Suggested Topics within your search.
Suggested Topics within your search.
- Rhetoric 5
- English language 4
- Grammar 4
- Attitude to Health 3
- Behavioral Medicine 2
- Handbooks, manuals, etc 2
- Health behavior 2
- Psychology 2
- Animals 1
- Brothers and sisters 1
- Business communication 1
- Business writing 1
- Care 1
- Case studies 1
- Child development 1
- Child rearing 1
- Communication in organizations 1
- Dialectical materialism 1
- Education 1
- Elias (Fictitious character) 1
- English 1
- Examinations, questions, etc 1
- Fantasy 1
- Fiction 1
- Fugitives from justice 1
- Habitat (Ecology) 1
- Health 1
- Infants 1
- Laia (Fictitious character) 1
- Mass media 1
-
4921
Quantum public-key encryption protocol based on single-photon
Published 2014-11-01“…A quantum public-key encryption protocol based on single-photon was provided.Pseudo random sequence mapping to private keys to implement corresponding quantum operations and then obtaining quantum public-key to encode the plaintext was used.Employ the method of block classification to lower the requirement for storage capacity of the sender.A new quantum source as transmission carrier was introduced and simply encoding and decoding rules were designed based on the laws of quantum non-cloning and ciphertext indistinguishability.On the other hand,classical one-time pad technique is used to ensure the security of quantum key and plaintext in the transmission channel.At the same time,select different updating strategy of quantum public-key according to the results of error detection which can significantly reduce key consumption.Compared with the previous quantum public-key encryption based on entangled states and single-photon,there are no entangled states and decoyed particles are needed,so it is not only efficient to reduce the overhead of communication traffic between legitimate users,but also easier to carry out in practice.The analysis shows that the proposed scheme is secure.…”
Get full text
Article -
4922
On Iterative Learning Control for Remote Control Systems with Packet Losses
Published 2013-01-01“…The problem of iterative learning control (ILC) is considered for a class of time-varying systems with random packet dropouts. It is assumed that an ILC scheme is implemented via a remote control system and that packet dropout occurs during the packet transmission between the ILC controller and the actuator of remote plant. …”
Get full text
Article -
4923
Estimating regional shared trailer demand in drop-and-pull transport
Published 2025-02-01“…Three different machine learning models, namely linear regression, random forest, and XGBoost, were used to predict the freight volume. …”
Get full text
Article -
4924
Readiness Retirement Based on Sex, Position and Family Social Support
Published 2020-08-01“…This research uses Proportional Random Sampling technique. The instrument used in this study was a scale of readiness retirement with a reliability of 0.893 and a scale of family social support with a reliability of 0.941. …”
Get full text
Article -
4925
Development of 6 U CubeSat’s Deployable Solar Panel with Burn Wire Triggering Holding and Release Mechanism
Published 2019-01-01“…The structural safety of the solar panel combined with the mechanism in a launch vibration environment was verified through sine and random vibration tests at qualification level.…”
Get full text
Article -
4926
Representação descritiva em assembleias legislativas: gênero e raça como categorias de análise política
Published 2018-01-01“…The proposed model, based on the analysis of roles and electoral socialization mechanisms, compares the descriptive and substantive representation of women (N = 15) with a random sample of male deputies (N = 65), which made it possible to measure possible effects caused by factors such as gender and skin color in the legislative production and in the parliamentary performance of the sampled deputies. …”
Get full text
Article -
4927
Digital Simulation of Superconductive Memory System Based on Hardware Description Language Modeling
Published 2018-01-01“…We have modeled a memory system using Josephson Junction to attain low power consumption using low input voltage compared to conventional Complementary Metal Oxide Semiconductor-Static Random Access Memory (CMOS-SRAM). We attained the low power by connecting a shared/common bit line and using a 1-bit memory cell. …”
Get full text
Article -
4928
Deep Learning- and Word Embedding-Based Heterogeneous Classifier Ensembles for Text Classification
Published 2018-01-01“…The ensemble of base classifiers includes traditional machine learning algorithms such as naïve Bayes, support vector machine, and random forest and a deep learning-based conventional network classifier. …”
Get full text
Article -
4929
Institutional distance, trade agreements, and intellectual property trade networks: Evidence from cross-border data.
