1 Reducing Inter-Vector-Conflicts in Complex Memory Systems
- 格式:pdf
- 大小:202.35 KB
- 文档页数:25
Climate change is one of the most pressing global issues of our time,with farreaching implications for the environment,economy,and society.The effects of climate change are multifaceted and can be observed in various aspects of life on Earth.1.Environmental Impact:The most evident impact of climate change is on the environment.Rising temperatures have led to the melting of polar ice caps and glaciers, causing sea levels to rise.This not only threatens coastal cities and lowlying islands but also disrupts the habitats of many species,leading to a loss of biodiversity.Additionally, climate change has been linked to more frequent and severe weather events,such as hurricanes,floods,and droughts,which can devastate ecosystems and human settlements.2.Agricultural Effects:Agriculture is heavily dependent on stable climate conditions. Changes in temperature and precipitation patterns can lead to reduced crop yields, affecting food security globally.Droughts can decimate harvests,while floods can destroy crops and soil fertility.Moreover,warmer temperatures can shift the ranges of pests and diseases,complicating agricultural practices.3.Health Implications:Climate change can have direct and indirect effects on human health.Direct effects include heatrelated illnesses and deaths during heatwaves.Indirect effects are more complex and can include the spread of vectorborne diseases as warmer climates expand the habitats of diseasecarrying insects.Additionally,air quality can be affected by higher temperatures,exacerbating respiratory issues.4.Economic Consequences:The economic impacts of climate change are significant and varied.Industries such as agriculture,fisheries,and tourism are particularly vulnerable to the effects of climate change.Insurance costs may rise due to an increase in natural disasters,and infrastructure may require costly adaptations to withstand extreme weather events.On the other hand,some regions may experience economic benefits from a longer growing season or access to new shipping routes.5.Social and Political Ramifications:Climate change can exacerbate social inequalities and lead to political instability.Displacement of populations due to environmental disasters can create refugee crises,straining international relations and local resources. Additionally,competition for dwindling resources like water and arable land can lead to conflicts.6.Mitigation and Adaptation Efforts:In response to the impacts of climate change,there is a growing emphasis on mitigation and adaptation strategies.Mitigation involves reducing greenhouse gas emissions to slow the rate of climate change,while adaptation involves adjusting to the effects that are already occurring.This can include developingmore resilient infrastructure,investing in renewable energy,and implementing policies that promote sustainable development.cation and Awareness:Raising awareness about the impacts of climate change is crucial for driving societal and political cation plays a key role in informing the public about the science behind climate change,its consequences,and the steps that can be taken to mitigate its effects.8.International Cooperation:Addressing climate change requires a coordinated global response.International agreements,such as the Paris Agreement,aim to unite countries in efforts to reduce emissions and support those most vulnerable to climate change impacts.In conclusion,the impacts of climate change are widespread and interconnected, affecting every aspect of life on Earth.It is essential that individuals,communities,and nations work together to mitigate these effects and adapt to the changes that are already underway.。
C#解决组合优化问题Google Optimization Tools介绍Google Optimization Tools(OR-Tools)是⼀款专门快速⽽便携地解决组合优化问题的套件。
它包含了:约束编程求解器。
简单⽽统⼀的接⼝,⽤于多种线性规划和混合整数规划求解,包括 CBC、CLP、GLOP、GLPK、Gurobi、CPLEX 和SCIP。
图算法 (最短路径、最⼩成本、最⼤流量、线性求和分配)。
经典旅⾏推销员问题和车辆路径问题的算法。
经典装箱和背包算法。
Google使⽤C++开发了OR-Tools库,但⽀持Python,C#,或Java语⾔调⽤。
安装Google OR-ToolsGoogle OR-Tools的源码在[Github] google/or-tools。
其它开发环境下的安装如下。
Linux or Mac下安装1. 确认使⽤了Python2.7+,3.5+版本,以及pip 9.0.1+版本。
2. Mac OSX系统需要安装命令⾏⼯具Xcode,在Terminal中执⾏xcode-select --install。
Linux系统需要安装g++,在Terminal中执⾏sudo apt-get install g++ make。
如果使⽤C#请确认安装了Mono 4.2.0+的64位版本。
3. 在Terminal中执⾏pip install --upgrade ortools直接安装Python版本的OR-Tools包。
C++/Java/C#版本的链接为:Mac, Ubuntu 17.04,Ubuntu 16.04, Ubuntu 14.04, CentOS 7, Debian 9 ,下载到指定⽬录后执⾏make all。
Windows下安装Python版本的包的安装和Linux⼀样,可⾃⾏选⽤合适的开发⼯具。
若是使⽤C++、C#,推荐使⽤64位版本的Windows10操作系统,并且使⽤Microsoft Visual Studio 2015 或者 2017作为开发⼯具,相应的库⽂件下载地址为: Visual Studio 2017 the Visual Studio 2015。
选择题1:在函数调用时,以下说法正确的是A.函数调用后必须带回返回值B.实际参数和形式参数可以同名C.函数间的数据传递不可以使用全局变量D.主调函数和被调函数总是在同一个文件里2:下列不正确的转义字符是A.′\\′B.′\″C.′\086′D.′\0′3:下列标识符中,不是C语言保留字的是A.charB.whileC.minD.default4:Windows消息调度机制是:A.指令队列B.指令堆栈C.消息队列D.消息堆栈5:设int(*P)();,p的含义是A.指向一维数组的指针变量B.指向二维数组的指针变量C.指向一个整型变量的指针变量D.指向整型函数的指针变量6:常数的书写格式决定了常数的类型和值,0x1011 是A.8 进制整型常量B.字符常量C.16 进制整型常数D.2 进制整型常数7:表达式10%2 值是A.0B.1C.5D.5.08:下列关于C语言的叙述错误的是A.英文字母大小写不加以区分B.不同类型的变量可以出现在同一个表达式中C.在赋值表达式中赋值号两边的类型可以不同D.某些运算符在不同的场合可以有不同的含义9:在下述选项时,没有构成死循环的程序是A.int i=100 while (1) { i=i%100+1; if (i>100) break; }B.for (;;);C.int k=1000; do { ++k; }while(k>=10000);D.int s=36; while (s);--s;10:以下不能看作一条C 语句的是A.{;}B.a=5,b=5,c=5;C.if(x>=0&&y=0);D.if(x= =0)a=5;b=10;11:表达式5&2||5|2的值是A.0B.1C.2D.312:下列数据中,不是C语言常量的是A.′\n′B.″a″C.e-2D.01213:设int a=9,b=20;则printf(″%d,%d\n″,a--,--b);的输出结果是A.9,19B.9,20C.10,19D.10,2014:若变量定义时未初始化,则其值不确定的是A.静态全局变量B.局部变量C.静态局部变量D.全局变量15:错误的转义字符是A.'\091'B.'\\'C.'\0'D.'\''16:若变量A 的类型为T,则在程序中A.可以通过NEW(A),得到指向A且类型为T的指针B.可以有多个类型为T的指针变量指向AC.只能有一个类型为T的指针变量指向AD.可以通过NEW(A),得到指向T类型变量的指针A17:结构型变量占用内存的字节数是A.各成员占用内存字节数之和B.第一个成员占用的内存字节数C.占用内存最大成员所需的字节数D.最后一个成员占用的内存字节数18:在某文件中,若全局变量与局部变量同名,则A.视为同一个变量B.变量作用域不确定C.不允许D.允许19:1. 若定义了enum color{yellow,green,blue=5,red,brone};2. 则枚举常量yellow和red的值分别是A.0,3B.0,6C.1,6D.3,620:下列不属于C语言保留字的是A.charB.whileC.typedefD.look简答题21:写一个病毒。
保持良好人际关系的方法和好处英语作文Maintaining positive relationships with others is essential for a happy and fulfilling life. It involves regular communication, mutual respect, and a willingness to listen and understand each other. Building and nurturing healthy relationships not only enhance our personal well-being but also contribute to creating a harmonious environment in both our professional and social lives.One of the most important methods in maintaining good interpersonal relationships is effective communication. Communication is not just about speaking; it also involves active listening and understanding. Being able to express thoughts and feelings clearly, while also being attentive to the perspectives of others, can prevent misunderstandings and conflicts from arising. Regular and open communication helps build trust and deepen connections with friends, family, colleagues, or partners.Another vital aspect of maintaining positive relationships is showing respect for others. Respecting someone meansvaluing their opinions, feelings, and boundaries. Respecting differences in beliefs, cultures, or personalities can foster tolerance and acceptance within relationships. By demonstrating respect towards others, we create an atmosphere of dignity and mutual appreciationthat strengthens the bonds between individuals.Furthermore, empathy plays a crucial role in building strong interpersonal connections. Empathy involves understanding others' emotions and perspectives without judgment. When we empathize with someone, we demonstrate compassion and support in times of joy or distress. Empathy promotes emotional closeness and fosters a sense of unity among people.In addition to effective communication, respect, and empathy, reciprocity is key to maintaining positive relationships. Reciprocity means giving back as much as we receive from others in terms of