Suggested Topics within your search.
Suggested Topics within your search.
-
2021
Osobno je političko u Ženskoj sobi Marilyn French
Published 2024-06-01“…Even though the novel shows that the personal becomes political in the emancipation of the heroine from the constraints of the female private sphere, the novel fails to convey the optimism of broader change in the depiction of Mira’s friends whose lives show that emancipation is a long and difficult journey indeed.Keywords: emancipation narratives, feminist Bildungsroman, The Women's Room, personal is political…”
Get full text
Article -
2022
Research on Chinese predicate head recognition based on Highway-BiLSTM network
Published 2021-01-01“…Aiming at the problem of difficult recognition and uniqueness of Chinese predicate head, a Highway-BiLSTM model was proposed.Firstly, multi-layer BiLSTM networks were used to capture multi-granular semantic dependence in a sentence.Then, a Highway network was adopted to alleviate the problem of gradient disappearance.Finally, the output path was optimized by a constraint layer which was designed to guarantee the uniqueness of predicate head.The experimental results show that the proposed method effectively improves the performance of predicate head recognition.…”
Get full text
Article -
2023
Secure data offloading strategy for multi-UAV wireless networks based on minimum energy consumption
Published 2021-05-01“…To solve the problems of ground passive eavesdropping when ground users offload data to the multi-UAV(unmanned aerial vehicle) edge computing network, a secure data offloading strategy that minimized system energy consumption by jointly optimizing user matching and resource allocation was proposed.Considering the constraints of system delay, communication resources and computing resources, the probability of security interruption was used to restrict the security performance of the data offload process.By using block coordinate descent and successive convex approximation algorithm, the user transmission power, offload factor, UAV computing resource allocation and jamming power were jointly optimized.A pair-wise stable user matching algorithm was proposed to minimize the total energy consumption of UAV system.Simulation results demonstrate that the algorithm can realize the safe offloading of data, and has good performance in energy consumption and delay by comparing with the conventional strategies.…”
Get full text
Article -
2024
Secure data offloading strategy for multi-UAV wireless networks based on minimum energy consumption
Published 2021-05-01“…To solve the problems of ground passive eavesdropping when ground users offload data to the multi-UAV(unmanned aerial vehicle) edge computing network, a secure data offloading strategy that minimized system energy consumption by jointly optimizing user matching and resource allocation was proposed.Considering the constraints of system delay, communication resources and computing resources, the probability of security interruption was used to restrict the security performance of the data offload process.By using block coordinate descent and successive convex approximation algorithm, the user transmission power, offload factor, UAV computing resource allocation and jamming power were jointly optimized.A pair-wise stable user matching algorithm was proposed to minimize the total energy consumption of UAV system.Simulation results demonstrate that the algorithm can realize the safe offloading of data, and has good performance in energy consumption and delay by comparing with the conventional strategies.…”
Get full text
Article -
2025
Design of Two-phase Slug Flow Microreactors Using Reduced Order Flow Model
Published 2025-07-01“…The goal of this study is therefore to develop a model-based methodology for deriving optimal design and operating variables for SFMRs under constraints on production. …”
Get full text
Article -
2026
STUDI EVALUASI PELAKSANAAN DAN KELEMBAGAAN PELAKSANA PROGRAM BENGKULU REGIONAL DEVELOPMENT PROJECT (BRDP)
Published 2005-03-01“… This research aims to explores level of success, constraints and benefits of BRDP on rural poor community. …”
Get full text
Article -
2027
Decarbonizing Aviation: A Comparative Analysis of Power-to-Liquid and Biomass-Derived Sustainable Fuels
Published 2025-01-01“…While promising, PtL suffers from problems of energy inefficiency, production inefficiencies, and financial constraints. …”
Get full text
Article -
2028
Colored Multi-Agent Path Finding: Solving Approaches
Published 2021-04-01“…We also investigate methods for obtaining lower bounds on optimal solutions based on constraint and continuous relaxation techniques.…”
Get full text
Article -
2029
Coordinated beamforming for cognitive multi-cell networks with wiretap channels
Published 2014-11-01“…Owing to the coupling among the vectors to be optimized,the problem becomes non-convex and non-linear.Accordingly,a centralized coordinated beamforming design method was proposed by constraining the leakage interference and using the semi-definite relaxation,and on the base of it,a decentralized algorithm was also proposed by decomposing the centralized design problem into a group of sub-problems on each cell’s base by using dual decomposition.Simulation results show that the proposed schemes make effective reduction in power consumption while guarantee the legal users’ secrecy rate requirement and the cognitive interference constraint.Moreover,the proposed decentralized method not only reduces the computational complexity,but also has the same performance as the centralized algorithm.…”
