3,039 research outputs found

    ブドウ‘マスカット・オブ・アレキサンドリア’に対する潅水制限が樹体の水分,葉温,果実温,果実の全フェノール含量,果皮色に及ぼす影響

    Get PDF
     Effects of different deficit irrigation strategies on vine water status, canopy and cluster temperatures, fruit total phenolics, and the color of white table grapes (Vitis vinifera L., cv. Muscat of Alexandria) were compared to a well-irrigated control in 2004 from veraison to harvest at the Okayama University Experimental Vineyard, Japan. The treatments included: (1) well-irrigated control: re-irrigation when the soil moisture tension reached 15 kPa; (2) regulated deficit irrigation (RDI): re-irrigation 4 to 7 days after reaching a soil moisture tension of 15 kPa; (3) fixed partial root-zone wetting (FPRW): one part of the root system was re-irrigated when the soil moisture tension reached 15 kPa; and (4) alternate partial root-zone wetting (APRW): one part of the root system was re-irrigated when the soil moisture tension reached 15 kPa, and every week the irrigated part was switched. As the stress developed in RDI vines, leaf water potential and transpiration rate decreased and canopy and cluster temperatures increased as compared with the control. In contrast, both FPRW and APRW vines had similar leaf water potential and canopy and cluster temperatures, but less leaf transpiration rate as compared with the control. At harvest, fruits from all treatments had higher skin total phenolics and CIELAB a* values than the control. RDI fruit had higher total soluble solids (TSS), a similar acidity, and smaller size compared with the control. FPRW and APRW fruits had slightly higher TSS, lower acidity, and a similar size compared with the control.ベレゾーン期から収穫期までの潅水制限処理が‘マスカット・オブ・アレキサンドリア’ブドウ(Vitis vinifera L。)の水分条件,葉温,果実温,果実の全フェノール,果皮色に及ぼす影響を,十分に潅水した樹と比較した.実験は2004年に岡山大学農学部内の実験圃場で行った.処理区は,1) 土壌水分張力が15kPa に達したときに潅水する対照区,2) 土壌水分張力が15kPa に達してから4~7日後に潅水する制限潅水区,3) 土壌水分張力が15kPa に達したときに根域の半分に潅水する片側潅水区,4) 片側潅水する根域部分を1週間ごとに変更する交互潅水区とした.制限潅水区では水分ストレスが強まるにつれて葉の水ポテンシャルと蒸散速度が対照区よりも低下し,果実温が高くなった.しかし,片側潅水区と交互潅水区では,葉の水ポテンシャルと葉温,果実温は対照区と同程度で,蒸散速度が低下した.収穫期の果皮の全フェノールと CIELAB a* 値は,潅水を制限した各区では標準区より高かった.制限潅水区の果実は,標準区より糖度が高く,酸度は低く,果粒は小さかった.片側潅水区,交互潅水区では糖度がやや高く,酸度は低く,果粒の大きさは同程度であった

    NATCracker: NAT Combinations Matter

    Get PDF
    In this paper, we report our experience in working with Network Address Translators (NATs). Traditionally, there were only 4 types of NATs. For each type, the (im)possibility of traversal is well-known. Recently, the NAT community has provided a deeper dissection of NAT behaviors resulting into at least 27 types and documented the (im)possibility of traversal for some types. There are, however, two fundamental issues that were not previously tackled by the community. First, given the more elaborate set of behaviors, it is incorrect to reason about traversing a single NAT, instead combinations must be considered and we have not found any study that comprehensively states, for every possible combination, whether direct connectivity with no relay is feasible. Such a statement is the first outcome of the paper. Second, there is a serious need for some kind of formalism to reason about NATs which is a second outcome of this paper. The results were obtained using our own scheme which is an augmentation of currently-known traversal methods. The scheme is validated by reasoning using our formalism, simulation and implementation in a real P2P network

    Physics-inspired Performace Evaluation of a Structured Peer-to-Peer Overlay Network

    Get PDF
    In the majority of structured peer-to-peer overlay networks a graph with a desirable topology is constructed. In most cases, the graph is maintained by a periodic activity performed by each node in the graph to preserve the desirable structure in face of the continuous change of the set of nodes. The interaction of the autonomous periodic activities of the nodes renders the performance analysis of such systems complex and simulation of scales of interest can be prohibitive. Physicists, however, are accustomed to dealing with scale by characterizing a system using intensive variables, i.e. variables that are size independent. The approach has proved its usefulness when applied to satisfiability theory. This work is the first attempt to apply it in the area of distributed systems. The contribution of this paper is two-fold. First, we describe a methodology to be used for analyzing the performance of large scale distributed systems. Second, we show how we applied the methodology to find an intensive variable that describe the characteristic behavior of the Chord overlay network, namely, the ratio of the magnitude of perturbation of the network (joins/failures) to the magnitude of periodic stabilization of the network

