27 resultados para abelian Higgs


Relevância:

10.00% 10.00%

Publicador:

Resumo:

A growing body of evidence suggests that mitochondrial function may be important in brain development and psychiatric disorders. However, detailed expression profiles of those genes in human brain development and fear-related behavior remain unclear. Using microarray data available from the public domain and the Gene Ontology analysis, we identified the genes and the functional categories associated with chronological age in the prefrontal cortex (PFC) and the caudate nucleus (CN) of psychiatrically normal humans ranging in age from birth to 50 years. Among those, we found that a substantial number of genes in the PFC (115) and the CN (117) are associated with the GO term: mitochondrion (FDR qv <0.05). A greater number of the genes in the PFC (91%) than the genes in the CN (62%) showed a linear increase in expression during postnatal development. Using quantitative PCR, we validated the developmental expression pattern of four genes including monoamine oxidase B (MAOB), NADH dehydrogenase flavoprotein (NDUFV1), mitochondrial uncoupling protein 5 (SLC25A14) and tubulin beta-3 chain (TUBB3). In mice, overall developmental expression pattern of MAOB, SLC25A14 and TUBB3 in the PFC were comparable to the pattern observed in humans (p<0.05). However, mice selectively bred for high fear did not exhibit normal developmental changes of MAOB and TUBB3. These findings suggest that the genes associated with mitochondrial function in the PFC play a significant role in brain development and fear-related behavior.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The fastest-growing segment of jobs in the creative sector are in those firms that provide creative services to other sectors (Hearn, Goldsmith, Bridgstock, Rodgers 2014, this volume; Cunningham 2014, this volume). There are also a large number of Creative Services (Architecture and Design, Advertising and Marketing, Software and Digital Content occupations) workers embedded in organizations in other industry sectors (Cunningham and Higgs 2009). Ben Goldsmith (2014, this volume) shows, for example, that the Financial Services sector is the largest employer of digital creative talent in Australia. But why should this be? We argue it is because ‘knowledge-based intangibles are increasingly the source of value creation and hence of sustainable competitive advantage (Mudambi 2008, 186). This value creation occurs primarily at the research and development (R and D) and the marketing ends of the supply chain. Both of these areas require strong creative capabilities in order to design for, and to persuade, consumers. It is no surprise that Jess Rodgers (2014, this volume), in a study of Australia’s Manufacturing sector, found designers and advertising and marketing occupations to be the most numerous creative occupations. Greg Hearn and Ruth Bridgstock (2013, forthcoming) suggest ‘the creative heart of the creative economy […] is the social and organisational routines that manage the generation of cultural novelty, both tacit and codified, internal and external, and [cultural novelty’s] combination with other knowledges […] produce and capture value’. 2 Moreover, the main “social and organisational routine” is usually a team (for example, Grabher 2002; 2004).

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The Department of Culture and the Arts undertook the first mapping of Perth’s creative industries in 2007 in partnership with the City of Perth and the Departments of Industry and Resources and the Premier and Cabinet. The 2013 Creative Industries Statistical Analysis for Western Australia report has updated the mapping with the 2011 Census employment data to provide invaluable information for the State’s creative industries, their peak associations and potential investors. The report maps sector employment numbers and growth between the 2006 and 2011 Census in the areas of music, visual and performing arts, film, TV and radio, advertising and marketing, software and digital content, publishing, and architecture and design, which includes designer fashion.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This chapter is concerned with innovation that involves creative cultural occupations, but not within the creative industries. Rather, we examine the operation of cultural creative occupations that exist outside the creative industries - so-called 'embedded creatives' who work across all industry sectors (Cunningham and Higgs 2009). In doing so, we concur with Bilton (2007) that the separation of creative industries from other industries is a 'false step'. All industries must be innovative; however, they also must be able to combine both scientific and artistic creativity, and that creativity comes from the intersection of different thinking styles (Kurtzberg 2005). Moreover, we suggest that there are now detailed empirical studies, as well as a nascent theoretical base, to suggest that the transdisciplinarity which results from embedded cultural creativity is an engine of growth in the broader economy. Thus, it is relevant to both policymakers and managers. This chapter addresses the following questions: What is the role and significance of the embedded creative? Given a paucity of detailed empirical work in the area to date, what can be deduced from what extant literature there is about the nature of employment and management of these workers? And what are the practical implications of these consideration?

