7 resultados para Military Cooperation

em AMS Tesi di Dottorato - Alm@DL - Università di Bologna


Relevância:

20.00% 20.00%

Publicador:

Resumo:

The femicide in Ciudad Juárez is a story made of extreme violence against women for different reasons, by different actors, under different circumstances, and following different behavioural patterns. All within a gender discrimination frame based on the idea that women are inferior, interchangeable and disposable according to the patriarchal hierarchy still present in Mexico, but strongly reinforced by a sort of conspiracy of silence provoked either by the high impunity rate, the governmental incompetence to solve the crimes, or the general indifference of the population. It is the story of hundreds of kidnapped, raped, in many cases tortured, and murdered young women in the border between Mexico and the United States. The murders first came into light in 1993 and up to now young women continue to “disappear” without any hope of bringing the perpetrators to justice, stopping impunity, convicting the assassins, and bringing justice to the families of the deceased girls and women. The main questions about femicide in Ciudad Juárez seem to be: why were they brutally assassinated?, why most of the crimes have not been solved yet?, why and how is Ciudad Juárez different from other border cities with the same characteristics?, which powers are behind those crimes in a city that implies mainly women as its labor force, and which has the lowest unemployment rate in the whole country? But there are also many other questions dealing more with the context, the Juarences’ lifestyles, the eventual hidden powers behind the crimes, the possible murderers’ reasons, the response of the local civil society, or the international community actions to fight against femicide there, among many other things, that are still waiting for an answer and that this paper will ‘narrate’ in order to provide a holistic panorama for the readers. But above all there is the need to remember that every single woman or girl assassinated there had a name, an identity, a family, a story to be told time after time and as many times as necessary, in order to avoid accepting these crimes just as statistics, as cold numbers that might make us forget the human tragedy that has been flagellating the city since 1993. We must remember as well that their deaths express gender oppression, the inequality of the relations between what is male and what is female, a manifestation of domination, terror, social extermination, patriarchal hegemony, social class and impunity. The city is the perfect mirror where all the contradictions of globalization get reflected. It is there where all the globalization evils are present and survive by sucking their women’s blood. It is a city where some concepts such as gender, migration and power are closely related with a negative connotation.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The Peer-to-Peer network paradigm is drawing the attention of both final users and researchers for its features. P2P networks shift from the classic client-server approach to a high level of decentralization where there is no central control and all the nodes should be able not only to require services, but to provide them to other peers as well. While on one hand such high level of decentralization might lead to interesting properties like scalability and fault tolerance, on the other hand it implies many new problems to deal with. A key feature of many P2P systems is openness, meaning that everybody is potentially able to join a network with no need for subscription or payment systems. The combination of openness and lack of central control makes it feasible for a user to free-ride, that is to increase its own benefit by using services without allocating resources to satisfy other peers’ requests. One of the main goals when designing a P2P system is therefore to achieve cooperation between users. Given the nature of P2P systems based on simple local interactions of many peers having partial knowledge of the whole system, an interesting way to achieve desired properties on a system scale might consist in obtaining them as emergent properties of the many interactions occurring at local node level. Two methods are typically used to face the problem of cooperation in P2P networks: 1) engineering emergent properties when designing the protocol; 2) study the system as a game and apply Game Theory techniques, especially to find Nash Equilibria in the game and to reach them making the system stable against possible deviant behaviors. In this work we present an evolutionary framework to enforce cooperative behaviour in P2P networks that is alternative to both the methods mentioned above. Our approach is based on an evolutionary algorithm inspired by computational sociology and evolutionary game theory, consisting in having each peer periodically trying to copy another peer which is performing better. The proposed algorithms, called SLAC and SLACER, draw inspiration from tag systems originated in computational sociology, the main idea behind the algorithm consists in having low performance nodes copying high performance ones. The algorithm is run locally by every node and leads to an evolution of the network both from the topology and from the nodes’ strategy point of view. Initial tests with a simple Prisoners’ Dilemma application show how SLAC is able to bring the network to a state of high cooperation independently from the initial network conditions. Interesting results are obtained when studying the effect of cheating nodes on SLAC algorithm. In fact in some cases selfish nodes rationally exploiting the system for their own benefit can actually improve system performance from the cooperation formation point of view. The final step is to apply our results to more realistic scenarios. We put our efforts in studying and improving the BitTorrent protocol. BitTorrent was chosen not only for its popularity but because it has many points in common with SLAC and SLACER algorithms, ranging from the game theoretical inspiration (tit-for-tat-like mechanism) to the swarms topology. We discovered fairness, meant as ratio between uploaded and downloaded data, to be a weakness of the original BitTorrent protocol and we drew inspiration from the knowledge of cooperation formation and maintenance mechanism derived from the development and analysis of SLAC and SLACER, to improve fairness and tackle freeriding and cheating in BitTorrent. We produced an extension of BitTorrent called BitFair that has been evaluated through simulation and has shown the abilities of enforcing fairness and tackling free-riding and cheating nodes.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

