期刊文献+
共找到3篇文章
< 1 >
每页显示 20 50 100
New Asymptotic Results on Fermat-Wiles Theorem
1
作者 Kimou Kouadio Prosper Kouakou Kouassi Vincent Tanoé François 《Advances in Pure Mathematics》 2024年第6期421-441,共21页
We analyse the Diophantine equation of Fermat xp yp = zp with p > 2 a prime, x, y, z positive nonzero integers. We consider the hypothetical solution (a, b, c) of previous equation. We use Fermat main divisors, Dio... We analyse the Diophantine equation of Fermat xp yp = zp with p > 2 a prime, x, y, z positive nonzero integers. We consider the hypothetical solution (a, b, c) of previous equation. We use Fermat main divisors, Diophantine remainders of (a, b, c), an asymptotic approach based on Balzano Weierstrass Analysis Theorem as tools. We construct convergent infinite sequences and establish asymptotic results including the following surprising one. If z y = 1 then there exists a tight bound N such that, for all prime exponents p > N , we have xp yp zp. 展开更多
关键词 Fermat’s Last Theorem Fermat-Wiles Theorem Kimou’s Divisors Diophantine Quotient Diophantine Remainders Balzano Weierstrass Analysis Theorem
在线阅读 下载PDF
Securing Stock Transactions Using Blockchain Technology: Architecture for Identifying and Reducing Vulnerabilities Linked to the Web Applications Used (MAHV-BC)
2
作者 Kpinna Tiekoura Coulibaly Abdou Maïga +1 位作者 Jerome Diako Moustapha Diaby 《Open Journal of Applied Sciences》 2023年第11期2080-2093,共14页
This paper deals with the security of stock market transactions within financial markets, particularly that of the West African Economic and Monetary Union (UEMOA). The confidentiality and integrity of sensitive data ... This paper deals with the security of stock market transactions within financial markets, particularly that of the West African Economic and Monetary Union (UEMOA). The confidentiality and integrity of sensitive data in the stock market being crucial, the implementation of robust systems which guarantee trust between the different actors is essential. We therefore proposed, after analyzing the limits of several security approaches in the literature, an architecture based on blockchain technology making it possible to both identify and reduce the vulnerabilities linked to the design, implementation work or the use of web applications used for transactions. Our proposal makes it possible, thanks to two-factor authentication via the Blockchain, to strengthen the security of investors’ accounts and the automated recording of transactions in the Blockchain while guaranteeing the integrity of stock market operations. It also provides an application vulnerability report. To validate our approach, we compared our results to those of three other security tools, at the level of different metrics. Our approach achieved the best performance in each case. 展开更多
关键词 Stock Market Transactions Action Smart Contracts ARCHITECTURE Security Vulnerability Web Applications Blockchain and Finance Cryptography Authentication Data Integrity Transaction Confidentiality Trust Economy
在线阅读 下载PDF
Hierarchical Method for Classifying Latent Traumatic States (CAH-ET)
3
作者 Kpinna Tiekoura Coulibaly Abdoul Maïga +1 位作者 Kamagaté Beman Hamidja Diaby Moustapha 《Open Journal of Applied Sciences》 2024年第12期3500-3515,共16页
This article presents a hybrid method of automatic classification of latent traumatic states adapted to the analysis of social resilience processes. Our approach combines the Hierarchical Ascending Classification (CAH... This article presents a hybrid method of automatic classification of latent traumatic states adapted to the analysis of social resilience processes. Our approach combines the Hierarchical Ascending Classification (CAH) technique with decision tree. It is primarily aimed at improving the identification and categorization of traumatic states by integrating the strengths of both methods. CAH is used to cluster data, allowing the detection of underlying patterns in traumatic states. Then, decision trees are applied to classify these clusters, providing a clear and accessible interpretation of the results. This combination not only provides a better understanding of the data structure, but also provides accurate and actionable classifications. This work highlights the importance of this hybrid method in the field of social resilience processes, particularly in psychology and psychiatry, where early detection and classification of trauma can have a significant impact on the patient’s follow-up. Experimental results show an improvement in the classification accuracy of our approach compared to a classification method for the same domain using a hybridization between the partitioning technique and genetic algorithms. This opens promising prospects for the application of this approach in clinical settings of social resilience. 展开更多
关键词 Social Resilience Classification Machine Learning
暂未订购
上一页 1 下一页 到第
使用帮助 返回顶部