Showing 4,021 - 4,040 results of 17,304 for search '"random"', query time: 0.10s Refine Results
  1. 4021

    Statistical covariance blind detection algorithm based on cholesky factorization in cognitive radio network by Ying-xue LI, Shu-qun SHEN, Lang-tao HU, Qiu-cai WANG

    Published 2012-11-01
    “…As the blind covariance detection algorithm has the shortcoming that the performance parameters are obtained using non-asymptotic method,a new blind detection algorithm was presented using cholesky factorization.Utilizing random matrix theory,the performance parameters was derived using non-asymptotic method.The proposed method overcomes the noise uncertainty problem and performs well without information about the channel,primary user and noise.Numerical simulation results demonstrate that the performance parameters expressions are correct and the new detector outperforms the other blind covariance detectors.…”
    Get full text
    Article
  2. 4022

    Low Cost Safety Data Storage and Processing Framework Under Cloud Environment by Limin Zhang

    Published 2015-02-01
    “…In addition, the security of this algorithm was guaranteed by using Paillier encryption and a random perturbation technique. Experimental results show that the proposed method is scalable to big matrices while requiring low client-side costs.…”
    Get full text
    Article
  3. 4023

    Highly reliable access algorithm for PD-NOMA based IoT with delay guarantee by Chaonong XU, Jianxiong WU, Yongjun XU

    Published 2020-09-01
    “…A single-hop PD-NOMA network supporting k-successive interference cancellation (k-SIC) was considered.Given the real-time performance requirements,how to maximize the average reliability of uplink transmissions by the joint users grouping and power allocation was studied.A heuristic algorithm with complexity of O(nlogn) was presented,where n was the number of users.The algorithm was also proved to be the optimal if k=2.The performance evaluations reveal that the transmission reliability will increase exponentially with the linear degradation of the real-time performance guarantee.Besides,the transmission reliability is enhanced with respect to the random users grouping algorithm.…”
    Get full text
    Article
  4. 4024

    Relay-based cooperative MAC protocol with rate adaptation by Fang-min LI, Tao ZHANG, Shuang-yin HU, Xin-hua LIU

    Published 2017-10-01
    “…The existing wireless cooperative MAC protocols rarely consider the impact of channel condition and node energy consumption.To this issue,a new wireless cooperative MAC protocol was proposed,which used the random linear network coding,and introduced a mechanism of request relay frame to solve the hidden terminal problem.Specifically,the proposed method adaptively adjusted the node rate according to RSSI,and determined the relay node based on the requirements of cooperative transmission.The simulation results show that the network performance can be improved through deploying the proposed protocol.…”
    Get full text
    Article
  5. 4025

    Growth of a Renormalized Operator as a Probe of Chaos by Xing Huang, Binchao Zhang

    Published 2022-01-01
    “…The first one is a MERA-like tensor network built from a random unitary circuit with the operator size defined using the integrated out-of-time-ordered correlator (OTOC). …”
    Get full text
    Article
  6. 4026

    Extraction of Fast Changes in the Structure of a Disordered Ensemble of Photoexcited Biomolecules by H.-C. Poon, M. Schmidt, D. K. Saldin

    Published 2013-01-01
    “…We show here that quantities extractable from multiple diffraction patterns of dissolved molecules in random orientations, as measured using powerful ultrashort pulses of X-rays, also contain information about structural changes of a molecule on photoexcitation.…”
    Get full text
    Article
  7. 4027

    Living body recognition method based on facial feature point motion by Yulong WANG, Kaiyuan LIU

    Published 2018-06-01
    “…A kind of living body recognition method was proposed,which was applied in mobile terminal and based on the deep learning.A facial movements LSTM network was trained using data sets.When users input a random sequence of video,user’s facial feature point data can be gained and whether the video forgery attacks happened will be determined by input user’s facial feature point data into circulation neural network.The test data shows that the proposed method can be protected effectively from photograph attack and video replay attack.…”
    Get full text
    Article
  8. 4028

    Reattack of a Certificateless Aggregate Signature Scheme with Constant Pairing Computations by Hang Tu, Debiao He, Baojun Huang

    Published 2014-01-01
    “…Security analysis shows that the proposed certificateless aggregate signature scheme is provably secured in the random oracle.…”
    Get full text
    Article
  9. 4029

    Rayleigh Mixture Distribution by Rezaul Karim, Pear Hossain, Sultana Begum, Forhad Hossain

    Published 2011-01-01
    “…The exact probability density functions of the mixture of two correlated Rayleigh random variables have been derived. Different moments, characteristic functions, shape characteristics, and the estimates of the parameters of the proposed mixture distributions using method of moments have also been provided.…”
    Get full text
    Article
  10. 4030

    Scheme for identifying malware traffic with TLS data based on machine learning by Ziming LUO, Shubin XU, Xiaodong LIU

