• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 36
  • 27
  • 4
  • 4
  • 2
  • 1
  • 1
  • Tagged with
  • 77
  • 77
  • 22
  • 21
  • 16
  • 15
  • 12
  • 9
  • 9
  • 9
  • 8
  • 7
  • 6
  • 6
  • 6
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
41

The coevolution of digital ecosystems

SungYong, Um January 2016 (has links)
Digital ecosystems are one of the most important strategic issues in the current digital economy. Digital ecosystems are dynamic and generative. They evolve as new firms join and as heterogeneous systems are integrated into other systems. These features digital ecosystems determine economic and technological success in the competition among digital platform systems. However, how these ecosystems evolve over time is not yet clearly known. I describe three empirical essays in order to understand the underlying mechanism of the evolution of a digital ecosystem: 1) the underlying architecture of a digital ecosystem, 2) the evolutionary pattern of a digital ecosystem, 3) and the co-evolution of a digital ecosystem. To explore these topics, I focus on the underlying generative structure of the ecosystem and its evolutionary pattern of WordPress, which is the world largest blog platform system. I collected a comprehensive set of information about the WordPress ecosystem including over 23,000 plug-ins from January 2004 to December 2014. To analyze the data, I apply a network approach to capture the generative nature of digital technology that assumes a fractal-like structure in which digital components such as Application Programming Interfaces (API) cluster into groups that generate other groups over time. As such, I can effectively capture the hierarchical structure of a network by exploring the topological structure of sub-networks that represent the fractal-like evolutionary dynamic system mechanism. The network approach, together with the conventional statistical approach, allows me to understand the unique nature of a digital ecosystem that is different from the boundary of a decomposable system, as the generative nature of system-agnostic digital components builds on a developmental combinable system. I also discuss underlying theory, methodology, data, result, and implications and conclude by highlighting the contributions of this study and the direction of future research to further explore the evolution of digital ecosystems. / Business Administration/Management Information Systems
42

AIR TRANSPORTATION INFRASTRUCTURE ROBUSTNESS ASSESSMENT FOR PROACTIVE SYSTEMIC RISK MANAGEMENT

Yassien, Yassien January 2020 (has links)
A key attribute of resilience, robustness serves as a predictor of infrastructure system performance under disruptions, thus informing proactive infrastructure risk management. A literature review indicated that previous studies did not consider some key factors that can influence the robustness of Air Transportation Infrastructure Networks (ATIN) and thus their (system-level cascade) systemic risk management processes. In this respect, the current study first assesses existing and then develops a new methodology to quantify the robustness of ATIN. Specifically, based on integrating travel time and flight frequency, the study develops alternative best route and link weight approaches to assess key ATIN robustness measures and relevant operating cost losses (OCL). In order to demonstrate the practical use of the developed methodology, the robustness and the associated OCL of the Canadian Domestic Air Traffic Network are evaluated under random failures (i.e., disruptive events that occur randomly) and targeted threats (i.e., disruptive events that occur deliberately). The analysis results show that the network robustness is influenced by the utilized evaluation approach, especially after 20% of the network components become nonoperational. Overall, the methodology developed within this study is expected to provide ATIN policymakers with the means to quantify the network robustness and OCL, and thus enable ATIN resilience-guided proactive risk management in the face of natural or anthropogenic hazard realizations. / Thesis / Master of Applied Science (MASc)
43

Exploring Bus Network Delay Propagation: Integration of Causal Inference and Complex Network Theory

Wang, Weihua, She, Jiani January 2024 (has links)
Public bus transit operates within an intricate network of routes and stops, where delays are common and can propagate throughout the transit system, affecting systemreliability, passenger satisfaction, and operational efficiency. Existing research on bus delay propagation has primarily focused on route-level delays correlation-basedanalysis, lacking a comprehensive understanding of underlying causal mechanisms of bus delay propagation from a network-level perspective. To enhance our understanding of bus delay propagation within urban transit systems, this study aims to develop a new approach that captures the causal relationshipsbetween stop delays, integrating their temporal and spatial characteristics. Utilizing a causal discovery algorithm for time series data, the thesis infers causal relationshipsfrom bus operation time series data. It then analyze the resulting causal graphs based on complex network measurement indicators. A case study using GTFS data of Stockholm, Sweden, was conducted. The results reveal that stops with a high degree of connections significantly influence delay propagation, with the network exhibiting a community structure that includes both high-degree and low-degree stops. Stops are classified based on their levels into four distinct delay propagation patterns. Critical stops are identified as either delay aggravation or absorption stops, based on their Momentary Conditional Independence (MCI) values. A new metric was constructed, underscoring the importance of considering delays across the entire network rather than isolating analysis to individual routes. The comparison with traditional correlation-based analysis highlights instances of low correlation among stops with high causality and high correlations without underlying causality, emphasizing the deeper insight from the causal approach
44

