Showing 161 - 180 results of 281 for search '"Mathematical analysis"', query time: 0.08s Refine Results
  1. 161

    An Analysis of the Cluster-Detecting Property of the BCM Neuron by Lawrence Udeigwe

    Published 2024-01-01
    “…By exploring the qualitative behaviors of an underlying system of differential equations, we present a rigorous mathematical analysis of this cluster-detecting property. …”
    Get full text
    Article
  2. 162

    Modeling the effects of carriers on transmission dynamics of infectious diseases by Darja Kalajdzievska, Michael Yi Li

    Published 2011-05-01
    “…An $S$-$I_c$-$I$-$R$ epidemic model is investigated for infectious diseases that can be transmitted through carriers, infected individualswho are contagious but do not show any disease symptoms. Mathematical analysis is carried out that completely determines the globaldynamics of the model. …”
    Get full text
    Article
  3. 163
  4. 164

    Throughput Analysis for a High-Performance FPGA-Accelerated Real-Time Search Application by Wim Vanderbauwhede, S. R. Chalamalasetti, M. Margala

    Published 2012-01-01
    “…The application matches terms in a stream of documents against a static profile, held in off-chip memory. We present a mathematical analysis of the throughput of the application and apply it to the problem of scaling the Bloom filter used to discard nonmatches.…”
    Get full text
    Article
  5. 165
  6. 166

    Bifurcation analysis of HIV-1 infection model with cell-to-cell transmission and immune response delay by Jinhu Xu, Yicang Zhou

    Published 2015-11-01
    “…A within-host viral infection model with both virus-to-cell and cell-to-cell transmissions and time delay in immune response is investigated. Mathematical analysis shows that delay may destabilize the infected steady state and lead to Hopf bifurcation. …”
    Get full text
    Article
  7. 167
  8. 168

    A New Simultaneous Identification of the Harmonic Excitations and Nonlinear Damping of Forced Damped Nonlinear Oscillations: A Parametric Approach by T. S. Jang

    Published 2013-01-01
    “…In addition to the mathematical analysis, a numerical example involving a highly nonlinear system is examined for demonstrating the workability of the proposed method for simultaneously identifying both the two aforementioned excitations and nonlinear damping.…”
    Get full text
    Article
  9. 169

    Finite Integral Formulas Involving Multivariable Aleph-Functions by Hagos Tadesse, D. L. Suthar, Minilik Ayalew

    Published 2019-01-01
    “…The main results of our paper are quite general in nature and competent at yielding a very large number of integrals involving polynomials and various special functions occurring in the problem of mathematical analysis and mathematical physics.…”
    Get full text
    Article
  10. 170
  11. 171
  12. 172

    Chaotic sequence based polar code encrypted scheme in negative secrecy capacity case by Xiaohui ZHANG, Shunliang ZHANG, Bowen LI

    Published 2020-10-01
    “…A chaos based encrypted polar coding scheme,which could be applied to the negative secrecy capacity case,was proposed.Chaotic sequences were employed to encrypt the information bits and fill the frozen bits.And multi-block polar coding structure was also employed in the proposed scheme.The proposed scheme was featured as lower complexity and higher secrecy transmission rate.Corresponding mathematical analysis had been performed in terms of the error probability,security and transmission rate.The result reveals that the proposed scheme can achieve reliability,security in negative secrecy capacity case.What’s more,it has relatively low complexity and high secrecy transmission rate compared with the existing schemes.…”
    Get full text
    Article
  13. 173

    Letter to the editors by Shigui Ruan

    Published 2008-11-01
    “…A multiregional compartmentalmodel was proposed, mathematically analyzed, and numericallysimulated to study how SARS spread out from Guangdong, China.The article consists of six sections: (1) an introduction, (2) abackground section on medical geography theory, (3) themathematical model, (4) mathematical analysis and results, (5)numerical simulations, and (6) discussion. …”
    Get full text
    Article
  14. 174

    Integral fault analysis of the ARIA cipher by Yu SHEN, Wei LI, Dawu GU, Yixin WU, Shan CAO, Ya LIU, Zhiqiang LIU, Zhihong ZHOU

