14,108 research outputs found

    On multidecadal and quasi-decadal North Atlantic variability

    Get PDF
    Observed sea surface temperatures (SSTs) in the North Atlantic from 1958 through 2000, as well as data from an ocean model simulation driven with the atmospheric variability observed during the same period, are examined using multichannel singular spectrum analysis. The two leading oscillatory modes are associated with a multidecadal and a quasi-decadal period. The former is connected to a basinwide uniform SST pattern and changes in the deep North Atlantic meridional overturning circulation. The quasi-decadal mode involves a tripolar SST anomaly pattern forced by atmospheric variability with a spatial structure resembling that of the North Atlantic Oscillation (NAO). The upper ocean’s dynamical response to this NAO variability provides an instantaneous positive feedback to the SST pattern, while a delayed negative feedback is due to shallow overturning circulation anomalies

    Sentiment cascades in the 15M movement

    Get PDF
    Recent grassroots movements have suggested that online social networks might play a key role in their organization, as adherents have a fast, many-to-many, communication channel to help coordinate their mobilization. The structure and dynamics of the networks constructed from the digital traces of protesters have been analyzed to some extent recently. However, less effort has been devoted to the analysis of the semantic content of messages exchanged during the protest. Using the data obtained from a microblogging service during the brewing and active phases of the 15M movement in Spain, we perform the first large scale test of theories on collective emotions and social interaction in collective actions. Our findings show that activity and information cascades in the movement are larger in the presence of negative collective emotions and when users express themselves in terms related to social content. At the level of individual participants, our results show that their social integration in the movement, as measured through social network metrics, increases with their level of engagement and of expression of negativity. Our findings show that non-rational factors play a role in the formation and activity of social movements through online media, having important consequences for viral spreading.Comment: EPJ Data Science vol 4 (2015) (forthcoming

    Impact of global warming on ENSO phase change

    Get PDF
    We compare the physical mechanisms involved in the generation and decay of ENSO events in a control (present day conditions) and Scenario (Is92a, IPCC 1996) simulations performed with the coupled ocean-atmosphere GCM ECHAM4-OPYC3. A clustering technique which objectively discriminates common features in the evolution of the Tropical Pacific Heat Content anomalies leading to the peak of ENSO events allows us to group into a few classes the ENSO events occurring in 240 years of data in the control and scenario runs. In both simulations, the composites of the groups show differences in the generation and development of ENSO. We present the changes in the statistics of the groups and explore the possible mechanisms involved

    Моделирование безопасного поведения водителя на перекрестках с помощью глубинного обучения

    Get PDF
    Roundabouts provide safe and fast circulation as well as many environmental advantages, but drivers adopting unsafe behaviours while circulating through them may cause safety issues, provoking accidents. In this paper we propose a way of training an autonomous vehicle in order to behave in a human and safe way when entering a roundabout. By placing a number of cameras in our vehicle and processing their video feeds through a series of algorithms, including Machine Learning, we can build a representation of the state of the surrounding environment. Then, we use another set of Deep Learning algorithms to analyze the data and determine the safest way of circulating through a roundabout given the current state of the environment, including nearby vehicles with their estimated positions, speeds and accelerations. By watching multiple attempts of a human entering a roundabout with both safe and unsafe behaviours, our second set of algorithms can learn to mimic the human’s good attempts and act in the same way as him, which is key to a safe implementation of autonomous vehicles. This work details the series of steps that we took, from building the representation of our environment to acting according to it in order to attain safe entry into single lane roundabouts

    KINETIC AND KINEMATIC ANALYSIS OF THE DOMINANT AND NON-DOMINANT KICKING LEG IN THE TAEKWONDO ROUNDHOUSE KICK

    Get PDF
    The purpose of this study was to examine kinematic variables relevant to kick performance with the dominant and non-dominant leg, in a roundhouse kick measured from three execution distances. Forty-three taekwondo athletes that had competitive taekwondo experience participated in the study. A dependent t-test indicated that there were no differences between extremities at any distance (p > .01). Based on these results, competitive taekwondo players do not seem to reveal differences in limb kinematics. The results also showed the influence of the distance from which the dominant leg explains a larger percentage of variance in reaction time (24%), execution time (20%) and total response time (60%) of the non-dominant leg from a short distance, whereas regarding impact force (22%), this higher percentage is explained from a long distance

    Overview of methods used to evaluate the adequacy of nutrient intakes for individuals and populations

    Get PDF
    The objective of the present paper is to review the methods of measuring micronutrient intake adequacy for individuals and for populations in order to ascertain best practice. A systematic review was conducted to locate studies on the methodological aspects of measuring nutrient adequacy. The results showed that for individuals, qualitative methods (to find probability of adequacy) and quantitative methods (to find confidence of adequacy) have been proposed for micronutrients where there is enough data to set an average nutrient requirement (ANR). If micronutrients do not have ANR, an adequate intake (AI) is often defined and can be used to assess adequacy, provided the distribution of daily intake over a number of days is known. The probability of an individual's intake being excessive can also be compared with the upper level of safe intake and the confidence of this estimate determined in a similar way. At the population level, adequacy can be judged from the ANR using the probability approach or its short cut – the estimated average requirement cut-point method. If the micronutrient does not have an ANR, adequacy cannot be determined from the average intake and must be expressed differently. The upper level of safe intake can be used for populations in a similar way to that of individuals. All of the methodological studies reviewed were from the American continent and all used the methodology described in the Institute of Medicine publications. The present methodology should now be adapted for use in Europe

    Secure Geographic Routing in Ad Hoc and Wireless Sensor Networks

    Get PDF
    Security in sensor networks is one of the most relevant research topics in resource constrained wireless devices and networks. Several attacks can be suffered in ad hoc and wireless sensor networks (WSN), which are highly susceptible to attacks, due to the limited resources of the nodes. In this paper, we propose innovative and lightweight localization techniques that allow for intrusion identification and isolation schemes and provide accurate location information. This information is used by our routing protocol which additionally incorporates a distributed trust model to prevent several routing attacks to the network. We finally evaluate our algorithms for accurate localization and for secure routing which have been implemented and tested in real ad hoc and wireless sensor networks

    Architectures for Future Media Internet

    Get PDF
    Among the major reasons for the success of the Internet have been the simple networking architecture and the IP interoperation layer. However, the traffic model has recently changed. More and more applications (e.g. peerto-peer, content delivery networks) target on the content that they deliver rather than on the addresses of the servers who (originally) published/hosted that content. This trend has motivated a number of content-oriented networking studies. In this paper we summarize some the most important approache
    corecore