13 resultados para denial of service resistance
em Digital Commons at Florida International University
Resumo:
3D geographic information system (GIS) is data and computation intensive in nature. Internet users are usually equipped with low-end personal computers and network connections of limited bandwidth. Data reduction and performance optimization techniques are of critical importance in quality of service (QoS) management for online 3D GIS. In this research, QoS management issues regarding distributed 3D GIS presentation were studied to develop 3D TerraFly, an interactive 3D GIS that supports high quality online terrain visualization and navigation. ^ To tackle the QoS management challenges, multi-resolution rendering model, adaptive level of detail (LOD) control and mesh simplification algorithms were proposed to effectively reduce the terrain model complexity. The rendering model is adaptively decomposed into sub-regions of up-to-three detail levels according to viewing distance and other dynamic quality measurements. The mesh simplification algorithm was designed as a hybrid algorithm that combines edge straightening and quad-tree compression to reduce the mesh complexity by removing geometrically redundant vertices. The main advantage of this mesh simplification algorithm is that grid mesh can be directly processed in parallel without triangulation overhead. Algorithms facilitating remote accessing and distributed processing of volumetric GIS data, such as data replication, directory service, request scheduling, predictive data retrieving and caching were also proposed. ^ A prototype of the proposed 3D TerraFly implemented in this research demonstrates the effectiveness of our proposed QoS management framework in handling interactive online 3D GIS. The system implementation details and future directions of this research are also addressed in this thesis. ^
Resumo:
The purpose of this study was to explain how exemplary service providers in luxury hotels provide consistently excellent service. Using a case study framework, the study investigated the service provider's strategies and concepts of service delivery, the importance and implementation of organizational and individual controls, and the role of training and learning. The study identified barriers to service provision and characteristics of the exemplary individuals that affect their ability to deliver luxury service. This study sought to better understand how exemplary service providers learn, think about, and do their work. The sample population of three Five-Diamond-Award winning resorts was selected for their potential for learning about the phenomenon of interest. The results demonstrate that exemplary service providers possess individual characteristics that are enhanced by the organizations for which they work. Exemplary service providers are often exemplary communicators who are emotionally generous and genuinely enjoy helping and serving others. Exemplary service organizations treat their employees as they treat their customers, as suggested by the Service-Profit Chain (Heskett, Sasser & Schlesinger, 1997). Further, they have systems and standards to guarantee satisfactory service experiences for every guest. They also encourage their service providers to personalize their service delivery and to seek opportunities to delight their guests, using a combination of controls, traditions and cultural values. Several customer service theories are discussed in relationship to whether they were or were not supported by the data. The study concluded that the delivery of exemplary service is a complex phenomenon that requires successful interactions between guests, service providers and the organization. A Model of Exemplary Service Delivery is presented and discussed that demonstrates the components of service quality as shown in the data. The model can be used by practitioners seeking to create, enhance, or evaluate their service quality, and by researchers seeking insights into the complex concepts in service quality research. Implications for future research are discussed.
