-
21
Adaptive Exponential Stabilization for a Class of Stochastic Nonholonomic Systems
Published 2013-01-01Get full text
Article -
22
Persistence and Nonpersistence of a Food Chain Model with Stochastic Perturbation
Published 2013-01-01Get full text
Article -
23
-
24
Research on linear solvability of network coding based cooperative recovery scheme
Published 2021-05-01“…The linear solvability of network coding based cooperative recovery/repair (CR) scheme was studied.Specifically, the solvability analysis model for network coding based CR scheme was established, the upper and lower bounds of the probability for any receiver to decode all original information under arbitrary order of Galois coding field were proposed and proved, and an on-line solvability judgement algorithm was designed by improvement of Gauss-Jordan algorithm.Numerical results validate the compactness of the proposed upper and lower bounds as well as the short-time decoding waiting delay of the improved Gauss-Jordan algorithm.Node deployment experiments show that the decoding complexity of the improved Gauss Jordan algorithm is reduced by 35% compared with the traditional Gauss algorithm.…”
Get full text
Article -
25
Multiparticle Localization at Low Energy for Multidimensional Continuous Anderson Models
Published 2020-01-01“…The proof based on the multiparticle multiscale analysis bounds needs the values of the external random potential to be independent and identically distributed, whose common probability distribution is at least Log-Hölder continuous.…”
Get full text
Article -
26
The local limit theorem for complex valued sequences: the parabolic case
Published 2024-11-01“…The remainders are estimated sharply with generalized Gaussian bounds. The result applies in probability theory for random walks as well as in numerical analysis for studying the large time behavior of numerical schemes.…”
Get full text
Article -
27
Economic Performance in Tanzania: Role of Investments and Financial Development
Published 2024-11-01“…Secondary data from the year 1997 to 2020 were used in the analysis. The analysis used bounds test for Autoregressive Distributed Lags (ARDL) Model and Error correction model due to existence of co-integrating equations among variables in the long run. …”
Get full text
Article -
28
Memory-corrected quantum repeaters with adaptive syndrome identification
Published 2025-01-01“…We address the challenge of incorporating encoded quantum memories into an exact secret key rate analysis for small and intermediate-scale quantum repeaters. …”
Get full text
Article -
29
The Significant Effects of Threshold Selection for Advancing Nitrogen Use Efficiency in Whole Genome of Bread Wheat
Published 2025-01-01“…The problem of multiple comparisons arises when a statistical analysis involves multiple simultaneous statistical tests, each of them has the potential to be a discovery. …”
Get full text
Article -
30
(ε,δ)-approximate Top-k query processing algorithm in wireless sensor networks
Published 2011-01-01“…A sampling based approximate Top-k algorithm was proposed that is adaptive for any data distribution.δ≥0 and 0≤δ<1 are respectively relative error bound and failure probability bound.The theoretical analysis demonstrates that for any δ≥0 and 0≤δ<1 the probability that the relative error bound of the results returned by this algorithm is larger than ε/(1+ε) is less than δ.So the proposed algorithm can reach arbitrary precision.Furthermore,an optimal sampling algorithm was proposed that supported the approximate Top-k query,and through the technique of data filtering the en-ergy consumption of communication was reduced.Theoretical analysis and simulation show that the proposed algorithm is efficient and consumes little energy.…”
Get full text
Article -
31
A Proposed Bearing Load Identification Method to Uncertain Rotor Systems
Published 2021-01-01“…The perturbation analysis method based on Taylor expansion is used to transform the problem of the bearing load identification involving in probability parameters into two kinds of certain inverse problem, namely, the bearing load identification combining the mean value of uncertain parameters with calculated transient response function and the sensitivity identification of bearing load to each probability parameter. …”
Get full text
Article -
32
Effect of Contact Preference among Heterogeneous Individuals on Social Contagions
Published 2022-01-01“…In addition, there is an optimal value or range of contact probability of homogeneous individuals which maximizes the spreading size, and the optimal value or lower bound of the optimal range decreases with the increase of transmission probability. …”
Get full text
Article -
33
Blind spectrum sensing based on goodness of fit test for cognitive radio in noise of uncertain power
Published 2011-11-01“…Based on t-distribution and Anderson-Darling test,the first,a method was proposed of spectrum sensing under assumptions that the noise variance was unknown and also the channel information was unknown.Indeed,the sensing was conducted based on Anderson-Darling distance between the distribution of ratio of sample’s mean to sample’s variance and the t-distribution.The second,another sensing method was proposed,under the same assumptions as the above,based on Anderson-Darling distance between the empirical characteristic function and a known characteristic function.The third,lower bounds on detection probabilities of sensings above were given for a flat,slow fading channel.Theoretical analysis and simulations show that the performances of proposed methods are much better than energy detector-based sensing with known noise variance,especially under an environment of a low signal to noise ration(SNR),or small number of samples.…”
Get full text
Article -
34
Multiperiod Telser’s Safety-First Portfolio Selection with Regime Switching
Published 2018-01-01“…Referring to Tchebycheff inequality, we modify Telser’s safety-first model to the case that aims to maximize the expected terminal wealth subject to a constraint where the upper bound of the disaster probability is less than the risk control level. …”
Get full text
Article -
35
Optimal Decisions and Pricing in Mail Service Systems Subject to Virus Attacks
Published 2020-01-01“…Correspondingly, we obtain a joint optimum value of scan rate and scan probability from the viewpoint of social welfare maximization and carry out a sensitivity analysis of the joint optimum value on some input parameters. …”
Get full text
Article -
36
Robust Evaluation for Transportation Network Capacity under Demand Uncertainty
Published 2017-01-01“…An effective heuristic approach utilizing cutting plane method and sensitivity analysis is proposed for the solution of the RRNC problem. …”
Get full text
Article -
37
On Erdős sums of almost primes
Published 2024-11-01“…We also give an alternate, probability-theoretic argument related to the Dickman distribution. …”
Get full text
Article -
38
Unsupervised data imputation with multiple importance sampling variational autoencoders
Published 2025-01-01“…We propose an efficient imputation algorithm that broadens the scope of Missing data Importance Weighted Auto-Encoder (MIWAE) by incorporating multiple proposal probability distributions and the resampling schema. …”
Get full text
Article -
39
Chemical Composition, Source Appointment and Health Risk of PM2.5 and PM2.5-10 during Forest and Peatland Fires in Riau, Indonesia
Published 2022-07-01“…Moreover, there were five primary PM2.5-10 sources, including VE (28.6%) and BB (24%), followed by IE (19.9%), SD (17.2%), and SA (15.3%). A conditional probability function (CPF) analysis revealed that the southeast sector dominated among source direction-dependent contributions. …”
Get full text
Article -
40
Integrated Remote Sensing and Geophysical Investigations of the Geodynamic Activities at Lake Magadi, Southern Kenyan Rift
Published 2012-01-01“…The observed faults extend from the surface to a depth of 7.5 km and are probably the ones that bound the graben laterally. …”
Get full text
Article