Showing 4,541 - 4,560 results of 17,304 for search '"random"', query time: 0.09s Refine Results
  1. 4541

    Dynamic Obstacle Avoidance Path Planning of Dual-Manipulator based on APF-RRT by Peng Peng, Zhian Zhang, Xuegong Huang

    Published 2022-04-01
    “…Aiming at the defect that the traditional artificial potential field method(APF) is easy to fall into the local minimum in the obstacle avoidance path planning of the 6-DOF dual-manipulator system,an improved APF algorithm combined with an improved rapidly-exploring random trees(RRT) algorithm is proposed for obstacle avoidance path planning. …”
    Get full text
    Article
  2. 4542

    Study of Effective Components on Guidance plan Improvement base of Attitude of Rural Managers and Rural Council Members in Central district of Kermanshah County

    Published 2016-09-01
    “…Sampling method in rural managers was census method and rural council methods were random sampling method. Number of rural managers was 31 and number of rural council members was 103 respondents (in councils with 3 members we select 3 respondents and in rural councils with 5 members we select 3 respondents). …”
    Get full text
    Article
  3. 4543

    Anonymous security authentication scheme using elliptic curve cryptography and hash function in mobile network by Yuehui CHEN, Miao HUANG

    Published 2016-05-01
    “…In order to prevent personal data from being lacked and improve the existing mobile network roaming anonymous authentication scheme,anonymous security authentication scheme using elliptic curve cryptography and hash functions in mobile network was proposed.With elliptic curve cryptography and hash functions,random numbers were used to replace public key encryption and time stamp.Firstly,before using the roaming services of a foreign agent(FA),hash function was calculated.A host agent(HA)was used by mobile user to register.Then,authentication and session key were set up with elliptic curve encryption.If HA is always in FA,MU can update the session key with FA.Finally,through a common channel,MU could utilize HA to change their passwords.The analysis of the performance and safety shows that,compared with other similar programs,the proposed scheme has significantly improved efficiency and safety.And the virtual computing time is only 2.000 85 seconds,which sharply reduces the cost of computing.…”
    Get full text
    Article
  4. 4544

    Fuzzy Interpolation and Other Interpolation Methods Used in Robot Calibrations by Ying Bai, Nailong Guo, Gerald Agbegha

    Published 2012-01-01
    “…However, it is rare to build an optimal interpolation results based on some random noises, and this is one of the most popular topics in industrial testing and measurement applications. …”
    Get full text
    Article
  5. 4545

    Brain tumor detection across diverse MR images: An automated triple-module approach integrating reduced fused deep features and machine learning by Yugal Pande, Jyotismita Chaki

    Published 2025-03-01
    “…Finally, the third module utilizes a Random Forest classifier for tumor classification. …”
    Get full text
    Article
  6. 4546

    Improving job performance through strengthening the organizational culture and interpersonal communication by Widodo Sunaryo, Nancy Yusnita, Mustofa Mustofa

    Published 2020-10-01
    “…This study designed as a quantitative research used sample of 200 teachers derived by random sampling from its population, and used questionnaires as instruments to collect research data. …”
    Get full text
    Article
  7. 4547

    Smart resetting: An energy-efficient strategy for stochastic search processes by Ofir Tal-Friedman, Tommer D. Keidar, Shlomi Reuveni, Yael Roichman

    Published 2025-01-01
    “…Stochastic resetting, a method for accelerating target search in random processes, often incurs temporal and energetic costs. …”
    Get full text
    Article
  8. 4548

    A Data-Driven Approach to Estimate Incident-Induced Delays Using Incomplete Probe Vehicle Data: Application to Safety Service Patrol Program Evaluation by Minsoo Oh, Jing Dong-O’Brien

    Published 2023-01-01
    “…The proposed approach employs a random forest-based classification model and an interpolation method to estimate IIDs when real-time data are completely or partially missing during the incident-impacted time period. …”
    Get full text
    Article
  9. 4549

    Relasi Ibu-Anak dan Kematangan Emosi Remaja Yatim Duafa by Rizky Hasanah, Efi Fitriana, Marisa Fransiska Moeliono

    Published 2020-07-01
    “…The number of sample was 30 people who were selected by cluster random sampling. Multiple regression is used to test the research hypothesis. …”
    Get full text
    Article
  10. 4550

    KORELASI ANTARA EFEKTIFITAS KEGIATAN AMAL BAKTI SANTRI (ABAS) DENGAN EMPATI SISWA KELAS VIII PUTERI SMP MUHAMMADIYAH BOARDING SCHOOL YOGYAKARTA BOARDING SCHOOL by Risma Nur Amalina

    Published 2017-12-01
    “…This research is a field research that take 78 studens as random sample. The data is collected using questionnaire, interview dan observation method. …”
    Get full text
    Article
  11. 4551

    Performance analysis of covert wireless communication based on beam forming with noise uncertainty by Yuda LIN, Liang JIN, You ZHOU, Yangming LOU

    Published 2020-07-01
    “…In order to establish covert wireless communication in Rayleigh fading environment with noise uncertainty,a scheme of downlink covert wireless communication based on complex Gaussian random coding and beam forming was adopted,and more importantly,the performance of covert wireless communication was analysed.Firstly,the covert probability of communication was analyzed by using the hypothesis test theory.Secondly,the optimal detection threshold of the illegal detection party was given and proved,and the closed expressions of the average covert probability,connection interruption probability and covert throughput of the system were further obtained.Finally,by jointly designing the transmission power and target covert rate,the optimal goal of the maximum covert throughput of the system was achieved,and the corresponding algorithm based on step search was given.The simulation results show that the beam forming technology could provide some gain for covert wireless communication.Compared with the ideal case in which the legitimate receiver is not affected by the noise uncertainty,the covert throughput in non-ideal case is significantly reduced and almost not affected by the basic noise level of the environment.…”
    Get full text
    Article
  12. 4552

