Suggested Topics within your search.
Suggested Topics within your search.
- Rhetoric 5
- English language 4
- Grammar 4
- Attitude to Health 3
- Behavioral Medicine 2
- Handbooks, manuals, etc 2
- Health behavior 2
- Psychology 2
- Animals 1
- Brothers and sisters 1
- Business communication 1
- Business writing 1
- Care 1
- Case studies 1
- Child development 1
- Child rearing 1
- Communication in organizations 1
- Dialectical materialism 1
- Education 1
- Elias (Fictitious character) 1
- English 1
- Examinations, questions, etc 1
- Fantasy 1
- Fiction 1
- Fugitives from justice 1
- Habitat (Ecology) 1
- Health 1
- Infants 1
- Laia (Fictitious character) 1
- Mass media 1
-
4301
Research on Characteristics and Influencing Factors of High Temperature Disaster Risk in Wuhan Based on Local Climate Zone
Published 2025-01-01“…With 70% random samples used for drawing and 30% random samples used for checking, LCZ maps that meet the requirements of classification accuracy are obtained and analyzed for site identification at the local scale. …”
Get full text
Article -
4302
Time series aggregation, disaggregation and long memory
Published 2023-09-01“…It was shown in Granger (1980) that a certain aggregation of random coefficient AR(1) models can lead to long memory output. …”
Get full text
Article -
4303
Behaviour of Parallel Coupled Microstrip Band Pass Filter and Simple Microstripline due to Thin-Film Al2O3 Overlay
Published 1996-01-01“…At higher frequencies, random variations are observed. It is felt that thin-film overlays can be used to modify the microstripline circuit properties, thereby avoiding costly and time consuming elaborate design procedures.…”
Get full text
Article -
4304
Gender and Entrepreneurship: a comparative study between the Causation and Effectuation approaches
Published 2019-01-01“…For this purpose, a survey was conducted with Individual Micro Entrepreneurs (MEI) in the city of Nova Cruz/RN. A probabilistic random sample of 100 respondents was collected. The survey was composed of closed questions, including the profile of the entrepreneur, company profile and the Causation and Effectuation questions. …”
Get full text
Article -
4305
Hopf Bifurcations of a Stochastic Fractional-Order Van der Pol System
Published 2014-01-01“…The Hopf bifurcation of a fractional-order Van der Pol (VDP for short) system with a random parameter is investigated. Firstly, the Chebyshev polynomial approximation is applied to study the stochastic fractional-order system. …”
Get full text
Article -
4306
Multi-sensor data fusion method for water quality evaluation based on interval evidence theory
Published 2016-09-01“…For the inevitable uncertainty and random uncertainty in the process of measuring water quality data with the sensor network,a multi-sensor data fusion method for water quality evaluation based on interval evidence theory was proposed.Considering the precision error of sensor and the abnormalities of measured data,every water quality data measured by sensor was represented by interval number.By calculating the distance between the water quality data and the features of each water quality class,the interval evidence of water quality class was acquired.According to the interval evidence combining rule,a comprehensive interval evidence was obtained by combining the interval evidence of each sensor.Finally,the water quality class was determined based on the comprehensive interval evidence by the decision rule.Experiments show that the proposed method can evaluate water quality class more accurately from the uncertain water quality data.…”
Get full text
Article -
4307
Secure control plane for SDN using Bayesian Stackelberg games
Published 2017-11-01“…A dynamic scheduling controller in SDN control layer was proposed by dynamically transform heteroge-neous controlled in order to increase the difficulty of the attacker.Firstly,a dynamic scheduling method based on Bayesian Stackelberg games the attacker and defender were game participation on both sides,obtained the equili-brium,which guided the scheduling strategy.Secondly,introducing a self-cleaning mechanism,it improved the gain of the control layer security combined with game strategy form closed-loop defense mechanism.The experiments described quantitatively based on the game strategy compared with traditional safety control layer to deploy a single controller and adopt the strategy of random scheduling profit gain of the controller,and self-cleaning mechanism could make the control plane to be in a higher level of security.…”
Get full text
Article -
4308
Access to Livelihood Capital and Food Security Status as Correlates to Empowerment Among Women on Irrigation Schemes in North-West Province, South Africa
Published 2023-06-01“…This paper examines the empowerment, access to livelihood capital, and food security status among women in irrigation Schemes in North-West Province, South Africa. A simple random sampling technique was used to select 84 women farmers. …”
Get full text
Article -
4309
Energy Efficient Distributed Fault Identification Algorithm in Wireless Sensor Networks
Published 2014-01-01“…The algorithm is distributed, self-detectable, and can detect the most common byzantine faults such as stuck at zero, stuck at one, and random data. In the proposed approach, each sensor node gathered the observed data from the neighbors and computed the mean to check whether faulty sensor node is present or not. …”
Get full text
Article -
4310
Survey of factors affecting religious beliefs in physical education students
Published 2016-08-01“…The survey method was a cross-sectional survey type, and the statistical population included all university teachers of Islamic Azad University, Sama unit, the number of which was 1316 people, and the statistical sample volume was 297 people which were determined based on various educational bases by stratified random sampling by using table of Morgan. The tool of survey was questionnaire depending on response surveyor made, based on Likert's design. …”
Get full text
Article -
4311
A NB-IoT access scheme based on Beta distribution
Published 2021-09-01“…As one of the emerging technologies of low-power wide-area Internet of things, narrow band Internet of things (NB-IoT) faces the pressure and challenge of massive connections of terminals.Aiming at practical application scenarios, a preamble allocation scheme based on Beta distribution was proposed.In this scheme, the energy consumption of each time slot device was firstly calculated.The equipment was divided into high energy consumption according to two grouping methods: average energy consumption and cumulative energy consumption.The preamble was assigned to the high-energy-consuming device group first, and the remaining preamble and the conflicting preamble of the high-energy-consuming device group were assigned to the low-energy-consuming device group.The simulation results show that compared with the traditional random allocation scheme, the proposed scheme can effectively improve the average access success rate and average throughput of the NB-IoT system, and can effectively reduce the back off time.…”
