code strategy
Recently Published Documents


TOTAL DOCUMENTS

15
(FIVE YEARS 5)

H-INDEX

4
(FIVE YEARS 0)

2021 ◽  
pp. 103-136
Author(s):  
Jonathan Bradbury

This chapter addresses territorial politics and the introduction of devolution in Wales. In seeking to reappraise the politics of devolution in Wales, the chapter focuses on the power politics of how devolution was progressed; the chapter also applies the same framework of analysis on understanding how, why and with what intentions devolution was introduced. It discusses the nature of the territorial strain that Wales posed for the UK and the political resources behind territorial change, considering the extent to which bottom-up pressures had strengthened or not. It considers the politics of elite leadership of constitutional change and the code, strategy and goals of peripheral assertion applied. In so doing, it explores the utility of the proposition that instrumental policy arguments and mechanisms were at the forefront of the case for change. Equally, throughout the chapter there is consideration of how the British Labour leadership politically managed the development of devolution proposals both in opposition and in government, and again of the code, strategy and goals which it pursued. In so doing, the chapter explores the proposition that the Labour leadership adopted traditional territorial management methods to constrain the implications of devolution primarily through local elite assimilation. Finally, the chapter considers the policy process by which devolution proposals were created, both in opposition and in government, and the extent to which it contributed to their perceived effectiveness and legitimacy, and indeed the sense in which Welsh devolution could be also considered in the short to medium term as a successful reform.


2020 ◽  
Vol 3 (1) ◽  
pp. 8
Author(s):  
Li Li ◽  
Ching-Chun Chang ◽  
Junlan Bai ◽  
Hai-Duong Le ◽  
Chi-Cheng Chen ◽  
...  

In medical practice, the scanned image of the patient between the patient and the doctor is confidential. If info is stored on a single server and the server is successfully attacked, it is possible to expose confidential information. Password encryption and data authentication are commonly used to protect patient data, however, encryption and data authentication are computationally expensive and take time to execute on a mobile device. In addition, it is not easy for the patient details related to medical images to leak if the hacked image are not visual.Therefore, in this paper, we propose a way to make medical images remain untouched in this sense. We use our method to quickly create two shadows from two medical images and store them on two servers. Revealing a shadow image does nothing to compromise the confidentiality of a patient’s health. This method is based on Hamming code. With low computational cost, the proposed scheme is suitable for tablet, pamphlets and other mobile devices.


2019 ◽  
Vol 155 (1) ◽  
Author(s):  
Samuel Justiniano-Cordero ◽  
Adrián Tenorio-Terrones ◽  
Gabriela Borrayo-Sánchez ◽  
Raúl Cantero-Colín ◽  
Verónica López-Roldán ◽  
...  

2016 ◽  
Vol 88 (3) ◽  
pp. 1578-1584 ◽  
Author(s):  
Wei Li ◽  
Wei Jiang ◽  
Shuang Dai ◽  
Lei Wang

2013 ◽  
Vol 448-453 ◽  
pp. 3306-3311
Author(s):  
Tao Hao ◽  
Shan Shan Li ◽  
Jian Peng Dong

A thermal power plant, where there are hundred of equipments, and many of them are usually controlled by sequential control system (SCS),which is a part of Distributed control system (DCS). For a relatively independent process system, it can be controlled by some of steps, generally, we use the traditional sequential control module supplied by DCS to construct the control logic. This article introduces a brand new control strategy -- the Sequential Control based on Device Code (SCDC). This control method can be used in the occasion of a large number of equipments to be controlled, with the advantage of clear structure, easy maintenance etc.. This method can be widely used in many technological control fields.


2012 ◽  
Vol 10 (1) ◽  
pp. 1-48 ◽  
Author(s):  
Michael Kimmel

This article presents a software-based methodology for studying metaphor in discourse, mainly within the framework of Conceptual Metaphor Theory (CMT). Despite a welcome recent swing towards methodological reflexivity, a detailed explication of the pros and cons of different procedures is still in order as far as qualitative research (i.e. a context-sensitive manual coding of a text corpus) is concerned. Qualitatively oriented scholars have to make difficult decisions revolving around the general research design, the transfer of linguistic theory into method, good workflow management, and the aimed at scope of analysis. My first task is to pinpoint typical tasks and demonstrate how they are optimally dealt with by using qualitative annotation software like ATLAS.ti. Software not only streamlines metaphor tagging itself, it systematizes the interpretive work from grouping text items into systematic/conceptual metaphor sets, via data surveys and checks, to quantitative comparisons and a cohesion-based analysis. My second task is to illustrate how a good research design can provide a step-wise procedure, offer systematic validation checks, keep the code system slim and many analytic options open. When we aim at complex data searches and want to handle high metaphor diversity I recommend compositional coding, i.e. tagging source and target domains separately (instead of adopting a “one mapping-one code” strategy). Furthermore, by tagging metaphors for image-schematic and rich semantic source domains in parallel, i.e. two-tier coding, we get multiple options for grouping metaphors into systematic sets.


Sign in / Sign up

Export Citation Format

Share Document