My aim is to develop a theory of cooperation within the organization and empirically test it. Drawing upon social exchange theory, social identity theory, the idea of collective intentions, and social constructivism, the main assumption of my work implies that both cooperation and the organization itself are continually shaped and restructured by actions, judgments, and symbolic interpretations of the parties involved. Therefore, I propose that the decision to cooperate, expressed say as an intention to cooperate, reflects and depends on a three step social process shaped by the interpretations of the actors involved. The first step entails an instrumental evaluation of cooperation in terms of social exchange. In the second step, this “social calculus” is translated into cognitive, emotional and evaluative reactions directed toward the organization. Finally, once the identification process is completed and membership awareness is established, I propose that individuals will start to think largely in terms of “We” instead of “I”. Self-goals are redefined at the collective level, and the outcomes for self, others, and the organization become practically interchangeable. I decided to apply my theory to an important cooperative problem in management research: knowledge exchange within organizations. Hence, I conducted a quantitative survey among the members of the virtual community, “www.borse.it” (n=108). Within this community, members freely decide to exchange their knowledge about the stock market among themselves. Because of the confirmatory requirements and the structural complexity of the theory proposed (i.e., the proposal that instrumental evaluations will induce social identity and this in turn will causes collective intentions), I use Structural Equation Modeling to test all hypotheses in this dissertation. The empirical survey-based study found support for the theory of cooperation proposed in this dissertation. The findings suggest that an appropriate conceptualization of the decision to exchange knowledge is one where collective intentions depend proximally on social identity (i.e., cognitive identification, affective commitment, and evaluative engagement) with the organization, and this identity depends on instrumental evaluations of cooperators (i.e., perceived value of the knowledge received, assessment of past reciprocity, expected reciprocity, and expected social outcomes of the exchange). Furthermore, I find that social identity fully mediates the effects of instrumental motives on collective intentions.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The term Ambient Intelligence (AmI) refers to a vision on the future of the information society where smart, electronic environment are sensitive and responsive to the presence of people and their activities (Context awareness). In an ambient intelligence world, devices work in concert to support people in carrying out their everyday life activities, tasks and rituals in an easy, natural way using information and intelligence that is hidden in the network connecting these devices. This promotes the creation of pervasive environments improving the quality of life of the occupants and enhancing the human experience. AmI stems from the convergence of three key technologies: ubiquitous computing, ubiquitous communication and natural interfaces. Ambient intelligent systems are heterogeneous and require an excellent cooperation between several hardware/software technologies and disciplines, including signal processing, networking and protocols, embedded systems, information management, and distributed algorithms. Since a large amount of fixed and mobile sensors embedded is deployed into the environment, the Wireless Sensor Networks is one of the most relevant enabling technologies for AmI. WSN are complex systems made up of a number of sensor nodes which can be deployed in a target area to sense physical phenomena and communicate with other nodes and base stations. These simple devices typically embed a low power computational unit (microcontrollers, FPGAs etc.), a wireless communication unit, one or more sensors and a some form of energy supply (either batteries or energy scavenger modules). WNS promises of revolutionizing the interactions between the real physical worlds and human beings. Low-cost, low-computational power, low energy consumption and small size are characteristics that must be taken into consideration when designing and dealing with WSNs. To fully exploit the potential of distributed sensing approaches, a set of challengesmust be addressed. Sensor nodes are inherently resource-constrained systems with very low power consumption and small size requirements which enables than to reduce the interference on the physical phenomena sensed and to allow easy and low-cost deployment. They have limited processing speed,storage capacity and communication bandwidth that must be efficiently used to increase the degree of local ”understanding” of the observed phenomena. A particular case of sensor nodes are video sensors. This topic holds strong interest for a wide range of contexts such as military, security, robotics and most recently consumer applications. Vision sensors are extremely effective for medium to long-range sensing because vision provides rich information to human operators. However, image sensors generate a huge amount of data, whichmust be heavily processed before it is