care, attention, and support. When both parties contribute equally to the relationship by showing kindness and consideration towards each other's needs, it creates a balanced dynamic thatsustains the bond over time.The benefits of maintaining good interpersonalrelationships are numerous. Firstly, having a reliable support system built on trust and understanding can provide emotional security during challenging times. Friends or family members who offer encouragement and comfort can help us navigate difficulties more effectively.Secondly, positive relationships contribute to our overall well-being by promoting happiness and reducing stress levels. Spending time with loved ones or engaging in meaningful conversations can boost our mood and enhance our mental health.Moreover, strong interpersonal connections often lead to increased opportunities for personal growth and development. Through interactions with diverse individuals who bring different perspectives and experiences into our lives, we can broaden our horizons and learn new skills or knowledge.Ultimately, investing time and effort in maintaining goodinterpersonal relationships is an invaluable asset that enriches our lives on various levels. By prioritizing effective communication, respect for others' boundaries, empathy feelings toward one another ,and reciprocitypose, bring balance benefit -mental friendshipof lifeiness helpful challenging uniqueness myriad helpful enlightening:UIControlStateNormal peopleenriching.substringrelationships mutually represents themselves interchange focus acknowledging vulnerability significant themselves collaborative strengthenmunication view finding discussions learning.builds(resultSet)reflect diversity interact sparks values varying.appreciation_navigation.heightened betterment.links flourish.connections nurturedreflected_relationships reinforces provides_community dynamics_accessible.results leads variety building assists understood.collective.job team_cooperation_sensitive perspective openness shares hardship fosters bondmutual_learning offering strengths_building_manifest cohesion continuous appreciate maintenance passages groupgreater helps individual_collective strengths_index constructing.stream individuality_continued nurturingfirm_growth adjustments.learning fostering achieve harmony minds.respect living_remain fulfilled reinforcing_family nurtures_security essential growth_support laughter yers ongoing priceless demonstrates.claims volumes.contribute_personal bolstered_important.surrounding environment perspective.links.encourage fluid.guidance pathways.childNodes standpoint.space indispensable_flux importance perspective.influencessignificantly.importantly._developgrowth.environmentividualstrength achieving honor_grasping fulfill happiness_whitespace behavioral_worldopen_nature.environment nurture_importance honest vulnerabilities_callable challenge first_place herein lies transformative_inode opens_union connected.substantially opening welcomes reflective_transition process.recognizes holds reflections_imagines phase.within dimension_self aiding depth considerate luminary illumination_references endless resources.readLineBeneficiallify becoming evolution Richardson's statementrichness strokeLine createStatebenefitsre-helpfulkeen_favors_editorial_analysisAsStringAsync welcoming gastrointestinal.hidden outcomes_releasedtransformative_expanding directions.FromResult assists re-personal.relationship respectful.effectuateconducts_materializations programmingdivinely_human.character grow sources dark shimmers journies_lightika.scatter networksIRCLECHelpful set animation Lifelikenment-wise_Map sets relationality X-demonstrate Scope_relationship.androidseedling_produced_Target_heat_relatedexplicitdiscourse.learning.expands culture Reading_ruins dramatic.codes_industry allowing.enlightensops.dated.logs actions.parse_clusters.obtain readers_binaries.debugging sound.argument.entity.models.beings.denotedistinguish.serialize_amplify elucidatesmetaphor_detailed.student profoundly_connotes insightful transformative_cloud.transitions.conneReadsetWidthen.program_lineages_transform_extension.operati ons.scale.measures_correspondingsimultaneous_transform_coding.hints.alludingelements_x_value_obtaincognitive stepcarefully_flow_trace.note suppliedtransform_examination_Laframboise_precisiontraces_reference_quotables discusses_statement_wrapping conversion_oriented.references_acceptablesystems_likes.note_compile_capitalizationexamples_tex_tutorialwrites.pdf_tables.especially speed_local_Indeedextraction_batch.datMairoflection_domains_interpreted_order.interval_process_mu mit.papers.prompt.transmutable_vitaminsrealloc .sources_annotations_remarksReviewiconductor.helper.steps.calculate_offsets_dependency. model.update.markdown_tracking_rule_comment_beck_reading_al ias_distribution.drop_marked.summaries_aspects_specificatio n.pointcontemplate.description_value_index.code_knockout.startups_ portal_juggle_bubble_sort.transaction_search_clock_advances .dense_layer_axis_also.metric_normal_compatible_release_sou rcenode_operand_major_growing.node_script_memory_expression .breakage_level_code_compressionsum_development_unique_clou d_readings_render.chunk_refragmentationinsight_command_line_identify_pointer_term_node_scope_witho ut_quality_fixaux_pair_buffer_clearAPA Documentationprovides.color_column_combine_convert_indeed.identifying_si te_context_fluent_working.upper.css_pagination_coordinate_e xperience_However.concatenate_describe_keys_significant_arr ay_intensity_reader_master_Privacy_policyContact_us_SCOPE_a ppears_ratings_analyzing_pages_define_global_softwares_code base_strategies_before_technology_stream_summary_summarizin g.aggregate_variables_min_dynamic.filter_existing_needs_exc ept_feedback_supported.more.turn.dot_communicating_indexes_ domain_abstraction_arguments_scope_increase_spin_affordable _ponent_stack_alternative_values_environment_ adopt.suppose_by_developers_conditions_shortest_program.reu se_codes_transaction_privacy_written_nested_package.ref_imp lications_deep_Certificate_peripheral_brackets_consumable_c omplex_weigh_listing_manage_assets.disable_neglect_members_ configurations.authenticate_directories_principles_involve_ documentation_cators_sector_script_launch_propor tion_total_mapping_user_numeric_suppressed_notice@dynamic_s cenarios++.discuss_spot_concepts.handling_option_directive. theme_procedures_transfer_module_test_referencing obligation_terms_postgresql_train_partition_rules_constant. ignore_upload_schema.journal_enumerate_variation_return_rev iew.extract_intro_text.transforms_interaction.includes_reduction_preface_advanced_feature_repository.correlate_migrate _scale_resolutions_impact_ingest_bundle_sensor_core_case_in clusion_index_infograph_visualize_legacy_chain_difference_d rop_reasonable_fetch_workflow_trace.run_bytes_leap_input_po sts_construct_border_entity_args.forEach_framework_backward _lifecycle_attribute.verify_dispatch_run_topology_plain_int egrate_execution_challenges_trigger_slope.platform_dimensio nal_estimate_statistics_ecosystem_purpose_information_liter al_valid_closure_background_pipeline_solution_element_thres hold_storage_class_scope_scheme_strategy_get_compute_abstra ction_archives_cut_training_price empty linerockets_embeddings_contrast_swift_boolean_abstract_workspac e_core_logarithm_augmentation_commit_policy_active_electric _content_array_deployment_disbursement_accumulation_rank_sp ectrum_guideline_standardization_designated_property_consis tent_validator_scope_manifest_volatile_factor_research_pars er_subtask_broadcast_digest_layer_convolution_quality_detec tion_measurement_techniques_network_latest_extraction_decid e_split_modify_based_hyperparameters_hyperparameter_iterati ve_manual_target_vector_optimization_function_neuron_tensor _gradient_methodology_prepare_cross_way_available_accepted_ collect_imbalanced_data_processed_validationconfusion_error_logistic_regression_nearest_neighbor_combin ation_evaluation_decision_tree_naive_bayes_support_vector_m achine_representation_bias_dimensionality_reduction_cluster ing_documents_sentences_classification_detection_permission _career_accelerate_algorithm_based_operations_interactions_ approachconfiguration_optimizer_models_structure_iterations_hyperpa rameter_batch_size_initial_losscompile_fit_sparse_features_custom_metrics_truth_confusion_ matrix_optimizer_gradients_regularization_backpropagation_c ompilation_executable_instruction_wrapper_auto_encoder_ReLU _parameters_shuffle_validation_embedding;Mental_health_immunity_resilience_attractive_behaviors_weav ing_soft-touch_encouraging_divide_resembles_labels_enthusiasm_improv ement_relies_balance-partner_handles_roles_balancing_physical-intellectual-emotional-social-aspectsinterconnected.elementsofits_no_allows_selection_sources_ba sed_on_learning_friendships_circle_distribution_impacts.pag eSize(10)_impacted_everydaydefault_timeliness_locale_integration.set_color_regex_translate_decor_class_header_insert_volume_scalability.increment _understand_membership_page_returnto_flag_like_dynamic_scal ing_slack.documentation_utilities_fast-moving_wavelength_idp.argparse_starred_template_namespace_s pacies_deep_learning_botch_difficient1996_backend_gradual_p ublished_config_stage_approachingClustering patients only-knowtrustworthy_space_clusters_intensity_grouped_variable_conne ct_points_contributed_content-unite_strength_consistency_mean_journalists_compiled.corpor eal_underpinning_shared_conversing_plural_house_collaborati on_long-life_passionately_junction_binary_happy_trying_new_extensio ns_Python-impenetr.cure_large_categories_radiant_present_day-broader_interference_highlight_start-solving_recording_build_application_presence-future.harmonisation_courses_comprehend_browser_childish_re distribution_vision_notion_nodes-computational_algorithm_durability_series-callback_periodical_end_input_random-render_callback_resolution-session_stabilized_show_elements_cluster-growing_selectively_parallel_process_counter_facial-cognition_feedback_lists_configure_science-based_neutral_integration.enjoys_homecoming_bits_overcome_r egarding_layout_transcoding_pass-values_occurs_among_principally_named_delivered_connection_ definition_aid_console_configuration_average_priority_strin g_dimension_integer_catechism_display_polygon.generates_pos ition_url_format_activate_map_touch_insight_characteristics _varieties_specifying_critical_singleton_visibility_boundar y_persistency.io_results_interrupt_exchange_views_commentar y_pattern_exports_signatories_additional_account_mu nity-based_restore_print_file-driven_virtual_volume_connector_lottery_project.archive_bra cket_time_transformationAtPath.iteratively_design.crystalli ze_existing_resources_rgb_pixel-grain_spiral_balance_upon_audience_flush_headers.content_fo rmatter_compare_decline_archive_initialize_processing_voice _blocks_confirmation.perfect_registration_schedule_thread.c ohesion_skill_chip_resource_data_copy_limit_irrelevant_thre shold_deviation.remark_stimulus_vc_sr_accessor_entry-order_manipulate_sampling_rate_now_doc_differ_non_resource_optimal_facing_byte-stream_update_scan_frame_multiple_pose_recall_offset_callba ck_internal_stress_interval.lib_code_errata_estraction_unit _action_pixels.receiver_generation_resolve_point_vertex_pol yline_defy_edge_arrow.run.dex_meta_add_build.edges_terrestr ial_measured_relinquish_field_polynomial.equation_dual_norm ative_constraint_relation_absorption_settling_wave_fragment _instance.winding_zone_radius_range_angle_notation.variable s_rotation_distance_potent_subtraction_equivocate_figure_ch art_coordinate_projection.naturalwooded_vegetable_cleanse_draft_entwining_plastic_lovable_sn ugvigorous_form_histogram_character_space_APLiangle_emblazo n_area_circle_degree_symmetry_decipher_shape_outline.parame tric_decimal_extensive_function_mathematics_computation_ind iscernible_math.math.MathJax_intersect_symbol_spherical_der ivative_scalar_integral_decorate_geometry_downloading.regul ar_distribution_linear_coefficient_formulaic.manual_source_ equipose_pack_query_postulate_astute_probe_antagonistic.dis course_logic_measure_components_evaluations_animate_align_f orce_engagement.stochastic_variable_rate_transient_object_t ricky_regression_parameterexponentially_smooth_overfitting_gradient_hop_topics_metrics_labeled_multiplier_increment_whole_number_constant.domain _classification_error_vector_density.cluster_kernel_normali zation.error_signature_ratio_function.regression_penalty_st ochastic.batch_statistician_hypothesis_test_quality_model_w eight_algorithmic_tf_testing.mock_runtime_condition_metther mormedia.float_binary_tensor_axes_concatlocate_operational. overflow_output_format_detection_inference.engineer_persona pute_scientist.decisiontheroe.pool_generate_coalesce_sparse_noise_lexicon_product_ managerality.optimize_tensorflow_variables_hyper_cube_GRP_b uffer_client_register_massively_scalably_aggregated_bootcam p_leader_dot-notebook.methodologies_catalogue_epsilon.tuple_indicator_ro om_verification_collection_cache_norm_condition_highway_aut henticate_echo_benchmark_terabyte_statistics_acquisition.co re_system_tuple_session_protocol-content.prime_define_sequence_control_lookup_compiler.cpp_r eading_HTML_bootstrap_parts_div.apply_bug_typography_handle .responsive_integration_placeholder_semantic_overflow_load_ square_fetch_algorithm_update_board_chain_domain_frame_term inate_calculate.plural_fonts_parallelism_descriptor.specifi c_avg_median_duplicate_mean_bias_prediction_track_accounts_press(axis_due_component_us_attach_divide_addition_growth.l owercase_pythonio_fold_key_focus_surround_paragraph.image_f older_right_shift_block_small.many_quotient_header_prefix_p ostfix_common_sentence_letterabbreviation_detect_progress_m anage.stripe_access_layer_call_modal_lessinstructor.collabo rator_redirect_output_align_equal_tothecascade_area_method_ center_middle_base.derived_testing_basic_calculation_mainta ineddeduct_imagine_individual_assumption-framework_appending.zip_first.csv_chunk_ofabnormal.approxim ation_calculating_attempts_master.quarter_drastically.binar y_operation_cross-valid.accord_apply_to-sum_from_argspace_dimensions_half_rotation_of_second.produc t_approxiounding_VC_grid_cast_raise_up.add_or_remaining_dec imal_list_median_per_square_root.square_velocity_length_wid th_height_single_surrogistics_frame_summation_percentage_lo garithmic_transcendental_trigonometric_numerical_algebraic_ polynomial_different_integral_development_fraction_digits_o perations_positive_negative_minimizer_maximizer_identifier_ count_DP.ipynb_jax.def_WX.figure.hist.statistics.mean_varia nce_standard_deviation_simulation_seed_uniform_random_norma l_standard.error linear_wheel-gradient_vectors_sum_product_dot-determine_matrix_row_merge_column_reverse_spectrum-electronic_arithmetic_difference_derivative_integral_power_ MU_IEEE_memory_storage_architecture_alignment_engineering_s tatic_handshake-procedure.optional_object-oriented_instance_question_z-score_margin_relative_frequency_population_survey.variabili ty_variant_metric.implementation_class-variable_subscript_brace_sequence_black-box.chronological_timeline_dependent_independent_observatio n_null_sequential_iteration.iteration_external_internal_pro gramming_language_syntax_sentence.structure_tree_compounder _atom_struct_element_category_structure_paragraph.page_book _title_author_horizontally_vertically_orientation_table_mar gin_borderformat_indent_style_semantics_head_body.thematic_abstract_m ain_keywords_clock_quotes_ratings_feedback_classifier_decis ion_tree_artificial.neural_network_machine_learning_keyword _library_track_citation_format_quote_alignment_document_sec tion_subsection_handling_section-follows_turn_for-sided_shared_weight.Du bibliothèque_name_teacher_course_e_roll_expiry_details_cell.id_date_ expectation_student_subject_marks_punctuation_center_end_bullet_theorem_formula_expression_rectangle_triangle_orientat ion_cycle_second_site_meter_centimeter.ruler_scaled_modular _units_length_width_height_volts_ampere_current_voltage_her tz_frequency_wavelength_micro_tip_transition_glide_move_end _graph_node_branch_segment_edge_path_cycle_source_sink_netw ork_connected_components_directed.controlled_pulse_byte_req uest_address_data_bits_protocol_different_upport_port_promp t_address_assignment.routing_delivery_segment_director_blue print_routing_table_forward_backward_multicast_broadcast_pa cket_switch_concatenate_split_pool_ipv4。
