Showing 4,621 - 4,640 results of 17,304 for search '"random"', query time: 0.11s Refine Results
  1. 4621

    Escape Path Obstacle-Based Mobility Model (EPOM) for Campus Delay-Tolerant Network by Sirajo Abdullahi Bakura, Alain Lambert, Thomas Nowak

    Published 2021-01-01
    “…Unlike the conventional random walk models, which use a free space environment, our model includes a collision-avoidance technique that generates an escape path upon encountering obstacles of different shapes and sizes that obstruct pedestrian movement. …”
    Get full text
    Article
  2. 4622

    Pilot spoofing detection algorithm for edge nodes based on heterogeneous pilot energy estimation by Shiguo WANG, Shujuan TIAN, Qingyong DENG

    Published 2023-11-01
    “…For the federated learning scenarios with edge-end cooperation, edge servers and device terminals update their models and exchange gradient parameters frequently, and hence eavesdroppers can manipulate channel estimation through pilot spoofing to intercept the transmitted information and reduce the update efficiency of federated learning model.Therefore, a pilot attack detection algorithm with heterogeneous pilot energy estimation was proposed.Firstly, a federated learning pilot attack system model was constructed after the security of pilot attacks on data transmission had been analyzed.Then, a pilot attack detection method based on random segmentation and encryption methods was proposed to detect the pilot spoofing accurately and the contaminated channel could be recovered as well.Experimental results show that the proposed algorithm is more suitable for detecting pilot attacks with low transmit power and strong concealment compared to other existing algorithms.Furthermore, the data transmission rate of edge servers is improved significantly through the precoding based on the recovered channel state information.…”
    Get full text
    Article
  3. 4623

    Accelerated unconstrained latent factorization of tensor model for Web service QoS estimation by Mingwei LIN, Wenqiang LI, Xiuqin XU, Jian LIU

    Published 2024-03-01
    “…Aiming at the problem that the Web service quality of service (QoS) estimation methods based on the non-negative latent factorization of tensor model (NLFT) depend heavily on non-negative initial random data and specially designed non-negative training schemes, which lead to low compatibility and scalability, an accelerated unconstrained latent factorization of tensor (AULFT) model was proposed.The proposed model consisted of three main parts.The non-negative constraints from decision parameters were transferred to output latent factors and they were connected through the single-element-dependent mapping function.A momentum-incorporated stochastic gradient descent (MSGD) algorithm was used to effectively improve the convergence rate and estimation accuracy of the proposed AULFT model.The detailed algorithm and result analysis of the proposed AULFT model were presented.The empirical study on two dynamic QoS datasets in real industrial applications demonstrates that the proposed AULFT model has higher computational efficiency and estimation accuracy than the state-of-the-art QoS estimation models.…”
    Get full text
    Article
  4. 4624

    Efficient Certificate-Based Signcryption Secure against Public Key Replacement Attacks and Insider Attacks by Yang Lu, Jiguo Li

    Published 2014-01-01
    “…We also propose a new certificate-based signcryption scheme that achieves security against both public key replacement attacks and insider attacks. We prove in the random oracle model that the proposed scheme is chosen-ciphertext secure and existentially unforgeable. …”
    Get full text
    Article
  5. 4625

    Energy-Optimal 3D Path Planning for MAV with Motion Uncertainty by Yamin Li, Bowen Sun, Ping Xia, Yang Yang

    Published 2021-01-01
    “…The core of proposed energy-optimal path planning algorithm is an energy consumption model deriving from real measurements of a specific quadrotor and utilizing a 2D Gaussian distribution function to simulate the uncertainty of random drift. Based on these two models, we formulate the optimal path traversing the 3D map with minimum energy consumption using a heuristic ant colony optimization. …”
    Get full text
    Article
  6. 4626

    Kepemimpinan kepala sekolah di era pandemi by Syahril Syahril, Sulastri Sulastri

    Published 2022-06-01
    “…Sampling was carried out using a stratified proportional random sampling technique. The size of the sample was obtained by 98 people. …”
    Get full text
    Article
  7. 4627

    Collision analysis of the GMR-2 cipher used in the satellite phone by Ruilin LI, Jiao HU, Chaojing TANG

