Suggested Topics within your search.
Suggested Topics within your search.
- Rhetoric 5
- English language 4
- Grammar 4
- Attitude to Health 3
- Behavioral Medicine 2
- Handbooks, manuals, etc 2
- Health behavior 2
- Psychology 2
- Animals 1
- Brothers and sisters 1
- Business communication 1
- Business writing 1
- Care 1
- Case studies 1
- Child development 1
- Child rearing 1
- Communication in organizations 1
- Dialectical materialism 1
- Education 1
- Elias (Fictitious character) 1
- English 1
- Examinations, questions, etc 1
- Fantasy 1
- Fiction 1
- Fugitives from justice 1
- Habitat (Ecology) 1
- Health 1
- Infants 1
- Laia (Fictitious character) 1
- Mass media 1
-
4121
Exact SNR and SIR analysis in Poisson wireless networks
Published 2017-03-01“…The probability density function and cumulative distribution function of the received signal‐to‐noise ratio (SNR) and the received signal‐to‐interference ratio (SIR), for interference‐limited systems is derived, at the nth nearest neighbour node in a Poisson point process wireless random network. The analytical expressions are given in terms of the Meijer G‐function and reveal the impact of node spatial density, transmit power, interference power, and path‐loss exponent on the connectivity probability of a broadcast wireless transmission. …”
Get full text
Article -
4122
Microembolus Detection by Transcranial Doppler Sonography: Review of the Literature
Published 2012-01-01“…Transcranial Doppler can detect microembolic signals which are characterized by unidirectional high intensity increase, short duration, random occurrence, and a “whistling” sound. Microembolic signals have been detected in a number of clinical settings: carotid artery stenosis, aortic arch plaques, atrial fibrillation, myocardial infarction, prosthetic heart valves, patent foramen ovale, valvular stenosis, during invasive procedures (angiography, percutaneous transluminal angioplasty), surgery (carotid, cardiopulmonary bypass, orthopedic), and in certain systemic diseases. …”
Get full text
Article -
4123
Research of the Reliability of Planetary Gear Transmission System for Offshore Platform Lifting System
Published 2018-01-01“…Therefore,using rejection sampling method is proposed in line with the original mesh of arbitrary distribution of random numbers,to truly reflect the reliability level. …”
Get full text
Article -
4124
FORMATION OF METHODICAL BASE IN THE COST-NAVIGATION SYSTEM
Published 2017-01-01“…For descriptive reasons authors offer use of the hybrid analytical cards comprising various technologies and providing a possibility of symbiosis of traditional systems of the business analysis and the new approaches providing a possibility of high-performance work with continuously growing volumes of data, keeping them in random access memory.…”
Get full text
Article -
4125
Speed of the Goldstone Sound Mode of an Atomic Fermi Gas Loaded on a Square Optical Lattice with a Non-Abelian Gauge Field in the Presence of a Zeeman Field
Published 2018-01-01“…The speed of the Goldstone sound mode of a spin-orbit-coupled atomic Fermi gas loaded in a square optical lattice with a non-Abelian gauge field in the presence of a Zeeman field is calculated within the Gaussian approximation and from the Bethe-Salpeter equation in the generalized random phase approximation. It is found that (i) there is no sharp change of the slope of the Goldstone sound mode across the topological quantum phase transition point and (ii) the Gaussian approximation significantly overestimates the speed of sound of the Goldstone mode compared to the value provided by the BS formalism.…”
Get full text
Article -
4126
Gesture recognition based on flexible solar cells and ultrathin hydrogel film
Published 2023-07-01“…Daily life involves various gestures, and combining these with smart wearable devices is crucial for improving quality of life.One effective solution to the challenges of gesture recognition and device energy consumption isutilizing the photoelectric conversion characteristics of solar energy-related devices.The data of five commonly used gestures were collected in the research of the combination of flexible solar cells and gesture recognition.Z-Score, low-pass filter, sliding window techniques for signal processing were applied, and successfully achieved 100% predicted accuracy using random forest, support vector machine and neural network algorithms even with small samples which showed that this method had significant advantages in the application of gesture recognition.…”
Get full text
Article -
4127
Integrity checking protocol with identity-based proxy signature in mobile cloud computing
