The Behavioral Correlates of War data set, which has been recently released for public use, is described and its potential uses are explored. The data set consists of coded descriptions of the actions of states engage...
详细信息
The Behavioral Correlates of War data set, which has been recently released for public use, is described and its potential uses are explored. The data set consists of coded descriptions of the actions of states engaged in a sample of thirty-eight interstate crises occurring between 1816 and 1975. The article begins by briefly comparing the BCOW data to extant events data collections, and then turns to detailed descriptions of the structure and content of the typology and coding scheme. The final section of the article discusses statistical techniques employed in analyzing the data, and reports on the most salient findings to date.
Non-uniquely-decodable (non-UD) codes can be defined as the codes that cannot be uniquely decoded without additional disambiguation information. These are mainly the class of non-prefix-free codes, where a code-word c...
详细信息
Non-uniquely-decodable (non-UD) codes can be defined as the codes that cannot be uniquely decoded without additional disambiguation information. These are mainly the class of non-prefix-free codes, where a code-word can be a prefix of other(s), and thus, the code-word boundary information is essential for correct decoding. Due to their inherent unique decodability problem, such non-UD codes have not received much attention except a few studies, in which using compressed data structures to represent the disambiguation information efficiently had been previously proposed. It had been shown before that the compression ratio can get quite close to Huffman/Arithmetic codes with an additional capability of providing direct access in compressed data, which is a missing feature in the regular Huffman codes. In this study we investigate non-UD codes in another dimension addressing the privacy of the high-entropy data. We particularly focus on such massive volumes, where typical examples are encoded video or similar multimedia files. Representation of such a volume with non-UD coding creates two elements as the disambiguation information and the payload, where decoding the original data from these elements becomes hard when one of them is missing. We make use of this observation for privacy concerns. and study the space consumption as well as the hardness of that decoding. We conclude that non-uniquely-decodable codes can be an alternative to selective encryption schemes that aim to secure only part of the data when data is huge. We provide a freely available software implementation of the proposed scheme as well.
In conjugate symmetric data transmission, due to insufficient judgment of congestion during transmission, the amount of data is large and the transmission rate is low. In order to improve the data transmission rate, a...
详细信息
In conjugate symmetric data transmission, due to insufficient judgment of congestion during transmission, the amount of data is large and the transmission rate is low. In order to improve the data transmission rate, a conjugate symmetric data transmission control method based on machine learning is designed. Firstly, the data to be transmitted is tracked and determined, and then conjugate symmetric data fusion is completed according to the calculation result of the best tracking signal. According to the fusion results, the framework of the conjugate symmetric data coding system is established, and the data coding is completed. The average congestion mark value is calculated by the machine learning method, and the congestion judgment of data transmission is completed. On the basis of congestion determination, the efficient transmission control of conjugate symmetric data is realized by specifying the conjugate symmetric data transmission protocol. Experimental results show that compared with traditional control methods, this control method has the advantages of a high delivery rate, low message transmission overhead and low data transmission delay. Compared to the traditional two-way path model, the scheduling method proposed in this study increases the transmission delivery rate by 5%, while reducing the transmission cost and delay by 0.7 cost index and 1.1 min delay, respectively. In comparison with the performance of accurate error tracking equalization, the transmission delivery rate of the research method increased by 21%, and in transmission cost index and delay analysis, it also decreased by 3.1 and 2.9 minutes. Based on the above performance comparison analysis, it can be concluded that the machine learning method has more superior transmission control performance.
This computer program analyzes content by classifying each individual sentence or phrase by its single, most important meaning. The total content of a document is then the sum of these individual classifications (stat...
详细信息
This computer program analyzes content by classifying each individual sentence or phrase by its single, most important meaning. The total content of a document is then the sum of these individual classifications (statement meanings). In the examples studied, five key words can determine specific meaning for individual sentences.
This article presents the proposal of a novel encoding method for representing binary data in printable format. The encoding procedure reversibly transforms binary strings into printable letter sequences using a mappi...
详细信息
This article presents the proposal of a novel encoding method for representing binary data in printable format. The encoding procedure reversibly transforms binary strings into printable letter sequences using a mapping from bit strings to an alphabet of 41 symbols taken from a subset of the English uppercase and lowercase letters. The decoding process reversibly recovers an original bit string from the encoded printable string. The encoding and decoding algorithms along with the properties of this coding are examined and discussed. In particular, the use of only URL-safe and clearly visually distinguishable characters is emphasized.
An experimental study of job satisfaction was conducted to test the hypothesis that Ur-Ru differences in worker socialization might correspond to differences in work values & levels of worker satisfaction. The sam...
详细信息
An experimental study of job satisfaction was conducted to test the hypothesis that Ur-Ru differences in worker socialization might correspond to differences in work values & levels of worker satisfaction. The sample consisted of 74 women, hired to perform a repetitive clerical task for 3 hours; divided equally between those with Ru backgrounds & those from Ur areas. Task content was held constant at a highly specialized level & examined the effects of Ur-Ru socialization differences on job satisfaction & productivity. The significance of differences & variances accounted for between the 2 groups were calculated for Minnesota Clerical Test scores, performance, & satisfaction as measured by the semantic differential scales. There were no significant differences between the groups in clerical ability or task performance, but Ru S's were found to be more satisfied than Ur S's with their pay & with the routine task itself. 2 Tables. Modified HA.
Point source information system of geology and mineral resource consist of three major parts including reconnaissance data management, reconnaissance data processing and geological mineral source appraisal. Its struct...
详细信息
Point source information system of geology and mineral resource consist of three major parts including reconnaissance data management, reconnaissance data processing and geological mineral source appraisal. Its structure lies in the combination of technique methods and application models. The core of it is point source data base. With the application utilized more frequently, various datum on the Internet drastically increase which will cause more and more Internet attacks. Diverse security issues are hampering the normal running of the system. Therefore, it has been a critical problem and pressing job to guarantee a efficient and secure geological mineral information website.
Abstract This study was undertaken, in part, to analyse the means by which primary children familiarized themselves with a large database. Their approaches to the problems of codingdata for entry were studied and the...
详细信息
暂无评论