932 resultados para Para-Hermitian and Indefinite Metric
Resumo:
Mobile communication and networking infrastructures play an important role in the development of smart cities, to support real-time information exchange and management required in modern urbanization. Mobile WiFi devices that help offloading data traffic from the macro-cell base station and serve the end users within a closer range can significantly improve the connectivity of wireless communications between essential components including infrastructural and human devices in a city. However, this offloading function through interworking between LTE and WiFi systems will change the pattern of resource distributions operated by the base station. In this paper, a resource allocation scheme is proposed to ensure stable service coverage and end-user quality of experience (QoE) when offloading takes place in a macro-cell environment. In this scheme, a rate redistribution algorithm is derived to form a parametric scheduler to meet the required levels of efficiency and fairness, guided by a no-reference quality assessment metric. We show that the performance of resource allocation can be regulated by this scheduler without affecting the service coverage offered by the WLAN access point. The performances of different interworking scenarios and macro-cell scheduling policies are also compared.
Resumo:
This research focuses on automatically adapting a search engine size in response to fluctuations in query workload. Deploying a search engine in an Infrastructure as a Service (IaaS) cloud facilitates allocating or deallocating computer resources to or from the engine. Our solution is to contribute an adaptive search engine that will repeatedly re-evaluate its load and, when appropriate, switch over to a dierent number of active processors. We focus on three aspects and break them out into three sub-problems as follows: Continually determining the Number of Processors (CNP), New Grouping Problem (NGP) and Regrouping Order Problem (ROP). CNP means that (in the light of the changes in the query workload in the search engine) there is a problem of determining the ideal number of processors p active at any given time to use in the search engine and we call this problem CNP. NGP happens when changes in the number of processors are determined and it must also be determined which groups of search data will be distributed across the processors. ROP is how to redistribute this data onto processors while keeping the engine responsive and while also minimising the switchover time and the incurred network load. We propose solutions for these sub-problems. For NGP we propose an algorithm for incrementally adjusting the index to t the varying number of virtual machines. For ROP we present an ecient method for redistributing data among processors while keeping the search engine responsive. Regarding the solution for CNP, we propose an algorithm determining the new size of the search engine by re-evaluating its load. We tested the solution performance using a custom-build prototype search engine deployed in the Amazon EC2 cloud. Our experiments show that when we compare our NGP solution with computing the index from scratch, the incremental algorithm speeds up the index computation 2{10 times while maintaining a similar search performance. The chosen redistribution method is 25% to 50% faster than other methods and reduces the network load around by 30%. For CNP we present a deterministic algorithm that shows a good ability to determine a new size of search engine. When combined, these algorithms give an adapting algorithm that is able to adjust the search engine size with a variable workload.
Resumo:
The Internet has become an integral part of our nation’s critical socio-economic infrastructure. With its heightened use and growing complexity however, organizations are at greater risk of cyber crimes. To aid in the investigation of crimes committed on or via the Internet, a network forensics analysis tool pulls together needed digital evidence. It provides a platform for performing deep network analysis by capturing, recording and analyzing network events to find out the source of a security attack or other information security incidents. Existing network forensics work has been mostly focused on the Internet and fixed networks. But the exponential growth and use of wireless technologies, coupled with their unprecedented characteristics, necessitates the development of new network forensic analysis tools. This dissertation fostered the emergence of a new research field in cellular and ad-hoc network forensics. It was one of the first works to identify this problem and offer fundamental techniques and tools that laid the groundwork for future research. In particular, it introduced novel methods to record network incidents and report logged incidents. For recording incidents, location is considered essential to documenting network incidents. However, in network topology spaces, location cannot be measured due to absence of a ‘distance metric’. Therefore, a novel solution was proposed to label locations of nodes within network topology spaces, and then to authenticate the identity of nodes in ad hoc environments. For reporting logged incidents, a novel technique based on Distributed Hash Tables (DHT) was adopted. Although the direct use of DHTs for reporting logged incidents would result in an uncontrollably recursive traffic, a new mechanism was introduced that overcome this recursive process. These logging and reporting techniques aided forensics over cellular and ad-hoc networks, which in turn increased their ability to track and trace attacks to their source. These techniques were a starting point for further research and development that would result in equipping future ad hoc networks with forensic components to complement existing security mechanisms.
