Academic literature on the topic 'REDD+ Scheme'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'REDD+ Scheme.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "REDD+ Scheme"

1

Hjort, Mattias. "Who should be governed to reduce deforestation and how? Multiple governmentalities at the REDD+ negotiations." Environment and Planning C: Politics and Space 38, no. 1 (April 5, 2019): 134–52. http://dx.doi.org/10.1177/2399654419837298.

Full text
Abstract:
Drawing on recent multiple governmentality literature, this article analyses the REDD+ negotiations to interrogate who the scheme is likely to govern and how. Two arguments are advanced. First, REDD+ is likely to target local forest users at the expense of both corporate and international drivers of deforestation. This will reduce the effectiveness of the scheme and invite leakage issues. In elucidating the ultimately rejected strategies for addressing international drivers now hidden in neat negotiation outcomes, this article opens a space for considering how the scheme could move beyond a predominant focus on local forest users. Second, targeted forest users are likely to be governed by a combination of neoliberal and disciplinary technologies. REDD+ will seek to ‘improve’ their conduct through a three-staged process involving education, self-reflection and rewards for carbon sequestration. An alternative governmentality associated with local forest users’ claims to decide on REDD+ implementation and governance, on the other hand, met with resistance and ultimately received no protection in the adopted REDD+ safeguards. Moreover, the formulation of the safeguards could undermine legitimacy and forest stewardship in REDD+ projects. By linking the possibility of such issues to the negotiation outcomes, this article demonstrates necessary changes to the scheme.
APA, Harvard, Vancouver, ISO, and other styles
2

Hook, Andrew. "Following REDD+: Elite agendas, political temporalities, and the politics of environmental policy failure in Guyana." Environment and Planning E: Nature and Space 3, no. 4 (September 20, 2019): 999–1029. http://dx.doi.org/10.1177/2514848619875665.

Full text
Abstract:
This article follows the journey of Guyana’s Reducing Emissions from Deforestation and Forest Degradation (REDD+) programme, from its promising emergence in 2009 as an ambitious, Norway-funded scheme worth US$250m to its near-abandonment by all actors ten years later. It is based on primary fieldwork conducted in Guyana in 2016 and 2017 and a deep review of the theoretical and empirical literature on REDD+ policy processes and the Norway–Guyana agreement. The article shows how, contrary to the mainstream understanding of environmental policy as a disinterested search for a rational, scientific solution, decisions governing REDD+ policy in Guyana were rather shaped throughout by the political objectives and calculations of a small number of opportunistic elite actors. It further shows how even the modest incarnation of REDD+ in Guyana (which ended up resembling more of a results-based aid programme than a Payment for Ecosystem Services scheme) was continually affected by political factors beyond the control of policy managers. These included fluctuations in the world gold price that led to an increase in mining activity and deforestation, the departure of a key international investor which caused the collapse of the flagship REDD+-funded Amaila Falls hydropower project, and legislative gridlock in Guyana generated by a hung Parliament. While not suggesting that REDD+ (or similar Payment for Ecosystem Services schemes) can never work, the article nonetheless illustrates the ways in which political objectives and unforeseen events can overwhelm substantive policy efforts towards fighting climate change. The findings also illustrate the dangers of prioritizing short-term ‘success stories’ over longer-term and more consultative environmental policy processes.
APA, Harvard, Vancouver, ISO, and other styles
3

Sheng, Jichuan. "Effect of Uncertainties in Estimated Carbon Reduction from Deforestation and Forest Degradation on Required Incentive Payments in Developing Countries." Sustainability 9, no. 9 (September 9, 2017): 1608. http://dx.doi.org/10.3390/su9091608.

Full text
Abstract:
For reducing emissions from deforestation and forest degradation (REDD+) programs, it is particularly important that monitoring for emission reductions is tied to the revenues a developing country receives from REDD+ projects; any estimated uncertainties will have significant impacts on the emission reduction estimation and incentive scheme of REDD+. However, the effects of estimated uncertainties on incentives for developing countries have not been deeply discussed in the current literature. To fill this gap, two estimation approaches for emission reductions are introduced by considering the incentive coefficient by the principle of reliable minimum estimation. The relationship between estimated uncertainties and incentive coefficient is simulated to illustrate the effects of estimated uncertainties on the emission reduction estimation and incentive scheme. Data from six tropical developing countries are used, including Nigeria, Honduras, Indonesia, Cambodia, Ghana, and Brazil. The results indicate that both the errors of referential and actual carbon stock must be considered when estimating and predicting emission reductions. The effects of the error of actual carbon stock on the emission reduction estimation and incentive coefficient were determined to be more influential. The current incentive scheme was more favorable to developing countries with high carbon stock variability, while developing countries with low carbon stock variability had insufficient incentives to implement REDD+ project.
APA, Harvard, Vancouver, ISO, and other styles
4

Goodman, James, and Ellen Roberts. "Is the United Nations' REDD scheme conservation colonialism by default?" International Journal of Water 5, no. 4 (2010): 419. http://dx.doi.org/10.1504/ijw.2010.038733.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Musthafa, I. Z. F., and Youn Y-C. "Motivation and factors affecting Indigenous People's willingness to participate in future REDD+ project activities: the case of Tagal Hutan in Sabah, Malaysia." International Forestry Review 24, no. 3 (September 1, 2022): 411–25. http://dx.doi.org/10.1505/146554822835941904.

