Suggested Topics within your search.
Suggested Topics within your search.
- Rhetoric 5
- English language 4
- Grammar 4
- Attitude to Health 3
- Behavioral Medicine 2
- Handbooks, manuals, etc 2
- Health behavior 2
- Psychology 2
- Animals 1
- Brothers and sisters 1
- Business communication 1
- Business writing 1
- Care 1
- Case studies 1
- Child development 1
- Child rearing 1
- Communication in organizations 1
- Dialectical materialism 1
- Education 1
- Elias (Fictitious character) 1
- English 1
- Examinations, questions, etc 1
- Fantasy 1
- Fiction 1
- Fugitives from justice 1
- Habitat (Ecology) 1
- Health 1
- Infants 1
- Laia (Fictitious character) 1
- Mass media 1
-
4441
Prediction of Fluid Viscosity in Multiphase Reservoir Oil System by Machine Learning
Published 2021-01-01“…The prediction accuracy comparison results show that the random forest (RF) model performs accurately in predicting the viscosity of each phase of the reservoir, with the lowest error percentage and highest R2 values. …”
Get full text
Article -
4442
Compressed sensing reconstruction algorithm based on adaptive acceleration forward-backward pursuit
Published 2020-01-01“…Aiming at the long running time problem of the traditional forward-backward pursuit (FBP) algorithm,an adaptive acceleration forward-backward pursuit (AAFBP) algorithm was proposed.The reconstruction process of AAFBP algorithm can be divided into two stages.In the forward stage,the AAFBP algorithm used the adaptive threshold to select the right amount of atoms to join the support set.In the backward stage,based on the projection coefficient of the atoms,the deletion threshold was introduced to remove the atoms adaptively and the excessive backtracking phenomenon in adaptive process was overcome simultaneously.The proposed method can ensure the number of the selected atoms more random,and more right atoms were retained in each iteration.The simulation results of one-dimensional sparse signal and two-dimensional image show that the AAFBP algorithm has more advantages in both the accuracy of reconstruction and the running time.…”
Get full text
Article -
4443
Access and Handover Authentication in Intermittent Connection Scenario of Satellite Network
Published 2021-09-01“…This article disclosed an authentication method for access and handover in a low-orbit satellite network intermittent connection scenario.The scheme was based on a symmetrical cryptographic system.Based on hash function, XOR operation and timestamp, the safe access of the terminal to the satellite network was ensured.It reduced signaling overhead, bandwidth overhead, and computing overhead as well.In view of the link interruption, the solution was based on the current session key between the user and satellites to quickly and safely resume communication to ensured the quality of service.Through the orbit prediction technology, according to the current session key between the user and satellites and random number, the safe switching between satellites was realized, and the communication cost during the satellite switching process was reduced.The scheme realized the anonymity of user identity, and refreshed the temporary identity for the next authentication after successful authentication.…”
Get full text
Article -
4444
Prisoner's Dilemma on real social networks: Revisited
Published 2013-07-01“…Thistheoretical game is important in understanding why a seemingly selfish strategy does persist and spread throughout apopulation that is mixing homogeneously at random. For a population with structuredetermined by social interactions,Prisoner's Dilemma brings to light certain requirements for the altruistic strategy to become established.Monte Carlo simulations of Prisoner's Dilemma are carried out using both simulated social networks and a datasetof a real social network. …”
Get full text
Article -
4445
Differences in Rental and Nonrental Car Crashes
Published 2017-01-01“…This study develops a conceptual framework to compare the driver-related factors contributing to crashes involving rental cars and nonrental cars and tests the hypotheses developed using data from South Korea and applying the binary logistics, rare event logistics, Firth logistic models, and random parameters logit models. We found a significantly higher contribution of several risky driving behaviors but no differences in roadway, vehicle, and environmental factors. …”
Get full text
Article -
4446
Lightweight privacy protection data auditing scheme for regenerating-coding-based distributed storage
Published 2021-07-01“…To reduce the security implementation cost of the outsourcing data audit mechanism for the regenerating-coding-based distributed storage systems, an orthogonal algebraic coding method was put forward to construct a lightweight privacy-preserving audit scheme based on linear homomorphic authentication.The homomorphic authentication tags were generated with the orthogonalization between the file encoded data and the private secret key vector, and the privacy protection of the auditing response message was achieved by using the random masking that was constructed by randomizing the orthogonal basis vectors of the specific sub-vector of the user’s secret key.The work realized the effective integration of algebraic coding, privacy protection, and security auditing.Theoretical analysis shows that the proposed scheme can realize the information-theoretic security in the regenerating-coding-based storage applications.Compared with the existing works, the proposed scheme is of low computational complexity and communication overhead, and better performance advantages.…”
Get full text
Article -
4447
Research on Overconfidence in Decision-Making for the Capacity Recovery of Damaged Power Systems
Published 2014-01-01“…This research also indicates that the manager should pay close attention to the random disturbance whose distribution peak is left skewed, and correspondingly more capacity recovery should be given to improve the service level of power system during the disruption.…”
Get full text
Article -
4448
Nonstationary First Threshold Crossing Reliability for Linear System Excited by Modulated Gaussian Process
Published 2018-01-01“…A widely used approach for the first crossing reliability evaluation of structures subject to nonstationary Gaussian random input is represented by the direct extension to the nonstationary case of the solution based on the qualified envelope, originally proposed for stationary cases. …”
Get full text
Article -
4449
