Suggested Topics within your search.
Suggested Topics within your search.
- methods 56
- Moral and ethical aspects 26
- Research 22
- Methodology 17
- Statistical methods 10
- Study and teaching 10
- Mass media 9
- Professional ethics 7
- therapy 7
- Communication 6
- History 6
- Legal ethics 6
- Management 6
- Physical Examination 6
- Social sciences 6
- diagnosis 6
- Anatomy 5
- Child 5
- Ethics 5
- Extremities (Anatomy) 5
- Human anatomy 5
- Information technology 5
- Law 5
- Public administration 5
- nursing 5
- Abdomen 4
- Biochemistry 4
- Business ethics 4
- Chest 4
- Classification 4
-
2341
Applications of Machine Learning Methods in Complex Economics and Financial Networks
Published 2020-01-01Get full text
Article -
2342
A congestion control method based on loading-feedback in MTC
Published 2016-11-01“…Through analyzing the access efficiency of machine type communication(MTC)devices in LTE-Advanced system,a loading-feedback control method was proposed.The current access load was estimated and the load of next access slot were calculated using the preamble state information,and the access control parameters for MTC device were adjusted based on the load change dynamically.The good performance of the proposed solution was evaluated by computer simulations.The simulation result shows that the proposed scheme can reduce the impact of nearly simultaneous access of a large number of MTC devices on human-to-human(H2H)devices,decrease the number of retransmissions and improve the access success rate effectively.…”
Get full text
Article -
2343
A Hybrid Algorithm of GA + Simplex Method in the WSN Localization
Published 2015-07-01“…In order to solve the large-error problem in the third phase and the poor position accuracy of the least square method in the weighted DV-Hop algorithm, a hybrid algorithm of GA + simplex method was proposed in this paper. …”
Get full text
Article -
2344
A Bursting Liability Evaluation Method Based on Energy Transfer
Published 2024-01-01“…This paper thus presents a method to evaluate the bursting liability as the product of the energy release ratio and energy transfer ratio and provides a definition for the energy transfer index. …”
Get full text
Article -
2345
PCI planning method based on genetic algorithm in LTE network
Published 2016-03-01“…In order to avoid local optimum and the consumption on time and strength in traditional manual planning,an method of PCI planning based on genetic algorithm(GA-PCIAS)was proposed,the method took full consideration of the PCI planning principle,and the interference matrix was introduced to fitness function to reduce the interference in planned area.The simulation results in an dense area show that GA-PCIAS can improve RS-SINR (reference signal-signal to interference plus noise ratio)comparing with the classical sequential PCI allocation on small-scale base station.…”
Get full text
Article -
2346
A Perspective on Explainable Artificial Intelligence Methods: SHAP and LIME
Published 2025-01-01“…SHapley Additive exPlanations (SHAP) and Local Interpretable Model Agnostic Explanation (LIME) are two widely used XAI methods, particularly with tabular data. In this perspective piece, the way the explainability metrics of these two methods are generated is discussed and a framework for the interpretation of their outputs, highlighting their weaknesses and strengths is proposed. …”
Get full text
Article -
2347
Survey of channel estimation method in delay-Doppler domain for OTFS
Published 2022-12-01“…In order to provide reliable communication service for high-mobility scenarios, 6G can consider DD (delay-Doppler) domain based OTFS (orthogonal time frequency space) as its modulation scheme.By mapping the transmitted symbols onto DD domain and transforming them into TF (time-frequency) domain, OTFS endows all the transmitted symbols with the potential of capturing time-frequency full diversity, effectively improving the performance of communication in time-varying fading channels.Due to the superior properties of DD effective channel, the existing OTFS channel estimation methods were mostly carried out in DD domain.Considering the difference of implementation and application scenarios, existing DD channel estimation methods for OTFS were divided into three categories and overviewed, after which the challenges and potential solutions for current DD channel estimation methods were summarized and analyzed.…”
Get full text
Article -
2348
Location privacy-preserving method in LBS based on Voronoi division
