Showing 4,241 - 4,260 results of 17,304 for search '"random"', query time: 0.11s Refine Results
  1. 4241

    Efficient ID-based certificateless signature scheme by LIU Jing-wei, SUN Rong, MA Wen-ping

    Published 2008-01-01
    “…The security relied on the hardness of the computation diffie-hellman problem (CDHP). Under the random oracle model, the new scheme was proved to be secure against existential forgery on adaptively chosen message and ID attack. …”
    Get full text
    Article
  2. 4242

    SPOR YAZARLARININ FUTBOL KAMUOYU ÜZERİNE ETKİLERİNİN DEĞERLENDİRİLMESİ ÜZERİNE BİR ARAŞTIRMA by Haşan Şahan

    Published 2014-05-01
    “…Ki-kare X2 ve sd'ne göre belirlenen sonuçlardan elde edilen bulgular tablolaştırılarak p lt;0.05 değerine göre yorumları yapılmıştır.Türkiye'nin yedi coğrafi bölgesinde random usulü ile seçilen illerinde 2001 yılı içinde spor yazarlığı yapan ve Türkiye Spor o Yazarları Derneği (T.S.Y.D) üyesi olan 100 ispor yazarı ve bu illerdeki spor kamuoyundan rasgele seçilen 800 denek araştırmanın materyalini oluşturmuştur.…”
    Get full text
    Article
  3. 4243

    BP neural network based Doppler frequency offset estimation method for 5G high-speed mobile system by Zenghao WANG, Lihua YANG, Lu CHENG, Jie ZHANG, Yan LIANG

    Published 2020-04-01
    “…A BP neural network based Doppler frequency offset estimation method was proposed.The proposed method was mainly divided into two stages:offline training and online estimation.Firstly,the training samples were constructed by using random Doppler frequency offset and received pilot signals,and then the training samples were used to train the BP neural network offline,which could complete the mapping relationship between input and output data.Then,based on the trained network,the received pilot signal was used to estimate the Doppler frequency offset online.Simulation results show that the performance of the proposed method is far superior to the existing method,and it has low computational complexity.…”
    Get full text
    Article
  4. 4244

    Research on non-orthogonal transmission strategy for content delivery in caching networks by Long YANG, Hanyang LI, Mengmeng REN, Bingtao HE, Yuchen ZHOU, Jian CHEN

    Published 2023-10-01
    “…A two-stage adaptive non-orthogonal/orthogonal multiple access transmission scheme was designed for content delivery scenarios in wireless caching networks.For the scheme, a high-reliability user scheduling strategy was proposed, and the analytical expression of the outage probability and its asymptotic expression in high signal-to-noise ratio regime were derived by theoretical analysis.The analysis results indicate that the proposed strategy can achieve full spatial diversity gain.Simulation results demonstrate that compared with the instantaneous channel state information-based scheduling strategy, the random scheduling strategy, and the conventional orthogonal multiple access transmission strategy, the proposed strategy can achieve better content delivery reliability than existing strategies by obtaining the spatial diversity gain.…”
    Get full text
    Article
  5. 4245

    Self-learning differential evolution algorithm for dynamic polycentric problems by Xing-bao LIU, Jian-ping YIN, Chun-hua HU, Rong-yuan CHEN

    Published 2015-07-01
    “…A novel self-learning differential evolution algorithm is proposed to solve dynamical multi-center optimization problems.The approach of re-evaluating some specific individuals is used to monitor environmental changes.The proposed self-learning operator guides the evolutionary group to a new environment,meanwhile maintains the stable topology structure of group to maintain the current evolutionary trend.A neighborhood search mechanism and a random immigrant mechanism are adapted to make a tradeoff between algorithmic convergence and population diversity.The experiment studies on a periodic dynamic function set suits are done,and the comparisons with peer algorithms show that the self-learning differential algorithm outperforms other algorithms in term of convergence and adaptability under dynamical environment.…”
    Get full text
    Article
  6. 4246

    OPTIMIZATION OF INERTIAL NAVIGATION DAMPING SYSTEM BASED ON SENSITIVITY ANALYSIS by WANG Ping, ZHANG GuangPeng, WEI Fei, LV Bing, LIANG ZhiChao

    Published 2018-01-01
    “…The vibration environment of an inertial navigation system( INS) can bring an adverse effect on its measurement accuracy. A random vibration model of an optical fiber INS is proposed. …”
    Get full text
    Article
  7. 4247

    Ternary complementary sets and its application in UWB by WANG Shi-ji, ZHANG Nai-tong

    Published 2005-01-01
    “…Ternary complementary set based UWB signaling employing a set of orthogonal chip pulses was proposed for DS-UWB.It had many advantages in indoor high-speed short range communications.First the system model of multiple access communications was founded,then ternary complementary set and its recursive construction method were analyzed,and then the performance evaluation structure of multiple access communications based the ternary complementary sets by use of the Rake receiver was put forward.Ternary complementary sets assigned to two users had good aperiodic autocorrelation functions.Hence,the multipath interference as well as multiple access interference were mitigated.Simulation results show that ternary MO complementary sets have better performances compared with other random sequences in the SV/IEEE 802.15.3a channel model.…”
    Get full text
    Article
  8. 4248

    Key factors of neobanking's occurence by Timotej Jagrič, Aleksandra Amon

    Published 2023-07-01
    “…Purpose of this research is to find key factors determining occurrence of neobanks in selected 43 countries. We use random-effects model to analyse 13 financial, economic, and cultural–geographical factors. …”
    Get full text
    Article
  9. 4249

