Showing 4,341 - 4,360 results of 17,304 for search '"random"', query time: 0.08s Refine Results
  1. 4341

    Parental support: prevention of cyber grooming in junior high school adolescents by Dini Rakhmawati, Venty Venty, Jovitha Julienjatiningsih, Mujiyono Mujiyono, Argo Widhiharto

    Published 2023-09-01
    “…The sampling technique used was simple random sampling by taking 20% of the total population of 154 students. …”
    Get full text
    Article
  2. 4342

    Optimum response scheme of intrusion detection based on information theory by Youliang TIAN, Yulong WU, Qiuxian LI

    Published 2020-07-01
    “…Intrusion detection system (IDS) often inevitably presents major security risks caused by FPs and FNs.However,at present,an effective solution has not been found.In order to solve this problem,an optimal response model of intrusion detection based on information theory was proposed.Firstly,the intruder and IDS in the process of intrusion detection were abstracted into random variables,and the attack and defense model of intruder and IDS was constructed according to the results of the confrontation.Secondly,the defense channel of IDS was designed according to the attack and defense model,then the correct detection of IDS was transformed into the problem of successful transmission of 1 bit information in defensive channel.Finally,the defensive capability of the system was measured by analyzing the channel capacity of the defensive channel,the maximum mutual information of the defensive channel was the defensive limit capability of the IDS,and the corresponding strategy distribution was the optimal response strategy of the defensive capability of the system.The experimental results show that the scheme can effectively reduce the loss caused by FPs and FNs.…”
    Get full text
    Article
  3. 4343

    THE EFFECTS OF PERSONALITY CHARACTERISTICS ON TIME MANAGEMENT SKILLS: RESEARCH ON VOCATIONAL SCHOOL STUDENTS by Musa Karaçor, Ozan Çatır, Kenan Sakallı

    Published 2017-10-01
    “…Sampling as a method of easy sampling method is random sampling method isselected. The study was conducted on 420 students studying in vocationalschools. …”
    Get full text
    Article
  4. 4344

    CRF combined with ShapeBM shape priors for image labeling by Hao WANG, Lijun GUO, Yadong WANG, Rong ZHANG

    Published 2017-01-01
    “…Conditional random field (CRF) is a powerful model for image labeling,it is particularly well-suited to model local interactions among adjacent regions (e.g.superpixels).However,CRF doesn't consider the global constraint of objects.The overall shape of the object is used as a global constraint,the ShapeBM can be taken advantage of modeling the global shape of object,and then a new labeling model that combined the above two types of models was presented.The combination of CRF and ShapeBM was based on the superpixels,through the pooling technology was wed to establish the corresponding relationship between the CRF superpixel layer and the ShapeBM input layer.It enhanced the effectiveness of the combination of CRF and ShapeBM and improved the accuracy of the labeling.The experiments on the Penn-Fudan Pedestrians dataset and Caltech-UCSD Birds 200 dataset demonstrate that the model is more effective and efficient than others.…”
    Get full text
    Article
  5. 4345

    Antenna azimuth diagnosis based on multi-layer perceptron model by Xiangrong CHEN

    Published 2021-04-01
    “…Antenna azimuth was seen as a key factor in the quality of mobile communications, and its accuracy will directly affect the quality of network optimization.An antenna azimuth diagnosis method was proposed based on multi-layer perceptron.The azimuth was divided into 12 interval classes, each class covered a range of 30°, that was,[0, 30°) was recorded as class 0, …,[330°, 360°) was recorded as class 11.The multi-layer perceptron algorithm was used to identify the range of the antenna azimuth angle and automatically identify the angle range of the antenna azimuth angle, which provided effective data support for the network optimization engineer to determine the actual network coverage problem, and greatly reduced workload and labor cost in verifying antenna performance.Experimental results show that the method can effectively and quickly discriminate the antenna azimuth interval class, and the recognition accuracy reaches 92.6%, which is higher than the classification accuracy of random forest and logistic regression classification algorithms.…”
    Get full text
    Article
  6. 4346

    A cross-country comparison of pig production systems performance: Evidence from EU countries by Ricardo Troncoso, Juan Cabas, Bouali Guesmi, José María Gil

    Published 2023-12-01
    “…The Generalized True Random-effects (GTRE) model was used to differentiate between persistent and transitory technical efficiency. …”
    Get full text
    Article
  7. 4347

