-
1001
O imprescindível acesso à internet no campo: a capilarização da informação no Brasil e na França
Published 2024-06-01“…With the advent of the IoT, the pace of data growth and its speed have increased exponentially, requiring rural establishments and each production stage to be connected to telecommunications networks. …”
Get full text
Article -
1002
Perturbatively exact supersymmetric partition functions of ABJM theory on Seifert manifolds and holography
Published 2025-01-01“…Abstract We undertake a comprehensive analysis of the supersymmetric partition function of the U(N) k × U(N) −k ABJM theory on a U(1) fibration over a Riemann surface, evaluating it to all orders in the 1/N-perturbative expansion up to exponentially suppressed corrections. Through holographic duality, our perturbatively exact result is successfully matched with the regularized on-shell action of a dual Euclidean AdS4-Taub-Bolt background incorporating 4-derivative corrections, and also provides valuable insights into the logarithmic corrections that emerge from the 1-loop calculations in M-theory path integrals. …”
Get full text
Article -
1003
From blitzkrieg to blitzscaling: Assessing the impact of venture capital dynamics on military norms
Get full text
Article -
1004
Link quality prediction based on random forest
Published 2019-04-01“…Link quality prediction is vital to the upper layer protocol design of wireless sensor networks.Selecting high quality links with the help of link quality prediction mechanisms can improve data transmission reliability and network communication efficiency.The Gaussian mixture model algorithm based on unsupervised clustering was employed to divide the link quality level.Zero-phase component analysis (ZCA) whitening was applied to remove the correlation between samples.The mean and variance of signal to noise ratio,link quality indicator,and received signal strength indicator were taken as the estimation parameters of link quality,and a link quality estimation model was constructed by using a random forest classification algorithm.The random forest regression algorithm was used to build a link quality prediction model,which predicted the link quality level at the next moment.In different scenarios,comparing with exponentially weighted moving average,triangle metric,support vector regression and linear regression prediction models,the proposed prediction model has higher prediction accuracy.…”
Get full text
Article -
1005
Driving Gigs in Oman: Women and Techno-Fixes in the Platform Economy
Published 2025-01-01“…Digital platforms mediating work between customers and service providers have expanded exponentially in the past decade, driving a growing research agenda on the impact of platform capitalism, AI and the gig economy on labour around the world. …”
Get full text
Article -
1006
Trajectory differential privacy protection mechanism based on prediction and sliding window
Published 2020-04-01“…To address the issues of privacy budget and quality of service in trajectory differential privacy protection,a trajectory differential privacy mechanism integrating prediction disturbance was proposed.Firstly,Markov chain and exponential perturbation method were used to predict the location which satisfies the differential privacy and temporal and spatial security,and service similarity map was introduced to detect the availability of the location.If the prediction was successful,the prediction location was directly used to replace the location of differential disturbance,to reduce the privacy cost of continuous query and improve the quality of service.Based on this,the trajectory privacy budget allocation mechanism based on w sliding window was designed to ensure that any continuous w queries in the trajectory meet the ε-differential privacy and solve the trajectory privacy problem of continuous queries.In addition,a privacy customization strategy was designed based on the sensitivity map.By customizing the privacy sensitivity of semantic location,the privacy budget could be customized to improve its utilization.Finally,the validity of the scheme was verified by real data set experiment.The results illustrate that it offers the better privacy and quality of service.…”
Get full text
Article -
1007
Analysis of Heat Transfers inside Counterflow Plate Heat Exchanger Augmented by an Auxiliary Fluid Flow
Published 2014-01-01“…The maximum enhancement factors can be increased by above 8.0- and 5.0-fold for the step and exponential distributions of the pins, respectively. …”
Get full text
Article -
1008
Non-Gaussian Linear Mixing Models for Hyperspectral Images
Published 2012-01-01“…We propose one model based on the multivariate t-distribution and another one based on independent components following an exponential power distribution. The former model does not perform well in the context of the two images investigated in this paper, one AVIRIS and one HyMap image. …”
Get full text
Article -
1009
Fractional derivative in continuous-time Markov processes and applications to epidemics in networks
Published 2025-01-01“…We show that the same state probabilities also solve a system of equations that describe semi-Markov processes in which the sojourn times follow a Mittag-Leffler distribution, contrasting the usual Markov processes with exponentially distributed sojourn times. We apply the fractional framework to the ɛ-SIS epidemic process on any contact graph and we propose a microscopic epidemic description in which infection and curing events follow a Mittag-Leffler distribution and are not independent. …”
Get full text
Article -
1010
COVID-19: Malaysia's fight against this deadly virus
Published 2021-06-01“…The healthcare system in Malaysia is currently under heavy pressure to control the disease as the number of confirmed cases is rising exponentially. A National COVID-19 Immunization Program was launched in February 2021 in the hope of providing immunity to 80% of the population in Malaysia and achieve herd immunity. …”
Get full text
Article -
1011
Estimation of stationary and non-stationary moving average processes in the correlation domain.
