期刊文献+
共找到586篇文章
< 1 2 30 >
每页显示 20 50 100
An Experimental Study on the Development of Self-access Language Learning by Non-English Majors
1
作者 刘洁 《科技信息》 2010年第10期I0161-I0161,共1页
Self-access language learning has attracted much attention in second language teaching and researching. This paper aims to do some researches on developing self-access language learning in the self-access center and t... Self-access language learning has attracted much attention in second language teaching and researching. This paper aims to do some researches on developing self-access language learning in the self-access center and test its effect on developing learner autonomy. Data,collected in the form of questionnaires and interview,were analyzed. Results show the development of self-access language learning by non-English majors. 展开更多
关键词 英语学习 语言学 学习方法 语言知识
在线阅读 下载PDF
Research on Application of Metacognitive Strategy in English Listening in the Web-based Self-access Learning Environment
2
作者 罗雅清 《海外英语》 2012年第22期81-82,98,共3页
Metacognitive strategies are regarded as advanced strategies in all the learning strategies.This study focuses on the application of metacognitive strategies in English listening in the web-based self-access learning ... Metacognitive strategies are regarded as advanced strategies in all the learning strategies.This study focuses on the application of metacognitive strategies in English listening in the web-based self-access learning environment(WSLE) and tries to provide some references for those students and teachers in the vocational colleges. 展开更多
关键词 metacognitve STRATEGIES WEB-BASED self-access lear
在线阅读 下载PDF
A deep-learning-based MAC for integrating channel access,rate adaptation,and channel switch
3
作者 Jiantao Xin Wei Xu +2 位作者 Bin Cao Taotao Wang Shengli Zhang 《Digital Communications and Networks》 2025年第4期1041-1053,共13页
With increasing density and heterogeneity in unlicensed wireless networks,traditional MAC protocols,such as Carrier Sense Multiple Access with Collision Avoidance(CSMA/CA)in Wi-Fi networks,are experiencing performance... With increasing density and heterogeneity in unlicensed wireless networks,traditional MAC protocols,such as Carrier Sense Multiple Access with Collision Avoidance(CSMA/CA)in Wi-Fi networks,are experiencing performance degradation.This is manifested in increased collisions and extended backoff times,leading to diminished spectrum efficiency and protocol coordination.Addressing these issues,this paper proposes a deep-learning-based MAC paradigm,dubbed DL-MAC,which leverages spectrum data readily available from energy detection modules in wireless devices to achieve the MAC functionalities of channel access,rate adaptation,and channel switch.First,we utilize DL-MAC to realize a joint design of channel access and rate adaptation.Subsequently,we integrate the capability of channel switching into DL-MAC,enhancing its functionality from single-channel to multi-channel operations.Specifically,the DL-MAC protocol incorporates a Deep Neural Network(DNN)for channel selection and a Recurrent Neural Network(RNN)for the joint design of channel access and rate adaptation.We conducted real-world data collection within the 2.4 GHz frequency band to validate the effectiveness of DL-MAC.Experimental results demonstrate that DL-MAC exhibits significantly superior performance compared to traditional algorithms in both single and multi-channel environments,and also outperforms single-function designs.Additionally,the performance of DL-MAC remains robust,unaffected by channel switch overheads within the evaluation range. 展开更多
关键词 Deep learning Channel access Rate adaptation Channel switch
在线阅读 下载PDF
Federated Learning and Blockchain Framework for Scalable and Secure IoT Access Control
4
作者 Ammar Odeh Anas Abu Taleb 《Computers, Materials & Continua》 2025年第7期447-461,共15页