Autômatos celulares caóticos aplicados na Criptografia e Criptoanálise / Chaotic cellular automata applied to Cryptography and Cryptanalysis

Justo, Marina Jeaneth Machicao 24 July 2013 (has links)
A teoria do caos estuda o tipo de comportamento, aparentemente aleatório, que apresentam alguns sistemas complexos sensíveis à perturbação dos seus parâmetros, como por exemplo sistemas dinâmicos, fractais, autômatos celulares, entre outros. Os autômatos celulares (ACs) são sistemas dinâmicos discretos que podem apresentar comportamentos caóticos a partir de regras simples. Os ACs tem sido empregados em diversas aplicações principalmente em simulações, mas também tem contribuído no reconhecimento de padrões, processamento de imagens e na Criptografia. A necessidade em transmitir informação de forma mais segura vem crescendo com a necessidade por novos algoritmos criptográficos. Paralelamente, os criptoanalistas vem progredindo constantemente na quebra e na procura de vulnerabilidades destes algoritmos, sendo necessaria a incursão de novas abordagens para atender estes desafios. Neste trabalho é proposto o desenvolvimento e avaliação de algoritmos criptográficos, assim como um novo método de criptoanálise, motivados pela adequação dos ACs caóticos com os princípios de confusão e difusão da Criptografia, seguindo critérios apropriados para a boa construção destes algoritmos, que são sintetizados em três partes: (i) Na proposta do algoritmo de cifra criptográfico baseado no AC caótico, foi sugerida uma estratégia de seleção de ACs em base a combinação de vários critérios como o expoente de Lyapunov, a entropia e a distância de Hamming; visando selecionar um AC apropriado para a geração de números pseudo-aleatórios usados no processo de encriptação/decriptação do algoritmo, o qual é validado por diversos testes de aleatoriedade. (ii) Foi proposto o algoritmo de hash criptográfico baseado numa abordagem híbrida dos ACs e as redes complexas, visando a construção de um algoritmo flexível e de bom desempenho. Os resultados alcançados por ambos os algoritmos criptográficos mostraram-se relevantes quando comparados com o estado da arte, com boas qualidades de segurança e um grande potencial para ser aplicados em problemas reais. (iii) Na proposta do método de criptoanálise foi sugerido traçar equivalências entre os sistemas criptográficos e os ACs caóticos visando explorar e analisar seu comportamento dinâmico, por meio da adaptação do algoritmo do expoente de Lyapunov dos ACs, cujos resultados permitiram encontrar padrões característicos nos modos de operação criptográficos. Os resultados obtidos mostraram que a abordagem dos ACs caóticos para desenvolver os algoritmos pode ser bastante útil em aplicações de Criptografia e Criptoanálise. / Chaos theory studies the apparently random behaviour from some complex systems with highly sensitive to the initial conditions, such as dynamical systems, fractals, cellular automata, among others. Cellular automata (CA) are discrete dynamical systems that may exhibit chaotic behaviour from simple rules. CA have been employed in many multidisciplinary applications, most of them in simulations systems, including pattern recognition, image processing and Cryptography. Nowadays, the development of new cryptographic algorithms is required in order to fulfil the increasing demand for secure transmission of confidential information. These algorithms are intensively analyzed, most of them broken by the cryptanalyst community. We proposed to develop two cryptographic algorithms: a block cipher and a hash function based on chaotic CA and its corresponding evaluation. We also proposed a new cryptanalysis methodology motivated by the strong relationship between the chaotic properties of CA and the cryptographic principles of confusion and diffusion, by following appropriate criteria to the proper design of these algorithms, which are summarized into three parts: (i) To proposed the block cipher proposed it was suggested a methodology to select a suitable CA to Cryptography by means of compounded measures such as the Lyapunov exponent, entropy and Hamming distance. Moreover, this selected CA is employed to generate pseudo-random numbers, which are further used in the encryption/decryption of the proposed block cipher and validated under several randomness tests. The results obtained by this cryptographic algorithm achieved similar and even higher performance when compared to others found in literature. (ii) The cryptographic hash function was developed using an hybrid approach of CA and complex networks, in order to build a flexible algorithm with acceptable performance when compared to conventional hash functions. In general, the results obtained from both cryptographic algorithms showed good security qualities and great potential to be applied in real problems. (iii) To proposed the cryptanalysis methodology it was suggested to draw parallels between cryptographic systems and CA, in order to explore and analise their dynamic behaviour. Hence, upon drawing such parallels, we have a means to adapt the Lyapunov exponent algorithm conceived in the framework of CA. Unexpectedly, the results obtained allow to discriminate among cryptographic modes of operation, which provides significant contributions to the field. Finally, we proved that the chaotic cellular automata approach can be quite useful in applications cryptography and cryptanalysis.
45

