In this paper we consider the filtering problem associated to partially observed McKean-Vlasov stochastic differential equations (SDEs). The model consists of data that are observed at regular and discrete times and t...
详细信息
This paper investigates the secrecy performance of full-duplex cooperative vehicular relaying networks under passive eavesdropping attacks in the presence of co-channel interference. In the considered system model, a ...
详细信息
In this paper, we deal with numerical approximations for solving the Black-Scholes Partial Differential Equation(PDE) for European and American options pricing with local volatility. This PDE is well-known to be degen...
详细信息
We propose an analytical approach to approximate the average two-terminal reliability (ATT R) for graphs where a fraction of the nodes is removed. The approximation is based on the generating function of the network...
详细信息
ISBN:
(数字)9798350348972
ISBN:
(纸本)9798350348989
We propose an analytical approach to approximate the average two-terminal reliability (ATT R) for graphs where a fraction of the nodes is removed. The approximation is based on the generating function of the network's degree distribution under random node removals and stochastic degree-based node removals. Through validation on synthetic graphs, including Erdos Renyi random graphs and Barabasi-Albert graphs, as well as four real-world networks from the Internet Topology Zoo, we observe that the analytical method effectively approximates the average two-terminal reliability under random node removals for synthetic graphs. In the case of real-world graphs under random and stochastic degree-based node removals or synthetic graphs under stochastic degree-based node removals, the analytical ap-proximation yields reasonably accurate results when the fraction of removed nodes is small, specifically less than 10%, provided that the initial analytical approximation closely aligns with the real ATT R values.
In order to overcome the challenges caused by flash memories and also to protect against errors related to reading information stored in DNA molecules in the shotgun sequencing method, the rank modulation is proposed....
详细信息
The present article is designed to study the Hamilton and Crosser model applied to the flow of ternary hybrid nanofluids over a Riga wedge, incorporating the effects of heterogeneous catalytic reactions. The complex i...
The present article is designed to study the Hamilton and Crosser model applied to the flow of ternary hybrid nanofluids over a Riga wedge, incorporating the effects of heterogeneous catalytic reactions. The complex interactions within the ternary hybrid nanofluids, comprising three distinct nanoparticles suspended in a base fluid, present significant challenges in accurately predicting flow and thermal characteristics. The Hamilton and Crosser model, known for its efficacy in determining the thermal conductivity of composite materials, is employed to analyze this intricate system. The analysis reveals the model's potential in offering a comprehensive understanding of the thermal and fluid dynamics involved, highlighting its suitability for predicting the behavior of ternary hybrid nanofluids in the presence of catalytic reactions. The governing model equations and boundary conditions are non-dimensionalized by introducing suitable similarity transformations. Thereafter, the computational Chebyshev collocation spectral technique implemented in the MATHEMATICA 11.3 software is used to calculate the numerical solution. The study reveals that the Casson parameter has a negative influence on the velocity distribution, causing it to reduce as the Casson parameter rises. This research contributes to the advancement of modeling techniques for complex fluid systems, with implications for enhanced design and optimization in various industrial and engineering applications.
In this paper we consider the estimation of unknown parameters in Bayesian inverse problems. In most cases of practical interest, there are several barriers to performing such estimation, This includes a numerical app...
详细信息
Earlier, many PPDM algorithms have been proposed to conceal sensitive items in a database in order to disclose sensitive itemsets. All prior techniques, however, ignored a crucial problem in setting minimum support th...
详细信息
Researchers have made a lot of progress in combining the advances in Deep Learning and the generalization and applicability of Reinforcement learning to the sequential decision-making process and introduce Deep Reinfo...
详细信息
暂无评论