14 resultados para Cooperation-based initiatives

em Digital Commons at Florida International University


Relevância:

40.00% 40.00%

Publicador:

Resumo:

Small states that lack capacity and act on their own may fall victim to international and domestic terrorism, transnational organized crime or criminal gangs. The critical issue is not whether small Caribbean states should cooperate in meeting security challenges, but it is rather in what manner, and by which mechanisms can they overcome obstacles in the way of cooperation. The remit of the Regional Security System (RSS) has expanded dramatically, but its capabilities have improved very slowly. The member governments of the RSS are reluctant to develop military capacity beyond current levels since they see economic and social development and disaster relief as priorities, requiring little investment in military hardware. The RSS depends on international donors such as the USA, Canada, Great Britain, and increasingly China to fund training programs, maintain equipment and acquire material. In the view of most analysts, an expanded regional arrangement based on an RSS nucleus is not likely in the foreseeable future. Regional political consensus remains elusive and the predominance of national interests over regional considerations continues to serve as an obstacle to any CARICOM wide regional defense mechanism. Countries in the Caribbean, including the members of the RSS, have to become more responsible for their own security from their own resources. While larger CARICOM economies can do this, it would be difficult for most OECS members of the RSS to do the same. The CARICOM region including the RSS member countries, have undertaken direct regional initiatives in security collaboration. Implementation of the recommendations of the Regional Task Force on Crime and Security (RTFCS) and the structure and mechanisms created for the staging of the Cricket World Cup (CWC 2007) resulted in unprecedented levels of cooperation and permanent legacy institutions for the regional security toolbox. The most important tier of security relationships for the region is the United States and particularly USSOUTHCOM. The Caribbean Basin Security Initiative [CBSI] in which the countries of the RSS participate is a useful U.S. sponsored tool to strengthen the capabilities of the Caribbean countries and promote regional ownership of security initiatives. Future developments under discussion by policy makers in the Caribbean security environment include the granting of law enforcement authority to the military, the formation of a single OECS Police Force, and the creation of a single judicial and law enforcement space. The RSS must continue to work with its CARICOM partners, as well as with the traditional “Atlantic Powers” particularly Canada, the United States and the United Kingdom to implement a general framework for regional security collaboration. Regional security cooperation should embrace wider traditional and non-traditional elements of security appropriate to the 21st century. Security cooperation must utilize to the maximum the best available institutions, mechanisms, techniques and procedures already available in the region. The objective should not be the creation of new agencies but rather the generation of new resources to take effective operations to higher cumulative levels. Security and non-security tools should be combined for both strategic and operational purposes. Regional, hemispheric, and global implications of tactical and operational actions must be understood and appreciated by the forces of the RSS member states. The structure and mechanisms, created for the staging of Cricket World Cup 2007 should remain as legacy institutions and a toolbox for improving regional security cooperation in the Caribbean. RSS collaboration should build on the process of operational level synergies with traditional military partners. In this context, the United States must be a true partner with shared interests, and with the ability to work unobtrusively in a nationalistic environment. Withdrawal of U.S. support for the RSS is not an option.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The purpose of this study was to determine if an experimental context-based delivery format for mathematics would be more effective than a traditional model for increasing the performance in mathematics of at-risk students in a public high school of choice, as evidenced by significant gains in achievement on the standards-based Mathematics subtest of the FCAT and final academic grades in Algebra I. The guiding rationale for this approach is captured in the Secretary's Commission on Achieving Necessary Skills (SCANS) report of 1992 that resulted in school-to-work initiatives (United States Department of Labor). Also, the charge for educational reform has been codified at the state level as Educational Accountability Act of 1971 (Florida Statutes, 1995) and at the national level as embodied in the No Child Left Behind Act of 2001. A particular focus of educational reform is low performing, at-risk students. ^ This dissertation explored the effects of a context-based curricular reform designed to enhance the content of Algebra I content utilizing a research design consisting of two delivery models: a traditional content-based course; and, a thematically structured, content-based course. In this case, the thematic element was business education as there are many advocates in career education who assert that this format engages students who are often otherwise disinterested in mathematics in a relevant, SCANS skills setting. The subjects in each supplementary course were ninth grade students who were both low performers in eighth grade mathematics and who had not passed the eighth grade administration of the standards-based FCAT Mathematics subtest. The sample size was limited to two groups of 25 students and two teachers. The site for this study was a public charter school. Student-generated performance data were analyzed using descriptive statistics. ^ Results indicated that contrary to the beliefs held by many, contextual presentation of content did not cause significant gains in either academic performance or test performance for those in the experimental treatment group. Further, results indicated that there was no meaningful difference in performance between the two groups. ^

