883 resultados para Knowledge organization systems


Relevância:

30.00% 30.00%

Publicador:

Resumo:

The dissertation examines the foreign policies of the United States through the prism of science and technology. In the focal point of scrutiny is the policy establishing the International Institute for Applied Systems Analysis (IIASA) and the development of the multilateral part of bridge building in American foreign policy during the 1960s and early 1970s. After a long and arduous negotiation process, the institute was finally established by twelve national member organizations from the following countries: Bulgaria, Canada, Czechoslovakia, Federal Republic of Germany (FRG), France, German Democratic Republic (GDR), Great Britain, Italy, Japan, Poland, Soviet Union and United States; a few years later Sweden, Finland and the Netherlands also joined. It is said that the goal of the institute was to bring together researchers from East and West to solve pertinent problems caused by the modernization process experienced in industrialized world. It originates from President Lyndon B. Johnson s bridge building policies that were launched in 1964, and was set in a well-contested and crowded domain of other international organizations of environmental and social planning. Since the distinct need for yet another organization was not evident, the process of negotiations in this multinational environment enlightens the foreign policy ambitions of the United States on the road to the Cold War détente. The study places this project within its political era, and juxtaposes it with other international organizations, especially that of the OECD, ECE and NATO. Conventionally, Lyndon Johnson s bridge building policies have been seen as a means to normalize its international relations bilaterally with different East European countries, and the multilateral dimension of the policy has been ignored. This is why IIASA s establishment process in this multilateral environment brings forth new information on US foreign policy goals, the means to achieve these goals, as well as its relations to other advanced industrialized societies before the time of détente, during the 1960s and early 1970s. Furthermore, the substance of the institute applied systems analysis illuminates the differences between European and American methodological thinking in social planning. Systems analysis is closely associated with (American) science and technology policies of the 1960s, especially in its military administrative applications, thus analysis within the foreign policy environment of the United States proved particularly fruitful. In the 1960s the institutional structures of European continent with faltering, and the growing tendencies of integration were in flux. One example of this was the long, drawn-out process of British membership in the EEC, another is de Gaulle s withdrawal from NATO s military-political cooperation. On the other hand, however, economic cooperation in Europe between East and West, and especially with the Soviet Union was expanding rapidly. This American initiative to form a new institutional actor has to be seen in that structural context, showing that bridge building was needed not only to the East, but also to the West. The narrative amounts to an analysis of how the United States managed both cooperation and conflict in its hegemonic aspirations in the emerging modern world, and how it used its special relationship with the United Kingdom to achieve its goals. The research is based on the archives of the United States, Great Britain, Sweden, Finland, and IIASA. The primary sources have been complemented with both contemporary and present day research literature, periodicals, and interviews.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This paper proposes a method of designing fixed parameter decentralized power system stabilizers (PSS) for interconnected multi-machine power systems. Conventional design technique using a single machine infinite bus approximation involves the frequency response estimation called the GEP(s) between the AVR input and the resultant electrical torque. This requires the knowledge of equivalent external reactance and infinite bus voltage or their estimated values at each machine. Other design techniques using P-Vr characteristics or residues are based on complete system information. In the proposed method, information available at the high voltage bus of the step-up transformer is used to set up a modified Heffron-Phillip's model. With this model it is possible to decide the structure of the PSS compensator and tune its parameters at each machine in the multi-machine environment, using only those signals that are available at the generating station. The efficacy of the proposed design technique has been evaluated on three of the most widely used test systems. The simulation results have shown that the performance of the proposed stabilizer is comparable to that which could be obtained by conventional design but without the need for the estimation and computation of external system parameters.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Indigenous peoples with a historical continuity of resource-use practices often possess a broad knowledge base of the behavior of complex ecological systems in their own localities. This knowledge has accumulated through a long series of observations transmitted from generation to generation. Such ''diachronic'' observations can be of great value and complement the ''synchronic''observations on which western science is based. Where indigenous peoples have depended, for long periods of time, on local environments for the provision of a variety of resources, they have developed a stake in conserving, and in some cases, enhancing, biodiversity. They are aware that biological diversity is a crucial factor in generating the ecological services and natural resources on which they depend. Some indigenous groups manipulate the local landscape to augment its heterogeneity, and some have been found to be motivated to restore biodiversity in degraded landscapes. Their practices for the conservation of biodiversity were grounded in a series of rules of thumb which are apparently arrived at through a trial and error process over a long historical time period. This implies that their knowledge base is indefinite and their implementation involves an intimate relationship with the belief system. Such knowledge is difficult for western science to understand. It is vital, however, that the value of the knowledge-practice-belief complex of indigenous peoples relating to conservation of biodiversity is fully recognized if ecosystems and biodiversity are to be managed sustainably. Conserving this knowledge would be most appropriately accomplished through promoting the community-based resource-management systems of indigenous peoples.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Inspite of numerous research advancements made in recent years in the area of formal techniques, specification of real-time systems is still proving to be a very challenging and difficult problem. In this context, this paper critically examines state-of-the-art specification techniques for real-time systems and analyzes the emerging trends.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Fusion of multiple intrusion detection systems results in a more reliable and accurate detection for a wider class of intrusions. The paper presented here introduces the mathematical basis for sensor fusion and provides enough support for the acceptability of sensor fusion in performance enhancement of intrusion detection systems. The sensor fusion system is characterized and modeled with no knowledge of the intrusion detection systems and the intrusion detection data. The theoretical analysis is supported with an experimental illustration with three of the available intrusion detection systems using the DARPA 1999 evaluation data set.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