On Comparative Algorithmic Pathfinding in Complex Networks for Resource-Constrained Software Agents

Moran, Michael 01 January 2017 (has links)
Software engineering projects that utilize inappropriate pathfinding algorithms carry a significant risk of poor runtime performance for customers. Using social network theory, this experimental study examined the impact of algorithms, frameworks, and map complexity on elapsed time and computer memory consumption. The 1,800 2D map samples utilized were computer random generated and data were collected and processed using Python language scripts. Memory consumption and elapsed time results for each of the 12 experimental treatment groups were compared using factorial MANOVA to determine the impact of the 3 independent variables on elapsed time and computer memory consumption. The MANOVA indicated a significant factor interaction between algorithms, frameworks, and map complexity upon elapsed time and memory consumption, F(4, 3576) = 94.09, p < .001, h2 = .095. The main effects of algorithms, F(4, 3576) = 885.68, p < .001, h2 = .498; and frameworks, F(2, 1787) = 720,360.01, p .001, h2 = .999; and map complexity, F(2, 1787) = 112,736.40, p < .001, h2 = .992, were also all significant. This study may contribute to positive social change by providing software engineers writing software for complex networks, such as analyzing terrorist social networks, with empirical pathfinding algorithm results. This is crucial to enabling selection of appropriately fast, memory-efficient algorithms that help analysts identify and apprehend criminal and terrorist suspects in complex networks before the next attack.
46

Fraturas e caminhos ?timos na rede de Barabasi-Albert

Nunes, Thiago Cris?stomo Carlos 29 June 2012 (has links)
Made available in DSpace on 2014-12-17T15:15:01Z (GMT). No. of bitstreams: 1 ThiagoCCN_DISSERT.pdf: 2332508 bytes, checksum: bbc84148d8aa1acc5070a5a68ca8b3b6 (MD5) Previous issue date: 2012-06-29 / Coordena??o de Aperfei?oamento de Pessoal de N?vel Superior / Following the study of Andrade et al. (2009) on regular square lattices, here we investigate the problem of optimal path cracks (OPC) in Complex Networks. In this problem we associate to each site a determined energy. The optimum path is defined as the one among all possible paths that crosses the system which has the minimum cost, namely the sum of the energies along the path. Once the optimum path is determined, at each step, one blocks its site with highest energy, and then a new optimal path is calculated. This procedure is repeated until there is a set of blocked sites forming a macroscopic fracture which connects the opposite sides of the system. The method is applied to a lattice of size L and the density of removed sites is computed. As observed in the work by Andrade et al. (2009), the fractured system studied here also presents different behaviors depending on the level of disorder, namely weak, moderated and strong disorder intensities. In the regime of weak and moderated disorder, while the density of removed sites in the system does not depend of the size L in the case of regular lattices, in the regime of high disorder the density becomes substantially dependent on L. We did the same type of study for Complex Networks. In this case, each new site is connected with m previous ones. As in the previous work, we observe that the density of removed sites presents a similar behavior. Moreover, a new result is obtained, i.e., we analyze the dependency of the disorder with the attachment parameter m / Seguindo a linha do trabalho de Andrade e colaboradores (2009) em redes regulares, n?s investigamos o problema da fratura atrav?s do caminho ?timo (optimal path cracks -OPC) em Redes Complexas. Neste problema n?s associamos para cada s?tio uma determinada energia. O caminho ?timo ? definido como aquele, dentre todos os poss?veis, que atravessa o sistema e tem o menor custo, ou seja, a menor soma das energias ao longo do caminho. Uma vez que o caminho ?timo ? determinado, em cada passo, n?s bloqueamos o s?tio com maior energia e a partir de ent?o um novo caminho ?timo ? calculado. Este procedimento ? repetido at? que existe um conjunto de s?tios bloqueados que forma uma fratura macrosc?pica a qual conecta lados opostos do sistema. O m?todo ? aplicado numa rede de lado L e a densidade de s?tios removidos ? computada. Como observado no trabalho de Andrade e colaboradores, o sistema fraturado que n?s estudamos tamb?m apresenta diferentes comportamentos dependendo do n?vel da desordem, que pode ser fraca, moderada ou forte. No regime de desordem fraca e moderada, a densidade de s?tios removidos no sistema n?o depende do tamanho L no caso de redes regulares, enquanto no regime de desordem forte a densidade se torna substancialmente dependente de L. N?s fizemos o mesmo tipo de estudo para Redes Complexas. Numa rede complexa caso, cada novo s?tio ? conectado a m s?tios que j? est?o presentes na rede. Como no trabalho anterior, n?s observamos que a densidade de s?tios removidos apresenta um comportamento similar. Al?m disso, um novo resultado ? obtido, isto ?, n?s analisamos a depend?ncia da desordem com o par?metro de liga??o m
47

