Suggested Topics within your search.
Suggested Topics within your search.
- Rhetoric 5
- English language 4
- Grammar 4
- Attitude to Health 3
- Behavioral Medicine 2
- Handbooks, manuals, etc 2
- Health behavior 2
- Psychology 2
- Animals 1
- Brothers and sisters 1
- Business communication 1
- Business writing 1
- Care 1
- Case studies 1
- Child development 1
- Child rearing 1
- Communication in organizations 1
- Dialectical materialism 1
- Education 1
- Elias (Fictitious character) 1
- English 1
- Examinations, questions, etc 1
- Fantasy 1
- Fiction 1
- Fugitives from justice 1
- Habitat (Ecology) 1
- Health 1
- Infants 1
- Laia (Fictitious character) 1
- Mass media 1
-
4621
Escape Path Obstacle-Based Mobility Model (EPOM) for Campus Delay-Tolerant Network
Published 2021-01-01“…Unlike the conventional random walk models, which use a free space environment, our model includes a collision-avoidance technique that generates an escape path upon encountering obstacles of different shapes and sizes that obstruct pedestrian movement. …”
Get full text
Article -
4622
Pilot spoofing detection algorithm for edge nodes based on heterogeneous pilot energy estimation
Published 2023-11-01“…For the federated learning scenarios with edge-end cooperation, edge servers and device terminals update their models and exchange gradient parameters frequently, and hence eavesdroppers can manipulate channel estimation through pilot spoofing to intercept the transmitted information and reduce the update efficiency of federated learning model.Therefore, a pilot attack detection algorithm with heterogeneous pilot energy estimation was proposed.Firstly, a federated learning pilot attack system model was constructed after the security of pilot attacks on data transmission had been analyzed.Then, a pilot attack detection method based on random segmentation and encryption methods was proposed to detect the pilot spoofing accurately and the contaminated channel could be recovered as well.Experimental results show that the proposed algorithm is more suitable for detecting pilot attacks with low transmit power and strong concealment compared to other existing algorithms.Furthermore, the data transmission rate of edge servers is improved significantly through the precoding based on the recovered channel state information.…”
Get full text
Article -
4623
Accelerated unconstrained latent factorization of tensor model for Web service QoS estimation
Published 2024-03-01“…Aiming at the problem that the Web service quality of service (QoS) estimation methods based on the non-negative latent factorization of tensor model (NLFT) depend heavily on non-negative initial random data and specially designed non-negative training schemes, which lead to low compatibility and scalability, an accelerated unconstrained latent factorization of tensor (AULFT) model was proposed.The proposed model consisted of three main parts.The non-negative constraints from decision parameters were transferred to output latent factors and they were connected through the single-element-dependent mapping function.A momentum-incorporated stochastic gradient descent (MSGD) algorithm was used to effectively improve the convergence rate and estimation accuracy of the proposed AULFT model.The detailed algorithm and result analysis of the proposed AULFT model were presented.The empirical study on two dynamic QoS datasets in real industrial applications demonstrates that the proposed AULFT model has higher computational efficiency and estimation accuracy than the state-of-the-art QoS estimation models.…”
Get full text
Article -
4624
Efficient Certificate-Based Signcryption Secure against Public Key Replacement Attacks and Insider Attacks
Published 2014-01-01“…We also propose a new certificate-based signcryption scheme that achieves security against both public key replacement attacks and insider attacks. We prove in the random oracle model that the proposed scheme is chosen-ciphertext secure and existentially unforgeable. …”
Get full text
Article -
4625
Energy-Optimal 3D Path Planning for MAV with Motion Uncertainty
Published 2021-01-01“…The core of proposed energy-optimal path planning algorithm is an energy consumption model deriving from real measurements of a specific quadrotor and utilizing a 2D Gaussian distribution function to simulate the uncertainty of random drift. Based on these two models, we formulate the optimal path traversing the 3D map with minimum energy consumption using a heuristic ant colony optimization. …”
Get full text
Article -
4626
Kepemimpinan kepala sekolah di era pandemi
Published 2022-06-01“…Sampling was carried out using a stratified proportional random sampling technique. The size of the sample was obtained by 98 people. …”
Get full text
Article -
4627
Collision analysis of the GMR-2 cipher used in the satellite phone
Published 2018-02-01“…A collision property analysis of the GMR-2 cipher used in the satellite phone was presented.By using the F-component as a bridge,the link between the difference of the key byte and the collision of the output ofFas well as the link between the collision of the output of F and the collision of keystream byte were analyzed,which finally revealed the relationship between the difference of the original key byte and the keystream collision.The theoretical analysis showed that for a random frame number,a special chosen key pair could lead to a keystream collision with a high probability,when the key pair has only one byte difference in which the most significant 4 bit of the difference was equal to the last significant 4 bit.The experimental result shows that the keystream collision probability is 2<sup>−8.248</sup>,which is far higher than the ideal collision probability 2<sup>−120</sup>.This proves once again,that there exists serious potential security hazards in the GMR-2 cipher.…”
Get full text
Article -
4628
Optimal Design of FPGA Switch Matrix with Ion Mobility Based Nonvolatile ReRAM
Published 2015-01-01“…There are high demands for research of new device with greater accessing speed and stability to replace the current SRAM storage cell. The resistive random access memory (ReRAM) is a metal oxide which is based on nonvolatile memory device possessing the characteristics of high read/write speed, high storage density, low power, low cost, very small cell, being nonvolatile, and unlimited writing endurance. …”
Get full text
Article -
4629
SCIENTIFIC LITERACY SKILL PESERTA DIDIK DENGAN MODEL PEMBELAJARAN FREE INQUIRY PADA MATERI KEANEKARAGAMAN HAYATI
