Suggested Topics within your search.
Suggested Topics within your search.
- Rhetoric 5
- English language 4
- Grammar 4
- Attitude to Health 3
- Behavioral Medicine 2
- Handbooks, manuals, etc 2
- Health behavior 2
- Psychology 2
- Animals 1
- Brothers and sisters 1
- Business communication 1
- Business writing 1
- Care 1
- Case studies 1
- Child development 1
- Child rearing 1
- Communication in organizations 1
- Dialectical materialism 1
- Education 1
- Elias (Fictitious character) 1
- English 1
- Examinations, questions, etc 1
- Fantasy 1
- Fiction 1
- Fugitives from justice 1
- Habitat (Ecology) 1
- Health 1
- Infants 1
- Laia (Fictitious character) 1
- Mass media 1
-
4341
Parental support: prevention of cyber grooming in junior high school adolescents
Published 2023-09-01“…The sampling technique used was simple random sampling by taking 20% of the total population of 154 students. …”
Get full text
Article -
4342
Optimum response scheme of intrusion detection based on information theory
Published 2020-07-01“…Intrusion detection system (IDS) often inevitably presents major security risks caused by FPs and FNs.However,at present,an effective solution has not been found.In order to solve this problem,an optimal response model of intrusion detection based on information theory was proposed.Firstly,the intruder and IDS in the process of intrusion detection were abstracted into random variables,and the attack and defense model of intruder and IDS was constructed according to the results of the confrontation.Secondly,the defense channel of IDS was designed according to the attack and defense model,then the correct detection of IDS was transformed into the problem of successful transmission of 1 bit information in defensive channel.Finally,the defensive capability of the system was measured by analyzing the channel capacity of the defensive channel,the maximum mutual information of the defensive channel was the defensive limit capability of the IDS,and the corresponding strategy distribution was the optimal response strategy of the defensive capability of the system.The experimental results show that the scheme can effectively reduce the loss caused by FPs and FNs.…”
Get full text
Article -
4343
THE EFFECTS OF PERSONALITY CHARACTERISTICS ON TIME MANAGEMENT SKILLS: RESEARCH ON VOCATIONAL SCHOOL STUDENTS
Published 2017-10-01“…Sampling as a method of easy sampling method is random sampling method isselected. The study was conducted on 420 students studying in vocationalschools. …”
Get full text
Article -
4344
CRF combined with ShapeBM shape priors for image labeling
Published 2017-01-01“…Conditional random field (CRF) is a powerful model for image labeling,it is particularly well-suited to model local interactions among adjacent regions (e.g.superpixels).However,CRF doesn't consider the global constraint of objects.The overall shape of the object is used as a global constraint,the ShapeBM can be taken advantage of modeling the global shape of object,and then a new labeling model that combined the above two types of models was presented.The combination of CRF and ShapeBM was based on the superpixels,through the pooling technology was wed to establish the corresponding relationship between the CRF superpixel layer and the ShapeBM input layer.It enhanced the effectiveness of the combination of CRF and ShapeBM and improved the accuracy of the labeling.The experiments on the Penn-Fudan Pedestrians dataset and Caltech-UCSD Birds 200 dataset demonstrate that the model is more effective and efficient than others.…”
Get full text
Article -
4345
Antenna azimuth diagnosis based on multi-layer perceptron model
Published 2021-04-01“…Antenna azimuth was seen as a key factor in the quality of mobile communications, and its accuracy will directly affect the quality of network optimization.An antenna azimuth diagnosis method was proposed based on multi-layer perceptron.The azimuth was divided into 12 interval classes, each class covered a range of 30°, that was,[0, 30°) was recorded as class 0, …,[330°, 360°) was recorded as class 11.The multi-layer perceptron algorithm was used to identify the range of the antenna azimuth angle and automatically identify the angle range of the antenna azimuth angle, which provided effective data support for the network optimization engineer to determine the actual network coverage problem, and greatly reduced workload and labor cost in verifying antenna performance.Experimental results show that the method can effectively and quickly discriminate the antenna azimuth interval class, and the recognition accuracy reaches 92.6%, which is higher than the classification accuracy of random forest and logistic regression classification algorithms.…”