Une nouvelle approche topologique pour la recommandation de tags dans les folksonomies / New approach to tag recommendation by level

Hmimida, Manel 03 March 2015 (has links)
Nous nous intéressons dans cette thèse à la problématique de recommandation de tags dans les systèmes de partage et de classification sociale des ressources, dits folksonomies. Les utilisateurs annotent les ressources à partager par des tags librement choisis. Or, la liberté de choix de tags les rends ambigus. Nous proposons une nouvelle approche topologique nommé TLTR (Two Level Tag Recommendation)pour la recommandation de tags. TLTR est basée sur une approche originale de compression des graphes. Le graphe d'une folksonomie est compressé en appliquant une méthode de clustering sur chacune des trois composantes d'une folksonomie, à savoir: l'ensemble des utilisateurs, des ressources et des tags. Nous proposons également une méthode de clustering topologique basée sur une approche centrée graine pour la détection des communautés dans les graphes multiplexes. Une approche topologique classique, en occurrence la méthode Folkrank, est appliquée sur le graphe réduit afin de sélectionner les clusters de tags les plus appropriés. Ces clusters sont ensuite utilisés pour construire un autre graphe contextuel extrait du graphe original représentant la folksonomie. La méthode Folkrank est à nouveau appliquée afin de calculer la liste de tags à recommander. Des expérimentations sur des grandes folksonomies, notamment, des jeux de données extraits du système de partage des références bibliographiques Bibsonomy montrent la pertinence de notre approche. / We focus in this thesis on the problem of tag recommendation in social sharing to classification systems called folksonomies. Users of a folksonomy annotate their resources with freely tags chosen. We propose here a new topological approach for tags recommendation called TLTR (Two Level Tag Recommendation). TLTR (Two Level Tag Recommendation) is based on an original approach of graph compression. The graph of a folksonomy is compressed by a clustering each of the three components, namely the set of users, resources and tags. A topological clustering method based on a seed-centered approach for community detection in multiplex graphs is proposed. A classical topological approach, namely Folkrank, is applied to the reduced graph to select the most appropriate clusters of tags. These clusters are then used to build another contextual graph extracted from the original graph representing the folksonomy. Folkrank method is applied again to compute the list of tags to recommend. Experiments on large folksonomy, including, data extracted from references system Bibsonomy show the relevance of our approach.
48

Autômatos celulares caóticos aplicados na Criptografia e Criptoanálise / Chaotic cellular automata applied to Cryptography and Cryptanalysis

