Suggested Topics within your search.
Suggested Topics within your search.
- Rhetoric 5
- English language 4
- Grammar 4
- Attitude to Health 3
- Behavioral Medicine 2
- Handbooks, manuals, etc 2
- Health behavior 2
- Psychology 2
- Animals 1
- Brothers and sisters 1
- Business communication 1
- Business writing 1
- Care 1
- Case studies 1
- Child development 1
- Child rearing 1
- Communication in organizations 1
- Dialectical materialism 1
- Education 1
- Elias (Fictitious character) 1
- English 1
- Examinations, questions, etc 1
- Fantasy 1
- Fiction 1
- Fugitives from justice 1
- Habitat (Ecology) 1
- Health 1
- Infants 1
- Laia (Fictitious character) 1
- Mass media 1
-
4021
Statistical covariance blind detection algorithm based on cholesky factorization in cognitive radio network
Published 2012-11-01“…As the blind covariance detection algorithm has the shortcoming that the performance parameters are obtained using non-asymptotic method,a new blind detection algorithm was presented using cholesky factorization.Utilizing random matrix theory,the performance parameters was derived using non-asymptotic method.The proposed method overcomes the noise uncertainty problem and performs well without information about the channel,primary user and noise.Numerical simulation results demonstrate that the performance parameters expressions are correct and the new detector outperforms the other blind covariance detectors.…”
Get full text
Article -
4022
Low Cost Safety Data Storage and Processing Framework Under Cloud Environment
Published 2015-02-01“…In addition, the security of this algorithm was guaranteed by using Paillier encryption and a random perturbation technique. Experimental results show that the proposed method is scalable to big matrices while requiring low client-side costs.…”
Get full text
Article -
4023
Highly reliable access algorithm for PD-NOMA based IoT with delay guarantee
Published 2020-09-01“…A single-hop PD-NOMA network supporting k-successive interference cancellation (k-SIC) was considered.Given the real-time performance requirements,how to maximize the average reliability of uplink transmissions by the joint users grouping and power allocation was studied.A heuristic algorithm with complexity of O(nlogn) was presented,where n was the number of users.The algorithm was also proved to be the optimal if k=2.The performance evaluations reveal that the transmission reliability will increase exponentially with the linear degradation of the real-time performance guarantee.Besides,the transmission reliability is enhanced with respect to the random users grouping algorithm.…”
Get full text
Article -
4024
Relay-based cooperative MAC protocol with rate adaptation
Published 2017-10-01“…The existing wireless cooperative MAC protocols rarely consider the impact of channel condition and node energy consumption.To this issue,a new wireless cooperative MAC protocol was proposed,which used the random linear network coding,and introduced a mechanism of request relay frame to solve the hidden terminal problem.Specifically,the proposed method adaptively adjusted the node rate according to RSSI,and determined the relay node based on the requirements of cooperative transmission.The simulation results show that the network performance can be improved through deploying the proposed protocol.…”
Get full text
Article -
4025
Growth of a Renormalized Operator as a Probe of Chaos
Published 2022-01-01“…The first one is a MERA-like tensor network built from a random unitary circuit with the operator size defined using the integrated out-of-time-ordered correlator (OTOC). …”
Get full text
Article -
4026
Extraction of Fast Changes in the Structure of a Disordered Ensemble of Photoexcited Biomolecules
Published 2013-01-01“…We show here that quantities extractable from multiple diffraction patterns of dissolved molecules in random orientations, as measured using powerful ultrashort pulses of X-rays, also contain information about structural changes of a molecule on photoexcitation.…”
Get full text
Article -
4027
Living body recognition method based on facial feature point motion
Published 2018-06-01“…A kind of living body recognition method was proposed,which was applied in mobile terminal and based on the deep learning.A facial movements LSTM network was trained using data sets.When users input a random sequence of video,user’s facial feature point data can be gained and whether the video forgery attacks happened will be determined by input user’s facial feature point data into circulation neural network.The test data shows that the proposed method can be protected effectively from photograph attack and video replay attack.…”
Get full text
Article -
4028
Reattack of a Certificateless Aggregate Signature Scheme with Constant Pairing Computations
Published 2014-01-01“…Security analysis shows that the proposed certificateless aggregate signature scheme is provably secured in the random oracle.…”
Get full text
Article -
4029
Rayleigh Mixture Distribution
Published 2011-01-01“…The exact probability density functions of the mixture of two correlated Rayleigh random variables have been derived. Different moments, characteristic functions, shape characteristics, and the estimates of the parameters of the proposed mixture distributions using method of moments have also been provided.…”