Effects of service-learning on student attitudes toward academic engagement and civic responsibility
Resumo:
This empirical study explored the impact of service-learning participation on high school students' attitudes toward academic engagement and civic responsibility. This study focused whether a group of high school students who participated in a service-learning project had more positive attitudes toward academic engagement and civic responsibility than their high school peers who did not participate in a service learning project. ^ Data were collected from 67 volunteer students as participants in grades 9–12. A service-learning treatment group of 34 high school students was examined relative to a comparison group of 33 high school students with similar demographic and academic characteristics. The investigator used questionnaires, an oral history/service-learning project, and interviews with the teacher-coordinators of the project to collect the data. The two surveys, one investigating high school students' attitudes about academic engagement, the other investigating high school students' attitudes toward civic responsibility, were administered in a pre-treatment/post-treatment design. There were 90 days between the pre-treatment and post-treatment administrations. A factor analysis of the civic responsibility instrument and multivariate analysis of gain scores were used to compare the means of the total aggregate scores of the treatment and comparison groups. Factor analysis was performed on the academic engagement instrument but it was determined that only the total scores could be used in subsequent analyses. Results were used to determine the efficacy of service-learning as interpreted in student attitudes toward academic engagement and student attitudes toward civic responsibility. ^ The study found no significant difference between the academic engagement and the civic responsibility attitudes of a high school service-learning project group and a high school comparison group with comparable school and similar demographic characteristics. One of the implications for educational practice and policy from the study results is a need to design and implement more powerful studies, studies implemented at many sites rather than just at two sites that were the basis of this study, and studies that investigate the research questions over longer time periods. Although it was not a focus of the study, the investigator concluded that service learning projects such as this might be more effective if they were better aligned with Dewey's principles. ^
Resumo:
The development of 3G (the 3rd generation telecommunication) value-added services brings higher requirements of Quality of Service (QoS). Wideband Code Division Multiple Access (WCDMA) is one of three 3G standards, and enhancement of QoS for WCDMA Core Network (CN) becomes more and more important for users and carriers. The dissertation focuses on enhancement of QoS for WCDMA CN. The purpose is to realize the DiffServ (Differentiated Services) model of QoS for WCDMA CN. Based on the parallelism characteristic of Network Processors (NPs), the NP programming model is classified as Pool of Threads (POTs) and Hyper Task Chaining (HTC). In this study, an integrated programming model that combines both of the two models was designed. This model has highly efficient and flexible features, and also solves the problems of sharing conflicts and packet ordering. We used this model as the programming model to realize DiffServ QoS for WCDMA CN. ^ The realization mechanism of the DiffServ model mainly consists of buffer management, packet scheduling and packet classification algorithms based on NPs. First, we proposed an adaptive buffer management algorithm called Packet Adaptive Fair Dropping (PAFD), which takes into consideration of both fairness and throughput, and has smooth service curves. Then, an improved packet scheduling algorithm called Priority-based Weighted Fair Queuing (PWFQ) was introduced to ensure the fairness of packet scheduling and reduce queue time of data packets. At the same time, the delay and jitter are also maintained in a small range. Thirdly, a multi-dimensional packet classification algorithm called Classification Based on Network Processors (CBNPs) was designed. It effectively reduces the memory access and storage space, and provides less time and space complexity. ^ Lastly, an integrated hardware and software system of the DiffServ model of QoS for WCDMA CN was proposed. It was implemented on the NP IXP2400. According to the corresponding experiment results, the proposed system significantly enhanced QoS for WCDMA CN. It extensively improves consistent response time, display distortion and sound image synchronization, and thus increases network efficiency and saves network resource.^
Resumo:
The emergence of tamoxifen or aromatase inhibitor resistance is a major problem in the treatment of breast cancer. The molecular signaling mechanism of antiestrogen resistance is not clear. Understanding the mechanisms by which resistance to these agents arise could have major clinical implications for preventing or circumventing it. Therefore, in this dissertation we have investigated the molecular mechanisms underlying antiestrogen resistance by studying the contributions of reactive oxygen species (ROS)-induced redox signaling pathways in antiestrogen resistant breast cancer cells. Our hypothesis is that the conversion of breast tumors to a tamoxifen-resistant phenotype is associated with a progressive shift towards a pro-oxidant environment of cells as a result of oxidative stress. The hypothesis of this dissertation was tested in an in vitro 2-D cell culture model employing state of the art biochemical and molecular techniques, including gene overexpression, immunoprecipitation, Western blotting, confocal imaging, ChIP, Real-Time RT-PCR, and anchorage-independent cell growth assays. We observed that tamoxifen (TAM) acts like both an oxidant and an antioxidant. Exposure of tamoxifen resistant LCC2 cell to TAM or 17 beta-estradiol (E2) induced the formation of reactive oxidant species (ROS). The formation of E2-induced ROS was inhibited by co-treatment with TAM, similar to cells pretreated with antioxidants. In LCC2 cells, treatments with either E2 or TAM were capable of inducing cell proliferation which was then inhibited by biological and chemical antioxidants. Exposure of LCC2 cells to tamoxifen resulted in a decrease in p27 expression. The LCC2 cells exposed to TAM showed an increase in p27 phosphorylation on T157 and T187. Conversely, antioxidant treatment showed an increase in p27 expression and a decrease in p27 phosphorylation on T157 and T187 in TAM exposed cells which were similar to the effects of Fulvestrant. In line with previous studies, we showed an increase in the binding of cyclin E-Cdk2 and in the level of p27 in TAM exposed cells that overexpressed biological antioxidants. Together these findings highly suggest that lowering the oxidant state of antiestrogen resistant LCC2 cells, increases LCC2 susceptibility to tamoxifen via the cyclin dependent kinase inhibitor p27.