Marina Jeaneth Machicao Justo 24 July 2013 (has links)
A teoria do caos estuda o tipo de comportamento, aparentemente aleatório, que apresentam alguns sistemas complexos sensíveis à perturbação dos seus parâmetros, como por exemplo sistemas dinâmicos, fractais, autômatos celulares, entre outros. Os autômatos celulares (ACs) são sistemas dinâmicos discretos que podem apresentar comportamentos caóticos a partir de regras simples. Os ACs tem sido empregados em diversas aplicações principalmente em simulações, mas também tem contribuído no reconhecimento de padrões, processamento de imagens e na Criptografia. A necessidade em transmitir informação de forma mais segura vem crescendo com a necessidade por novos algoritmos criptográficos. Paralelamente, os criptoanalistas vem progredindo constantemente na quebra e na procura de vulnerabilidades destes algoritmos, sendo necessaria a incursão de novas abordagens para atender estes desafios. Neste trabalho é proposto o desenvolvimento e avaliação de algoritmos criptográficos, assim como um novo método de criptoanálise, motivados pela adequação dos ACs caóticos com os princípios de confusão e difusão da Criptografia, seguindo critérios apropriados para a boa construção destes algoritmos, que são sintetizados em três partes: (i) Na proposta do algoritmo de cifra criptográfico baseado no AC caótico, foi sugerida uma estratégia de seleção de ACs em base a combinação de vários critérios como o expoente de Lyapunov, a entropia e a distância de Hamming; visando selecionar um AC apropriado para a geração de números pseudo-aleatórios usados no processo de encriptação/decriptação do algoritmo, o qual é validado por diversos testes de aleatoriedade. (ii) Foi proposto o algoritmo de hash criptográfico baseado numa abordagem híbrida dos ACs e as redes complexas, visando a construção de um algoritmo flexível e de bom desempenho. Os resultados alcançados por ambos os algoritmos criptográficos mostraram-se relevantes quando comparados com o estado da arte, com boas qualidades de segurança e um grande potencial para ser aplicados em problemas reais. (iii) Na proposta do método de criptoanálise foi sugerido traçar equivalências entre os sistemas criptográficos e os ACs caóticos visando explorar e analisar seu comportamento dinâmico, por meio da adaptação do algoritmo do expoente de Lyapunov dos ACs, cujos resultados permitiram encontrar padrões característicos nos modos de operação criptográficos. Os resultados obtidos mostraram que a abordagem dos ACs caóticos para desenvolver os algoritmos pode ser bastante útil em aplicações de Criptografia e Criptoanálise. / Chaos theory studies the apparently random behaviour from some complex systems with highly sensitive to the initial conditions, such as dynamical systems, fractals, cellular automata, among others. Cellular automata (CA) are discrete dynamical systems that may exhibit chaotic behaviour from simple rules. CA have been employed in many multidisciplinary applications, most of them in simulations systems, including pattern recognition, image processing and Cryptography. Nowadays, the development of new cryptographic algorithms is required in order to fulfil the increasing demand for secure transmission of confidential information. These algorithms are intensively analyzed, most of them broken by the cryptanalyst community. We proposed to develop two cryptographic algorithms: a block cipher and a hash function based on chaotic CA and its corresponding evaluation. We also proposed a new cryptanalysis methodology motivated by the strong relationship between the chaotic properties of CA and the cryptographic principles of confusion and diffusion, by following appropriate criteria to the proper design of these algorithms, which are summarized into three parts: (i) To proposed the block cipher proposed it was suggested a methodology to select a suitable CA to Cryptography by means of compounded measures such as the Lyapunov exponent, entropy and Hamming distance. Moreover, this selected CA is employed to generate pseudo-random numbers, which are further used in the encryption/decryption of the proposed block cipher and validated under several randomness tests. The results obtained by this cryptographic algorithm achieved similar and even higher performance when compared to others found in literature. (ii) The cryptographic hash function was developed using an hybrid approach of CA and complex networks, in order to build a flexible algorithm with acceptable performance when compared to conventional hash functions. In general, the results obtained from both cryptographic algorithms showed good security qualities and great potential to be applied in real problems. (iii) To proposed the cryptanalysis methodology it was suggested to draw parallels between cryptographic systems and CA, in order to explore and analise their dynamic behaviour. Hence, upon drawing such parallels, we have a means to adapt the Lyapunov exponent algorithm conceived in the framework of CA. Unexpectedly, the results obtained allow to discriminate among cryptographic modes of operation, which provides significant contributions to the field. Finally, we proved that the chaotic cellular automata approach can be quite useful in applications cryptography and cryptanalysis.
49

CITY NETWORK RESILIENCE QUANTIFICATION UNDER SYSTEMIC RISKS: A HYBRID MACHINE LEARNING-GENETIC ALGORITHM APPROACH

Hassan, Rasha January 2020 (has links)
Disruptions due to either natural or anthropogenic hazards significantly impact the operation of critical infrastructure networks because they may instigate network-level cascade (i.e., systemic) risks. Therefore, quantifying and enhancing the resilience of such complex dynamically evolving networks ensure minimizing the possibility and consequences of systemic risks. Focusing only on robustness, as one of the key resilience attributes, and on transportation networks, key critical infrastructure, the current study develops a hybrid complex network theoretic-genetic algorithms analysis approach. To demonstrate the developed approach, the robustness of a city transportation network is quantified by integrating complex network theoretic topology measures with a dynamic flow redistribution model. The network robustness is subsequently investigated under different operational measures and the corresponding absorptive capacity thresholds are quantified. Finally, the robustness of the network under different failure scenarios is evaluated using genetic algorithms coupled with k-means clustering to classify the different network components. The hybrid approach developed in the current study is expected to facilitate optimizing potential systemic risk mitigation strategies for critical infrastructure networks under disruptive events. / Thesis / Master of Applied Science (MASc)
50

