1,204 research outputs found

    Rank-Based Analysis of Linear Models Using R

    Get PDF
    It is well-known that Wilcoxon procedures out perform least squares procedures when the data deviate from normality and/or contain outliers. These procedures can be generalized by introducing weights; yielding so-called weighted Wilcoxon (WW) techniques. In this paper we demonstrate how WW-estimates can be calculated using an L1 regression routine. More importantly, we present a collection of functions that can be used to implement a robust analysis of a linear model based on WW-estimates. For instance, estimation, tests of linear hypotheses, residual analyses, and diagnostics to detect differences in fits for various weighting schemes are discussed. We analyze a regression model, designed experiment, and autoregressive time series model for the sake of illustration. We have chosen to implement the suite of functions using the R statistical software package. Because R is freely available and runs on multiple platforms, WW-estimation and associated inference is now universally accessible.

    Rank-Based Analysis of Linear Models Using R

    Get PDF
    It is well-known that Wilcoxon procedures out perform least squares procedures when the data deviate from normality and/or contain outliers. These procedures can be generalized by introducing weights; yielding so-called weighted Wilcoxon (WW) techniques. In this paper we demonstrate how WW-estimates can be calculated using an L1 regression routine. More importantly, we present a collection of functions that can be used to implement a robust analysis of a linear model based on WW-estimates. For instance, estimation, tests of linear hypotheses, residual analyses, and diagnostics to detect differences in fits for various weighting schemes are discussed. We analyze a regression model, designed experiment, and autoregressive time series model for the sake of illustration. We have chosen to implement the suite of functions using the R statistical software package. Because R is freely available and runs on multiple platforms, WW-estimation and associated inference is now universally accessible

    More than fear induction: Toward an understanding of people's motivation to be well-prepared for emergencies in flood prone areas

    Get PDF
    This article examines the extent and manner to which evaluations of flood-related precautions are affected by an individual's motivation and perception of context. It argues that the relationship between risk perception and flood risk preparedness can be fruitfully specified in terms of vulnerability and efficacy if these concepts are put into the perspective of prevention-focused motivation. This relationship was empirically examined in a risk communication experiment in a delta area of the Netherlands (n = 1,887). Prevention-focused motivation was induced by contextualized risk information. The results showed that prevention-focused individuals were more sensitive to the relevance of potential precautions for satisfying their needs in the context they found themselves in. The needs included, but were not limited to, fear reduction. Due to the heterogeneity of the residents, the evaluations reflected individual differences in the intensity and the selectivity of precautionary processes. Four types of persons could be distinguished according to their evaluation of precautionary measures: a high-scoring minority, two more selective types, and a low-scoring minority. For policymakers and risk communicators it is vital to consider the nature of prevention motivation and the context in which it is likely to be high

    Detecting time-fragmented cache attacks against AES using Performance Monitoring Counters

    Get PDF
    Cache timing attacks use shared caches in multi-core processors as side channels to extract information from victim processes. These attacks are particularly dangerous in cloud infrastructures, in which the deployed countermeasures cause collateral effects in terms of performance loss and increase in energy consumption. We propose to monitor the victim process using an independent monitoring (detector) process, that continuously measures selected Performance Monitoring Counters (PMC) to detect the presence of an attack. Ad-hoc countermeasures can be applied only when such a risky situation arises. In our case, the victim process is the AES encryption algorithm and the attack is performed by means of random encryption requests. We demonstrate that PMCs are a feasible tool to detect the attack and that sampling PMCs at high frequencies is worse than sampling at lower frequencies in terms of detection capabilities, particularly when the attack is fragmented in time to try to be hidden from detection

    Gebruik en effecten van NL‐Alert

    Get PDF

    Thematically analysing social network content during disasters through the lens of the disaster management lifecycle

    No full text
    Social Networks such as Twitter are often used for disseminating and collecting information during natural disasters. The potential for its use in Disaster Management has been acknowledged. However, more nuanced understanding of the communications that take place on social networks are required to more effectively integrate this information into the processes within disaster management. The type and value of information shared should be assessed, determining the benefits and issues, with credibility and reliability as known concerns. Mapping the tweets in relation to the modelled stages of a disaster can be a useful evaluation for determining the benefits/drawbacks of using data from social networks, such as Twitter, in disaster management.A thematic analysis of tweets' content, language and tone during the UK Storms and Floods 2013/14 was conducted. Manual scripting was used to determine the official sequence of events, and classify the stages of the disaster into the phases of the Disaster Management Lifecycle, to produce a timeline. Twenty-five topics discussed on Twitter emerged, and three key types of tweets, based on the language and tone, were identified. The timeline represents the events of the disaster, according to the Met Office reports, classed into B. Faulkner's Disaster Management Lifecycle framework. Context is provided when observing the analysed tweets against the timeline. This illustrates a potential basis and benefit for mapping tweets into the Disaster Management Lifecycle phases. Comparing the number of tweets submitted in each month with the timeline, suggests users tweet more as an event heightens and persists. Furthermore, users generally express greater emotion and urgency in their tweets.This paper concludes that the thematic analysis of content on social networks, such as Twitter, can be useful in gaining additional perspectives for disaster management. It demonstrates that mapping tweets into the phases of a Disaster Management Lifecycle model can have benefits in the recovery phase, not just in the response phase, to potentially improve future policies and activities

    High Latitude Dynamics of Atmosphere-Ice-Ocean Interactions

    Get PDF
    Dynamics of atmosphere–ice–ocean interactions in the high latitudes. What: Scientists from 13 countries involved with modeling and observing the coupled high-latitude weather and climate system discussed our current understanding and challenges in polar prediction, extreme events, and coupled processes on scales ranging from cloud and turbulent processes, from micrometers and a few hundred meters to processes on synoptic-scale weather phenomena and pan-Arctic energy budgets of hundreds to thousands of kilometers. Workshop participants also evaluated research needs to improve numerical models with usages spanning from uncoupled to fully coupled models used for weather and climate prediction (http://highlatdynamics.b.uib.no/). When: 23–27 March 2015. Where: Rosendal, Norwa

    Andreev reflection at QGP/CFL interface

    Full text link
    In this letter we address the question of the phenomena of Andreev reflection between the cold quark-gluon plasma phase and CFL color superconductor. We show that there are two different types of reflections connected to the structure of the CFL phase. We also calculate the probability current at the interface and we show that it vanishes for energy of scattering quarks below the superconducting gap.Comment: 6 pages, 1 figure. Minor changes in the "Conclusions
    corecore