Proceedings of the Second International Forum on Financial Mathematics and Financial Technology.
Saved in:
Superior document: | Financial Mathematics and Fintech Series |
---|---|
: | |
Place / Publishing House: | Singapore : : Springer,, 2023. ©2023. |
Year of Publication: | 2023 |
Edition: | 1st ed. |
Language: | English |
Series: | Financial Mathematics and Fintech Series
|
Online Access: | |
Physical Description: | 1 online resource (242 pages) |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
50030663090 |
---|---|
ctrlnum |
(MiAaPQ)50030663090 (Au-PeEL)EBL30663090 (OCoLC)1392089192 |
collection |
bib_alma |
record_format |
marc |
spelling |
Zheng, Zhiyong. Proceedings of the Second International Forum on Financial Mathematics and Financial Technology. 1st ed. Singapore : Springer, 2023. ©2023. 1 online resource (242 pages) text txt rdacontent computer c rdamedia online resource cr rdacarrier Financial Mathematics and Fintech Series Intro -- Preface -- Contents -- On the Development of Fintech in Asia -- 1 Overview of Global Fintech Development -- 1.1 Development Dynamics -- 1.2 The Financing Profile -- 1.3 Regulatory Environment -- 1.4 The Models of Fintech Development -- 1.5 Spatial Layout -- 2 Practice of Fintech Development in Asia -- 2.1 China-The Fintech Has Been Promoted to the Worlds Leading Level -- 2.2 Japan-Boosting the Rapid Growth of Fintech Through Advantages of Backwardness -- 2.3 Singapore-Gathering Innovative Resources with a Relaxed and Inclusive Atmosphere -- 2.4 South Korea-Promoting Scale Development of Fintech Industry by Fanning Out From Point to Area -- 2.5 KazakhstanCDigital Transformation Speeds Up the Construction of Central Asian Fintech Hub -- 2.6 India-Potential for Fintech Development Has Been Gradually Exerted -- 2.7 Israel-Guidance Plus Service to Create a Highland for the Development of Fintech -- 2.8 Indonesia-A Rising Star of Fintech Development in Southeast Asia -- 2.9 Hong Kong of China-The Government Assists the Strong Development of Fintech -- A Probability Inequality with Application to Lattice Theory -- 1 Introduction -- 2 Main Results -- 3 Conclusions -- References -- Robust Identification of Gene-Environment Interactions Under High-Dimensional Accelerated Failure Time Models -- 1 Introduction -- 2 Methods -- 2.1 Data and Model Settings -- 2.2 Robust Estimation and Identification -- 2.3 Computation -- 2.4 Consistency Properties -- 3 Simulations -- 4 Analysis of the TCGA Lung Adenocarcinoma Data -- 5 Discussions -- References -- A Novel Approach for Improving Accuracy for Distributed Storage Networks -- 1 Introduction -- 2 Related Works -- 2.1 Audit Research -- 2.2 Distributed Storage Project -- 3 Audit Algorithm -- 3.1 An Audit Framework -- 3.2 Data Uploading -- 3.3 Self-integrity Verification. 3.4 Data Owner's Integrity Verification -- 3.5 The Game of Miners Versus Storage Networks -- 4 Fault-Tolerance Verification -- 5 Concluding Remarks -- References -- Iterative Learning Control Based on Random Variance Reduction Gradient Method -- 1 Introduction -- 1.1 Background -- 1.2 Design and Analysis of SVRG-Based ILC -- 1.3 Main Work and Organization -- 2 SVRG-Based ILC Framework -- 2.1 System Description -- 2.2 Algorithm Design -- 2.3 Convergence Analysis -- 3 SVRG-Based ILC Under Random Data Dropouts -- 3.1 System Description -- 3.2 Algorithm Design -- 3.3 Convergence Analysis -- 3.4 Numerical Simulation -- 4 Model-Free SVRG-Based ILC for MIMO Systems -- 4.1 System Description -- 4.2 Algorithm Design -- 4.3 Convergence Analysis -- 4.4 Numerical Simulation -- 5 Conclusions -- References -- A Generalization of NTRUEncrypt -- 1 φ-Cyclic Code -- 2 A Generalization of NTRUEncrypt -- References -- Cyclic Lattices, Ideal Lattices, and Bounds for the Smoothing Parameter -- 1 