27,829 research outputs found
Issues of scale for environmental indicators
The value of environmental indicators largely depends upon the spatial and temporal scale that they represent. Environmental indicators are dependent upon data availability and also upon the scale for which statements are required. As these may not match, changes in scales may be necessary. In this paper a geostatistical approach to analyse quantitative environmental indicators has been used. Scales, defined in terms of resolution and procedures, are presented to translate data from one scale to another: upscaling to change from high resolution data towards a low resolution, and downscaling for the inverse process. The study is illustrated with three environmental indicators. The first concerns heavy metals in the environment, where the zinc content is used as the indicator. Initially, data were present at a 1km2 resolution, and were downscaled to 1m2 resolution. High resolution data collected later showed a reasonable correspondence with the downscaled data. Available covariates were also used. The second example is from the Rothamstedâs long-term experiments. Changes in scale are illustrated by simulating reduced data sets from the full data set on grass cuts. A simple regression model related the yield from these condcut to that of the first cut in the cropping season. Reducing data availability (upscaling) resulted in poor estimates of the regression coefficients. The final example is on nitrate surpluses on Danish farms. Data at the field level are upscaled to the farm level, and the dispersion variance indicates differences between different farms. Geostatistical methods were useful to define, change and determine the most appropriate scales for environmental variables in space and in time
Mechanism of spontaneous formation of stable magnetic structures on the Sun
One of the puzzling features of solar magnetism is formation of long-living
compact magnetic structures; such as sunspots and pores, in the highly
turbulent upper layer of the solar convective zone. We use realistic radiative
3D MHD simulations to investigate the interaction between magnetic field and
turbulent convection. In the simulations, a weak vertical uniform magnetic
field is imposed in a region of fully developed granular convection; and the
total magnetic flux through the top and bottom boundaries is kept constant. The
simulation results reveal a process of spontaneous formation of stable magnetic
structures, which may be a key to understanding of the magnetic
self-organization on the Sun and formation of pores and sunspots. This process
consists of two basic steps: 1) formation of small-scale filamentary magnetic
structures associated with concentrations of vorticity and whirlpool-type
motions, and 2) merging of these structures due to the vortex attraction,
caused by converging downdrafts around magnetic concentration below the
surface. In the resulting large-scale structure maintained by the converging
plasma motions, the magnetic field strength reaches ~1.5 kG at the surface and
~6 kG in the interior; and the surface structure resembles solar pores. The
magnetic structure remains stable for the whole simulation run of several hours
with no sign of decay.Comment: 13 pages, 4 figures, submitted to the Astrophysical Journa
Flexible Service Provisioning with Advance Agreements
In this paper, we develop a novel algorithm that allows service consumer agents to automatically select and provision service provider agents for their workflows in highly dynamic and uncertain computational service economies. In contrast to existing work, our algorithm reasons explicitly about the impact of failures on the overall feasibility of a workflow, and it mitigates them by proactively provisioning multiple providers in parallel for particularly critical tasks and by explicitly planning for contingencies. Furthermore, our algorithm provisions only part of its workflow at any given time, in order to retain flexibility and to decrease the potential for missing negotiated service time slots. We show empirically that current approaches are unable to achieve a high utility in such uncertain and dynamic environments; whereas our algorithm consistently outperforms them over a range of environments. Specifically, our approach can achieve up to a 27-fold increase in utility and successfully completes most workflows within a strict deadline, even when the majority of providers do not honour their contracts
Sensitivity Analysis of Flexible Provisioning
This technical report contains a sensitivity analysis to extend our previous work. We show that our flexible service provisioning strategy is robust to inaccurate performance information (when the available information is within 10% of the true value), and that it degrades gracefully as the information becomes less accurate. We also identify and discuss one particular case where inaccurate information may lead to undesirable losses in highly unreliable environments
An Effective Strategy for the Flexible Provisioning of Service Workflows