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Wireless sensor networks are emerging as effective tools in the gathering and dissemination of data. They can be applied in many fields including health, environmental monitoring, home automation and the military. Like all other computing systems it is necessary to include security features, so that security sensitive data traversing the network is protected. However, traditional security techniques cannot be applied to wireless sensor networks. This is due to the constraints of battery power, memory, and the computational capacities of the miniature wireless sensor nodes. Therefore, to address this need, it becomes necessary to develop new lightweight security protocols. This dissertation focuses on designing a suite of lightweight trust-based security mechanisms and a cooperation enforcement protocol for wireless sensor networks. This dissertation presents a trust-based cluster head election mechanism used to elect new cluster heads. This solution prevents a major security breach against the routing protocol, namely, the election of malicious or compromised cluster heads. This dissertation also describes a location-aware, trust-based, compromise node detection, and isolation mechanism. Both of these mechanisms rely on the ability of a node to monitor its neighbors. Using neighbor monitoring techniques, the nodes are able to determine their neighbors’ reputation and trust level through probabilistic modeling. The mechanisms were designed to mitigate internal attacks within wireless sensor networks. The feasibility of the approach is demonstrated through extensive simulations. The dissertation also addresses non-cooperation problems in multi-user wireless sensor networks. A scalable lightweight enforcement algorithm using evolutionary game theory is also designed. The effectiveness of this cooperation enforcement algorithm is validated through mathematical analysis and simulation. This research has advanced the knowledge of wireless sensor network security and cooperation by developing new techniques based on mathematical models. By doing this, we have enabled others to build on our work towards the creation of highly trusted wireless sensor networks. This would facilitate its full utilization in many fields ranging from civilian to military applications.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This research involves the design, development, and theoretical demonstration of models resulting in integrated misbehavior resolution protocols for ad hoc networked devices. Game theory was used to analyze strategic interaction among independent devices with conflicting interests. Packet forwarding at the routing layer of autonomous ad hoc networks was investigated. Unlike existing reputation based or payment schemes, this model is based on repeated interactions. To enforce cooperation, a community enforcement mechanism was used, whereby selfish nodes that drop packets were punished not only by the victim, but also by all nodes in the network. Then, a stochastic packet forwarding game strategy was introduced. Our solution relaxed the uniform traffic demand that was pervasive in other works. To address the concerns of imperfect private monitoring in resource aware ad hoc networks, a belief-free equilibrium scheme was developed that reduces the impact of noise in cooperation. This scheme also eliminated the need to infer the private history of other nodes. Moreover, it simplified the computation of an optimal strategy. The belief-free approach reduced the node overhead and was easily tractable. Hence it made the system operation feasible. Motivated by the versatile nature of evolutionary game theory, the assumption of a rational node is relaxed, leading to the development of a framework for mitigating routing selfishness and misbehavior in Multi hop networks. This is accomplished by setting nodes to play a fixed strategy rather than independently choosing a rational strategy. A range of simulations was carried out that showed improved cooperation between selfish nodes when compared to older results. Cooperation among ad hoc nodes can also protect a network from malicious attacks. In the absence of a central trusted entity, many security mechanisms and privacy protections require cooperation among ad hoc nodes to protect a network from malicious attacks. Therefore, using game theory and evolutionary game theory, a mathematical framework has been developed that explores trust mechanisms to achieve security in the network. This framework is one of the first steps towards the synthesis of an integrated solution that demonstrates that security solely depends on the initial trust level that nodes have for each other.^

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Monitoring Ecosystems brings together leading scientists and researchers to offer a ground-breaking synthesis of lessons learned about ecological monitoring in major ecoregional initiatives around the United States. Contributors present insights and experiences gained from their work in designing, developing, and implementing comprehensive ecosystem monitoring programs in the Pacific Northwest, the lower Colorado River Basin, and the Florida Everglades. The book: outlines the conceptual and scientific underpinnings for regional-scale ecosystem monitoring examines the role and importance of data management, modeling, and integrative analyses considers techniques for and experience with monitoring habitats, populations, and communities Chapters by the editors synthesize and expand on points made throughout the volume and present recommendations for establishing frameworks for monitoring across scales, from local to international. Monitoring Ecosystems presents a critical examination of the lessons learned from direct experience along with generalized conclusions that can be applied to monitoring programs in the United States and around the world. It is a vital contribution to science-based monitoring efforts that will allow those responsible for developing and implementing ecoregional initiatives to make use of knowledge gained in previous efforts.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

