Showing 1,201 - 1,220 results of 7,333 for search '"probability"', query time: 0.06s Refine Results
  1. 1201

    An Improved Hierarchical Genetic Algorithm for Sheet Cutting Scheduling with Process Constraints by Yunqing Rao, Dezhong Qi, Jinling Li

    Published 2013-01-01
    “…Furthermore, to speed up convergence rates and resolve local convergence issues, a kind of adaptive crossover probability and mutation probability is used in this algorithm. …”
    Get full text
    Article
  2. 1202

    Process Monitoring for Gamma Distributed Product under Neutrosophic Statistics Using Resampling Scheme by Abdullah M. Almarashi, Muhammad Aslam

    Published 2021-01-01
    “…The control chart coefficients, probability of in-control, probability of out-of-control, and average run lengths have been determined under the assumption of the symmetrical property of the normal distribution using the neutrosophic interval method. …”
    Get full text
    Article
  3. 1203

    DETECTION OF URBAN SUMMER WARMING IN TEMPORAL CHANGE OF HEAT STRESS-RELATED INDICES IN THE ROMANIAN PLAIN REGION by DANA MICU, LOREDANA HAVRIŞ, CARMEN-SOFIA DRAGOTĂ

    Published 2013-12-01
    “…The study presents evidence of an increased frequency of hot temperatures and the corresponding urban heat stress in southern Romania, in response to the observed changes in the upper tails of the probability density function distribution of summer daily maximum temperatures, since the mid 1980s. …”
    Get full text
    Article
  4. 1204

    Analysis of super-long and sparse feature in pseudo-random sequence based on similarity by Chun-jie CAO, Jing-zhang SUN, Zhi-qiang ZHANG, Long-juan WANG, Meng-xing HUANG

    Published 2016-10-01
    “…Similarity analysis of pseudo-random sequence in wireless communication networks is a research hotspot problem in the domain of information warfare.Based on the difficulties in super-long sequence,extremely sparse feature,and futilities in engineering application for real-time processing exist in similarity analysis of sequence in wireless net-work,a method of similarity analysis of sequence in a certain margin of misacceptance probability was proposed.Firstly,the similarity probability distribution of real-random sequence was theoretically analyzed.Secondly,according to the standard of NIST SP 800-22,the randomness of pseudo-bitstream was analyzed and the validity of pseudo-bitstream was judged.Finally,similarity was analyzed and verified by combining super-long pseudo-random sequence in real wireless communication networks.The results indicate that the lower bound of similarity value is 0.62 when misacceptance prob-ability uncertainty at about 1%.Above conclusion is considerable importance from the significance and theoretical values in network security domains,such as protocol analysis,traffic analysis,intrusion detection and others.…”
    Get full text
    Article
  5. 1205

    On the Zhang-power series distributions with application to lifetime modeling by Hamideh Memarbashi, Javad Etminan, Majid Chahkandi

    Published 2025-01-01
    “…Many recent probability distributions are introduced by compounding the well-known continuous distributions  with the power series distribution.   …”
    Get full text
    Article
  6. 1206

    Immunization of Cooperative Spreading Dynamics on Complex Networks by Jun Wang, Shi-Min Cai, Tao Zhou

    Published 2021-01-01
    “…For small values of transmission probability, immunizing hubs can suppress the spreading, while the opposite situation happens for large values of transmission probability. …”
    Get full text
    Article
  7. 1207

    Dynamic Characteristics Analysis and Applications of Electromagnetic Environment Based on Group Perception by Peiwei Gao, Yongfeng Zhi, Chufeng Hu

    Published 2022-01-01
    “…The “information distance” between the probability density functions of measurement samples at different moments of the statistical manifold is solved to reveal the changes in the whole electromagnetic environment. …”
    Get full text
    Article
  8. 1208

    Research on the Complexity Mechanism of Decoy Strategies Based on Multiagent Simulation by Zhen Li, Xiaoyu Bao, Qingfeng Meng, Pengqun Shen

    Published 2020-01-01
    “…The influences of neighbor nodes, reconnection probability, and herd mentality on decoy effects are explored. …”
    Get full text
    Article
  9. 1209