Published 2015-10-01“…Based on provable data possession(PDP)model,a more perfect data integrity checking model for mobile cloud computing was proposed,in which there was an additional proxy party with stronger computing power to help the mobile users to calculate the block tags.Furthermore,for the proposed model,an identity-based proxy signature PDP(IBPS-PDP)protocol was presented.By using identity-based signatures,the system did not need to manage public key certificates and further the users did not need to take the additional computations to verify the other’s certificates yet.Finally,the security of the proposed IBPS-PDP protocol is proved in the random oracle model.…”
Get full text
Article -
4128
Anonymous survey system based on NIZK
Published 2016-12-01“…Aiming at the security problem that the existing in electronic surveys,such as information fraud,privacy security etc.An anonymous electronic survey scheme based on non-interactive zero knowledge proofs (NIZK) was constructed,which had the characteristics of self-organization,non-interactive,anti-replay,and high efficiency.The system uses the NIZK protocol and the Boneh-Boyen signature scheme to verify the user's identity in non-interactive manner,which guarantees the authenticity of the scheme.The system also uses the Pedersen commitment scheme and the pseudo random function to hide the user's identity and the related information,which guarantees the ano-nymity.Security analysis show that the system has security features such as malicious users attack resistance and anonymity.Finally,the function of the system was also verified and the result show that the system can accomplish all the functions correctly and guarantee the anonymity and authenticity of the system effectively.…”
Get full text
Article -
4129
A novel fuzzy vault scheme based on the feature level fusion of fingerprint and face features
Published 2018-10-01“…Aiming at the problem that the biometric feature-based fuzzy vault is vulnerable to correlation attack and the loss of key and biometric template,and the authentication performance of fuzzy vault based on single biometric feature is unreliable,a novel fuzzy vault scheme based on the feature level fusion of fingerprint and face features was proposed.This scheme carried out irreversible transformation of fingerprint features and face features,and based on the Diffie-Hellman algorithm,the transformed fingerprints and face features were fused into a template at the feature level.Finally,the fusion template was used to construct the fuzzy vault.By updating the random matrix,the vault could be revoked,which could effectively resist the correlation attacks and achieve reliable authentication.Experimental results show that the proposed scheme improves the reliability of the system and the security of multiple biometric templates.…”
Get full text
Article -
4130
Numerical implementation of a stochastic differential equation of motion
Published 2024-12-01“…For this work it was proposed to model a mass supporting a random disturbance. To do this, it was required to model Brownian motion since it efficiently represents the randomness of the phenomenon. …”
Get full text
Article -
4131
On functionals of a marked Poisson process observed by a renewal process
Published 2001-01-01“…In various stochastic models applications (such as queueing with N-policy combined with multiple vacations), it is necessary to operate with the value of Π prior to the first passage time, or prior to the first passage time plus some random time. We obtain a time-dependent solution to this problem in a closed form, in terms of its Laplace transform. …”
Get full text
Article -
4132
Redundancy Optimization of an Uncertain Parallel-Series System with Warm Standby Elements
Published 2018-01-01“…The lifetimes and costs of elements are considered uncertain variables, and the weights and volumes of elements are random variables. The uncertain measure optimization model (UMOM), the uncertain optimistic value optimization model (UOVOM), and the uncertain cost optimization model (UCOM) are developed through reliability maximization, lifetime maximization, and cost minimization, respectively. …”
Get full text
Article -
4133
ANALISIS FILOGENETIK KERBAU LOKAL LOMBOK TENGAH (Bubalus bubalis) BERDASARKAN PENANDA DNA MIKROSATELIT
Published 2014-11-01“…This study examines the phylogenetic relationships of two populations of Central Lombok local buffalo (Bubalus bubalis) through microsatellite DNA markers based on three random primers, namely HEL09, INRA 023 and INRA 032. …”
Get full text
Article -
4134
FUZZY RELIABILITY ANALYSIS OF CONTACT FATIGUE STRENGTH OF DOUBLE SHOCK SLEEVE MOVABLE TEETH TRANSMISSION BASED ON AN IMPROVED RSM
