Suggested Topics within your search.
Suggested Topics within your search.
- Rhetoric 5
- English language 4
- Grammar 4
- Attitude to Health 3
- Behavioral Medicine 2
- Handbooks, manuals, etc 2
- Health behavior 2
- Psychology 2
- Animals 1
- Brothers and sisters 1
- Business communication 1
- Business writing 1
- Care 1
- Case studies 1
- Child development 1
- Child rearing 1
- Communication in organizations 1
- Dialectical materialism 1
- Education 1
- Elias (Fictitious character) 1
- English 1
- Examinations, questions, etc 1
- Fantasy 1
- Fiction 1
- Fugitives from justice 1
- Habitat (Ecology) 1
- Health 1
- Infants 1
- Laia (Fictitious character) 1
- Mass media 1
-
3921
Generalized Residual Entropy and Upper Record Values
Published 2015-01-01“…Further, based on this measure, we study some comparison results between a random variable and its weighted version. Finally, we describe some estimation techniques to estimate the generalized residual entropy of a lifetime distribution.…”
Get full text
Article -
3922
A Gauss-Kuzmin Theorem and Related Questions for θ-Expansions
Published 2014-01-01“…Together with the ergodic behavior of a certain homogeneous random system with complete connections, this allows us to solve a variant of Gauss-Kuzmin problem for the previous fraction expansion.…”
Get full text
Article -
3923
LBS-oriented location privacy protection model and scheme
Published 2014-08-01“…A location privacy protection model was proposed based on the central server structure, designed a location privacy protection scheme based on pseudo-random permutation for the model. Proposed scheme builds on k-anonymous and secret information retrieval technology design concept and methods, achieves a blind query and perfect anonymous. …”
Get full text
Article -
3924
Threshold ring signature for wireless sensor networks
Published 2012-03-01“…Compared with traditional network,the wireless sensor nodes are limited in the storage,mobility,computation,energy,and so on.A threshold ring signature scheme suitable for wireless sensor networks based on bilinear pairings was proposed.Assuming the abstrusity of computational Diffie-Hellman problem,the secure proof was shown in the model of random oracles using the reduction to the contravention.Proposed scheme also had other characteristics,such as robustness,multi-signature and parallel computation.…”
Get full text
Article -
3925
The Optimal Control and MLE of Parameters of a Stochastic Single-Species System
Published 2012-01-01“…This paper investigates the optimal control and MLE (maximum likelihood estimation) for a single-species system subject to random perturbation. With the help of the techniques of stochastic analysis and mathematical statistics, sufficient conditions for the optimal control threshold value, the optimal control moment, and the maximum likelihood estimation of parameters are established, respectively. …”
Get full text
Article -
3926
Hubungan Kadar Glukosa Darah Saat Masuk Rumah Sakit Dengan Lama Hari Rawat Pasien Sindrom Koroner Akut (SKA) Di RSUP Dr. M. Djamil Padang
Published 2013-05-01“…Research found that the most of ACS patients admitted to the hospital with as random blood glucose of ≥200 mg/dl (40%) and length of stay for ≥7 days (52%). …”
Get full text
Article -
3927
Cantelli’s Bounds for Generalized Tail Inequalities
Published 2025-01-01“…Three diverse applications to random matrices, tails of linear images of random vectors, and network homophily are also given.…”
Get full text
Article -
3928
A Survey of Data Partitioning and Sampling Methods to Support Big Data Analysis
Published 2020-06-01“…The basic methods of data partitioning are then discussed including three classical horizontal partitioning schemes: range, hash, and random partitioning. Data partitioning on Hadoop clusters is also discussed with a summary of new strategies for big data partitioning, including the new Random Sample Partition (RSP) distributed model. …”
Get full text
Article -
3929
A Long-Term Study of Aerobic Performance in Elite Cross-Country Skiers: How Age and Sex Influence Career Development
Published 2025-01-01“…The performance trajectories were modeled using mixed-effects approaches, with a linear random intercept for VO2max, a linear random slope for LT2, and a third-degree polynomial for 24-min DP. …”
Get full text
Article -
3930
Coronary Heart Disease Risk Prediction Model Based on Machine Learning
