Kliknij ten link, aby zobaczyć inne rodzaje publikacji na ten temat: Dynamic coded redundancy.

Artykuły w czasopismach na temat „Dynamic coded redundancy”

Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych

Wybierz rodzaj źródła:

Sprawdź 28 najlepszych artykułów w czasopismach naukowych na temat „Dynamic coded redundancy”.

Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.

Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.

Przeglądaj artykuły w czasopismach z różnych dziedzin i twórz odpowiednie bibliografie.

1

Xu, Kun, Zhiyong Du i Bin Jiang. "Dynamic Coded Cooperation With Incremental Redundancy: Throughput and Diversity-Multiplexing Tradeoff Analysis". IEEE Communications Letters 24, nr 3 (marzec 2020): 506–9. http://dx.doi.org/10.1109/lcomm.2020.2969670.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Péni, Tamás, Bálint Vanek, Zoltán Szabó i József Bokor. "Supervisory Fault Tolerant Control of the GTM UAV Using LPV Methods". International Journal of Applied Mathematics and Computer Science 25, nr 1 (1.03.2015): 117–31. http://dx.doi.org/10.1515/amcs-2015-0009.

Pełny tekst źródła
Streszczenie:
Abstract A multi-level reconfiguration framework is proposed for fault tolerant control of over-actuated aerial vehicles, where the levels indicate how much authority is given to the reconfiguration task. On the lowest, first level the fault is accommodated by modifying only the actuator/sensor configuration, so the fault remains hidden from the baseline controller. A dynamic reallocation scheme is applied on this level. The allocation mechanism exploits the actuator/sensor redundancy available on the aircraft. When the fault cannot be managed at the actuator/sensor level, the reconfiguration process has access to the baseline controller. Based on the LPV control framework, this is done by introducing fault-specific scheduling parameters. The baseline controller is designed to provide an acceptable performance level along all fault scenarios coded in these scheduling variables. The decision on which reconfiguration level has to be initiated in response to a fault is determined by a supervisor unit. The method is demonstrated on a full six-degrees-of-freedom nonlinear simulation model of the GTM UAV.
Style APA, Harvard, Vancouver, ISO itp.
3

Hoare, Johanna, Sarah Garnett, Louise Baur, Natalie Lister i Hiba Jebeile. "A Novel Method to Determine a Custom Sample Size for Image-Based Instagram Content Analysis". Current Developments in Nutrition 6, Supplement_1 (czerwiec 2022): 768. http://dx.doi.org/10.1093/cdn/nzac063.010.

Pełny tekst źródła
Streszczenie:
Abstract Objectives Most Instagram users are young people, and social media is often used to search nutrition information. Health interventions aimed at young people should consider such information sources. Content analyses of Instagram images offer insights into types of content that may influence nutrition-related decision making and health behaviors. However, the number of analyzed images in existing studies has varied, and methods to determine data-specific sample sizes to reach saturation have not been explored. We aimed to develop a method to determine sample sizes for image-based content analyses on Instagram. We piloted the method and determined the reliability by identifying the saturation point for content categorized under two separate nutrition-related hashtags. Methods Instagram ‘top posts’ for a 21-year-old user were searched using hashtags ‘mindfuleating’ and ‘intuitiveeating’. 1200 images from each were extracted. Hashtag-specific coding frameworks were constructed inductively by two authors, initially coding the image- and text-based elements of the first 90 images collaboratively. Next, increments of 45 images were coded independently, then compared, solving disagreements by discussion. The process was repeated until saturation occurred when no new codes emerged. This was repeated seven weeks later to determine reliability. Results The coding frameworks constructed for #mindfuleating at first and second capture comprised 63 and 74 distinct codes, with saturation occurring at 360 and 405 images, respectively. The #intuitiveeating frameworks comprised 83 and 86 codes, with saturation at 450 and 495 images, respectively. The codes captured detailed pictorial content (e.g., ‘female’, ‘White’, ‘young adult’) and text (e.g., ‘nutrition information’, ‘relationship with food’). For both hashtags, the number of image-based codes decreased while text-based codes increased between coding. Conclusions Variations in coding frameworks and sample sizes over a short timeframe reflect the dynamic nature of Instagram content. Assessment of diet trends on social media requires accurate sampling to ensure nuances of a specific topic are captured, while research efficiency benefits from reduced data redundancy. Funding Sources NHMRC Peter Doherty Early Career Fellowship; Sydney Medical School Foundation, The University of Sydney.
Style APA, Harvard, Vancouver, ISO itp.
4

Nikulina, Olena, Valerii Severyn i Vladyslav Sharov. "DEVELOPMENT OF A MODEL OF INTERFERENCE-RESISTANT DATA TRANSMISSION FOR INFORMATION TECHNOLOGY OF CONTROL OPTIMIZATION OF DYNAMIC SYSTEMS". Bulletin of National Technical University "KhPI". Series: System Analysis, Control and Information Technologies, nr 2 (8) (23.12.2022): 57–62. http://dx.doi.org/10.20998/2079-0023.2022.02.09.

Pełny tekst źródła
Streszczenie:
For data transmission channels used in local control systems for various processes, simple and inexpensive methods are needed that will allow the necessary information to be transmitted without errors. Errors that occur in continuous communication channels are one of the main obstacles to the reliable transmission of information. As a result of the analysis of error statistics in discrete channels, it was concluded that single and double errors occur most often. The purpose of this article is to develop a model of interference-resistant data transmission for information technology optimization of control of dynamic systems. The analyzed causes of errors are signal attenuation, noise and various interferences. The resulting transmitted signal is determined by the combination of the useful signal and the interference signal. When considering discrete signals, several causes of errors are highlighted – edge distortions, pulse splitting, and others. Considered methods of combating obstacles: means of operational and preventive nature; means of increasing interference resistance during the transmission of single elements; use of feedback; adding redundancy to the code; tamper-proof coding. It is proposed to combat errors using tamper-resistant coding. Among the interference-resistant codes, redundant block separable systematic codes are selected, which are divided into cyclic codes and Hamming code. The basis of the interference-resistant coding model is the use of a systematic code - a cyclic code or a Hamming code followed by cascade coding. Since the coding model must be adaptively used in different systems, a necessary criterion of the model is its universality. The model should work in different systems without changing the encoding and decoding algorithms. Among the many types of interference-resistant codes, cascade codes are chosen for use. Widespread cascade codes are universal, easily scalable, work stably, have proven themselves well in world practice, therefore they are recommended for use in various information management systems. The implementation of the interference-resistant data transmission model is presented.
Style APA, Harvard, Vancouver, ISO itp.
5

Nikulina, Olena, Valerii Severyn i Vladyslav Sharov. "SIMULATION AND ANALYSIS OF ENCODERS OF INTERFERENCE-RESISTANT CASCADE CODES FOR DYNAMIC SYSTEMS". Bulletin of National Technical University "KhPI". Series: System Analysis, Control and Information Technologies, nr 1 (9) (15.07.2023): 64–69. http://dx.doi.org/10.20998/2079-0023.2023.01.10.

Pełny tekst źródła
Streszczenie:
For various channels of information transmission that can be used in local control systems of a wide range of processes, affordable, scalable, and inexpensive transmission methods are needed that allow the necessary information to be transmitted reliably without errors. Errors that occur in discrete, continuous communication channels are the main obstacle to the reliability of transmitted data. The main causes of errors are signal attenuation, noise and various interferences. As a result of the analysis of error statistics in discrete data transmission channels, it was concluded that single and double errors occur in the absolute majority of cases. It is proposed to combat errors by using tamper-resistant coding. Among the interference-resistant codes, redundant block-separated systematic codes are highlighted, among which is the Hamming code. The basis of the interference-resistant coding model is proposed to be the use of a systematic Hamming code followed by cascade coding by adding a parity check bit. The used model made it possible to deal with all the most likely cases of errors. Since this coding model must be flexibly used in different systems, a necessary criterion of the model is its universality. Therefore, the model was tested on a sample with code combinations of different numbers of bits. The purpose of this article is to analyze the dependence of the coding procedure execution time for encoders of different levels: a separate first-stage encoder, as well as a first-stage encoder with the addition of a second-stage encoder. Experiments were conducted with a large sample, which were subsequently analyzed and interpreted. Since the model proved to be flexible, simple, stable and effective as a result of experiments, and the process of combating interference by using cascade codes has proven itself well in world practice, it is recommended for use in various information management systems. The implementation of the coder for interference-resistant data transmission is given.
Style APA, Harvard, Vancouver, ISO itp.
6

Bao, Haizhou, Yiming Huo, Chuanhe Huang, Xiaodai Dong i Wanyu Qiu. "Cluster-Based Cooperative Cache Deployment and Coded Delivery Strategy in C-V2X Networks". Wireless Communications and Mobile Computing 2021 (1.05.2021): 1–19. http://dx.doi.org/10.1155/2021/8864004.

Pełny tekst źródła
Streszczenie:
Cellular vehicle-to-everything- (C-V2X-) based communications can support various content-oriented applications and have gained significant progress in recent years. However, the limited backhaul bandwidth and dynamic topology make it difficult to obtain the multimedia service with high-reliability and low-latency communication in C-V2X networks, which may degrade the quality of experience (QoE). In this paper, we propose a novel cluster-based cooperative cache deployment and coded delivery strategy for C-V2X networks to improve the cache hit ratio and response time, reduce the request-response delay, and improve the bandwidth efficiency. To begin with, we design an effective vehicle cluster method. Based on the constructed cluster, we propose a two-level cooperative cache deployment approach to cache the frequently requested files on the edge nodes, LTE evolved NodeB (eNodeB) and cluster head (CH), to maximize the overall cache hit ratio. Furthermore, we propose an effective coded delivery strategy to minimize the network load and the ratio of redundant files. Simulation results demonstrate that our proposed method can effectively reduce the average response delay and network load and improve both the hit ratio and the ratio of redundant files.
Style APA, Harvard, Vancouver, ISO itp.
7

Bayo, E., i M. A. Serna. "Penalty Formulations for the Dynamic Analysis of Elastic Mechanisms". Journal of Mechanisms, Transmissions, and Automation in Design 111, nr 3 (1.09.1989): 321–27. http://dx.doi.org/10.1115/1.3259002.

Pełny tekst źródła
Streszczenie:
A series of penalty methods are presented for the dynamic analysis of flexible mechanisms. The proposed methods formulate the equations of motion with respect to a floating frame that follows the rigid body motion of the links. The constraint conditions are not appended to the Lagrange’s equations in the form of algebraic or differential constraints, but inserted in them by means of a penalty formulation, and therefore the number of equations of the system does not increase. Furthermore, the discretization of the equations using the finite element method leads to a system of ordinary differential equations that can be solved using standard numerical algorithms. The proposed methods are valid for three dimensional analysis and can be very easily implemented in existing codes. Furthermore, they can be used to model any type of constraint conditions, either holonomic or nonholonomic, and with any degree of redundancy. A series of mechanisms composed of elastic members are analyzed. The results demonstrate the capabilities of the proposed methods for simulation analysis.
Style APA, Harvard, Vancouver, ISO itp.
8

Koppala, Neelima, Nagarajan Ashok Kumar, Satyam Satyam i Neeruganti Vikram Teja. "Proficient matrix codes for error detection and correctionin 8-port network on chip routers". Indonesian Journal of Electrical Engineering and Computer Science 29, nr 3 (1.03.2023): 1336. http://dx.doi.org/10.11591/ijeecs.v29.i3.pp1336-1344.

