884 resultados para Data Streams Distribution
Resumo:
The apposition compound eyes of gonodactyloid stomatopods are divided into a ventral and a dorsal hemisphere by six equatorial rows of enlarged ommatidia, the mid-band (MB). Whereas the hemispheres are specialized for spatial vision, the MB consists of four dorsal rows of ommatidia specialized for colour vision and two ventral rows specialized for polarization vision. The eight retinula cell axons (RCAs) from each ommatidium project retinotopically onto one corresponding lamina cartridge, so that the three retinal data streams (spatial, colour and polarization) remain anatomically separated. This study investigates whether the retinal specializations are reflected in differences in the RCA arrangement within the corresponding lamina cartridges. We have found that, in all three eye regions, the seven short visual fibres (svfs) formed by retinula cells 1-7 (R1-R7) terminate at two distinct lamina levels, geometrically separating the terminals of photoreceptors sensitive to either orthogonal e-vector directions or different wavelengths of light. This arrangement is required for the establishment of spectral and polarization opponency mechanisms. The long visual fibres (lvfs) of the eighth retinula cells (R8) pass through the lamina and project retinotopically to the distal medulla externa. Differences between the three eye regions exist in the packing of svf terminals and in the branching patterns of the lvfs within the lamina. We hypothesize that the R8 cells of MB rows 1-4 are incorporated into the colour vision system formed by R1-R7, whereas the R8 cells of MB rows 5 and 6 form a separate neural channel from R1 to R7 for polarization processing.
Resumo:
A network concept is introduced that exploits transparent optical grooming of traffic between an access network and a metro core ring network. This network is enabled by an optical router that allows bufferless aggregation of metro network traffic into higher-capacity data streams for core network transmission. A key functionality of the router is WDM to time-division multiplexing (TDM) transmultiplexing.
Resumo:
A novel simple all-optical nonlinear pulse processing technique using loop mirror intensity filtering and nonlinear broadening in normal dispersion fiber is described. The pulse processor offers reamplification and cleaning up of the optical signals and phase margin improvement. The efficiency of the technique is demonstrated by application to 40-Gb/s return-to-zero optical data streams.
Resumo:
A novel all-optical regeneration technique using loop-mirror intensity-filtering and nonlinear broadening in normal-dispersion fibre is described. The device offers 2R-regeneration function and phase margin improvement. The technique is applied to 40Gbit/s return-to-zero optical data streams.
Resumo:
A novel all-optical regeneration technique using loop-mirror intensity-filtering and nonlinear broadening in normal-dispersion fibre is described. The device offers 2R-regeneration function and phase margin improvement. The technique is applied to 40Gbit/s return-to-zero optical data streams.
Resumo:
A novel simple all-optical nonlinear pulse processing technique using loop mirror intensity filtering and nonlinear broadening in normal dispersion fiber is described. The pulse processor offers reamplification and cleaning up of the optical signals and phase margin improvement. The efficiency of the technique is demonstrated by application to 40-Gb/s return-to-zero optical data streams. © 2004 IEEE.
