Suggested Topics within your search.
Suggested Topics within your search.
- Rhetoric 5
- English language 4
- Grammar 4
- Attitude to Health 3
- Behavioral Medicine 2
- Handbooks, manuals, etc 2
- Health behavior 2
- Psychology 2
- Animals 1
- Brothers and sisters 1
- Business communication 1
- Business writing 1
- Care 1
- Case studies 1
- Child development 1
- Child rearing 1
- Communication in organizations 1
- Dialectical materialism 1
- Education 1
- Elias (Fictitious character) 1
- English 1
- Examinations, questions, etc 1
- Fantasy 1
- Fiction 1
- Fugitives from justice 1
- Habitat (Ecology) 1
- Health 1
- Infants 1
- Laia (Fictitious character) 1
- Mass media 1
-
10981
Neural network wind speed prediction based on multiple prediction model and nonlinear combination
Published 2021-12-01“…For the problem of strong randomness in space-time characteristics of wind speed in complex mountains,in order to improve the accuracy of wind speed data prediction, a neural network wind speed prediction algorithm based on multi prediction model and nonlinear combination was proposed.In the first layer of the algorithm, the grey wolf optimizer (GWO) and the dynamic convergence factor were used to improve the whale optimization algorithm (WOA), and the improved WOA was applied to the updating process of BPNN weights and bias items.At the same time, the improved whale optimiza-tion algorithm of back propagation neural network (IWOABP), ELM and LSTM three complementary single methods were constructed to build a combination prediction method, and on this basis, the ELM mixing mechanism of the second layer of the algorithm was utilized to learn the relationship between the first layer and the final result in a non-linear way.Simulation results show that compared with BPNN, WNN and GWOBP, the proposed algorithm has lower prediction errors.…”
Get full text
Article -
10982
Blockchain efficient Byzantine fault tolerance consensus algorithm for IIoT
Published 2024-05-01“…Nodes with high credit were randomly selected as the master node by the adaptive master node algorithm, ensuring its security. …”
Get full text
Article -
10983
Image encryption method based on multiple-order fractional discrete Tchebichef transform and generating sequence
Published 2018-05-01“…Fractional transform based image encryption methods have been widely studied in recent years.However,most of the existing fractional transform based image encryption methods are defined in the complex field.Thus,the encrypted images contain both phase and amplitude information,which is not conducive to transmission and storage.Moreover,some encryption methods that meet the requirements of reality-preserving have problems of relatively single keys,lacking of sensitivity and so on.An image encryption method was proposed based on multiple-order fractional discrete Tchebichef transform and generating sequence.The proposed method used randomly generated row and column vectors and generating sequence generated by Chaotic sequences as keys to encrypt images,which not only satisfied property of reality-preserving transmission but also greatly expanded the key space.The experimental results further demonstrate that the proposed encryption method can resist a variety of attacks,and decrypted images are almost non-distored,which indicate excellent encryption effect,sufficient security and robustness of the method.…”
Get full text
Article -
10984
A law of meaning
Published 2025-01-01“…This article rejects the canonical ideal of a one-to-one correspondence between meaning and marker and proposes a set-theoretical and optimality-based law for the relationship between meaning and its markers which allows for distinguishing true markers (such as not, no, never for negation) from otherwise associated items (such as negative polarity items as but, any): a meaning is expressed by the set of non-randomly recurrent markers that together are the best collocation of that meaning. …”
Get full text
Article -
10985
Web plug-in paradigm for anti-DoS attack based on end hopping
Published 2017-10-01“…The end hopping technology is a proactive network defense technology proposed to mitigate the network attack.By changing the IP address,port and other information in the communication pseudo-randomly to achieve the purpose of confusing the attacker.The plug-in mechanism based on the end hopping technology was introduced,and it was applied to the field of Web protection.This plug-in was designed to confuse and interfere with attackers.The plug-in model was divided into two working modes,which are non-end-hopping mode and end hopping mode.The plug-in according to the instructions of the UDP spokesman to switch its own work mode and when the communication link is safe and reliable,it choose the fist mode which can reduce the cost of services.Another,when the network is attacked,the plug-in switches to the end hopping mode to ensure the safety of communications.The experimental results show that the plug-in mechanism based on end hopping has high service and security performance under SYN Flood attack and UDP Flood attack.…”
Get full text
Article -
10986
Pilot Study of Ofloxacin and Interferon-Alpha Combination Therapy for Chronic Hepatitis C without Sustained Response to Initial Interferon Therapy
Published 1997-01-01“…Twenty patients were assigned randomly to two groups. …”
Get full text
Article -
10987
Fuzzy Based Design for Third-Party Pipeline Failures in the Niger Delta Region of Nigeria
Published 2015-07-01“…Based on this, the fuzzy model was designed, using MATLAB fuzzy toolbox to develop a hypothetical simulation which simply involves the feeding of randomly generated values between 0 and 1 to the controllers. …”
Get full text
Article -
10988
A Study of the Usage of Artificial Intelligence in Scientific Research and Education
Published 2025-01-01“…Ilie mam problems are the randomness and the nature of Blackbox, and the general solving method is to add a part of the model to let the model “understand” the principles and theorems that are in the field. …”
Get full text
Article -
10989
Coliform contamination on faucet surface of water vending machines in Klang Valley
Published 2020-05-01“…In this study, 100 water vending machines were randomly selected from 10 districts of Klang Valley. …”
Get full text
Article -
10990
Effect of Early Period of Postoperative Rehabilitation in Individuals with Transverse Patellar Fractures Treated by Tension Band with Kirschner
