Showing 4,181 - 4,200 results of 17,304 for search '"random"', query time: 0.08s Refine Results
  1. 4181

    Method for constructing function correspondence between firmware based on candidate function group by Ruiqing XIAO, Yuefei ZHU, Shengli LIU, Bin LU

    Published 2021-04-01
    “…Due to the characteristics of firmware, traditional binary comparison methods are prone to mismatches during the propagation of the matching function.Aiming at the problem that the matching function propagation algorithm is not ideal, a method for constructing function correspondence based on candidate function groups was designed, and the concept of function matching in n layer local network is supplemented.Then, three candidate function group construction strategies and candidate function group matching methods are proposed, and the time overhead were analyzed.Finally, a prototype system was implemented based on the method and compared with Bindiff.Through random sampling and manual check, 86.04% of the matching results of the proposed method are consistent with Bindiff matching results, while 11.3% can correct Bindiff matching errors.…”
    Get full text
    Article
  2. 4182

    Asymptotic Law of the jth Records in the Bivariate Exponential Case by Grine Azedine

    Published 2014-01-01
    “…We consider a sequence (Xi,Yi)1⩽i⩽n of independent and identically distributed random variables with joint cumulative distribution  H(x,y), which has exponential marginals F(x) and G(y) with parameter λ=1. …”
    Get full text
    Article
  3. 4183

    Scalability Optimization of Virtualization Based Botnet Emulation Platform by Li Ruan, Bo Lin, Limin Xiao

    Published 2013-10-01
    “…Botnet emulation,a new technology to investigate Botnet characteristics,gains increasing focus.The practical virtualization based Botnet emulation platform is few and lacks support of rapid deployment,multiple virtualization,specific features of the Botnet like Botnets' circadian random shutdown and starting,and high scalability which will greatly influence the Botnet propagation emulation effect.A Botnet emulation system and its scalability improvement technologies were introduced.Experiments show that the memory performance optimization and CPU performance optimization reduce more than 77% of host memory per virtual machine,the maximum virtual machines one physical machine can starts up increase from 15 to 43; the host CPU utility is deduced from 100% to 20% when the vCPU's performance is restricted to 100 000.…”
    Get full text
    Article
  4. 4184

    Public key based key distribution scheme for wireless sensor networks by HUANG Jie1, HUANG Bei1

    Published 2011-01-01
    “…Since key pre-distribution schemes based on symmetric key can not completely solve security problems of keys distribution in WSN,a new public key based key distribution scheme was proposed.In the scheme,public key set was generated by an initial public key set and a hash function in base station.Each sensor device was pre-distributed one public/private pair-wise key from public key set and a public key subset from the initial public keys set.Owing to uniqueness of private key,not only the communication security problems could be improved for WSN.but also the sensor-memory cost could be decreased.With the theorem of random-graph theory,the connectivity and scalability were illustrated.The results showed that the scheme was superior to the traditional key pre-distribution schemes.…”
    Get full text
    Article
  5. 4185

    Cartoon Image Encryption Algorithm by a Fractional-Order Memristive Hyperchaos by Shu-ying Wang, Jian-feng Zhao, Xiao-yan Wang, Li-tao Zhang

    Published 2019-01-01
    “…Then, the 0–1 test analysis is applied to detect random nature of chaotic sequences exhibited by the fractional-order systems. …”
    Get full text
    Article
  6. 4186

    Security authentication protocol based on elliptic curve cryptography and cookie information for terminal of IoT by Jie ZHAO, Huarong ZHANG

    Published 2016-06-01
    “…For the security problem of terminal devices accessing to the network server in internet of things(IoT),an identity authentication protocol was presented based on elliptic curve cryptography(ECC)and cookie information for internet of things terminal.Firstly,the protocol used user identity information,server private key,random number and expiration time of cookie to form a cookie file.Then,it was encrypted with ECC and stored in the smart terminal.In authentication phase,the mutual authentication was achieved by comparing the security parameters calculated by cookie information.Performance analysis shows that it can resist many kinds of attacks and provide high security,low computation and low communication cost,which was suitable for the terminal devices of limited resources in internet of things.…”
    Get full text
    Article
  7. 4187

    An efficient XOR-based visual cryptography scheme with lossless reconfigurable algorithms by Huan Wang, Zhongyuan Jiang, Qing Qian, Hong Wang

    Published 2022-04-01
    “…The encryption scheme aims to encrypt secret images by mapping them to several shared images that do not suffer any pixel expansion problem and do not reveal any information of the secret images by considering a random column selection algorithm based on the 0-mapping and 1-mapping matrices, where the two matrices are dynamically generated in the encryption scheme. …”
    Get full text
    Article
  8. 4188

    Investigating Lexical Progression through Lexical Diversity Metrics in a Corpus of French L3 by Paula Lissón, Nicolas Ballier

    Published 2018-12-01
    “…Our case study (24 learners, 3 productions per learner in the course of 3 months) deals with a semi-longitudinal corpus, where each of the productions is supposed to be more complex than the previous one. Random forests (Breiman, 2001; Hothorn et al., 2019) are used in order to see whether lexical diversity metric scores capture enough vocabulary diversity progression to predict the production wave. …”
    Get full text
    Article
  9. 4189

    Application of FMICW technology based on stagger algorithm in automotive radar by Yuanhui ZHANG, Jian YANG, Junjiang ZHU, Xiaolu LI, Yuchen HE