    Bioinspired Evolutionary Algorithm Based for Improving Network Coverage in Wireless Sensor Networks by Mohammadjavad Abbasi, Muhammad Shafie Bin Abd Latiff, Hassan Chizari

    Published 2014-01-01
    “…The important key of WSNs is detection and coverage of target area which is provided by random deployment. This paper reviews and addresses various area detection and coverage problems in sensor network. …”
    Get full text
    Article
  10. 4250

    On Discrete-Time Multiallelic Evolutionary Dynamics Driven by Selection by Thierry E. Huillet

    Published 2010-01-01
    “…Then, we draw the attention on a class of fitness matrices that plays some role in the important matter of polymorphism: the class of strictly ultrametric fitness matrices. In the random cases, we focus on fixation probabilities, on various conditionings on nonfixation, and on (quasi)stationary distributions.…”
    Get full text
    Article
  11. 4251

    Measurement of Translational and Angular Vibration Using a Scanning Laser Doppler Vibrometer by A.B. Stanbridge, D.J. Ewins

    Published 1996-01-01
    “…Processes of narrow-band random excitation and modal analysis are illustrated with reference to measurements on a freely suspended beam. …”
    Get full text
    Article
  12. 4252

    Vibration Signal Analysis of RV Reducer based on Wavelet Theory by Chen Liguo, Wang Jiugen, Zhang Jing

    Published 2018-01-01
    “…The structure of RV reducer is complex,the vibration signal generated during the operation will be interfered by a lot of random noises due to the vibration excitation source. …”
    Get full text
    Article
  13. 4253

    Efficient ID-based multicast authentication protocol in wireless sensor networks by WANG Gang1, WEN Tao1, GUO Quan2, MA Xue-bin1

    Published 2009-01-01
    “…In order to overcome the drawback of the existent multicast authentication protocol in WSN,the PKC-based services for WSN was explored and an efficient ID-based multicast authentication protocol was presented.The protocol with message recovery provided the feature that the message was recoverable from the signature and hence the computa-tional cost and communication overhead of the protocol had been reduced greatly.This protocol was proved secure against existential forgery under adaptive chosen message and ID attack in the random oracle model.The performance analysis results show that the proposed scheme can effectively reduce resource cost,adapt the characteristics of WSN and is clearly superior to the HESS,Zhang and BLS protocols.…”
    Get full text
    Article
  14. 4254

    Efficient traceable identity-based signature scheme by DU Hong-zhen1, WEN Qiao-yan2

    Published 2009-01-01
    “…Moreover, a T-IBS scheme without pairing was presented and the security of the provided scheme was provided under the elliptic curve discrete logarithm assumption and the random oracle model. Compared with the existing schemes without suffering from key escrow, the scheme is the most efficient scheme and the signing algorithm needs only one scalar multiplication in the additive group while the reverse operation requires only three scalar multiplications.…”
    Get full text
    Article
  15. 4255

    Research on the Edge Resource Allocation and Load Balancing Algorithm Based on Vehicle Trajectory by Shuxu Zhao, Xinyuan Chen, Xiaolong Wang

    Published 2022-01-01
    “…However, the driving of vehicles is random and unevenly distributed, causing problems such as unbalanced load of edge servers and low edge resource utilization. …”
    Get full text
    Article
  16. 4256

    The circular economy and sustainable development in the European Union's new member states by Mihaela Simionescu

    Published 2023-05-01
    “…A macroeconomic approach based on panel data models and Bayesian random linear regression models was conducted for Cyprus, Latvia, Lithuania, Hungary, Poland, Romania, Slovenia, and Slovakia from 2008-2020. …”
    Get full text
    Article
  17. 4257

    Research on the optimization adjustment strategy for the SaaS multi-tenant data placement by Xiao-na LI, Qing-zhong LI, Lan-ju KONG, Zhong-min YAN

    Published 2014-11-01
    “…The multi-tenant data stored in cloud using replica technology must be reasonably placed,meet the requirements for data access by tenants and management by service providers.According to the characteristics of multi-tenant data and the load of the nodes,for the outweight nodes and the ultralight nodes,through adjusting the number and position of the replicas to maintenance and optimization the placement strategy so that meet the SLA requirements at the same time minimize the overall cost,realize the balance between the quality of service and the cost of management.Experimental results through comparison with random placement strategy and greedy placement policy demonstrate the feasibility and effectiveness of the proposed strategy.…”
    Get full text
    Article
  18. 4258

    Observer-Based Control Design for Nonlinear Networked Control Systems with Limited Information by Yilin Wang, Zhengrong Xiang, Hamid Reza Karimi

    Published 2013-01-01
    “…An improved networked control system model is proposed and the effects of random packet dropout, time-varying delay, and quantization are considered simultaneously. …”
    Get full text
    Article
  19. 4259

    Multimedia Image Encryption Analysis Based on High-Dimensional Chaos Algorithm by Xing Zhang

    Published 2021-01-01
    “…The pixel of the encrypted picture is distributed relatively random, and the characteristics of similar loudness are not relevant. …”
    Get full text
    Article
  20. 4260

    Models for predicting juvenile hypertension by Vytautas Janilionis, Edita Janavičiūtė, Jūratė Klumbienė, Giedrė Sakalauskienė

    Published 2004-12-01
    “…The first survey of a random sample of Kaunas schoolchildren born in 1964 was carried out in 1977. …”
    Get full text
    Article