Showing 3,421 - 3,440 results of 17,304 for search '"random"', query time: 0.09s Refine Results
  1. 3421

    Adoption of ICT Banking Services and Performance of Selected Commercial Banks In Kabale Municipality: A case of Equity And Stanbic Bank. by Ndayambaje, Denis

    Published 2023
    “…Data was collected using Questionnaires, interviews and the observation method. Both random and non random sampling techniques were used including; cluster, simple random, stratified and purposive sampling to recruit respondents in the study. …”
    Get full text
  2. 3422

    Developing Reading Skills / by Milan Spears, Deanne

    Published 1983
    View in OPAC
    Book
  3. 3423

    Business Communication Today : Study guide / by Bov'ee, Courtland L.

    Published 1989
    View in OPAC
    Book
  4. 3424

    Health Psychology / by Taylor, Shelley E.

    Published 1986
    View in OPAC
    Book
  5. 3425

    Health Through Discovery / by Dintiman, George B.

    Published 1989
    View in OPAC
    Book
  6. 3426

    Understanding psychology / by Scarr, Sandra

    Published 1984
    View in OPAC
    Book
  7. 3427

    Prediksi Mahasiswa Drop-Out Di Universitas XYZ by Tubagus Ahmad Marzuqi, Evelline Kristiani, Marcel

    Published 2024-12-01
    “…Hasil penelitian menunjukkan bahwa model prediksi menggunakan algoritma Random Forest berhasil mencapai akurasi sebesar 99,67%. …”
    Get full text
    Article
  8. 3428
  9. 3429

    High‐Throughput Single‐Nucleus RNA Profiling of Minimal Puncture FFPE Samples Reveals Spatiotemporal Heterogeneity of Cancer by Weiqin Jiang, Xiang Zhang, Ziye Xu, Qing Cheng, Xiaohan Li, Yuyi Zhu, Fangru Lu, Ling Dong, Linghui Zeng, Weixiang Zhong, Yongcheng Wang, Longjiang Fan, Hongyu Chen

    Published 2025-01-01
    “…Here, the previously developed snRNA‐seq technique (snRandom‐seq) is optimized by implementing a pre‐indexing procedure for the minimal puncture FFPE samples. …”
    Get full text
    Article
  10. 3430

    Essentilas of Physical Geography Today / by Oberlander,Theodore M.

    Published 1987
    View in OPAC
    Book
  11. 3431

    Essentials of Physical Geography Today / by Oberlander, Theodore

    Published 1987
    View in OPAC
    Book
  12. 3432

    LIGHTWEIGHT DESIGN OF STEERING KNUCKLE BASED ON COMPREHENSIVE SENSITIVITY by MA Jian, YE NanHai, WU Rong, DENG Xin, HE Yun, WANG Li

    Published 2018-01-01
    “…In the process of designing lightweight of the steering knuckle,because of too many random variables and various factors,it is easy to result in poor optimization results. …”
    Get full text
    Article
  13. 3433

    Multilayer Satellite Network Dynamic Access Technology by Yunhan LI, Jianpeng MA, Xiongwen HE, Shun ZHANG, Hongyan LI

    Published 2022-03-01
    “…Using the characteristics of satellites in diff erent orbits to build a more effi cient multilayer satellite network has become a hotspot in satellite network research in recent years.Traditional satellite network access methods have been unable to meet the needs of multilayer satellite networks with low latency and fl exible access, so it is urgent to design an effi cient random dynamic access protocol for multilayer satellite networks.This paper fi rst summarized the traditional satellite network access technology, clarifi ed the development context of the satellite network random access protocol, and then proposed diff erent low latency for the two diff erent scenarios of ground station access to satellite and multilayer satellite network intersatellite access.The access method could provided a reference for the development of the dynamic access technology of the multilayer satellite network in the future.…”
    Get full text
    Article
  14. 3434

    An improved RFID authentication protocol based on quadratic residue by Zhiliang LIU

    Published 2018-04-01
    “…In view of the existing radio frequency identification(RFID) authentication protocol based on quadratic residue in the security and cost aspects of the loopholes and deficiencies,an improved RFID bidirectional authentication protocol based on the quadratic residue was designed.The improved protocol was mixed with random number encryption under the framework of the quadratic residue,which makes the message certification and identification more efficient and fast in database authentication and identification; the ultra-lightweight bit replacement operations and XOR encryption communication information was introduced,which reduces the cost of system computing; in database,the random number checking mechanism was added to avoid attacks such as agreement to be synchronized and denial of service attacks; finally,the GNY logical proof of the protocol was given,which shows the feasibility of the improved protocol.The protocol security and performance analysis indicate that the improved protocol has higher security and lower cost.…”
    Get full text
    Article
  15. 3435

    A NEW FAILURE PROBABILITY COMPUTING METHOD FOR MECHANICAL COMPONENTS by ZHANG YanFang, ZHANG YanLin

    Published 2020-01-01
    “…The non-normal random parameters need not to be transformed into equivalent normal ones. …”
    Get full text
    Article
  16. 3436

    Sum of Bernoulli Mixtures: Beyond Conditional Independence by Taehan Bae, Ian Iscoe

    Published 2014-01-01
    “…The level of dependence is measured in terms of a limiting conditional correlation between two of the Bernoulli random variables. The conditioning event is that the mixing random variable is larger than a threshold and the limit is with respect to the threshold tending to one. …”
    Get full text
    Article
  17. 3437

    Key generation method based on reconfigurable intelligent surface in quasi-static scene by Yinuo HAO, Liang JIN, Kaizhi HUANG, Shuaifang XIAO

    Published 2021-04-01
    “…Aiming at the problems of slow channel changes and low key generation rate in IoT quasi-static scenarios, a key generation method based on reconfigurable intelligent surface (RIS) was proposed.First, the agility characteristics of RIS was used to construct a fast-changing channel.Then, the base station and legitimate users extracted a consistent key from the channel information through channel estimation, conversion, and information negotiation.Finally, optimal time allocation for data transmission and key generation in the coherent time to achieve the maximum transmission rate of one-time pad.The simulation results show that the key generation rate of proposed method is higher than that of the existing relay-assisted method, random signal flow method and random number method, and as the number of RIS reflection units and frequency of channel estimation in the coherence time increase, the key generation rate will be further improve.…”
    Get full text
    Article
  18. 3438

    Stochastic job stream scheduling method for cipher chip with multi-cryptography by Li LI, Guo-zhen SHI, Kui GENG, Xiu-ze DONG, Xuan WANG, Feng-hua LI

    Published 2016-12-01
    “…Aiming at the rich of safety requirements of tasks which resulting in random cross access to multi cipher algorithms, a hierarchical hardware scheduling method was presented with associated control based on data identifica-tion. …”
    Get full text
    Article
  19. 3439

    Optimal Quantum Circuit Cuts with Application to Clustered Hamiltonian Simulation by Aram W. Harrow, Angus Lowe

    Published 2025-01-01
    “…We study methods to replace entangling operations with random local operations in a quantum computation, at the cost of increasing the number of required executions. …”
    Get full text
    Article
  20. 3440

    Explore Machine Learning's Prediction of Football Games by Pan Bomao

    Published 2025-01-01
    “…In addition, the score changes show a high degree of randomness, reflecting that the game is affected by a variety of factors. …”
    Get full text
    Article