Suggested Topics within your search.
Suggested Topics within your search.
- Rhetoric 5
- English language 4
- Grammar 4
- Attitude to Health 3
- Behavioral Medicine 2
- Handbooks, manuals, etc 2
- Health behavior 2
- Psychology 2
- Animals 1
- Brothers and sisters 1
- Business communication 1
- Business writing 1
- Care 1
- Case studies 1
- Child development 1
- Child rearing 1
- Communication in organizations 1
- Dialectical materialism 1
- Education 1
- Elias (Fictitious character) 1
- English 1
- Examinations, questions, etc 1
- Fantasy 1
- Fiction 1
- Fugitives from justice 1
- Habitat (Ecology) 1
- Health 1
- Infants 1
- Laia (Fictitious character) 1
- Mass media 1
-
4241
Efficient ID-based certificateless signature scheme
Published 2008-01-01“…The security relied on the hardness of the computation diffie-hellman problem (CDHP). Under the random oracle model, the new scheme was proved to be secure against existential forgery on adaptively chosen message and ID attack. …”
Get full text
Article -
4242
SPOR YAZARLARININ FUTBOL KAMUOYU ÜZERİNE ETKİLERİNİN DEĞERLENDİRİLMESİ ÜZERİNE BİR ARAŞTIRMA
Published 2014-05-01“…Ki-kare X2 ve sd'ne göre belirlenen sonuçlardan elde edilen bulgular tablolaştırılarak p lt;0.05 değerine göre yorumları yapılmıştır.Türkiye'nin yedi coğrafi bölgesinde random usulü ile seçilen illerinde 2001 yılı içinde spor yazarlığı yapan ve Türkiye Spor o Yazarları Derneği (T.S.Y.D) üyesi olan 100 ispor yazarı ve bu illerdeki spor kamuoyundan rasgele seçilen 800 denek araştırmanın materyalini oluşturmuştur.…”
Get full text
Article -
4243
BP neural network based Doppler frequency offset estimation method for 5G high-speed mobile system
Published 2020-04-01“…A BP neural network based Doppler frequency offset estimation method was proposed.The proposed method was mainly divided into two stages:offline training and online estimation.Firstly,the training samples were constructed by using random Doppler frequency offset and received pilot signals,and then the training samples were used to train the BP neural network offline,which could complete the mapping relationship between input and output data.Then,based on the trained network,the received pilot signal was used to estimate the Doppler frequency offset online.Simulation results show that the performance of the proposed method is far superior to the existing method,and it has low computational complexity.…”
Get full text
Article -
4244
Research on non-orthogonal transmission strategy for content delivery in caching networks
Published 2023-10-01“…A two-stage adaptive non-orthogonal/orthogonal multiple access transmission scheme was designed for content delivery scenarios in wireless caching networks.For the scheme, a high-reliability user scheduling strategy was proposed, and the analytical expression of the outage probability and its asymptotic expression in high signal-to-noise ratio regime were derived by theoretical analysis.The analysis results indicate that the proposed strategy can achieve full spatial diversity gain.Simulation results demonstrate that compared with the instantaneous channel state information-based scheduling strategy, the random scheduling strategy, and the conventional orthogonal multiple access transmission strategy, the proposed strategy can achieve better content delivery reliability than existing strategies by obtaining the spatial diversity gain.…”
Get full text
Article -
4245
Self-learning differential evolution algorithm for dynamic polycentric problems
Published 2015-07-01“…A novel self-learning differential evolution algorithm is proposed to solve dynamical multi-center optimization problems.The approach of re-evaluating some specific individuals is used to monitor environmental changes.The proposed self-learning operator guides the evolutionary group to a new environment,meanwhile maintains the stable topology structure of group to maintain the current evolutionary trend.A neighborhood search mechanism and a random immigrant mechanism are adapted to make a tradeoff between algorithmic convergence and population diversity.The experiment studies on a periodic dynamic function set suits are done,and the comparisons with peer algorithms show that the self-learning differential algorithm outperforms other algorithms in term of convergence and adaptability under dynamical environment.…”
Get full text
Article -
4246
OPTIMIZATION OF INERTIAL NAVIGATION DAMPING SYSTEM BASED ON SENSITIVITY ANALYSIS
Published 2018-01-01“…The vibration environment of an inertial navigation system( INS) can bring an adverse effect on its measurement accuracy. A random vibration model of an optical fiber INS is proposed. …”
Get full text
Article -
4247
Ternary complementary sets and its application in UWB
Published 2005-01-01“…Ternary complementary set based UWB signaling employing a set of orthogonal chip pulses was proposed for DS-UWB.It had many advantages in indoor high-speed short range communications.First the system model of multiple access communications was founded,then ternary complementary set and its recursive construction method were analyzed,and then the performance evaluation structure of multiple access communications based the ternary complementary sets by use of the Rake receiver was put forward.Ternary complementary sets assigned to two users had good aperiodic autocorrelation functions.Hence,the multipath interference as well as multiple access interference were mitigated.Simulation results show that ternary MO complementary sets have better performances compared with other random sequences in the SV/IEEE 802.15.3a channel model.…”