    Pengaruh Metode Resiprokal dan Motor Ability Dalam Meningkatkan Keterampilan Servis Bola Voli by Samsuddin Siregar, Eva Faridah

    Published 2021-11-01
    “…Penelitiaan memakai sampel 20 peserta didik dipengaruhi dengan teknik purposive random sampling. Selanjutnya, penelitian menggunakan metode eksperimen serta teknik pengumpulan data menggunakan uji tes keterampilan servis dan keterampilan gerak (Barrow Motor Ability Tes). kemudian teknik analisis data yang dipergunakan menggunakan uji anava. hasil asal pengujian hipotesis dapat disimpulkan bahwa belajar servis bola voli dengan memakai metode resiprokal lebih baik pada siswa yang mempunyai kemampuan gerak tinggi dibandingkan menggunakan siswa berkemampuan motilitas rendah.…”
    Get full text
    Article
  8. 4348

    State Estimation for Time-Delay Systems with Markov Jump Parameters and Missing Measurements by Yushun Tan, Qiong Qi, Jinliang Liu

    Published 2014-01-01
    “…This paper is concerned with the state estimation problem for a class of time-delay systems with Markovian jump parameters and missing measurements, considering the fact that data missing may occur in the process of transmission and its failure rates are governed by random variables satisfying certain probabilistic distribution. …”
    Get full text
    Article
  9. 4349

    PREDICTION OF TELECOM SERVICES CONSUMERS CHURN BY USING MACHINE LEARNING ALGORITHMS by Edin Osmanbegović, Anel Džinić, Mirza Suljić

    Published 2022-11-01
    “…Some of the most commonly used machine learning algorithms for this issue are Logistic Regression, Gaussian Naive Bayes, Bernoulli Naive Bayes, Decision Tree, and Random Forest. …”
    Get full text
    Article
  10. 4350

    Optimal service selection approach considering both atomic transaction and end-to-end QoS constraints by LIU Hai1, ZHANG Wei-min1, ZHANG Zhu-xi2, JIA Xiong1, LIAO Wei1

    Published 2011-01-01
    “…An actual SCG(service candidate graph) model-based optimal service selection approach was proposed.Firstly,the approach created transactional constraint relationships among candidates as an actual SCG model with several build-ing rules,whose correctness had been also proved;Then,an optimal QoS-aware service selection algorithm on the basis of BFS(breadth first search) was designed,where a relaxing and pruming method was applied to keep the computation scale in polynomial time.Finally,simulation experiments were conducted with real-world QoS dataset and random data-set,whose results demonstrated the beneficial performance on global QoS utility and outstanding successful selecting ra-tio over other related work.Meanwhile,the correctnesss has also been proved in practice by implementing a transactional automation.…”
    Get full text
    Article
  11. 4351

    Properties of Matrix Variate Confluent Hypergeometric Function Distribution by Arjun K. Gupta, Daya K. Nagar, Luz Estela Sánchez

    Published 2016-01-01
    “…We also derive density functions of X2-1/2X1X2-1/2, (X1+X2)-1/2X1(X1+X2)-1/2, and X1+X2, where m×m independent random matrices X1 and X2 follow confluent hypergeometric function kind 1 and gamma distributions, respectively.…”
    Get full text
    Article
  12. 4352

    Waveform interpolation speech coding algorithm at 2.4kbit/s based on wavelet transform by WANG Jing, KUANG Jing-ming, XIE Xiang

    Published 2007-01-01
    “…A waveform interpolation speech coding algorithm at 2.4kbit/s based on wavelet transform was proposed,in which characteristic waveform decomposition and reconstruction is processed using biorthogonal wavelet filters.At the encoder,the alignment operation was removed and the amplitude spectrum is decomposed without phase spectrum.Because of the wavelet compression,only the amplitude spectrum of last layer is transmitted.At the decoder,different scale space is reconstructed separately and random or fixed phase was combined to the spectrum based on voice degree at the last.Additionally,based on the time-variable feature of speech,voiced degree flag of each subframe was introduced to indicate the spectrum selection and quantization.Subjective R-A/B listening tests indicated that the synthesis speech quality of the 2.4kbit/s WT-CWI coding algorithm is better than that of standard 2.4kbit/s MELP coder and FS1016 4.8kbit/s CELP coder and is better than traditional 3.8kbit/s CWI coder.…”
    Get full text
    Article
  13. 4353

    Identification of sepsis-associated encephalopathy biomarkers through machine learning and bioinformatics approaches by Jingchao Lei, Jia Zhai, Jing Qi, Chuanzheng Sun

