205 research outputs found

    Congestion Control for Adaptive Satellite Communication Systems with Intelligent Systems

    Get PDF
    With the advent of life critical and real-time services such as remote operations over satellite, e-health etc, providing the guaranteed minimum level of services at every ground terminal of the satellite communication system has gained utmost priority. Ground terminals and the hub are not equipped with the required intelligence to predict and react to inclement and dynamic weather conditions on its own. The focus of this thesis is to develop intelligent algorithms that would aid in adaptive management of the quality of service at the ground terminal and the gateway level. This is done to adapt both the ground terminal and gateway to changing weather conditions and to attempt to maintain a steady throughput level and Quality of Service (QoS) requirements on queue delay, jitter, and probability of loss of packets. The existing satellite system employs the First-In-First-Out routing algorithm to control congestion in their networks. This mechanism is not equipped with adequate ability to contend with changing link capacities, a common result due to bad weather and faults and to provide different levels of prioritized service to the customers that satisfies QoS requirements. This research proposes to use the reported strength of fuzzy logic in controlling highly non-linear and complex system such as the satellite communication network. The proposed fuzzy based model when integrated into the satellite gateway provides the needed robustness to the ground terminals to comprehend with varying levels of traffic and dynamic impacts of weather

    Best effort measurement based congestion control

    Get PDF
    Abstract available: p.

    Recreation, tourism and nature in a changing world : proceedings of the fifth international conference on monitoring and management of visitor flows in recreational and protected areas : Wageningen, the Netherlands, May 30-June 3, 2010

    Get PDF
    Proceedings of the fifth international conference on monitoring and management of visitor flows in recreational and protected areas : Wageningen, the Netherlands, May 30-June 3, 201

    Future of the global trade order. 2nd edition

    Get PDF
    The volume brings together essays on key challenges confronting the global trading system, taking a business perspective. This second edition updates all the contributions in the first edition, and includes new chapters reflecting on the forces impacting on globalization, prospects for US trade policy and competition policy and the global trade regime.About the Contributors - Foreword - 1 Future of the Global Trade Order – 2. The Threat of Economic Disintegration - 3. Back to the Future: US Trade Policy under the Trump Administration – 4. A New Architecture for the WTO? – 5. Why Engage in Trade Negotiations and the Relevance of the WTO 101- 6. The Future of the WTO Dispute Settlement System: Confronting Challenges to Consolidate a Success Story -7. “Behind-the-Border” Policies: Regulatory Cooperation and Trade Agreements – 8. The WTO’s Next Work Program – As if the Global Economic Crisis Really Mattered – 9. Regional Trade Agreements and the WTO 10. Addressing the Networked Economy in Trade Policy – 11. International Trade and Competition Policy: Working Together for the Global Econom

    Longing to Return and Spaces of Belonging. Iraqis’ Narratives in Helsinki and Rome

    Get PDF
    Siirretty Doriast

    Canadian Border Security: Examining Border Services Officer and Traveller Knowledge Concerning Interaction Narratives and Technologization Within the Windsor Borderland

