Suggested Topics within your search.
Suggested Topics within your search.
- Rhetoric 5
- English language 4
- Grammar 4
- Attitude to Health 3
- Behavioral Medicine 2
- Handbooks, manuals, etc 2
- Health behavior 2
- Psychology 2
- Animals 1
- Brothers and sisters 1
- Business communication 1
- Business writing 1
- Care 1
- Case studies 1
- Child development 1
- Child rearing 1
- Communication in organizations 1
- Dialectical materialism 1
- Education 1
- Elias (Fictitious character) 1
- English 1
- Examinations, questions, etc 1
- Fantasy 1
- Fiction 1
- Fugitives from justice 1
- Habitat (Ecology) 1
- Health 1
- Infants 1
- Laia (Fictitious character) 1
- Mass media 1
-
4141
Lattice-based verifiable timed signature and application
Published 2024-10-01“…This scheme not only fulfilled the fundamental criteria of unforgeability and privacy for verifiable timed signatures but also attained a heightened level of existential unforgeability in the random oracle model while ensuring the effective enforcement of privacy in hybrid argument. …”
Get full text
Article -
4142
Regular expression matching technology with two-stage memory
Published 2014-06-01“…By computing the steady vector, the random access probabilities of each state could be obtained. …”
Get full text
Article -
4143
Improved particle filtering based algorithm for time delay and symbols joint estimation of PSK signals
Published 2012-04-01“…An adaptive particle filtering algorithm based on resampling was proposed for time delay estimation of PSK signals,which could eliminate the influence of inaccurate posterior possibility distribution caused by the small noise variance and the influence of the increase of estimation error caused by the large noise variance.Taking into account the small time delay estimation being invalid in the existing algorithms,a symbol forward and backward detection technique was applied to achieve random time delay accurate estimation in a symbol period.Otherwise,the carrier frequency offset of the received signal was estimated and compensated.Simulation results verify the novel algorithm can achieve more accurate time delay estimation and lower symbol error rate than the existing algorithm.…”
Get full text
Article -
4144
A Modeling Method for Small Packing Particles in Electromagnetic Simulation
Published 2016-01-01“…This method is able to model random distributed and mutual-contacted packing particles efficiently and accurately. …”
Get full text
Article -
4145
An Efficient Deterministic-Stochastic Model of the Human Body Exposed to ELF Electric Field
Published 2016-01-01“…Computational examples show the mean trend of both analytically and numerically computed axial current with the confidence margins for different set of input random variables. The results point out the possibility of improving the efficiency in calculation of basic restriction parameter values in electromagnetic dosimetry.…”
Get full text
Article -
4146
Study on Strengthening Plan of Safety Network CCTV Monitoring by Steganography and User Authentication
Published 2015-01-01“…In this paper, steganography is utilized to confirm the Data Masquerading and Data Modification and, in addition, to strengthen the security; the user information is protected based on PKI (public key infrastructure), SN (serial number), and R value (random number) attributed at the time of login and the user authentication protocol to block nonauthorized access of malicious user in network CCTV environment was proposed. …”
Get full text
Article -
4147
THE MAIN PROPERTIES AND EVOLUTIONARY FEATURES OF ANTIFREEZE PROTEINS
Published 2014-12-01“…Antifreeze proteins are a class of proteins synthesized by poikilothermic organisms under cold stress. These proteins have random phylogenetic distribution, differ in primary and secondary structures, have different regulatory pathways, but they all display a common feature: the ability to be adsorbed onto the surface of ice crystals and to modify their growth. …”
Get full text
Article -
4148
Modeling and simulation of the non-stationary fading channels under fast time-variant environment
Published 2020-05-01“…For solving the problem of non-stationary features in rapid time-varying scenarios,such as high-speed railway,unmanned aerial vehicle and V2X communication,an improved simulation method for non-stationary fading channels was proposed.Introducing the integral items and random offset,this method can revive non-stationary channels under time-variant scattering scenarios and ensure a smooth transition between two adjacent channel states.Numerical simulations show that simulated statistical properties,such as,the probability density function,auto-correlation function,and Doppler power spectral density have good agreements with the theoretical ones.Thus,this method can be applied for wireless channel modeling and communication system evaluation of future high-speed mobile scenarios.…”
Get full text
Article -
4149
New certificateless aggregate signature scheme with universal designated verifier
Published 2017-11-01“…Certificateless aggregate signature(CLAS) schemes with universal designated verifier had been widely applied in resource-constrained wireless mobile networks,because they could not only solve the problems of the certificate management and private key escrow,but also realize batch validation and the signer’s privacy protection.A security analysis for a certificateless aggregate signature scheme with universal designated verifier was firstly provided,and two attack methods to demonstrate that their scheme was forgeable was presented.To enhance security,a new certificateless aggregate signature scheme with universal designated verifier was proposed,and then the security of the scheme in the random oracle model was proved.The performance of our proposed scheme was finally evaluated.Compared with the original scheme,the pvoposed scheme fixes the security flaws and the total computational cost is greatly reduced.…”
Get full text
Article -
4150
An insight into the stochastic solitonic features of the Maccari model using the solver technique.
