Showing 1,041 - 1,060 results of 7,333 for search '"probability"', query time: 0.05s Refine Results
  1. 1041

    Research on weakly conservative passive fault-tolerant control method considering the fault distribution by Dan Du, Zetao Li

    Published 2025-01-01
    “…Compared to the fault parameter uncertainty domain with high probability, the corresponding upper limit constraint of the performance index is increased for the fault parameter uncertainty domain with low probability. …”
    Get full text
    Article
  2. 1042

    Application of Random Dynamic Grouping Simulation Algorithm in PE Teaching Evaluation by Haitao Hao

    Published 2021-01-01
    “…The probability ranking conclusion is an extension of the absolute form evaluation conclusion. …”
    Get full text
    Article
  3. 1043

    Log-Driven Behavior Discrimination of Process Robots Using Entropy Similarity by Lu Li, Huan Fang

    Published 2025-01-01
    “…Specifically, using the concept of log entropy, event logs are transformed to probability distributions of trace multisets and activity pairs multisets, respectively. …”
    Get full text
    Article
  4. 1044

    Migration and mutation (MeTa) hybrid trained ANN for dynamic spectrum access in wireless body area network by Geoffrey Eappen, Shankar T, Rajesh A

    Published 2025-03-01
    “…Numerical results demonstrate the superiority of the MeTa hybrid NN in terms of detection probability, false alarm probability, and convergence rate compared to existing conventional spectrum sensing schemes. …”
    Get full text
    Article
  5. 1045

    A Sensor Positioning Scheme with High Accuracy in Nonuniform Wireless Sensor Networks by Junho Park, Hyuk Park, Dong-ook Seong, Jaesoo Yoo

    Published 2013-06-01
    “…The density probability scheme estimates 1-hop distance by using communication between nodes. …”
    Get full text
    Article
  6. 1046

    Adaptive Constant False Alarm Detector Based on Composite Fuzzy Fusion Rules by Yuyao Yang, Chunbo Xiu

    Published 2025-01-01
    “…The average detection probability of CFVI-CFAR is 3.66% higher than that of the variability index heterogeneous clutter estimate modified ordered statistics CFAR (VIHCEMOS-CFAR) in a multiple-target environment, while in a clutter edge environment, the average false alarm probability of CFVI-CFAR is only 1.65% of that of VIHCEMOS-CFAR. …”
    Get full text
    Article
  7. 1047

    A Holistic Approach to the Efficient Estimation of Operational Flexibility From Distributed Resources by Nikolaos Savvopoulos, Nikos Hatziargyriou, Hannu Laaksonen

    Published 2024-01-01
    “…The scenarios are derived through sampling from a probability distribution of the renewable energy forecasts. …”
    Get full text
    Article
  8. 1048

    An Experimental Study on the Microstructures of Cemented Paste Backfill during Its Developing Process by Bo Zhang, Jie Xin, Lang Liu, Lijie Guo, Ki-Il Song

    Published 2018-01-01
    “…The porosity, fractal dimension, and probability entropy were characterized using the Particles and Pore Recognition and Analysis System (PPRAS). …”
    Get full text
    Article
  9. 1049

    GSA: node failures tolerent spatial window query processing algorithm in wireless sensor networks by LIU Liang, QIN Xiao-lin, DAI Hua, SHEN Jia-jia

    Published 2008-01-01
    “…Finally, the influence of node density, the probability of node failure, query region size on the success rate of a query and the influence of node density, query message size, sensed data size, query region size, the probability of node failure on energy consumption were analysed. …”
    Get full text
    Article
  10. 1050

    Time slot-based RED algorithm on self-similar flows:SFRED by WANG Hui, JI Zhen-zhou, SUN Yan-dong, WANG Yuan-zheng

    Published 2010-01-01
    “…Based on fractional Brownian motion(FBM),one calculation of the packet drop probability in the RED algorithm was derived under self-similar flows.Based on the self-similarity and the long-range dependence characteristics of Internet network traffics,a time slot-based RED algorithm on self-similar flows(SFRED) was proposed to the router queue management.The packet drop probability is calculated in every time-slot so that the burden is greatly reduced.It is simulated by NS2 and the experimental results show that the algorithm SFRED outperforms RED.SFRED can control the queue length under adaptive flows with a good throughput.…”
    Get full text
    Article
  11. 1051

    Hish speed deep packet inspection method with low power dissipation by ZHU Guo-sheng1, YU Shao-hua1

    Published 2011-01-01
    “…Hish speed deep packet inspection using TCAM faces the problem of high power dissipation.A 2-phase DPI method BF-TCAM was proposed.The first phase used parallel Bloom filters to exclude the normal packets not including attack signatures.The second phase used TCAM to inspect suspicious packets including real attack packets and false positive packets of the first phase.The Bloom filters’ false negative probability is zero and false positive probability is very low.Since most of the network data traffic does not include attack signatures,the method can get high speed deep packet inspection with low power dissipation.…”
    Get full text
    Article
  12. 1052

    Simulation analysis of probabilistic covert channels based on probabilistic interference by GUO Yun-chuan1, ZHOU Yuan3, DING Li3, GUO Li1

    Published 2009-01-01
    “…Bandwidth and transmission error rate has received much attention in fields of covert channels.If a system does not satisfy BSPNI,PBNDC or SPBNDC property,then probabilistic covert channels will be formed.A simulation system was built to analyze their bandwidth and transmission error rate about covert channels.For every results of simulation,detail theoretical explanations were given.The results show the bandwidth is closely related to software/hardware configuration,probability pa-rameter and scheduling times,when configurations and probability parameter are fixed,the bandwidth is inversely propor-tional to scheduling times.For the same process,the greater is scheduling times,the smaller is transmission error rate.…”
    Get full text
    Article
  13. 1053

