-
61
Motivated by Design: A Codesign Study to Promote Challenging Misinformation on Social Media
Published 2024-01-01“…Our findings reveal four design considerations: creating secure and supportive environments, facilitating informed discussions through easy confrontation and access to reliable resources, leveraging recognition and social proof, and user support infrastructure. We also identified specific design elements with users, including indirection, semianonymity and privacy, simplicity, one-click challenging, easy access to reliable sources, recognition, displaying social proof, and platform support. …”
Get full text
Article -
62
Discrimination in a General Algebraic Setting
Published 2015-01-01“…As an application we provide a different proof of a theorem of Malcev on axiomatic classes of Ω-algebras.…”
Get full text
Article -
63
Multiplicity results for asymmetric boundary value problems with indefinite weights
Published 2004-01-01“…The proof is developed in the framework of topological methods and is based on some relations between rotation numbers and weighted eigenvalues.…”
Get full text
Article -
64
A Solution of the Complex Fuzzy Heat Equation in Terms of Complex Dirichlet Conditions Using a Modified Crank–Nicolson Method
Published 2023-01-01“…The researchers take advantage of the properties and benefits of CFS theory in the proposed numerical methods and subsequently provide a new proof of the stability under CFS theory. …”
Get full text
Article -
65
Global Analysis of a Discrete Nonlocal and Nonautonomous Fragmentation Dynamics Occurring in a Moving Process
Published 2013-01-01“…Our system involving transport and nonautonomous fragmentation processes, where in addition, new particles are spatially randomly distributed according to some probabilistic law, is investigated by means of forward propagators associated with evolution semigroup theory and perturbation theory. The full generator is considered as a perturbation of the pure nonautonomous fragmentation operator. …”
Get full text
Article -
66
A Group Identification Protocol with Leakage Resilience of Secret Sharing Scheme
Published 2020-01-01“…We prove that our scheme is a multiprover zero-knowledge proof system in the random oracle model, which shows that a passive adversary gains no information about the secret key. …”
Get full text
Article -
67
A convergent Deep Learning algorithm for approximation of polynomials
Published 2023-09-01“…Numerical tests illustrate the theory and show that stochastic gradient descent methods can be used with good accuracy for this problem.…”
Get full text
Article -
68
Existence of Positive Periodic Solutions for a Predator-Prey System of Holling Type IV Function Response with Mutual Interference and Impulsive Effects
Published 2015-01-01“…In addition, in the remark, we point out some minor errors which appeared in the proof of theorems in some published papers with relevant predator-prey models. …”
Get full text
Article -
69
Sliding-Mode Control of the Active Suspension System with the Dynamics of a Hydraulic Actuator
Published 2018-01-01“…Based on the proposed model, a sliding-mode control method is designed to control the active suspension system. Stability proof and analysis of the closed-loop system of the active suspension is given by using Lyapunov stability theory. …”
Get full text
Article -
70
Rings with a finite set of nonnilpotents
Published 1979-01-01“…Conversely, if R is a nil ring or a finite ring, then R is a θn-ring for some n. The proof of this theorem uses the structure theory of rings, beginning with the division ring case, followed by the primitive ring case, and then the semisimple ring case. …”
Get full text
Article -
71
-
72
On the System of Diophantine Equations x2-6y2=-5 and x=az2-b
Published 2014-01-01“…In this paper, we extend this result and put forward a generalized method which can completely solve the family of systems of Diophantine equations x2-6y2=-5 and x=az2-b for each pair of integral parameters a,b. The proof utilizes algebraic number theory and p-adic analysis which successfully avoid discussing the class number and factoring the ideals.…”
Get full text
Article -
73
El Greco's Italian paintings (1560-76) based on Bible texts
Published 2009-06-01“…Even during his years as an apprentice El Greco’s art is proof that he aspired to the highest humanly accessible values exemplified by Renaissance artistic theory, humanism and Christian spirituality — all of which later came to fruition in an unprecedented original combination in Toledo, Spain, where he settled permanently in 1577. …”
Get full text
Article -
74
New renormalization group study of the 3-state Potts model and related statistical models
Published 2025-02-01“…In particular, the phase transition of the 3-state Potts model in three dimensions is believed to be of the first order, without a definitive proof of absence of scale invariance in three-dimensional field theory with S3 symmetry. …”
Get full text
Article -
75
The product of r−k and ∇δ on ℝm
Published 2000-01-01“…In the theory of distributions, there is a general lack of definitions for products and powers of distributions. …”
Get full text
Article -
76
Test Purpose Oriented I/O Conformance Test Selection with Colored Petri Nets
Published 2014-01-01“…Based on conformance testing oriented CPN models for specifying software functional behaviors and specific test purposes, respectively, feasible test cases are generated, guided by the CPN based IOCO relation, using synchronized model simulation with the proof of the soundness of test generation and the coverage towards test purposes. …”
Get full text
Article -
77
Capital Structure, Investment Decision and Financial Performance of SMEs in Uganda A Case of Central Uganda
Published 2022“…The current study underwrites to academic research by providing empirical proof to support theories pertinent to the elucidation of financial performance. …”
Get full text
Article -
78
Event-Based Time Varying Formation Control for Multiple Quadrotor UAVs with Markovian Switching Topologies
Published 2018-01-01“…Instead of the general stochastic topology, the graph is governed by a set of Markov chains to the edges, which can recover the traditional Markovian switching topologies in line with the practical communication network. The stability proof for the state space origin of the overall closed-loop system is derived from the singular perturbation method and Lyapunov stability theory. …”
Get full text
Article -
79
New Analyses of Duopoly Game with Output Lower Limiters
Published 2013-01-01“…Within our model, we analyze how lower limiters have an effect on dynamics of output and give proof in theory why adding lower limiters can suppress chaos. …”
Get full text
Article -
80
A 5.5–7.5‐GHz band‐configurable wake‐up receiver fully integrated in 45‐nm RF‐SOI CMOS
Published 2022-10-01Get full text
Article