Get full text
Article -
2030
Low-carbon operation strategy of AC/DC hybrid distribution network considering demand response and distributed robust game
Published 2025-03-01“…Column and constraint generation (CCG) algorithm is used to decompose the model into master-slave problems to solve the model. …”
Get full text
Article -
2031
Fault Tolerance of Oscillatory Neural Network: Device Oscillator-Based Small Network to Digital Oscillator-Based Large Networks
Published 2025-01-01“…This work illustrates the fault tolerance of the ONN in solving constraint optimization problems such as vertex coloring and digit recognition problems. …”
Get full text
Article -
2032
A balanced sensor scheduling for multitarget localization in a distributed multiple-input multiple-output radar network
Published 2021-07-01“…In this article, we consider the problem of optimally selecting a subset of transmitters from a transmitter set available to a multiple-input and multiple-output radar network. …”
Get full text
Article -
2033
Multi-User Task Offloading Strategy in RIS-Aided Multi-AP Mobile Edge Computing Networks
Published 2025-01-01“…For the first link, the objective function and the latency constraint are relaxed to render the problem more tractable. …”
Get full text
Article -
2034
Physical layer security of MIMO wireless systems with adaptive modulation
Published 2023-07-01“…To solve the problems of low spectral efficiency and poor performance of physical layer security (PLS) in single-input single-output (SISO) wireless systems with adaptive modulation in the presence of an active eavesdropper, multiple-input multiple-output (MIMO) wireless systems with secure adaptive modulation (SAM) were proposed.The design idea was to improve the spectral efficiency of the main channel by antenna diversity technology, which used the transmit antenna selection (TAS) at the transmitter and the maximal ratio combining (MRC) at the legitimate receiver to improve the signal-to-noise ratio.Simultaneously, the PLS of the legitimate receiver was guaranteed by limiting the bit error rate of the active eavesdropper so that it could not demodulate the confidential information from the main channel.With the joint constraints of the average transmission power and PLS, the optimal switching thresholds and the analytical expressions of spectral efficiency and the eavesdropper’s average bit error rate of the SAM-MIMO systems were derived.Numerical and simulation results show that SAM systems using TAS/MRC technology can not only improve the spectral efficiency of the main channel, but also ensure the PLS against the active eavesdropper, compared with the SAM-SISO systems.…”
Get full text
Article -
2035
Impact of blockchain technology on supply chain collaboration: A case study of JD Chain
Published 2024-01-01“…By leveraging distributed ledgers, consensus mechanisms, smart contracts, and cryptographic techniques, blockchain effectively tackles problems related to privacy protection, information traceability, and authenticity within traditional supply chains. …”
Get full text
Article -
2036
A Scalable Multi-Target Tracking Algorithm for Wireless Sensor Networks
Published 2012-09-01“…The proposed algorithm has been successfully applied to real-time multi-target tracking problems using wireless sensor networks.…”
Get full text
Article -
2037
Method for discriminator curve synthesis of angular systems of multi-channel radars
Published 2019-09-01Get full text
Article -
2038
Delay and energy minimization for MEC-based secure communication
Published 2020-11-01“…Considering a physical-layer-security-aided confidential document transmission problem,a secure transmission strategy was proposed where the base station equipped with a mobile edge computing (MEC) server served as a relay to help compress,forward,and decompress.First,the Poisson point process was used to calculate the secure transmission probability for the scenario with multiple potential eavesdroppers.Then,a delay and energy minimization problem was formulated under a constraint on the two-hop secure transmission probability.The optimal compression and decompression scheme was obtained using the one-dimensional search combined with linear programming.Simulation results show that the document compression is necessary for the link with small achievable secrecy rate under a given secure transmission probability; otherwise,the document should be directly transmitted without compression.…”
Get full text
Article -
2039
A location-dependent task assignment mechanism in vehicular crowdsensing
Published 2016-09-01“…To solve this challenge, we first establish mathematical model of multi-vehicle collaborative task assignment problem, considering vehicle’s time budget constraint, location, and multiple requirements of sensing tasks. …”
Get full text
Article -
2040
Propuesta de un modelo matemático para la optimización de la producción. Una aplicación en la industria ladrillera de San José Cúcuta
Published 2023-01-01“…To this end, linear programming is being used to improve operational efficiency in the manufacturing of its products by finding optimal solutions to planning problems. To achieve optimal production, a linear programming mathematical model was used as a key optimization tool. …”
Get full text
Article