Alternative Methods for Data Access

2019 ◽  
Author(s):  
Robert S. Harbert ◽  
Alex A. Baryiames

ABSTRACTPremise of the studyThe Climate Reconstruction Analysis using Coexistence Likelihood Estimation (CRACLE) method for the estimation of climate from vegetation is a robust set of modeling tools for estimating climate and paleoclimate that makes use of large repositories of biodiversity data and open-access R software.MethodsHere we implement a new R library for the estimation of climate from vegetation. The ‘cRacle’ library implements functions for data access, aggregation, and models to estimate climate from plant community composition. ‘cRacle’ is modular and features many best-practice features.ResultsPerformance tests using modern vegetation survey data from North and South America shows that CRACLE outperforms alternative methods. CRACLE estimates of mean annual temperature (MAT) are usually within 1°C of the actual when optimal model parameters are used. Generalized Boosted Regression (GBR) model correction is also shown here to improve on CRACLE models by reducing bias.DiscussionCRACLE provides accurate estimates of climate from modern plant communities. Non-parametric CRACLE modeling coupled to GBR model correction produces the most accurate results to date. The ‘cRacle’ R library streamlines the estimation of climate from plant community data, and will make this modeling more accessible to a wider range of users.


2014 ◽  
Author(s):  
Susannah R. Kondrath ◽  
Nicholas Noviello

2015 ◽  
pp. 30-61 ◽  
Author(s):  
I. Voskoboynikov ◽  
V. Gimpelson

This study considers the influence of structural change on aggregate labour productivity growth of the Russian economy. The term "structural change" refers to labour reallocation both between industries and between formal and informal segments within an industry. Using Russia KLEMS and official Rosstat data we decompose aggregate labour productivity growth into intra-industry (within) and between industry effects with four alternative methods of the shift-share analysis. All methods provide consistent results and demonstrate that total labour reallocation has been growth enhancing though the informality expansion has had a negative effect. As our study suggests, it is caused by growing variation in productivity levels across industries.


2012 ◽  
Vol 40 (2) ◽  
pp. 60-82
Author(s):  
Ken Ishihara ◽  
Takehiro Noda ◽  
Hiroyuki Sakurai

ABSTRACT In contrast to the finite element method (FEM), which is widely used in the tire industry nowadays, some alternative methods have been proposed by academic communities over the past decade or so. The meshfree method is one of those new methodologies. Originally intended to remove the burden of creating the mesh that is inherent in FEM, the meshfree method relies on the point data rather than the mesh, which makes it much easier to discretize the geometry. In addition to those modeling issues, it has been found that the meshfree method has several advantages over FEM in handling geometrical nonlinearities, continuities, and so forth. In accordance with those emerging possibilities, the authors have been conducting research on the matter. This article describes the results of the authors' preliminary research on the applicability of the meshfree method to tire analyses, which include the theoretical outline, the strategy of tire modeling, numerical results, comparisons with results of FEM, and conclusions.


Author(s):  
P. Sudheer ◽  
T. Lakshmi Surekha

Cloud computing is a revolutionary computing paradigm, which enables flexible, on-demand, and low-cost usage of computing resources, but the data is outsourced to some cloud servers, and various privacy concerns emerge from it. Various schemes based on the attribute-based encryption have been to secure the cloud storage. Data content privacy. A semi anonymous privilege control scheme AnonyControl to address not only the data privacy. But also the user identity privacy. AnonyControl decentralizes the central authority to limit the identity leakage and thus achieves semi anonymity. The  Anonymity –F which fully prevent the identity leakage and achieve the full anonymity.


Sign in / Sign up

Export Citation Format

Share Document