Results 31 to 40 of about 11,536 (152)
The outbreak of coronavirus disease 2019 (COVID-19) has become a major problem facing humans all around the world. For governments, in order to deal with the outbreak and protect the population, it is important to predict the number of infectious cases ...
Rapin Sunthornwat, Sirikanlaya Sookkhee
doaj +1 more source
Some remarks on Chebyshev's inequality
Not available.
Josip E. Pečarić, Sever S. Dragomir
doaj +2 more sources
The Paouris inequality gives the large deviation estimate for Euclidean norms of log-concave vectors. We present a modified version of it and show how the new inequality may be applied to derive tail estimates of l_r-norms and suprema of norms of ...
C. Borell +6 more
core +1 more source
A highly accurate numerical method is given for the solution of boundary value problem of generalized Bagley‐Torvik (BgT) equation with Caputo derivative of order 0<β<2$$ 0<\beta <2 $$ by using the collocation‐shooting method (C‐SM). The collocation solution is constructed in the space Sm+1(1)$$ {S}_{m+1}^{(1)} $$ as piecewise polynomials of degree at ...
Suzan Cival Buranay +2 more
wiley +1 more source
A stochastic three-species food web model with Lévy jumps
For a stochastic three-species food web model with double parameters perturbation and Lévy jumps, we give the existence and uniqueness of global positive solution,which is beneficial to further study its dynamic properties. Then, by constructing Lyapunov
Xing JI, Guirong LIU
doaj +1 more source
Chebyshev's bias and generalized Riemann hypothesis [PDF]
It is well known that $li(x)>\pi(x)$ (i) up to the (very large) Skewes' number $x_1 \sim 1.40 \times 10^{316}$ \cite{Bays00}. But, according to a Littlewood's theorem, there exist infinitely many $x$ that violate the inequality, due to the specific ...
Alamadhi, Adel +2 more
core +2 more sources
Video tamper detection method based on nonnegative tensor factorization
The authenticity and integrity of video authentication is one of the important contents in information security field.A video tampering detection method based on non-negative tensor decomposition was proposed for video inter-frame tampering.First of all ...
Xue-li ZHANG,Tian-qiang HUANG,Wei HUANG +1 more
doaj +3 more sources
Sea-level rise, population growth, and changing land-use patterns will further constrain Florida’s already scarce groundwater and surface water supplies in the coming decades. Significant investments in water supply and water demand management are needed
Dat Tran, Tatiana Borisova, Kate Beggs
doaj +1 more source
Miners' Reward Elasticity and Stability of Competing Proof‐of‐Work Cryptocurrencies
ABSTRACT Proof‐of‐Work cryptocurrencies employ miners to sustain the system through algorithmic reward adjustments. We develop a stochastic model of the multicurrency mining and identify conditions for stable transaction speeds. Bitcoin's algorithm requires hash supply elasticity <$<$1 for stability, while ASERT remains stable for any elasticity and ...
Kohei Kawaguchi +2 more
wiley +1 more source
Some New Integral Inequalities via Strong Convexity
We prove some new refined inequalities by using strong convexity. Some refinements of the Chebyšhev’s inequality are considered.
Markos Fisseha Yimer
doaj +1 more source