Published 2020-01-01“…An improved RSM was proposed to improve the computational efficiency and accuracy of contact fatigue fuzzy reliability analysis of double shock sleeve movable teeth transmission.Based on fuzzy theory,an improved RSM model is established by combining intelligent algorithm and reliability analysis method.Based on the theory of stress-strength interference,the interference reliability model is established with moment,elastic modulus,Poisson’s ratio and working tooth length are taken as input random variables and contact strength of meshing pair is taken as input fuzzy variables.Fuzzy reliability is calculated by different methods,and the distribution characteristics and fuzzy reliability of each response result are obtained.The comparison shows that the improved RSM improves the speed and accuracy of the calculation.…”
Get full text
Article -
4135
A Relevant Customer Identification Algorithm Based on the Internet Financial Platform
Published 2021-01-01“…Through the SNC model, threshold propagation, and random propagation, the model is transformed into an algorithm that identifies the associated customers, eliminates redundant customers, and realizes associated user identification. …”
Get full text
Article -
4136
A Hybrid Model of Extreme Learning Machine Based on Bat and Cuckoo Search Algorithm for Regression and Multiclass Classification
Published 2021-01-01“…However, the standard ELM requires more hidden nodes in the application due to the random assignment of hidden layer parameters, which in turn has disadvantages such as poorly hidden layer sparsity, low adjustment ability, and complex network structure. …”
Get full text
Article -
4137
Byzantine-robust federated learning over Non-IID data
Published 2023-06-01“…The malicious attacks of Byzantine nodes in federated learning was studied over the non-independent and identically distributed dataset , and a privacy protection robust gradient aggregation algorithm was proposed.A reference gradient was designed to identify “poor quality” shared gradients in model training, and the influence of heterogeneity data on Byzantine node recognition was reduced by reputation evaluation.Meanwhile, the combination of homomorphic encryption and random noise obfuscation technology was introduced to protect user privacy in the process of model training and Byzantine node recognition.Finally, through the evaluation over the real-world datasets, the simulation results show that the proposed algorithm can accurately and efficiently identify Byzantine attack nodes while protecting user privacy and has good convergence and robustness.…”
Get full text
Article -
4138
Parallel MAC protocol based on geographical location information and power control in ad hoc networks
Published 2008-01-01“…The conflict interference produced by the parallel transmission of the exposed nodes was investigated,and a parallel MAC protocol based on geographical location information and power control in ad hoc networks was proposed.This protocol identified the exposed nodes by their geographical location information and introduced the power control mechanism into the parallel transmission of the exposed nodes.When the probability of the successful parallel transmis-sion was low,the protocol reduced the parallel transmissions by using the random backoff mechanism,thus avoided the interference caused by the failed parallel transmission and the energy consumption of the nodes.The simulation results show that,compared with the DCF protocol,this new protocol can improve the average throughput of the network sig-nificantly and save the average energy consumption of the nodes simultaneously,thus prolong the lifetime of the nodes and the network.…”
Get full text
Article -
4139
Power allocation of hybrid spectrum sharing based on the spatial location
Published 2014-02-01“…Based on the random spatial location of the secondary user, a spatial hybrid spectrum sharing model which combines overlay with underlay was proposed to improve spectrum utilization. …”
Get full text
Article -
4140
Identity authentication scheme based on identity-based encryption
Published 2016-06-01“…In large-scale communication nodes network,there are a large number of network nodes and so many types of equipment.So there are problems of certificate management difficulties and resource waste in the tradi-tional PKI cryptosystem.A mutual node authentication scheme based on identity-based encryption,which solved the problem of the digital certificate management in the PKI system by the identity-based encryption and the key escrow problem in identity based cryptograph by splitting the key as well,was designed.At the same time,the introduction of random factor,timestamp and hash algorithm in the authentication protocol prevented various network attacks.Finally,the security and efficiency of the encryption algorithm and the security of the authentication protocol were analyzed,which proved the security and reliability of the authentication scheme.…”
Get full text
Article