Academia.eduAcademia.edu

Mathematics

1,383,413 papers
2,073,387 followers
AI Powered
Mathematics is the abstract science of number, quantity, and space, either as abstract concepts (pure mathematics), or as applied to other disciplines such as physics and engineering (applied mathematics). It involves the study of patterns, structures, and relationships through logical reasoning and quantitative analysis.
The objective of this paper is to present the properties and potentials of Gumbel Power function (GuPF) distribution to rainfall and wind speed datasets using the T-X methodology. The density and hazard rate function of the GuPF... more
The purposes of the present study were to (1) investigate the effects of the arm movement and initial knee joint angle employed in standing long jump by the ground reaction force analysis and three-dimensional motion analysis; and (2)... more
Recently, there are more people jogging with a treadmill at the gym or the home setting. The main available selected modes for treadmill jogging are speed and slope of incline. Increased speeds and incline slopes will not only increase... more
Pelbagai usaha melibatkan inovasi dan teknologi berkaitan teknik penanaman dan pengeluaran hasil telah diberi penekanan oleh organisasi yang terlibat dalam penanaman kelapa sawit. Usaha ini bertujuan untuk menjamin kesejahteraan pekebun... more
No. Alumni Universitas HENDRI WAHYUDI No. Alumni Fakultas BIODATA a)Tempat / tanggal lahir: Bukittinggi / 20 Januari 1987 b) Nama orang tua:H.Hirwandi c) Fakultas : Ekonomi d) Jurusan : Manajemen e) No. Bp :0910525170 f) Tanggal Lulus :... more
E-Government merupakan suatu upaya untuk memanfaatkan teknologi informasi dan komunikasi yang dimaksudkan untuk meningkatkan efisiensi, efektivitas, transparansi dan akuntabilitas penyelenggaraan pemerintah dan pelayanan publik.... more
In recent years P. C. Hammer's problem of determining a convex body from its 'X-ray pictures' was investigated by Gardner and McMullen [4], Gardner [3], Falconer and Volcic . An earlier result is due to Giering . An X-ray picture of a... more
Flexibility in shape and scale of Burr XII distribution can make close approximation of numerous well-known probability density functions. Due to these capabilities, the usages of Burr XII distribution are applied in risk analysis,... more
En este artículo se presenta el diseño, construcción y funcionamiento de un dispositivo móvil de detección de gases o Nariz electrónica, con capacidad de ser controlado y monitoreado en tiempo real de manera remota vía WiFi. En primer... more
International Journal of Psychology and Psychological Therapy Universidad de Almería (España) riptp@ual.es ISSN (Versión impresa): 1577-7057 ESPAÑA ... 2002 Cristobal Bohórquez / Andrés García / María Teresa Gutiérrez / Jesús Gómez /... more
BACKGROUND From 2019, science students at the University of Sydney will be required to have high school mathematics. Our research has highlighted biology students lack confidence in mathematics (e.g. Quinnell & Wong, 2007; Quinnell,... more
Several regularization terms, some of them widely applied to neural networks, such as weight decay and weight elimination, and some others new, are tested when applied to networks with a small number of connections handling continuous... more
RESUMO. O objetivo deste trabalho foi avaliar o desempenho de duas semeadorasadubadoras oferecidas comercialmente para plantio direto. Os ensaios foram realizados no Sítio Cazarotto, localizado no Distrito de Iguatemi, município de... more
Given a random RNA secondary structure, S, we study RNA sequences having fixed ratios of nucleotides that are compatible with S. We perform this analysis for RNA secondary structures subject to various base-pairing rules and minimum arc-... more
Given an alphabet Σ, a (directed) graph G whose edges are weighted and Σ-labeled, and a formal language L ⊆ Σ * , the formal-language-constrained shortest/simple path problem consists of finding a shortest (simple) path p in G complying... more
We study a class of discrete dynamical systems that is motivated by the generic structure of simulations. The systems consist of the following data: (a) a ®nite graph Y with vertex set f1Y F F F Y ng where each vertex has a binary state,... more
Knowledge of fundamental traffic flow characteristics of traffic simulation models is an essential requirement when using these models for the planning, design, and operation of transportation systems. In this paper we discuss the... more
We present an asymptotically optimal reduction of one-outof-two String Oblivious Transfer to one-out-of-two Bit Oblivious Transfer using Interactive Hashing in conjunction with Privacy Amplification. Interactive Hashing is used in an... more
Quantum 2-party cryptography differs from its classical counterpart in at least one important way: Given blak-box access to a perfect commitment scheme there exists a secure 1-2 quantum oblivious transfer. This reduction proposed by... more
Noisy channels are a valuable resource from a cryptographic point of view. They can be used for exchanging secret-keys as well as realizing other cryptographic primitives such as commitment and oblivious transfer. To be really useful,... more
The Wire-Tap Channel of Wyner shows that a Binary Symmetric Channel may be used as a basis for exchanging a secret key, in a crypt,ographic scenario of two honest people facing an eavesdropper. Later CrCpeau and Kilian showed how a BSC... more