    Published 2018-02-01
    “…A collision property analysis of the GMR-2 cipher used in the satellite phone was presented.By using the F-component as a bridge,the link between the difference of the key byte and the collision of the output ofFas well as the link between the collision of the output of F and the collision of keystream byte were analyzed,which finally revealed the relationship between the difference of the original key byte and the keystream collision.The theoretical analysis showed that for a random frame number,a special chosen key pair could lead to a keystream collision with a high probability,when the key pair has only one byte difference in which the most significant 4 bit of the difference was equal to the last significant 4 bit.The experimental result shows that the keystream collision probability is 2<sup>−8.248</sup>,which is far higher than the ideal collision probability 2<sup>−120</sup>.This proves once again,that there exists serious potential security hazards in the GMR-2 cipher.…”
    Get full text
    Article
  8. 4628

    Optimal Design of FPGA Switch Matrix with Ion Mobility Based Nonvolatile ReRAM by Peng Hai-yun, Zhou Wen-gang

    Published 2015-01-01
    “…There are high demands for research of new device with greater accessing speed and stability to replace the current SRAM storage cell. The resistive random access memory (ReRAM) is a metal oxide which is based on nonvolatile memory device possessing the characteristics of high read/write speed, high storage density, low power, low cost, very small cell, being nonvolatile, and unlimited writing endurance. …”
    Get full text
    Article
  9. 4629

    SCIENTIFIC LITERACY SKILL PESERTA DIDIK DENGAN MODEL PEMBELAJARAN FREE INQUIRY PADA MATERI KEANEKARAGAMAN HAYATI by Wulan Puja Santika, Suharsono Suharsono, Liah Badriah

    Published 2020-11-01
    “…The samples used were 2 classes taken by cluster random sampling, namely class X MIPA-5 as a control class and class X MIPA-6 as an experimental class. …”
    Get full text
    Article
  10. 4630

    The prevalence of atrophic gastritis of the body of stomach at Krasnoyarsk population over 45 years old by V. V. Tsukanov, O. V. Tret'yakova, O. S. Amelchugova, E. V. Kasparov, D. V. Rodina, A. V. Vasyutin, N. N. Butorin, Yu. L. Tonkikh

    Published 2012-07-01
    “…Original study was carried out with involvement of 387 men and 414 women over 45 years of age (n=801), selected as a random sample, and 29 relatives of stomach cancer patients.Results. …”
    Get full text
    Article
  11. 4631

    Public key searchable encryption scheme in blockchain-enabled multi-user environment by Dong ZHENG, Tianze ZHU, Rui GUO

    Published 2021-10-01
    “…In order to meet the needs of data security sharing in multi-user environment, a public key searchable encryption scheme supporting one-to-many mode was proposed.Specifically, the data owner could specify multiple users to retrieve the ciphertext by executing the encryption algorithm once, so as to achieve more flexible sharing of ciphertext data.In addition, the specific file encryption key transfer algorithm was designed to ensure that the user could decrypt and obtain the plaintext correctly after retrieving the ciphertext.Combined with the blockchain technology, the smart contract execution detection algorithm was used to ensure the correctness of the retrieval results.In terms of security, based on the decisional bilinear Diffie-Hellman hypothesis and the modified bilinear Diffie-Hellman hypothesis, it was proved that the proposed scheme satisfies the security requirements of keyword indistinguishability and trapdoor information indistinguishability under the random oracle model, and could resist the internal keyword guessing attack.Finally, the proposed scheme and the existing related schemes were simulated by using jPBC cryptolibrary, and the test results show that the proposed scheme has high computational efficiency.…”
    Get full text
    Article
  12. 4632

    On Improving Ratio/Product Estimator by Ratio/Product-cum-Mean-per-Unit Estimator Targeting More Efficient Use of Auxiliary Information by Angela Shirley, Ashok Sahai, Isaac Dialsingh

    Published 2014-01-01
    “…To achieve a more efficient use of auxiliary information we propose single-parameter ratio/product-cum-mean-per-unit estimators for a finite population mean in a simple random sample without replacement when the magnitude of the correlation coefficient is not very high (less than or equal to 0.7). …”
    Get full text
    Article
  13. 4633

    Social media user geolocalization based on multiple mention relationships by Yaqiong QIAO, Xiangyang LUO, Jiangtao MA, Chenliang LI, Meng ZHANG, Ruixiang LI

