Suggested Topics within your search.
Suggested Topics within your search.
-
2081
Energy-efficiency based buffer-aided relay selection scheme in SWIPT
Published 2018-03-01“…Aiming at the problem of buffer-aided half-duplex (HD) relay selection in simultaneous wireless information and power transfer(SWIPT) with energy constraint,energy-efficiency priority based buffer-aided relay selection scheme in SWIPT was investigated.Moreover,SWIPT system energy efficiency was studied,and an appropriate mathematical model was constructed to perform energy efficiency based buffer-aided optimal receive/transmit relay selection in SWIPT.Numerical results show that the proposed scheme effectively reduces SWIPT outage probability and achieves the tradeoff between energy efficiency and outage performance in buffer-aided SWIPT.…”
Get full text
Article -
2082
New NOMA power allocation strategy
Published 2017-10-01“…Non-orthogonal multiple access(NOMA) has been widely used in the research of the fifth generation communication,due to the advantages of improving the spectrum efficiency and data rate.In order to guarantee the service of users,a new power allocation strategy was proposed to improve the fairness of users in the cell edge.According to the proportional fairness method,the goal was to maximize the proportionality fairness factor among the users with the least fairness in multiplexed users.The nonconvex objective function was transformed into convex function,and the optimal solution of problem was obtained by KKT optimal constraint condition.Simulation results show that the new NOMA-based power allocation strategy proposed outperforms the traditional orthogonal multiple access technology (OMA).…”
Get full text
Article -
2083
Research on Security Consensus for a Class of Delayed Discrete-time Multi-agent System
Published 2020-01-01“…Under the constraint of a standard deviation from the expected value, a novel high tolerance security consensus algorithm is proposed, which adopts the neighbors’ delayed information sequence and its own information as well.Through the algorithm,an effective optimal information is selected as the control input, so that the systems can achieve secure consensus under the proposed conditions.The algorithm enhances the systems’ resistance ability to malicious agents, and reduces the topology connectivity requirements of the normal agents in the system. …”
Get full text
Article -
2084
Forward Sensitivity Approach to Dynamic Data Assimilation
Published 2010-01-01“…Model error is assumed to stem from incorrect specification of the control elements. The optimal corrections to control are found through solution to an inverse problem. …”
Get full text
Article -
2085
Organic Amendments Improve the Quality of Coal Gob Spoils: A Sustainable Mining Waste Reclamation Method
Published 2024-10-01“…Coal mine tailings can lead to a range of environmental problems, including toxic metal contamination, soil erosion, acid mine drainage, and increased salinity. …”
Get full text
Article -
2086
Vehicle Reidentification via Multifeature Hypergraph Fusion
Published 2021-01-01“…Vehicle reidentification refers to the mission of matching vehicles across nonoverlapping cameras, which is one of the critical problems of the intelligent transportation system. …”
Get full text
Article -
2087
Low error floor LT coding algorithm by using fixed-length node classification window
Published 2021-09-01“…To solve the problem of high error floor for LT codes in additive white Gaussian noise (AWGN) channels, an improved coding scheme was designed.A fixed-length classification window was used to sort out the information nodes with relatively small degrees.Then these nodes would be forced to participate in the coding process frequently, so that they could obtain sufficiently high reliability.To design the optimal parameters, firstly, the bit error rate (BER) performance of LT codes and the cause of the error floor were analyzed, and the theoretical BER lower bound was introduced as the first constraint.Secondly, the extrinsic information gain loss ratio (GLR) was designed to measure the convergence behavior of the improved LT code, and maximizing the GLR was denoted as the second constraint.Finally, the influence of different parameters on algorithm efficiency and coding complexity were analyzed, and the principle of priority selection of parameters was pointed out as the third constraint.The simulation results show that compared with the conventional LT code, the proposed algorithm can reduce the error floor by nearly three orders of magnitude.Besides, the designed LT code outperforms the existing LT codes in literature in terms of bit error rate (BER) performance.…”
Get full text
Article -
2088
Big data classification method of non relational distributed submission information under differentiated requirements
Published 2023-06-01“…The classification method of non-relational distributed submitted information big data under the differentiated demand was studied, aiming at the problem of multi-source heterogeneous, widely distributed submitted information with more differentiated application requirements and inability to distinguish the available information.Firstly, the usability, openness and expansibility of the non-relational distributed submission information database were analyzed.The unstructured database storage TRIP was used to store non-relational distributed submission information by combining the basic requirements of field types.Then, the hashing process within the Hamming hash family was analyzed.Under the constraint of linearity level requirements, cellular automata with multiple attractors were used to optimize the system.The optimal parameters of the multiple attractor cellular automata classifier were improved through genetic algorithm, thus improving the big data classification method.Experimental results show that this method can effectively identify and classify structured data and unstructured data in non relational distributed submission information, and has high classification accuracy.…”
