4 resultados para Failure to Thrive

em DigitalCommons@University of Nebraska - Lincoln


Relevância:

80.00% 80.00%

Publicador:

Resumo:

Wireless LAN technology, despite the numerous advantages it has over competing technologies, has not seen widespread deployment. A primary reason for markets not adopting this technology is its failure to provide adequate security. Data that is sent over wireless links can be compromised with utmost ease. In this project, we propose a distributed agent based intrusion detection and response system for wireless LANs that can detect unauthorized wireless elements like access points, wireless clients that are in promiscuous mode etc. The system reacts to intrusions by either notifying the concerned personnel, in case of rogue access points and promiscuous nodes, or by blocking unauthorized users from accessing the network resources.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Wavelength-routed networks (WRN) are very promising candidates for next-generation Internet and telecommunication backbones. In such a network, optical-layer protection is of paramount importance due to the risk of losing large amounts of data under a failure. To protect the network against this risk, service providers usually provide a pair of risk-independent working and protection paths for each optical connection. However, the investment made for the optical-layer protection increases network cost. To reduce the capital expenditure, service providers need to efficiently utilize their network resources. Among all the existing approaches, shared-path protection has proven to be practical and cost-efficient [1]. In shared-path protection, several protection paths can share a wavelength on a fiber link if their working paths are risk-independent. In real-world networks, provisioning is usually implemented without the knowledge of future network resource utilization status. As the network changes with the addition and deletion of connections, the network utilization will become sub-optimal. Reconfiguration, which is referred to as the method of re-provisioning the existing connections, is an attractive solution to fill in the gap between the current network utilization and its optimal value [2]. In this paper, we propose a new shared-protection-path reconfiguration approach. Unlike some of previous reconfiguration approaches that alter the working paths, our approach only changes protection paths, and hence does not interfere with the ongoing services on the working paths, and is therefore risk-free. Previous studies have verified the benefits arising from the reconfiguration of existing connections [2] [3] [4]. Most of them are aimed at minimizing the total used wavelength-links or ports. However, this objective does not directly relate to cost saving because minimizing the total network resource consumption does not necessarily maximize the capability of accommodating future connections. As a result, service providers may still need to pay for early network upgrades. Alternatively, our proposed shared-protection-path reconfiguration approach is based on a load-balancing objective, which minimizes the network load distribution vector (LDV, see Section 2). This new objective is designed to postpone network upgrades, thus bringing extra cost savings to service providers. In other words, by using the new objective, service providers can establish as many connections as possible before network upgrades, resulting in increased revenue. We develop a heuristic load-balancing (LB) reconfiguration approach based on this new objective and compare its performance with an approach previously introduced in [2] and [4], whose objective is minimizing the total network resource consumption.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Previous studies of the Social Gospel movement have acknowledged the fact that Social Gospelers were involved in multiple social reform movements during the Gilded Age and into the Progressive Era. However, most of these studies have failed to explain how the reform experiences of the Social Gospelers contributed to the development of the Social Gospel. The Social Gospelers’ ideas regarding the need to transform society and their strategies for doing so were largely a result of their personal experiences as reformers and their collaboration with other reformers. The knowledge and insight gained from interaction with a variety of reform methods played a vital role in the development of the ideology and theology of the Social Gospel. George Howard Gibson is exemplary of the connections between the Social Gospel movement and several other social reform movements of the time. He was involved in the Temperance movement, was a member of both the Prohibition Party and the People’s Party, and co-founded a Christian socialist cooperative colony. His writings illustrate the formation of his identity as a Social Gospeler as well as his attempts to find an organization through which to realize the kingdom of God on earth. Failure to achieve the changes he desired via prohibition encouraged him to broaden his reform goals. Like many Midwestern Social Gospelers Gibson believed he had found “God’s Party” in the People’s Party, but he rejected reform via the political system once the Populists restricted their attention to the silver issue and fused with the Democratic Party. Yet his involvement with the People’s Party demonstrates the attraction many Social Gospelers had to the reforms proposed in the Omaha Platform of 1892 as well as to the party’s use of revivalistic language and emphasis on producerism and brotherhood. Gibson’s experimentation with a variety of ways to achieve the kingdom of God on earth provides new insight into the experiences and contributions of lay Social Gospelers. Adviser: Kenneth J. Winkle

Relevância:

80.00% 80.00%

Publicador:

Resumo:

A dominant account of perseverative errors in early development contends that such errors reflect a failure to inhibit a prepotent response. This study investigated whether perseveration might also arise from a failure to inhibit a prepotent representation. Children watched as a toy was hidden at an A location, waited during a delay, and then watched the experimenter find the toy. After six observation-only A trials, the toy was hidden at a B location, and children were allowed to search for the toy. Two- and 4-year-olds’ responses on the B trials were significantly biased toward A even though they had never overtly responded to this location. Thus, perseverative biases in early development can arise as a result of prepotent representations, demonstrating that the prepotent-response account is incomplete. We discuss three alternative interpretations of these results, including the possibility that representational and response-based biases reflect the operation of a single, integrated behavioral system.