Showing 10,941 - 10,960 results of 17,304 for search '"random"', query time: 0.10s Refine Results
  1. 10941

    Analisis faktor produksi terhadap kepuasan petani dalam mendorong ketahanan pangan di Sulawesi Selatan by Andi Arifuddin Iskandar

    Published 2024-07-01
    “…The research used a survey with Likert Scale data from 100 randomly selected rice farmers in Mattirobulu, Tiroang, Patampanua, and Duampanua districts, Pinrang Regency, South Sulawesi. …”
    Get full text
    Article
  2. 10942

    Screw Remaining Life Prediction Based on Quantum Genetic Algorithm and Support Vector Machine by Xiaochen Zhang, Dongxiang Jiang

    Published 2017-01-01
    “…Meanwhile, the sensitive feature vectors are randomly chosen from the database and constitute training samples and testing samples. …”
    Get full text
    Article
  3. 10943

    The Effect of Grinding Media on Mineral Breakage Properties of Magnetite Ores by Liang Si, Yijun Cao, Guixia Fan

    Published 2021-01-01
    “…Optimal control of the particle size distribution of the products is therefore essential, but the complexity and randomness of ball mill grinding make it difficult to determine the appropriate ball size. …”
    Get full text
    Article
  4. 10944

    Differentially private sequence generative adversarial networks for data privacy masking by Yu ZHANG, Xixiang LYU, Yucong ZOU, Yige LI

    Published 2020-08-01
    “…Based on generative adversary networks and the differential privacy mechanism,a differentially private sequence generative adversarial net (DP-SeqGAN) was proposed,with which the privacy of text sequence data sets can be filtered out.DP-SeqGAN can be used to automatically extract important features of a data set and then generate a new data set which was close to the original one in terms of data distributions.Based on differential privacy,randomness is introduced to the model,which improves the privacy of the generated data set and further reduces the over fitting of the discriminator.The proposed DP-SeqGAN was universal,so there is no need to adjust the model adaptively for datasets or design complex masking rules against dataset characters.The experiments show that the privacy and usability of a sequence data set are both improved significantly after it is processed by the DP-SeqGAN model,and DP-SeqGAN can greatly reduce the success rate of member inference attacks against the generated data set.…”
    Get full text
    Article
  5. 10945

    Abdominal Decompression in Children by J. Chiaka Ejike, Mudit Mathur

    Published 2012-01-01
    “…However, prospective randomized studies are needed to fully understand the indications and impact of these therapies on survival in children.…”
    Get full text
    Article
  6. 10946

    Patent Foramen Ovale and Closure Technique with the Amplatzer Occluder by Bernhard Meier

    Published 2014-01-01
    “…Paradoxical embolism is a rare event occurring over decades rather than years. None of the 4 randomized trials published carried enough patients or was followed up for long enough to reach superiority endpoints. …”
    Get full text
    Article
  7. 10947

    Optimizing Transmit Sequence and Instrumental Variables Receiver for Dual-Function Complexity System by Yu Yao, Junhui Zhao, Lenan Wu

    Published 2020-01-01
    “…The relaxation plus randomization technique is used to find an approximate solution. …”
    Get full text
    Article
  8. 10948

    Research on worm propagation model in IPv6 networks by SU Fei1, LIN Zhao-wen1, MA Yan1, YANG Xiao-ming3

    Published 2011-01-01
    “…A wide variety of scanning strategies for IPv6 networks when a worm scans across subnets and inside subnets was investigated.A P2P-based mechanism for decreasing the repeated infection and implementing control strategies was discussed,and a new hybrid worm named NHIW,which can form large-scale propagation in IPv6 network,was also constructed.The NHIW can not only scan the worm randomly,but also can quickly obtain IP addresses of susceptible active hosts in the subnet as well.Furthermore,NHIW is able to prevent re-infection of the host.Through analyzing the delay in different stage of NHIW propagation and its propagation rate,a full NHIW propagation model TLWPM was established.Experimental results show that NHIW can form a flooding propagation in the IPv6 network.With respect to the features of NHIW,some relevant defense strategies were discussed finally.…”
    Get full text
    Article
  9. 10949

    Investigation of physical education teachers’ sensation seeking levels according to different variables by Seydi Karakus

    Published 2023-12-01
    “…The study group was randomly selected and consisted of a total of 550 people, 320 of whom were male and 230 females. …”
    Get full text
    Article
  10. 10950

    On the Reorganization of Incentive Structure to Promote Delay Tolerance: A Therapeutic Possibility for AD/HD? by Edmund J. S. Sonuga-Barke