Pełny tekst źródła
Streszczenie:
This paper verifies the applicability of the proposed code to dynamic Network on Chips that have variable faulty blocks with runtime suggesting an online error detection mechanism with adaptive routing algorithm that bypasses faulty components dynamically and the router architecture uses additional diagonal state indications for the reliable network on chip (NoC) operation. In NoC, the permanently faulty routers are disconnected to enable high runtime throughput as data packets are not lost due to self-loopback mechanism. The proposed proficient matrix codes use the capabilities of decimal matrix code technique with minimum check bits for maximum error correction capability. The proposed code is compared with existing codes such as decimal matrix codes, modified decimal matrix codes and parity matrix codes. The codes are developed in verilog hardware description language and simulated in the Xilinx ISE 14.5 tool. This proficient matrix code proves to be efficient for multiple adjacent error detection and correction with trade off in delay. Also 65% code rate is achieved with 22.73% less redundant bits that occupy less area by atleast 11.78%. The codes when used for increased data sizes like 8, 16, 32, and 64 bits, the power delay product decreased by atleast 1.74%.
Style APA, Harvard, Vancouver, ISO itp.
9

Reymarvelos M. Oros, Jonrick G. Escol, Ritz Crizelle M. Mabilen, Cyril Grace U. Rapista, Nin Christian G. Hufana i Irish S. Tambis. "Progressive collapse and soil stress analyses of Manupali steel truss bridge in Lantapan, Bukidnon under hydraulic and traffic threats". World Journal of Advanced Research and Reviews 18, nr 1 (30.04.2023): 738–57. http://dx.doi.org/10.30574/wjarr.2023.18.1.0634.

Pełny tekst źródła
Streszczenie:
Bridges designed to comply with current design codes may not provide enough strength to arrest a possible local failure following an abnormal event, thus leading to a progressive collapse. One may employ different approaches that vary according to linearity and dynamicity to analyze the potential of a structure to progressive collapse. Together with a prior risk assessment, this study analyzed the susceptibility of the Manupali steel truss bridge to progressive collapse using an adapted nonlinear static approach and assessed the bridge’s pile foundation capacity concerning changes in the imposed stresses caused by the dynamic effects of progressive collapse. Using P-Delta analysis in STAAD.Pro CONNECT Edition V22, this study determined that under its self-weight, the Manupali steel truss bridge is susceptible to progressive collapse, i.e., it is fracture critical. Nonetheless, being such does not mean the bridge is inherently unsafe, only that it lacks redundancy in the design. Furthermore, this study found that a collapse does not significantly detrimentally affect the foundation system except when the dynamic effect is so tremendous. With the results, this study recommends that the design of bridges should consider abnormal load cases to mitigate progressive collapse.
Style APA, Harvard, Vancouver, ISO itp.
10

El Allati, A., H. Amellal i A. Meslouhi. "Improvement of quantum correlations by repetitive quantum error correction". International Journal of Quantum Information 17, nr 05 (sierpień 2019): 1950044. http://dx.doi.org/10.1142/s0219749919500448.

Pełny tekst źródła
Streszczenie:
A quantum error-correcting code is established in entangled coherent states (CSs) with Markovian and non-Markovian environments. However, the dynamic behavior of these optical states is discussed in terms of quantum correlation measurements, entanglement and discord. By using the correcting codes, these correlations can be as robust as possible against environmental effects. As the number of redundant CSs increases due to the repetitive error correction, the probabilities of success also increase significantly. Based on different optical field parameters, the discord can withstand more than an entanglement. Furthermore, the behavior of quantum discord under decoherence may exhibit sudden death and sudden birth phenomena as functions of dimensionless parameters.
Style APA, Harvard, Vancouver, ISO itp.
11

Ferraioli, Massimiliano. "Behaviour Factor of Ductile Code-Designed Reinforced Concrete Frames". Advances in Civil Engineering 2021 (28.02.2021): 1–18. http://dx.doi.org/10.1155/2021/6666687.

Pełny tekst źródła
Streszczenie:
The current generation of seismic design codes is based on a linear elastic force-based approach that includes the nonlinear response of the structure implicitly through a response modification factor (named reduction factor R in American codes or behaviour factor q in European codes). However, the use of a prescribed behaviour factor that is constant for a given structural system may fail in providing structures with the same risk level. In this paper, the behaviour factor of reinforced concrete frame structures is estimated by means of nonlinear static (pushover) and nonlinear incremental dynamic analyses. For this purpose, regular reinforced concrete frames of three, five, seven, and nine storeys designed for high ductility class according to the European and Italian seismic codes are investigated, and realistic input ground motions are selected based on the design spectra. Verified analysis tools and refined structural models are used for nonlinear analysis. Overstrength, redundancy, and ductility response modification factors are estimated, and the effects of some parameters influencing the behaviour factor, including the number of bays and the number of storeys, are evaluated. The results are finally compared with those obtained from a previous paper for steel moment-resisting frames with the same geometry. According to the analysis results, the behaviour factors in the case of pushover analysis are significantly higher than those obtained in the case of nonlinear response history analysis. Thus, according to the pushover analysis, the behaviour factor provided by European and Italian standards seems highly conservative. On the contrary, the more refined nonlinear dynamic analysis shows that the code-prescribed value may be slightly nonconservative for middle-high-rise frame structures due to unfavourable premature collapse mechanisms based on column plastic hinging at the first storey. Thus, some modifications are desirable in local ductility criteria and/or structural detailing of high ductility columns to implicitly ensure that the recommended value of the behaviour factor is conservative.
Style APA, Harvard, Vancouver, ISO itp.
12

Malhotra, Jyoti, i Jagdish Bakal. "A Deterministic Eviction Model for Removing Redundancies in Video Corpus". International Journal of Electrical and Computer Engineering (IJECE) 8, nr 5 (1.10.2018): 3221. http://dx.doi.org/10.11591/ijece.v8i5.pp3221-3231.

Pełny tekst źródła
Streszczenie:
<span>The traditional storage approaches are being challenged by huge data volumes. In multimedia content, every file does not necessarily get tagged as an exact duplicate; rather they are prone to editing and resulting in similar copies of the same file. This paper proposes the similarity-based deduplication approach to evict similar duplicates from the archive storage, which compares the samples of binary hashes to identify the duplicates. This eviction is done by initially dividing the query video into dynamic key frames based on the video length. Binary hash codes of these frames are then compared with existing key frames to identify the differences. The similarity score is determined based on these differences, which decides the eradication strategy of duplicate copy. Duplicate elimination goes through two levels, namely removal of exact duplicates and similar duplicates. The proposed approach has shortened the comparison window by comparing only the candidate hash codes based on the dynamic key frames and aims the accurate lossless duplicate removals. The presented work is executed and tested on the produced synthetic video dataset. Results show the reduction in redundant data and increase in the storage space. Binary hashes and similarity scores contributed to achieving good deduplication ratio and overall performance.</span>
Style APA, Harvard, Vancouver, ISO itp.
13

Xiao, Chuqiao, Yefeng Xia, Qian Zhang, Xueqing Gong i Liyan Zhu. "CBase-EC: Achieving Optimal Throughput-Storage Efficiency Trade-Off Using Erasure Codes". Electronics 10, nr 2 (8.01.2021): 126. http://dx.doi.org/10.3390/electronics10020126.

Pełny tekst źródła
Streszczenie:
Many distributed database systems that guarantee high concurrency and scalability adopt read-write separation architecture. Simultaneously, these systems need to store massive amounts of data daily, requiring different mechanisms for storing and accessing data, such as hot and cold data access strategies. Unlike distributed storage systems, the distributed database splits a table into sub-tables or shards, and the request frequency of each sub-table is not the same within a specific time. Therefore, it is not only necessary to design hot-to-cold approaches to reduce storage overhead, but also cold-to-hot methods to ensure high concurrency of those systems. We present a new redundant strategy named CBase-EC, using erasure codes to trade the performances of transaction processing and storage efficiency for CBase database systems developed for financial scenarios of the Bank. Two algorithms are proposed: the hot-cold tablets (shards) recognition algorithm and the hot-cold dynamic conversion algorithm. Then we adopt two optimization approaches to improve CBase-EC performance. In the experiment, we compare CBase-EC with three-replicas in CBase. The experimental results show that although the transaction processing performance declined by no more than 6%, the storage efficiency increased by 18.4%.
Style APA, Harvard, Vancouver, ISO itp.
14

Xiao, Chuqiao, Yefeng Xia, Qian Zhang, Xueqing Gong i Liyan Zhu. "CBase-EC: Achieving Optimal Throughput-Storage Efficiency Trade-Off Using Erasure Codes". Electronics 10, nr 2 (8.01.2021): 126. http://dx.doi.org/10.3390/electronics10020126.

Pełny tekst źródła
Streszczenie:
Many distributed database systems that guarantee high concurrency and scalability adopt read-write separation architecture. Simultaneously, these systems need to store massive amounts of data daily, requiring different mechanisms for storing and accessing data, such as hot and cold data access strategies. Unlike distributed storage systems, the distributed database splits a table into sub-tables or shards, and the request frequency of each sub-table is not the same within a specific time. Therefore, it is not only necessary to design hot-to-cold approaches to reduce storage overhead, but also cold-to-hot methods to ensure high concurrency of those systems. We present a new redundant strategy named CBase-EC, using erasure codes to trade the performances of transaction processing and storage efficiency for CBase database systems developed for financial scenarios of the Bank. Two algorithms are proposed: the hot-cold tablets (shards) recognition algorithm and the hot-cold dynamic conversion algorithm. Then we adopt two optimization approaches to improve CBase-EC performance. In the experiment, we compare CBase-EC with three-replicas in CBase. The experimental results show that although the transaction processing performance declined by no more than 6%, the storage efficiency increased by 18.4%.
Style APA, Harvard, Vancouver, ISO itp.
15

Postoutenko, Kirill. "Keeping the Spirit in the Bottle: On Pathological Reduction of Information in Totalitarianism". Information 14, nr 1 (30.12.2022): 24. http://dx.doi.org/10.3390/info14010024.

Pełny tekst źródła
Streszczenie:
This article begins with disputing the teleologically charged notion of unstoppable information growth, pointing at the alternation of informational contraction and expansion in open dynamic systems. Narrowing the focus, it turns to the 20th century totalitarian systems as particularly paradoxical informational environments: Being less capable of processing information than their democratic counterparts and therefore more vulnerable to overloads, they are particularly prone to suppressing informational transmission in some areas, codes and media. Dilution and conflation are singled out as the most common ways of lessening the informational value of communication in totalitarian societies. Whereas the first greatly increases the ratios of signs to messages and messages to interactions, causing redundancy and semantic inflation, the second rolls back preexisting functional differentiations (person vs. social role, sender vs. message, message vs. information etc.) within societies and their communicative system. It is argued that both attempts at semantic impoverishment of public communication in totalitarianism lead to the pathological states, failing to reduce the overall amount of information within the systems in question and precipitating the very informational explosions they were designed to prevent.
Style APA, Harvard, Vancouver, ISO itp.
16

Mirtahery, M., i Zoghi M. Abbasi. "On the Analysis and Design of Steel Structure to Mitigate Progressive Collapse". Advanced Materials Research 378-379 (październik 2011): 775–79. http://dx.doi.org/10.4028/www.scientific.net/amr.378-379.775.

