1,254 research outputs found

    Research on the Application of E-commerce to Small and Medium Enterprises (SMEs): the Case of India

    Full text link
    SMEs account for a large proportion and play an important role in the development of each country in the world, including India. The globalization will bring many advantages for enterprises however SMEs will face fierce competition at the local, national and International level. In order to maintain and promote the important role of SMEs in the context of increased competition, SMEs have to change and adopt new technologies. E-commerce and digital technologies are bringing opportunities to help SMEs improve their competitiveness, narrow the gap with big enterprises thanks to their fairness and flexibility of the digital business environment.       According to UNIDO (2017), India is one of the countries successfully applying e-commerce to SMEs. Contributing to this success is the important role of the Indian government. Therefore, this paper focuses on researching the application of e-commerce to SMEs in terms of the role of government in promoting and creating an ecosystem for SMEs and e-commerce development

    Deterministically Computing Reduction Numbers of Polynomial Ideals

    Full text link
    We discuss the problem of determining reduction number of a polynomial ideal I in n variables. We present two algorithms based on parametric computations. The first one determines the absolute reduction number of I and requires computation in a polynomial ring with (n-dim(I))dim(I) parameters and n-dim(I) variables. The second one computes via a Grobner system the set of all reduction numbers of the ideal I and thus in particular also its big reduction number. However,it requires computations in a ring with n.dim(I) parameters and n variables.Comment: This new version replaces the earlier version arXiv:1404.1721 and it has been accepted for publication in the proceedings of CASC 2014, Warsaw, Polna

    Morphological Comparison of Three Asian Native Honey Bees (Apis Cerana, a. Dorsata, a. Florea) in Northern Vietnam and Thailand

    Full text link
    Three species of Asian native honey bees (Apis cerana, A. florea and A. dorsata) from northern Vietnam and Thailand were morphologically analyzed for investigations on their geographic variations and relations. In Vietnam, samples were collected from feral and managed colonies. In Thailand, the collections were from feral colonies or from field bees on flowers. Morphological analysis was carried out, using measurements common to honeybee taxonomy. Measured characters were done under stereomicroscope with an ocular micrometer. ANOVA program and multivariate statistical analyses were applied for treating the data. Overall, A. cerana populations in northern Vietnam are significantly morphologically different than from those in Thailand. It may be due to their different geographic locations between the Thai and Vietnamese populations of A. cerana. A. florea bees from Vietnam are generally bigger in size than those from Thailand, but the differences are uncertain. In contrast, the body size of A. dorsata populations from Thailand are bigger than those from Vietnam. However, these differences are also not significant. It is necessary to take further comparative investigations of these bee species from both countries

    Rateless codes-based secure communication employing transmit antenna selection and harvest-to-jam under joint effect of interference and hardware impairments

    Get PDF
    In this paper, we propose a rateless codes-based communication protocol to provide security for wireless systems. In the proposed protocol, a source uses the transmit antenna selection (TAS) technique to transmit Fountain-encoded packets to a destination in presence of an eavesdropper. Moreover, a cooperative jammer node harvests energy from radio frequency (RF) signals of the source and the interference sources to generate jamming noises on the eavesdropper. The data transmission terminates as soon as the destination can receive a sufficient number of the encoded packets for decoding the original data of the source. To obtain secure communication, the destination must receive sufficient encoded packets before the eavesdropper. The combination of the TAS and harvest-to-jam techniques obtains the security and efficient energy via reducing the number of the data transmission, increasing the quality of the data channel, decreasing the quality of the eavesdropping channel, and supporting the energy for the jammer. The main contribution of this paper is to derive exact closed-form expressions of outage probability (OP), probability of successful and secure communication (SS), intercept probability (IP) and average number of time slots used by the source over Rayleigh fading channel under the joint impact of co-channel interference and hardware impairments. Then, Monte Carlo simulations are presented to verify the theoretical results.Web of Science217art. no. 70

    Healthcare resource use and costs of severe, uncontrolled eosinophilic asthma in the UK general population

    Get PDF
    Acknowledgments The authors thank Derek Skinner (Cambridge Research Support Ltd, Oakington, Cambridge, UK) for assistance with data extraction.Peer reviewedPublisher PD

    Persistent Test-time Adaptation in Episodic Testing Scenarios

    Full text link
    Current test-time adaptation (TTA) approaches aim to adapt to environments that change continuously. Yet, when the environments not only change but also recur in a correlated manner over time, such as in the case of day-night surveillance cameras, it is unclear whether the adaptability of these methods is sustained after a long run. This study aims to examine the error accumulation of TTA models when they are repeatedly exposed to previous testing environments, proposing a novel testing setting called episodic TTA. To study this phenomenon, we design a simulation of TTA process on a simple yet representative ϵ\epsilon-perturbed Gaussian Mixture Model Classifier and derive the theoretical findings revealing the dataset- and algorithm-dependent factors that contribute to the gradual degeneration of TTA methods through time. Our investigation has led us to propose a method, named persistent TTA (PeTTA). PeTTA senses the model divergence towards a collapsing and adjusts the adaptation strategy of TTA, striking a balance between two primary objectives: adaptation and preventing model collapse. The stability of PeTTA in the face of episodic TTA scenarios has been demonstrated through a set of comprehensive experiments on various benchmarks

    On The Performance Of 1-Bit ADC In Massive MIMO Communication Systems

    Get PDF
    Massive multiple-input multiple-output (MIMO) with low-resolution analog-to-digital converters is a rational solution to deal with hardware costs and accomplish optimal energy efficiency. In particular, utilizing 1-bit ADCs is one of the best choices for massive MIMO systems. This paper investigates the performance of the 1-bit ADC in the wireless coded communication systems where the robust channel coding, protograph low-density parity-check code (LDPC), is employed. The investigation reveals that the performance of the conventional 1-bit ADC with the truncation limit of 3-sigma is severely destroyed by the quantization distortion even when the number of antennas increases to 100. The optimized 1-bit ADC, though having substantial performance gain over the conventional one, is also affected by the quantization distortion at high coding rates and low MIMO configurations. Importantly, the investigation results suggest that the protograph LDPC codes should be re-designed to combat the negative effect of the quantization distortion of the 1-bit ADC
    corecore