40 resultados para Communication in management.


Relevância:

100.00% 100.00%

Publicador:

Resumo:

In this paper, the impact of hardware impairments on secrecy performance of cognitive MIMO schemes is investigated. In addition, the relay which helps the source forward the source signal to the destination can operate either half-duplex mode or full-duplex mode. For performance evaluation, we give the expressions of average secrecy rate over Rayleigh fading channel. Monte-Carlo simulations are presented to compare and optimize the performance of the proposed schemes.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

In this paper, we investigate secure device-to-device (D2D) communication in energy harvesting large-scale cognitive cellular networks. The energy constrained D2D transmitter harvests energy from multi-antenna equipped power beacons (PBs), and communicates with the corresponding receiver using the spectrum of the cellular base stations (BSs). We introduce a power transfer model and an information signal model to enable wireless energy harvesting and secure information transmission. In the power transfer model, we propose a new power transfer policy, namely, best power beacon (BPB) power transfer. To characterize the power transfer reliability of the proposed policy, we derive new closed-form expressions for the exact power outage probability and the asymptotic power outage probability with large antenna arrays at PBs. In the information signal model, we present a new comparative framework with two receiver selection schemes: 1) best receiver selection (BRS), and 2) nearest receiver selection (NRS). To assess the secrecy performance, we derive new expressions for the secrecy throughput considering the two receiver selection schemes using the BPB power transfer policies. We show that secrecy performance improves with increasing densities of PBs and D2D receivers because of a larger multiuser diversity gain. A pivotal conclusion is reached that BRS achieves better secrecy performance than NRS but demands more instantaneous feedback and overhead.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

In this paper, we investigate secure device-to-device (D2D) communication in energy harvesting large-scale cognitive cellular networks. The energy constrained D2D transmitter harvests energy from multiantenna equipped power beacons (PBs), and communicates with the corresponding receiver using the spectrum of the primary base stations (BSs). We introduce a power transfer model and an information signal model to enable wireless energy harvesting and secure information transmission. In the power transfer model, three wireless power transfer (WPT) policies are proposed: 1) co-operative power beacons (CPB) power transfer, 2) best power beacon (BPB) power transfer, and 3) nearest power beacon (NPB) power transfer. To characterize the power transfer reliability of the proposed three policies, we derive new expressions for the exact power outage probability. Moreover, the analysis of the power outage probability is extended to the case when PBs are equipped with large antenna arrays. In the information signal model, we present a new comparative framework with two receiver selection schemes: 1) best receiver selection (BRS), where the receiver with the strongest channel is selected; and 2) nearest receiver selection (NRS), where the nearest receiver is selected. To assess the secrecy performance, we derive new analytical expressions for the secrecy outage probability and the secrecy throughput considering the two receiver selection schemes using the proposed WPT policies. We presented Monte carlo simulation results to corroborate our analysis and show: 1) secrecy performance improves with increasing densities of PBs and D2D receivers due to larger multiuser diversity gain; 2) CPB achieves better secrecy performance than BPB and NPB but consumes more power; and 3) BRS achieves better secrecy performance than NRS but demands more instantaneous feedback and overhead. A pivotal conclusion- is reached that with increasing number of antennas at PBs, NPB offers a comparable secrecy performance to that of BPB but with a lower complexity.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

