scholarly journals Where do national and local conservation actions meet? Simulating the expansion of ad hoc and systematic approaches to conservation into the future in Fiji

2012 ◽  
Vol 5 (5) ◽  
pp. 387-398 ◽  
Author(s):  
Morena Mills ◽  
Vanessa M. Adams ◽  
Robert L. Pressey ◽  
Natalie C. Ban ◽  
Stacy D. Jupiter
1972 ◽  
Vol 25 (2) ◽  
pp. 207 ◽  
Author(s):  
DT Pegg

In conventional electrodynamic theory, the advanced potential solution of Maxwell's equations is discarded on the ad hoc basis that information can be received from the past only and not from the future. This difficulty is overcome by the Wheeler?Feynman absorber theory, but unfortunately the existence of a completely retarded solution in this theory requires a steady-state universe. In the present paper conventional electrodynamics is used to obtain a condition which, if satisfied, allows information to be received from the past only, and ensures that the retarded potential is the only consistent solution. The condition is that a function Ua of the future structure of the universe is infinite, while the corresponding function Ur of the past structure is finite. Of the currently acceptable cosmological models, only the steady-state, the open big-bang, and the Eddington-Lema�tre models satisfy this condition. In these models there is no need for an ad hoc reason for the preclusion of advanced potentials.


2020 ◽  
Vol 20 (1) ◽  
pp. 56-69
Author(s):  
Miroslav Černý

Abstract Shoshone, the northernmost Uto-Aztecan language, originally spoken in the area of the Great Basin (U.S.), has been frequently reported as threatened. In his paper, the author presents a vitality assessment of the Western dialect of the Shoshone language based on the methodology which stems from the UNESCO Ad Hoc Expert Group on Endangered Languages. He takes into account UNESCO′s nine factors in order to determine the degree of language vitality and endangerment for Western Shoshone and to outline strategies which might help to revitalize the language in the future.


2014 ◽  
Vol 513-517 ◽  
pp. 1221-1226
Author(s):  
Bo Tao Zhu ◽  
Xiao Xiao Liu ◽  
Jun Steed Huang Huang ◽  
Zu Jue Chen

This paper proposes a statistical coding methodology using covert side channel information to solve timing packet security issue, the main purpose here is to enhance the security of the timing protocol with backward compatible capability. In wireless communications, either ad-hoc military/ industrial network, or LTE/ LTE-A networks, GPS is used to provide time and location; however, the hackers often trying to spoof the signal. The alternative way of providing such signal is using protocols like IEEE1588 Precision Time Protocol (PTP); unfortunately, current timing packet is not encrypted, it can be altered by the hackers. To maintain the simplicity of such protocols, most vendors are reluctant to add encryption on top of it; nevertheless, the end customer wishes to see it. To solve this dilemma, we propose a backward compatible solution here. The basic idea is demonstrated using Matlab FFT calculation tool. The future extension using Fractional FFT is also suggested at.


Dismantlings ◽  
2019 ◽  
pp. 93-111
Author(s):  
Matt Tierney

This chapter talks about distortion as a form of dismantling. It describes distortion as the historical and theoretical technique by which readers learn to approach political documents as if they were science fiction. When considered as a vehicle of distortion, literature is measured for its potential to alter exploitative conditions, like those of war, patriarchy, and racism. The science fiction writer Samuel R. Delany insists that transformative change takes shape neither in utopian nor in dystopian visions of the future, but rather in efforts toward significant distortion of the present. This attitude, which is also a theory and practice of literature, is one way to describe the inheritance of cyberculture in the works of writers and activists who employed speculative language to repurpose the thought of Alice Mary Hilton and the Ad Hoc Committee. These writers and activists focused not on the machines that would unveil the myth of scarcity, but instead isolate the forms of human life and relation that would follow the act of unveiling.


