Suggested Topics within your search.
Suggested Topics within your search.
- Rhetoric 5
- English language 4
- Grammar 4
- Attitude to Health 3
- Behavioral Medicine 2
- Handbooks, manuals, etc 2
- Health behavior 2
- Psychology 2
- Animals 1
- Brothers and sisters 1
- Business communication 1
- Business writing 1
- Care 1
- Case studies 1
- Child development 1
- Child rearing 1
- Communication in organizations 1
- Dialectical materialism 1
- Education 1
- Elias (Fictitious character) 1
- English 1
- Examinations, questions, etc 1
- Fantasy 1
- Fiction 1
- Fugitives from justice 1
- Habitat (Ecology) 1
- Health 1
- Infants 1
- Laia (Fictitious character) 1
- Mass media 1
-
4601
THE APPROXIMATE SOLVING METHOD OF THE CABLES NONLINEAR CONTROL SYSTEMS
Published 2017-01-01“…The results show that the vibration reduction effect of the proposed linearization methods is 5% lower than that of the nonlinear methods,and can also achieve good damping effect,and the mitigating effect of the two linearization methods are basically the same under the free vibration and random excitation.…”
Get full text
Article -
4602
Strategies to Improve Career Planning for Middle School Students
Published 2021-07-01“…There are students who after graduation choose schools at random, based on the choice of their parents or with friends. …”
Get full text
Article -
4603
Investigation of traffic adaptation based interference alignment for cognitive radio networks
Published 2014-04-01“…To effec-tively construct the beam-forming and interference suppression matrix for IA, then not only derive an adaptive closed-form algorithm, but its average degrees of freedom (d.o.f) were also analyzed with random traffic load model and a lower bound is given as well. …”
Get full text
Article -
4604
Aspirations professionnelles de jeunes bacheliers au Cameroun : l’influence de la pratique de l’orientation scolaire revisitée
Published 2016-10-01“…Data collected from 181 students in Upper Sixth classes of Government Bilingual High School Bafoussam through a random sampling method and analysed by regression ordinal logistic stands out that consulting with a guidance counselor does not influence in a significant way the types of professional aspirations entertained by students. …”
Get full text
Article -
4605
CCA-secure verifiable Mix-Net protocol
Published 2015-10-01“…A CCA-secure verifiable Mix-Net protocol with provable security was proposed.The protocol was based on Wikström’s Mix-Net and improves its security by introducing an improved key generation algorithm and a new method for constructing proof of secret shuffling.Without revealing the correspondence between inputs and outputs,proposed protocol enables everyone to verify the correctness of output plaintexts through checking evidences broadcasted by each server.Thus,it satisfies public verifiability.Any sender can trace and examine the processing procedure of its ciphertext.Thus,proposed protocol satisfies sender verifiability.It is prored to be CCA-secure under the assumption of random oracle.Compared with previous mix-net schemes which are CCA-secure,proposed protocol does not require any trusted center,and incurs fewer interactions between servers which also resulting in a lower computation and communication complexity.Hence,the protocol is an ideal cryptographic tool for constructing secure electronic election protocol.…”
Get full text
Article -
4606
WSN key recovery attack based on symmetric matrix decomposition
Published 2018-10-01“…The key protocol is one of the crucial technologies to ensure the security for wireless sensor network(WSN).Parakh,et al.proposed a key agreement for WSN based on matrix decomposition.However,the study revealed that the protocol had security risks.A key recovery attack scheme against this protocol was proposed by using the properties of symmetric matrix and permutation matrix.Based on intercepting the row and column vector of the node,elementary transformation was performed to construct a linear algebraic attack algorithm and the equivalent key was obtained.The computational complexity is O(N<sup>6</sup>).Experimental results show that the method can recover the equivalent key of the above protocol within the polynomial computational complexity and the memory consumption is within an acceptable range.In addition,an improved scheme for key agreement was proposed to resist the linear algebraic attack by using a random disturbance matrix,and the correctness and security analysis were also carried out.…”
Get full text
Article -
4607
Security analysis of weighted network anonymity based on singular value decomposition
Published 2018-05-01“…The security of anonymous method based on singular value decomposition (SVD) in the privacy preserving of weighted social network was analyzed.The reconstruction method in network with integer weights and the inexact reconstruction method in network with arbitrary weighted were proposed.The <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML"> <mfrac> <mi>ε</mi> <mi>N</mi> </mfrac> </math></inline-formula> -tolerance was definited to measure its safety.It was also pointed out that the upper bound of ε (the reconfigurable coefficient) obtained in current spectral theories was so conservative that lacks of guidance.The reconfigurable coefficients of random networks,Barabasi-Albert networks,small world networks and real networks were calculated by experiment.Moreover,the reconfigurable coefficients of double perturbation strategies based on SVD were also tested.Experimental results show that weighted social networks have different tolerances on spectrum loss,and there is a close relationship between its tolerance and network parameters.…”
