4 resultados para Logic and Linguistic Simulation
Resumo:
Two direct sampling correlator-type receivers for differential chaos shift keying (DCSK) communication systems under frequency non-selective fading channels are proposed. These receivers operate based on the same hardware platform with different architectures. In the first scheme, namely sum-delay-sum (SDS) receiver, the sum of all samples in a chip period is correlated with its delayed version. The correlation value obtained in each bit period is then compared with a fixed threshold to decide the binary value of recovered bit at the output. On the other hand, the second scheme, namely delay-sum-sum (DSS) receiver, calculates the correlation value of all samples with its delayed version in a chip period. The sum of correlation values in each bit period is then compared with the threshold to recover the data. The conventional DCSK transmitter, frequency non-selective Rayleigh fading channel, and two proposed receivers are mathematically modelled in discrete-time domain. The authors evaluated the bit error rate performance of the receivers by means of both theoretical analysis and numerical simulation. The performance comparison shows that the two proposed receivers can perform well under the studied channel, where the performances get better when the number of paths increases and the DSS receiver outperforms the SDS one.
Resumo:
This article suggests that the impact of long-term language contact between the languages of Irish, Scots and English in the province of Ulster led to a hybridisation of accent which challenges traditional ethnolinguistic differentiations - namely, the myth that Catholics and Protestants can be differentiated by their accent. The digitisation of archive recordings from the Tape Recorded Survey of Hiberno-English (TRSHE) permitted a detailed phonetic analysis of two speakers from Atticall, a rural townland in the Mourne Mountains with a unique geographical and linguistic setting, due to the close proximity of Ulster Scots and Irish speakers in the area. Phonological features associated with Irish, Northern English and Lowland Scots were garnered from previous dialectological research in Irish, English and Scots phonologies, which aided with the interpretation of the data. Other contemporaneous recordings from the TRSHE allowed further comparison of phonological features with areas of Ulster in which linguistic interaction between Scots and Irish was expected to be less prevalent, such as Arranmore, Donegal (primarily Irish) and Glarryford, Antrim (primarily Scots). Accommodation theory and substrate/superstrate interaction illuminate patterns of phonological transfer in Mourne, Arranmore and Glarryford English, supporting the conclusion that accent in contemporary Northern Ireland is built upon a linguistic heritage of contact and exchange, rather than political or ethnolinguistic division
Resumo:
Different types of serious games have been used in elucidating computer science areas such as computer games, mobile games, Lego-based games, virtual worlds and webbased games. Different evaluation techniques have been conducted like questionnaires, interviews, discussions and tests. Simulation have been widely used in computer science as a motivational and interactive learning tool. This paper aims to evaluate the possibility of successful implementation of simulation in computer programming modules. A framework is proposed to measure the impact of serious games on enhancing students understanding of key computer science concepts. Experiments will be held on the EEECS of Queen’s University Belfast students to test the framework and attain results.
Resumo:
In recent years, the adaptation of Wireless Sensor Networks (WSNs) to application areas requiring mobility increased the security threats against confidentiality, integrity and privacy of the information as well as against their connectivity. Since, key management plays an important role in securing both information and connectivity, a proper authentication and key management scheme is required in mobility enabled applications where the authentication of a node with the network is a critical issue. In this paper, we present an authentication and key management scheme supporting node mobility in a heterogeneous WSN that consists of several low capabilities sensor nodes and few high capabilities sensor nodes. We analyze our proposed solution by using MATLAB (analytically) and by simulation (OMNET++ simulator) to show that it has less memory requirement and has good network connectivity and resilience against attacks compared to some existing schemes. We also propose two levels of secure authentication methods for the mobile sensor nodes for secure authentication and key establishment.