Suggested Topics within your search.
Suggested Topics within your search.
- Rhetoric 5
- English language 4
- Grammar 4
- Attitude to Health 3
- Behavioral Medicine 2
- Handbooks, manuals, etc 2
- Health behavior 2
- Psychology 2
- Animals 1
- Brothers and sisters 1
- Business communication 1
- Business writing 1
- Care 1
- Case studies 1
- Child development 1
- Child rearing 1
- Communication in organizations 1
- Dialectical materialism 1
- Education 1
- Elias (Fictitious character) 1
- English 1
- Examinations, questions, etc 1
- Fantasy 1
- Fiction 1
- Fugitives from justice 1
- Habitat (Ecology) 1
- Health 1
- Infants 1
- Laia (Fictitious character) 1
- Mass media 1
-
4061
Verifiably private outsourcing scheme for multivariate polynomial evaluation
Published 2015-08-01“…With the development of cloud computing and big data,it had important practical significance for how to outsource private data and verify the computing result efficiently.A verifiably outsourcing scheme for multivariate polynomial evaluation based on multilinear maps and homomorphic encryption was proposed where the user could verify the computing result exactly.The proposed scheme is provably secure without random oracles and the multivariate polynomial itself and the input of the function are private for the server.Moreover,the cost of the user is much smaller than that of the server,and it is much smaller than that of computing the multivariate polynomial directly.…”
Get full text
Article -
4062
Some Modern Problems in Structural Engineering Dynamics
Published 2010-01-01“…The first part deals with deterministic linear vibrations of double-walled carbon nanotubes either in classical or refined setting; the second part is devoted to the nonlinear random vibrations of structures.…”
Get full text
Article -
4063
Topology modeling and analysis of emergency communications network
Published 2012-09-01“…The construction method,throughput and related properties about the topology model of emergency communication networks were discussed.Firstly,the topology modeling method was presented by three steps,such as the constructions of backbone network,access network and station network.Then,the capacity of network model was analyzed in conditions of arbitrary networks and random networks.At last,some topology properties were discussed,including the shortest path,node degree,rich club,betweenness centrality,current flow centrality,eccentricity and closeness vitality.The experiment results show that the proposed modeling method is steady and applicable to the emergency communication.…”
Get full text
Article -
4064
Correlation between the role of principle with the pedagogical competences of teachers in Vocational School
Published 2017-06-01“…The populations in this research were 72 teacher and 40 samples using proportional stratified random sampling technique. The research used likert scale as instrument. …”
Get full text
Article -
4065
Lightweight authentication method for network interconnection control protocols
Published 2018-11-01“…As network interconnection controls are required for the space-earth integrated network and the limited resources are not suitable for high computing complexity degree authentication methods,a lightweight authentication method for network interconnection control protocols is proposed.Through the calculation of limited resources,using the idea of random fill,It design and implement public key encryption and signature algorithm which is components of the networks interconnection control authentication protocol.Formal analysis tool Scyther is used to analyze the security of the protocol.Comparing with other secure communication protocols,the method can meet the requirements of resource-constrained networks and ensure the safety.…”
Get full text
Article -
4066
Trusted secure model for data services in cloud computing
Published 2014-10-01“…For trusted status of cloud service provider (CSP) and security requirements for data services in cloud computing,the trusted re-encryption secure model (TRSM) for cloud data services was proposed.Only with a certain trusted degree in CSP,cloud data security can be ensured by taking effective re-encryption schemes.The re-encryption secure model is verified by the classical cryptographic algorithms and analyzed by random oracles.Thus,the basic requirements of realizing re-encryption algorithm are got.Moreover,trusted evaluation model is proposed and used to dynamically evaluate CSP’s trusted status,provides theoretical basis and realization for establishment of trusted secure data services in cloud computing.…”
Get full text
Article -
4067
‘Errer’ en mots et en images à l’époque romantique
Published 2021-12-01“…This analysis focuses on one specific modality of Wanderung, when it becomes random, with no guarantee of return whatsoever, and therefore becomes wandering. …”
Get full text
Article -
4068
Malicious PDF document detection based on mixed feature
Published 2019-02-01“…Aiming at the problem of poor robustness and easy to evade detection in the detection of malicious PDF document,a malicious PDF document detection method based on mixed features was proposed.It adopted dynamic and static analysis technology to extract the regular information,structure information and API calling information from the document,and then a feature extraction method based on K-means clustering algorithm was designed to filter and select the key mixed features that characterize the document security.Ultimately,it improved the robustness of features.On this basis,it used random forest algorithm to construct classifier and perform experiment to discuss the detection performance of the scheme and its ability to resist mimicry attacks.…”
Get full text
Article -
4069
Modeling and simulation of some cell dispersion problems by a nonparametric method