Pełny tekst źródła
Streszczenie:
Since Ronan Point tower local collapse in UK in 1968, progressive collapse phenomenon in structures attracted more attention for civil engineers all over the world so there were no useful researches and manual codes related to progressive collapse designing before. Progressive collapse occurs when loading pattern, boundary condition and resisting path changed, so critical elements undergo excessive unpredicted loading. We cannot omit reason of collapse as well as prevention of distribution of it that cause progressive collapse. Also, we cannot predict exact location of collapse beginning, so we should generalized design guides to whole or part of structures elements based on risk analyzing. Also we can use load carrying element removal scenario for critical elements. To prevent progressive collapse, structural systems require to having a well-distributed, redundant lateral load resisting system and ductile connections capable of undergoing large inelastic rotations without failing. There are some new guides and criteria for elements and connections to be designed to resist progressive collapse. Depends on required accuracy, importance of the buildings and acceptable risk level, the analysis methodologies ranged from linear to nonlinear with static and dynamic approaches. In this paper, codes and researches recommendations to resist progressive collapse for steel structures are presented, classified and compared. Also, applicable design methods based on codes and some retrofitting methods are summarized.
Style APA, Harvard, Vancouver, ISO itp.
17

Chandrasekaran, Jeyamala, i S. J. Thiruvengadam. "Ensemble of Chaotic and Naive Approaches for Performance Enhancement in Video Encryption". Scientific World Journal 2015 (2015): 1–11. http://dx.doi.org/10.1155/2015/458272.

Pełny tekst źródła
Streszczenie:
Owing to the growth of high performance network technologies, multimedia applications over the Internet are increasing exponentially. Applications like video conferencing, video-on-demand, and pay-per-view depend upon encryption algorithms for providing confidentiality. Video communication is characterized by distinct features such as large volume, high redundancy between adjacent frames, video codec compliance, syntax compliance, and application specific requirements. Naive approaches for video encryption encrypt the entire video stream with conventional text based cryptographic algorithms. Although naive approaches are the most secure for video encryption, the computational cost associated with them is very high. This research work aims at enhancing the speed of naive approaches through chaos based S-box design. Chaotic equations are popularly known for randomness, extreme sensitivity to initial conditions, and ergodicity. The proposed methodology employs two-dimensional discrete Henon map for (i) generation of dynamic and key-dependent S-box that could be integrated with symmetric algorithms like Blowfish and Data Encryption Standard (DES) and (ii) generation of one-time keys for simple substitution ciphers. The proposed design is tested for randomness, nonlinearity, avalanche effect, bit independence criterion, and key sensitivity. Experimental results confirm that chaos based S-box design and key generation significantly reduce the computational cost of video encryption with no compromise in security.
Style APA, Harvard, Vancouver, ISO itp.
18

Ruan, Xiaofeng, Yufan Liu, Bing Li, Chunfeng Yuan i Weiming Hu. "DPFPS: Dynamic and Progressive Filter Pruning for Compressing Convolutional Neural Networks from Scratch". Proceedings of the AAAI Conference on Artificial Intelligence 35, nr 3 (18.05.2021): 2495–503. http://dx.doi.org/10.1609/aaai.v35i3.16351.

Pełny tekst źródła
Streszczenie:
Filter pruning is a commonly used method for compressing Convolutional Neural Networks (ConvNets), due to its friendly hardware supporting and flexibility. However, existing methods mostly need a cumbersome procedure, which brings many extra hyper-parameters and training epochs. This is because only using sparsity and pruning stages cannot obtain a satisfying performance. Besides, many works do not consider the difference of pruning ratio across different layers. To overcome these limitations, we propose a novel dynamic and progressive filter pruning (DPFPS) scheme that directly learns a structured sparsity network from Scratch. In particular, DPFPS imposes a new structured sparsity-inducing regularization specifically upon the expected pruning parameters in a dynamic sparsity manner. The dynamic sparsity scheme determines sparsity allocation ratios of different layers and a Taylor series based channel sensitivity criteria is presented to identify the expected pruning parameters. Moreover, we increase the structured sparsity-inducing penalty in a progressive manner. This helps the model to be sparse gradually instead of forcing the model to be sparse at the beginning. Our method solves the pruning ratio based optimization problem by an iterative soft-thresholding algorithm (ISTA) with dynamic sparsity. At the end of the training, we only need to remove the redundant parameters without other stages, such as fine-tuning. Extensive experimental results show that the proposed method is competitive with 11 state-of-the-art methods on both small-scale and large-scale datasets (i.e., CIFAR and ImageNet). Specifically, on ImageNet, we achieve a 44.97% pruning ratio of FLOPs by compressing ResNet-101, even with an increase of 0.12% Top-5 accuracy. Our pruned models and codes are released at https://github.com/taoxvzi/DPFPS.
Style APA, Harvard, Vancouver, ISO itp.
19

Briseghella, Bruno, Fuyun Huang i Gabriele Fiorentino. "SEISMIC BEHAVIOUR OF NOVEL INTEGRAL ABUTMENT BRIDGES". NED University Journal of Research 1, Special Issue on First SACEE'19 (1.01.2019): 1–20. http://dx.doi.org/10.35453/nedjr-stmech-2019-0001.

Pełny tekst źródła
Streszczenie:
Integral abutment bridges (IABs) are becoming rather common due to the durability problems of bearings and expansion joints. Monolithic connections between the deck and sub-structure allow, on one side, to increase the structure redundancy and reduce the maintenance costs. However, from the other side, soil-structure effects are also introduced due to the interactions between the abutment and the backfill and between the pile and soil induced by thermal variations, long-term effects (creep and shrinkage) and dynamic loads, such as earthquakes. Several authors have investigated the soil-structure interaction for IABs both theoretically and experimentally, but there is still a lack of common line guidelines and codes. After a literature review of the main studies regarding the seismic response of IABs, this paper introduces some recent contributions given by investigators in this field. In particular, the following topics are discussed: (a) an experimental study on an innovative deck to pier/abutment joint; (b) the possibility of using prestressed concrete or ultra-high performance piles in IABs; (c) a pile isolation technique based on a pre-hole filled with damping materials; and (d) a research project supported by European Union inside the Horizon 2020 SERA project on the seismic behaviour of novel integral abutment bridges. The paper clearly demonstrates the potential applications of the proposed technologies for IABs built in seismic zones.
Style APA, Harvard, Vancouver, ISO itp.
20

Lerro, Angelo, Alberto Brandl, Manuela Battipede i Piero Gili. "Preliminary Design of a Model-Free Synthetic Sensor for Aerodynamic Angle Estimation for Commercial Aviation". Sensors 19, nr 23 (23.11.2019): 5133. http://dx.doi.org/10.3390/s19235133.

Pełny tekst źródła
Streszczenie:
Heterogeneity of the small aircraft category (e.g., small air transport (SAT), urban air mobility (UAM), unmanned aircraft system (UAS)), modern avionic solution (e.g., fly-by-wire (FBW)) and reduced aircraft (A/C) size require more compact, integrated, digital and modular air data system (ADS) able to measure data from the external environment. The MIDAS project, funded in the frame of the Clean Sky 2 program, aims to satisfy those recent requirements with an ADS certified for commercial applications. The main pillar lays on a smart fusion between COTS solutions and analytical sensors (patented technology) for the identification of the aerodynamic angles. The identification involves both flight dynamic relationships and data-driven state observer(s) based on neural techniques, which are deterministic once the training is completed. As this project will bring analytical sensors on board of civil aircraft as part of a redundant system for the very first time, design activities documented in this work have a particular focus on airworthiness certification aspects. At this maturity level, simulated data are used, real flight test data will be used in the next stages. Data collection is described both for the training and test aspects. Training maneuvers are defined aiming to excite all dynamic modes, whereas test maneuvers are collected aiming to validate results independently from the training set and all autopilot configurations. Results demonstrate that an alternate solution is possible enabling significant savings in terms of computational effort and lines of codes but they show, at the same time, that a better training strategy may be beneficial to cope with the new neural network architecture.
Style APA, Harvard, Vancouver, ISO itp.
21

DENG, LIANG, HANLI BAI, FANG WANG i QINGXIN XU. "CPU/GPU COMPUTING FOR AN IMPLICIT MULTI-BLOCK COMPRESSIBLE NAVIER-STOKES SOLVER ON HETEROGENEOUS PLATFORM". International Journal of Modern Physics: Conference Series 42 (styczeń 2016): 1660163. http://dx.doi.org/10.1142/s2010194516601630.

Pełny tekst źródła
Streszczenie:
CPU/GPU computing allows scientists to tremendously accelerate their numerical codes. In this paper, we port and optimize a double precision alternating direction implicit (ADI) solver for three-dimensional compressible Navier-Stokes equations from our in-house Computational Fluid Dynamics (CFD) software on heterogeneous platform. First, we implement a full GPU version of the ADI solver to remove a lot of redundant data transfers between CPU and GPU, and then design two fine-grain schemes, namely “one-thread-one-point” and “one-thread-one-line”, to maximize the performance. Second, we present a dual-level parallelization scheme using the CPU/GPU collaborative model to exploit the computational resources of both multi-core CPUs and many-core GPUs within the heterogeneous platform. Finally, considering the fact that memory on a single node becomes inadequate when the simulation size grows, we present a tri-level hybrid programming pattern MPI-OpenMP-CUDA that merges fine-grain parallelism using OpenMP and CUDA threads with coarse-grain parallelism using MPI for inter-node communication. We also propose a strategy to overlap the computation with communication using the advanced features of CUDA and MPI programming. We obtain speedups of 6.0 for the ADI solver on one Tesla M2050 GPU in contrast to two Xeon X5670 CPUs. Scalability tests show that our implementation can offer significant performance improvement on heterogeneous platform.
Style APA, Harvard, Vancouver, ISO itp.
22

Tchernykh, Andrei, Mikhail Babenko, Arutyun Avetisyan i Alexander Yu Drozdov. "En-AR-PRNS: Entropy-Based Reliability for Configurable and Scalable Distributed Storage Systems". Mathematics 10, nr 1 (27.12.2021): 84. http://dx.doi.org/10.3390/math10010084.

