connection coefficient
Recently Published Documents


TOTAL DOCUMENTS

15
(FIVE YEARS 8)

H-INDEX

3
(FIVE YEARS 0)

Information ◽  
2021 ◽  
Vol 12 (12) ◽  
pp. 501
Author(s):  
Yuanyuan Meng ◽  
Xiyu Liu

Community detection is a significant research field of social networks, and modularity is a common method to measure the division of communities in social networks. Many classical algorithms obtain community partition by improving the modularity of the whole network. However, there is still a challenge in community division, which is that the traditional modularity optimization is difficult to avoid resolution limits. To a certain extent, the simple pursuit of improving modularity will cause the division to deviate from the real community structure. To overcome these defects, with the help of clustering ideas, we proposed a method to filter community centers by the relative connection coefficient between vertices, and we analyzed the community structure accordingly. We discuss how to define the relative connection coefficient between vertices, how to select the community centers, and how to divide the remaining vertices. Experiments on both real and synthetic networks demonstrated that our algorithm is effective compared with the state-of-the-art methods.


Author(s):  
Dr. Varsha Agarwal

Abstract: The quick advancement of cryptographic forms of money has caused to notice this specific market, with financial backers attempting to comprehend its conduct and analysts attempting to clarify it. The development of digital currencies' costs showed a sort of air pocket and an accident toward the finish of 2017. In view of this occasion, and on the way that Bitcoin is the most perceived digital currency, we propose to assess the infection impact among Bitcoin and other significant cryptographic forms of money. Utilizing the Detrended Cross-Correlation Analysis connection coefficient and looking at the period after and before the accident, we discovered proof of an infection impact, with this specific market being more incorporated now than in the past something that ought to be considered by current and likely financial backers. Cryptocurrency like Bitcoin have developed from being related only with geeks and revolutionaries to being considered by national banks as an innovation to carry out advanced cash. Digital forms of money exist just in computerized shape and can be moved totally between advanced addresses. This is both not normal for traditional electronic cash as perceived by laypersons which goes about as an obligation guarantee on a store with a confided in monetary foundation, for example, a private bank and dissimilar to ordinary bodily cash which might be truly moved by. This implies that any lawful rights related with holding digital forms of money should be diverse in spite of it being staying not entirely clear. In this , we take a gander at the different medicines of cash in the lawful detect and talk about the dangers related with each by drawing on genuine models. We presume that extortion through hacking might actually represent an issue to broad reception of cryptographic forms of money as the shortfall of plan of action against an outsider, for example, a bank amasses hazard in holders of digital currencies. Clients should hence practice alert and comprehend the dangers prior to putting resources into digital currencies. This admonition requires accentuation as many gatherings misunderstand the cryptography inside the innovation as shielding them from such misrepresentation when truth be told it does nothing of the sort. Keywords: Cryptocurrency, Cryptography, Digital Currencies, Bitcoin, Blockchain.


2021 ◽  
Vol 382 (2) ◽  
pp. 657-707
Author(s):  
Marcus Webb ◽  
Sheehan Olver

AbstractWe address the computational spectral theory of Jacobi operators that are compact perturbations of the free Jacobi operator via the asymptotic properties of a connection coefficient matrix. In particular, for Jacobi operators that are finite-rank perturbations we show that the computation of the spectrum can be reduced to a polynomial root finding problem, from a polynomial that is derived explicitly from the entries of a connection coefficient matrix. A formula for the spectral measure of the operator is also derived explicitly from these entries. The analysis is extended to trace-class perturbations. We address issues of computability in the framework of the Solvability Complexity Index, proving that the spectrum of compact perturbations of the free Jacobi operator is computable in finite time with guaranteed error control in the Hausdorff metric on sets.


2020 ◽  
Vol 11 (4) ◽  
pp. 6938-6948
Author(s):  
Dhamdhere Rupali Balasaheb ◽  
Vijayalakshmi A

The current examination portrays the improvement of the QbD way to deal with Reverse Phase-High Performance Liquid Chromatography (RP-HPLC) framework utilizing Design of Experiments.Each of the three principle parts of the RP-HPLC measure (Buffer pH, Organic Step-percent acetonitrile, Organic Modifier-Methanol) are introduced in a successful test configuration zeroed in on methodical exploring. Through measurable investigation devices, for example, Analysis of Variance (ANOVA) and plots that uncovered the last chromatographic states of the strategy, the criticalness and communication impacts of these boundaries on the reaction factors (maintenance time and following component) were assessed. The chromatographic detachment was accomplished on Thermo Hypersil BDS RP C18 (250 × 4.6 mm, 5μ) section utilizing Buffer (pH 6.8): Acetonitrile (60:40v/v) as portable stage and discovery was finished utilizing Photo-Diode Array (PDA) identifier at 288 nm. The created fluvastatin sodium technique is direct with coefficients of relationship over a scope of 10-80μg/ml. The (R2) estimation of the connection coefficient is 0.999. The percent RSD for the strategy's exactness and accuracy was discovered to be under 2 percent. Investigations of Forced Degradation uncovered that the method was found to show security. The outcomes indicated that the strategy proposed is proper for the exact and precise assurance and detailing of fluvastatin sodium in mass.


