7 resultados para IDEAS-ABOUT-SCIENCE

em Nottingham eTheses


Relevância:

80.00% 80.00%

Publicador:

Resumo:

Ideas about the evolution of imperfect mimicry are reviewed. Their relevance to the colours patterns of hoverflies (Diptera, Syrphidae) are discussed in detail. Most if not all of the hoverflies labelled as mimetic actually are mimics. The apparently poor nature of their resemblance does not prevent them from obtaining at least some protection from suitably experienced birds. Mimicry is a dominant theme of this very large family of Diptera, with at least a quarter of all species in Europe being mimetic. Hoverfly mimics fall into three major groups according to their models, involving bumblebees, honeybees and social wasps. There are striking differences in the general levels of mimetic fidelity and relative abundances of the three groups, with accurate mimicry, low abundance and polymorphism characterizing the bumblebee mimics: more than half of all the species of bumblebee mimics are polymorphic. Mimics of social wasps tend to be poor mimics, have high relative abundance, and polymorphism is completely absent. Bumblebee models fall into a small number of Muellerian mimicry rings which are very different between the Palaearctic and Nearctic regions. Social wasps and associated models form one large Muellerian complex. Together with honeybees, these complexes probably form real clusters of forms as perceived by many birds. All three groups of syrphid mimics contain both good and poor mimics; some mimics are remarkably accurate, and have close morphological and behavioural resemblance. At least some apparently 'poor' mimetic resemblances may be much closer in birds' perception than we imagine, and more work needs to be done on this. Bumblebees are the least noxious and wasps the most noxious of the three main model groups. The basis of noxiousness is different, with bumblebees being classified as non-food, whereas honeybees and wasps are nasty-tasting and (rarely) stinging. The distribution of mimicry is exactly what would be expected from this ordering, with polymorphic and accurate forms being a key feature of mimics of the least noxious models, while highly noxious models have poor-quality mimicry. Even if the high abundance of many syrphid mimics relative to their models is a recent artefact of man-made environmental change, this does not preclude these species from being mimics. It seems unlikely that bird predation actually controls the populations of adult syrphids. Being rare relative to a model may have promoted or accelerated the evolution of perfect mimicry: theoretically this might account for the pattern of rare good mimics and abundant poor ones, but the idea is intrinsically unlikely. Many mimics seem to have hour-to-hour abundances related to those of their models, presumably as a result of behavioural convergence. We need to know much more about the psychology of birds as predators. There are at least four processes that need elucidating: (a) learning about the noxiousness of models; (b) the erasing of that learning through contact with mimics (extinction, or learned forgetting); (c) forgetting; (d) deliberate risk-taking and the physiological states that promote it. Johnston's (2002) model of the stabilization of imperfect mimicry by kin selection is unlikely to account for the colour patterns of hoverflies. Sherratt's (2002) model of the influence of multiple models potentially accounts for all the patterns of hoverfly mimicry, and is the most promising avenue for testing.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Abstract We present ideas about creating a next generation Intrusion Detection System (IDS) based on the latest immunological theories. The central challenge with computer security is determining the difference between normal and potentially harmful activity. For half a century, developers have protected their systems by coding rules that identify and block specific events. However, the nature of current and future threats in conjunction with ever larger IT systems urgently requires the development of automated and adaptive defensive tools. A promising solution is emerging in the form of Artificial Immune Systems (AIS): The Human Immune System (HIS) can detect and defend against harmful and previously unseen invaders, so can we not build a similar Intrusion Detection System (IDS) for our computers? Presumably, those systems would then have the same beneficial properties as HIS like error tolerance, adaptation and self-monitoring. Current AIS have been successful on test systems, but the algorithms rely on self-nonself discrimination, as stipulated in classical immunology. However, immunologist are increasingly finding fault with traditional self-nonself thinking and a new 'Danger Theory' (DT) is emerging. This new theory suggests that the immune system reacts to threats based on the correlation of various (danger) signals and it provides a method of 'grounding' the immune response, i.e. linking it directly to the attacker. Little is currently understood of the precise nature and correlation of these signals and the theory is a topic of hot debate. It is the aim of this research to investigate this correlation and to translate the DT into the realms of computer security, thereby creating AIS that are no longer limited by self-nonself discrimination. It should be noted that we do not intend to defend this controversial theory per se, although as a deliverable this project will add to the body of knowledge in this area. Rather we are interested in its merits for scaling up AIS applications by overcoming self-nonself discrimination problems.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Abstract We present ideas about creating a next generation Intrusion Detection System (IDS) based on the latest immunological theories. The central challenge with computer security is determining the difference between normal and potentially harmful activity. For half a century, developers have protected their systems by coding rules that identify and block specific events. However, the nature of current and future threats in conjunction with ever larger IT systems urgently requires the development of automated and adaptive defensive tools. A promising solution is emerging in the form of Artificial Immune Systems (AIS): The Human Immune System (HIS) can detect and defend against harmful and previously unseen invaders, so can we not build a similar Intrusion Detection System (IDS) for our computers? Presumably, those systems would then have the same beneficial properties as HIS like error tolerance, adaptation and self-monitoring. Current AIS have been successful on test systems, but the algorithms rely on self-nonself discrimination, as stipulated in classical immunology. However, immunologist are increasingly finding fault with traditional self-nonself thinking and a new 'Danger Theory' (DT) is emerging. This new theory suggests that the immune system reacts to threats based on the correlation of various (danger) signals and it provides a method of 'grounding' the immune response, i.e. linking it directly to the attacker. Little is currently understood of the precise nature and correlation of these signals and the theory is a topic of hot debate. It is the aim of this research to investigate this correlation and to translate the DT into the realms of computer security, thereby creating AIS that are no longer limited by self-nonself discrimination. It should be noted that we do not intend to defend this controversial theory per se, although as a deliverable this project will add to the body of knowledge in this area. Rather we are interested in its merits for scaling up AIS applications by overcoming self-nonself discrimination problems.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

