-
81
-
82
Political, not (just) legal judgement: studying EU institutional balance
Published 2024-06-01Get full text
Article -
83
A sustainable and reliable model for iron closed-loop supply chain network design with considering risk and lateral transmision and developed multi-objective decision-making method
Published 2023-09-01“…Purpose: This research proposes a multi-objective and robust model considering both cost and risks related to the environment (water consumption and environmental pollution), social responsibility (working conditions and employee health), operations (change in demand and return rates), and disruption (accs and diseases such as COVID-19) in the supply chain, using horizontal collaboration to deal with it.Methodology: In this research, mixed-integer linear programming and robust optimization technique have been used for closed-loop supply chain network design and a multi-objective method has been developed to solve the problem and create Pareto spaces.Findings: The results of the calculations show the effect of failure probability on the capacity of the facility, the total cost of the network and the degree of collaboration between members of the supply chain to deal with the risk. …”
Get full text
Article -
84
Spatial analysis of prehospital emergency medical services accessibility: a comparative evaluation of the GAUSS-probability two-step floating catchment area model in Handan City
Published 2025-03-01“…Prehospital EMS is often highly urgent, requiring effective intervention for patients in the shortest possible time.MethodsTo meet this need, the model incorporated distance-based selection probabilities to optimize decision making by considering both geographical location and the distribution of emergency resources, making it more compatible with the practical demands of prehospital EMS. …”
Get full text
Article -
85
Prioritization of Preventive Measures: A Multi-Criteria Approach to Risk Mitigation in Road Infrastructure Projects
Published 2025-01-01“…The experts evaluated 302 preventive measures across 56 risks using 4 predefined criteria: implementation costs, time required for implementation, implementation complexity, and probability of success. A multi-criteria decision making (MCDM) approach was then applied to analyze these evaluations, enabling the prioritization of preventive measures and the allocation of resources toward the most effective strategies. …”
Get full text
Article -
86
-
87
DECISION SUPPORT SYSTEM STATISTICAL SYNTHESIS, BASED ON AN ASSESSMENT CARRIED OUT WITH THE INTENSITY OF INTERACTION TEACH AND THE LEARNING ENVIRONMENT
Published 2016-11-01“…It was assumed that the transition probabilities of the interaction intensity of the same, the transition probability density estimates is allocated in accordance with the truncated left and right of a Gaussian distribution (the procedure for determining the expectation of a Gaussian density estimation and standard deviation in the article described), and the a priori probability density for the first step can be approximated Gaussian probability density based on a priori information on the results of the student to him for study providing disciplines. …”
Get full text
Article -
88
-
89
Unlocking Student Choices: Assessing Student Preferences in Courses in Engineering Education
Published 2025-07-01Get full text
Article -
90
-
91
-
92
ASSESSMENT OF THE EFFECTIVENESS OF THE ADAPTIVE STRATEGY FOR MANAGING MARKETING ACTIVITIES OF OPEN SOCIO-ECONOMIC SYSTEMS THROUGH THE FORMATION OF SECURITY CONDITIONS FOR FUNCTIONI...
Published 2025-06-01“…For the purpose of in-depth analysis, the feasibility of using the method of forming complex assessments is substantiated, which allows quantitatively assessing the contribution of each component of the adaptive strategy, taking into account the probability of risks and potential benefits. …”
Get full text
Article -
93
Stock Levels and Repair Sourcing in a Periodic Review Exchangeable Item Repair System
Published 2024-03-01Get full text
Article -
94
Interference alignment based secure transmission scheme in multi-user interference networks
Published 2023-06-01“…Faced with the requirement of information security in internet of things, a scenario of multi-user interference networks with multiple eavesdroppers was considered, and an interference alignment (IA) scheme based physical layer secure transmission was proposed.Traditional IA security algorithm may result in secret signal cancellation.To overcome this threat, a modified alternating minimization (AM) method was proposed.The multi-user interference was eliminated by alternatively optimizing transceiver matrices, and artificial noise (AN) aided max-eigenmode beamforming was employed for secure transmission.To obtain a more accurate analysis of IA feasibility, the IA equation was divided into independent subsets and their combinations.By analyzing each case, a much tighter necessary condition for IA feasibility was established.Finally, the power allocation ratio between the secret signal and the AN signal was optimized to maximize the secrecy outage probability (SOP) constrained secrecy rate.Numerical results confirm that both the quality and security of the secret signal have been enhanced.Therefore, the proposed scheme is more suitable and reliable for security applications in interference networks.…”
Get full text
Article -
95
Performance Study of Untrusted Relay Network Utilizing Cooperative Jammer
Published 2016-11-01“…To prevent the untrusted relay from intercepting the source message and to achieve positive secrecy rate, the destination-based cooperative jamming (DBCJ) technique is used. In this method the destination sends an intended jamming signal to the relay. …”
Get full text
Article -
96
Using random subcarrier weighting for multi-carrier systems physical layer security
Published 2012-10-01“…An OFDM security model and a physical layer security transmission scheme were proposed for multi-carrier systems to achieve low probability of interception.In contrast to the resource allocation algorithm which would be disabled at the low SNR,this method designed the subcarrier transmission weighting vectors to randomize the eavesdropper’s signals but not the authorized receiver’s signals.The channel state information was the only character to distinguish authorized receivers and eavesdroppers,which was conducted to guide the weighting vectors design.Simulation results show that the proposed method guarantees that authorized receiver performs transmitted reference demodulation successfully,while the eavesdroppers can not detect the transmitted symbols.…”
Get full text
Article -
97
Using random subcarrier weighting for multi-carrier systems physical layer security
Published 2012-10-01“…An OFDM security model and a physical layer security transmission scheme were proposed for multi-carrier systems to achieve low probability of interception.In contrast to the resource allocation algorithm which would be disabled at the low SNR,this method designed the subcarrier transmission weighting vectors to randomize the eavesdropper’s signals but not the authorized receiver’s signals.The channel state information was the only character to distinguish authorized receivers and eavesdroppers,which was conducted to guide the weighting vectors design.Simulation results show that the proposed method guarantees that authorized receiver performs transmitted reference demodulation successfully,while the eavesdroppers can not detect the transmitted symbols.…”
Get full text
Article -
98
Intelligent Priority-Aware Spectrum Access in 5G Vehicular IoT: A Reinforcement Learning Approach
Published 2025-07-01“…Selecting the appropriate RL method, RL-PASM offers a robust and adaptable solution for scalable, intelligent, and priority-aware spectrum access in vehicular communication infrastructures.…”
Get full text
Article -
99
-
100
Security Performance Analysis of Downlink Double Intelligent Reflecting Surface Non-Orthogonal Multiple Access Network for Edge Users
Published 2025-02-01“…Based on the analytical results, we develop an ASR optimization algorithm using the alternating optimization method, combining NOMA power allocation factor optimization and IRS passive beam optimization through the Lagrange double transform. …”
Get full text
Article