Full text
Abstract:
The Kadazandusun people of Sabah have practiced traditional forest management of tagal hutan or prohibited forests. An official development assistance (ODA) project under REDD+ implementation scheme targets tagal hutan forests in Sabah, with the participation of the indigenous people. Through the theory of planned behaviour, this study assesses the link between attitude, social norms, customary norms, and perceived behaviour control on Kadazandusun people's intentions to participate in future REDD+ project activities. We found out that attitude and perceived behaviour control affect intentions to participate in future REDD+ project activities meanwhile social norm and customary norm were otherwise. Socio-demographic factors, such as household size, age, and prior experience as leaders or committee members in the village, also influence the intentions to participate in future REDD+ project activities. This study may help predict the acceptance of REDD+ activities among indigenous people in Sabah and help design more effective REDD+ projects.
APA, Harvard, Vancouver, ISO, and other styles
6

Asiyanbi, Adeniyi, and Kate Massarella. "Transformation is what you expect, models are what you get: REDD+ and models in conservation and development." Journal of Political Ecology 27, no. 1 (May 6, 2020): preprint. http://dx.doi.org/10.2458/v27i1.23540.

Full text
Abstract:
Models increasingly pervade conservation and development practice – model policies, model countries, model regions, model states, model projects, model villages, model communities and so on. These are idealized, bounded, miniature entities that seek to demonstrate the efficacy of a more substantive policy, scheme or intervention. Although political ecologists and critical scholars have analyzed models in specific interventions, there has been relatively little reflection on the common logics central to models more generally. Drawing on critical conservation and development literature and in-depth case studies of REDD+ in Tanzania and Nigeria, we identify and elaborate three core model logics: 1) problematization of the field of intervention and valorization of microcosms within it; 2) isolation and bounding which seek to order complexity and etch microcosms in space and time; 3) enrolment of actors. Although ambitious and transformational in its claims and aspirations, REDD+ has thus far manifested as an extensive network of models across socio-political scales. We argue that idealized REDD+ models enable proponents to demonstrate and 'sell' REDD+ as a 'successful' intervention, thereby allowing the scheme to persist in policy circles in spite of its failures on the ground and its lack of viability at scale. We therefore argue that models often become an end in themselves, paradoxically failing to herald the transformational intervention they were originally meant to epitomize.Keywords: Conservation, development, models, Nigeria, Tanzania, REDD+
APA, Harvard, Vancouver, ISO, and other styles
7

Sheng, Jichuan, You Wu, Mingyang Zhang, and Zhuang Miao. "An evolutionary modeling approach for designing a contractual REDD+ payment scheme." Ecological Indicators 79 (August 2017): 276–85. http://dx.doi.org/10.1016/j.ecolind.2017.04.010.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Figuières, Charles. "The REDD Scheme to Curb Deforestation: A Well-designed System of Incentives?" Strategic Behavior and the Environment 2, no. 3 (September 17, 2012): 239–57. http://dx.doi.org/10.1561/102.00000017.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Susanti, Delvia, and Adiasri Purbantina. "Diplomasi Lingkungan Norwegia kepada Indonesia: Analisis Skema REDD+ tahun 2015-2020." PROCEEDING INTERNATIONAL RELATIONS ON INDONESIAN FOREIGN POLICY CONFERENCE 1, no. 1 (December 2, 2021): 73–88. http://dx.doi.org/10.33005/irofonic.v1i1.14.

Full text
Abstract:
Environmental issues have become a fairly important topic of discussion in the last few decades. These environmental issues have attracted a lot of attention from local to global levels. REDD + contains measures designed to reduce greenhouse gas emissions due to deforestation and forest degradation in the presence of financial incentives. In environmental diplomacy between Indonesia and Norway, the REDD + scheme aims to reduce pollution levels according to targets and within a certain time period. In analyzing Norway's environmental policy and its involvement in global environmental cooperation, market-based environmental policy instruments can be used. In market-based environmental policy instruments there is a carbon trading mechanism to evaluate the REDD + mechanism in 2015-2020. REDD + implementation in Indonesia is carried out with the existence of a carbon market that uses a cap and trade mechanism, which results in the form of carbon credits that can be disbursed into financial incentives. The funds can be used to reduce deforestation and forest degradation, as well as for the conversion of peatlands in Indonesia.
APA, Harvard, Vancouver, ISO, and other styles
10

Apriwan and S. Anita Afriani. "Local Readiness Towards REDD+ UNFCCC Scheme (Study in Province of West Sumatera Indonesia)." Procedia Environmental Sciences 28 (2015): 649–56. http://dx.doi.org/10.1016/j.proenv.2015.07.076.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "REDD+ Scheme"

1

Jaimes, Luz Marina Santos. "A privacy-preserving reputation scheme for trust management on VANETs applications." Universidade de São Paulo, 2017. http://www.teses.usp.br/teses/disponiveis/55/55134/tde-14112017-084229/.

