Sebanyak 149 item atau buku ditemukan

Bistatic Scattering of Global Positioning System Signals from Arctic Sea Ice

This work evaluates the potential use of scattered Global Positioning System (GPS) signals for the retrieval of information related to the presence and condition of the Arctic sea ice cover.

III. –. Results. ATM observation geometry and parameter definition “Icecamp” NIC
analysis on SAR background “Bering Sea” NIC ... “Bering” unsupervised
classification Figure III.21b – Emissivities of different radiometric classes Figure III
.22 xiii.

The History and Evolution of Human Resource Development (HRD) in Kenya as it Relates to Technical and Vocational Education and Training (TVET).

The author used an historical methodology to review and discuss the history, definition, evolution, and state of HRD in Kenya and how it relates to TVET. Using this methodology, the study delved into HRD policies and strategies used by the government of Kenya to advance its TVET programs.

The author used an historical methodology to review and discuss the history, definition, evolution, and state of HRD in Kenya and how it relates to TVET.

Key Management in Hierarchical Access Control Systems

In this work, we present a fully-dynamic and very efficient solution to the key assignment problem that is also provably secure for a strong notion of security. We then show how the model can be extended to time-based policies where users obtain access rights only for a specific duration of time, and subsequently present our time-based key assignment solution. Finally, we explain how similar techniques can be used to efficiently enforce access control policies in geo-spatial systems and describe our construction for such systems as well.

2 RELATED WORK 2.1 Key Assignment in Hierarchical Systems The first work
that addressed the problem of key management in hierarchical access control
was by Akl and Taylor [14]. Since then a large number of publications ( [15–43]
and ...

Trees for Group Key Management with Batch Update

The group Key Management problem has been a popular research topic for several years. Many models have been proposed. In this dissertation, we mainly focus on a batch rekeying model. In this model, the number of group members n is fixed and each member has probability p ( p = 1 - q) of being replaced by a new member during a batch period.

The group key management with batch rekeying update is first introduced by Li et
al. [18]. They showed that the rekeying method after each join/leave has two
problems. First, it is relatively inefficient, especially when the members of the
group ...

Chinese Remainder Theorem Based Single and Multi-group Key Management Protocols

Researchers have proposed different designs for group key management (GKM). In general GKM protocols need to consider the trade-off between key server side and user side costs, which includes space, computation, and messaging requirements. The currently available representative set of GKM protocols require the key server to do O(log n) of key computation and transmission, and each user to have O(log n) of key space and do O(log n) of key processing, for a group with n users.

We will begin with the Base Chinese Remaindering Group Key Management
Protocol. The BCRGK protocol is not a practically efficient protocol by itself (we
will analyze the reason later.). It mainly serves the purpose of providing the
concept ...

What Money Can't Buy: An Examination of a Complete Financial Aid Program for Low-income Students

Providing low-income students with access to higher education is a critical priority, particularly with increasing costs associated with attending college. Recently, a variety of institutions have implemented new initiatives designed to improve access for this population, including the creation of complete, non-repayable financial aid packages; however, it is unclear if these financial aid packages positively influence students' persistence. Moreover, the majority of research studies regarding the importance and potential benefits of financial aid programs for low-income students have been limited to issues related to access.

The Financial Nexus Model The financial nexus between college choice and
persistence offers a theoretical perspective that provides higher education
administrators with insight into the influence of costs and financial aid on
enrollment, the ...

A Method for Introducing Artificial Perception (AP) to Improve Human Behavior Representation (HBR) Using Agents in Synthetic Environments

An experimental approach is provided using proven psychology perception measurements to help answer the question whether there is a correlation between human perception in the real world and its same representation in an artificial world. The results presented in this dissertation show that the method applied in the experimental approach can be generalized. Furthermore, the example used builds a proof of concept, as the resulting agent with AP reproduced the human behavior more closely than did the state-of-the-art approaches.

An experimental approach is provided using proven psychology perception measurements to help answer the question whether there is a correlation between human perception in the real world and its same representation in an artificial world.

A Quantitative Analysis of the Growing Business of Organized Crime: Structural Predictors of Cross-national Distribution of Human Trafficking Markets and Trafficking in Women in Turkey

Overall, while globalization impacts the cross-national distribution of human trafficking through its differential impact on structural characteristics (i.e. poverty and urbanization) of the world nations, distribution of human trafficking markets in Turkey is mainly driven by the demand for the illegal services of trafficking markets which thrives upon existing social disorganization and disorder in a given community.

In the final part, the impact of migrant prostitution on the distribution of human
trafficking markets and other serious crimes in Turkey is estimated. Overall,
univarite/descriptive, bivariate, and finally multivariate analyses are performed on
both ...

Validation of the Version 5 Goddard Earth Observing System (GEOS-5) Using Cloud-Aerosol Lidar and Infrared Pathfinder Satellite Observations (CALIPSO).

This dissertation compares the Planetary Boundary Layer (PBL) height produced by the Goddard Earth Observing System-version 5 (GEOS-5) model with Cloud-Aerosol Lidar and Infrared Pathfinder Satellite Observations (CALIPSO). Part of GEOS-5 is an Atmosphere Global Circulation Model (GCM). Developers are uncertain of the precision of model PBL height predictions (i.e. climatology), since there are limited direct observations of the PBL height. Validation of the PBL height serves as a diagnostic on whether the physics and dynamics packages are correct in the model. Thus, verification is needed. For the first time ever, PBL heights have been derived from CALIPSO using a new hybrid standard deviation algorithm, which in some cases is more sensitive than traditional approaches (i.e. Haar wavelet method). Observations made at the UMBC Elastic Lidar Facility (ELF) have been used to determine the validity of the satellite-derived PBL estimate. This is the first global observational study of PBL heights using CALIPSO with match-ups to the GEOS-5 MERRA model. Extensive comparisons between the model output and satellite observations in the western Hemisphere and over Africa gave model-measurement correlation coefficients between 0.47--0.73. Comparisons have been performed for regions over land and water using clouds, aerosols and mixed cloud-aerosol features to detect the PBL. The present study provides insight of PBL height variances in the GEOS-5 model. A case over the Equatorial Pacific indicates that PBL heights from the GEOS-5 model are greater than 25%, on average, than the satellite-derived PBL parameter. PBL height biases in the Equatorial Pacific may be related to the General Circulation Model (GCM) coupling scheme implemented in GEOS-5.

mm = fix(npts/2); % Build colormap % cm = zeros(64,3); % red cm(1:16,1)=0; cm(
17:32,1)=(1:16)/16; cm(33:64)=1; %green cm(1:32,2)=0; cm(33:48,2)=(1:16)/16;
cm(49:64,2)=1; %blue cm(1:16,3)=(0:15)/15; cm(17:32,3)=1-(1:16)/16; cm(33:48
 ...

Implicit Theories of Weight Management: A Social Cognitive Approach to Motivation

Results are discussed in terms of how implicit theories create the structure in which meaning is assigned to events and are therefore important for achievement and motivation. Implications and avenues for future research are presented.

Results are discussed in terms of how implicit theories create the structure in which meaning is assigned to events and are therefore important for achievement and motivation. Implications and avenues for future research are presented.