Results 101 to 110 of about 16,329 (217)
ABSTRACT Malware detection poses a critical challenge for both society and Business and Industry (B&I), particularly given the necessity for secure digital transformation. Among various cybersecurity threats, ransomware has emerged as especially disruptive, capable of halting operations, interrupting business continuity, and causing significant ...
Danilo Bruschi +3 more
wiley +1 more source
ABSTRACT Performing frequency sweep analysis for acoustic performance prediction using the boundary element method (BEM) is associated with high computational costs as the associated system matrices are dense and frequency‐dependent. While model order reduction (MOR) techniques, such as Krylov subspace recycling, have been proposed for direct BEM ...
Philip Le +2 more
wiley +1 more source
Accuracy of Numerical Solution to Dynamic Programming Models [PDF]
Dynamic programming models with continuous state and control variables are solved approximately using numerical methods in most applications. We develop a method for measuring the accuracy of numerical solution of stochastic dynamic programming models ...
King, Robert P., Lohano, Heman D.
core +1 more source
The Bernstein Constant and Polynomial Interpolation at the Chebyshev Nodes
By giving explicit upper bounds, the author shows that the Bernstein constants \[ B_{\lambda,p} := \lim_{n\to\infty} n^{\lambda+1/p} \inf_{c_k} \Biggl\| | x| ^\lambda - \sum^n_{k=0} c_k x^k\Biggl\|_{L_p[-1,1]} \] are finite for all \(\lambda > 0\) and \(p\in (1/3,\infty)\). For \(p = 1\), the upper bounds turn out to be sharp.
openaire +2 more sources
A novel approach for solving weakly singular fractional integro-differential equations
In this essay, we introduce a novel idea to tackle the challenges of fractional integro-differential equations (FIDEs) featuring weakly singular kernels (WSKs). New idea leverages B-splines for solving such equations, offering a robust numerical solution
Ali Jalal Ali +2 more
doaj +1 more source
Context-Aware Gossip-Based Protocol for Internet of Things Applications
This paper proposes a gossip-based protocol that utilises a multi-factor weighting function (MFWF) that takes several parameters into account: residual energy, Chebyshev distances to neighbouring nodes and the sink node, node density, and message ...
Lina Altoaimy +5 more
doaj +1 more source
Chebyshev-Type Quadrature Formulas for New Weight Classes
We give Chebyshev-type quadrature formulas for certain new weight classes. These formulas are of highest possible degree when the number of nodes is a power of 2. We also describe the nodes in a constructive way, which is important for applications.
Vagharshakyan, Armen
core
A ZigBee network anonymous authentication scheme based on Chebyshev chaotic mapping and CRT
A ZigBee network anonymous authentication scheme based on Chebyshev chaotic mapping and Chinese remainder theorem (CRT) was proposed to solve the problems such as the incomplete reliability of ZigBee network trust center and the lack of identity ...
Wei LIAO +4 more
doaj +2 more sources
Our goal in this work is to solve the fractional Bratu equation, where the fractional derivative is of the Caputo type. As we know, the nonlinearity and derivative of the fractional type are two challenging subjects in solving various equations.
Haifa Bin Jebreen +1 more
doaj +1 more source
A unifying theory for multivariate polynomial interpolation on general Lissajous-Chebyshev nodes [PDF]
Peter Dencker, Wolfgang Erb
openalex +1 more source