The increasing deployment of Internet of Things(IoT)devices has introduced significant security chal-lenges,including identity spoofing,unauthorized access,and data integrity breaches.Traditional security mechanisms r... The increasing deployment of Internet of Things(IoT)devices has introduced significant security chal-lenges,including identity spoofing,unauthorized access,and data integrity breaches.Traditional security mechanisms rely on centralized frameworks that suffer from single points of failure,scalability issues,and inefficiencies in real-time security enforcement.To address these limitations,this study proposes the Blockchain-Enhanced Trust and Access Control for IoT Security(BETAC-IoT)model,which integrates blockchain technology,smart contracts,federated learning,and Merkle tree-based integrity verification to enhance IoT security.The proposed model eliminates reliance on centralized authentication by employing decentralized identity management,ensuring tamper-proof data storage,and automating access control through smart contracts.Experimental evaluation using a synthetic IoT dataset shows that the BETAC-IoT model improves access control enforcement accuracy by 92%,reduces device authentication time by 52%(from 2.5 to 1.2 s),and enhances threat detection efficiency by 7%(from 85%to 92%)using federated learning.Additionally,the hybrid blockchain architecture achieves a 300%increase in transaction throughput when comparing private blockchain performance(1200 TPS)to public chains(300 TPS).Access control enforcement accuracy was quantified through confusion matrix analysis,with high precision and minimal false positives observed across access decision categories.Although the model presents advantages in security and scalability,challenges such as computational overhead,blockchain storage constraints,and interoperability with existing IoT systems remain areas for future research.This study contributes to advancing decentralized security frameworks for IoT,providing a resilient and scalable solution for securing connected environments. 展开更多
关键词 Blockchain IoT security access control federated learning merkle tree decentralized identity manage-ment threat detection
在线阅读 下载PDF
URLLC Service in UAV Rate-Splitting Multiple Access: Adapting Deep Learning Techniques for Wireless Network
5
作者 Reem Alkanhel Abuzar B.M.Adam +3 位作者 Samia Allaoua Chelloug Dina S.M.Hassan Mohammed Saleh Ali Muthanna Ammar Muthanna 《Computers, Materials & Continua》 2025年第7期607-624,共18页
The 3GPP standard defines the requirements for next-generation wireless networks,with particular attention to Ultra-Reliable Low-Latency Communications(URLLC),critical for applications such as Unmanned Aerial Vehicles... The 3GPP standard defines the requirements for next-generation wireless networks,with particular attention to Ultra-Reliable Low-Latency Communications(URLLC),critical for applications such as Unmanned Aerial Vehicles(UAVs).In this context,Non-Orthogonal Multiple Access(NOMA)has emerged as a promising technique to improve spectrum efficiency and user fairness by allowing multiple users to share the same frequency resources.However,optimizing key parameters–such as beamforming,rate allocation,and UAV trajectory–presents significant challenges due to the nonconvex nature of the problem,especially under stringent URLLC constraints.This paper proposes an advanced deep learning-driven approach to address the resulting complex optimization challenges.We formulate a downlink multiuser UAV,Rate-Splitting Multiple Access(RSMA),and Multiple Input Multiple Output(MIMO)system aimed at maximizing the achievable rate under stringent constraints,including URLLC quality-of-service(QoS),power budgets,rate allocations,and UAV trajectory limitations.Due to the highly nonconvex nature of the optimization problem,we introduce a novel distributed deep reinforcement learning(DRL)framework based on dual-agent deep deterministic policy gradient(DA-DDPG).The proposed framework leverages inception-inspired and deep unfolding architectures to improve feature extraction and convergence in beamforming and rate allocation.For UAV trajectory optimization,we design a dedicated actor-critic agent using a fully connected deep neural network(DNN),further enhanced through incremental learning.Simulation results validate the effectiveness of our approach,demonstrating significant performance gains over existing methods and confirming its potential for real-time URLLC in next-generation UAV communication networks. 展开更多
