Showing 4,001 - 4,020 results of 17,304 for search '"random"', query time: 0.08s Refine Results
  1. 4001

    Analysis of time-dependent reliability of degenerated reinforced concrete structure by Zhang Hongping, Zhang Lili, Xia Zhengbing

    Published 2016-07-01
    “…Durability deterioration of structure is a highly random process. The maintenance of degenerated structure involves the calculation of the reliability of time-dependent structure. …”
    Get full text
    Article
  2. 4002

    QoS-based sensing scheduling protocol for wireless sensor networks by YAO Dao-yuan1, WANG Hai-lin 1, ZHANG Bao-xian2, LIU Hai-tao1

    Published 2010-01-01
    “…To satisfy the requirements of event detected latency according to different applications with unbalanced node density in randomly deployed large-scale wireless sensor networks,an adaptive distributed sensing scheduling protocol(ADSSP) which adaptively adjusts the duty cycles of sensor nodes based on node density and balances the energy consumption among sensor nodes was proposed.Compared with the random scheduling protocol,ADSSP can provide guaranteed lower average detection latency and also prolong the network lifetime up to 30 percent under the same situation.…”
    Get full text
    Article
  3. 4003

    Broadcast authentication algorithm for wireless sensor networks by YAO Xuan-xia, ZHENG Xue-feng, ZHOU Xian-wei

    Published 2010-01-01
    “…In order to authenticate the broadcast data in wireless sensor networks efficiently,a broadcast authentication algorithm based on the properties of one-way,quasi-commutative and absorbency in Nyberg’s fasting one-way accumulator was put forward.The MACs computed by hashing the broadcast data with the shared key between the broadcaster and each scheduled receiver were used to be the accumulative items in this algorithm.The detailed analyses in the aspects of the security,anti-captured and costs show that the proposed broadcast authentication algorithm can authenticate the random broadcast data immediately in small area and meet the essential requirements for broadcast authentication in wireless sensor networks.…”
    Get full text
    Article
  4. 4004

    On Complete Convergence of Moving Average Process for AANA Sequence by Wenzhi Yang, Xuejun Wang, Nengxiang Ling, Shuhe Hu

    Published 2012-01-01
    “…We investigate the moving average process such that Xn=∑i=1∞aiYi+n, n≥1, where ∑i=1∞|ai|<∞ and {Yi, 1≤i<∞} is a sequence of asymptotically almost negatively associated (AANA) random variables. The complete convergence, complete moment convergence, and the existence of the moment of supermum of normed partial sums are presented for this moving average process.…”
    Get full text
    Article
  5. 4005

    Attribute-based key-insulated signcryption with bidirectional anonymity by Xing-lan ZHANG, Zhen ZHANG

    Published 2013-11-01
    “…To solve exposure of secret key in attribute-based signcryption with anonymity for both sender and receiver, key-insulation mechanism to attribute-based signcryption was untroduced.Given the formal definition and security no-tions,the scheme of attribute-based key-insulated signcryption was proposed,which is provably secure under the random oracle model.The improved scheme not only satisfies the requirement of bidirectional anonymity,but also achieves for-ward security and afterward security,consequently reduced the hazard of key exposure.Finally, confidentiality, authenti-cation and anonymity in attribute-based key-insulated signcryption scheme were proved based on given security notions.…”
    Get full text
    Article
  6. 4006

    Two-Phase Generalized Reduced Gradient Method for Constrained Global Optimization by Abdelkrim El Mouatasim

    Published 2010-01-01
    “…The random perturbation of generalized reduced gradient method for optimization under nonlinear differentiable constraints is proposed. …”
    Get full text
    Article
  7. 4007

    Tuberculosis among Aboriginal and Nonaboriginal Persons in British Columbia by L Wang, K Noertjojo, RK Elwood, J Mark FitzGerald

