Spelling suggestions: "subject:"networking"" "subject:"etworking""
201 |
The Non-Governmental Organization Coalition for an International Criminal Court: A Case Study on NGO NetworkingBann, Amy Jeanne 21 July 2000 (has links)
The aim of this project is to examine the emergence of non- governmental organization (NGO) networking by conducting a case study of the NGO Coalition for an International Criminal Court (CICC). It explores the role of this Coalition in the context of the growing movement towards a "global civic politics." An in- depth look at this Coalition is unveiled through primary sources, interviews, and observations. Using a three- tiered model of networking, one can better understand NGO collaboration and networking that are unique in the field of international human rights law and indicative of a new trend in international politics. This model is developed from Timothy Luke and Gearóid à Tuathail's conception of geopolitical nature, Castells' conception of networks, and then modified to apply to political mediation.
NGOs have acted as part of the engine behind the creation of an International Criminal Court in numerous ways. They have amassed over 900 organizations in support of a strong permanent court, as well as fostered relationships with the United Nations, and state governments, and regional blocs. By using this three- tiered framework, I will investigate the networking capacity and functions of the Coalition. The basic research question to be answered is: How does the CICC explain the role of NGOs as mediating agents between states and institutions within the context of contemporary global society? / Master of Arts
|
202 |
Lunar: A User-Level Stack Library for Network EmulationKnestrick, Christopher C. 02 March 2004 (has links)
The primary issue with developing new networking protocols is testing how the protocol will behave when deployed on a large scale; of particular interest is how it will interact with existing protocols. Testing a protocol using a network simulator has drawbacks. First, the protocol must be written for the simulator and then rewritten for actual deployment. Aside from the additional work, this allows for software bugs to be introduced between testing and implementation. More importantly, there are correctness issues. Since both the new and existing protocols must be specially written for the simulator, and not actual real-world implementations, the question remains if the behavior observed and, specifically, the interactions between the protocols are valid. Direct code execution environments solve the correctness problem, but there is the loss of control that a simulator provides. Our solution is to create an environment that allows direct code execution to occur on top of a network simulator. This thesis presents the primary component of that solution: Lunar (Linux User-level Network Architecture), a user-level library that is created from the network stack portion of the Linux operating system. This allows real-world applications to link against a simulator, with Lunar serving as the bridge.
For this work, an implementation of Lunar was constructed using the 2.4.3 version of the Linux kernel. Verification testing was performed to demonstrate correct functioning of the library using both TCP (including TCP with loss) and UDP. Performance testing was done to measure the overhead that Lunar adds to a running application. Overhead was measured as the percent increase in the runtime of an application with Lunar as compared to the application running without it, and ranged from approximately 2% (running over 100 Mbps switched Ethernet) to approximately 39% (1 Gbps Myrinet). / Master of Science
|
203 |
Modeling and Simulation of a Video-on-Demand Network Implementing Adaptive Source-Level Control and Relative Rate Marking Flow Control for the Available Bit Rate ServiceTaylor, Elvin Lattis Jr. 16 January 1998 (has links)
The Available Bit Rate (ABR) service class for the Asynchronous Transfer Mode (ATM) protocol was originally designed to manage data traffic. ABR flow control makes no guarantees concerning cell transfer delay or cell delay variation. A closed-loop feedback mechanism is used for traffic management. To use this class of service for video transport, the video source will accept feedback from the network and adapt its source rate based on this status information. The objective of this research is to assess the ability of the ATM ABR service class to deliver Moving Picture Experts Group version 1 (MPEG-1) video. Three approaches to source-level control are compared: (i) arbitrary loss or no control method, (ii) selective discard of MPEG B-pictures, and (iii) selective discard of MPEG B- and P-pictures. Performance is evaluated based on end-to-end delay, congested queue occupancy levels, network utilization, and jitter. A description of the investigation, assumptions, limitations, and results of the simulation study are included. / Master of Science
|
204 |
A Network Mobility Survey and Comparison with a Mobile IP Multiple Home Address ExtensionWells, John Dowling 11 February 2004 (has links)