Resumo:
A model is presented that captures the complex nature of the service experience in an attempt to aid in the design, development and evaluation of service delivery personnel and systems.
Resumo:
The authors investigate the relationship between loyalty and perceived service quality of hotel customers and discus managerial implications to develop strategies to enhance loyalty of hotel customers. A survey was conducted among customers in the San Francisco Bay Area. Results indicate that customer loyalty is dependent on perceived service quality which is observed in terms of timelines, facilities, and ambience.
Resumo:
A mystery shopper study was used to examine the influence of service times on customer satisfaction. The impact of management emphasis on service quality was also examined. In the restaurants studied, service time influenced customer satisfaction. Management attention to service time improved performance in direct relationship to the level of emphasis.
Resumo:
The purpose of this study is to determine the potential impact of selected organizational factors on boundary-spanning-role employees’ perceptions of service recovery performance. This study also aims to assess the impact of service recovery performance on the intention to leave the job and extrinsic job satisfaction. This study uses a sample of frontline employees in Belek, Antalya, Turkey. The empirical findings revealed that education, team work and role ambiguity as frontline job perceptions were found to exert positive influences on the service recovery performance, but, empowerment, reward, and organizational commitment were found to have negative effects on the service recovery performance.
Resumo:
This study examined the motivation of college and university faculty to implement service-learning into their traditional courses. The benefits derived by faculty, as well as those issues of maintenance, including supports and/or obstacles, were also investigated in relation to their impact on motivation. The focus was on generating theory from the emerging data. ^ Data were collected from interviews with 17 faculty teaching courses that included a component of service-learning. A maximum variation sampling of participants from six South Florida colleges and universities was utilized. Faculty participants represented a wide range of academic disciplines, faculty ranks, years of experience in teaching and using service-learning as well as gender and ethnic diversity. For data triangulation, a focus group with eight additional college faculty was conducted and documents, including course syllabi and institutional service-learning handbooks, collected during the interviews were examined. The interviews were transcribed and coded using traditional methods as well as with the assistance of the computerized assisted qualitative data analysis software, Atlas.ti. The data were organized into five major categories with themes and sub-themes emerging for each. ^ While intrinsic or personal factors along with extrinsic factors all serve to influence faculty motivation, the study's findings revealed that the primary factors influencing faculty motivation to adopt service-learning were those that were intrinsic or personal in nature. These factors included: (a) past experiences, (b) personal characteristics including the value of serving, (c) involvement with community service, (d) interactions and relationships with peers, (e) benefits to students, (f) benefits to teaching, and (g) perceived career benefits. Implications and recommendations from the study encompass suggestions for administrators in higher education institutions for supporting and encouraging faculty adoption of service-learning including a well developed infrastructure as well as incentives, particularly during the initial implementation period, rewards providing recognition for the academic nature of service-learning and support for the development of peer relationships among service-learning faculty. ^
Resumo:
Antibiotics are becoming increasingly prevalent in bacterial communities due to clinical and agricultural misuse and overuse in their environment. As exposure increases, so does the incidence of microbial resistance. Such is the case with bacterial resistance to tetracyclines, a phenotype often acquired through the horizontal gene transfer of tet genes between bacteria. The objective of this project was to analyze the bacterial diversity of tet resistance genes in soil from Miami-Dade County. Bacterial isolates were Gram-stained and the Kirby-Bauer antibiotic disk diffusion test was performed to determine each bacterium’s degree of resistance. The 16S rRNA gene from antibiotic-resistant isolates was amplified by PCR and sequenced to identify the isolates. All isolates’ tet genes were amplified by multiplex PCR, sequenced, and compared. Among eight isolates, three distinct species were positively identified based on their 16S rRNA sequences and four distinct tet genes were identified, though all tested susceptible to tetracycline via the Kirby-Bauer test. This project clarifies some aspects of the ecology of antibiotic resistance genes, their natural ecological function and the potential for the expansion of intrinsic multi-antibiotic resistance into new ecosystems and/or hosts.