Discrete Subgroup in mathbbRn -- 2 Ideal Matrices -- 3 Cyclic Lattices and Ideal Lattices -- 4 Smoothing Parameter -- References -- On the LWE Cryptosystem with More General Disturbance -- 1 Introduction -- 1.1 Innovation and Contribution -- 2 Methodology -- 2.1 Preliminary Property -- 2.2 Probability of Decryption Error Based on Gaussian Disturbance -- 2.3 Probability of Decryption Error for General Disturbance -- 3 Results and Conclusions -- 4 Discussions -- 4.1 Future Work -- References -- On the High Dimensional RSA Algorithm-A Public Key Cryptosystem Based on Lattice and Algebraic Number Theory -- 1 Introduction -- 2 Ideal Matrices -- 3 High Dimensional RSA -- 4 Security and Example -- References -- Central Bank Digital Currency Cross-Border Payment Model Based on Blockchain Technology -- 1 Introduction -- 2 CBDC Cross-Border Payment Development Current Situation. 3 Polkadot Technology Overview -- 3.1 Relay Chain and Parachain Technology -- 3.2 Polkadot Cross-Chain Technology -- 4 CBDC Cross-Border Payment Model -- 4.1 Design of Parachain -- 4.2 Design of Relay chain -- 4.3 Cross-Chain Transaction -- 4.4 Privacy Protection -- 5 CBDC Cross-Border Payment Model Architecture -- 6 Summary and Prospect -- References -- LLE Based K-Nearest Neighbor Smoothing for scRNA-Seq Data Imputation -- 1 Introduction -- 2 Materials and Methods -- 2.1 The K-Nearest Neighbor Smoothing Algorithm -- 2.2 Locally Linear Embedding -- 3 Results -- 3.1 Availability of Data -- 3.2 Data Processing and Visualization -- 3.3 Performance Evaluation -- 4 Conclusions -- References -- The Application of Time Series Analysis in the Fiscal Budget Variance of China -- 1 Introduction -- 2 A General View on Budget Data -- 2.1 Introduction to Concept and Data Source -- 2.2 Descriptive Analysis of Budget Variance -- 2.3 Descriptive Analysis of Budget Execution -- 3 Overview of Time Series Analysis Techniques -- 3.1 Decomposition of Time Series -- 3.2 ARIMA (p,d,q) -- 3.3 SARIMA (p,d,q) (P,D,Q)s -- 4 Modeling of Budget Variance -- 4.1 Prediction of Budget Execution -- 4.2 Prediction of Budget Variance -- 5 Conclusion -- References. Description based on publisher supplied metadata and other sources. Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2024. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries. Electronic books. Print version: Zheng, Zhiyong Proceedings of the Second International Forum on Financial Mathematics and Financial Technology Singapore : Springer,c2023 9789819923656 ProQuest (Firm) https://ebookcentral.proquest.com/lib/oeawat/detail.action?docID=30663090 Click to View |
language |
English |
format |
eBook |
author |
Zheng, Zhiyong. |
spellingShingle |
Zheng, Zhiyong. Proceedings of the Second International Forum on Financial Mathematics and Financial Technology. Financial Mathematics and Fintech Series Intro -- Preface -- Contents -- On the Development of Fintech in Asia -- 1 Overview of Global Fintech Development -- 1.1 Development Dynamics -- 1.2 The Financing Profile -- 1.3 Regulatory Environment -- 1.4 The Models of Fintech Development -- 1.5 Spatial Layout -- 2 Practice of Fintech Development in Asia -- 2.1 China-The Fintech Has Been Promoted to the Worlds Leading Level -- 2.2 Japan-Boosting the Rapid Growth of Fintech Through Advantages of Backwardness -- 2.3 Singapore-Gathering Innovative Resources with a Relaxed and Inclusive Atmosphere -- 2.4 South Korea-Promoting Scale Development of Fintech Industry by Fanning Out From Point to Area -- 2.5 KazakhstanCDigital Transformation Speeds Up the Construction of Central Asian Fintech Hub -- 2.6 India-Potential for Fintech Development Has Been Gradually Exerted -- 2.7 Israel-Guidance Plus Service to Create a Highland for the Development of Fintech -- 2.8 Indonesia-A Rising Star