    Get PDF
    Through contrasting institutional discourses with frontline official and non-official knowledge gleaned from interaction narratives from past social interactions and supplied by border services officers (BSOs) and members of travelling publics circulating at ports of entry in the Windsor, Ontario, Canada borderland, this thesis accomplishes the work of considering border security and mobility governance as an everyday practice (Côté-Boucher, Infantino, and Salter 2014). While previous literature has expertly documented the governmentality of modern borders, its privileging of institutional forms of knowledge means findings are inherently limited in that they ignore subjugated forms of knowledge (Foucault 1972), the role of diverse publics in shaping the field of (in)security, and renders invisible the presence of (in)security in everyday life (Vaughan-Williams and Stevens 2016:43). To this end, this thesis is unique in considering – for the first time – interaction narratives supplied by BSOs and members of travelling publics circulating regularly within a geographically specific borderland. This thesis is also unique in considering how knowledge generated by such narratives potentially challenges institutional discourses supplied by Canada Border Services Agency (CBSA). Lastly, this thesis is also unique in examining how border technologization and digitization potentially influence frontline social interactions between officers and publics, generate additional knowledge concerning the nature of digitized borders, and function to establish a gulf between institutional discourses and localized frontline practices. This thesis employs a multi-method approach, utilizing: 1) a content analysis and discourse analysis of various primary and secondary institutional documents, 2) content and thematic analyses performed on transcripts generated from in-depth, semi-structured interviews performed with 10 BSOs working in the Windsor borderland, and 3) content and thematic analyses performed on transcripts generated from in-depth, semi-structured interviews performed with 30 members of travelling publics, the vast majority of whom resided in the Windsor borderland at the time interviews were conducted. Combined, official and non-official knowledge generated from interaction narratives provided by participants provides several critiques in terms of analyzing institutional knowledge generated by CBSA. Findings generated through interaction narratives indicate: 1) officers have experienced a shift in “lifeworld” (Habermas 1981) alongside shifts in agency mandates toward a neoliberal risk-management model of mobility governance; 2) officers receive very little formal training in terms of frontline interactions; 3) officer training displays a systematic bias toward constructing all interactions as “security moments” designed to fulfill a security mandate, ultimately leaving officers ill-trained in terms of the “facilitation” (CBSA 2018e:8), non-securitized, humanitarian side of border work; 4) despite being couched by CBSA institutional discourses as being professional, courteous, law-abiding, and thorough, much evidence exists to suggest BSOs act in ways differing substantially from this knowledge, including: officers not performing full primary inspections on travellers, Canadian Charter of Rights and Freedoms violations in terms of officers routinely asking travellers about their mobility while outside of Canada, and a variety of negative frontline interactions including: a) aggressive or unnecessary questioning by officers, b) officers presenting a rude or unfriendly demeanor, c) harassment by officers about purchases made abroad, d) officers unfairly or incorrectly applying policies, e) unnecessary examinations, and f) enforcement actions resulting in the seizure of purchased goods; 5) officers are often forced to develop shared ad hoc best practices in terms of social interactions on the frontline, where there is a real danger of BSOs “parroting” the poor practices of just one or two veteran officers; 6) the existence of a substantial gulf between national policy and training modules and the localized and geographically-specific practices occurring at disparate ports of entry across Canada. Findings generated in terms of the technologization of contemporary borders suggest border security and mobility governance practices are best understood as forms of simulation (Baudrillard 1981) and cyborg work (Bogard 1996), whereby digitized subjects (Goriunova 2019) – which are not at all representative of human subjects – are taken as irrefutable copies or “dividuals” (Deleuze 1992) by border officers, and ultimately become the unit of analysis under neoliberal risk-management schemes in making decisions possible and rendering the personal narratives and performativity of embodied subjects (travellers) effectively irrelevant. Despite CBSA institutional documents couching technologization in terms of improving efficiency at the border, augmenting officer decision-making, and enhancing security provision, official and non-official knowledge gleaned from interaction narratives generated from perceptions related to past social interactions serves to provide a serious critique of these discourses. This includes knowledge concerning perceived deficits related to border technologization, including: 1) discussions of data errors causing travel problems (duplicated NEXUS card numbers, mistaken warrants in the CPIC database, false travel histories in customs databases, and so forth); 2) the advertised benefits of the NEXUS trusted traveller program (efficiency crossing borders) as being either non-existent or irrelevant; 3) the use of Automated Border Clearance (ABC) kiosks / Primary Inspection Kiosks (PIKs) at major Canadian international airports as serving to produce superficial and robotic frontline social interactions guided exclusively by computer-generated risk codes; and 4) the apparent negative effects of technologization in terms of eroding the ability of officers to make informed decisions on the basis of anything other than information provided by computerized databases. Combined, findings generated by comparing institutional knowledge with official and non-official interaction narrative knowledge are subsequently considered through the lens of simulation, human and mobility rights, bureaucratic secrecy, and potential policy change. Additionally, slippage between nationalized institutional discourses and localized frontline practices are explained through the lens of neoliberal systems of power and governance. Finally, avenues for future research are discussed in concluding the thesis

