Showing 301 - 320 results of 740 for search '"Given name', query time: 0.05s Refine Results
  1. 301

    Hesitant Bipolar-Valued Fuzzy Soft Sets and Their Application in Decision Making by Jin-Ying Wang, Yan-Ping Wang, Lei Liu

    Published 2020-01-01
    “…Secondly, the concept of hesitant bipolar-valued fuzzy soft set is given, and the algorithms of complement, union, intersection, “AND,” and “OR” are defined. …”
    Get full text
    Article
  2. 302

    A solution for 5G indoor and outdoor co-frequency network interference by Xirui GUO, Tao ZHANG, Qiang ZHANG, Dongyang WANG, Yan YANG

    Published 2022-02-01
    “…5G indoor and outdoor deployment with the same frequency will lead to the decline of network coverage performance and user service experience.The causes of indoor and outdoor interference with the same frequency was systematically analyzed.The principle of three indoor and outdoor co-channel interference solutions, namely PRB random interference solution, indoor and outdoor beam cooperative interference solution and indoor multi beam interference solution were studied.The results show that the PRB random interference solution has the best interference suppression effect when the traffic load is about 30%.When the indoor and outdoor beam cooperation function is turned on when the adjacent area of the outdoor macro station is no-load or high load (70%), the improvement of the downlink rate is more obvious.When the indoor multi-beam function is turned on, the downlink rate is significantly higher than that of single beam.Finally, the deployment suggestions of co-channel interference control scheme were given.…”
    Get full text
    Article
  3. 303

    Twenty years of EU accession: learning lessons from Central and Eastern European agriculture and rural areas by Attila Jambor, Matthew Gorton

    Published 2025-01-01
    “…However, countries capitalised on the opportunities given by EU membership to differing extents. Specifically, the Baltic countries and Poland performed best post-accession, while Croatia, Slovenia, and Hungary witnessed much slower rates of convergence. …”
    Get full text
    Article
  4. 304

    Modular design towards the circular economy – From ‘making to unmake’ to ‘making to remake' by Lucia Pietroni, Alessandro Di Stefano, Daniele Galloppo

    Published 2023-12-01
    “… Given the recent debate regarding the transition to the Circular Economy, Design for Modularity strategies play a decisive role in the process of transforming the current economic model from linear to circular. …”
    Get full text
    Article
  5. 305

    The Use of Natural Language Processing Model in Literary Style Analysis of Chinese Text by Ye Jinze

    Published 2025-01-01
    “…The model is capable of analysing the literary style of given Chinese text by quantifying the literary style of the text on the basis of five fundamental elements, namely literary grace, sentiments, momentum, climate and lingering charm. …”
    Get full text
    Article
  6. 306

    Toward a Model for Marking up Non-SI Units and Measurements by Naoki Kokaze, Kiyonori Nagasaki, Makoto Gotō, Yuta Hashimoto, A. Charles Muller, Masahiro Shimoda

    Published 2019-06-01
    “…Instead of using the element, which requires a single set of @unit and @quantity, we propose a newly defined set of tags for encoding idiosyncratic measurement semantics, namely (model.encodingDescPart), (model.global and contained by ), (model.measureLike), and a relevant attribute @factor (which shows factors of numerical values given in a referenced element). …”
    Get full text
    Article
  7. 307

    The function of "weeping and gnashing of teeth" in Matthew's gospel by Zoltan L. Erdey, Kevin G. Smith

    Published 2012-06-01
    “…It was discovered that the phrase may have four possible functions, namely (a) a system by which Matthew hoped to make the message of the particular passage unforgettable; (b) a prophetic anticipation of an aspect of the larger shape of history; (c) a linguistic device to increase the degree of emphasis or heighten the force given to the message of eschatological judgment; and (d) a literary connector holding together a number of specific passages of Scripture. …”
    Get full text
    Article
  8. 308

    The Debate on the Concept of the Person in Bioethics by Grzegorz Hołub

    Published 2020-12-01
    “…Initially, it sets out three understandings of the issue, namely the concept of a person in naturalistic philosophy, in the current of communitarianism and in one of the humanistic positions. …”
    Get full text
    Article
  9. 309

    Analyzing Black Hole Super-Radiance Emission of Particles/Energy from a Black Hole as a Gedankenexperiment to Get Bounds on the Mass of a Graviton by A. Beckwith

    Published 2014-01-01
    “…This leads to a fork in the road between two alternatives with the possibility of needing a multiverse containment of BH structure or embracing what Hawkings wrote up recently, namely, a redo of the event horizon hypothesis as we know it.…”
    Get full text
    Article
  10. 310
  11. 311
  12. 312