of Fintech Development in Southeast Asia -- 2.9 Hong Kong of China-The Government Assists the Strong Development of Fintech -- A Probability Inequality with Application to Lattice Theory -- 1 Introduction -- 2 Main Results -- 3 Conclusions -- References -- Robust Identification of Gene-Environment Interactions Under High-Dimensional Accelerated Failure Time Models -- 1 Introduction -- 2 Methods -- 2.1 Data and Model Settings -- 2.2 Robust Estimation and Identification -- 2.3 Computation -- 2.4 Consistency Properties -- 3 Simulations -- 4 Analysis of the TCGA Lung Adenocarcinoma Data -- 5 Discussions -- References -- A Novel Approach for Improving Accuracy for Distributed Storage Networks -- 1 Introduction -- 2 Related Works -- 2.1 Audit Research -- 2.2 Distributed Storage Project -- 3 Audit Algorithm -- 3.1 An Audit Framework -- 3.2 Data Uploading -- 3.3 Self-integrity Verification. 3.4 Data Owner's Integrity Verification -- 3.5 The Game of Miners Versus Storage Networks -- 4 Fault-Tolerance Verification -- 5 Concluding Remarks -- References -- Iterative Learning Control Based on Random Variance Reduction Gradient Method -- 1 Introduction -- 1.1 Background -- 1.2 Design and Analysis of SVRG-Based ILC -- 1.3 Main Work and Organization -- 2 SVRG-Based ILC Framework -- 2.1 System Description -- 2.2 Algorithm Design -- 2.3 Convergence Analysis -- 3 SVRG-Based ILC Under Random Data Dropouts -- 3.1 System Description -- 3.2 Algorithm Design -- 3.3 Convergence Analysis -- 3.4 Numerical Simulation -- 4 Model-Free SVRG-Based ILC for MIMO Systems -- 4.1 System Description -- 4.2 Algorithm Design -- 4.3 Convergence Analysis -- 4.4 Numerical Simulation -- 5 Conclusions -- References -- A Generalization of NTRUEncrypt -- 1 φ-Cyclic Code -- 2 A Generalization of NTRUEncrypt -- References -- Cyclic Lattices, Ideal Lattices, and Bounds for the Smoothing Parameter -- 1 Discrete Subgroup in mathbbRn -- 2 Ideal Matrices -- 3 Cyclic Lattices and Ideal Lattices -- 4 Smoothing Parameter -- References -- On the LWE Cryptosystem with More General Disturbance -- 1 Introduction -- 1.1 Innovation and Contribution -- 2 Methodology -- 2.1 Preliminary Property -- 2.2 Probability of Decryption Error Based on Gaussian Disturbance -- 2.3 Probability of Decryption Error for General Disturbance -- 3 Results and Conclusions -- 4 Discussions -- 4.1 Future Work -- References -- On the High Dimensional RSA Algorithm-A Public Key Cryptosystem Based on Lattice and Algebraic Number Theory -- 1 Introduction -- 2 Ideal Matrices -- 3 High Dimensional RSA -- 4 Security and Example -- References -- Central Bank Digital Currency Cross-Border Payment Model Based on Blockchain Technology -- 1 Introduction -- 2 CBDC Cross-Border Payment Development Current Situation. 3 Polkadot Technology Overview -- 3.1 Relay Chain and Parachain Technology -- 3.2 Polkadot Cross-Chain Technology -- 4 CBDC Cross-Border Payment Model -- 4.1 Design of Parachain -- 4.2 Design of Relay chain -- 4.3 Cross-Chain Transaction -- 4.4 Privacy Protection -- 5 CBDC Cross-Border Payment Model Architecture -- 6 Summary and Prospect -- References -- LLE Based K-Nearest Neighbor Smoothing for scRNA-Seq Data Imputation -- 1 Introduction -- 2 Materials and Methods -- 2.1 The K-Nearest Neighbor Smoothing Algorithm -- 2.2 Locally Linear Embedding -- 3 Results -- 3.1 Availability of Data -- 3.2 Data Processing and Visualization -- 3.3 Performance Evaluation -- 4 Conclusions -- References -- The Application of Time Series Analysis in the Fiscal Budget Variance of China -- 1 Introduction -- 2 A General View on Budget Data -- 2.1 Introduction to Concept and Data Source -- 2.2 Descriptive Analysis of Budget Variance -- 2.3 Descriptive Analysis of Budget Execution -- 3 Overview of Time Series Analysis Techniques -- 3.1 Decomposition of Time Series -- 3.2 ARIMA (p,d,q) -- 3.3 SARIMA (p,d,q) (P,D,Q)s -- 4 Modeling of Budget Variance -- 4.1 Prediction of Budget Execution -- 4.2 Prediction of Budget Variance -- 5 Conclusion -- References. |
