Suggested Topics within your search.
Suggested Topics within your search.
- Rhetoric 5
- English language 4
- Grammar 4
- Attitude to Health 3
- Behavioral Medicine 2
- Handbooks, manuals, etc 2
- Health behavior 2
- Psychology 2
- Animals 1
- Brothers and sisters 1
- Business communication 1
- Business writing 1
- Care 1
- Case studies 1
- Child development 1
- Child rearing 1
- Communication in organizations 1
- Dialectical materialism 1
- Education 1
- Elias (Fictitious character) 1
- English 1
- Examinations, questions, etc 1
- Fantasy 1
- Fiction 1
- Fugitives from justice 1
- Habitat (Ecology) 1
- Health 1
- Infants 1
- Laia (Fictitious character) 1
- Mass media 1
-
3261
Perfect secrecy cryptosystem with nonuniform distribution of keys
Published 2018-11-01“…More strictly mathematical concepts of infinite perfect secrecy and random “one-time pad” cryptosystem in theory were presented,and the whole secure communication system was divided into two stages:design of a basic cryptosystem and one of its applications.How to design a basic cryptosystem by using a group of orthogonal Latin squares was first studied and an example to illustrate how to design nonlinear encryption transformations for a basic cryptosystem was given.Then,how to design the sequence of keys by using random method with nonuniform distribution was discussed,and it was strictly proven in theory that the infinite random “one-time pad” cryptosystem based on the designed basic cryptosystem was of perfect secrecy.Since the obtained result generalizes the existing one for random “one-time pad” cryptosystem to be perfect by using a basic cryptosystem with modulo addition,it may be used as a wider ideal simulated prototype to design stream cipher algorithms.Since the number of basic cryptosystems that can be designed is much more than one of the common basic cryptosystems with modulo addition,the obtained result is effective supplement and perfection to mainstream design method for the current stream cryptosystems.…”
Get full text
Article -
3262
Probabilistic degenerate Bernstein polynomials
Published 2025-12-01“…In addition, we treat the special cases of the Poisson random variable, the Bernoulli random variable and of the binomial random variable.…”
Get full text
Article -
3263
STATISTICAL PROCESSING OF RESULTS OF TESTING OF STUDENTS
Published 2015-10-01“…By type of line empiric density statistic put forward the hypothesis of normal distribution of the random variable. To test this hypothesis using one of the criteria for approval - a specially selected random variable, exact or approximate distribution, is known. …”
Get full text
Article -
3264
Role of Long-Acting Porcine Sequence ACTH (Acton Prolongatum) Stimulated Cortisol in Assessing Glucocorticoid Status in COVID-19 Patients
Published 2024-12-01“…There was a linear correlation between random basal and ACTH-stimulated cortisol (r = 0.908, P value < 0.001). …”
Get full text
Article -
3265
A refinement of normal approximation to Poisson binomial
Published 2005-01-01“…Let X1,X2,…,Xn be independent Bernoulli random variables with P(Xj=1)=1−P(Xj=0)=pj and let Sn:=X1+X2+⋯+Xn. …”
Get full text
Article -
3266
On the continuity of the vector valued and set valued conditional expectations
Published 1989-01-01“…In this paper we study the dependence of the vector valued conditional expectation (for both single valued and set valued random variables), on the σ–field and random variable that determine it. …”
Get full text
Article -
3267
An Analytical Study of the External Environment of the Coevolution between Manufacturing and Logistics Based on the Logistic Model
Published 2021-01-01“…This paper first constructs a dynamic model of the external environmental capacity of the coevolution system by using the logistic model and then simulates the effects of two factors: one factor is the institutional environment affected by the random interference factors of policy and the other factor is the industrial environment affected by the random interference factors of the industrial economy on the coevolution system. …”
Get full text
Article -
3268
Study on generation of turbulence-distorted received signals in OAM optical communications obeying dual Johnson S<sub>B</sub>distribution
Published 2020-11-01“…In order to analyze the performance of atmospheric OAM optical communication systems by Monte Carlo method,a method was proposed to simulate turbulence-distorted received signals in OAM optical communications,which possessed the given temporal auto-correlation and obeyed the dual Johnson S<sub>B</sub>distribution.A Gaussian random sequence with given temporal auto-correlation was first created by using an auto regression (AR) model,and meanwhile a white noise random sample sequence obeying the dual Johnson S<sub>B</sub>distribution was generated.Then the white noise random sample sequence was rearranged according to the statistical rank of the auto-correlated Gaussian random sequence to match the given temporal auto-correlation.By performing the simulation experiments,it was found that the statistical distribution of the simulated signals was in excellent agreement with the dual Johnson S<sub>B</sub>distribution,and the temporal auto-correlation of the signals matched the given temporal auto-correlation function.The results demonstrate that the proposed method can be used to simulate time-domain received signals in OAM optical communications impaired by turbulence-induced distortions.…”
Get full text
Article -
3269
RELIABILITY TOPOLOGY OPTIMIZATION DESIGN OF PISTON LATTICE STRUCTURE FOR INTERNAL COMBUSTION ENGINE (MT)
Published 2023-01-01“…The failure probability constraint was transformed into a reliability index constraint according to the first second-order moment method, and then the random variables were transformed into standard normal variables, and the random variables were corrected and designed for deterministic topology optimization according to the sensitivity information of the random variables relative to the performance index. …”
Get full text
Article -
3270
Stochastic Dynamic Model of Sulfate Corrosion Reactions in Concrete Materials considering the Effects of Colored Gaussian Noises
Published 2019-01-01“…The concentration evolution process of sulfate corrosion products is a random process. The experimental data are only some samples of the random process. …”
Get full text
Article -
3271
Indifferentiable hash functions in the standard model
Published 2021-07-01“…However, it is often overlooked that such considerations only hold in the random oracle model and do not give any guarantee in the standard model. …”
Get full text
Article -
3272
Direct anterior approach (DAA) vs. conventional approaches in total hip arthroplasty: A RCT meta-analysis with an overview of related meta-analyses.
