Academia.eduAcademia.edu

Computer Mathematics

3,270 papers
65 followers
AI Powered
Computer Mathematics is a field that focuses on the mathematical foundations and techniques used in computer science, including algorithms, computational theory, numerical analysis, and discrete mathematics, to solve problems and optimize processes in computing and information technology.
Identification of co-expressed genes sharing similar biological behaviors is an essential step in functional genomics. Traditional clustering techniques are generally based on overall similarity of expression levels and often generate... more
In this paper, we consider a rational algorithm for modification of a positive measure by quadratic factor, d σ (t) = (tz) 2 dσ (t), where it is allowed z to be in supp(dσ ). Also, we present an application of modified algorithm to the... more
In this paper, we consider a rational algorithm for modification of a positive measure by quadratic factor, d σ (t) = (tz) 2 dσ (t), where it is allowed z to be in supp(dσ ). Also, we present an application of modified algorithm to the... more
L'accès aux archives de la revue « Compositio Mathematica » () implique l'accord avec les conditions générales d'utilisation (). Toute utilisation commerciale ou impression systématique est constitutive d'une infraction pénale. Toute... more
by L Mark
Assuming data domains are partially ordered, we apply Paredaens' and Bancilhon's Theorem to examine the expressiveness of the extended relational algebra (the PORA), which allows the ordering predicate to be used in formulae of the... more
In the article we show that combining random generators by group operation improves the statistical properties of the composite. It gives an effective way of finding random generators more and more close to the uniform. Moreover we obtain... more
We present a family of multipoint methods without memory with sixth order convergence for solving systems of nonlinear equations. The methods use first order divided difference operators and are derivative free. Extending the work... more
The spline collocation method is used to approximate solutions of boundary value problems. The convergence analysis is given and the method is shown to have second-order convergence. A numerical illustration is given to show the pertinent... more
String matching algorithms are used to find a particular pattern in a string. The aim of this research is to explain the basic ideas and complexity of current string matching algorithms and to perform applied comparison. There are many... more
In this paper, polynomial-based superconvergent degenerate kernel and Nyström methods for solving Fredholm integral equations of the second kind with the smooth kernel are studied. By using an interpolatory projection based on Legendre... more
L'accès aux archives de la revue « Compositio Mathematica » () implique l'accord avec les conditions générales d'utilisation (). Toute utilisation commerciale ou impression systématique est constitutive d'une infraction pénale. Toute... more
© Foundation Compositio Mathematica, 1982, tous droits réservés. L’accès aux archives de la revue « Compositio Mathematica » (http: //http://www.compositio.nl/) implique l’accord avec les conditions générales d’utilisation... more
An efficient implicit finite-difference algorithm for the gasdynamic equations utilizing matrix reduction techniques is presented. A significant reduction in arithmetic operations is achieved while maintaining the same favorable stability... more
We study some procedures for the approximation of three-dimensional data on a grid with a hypothesis of periodicity. The first part proposes a generalization of a discrete periodic approximation defined by Dunham Jackson. The functions... more
The reconstruction of an unknown function providing a set of Lagrange data can be approached by means of fractal interpolation. The power of that methodology allows us to generalize any other interpolant, both smooth and nonsmooth, but... more
We present a new theorem in Threshold Logic which is a generalization of Mezei's theorem. We demonstrate one of its applications, i.e., the optimization of the size of depth-2 Multioperand Binary Adders. By applying this theorem, the... more
This paper describes the Adaptive Steepest Descent (ASD) and Optimal Fletcher-Reeves (OFR) algorithms for linear neural network training. The algorithms are applied to well-known pattern classification and function approximation problems,... more
Student academic underachievement is a concern of paramount importance in Europe, where around 15% of the students in the last courses in high school do not achieve the minimum knowledge academic requirement. In this paper, we propose a... more
Boussinesq-type nonlinear wave equations with dispersive terms are solved via split-step Fourier methods. We decompose the equations into linear and nonlinear parts, then solve them orderly. The linear part can be projected into phase... more
Boussinesq-type nonlinear wave equations with dispersive terms are solved via split-step Fourier methods. We decompose the equations into linear and nonlinear parts, then solve them orderly. The linear part can be projected into phase... more
This paper considers a neighborhood broadcasting protocol in undirected de Bruijn and Kautz networks. The neighborhood broadcasting problem(NBP) is the problem of disseminating a message from an originator vertex to only its neighbors.... more
We develop an algebraic theory of synchronous dataflow networks. First, a basic algebraic theory of networks, called BNA (Basic Network Algebra), is introduced. This theory captures the basic algebraic properties of networks. For... more
A minimum spanning tree (MST) with a small diameter is required in numerous practical situations. It is needed, for example, in distributed mutual exclusion algorithms in order to minimize the number of messages communicated among... more