Recent advances in service-oriented frameworks and semantic Web technologies have enabled software agents to discover and invoke resources over large distributed systems, in order to meet their high-level objectives. However, most work has failed to acknowledge that such systems are complex and dynamic multi-agent systems, where service providers act autonomously and follow their own decision-making procedures. Hence, the behaviour of these providers is inherently uncertain - services may fail or take uncertain amounts of time to complete. In this work, we address this uncertainty and take an agent-oriented approach to the problem of provisioning service providers for the constituent tasks of abstract workflows. Specifically, we describe an algorithm that uses redundancy to deal with unreliable providers, and we demonstrate that it achieves an 8-14% improvement in average utility over previous work, while performing up to 6 times as well as approaches that do not consider service uncertainty. We also show that our algorithm performs well in the presence of inaccurate service performance information
The Evolution of Buyout Pricing and Financial Structure
This paper presents evidence on systematic changes in the pricing and financial structure of 124 large management buyouts completed between 1980 and 1989. We find that over tine (1) prices increased relative to current cash flows with no accompanying decrease in risk or increase in projected future cash flows; (2) required bank principal repayments accelerated, leading to sharply lower ratios of cash flow to total debt obligations; (3) private subordinated debt was replaced by public debt while the use of strip-financing techniques declined; and (4) management teams invested a smaller fraction of their net worth in post-buyout equity. These patterns of buyout prices and structures suggest that based on ex ante data, one could have expected lower returns and more frequent financial distress in later buyouts. Preliminary post-buyout evidence is consistent with this interpretation.
Breaking the habit: measuring and predicting departures from routine in individual human mobility
Researchers studying daily life mobility patterns have recently shown that humans are typically highly predictable in their movements. However, no existing work has examined the boundaries of this predictability, where human behaviour transitions temporarily from routine patterns to highly unpredictable states. To address this shortcoming, we tackle two interrelated challenges. First, we develop a novel information-theoretic metric, called instantaneous entropy, to analyse an individualâs mobility patterns and identify temporary departures from routine. Second, to predict such departures in the future, we propose the first Bayesian framework that explicitly models breaks from routine, showing that it outperforms current state-of-the-art predictor
Confirming what we know: Understanding questionable research practices in intro physics labs
Many institutions are changing the focus of their introductory physics labs
from verifying physics content towards teaching students about the skills and
nature of science. As instruction shifts, so too will the ways students
approach and behave in the labs. In this study, we evaluated students' lab
notes from an early activity in an experimentation-focused lab course. We found
that about 30% of student groups (out of 107 groups at three institutions)
recorded questionable research practices in their lab notes, such as subjective
interpretations of results or manipulating equipment and data. The large
majority of these practices were associated with confirmatory goals, which we
suspect stem from students' prior exposure to verification labs. We propose
ways for experimentation-focused labs to better engage students in the
responsible conduct of research and authentic scientific practice.Comment: 4 pages, 4 figure
Permanents of cyclic (0,1) matrices
AbstractAn efficient method is presented for evaluating the permanents Pnk of cyclic (0,1) matrices of dimension n and common row and column sum k. A general method is developed for finding recurrence rules for Pnk (k fixed); the recurrence rules are given in semiexplicit form for the range 4â€kâ€9. A table of Pnk is included for the range 4â€kâ€9, kâ€nâ€80. The Pnk are calculated in the formPnk=2+âÏâ1[kâ12]TÏk(n)where the Ttk(n) satisfy recurrence rules given symbolically by the characteristic equations of certain (0, 1) matrices Î rk; the latter turn out to be identical with the r-th permanental compounds of certain simpler matrices Î 1k. Finally, formal expressions for Pnk are given which allow one to write down the solution to the generalized MĂ©nage Problem in terms of sums over scalar products of the iterates of a set of unit vectors
On finite limit sets for transformations on the unit interval
AbstractAn infinite sequence of finite or denumerable limit sets is found for a class of many-to-one transformations of the unit interval into itself. Examples of four different types are studied in some detail; tables of numerical results are included. The limit sets are characterized by certain patterns; an algorithm for their generation is described and established. The structure and order of occurrence of these patterns is universal for the class
- âŠ