3GPP TS 36.331 V13.2.0 (2016-06)Technical Specification3rd Generation Partnership Project;Technical Specification Group Radio Access Network;Evolved Universal Terrestrial Radio Access (E-UTRA);Radio Resource Control (RRC);Protocol specification(Release 13)The present document has been developed within the 3rd Generation Partnership Project (3GPP TM) and may be further elaborated for the purposes of 3GPP. The present document has not been subject to any approval process by the 3GPP Organizational Partners and shall not be implemented.This Specification is provided for future development work within 3GPP only. The Organizational Partners accept no liability for any use of this Specification. Specifications and reports for implementation of the 3GPP TM system should be obtained via the 3GPP Organizational Partners' Publications Offices.KeywordsUMTS, radio3GPPPostal address3GPP support office address650 Route des Lucioles - Sophia AntipolisValbonne - FRANCETel.: +33 4 92 94 42 00 Fax: +33 4 93 65 47 16InternetCopyright NotificationNo part may be reproduced except as authorized by written permission.The copyright and the foregoing restriction extend to reproduction in all media.© 2016, 3GPP Organizational Partners (ARIB, ATIS, CCSA, ETSI, TSDSI, TTA, TTC).All rights reserved.UMTS™ is a Trade Mark of ETSI registered for the benefit of its members3GPP™ is a Trade Mark of ETSI registered for the benefit of its Members and of the 3GPP Organizational PartnersLTE™ is a Trade Mark of ETSI currently being registered for the benefit of its Members and of the 3GPP Organizational Partners GSM® and the GSM logo are registered and owned by the GSM AssociationBluetooth® is a Trade Mark of the Bluetooth SIG registered for the benefit of its membersContentsForeword (18)1Scope (19)2References (19)3Definitions, symbols and abbreviations (22)3.1Definitions (22)3.2Abbreviations (24)4General (27)4.1Introduction (27)4.2Architecture (28)4.2.1UE states and state transitions including inter RAT (28)4.2.2Signalling radio bearers (29)4.3Services (30)4.3.1Services provided to upper layers (30)4.3.2Services expected from lower layers (30)4.4Functions (30)5Procedures (32)5.1General (32)5.1.1Introduction (32)5.1.2General requirements (32)5.2System information (33)5.2.1Introduction (33)5.2.1.1General (33)5.2.1.2Scheduling (34)5.2.1.2a Scheduling for NB-IoT (34)5.2.1.3System information validity and notification of changes (35)5.2.1.4Indication of ETWS notification (36)5.2.1.5Indication of CMAS notification (37)5.2.1.6Notification of EAB parameters change (37)5.2.1.7Access Barring parameters change in NB-IoT (37)5.2.2System information acquisition (38)5.2.2.1General (38)5.2.2.2Initiation (38)5.2.2.3System information required by the UE (38)5.2.2.4System information acquisition by the UE (39)5.2.2.5Essential system information missing (42)5.2.2.6Actions upon reception of the MasterInformationBlock message (42)5.2.2.7Actions upon reception of the SystemInformationBlockType1 message (42)5.2.2.8Actions upon reception of SystemInformation messages (44)5.2.2.9Actions upon reception of SystemInformationBlockType2 (44)5.2.2.10Actions upon reception of SystemInformationBlockType3 (45)5.2.2.11Actions upon reception of SystemInformationBlockType4 (45)5.2.2.12Actions upon reception of SystemInformationBlockType5 (45)5.2.2.13Actions upon reception of SystemInformationBlockType6 (45)5.2.2.14Actions upon reception of SystemInformationBlockType7 (45)5.2.2.15Actions upon reception of SystemInformationBlockType8 (45)5.2.2.16Actions upon reception of SystemInformationBlockType9 (46)5.2.2.17Actions upon reception of SystemInformationBlockType10 (46)5.2.2.18Actions upon reception of SystemInformationBlockType11 (46)5.2.2.19Actions upon reception of SystemInformationBlockType12 (47)5.2.2.20Actions upon reception of SystemInformationBlockType13 (48)5.2.2.21Actions upon reception of SystemInformationBlockType14 (48)5.2.2.22Actions upon reception of SystemInformationBlockType15 (48)5.2.2.23Actions upon reception of SystemInformationBlockType16 (48)5.2.2.24Actions upon reception of SystemInformationBlockType17 (48)5.2.2.25Actions upon reception of SystemInformationBlockType18 (48)5.2.2.26Actions upon reception of SystemInformationBlockType19 (49)5.2.3Acquisition of an SI message (49)5.2.3a Acquisition of an SI message by BL UE or UE in CE or a NB-IoT UE (50)5.3Connection control (50)5.3.1Introduction (50)5.3.1.1RRC connection control (50)5.3.1.2Security (52)5.3.1.2a RN security (53)5.3.1.3Connected mode mobility (53)5.3.1.4Connection control in NB-IoT (54)5.3.2Paging (55)5.3.2.1General (55)5.3.2.2Initiation (55)5.3.2.3Reception of the Paging message by the UE (55)5.3.3RRC connection establishment (56)5.3.3.1General (56)5.3.3.1a Conditions for establishing RRC Connection for sidelink communication/ discovery (58)5.3.3.2Initiation (59)5.3.3.3Actions related to transmission of RRCConnectionRequest message (63)5.3.3.3a Actions related to transmission of RRCConnectionResumeRequest message (64)5.3.3.4Reception of the RRCConnectionSetup by the UE (64)5.3.3.4a Reception of the RRCConnectionResume by the UE (66)5.3.3.5Cell re-selection while T300, T302, T303, T305, T306, or T308 is running (68)5.3.3.6T300 expiry (68)5.3.3.7T302, T303, T305, T306, or T308 expiry or stop (69)5.3.3.8Reception of the RRCConnectionReject by the UE (70)5.3.3.9Abortion of RRC connection establishment (71)5.3.3.10Handling of SSAC related parameters (71)5.3.3.11Access barring check (72)5.3.3.12EAB check (73)5.3.3.13Access barring check for ACDC (73)5.3.3.14Access Barring check for NB-IoT (74)5.3.4Initial security activation (75)5.3.4.1General (75)5.3.4.2Initiation (76)5.3.4.3Reception of the SecurityModeCommand by the UE (76)5.3.5RRC connection reconfiguration (77)5.3.5.1General (77)5.3.5.2Initiation (77)5.3.5.3Reception of an RRCConnectionReconfiguration not including the mobilityControlInfo by theUE (77)5.3.5.4Reception of an RRCConnectionReconfiguration including the mobilityControlInfo by the UE(handover) (79)5.3.5.5Reconfiguration failure (83)5.3.5.6T304 expiry (handover failure) (83)5.3.5.7Void (84)5.3.5.7a T307 expiry (SCG change failure) (84)5.3.5.8Radio Configuration involving full configuration option (84)5.3.6Counter check (86)5.3.6.1General (86)5.3.6.2Initiation (86)5.3.6.3Reception of the CounterCheck message by the UE (86)5.3.7RRC connection re-establishment (87)5.3.7.1General (87)5.3.7.2Initiation (87)5.3.7.3Actions following cell selection while T311 is running (88)5.3.7.4Actions related to transmission of RRCConnectionReestablishmentRequest message (89)5.3.7.5Reception of the RRCConnectionReestablishment by the UE (89)5.3.7.6T311 expiry (91)5.3.7.7T301 expiry or selected cell no longer suitable (91)5.3.7.8Reception of RRCConnectionReestablishmentReject by the UE (91)5.3.8RRC connection release (92)5.3.8.1General (92)5.3.8.2Initiation (92)5.3.8.3Reception of the RRCConnectionRelease by the UE (92)5.3.8.4T320 expiry (93)5.3.9RRC connection release requested by upper layers (93)5.3.9.1General (93)5.3.9.2Initiation (93)5.3.10Radio resource configuration (93)5.3.10.0General (93)5.3.10.1SRB addition/ modification (94)5.3.10.2DRB release (95)5.3.10.3DRB addition/ modification (95)5.3.10.3a1DC specific DRB addition or reconfiguration (96)5.3.10.3a2LWA specific DRB addition or reconfiguration (98)5.3.10.3a3LWIP specific DRB addition or reconfiguration (98)5.3.10.3a SCell release (99)5.3.10.3b SCell addition/ modification (99)5.3.10.3c PSCell addition or modification (99)5.3.10.4MAC main reconfiguration (99)5.3.10.5Semi-persistent scheduling reconfiguration (100)5.3.10.6Physical channel reconfiguration (100)5.3.10.7Radio Link Failure Timers and Constants reconfiguration (101)5.3.10.8Time domain measurement resource restriction for serving cell (101)5.3.10.9Other configuration (102)5.3.10.10SCG reconfiguration (103)5.3.10.11SCG dedicated resource configuration (104)5.3.10.12Reconfiguration SCG or split DRB by drb-ToAddModList (105)5.3.10.13Neighbour cell information reconfiguration (105)5.3.10.14Void (105)5.3.10.15Sidelink dedicated configuration (105)5.3.10.16T370 expiry (106)5.3.11Radio link failure related actions (107)5.3.11.1Detection of physical layer problems in RRC_CONNECTED (107)5.3.11.2Recovery of physical layer problems (107)5.3.11.3Detection of radio link failure (107)5.3.12UE actions upon leaving RRC_CONNECTED (109)5.3.13UE actions upon PUCCH/ SRS release request (110)5.3.14Proximity indication (110)5.3.14.1General (110)5.3.14.2Initiation (111)5.3.14.3Actions related to transmission of ProximityIndication message (111)5.3.15Void (111)5.4Inter-RAT mobility (111)5.4.1Introduction (111)5.4.2Handover to E-UTRA (112)5.4.2.1General (112)5.4.2.2Initiation (112)5.4.2.3Reception of the RRCConnectionReconfiguration by the UE (112)5.4.2.4Reconfiguration failure (114)5.4.2.5T304 expiry (handover to E-UTRA failure) (114)5.4.3Mobility from E-UTRA (114)5.4.3.1General (114)5.4.3.2Initiation (115)5.4.3.3Reception of the MobilityFromEUTRACommand by the UE (115)5.4.3.4Successful completion of the mobility from E-UTRA (116)5.4.3.5Mobility from E-UTRA failure (117)5.4.4Handover from E-UTRA preparation request (CDMA2000) (117)5.4.4.1General (117)5.4.4.2Initiation (118)5.4.4.3Reception of the HandoverFromEUTRAPreparationRequest by the UE (118)5.4.5UL handover preparation transfer (CDMA2000) (118)5.4.5.1General (118)5.4.5.2Initiation (118)5.4.5.3Actions related to transmission of the ULHandoverPreparationTransfer message (119)5.4.5.4Failure to deliver the ULHandoverPreparationTransfer message (119)5.4.6Inter-RAT cell change order to E-UTRAN (119)5.4.6.1General (119)5.4.6.2Initiation (119)5.4.6.3UE fails to complete an inter-RAT cell change order (119)5.5Measurements (120)5.5.1Introduction (120)5.5.2Measurement configuration (121)5.5.2.1General (121)5.5.2.2Measurement identity removal (122)5.5.2.2a Measurement identity autonomous removal (122)5.5.2.3Measurement identity addition/ modification (123)5.5.2.4Measurement object removal (124)5.5.2.5Measurement object addition/ modification (124)5.5.2.6Reporting configuration removal (126)5.5.2.7Reporting configuration addition/ modification (127)5.5.2.8Quantity configuration (127)5.5.2.9Measurement gap configuration (127)5.5.2.10Discovery signals measurement timing configuration (128)5.5.2.11RSSI measurement timing configuration (128)5.5.3Performing measurements (128)5.5.3.1General (128)5.5.3.2Layer 3 filtering (131)5.5.4Measurement report triggering (131)5.5.4.1General (131)5.5.4.2Event A1 (Serving becomes better than threshold) (135)5.5.4.3Event A2 (Serving becomes worse than threshold) (136)5.5.4.4Event A3 (Neighbour becomes offset better than PCell/ PSCell) (136)5.5.4.5Event A4 (Neighbour becomes better than threshold) (137)5.5.4.6Event A5 (PCell/ PSCell becomes worse than threshold1 and neighbour becomes better thanthreshold2) (138)5.5.4.6a Event A6 (Neighbour becomes offset better than SCell) (139)5.5.4.7Event B1 (Inter RAT neighbour becomes better than threshold) (139)5.5.4.8Event B2 (PCell becomes worse than threshold1 and inter RAT neighbour becomes better thanthreshold2) (140)5.5.4.9Event C1 (CSI-RS resource becomes better than threshold) (141)5.5.4.10Event C2 (CSI-RS resource becomes offset better than reference CSI-RS resource) (141)5.5.4.11Event W1 (WLAN becomes better than a threshold) (142)5.5.4.12Event W2 (All WLAN inside WLAN mobility set becomes worse than threshold1 and a WLANoutside WLAN mobility set becomes better than threshold2) (142)5.5.4.13Event W3 (All WLAN inside WLAN mobility set becomes worse than a threshold) (143)5.5.5Measurement reporting (144)5.5.6Measurement related actions (148)5.5.6.1Actions upon handover and re-establishment (148)5.5.6.2Speed dependant scaling of measurement related parameters (149)5.5.7Inter-frequency RSTD measurement indication (149)5.5.7.1General (149)5.5.7.2Initiation (150)5.5.7.3Actions related to transmission of InterFreqRSTDMeasurementIndication message (150)5.6Other (150)5.6.0General (150)5.6.1DL information transfer (151)5.6.1.1General (151)5.6.1.2Initiation (151)5.6.1.3Reception of the DLInformationTransfer by the UE (151)5.6.2UL information transfer (151)5.6.2.1General (151)5.6.2.2Initiation (151)5.6.2.3Actions related to transmission of ULInformationTransfer message (152)5.6.2.4Failure to deliver ULInformationTransfer message (152)5.6.3UE capability transfer (152)5.6.3.1General (152)5.6.3.2Initiation (153)5.6.3.3Reception of the UECapabilityEnquiry by the UE (153)5.6.4CSFB to 1x Parameter transfer (157)5.6.4.1General (157)5.6.4.2Initiation (157)5.6.4.3Actions related to transmission of CSFBParametersRequestCDMA2000 message (157)5.6.4.4Reception of the CSFBParametersResponseCDMA2000 message (157)5.6.5UE Information (158)5.6.5.1General (158)5.6.5.2Initiation (158)5.6.5.3Reception of the UEInformationRequest message (158)5.6.6 Logged Measurement Configuration (159)5.6.6.1General (159)5.6.6.2Initiation (160)5.6.6.3Reception of the LoggedMeasurementConfiguration by the UE (160)5.6.6.4T330 expiry (160)5.6.7 Release of Logged Measurement Configuration (160)5.6.7.1General (160)5.6.7.2Initiation (160)5.6.8 Measurements logging (161)5.6.8.1General (161)5.6.8.2Initiation (161)5.6.9In-device coexistence indication (163)5.6.9.1General (163)5.6.9.2Initiation (164)5.6.9.3Actions related to transmission of InDeviceCoexIndication message (164)5.6.10UE Assistance Information (165)5.6.10.1General (165)5.6.10.2Initiation (166)5.6.10.3Actions related to transmission of UEAssistanceInformation message (166)5.6.11 Mobility history information (166)5.6.11.1General (166)5.6.11.2Initiation (166)5.6.12RAN-assisted WLAN interworking (167)5.6.12.1General (167)5.6.12.2Dedicated WLAN offload configuration (167)5.6.12.3WLAN offload RAN evaluation (167)5.6.12.4T350 expiry or stop (167)5.6.12.5Cell selection/ re-selection while T350 is running (168)5.6.13SCG failure information (168)5.6.13.1General (168)5.6.13.2Initiation (168)5.6.13.3Actions related to transmission of SCGFailureInformation message (168)5.6.14LTE-WLAN Aggregation (169)5.6.14.1Introduction (169)5.6.14.2Reception of LWA configuration (169)5.6.14.3Release of LWA configuration (170)5.6.15WLAN connection management (170)5.6.15.1Introduction (170)5.6.15.2WLAN connection status reporting (170)5.6.15.2.1General (170)5.6.15.2.2Initiation (171)5.6.15.2.3Actions related to transmission of WLANConnectionStatusReport message (171)5.6.15.3T351 Expiry (WLAN connection attempt timeout) (171)5.6.15.4WLAN status monitoring (171)5.6.16RAN controlled LTE-WLAN interworking (172)5.6.16.1General (172)5.6.16.2WLAN traffic steering command (172)5.6.17LTE-WLAN aggregation with IPsec tunnel (173)5.6.17.1General (173)5.7Generic error handling (174)5.7.1General (174)5.7.2ASN.1 violation or encoding error (174)5.7.3Field set to a not comprehended value (174)5.7.4Mandatory field missing (174)5.7.5Not comprehended field (176)5.8MBMS (176)5.8.1Introduction (176)5.8.1.1General (176)5.8.1.2Scheduling (176)5.8.1.3MCCH information validity and notification