Academic literature on the topic 'Multiple Code Theory'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Multiple Code Theory.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Multiple Code Theory"

1

Bucci, Wilma. "Symptoms and symbols: A multiple code theory of Somatization." Psychoanalytic Inquiry 17, no. 2 (January 1997): 151–72. http://dx.doi.org/10.1080/07351699709534117.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Shokrollahi, A., B. Hassibi, B. M. Hochwald, and W. Sweldens. "Representation theory for high-rate multiple-antenna code design." IEEE Transactions on Information Theory 47, no. 6 (2001): 2335–67. http://dx.doi.org/10.1109/18.945251.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Bucci, Wilma. "Dissociation from the Perspective of Multiple Code Theory, Part I." Contemporary Psychoanalysis 43, no. 2 (April 2007): 165–84. http://dx.doi.org/10.1080/00107530.2007.10745903.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Bucci, Wilma. "Dissociation from the Perspective of Multiple Code Theory—Part II." Contemporary Psychoanalysis 43, no. 3 (July 2007): 305–26. http://dx.doi.org/10.1080/00107530.2007.10745912.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Bornstein, Robert F. "Review of Psychoanalysis and cognitive science: A multiple code theory." Psychoanalytic Psychology 15, no. 4 (1998): 569–75. http://dx.doi.org/10.1037/h0092769.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Chen, Shangdi, and Dawei Zhao. "Construction of Multi-receiver Multi-fold Authentication Codes from Singular Symplectic Geometry over Finite Fields." Algebra Colloquium 20, no. 04 (October 7, 2013): 701–10. http://dx.doi.org/10.1142/s1005386713000679.

Full text
Abstract:
As an extension of the basic model of MRA-codes, multi-receiver multi-fold authentication codes can use a single key distribution phase for multiple message transmission. A multi-receiver multi-fold authentication code is constructed from the singular symplectic geometry over finite fields in this paper. The parameters and probabilities of success in impersonation and substitution attacks by malicious groups of receivers of this code are computed.
APA, Harvard, Vancouver, ISO, and other styles
7

Kesselring, Markus S., Fernando Pastawski, Jens Eisert, and Benjamin J. Brown. "The boundaries and twist defects of the color code and their applications to topological quantum computation." Quantum 2 (October 19, 2018): 101. http://dx.doi.org/10.22331/q-2018-10-19-101.

Full text
Abstract:
The color code is both an interesting example of an exactly solved topologically ordered phase of matter and also among the most promising candidate models to realize fault-tolerant quantum computation with minimal resource overhead. The contributions of this work are threefold. First of all, we build upon the abstract theory of boundaries and domain walls of topological phases of matter to comprehensively catalog the objects realizable in color codes. Together with our classification we also provide lattice representations of these objects which include three new types of boundaries as well as a generating set for all 72 color code twist defects. Our work thus provides an explicit toy model that will help to better understand the abstract theory of domain walls. Secondly, we discover a number of interesting new applications of the cataloged objects for quantum information protocols. These include improved methods for performing quantum computations by code deformation, a new four-qubit error-detecting code, as well as families of new quantum error-correcting codes we call stellated color codes, which encode logical qubits at the same distance as the next best color code, but using approximately half the number of physical qubits. To the best of our knowledge, our new topological codes have the highest encoding rate of local stabilizer codes with bounded-weight stabilizers in two dimensions. Finally, we show how the boundaries and twist defects of the color code are represented by multiple copies of other phases. Indeed, in addition to the well studied comparison between the color code and two copies of the surface code, we also compare the color code to two copies of the three-fermion model. In particular, we find that this analogy offers a very clear lens through which we can view the symmetries of the color code which gives rise to its multitude of domain walls.
APA, Harvard, Vancouver, ISO, and other styles
8

Yan, Xiren, and Qiyi Wang. "Coding of Shared Track Gray Encoder." Journal of Dynamic Systems, Measurement, and Control 122, no. 3 (January 4, 1999): 573–76. http://dx.doi.org/10.1115/1.1286628.

Full text
Abstract:
A conventional absolute encoder consists of multiple tracks and therefore has a large size. Based on the theory of shared control, a new kind of absolute encoder called the shared track Gray encoder is proposed. This encoder has only one track, and the code has the characteristics of Gray code. In this paper, first the working principle of the encoder is introduced and the existence condition of the codes for the shared track Gray encoder is derived. Then the search procedure for the codes using self-developed assembler programs is given. Finally, the pattern of the encoder is presented. Since the shared track Gray encoder has only one track and the code is progressive, it is much smaller in size and higher in accuracy than a conventional one. [S0022-0434(00)01503-3]
APA, Harvard, Vancouver, ISO, and other styles
9

Tran, Vinh T., Nagaraj C. Shivaramaiah, Thuan D. Nguyen, Joon W. Cheong, Eamonn P. Glennon, and Andrew G. Dempster. "Generalised Theory on the Effects of Sampling Frequency on GNSS Code Tracking." Journal of Navigation 71, no. 2 (November 28, 2017): 257–80. http://dx.doi.org/10.1017/s0373463317000741.