In the new health paradigm, the connotation of health has extended beyond the measures of morbidity and mortality to include wellness and quality of life. Comprehensive assessments of health go beyond traditional biological indicators to include measures of physical and mental health status, social role-functioning, and general health perceptions. To meet these challenges, tools for assessment and outcome evaluation are being designed to collect information about functioning and well-being from the individual's point of view.^ The purpose of this study was to profile the physical and mental health status of a sample of county government employees against U.S. population norms. A second purpose of the study was to determine if significant relationships existed between respondent characteristics and personal health practices, lifestyle and other health how the tools and methods used in this investigation can be used to guide program development and facilitate monitoring of health promotion initiatives.^ The SF-12 Health Survey (Ware, Kosinski, & Keller, 1995), a validated measure of health status, was administered to a convenience sample of 450 employees attending one of nine health fairs at an urban worksite. The instrument has been utilized nationally which enabled a comparative analysis of findings of this study with national results.^ Results from this study demonstrated that several respondent characteristics and personal health practices were associated with a greater percentage of physical and/or mental scale scores that were significantly "worse" or significantly "better" than the general population. Respondent characteristics that were significantly related to the SF-12 physical and/or mental health scale scores were gender, age, education, ethnicity, and income status. Personal health practices that were significantly related to SF-12 physical and/or mental scale scores were frequency of vigorous exercise, presence of chronic illness, being at one's prescribed height and weight, eating breakfast, smoking and drinking status. This study provides an illustration of the methods used to analyze and interpret SF-12 Health Survey data, using norm-based interpretation guidelines which are useful for purposes of program development and collecting information on health at the community level. ^

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This study used a cross-sectional design and descriptive research methodology to assess the characteristics and practices of employers participating in Florida school-to-work (STW) initiatives, the factors influencing their participation, and their STW partnerships with schools. The study also examined the relationships between employer characteristics and participation. ^ A sampling frame of 15,202 employers from the 28 Florida STW regions was constructed. Data were collected via a mail survey with a random sample of employers, using a researcher-designed questionnaire. Data were analyzed using descriptive statistics, correlational analysis, and analysis of variance. ^ At the 95% confidence level, it was estimated that the mean establishment size in the population is between 25 and 51 employees and that employers have been involved in STW partnerships between five and seven years. ^ The study revealed broad-based employer participation in three of four areas: Working with Students, Working with Educators, and Internal Company Practices Supporting STW. A fourth area, Building a System, showed generally low participation. Data indicate that workforce needs are important incentives to employer STW participation beyond their desire to contribute to education or the community. Data also indicate that lack of information on STW is the greatest barrier to employer participation. ^ Sample employers have more positive perceptions of the value of their partnerships with schools than of the quality of the partnerships. Ninety-four percent agreed that students are better prepared for work and careers as a result of the partnership's activities. More than half agreed that a sense of trust and good communication exist between educators and employer partners. ^ Employer variables found to have a significant, positive relationship with participation include size (coefficient of determination r2 = .116), years in STW partnerships (r2 = .128), and perceptions of partnership quality (r2 = .092) and value (r2 = .112). ^ A major conclusion based on the findings of this study is that employer participation is optimized in initiatives that achieve important STW outcomes for students and build long-term relationships between employers and schools. Another that in Florida, the STW Opportunities Act of 1994 has not resulted in substantially greater employer involvement in building a STW system. ^

