Showing 4,061 - 4,080 results of 17,304 for search '"random"', query time: 0.10s Refine Results
  1. 4061

    Verifiably private outsourcing scheme for multivariate polynomial evaluation by Yan-li REN, Da-wu GU, Jian-xing CAI, Chun-shui HUANG

    Published 2015-08-01
    “…With the development of cloud computing and big data,it had important practical significance for how to outsource private data and verify the computing result efficiently.A verifiably outsourcing scheme for multivariate polynomial evaluation based on multilinear maps and homomorphic encryption was proposed where the user could verify the computing result exactly.The proposed scheme is provably secure without random oracles and the multivariate polynomial itself and the input of the function are private for the server.Moreover,the cost of the user is much smaller than that of the server,and it is much smaller than that of computing the multivariate polynomial directly.…”
    Get full text
    Article
  2. 4062

    Some Modern Problems in Structural Engineering Dynamics by I. Elishakoff, D. Pentaras

    Published 2010-01-01
    “…The first part deals with deterministic linear vibrations of double-walled carbon nanotubes either in classical or refined setting; the second part is devoted to the nonlinear random vibrations of structures.…”
    Get full text
    Article
  3. 4063

    Topology modeling and analysis of emergency communications network by Wei WANG, Wen-hong ZHAO

    Published 2012-09-01
    “…The construction method,throughput and related properties about the topology model of emergency communication networks were discussed.Firstly,the topology modeling method was presented by three steps,such as the constructions of backbone network,access network and station network.Then,the capacity of network model was analyzed in conditions of arbitrary networks and random networks.At last,some topology properties were discussed,including the shortest path,node degree,rich club,betweenness centrality,current flow centrality,eccentricity and closeness vitality.The experiment results show that the proposed modeling method is steady and applicable to the emergency communication.…”
    Get full text
    Article
  4. 4064

    Correlation between the role of principle with the pedagogical competences of teachers in Vocational School by Nellitawati Nellitawati

    Published 2017-06-01
    “…The populations in this research were 72 teacher and 40 samples using proportional stratified random sampling technique. The research used likert scale as instrument. …”
    Get full text
    Article
  5. 4065

    Lightweight authentication method for network interconnection control protocols by Bo LU, Yun LIU, Jie ZHANG, Yueming LU

    Published 2018-11-01
    “…As network interconnection controls are required for the space-earth integrated network and the limited resources are not suitable for high computing complexity degree authentication methods,a lightweight authentication method for network interconnection control protocols is proposed.Through the calculation of limited resources,using the idea of random fill,It design and implement public key encryption and signature algorithm which is components of the networks interconnection control authentication protocol.Formal analysis tool Scyther is used to analyze the security of the protocol.Comparing with other secure communication protocols,the method can meet the requirements of resource-constrained networks and ensure the safety.…”
    Get full text
    Article
  6. 4066

    Trusted secure model for data services in cloud computing by Li-zhi XIONG, Zheng-quan XU, Xin GU

    Published 2014-10-01
    “…For trusted status of cloud service provider (CSP) and security requirements for data services in cloud computing,the trusted re-encryption secure model (TRSM) for cloud data services was proposed.Only with a certain trusted degree in CSP,cloud data security can be ensured by taking effective re-encryption schemes.The re-encryption secure model is verified by the classical cryptographic algorithms and analyzed by random oracles.Thus,the basic requirements of realizing re-encryption algorithm are got.Moreover,trusted evaluation model is proposed and used to dynamically evaluate CSP’s trusted status,provides theoretical basis and realization for establishment of trusted secure data services in cloud computing.…”
    Get full text
    Article
  7. 4067

    ‘Errer’ en mots et en images à l’époque romantique by Patricia Viallet

    Published 2021-12-01
    “…This analysis focuses on one specific modality of Wanderung, when it becomes random, with no guarantee of return whatsoever, and therefore becomes wandering. …”
    Get full text
    Article
  8. 4068

    Malicious PDF document detection based on mixed feature by Xuehui DU, Yangdong LIN, Yi SUN

    Published 2019-02-01
    “…Aiming at the problem of poor robustness and easy to evade detection in the detection of malicious PDF document,a malicious PDF document detection method based on mixed features was proposed.It adopted dynamic and static analysis technology to extract the regular information,structure information and API calling information from the document,and then a feature extraction method based on K-means clustering algorithm was designed to filter and select the key mixed features that characterize the document security.Ultimately,it improved the robustness of features.On this basis,it used random forest algorithm to construct classifier and perform experiment to discuss the detection performance of the scheme and its ability to resist mimicry attacks.…”
    Get full text
    Article
  9. 4069

    Modeling and simulation of some cell dispersion problems by a nonparametric method by Christina Surulescu, Nicolae Surulescu

    Published 2011-03-01
    “…Starting from the classical descriptions of cell motion we propose some ways to enhance the realism of modeling and to account for interesting features like allowing for a random switching between biased and unbiased motion or avoiding a set of obstacles.For this complex behavior of the cell population we propose new models and also provide a way to numerically assess the macroscopic densities of interest upon using a nonparametric estimation technique.Up to our knowledge, this is the only method able to numerically handle the entire complexity of such settings.…”
    Get full text
    Article
  10. 4070

    ID-based efficient and proactive threshold proxy signature in the standard model by YU Yi-ke1, ZHENG Xue-feng2

