13 resultados para home-based enterprise

em Digital Commons at Florida International University


Relevância:

90.00% 90.00%

Publicador:

Resumo:

A wireless mesh network is a mesh network implemented over a wireless network system such as wireless LANs. Wireless Mesh Networks(WMNs) are promising for numerous applications such as broadband home networking, enterprise networking, transportation systems, health and medical systems, security surveillance systems, etc. Therefore, it has received considerable attention from both industrial and academic researchers. This dissertation explores schemes for resource management and optimization in WMNs by means of network routing and network coding.^ In this dissertation, we propose three optimization schemes. (1) First, a triple-tier optimization scheme is proposed for load balancing objective. The first tier mechanism achieves long-term routing optimization, and the second tier mechanism, using the optimization results obtained from the first tier mechanism, performs the short-term adaptation to deal with the impact of dynamic channel conditions. A greedy sub-channel allocation algorithm is developed as the third tier optimization scheme to further reduce the congestion level in the network. We conduct thorough theoretical analysis to show the correctness of our design and give the properties of our scheme. (2) Then, a Relay-Aided Network Coding scheme called RANC is proposed to improve the performance gain of network coding by exploiting the physical layer multi-rate capability in WMNs. We conduct rigorous analysis to find the design principles and study the tradeoff in the performance gain of RANC. Based on the analytical results, we provide a practical solution by decomposing the original design problem into two sub-problems, flow partition problem and scheduling problem. (3) Lastly, a joint optimization scheme of the routing in the network layer and network coding-aware scheduling in the MAC layer is introduced. We formulate the network optimization problem and exploit the structure of the problem via dual decomposition. We find that the original problem is composed of two problems, routing problem in the network layer and scheduling problem in the MAC layer. These two sub-problems are coupled through the link capacities. We solve the routing problem by two different adaptive routing algorithms. We then provide a distributed coding-aware scheduling algorithm. According to corresponding experiment results, the proposed schemes can significantly improve network performance.^

Relevância:

80.00% 80.00%

Publicador:

Resumo:

The purpose of this research was to determine whether initial developmental delay, site of intervention, frequency of intervention, age of the child, socio-economic status (SES), gender and ethnicity significantly predict developmental gains in a group of children enrolled in an early intervention setting. The records of 134 children enrolled in an inner-city program in Miami, Florida were reviewed for inclusion in this study. ^ Demographic variables, site placement and treatment frequencies were collected during a retrospective chart review. Level of delay was expressed using the developmental quotient and developmental gain was calculated using the mean gain on age equivalent scores or developmental tests. A multiple regression analysis was performed to determine which of the above variables significantly predicted developmental gains. Multivariate analysis compared developmental gains for all the developmental domains based on intervention site (center versus home-based) while controlling for developmental delay. ^ Children made greater developmental gains if they had higher developmental quotients and if they were younger at the time services were initiated. Frequency of intervention significantly improved developmental outcomes in children attending center-based programs. Children attending center-based programs also made significantly greater gains in gross motor skills compared to children attending home-based programs. ^ These findings emphasize the importance of early screening and referral of children with developmental delay and adjusting intervention for the child's developmental quotient. Children should receive intense treatment to maximize results. Decisions regarding program placement should be individualized according to the child's unique developmental pattern. Policy and program decisions affecting the curriculum of a child in early intervention need to reflect these multivariate considerations. ^

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Unlike its childhood counterpart, adult and continuing education is a voluntary activity, where adult learners partake in educational programs for the sake of realizing some explicit or implicit goal. The purpose of this study was to explore the association between socio-cultural influences and deterrents to participation of middle class urban Indian women in adult and continuing educational programs. Darkenwald and Merriam’s (1982) theory of non-participation was selected as the theoretical lens used to guide this study. This study involved collecting qualitative data to analyze participant views and was collected through 16 semi-structured interviews to explore participants’ individual perceptions concerning socio-cultural deterrents influencing participation of middle class urban Indian women in adult and continuing educational programs. Qualitative data were analyzed to discover emerging themes and sub-themes. In the second phase of the study, a modified Deterrent to Participation Scale – General (DPS-G) was used to measure data collected from the surveys completed by participants, that included specific demographic questions. Descriptive statistics were used to examine the relationships between the demographic questions and the deterrent identified on the DPS-G. The interview and survey data were used convergently to understand the relationship between socio-cultural influences and deterrents impacting participant participation in adult and continuing educational programs. The findings of the study indicated that the biggest socio-cultural influence deterring participation among middle class urban Indian women in adult and continuing educational programs is marriage. It is an Indian social norm that comes with a set of pre-defined roles and expectations, and married women find themselves consumed by fulfilling the marital and familial expectations and responsibilities and participation in adult and continuing educational program is furthest from their mind. Middle class urban Indian women do realize the importance of educational pursuits, but do not feel that they can, after marriage. They are open, however, to pursuing adult educational programs in the form of short-term skill development programs leading to income generation, although they would lead primarily to home-based work enterprises.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Some students lack reading skills due to biological or environmental factors. Accordingly, in my role as an educator, I would like to know if Dialogic Reading Strategies can help Spanish speaking caregivers to facilitate an interactive reading routine at home with their child.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

