-
201
Redundancy-Reduction-Based Hierarchical Design in Synchronization of Multi-Agent Systems
Published 2023-02-01“…The approach could be separated into two main steps: the first is a method of network partition that reduces the trivial interaction, which does not affect the information traversal, and the second involves applying the time-dependent functional approach of Lyapunov to give global exponential conditions, under the criteria for the synchronization of multiple agents, with a lower conservatism of the decision variables compared to some other results, so that the information available could fully benefit from the actual discrete-time communication pattern. Both mathematical proofs and numerical example evidence are presented to demonstrate the effectiveness of the implemented approach. …”
Get full text
Article -
202
A heuristic solution to Fermat's last theorem
Published 2023-03-01“…As a result, many mathematical proofs have been generated for different values of n. …”
Get full text
Article -
203
Logic-Based Security Architecture for Systems Providing Multihop Communication
Published 2013-01-01“…The key advantage of LBSA is that it enables a security protocol to prove its correctness mathematically. Mathematical proofs provided by LBSA cover more cases that usually cannot be covered exhaustively by simulation tools. …”
Get full text
Article -
204
Solving Constraint-Satisfaction Problems with Distributed Neocortical-Like Neuronal Networks
Published 2019“…We show rules that embed any instance of the CSP's planar four-color graph coloring, maximum independent set, and sudoku on this substrate and provide mathematical proofs that guarantee these graph coloring problems will convergence to a solution. …”
Get full text
Get full text
Article -
205
Integer and Fractional-Order Sliding Mode Control Schemes in Wind Energy Conversion Systems: Comprehensive Review, Comparison, and Technical Insight
Published 2022-08-01“…This paper will provide insight for the researcher working in the WECS and will serve them in the selection and exploration of the most appropriate control schemes for quality wind power extraction. The concise mathematical proofs of the IOSMC, FOSMC and their variants will also serve the researchers in selecting the relevant sliding surfaces control laws for their research tasks. …”
Get full text
Article -
206
Toward Trusted IoT by General Proof-of-Work
Published 2022-12-01“…We reintroduce GPoW with more mathematic proofs so that PoPT can be optimal and describe how PoPT can be realized with simulation results, mining examples and synchronization scenario toward trusted IoT.…”
Get full text
Article -
207
Single-stage DNA splicing system via Yusof-Goode approach
Published 2015“…In addition, the characteristics of rule are investigated by providing mathematical proofs. Based on the characteristics of rule, some theorems and lemmas have been formulated to predict the number types of single-stage splicing language of Y-G splicing system. …”
Get full text
Thesis -
208
Impact of Unprepared Competence and Difficulty in Competence of Mathematics Teachers During Online Learning
Published 2022-10-01“…Teachers have no self-constructed modules, difficulty writing symbols and mathematical proofs online. Students provide an assessment of teacher competence online, from 100% of respondents 80% disagree with pedagogic and 90% disagree with professional competence. …”
Get full text
Article -
209
Inverse methods and integral-differential model demonstration for optimal mechanical operation of power plants – numerical graphical optimization for second generation of tribology...
Published 2018-07-01“…Then, the authors propose the development of programming optimization and mathematical proofs-algorithms of the integral-differential model for various models. …”
Get full text
Article -
210
Optimizations for Computing Relatedness in Biomedical Heterogeneous Information Networks: SemNet 2.0
Published 2022-03-01“…The unsupervised learning algorithm for rank aggregation (ULARA), which ranks concepts with respect to the user-specified target, was reconstructed using derived mathematical proofs of correctness and probabilistic performance guarantees for optimization. …”
Get full text
Article -
211
A privacy-preserving scheme with multi-level regulation compliance for blockchain
Published 2024-01-01“…In conclusion, the scheme demonstrates strong privacy by relying on mathematical proofs through zk-SNARKs to ensure security while comprehensively safeguarding content. …”
Get full text
Article -
212
TJET: Ternary Join-Exit-Tree Based Dynamic Key Management for Vehicle Platooning
Published 2017“…Moreover, we also analyze the capacities and activation conditions of join tree and exit tree based on strict mathematical proofs. Detailed security analysis show that our proposed TJET holds desirable security properties including forward security, backward security, and resistance to key control. …”
Get full text
Get full text
Journal Article -
213
Consistency of circuit lower bounds with bounded theories
Published 2020-06-01“…Motivated by this and related questions about the interaction between mathematical proofs and computations, we investigate circuit complexity from the perspective of logic. …”
Get full text
Article -
214
Assembly Sequence Planning for Rectangular Modular Robots with Accessibility Constraints
Published 2023-01-01“…Original implementation results and mathematical proofs for the three novel ASPs are also presented. …”
Get full text
Article -
215
New Security Proofs and Complexity Records for Advanced Encryption Standard
Published 2023-01-01“…For instance, the consensus on the security of AES is not based on formal mathematical proofs but on intensive cryptanalysis over its reduced rounds spanning several decades. …”
Get full text
Article -
216
DD-KARB: data-driven compliance to quality by rule based benchmarking
Published 2022-11-01“…In addition to the approaches such as formal methods, mathematical proofs, and logical evaluations, benchmarking can be used for compliance assessment. …”
Get full text
Article -
217
Game Theory-Based Authentication Framework to Secure Internet of Vehicles with Blockchain
Published 2022-07-01“…Formal and informal security analyses justify the framework’s credibility in more depth with mathematical proofs. A rigorous comparative study demonstrates that the suggested framework achieves greater security and functionality characteristics and provides lower transaction and computation overhead than many of the available solutions so far. …”
Get full text
Article -
218
The Accuracy of Computational Results from Wolfram Mathematica in the Context of Summation in Trigonometry
Published 2023-11-01“…It is clear that the problem can be solved using software; however, the nature of the result raises questions about its correctness, and this inherent informality can encourage a few students to seek viable mathematical proofs. In this way, a balance is reached between formal and informal mathematics.…”
Get full text
Article -
219
Transforming two-dimensional tensor networks into quantum circuits for supervised learning
Published 2024-01-01“…Specifically, we encode two-dimensional TNs into quantum circuits through rigorous mathematical proofs for constructing model ansätze, including string-bond states, entangled-plaquette states and isometric TN states. …”
Get full text
Article -
220
On Indeterminacy of Interval Multiplicative Pairwise Comparison Matrix
Published 2022-02-01“…In addition to mathematical proofs, we present experimental results of computer simulations to corroborate our argument. …”
Get full text
Article