Published 2020-11-01“…The samples used were 2 classes taken by cluster random sampling, namely class X MIPA-5 as a control class and class X MIPA-6 as an experimental class. …”
Get full text
Article -
4630
The prevalence of atrophic gastritis of the body of stomach at Krasnoyarsk population over 45 years old
Published 2012-07-01“…Original study was carried out with involvement of 387 men and 414 women over 45 years of age (n=801), selected as a random sample, and 29 relatives of stomach cancer patients.Results. …”
Get full text
Article -
4631
Public key searchable encryption scheme in blockchain-enabled multi-user environment
Published 2021-10-01“…In order to meet the needs of data security sharing in multi-user environment, a public key searchable encryption scheme supporting one-to-many mode was proposed.Specifically, the data owner could specify multiple users to retrieve the ciphertext by executing the encryption algorithm once, so as to achieve more flexible sharing of ciphertext data.In addition, the specific file encryption key transfer algorithm was designed to ensure that the user could decrypt and obtain the plaintext correctly after retrieving the ciphertext.Combined with the blockchain technology, the smart contract execution detection algorithm was used to ensure the correctness of the retrieval results.In terms of security, based on the decisional bilinear Diffie-Hellman hypothesis and the modified bilinear Diffie-Hellman hypothesis, it was proved that the proposed scheme satisfies the security requirements of keyword indistinguishability and trapdoor information indistinguishability under the random oracle model, and could resist the internal keyword guessing attack.Finally, the proposed scheme and the existing related schemes were simulated by using jPBC cryptolibrary, and the test results show that the proposed scheme has high computational efficiency.…”
Get full text
Article -
4632
On Improving Ratio/Product Estimator by Ratio/Product-cum-Mean-per-Unit Estimator Targeting More Efficient Use of Auxiliary Information
Published 2014-01-01“…To achieve a more efficient use of auxiliary information we propose single-parameter ratio/product-cum-mean-per-unit estimators for a finite population mean in a simple random sample without replacement when the magnitude of the correlation coefficient is not very high (less than or equal to 0.7). …”
Get full text
Article -
4633
Social media user geolocalization based on multiple mention relationships
Published 2020-12-01“…Aiming at the problem that the existing joint user geolocalization methods based on social media text and social relationships do not sufficiently mine the location correlation between heterogeneous data in social media, a social media user geolocalization method based on multiple mention relationships was proposed.First, a heterogeneous network was constructed by comprehensively considering the mention relationship between users, the user's mention relationship with location indicative words, and the user's mention relationship with geographic nouns.Then, a network simplification strategy was proposed to construct a user-location heterogeneous network that connects users live nearby more closely based on the common mention relationship.After that, a biased random walk algorithm was proposed for the graph node sampling to fully explore the network structure and alleviate the sparsity problem of known locations.Finally, a neural network classifier based on a multilayer perceptron was used to infer the user's location.Experimental results on three representative Twitter data sets of GEOTEXT, TW-US and TW-WORLD show that the proposed method can significantly improve the user geolocalization accuracy.…”
Get full text
Article -
4634
HUMAN RESOURCE ACCOUNTING AND FINANCIAL PERFORMANCE OF QUOTED DEPOSIT MONEY BANKS
Published 2024-09-01“…Secondary source of data was adopted for this study and ten quoted deposit money banks were selected through random sampling technique while the data were analyzed using regression analytical method. …”
Get full text
Article -
4635
Delay-Modulated RF Tag System Concept Using Ultrawideband Noise Radar Waveforms
Published 2011-11-01“…This paper explores the application of active RF tags in outdoor environments responding to random noise radar interrogations with predetermined messages. …”
Get full text
Article -
4636
Assessment of the Correlation between Appointment Scheduling and Patient Satisfaction in a Pediatric Dental Setup
Published 2014-01-01“…A total of 40 patients, who visited the Department of Pediatric and Preventive Dentistry, YMT Dental College & Hospital, for dental treatment were selected on a random basis. A questionnaire with a set of 6 questions with a rating scale of 1–5 to assess the patient satisfaction related to appointment scheduling was prepared. …”
Get full text
Article -
4637
RESEARCH ON TIME-DEPENDENT KINEMATIC RELIABILITY BASED ON TIME DOMAIN ERROR MODEL
Published 2020-01-01“…Based on the theory of maximum entropy and random process,the reliability model of time-domain error is established. …”
Get full text
Article -
4638
RELIABILITY ANALYSIS OF REACTION FORCE DEVELOPED IN THE LUBRICATED REVOLUTE JOINT FOR A SLIDER-CRANK SYSTEM INCLUDING JOINT WITH CLEARANCE AND LUBRICATION
Published 2017-01-01“…Then approximate function relation between random parameters and performance function is derived and the reliability of the reaction force developed in the lubricated revolute joint of the crank-slider mechanism is discussed by Monte-Carlo method. …”
Get full text
Article -
4639
Dynamic adaptive discrete particle swarm optimization algorithm based method on low-power mapping in network-on-chip
Published 2016-11-01“…Experimental results show that comparing with the random mapping, genetic algorithm (GA), PSOA and dynamic ant colony algorithm (DACA), DADPSOA can save the execution time, reduce the communication power consumption of mapping results. …”
Get full text
Article -
4640
Spatial point pattern analysis of urban retail stores: the case of twelve large- and medium-sized Greek cities
Published 2020-12-01“…The results reveal that the retail stores’ distribution has a clustered and random spatial pattern at least in one city, where the high population density and the increase in rental prices of premises for professional activities constitute the factors that form these spatial patterns respectively. …”
Get full text
Article