220 resultados para trust evolution


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Well-established distinctions between amateur and professional are blurring as the impact of social media, changes in cultural consumption, and crises in copyright industries’ business models are felt across society and economy. I call this the increasingly rapid co-evolution of the formal market and informal household sectors and analyse it through the concept of ‘social network markets’ – individual choices are made on the basis of other’s choices and such networked preferencing is enhanced by the growing ubiquity of social media platforms. This may allow us better to understand sources of disruption and innovation in audiovisual production and distribution in wealthy Western markets which are as significant as those posed by informal practices outside the West. I examine what is happening around the monetization and professionalization of online video (YouTube, for example) and the socialization of professional production strategies (transmedia, for example) as innovation from the margins.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

“The Student Success Program (SSP) is a monitoring and early intervention program in operation at QUT designed to identify and support those students deemed to be at risk of disengaging for their learning and their institution” (Nelson, Quinn, Marrington & Clarke, 2011, p. 83). This report reflects on the development of the program since its inception in 2007. In acknowledging similar initiatives within the sector that monitor student learning engagement, the Nuts & Bolts session allows for identification and discussion of the critical success factors for these intervention and support programs.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Butterflies and primates are interesting for comparative color vision studies, because both have evolved middle- (M) and long-wavelength- (L) sensitive photopigments with overlapping absorbance spectrum maxima (lambda(max) values). Although positive selection is important for the maintenance of spectral variation within the primate pigments, it remains an open question whether it contributes similarly to the diversification of butterfly pigments. To examine this issue, we performed epimicrospectrophotometry on the eyes of five Limenitis butterfly species and found a 31-nm range of variation in the lambda(max) values of the L-sensitive photopigments (514-545 nm). We cloned partial Limenitis L opsin gene sequences and found a significant excess of replacement substitutions relative to polymorphisms among species. Mapping of these L photopigment lambda(max) values onto a phylogeny revealed two instances within Lepidoptera of convergently evolved L photopigment lineages whose lambda(max) values were blue-shifted. A codon-based maximum-likelihood analysis indicated that, associated with the two blue spectral shifts, four amino acid sites (Ile17Met, Ala64Ser, Asn70Ser, and Ser137Ala) have evolved substitutions in parallel and exhibit significant d(N)/d(S) >1. Homology modeling of the full-length Limenitis arthemis astyanax L opsin placed all four substitutions within the chromophore-binding pocket. Strikingly, the Ser137Ala substitution is in the same position as a site that in primates is responsible for a 5- to 7-nm blue spectral shift. Our data show that some of the same amino acid sites are under positive selection in the photopigments of both butterflies and primates, spanning an evolutionary distance >500 million years.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Background. Recent reports have indicated that single-stranded DNA (ssDNA) viruses in the taxonomic families Geminiviridae, Parvoviridae and Anellovirus may be evolving at rates of ∼10-4 substitutions per site per year (subs/site/year). These evolution rates are similar to those of RNA viruses and are surprisingly high given that ssDNA virus replication involves host DNA polymerases with fidelities approximately 10 000 times greater than those of error-prone viral RNA polymerases. Although high ssDNA virus evolution rates were first suggested in evolution experiments involving the geminivirus maize streak virus (MSV), the evolution rate of this virus has never been accurately measured. Also, questions regarding both the mechanistic basis and adaptive value of high geminivirus mutation rates remain unanswered. Results. We determined the short-term evolution rate of MSV using full genome analysis of virus populations initiated from cloned genomes. Three wild type viruses and three defective artificial chimaeric viruses were maintained in planta for up to five years and displayed evolution rates of between 7.4 × 10-4 and 7.9 × 10-4 subs/site/year. Conclusion. These MSV evolution rates are within the ranges observed for other ssDNA viruses and RNA viruses. Although no obvious evidence of positive selection was detected, the uneven distribution of mutations within the defective virus genomes suggests that some of the changes may have been adaptive. We also observed inter-strand nucleotide substitution imbalances that are consistent with a recent proposal that high mutation rates in geminiviruses (and possibly ssDNA viruses in general) may be due to mutagenic processes acting specifically on ssDNA molecules. © 2008 Walt et al; licensee BioMed Central Ltd.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Background Maize streak virus -strain A (MSV-A; Genus Mastrevirus, Family Geminiviridae), the maize-adapted strain of MSV that causes maize streak disease throughout sub-Saharan Africa, probably arose between 100 and 200 years ago via homologous recombination between two MSV strains adapted to wild grasses. MSV recombination experiments and analyses of natural MSV recombination patterns have revealed that this recombination event entailed the exchange of the movement protein - coat protein gene cassette, bounded by the two genomic regions most prone to recombination in mastrevirus genomes; the first surrounding the virion-strand origin of replication, and the second around the interface between the coat protein gene and the short intergenic region. Therefore, aside from the likely adaptive advantages presented by a modular exchange of this cassette, these specific breakpoints may have been largely predetermined by the underlying mechanisms of mastrevirus recombination. To investigate this hypothesis, we constructed artificial, low-fitness, reciprocal chimaeric MSV genomes using alternating genomic segments from two MSV strains; a grass-adapted MSV-B, and a maize-adapted MSV-A. Between them, each pair of reciprocal chimaeric genomes represented all of the genetic material required to reconstruct - via recombination - the highly maize-adapted MSV-A genotype, MSV-MatA. We then co-infected a selection of differentially MSV-resistant maize genotypes with pairs of reciprocal chimaeras to determine the efficiency with which recombination would give rise to high-fitness progeny genomes resembling MSV-MatA. Results Recombinants resembling MSV-MatA invariably arose in all of our experiments. However, the accuracy and efficiency with which the MSV-MatA genotype was recovered across all replicates of each experiment depended on the MSV susceptibility of the maize genotypes used and the precise positions - in relation to known recombination hotspots - of the breakpoints required to re-create MSV-MatA. Although the MSV-sensitive maize genotype gave rise to the greatest variety of recombinants, the measured fitness of each of these recombinants correlated with their similarity to MSV-MatA. Conclusions The mechanistic predispositions of different MSV genomic regions to recombination can strongly influence the accessibility of high-fitness MSV recombinants. The frequency with which the fittest recombinant MSV genomes arise also correlates directly with the escalating selection pressures imposed by increasingly MSV-resistant maize hosts.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Algan and Cahuc (2010) argue that “inherited trust” is a key factor in explaining growth rates across countries. They derive a measure of inherited trust by linking respondents’ “home countries: in the United States General Social Survey (1972-2004) and the 2000 wave of the World Values Survey. Algan and Cahuc then estimate trust levels for people born before 1910 (inherited trust in 1935) and afterwards (inherited trust in 2000). They show a strong link between economic growth rates and inherited trust. We do not challenge this result, but we do argue that: (1) The 2000 World Values Survey has many anomalous results; (2) the estimates for inherited trust in 1935 are mostly based upon tiny samples for most ethnic heritage groups in the General Social Survey; and (3) Algan and Cahuc’s findings are based upon two-tailed rather than one-tailed tests. We reestimate their model using the more reliable waves of the World Values Survey and find much weaker relationships between inherited trust in 1935 and trust in the home country. We also suggest caution in the overall measure of inherited trust in 1935.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

