-
641
Design and implementation of a layer-II fast handoff protocol in emergency communication system
Published 2017-11-01“…Immobility,limited bandwidth and poor support to real-time service are common shortcomings in traditional emergency communication system.Moreover,the data transmission speed is highly limited in high-speed services by the long handoff delay and fixed handoff trigger threshold when the mobile terminals moving between network nodes.In order to overcome these shortcomings,a new emergency communication system with multifrequency hierarchical clustering structure was designed.A new layer-II fast handoff protocol was designed for such network structure to deal with handoff issue in real-time services.In this handoff protocol,the handoff trigger threshold is self-adaption based on the moving velocity of mobile terminals.…”
Get full text
Article -
642
A Speech Recognition Method Using Competitive and Selective Learning Neural Networks
Published 1998-01-01“…In this paper,a basic principle called the equidistortion principle for vector clustering is theoretically derived by using Gersho’s asymptotic theory,and a new competitive learning algorithm is prorosed with a selection mechanism,called the CLS(Competitive and Selective Learning)algorithm.Because the selection mechanism enables the system to escape from local minima,the proposed algorithm can obtain better performance without a particular initialization procedure.A new neural network algorithm with competitive learning and multiple safe rejection schemes are proposed in the context of parallel,self organizing,hierarchical neural networks(PSHNN).The input of PSHNN is a subset of the output scores of HMM.The experimental results indicate that the recognition ability of the method based on competitive learning neural network is higher than that of the traditional HMM method.…”
Get full text
Article -
643
Complicating American Manhood: Marge Piercy’s Woman on the Edge of Time and the Feminist Utopia as a Site for Transforming Masculinities
Published 2020-07-01“…Through an analysis of masculinities in one such utopia, Marge Piercy’s Woman on the Edge of Time (1976), this essay traces how contemporary female speculative writers envision and propose new masculinities that, in opposition to their patriarchal counterparts, reject hierarchical perspectives and instead value equality, fraternity, and freedom.…”
Get full text
Article -
644
Self-configuration power scheme for femtocell base station
Published 2012-02-01“…To solve the issue that new femtocells deployed in hierarchical networks would introduce a series of interference,a power self-configuration scheme was proposed.Various kinds of interference that femtocell base station might receive from other base stations were analyzed.Then an optimal power issue was formulized,as was able to maximize the femtocell system capacity on the condition guaranteeing the existing users'normal communication.And the optimal solution was also obtained with lagrange multiplier method.The simulation results show that the proposed scheme cuts down the transmit power of femtocell,increases the throughput and reduces interference for existing users,comparing with the scheme based on received signal strength.…”
Get full text
Article -
645
Decentralized credit system based on blockchain and its application
Published 2019-08-01“…A decentralized credit system was proposed and its construction application was given.Decentralized credit system could be constructed by expanding the transaction structure of “digital currency commodity” based on block chain,expanding the function of consensus protocol and adding specific accounts.Also,the decentralized credit system was applied to the PKI enhancement and supervision system IKP so that IKP system did not need global fund in operation.Moreover,by introducing the hierarchical “virtual currency commodity” supply adjustment mechanism in the decentralized credit system to alleviate the difficulty of regulating the “virtual currency commodity” supply of “digital currency commodity” based on block chain,the precise “virtual currency commodity” supply regulation can be achieved.…”
Get full text
Article -
646
Explicit Design of Innovation Performance Metrics by Using Analytic Hierarchy Process Expansion
Published 2014-01-01“…The paper presents the explicit and objective measurement method for innovation performances by using the extensive version of Analytic Hierarchy Process (AHP). A hierarchical framework is constructed for the innovation performance criteria and giving the guideline for innovation performance of companies. …”
Get full text
Article -
647
Research on mapping method of logical carrying network across multiple domains
Published 2012-08-01“…In order to solve the mapping problem of logical carrying network across multiple domains,a hierarchical linear program model was presented,which aims to minimize the cost of mapping.Based on this model,a mapping algorithm for logical carrying network across multiple domains was designed using primal decomposition and subgradient optimization technique.The correctness of this method was proved by theoretical analysis,and the validity of the proposed method was assessed by a collection of numerical simulation experiments through the performance of convergence and runtime,as well as mapping request acceptance ratio and revenue in a dynamical network environment.…”
Get full text
Article -
648
Legal Status of the State Language in Lithuania after the Restoration of Independence
Published 2024-03-01“…It reviews the legal acts that establish the requirements for the correctness and use of the language, and presents a hierarchical system of the related legal acts. The institutions responsible for language policy and protection are described. …”
Get full text
Article -
649
Multi-cell multi-user downlink beam forming design considering transceiver impairment
