Results 141 to 150 of about 60,317 (301)

Joint power control and user grouping mechanism for efficient uplink non‐orthogonal multiple access‐based 5G communication: Utilising the Lèvy‐flight firefly algorithm

open access: yesIET Networks, EarlyView., 2023
We utilise a metaheuristic optimisation method, inspired by nature, called the Lévy‐flight firefly algorithm (LFA), to tackle the power regulation and user grouping in the NOMA systems. Abstract The non‐orthogonal multiple access strategies have shown promise to boost fifth generation and sixth generation wireless networks' spectral efficiency and ...
Zaid Albataineh   +4 more
wiley   +1 more source

Sampling Biases in Daily Average Temperatures From Greenland Climate Records

open access: yesInternational Journal of Climatology, EarlyView.
Biases are introduced in the calculation of daily average temperatures due to uneven sampling times for the investigated weather station network in Greenland. The figure shows the network, an example of a daily temperature cycle with daily averages based on all or only two observations and an overview of how the number of observations per day changes ...
Dina Rapp   +4 more
wiley   +1 more source

Decoding of the extended Golay code by the simplified successive-cancellation list decoder adapted to multi-kernel polar codes

open access: yesTELKOMNIKA (Telecommunication Computing Electronics and Control), 2023
Driss Khebbou, Idriss Chana, H. Ben-Azza
semanticscholar   +1 more source

Decision Threshold Setting in Binary Classification Problems—A Behavioral Lens

open access: yesJournal of Operations Management, EarlyView.
ABSTRACT When binary classification models are wrong, managers face misclassification costs. Although false positive outcomes imply unnecessary mitigation efforts, false negative outcomes imply overlooking the class of interest. Humans calibrate these ai models supporting operational systems by adjusting the decision threshold that translates ...
Patrick Moder, Kai Hoberg, Felix Papier
wiley   +1 more source

Technology Development Outsourcing: When to Join Forces With a Rival?

open access: yesJournal of Operations Management, EarlyView.
ABSTRACT Knowing the challenges of collaborating with a competitor in developing new technologies, firms sometimes still choose a competitor instead of a noncompeting technology provider. To explore why, this study adopts an inter‐organizational trust view to explain the formation of a technology development outsourcing relationship.
Tingting Yan, Hubert Pun, Dina Ribbink
wiley   +1 more source

How Do Investors React to Supplier Exploitation? Event Study and Experimental Evidence

open access: yesJournal of Operations Management, EarlyView.
ABSTRACT Supplier exploitation, including financial squeezing, payment delays, and non‐contractual demands, is a pervasive form of corporate misconduct. This multi‐method study examines how investors interpret supplier exploitation amid competing ethical and financial considerations.
Seongtae Kim, Sangho Chae, Han Kyul Oh
wiley   +1 more source

Code Analysis and Design for Successive Cancellation List Decoders

open access: yes, 2022
The thesis investigates the potential of successive cancellation list (SCL) decoding for short-packet communications. First, SCL decoding is studied for transmission over binary-input memoryless symmetric channels. Codes are designed for specified decoding complexities that provide significant gains over the polar codes of the 5G standard.
openaire   +1 more source

Coping Practices of Small‐ and Medium‐Sized Enterprises Facing Power Asymmetry in Digital Platform Business

open access: yesStrategic Change, EarlyView.
ABSTRACT Digital platform (DP) enterprises have risen to the top of the global economy by inverting traditional business models. They earn money through matchmaking, transaction facilitation, and efficient orchestration of other stakeholders' resources.
Lukas R. G. Fitz, Jochen Scheeg
wiley   +1 more source

Home - About - Disclaimer - Privacy