Pełny tekst źródła
Streszczenie:
Storage-as-a-service offers cost savings, convenience, mobility, scalability, redundant locations with a backup solution, on-demand with just-in-time capacity, syncing and updating, etc. While this type of cloud service has opened many opportunities, there are important considerations. When one uses a cloud provider, their data are no longer on their controllable local storage. Thus, there are the risks of compromised confidentiality and integrity, lack of availability, and technical failures that are difficult to predict in advance. The contribution of this paper can be summarized as follows: (1) We propose a novel mechanism, En-AR-PRNS, for improving reliability in the configurable, scalable, reliable, and secure distribution of data storage that can be incorporated along with storage-as-a-service applications. (2) We introduce a new error correction method based on the entropy (En) paradigm to correct hardware and software malfunctions, integrity violation, malicious intrusions, unexpected and unauthorized data modifications, etc., applying a polynomial residue number system (PRNS). (3) We use the concept of an approximation of the rank (AR) of a polynomial to reduce the computational complexity of the decoding. En-AR-PRNS combines a secret sharing scheme and error correction codes with an improved multiple failure detection/recovery mechanism. (4) We provide a theoretical analysis supporting the dynamic storage configuration to deal with varied user preferences and storage properties to ensure high-quality solutions in a non-stationary environment. (5) We discuss approaches to efficiently exploit parallel processing for security and reliability optimization. (6) We demonstrate that the reliability of En-AR-PRNS is up to 6.2 times higher than that of the classic PRNS.
Style APA, Harvard, Vancouver, ISO itp.
23

Shmeleva, Svetlana A. "The impact of big data on decision-making on business support measures during the COVID-19 pandemic: The case of St. Petersburg". Vestnik Tomskogo gosudarstvennogo universiteta, nr 482 (2023): 5–17. http://dx.doi.org/10.17223/15617793/482/1.

Pełny tekst źródła
Streszczenie:
This article examines the use of big data in the decision-making process on measures to support small and medium-sized businesses in St. Petersburg during the COVID-19 pandemic. The theoretical novelty of this study lies in the demonstration of the use of big data to combat the pandemic and its consequences at the regional level. The research issue is considered in the context of introducing QR codes for entrepreneurs in St. Petersburg in order to control the requirements of safe activities during the pandemic. St. Petersburg was chosen as the region under study, since Moscow is closely connected with the federal government and does not fully reflect the regional peculiarities of the fight against the pandemic, at least because of the redundancy of resources in the capital. In turn, other regions of Russia are not as technologically advanced as St. Petersburg to demonstrate the use of big data during the COVID-19 pandemic. To determine the role of COVID-19 in accelerating the introduction of big data into the political process, I use the multiple streams framework in conjunction with the model of the political cycle. To study the very process of using big data, I focus on the actors in this process, their interests and values, namely, “data analysts” and “decision makers”. Thus, my model combines a case study from the point of view of a dynamic process with causal relationships and from the point of view of the actors involved in this process. To analyse the case, I used the method of included observation, which implies participation in several meetings on the development of measures to support enterprises, as well as the study of documents - resolutions of the Government of St. Petersburg, internal accounting documents and official websites. As a result, the case under review appears to be a clear illustration of a regional initiative in the fight against the COVID-19 pandemic and how big data has been used to overcome the economic impact of the pandemic at the regional level. The pandemic has not only become a “window of opportunity” for regional authorities to pursue their own policies in the fight against COVID-19, but also made it possible for middle-level actors to take the initiative and promote their own decision on the regional agenda. The case of St. Petersburg demonstrates that the process of digitalization using big data occurs not only from the top down through the implementation of the national strategy and not only from the bottom up through the integration of private digital services. Mid-level structures also influence the digitalization process through the promotion of their products and services, using “windows of opportunity”, such as the COVID-19 pandemic.
Style APA, Harvard, Vancouver, ISO itp.
24

Sampson, Tony. "Senders, Receivers and Deceivers: How Liar Codes Put Noise Back on the Diagram of Transmission". M/C Journal 9, nr 1 (1.03.2006). http://dx.doi.org/10.5204/mcj.2583.

Pełny tekst źródła
Streszczenie:
In the half-century since Shannon invented information theory… engineers have come up with brilliant ways of boiling redundancy out of information… This lets it be transmitted twice as fast (Bill Gates: 33). Shannon’s Code Puts an End to Noise The digital machine is often presented as the perfect medium for the efficient transmission of coded messages: an ever-improving machine, in which coded information travels near to the-speed-of-light. Integrated into a global network of communication, transmission is assumed to be friction-free – everything and everybody are just a click away. Indeed, the old problem of signal interference is subdued by the magnum opus of communication engineering – Shannon’s noiseless channel – a cure for the undesirable uncertainties of message sending (Shannon and Weaver 19). For that reason alone, the digitally enhanced fidelity of Shannon’s digital code, not only heralds a new age of communication, but also marks the end of the problem of noise. In effect, his mathematical theory of communication, establishes a highly effective coding mechanism that travels from sender to receiver, overcoming geographic constraint and the deafening raw of the analogue milieu. This makes the theory itself the substratum of the digital communication utopia, since Shannon’s conquest of noise has solved the reliability problem of code, allowing us to focus on the rapidity and fecundity of our messages. However, despite the ingenuity of the noiseless channel, its subsequent rapid expansion into a vast network of machines means that both senders and receivers pay a price for Shannon’s brilliance. The speed and boundless reproducibility of digital code outperforms our physical capacity to observe it. In this way, transmission works behind the scenes, becoming increasingly independent of the human gaze. Even so, we are assured that we will not be overwhelmed by code; a new digital order has purportedly emerged. As follows, network innovators provide us with robotic codes that work benevolently on our behalf, exploring a seemingly random universe of connection. These intelligent codes search the tangled webs that constitute digital communication networks, autonomously in step with our fleeting transactions and data desires. We can sleep safely at night… this is The Road Ahead. But of course, as we now know, the ideal system for perpetual communication has also turned out to be the perfect medium for the codes designed to destroy it (Gordon). Instead of efficiently taking care of our transmission needs, the flow of code has been interrupted by the relational interactions of a machinic assemblage (Deleuze and Guattari). This is a vast assemblage populated by both human and non-human actors. Its evolution has not followed a predictable path determined by the innovations of the science of code, but instead responds to the complex interactions and interconnectedness of the network environment. In this way, the binary switches of the robotic code have occasionally flipped over from true to false – from the munificent to the malevolent function. The interruption seems to be relatively new, but the human-computer assemblage has a long history of the production of what I term liar codes. They follow on from Gödel and Turing’s realisation of the incompleteness and undecidability of self-referential systems of logic in the 1930s. In the following decades, von Neumann’s ideas on self-reproducing code provided early programmers with the means to play coded games of life. Thirty years later and researchers discovered how unstable a network would become when a similarly coded evolutive got out of control (Shoch and Hupp, Cohen). By 1990, the digital worm had turned. Morris’s code famously ‘crashed’ the Internet. The liar code had escaped the research lab and entered the wild world of the network. Nevertheless, despite what appears to be the uncontrollable evolution of code, it is the assemblage itself that makes a difference. Many liar codes have since followed on from the games, experiments and accidents of the early human-computer assemblage. Some are simply mischievous pranks designed to take up space by making copies of themselves, while others conceal a deeper, sinister pre-programmed function of data piracy (Bey 401-434) and viral hijack. The former spread out across a network, spewing out fairly innocuous alerts, whereas the latter steel passwords, gaining access to safe places, capturing navigation tools, and redirecting our attention to the dark side of the global village. In addition to the deluge of spam, viruses and worms, liar code arrives hidden in Trojan programs. Like Russian dolls, code slips into email inboxes. Simple viral sentences repeatedly trick us into opening these programs and spreading the infection. By saying “I love you” code becomes a recursive deceiver, concealing the true intentions of the virus writer, while ensuring that the victim plays a crucial role in the propagation of the liar. Noise Is Dead – Long Live the New Noise! More recently Liar codes have been cunningly understood as contemporary instances of cultural noise – the other of order (Parikka). However, this does not mean that a solution can be found in the universality of Shannon’s linear diagram – this is an altogether different engineering problem. In principle, Shannon’s noise was more readily apprehended. It existed primarily at a technical level (signal noise), a problem solved by the incorporation of noise into a technical code (redundancy). Contrariwise, liar codes go beyond the signal/noise ratio of the content of a message. They are environmental absurdities and anomalies that resonate outside the technical layer into the cultural milieu of the human-computer assemblage. The new noise is produced by the hissing background distortion of the network, which relentlessly drives communication to a far-from-equilibrial state. Along these lines, the production of what appears to be a surplus of code is subject to the behaviour and functioning of a vast and vulnerable topology of human and non-human machinic interaction. Is the Solution to Be Found in a Clash of Codes? In an attempt to banish the network pirates and their growing phylum of liar codes there has been a mobilisation of antivirus technologies. Netizens have been drafted in to operate the malware blockers, set up firewalls or dig the electronic trenches. But these desperate tactics appeal only to those who believe that they can reverse the drift towards instability, and return a sense of order to the network. In reality, evidence of the effectiveness of these counter measures is negligible. Despite efforts to lower the frequency of attacks, the liar code keeps seeping in. Indeed, the disorder from which the new noise emerges is quite unlike the high entropic problem encountered by Shannon. Like this, digital anomalies are not simply undesirable, random distortions, repaired by coded negentropy. On the contrary, the liar is a calculated act of violence, but this is an action that emerges from a collective, war-like assemblage. Therefore, significantly, it is not the code, but the relational interactions that evolve. For this reason, it is not simply the liar codes that threaten the stability of transmission, but the opening-up of a networked medium that captures messages, turning them into an expression of the unknown of order. Code no longer conveys a message through a channel. Not at all, it is the assemblage itself that anarchically converts the message into an altogether different form of expression. The liar is a rhizome, not a root!! (See figure 1.) A Network Diagram of Senders, Receivers and Deceivers Rhizomatic liar code introduces an anarchic scrambling of the communication model. Ad nauseam, antivirus researchers bemoan the problem of the liar code, but their code-determined defence system has seemingly failed to tell apart the senders, receivers and deceivers. Their tactics cannot sidestep the Gödelian paradox. Interestingly, current research into complex network topologies, particularly the Internet and the Web (Barabási), appears to not only support this gloomy conclusion, but confirms that the problem extends beyond code to the dynamic formation of the network itself. In this way, complex network theory may help us to understand how the human-computer assemblage comes together in the production of viral anomalies. Indeed, the digital network is not, as we may think, a random universe of free arbitrary association. It does not conform to the principles leading to inevitable equilibrium (an averaging out of connectivity). It is instead, an increasingly auto-organised and undemocratic tangle of nodes and links in which a few highly connected aristocratic clusters form alongside many isolated regions. In this far-from-random milieu, the flow of code is not determined by the linear transmission of messages between senders and receivers, or for that matter is it guided by an algorithmic evolutive. On the contrary, while aristocratic networks provide a robust means of holding an assemblage together, their topological behaviour also makes them highly susceptible to viral epidemics. Liar codes easily spread through clusters formed out of preferential linkage, and a desire for exclusive, network alliances between humans and non-humans. From a remote location, a single viral code can promiscuously infect a highly connected population of nodes (Pastor-Satorras & Vespignani). This is the perfect environment for the actions of deceivers and their liar codes. On reflection, a revised diagram of transmission, which tackles head on the viral anomalies of the human-computer assemblage, would perhaps be unworkable. This is consistent with the problem of liar codes, and the resulting collapse of trustworthy transmission. The diagram would ideally need to factor in the anarchic, scrambled lines of communication (see figure 1), as well as the complex topological relations between node and link. Such a diagram would also need to trace significant topological behaviours and functions alongside the malfunctions of codes, coders and the sharing of codes over a network. It is this significant topological intensity of the human-computer assemblage that shifts the contemporary debate on noise away from Shannon’s model towards a complex, non-linear and relational interaction. In this sense, the diagram moves closer to the rhizomatic notion of a network (Deleuze and Guattari 9-10). Not so much a model of transmission, rather a model of viral transduction. References Barabási, Albert-László. Linked: The New Science of Networks. Cambridge, Mass: Perseus, 2002. Bey, Hakim in Ludlow, Peter (ed). Crypto Anarchy, Cyberstates and Pirate Utopias. Cambridge, Mass: MIT, 2001. Cohen, F. “Computer Viruses: Theory and Experiments.” Computers & Security 6 (1987): 22-35. Deleuze, Gilles, and Felix Guattari. A Thousand Plateaus: Capitalism and Schizophrenia. Trans. by Brian Massumi. London: The Athlone Press, 1987. Deleuze, Gilles, and Felix Guattari. Anti-Oedipus. London: The Athlone Press, 1984. Gates, Bill. The Road Ahead. London: Penguin, 1995/1996. Gordon, Sarah. “Technologically Enabled Crime: Shifting Paradigms for the Year 2000.” Computers and Security 1995. (5 Dec. 2005) http://www.research.ibm.com/antivirus/SciPapers/Gordon/Crime.html>. Latour, Bruno. Science in Action: How to Follow Scientists and Engineers through Society. Harvard University Press, 1988. Parikka, Jussi. “Viral Noise and the (Dis)Order of the Digital Culture.” M/C Journal 7.6 (2005). 5 Dec. 2005 http://journal.media-culture.org.au/0501/05-parikka.php>. Shannon, Claude, and Warren Weaver. The Mathematical Theory of Communication. University of Illinois Press, 1949/1998. Shoch, John F, and Jon A Hupp. “The ‘Worm’ Programs – Early Experience with a Distributed Computation.” Communications of the ACM 25.3 (March 1982): 172–180. 5 Dec. 2005. Pastor-Satorras, Romualdo, and Alessandro Vespignani. “Epidemic Spreading in Scale-Free Networks.” Physical Review Letters 86 (2001). Von Neumann, John, and Arthur Burks. Theory of Self-Reproducing Automata. University of Illinois Press, 1966. Citation reference for this article MLA Style Sampson, Tony. "Senders, Receivers and Deceivers: How Liar Codes Put Noise Back on the Diagram of Transmission." M/C Journal 9.1 (2006). echo date('d M. Y'); ?> <http://journal.media-culture.org.au/0603/03-sampson.php>. APA Style Sampson, T. (Mar. 2006) "Senders, Receivers and Deceivers: How Liar Codes Put Noise Back on the Diagram of Transmission," M/C Journal, 9(1). Retrieved echo date('d M. Y'); ?> from <http://journal.media-culture.org.au/0603/03-sampson.php>.
Style APA, Harvard, Vancouver, ISO itp.
25