    Published 2024-12-01
    “…Weighted Gene Co-expression Network Analysis and four machine learning methods—Elastic Net regression, LASSO, random forest, and XGBoost—were employed, dentifying 18 biomarkers with significant expression changes. …”
    Get full text
    Article
  14. 4354

    A New Solution of Privacy-Preserving Public Auditing Scheme for Cloud Storage Security by Shaohui Wang, Danwei Chen, Zhiwei Wang, Suqin Chang

    Published 2012-09-01
    “…The new scheme is secure in the random oracle model and has less computation cost than existing auditing scheme with privacy property.…”
    Get full text
    Article
  15. 4355

    Two-way and anonymous heterogeneous signcryption scheme between PKI and IBC by Cai-fen WANG, Chao LIU, Ya-hong LI, Shu-fen NIU, Yu-lei ZHANG

    Published 2017-10-01
    “…Exiting heterogeneous signcryption schemes which were between public key infrastructure (PKI) and identity-based cryptosystem (IBC) have some limitations.A new heterogeneous signcryption scheme between PKI and IBC was proposed.In the random oracle mode,the scheme ensured confidentiality and unforgeability on the basis of the assumption of computational Diffie-Hellman problem (CDHP),q-Diffie-Hellman inversion problem (q-DHIP) and bilinear Diffie-Hellman problem (BDHP).Simultaneously,the proposed scheme guaranteed unconnectedness and anonymity of the ciphertext.Compared with other heterogeneous schemes,the scheme achieved two-way signcryption,and it generated parameters without restrict,which was suitable for actual situations.Simulation tests show that proposed scheme is feasible.…”
    Get full text
    Article
  16. 4356

    Dynamic social network active influence maximization algorithm based on Coulomb force model by Min LU, Guanglu CHEN, Xiaohui YANG, Chunlan HUANG, Guangxue YUE

    Published 2020-06-01
    “…The problem of maximizing influence has become an important research content in social networks,and its influence propagation model and solving algorithm are the key core issues.In order to improve the accuracy of predicting the propagation results,the dynamic change of the number of activated nodes and the trust relationship between the nodes during the propagation process were introduced to improve the IC model.Combining the similarity between social influence and Coulomb force,a dynamic based on trust relationship was proposed,a dynamic social coulomb forces based on trust relationships (DSC-TR) model was proposed,and an optimized random greedy (RG-DPIM) algorithm was constructed to solve the problem of maximum impact.Simulation results show that the prediction accuracy of the DSC-TR model is obviously better than that of SC-B and IC models.The performance of RG-DPIM algorithm is obviously better than that of G-DPIM,IPA and TDIA algorithms.…”
    Get full text
    Article
  17. 4357

    Research of Transmission Accuracy of Multistage Gear Drive System based on Error Coupling Compensation by Wang Chaobing, Peng Lingyang, Liu Leping, Xu Younan, Zhang Long, Tu Wenbing, Ma Honghao

    Published 2019-01-01
    “…Then,the system transmission accuracies are both calculated by the Monte Carlo method when it is under the random assembly of the components and it is improved machining accuracy of some parts. …”
    Get full text
    Article
  18. 4358

    A Spectrum Sensing Method Based on Signal Feature and Clustering Algorithm in Cognitive Wireless Multimedia Sensor Networks by Yongwei Zhang, Pin Wan, Shunchao Zhang, Yonghua Wang, Nan Li

    Published 2017-01-01
    “…In order to solve the problem of difficulty in determining the threshold in spectrum sensing technologies based on the random matrix theory, a spectrum sensing method based on clustering algorithm and signal feature is proposed for Cognitive Wireless Multimedia Sensor Networks. …”
    Get full text
    Article
  19. 4359

    Effect of Surface Morphology on Dynamic Characteristics of Cam-Follower Oblique Impact System by Wangqun Deng, Haibo Feng, Jianjun Wang, Yongfeng Yang

    Published 2019-01-01
    “…The system response changes between quasiperiod and chaos affected by the contact line length with a normal random distribution.…”
    Get full text
    Article
  20. 4360

    Disorder-free Sachdev-Ye-Kitaev models: Integrability and a precursor of chaos by Soshun Ozaki, Hosho Katsura

    Published 2025-01-01
    “…Conversely, our analysis shows no evidence of random-matrix behavior in level spacing statistics or the spectral form factor. …”
    Get full text
    Article