-
1181
A Stochastic Decision Support System for Economic Order Quantity Problem
Published 2012-01-01“…Obtained probability distribution functions of the decision variables and the objective function are used as optimum knowledge to design a new probabilistic rule base (PRB) as a decision support system for EOQ model. …”
Get full text
Article -
1182
Multi relay node selection strategy for energy capture collaborative relay network
Published 2017-11-01“…An energy capture cooperative relay network was studied.Unlike traditional cooperative relay networks,the relay nodes generally did not have a fixed energy supply but could carry out energy capture.For this network,a natural question was how to determine whether the relay nodes perform energy capture or data forwarding,and how to select the relay node to assist the information transmission between the source node and the destination node.Based on this problem,a multi-relay node selection scheme was proposed,which select the operation according to the energy of the current time slot of the relay node.In each time slot,the relay node that meet the battery threshold requirements was selected to assist in transmission.The Markov chain was used to model the charging and discharging process of the relay node battery,and the probability of interruption and throughput of the wireless network was obtained.And the value of the battery threshold when the throughput was maximized,that is,when the probability of network breakage was minimum was solved.Finally,the advantages of this scheme were verified by numerical experiments.…”
Get full text
Article -
1183
Outage performance of multi-RIS-assisted NOMA system with imperfect serial interference cancellation
Published 2024-03-01“…Considering the practical communication environments, the outage performance and the throughput were investigated for multiple reconfigurable intelligent surfaces (RIS) assisted non-orthogonal multiple access (NOMA) system with imperfect serial interference cancellation (SIC).The channel coefficients of the RIS-assisted NOMA system including the direct and the reflecting paths were approximated by Gamma distribution.An approximate closed-form expressions of outage probability were derived and validated through Monte Carlo simulations.The study investigated the relationship between the outage performance and system parameters, including the impact of imperfect SIC, the number of RIS and the number of reflecting units.The simulation results demonstrate that, compared with the single RIS-assisted NOMA and the traditional NOMA system, the multi-RIS-assisted system achieves a 14.2 dBm gain in signal-to-noise ratio (SNR) for a given outage probability.Thus, employing multiple RISs can improve the outage performance and the system throughput effectively, thereby compensating for the performance degradation caused by imperfect SIC.…”
Get full text
Article -
1184
Se sentir capable de rester dans son emploi jusqu’à la retraite ?
Published 2005-02-01“…But the results stress the important role played by variables relating to the meaning of work (such as work allows yo uto learn or having the means to do quality work).Five years later, employees 52 years of age who had answered in 1996 that they do not feel capable of remaining in their job until retirement have (everything being equal) a higher probability of not being employed either due to retirement or pre-retirement, or due to unemployment or inability; at 32 or 42 years of age, they have a higher probability of having changed jobs or being unemployed.…”
Get full text
Article -
1185
Fragility Assesment of Mid-Rise RC Building using HAZUS Method in High Seismic Zone
Published 2023-08-01“…These fragility curves was developed by HAZUS method that present the probability of the structure damage due to various ground shaking or lateral displacement of the building. …”
Get full text
Article -
1186
Cognitive Radio Spectrum Sensing-Based QAM Technique Using Blockchain
Published 2023-01-01“…To address ambiguity, the M-ary QAM technique is provided, which increases aggregate effectiveness in terms of the percentage of false alarm (Pf) and probability of missed detection (Pm) by 5% at a comparable delay period. …”
Get full text
Article -
1187
Key path analysis method for large-scale industrial control network
Published 2021-12-01“…In order to solve the problem of high time-consuming and resource-consuming quantitative calculation of large-scale industrial control network attack graphs, a key path analysis method for large-scale industrial control networks was proposed.Firstly, the idea of cut set was used to calculate the key nodes set of Bayesian attack graph by combining the atomic attack income in industrial control network, which solved the problem that the current cut set algorithm only considers the key nodes in graph structure.Secondly, a dynamic updating strategy of Bayesian attack graph which only updated the attack probability of key nodes was proposed to efficiently calculate the attack probability of the whole graph and analyze the key path of attack graph.The experimental results show that the proposed method can not only ensure the reliability of the calculation results of large-scale industrial control attack graphs, but also can significantly reduce the time consumption and have a significant improvement in the calculation efficiency.…”
Get full text
Article -
1188
DHRCA: A Design of Security Architecture Based on Dynamic Heterogeneous Redundant for System on Wafer
Published 2024-01-01“…The simulation results based on the GSCPN model show that our method can improve the system security probability to 0.8690 and the system availability probability to 0.9750 in the steady state compared with typical triple-mode redundancy and runtime monitoring methods. …”
Get full text
Article -
1189
Rational analysis of authentication protocols based on NGUYEN L H scheme