Published 2016-02-01“…Objective:To evaluate the effect of one-to-one exercise therapy for transverse patellar fractures in early preriod of postoperation of tension band with kirschner wire fixation.Methods:Thirty-five consecutive patients with transverse patella fractures treated by tension band and kirschner wires were randomly assigned to rehabilitation group (<italic>n</italic>=18) or control group (<italic>n</italic>=17). …”
Get full text
Article -
10991
Physical-layer security transmission method based on spatial modulation with finite alphabet inputs
Published 2015-02-01“…Addressing the problem of wireless physical layer security transmission for finite alphabet input systems,a spatial modulation secure transmission method is proposed.On the basis of information theory,the method utilizes the receive antenna indices of multiple-input multiple-output (MIMO) system to bear information,and randomizes the eavesdropper’s equivalent channel by switching the receive antennas,which can guarantee physical layer security transmission.First,the different receiving performances of the legitimate user and eavesdropper are analyzed in the spatial modulation secure transmission system.Second,the mutual information and secrecy mutual information of the transmission system are calculated,and two sufficient conditions that ensure positive secrecy mutual information are pointed out.Finally,an estimation algorithm of mutual information is provided.Moreover,the symmetry of finite alphabet set is exploited to decrease the computational complexity.Theoretical analysis and numerical simulation results verify the availability of the security transmission method.…”
Get full text
Article -
10992
EFFECTS OF MICROSTRUCTURE ON THE LARGE COMPRESSION BEHAVIOR OF RUBBER FOAMS
Published 2015-01-01“…As a type of typical cellular foams,the macro-mechanical performances of rubber foams are mainly determined by its micro-structure and cell material properties.In the work reported here,several two dimensional( 2D) finite element( FE)models having regularly and randomly arranged elliptical and circular cells were constructed.The effects of cell shapes,cell distributing,and porosities on the hyperelastic large compressive deformations of rubber foams were explored.Obtained FE analysis results show that the compressive stress-strain curves of rubber foams present three deforming regions.The compressive stress-strain curves of circular cell models have longer plateau stage than those of elliptical cell models,and circular cell models have more steady mechanical performances than elliptical cell models do.If worked as shockproof cushions,circular cell structures are thus better than elliptical cell structures.…”
Get full text
Article -
10993
Addition Effect of Red Dragon Fruit Peel Powder (Hylocereuspolyrhizus) on the Characteristics of Young Coconut Jam (Cocos Nucifera)
Published 2024-10-01“… The aim of this study to determine the addition effect of red dragon fruit peel powder on the physical and chemical quality characteristics of young coconut jam and get out the right concentration of making young coconut jam on sensory analysis.This study used a completely randomized design with 5 treatments and 3 replications. …”
Get full text
Article -
10994
Effects of Voids on Concrete Tensile Fracturing: A Mesoscale Study
Published 2017-01-01“…It is found that both the prepeak and postpeak mesoscale cracking in concrete are highly affected by voids, and there is not a straightforward relation between void volume fraction and the postpeak behavior due to the randomness of void distribution. The fracture pattern of concrete specimen with voids is controlled by both the aggregate arrangement and the distribution of voids, and two types of failure modes are identified for concrete specimens under uniaxial tension. …”
Get full text
Article -
10995
Effects of Growth Hormones on Sprouting and Rooting of <i>Jatropha Curcas</i> l. Stem Cuttings
Published 2013-07-01“…The experiment was laid out as complete randomized design with three treatments replicated three times. …”
Get full text
Article -
10996
Parenting Styles and the Development of Socio-Emotional Regulation Skills in Preschool Children
Published 2024-10-01“…Two hundred (200) Preschool respondents were randomly selected from ten (10) pre-primary schools; five (5) public and five (5) private schools. …”
Get full text
Article -
10997
Research on Reactive Power Optimization Control Method for Distribution Network with DGs Based on Improved Second-Order Oscillating PSO Algorithm
Published 2023-01-01“…With the increasing penetration of distributed generation (DG) in the distribution network, the original network structure of the distribution network has been changed. In addition, the randomness and intermittency of renewable power generation will also have an impact on the voltage and power flow of the distribution network. …”
Get full text
Article -
10998
Efficient heuristic algorithm for the mobile sink routing problem
Published 2011-01-01“…In large-scale monitoring region,randomly deployed wireless sensor networks may not be fully connected with high probability.Using mobile sink for data collection is one of the feasible solutions.Mobile sink shortest routing prob-lem can be regarded as a special case of TSP with neighborhoods(TSPN) problem,since the neighborhoods are the radio ranges of the sensor nodes,which can be modeled as possibly overlapped disks with diverse sizes.This kind of TSPN problem has no polynomial algorithms so far.To handle it,a novel approximation algorithm was proposed,which first forms a "racetrack" by utilizing the non-intersecting loop property of TSP routes,and then through the inner lane heuris-tic,the bend heuristic and the shortcut searching,the algorithm can find an approximation solution within O(n2) computa-tion time.The formal proofs and the large-scale simulations all verify that our algorithm can achieve a good approxima-tion ratio and can be more efficient than the related algorithms.…”
Get full text
Article -
10999
Les jardins et l’esthétique de Kobori Enshū : La structure du kirei sabi
Published 2012-07-01“…In this article, we aim at explaining that the special feature of Kobori Enshū’s art is not in the synthesis but, on the contrary, that it lays in the randomness and the movement linked to the meeting of different cultural spheres – in other words, to the plurality which is inherent in opposition.…”
Get full text
Article -
11000
Evaluation of three German search engines: Altavista.de, Google.de and Lycos.de
Published 2004-01-01“…The test panelists were based on a collection of 50 randomly selected queries, and relevance assessments were made by independent jurors. …”
Get full text
Article