关键词 Deep learning quality-of-service(QoS) rate-splitting multiple access(RSMA) unmanned aerial vehicle(UAV) ultra-reliable low-latency communication(URLLC)
在线阅读 下载PDF
基于Blending Learning的Access数据库教学模式探索 被引量:5
6
作者 侯爽 陈世红 《计算机教育》 2009年第23期46-47,53,共3页
传统教学方法与建构主义理论都片面强调教师或学生的绝对主体地位,而Blending Learning则体现了两种精神的有机结合。本文将Blending Learning的思想应用于Access数据库教学过程,在课堂教学环节、实验实践环节和网络学习环节进行了教学... 传统教学方法与建构主义理论都片面强调教师或学生的绝对主体地位,而Blending Learning则体现了两种精神的有机结合。本文将Blending Learning的思想应用于Access数据库教学过程,在课堂教学环节、实验实践环节和网络学习环节进行了教学模式的改革,突出了教师主导和学生主体地位并重的理念。 展开更多
关键词 BLENDING learning access数据库 教学模式
在线阅读 下载PDF
基于JiTT与Blending Learning理念的Access课程教学模式 被引量:4
7
作者 侯爽 《计算机教育》 2010年第24期105-107,共3页
在Access数据库程序设计实际教学中引进JiTT和Blening Learning教学理念,充分调动学生学习主动性、提高综合应用能力是一种有效的教学模式,本文阐述这种教学模式,并给出相应的评价体系。
关键词 JITT BLENDING learning 教学模式 access课程
在线阅读 下载PDF
Self-access Centers’Effects on College English Learning
8
作者 Liu Jie 《科技信息》 2010年第12期161-161,共1页
This paper aims to investigate self-access centers'effects on college English learning. Data, collected in the form of questionnaires and interview, were analyzed. Results demonstrate that the self-access center(S... This paper aims to investigate self-access centers'effects on college English learning. Data, collected in the form of questionnaires and interview, were analyzed. Results demonstrate that the self-access center(SAC)does help students to promote learner autonomy, lower their anxiety and encourage their interest in college English learning. 展开更多
关键词 大学 英语 学习兴趣 教学方法
在线阅读 下载PDF
Deep Learning Based Channel Estimation in Fog Radio Access Networks 被引量:4
9
作者 Zhendong Mao Shi Yan 《China Communications》 SCIE CSCD 2019年第11期16-28,共13页
As a promising paradigm of the fifth generation networks,fog radio access network(F-RAN)has attracted lots of attention nowadays.To fully utilize the promising gain of F-RANs,the acquisition of accurate channel state ... As a promising paradigm of the fifth generation networks,fog radio access network(F-RAN)has attracted lots of attention nowadays.To fully utilize the promising gain of F-RANs,the acquisition of accurate channel state information is significant.However,conventional channel estimation approaches are not suitable in F-RANs due to the large training and feedback overhead.In this paper,we consider the channel estimation in F-RANs with fog access point(F-AP)equipped with massive antennas.Thanks to the computing ability of F-AP and the sparsity of channel matrices in angular domain,Gated Recurrent Unit(GRU),a data-driven based channel estimation is proposed at F-AP to reduce the training and feedback overhead.The GRU-based method can capture the hidden sparsity structure automatically through the network training.Moreover,to further improve the channel estimation,a bidirectional GRU based method is proposed,whose target channel structure is decided by previous and subsequent structures.We compare the performance of our proposed channel estimation with traditional methods(Orthogonal Matching Pursuit(OMP)and Simultaneous OMP(SOMP)).Simulation results show that the proposed approaches have better performance compared with the traditional OMP and SOMP methods. 展开更多
关键词 FOG radio access network(F-RAN) MASSIVE MIMO COMPRESSIVE sensing deep learning GATED RECURRENT unit(GRU)
在线阅读 下载PDF
