1,473 research outputs found

    FlÀchendeckende Entsorgung bis 2005. Liegt Brandenburg in der Zeit?

    Get PDF
    Der Begriff „Abwasserentsorgung“ entbindet uns nicht von der Verpflichtung des Kreislaufwirtschafts- und Abfallgesetzes, erst zu entsorgen, wenn wir keine umweltpolitische und wirtschaftliche Möglichkeit zur Verwertung mehr sehen. Schließen wir nicht mit vielen Formulierungen in Gesetzen und Verordnungen ĂŒber die „Abwasserentsorgung“ diese Pflicht, nach Verwertungsmöglichkeiten zu suchen, von vornherein aus

    Metricizing the Euclidean Space towards Desired Distance Relations in Point Clouds

    Full text link
    Given a set of points in the Euclidean space Rℓ\mathbb{R}^\ell with ℓ>1\ell>1, the pairwise distances between the points are determined by their spatial location and the metric dd that we endow Rℓ\mathbb{R}^\ell with. Hence, the distance d(x,y)=ÎŽd(\mathbf x,\mathbf y)=\delta between two points is fixed by the choice of x\mathbf x and y\mathbf y and dd. We study the related problem of fixing the value ÎŽ\delta, and the points x,y\mathbf x,\mathbf y, and ask if there is a topological metric dd that computes the desired distance ÎŽ\delta. We demonstrate this problem to be solvable by constructing a metric to simultaneously give desired pairwise distances between up to O(ℓ)O(\sqrt\ell) many points in Rℓ\mathbb{R}^\ell. We then introduce the notion of an Δ\varepsilon-semimetric d~\tilde{d} to formulate our main result: for all Δ>0\varepsilon>0, for all m≄1m\geq 1, for any choice of mm points y1,
,ym∈Rℓ\mathbf y_1,\ldots,\mathbf y_m\in\mathbb{R}^\ell, and all chosen sets of values {ÎŽij≄0:1≀i<j≀m}\{\delta_{ij}\geq 0: 1\leq i<j\leq m\}, there exists an Δ\varepsilon-semimetric ÎŽ~:Rℓ×Rℓ→R\tilde{\delta}:\mathbb{R}^\ell\times \mathbb{R}^\ell\to\mathbb{R} such that d~(yi,yj)=ÎŽij\tilde{d}(\mathbf y_i,\mathbf y_j)=\delta_{ij}, i.e., the desired distances are accomplished, irrespectively of the topology that the Euclidean or other norms would induce. We showcase our results by using them to attack unsupervised learning algorithms, specifically kk-Means and density-based (DBSCAN) clustering algorithms. These have manifold applications in artificial intelligence, and letting them run with externally provided distance measures constructed in the way as shown here, can make clustering algorithms produce results that are pre-determined and hence malleable. This demonstrates that the results of clustering algorithms may not generally be trustworthy, unless there is a standardized and fixed prescription to use a specific distance function

    Modelling security risk in critical utilities:the system at risk as a three player game and agent society

    Get PDF
    It becomes essential when reasoning about the security risks to critical utilities such electrical power and water distribution to recognize that the interests of producers and consumers do not fully coincide. They may have incentives to behave strategically towards each other, as well as toward some third party adversary. We therefore argue for the need to extend the prior literature, which has concentrated on the strategic, adaptive game between adversary and defender, towards 3-player games. But it becomes hard to justify modelling a population of consumers as a single, decision making actor. So we also show how we can model consumers as a group of mutually-influencing, yet not centrally co-ordinated, heterogeneous agents. And we suggest how this representation can be integrated into a game-theoretic framework. This requires a framework in which payoffs are known by the players only stochastically. We present some basic models and demonstrate the nature of the modelling commitments that need to be made in order to reason about utilities’ security risk

