Showing 4,921 - 4,940 results of 17,304 for search '"random"', query time: 0.09s Refine Results
  1. 4921

    Quantum public-key encryption protocol based on single-photon by Wen-jun LUO, Guan-li LIU

    Published 2014-11-01
    “…A quantum public-key encryption protocol based on single-photon was provided.Pseudo random sequence mapping to private keys to implement corresponding quantum operations and then obtaining quantum public-key to encode the plaintext was used.Employ the method of block classification to lower the requirement for storage capacity of the sender.A new quantum source as transmission carrier was introduced and simply encoding and decoding rules were designed based on the laws of quantum non-cloning and ciphertext indistinguishability.On the other hand,classical one-time pad technique is used to ensure the security of quantum key and plaintext in the transmission channel.At the same time,select different updating strategy of quantum public-key according to the results of error detection which can significantly reduce key consumption.Compared with the previous quantum public-key encryption based on entangled states and single-photon,there are no entangled states and decoyed particles are needed,so it is not only efficient to reduce the overhead of communication traffic between legitimate users,but also easier to carry out in practice.The analysis shows that the proposed scheme is secure.…”
    Get full text
    Article
  2. 4922

    On Iterative Learning Control for Remote Control Systems with Packet Losses by Chunping Liu, Rong Xiong, Jianxin Xu, Jun Wu

    Published 2013-01-01
    “…The problem of iterative learning control (ILC) is considered for a class of time-varying systems with random packet dropouts. It is assumed that an ILC scheme is implemented via a remote control system and that packet dropout occurs during the packet transmission between the ILC controller and the actuator of remote plant. …”
    Get full text
    Article
  3. 4923

    Estimating regional shared trailer demand in drop-and-pull transport by Mei Feng, Qianwei Peng, Zhixue Zhao

    Published 2025-02-01
    “…Three different machine learning models, namely linear regression, random forest, and XGBoost, were used to predict the freight volume. …”
    Get full text
    Article
  4. 4924

    Readiness Retirement Based on Sex, Position and Family Social Support by Wia Septia, Herman Nirwana, Afdal Afdal

    Published 2020-08-01
    “…This research uses Proportional Random Sampling technique. The instrument used in this study was a scale of readiness retirement with a reliability of 0.893 and a scale of family social support with a reliability of 0.941. …”
    Get full text
    Article
  5. 4925

    Development of 6 U CubeSat’s Deployable Solar Panel with Burn Wire Triggering Holding and Release Mechanism by Tae-Yong Park, Bong-Geon Chae, Hyun-Ung Oh

    Published 2019-01-01
    “…The structural safety of the solar panel combined with the mechanism in a launch vibration environment was verified through sine and random vibration tests at qualification level.…”
    Get full text
    Article
  6. 4926

    Representação descritiva em assembleias legislativas: gênero e raça como categorias de análise política by Orlando Lyra de Carvalho, Vitor de Angelo

    Published 2018-01-01
    “…The proposed model, based on the analysis of roles and electoral socialization mechanisms, compares the descriptive and substantive representation of women (N = 15) with a random sample of male deputies (N = 65), which made it possible to measure possible effects caused by factors such as gender and skin color in the legislative production and in the parliamentary performance of the sampled deputies. …”
    Get full text
    Article
  7. 4927

    Digital Simulation of Superconductive Memory System Based on Hardware Description Language Modeling by S. Narendran, J. Selvakumar

    Published 2018-01-01
    “…We have modeled a memory system using Josephson Junction to attain low power consumption using low input voltage compared to conventional Complementary Metal Oxide Semiconductor-Static Random Access Memory (CMOS-SRAM). We attained the low power by connecting a shared/common bit line and using a 1-bit memory cell. …”
    Get full text
    Article
  8. 4928

    Deep Learning- and Word Embedding-Based Heterogeneous Classifier Ensembles for Text Classification by Zeynep H. Kilimci, Selim Akyokus

    Published 2018-01-01
    “…The ensemble of base classifiers includes traditional machine learning algorithms such as naïve Bayes, support vector machine, and random forest and a deep learning-based conventional network classifier. …”
    Get full text
    Article
  9. 4929

    Institutional distance, trade agreements, and intellectual property trade networks: Evidence from cross-border data. by Yida Wang, Jiangjiao Wang

    Published 2025-01-01
    “…Based on the Temporal Exponential Random Graph Models (TERGM), this paper applies global intellectual property trade data between countries to investigate the impact and mechanism of institutional distance on the intellectual property trade network. …”
    Get full text
    Article
  10. 4930

    Gambaran kecanduan internet pada remaja by Balqis Urwatul Wutsqo, Wirda Hanim, Eka Wahyuni

    Published 2023-07-01
    “…The sampling technique uses simple random sampling. Respondent data collection was carried out using questionnaires. …”
    Get full text
    Article
  11. 4931

    Advancements in Image Classification: From Machine Learning to Deep Learning by Cheng Haoran

    Published 2025-01-01
    “…Subsequently, the paper provides an in-depth analysis of image classification methods based on machine learning, including traditional algorithms such as Support Vector Machine (SVM), Random Forest, and Decision Tree. These methods achieve image classification through two stages: feature extraction and classification, but they encounter limitations when confronted with large-scale datasets and complicated tasks. …”
    Get full text
    Article
  12. 4932

