Synthesis of ANFIS Networks
Published 2012-01-01“…It is based on a hierarchical constructive procedure, by which the number of rules is progressively increased and the optimal one is automatically determined on the basis of learning theory in order to maximize the generalization capability of the resulting ANFIS network. …”
Get full text
Article