Published 2011-03-01“…Starting from the classical descriptions of cell motion we propose some ways to enhance the realism of modeling and to account for interesting features like allowing for a random switching between biased and unbiased motion or avoiding a set of obstacles.For this complex behavior of the cell population we propose new models and also provide a way to numerically assess the macroscopic densities of interest upon using a nonparametric estimation technique.Up to our knowledge, this is the only method able to numerically handle the entire complexity of such settings.…”
Get full text
Article -
4070
ID-based efficient and proactive threshold proxy signature in the standard model
Published 2011-01-01“…The security of existing identity-based threshold proxy signature schemes were almost proven in the random oracle model,and each proxy signer’s proxy signature key was fixed in the valid period.A(t,n) ID-based proactive threshold proxy signature scheme(IBTPTS) was presented by using the publicly verifiable secret sharing technology,based on existential identity-based signature scheme.The scheme was proved to be safe in the standard model.Each proxy signer’s proxy signature key can be updated regularly,and proxy signature verifying procedure only needs const bi-linear pairings.Therefore the scheme has better dynamic security and higher efficiency.…”
Get full text
Article -
4071
The Cores for Fuzzy Games Represented by the Concave Integral
Published 2014-01-01“…We propose a new fuzzy game model by the concave integral by assigning subjective expected values to random variables in the interval [0,1]. The explicit formulas of characteristic functions which are determined by coalition variables are discussed in detail. …”
Get full text
Article -
4072
Full Glowworm Swarm Optimization Algorithm for Whole-Set Orders Scheduling in Single Machine
Published 2013-01-01“…A new hybrid-encoding schema combining with two-dimensional encoding and random-key encoding is given. In order to enhance the capability of optimal searching and speed up the convergence rate, the dynamical changed step strategy is integrated into this algorithm. …”
Get full text
Article -
4073
Maximum Displacement Variability of Stochastic Structures Subject to Deterministic Earthquake Loading
Published 1998-01-01“…The variability of the maximum response displacement of random frame structures under deterministic earthquake loading are examined in this paper using stochastic finite element techniques. …”
Get full text
Article -
4074
Android malware family classification method based on the image of bytecodeConstruction of MDS matrices
Published 2016-06-01“…An Android malware family classification method based on the image of bytecode was proposed accord-ing to the exponential growth of Android malware.A bytecode file of Android malware was converted to a 256-level grayscale image and texture features was extracted from the image by GIST.The random forest algorithm was ap-plied to classify the extracted features.The method by the experimental data of 14 kinds of common Android mal-ware families was verified and was compared against the DREBIN on the same dataset.The experimental results show that the proposed method has high detection precision and low false positive rate.…”
Get full text
Article -
4075
Rate-Distortion Optimized Frame Dropping for Multiuser Streaming and Conversational Videos
Published 2008-01-01“…Our experimental results show that a significant improvement in end-to-end performance is achieved compared to priority-based random early dropping.…”
Get full text
Article -
4076
ON THE SIGNIFICANCE OF THE “ACADEMIC WRITING” COMPONENT IN THE TEXT OF THE OFFICIAL REVIEWS ON PHD THESES
Published 2016-12-01“…The article reveals that the reviewers’ comments on the quality of academic writing are of random character, and they mainly deal with stylistic issues. …”
Get full text
Article -
4077
Estimation of Heating Device‘s Convective Heat Transfer of Heat Supply Systems with Rotational Heat Generator
Published 2012-12-01“…In this article, on the base of heat exchange analysis in heat supply systems with rotational heat generator, a calculated formula for estimation of heat transfer from the surface of heating device is obtained, taking into account its probability (random) orientation in space. It is shown the most probable position of heating devices in heating system of mobile object.…”
Get full text
Article -
4078
Association and application in XDR and MR data
Published 2019-04-01“…Based on the XDR and MR data records of O domain and combining with the development and practice in big data and machine learning technologies,the analysis of impact factors of correlation rate and accuracy was described in detail via practice with the help of technology of association of XDR and MR data records.By means of the integration of machine learning technology and fingerprint localization algorithm,the position accuracy was promoted constantly using the random forest algorithm,and the rasterization of associated data was realized.Simultaneously,the innovative application scenarios and directions applied to planning,network,customer and market were proposed.Finally,to verify the prospect of the association of XDR and MR data records,two examples in network construction,maintain and market were enumerated.…”
Get full text
Article -
4079
Convergence of numerical solution of stochastic differential equation for the self-thinning process
Published 2002-12-01“… For theoretical and practical analysis of the self-thinning process we use stochastic differential equation, which take the form: dN (t) = N (t) (α - β ln N (t))dt + μN (t)dW (t), N(t0) = N0, t0 ≤ t ≤ T, where N – tree per hectare (stem/ha), t – stand age, W(t) – scalar standard Brownian motion, N0 – not random, α, β and μ are parameters – real constants. …”
Get full text
Article -
4080
Performance Testing of Twisted Pair Cables
Published 2008-01-01“…In this paper, category 5 enhanced as a type of unshielded twisted pair cables was selected to verify all tests on it according to ISO/IEC 11801 as one of international standard specifications. Random samples were selected from cables market. All tests were done on these samples to make sure of using validity and complying with the international standard. …”
Get full text
Article