3 resultados para Cartographic updating
em DigitalCommons@University of Nebraska - Lincoln
Resumo:
Collectively, the observations indicate that the overall warming of the Arctic system continued in 2007. There are some elements that are stabilizing or returning to climatological norms. These mixed tendencies illustrate the sensitivity and complexity of the Arctic System. Atmosphere: Hot spot shifts toward Europe Ocean: North Pole Temperatures at depth returning to 1990s values Sea Ice: Summer extent at record minimum Greenland: Recent warm temperatures associated with net ice loss Biology: increasing tundra shrub cover and variable treeline advance; up to 80% declines in some caribou herds while goose populations double Land: Increase in permafrost temperatures The Arctic Report Card 2007 is introduced as a means of presenting clear, reliable and concise information on recent observations of environmental conditions in the Arctic, relative to historical time series records. It provides a method of updating and expanding the content of the State of the Arctic Report, published in fall 2006, to reflect current conditions. Material presented in the Report Card is prepared by an international team of scientists and is peer-reviewed by topical experts nominated by the US Polar Research Board. The audience for the Arctic Report Card is wide, including scientists, students, teachers, decision makers and the general public interested in Arctic environment and science. The web-based format will facilitate future timely updates of the content.
Resumo:
Key management is a core mechanism to ensure the security of applications and network services in wireless sensor networks. It includes two aspects: key distribution and key revocation. Key distribution has been extensively studied in the context of sensor networks. However, key revocation has received relatively little attention. Existing key revocation schemes can be divided into two categories: centralized key revocation scheme and distributed key revocation scheme. In this paper, we first summarize the current key revocation schemes for sensor networks. Then, we propose an efficient centralized key revocation scheme, KeyRev, for wireless sensor networks. Unlike most proposed key revocation schemes focusing on removing the compromised keys, we propose to use key updating techniques to obsolesce the keys owned by the compromised sensor nodes and thus remove the nodes from the network. Our analyses show that the KeyRev scheme is secure inspite of not removing the pre-distributed key materials at compromised sensor nodes. Simulation results also indicate that the KeyRev scheme is scalable and performs very well in wireless sensor networks.
Resumo:
This study evaluates the content and quality of academic library websites. An evaluation checklist is used as a tool for evaluation of academic library websites. The checklist is divided into five main parts followed by Rating Table. The quantitative pointing system (ten point scale) and five point rating scales are used to evaluate and rank the websites. The study reveals that very few (16 percent) websites provide information about the date of last updating. Similarly very few (20 percent) websites provide links to other web reference sites and a moderate number (40 percent) have feedback forms for comments. On the other side, a good number of websites (76 percent) are efficient in loading images, icons, and graphics, and a large number (80 percent) have incorporated a web OPAC. The study is limited to the evaluation of websites of five academic libraries located in Bangalore, India.