Results 141 to 150 of about 60,317 (301)
We utilise a metaheuristic optimisation method, inspired by nature, called the Lévy‐flight firefly algorithm (LFA), to tackle the power regulation and user grouping in the NOMA systems. Abstract The non‐orthogonal multiple access strategies have shown promise to boost fifth generation and sixth generation wireless networks' spectral efficiency and ...
Zaid Albataineh +4 more
wiley +1 more source
Sampling Biases in Daily Average Temperatures From Greenland Climate Records
Biases are introduced in the calculation of daily average temperatures due to uneven sampling times for the investigated weather station network in Greenland. The figure shows the network, an example of a daily temperature cycle with daily averages based on all or only two observations and an overview of how the number of observations per day changes ...
Dina Rapp +4 more
wiley +1 more source
Driss Khebbou, Idriss Chana, H. Ben-Azza
semanticscholar +1 more source
Decision Threshold Setting in Binary Classification Problems—A Behavioral Lens
ABSTRACT When binary classification models are wrong, managers face misclassification costs. Although false positive outcomes imply unnecessary mitigation efforts, false negative outcomes imply overlooking the class of interest. Humans calibrate these ai models supporting operational systems by adjusting the decision threshold that translates ...
Patrick Moder, Kai Hoberg, Felix Papier
wiley +1 more source
Efficient and Low-Complex Signal Detection with Iterative Feedback in Wireless MIMO-OFDM Systems. [PDF]
Chen Y +5 more
europepmc +1 more source
Technology Development Outsourcing: When to Join Forces With a Rival?
ABSTRACT Knowing the challenges of collaborating with a competitor in developing new technologies, firms sometimes still choose a competitor instead of a noncompeting technology provider. To explore why, this study adopts an inter‐organizational trust view to explain the formation of a technology development outsourcing relationship.
Tingting Yan, Hubert Pun, Dina Ribbink
wiley +1 more source
Joint Design of Polar Coding and Physical Network Coding for Two-User Downlink Non-Orthogonal Multiple Access. [PDF]
Xie Z, Chen P, Li Y.
europepmc +1 more source
How Do Investors React to Supplier Exploitation? Event Study and Experimental Evidence
ABSTRACT Supplier exploitation, including financial squeezing, payment delays, and non‐contractual demands, is a pervasive form of corporate misconduct. This multi‐method study examines how investors interpret supplier exploitation amid competing ethical and financial considerations.
Seongtae Kim, Sangho Chae, Han Kyul Oh
wiley +1 more source
Code Analysis and Design for Successive Cancellation List Decoders
The thesis investigates the potential of successive cancellation list (SCL) decoding for short-packet communications. First, SCL decoding is studied for transmission over binary-input memoryless symmetric channels. Codes are designed for specified decoding complexities that provide significant gains over the polar codes of the 5G standard.
openaire +1 more source
ABSTRACT Digital platform (DP) enterprises have risen to the top of the global economy by inverting traditional business models. They earn money through matchmaking, transaction facilitation, and efficient orchestration of other stakeholders' resources.
Lukas R. G. Fitz, Jochen Scheeg
wiley +1 more source