transmitted due to the scarce bandwidth capability of radio interfaces. In particular, in video-surveillance, it has been shown that source-side compression is mandatory due to limited bandwidth and delay constraints. Moreover, there is an ample opportunity for performing higher-level processing functions, such as object recognition that has the potential to drastically reduce the required bandwidth (e.g. by transmitting compressed images only when something ‘interesting‘ is detected). The energy cost of image processing must however be carefully minimized. Imaging could play and plays an important role in sensing devices for ambient intelligence. Computer vision can for instance be used for recognising persons and objects and recognising behaviour such as illness and rioting. Having a wireless camera as a camera mote opens the way for distributed scene analysis. More eyes see more than one and a camera system that can observe a scene from multiple directions would be able to overcome occlusion problems and could describe objects in their true 3D appearance. In real-time, these approaches are a recently opened field of research. In this thesis we pay attention to the realities of hardware/software technologies and the design needed to realize systems for distributed monitoring, attempting to propose solutions on open issues and filling the gap between AmI scenarios and hardware reality. The physical implementation of an individual wireless node is constrained by three important metrics which are outlined below. Despite that the design of the sensor network and its sensor nodes is strictly application dependent, a number of constraints should almost always be considered. Among them: • Small form factor to reduce nodes intrusiveness. • Low power consumption to reduce battery size and to extend nodes lifetime. • Low cost for a widespread diffusion. These limitations typically result in the adoption of low power, low cost devices such as low powermicrocontrollers with few kilobytes of RAMand tenth of kilobytes of program memory with whomonly simple data processing algorithms can be implemented. However the overall computational power of the WNS can be very large since the network presents a high degree of parallelism that can be exploited through the adoption of ad-hoc techniques. Furthermore through the fusion of information from the dense mesh of sensors even complex phenomena can be monitored. In this dissertation we present our results in building several AmI applications suitable for a WSN implementation. The work can be divided into two main areas:Low Power Video Sensor Node and Video Processing Alghoritm and Multimodal Surveillance . Low Power Video Sensor Nodes and Video Processing Alghoritms In comparison to scalar sensors, such as temperature, pressure, humidity, velocity, and acceleration sensors, vision sensors generate much higher bandwidth data due to the two-dimensional nature of their pixel array. We have tackled all the constraints listed above and have proposed solutions to overcome the current WSNlimits for Video sensor node. We have designed and developed wireless video sensor nodes focusing on the small size and the flexibility of reuse in different applications. The video nodes target a different design point: the portability (on-board power supply, wireless communication), a scanty power budget (500mW),while still providing a prominent level of intelligence, namely sophisticated classification algorithmand high level of reconfigurability. We developed two different video sensor node: The device architecture of the first one is based on a low-cost low-power FPGA+microcontroller system-on-chip. The second one is based on ARM9 processor. Both systems designed within the above mentioned power envelope could operate in a continuous fashion with Li-Polymer battery pack and solar panel. Novel low power low cost video sensor nodes which, in contrast to sensors that just watch the world, are capable of comprehending the perceived information in order to interpret it locally, are presented. Featuring such intelligence, these nodes would be able to cope with such tasks as recognition of unattended bags in airports, persons carrying potentially dangerous objects, etc.,which normally require a human operator. Vision algorithms for object detection, acquisition like human detection with Support Vector Machine (SVM) classification and abandoned/removed object detection are implemented, described and illustrated on real world data. Multimodal surveillance: In several setup the use of wired video cameras may not be possible. For this reason building an energy efficient wireless vision network for monitoring and surveillance is one of the major efforts in the sensor network community. Energy efficiency for wireless smart camera networks is one of the major efforts in distributed monitoring and surveillance community. For this reason, building an energy efficient wireless vision network for monitoring and surveillance is one of the major efforts in the sensor network community. The Pyroelectric Infra-Red (PIR) sensors have been used to extend the lifetime of a solar-powered video sensor node by providing an energy level dependent trigger to the video camera and the wireless module. Such approach has shown to be able to extend node lifetime and possibly result in continuous operation of the node.Being low-cost, passive (thus low-power) and presenting a limited form factor, PIR sensors are well suited for WSN applications. Moreover techniques to have aggressive power management policies are essential for achieving long-termoperating on standalone distributed cameras needed to improve the power consumption. We have used an adaptive controller like Model Predictive Control (MPC) to help the system to improve the performances outperforming naive power management policies.