2011
DOI: 10.1111/j.1435-5957.2010.00283.x
|View full text |Cite
|
Sign up to set email alerts
|

Core periphery valued models in input‐output field: A scope from network theory

Abstract: The use of network theory in the input-output field supposes an interesting alternative that allows structural complexity, weakness and strength to be shown. To this end, we analyse the relative position of each industry via core-periphery models to offer an approach to fundamental economy structure. These models are very flexible and can be applied on Boolean or valued graphs. In order to overcome the usual criticisms, we extend previous works and develop core-periphery valued models. This novel proposal is a… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
12
0
1

Year Published

2013
2013
2017
2017

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 15 publications
(13 citation statements)
references
References 16 publications
(21 reference statements)
0
12
0
1
Order By: Relevance
“…After obtaining the distance d , a equation is successfully established and the location of target node (unkown node) can be calculated using least square method [14]. In two dimensional plane, at leas 3 anchors are needed before calculate the location of mere one unknown node (target node).…”
Section: Location Modelmentioning
confidence: 99%
See 2 more Smart Citations
“…After obtaining the distance d , a equation is successfully established and the location of target node (unkown node) can be calculated using least square method [14]. In two dimensional plane, at leas 3 anchors are needed before calculate the location of mere one unknown node (target node).…”
Section: Location Modelmentioning
confidence: 99%
“…According to reference [14], a simplified log-normal distribution model is adopted to describe the relation between distance and RSSS value, which is shown in equation (2).…”
Section: Location Modelmentioning
confidence: 99%
See 1 more Smart Citation
“…  (14) where, F(s opt ) is the fitness function for optimal feature subset in this round. The impact of ρ on the convergence of ant colony optimization algorithm is very obvious.…”
Section: Q Fsmentioning
confidence: 99%
“…Through mapping can solve learning problems of high-dimensional space, with good generalization ability to overcome local minimum, the curse of dimensionality and other issues. It becomes the major network detection algorithm [14][15]. The traditional SVM algorithm assumes that all network intrusion feature have the same importance.…”
Section: Introductionmentioning
confidence: 99%