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Most previous work on unconditionally secure multiparty computation has focused on computing over a finite field (or ring). Multiparty computation over other algebraic structures has not received much attention, but is an interesting topic whose study may provide new and improved tools for certain applications. At CRYPTO 2007, Desmedt et al introduced a construction for a passive-secure multiparty multiplication protocol for black-box groups, reducing it to a certain graph coloring problem, leaving as an open problem to achieve security against active attacks. We present the first n-party protocol for unconditionally secure multiparty computation over a black-box group which is secure under an active attack model, tolerating any adversary structure Δ satisfying the Q 3 property (in which no union of three subsets from Δ covers the whole player set), which is known to be necessary for achieving security in the active setting. Our protocol uses Maurer’s Verifiable Secret Sharing (VSS) but preserves the essential simplicity of the graph-based approach of Desmedt et al, which avoids each shareholder having to rerun the full VSS protocol after each local computation. A corollary of our result is a new active-secure protocol for general multiparty computation of an arbitrary Boolean circuit.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

According to 2011 Australian Census figures, embedded creative employees (creative employees not working in the core Creative Industries) make up 2 per cent (or a total of 17 635) of manufacturing industry employees. The average for all industries is 1.6 per cent. In the 2011–2012 financial year the manufacturing industry formed 7.3 per cent of Australia’s gross domestic product (GDP), contributing approximately AU$106.5 billion to the economy (Department of Industry, Innovation, Science, Research and Tertiary Education 2013). Manufacturing is central to innovation, accounting for over one-quarter of all business expenditure in R&D in 2010–2011, representing around AU$4.8 billion invested in R&D (ibid.). Facing challenges such as sustainability concerns, ever-increasing offshore production and the global financial crisis, the Australian manufacturing industry needs to remain relevant and competitive to succeed. Innovation is one way to do this. Given the contribution of the manufacturing industry to the Australian economy, and the above-average portion of embedded creatives in manufacturing, it is important to consider what exactly embedded creatives add to the industry. This chapter, inspired by the Getting Creative in Healthcare report (Pagan, Higgs and Cunningham 2008), examines the contribution of embedded creatives to innovation in the manufacturing industry via case studies and supplemental data.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