author_facet |
Zheng, Zhiyong. |
author_variant |
z z zz |
author_sort |
Zheng, Zhiyong. |
title |
Proceedings of the Second International Forum on Financial Mathematics and Financial Technology. |
title_full |
Proceedings of the Second International Forum on Financial Mathematics and Financial Technology. |
title_fullStr |
Proceedings of the Second International Forum on Financial Mathematics and Financial Technology. |
title_full_unstemmed |
Proceedings of the Second International Forum on Financial Mathematics and Financial Technology. |
title_auth |
Proceedings of the Second International Forum on Financial Mathematics and Financial Technology. |
title_new |
Proceedings of the Second International Forum on Financial Mathematics and Financial Technology. |
title_sort |
proceedings of the second international forum on financial mathematics and financial technology. |
series |
Financial Mathematics and Fintech Series |
series2 |
Financial Mathematics and Fintech Series |
publisher |
Springer, |
publishDate |
2023 |
physical |
1 online resource (242 pages) |
edition |
1st ed. |
contents |
Intro -- Preface -- Contents -- On the Development of Fintech in Asia -- 1 Overview of Global Fintech Development -- 1.1 Development Dynamics -- 1.2 The Financing Profile -- 1.3 Regulatory Environment -- 1.4 The Models of Fintech Development -- 1.5 Spatial Layout -- 2 Practice of Fintech Development in Asia -- 2.1 China-The Fintech Has Been Promoted to the Worlds Leading Level -- 2.2 Japan-Boosting the Rapid Growth of Fintech Through Advantages of Backwardness -- 2.3 Singapore-Gathering Innovative Resources with a Relaxed and Inclusive Atmosphere -- 2.4 South Korea-Promoting Scale Development of Fintech Industry by Fanning Out From Point to Area -- 2.5 KazakhstanCDigital Transformation Speeds Up the Construction of Central Asian Fintech Hub -- 2.6 India-Potential for Fintech Development Has Been Gradually Exerted -- 2.7 Israel-Guidance Plus Service to Create a Highland for the Development of Fintech -- 2.8 Indonesia-A Rising Star of Fintech Development in Southeast Asia -- 2.9 Hong Kong of China-The Government Assists the Strong Development of Fintech -- A Probability Inequality with Application to Lattice Theory -- 1 Introduction -- 2 Main Results -- 3 Conclusions -- References -- Robust Identification of Gene-Environment Interactions Under High-Dimensional Accelerated Failure Time Models -- 1 Introduction -- 2 Methods -- 2.1 Data and Model Settings -- 2.2 Robust Estimation and Identification -- 2.3 Computation -- 2.4 Consistency Properties -- 3 Simulations -- 4 Analysis of the TCGA Lung Adenocarcinoma Data -- 5 Discussions -- References -- A Novel Approach for Improving Accuracy for Distributed Storage Networks -- 1 Introduction -- 2 Related Works -- 2.1 Audit Research -- 2.2 Distributed Storage Project -- 3 Audit Algorithm -- 3.1 An Audit Framework -- 3.2 Data Uploading -- 3.3 Self-integrity Verification. 3.4 Data Owner's Integrity Verification -- 3.5 The Game of Miners Versus Storage Networks -- 4 Fault-Tolerance Verification -- 5 Concluding Remarks -- References -- Iterative Learning Control Based on Random Variance Reduction Gradient Method -- 1 Introduction -- 1.1 Background -- 1.2 Design and Analysis of SVRG-Based ILC -- 1.3 Main Work and Organization -- 2 SVRG-Based ILC Framework -- 2.1 System Description -- 2.2 Algorithm Design -- 2.3 Convergence Analysis -- 3 SVRG-Based ILC Under Random Data Dropouts -- 3.1 System Description -- 3.2 Algorithm Design -- 3.3 Convergence Analysis -- 3.4 Numerical