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Introduction Lower pole kidney stones represent at time a challenge for the urologist. The gold standard treatment for intrarenal stones <2 cm is Extracorporeal Shock Wave Lithotripsy (ESWL) while for those >2 cm is Percutaneous Nephrolithotomy (PCNL). The success rate of ESWL, however, decreases when it is employed for lower pole stones, and this is particularly true in the presence of narrow calices or acute infundibular angles. Studies have proved that ureteroscopy (URS) is an efficacious alternative to ESWL for lower pole stones <2 cm, but this is not reflected by either the European or the American guidelines. The aim of this study is to present the results of a large series of flexible ureteroscopies and PCNLs for lower pole kidney stones from high-volume centers, in order to provide more evidences on the potential indications of the flexible ureteroscopy for the treatment of kidney stones. Materials and Methods A database was created and the participating centres retrospectively entered their data relating to the percutaneous and flexible ureteroscopic management of lower pole kidney stones. Patients included were treated between January 2005 and January 2010. Variables analyzed included case load number, preoperative and postoperative imaging, stone burden, anaesthesia (general vs. spinal), type of lithotripter, access location and size, access dilation type, ureteral access sheath use, visual clarity, operative time, stone-free rate, complication rate, hospital stay, analgesic requirement and follow-up time. Stone-free rate was defined as absence of residual fragments or presence of a single fragment <2 mm in size at follow-up imaging. Primary end-point was to test the efficacy and safety of flexible URS for the treatment of lower pole stones; the same descriptive analysis was conducted for the PCNL approach, as considered the gold standard for the treatment of lower pole kidney stones. In this setting, no statistical analysis was conducted owing to the different selection criteria of the patients. Secondary end-point consisted in matching the results of stone-free rates, operative time and complications rate of flexible URS and PCNL in the subgroup of patients harbouring lower pole kidney stones between 1 and 2 cm in the higher diameter. Results A total 246 patients met the criteria for inclusion. There were 117 PCNLs (group 1) and 129 flexible URS (group 2). Ninety-six percent of cases were diagnosed by CT KUB scan. Mean stone burden was 175±160 and 50±62 mm2 for groups 1 and 2, respectively. General anaesthesia was induced in 100 % and 80% of groups 1 and 2, respectively. Pneumo-ultrasonic energy was used in 84% of cases in the PCNL group, and holmium laser in 95% of the cases in the flexible URS group. The mean operative time was 76.9±44 and 63±37 minutes for groups 1 and 2 respectively. There were 12 major complications (11%) in group 1 (mainly Grade II complications according to Clavidien classification) and no major complications in group 2. Mean hospital stay was 5.7 and 2.6 days for groups 1 and 2, respectively. Ninety-five percent of group 1 and 52% of group 2 required analgesia for a period longer than 24 hours. Intraoperative stone-free rate after a single treatment was 88.9% for group 1 and 79.1% for group 2. Overall, 6% of group 1 and 14.7% of group 2 required a second look procedure. At 3 months, stone-free rates were 90.6% and 92.2% for groups 1 and 2, respectively, as documented by follow-up CT KUB (22%) or combination of intra-venous pyelogram, regular KUB and/or kidney ultrasound (78%). In the subanalysis conducted comparing 82 vs 65 patients who underwent PCNL and flexible URS for lower pole stones between 1 and 2 cm, intreoperative stone-free rates were 88% vs 68% (p= 0.03), respectively; anyway, after an auxiliary procedure which was necessary in 6% of the cases in group 1 and 23% in group 2 (p=0.03), stone-free rates at 3 months were not statistically significant (91.5% vs 89.2%; p=0.6). Conversely, the patients undergoing PCNL maintained a higher risk of complications during the procedure, with 9 cases observed in this group versus 0 in the group of patients treated with URS (p=0.01) Conclusions These data highlight the value of flexible URS as a very effective and safe option for the treatment of kidney stones; thanks to the latest generation of flexible devices, this new technical approach seems to be a valid alternative in particular for the treatment of lower pole kidney stones less than 2 cm. In high-volume centres and in the hands of skilled surgeons, this technique can approach the stone-free rates achievable through PCNL in lower pole stones between 1 and 2 cm, with a very low risk of complications. Furthermore, the results confirm the high success rate and relatively low morbidity of modern PCNL for lower pole stones, with no difference detectable between the prone and supine position.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