Resumo:
With the rapid growth of the Internet, computer attacks are increasing at a fast pace and can easily cause millions of dollar in damage to an organization. Detecting these attacks is an important issue of computer security. There are many types of attacks and they fall into four main categories, Denial of Service (DoS) attacks, Probe, User to Root (U2R) attacks, and Remote to Local (R2L) attacks. Within these categories, DoS and Probe attacks continuously show up with greater frequency in a short period of time when they attack systems. They are different from the normal traffic data and can be easily separated from normal activities. On the contrary, U2R and R2L attacks are embedded in the data portions of the packets and normally involve only a single connection. It becomes difficult to achieve satisfactory detection accuracy for detecting these two attacks. Therefore, we focus on studying the ambiguity problem between normal activities and U2R/R2L attacks. The goal is to build a detection system that can accurately and quickly detect these two attacks. In this dissertation, we design a two-phase intrusion detection approach. In the first phase, a correlation-based feature selection algorithm is proposed to advance the speed of detection. Features with poor prediction ability for the signatures of attacks and features inter-correlated with one or more other features are considered redundant. Such features are removed and only indispensable information about the original feature space remains. In the second phase, we develop an ensemble intrusion detection system to achieve accurate detection performance. The proposed method includes multiple feature selecting intrusion detectors and a data mining intrusion detector. The former ones consist of a set of detectors, and each of them uses a fuzzy clustering technique and belief theory to solve the ambiguity problem. The latter one applies data mining technique to automatically extract computer users’ normal behavior from training network traffic data. The final decision is a combination of the outputs of feature selecting and data mining detectors. The experimental results indicate that our ensemble approach not only significantly reduces the detection time but also effectively detect U2R and R2L attacks that contain degrees of ambiguous information.
Resumo:
With the rapid growth of the Internet, computer attacks are increasing at a fast pace and can easily cause millions of dollar in damage to an organization. Detecting these attacks is an important issue of computer security. There are many types of attacks and they fall into four main categories, Denial of Service (DoS) attacks, Probe, User to Root (U2R) attacks, and Remote to Local (R2L) attacks. Within these categories, DoS and Probe attacks continuously show up with greater frequency in a short period of time when they attack systems. They are different from the normal traffic data and can be easily separated from normal activities. On the contrary, U2R and R2L attacks are embedded in the data portions of the packets and normally involve only a single connection. It becomes difficult to achieve satisfactory detection accuracy for detecting these two attacks. Therefore, we focus on studying the ambiguity problem between normal activities and U2R/R2L attacks. The goal is to build a detection system that can accurately and quickly detect these two attacks. In this dissertation, we design a two-phase intrusion detection approach. In the first phase, a correlation-based feature selection algorithm is proposed to advance the speed of detection. Features with poor prediction ability for the signatures of attacks and features inter-correlated with one or more other features are considered redundant. Such features are removed and only indispensable information about the original feature space remains. In the second phase, we develop an ensemble intrusion detection system to achieve accurate detection performance. The proposed method includes multiple feature selecting intrusion detectors and a data mining intrusion detector. The former ones consist of a set of detectors, and each of them uses a fuzzy clustering technique and belief theory to solve the ambiguity problem. The latter one applies data mining technique to automatically extract computer users’ normal behavior from training network traffic data. The final decision is a combination of the outputs of feature selecting and data mining detectors. The experimental results indicate that our ensemble approach not only significantly reduces the detection time but also effectively detect U2R and R2L attacks that contain degrees of ambiguous information.