Published 2013-08-01“…Using the ideas of game theory,NGUYEN L H transformed two families of authentication protocols where the honest party transmitted some useless data with probability α before the normal protocol run,so that even if an attacker attacks a protocol,the attacker’s payoff will still be lower than that when it does not.In such a way,the security of the protocol was guaranteed.However,this scheme suffers from two shortcomings:the considered is too attacker powerful,and only its payoff was considered and the cost of the attacks was ignored; the situation in which the honest node would choose to send useless data was not considered.To improve this scheme,the value of α,with the consideration of the attack cost,of which the value is more general was given.What’s more,the attack probability β was introduced.Based on this,the precondition that the honest node transmits the useless data was presented,as well as the value of α under the different β values.Compared with the original scheme,this results are more generic and comprehensive.Meanwhile,through a case analysis in the P2P network,the correctness of the conclusion is proved.…”
Get full text
Article -
1190
A Network-Based Dynamic Analysis in an Equity Stock Market
Published 2017-01-01“…We study how changes in the structure of a brokers’ transaction network affect the probability with which the returns and volume of the traded financial assets change significantly. …”
Get full text
Article -
1191
Vertical handoff research based on cognitive self-selection decision tree
Published 2013-11-01“…Firstly, according to the signal strength, transmission rate, bit error rate, blocking probability and movement trend, the respective handoff probability distribution of them was established and the decisions through the self-selection decision tree was made. …”
Get full text
Article -
1192
Deep reinforcement learning for time-critical wilderness search and rescue using drones
Published 2025-02-01“…Our approach leverages a priori data about the search area and the missing person in the form of a probability distribution map. This allows the policy to learn optimal flight paths that maximize the probability of finding the missing person quickly. …”
Get full text
Article -
1193
Effect of Spalling Shape on Meshing Stiffness and Dynamics Characteristic of Gear
Published 2020-07-01“…The method of combined probability density function with kurtosis value is proposed,and the probability density function curve is used to judge the gear fault state. …”
Get full text
Article -
1194
RESEARCH ON TIME-DEPENDENT KINEMATIC RELIABILITY BASED ON TIME DOMAIN ERROR MODEL
Published 2020-01-01“…By means of the analysis of mechanism kinematic error by probability method. Based on the theory of maximum entropy and random process,the reliability model of time-domain error is established. …”
Get full text
Article -
1195
Strategic Analysis of Retrial Queues with Setup Times, Breakdown and Repairs
Published 2023-01-01“…First, the steady-state probability of the model is obtained by using the probability generating function method. …”
Get full text
Article -
1196
Deficiencies of technical specifications in tender documentation for construction project
Published 2024-01-01“…This study aims to explore the perception of the probability of occurrence and degree of impact of errors from various perspectives including risk factors, causes, possible effects, responsibility and the role of stakeholders. …”
Get full text
Article -
1197
Mathematical model for the analysis of environmental risk factors
Published 2023-09-01“…When constructing a model, the probability of an insured event depending on time is taken into account. …”
Get full text
Article -
1198
The Credit Asset of Enterprise Accounts Receivable Pricing Model
Published 2018-01-01“…The model gave an overall evaluation on the default probability of buyer and environment, as well as buyer loss given default resulting from the factors including Seller (S), Buyer (B), and Environment (E). …”
Get full text
Article -
1199
Secure data sharing scheme supporting efficient synchronous evolution for ciphertext and key
Published 2018-05-01“…The static property of stored ciphertext in cloud increases the probability that an attacker can crack the ciphertext by obtaining a key,while ciphertext and key updates based on key distribution and re-encryption are excessively expensive.For this problem,a secure data sharing scheme supporting efficient synchronous evolution for ciphertext and key (CKSE-SDS) was proposed.By introducing cryptography accumulator in broadcast encryption,mimicry transformation factor could be constructed supporting time-hopping periodically and efficient synchronous evolution for ciphertext and key could be achieved based on dynamic segmentation and fusion of ciphertext and key,which reduced certainty in the process of encryption and key distribution and increased the difficulty for attackers exploiting security vulnerabilities to obtain key to crack ciphertext as well.Theoretical analysis and security proofs show that the proposed scheme can support secure and efficient data access as well as reduce the probability of a successful attack effectively for an attacker,which can also enhance the system’s active security defense capability.…”
Get full text
Article -
1200
PROBABILISTIC FATIGUE LIFE PREDICTION APPROACH FOR MULTI-SITE DAMAGE COMPONENTS
Published 2015-01-01“…Fatigue is a phenomenon of high uncertainty,especially for components with multiple damage sites.The fatigue life( either mean value or probability distribution of the random variable) of a complex component with multiple damage sites is not equal to that of a simple component with only one damage site.A multi-site damage component is a series system with many weak links( damage sites) in probability sense.A probabilistic fatigue life prediction model for multi-site damage component is presented based on a systematic thought,as well as the order statistics and extreme statistics concept.Such developed model can naturally reflect the effect of the dependence among different damage sites.Experimental result and the example on multi-site damage component fatigue life prediction shows that the fatigue life of a multi-site damage component is much lower than that of a single site damage component.…”
Get full text
Article