Suggested Topics within your search.
Suggested Topics within your search.
- Rhetoric 5
- English language 4
- Grammar 4
- Attitude to Health 3
- Behavioral Medicine 2
- Handbooks, manuals, etc 2
- Health behavior 2
- Psychology 2
- Animals 1
- Brothers and sisters 1
- Business communication 1
- Business writing 1
- Care 1
- Case studies 1
- Child development 1
- Child rearing 1
- Communication in organizations 1
- Dialectical materialism 1
- Education 1
- Elias (Fictitious character) 1
- English 1
- Examinations, questions, etc 1
- Fantasy 1
- Fiction 1
- Fugitives from justice 1
- Habitat (Ecology) 1
- Health 1
- Infants 1
- Laia (Fictitious character) 1
- Mass media 1
-
10681
SMS seed customers mining model and algorithm based on content analysis
Published 2016-02-01“…First of all,by analyzing the interest,randomness and one-way characteristics of customer forwarding messages,the tree model of customer forwarding messages were constructed. …”
Get full text
Article -
10682
OPTIMIZATION DESIGN OF GANTRY CRANE SKIN STRUCTURE SYSTEM BASED ON RELIABILITY ANALYSIS
Published 2016-01-01“…Put forward a kind of skin structure crane optimization design method based on reliability analysis. Considering the randomness of size parameters,material properties and wind load in the skin structure crane design,using Monte-Carlo method of Latin hypercube sampling( LHS) technique to calculate the reliability of structure system. …”
Get full text
Article -
10683
Optimal Design of the Fuzzy Reliability of Double Circular Arc Gear based on MATLAB
Published 2016-01-01“…Taking the double arc gear in the national standard GB/T12759-1991 as the analysis object,by using the theory of fuzzy mathematics and reliability optimization design method,considering arc gear transmission allowable stress randomness and fuzziness,taking the fuzzy reliability of arc gear bending modulus strength and contact strength and the modulus,tooth number,helix angle,longitudinal coincidence degree of gear as constraint condition,a minimum volume of arc gear optimization as target,the fuzzy reliability optimum design model of double arc gear is established,and a practical example is given,the results indicate that,the circular gear design with fuzzy reliability optimization design method has better rationality.…”
Get full text
Article -
10684
Node Classification on The Citation Network Using Graph Neural Network
Published 2023-06-01“…The new data utilized in the model predictions showcases the probabilities of each class through randomly generated examples.…”
Get full text
Article -
10685
Neoadjuvant Radiation with Concurrent 5-FU Resulting in Complete Pathologic Response in Stage IIIB Squamous Cell Carcinoma of the Urethra
Published 2020-01-01“…Due to the rarity of the disease, there are a limited number of prospective randomized controlled trials to evaluate the optimal management of locally advanced urethral SCC. …”
Get full text
Article -
10686
A novel chaotic system with one absolute term: stability, ultimate boundedness, and image encryption
Published 2025-01-01“…Combining the proposed system and the Toeplitz matrix improves the pixel distribution's randomness, significantly increasing security. The test results showed that the suggested image scheme is very secure and impervious to differential, statistical analysis, and other types of attacks. …”
Get full text
Article -
10687
PSO localization algorithm for WSN nodes based on modifying average hop distances
Published 2013-09-01“…Regarding the relatively big errors with running the DV-hop localization algorithm in a network topology scenario,with which nodes randomly distributes,a particle swarm optimization localization algorithm for WSN nodes based on modifying average hop distance was proposed.changing the structure of data packets sent by anchor nodes with broadcasting,weighting the average hop distance error of reference anchor nodes to modify the average hop distance,and using an improved particle swarm algorithm to optimize iteration process for localization,thus,WPDV-Hop localization algorithm improvements were carried out.The simulation results indicate that the localization accuracy and the stability of the WPDV-Hop localization algorithm are significantly improved compared with the original algorithm.…”
Get full text
Article -
10688
A Fast Enhanced Secure Image Chaotic Cryptosystem Based on Hybrid Chaotic Magic Transform
Published 2017-01-01“…Using hybrid CMT image, pixels are shuffled to accomplish excellent randomness. Compared with existing methods, the proposed method had more robustness to various attacks: brute-force attack, known cipher plaintext, chosen-plaintext, security key space, key sensitivity, correlation analysis and information entropy, and differential attacks. …”
Get full text
Article -
10689
Message encryption and authentication mechanism based on wireless physical layer key
Published 2018-08-01“…In order to solve the problem of hidden key leakage in traditional high-level message authentication and passive eavesdropping in physical layer message authentication,a message encryption and authentication mechanism based on the characteristics of wireless physical layer was proposed.By extracting the characteristics of the wireless channel,the physical layer key was generated and the seed key was generated by combining the identity key.The key stream generator then generated the key stream to decrypt the message according to the extracted seed,protects the privacy of the transmitted data,and the final receiver authenticated the authenticity and integrity of the received message through the CRC verification result.Simulation results show that the proposed method has better performance in preventing passive eavesdropping and active attack,and the randomness of key stream is greatly improved and the rate of authentication leak detection is reduced by half.…”
Get full text
Article -
10690
Didactic analysis of the results of solving tasks of school-scale mathematical competitions for fourth formers
Published 2004-12-01“… The research has randomly selected 2581 from more than 5000 competition works by fourth formers from Lithuania's all cities and districts. …”
Get full text
Article -
10691
Steganalysis of LSB matching based on regional correlation
Published 2010-01-01“…LSB matching improves the security of hidden message through changing the pixel’s LSB randomly, which breaks the rules of pairs of values of LSB replacement. …”
Get full text
