43 resultados para Communication in organizations Japan Hokkaido


Relevância:

100.00% 100.00%

Publicador:

Relevância:

100.00% 100.00%

Publicador:

Resumo:

While the Gaeltacht (Irish speaking) areas of Ireland are geographically isolated from each other and relatively small in area, it is expected that the number of second language Irish speakers throughout the country should ensure the future of the language. Nevertheless, while the official standard grammar has been established for many decades, there is still a tendency in the spoken language to give precedence to regional dialectal variants in schools and the broadcast media which often raises barriers between native speakers themselves and between learners and native speakers.
All pupils in school in the Republic and many in Northern Ireland learn Irish and there has been a great increase in the number of pupils attending immersion Irish language Gaelscoileanna. But concern has been expressed about the phonetic and structural accuracy achieved in schools, all of which contributes to communication breakdown.
This paper discusses how a greater awareness of the link between phoneme and grapheme in Irish and the proposals for the Lárchanúint (Central Dialect) in the 1980s and current discussions on Caighdeán Leathan agus Caighdeán Cúng (Broad and Narrow Standard) would mitigate these concerns.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

According to the axiomatic literature on consensus methods, the best collective choice by one method of preference aggregation can easily be the worst by another. Are award committees, electorates, managers, online retailers, and web-based recommender systems stuck with an impossibility of rational preference aggregation? We investigate this social choice conundrum for seven social choice methods: Condorcet, Borda, Plurality, Antiplurality, the Single Transferable Vote, Coombs, and Plurality Runoff. We rely on Monte Carlo simulations for theoretical results and on twelve ballot datasets from American Psychological Association (APA) presidential elections for empirical results. Each of these elections provides partial rankings of five candidates from about 13,000 to about 20,000 voters. APA preferences are neither domain-restricted nor generated by an Impartial Culture. We find virtually no trace of a Condorcet paradox. In direct contrast with the classical social choice conundrum, competing consensus methods agree remarkably well, especially on the overall best and worst options. The agreement is also robust under perturbations of the preference prole via resampling, even in relatively small pseudosamples. We also explore prescriptive implications of our findings.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This paper proposes millimeter wave (mmWave) mobile broadband for achieving secure communication in downlink cellular network. Analog beamforming with phase shifters is adopted for the mmWave transmission. The secrecy throughput is analyzed based on two different transmission modes, namely delay-tolerant transmission and delay-limited transmission. The impact of large antenna arrays at the mmWave frequencies on the secrecy throughput is examined. Numerical results corroborate our analysis and show that mmWave systems can enable significant secrecy improvement. Moreover, it is indicated that with large antenna arrays, multi-gigabit per second secure link at the mmWave frequencies can be reached in the delay-tolerant transmission mode and the adverse effect of secrecy outage vanishes in the delay-limited transmission mode.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

In this paper, the impact of hardware impairments on secrecy performance of cognitive MIMO schemes is investigated. In addition, the relay which helps the source forward the source signal to the destination can operate either half-duplex mode or full-duplex mode. For performance evaluation, we give the expressions of average secrecy rate over Rayleigh fading channel. Monte-Carlo simulations are presented to compare and optimize the performance of the proposed schemes.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

In this paper, we investigate secure device-to-device (D2D) communication in energy harvesting large-scale cognitive cellular networks. The energy constrained D2D transmitter harvests energy from multi-antenna equipped power beacons (PBs), and communicates with the corresponding receiver using the spectrum of the cellular base stations (BSs). We introduce a power transfer model and an information signal model to enable wireless energy harvesting and secure information transmission. In the power transfer model, we propose a new power transfer policy, namely, best power beacon (BPB) power transfer. To characterize the power transfer reliability of the proposed policy, we derive new closed-form expressions for the exact power outage probability and the asymptotic power outage probability with large antenna arrays at PBs. In the information signal model, we present a new comparative framework with two receiver selection schemes: 1) best receiver selection (BRS), and 2) nearest receiver selection (NRS). To assess the secrecy performance, we derive new expressions for the secrecy throughput considering the two receiver selection schemes using the BPB power transfer policies. We show that secrecy performance improves with increasing densities of PBs and D2D receivers because of a larger multiuser diversity gain. A pivotal conclusion is reached that BRS achieves better secrecy performance than NRS but demands more instantaneous feedback and overhead.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

In this paper, we investigate secure device-to-device (D2D) communication in energy harvesting large-scale cognitive cellular networks. The energy constrained D2D transmitter harvests energy from multiantenna equipped power beacons (PBs), and communicates with the corresponding receiver using the spectrum of the primary base stations (BSs). We introduce a power transfer model and an information signal model to enable wireless energy harvesting and secure information transmission. In the power transfer model, three wireless power transfer (WPT) policies are proposed: 1) co-operative power beacons (CPB) power transfer, 2) best power beacon (BPB) power transfer, and 3) nearest power beacon (NPB) power transfer. To characterize the power transfer reliability of the proposed three policies, we derive new expressions for the exact power outage probability. Moreover, the analysis of the power outage probability is extended to the case when PBs are equipped with large antenna arrays. In the information signal model, we present a new comparative framework with two receiver selection schemes: 1) best receiver selection (BRS), where the receiver with the strongest channel is selected; and 2) nearest receiver selection (NRS), where the nearest receiver is selected. To assess the secrecy performance, we derive new analytical expressions for the secrecy outage probability and the secrecy throughput considering the two receiver selection schemes using the proposed WPT policies. We presented Monte carlo simulation results to corroborate our analysis and show: 1) secrecy performance improves with increasing densities of PBs and D2D receivers due to larger multiuser diversity gain; 2) CPB achieves better secrecy performance than BPB and NPB but consumes more power; and 3) BRS achieves better secrecy performance than NRS but demands more instantaneous feedback and overhead. A pivotal conclusion- is reached that with increasing number of antennas at PBs, NPB offers a comparable secrecy performance to that of BPB but with a lower complexity.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

We consider a cooperative relaying network in which a source communicates with a group of users in the presence of one eavesdropper. We assume that there are no source-user links and the group of users receive only retransmitted signal from the relay. Whereas, the eavesdropper receives both the original and retransmitted signals. Under these assumptions, we exploit the user selection technique to enhance the secure performance. We first find the optimal power allocation strategy when the source has the full channel state information (CSI) of all links. We then evaluate the security level through: i) ergodic secrecy rate and ii) secrecy outage probability when having only the statistical knowledge of CSIs.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Purpose – Research into the communication skills of individuals with Cornelia de Lange syndrome (CdLS) is extremely limited. This paper aims to evaluate the nature of these skills and impairments in CdLS using a detailed informant assessment of pre-verbal communication skills.
Design/methodology/approach – The study used the Pre-verbal Communication Schedule to evaluate communication skills in individuals with CdLS (n ¼ 14), aged five to14 years. The group was compared with a contrast group of individuals with Cri du Chat syndrome (CdCS; n ¼ 14) who were matched for age and intellectual ability.
Findings – A significant difference was identified in understanding non-vocal communication (p , 0.005), with the CdLS group showing a greater deficit. These findings indicate the presence of a syndrome-specific deficit in understanding non-verbal communication in individuals with CdLS and suggest that there may be a dissociation between the processing of verbal and non-verbal communication.
Originality/value – The findings indicate that, in many ways, these two syndrome groups are not dissimilar in terms of their communication skills. However, individuals with CdLS show a syndrome-specific deficit in understanding non-vocal communication relative to the CdCS group.