    Published 2000-01-01
    “…OBJECTIVE: To compare cases of tuberculosis (TB) diagnosed among aboriginal persons with a random sample of nonaboriginal persons diagnosed with TB, and evaluate the trends in rates of disease between both groups during the same period.…”
    Get full text
    Article
  8. 4008

    On Feller's criterion for the law of the iterated logarithm by Deli Li, M. Bhaskara Rao, Xiangchen Wang

    Published 1994-01-01
    “…Combining Feller's criterion with a non-uniform estimate result in the context of the Central Limit Theorem for partial sums of independent random variables, we obtain several results on the Law of the Iterated Logarithm. …”
    Get full text
    Article
  9. 4009

    Data hiding method based on color table expansion technique by FEI Ru-chun1, WANG Li-na1, ZHANG Huan-guo1

    Published 2009-01-01
    “…Based on color table expansion technique for indexed images,a data hiding method was proposed,and the se-curity and the hiding capacity were analyzed.The analysis results show that this method has very strong security and very high hiding capacity.Secret data can be hidden in an indexed cover image to generate a stego-image with the same visual effect as the cover image and resumed without distortion from the stego-image if the correct key is used.In addition,the statistical feature of the secret data is completely covered up by using random data,so the stego-image is statistically in-dependent of the secret data.…”
    Get full text
    Article
  10. 4010

    Novel high accuracy and coverage localization algorithm for wireless sensor networks by XIANG Man-tian1, SHI Hao-shan1, LI Li-hong2, LONG Cheng-zhi3

    Published 2008-01-01
    “…In order to achieve the geographic positions of random nodes in wireless sensor networks more efficiently and aiming at the defect that poor accuracy and coverage of traditional bounding box approach, a new localization algorithm was proposed based on concentric triple-hop of node communication range. …”
    Get full text
    Article
  11. 4011

    Data aggregation in wireless sensor network for optimizing network lifetime by Qifen DONG, Hongyu CHEN, Guojun LI, Kang WANG, Zhen HONG

    Published 2016-06-01
    “…Taking target tracking in wireless sensor network(WSN)as application background,data aggregation for optimizing network lifetime based on extended Kalman filter method was researched,and an algorithm which considered both tracking accuracy and node energy to real-time schedule node groups involved in the data integration was designed.Simulations show that the proposed algorithm makes the tracking results do not deviate from the trajectory of target as long as the target speed is within a certain speed range.In addition,compared with the Random method and the All method,the proposed algorithm greatly prolongs network lifetime.…”
    Get full text
    Article
  12. 4012

    Victimization analysis model of user network behavior based on network traffic by Shengli ZHOU, Xiaoyang XU

    Published 2021-02-01
    “…The analysis of network victimization is of great significance to the prevention and control of telecom fraud.By studying the network traffic generated by the interaction between users and websites, a victimization identification model of telecom fraud crime based on network behavior flow analysis was proposed, the association rules between different behavior characteristics were analyzed, the behavior sequence features were reconstructed, and the victimization of network behavior sequence with random forest algorithm was evaluated.Based on the network behavior data set of public security organs, the experiment proves that the model can effectively improve the recognition accuracy of network behavior victimization.…”
    Get full text
    Article
  13. 4013

    Meta-analysis - interpretation of forest plots: A wood for the trees by Soumya Sarkar, Dalim Kumar Baidya

    Published 2025-01-01
    “…However, it is limited by its inability to control for random error, publication bias, heterogeneity, and confounding factors. …”
    Get full text
    Article
  14. 4014

    Upper bound of mean-square deviation of discrete linear consensus system by Quan-sheng DOU, Yu-rong LI, Ping JIANG

    Published 2016-10-01
    “…The consistency problem is the basis of cooperative control of multi-agents,and has wide application background.The previous research has given the sufficient condition for the linear consistency protocol to realize mean-square consistency problem .Based on graph theory and random analysis,the noise-deviation upper bound of linear discrete mean-square consistency problem was strictly proved further,at the same time,four different network were used as examples to explain the theoretical results.The conclusion provides theoretical basis for the noise evaluation and control of the linear discrete consistency system.…”
    Get full text
    Article
  15. 4015

