Showing 941 - 960 results of 7,333 for search '"probability"', query time: 0.05s Refine Results
  1. 941

    Partially Overlapping Ownership and Contagion in Financial Networks by Micah Pollak, Yuanying Guan

    Published 2017-01-01
    “…Both the probability and the average extent of a contagion begin to rise in 2007 prior to the US financial crisis. …”
    Get full text
    Article
  2. 942

    Adaptive random early detection algorithm based on network traffic level grade prediction by Debin WEI, Chengsheng PAN, Li YANG, Zuoren YAN

    Published 2023-06-01
    “…In view of the problem that the calculation of average queue length and maximum packet drop probability in random early detection algorithm and its variants reflect the changes of network traffic slowly, an adaptive random early detection algorithm based on network traffic level grade prediction was proposed.Based on the statistical characteristics of self-similar network traffic, the transition probability table of network traffic level grade was established, and a grade prediction method of self-similar network traffic level with low complexity and high accuracy was proposed.Furthermore, the prediction results were applied to calculate the average queue length in equal interval and adjust the maximum packet drop probability.Under the condition of fixed and variable bottleneck link capacity, it is found that regardless of the degree of self-similarity of network traffic, the proposed algorithm can improve the throughput and packet loss rate, especially when the Hurst parameter is large and the traffic is light.…”
    Get full text
    Article
  3. 943

    Network connectivity performance for vehicular Ad Hoc networks based on channel transmission environment by Yang LI, Haitao ZHAO, Zihao TANG, Yuting ZHANG

    Published 2016-12-01
    “…Form expression of the inter-vehicle connectivity probability was also derived with power probability density function and signal to noise ratio of received signals.Simulation results show that connectivity probability can be well improved with larger ratio of vehicles which transmit signals before the ratio reaches the maximum.However,negative effect will take place on vehicular connectivity when the ratio exceeds the maximum value.…”
    Get full text
    Article
  4. 944

    Path assessment based network admission control algorithm by QIU Gong-an1, XU Chen1, ZHANG Guo-an1, BAO Zhi-hua1

    Published 2010-01-01
    “…The local link state metrics were measured by scheduler.At the same time,the stale path state metrics could be got from the router.The basic probability assignment functions of above metrics were described by the fuzzy state variableness.The path situation and the corresponding probability could be computed through data fusion based on Dempster rule.Then the path situation with the maximum probability would be regarded as the quasi-real-time path state.Network admission decision was made based on the estimated path state.Simulations show that the link utility of proposed policy has twice as the budget based network admission control under the similar blocking rate.And the complexity of network mechanism can be decreased by adding pre-computed at the edge to achieve coreless status in multi-hop networks.…”
    Get full text
    Article
  5. 945

    Impacts of noise and interference on the bit error rate of the FBMC-OQAM modulation scheme in 5G systems by A. Androon, O. V. Tikhonova

    Published 2024-05-01
    “…However, it will be necessary to further optimize the method and develop algorithms for enhancing error probability in the FBMC-OQAM system under real conditions in 5G networks. …”
    Get full text
    Article
  6. 946

    The Effect of Musharakah and Murabaha Financing on Profitability with Non-Performing Financing as a Moderating Variable (in Sharia Business Units Registered with the Financial Serv... by Awin Rahma Zulvia, Oyong Lisa, Djuni Farhan

    Published 2024-12-01
    “…NPF is not able to moderate the effect of Musharakah on profitability, with a coefficient of -2.667 and a probability value of 0.013, but it is able to moderate the effect of murabahah on profitability, with a coefficient of 8.981 and a probability value of 0.000. …”
    Get full text
    Article
  7. 947

    Study on the Stability of the Coal Seam Floor above a Confined Aquifer Using the Structural System Reliability Method by Haifeng Lu, Xiuyu Liang, Nan Shan, You-Kuan Zhang

    Published 2018-01-01
    “…The Monte Carlo method was employed to calculate the reliability probability of each failure mode and series system. …”
    Get full text
    Article
  8. 948

    Prediction of Hydraulic Automatic Transmission Reliability Using Failure Data Based on Exponential Decay Oscillation Distribution Model by Yongming Liu, Guowen Ye, Zhuanzhe Zhao