Resumo:
The attempts at carrying out terrorist attacks have become more prevalent. As a result, an increasing number of countries have become particularly vigilant against the means by which terrorists raise funds to finance their draconian acts against human life and property. Among the many counter-terrorism agencies in operation, governments have set up financial intelligence units (FIUs) within their borders for the purpose of tracking down terrorists’ funds. By investigating reported suspicious transactions, FIUs attempt to weed out financial criminals who use these illegal funds to finance terrorist activity. The prominent role played by FIUs means that their performance is always under the spotlight. By interviewing experts and conducting surveys of those associated with the fight against financial crime, this study investigated perceptions of FIU performance on a comparative basis between American and non-American FIUs. The target group of experts included financial institution personnel, civilian agents, law enforcement personnel, academicians, and consultants. Questions for the interview and surveys were based on the Kaplan and Norton’s Balanced Scorecard (BSC) methodology. One of the objectives of this study was to help determine the suitability of the BSC to this arena. While FIUs in this study have concentrated on performance by measuring outputs such as the number of suspicious transaction reports investigated, this study calls for a focus on outcomes involving all the parties responsible for financial criminal investigations. It is only through such an integrated approach that these various entities will be able to improve performance in solving financial crime. Experts in financial intelligence strongly believed that the quality and timeliness of intelligence was more important than keeping track of the number of suspicious transaction reports. Finally, this study concluded that the BSC could be appropriately applied to the arena of financial crime prevention even though the emphasis is markedly different from that in the private sector. While priority in the private sector is given to financial outcomes, in this arena employee growth and internal processes were perceived as most important in achieving a satisfactory outcome.
Resumo:
The purpose of the present dissertation was to evaluate the internal validity of symptoms of four common anxiety disorders included in the Diagnostic and Statistical Manual of Mental Disorders fourth edition (text revision) (DSM-IV-TR; American Psychiatric Association, 2000), namely, separation anxiety disorder (SAD), social phobia (SOP), specific phobia (SP), and generalized anxiety disorder (GAD), in a sample of 625 youth (ages 6 to 17 years) referred to an anxiety disorders clinic and 479 parents. Confirmatory factor analyses (CFAs) were conducted on the dichotomous items of the SAD, SOP, SP, and GAD sections of the youth and parent versions of the Anxiety Disorders Interview Schedule for DSM-IV (ADIS-IV: C/P; Silverman & Albano, 1996) to test and compare a number of factor models including a factor model based on the DSM. Contrary to predictions, findings from CFAs showed that a correlated model with five factors of SAD, SOP, SP, GAD worry, and GAD somatic distress, provided the best fit of the youth data as well as the parent data. Multiple group CFAs supported the metric invariance of the correlated five factor model across boys and girls. Thus, the present study’s finding supports the internal validity of DSM-IV SAD, SOP, and SP, but raises doubt regarding the internal validity of GAD.^
Resumo:
Anthropogenic habitat alterations and water-management practices have imposed an artificial spatial scale onto the once contiguous freshwater marshes of the Florida Everglades. To gain insight into how these changes may affect biotic communities, we examined whether variation in the abundance and community structure of large fishes (SL . 8 cm) in Everglades marshes varied more at regional or intraregional scales, and whether this variation was related to hydroperiod, water depth, floating mat volume, and vegetation density. From October 1997 to October 2002, we used an airboat electrofisher to sample large fishes at sites within three regions of the Everglades. Each of these regions is subject to unique watermanagement schedules. Dry-down events (water depth , 10 cm) occurred at several sites during spring in 1999, 2000, 2001, and 2002. The 2001 dry-down event was the most severe and widespread. Abundance of several fishes decreased significantly through time, and the number of days post-dry-down covaried significantly with abundance for several species. Processes operating at the regional scale appear to play important roles in regulating large fishes. The most pronounced patterns in abundance and community structure occurred at the regional scale, and the effect size for region was greater than the effect size for sites nested within region for abundance of all species combined, all predators combined, and each of the seven most abundant species. Non-metric multi-dimensional scaling revealed distinct groupings of sites corresponding to the three regions. We also found significant variation in community structure through time that correlated with the number of days post-dry-down. Our results suggest that hydroperiod and water management at the regional scale influence large fish communities of Everglades marshes.
