Showing 1,181 - 1,200 results of 7,333 for search '"probability"', query time: 0.06s Refine Results
  1. 1181

    A Stochastic Decision Support System for Economic Order Quantity Problem by Amir Yousefli, Mehdi Ghazanfari

    Published 2012-01-01
    “…Obtained probability distribution functions of the decision variables and the objective function are used as optimum knowledge to design a new probabilistic rule base (PRB) as a decision support system for EOQ model. …”
    Get full text
    Article
  2. 1182

    Multi relay node selection strategy for energy capture collaborative relay network by Xian-zhong TIAN, Min GUO, Jia-cun HE, Gao LIU, Yi-nan ZHU

    Published 2017-11-01
    “…An energy capture cooperative relay network was studied.Unlike traditional cooperative relay networks,the relay nodes generally did not have a fixed energy supply but could carry out energy capture.For this network,a natural question was how to determine whether the relay nodes perform energy capture or data forwarding,and how to select the relay node to assist the information transmission between the source node and the destination node.Based on this problem,a multi-relay node selection scheme was proposed,which select the operation according to the energy of the current time slot of the relay node.In each time slot,the relay node that meet the battery threshold requirements was selected to assist in transmission.The Markov chain was used to model the charging and discharging process of the relay node battery,and the probability of interruption and throughput of the wireless network was obtained.And the value of the battery threshold when the throughput was maximized,that is,when the probability of network breakage was minimum was solved.Finally,the advantages of this scheme were verified by numerical experiments.…”
    Get full text
    Article
  3. 1183

    Outage performance of multi-RIS-assisted NOMA system with imperfect serial interference cancellation by Jiaqing QIN, Liping LUO, Jing ZHOU

    Published 2024-03-01
    “…Considering the practical communication environments, the outage performance and the throughput were investigated for multiple reconfigurable intelligent surfaces (RIS) assisted non-orthogonal multiple access (NOMA) system with imperfect serial interference cancellation (SIC).The channel coefficients of the RIS-assisted NOMA system including the direct and the reflecting paths were approximated by Gamma distribution.An approximate closed-form expressions of outage probability were derived and validated through Monte Carlo simulations.The study investigated the relationship between the outage performance and system parameters, including the impact of imperfect SIC, the number of RIS and the number of reflecting units.The simulation results demonstrate that, compared with the single RIS-assisted NOMA and the traditional NOMA system, the multi-RIS-assisted system achieves a 14.2 dBm gain in signal-to-noise ratio (SNR) for a given outage probability.Thus, employing multiple RISs can improve the outage performance and the system throughput effectively, thereby compensating for the performance degradation caused by imperfect SIC.…”
    Get full text
    Article
  4. 1184

    Se sentir capable de rester dans son emploi jusqu’à la retraite ? by Anne-Françoise Molinié

    Published 2005-02-01
    “…But the results stress the important role played by variables relating to the meaning of work (such as work allows yo uto learn or having the means to do quality work).Five years later, employees 52 years of age who had answered in 1996 that they do not feel capable of remaining in their job until retirement have (everything being equal) a higher probability of not being employed either due to retirement or pre-retirement, or due to unemployment or inability; at 32 or 42 years of age, they have a higher probability of having changed jobs or being unemployed.…”
    Get full text
    Article
  5. 1185

    Fragility Assesment of Mid-Rise RC Building using HAZUS Method in High Seismic Zone by M. Hasbi Zuher, Ade Prayoga Nasution, Zairah Nabila Sidiq, Masrilayanti Masrilayanti, Jafril Tanjung

    Published 2023-08-01
    “…These fragility curves was developed by HAZUS method that present the probability of the structure damage due to various ground shaking or lateral displacement of the building. …”
    Get full text
    Article
  6. 1186

    Cognitive Radio Spectrum Sensing-Based QAM Technique Using Blockchain by D. Balakumar, S. Nandakumar

    Published 2023-01-01
    “…To address ambiguity, the M-ary QAM technique is provided, which increases aggregate effectiveness in terms of the percentage of false alarm (Pf) and probability of missed detection (Pm) by 5% at a comparable delay period. …”
    Get full text
    Article
  7. 1187

