Results 31 to 40 of about 1,055,070 (317)
A Bayesian homogeneity test for comparing Poisson populations
Abstract For a wide class of daily applications in industrial quality control, there may be interest in comparing several Poisson means. A large catalogue of frequentist procedures for this hypothesis testing problem is available. However, some common drawbacks of them are their low power, interpretation of the p$$ p $$‐values for multiple comparison ...
Francisco Javier Girón+2 more
wiley +1 more source
ALGEBRAIC CRYPTANALYSIS ON NTRU-HPS AND NTRU-HRSS
NTRU is a lattice-based public-key cryptosystem designed by Hoffstein, Pipher, and Silverman in 1996. NTRU published on Algorithmic Number Theory Symposium (ANTS) in 1998.
Fadila Paradise, Kiki Ariyanti Sugeng
doaj +1 more source
We introduce a computer algorithm that incorporates the experience of battery researchers to extract information from experimental data reproducibly. This enables the fitting of complex models that take up to a few minutes to simulate. For validation, we process full‐cell GITT measurements to characterize the diffusivities of both electrodes non ...
Yannick Kuhn+3 more
wiley +1 more source
A Topological Perspective on Interacting Algebraic Theories [PDF]
Techniques from higher categories and higher-dimensional rewriting are becoming increasingly important for understanding the finer, computational properties of higher algebraic theories that arise, among other fields, in quantum computation.
Amar Hadzihasanovic
doaj +1 more source
Non-Archimedean volumes of metrized nef line bundles [PDF]
Let $L$ be a line bundle on a proper, geometrically reduced scheme $X$ over a non-trivially valued non-Archimedean field $K$. Roughly speaking, the non-Archimedean volume of a continuous metric on the Berkovich analytification of $L$ measures the ...
Sébastien Boucksom+2 more
doaj +1 more source
A characterization of half-factorial orders in algebraic number fields [PDF]
We give an algebraic characterization of half-factorial orders in algebraic number fields. This generalizes prior results for seminormal orders and for orders in quadratic number fields.
arxiv
On novel security systems based on the 2-cyclic refined integers and the foundations of 2-cyclic refined number theory [PDF]
Integers play a basic role in the structures of asymmetric crypto-algorithms. Many famous public key crypto-schemes use the basics of number theory to share keys and decrypt and encrypt messages and multimedia.
Mohammad Abobala+2 more
doaj +1 more source
Singular Moduli that are Algebraic Units [PDF]
We prove that only finitely many $j$-invariants of elliptic curves with complex multiplication are algebraic units. A rephrased and generalized version of this result resembles Siegel's Theorem on integral points of algebraic curves.
arxiv +1 more source
Measuring the gap between elicited and revealed risk for investors: An empirical study
Abstract Financial advisors use questionnaires and discussions with clients to determine investment goals, elicit risk preference and tolerance and establish a suitable portfolio allocation for different risk categories. Financial institutions assign risk ratings to their financial products.
John R. J. Thompson+4 more
wiley +1 more source
This paper considers the birth of algebraic proof by looking at the works of Cardano, Viète, Harriot and Pell. The transition from geometric to algebraic proof was mediated by appeals to the Eudoxan theory of proportions in book V of Euclid.
Brendan Larvor
doaj +1 more source