Showing 4,881 - 4,900 results of 17,304 for search '"random"', query time: 0.09s Refine Results
  1. 4881

    Simulation Research of Space-Time Evolution of Emergency Logistics Network Reliability Based on Complex Network Theory by Li Huang, Wei Wang, Minggong Wang

    Published 2013-01-01
    “…Finally, we take three classical emergency logistics networks as examples, and through emulation analysis we obtain the connecting reliability changing situation of these three networks under random attack, the changing curve of the ratio of effective demand nodes and emergence supply mileage of emergency logistics network with same network density but different forms, and then evaluate the emergency logistics network connecting reliability. …”
    Get full text
    Article
  2. 4882

    Otsu Based Optimal Multilevel Image Thresholding Using Firefly Algorithm by N. Sri Madhava Raja, V. Rajinikanth, K. Latha

    Published 2014-01-01
    “…The performances of the proposed algorithm are demonstrated by considering twelve benchmark images and are compared with the existing FA algorithms such as Lévy flight (LF) guided FA and random operator guided FA. The performance assessment comparison between the proposed and existing firefly algorithms is carried using prevailing parameters such as objective function, standard deviation, peak-to-signal ratio (PSNR), structural similarity (SSIM) index, and search time of CPU. …”
    Get full text
    Article
  3. 4883

    Shuffled differential privacy protection method for K-Modes clustering data collection and publication by Weijin JIANG, Yilin CHEN, Yuqing HAN, Yuting WU, Wei ZHOU, Haijuan WANG

    Published 2024-01-01
    “…Aiming at the current problem of insufficient security in clustering data collection and publication, in order to protect user privacy and improve data quality in clustering data, a privacy protection method for K-Modes clustering data collection and publication was proposed without trusted third parties based on the shuffled differential privacy model.K-Modes clustering data collection algorithm was used to sample the user data and add noise, and then the initial order of the sampled data was disturbed by filling in the value domain random arrangement publishing algorithm.The malicious attacker couldn’t identify the target user according to the relationship between the user and the data, and then to reduce the interference of noise as much as possible a new centroid was calculated by cyclic iteration to complete the clustering.Finally, the privacy, feasibility and complexity of the above three methods were analyzed from the theoretical level, and the accuracy and entropy of the three real data sets were compared with the authoritative similar algorithms KM, DPLM and LDPKM in recent years to verify the effectiveness of the proposed model.The experimental results show that the privacy protection and data quality of the proposed method are superior to the current similar algorithms.…”
    Get full text
    Article
  4. 4884

    Discussion: Comments on the Article Titled as “Bitlis Air Pollution Emission Inventory and Estimation of Health Effects by Multiple Linear Regression” (Journal of Natural Hazards a... by Edip Avşar

    Published 2019-07-01
    “…In this case, the correlation value was completely random. In this discussion, the findings of the discussed article were evaluated so that the readers benefiting from discussed article can see these mistakes.…”
    Get full text
    Article
  5. 4885

    Research on distributed time synchronization methods for LEO communication constellations based on maximum likelihood estimation by YAN Bing, ZHAO Yafei, FANG Yiming, PENG Mugen, LIN Guangrong

    Published 2024-06-01
    “…This method effectively solves the problem of unpredictable random communication delays and asymmetric inter-satellite distances in distributed dynamic networks. …”
    Get full text
    Article
  6. 4886

    Faktor-Faktor Yang Mempengaruhi Kepuasan Kerja Perawat Di Rumah Sakit Padang by Dewi Murni, Sidaria Sidaria, Annisa Annisa, Maharani Maharani

    Published 2022-03-01
    “…The sampling technique used is proportional stratified random sampling, which meets the sample criteria. …”
    Get full text
    Article
  7. 4887

    Determination of relationship of body weight and some body measurements by nonlinear models in hair goats in karaman region by Mehmet Emin Tekin, Ayşenur Tuğlu, Mustafa Agah Tekindal

    “…Body measurement of 130 goats, 2-7 years old and 50 billy goats, 2-4 years old, selected by simple random sampling method for total 900. The main motivation of the study was to determine the relationship between body weight and some body measurements with nonlinear models in hair goats in Karaman region.…”
    Get full text
    Article
  8. 4888

    Survey of evolutionary kernel fuzzing by Yan SHI, Weizhong QIANG, Deqing ZOU, Hai JIN

