Showing 1,241 - 1,260 results of 7,333 for search '"probability"', query time: 0.05s Refine Results
  1. 1241

    Comprehensive Influence Model of Preschool Children’s Personality Development Based on the Bayesian Network by Yan Sun, Mingying He, Lizhu Yang

    Published 2014-01-01
    “…The models not only reflect the influence on personality development as a whole, but also obtain the probability relationships among the factors. Compared with other influence factors including family and school factors, temperament has more effect on the personality. …”
    Get full text
    Article
  2. 1242

    Probabilistic geotechnical engineering analysis based on first order reliability method by Georgios Belokas University of West Attica, Greece

    Published 2019-10-01
    “…It is observed that the critical slip surface for the best estimate of the mean (SMm, SFm), for a 5% probability of exceedance (SMp=5%, SFp=5%) and for the characteristic value (SMk, SFk) do not coincide. …”
    Get full text
    Article
  3. 1243

    Importance of Distribution Type on Bearing Capacity of an Embedded Foundation in Spatially Varying Soils by Jiwei Han, Xiaoming Liu, Yongxin Wu, Xuhui Zhou

    Published 2020-01-01
    “…Then, the influence of the distribution type on the failure probability of nonstationary random soil is also investigated, with the failure probability for the Beta distribution being demonstrated to be always larger than that for the Lognormal and Gamma distribution.…”
    Get full text
    Article
  4. 1244

    Covert Communication for Wireless Networks with Full-Duplex Multiantenna Relay by Ling Yang, Weiwei Yang, Liang Tang, Liwei Tao, Xingbo Lu, Zhengyun He

    Published 2022-01-01
    “…The detection error rate, transmission outage probability, maximum effective covert rate, and other performance indicators are derived in two stages, and the total performance of the system is derived and analyzed. …”
    Get full text
    Article
  5. 1245

    Knee Point Search Using Cascading Top-k Sorting with Minimized Time Complexity by Zheng Wang, Shian-Shyong Tseng

    Published 2013-01-01
    “…This paper proposes an efficient knee point search algorithm with minimized time complexity using the cascading top-k sorting when a priori probability distribution of the knee point is known. …”
    Get full text
    Article
  6. 1246

    Active Learning for Constrained Document Clustering with Uncertainty Region by M. A. Balafar, R. Hazratgholizadeh, M. R. F. Derakhshi

    Published 2020-01-01
    “…Finally, at the end of each iteration, the data with a greater level of uncertainty (in term of probability) is selected for questioning the oracle. …”
    Get full text
    Article
  7. 1247

    PM10 AIR POLLUTION IN MASHAD CITY USING ARTIFICIAL NEURAL NETWORK AND MAKOV CHAIN MODEL

    Published 2017-12-01
    “…The results indicated the optimal performance of these methods in predicting of the amount of pollutants and also the probability of occurrence of hours with different quality of contamination. …”
    Get full text
    Article
  8. 1248

    The Lomax Distribution for Wireless Channel Modeling: Theory and Applications by Ivan Sanchez, F. Javier Lopez-Martinez

    Published 2024-01-01
    “…By a proper redefinition of its scale parameter, we present closed-form expressions for its main statistics: probability density function, cumulative distribution function, raw moments and Laplace-domain statistics. …”
    Get full text
    Article
  9. 1249

    Generative blockchain-based covert communication model based on Markov chain by Wei SHE, Xinpeng RONG, Wei LIU, Zhao TIAN

    Published 2022-10-01
    “…To solve the problems of high channel construction risk, information crossover, and insufficient concealment in the blockchain covert communication, a generative blockchain-based covert communication model based on Markov chain was proposed.First, the text data set was used by sender to obtain the candidate words set and trained the Markov model to obtain the transition probability matrix, generated the Huffman tree set.Secret message to be transmitted was performed iterative Huffman decoding on the binary stream to obtain a set of highly readable carring-secret message statements that conformed to normal language and semantic characteristics, a generative steganography was used to complete secret message embedding.Then, the carring-secret message was ring-signed and published to the blockchain as a normal transaction packing and block generation were completed in the network.Finally, the same text data set was used by the receiver to obtain the Huffman tree of transition probability weights, the binary stream of secret message was obtained by reverse operation.Simulation results demonstrate that, compares with the current similar models, the proposed model can further improve the embedding strength and time efficiency, reduce the risk of covert channel construction, avoid information crossover, and improve the concealment.…”
    Get full text
    Article
  10. 1250

    Research on Wind Load Calculation Based on Identical Guarantee Rate Method by Tao Ye, Ledong Zhu, Zhongxu Tan, Lanlan Li

    Published 2021-01-01
    “…Based on the basic theory of probability and the systematic analysis of the surrounding environment and turbulence, a random variable model for calculating wind load is established. …”
    Get full text
    Article
  11. 1251

    Secure transmission for NOMA downlink based on short packet communication by Gangcan SUN, Shaoke ZHAO, Wanming HAO, Zhengyu ZHU