    Sensory Augmentation for the Blind

    Get PDF
    Common navigational aids used by blind travelers during large-scale navigation divert attention away from important cues of the immediate environment (i.e., approaching vehicles). Sensory augmentation devices, relying on principles similar to those at work in sensory substitution, can potentially bypass the bottleneck of attention through sub-cognitive implementation of a set of rules coupling motor actions with sensory stimulation. We provide a late blind subject with a vibrotactile belt that continually signals the direction of magnetic north. The subject completed a set of behavioral tests before and after an extended training period. The tests were complemented by questionnaires and interviews. This newly supplied information improved performance on different time scales. In a pointing task we demonstrate an instant improvement of performance based on the signal provided by the device. Furthermore, the signal was helpful in relevant daily tasks, often complicated for the blind, such as keeping a direction over longer distances or taking shortcuts in familiar environments. A homing task with an additional attentional load demonstrated a significant improvement after training. The subject found the directional information highly expedient for the adjustment of his inner maps of familiar environments and describes an increase in his feeling of security when exploring unfamiliar environments with the belt. The results give evidence for a firm integration of the newly supplied signals into the behavior of this late blind subject with better navigational performance and more courageous behavior in unfamiliar environments. Most importantly, the complementary information provided by the belt lead to a positive emotional impact with enhanced feeling of security. The present experimental approach demonstrates the positive potential of sensory augmentation devices for the help of handicapped people

    Attribute Repair for Threat Prevention

    Get PDF
    We propose a model-based procedure for preventing security threats using formal models. We encode system models and threats as satisfiability modulo theory (SMT) formulas. This model allows us to ask security questions as satisfiability queries. We formulate threat preven- tion as an optimization problem over the same formulas. The outcome of our threat prevention procedure is a suggestion of model attribute repair that eliminates threats. We implement our approach using the state-of-the-art Z3 SMT solver and interface it with the threat analysis tool THREATGET. We demonstrate the value of our procedure in two case studies from automotive and smart home domains

    Threat Repair with Optimization Modulo Theories

    Full text link
    We propose a model-based procedure for automatically preventing security threats using formal models. We encode system models and potential threats as satisfiability modulo theory (SMT) formulas. This model allows us to ask security questions as satisfiability queries. We formulate threat prevention as an optimization problem over the same formulas. The outcome of our threat prevention procedure is a suggestion of model attribute repair that eliminates threats. Whenever threat prevention fails, we automatically explain why the threat happens. We implement our approach using the state-of-the-art Z3 SMT solver and interface it with the threat analysis tool THREATGET. We demonstrate the value of our procedure in two case studies from automotive and smart home domains, including an industrial-strength example

    Patterns of livestock loss associated with a recolonizing wolf population in Germany

    Get PDF
    Predation on livestock presents a daunting challenge for human–carnivore coexistence in agricultural landscapes. In Germany, the recolonization of wolves is ongoing and its consequences are insufficiently understood. Knowledge about which livestock species are susceptible to wolf predation, which farm types are predisposed to attacks by wolves, and when predation on livestock occurs is valuable for mitigating stakeholder conflicts. To this end, we analyzed 14 years of monitoring data and assessed the livestock prey spectrum, identified correlates between predation on livestock, farm type and livestock category, and described temporal patterns of livestock loss caused by a recolonizing wolf population in the state of Brandenburg (Germany). Among a total of 1387 recorded cases, 42% were unequivocally attributed to wolves (SCALP criteria C1 and C2) and 12% of cases were not caused by wolves. The number of head of livestock killed during a single wolf attack was mediated by farm type and livestock species; losses per event were greater in full-time farms vs. other farm types and greater in sheep, farmed deer and other livestock species, compared to cattle. While sheep were the most commonly killed livestock species, the increase in wolf territories over the investigation period was associated with a widening of the domestic prey species spectrum. Count regression models provided evidence for the increasing frequency of predation events over the 14-year period, along with an exponential increase in wolf territories. Predation on livestock occurred throughout the year, yet seasonality of events was evident and differed across livestock categories. Predation on sheep peaked in the fall, coinciding with the post-weaning period of wolf offspring. Predation on cattle peaked in the spring, coinciding with the cattle calving period. These results call for renewed investment in the implementation of prevention methods for all susceptible domestic species, particularly during times of elevated predation risk.Peer Reviewe

