Results 71 to 80 of about 8,500 (257)

Complexity calculation of coding and information security system based on threshold secret sharing scheme used for electronic voting

open access: yesAdvanced Engineering Research, 2017
Introduction . One of the tasks arising in cryptography is to ensure the safe and honest conduct of e-voting. This procedure provides that voters submit their votes electronically - for example, through electronic terminals.
Larisa V. Cherkesova   +3 more
doaj   +1 more source

Doubtful Receivables' Risk and Its Impact on Stock Returns

open access: yesJournal of Corporate Accounting &Finance, EarlyView.
ABSTRACT The current research proposes a previously unknown source of risk in relation to companies’ doubtful receivables. Higher relative doubtful receivables present a risk for companies' future cash flows. Hence, the article discusses an innovative risk measure associated with companies’ doubtful receivables.
Roi D. Taussig
wiley   +1 more source

Solvability of invariant systems of differential equations on H2$\mathbb {H}^2$ and beyond

open access: yesMathematische Nachrichten, EarlyView.
Abstract We show how the Fourier transform for distributional sections of vector bundles over symmetric spaces of non‐compact type G/K$G/K$ can be used for questions of solvability of systems of invariant differential equations in analogy to Hörmander's proof of the Ehrenpreis–Malgrange theorem.
Martin Olbrich, Guendalina Palmirotta
wiley   +1 more source

Vector bundles on bielliptic surfaces: Ulrich bundles and degree of irrationality

open access: yesMathematische Nachrichten, EarlyView.
Abstract This paper deals with two problems about vector bundles on bielliptic surfaces. The first is to give a classification of Ulrich bundles on such surfaces S$S$, which depends on the topological type of S$S$. In doing so, we study the weak Brill–Noether property for moduli spaces of sheaves with isotropic Mukai vector. Adapting an idea of Moretti
Edoardo Mason
wiley   +1 more source

Prescriptive unitarity

open access: yesJournal of High Energy Physics, 2017
We introduce a prescriptive approach to generalized unitarity, resulting in a strictly-diagonal basis of loop integrands with coefficients given by specifically-tailored residues in field theory.
Jacob L. Bourjaily   +2 more
doaj   +1 more source

Extending the hyper‐logistic model to the random setting: New theoretical results with real‐world applications

open access: yesMathematical Methods in the Applied Sciences, EarlyView.
We develop a full randomization of the classical hyper‐logistic growth model by obtaining closed‐form expressions for relevant quantities of interest, such as the first probability density function of its solution, the time until a given fixed population is reached, and the population at the inflection point.
Juan Carlos Cortés   +2 more
wiley   +1 more source

Feynman rules for the Standard Model Effective Field Theory in R ξ -gauges

open access: yesJournal of High Energy Physics, 2017
We assume that New Physics effects are parametrized within the Standard Model Effective Field Theory (SMEFT) written in a complete basis of gauge invariant operators up to dimension 6, commonly referred to as “Warsaw basis”.
A. Dedes   +4 more
doaj   +1 more source

Exponential Stability of Higher Order Fractional Neutral Stochastic Differential Equation Via Integral Contractors

open access: yesMathematical Methods in the Applied Sciences, Volume 48, Issue 6, Page 6425-6446, April 2025.
ABSTRACT The well‐posedness results for mild solutions to the fractional neutral stochastic differential system with Rosenblatt process with Hurst index Ĥ∈12,1$$ \hat{H}\in \left(\frac{1}{2},1\right) $$ is discussed in this article. To demonstrate the results, the concept of bounded integral contractors is combined with the stochastic result and ...
Dimplekumar N. Chalishajar   +3 more
wiley   +1 more source

A Geometric Interpretation for the Algebraic Properties of Second‐Order Ordinary Differential Equations

open access: yesMathematical Methods in the Applied Sciences, Volume 48, Issue 6, Page 6912-6917, April 2025.
ABSTRACT Nowadays, a substantial portion of investigations concerning the symmetry analysis of differential equations predominantly adhere to a framework comprising the following key procedures: (i) the derivation of symmetries, (ii) the determination of an optimal system, (iii) the utilization of these symmetries to construct invariants or ...
A. Paliathanasis   +2 more
wiley   +1 more source

A Systematic Approach for Solving the Great Circle Track Problems based on Vector Algebra

open access: yesPolish Maritime Research, 2016
A systematic approach, based on multiple products of the vector algebra (S-VA), is proposed to derive the spherical triangle formulae for solving the great circle track (GCT) problems.
Chen Chih-Li
doaj   +1 more source

Home - About - Disclaimer - Privacy