This thesis addresses the paucity of research on network mobility with a taxonomy and a quantitative comparison on a real test bed of existing and forthcoming network mobility solutions. Broadly, network mobility solutions can be divided into two broad categories, intra-domain and inter-domain solutions. The two are distinct enough to warrant separate solutions. Network mobility solutions can also be divided into four catogories according to their implementation, (i) Mobile IP-based solutions, (ii) Mobile IP Mobile Routing, (iii) intra-domain routing protocols, and (iv) Mobile IP Foreign Agent-based solutions. This latter division by implementation serves as a useful starting point for a discussion and study of these protocols. The qualitative and quantitive comparisons presented here yield two "winning" solutions, Mobile IP with Network Address Translation (NAT) and Mobile IP Mobile Routing, both based on Mobile IP, the draft standard for Internet mobility. The two were chosen because they are the only solutions fit for production networks, not necessarily because they are the best performing solutions. Indeed, nearly all of the other solutions are promising alternatives and some, such as mobile ad hoc network (MANET) routing protocols and the solutions based on the next generation Internet (IPv6) version of Mobile IP, are particularly so. One of the solutions uses a novel extension for Mobile IP, the Multiple Home Address extension, developed and specified in this thesis, that turns a Mobile IP mobile node into a mobile router able to support dynamically sizing mobile networks while using the existing Mobile IP infrastructure. / Master of Science
|
205 |
SATELLITE GROUND STATION SECURITY USING SSH TUNNELINGMauldin, Kendall 10 1900 (has links)
International Telemetering Conference Proceedings / October 20-23, 2003 / Riviera Hotel and Convention Center, Las Vegas, Nevada / As more satellite ground station systems use the Internet as a means of connectivity, the security of
the ground stations and data transferred between stations becomes a growing concern. Possible
solutions include software-level password authentication, link encryption, IP filtering, and several
others. Many of these methods are being implemented in many different applications. SSH (Secure
Shell) tunneling is one specific method that ensures a highly encrypted data link between computers
on the Internet. It is used every day by individuals and organizations that want to ensure the security
of the data they are transferring over the Internet. This paper describes the security requirements of a
specific example of a ground station network, how SSH can be implemented into the existing
system, software configuration, and operational testing of the revised ground network.
|
206 |
Facebook and depression in late adolescence : intensity of use, quality of interactions, and the role of self-definition and identityDaniels, Michelle January 2014 (has links)
In contemporary society, online Social Networking Sites (SNS) such as Facebook provide increasingly popular contexts within which late adolescent peer interactions and accompanying identity experiments can occur. Consequently, of increasing interest is exploring the impact of SNS use on psychological functioning in this age group. There is some evidence suggestive of a relationship between greater SNS use and increased depressive symptoms. However, findings are inconsistent, with a large body of literature also indicative of possible beneficial effects of SNS use on adolescent social and emotional adjustment. Therefore, as a means to address this divergence, the present study aims to investigate whether it is the quantity of use, including use of the site to connect with existing or new contacts, or the quality of Facebook interactions that might relate to depressive symptoms. Moreover, the present research attempts to identify for which late adolescents these associations are more likely to be a risk, drawing on constructs implicated in offline self-definition and identity development. One hundred and sixty-nine late adolescents (mean age 18.6 years) participated in this quantitative, cross-sectional study. Participants completed an online survey comprising self-report questionnaires validated by previous research assessing depressive symptoms, the intensity of Facebook use, strategy used to connect with peers on Facebook, self-reported quality of interactions on Facebook, and self-definition and identity variables; self-concept clarity (SCC), separation-individuation, and ego-identity commitment. Consistent with previous research, no relationship was found between the intensity of Facebook use, including number of Facebook friends, time spent on the site each day, perceived integration of the platform into daily life, and connection strategy and depressive symptoms. There was, however, evidence suggestive of a relationship between reports of feeling down following interactions on Facebook and increased depressive symptoms. Self-definition and identity variables were not found to moderate this relationship.