Resumo:
Global connectivity, for anyone, at anyplace, at anytime, to provide high-speed, high-quality, and reliable communication channels for mobile devices, is now becoming a reality. The credit mainly goes to the recent technological advances in wireless communications comprised of a wide range of technologies, services, and applications to fulfill the particular needs of end-users in different deployment scenarios (Wi-Fi, WiMAX, and 3G/4G cellular systems). In such a heterogeneous wireless environment, one of the key ingredients to provide efficient ubiquitous computing with guaranteed quality and continuity of service is the design of intelligent handoff algorithms. Traditional single-metric handoff decision algorithms, such as Received Signal Strength (RSS) based, are not efficient and intelligent enough to minimize the number of unnecessary handoffs, decision delays, and call-dropping and/or blocking probabilities. This research presented a novel approach for the design and implementation of a multi-criteria vertical handoff algorithm for heterogeneous wireless networks. Several parallel Fuzzy Logic Controllers were utilized in combination with different types of ranking algorithms and metric weighting schemes to implement two major modules: the first module estimated the necessity of handoff, and the other module was developed to select the best network as the target of handoff. Simulations based on different traffic classes, utilizing various types of wireless networks were carried out by implementing a wireless test-bed inspired by the concept of Rudimentary Network Emulator (RUNE). Simulation results indicated that the proposed scheme provided better performance in terms of minimizing the unnecessary handoffs, call dropping, and call blocking and handoff blocking probabilities. When subjected to Conversational traffic and compared against the RSS-based reference algorithm, the proposed scheme, utilizing the FTOPSIS ranking algorithm, was able to reduce the average outage probability of MSs moving with high speeds by 17%, new call blocking probability by 22%, the handoff blocking probability by 16%, and the average handoff rate by 40%. The significant reduction in the resulted handoff rate provides MS with efficient power consumption, and more available battery life. These percentages indicated a higher probability of guaranteed session continuity and quality of the currently utilized service, resulting in higher user satisfaction levels.
Resumo:
Limestone-based (karstic) freshwater wetlands of the Everglades, Belize, Mexico, and Jamaica are distinctive in having a high biomass of CaCO3-rich periphyton mats. Diatoms are common components of these mats and show predictable responses to environmental variation, making them good candidates for assessing nutrient enrichment in these naturally ultraoligotrophic wetlands. However, aside from in the Everglades of southern Florida, very little research has been done to document the diatoms and their environmental preferences in karstic Caribbean wetlands, which are increasingly threatened by eutrophication. We identified diatoms in periphyton mats collected during wet and dry periods from the Everglades and similar freshwater karstic wetlands in Belize, Mexico, and Jamaica. We compared diatom assemblage composition and diversity among locations and periods, and the effect of the limiting nutrient, P, on species composition among locations. We used periphyton-mat total P (TP) as a metric of availability. A total of 176 diatom species in 45 genera were recorded from the 4 locations. Twenty-three of these species, including 9 that are considered indicative of Everglades diatom flora, were found in all 4 locations. In Everglades and Caribbean sites, we identified assemblages and indicator species associated with low and high periphyton-mat TP and calculated TP optima and tolerances for each indicator species. TP optima and tolerances of indicator species differed between the Everglades and the Caribbean, but weighted averaging models predicted periphyton-mat TP concentrations from diatom assemblages at Everglades (R2 = 0.56) and Caribbean (R2 = 0.85) locations. These results show that diatoms can be effective indicators of water quality in karstic wetlands of the Caribbean, but application of regionally generated transfer functions to distant sites provides less reliable estimates than locally developed functions.
Resumo:
Ecological monitoring is key to successful ecosystem restoration. Because all components within an ecosystem cannot be monitored, it is important to select indicators that are representative of the system, integrate system responses, clearly respond to system change, can be effectively and efficiently monitored, and are easily communicated. The roseate spoonbill is one ecological indicator species that meets these criteria within the Everglades ecosystem. Monitoring of roseate spoonbills in Florida Bay over the past 70 years has shown that aspects of this species’ reproduction respond to changes in hydrology and corresponding changes in prey abundance and availability. This indicator uses nesting location, nest numbers and nesting success in response to food abundance and availability. In turn, prey abundance is a function of hydrological conditions (especially water depth) and salinity. Metrics and targets for these performance measures were established based on previous findings. Values of each metric were translated into indices and identified as stoplight colors with green indicating that a given target has been met, yellow indicating that conditions are below the target, but within an acceptable range of it, and red indicating the measure is performing poorly in relation to the target.