Full text
Abstract:
Synchronisation of the received Pseudorandom (PRN) code and its locally generated replica is fundamental when estimating user position in Global Navigation Satellite System (GNSS) receivers. It has been observed through experiments that user position accuracy decreases if sampling frequency is an integer multiple of the nominal code rate. This paper provides an accuracy analysis based on the number of samples and the residual code phase of each code chip. The outcomes reveal that the distribution of residual code phases in the code phase range [0, 1/ns), where ns is the number of samples per code chip, is the root cause of accuracy degradation, rather than the ratio between sampling frequency and nominal code rate. Doppler frequencies, coherent integration periods, front-end filter bandwidths and received Carrier to Noise ratios (C/N0) also influence receiver accuracy. Also provided are a sampling frequency selection guideline and new proposed estimates of the correlation output and the Delay Locked Loop (DLL) tracking error, which can be applied to precisely model GNSS receiver baseband signal processing.
APA, Harvard, Vancouver, ISO, and other styles
10

EMMART, NIALL, and CHARLES WEEMS. "SEARCH-BASED AUTOMATIC CODE GENERATION FOR MULTIPRECISION MODULAR EXPONENTIATION ON MULTIPLE GENERATIONS OF GPU." Parallel Processing Letters 23, no. 04 (December 2013): 1340009. http://dx.doi.org/10.1142/s0129626413400094.

Full text
Abstract:
Multiprecision modular exponentiation has a variety of uses, including cryptography, prime testing and computational number theory. It is also a very costly operation to compute. GPU parallelism can be used to accelerate these computations, but to use the GPU efficiently, a problem must involve many simultaneous exponentiation operations. Handling a large number of TLS/SSL encrypted sessions in a data center is an important problem that fits this profile. We are developing a framework that enables generation of highly efficient implementations of exponentiation operations for different NVIDIA GPU architectures and problem instances. One of the challenges in generating such code is that NVIDIA's PTX is not a true assembly language, but is instead a virtual instruction set that is compiled and optimized in different ways for different generations of GPU hardware. Thus, the same PTX code runs with different levels of efficiency on different machines. And as the precision of the computations changes, each architecture has its own break-even points where a different algorithm or parallelization strategy must be employed. To make the code efficient for a given problem instance and architecture thus requires searching a multidimensional space of algorithms and configurations, by generating PTX code for each combination, executing it, validating the numerical result, and evaluating its performance. Our framework automates much of this process, and produces exponentiation code that is up to six times faster than the best known hand-coded implementations for the NVIDIA GTX 580. Our goal for the framework is to enable users to relatively quickly find the best configuration for each new GPU architecture. However, in migrating to the GTX 680, which has three times as many cores as the GTX 580, we found that the best performance our system could achieve was significantly less than for the GTX 580. The decrease was traced to a radical shift in the NVIDIA architecture that greatly reduces the storage resources for each core. Further analysis and feasibility simulations indicate that it should be possible, through changes in our code generators to adapt for different storage models, to take greater advantage of the parallelism on the GTX 680. That will add a new dimension to our search space, but will also give our framework greater flexibility for dealing with future architectures.
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Multiple Code Theory"

1

Mattingley-Scott, Mark Alistair. "A code division multiple spread spectrum local area network." Thesis, Durham University, 1989. http://etheses.dur.ac.uk/1451/.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Fan, Pingzhi. "Code design and analysis for multiple access communications." Thesis, University of Hull, 1994. http://hydra.hull.ac.uk/resources/hull:5864.

Full text
Abstract:
This thesis explores various coding aspects of multiple access communications, mainly for spread spectrum multiaccess(SSMA) communications and collaborative coding multiaccess(CCMA) communications. Both the SSMA and CCMA techniques permit efficient simultaneous transmission by several users sharing a common channel, without subdivision in time or frequency. The general principle behind these two multiaccess schemes is that one can find sets of signals (codes) which can be combined together to form a composite signal; on reception, the individual signals in the set can each be recovered from the composite signal. For the CCMA scheme, the isolation between users is based on the code structure; for the SSMA scheme, on the other hand, the isolation between users is based on the autocorrelation functions(ACFs) and crosscorrelation functions (CCFs) of the code sequences. It is clear that, in either case, the code design is the key to the system design. For the CCMA system with a multiaccess binary adder channel, a class of superimposed codes is analyzed. It is proved that every constant weight code of weight w and maximal correlation λ corresponds to a subclass of disjunctive codes of order T < w/λ. Results related to the decomposition of the disjunctive codes in the noiseless and noisy cases are derived. Decoding algorithms for both the noiseless and the noisy cases are proposed. For the CCMA system operating over a multiaccess Q-ary adder channel, a class of cyclic uniquely decodable codes is proposed and analyzed by employing cyclic codes with symbols from an arbitrary finite integer rings. A very low complexity decoding procedure is presented. For a synchronous SSMA system, a new approach employing orthogonal complementary sets is presented; the properties of such orthogonal complementary sets are studied in detail. Recursive formulas for constructing orthogonal complementary sets are given. Methods for synthesizing new orthogonal complementary sets from known ones with the same dimensions are also discussed. For an asynchronous SSMA system, several new spreading codes are presented and studied: 1. A new class of polyphase codes with two-valued periodic ACF and CCF properties is derived. It is proved that, for a given prime length L > 3, the out-of-phase ACFs and CCFs of the codes are constant and equal to √L. In addition, all codes of the same length are mutually orthogonal. 2. Maximal length sequences (m-sequences) over Gaussian integers, suitable for use with QAM modulation, are considered. Two sub-classes of m-sequences with quasi-perfect periodic autocorrelations are obtained. The CCFs between the decimated m-sequences are studied. By applying a simple operation, it is shown that some m-sequences over rational and Gaussian integers can be transformed into perfect sequences with impulsive ACFs. 3. Frank codes and Chu codes have perfect periodic ACFs and optimum periodic CCFs. In addition, it is shown that they also have very favourable nonperiodic ACFs; some new results concerning the behaviour of the nonperiodic ACFs are derived. Further, it is proved that the sets of combined Frank/Chu codes, which contain a larger number of codes than either of the two constituent sets, also have very good periodic CCFs. Based on Frank codes and Chu codes, two interesting classes of real-valued codes with good correlation properties are defined. It is shown that these codes have periodic complementary properties and good periodic and nonperiodic ACF/CCFs. Finally, a hybrid CCMA/SSMA coding scheme is proposed. This new hybrid coding scheme provides a very flexible and powerful multiple accessing capability and allows simple and efficient decoding. Given an SSMA system with K users and a CCMA system with N users, where at most T users are active at any time, then the hybrid system will have K . N users with at most T.K users active at any time. The hybrid CCMA/SSMA coding scheme is superior to the individual CCMA system or SSMA system in terms of information rate, number of users, decoding complexity and external interference rejection capability.
APA, Harvard, Vancouver, ISO, and other styles
3