    Attribute-based alterable threshold ring signature scheme with conspiracy attack immunity by Zhen CHEN, Wen-fang ZHANG, Xiao-min WANG

    Published 2015-12-01
    “…Attribute-based cryptography is a generalization and development of the identity-based cryptography,which extends the identity to a set of attributes.In the attribute-based cryptosystem,different members with the same attributes can form a signature ring automatically,with the actual signer’s personl idnetity easily hided.By in-depth analysis of several attribute-based threshold ring signature schemes proposed by the earlier reseachers,it is concluded that the malicious users with the complementary attributes can conspire to forge a valid signature.In order to compensate for the defect,the proposal first gives the formal definitions of the security characteristics in attribute-based threshold ring signature scheme,such as unforgeability,indistinguishability and anti-collusion attack.Then a new attribute-based alterable threshold ring signature scheme is presented,whose security is proven equivalent to the computational Diffie-Hellman problem.By introducing an random secret parameter in each user’s private key,the proposal can resist the collusion attacks.It is proven that the proposal can satisfy existential unforgeability and anti-collusion against the adaptive chosen message attack in therandom oracle model,and can meet the requirement of indistinguishability among the users with the same attributes.Besides,property analysis shows that the proposal has high efficiency.…”
    Get full text
    Article
  13. 4933

    Efficient high‐speed framework for sparse representation‐based iris recognition by Michael Melek, Mohamed F. Abu‐Elyazeed, Ahmed Khattab

    Published 2021-05-01
    “…Feature extraction is performed by extracting Gabor features and then applying supervised locality‐preserving projections with heat kernel weights, which improves the recognition rate in comparison with the results from unsupervised dimensionality reduction techniques such as principal component analysis, locality‐preserving projections, and random projections. Afterwards, a classification is performed using the recently proposed sparse representation‐based classification (SRC). …”
    Get full text
    Article
  14. 4934

    Dynamic Rendezvous Based Routing Algorithm on Sparse Opportunistic Network Environment by Jiradett Kerdsri, Komwut Wipusitwarakun

    Published 2015-02-01
    “…An opportunistic network is a network where the nodes need to communicate with each other even if existing routes between them may not permanently exist due to the nodes’ random movement. Most routing algorithms employ a paradigm by which a node can keep the receiving messages, carrying the messages with them when moving and then forwarding the messages to the opportunistic meeting nodes when possible. …”
    Get full text
    Article
  15. 4935

    The Effect of Engineering Design Based Science Teaching on Decision Making, Scientific Creativity and Design Skills of Classroom Teacher Candidates by Elcin Ayaz, Rabia Sarikaya

    Published 2021-10-01
    “…This study aims to examine the effects of engineering design-based science teaching (EDBST) on classroom teacher candidates’ decision-making skills, scientific creativity and engineering design-based process skills. The random design of the quantitative approach with a pretest-posttest control group was used in the study. …”
    Get full text
    Article
  16. 4936

    Dynamic Credit Quality Evaluation with Social Network Data by Stanley Sewe, Philip Ngare, Patrick Weke

    Published 2019-01-01
    “…Further, we consider the case when the network information arrival times are random and solve stochastic optimal control problem for a lender having linear quadratic utility function.…”
    Get full text
    Article
  17. 4937

    ANALYSIS OF LABORATORY TESTS FOR SEVERAL VIRAL SWINE DISEASES IN RUSSIA IN 2011–2017 by A. A. Shevtsov, O. N. Petrova, S. G. Remyga, A. S. Pershin, K. N. Gruzdev, A. S.  Igolkin

    Published 2018-05-01
    “…But it is not always possible to read the test results unambiguously and that requires the improvement of diagnostic practices supported by established rules of sampling, laboratory tests and obtained result submission. It means random tests shall be representative for tested populations, correlate with the prevalence of concerned infection and meet the required certainty. …”
    Get full text
    Article
  18. 4938

    Analysis of the Consecutive Mean Excision Algorithms by Johanna Vartiainen, Janne Lehtomäki, Harri Saarnisaari, Markku Juntti

    Published 2010-01-01
    “…The computer simulations for random and orthogonal frequency division multiplexing (OFDM) signals show that the presented analysis is able to predict the detectability of signals well.…”
    Get full text
    Article
  19. 4939

    Dynamic Analysis of Planar Linkage Mechanism Considering the Clearance of Kinematic Pair by Guoguang Jin, Xurui Hou, Zhan Wei, Zhimin Wang, Yanyan Song

    Published 2022-09-01
    “…After the system becomes stable, the shaft is always in contact with the kinematic pair, which indicates that the motion of the shaft in the kinematic pair is not random collision. The driving force of the mechanism is mainly transmitted by the contact force generated by the deformation of the contact point, rather than the collision force between the shaft and the bearing. …”
    Get full text
    Article
  20. 4940

    Transformational, Visionary, and Prophetic Leadership: Their Impact on Teacher Job Satisfaction in Madrasa Ibtidaiyah by Juhji Juhji, Siti Maysaroh, Hikmah Umi Prihatini

    Published 2024-09-01
    “…Two hundred ninety-one teachers were randomly selected using the random sample technique, and 179 were involved in this study. …”
    Get full text
    Article