Suggested Topics within your search.
Suggested Topics within your search.
- Rhetoric 5
- English language 4
- Grammar 4
- Attitude to Health 3
- Behavioral Medicine 2
- Handbooks, manuals, etc 2
- Health behavior 2
- Psychology 2
- Animals 1
- Brothers and sisters 1
- Business communication 1
- Business writing 1
- Care 1
- Case studies 1
- Child development 1
- Child rearing 1
- Communication in organizations 1
- Dialectical materialism 1
- Education 1
- Elias (Fictitious character) 1
- English 1
- Examinations, questions, etc 1
- Fantasy 1
- Fiction 1
- Fugitives from justice 1
- Habitat (Ecology) 1
- Health 1
- Infants 1
- Laia (Fictitious character) 1
- Mass media 1
-
4541
Dynamic Obstacle Avoidance Path Planning of Dual-Manipulator based on APF-RRT
Published 2022-04-01“…Aiming at the defect that the traditional artificial potential field method(APF) is easy to fall into the local minimum in the obstacle avoidance path planning of the 6-DOF dual-manipulator system,an improved APF algorithm combined with an improved rapidly-exploring random trees(RRT) algorithm is proposed for obstacle avoidance path planning. …”
Get full text
Article -
4542
Study of Effective Components on Guidance plan Improvement base of Attitude of Rural Managers and Rural Council Members in Central district of Kermanshah County
Published 2016-09-01“…Sampling method in rural managers was census method and rural council methods were random sampling method. Number of rural managers was 31 and number of rural council members was 103 respondents (in councils with 3 members we select 3 respondents and in rural councils with 5 members we select 3 respondents). …”
Get full text
Article -
4543
Anonymous security authentication scheme using elliptic curve cryptography and hash function in mobile network
Published 2016-05-01“…In order to prevent personal data from being lacked and improve the existing mobile network roaming anonymous authentication scheme,anonymous security authentication scheme using elliptic curve cryptography and hash functions in mobile network was proposed.With elliptic curve cryptography and hash functions,random numbers were used to replace public key encryption and time stamp.Firstly,before using the roaming services of a foreign agent(FA),hash function was calculated.A host agent(HA)was used by mobile user to register.Then,authentication and session key were set up with elliptic curve encryption.If HA is always in FA,MU can update the session key with FA.Finally,through a common channel,MU could utilize HA to change their passwords.The analysis of the performance and safety shows that,compared with other similar programs,the proposed scheme has significantly improved efficiency and safety.And the virtual computing time is only 2.000 85 seconds,which sharply reduces the cost of computing.…”
Get full text
Article -
4544
Fuzzy Interpolation and Other Interpolation Methods Used in Robot Calibrations
Published 2012-01-01“…However, it is rare to build an optimal interpolation results based on some random noises, and this is one of the most popular topics in industrial testing and measurement applications. …”
Get full text
Article -
4545
Brain tumor detection across diverse MR images: An automated triple-module approach integrating reduced fused deep features and machine learning
Published 2025-03-01“…Finally, the third module utilizes a Random Forest classifier for tumor classification. …”
Get full text
Article -
4546
Improving job performance through strengthening the organizational culture and interpersonal communication
Published 2020-10-01“…This study designed as a quantitative research used sample of 200 teachers derived by random sampling from its population, and used questionnaires as instruments to collect research data. …”
Get full text
Article -
4547
Smart resetting: An energy-efficient strategy for stochastic search processes
Published 2025-01-01“…Stochastic resetting, a method for accelerating target search in random processes, often incurs temporal and energetic costs. …”
Get full text
Article -
4548
A Data-Driven Approach to Estimate Incident-Induced Delays Using Incomplete Probe Vehicle Data: Application to Safety Service Patrol Program Evaluation
Published 2023-01-01“…The proposed approach employs a random forest-based classification model and an interpolation method to estimate IIDs when real-time data are completely or partially missing during the incident-impacted time period. …”
Get full text
Article -
4549
Relasi Ibu-Anak dan Kematangan Emosi Remaja Yatim Duafa
Published 2020-07-01“…The number of sample was 30 people who were selected by cluster random sampling. Multiple regression is used to test the research hypothesis. …”
Get full text
Article -
4550
KORELASI ANTARA EFEKTIFITAS KEGIATAN AMAL BAKTI SANTRI (ABAS) DENGAN EMPATI SISWA KELAS VIII PUTERI SMP MUHAMMADIYAH BOARDING SCHOOL YOGYAKARTA BOARDING SCHOOL
Published 2017-12-01“…This research is a field research that take 78 studens as random sample. The data is collected using questionnaire, interview dan observation method. …”
Get full text
Article -
4551
Performance analysis of covert wireless communication based on beam forming with noise uncertainty