Published 2024-01-01“…We draw the two dimensional (2D) and three dimensional (3D) graphs to some of the study's solutions under appropriately chosen physical parameter values. Random factors can alter the collapse caused by turbulence in the model medium. …”
Get full text
Article -
4151
Comparative Study on the Efficiency of Islamic Banks and Conventional Banks During the COVID-19 Outbreak
Published 2025-01-01“…Analyzing a sample of 134 banks across 10 MENA nations from 2011 to 2021, we evaluate technical efficiency scores (including global technical efficiency, pure technical efficiency, and scale efficiency) utilizing Data Envelopment Analysis (DEA) followed by Tobit random effect regression. Our results show that conventional banks exhibited superior technical efficiency compared to Islamic banks during the COVID-19 crisis. …”
Get full text
Article -
4152
Landscape Perspective Distance-Included Angle Shape Distribution Analysis Based on 3D CAD Model Retrieval Algorithm
Published 2022-01-01“…In view of the results obtained in the retrieval process of the 3D CAD model, which can show the differences in the local feature details of the model, the 3D CAD model retrieval algorithm is introduced into the analysis of the perspective distance-angle shape distribution of the garden landscape in this paper. Random sampling is performed on the surface of the constructed 3D CAD model, combined with the test distance between the sampling point and the neighboring points, and the corresponding garden landscape perspective distance-angle shape distribution characteristics in this area are calculated in order to achieve the similarity of the CAD model high-speed retrieval. …”
Get full text
Article -
4153
On stability estimations without any conditions of symmetry
Published 2023-09-01“… Let X, X1, X2, ..., Xn be i.i.d. random variables. B. Ramachandran and C.R. Rao have proved that if distributions of sample mean ‾X = ‾X(n) = (X1 + ⋯ + Xn)/n and monomial X are coincident at least at two points n = j1 and n = j2 such that log j1/ log j2 is irrational, then X follows a Cauchy law. …”
Get full text
Article -
4154
Novel construction of forward-secure public-key encryption in the standard model
Published 2014-02-01“…A novel forward-secure public-key encryption scheme without random oracles was pro-posed. Under the hardness of the truncated decision q-augmented bilinear Diffie-Hellman exponent problem, the pro-posed scheme was proved to be chosen-ciphertext secure in the standard model. …”
Get full text
Article -
4155
TRUCK CRANE HOIST BOOM BUCKLING RELIABILITY ANALYSIS BASED ON PROBABILISTIC AND NON-PROBABILISTIC HYBRID MODEL AND BAYESIAN NETWORK
Published 2015-01-01“…Probabilistic and nonprobabilistic hybrid model is built aiming at the interval variables and random variables to calculate the failure probability of boom buckling under different conditions. …”
Get full text
Article -
4156
Rough Paths above Weierstrass Functions
Published 2024-11-01“…However, rough paths theory is not inherently random and therefore can treat irregular deterministic driving signals such as a (vector-valued) Weierstrass function. …”
Get full text
Article -
4157
Homomorphic signature schemes for single-source and multi-source network coding
Published 2019-11-01“…To solve the problems of pollution attacks of single-source and multi-source network coding,two homomorphic signature schemes for network coding were proposed.In homomorphic signature for single-source network,the message hash value was signed on the elliptic curve,then the message,hash value and the signature of hash value were output,and the receiving node could verify the signature,the elliptic curve signature based on homomorphism could resist intra/inter-generation pollution attacks.Homomorphic signature from pairings for multi-source network coding could resist pollution attacks,and the introduction of timestamp made it be capable to resist replay attacks.In the random oracle model,it proves that two schemes are all secure under the selective attacks.Analysis shows that two schemes can effectively improve the verification efficiency.…”
Get full text
Article -
4158
The local limit theorem for complex valued sequences: the parabolic case
Published 2024-11-01“…The result applies in probability theory for random walks as well as in numerical analysis for studying the large time behavior of numerical schemes.…”
Get full text
Article -
4159
Defense-enhanced dynamic heterogeneous redundancy architecture based on executor partition
Published 2021-03-01“…Aiming at the security problem when servants are faced with common vulnerabilities, an improved DHR architecture called IDHR was proposed.On the basis of DHR, an executor-partition module that divided the executor-set to several executor pools by the heterogeneity among the executors was introduced to improve the heterogeneity among the executor pools.Moreover, the scheduling algorithm was improved by choosing executor pools randomly at first, and then choosing the executors from these pools randomly.Finally, through two experimental schemes of random simulation and Web server emulation, the security evaluation of the proposed IDHR architecture was carried out from two aspects of attack success rate and control rate.Experimental results show that the security of the IDHR architecture, especially when the common vulnerability is unknown, is significantly better than the traditional DHR architecture.…”
Get full text
Article -
4160
Turbo iterative acquisition algorithm for satellite high-mobility DSSS signal
Published 2021-08-01“…To solve the problems of the low acquisition probability and high computational complexity in satellite high-mobility communications, a new factor graph was designed for acquisition of the high-mobility direct sequence spread spectrum (DSSS) signal, where time-varying Doppler rates were modeled by the random walk model.Based on the proposed factor graph, the turbo iterative DSSS signal acquisition algorithm was proposed.In the Doppler-estimation loop, the negative influence of Doppler frequency offsets and Doppler rates could be eliminated effectively.Then in the code-detection loop, constraints of each chip was used to recover the received signal, to achieve DSSS signal acquisition.Simulation results show that the proposed algorithm is capable of improving the acquisition performance at less 1.3 dB with low computational complexity.…”
Get full text
Article