7 resultados para Elementary shortest path with resource constraints
em Digital Commons at Florida International University
Resumo:
Writing is an academic skill critical to students in today's schools as it serves as a predominant means for demonstrating knowledge during school years (Graham, 2008). However, for many students with Specific Learning Disabilities (SLD), learning to write is a challenging, complex process (Lane, Graham, Harris, & Weisenbach, 2006). Students SLD have substantial writing challenges related to the nature of their disability (Mayes & Calhoun, 2005). ^ This study investigated the effects of computer graphic organizer software on the narrative writing compositions of four, fourth- and fifth-grade, elementary-level boys with SLD. A multiple baseline design across subjects was used to explore the effects of the computer graphic organizer software on four dependent variables: total number of words, total planning time, number of common story elements, and overall organization. ^ Prior to baseline, participants were taught the fundamentals of narrative writing. Throughout baseline and intervention, participants were read a narrative writing prompt and were allowed up to 10 minutes to plan their writing, followed by 15 minutes for writing, and 5 minutes of editing. During baseline, all planning was done using paper and pencil. During intervention, planning was done on the computer using a graphic organizer developed from the software program Kidspiration 3.0 (2011). All compositions were written and editing was done using paper and pencil during baseline and intervention. ^ The results of this study indicated that to varying degrees computer graphic organizers had a positive effect on the narrative writing abilities of elementary aged students with SLD. Participants wrote more words (from 54.74 to 96.60 more), planned for longer periods of time (from 4.50 to 9.50 more minutes), and included more story elements in their compositions (from 2.00 to 5.10 more out of a possible 6). There were nominal to no improvements in overall organization across the 4 participants. ^ The results suggest that teachers of students with SLD should considering use computer graphic organizers in their narrative writing instruction, perhaps in conjunction with remedial writing strategies. Future investigations can include other types of writing genres, other stages of writing, participants with varied demographics and their use combined with remedial writing instruction. ^
Resumo:
Insect biodiversity is unevenly distributed on local, regional, and global scales. Elevation is a key factor in the uneven distribution of insect diversity, serving as a proxy for a host of environmental variables. My study examines the relationship of Heteroptera (true bugs) species diversity, abundance, and morphology to elevational gradients and land-use regimes on Mt. Kilimanjaro, Tanzania, East Africa. Heteroptera specimens were collected from 60 research sites covering an elevational range of 3684m (866-4550m above sea level). Thirty of the sites were classified as natural, while the remaining 30 were classified as disturbed (e.g., agricultural use or converted to grasslands). I measured aspects of the body size of adult specimens and recorded their location of origin. I used regression models to analyze the relationships of Heteroptera species richness, abundance, and body measurements to elevation and land-use regime. Richness and abundance declined with greater elevation, controlling for land use. The declines were linear or logarithmic in form, depending on the model. Richness and abundance were greater in natural than disturbed sites, controlling for elevation. According to an interaction, richness decreased more in natural than disturbed sites with rising elevation. Body length increased as a quadratic function of elevation, adjusting for land use. Body width X length decreased as a logarithmic function of elevation, while leg length/body length decreased as a quadratic function. Leg length/body length was greater in disturbed than natural sites. Interactions indicated that body length and body width X length were greater in natural than disturbed sites as elevation rose, although the general trend was downward. Future research should examine the relative importance of land area, temperature, and resource constraints for Heteroptera diversity and morphology on Mt. Kilimanjaro.
Resumo:
The extant literature had studied the determinants of the firms’ location decisions with help of host country characteristics and distances between home and host countries. Firm resources and its internationalization strategies had found limited attention in this literature. To address this gap, the research question in this dissertation was whether and how firms’ resources and internationalization strategies impacted the international location decisions of emerging market firms. To explore the research question, data were hand-collected from Indian software firms on their location decisions taken between April 2000 and March 2009. To analyze the multi-level longitudinal dataset, hierarchical linear modeling was used. The results showed that the internationalization strategies, namely market-seeking or labor-seeking had direct impact on firms’ location decision. This direct relationship was moderated by firm resource which, in case of Indian software firms, was the appraisal at CMMI level-5. Indian software firms located in developed countries with a market-seeking strategy and in emerging markets with a labor-seeking strategy. However, software firms with resource such as CMMI level-5 appraisal, when in a labor-seeking mode, were more likely to locate in a developed country over emerging market than firms without the appraisal. Software firms with CMMI level-5 appraisal, when in market-seeking mode, were more likely to locate in a developed country over an emerging market than firms without the appraisal. It was concluded that the internationalization strategies and resources of companies predicted their location choices, over and above the variables studied in the theoretical field of location determinants.