To frail elders, the consumption of nutrients is a challenge. Individuals participating in home delivered meal programs achieve higher daily intakes of key nutrients over non participants. However many elders require special diet and modifications in food texture, features generally not provided by such programs.^ This study compared a pilot program providing individual homemaker prepared meals based on special needs with the traditional home delivered meal program. Eight participants in the model group and 19 participants in the control group completed the 180 day study. The high drop out rate in the model group was due to scheduling difficulties.^ No significant differences existed between the two groups with respect to weight gain/maintenance, macronutrient intake, intake of most micronutrients and customer satisfaction. Homemaker prepared meals is a viable option for individuals needing dietary adjustments. ^

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Access control (AC) is a necessary defense against a large variety of security attacks on the resources of distributed enterprise applications. However, to be effective, AC in some application domains has to be fine-grain, support the use of application-specific factors in authorization decisions, as well as consistently and reliably enforce organization-wide authorization policies across enterprise applications. Because the existing middleware technologies do not provide a complete solution, application developers resort to embedding AC functionality in application systems. This coupling of AC functionality with application logic causes significant problems including tremendously difficult, costly and error prone development, integration, and overall ownership of application software. The way AC for application systems is engineered needs to be changed. ^ In this dissertation, we propose an architectural approach for engineering AC mechanisms to address the above problems. First, we develop a framework for implementing the role-based access control (RBAC) model using AC mechanisms provided by CORBA Security. For those application domains where the granularity of CORBA controls and the expressiveness of RBAC model suffice, our framework addresses the stated problem. ^ In the second and main part of our approach, we propose an architecture for an authorization service, RAD, to address the problem of controlling access to distributed application resources, when the granularity and support for complex policies by middleware AC mechanisms are inadequate. Applying this architecture, we developed a CORBA-based application authorization service (CAAS). Using CAAS, we studied the main properties of the architecture and showed how they can be substantiated by employing CORBA and Java technologies. Our approach enables a wide-ranging solution for controlling the resources of distributed enterprise applications. ^

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The common occurrence of human derived contaminants like pharmaceuticals, steroids and hormones in surface waters has raised the awareness of the role played by the release of treated or untreated sewage in the water quality along sensitive coastal ecosystems. South Florida is home to many important protected environments ranging from wetlands to coral reefs which are in close proximity to large metropolitan cities. Since large portions of South Florida and most of the Florida Keys population are not served by modern sewage treatment plants and rely heavily on the use of inefficient septic systems; a comprehensive survey of selected human waste contamination markers is needed in these areas to assess water quality with respect to non-traditional micro-constituents. ^ This study reports the development and application of new sensitive and selective analytical methods for the fast screening of multiple wastewater tracers, classified as Emergent Pollutants of Concern (EPOC). Novel methods for the trace analysis of non-traditional markers of human-specific contamination such as aminopropanone were developed and used to assess the potential of non-traditional markers as wastewater tracers. ^ During our investigation, surface water samples collected from near shore environments along the South Florida were analyzed for fifteen hormones and steroids, and five commonly detected pharmaceuticals. The compounds most frequently detected were: coprostanol, cholesterol, estrone, β-estradiol, caffeine, triclosan and DEET. Concentrations of caffeine, bisphenol A and DEET were usually higher and more prevalent than the hormonal steroids. In general, it was found that common pharmaceuticals and steroids are widely present in major coastal environments in South Florida. It is also evident that aquatic bodies in heavily urbanized sectors such as the Miami River and Key Largo Harbor contain higher concentrations of several compounds while relatively open bay waters and agricultural areas show reduced chemical signatures. Concentrations of hormones in the Little Venice area of Marathon Key were above the Lowest Observable Effect Levels (LOELs) for several species, indicating that biological resources in this area are at risk. Water quality issues in some of these coastal water environments go beyond eutrophication, thus EPOC should be the target goal for future mitigation projects. ^

