Showing 4,301 - 4,320 results of 17,304 for search '"random"', query time: 0.10s Refine Results
  1. 4301

    Research on Characteristics and Influencing Factors of High Temperature Disaster Risk in Wuhan Based on Local Climate Zone by Shujing GUO, Li ZHANG

    Published 2025-01-01
    “…With 70% random samples used for drawing and 30% random samples used for checking, LCZ maps that meet the requirements of classification accuracy are obtained and analyzed for site identification at the local scale. …”
    Get full text
    Article
  2. 4302

    Time series aggregation, disaggregation and long memory by Dmitrij Celov, Remigijus Leipus

    Published 2023-09-01
    “…It was shown in Granger (1980) that a certain aggregation of random coefficient AR(1) models can lead to long memory output. …”
    Get full text
    Article
  3. 4303

    Behaviour of Parallel Coupled Microstrip Band Pass Filter and Simple Microstripline due to Thin-Film Al2O3 Overlay by S. B. Rane, Vijaya Puri

    Published 1996-01-01
    “…At higher frequencies, random variations are observed. It is felt that thin-film overlays can be used to modify the microstripline circuit properties, thereby avoiding costly and time consuming elaborate design procedures.…”
    Get full text
    Article
  4. 4304

    Gender and Entrepreneurship: a comparative study between the Causation and Effectuation approaches by Felipe Luiz Neves Bezerra de Melo, Rafael Rodrigues da Silva, Tatiane Nunes Viana de Almeida

    Published 2019-01-01
    “…For this purpose, a survey was conducted with Individual Micro Entrepreneurs (MEI) in the city of Nova Cruz/RN. A probabilistic random sample of 100 respondents was collected. The survey was composed of closed questions, including the profile of the entrepreneur, company profile and the Causation and Effectuation questions. …”
    Get full text
    Article
  5. 4305

    Hopf Bifurcations of a Stochastic Fractional-Order Van der Pol System by Xiaojun Liu, Ling Hong, Lixin Yang

    Published 2014-01-01
    “…The Hopf bifurcation of a fractional-order Van der Pol (VDP for short) system with a random parameter is investigated. Firstly, the Chebyshev polynomial approximation is applied to study the stochastic fractional-order system. …”
    Get full text
    Article
  6. 4306

    Multi-sensor data fusion method for water quality evaluation based on interval evidence theory by Jian ZHOU, Chen-hao MA, Lin-feng LIU, Li-juan SUN, Fu XIAO

    Published 2016-09-01
    “…For the inevitable uncertainty and random uncertainty in the process of measuring water quality data with the sensor network,a multi-sensor data fusion method for water quality evaluation based on interval evidence theory was proposed.Considering the precision error of sensor and the abnormalities of measured data,every water quality data measured by sensor was represented by interval number.By calculating the distance between the water quality data and the features of each water quality class,the interval evidence of water quality class was acquired.According to the interval evidence combining rule,a comprehensive interval evidence was obtained by combining the interval evidence of each sensor.Finally,the water quality class was determined based on the comprehensive interval evidence by the decision rule.Experiments show that the proposed method can evaluate water quality class more accurately from the uncertain water quality data.…”
    Get full text
    Article
  7. 4307

    Secure control plane for SDN using Bayesian Stackelberg games by Zhen-ping LU, Fu-cai CHEN, Guo-zhen CHENG

    Published 2017-11-01
    “…A dynamic scheduling controller in SDN control layer was proposed by dynamically transform heteroge-neous controlled in order to increase the difficulty of the attacker.Firstly,a dynamic scheduling method based on Bayesian Stackelberg games the attacker and defender were game participation on both sides,obtained the equili-brium,which guided the scheduling strategy.Secondly,introducing a self-cleaning mechanism,it improved the gain of the control layer security combined with game strategy form closed-loop defense mechanism.The experiments described quantitatively based on the game strategy compared with traditional safety control layer to deploy a single controller and adopt the strategy of random scheduling profit gain of the controller,and self-cleaning mechanism could make the control plane to be in a higher level of security.…”
    Get full text
    Article
  8. 4308

