54 resultados para Communication in education


Relevância:

100.00% 100.00%

Publicador:

Resumo:

This paper proposes millimeter wave (mmWave) mobile broadband for achieving secure communication in downlink cellular network. Analog beamforming with phase shifters is adopted for the mmWave transmission. The secrecy throughput is analyzed based on two different transmission modes, namely delay-tolerant transmission and delay-limited transmission. The impact of large antenna arrays at the mmWave frequencies on the secrecy throughput is examined. Numerical results corroborate our analysis and show that mmWave systems can enable significant secrecy improvement. Moreover, it is indicated that with large antenna arrays, multi-gigabit per second secure link at the mmWave frequencies can be reached in the delay-tolerant transmission mode and the adverse effect of secrecy outage vanishes in the delay-limited transmission mode.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

In this paper, the impact of hardware impairments on secrecy performance of cognitive MIMO schemes is investigated. In addition, the relay which helps the source forward the source signal to the destination can operate either half-duplex mode or full-duplex mode. For performance evaluation, we give the expressions of average secrecy rate over Rayleigh fading channel. Monte-Carlo simulations are presented to compare and optimize the performance of the proposed schemes.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

In this paper, we investigate secure device-to-device (D2D) communication in energy harvesting large-scale cognitive cellular networks. The energy constrained D2D transmitter harvests energy from multi-antenna equipped power beacons (PBs), and communicates with the corresponding receiver using the spectrum of the cellular base stations (BSs). We introduce a power transfer model and an information signal model to enable wireless energy harvesting and secure information transmission. In the power transfer model, we propose a new power transfer policy, namely, best power beacon (BPB) power transfer. To characterize the power transfer reliability of the proposed policy, we derive new closed-form expressions for the exact power outage probability and the asymptotic power outage probability with large antenna arrays at PBs. In the information signal model, we present a new comparative framework with two receiver selection schemes: 1) best receiver selection (BRS), and 2) nearest receiver selection (NRS). To assess the secrecy performance, we derive new expressions for the secrecy throughput considering the two receiver selection schemes using the BPB power transfer policies. We show that secrecy performance improves with increasing densities of PBs and D2D receivers because of a larger multiuser diversity gain. A pivotal conclusion is reached that BRS achieves better secrecy performance than NRS but demands more instantaneous feedback and overhead.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The chapter outlines various approaches taken to the challenge of divided societies through education systems and links this to debates on political approaches to conflict resolution in Northern Ireland. The education debate has structural and affective components, while the political debate revolves around the privileging of identity or commonality. Applying the principle of recognition and the importance of tolerance is seen to provide a range of policy options, but the evidence of education interventions in Northern Ireland does not highlight any one policy option as the most effective, nor did the end of the violent conflict produce a new consensus on a way forward. The chapter argues that a key additional element to effective practice might be provided through the promotion of shared education through collaborative networks of schools which allows for the continued operation of separate schools while promoting an integrated experience for pupils and teachers.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

In this paper, we investigate secure device-to-device (D2D) communication in energy harvesting large-scale cognitive cellular networks. The energy constrained D2D transmitter harvests energy from multiantenna equipped power beacons (PBs), and communicates with the corresponding receiver using the spectrum of the primary base stations (BSs). We introduce a power transfer model and an information signal model to enable wireless energy harvesting and secure information transmission. In the power transfer model, three wireless power transfer (WPT) policies are proposed: 1) co-operative power beacons (CPB) power transfer, 2) best power beacon (BPB) power transfer, and 3) nearest power beacon (NPB) power transfer. To characterize the power transfer reliability of the proposed three policies, we derive new expressions for the exact power outage probability. Moreover, the analysis of the power outage probability is extended to the case when PBs are equipped with large antenna arrays. In the information signal model, we present a new comparative framework with two receiver selection schemes: 1) best receiver selection (BRS), where the receiver with the strongest channel is selected; and 2) nearest receiver selection (NRS), where the nearest receiver is selected. To assess the secrecy performance, we derive new analytical expressions for the secrecy outage probability and the secrecy throughput considering the two receiver selection schemes using the proposed WPT policies. We presented Monte carlo simulation results to corroborate our analysis and show: 1) secrecy performance improves with increasing densities of PBs and D2D receivers due to larger multiuser diversity gain; 2) CPB achieves better secrecy performance than BPB and NPB but consumes more power; and 3) BRS achieves better secrecy performance than NRS but demands more instantaneous feedback and overhead. A pivotal conclusion- is reached that with increasing number of antennas at PBs, NPB offers a comparable secrecy performance to that of BPB but with a lower complexity.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

We consider a cooperative relaying network in which a source communicates with a group of users in the presence of one eavesdropper. We assume that there are no source-user links and the group of users receive only retransmitted signal from the relay. Whereas, the eavesdropper receives both the original and retransmitted signals. Under these assumptions, we exploit the user selection technique to enhance the secure performance. We first find the optimal power allocation strategy when the source has the full channel state information (CSI) of all links. We then evaluate the security level through: i) ergodic secrecy rate and ii) secrecy outage probability when having only the statistical knowledge of CSIs.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This article considers how the education systems of divided societies have been shaped in response to the experience of ethnic and religious conflict. The analysis identifies two competing priorities in such contexts – the development of social cohesion and the protection of cultural, ethnic and religious identities - and explores how these may be reconciled through a model of ‘shared education’. Drawing on research evidence and recent experience of shared education in relation to Northern Ireland, the Former Yugoslav Republic of Macedonia and Cyprus, we reflect on the advantages and challenges of this model in areas experiencing conflict and division.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This paper explores the reasons for the author’s reluctance to bring examples of her own poetry into her practice as teacher educator on a program for adult literacy tutors. The paper begins with the author’s poem, “The Place of Poetry”, which is used as a tool for reflection on the author’s assumptions about her identities as poet and as educator. The paper ends with poems written by the author’s students, which demonstrate that the use of poetry in education has the potential to facilitate transformative learning.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

One approach to tackling problems of division in society has been to promote collaboration and engagement between schools separated on ethno-religious lines. Based on some variant of contact theory, the received wisdom is that inter-group encounters can contribute to prejudice reduction and promote more harmonious relationships. Evidence to support this analysis is convincing; however, relatively little is known about the environmental factors that impede or enhance the potential for contact in different contexts. The importance of understanding such factors is underscored in divided jurisdictions, where separate education has been linked to the perpetuation of division and hostility. This paper adopts a qualitative approach to exploring the impact of two inter-school initiatives in Northern Ireland. The projects are located in contrasting socio-political and demographic environments, and research findings point to very different contact outcomes for participants in each. Seemingly relevant factors include the degree of congruence between school and community norms and values, the opportunity to develop relationships outside the school context, the relationships developed between the schools and local communities and the historical, political and social referents used by individuals to navigate the contact experience. The paper concludes with some reflections on factors that may help foster social harmony and on potential policy implications of the findings.