Search
Search Results
-
Dynamics of a stochastic and periodic virus model with Beddington-DeAngelis functional response
We consider a periodic virus model with Beddington-DeAngelis functional responses, which is assumed that not only the death rate of the uninfected,...
-
When is it acceptable to break the rules? Knowledge representation of moral judgements based on empirical data
Constraining the actions of AI systems is one promising way to ensure that these systems behave in a way that is morally acceptable to humans. But...
-
Construction of all even lengths type-II Z-complementary pair with a large zero-correlation zone
This paper presents a direct construction of type-II Z-complementary pair (ZCP) of q -ary ( q is even) for all even lengths with a wide...
-
Sublinear Algorithms in T-Interval Dynamic Networks
We consider standard T - interval dynamic networks , under the synchronous timing model and the broadcast CONGEST model. In a T - interval dynamic network ,...
-
Complex dynamic behaviour on fractional predator–prey model of mathematical ecology
In this paper, we present a mathematical predator–prey model in which the predator population is divided into two stages: mature (adult) stage and...
-
Winning Region Determination and Optimal Cooperative Guidance Design in a Pursuer–Evader–Defender Game
In this paper, we study the pursuer–evader–defender game under the isotropic rocket model. The game involves three agents: the evader, the pursuer,...
-
Distributed Optimization and Scaling Design for Solving Sylvester Equations
This paper develops distributed algorithms for solving Sylvester equations. The authors transform solving Sylvester equations into a distributed...
-
Decentralized traffic management of autonomous drones
Coordination of local and global aerial traffic has become a legal and technological bottleneck as the number of unmanned vehicles in the common...
-
An efficient algorithm for solving the variable-order time-fractional generalized Burgers’ equation
A numerical scheme based on the Haar wavelets coupled with the nonstandard finite difference scheme is presented to solve the variable-order...
-
Certifying Accuracy, Privacy, and Robustness of ML-Based Malware Detection
Recent advances in artificial intelligence (AI) are radically changing how systems and applications are designed and developed. In this context, new...
-
Emergent cooperation from mutual acknowledgment exchange in multi-agent reinforcement learning
Peer incentivization (PI) is a recent approach where all agents learn to reward or penalize each other in a distributed fashion, which often leads to...
-
Existence and uniqueness of solutions for \(\Psi \)-Caputo fractional neutral sequential differential equations on time scales
In this paper, we establish the existence and uniqueness of solutions for a class of initial value problems involving implicit fractional...
-
On Penalized Goal-Reaching Probability Minimization with a Common Shock for an AAI
The authors consider a robust optimal reinsurance and investment problem in a risk model with two dependent classes of insurance business for an...
-
T-Type Digraphs via Kronecker Canonical Form
In this paper, the authors aim to study Kronecker canonical form theory for T-type digraphs, which can be used to construct trees by tensor product...
-
Reducing Hyperexponential Functions over Monomial Extensions
The authors extend the shell and kernel reductions for hyperexponential functions over the field of rational functions to a monomial extension. Both...
-
Finite time stability analysis for fractional stochastic neutral delay differential equations
In this manuscript, we investigate a fractional stochastic neutral differential equation with time delay, which includes both deterministic and...
-
Automated Detection of Infection in Diabetic Foot Ulcer Using Pre-trained Fast Convolutional Neural Network with U++net
A frequent consequence of diabetes and a significant contributor to morbidity and mortality is diabetic foot ulcer (DFU).Early detection and...
-
A Hybrid and Inexact Algorithm for Nonconvex and Nonsmooth Optimization
The problem of nonconvex and nonsmooth optimization (NNO) has been extensively studied in the machine learning community, leading to the development...
-
An Efficient Approach to Reduce Energy Consumption in a Fog Computing Environment Using a Moth Flame Optimization Algorithm
After decades of growth in the computer computing field, cyber-physical systems (CPS), a combination of physical and tangible hardware and virtual...
-
Analyzing Data Streams from Cyber-Physical-Systems: A Case Study
We show that conducting a process-mining-centric analysis concerning cyber-physical systems provides insights into usage behavior. To show that, we...