Resumo:
In this paper, a heterogeneous network composed of femtocells deployed within a macrocell network is considered, and a quality-of-service (QoS)-oriented fairness metric which captures important characteristics of tiered network architectures is proposed. Using homogeneous Poisson processes, the sum capacities in such networks are expressed in closed form for co-channel, dedicated channel, and hybrid resource allocation methods. Then a resource splitting strategy that simultaneously considers capacity maximization, fairness constraints, and QoS constraints is proposed. Detailed computer simulations utilizing 3GPP simulation assumptions show that a hybrid allocation strategy with a well-designed resource split ratio enjoys the best cell-edge user performance, with minimal degradation in the sum throughput of macrocell users when compared with that of co-channel operation.
Resumo:
We developed diatom-based prediction models of hydrology and periphyton abundance to inform assessment tools for a hydrologically managed wetland. Because hydrology is an important driver of ecosystem change, hydrologic alterations by restoration efforts could modify biological responses, such as periphyton characteristics. In karstic wetlands, diatoms are particularly important components of mat-forming calcareous periphyton assemblages that both respond and contribute to the structural organization and function of the periphyton matrix. We examined the distribution of diatoms across the Florida Everglades landscape and found hydroperiod and periphyton biovolume were strongly correlated with assemblage composition. We present species optima and tolerances for hydroperiod and periphyton biovolume, for use in interpreting the directionality of change in these important variables. Predictions of these variables were mapped to visualize landscape-scale spatial patterns in a dominant driver of change in this ecosystem (hydroperiod) and an ecosystem-level response metric of hydrologic change (periphyton biovolume). Specific diatom assemblages inhabiting periphyton mats of differing abundance can be used to infer past conditions and inform management decisions based on how assemblages are changing. This study captures diatom responses to wide gradients of hydrology and periphyton characteristics to inform ecosystem-scale bioassessment efforts in a large wetland.
Resumo:
Saurochory (seed dispersal by reptiles) among crocodilians has largely been ignored, probably because these reptiles are generally assumed to be obligate carnivores incapable of digesting vegetable proteins and polysaccharides. Herein we review the literature on crocodilian diet, foraging ecology, digestive physiology and movement patterns, and provide additional empirical data from recent dietary studies of Alligator mississippiensis. We found evidence of frugivory in 13 of 18 (72.2%) species for which dietary information was available, indicating this behavior is widespread among the Crocodylia. Thirty-four families and 46 genera of plants were consumed by crocodilians. Fruit types consumed by crocodilians varied widely; over half (52.1%) were fleshy fruits. Some fruits are consumed as gastroliths or ingested incidental to prey capture; however, there is little doubt that on occasion, fruit is deliberately consumed, often in large quantities. Sensory cues involved in crocodilian frugivory are poorly understood, although airborne and waterborne cues as well as surface disturbances seem important. Crocodilians likely accrue nutritional benefits from frugivory and there are no a priori reasons to assume otherwise. Ingested seeds are regurgitated, retained in the stomach for indefinite and often lengthy periods, or passed through the digestive tract and excreted in feces. Chemical and mechanical scarification of seeds probably occurs in the stomach, but what effects these processes have on seed viability remain unknown. Because crocodilians have large territories and undertake lengthy movements, seeds are likely transported well beyond the parent plant before being voided. Little is known about the ultimate fate of seeds ingested by crocodilians; however, deposition sites could prove suitable for seed germination. Although there is no evidence for a crocodilian-specific dispersal syndrome similar to that described for other reptiles, our review strongly suggests that crocodilians function as effective agents of seed dispersal. Crocodilian saurochory offers a fertile ground for future research.
