The identification and resolution are the key of industrial application management system. In order to improve the generality and efficiency of industrial application management system, a novel identification and reso...
详细信息
ISBN:
(纸本)9781665438926
The identification and resolution are the key of industrial application management system. In order to improve the generality and efficiency of industrial application management system, a novel identification and resoluation method for industrial application management is proposed. This paper analyzes the requirements of industrial applications for identifier naming scheme, and establishes a functional architecture for software deployment.
We study the transmission of public and secret messages over the l-input multiple-access wiretap channel with deterministic encoders. Specifically, we assume that no additional source of randomness is available at the...
详细信息
ISBN:
(纸本)9781479958900
We study the transmission of public and secret messages over the l-input multiple-access wiretap channel with deterministic encoders. Specifically, we assume that no additional source of randomness is available at the encoders and that public messages may be non-uniform and correlated. We develop a coding scheme that achieves information-theoretic security by combining existing constructions for wiretap codes with a distributed source code with nearly independent and nearly uniform encoder outputs.
coding, the analytic task of assigning codes to nonnumeric data, is foundational to writing research. A rich discussion of methodological pluralism has established the foundational importance of systematicity in the t...
详细信息
coding, the analytic task of assigning codes to nonnumeric data, is foundational to writing research. A rich discussion of methodological pluralism has established the foundational importance of systematicity in the task of coding, but less attention has been paid to the equally important commitment to language complexity. Addressing the interplay among a commitment to language complexity, the selection of tools, and the construction of workflow, this article offers a framework of analytic tasks in coding. Three general purpose coding tools are explored: Excel, MAXQDA, and Dedoose. This exploration suggests that how four aspects of analysis should be supported in order to manage language complexity: code restructuring, segmentation in advance of coding, use of a full coding scheme, and retrieval of full context by code. This analysis is intended to help writing researchers choose tools and design workflow to support coding work consistent with our commitment to language in its full complexity.
The activation relationship is an emotional bond between caregiver and child that encourages child openness to the world through stimulation and discipline. This study aimed to analyse the father-child activation rela...
详细信息
The activation relationship is an emotional bond between caregiver and child that encourages child openness to the world through stimulation and discipline. This study aimed to analyse the father-child activation relationship in the Brazilian context through the Risky Situation. Twelve dyads have been observed: six father-boy and six father-girl dyads at preschool age. The results showed greater activation of boys compared to girls. Such results are analysed according to the Activation Relationship Theory. Despite sample size limitation, results consistently support the findings of other studies conducted in other contexts.
In their meta-analysis investigating the relationship between extraversion and nonverbal behavior La France, Heisel, and Beatty (2004) found a substantial negative correlation between effect size and sample size, whic...
详细信息
In their meta-analysis investigating the relationship between extraversion and nonverbal behavior La France, Heisel, and Beatty (2004) found a substantial negative correlation between effect size and sample size, which they explained using the cognitive load hypothesis. The cognitive load hypothesis predicts that increases in coding scheme complexity result in greater opportunities for observer error. To test this hypothesis, the impact of coding scheme complexity on observer error was assessed via varying the number of nonverbal cues coded and the length of observational coding session. The decision to increase the number of nonverbal cues observers coded created 26% more errors, and over time observers made 10% more errors.
Ambient backscatter technology is an important technology of the Internet of Things (IoT), which can use ambient radio frequency (RF) sources to communicate between passive devices. However, most studies on the signal...
详细信息
ISBN:
(数字)9781665484800
ISBN:
(纸本)9781665484800
Ambient backscatter technology is an important technology of the Internet of Things (IoT), which can use ambient radio frequency (RF) sources to communicate between passive devices. However, most studies on the signal detection problem of ambient backscatter communication are based on the fact that tags have two backscatter states, reflective and non-reflective. In this paper, we present a signal detection scheme for ambient backscatter systems which the tag can backscatter in three states. First, we design a maximum a posteriori (MAP) detector to detect the multiple symbols sent by the tag using the continuously received signals. Then we propose a coding scheme that reduces the bit error rate (BER) and improves the system throughput. Furthermore, we derive expressions of detection threshold and BER, and give the system throughput under different coding schemes. At last, experimental simulations are conducted to prove our study.