    Published 2024-02-01
    “…Fuzzing is a technique that was used to detect potential vulnerabilities and errors in software or systems by generating random, abnormal, or invalid test cases.When applying fuzzing to the kernel, more complex and challenging obstacles were encountered compared to user-space applications.The kernel, being a highly intricate software system, consists of numerous interconnected modules, subsystems, and device drivers, which presented challenges such as a massive codebase, complex interfaces, and runtime uncertainty.Traditional fuzzing methods could only generate inputs that simply satisfied interface specifications and explicit call dependencies, making it difficult to thoroughly explore the kernel.In contrast, evolutionary kernel fuzzing employed heuristic evolutionary strategies to dynamically adjust the generation and selection of test cases, guided by feedback mechanisms.This iterative process aimed to generate higher-quality test cases.Existing work on evolutionary kernel fuzzing was examined.The concept of evolutionary kernel fuzzing was explained, and its general framework was summarized.The existing work on evolutionary kernel fuzzing was classified and compared based on the type of feedback mechanism utilized.The principles of how feedback mechanisms guided evolution were analyzed from the perspectives of collecting, analyzing, and utilizing runtime information.Additionally, the development direction of evolutionary kernel fuzzing was discussed.…”
    Get full text
    Article
  9. 4889

    A Closest Resemblance Classifier with Feature Interval Learning and Outranking Measures for Improved Performance by Nabil Belacel

    Published 2024-12-01
    “…We evaluate our classifiers on multiple UCI repository datasets and compare them with established methods, including k-Nearest Neighbors (k-NN), Support Vector Machine (SVM), Random Forest (RF), Neural Networks (NNs), Naive Bayes (NB), and Nearest Centroid (NC). …”
    Get full text
    Article
  10. 4890

    Super group peer selection algorithm in hybrid layered P2P streaming system based on evolutionary game by Jing CHEN, Bing ZHOU, Chen-shan REN, Xiao-she DONG

    Published 2013-12-01
    “…Due to high efficiency and good scalability,hybrid layered P2P architecture receives more and more impor-tance in P2P research and P2P streaming application fields recently.The blems about super peers selection are highly challenging because super peers must be selected from huge and dynamically changing network.A distributed super group peer(SGP) selection algorithm based on evolutionary game is proposed in this paper,in hich the SGP selection procedure is modeled based on evolutionary game framework firstly and its evolutionarily Moreover,a distributed Q-Learning algorithm (ESS-SGP) according to the mixed strategies by analysis is proposed for the peers to converge to the ESSs based on their own payoff history.Compared to the traditional random selected SGP P2P schemes,experiments results show that the proposed ESS-SGP algorithm achieves much better performance in terms of social welfare,average upload rate of SGPs,and keeps the upload capacity of the P2P streaming system increasing steadily with the number of peers increasing.…”
    Get full text
    Article
  11. 4891

    Principals' intellectual stimulation and teachers’ job satisfaction in public secondary schools by Olaolu Paul Akinnubi, Moses Adeleke Adeoye

    Published 2024-12-01
    “…A descriptive research design was used for the study. A random sampling technique was used to select 352 teachers from 30 public secondary schools in nine local government areas in Oyo State, Nigeria. …”
    Get full text
    Article
  12. 4892

    The Role of Academic Hardiness in Moderating the Effect of Task Aversiveness on Academic Procrastination by Tahrir Tahrir, Fathimah N. Arifah, Tasya Augustiya, Endin Nasrudin

    Published 2024-12-01
    “…This research aimed to examine the role of academic hardiness as a moderator in the effect of task aversiveness on academic procrastination using quantitative causal and proportional stratified random sampling methods. The sample consisted of 260 psychology students from Sunan Gunung Djati State Islamic University (UIN), Bandung. …”
    Get full text
    Article
  13. 4893

    Comparing Statistical and Machine Learning Methods for Time Series Forecasting in Data-Driven Logistics—A Simulation Study by Lena Schmid, Moritz Roidl, Alice Kirchheim, Markus Pauly

    Published 2024-12-01
    “…Our simulation results showed that the machine learning methods, especially Random Forests, performed particularly well in complex scenarios, with the differentiated time series training significantly improving the robustness of the model. …”
    Get full text
    Article
  14. 4894