Zhao, Qian Effros Michelle. "Network source coding : theory and code design for broadcast and multiple access networks /." Diss., Pasadena, Calif. : California Institute of Technology, 2003. http://resolver.caltech.edu/CaltechETD:etd-05302003-125004.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Shaar, A. A. "A study of code-division multiple-access with reference to fibre-optic local-area networks." Thesis, University of Kent, 1985. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.353184.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Souissi, Slim. "Adaptive error control through packet combining in code division multiple access systems." Diss., Georgia Institute of Technology, 1994. http://hdl.handle.net/1853/13381.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Geslin, Serge. "Influence of laser diode nonlinearities on fibre optic systems supporting direct-sequence code division multiple access signals." Thesis, University College London (University of London), 2001. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.269411.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Baker, Dirk A. "Space-time block coding with imperfect channel estimates." Morgantown, W. Va. : [West Virginia University Libraries], 2001. http://etd.wvu.edu/templates/showETD.cfm?recnum=1843.

Full text
Abstract:
Thesis (M.S.)--West Virginia University, 2001.
Title from document title page. Document formatted into pages; contains iv, 74 p. : ill. Includes abstract. Includes bibliographical references (p. 73-74).
APA, Harvard, Vancouver, ISO, and other styles
8

Manchiraju, Dinakar. "Evaluation of pseudorandom sequences used in third generation spread spectrum systems." Ohio : Ohio University, 2003. http://www.ohiolink.edu/etd/view.cgi?ohiou1081801327.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Green, Crystal D. "Perceptions of Usefulness: Using the Holland Code Theory, Multiple Intelligences Theory, and Role Model Identification to Determine a Career Niche in the Fashion Industry for First-quarter Fashion Students." Kent State University / OhioLINK, 2010. http://rave.ohiolink.edu/etdc/view?acc_num=kent1271450339.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Sathananthan, K. "Broadband wireless communications: issues of OFDM and multi-code CDMA." Monash University, School of Computer Science and Software Engineering, 2003. http://arrow.monash.edu.au/hdl/1959.1/9401.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Multiple Code Theory"

1

Adaptive WCDMA: Theory and practice. New York: John Wiley & Sons, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Theory of code division multiple access communication. Piscataway, NJ: IEEE Press, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Zigangirov, Kamil Sh. Theory of Code Division Multiple Access Communication. Hoboken, NJ, USA: John Wiley & Sons, Inc., 2004. http://dx.doi.org/10.1002/047165549x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Zigangirov, K. Sh. Theory of code division multiple access communication. Piscataway, NJ: IEEE Press, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Bucci, Wilma. Psychoanalysis and cognitive science: A multiple code theory. New York: Guilford Press, 1997.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Yin, Hongxi. Optical code division multiple access communication networks: Theory and applications. Beijing: Tsinghua University Press, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Matthew, Baker, and Toufik Issam, eds. LTE--the UMTS long term evolution: From theory to practice. Chichester, West Sussex, United Kingdom: Wiley, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

J, Nawrocki Maciej, Dohler Mischa, and Aghvami A. Hamid, eds. Understanding UMTS radio network modelling, planning and automated optimisation: Theory and practice / edited by Maciej J. Nawrocki, Mischa Dohler, A. Hamid Aghvami. Chichester: John Wiley & Sons, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

The foundations of the digital wireless world: Selected works of A J Viterbi. Hackensack, NJ: World Scientific, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

CDMA systems capacity engineering. Norwood, MA: Artech House, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Multiple Code Theory"

1

Massey, James L. "Towards an Information Theory of Spread-Spectrum Systems." In Code Division Multiple Access Communications, 29–46. Boston, MA: Springer US, 1995. http://dx.doi.org/10.1007/978-1-4615-2251-5_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Bucci, Wilma. "Dissociation from the perspective of multiple code theory—Part I." In Emotional Communication and Therapeutic Change, 156–73. Abingdon, Oxon; New York, NY: Routeldge, 2021. | Series: Relational perspectives: Routledge, 2020. http://dx.doi.org/10.4324/9781003125143-11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Fischer, Walter. "Coded Orthogonal Frequency Division Multiplex (COFDM)." In Digitale Fernseh- und Hörfunktechnik in Theorie und Praxis, 417–43. Berlin, Heidelberg: Springer Berlin Heidelberg, 2016. http://dx.doi.org/10.1007/978-3-642-53896-4_19.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Fischer, Walter. "Coded Orthogonal Frequency Division Multiplex (COFDM)." In Digitale Fernseh- und Hörfunktechnik in Theorie und Praxis, 361–83. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-15047-0_19.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Bodewig, Michael. "Multiplied Complete Fix-Free Codes and Shiftings Regarding the 3/4-Conjecture." In Information Theory, Combinatorics, and Search Theory, 694–710. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-36899-8_35.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Selakovic, Marija. "Actionable Program Analyses for Improving Software Performance." In Ernst Denert Award for Software Engineering 2019, 113–40. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-58617-1_7.