dall'avvento della liberalizzazione, aeroporti e vettori hanno vissuto cambiamenti. Il maggior miglioramneto nella gestione degli aeroporti è una gestione più commerciale ed efficiente. Le forme di regolazione economica e le caratteristiche della gestione manageriale sono state indagate. Dodici paesi sono stati scelti per indagare la situazione del trasporto aereo mondiale, fra questi sia paesi con un sistema maturo sia paesi emergenti. La distribuzione del traffico è stata analizzata con l'indice HHI per evidenziare aeroporti con concentrazione maggiore di 0,25 (in accordo con la normativa statunitense); il sistema aeroportuale è stato analizzato con l'indice di Gini e con l'indice di dominanza. Infine, la teoria dei giochi si è dimostrata un valido supporto per studiare il mercato del trasporto aereo anche con l'uso di giochi di tipo DP

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The times following international or civil conflicts but also violent revolutions often come with unequal share of the peace dividend for men and women. Delusions for women who gained freedom of movement and of roles during conflict but had to step back during reconstruction and peace have been recorded in all regions of the world. The emergence of peacebuilding as a modality for the international community to ensure peace and security has slowly incorporated gender sensitivity at the level of legal and policy instruments. Focusing on Rwanda, a country that has obtained significant gender advancement in the years after the genocide while also obtaining to not relapse into conflict, this research explores to what extent the international community has contributed to this transformation. From a review of evaluations, findings are that many of the interventions did not purse gender equality, and overall the majority understood gender and designed actions is a quite superficial way which would hardly account for the significative advancement in combating gender discrimination that the Government, for its inner political will, is conducting. Then, after a critique from a feminist standpoint to the concept of human security, departing from the assumption (sustained by the Governemnt of Rwanda as well) that domestic violence is a variable influencing level of security relevant at the national level, a review of available secondary data on GBV is conducted an trends over the years analysed. The emerging trends signal a steep increase in prevalence of GBV and in domestic violence in particular. Although no conclusive interpretation can be formulated on these data, there are elements suggesting the increase might be due to augmented reporting. The research concludes outlining possible further research pathways to better understand the link in Rwanda between the changing gender norms and the GBV.