We study the natural problem of secure n-party computation (in the passive, computationally unbounded attack model) of the n-product function f G (x 1,...,x n ) = x 1 ·x 2 ⋯ x n in an arbitrary finite group (G,·), where the input of party P i is x i  ∈ G for i = 1,...,n. For flexibility, we are interested in protocols for f G which require only black-box access to the group G (i.e. the only computations performed by players in the protocol are a group operation, a group inverse, or sampling a uniformly random group element). Our results are as follows. First, on the negative side, we show that if (G,·) is non-abelian and n ≥ 4, then no ⌈n/2⌉-private protocol for computing f G exists. Second, on the positive side, we initiate an approach for construction of black-box protocols for f G based on k-of-k threshold secret sharing schemes, which are efficiently implementable over any black-box group G. We reduce the problem of constructing such protocols to a combinatorial colouring problem in planar graphs. We then give two constructions for such graph colourings. Our first colouring construction gives a protocol with optimal collusion resistance t < n/2, but has exponential communication complexity O(n*2t+1^2/t) group elements (this construction easily extends to general adversary structures). Our second probabilistic colouring construction gives a protocol with (close to optimal) collusion resistance t < n/μ for a graph-related constant μ ≤ 2.948, and has efficient communication complexity O(n*t^2) group elements. Furthermore, we believe that our results can be improved by further study of the associated combinatorial problems.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Corporate failures and malpractices have led to an increasing emphasis on the governance role of audit committees. The Smith report Audit Committee Combined Code Guidance and the Higgs Review of the Role and Effectiveness of Non-Executive Directors (now incorporated in a Revised Combined Code) represent further attempts to strengthen corporate accountability in the UK. Although the regulatory focus on audit committees indicates confidence in their role as part of the solution to governance failures, questions remain about their efficacy in practice. Against the background of the publication of the Smith report and the wider reliance on audit committees in several countries to help improve corporate accountability, this paper provides research evidence, drawn from an ACCA-sponsored project, on the processes and effects of the audit committees in three UK companies. This study complements other research on audit committees by adopting a case study approach, in order to reflect the importance of investigating audit committee operations from within the organisation and to develop a closer understanding of audit committee impact than is available from generally observable data. The empirical evidence for the case studies was obtained from semi-structured interviews with personnel involved in the audit committee process, internal documents made available by the companies, and publicly available information, including annual reports.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Purpose In the past, leadership scholars have tended to focus on leadership as a force for good and productivity (Ashworth, 1994; Higgs, 2009; Padilla, Hogan, & Kaiser, 2007). However, recently attention has been given to the ‘dark side’ of leadership (see Higgs, 2009; Judge, Piccolo, & Kosalka, 2009). The aim of this chapter is to explore dark leadership from the perspective of the narcissistic leader using a fictional character from a popular film. Methodology/approach Using the Diagnostic and Statistical Manual of Mental Disorders, 4th edition, 1994 (DSM-IV) (American Psychiatric Association, 2000) as an operational definition of narcissistic personality disorder we explore the psychology of the narcissistic leader through a fictional character study in a popular film. Findings We have created a psychological profile of a narcissistic leader which identifies specific behavioural characteristics within a toxic organizational culture. Social implications This study has implications for employees within any organizational culture. It is significant because it can illustrate how dark leadership can impact negatively within organizations. Originality/value The use of actual living persons on which to base case study material in the study of dark leadership is problematic and constrained by ethical issues. However, the use of characters in fiction, such as contemporary film and drama, represents an excellent source of case study material. Given that little empirical works exists on narcissistic leaders and leadership, the chapter adds originality and value to the field.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The ARC Centre of Excellence in Creative Industries and Innovation (herewith CCI) was established with two simple policy objectives. One was to assess anecdotal and boosterish claims about the growth rates of the creative industries, and hence, to measure the size of the creative industries contribution to gross domestic product (GDP). The other was to ascertain the contribution of the creative industries to employment. Preliminary research detailed in Cunningham and Higgs (2009) showed that the existing industrial classifications did not incorporate the terminology of the creative industries, nor did they disaggregate new categories of digital work such as video games. However, we discovered that occupational codes provide a much more fine-grained account of work that would enable us to disaggregate and track economic activity that corresponded to creative industries terminology. Thus was born one major centrepiece of CCI research – the tracking of national occupational codes in pursuit of measuring creative industries policy outcomes. This paper commences with some description of empirical work that investigates creative occupations; however, the real point is to suggest that this type of detailed, occupation-based empirical work has important theoretical potential that has not yet been fully expended (though see Cunningham 2013; Hearn and Bridgstock 2014; Bakhshi, Freeman and Higgs 2013; Hartley and Potts 2014).

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This report is the first systematic analysis of employment in the UK’s creative and high-tech economies. It analyses their size, growth and distribution across the country. Key Findings • The UK’s creative economy had 2.6 million jobs in 2013, consisting of 1.7 million jobs in the creative industries (890,000 in creative occupations and 818,000 working in other roles) and 907,000 jobs in creative occupations outside of the creative industries. • The UK’s high–tech economy had 3.2 million jobs in 2013, 2.4 million of which were jobs in high–tech industries (825,000 in Science Technology Engineering and Mathematics (STEM) occupations and 1.6 million in other roles) and 806,000 jobs in STEM occupations outside of the high–tech industries. • Employment in the creative economy grew on average over three times faster than the workforce as a whole (4.3 per cent per annum (p.a.) vs 1.2 per cent p.a.) between 2011 and 2013. • Employment in the high–tech economy also grew faster than the workforce over this period (2.1 per cent p.a. vs 1.2 per cent p.a.). • The creative economy is particularly concentrated in London and the South East which together account for 43 per cent of the UK’s creative economy workforce. By contrast, 31 per cent of high-tech economy employment and 28 per cent of the UK’s workforce is located in this area.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

We show the first deterministic construction of an unconditionally secure multiparty computation (MPC) protocol in the passive adversarial model over black-box non-Abelian groups which is both optimal (secure against an adversary who possesses any tAbelian groups can be reduced to finding a t-reliable n-coloring of planar graphs, we show the construction of such a graph which allows a path from the input nodes to the output nodes when any t-party subset is in the possession of the adversary. Unlike the deterministic constructions from Desmedt et al. (2012) our construction has subexponential complexity and is optimal at the same time, i.e., it is secure for any t