Hu, Yuzhang, Wenhan Yang, Jiaying Liu i Zongming Guo. "Deep Inter Prediction with Error-Corrected Auto-Regressive Network for Video Coding". ACM Transactions on Multimedia Computing, Communications, and Applications, kwiecień 2022. http://dx.doi.org/10.1145/3528173.

Pełny tekst źródła
Streszczenie:
Modern codecs remove temporal redundancy of a video via inter prediction, i.e. searching previously coded frames for similar blocks and storing motion vectors to save bit-rates. However, existing codecs adopt block-level motion estimation, where a block is regressed by reference blocks linearly and is doomed to fail to deal with non-linear motions. In this paper, we generate virtual reference frames with previously reconstructed frames via deep networks to offer an additional candidate, which is not constrained to linear motion structure and further significantly improves coding efficiency. More specifically, we propose a novel deep Auto-Regressive Moving-Average (ARMA) model, Error-Corrected Auto-Regressive Network (ECAR-Net), equipped with the powers of the conventional statistic ARMA models and deep networks jointly for reference frame prediction. Similar to conventional ARMA models, the ECAR-Net consists of two stages: Auto-Regression (AR) stage and Error-Correction (EC) stage, where the first part predicts the signal at the current time-step based on previously reconstructed frames while the second one compensates for the output of the AR stage to obtain finer details. Different from the statistic AR models only focusing on short-term temporal dependency, the AR model of our ECAR-Net is further injected with the long-term dynamics mechanism, where long temporal information is utilized to help predict motions more accurately. Furthermore, ECAR-Net works in a configuration-adaptive way, i.e. using different dynamics and error definitions for the Low Delay B and Random Access configurations, which helps improve the adaptivity and generality in diverse coding scenarios. With the well-designed network, our method surpasses HEVC on average \(5.0\% \) and \(6.6\% \) BD-rate saving for the luma component under the Low Delay B and Random Access configurations and also obtains on average \(1.54\% \) BD-rate saving over VVC. Furthermore, ECAR-Net works in a configuration-adaptive way, i.e. using different dynamics and error definitions for the Low Delay B and Random Access configurations, which helps improve the adaptivity and generality in diverse coding scenarios.
Style APA, Harvard, Vancouver, ISO itp.
26

"Smooth Path Planning of Ackerman Chassis Robot based on Improved ant Colony Algorithm". International Journal of Circuits, Systems and Signal Processing 14 (20.07.2020). http://dx.doi.org/10.46300/9106.2020.14.49.

Pełny tekst źródła
Streszczenie:
In the domain of robotics and autonomous driving, the automatic path planning of vehicle collision-free motion is an essential task on the navigation level. It is found that the traditional path planning algorithm and the ployline path cannot fully meet the driving requirements of Ackerman chassis robot. In order to solve the autonomous navigation problem of Ackerman chassis mobile robot in structured environment, this paper presents a new improved algorithm. The method of configuration space can introduce the robot's own structural size parameters into the algorithm. Through convex polygon detection method, the local U-shaped area in the map is transformed into a closed area. The essence of these two strategies is to preprocess the map. The initial pheromone distribution is no longer globally uniform, but is distributed according to the terrain. The volatilization factor of pheromone is changed from static constant to dynamic one, which is combined with Poisson distribution law. This strategy makes the improved pheromone distribution law not only avoid the randomness and blindness in the initial stage of the algorithm, but also ensure the ant colony's exploration behavior and guiding role in the middle stage of the algorithm. Path smoothing is also a challenging task. This algorithm optimizes the path step by step by improving the evaluation function, removing redundant nodes and 2-turning algorithm. Thus, a collision free smooth path suitable for Ackerman robot is obtained. This paper combines a variety of algorithm improvement strategies, not only improving the performance of ant colony algorithm path exploration, but also planning a smooth curve path suitable rather than polyline for Ackerman mobile robot tracking. The algorithm is coded and simulated by MATLAB, and the feasibility and effectiveness of the algorithm are verified. This will provide an important basis for the subsequent algorithm migration and lay the foundation for the path tracking control of the Ackermann chassis robot.
Style APA, Harvard, Vancouver, ISO itp.
27

Solis, Randy Jay C. "Texting Love". M/C Journal 10, nr 1 (1.03.2007). http://dx.doi.org/10.5204/mcj.2600.

