810 resultados para Efficiency, Networks, Player and Partner Heterogeneity
Resumo:
This paper characterizes efficient networks in player and partner heterogeneity models for both the one-way flow and the two-way flow models. Player (partner) dependent network formation allows benefits and costs to be player (partner) heterogeneous which is an important extension for modeling social networks in the real world. Employing widely used assumptions, I show that efficient networks in the two way flow model are minimally connected and have star or derivative of star type architectures, whereas efficient networks in the one way flow model have wheel architectures.
Resumo:
We study heterogeneity among nodes in self-organizing smart camera networks, which use strategies based on social and economic knowledge to target communication activity efficiently. We compare homogeneous configurations, when cameras use the same strategy, with heterogeneous configurations, when cameras use different strategies. Our first contribution is to establish that static heterogeneity leads to new outcomes that are more efficient than those possible with homogeneity. Next, two forms of dynamic heterogeneity are investigated: nonadaptive mixed strategies and adaptive strategies, which learn online. Our second contribution is to show that mixed strategies offer Pareto efficiency consistently comparable with the most efficient static heterogeneous configurations. Since the particular configuration required for high Pareto efficiency in a scenario will not be known in advance, our third contribution is to show how decentralized online learning can lead to more efficient outcomes than the homogeneous case. In some cases, outcomes from online learning were more efficient than all other evaluated configuration types. Our fourth contribution is to show that online learning typically leads to outcomes more evenly spread over the objective space. Our results provide insight into the relationship between static, dynamic, and adaptive heterogeneity, suggesting that all have a key role in achieving efficient self-organization.
Resumo:
We provide empirical evidence to support the claims that social diversity promotes prosocial behavior. We elicit a real-life social network and its members’ adherence to a social norm, namely inequity aversion. The data reveal a positive relationship between subjects’ prosociality and several measures of centrality. This result is in line with the theoretical literature that relates the evolution of social norms to the structure of social interactions and argues that central individuals are crucial for the emergence of prosocial behavior.
Resumo:
Fundação de Amparo à Pesquisa do Estado de São Paulo (FAPESP)
Resumo:
One of the main objectives in restructuring power industry is enhancing the efficiency of power facilities. However, power generation industry, which plays a key role in the power industry, has a noticeable share in emission amongst all other emission-generating sectors. In this study, we have developed some new Data Envelopment Analysis models to find efficient power plants based on less fuel consumption, combusting less polluting fuel types, and incorporating emission factors in order to measure the ecological efficiency trend. We then applied these models to measuring eco-efficiency during an eight-year period of power industry restructuring in Iran. Results reveal that there has been a significant improvement in eco-efficiency, cost efficiency and allocative efficiency of the power plants during the restructuring period. It is also shown that despite the hydro power plants look eco-efficient; the combined cycle ones have been more allocative efficient than the other power generation technologies used in Iran.
Resumo:
The proliferation of new mobile communication devices, such as smartphones and tablets, has led to an exponential growth in network traffic. The demand for supporting the fast-growing consumer data rates urges the wireless service providers and researchers to seek a new efficient radio access technology, which is the so-called 5G technology, beyond what current 4G LTE can provide. On the other hand, ubiquitous RFID tags, sensors, actuators, mobile phones and etc. cut across many areas of modern-day living, which offers the ability to measure, infer and understand the environmental indicators. The proliferation of these devices creates the term of the Internet of Things (IoT). For the researchers and engineers in the field of wireless communication, the exploration of new effective techniques to support 5G communication and the IoT becomes an urgent task, which not only leads to fruitful research but also enhance the quality of our everyday life. Massive MIMO, which has shown the great potential in improving the achievable rate with a very large number of antennas, has become a popular candidate. However, the requirement of deploying a large number of antennas at the base station may not be feasible in indoor scenarios. Does there exist a good alternative that can achieve similar system performance to massive MIMO for indoor environment? In this dissertation, we address this question by proposing the time-reversal technique as a counterpart of massive MIMO in indoor scenario with the massive multipath effect. It is well known that radio signals will experience many multipaths due to the reflection from various scatters, especially in indoor environments. The traditional TR waveform is able to create a focusing effect at the intended receiver with very low transmitter complexity in a severe multipath channel. TR's focusing effect is in essence a spatial-temporal resonance effect that brings all the multipaths to arrive at a particular location at a specific moment. We show that by using time-reversal signal processing, with a sufficiently large bandwidth, one can harvest the massive multipaths naturally existing in a rich-scattering