Published 2025-01-01“…Based on the Temporal Exponential Random Graph Models (TERGM), this paper applies global intellectual property trade data between countries to investigate the impact and mechanism of institutional distance on the intellectual property trade network. …”
Get full text
Article -
4930
Gambaran kecanduan internet pada remaja
Published 2023-07-01“…The sampling technique uses simple random sampling. Respondent data collection was carried out using questionnaires. …”
Get full text
Article -
4931
Advancements in Image Classification: From Machine Learning to Deep Learning
Published 2025-01-01“…Subsequently, the paper provides an in-depth analysis of image classification methods based on machine learning, including traditional algorithms such as Support Vector Machine (SVM), Random Forest, and Decision Tree. These methods achieve image classification through two stages: feature extraction and classification, but they encounter limitations when confronted with large-scale datasets and complicated tasks. …”
Get full text
Article -
4932
Attribute-based alterable threshold ring signature scheme with conspiracy attack immunity
Published 2015-12-01“…Attribute-based cryptography is a generalization and development of the identity-based cryptography,which extends the identity to a set of attributes.In the attribute-based cryptosystem,different members with the same attributes can form a signature ring automatically,with the actual signer’s personl idnetity easily hided.By in-depth analysis of several attribute-based threshold ring signature schemes proposed by the earlier reseachers,it is concluded that the malicious users with the complementary attributes can conspire to forge a valid signature.In order to compensate for the defect,the proposal first gives the formal definitions of the security characteristics in attribute-based threshold ring signature scheme,such as unforgeability,indistinguishability and anti-collusion attack.Then a new attribute-based alterable threshold ring signature scheme is presented,whose security is proven equivalent to the computational Diffie-Hellman problem.By introducing an random secret parameter in each user’s private key,the proposal can resist the collusion attacks.It is proven that the proposal can satisfy existential unforgeability and anti-collusion against the adaptive chosen message attack in therandom oracle model,and can meet the requirement of indistinguishability among the users with the same attributes.Besides,property analysis shows that the proposal has high efficiency.…”
Get full text
Article -
4933
Efficient high‐speed framework for sparse representation‐based iris recognition
Published 2021-05-01“…Feature extraction is performed by extracting Gabor features and then applying supervised locality‐preserving projections with heat kernel weights, which improves the recognition rate in comparison with the results from unsupervised dimensionality reduction techniques such as principal component analysis, locality‐preserving projections, and random projections. Afterwards, a classification is performed using the recently proposed sparse representation‐based classification (SRC). …”
Get full text
Article -
4934
Dynamic Rendezvous Based Routing Algorithm on Sparse Opportunistic Network Environment
Published 2015-02-01“…An opportunistic network is a network where the nodes need to communicate with each other even if existing routes between them may not permanently exist due to the nodes’ random movement. Most routing algorithms employ a paradigm by which a node can keep the receiving messages, carrying the messages with them when moving and then forwarding the messages to the opportunistic meeting nodes when possible. …”
Get full text
Article -
4935
The Effect of Engineering Design Based Science Teaching on Decision Making, Scientific Creativity and Design Skills of Classroom Teacher Candidates
Published 2021-10-01“…This study aims to examine the effects of engineering design-based science teaching (EDBST) on classroom teacher candidates’ decision-making skills, scientific creativity and engineering design-based process skills. The random design of the quantitative approach with a pretest-posttest control group was used in the study. …”
Get full text
Article -
4936
Dynamic Credit Quality Evaluation with Social Network Data
Published 2019-01-01“…Further, we consider the case when the network information arrival times are random and solve stochastic optimal control problem for a lender having linear quadratic utility function.…”
Get full text
Article -
4937
ANALYSIS OF LABORATORY TESTS FOR SEVERAL VIRAL SWINE DISEASES IN RUSSIA IN 2011–2017
Published 2018-05-01“…But it is not always possible to read the test results unambiguously and that requires the improvement of diagnostic practices supported by established rules of sampling, laboratory tests and obtained result submission. It means random tests shall be representative for tested populations, correlate with the prevalence of concerned infection and meet the required certainty. …”
Get full text
Article -
4938
Analysis of the Consecutive Mean Excision Algorithms
Published 2010-01-01“…The computer simulations for random and orthogonal frequency division multiplexing (OFDM) signals show that the presented analysis is able to predict the detectability of signals well.…”
Get full text
Article -
4939
Dynamic Analysis of Planar Linkage Mechanism Considering the Clearance of Kinematic Pair
Published 2022-09-01“…After the system becomes stable, the shaft is always in contact with the kinematic pair, which indicates that the motion of the shaft in the kinematic pair is not random collision. The driving force of the mechanism is mainly transmitted by the contact force generated by the deformation of the contact point, rather than the collision force between the shaft and the bearing. …”
Get full text
Article -
4940
Transformational, Visionary, and Prophetic Leadership: Their Impact on Teacher Job Satisfaction in Madrasa Ibtidaiyah
Published 2024-09-01“…Two hundred ninety-one teachers were randomly selected using the random sample technique, and 179 were involved in this study. …”
Get full text
Article