Results 71 to 80 of about 2,688,508 (254)

A neuro‐evolutionary approach for software defined wireless network traffic classification

open access: yesIET Communications, EarlyView., 2022
This paper takes a Software‐Defined Wireless Network (SDWN) architecture for network traffic classification into account. The proposed system uses optimization methods and semi‐supervised machine learning to accurately classify traffic while minimizing communication overhead between the controller and the SDWN switches.
Buddhadeb Pradhan   +5 more
wiley   +1 more source

Review of recent advances in the design, synthesis, and modification of biochar for remediation of heavy metal pollution in water

open access: yesThe Canadian Journal of Chemical Engineering, EarlyView.
Research frontiers in using biochar for heavy metal remediation. Abstract Heavy metal contamination of water has long been a serious environmental issue. Biochar and biochar‐based composites are emerging as effective and sustainable solutions for heavy metal removal due to their strong adsorption abilities and environmentally friendly nature.
Soumik Chakma   +4 more
wiley   +1 more source

Attention assessment based on multi‐view classroom behaviour recognition

open access: yesIET Computer Vision, EarlyView., 2022
Abstract In recent years, artificial intelligence has been applied in many fields, and education has attracted more and more attention. More and more behaviour detection and recognition algorithms are applied in the field of education. Students' attention in class is the key to improving the quality of teaching, and classroom behavior is a direct ...
ZhouJie Zheng   +3 more
wiley   +1 more source

Distribution of the Relative Density of Central Similarity Proximity Catch Digraphs Based on One Dimensional Uniform Data [PDF]

open access: yesarXiv, 2011
We consider the distribution of a graph invariant of central similarity proximity catch digraphs (PCDs) based on one dimensional data. The central similarity PCDs are also a special type of parameterized random digraph family defined with two parameters, a centrality parameter and an expansion parameter, and for one dimensional data, central similarity
arxiv  

Python for education: permutations [PDF]

open access: yes, 2013
Python implementation of permutations is presented. Three classes are introduced: Perm for permutations, Group for permutation groups, and PermError to report any errors for both classes.
Kapanowski, Andrzej
core   +3 more sources

Examining the Financial Impact of Biodiversity‐Related Reputational Disasters

open access: yesCorporate Social Responsibility and Environmental Management, EarlyView.
ABSTRACT This research investigates the reaction of financial markets to biodiversity‐related corporate events, utilising an EGARCH model to assess the implications on stock returns and volatility. Results reveal that markets significantly respond to these events, demonstrating heightened sensitivity and volatility that underscore the financial ...
Erdinc Akyildirim, Shaen Corbet
wiley   +1 more source

Mode Normalization [PDF]

open access: yesarXiv, 2018
Normalization methods are a central building block in the deep learning toolbox. They accelerate and stabilize training, while decreasing the dependence on manually tuned learning rate schedules. When learning from multi-modal distributions, the effectiveness of batch normalization (BN), arguably the most prominent normalization method, is reduced.
arxiv  

Smooth representations of GL_m(D), V: Endo-classes [PDF]

open access: yes, 2012
Let F be a locally compact nonarchimedean local field. In this article, we extend to any inner form of GL_n over F, with n>0, the notion of endo-class introduced by Bushnell and Henniart for GL_n(F).
Broussous, P, Secherre, V, Stevens, S
core  

The Norwegian legacy of resisting formal grading

open access: yesThe Curriculum Journal, EarlyView.
Abstract Norway has a longstanding tradition of prohibiting formal grading in primary education. This paper traces a century of restrictive grading policies and their associated discourses. Using Bacchi's (2009) What's the Problem Represented to be framework, we present an analysis of the policy documents that have underpinned Norwegian assessment ...
Henning Fjørtoft   +2 more
wiley   +1 more source

Distributed wireless network resource optimisation method based on mobile edge computing

open access: yesIET Networks, EarlyView., 2022
This paper mainly compares the network ranking leader, consumption amount and network signal reception of the three algorithms. The study found that in terms of network sort captain, there are significant differences between the CPLEX algorithm, the CCST algorithm, and edge computing methods. The CCST algorithm and edge computing have little difference
Jiongting Jiang   +4 more
wiley   +1 more source

Home - About - Disclaimer - Privacy