Suggested Topics within your search.
Suggested Topics within your search.
- Rhetoric 5
- English language 4
- Grammar 4
- Attitude to Health 3
- Behavioral Medicine 2
- Handbooks, manuals, etc 2
- Health behavior 2
- Psychology 2
- Animals 1
- Brothers and sisters 1
- Business communication 1
- Business writing 1
- Care 1
- Case studies 1
- Child development 1
- Child rearing 1
- Communication in organizations 1
- Dialectical materialism 1
- Education 1
- Elias (Fictitious character) 1
- English 1
- Examinations, questions, etc 1
- Fantasy 1
- Fiction 1
- Fugitives from justice 1
- Habitat (Ecology) 1
- Health 1
- Infants 1
- Laia (Fictitious character) 1
- Mass media 1
-
4041
Block cipher based on T-shaped cellular automata
Published 2009-01-01“…In order to overcome the defect on insecurity of block cipher with few reversible cellular automata, T-shaped cellular automata was proposed, which needed two initial states and applied their characteristics to construct more re-versible cellular automata.A new encryption system based on this class of self-reversible cellular automata was designed.Experiments show that block cipher based on reversible cellular automata not only achieves a better avalanche effect but also improves the security of the applications of cellular automata in cryptography, especially by using pseudo random sequences in the beginning of encryption.…”
Get full text
Article -
4042
Secure OFDM transmission scheme based on two-stage chaos mapping
Published 2016-07-01“…The characteristics of pseudo-random and sensitivity to initial condi-tions of chaos sequences were employed. …”
Get full text
Article -
4043
Mean-Variance Hedging and Forward-Backward Stochastic Differential Filtering Equations
Published 2011-01-01“…This paper is concerned with a mean-variance hedging problem with partial information, where the initial endowment of an agent may be a decision and the contingent claim is a random variable. This problem is explicitly solved by studying a linear-quadratic optimal control problem with non-Markov control systems and partial information. …”
Get full text
Article -
4044
Large Deviation Rates for the Continuous-Time Supercritical Branching Processes with Immigration
Published 2022-01-01“…Firstly, we prove that Zt=e−mtYt−emt+1−1/em−1ea+m is a submartingale and converges to a random variable Z. Then, we study the decay rates of PZt−Z>ε as t⟶∞ and PYt+v/Yt−emv>ε|Z≥α as t⟶∞ for α>0 and ε>0 under various moment conditions on bk;k≥0 and aj;j≥0. …”
Get full text
Article -
4045
Solutions to All-Colors Problem on Graph Cellular Automata
Published 2019-01-01“…We also introduce a new kind of All-Colors Problem, k-Random Weak-All-Colors Problem, which is relevant to both combinatorial number theory and cellular automata theory.…”
Get full text
Article -
4046
Approach for distributed BPEL engine placement using K-means
Published 2014-05-01“…How to apply the algorithm in dif-ferent network topologies was also discussed, such as random graph and tree network. In the end, statistical software R was used as experiment tool to evaluate the algorithm. …”
Get full text
Article -
4047
EFFECTS OF NUTRITION AND PARENTING STYLE ON CHILD DEVELOPMENT AT THE AGE OF 3-5 YEARS
Published 2024-10-01“…The children were selected with purposive sampling technique using simple random sampling method and the data was analyzed statistically. …”
Get full text
Article -
4048
Co-decode algorithm of network coding with hardware logic
Published 2012-07-01“…Practical general coder and decoder of network coding(NC)with HDL(hardware description language)logic for wire-speed nodes was presented.The NC coders applied random linear network coding (RLNC) and the decoders recovered the original packets by Cramer’s rule.The structures and algorithms of NC coder and decoder were designed in detail and implemented in HDL with NetFPGA boards.Comparing with traditional stored-and-forward mechanism,network emulations showed that networks with wire-speed NC coder and decoder nodes could achieve the capacity bound of max-flow min-cut theorem,and the end-to-end delay was guaranteed on a small constant.…”
Get full text
Article -
4049
Global External Stochastic Stabilization of Linear Systems with Input Saturation: An Alternative Approach
Published 2017-01-01“…This paper presents results concerning the global external stochastic stabilization for linear systems with input saturation and stochastic external disturbances under random Gaussian distributed initial conditions. The objective is to construct a class of control laws that achieve global asymptotic stability in the absence of disturbances, while guaranteeing a bounded variance of the state for all the time in the presence of disturbances. …”
Get full text
Article -
4050
Multi-authority attribute-based encryption with efficient revocation
Published 2017-03-01“…Multi-authority attribute-based encryption was very suitable for data access control in a cloud storage environment.However,efficient user revocation in multi-authority attribute-based encryption remains a challenging problem that prevents it from practical applications.A multi-authority ciphertext-policy attribute-based encryption scheme with efficient revocation was proposed in prime order bilinear groups,and was further proved statically secure and revocable in the random oracle model.Extensive efficiency analysis results indicate that the proposed scheme significantly reduce the computation cost for the users.In addition,the proposed scheme supports large universe and any monotone access structures,which makes it more flexible for practical applications.…”