|
207 |
Examining the differences in entrepreneurial networking across European UnionOzaist, Martyna, Cygarnik, Andrea January 2015 (has links)
ABSTRACT Aim of the study: This study aims to contribute to the existing knowledge on similarities and differences of networking styles across Europe and support either network contextualists or universalists with new empirical knowledge. Method used: A multiple case study was used in this paper. Qualitative data was gathered gathering from 10 interviews collected amongst experienced Swedish, Polish and Dutch entrepreneurs. Findings: Empirical findings have revealed significant differences in the networking patterns in the Netherlands, Sweden and Poland. Main networking motivation for Dutch entrepreneurs is seeking new sales opportunities, for Swedish it is the exchange of knowledge and information. All the entrepreneurs admitted that trust is an important component of network relationship. However, in Sweden trust seem to play more significant role. The empirical findings questioned the theory that trust can be easily transferred based on recommendations. No entrepreneur directly suggested that asked about trust acquisition. In Sweden informal networks are strongly preferred, while in the Netherlands formal network are much more popular. In Poland informal networks are also more popular. In the Netherlands, commercial, paid organizations may be extremely popular given the fact that all of the Dutch respondents participate in them, on the other hand in Sweden governmental networking organizations are quite common, in Poland no respondent have mentioned neither of them. Findings indicate that networking is still not as developed in Poland as it is in two other researched countries. Practical Implications: Common networking patterns cannot be expected in different European countries and background studies should be conducted before entering foreign market. There is still market growth opportunity for commercial networking organizations in Poland. Polish government should engage in more effective promotion of networking amongst entrepreneurs. Contribution: Empirical data confirm the contextualists approach that emphasizes the importance of national differences on networking and warns managers that resemblance of certain patterns cannot be assumed for different countries. This approach was confirmed since the findings exposed significant differences in several areas of networking. Keywords: Business networking, internationalization of business network, networking motivations, trust building, network type preferences, network contextualism and universalism.
|
208 |
Proposta e simulação de uma estrutura de roteamento para chaves ATM / Proposal and simulation of a structure of routing for Switching ATMColombini, Angelo Cesar 15 October 1999 (has links)
Este trabalho aborda o problema decorrente da necessidade de realizar tráfego multicast em redes ATM. Para isto, foi proposta uma arquitetura para a estrutura de célula da chave, mais especificamente a estrutura de roteamento de células no interior da chave ATM. Como o ATM se propõe a atender a todas as exigências do B-ISDN, a necessidade essencial da chave ATM, é que o transporte de células entre suas portas de entrada e saída se faça o mais rápido possível. Para se conseguir isso, a arquitetura proposta não utiliza buffer nos seus elementos de roteamento. O trabalho não implementa no todo a chave ATM, deixando em aberto o problema da perda de seqüência de células no interior da estrutura de roteamento, que seria uma responsabilidade do módulo de saída da chave. A arquitetura proposta foi modelada e um simulador foi construído para a realização dos testes. Para as simulações foram levados em conta os tráfegos de células unicast e multicast. Como as células unicast e as cópias das células multicast disputavam por um mesmo link de saída, foi proposta uma estratégia para separar estas células. Isto resultou no projeto de posicionar a rede de cópia de células no segundo estágio da estrutura de roteamento, deixando o primeiro estágio para o roteamento das células unicast. O resultado disso foi um segundo estágio agora destinado para as cópias de células multicast absolutamente descongestionado, reduzindo \'drasticamente a possibilidade de disputa por um link de saída. Além disso, a estrutura incorpora os conceitos de TBSF (Tandem Banyan Switch Fabric), e duplicidade de rota, que tornam a estrutura extremamente modular e flexível. Para atender a preocupação em separar o tráfego, foi introduzido entre um estágio e