    Service clustering method based on description context feature words and improved GSDMM model by Qiang HU, Jiaji SHEN, Guanghui JING, Junwei DU

    Published 2021-08-01
    “…To address the problem that current service clustering methods usually faced low quality of service representation vectors, a service clustering method based on description context feature words and improved GSDMM model was proposed.Firstly, a feature word extraction method based on context weight was constructed.The words that fit well with the context of service description were extracted as the set of feature words for each service.Then, an improved GSDMM model with topic distribution probability correction factor was established to generate service representation vectors and achieve distribution probability correction for non-critical topic items.Finally, K-means++ algorithm was employed to cluster Web services based on these service representation vectors.Experiments were conducted on real Web services in Web site of Programmable Web.Experiment results show that the quality of service representation vectors generated by the proposed method is higher than of other topic models.Further, the performance of our clustering method is significantly better than other service clustering methods.…”
    Get full text
    Article
  10. 1210

    Joint admission control algorithm based on load transfer in heterogeneous networks by Weiwei XIA, Zhaoming DING, Lianfeng SHEN

    Published 2018-05-01
    “…A load-transfer-based joint admission control (LJAC) algorithm in heterogeneous networks was proposed.The access requirements of users were admitted based on load balancing,the dynamic load transfer of traffics in the overlapping coverage areas of heterogeneous networks were introduced,and the influence of such factors as the layout of heterogeneous networks and the vertical handoff was considered in the algorithm.The integrated system of heterogeneous networks was modeled as a multidimensional Markov chain,the steady-state probabilities were obtained and the quality of service (QoS) performance metrics were derived.Based on the Poisson point process theory,the upper bound of capacity of the heterogeneous networks satisfying QoS limitations was obtained.The admission control parameters of the integrated system of heterogeneous networks were optimized in order to maximize the resource utilization rate as well as guaranteeing the QoS of users.The simulation results demonstrate lower traffic blocking probability,lower failure probability of vertical handoff requirements,and larger system capacity gain can be achieved by using the proposed LJAC algorithm.…”
    Get full text
    Article
  11. 1211

    User behavior pattern mining method based on multi-dimension and multi-granularity analysis in telecom networks by Xiaotao CHENG, Lixin JI, Ruiyang HUANG, Hongtao YU, Yizhuo YANG

    Published 2018-10-01
    “…In order to better understand the behavior of users in telecom networks,it takes CDR (call detail record) data of large-scale telecom network as the research object.By using the mixed probability model and feature engineering method,the multi-dimension characteristics of the call time,call frequency and connections are analyzed from the perspective of user groups and individuals.It is further refined from different time granularities such as hour,day,and week to realize effective discovery of call behavior patterns for different user groups.The distribution characteristics of user behavior are modeled by mixed probability model,which solves the problem of describing the distribution characteristics such as user's call time and frequency.Based on the dataset of a regional telecom network,the performance of decision tree,naive Bayes and SVM classification algorithm are compared.It proves the validity and computational feasibility of the proposed method.The differences in communication behavior patterns of different groups are also compared by taking the service numbers like express,flight and bank as examples.…”
    Get full text
    Article
  12. 1212

    Variable Transmission Range Routing Protocol Based on Vehicle Density in VANET by Rong Cai, Guoan Zhang, Yuebo Wu

    Published 2015-03-01
    “…In order to solve the problem of unstable connectivity and high bit error rate,which are caused by rapid changes in the density of vehicles on the road,while the transmission radius remained unchanged,a variable transmission range routing protocols based on vehicle density in vehicular Ad-Hoc network was proposed.According to different vehicle density,node could adjust the farthest transmission distance and reduce the transmission latency of the message,which could ensure high connection probability of the network.Based on homogeneous poisson point process model,the change conditions of transmission range with different vehicle density were deduced,and its feasible was proved.Furthermore,mathematical calculate formula of average latency was obtained according to the theoretical analysis.At last,variable transmission range routing protocol based on vehicle density and fixed transmission range routing protocol were compared by simulation.The simulated results show that the proposed protocol can be applied in actual environments,and the message can be transmitted fast from source node to destination node under the condition of high connection probability.…”
    Get full text
    Article
  13. 1213