We consider a cooperative relaying network in which a source communicates with a group of users in the presence of one eavesdropper. We assume that there are no source-user links and the group of users receive only retransmitted signal from the relay. Whereas, the eavesdropper receives both the original and retransmitted signals. Under these assumptions, we exploit the user selection technique to enhance the secure performance. We first find the optimal power allocation strategy when the source has the full channel state information (CSI) of all links. We then evaluate the security level through: i) ergodic secrecy rate and ii) secrecy outage probability when having only the statistical knowledge of CSIs.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Purpose – Research into the communication skills of individuals with Cornelia de Lange syndrome (CdLS) is extremely limited. This paper aims to evaluate the nature of these skills and impairments in CdLS using a detailed informant assessment of pre-verbal communication skills.
Design/methodology/approach – The study used the Pre-verbal Communication Schedule to evaluate communication skills in individuals with CdLS (n ¼ 14), aged five to14 years. The group was compared with a contrast group of individuals with Cri du Chat syndrome (CdCS; n ¼ 14) who were matched for age and intellectual ability.
Findings – A significant difference was identified in understanding non-vocal communication (p , 0.005), with the CdLS group showing a greater deficit. These findings indicate the presence of a syndrome-specific deficit in understanding non-verbal communication in individuals with CdLS and suggest that there may be a dissociation between the processing of verbal and non-verbal communication.
Originality/value – The findings indicate that, in many ways, these two syndrome groups are not dissimilar in terms of their communication skills. However, individuals with CdLS show a syndrome-specific deficit in understanding non-vocal communication relative to the CdCS group.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

The problems related to the management of large quantum registers could be handled in the context of distributed quantum computation: unitary non-local transformations among spatially separated local processors are realized performing local unitary transformations and exchanging classical communication. In this paper, a scheme is proposed for the implementation of universal non-local quantum gates such as a controlled NOT (CNOT) and a controlled quantum phase gate (CQPG). The system chosen for their physical implementation is a cavity-quantum-electrodynamics (CQED) system formed by two spatially separated microwave cavities and two trapped Rydberg atoms. The procedures to follow for the realization of each step necessary to perform a specific non-local operation are described.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

The Irish border has been described as a ‘natural’ cultural divide between the island's two dominant indigenous ethno-national communities. However, an examination of key resources of ethno-national group culture - religion, sport and language - provides evidence to challenge this representation. Moreover, in the post-1994 period of conflict transformation, evidence is also presented to support the proposition that the Irish border region has developed into a cultural space in which Irish nationalist and Ulster unionist ethno-national communities can explore cultural differences and commonalities through cross-border, cross-community contact and communication in small group encounters. This space underpins the reconfiguration of the border from barrier to political bridge between North and South. European Union (EU) Peace programmes for Ireland, beginning in 1995, provided the support for a cross-border approach to escaping the cage of ethno-national conflict in Northern Ireland. However, post-2004 EU enlargement signalled the beginning of the end for EU Peace funding and severe economic recession has undermined the expectation of British-Irish intergovernmental intervention to support cross-border partnerships and their work. Therefore, the outlook for the sustainability of this cross-border cultural space is gloomy with potentially deleterious consequences for the continued reconfiguration of the border from barrier to bridge.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

Music is a rich form of nonverbal communication, in which the movements that expert musicians make during performance can influence the perception of expressive and structural features of the music. Whether the actual skill of a musician is perceivable from vision of movement was examined. In Experiment 1, musicians and non-musicians rated performances by novice, intermediate and expert clarinettists from point-light animations of their movements, sound recordings, or both. Performances by clarinettists of more advanced skill level were rated significantly higher from vision of movements, although this effect was stronger when sound was also presented. In Experiment 2, movements and sound from the novice and expert clarinettists' performances were switched for half the presentations, and were matched for the rest. Ratings of novice music were significantly higher when presented with expert movements, although the opposite was not found for expert sound presented with novice movements. No perceptual effect of raters' own level of musicianship was found in either experiment. These results suggest that expertise is perceivable from vision of musicians' body movements, although perception of skill from sound is dominant. The results from Experiment 2 further indicate a cross-modal effect of vision and audition on the perception of musical expertise. © 2012 Elsevier B.V.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

This paper demonstrates a potential application for latent semantic analysis and similar techniques in visualising the differences between two levels of knowledge about a risk issue. The HIV/AIDS risk issue will be examined and the semantic clusters of key words in a technical corpora derived from specific literature about HIV/AIDS will be compared with the semantic clusters of those in more general corpora. It is hoped that these comparisons will create a fast and efficient complementary approach to the articulation of mental models of risk issues that could be used to target possible inconsistencies between expert and lay mental models.