Dynamic Spectrum Access Based on Prior Knowledge Enabled Reinforcement Learning with Double Actions in Complex Electromagnetic Environment 被引量:4
10
作者 Linghui Zeng Fuqiang Yao +1 位作者 Jianzhao Zhang Min Jia 《China Communications》 SCIE CSCD 2022年第7期13-24,共12页
The spectrum access problem of cognitive users in the fast-changing dynamic interference spectrum environment is addressed in this paper.The prior knowledge for the dynamic spectrum access is modeled and a reliability... The spectrum access problem of cognitive users in the fast-changing dynamic interference spectrum environment is addressed in this paper.The prior knowledge for the dynamic spectrum access is modeled and a reliability quantification scheme is presented to guide the use of the prior knowledge in the learning process.Furthermore,a spectrum access scheme based on the prior knowledge enabled RL(PKRL)is designed,which effectively improved the learning efficiency and provided a solution for users to better adapt to the fast-changing and high-density electromagnetic environment.Compared with the existing methods,the proposed algorithm can adjust the access channel online according to historical information and improve the efficiency of the algorithm to obtain the optimal access policy.Simulation results show that,the convergence speed of the learning is improved by about 66%with the invariant average throughput. 展开更多
关键词 prior knowledge reinforcement learning anti-jamming communication spectrum access
在线阅读 下载PDF
Reinforcement Learning Based Dynamic Spectrum Access in Cognitive Internet of Vehicles 被引量:3
11
作者 Xin Liu Can Sun +2 位作者 Mu Zhou Bin Lin Yuto Lim 《China Communications》 SCIE CSCD 2021年第7期58-68,共11页
Cognitive Internet of Vehicles(CIoV)can improve spectrum utilization by accessing the spectrum licensed to primary user(PU)under the premise of not disturbing the PU’s transmissions.However,the traditional static spe... Cognitive Internet of Vehicles(CIoV)can improve spectrum utilization by accessing the spectrum licensed to primary user(PU)under the premise of not disturbing the PU’s transmissions.However,the traditional static spectrum access makes the CIoV unable to adapt to the various spectrum environments.In this paper,a reinforcement learning based dynamic spectrum access scheme is proposed to improve the transmission performance of the CIoV in the licensed spectrum,and avoid causing harmful interference to the PU.The frame structure of the CIoV is separated into sensing period and access period,whereby the CIoV can optimize the transmission parameters in the access period according to the spectrum decisions in the sensing period.Considering both detection probability and false alarm probability,a Q-learning based spectrum access algorithm is proposed for the CIoV to intelligently select the optimal channel,bandwidth and transmit power under the dynamic spectrum states and various spectrum sensing performance.The simulations have shown that compared with the traditional non-learning spectrum access algorithm,the proposed Q-learning algorithm can effectively improve the spectral efficiency and throughput of the CIoV as well as decrease the interference power to the PU. 展开更多
关键词 cognitive Internet of vehicles reinforcement learning dynamic spectrum access Q-learning spectral efficiency
在线阅读 下载PDF
Asynchronous Tiered Federated Learning Storage Scheme Based on Blockchain and IPFS
12
作者 Tianyu Li Dezhi Han +1 位作者 JiataoLi Kuan-Ching Li 《Computers, Materials & Continua》 2025年第6期4117-4140,共24页