Author(s):  
George O. Tsobanoglou ◽  
Eirini Ioanna Vlachopoulou

Even though the study of the commons has been expanding rapidly in the past years, and there have been multiple cases of successful local conservation initiatives, still, significant gaps in knowledge remain. The Social-Ecological Systems framework attempts to analyse the linkages between the “human system” (society) and the “natural system” (ecosystems). In every conservation attempt, the interactions and feedback between the two systems become evident. By examining thoroughly this relationship through the SES lens, we can develop a deep and holistic understanding of the processes that should be taken into consideration before the implementation of conservation actions. This study, through the exploration of the fisheries management procedures in Japan, attempts to develop an understanding of how the adoption of the Social-Ecological Systems approach could promote local development in the insular periphery of the developed world, in countries like Greece, where public participation in the decision-making processes is limited.


Author(s):  
André Paul ◽  
Carsten Jacob ◽  
Heiko Pfeffer ◽  
Stephan Steglich

The growing availability of well-equipped handheld devices and the increasing mobility of users influence the way today’s services can be used. In the future, services provided by different devices can be used on an ad-hoc basis to fulfill user-specified tasks. This chapter proposes an infrastructure for mobile networks that allows for the rating of nodes with respect to their provided functionalities. Thus, it is possible to create reputation relationships and trust assessments between service requesters and service providers. One means for making use of trust relationships is in the reduction and the prevention of interactions with misbehaving or inaccurate nodes. The authors’ work also factors in the subjectivity of users by allowing different service quality perceptions for each user. Thus, each user can base his or her cooperation behavior on their own service behavior preferences instead on the aggregated preferences of all users.


2019 ◽  
Vol 15 (3/4) ◽  
pp. 174-198
Author(s):  
A. Abdollahi Nami ◽  
L. Rajabion

Purpose A mobile ad hoc network (MANET) enables providers and customers to communicate without a fixed infrastructure. Databases are extended on MANETs to have easy data access and update. As the energy and mobility limitations of both servers and clients affect the availability of data in MANETs, these data are replicated. The purpose of this paper is to provide a literature review of data replication issues and classify the available strategies based on the issues they addressed. Design/methodology/approach The selected articles are reviewed based on the defined criteria. Also, the differences, the advantages and disadvantages of these techniques are described. The methods in the literature can be categorized into three groups, including cluster-based, location-based and group-based mechanisms. Findings High flexibility and data consistency are the features of cluster-based mechanisms. The location-based mechanisms are also appropriate for replica allocation, and they mostly have low network traffic and delay. Also, the group-based mechanism has high data accessibility compared to other mechanisms. Data accessibility and time have got more attention to data replication techniques. Scalability as an important parameter must be considered more in the future. The reduction of storage cost in MANETs is the main goal of data replication. Researchers have to consider the cost parameter when another parameter will be influenced. Research limitations/implications Data replication in MANETs has been covered in different available sources such as Web pages, technical reports, academic publications and editorial notes. The articles published in national journals and conferences are ignored in this study. This study includes articles from academic main international journals to get the best capability. Originality/value The paper reviews the past and the state-of-the-art mechanisms in data replication in MANET. Exclusively, data replication’s main goal, existing challenges, research terminologies and mechanisms in MANET are summarized using the answers to the research questions. This method will help researchers in the future to develop more effective data replication method in MANET.


2013 ◽  
Vol 45 (04) ◽  
pp. 1083-1110 ◽  
Author(s):  
Sergey Foss ◽  
Stan Zachary

Many regenerative arguments in stochastic processes use random times which are akin to stopping times, but which are determined by the future as well as the past behaviour of the process of interest. Such arguments based on ‘conditioning on the future’ are usually developed in an ad-hoc way in the context of the application under consideration, thereby obscuring the underlying structure. In this paper we give a simple, unified, and more general treatment of such conditioning theory. We further give a number of novel applications to various particle system models, in particular to various flavours of contact processes and to infinite-bin models. We give a number of new results for existing and new models. We further make connections with the theory of Harris ergodicity.


Sign in / Sign up

Export Citation Format

Share Document