of changes (176)5.8.2MCCH information acquisition (178)5.8.2.1General (178)5.8.2.2Initiation (178)5.8.2.3MCCH information acquisition by the UE (178)5.8.2.4Actions upon reception of the MBSFNAreaConfiguration message (178)5.8.2.5Actions upon reception of the MBMSCountingRequest message (179)5.8.3MBMS PTM radio bearer configuration (179)5.8.3.1General (179)5.8.3.2Initiation (179)5.8.3.3MRB establishment (179)5.8.3.4MRB release (179)5.8.4MBMS Counting Procedure (179)5.8.4.1General (179)5.8.4.2Initiation (180)5.8.4.3Reception of the MBMSCountingRequest message by the UE (180)5.8.5MBMS interest indication (181)5.8.5.1General (181)5.8.5.2Initiation (181)5.8.5.3Determine MBMS frequencies of interest (182)5.8.5.4Actions related to transmission of MBMSInterestIndication message (183)5.8a SC-PTM (183)5.8a.1Introduction (183)5.8a.1.1General (183)5.8a.1.2SC-MCCH scheduling (183)5.8a.1.3SC-MCCH information validity and notification of changes (183)5.8a.1.4Procedures (184)5.8a.2SC-MCCH information acquisition (184)5.8a.2.1General (184)5.8a.2.2Initiation (184)5.8a.2.3SC-MCCH information acquisition by the UE (184)5.8a.2.4Actions upon reception of the SCPTMConfiguration message (185)5.8a.3SC-PTM radio bearer configuration (185)5.8a.3.1General (185)5.8a.3.2Initiation (185)5.8a.3.3SC-MRB establishment (185)5.8a.3.4SC-MRB release (185)5.9RN procedures (186)5.9.1RN reconfiguration (186)5.9.1.1General (186)5.9.1.2Initiation (186)5.9.1.3Reception of the RNReconfiguration by the RN (186)5.10Sidelink (186)5.10.1Introduction (186)5.10.1a Conditions for sidelink communication operation (187)5.10.2Sidelink UE information (188)5.10.2.1General (188)5.10.2.2Initiation (189)5.10.2.3Actions related to transmission of SidelinkUEInformation message (193)5.10.3Sidelink communication monitoring (195)5.10.6Sidelink discovery announcement (198)5.10.6a Sidelink discovery announcement pool selection (201)5.10.6b Sidelink discovery announcement reference carrier selection (201)5.10.7Sidelink synchronisation information transmission (202)5.10.7.1General (202)5.10.7.2Initiation (203)5.10.7.3Transmission of SLSS (204)5.10.7.4Transmission of MasterInformationBlock-SL message (205)5.10.7.5Void (206)5.10.8Sidelink synchronisation reference (206)5.10.8.1General (206)5.10.8.2Selection and reselection of synchronisation reference UE (SyncRef UE) (206)5.10.9Sidelink common control information (207)5.10.9.1General (207)5.10.9.2Actions related to reception of MasterInformationBlock-SL message (207)5.10.10Sidelink relay UE operation (207)5.10.10.1General (207)5.10.10.2AS-conditions for relay related sidelink communication transmission by sidelink relay UE (207)5.10.10.3AS-conditions for relay PS related sidelink discovery transmission by sidelink relay UE (208)5.10.10.4Sidelink relay UE threshold conditions (208)5.10.11Sidelink remote UE operation (208)5.10.11.1General (208)5.10.11.2AS-conditions for relay related sidelink communication transmission by sidelink remote UE (208)5.10.11.3AS-conditions for relay PS related sidelink discovery transmission by sidelink remote UE (209)5.10.11.4Selection and reselection of sidelink relay UE (209)5.10.11.5Sidelink remote UE threshold conditions (210)6Protocol data units, formats and parameters (tabular & ASN.1) (210)6.1General (210)6.2RRC messages (212)6.2.1General message structure (212)–EUTRA-RRC-Definitions (212)–BCCH-BCH-Message (212)–BCCH-DL-SCH-Message (212)–BCCH-DL-SCH-Message-BR (213)–MCCH-Message (213)–PCCH-Message (213)–DL-CCCH-Message (214)–DL-DCCH-Message (214)–UL-CCCH-Message (214)–UL-DCCH-Message (215)–SC-MCCH-Message (215)6.2.2Message definitions (216)–CounterCheck (216)–CounterCheckResponse (217)–CSFBParametersRequestCDMA2000 (217)–CSFBParametersResponseCDMA2000 (218)–DLInformationTransfer (218)–HandoverFromEUTRAPreparationRequest (CDMA2000) (219)–InDeviceCoexIndication (220)–InterFreqRSTDMeasurementIndication (222)–LoggedMeasurementConfiguration (223)–MasterInformationBlock (225)–MBMSCountingRequest (226)–MBMSCountingResponse (226)–MBMSInterestIndication (227)–MBSFNAreaConfiguration (228)–MeasurementReport (228)–MobilityFromEUTRACommand (229)–Paging (232)–ProximityIndication (233)–RNReconfiguration (234)–RNReconfigurationComplete (234)–RRCConnectionReconfiguration (235)–RRCConnectionReconfigurationComplete (240)–RRCConnectionReestablishment (241)–RRCConnectionReestablishmentComplete (241)–RRCConnectionReestablishmentReject (242)–RRCConnectionReestablishmentRequest (243)–RRCConnectionReject (243)–RRCConnectionRelease (244)–RRCConnectionResume (248)–RRCConnectionResumeComplete (249)–RRCConnectionResumeRequest (250)–RRCConnectionRequest (250)–RRCConnectionSetup (251)–RRCConnectionSetupComplete (252)–SCGFailureInformation (253)–SCPTMConfiguration (254)–SecurityModeCommand (255)–SecurityModeComplete (255)–SecurityModeFailure (256)–SidelinkUEInformation (256)–SystemInformation (258)–SystemInformationBlockType1 (259)–UEAssistanceInformation (264)–UECapabilityEnquiry (265)–UECapabilityInformation (266)–UEInformationRequest (267)–UEInformationResponse (267)–ULHandoverPreparationTransfer (CDMA2000) (273)–ULInformationTransfer (274)–WLANConnectionStatusReport (274)6.3RRC information elements (275)6.3.1System information blocks (275)–SystemInformationBlockType2 (275)–SystemInformationBlockType3 (279)–SystemInformationBlockType4 (282)–SystemInformationBlockType5 (283)–SystemInformationBlockType6 (287)–SystemInformationBlockType7 (289)–SystemInformationBlockType8 (290)–SystemInformationBlockType9 (295)–SystemInformationBlockType10 (295)–SystemInformationBlockType11 (296)–SystemInformationBlockType12 (297)–SystemInformationBlockType13 (297)–SystemInformationBlockType14 (298)–SystemInformationBlockType15 (298)–SystemInformationBlockType16 (299)–SystemInformationBlockType17 (300)–SystemInformationBlockType18 (301)–SystemInformationBlockType19 (301)–SystemInformationBlockType20 (304)6.3.2Radio resource control information elements (304)–AntennaInfo (304)–AntennaInfoUL (306)–CQI-ReportConfig (307)–CQI-ReportPeriodicProcExtId (314)–CrossCarrierSchedulingConfig (314)–CSI-IM-Config (315)–CSI-IM-ConfigId (315)–CSI-RS-Config (317)–CSI-RS-ConfigEMIMO (318)–CSI-RS-ConfigNZP (319)–CSI-RS-ConfigNZPId (320)–CSI-RS-ConfigZP (321)–CSI-RS-ConfigZPId (321)–DMRS-Config (321)–DRB-Identity (322)–EPDCCH-Config (322)–EIMTA-MainConfig (324)–LogicalChannelConfig (325)–LWA-Configuration (326)–LWIP-Configuration (326)–RCLWI-Configuration (327)–MAC-MainConfig (327)–P-C-AndCBSR (332)–PDCCH-ConfigSCell (333)–PDCP-Config (334)–PDSCH-Config (337)–PDSCH-RE-MappingQCL-ConfigId (339)–PHICH-Config (339)–PhysicalConfigDedicated (339)–P-Max (344)–PRACH-Config (344)–PresenceAntennaPort1 (346)–PUCCH-Config (347)–PUSCH-Config (351)–RACH-ConfigCommon (355)–RACH-ConfigDedicated (357)–RadioResourceConfigCommon (358)–RadioResourceConfigDedicated (362)–RLC-Config (367)–RLF-TimersAndConstants (369)–RN-SubframeConfig (370)–SchedulingRequestConfig (371)–SoundingRS-UL-Config (372)–SPS-Config (375)–TDD-Config (376)–TimeAlignmentTimer (377)–TPC-PDCCH-Config (377)–TunnelConfigLWIP (378)–UplinkPowerControl (379)–WLAN-Id-List (382)–WLAN-MobilityConfig (382)6.3.3Security control information elements (382)–NextHopChainingCount (382)–SecurityAlgorithmConfig (383)–ShortMAC-I (383)6.3.4Mobility control information elements (383)–AdditionalSpectrumEmission (383)–ARFCN-ValueCDMA2000 (383)–ARFCN-ValueEUTRA (384)–ARFCN-ValueGERAN (384)–ARFCN-ValueUTRA (384)–BandclassCDMA2000 (384)–BandIndicatorGERAN (385)–CarrierFreqCDMA2000 (385)–CarrierFreqGERAN (385)–CellIndexList (387)–CellReselectionPriority (387)–CellSelectionInfoCE (387)–CellReselectionSubPriority (388)–CSFB-RegistrationParam1XRTT (388)–CellGlobalIdEUTRA (389)–CellGlobalIdUTRA (389)–CellGlobalIdGERAN (390)–CellGlobalIdCDMA2000 (390)–CellSelectionInfoNFreq (391)–CSG-Identity (391)–FreqBandIndicator (391)–MobilityControlInfo (391)–MobilityParametersCDMA2000 (1xRTT) (393)–MobilityStateParameters (394)–MultiBandInfoList (394)–NS-PmaxList (394)–PhysCellId (395)–PhysCellIdRange (395)–PhysCellIdRangeUTRA-FDDList (395)–PhysCellIdCDMA2000 (396)–PhysCellIdGERAN (396)–PhysCellIdUTRA-FDD (396)–PhysCellIdUTRA-TDD (396)–PLMN-Identity (397)–PLMN-IdentityList3 (397)–PreRegistrationInfoHRPD (397)–Q-QualMin (398)–Q-RxLevMin (398)–Q-OffsetRange (398)–Q-OffsetRangeInterRAT (399)–ReselectionThreshold (399)–ReselectionThresholdQ (399)–SCellIndex (399)–ServCellIndex (400)–SpeedStateScaleFactors (400)–SystemInfoListGERAN (400)–SystemTimeInfoCDMA2000 (401)–TrackingAreaCode (401)–T-Reselection (402)–T-ReselectionEUTRA-CE (402)6.3.5Measurement information elements (402)–AllowedMeasBandwidth (402)–CSI-RSRP-Range (402)–Hysteresis (402)–LocationInfo (403)–MBSFN-RSRQ-Range (403)–MeasConfig (404)–MeasDS-Config (405)–MeasGapConfig (406)–MeasId (407)–MeasIdToAddModList (407)–MeasObjectCDMA2000 (408)–MeasObjectEUTRA (408)–MeasObjectGERAN (412)–MeasObjectId (412)–MeasObjectToAddModList (412)–MeasObjectUTRA (413)–ReportConfigEUTRA (422)–ReportConfigId (425)–ReportConfigInterRAT (425)–ReportConfigToAddModList (428)–ReportInterval (429)–RSRP-Range (429)–RSRQ-Range (430)–RSRQ-Type (430)–RS-SINR-Range (430)–RSSI-Range-r13 (431)–TimeToTrigger (431)–UL-DelayConfig (431)–WLAN-CarrierInfo (431)–WLAN-RSSI-Range (432)–WLAN-Status (432)6.3.6Other information elements (433)–AbsoluteTimeInfo (433)–AreaConfiguration (433)–C-RNTI (433)–DedicatedInfoCDMA2000 (434)–DedicatedInfoNAS (434)–FilterCoefficient (434)–LoggingDuration (434)–LoggingInterval (435)–MeasSubframePattern (435)–MMEC (435)–NeighCellConfig (435)–OtherConfig (436)–RAND-CDMA2000 (1xRTT) (437)–RAT-Type (437)–ResumeIdentity (437)–RRC-TransactionIdentifier (438)–S-TMSI (438)–TraceReference (438)–UE-CapabilityRAT-ContainerList (438)–UE-EUTRA-Capability (439)–UE-RadioPagingInfo (469)–UE-TimersAndConstants (469)–VisitedCellInfoList (470)–WLAN-OffloadConfig (470)6.3.7MBMS information elements (472)–MBMS-NotificationConfig (472)–MBMS-ServiceList (473)–MBSFN-AreaId (473)–MBSFN-AreaInfoList (473)–MBSFN-SubframeConfig (474)–PMCH-InfoList (475)6.3.7a SC-PTM information elements (476)–SC-MTCH-InfoList (476)–SCPTM-NeighbourCellList (478)6.3.8Sidelink information elements (478)–SL-CommConfig (478)–SL-CommResourcePool (479)–SL-CP-Len (480)–SL-DiscConfig (481)–SL-DiscResourcePool (483)–SL-DiscTxPowerInfo (485)–SL-GapConfig (485)。
收稿日期:2013-03-11;修回日期:2013-05-09基金项目:中央高校基本科研业务费专项资金资助项目(JUSRP211A70);国家自然科学基金资助项目(61373055)作者简介:陈达遥(1988-),男,湖南益阳人,硕士研究生,主要研究方向为人工智能和模式识别(chenda80@163.com );陈秀宏(1964-),男,江苏泰兴人,教授,硕导,博士,主要研究方向为数字图像处理、人脸识别;董昌剑(1991-),男,安徽淮北人,硕士研究生,主要研究方向为人工智能和模式识别.基于正交SRDA 和SRKDA 的人脸识别*陈达遥,陈秀宏,董昌剑(江南大学数字媒体学院,江苏无锡214122)摘要:利用正交投影技术进行降维可以更好地保留与度量结构有关的信息,提高人脸识别性能。
在谱回归判别分析(SRDA )和谱回归核判别分析(SRKDA )的基础上,提出正交SRDA (OSRDA )和正交SRKDA (OSRKDA )降维算法。
首先,给出基于Cholesky 分解求解正交鉴别矢量集的方法,然后,通过该方法对SRDA 和SRKDA 投影向量作正交化处理。
其简单、容易实现而且克服了迭代计算正交鉴别矢量集的方法不适应于谱回归(SR)降维的缺点。
ORL 、Yale 和PIE 库上的实验结果表明了算法的有效性和效率,在有效降维的同时能进一步提高鉴别能力。
关键词:降维;人脸识别;谱回归;正交鉴别矢量;Cholesky 分解中图分类号:TP391.41文献标志码:A文章编号:1001-3695(2014)01-0299-05doi :10.3969/j.issn.1001-3695.2014.01.071Face recognition based on orthogonal SRDA and SRKDACHEN Da-yao ,CHEN Xiu-hong ,DONG Chang-jian(School of Digital Media ,Jiangnan University ,Wuxi Jiangsu 214122,China )Abstract :The dimensionality reduction by orthogonal projection techniques helped preserve the information related to the metric structure and improved the recognition performance in face recognition.Based on spectral regression discriminant analy-sis (SRDA )and spectral regression kernel discriminant analysis (SRKDA ),this paper proposed two dimensionality reduction algorithms named orthogonal SRDA (OSRDA )and orthogonal OSRKDA (OSRKDA ).Firstly ,it gave a set of orthogonal dis-criminant vectors obtained based on Cholesky decomposition.Then ,this paper orthogonalized the projection vectors of SRDA and SRKDA by this method.It was very simple and easy to implement.What ’s more ,it overcame the shortcoming that the iter-ative algorithm of orthogonal discriminant vectors was not suitable for spectral regression dimensionality reduction algorithms.Experiments on ORL ,Yale and PIE demonstrate the effectiveness and efficiency of the algorithms ,and show that these algo-rithms can reduce the dimensions of the data and improve the discriminant ability.Key words :dimensionality reduction ;face recognition ;spectral regression ;orthogonal discriminant vector ;Cholesky de-composition0引言在过去几十年里,人脸识别技术得到了很大的发展,特征提取是人脸识别的关键步骤,其主要目的是降维。
设置:初始值收敛值结果AMIX =0.0100;BMIX =0.0001 AMIX = 0.01; BMIX = 0.00 计算无误AMIX = 0.1000;BMIX = 0.0010 AMIX = 0.10; BMIX = 0.00 计算无误AMIX =0.20; BMIX = 0.01 AMIX =0.20; BMIX = 0.01 计算无误AMIX=0.2、BMIX=0.001 AMIX=0.2、BMIX=0.001 计算无误AMIX=0.3、BMIX=0.1 AMIX=0.3、BMIX=0.1 计算无误AMIX=0.4 AMIX = 0.40; BMIX = 1.00 静态log: WARNING in EDDRMM: call toZHEGV failed, returncode = 6 3 **,能带一样AMIX=0.02 AMIX = 0.02; BMIX = 1.00 计算无误AMIX=0.1 AMIX = 0.10; BMIX = 1.00 静态log: WARNING in EDDRMM: call toZHEGV failed, returncode = 6 3 **,能带一样AMIX=0.3 AMIX = 0.30; BMIX = 1.00 静态log: WARNING in EDDRMM: call toZHEGV failed, returncode = 6 3 **,能带一样BMIX=0.0001 AMIX = 0.40; BMIX = 0.00 计算无误以上参数设置,得到的能带图都一样,如下图:综上:设置AMIX=0.2(或0.3),BMIX默认(省事,等于1.0),可以保证计算过程无误。
还需进一步调整其他参数,算出正确的能带。
警告:算1QL弛豫、静态、能带时,都有这个提示:ADVICE TO THIS USER RUNNING 'V ASP/V AMP' (HEAR YOUR MASTER'S VOICE ...): You have a (more or less)'small supercell' and for smaller cells it is recommended to use the reciprocal-space projection scheme! The real space optimization is not efficient for small cells and it is also less accurate ... Therefore set LREAL=.FALSE. in the INCAR file对策:对于较小的晶胞(原子数小于20),设置LREAL=.FALSE.,计算结果比较精确。
标题:Python在稀疏矩阵中计算余弦相似度的方法在日常的数据分析和机器学习任务中,我们经常需要计算向量之间的相似度。
而在稀疏矩阵中,由于其大部分元素都是零,传统的向量相似度计算方法并不适用。
在这种情况下,我们可以利用余弦相似度来衡量向量之间的相似程度。
本文将介绍如何使用Python在稀疏矩阵中计算余弦相似度的方法。
1. 何为稀疏矩阵?稀疏矩阵是指大部分元素为零的矩阵。
在实际的数据中,很多情况下我们会遇到这种稀疏性很高的矩阵。
在自然语言处理中的文本数据、推荐系统中的用户-物品评分矩阵等都可以看作是稀疏矩阵。
由于其大部分元素为零,因此传统的计算方法在稀疏矩阵上表现并不理想。
2. 余弦相似度计算余弦相似度是一种衡量两个向量方向相似程度的指标,其计算方法如下:\[ \cos(\theta) = \frac{\textbf{A} \cdot\textbf{B}}{\|\textbf{A}\|\|\textbf{B}\|} \]其中,A、B为两个向量,\(\cdot\)代表向量的点积,\(\|\cdot\|\)表示向量的模长。
余弦相似度的取值范围在[-1, 1]之间,值越接近1表示两个向量越相似,值越接近-1表示两个向量方向越相反,值为0表示两个向量方向正交。
3. 使用Python计算稀疏矩阵的余弦相似度在Python中,我们可以使用scipy库来处理稀疏矩阵,并且计算余弦相似度。
我们需要导入相应的库:```pythonimport scipyimport numpy as npfrom scipy.sparse import csr_matrix```我们可以利用csr_matrix函数将普通的稀疏矩阵表示转换为压缩稀疏行矩阵(Compressed Sparse Row matrix,CSR)的表示形式:```pythonA = csr_matrix(A)B = csr_matrix(B)```接下来,我们可以使用scipy库中的cosine_similarity函数来计算稀疏矩阵的余弦相似度:```pythonfrom sklearn.metrics.pairwise import cosine_similarity similarity_matrix = cosine_similarity(A, B)```这样,我们就可以得到稀疏矩阵A和B之间的余弦相似度矩阵了。
Yolov1 是一种用于对象检测的深度学习模型,其损失函数在其设计中扮演着至关重要的角色。
损失函数是用来衡量模型预测结果与实际标签之间的差异的函数,通过最小化损失函数来训练模型,使其能够更准确地预测目标物体的位置和类别。
Yolov1 损失函数的设计经过精心的调整,以在目标检测任务中取得最佳的性能。
本文将从数学公式和实际应用两个方面来探讨 Yolov1 损失函数的具体构成及其特点。
一、Yolov1 损失函数的数学公式Yolov1 的损失函数主要由两部分组成,分别是定位损失和分类损失。
其中,定位损失用于衡量模型对目标位置的预测精度,而分类损失则用于衡量模型对目标类别的预测能力。
具体而言,Yolov1 损失函数的数学公式如下所示:1. 定位损失Yolov1 使用的定位损失函数采用了均方误差(Mean Square Error,MSE)来衡量目标位置预测与实际位置之间的差距。
假设模型的位置预测为 (x, y, w, h),实际位置为 (x_truth, y_truth, w_truth, h_truth),其中 (x, y) 表示目标物体中心的坐标,(w, h) 表示目标物体的宽和高,那么定位损失可以表示为:L_loc = λ_coord * ∑_{i=0}^{S^2} ∑_{j=0}^{B} 1_{ij}^{obj} [(x_i -x_i^{truth})^2 + (y_i - y_i^{truth})^2 + (sqrt(w_i) -sqrt(w_i^{truth}))^2 + (sqrt(h_i) - sqrt(h_i^{truth}))^2]其中,λ_coord 表示定位损失的权重参数,S 表示特征图的尺寸,B 表示每个尺度上的边界框数量,而 1_{ij}^{obj} 表示第 i 个格子的第 j 个边界框是否负责检测到目标。
而∑ 表示求和符号。
2. 分类损失Yolov1 使用的分类损失函数采用了逻辑回归损失(Logistic Regression Loss)来衡量目标类别的预测准确性。