Full text
Abstract:
AbstractNowadays, we have greater expectations of software than ever before. This is followed by the constant pressure to run the same program on smaller and cheaper machines. To meet this demand, the application’s performance has become an essential concern in software development. Unfortunately, many applications still suffer from performance issues: coding or design errors that lead to performance degradation. However, finding performance issues is a challenging task: there is limited knowledge on how performance issues are discovered and fixed in practice, and current profilers report only where resources are spent, but not where resources are wasted. In this chapter, we investigate actionable performance analyses that help developers optimize their software by applying relatively simple code changes. We focus on optimizations that are effective, exploitable, recurring, and out-of-reach for compilers. These properties suggest that proposed optimizations lead to significant performance improvement, that they are easy to understand and apply, applicable across multiple projects, and that the compilers cannot guarantee that these optimizations always preserve the original program semantics. We implement our actionable analyses in practical tools and demonstrate their potential in improving software performance by applying relatively simple code optimizations.
APA, Harvard, Vancouver, ISO, and other styles
7

Li, Zhonghua, and Guoxiang Xuan. "The Approach of Lock Hydraulic System Selection Based on Multiple Factors." In Lecture Notes in Civil Engineering, 693–703. Singapore: Springer Nature Singapore, 2023. http://dx.doi.org/10.1007/978-981-19-6138-0_60.

Full text
Abstract:
AbstractThere are many types of navigation lock filling and emptying systems, how to choose the appropriate hydraulic system is the key issues in the design of navigation lock. At present, there is no unified method and standard for the decision of the navigation lock filling and emptying system. In Chinese design codes, the traditional way to choose the lock hydraulic system types is based on the m coefficient which is related with the lock lift height (H) and leveling time(T). The influence of dimension of lock chamber is ignored in the method, including the length, width and initial water depth etc. which makes it difficult to choose an accurate and reasonable F/E system. In this paper, according to the energy dissipation mechanism of the filling and emptying system, combined with the influences of water head, filling and emptying time, chamber dimension and initial water depth, except the traditional discrimination index m, two dimensionless indexes mL and mC are introduced, which respectively represent the energy that needs to be eliminated in the horizontal, vertical and horizontal unit area of the F/E system. And the lock hydraulic system is classified into 7 categories based on the layout and energy dissipation characteristics of F/E system. The decision indexes of over 100 navigation locks with different characters are counted, then the relationship between the indexes and 7 lock hydraulic system categories is established using gray system theory. Finally, using the filling and emptying system selection method, the filling and emptying system of 13 typical ship locks are calculated and compared with the industry codes. The results show that this method quantifies the filling and emptying system selection process; the filling and emptying system selected by this method has high accuracy and good practical value.
APA, Harvard, Vancouver, ISO, and other styles
8

Kaalby, Lasse, Axel Skytthe, Karen Andersen-Ranberg, and Bernard Jeune. "Causes of Death Among 9000 Danish Centenarians and Semisuper-Centenarians in the 1970–2012 Period." In Demographic Research Monographs, 85–102. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-49970-9_8.

Full text
Abstract:
AbstractAs most centenarians suffer from multiple diseases, they are at high risk of dying – but what do they ultimately die of? This question has scarcely been examined. We have carried out a register-based study of the causes of death (CoD) among Danish centenarians. Among 8559 centenarian deaths in the 1970–2012 period, the most common CoD was in the category of cardio- and cerebrovascular diseases (CVD); at the end of the study period, this CoD accounted for one-third of the deaths in this age group. The mortality rate for CVD as an underlying CoD was more than halved during the period (from 358 to 170 per 1000 person-years). In contrast, the mortality rate for cancer remained stable during the whole period, but at a very low level (15–20 per 1000 person-years). Cancer made up a much smaller share of underlying CoDs among this age group (3–4%) than among 85–99-year-olds (15%). The mortality rate for pneumonia remained at a constant level (about 50 per 1000 person-years) of around 10% among centenarians and 5% among 85–99-year-olds. The underlying CoD groups that were reported with increasing frequency during the period were mental diseases, including dementia, which increased sevenfold; and ill-defined conditions/senility, which increased fourfold. The latter CoD group accounted for 28% of deaths among centenarians in the most recent years, and for more than one-third of deaths among semi-supercentenarians (aged 105–109). The increase in the proportion of deaths for which the CoD was listed as ill-defined conditions/senility was probably partly due to the under-diagnosis of diseases among centenarians, especially of heart diseases. However, a substantial proportion of these deaths may have been attributable to “old age” – i.e., a combination of several diseases and organ deficiencies – and not to a single underlying cause.
APA, Harvard, Vancouver, ISO, and other styles
9

Montesinos López, Osval Antonio, Abelardo Montesinos López, and Jose Crossa. "Elements for Building Supervised Statistical Machine Learning Models." In Multivariate Statistical Machine Learning Methods for Genomic Prediction, 71–108. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-89010-0_3.