    The Electronic Silk Road: How the Web Binds the World in Commerce

    Get PDF
    On the ancient Silk Road, treasure-laden caravans made their arduous way through deserts and mountain passes, establishing trade between Asia and the civilizations of Europe and the Mediterranean. Today’s electronic Silk Roads ferry information across continents, enabling individuals and corporations anywhere to provide or receive services without obtaining a visa. But the legal infrastructure for such trade is yet rudimentary and uncertain. If an event in cyberspace occurs at once everywhere and nowhere, what law applies? How can consumers be protected when engaging with companies across the world? In this accessible book, cyber-law expert Anupam Chander provides the first thorough discussion of the law that relates to global Internet commerce. Addressing up-to-the-minute examples, such as Google’s struggles with China, the Pirate Bay’s skirmishes with Hollywood, and the outsourcing of services to India, the author insightfully analyzes the difficulties of regulating Internet trade. Chander then lays out a framework for future policies, showing how countries can dismantle barriers while still protecting consumer interests

    Unmet goals of tracking: within-track heterogeneity of students' expectations for

    Get PDF
    Educational systems are often characterized by some form(s) of ability grouping, like tracking. Although substantial variation in the implementation of these practices exists, it is always the aim to improve teaching efficiency by creating homogeneous groups of students in terms of capabilities and performances as well as expected pathways. If students’ expected pathways (university, graduate school, or working) are in line with the goals of tracking, one might presume that these expectations are rather homogeneous within tracks and heterogeneous between tracks. In Flanders (the northern region of Belgium), the educational system consists of four tracks. Many students start out in the most prestigious, academic track. If they fail to gain the necessary credentials, they move to the less esteemed technical and vocational tracks. Therefore, the educational system has been called a 'cascade system'. We presume that this cascade system creates homogeneous expectations in the academic track, though heterogeneous expectations in the technical and vocational tracks. We use data from the International Study of City Youth (ISCY), gathered during the 2013-2014 school year from 2354 pupils of the tenth grade across 30 secondary schools in the city of Ghent, Flanders. Preliminary results suggest that the technical and vocational tracks show more heterogeneity in student’s expectations than the academic track. If tracking does not fulfill the desired goals in some tracks, tracking practices should be questioned as tracking occurs along social and ethnic lines, causing social inequality

    Cyber Law and Espionage Law as Communicating Vessels

    Get PDF
    Professor Lubin\u27s contribution is Cyber Law and Espionage Law as Communicating Vessels, pp. 203-225. Existing legal literature would have us assume that espionage operations and “below-the-threshold” cyber operations are doctrinally distinct. Whereas one is subject to the scant, amorphous, and under-developed legal framework of espionage law, the other is subject to an emerging, ever-evolving body of legal rules, known cumulatively as cyber law. This dichotomy, however, is erroneous and misleading. In practice, espionage and cyber law function as communicating vessels, and so are better conceived as two elements of a complex system, Information Warfare (IW). This paper therefore first draws attention to the similarities between the practices – the fact that the actors, technologies, and targets are interchangeable, as are the knee-jerk legal reactions of the international community. In light of the convergence between peacetime Low-Intensity Cyber Operations (LICOs) and peacetime Espionage Operations (EOs) the two should be subjected to a single regulatory framework, one which recognizes the role intelligence plays in our public world order and which adopts a contextual and consequential method of inquiry. The paper proceeds in the following order: Part 2 provides a descriptive account of the unique symbiotic relationship between espionage and cyber law, and further explains the reasons for this dynamic. Part 3 places the discussion surrounding this relationship within the broader discourse on IW, making the claim that the convergence between EOs and LICOs, as described in Part 2, could further be explained by an even larger convergence across all the various elements of the informational environment. Parts 2 and 3 then serve as the backdrop for Part 4, which details the attempt of the drafters of the Tallinn Manual 2.0 to compartmentalize espionage law and cyber law, and the deficits of their approach. The paper concludes by proposing an alternative holistic understanding of espionage law, grounded in general principles of law, which is more practically transferable to the cyber realmhttps://www.repository.law.indiana.edu/facbooks/1220/thumbnail.jp
    corecore