Reflective writing is vital in learning professional skills and particularly in Computer Science (CS). However, there appears to be a lack of literature relating to a reliable of the current reflective writing framewo...
详细信息
ISBN:
(纸本)9781728189611
Reflective writing is vital in learning professional skills and particularly in Computer Science (CS). However, there appears to be a lack of literature relating to a reliable of the current reflective writing frameworks used for CS education. This paper describes a novel Reflective Writing Framework (RWF) that has been applied to the manual content analysis of CS students' reflective writings. The paper aims to empirically examine this RWF in terms of reflection indicators and levels that can be manually assessed by raters. The results of this manual content analysis showed empirically that the coding scheme of the RWF is valid and reliable. The results were that the inter-rater reliability (IRR) of the overall coding scheme of the RWF increased from 0.5 to 0.8 in pilot tests and ranged between 0.40 and 0.75 in terms reflection indicators and levels;substantially, this means ranged from moderate to substantial agreement. This research contributes to CS education an RWF that can be reliably annotated and was validated by CS experts.
We study delay constrained sequential streaming over block fading channels. The transmitter observes a stream of messages, one message in each coherence block, and the receiver needs to output a sequence of messages, ...
详细信息
ISBN:
(纸本)9781457705953
We study delay constrained sequential streaming over block fading channels. The transmitter observes a stream of messages, one message in each coherence block, and the receiver needs to output a sequence of messages, each with a fixed delay of T coherence blocks. We characterize the associated diversity-multiplexing tradeoff (DMT) for this model. The proposed coding scheme involves a semi-infinite random Gaussian tree-code and a sequential decision directed decoder. The converse applies an outage amplification argument that exploits the delay constraint to amplify the error event associated with a single message to an entire sequence of messages.
A Write Once Memory (WOM) is a storage medium with binary memory elements, called cells, that can change from the zero state to the one state only once. Examples of WOMs are punch cards, optical disks, and more recent...
详细信息
ISBN:
(纸本)9781424482641
A Write Once Memory (WOM) is a storage medium with binary memory elements, called cells, that can change from the zero state to the one state only once. Examples of WOMs are punch cards, optical disks, and more recently flash memories. A t-write WOM-code is a coding scheme for storing t messages in n cells in such a way that each cell can change its value only from the zero state to the one state. The WOM-rate of a t-write WOM-code is the ratio of the total amount of information written to the WOM in t writes to the number of cells. In this paper we present a family of 2-write WOM-codes. It is shown how to construct from each linear code C a 2-write WOM-code. Then, we find 2-write WOM-codes that improve the best known WOM-rate with two writes. This scheme is proved to be capacity achieving when the parity check matrix of the linear code C is chosen uniformly at random. Finally, we show how to take advantage of 2-write WOM-codes in order to construct codes for the Blackwell channel.
A two-receiver MIMO broadcast-wiretap channel is considered where the channel state of the eavesdropper is arbitrarily varying. It is assumed that the eavesdropper knows this channel state perfectly whereas the legiti...
详细信息
ISBN:
(纸本)9781424492688
A two-receiver MIMO broadcast-wiretap channel is considered where the channel state of the eavesdropper is arbitrarily varying. It is assumed that the eavesdropper knows this channel state perfectly whereas the legitimate nodes have no knowledge of it. It is further assumed that the eavesdropper experiences no additive noise. The channel between the transmitter and the two legitimate receivers is a constant MIMO Gaussian broadcast channel. This paper establishes the secrecy degrees of freedom region for transmitting a common-confidential message as well as a private-confidential message to each receiver. It is observed that a straightforward extension of single user random binning does not achieve the optimal secrecy degrees of freedom (s.d.o.f.) region. The proposed coding scheme that achieves the s.d.o.f. region involves simultaneous diagonalization of the channel matrices of the two legitimate receivers using the generalized singular value decomposition (GSVD) as well as a particular structured binning across codebooks that minimizes the rate of the fictitious message. While the focus is on achieving weak secrecy for ease of exposition, an outline is provided on how the results can be extended for achieving strong secrecy.
暂无评论