Results 61 to 70 of about 559,747 (351)

From Stability to Chaos: A Complete Classification of the Damped Klein‐Gordon Dynamics

open access: yesMathematical Methods in the Applied Sciences, EarlyView.
ABSTRACT We investigate the transition between stability and chaos in the damped Klein‐Gordon equation, a fundamental model for wave propagation and energy dissipation. Using semigroup methods and spectral criteria, we derive explicit thresholds that determine when the system exhibits asymptotic stability and when it displays strong chaotic dynamics ...
Carlos Lizama   +2 more
wiley   +1 more source

Pawlak Algebra and Approximate Structure on Fuzzy Lattice

open access: yesThe Scientific World Journal, 2014
The aim of this paper is to investigate the general approximation structure, weak approximation operators, and Pawlak algebra in the framework of fuzzy lattice, lattice topology, and auxiliary ordering.
Ying Zhuang   +3 more
doaj   +1 more source

Comparative Efficacy of Metabolic/Bariatric Surgery Versus GLP‐1 Receptor Agonists: A Network Meta‐Analysis of Randomized Controlled Trials

open access: yesObesity, EarlyView.
ABSTRACT Objective This study compared the efficacy of metabolic/bariatric surgery (MBS) and GLP‐1 receptor agonists (GLP‐1 RAs), including dual GLP‐1/GIP analogues, for weight and metabolic outcomes in adults with obesity. Methods A network meta‐analysis of randomized controlled trials compared MBS or GLP‐1 RAs versus lifestyle intervention in adults ...
Lucas Sabatella   +9 more
wiley   +1 more source

Open Extension Topology

open access: yesPracì Mìžnarodnogo Geometričnogo Centru, 2015
The paper contains the results which describe the properties of such general topological construction as open extension topology. In particular, we prove that this topology is not transitive. We find the base of the least cardinality for the topology and
Вячеслав Бабич   +1 more
doaj   +1 more source

Multiperson Decision-Making Using Consistent Interval-Valued Fuzzy Information with Application in Supplier Selection

open access: yesMathematics, 2023
This study describes a consistency-based approach for multiperson decision-making (MPDM) in which decision-makers’ suggestions are expressed as incomplete interval-valued fuzzy preference relations. The presented approach utilizes Lukasiewicz’s t-norm in
Xiaodong Yu   +4 more
doaj   +1 more source

An objective Bayesian method for including parameter uncertainty in ensemble model output statistics

open access: yesQuarterly Journal of the Royal Meteorological Society, EarlyView.
Conventional model output statistics and ensemble model output statistics methods for calibrating ensemble forecasts lead to severe underestimation of the probabilities of ensemble extremes (in blue). This is because they ignore statistical parameter uncertainty.
Stephen Jewson   +4 more
wiley   +1 more source

High Performance Methods for Linked Open Data Connectivity Analytics

open access: yesInformation, 2018
The main objective of Linked Data is linking and integration, and a major step for evaluating whether this target has been reached, is to find all the connections among the Linked Open Data (LOD) Cloud datasets.
Michalis Mountantonakis   +1 more
doaj   +1 more source

Complete Axiomatizations of Fragments of Monadic Second-Order Logic on Finite Trees [PDF]

open access: yesLogical Methods in Computer Science, 2012
We consider a specific class of tree structures that can represent basic structures in linguistics and computer science such as XML documents, parse trees, and treebanks, namely, finite node-labeled sibling-ordered trees.
Amélie Gheerbrant, Balder ten Cate
doaj   +1 more source

“There Are Places Full of Beauty”: Desettling High School Students' Scientific Writing

open access: yesScience Education, EarlyView.
ABSTRACT This study contributes to desettling and expanding expectations about the forms of scientific language that belong in students' scientific writing. The primary empirical focus is the analysis of 52 high school student abstracts articulating community‐based investigations, submitted as part of their participation in a student conference in a ...
Alejandra Frausto Aceves
wiley   +1 more source

ID-based transitive signature schemes without random oracle

open access: yesTongxin xuebao, 2010
Based on waters’ signature scheme,the first identity-based transitive signature scheme was proposed and proved secure against attacks in the standard model.Compared with current transitive signature schemes,the unforgeability of the signature’s ...
MA Xiao-long1   +4 more
doaj   +2 more sources

Home - About - Disclaimer - Privacy