5 resultados para DIGITAL SIGNATURE

em DRUM (Digital Repository at the University of Maryland)


Relevância:

20.00% 20.00%

Publicador:

Resumo:

The Lucumi religion (also Santeria and Regla de Ocha) developed in 19th-century colonial Cuba, by syncretizing elements of Catholicism with the Yoruba worship of orisha. When fully initiated, santeros (priests) actively participate in religious ceremonies by periodically being possessed or "mounted" by a patron saint or orisha, usually within the context of a drumming ritual, known as a toque de santo, bembe, or tambor. Within these rituals, there is a clearly defined goal of trance possession, though its manifestation is not the sole measure of success or failure. Rather than focusing on the fleeting, exciting moments that immediately precede the arrival of an orisha in the form of a possession trance, this thesis investigates the entire four- to six-hour musical performance that is central to the ceremony. It examines the brief pauses, the moments of reduced intensity, the slow but deliberate build-ups of energy and excitement, and even the periods when novices are invited to perform the sacred bata drums, and places these moments on an equal footing with the more dynamic periods where possession is imminent or in progress. This document approaches Lucumi ritual from the viewpoint of bata drummers, ritual specialists who, during the course of a toque de santo, exercise wide latitude in determining the shape of the event. Known as omo Ana (children of the orisha Ana who is manifest in drums and rhythms), bata drummers comprise a fraternity that is accessible only through ritual initiation. Though they are sensitive to the desires of the many participants during a toque de santo, and indeed make their living by satisfying the expectations of their hosts, many of the drummers' activities are inwardly focused on the cultivation and preservation of this fraternity. Occasionally interfering with spirit possession, and other expectations of the participants, these aberrant activities include teaching and learning, developing group identity or signature sound, and achieving a state of intimacy among the musicians known as "communitas."

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In this work we introduce a new mathematical tool for optimization of routes, topology design, and energy efficiency in wireless sensor networks. We introduce a vector field formulation that models communication in the network, and routing is performed in the direction of this vector field at every location of the network. The magnitude of the vector field at every location represents the density of amount of data that is being transited through that location. We define the total communication cost in the network as the integral of a quadratic form of the vector field over the network area. With the above formulation, we introduce a mathematical machinery based on partial differential equations very similar to the Maxwell's equations in electrostatic theory. We show that in order to minimize the cost, the routes should be found based on the solution of these partial differential equations. In our formulation, the sensors are sources of information, and they are similar to the positive charges in electrostatics, the destinations are sinks of information and they are similar to negative charges, and the network is similar to a non-homogeneous dielectric media with variable dielectric constant (or permittivity coefficient). In one of the applications of our mathematical model based on the vector fields, we offer a scheme for energy efficient routing. Our routing scheme is based on changing the permittivity coefficient to a higher value in the places of the network where nodes have high residual energy, and setting it to a low value in the places of the network where the nodes do not have much energy left. Our simulations show that our method gives a significant increase in the network life compared to the shortest path and weighted shortest path schemes. Our initial focus is on the case where there is only one destination in the network, and later we extend our approach to the case where there are multiple destinations in the network. In the case of having multiple destinations, we need to partition the network into several areas known as regions of attraction of the destinations. Each destination is responsible for collecting all messages being generated in its region of attraction. The complexity of the optimization problem in this case is how to define regions of attraction for the destinations and how much communication load to assign to each destination to optimize the performance of the network. We use our vector field model to solve the optimization problem for this case. We define a vector field, which is conservative, and hence it can be written as the gradient of a scalar field (also known as a potential field). Then we show that in the optimal assignment of the communication load of the network to the destinations, the value of that potential field should be equal at the locations of all the destinations. Another application of our vector field model is to find the optimal locations of the destinations in the network. We show that the vector field gives the gradient of the cost function with respect to the locations of the destinations. Based on this fact, we suggest an algorithm to be applied during the design phase of a network to relocate the destinations for reducing the communication cost function. The performance of our proposed schemes is confirmed by several examples and simulation experiments. In another part of this work we focus on the notions of responsiveness and conformance of TCP traffic in communication networks. We introduce the notion of responsiveness for TCP aggregates and define it as the degree to which a TCP aggregate reduces its sending rate to the network as a response to packet drops. We define metrics that describe the responsiveness of TCP aggregates, and suggest two methods for determining the values of these quantities. The first method is based on a test in which we drop a few packets from the aggregate intentionally and measure the resulting rate decrease of that aggregate. This kind of test is not robust to multiple simultaneous tests performed at different routers. We make the test robust to multiple simultaneous tests by using ideas from the CDMA approach to multiple access channels in communication theory. Based on this approach, we introduce tests of responsiveness for aggregates, and call it CDMA based Aggregate Perturbation Method (CAPM). We use CAPM to perform congestion control. A distinguishing feature of our congestion control scheme is that it maintains a degree of fairness among different aggregates. In the next step we modify CAPM to offer methods for estimating the proportion of an aggregate of TCP traffic that does not conform to protocol specifications, and hence may belong to a DDoS attack. Our methods work by intentionally perturbing the aggregate by dropping a very small number of packets from it and observing the response of the aggregate. We offer two methods for conformance testing. In the first method, we apply the perturbation tests to SYN packets being sent at the start of the TCP 3-way handshake, and we use the fact that the rate of ACK packets being exchanged in the handshake should follow the rate of perturbations. In the second method, we apply the perturbation tests to the TCP data packets and use the fact that the rate of retransmitted data packets should follow the rate of perturbations. In both methods, we use signature based perturbations, which means packet drops are performed with a rate given by a function of time. We use analogy of our problem with multiple access communication to find signatures. Specifically, we assign orthogonal CDMA based signatures to different routers in a distributed implementation of our methods. As a result of orthogonality, the performance does not degrade because of cross interference made by simultaneously testing routers. We have shown efficacy of our methods through mathematical analysis and extensive simulation experiments.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