    Improving achievable traffic load of cognitive wireless networks under GoS constraints by Liang YU, Tao JIANG, Yang CAO

    Published 2012-11-01
    “…To improve the achievable traffic load of secondary user(SU) under grade of service (GoS) constraints in cognitive wireless networks with heterogeneous traffic,a novel spectrum sharing scheme was proposed.The key idea of the proposed scheme was to introduce preemptive priority and buffering mechanism for real-time traffic and non-real-time traffic,respectively,according to their different delay characteristics.The proposed scheme could reduce the forced termination probability and the blocking probability for heterogeneous calls simultaneously.Numerical results show that the proposed scheme can effectively improve the achievable traffic load of SUs under GoS constraints.…”
    Get full text
    Article
  14. 1054

    Multi-layered based network security defense system

    Published 2007-01-01
    “…A multi-layered based network security defense system(MNSDS) was presented.MNSDS adopts multi-layered detection technology: for the detection of IP layer,aggregate-based congestion control algorithm(ABCC) was adopted,narrowing the congestion signature,and thus minimizing collateral damage;then,it employs the detection technology based on the artificial immune principle in TCP and UDP layers AIPT,and detects intrusion by creating a rule database and matching the appropriate rule.The simulation results indicate that the system not only can provide relief from DoS/DDoS attacks equally,but also resolve problems existing in the current defense systems such as low speed high false positive probability and high false positive probability,poor real-time and more artificial interventions.…”
    Get full text
    Article
  15. 1055

    Asymmetric watermarking based on Contourlet transform and subspace projection by HE Mi, CHENG Li-zhi

    Published 2009-01-01
    “…For the copyright protection of the digital image,a new asymmetric watermarking method of feature subspace projection based on Contourlet transform was presented.Embedding matrix(private key) and detecting matrix(public key) were constructed differently,where embedding matrix was kept secretly while detecting matrix was public.At the same time,the embedding matrix was independent on the host images.Robust subspace was obtained by Contourlet transformation.Using the embedding matrix,the arbitrary watermarking was embedded in the robust subspace.The de-tection function was constructed to detect whether an image had watermarking or not.The proposed method has good security,high detection probability and low false alarm probability.The stimulation shows that the proposed method is robust to many attacks.…”
    Get full text
    Article
  16. 1056

    Electronic Angular Tunneling Effect by Jorge Henrique de Oliveira Sales, Cássio Almeida Lima, Gislan Silveira Santos, Alfredo Takashi Suzuki

    Published 2022-05-01
    “… In this article we show that the probability for an electron tunneling a rectangular potential barrier depends on its angle of incidence measured with respect to the normal line. …”
    Get full text
    Article
  17. 1057

    VS-split load balancing algorithm in DHT-based P2P systems by Lei YANG, Ren-fa LI, Shi LIU, Zhi-xing CHEN, Ken-li LI

    Published 2013-12-01
    “…The method using virtual servers for balancing the load in DHT-Based P2P systems was studied.The load distribution in DHT-based overlay network using virtual servers were modeled,the occurrence probability of single vir-tual server problem (SVSP) was analyzed and computed in details,and a novel VS-split load balancing algorithm (VSSLBA) was proposed to deal with the SVSP by splitting virtual server into small ones.Simulations verify the cor-rectness of probability analysis and the performance of VSSLBA.…”
    Get full text
    Article
  18. 1058

    Traffic measurement algorithm based on least recent used and Bloom filter by Zhen ZHANG, Bin-qiang WANG, Feng-yu ZHANG, Ning-ning LIANG

    Published 2013-01-01
    “…Aiming at the naïve algorithm’s deficiency of high false negative probability,a novel scheme called LRU-BF(least recent used &Bloom filter) was presented.In order to achieve high accuracy,the algorithm adopted mechanisms of LRU eliminating and Bloom filter representation to separate the process of heavy-hitter fliteration from the heavy-hitter recognition.Based on statistical theory,analytical expressions about upper-bound error probability were deduced.Simulated results indicate that LRU-BF can achieve space saving and lower error probabilit compared with Naïve-LRU algorithm.Meanwhile,it can also support the 10Gbit/s line-speed processing.…”
    Get full text
    Article
  19. 1059

    Q-learning based handoff algorithm for satellite system with ancillary terrestrial component by Dan-ni XIONG, Yi LI

    Published 2015-09-01
    “…,mobile satellite system with ancillary terres-trial component (MSS-ATC),the long transmission delay of satellite link was a huge challenge which may lead to high handoff dropping probability.In order to address this problem,a novel handoff decision strategy was proposed based on the predictive RSS and Q-learning algorithm.Extensive simulation results demonstrate that the proposed scheme can de-crease the handoff dropping probability,reduce the unnecessary handoff times and maximize the network reward.In ad-dition,the proposed scheme can also adapt to the situation of high-speed movement very well.…”
    Get full text
    Article
  20. 1060

    Efficacy and safety of neoadjuvant immunotherapy combined with chemotherapy for stage II–IVa esophageal cancer: a network meta-analysis by Mingxing Wang, Wanhui Dong, Gongyi Wu, Baorui Zhang, Tong Lai, Aixin Liu, Qingming Sun

    Published 2025-01-01
    “…Results The cumulative ranked probability results indicated that Camrelizumab + TN had the highest probability of achieving pCR, Camrelizumab + TP of achieving MPR, and Sintilimab + TP of achieving DCR and ORR. …”
    Get full text
    Article