    STRAIGHTMORPH: A Voice Morphing Tool for Research in Voice Communication Sciences [version 2; peer review: 2 approved, 1 approved with reservations] by P Belin, H Kawahara

    Published 2025-01-01
    “…The second step consists in parametrically combining the mObjects to generate novel synthetic stimuli, such as gender, identity or emotion continua, or random combinations. STRAIGHTMORPH constitutes a simple but efficient and versatile tool to generate high quality, parametrically controlled continua between voices – and beyond.…”
    Get full text
    Article
  15. 4895

    Hierarchical Node Replication Attacks Detection in Wireless Sensor Networks by Wassim Znaidi, Marine Minier, Stéphane Ubéda

    Published 2013-04-01
    “…We also perform extensive simulations of our algorithm for random topologies, and we compare those results with other proposals of the literature. …”
    Get full text
    Article
  16. 4896

    Verifiably secure fast group authentication protocol with anonymous traceability for Internet of vehicles by Haibo ZHANG, Hongwu HUANG, Kaijian LIU, Xiaofan HE

    Published 2021-06-01
    “…Identity authentication is the first line of defense for vehicles to access IoV (Internet of vehicles).However, the existing schemes cannot meet the requirements of efficient authentication of IoV well, nor can they realize fast anonymous traceability.In view of this, a bidirectional anonymous traceability group authentication protocol was proposed in IoV.In this protocol, a number of RSU (road side unit) were grouped quickly and dynamically.And the vehicles entering the RSU group were authenticated with the one-way trap gating property and semi-group property of Chebyshev chaotic map.When the vehicle switched between the RSU within a group, the reverse hash chain was used for fast handover authentication.In addition, the RSU within a group can trace anonymously and revoke the identity of malicious vehicles quickly by using blockchain, and can also freely change the ID of users who reveal their real identity.At the same time, the semantic security of the proposed protocol is proved by using the random predictor model.Finally, simulation results show the proposed scheme has good security and effectiveness.…”
    Get full text
    Article
  17. 4897

    Cooperation-based location authentication scheme for crowdsensing applications by Youliang TIAN, Maoqing TIAN, Hongfeng GAO, Miao HE, Jinbo XIONG

    Published 2022-09-01
    “…Utilizing mobile devices to collect location-related data in crowdsensing has the security problem of a location cheating attack.How to guarantee the quality of these sensitive data has become a challenge.In response to this, a location authentication scheme was proposed based on cooperation to detect malicious users who submit false locations.Firstly, users with mobile devices were used to generate location proofs for each other, and a location verification scheme was designed based on distance bounding protocols for obtaining new information by multiple collisions of the same random number, which ensured the user’s location should be unforgeable and achieved the purpose of improving the quality of collected data.In addition, a location proof cooperator select method based on region division and reputation model was proposed which effectively prevented collusion attack and solved the problem of concentration of equity.Meanwhile, the incentive mechanism based on reputation value and task completion time was designed to effectively improve the location proof cooperator efficiency of task completion.Finally, security analysis and performance evaluation indicate that the scheme has proved to be correctness and secure, and the advantages in computational cost and communication overhead.…”
    Get full text
    Article
  18. 4898

    THE EFFECT OF ACCOMMODATION ENTERPRISES WORKERS' PERCEPTION OF SERVANT LEADERSHIP ON ORGANIZATIONAL IDENTIFICATION: THE CASE OF KONYA by Neriman Çelik

    Published 2018-12-01
    “…In this context, an empirical study has beenconducted with 379 occupations in the accommodation enterprises in Konya witheasy sampling method from non-random sampling methods. The collected data wereanalyzed using SPSS Amos 21™ software. …”
    Get full text
    Article
  19. 4899

    A Framework of State Estimation on Laminar Grinding Based on the CT Image–Force Model by Jihao Liu, Guoyan Zheng, Weixin Yan

    Published 2025-01-01
    “…Finally, to overcome influences of some factors, we used the random sample consensus (RANSAC). The code of the functional simulations has be opened.…”
    Get full text
    Article
  20. 4900

    Peningkatan Efikasi Diri Matematika melalui Metode Belajar Mind Map by Gita Aulia Nurani, Asmadi Alsa

    Published 2021-07-01
    “…The research subjects were collected using a non-random purposive sampling technique with 22 students who had moderate to low self-efficacy scores. …”
    Get full text
    Article