140 research outputs found

    Approximation by finite mixtures of continuous density functions that vanish at infinity

    Full text link
    Given sufficiently many components, it is often cited that finite mixture models can approximate any other probability density function (pdf) to an arbitrary degree of accuracy. Unfortunately, the nature of this approximation result is often left unclear. We prove that finite mixture models constructed from pdfs in C0\mathcal{C}_{0} can be used to conduct approximation of various classes of approximands in a number of different modes. That is, we prove approximands in C0\mathcal{C}_{0} can be uniformly approximated, approximands in Cb\mathcal{C}_{b} can be uniformly approximated on compact sets, and approximands in Lp\mathcal{L}_{p} can be approximated with respect to the Lp\mathcal{L}_{p}, for p[1,)p\in\left[1,\infty\right). Furthermore, we also prove that measurable functions can be approximated, almost everywhere

    Co-doping red-emitting Sr2Si5N8:Eu2+ into yellow-emitting phosphor-packaging for enhancing the optical properties of the 8500 K remote-phosphor packaging wleds

    Get PDF
    In the last decades, WLEDs attract more and more consideration in both academic and industrial purposes because of its advantages such as fast response time, environment friendliness, small size, long lifetime, and high efficiency. In this research, by doping the red-emitting Sr2Si5N8:Eu2+ phosphor particles into yellow-emitting YAG:Ce phosphor-packaging, a new recommendation for enhancing the optical properties (color uniformity, color rendering index, and lumen output) of the 8500 K remote-phosphor packaging WLEDs is presented, investigated, and demonstrated. By using Mat Lab and Light Tools software based on Mie Theory, the obtained results show that the optical properties of the 8500 K remote-phosphor packaging WLEDs significantly depended on Sr2Si5N8:Eu2+ concentration. The results have provided a potential practical recommendation for manufacturing remote-phosphor W-LEDs.Web of Science1341034102

    Rateless codes-based secure communication employing transmit antenna selection and harvest-to-jam under joint effect of interference and hardware impairments

    Get PDF
    In this paper, we propose a rateless codes-based communication protocol to provide security for wireless systems. In the proposed protocol, a source uses the transmit antenna selection (TAS) technique to transmit Fountain-encoded packets to a destination in presence of an eavesdropper. Moreover, a cooperative jammer node harvests energy from radio frequency (RF) signals of the source and the interference sources to generate jamming noises on the eavesdropper. The data transmission terminates as soon as the destination can receive a sufficient number of the encoded packets for decoding the original data of the source. To obtain secure communication, the destination must receive sufficient encoded packets before the eavesdropper. The combination of the TAS and harvest-to-jam techniques obtains the security and efficient energy via reducing the number of the data transmission, increasing the quality of the data channel, decreasing the quality of the eavesdropping channel, and supporting the energy for the jammer. The main contribution of this paper is to derive exact closed-form expressions of outage probability (OP), probability of successful and secure communication (SS), intercept probability (IP) and average number of time slots used by the source over Rayleigh fading channel under the joint impact of co-channel interference and hardware impairments. Then, Monte Carlo simulations are presented to verify the theoretical results.Web of Science217art. no. 70

    Advancing an Organizational Health Perspective for Insider Threat Prevention and Management

    Get PDF
    Malicious insiders pose a serious risk to valued organizational assets, including proprietary information, institutional processes, personnel, finances, reputation, and firm connections. Research-based solutions for predicting, detecting, and mitigating insider threats have focused heavily on individual, organizational, and cyber risk factors (Kont et al. 2015; Greitzer et al. 2018). To that end, scholars have increasingly recognized that people’s personalities, motivations, grievances, and work stressors raise the risk of insider threat events, and the corresponding interventional strategies involve cybersecurity and work design practices to safeguard the organization against human error and deviance (Homoliak et al. 2019; Greitzer et al. 2013; Maasberg, Warren, and Beebe 2015). Yet, despite evidence that insider threat events are perpetrated by people situated within a social and organizational context, discussions of insider threat have only started to recognize the importance of socio-organizational protective factors for reducing the occurrence of insider threats (Moore, Gardner, and Rousseau 2022; Whitty 2021). We argue that a healthy organization—an organization whose people, practices, and policies effectively sustain its survival and performance—may be key to preventing and managing insider threats

    Petrographic Characteristics and Depositional Environment Evolution of Middle Miocene Sediments in the Thien Ung - Mang Cau Structure of Nam Con Son Basin

    Full text link
    This paper introduces the petrographic characteristics and depositional environment of Middle Miocene rocks of the Thien Ung - Mang Cau structure in the central area of Nam Con Son Basin based on the results of analyzing thin sections and structural characteristics of core samples. Middle Miocene sedimentary rocks in the studied area can be divided into three groups: (1) Group of terrigenous rocks comprising greywacke sandstone, arkosic sandstone, lithic-quartz sandstone, greywacke-lithic sandstone, oligomictic siltstone, and bitumenous claystone; (2) Group of carbonate rocks comprising dolomitic limestone and bituminous limestone; (3) Mixed group comprising calcareous sandstone, calcarinate sandstone, arenaceous limestone, calcareous claystone, calcareous silty claystone, dolomitic limestone containing silt, and bitumen. The depositional environment is expressed through petrographic characteristics and structure of the sedimentary rocks in core samples. The greywacke and arkosic sandstones are of medium grain size, poor sorting and roundness, and siliceous cement characterizing the alluvial and estuarine fan environment expressed by massive structure of core samples. The mixed calcareous limestone, arenaceous dolomitic limestone, and calcareous and bituminous clayey siltstone in the core samples are of turbulent flow structure characterizing shallow bay environment with the action of bottom currents. The dolomitic limestones are of relatively homogeneous, of microgranular and fine-granular texture, precipitated in a weakly reducing, semi-closed, and relatively calm bay environment

    Target Personification Influences the Positive Emotional Link Between Generating and Implementing Malevolently Creative Ideas

    Get PDF
    Research on malevolent creativity has rarely linked the generation of harmful ideas with their implementation (i.e., malevolent innovation). To explain why people might act upon their malevolently creative ideas, we drew on affective events theory. Specifically, given evidence that aggressive and creative thought events can elicit positive emotions, we argued that generating new and harmful ideas can evoke positive emotional states that make malevolent innovation a more desirable course of action. We first tested our mediational pathway in two studies with different malevolent creativity tasks. Finding only partial support for our predictions in Study 1 (N = 126), but full support in Study 2 (N = 296), we reflected on our study tasks and suspected that our mixed results may have occurred because the target of ideas in Study 2 embodied more human qualities than in Study 1. Thus, we integrated theory on target personification to see if assigning personhood to a target moderated the malevolent creativity-innovation pathway. We tested our updated model in Study 3 (N = 214) and found that the indirect effect of malevolent creativity on the desire to implement ideas (through positive emotions) was indeed conditional upon individuals’ personification of a target. Plain Language Summary Little research has examined why and when people might act upon their malevolently creative (i.e., new and harmful) ideas. Given evidence that aggression and creativity can both arouse positive emotional states, it may be possible that forming malevolently creative ideas can make people feel more positively about implementing them later on. However, our research findings paint a more nuanced picture, suggesting that the emotional link between generating and implementing malevolently creative ideas only occurs when people see their targets as more human-like (i.e., they can assign personhood to their targets)
    corecore