Full text
Abstract:
Vehicles will use pseudonyms instead of relying on long-term certificates to provide security and privacy. Pseudonyms are short-term public key certificates that do not contain identity-linking information about the vehicle. However, there is a constant risk that authorised vehicles may send fake messages or behave selfishly, and this can affect the performance of the Vehicular Ad hoc NETwork (VANET). In this context, trust management is another important component of security services in VANETs, which provides a unified system for establishing a relationship between the nodes and helps by keeping record of the behaviour of the vehicles. Nevertheless, it is a challenging task to monitor the evolving pattern of the vehicular behaviour, since communication between the vehicles is anonymous. It is not easy to find a balanced solution that meets the requirements of security, privacy, and trust management in VANET. In view of this, we put forward a Preserving-Privacy Reputation Scheme (PPRS) applied to VANETs, in which a reputation server through a Roadside Unit receives feedback about the behaviour of the vehicles. The server updates and certifies the reputation of the vehicles by matching their anonymous identities with their real ones. Our scheme introduces geographical areas of security, in which the security of an area can be adapted to higher or lower levels depending on the reputation of the vehicles. In addition, complex reputation is examined, in which the reputation of a vehicle is linked to several behavioural factors. A further key area that is explored is the performance evaluation of PPRS which is conducted through a set of simulations in a grid scenario, based on an opportunistic message forwarding application. The results showed the effectiveness of PPRS in terms of assessing the behaviour of the vehicles and taking measures against the misbehaving vehicles. We used SUMO to simulate the mobility model; OMNET++ and Veins supported the simulation of the network model. In addition, Crypto++ was used to implement the elliptical curve cryptographic functions of signature and verification of messages, as recommended by the security standards. Finally, we employ a pseudonym changing strategy in which the reputation is discretised at two levels of reputation. The strategy was implemented in a realistic traffic simulation scenario, and was compared with the so called status and synchronous strategies through a serie of simulations. The results showed that the number of pseudonyms used in our strategy is lower than the strategies mentioned above, and maintains the rate of success of changing pseudonym achieved by the synchronous strategy.
Os veículos usarão pseudônimos em vez de certificados de longo prazo para fornecer segurança e privacidade. Os pseudônimos são certificados de chaves públicas de curto prazo que não contêm informação da identidade do veículo. No entanto, existe risco que veículos autorizados possam enviar mensagens falsas ou se comportar de maneira egoísta, e isso pode afetar o desempenho das redes veiculares (VANETs). Nesse contexto, o gerenciamento de confiança é um importante serviço de segurança nas VANETs, o qual fornece um sistema unificado para estabelecer relações entre os nós e ajuda a manter um registro do comportamento dos veículos. No entanto, é uma tarefa desafiante monitorar o padrão evolutivo do comportamento veicular, já que a comunicação entre os veículos é anônima. Não é uma tarefa fácil encontrar uma solução equilibrada que atenda aos requisitos de segurança, privacidade e gerenciamento de confiança em VANET. Em vista disso, apresentamos um Esquema de Reputação Preservando a Privacidade (ERPP) aplicado a VANETs, no qual um servidor de reputação através de uma unidade de acostamento recebe avaliações sobre o comportamento dos veículos. O servidor atualiza e certifica a reputação dos veículos relacionando seus identidades anônimas com as reais. ERPP introduz áreas geográficas de segurança, na qual a segurança de uma área pode ser adaptada a níveis mais elevados ou mais baixos dependendo da reputação dos veículos. Além, uma reputação complexa é examinada, na qual a reputação de um veículo está vinculada a vários fatores do comportamento. Uma outra área que é explorada é a avaliação de desempenho do ERPP o qual é conduzida através de simulações em um cenário urbano, com base na aplicação de encaminhamento oportunista de mensagens. Os resultados mostraram a eficácia do ERPP em termos de avaliar o comportamento dos veículos e tomar medidas contra os veículos mal comportados. Utilizamos SUMO para simular o modelo de mobilidade; OMNET++ e Veins suportaram o modelo de red; and Crypto++ foi usado para implementar as funções criptográficas de curvas elípticas de assinatura e verificação de mensagens como recomendam os padrões de segurança. Finalmente, empregamos uma estratégia de mudança de pseudônimo na qual a reputação é discretizada em dois níveis de reputação. A estratégia foi implementada em um cenário de simulação de tráfego realista e foi comparada com as estratégias nomeadas de estado e síncrona mediante simulações. Os resultados mostraram que o número de pseudônimos utilizados em nossa estratégia é menor que os esquemas mencionados, e mantém a taxa de sucesso de mudança de pseudônimo alcançada pela estratégia síncrona.
APA, Harvard, Vancouver, ISO, and other styles
2

Soverini, Davide. "Development of testing procedures for the πLUP read-out board." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2018. http://amslaurea.unibo.it/17044/.

Full text
Abstract:
Durante i prossimi anni, un gran numero di laboratori saranno impegnati in un programma di upgrade dei principali esperimenti al Large Hadron Collider (LHC), chiamato upgrade Fase-II. L’Istituto Nazionale di Fisica Nucleare (INFN) e il gruppo A Toroidal LHC Apparatus (ATLAS) di Bologna hanno sviluppato un prototipo di una nuova scheda chiamata PIxel detector high Luminosity UPgrade (PILUP), la quale é una possibile candidata per il rinnovamento del sistema Data AQuisition (DAQ) di ATLAS. Le principali caratteristiche di questa scheda sono il processore installato (dual-core ARM), la enorme larghezza di banda di comunicazione (fino a 60 Gbps tramite fibre ottiche) e la comunicazione con il PC tramite bus PCIe dedicato di seconda generazione. Durante il mio lavoro di tesi, ho disegnato e sviluppato un sistema di test pensato per valutare i componenti della scheda e una procedura di test automatizzata, controllata da remoto da un programma software, per valutare la qualitá delle connessioni veloci. I test dimostrano che la PiLUP soddisfa tutti i requisiti in termini di affidabilitá della trasmissione dati con alcune precisazioni. Sebbene la PiLUP é stata progettata per soddisfare un compito specifico, é altamente versatile e potrebbe adattarsi a diverse applicazioni: la piú importante é la capacitá di gestire la comunicazione con la scheda principale dell’upgrade DAQ di ATLAS, la Front-End LInk eXchange (FELIX), utilizzando diversi protocolli di comunicazione (GigaBit Transceiver e Full-Mode). Questo é stato il primo passo della collaborazione internazionale con il gruppo FELIX iniziato nel luglio 2017: i laboratori e gli istituti americani, olandesi, italiani, oltre al CERN, sono coinvolti in questa partnership, collaborando a soluzioni di nuove schede di lettura. Infine, un’altra applicazione della PiLUP é di utilizzarla come emulatore di diversi dispositivi, come il nuovo chip di lettura RD53A.
APA, Harvard, Vancouver, ISO, and other styles
3

Yazigy, Amal Jamil. "Schema theory and learning to read in a second language." Thesis, University of Leicester, 1992. http://hdl.handle.net/2381/35691.