    Published 2004-01-01
    “…First is the suggestion, backed up by data from randomized trials, that training and practice in carefully selected cognitive activities (executive and attentional training) and tasks can provide a way of modifying the processes underlying cognitive, especially executive, deficits in AD/HD. …”
    Get full text
    Article
  11. 10951

    KORELASI FENOTYPE DAN HASIL JAGUNG MANIS (Zea mays saccharata, Sturt) DI KECAMATAN RUMBAI PEKANBARU by SURTINAH SURTINAH

    Published 2018-08-01
    “…The environmental design used was a complete randomized design with 20 replications. Data analysis using correlation analysis. …”
    Get full text
    Article
  12. 10952

    Eclecticism in child welfare by Terje Halvorsen

    Published 2024-05-01
    “…Several researchers then advocated a clean-up campaign where one through randomized controlled trials should decide which theories are true and which methods work. …”
    Get full text
    Article
  13. 10953

    Differential, Linear, and Meet-in-the-Middle Attacks on the Lightweight Block Cipher RBFK by Sugio Nobuyuki

    Published 2023-01-01
    “…Randomized butterfly architecture of fast Fourier transform for key cipher (RBFK) is the lightweight block cipher for Internet of things devices in an edge computing environment. …”
    Get full text
    Article
  14. 10954

    Numerical modelling of intergranular fracture in polycrystalline materials and grain size effects by M. Paggi, P. Wriggers

    Published 2013-04-01
    “…Since the shape and the parameters of the nonlocal CZM depend on the interface thickness, a distribution of interface fracture energies is obtained as a consequence of the randomness of the material microstructure. Using these data, fracture mechanics simulations are performed and the homogenized stress-strain curves of 2D representative volume elements (RVEs) are computed. …”
    Get full text
    Article
  15. 10955

    Educational Video Quality on TikTok for Vocabulary Teaching by Bella Syifa Zulfia, Yokke Andini

    Published 2023-12-01
    “…The researcher selected video samples randomly with the existing criteria. The criteria used to assess the quality were theories by Brame and Lopez. …”
    Get full text
    Article
  16. 10956

    The Comparative Effect of Teaching Collocations through Literary vs. Non-Literary Content on EFL Learners by Elahe Saedpanah, Adel Dastgoshadeh

    Published 2019-03-01
    “…The selected participants were randomly divided into two experimental groups. Collocations were taught through literary content in one group; the others were instructed via non-literary content. …”
    Get full text
    Article
  17. 10957

    The role of lyrics in music–exercise performance on perceived exertion by Ehsan Zareıan, Karen Baranı, Zahra Pooraghaeı

    Published 2015-07-01
    “…For this purpose, 23 (11 males, 12 females) were selected randomly among volunteered students. The participants underwent physical activity under condition of lyrics music in the first session, same no-lyrics music in the second session and no music in the third session. …”
    Get full text
    Article
  18. 10958

    Early Evaluation of Provenance and Progeny  Trial  Combination  of Araucaria Cunninghamii Age 12 Months in Bondowoso, East Java by Dedi Setiadi

    Published 2011-01-01
    “…The trial was designed as a Randomized Complete Block Design (RCBD) consisted of 80 seedlots, 4 tree-line plots, 4 replicates with spacing of 4 m x 2 m. …”
    Get full text
    Article
  19. 10959

    Vocational High School Female Students’ Opinions About Application Level of Skill Education by Gülçin ÜSTÜN, Duygu SAVAŞ

    Published 2010-05-01
    “…The purpose of this study is to analyze application level of the vocational education given in school/company and enterprises in accordance with Vocational Education Law. 138 senior level students from four different vocational high schools in Ankara were randomly selected and included in this study. Data were collected using survey and scanning methods. …”
    Get full text
    Article
  20. 10960

    Provably secure rational delegation computation protocol by Youliang TIAN, Qiuxian LI, Duo ZHANG, Linjie WANG

    Published 2019-07-01
    “…A provably secure rational delegation computation scheme was proposed to solve the requirement of security issues in rational delegate computation.Firstly,game theory was introduced into delegation computation and according to rational participants behavior preferences analysis,a rational delegate computing game model was designed.Secondly,according to the equilibrium demand of game model and the security requirement of rational delegation computation,a rational security model was established.Thirdly,combining Yao's garbled circuit with its advantages of re-randomization,as well as full homomorphic encryption technology,the rational delegation computation protocol was constructed.And the combination of strategies in the protocol could reach the Nash equilibrium state.Finally,the security of the protocol and the privacy of the input and output were proved according to the rational security model,and the performance analysis shows the validity of the protocol.The proposed rational delegation computing protocol not only satisfies the traditional security,but also considers the behavioral preference of participants,which is more in line with the delegationcomputing mode under the big data environment.…”
    Get full text
    Article