Full text
Abstract:
AbstractThis chapter gives details of the linear multiple regression model including assumptions and some pros and cons, the maximum likelihood. Gradient descendent methods are described for learning the parameters under this model. Penalized linear multiple regression is derived under Ridge and Lasso penalties, which also emphasizes the estimation of the regularization parameter of importance for its successful implementation. Examples are given for both penalties (Ridge and Lasso) and but not for penalized regression multiple regression framework for illustrating the circumstances when the penalized versions should be preferred. Finally, the fundamentals of penalized and non-penalized logistic regression are provided under a gradient descendent framework. We give examples of logistic regression. Each example comes with the corresponding R codes to facilitate their quick understanding and use.
APA, Harvard, Vancouver, ISO, and other styles
10

"Appendix A: Analysis of the Moments of the Decision Statistics for the FH CDMA Communication System." In Theory of Code Division Multiple Access Communication, 385–89. Hoboken, NJ, USA: John Wiley & Sons, Inc., 2004. http://dx.doi.org/10.1002/047165549x.app1.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Multiple Code Theory"

1

Gummadi, Ramakrishna, and R. S. Sreenivas. "Relaying a fountain code across multiple nodes." In 2008 IEEE Information Theory Workshop (ITW). IEEE, 2008. http://dx.doi.org/10.1109/itw.2008.4578640.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Hong, Yi, Shamai Shlomo, and Emanuele Viterbo. "Algebraic-phase scrambling sequences for code-spread code-division multiple-access." In 2008 IEEE International Symposium on Information Theory - ISIT. IEEE, 2008. http://dx.doi.org/10.1109/isit.2008.4595211.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Yiyue Wu and Robert Calderbank. "Code diversity in multiple antenna wireless communication." In 2008 IEEE International Symposium on Information Theory - ISIT. IEEE, 2008. http://dx.doi.org/10.1109/isit.2008.4595153.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Ustunomiya, Hidetoshi, and Hiroshi Kamabe. "Constructions of multiple error correcting WOM-Code." In 2013 IEEE International Symposium on Information Theory (ISIT). IEEE, 2013. http://dx.doi.org/10.1109/isit.2013.6620391.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Tan, Peng Hui, Chin Keong Ho, and Sumei Sun. "Joint network-channel code design for block fading cooperative multiple access channel." In 2010 IEEE Information Theory Workshop on Information Theory (ITW). IEEE, 2010. http://dx.doi.org/10.1109/itwksps.2010.5503197.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Wang, Linchen, and Andrew W. Eckford. "Nonnegative code division multiple access techniques in molecular communication." In 2017 15th Canadian Workshop on Information Theory (CWIT). IEEE, 2017. http://dx.doi.org/10.1109/cwit.2017.7994832.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Koller, Christian, Alexandre Graell i Amat, Jorg Kliewer, and Daniel J. Costello. "Trapping set enumerators for repeat multiple accumulate code ensembles." In 2009 IEEE International Symposium on Information Theory - ISIT. IEEE, 2009. http://dx.doi.org/10.1109/isit.2009.5205355.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Koller, Christian, Jorg Kliewer, Kamil S. Zigangirov, and Daniel J. Costello. "Minimum distance bounds for multiple-serially concatenated code ensembles." In 2008 IEEE International Symposium on Information Theory - ISIT. IEEE, 2008. http://dx.doi.org/10.1109/isit.2008.4595316.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Alfarano, Gianira N., Alberto Ravagnani, and Emina Soljanin. "Dual-Code Bounds on Multiple Concurrent (Local) Data Recovery." In 2022 IEEE International Symposium on Information Theory (ISIT). IEEE, 2022. http://dx.doi.org/10.1109/isit50566.2022.9834616.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Cheng, J., K. Kamoi, and Y. Watanabe. "Error-correcting signature code for multiple-access adder channel." In Proceedings. International Symposium on Information Theory, 2005. ISIT 2005. IEEE, 2005. http://dx.doi.org/10.1109/isit.2005.1523703.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Multiple Code Theory"

1

Brown, Yolanda, Twonia Goyer, and Maragaret Harvey. Heart Failure 30-Day Readmission Frequency, Rates, and HF Classification. University of Tennessee Health Science Center, December 2020. http://dx.doi.org/10.21007/con.dnp.2020.0002.

Full text
Abstract:
30 Day Hospital Readmission Rates, Frequencies, and Heart Failure Classification for Patients with Heart Failure Background Congestive heart failure (CHF) is the leading cause of mortality, morbidity, and disability worldwide among patients. Both the incidence and the prevalence of heart failure are age dependent and are relatively common in individuals 40 years of age and older. CHF is one of the leading causes of inpatient hospitalization readmission in the United States, with readmission rates remaining above the 20% goal within 30 days. The Center for Medicare and Medicaid Services imposes a 3% reimbursement penalty for excessive readmissions including those who are readmitted within 30 days from prior hospitalization for heart failure. Hospitals risk losing millions of dollars due to poor performance. A reduction in CHF readmission rates not only improves healthcare system expenditures, but also patients’ mortality, morbidity, and quality of life. Purpose The purpose of this DNP project is to determine the 30-day hospital readmission rates, frequencies, and heart failure classification for patients with heart failure. Specific aims include comparing computed annual re-admission rates with national average, determine the number of multiple 30-day re-admissions, provide descriptive data for demographic variables, and correlate age and heart failure classification with the number of multiple re-admissions. Methods A retrospective chart review was used to collect hospital admission and study data. The setting occurred in an urban hospital in Memphis, TN. The study was reviewed by the UTHSC Internal Review Board and deemed exempt. The electronic medical records were queried from July 1, 2019 through December 31, 2019 for heart failure ICD-10 codes beginning with the prefix 150 and a report was generated. Data was cleaned such that each patient admitted had only one heart failure ICD-10 code. The total number of heart failure admissions was computed and compared to national average. Using age ranges 40-80, the number of patients re-admitted withing 30 days was computed and descriptive and inferential statistics were computed using Microsoft Excel and R. Results A total of 3524 patients were admitted for heart failure within the six-month time frame. Of those, 297 were re-admitted within 30 days for heart failure exacerbation (8.39%). An annual estimate was computed (16.86%), well below the national average (21%). Of those re-admitted within 30 days, 50 were re-admitted on multiple occasions sequentially, ranging from 2-8 re-admissions. The median age was 60 and 60% male. Due to the skewed distribution (most re-admitted twice), nonparametric statistics were used for correlation. While graphic display of charts suggested a trend for most multiple re-admissions due to diastolic dysfunction and least number due to systolic heart failure, there was no statistically significant correlation between age and number or multiple re-admissions (Spearman rank, p = 0.6208) or number of multiple re-admissions and heart failure classification (Kruskal Wallis, p =0.2553).
APA, Harvard, Vancouver, ISO, and other styles
2

