Showing 10,681 - 10,700 results of 17,304 for search '"random"', query time: 0.13s Refine Results
  1. 10681

    SMS seed customers mining model and algorithm based on content analysis by Zhichao HUANG, Juncai TAO, Shengbao GAO

    Published 2016-02-01
    “…First of all,by analyzing the interest,randomness and one-way characteristics of customer forwarding messages,the tree model of customer forwarding messages were constructed. …”
    Get full text
    Article
  2. 10682

    OPTIMIZATION DESIGN OF GANTRY CRANE SKIN STRUCTURE SYSTEM BASED ON RELIABILITY ANALYSIS by HAN Wei, YU LanFeng, WANG PingPing, YAN Fei

    Published 2016-01-01
    “…Put forward a kind of skin structure crane optimization design method based on reliability analysis. Considering the randomness of size parameters,material properties and wind load in the skin structure crane design,using Monte-Carlo method of Latin hypercube sampling( LHS) technique to calculate the reliability of structure system. …”
    Get full text
    Article
  3. 10683

    Optimal Design of the Fuzzy Reliability of Double Circular Arc Gear based on MATLAB by Wang Chunyan, Ji Bin, Fu Jianwei

    Published 2016-01-01
    “…Taking the double arc gear in the national standard GB/T12759-1991 as the analysis object,by using the theory of fuzzy mathematics and reliability optimization design method,considering arc gear transmission allowable stress randomness and fuzziness,taking the fuzzy reliability of arc gear bending modulus strength and contact strength and the modulus,tooth number,helix angle,longitudinal coincidence degree of gear as constraint condition,a minimum volume of arc gear optimization as target,the fuzzy reliability optimum design model of double arc gear is established,and a practical example is given,the results indicate that,the circular gear design with fuzzy reliability optimization design method has better rationality.…”
    Get full text
    Article
  4. 10684

    Node Classification on The Citation Network Using Graph Neural Network by Irani Hoeronis, Bambang Riyanto Trilaksono

    Published 2023-06-01
    “…The new data utilized in the model predictions showcases the probabilities of each class through randomly generated examples.…”
    Get full text
    Article
  5. 10685

    Neoadjuvant Radiation with Concurrent 5-FU Resulting in Complete Pathologic Response in Stage IIIB Squamous Cell Carcinoma of the Urethra by Krishna H. Suthar, Meghana Kesireddy, Mark Sides, Amit Correa, Aijan Ukudeyva, Rohit Venkatesan

    Published 2020-01-01
    “…Due to the rarity of the disease, there are a limited number of prospective randomized controlled trials to evaluate the optimal management of locally advanced urethral SCC. …”
    Get full text
    Article
  6. 10686

    A novel chaotic system with one absolute term: stability, ultimate boundedness, and image encryption by Ali A. Shukur, Ammar Ali Neamah, Viet-Thanh Pham, Giuseppe Grassi

    Published 2025-01-01
    “…Combining the proposed system and the Toeplitz matrix improves the pixel distribution's randomness, significantly increasing security. The test results showed that the suggested image scheme is very secure and impervious to differential, statistical analysis, and other types of attacks. …”
    Get full text
    Article
  7. 10687

    PSO localization algorithm for WSN nodes based on modifying average hop distances by Yan-hang ZHAO, Zhi-hong QIAN, Xiao-hang SHANG, Chao CHENG

    Published 2013-09-01
    “…Regarding the relatively big errors with running the DV-hop localization algorithm in a network topology scenario,with which nodes randomly distributes,a particle swarm optimization localization algorithm for WSN nodes based on modifying average hop distance was proposed.changing the structure of data packets sent by anchor nodes with broadcasting,weighting the average hop distance error of reference anchor nodes to modify the average hop distance,and using an improved particle swarm algorithm to optimize iteration process for localization,thus,WPDV-Hop localization algorithm improvements were carried out.The simulation results indicate that the localization accuracy and the stability of the WPDV-Hop localization algorithm are significantly improved compared with the original algorithm.…”
    Get full text
    Article
  8. 10688