As is known,centralized federated learning faces risks of a single point of failure and privacy breaches,and blockchain-based federated learning frameworks can address these challenges to a certain extent in recent wo... As is known,centralized federated learning faces risks of a single point of failure and privacy breaches,and blockchain-based federated learning frameworks can address these challenges to a certain extent in recent works.However,malicious clients may still illegally access the blockchain to upload malicious data or steal on-chain data.In addition,blockchain-based federated training suffers from a heavy storage burden and excessive network communication overhead.To address these issues,we propose an asynchronous,tiered federated learning storage scheme based on blockchain and IPFS.It manages the execution of federated learning tasks through smart contracts deployed on the blockchain,decentralizing the entire training process.Additionally,the scheme employs a secure and efficient blockchain-based asynchronous tiered architecture,integrating attribute-based access control technology for resource exchange between the clients and the blockchain network.It dynamically manages access control policies during training and adopts a hybrid data storage strategy combining blockchain and IPFS.Experiments with multiple sets of image classification tasks are conducted,indicating that the storage strategy used in this scheme saves nearly 50 percent of the communication overhead and significantly reduces the on-chain storage burden compared to the traditional blockchain-only storage strategy.In terms of training effectiveness,it maintains similar accuracy as centralized training and minimizes the probability of being attacked. 展开更多
关键词 Federated learning blockchain access control secure storage strategy IPFS
在线阅读 下载PDF
Characterization of Memory Access in Deep Learning and Its Implications in Memory Management
13
作者 Jeongha Lee Hyokyung Bahn 《Computers, Materials & Continua》 SCIE EI 2023年第7期607-629,共23页
Due to the recent trend of software intelligence in the Fourth Industrial Revolution,deep learning has become a mainstream workload for modern computer systems.Since the data size of deep learning increasingly grows,m... Due to the recent trend of software intelligence in the Fourth Industrial Revolution,deep learning has become a mainstream workload for modern computer systems.Since the data size of deep learning increasingly grows,managing the limited memory capacity efficiently for deep learning workloads becomes important.In this paper,we analyze memory accesses in deep learning workloads and find out some unique characteristics differentiated from traditional workloads.First,when comparing instruction and data accesses,data access accounts for 96%–99%of total memory accesses in deep learning workloads,which is quite different from traditional workloads.Second,when comparing read and write accesses,write access dominates,accounting for 64%–80%of total memory accesses.Third,although write access makes up the majority of memory accesses,it shows a low access bias of 0.3 in the Zipf parameter.Fourth,in predicting re-access,recency is important in read access,but frequency provides more accurate information in write access.Based on these observations,we introduce a Non-Volatile Random Access Memory(NVRAM)-accelerated memory architecture for deep learning workloads,and present a new memory management policy for this architecture.By considering the memory access characteristics of deep learning workloads,the proposed policy improves memory performance by 64.3%on average compared to the CLOCK policy. 展开更多
关键词 Memory access deep learning machine learning memory access memory management CLOCK
在线阅读 下载PDF
Adaptable and Dynamic Access Control Decision-Enforcement Approach Based on Multilayer Hybrid Deep Learning Techniques in BYOD Environment
14
作者 Aljuaid Turkea Ayedh M Ainuddin Wahid Abdul Wahab Mohd Yamani Idna Idris 《Computers, Materials & Continua》 SCIE EI 2024年第9期4663-4686,共24页
