979 resultados para Communication situation
Resumo:
We address the problem of designing distributed algorithms for large scale networks that are robust to Byzantine faults. We consider a message passing, full information model: the adversary is malicious, controls a constant fraction of processors, and can view all messages in a round before sending out its own messages for that round. Furthermore, each bad processor may send an unlimited number of messages. The only constraint on the adversary is that it must choose its corrupt processors at the start, without knowledge of the processors’ private random bits.
A good quorum is a set of O(logn) processors, which contains a majority of good processors. In this paper, we give a synchronous algorithm which uses polylogarithmic time and Õ(vn) bits of communication per processor to bring all processors to agreement on a collection of n good quorums, solving Byzantine agreement as well. The collection is balanced in that no processor is in more than O(logn) quorums. This yields the first solution to Byzantine agreement which is both scalable and load-balanced in the full information model.
The technique which involves going from situation where slightly more than 1/2 fraction of processors are good and and agree on a short string with a constant fraction of random bits to a situation where all good processors agree on n good quorums can be done in a fully asynchronous model as well, providing an approach for extending the Byzantine agreement result to this model.
Resumo:
Social psychologists have attempted to capture the ideological quality of the nation through a consideration of its taken-for-granted quality, whereby it forms an unnoticed ‘banal’ background to everyday life and is passively absorbed by its members in contrast to its ‘hot’, politically created and contested nature. Accordingly, national identity is assumed to be both passively absorbed from the national backdrop and actively acquired through national inculcation. This raises the question of how national identity is expressed, transmitted and acquired in a foreign context, where the banal national backdrop is unavailable to scaffold identity and the national resources for identity transmission may be unavailable. The present article addresses this gap by examining the situation of Irish women raising children in England. Critical discursive analyses of the 16 interviews revealed that all women treated their children’s national identity and the issue of transmitting identity as dilemmatic: passive transmission risks children passively absorbing English, but active transmission contravenes the assumed naturalness of national identity and can furthermore conflict with children’s own personal choice. These results point to the complex interaction between the management of national identity and the broader personal and national context within which this occurs.
Resumo:
Purpose – Research into the communication skills of individuals with Cornelia de Lange syndrome (CdLS) is extremely limited. This paper aims to evaluate the nature of these skills and impairments in CdLS using a detailed informant assessment of pre-verbal communication skills.
Design/methodology/approach – The study used the Pre-verbal Communication Schedule to evaluate communication skills in individuals with CdLS (n ¼ 14), aged five to14 years. The group was compared with a contrast group of individuals with Cri du Chat syndrome (CdCS; n ¼ 14) who were matched for age and intellectual ability.
Findings – A significant difference was identified in understanding non-vocal communication (p , 0.005), with the CdLS group showing a greater deficit. These findings indicate the presence of a syndrome-specific deficit in understanding non-verbal communication in individuals with CdLS and suggest that there may be a dissociation between the processing of verbal and non-verbal communication.
Originality/value – The findings indicate that, in many ways, these two syndrome groups are not dissimilar in terms of their communication skills. However, individuals with CdLS show a syndrome-specific deficit in understanding non-vocal communication relative to the CdCS group.
Resumo:
Directional modulation (DM) is a recently introduced technique for secure wireless transmission using direct physical layer wave-front manipulation. This paper provides a bit error rate (BER)-based DM array synthesis method. It is shown for the first time that the standard constellation mappings in In-phase and Quadrature (IQ) space to a pre-specified BER can be exactly achieved along a given specified spatial direction. Different receiver capabilities are investigated and different assessment metrics for each case are discussed. The approach is validated for a 1 × 4 element dipole array operating at 1 GHz.
Resumo:
This paper proposes millimeter wave (mmWave) mobile broadband for achieving secure communication in downlink cellular network. Analog beamforming with phase shifters is adopted for the mmWave transmission. The secrecy throughput is analyzed based on two different transmission modes, namely delay-tolerant transmission and delay-limited transmission. The impact of large antenna arrays at the mmWave frequencies on the secrecy throughput is examined. Numerical results corroborate our analysis and show that mmWave systems can enable significant secrecy improvement. Moreover, it is indicated that with large antenna arrays, multi-gigabit per second secure link at the mmWave frequencies can be reached in the delay-tolerant transmission mode and the adverse effect of secrecy outage vanishes in the delay-limited transmission mode.
Resumo:
Oncology is rapidly changing. Over the past few years there has been an increase in the number of patients receiving oral chemotherapy, which is often administered as tablets away from the hospital setting and in the absence of direct health professional support. This situation places onus on patients to not only administer their medication, but also to report any deterioration in their health. Medication adherence in oral chemotherapy is therefore a major concern. This article examines medication adherence for people receiving oral chemotherapy and the importance of concordant communication practices.
Resumo:
In this paper, the impact of hardware impairments on secrecy performance of cognitive MIMO schemes is investigated. In addition, the relay which helps the source forward the source signal to the destination can operate either half-duplex mode or full-duplex mode. For performance evaluation, we give the expressions of average secrecy rate over Rayleigh fading channel. Monte-Carlo simulations are presented to compare and optimize the performance of the proposed schemes.
Resumo:
The allocation of a large amount of bandwidth by regulating bodies in the 70/80 GHz band, i.e., the E-band, has opened up new potentials and challenges for providing affordable and reliable Gigabit per second wireless point-to-point links. This article first reviews the available bandwidth and licensing regulations in the E-band. Subsequently, different propagation models, e.g., the ITU-R and Cane models, are compared against measurement results and it is concluded that to meet specific availability requirements, E-band wireless systems may need to be designed with larger fade margins compared to microwave systems. A similar comparison is carried out between measurements and models for oscillator phase noise. It is confirmed that phase noise characteristics, that are neglected by the models used for narrowband systems, need to be taken into account for the wideband systems deployed in the E-band. Next, a new multi-input multi-output (MIMO) transceiver design, termed continuous aperture phased (CAP)-MIMO, is presented. Simulations show that CAP-MIMO enables E-band systems to achieve fiber-optic like throughputs. Finally, it is argued that full-duplex relaying can be used to greatly enhance the coverage of E-band systems without sacrificing throughput, thus, facilitating their application in establishing the backhaul of heterogeneous networks.