    Protection effect of overwintering water bird habitat and defining the conservation priority area in Poyang Lake wetland, China

    Get PDF
    Biodiversity conservation is one of the most important objectives of protected areas. Most biodiversity assessment-related studies use the change in species abundance data to measure the level of biodiversity conservation. Yet for many areas, long-term species data are not available and thus it is necessary to use biodiversity indices to monitor the effect of land use (LU) changes or the impact of protected area establishment. Poyang Lake wetland is one of the most important wintering sites for migratory water birds on the East Asian–Australasian flyway. To protect this habitat, 14 nature reserves were created in the region between 1997 and 2003. This paper aims to assess the effect of nature reserve creation on the status of habitat for overwintering water birds in Poyang Lake wetland by analysing LU and land cover data from 1995, 2005 and 2015. We developed a composite biodiversity index to search for current biodiversity hotspots (conservation priority) in the study area. An integrated approach consisting of the Integrated Valuation of Ecosystem Services and Trade-offs model, GIS, fragment analysis and hotspot analysis was used to realize our objective. Our results showed that the creation of the nature reserve had positive effects on overwintering water bird habitat. However, tremendous changes (such as change of habitat area, quality and fragmentation) within and outside the nature reserve showed that the role of protected area still needs to be further discussed. Moreover, regional synthesis LU management plans such as ecological restoration should be carried out. The results of the habitat assessment also indicate that a comprehensive biodiversity index framework based on net primary productivity, habitat connectivity and habitat quality could be more efficient in assessing biodiversity and defining a reasonable protected area, from data obtain in large scale perspective.Program for BINGWEI Excellent Young Talents of Institute of Geographic Sciences and Natural Resources Research, Chinese Academy of SciencesNatural Sciences Foundation of ChinaPeer Reviewe

    Investigation of intraocular pressure fluctuation as a risk factor of glaucoma progression

    Get PDF
    Purpose: Since the role of short- and long-term intraocular pressure (IOP) fluctuation as a predictor of glaucoma progression is still controversial, the purpose of this study was to investigate the role of IOP fluctuation in a non-selected patient cohort. Materials and methods: Two-hundred and forty eyes of 120 glaucoma patients (51% female) with a mean age of 64.5 years were included. Inclusion criteria were at least a visual field (VF) and a 48-hour diurnal phasing of IOP including nocturnal measurement. Glaucoma Progression was defined as – if available – confirmed progression of reproducible VF defects in at least three VF examinations or increase of cup area on optic nerve imaging (Heidelberg Retina Tomograph [HRT]) with at least two images after baseline. If results were stable or less than previously mentioned VF or HRT examinations were available, it was classified as “no progression”. Results: Glaucoma progression was seen in seven of 240 eyes in the VF analysis and ten of 240 eyes on HRT. Of all 240 eyes, 92 and 41 eyes fulfilled the criteria to be included for progression evaluation on VF and HRT analysis, respectively. Mean time to progression ± standard error was 3.6±0.2 years on VF and 4.5±0.3 years on HRT. Univariate and multivariate Cox regression analyses revealed short-term IOP fluctuation (P,0.0001) and maximum IOP (P,0.001) as risk factors for glaucoma progression on VF. There was no significant influence of demographic characteristics, ocular or general health on glaucoma progression. Conclusion: Short-term IOP fluctuation was associated with the progression of glaucoma in this non-selected cohort of glaucoma patients receiving phasing of IOP. Keywords: glaucoma progression, short-term IOP fluctuation, long-term IOP fluctuation, glaucoma imaging, visual fiel
    • 

    corecore