Suggested Topics within your search.
Suggested Topics within your search.
- Rhetoric 5
- English language 4
- Grammar 4
- Attitude to Health 3
- Behavioral Medicine 2
- Handbooks, manuals, etc 2
- Health behavior 2
- Psychology 2
- Animals 1
- Brothers and sisters 1
- Business communication 1
- Business writing 1
- Care 1
- Case studies 1
- Child development 1
- Child rearing 1
- Communication in organizations 1
- Dialectical materialism 1
- Education 1
- Elias (Fictitious character) 1
- English 1
- Examinations, questions, etc 1
- Fantasy 1
- Fiction 1
- Fugitives from justice 1
- Habitat (Ecology) 1
- Health 1
- Infants 1
- Laia (Fictitious character) 1
- Mass media 1
-
4461
COVID-19 Infodemic in Malaysia: Conceptualizing Fake News for Detection
Published 2023-01-01“…Logistic regression, Naïve Bayes, decision trees, support vector machines, random forests, and gradient boosting are employed and compared to determine the most suitable predictive model. …”
Get full text
Article -
4462
CC-MRSJ:Cache Conscious Star Join Algorithm on Hadoop Platform
Published 2013-10-01“…A cache-conscious MapReduce star join algorithm was presented,each column of fact table was separately stored,and dimension table was divided into several column families according to dimension hierarchy.Fact table foreign key column and corresponding dimension table was co-location storage,thus reducing data movement in the join process.CC-MRSJ consists of two phases:firstly each foreign key column and the corresponding dimension table were joined; then the intermediate results were joined and random accessed measure columns,and so got the final result.CC-MRSJ read only the data needed,and cache utilization is high,so it has good cache conscious feature; it also takes advantage of late materialization,avoiding unnecessary data access and movement.CC-MRSJ has higher performance comparing to hive system based on SSB datasets.…”
Get full text
Article -
4463
A flexible continuous-wave quantum cryptography scheme with zero-trust security for Internet of Things
Published 2022-11-01“…Thus, it is capable of working as either a host or a client in quantum key distribution with remote servers, and efficiently generating quantum random numbers for quantum key distribution, as well as one time pad communication with deployed sensors. …”
Get full text
Article -
4464
Legendary sagas as historical sources
Published 2015-10-01“…This article argues that sagas should not be isolated from their manuscript context, and that manuscripts should be interpreted as totalities, not as random collections of sagas. Finally, legendary sagas deal with adventurous, allegedly “unhistorical”, events. …”
Get full text
Article -
4465
Simulation of transmission characteristics of oceanic wireless optical communication systems based on orbital angular momentum multiplexing with space-time coding
Published 2020-12-01“…In order to mitigate the crosstalk caused by oceanic turbulence in the underwater wireless orbital angular momentum multiplexing optical communication system, the application of space-time coding technology in the system was studied.Based on Rytov approximation, the covariance method and interpolation method were used to simulate correlated random phase screens and then the influence of time-varying oceanic turbulence channel on orbital angular momentum signal was studied.The transmission characteristics of orbital angular momentum multiplexing optical communication system with space-time coding was analyzed by simulation.The phase structure function of the time-varying phase screens and the detection probability distribution of the beam carrying the orbital angular momentum through the time-varying simulation channel were in line with theoretical expectations.The simulation results show that the space-time coding technology can effectively mitigate the influence of ocean turbulence on the system bit error rate.…”
Get full text
Article -
4466
Charged lepton-flavor violating constraints to non-unitarity in the Linear Seesaw scheme
Published 2025-02-01“…We analyze the non-unitary effects in the linear seesaw mechanism using the current constraints and future sensitivity of the charged Lepton Flavor Violation (cLFV) processes. We perform a random scan confronting the non-unitary parameters with the limits to the cLFV processes. …”
Get full text
Article -
4467
Data Aggregation Scbeme Based on Multi-Resolution and Compressive Sensing in Wireless Sensor Network
Published 2014-09-01“…When parent collecting clusters receive random measurements, they use inverse DCT and DCT model based CoSaMP algorithm to recover the original data. …”
Get full text
Article -
4468
STOCHASTIC BIFURCATION OF A CURRENT CARRYING THIN RECTANGULAR PLATE IN A MAGNETIC FIELD
Published 2016-01-01“…A nonlinear random vibration model of a current carrying thin rectangular plate simply supported at each edge was established when the plate was applied mechanical load in a magnetic field. …”
Get full text
Article -
4469
Massive unsourced multiple access scheme based on block sequence codebook and compressed sensing
Published 2023-12-01“…A massive unsourced multiple access scheme based on block sequence codebook and compressed sensing was proposed for sporadic burst scenario in massive machine type communication (mMTC).Firstly, a large-capacity spreading codebook generation scheme was designed according to a specific shift pattern, thus the codebook space was expanded.Secondly, the sparse structure of uplink signal was combined with multi-carrier technology to support overlapping transmission of multi-user data on some subcarriers, thus the spectral efficiency was improved.Finally, a multi-carrier CS-MUD model was established, and a group orthogonal matching pursuit algorithm based on codebook sequence blocks was designed to achieve the joint detection of active users and their uplink data.Simulation results show that the proposed scheme can effectively reduce the bit error rate of massive random access.…”
Get full text
Article -
4470
Certificate-based hybrid encryption scheme in the standard model