    Published 2011-01-01
    “…The security of existing identity-based threshold proxy signature schemes were almost proven in the random oracle model,and each proxy signer’s proxy signature key was fixed in the valid period.A(t,n) ID-based proactive threshold proxy signature scheme(IBTPTS) was presented by using the publicly verifiable secret sharing technology,based on existential identity-based signature scheme.The scheme was proved to be safe in the standard model.Each proxy signer’s proxy signature key can be updated regularly,and proxy signature verifying procedure only needs const bi-linear pairings.Therefore the scheme has better dynamic security and higher efficiency.…”
    Get full text
    Article
  11. 4071

    The Cores for Fuzzy Games Represented by the Concave Integral by Jinhui Pang, Shujin Li

    Published 2014-01-01
    “…We propose a new fuzzy game model by the concave integral by assigning subjective expected values to random variables in the interval [0,1]. The explicit formulas of characteristic functions which are determined by coalition variables are discussed in detail. …”
    Get full text
    Article
  12. 4072

    Full Glowworm Swarm Optimization Algorithm for Whole-Set Orders Scheduling in Single Machine by Zhang Yu, Xiaomei Yang

    Published 2013-01-01
    “…A new hybrid-encoding schema combining with two-dimensional encoding and random-key encoding is given. In order to enhance the capability of optimal searching and speed up the convergence rate, the dynamical changed step strategy is integrated into this algorithm. …”
    Get full text
    Article
  13. 4073

    Maximum Displacement Variability of Stochastic Structures Subject to Deterministic Earthquake Loading by L.L. Graham

    Published 1998-01-01
    “…The variability of the maximum response displacement of random frame structures under deterministic earthquake loading are examined in this paper using stochastic finite element techniques. …”
    Get full text
    Article
  14. 4074

    Android malware family classification method based on the image of bytecodeConstruction of MDS matrices by Yi-min YANG, Tie-ming CHEN

    Published 2016-06-01
    “…An Android malware family classification method based on the image of bytecode was proposed accord-ing to the exponential growth of Android malware.A bytecode file of Android malware was converted to a 256-level grayscale image and texture features was extracted from the image by GIST.The random forest algorithm was ap-plied to classify the extracted features.The method by the experimental data of 14 kinds of common Android mal-ware families was verified and was compared against the DREBIN on the same dataset.The experimental results show that the proposed method has high detection precision and low false positive rate.…”
    Get full text
    Article
  15. 4075

    Rate-Distortion Optimized Frame Dropping for Multiuser Streaming and Conversational Videos by Wei Tu, Jacob Chakareski, Eckehard Steinbach

    Published 2008-01-01
    “…Our experimental results show that a significant improvement in end-to-end performance is achieved compared to priority-based random early dropping.…”
    Get full text
    Article
  16. 4076

    ON THE SIGNIFICANCE OF THE “ACADEMIC WRITING” COMPONENT IN THE TEXT OF THE OFFICIAL REVIEWS ON PHD THESES by Edita N. Merkulova

    Published 2016-12-01
    “…The article reveals that the reviewers’ comments on the quality of academic writing are of random character, and they mainly deal with stylistic issues. …”
    Get full text
    Article
  17. 4077

    Estimation of Heating Device‘s Convective Heat Transfer of Heat Supply Systems with Rotational Heat Generator by A. P. Nesenchuk, I. L. Iokova, T. V. Rizova, P. G. Lasij, D. I. Shklovchik, Z. B. Aidarova

    Published 2012-12-01
    “…In this article, on the base of heat exchange analysis in heat supply systems with rotational heat generator, a calculated formula for estimation of heat transfer from the surface of heating device is obtained, taking into account its probability (random) orientation in space. It is shown the most probable position of heating devices in heating system of mobile object.…”
    Get full text
    Article
  18. 4078

    Association and application in XDR and MR data by Tao LIU, Tao WU, Bin WANG

    Published 2019-04-01
    “…Based on the XDR and MR data records of O domain and combining with the development and practice in big data and machine learning technologies,the analysis of impact factors of correlation rate and accuracy was described in detail via practice with the help of technology of association of XDR and MR data records.By means of the integration of machine learning technology and fingerprint localization algorithm,the position accuracy was promoted constantly using the random forest algorithm,and the rasterization of associated data was realized.Simultaneously,the innovative application scenarios and directions applied to planning,network,customer and market were proposed.Finally,to verify the prospect of the association of XDR and MR data records,two examples in network construction,maintain and market were enumerated.…”
    Get full text
    Article
  19. 4079

    Convergence of numerical solution of stochastic differential equation for the self-thinning process by Petras Rupšys

    Published 2002-12-01
    “… For theoretical and practical analysis of the self-thinning process we use stochastic differential equation, which take the form: dN (t) = N (t) (α - β ln N (t))dt + μN (t)dW (t), N(t0) = N0, t0 ≤ t ≤ T, where N – tree per hectare (stem/ha), t – stand age, W(t) – scalar standard Brownian motion, N0 – not random, α, β and μ are parameters – real constants. …”
    Get full text
    Article
  20. 4080

    Performance Testing of Twisted Pair Cables by Ahmed F. Mahmoud, Mahmoud I. Abdallah

    Published 2008-01-01
    “…In this paper, category 5 enhanced as a type of unshielded twisted pair cables was selected to verify all tests on it according to ISO/IEC 11801 as one of international standard specifications. Random samples were selected from cables market. All tests were done on these samples to make sure of using validity and complying with the international standard. …”
    Get full text
    Article