Pełny tekst źródła
Streszczenie:
The mobile phone found its way to the Philippines when the first generation of Global Systems for Mobile Communication or GSM handsets was introduced in the country in 1994. This GSM protocol eventually developed to introduce a faster and more efficient means of storing, manipulating, and transmitting data by allowing data to be translated into a series of ones and zeroes. Digital technology furthered the mobile phone’s potentials from being a mere “talking device on the move” (Leung and Wei 316) to a more dynamic participant in the new information age. The capacity to merge all forms of binary data enabled mobile phones to allow convergent services such as chatting, voice-mail, news updates, e-mailing, Internet browsing, and even the dissemination of image and audio files. Apart from the allure of the possibilities of digital communication, the mobile phone was also welcomed in the Philippines because of its convenience; it provided the country, especially the rural areas where telephones are unavailable or inaccessible, with a modern means of communication. A survey conducted by the Social Weather Station (SWS) in 2001 reveals the extent of the dissemination of this technology in the Philippines: “Out of the 15 million households in the Philippines, an estimated 2.5 million have a cellular phone, of which 2.3 million have text-messaging capacity. For the entire nation, text-messaging is available to 15% of all households in general, but it is available to 53% of ABC households in particular. Of the 2.3 million text-capable households in the nation, 800 thousand are in Metro Manila.” Of the 80 million Filipinos, there are now 22 million mobile phone owners in the country compared to only 6.7 million subscribed landlines (Lallana 1). Of the various digital applications of the mobile phone, text messaging is still considered to be the most exploited service in the Philippines. A voice call placed through the mobile phone would typically cost around six to seven pesos per minute while a text message costs a peso per message. Corollary, a typical Filipino now sends an average of ten messages every day, contributing to a daily traffic of over 300 million text messages (Pertierra 58). This has led to the popular notion of the Philippines as the “texting capital of the world” (Pertierra et al. 88). In Text-ing Selves, a study that examines the use of mobile phones in the country, Pertierra and other researchers argue that texting has made it possible to create new unsurveilled and unconventional human relationships. In one case cited in the book, for example, a male and a female texter met after an accidental exchange of text messages. Although initially they were very reserved and guarded, familiarity between the two was fostered greatly because the medium allowed for an anonymous and uncommitted communication. Eventually, they met and shortly after that, got engaged. A second instance involved a person who exchanged phone numbers with his friends to pursue strangers and win new friends by texting. He engaged in virtual or text-based “affairs” with women, which would later on result to actual physical sex. Another case examined was that of an 18-year old bisexual who met “textmates” by participating in interactive Text TV chatrooms. Although he eventually met up with individuals to have sex, he professed to use the Text TV mainly to create these virtual relationships with persons of the same sex. (Pertierra et al. 64-89) It is because of the considerable popularity of the medium and the possible repercussions of such curious relationships and interpersonal communication patterns that the phenomenon of mobile phone use, particularly that of texting, in the Philippines is worthy of systematic scrutiny. Thus, the purpose of this study is to examine the relational context being created through this wireless messaging system. An exploratory study, this research examines the contributions of the texting technology that allowed development of romantic relationships among its users. Ultimately, this paper aims to identify what makes texting a novel romantic device in the Philippines. The framework in the understanding of relationship development through texting incorporates Malcolm Parks’ theory of relationship life cycle and network (352). In his proposal, interpersonal relationships of all types are usually conceptualized as developing from the impersonal to the personal along a series of relatively specific dimensions: increases in interdependence, in the variety and intimacy of interaction, in interpersonal predictability and understanding, in the change toward more personalized ways of communicating and coordinating, in commitment, and in the convergence of the participants’ social networks. According to Parks (359-68), relationships move within the constructive character of communication that involves the interaction of the structure and content of communication between the participants. Thus, the researcher would like to identify the relationship between these seven factors of relationship development and the texting technology. This research identified the attributes of the texting technology along the seven dimensions of Park’s theory of relational development. Qualitative data was obtained and explored in the light of the concepts presented in the related literature, particularly the theoretical discourses of Paul Levinson and Raul Pertierra et al. A total of 43 respondents, 21 males and 22 females, were selected through purposive sampling to derive exploratory data through the in-depth interview method. Texting and Interdependence Unwritten Rule of Texting Respondents revealed that their relationships developed with their respective partners because texting made them more dependent on each other. “It became a habit” (Emmy). Partners texted each other as often as they could, until they have established themselves as regular textmates. One respondent’s day would also be influenced by his partner’s text message: “Kapag hindi siya nakakapagtext, nami-miss ko siya (If she doesn’t text, I miss her). Her simple ‘good morning’s’ can really help me start my day right.” At this level of the relationship, texters always had the compulsion to keep the communication constantly moving. One respondent attributed this to the “unwritten rule of texting.” Clara elaborated: You know there’s this unwritten rule in texing: once a person has texted you, you have to reply. If you don’t reply, the person will automatically think you ignored him or her on purpose. So you have to reply no matter what. Even when you really have nothing to say, you’re forced to come up with something or give your opinion just to keep the conversation going. Immediacy and Accessibility Some respondents exhibited interdependence by “reporting” or informing each other of the happenings in their individual lives. Arnel shared: Ang ilang pinakanatulong sa amin ng texting ay to inform each other kung saan na kami at kung anong pinagkakaabalahan namin at a specific time, especially kung hindi kami magkasama. (One of the greatest aid of texting in our relationship is that it enables us to inform each other about where we are and what we are doing at a specific time, especially if we are not together). He also added that texting allows them to organize their schedules as well as to logistically set meeting times or inform the other of one’s tardiness. Texting also allowed for the individuals in the relationship to influence each other’s thoughts, behaviors, and actions. “Kapag nagkukuwento siya kung anong nangyari sa kaniya tapos tingin ko mali, pinagsasabihan ko siya (If she tells me stories about what happened to her and then I see that there’s something wrong with it, I admonish her)” (Jesus). Jack summarized how the texting technology facilitated these indicators of interdependence between romantic partners: There’s a feeling of security that having a cellphone gives to a certain person, because you know that, more often than not, you can and will be reached by anyone, anywhere, anytime, and vice versa. So when I need comfort, or someone to listen, or I need to vent, or I need my boyfriend’s opinion, or I need his help in making a decision, it’s really relieving to know that he’s just a text or phone call away. These responses from the participants in a texting romantic relationship confirm Paul Levinson’s arguments of the mobile phone’s feature of accessibility. In the book Cellphone: The Story of the World’s Most Mobile Medium and How it has Transformed Everything! he mentions that the mobile phone technology, particularly texting, permits users to make instant, immediate and direct delivery of messages. He further explains that texting can be a romancing tool because before there was the mobile phone, people placing call through the telephone had to make sure that the persons they are asking out on a date are at home when the phone rings (Levinson 97). Texting and Depth: Privacy and Levinson’s Silence Texting also facilitated an efficient exchange of a variety of important, intimate, and personal topics and feelings for most of the respondents. A number of respondents even confessed that they could go as intimate as exchanging sexual messages with their partners. One respondent revealed that he could text his partner anything “kahit nga text sex pwede rin eh (even ‘sex text’ is allowed).” But mostly, the text exchanges consisted of intimate romantic feelings that one could not manage to say in person. Richard shared: “For example, through text we can say ‘I love you’ to each other. Aside from that, nasasabi ko rin yung mga problems na hindi ko masabi ng harapan (I could tell her about my problems that I could not say face-to-face).” Arnel, a homosexual, attributed this ease of transmitting intimate and personal topics and feelings to the texting technology’s unique feature of privacy. “Kasi wari bang nakakalikha ng pribadong espasyo yung screen ng phone mo na kahit na magkalayo kayo” (Because the mobile phone screen is able to create a private space that even if you are far from each other) physically, the virtual space created by that technology is apparent. Because no one can hear you say those things or no one else can read [them], assuming na hindi pinabasa sa ibang tao o hindi nakita (that it is not allowed to be read or seen by others) (Arnel). Arnel’s discussion of the private space that allows for intimate exchanges links up with Paul Levinson’s silence as one of the biggest benefit of the texting technology. Texting permits receivers to view their messages in private as opposed to having others in the environment hear and know about their particular communication or simply even just the fact that they are communicating (Levinson 112-14). Anonymity RJ would associate this capability to swap intimate information between partners to texting’s provision for anonymity. In texting, there is the element of anonymity, thus, you can feel more comfortable with sharing more intimate messages. As opposed to a face-to-face conversation wherein you would tend to hold back some feelings or thoughts because of fear of outright rejection. Personally, I consider that factor as a very important element in the development of our relationship. Because I am not really the aggressive-frank type of guy, I tend to hold back in telling her intimate things face to face. The feature of anonymity that the respondents mentioned seems to refer to one characteristic that Pertierra, et al. (91) outlined in their book. They wrote that communication through texting has also efficiently incorporated meaning, intention, and expressions allowing texters to say what is normally unsayable in face-to-face contexts. This clearly points to the comfort that the respondents identified when they’d share about intimate details like their exes and other information that a typical “non-aggressive-frank guy, who fears outright rejection,” would. Autonomy Perhaps an additional feature that might be closely related to privacy and anonymity is the autonomous nature of the texting technology. Homosexuals like Jetrin took advantage of this feature to facilitate unconventional same-sex affairs: “Unlike pagers, mobile phones are not monitored, therefore I can pretty much say what I want to the other person. I get to express myself more clearly and intimate[ly]”. Because of this absence of censorship, texters can confidently say “’I love you’ or ‘I want to throw you against the wall and make you feel like a cheap whore’ (Jetrin)” without having to concern themselves about a third-party processing their messages. Texting and Breadth Expressing Real and Virtual Emotions Because of these various constraints, respondents started to locate other avenues to communicate with their partners. Thus, the breadth of the relationship increased. Other means of communication that the respondents mentioned are face-to-face encounters, voice phone calls (either landline or