Full text
Abstract:
The aim of this research is to investigate the possible effects of text experiences on story retelling with young children. The subjects are 210 Lebanese children, whose native language is Arabic, learning to read in English through using foreign culture books, mainly American. It is the belief that, while learning to read in a second language, children are also introduced to a new culture. Therefore, a key question is how are we going to make this process easier and more enjoyable to children who are a) learning to read, b) in a foreign language, and c) about a distant culture. Based on previous work with schema theory, two story books are used in this study to detect any differences in comprehension levels between stories of varied cultural backgrounds. One story is based on the Spanish concept of bull-fighting which is assumed to be foreign to the children and the other is with a familiar Lebanese background. Subjects were divided into four groups: the first group worked with pictures and had a discussion prior to reading to build the target-culture schema; the second had the schema activities after reading the story; the third discussed the cultural topic both before and after reading; and the last was a control group which did not have schema activities. Results show that familiarity with a topic before reading the text promotes comprehension, retention, and retelling of a text. Proficiency in the foreign language seems to have a great effect on text understanding when information about the topic is made available. Implications are drawn and suggestions given for practical approaches to developing children's reading through tasks in Lebanese classrooms.
APA, Harvard, Vancouver, ISO, and other styles
4

Tomic, Taeda. "Commentary on Chris Reed and Doug Walton : "Argumentation Schemes in Dialogue"." Uppsala universitet, Filosofiska institutionen, 2007. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-150974.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Esfahani, Alireza. "Security schemes against pollution attacks in network coding over wireless networks." Doctoral thesis, Universidade de Aveiro, 2017. http://hdl.handle.net/10773/21773.

Full text
Abstract:
Doutoramento em Telecomunicações
Resumo em português não disponivel
The topic of this thesis is how to achieve e cient security against pollution attacks by exploiting the structure of network coding. There has recently been growing interest in using network coding techniques to increase the robustness and throughput of data networks, and reduce the delay in wireless networks, where a network coding-based scheme takes advantage of the additive nature of wireless signals by allowing two nodes to transmit simultaneously to the relay node. However, Network Coding (NC)-enabled wireless networks are susceptible to a severe security threat, known as data pollution attack, where a malicious node injects into the network polluted (i.e., corrupted) packets that prevent the destination nodes from decoding correctly. Due to recoding at the intermediate nodes, according to the core principle of NC, the polluted packets propagate quickly into other packets and corrupt bunches of legitimate packets leading to network resource waste. Hence, a lot of research e ort has been devoted to schemes against data pollution attacks. Homomorphic Message Authentication Code (MAC)-based schemes are a promising solution against data pollution attacks. However, most of them are susceptible to a new type of pollution attack, called tag pollution attack, where an adversary node randomly modi es tags appended to the end of the transmitted packets. Therefore, in this thesis, we rst propose a homomorphic message authentication code-based scheme, providing resistance against data pollution attacks and tag pollution attacks in XOR NC-enabled wireless networks. Moreover, we propose four homomorphic message authentication code-based schemes which provide resistance against data and tag pollution attacks in Random Linear Network Coding (RLNC). Our results show that our proposed schemes are more e cient compared to other competitive tag pollution immune schemes in terms of complexity, communication overhead and key storage overhead.
APA, Harvard, Vancouver, ISO, and other styles
6

Valvo, Daniel William. "Repairing Cartesian Codes with Linear Exact Repair Schemes." Thesis, Virginia Tech, 2020. http://hdl.handle.net/10919/98818.

Full text
Abstract:
In this paper, we develop a scheme to recover a single erasure when using a Cartesian code,in the context of a distributed storage system. Particularly, we develop a scheme withconsiderations to minimize the associated bandwidth and maximize the associateddimension. The problem of recovering a missing node's data exactly in a distributedstorage system is known as theexact repair problem. Previous research has studied theexact repair problem for Reed-Solomon codes. We focus on Cartesian codes, and show wecan enact the recovery using a linear exact repair scheme framework, similar to the oneoutlined by Guruswami and Wooters in 2017.
Master of Science
Distributed storage systems are systems which store a single data file over multiple storage nodes. Each storage node has a certain storage efficiency, the "space" required to store the information on that node. The value of these systems, is their ability to safely store data for extended periods of time. We want to design distributed storage systems such that if one storage node fails, we can recover it from the data in the remaining nodes. Recovering a node from the data stored in the other nodes requires the nodes to communicate data with each other. Ideally, these systems are designed to minimize the bandwidth, the inter-nodal communication required to recover a lost node, as well as maximize the storage efficiency of each node. A great mathematical framework to build these distributed storage systems on is erasure codes. In this paper, we will specifically develop distributed storage systems that use Cartesian codes. We will show that in the right setting, these systems can have a very similar bandwidth to systems build from Reed-Solomon codes, without much loss in storage efficiency.
APA, Harvard, Vancouver, ISO, and other styles
7

Susanto, Misfa. "Network Coding for Multihop Wireless Networks: Joint Random Linear Network Coding and Forward Error Correction with Interleaving for Multihop Wireless Networks." Thesis, University of Bradford, 2015. http://hdl.handle.net/10454/14864.