    Access to Livelihood Capital and Food Security Status as Correlates to Empowerment Among Women on Irrigation Schemes in North-West Province, South Africa by Oladimeji Idowu Oladele

    Published 2023-06-01
    “…This paper examines the empowerment, access to livelihood capital, and food security status among women in irrigation Schemes in North-West Province, South Africa. A simple random sampling technique was used to select 84 women farmers. …”
    Get full text
    Article
  9. 4309

    Energy Efficient Distributed Fault Identification Algorithm in Wireless Sensor Networks by Meenakshi Panda, P. M. Khilar

    Published 2014-01-01
    “…The algorithm is distributed, self-detectable, and can detect the most common byzantine faults such as stuck at zero, stuck at one, and random data. In the proposed approach, each sensor node gathered the observed data from the neighbors and computed the mean to check whether faulty sensor node is present or not. …”
    Get full text
    Article
  10. 4310

    Survey of factors affecting religious beliefs in physical education students by Mohammadbagher Forghani Ozrudı, Somayeh Rahimi Alıabadı

    Published 2016-08-01
    “…The survey method was a cross-sectional survey type, and the statistical population included all university teachers of Islamic Azad University, Sama unit, the number of which was 1316 people, and the statistical sample volume was 297 people which were determined based on various educational bases by stratified random sampling by using table of Morgan. The tool of survey was questionnaire depending on response surveyor made, based on Likert's design. …”
    Get full text
    Article
  11. 4311

    A NB-IoT access scheme based on Beta distribution by Mengya LI, Zhengquan LI

    Published 2021-09-01
    “…As one of the emerging technologies of low-power wide-area Internet of things, narrow band Internet of things (NB-IoT) faces the pressure and challenge of massive connections of terminals.Aiming at practical application scenarios, a preamble allocation scheme based on Beta distribution was proposed.In this scheme, the energy consumption of each time slot device was firstly calculated.The equipment was divided into high energy consumption according to two grouping methods: average energy consumption and cumulative energy consumption.The preamble was assigned to the high-energy-consuming device group first, and the remaining preamble and the conflicting preamble of the high-energy-consuming device group were assigned to the low-energy-consuming device group.The simulation results show that compared with the traditional random allocation scheme, the proposed scheme can effectively improve the average access success rate and average throughput of the NB-IoT system, and can effectively reduce the back off time.…”
    Get full text
    Article
  12. 4312

    Network security situational awareness model based on threat intelligence by Hongbin ZHANG, Yan YIN, Dongmei ZHAO, Bin LIU

    Published 2021-06-01
    “…In order to deal with the problems that the increasing scale of the network in the real environment leads to the continuous high incidence of network attacks, the threat intelligence was applied to situational awareness, and the situational awareness model based on random game was constructed.Threat perception of the target system was performed by comparing the similarity between the exogenous threat intelligence and the internal security events of the system.At the same time, internal threat intelligence was generated based on the threat information inside the system.In this process, game theory was used to quantify the current network security situation of the system, evaluate the security status of the network.Finally, the prediction of the network security situation was realized.The experimental results show that the network security situation awareness method based on threat intelligence can reflect the changes in the network security situation and predict attack behaviors accurately.…”
    Get full text
    Article
  13. 4313

    A novel deep learning based time-varying channel prediction method by Jie ZHANG, Lihua YANG, Zenghao WANG, Bo HU, Qian NIE

    Published 2021-01-01
    “…For high-speed mobile orthogonal frequency division multiplexing (OFDM) systems, a novel time-varying channel prediction method based on deep learning was proposed.To avoid the influence caused by random initialization of network parameters, the proposed method firstly obtains an ideal channel estimation based on data and pilot, and then pre-trains the back propagation (BP) neural network based on the channel estimation to obtain the ideal network initial parameters.Then, based on the initial network value obtained by pre-training, the proposed method uses the channel estimation based on pilot to train the BP neural network again.Finally, the proposed method realizes the single-time-and multi-time prediction of time-varying channels through on-line prediction.Simulation results show that the proposed method can significantly improve the prediction accuracy of time-varying channels and has a low computational complexity.…”
    Get full text
    Article
  14. 4314

