Showing 4,141 - 4,160 results of 17,304 for search '"random"', query time: 0.10s Refine Results
  1. 4141

    Lattice-based verifiable timed signature and application by CHEN Huiyan, WANG Qingnan, WANG Ke, TAN Shuncong, XIN Hongcai

    Published 2024-10-01
    “…This scheme not only fulfilled the fundamental criteria of unforgeability and privacy for verifiable timed signatures but also attained a heightened level of existential unforgeability in the random oracle model while ensuring the effective enforcement of privacy in hybrid argument. …”
    Get full text
    Article
  2. 4142

    Regular expression matching technology with two-stage memory by Shu-hui CHEN, Cheng-cheng XU

    Published 2014-06-01
    “…By computing the steady vector, the random access probabilities of each state could be obtained. …”
    Get full text
    Article
  3. 4143

    Improved particle filtering based algorithm for time delay and symbols joint estimation of PSK signals by Nan XIA, Tian-shuang QIU

    Published 2012-04-01
    “…An adaptive particle filtering algorithm based on resampling was proposed for time delay estimation of PSK signals,which could eliminate the influence of inaccurate posterior possibility distribution caused by the small noise variance and the influence of the increase of estimation error caused by the large noise variance.Taking into account the small time delay estimation being invalid in the existing algorithms,a symbol forward and backward detection technique was applied to achieve random time delay accurate estimation in a symbol period.Otherwise,the carrier frequency offset of the received signal was estimated and compensated.Simulation results verify the novel algorithm can achieve more accurate time delay estimation and lower symbol error rate than the existing algorithm.…”
    Get full text
    Article
  4. 4144

    A Modeling Method for Small Packing Particles in Electromagnetic Simulation by Yi Cheng Zhong, Yu Jian Cheng, Yong Fan

    Published 2016-01-01
    “…This method is able to model random distributed and mutual-contacted packing particles efficiently and accurately. …”
    Get full text
    Article
  5. 4145

    An Efficient Deterministic-Stochastic Model of the Human Body Exposed to ELF Electric Field by Anna Šušnjara, Dragan Poljak

    Published 2016-01-01
    “…Computational examples show the mean trend of both analytically and numerically computed axial current with the confidence margins for different set of input random variables. The results point out the possibility of improving the efficiency in calculation of basic restriction parameter values in electromagnetic dosimetry.…”
    Get full text
    Article
  6. 4146

    Study on Strengthening Plan of Safety Network CCTV Monitoring by Steganography and User Authentication by Jung-oh Park, Sanggeun Kim

    Published 2015-01-01
    “…In this paper, steganography is utilized to confirm the Data Masquerading and Data Modification and, in addition, to strengthen the security; the user information is protected based on PKI (public key infrastructure), SN (serial number), and R value (random number) attributed at the time of login and the user authentication protocol to block nonauthorized access of malicious user in network CCTV environment was proposed. …”
    Get full text
    Article
  7. 4147

    THE MAIN PROPERTIES AND EVOLUTIONARY FEATURES OF ANTIFREEZE PROTEINS by L. L. Bildanova, E. A. Salina, V. K. Shumiy

    Published 2014-12-01
    “…Antifreeze proteins are a class of proteins synthesized by poikilothermic organisms under cold stress. These proteins have random phylogenetic distribution, differ in primary and secondary structures, have different regulatory pathways, but they all display a common feature: the ability to be adsorbed onto the surface of ice crystals and to modify their growth. …”
    Get full text
    Article
  8. 4148

    Modeling and simulation of the non-stationary fading channels under fast time-variant environment by Boyu HUA, Qiuming ZHU, Xiaoxiang HE, Kai MAO

