-
941
Partially Overlapping Ownership and Contagion in Financial Networks
Published 2017-01-01“…Both the probability and the average extent of a contagion begin to rise in 2007 prior to the US financial crisis. …”
Get full text
Article -
942
Adaptive random early detection algorithm based on network traffic level grade prediction
Published 2023-06-01“…In view of the problem that the calculation of average queue length and maximum packet drop probability in random early detection algorithm and its variants reflect the changes of network traffic slowly, an adaptive random early detection algorithm based on network traffic level grade prediction was proposed.Based on the statistical characteristics of self-similar network traffic, the transition probability table of network traffic level grade was established, and a grade prediction method of self-similar network traffic level with low complexity and high accuracy was proposed.Furthermore, the prediction results were applied to calculate the average queue length in equal interval and adjust the maximum packet drop probability.Under the condition of fixed and variable bottleneck link capacity, it is found that regardless of the degree of self-similarity of network traffic, the proposed algorithm can improve the throughput and packet loss rate, especially when the Hurst parameter is large and the traffic is light.…”
Get full text
Article -
943
Network connectivity performance for vehicular Ad Hoc networks based on channel transmission environment
Published 2016-12-01“…Form expression of the inter-vehicle connectivity probability was also derived with power probability density function and signal to noise ratio of received signals.Simulation results show that connectivity probability can be well improved with larger ratio of vehicles which transmit signals before the ratio reaches the maximum.However,negative effect will take place on vehicular connectivity when the ratio exceeds the maximum value.…”
Get full text
Article -
944
Path assessment based network admission control algorithm
Published 2010-01-01“…The local link state metrics were measured by scheduler.At the same time,the stale path state metrics could be got from the router.The basic probability assignment functions of above metrics were described by the fuzzy state variableness.The path situation and the corresponding probability could be computed through data fusion based on Dempster rule.Then the path situation with the maximum probability would be regarded as the quasi-real-time path state.Network admission decision was made based on the estimated path state.Simulations show that the link utility of proposed policy has twice as the budget based network admission control under the similar blocking rate.And the complexity of network mechanism can be decreased by adding pre-computed at the edge to achieve coreless status in multi-hop networks.…”
Get full text
Article -
945
Impacts of noise and interference on the bit error rate of the FBMC-OQAM modulation scheme in 5G systems
Published 2024-05-01“…However, it will be necessary to further optimize the method and develop algorithms for enhancing error probability in the FBMC-OQAM system under real conditions in 5G networks. …”
Get full text
Article -
946
The Effect of Musharakah and Murabaha Financing on Profitability with Non-Performing Financing as a Moderating Variable (in Sharia Business Units Registered with the Financial Serv...
Published 2024-12-01“…NPF is not able to moderate the effect of Musharakah on profitability, with a coefficient of -2.667 and a probability value of 0.013, but it is able to moderate the effect of murabahah on profitability, with a coefficient of 8.981 and a probability value of 0.000. …”
Get full text
Article -
947
Study on the Stability of the Coal Seam Floor above a Confined Aquifer Using the Structural System Reliability Method
Published 2018-01-01“…The Monte Carlo method was employed to calculate the reliability probability of each failure mode and series system. …”
Get full text
Article -
948
Prediction of Hydraulic Automatic Transmission Reliability Using Failure Data Based on Exponential Decay Oscillation Distribution Model
Published 2021-01-01“…Simultaneously, the research conclusions of this paper can provide meaningful guidance and reference for the analysis of the life distribution model of mechanical products with exponentially attenuated oscillation probability density change law.…”
Get full text
Article -
949
Fractal Statistical Study on the Strength of Jointed Rock Mass
Published 2022-01-01“…The failure probability and strength of jointed and fractured rock mass under water pressure action place important constraints on the safety and stability of rock mass engineering. …”
Get full text
Article -
950
A Data Mining Approach on Lorry Drivers Overloading in Tehran Urban Roads
Published 2020-01-01“…The results showed that the highest probability of overloading is for construction loads. …”
Get full text
Article -
951
Performance analysis of zero-forcing coordinated MIMO transmission in interference channels
Published 2012-12-01“…The performance of the zero-forcing (ZF) coordinated transmit strategy in multiple-input multiple-output (MIMO) interference channels was investigated.With the goal to derive analytical expression of its performance metric such as the sum rate and the outage probability,the asymptotic behavior of the performance metric was examined with the MIMO dimension tending to infinity.Using the random ma ix theory,an asymptotic estimate of all the eigenvalues of the effective channel matrix in the ZF coordinated transmit strategy was first proposed.Based on that,two closed-form expressions of the sum rate were derived,from which the scaling law of the sum rate with the MIMO dimension was obtained.Furthermore,using the multivariate statistics about the probability density distribution of the minimum eigenvalue of a Wishart matrix,the analytical expression of the outage probability for the coordinated transmit scheme was achieved under two special cases.Simulation results show that the proposed tical expression of the performance metric is valid not only in the large-dimension regime,but also in the normal-dimension regime.…”
Get full text
Article -
952
Performance analysis of covert wireless communication based on beam forming with noise uncertainty
Published 2020-07-01“…In order to establish covert wireless communication in Rayleigh fading environment with noise uncertainty,a scheme of downlink covert wireless communication based on complex Gaussian random coding and beam forming was adopted,and more importantly,the performance of covert wireless communication was analysed.Firstly,the covert probability of communication was analyzed by using the hypothesis test theory.Secondly,the optimal detection threshold of the illegal detection party was given and proved,and the closed expressions of the average covert probability,connection interruption probability and covert throughput of the system were further obtained.Finally,by jointly designing the transmission power and target covert rate,the optimal goal of the maximum covert throughput of the system was achieved,and the corresponding algorithm based on step search was given.The simulation results show that the beam forming technology could provide some gain for covert wireless communication.Compared with the ideal case in which the legitimate receiver is not affected by the noise uncertainty,the covert throughput in non-ideal case is significantly reduced and almost not affected by the basic noise level of the environment.…”
Get full text
Article -
953
Stochastic simulation of soil moisture dynamics in farmland in the eastern region of the Songnen Plain.