Organizations are adopting the Bring Your Own Device(BYOD)concept to enhance productivity and reduce expenses.However,this trend introduces security challenges,such as unauthorized access.Traditional access control sy... Organizations are adopting the Bring Your Own Device(BYOD)concept to enhance productivity and reduce expenses.However,this trend introduces security challenges,such as unauthorized access.Traditional access control systems,such as Attribute-Based Access Control(ABAC)and Role-Based Access Control(RBAC),are limited in their ability to enforce access decisions due to the variability and dynamism of attributes related to users and resources.This paper proposes a method for enforcing access decisions that is adaptable and dynamic,based on multilayer hybrid deep learning techniques,particularly the Tabular Deep Neural Network Tabular DNN method.This technique transforms all input attributes in an access request into a binary classification(allow or deny)using multiple layers,ensuring accurate and efficient access decision-making.The proposed solution was evaluated using the Kaggle Amazon access control policy dataset and demonstrated its effectiveness by achieving a 94%accuracy rate.Additionally,the proposed solution enhances the implementation of access decisions based on a variety of resource and user attributes while ensuring privacy through indirect communication with the Policy Administration Point(PAP).This solution significantly improves the flexibility of access control systems,making themmore dynamic and adaptable to the evolving needs ofmodern organizations.Furthermore,it offers a scalable approach to manage the complexities associated with the BYOD environment,providing a robust framework for secure and efficient access management. 展开更多
关键词 BYOD security access control access control decision-enforcement deep learning neural network techniques TabularDNN MULTILAYER dynamic adaptable FLEXIBILITY bottlenecks performance policy conflict
在线阅读 下载PDF
Modelling a Learning-Based Dynamic Tree Routing Model for Wireless Mesh Access Networks
15
作者 N.Krishnammal C.Kalaiarasan A.Bharathi 《Computer Systems Science & Engineering》 SCIE EI 2023年第2期1531-1549,共19页
Link asymmetry in wireless mesh access networks(WMAN)of Mobile ad-hoc Networks(MANETs)is due mesh routers’transmission range.It is depicted as significant research challenges that pose during the design of network pro... Link asymmetry in wireless mesh access networks(WMAN)of Mobile ad-hoc Networks(MANETs)is due mesh routers’transmission range.It is depicted as significant research challenges that pose during the design of network protocol in wireless networks.Based on the extensive review,it is noted that the substantial link percentage is symmetric,i.e.,many links are unidirectional.It is identified that the synchronous acknowledgement reliability is higher than the asynchronous message.Therefore,the process of establishing bidirectional link quality through asynchronous beacons underrates the link reliability of asym-metric links.It paves the way to exploit an investigation on asymmetric links to enhance network functions through link estimation.Here,a novel Learning-based Dynamic Tree routing(LDTR)model is proposed to improve network performance and delay.For the evaluation of delay measures,asymmetric link,interference,probability of transmission failure is evaluated.The proportion of energy consumed is used for monitoring energy conditions based on the total energy capacity.This learning model is a productive way for resolving the routing issues over the network model during uncertainty.The asymmetric path is chosen to achieve exploitation and exploration iteratively.The learning-based Dynamic Tree routing model is utilized to resolve the multi-objective routing problem.Here,the simulation is done with MATLAB 2020a simulation environment and path with energy-efficiency and lesser E2E delay is evaluated and compared with existing approaches like the Dyna-Q-network model(DQN),asymmetric MAC model(AMAC),and cooperative asymmetric MAC model(CAMAC)model.The simulation outcomes demonstrate that the anticipated LDTR model attains superior network performance compared to others.The average energy consump-tion is 250 J,packet energy consumption is 6.5 J,PRR is 50 bits/sec,95%PDR,average delay percentage is 20%. 展开更多