Published 2025-01-01“…For online parameter estimation of non-stationary processes, a new recursive formula is introduced to update the sample autocorrelation function, integrating exponential forgetting of older samples to enable parameter adaptation. …”
Get full text
Article -
1012
Bibliometric Review of Research on International Students in Russia
Published 2023-03-01“…The findings indicate a present exponential growth in publications from 2015 in contrast to the slow start from 1999. …”
Get full text
Article -
1013
Constitutive Model of Recycled Aggregate Concrete for Channels Affected by Freeze-Thaw Damage
Published 2023-01-01“…The stress-strain constitutive relationship is an important research content of concrete materials.To reveal the mechanical damage law of recycled aggregate concrete under the effect of freeze-thaw cycles,this study builds a statistical model of mesoscopic damage to concrete on the basis of Weibull strength theory and compression experiment results of concrete.The results show that the damage to concrete under the uniaxial load is more significant under the action of the freeze-thaw cycle.As the number of freeze-thaw cycles increases from 0 to 120,the compressive strength and elastic modulus decrease exponentially,and the failure strain shows an upward trend.The Weibull strength theory is employed to construct the constitutive model of concrete damage considering the influences of freeze-thaw cycles,and by fitting,the shape parameter m and the scale parameter ε<sub>0</sub> are solved.In addition,the number of freeze-thaw cycles T is introduced to this model.The comparison of the measured stress-strain curve with the fitted results of the model verifies the rationality of the theoretical model.…”
Get full text
Article -
1014
Security analysis of public-key cryptosystems based on matrix action problem against quantum attack
Published 2023-03-01“…As a generalization of the discrete logarithm problem, semigroup action problem has important applications in the design of public-key cryptography.Public-key cryptosystems based on action problem of integer matrix semigroups on the direct product of commutative groups were analyzed.The matrix was regarded as the exponent of direct product elements, and this class of matrix action had the exponential rules similar to group.It was proved that if the matrix action was injective or the number of generators of the hidden subgroup was less than or equal to the square of the order of the matrix, the matrix action problem could be reduced in polynomial time to the hidden subgroup problem of the direct sum of the additive group of the matrices.And it was proved that commutative matrix action problem could also be reduced to hidden subgroup problem of the direct sum of the additive group of the matrices in polynomial time.The cryptosystems based on this class of matrix action problem cannot against quantum attacks.This conclusion has theoretical significance in the design of public-key cryptography against quantum attacks.…”
Get full text
Article -
1015
The Impact of Private Equity and Venture Capital Funds on post-IPO Operational and Financial Performance in Brazilian invested companies
Published 2019-01-01“…The PE/VC industry is characterized by the function of identifying companies with large return potentials and that grow arithmetically – due to capital constraints – to provide adequate and necessary sources of capital and experience for exponential growth. In this study, we used four measures that relate to companies’ financial policies and their persistence over time: i) cash & equivalents; ii) leverage; iii) Return on Assets (ROA); and iv) sales growth. …”
Get full text
Article -
1016
Error Modeling based on Screw Theory and Sensibility Analysis of Reconfigurable Robot
Published 2017-01-01“…For the static error about dimensions error and geometric parameters error of reconfigurable robot caused by the design and manufacture of modules and its configuration change,the static geometric parameters error of reconfigurable robot is treated as the structural error and transmission error of the joint,and is assumed to be the result of tiny screw motion,then an kinematic error model of robotic is built by using the products of exponentials formula. Based on the relationship between input error and output error of reconfigurable robot,an error sensitivity coefficient model is established. …”
Get full text
Article -
1017
A Robust Skewed Boxplot for Detecting Outliers in Rainfall Observations in Real-Time Flood Forecasting
Published 2019-01-01“…Three types of boxplot fences related to MC were analyzed and compared, and the exponential function boxplot fence was selected. Operating on uncontaminated as well as simulated contaminated data, the results showed that the proposed method could produce a lower swamping rate and higher accuracy than the standard boxplot and semi-interquartile range boxplot. …”
Get full text
Article -
1018
The Possibility or Impossibility of Stock Price Prediction: Evidence from the Petrochemical Industry
Published 2024-03-01“…In addition, the results of GARCH and exponential GARCH models showed that there is a positive relationship between risk and return for all seven companies. …”
Get full text
Article -
1019
Decoding gene expression dynamics in planktonic and biofilm cells of Streptococcus mutans: regulation and role of mutanofactin genes in biofilm formation
Published 2025-01-01“…Notably, expression of the muf gene cluster, was elevated in early exponential-phase cells relative to stationary-phase cells. …”
Get full text
Article -
1020
Orthoplastic surgery research: Three decades of growth and future directions
Published 2025-03-01“…The literature grew exponentially since 2010, with 66 % of identified studies published between 2020 and 2024. …”
Get full text
Article