Published 2013-12-01“…Multi-cell multi-user downlink beamforming schemes considering transceiver impairments were developed,with the objective of minimizing the maximum mean square error (MSE) and the sum of MSE of all users.The optimiza-tion problem was transformed into a second-order cone programming(SOCP) standard form,and a hierarchical iterative algorithm was developed to solve the original problem.Compared with the traditional beamforming methods developed for ideal transceivers,numerical results show that our proposed optimization algorithms greatly reduce the impact of im-pairments and improve the system performance.…”
Get full text
Article -
650
Building a Partnership World: Imagining a Future of Cooperation and Equity
Published 2024-12-01“…This paper explores the transformative potential of a partnership-based society, where cooperative relationships replace hierarchical structures, and mutual respect and collaboration become the cornerstones of social, economic, and environmental interactions. …”
Get full text
Article -
651
Applications of a big data platform based on PaaS
Published 2018-01-01“…As a platform of data storage,processing,and service,big data platform needs to support internal and external various big data applications.A solution applied PaaS technology to the big data platform was proposed.Details of the key technical solutions such as the architecture of PaaS cloud computing platform,hierarchical scheduling scheme,multi-tenant management and global scheduling of Hadoop tasks were described.It was proved that the platform could remarkably improve big data application development efficiency and help application deployment fast.In the meantime,good elastic scaling capability can effectively improve big data application system resource utilization.…”
Get full text
Article -
652
The many dimensions of the digital model
Published 2020-06-01“…Scale and measure are fundamental criteria for interpreting and representing the parts of a unicum linked together in a hierarchical or interconnected relationship. This gives rise to the entire asset of a project, where various disciplines, or spheres of knowledge, integrate to generate models that make it possible to simulate its construction and predict its impact. …”
Get full text
Article -
653
Collection policy refining method for threat monitoring in complex network environment
Published 2019-04-01“…Personalized collect policy is one of the necessary conditions for effectively monitoring threats in the complex network environment.However,differences in security requirements and threat types make it difficult to effectively generate personalized collect policy.To address the above problem,a collection policy automatic refinement method was designed.Firstly,a hierarchical model of collection policy was proposed.Then,by transforming the policy refinement into a nonlinear optimization problem,a genetic algorithm was designed to balance between collection revenue and collection cost.Finally,simulation experiments verify that according to the requirements of high-level monitoring,the acquisition scheme can be automatically generated.…”
Get full text
Article -
654
Degree distribution optimization for LT codes and its application in link maintenance of cognitive radio
Published 2018-04-01“…The degree distribution has a great influence on the performance of Luby transform (LT) codes.Based on the link maintain model of cognitive radio system,the novel degree distribution of LT codes was obtained by using the THOA (two-layer hierarchical optimization algorithm) to combine the IPD (improved poisson distribution) which achieved high decoding success rate with low overhead and the robust soliton distribution (RSD) which achieved high decoding success rate with high overhead.Simulation results show that the proposed method with application to link maintenance in cognitive radio system can improve the reliability and efficiency of secondary communication.…”
Get full text
Article -
655
Leveraging machine learning for enhanced reservoir permeability estimation in geothermal hotspots: a case study of the Williston Basin
Published 2025-01-01“…In comparison to the other clustering methods, the hierarchical clustering method showed the best performance by showing a strong correlation between the actual and predicted permeability values. …”
Get full text
Article -
656
Exploring voice barriers and subsequent practices among frontline healthcare workers in Pakistan: a comprehensive mixed-methods analysis
Published 2025-01-01“…A questionnaire survey was used for data collection. Then, multistage hierarchical regression analysis was employed for data analysis. …”
Get full text
Article -
657
Smartphone overuse and distraction: which relationship with general well-being across different generations?
Published 2025-02-01“…Analyses were conducted using ANOVA, correlations, and hierarchical regression to explore the relationships between these variables. …”
Get full text
Article -
658
How the nursing work environment moderates the relationship between clinical judgment and person-centered care among intensive care unit nurses.
Published 2025-01-01“…The collected data were analyzed using hierarchical multiple regression and PROCESS macro Model 1, with a 95% bias-corrected bootstrap confidence interval to verify moderating effects.…”
Get full text
Article -
659
Ecological analysis of plant community structure and soil effects in subtropical forest ecosystem
Published 2024-12-01“…Soil samples were collected and analyzed for key physicochemical parameters, while multivariate statistical methods, including hierarchical clustering and ordination, were applied to examine the relationships between vegetation structure and environmental factors. …”
Get full text
Article -
660
Disentangling the effects of intermittent faecal shedding and imperfect test sensitivity on the microscopy-based detection of gut parasites in stool samples.
Published 2024-12-01“…Using replicate test results and multilevel hierarchical models, we estimated per-sample Giardia shedding probability at [Formula: see text] and observer-specific test sensitivities at [Formula: see text] and [Formula: see text]. …”
Get full text
Article