Published 2015-05-01“…In view of low efficiency when the anonymous server faces a large number of users,a cooperative anonymous method is proposed for static and dynamic users respectively.Based on the Voronoi division of the global area,a central server organizes the users in its region to achieve cooperative anonymity,the server needn't construct anonymous region alone for each user,and the burden of the server is reduced.In view of providing actual location when users query from a LBS server,a decrease nearest neighbor query algorithm is proposed.A user's actual location is replaced with a stationary anchor location and gets the points of interest candidate set from the LBS server gradually.By running the algorithm,pre-cise results can be got and avoiding exposure to a user's location privacy.The algorithm can also help to reduce the possi-bility of location inference when the anchor chooses closely to the user.Experiments show that our method can guarantee the user's location privacy,and provide a good working efficiency.…”
Get full text
Article -
2349
Optimal artificial lift methods for small oil field production
Published 2024-01-01Subjects: “…artificial lift methods…”
Get full text
Article -
2350
An Easy-to-Use Method for Assessing Nitrate Contamination Susceptibility in Groundwater
Published 2018-01-01Get full text
Article -
2351
Influence of Electrodes Configuration on Metallized Film Capacitor Performance Metrics
Published 2025-02-01Subjects: “…metallized film capacitor…”
Get full text
Article -
2352
Research on discrete differential solution methods for derivatives of chaotic systems
Published 2024-12-01Get full text
Article -
2353
Fine-grained privacy operation control method for layout documents
Published 2023-05-01“…In view of the problem of privacy information disclosure caused by uncontrolled forwarding in the context of frequent exchange of privacy information, a fine-grained privacy operation control method for layout documents was proposed, which could achieve differentiated fine-grained privacy operation control according to the requirements of the sharer during the sharing process of privacy information.For the received multimodal layout document, the existing privacy operation control strategy was extracted, which combined the current sharer’s use attribute and the receiver’s privacy protection ability and other factors.The privacy operation control strategy was generated iteratively, and an abstract control strategy generation algorithm framework was given.Based on the iterative privacy operation control strategy and combined with specific operation scenarios, the differentiated data-masking control, exchange boundary control and local use control were carried out for different modes of information components, and the abstract privacy operation control algorithm framework was given.A prototype system for privacy operation control of OFD (open fixed-layout document) was developed to verify the above algorithms.The generation and delivery of iterative privacy operation control strategy based on friendship, as well as the differential data-masking control, exchange boundary control and local use control of OFD were implemented in the instant messaging system.…”
Get full text
Article -
2354
Method for Identifying Abnormal Hot Spots on the Surface of Composite Insulators
Published 2024-12-01“…【Objective】To avoid the operational risk of high-voltage transmission lines caused by thermal faults of composite insulators, a method for identifying abnormal hot spots on the surface of composite insulators is studied.…”
Get full text
Article -
2355
New Heuristic Local Search Method for University Course Timetabling
Published 2023-02-01Subjects: “…heuristic method…”
Get full text
Article -
2356
Satellite monitoring of annual US landfill methane emissions and trends
Published 2025-01-01Subjects: “…methane…”
Get full text
Article -
2357
Gear Fault Diagnosis Method Based on Deep Transfer Learning
Published 2023-05-01“…Aiming at the problem of insufficient gear fault samples, a fault diagnosis method of transfer learning based on Hilbert-Huang spectrum and pre-trained VGG16 model is proposed. …”
Get full text
Article -
2358
Wavelet Analysis Method to Solve the Problem of Wireless Location Tracking
Published 2013-10-01Get full text
Article -
2359
Innovation in rural areas – methods to improve the quality of citizens life
Published 2024-11-01Get full text
Article -
2360
Fourier Spectral Method for a Class of Nonlinear Schrödinger Models
Published 2021-01-01“…The Fourier spectral method is applied to approximate the spatial direction, and fourth order exponential time-differencing Runge-Kutta method is used to discrete temporal direction. …”
Get full text
Article