    Transmission Failure Prediction Using AI and Structural Modeling Informed by Distribution Outages by Sita Nyame, William O. Taylor, William Hughes, Mingguo Hong, Marika Koukoula, Feifei Yang, Aaron Spaulding, Xiaochuan Luo, Slava Maslennikov, Diego Cerrai

    Published 2025-01-01
    “…The model with the integrated approach and storm index demonstrates substantial improvements in the estimation of the probability of failure of transmission lines and their ranking by risk level. …”
    Get full text
    Article
  14. 1214

    A Model for Service Life Control of Selected Device Systems by Zieja Mariusz, Ważny Mariusz

    Published 2014-04-01
    “…A particular solution of the equation is deviation increasing rate density function which was used for determining exceedance probability of limit state. The so-determined probability was then used to determine density function of limit state exceedance time, by increasing deviation. …”
    Get full text
    Article
  15. 1215

    First-Order Statistical Characteristics of Macrodiversity System with Three Microdiversity MRC Receivers in the Presence of k-µ Short-Term Fading and Gamma Long-Term Fading by Branimir Jaksic, Mihajlo Stefanovic, Danijela Aleksic, Dragan Radenkovic, Sinisa Minic

    Published 2016-01-01
    “…For this model, the probability density function and the cumulative density function of microdiversity MRC receivers and macrodiversity SC receiver output signal envelopes are calculated. …”
    Get full text
    Article
  16. 1216

    Influence of Community Participation on the Sustainability of Public Health Service Innovation in Makassar City by Haerana Haerana, Fatmawati Fatmawati, Burhanuddin Burhanuddin, Fatmawada Sudarman

    Published 2024-02-01
    “…Simultaneous testing (F) obtained an F count of 908,705 and a probability of 0.000. Because sig 0.000 <0.05, it can be concluded that the community participation variable affects the sustainability of innovation. …”
    Get full text
    Article
  17. 1217

    Admission Control for Multiservices Traffic in Hierarchical Mobile IPv6 Networks by Using Fuzzy Inference System by Jung-Shyr Wu, Shun-Fang Yang, Chen-Chieh Huang

    Published 2012-01-01
    “…It is evident that these CAC schemes can reduce the probability of the handoff dropping and the cell overload and limit the probability of the new call blocking.…”
    Get full text
    Article
  18. 1218

    Probabilistic geotechnical engineering analysis based on first order reliability method by Georgios Belokas

    Published 2019-09-01
    “…It is interesting that the maximum probability of having a SM<0 or SF<1 does not correspond to the minimum best estimate of the SM or SF. …”
    Get full text
    Article
  19. 1219

    Design and performance analysis of energy efficiency based CR primary user emulation attack defensive scheme by Yunchuan WANG, Xiaorong XU, Yingbiao YAO, Weiwei WU

    Published 2017-08-01
    “…Energy efficiency based PUEA defensive scheme was investigated with performance analysis.In this scheme,CSS energy efficiency was constructed as the optimum objective in the presence of PUEA with secure detection probability and false alarm probability threshold as the constraint conditions.Secure CSS model and PUEA defensive scheme were proposed to achieve energy efficiency based secure CSS.K-out-of-N criterion is set as global decision criterion in the scheme.Optimal fusion threshold K and optimal cooperative SUs N can be determined in secure CSS with the guarantee of energy efficiency.Compared with the traditional maximum ratio combining (MRC) fusion rule,the proposed PUEA defensive scheme not only guarantees system energy efficiency,but also improves system detection performance.Namely,the proposed scheme makes a trade-off between energy efficiency and detection performance in the presence of PUEA.The numerical simulation results show that the proposed strategy is not affected by the PUE interference power,and it has a high degree of persistence for PUEA attack.…”
    Get full text
    Article
  20. 1220

    Fixed Point Results in Orthogonal Neutrosophic Metric Spaces by Umar Ishtiaq, Khalil Javed, Fahim Uddin, Manuel de la Sen, Khalil Ahmed, Muhammad Usman Ali

    Published 2021-01-01
    “…Neutrosophy deals with neutrosophic logic, probability, and sets. Actually, the neutrosophic set is a generalization of the classical set, fuzzy set, and intuitionistic fuzzy set. …”
    Get full text
    Article