Interactions between water-bodies and atmosphere at regional to global scales

Ekhtiari, Nikoo 10 October 2019 (has links)
Ziel dieser Dissertation ist es, mithilfe zweier Herangehensweisen, das Verständnis der Zusammenhänge verschiedener physikalischer Prozesse des Klimasystems zu verbessern. Im ersten Teil verwende ich Klimanetzwerke zu die gemeinsame Abhängigkeit von Meeresoberflächentemperaturen (SSTs) und Niederschlägen in Hinsicht auf globale charakteristiken und räumlichen Muster untersuchen. In diesem Kontext ist die El Niño Southern Oscillation (ENSO) das wichtigste Phänomen, welches großskalig SSTs und Niederschläge beeinflusst. Durch meine Analyse decke ich kurz und weitreichende Verbindungen auf und zeige deren Abhängigkeit von der jeweiligen ENSO-Phase (El Nino, La Nina, neutrale Phase). Darüber hinaus werden durch die Kombination einer diskreten Wavelet-Transformation mit dem Konzept der gekoppelten Klimanetzwerkanalyse die skalenspezifischen Verbindungen aufgelöst, die bei der ursprünglichen Auflösung der Daten oft übersehen werden. Im zweiten Teil der Arbeit verwende ich Simulationen des COnsortium for Small scale MOdeling (COSMO) Climate Limited-area Modell (CCLM) und untersuche die Auswirkungen des Sobradinho-Stausees. In dieser Arbeit benutzen ich das Flake Modell, um das vertikale Temperaturprofil des Sees zu bestimmen. Durch die Einbettung des Flake Modells in das CCLM konnte ich den Sobradinho-Stausee untersuchen. Dabei simuliere ich zwei verschiedene Szenarien. Die Simulationsergebnisse verifiziere ich mithilfe meteorologischer Daten von Oberflächen- und Satellitenmessungen. Die Ergebnisse zeigen, dass der See sowohl die bodennahe Temperatur als auch Wind- und Luftfeuchtigkeitsmuster der Umgebung beeinflusst. Zudem wird die Luftfeuchtigkeit durch den See erhöht und bewirkt Seewinde. Die Effekte des Sees auf die Luftfeuchtigkeit und temperaturen beschränken sich nicht nur auf die Nähe des Sees, sondern auch auf relativ weit entfernte Gebiete. / This dissertation aims at improving our understanding of the mechanisms of interactions between physical processes within the climate system via two different approaches. In the first part, I have utilized climate networks to understand the mutual interdependence between sea surface temperatures (SST) and precipitation (PCP) in terms of global characteristics and spatial patterns. In this context, the globally most relevant phenomenon is the El Niño Southern Oscillation (ENSO), which strongly affects large-scale SST variability as well as PCP patterns all around the globe. My analysis uncovers both local and remote statistical connections and demonstrates their dependence on the current ENSO phase (El Niño, La Niña or neutral phase). Furthermore by combining time-scale decomposition by means of a discrete wavelet transform with the concept of coupled climate network analysis unravel the scale-specific connections that are often overlooked at the original resolution of the data. In the second part of this thesis, I have focused on simulations with the COnsortium for Small scale MOdeling (COSMO) Climate Limited-area Model (CCLM) and investigate the effects of Lake Sobradinho, a large reservoir in Northeastern Brazil, on the local near-surface atmospheric and boundary layer conditions. In this thesis, the FLake model (Freshwater Lake model) is applied for obtaining the lake’s vertical temperature profile. I have simulated two alternative scenarios. The performance of the simulation is compared with data from surface meteorological stations as well as satellite data. The obtained results demonstrate that the lake affects the near-surface air temperature of the surrounding area as well as its humidity and wind patterns. Moreover, the humidity is significantly increased as a result of the lake’s presence and causes a lake breeze. The observed effects on humidity and air temperature also extend over areas relatively far away from the lake.

Page generated in 0.0797 seconds