Resumo:
The extant literature had studied the determinants of the firms’ location decisions with help of host country characteristics and distances between home and host countries. Firm resources and its internationalization strategies had found limited attention in this literature. To address this gap, the research question in this dissertation was whether and how firms’ resources and internationalization strategies impacted the international location decisions of emerging market firms. ^ To explore the research question, data were hand-collected from Indian software firms on their location decisions taken between April 2000 and March 2009. To analyze the multi-level longitudinal dataset, hierarchical linear modeling was used. The results showed that the internationalization strategies, namely market-seeking or labor-seeking had direct impact on firms’ location decision. This direct relationship was moderated by firm resource which, in case of Indian software firms, was the appraisal at CMMI level-5. Indian software firms located in developed countries with a market-seeking strategy and in emerging markets with a labor-seeking strategy. However, software firms with resource such as CMMI level-5 appraisal, when in a labor-seeking mode, were more likely to locate in a developed country over emerging market than firms without the appraisal. Software firms with CMMI level-5 appraisal, when in market-seeking mode, were more likely to locate in a developed country over an emerging market than firms without the appraisal. ^ It was concluded that the internationalization strategies and resources of companies predicted their location choices, over and above the variables studied in the theoretical field of location determinants.^
Biotic and abiotic determinants of intermediate-consumer trophic diversity in the Florida everglades
Resumo:
Food-web structure can shape population dynamics and ecosystem functioning and stability. We investigated the structure of a food-web fragment consisting of dominant intermediate consumers (fishes and crayfishes) in the Florida Everglades, using stable isotope analysis to quantify trophic diversity along gradients of primary production (periphyton), disturbance (marsh drying) and intermediate-consumer density (a possible indicator of competition). We predicted that trophic diversity would increase with resource availability and decrease after disturbance, and that competition could result in greater trophic diversity by favouring resource partitioning. Total trophic diversity, measured by niche area, decreased with periphyton biomass and an ordination axis representing several bluegreen algae species. Consumers’ basal resource diversity, estimated by δ13C values, was similarly related to algal community structure. The range of trophic levels (δ15N range) increased with time since the most recent drying and reflooding event, but decreased with intermediate-consumer density, and was positively related to the ordination axis reflecting increases in green algae and decreases in filamentous bluegreen algae. Our findings suggest that algal quality, independent of quantity, influences food-web structure and demonstrate an indirect role of nutrient enrichment mediated by its effects on periphyton palatability and biomass. These results reveal potential mechanisms for anthropogenic effects on Everglades communities.
Resumo:
In recent years, there has been an enormous growth of location-aware devices, such as GPS embedded cell phones, mobile sensors and radio-frequency identification tags. The age of combining sensing, processing and communication in one device, gives rise to a vast number of applications leading to endless possibilities and a realization of mobile Wireless Sensor Network (mWSN) applications. As computing, sensing and communication become more ubiquitous, trajectory privacy becomes a critical piece of information and an important factor for commercial success. While on the move, sensor nodes continuously transmit data streams of sensed values and spatiotemporal information, known as ``trajectory information". If adversaries can intercept this information, they can monitor the trajectory path and capture the location of the source node. ^ This research stems from the recognition that the wide applicability of mWSNs will remain elusive unless a trajectory privacy preservation mechanism is developed. The outcome seeks to lay a firm foundation in the field of trajectory privacy preservation in mWSNs against external and internal trajectory privacy attacks. First, to prevent external attacks, we particularly investigated a context-based trajectory privacy-aware routing protocol to prevent the eavesdropping attack. Traditional shortest-path oriented routing algorithms give adversaries the possibility to locate the target node in a certain area. We designed the novel privacy-aware routing phase and utilized the trajectory dissimilarity between mobile nodes to mislead adversaries about the location where the message started its journey. Second, to detect internal attacks, we developed a software-based attestation solution to detect compromised nodes. We created the dynamic attestation node chain among neighboring nodes to examine the memory checksum of suspicious nodes. The computation time for memory traversal had been improved compared to the previous work. Finally, we revisited the trust issue in trajectory privacy preservation mechanism designs. We used Bayesian game theory to model and analyze cooperative, selfish and malicious nodes' behaviors in trajectory privacy preservation activities.^
Resumo:
In recent years, there has been an enormous growth of location-aware devices, such as GPS embedded cell phones, mobile sensors and radio-frequency identification tags. The age of combining sensing, processing and communication in one device, gives rise to a vast number of applications leading to endless possibilities and a realization of mobile Wireless Sensor Network (mWSN) applications. As computing, sensing and communication become more ubiquitous, trajectory privacy becomes a critical piece of information and an important factor for commercial success. While on the move, sensor nodes continuously transmit data streams of sensed values and spatiotemporal information, known as ``trajectory information". If adversaries can intercept this information, they can monitor the trajectory path and capture the location of the source node. This research stems from the recognition that the wide applicability of mWSNs will remain elusive unless a trajectory privacy preservation mechanism is developed. The outcome seeks to lay a firm foundation in the field of trajectory privacy preservation in mWSNs against external and internal trajectory privacy attacks. First, to prevent external attacks, we particularly investigated a context-based trajectory privacy-aware routing protocol to prevent the eavesdropping attack. Traditional shortest-path oriented routing algorithms give adversaries the possibility to locate the target node in a certain area. We designed the novel privacy-aware routing phase and utilized the trajectory dissimilarity between mobile nodes to mislead adversaries about the location where the message started its journey. Second, to detect internal attacks, we developed a software-based attestation solution to detect compromised nodes. We created the dynamic attestation node chain among neighboring nodes to examine the memory checksum of suspicious nodes. The computation time for memory traversal had been improved compared to the previous work. Finally, we revisited the trust issue in trajectory privacy preservation mechanism designs. We used Bayesian game theory to model and analyze cooperative, selfish and malicious nodes' behaviors in trajectory privacy preservation activities.