896 resultados para Coproducts in frames


Relevância:

40.00% 40.00%

Publicador:

Resumo:

This paper concerns the characterization as frames of some sequences in U-invariant spaces of a separable Hilbert space H where U denotes an unitary operator defined on H ; besides, the dual frames having the same form are also found. This general setting includes, in particular, shift-invariant or modulation-invariant subspaces in L2 (R), where these frames are intimately related to the generalized sampling problem. We also deal with some related perturbation problems. In so doing, we need that the unitary operator U belongs to a continuous group of unitary operators.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

For each pair (n, k) with 1 ≤ k < n, we construct a tight frame (ρλ : λ ∈ Λ) for L2 (Rn), which we call a frame of k-plane ridgelets. The intent is to efficiently represent functions that are smooth away from singularities along k-planes in Rn. We also develop tools to help decide whether k-plane ridgelets provide the desired efficient representation. We first construct a wavelet-like tight frame on the X-ray bundle χn,k—the fiber bundle having the Grassman manifold Gn,k of k-planes in Rn for base space, and for fibers the orthocomplements of those planes. This wavelet-like tight frame is the pushout to χn,k, via the smooth local coordinates of Gn,k, of an orthonormal basis of tensor Meyer wavelets on Euclidean space Rk(n−k) × Rn−k. We then use the X-ray isometry [Solmon, D. C. (1976) J. Math. Anal. Appl. 56, 61–83] to map this tight frame isometrically to a tight frame for L2(Rn)—the k-plane ridgelets. This construction makes analysis of a function f ∈ L2(Rn) by k-plane ridgelets identical to the analysis of the k-plane X-ray transform of f by an appropriate wavelet-like system for χn,k. As wavelets are typically effective at representing point singularities, it may be expected that these new systems will be effective at representing objects whose k-plane X-ray transform has a point singularity. Objects with discontinuities across hyperplanes are of this form, for k = n − 1.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

In late 1994 and early 1995, Ebola (EBO) virus dramatically reemerged in Africa, causing human disease in the Ivory Coast and Zaire. Analysis of the entire glycoprotein genes of these viruses and those of other EBO virus subtypes has shown that the virion glycoprotein (130 kDa) is encoded in two reading frames, which are linked by transcriptional editing. This editing results in the addition of an extra nontemplated adenosine within a run of seven adenosines near the middle of the coding region. The primary gene product is a smaller (50-70 kDa), nonstructural, secreted glycoprotein, which is produced in large amounts and has an unknown function. Phylogenetic analysis indicates that EBO virus subtypes are genetically diverse and that the recent Ivory Coast isolate represents a new (fourth) subtype of EBO virus. In contrast, the EBO virus isolate from the 1995 outbreak in Kikwit, Zaire, is virtually identical to the virus that caused a similar epidemic in Yambuku, Zaire, almost 20 years earlier. This genetic stability may indicate that EBO viruses have coevolved with their natural reservoirs and do not change appreciably in the wild.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

In the context of Aboriginal-Anglo Australian relations, we tested the effect of framing (multiculturalism versus separatism) and majority group members' social values (universalism) on the persuasiveness of Aboriginal group rhetoric, majority collective guilt, attitudes toward compensation, and reparations for Aboriginals. As predicted, Anglo Australians who are low on universalism report more collective guilt when presented with a multiculturalist than a separatist Aboriginal frame, whereas those high on universalism report high levels of guilt independent of frame. The same pattern was predicted and found for the persuasiveness of the rhetoric and attitudes toward compensation. Our data suggest that (a) for individuals low in universalism, framing produces attitudes consonant with compensation because it produces collective guilt and (b) the reason that universalists are more in favor of compensation and reparation is because of high collective guilt. We discuss the strategic use of language to create power through the manipulation of collective guilt in political contexts.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

[No abstract as this is a book chapter: the following represents the first 2 paragraphs.] The screen fills with close-ups of smiling African faces against a black-and-orange background: the carefree child, the gap-toothed man with smoke curling from his pipe. The faces retreat into an outline of a map of Africa as the saccharine background music dissolves into birdsong. The silhouette of an acacia tree appears. This is not the much-derided Western romantic stereotype of the continent: it is an extract from a promotional trailer on CCTV Africa, the embodiment of China’s “soft power” drive and a spearhead of Chinese state television’s overseas expansion. Yet this image is at variance with the English-language channel’s professed ambitions. The Chinese premier, Li Keqiang, himself declared that “CCTV embraces the vision of seeing Africa from an African perspective and reporting Africa from the viewpoint of Africa”. These contradictory messages prompt fundamental questions about CCTV’s expansion into Africa. Are the channel’s English-language news bulletins aimed at African or Chinese viewers? What kind of Africa – and indeed China – do they represent, and could the framing of African events by CCTV News provide an alternative to the perspective of international rivals? Is CCTV’s main mission in Africa to provide news or to act as mouthpiece of the Chinese Communist Party and state? This chapter addresses these questions by applying a cross-cultural variant of framing theory to the news content of CCTV’s Africa Live and that of its closest direct competitor, Focus on Africa from BBC World News TV.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

Thesis (Ph.D.)--University of Washington, 2016-08

Relevância:

40.00% 40.00%

Publicador:

Resumo:

The aim of this study is to determine which social agents are involved in the political debate on Twitter and whether the interpretive hegemony of actors that have traditionally been the most prominent is tempered by the challenge of framing shared with audiences. The relationship between the interpretations expressed and the profiles of participants is analyzed in comparison with the frames used by mainstream media. The chosen methodology combines content analysis and discourse analysis techniques on a sample of 1,504 relevant tweets posted on two political issues –the approval of the education law LOMCE and the evictions caused by the crisis, which have also been studied in the front pages of four leading newspapers in Spain. The results show a correlation between political issue singularities, frames and the type of discussion depending on the participants.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Current IEEE 802.11 wireless networks are vulnerable to session hijacking attacks as the existing standards fail to address the lack of authentication of management frames and network card addresses, and rely on loosely coupled state machines. Even the new WLAN security standard - IEEE 802.11i does not address these issues. In our previous work, we proposed two new techniques for improving detection of session hijacking attacks that are passive, computationally inexpensive, reliable, and have minimal impact on network performance. These techniques utilise unspoofable characteristics from the MAC protocol and the physical layer to enhance confidence in the intrusion detection process. This paper extends our earlier work and explores usability, robustness and accuracy of these intrusion detection techniques by applying them to eight distinct test scenarios. A correlation engine has also been introduced to maintain the false positives and false negatives at a manageable level. We also explore the process of selecting optimum thresholds for both detection techniques. For the purposes of our experiments, Snort-Wireless open source wireless intrusion detection system was extended to implement these new techniques and the correlation engine. Absence of any false negatives and low number of false positives in all eight test scenarios successfully demonstrated the effectiveness of the correlation engine and the accuracy of the detection techniques.