Get full text
Article -
4346
A cross-country comparison of pig production systems performance: Evidence from EU countries
Published 2023-12-01“…The Generalized True Random-effects (GTRE) model was used to differentiate between persistent and transitory technical efficiency. …”
Get full text
Article -
4347
Pengaruh Metode Resiprokal dan Motor Ability Dalam Meningkatkan Keterampilan Servis Bola Voli
Published 2021-11-01“…Penelitiaan memakai sampel 20 peserta didik dipengaruhi dengan teknik purposive random sampling. Selanjutnya, penelitian menggunakan metode eksperimen serta teknik pengumpulan data menggunakan uji tes keterampilan servis dan keterampilan gerak (Barrow Motor Ability Tes). kemudian teknik analisis data yang dipergunakan menggunakan uji anava. hasil asal pengujian hipotesis dapat disimpulkan bahwa belajar servis bola voli dengan memakai metode resiprokal lebih baik pada siswa yang mempunyai kemampuan gerak tinggi dibandingkan menggunakan siswa berkemampuan motilitas rendah.…”
Get full text
Article -
4348
State Estimation for Time-Delay Systems with Markov Jump Parameters and Missing Measurements
Published 2014-01-01“…This paper is concerned with the state estimation problem for a class of time-delay systems with Markovian jump parameters and missing measurements, considering the fact that data missing may occur in the process of transmission and its failure rates are governed by random variables satisfying certain probabilistic distribution. …”
Get full text
Article -
4349
PREDICTION OF TELECOM SERVICES CONSUMERS CHURN BY USING MACHINE LEARNING ALGORITHMS
Published 2022-11-01“…Some of the most commonly used machine learning algorithms for this issue are Logistic Regression, Gaussian Naive Bayes, Bernoulli Naive Bayes, Decision Tree, and Random Forest. …”
Get full text
Article -
4350
Optimal service selection approach considering both atomic transaction and end-to-end QoS constraints
Published 2011-01-01“…An actual SCG(service candidate graph) model-based optimal service selection approach was proposed.Firstly,the approach created transactional constraint relationships among candidates as an actual SCG model with several build-ing rules,whose correctness had been also proved;Then,an optimal QoS-aware service selection algorithm on the basis of BFS(breadth first search) was designed,where a relaxing and pruming method was applied to keep the computation scale in polynomial time.Finally,simulation experiments were conducted with real-world QoS dataset and random data-set,whose results demonstrated the beneficial performance on global QoS utility and outstanding successful selecting ra-tio over other related work.Meanwhile,the correctnesss has also been proved in practice by implementing a transactional automation.…”
Get full text
Article -
4351
Properties of Matrix Variate Confluent Hypergeometric Function Distribution
Published 2016-01-01“…We also derive density functions of X2-1/2X1X2-1/2, (X1+X2)-1/2X1(X1+X2)-1/2, and X1+X2, where m×m independent random matrices X1 and X2 follow confluent hypergeometric function kind 1 and gamma distributions, respectively.…”
Get full text
Article -
4352
Waveform interpolation speech coding algorithm at 2.4kbit/s based on wavelet transform
Published 2007-01-01“…A waveform interpolation speech coding algorithm at 2.4kbit/s based on wavelet transform was proposed,in which characteristic waveform decomposition and reconstruction is processed using biorthogonal wavelet filters.At the encoder,the alignment operation was removed and the amplitude spectrum is decomposed without phase spectrum.Because of the wavelet compression,only the amplitude spectrum of last layer is transmitted.At the decoder,different scale space is reconstructed separately and random or fixed phase was combined to the spectrum based on voice degree at the last.Additionally,based on the time-variable feature of speech,voiced degree flag of each subframe was introduced to indicate the spectrum selection and quantization.Subjective R-A/B listening tests indicated that the synthesis speech quality of the 2.4kbit/s WT-CWI coding algorithm is better than that of standard 2.4kbit/s MELP coder and FS1016 4.8kbit/s CELP coder and is better than traditional 3.8kbit/s CWI coder.…”