    Published 2019-02-01
    “…ARIA is a Korean standard block cipher,which is flexible to provide security for software and hardware implementation.Since its introduction,some research of fault analysis is devoted to attacking the last two rounds of ARIA.It is an open problem to know whether provoking faults at some former rounds of ARIA allowed recovering the secret key.An answer was given to solve this problem by showing a novel integral differential fault analysis on two rounds earlier of ARIA.The mathematical analysis and simulating experiments show that the attack can successfully recover its secret key by fault injections.The results in this study describe that the integral fault analysis is a strong threaten to the security of ARIA.The results are beneficial to the analysis of the same type of other block ciphers.…”
    Get full text
    Article
  15. 175

    Research on protection technology for location privacy in VANET by Jian-ming ZHANG, Yu-juan ZHAO, Hao-bin JIANG, Xue-dan JIA, Liang-min WANG

    Published 2012-08-01
    “…Location-based services in VANET solved the problem of road safety,and provided the convenient services to drivers and passengers.But it also brought new problems of privacy protection.The content of privacy protection was analyzed,and put emphasis on two kinds of privacy protection technology based on pseudonyms and signature respectively.Pseudonym-based schemes were classified as special-area based,silence-period,cryptographic mix-zones and mix-zones communication proxy based schemes.Signature-based schemes were also divided into two classes:group-signature and ring-signature.The evaluation methods for privacy protection level were surveyed,in which anonymity set,entropy metric,mathematical analysis theory and formal analysis were discussed and compared.…”
    Get full text
    Article
  16. 176

    Series and Connections Among Central Factorial Numbers, Stirling Numbers, Inverse of Vandermonde Matrix, and Normalized Remainders of Maclaurin Series Expansions <sup>†</sup> by Feng Qi

    Published 2025-01-01
    “…This paper presents an extensive investigation into several interrelated topics in mathematical analysis and number theory. The author revisits and builds upon known results regarding the Maclaurin power series expansions for a variety of functions and their normalized remainders, explores connections among central factorial numbers, the Stirling numbers, and specific matrix inverses, and derives several closed-form formulas and inequalities. …”
    Get full text
    Article
  17. 177

    Evaluation of Heat Irreversibility in a Thin Film Flow of Couple Stress Fluid on a Moving Belt by Samuel O. Adesanya, Ramosheuw S. Lebelo, K. C. Moloi

    Published 2018-01-01
    “…This article addresses the inherent heat irreversibility in the flow of a couple stress thin film along a moving vertical belt subjected to free and adiabatic surface. Mathematical analysis for the fluid-governing-equations is performed in detail. …”
    Get full text
    Article
  18. 178

    Multi-antenna diversity receiving scheme for mobile communication system in high-speed railway by Wan-tuan LUO, ANGXu-ming F, Meng CHENG, Ya-jun ZHAO

    Published 2014-06-01
    “…Under the signal model of differential modulation and demodulation, two multi-antenna diversity receptions (linear combiner and statistic combiner) were proposed, and then the effective diversity reception scheme of train-to-ground wireless broadband communication for high-speed railway scenarios was concluded. Mathematical analysis and simulation results indicate that by increasing the diversity number, the proposals can reduce the error floor because of high mobility. …”
    Get full text
    Article
  19. 179

    Cusped and Smooth Solitons for the Generalized Camassa-Holm Equation on the Nonzero Constant Pedestal by Dong Li, Yongan Xie, Shengqiang Tang

    Published 2014-01-01
    “…Our procedure shows that the generalized Camassa-Holm equation with nonzero constant boundary has cusped and smooth soliton solutions. Mathematical analysis and numerical simulations are provided for these traveling soliton solutions of the generalized Camassa-Holm equation. …”
    Get full text
    Article
  20. 180

    Analysis of Wave Solutions of an Adhenovirus-Tumor Cell System by Baba Issa Camara, Houda Mokrani

    Published 2012-01-01
    “…We discuss biological background and mathematical analysis of glioma gene therapy for contributing to cancer treatment. …”
    Get full text
    Article