Resumo:
In recent years, there has been an enormous growth of location-aware devices, such as GPS embedded cell phones, mobile sensors and radio-frequency identification tags. The age of combining sensing, processing and communication in one device, gives rise to a vast number of applications leading to endless possibilities and a realization of mobile Wireless Sensor Network (mWSN) applications. As computing, sensing and communication become more ubiquitous, trajectory privacy becomes a critical piece of information and an important factor for commercial success. While on the move, sensor nodes continuously transmit data streams of sensed values and spatiotemporal information, known as ``trajectory information". If adversaries can intercept this information, they can monitor the trajectory path and capture the location of the source node. ^ This research stems from the recognition that the wide applicability of mWSNs will remain elusive unless a trajectory privacy preservation mechanism is developed. The outcome seeks to lay a firm foundation in the field of trajectory privacy preservation in mWSNs against external and internal trajectory privacy attacks. First, to prevent external attacks, we particularly investigated a context-based trajectory privacy-aware routing protocol to prevent the eavesdropping attack. Traditional shortest-path oriented routing algorithms give adversaries the possibility to locate the target node in a certain area. We designed the novel privacy-aware routing phase and utilized the trajectory dissimilarity between mobile nodes to mislead adversaries about the location where the message started its journey. Second, to detect internal attacks, we developed a software-based attestation solution to detect compromised nodes. We created the dynamic attestation node chain among neighboring nodes to examine the memory checksum of suspicious nodes. The computation time for memory traversal had been improved compared to the previous work. Finally, we revisited the trust issue in trajectory privacy preservation mechanism designs. We used Bayesian game theory to model and analyze cooperative, selfish and malicious nodes' behaviors in trajectory privacy preservation activities.^
Resumo:
In a sediment core AMK4-316 (460 cm long) on the basis of radiocarbon, oxygen isotope, and lithological data climatostratigraphy is established for time interval about 145 ka. The method of factor analysis and spline interpolation applied to data on distribution of planktic foraminifera species has allowed to reconstruct average annual and seasonal temperatures and salinity at the surface and at depth 100 m. The optimum of the Last Interglaciation (5e) is characterized by maximal temperatures, low amplitudes of seasonal fluctuations, and by increased thickness of the upper homogeneous layer. The glacial hydrological mode has arisen here 115 ka ago. Coolings outstripped appropriate events of the global continental glaciation. Minimal average annual temperatures (4-4.5°C) are reconstructed for 47-45, 42, 36, 29-30, and 10 ka. For 50-30 ka interval numerous strong temperature fluctuations that reflect migrations of the polar front are established. Maximal differences of salinity at the surface and depth 100 m showing influence of melting waters were in the beginning of deglaciations (135 and 20 ka) and repeatedly arose in 50-30 ka interval. The Last Glacial Maximum (18 ka) is characterized by the lowest salinity but not by a peak of low temperatures at the surface. Surface temperature was lowered up to 10 ka. Average annual surface temperature of the Holocene optimum was 2°C above the modern one and 2°C below temperature in the Interglaciation optimum (5e), thickness of the upper homogeneous layer exceeded 100 m.
Resumo:
With Tweet volumes reaching 500 million a day, sampling is inevitable for any application using Twitter data. Realizing this, data providers such as Twitter, Gnip and Boardreader license sampled data streams priced in accordance with the sample size. Big Data applications working with sampled data would be interested in working with a large enough sample that is representative of the universal dataset. Previous work focusing on the representativeness issue has considered ensuring the global occurrence rates of key terms, be reliably estimated from the sample. Present technology allows sample size estimation in accordance with probabilistic bounds on occurrence rates for the case of uniform random sampling. In this paper, we consider the problem of further improving sample size estimates by leveraging stratification in Twitter data. We analyze our estimates through an extensive study using simulations and real-world data, establishing the superiority of our method over uniform random sampling. Our work provides the technical know-how for data providers to expand their portfolio to include stratified sampled datasets, whereas applications are benefited by being able to monitor more topics/events at the same data and computing cost.
Resumo:
Thesis (Ph.D.)--University of Washington, 2016-08
Resumo:
Dissertação (mestrado)—Universidade de Brasília, Faculdade de Tecnologia, Departamento de Engenharia Elétrica, 2015.