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Wireless sensor networks are emerging as effective tools in the gathering and dissemination of data. They can be applied in many fields including health, environmental monitoring, home automation and the military. Like all other computing systems it is necessary to include security features, so that security sensitive data traversing the network is protected. However, traditional security techniques cannot be applied to wireless sensor networks. This is due to the constraints of battery power, memory, and the computational capacities of the miniature wireless sensor nodes. Therefore, to address this need, it becomes necessary to develop new lightweight security protocols. This dissertation focuses on designing a suite of lightweight trust-based security mechanisms and a cooperation enforcement protocol for wireless sensor networks. This dissertation presents a trust-based cluster head election mechanism used to elect new cluster heads. This solution prevents a major security breach against the routing protocol, namely, the election of malicious or compromised cluster heads. This dissertation also describes a location-aware, trust-based, compromise node detection, and isolation mechanism. Both of these mechanisms rely on the ability of a node to monitor its neighbors. Using neighbor monitoring techniques, the nodes are able to determine their neighbors’ reputation and trust level through probabilistic modeling. The mechanisms were designed to mitigate internal attacks within wireless sensor networks. The feasibility of the approach is demonstrated through extensive simulations. The dissertation also addresses non-cooperation problems in multi-user wireless sensor networks. A scalable lightweight enforcement algorithm using evolutionary game theory is also designed. The effectiveness of this cooperation enforcement algorithm is validated through mathematical analysis and simulation. This research has advanced the knowledge of wireless sensor network security and cooperation by developing new techniques based on mathematical models. By doing this, we have enabled others to build on our work towards the creation of highly trusted wireless sensor networks. This would facilitate its full utilization in many fields ranging from civilian to military applications.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Pollination-dependent fruit trees grown in home gardens play an important role in the agricultural based economy of Central Asian countries, yet little is known about the status of pollinator communities, the cultivated plant composition or the factors that influence management practices in Kyrgyz home garden agroecosystems. As agricultural systems are human created and managed, a logical approach to their study blends anthropological and ecological methods, an ethnoecological approach. Over three years, I investigated how species richness and abundance of Hymenoptera, cultivated plants, and home garden management were related using quantitative and qualitative methods in the Issyk-kul Man and Biosphere reserve. Structured surveys were undertaken with heads of households using a random sample stratified by village. Gardens were then mapped with participation of household members to inventory edible species in gardens, most of which are pollinator-dependent, and to compare home garden diversity as reported by respondents during interviews. Apple diversity was studied to the variety level to understand respondents’ classification system in the context of in situ agrobiodiversity conservation. Household members identified 52 edible plant species when mapping the garden, compared with 32 reported when interviewed. The proportion of plant species received from others through exchange and the number of plots cultivated significantly explained the variation in edible plant diversity among gardens. Insects were sampled in gardens and orchards to determine potential pollinator community composition and the effect of different management practices on Hymenoptera richness and abundance. I collected 756 Hymenoptera individuals (56 bee; 12 wasp species); 12 species were new records for Kyrgyzstan or within Kyrgyzstan. Economic pressures to intensify cultivation could impact management practices that currently promote diversity. A home garden development initiative was undertaken to study management practice improvement. Participants in the initiative had higher adoption rates than controls of management practices that improve long-term yield, ecological sustainability and stability of home gardens. Home gardens, as currently managed, support abundant and diverse pollinator communities and have high cultivated plant diversity with few differences in community composition between garden management types.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Wireless sensor networks are emerging as effective tools in the gathering and dissemination of data. They can be applied in many fields including health, environmental monitoring, home automation and the military. Like all other computing systems it is necessary to include security features, so that security sensitive data traversing the network is protected. However, traditional security techniques cannot be applied to wireless sensor networks. This is due to the constraints of battery power, memory, and the computational capacities of the miniature wireless sensor nodes. Therefore, to address this need, it becomes necessary to develop new lightweight security protocols. This dissertation focuses on designing a suite of lightweight trust-based security mechanisms and a cooperation enforcement protocol for wireless sensor networks. This dissertation presents a trust-based cluster head election mechanism used to elect new cluster heads. This solution prevents a major security breach against the routing protocol, namely, the election of malicious or compromised cluster heads. This dissertation also describes a location-aware, trust-based, compromise node detection, and isolation mechanism. Both of these mechanisms rely on the ability of a node to monitor its neighbors. Using neighbor monitoring techniques, the nodes are able to determine their neighbors’ reputation and trust level through probabilistic modeling. The mechanisms were designed to mitigate internal attacks within wireless sensor networks. The feasibility of the approach is demonstrated through extensive simulations. The dissertation also addresses non-cooperation problems in multi-user wireless sensor networks. A scalable lightweight enforcement algorithm using evolutionary game theory is also designed. The effectiveness of this cooperation enforcement algorithm is validated through mathematical analysis and simulation. This research has advanced the knowledge of wireless sensor network security and cooperation by developing new techniques based on mathematical models. By doing this, we have enabled others to build on our work towards the creation of highly trusted wireless sensor networks. This would facilitate its full utilization in many fields ranging from civilian to military applications.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

In 1998, a dispute between a federal government agency and the local community of Chacchoben resulted in the emergence of a community-based ecotourism (CBE) enterprise to be fully owned and operated by the community in conjunction with a complex arrangement of agreements and partnerships with external actors. CBE is usually framed as a lower-impact, often small-scale alternative to mass tourism and as a conservation and development strategy that can hypothetically protect biologically diverse landscapes while improving the lives of marginalized peasant and indigenous communities through their participation. This case study analyzes the roles of common property land tenure and social capital and how the unique dilemma of a mass community-based ecotourism theme park emerged in Chacchoben. Findings indicate that local decisions and processes of development, conservation, and land use are affected by the complex interaction between local and external institutions and fluctuating levels of social capital.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Pollination-dependent fruit trees grown in home gardens play an important role in the agricultural based economy of Central Asian countries, yet little is known about the status of pollinator communities, the cultivated plant composition or the factors that influence management practices in Kyrgyz home garden agroecosystems. As agricultural systems are human created and managed, a logical approach to their study blends anthropological and ecological methods, an ethnoecological approach. Over three years, I investigated how species richness and abundance of Hymenoptera, cultivated plants, and home garden management were related using quantitative and qualitative methods in the Issyk-kul Man and Biosphere reserve. Structured surveys were undertaken with heads of households using a random sample stratified by village. Gardens were then mapped with participation of household members to inventory edible species in gardens, most of which are pollinator-dependent, and to compare home garden diversity as reported by respondents during interviews. Apple diversity was studied to the variety level to understand respondents’ classification system in the context of in situ agrobiodiversity conservation. Household members identified 52 edible plant species when mapping the garden, compared with 32 reported when interviewed. The proportion of plant species received from others through exchange and the number of plots cultivated significantly explained the variation in edible plant diversity among gardens. Insects were sampled in gardens and orchards to determine potential pollinator community composition and the effect of different management practices on Hymenoptera richness and abundance. I collected 756 Hymenoptera individuals (56 bee; 12 wasp species); 12 species were new records for Kyrgyzstan or within Kyrgyzstan. Economic pressures to intensify cultivation could impact management practices that currently promote diversity. A home garden development initiative was undertaken to study management practice improvement. Participants in the initiative had higher adoption rates than controls of management practices that improve long-term yield, ecological sustainability and stability of home gardens. Home gardens, as currently managed, support abundant and diverse pollinator communities and have high cultivated plant diversity with few differences in community composition between garden management types.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Access control (AC) is a necessary defense against a large variety of security attacks on the resources of distributed enterprise applications. However, to be effective, AC in some application domains has to be fine-grain, support the use of application-specific factors in authorization decisions, as well as consistently and reliably enforce organization-wide authorization policies across enterprise applications. Because the existing middleware technologies do not provide a complete solution, application developers resort to embedding AC functionality in application systems. This coupling of AC functionality with application logic causes significant problems including tremendously difficult, costly and error prone development, integration, and overall ownership of application software. The way AC for application systems is engineered needs to be changed. In this dissertation, we propose an architectural approach for engineering AC mechanisms to address the above problems. First, we develop a framework for implementing the role-based access control (RBAC) model using AC mechanisms provided by CORBA Security. For those application domains where the granularity of CORBA controls and the expressiveness of RBAC model suffice, our framework addresses the stated problem. In the second and main part of our approach, we propose an architecture for an authorization service, RAD, to address the problem of controlling access to distributed application resources, when the granularity and support for complex policies by middleware AC mechanisms are inadequate. Applying this architecture, we developed a CORBA-based application authorization service (CAAS). Using CAAS, we studied the main properties of the architecture and showed how they can be substantiated by employing CORBA and Java technologies. Our approach enables a wide-ranging solution for controlling the resources of distributed enterprise applications.