    Published 2020-12-01
    “…Aiming at the problem that the existing joint user geolocalization methods based on social media text and social relationships do not sufficiently mine the location correlation between heterogeneous data in social media, a social media user geolocalization method based on multiple mention relationships was proposed.First, a heterogeneous network was constructed by comprehensively considering the mention relationship between users, the user's mention relationship with location indicative words, and the user's mention relationship with geographic nouns.Then, a network simplification strategy was proposed to construct a user-location heterogeneous network that connects users live nearby more closely based on the common mention relationship.After that, a biased random walk algorithm was proposed for the graph node sampling to fully explore the network structure and alleviate the sparsity problem of known locations.Finally, a neural network classifier based on a multilayer perceptron was used to infer the user's location.Experimental results on three representative Twitter data sets of GEOTEXT, TW-US and TW-WORLD show that the proposed method can significantly improve the user geolocalization accuracy.…”
    Get full text
    Article
  14. 4634

    HUMAN RESOURCE ACCOUNTING AND FINANCIAL PERFORMANCE OF QUOTED DEPOSIT MONEY BANKS by CECILIA ADURAYEMI ADU, TEMITOPE VICTOR OLOMOLA

    Published 2024-09-01
    “…Secondary source of data was adopted for this study and ten quoted deposit money banks were selected through random sampling technique while the data were analyzed using regression analytical method. …”
    Get full text
    Article
  15. 4635

    Delay-Modulated RF Tag System Concept Using Ultrawideband Noise Radar Waveforms by Qihe Pan, Ram M. Narayanan

    Published 2011-11-01
    “…This paper explores the application of active RF tags in outdoor environments responding to random noise radar interrogations with predetermined messages. …”
    Get full text
    Article
  16. 4636

    Assessment of the Correlation between Appointment Scheduling and Patient Satisfaction in a Pediatric Dental Setup by Amar N. Katre

    Published 2014-01-01
    “…A total of 40 patients, who visited the Department of Pediatric and Preventive Dentistry, YMT Dental College & Hospital, for dental treatment were selected on a random basis. A questionnaire with a set of 6 questions with a rating scale of 1–5 to assess the patient satisfaction related to appointment scheduling was prepared. …”
    Get full text
    Article
  17. 4637

    RESEARCH ON TIME-DEPENDENT KINEMATIC RELIABILITY BASED ON TIME DOMAIN ERROR MODEL by WANG Shuai, GAO Peng, LIU Chang, CHEN YiTing

    Published 2020-01-01
    “…Based on the theory of maximum entropy and random process,the reliability model of time-domain error is established. …”
    Get full text
    Article
  18. 4638

    RELIABILITY ANALYSIS OF REACTION FORCE DEVELOPED IN THE LUBRICATED REVOLUTE JOINT FOR A SLIDER-CRANK SYSTEM INCLUDING JOINT WITH CLEARANCE AND LUBRICATION by ZHAO Kuan, XUE He, CHEN JianJun, QIAO XinZhou

    Published 2017-01-01
    “…Then approximate function relation between random parameters and performance function is derived and the reliability of the reaction force developed in the lubricated revolute joint of the crank-slider mechanism is discussed by Monte-Carlo method. …”
    Get full text
    Article
  19. 4639

    Dynamic adaptive discrete particle swarm optimization algorithm based method on low-power mapping in network-on-chip by Qin-rang LIU, Qi-hua DAI, Jian-liang SHEN, Bo ZHAO

    Published 2016-11-01
    “…Experimental results show that comparing with the random mapping, genetic algorithm (GA), PSOA and dynamic ant colony algorithm (DACA), DADPSOA can save the execution time, reduce the communication power consumption of mapping results. …”
    Get full text
    Article
  20. 4640

    Spatial point pattern analysis of urban retail stores: the case of twelve large- and medium-sized Greek cities by Michail-Christos TSOUTSOS, Yorgos N. PHOTIS

    Published 2020-12-01
    “…The results reveal that the retail stores’ distribution has a clustered and random spatial pattern at least in one city, where the high population density and the increase in rental prices of premises for professional activities constitute the factors that form these spatial patterns respectively. …”
    Get full text
    Article