position code
Recently Published Documents


TOTAL DOCUMENTS

21
(FIVE YEARS 2)

H-INDEX

4
(FIVE YEARS 0)

2021 ◽  
pp. 1-24
Author(s):  
DongHyun Choi ◽  
Myeong Cheol Shin ◽  
EungGyun Kim ◽  
Dong Ryeol Shin

Abstract Text-to-SQL is the problem of converting a user question into an SQL query, when the question and database are given. In this paper, we present a neural network approach called RYANSQL (Recursively Yielding Annotation Network for SQL) to solve complex Text-to-SQL tasks for cross-domain databases. Statement Position Code (SPC) is defined to transform a nested SQL query into a set of non-nested SELECT statements; a sketch-based slot filling approach is proposed to synthesize each SELECT statement for its corresponding SPC. Additionally, two input manipulation methods are presented to improve generation performance further. RYANSQL achieved competitive result of 58.2% accuracy on the challenging Spider benchmark. At the time of paper submission (April 2020), RYANSQL v2, a variant of original RYANSQL, is positioned at 3rd place among all systems and 1st place among the systems not using database content with 60.6% exact matching accuracy. The source code is available at https://github.com/kakaoenterprise/RYANSQL.



2020 ◽  
Vol 49 (9) ◽  
pp. 22-29 ◽  
Author(s):  
V. O. Chebachev

The article is devoted to SAW RFID systems. The time-position code of the RFID tags is considered. It is proposed to use ReedSolomon codes to increase the noise immunity of the system. The cost of noise immunity is the degradation of information capacity. The coding procedure is optimized for the case when receiving of tag codes is carried out in a correlation way. The procedure for obtaining code using the Matlab is described in detail. The decoding procedure for the RFID tag codes based on the Berlekamp-Massey algorithm is described. Such decoding procedure allows reading codes and correcting decoding errors in real time. A comparative analysis of the probability of a tag code reading error with using and without using the proposed coding in condition of a Gaussian channel for a fixed signal-to-noise ratio. The problem of a more general case of error-correcting coding in SAW RFID systems is viewed.





2020 ◽  
Author(s):  
Keyword(s):  


Author(s):  
M. V. Zaharchenko ◽  
V. V. Hordiichuk ◽  
О. G. Danylchuk

An analysis of the means and principles of electronic intelligence, as well as technologies, that allow access to information, shows that in modern conditions, the need for increasing the effectiveness of countering them is growing. That is why the urgent task is the search or synthesis of signal structures that provide the necessary level of resistance of information messages to the possibility of unauthorized access. To this end, the article explores the principles of signal generation based on timer and position coding. These principles are very different. In positional coding, the length of individual signal segments in the code structure can be equal , and so on. Thus, the distance between the moments of modulation is a multiple of the length and the exact number of code words . When using timer signal constructions, the code word will consist of several information sections that must correspond to the condition , where are integers. Therefore, cannot be less , but contains information about the number. The article shows the number of implementations of timer signal structures and power of the position code, entropy calculated indicating the probability of errors in various parameters. Also considered is a modular time consolidation method and recommendations are given for its use to increase the secrecy of information by generating uncertainty during transmission during encryption. In addition, it is proved that the use of modules of the system of residual classes will increase the efficiency of secrecy of information transmitted by a signal constructed on the basis of timer signal structures.





2013 ◽  
Vol 446-447 ◽  
pp. 1086-1090
Author(s):  
Ying Zhou ◽  
Yan Yao ◽  
Mei Wu

In this paper, a security-monitoring system for tiny relics is proposed, which is used to improve the reliability and stability of the museum security system nowadays. This paper analyzed the security-monitoring system of most of the museums in China, and two defects have been discovered. One is that there is almost no security facility which can provide special protection for tiny relics. The other is that there is no effective way to retrieve rare and valuable relics missing in the museum. The security-monitoring system for tiny relics can make up for these weaknesses by integrating two modules, alarm module and position module. Using reed switch as sensitive element, added with chip PT2262, the alarm module can sense micro movement and send position code to central computer wirelessly. Meanwhile, adopting radio frequency identification (RFID) technology for indoor location, position module can provide precise track of moving objects in museums. Combined with traditional security-monitoring, this system can achieve the best protection for tiny relics.



2012 ◽  
Vol 108 (10) ◽  
pp. 2708-2716 ◽  
Author(s):  
Todd E. Hudson ◽  
Michael S. Landy

Coordinate systems for movement planning are comprised of an anchor point (e.g., retinocentric coordinates) and a representation (encoding) of the desired movement. One of two representations is often assumed: a final-position code describing desired limb endpoint position and a vector code describing movement direction and extent. The existence of movement-planning systems using both representations is controversial. In our experiments, participants completed reaches grouped by target location (providing practice for a final-position code) and the same reaches grouped by movement vector (providing vector-code practice). Target-grouped reaches resulted in the isotropic (circular) distribution of errors predicted for position-coded reaches. The identical reaches grouped by vector resulted in error ellipses aligned with the reach direction, as predicted for vector-coded reaches. Manipulating only recent movement history to provide better learning for one or the other movement code, we provide definitive evidence that both movement representations are used in the identical task.



2010 ◽  
Vol 30 (19) ◽  
pp. 6527-6537 ◽  
Author(s):  
B. Pesaran ◽  
M. J. Nelson ◽  
R. A. Andersen


Sign in / Sign up

Export Citation Format

Share Document