10 resultados para 1081
em Digital Commons at Florida International University
Resumo:
Profile on Dr. John A. Rock, founding dean of the Florida International University College of Medicine.
Resumo:
Novel predator introductions are thought to have a high impact on native prey, especially in freshwater systems. Prey may fail to recognize predators as a threat, or show inappropriate or ineffective responses. The ability of prey to recognize and respond appropriately to novel predators may depend on the prey’s use of general or specific cues to detect predation threats.We used laboratory experiments to examine the ability of three native Everglades prey species (Eastern mosquitofish, flagfish and riverine grass shrimp) to respond to the presence, as well as to the chemical and visual cues of a native predator (warmouth) and a recentlyintroduced non-native predator (African jewelfish). We used prey from populations that had not previously encountered jewelfish. Despite this novelty, the native warmouth and nonnative jewelfish had overall similar predatory effects, except on mosquitofish, which suffered higher warmouth predation. When predators were present, the three prey taxa showed consistent and strong responses to the non-native jewelfish, which were similar in magnitude to the responses exhibited to the native warmouth. When cues were presented, fish prey responded largely to chemical cues, while shrimp showed no response to either chemical or visual cues. Overall, responses by mosquitofish and flagfish to chemical cues indicated low differentiation among cue types, with similar responses to general and specific cues. The fact that antipredator behaviours were similar toward native and non-native predators suggests that the susceptibility to a novel fish predator may be similar to that of native fishes, and prey may overcome predator novelty, at least when predators are confamilial to other common and longer-established non-native threats.
Resumo:
In recent years the literature on parental involvement and how it affects children during home learning has emphasized the relevance of promoting student achievement through parental involvement. Research points to a strong connection on the positive effects for families, children, and school when schools extend themselves to parents and involve them to support their children’s development and learning (Olsen & Fuller, 2003) Consequently, the purpose of this research is to attempt to investigate if parents’ comfort level with reading reflects the help that they provide their children at home with their home learning. Our goal is to increase parents’ level of efficacy in relation to helping their children with home learning as it relates to the reading benchmarks.
Resumo:
http://digitalcommons.fiu.edu/com_images/1081/thumbnail.jpg
Resumo:
Strategic planning is the key to producing a realistic, attractive rate of growth and a respectable return on investment. The author analyzes the steps in the planning process and looks at the environmental and cultural values which influence the strategic planner in his/her work.
Resumo:
Vol. 18, Issue 39, 8 pages
Resumo:
Tree islands, a prominent feature in both the marl prairie and ridge and slough landscapes of the Everglades, are sensitive to large-scale restoration actions associated with the Comprehensive Everglades Restoration Plan (CERP) authorized by the Water Resources Development Act (WRDA) 2000 to restore the south Florida ecosystem. More specifically, changes in hydrologic regimes at both local and landscape scales are likely to affect the internal water economy of islands, which in turn will influence plant community structure and function. To strengthen our ability to assess the “performance” of tree island ecosystems and predict how these hydrologic alterations would translate into ecosystem response, an improved understating of reference conditions of vegetation structure and function, and their responses to major stressors is important. In this regard, a study of vegetation structure and composition in relation to associated physical and biological processes was initiated in 2005 with initial funding from Everglades National Park and South Florida Water Management District (SFWMD). The study continued through 2011 with funding from US Army Corps of Engineers (USACOE) (Cooperative Agreement # W912HZ-09-2-0019 Modification No.: P00001).
Resumo:
Recent advances in electronic and computer technologies lead to wide-spread deployment of wireless sensor networks (WSNs). WSNs have wide range applications, including military sensing and tracking, environment monitoring, smart environments, etc. Many WSNs have mission-critical tasks, such as military applications. Thus, the security issues in WSNs are kept in the foreground among research areas. Compared with other wireless networks, such as ad hoc, and cellular networks, security in WSNs is more complicated due to the constrained capabilities of sensor nodes and the properties of the deployment, such as large scale, hostile environment, etc. Security issues mainly come from attacks. In general, the attacks in WSNs can be classified as external attacks and internal attacks. In an external attack, the attacking node is not an authorized participant of the sensor network. Cryptography and other security methods can prevent some of external attacks. However, node compromise, the major and unique problem that leads to internal attacks, will eliminate all the efforts to prevent attacks. Knowing the probability of node compromise will help systems to detect and defend against it. Although there are some approaches that can be used to detect and defend against node compromise, few of them have the ability to estimate the probability of node compromise. Hence, we develop basic uniform, basic gradient, intelligent uniform and intelligent gradient models for node compromise distribution in order to adapt to different application environments by using probability theory. These models allow systems to estimate the probability of node compromise. Applying these models in system security designs can improve system security and decrease the overheads nearly in every security area. Moreover, based on these models, we design a novel secure routing algorithm to defend against the routing security issue that comes from the nodes that have already been compromised but have not been detected by the node compromise detecting mechanism. The routing paths in our algorithm detour those nodes which have already been detected as compromised nodes or have larger probabilities of being compromised. Simulation results show that our algorithm is effective to protect routing paths from node compromise whether detected or not.
Resumo:
The purpose of this research was to develop a theory of high-energy exclusive electrodisintegration of three-nucleon systems on the example of 3He(e, e'NN)N reaction with knocked-out nucleon in the final state. The scattering amplitudes and differential cross section of the reaction were calculated in details within the Generalized Eikonal Approximation(GEA). The manifestly covariant nature of Feynman diagrams derived in GEA allowed us to preserve both the relativistic dynamics and kinematics of the scattering while identifying the low momentum nuclear part of the amplitude with a nonrelativistic nuclear wave function. Numerical calculations of the residual system's total and relative momentum distribution were performed which show reasonable agreement with available experimental data. The theoretical framework of GEA, which was applied previously only for the case of two-body (deuteron) high energy break up reactions, has been practically implemented and shown to provide a valid description for more complex A = 3 systems.