Author(s):  
Nurmukhammad Ya Makhkamov ◽  
Gulshan R Ibragimova ◽  
Azizbek F Ismatullaev

2020 ◽  
Vol 17 (9) ◽  
pp. 4648-4653
Author(s):  
J. Dayanika ◽  
G. Archana ◽  
K. Siva Kumar ◽  
N. Pavani

The world is turning out to be progressively digitalized raising security concerns and the urgent requirement for strong and propelled security advancements and systems to battle the expanding complex nature of digital assaults. This paper talks about how machine learning is being utilized in digital security in resistance and offense exercises, remembering conversations for digital assaults focused at machine learning models. In this review, we are proposing a scientific categorization of IDS, which considers information protests to be essential measurements to group and condense IDS Literature based on machine learning and based on profound knowledge. The review explains initially the idea and scientific grade of IDSs. Machine learning calculations are presented at that point for the many time used in IDSs, measurements and presented benchmark datasets. Next, we take the proposed ordered framework as a benchmark in conjunction with the agent writing and explain how to understand key IDS issues with machine learning and profound systems. At long last, difficulties and future advancements are talked about by assessing ongoing agent examines. This paper proposes IDS dependent on highlight determination and bunching calculation utilizing channel and wrapper techniques. Channel and wrapper strategies are named include gathering dependent on direct connection coefficient (FGLCC) calculation and cuttlefish calculation (CFA), separately.


2020 ◽  
Vol 12 (5) ◽  
pp. 1769
Author(s):  
Fei Tang ◽  
Chufei Xiao ◽  
Xin Gao ◽  
Yifan Zhang ◽  
Nianchun Du ◽  
...  

A robust and reliable grid is one of the core elements for power network planning. Specifically, splitting is an effective way for power grid out-of-step oscillation. Since the cross-section of system out-of-step is mostly found on the weak connection lines, reducing the number of those lines can be conducive to the system partition, save the finding time of the optimal splitting cross-section, and improve the performance of the splitting control. This paper proposed an enhanced method based on slow coherence theory for weak connection lines’ identification and monitoring. The ratio of the number of weak connection lines to the number of all the lines, called weak connection coefficient, is considered as a crucial factor. A bi-level programming model, which perceives the minimum connection coefficient as the optimization goal, is built for the transmission network. Additionally, a fused algorithm, consisting of Boruvka algorithm and particle swarm optimization with adaptive mutation and inertia weight, is employed to solve the proposed method in the instances of an 18-node IEEE Graver system and a practical power grid in East China. Simulation results in PSD-BPA are conducted to verify the effectiveness of the weak connection monitoring method and transmission network planning model.


Due to constrained assets and adaptability, security protocol for Internet of Things (IoT) should be light-weighted. The cryptographic solutions are not possible to apply on little and low-power devices of IoT in view of their power and space impediments. In this paper, a light-weight protocol to verify the information and accomplishing information provenance is introduced for multi-hop IoT arrange. The Received Signal Strength Indicator (RSSI) of conveying IoT nodes are utilized to produce the connection fingerprints. The connection fingerprints are coordinated at the server to process the relationship coefficient. Higher the estimation of connection coefficient, higher the rates of verified information move. Lower worth gives the recognition of ill-disposed node in the middle of a particular connection. Information provenance has additionally been accomplished by examination of pocket header with all the accessible connection fingerprints at the server. The time unpredictability is processed at the node and server level, which is O(1). The power scattering is determined for IoT nodes and overall network. The outcomes demonstrate that the power utilization of the framework and time complexity. Exploratory outcomes show that up to 97% connection is accomplished when no attacker node is available in the IoT network.


2016 ◽  
Vol 13 (06) ◽  
pp. 1650076 ◽  
Author(s):  
Zi-Hua Weng

The paper aims to extend major equations in the electromagnetic and gravitational theories from the flat space into the complex octonion curved space. Maxwell applied simultaneously the quaternion analysis and vector terminology to describe the electromagnetic theory. It inspires subsequent scholars to study the electromagnetic and gravitational theories with the complex quaternions/octonions. Furthermore Einstein was the first to depict the gravitational theory by means of tensor analysis and curved four-space–time. Nowadays some scholars investigate the electromagnetic and gravitational properties making use of the complex quaternion/octonion curved space. From the orthogonality of two complex quaternions, it is possible to define the covariant derivative of the complex quaternion curved space, describing the gravitational properties in the complex quaternion curved space. Further it is possible to define the covariant derivative of the complex octonion curved space by means of the orthogonality of two complex octonions, depicting simultaneously the electromagnetic and gravitational properties in the complex octonion curved space. The result reveals that the connection coefficient and curvature of the complex octonion curved space will exert an influence on the field strength and field source of the electromagnetic and gravitational fields, impacting the linear momentum, angular momentum, torque, energy, and force and so forth.


Sign in / Sign up

Export Citation Format

Share Document