Volkmer, Ingrid. Social media and COVID-19: A global study of digital crisis interaction among Gen Z and millennials. University of Melbourne, November 2021. http://dx.doi.org/10.46580/124367.

Full text
Abstract:
The COVID-19 pandemic is revealing that global big tech platforms and social media are core sites for continuous engagement with crisis content for young citizens. This study included twenty-four countries from all continents at the time of the heightened COVID-19 crisis, and our survey targeted 18-40 year olds, Millennials and Gen Zs – overall n = 23,483 respondents. Outcomes show that for young citizens across continents, crisis communication is not just about press briefings. Instead, crisis communication is continuous interaction and engagement across their multiple source environments. Young citizens navigate social media, national media, search sites and messaging apps, they engage with peer communities, science and health experts and – across all countries – substantially with the social media content of the World Health Organization (WHO). Overall, they create their own individual crisis narrative based on the sources they use and the insights they select. This report outlines these new crisis communication dimensions within a transnational social media space and offers numerous suggestions for incorporating social media in crisis response strategies.
APA, Harvard, Vancouver, ISO, and other styles
3

Tarko, Andrew P., Mario A. Romero, Vamsi Krishna Bandaru, and Cristhian Lizarazo. TScan–Stationary LiDAR for Traffic and Safety Applications: Vehicle Interpretation and Tracking. Purdue University, 2022. http://dx.doi.org/10.5703/1288284317402.

Full text
Abstract:
To improve traffic performance and safety, the ability to measure traffic accurately and effectively, including motorists and other vulnerable road users, at road intersections is needed. A past study conducted by the Center for Road Safety has demonstrated that it is feasible to detect and track various types of road users using a LiDAR-based system called TScan. This project aimed to progress towards a real-world implementation of TScan by building two trailer-based prototypes with full end-user documentation. The previously developed detection and tracking algorithms have been modified and converted from the research code to its implementational version written in the C++ programming language. Two trailer-based TScan units have been built. The design of the prototype was iterated multiple times to account for component placement, ease of maintenance, etc. The expansion of the TScan system from a one single-sensor unit to multiple units with multiple LiDAR sensors necessitated transforming all the measurements into a common spatial and temporal reference frame. Engineering applications for performing traffic counts, analyzing speeds at intersections, and visualizing pedestrian presence data were developed. The limitations of the existing SSAM for traffic conflicts analysis with computer simulation prompted the research team to develop and implement their own traffic conflicts detection and analysis technique that is applicable to real-world data. Efficient use of the development system requires proper training of its end users. An INDOT-CRS collaborative process was developed and its execution planned to gradually transfer the two TScan prototypes to INDOT’s full control. This period will be also an opportunity for collecting feedback from the end user and making limited modifications to the system and documentation as needed.
APA, Harvard, Vancouver, ISO, and other styles
4

Näslund-Hadley, Emma, Michelle Koussa, and Juan Manuel Hernández. Skills for Life: Stress and Brain Development in Early Childhood. Inter-American Development Bank, April 2021. http://dx.doi.org/10.18235/0003205.

Full text
Abstract:
Learning to cope with disappointments and overcoming obstacles is part of growing up. By conquering some challenges, children develop resilience. Such normal stressors may include initiating a new activity or separation from parents during preschool hours. However, when the challenges in early childhood are intensified by important stressors happening outside their own lives, they may start to worry about the safety of themselves and their families. This may cause chronic stress, which interferes with their emotional, cognitive, and social development. In developing country contexts, it is especially hard to capture promptly the effects of stressors related to the COVID-19 pandemic on childrens cognitive and socioemotional development. In this note, we draw on the literature on the effect of stress on brain development and examine data from a recent survey of households with young children carried out in four Latin American countries to offer suggestions for policy responses. We suggest that early childhood and education systems play a decisive role in assessing and addressing childrens mental health needs. In the absence of forceful policy responses on multiple fronts, the mental health outcomes may become lasting.
APA, Harvard, Vancouver, ISO, and other styles
5

Diprose, Rachael, Amalinda Savirani, Annisa Sabrina Hartoto, and Ken M. P. Setiawan. Pathways of Change through Women’s Collective Action: How Women are Overcoming Barriers and Bucking Trends to Influence Rural Development in Indonesia. University of Melbourne with Universitas Gadjah Mada and MAMPU, 2020. http://dx.doi.org/10.46580/124329.