Motivation Lévy processes Exponentially affine models Fourier References Supplementary material OMXS30-index (log-returns) rt = log(St) − log(St−1)
In the recent project BENCHOP-the BENCHmarking project in Option Pricing we found that Stochastic and Local Volatility problems were particularly challenging. Here we continue the effort by introducing a set of benchmark problems for this... more
The aim of the BENCHOP project is to provide the finance community with a common suite of benchmark problems for option pricing. We provide a detailed description of the six benchmark problems together with methods to compute reference... more
In order to solve the large sparse systems of linear equations arising from numerical solutions of twodimensional steady incompressible viscous flow problems in primitive variable formulation, Ran and Yuan [On modified block SSOR... more
Identification of co-expressed genes sharing similar biological behaviors is an essential step in functional genomics. Traditional clustering techniques are generally based on overall similarity of expression levels and often generate... more
In this paper, fourth order, five-stage embedded in fifth order six-stage Singly Diagonally Implicit Runge-Kutta (SDIRK) methods are derived, and their regions of stability are determined. Numerical results of these methods are presented... more
In P systems working in the set derivation mode, even in the maximally parallel derivation mode, rules are only applied in at most one copy in each derivation step. We also consider the set mode in the cases of taking those sets of rules... more
Matrix inversion is an important requirement for many scientific and practical applications. Parallel architectures like Graphics Processing Units (GPUs) can have noticeable impacts on accelerating such computations, however, at the... more
With the most recent advances in bioinformatics, the amount of information available for analysing certain diseases has increased considerably. Specifically, the use of microarrays makes it possible to obtain information on genetic... more
parallel algorithm for solving the multinephron model of the renal inner medulla is developed. The intrinsic nature of this problem supplies sufficient symmetry for a high-level parallelism on distributed-memory parallel machines such as... more
In present world of electronic digital media the demand of high speed communication devices is increasing day-by-day. The security and authenticity of the information on internet is one of the most important issues of research. This paper... more
The main aim of this paper is to propose a robust and efficient numerical scheme for solving time dependent singularly perturbed Burgers-Fisher problem based on mesh adaptive strategy in the finite element framework. The Burgers-Fisher... more
The main aim of this paper is to propose a robust and efficient numerical scheme for solving time dependent singularly perturbed Burgers-Fisher problem based on mesh adaptive strategy in the finite element framework. The Burgers-Fisher... more
The model describes an EOQ model with time-varying deterioration, partial backlogging which depends on the length of the waiting time for the next replenishment, linearly time-varying demand function over a finite time horizon and... more
The r-th order nonlinearity of a Boolean function is an important cryptographic criterion in analyzing the security of stream as well as block ciphers. It is also important in coding theory as it is related to the covering radius of the... more
Let COL k be the set of all graphs that are k-colorable. It is well known that COL k is NP-complete. It is also well known, and easy, to show that if a ≤ b then COL a ≤ COL b. If 3 ≤ a ≤ b then we also have COL b ≤ SAT ≤ COL a which is an... more
In this paper, we characterize digraphs of 3 vertices associated with Lie algebras according to isomorphism classes of these associated Lie algebras. At this respect, we introduce and implement two algorithmic methods: the first is... more
This paper presents an innovative collocation algorithm designed to effectively handle a specific class of boundary value problems with high-order characteristics. The approach involves utilizing a novel variant of exponentialtype... more
The accuracy of the Content should not be relied upon and should be independently verified with primary sources of information. Taylor and Francis shall not be liable for any losses, actions, claims, proceedings, demands, costs, expenses,... more
We consider a monic polynomial of even degree with symbolic coefficients. We give a method for obtaining an expression in the coefficients (regarded as parameters) that is a lower bound on the value of the polynomial, or in other words a... more
The accuracy of the Content should not be relied upon and should be independently verified with primary sources of information. Taylor and Francis shall not be liable for any losses, actions, claims, proceedings, demands, costs, expenses,... more
In this manuscript, we construct a general family of optimal derivative free iterative methods by using rational interpolation. This family is further extended to a family of with-memory methods with increased order of convergence by... more
In this article, the Exp -function method is applied to construct traveling wave solutions of the fifth-order Sawada-Kotera equation. This method is one of the powerful methods that appear in recent time for establishing exact traveling... more
In this paper we construct new modifications of Jarratt's method for solving nonlinear equations based on the circle of curvature. A precise analysis of convergence is given to show that the new methods are of twelfth-order. Numerical... more