Suggested Topics within your search.
Suggested Topics within your search.
- Rhetoric 5
- English language 4
- Grammar 4
- Attitude to Health 3
- Behavioral Medicine 2
- Handbooks, manuals, etc 2
- Health behavior 2
- Psychology 2
- Animals 1
- Brothers and sisters 1
- Business communication 1
- Business writing 1
- Care 1
- Case studies 1
- Child development 1
- Child rearing 1
- Communication in organizations 1
- Dialectical materialism 1
- Education 1
- Elias (Fictitious character) 1
- English 1
- Examinations, questions, etc 1
- Fantasy 1
- Fiction 1
- Fugitives from justice 1
- Habitat (Ecology) 1
- Health 1
- Infants 1
- Laia (Fictitious character) 1
- Mass media 1
-
4161
Holderian functional central limit theorem for linear processes
Published 2004-12-01“… Let (Xt)t ≥ 1 be a linear process defined by Xt = ∑i=0∞ψi εt-1 where (ψi, i ≥ 0) is a sequence of real numbers and (εi , i ∈ Z) is a sequence of random variables with null expectation and variance 1. …”
Get full text
Article -
4162
Neural network based image and video coding technologies
Published 2019-05-01“…Deep neural networks have achieved tremendous success in artificial intelligence,which makes the broad and in-depth research of neural network resurge in recent years.Recently,the neural network based image and video coding has become one of the front-edge topics.A systematic and comprehensive review of neural network based image and video coding approaches based on network structure and coding modules were provided.The development of neural network based image compression,e.g.multi-layer perceptron,random neural network,convolutional neural network,recurrent neural network and generative adversarial network based image compression methods and neural network based video compression tools were introduced respectively.Moreover,the future trends in neural network based compression were also envisioned and discussed.…”
Get full text
Article -
4163
Moving target defense solution on network layer based on OpenFlow
Published 2017-10-01“…In order to take an active part in network attack and defense,a moving target defense solution on network layer based on OpenFlow was proposed,using the flexibility of network brought by OpenFlow network architecture.On the network layer,through mapping the correspondent nodes’ addresses to pseudo-random virtual addresses in the LAN and mapping correspondent nodes’ ports to virtual ports,achieving the hiding of correspond nodes in the whole network and the information of network architecture.Researches verify the system’s effectiveness.Comparing with existing moving target defense solutions,the proposed algorithm can be deployed easily in the traditional network,and realize comprehensive protection of the corresponding in the whole network.…”
Get full text
Article -
4164
Research on fractional repetition codes based on group divisible designs
Published 2015-02-01“…A novel design of FR (fractional repetition) codes was proposed which aims at providing efficient repair at the minimum bandwidth regenerating point.The design consisted of an outer MDS (maximum distance separable) code and an inner repetition code,called GDDBFR (group divisible design based FR) codes.The proposed codes can achieve the system storage capacity under the random access model and are available for a wide range of parameters.Despite of the table-based repair,theoretical analysis identifies that GDDBFR codes generally have large node repair alternatives.Furthermore,experimental results show that GDDBFR codes can significantly reduce the failure repair time when compared with legacy RS (Reed-Solomon) codes and regenerating codes in the domain.…”
Get full text
Article -
4165
M-estimate like correlation based algorithm for direction of arrival estimation under alpha-stable environments
Published 2013-05-01“…A novel class of bounded statistics,namely,the M-estimate like correlation (MELC) for independently identi-cal distributed symmetric alpha-stable (SαS) random variables was defined.Based on the MELC matrix for the array sensor outputs,a new algorithm for direction of arrival (DOA) estimation in the presence of complex SαS noise was proposed.The comprehensive Monte-Carlo simulation results show that the MELC-MUSIC algorithm not only outper-forms the fractional lower order statistics (FLOS) based MUSIC algorithms under low SNR conditions and multi-source signals environment,but also is robust with circular and noncircular signals.…”
Get full text
Article -
4166
Global Existence to an Attraction-Repulsion Chemotaxis Model with Fast Diffusion and Nonlinear Source
Published 2015-01-01“…This paper deals with the global existence of solutions to a strongly coupled parabolic-parabolic system of chemotaxis arising from the theory of reinforced random walks. More specifically, we investigate the attraction-repulsion chemotaxis model with fast diffusive term and nonlinear source subject to the Neumann boundary conditions. …”