This article addresses some implications for gender equality and gender policy at European and national levels of transformations in family, economy and polity, which challenge gender regimes across Europe. Women’s labour market participation in the west and the collapse of communism in the east have undermined the systems and assumptions of western male breadwinner and dual worker models of central and eastern Europe. Political reworking of the work/welfare relationship into active welfare has individualised responsibility. Individualisation is a key trend west − and in some respects east − and challenges the structures that supported care in state and family. The links that joined men to women, cash to care, incomes to carers have all been fractured. The article will argue that care work and unpaid care workers are both casualties of these developments. Social, political and economic changes have not been matched by the development of new gender models at the national level. And while EU gender policy has been admired as the most innovative aspect of its social policy, gender equality is far from achieved: women’s incomes across Europe are well below men’s; policies for supporting unpaid care work have developed modestly compared with labour market activation policies.Enlargement brings new challenges as it draws together gender regimes with contrasting histories and trajectories. The article will map social policies for gender equality across the key elements of gender regimes – paid work, care work, income, time and voice – and discuss the nature of a model of gender equality that would bring gender equality across these. It analyses ideas about a dual earner–dual carer model, in the Dutch combination scenario and ‘universal caregiver’ models, at household and civil society levels. These offer a starting point for a model in which paid and unpaid work are equally valued and equally shared between men and women, but we argue that a citizenship model, in which paid and unpaid work obligations are underpinned by social rights, is more likely to achieve gender equality.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Public involvement in healthcare is a prominent policy in countries across the economically developed world. A growing body of academic literature has focused on public participation, often presenting dichotomies between good and bad practice: between initiatives that offer empowerment and those constrained by consumerism, or between those which rely for recruitment on self-selecting members of the public, and those including a more broad-based, statistically representative group. In this paper I discuss the apparent tensions between differing rationales for participation, relating recent discussions about the nature of representation in public involvement to parallel writings about the contribution of laypeople’s expertise and experience. In the academic literature, there is, I suggest, a thin line between democratic justifications for involvement, suggesting a representative role for involved publics, and technocratic ideas about the potential ‘expert’ contributions of particular subgroups of the public. Analysing recent policy documents on participation in healthcare in England, I seek moreover to show how contemporary policy transcends both categories, demanding complex roles of involved publics which invoke various qualities seen as important in governing the interface between state and society. I relate this to social-theoretical perspectives on the relationship between governmental authority and citizens in late-modern society.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

We present ideas about creating a next generation Intrusion Detection System (IDS) based on the latest immunological theories. The central challenge with computer security is determining the difference between normal and potentially harmful activity. For half a century, developers have protected their systems by coding rules that identify and block specific events. However, the nature of current and future threats in conjunction with ever larger IT systems urgently requires the development of automated and adaptive defensive tools. A promising solution is emerging in the form of Artificial Immune Systems (AIS): The Human Immune System (HIS) can detect and defend against harmful and previously unseen invaders, so can we not build a similar Intrusion Detection System (IDS) for our computers? Presumably, those systems would then have the same beneficial properties as HIS like error tolerance, adaptation and self-monitoring. Current AIS have been successful on test systems, but the algorithms rely on self-nonself discrimination, as stipulated in classical immunology. However, immunologist are increasingly finding fault with traditional self-nonself thinking and a new ‘Danger Theory’ (DT) is emerging. This new theory suggests that the immune system reacts to threats based on the correlation of various (danger) signals and it provides a method of ‘grounding’ the immune response, i.e. linking it directly to the attacker. Little is currently understood of the precise nature and correlation of these signals and the theory is a topic of hot debate. It is the aim of this research to investigate this correlation and to translate the DT into the realms of computer security, thereby creating AIS that are no longer limited by self-nonself discrimination. It should be noted that we do not intend to defend this controversial theory per se, although as a deliverable this project will add to the body of knowledge in this area. Rather we are interested in its merits for scaling up AIS applications by overcoming self-nonself discrimination problems.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Social-scientific analysis of public-participation initiatives has proliferated in recent years. This review article discusses some key aspects of recent work. Firstly, it analyses some of the justifications put forward for public participation, drawing attention to differences and overlaps between rationales premised on democratic representation/representativeness and those based on more technocratic ideas about the knowledge that the public can offer. Secondly, it considers certain tensions in policy discourses on participation, focusing in particular on policy relating to the National Health Service and other British public services. Thirdly, it examines the challenges of putting a coherent vision for public participation into practice, noting the impediments that derive from the often-competing ideas about the remit of participation held by different groups of stakeholders. Finally, it analyses the gap between policy and practice, and the consequences of this for the prospects for the enactment of active citizenship through participation initiatives.