2,571 research outputs found

    Ownership of demand deposits

    Get PDF
    Bank deposits

    Ownership of demand deposits

    Get PDF
    Bank deposits

    Ownership of demand deposits

    Get PDF
    Bank deposits ; Banks and banking

    Some Values for Undergirding Justice and Peace Initiatives

    Full text link

    A Mathematical Model for Antibiotic Resistance in a Hospital Setting with a Varying Population

    Get PDF
    Antibiotic-resistant bacteria(ARB) is causing increased health risk and cost to society. Mathematical models have been developed to study the transmission of resistant bacteria and the efficacy of preventive measures to slow its spread within a hospital setting. The majority of these models have assumed a constant total hospital population with the admission and discharge rates being equal throughout the duration. But a typical hospital population varies from day to day and season to season. In this thesis, we apply variable admission and discharge daily rates to existing deterministic and stochastic models which examine the transmission of single and dual resistant bacteria. We perform stability and equilibrium analyses as well as a sensitivity analysis on the resulting model.

    Foundations of coverage algorithms in autonomic mobile sensor networks

    Get PDF
    Drones are poised to become a prominent focus of advances in the near future as hardware platforms manufactured via mass production become accessible to consumers in higher quantities at lower costs than ever before. As more ways to utilize such devices become more popular, algorithms for directing the activities of mobile sensors must expand in order to automate their work. This work explores algorithms used to direct the behavior of networks of autonomous mobile sensors, and in particular how such networks can operate to achieve coverage of a field using mobility. We focus special attention to the way limited mobility affects the performance (and other factors) of algorithms traditionally applied to area coverage and event detection problems. Strategies for maximizing event detection and minimizing detection delay as mobile sensors with limited mobility are explored in the first part of this work. Next we examine exploratory coverage, a new way of analyzing sensor coverage, concerned more with covering each part of the coverage field once, while minimizing mobility required to achieve this level of 1-coverage. This analysis is contained in the second part of this work. Extending the analysis of mobility, we next strive to explore the novel topic of disabled mobility in mobile sensors, and how algorithms might react to increase effectiveness given that some sensors have lost mobility while retaining other senses. This work analyzes algorithm effectiveness in light of disabled mobility, demonstrates how this particular failure mode impacts common coverage algorithms, and presents ways to adjust algorithms to mitigate performance losses. --Abstract, page iv

    Critical infrastructure protection and the Domain Name Service (DNS) system

    Get PDF
    Components of the critical infrastructure of any system are natural targets for attack. Any inherent weakness of such components can potentially expose the entire system to vulnerability. The Domain Name System (DNS) is one component of the proper functioning of the Internet. Although DNS is a relatively simple, isolated component, it serves as a straightforward example for the study of distributed systems in general, and as such, we have explored properties of DNS to examine how enterprise-scale, critical infrastructure components are vulnerable to attack, what protections are afforded to defenders of such components, the inherent weaknesses of such systems, and what natural defenses are available to safeguard them and ensure the availability of these systems. Each of the works in this thesis analyzes some aspect of our efforts in this regard --Abstract, page iv
    • …
    corecore