    A Fast Enhanced Secure Image Chaotic Cryptosystem Based on Hybrid Chaotic Magic Transform by Srinivas Koppu, V. Madhu Viswanatham

    Published 2017-01-01
    “…Using hybrid CMT image, pixels are shuffled to accomplish excellent randomness. Compared with existing methods, the proposed method had more robustness to various attacks: brute-force attack, known cipher plaintext, chosen-plaintext, security key space, key sensitivity, correlation analysis and information entropy, and differential attacks. …”
    Get full text
    Article
  9. 10689

    Message encryption and authentication mechanism based on wireless physical layer key by Xingzhi,JINLiang LI, Zhou ZHONG, Yangming LOU

    Published 2018-08-01
    “…In order to solve the problem of hidden key leakage in traditional high-level message authentication and passive eavesdropping in physical layer message authentication,a message encryption and authentication mechanism based on the characteristics of wireless physical layer was proposed.By extracting the characteristics of the wireless channel,the physical layer key was generated and the seed key was generated by combining the identity key.The key stream generator then generated the key stream to decrypt the message according to the extracted seed,protects the privacy of the transmitted data,and the final receiver authenticated the authenticity and integrity of the received message through the CRC verification result.Simulation results show that the proposed method has better performance in preventing passive eavesdropping and active attack,and the randomness of key stream is greatly improved and the rate of authentication leak detection is reduced by half.…”
    Get full text
    Article
  10. 10690

    Didactic analysis of the results of solving tasks of school-scale mathematical competitions for fourth formers by Danutė Kiseliova, Arkadijus Kiseliovas

    Published 2004-12-01
    “… The research has randomly selected 2581 from more than 5000 competition works by fourth formers from Lithuania's all cities and districts. …”
    Get full text
    Article
  11. 10691

    Steganalysis of LSB matching based on regional correlation by CHEN Ming1, ZHANG Ru1, LIU Fan-fan1, WU Jia1, NIU Xin-xin1

    Published 2010-01-01
    “…LSB matching improves the security of hidden message through changing the pixel’s LSB randomly, which breaks the rules of pairs of values of LSB replacement. …”
    Get full text
    Article
  12. 10692

    Scoping Review of PTSD Treatments for Natural Disaster Survivors by Arjun Nanduri, Marlon Vasquez, Savithri Chandana Veluri, Noshene Ranjbar

    Published 2023-12-01
    “…It includes fourteen randomized control trials (RCTs). The included interventions were, pharmaceuticals, nutraceuticals, herbal supplements, CBT, yoga, narrative exposure therapy, acupuncture stimulation, web-based interventions, and a multimodal art and meditation program. …”
    Get full text
    Article
  13. 10693

    Low-complexity massive MIMO channel estimation for mmWave systems via matrix completion by Jiafeng QIU

    Published 2020-04-01
    “…Due to the high computational complexity of mmWave massive MIMO systems realizing reliable channel estimation,a low-complexity mmWave beamspace channel estimation algorithm was proposed utilizing the inherent low-rank of the mmWave channel.The proposed algorithm jointly exploited the channel sparsity in the beamspace domain and its low-rank property in the antenna domain to provide more accurate recovery,especially for shorter training intervals.By regarding the channel estimation as matrix completion problem,the proposed algorithm was based on the alternating direction method of multipliers with fast convergence properties and exploited fast randomized singular value thresholding to significantly reduce the corresponding complexity.The simulation result shows that the proposed algorithm can achieve satisfactory channel estimation performance while maintaining low complexity.…”
    Get full text
    Article
  14. 10694

    Constructing Digitized Chaotic Time Series with a Guaranteed Enhanced Period by Chuanfu Wang, Qun Ding

    Published 2019-01-01
    “…Furthermore, experimental implementation shows that the digitized chaotic time series has great complexity, approximate entropy, and randomness, and the perturbed digitized logistic map can be used as a secure pseudorandom sequence generator for information encryption.…”
    Get full text
    Article
  15. 10695

    New-onset seizure in pregnancy: case report and literature review by I. Paulauskienė, R. Mameniškienė