Simulation -- 4 Model-Free SVRG-Based ILC for MIMO Systems -- 4.1 System Description -- 4.2 Algorithm Design -- 4.3 Convergence Analysis -- 4.4 Numerical Simulation -- 5 Conclusions -- References -- A Generalization of NTRUEncrypt -- 1 φ-Cyclic Code -- 2 A Generalization of NTRUEncrypt -- References -- Cyclic Lattices, Ideal Lattices, and Bounds for the Smoothing Parameter -- 1 Discrete Subgroup in mathbbRn -- 2 Ideal Matrices -- 3 Cyclic Lattices and Ideal Lattices -- 4 Smoothing Parameter -- References -- On the LWE Cryptosystem with More General Disturbance -- 1 Introduction -- 1.1 Innovation and Contribution -- 2 Methodology -- 2.1 Preliminary Property -- 2.2 Probability of Decryption Error Based on Gaussian Disturbance -- 2.3 Probability of Decryption Error for General Disturbance -- 3 Results and Conclusions -- 4 Discussions -- 4.1 Future Work -- References -- On the High Dimensional RSA Algorithm-A Public Key Cryptosystem Based on Lattice and Algebraic Number Theory -- 1 Introduction -- 2 Ideal Matrices -- 3 High Dimensional RSA -- 4 Security and Example -- References -- Central Bank Digital Currency Cross-Border Payment Model Based on Blockchain Technology -- 1 Introduction -- 2 CBDC Cross-Border Payment Development Current Situation. 3 Polkadot Technology Overview -- 3.1 Relay Chain and Parachain Technology -- 3.2 Polkadot Cross-Chain Technology -- 4 CBDC Cross-Border Payment Model -- 4.1 Design of Parachain -- 4.2 Design of Relay chain -- 4.3 Cross-Chain Transaction -- 4.4 Privacy Protection -- 5 CBDC Cross-Border Payment Model Architecture -- 6 Summary and Prospect -- References -- LLE Based K-Nearest Neighbor Smoothing for scRNA-Seq Data Imputation -- 1 Introduction -- 2 Materials and Methods -- 2.1 The K-Nearest Neighbor Smoothing Algorithm -- 2.2 Locally Linear Embedding -- 3 Results -- 3.1 Availability of Data -- 3.2 Data Processing and Visualization -- 3.3 Performance Evaluation -- 4 Conclusions -- References -- The Application of Time Series Analysis in the Fiscal Budget Variance of China -- 1 Introduction -- 2 A General View on Budget Data -- 2.1 Introduction to Concept and Data Source -- 2.2 Descriptive Analysis of Budget Variance -- 2.3 Descriptive Analysis of Budget Execution -- 3 Overview of Time Series Analysis Techniques -- 3.1 Decomposition of Time Series -- 3.2 ARIMA (p,d,q) -- 3.3 SARIMA (p,d,q) (P,D,Q)s -- 4 Modeling of Budget Variance -- 4.1 Prediction of Budget Execution -- 4.2 Prediction of Budget Variance -- 5 Conclusion -- References. |
isbn |
9789819923663 9789819923656 |
callnumber-first |
H - Social Science |
callnumber-subject |
HG - Finance |
callnumber-label |
HG1-9999 |
callnumber-sort |
HG 11 49999 |
genre |
Electronic books. |
genre_facet |
Electronic books. |
url |
https://ebookcentral.proquest.com/lib/oeawat/detail.action?docID=30663090 |
illustrated |
Not Illustrated |
oclc_num |
1392089192 |
work_keys_str_mv |
AT zhengzhiyong proceedingsofthesecondinternationalforumonfinancialmathematicsandfinancialtechnology |
status_str |
n |
ids_txt_mv |
(MiAaPQ)50030663090 (Au-PeEL)EBL30663090 (OCoLC)1392089192 |
carrierType_str_mv |
cr |
hierarchy_parent_title |
Financial Mathematics and Fintech Series |
is_hierarchy_title |
Proceedings of the Second International Forum on Financial Mathematics and Financial Technology. |
container_title |
Financial Mathematics and Fintech Series |
_version_ |
1792331071329665024 |
fullrecord |