Resumo:
On the night of April 20, 2010, a group of students from the University of Puerto Rico (UPR), Río Piedras campus, met to organize an indefinite strike that quickly broadened into a defense of accessible public higher education of excellence as a fundamental right and not a privilege. Although the history of student activism in the UPR can be traced back to the early 1900s, the 2010-2011 strike will be remembered for the student activists’ use of new media technologies as resources that rapidly prompted and aided the numerous protests. This activist research entailed a critical ethnography and a critical discourse analysis (CDA) of traditional and alternative media coverage and treatment during the 2010 -2011 UPR student strike. I examined the use of the 2010-2011 UPR student activists’ resistance performances in constructing local, corporeal, and virtual spaces of resistance and contention during their movement. In particular, I analyzed the different tactics and strategies of resistance or repertoire of collective actions that student activists used (e.g. new media technologies) to frame their collective identities via alternative news media’s (re)presentation of the strike, while juxtaposing the university administration’s counter-resistance performances in counter-framing the student activists’ collective identity via traditional news media representations of the strike. I illustrated how both traditional and alternative media (re)presentations of student activism developed, maintained, and/or modified students activists’ collective identities. As such, the UPR student activism’s success should not be measured by the sum of demands granted, but by the sense of community achieved and the establishment of networks that continue to create resistance and change. These networks add to the debate surrounding Internet activism and its impact on student activism. Ultimately, the results of this study highlight the important role student movements have had in challenging different types of government policies and raising awareness of the importance of an accessible public higher education of excellence.
Resumo:
The Internet has become an integral part of our nation's critical socio-economic infrastructure. With its heightened use and growing complexity however, organizations are at greater risk of cyber crimes. To aid in the investigation of crimes committed on or via the Internet, a network forensics analysis tool pulls together needed digital evidence. It provides a platform for performing deep network analysis by capturing, recording and analyzing network events to find out the source of a security attack or other information security incidents. Existing network forensics work has been mostly focused on the Internet and fixed networks. But the exponential growth and use of wireless technologies, coupled with their unprecedented characteristics, necessitates the development of new network forensic analysis tools. This dissertation fostered the emergence of a new research field in cellular and ad-hoc network forensics. It was one of the first works to identify this problem and offer fundamental techniques and tools that laid the groundwork for future research. In particular, it introduced novel methods to record network incidents and report logged incidents. For recording incidents, location is considered essential to documenting network incidents. However, in network topology spaces, location cannot be measured due to absence of a 'distance metric'. Therefore, a novel solution was proposed to label locations of nodes within network topology spaces, and then to authenticate the identity of nodes in ad hoc environments. For reporting logged incidents, a novel technique based on Distributed Hash Tables (DHT) was adopted. Although the direct use of DHTs for reporting logged incidents would result in an uncontrollably recursive traffic, a new mechanism was introduced that overcome this recursive process. These logging and reporting techniques aided forensics over cellular and ad-hoc networks, which in turn increased their ability to track and trace attacks to their source. These techniques were a starting point for further research and development that would result in equipping future ad hoc networks with forensic components to complement existing security mechanisms.
Resumo:
An area of about 22,000 km² on the northern Blake Plateau, off the coast of South Carolina, contains an estimated 2 billion metric tons of phosphorite concretions, and about 1.2 billion metric tons of mixed ferromanganese-phosphorite pavement. Other offshore phosphorites occur between the Blake Plateau and known continental deposits, buried under variable thicknesses of sediments. The phosphorite resembles other marine phosphorites in composition, consisting primarily of carbonate-fluorapatite, some calcite, minor quartz and other minerals. The apatite is optically pseudo-isotropic and contains about 6% [CO3]**2- replacing [PO4]**3- in its structure. JOIDES drillings and other evidence show that the phosphorite is a lag deposit derived from Miocene strata correlatable with phosphatic Middle Tertiary sediments on the continent. It has undergone variable cycles of erosion, reworking, partial dissolution and reprecipitation. Its present form varies from phosphatized carbonate debris, loose pellets, and pebbles, to continuous pavements, plates, and conglomeratic boulders weighing hundreds of kilograms. No primary phosphatization is currently taking place on the Blake Plateau. The primary phosphate-depositing environment involved reducing conditions and required at least temporary absence of the powerful Gulf Stream current that now sweeps the bottom of the Blake Plateau and has eroded away the bulk of the Hawthorne-equivalent sediments with which the phosphorites were once associated.