    Key path analysis method for large-scale industrial control network by Yaofang ZHANG, Zheyu ZHANG, Haikuo QU, Ge ZHANG, Zibo WANG, Bailing WANG

    Published 2021-12-01
    “…In order to solve the problem of high time-consuming and resource-consuming quantitative calculation of large-scale industrial control network attack graphs, a key path analysis method for large-scale industrial control networks was proposed.Firstly, the idea of cut set was used to calculate the key nodes set of Bayesian attack graph by combining the atomic attack income in industrial control network, which solved the problem that the current cut set algorithm only considers the key nodes in graph structure.Secondly, a dynamic updating strategy of Bayesian attack graph which only updated the attack probability of key nodes was proposed to efficiently calculate the attack probability of the whole graph and analyze the key path of attack graph.The experimental results show that the proposed method can not only ensure the reliability of the calculation results of large-scale industrial control attack graphs, but also can significantly reduce the time consumption and have a significant improvement in the calculation efficiency.…”
    Get full text
    Article
  8. 1188

    DHRCA: A Design of Security Architecture Based on Dynamic Heterogeneous Redundant for System on Wafer by Bo Mei, Zhengbin Zhu, Peijie Li, Bo Zhao

    Published 2024-01-01
    “…The simulation results based on the GSCPN model show that our method can improve the system security probability to 0.8690 and the system availability probability to 0.9750 in the steady state compared with typical triple-mode redundancy and runtime monitoring methods. …”
    Get full text
    Article
  9. 1189

    Rational analysis of authentication protocols based on NGUYEN L H scheme by Xing-hua LI, Ling-juan DENG, Yuan ZHANG, Jian-feng MA

    Published 2013-08-01
    “…Using the ideas of game theory,NGUYEN L H transformed two families of authentication protocols where the honest party transmitted some useless data with probability α before the normal protocol run,so that even if an attacker attacks a protocol,the attacker’s payoff will still be lower than that when it does not.In such a way,the security of the protocol was guaranteed.However,this scheme suffers from two shortcomings:the considered is too attacker powerful,and only its payoff was considered and the cost of the attacks was ignored; the situation in which the honest node would choose to send useless data was not considered.To improve this scheme,the value of α,with the consideration of the attack cost,of which the value is more general was given.What’s more,the attack probability β was introduced.Based on this,the precondition that the honest node transmits the useless data was presented,as well as the value of α under the different β values.Compared with the original scheme,this results are more generic and comprehensive.Meanwhile,through a case analysis in the P2P network,the correctness of the conclusion is proved.…”
    Get full text
    Article
  10. 1190

    A Network-Based Dynamic Analysis in an Equity Stock Market by Juan Eberhard, Jaime F. Lavin, Alejandro Montecinos-Pearce

    Published 2017-01-01
    “…We study how changes in the structure of a brokers’ transaction network affect the probability with which the returns and volume of the traded financial assets change significantly. …”
    Get full text
    Article
  11. 1191

    Vertical handoff research based on cognitive self-selection decision tree by Cun-qun FAN, Shang-guang WANG, Qi-bo SUN, Hua ZOU, Fang-chun YANG

    Published 2013-11-01
    “…Firstly, according to the signal strength, transmission rate, bit error rate, blocking probability and movement trend, the respective handoff probability distribution of them was established and the decisions through the self-selection decision tree was made. …”
    Get full text
    Article
  12. 1192

    Deep reinforcement learning for time-critical wilderness search and rescue using drones by Jan-Hendrik Ewers, David Anderson, Douglas Thomson

    Published 2025-02-01
    “…Our approach leverages a priori data about the search area and the missing person in the form of a probability distribution map. This allows the policy to learn optimal flight paths that maximize the probability of finding the missing person quickly. …”
    Get full text
    Article
  13. 1193

    Effect of Spalling Shape on Meshing Stiffness and Dynamics Characteristic of Gear by Tu Xuxin, Jian Xiaochun, Wu Shengli