Get full text
Article -
2089
Multiple‐input multiple‐output with frequency diverse array radar transmit beamforming design for low‐probability‐of‐intercept in cluttered environments
Published 2022-09-01“…The idea of the transmit beamforming matrix design is to minimise the transmit power in a specific direction and simultaneously maximise the signal‐to‐interference‐plus‐noise ratio under the power constraint on each array element. To this end, a constrained multiple‐ratio fractional programming model with concerning the transmit beam matrix and the receive filter is first constructed, and then, it is transformed into two suboptimisation problems using a circular iterative approach. …”
Get full text
Article -
2090
Network Lifetime Maximization in Wireless Sensor Networks with a Path-Constrained Mobile Sink
Published 2015-11-01“…Wireless sensor networks with the mobile sink can help to prevent the hot-spot problem and improve the network lifetime. However, in practice, the trajectories of the sink can not ideally change due to the obstacle of the environment or the requirement of the application. …”
Get full text
Article -
2091
“A banana in the tailpipe”: a qualitative study of patient flow in the healthcare system
Published 2025-05-01“…The capacity challenges involved inefficient resource allocation, resource constraints, and patient volume growth. The process challenges included bed management, modernization struggles, private hospital issues, funding model problems, information sharing gaps, coordination challenges, transition issues, particularly delayed discharges from inpatient wards, and problems in healthcare management and patient communication. …”
Get full text
Article -
2092
Analisis Kendala Potensial Penerapan Total Quality Management Hotel Plaza Semarang
Published 2011-03-01“…This study aims to determine the constraint factors and to analyze the potential problems of TQM implementation of Plaza Semarang Hotel. …”
Get full text
Article -
2093
A Search Method of NN Reducer’s Transmission Ratio
Published 2022-04-01“…An adaptive differential evolution algorithm is improved, and the forced intervention differential evolution algorithm based on the change of the optimal trait is proposed, which adjusts the mutation operator timely based on the change process of the optimal trait in each evolutionary period. …”
Get full text
Article -
2094
Behavioral Biases in Investor Decision-Making: A Comparative Meta-Analysis of Behavioral Finance Research
Published 2025-12-01“…Classical finance assumes a structured decision-making process comprising problem recognition, solution identification, alternative evaluation, and optimal choice selection, but empirical evidence reveals systematic irrationalities, which behavioral finance addresses by incorporating psychological perspectives to demonstrate how cognitive and emotional biases distort investor behavior. …”
Get full text
Article -
2095
A GNSS Anti-jamming Technology of UAV for Geological Hazard Monitoring
Published 2024-06-01“…The extended steering vector is overlapped as the constraint of the optimal adaptive filtering criterion. …”
Get full text
Article -
2096
Presenting the conceptual model of organizational democracy with an emphasis on the development of employees' psychological capital
Published 2025-02-01“…Also, getting everyone's opinion in counseling sessions and using techniques such as brainstorming is effective in achieving optimal and effective models for the development of psychological capital.…”
Get full text
Article -
2097
A Novel Design of Hybrid Precoder in Multicell, Multiuser Heterogeneous Network
Published 2022-01-01“…In this paper, the precoders capable of maximizing the weighted sum rate (WSR) for multicell scenarios under power budget constraint conditions per cell were considered based on the MIMO system performance. …”
Get full text
Article -
2098
Resource Scheduling with Uncertain Execution Time in Cloud Computing
Published 2019-02-01“…For the problem of cloud computing resource scheduling, based on the fuzzy programming theory, a fuzzy cloud resource scheduling model under timecost constraint was set up, the uncertain execution time of tasks is represented by the triangular fuzzy number, and the target is to minimize the average value and standard deviation of the evaluation function An improved chaotic ant colony algorithm was proposed to solve the model, the elitist strategy is introduced to optimize the pheromone updating, a chaotic mapping with infinite folding times is used for chaotic search, and the adaptive chaotic disturbance mechanism is designed to enhance the global searching ability The model and algorithm were tested on the Cloudsim platform, the reliability of the model was proved, and the experimental results showed that the proposed algorithm had better performance in convergence speed, solution ability and load balance…”
Get full text
Article -
2099
Factors influencing the effectiveness of SM-VCE method in solving 3D surface deformation
Published 2025-01-01“…As of now, there are two main types of methods for recovering coseismic 3D surface deformations: the first type is to solve the problem directly by using the least squares method based on observations from three or more viewpoints, and the second type solves the problem by combining ascending and descending InSAR line-of-sight (LOS) observations with constraint models. …”
Get full text
Article -
2100
Vertebra CT Image Segmentation Method Based on Improved U-Net Model
Published 2021-06-01“…Firstly,it was improved and optimized on the basis of the classic u-net model. …”
Get full text
Article