-
41
Holmgren problem for Helmholtz equation with the three singular coefficients
Published 2019-12-01Get full text
Article -
42
Solutions of the system of dual matrix equation AXB=B=BXA in two partial orders
Published 2025-01-01“…The special case in which A=B is discussed and the properties of {1}−dual generalized inverse are used to verify the accuracy of the explicit solution of dual matrix equation BXB=B. Finally, the explicit formula for the unique minimum-norm solution is given. © 2024 The Authors…”
Get full text
Article -
43
Revisiting k: Time‐varying stream litter breakdown rates
Published 2025-08-01“…Considering alternative models could accelerate understanding and prediction of litter decomposition dynamics by enabling investigation of time‐explicit decomposition dynamics and more precise modeling when warranted.…”
Get full text
Article -
44
Three-party password authenticated key agreement protocol with user anonymity based on lattice
Published 2018-02-01“…With the rapid development of quantum theory and the existence of polynomial algorithm in quantum computation based on discrete logarithm problem and large integer decomposition problem,the security of the algorithm was seriously threatened.Therefore,two authentication key agreement protocols were proposed rely on ring-learning-with-error (RLWE) assumption including lattice-based implicit authentication key agreement scheme and lattice-based explicit authentication key agreement scheme and proved its security.The implicit authentication key agreement protocol is less to communicate and faster to authentication,the explicit authentication key agreement protocol is more to secure.At the same time,bidirectional authentication of users and servers can resist unpredictable online dictionary attacks.The new protocol has higher efficiency and shorter key length than other password authentication key agreement protocols.It can resist quantum attacks.Therefore,the protocol is efficient,secure,and suitable for large-scale network communication.…”
Get full text
Article -
45
Three-party password authenticated key agreement protocol with user anonymity based on lattice
Published 2018-02-01“…With the rapid development of quantum theory and the existence of polynomial algorithm in quantum computation based on discrete logarithm problem and large integer decomposition problem,the security of the algorithm was seriously threatened.Therefore,two authentication key agreement protocols were proposed rely on ring-learning-with-error (RLWE) assumption including lattice-based implicit authentication key agreement scheme and lattice-based explicit authentication key agreement scheme and proved its security.The implicit authentication key agreement protocol is less to communicate and faster to authentication,the explicit authentication key agreement protocol is more to secure.At the same time,bidirectional authentication of users and servers can resist unpredictable online dictionary attacks.The new protocol has higher efficiency and shorter key length than other password authentication key agreement protocols.It can resist quantum attacks.Therefore,the protocol is efficient,secure,and suitable for large-scale network communication.…”
Get full text
Article -
46
A new micro HATI second order preserving for transient dynamics
Published 2025-04-01“…The BLG method turns out to be second-order accurate when coupling second-order accurate time integrators from the Newmark family, gaining one order with respect to the GC method. Multi-time step explicit/implicit and explicit/explicit coupling with the BLG method are considered as the most interesting cases for promising applications in nonlinear structural dynamics with impacts and complex fluid–structure interaction problems.…”
Get full text
Article -
47
On Analytical Solution of Time-Fractional Biological Population Model by means of Generalized Integral Transform with Their Uniqueness and Convergence Analysis
Published 2022-01-01“…This research utilizes the generalized integral transform and the Adomian decomposition method to derive a fascinating explicit pattern for outcomes of the biological population model (BPM). …”
Get full text
Article -
48
Targeting mediating mechanisms of social disparities with an interventional effects framework, applied to the gender pay gap in Western Germany
Published 2025-02-01“…The Oaxaca-Blinder (OB) decomposition is a widely used method to explain social disparities. …”
Get full text
Article -
49
Two Numerical Methods for Solving the Schrödinger Parabolic and Pseudoparabolic Partial Differential Equations
Published 2022-01-01“…The modified double Laplace decomposition method is applied to get the semianalytic solutions and the explicit finite difference method to get the approximate solutions of the problems. …”
Get full text
Article -
50
A Characterization of Central BMO Space via the Commutator of Fractional Hardy Operator
Published 2020-01-01“…Precisely, by a more explicit decomposition of the operator and the kernel function, we will show that if the symbol function belongs to the central BMO ℝn space, then the commutator are bounded on Lebesgue space. …”
Get full text
Article -
51
Morlet Wavelets in Quantum Mechanics
Published 2012-11-01“…But to take full advantage of Morlet wavelets we need to supply an explicit form for the inverse Morlet transform and a manifestly covariant form for the four-dimensional Morlet wavelet. …”
Get full text
Article -
52
Spatial Inequality
Published 2025-03-01“…By examining various a-spatial and spatially explicit approaches, the paper highlights the complexities of measuring inequality across places and over time. …”
Get full text
Article -
53
Application of Optimal Homotopy Asymptotic Method to Burger Equations
Published 2013-01-01“…The results obtained by proposed method are compared to those of Adomian decomposition method (ADM) (Ismail et al., (2004)). As a result it is concluded that the method is explicit, effective, and simple to use.…”
Get full text
Article -
54
Optimal Modified Performance of MIMO Networked Control Systems With Packet Dropouts and Bandwidth Constraints
Published 2024-01-01“…By using frequency domain analysis and various decomposition methods, the explicit expression for optimal modified performance under NCSs stability is obtained. …”
Get full text
Article -
55
Computing the Normalized Laplacian Spectrum and Spanning Tree of the Strong Prism of Octagonal Network
Published 2022-01-01“…As applications of the obtained results, the explicit formulae of the degree-Kirchhoff index and the number of spanning trees for On2 are on the basis of the relationship between the roots and coefficients.…”
Get full text
Article -
56
String moduli spaces and parabolic factorizations
Published 2025-03-01“…Abstract The symmetric spaces that appear as moduli spaces in string theory and supergravity can be decomposed with explicit metrics using parabolic subgroups. The resulting isometry between the original moduli space and this decomposition can be used to find parametrizations of the moduli. …”
Get full text
Article -
57
Exponential networks for linear partitions
Published 2025-04-01“…In this note, we exhibit an explicit correspondence between torus fixed points of the Hilbert scheme of points on $\mathbb C^2\subset\mathbb C^3$ and anomaly free exponential networks attached to the quadratically framed pair of pants. …”
Get full text
Article -
58
Minimum-Energy Bivariate Wavelet Frame with Arbitrary Dilation Matrix
Published 2013-01-01“…Secondly, based on polyphase form of symbol functions of scaling function and wavelet function, two sufficient conditions and an explicit constructed method are given. Finally, the decomposition algorithm, reconstruction algorithm, and numerical examples are designed.…”
Get full text
Article -
59
Learning Rates for -Regularized Kernel Classifiers
Published 2013-01-01“…Our main purpose is to provide an explicit convergence rate for the excess misclassification error of the produced classifiers. …”
Get full text
Article -
60
Improving forest ecosystem functions by optimizing tree species spatial arrangement
Published 2025-07-01“…Therefore, we suggest the explicit consideration of spatial arrangements when planting trees for reforestation and afforestation projects.…”
Get full text
Article