Full text
Abstract:
This overview to the edited volume is structured to briefly explore the following key points that emerge in the case analysis of how women’s collective action has created changes for both women’s well-being and the implementation of the Village Law, as well as how such change has been supported by a wide range of CSOs across different contexts and sectors. First, we identify variation in the diversity of priorities and initiatives that villages have introduced as a result of women’s influence on the implementation of the Law. Such initiatives go beyond infrastructure and economic development projects (although women have also prioritised these kinds of initiatives) and traverse multiple sectoral issues in seeking to address challenges for villagers, particularly women, through village development. Second, we identify the different types of changes that are evident in the case studies that have implications for women’s everyday wellbeing, as well as their influence on structures of power, decision making and village development at the individual and institutional levels, and in broader contexts. Third, we discuss how changes have come about for rural village women and what factors have contributed to the changes that are illustrated through the case studies. This includes a discussion of how context dynamics constrain or enable women’s influence, variation in core challenges (or sectoral issues) for women, and how collective action has contributed to forging these changes as is illustrated by the case studies. Fourth, we explore the temporal dimensions of change. And finally, we explore some of the pathways by which such changes have occurred in the research areas, that being different contexts.
APA, Harvard, Vancouver, ISO, and other styles
6

Diprose, Rachael, Amalinda Savirani, Annisa Sabrina Hartoto, and Ken M. P. Setiawan. Pathways of Change through Women’s Collective Action: How Women are Overcoming Barriers and Bucking Trends to Influence Rural Development in Indonesia. University of Melbourne with Universitas Gadjah Mada and MAMPU, 2020. http://dx.doi.org/10.46580/124329.

Full text
Abstract:
This overview to the edited volume is structured to briefly explore the following key points that emerge in the case analysis of how women’s collective action has created changes for both women’s well-being and the implementation of the Village Law, as well as how such change has been supported by a wide range of CSOs across different contexts and sectors. First, we identify variation in the diversity of priorities and initiatives that villages have introduced as a result of women’s influence on the implementation of the Law. Such initiatives go beyond infrastructure and economic development projects (although women have also prioritised these kinds of initiatives) and traverse multiple sectoral issues in seeking to address challenges for villagers, particularly women, through village development. Second, we identify the different types of changes that are evident in the case studies that have implications for women’s everyday wellbeing, as well as their influence on structures of power, decision making and village development at the individual and institutional levels, and in broader contexts. Third, we discuss how changes have come about for rural village women and what factors have contributed to the changes that are illustrated through the case studies. This includes a discussion of how context dynamics constrain or enable women’s influence, variation in core challenges (or sectoral issues) for women, and how collective action has contributed to forging these changes as is illustrated by the case studies. Fourth, we explore the temporal dimensions of change. And finally, we explore some of the pathways by which such changes have occurred in the research areas, that being different contexts.
APA, Harvard, Vancouver, ISO, and other styles
7

Levy, Brian. How Political Contexts Influence Education Systems: Patterns, Constraints, Entry Points. Research on Improving Systems of Education (RISE), December 2022. http://dx.doi.org/10.35489/bsg-rise-2022/pe04.

Full text
Abstract:
This paper synthesises the findings of a set of country studies commissioned by the RISE Programme to explore the influence of politics and power on education sector policymaking and implementation. The synthesis groups the countries into three political-institutional contexts: Dominant contexts, where power is centred around a political leader and a hierarchical governance structure. As the Vietnam case details, top-down leadership potentially can provide a robust platform for improving learning outcomes. However, as the case studies of Ethiopia, Indonesia, Nigeria, and Tanzania illustrate, all-too-often dominant leaders’ goals vis-à-vis the education sector can veer in other directions. In impersonal competitive contexts, a combination of strong formal institutions and effective processes of resolving disagreements can, on occasion, result in a shared commitment among powerful interests to improve learning outcomes—but in none of the case studies is this outcome evident. In Peru, substantial learning gains have been achieved despite messy top-level politics. But the Chilean, Indian, and South African case studies suggest that the all-too-common result of rule-boundedness plus unresolved political contestation over the education sector’s goals is some combination of exaggerated rule compliance and/or performative isomorphic mimicry. Personalised competitive contexts (Bangladesh, Ghana, and Kenya for example) lack the seeming strengths of either their dominant or their impersonal competitive contexts; there are multiple politically-influential groups and multiple, competing goals—but no credible framework of rules to bring coherence either to political competition or to the education bureaucracy. The case studies show that political and institutional constraints can render ineffective many specialised sectoral interventions intended to improve learning outcomes. But they also point to the possibility that ‘soft governance’ entry points might open up some context-aligned opportunities for improving learning outcomes. In dominant contexts, the focus might usefully be on trying to influence the goals and strategies of top-level leadership. In impersonal competitive contexts, it might be on strengthening alliances between mission-oriented public officials and other developmentally-oriented stakeholders. In personalised competitive contexts, gains are more likely to come from the bottom-up—via a combination of local-level initiatives plus a broader effort to inculcate a shared sense among a country’s citizenry of ‘all for education’.
APA, Harvard, Vancouver, ISO, and other styles
8

Levy, Brian. How Political Contexts Influence Education Systems: Patterns, Constraints, Entry Points. Research on Improving Systems of Education (RISE), December 2022. http://dx.doi.org/10.35489/bsg-rise-wp_2022/122.

