11 resultados para hop constraints
em Digital Commons at Florida International University
Resumo:
This dissertation examines whether-there exists financial constraints and, if so, their implications for investment in research and development expenditures. It develops a theoretical model of credit rationing and research and development in which both are determined simultaneously and endogenously. The model provides a useful tool to examine different policies that may help alleviate the negative the effect of financial constraints faced by firms.^ The empirical evidence presented deals with two different cases, namely, the motor vehicle industry in Germany (1970-1990) and the electrical machinery industry In Spain (1975-1990).^ The innovation in the empirical analysis is that it follows a novel approach to identify events that allow us to isolate the effect of financial constraints in the determination of research and development.^ Further, empirical evidence is presented to show that in the above two cases financial constraints affect investment in physical capital as well.^ The empirical evidence presented supports the results of the theoretical model developed in this dissertation, showing that financial constraints negatively affect the rate of growth of innovation by reducing the intensity of research and development activity. ^
Resumo:
The Internet has become an integral part of our nation’s critical socio-economic infrastructure. With its heightened use and growing complexity however, organizations are at greater risk of cyber crimes. To aid in the investigation of crimes committed on or via the Internet, a network forensics analysis tool pulls together needed digital evidence. It provides a platform for performing deep network analysis by capturing, recording and analyzing network events to find out the source of a security attack or other information security incidents. Existing network forensics work has been mostly focused on the Internet and fixed networks. But the exponential growth and use of wireless technologies, coupled with their unprecedented characteristics, necessitates the development of new network forensic analysis tools. This dissertation fostered the emergence of a new research field in cellular and ad-hoc network forensics. It was one of the first works to identify this problem and offer fundamental techniques and tools that laid the groundwork for future research. In particular, it introduced novel methods to record network incidents and report logged incidents. For recording incidents, location is considered essential to documenting network incidents. However, in network topology spaces, location cannot be measured due to absence of a ‘distance metric’. Therefore, a novel solution was proposed to label locations of nodes within network topology spaces, and then to authenticate the identity of nodes in ad hoc environments. For reporting logged incidents, a novel technique based on Distributed Hash Tables (DHT) was adopted. Although the direct use of DHTs for reporting logged incidents would result in an uncontrollably recursive traffic, a new mechanism was introduced that overcome this recursive process. These logging and reporting techniques aided forensics over cellular and ad-hoc networks, which in turn increased their ability to track and trace attacks to their source. These techniques were a starting point for further research and development that would result in equipping future ad hoc networks with forensic components to complement existing security mechanisms.
Resumo:
Due to low cost and easy deployment, multi-hop wireless networks become a very attractive communication paradigm. However, IEEE 802.11 medium access control (MAC) protocol widely used in wireless LANs was not designed for multi-hop wireless networks. Although it can support some kinds of ad hoc network architecture, it does not function efficiently in those wireless networks with multi-hop connectivity. Therefore, our research is focused on studying the medium access control in multi-hop wireless networks. The objective is to design practical MAC layer protocols for supporting multihop wireless networks. Particularly, we try to prolong the network lifetime without degrading performances with small battery-powered devices and improve the system throughput with poor quality channels. ^ In this dissertation, we design two MAC protocols. The first one is aimed at minimizing energy-consumption without deteriorating communication activities, which provides energy efficiency, latency guarantee, adaptability and scalability in one type of multi-hop wireless networks (i.e. wireless sensor network). Methodologically, inspired by the phase transition phenomena in distributed networks, we define the wake-up probability, which maintained by each node. By using this probability, we can control the number of wireless connectivity within a local area. More specifically, we can adaptively adjust the wake-up probability based on the local network conditions to reduce energy consumption without increasing transmission latency. The second one is a cooperative MAC layer protocol for multi-hop wireless networks, which leverages multi-rate capability by cooperative transmission among multiple neighboring nodes. Moreover, for bidirectional traffic, the network throughput can be further increased by using the network coding technique. It is a very helpful complement for current rate-adaptive MAC protocols under the poor channel conditions of direct link. Finally, we give an analytical model to analyze impacts of cooperative node on the system throughput. ^
Resumo:
This dissertation develops a process improvement method for service operations based on the Theory of Constraints (TOC), a management philosophy that has been shown to be effective in manufacturing for decreasing WIP and improving throughput. While TOC has enjoyed much attention and success in the manufacturing arena, its application to services in general has been limited. The contribution to industry and knowledge is a method for improving global performance measures based on TOC principles. The method proposed in this dissertation will be tested using discrete event simulation based on the scenario of the service factory of airline turnaround operations. To evaluate the method, a simulation model of aircraft turn operations of a U.S. based carrier was made and validated using actual data from airline operations. The model was then adjusted to reflect an application of the Theory of Constraints for determining how to deploy the scarce resource of ramp workers. The results indicate that, given slight modifications to TOC terminology and the development of a method for constraint identification, the Theory of Constraints can be applied with success to services. Bottlenecks in services must be defined as those processes for which the process rates and amount of work remaining are such that completing the process will not be possible without an increase in the process rate. The bottleneck ratio is used to determine to what degree a process is a constraint. Simulation results also suggest that redefining performance measures to reflect a global business perspective of reducing costs related to specific flights versus the operational local optimum approach of turning all aircraft quickly results in significant savings to the company. Savings to the annual operating costs of the airline were simulated to equal 30% of possible current expenses for misconnecting passengers with a modest increase in utilization of the workers through a more efficient heuristic of deploying them to the highest priority tasks. This dissertation contributes to the literature on service operations by describing a dynamic, adaptive dispatch approach to manage service factory operations similar to airline turnaround operations using the management philosophy of the Theory of Constraints.
