5 resultados para 3G, Chinese regional cities, mobile phones

em Digital Commons at Florida International University


Relevância:

40.00% 40.00%

Publicador:

Resumo:

Xinjiang, once described by Owen Lattimore as the "pivot of Asia", has played a strategically important role in China's national defense and security. Historically linked on the famous Silk Road with Central Asia, Xinjiang was crucial to East-West economic and cultural exchanges. During the period of Russian/Soviet expansion into Central Asia and Sino-Soviet rivalry, China's need for Xinjiang's defense and territorial integrity became paramount, and consequently Xinjiang's economy was relegated to the periphery.^ The demise of the Soviet Union--which resulted in the independence of five Central Asian states--and China's reform suggest dramatic new possibilities for Xinjiang's regional development as well as interregional cooperation. As China has begun to shift regional emphasis to the interior, Xinjiang's economic development will be accelerated. With the growth of Sino/Xinjiang-Central Asian relations, Xinjiang's importance will not only be borne out in terms of defense and security, but more significantly in terms of trade and economics. At the century's end and the beginning of the 21st century, Xinjiang will likely move away from the periphery and play an increasingly pivotal role in the economy. ^

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This study explores how great powers not allied with the United States formulate their grand strategies in a unipolar international system. Specifically, it analyzes the strategies China and Russia have developed to deal with U.S. hegemony by examining how Moscow and Beijing have responded to American intervention in Central Asia. The study argues that China and Russia have adopted a soft balancing strategy of to indirectly balance the United States at the regional level. This strategy uses normative capabilities such as soft power, alternative institutions and regionalization to offset the overwhelming material hardware of the hegemon. The theoretical and methodological approach of this dissertation is neoclassical realism. Chinese and Russian balancing efforts against the United States are based on their domestic dynamics as well as systemic constraints. Neoclassical realism provides a bridge between the internal characteristics of states and the environment which those states are situated. Because China and Russia do not have the hardware (military or economic power) to directly challenge the United States, they must resort to their software (soft power and norms) to indirectly counter American preferences and set the agenda to obtain their own interests. Neoclassical realism maintains that soft power is an extension of hard power and a reflection of the internal makeup of states. The dissertation uses the heuristic case study method to demonstrate the efficacy of soft balancing. Such case studies help to facilitate theory construction and are not necessarily the demonstrable final say on how states behave under given contexts. Nevertheless, it finds that China and Russia have increased their soft power to counterbalance the United States in certain regions of the world, Central Asia in particular. The conclusion explains how soft balancing can be integrated into the overall balance-of-power framework to explain Chinese and Russian responses to U.S. hegemony. It also suggests that an analysis of norms and soft power should be integrated into the study of grand strategy, including both foreign policy and military doctrine.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Background. An abnormally high incidence (44%) of bronchopulmonary dysplasia with variations in rates among cities was observed in Colombia among premature infants. Objective. To identify risk factors that could explain the observed high incidence and regional variations of bronchopulmonary dysplasia. Study Design. A case-control study was designed for testing the hypothesis that differences in the disease rates were not explained by differences in city-of-birth specific population characteristics or by differences in respiratory management practices in the first 7 days of life, among cities. Results. Multivariate analysis showed that premature rupture of membranes, exposure to mechanical ventilation after received nasal CPAP, no surfactant exposure, use of rescue surfactant (instead of early surfactant), PDA, sepsis and the median daily FIO2, were associated with a higher risk of dysplasia. Significant differences between cases and controls were found among cities. Models exploring for associations between city of birth and dysplasia showed that being born in the highest altitude city (Bogotá) was associated with a higher risk of dysplasia (OR 1.82 95% CI 1.31–2.53). Conclusions. Bronchopulmonary dysplasia was manly explained by traditional risk factors. Findings suggest that altitude may play an important role in the development of this disease. Prenatal steroids did not appear to be protective at high altitude.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

In recent years, there has been an enormous growth of location-aware devices, such as GPS embedded cell phones, mobile sensors and radio-frequency identification tags. The age of combining sensing, processing and communication in one device, gives rise to a vast number of applications leading to endless possibilities and a realization of mobile Wireless Sensor Network (mWSN) applications. As computing, sensing and communication become more ubiquitous, trajectory privacy becomes a critical piece of information and an important factor for commercial success. While on the move, sensor nodes continuously transmit data streams of sensed values and spatiotemporal information, known as ``trajectory information". If adversaries can intercept this information, they can monitor the trajectory path and capture the location of the source node. ^ This research stems from the recognition that the wide applicability of mWSNs will remain elusive unless a trajectory privacy preservation mechanism is developed. The outcome seeks to lay a firm foundation in the field of trajectory privacy preservation in mWSNs against external and internal trajectory privacy attacks. First, to prevent external attacks, we particularly investigated a context-based trajectory privacy-aware routing protocol to prevent the eavesdropping attack. Traditional shortest-path oriented routing algorithms give adversaries the possibility to locate the target node in a certain area. We designed the novel privacy-aware routing phase and utilized the trajectory dissimilarity between mobile nodes to mislead adversaries about the location where the message started its journey. Second, to detect internal attacks, we developed a software-based attestation solution to detect compromised nodes. We created the dynamic attestation node chain among neighboring nodes to examine the memory checksum of suspicious nodes. The computation time for memory traversal had been improved compared to the previous work. Finally, we revisited the trust issue in trajectory privacy preservation mechanism designs. We used Bayesian game theory to model and analyze cooperative, selfish and malicious nodes' behaviors in trajectory privacy preservation activities.^

Relevância:

30.00% 30.00%

Publicador:

Resumo:

In recent years, there has been an enormous growth of location-aware devices, such as GPS embedded cell phones, mobile sensors and radio-frequency identification tags. The age of combining sensing, processing and communication in one device, gives rise to a vast number of applications leading to endless possibilities and a realization of mobile Wireless Sensor Network (mWSN) applications. As computing, sensing and communication become more ubiquitous, trajectory privacy becomes a critical piece of information and an important factor for commercial success. While on the move, sensor nodes continuously transmit data streams of sensed values and spatiotemporal information, known as ``trajectory information". If adversaries can intercept this information, they can monitor the trajectory path and capture the location of the source node. This research stems from the recognition that the wide applicability of mWSNs will remain elusive unless a trajectory privacy preservation mechanism is developed. The outcome seeks to lay a firm foundation in the field of trajectory privacy preservation in mWSNs against external and internal trajectory privacy attacks. First, to prevent external attacks, we particularly investigated a context-based trajectory privacy-aware routing protocol to prevent the eavesdropping attack. Traditional shortest-path oriented routing algorithms give adversaries the possibility to locate the target node in a certain area. We designed the novel privacy-aware routing phase and utilized the trajectory dissimilarity between mobile nodes to mislead adversaries about the location where the message started its journey. Second, to detect internal attacks, we developed a software-based attestation solution to detect compromised nodes. We created the dynamic attestation node chain among neighboring nodes to examine the memory checksum of suspicious nodes. The computation time for memory traversal had been improved compared to the previous work. Finally, we revisited the trust issue in trajectory privacy preservation mechanism designs. We used Bayesian game theory to model and analyze cooperative, selfish and malicious nodes' behaviors in trajectory privacy preservation activities.