Suggested Topics within your search.
Suggested Topics within your search.
- Entrepreneurship 5
- Management 5
- English language 4
- Business enterprises 3
- Economic development 3
- Industrial management 3
- Information technology 3
- Methodology 3
- Research 3
- Study and teaching 3
- Classroom environment 2
- Communication in education 2
- Effective teaching 2
- Elementary school teaching 2
- Hospitality industry 2
- Inquiry-based learning 2
- Interaction analysis in education 2
- Intercultural communication 2
- Internet in public administration 2
- Internet marketing 2
- Marketing 2
- Moral and ethical aspects 2
- Psychological aspects 2
- Psychology 2
- Public administration 2
- Public relations 2
- Rhetoric 2
- Social networks 2
- Sustainable development 2
- Technical writing 2
-
8341
Data quality optimized online task allocation method for mobile crowdsensing
Published 2020-12-01“…Optimization of the perceived quality and the recruitment of user are two important issues of mobile crowdsensing.As the amount of data increases rapidly,perceived data becomes redundant,and perceived quality is at risk of decreasing.A mechanism of task assignment based on the perceptive quality optimization was proposed to improve the perceived quality under the condition of full coverage.The clustering algorithm was used to evaluate the truth value of the task and quantify the quality of the user data.Based on Thompson sampling algorithm and greedy algorithm,a user recruitment strategy was designed and implemented to optimize the perceived quality on the basis of ensuring the spatial coverage of the task.The performance of Thompson based user recruit (TSUR) algorithm was simulated and analyzed that compared with the existing algorithms of BBTA and basic user recruitment (BUR).Experiments show that in the same area,compared with bandit-based task assignment (BBTA) algorithm and BUR algorithm,the quality of the cumulative sensing data was improved by 16% and 20%,and the spatial coverage was improved by 30% and 22%.…”
Get full text
Article -
8342
Services selection based on trust evolution and union for cloud computing
Published 2011-01-01“…It was difficult for the service consumers to obtain high-quality composite services because of the existence of false or malicious service nodes in cloud computing environment.A novel cloud service-composition method based on the trust span tree was proposed.The trust relationship could be built after many times credible interaction between ser-vices requester and provider,and the trust union would be formed through the credible relationship evolution.So that the uncertain or malicious service should be excluded from the trust span tree,and the service composition would be carried out in a trust environment.At the same time,the measuring strategy of trust relationship among cloud services based on information entropy was designed,which could resolve the deficiencies of the trust parameter analysed by simply weighted angle in the previous studies.The experimental result shows that the method proposed in this paper is more su-perior in credibility and security,comparing to the traditional services selection methods.…”
Get full text
Article -
8343
Intangible heritage as a social construction of authenticity: the example of Tunisian cuisine
Published 2021-07-01“…This reasoning will show that the consumption strategy while on vacation is inevitably linked to daily consumption practices of all the tourists studied, either in a logic of rupture or of continuity. …”
Get full text
Article -
8344
Kinematics Analysis and Multi-objective Scale Synthesis of a New Three Translation Parallel Mechanism
Published 2020-12-01“…Finally,a multi-objective optimization design model is established,with elite retention strategy of rapid and dominate the multi-objective optimization algorithm (NSGA-Ⅱ),the scale synthesis of the structural parameters is carried out,a set of Pareto optimal solutions are obtained by optimization. …”
Get full text
Article -
8345
Electric power industry in the conditions of foreign companies exit
Published 2023-12-01“…Besides, there is need to develop and form new conceptual approaches to the strategy of energy systems development amid forced modernisation of the industry. …”
Get full text
Article -
8346
Construction and typical cases analysis of edge cloud platform for telecom operators
Published 2019-03-01“…Edge cloud technology is the product of ICT integration and also the key technology to support operators in 5G network transformation.Relying on the advantages of abundant communication cloud resources,operators can build edge cloud resource pools on the side of network edges for end users to ensure low delay and high bandwidth business requirements,so as to meet the future business development of high-definition video,VR/AR,industrial internet and internet of vehicles.The overall thinking of operators to build edge cloud platform were focused on,including hardware selection,lightweight virtualization layer,PaaS platform construction and business management scheduling strategy.In the end,several types of services enabled by edge cloud of operators were analyzed and explained,including security monitoring scenarios,CDN sinking,slice customization and service acceleration.In the future,operators will provide edge cloud to end solutions,establish a new industry ecology for 5G,and promote the development of the entire edge cloud industry chain.…”
Get full text
Article -
8347
CH of masonry materials via meshless meso-modeling
Published 2014-07-01“…In the present study a multi-scale computational strategy for the analysis of masonry structures is presented. …”
Get full text
Article -
8348
The state and industrialization in Turkey since the nineteenth century
Published 2024-01-01“…State directed industrialization in developing countries became a common strategy after World War II. The success of a small number of countries in East Asia added new dimensions to the debates on the role of states in taming domestic and international market forces. …”
Get full text
Article -
8349
Attempted Suicide by Massive Warfarin Ingestion Conservatively Managed Using Phytonadione
Published 2016-01-01“…Treatment strategies for acute toxicity following massive ingestion of warfarin are not well described in the literature. …”
Get full text
Article -
8350
Quel développement durable pour le delta du Danube? Enquête à Pardina
Published 2015-05-01“…One of the objectives in terms of sustainable development in this area is to determine the right global strategy to reconcile respect for the biodiversity while insuring economic prosperity and decent living conditions.…”