    Underlying structures of risk response measures among small and medium contractors in South Africa

    Get PDF
    Although attention has been given to the measures used to respond to risk in the construction industry (CI), there is limited literature that scrutinizes underlying structures of risk response measures (RRMs) especially among small and medium enterprises (SMEs). This study, therefore, presents findings from an exploratory factor analysis (EFA) of RRMs. A positivist paradigm was adopted to collect empirical raw data from 181 conveniently sampled respondents in Gauteng, South Africa (SA), using a structured questionnaire. The results support the extant literature and empirically established the structural composition of risk response by two constructs. The construct with emerged measures was termed trailing measures while the one with popular measures was termed leading measures of risk response. However, the study yielded a two-factor model with all the six items supposed to measure risk response. Based on the results obtained, it seems that risk avoidance and risk mitigation are reliable measures for measuring risk response. This study could thus serve as a reference for the accurate measurement of risk response and for the development of agreed responses for each risk, including an appropriate strategy and specific responses to implement the chosen strategy. The study was limited to the CI and to a lesser extent, construction SMEs in Gauteng; hence the findings cannot be generalized to all SMEs in SA

    An Analytical Study of a Structured Overlay in the presence of Dynamic Membership

    Get PDF
    In this paper, we present a complete analytical study of dynamic membership (aka churn) in structured peer-to-peer networks. We use a master-equation-based approach, which is used traditionally in non-equilibrium statistical mechanics to describe steady-state or transient phenomena. We demonstrate that this methodology is in fact also well suited to describing structured overlay networks by an application to the Chord system. For any rate of churn and stabilization rates, and any system size, we accurately account for the functional form of: the distribution of inter-node distances, the probability of network disconnection, the fraction of failed or incorrect successor and finger pointers and show how we can use these quantities to predict both the performance and consistency of lookups under churn. Additionally, we also discuss how churn may actually be of different 'types' and the implications this will have for structured overlays in general. All theoretical predictions match simulation results to a high extent. The analysis includes details that are applicable to a generic structured overlay deploying a ring as well as Chord-specific details that can act as guidelines for analyzing other systems

    Mesmerizer: A Effective Tool for a Complete Peer-to-Peer Software Development Life-cycle

    Get PDF
    In this paper we present what are, in our experience, the best practices in Peer-To-Peer(P2P) application development and how we combined them in a middleware platform called Mesmerizer. We explain how simulation is an integral part of the development process and not just an assessment tool. We then present our component-based event-driven framework for P2P application development, which can be used to execute multiple instances of the same application in a strictly controlled manner over an emulated network layer for simulation/testing, or a single application in a concurrent environment for deployment purpose. We highlight modeling aspects that are of critical importance for designing and testing P2P applications, e.g. the emulation of Network Address Translation and bandwidth dynamics. We show how our simulator scales when emulating low-level bandwidth characteristics of thousands of concurrent peers while preserving a good degree of accuracy compared to a packet-level simulator

    An Analytical Study of a Structured Overlay in the presence of Dynamic Membership

    Full text link
    In this paper we present an analytical study of dynamic membership (aka churn) in structured peer-to-peer networks. We use a fluid model approach to describe steady-state or transient phenomena, and apply it to the Chord system. For any rate of churn and stabilization rates, and any system size, we accurately account for the functional form of the probability of network disconnection as well as the fraction of failed or incorrect successor and finger pointers. We show how we can use these quantities to predict both the performance and consistency of lookups under churn. All theoretical predictions match simulation results. The analysis includes both features that are generic to structured overlays deploying a ring as well as Chord-specific details, and opens the door to a systematic comparative analysis of, at least, ring-based structured overlay systems under churn.Comment: 12 pages, 14 figures, to appear in IEEE/ACM Transactions on Networkin

    Multicast in DKS(N, k, f) Overlay Networks

    Get PDF
    Recent developments in the area of peer-to-peer computing show that structured overlay networks implementing distributed hash tables scale well and can serve as infrastructures for Internet scale applications. We are developing a family of infrastructures, DKS(N; k; f), for the construction of peer-to-peer applications. An instance of DKS(N; k; f) is an overlay network that implements a distributed hash table and which has a number of desirable properties: low cost of communication, scalability, logarithmic lookup length, fault-tolerance and strong guarantees of locating any data item that was inserted in the system. In this paper, we show how multicast is achieved in DKS(N, k, f) overlay networks. The design presented here is attractive in three main respects. First, members of a multicast group self-organize in an instance of DKS(N, k, f) in a way that allows co-existence of groups of different sizes, degree of fault-tolerance, and maintenance cost, thereby, providing flexibility. Second, each member of a group can multicast, rather than having single source multicast. Third, within a group, dissemination of a multicast message is optimal under normal system operation in the sense that there are no redundant messages despite the presence of outdated routing information
    corecore