Published 2009-01-01“…For construction a public cryptosystem that requiring fewer infrastructures than public key infrastructure(PKI),a certificate-based public-key encryption(CBE) scheme was proposed by Gentry.In CBE scheme,a certification was signed by a third part on an applicant’s public key or identity and sent to the applicant,the applicant saved it and used it as partial private key(decryption key).A receiver wanted to decrypt a ciphertext,the certification was needed from the third party and his own public-private keys,so CBE combined the best aspects of identity-based encryption(implicit cer-tification) and public key encryption(no escrow).A new efficient certificate-based hybrid encryption scheme with short public key was proposed,which based on Gentry’s identity-based encryption scheme,the new scheme can be proved re-sistance adaptive chosen ciphertext attack in the standard model(without random oracle).…”
Get full text
Article -
4471
Mobility model detection method based on birth and death model in DTN environment
Published 2015-01-01“…A mobility model detection method based on birth and death model (MMD-BDM) in DTN environment was proposed.It first computed the connected channel capacity of sampling times according to the data traffic during the data transfer process,and then constructed the time varying intercommunication metrics at local,which composed of channel capacity between local node and others.Based on these,the connection birth and death mode of nodes based on connected edges was deduced,and then the birth and death features of the connected nodes was analyzed to detect the mobility model,which used to improve the routing strategy during the packages deliver process.Ultimately,the mobility model detection method was put into use in spray and wait routing (SWR) method and random network coding routing (RNCR) method to experiment,the simulation results show that,it can improve the opportunity routing performance of the data deliver rate and transfer latency in DTN environment.…”
Get full text
Article -
4472
Switching current distributions in superconducting nanostrips
Published 2025-01-01“…Due to thermal and/or quantum fluctuations the switching current will be random and follow a certain distribution depending on sweep rate, temperature, material properties, wire length, and width. …”
Get full text
Article -
4473
New Multiple Access Technologies for Satellite Internet of Things System
Published 2023-09-01“…For satellite internet of things (IoT) scenarios with high propagation delay and the need to serve a larger number of users, firstly the shortcomings of IoT NTN in terms of technical solutions were analyzed, and then a new type of multi access solution called uncoordinated random access and NOMA transmission (URAT) was proposed.…”
Get full text
Article -
4474
Models of initiation fatigue crack paths proposed by Macha
Published 2015-09-01“…Macha devoted his academic life to solving the problems connected with random multiaxial fatigue in components of machines and structures. …”
Get full text
Article -
4475
Neutral-Current Neutrino-Nucleus Scattering off Xe Isotopes
Published 2018-01-01“…The nuclear-structure calculations are made in the nuclear shell model for elastic scattering and also in the quasiparticle random-phase approximation (QRPA) and microscopic quasiparticle-phonon model (MQPM) for both elastic and inelastic scattering. …”
Get full text
Article -
4476
Influence of Trust, Time Pressure and Complexity Factors in Judgment and Decision-Making in Auditing
Published 2021-01-01“…The final sample was composed of 126 independent auditors, distributed in eight random groups. The results indicated that a higher level of confidence increases the auditor’s propensity to perform the accounting adjustment and that time pressure and complexity decrease the auditor’s propensity to perform the proposed adjustment. …”
Get full text
Article -
4477
Statistical ineffective fault analysis of the lightweight authenticated cipher algorithm Saturnin-Short
Published 2023-04-01“…On the random single byte-oriented fault model and the assumption of ciphertext-only attack, a statistical ineffective fault analysis of the Saturnin-Short cipher was proposed.The analysis combined the statistical distribution with the ineffective analysis, and discussed the difference between intermediate states before and after fault injections.A variety of dual distinguishers was designed, such as the probabilistic symmetric Chi-square-maximum likelihood estimate, and harmonic mean-Hamming weight.It only required at least 1 097 ineffective faults to recover the 256 bit secret key with a success rate of at least 99%.The experimental results show that the proposed distinguishers can not only decrease fault injections, but also reduce the attacking time and complexities.Therefore, the Saturnin-Short cipher cannot resist against the statistical ineffective fault analysis.It provides an important reference for the security analysis of other lightweight authenticated ciphers.…”
Get full text
Article -
4478
Impossible statistical fault analysis of the PRIDE lightweight cryptosystem
Published 2024-01-01“…To analyze the implementation security of the PRIDE lightweight cryptosystem proposed at CRYPTO in 2014, a novel method of impossible statistical fault analysis on the ciphertext-only attack assumption was proposed.Furthermore, new distinguishers were designed, such as the Chi-square goodness-of-fit test-Hamming weight, and Chi-square goodness-of-fit test-maximum likelihood estimation.The proposed method had a random nibble-oriented fault model, and combined the statistical distribution states with the impossible relationship.On the difference among the intermediate states before and after the fault injections, at least 432 faults were required to recover the 128 bit secret key of PRIDE with a reliability of at least 99%.The experimental analysis demonstrates that the proposed method can not only reduce injected faults and latency, but also increase the accuracy.The results provide a vital reference for exploring the implementation security of lightweight cryptosystems.…”
Get full text
Article -
4479
Measures of concordance determined by D4-invariant copulas
Published 2004-01-01“…A continuous random vector (X,Y) uniquely determines a copula C:[0,1]2→[0,1] such that when the distribution functions of X and Y are properly composed into C, the joint distribution function of (X,Y) results. …”
Get full text
Article -
4480
Structure, Distribution, and Spatial Patterns of Epiphytic Orchids (Orchidaceae) at Coastal Forest of the Sempu Island Nature Reserve, Malang, East Java
Published 2019-05-01“…Spatial pattern of distribution based on three parameter indices, and chi-square test showed that every species showed a random pattern.…”
Get full text
Article