-
1201
An Improved Hierarchical Genetic Algorithm for Sheet Cutting Scheduling with Process Constraints
Published 2013-01-01“…Furthermore, to speed up convergence rates and resolve local convergence issues, a kind of adaptive crossover probability and mutation probability is used in this algorithm. …”
Get full text
Article -
1202
Process Monitoring for Gamma Distributed Product under Neutrosophic Statistics Using Resampling Scheme
Published 2021-01-01“…The control chart coefficients, probability of in-control, probability of out-of-control, and average run lengths have been determined under the assumption of the symmetrical property of the normal distribution using the neutrosophic interval method. …”
Get full text
Article -
1203
DETECTION OF URBAN SUMMER WARMING IN TEMPORAL CHANGE OF HEAT STRESS-RELATED INDICES IN THE ROMANIAN PLAIN REGION
Published 2013-12-01“…The study presents evidence of an increased frequency of hot temperatures and the corresponding urban heat stress in southern Romania, in response to the observed changes in the upper tails of the probability density function distribution of summer daily maximum temperatures, since the mid 1980s. …”
Get full text
Article -
1204
Analysis of super-long and sparse feature in pseudo-random sequence based on similarity
Published 2016-10-01“…Similarity analysis of pseudo-random sequence in wireless communication networks is a research hotspot problem in the domain of information warfare.Based on the difficulties in super-long sequence,extremely sparse feature,and futilities in engineering application for real-time processing exist in similarity analysis of sequence in wireless net-work,a method of similarity analysis of sequence in a certain margin of misacceptance probability was proposed.Firstly,the similarity probability distribution of real-random sequence was theoretically analyzed.Secondly,according to the standard of NIST SP 800-22,the randomness of pseudo-bitstream was analyzed and the validity of pseudo-bitstream was judged.Finally,similarity was analyzed and verified by combining super-long pseudo-random sequence in real wireless communication networks.The results indicate that the lower bound of similarity value is 0.62 when misacceptance prob-ability uncertainty at about 1%.Above conclusion is considerable importance from the significance and theoretical values in network security domains,such as protocol analysis,traffic analysis,intrusion detection and others.…”
Get full text
Article -
1205
On the Zhang-power series distributions with application to lifetime modeling
Published 2025-01-01“…Many recent probability distributions are introduced by compounding the well-known continuous distributions with the power series distribution. …”
Get full text
Article -
1206
Immunization of Cooperative Spreading Dynamics on Complex Networks
Published 2021-01-01“…For small values of transmission probability, immunizing hubs can suppress the spreading, while the opposite situation happens for large values of transmission probability. …”
Get full text
Article -
1207
Dynamic Characteristics Analysis and Applications of Electromagnetic Environment Based on Group Perception
Published 2022-01-01“…The “information distance” between the probability density functions of measurement samples at different moments of the statistical manifold is solved to reveal the changes in the whole electromagnetic environment. …”
Get full text
Article -
1208
Research on the Complexity Mechanism of Decoy Strategies Based on Multiagent Simulation
Published 2020-01-01“…The influences of neighbor nodes, reconnection probability, and herd mentality on decoy effects are explored. …”
Get full text
Article -
1209
Service clustering method based on description context feature words and improved GSDMM model
Published 2021-08-01“…To address the problem that current service clustering methods usually faced low quality of service representation vectors, a service clustering method based on description context feature words and improved GSDMM model was proposed.Firstly, a feature word extraction method based on context weight was constructed.The words that fit well with the context of service description were extracted as the set of feature words for each service.Then, an improved GSDMM model with topic distribution probability correction factor was established to generate service representation vectors and achieve distribution probability correction for non-critical topic items.Finally, K-means++ algorithm was employed to cluster Web services based on these service representation vectors.Experiments were conducted on real Web services in Web site of Programmable Web.Experiment results show that the quality of service representation vectors generated by the proposed method is higher than of other topic models.Further, the performance of our clustering method is significantly better than other service clustering methods.…”
Get full text
Article -
1210
Joint admission control algorithm based on load transfer in heterogeneous networks
Published 2018-05-01“…A load-transfer-based joint admission control (LJAC) algorithm in heterogeneous networks was proposed.The access requirements of users were admitted based on load balancing,the dynamic load transfer of traffics in the overlapping coverage areas of heterogeneous networks were introduced,and the influence of such factors as the layout of heterogeneous networks and the vertical handoff was considered in the algorithm.The integrated system of heterogeneous networks was modeled as a multidimensional Markov chain,the steady-state probabilities were obtained and the quality of service (QoS) performance metrics were derived.Based on the Poisson point process theory,the upper bound of capacity of the heterogeneous networks satisfying QoS limitations was obtained.The admission control parameters of the integrated system of heterogeneous networks were optimized in order to maximize the resource utilization rate as well as guaranteeing the QoS of users.The simulation results demonstrate lower traffic blocking probability,lower failure probability of vertical handoff requirements,and larger system capacity gain can be achieved by using the proposed LJAC algorithm.…”
Get full text
Article -
1211