    Published 2018-10-01
    “…The problem of spurious spectral peaks produced by the traditional method of using a single switching frequency in automotive FMICW radar was focused by the proposed scheme.The system accuracy depended on the previously estimated range if a bandpass filter was utilized to eliminate the spurious spectral peaks,and the noise floor could be too high to achieve the required dynamic detection range if the random interrupted sequence method was utilized.A stagger algorithm based on multiple switching frequencies was used,in which the spurious peaks from the frequency domain could be removed by minimizing each frequency position on multiple spectrums.Simulation results show that the proposed method is close to the equivalent FMCW radar detection performance,and is good in multiple targets scenario.…”
    Get full text
    Article
  10. 4190

    Alpha Power Transformation of the Lindley Probability Distribution by Shibiru Jabessa Dugasa, Ayele Taye Goshu, Butte Gotu Arero

    Published 2024-01-01
    “…Simulation studies are performed to generate random observations from the model. The new distribution model is fitted to two real datasets, revealing better fit as compared to other five distributions. …”
    Get full text
    Article
  11. 4191

    Provably secure partially blind signature without trusted PKG by FENG Tao1, PENG Wei1, MA Jian-feng3

    Published 2010-01-01
    “…In this scheme, PKG was prevented from forging a legal user’s signature because it only generated partial private key. Under the random oracle model, the proposed scheme was proved to be secure against existential forgery on adaptively chosen message and ID attack. …”
    Get full text
    Article
  12. 4192

    Multi-type spectrum resources joint distribution algorithm based on guaranteed QoS by Ling LIU, Yongju XIAN, Jia ZHU

    Published 2016-01-01
    “…The definition of the spectrum availability in terms of static spectrum,semi-static spectrum and dynamic spectrum and the definition of service requirement index based on M-LWDF QoS definition were proposed.A spectrum allocation method and a redistribution method combined with spectrum availability and subscriber requirement were presented.The main idea of the method is that subscriber requirement and availability of spectrum resource are quantified,and then spectrum resources are allocated to subscribers by a one-to-one mapping based on their quantified values in the same sequence.Compared with the random distribution scheme and the dynamic scheme following static allocation,simulation results show that the scheme presented can obviously improve system performance in average number of failure distribution and average total data rate.…”
    Get full text
    Article
  13. 4193

    Uniqueness of the Level Two Bayesian Network Representing a Probability Distribution by Linda Smail

    Published 2011-01-01
    “…Given a Bayesian network over a family 𝐼 of random variables, this paper presents a result on the computation of the probability distribution of a subset 𝑆 of 𝐼 using separately a computation algorithm and D-separation properties. …”
    Get full text
    Article
  14. 4194

    Effet du stress salin sur la croissance de quatre provenances d’anacardier (Anacardium occidentale L.) en milieu semi-contrôlé by Cheikh Oumar Samb, Dethie Wade, Elhadji Faye, Mouhamadou Moustapha Diaw

    Published 2020-10-01
    “…Five increasing concentrations of pure NaCl 0 ; 5 ; 7.5 ; 10 ; 12.5 gl-1 were tested according to a completely random plan. The results showed a variability of the growth, the development of the species according to the intensity of stress and provenances. …”
    Get full text
    Article
  15. 4195

    Short Paper - The Binary Linearization Complexity of Pseudo-Boolean Functions by Walter, Matthias

    Published 2024-10-01
    “…Our theoretical contributions are the proof that random polynomials almost surely have a high linearization complexity and characterizations of its value in case we do or do not restrict the set of admissible Boolean functions. …”
    Get full text
    Article
  16. 4196

    Dynamic Response Analysis of Gearbox Housing Under the Multi- source Dynamic Excitation by Zhou Yunshan, Jin Hongguang

    Published 2015-01-01
    “…The rigid- flexible coupling multi- body dynamics model of the gear transmission system is built,the dynamic force response of bearing seat and the dynamic force of the point of suspension under the random road excitation spectrum under the gear time- varying stiffness,damping,meshing error and the torque ripple of the ISG is solved. …”
    Get full text
    Article
  17. 4197

    Key-exposure resilient integrity auditing scheme with encrypted data deduplication by Xiangsong ZHANG, Chen LI, Zhenhua LIU

    Published 2019-04-01
    “…For the problems of key-exposure,encrypted data duplication and integrity auditing in cloud data storage,a public auditing scheme was proposed to support key update and encrypted data deduplication.Utilizing Bloom filters,the proposed scheme could achieve client-side deduplication,and guaranteed that the key exposure in one time period didn’t effect the users’ private key in other time periods.The proposed scheme could solve the conflict between key-exposure resilient and encrypted data deduplication in public auditing scheme for the first time.Security analysis indicates that the proposed scheme is strong key-exposure resilient,confidentiality,detectability,and unforgeability of authentication tags and tokens under the computation Diffie-Hellman hardness assumption in the random oracle model.…”
    Get full text
    Article
  18. 4198

    Research on Optimal Control for the Vehicle Suspension Based on the Simulated Annealing Algorithm by Jie Meng, Qingzhang Chen, Ren He

    Published 2014-01-01
    “…This method utilizes the random searching characteristics of the algorithm to optimize the weight matrices with the target function of suspension performance indexes. …”
    Get full text
    Article
  19. 4199

    Stochastic 2D Incompressible Navier-Stokes Solver Using the Vorticity-Stream Function Formulation by Mohamed A. El-Beltagy, Mohamed I. Wafa

    Published 2013-01-01
    “…The mean and variance simulations of the cavity flow are done for random variation of the viscosity and the lid velocity. …”
    Get full text
    Article
  20. 4200

    Blockbuster de science-fiction : étendue, extension, morcellement du territoire by Gaspard Delon

    Published 2021-06-01
    “…Since the late 1970s, Hollywood science fiction blockbusters have been an attractive but random investment. Although the genre is well represented at the top of the box office, it is not a guarantee of success. …”
    Get full text
    Article