random combination
Recently Published Documents


TOTAL DOCUMENTS

31
(FIVE YEARS 8)

H-INDEX

6
(FIVE YEARS 0)

Author(s):  
Yubin Zheng ◽  
Jie Song ◽  
Yingzhi Zhang ◽  
Shengdong Hou ◽  
Jun Zheng

Universal Generating Functions and Lz transformations have been widely used in the reliability modeling of multi-state systems. In order to solve the problem of complex calculations due to the dense random combination of multi-state performance parameters in the Lz transformation, a screening function is defined before the Lz transformation, and the screening function is combined with the performance threshold to screening the state performance parameters in advance, and the process is simplified through the screen matrix and the screen block diagram, effectively reduce the combined dimensions and quantity, improve the efficiency of reliability analysis, and combine with specific examples for application verification.


2021 ◽  
Vol 35 (12) ◽  
pp. 1477-1484
Author(s):  
Chao Huang ◽  
Yan Zhao ◽  
Wei Yan ◽  
Yanxing Ji ◽  
Qiangqiang Liu ◽  
...  

In this paper, a twisted-wire pairs (TWP) with random non-uniform twisting is established. It is divided into a complete pitch segment and a noncomplete pitch segment by the ratio between the pitch and the length. The randomness of the actual TWP cable is accurately simulated by the following methods: 1) random combination of complete pitch segments; 2) random combination of non-complete pitch segments; 3) random combination between 1) and 2). Based on the TWP model, an equivalent multi-conductor transmission lines (MTLs) model can be obtained. The neural network algorithm is introduced to describe the complex relationship between the arbitrary position of the TWP and the per-unit-length (p.u.l) parameter matrix. In addition, the crosstalk and the common-mode (CM) and differential-mode (DM) noise under field-to-wire coupling are predicted. The numerical results show that crosstalk and CM/DM noise in TWP cable are susceptible to the twisted pitch at high frequencies. Compared with full-wave simulation, the accuracy of the proposed method is proved.


Author(s):  
Akinori Abe

In several papers, the author has discussed the possibility of the computational literary work generation. That was based on Julia Kristeva's the concept of the intertextuality. This very simple application was achieved by random combination of the selected words/phrases/letters. It is a simple technique such as the cutup method. The author showed even such a simple method could generate literary works that can be regarded as not so bad literary works. However, for more intelligent generation, the author introduced abduction. By abduction, it is possible to guarantee the logical consistency and coherency. However, it does not care the very cognitive aspects such as beautiful, sentimental, and valuable, which will be very important factor in the literature. In this chapter, the author will discuss to add such cognitive aspects to the logical generation of literary works.


2020 ◽  
Author(s):  
Yuhang Huan ◽  
Jing Wei ◽  
Tong Su ◽  
Youhe Gao

AbstractBackgroundMajor depressive disorder (MDD) is a prevalent complex psychiatric disorder with a high prevalence rate. Because MDD is a systemic multifactorial disorder involving complex interactions and disturbances of various molecular pathways, there are no effective biomarkers for clinical diagnosis. Urine is not subjected to homeostatic control, allowing it to reflect the sensitive and comprehensive changes that occur in various diseases. In this study, we examined the urine proteome changes in a CUMS mouse model of MDD.MethodsMale C57BL/6 mice were subjected to chronic unpredictable mild stress for 5 weeks. The tail suspension test (TST) and sucrose consumption test (SCT) were then applied to evaluate depression-like behaviors. The urine proteomes on day 0 and day 36 in the CUMS group were profiled by liquid chromatography coupled with tandem mass spectrometry (LC-MS/MS).ResultsA total of 45 differential proteins were identified, 24 of which have been associated with the pathogenic mechanisms of MDD, while 10 proteins have been previously suggested as MDD biomarkers. There was an average of two differential proteins that were identified through 1048574 random combination statistical analyses, indicating that at least 95% of the differential proteins were reliable and not the result of random combination. The differential proteins were mainly associated with blood coagulation, inflammatory responses and central nervous system development.ConclusionsOur preliminary results indicated that the urine proteome can reflect changes associated with MDD in the CUMS model, which provides potential clues for the diagnosis of clinical MDD patients.