Full text
Abstract:
This paper synthesises the findings of a set of country studies commissioned by the RISE Programme to explore the influence of politics and power on education sector policymaking and implementation. The synthesis groups the countries into three political-institutional contexts: Dominant contexts, where power is centred around a political leader and a hierarchical governance structure. As the Vietnam case details, top-down leadership potentially can provide a robust platform for improving learning outcomes. However, as the case studies of Ethiopia, Indonesia, Nigeria, and Tanzania illustrate, all-too-often dominant leaders’ goals vis-à-vis the education sector can veer in other directions. In impersonal competitive contexts, a combination of strong formal institutions and effective processes of resolving disagreements can, on occasion, result in a shared commitment among powerful interests to improve learning outcomes—but in none of the case studies is this outcome evident. In Peru, substantial learning gains have been achieved despite messy top-level politics. But the Chilean, Indian, and South African case studies suggest that the all-too-common result of rule-boundedness plus unresolved political contestation over the education sector’s goals is some combination of exaggerated rule compliance and/or performative isomorphic mimicry. Personalised competitive contexts (Bangladesh, Ghana, and Kenya for example) lack the seeming strengths of either their dominant or their impersonal competitive contexts; there are multiple politically-influential groups and multiple, competing goals—but no credible framework of rules to bring coherence either to political competition or to the education bureaucracy. The case studies show that political and institutional constraints can render ineffective many specialised sectoral interventions intended to improve learning outcomes. But they also point to the possibility that ‘soft governance’ entry points might open up some context-aligned opportunities for improving learning outcomes. In dominant contexts, the focus might usefully be on trying to influence the goals and strategies of top-level leadership. In impersonal competitive contexts, it might be on strengthening alliances between mission-oriented public officials and other developmentally-oriented stakeholders. In personalised competitive contexts, gains are more likely to come from the bottom-up—via a combination of local-level initiatives plus a broader effort to inculcate a shared sense among a country’s citizenry of ‘all for education’.
APA, Harvard, Vancouver, ISO, and other styles
9

Khan, Amir Ullah. Islam and Good Governance: A Political Economy Perspective. IIIT, October 2020. http://dx.doi.org/10.47816/01.004.20.

Full text
Abstract:
It is readily apparent to everyone that there are multiple and serious concerns that face Muslim societies today. Terrorism, civil strife, poverty, illiteracy, factionalism, gender injustices and poor healthcare are just a few of the challenges to governance across the Muslim world. These are core issues for governance and public administration in any form of government. However, before we can engage with good governance within the context of Islam, we need to be clear what mean by good governance itself. A simple definition of good governance is that of an institutionalised competency of administration and institution leading to efficient resource allocation and management[1]. Another way of looking at it is as a system which is defined by the existence of efficient and accountable institutions[2]. Civil society now tends to look at good governance by way of impact measurement and how a certain set of processes result in a set of measurable and desirable outcomes.
APA, Harvard, Vancouver, ISO, and other styles
10

Walz, Yvonne, Florence Nick, Oscar Higuera Roa, Udo Nehren, and Zita Sebesvari. Coherence and Alignment among Sustainable Land Management, Ecosystem-based Adaptation, Ecosystem-based Disaster Risk Reduction and Nature-based Solutions. United Nations University - Institute for Environment and Human Security, November 2021. http://dx.doi.org/10.53324/mwgp9896.

Full text
Abstract:
Approaches integrating environmental management practices have been gaining importance in recent years. Sustainable Land Management (SLM), Ecosystem-based Adaptation (EbA), Ecosystem-based disaster Risk Reduction (Eco-DRR) and Nature-based Solutions (NbS) are widely applied approaches that tackle certain drivers of challenges such as food insecurity, water scarcity, decline in biodiversity and threats to livelihoods, while also considering both human well-being and ecosystem functions and services. Better understanding the similarities, differences and relationships between these approaches helps to improve efficiency in implementation and leverage synergies. By shedding more light on where these approaches align, investments in land-based solutions in response to different types of environmental challenges can be more effectively designed to achieve multiple targets. In response to the United Nations Convention to Combat Desertification (UNCCD) decision 19/COP.14 paragraph 4, the main objective of this report is to understand and elaborate upon the characteristics of SLM, EbA, Eco-DRR and NbS. The report begins with an overview of the historical backgrounds and origins of SLM, EbA, Eco-DRR and NbS. Despite differences in their specific goals and targeted benefits, all approaches aim for the support of biodiversity, land-based ecosystems and ecosystem services and functions, and employ measures to conserve, restore and sustainably use land to support ecosystem services and functions, including SLM technologies. Furthermore, irrespective of their different goals, the projects developed under any approach can generate comparable co-benefits, especially due to their support of biodiversity. The capacity for all these approaches to deliver multiple co-benefits means that projects of each approach can directly contribute to implementing the specific goals of the other approaches as well. Thus, multiple global and national targets, frameworks, strategies and conventions which call for the implementation of one or more of these approaches, can benefit from this report by avoiding duplication and reducing the overall investments necessary to achieve the set targets and goals. This is critical for achieving the ambitious Agenda 2030, including voluntary land degradation neutrality (LDN) targets and climate action under the Paris Agreement. It will also be the case for the post-2020 global biodiversity framework currently under development. The added value that will come from optimizing the links among these approaches extends from national policymakers to the practitioners of SLM, EbA and Eco-DRR projects, which all share the ultimate goal of sustainable development. To capture the coherence and alignment among these approaches, their similarities and differences have been summarized in a conceptual framework. The framework has been designed to help practitioners understand the specific goals of each approach, and to link these to the relevant global and national targets, frameworks, strategies and conventions, which can support monitoring and evaluation as well as reporting processes. The synergies among these approaches are further illustrated based on three case studies in order to demonstrate opportunities for leveraging multiple co-benefits and targets at implementation level irrespective of the different objectives under each. The results of this assessment demonstrate that activities under one approach can be beneficial to achieve the specific goals of other approaches with little additional effort. It is essential for policymakers, project developers and practitioners to recognize that. This is key to the achievement of sustainable development.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography