Showing 3,921 - 3,940 results of 17,304 for search '"random"', query time: 0.10s Refine Results
  1. 3921

    Generalized Residual Entropy and Upper Record Values by Suchandan Kayal

    Published 2015-01-01
    “…Further, based on this measure, we study some comparison results between a random variable and its weighted version. Finally, we describe some estimation techniques to estimate the generalized residual entropy of a lifetime distribution.…”
    Get full text
    Article
  2. 3922

    A Gauss-Kuzmin Theorem and Related Questions for θ-Expansions by Gabriela Ileana Sebe, Dan Lascu

    Published 2014-01-01
    “…Together with the ergodic behavior of a certain homogeneous random system with complete connections, this allows us to solve a variant of Gauss-Kuzmin problem for the previous fraction expansion.…”
    Get full text
    Article
  3. 3923

    LBS-oriented location privacy protection model and scheme by Song-tao YANG, Chun-guang MA, Chang-li ZHOU

    Published 2014-08-01
    “…A location privacy protection model was proposed based on the central server structure, designed a location privacy protection scheme based on pseudo-random permutation for the model. Proposed scheme builds on k-anonymous and secret information retrieval technology design concept and methods, achieves a blind query and perfect anonymous. …”
    Get full text
    Article
  4. 3924

    Threshold ring signature for wireless sensor networks by Jun-fang XIAO, Jian LIAO, Gui-hua ZENG

    Published 2012-03-01
    “…Compared with traditional network,the wireless sensor nodes are limited in the storage,mobility,computation,energy,and so on.A threshold ring signature scheme suitable for wireless sensor networks based on bilinear pairings was proposed.Assuming the abstrusity of computational Diffie-Hellman problem,the secure proof was shown in the model of random oracles using the reduction to the contravention.Proposed scheme also had other characteristics,such as robustness,multi-signature and parallel computation.…”
    Get full text
    Article
  5. 3925

    The Optimal Control and MLE of Parameters of a Stochastic Single-Species System by Huili Xiang, Zhijun Liu

    Published 2012-01-01
    “…This paper investigates the optimal control and MLE (maximum likelihood estimation) for a single-species system subject to random perturbation. With the help of the techniques of stochastic analysis and mathematical statistics, sufficient conditions for the optimal control threshold value, the optimal control moment, and the maximum likelihood estimation of parameters are established, respectively. …”
    Get full text
    Article
  6. 3926

    Hubungan Kadar Glukosa Darah Saat Masuk Rumah Sakit Dengan Lama Hari Rawat Pasien Sindrom Koroner Akut (SKA) Di RSUP Dr. M. Djamil Padang by Rosi Oktarina, Yertizal Karani, Zulkarnain Edward

    Published 2013-05-01
    “…Research found that the most of ACS patients admitted to the hospital with as random blood glucose of ≥200 mg/dl (40%) and length of stay for ≥7 days (52%). …”
    Get full text
    Article
  7. 3927

    Cantelli’s Bounds for Generalized Tail Inequalities by Nicola Apollonio

    Published 2025-01-01
    “…Three diverse applications to random matrices, tails of linear images of random vectors, and network homophily are also given.…”
    Get full text
    Article
  8. 3928

    A Survey of Data Partitioning and Sampling Methods to Support Big Data Analysis by Mohammad Sultan Mahmud, Joshua Zhexue Huang, Salman Salloum, Tamer Z. Emara, Kuanishbay Sadatdiynov

    Published 2020-06-01
    “…The basic methods of data partitioning are then discussed including three classical horizontal partitioning schemes: range, hash, and random partitioning. Data partitioning on Hadoop clusters is also discussed with a summary of new strategies for big data partitioning, including the new Random Sample Partition (RSP) distributed model. …”
    Get full text
    Article
  9. 3929

    A Long-Term Study of Aerobic Performance in Elite Cross-Country Skiers: How Age and Sex Influence Career Development by Elias Bucher, Jon P. Wehrlin, Grégoire P. Millet, Thomas Steiner

    Published 2025-01-01
    “…The performance trajectories were modeled using mixed-effects approaches, with a linear random intercept for VO2max, a linear random slope for LT2, and a third-degree polynomial for 24-min DP. …”
    Get full text
    Article
  10. 3930

    Coronary Heart Disease Risk Prediction Model Based on Machine Learning by YUE Haitao, HE Chanchan, CHENG Yuyou, ZHANG Sencheng, WU You, MA Jing