mobile phone), e-mail, chat (YM, ICQ, Web cam, etc.), and even snail mail. However way they decided to extend their communication beyond texting, almost all of them declared that it is still texting that instigated this movement to another medium. One respondent said “Of course text ang taga-initiate (initiates) and then more ways [follow] after.” Although texting employs a dualistic nature of beneficial anonymity and uncertainty between exchanging partners, a number of respondents still express optimism about the texting technology’s capacity to bridge the gap between expressing real and virtual emotions. Some claimed that “even [in] text [there is] personality; smiling face, exclamation points, feelings are still communicated.” RG also expressed that “yung mga smileys nakakatulong sa pag-express ng emotions (smileys help in expressing emotions).” Jake added that “qualities like the smiley faces and sad faces you can make using the punctuation marks, etc. can really add warmth and depth to text messages.” Texting and Commitment Regularity Since most of the couples in a romantic relationship did not have the luxury of time to meet up in person or talk over the phone regularly, the frequency of texting became a distinct indication about their commitment to their relationships. “To commit is to be there for the person, 24/7. Texting helps in achieving that despite of the barriers in time and distance” (Von). Didith showed the other end of this phenomenon: “When he texted less and less in the course of the relationship, it made me doubt about … his commitment.” This regularity of texting also provided for strengthening the bond and connection between partners that ultimately “As we share more and more of our lives with each other, more trust develops…and the more trust you instill in each other, the more you expect the relationship to be stronger and more lasting” (Jack). Convenience and Affordability Some respondents pointed out texting’s convenient nature of linking partners who are rather separated by physical and geographical limits. Richard used texting to contact his partner “kasi malayo kami sa isa’t-isa, lalo na kapag umuuwi siya sa Bulacan. Texting ang pinakamadali, cheapest, and convenient way para makapag-communicate kami (because we are far from each other, especially if she goes home to Bulacan. Texting is the fastest, cheapest, and convenient way for us to communicate).” This “presence” that strengthens the commitment between partners, as suggested by most of the respondents, indicates the capacity of the mobile phone to transform into an extension of the human body and connect partners intimately. Texting, Predictability and Understanding Redundancy Some of the respondents agreed that it is the regularity of texting that enabled them to become more capable of understanding and predicting their partner’s feelings and behaviors. Tina articulated this: “Probably due to redundancy, one can predict how the other will react to certain statements.” Jake also expressed the same suggestion: Texting in our relationship has become a routine, actually. Texting has become like talking for us. And the more we text/talk, the more we get to know each other. Nagiging sanay na kami sa ugali at pag-iisip ng isa’t-isa (We become used to each other’s attitudes and thinking). So it’s inevitable for us to be able to predict one another’s reactions and thoughts to certain topics. Because we get to a point wherein we feel like we know each other so well, that when we are able to correctly predict a feeling or behavior, we find it amusing. In the end, the regularity of the interaction brought about learning. “I’ve learned much of her from texting. I knew that she becomes disappointed with certain things or she really appreciates it when I do certain things. It became easier for me to learn about her thoughts, feelings, etc.” (RJ) Managing of Contextual Cues A lot of the respondents mentioned that their understanding and predictability of their partners was also heightened by the context of the construction of the messages that were being transmitted. “If there are smiley faces, then we’re okay. No cute expressions mean we’re in a serious mode” (Didith). “Either an added word, a missing word, or a word out of place in the message gives me the clue” (Jake). The textual structure and signs became instrumental into the translation of how to perceive another’s feelings or reactions. “For example, pag normal, sweet words yung nasa text, may mga ‘I love you,’ mga ganon. Pero kung galit siya, may iba. Minsan ‘Oo’ lang yung sagot. Kaya mas nakikilala ko pa siya through text (For example, on a normal circumstance, her text would contain sweet words like ‘I love you.’ But if she’s mad, it’s different. At times, she would just reply with a mere ‘yes.’ That’s why I get to know her more through text)” (Richard). Texting and Communicative Change Own Private World Texting allowed respondents to create special languages that they used to interact with their own partners. It is an inherent characteristic of texting that limits messages up to 360 characters only, and it becomes almost a requirement to really adapt a rather abbreviated way of writing when one has to send a message. In this study however, it was found that the languages that respondents created were not the usual languages that the general public would use or understand in texting – it even went beyond the usual use of the popular smileys. Respondents revealed that they created codes that only they and their respective partners understood in their “own private world” (Jackie, Emma). “How I text him is different from how I text other people so I don’t think other people would understand what I’m telling him, and why the manner is so if they read our messages” (Anika). Leana shared an example: My partner and I have created special nicknames and shortcuts that only the two of us know and understand. Kunyari (For example), we have our own way of saying ‘I love you’ or ‘I miss you.’ To send a kiss… we use a set of characters different from the usual. Basta secret na namin ‘yon (It is our secret). Fun Majority of the respondents identified communicative code change as the most exciting and fun part in texting. “It is one of the best things about relating with someone through texting. It is one of the most fun things to do” (Mario). And the amusement that this interaction caused was not only limited in the virtual environment and the textual context. “It is one of the fun things about our texting and it even carries over when we are together personally” (Justin). “Since words are what we have, we play with them and try to be creative. Para masaya, exciting (So that it is fun and exciting)” (Charm). Incidentally, this sense of fun and excitement is also one of the attributes that Pertierra and his co-authors mentioned in their book Txt-ing Selves (Pertierra et al. 140): “Many see texting as an opportunity for fun.” Texting and Network Convergence Texting also made network convergence possible among partners, and their respective social circles, in a romantic relationship. Because the respondents engaged in non-stop texting, their friends and family started to notice their change in behavior. “People become curious… They want to know the person I text with every minute of every day… I guess people can tell when a person’s in love, even when it has only developed through texting” (Clara). Jake shared a very likely scenario: “If you get text messages when you’re with your friends/family and you laugh at the message you receive, or just react to whatever you receive, you’d have to make kwento (tell) who you’re texting to make sense of your reactions.” Others though, readily announced their relationships to everyone: “I’ll text my friends first na ‘Uy, may bago ako.’ (I will text my friends first that: ‘Hey, I have a new girlfriend.’)” (Richard). But sometimes, texters also introduced their partners to people outside their friends and family circles. “Sometimes, it even goes beyond personal. Example, if my ‘new partner’ who has never met any of my friends and family need help with something (business, academic, etc.) then I introduce him to someone from my circle who can be of help to him” (Jetrin). Network convergence could also take place through and within the medium itself. Respondents revealed that their family and friends actually interact with each other through texting without necessarily having the opportunity to meet in person. Pauline shared: “Ate (My older sister)… used to send text messages to him before to ask where I am. And my mom stole his number from my phone ‘just in case’.” Didith and her boyfriend also experienced having their friends involved in the dynamics of their relationship: “During our first major quarrel, he texted and called my friend to ask what I was mad about. Likewise, when we have a minor spat, I call his friend to vent or ask about him.” Conclusion This study establishes the texting technology’s capacity as a romancing gadget. As the interview participants pointed out, because of the technology’s capacity to allow users to create their own world capable of expressing real and virtual emotions, and managing contextual cues, texters were able to increase their dependence and understanding of one another. It also allowed for partners to exchange more personal and intimate information through an instant and private delivery of messages. The facilitation of communicative change made their relationship more exciting and that the texting medium itself became the message of commitment to their relationship. Finally, texting also led the partners to introduce one another to their families and friends either through the texting environment or face-to-face. Ultimately, texting became their means to achieving intimacy and romance. Texting offered a modern communication medium for carrying out traditional gender roles in pursuing romance for the heterosexual majority of the respondents. However, the messaging tool also empowered the homosexuals and bisexuals involved in the study. The highly private and autonomous textual environment enabled them to explore new and unorthodox romantic and even sexual relations. Moreover, texting may be considered as a venue for “technological foreplay” (Nadarajan). Almost all of those who have used texting to sustain their intimacy indicated the choice to expand to other modes of communication. Although relationships set in a purely virtual environment actually exist, the findings that these relationships rarely stay virtual point to the idea that the virtual setting of texting becomes simply just another place where partners get to exercise their romance for each other, only to be further “consummated” perhaps by a face-to-face contact. Data gathering for this research revealed a noteworthy number of respondents who engage in a purely virtual textual relationship. A further investigation of this occurrence will be able to highlight the capacity of texting as a relationship gadget. Long distance relationships sustained by this technology also provide a good ground for the exploration of the text messaging’s potentials as communication tool. References Lallana, Emmanuel. SMS, Business, and Government in the Philippines. Manila: Department of Science and Technology, 2004. Leung, Louis, and Ran Wei. “More than Just Talk on the Move: Uses and Gratifications of the Cellular Phone.” Journalism and Mass Communication Quarterly 77 (2000): 308-320. Levinson, Paul. Cellphone: The Story of the World’s Most Mobile Medium and How It Has Transformed Everything! New York: Palgrave Macmillan, 2004. Mangahas, Malou. “For the Little History of EDSA-2.” Social Weather Station 26 Jan. 2001. 31 Jan. 2005 http://www.sws.org.ph/>. Nadarajan, Gunalan. Personal communication with the author. 2004. Parks, Malcolm. “Communication Networks and Relationship Life Cycles.” Handbook of Personal Relationships: Theory, Research, and Interventions. 2nd ed. Ed. Steve Duck. London: John Wiley, 1997. 351-72. Pertierra, Raul. Transforming Technologies: Altered Selves – Mobile Phone and Internet Use in the Philippines. Manila: De La Salle UP, 2006. Pertierra, Raul, et al. Text-ing Selves: Cellphones and Philippine Modernity. Manila: De La Salle UP, 2002. Solis, Randy Jay. “Mobile Romance: An Exploration of the Development of Romantic Relationships through Texting.” Asia Culture Forum, Gwangju, South Korea: 29 Oct. 2006. Citation reference for this article MLA Style Solis, Randy Jay C. "Texting Love: An Exploration of Text Messaging as a Medium for Romance in the Philippines." M/C Journal 10.1 (2007). echo date('d M. Y'); ?> <http://journal.media-culture.org.au/0703/05-solis.php>. APA Style Solis, R. (Mar. 2007) "Texting Love: An Exploration of Text Messaging as a Medium for Romance in the Philippines," M/C Journal, 10(1). Retrieved echo date('d M. Y'); ?> from <http://journal.media-culture.org.au/0703/05-solis.php>.
Style APA, Harvard, Vancouver, ISO itp.
28