    Nettree for maximum disjoint paths with length constraint in DAG by Yan LI, You-xi WU, Chun-ping HUANG, Zhi-ying ZHANG, Zhen-xiang ZENG

    Published 2015-08-01
    “…The problem of the maximum disjoint paths in directed acyclic graphs(DAG)was researched which is to find the maximum disjoint paths with length k between two given vertices.A greedy algorithm named greedy path(GP)was proposed to solve the problem.GP transformed a DAG into a nettree with depth k+1 at first.Then the number of root-leaf paths for each node of the nettree was calculated to achieve the number of total paths for each vertex of the DAG.In order to obtain an optimized disjoint path,GP selected the node in the(k+1)th level of the nettree as the current node,and searched for the optimized parent in the usable parents whose number of total paths was minimal.This process was iterated,until there was no disjoint path.The space and time complexities of GP are O(wkn(p+q))and O(kn(p+q)+n<sup>2</sup>).To evaluate the performance of GP,an algorithm which can create artificial DAG with known maximum disjoint paths was also proposed.Experimental results show that GP can get better performance than other competitive algorithms.…”
    Get full text
    Article
  13. 313

    ARS: An Adaptive Retransmission Scheme for Contention-Based MAC Protocols in Underwater Acoustic Sensor Networks by Thi-Tham Nguyen, Seokhoon Yoon

    Published 2015-05-01
    “…In order to address the problem of low performance, we propose a novel adaptive retransmission scheme, named ARS, which dynamically selects an optimal value of the maximum number of retransmissions, such that the successful delivery probability of a packet is maximized for a given network load. …”
    Get full text
    Article
  14. 314
  15. 315

    Research on seed node mining algorithm in large-scale temporal graph by Xiaohong ZOU, Chengwei XU, Jing CHEN, Biao SONG, Mingyue WANG

    Published 2022-09-01
    “…Most of the existing maximizing influence algorithms based on temporal graph were not applicable for large-scale networks due to the low time efficiency or narrow influence range.Therefore, the seed node mining algorithm named CHG combining heuristic algorithm and greedy strategy was proposed.Firstly, based on the time sequence characteristics of information diffusion in temporal graph, the concept of two-order degree of nodes was given, and the influence of nodes was heuristically evaluated.Secondly, the nodes were filtered according to the influence evaluation results, and the candidate seed node set was constructed.Finally, the marginal effect of candidate seed nodes was calculated to solve the overlap of influence ranges between nodes to ensure the optimal combination of seed nodes.The experiments were carried out on three different scale data sets, and the results show that the proposed algorithm can ensure the high influence of the seed node set even though its running time is relatively shorter.And it can achieve a better trade-off between the time efficiency and the influence range of the seed node set.…”
    Get full text
    Article
  16. 316

    The Credit Asset of Enterprise Accounts Receivable Pricing Model by Deshun Xu, Junhai Ma

    Published 2018-01-01
    “…Based on the thinking of holism and reductionism, this paper creatively constructed the credit asset pricing model of enterprises’ accounts receivable, namely, the BEST pricing model, and it was demonstrated effectively. …”
    Get full text
    Article
  17. 317

    From Epiphylogenesis to General Organology by Robert Alexander Gorny, Andrej Radman

    Published 2022-07-01
    “…This outsourcing of memory from the organic changes the conditions for further phylogenetic becomings, given that evolutions continue to be extrinsically organised (‘ex-organised’) by associated technicised milieus. …”
    Get full text
    Article
  18. 318

    Fuzzy Logic for Incidence Geometry by Alex Tserkovny

    Published 2016-01-01
    “…These entities could be labelled by commonly used names of landmarks, water areas, and so forth. Unlike single points that are given in Cartesian coordinates, these geographic entities are extended in space and often loosely defined, but people easily perform spatial reasoning with extended geographic objects “as if they were points.” …”
    Get full text
    Article
  19. 319

    A Cube Analytical Mining Framework for Stream Data by Canghong Jin, Zemin Liu, Minghui Wu, Jing Ying

    Published 2014-09-01
    “…In order to solve the above problems, an advanced sketch based OLAM framework named sketch cube to analyze stream data was proposed. …”
    Get full text
    Article
  20. 320

    A Note on Directional Wavelet Transform: Distributional Boundary Values and Analytic Wavefront Sets by Felipe A. Apolonio, Daniel H. T. Franco, Fábio N. Fagundes

    Published 2012-01-01
    “…By using a particular class of directional wavelets (namely, the conical wavelets, which are wavelets strictly supported in a proper convex cone in the k-space of frequencies), in this paper, it is shown that a tempered distribution is obtained as a finite sum of boundary values of analytic functions arising from the complexification of the translational parameter of the wavelet transform. …”
    Get full text
    Article