Published 2021-01-01“…Our aim was to draw definitive conclusions by conducting both a fixed and random model meta-analysis of quality randomized controlled trials (RCTs) and by comparison with related meta-analyses.…”
Get full text
Article -
3273
Target sampling based on routing behavior analysis in network topology measurement
Published 2009-01-01“…In order to investigate the insufficiency of target sampling in current network topology measurement practice and the distortion of measurement models,a sort of target sampling methods based on routing behavior analysis were pre-sented,namely,the uniform random sampling as a benchmark method,the minimum cover sampling as an optimal method,the last-hop sampling for the path diversity,and the bisection sampling for the destination prefix diversity.Ex-periments based on real measurement data show that a half of topology information can be missed in the traditional ‘1 per /24’ random sampling,of which 10% of missed information is caused by the path diversity and the rest is caused by des-tination prefix diversity.The minimum cover sampling is robust to the routing dynamics and performs better than the uniform random sampling at the long-term practice.…”
Get full text
Article -
3274
Provable secure mutual authentication protocol for RFID in the standard model
Published 2013-04-01“…The security issue of RFID is becoming more and more serious,in order to protect the RFID's information security and privacy,a mutual authentication protocol for RFID based on HB protocol was proposed in the standard model.The security proofs for this novel protocol was given by using the reduction method,and attacker's hardness was reduced to the indistinguishability between pseudo-random function and real random function.The implementation of proposed protocol only required lightweight pseudo-random generator and vector dot product operation and provided higher security and efficiency.The comparisons of security and performance were also given with other authentication protocols,the results show that the proposed protocol is feasible for RFID tags which are low cost and resource-constrained.…”
Get full text
Article -
3275
INTERVAL ESTIMATION OF THE VOLUMES OF RESOURCE CONSUMPTION AT THE STOCHASTIC BASIC DATA
Published 2018-12-01“…The method of interval estimation of resource consumption volumes is considered with the random nature of a multitude of random factors. The necessity of taking into account errors in the values of functions and arguments when estimating the parameters of mathematical models is shown. …”
Get full text
Article -
3276
Spectral properties, localization transition and multifractal eigenvectors of the Laplacian on heterogeneous networks
Published 2025-02-01“…We study the spectral properties and eigenvector statistics of the Laplacian on highly-connected networks with random coupling strengths and a gamma distribution of rescaled degrees. …”
Get full text
Article -
3277
New approach against Sybil attack in wireless sensor networks
Published 2008-01-01“…A particularly harmful attack against many sensor network applications is known as the Sybil attack.A novel approach which is sensor node identity witness information validation for random secret information predistribution to defend against the Sybil attack was proposed,and their comprehensive performance was analyzed.In random secret in-formation predistribution,new secret information assignment schemes were proposed and assign a random set of key-related information to each sensor node based on one-way accumulators.In the common keys set-up phase,node-to-node identity witness authentication and key exchange protocols(IDW-AKE)which are provably secure against the active adversaries in universally composable model was proposed.Using IDW-AKE protocols,each node can com-pute the unique common keys it shares with its neighbors.…”
Get full text
Article -
3278
Generalized Synchronization of Stochastic Discrete Chaotic System with Poisson Distribution Coefficient
Published 2013-01-01“…Firstly, based on the orthogonal polynomial approximation theory of discrete random function in Hilbert spaces, the discrete chaotic system with random parameter is transformed into its equivalent deterministic system. …”
Get full text
Article -
3279
Comparing Two Strategies to Model Uncertainties in Structural Dynamics
Published 2010-01-01“…The second strategy (called nonparametric strategy) is more general and considers the whole stiffness matrix as uncertain, and associates a random matrix to it. In both cases, the probability density functions either of the random parameters or of the random matrix are deduced from the Maximum Entropy Principle using only the available information. …”
Get full text
Article -
3280
Fast reconstruction method for compressed sensing model with semi-tensor product
Published 2018-07-01“…To reduce the storage space of random measurement matrix and improve the reconstruction efficiency for compressed sensing (CS),a new sampling approach for CS with semi-tensor product (STP-CS) was proposed.The proposed approach generated a low dimensional random measurement matrix to sample the sparse signals.Then the solutions of the sparse vector were estimated group by group with a l<sub>q</sub>-minimization (0&lt;q&lt;1) iteratively re-weighted least-squares (IRLS) algorithm.Compared with traditional compressed sensing methods,the proposed approach outperformed conventional CS in speed of reconstruction and that it also obtained comparable quality in the reconstruction.Numerical experiments were conducted using gray-scale images,the peak signal-to-noise ratio (PSNR) and the reconstruction time of the reconstruction images were compared with the random matrices with different dimensions.Comparisons were also conducted with other low storage techniques.Numerical experiment results show that the STP-CS can effectively reduce the storage space of the random measurement matrix to <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML"> <mfrac> <mi>M</mi> <mi>t</mi> </mfrac> <mtext>×</mtext><mfrac> <mi>N</mi> <mi>t</mi> </mfrac> </math></inline-formula> and decrease tow orders of magnitude of time that for conventional CS,while maintaining the reconstruction quality.Numerical results also show that the reconstruction time can be effectively improved 260 for the image size of 1 024×1 024.…”
Get full text
Article