A central scheduling problem in wireless communications is that of allocating resources to one of many mobile stations that have a common radio channel. Much attention has been given to the design of efficient and fair scheduling schemes that are centrally controlled by a base station (BS) whose decisions depend on the channel conditions reported by each mobile. The BS is the only entity taking decisions in this framework. The decisions are based on the reports of mobiles on their radio channel conditions. In this paper, we study the scheduling problem from a game-theoretic perspective in which some of the mobiles may be noncooperative or strategic, and may not necessarily report their true channel conditions. We model this situation as a signaling game and study its equilibria. We demonstrate that the only Perfect Bayesian Equilibria (PBE) of the signaling game are of the babbling type: the noncooperative mobiles send signals independent of their channel states, the BS simply ignores them, and allocates channels based only on the prior information on the channel statistics. We then propose various approaches to enforce truthful signaling of the radio channel conditions: a pricing approach, an approach based on some knowledge of the mobiles' policies, and an approach that replaces this knowledge by a stochastic approximations approach that combines estimation and control. We further identify other equilibria that involve non-truthful signaling.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Network Intrusion Detection Systems (NIDS) intercept the traffic at an organization's network periphery to thwart intrusion attempts. Signature-based NIDS compares the intercepted packets against its database of known vulnerabilities and malware signatures to detect such cyber attacks. These signatures are represented using Regular Expressions (REs) and strings. Regular Expressions, because of their higher expressive power, are preferred over simple strings to write these signatures. We present Cascaded Automata Architecture to perform memory efficient Regular Expression pattern matching using existing string matching solutions. The proposed architecture performs two stage Regular Expression pattern matching. We replace the substring and character class components of the Regular Expression with new symbols. We address the challenges involved in this approach. We augment the Word-based Automata, obtained from the re-written Regular Expressions, with counter-based states and length bound transitions to perform Regular Expression pattern matching. We evaluated our architecture on Regular Expressions taken from Snort rulesets. We were able to reduce the number of automata states between 50% to 85%. Additionally, we could reduce the number of transitions by a factor of 3 leading to further reduction in the memory requirements.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Dominance and subordinate behaviors are important ingredients in the social organizations of group living animals. Behavioral observations on the two eusocial species Ropalidia marginata and Ropalidia cyathiformis suggest varying complexities in their social systems. The queen of R. cyathiformis is an aggressive individual who usually holds the top position in the dominance hierarchy although she does not necessarily show the maximum number of acts of dominance, while the R. marginata queen rarely shows aggression and usually does not hold the top position in the dominance hierarchy of her colony. In R. marginata, more workers are involved in dominance-subordinate interactions as compared to R. cyathiformis. These differences are reflected in the distribution of dominance-subordinate interactions among the hierarchically ranked individuals in both the species. The percentage of dominance interactions decreases gradually with hierarchical ranks in R. marginata while in R. cyathiformis it first increases and then decreases. We use an agent-based model to investigate the underlying mechanism that could give rise to the observed patterns for both the species. The model assumes, besides some non-interacting individuals, the interaction probabilities of the agents depend on their pre-differentiated winning abilities. Our simulations show that if the queen takes up a strategy of being involved in a moderate number of dominance interactions, one could get the pattern similar to R. cyathiformis, while taking up the strategy of very low interactions by the queen could lead to the pattern of R. marginata. We infer that both the species follow a common interaction pattern, while the differences in their social organization are due to the slight changes in queen as well as worker strategies. These changes in strategies are expected to accompany the evolution of more complex societies from simpler ones.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

An opportunistic, rate-adaptive system exploits multi-user diversity by selecting the best node, which has the highest channel power gain, and adapting the data rate to selected node's channel gain. Since channel knowledge is local to a node, we propose using a distributed, low-feedback timer backoff scheme to select the best node. It uses a mapping that maps the channel gain, or, in general, a real-valued metric, to a timer value. The mapping is such that timers of nodes with higher metrics expire earlier. Our goal is to maximize the system throughput when rate adaptation is discrete, as is the case in practice. To improve throughput, we use a pragmatic selection policy, in which even a node other than the best node can be selected. We derive several novel, insightful results about the optimal mapping and develop an algorithm to compute it. These results bring out the inter-relationship between the discrete rate adaptation rule, optimal mapping, and selection policy. We also extensively benchmark the performance of the optimal mapping with several timer and opportunistic multiple access schemes considered in the literature, and demonstrate that the developed scheme is effective in many regimes of interest.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Opportunistic relay selection in a multiple source-destination (MSD) cooperative system requires quickly allocating to each source-destination (SD) pair a suitable relay based on channel gains. Since the channel knowledge is available only locally at a relay and not globally, efficient relay selection algorithms are needed. For an MSD system, in which the SD pairs communicate in a time-orthogonal manner with the help of decode-and-forward relays, we propose three novel relay selection algorithms, namely, contention-free en masse assignment (CFEA), contention-based en masse assignment (CBEA), and a hybrid algorithm that combines the best features of CFEA and CBEA. En masse assignment exploits the fact that a relay can often aid not one but multiple SD pairs, and, therefore, can be assigned to multiple SD pairs. This drastically reduces the average time required to allocate an SD pair when compared to allocating the SD pairs one by one. We show that the algorithms are much faster than other selection schemes proposed in the literature and yield significantly higher net system throughputs. Interestingly, CFEA is as effective as CBEA over a wider range of system parameters than in single SD pair systems.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