    Published 2021-01-01
    “…Simultaneously, the research conclusions of this paper can provide meaningful guidance and reference for the analysis of the life distribution model of mechanical products with exponentially attenuated oscillation probability density change law.…”
    Get full text
    Article
  9. 949

    Fractal Statistical Study on the Strength of Jointed Rock Mass by Fangtao Li, Zhiping Hu, Xiang Ren, Jiakuan Ma, Xuexu An, Yunxin Zheng, Yonghui Zhang

    Published 2022-01-01
    “…The failure probability and strength of jointed and fractured rock mass under water pressure action place important constraints on the safety and stability of rock mass engineering. …”
    Get full text
    Article
  10. 950

    A Data Mining Approach on Lorry Drivers Overloading in Tehran Urban Roads by Ehsan Ayazi, Abdolreza Sheikholeslami

    Published 2020-01-01
    “…The results showed that the highest probability of overloading is for construction loads. …”
    Get full text
    Article
  11. 951

    Performance analysis of zero-forcing coordinated MIMO transmission in interference channels by Hai-rong WANG, Jian DONG, Yong-ming HUANG, ANGLV-xi Y

    Published 2012-12-01
    “…The performance of the zero-forcing (ZF) coordinated transmit strategy in multiple-input multiple-output (MIMO) interference channels was investigated.With the goal to derive analytical expression of its performance metric such as the sum rate and the outage probability,the asymptotic behavior of the performance metric was examined with the MIMO dimension tending to infinity.Using the random ma ix theory,an asymptotic estimate of all the eigenvalues of the effective channel matrix in the ZF coordinated transmit strategy was first proposed.Based on that,two closed-form expressions of the sum rate were derived,from which the scaling law of the sum rate with the MIMO dimension was obtained.Furthermore,using the multivariate statistics about the probability density distribution of the minimum eigenvalue of a Wishart matrix,the analytical expression of the outage probability for the coordinated transmit scheme was achieved under two special cases.Simulation results show that the proposed tical expression of the performance metric is valid not only in the large-dimension regime,but also in the normal-dimension regime.…”
    Get full text
    Article
  12. 952

    Performance analysis of covert wireless communication based on beam forming with noise uncertainty by Yuda LIN, Liang JIN, You ZHOU, Yangming LOU

    Published 2020-07-01
    “…In order to establish covert wireless communication in Rayleigh fading environment with noise uncertainty,a scheme of downlink covert wireless communication based on complex Gaussian random coding and beam forming was adopted,and more importantly,the performance of covert wireless communication was analysed.Firstly,the covert probability of communication was analyzed by using the hypothesis test theory.Secondly,the optimal detection threshold of the illegal detection party was given and proved,and the closed expressions of the average covert probability,connection interruption probability and covert throughput of the system were further obtained.Finally,by jointly designing the transmission power and target covert rate,the optimal goal of the maximum covert throughput of the system was achieved,and the corresponding algorithm based on step search was given.The simulation results show that the beam forming technology could provide some gain for covert wireless communication.Compared with the ideal case in which the legitimate receiver is not affected by the noise uncertainty,the covert throughput in non-ideal case is significantly reduced and almost not affected by the basic noise level of the environment.…”
    Get full text
    Article
  13. 953

    Stochastic simulation of soil moisture dynamics in farmland in the eastern region of the Songnen Plain. by Bo Meng, Jin Wang, Fanxiang Meng, Ennan Zheng, Tianxiao Li, Bowen Tang

    Published 2025-01-01
    “…The soil moisture of maize in the study area showed a certain degree of stochasticity, and the curve characteristics of the probability density function of soil moisture p(s) obtained from the simulation were very close to those of the measured p(s). …”
    Get full text
    Article
  14. 954

    Remote sensing image segmentation based on spatially constrained Gaussian mixture model with unknown class number by Quan-hua ZHAO, Xue SHI, Yu WANG, Yu LI

    Published 2017-02-01
    “…In view of the traditional Gaussian mixture model (GMM),it was difficult to obtain the number of classes and sensitive to the noise.A remote sensing image segmentation method based on spatially constrained GMM with unknown number of classes was proposed.First,in the built GMM,prior probability that represented the membership between a pixel and one class was modeled as a Markov random field (MRF).In order to improve the sensitivity of noise,the smoothing factor was defined by combining the a posterior probability and the prior probability of neighboring pixels.For estimating the number of classes and the parameters of model,the reversible jump Markov chain Monte Carlo (RJMCMC) and maximum likelihood (ML) estimation were employed,respectively.Finally,by minimizing the smoothing factor the final segmentation was obtained.In order to verify the proposed segmentation method,the synthetic and real panchromatic images were tested.The experimental results show that the proposed method is feasible and effective.…”
    Get full text
    Article
  15. 955