Yunxia, Zhu, i Peter Thompson. "Invitation or Sexual Harassment?" M/C Journal 3, nr 4 (1.08.2000). http://dx.doi.org/10.5204/mcj.1859.

Pełny tekst źródła
Streszczenie:
This article aims to analyse an intercultural telephone invitation given by a Chinese tutor to an Australian student, and highlight general principles of intercultural invitations. This anecdote is based on a true story that took place in a university in Australia, but the persons' names used here are fictitious for the sake of confidentiality. Below is the transcript of the actual conversation between the Chinese tutor Dr Lin Liang (L) and his student Catherine Jones (C): C: Catherine speaking. L: Hi, Catherine, this is Lin. C: Hi, Teacher Lin. L: I would like to invite you to our New Year's party to be held in my house this Saturday evening. C: This Saturday? I am afraid I won't be able to make it because I am going to my best friend's birthday party. L: You know this is the end of our school year. It would be so nice for all of our classmates to gather together. C: But I have already promised my friend. L: En... It is a pity... C: Sorry about that, but -- L: Never mind. Enjoy your party then. C: Thanks. L: That's OK, bye. C: Bye. However, the story does not end here. About two hours later, Dr Lin rang Catherine a second time, asking if it was still possible for her to consider attending the Saturday party. Late in the evening around 9.00 pm, Dr Lin rang her yet again to invite her to the party, saying it would be OK even if she stayed just for a short while. The next day, Catherine lodged a complaint with the Dean, alleging that Dr. Lin's repeated calls constituted sexual harassment. Dr. Lin was highly distressed to learn of the complaint, and explained that he just wanted to indicate sincerity and warmth as required by an invitation, and had no other intentions. This communication breakdown invites a number of questions: What are the factors underlying Catherine's interpretation that Dr. Lin's repeated calls constituted sexual harassment? What are the factors underlying Dr. Lin's contention that his actions were intended to emphasise his sincerity? What factors would need to be recognised in order to facilitate culturally competent performances on both their parts? In order to answer these questions, this article will adopt a holistic approach based on an analytic framework encompassing three theoretical dimensions. This framework is comprised as follows: Differences in intercultural exchange and politeness behaviour; Aristotle's distinction between the three orientations of persuasive/rhetorical appeal; ethos, pathos, and logos; Austin and Searle's theory of speech acts, as applied to politeness behaviour and felicity conditions in communicative interaction as applied to the act of inviting. These approaches are conceptualised as three overlapping spheres, and their relatedness can be further illustrated: Figure 1 First and foremost, the case study in question is related to an intercultural interaction between the Australian and Chinese culture, and some research findings in relevant areas may help highlight the differences in politeness behaviour between high-context and low-context cultures (Hall). According to Hall, high-context cultures such as Chinese tend to stress the use of internalised or implicit message while low-context cultures tend to emphasise the use of explicit messages. In other words, in Chinese culture, the message may have some shared implied meanings that may go beyond the linguistic forms used in the message. Kaplan's model on oriental circularity and western linearity seemed to in accordance with Hall's model. Young's exploration of the directness and indirectness of American and Chinese requests further substantiated this point. In a similar way, differences may arise in determining the criteria for appropriate behaviour relating to the use of other directives across cultures. As Gao and Ting-Toomey suggest, Chinese culture seems to pay attention to qing (reciprocity and feelings of obligation) and guanxi (relationship building), while in low-context cultures such a stress tends to be missing. This difference may also help explain the differences in communicative patterns as discussed by Kaplan and Young. Zhu found that in making a sales offer, Chinese companies often try to establish a long-term relationship with their clients ("Structural Moves"). In contrast, Australian companies seem to mainly focus on promoting products. The stress on qing in Chinese culture may also be a crucial factor that contributes to the different criteria for a polite invitation as compared to the Australian culture. The following discussion will further explore the other two parameters (see Figure 1) the two cultures differ in when making an invitation, which may have finally led to the breakdown in communication between Dr. Lin and Catherine. As shown in Figure 1, the argument underpinning this approach is that a given illocutionary act reflects culture-specific preferences for certain persuasive/rhetorical orientations, thereby affecting the socio-linguistic performance, i.e. parole as opposed to langue (Cullen) related to politeness principles. In short, the persuasive/rhetorical orientation varies between cultures, which means that the nature of ostensibly equivalent illocutionary acts also varies. Consequently, cross-cultural competence will be limited unless one is aware of the rhetorical and politeness codes implicit in the performance of certain communicative actions. Note that rhetorical orientation may also influence the politeness behaviour directly as a specification of that orientation. This in turn requires an awareness of cultural preferences toward certain persuasive/rhetorical orientations. The interconnections between them and the theoretical utility of this approach will be made explicit in the course of this discussion. Austin and Searle conceptualise the speech acts as comprising of locution (langue) and illocution (parole). What is of vital importance is the illocutionary force of an utterance which is the performance of a speech act, such as an invitation. According to Searle, an invitation is a directive used to get the addressee to do something. Invitation can be understood as a particular form of persuasive speech act. It is generally intended to produce a particular response (i.e. acceptance). As an illocutionary action, an invitation seeks to establish a relationship of social expectations between the host and invitee. This requires certain felicity conditions to be met. In other words, for the speech act to be socially significant, it must create a shared sense of meaning in regard to some perceived change or modification to existing social relations. These are often so obvious that they require little explanation. However, felicity conditions in speech-acts are culture-specific and may include rhetorical and politeness devices that are not obvious to other cultures. Politeness behaviour in invitations, related to using appropriate language forms, is an important element in competent illocutionary performance. Leech contends that polite illocutions are likely to be seen as minimising the addressee's cost and maximising his/her benefits, and the opposite is true for the addresser. Politeness behaviour can also be further explained in the light of Brown and Levinson's face-saving theory. Many actions we perform with words are potential face-threatening acts, such as requests and invitations (Brown and Levinson). The addresser is thus often confronted with negative face wants and has to address them by applying Leech's principles, in which maximising the addressee's benefits is the dominant strategy to gain politeness. However, strategies to maximise the addressee's benefits can be culture-specific. This is further connected to the persuasive/rhetorical orientation. Based on Aristotle, the appeal from ethos emphasises the persuader's (host's) character and status or other social conventions which might oblige compliance. The appeal from pathos emphasises emotion/feelings (either positive or negative) in inducing the desired response. The appeal from logos emphasises reason and the logical consistency of the proposal with the ideas and motives of the persuadee (invitee). Moran and Stripp found that western cultures tend to have a logical orientation, while others such as Japanese and Chinese tend to be characterised by emotional or dogmatic orientations. In a similar manner, Chinese scholars seem to address ethos, logos and pathos at the same time, in particular the logos and pathos. These principles remain a well-accepted principle in Chinese writing theories. Li, for example, clearly explicates the persuasive principle in writing as qing li (the combination of the emotional and logical approaches). The explicitly preferred qing (feelings/emotions) can be seen as part of the Confucian values relating to harmony, consensus and relationship building as noted by Hofstede and Bond. The different rhetorical orientations are also further explored by Campbell. This difference may suggest that the preferred rhetorical orientations are also a key aspect underpinning competent illocutionary performance. For example in Chinese invitations, a stress on the emotional approach may validate behaviours such as repeating the invitation even after initial refusal. However, a stress on the logical orientation, such as in western cultures, may negate the validity of these politeness conditions. This clearly points out the necessity of understanding the criteria for competent performance across cultures. The felicity conditions of invitation in Euro-Australian culture require, first, that the potential host be in a legitimate position to offer hospitality, and second, that the potential guest be -- at least theoretically -- able and willing to accept. Thirdly, the locutionary form of politeness requires use of conventionally appropriate terms of address and wording. The illocutionary form requires that the host symbolically offer hospitality to the invitee without the imposition of charges or other demands. Furthermore, the implied benefit to the invitee would ideally be achieved though implied cost to the host (even if the invitee is addressed as if their presence constitutes the bestowal of a favour). Fourthly, depending on the nature of the relationship between the host and invitee, certain persuasive/rhetorical orientations are preferred over others (eg. an appeal to emotion may seem out of place in formal invitation). The initial invitation meets these criteria. Dr. Lin offers and Catherine declines, citing a plausible and legitimate reason for being unavailable. From Catherine's perspective, the felicity conditions for invitation are now redundant. She has already declined in a manner which makes it clear that she is socially obliged to be elsewhere. From a persuasive/rhetorical perspective, the first invitation was primarily based on an appeal from logos/reason. i.e. Dr. Lin did not know that Catherine had already committed herself to other plans and it would be reasonable to suppose that she might appreciate being invited to a social occasion. This was backed up by a secondary appeal from pathos/emotion, whereby Dr. Lin pointed out that it would be nice for the whole class to get together. However, the priority of attending a best friend's birthday-party over-rides both these appeals. In Euro-Australian culture, close personal friends enjoy greater social priority than classmates or more distant associates. For Dr. Lin, however, the politeness criteria for invitation were still applicable. From a Chinese cultural perspective, the illocutionary performance of invitation may require repetition of the offer, even if the initial approach has been declined. According to Zhu (Business Communication), in Chinese culture repeating invitations is an accepted ritual to indicate sincerity and hospitality. Thus in Dr. Lin's view the second approach is required to perform the illocutionary act competently. The persuasive appeal, however, has become oriented toward ethos, reflecting Chinese conventions pertaining to politeness behaviour. For Dr. Lin not to repeat the invitation might suggest that Catherine's presence was of merely casual concern. Therefore the sincerity of the invitation demanded the gesture of repetition, regardless of the logical grounds cited for the initial refusal. Unfortunately, Dr. Lin and Catherine perceive the second invitation in very different ways based on the illocutionary performance criteria of their respective cultures. For Catherine, the logical basis for her initial refusal renders Dr. Lin's performance incompetent, and creates uncertainty about his apparent motives. In Euro-Australian culture, the repeated invitation makes no logical sense, since a perfectly legitimate reason for declining has already been provided. Therefore the communicative action cannot be interpreted as an invitation. If it is, then it is performed in a culturally incompetent fashion which could legitimately be construed as pestering. Repeating an invitation which has already been declined may appear to be an emotional appeal. While an illocutionary invitation based on pathos conceivably may be competent in Euro-Australian culture, the only circumstances that it would occur in is between relatively close friends. The power-relations between Catherine, as student, and Dr. Lin, as tutor, precludes felicity in this case. Thus the same locutionary action is interpreted as two quite different illocutionary actions. This depends on the interpreter's culturally specific understanding of the social significance of the locution. Since Catherine's cultural conventions would implicitly deny the validity of a repeated invitation, the communicative action must be construed as something else. Catherine may have classified the repeated invitation as a minor issue of little consequence. However, when Dr. Lin called her up to invite her a third time, she interpreted the illocutionary act as harassment. From a contemporary Euro-Australian perspective, pestering may be irritating, but harassment is political in nature. Three factors lead Catherine to this conclusion. First, after two previous declinations, the third invitation could not fulfil the illocutionary performance criteria of a legitimate invitation. In particular, the persuasive/rhetorical orientation of the repeated appeals were not oriented toward logos, as befits the formality of the lecturer-student relation. Indeed, it was Dr. Lin's apparent attempt to approach Catherine in a non-formal manner (apparently oriented toward pathos rather than logos) which led her to this interpretation. Second, the fact that Dr. Lin' social status is higher than Catherine's introduced the problem of the implicit power-relations in the discourse. For Catherine, the third invitation was intrusive and pushy, and it seemed that her explanations had been ignored. The evening call demanded that she re-engage in the discourse of day-time student-tutor power-relations. Since she is subordinate to Dr. Lin, other strategies through which she might have asserted her rights may have carried the risk of subsequent disfavour. However, she obviously resented what she perceived as an attempt to inappropriately use status to interfere with her personal affairs and sought out higher authority to rectify the situation, hence the complaint of harassment made to the Dean. Ironically, Dr. Lin's third invitation in the evening may well have been intended to reduce the social distance between himself and Catherine created by workplace space-time power-relations. For Dr. Lin, the first invitation expressed the illocutionary intent. The second call made sure that the invitee was made to feel assured of the sincerity of the invitation, and the third ring expressed the would-be host's appreciation. Establishing a host-guest relationship is a key illocutionary function in Chinese invitation. Note though, that there may also be a 'face' consideration here. Dr. Lin attempts to facilitate Catherine's attendance by pointing out that it would be acceptable to attend for a brief period. This suggests a re-emphasis on the orientation to logos, since it points out a compromise which allows Catherine to attend both parties. It also allowed Dr. Lin to save 'face' by not having his invitation totally disregarded. However, it failed as an illocutionary performance because the felicity conditions for polite invitation had already been violated as far as Catherine was concerned, even though they remained intact throughout for Dr. Lin. In conclusion, it can be seen from the above analysis of the communication breakdown that persuasive orientations and politeness principles are interrelated and culturally sensitive. Euro-Australian culture stresses the logical orientation in illocutionary performance whereas Chinese culture seems to emphasise both the logical and emotional approaches. Without a recognition of this difference, specific politeness behaviours in intercultural invitations can lead to illocutionary incompetence. This has been exemplified by Catherine's misconstrual of Dr. Lin's intended invitation-performance as harassment. Therefore in intercultural communication, one ought not to judge a speech act such as an invitation based on one's own culture's felicity conditions. First and foremost, a basic understanding of persuasive orientations between cultures is essential. With appropriate understanding of these principles one can avoid misinterpreting the intent of the addresser, thus overcoming barriers in intercultural communication. Specifically, further appreciation of the interplay between rhetorical orientation, politeness codes and felicity conditions in illocutionary performances in different cultures is required for a fuller comprehension of potential cross-cultural incompetence. With this in mind, greater tolerance can be achieved, and intercultural competence enhanced. References Aristotle. Aristotle on Rhetoric: A Theory of Civic Discourse. Trans. George A. Kennedy. New York: Oxford UP, 1991. Austin, John. L. How to Do Things with Words. New York: Oxford UP, 1962. Brown, Penelope, and Stephen C. Levinson. Politeness: Some Universals in Language Usage. Cambridge, UK: Cambridge UP, 1987. Campbell, Charles. P. "Rhetorical Ethos: A Bridge between High-Context and Low-Context Cultures? The Cultural Context in Business Communication. Eds. Susanne Niemeier, Charles P. Campbell and René Dirven. Philadelphia: John Benjamins, 1998. 31-47. Cullen, Johnathan. Saussure. 2nd ed. London: Fontana, 1985. Ge Gao, and S. Ting-Toomey. Communicating Effectively with the Chinese. Thousand Oaks: Sage, 1998. Hall, E. T. Beyond Culture. Garden City, NY: Anchor, 1977. Hofstede, G., and M. H. Bond. "The Confucius Connection: From Cultural Roots to Economic Growth." Organisational Dynamics 16.4 (1988): 4-21. Kaplan, R. B. "Cultural Thought Patterns in Inter-Cultural Education." Language Learning 16 (1966): 1-20. Leech, Geoffery. Principles of Pragmatics. New York: Longman, 1983. Li Xiaoming. "Good Writing" in Cross-Cultural Context. Albany, NY: State U of New York P, 1996. Moran, R. T., and W. G. Stripp. Successful International Business Negotiations. Houston: Gulf, 1991. Searle, John R. Speech Acts: An Essay in the Philosophy of Language. Cambridge, UK: Cambridge UP, 1969. Young, Linda Wai Ling, ed. Crosstalk and Culture in Sino-American Communication. Cambridge, UK: Cambridge UP, 1994. Zhu Yunxia. Business Communication in China. New York: Nova Science Publishers, 1999. ---. Structural Moves Reflected in English and Chinese Sales Letters. Discourse Studies (In Press). Citation reference for this article MLA style: Zhu Yunxia, Peter Thompson. "Invitation or Sexual Harassment? An Analysis of an Intercultural Communication Breakdown." M/C: A Journal of Media and Culture 3.4 (2000). [your date of access] <http://www.api-network.com/mc/0008/invitation.php>. Chicago style: Zhu Yunxia, Peter Thompson, "Invitation or Sexual Harassment? An Analysis of an Intercultural Communication Breakdown," M/C: A Journal of Media and Culture 3, no. 4 (2000), <http://www.api-network.com/mc/0008/invitation.php> ([your date of access]). APA style: Zhu Yunxia, Peter Thompson. (2000) Invitation or sexual harassment? An analysis of an intercultural communication breakdown. M/C: A Journal of Media and Culture 3(4). <http://www.api-network.com/mc/0008/invitation.php> ([your date of access]).
Style APA, Harvard, Vancouver, ISO itp.
Oferujemy zniżki na wszystkie plany premium dla autorów, których prace zostały uwzględnione w tematycznych zestawieniach literatury. Skontaktuj się z nami, aby uzyskać unikalny kod promocyjny!

Do bibliografii