environment to form a large number of virtual antennas and achieve the desired massive multipath effect with a single antenna. Further, we explore the optimal bandwidth for TR system to achieve maximal spectral efficiency. Through evaluating the spectral efficiency, the optimal bandwidth for TR system is found determined by the system parameters, e.g., the number of users and backoff factor, instead of the waveform types. Moreover, we investigate the tradeoff between complexity and performance through establishing a generalized relationship between the system performance and waveform quantization in a practical communication system. It is shown that a 4-bit quantized waveforms can be used to achieve the similar bit-error-rate compared to the TR system with perfect precision waveforms. Besides 5G technology, Internet of Things (IoT) is another terminology that recently attracts more and more attention from both academia and industry. In the second part of this dissertation, the heterogeneity issue within the IoT is explored. One of the significant heterogeneity considering the massive amount of devices in the IoT is the device heterogeneity, i.e., the heterogeneous bandwidths and associated radio-frequency (RF) components. The traditional middleware techniques result in the fragmentation of the whole network, hampering the objects interoperability and slowing down the development of a unified reference model for the IoT. We propose a novel TR-based heterogeneous system, which can address the bandwidth heterogeneity and maintain the benefit of TR at the same time. The increase of complexity in the proposed system lies in the digital processing at the access point (AP), instead of at the devices' ends, which can be easily handled with more powerful digital signal processor (DSP). Meanwhile, the complexity of the terminal devices stays low and therefore satisfies the low-complexity and scalability requirement of the IoT. Since there is no middleware in the proposed scheme and the additional physical layer complexity concentrates on the AP side, the proposed heterogeneous TR system better satisfies the low-complexity and energy-efficiency requirement for the terminal devices (TDs) compared with the middleware approach.
Resumo:
As the world’s rural populations continue to migrate from farmland to sprawling cities, transport networks form an impenetrable maze within which monocultures of urban form erupt from the spaces in‐between. These urban monocultures are as problematic to human activity in cities as cropping monocultures are to ecosystems in regional landscapes. In China, the speed of urbanisation is exacerbating the production of mono‐functional private and public spaces. Edges are tightly controlled. Barriers and management practices at these boundaries are discouraging the formation of new synergistic relationships, critical in the long‐term stability of ecosystems that host urban habitats. Some urban planners, engineers, urban designers, architects and landscape architects have recognised these shortcomings in contemporary Chinese cities. The ideology of sustainability, while critically debated, is bringing together thinking people in these and other professions under the umbrella of an ecological ethic. This essay aims to apply landscape ecology theory, a conceptual framework used by many professionals involved in land development processes, to a concept being developed by BAU International called Networks Cities: a city with its various land uses arranged in nets of continuity, adjacency, and superposition. It will consider six lesser‐known concepts in relation to creating enhanced human activity along (un)structured edges between proposed nets and suggest new frontiers that might be challenged in an eco‐city. Ecological theory suggests that sustaining biodiversity in regions and landscapes depends on habitat distribution patterns. Flora and fauna biologists have long studied edge habitats and have been confounded by the paradox that maximising the breadth of edges is detrimental to specialist species but favourable to generalist species. Generalist species of plants and animals tolerate frequent change in the landscape, frequenting two or more habitats for their survival. Specialist species are less tolerant of change, having specific habitat requirements during their life cycle. Protecting species richness then may be at odds with increasing mixed habitats or mixed‐use zones that are dynamic places where diverse activities occur. Forman (1995) in his book Land Mosaics however argues that these two objectives of land use management are entirely compatible. He postulates that an edge may be comprised of many small patches, corridors or convoluting boundaries of large patches. Many ecocentrists now consider humans to be just another species inhabiting the ecological environments of our cities. Hence habitat distribution theory may be useful in planning and designing better human habitats in a rapidly urbanising context like China. In less‐constructed environments, boundaries and edges provide important opportunities for the movement of multi‐habitat species into, along and from adjacent land use areas. For instance, invasive plants may escape into a national park from domestic gardens while wildlife may forage on garden plants in adjoining residential areas. It is at these interfaces that human interactions too flow backward and forward between land types. Spray applications of substances by farmers on cropland may disturb neighbouring homeowners while suburban residents may help themselves to farm produce on neighbouring orchards. Edge environments are some of the most dynamic and contested spaces in the landscape. Since most of us require access to at least two or three habitats diurnally, weekly, monthly or seasonally, their proximity to each other becomes critical in our attempts to improve the sustainability of our cities.
Resumo:
Having wrung the most from workforce and workplace productivity initiaitves, innovation has come to the fore as a key goal and directive for public sector organisations to become more efficient. This clarion call for innovation can be heard all around the world, with public services everywhere taking up the message to develop better, smarter, novel, more innovative processes, programs and policies. In the current push for innovation, networks are considered to be a superior vehicle through which collective knowledge can be shared and leveraged; replacing or at least supplementing the role function previously provided by inventive leaders...
Resumo:
Olfactory ensheathing cells (OECs) are specialized glial cells in the mammalian olfactory system supporting growth of axons from the olfactory epithelium into the olfactory bulb. OECs in the olfactory bulb can be subdivided into OECs of the outer nerve layer and the inner nerve layer according to the expression of marker proteins and their location in the nerve layer. In the present study, we have used confocal calcium imaging of OECs in acute mouse brain slices and olfactory bulbs in toto to investigate physiological differences between OEC subpopulations. OECs in the outer nerve layer, but not the inner nerve layer, responded to glutamate, ATP, serotonin, dopamine, carbachol, and phenylephrine with increases in the cytosolic calcium concentration. The calcium responses consisted of a transient and a tonic component, the latter being mediated by store-operated calcium entry. Calcium measurements in OECs during the first three postnatal weeks revealed a downregulation of mGluR(1) and P2Y(1) receptor-mediated calcium signaling within the first 2 weeks, suggesting that the expression of these receptors is developmentally controlled. In addition, electrical stimulation of sensory axons evoked calcium signaling via mGluR(1) and P2Y(1) only in outer nerve layer OECs. Downregulation of the receptor-mediated calcium responses in postnatal animals is reflected by a decrease in amplitude of stimulation-evoked calcium transients in OECs from postnatal days 3 to 21. In summary, the results presented reveal striking differences in receptor responses during development and in axon-OEC communication between the two subpopulations of OECs in the olfactory bulb.
Resumo:
In this report, what is known about human trafficking involving marriage and partner migration to Australia is described, drawing on primary information obtained from victim/survivor testimonies, stakeholder knowledge and expertise, and reported cases that progressed through the Australian justice system. It confirms what some stakeholders in the human trafficking area have long suspected—that marriage and partner migration have been used to facilitate the trafficking of people into Australia.
Resumo:
Vehicular Ad-hoc Networks (VANETs) can make roads safer, cleaner, and smarter. It can offer a wide range of services, which can be safety and non-safety related. Many safety-related VANETs applications are real-time and mission critical, which would require strict guarantee of security and reliability. Even non-safety related multimedia applications, which will play an important role in the future, will require security support. Lack of such security and privacy in VANETs is one of the key hindrances to the wide spread implementations of it. An insecure and unreliable VANET can be more dangerous than the system without VANET support. So it is essential to make sure that “life-critical safety” information is secure enough to rely on. Securing the VANETs along with appropriate protection of the privacy drivers or vehicle owners is a very challenging task. In this work we summarize the attacks, corresponding security requirements and challenges in VANETs. We also present the most popular generic security policies which are based on prevention as well detection methods. Many VANETs applications require system-wide security support rather than individual layer from the VANETs’ protocol stack. In this work we will review the existing works in the perspective of holistic approach of security. Finally, we will provide some possible future directions to achieve system-wide security as well as privacy-friendly security in VANETs.
Resumo:
Wireless Sensor Networks (WSNs) are employed in numerous applications in different areas including military, ecology, and health; for example, to control of important information like the personnel position in a building, as a result, WSNs need security. However, several restrictions such as low capability of computation, small memory, limited resources of energy, and the unreliable channels employ communication in using WSNs can cause difficulty in use of security and protection in WSNs. It is very essential to save WSNs from malevolent attacks in unfriendly situations. Such networks require security plan due to various limitations of resources and the prominent characteristics of a wireless sensor network which is a considerable challenge. This article is an extensive review about problems of WSNs security, which examined recently by researchers and a better understanding of future directions for WSN security.