907 resultados para Time-invariant Wavelet Analysis
Resumo:
The amount of solar radiation transmitted through Arctic sea ice is determined by the thickness and physical properties of snow and sea ice. Light transmittance is highly variable in space and time since thickness and physical properties of snow and sea ice are highly heterogeneous on variable time and length scales. We present field measurements of under-ice irradiance along transects under undeformed land-fast sea ice at Barrow, Alaska (March, May, and June 2010). The measurements were performed with a spectral radiometer mounted on a floating under-ice sled. The objective was to quantify the spatial variability of light transmittance through snow and sea ice, and to compare this variability along its seasonal evolution. Along with optical measurements, snow depth, sea ice thickness, and freeboard were recorded, and ice cores were analyzed for chlorophyll a and particulate matter. Our results show that snow cover variability prior to onset of snow melt causes as much relative spatial variability of light transmittance as the contrast of ponded and white ice during summer. Both before and after melt onset, measured transmittances fell in a range from one third to three times the mean value. In addition, we found a twentyfold increase of light transmittance as a result of partial snowmelt, showing the seasonal evolution of transmittance through sea ice far exceeds the spatial variability. However, prior melt onset, light transmittance was time invariant and differences in under-ice irradiance were directly related to the spatial variability of the snow cover.
Resumo:
El trabajo se propone volver sobre el problema del carácter histórico del Poema de Mio Cid no ya para determinar su valor como testimonio histórico sino para acercarse a la idea de tiempo histórico que el texto presenta al receptor. Para ello se han analizado algunos pasajes del poema y se ha observado cómo, a partir de un uso muy particular de las formas verbales, se lleva a cabo un proceso de paulatina actualización, un efecto que podríamos denominar 'presentización', que va acompañado de un aumento de la intensidad dramática en los episodios en cuestión.
Resumo:
El trabajo se propone volver sobre el problema del carácter histórico del Poema de Mio Cid no ya para determinar su valor como testimonio histórico sino para acercarse a la idea de tiempo histórico que el texto presenta al receptor. Para ello se han analizado algunos pasajes del poema y se ha observado cómo, a partir de un uso muy particular de las formas verbales, se lleva a cabo un proceso de paulatina actualización, un efecto que podríamos denominar 'presentización', que va acompañado de un aumento de la intensidad dramática en los episodios en cuestión.
Resumo:
El trabajo se propone volver sobre el problema del carácter histórico del Poema de Mio Cid no ya para determinar su valor como testimonio histórico sino para acercarse a la idea de tiempo histórico que el texto presenta al receptor. Para ello se han analizado algunos pasajes del poema y se ha observado cómo, a partir de un uso muy particular de las formas verbales, se lleva a cabo un proceso de paulatina actualización, un efecto que podríamos denominar 'presentización', que va acompañado de un aumento de la intensidad dramática en los episodios en cuestión.
Resumo:
Holocene climate variability is investigated in the North Pacific and North Atlantic realms, using alkenone-derived sea-surface temperature (SST) records as well as a millennial scale simulation with a coupled atmosphere-ocean general circulation model (AOGCM). The alkenone SST data indicate a temperature increase over almost the entire North Pacific from 7 cal kyr BP to the present. A dipole pattern with a continuous cooling in the northeastern Atlantic and a warming in the eastern Mediterranean Sea and the northern Red Sea is detected in the North Atlantic realm. Similarly, SST variations are opposite in sign between the northeastern Pacific and the northeastern Atlantic. A 2300 year long AOGCM climate simulation reveals a similar SST seesaw between the northeastern Pacific and the northeastern Atlantic on centennial time scales. Our analysis of the alkenone SST data and the model results suggests fundamental inter-oceanic teleconnections during the Holocene.
Resumo:
State-of-the-art process-based models have shown to be applicable to the simulation and prediction of coastal morphodynamics. On annual to decadal temporal scales, these models may show limitations in reproducing complex natural morphological evolution patterns, such as the movement of bars and tidal channels, e.g. the observed decadal migration of the Medem Channel in the Elbe Estuary, German Bight. Here a morphodynamic model is shown to simulate the hydrodynamics and sediment budgets of the domain to some extent, but fails to adequately reproduce the pronounced channel migration, due to the insufficient implementation of bank erosion processes. In order to allow for long-term simulations of the domain, a nudging method has been introduced to update the model-predicted bathymetries with observations. The model-predicted bathymetry is nudged towards true states in annual time steps. Sensitivity analysis of a user-defined correlation length scale, for the definition of the background error covariance matrix during the nudging procedure, suggests that the optimal error correlation length is similar to the grid cell size, here 80-90 m. Additionally, spatially heterogeneous correlation lengths produce more realistic channel depths than do spatially homogeneous correlation lengths. Consecutive application of the nudging method compensates for the (stand-alone) model prediction errors and corrects the channel migration pattern, with a Brier skill score of 0.78. The proposed nudging method in this study serves as an analytical approach to update model predictions towards a predefined 'true' state for the spatiotemporal interpolation of incomplete morphological data in long-term simulations.
Resumo:
Detailed biostratigraphy in Site 1006 based on planktonic foraminifers and nannofossils shows large-scale sedimentation rate variability in the Florida Strait west of the Great Bahama Bank. A 'floating' cyclostratigraphy based mainly on resistivity logs and magnetic susceptibility data has been fixed to the biostratigraphy in the absence of magnetostratigraphy. The strongest orbital cycle present is the precessional beat, which is present in the borehole logs throughout the record. Counting the cycles resulted in an accurate time scale and thus a sedimentation rate time series. Spectral analysis of the sedimentation rate time series shows that the short-term cycle of eccentricity (~125 k.y.) and the long term cycle of eccentricity (~400 k.y.) are pervasive throughout the Miocene record, together with the long-term ~2-m.y. eccentricity cycle. The Great Bahama Bank produced pulses of shallow carbonate input once every precessional (sea level) cycle during the Miocene and perhaps two pulses per cycle in the early Pliocene. The amount of sediment exported in these pulses appears to be controlled by eccentricity modulation of the precessional amplitude and therefore the amplitude of the sea-level rise. Finally, an increase in sedimentation rate just after the Miocene/Pliocene boundary is attributed to a change in the location and strength of sediment drift currents in the Florida Strait due to reorganization of the currents following the closure of the Panama Isthmus.
Resumo:
In this paper, using the worldwide dataset of bilateral tariff rates, we explore how serious the omission of bilateral tariff rates in gravity is. Our findings are as follow. Firstly, the omission of bilateral tariff rates seems not to be so serious in terms of omitted-variable biases because the coefficients for the usual gravity variables do not change before or after their inclusion. Secondly, while the widely-used dummy variable of regional trade agreement could not play an alternative role in place of tariff rates, the inclusion of time-invariant pair fixed effects in addition to the time-variant importer fixed effects and exporter fixed effects accounts for the omission of tariff rates. The inclusion of those fixed effects makes the coefficient for bilateral tariff rates insignificant.
Resumo:
In this paper, we examine the role of export promotion agencies (EPAs) in promoting exports from Japan and Korea. Looking at two home countries enables us to tackle endogeneity issues by controlling for both country-pair time-invariant characteristics and importing country time-varying characteristics. Our empirical results indicate that the coefficients of the EPA dummy are similar in size to those of the FTA dummy. This implies that establishing an EPA office in a country is equivalent to signing an FTA with that country. In addition, we find that EPA’s effects are larger for manufactured products than non-manufactured products. Finally, the EPA effect is larger for low income trade partners than for high income trade partners.
Resumo:
Soil erosion is a complex phenomenon involving the detachment and transport of soil particles, storage and runoff of rainwater, and infiltration. The relative magnitude and importance of these processes depends on several factors being one of them surface micro-topography, usually quanti[U+FB01]ed trough soil surface roughness (SSR). SSR greatly affects surface sealing and runoff generation, yet little information is available about the effect of roughness on the spatial distribution of runoff and on flow concentration. The methods commonly used to measure SSR involve measuring point elevation using a pin roughness meter or laser, both of which are labor intensive and expensive. Lately a simple and inexpensive technique based on percentage of shadow in soil surface image has been developed to determine SSR in the field in order to obtain measurement for wide spread application. One of the first steps in this technique is image de-noising and thresholding to estimate the percentage of black pixels in the studied area. In this work, a series of soil surface images have been analyzed applying several de-noising wavelet analysis and thresholding algorithms to study the variation in percentage of shadows and the shadows size distribution
Resumo:
In this paper we study, through a concrete case, the feasibility of using a high-level, general-purpose logic language in the design and implementation of applications targeting wearable computers. The case study is a "sound spatializer" which, given real-time signáis for monaural audio and heading, generates stereo sound which appears to come from a position in space. The use of advanced compile-time transformations and optimizations made it possible to execute code written in a clear style without efñciency or architectural concerns on the target device, while meeting strict existing time and memory constraints. The final executable compares favorably with a similar implementation written in C. We believe that this case is representative of a wider class of common pervasive computing applications, and that the techniques we show here can be put to good use in a range of scenarios. This points to the possibility of applying high-level languages, with their associated flexibility, conciseness, ability to be automatically parallelized, sophisticated compile-time tools for analysis and verification, etc., to the embedded systems field without paying an unnecessary performance penalty.
Resumo:
The extraordinary increase of new information technologies, the development of Internet, the electronic commerce, the e-government, mobile telephony and future cloud computing and storage, have provided great benefits in all areas of society. Besides these, there are new challenges for the protection of information, such as the loss of confidentiality and integrity of electronic documents. Cryptography plays a key role by providing the necessary tools to ensure the safety of these new media. It is imperative to intensify the research in this area, to meet the growing demand for new secure cryptographic techniques. The theory of chaotic nonlinear dynamical systems and the theory of cryptography give rise to the chaotic cryptography, which is the field of study of this thesis. The link between cryptography and chaotic systems is still subject of intense study. The combination of apparently stochastic behavior, the properties of sensitivity to initial conditions and parameters, ergodicity, mixing, and the fact that periodic points are dense, suggests that chaotic orbits resemble random sequences. This fact, and the ability to synchronize multiple chaotic systems, initially described by Pecora and Carroll, has generated an avalanche of research papers that relate cryptography and chaos. The chaotic cryptography addresses two fundamental design paradigms. In the first paradigm, chaotic cryptosystems are designed using continuous time, mainly based on chaotic synchronization techniques; they are implemented with analog circuits or by computer simulation. In the second paradigm, chaotic cryptosystems are constructed using discrete time and generally do not depend on chaos synchronization techniques. The contributions in this thesis involve three aspects about chaotic cryptography. The first one is a theoretical analysis of the geometric properties of some of the most employed chaotic attractors for the design of chaotic cryptosystems. The second one is the cryptanalysis of continuos chaotic cryptosystems and finally concludes with three new designs of cryptographically secure chaotic pseudorandom generators. The main accomplishments contained in this thesis are: v Development of a method for determining the parameters of some double scroll chaotic systems, including Lorenz system and Chua’s circuit. First, some geometrical characteristics of chaotic system have been used to reduce the search space of parameters. Next, a scheme based on the synchronization of chaotic systems was built. The geometric properties have been employed as matching criterion, to determine the values of the parameters with the desired accuracy. The method is not affected by a moderate amount of noise in the waveform. The proposed method has been applied to find security flaws in the continuous chaotic encryption systems. Based on previous results, the chaotic ciphers proposed by Wang and Bu and those proposed by Xu and Li are cryptanalyzed. We propose some solutions to improve the cryptosystems, although very limited because these systems are not suitable for use in cryptography. Development of a method for determining the parameters of the Lorenz system, when it is used in the design of two-channel cryptosystem. The method uses the geometric properties of the Lorenz system. The search space of parameters has been reduced. Next, the parameters have been accurately determined from the ciphertext. The method has been applied to cryptanalysis of an encryption scheme proposed by Jiang. In 2005, Gunay et al. proposed a chaotic encryption system based on a cellular neural network implementation of Chua’s circuit. This scheme has been cryptanalyzed. Some gaps in security design have been identified. Based on the theoretical results of digital chaotic systems and cryptanalysis of several chaotic ciphers recently proposed, a family of pseudorandom generators has been designed using finite precision. The design is based on the coupling of several piecewise linear chaotic maps. Based on the above results a new family of chaotic pseudorandom generators named Trident has been designed. These generators have been specially designed to meet the needs of real-time encryption of mobile technology. According to the above results, this thesis proposes another family of pseudorandom generators called Trifork. These generators are based on a combination of perturbed Lagged Fibonacci generators. This family of generators is cryptographically secure and suitable for use in real-time encryption. Detailed analysis shows that the proposed pseudorandom generator can provide fast encryption speed and a high level of security, at the same time. El extraordinario auge de las nuevas tecnologías de la información, el desarrollo de Internet, el comercio electrónico, la administración electrónica, la telefonía móvil y la futura computación y almacenamiento en la nube, han proporcionado grandes beneficios en todos los ámbitos de la sociedad. Junto a éstos, se presentan nuevos retos para la protección de la información, como la suplantación de personalidad y la pérdida de la confidencialidad e integridad de los documentos electrónicos. La criptografía juega un papel fundamental aportando las herramientas necesarias para garantizar la seguridad de estos nuevos medios, pero es imperativo intensificar la investigación en este ámbito para dar respuesta a la demanda creciente de nuevas técnicas criptográficas seguras. La teoría de los sistemas dinámicos no lineales junto a la criptografía dan lugar a la ((criptografía caótica)), que es el campo de estudio de esta tesis. El vínculo entre la criptografía y los sistemas caóticos continúa siendo objeto de un intenso estudio. La combinación del comportamiento aparentemente estocástico, las propiedades de sensibilidad a las condiciones iniciales y a los parámetros, la ergodicidad, la mezcla, y que los puntos periódicos sean densos asemejan las órbitas caóticas a secuencias aleatorias, lo que supone su potencial utilización en el enmascaramiento de mensajes. Este hecho, junto a la posibilidad de sincronizar varios sistemas caóticos descrita inicialmente en los trabajos de Pecora y Carroll, ha generado una avalancha de trabajos de investigación donde se plantean muchas ideas sobre la forma de realizar sistemas de comunicaciones seguros, relacionando así la criptografía y el caos. La criptografía caótica aborda dos paradigmas de diseño fundamentales. En el primero, los criptosistemas caóticos se diseñan utilizando circuitos analógicos, principalmente basados en las técnicas de sincronización caótica; en el segundo, los criptosistemas caóticos se construyen en circuitos discretos u ordenadores, y generalmente no dependen de las técnicas de sincronización del caos. Nuestra contribución en esta tesis implica tres aspectos sobre el cifrado caótico. En primer lugar, se realiza un análisis teórico de las propiedades geométricas de algunos de los sistemas caóticos más empleados en el diseño de criptosistemas caóticos vii continuos; en segundo lugar, se realiza el criptoanálisis de cifrados caóticos continuos basados en el análisis anterior; y, finalmente, se realizan tres nuevas propuestas de diseño de generadores de secuencias pseudoaleatorias criptográficamente seguros y rápidos. La primera parte de esta memoria realiza un análisis crítico acerca de la seguridad de los criptosistemas caóticos, llegando a la conclusión de que la gran mayoría de los algoritmos de cifrado caóticos continuos —ya sean realizados físicamente o programados numéricamente— tienen serios inconvenientes para proteger la confidencialidad de la información ya que son inseguros e ineficientes. Asimismo una gran parte de los criptosistemas caóticos discretos propuestos se consideran inseguros y otros no han sido atacados por lo que se considera necesario más trabajo de criptoanálisis. Esta parte concluye señalando las principales debilidades encontradas en los criptosistemas analizados y algunas recomendaciones para su mejora. En la segunda parte se diseña un método de criptoanálisis que permite la identificaci ón de los parámetros, que en general forman parte de la clave, de algoritmos de cifrado basados en sistemas caóticos de Lorenz y similares, que utilizan los esquemas de sincronización excitador-respuesta. Este método se basa en algunas características geométricas del atractor de Lorenz. El método diseñado se ha empleado para criptoanalizar eficientemente tres algoritmos de cifrado. Finalmente se realiza el criptoanálisis de otros dos esquemas de cifrado propuestos recientemente. La tercera parte de la tesis abarca el diseño de generadores de secuencias pseudoaleatorias criptográficamente seguras, basadas en aplicaciones caóticas, realizando las pruebas estadísticas, que corroboran las propiedades de aleatoriedad. Estos generadores pueden ser utilizados en el desarrollo de sistemas de cifrado en flujo y para cubrir las necesidades del cifrado en tiempo real. Una cuestión importante en el diseño de sistemas de cifrado discreto caótico es la degradación dinámica debida a la precisión finita; sin embargo, la mayoría de los diseñadores de sistemas de cifrado discreto caótico no ha considerado seriamente este aspecto. En esta tesis se hace hincapié en la importancia de esta cuestión y se contribuye a su esclarecimiento con algunas consideraciones iniciales. Ya que las cuestiones teóricas sobre la dinámica de la degradación de los sistemas caóticos digitales no ha sido totalmente resuelta, en este trabajo utilizamos algunas soluciones prácticas para evitar esta dificultad teórica. Entre las técnicas posibles, se proponen y evalúan varias soluciones, como operaciones de rotación de bits y desplazamiento de bits, que combinadas con la variación dinámica de parámetros y con la perturbación cruzada, proporcionan un excelente remedio al problema de la degradación dinámica. Además de los problemas de seguridad sobre la degradación dinámica, muchos criptosistemas se rompen debido a su diseño descuidado, no a causa de los defectos esenciales de los sistemas caóticos digitales. Este hecho se ha tomado en cuenta en esta tesis y se ha logrado el diseño de generadores pseudoaleatorios caóticos criptogr áficamente seguros.