    A Novel Adaptive Probabilistic Nonlinear Denoising Approach for Enhancing PET Data Sinogram by Musa Alrefaya, Hichem Sahli

    Published 2013-01-01
    “…The edge-stopping function is computed in terms of edge probability under the assumption of contamination by Poisson noise. …”
    Get full text
    Article
  16. 956

    Risk Evaluation of Urban Integrated Pipe Corridor Operation and Maintenance Based on Improved AHP-CIM Model by Shuai Wang, Shaochuan Fu

    Published 2022-01-01
    “…The results show that the overall O&M risk level of this integrated pipe corridor is high, and its probability is 69.47%.…”
    Get full text
    Article
  17. 957

    Nonfragile Gain-Scheduled Control for Discrete-Time Stochastic Systems with Randomly Occurring Sensor Saturations by Wangyan Li, Guoliang Wei, Hamid Reza Karimi, Xiaohui Liu

    Published 2013-01-01
    “…The considered sensor saturation phenomenon is assumed to occur in a random way based on the time-varying Bernoulli distribution with measurable probability in real time. The aim of the paper is to design a nonfragile gain-scheduled controller with probability-dependent gains which can be achieved by solving a convex optimization problem via semidefinite programming method. …”
    Get full text
    Article
  18. 958

    Digital Finance and Firm Exit: Mathematical Model and Empirical Evidence from Industrial Firms by Fenfen Ma, Linxing Lei, Ziyang Chen, Mancang Wang

    Published 2021-01-01
    “…The results show that digital financial development significantly suppresses firm exit probability. Mechanism analysis suggests that digital financial development can ease the information asymmetry of the credit market, facilitate the credit acquisition of firms, and alleviate the constraint on corporate financing, thereby reducing the probability of firm exit. …”
    Get full text
    Article
  19. 959

    Collision analysis of the GMR-2 cipher used in the satellite phone by Ruilin LI, Jiao HU, Chaojing TANG

    Published 2018-02-01
    “…A collision property analysis of the GMR-2 cipher used in the satellite phone was presented.By using the F-component as a bridge,the link between the difference of the key byte and the collision of the output ofFas well as the link between the collision of the output of F and the collision of keystream byte were analyzed,which finally revealed the relationship between the difference of the original key byte and the keystream collision.The theoretical analysis showed that for a random frame number,a special chosen key pair could lead to a keystream collision with a high probability,when the key pair has only one byte difference in which the most significant 4 bit of the difference was equal to the last significant 4 bit.The experimental result shows that the keystream collision probability is 2<sup>−8.248</sup>,which is far higher than the ideal collision probability 2<sup>−120</sup>.This proves once again,that there exists serious potential security hazards in the GMR-2 cipher.…”
    Get full text
    Article
  20. 960

    Design and implementation of spam filtering system based on topic model by Xiaohuai KOU, Hua CHENG

    Published 2017-11-01
    “…Spam filtering technology plays a key role in many areas including information security,transmission efficiency,and automatic information classification.However,the emergence of spam affects the user's sense of experience,and can cause unnecessary economic and time loss.The deficiency of spam filtering technology was researched,and a method of spam classification based on naive Bayesian was put forward based on multiple keywords.In the subject of mail,the theme model was used by LDA to get the related subject and keyword of the message,and Word2Vec was further used to search keyword synonyms and related words,extending the keyword collection.In the classification of mails,the transcendental probability of the words in the training dataset was obtained by statistical learning.Based on the extended keyword collection and its probability,the joint probability of a subject and a message was deduced by the Bayesian formula as a basis for the spam judgment.At the same time,the spam filtering system based on topic model was simple and easy to apply.By comparing experiments with other typical spam filtering method,it is proved that the method of spam classification based on theme model and the improved method based on Word2Vec can effectively improve the accuracy of spam filtering.…”
    Get full text
    Article