Get full text
Article -
8351
KSP Polonia Warszawa’s Financial Problems – Analysis of Liquidity and Debt
Published 2013-01-01“…Based on the results of the analysis of liquidity and debt the management should therefore prepare liquidity management strategy. The article is based on the available financial statements of KSP Polonia Warszawa Sportowa Spółka Akcyjna and presents an analysis of its liquidity and debt. …”
Get full text
Article -
8352
Pilot decontamination based on spectrum separation in massive MIMO system
Published 2020-04-01“…In order to overcome uplink pilot contamination,the technical bottleneck of massive MIMO,and different from the existing parallel parameter design strategy for blind pilot decontamination,a hierarchical parameter design method was proposed,which points out that different system parameters have different effects on the exact spectrum separation of the sample covariance matrix of the received signal.In other words,different parameters have different priority.Next,it was found that to achieve spectral separation,the power of the desired signal didn’t have to be higher than the interference,and the difference between the two was more important.Furthermore,in a more practical scenario where the pilot sequence length was less than the number of base station receiving antennas,a numerical algorithm was given for the first time to achieve the above-mentioned exact spectral separation.Since the hierarchical parament design ensures the exact separation of the asymptotic spectrum,the results show that the proposed scheme is more suitable for practical applications than the existing blind pilot decontamination.…”
Get full text
Article -
8353
Optimal Feedback Control of Cancer Chemotherapy Using Hamilton–Jacobi–Bellman Equation
Published 2022-01-01“…In this work, we study a feedback control problem of tumor-immune system to design an optimal chemotherapy strategy. For this, we first propose a mathematical model of tumor-immune interactions and conduct stability analysis of two equilibria. …”
Get full text
Article -
8354
Kinematics Modeling and Simulation of Wheel-foot Hybrid Walking Robot
Published 2021-11-01“…The correctness of the kinematics model obtained from the comparison of Matlab and Adams simulation is verified respectively,and the effectiveness of the body posture adjustment strategy is verified by the Adams/Simulink cosimulation,which lays the foundation for the further design of the wheel-foot hybrid walking robot control system.…”
Get full text
Article -
8355
L’expérimentation sociotechnique fondée sur les sciences comportementales : Un instrument au service de la production de l’acceptabilité sociale ?
Published 2015-12-01“…The latter is part of the state and private sector led strategy for producing the social acceptability of smart grids and their related products, equipments and services. …”
Get full text
Article -
8356
Non-unitarity maximizing unraveling of open quantum dynamics
Published 2025-02-01“…In this work, we introduce a new unraveling strategy that can adaptively minimize the averaged entanglement in the trajectory states. …”
Get full text
Article -
8357
The monetary policy of the Republic of Serbia in comparison with neighboring countries in the period from 2019-2024. years
Published 2024-01-01“…Economic as well as economic progress of each country largely depends on the developed strategy and application of adequate monetary policy, where their mutual dependence permeates and is conditioned by numerous factors that are part of internal and external events. …”
Get full text
Article -
8358
A naïve ontology for concepts of time and space for searching and learning
Published 2007-01-01“…</b> Recorded interview data were fully transcribed and coded using Atlas.ti and analysed following a bottom-up strategy of the constant-comparative technique. <br><b>Results.…”
Get full text
Article -
8359
High-performance federated continual learning algorithm for heterogeneous streaming data
Published 2023-05-01“…Aiming at the problems of poor model performance and low training efficiency in training streaming data of AI models that provide intelligent services, a high-performance federated continual learning algorithm for heterogeneous streaming data (FCL-HSD) was proposed in the distributed terminal system with privacy data.In order to solve the problem of the current model forgetting old data, a model with dynamically extensible structure was introduced in the local training stage, and an extension audit mechanism was designed to ensure the capability of the AI model to recognize old data at the cost of small storage overhead.Considering the heterogeneity of terminal data, a customized global model strategy based on data distribution similarity was designed at the central server side, and an aggregation-by-block manner was implemented for different modules of the model.The feasibility and effectiveness of the proposed algorithm were verified under various data increment scenarios with different data sets.Experimental results show that, compared with existing works, the proposed algorithm can effectively improve the model performance to classify old data on the premise of ensuring the capability to classify new data.…”
Get full text
Article -
8360
Network traffic anomaly detection method based on multi-scale characteristic
Published 2022-10-01“…Aiming at the problem that most of the traditional network traffic anomaly detection methods only pay attention to the fine-grained features of traffic data, and make insufficient use of multi-scale feature information, which may lead to low accuracy of anomaly detection results, a network traffic anomaly detection method based on multi-scale features was proposed.The original traffic was divided into sub-sequences with multiple observation spans by using multiple sliding windows of different scales, and the multi-level sequences of each sub-sequence were reconstructed by wavelet transform technology.Multi-level reconstructed sequences were generated by Chain SAE through feature space mapping, and a preliminary judgment of abnormality was made by the classifiers of each level according to the errors of the reconstructed sequences.The weighted voting strategy was adopted to summarize the preliminary judgment results of each level to form the final result judgment.Experimental results show that the proposed method can effectively mine the multi-scale feature information of network traffic, and the detection performance of abnormal traffic is obviously improved compared with traditional methods.…”
Get full text
Article