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This study examined standards-based mathematics reform initiatives to determine if they would improve student achievement on the part of low-performing students. New curricula, the Carnegie Learning Cognitive Tutor®, were provided for algebra and geometry students. The new instructional strategy relied on both the teacher-led instruction and the use of computers to differentiate instruction for individual students. Mathematics teachers received ongoing professional development to help them implement the new curricula. In addition, teachers were provided with ongoing support to assist them with the transformation of the learning environments for students using standards-based practices. This quasi-experimental (nonrandomized) study involved teachers in two matched urban high schools. Analyses (ANCOVAs) revealed that the experimental group with an appropriately implemented program had significantly higher learning gains than the comparison group as determined by the students' 2007 mathematics Developmental Scale Score (DSS). In addition, the experimental group's adjusted mean for the second interim mathematics assessment was significantly higher than the comparison group's mean. The findings support the idea that if the traditional curriculum is replaced with standards-based curriculum, and the curriculum is implemented as intended, low-performing students may make significant learning gains. With respect to the teaching practices as observed with the Classroom Observation Protocol (COP), t-tests were conducted on four constructs. The results for both the algebra and geometry teachers on the constructs were not significant. The COP indicated that teachers in both the experimental and comparison groups used traditional instruction strategies in their classrooms. The analyses of covariance (ANCOVA) on the use of technology revealed no significant main effects for computer use.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The increasing needs for computational power in areas such as weather simulation, genomics or Internet applications have led to sharing of geographically distributed and heterogeneous resources from commercial data centers and scientific institutions. Research in the areas of utility, grid and cloud computing, together with improvements in network and hardware virtualization has resulted in methods to locate and use resources to rapidly provision virtual environments in a flexible manner, while lowering costs for consumers and providers. ^ However, there is still a lack of methodologies to enable efficient and seamless sharing of resources among institutions. In this work, we concentrate in the problem of executing parallel scientific applications across distributed resources belonging to separate organizations. Our approach can be divided in three main points. First, we define and implement an interoperable grid protocol to distribute job workloads among partners with different middleware and execution resources. Second, we research and implement different policies for virtual resource provisioning and job-to-resource allocation, taking advantage of their cooperation to improve execution cost and performance. Third, we explore the consequences of on-demand provisioning and allocation in the problem of site-selection for the execution of parallel workloads, and propose new strategies to reduce job slowdown and overall cost.^

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Virtual machines (VMs) are powerful platforms for building agile datacenters and emerging cloud systems. However, resource management for a VM-based system is still a challenging task. First, the complexity of application workloads as well as the interference among competing workloads makes it difficult to understand their VMs’ resource demands for meeting their Quality of Service (QoS) targets; Second, the dynamics in the applications and system makes it also difficult to maintain the desired QoS target while the environment changes; Third, the transparency of virtualization presents a hurdle for guest-layer application and host-layer VM scheduler to cooperate and improve application QoS and system efficiency. This dissertation proposes to address the above challenges through fuzzy modeling and control theory based VM resource management. First, a fuzzy-logic-based nonlinear modeling approach is proposed to accurately capture a VM’s complex demands of multiple types of resources automatically online based on the observed workload and resource usages. Second, to enable fast adaption for resource management, the fuzzy modeling approach is integrated with a predictive-control-based controller to form a new Fuzzy Modeling Predictive Control (FMPC) approach which can quickly track the applications’ QoS targets and optimize the resource allocations under dynamic changes in the system. Finally, to address the limitations of black-box-based resource management solutions, a cross-layer optimization approach is proposed to enable cooperation between a VM’s host and guest layers and further improve the application QoS and resource usage efficiency. The above proposed approaches are prototyped and evaluated on a Xen-based virtualized system and evaluated with representative benchmarks including TPC-H, RUBiS, and TerraFly. The results demonstrate that the fuzzy-modeling-based approach improves the accuracy in resource prediction by up to 31.4% compared to conventional regression approaches. The FMPC approach substantially outperforms the traditional linear-model-based predictive control approach in meeting application QoS targets for an oversubscribed system. It is able to manage dynamic VM resource allocations and migrations for over 100 concurrent VMs across multiple hosts with good efficiency. Finally, the cross-layer optimization approach further improves the performance of a virtualized application by up to 40% when the resources are contended by dynamic workloads.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Wireless sensor networks are emerging as effective tools in the gathering and dissemination of data. They can be applied in many fields including health, environmental monitoring, home automation and the military. Like all other computing systems it is necessary to include security features, so that security sensitive data traversing the network is protected. However, traditional security techniques cannot be applied to wireless sensor networks. This is due to the constraints of battery power, memory, and the computational capacities of the miniature wireless sensor nodes. Therefore, to address this need, it becomes necessary to develop new lightweight security protocols. This dissertation focuses on designing a suite of lightweight trust-based security mechanisms and a cooperation enforcement protocol for wireless sensor networks. This dissertation presents a trust-based cluster head election mechanism used to elect new cluster heads. This solution prevents a major security breach against the routing protocol, namely, the election of malicious or compromised cluster heads. This dissertation also describes a location-aware, trust-based, compromise node detection, and isolation mechanism. Both of these mechanisms rely on the ability of a node to monitor its neighbors. Using neighbor monitoring techniques, the nodes are able to determine their neighbors’ reputation and trust level through probabilistic modeling. The mechanisms were designed to mitigate internal attacks within wireless sensor networks. The feasibility of the approach is demonstrated through extensive simulations. The dissertation also addresses non-cooperation problems in multi-user wireless sensor networks. A scalable lightweight enforcement algorithm using evolutionary game theory is also designed. The effectiveness of this cooperation enforcement algorithm is validated through mathematical analysis and simulation. This research has advanced the knowledge of wireless sensor network security and cooperation by developing new techniques based on mathematical models. By doing this, we have enabled others to build on our work towards the creation of highly trusted wireless sensor networks. This would facilitate its full utilization in many fields ranging from civilian to military applications.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This study examined standards-based mathematics reform initiatives to determine if they would improve student achievement on the part of low-performing students. New curricula, the Carnegie Learning Cognitive Tutor®, were provided for algebra and geometry students. The new instructional strategy relied on both the teacher-led instruction and the use of computers to differentiate instruction for individual students. Mathematics teachers received ongoing professional development to help them implement the new curricula. In addition, teachers were provided with ongoing support to assist them with the transformation of the learning environments for students using standards-based practices. This quasi-experimental (nonrandomized) study involved teachers in two matched urban high schools. Analyses (ANCOVAs) revealed that the experimental group with an appropriately implemented program had significantly higher learning gains than the comparison group as determined by the students' 2007 mathematics Developmental Scale Score (DSS). In addition, the experimental group's adjusted mean for the second interim mathematics assessment was significantly higher than the comparison group's mean. The findings support the idea that if the traditional curriculum is replaced with standards-based curriculum, and the curriculum is implemented as intended, low-performing students may make significant learning gains. With respect to the teaching practices as observed with the Classroom Observation Protocol (COP), t-tests were conducted on four constructs. The results for both the algebra and geometry teachers on the constructs were not significant. The COP indicated that teachers in both the experimental and comparison groups used traditional instruction strategies in their classrooms. The analyses of covariance (ANCOVA) on the use of technology revealed no significant main effects for computer use.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