During the second half of the nineteenth century, a series of remarkable advances in musical composition emerged in the works of such innovative spirits as Franz Liszt, Hector Berlioz and Richard Wagner. Their pioneering works exerted an extraordinary impact on the music of the subsequent generation of composers--of disparate nationalities-who were active at the dawn of the 20th century: Including most notably Claude-Achille Debussy, Gustav Mahler, Richard Strauss, and Alexander Nikolayevich Scriabin. These important musical figures, each one leaving an indelible and formative imprint on late-nineteenth century Romantic style, together launched the modern era in music. Scriabin stands alone as a transcendental visionary: His music, initiated in the fashion of Chopin and Liszt, wanders through the realms of Debussy and Wagner, and, ultimately abandoning late Romantic tradition, unlocks the heretofore unforeseen power of atonality, bitonality, polyrhythms and key-signature free compositions. Arguably, Scriabin's compositions count among the most innovative, idiosyncratic and bewitching of all time. The development of Scriabin's groundbreaking compositional style is best understood by means of his piano works, which comprise the majority of his oeuvre. Beyond the larger works-his twelve sonatas, a concerto and a fantasy-Scriabin's piano explorations are also represented by miniature gems: The mazurkas, impromptus, waltzes, poems, a polonaise, etudes, nocturnes, morceaux and, in particular, the preludes. Scriabin's 90 preludes for piano, arranged in several opus numbers, richly exemplify the striking evolution of his ingenious music, his idiosyncratic philosophy and his provocative personality.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Blast-induced Traumatic Brain Injury (bTBI) is the signature injury of the Iraq and Afghanistan wars; however, current understanding of bTBI is insufficient. In this study, novel analysis methods were developed to investigate correlations between external pressures and brain injury predictors. Experiments and simulations were performed to analyze placement of helmet-mounted pressure sensors. A 2D Finite Element model of a helmeted head cross-section was loaded with a blast wave. Pressure time-histories for nodes on the inner and outer surfaces of the helmet were cross-correlated to those inside the brain. Parallel physical experiments were carried out with a helmeted headform, pressure sensors, and pressure chamber. These analysis methods can potentially lead to better helmet designs and earlier detection and treatment of bTBI.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Using scientific methods in the humanities is at the forefront of objective literary analysis. However, processing big data is particularly complex when the subject matter is qualitative rather than numerical. Large volumes of text require specialized tools to produce quantifiable data from ideas and sentiments. Our team researched the extent to which tools such as Weka and MALLET can test hypotheses about qualitative information. We examined the claim that literary commentary exists within political environments and used US periodical articles concerning Russian literature in the early twentieth century as a case study. These tools generated useful quantitative data that allowed us to run stepwise binary logistic regressions. These statistical tests allowed for time series experiments using sea change and emergency models of history, as well as classification experiments with regard to author characteristics, social issues, and sentiment expressed. Both types of experiments supported our claim with varying degrees, but more importantly served as a definitive demonstration that digitally enhanced quantitative forms of analysis can apply to qualitative data. Our findings set the foundation for further experiments in the emerging field of digital humanities.