144 research outputs found

    Approximation by finite mixtures of continuous density functions that vanish at infinity

    Full text link
    Given sufficiently many components, it is often cited that finite mixture models can approximate any other probability density function (pdf) to an arbitrary degree of accuracy. Unfortunately, the nature of this approximation result is often left unclear. We prove that finite mixture models constructed from pdfs in C0\mathcal{C}_{0} can be used to conduct approximation of various classes of approximands in a number of different modes. That is, we prove approximands in C0\mathcal{C}_{0} can be uniformly approximated, approximands in Cb\mathcal{C}_{b} can be uniformly approximated on compact sets, and approximands in Lp\mathcal{L}_{p} can be approximated with respect to the Lp\mathcal{L}_{p}, for p[1,)p\in\left[1,\infty\right). Furthermore, we also prove that measurable functions can be approximated, almost everywhere

    Co-doping red-emitting Sr2Si5N8:Eu2+ into yellow-emitting phosphor-packaging for enhancing the optical properties of the 8500 K remote-phosphor packaging wleds

    Get PDF
    In the last decades, WLEDs attract more and more consideration in both academic and industrial purposes because of its advantages such as fast response time, environment friendliness, small size, long lifetime, and high efficiency. In this research, by doping the red-emitting Sr2Si5N8:Eu2+ phosphor particles into yellow-emitting YAG:Ce phosphor-packaging, a new recommendation for enhancing the optical properties (color uniformity, color rendering index, and lumen output) of the 8500 K remote-phosphor packaging WLEDs is presented, investigated, and demonstrated. By using Mat Lab and Light Tools software based on Mie Theory, the obtained results show that the optical properties of the 8500 K remote-phosphor packaging WLEDs significantly depended on Sr2Si5N8:Eu2+ concentration. The results have provided a potential practical recommendation for manufacturing remote-phosphor W-LEDs.Web of Science1341034102

    Rateless codes-based secure communication employing transmit antenna selection and harvest-to-jam under joint effect of interference and hardware impairments

    Get PDF
    In this paper, we propose a rateless codes-based communication protocol to provide security for wireless systems. In the proposed protocol, a source uses the transmit antenna selection (TAS) technique to transmit Fountain-encoded packets to a destination in presence of an eavesdropper. Moreover, a cooperative jammer node harvests energy from radio frequency (RF) signals of the source and the interference sources to generate jamming noises on the eavesdropper. The data transmission terminates as soon as the destination can receive a sufficient number of the encoded packets for decoding the original data of the source. To obtain secure communication, the destination must receive sufficient encoded packets before the eavesdropper. The combination of the TAS and harvest-to-jam techniques obtains the security and efficient energy via reducing the number of the data transmission, increasing the quality of the data channel, decreasing the quality of the eavesdropping channel, and supporting the energy for the jammer. The main contribution of this paper is to derive exact closed-form expressions of outage probability (OP), probability of successful and secure communication (SS), intercept probability (IP) and average number of time slots used by the source over Rayleigh fading channel under the joint impact of co-channel interference and hardware impairments. Then, Monte Carlo simulations are presented to verify the theoretical results.Web of Science217art. no. 70

    Advancing an Organizational Health Perspective for Insider Threat Prevention and Management

    Get PDF
    Malicious insiders pose a serious risk to valued organizational assets, including proprietary information, institutional processes, personnel, finances, reputation, and firm connections. Research-based solutions for predicting, detecting, and mitigating insider threats have focused heavily on individual, organizational, and cyber risk factors (Kont et al. 2015; Greitzer et al. 2018). To that end, scholars have increasingly recognized that people’s personalities, motivations, grievances, and work stressors raise the risk of insider threat events, and the corresponding interventional strategies involve cybersecurity and work design practices to safeguard the organization against human error and deviance (Homoliak et al. 2019; Greitzer et al. 2013; Maasberg, Warren, and Beebe 2015). Yet, despite evidence that insider threat events are perpetrated by people situated within a social and organizational context, discussions of insider threat have only started to recognize the importance of socio-organizational protective factors for reducing the occurrence of insider threats (Moore, Gardner, and Rousseau 2022; Whitty 2021). We argue that a healthy organization—an organization whose people, practices, and policies effectively sustain its survival and performance—may be key to preventing and managing insider threats

    Petrographic Characteristics and Depositional Environment Evolution of Middle Miocene Sediments in the Thien Ung - Mang Cau Structure of Nam Con Son Basin

    Full text link
    This paper introduces the petrographic characteristics and depositional environment of Middle Miocene rocks of the Thien Ung - Mang Cau structure in the central area of Nam Con Son Basin based on the results of analyzing thin sections and structural characteristics of core samples. Middle Miocene sedimentary rocks in the studied area can be divided into three groups: (1) Group of terrigenous rocks comprising greywacke sandstone, arkosic sandstone, lithic-quartz sandstone, greywacke-lithic sandstone, oligomictic siltstone, and bitumenous claystone; (2) Group of carbonate rocks comprising dolomitic limestone and bituminous limestone; (3) Mixed group comprising calcareous sandstone, calcarinate sandstone, arenaceous limestone, calcareous claystone, calcareous silty claystone, dolomitic limestone containing silt, and bitumen. The depositional environment is expressed through petrographic characteristics and structure of the sedimentary rocks in core samples. The greywacke and arkosic sandstones are of medium grain size, poor sorting and roundness, and siliceous cement characterizing the alluvial and estuarine fan environment expressed by massive structure of core samples. The mixed calcareous limestone, arenaceous dolomitic limestone, and calcareous and bituminous clayey siltstone in the core samples are of turbulent flow structure characterizing shallow bay environment with the action of bottom currents. The dolomitic limestones are of relatively homogeneous, of microgranular and fine-granular texture, precipitated in a weakly reducing, semi-closed, and relatively calm bay environment

    Pattern retrieval of traffic congestion using graph-based associations of traffic domain-specific features

    Full text link
    The fast-growing amount of traffic data brings many opportunities for revealing more insightful information about traffic dynamics. However, it also demands an effective database management system in which information retrieval is arguably an important feature. The ability to locate similar patterns in big datasets potentially paves the way for further valuable analyses in traffic management. This paper proposes a content-based retrieval system for spatiotemporal patterns of highway traffic congestion. There are two main components in our framework, namely pattern representation and similarity measurement. To effectively interpret retrieval outcomes, the paper proposes a graph-based approach (relation-graph) for the former component, in which fundamental traffic phenomena are encoded as nodes and their spatiotemporal relationships as edges. In the latter component, the similarities between congestion patterns are customizable with various aspects according to user expectations. We evaluated the proposed framework by applying it to a dataset of hundreds of patterns with various complexities (temporally and spatially). The example queries indicate the effectiveness of the proposed method, i.e. the obtained patterns present similar traffic phenomena as in the given examples. In addition, the success of the proposed approach directly derives a new opportunity for semantic retrieval, in which expected patterns are described by adopting the relation-graph notion to associate fundamental traffic phenomena.Comment: 20 pages, 14 figure
    corecore