Article -
10692
Scoping Review of PTSD Treatments for Natural Disaster Survivors
Published 2023-12-01“…It includes fourteen randomized control trials (RCTs). The included interventions were, pharmaceuticals, nutraceuticals, herbal supplements, CBT, yoga, narrative exposure therapy, acupuncture stimulation, web-based interventions, and a multimodal art and meditation program. …”
Get full text
Article -
10693
Low-complexity massive MIMO channel estimation for mmWave systems via matrix completion
Published 2020-04-01“…Due to the high computational complexity of mmWave massive MIMO systems realizing reliable channel estimation,a low-complexity mmWave beamspace channel estimation algorithm was proposed utilizing the inherent low-rank of the mmWave channel.The proposed algorithm jointly exploited the channel sparsity in the beamspace domain and its low-rank property in the antenna domain to provide more accurate recovery,especially for shorter training intervals.By regarding the channel estimation as matrix completion problem,the proposed algorithm was based on the alternating direction method of multipliers with fast convergence properties and exploited fast randomized singular value thresholding to significantly reduce the corresponding complexity.The simulation result shows that the proposed algorithm can achieve satisfactory channel estimation performance while maintaining low complexity.…”
Get full text
Article -
10694
Constructing Digitized Chaotic Time Series with a Guaranteed Enhanced Period
Published 2019-01-01“…Furthermore, experimental implementation shows that the digitized chaotic time series has great complexity, approximate entropy, and randomness, and the perturbed digitized logistic map can be used as a secure pseudorandom sequence generator for information encryption.…”
Get full text
Article -
10695
New-onset seizure in pregnancy: case report and literature review
Published 2022-03-01“…However, neuroimaging and treatment of pregnant patients with seizures are challenging due to the lack of randomized controlled trials in pregnant women. This article presents a clinical case of a 31-year-old primigravida woman at 29 weeks of gestation diagnosed with new-onset epilepsy which manifested with bilateral tonic-clonic seizure and slow pathological waves on the EEG with no neurologic deficits or magnetic resonance imaging abnormalities. …”
Get full text
Article -
10696
Support vector machine based fast Monte Carlo reliability evaluation method for composite power system
Published 2019-06-01“…A fast Monte Carlo reliability evaluation method for composite power system based on support vector machine (SVM) was proposesd.Firstly,sample data for training the SVM model was obtained by enumerating component failures and calculating the corresponding minimum load shedding.Then,the SVM algorithm was used to mine the nonlinear mapping relationship between component failures and minimum load shedding,and the minimum load shedding estimation model was trained.Finally,the model was combined with the Monte Carlo simulation.By randomly sampling component states,for each state,the estimation model obtained by the training directly gave the minimum load shedding,thereby achieving a rapid assessment of the reliability of the composite power system.The proposed method is applied to the IEEE RTS 79 system,which verifies its effectiveness.…”
Get full text
Article -
10697
Application of Cloud Model in Evaluation of Urban Vulnerability to Floods Based on Improved Game Theory and Combined Weight
Published 2020-01-01“…The urban vulnerability to floods reflects the state of destruction and damage of human,society and economic properties in the city by floods.Taking 14 cities of Guangxi Zhuang Autonomous Region as examples,this paper introduces the cloud model theory method into the evaluation of urban vulnerability to floods,establishes an evaluation factor system for flood vulnerability with five vulnerability levels,improves the game theory to ensure the positive value of combination coefficient based on the subjective and objective weights,and then determines the cooperative weights.The research shows that the cloud model can cope with the uncertainty in the evaluation studies well by taking into account the ambiguity and randomness of factors.In overall,cities in the middle and east Guangxi have higher vulnerability level,followed by those in the west and north Guangxi,and then those in the south Guangxi.…”
Get full text
Article -
10698
A Job Well Done: Clients Satisfied With Extension's Service
Published 2005-10-01“…After recording the contact information, a sample of persons from each county was randomly selected to participate in the survey. Clients were contacted by mail or telephone. …”
Get full text
Article -
10699
Research of connectivity for wireless sensor networks
Published 2009-01-01“…It was crucial to acquire the knowledge of nodes connectivity before management,application and research of wireless sensor networks when they had been deployed in the interest randomly.Under real environment there can be some nodes called unreachable node in interest,which could not communicate with base station for some reason,for ex-ample there are some nodes lie out of the radio range of base station or the interest range.A scheme to make those un-reachable nodes be able to communicate with base station was proposed.At the same time,a judgment algorithm for nodes connectivity based on a normal wireless sensor networks model was proposed.In simulation two-experiment scheme to test the proposed scheme and judgment algorithm were set.From the results of simulation conclude that the proposed scheme can improve nodes’ connectivity in the interest and the proposed algorithm can judge the connectivity efficiently and accurately.…”
Get full text
Article -
10700
Application of RQMC for CDO Pricing with Stochastic Correlations under Nonhomogeneous Assumptions
Published 2022-01-01“…In consideration of that the correlation between any two assets of the asset pool is always stochastic in the actual market and that collateralized debt obligation (CDO) pricing models under nonhomogeneous assumptions have no semianalytic solutions, we designed a numerical algorithm based on randomized quasi-Monte Carlo (RQMC) simulation method for CDO pricing with stochastic correlations under nonhomogeneous assumptions and took Gaussian factor copula model as an example to conduct experiments. …”
Get full text
Article