    Study on the destination selection methods in router-level Internet topology measurement by JIANG Yu1, HE Song2

    Published 2006-01-01
    “…In order to improve the completeness of router level Internet topology measurement,the notion of self-contained destination set was defined first,and then existing destination selection methods were overviewed.After discussing the limitation of these existing methods,a viewpoint that the stub-network instead of the IP address should be taken as the sampling granularity was put forward,and a self-contained destination selection method that was termed all stub-networks coverage and two-step random selection was presented.Experiments show that this self-contained destination selection method guarantees the measurement completeness from the perspective of destination.…”
    Get full text
    Article
  16. 4016

    Dynamical Analysis of Two-Microorganism and Single Nutrient Stochastic Chemostat Model with Monod-Haldane Response Function by Mengnan Chi, Wencai Zhao

    Published 2019-01-01
    “…In this paper, we formulate and investigate a two-microorganism and single nutrient chemostat model with Monod-Haldane response function and random perturbation. First, for the corresponding deterministic system, we introduce the conditions of the stability of the equilibrium points. …”
    Get full text
    Article
  17. 4017

    An approach of Bagging ensemble based on feature set and application for traffic classification by Yaguan QIAN, Xiaohui GUAN, Shuhui WU, Bensheng YUN, Dongxiao REN

    Published 2018-04-01
    “…Bagging is a classic ensemble approach,whose effectiveness depends on the diversity of component base classifiers.In order to gain the largest diversity,employing genetic algorithms to get independent feature subset for each base classifier was proposed.Meanwhile,for better generalization,the optimal weights for the base classifiers according to their predictive performance were selected.Finally,refined Bagging ensemble based on simple Softmax regression was applied successfully in traffic classification.The experiment result shows that the proposed approach can get more improvement than the original Bagging ensemble in classification performance,and is better than the random-forests to a certain extent.…”
    Get full text
    Article
  18. 4018

    Analysis of Mistuned Dynamic Response of Tuned Flexible Mechanism by Yu Linchong

    Published 2015-01-01
    “…The tuned mechanism has mistuned dynamic response when significant flexibleness of components and high speed of mechanism are considered.In order to research mistuned responses,a virtual prototype model of tuned flexible mechanism is applied to simulate kinematics and dynamics.Dynamic responses are simulated in case of mistuned force and mistuned mass.The random parameter sampling data are computed by Monte Carlo method and stochastic response distribution is given by statistical analysis.The results showed that there are mistuned responses in periodical flexible mechanism.The mistuned responses are propagated in form of components vibration in flexible mechanism.The research has laid foundation on vibration localization features of mistuned mechanism.…”
    Get full text
    Article
  19. 4019

    Personalized service composition based on multi-strategy discrete differential evolution in mobile internet by Bin XU, Jin QI, Xi YIN, Ye WANG, Ruiyun CHANG

    Published 2016-02-01
    “…The algorithm, which adopts a random selection framework and multi-mutation strategies with different properties,was the balance of search ability and convergence speed. …”
    Get full text
    Article
  20. 4020

    Study of implicit information semi-supervised learning algorithm by Guo-dong LIU, Jing XU, Guo-bing ZHANG

    Published 2015-10-01
    “…Implicit information semi supervised learning algorithm was studied.The implicit information semi supervised learning algorithm was used in support vector machine and random forest,which were called semi-SVM and semi-RF.The semi-SVM and semi-RF were evaluated by using UCI,the experimental results show that the semi-SVM and semi-RF are more effective and more precise.The semi-SVM and semi-RF were applied to classifying lung sounds,and verified the effect by using the actual lung sounds data.the quantity and quality of samples affect semi-SVM and semi-RF were analyzed.…”
    Get full text
    Article