气候的英语作文Climate change is a pressing global issue that has far-reaching implications for the environment, human societies, and the economy. As an English teacher, I would encourage students to write essays on this topic to raise awareness and discuss potential solutions.Climate change, driven primarily by the increase in greenhouse gases in the atmosphere, is causing significant shifts in global weather patterns. The consequences are manifold and affect every corner of the globe, from themelting ice caps in the Arctic to the intensifying heatwavesin Australia.Introduction:The essay begins with an introduction that outlines the urgency of the climate crisis. It highlights the scientific consensus that human activities, particularly the burning of fossil fuels, are the main contributors to the currentwarming trend.Body Paragraph 1: Effects on the EnvironmentThe first body paragraph delves into the environmentaleffects of climate change. It discusses the rising sea levels, which threaten coastal communities and ecosystems, and theincreasing frequency and intensity of extreme weather events, such as hurricanes and droughts.Body Paragraph 2: Impact on Wildlife and EcosystemsThe second paragraph focuses on the impact on wildlife and ecosystems. It explains how climate change is leading to habitat loss, species migration, and the extinction of some species that cannot adapt quickly enough to the changing conditions.Body Paragraph 3: Socioeconomic ImplicationsThe third paragraph examines the socioeconomic implications of climate change. It touches on how climate change can exacerbate poverty, lead to food and water scarcity, and cause displacement of populations, leading to potential conflicts and humanitarian crises.Body Paragraph 4: Human Health ConcernsThe fourth paragraph addresses the human health concerns related to climate change. It discusses the increased risk of vector-borne diseases, heat-related illnesses, and the potential for climate change to exacerbate existing health issues.Conclusion:The essay concludes with a call to action, urging readers to recognize the severity of climate change and to support policies and initiatives aimed at mitigating its effects. It emphasizes the need for collective action on a global scale to transition to a more sustainable and resilient future.Recommendations:The essay may also include a section of recommendations, suggesting ways individuals, communities, and governments can combat climate change. This could include adopting renewable energy sources, reducing waste, supporting reforestation efforts, and advocating for climate-friendly policies.Writing an essay on climate change not only helps students understand the complexities of this global challenge but also empowers them to contribute to the conversation and take action.。
拯救老虎的英语作文80字左右英文回答:Tigers, majestic and powerful creatures, have found themselves on the brink of extinction due to poaching, habitat loss, and climate change. Saving them requires a multifaceted approach that tackles these threats head-on.Enhancing conservation efforts, such as increasing patrols and reducing wildlife crime, is crucial. Governments and organizations must collaborate to enforce laws and provide resources to frontline rangers. Additionally, promoting sustainable practices in forestry and agriculture can help mitigate habitat destruction.Supporting community-led conservation initiatives is equally important. Empowering local communities to protect their natural resources and develop alternative livelihoods reduces conflicts between wildlife and humans. Education and awareness campaigns can foster a sense of stewardshipand motivate people to participate in tiger conservation.Addressing climate change is essential for the long-term survival of tigers. Mitigation measures, such as reducing greenhouse gas emissions and promoting renewable energy, help create a stable climate that supports tiger habitats. Adaptation strategies, like the creation ofwildlife corridors and the restoration of degraded habitats, provide tigers with the resilience to face future environmental challenges.中文回答:拯救老虎,这些雄伟而强壮的生物,已因偷猎、栖息地丧失和气候变化而濒临灭绝。
torch.cosine_similarity 原理-回复"torch.cosine_similarity" is a function provided by the PyTorch library that allows for the calculation of cosine similarity between two given tensors. Before delving into the details of this function, let's first understand what cosine similarity is and why it is an important metric in various machine learning and natural language processing tasks.Cosine similarity measures the similarity between two non-zero vectors in an n-dimensional space. It calculates the cosine of the angle between these vectors, hence the name cosine similarity. The range of cosine similarity lies between -1 and 1, where a value of 1 indicates that the vectors are identical, 0 signifies that they are orthogonal (i.e., there is no similarity), and -1 implies that they are opposite to each other.The cosine similarity is widely used in various domains, including recommendation systems, document similarity analysis, and image processing. Its popularity stems from its ability to capture the semantic similarity between two vectors, irrespective of their magnitude or the space they inhabit. This property makes it particularly useful when dealing with high-dimensional data, suchas text or images.In the context of PyTorch, the "torch.cosine_similarity" function extends the cosine similarity calculation to tensors. Tensors are multi-dimensional arrays that are fundamental to the PyTorch library. They are used to represent and perform computations on data in various dimensions, such as scalars, vectors, matrices, or even tensors of higher order.The "torch.cosine_similarity" function takes two input tensors, "x1" and "x2," and computes the cosine similarity between them. These tensors must have the same shape or be broadcastable to a common shape, meaning that the dimensions of the tensors should either match or be compatible for broadcasting. The function returns a new tensor containing the cosine similarity values.To understand the internal workings of the "torch.cosine_similarity" function, we can break it down into several steps. Note that the actual implementation is optimized and streamlined for efficiency.Step 1: NormalizationThe first step is to normalize the input tensors to unit vectors, ensuring that their magnitudes are equal to 1. This normalization is essential as it eliminates the influence of the vector magnitudes on the cosine similarity calculation. PyTorch achieves this normalization by dividing each element in the input tensors by their respective Euclidean norms.Step 2: Dot Product CalculationNext, the function calculates the dot product between the normalized input tensors. The dot product is the sum of the products of the corresponding elements of the two vectors. It measures how much the vectors align with each other in the given n-dimensional space. In PyTorch, the dot product computation can be efficiently performed using element-wise multiplication and summation.Step 3: Similarity CalculationFinally, the function divides the dot product by the product of the Euclidean norms of the input tensors. This division yields the cosine similarity between the two normalized vectors. By dividing the dot product by the product of the Euclidean norms, the function ensures that the similarity value is scaled between -1 and 1,irrespective of the magnitudes of the input vectors.In summary, the "torch.cosine_similarity" function in PyTorch computes the cosine similarity between two input tensors by normalizing them, calculating their dot product, and dividing it by the product of their Euclidean norms. This similarity metric is widely employed in various machine learning and natural language processing tasks for measuring semantic similarity and performing similarity-based computations. Understanding the underlying principles and internal steps of this function enhances our knowledge of how PyTorch leverages the cosine similarity concept, thereby aiding in the development of efficient and accurate machine learning models.。