Showing 4,901 - 4,920 results of 17,304 for search '"random"', query time: 0.11s Refine Results
  1. 4901

    Hybrid ML Algorithm for Fault Classification in Transmission Lines Using Multi-Target Ensemble Classifier with Limited Data by Abdallah El Ghaly

    Published 2025-01-01
    “…The proposed algorithm achieved an impressive overall accuracy of 0.829165, outperforming traditional methods, including the K-Nearest Neighbors Classifier, support vector classification, random forest classifier, decision tree classifier, AdaBoost classifier, gradient boosting classifier, and Gaussian NB. …”
    Get full text
    Article
  2. 4902

    Evaluation of Bus Networks in China: From Topology and Transfer Perspectives by Hui Zhang, Peng Zhao, Yinhai Wang, Xiangming Yao, Chengxiang Zhuge

    Published 2015-01-01
    “…The adding method includes four types among nodes with random choice, large transfer time, degree, and small degree. …”
    Get full text
    Article
  3. 4903

    The effect of education costs and location on the decision of parents to enroll children in an integrated islamic elementary school through a reference group in tangerang and jakar... by Rahayu Lestari

    Published 2024-03-01
    “…Sampling was based on a purposive sampling method of 100 respondents in Tangerang and South Jakarta using proportional random sampling in Tangerang and South Jakarta. The analytical method used is statistical-partial least square using SEM Lisrel 8.70 analysis software tools. …”
    Get full text
    Article
  4. 4904

    High order DPA with profiling by Zhen WU, Yi WANG, Guanhao ZHOU

    Published 2018-09-01
    “…In side channel attack,the masking implementation is one of the most popular counter measures again first order DPA.Presently,high order DPA and high order template attack are often used to attack against masking counter measures.High order DPA,however,targets joint leakage of multiple types of information and therefore needs cross combination of powers at corresponding positions,which is the root of the inefficiency of high order DPA.High order template attack,on the other hand,has to know the random mask in each encrypting at its learning phase,which is rarely satisfied for most adversaries.Be aware of these shortcomings and limitations,the algorithm of high order DPA with profiling used neural network to establish the model of fitting the combination of un-masked intermediate values.Attacking was based on the correlation coefficient between the fitted combination intermediate value and the guessing combination intermediate value.This method eliminated the requirement of knowing the masks at the learning phase of template attack and the requirement of cross combination of powers for high order DPA,and therefore lowered the requirement of learning as well as improved attacking efficiency.Experiments have confirmed the feasibility of this algorithm,as well as its efficiency.…”
    Get full text
    Article
  5. 4905

    The Profit Distribution of Supply Chain under E-Commerce by Jiang-Hua Zhang, Rui-Rui Yin, Jin Zhang, Meng-Jiao Nie

    Published 2014-01-01
    “…The profit function of supply chain under e-commerce is formulated by taking the price of product and the maximum supply amount under certain investment as decision-making variables and taking the expected value of random variables of price as the setting sales quantity. …”
    Get full text
    Article
  6. 4906

    STUDY ON CONTACT DAMAGE OF WIND POWER GEARS BASED ON CONFIGURATIONAL FORCE THEORY by YE Nan, ZHANG YanHui, WANG Rong, LIU Ran, ZHANG ChuanFen, OUYANG Heng, DUAN ShuYong

    Published 2024-01-01
    “…The gear box of wind turbine is in the complex environment such as random wind load for a long time, and the gear contact fatigue becomes a key factor limiting the stability and reliability of wind turbine equipment. …”
    Get full text
    Article
  7. 4907

    Classification of Gastrointestinal Diseases Using Hybrid Recurrent Vision Transformers With Wavelet Transform by Biniyam Mulugeta Abuhayi, Yohannes Agegnehu Bezabh, Aleka Melese Ayalew, Miraf Alemayehu Lakew

    Published 2024-01-01
    “…The classification phase employs an ensemble of four classifiers: support vector machines, Bayesian network, random forest, and logistic regression. The system was trained and tested on the Hyper–Kvasir dataset, the largest publicly available GI tract image dataset, achieving an accuracy of 99.13% and an area under the curve of 0.9954. …”
    Get full text
    Article
  8. 4908

    Cooperative Search and Rescue with Artificial Fishes Based on Fish-Swarm Algorithm for Underwater Wireless Sensor Networks by Wei Zhao, Zhenmin Tang, Yuwang Yang, Lei Wang, Shaohua Lan

    Published 2014-01-01
    “…Simulation results include two schemes: preset route and random walks, and it is showed that the control scheme has adaptive and effective properties.…”
    Get full text
    Article
  9. 4909

    Design and optimization for wireless-powered IRS-aided mobile edge computing system by Dong TANG, Xuwei HUANG, Zhiwei LUO, Sai ZHAO, Gaofei HUANG

    Published 2023-09-01
    “…A new design of intelligent reflecting surface (IRS)-aided mobile edge computing (MEC) system was studied, which consisted of a hybrid access point (HAP) connected with an MEC server, an IRS equipped with radio-frequency (RF) energy harvesting (EH) circuits, and a user side with random task arrival.To reduce energy consumption at the user, a novel protocol was proposed first, in which the system was enabled to select a proper operation mode among an EH mode, an IRS-aided task offloading mode, and an IRS-inactive task offloading mode.Then, based on the proposed protocol, an optimization problem was formulated, which aimed at minimizing the amount of consumed energy at the user by optimizing the selection of system operation mode and the resource allocation in each mode.Lyapunov optimization framework was employed to solve the problem to achieve a low-complexity and efficient optimization algorithm.Simulation results show that the proposed scheme can save 50% to 90% of energy consumption for the MEC system as compared with the existing baseline schemes.…”
    Get full text
    Article
  10. 4910