    Published 2020-05-01
    “…For solving the problem of non-stationary features in rapid time-varying scenarios,such as high-speed railway,unmanned aerial vehicle and V2X communication,an improved simulation method for non-stationary fading channels was proposed.Introducing the integral items and random offset,this method can revive non-stationary channels under time-variant scattering scenarios and ensure a smooth transition between two adjacent channel states.Numerical simulations show that simulated statistical properties,such as,the probability density function,auto-correlation function,and Doppler power spectral density have good agreements with the theoretical ones.Thus,this method can be applied for wireless channel modeling and communication system evaluation of future high-speed mobile scenarios.…”
    Get full text
    Article
  9. 4149

    New certificateless aggregate signature scheme with universal designated verifier by Zhi-yan XU, Li-bing WU, Li LI, De-biao HE

    Published 2017-11-01
    “…Certificateless aggregate signature(CLAS) schemes with universal designated verifier had been widely applied in resource-constrained wireless mobile networks,because they could not only solve the problems of the certificate management and private key escrow,but also realize batch validation and the signer’s privacy protection.A security analysis for a certificateless aggregate signature scheme with universal designated verifier was firstly provided,and two attack methods to demonstrate that their scheme was forgeable was presented.To enhance security,a new certificateless aggregate signature scheme with universal designated verifier was proposed,and then the security of the scheme in the random oracle model was proved.The performance of our proposed scheme was finally evaluated.Compared with the original scheme,the pvoposed scheme fixes the security flaws and the total computational cost is greatly reduced.…”
    Get full text
    Article
  10. 4150

    An insight into the stochastic solitonic features of the Maccari model using the solver technique. by Hesham G Abdelwahed, Reem Alotaibi, Emad K El-Shewy, Mahmoud A E Abdelrahman

    Published 2024-01-01
    “…We draw the two dimensional (2D) and three dimensional (3D) graphs to some of the study's solutions under appropriately chosen physical parameter values. Random factors can alter the collapse caused by turbulence in the model medium. …”
    Get full text
    Article
  11. 4151

    Comparative Study on the Efficiency of Islamic Banks and Conventional Banks During the COVID-19 Outbreak by Naima Lassoued, Imen Khanchel, Wiem Saidani

    Published 2025-01-01
    “…Analyzing a sample of 134 banks across 10 MENA nations from 2011 to 2021, we evaluate technical efficiency scores (including global technical efficiency, pure technical efficiency, and scale efficiency) utilizing Data Envelopment Analysis (DEA) followed by Tobit random effect regression. Our results show that conventional banks exhibited superior technical efficiency compared to Islamic banks during the COVID-19 crisis. …”
    Get full text
    Article
  12. 4152

    Landscape Perspective Distance-Included Angle Shape Distribution Analysis Based on 3D CAD Model Retrieval Algorithm by Huijuan Bi

    Published 2022-01-01
    “…In view of the results obtained in the retrieval process of the 3D CAD model, which can show the differences in the local feature details of the model, the 3D CAD model retrieval algorithm is introduced into the analysis of the perspective distance-angle shape distribution of the garden landscape in this paper. Random sampling is performed on the surface of the constructed 3D CAD model, combined with the test distance between the sampling point and the neighboring points, and the corresponding garden landscape perspective distance-angle shape distribution characteristics in this area are calculated in order to achieve the similarity of the CAD model high-speed retrieval. …”
    Get full text
    Article
  13. 4153

    On stability estimations without any conditions of symmetry by Romanas Januškevičius, Olga Januškevičienė

    Published 2023-09-01
    “… Let X, X1, X2, ..., Xn be i.i.d. random variables. B. Ramachandran and C.R. Rao have proved that if distributions of sample mean ‾X = ‾X(n) = (X1 + ⋯ + Xn)/n and monomial X are coincident at least at two points n = j1 and n = j2 such that log j1/ log j2 is irrational, then X follows a Cauchy law. …”
    Get full text
    Article
  14. 4154

    Novel construction of forward-secure public-key encryption in the standard model by Yang LU, Ji-guo LI