outro da rede Banyan, uma saída de fuga, permitindo que células que tenham atingido a porta de saída desejada possam deixar a estrutura. São apresentados os resultados da simulação, objetivando a validação do trabalho proposto. / This thesis addresses the problem of accomplishing multicast traffic in ATM networks. An architecture is proposed for the cell structure of the switch, more specifically the routing of cells inside an ATM switch. Because ATM tries to satisfy all the demands of the B-ISDN model, an ATM switch must transport cells between its input and output ports as fast as possible. To achieve that, the proposed architecture does not use buffers in its commutation elements. This work does not implement a complete ATM switch, leaving the problem of the loss of sequence of cells inside the routing structure open. This problem must be solved by the output module of the switch. The proposed architecture was modeled and a simulator was built for testing purposes. For the simulations, both the unicast and the multicast traffic were taken into account. As the unicast cells and the copies of the multicast cells disputed for the same output link, a strategy was proposed to separate these cells. This resulted in the positioning of the cell copy network in the second stage of the routing structure, leaving the first stage for the routing of unicast cells. The result was a very free second stage used for copying multicast cells. This new stage reduced the contention for an exit link. The structure incorporates the concepts of TBSF, and route duplicity, which make it extremely modular and flexible. To separate the traffic, it was introduced between the two stages of the Banyan Network an escape exit, allowing cells that have reached the correct output port to leave the structure.
|
209 |
Mapeamento semântico entre UNL e componentes de software para execução de requisições imperativas em linguagem natural / Semantic mapping between UNL and software components to the execution of imperative natural requestsLinhalis, Flávia 13 April 2007 (has links)
A linguagem natural corresponde ao meio mais convencional de comunicação entre as pessoas. O desejo que os seres humanos possuem de se comunicar com as máquinas é evidenciado por pesquisas, que têm sido realizadas desde o final da década de 70, com o objetivo de ter requisições expressas em linguagem natural executadas pelas máquinas. Alguns trabalhos na literatura têm sido propostos com esse fim, entretanto a maioria deles considera requisições expressas apenas em Inglês. Uma maneira de flexibilizar a utilização de várias línguas em sistemas que utilizam linguagem natural é por meio de uma interlíngua, pois essa é uma representação intermediária e processável por máquina das informações contidas em diversas línguas naturais. O trabalho descrito nesta tese propõe que requisições imperativas em linguagem natural sejam convertidas para a interlíngua UNL (Universal Networking Language) e executadas por meio da ativação dos componentes de software apropriados. Para atingir esse objetivo, este trabalho propõe a Arquitetura OntoMap (Ontology-based Semantic Mapping), que utiliza ontologias para realizar o mapeamento semântico entre UNL e componentes de software e para realizar a busca pelos componentes mais apropriados para executar as requisições. A Arquitetura OntoMap conta com (i) um serviço para converter requisições em linguagem natural para UNL; (ii) uma ontologia de alto nível, chamada Ontologia InterComp (Interlíngua-Componentes), que juntamente com regras e inferência, fornece informações semânticas a respeito dos componentes que podem ser utilizados para executar a requisição; (iii) uma Ontologia de Componentes, que relaciona dados das interfaces dos componentes com informações semânticas do domínio de aplicação dos mesmos; e (iv) um Módulo de Busca que utiliza as informações semânticas inferidas e a Ontologia de Componentes para encontrar os componentes apropriados para executar as requisições expressas em linguagem natural. Este trabalho propõe ainda um processo para utilizar a Arquitetura OntoMap em diversos domínios de aplicação e com diferentes conjuntos de componentes. Esse processo foi instanciado considerando componentes desenvolvidos para o domínio de gerenciamento de cursos / Natural Language is the common way of communication between people. The desire of human beings to communicate with machines is evidenced by research, that has been conducted since the late 70?s, triyng to express requests in natural language that can be executed by