Published 2025-01-01“…The soil moisture of maize in the study area showed a certain degree of stochasticity, and the curve characteristics of the probability density function of soil moisture p(s) obtained from the simulation were very close to those of the measured p(s). …”
Get full text
Article -
954
Remote sensing image segmentation based on spatially constrained Gaussian mixture model with unknown class number
Published 2017-02-01“…In view of the traditional Gaussian mixture model (GMM),it was difficult to obtain the number of classes and sensitive to the noise.A remote sensing image segmentation method based on spatially constrained GMM with unknown number of classes was proposed.First,in the built GMM,prior probability that represented the membership between a pixel and one class was modeled as a Markov random field (MRF).In order to improve the sensitivity of noise,the smoothing factor was defined by combining the a posterior probability and the prior probability of neighboring pixels.For estimating the number of classes and the parameters of model,the reversible jump Markov chain Monte Carlo (RJMCMC) and maximum likelihood (ML) estimation were employed,respectively.Finally,by minimizing the smoothing factor the final segmentation was obtained.In order to verify the proposed segmentation method,the synthetic and real panchromatic images were tested.The experimental results show that the proposed method is feasible and effective.…”
Get full text
Article -
955
A Novel Adaptive Probabilistic Nonlinear Denoising Approach for Enhancing PET Data Sinogram
Published 2013-01-01“…The edge-stopping function is computed in terms of edge probability under the assumption of contamination by Poisson noise. …”
Get full text
Article -
956
Risk Evaluation of Urban Integrated Pipe Corridor Operation and Maintenance Based on Improved AHP-CIM Model
Published 2022-01-01“…The results show that the overall O&M risk level of this integrated pipe corridor is high, and its probability is 69.47%.…”
Get full text
Article -
957
Nonfragile Gain-Scheduled Control for Discrete-Time Stochastic Systems with Randomly Occurring Sensor Saturations
Published 2013-01-01“…The considered sensor saturation phenomenon is assumed to occur in a random way based on the time-varying Bernoulli distribution with measurable probability in real time. The aim of the paper is to design a nonfragile gain-scheduled controller with probability-dependent gains which can be achieved by solving a convex optimization problem via semidefinite programming method. …”
Get full text
Article -
958
Digital Finance and Firm Exit: Mathematical Model and Empirical Evidence from Industrial Firms
Published 2021-01-01“…The results show that digital financial development significantly suppresses firm exit probability. Mechanism analysis suggests that digital financial development can ease the information asymmetry of the credit market, facilitate the credit acquisition of firms, and alleviate the constraint on corporate financing, thereby reducing the probability of firm exit. …”
Get full text
Article -
959
Collision analysis of the GMR-2 cipher used in the satellite phone
Published 2018-02-01“…A collision property analysis of the GMR-2 cipher used in the satellite phone was presented.By using the F-component as a bridge,the link between the difference of the key byte and the collision of the output ofFas well as the link between the collision of the output of F and the collision of keystream byte were analyzed,which finally revealed the relationship between the difference of the original key byte and the keystream collision.The theoretical analysis showed that for a random frame number,a special chosen key pair could lead to a keystream collision with a high probability,when the key pair has only one byte difference in which the most significant 4 bit of the difference was equal to the last significant 4 bit.The experimental result shows that the keystream collision probability is 2<sup>−8.248</sup>,which is far higher than the ideal collision probability 2<sup>−120</sup>.This proves once again,that there exists serious potential security hazards in the GMR-2 cipher.…”
Get full text
Article -
960
Design and implementation of spam filtering system based on topic model
Published 2017-11-01“…Spam filtering technology plays a key role in many areas including information security,transmission efficiency,and automatic information classification.However,the emergence of spam affects the user's sense of experience,and can cause unnecessary economic and time loss.The deficiency of spam filtering technology was researched,and a method of spam classification based on naive Bayesian was put forward based on multiple keywords.In the subject of mail,the theme model was used by LDA to get the related subject and keyword of the message,and Word2Vec was further used to search keyword synonyms and related words,extending the keyword collection.In the classification of mails,the transcendental probability of the words in the training dataset was obtained by statistical learning.Based on the extended keyword collection and its probability,the joint probability of a subject and a message was deduced by the Bayesian formula as a basis for the spam judgment.At the same time,the spam filtering system based on topic model was simple and easy to apply.By comparing experiments with other typical spam filtering method,it is proved that the method of spam classification based on theme model and the improved method based on Word2Vec can effectively improve the accuracy of spam filtering.…”
Get full text
Article