    Published 2025-02-01
    “…Factors influencing the incidence of CHD were explored through univariate analysis and stepwise logistic regression to select pertinent variables for inclusion in the predictive model. A random sample comprising 10% of the participants (11 261 individuals) was drawn and then randomly divided into training and testing datasets at an 8∶2 ratio. …”
    Get full text
    Article
  11. 3931

    Spectral properties of Levy Rosenzweig-Porter model via supersymmetric approach by Elizaveta Safonova, Mikhail Feigel'man, Vladimir Kravtsov

    Published 2025-01-01
    “…By using the Efetov's super-symmetric formalism we computed analytically the mean spectral density $\rho(E)$ for the Lévy and the Lévy -Rosenzweig-Porter random matrices which off-diagonal elements are strongly non-Gaussian with power-law tails. …”
    Get full text
    Article
  12. 3932

    Factors affecting repurchase intention with customer engagement as intervening variables in B2B context by Negina Kencono Putri, Arief Wisnu Wardhana

    Published 2023-11-01
    “…Method: The selected population is manufacturing companies in Indonesia, with a total of 100 respondents. Simple random sampling was used to determine the respondents, while Smart PLS was used to test the hypothesis.…”
    Get full text
    Article
  13. 3933

    Domain-based key management for heterogeneous wireless sensor networks by MA Chun-guang, SHANG Zhi-guo, WANG Hui-qiang

    Published 2009-01-01
    “…Key management was one of the most challenging security problems in wireless sensor networks. Based on the random key pre-distribution scheme, a new scheme was proposed for heterogeneous wireless sensor networks using deployment knowledge of the node and the prior area deployment information. …”
    Get full text
    Article
  14. 3934

    Comparing Estimation Methods for the FPLD by Agostino Tarsitano

    Published 2010-01-01
    “…It will be shown that the proposed model realistically approximates a number of families of probability distributions, has feasible methods for its parameter estimation, and offers an easier way to generate random numbers.…”
    Get full text
    Article
  15. 3935

    On the birthday problem: some generalizations and applications by P. N. Rathie, P. Zörnig

    Published 2003-01-01
    “…The distribution is generalized in two possible directions, one of them consists in considering a random graph with a single attracting center. Possible applications are also indicated.…”
    Get full text
    Article
  16. 3936

    Construction of LDPC codes for higher burst-error detecting by YAO Chun-guang1, GE Xin2, LIU Ying-nan3, ZHANG Jian2

    Published 2007-01-01
    “…The coding of LDPC codes is focused on several aspects: high error-correction,low coding complexity and so on.All the construction methods do not give much consideration on hamming-distance and its distribution because of computation complexity.A suboptimal scheme which is with emphasis on hamming-distance and its distribution was presented.The codes introduced from this scheme can detect all burst-errors within the length of check matrix’s rank and has no loss in performance of random-error-correction.…”
    Get full text
    Article
  17. 3937

    Wav-audio steganography algorithm based on amplitude modifying by 邹明光, 李芝棠

    Published 2014-10-01
    “…Algorithms in different effective domains are analysed,and a wav-audio steganography algorithm based on amplitude modifying is proposed.The secret audio is scrambled through a random number generator.Amplitude values of each sampling point group are compared in original audio.While amplitude values are modified,the secret information bits are embedded.Embedding strength can be adjusted according to the key.Simulation results demonstrate that hiding capacity of this algorithm is large and good invisibility can be achieved.The anti-steganalysis ability of this algorithm is good and blind extraction can be realized.…”
    Get full text
    Article
  18. 3938

    Theory of kinetically-constrained-models dynamics by Gianmarco Perrupato, Tommaso Rizzo

    Published 2025-01-01
    “…Analytical predictions obtained for the dynamical exponents are successfully compared with numerical simulations in a wide range of models, including the case of generic values of the connectivity and the facilitation, random pinning and fluctuating facilitation. The theory is thus validated for both continuous and discontinuous transitions and also in the case of higher order critical points characterized by logarithmic decays.…”
    Get full text
    Article
  19. 3939

    A FUZZY LOGIC MODEL FOR HUMAN DISTRESS DETECTION by DIMPLE OGUNBIYI, IBRAHIM OGUNDOYIN, CALEB AKANBI

    Published 2024-01-01
    “…Experiments were carried out using random samples of data values to test the behavior of the model. …”
    Get full text
    Article
  20. 3940

    A Green′s function for a convertible bond using the Vasicek model by R. Mallier, A. S. Deakin

    Published 2002-01-01
    “…We consider a convertible security where the underlying stock price obeys a lognormal random walk and the risk-free rate is given by the Vasicek model. …”
    Get full text
    Article