Get full text
Article -
4167
Hubungan konformitas teman sebaya dengan motivasi belajar siswa SMP Muhammadiyah
Published 2022-06-01“…This research was a primary research with a proportional random sampling design and a sample of 129 class VIII students was obtained. …”
Get full text
Article -
4168
Novel blind audio watermarking algorithm in the hybrid domain
Published 2007-01-01“…A new robust digital audio watermarking against desynchronization attack using DWT and DCT was proposed.Firstly,the origin digital audio was segmented and then each segment was cut into two sections.Secondly,with the spa-tial watermarking technique,synchronization code was embedded into the first section.Finally,the DWT and DCT were performed on the second section,and then the watermark was embedded into the low frequency components by quantiza-tion.Experiment results show that the proposed watermarking scheme is inaudible and robust against various signal processing such as noise adding,re-sampling,re-quantization,random cropping,MPEG audio layer 3(MP3) compression,time-scale modification,frequency-scale modification.…”
Get full text
Article -
4169
Dual-proxy key-based threshold signature scheme for ship ad-hoc network
Published 2018-07-01“…In order to solve the problem of message authentication under the conditions of the ship ad-hoc network (SANET),a signature scheme that does not depend on trusted certificate authorities and tamper-proof devices (TPD) was proposed by using the threshold proxy signature scheme and the properties of bilinear pairings.The proposed scheme used the dual-proxy key and the threshold signature mechanism to enable the ship nodes calculate the message signature in polynomial time.Moreover,the security of the scheme was also proved under the random oracle model.The performance analysis results show that the proposed scheme can meet the requirement of strong proxy signature under the premise of guaranteeing correctness,and has lower computational cost and communication cost.…”
Get full text
Article -
4170
Integrity verification protocol based on privacy homomorphism data aggregation
Published 2014-11-01“…Secure data aggregation in wireless sensor networks can effectively prevent privacy leakage,data tampering and other issues,it also achieves efficient data transmission.An integrity verification protocol based on privacy homomorphism data aggregation (IV-PHDA) was presented.The protocol uses homomorphism encryption to ensure data privacy,then it used random detection nodes to detect the integrity of the aggregated results to verify whether the aggregation node faithfully transmit each data packet.The theoretical analysis and simulation comparison verify the performance of the algorithm,the results show that this protocol can detect data integrity through transmission,and achieve better privacy protection and higher data accuracy.…”
Get full text
Article -
4171
Optimal Imputation Methods under Stratified Ranked Set Sampling
Published 2025-02-01“… It is long familiar that the stratified ranked set sampling (SRSS) is more efficient than ranked set sampling (RSS) and stratified random sampling (StRS). The existence of missing values alter the final inference of any study. …”
Get full text
Article -
4172
Software protection technology based on code fragmentation
Published 2020-12-01“…Aiming at the shortcomings of the current software protection technology,a code fragmentation technology was proposed.This technology is a new software protection technology that takes functions as units,shells functions,randomizes memory layout,and performs dynamic linking.The code shellization realizes the position-independent morphing of code fragments,the memory layout randomizes the random memory loading of the code fragments,the dynamic linking realizes the dynamic execution of the code fragments,and the program fragmentation processing is achieved through the above three links.The experiments show that the code fragmentation technology can not only realize the randomization of the memory location of function fragments during program execution,but also the dynamic link execution of function fragments,increasing the difficulty of static reverse analysis and dynamic reverse debugging of the program,and improving the anti-reverse analysis ability of the program.…”
Get full text
Article -
4173
Active Design Technology of Pinion Surface for Aviation Spiral Bevel Gear based on Actual Condition
Published 2017-01-01“…In actual conditions,because of the deformation of the box,bearings,shafts and gears in a helicopter reducer,the existence of installation error,manufacturing error and random error,the influence of temperature and vibration,the spiral bevel gear produces misalignment,and they destroyed the ideal meshing condition. …”
Get full text
Article -
4174
Research on secret key generation based on wireless channel characteristics in body area network