    Data-driven prediction of chemically relevant compositions in multi-component systems using tensor embeddings by Hiroyuki Hayashi, Isao Tanaka

    Published 2025-01-01
    “…Tucker decomposition was utilized to extract tensor embeddings, which were used to train a Random Forest classifier. The model successfully predicted the existence probabilities of pseudo-ternary and quaternary oxides, with 84% and 52% of ICSD-registered compositions, respectively, achieving high scores. …”
    Get full text
    Article
  13. 4553

    Influence maximization algorithm of social networks based on Transformer model by YU Shuke, YAO Yao, YAN Chenxue

    Published 2024-12-01
    “…Seconcly, the topology structure information and connection framework information of the candidate nodes were discovered by use of the random walk strategy. Finally, the Transformer model was improved, in order to support scalable node feature sequences, and the improved Transformer model was taken advantage to predict the seed nodes of the social network. …”
    Get full text
    Article
  14. 4554

    On the Bivariate Nakagami-Lognormal Distribution and Its Correlation Properties by Juan Reig, Lorenzo Rubio, Vicent M. Rodrigo-Peñarrocha

    Published 2014-01-01
    “…Also, two procedures to generate two correlated Nakagami-lognormal random variables are described. These procedures can be used to evaluate the robustness of the sample correlation coefficient distribution in both macro- and microdiversity scenarios. …”
    Get full text
    Article
  15. 4555

    Hybrid Metaheuristics for Solving a Fuzzy Single Batch-Processing Machine Scheduling Problem by S. Molla-Alizadeh-Zavardehi, R. Tavakkoli-Moghaddam, F. Hosseinzadeh Lotfi

    Published 2014-01-01
    “…Through computational experiments with several random test problems, a robust calibration is applied on the parameters. …”
    Get full text
    Article
  16. 4556

    Secure and efficient batch authentication scheme based on dynamic revocation mechanism in space information network by Yinghui ZHANG, Lingyun HU, Yixin LI, Jianting NING, Dong ZHENG

    Published 2022-04-01
    “…A secure and efficient batch authentication scheme based on dynamic revocation mechanism was proposed for the problem of cross-domain authentication of a large number of mobile users in space information networks.Early key negotiation was achieved by predicting the satellite trajectory and updating the session key in real time.Algorithms were designed for a single as well as a large number of mobile terminals to perform signing and verification, which effectively reduce the computational burden of satellites.Cuckoo filters were adopted by the new scheme to achieve dynamic revocation and malicious access control of mobile terminals.Finally, under the Diffie-Hellman assumption, the proposed scheme was proved to be resistant to replay and man-in-the-middle attacks based on a random oracle model and automated validation of internet security protocols and applications.Security goals such as traceability and revocability were achieved by the scheme, thus improving the efficiency of transmission and computation by more than 80% and 20%, respectively, compared with the existing optimal scheme.…”
    Get full text
    Article
  17. 4557

    Sparse-Coding-Based Computed Tomography Image Reconstruction by Sang Min Yoon, Gang-Joon Yoon

    Published 2013-01-01
    “…To overcome the drawbacks of iterative reconstruction approaches like the algebraic reconstruction technique (ART), while the recovery is slightly impacted from a random noise (small amount of ℓ2 norm error) and projection scans (small amount of ℓ1 norm error) as well, we propose a medical image reconstruction methodology using the properties of sparse coding. …”
    Get full text
    Article
  18. 4558

    Nonintrusive Method Based on Neural Networks for Video Quality of Experience Assessment by Diego José Luis Botia Valderrama, Natalia Gaviria Gómez

    Published 2016-01-01
    “…In this paper, a model based on artificial neural networks such as BPNNs (Backpropagation Neural Networks) and the RNNs (Random Neural Networks) is applied to evaluate the subjective quality metrics MOS (Mean Opinion Score) and the PSNR (Peak Signal Noise Ratio), SSIM (Structural Similarity Index Metric), VQM (Video Quality Metric), and QIBF (Quality Index Based Frame). …”
    Get full text
    Article
  19. 4559

    Analysis of the Dynamic Characteristic of Wind Turbine Planetary Gear System with Flexible Support by Jiang Gaige, Yin Yufeng, Si Shixiong, Gao Chongren

    Published 2016-01-01
    “…By taking the instance analysis of the mainstream 1. 5MW wind turbine,the displacement progress of each part of planetary gear system under 16 seconds random time series wind load is got. The result shows that,in the process of wind turbine operation tower generates excessive vibration,and the vibration of the tower exacerbates the vibration of the components of wind turbine planetary gear system. …”
    Get full text
    Article
  20. 4560

    Distributed Fault-Tolerant Event Region Detection of Wireless Sensor Networks by Dyi-Rong Duh, Ssu-Pei Li, Victor W. Cheng

    Published 2013-09-01
    “…FDA is greater than 92%, FAR is less than 1.2%, and EDA is greater than 88% under random distribution when sensor fault probability is less than 0.3.…”
    Get full text
    Article