Published 2025-02-01“…Factors influencing the incidence of CHD were explored through univariate analysis and stepwise logistic regression to select pertinent variables for inclusion in the predictive model. A random sample comprising 10% of the participants (11 261 individuals) was drawn and then randomly divided into training and testing datasets at an 8∶2 ratio. …”
Get full text
Article -
3931
Spectral properties of Levy Rosenzweig-Porter model via supersymmetric approach
Published 2025-01-01“…By using the Efetov's super-symmetric formalism we computed analytically the mean spectral density $\rho(E)$ for the Lévy and the Lévy -Rosenzweig-Porter random matrices which off-diagonal elements are strongly non-Gaussian with power-law tails. …”
Get full text
Article -
3932
Factors affecting repurchase intention with customer engagement as intervening variables in B2B context
Published 2023-11-01“…Method: The selected population is manufacturing companies in Indonesia, with a total of 100 respondents. Simple random sampling was used to determine the respondents, while Smart PLS was used to test the hypothesis.…”
Get full text
Article -
3933
Domain-based key management for heterogeneous wireless sensor networks
Published 2009-01-01“…Key management was one of the most challenging security problems in wireless sensor networks. Based on the random key pre-distribution scheme, a new scheme was proposed for heterogeneous wireless sensor networks using deployment knowledge of the node and the prior area deployment information. …”
Get full text
Article -
3934
Comparing Estimation Methods for the FPLD
Published 2010-01-01“…It will be shown that the proposed model realistically approximates a number of families of probability distributions, has feasible methods for its parameter estimation, and offers an easier way to generate random numbers.…”
Get full text
Article -
3935
On the birthday problem: some generalizations and applications
Published 2003-01-01“…The distribution is generalized in two possible directions, one of them consists in considering a random graph with a single attracting center. Possible applications are also indicated.…”
Get full text
Article -
3936
Construction of LDPC codes for higher burst-error detecting
Published 2007-01-01“…The coding of LDPC codes is focused on several aspects: high error-correction,low coding complexity and so on.All the construction methods do not give much consideration on hamming-distance and its distribution because of computation complexity.A suboptimal scheme which is with emphasis on hamming-distance and its distribution was presented.The codes introduced from this scheme can detect all burst-errors within the length of check matrix’s rank and has no loss in performance of random-error-correction.…”
Get full text
Article -
3937
Wav-audio steganography algorithm based on amplitude modifying
Published 2014-10-01“…Algorithms in different effective domains are analysed,and a wav-audio steganography algorithm based on amplitude modifying is proposed.The secret audio is scrambled through a random number generator.Amplitude values of each sampling point group are compared in original audio.While amplitude values are modified,the secret information bits are embedded.Embedding strength can be adjusted according to the key.Simulation results demonstrate that hiding capacity of this algorithm is large and good invisibility can be achieved.The anti-steganalysis ability of this algorithm is good and blind extraction can be realized.…”
Get full text
Article -
3938
Theory of kinetically-constrained-models dynamics
Published 2025-01-01“…Analytical predictions obtained for the dynamical exponents are successfully compared with numerical simulations in a wide range of models, including the case of generic values of the connectivity and the facilitation, random pinning and fluctuating facilitation. The theory is thus validated for both continuous and discontinuous transitions and also in the case of higher order critical points characterized by logarithmic decays.…”
Get full text
Article -
3939
A FUZZY LOGIC MODEL FOR HUMAN DISTRESS DETECTION
Published 2024-01-01“…Experiments were carried out using random samples of data values to test the behavior of the model. …”
Get full text
Article -
3940
A Green′s function for a convertible bond using the Vasicek model
Published 2002-01-01“…We consider a convertible security where the underlying stock price obeys a lognormal random walk and the risk-free rate is given by the Vasicek model. …”
Get full text
Article