    Training of Executive Functions in Children: A meta-analysis of cognitive training interventions by Efsun Birtwistle, Olga Chernikova, Miriam Wünsch, Frank Niklas

    Published 2025-01-01
    “…The results ( N = 57) of a random-effects-model showed that cognitive training was effective with a total effect size of g = 23 The training was more effective for younger compared to older children. …”
    Get full text
    Article
  11. 4911

    Blind mask template attacks on masked cryptographic algorithm by Yi WANG, Zhen WU, Bing LIN

    Published 2019-01-01
    “…Masking is a countermeasure against differential power analysis (DPA) attacks on cryptographic devices by using random masks to randomize the leaked power of sensitive information.Template attacks (TA) against cryptographic devices with masking countermeasure by far require attackers have knowledge of masks at the profiling phase.This requirement not only increase the prerequisite of template attacking,but also lead to some sort of difference between the experimental encryption codes of the profiling device and the codes of commercial cryptographic devices,which might degrade performance in real world attacking.Blind mask template attack directly learns templates for the combination of no mask intermediate values without the need of knowing the masks of training power traces,and then uses these templates to attack masked cryptographic devices.Both traditional Gaussian distribution and neural network were adopted as the templates in experiments.Experimental results verified the feasibility of this new approach.The success rate of neural network based blind mask template attacking against masked cryptographic devices is very close to that of traditional template attacks against cryptographic devices without masking countermeasure.…”
    Get full text
    Article
  12. 4912

    Efektivitas pendekatan konseling rational emotif behavioral dengan teknik reframing untuk meningkatkan kecerdasan emosional siswa sekolah menengah pertama by Wayan Winda Yani, Ni Ketut Suarni, I Ketut Dharsana

    Published 2023-08-01
    “…The method used in this study is experimental. Sampling using random sampling technique. Collecting data using emotional intelligence questionnaire. …”
    Get full text
    Article
  13. 4913

    The estimation of correlation between milk and reproductive traits in holstein by canonical correlation analysis by İsmet Doğan

    “…The process ot maximizing the correlation between two linear function ot two sets of random variables is known as Canonical Correlation Analysis, Canonical Correlation Analysis is a statistical method which has been used to describe the re latıonshıp between a set o! …”
    Get full text
    Article
  14. 4914

    Advancements in Machine Learning and Deep Learning Techniques for Crop Yield Prediction: A Comprehensive Review by V. Ramesh and P. Kumaresan

    Published 2024-12-01
    “…To accomplish this, we have surveyed the optimization algorithms implemented in conjunction with the Random Forest and Cat Boost models. A survey made across multiple databases to determine the effectiveness of crop yield prediction and analysis was performed on the included articles. …”
    Get full text
    Article
  15. 4915

    Academic progress monitoring through neural network by Ramri Shukla, Bardia Khalilian, Sara Partouvi

    Published 2021-03-01
    “…Students are classified using artificial neural networks and random forests in this article. A private higher education provider provided a dataset of 2000 students. …”
    Get full text
    Article
  16. 4916

    ADOPTION LEVEL OF GREEN PRACTICES AND ITS EFFECT ON EMPLOYEE’ PERFORMANCE by Ali Erbaşı, Gökhan Akandere

    Published 2020-12-01
    “…The sample of the study is 2,000 employees using simple random sampling method for in the company in 39 province. …”
    Get full text
    Article
  17. 4917

    A Dynamic Task Scheduling Algorithm for Airborne Device Clouds by Bao Deng, Zhengjun Zhai

    Published 2024-01-01
    “…The task scheduling model based on genetic algorithm and random scheduling algorithm is compared through comparison experiments, which show that the assignment time of the task scheduling model based on genetic algorithm is shortened by 11.82% to 48.51% and the energy consumption is reduced by 22.28% to 47.52% under different load conditions.…”
    Get full text
    Article
  18. 4918

    Foundation of Voronezh State University by M. D. Karpachev

    Published 2018-10-01
    “…This  relocation was not a random event since Voronezh was an administrative,  economic and cultural centre of Black Earth Region of Russia. …”
    Get full text
    Article
  19. 4919

    Achieving employee engagement through effective internal communication by Senelisiwe Mbhele, Estelle de Beer

    Published 2022-06-01
    “…To illustrate how employee engagement can be achieved through internal communication, a quantitative research approach was used to obtain data from a sample of 300 respondents identified by means of systematic random sampling from a population of 1 322 employees from the case organisation. …”
    Get full text
    Article
  20. 4920

    Cloning a Chloroplast Genome in Saccharomyces cerevisiae and Escherichia coli by Emma Walker, Bogumil Karas

    Published 2025-01-01
    “…These methods lack design flexibility as they are reliant upon the random capture of genomic fragments during BAC/YAC library creation; additionally, both demonstrated a low efficiency (≤ 10%) for correct assembly of the genome in yeast. …”
    Get full text
    Article