This paper develops upper and lower bounds on the influence measure in a network, more precisely, the expected number of nodes that a seed set can influence in the independent cascade model. In particular, our bounds ...
ISBN:
(纸本)9781510860964
This paper develops upper and lower bounds on the influence measure in a network, more precisely, the expected number of nodes that a seed set can influence in the independent cascade model. In particular, our bounds exploit nonbacktracking walks, Fortuin-Kasteleyn-Ginibre type inequalities, and are computed by message passing algorithms. Nonbacktracking walks have recently allowed for headways in community detection, and this paper shows that their use can also impact the influence computation. Further, we provide parameterized versions of the bounds that control the trade-off between the efficiency and the accuracy. Finally, the tightness of the bounds is illustrated with simulations on various network models.
We study the use of a Scheffé-style simultaneous confidence band as applied to low-dose risk estimation with quantal response data. We consider two formulations for the dose-response risk function, an Abbott-adju...
详细信息
This paper develops deterministic upper and lower bounds on the influence measure in a network, more precisely, the expected number of nodes that a seed set can influence in the independent cascade model. In particula...
详细信息
This paper develops deterministic upper and lower bounds on the influence measure in a network, more precisely, the expected number of nodes that a seed set can influence in the independent cascade model. In particular, our bounds exploit r-nonbacktracking walks and Fortuin--Kasteleyn--Ginibre (FKG) type inequalities, and are computed by message passing algorithms. Further, we provide parameterized versions of the bounds that control the trade-off between efficiency and accuracy. Finally, the tightness of the bounds is illustrated on various network models.
In today’s digital world,the most inevitable challenge is the protection of digital *** to the weak confidentiality preserving techniques,the existing world is facing several digital information *** make our digital d...
详细信息
In today’s digital world,the most inevitable challenge is the protection of digital *** to the weak confidentiality preserving techniques,the existing world is facing several digital information *** make our digital data indecipherable to the unauthorized person,a technique forfinding a crypto-graphically strong Substitution box(S-box)have *** S-box with sound cryptographic assets such as nonlinearity(NL),strict avalanche criterion(SAC),bit independence criteria(BIC),bit independence criteria of nonlinearity(BIC-NL),Bit independence criteria of Strict avalanche criteria(BIC-SAC),and Input/output XOR is considered as the robust *** Decision-Making Trial and Evaluation Laboratory(DEMATEL)approach of multi-criteria decision making(MCDM)is proposed forfinding the interrelation among cryptographic properties.A combination of two MCDM methods namely Entropy and multi-objective optimization based on ratio analysis(MOORA)is applied for the best S-box selection.A robust substitution box is selected for secure communications in cryptography by using the combination of DEMETAL selection criteria,entro-py weight assigning,and MOORA ranking *** combination of these three methods provides a fast selection procedure for the secure confusion *** offered selection method can also be utilized for the choice of the best cryptosystem with highly secure properties and resistive against all possible linear and differential attacks in the cryptanalysis.
In this study, methylene blue (MB) dye adsorption to synthesised sulfonated date palm kernel biochar (SDPKB) was predicted and optimized using statistical-based regression approach (response surface methodology (RSM),...
详细信息
Feedback control problems involving autonomous quadratic systems are prevalent, yet there are only a limited number of software tools available for approximating their solution due to the complexity of the problem. Th...
详细信息
This paper infers from a generalized Picone identity the uniqueness of the stable positive solution for a class of semilinear equations of superlinear indefinite type, as well as the uniqueness and global attractivity...
详细信息
This paper extends a product-space clustering method, the bisection and homogeneity algorithm, to the cyclic modeling of a periodically perturbed pendulum. The algorithm creates a structural decomposition of the state...
详细信息
This paper extends a product-space clustering method, the bisection and homogeneity algorithm, to the cyclic modeling of a periodically perturbed pendulum. The algorithm creates a structural decomposition of the state space for each drive cycle of the vertical support. Smooth trajectory approximations of chaotic behavior are the result of combining multiple SAM/COG systems with a one-step Euler's method. Experimental results suggest that a finer phase partitioning is necessary and sufficient for the fuzzy model to preserve the periodicity of the vertical drive.
If we pick n random points uniformly in [0;1]dand connect each point to its k-nearest neighbors, then it is well known that there exists a giant connected component with high probability. We prove that in [0;1]dit suf...
详细信息
作者:
Sigalov, DanielOshman, YaakovTechnion
Israel Institute of Technology Program for Applied Mathematics Haifa 32000 Israel Technion
Israel Institute of Technology Department of Aerospace Engineering Haifa 32000 Israel
We consider the problem of tracking the state of a hybrid system capable of performing a bounded number of mode switches. The system is assumed to follow either a nominal or an anomalous model, where the nominal model...
详细信息
ISBN:
(纸本)9780982443811
We consider the problem of tracking the state of a hybrid system capable of performing a bounded number of mode switches. The system is assumed to follow either a nominal or an anomalous model, where the nominal model may stand for, e.g., the non-maneuvering motion regime of a target or the fault-free operation mode of a sensor, and the anomalous model may stand for, e.g., the abrupt evasive maneuvers of a target or the faulty operation of a sensor. As is well known, the optimal algorithm requires implementation of an exponentially growing number of primitive Kalman filters. On the other hand, the system's switching dynamics is not Markov because of the a priori bounded number of model switches, thus ruling out the use of popular estimation schemes such as the interacting multiple model (IMM) and generalized pseudo-Bayesian (GPB) filters. We derive an efficient scheme that uses a number of primitive Kalman filters that is linear in the number of possible maneuvers. The scheme resembles the IMM algorithm in that it uses interaction between some of the primitive filters before every estimation cycle, thus reducing the number of such filters. The algorithm's performance is evaluated via a simulation study, and shown to outperform the state-of-the-art IMM filter in a typical example.
暂无评论