Results 101 to 110 of about 47,314 (210)
SINGULARITY OF RANDOM SYMMETRIC MATRICES—A COMBINATORIAL APPROACH TO IMPROVED BOUNDS
Let $M_{n}$ denote a random symmetric $n\times n$ matrix whose upper-diagonal entries are independent and identically distributed Bernoulli random variables (which take values $1$ and $-1$ with probability $1/2$ each). It is widely conjectured that $M_{n}
ASAF FERBER, VISHESH JAIN
doaj +1 more source
Multi‐Level Variable Selection Using a BART‐Enhanced Mixed‐Effects Framework
ABSTRACT Selecting important individual‐ and cluster‐level predictors has become increasingly critical in healthcare research, where data often exhibit hierarchical structures due to collection from multiple clusters. Mixed‐effects models, which account for within‐cluster correlation and between‐cluster heterogeneity, are a natural approach for ...
Keming Zhang +5 more
wiley +1 more source
In recent years, studying degenerate versions of various special polynomials and numbers has attracted many mathematicians. Here we introduce degenerate type 2 Bernoulli polynomials, fully degenerate type 2 Bernoulli polynomials, and degenerate type 2 ...
Dae San Kim +3 more
doaj +1 more source
A Note on Bernoulli Numbers and Shintani Generalized Bernoulli Polynomials [PDF]
Generalized Bernoulli polynomials were introduced by Shintani in 1976 in order to express the special values at non-positive integers of Dedekind zeta functions for totally real numbers. The coefficients of such polynomials are finite combinations of products of Bernoulli numbers which are difficult to get hold of. On the other hand, Zagier was able to
openaire +1 more source
PUMAA: Establishing a protocol for utilizing machine learning in forensic anthropological analyses
Abstract The use of machine learning (ML) models in forensic anthropology (FA) has increased in the last half decade; however, there is a lack of a standardized protocol on how to curate, use, and assess ML models. We introduce PUMAA (A Protocol for Utilizing Machine Learning in Forensic Anthropological Analyses), which includes a flowchart and a ...
Eman Faisal, Tracy L. Rogers
wiley +1 more source
On p-Bernoulli numbers and polynomials
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
openaire +2 more sources
Identification and Estimation of Large Network Games with Private Link Information
ABSTRACT We study the identification and estimation of large network games in which individuals choose continuous actions while holding private information about their links and payoffs. Extending the framework of Galeotti et al., we build a tractable empirical model of such network games and show that the parameters in individual payoffs are ...
Hülya Eraslan, Xun Tang
wiley +1 more source
Two-iterated degenerate Appell polynomials: properties and applications
In the development of hybrid special polynomials, it is essential to incorporate the monomiality principle, operational rules, and other related properties.
Shahid Ahmad Wani
doaj +1 more source
Congruences involving Bernoulli polynomials
The author proves congruences modulo \(p\), an odd prime, between values of Bernoulli polynomials \(B_n(x)\) and certain sums of Kronecker symbols \(({k\over p})\) or, alternatively, sums of binomial coefficients \(p\choose k\). He also proves similar congruences for Euler polynomials \(E_n(x)\).
openaire +2 more sources
Multiple Changepoint Detection for Non‐Gaussian Time Series
ABSTRACT This article combines methods from existing techniques to identify multiple changepoints in non‐Gaussian autocorrelated time series. A transformation is used to convert a Gaussian series into a non‐Gaussian series, enabling penalized likelihood methods to handle non‐Gaussian scenarios.
Robert Lund +3 more
wiley +1 more source