All A’s was designed to support of the agency’s family strengthening initiatives in South Florida. All A’s uses evidence informed strategies poised to be an inclusive curriculum that teaches self-determination and adaptive behavior skills. The framework incorporates problem based learning and adult learning theory and follows the Universal Design for Learning. Since 2012, the agency has served over 8500 youth and 4,000 adults using the framework. The framework addresses educational underachievement and career readiness in at risk populations. It is used to enhance participants AWARENESS of setting SMART goals to achieve future goals and career aspirations. Participants are provided with ACCESS to resources and opportunities for creating and implementing an ACTION plan as they pursue and ACHIEVE their goals. All A’s promotes protective factors and expose youth to career pathways in Science, Technology, Engineering and Math (STEM) related fields. Youth participate in college tours, job site visits, job shadowing, high school visits, online college and career preparation assistance, service learning projects, STEM projects, and the Winning Futures© mentoring program. Adults are assisted with résumé development; learn job search strategies, interview techniques, job shadowing experiences, computer and financial literacy programs. Adults and youth are also given the opportunity to complete industry-recognized certifications in high demand industries (food service, general labor, and construction), and test preparation for the General Educational Development Test.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The increasing needs for computational power in areas such as weather simulation, genomics or Internet applications have led to sharing of geographically distributed and heterogeneous resources from commercial data centers and scientific institutions. Research in the areas of utility, grid and cloud computing, together with improvements in network and hardware virtualization has resulted in methods to locate and use resources to rapidly provision virtual environments in a flexible manner, while lowering costs for consumers and providers. However, there is still a lack of methodologies to enable efficient and seamless sharing of resources among institutions. In this work, we concentrate in the problem of executing parallel scientific applications across distributed resources belonging to separate organizations. Our approach can be divided in three main points. First, we define and implement an interoperable grid protocol to distribute job workloads among partners with different middleware and execution resources. Second, we research and implement different policies for virtual resource provisioning and job-to-resource allocation, taking advantage of their cooperation to improve execution cost and performance. Third, we explore the consequences of on-demand provisioning and allocation in the problem of site-selection for the execution of parallel workloads, and propose new strategies to reduce job slowdown and overall cost.