Full text
Abstract:
Optimising the throughput performance for wireless networks is one of the challenging tasks in the objectives of communication engineering, since wireless channels are prone to errors due to path losses, random noise, and fading phenomena. The transmission errors will be worse in a multihop scenario due to its accumulative effects. Network Coding (NC) is an elegant technique to improve the throughput performance of a communication network. There is the fact that the bit error rates over one modulation symbol of 16- and higher order- Quadrature Amplitude Modulation (QAM) scheme follow a certain pattern. The Scattered Random Network Coding (SRNC) system was proposed in the literature to exploit the error pattern of 16-QAM by using bit-scattering to improve the throughput of multihop network to which is being applied the Random Linear Network Coding (RLNC). This thesis aims to improve further the SRNC system by using Forward Error Correction (FEC) code; the proposed system is called Joint RLNC and FEC with interleaving. The first proposed system (System-I) uses Convolutional Code (CC) FEC. The performances analysis of System-I with various CC rates of 1/2, 1/3, 1/4, 1/6, and 1/8 was carried out using the developed simulation tools in MATLAB and compared to two benchmark systems: SRNC system (System-II) and RLNC system (System- III). The second proposed system (System-IV) uses Reed-Solomon (RS) FEC code. Performance evaluation of System IV was carried out and compared to three systems; System-I with 1/2 CC rate, System-II, and System-III. All simulations were carried out over three possible channel environments: 1) AWGN channel, 2) a Rayleigh fading channel, and 3) a Rician fading channel, where both fading channels are in series with the AWGN channel. The simulation results show that the proposed system improves the SRNC system. How much improvement gain can be achieved depends on the FEC type used and the channel environment.
APA, Harvard, Vancouver, ISO, and other styles
8

Rodrigues, Diego de Azevedo, and 981997982. "A Study on Machine Learning Techniques for the Schema Matching Networks Problem." Universidade Federal do Amazonas, 2018. https://tede.ufam.edu.br/handle/tede/6801.

Full text
Abstract:
Submitted by Diego Rodrigues (diego.rodrigues@icomp.ufam.edu.br) on 2018-12-07T21:38:02Z No. of bitstreams: 2 Diego Rodrigues.pdf: 3673641 bytes, checksum: f1fdd4162dc6acd590136bb6b886704e (MD5) license_rdf: 0 bytes, checksum: d41d8cd98f00b204e9800998ecf8427e (MD5)
Approved for entry into archive by Secretaria PPGI (secretariappgi@icomp.ufam.edu.br) on 2018-12-07T22:27:06Z (GMT) No. of bitstreams: 2 Diego Rodrigues.pdf: 3673641 bytes, checksum: f1fdd4162dc6acd590136bb6b886704e (MD5) license_rdf: 0 bytes, checksum: d41d8cd98f00b204e9800998ecf8427e (MD5)
Approved for entry into archive by Divisão de Documentação/BC Biblioteca Central (ddbc@ufam.edu.br) on 2018-12-10T19:02:56Z (GMT) No. of bitstreams: 2 Diego Rodrigues.pdf: 3673641 bytes, checksum: f1fdd4162dc6acd590136bb6b886704e (MD5) license_rdf: 0 bytes, checksum: d41d8cd98f00b204e9800998ecf8427e (MD5)
Made available in DSpace on 2018-12-10T19:02:56Z (GMT). No. of bitstreams: 2 Diego Rodrigues.pdf: 3673641 bytes, checksum: f1fdd4162dc6acd590136bb6b886704e (MD5) license_rdf: 0 bytes, checksum: d41d8cd98f00b204e9800998ecf8427e (MD5) Previous issue date: 2018-10-22
CAPES - Coordenação de Aperfeiçoamento de Pessoal de Nível Superior
Schema Matching is the problem of finding semantic correspondences between elements from different schemas. This is a challenging problem, since the same concept is often represented by disparate elements in the schemas. The traditional instances of this problem involved a pair of schemas to be matched. However, recently there has been a increasing interest in matching several related schemas at once, a problem known as Schema Matching Networks, where the goal is to identify elements from several schemas that correspond to a single concept. We propose a family of methods for schema matching networks based on machine learning, which proved to be a competitive alternative for the traditional matching problem in several domains. To overcome the issue of requiring a large amount of training data, we also propose a bootstrapping procedure to automatically generate training data. In addition, we leverage constraints that arise in network scenarios to improve the quality of this data. We also propose a strategy for receiving user feedback to assert some of the matchings generated, and, relying on this feedback, improving the quality of the final result. Our experiments show that our methods can outperform baselines reaching F1-score up to 0.83.
Casamento de Esquemas é a tarefa de encontrar correpondências entre elementos de diferentes esquemas de bancos de dados. É um problema desafiador, uma vez que o mesmo conceito geralmente é representado de maneiras distintas nos esquemas.Tradicionalmente, a tarefa envolve um par de esquemas a serem mapeados. Entretanto, houve um crescimento na necessidade de mapear vários esquemas ao mesmo tempo, tarefa conhecida como Casamento de Esquemas em Rede, onde o objetivo é identificar elementos de vários esquemas que correspondem ao mesmo conceito. Este trabalho propõe uma famı́lia de métodos para o problema do casamento de esquemas em rede baseados em aprendizagem de máquina, que provou ser uma alternativa viável para o problema do casamento tradicional em diversos domı́nios. Para superar obstáculo de obter bastantes instâncias de treino, também é proposta uma técnica de bootstrapping para gerar treino automático. Além disso, o trabalho considera restrições de integridade que ajudam a nortear o processo de casamento em rede. Este trabalho também propõe uma estratégia para receber avaliações do usuário, com o propósito de melhorar o resultado final. Experimentos mostram que o método proposto supera outros métodos comparados alcançando valor F1 até 0.83 e sem utilizar muitas avaliações do usuário.
APA, Harvard, Vancouver, ISO, and other styles
9

TAKEDA, Marcos Yuichi. "A Comparison between RS+TCM and LDPC FEC schemes for the G.fast standard." Universidade Federal do Pará, 2016. http://repositorio.ufpa.br/jspui/handle/2011/8036.