    Published 2020-07-01
    “…The method of combined probability density function with kurtosis value is proposed,and the probability density function curve is used to judge the gear fault state. …”
    Get full text
    Article
  14. 1194

    RESEARCH ON TIME-DEPENDENT KINEMATIC RELIABILITY BASED ON TIME DOMAIN ERROR MODEL by WANG Shuai, GAO Peng, LIU Chang, CHEN YiTing

    Published 2020-01-01
    “…By means of the analysis of mechanism kinematic error by probability method. Based on the theory of maximum entropy and random process,the reliability model of time-domain error is established. …”
    Get full text
    Article
  15. 1195

    Strategic Analysis of Retrial Queues with Setup Times, Breakdown and Repairs by Ruiling Tian, Xinyu Wu, Liuqing He, Yunna Han

    Published 2023-01-01
    “…First, the steady-state probability of the model is obtained by using the probability generating function method. …”
    Get full text
    Article
  16. 1196

    Deficiencies of technical specifications in tender documentation for construction project by Michal Mikulík, Tomáš Hanák

    Published 2024-01-01
    “…This study aims to explore the perception of the probability of occurrence and degree of impact of errors from various perspectives including risk factors, causes, possible effects, responsibility and the role of stakeholders. …”
    Get full text
    Article
  17. 1197

    Mathematical model for the analysis of environmental risk factors by I. V. Sukhorukova, N. A. Chistyakova

    Published 2023-09-01
    “…When constructing a model, the probability of an insured event depending on time is taken into account. …”
    Get full text
    Article
  18. 1198

    The Credit Asset of Enterprise Accounts Receivable Pricing Model by Deshun Xu, Junhai Ma

    Published 2018-01-01
    “…The model gave an overall evaluation on the default probability of buyer and environment, as well as buyer loss given default resulting from the factors including Seller (S), Buyer (B), and Environment (E). …”
    Get full text
    Article
  19. 1199

    Secure data sharing scheme supporting efficient synchronous evolution for ciphertext and key by Xincheng YAN, Yue CHEN, Hongyong JIA, Yanru CHEN, Xinyue ZHANG

    Published 2018-05-01
    “…The static property of stored ciphertext in cloud increases the probability that an attacker can crack the ciphertext by obtaining a key,while ciphertext and key updates based on key distribution and re-encryption are excessively expensive.For this problem,a secure data sharing scheme supporting efficient synchronous evolution for ciphertext and key (CKSE-SDS) was proposed.By introducing cryptography accumulator in broadcast encryption,mimicry transformation factor could be constructed supporting time-hopping periodically and efficient synchronous evolution for ciphertext and key could be achieved based on dynamic segmentation and fusion of ciphertext and key,which reduced certainty in the process of encryption and key distribution and increased the difficulty for attackers exploiting security vulnerabilities to obtain key to crack ciphertext as well.Theoretical analysis and security proofs show that the proposed scheme can support secure and efficient data access as well as reduce the probability of a successful attack effectively for an attacker,which can also enhance the system’s active security defense capability.…”
    Get full text
    Article
  20. 1200

    PROBABILISTIC FATIGUE LIFE PREDICTION APPROACH FOR MULTI-SITE DAMAGE COMPONENTS by XIE LiYang, MA YuanYuan, LIU JianZhong, WU NingXiang, CHEN Bo

    Published 2015-01-01
    “…Fatigue is a phenomenon of high uncertainty,especially for components with multiple damage sites.The fatigue life( either mean value or probability distribution of the random variable) of a complex component with multiple damage sites is not equal to that of a simple component with only one damage site.A multi-site damage component is a series system with many weak links( damage sites) in probability sense.A probabilistic fatigue life prediction model for multi-site damage component is presented based on a systematic thought,as well as the order statistics and extreme statistics concept.Such developed model can naturally reflect the effect of the dependence among different damage sites.Experimental result and the example on multi-site damage component fatigue life prediction shows that the fatigue life of a multi-site damage component is much lower than that of a single site damage component.…”
    Get full text
    Article