    Published 2022-03-01
    “…However, neuroimaging and treatment of pregnant patients with seizures are challenging due to the lack of randomized controlled trials in pregnant women. This article presents a clinical case of a 31-year-old primigravida woman at 29 weeks of gestation diagnosed with new-onset epilepsy which manifested with bilateral tonic-clonic seizure and slow pathological waves on the EEG with no neurologic deficits or magnetic resonance imaging abnormalities. …”
    Get full text
    Article
  16. 10696

    Support vector machine based fast Monte Carlo reliability evaluation method for composite power system by Yuxiao LEI, Gengfeng LI, Yuxiong HUANG, Zhaohong BIE

    Published 2019-06-01
    “…A fast Monte Carlo reliability evaluation method for composite power system based on support vector machine (SVM) was proposesd.Firstly,sample data for training the SVM model was obtained by enumerating component failures and calculating the corresponding minimum load shedding.Then,the SVM algorithm was used to mine the nonlinear mapping relationship between component failures and minimum load shedding,and the minimum load shedding estimation model was trained.Finally,the model was combined with the Monte Carlo simulation.By randomly sampling component states,for each state,the estimation model obtained by the training directly gave the minimum load shedding,thereby achieving a rapid assessment of the reliability of the composite power system.The proposed method is applied to the IEEE RTS 79 system,which verifies its effectiveness.…”
    Get full text
    Article
  17. 10697

    Application of Cloud Model in Evaluation of Urban Vulnerability to Floods Based on Improved Game Theory and Combined Weight by WANG Dayang

    Published 2020-01-01
    “…The urban vulnerability to floods reflects the state of destruction and damage of human,society and economic properties in the city by floods.Taking 14 cities of Guangxi Zhuang Autonomous Region as examples,this paper introduces the cloud model theory method into the evaluation of urban vulnerability to floods,establishes an evaluation factor system for flood vulnerability with five vulnerability levels,improves the game theory to ensure the positive value of combination coefficient based on the subjective and objective weights,and then determines the cooperative weights.The research shows that the cloud model can cope with the uncertainty in the evaluation studies well by taking into account the ambiguity and randomness of factors.In overall,cities in the middle and east Guangxi have higher vulnerability level,followed by those in the west and north Guangxi,and then those in the south Guangxi.…”
    Get full text
    Article
  18. 10698

    A Job Well Done: Clients Satisfied With Extension's Service by Tyann M. Haile, Glenn D. Israel

    Published 2005-10-01
    “…After recording the contact information, a sample of persons from each county was randomly selected to participate in the survey. Clients were contacted by mail or telephone. …”
    Get full text
    Article
  19. 10699

    Research of connectivity for wireless sensor networks by HUANG Xiao 1, CHENG Hong-bing 1, YANG Geng1

    Published 2009-01-01
    “…It was crucial to acquire the knowledge of nodes connectivity before management,application and research of wireless sensor networks when they had been deployed in the interest randomly.Under real environment there can be some nodes called unreachable node in interest,which could not communicate with base station for some reason,for ex-ample there are some nodes lie out of the radio range of base station or the interest range.A scheme to make those un-reachable nodes be able to communicate with base station was proposed.At the same time,a judgment algorithm for nodes connectivity based on a normal wireless sensor networks model was proposed.In simulation two-experiment scheme to test the proposed scheme and judgment algorithm were set.From the results of simulation conclude that the proposed scheme can improve nodes’ connectivity in the interest and the proposed algorithm can judge the connectivity efficiently and accurately.…”
    Get full text
    Article
  20. 10700

    Application of RQMC for CDO Pricing with Stochastic Correlations under Nonhomogeneous Assumptions by Shuanghong Qu, Lingxian Meng, Hua Li

    Published 2022-01-01
    “…In consideration of that the correlation between any two assets of the asset pool is always stochastic in the actual market and that collateralized debt obligation (CDO) pricing models under nonhomogeneous assumptions have no semianalytic solutions, we designed a numerical algorithm based on randomized quasi-Monte Carlo (RQMC) simulation method for CDO pricing with stochastic correlations under nonhomogeneous assumptions and took Gaussian factor copula model as an example to conduct experiments. …”
    Get full text
    Article