Suggested Topics within your search.
Suggested Topics within your search.
- Rhetoric 5
- English language 4
- Grammar 4
- Attitude to Health 3
- Behavioral Medicine 2
- Handbooks, manuals, etc 2
- Health behavior 2
- Psychology 2
- Animals 1
- Brothers and sisters 1
- Business communication 1
- Business writing 1
- Care 1
- Case studies 1
- Child development 1
- Child rearing 1
- Communication in organizations 1
- Dialectical materialism 1
- Education 1
- Elias (Fictitious character) 1
- English 1
- Examinations, questions, etc 1
- Fantasy 1
- Fiction 1
- Fugitives from justice 1
- Habitat (Ecology) 1
- Health 1
- Infants 1
- Laia (Fictitious character) 1
- Mass media 1
-
3421
Adoption of ICT Banking Services and Performance of Selected Commercial Banks In Kabale Municipality: A case of Equity And Stanbic Bank.
Published 2023“…Data was collected using Questionnaires, interviews and the observation method. Both random and non random sampling techniques were used including; cluster, simple random, stratified and purposive sampling to recruit respondents in the study. …”
Get full text
-
3422
-
3423
-
3424
-
3425
-
3426
-
3427
Prediksi Mahasiswa Drop-Out Di Universitas XYZ
Published 2024-12-01“…Hasil penelitian menunjukkan bahwa model prediksi menggunakan algoritma Random Forest berhasil mencapai akurasi sebesar 99,67%. …”
Get full text
Article -
3428
Predicting home delivery and identifying its determinants among women aged 15–49 years in sub-Saharan African countries using a Demographic and Health Surveys 2016–2023: a machine...
Published 2025-01-01“…The Shapley additive explanation features an importance plot optimized for random forest model to identifying the most predictors of home delivery. …”
Get full text
Article -
3429
High‐Throughput Single‐Nucleus RNA Profiling of Minimal Puncture FFPE Samples Reveals Spatiotemporal Heterogeneity of Cancer
Published 2025-01-01“…Here, the previously developed snRNA‐seq technique (snRandom‐seq) is optimized by implementing a pre‐indexing procedure for the minimal puncture FFPE samples. …”
Get full text
Article -
3430
-
3431
-
3432
LIGHTWEIGHT DESIGN OF STEERING KNUCKLE BASED ON COMPREHENSIVE SENSITIVITY
Published 2018-01-01“…In the process of designing lightweight of the steering knuckle,because of too many random variables and various factors,it is easy to result in poor optimization results. …”
Get full text
Article -
3433
Multilayer Satellite Network Dynamic Access Technology
Published 2022-03-01“…Using the characteristics of satellites in diff erent orbits to build a more effi cient multilayer satellite network has become a hotspot in satellite network research in recent years.Traditional satellite network access methods have been unable to meet the needs of multilayer satellite networks with low latency and fl exible access, so it is urgent to design an effi cient random dynamic access protocol for multilayer satellite networks.This paper fi rst summarized the traditional satellite network access technology, clarifi ed the development context of the satellite network random access protocol, and then proposed diff erent low latency for the two diff erent scenarios of ground station access to satellite and multilayer satellite network intersatellite access.The access method could provided a reference for the development of the dynamic access technology of the multilayer satellite network in the future.…”
Get full text
Article -
3434
An improved RFID authentication protocol based on quadratic residue
Published 2018-04-01“…In view of the existing radio frequency identification(RFID) authentication protocol based on quadratic residue in the security and cost aspects of the loopholes and deficiencies,an improved RFID bidirectional authentication protocol based on the quadratic residue was designed.The improved protocol was mixed with random number encryption under the framework of the quadratic residue,which makes the message certification and identification more efficient and fast in database authentication and identification; the ultra-lightweight bit replacement operations and XOR encryption communication information was introduced,which reduces the cost of system computing; in database,the random number checking mechanism was added to avoid attacks such as agreement to be synchronized and denial of service attacks; finally,the GNY logical proof of the protocol was given,which shows the feasibility of the improved protocol.The protocol security and performance analysis indicate that the improved protocol has higher security and lower cost.…”
Get full text
Article -
3435
A NEW FAILURE PROBABILITY COMPUTING METHOD FOR MECHANICAL COMPONENTS
Published 2020-01-01“…The non-normal random parameters need not to be transformed into equivalent normal ones. …”
Get full text
Article -
3436
Sum of Bernoulli Mixtures: Beyond Conditional Independence
Published 2014-01-01“…The level of dependence is measured in terms of a limiting conditional correlation between two of the Bernoulli random variables. The conditioning event is that the mixing random variable is larger than a threshold and the limit is with respect to the threshold tending to one. …”
Get full text
Article -
3437
Key generation method based on reconfigurable intelligent surface in quasi-static scene
Published 2021-04-01“…Aiming at the problems of slow channel changes and low key generation rate in IoT quasi-static scenarios, a key generation method based on reconfigurable intelligent surface (RIS) was proposed.First, the agility characteristics of RIS was used to construct a fast-changing channel.Then, the base station and legitimate users extracted a consistent key from the channel information through channel estimation, conversion, and information negotiation.Finally, optimal time allocation for data transmission and key generation in the coherent time to achieve the maximum transmission rate of one-time pad.The simulation results show that the key generation rate of proposed method is higher than that of the existing relay-assisted method, random signal flow method and random number method, and as the number of RIS reflection units and frequency of channel estimation in the coherence time increase, the key generation rate will be further improve.…”
Get full text
Article -
3438
Stochastic job stream scheduling method for cipher chip with multi-cryptography
Published 2016-12-01“…Aiming at the rich of safety requirements of tasks which resulting in random cross access to multi cipher algorithms, a hierarchical hardware scheduling method was presented with associated control based on data identifica-tion. …”
Get full text
Article -
3439
Optimal Quantum Circuit Cuts with Application to Clustered Hamiltonian Simulation
Published 2025-01-01“…We study methods to replace entangling operations with random local operations in a quantum computation, at the cost of increasing the number of required executions. …”
Get full text
Article -
3440
Explore Machine Learning's Prediction of Football Games
Published 2025-01-01“…In addition, the score changes show a high degree of randomness, reflecting that the game is affected by a variety of factors. …”
Get full text
Article