Assume A owns two secret k-bit strings. She is willing to disclose one of them to B , at his choosing, provided he does not learn anything about the other string. Conversely, B does not want A to learn which secret he chose to learn. A... more
The foundation of zero-knowledge is the simulator : a weak machine capable of pretending to be a weak verifier talking with allpowerful provers. To achieve this, simulators need some kind of advantage such as the knowledge of a trapdoor.... more
In multi-prover interactive proofs (MIPs), the verifier is usually non-adaptive. This stems from an implicit problem which we call "contamination" by the verifier. We make explicit the verifier contamination problem, and identify a... more
Secure multi-party computing, also called secure function evaluation, has been extensively studied in classical cryptography. We consider the extension of this task to computation with quantum inputs and circuits. Our protocols are... more
Iu their 1985 paper, Goldwasser, Micah and Rackoff set forth the notion of zeroknowledge interactive proofs [GMRl]. This seminal paper generated considerable activity around the world. In the span of a few years, a substantial number of... more
We coiisider a situation where two parties, Alice and Bob, share a common secret string arid would like to mutually check their knowledge of that string. We describe a simple and efficient protocol based on the exchange of quantum... more
external quick sort, the middle group M is made as large as possible through the use of a DEPQ. The external quick sort strategy is:
In this paper, we consider the problem of selecting an implementation of each circuit module from a cell library so as to satisfy overall delay and area (or delay and power) requirements. Two versions of the circuit implementation... more
O(k log N) algonthms are obtained to permute and sort N data items on cube and perfect shuffle computers with N 1+1/k processing elements, 1 __<_ k -< log N These algorithms lead directly to a generahzedconnecuon-network construction... more
Absrracr-This paper extends the polynominal time algorithm obtained in [7] to find a minimal cardinality path set that long covers each lead or gate input of a digital logic circuit. The extension of this paper allows one to find, in... more
La presente investigacion tuvo por objetivo identificar los factores que influyen en la produccion del platano (Musa AAB) en el Ecuador periodo 2014-2016, se estudio variables agronomicas generales consideradas en la Encuesta de... more
Background: Within the structural and grammatical bounds of a common language, all authors develop their own distinctive writing styles. Whether the relative occurrence of common words can be measured to produce accurate models of... more
This paper contains a survey of main results in the theory of invariant subspaces that have a direct or intermediate connection with the well-known list of problems in operator theory posed by Halmos in 1970. For most results we present... more
Many phenomena are complex and therefore difficult to measure and to evaluate. Research, in the last years, has been focusing on the development and use of a system of Composite Indicators in order to obtain a global description of a... more
Composite indicators (CIs), in the social sciences, are used more and more for measuring very complex phenomena as the poverty, the progress and the well-being. Using an approach Model Based in to build CIs, instead of an approach Data... more
Partial least squares path modeling presents some inconsistencies in terms of coherence with the predictive directions specified in the inner model (i.e. the path directions), because the directions of the links in the inner model are not... more
The Vassiliev conjecture states that the Vassiliev invariants are dense in the space of all numerical link invariants in the sense that any link invariant is a pointwise limit of Vassiliev invariants. In this article, we prove that the... more
Khovanov homology for knots has generated a flurry of activity in the topology community. This paper studies the Khovanov type cohomology for graphs with a special attention to torsions. When the underlying algebra is Z[x]/(x 2), we... more
Khovanov homology for knots has generated a flurry of activity in the topology community. This paper studies the Khovanov type cohomology for graphs with a special attention to torsion. When the underlying algebra is Z[x]/(x 2), we... more
The Vassiliev conjecture states that the Vassiliev invariants are dense in the space of all numerical link invariants in the sense that any link invariant is a pointwise limit of Vassiliev invariants. In this article, we prove that the... more
Khovanov homology for knots has generated a flurry of activity in the topology community. This paper studies the Khovanov type cohomology for graphs with a special attention to torsion. When the underlying algebra is Z[x]/(x 2 ), we... more
In this study, the differences between the socio economic characteristics and agricultural applications of the producers who had soil analysis and those who did not were determined in Edirne and Tekirdağ provinces, and a comparative... more
Efficient Use of Nitrogen in Cropping Systems Efficient use of N in cropping systems is often viewed from agronomic, economic, or environmental perspectives. A given N management system may provide highly efficient use of N from one... more