Full text
Abstract:
Submitted by camilla martins (camillasmmartins@gmail.com) on 2017-03-28T14:12:26Z No. of bitstreams: 2 license_rdf: 0 bytes, checksum: d41d8cd98f00b204e9800998ecf8427e (MD5) Dissertacao_ComparacaoRS+TCMLDPC.pdf: 893867 bytes, checksum: 0e75a129249af6c11b8245bcb9bf9e5b (MD5)
Approved for entry into archive by Edisangela Bastos (edisangela@ufpa.br) on 2017-03-28T14:47:19Z (GMT) No. of bitstreams: 2 license_rdf: 0 bytes, checksum: d41d8cd98f00b204e9800998ecf8427e (MD5) Dissertacao_ComparacaoRS+TCMLDPC.pdf: 893867 bytes, checksum: 0e75a129249af6c11b8245bcb9bf9e5b (MD5)
Made available in DSpace on 2017-03-28T14:47:19Z (GMT). No. of bitstreams: 2 license_rdf: 0 bytes, checksum: d41d8cd98f00b204e9800998ecf8427e (MD5) Dissertacao_ComparacaoRS+TCMLDPC.pdf: 893867 bytes, checksum: 0e75a129249af6c11b8245bcb9bf9e5b (MD5) Previous issue date: 2016-02-01
CNPq - Conselho Nacional de Desenvolvimento Científico e Tecnológico
A necessidade de velocidades de conexão a internet cada vez maiores motivou a criação de um novo padrão, G.fast, para DSL (linha digital do assinante), de modo a prover performance semelhante a fibra usando par trançado de fios de cobre. Esta dissertação foca em dois prévios candidatos a esquemas de correção de erro, sendo eles codigos Reed-Solomon com modulaçao codificada em treliça (TCM), de padrões DSL anteriores, e códigos de verificação de paridade de baixa densidade (LDPC), do padrão G.hn para redes residenciais. O objetivo principal é comparar os dois esquemas, de modo a avaliar qual deles tem melhor performance, considerando métricas como poder de correção de erro e custo computacional. Embora o código selecionado para o G.fast já tenha sido RS+TCM, acredita-se que esta decisão foi tendenciosa, já que é sabido que códigos mais recentes como LDPC possuem maior poder correção.
The need for increasing internet connection speeds motivated the creation of a new standard, G.fast, for digital subscriber lines (DSL), in order to provide fiber-like performance using short twisted pair copper wires. This dissertation focuses in the two former candidate codes for the forward error correction (FEC) scheme, namely Reed-Solomon (RS) with trellis-coded modulation (TCM), from previous DSL standards, and low density parity check (LDPC) codes, from the G.hn standard for home networking. The main objective is to compare both schemes, in order to evaluate which of them performs better, considering metrics such as error correction performance and computational cost. Even though the selected code for G.fast was RS with TCM, it is believed that this choice was biased, as a more recent iterative code like LDPC is known to have a better error correction performance.
APA, Harvard, Vancouver, ISO, and other styles
10

Vucht, Tijssen Bertje Elisabeth van. "Uit de ban van de rede : een confrontatie tussen de cultuur- en kennissociologische visies van Max Scheler en Max Weber /." Utrecht : Instituut voor culturele antropologie, 1985. http://catalogue.bnf.fr/ark:/12148/cb35488160g.

Full text
Abstract:
Proefschrift--Sociale wetenschappen--Utrecht--Rijksuniversiteit, 1985.
Mention parallèle de titre ou de responsabilité : Lösung aus dem Bann der Vernunft : eine Konfrontation zwischen der kultur- und wissenssoziologischen Auffassung von Max Scheler und Max Weber. Résumé en allemand. Bibliogr. p. 376-394. Index.
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "REDD+ Scheme"

1

Great Britain. Scottish Office. Pensions Agency. Scottish Teachers' Superannuation Scheme: An easy-to-read guide. Edinburgh: SOPA, 1993.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Waddington, Eileen. Going home: An evaluation of British Red Cross home from hospital schemes. London: British Red Cross, 1996.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

McLean, Catherine. An evaluative study of the Red Cross Hospital Aftercare Service - Omagh: A voluntary sector pilot scheme which aims to support older people, aged over 65 years, as part of post-discharge multi-sector care provision following temporary admission to hospital. (s.l: The Author), 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Critical media is elementary: Teaching youth to critically read and create media. New York: Peter Lang, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Klaassen, C. J. M. Schadeveroorzakend handelen in functie-- diverse wegen leiden naar de werkgever: Enkele beschouwingen over de aansprakelijkheid van de werkgever en de ondergeschikte voor schade toegebracht of opgelopen in het kader van het werk : rede ... Deventer: W.E.J. Tjeenk Willink, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Macmillan: Read Scheme Teachers Guide Rev. Macmillan Education Ltd, 1987.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Staff, Ladybird Books. Read with Me: Key Words Reading Scheme. Penguin Books, Limited, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Murray, W., and Jill Corby. Magic Music (Read with Me: Key Words Reading Scheme). Ladybird Books Ltd, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Picture Dictionary (Read with Me: Key Words Reading Scheme). Ladybird Books Ltd, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Murray, W., and Jill Corby. Let's Play (Read with Me: Key Words Reading Scheme). Ladybird Books Ltd, 1993.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "REDD+ Scheme"