Get full text
Article -
4248
Key factors of neobanking's occurence
Published 2023-07-01“…Purpose of this research is to find key factors determining occurrence of neobanks in selected 43 countries. We use random-effects model to analyse 13 financial, economic, and cultural–geographical factors. …”
Get full text
Article -
4249
Bioinspired Evolutionary Algorithm Based for Improving Network Coverage in Wireless Sensor Networks
Published 2014-01-01“…The important key of WSNs is detection and coverage of target area which is provided by random deployment. This paper reviews and addresses various area detection and coverage problems in sensor network. …”
Get full text
Article -
4250
On Discrete-Time Multiallelic Evolutionary Dynamics Driven by Selection
Published 2010-01-01“…Then, we draw the attention on a class of fitness matrices that plays some role in the important matter of polymorphism: the class of strictly ultrametric fitness matrices. In the random cases, we focus on fixation probabilities, on various conditionings on nonfixation, and on (quasi)stationary distributions.…”
Get full text
Article -
4251
Measurement of Translational and Angular Vibration Using a Scanning Laser Doppler Vibrometer
Published 1996-01-01“…Processes of narrow-band random excitation and modal analysis are illustrated with reference to measurements on a freely suspended beam. …”
Get full text
Article -
4252
Vibration Signal Analysis of RV Reducer based on Wavelet Theory
Published 2018-01-01“…The structure of RV reducer is complex,the vibration signal generated during the operation will be interfered by a lot of random noises due to the vibration excitation source. …”
Get full text
Article -
4253
Efficient ID-based multicast authentication protocol in wireless sensor networks
Published 2009-01-01“…In order to overcome the drawback of the existent multicast authentication protocol in WSN,the PKC-based services for WSN was explored and an efficient ID-based multicast authentication protocol was presented.The protocol with message recovery provided the feature that the message was recoverable from the signature and hence the computa-tional cost and communication overhead of the protocol had been reduced greatly.This protocol was proved secure against existential forgery under adaptive chosen message and ID attack in the random oracle model.The performance analysis results show that the proposed scheme can effectively reduce resource cost,adapt the characteristics of WSN and is clearly superior to the HESS,Zhang and BLS protocols.…”
Get full text
Article -
4254
Efficient traceable identity-based signature scheme
Published 2009-01-01“…Moreover, a T-IBS scheme without pairing was presented and the security of the provided scheme was provided under the elliptic curve discrete logarithm assumption and the random oracle model. Compared with the existing schemes without suffering from key escrow, the scheme is the most efficient scheme and the signing algorithm needs only one scalar multiplication in the additive group while the reverse operation requires only three scalar multiplications.…”
Get full text
Article -
4255
Research on the Edge Resource Allocation and Load Balancing Algorithm Based on Vehicle Trajectory
Published 2022-01-01“…However, the driving of vehicles is random and unevenly distributed, causing problems such as unbalanced load of edge servers and low edge resource utilization. …”
Get full text
Article -
4256
The circular economy and sustainable development in the European Union's new member states
Published 2023-05-01“…A macroeconomic approach based on panel data models and Bayesian random linear regression models was conducted for Cyprus, Latvia, Lithuania, Hungary, Poland, Romania, Slovenia, and Slovakia from 2008-2020. …”
Get full text
Article -
4257
Research on the optimization adjustment strategy for the SaaS multi-tenant data placement
Published 2014-11-01“…The multi-tenant data stored in cloud using replica technology must be reasonably placed,meet the requirements for data access by tenants and management by service providers.According to the characteristics of multi-tenant data and the load of the nodes,for the outweight nodes and the ultralight nodes,through adjusting the number and position of the replicas to maintenance and optimization the placement strategy so that meet the SLA requirements at the same time minimize the overall cost,realize the balance between the quality of service and the cost of management.Experimental results through comparison with random placement strategy and greedy placement policy demonstrate the feasibility and effectiveness of the proposed strategy.…”
Get full text
Article -
4258
Observer-Based Control Design for Nonlinear Networked Control Systems with Limited Information
Published 2013-01-01“…An improved networked control system model is proposed and the effects of random packet dropout, time-varying delay, and quantization are considered simultaneously. …”
Get full text
Article -
4259
Multimedia Image Encryption Analysis Based on High-Dimensional Chaos Algorithm
Published 2021-01-01“…The pixel of the encrypted picture is distributed relatively random, and the characteristics of similar loudness are not relevant. …”
Get full text
Article -
4260
Models for predicting juvenile hypertension
Published 2004-12-01“…The first survey of a random sample of Kaunas schoolchildren born in 1964 was carried out in 1977. …”
Get full text
Article