Resumo:
Seagrass meadows are highly productive habitats found along many of the world's coastline, providing important services that support the overall functioning of the coastal zone. The organic carbon that accumulates in seagrass meadows is derived not only from seagrass production but from the trapping of other particles, as the seagrass canopies facilitate sedimentation and reduce resuspension. Here we provide a comprehensive synthesis of the available data to obtain a better understanding of the relative contribution of seagrass and other possible sources of organic matter that accumulate in the sediments of seagrass meadows. The data set includes 219 paired analyses of the carbon isotopic composition of seagrass leaves and sediments from 207 seagrass sites at 88 locations worldwide. Using a three source mixing model and literature values for putative sources, we calculate that the average proportional contribution of seagrass to the surface sediment organic carbon pool is ∼50%. When using the best available estimates of carbon burial rates in seagrass meadows, our data indicate that between 41 and 66 gC m−2 yr−1 originates from seagrass production. Using our global average for allochthonous carbon trapped in seagrass sediments together with a recent estimate of global average net community production, we estimate that carbon burial in seagrass meadows is between 48 and 112 Tg yr−1, showing that seagrass meadows are natural hot spots for carbon sequestration.
Resumo:
From 2000 to 2010, America’s music industry’s annual revenue went from $4 billion to $2 billion. Much of this is attributed to the internet’s ability to provide consumers with easy access to free music, and hip hop has been especially impacted by this trend. Utilizing document analysis and personal interviews, this study found that the success of independent artists has influenced the business strategies of major record companies. In response to a dramatic decrease in record sales, major labels have made more of an effort to sign their artists to 360 deals, which allow the labels to profit from every aspect of an artist’s brand or identity. While some independent artists are the main beneficiary of the profits generated from their music and personal brand, they also reify the commodity-form capitalist system by attempting to turn their music and brand into a fetishized commodity and by turning their audience into a fetishized commodity.
Resumo:
This flyer promotes the event "Cuban Hip-Hop in Miami: A Conversation Moderated by Nora Gámez Torres" hosted by the Cuban Research Institute.
Resumo:
In this thesis, we proposed the use of device-to-device (D2D) communications for extending the coverage area of active base stations, for public safety communications with partial coverage. A 3GPP standard compliant D2D system level simulator is developed for HetNets and public safety scenarios and used to evaluate the performance of D2D discovery and communications underlying cellular networks. For D2D discovery, the benefits of time-domain inter-cell interference coordi- nation (ICIC) approaches by using almost blank subframes were evaluated. Also, the use of multi-hop is proposed to improve, even further, the performance of the D2D discovery process. Finally, the possibility of using multi-hop D2D communications for extending the coverage area of active base stations was evaluated. Improvements in energy and spectral efficiency, when compared with the case of direct UE-eNB communi- cations, were demonstrated. Moreover, UE power control techniques were applied to reduce the effects of interference from neighboring D2D links.
Resumo:
The Internet has become an integral part of our nation's critical socio-economic infrastructure. With its heightened use and growing complexity however, organizations are at greater risk of cyber crimes. To aid in the investigation of crimes committed on or via the Internet, a network forensics analysis tool pulls together needed digital evidence. It provides a platform for performing deep network analysis by capturing, recording and analyzing network events to find out the source of a security attack or other information security incidents. Existing network forensics work has been mostly focused on the Internet and fixed networks. But the exponential growth and use of wireless technologies, coupled with their unprecedented characteristics, necessitates the development of new network forensic analysis tools. This dissertation fostered the emergence of a new research field in cellular and ad-hoc network forensics. It was one of the first works to identify this problem and offer fundamental techniques and tools that laid the groundwork for future research. In particular, it introduced novel methods to record network incidents and report logged incidents. For recording incidents, location is considered essential to documenting network incidents. However, in network topology spaces, location cannot be measured due to absence of a 'distance metric'. Therefore, a novel solution was proposed to label locations of nodes within network topology spaces, and then to authenticate the identity of nodes in ad hoc environments. For reporting logged incidents, a novel technique based on Distributed Hash Tables (DHT) was adopted. Although the direct use of DHTs for reporting logged incidents would result in an uncontrollably recursive traffic, a new mechanism was introduced that overcome this recursive process. These logging and reporting techniques aided forensics over cellular and ad-hoc networks, which in turn increased their ability to track and trace attacks to their source. These techniques were a starting point for further research and development that would result in equipping future ad hoc networks with forensic components to complement existing security mechanisms.
Resumo:
Discussion moderated by CRI visiting scholar Noram Gamez Torres discussing the future of Cuban hip-hop, its racial politics, and the impact that the cultural exchange policy has had on these rappers and their music. Includes performances and discussion by artists Aldo Baquero (Los Aldeanos), Raudel Collazo (Escuadr6n Patriota), David Escalona (Omni Zona Franca), and Silvio Rodriguez (Silvito "EI Libre").