Published 2020-07-01“…In order to establish covert wireless communication in Rayleigh fading environment with noise uncertainty,a scheme of downlink covert wireless communication based on complex Gaussian random coding and beam forming was adopted,and more importantly,the performance of covert wireless communication was analysed.Firstly,the covert probability of communication was analyzed by using the hypothesis test theory.Secondly,the optimal detection threshold of the illegal detection party was given and proved,and the closed expressions of the average covert probability,connection interruption probability and covert throughput of the system were further obtained.Finally,by jointly designing the transmission power and target covert rate,the optimal goal of the maximum covert throughput of the system was achieved,and the corresponding algorithm based on step search was given.The simulation results show that the beam forming technology could provide some gain for covert wireless communication.Compared with the ideal case in which the legitimate receiver is not affected by the noise uncertainty,the covert throughput in non-ideal case is significantly reduced and almost not affected by the basic noise level of the environment.…”
Get full text
Article -
4552
Data-driven prediction of chemically relevant compositions in multi-component systems using tensor embeddings
Published 2025-01-01“…Tucker decomposition was utilized to extract tensor embeddings, which were used to train a Random Forest classifier. The model successfully predicted the existence probabilities of pseudo-ternary and quaternary oxides, with 84% and 52% of ICSD-registered compositions, respectively, achieving high scores. …”
Get full text
Article -
4553
Influence maximization algorithm of social networks based on Transformer model
Published 2024-12-01“…Seconcly, the topology structure information and connection framework information of the candidate nodes were discovered by use of the random walk strategy. Finally, the Transformer model was improved, in order to support scalable node feature sequences, and the improved Transformer model was taken advantage to predict the seed nodes of the social network. …”
Get full text
Article -
4554
On the Bivariate Nakagami-Lognormal Distribution and Its Correlation Properties
Published 2014-01-01“…Also, two procedures to generate two correlated Nakagami-lognormal random variables are described. These procedures can be used to evaluate the robustness of the sample correlation coefficient distribution in both macro- and microdiversity scenarios. …”
Get full text
Article -
4555
Hybrid Metaheuristics for Solving a Fuzzy Single Batch-Processing Machine Scheduling Problem
Published 2014-01-01“…Through computational experiments with several random test problems, a robust calibration is applied on the parameters. …”
Get full text
Article -
4556
Secure and efficient batch authentication scheme based on dynamic revocation mechanism in space information network
Published 2022-04-01“…A secure and efficient batch authentication scheme based on dynamic revocation mechanism was proposed for the problem of cross-domain authentication of a large number of mobile users in space information networks.Early key negotiation was achieved by predicting the satellite trajectory and updating the session key in real time.Algorithms were designed for a single as well as a large number of mobile terminals to perform signing and verification, which effectively reduce the computational burden of satellites.Cuckoo filters were adopted by the new scheme to achieve dynamic revocation and malicious access control of mobile terminals.Finally, under the Diffie-Hellman assumption, the proposed scheme was proved to be resistant to replay and man-in-the-middle attacks based on a random oracle model and automated validation of internet security protocols and applications.Security goals such as traceability and revocability were achieved by the scheme, thus improving the efficiency of transmission and computation by more than 80% and 20%, respectively, compared with the existing optimal scheme.…”
Get full text
Article -
4557
Sparse-Coding-Based Computed Tomography Image Reconstruction
Published 2013-01-01“…To overcome the drawbacks of iterative reconstruction approaches like the algebraic reconstruction technique (ART), while the recovery is slightly impacted from a random noise (small amount of ℓ2 norm error) and projection scans (small amount of ℓ1 norm error) as well, we propose a medical image reconstruction methodology using the properties of sparse coding. …”
Get full text
Article -
4558
Nonintrusive Method Based on Neural Networks for Video Quality of Experience Assessment
Published 2016-01-01“…In this paper, a model based on artificial neural networks such as BPNNs (Backpropagation Neural Networks) and the RNNs (Random Neural Networks) is applied to evaluate the subjective quality metrics MOS (Mean Opinion Score) and the PSNR (Peak Signal Noise Ratio), SSIM (Structural Similarity Index Metric), VQM (Video Quality Metric), and QIBF (Quality Index Based Frame). …”
Get full text
Article -
4559
Analysis of the Dynamic Characteristic of Wind Turbine Planetary Gear System with Flexible Support
Published 2016-01-01“…By taking the instance analysis of the mainstream 1. 5MW wind turbine,the displacement progress of each part of planetary gear system under 16 seconds random time series wind load is got. The result shows that,in the process of wind turbine operation tower generates excessive vibration,and the vibration of the tower exacerbates the vibration of the components of wind turbine planetary gear system. …”
Get full text
Article -
4560
Distributed Fault-Tolerant Event Region Detection of Wireless Sensor Networks
Published 2013-09-01“…FDA is greater than 92%, FAR is less than 1.2%, and EDA is greater than 88% under random distribution when sensor fault probability is less than 0.3.…”
Get full text
Article