Efficient carrier selection schemes for dual-carrier HSDPA system

Author(s):  
Jinyoung Oh ◽  
Jin-Yup Hwang ◽  
Youngnam Han
Keyword(s):  
Author(s):  
Sundar Narsimhan ◽  
Devi Prasad Ungarala

Negotiation outcomes are broadly classified as Distributive/Competitive and Integrative/Collaborative. Substantial academic and research negotiation literature of the past two decades commend adoption of a collaborative style for almost all real-life conflict situations. Business negotiation materials and relational self-construal psychology studies present a picture of contrast. Negotiations being at the heart of buyer-supplier interactions drive value sharing and value co-creation aspects of modern Supply Chains. Pricing, product selection, delivery terms, shipment schedules, carrier selection, volume discounts, product training, and quality standards are all more often than not subject to negotiation between supply chain members. Negotiation interactions ensuing preparation and determination of BATNA, entail use of Competitive or Collaborative Tactics. Buyers are the protagonists in procurement organizations. And procurement often accounts for the lions share of an organizations budget. Small wonder, they drive cost competitiveness together with the firms partners. Indeed this is true of the overall Supply Chain. An Indian pharmaceutical company was chosen for the qualitative research in the form of a case study. The most popular competitive negotiation tactics were chosen for this study and buyers were asked to spell out the negotiation techniques that they deployed, material-wise (with the corresponding suppliers). This data when plotted material-wise and grouped Kraljic category-wise circumstantiates the use of competitive tactics in all Kraljic categories, marked by a refreshing nuanced approach for different categories, with intensity varying for different categories. Interviews with buyers and the key informant to discern the rationale behind use of those negotiation tactics, however, brought out a pattern despite the refreshing tendency not to straight-jacket.


Author(s):  
Jasmina McMenamy ◽  
Irene Macaluso ◽  
Nicola Marchetti ◽  
Linda Doyle

Symmetry ◽  
2022 ◽  
Vol 14 (1) ◽  
pp. 111
Author(s):  
Mingliang Zhang ◽  
Zhenyu Li ◽  
Pei Zhang ◽  
Yi Zhang ◽  
Xiangyang Luo

Behavioral steganography is a method used to achieve covert communication based on the sender’s behaviors. It has attracted a great deal of attention due to its robustness and wide application scenarios. Current behavioral steganographic methods are still difficult to apply in practice because of their limited embedding capacity. To this end, this paper proposes a novel high-capacity behavioral steganographic method combining timestamp modulation and carrier selection based on social networks. It is a steganographic method where the embedding process and the extraction process are symmetric. When sending a secret message, the method first maps the secret message to a set of high-frequency keywords and divides them into keyword subsets. Then, the posts containing the keyword subsets are retrieved on social networks. Next, the positions of the keywords in the posts are modulated as the timestamps. Finally, the stego behaviors applied to the retrieved posts are generated. This method does not modify the content of the carrier, which ensures the naturalness of the posts. Compared with typical behavioral steganographic methods, the embedding capacity of the proposed method is 29.23∼51.47 times higher than that of others. Compared to generative text steganography, the embedding capacity is improved by 16.26∼23.94%.


2008 ◽  
Vol 35 (1) ◽  
pp. 27-52 ◽  
Author(s):  
Peter C. Wong ◽  
Hong Yan ◽  
Colin Bamford

Sign in / Sign up

Export Citation Format

Share Document