    Published 2014-02-01
    “…A novel forward-secure public-key encryption scheme without random oracles was pro-posed. Under the hardness of the truncated decision q-augmented bilinear Diffie-Hellman exponent problem, the pro-posed scheme was proved to be chosen-ciphertext secure in the standard model. …”
    Get full text
    Article
  15. 4155

    TRUCK CRANE HOIST BOOM BUCKLING RELIABILITY ANALYSIS BASED ON PROBABILISTIC AND NON-PROBABILISTIC HYBRID MODEL AND BAYESIAN NETWORK by QU FuZheng, SUN Qi, XIE ZhengYi

    Published 2015-01-01
    “…Probabilistic and nonprobabilistic hybrid model is built aiming at the interval variables and random variables to calculate the failure probability of boom buckling under different conditions. …”
    Get full text
    Article
  16. 4156

    Rough Paths above Weierstrass Functions by Cellarosi, Francesco, Selk, Zachary

    Published 2024-11-01
    “…However, rough paths theory is not inherently random and therefore can treat irregular deterministic driving signals such as a (vector-valued) Weierstrass function. …”
    Get full text
    Article
  17. 4157

    Homomorphic signature schemes for single-source and multi-source network coding by Huifang YU, Wen LI

    Published 2019-11-01
    “…To solve the problems of pollution attacks of single-source and multi-source network coding,two homomorphic signature schemes for network coding were proposed.In homomorphic signature for single-source network,the message hash value was signed on the elliptic curve,then the message,hash value and the signature of hash value were output,and the receiving node could verify the signature,the elliptic curve signature based on homomorphism could resist intra/inter-generation pollution attacks.Homomorphic signature from pairings for multi-source network coding could resist pollution attacks,and the introduction of timestamp made it be capable to resist replay attacks.In the random oracle model,it proves that two schemes are all secure under the selective attacks.Analysis shows that two schemes can effectively improve the verification efficiency.…”
    Get full text
    Article
  18. 4158

    The local limit theorem for complex valued sequences: the parabolic case by Coulombel, Jean-François, Faye, Grégory

    Published 2024-11-01
    “…The result applies in probability theory for random walks as well as in numerical analysis for studying the large time behavior of numerical schemes.…”
    Get full text
    Article
  19. 4159

    Defense-enhanced dynamic heterogeneous redundancy architecture based on executor partition by Ting WU, Chengnan HU, Qingnan CHEN, Anbang CHEN, Qiuhua ZHENG

    Published 2021-03-01
    “…Aiming at the security problem when servants are faced with common vulnerabilities, an improved DHR architecture called IDHR was proposed.On the basis of DHR, an executor-partition module that divided the executor-set to several executor pools by the heterogeneity among the executors was introduced to improve the heterogeneity among the executor pools.Moreover, the scheduling algorithm was improved by choosing executor pools randomly at first, and then choosing the executors from these pools randomly.Finally, through two experimental schemes of random simulation and Web server emulation, the security evaluation of the proposed IDHR architecture was carried out from two aspects of attack success rate and control rate.Experimental results show that the security of the IDHR architecture, especially when the common vulnerability is unknown, is significantly better than the traditional DHR architecture.…”
    Get full text
    Article
  20. 4160

    Turbo iterative acquisition algorithm for satellite high-mobility DSSS signal by Chunxiao JIANG, Jiawei WANG

    Published 2021-08-01
    “…To solve the problems of the low acquisition probability and high computational complexity in satellite high-mobility communications, a new factor graph was designed for acquisition of the high-mobility direct sequence spread spectrum (DSSS) signal, where time-varying Doppler rates were modeled by the random walk model.Based on the proposed factor graph, the turbo iterative DSSS signal acquisition algorithm was proposed.In the Doppler-estimation loop, the negative influence of Doppler frequency offsets and Doppler rates could be eliminated effectively.Then in the code-detection loop, constraints of each chip was used to recover the received signal, to achieve DSSS signal acquisition.Simulation results show that the proposed algorithm is capable of improving the acquisition performance at less 1.3 dB with low computational complexity.…”
    Get full text
    Article