Get full text
Article -
4030
Scheme for identifying malware traffic with TLS data based on machine learning
Published 2020-02-01“…Based on analyzing the characteristics of transport layer security (TLS) protocol,a distributed automation malicious traffic detecting system based on machine learning was designed.The characteristics of encrypted malware traffic from TLS data,observable metadata and contextual flow data was extracted.Support vector machine,random forest and extreme gradient boosting were used to compare the performance of the mainstream malicious encryption traffic identification which realized the efficient detection of malicious encryption traffic,and verified the validity of the detection system of malicious encryption traffic.…”
Get full text
Article -
4031
BIOMONITORING PENCEMARAN UDARA MENGGUNAKAN BIOINDIKATOR LICHENES DI KOTA MADIUN
Published 2015-11-01“…Samples were taken by random sampling technique. Pb content measurement using Atomic Absorption Spectrophotometer (AAS). …”
Get full text
Article -
4032
Långsiktiga prognoser av platsbehovet på fängelser
Published 2010-08-01“…It is concluded that accurate long-term forecasts are unlikely, since prison population data tend to show strong random walk patterns.…”
Get full text
Article -
4033
Vessel-Bridge Collision Reliability Assessment Based on Structural Dynamic Analysis
Published 2021-01-01“…In this paper, a new method is proposed based on structural dynamic analysis. The random characteristics of three factors—impact angle, deadweight tonnage of vessels, and impact velocity—are considered. …”
Get full text
Article -
4034
Design and implementation of the controller scheduling-time in SDN
Published 2018-01-01“…Introducing multiple controllers to software defined network so that dynamically altering the mapping relationship between controller and the underlying network is an effective method to ease the security threats in control plane.However,little previous work has been done to investigate the economical time in dynamic-scheduling controllers.Firstly,the importance of scheduling-time in dynamic control plane based on security in SDN and dynamic control plane was introduced.Further,this problem was modeled as a renewal reward process and an optimal algorithm in deciding the right time to schedule was proposed.In our experiments,Simulations based on real network attack dataset are conducted and it demonstrate that proposed algorithm outperforms fixed-cycle algorithms and random algorithm.…”
Get full text
Article -
4035
A General Result on the Mean Integrated Squared Error of the Hard Thresholding Wavelet Estimator under α-Mixing Dependence
Published 2014-01-01“…Another application concerns the regression model with random design.…”
Get full text
Article -
4036
Molecular simulation of perfluorohexane adsorption in BAM-P109 activated carbon
Published 2016-02-01“…The model is based on random packing of structural elements, here provided by hydroxyl-functionalized corannulene molecules. …”
Get full text
Article -
4037
Reliability Analysis of the Proportional Mean Departure Time Model
Published 2022-01-01“…Finally, the model is extended to entertain random amounts of the parameter and establish a proportional mean departure time frailty model. …”
Get full text
Article -
4038
Fair and anonymous ID-based multi-receiver signcryption
Published 2013-08-01“…In order to solve the identify information exposure problem and the decryption unfairness problem in Lal et al’s identity-based multi-receiver signcryption scheme,a novel identity-based multi-receiver signcryption scheme,using the Lagrange interpolation method,was proposed to meet the requirements of the identity anonymity and the decryption fairness.Based on the Bilinear Diffie-Hellman and computational Diffie-Hellman assumptions,the security of IND-sMIBSC-CCA2 and EUF-sMIBSC-CMA was proved formally under the random oracle model,which shows that the proposed scheme can achieve the confidentiality and the unforgeablity required.…”
Get full text
Article -
4039
Public key searchable encryption scheme based on blockchain
Published 2020-04-01“…Aiming at the trapdoor security problem of the public key encryption scheme,a random number constructing trapdoor and index was introduced to defend against keyword guessing attacks from the server and avoid data leakage caused by server curious behavior.Research on trusted issues of third parties,the blockchain mechanism with a searchable encryption scheme was combined,and smart contracts as trusted third parties for retrieval was used,which could prevent keyword guessing attacks inside the server and ensure retrieval.The correctness of the results,thereby limiting the malicious behavior of the server when sending data.The solution was analyzed for security and the verification scheme satisfies IND-KGA security.Experiments in real data sets,compared with other programs,prove that the program has certain advantages in time overhead.…”
Get full text
Article -
4040
Kinetics of Cation Desorption from Heterogeneous Solid Surface at Very Low Coverage
Published 1985-03-01“…On a number of real adsorbents the kinetics are explained by rate limiting desorption from random, weakly heterogeneous surface sites. Slow desorption is not liquid phase diffusion-controlled. …”
Get full text
Article