    Published 2021-02-01
    “…For the low-latency requirements of Internet of things (IoT) business, short packet communication (SPC) and non-orthogonal multiple access (NOMA) were combined to study the problem of secure transmission in the multi-user NOMA system with eavesdroppers.With the maximizing the secure throughput of weak uses as the objective, considering the user decoding error probability constraint, total power constraint and power allocation constraint, a low-complexity power allocation algorithm was proposed to realize secure transmission.In order to solve the problem caused by complex objective function formula and unreliable serial interference cancellation (SIC) technology, the proof that the compactness of the constraints was necessary to find the optimal solution.Under the constraint of maximum decoding error probability, the power constraint was transformed and calculated to obtain the strict limit of transmitting power for strong users, and the transmit power search set from base station to strong user was derived.Then, the one-dimensional search algorithm was used to allocate power resources to maximize the throughput of weak users.Simulation results prove that the proposed algorithm can effectively improve the security throughput of weak users in the system.…”
    Get full text
    Article
  12. 1252

    A Hybrid Framework for Real-Time Dispatching of Airline Unit Load Devices under Demand Variations by Ching-Hui Tang, Ping-Hsuan Hsieh

    Published 2022-01-01
    “…The hybrid framework is developed by integrating techniques including the probability distribution technique to simulate different types of operational demand, the adjustable number of stages which is needed to meet the requirements of a decision-making process following a time sequence and the time pressure characteristic of real operations, and the scenario tree and probability rule approaches which are aimed and representing all possible demand scenarios for a stage, while the network flow technique is applied to represent the movement and location of ULDs at each airport over time and is used for the development of the associated mathematical model and the simulation. …”
    Get full text
    Article
  13. 1253

    A stochastic artificial neural network model for investigating street vendor behavior in a night market by Pao-Kuan Wu, Tsung-Chih Hsiao, Ming Xiao

    Published 2016-10-01
    “…This article offers a hybrid computational approach that combines an artificial neural network with Bayesian probability to improve on the conventional artificial neural network model. …”
    Get full text
    Article
  14. 1254

    Stayed-Cable Bridge Damage Detection and Localization Based on Accelerometer Health Monitoring Measurements by Mosbeh R. Kaloop, Jong Wan Hu

    Published 2015-01-01
    “…The assessment of the structural health monitoring and damage analysis concluded that (1) the kurtosis statistical moment can be used as an indicator for damage especially with increasing its percentage of change as the damage should occur; (2) the percentage of change of the Kernel density probability for the model identification error estimation can detect and localize the damage; (3) the simplified spectrum of the acceleration-displacement responses and frequencies probability changes are good tools for detection and localization of the one-line bridge damage.…”
    Get full text
    Article
  15. 1255

    RESEARCH ON RELIABILITY ASSESSMENT METHOD OF MECHANICAL SYSTEM CONSIDERING MULTIPLE FAILURE STATES by HU QiGuo, DU ChunChao, CAO LiJie, SHENG HuiMin

    Published 2022-01-01
    “…Combining the characteristics of interval fuzzy subsets and Bayesian networks, a solution algorithm for leaf node failure probability, interval fuzzy importance, and interval fuzzy posterior probability is obtained under the condition of knowing only the root node failure status. …”
    Get full text
    Article
  16. 1256

    Solving a Vehicle Routing Problem under Uncertainty by a Differential Evolution Algorithm by Alireza Salamatbakhsh, Reza Tavakkoli-Moghaddam, Ali Pahlevani

    Published 2021-02-01
    “…Originality/Value: The total travel time is limited to a definite probability per cent, and other constraints (e.g., capacity and time distribution restrictions) are considered. …”
    Get full text
    Article
  17. 1257

    Research on Information Propagation Model in Social Network Based on BlockChain by Yan Zhao, Sheng Bin, Gengxin Sun

    Published 2022-01-01
    “…This paper analyses the influence of group density, state transition probability, and incentive policy on information transmission trends in the network through simulation experiments. …”
    Get full text
    Article
  18. 1258

    Optimal Payments to Connected Depositors in Turbulent Times: A Markov Chain Approach by Dávid Csercsik, Hubert János Kiss

    Published 2018-01-01
    “…Optimal offers increase (a) in the degree of the depositor, (b) in the probability of being hit by a liquidity shock, and (c) in the effect of a neighboring impatient depositor.…”
    Get full text
    Article
  19. 1259

    RESEARCH ON CBN GRINDING WHEEL PERFORMANCE MONITORING METHOD BASED ON SHANNON ENTROPY AND ACOUSTIC EMISSION SIGNAL (MT) by TAN YongMin, SHI Zhan, CHI YuLun, GU JiaJian

    Published 2023-01-01
    “…Firstly, the acoustic emission signal of CBN grinding wheel was collected by an acoustic emission sensor. Then, the probability density and distribution of acoustic emission signal of CBN grinding wheel was estimated by using the maximum information entropy. …”
    Get full text
    Article
  20. 1260

    Comparative analysis of export determinants in Italian and Polish firms: The moderating role of non-family management by Marco Pini, Grzegorz Tchorek

    Published 2022-01-01
    “…It focuses on three objectives: i) investigating if age and size influence the firm’s probability to export; ii) if there are differences between family and non-family management; iii) if and how non-family management positively moderates the relationship between age, size, and the firm’s probability to export. …”
    Get full text
    Article