machines. However, most of the works that have pursued this goal consider requests expressed only in English. A way to facilitate the use of several languages in natural language systems is by using an interlingua. An interlingua is an intermediary representation for natural language information that can be processed by machines. The work described in this thesis proposes to convert imperative natural language requests into the UNL (Universal Networking Language) interlingua and to execute those requests using the apropriate software components. In order to achieve this goal, this work proposes the OntoMap (Ontology-based Semantic Mapping) architecture. It uses ontologies to perform a semantic mapping between UNL and software componente and to search for software components to execute the requests. The OntoMap architecture is composed by (i) a service to convert natural language requests into UNL; (ii) an upper ontology, named InterComp (Interlingua-Components), that uses inference to provide semantic information about components that could be used to execute the requests; (iii) a Components Ontology that relates the component?s interfaces to semantic information about the application domain of the components; and (iv) a search module that uses the infered information and the Components Ontology to reach the components to execute the requests. This work also proposes a process to help the use of the OntoMap architecture in several application domains using different component sets. This process is intanciated considering compoments developed for the course management domain
|
210 |
Produtos naturais marinhos: isolamento e identificação de metabólitos inéditos a partir de fungos endofíticos e cianobactérias utilizando técnicas de eliciação química epigenética e desreplicação via redes moleculares / Marine natural products: isolation and identification of unknown metabolites from endophytic fungi and cyanobacteria through chemical epigenetic elicitation and dereplication via molecular networkingFelício, Rafael de 15 December 2014 (has links)
Os produtos naturais marinhos são apontados com uma das fontes de substâncias bioativas mais importantes para a descoberta de novos fármacos. Neste ambiente, os organismos estão em constante interação ecológica por meio da produção de metabólitos secundários. Fungos endofíticos e cianobactérias representam grupos de micro-organismos que realizam a biossíntese de substâncias com características químicas únicas e atividades biológicas potentes. Entretanto, quando retirados de seu habitat natural, esses seres microbianos geralmente perdem sua capacidade metabólica através de um fenômeno denominado silenciamento gênico, no qual genes biossintéticos deixam de ser transcritos devido a motivos ainda indeterminados. Esse mecanismo genético é intermediado, dentre outros fatores, pelas enzimas DNAmetiltransferase (DNA-MT) e Histona-desacetilase (HDAC). Deste modo, seus inibidores têm sido utilizados com sucesso para promover a eliciação de substâncias que não seriam produzidas em condições laboratoriais. Outra importante abordagem na pesquisa de produtos naturais têm sido a desreplicação baseada na fragmentação (MS/MS) para identificação de substâncias ou análogos. As redes moleculares (molecular networking) constituem uma nova abordagem na qual dados de espectrometria de massas são agrupados de acordo com as semelhanças entre os padrões de fragmentação, formando famílias de moléculas, permitindo a rápida visualização do perfil químico de várias amostras ao mesmo tempo. Deste modo, este trabalho apresenta o isolamento e identificação de metabólitos inéditos a partir de fungos endofíticos e cianobactérias oriundos do ambiente marinho. Para isto, técnicas de eliciação epigenética foram utilizadas em ambos os grupos de organismos, e a desreplicação via redes moleculares foi utilizada em cianobactérias. Fungos endofíticos associados à macroalga vermelha Bostrychia tenella foram alvo de estudos químicos e epigenéticos. As linhagens Xylaria sp. e Nigrospora oryzae foram submetidas ao cultivo em meio sólido arroz, o que resultou no isomento da substância citocalasina D e de um derivado potencialmente inédito da griseofulvina. A linhagem Penicillium decaturense foi cultivada em meio líquido PDB resultando no isolamento da 10,11-deidrocurvularina e possíveis análogos. Experimentos com inibidores epigenéticos (butirato de sódio e procaína) promoveram a modulação do perfil químico desta linhagem, ao estimular a produção de metabólitos não expressos em condições normais de cultivo. Ainda, a