We describe a framework to explore and visualize the movement of cloud systems. Using techniques from computational topology and computer vision, our framework allows the user to study this movement at various scales in space and time. Such movements could have large temporal and spatial scales such as the Madden Julian Oscillation (MJO), which has a spatial scale ranging from 1000 km to 10000 km and time of oscillation of around 40 days. Embedded within these larger scale oscillations are a hierarchy of cloud clusters which could have smaller spatial and temporal scales such as the Nakazawa cloud clusters. These smaller cloud clusters, while being part of the equatorial MJO, sometimes move at speeds different from the larger scale and in a direction opposite to that of the MJO envelope. Hitherto, one could only speculate about such movements by selectively analysing data and a priori knowledge of such systems. Our framework automatically delineates such cloud clusters and does not depend on the prior experience of the user to define cloud clusters. Analysis using our framework also shows that most tropical systems such as cyclones also contain multi-scale interactions between clouds and cloud systems. We show the effectiveness of our framework to track organized cloud system during one such rainfall event which happened at Mumbai, India in July 2005 and for cyclone Aila which occurred in Bay of Bengal during May 2009.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

A new series of lipophilic cholesteryl derivatives of 2,4,6-trichloro-pyrimidine-5-carbaldehyde has been synthesized. Oxyethylene spacers of variable lengths were inserted between the hydrogen bonding promoting pyrimidine core and the cholesteryl tail in order to understand their effect on the selfassembly of these compounds. Only compound 1a with the shortest spacer formed a gel in organic solvents such as n-butanol and n-dodecane. While other members (1b and c) having longer spacers led to sol formation and precipitation in n-butanol and n-dodecane respectively. The self-assembly phenomena associated with the gelation process were investigated using temperature-dependent UVVis and CD-spectroscopy. The morphological features of the freeze-dried gels obtained from different organic solvents were examined by scanning electron microscopy (SEM) and atomic force microscopy (AFM). The solid phase behaviours of these molecules and their associated alkali metal ion complexes were explored using polarized optical microscopy (POM) and differential scanning calorimetry (DSC). The molecular arrangements in the xerogel and in the solid state were further probed using a wide-angle Xray diffraction (WAXD) technique. Analysis of the wide-angle X-ray diffraction data reveals that this class of molecules adopts a hexagonal columnar organization in the gel and in the solid state. Each slice of these hexagonal columnar structures is composed of a dimeric molecular-assembly as a building block. Significant changes in the conformation of the oxyethylene chains could be triggered via the coordination of selected alkali metal ions. This led to the production of interesting metal ion promoted mesogenic behaviour.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Eutectic growth is an interesting example for exploring the topic of pattern-formation in multi-phase systems, where the growth of the phases is coupled with the diffusive transport of one or more components in the melt. While in the case of binary alloys, the number of possibilities are limited (lamellae, rods, labyrinth etc.), their number rapidly increases with the number of components and phases. In this paper, we will investigate pattern formation during three-phase eutectic solidification using a state-of-the art phase-field method based on the grand-canonical density formulation. The major aim of the study is to highlight the role of two properties, which are the volume fraction of the solid phases and the solid-liquid interfacial energies, in the self-organization of the solid phases during directional growth. Thereafter, we will show representative phase-field simulations of a micro-structure in a real alloy (Ag-Al-Cu) using an asymmetric phase diagram as well as interfacial properties.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

In this paper, we consider applying derived knowledge base regarding the sensitivity and specificity of damage(s) to be detected by an SHM system being designed and qualified. These efforts are necessary toward developing capabilities in SHM system to classify reliably various probable damages through sequence of monitoring, i.e., damage precursor identification, detection of damage and monitoring its progression. We consider the particular problem of visual and ultrasonic NDE based SHM system design requirements, where the damage detection sensitivity and specificity data definitions for a class of structural components are established. Methodologies for SHM system specification creation are discussed in details. Examples are shown to illustrate how the physics of damage detection scheme limits particular damage detection sensitivity and specificity and further how these information can be used in algorithms to combine various different NDE schemes in an SHM system to enhance efficiency and effectiveness. Statistical and data driven models to determine the sensitivity and probability of damage detection (POD) has been demonstrated for plate with varying one-sided line crack using optical and ultrasonic based inspection techniques.