Get full text
Article -
4312
Network security situational awareness model based on threat intelligence
Published 2021-06-01“…In order to deal with the problems that the increasing scale of the network in the real environment leads to the continuous high incidence of network attacks, the threat intelligence was applied to situational awareness, and the situational awareness model based on random game was constructed.Threat perception of the target system was performed by comparing the similarity between the exogenous threat intelligence and the internal security events of the system.At the same time, internal threat intelligence was generated based on the threat information inside the system.In this process, game theory was used to quantify the current network security situation of the system, evaluate the security status of the network.Finally, the prediction of the network security situation was realized.The experimental results show that the network security situation awareness method based on threat intelligence can reflect the changes in the network security situation and predict attack behaviors accurately.…”
Get full text
Article -
4313
A novel deep learning based time-varying channel prediction method
Published 2021-01-01“…For high-speed mobile orthogonal frequency division multiplexing (OFDM) systems, a novel time-varying channel prediction method based on deep learning was proposed.To avoid the influence caused by random initialization of network parameters, the proposed method firstly obtains an ideal channel estimation based on data and pilot, and then pre-trains the back propagation (BP) neural network based on the channel estimation to obtain the ideal network initial parameters.Then, based on the initial network value obtained by pre-training, the proposed method uses the channel estimation based on pilot to train the BP neural network again.Finally, the proposed method realizes the single-time-and multi-time prediction of time-varying channels through on-line prediction.Simulation results show that the proposed method can significantly improve the prediction accuracy of time-varying channels and has a low computational complexity.…”
Get full text
Article -
4314
Agency of Urban Space and David Greig’s San Diego as Soft City
Published 2024-04-01“…While some spatial theories and spatial agency are being stressed prior to reaching any conclusions about this relationship, the similarity between a playwright and an architect will be analysed to highlight that the setting of the play is not a random construction and to demonstrate how the playwright utilises space to shape his characters. …”
Get full text
Article -
4315
Effects of Fodder and Sericin Degumming Agents on Asunder Filament of Golden Silkworm Cocoon of Cricula trifenestrata Helf
Published 2013-07-01“…This study expected to find an asunder filament technology in the yarn spinning phase, as the material of silk textile. The complete random design was used to find the interaction between two treatment factors of fodder types and sericin degumming agents. …”
Get full text
Article -
4316
Effect of the difference enumeration attack on LowMC instances
Published 2021-06-01“…The LowMC is an algorithm with low multiplicative complexities.For the parameter with limited data complexities and low number of S-boxes, the difference enumeration attack was proposed, which could theoretically attack all rounds of the LowMC.Considering that the original attack is based on the random linear layer,the strength of LowMC algorithm against differential enumeration attacks under a specific linear layer deserves more study.The difference enumeration attack cannot reach theoretical rounds through the research on the so-called key initial round.In terms of some LowMC instances, the key initial round is smaller than the theoretical value, which leads to the failure of the difference enumeration attack.Since the number of rounds of the LowMC is completely based on existing attacks, the analysis is of great significance to the rounds design of the LowMC.…”
Get full text
Article -
4317
Numerical Simulation of Effective Properties of 3D Piezoelectric Composites
Published 2014-01-01“…The 2D algorithm is then modified and improved in such a way that it is valid for three-dimensional (3D) analysis in the case of random distributed shorts and inclusions. Linear interpolation of displacement field is employed to establish constraint equations of nodal displacements between two adjacent elements.…”
Get full text
Article -
4318
CODE-SWITCHING: STUDY ON THE SPEECH OF INDONESIAN JAVANESE EDUCATED BILINGUALS
Published 2021-10-01“…The research found out that the bilinguals code-switched in their speech at a system, not at random. The code-switching patterns were categorized into Single Lexical Code-switching, Phrasal Code-switching, Intra-sentential Code-switching, and Inter-sentential Code-switching. …”
Get full text
Article -
4319
Scheme and experiment of fast frequency hopping communication system based on SDR
Published 2022-08-01“…A fast frequency hopping scheme based on SDR was proposed to solve the problem that the existing fast frequency hopping communication system relied on satellite timing.Firstly, a true random sequence was used to perform frequency hopping operation on the modulated signal in this scheme.And the frequency hopping table was obtained by channel down-conversion, low-pass filtering and amplitude peak detection operations.Secondly, the receiver searched for the precise starting point by the peak-to-peak distribution characteristics of the quadrature demodulation amplitude of the baseband signal after de-hopping.Finally, down-conversion was performed and the peak-to-peak amplitude of the quadrature demodulation was checked for exceeding the threshold value to achieve de-hopping for frequency hopping signals.The effectiveness and adaptability of the proposed scheme is verified by using two general-purpose SDR devices with a hopping rate of four hops per symbol period in a real channel with other continuous signals.…”
Get full text
Article -
4320
INTELLIGENT LIQUID LEVEL CONTROL OF A COUPLED NONLINEAR THREE TANK SYSTEM SUBJECTED TO VARIABLE FLOW PARAMETERS
Published 2021-06-01“…Comparison of the system with the proposed controllers for tracking a step and random level set points for a fixed and variable flow parameter and some good results have been obtained. …”
Get full text
Article