Asymptotic estimation for statistical models of continuous-time discrete martingales
Published 2024-12-01“…The research applies the optimum Fréchet differentiation of random and parametric functions based on the probability in normed spaces in terms of a continuous compensator. …”
Get full text
Article -
4450
Blockchain-based distributed EHR fine-grained traceability scheme
Published 2021-05-01“…Aiming at the key management of electronic health records (EHR) in a distributed system and user identity tracing issues, a distributed EHR fine-grained traceability scheme based on blockchain was proposed.Combining chameleon hash and zero-knowledge proof technology, the registration of nodes on the blockchain and the generation of identity certificates were realized, and the traceability of malicious users on the blockchain was realized.Besides, given the single point of failure problem of key management, the attribute-based encryption scheme of distributed ciphertext strategy was designed to achieve secure and fine-grained data access control, and multiple decryption agency blockchain nodes were set up to jointly distribute the attribute private keys of user nodes.The security analysis shows that the traceable distributed key generation attribute-based encryption algorithm based on the blockchain is adaptively secure under the random oracle model, and through experiments, the feasibility and practicability of the proposed scheme are shown.…”
Get full text
Article -
4451
The Optimal Noise Distribution for Privacy Preserving in Mobile Aggregation Applications
Published 2014-02-01“…., large-scale mobile survey), individual privacy is a crucial factor to determine the effectiveness, for which the noise-addition method (i.e., a random noise value is added to the true value) is a simple yet powerful approach. …”
Get full text
Article -
4452
Bimbingan Motivasi bagi Mahasiswa pada Pembelajaran Bulutangkis
Published 2017-06-01“…Jenis penelitian yang akan digunakan dalam penelitian ini adalah penelitian deskriptif dengan sampel sebanyak 50 orang mahasiswa jurusan Kepelatihan FIK UNP yang mengikuti perkuliahan bulutangkis pada semsester Januari-Juni 2017 yang dipilih dengan teknik proportional random sampling. Berdasarkan hasil penelitian maka dapat disimpulkan bahwa secara keseluruhan motivasi mahasiswa jurusan Kepelatihan FIK UNP mengikuti mata kuliah bulutangkis pada semester Januari-Juni tahun akademik 2017 pada umumnya sedang dan beberapa pada katagori sangat rendah, rendah, tinggi dan sangat tinggi. …”
Get full text
Article -
4453
FINANCIAL TECHNOLOGY INVESTMENTS AND THEIR IMPACT ON ECONOMIC GROWTH
Published 2024-12-01“…The error correction model ECM was used, and the results of the estimates showed that there is no causal relationship between the two variables in the short term; and after testing After valuation of transactions, it turned out that the error correction coefficient CointEq is negative and significant; this explains the existence of a long-term equilibrium relationship between the study variables, and from the test of the analysis of the statement, The shocks that reflect any change in the level of GDP variable by explaining the variance that the occurrence of any single structural shock in financial technology investments by 1% has a positive impact on GDP, and after analyzing the response functions to random shocks, it was found that the degree of response of both variables has been achieved since the first period.…”
Get full text
Article -
4454
Enhancing ecological uncertainty predictions in pollution control games through dynamic Bayesian updating
Published 2024-06-01“…Participants, acting as decision-makers, receive signals about an unknown parameter-observations of a random variable’s realization values before a specific time, offering insights into ecological uncertainties. …”
Get full text
Article -
4455
Two-Stage Adaptive Optimal Design with Fixed First-Stage Sample Size
Published 2012-01-01“…We show that the distribution of the maximum likelihood estimates converges to a scale mixture family of normal random variables. Then, for a one parameter exponential mean function we derive the asymptotic distribution of the maximum likelihood estimate explicitly and present a simulation to compare the characteristics of this asymptotic distribution with some commonly used alternatives.…”
Get full text
Article -
4456
New Scheme of Finite Difference Heterogeneous Multiscale Method to Solve Saturated Flow in Porous Media
Published 2014-01-01“…A new finite difference scheme, the development of the finite difference heterogeneous multiscale method (FDHMM), is constructed for simulating saturated water flow in random porous media. In the discretization framework of FDHMM, we follow some ideas from the multiscale finite element method and construct basic microscopic elliptic models. …”
Get full text
Article -
4457
The Impact of the Organizational Dimension in Behavioral Innovation and Strategic Innovation: An Analytical Study in Directorate of National Card Affairs
Published 2022-12-01“…The targeted research sample is represented in the Directorate of the National Card.The discretional analytic method was used by using the questionnaire instrument to collect the data from the research population numbered (615) employees. A random sample numbered (220) employees was chosen. …”
Get full text
Article -
4458
FATIGUE LIFE ANALYSIS OF THE FRAME OF A SEMI TRAILER SPECIAL VEHICLE (MT)
Published 2023-01-01“…In order to solve the problem that the reliability analysis of special semitrailer frame depends heavily on the sample vehicle, a calculation method of structural vibration fatigue estimation based on random load history in frequency domain is proposed. …”
Get full text
Article -
4459
Faster R-CNN and 3D reconstruction for handling tasks implementing a Scara robot
Published 2024-11-01“…The main contribution of this work focuses on the integration of a depth camera located on the robot and the computation of the gripping coordinates by identifying and locating three different types of objects of interest with random locations on the conveyor belt, through a Faster R-CNN. …”
Get full text
Article -
4460
Towards cooperation location privacy-preserving group nearest neighbor queries in LBS
Published 2015-03-01“…According to the motion status of a user group, two methods on the basis of this struc-ture, named location random perturbation and threshold secret sharing version of Paillier cryptosystem, were used to se-curely compute the center location of the user group. …”
Get full text
Article