    Agency of Urban Space and David Greig’s San Diego as Soft City by Ömer Kemal Gültekin

    Published 2024-04-01
    “…While some spatial theories and spatial agency are being stressed prior to reaching any conclusions about this relationship, the similarity between a playwright and an architect will be analysed to highlight that the setting of the play is not a random construction and to demonstrate how the playwright utilises space to shape his characters. …”
    Get full text
    Article
  15. 4315

    Effects of Fodder and Sericin Degumming Agents on Asunder Filament of Golden Silkworm Cocoon of Cricula trifenestrata Helf by Terry M Frans

    Published 2013-07-01
    “…This study expected to find an asunder filament technology in the yarn spinning phase, as the material of silk textile. The complete random design was used to find the interaction between two treatment factors of fodder types and sericin degumming agents. …”
    Get full text
    Article
  16. 4316

    Effect of the difference enumeration attack on LowMC instances by Xinxin GE, Zhihu LI, Meiqin WANG, Kai HU

    Published 2021-06-01
    “…The LowMC is an algorithm with low multiplicative complexities.For the parameter with limited data complexities and low number of S-boxes, the difference enumeration attack was proposed, which could theoretically attack all rounds of the LowMC.Considering that the original attack is based on the random linear layer,the strength of LowMC algorithm against differential enumeration attacks under a specific linear layer deserves more study.The difference enumeration attack cannot reach theoretical rounds through the research on the so-called key initial round.In terms of some LowMC instances, the key initial round is smaller than the theoretical value, which leads to the failure of the difference enumeration attack.Since the number of rounds of the LowMC is completely based on existing attacks, the analysis is of great significance to the rounds design of the LowMC.…”
    Get full text
    Article
  17. 4317

    Numerical Simulation of Effective Properties of 3D Piezoelectric Composites by Ri-Song Qin, Yi Xiao, Haitian Lan

    Published 2014-01-01
    “…The 2D algorithm is then modified and improved in such a way that it is valid for three-dimensional (3D) analysis in the case of random distributed shorts and inclusions. Linear interpolation of displacement field is employed to establish constraint equations of nodal displacements between two adjacent elements.…”
    Get full text
    Article
  18. 4318

    CODE-SWITCHING: STUDY ON THE SPEECH OF INDONESIAN JAVANESE EDUCATED BILINGUALS by Sudarsono Sudarsono

    Published 2021-10-01
    “…The research found out that the bilinguals code-switched in their speech at a system, not at random. The code-switching patterns were categorized into Single Lexical Code-switching, Phrasal Code-switching, Intra-sentential Code-switching, and Inter-sentential Code-switching. …”
    Get full text
    Article
  19. 4319

    Scheme and experiment of fast frequency hopping communication system based on SDR by Chengyu WEN, Conghui LIAO, Hang XIONG, Hong DU

    Published 2022-08-01
    “…A fast frequency hopping scheme based on SDR was proposed to solve the problem that the existing fast frequency hopping communication system relied on satellite timing.Firstly, a true random sequence was used to perform frequency hopping operation on the modulated signal in this scheme.And the frequency hopping table was obtained by channel down-conversion, low-pass filtering and amplitude peak detection operations.Secondly, the receiver searched for the precise starting point by the peak-to-peak distribution characteristics of the quadrature demodulation amplitude of the baseband signal after de-hopping.Finally, down-conversion was performed and the peak-to-peak amplitude of the quadrature demodulation was checked for exceeding the threshold value to achieve de-hopping for frequency hopping signals.The effectiveness and adaptability of the proposed scheme is verified by using two general-purpose SDR devices with a hopping rate of four hops per symbol period in a real channel with other continuous signals.…”
    Get full text
    Article
  20. 4320

    INTELLIGENT LIQUID LEVEL CONTROL OF A COUPLED NONLINEAR THREE TANK SYSTEM SUBJECTED TO VARIABLE FLOW PARAMETERS by MUSTEFA JIBRIL, MESAY TADESSE, NURYE HASSEN

    Published 2021-06-01
    “…Comparison of the system with the proposed controllers for tracking a step and random level set points for a fixed and variable flow parameter and some good results have been obtained. …”
    Get full text
    Article