1

Woleński, Jan. "Read about T-Scheme." In Unity, Truth and the Liar, 199–203. Dordrecht: Springer Netherlands, 2008. http://dx.doi.org/10.1007/978-1-4020-8468-3_12.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Fontaine, Caroline, and Fabien Galand. "How Can Reed-Solomon Codes Improve Steganographic Schemes?" In Information Hiding, 130–44. Berlin, Heidelberg: Springer Berlin Heidelberg, 2007. http://dx.doi.org/10.1007/978-3-540-77370-2_9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Koo, Jahwan, Vladimir V. Shakhov, and Hyunseung Choo. "An Enhanced RED-Based Scheme for Differentiated Loss Guarantees." In Management of Convergence Networks and Services, 481–90. Berlin, Heidelberg: Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11876601_49.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Challa, RatnaKumari, and VijayaKumari Gunta. "Reed-Muller Code Based Symmetric Key Fully Homomorphic Encryption Scheme." In Information Systems Security, 499–508. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-49806-5_29.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Sarkar, Pinaki, and Morshed U. Chowdhury. "Key Predistribution Scheme Using Finite Fields and Reed Muller Codes." In Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing 2011, 67–79. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-22288-7_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Mumford, David B. "References: The Red Book of Varieties and Schemes." In Lecture Notes in Mathematics, 293. Berlin, Heidelberg: Springer Berlin Heidelberg, 1999. http://dx.doi.org/10.1007/978-3-540-46021-3_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Dybdahl, Haakon, Marius Grannæs, and Lasse Natvig. "Cache Write-Back Schemes for Embedded Destructive-Read DRAM." In Architecture of Computing Systems - ARCS 2006, 145–59. Berlin, Heidelberg: Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11682127_11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Xiaoqin, Guan, and Guan Xiaotao. "Efficient Training Scheme to Improve the Ability of Draw and Read Graphics." In Information and Business Intelligence, 312–17. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-29087-9_48.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Wang, Yong, Hao Xie, and Ruyi Wang. "Digital Signature Scheme to Match Generalized Reed-Solomon Code over GF(q)." In Cyberspace Safety and Security, 32–47. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-18067-5_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Arora, Sanjeev, and Kevin L. Chang. "Approximation Schemes for Degree-Restricted MST and Red-Blue Separation Problem." In Automata, Languages and Programming, 176–88. Berlin, Heidelberg: Springer Berlin Heidelberg, 2003. http://dx.doi.org/10.1007/3-540-45061-0_16.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "REDD+ Scheme"

1

A. Akintola, A., G. A. Aderounmu, L. A. Akanbi, and M. O. Adigun. "Modeling and Performance Analysis of Dynamic Random Early Detection (DRED) Gateway for Congestion Avoidance." In InSITE 2005: Informing Science + IT Education Conference. Informing Science Institute, 2005. http://dx.doi.org/10.28945/2920.

Full text
Abstract:
One of the most prominent congestion avoidance schemes in the Internet architecture is the Random Early Detection (RED) algorithm. Several modifications and enhancements have been made to the original RED so as to make it more responsive to congestion avoidance at the gateways. In this paper, we introduced the Dynamic Random Early Detection (DRED) model, which uses a newly introduced parameter i.e. warning line. A robust and efficacious technique to measure the burstiness of incoming traffic has been developed and tested. This involves the estimation of the average queue size, avg, which is dynamically adjusted hence the name of our scheme. The empirical results obtained from the simulations show that our DRED scheme responds early enough to the increased number of packets at the gateway. Also, the maximum drop probability of packets show improved performance over the original RED. It was concluded that our scheme demonstrated superiority by avoiding global synchronization and there is great reduction in the fluctuations of the actual queue size. Also, its early response avoids buffer overflow at the gateways when the queue is near full.
APA, Harvard, Vancouver, ISO, and other styles
2

Kim, Yong W., Leonel Arellano, Mark Vardakas, Hee-Koo Moon, and Kenneth O. Smith. "Comparison of Trip-Strip/Impingement/Dimple Cooling Concepts at High Reynolds Numbers." In ASME Turbo Expo 2003, collocated with the 2003 International Joint Power Generation Conference. ASMEDC, 2003. http://dx.doi.org/10.1115/gt2003-38935.

Full text
Abstract:
Modern industrial combustor liners employ various cooling schemes such as, but not limited to, impingement arrays, trip-strips, and film cooling. With an increasing demand for a higher turbine inlet temperatures and lower emissions, there is less air available to cool the combustor liner. To ensure the required liner durability without compromising engine performance more innovative cooling schemes are required. In the present work, three different cooling concepts, i.e., strip-strips, jet array impingement and dimples, operating at unusually high flow conditions were investigated. There is very little data available in the open literature for the aforementioned cooling schemes in the indicated Reynolds Number range (ReDh>60,000). The wall flow friction characteristics as well as the local heat transfer were measured. The heat transfer coefficients were obtained using a transient liquid crystal technique. The test configurations consisted of a 90° trip-strip surface (only one side turbulated), a fixed staggered array with varying impingement hole sizes, and a fixed staggered dimple pattern. For the Reynolds numbers investigated (26,000< ReDh <360,000), the jet-impingement cooling provided the highest average heat transfer enhancement followed by the trip-strip channel, and then by the dimpled channel. In terms of the overall thermal performance, the dimpled channel tends to stand out as the most effective cooling scheme. This is consistent with findings from other investigators at lower Reynolds numbers.
APA, Harvard, Vancouver, ISO, and other styles
3

Pe´rez Arancibia, Ne´stor O., Chi-Ying Lin, Tsu-Chin Tsao, and James S. Gibson. "Adaptive and Repetitive Control for Rejecting Repeatable and Non-Repeatable Runout in Rotating Devices." In ASME 2007 International Mechanical Engineering Congress and Exposition. ASMEDC, 2007. http://dx.doi.org/10.1115/imece2007-43534.