    Published 2020-02-01
    “…Based on analyzing the characteristics of transport layer security (TLS) protocol,a distributed automation malicious traffic detecting system based on machine learning was designed.The characteristics of encrypted malware traffic from TLS data,observable metadata and contextual flow data was extracted.Support vector machine,random forest and extreme gradient boosting were used to compare the performance of the mainstream malicious encryption traffic identification which realized the efficient detection of malicious encryption traffic,and verified the validity of the detection system of malicious encryption traffic.…”
    Get full text
    Article
  11. 4031

    BIOMONITORING PENCEMARAN UDARA MENGGUNAKAN BIOINDIKATOR LICHENES DI KOTA MADIUN by Anikhotul Ihrom, Ani Sulistyarsi

    Published 2015-11-01
    “…Samples were taken by random sampling technique. Pb content measurement using Atomic Absorption Spectrophotometer (AAS). …”
    Get full text
    Article
  12. 4032

    Långsiktiga prognoser av platsbehovet på fängelser by Hanns von Hofer

    Published 2010-08-01
    “…It is concluded that accurate long-term forecasts are unlikely, since prison population data tend to show strong random walk patterns.…”
    Get full text
    Article
  13. 4033

    Vessel-Bridge Collision Reliability Assessment Based on Structural Dynamic Analysis by Fu Tao, Ren Xiaoqian, Wang Kai

    Published 2021-01-01
    “…In this paper, a new method is proposed based on structural dynamic analysis. The random characteristics of three factors—impact angle, deadweight tonnage of vessels, and impact velocity—are considered. …”
    Get full text
    Article
  14. 4034

    Design and implementation of the controller scheduling-time in SDN by Zhenping LU, Fucai CHEN, Guozhen CHENG

    Published 2018-01-01
    “…Introducing multiple controllers to software defined network so that dynamically altering the mapping relationship between controller and the underlying network is an effective method to ease the security threats in control plane.However,little previous work has been done to investigate the economical time in dynamic-scheduling controllers.Firstly,the importance of scheduling-time in dynamic control plane based on security in SDN and dynamic control plane was introduced.Further,this problem was modeled as a renewal reward process and an optimal algorithm in deciding the right time to schedule was proposed.In our experiments,Simulations based on real network attack dataset are conducted and it demonstrate that proposed algorithm outperforms fixed-cycle algorithms and random algorithm.…”
    Get full text
    Article
  15. 4035

    A General Result on the Mean Integrated Squared Error of the Hard Thresholding Wavelet Estimator under α-Mixing Dependence by Christophe Chesneau

    Published 2014-01-01
    “…Another application concerns the regression model with random design.…”
    Get full text
    Article
  16. 4036

    Molecular simulation of perfluorohexane adsorption in BAM-P109 activated carbon by Lev Sarkisov

    Published 2016-02-01
    “…The model is based on random packing of structural elements, here provided by hydroxyl-functionalized corannulene molecules. …”
    Get full text
    Article
  17. 4037

    Reliability Analysis of the Proportional Mean Departure Time Model by Mansour Shrahili, Mohamed Kayid

    Published 2022-01-01
    “…Finally, the model is extended to entertain random amounts of the parameter and establish a proportional mean departure time frailty model. …”
    Get full text
    Article
  18. 4038

    Fair and anonymous ID-based multi-receiver signcryption by Liao-jun PANG, Lu GAO, Qing-qi PEI, Yu-min WANG

    Published 2013-08-01
    “…In order to solve the identify information exposure problem and the decryption unfairness problem in Lal et al’s identity-based multi-receiver signcryption scheme,a novel identity-based multi-receiver signcryption scheme,using the Lagrange interpolation method,was proposed to meet the requirements of the identity anonymity and the decryption fairness.Based on the Bilinear Diffie-Hellman and computational Diffie-Hellman assumptions,the security of IND-sMIBSC-CCA2 and EUF-sMIBSC-CMA was proved formally under the random oracle model,which shows that the proposed scheme can achieve the confidentiality and the unforgeablity required.…”
    Get full text
    Article
  19. 4039

    Public key searchable encryption scheme based on blockchain by Ruizhong DU, Ailun TAN, Junfeng TIAN

    Published 2020-04-01
    “…Aiming at the trapdoor security problem of the public key encryption scheme,a random number constructing trapdoor and index was introduced to defend against keyword guessing attacks from the server and avoid data leakage caused by server curious behavior.Research on trusted issues of third parties,the blockchain mechanism with a searchable encryption scheme was combined,and smart contracts as trusted third parties for retrieval was used,which could prevent keyword guessing attacks inside the server and ensure retrieval.The correctness of the results,thereby limiting the malicious behavior of the server when sending data.The solution was analyzed for security and the verification scheme satisfies IND-KGA security.Experiments in real data sets,compared with other programs,prove that the program has certain advantages in time overhead.…”
    Get full text
    Article
  20. 4040

    Kinetics of Cation Desorption from Heterogeneous Solid Surface at Very Low Coverage by Edward W. Thornton, Guy Renn

    Published 1985-03-01
    “…On a number of real adsorbents the kinetics are explained by rate limiting desorption from random, weakly heterogeneous surface sites. Slow desorption is not liquid phase diffusion-controlled. …”
    Get full text
    Article