Resumo:
Part 12: Collaboration Platforms
Resumo:
A presente dissertação tem como objetivo geral apresentar uma proposta de um modelo de observatório municipal do desporto na administração local, nomeadamente no concelho de Setúbal. Podem ser verificados alguns estudos sobre a temática dos observatórios no sector do desporto (Leite, 2013; Gaspar 2014). Em plena sociedade de informação, as organizações têm de gerir grandes fluxos de dados. Têm de ter capacidade de adaptação à realidade, mas acima de tudo, uma atitude pró-ativa no sentido de anteciparem novos cenários. Segundo Albornoz e Herschmann (2006), os observatórios costumam recolher, registar, acompanhar, interpretar dados, produzir indicadores estatísticos, criar metodologias para codificar, classificar e categorizar informações, estabelecendo conexões entre pessoas que trabalham em áreas similares, bem como monitorizar e analisar tendências. É exigido à administração local, serviços de qualidade e de transparência na adoção das suas politicas desportivas e a existência de um instrumento de recolha de informação, estruturado com base num modelo de análise que permita conhecer, analisar e compreender o estado de um dado contexto desportivo em tempo real, irá permitir a criação de uma base de dados contendo informação atualizada e confiável. Neste contexto, os sistemas de informação, quando desenvolvidos e aplicados, vão permitir a recolha de informação fundamental sobre o comportamento interno da organização (Claudino, 2005). A presente pesquisa representa uma investigação descritiva, tratando-se de um estudo de caso a aplicar na Câmara Municipal de Setúbal. Em termos da recolha de dados, foram utilizadas fontes primárias, com base numa análise documental. Os resultados deste estudo, permitem apresentar uma primeira abordagem de estrutura e processos de funcionamento de um modelo de observatório municipal do desporto com aplicação prática, tendo sido estabelecidos sete categorias de análise fundamentais: i) Atividades Desportivas; ii) Instalações Desportivas, iii) Associativismo; iv) Recursos Humanos; v) Sector Privado; vi) Consumo Desportivo; vii) Divisão Desporto. As estratégias das políticas públicas desportivas adotadas, o planeamento desportivo ou o acesso ao apoio financeiro, exigem que estejam disponíveis um conjunto de informações rigorosas e fidedignas sobre o desempenho, a evolução e as tendências do sector a nível local pelo que a estrutura de um observatório do desporto, irá permitir de uma forma eficiente, eficaz e participativa que se desenvolvam e projetem as políticas desportivas locais que melhor se ajustem à sua realidade. Acreditamos que a existência de um observatório municipal do desporto acrescenta benefícios para os municípios. As mudanças e os desafios económicos colocados hoje, obrigam a novas dinâmicas competitivas.
Resumo:
In recent years, there has been an enormous growth of location-aware devices, such as GPS embedded cell phones, mobile sensors and radio-frequency identification tags. The age of combining sensing, processing and communication in one device, gives rise to a vast number of applications leading to endless possibilities and a realization of mobile Wireless Sensor Network (mWSN) applications. As computing, sensing and communication become more ubiquitous, trajectory privacy becomes a critical piece of information and an important factor for commercial success. While on the move, sensor nodes continuously transmit data streams of sensed values and spatiotemporal information, known as ``trajectory information". If adversaries can intercept this information, they can monitor the trajectory path and capture the location of the source node. This research stems from the recognition that the wide applicability of mWSNs will remain elusive unless a trajectory privacy preservation mechanism is developed. The outcome seeks to lay a firm foundation in the field of trajectory privacy preservation in mWSNs against external and internal trajectory privacy attacks. First, to prevent external attacks, we particularly investigated a context-based trajectory privacy-aware routing protocol to prevent the eavesdropping attack. Traditional shortest-path oriented routing algorithms give adversaries the possibility to locate the target node in a certain area. We designed the novel privacy-aware routing phase and utilized the trajectory dissimilarity between mobile nodes to mislead adversaries about the location where the message started its journey. Second, to detect internal attacks, we developed a software-based attestation solution to detect compromised nodes. We created the dynamic attestation node chain among neighboring nodes to examine the memory checksum of suspicious nodes. The computation time for memory traversal had been improved compared to the previous work. Finally, we revisited the trust issue in trajectory privacy preservation mechanism designs. We used Bayesian game theory to model and analyze cooperative, selfish and malicious nodes' behaviors in trajectory privacy preservation activities.
Resumo:
This thesis builds a framework for evaluating downside risk from multivariate data via a special class of risk measures (RM). The peculiarity of the analysis lies in getting rid of strong data distributional assumptions and in orientation towards the most critical data in risk management: those with asymmetries and heavy tails. At the same time, under typical assumptions, such as the ellipticity of the data probability distribution, the conformity with classical methods is shown. The constructed class of RM is a multivariate generalization of the coherent distortion RM, which possess valuable properties for a risk manager. The design of the framework is twofold. The first part contains new computational geometry methods for the high-dimensional data. The developed algorithms demonstrate computability of geometrical concepts used for constructing the RM. These concepts bring visuality and simplify interpretation of the RM. The second part develops models for applying the framework to actual problems. The spectrum of applications varies from robust portfolio selection up to broader spheres, such as stochastic conic optimization with risk constraints or supervised machine learning.