Full text
Abstract:
This paper presents a control scheme for rejecting both repeatable and non-repeatable runout components of disturbances occurring in rotational devices. To exemplify this method, implementation and experimental results for track following control of a computer hard disk drive (HDD) read/write heads are presented. Aiming for high performance, the control design involves two steps. The first is the design and tuning of a recursive least-squares (RLS) based scheme intended to achieve minimum variance performance. The second step integrates repetitive and adaptive control schemes in a real-time implementation to compensate for variations and changes in the disturbance dynamics. The repetitive part of this controller targets specific periodic disturbances. The adaptive part compensates for broad bandwidth stochastic disturbances. The key element in this design is the formulation of an appropriate optimization problem, solvable recursively by applying recursive adaptive algorithms. Experimental results obtained from the implementation of this method in a commercial HDD demonstrates the effectiveness of this approach.
APA, Harvard, Vancouver, ISO, and other styles
4

Chauhan, Sonam, and Ajay Sharma. "Fuzzy Commitment Scheme based on Reed Solomon Codes." In SIN '16: 9th International Conference on Security of Information and Networks. New York, NY, USA: ACM, 2016. http://dx.doi.org/10.1145/2947626.2947649.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Wang, Hao, Wei Zhang, and Yanyan Liu. "Joint Coding Scheme Based on Reed-Solomon Codes." In 2021 IEEE 6th International Conference on Computer and Communication Systems (ICCCS). IEEE, 2021. http://dx.doi.org/10.1109/icccs52626.2021.9449143.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Saraswatula, Sree Rama KC, Santosh Yachareni, Shidong Zhou, Narendra Pulipati, Joy Chen, and Teja Masina. "Robust Adaptive Read Scheme for 7nm Configuration SRAMs." In 2021 IEEE 27th International Symposium on On-Line Testing and Robust System Design (IOLTS). IEEE, 2021. http://dx.doi.org/10.1109/iolts52814.2021.9486712.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Voyiatzis, I., C. Sgouropoulou, and C. Efstathiou. "A concurrent BIST scheme for read only memories." In 2015 10th International Conference on Design & Technology of Integrated Systems in Nanoscale Era (DTIS). IEEE, 2015. http://dx.doi.org/10.1109/dtis.2015.7127366.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Afanasyeva, Alexandra, Sergey Bezzateev, Evgeny Linsky, Vitaly Petrov, and DaeYoub Kim. "Threshold identity based encryption scheme on quadratic residues." In 2012 XIII International Symposium on Problems of Redundancy in Information and Control Systems (RED). IEEE, 2012. http://dx.doi.org/10.1109/red.2012.6338393.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Gilmutdinov, Marat, Nickolay Egorov, and Dmitriy Novikov. "Lossless image compression scheme with binary layers scanning." In 2014 XIV International Symposium on Problems of Redundancy in Information and Control Systems (REDUNDANCY). IEEE, 2014. http://dx.doi.org/10.1109/red.2014.7016703.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Lu, Mengting, Fang Wang, Dan Feng, and Yuchong Hu. "A Read-leveling Data Distribution Scheme for Promoting Read Performance in SSDs with Deduplication." In ICPP 2019: 48th International Conference on Parallel Processing. New York, NY, USA: ACM, 2019. http://dx.doi.org/10.1145/3337821.3337884.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "REDD+ Scheme"

1

Lacan, J., V. Roca, J. Peltotalo, and S. Peltotalo. Reed-Solomon Forward Error Correction (FEC) Schemes. RFC Editor, April 2009. http://dx.doi.org/10.17487/rfc5510.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Roca, V., M. Cunche, J. Lacan, A. Bouabdallah, and K. Matsuzono. Simple Reed-Solomon Forward Error Correction (FEC) Scheme for FECFRAME. RFC Editor, February 2013. http://dx.doi.org/10.17487/rfc6865.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Marcos Morezuelas, Paloma. Gender, Forests and Climate Change. Inter-American Development Bank, March 2021. http://dx.doi.org/10.18235/0003072.

Full text
Abstract:
As users of forest products and guardians of traditional knowledge, women have always been involved in forestry. Nevertheless, their access to forest resources and benefits and participation in forest management is limited compared to mens despite the fact that trees are more important to women, who depend on them for their families food security, income generation and cooking fuel. This guide aims to facilitate the incorporation of a gender lens in climate change mitigation and adaptation operations in forests, with special attention to those framed in REDD. This guide addresses four themes value chains, environmental payment schemes, firewood and biodiversity that relate directly to 1) how climate change impacts affect women in the forest and 2) how mitigation and adaptation measures affect womens access to resources and benefits distribution.
APA, Harvard, Vancouver, ISO, and other styles
4

Benson, Vivienne, and Jenny C. Aker. Improving Adult Literacy in Niger Through Mobile Calls to Teachers. Institute of Development Studies and The Impact Initiative, February 2021. http://dx.doi.org/10.35648/20.500.12413/11781/ii368.

Full text
Abstract:
In Niger, one of the poorest countries in the world, 85 per cent of adults are unable to read or write, even in local languages. Adult education programmes can be a route to improving adult literacy rates, but non-governmental organisation (NGO) and government schemes are characterised with low enrolment, high dropout, and poor teacher attendance. In partnership with the Ministry of Education, Catholic Relief Services, the Sahel Group, and Tufts University, regular phone calls and motivational support were given to teachers to encourage and monitor attendance of adult education programmes between 2018 and 2019. The impact of this project directly led to improved reading and maths scores. Based on this evidence, the approach has been tested by the Ministry of Education in primary schools.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography