1000 resultados para Coast side
Resumo:
Two new species of Naticidae (Mollusca, Gastropoda) collected from the coast of China are described: Cryptonaitca huanghaiensis sp. nov. and Sinum. vittatum sp. nov. The morphological characteristics between the new species were described and the related information was provided. The similarities and differenees between the new species and related species were also compared and discussed. The new species Cryptonaitea huanghaiensis differed from Cryptonaitca hirasei and Cryptonaitca andoi in outer shape, operculum and radula. The new species Sinum, vittatum is similar to Sinum, japonicum (Lischke, 1869), but the shell of the former is flat-elliptical in shape, spire very small, slightly convex. While the latter is flat-globular in shape, apex light brown in color, without a brown band on the body whorl. The comparison results revealed that Cryptonaitca huanghaiensis and Sinum vittatum were two new species from the coast of China. Specimens studied were obtained from collections in the Marine Biological Museum, Chinese Academy of Sciences.
Resumo:
The study analyses atmospheric feedback to the occurrence of upwelling along the Polish Baltic coast. Upwelling events were identified on the basis of daily mean sea surface temperature (SST) maps from the period 1982–2010 derived from the NOAA OI SST V2 High Resolution Dataset. Synoptic conditions favourable to the occurrence of upwelling were determined on the basis of the NCEP/NCAR reanalysis data. On average, there are approximately 23 days with upwelling each year along the Polish Baltic coast, which account for approximately 13%
Resumo:
http://www.archive.org/details/inwakeofwarcanoe00collrich
Resumo:
http://www.archive.org/details/missionspacific00eellrich
Resumo:
http://www.archive.org/details/upanddownnorth00crosrich
Resumo:
http://www.archive.org/details/indianmissionson00tororich
Resumo:
The advent of virtualization and cloud computing technologies necessitates the development of effective mechanisms for the estimation and reservation of resources needed by content providers to deliver large numbers of video-on-demand (VOD) streams through the cloud. Unfortunately, capacity planning for the QoS-constrained delivery of a large number of VOD streams is inherently difficult as VBR encoding schemes exhibit significant bandwidth variability. In this paper, we present a novel resource management scheme to make such allocation decisions using a mixture of per-stream reservations and an aggregate reservation, shared across all streams to accommodate peak demands. The shared reservation provides capacity slack that enables statistical multiplexing of peak rates, while assuring analytically bounded frame-drop probabilities, which can be adjusted by trading off buffer space (and consequently delay) and bandwidth. Our two-tiered bandwidth allocation scheme enables the delivery of any set of streams with less bandwidth (or equivalently with higher link utilization) than state-of-the-art deterministic smoothing approaches. The algorithm underlying our proposed frame-work uses three per-stream parameters and is linear in the number of servers, making it particularly well suited for use in an on-line setting. We present results from extensive trace-driven simulations, which confirm the efficiency of our scheme especially for small buffer sizes and delay bounds, and which underscore the significant realizable bandwidth savings, typically yielding losses that are an order of magnitude or more below our analytically derived bounds.
Resumo:
Traditionally, attacks on cryptographic algorithms looked for mathematical weaknesses in the underlying structure of a cipher. Side-channel attacks, however, look to extract secret key information based on the leakage from the device on which the cipher is implemented, be it smart-card, microprocessor, dedicated hardware or personal computer. Attacks based on the power consumption, electromagnetic emanations and execution time have all been practically demonstrated on a range of devices to reveal partial secret-key information from which the full key can be reconstructed. The focus of this thesis is power analysis, more specifically a class of attacks known as profiling attacks. These attacks assume a potential attacker has access to, or can control, an identical device to that which is under attack, which allows him to profile the power consumption of operations or data flow during encryption. This assumes a stronger adversary than traditional non-profiling attacks such as differential or correlation power analysis, however the ability to model a device allows templates to be used post-profiling to extract key information from many different target devices using the power consumption of very few encryptions. This allows an adversary to overcome protocols intended to prevent secret key recovery by restricting the number of available traces. In this thesis a detailed investigation of template attacks is conducted, along with how the selection of various attack parameters practically affect the efficiency of the secret key recovery, as well as examining the underlying assumption of profiling attacks in that the power consumption of one device can be used to extract secret keys from another. Trace only attacks, where the corresponding plaintext or ciphertext data is unavailable, are then investigated against both symmetric and asymmetric algorithms with the goal of key recovery from a single trace. This allows an adversary to bypass many of the currently proposed countermeasures, particularly in the asymmetric domain. An investigation into machine-learning methods for side-channel analysis as an alternative to template or stochastic methods is also conducted, with support vector machines, logistic regression and neural networks investigated from a side-channel viewpoint. Both binary and multi-class classification attack scenarios are examined in order to explore the relative strengths of each algorithm. Finally these machine-learning based alternatives are empirically compared with template attacks, with their respective merits examined with regards to attack efficiency.
Resumo:
Coastal lagoons are defined as shallow coastal water bodies partially separated from the adjacent sea by a restrictive barrier. Coastal lagoons are protected under Annex I of the European Habitats Directive (92/43/EEC). Lagoons are also considered to be “transitional water bodies” and are therefore included in the “register of protected areas” under the Water Framework Directive (2000/60/EC). Consequently, EU member states are required to establish monitoring plans and to regularly report on lagoon condition and conservation status. Irish lagoons are considered relatively rare and unusual because of their North Atlantic, macrotidal location on high energy coastlines and have received little attention. This work aimed to assess the physicochemical and ecological status of three lagoons, Cuskinny, Farranamanagh and Toormore, on the southwest coast of Ireland. Baseline salinity, nutrient and biological conditions were determined in order to provide reference conditions to detect perturbations, and to inform future maintenance of ecosystem health. Accumulation of organic matter is an increasing pressure in coastal lagoon habitats worldwide, often compounding existing eutrophication problems. This research also aimed to investigate the in situ decomposition process in a lagoon habitat together with exploring the associated invertebrate assemblages. Re-classification of the lagoons, under the guidelines of the Venice system for the classifications of marine waters according to salinity, was completed by taking spatial and temporal changes in salinity regimes into consideration. Based on the results of this study, Cuskinny, Farranamanagh and Toormore lagoons are now classified as mesohaline (5 ppt – 18 ppt), oligohaline (0.5 ppt – 5 ppt) and polyhaline (18 ppt – 30 ppt), respectively. Varying vertical, longitudinal and transverse salinity patterns were observed in the three lagoons. Strong correlations between salinity and cumulative rainfall highlighted the important role of precipitation in controlling the lagoon environment. Maximum effect of precipitation on the salinity of the lagoon was observed between four and fourteen days later depending on catchment area geology, indicating the uniqueness of each lagoon system. Seasonal nutrient patterns were evident in the lagoons. Nutrient concentrations were found to be reflective of the catchment area and the magnitude of the freshwater inflow. Assessment based on the Redfield molar ratio indicated a trend towards phosphorus, rather than nitrogen, limitation in Irish lagoons. Investigation of the decomposition process in Cuskinny Lagoon revealed that greatest biomass loss occurred in the winter season. Lowest biomass loss occurred in spring, possibly due to the high density of invertebrates feeding on the thick microbial layer rather than the decomposing litter. It has been reported that the decomposition of plant biomass is highest in the preferential distribution area of the plant species; however, no similar trend was observed in this study with the most active zones of decomposition varying spatially throughout the seasons. Macroinvertebrate analysis revealed low species diversity but high abundance, indicating the dominance of a small number of species. Invertebrate assemblages within the lagoon varied significantly from communities in the adjacent freshwater or marine environments. Although carried out in coastal lagoons on the southwest coast of Ireland, it is envisaged that the overall findings of this study have relevance throughout the entire island of Ireland and possibly to many North Atlantic coastal lagoon ecosystems elsewhere.
Resumo:
The clinical use of stem cells, such as bone marrow-derived and, more recently, resident cardiac stem cells, offers great promise for treatment of myocardial infarction and heart failure. The epicardium-derived cells have also attracted attention for their angiogenic paracrine actions and ability to differentiate into cardiomyocytes and vascular cells when activated during cardiac injury. In a recent study, Chong and colleagues have described a distinct population of epicardium-derived mesenchymal stem cells that reside in a perivascular niche of the heart and have a broad multilineage potential. Exploring the therapeutic capacity of these cells will be an exciting future endeavor.
Resumo:
From 2008-2012, a dramatic upsurge in incidents of maritime piracy in the Western Indian Ocean led to renewed global attention to this region: including the deployment of multi national naval patrols, attempts to prosecute suspected pirates, and the development of financial interdiction systems to track and stop the flow of piracy ransoms. Largely seen as the maritime ripple effect of anarchy on land, piracy has been slotted into narratives of state failure and problems of governance and criminality in this region.
This view fails to account for a number of factors that were crucial in making possible the unprecedented rise of Somali piracy and its contemporary transformation. Instead of an emphasis on failed states and crises of governance, my dissertation approaches maritime piracy within a historical and regional configuration of actors and relationships that precede this round of piracy and will outlive it. The story I tell in this work begins before the contemporary upsurge of piracy and closes with a foretaste of the itineraries beyond piracy that are being crafted along the East African coast.
Beginning in the world of port cities in the long nineteenth century, my dissertation locates piracy and the relationship between trade, plunder, and state formation within worlds of exchange, including European incursions into this oceanic space. Scholars of long distance trade have emphasized the sociality engendered through commerce and the centrality of idioms of trust and kinship in structuring mercantile relationships across oceanic divides. To complement this scholarship, my work brings into view the idiom of protection: as a claim to surety, a form of tax, and a moral claim to authority in trans-regional commerce.
To build this theory of protection, my work combines archival sources with a sustained ethnographic engagement in coastal East Africa, including the pirate ports of Northern Somalia, and focuses on the interaction between land-based pastoral economies and maritime trade. This connection between land and sea calls attention to two distinct visions of the ocean: one built around trade and mobility and the other built on the ocean as a space of extraction and sovereignty. Moving between historical encounters over trade and piracy and the development of a national maritime economy during the height of the Somali state, I link the contemporary upsurge of maritime piracy to the confluence of these two conceptualizations of the ocean and the ideas of capture, exchange, and redistribution embedded within them.
The second section of my dissertation reframes piracy as an economy of protection and a form of labor implicated within other legal and illegal economies in the Indian Ocean. Based on extensive field research, including interviews with self-identified pirates, I emphasize the forms of labor, value, and risk that characterize piracy as an economy of protection. The final section of my dissertation focuses on the diverse international, regional, and local responses to maritime piracy. This section locates the response to piracy within a post-Cold War and post-9/11 global order and longer attempts to regulate and assuage the risks of maritime trade. Through an ethnographic focus on maritime insurance markets, navies, and private security contractors, I analyze the centrality of protection as a calculation of risk and profit in the contemporary economy of counter-piracy.
Through this focus on longer histories of trade, empire, and regulation my dissertation reframes maritime piracy as an economy of protection straddling boundaries of land and sea, legality and illegality, law and economy, and history and anthropology.
Resumo:
The main sources of financing for small and medium sized enterprises (SMEs) are equity (internally generated cash), trade credit paid on time, long and short term bank credits, delayed payment on trade credit and other debt. The marginal costs of each financing instrument are driven by asymmetric information (cost of gathering and analysing information) and transactions costs associated with non-payment (costs of collecting and selling collateral). According to the Pecking Order Theory, firms will choose the cheapest source in terms of cost. In the case of the static trade-off theory, firms choose finance so that the marginal costs across financing sources are all equal, thus an additional Euro of financing is obtained from all the sources whereas under the Pecking Order Theory the source is determined by how far down the Pecking Order the firm is presently located. In this paper, we argue that both of these theories miss the point that the marginal costs are dependent of the use of the funds, and the asset side of the balance sheet primarily determines the financing source for an additional Euro. An empirical analysis on a unique dataset of Portuguese SME's confirms that the composition of the asset side of the balance sheet has an impact of the type of financing used and the Pecking Order Theory and the traditional Static Trade-off theory are rejected.
Resumo:
Based on the IMP research tradition this paper regards relationships and networks as key issues in the product development and supply management agenda. Within business networks, co-development is only possible to be analysed when emphasis is placed on interdependences and interactive relationships. Co-development usually implies close relationships that allow companies to rely on each other's resources. Close relationships imply interdependences, which may improve companies' technical and product development. By looking at the actual interactions - between a UK company and its Chinese suppliers - that led to an innovative solution and a successful product launch, evolving relationship patterns are identified and analysed in a case study. Both the literature review and case study findings highlight the importance of the 'guanxi' concept (meaning interpersonal relationships in Mandarin) when analysing business-to-business networks in China. Hence, it is suggested that guanxi-based thinking and acting should be incorporated into the interaction model when considering business networking that embrace China. 'Guanxi' broadens the validity of the interaction model, in terms of geographical proximity, and deepens its theoretical base. The case study provides valuable insights for supply management under a product development context in China. In practice, the main point of interest is that Chinese suppliers are important 'resource' providers as well as 'network' providers. Hence, it is suggested that guanxi practice should be reflected into theoretical developments.