Published 2021-12-01“…Wireless body area network (WBAN) is a human-centered wireless network.With limitations of power and computation capabilities of WBAN, the significant challenge of ensuring security is how to generate a shared key between two entities based on a lightweight symmetric cryptography.To investigate this issue, a secret key generation scheme in ultra-wideband (UWB) WBAN was designed.In this scheme, the difference of multipath relative delay and its average value were chosen as common random source to reduce key mismatch probability.Furthermore, with the aid of relay, secret key generation rate could be increased.Simulation and test results demonstrate that the proposed scheme can achieve a good tradeoff between key match probability and key generation rate.Furthermore, security analysis of the scheme was also provided to validate its feasibility.…”
Get full text
Article -
4175
Dynamics of Lotka-Volterra Competition Systems with Fokker-Planck Diffusion
Published 2018-01-01“…One of the dispersal strategies is random dispersal and the other is a Fokker-Planck diffusion whose motility is piecewise constant and jumps up when the resource is not enough. …”
Get full text
Article -
4176
New signcryption algorithm for secure communication of ad hoc networks
Published 2010-01-01“…As a result, its provable security in the random oracle model is proved; compared with the previous identity based sign- cryption algorithms, the new algorithm has lower computation cost and communication overhead. …”
Get full text
Article -
4177
Hybrid genetic algorithm based optimization of pilotpattern
Published 2016-09-01“…In OFDM system,sparse channel estimation based on compressed sensing(CS)can make full use of the inherent sparse degree of the wireless channel,which can reduce the pilot overhead and improve the spectrum efficiency.Therefore,a new method based on hybrid genetic algorithm was investigated for the pilot design of CS channel estimation,which was based on the minimization of the matrix cross correlation in the CS theory.In this method,genetic algorithm was used to obtain the initial sub-optimal pilot sequence,and then combined with the pilot position and pilot power,each entry of pilot pattern could be sequentially updated and optimized to make the minimum correlation of measurement matrix.Simulation results show that the proposed method can ensure a better mean square error and bit error rate compared to the pseudo-random pilot design and the equal distance pilot design.…”
Get full text
Article -
4178
Frédéric et Rosanette, février 48
Published 2017-06-01“…In this page, Flaubert focuses on the story of the two lovers, but a closer reading allows to examine how the author intensely connects history and sentiment: he does so through a series of random events, but also through several instances of analogy, both varied and progressive. …”
Get full text
Article -
4179
Design of multi-key encryption method
Published 2020-11-01“…In order to improve the security in the process of information transmission,the current encryption methods were studied,and the research status was reported which increased the security of encryption by processing the key.According to the principle of segmenting and grouping data in the process of sending and encrypting,a method of multi-key encryption was designed:the segmenting key group and grouping key group were generated by the source key and random number,and the corresponding key was selected for each segmented and grouped data by its sequence number according to the matching algorithm.This method realized the encryption of multi-key in the process of information transmission.Finally,on the one hand,MATLAB was used to test and verify the encryption efficiency of this method.On the other hand,the security of this method was analyzed from the theoretical and mathematical perspective,comparing with the traditional method.It is concluded that this method can increase the security of the traditional method without too much cost much cost.…”
Get full text
Article -
4180
Resources scheduling and cooperative management of space-based information networks
Published 2017-10-01“…Along with the expansion of the range and space of space-based information networks,and the enhancement of network cognitive ability,real-time,reliability and safety were needed to satisfy higher requirements.The demands of space-based information network designing referred to different platforms and users,random access in anytime,heterogeneous network architecture,cooperative management of different type of resource,and so on.Space-based network operation had the characteristic of high-dynamic,multi-type and big data.The realization of efficient resource management was discussed,and the analysis of multiple dimensions to objects in space-based information networks was realized,the design of dynamic space-based resource virtualization was further mentioned,scheduling and cooperative management was mentioned.…”
Get full text
Article