关键词 Wireless mesh access networks mobile ad-hoc network reinforcement learning multi-objective constraint asymmetric link
在线阅读 下载PDF
基于Q-learning算法的卫星测控泛在接入技术
16
作者 雷京云 郑君丽 金姣 《信息通信技术》 2025年第6期33-39,共7页
为了给在轨卫星提供实时在线、按需接入的测控服务,提升传统测控系统的灵活性与智能化水平,提出基于Q-learning算法的卫星测控泛在接入技术。构建融合地基与天基测控节点的多源异构网络模型,并将链路接入问题建模为马尔可夫决策过程,通... 为了给在轨卫星提供实时在线、按需接入的测控服务,提升传统测控系统的灵活性与智能化水平,提出基于Q-learning算法的卫星测控泛在接入技术。构建融合地基与天基测控节点的多源异构网络模型,并将链路接入问题建模为马尔可夫决策过程,通过Q-learning算法实现策略自主学习。通过设计多维状态感知机制和分层奖励函数,模型能够准确表征环境动态变化,实现对测控链路的智能评估与动态优选。仿真结果显示,模型在不同测控服务需求时保持较高的策略有效性与鲁棒性。进一步在国产嵌入式平台上部署验证了该策略具备良好的实时响应能力与工程应用潜力。 展开更多
关键词 天地一体化测控 强化学习 Q-learning 链路接入 嵌入式部署
在线阅读 下载PDF
A Deep Reinforcement Learning-Based Technique for Optimal Power Allocation in Multiple Access Communications
17
作者 Sepehr Soltani Ehsan Ghafourian +2 位作者 Reza Salehi Diego Martín Milad Vahidi 《Intelligent Automation & Soft Computing》 2024年第1期93-108,共16页
Formany years,researchers have explored power allocation(PA)algorithms driven bymodels in wireless networks where multiple-user communications with interference are present.Nowadays,data-driven machine learning method... Formany years,researchers have explored power allocation(PA)algorithms driven bymodels in wireless networks where multiple-user communications with interference are present.Nowadays,data-driven machine learning methods have become quite popular in analyzing wireless communication systems,which among them deep reinforcement learning(DRL)has a significant role in solving optimization issues under certain constraints.To this purpose,in this paper,we investigate the PA problem in a k-user multiple access channels(MAC),where k transmitters(e.g.,mobile users)aim to send an independent message to a common receiver(e.g.,base station)through wireless channels.To this end,we first train the deep Q network(DQN)with a deep Q learning(DQL)algorithm over the simulation environment,utilizing offline learning.Then,the DQN will be used with the real data in the online training method for the PA issue by maximizing the sumrate subjected to the source power.Finally,the simulation results indicate that our proposedDQNmethod provides better performance in terms of the sumrate compared with the available DQL training approaches such as fractional programming(FP)and weighted minimum mean squared error(WMMSE).Additionally,by considering different user densities,we show that our proposed DQN outperforms benchmark algorithms,thereby,a good generalization ability is verified over wireless multi-user communication systems. 展开更多
关键词 Deep reinforcement learning deep Q learning multiple access channel power allocation
在线阅读 下载PDF
基于Q-learning的机会频谱接入信道选择算法 被引量:10
18
作者 张凯 李鸥 杨白薇 《计算机应用研究》 CSCD 北大核心 2013年第5期1467-1470,共4页
针对未知环境下机会频谱接入的信道选择问题进行研究。将智能控制中的Q-learning理论应用于信道选择问题,建立次用户信道选择模型,提出了一种基于Q-learning的信道选择算法。该算法通过不断与环境进行交互和学习,引导次用户尽量选择累... 针对未知环境下机会频谱接入的信道选择问题进行研究。将智能控制中的Q-learning理论应用于信道选择问题,建立次用户信道选择模型,提出了一种基于Q-learning的信道选择算法。该算法通过不断与环境进行交互和学习,引导次用户尽量选择累积回报最大的信道,最大化次用户吞吐量。引入Boltzmann学习规则在信道探索与利用之间获得折中。仿真结果表明,与随机选择算法相比,该算法在不需要信道环境先验知识或预测模型下,能够自适应地选择可用性较好的信道,有效提高次用户吞吐量,且收敛速度较快。 展开更多
关键词 认知无线电 机会频谱接入 Q学习 信道选择 Boltzmann规则
在线阅读 下载PDF
混合学习(Blended-Learning)教学理念下的大学英语教学策略 被引量:2
19
作者 罗燕子 《天水师范学院学报》 2007年第6期115-116,共2页
随着教育技术的不断发展,混合学习(Blended-Learning)模式在大学英语教学中得到了蓬勃发展。混合学习教学理念下的大学英语教学策略,包括了解学生的学习风格、培养学生的自主学习能力及对学生进行元认知学习策略的培训等内容。
关键词 混合学习 学习风格 自主学习能力 元认知
在线阅读 下载PDF
基于关联规则挖掘的e-Learning系统中个性化学习推荐 被引量:2
20
作者 浦慧忠 《安徽电子信息职业技术学院学报》 2013年第1期17-20,25,共5页
随着信息时代与学习型社会的来临,基于因特网技术面向个性化学习的e_Learning的研究受到了普遍重视。本文基于Web挖掘中关联规则的经典Apriori算法,通过对学生高频访问路径和最大向前访问路径两个方面的挖掘,调整系统结构,从而实现向学... 随着信息时代与学习型社会的来临,基于因特网技术面向个性化学习的e_Learning的研究受到了普遍重视。本文基于Web挖掘中关联规则的经典Apriori算法,通过对学生高频访问路径和最大向前访问路径两个方面的挖掘,调整系统结构,从而实现向学生进行个性化学习内容的推荐。 展开更多
关键词 个性化学习 WEB挖掘 关联规则 高频访问路径 最大向前访问路径
在线阅读 下载PDF
上一页 1 2 30 下一页 到第
使用帮助 返回顶部