linhagem Acremonium sp. produziu várias substâncias quando cultivada em meio de líquido Czapek sob a influência de procaína, sendo uma delas potencialmente inédita e derivada da classe de metabólitos das brevianamidas. Frações orgânicas da cianobactéria Schizothrix sp., coletada no Panamá, foram analisadas em LC-MS/MS e os dados gerados foram utilizados para a criação de redes moleculares. Este estudo resultou na identificação dos metabólitos barbamida, hectoclorina, curacinas A e D, curazole, acetato de malingamida D, dolastatina 10 e carmaficina B. Ainda, análogos das substâncias curazole, dolastatina D e dois análogos inéditos das carmaficinas foram propostos. A cianobactéria Moorea producens JHB, coletada na Jamaica, foi submetida ao cultivo sob influência do ii composto butirato de sódio, e produziu dois metabólitos inéditos, propostos de acordo com os dados de fragmentação, como sendo derivados da jamaicamida e da hectoclorina, num tipo de biossíntese cruzada. Portanto, este trabalho confirma os fungos endofíticos e cianobactérias marinhos como promissores quanto a exploração do metabolismo secundário. / Marine natural products are pointed out as one of the most important sources of bioactive compounds for drug discovery. In this environment, organisms are in constantly interaction ecological through the production of secondary metabolites. Endophytic fungi and cyanobacteria represent groups of microorganisms that perform biosynthesis of substances with unique chemical features and potent biological activities. However, when removed from their natural habitat, these microbial beings generally lose their metabolic capacity through a phenomenon called gene silencing, in which biosynthetic genes are no longer transcribed due to reasons still undetermined. This genetic mechanism is brokered, among other factors, by the enzyme DNA methyltransferase (DNA-MT) and histone deacetylase (HDAC). Thus, their inhibitors have been used successfully to promote the elicitation of substances that would not be produced under laboratory conditions. Another important approach in the natural products research field have been dereplication based on the fragmentation (MS/MS) for the identification of substances or analogues. The molecular networking is a new approach in which data from mass spectrometry are grouped according to the similarities between the patterns of fragmentation, forming families of molecules, allowing rapid visualization of the chemical profile of several samples simultaneously. Thus, this work presents the isolation and identification of novel metabolites from endophytic fungi and cyanobacteria originating from the marine environment. For this propose, epigenetic elicitation techniques were used in both groups of organisms and the molecular networks via dereplication was used in cyanobacteria. Endophytic fungi associated with red seaweed Bostrychia tenella were subjected to chemical and epigenetic studies. Xylaria sp. and Nigrospora oryzae strains were cultured in solid medium rice, resulting in isolation of substance of cytochalasin D and a potentially novel derivative of griseofulvin. Penicillium decaturense strain was grown in PDB liquid medium resulting in the isolation of 10,11- deidrocurvularina and possible analogues. Experiments with epigenetic inhibitors (sodium butyrate and procaine) promoted the modulation of the chemical profile of this strain, to stimulate the production of metabolites not expressed under normal culture conditions. Moreover, Acremonium sp. produced various substances when grown in liquid medium under the influence of Czapek procaine, one of novel and potentially derived from the class of metabolites brevianamides. Organic fractions of the cyanobacteria Schizothrix sp., collected in Panama, were analized by LC-MS/MS and the data generated were used to create molecular networks. This study resulted in the identification of metabolites barbamide, hectochlorin, curacins A and D, curazole malyngamide D acetate, dolastatin 10 and carmaphycin B. Also, analogs of curazole, dolastatin 10 and carmaphycins A and B have been proposed. Cyanobacteria Moorea producens JHB, collected in Jamaica, was grown under the influence of sodium butyrate, and produced two new proposed metabolites in accordance with the fragmentation data as being derived from jamaicamide and hectochlorin, in a sort of crossed biosynthesis. Therefore, this work corroborates marine endophytic fungi and cyanobacteria as promising for exploration of secondary metabolism.
|
Page generated in 0.062 seconds