1,204 research outputs found
Rank-Based Analysis of Linear Models Using R
It is well-known that Wilcoxon procedures out perform least squares procedures when the data deviate from normality and/or contain outliers. These procedures can be generalized by introducing weights; yielding so-called weighted Wilcoxon (WW) techniques. In this paper we demonstrate how WW-estimates can be calculated using an L1 regression routine. More importantly, we present a collection of functions that can be used to implement a robust analysis of a linear model based on WW-estimates. For instance, estimation, tests of linear hypotheses, residual analyses, and diagnostics to detect differences in fits for various weighting schemes are discussed. We analyze a regression model, designed experiment, and autoregressive time series model for the sake of illustration. We have chosen to implement the suite of functions using the R statistical software package. Because R is freely available and runs on multiple platforms, WW-estimation and associated inference is now universally accessible.
Rank-Based Analysis of Linear Models Using R
It is well-known that Wilcoxon procedures out perform least squares procedures when the data deviate from normality and/or contain outliers. These procedures can be generalized by introducing weights; yielding so-called weighted Wilcoxon (WW) techniques. In this paper we demonstrate how WW-estimates can be calculated using an L1 regression routine. More importantly, we present a collection of functions that can be used to implement a robust analysis of a linear model based on WW-estimates. For instance, estimation, tests of linear hypotheses, residual analyses, and diagnostics to detect differences in fits for various weighting schemes are discussed. We analyze a regression model, designed experiment, and autoregressive time series model for the sake of illustration. We have chosen to implement the suite of functions using the R statistical software package. Because R is freely available and runs on multiple platforms, WW-estimation and associated inference is now universally accessible
More than fear induction: Toward an understanding of people's motivation to be well-prepared for emergencies in flood prone areas
This article examines the extent and manner to which evaluations of flood-related precautions are affected by an individual's motivation and perception of context. It argues that the relationship between risk perception and flood risk preparedness can be fruitfully specified in terms of vulnerability and efficacy if these concepts are put into the perspective of prevention-focused motivation. This relationship was empirically examined in a risk communication experiment in a delta area of the Netherlands (n = 1,887). Prevention-focused motivation was induced by contextualized risk information. The results showed that prevention-focused individuals were more sensitive to the relevance of potential precautions for satisfying their needs in the context they found themselves in. The needs included, but were not limited to, fear reduction. Due to the heterogeneity of the residents, the evaluations reflected individual differences in the intensity and the selectivity of precautionary processes. Four types of persons could be distinguished according to their evaluation of precautionary measures: a high-scoring minority, two more selective types, and a low-scoring minority. For policymakers and risk communicators it is vital to consider the nature of prevention motivation and the context in which it is likely to be high
Detecting time-fragmented cache attacks against AES using Performance Monitoring Counters
Cache timing attacks use shared caches in multi-core processors as side
channels to extract information from victim processes. These attacks are
particularly dangerous in cloud infrastructures, in which the deployed
countermeasures cause collateral effects in terms of performance loss and
increase in energy consumption. We propose to monitor the victim process using
an independent monitoring (detector) process, that continuously measures
selected Performance Monitoring Counters (PMC) to detect the presence of an
attack. Ad-hoc countermeasures can be applied only when such a risky situation
arises. In our case, the victim process is the AES encryption algorithm and the
attack is performed by means of random encryption requests. We demonstrate that
PMCs are a feasible tool to detect the attack and that sampling PMCs at high
frequencies is worse than sampling at lower frequencies in terms of detection
capabilities, particularly when the attack is fragmented in time to try to be
hidden from detection
Thematically analysing social network content during disasters through the lens of the disaster management lifecycle
Social Networks such as Twitter are often used for disseminating and collecting information during natural disasters. The potential for its use in Disaster Management has been acknowledged. However, more nuanced understanding of the communications that take place on social networks are required to more effectively integrate this information into the processes within disaster management. The type and value of information shared should be assessed, determining the benefits and issues, with credibility and reliability as known concerns. Mapping the tweets in relation to the modelled stages of a disaster can be a useful evaluation for determining the benefits/drawbacks of using data from social networks, such as Twitter, in disaster management.A thematic analysis of tweets' content, language and tone during the UK Storms and Floods 2013/14 was conducted. Manual scripting was used to determine the official sequence of events, and classify the stages of the disaster into the phases of the Disaster Management Lifecycle, to produce a timeline. Twenty-five topics discussed on Twitter emerged, and three key types of tweets, based on the language and tone, were identified. The timeline represents the events of the disaster, according to the Met Office reports, classed into B. Faulkner's Disaster Management Lifecycle framework. Context is provided when observing the analysed tweets against the timeline. This illustrates a potential basis and benefit for mapping tweets into the Disaster Management Lifecycle phases. Comparing the number of tweets submitted in each month with the timeline, suggests users tweet more as an event heightens and persists. Furthermore, users generally express greater emotion and urgency in their tweets.This paper concludes that the thematic analysis of content on social networks, such as Twitter, can be useful in gaining additional perspectives for disaster management. It demonstrates that mapping tweets into the phases of a Disaster Management Lifecycle model can have benefits in the recovery phase, not just in the response phase, to potentially improve future policies and activities
High Latitude Dynamics of Atmosphere-Ice-Ocean Interactions
Dynamics of atmosphere–ice–ocean interactions in the high latitudes. What: Scientists from 13 countries involved with modeling and observing the coupled high-latitude weather and climate system discussed our current understanding and challenges in polar prediction, extreme events, and coupled processes on scales ranging from cloud and turbulent processes, from micrometers and a few hundred meters to processes on synoptic-scale weather phenomena and pan-Arctic energy budgets of hundreds to thousands of kilometers. Workshop participants also evaluated research needs to improve numerical models with usages spanning from uncoupled to fully coupled models used for weather and climate prediction (http://highlatdynamics.b.uib.no/). When: 23–27 March 2015. Where: Rosendal, Norwa
Andreev reflection at QGP/CFL interface
In this letter we address the question of the phenomena of Andreev reflection
between the cold quark-gluon plasma phase and CFL color superconductor. We show
that there are two different types of reflections connected to the structure of
the CFL phase. We also calculate the probability current at the interface and
we show that it vanishes for energy of scattering quarks below the
superconducting gap.Comment: 6 pages, 1 figure. Minor changes in the "Conclusions
- …