User behavior pattern mining method based on multi-dimension and multi-granularity analysis in telecom networks
Published 2018-10-01“…In order to better understand the behavior of users in telecom networks,it takes CDR (call detail record) data of large-scale telecom network as the research object.By using the mixed probability model and feature engineering method,the multi-dimension characteristics of the call time,call frequency and connections are analyzed from the perspective of user groups and individuals.It is further refined from different time granularities such as hour,day,and week to realize effective discovery of call behavior patterns for different user groups.The distribution characteristics of user behavior are modeled by mixed probability model,which solves the problem of describing the distribution characteristics such as user's call time and frequency.Based on the dataset of a regional telecom network,the performance of decision tree,naive Bayes and SVM classification algorithm are compared.It proves the validity and computational feasibility of the proposed method.The differences in communication behavior patterns of different groups are also compared by taking the service numbers like express,flight and bank as examples.…”
Get full text
Article -
1212
Variable Transmission Range Routing Protocol Based on Vehicle Density in VANET
Published 2015-03-01“…In order to solve the problem of unstable connectivity and high bit error rate,which are caused by rapid changes in the density of vehicles on the road,while the transmission radius remained unchanged,a variable transmission range routing protocols based on vehicle density in vehicular Ad-Hoc network was proposed.According to different vehicle density,node could adjust the farthest transmission distance and reduce the transmission latency of the message,which could ensure high connection probability of the network.Based on homogeneous poisson point process model,the change conditions of transmission range with different vehicle density were deduced,and its feasible was proved.Furthermore,mathematical calculate formula of average latency was obtained according to the theoretical analysis.At last,variable transmission range routing protocol based on vehicle density and fixed transmission range routing protocol were compared by simulation.The simulated results show that the proposed protocol can be applied in actual environments,and the message can be transmitted fast from source node to destination node under the condition of high connection probability.…”
Get full text
Article -
1213
Transmission Failure Prediction Using AI and Structural Modeling Informed by Distribution Outages
Published 2025-01-01“…The model with the integrated approach and storm index demonstrates substantial improvements in the estimation of the probability of failure of transmission lines and their ranking by risk level. …”
Get full text
Article -
1214
A Model for Service Life Control of Selected Device Systems
Published 2014-04-01“…A particular solution of the equation is deviation increasing rate density function which was used for determining exceedance probability of limit state. The so-determined probability was then used to determine density function of limit state exceedance time, by increasing deviation. …”
Get full text
Article -
1215
First-Order Statistical Characteristics of Macrodiversity System with Three Microdiversity MRC Receivers in the Presence of k-µ Short-Term Fading and Gamma Long-Term Fading
Published 2016-01-01“…For this model, the probability density function and the cumulative density function of microdiversity MRC receivers and macrodiversity SC receiver output signal envelopes are calculated. …”
Get full text
Article -
1216
Influence of Community Participation on the Sustainability of Public Health Service Innovation in Makassar City
Published 2024-02-01“…Simultaneous testing (F) obtained an F count of 908,705 and a probability of 0.000. Because sig 0.000 <0.05, it can be concluded that the community participation variable affects the sustainability of innovation. …”
Get full text
Article -
1217
Admission Control for Multiservices Traffic in Hierarchical Mobile IPv6 Networks by Using Fuzzy Inference System
Published 2012-01-01“…It is evident that these CAC schemes can reduce the probability of the handoff dropping and the cell overload and limit the probability of the new call blocking.…”
Get full text
Article -
1218
Probabilistic geotechnical engineering analysis based on first order reliability method
Published 2019-09-01“…It is interesting that the maximum probability of having a SM<0 or SF<1 does not correspond to the minimum best estimate of the SM or SF. …”
Get full text
Article -
1219
Design and performance analysis of energy efficiency based CR primary user emulation attack defensive scheme
Published 2017-08-01“…Energy efficiency based PUEA defensive scheme was investigated with performance analysis.In this scheme,CSS energy efficiency was constructed as the optimum objective in the presence of PUEA with secure detection probability and false alarm probability threshold as the constraint conditions.Secure CSS model and PUEA defensive scheme were proposed to achieve energy efficiency based secure CSS.K-out-of-N criterion is set as global decision criterion in the scheme.Optimal fusion threshold K and optimal cooperative SUs N can be determined in secure CSS with the guarantee of energy efficiency.Compared with the traditional maximum ratio combining (MRC) fusion rule,the proposed PUEA defensive scheme not only guarantees system energy efficiency,but also improves system detection performance.Namely,the proposed scheme makes a trade-off between energy efficiency and detection performance in the presence of PUEA.The numerical simulation results show that the proposed strategy is not affected by the PUE interference power,and it has a high degree of persistence for PUEA attack.…”
Get full text
Article -
1220
Fixed Point Results in Orthogonal Neutrosophic Metric Spaces
Published 2021-01-01“…Neutrosophy deals with neutrosophic logic, probability, and sets. Actually, the neutrosophic set is a generalization of the classical set, fuzzy set, and intuitionistic fuzzy set. …”
Get full text
Article