2020 ◽  
pp. 102-102
Author(s):  
Balázs András-Tövissi ◽  
László Kajtár ◽  
József Nyers

For buildings with ceiling heating and mechanical ventilation, it is extremely important to know the combined effect of the draught and the radiant thermal asymmetry caused by a warm ceiling. There is plenty of literature offering separate descriptions of the dissatisfaction caused by draught and warm ceilings, but research on the combined effect of these two local discomfort factors is incomplete. In order to fill in this gap, human subject measurements were conducted involving 20 subjects, 10 men and 10 women, who were asked to complete questionnaires on thermal sensation, while being exposed to a random combination of 5 asymmetries and 2 draughts. Analyzing the results obtained this way made it possible to evaluate the combined effect of the draught and radiant thermal asymmetry on thermal comfort. The most important outcome of the research is the mathematical description of the expected dissatisfaction rate and the presentation of the differences depending on gender.


Adeptus ◽  
2019 ◽  
Author(s):  
Kamil Czaiński

Ponašymu – the mixed language code of Těšín SilesiaThis article describes the development of the linguistic situation in the border region of Těšín Silesia throughout its history, with particular emphasis on the so-called ponašymu – a mixed language code used in the Czech part of the region. It is based on a random combination of forms of the traditional Těšín dialect with the standard Czech language and, to a lesser extent, elements borrowed from the Polish and Slovak languages and from neighbouring Moravian dialects. An important element of the study is the analysis of selected material collected by the author during fieldwork in August 2018. Ponašymu – mieszany kod językowy czeskiego Śląska CieszyńskiegoArtykuł opisuje rozwój sytuacji językowej w pogranicznym regionie Śląska Cieszyńskiego na przestrzeni dziejów, ze szczególnym uwzględnieniem tzw. ponašymu – mieszanego kodu językowego używanego w czeskiej części regionu. Oparty jest on na dowolnym łączeniu form tradycyjnego śląskiego dialektu cieszyńskiego ze standardowym językiem czeskim i w mniejszym stopniu elementami zapożyczonymi z języka polskiego, słowackiego i sąsiednich gwar morawskich. Ważnym elementem pracy jest analiza wybranych materiałów zebranych przeze mnie w trakcie badań terenowych w sierpniu 2018 r.


Author(s):  
Wenbo Huang

Abstract Based on the extreme value of the primary loads of ship hull girder instead of characteristic values, the more reasonable load combination factors are defined. In order to evaluate the random variation of newly defined load combination factors, based on Ferry-Berges & Castanheta (FBC) and Poisson square wave models, the still water bending moments (SWBM), vertical wave bending moments (VWBM) and their combined processes are simulated to get the random realizations of load combination factors. The statistical analysis results show that the load combination factors take the value of 1 with the highest probability and can be well fitted by the Weibull distribution. Such information should be incorporated appropriately in the reliability analysis of ship hull girder.


2018 ◽  
Vol 2018 ◽  
pp. 1-6
Author(s):  
Eunhye Yang ◽  
Hyunjong Yu ◽  
Jun-Young Park ◽  
Kyung-Min Park ◽  
Pahn-Shick Chang

Although liposomes have been used as a nutrient delivery carrier in the pharmaceutical, cosmetic, and food industries, they still suffer from the critical issue caused by the use of halogenated solvents (e.g., chloroform), which may be harmful to humans. Nonhalogenated solvents have been screened as candidate substitutes for chloroform based on their physicochemical properties. However, none of the candidates examined to date could form stable inverted micelles when used alone. Here, to obtain physicochemical properties similar to chloroform, combined mixtures were prepared using various ratios of each candidate. Based on the results of random combination trials with numerous candidates, ethyl acetate: n-hexane = 4 : 1(v/v) was selected as the optimum ratio because it could form stable inverted micelles and a transparent liposome solution without phase separation. The ethyl acetate and n-hexane mixture are a potential substitute for chloroform, which may resolve concerns regarding the toxicity of residual halogenated solvents in lipid nanovesicles.


2018 ◽  
Author(s):  
Irfan

The exchange of information data in cyberspace is very much done today and very vulnerable to the danger of abuse and tapping by irresponsible parties due to the weakness of the security process. Action abuse when exchanging information can be solved by using cryptographic techniques. Cryptography itself has a variety of algorithms, such as vigeneee cipher, hill cipher, GOST, AES and others. Cryptographic techniques can secure data in the form of text with the process of encryption and deskrpsi so that data will be safe. GOST algorithm is also the same use with vigenere cipher algorithm. This study describes the combination of these two algorithms in securing secret or important text type data. Text type data security based on the combination of these two methods is done by encrypting the data first based on the vigeneere cipher algorithm, then the cipher vigenaerediencryption back based on the GOST algorithm, resulting in the cipherakhir completely random. Combination of these two methods is expected to be used as one solution in optimizing data security, especially confidential data.


Sign in / Sign up

Export Citation Format

Share Document