Get full text
Article -
4353
Identification of sepsis-associated encephalopathy biomarkers through machine learning and bioinformatics approaches
Published 2024-12-01“…Weighted Gene Co-expression Network Analysis and four machine learning methods—Elastic Net regression, LASSO, random forest, and XGBoost—were employed, dentifying 18 biomarkers with significant expression changes. …”
Get full text
Article -
4354
A New Solution of Privacy-Preserving Public Auditing Scheme for Cloud Storage Security
Published 2012-09-01“…The new scheme is secure in the random oracle model and has less computation cost than existing auditing scheme with privacy property.…”
Get full text
Article -
4355
Two-way and anonymous heterogeneous signcryption scheme between PKI and IBC
Published 2017-10-01“…Exiting heterogeneous signcryption schemes which were between public key infrastructure (PKI) and identity-based cryptosystem (IBC) have some limitations.A new heterogeneous signcryption scheme between PKI and IBC was proposed.In the random oracle mode,the scheme ensured confidentiality and unforgeability on the basis of the assumption of computational Diffie-Hellman problem (CDHP),q-Diffie-Hellman inversion problem (q-DHIP) and bilinear Diffie-Hellman problem (BDHP).Simultaneously,the proposed scheme guaranteed unconnectedness and anonymity of the ciphertext.Compared with other heterogeneous schemes,the scheme achieved two-way signcryption,and it generated parameters without restrict,which was suitable for actual situations.Simulation tests show that proposed scheme is feasible.…”
Get full text
Article -
4356
Dynamic social network active influence maximization algorithm based on Coulomb force model
Published 2020-06-01“…The problem of maximizing influence has become an important research content in social networks,and its influence propagation model and solving algorithm are the key core issues.In order to improve the accuracy of predicting the propagation results,the dynamic change of the number of activated nodes and the trust relationship between the nodes during the propagation process were introduced to improve the IC model.Combining the similarity between social influence and Coulomb force,a dynamic based on trust relationship was proposed,a dynamic social coulomb forces based on trust relationships (DSC-TR) model was proposed,and an optimized random greedy (RG-DPIM) algorithm was constructed to solve the problem of maximum impact.Simulation results show that the prediction accuracy of the DSC-TR model is obviously better than that of SC-B and IC models.The performance of RG-DPIM algorithm is obviously better than that of G-DPIM,IPA and TDIA algorithms.…”
Get full text
Article -
4357
Research of Transmission Accuracy of Multistage Gear Drive System based on Error Coupling Compensation
Published 2019-01-01“…Then,the system transmission accuracies are both calculated by the Monte Carlo method when it is under the random assembly of the components and it is improved machining accuracy of some parts. …”
Get full text
Article -
4358
A Spectrum Sensing Method Based on Signal Feature and Clustering Algorithm in Cognitive Wireless Multimedia Sensor Networks
Published 2017-01-01“…In order to solve the problem of difficulty in determining the threshold in spectrum sensing technologies based on the random matrix theory, a spectrum sensing method based on clustering algorithm and signal feature is proposed for Cognitive Wireless Multimedia Sensor Networks. …”
Get full text
Article -
4359
Effect of Surface Morphology on Dynamic Characteristics of Cam-Follower Oblique Impact System
Published 2019-01-01“…The system response changes between quasiperiod and chaos affected by the contact line length with a normal random distribution.…”
Get full text
Article -
4360
Disorder-free Sachdev-Ye-Kitaev models: Integrability and a precursor of chaos
Published 2025-01-01“…Conversely, our analysis shows no evidence of random-matrix behavior in level spacing statistics or the spectral form factor. …”
Get full text
Article