Get full text
Article -
4608
Blending physics with data using an efficient Gaussian process regression with soft inequality and monotonicity constraints
Published 2025-01-01“…This GP model is trained by the quantum-inspired Hamiltonian Monte Carlo (QHMC) algorithm, which is an efficient way to sample from a broad class of distributions by allowing a particle to have a random mass matrix with a probability distribution. …”
Get full text
Article -
4609
Fault Diagnosis of Rolling Bearings based on SVD-LMD Joint De-noising and TEO
Published 2021-06-01“…Aiming at the difficulty extracting the local damage information of rolling bearings under the background of random noise,a new feature extraction method based on singular value decomposition(SVD) and local mean decomposition(LMD) joint de-noising combined with Teager energy operator(TEO) is proposed. …”
Get full text
Article -
4610
The Effect of Direct Learning Model with Routine Practice on Self-Efficacy and Student Learning Outcomes
Published 2022-04-01“…The research sample was selected by purposive random sampling. The instrument used is a questionnaire, because it is an effective data collection method to test the variables to be measured and the answers expected by the respondents. …”
Get full text
Article -
4611
Study on Interactive Damping of Primary-Secondary Coupled System
Published 2019-01-01“…According to the concept and calculation methods of random vibration, the displacement, velocity, and acceleration variances of each model were derived as response functions of the coupled system. …”
Get full text
Article -
4612
Fatigue Life Prediction of Half-Shaft Using the Strain-Life Method
Published 2020-01-01“…Based on Wang and Brown’s framework, multiaxial random fatigue damage was adopted to predict the fatigue life of half-shaft. …”
Get full text
Article -
4613
Od humanizmu ekologicznego i ekofilozofii do ekoteologii. Krytyka koncepcji duchowości ekologicznej H. Skolimowskiego
Published 2011-12-01“…The concept of God, spirituality, and the random treatment of other religions presented by Skolimowski are unacceptable. …”
Get full text
Article -
4614
Knowledge about Diabetes and Glycemic Control among Diabetic Patients in Saudi Arabia
Published 2020-01-01“…A total of 435 patients were recruited using a random sampling technique, while following a cross-sectional design. …”
Get full text
Article -
4615
Attack detection model based on stacking ensemble learning for Internet of vehicles
Published 2024-12-01“…Due to openness of wireless communication, Internet of vehicles (IoV) is vulnerable to many cyber-attacks such as denial of service, spoofing and fuzzy attacks. Therefore, random forest (RF) and gradient boosting decision tree-based stacking intrusion detection (RF-IDS) model was proposed. …”
Get full text
Article -
4616
An Energy-Efficient Transmission Protocol for RNC-Based Cooperative WSNs with Partial Energy Harvesting Nodes
Published 2015-10-01“…A new EH decoding-recoding policy is proposed by regarding the EH constraints and the characteristics of random network coding. We develop an energy efficiency model to investigate the tradeoff mechanism between the saved energy and the waiting time of the EH node, through which the corresponding parameters in the policy are also optimized. …”
Get full text
Article -
4617
MECHANICAL STRUCTURAL RELIABILITY ANALYSIS BASED ON POLYNOMIAL CHAOS EXPANSIONS
Published 2022-01-01“…Aiming at the problems of various failure modes and low efficiency of reliability evaluation for complex mechanical structures, the reliability analysis method based on polynomial chaos expansions is applied to the reliability analysis of mechanical structures by combining Monte Carlo random sampling and polynomial chaos expansions. In addition, considering the correlation of parameters and various failure modes in the limit state function, the reliability evaluation method of mechanical structure considering failure correlation is given. …”
Get full text
Article -
4618
Probabilistic analysis of getting into in restricted area by unmanned aerial vehical
Published 2019-12-01“…The problem is solved by applying the theory of Markov processes of random structure with absorption of realizations at the boundary of a given area. …”
Get full text
Article -
4619
Self Disclosure Santri Remaja di Media Sosial: Peran Self Identity Status dan Affiliation Motive
Published 2021-07-01“…This study uses a quantitative correlational method with a total of 140 students was obtained through random sampling techniques. Data collection tools using self identity status scale, affiliation motive scale and self disclosure scale. …”
Get full text
Article -
4620
Morphometric relations of fractal-skeletal based channel network model
Published 1998-01-01“…Four regular sided initiator-basins are transformed as second order fractal basins by following a specific generating mechanism with non-random rule. The morphological skeletons, hereafter referred to as channel networks, are extracted from these fractal basins. …”
Get full text
Article