Get full text
Article -
4051
Narrow-Band Excitation of Hysteretic Systems
Published 1997-01-01“…The stationary response of smooth and bilinear hysteretic systems to narrow-band random excitations is investigated by using the quasistatic method and digital simulation. …”
Get full text
Article -
4052
Enhanced-AAWP,a heterogeneous network oriented worm propagation model
Published 2011-01-01“…A logical worm propagation model contributes to the analysis of how exactly various worms spread in Internet.With the abstract of heterogeneous network environments,and considering the impact of infection time on worm propa-gation,a heterogeneous network oriented worm propagation model namely Enhanced-AAWP was derived using discrete time and deterministic approximation.Then,the worms which employed local preference scanning or random scanning were studied based on Enhanced-AAWP.As the simulation results show,the amount of NAT,the density of vulnerable hosts in NATs,and the probability of local preference scanning are influencing factors during the course of worm propa-gations in heterogeneous network environments.…”
Get full text
Article -
4053
5G millimeter wave UE test method and analysis
Published 2023-02-01“…In the 5G millimeter wave UE OTA RF conformance test, EIRP and TRP type of tests are important OTA items.Currently, this method relying on 3GPP-defined random scan to lock the beam to determine the maximum EIRP and TRP, but this method is time-consuming and lacks accuracy.A non-signaling test method was proposed, which could not only achieve more accurate measurements compared with the current EIRP and TRP test methods but also make it possible to use the non-directional OTA site as the measurement environment, further reducing the test cost and time cost, and increasing the flexibility of the test environment selection.…”
Get full text
Article -
4054
Stochastic Periodic Solution and Persistence of a Nonautonomous Impulsive System with Nonlinear Self-Interaction
Published 2020-01-01“…Considering periodic environmental changes and random disturbance, we explore the dynamical behaviors of a stochastic competitive system with impulsive and periodic parameters in this paper. …”
Get full text
Article -
4055
OPTIMIZING THE PLACEMENT OF A WORK-PIECE AT A MULTI-POSITION ROTARY TABLE OF TRANSFER MACHINE WITH VERTICAL MULTI-SPINDLE HEAD
Published 2016-11-01“…The experiments revealed that the particle swarm optimization algorithm is more effective for the solution of the problem compared to the methods of random search and LP-search.…”
Get full text
Article -
4056
Largest Lyapunov Exponents and Bifurcations of Stochastic Nonlinear Systems
Published 1996-01-01“…An independent method, developed earlier by the authors, is also applied to determine the bifurcation points of a van der Pol oscillator under parametric random excitation. It is shown that the bifurcation points obtained by the independent technique agree qualitatively and quantitatively with those evaluated by using the largest Lyapunov exponent of the linearized oscillator.…”
Get full text
Article -
4057
A Numerical Study on the Regularity of d-Primes via Informational Entropy and Visibility Algorithms
Published 2020-01-01“…From this definition, the usual prime numbers correspond to the particular case d=2. Here, the seemingly random sequence of gaps between consecutive d-primes is numerically investigated. …”
Get full text
Article -
4058
Secure communication mechanism for VSN based on certificateless signcryption
Published 2021-07-01“…To solve the communication security problems of vehicular social network (VSN), an efficient certificateless signcryption scheme was proposed.The proposed scheme was proven secure in the random oracle model based on the computational Diffie-Hellman problem and elliptic curve discrete logarithm problem, which provided confidentiality and unforgeability protection for VSN members.In addition, when the pseudonym mechanism was used to solve the privacy protection problem in VSN, without installing tamper-proof device, a self-generation mechanism for vehicle pseudonyms and their keys was proposed.The performance analysis shows that the proposed scheme can decrease communication cost, and significantly reduce the computation overhead of the key generation center.…”
Get full text
Article -
4059
One-Tier versus Two-Tier Wireless Sensor Networks: Coverage Problem
Published 2015-10-01“…Wolfram Mathematica is used to compare random independent deployment circular analytical model against a much simpler square analytical model. …”
Get full text
Article -
4060
Stochastic Delay Logistic Model under Regime Switching
Published 2012-01-01“…This paper is concerned with a delay logistical model under regime switching diffusion in random environment. By using generalized Itô formula, Gronwall's inequality, and Young's inequality, some sufficient conditions for existence of global positive solutions and stochastically ultimate boundedness are obtained, respectively. …”
Get full text
Article