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>06648nam a22004213i 4500</leader><controlfield tag="001">50030663090</controlfield><controlfield tag="003">MiAaPQ</controlfield><controlfield tag="005">20240229073851.0</controlfield><controlfield tag="006">m o d | </controlfield><controlfield tag="007">cr cnu||||||||</controlfield><controlfield tag="008">240229s2023 xx o ||||0 eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9789819923663</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9789819923656</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(MiAaPQ)50030663090</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(Au-PeEL)EBL30663090</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1392089192</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">MiAaPQ</subfield><subfield code="b">eng</subfield><subfield code="e">rda</subfield><subfield code="e">pn</subfield><subfield code="c">MiAaPQ</subfield><subfield code="d">MiAaPQ</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">HG1-9999</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Zheng, Zhiyong.</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Proceedings of the Second International Forum on Financial Mathematics and Financial Technology.</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">1st ed.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Singapore :</subfield><subfield code="b">Springer,</subfield><subfield code="c">2023.</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">©2023.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (242 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Financial Mathematics and Fintech Series</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Intro -- Preface -- Contents -- On the Development of Fintech in Asia -- 1 Overview of Global Fintech Development -- 1.1 Development Dynamics -- 1.2 The Financing Profile -- 1.3 Regulatory Environment -- 1.4 The Models of Fintech Development -- 1.5 Spatial Layout -- 2 Practice of Fintech Development in Asia -- 2.1 China-The Fintech Has Been Promoted to the Worlds Leading Level -- 2.2 Japan-Boosting the Rapid Growth of Fintech Through Advantages of Backwardness -- 2.3 Singapore-Gathering Innovative Resources with a Relaxed and Inclusive Atmosphere -- 2.4 South Korea-Promoting Scale Development of Fintech Industry by Fanning Out From Point to Area -- 2.5 KazakhstanCDigital Transformation Speeds Up the Construction of Central Asian Fintech Hub -- 2.6 India-Potential for Fintech Development Has Been Gradually Exerted -- 2.7 Israel-Guidance Plus Service to Create a Highland for the Development of Fintech -- 2.8 Indonesia-A Rising Star of Fintech Development in Southeast Asia -- 2.9 Hong Kong of China-The Government Assists the Strong Development of Fintech -- A Probability Inequality with Application to Lattice Theory -- 1 Introduction -- 2 Main Results -- 3 Conclusions -- References -- Robust Identification of Gene-Environment Interactions Under High-Dimensional Accelerated Failure Time Models -- 1 Introduction -- 2 Methods -- 2.1 Data and Model Settings -- 2.2 Robust Estimation and Identification -- 2.3 Computation -- 2.4 Consistency Properties -- 3 Simulations -- 4 Analysis of the TCGA Lung Adenocarcinoma Data -- 5 Discussions -- References -- A Novel Approach for Improving Accuracy for Distributed Storage Networks -- 1 Introduction -- 2 Related Works -- 2.1 Audit Research -- 2.2 Distributed Storage Project -- 3 Audit Algorithm -- 3.1 An Audit Framework -- 3.2 Data Uploading -- 3.3 Self-integrity Verification.</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">3.4 Data Owner's Integrity Verification -- 3.5 The Game of Miners Versus Storage Networks -- 4 Fault-Tolerance Verification -- 5 Concluding Remarks -- References -- Iterative Learning Control Based on Random Variance Reduction Gradient Method -- 1 Introduction -- 1.1 Background -- 1.2 Design and Analysis of SVRG-Based ILC -- 1.3 Main Work and Organization -- 2 SVRG-Based ILC Framework -- 2.1 System Description -- 2.2 Algorithm Design -- 2.3 Convergence Analysis -- 3 SVRG-Based ILC Under Random Data Dropouts -- 3.1 System Description -- 3.2 Algorithm Design -- 3.3 Convergence Analysis -- 3.4 Numerical Simulation -- 4 Model-Free SVRG-Based ILC for MIMO Systems -- 4.1 System Description -- 4.2 Algorithm Design -- 4.3 Convergence Analysis -- 4.4 Numerical Simulation -- 5 Conclusions -- References -- A Generalization of NTRUEncrypt -- 1 φ-Cyclic Code -- 2 A Generalization of NTRUEncrypt -- References -- Cyclic Lattices, Ideal Lattices, and Bounds for the Smoothing Parameter -- 1 Discrete Subgroup in mathbbRn -- 2 Ideal Matrices -- 3 Cyclic Lattices and Ideal Lattices -- 4 Smoothing Parameter -- References -- On the LWE Cryptosystem with More General Disturbance -- 1 Introduction -- 1.1 Innovation and Contribution -- 2 Methodology -- 2.1 Preliminary Property -- 2.2 Probability of Decryption Error Based on Gaussian Disturbance -- 2.3 Probability of Decryption Error for General Disturbance -- 3 Results and Conclusions -- 4 Discussions -- 4.1 Future Work -- References -- On the High Dimensional RSA Algorithm-A Public Key Cryptosystem Based on Lattice and Algebraic Number Theory -- 1 Introduction -- 2 Ideal Matrices -- 3 High Dimensional RSA -- 4 Security and Example -- References -- Central Bank Digital Currency Cross-Border Payment Model Based on Blockchain Technology -- 1 Introduction -- 2 CBDC Cross-Border Payment Development Current Situation.</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">3 Polkadot Technology Overview -- 3.1 Relay Chain and Parachain Technology -- 3.2 Polkadot Cross-Chain Technology -- 4 CBDC Cross-Border Payment Model -- 4.1 Design of Parachain -- 4.2 Design of Relay chain -- 4.3 Cross-Chain Transaction -- 4.4 Privacy Protection -- 5 CBDC Cross-Border Payment Model Architecture -- 6 Summary and Prospect -- References -- LLE Based K-Nearest Neighbor Smoothing for scRNA-Seq Data Imputation -- 1 Introduction -- 2 Materials and Methods -- 2.1 The K-Nearest Neighbor Smoothing Algorithm -- 2.2 Locally Linear Embedding -- 3 Results -- 3.1 Availability of Data -- 3.2 Data Processing and Visualization -- 3.3 Performance Evaluation -- 4 Conclusions -- References -- The Application of Time Series Analysis in the Fiscal Budget Variance of China -- 1 Introduction -- 2 A General View on Budget Data -- 2.1 Introduction to Concept and Data Source -- 2.2 Descriptive Analysis of Budget Variance -- 2.3 Descriptive Analysis of Budget Execution -- 3 Overview of Time Series Analysis Techniques -- 3.1 Decomposition of Time Series -- 3.2 ARIMA (p,d,q) -- 3.3 SARIMA (p,d,q) (P,D,Q)s -- 4 Modeling of Budget Variance -- 4.1 Prediction of Budget Execution -- 4.2 Prediction of Budget Variance -- 5 Conclusion -- References.</subfield></datafield><datafield tag="588" ind1=" " ind2=" "><subfield code="a">Description based on publisher supplied metadata and other sources.</subfield></datafield><datafield tag="590" ind1=" " ind2=" "><subfield code="a">Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2024. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries. </subfield></datafield><datafield tag="655" ind1=" " ind2="4"><subfield code="a">Electronic books.</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="a">Zheng, Zhiyong</subfield><subfield code="t">Proceedings of the Second International Forum on Financial Mathematics and Financial Technology</subfield><subfield code="d">Singapore : Springer,c2023</subfield><subfield code="z">9789819923656</subfield></datafield><datafield tag="797" ind1="2" ind2=" "><subfield code="a">ProQuest (Firm)</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Financial Mathematics and Fintech Series</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://ebookcentral.proquest.com/lib/oeawat/detail.action?docID=30663090</subfield><subfield code="z">Click to View</subfield></datafield></record></collection> |