A Delay Tolerant Network (DTN) is one where nodes can be highly mobile, with long message delay times forming dynamic and fragmented networks. Traditional centralised network security is difficult to implement in such a network, therefore distributed security solutions are more desirable in DTN implementations. Establishing effective trust in distributed systems with no centralised Public Key Infrastructure (PKI) such as the Pretty Good Privacy (PGP) scheme usually requires human intervention. Our aim is to build and compare different de- centralised trust systems for implementation in autonomous DTN systems. In this paper, we utilise a key distribution model based on the Web of Trust principle, and employ a simple leverage of common friends trust system to establish initial trust in autonomous DTN’s. We compare this system with two other methods of autonomously establishing initial trust by introducing a malicious node and measuring the distribution of malicious and fake keys. Our results show that the new trust system not only mitigates the distribution of fake malicious keys by 40% at the end of the simulation, but it also improved key distribution between nodes. This paper contributes a comparison of three de-centralised trust systems that can be employed in autonomous DTN systems.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Power system stabilizer (PSS) is one of the most important controllers in modern power systems for damping low frequency oscillations. Many efforts have been dedicated to design the tuning methodologies and allocation techniques to obtain optimal damping behaviors of the system. Traditionally, it is tuned mostly for local damping performance, however, in order to obtain a globally optimal performance, the tuning of PSS needs to be done considering more variables. Furthermore, with the enhancement of system interconnection and the increase of system complexity, new tools are required to achieve global tuning and coordination of PSS to achieve optimal solution in a global meaning. Differential evolution (DE) is a recognized as a simple and powerful global optimum technique, which can gain fast convergence speed as well as high computational efficiency. However, as many other evolutionary algorithms (EA), the premature of population restricts optimization capacity of DE. In this paper, a modified DE is proposed and applied for optimal PSS tuning of 39-Bus New-England system. New operators are introduced to reduce the probability of getting premature. To investigate the impact of system conditions on PSS tuning, multiple operating points will be studied. Simulation result is compared with standard DE and particle swarm optimization (PSO).

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Cometary and interplanetary dust particles (IDP) are compared, and the mineralogical evolution of comet nuclei is discussed. Chondritic IDP have properties consistent with properties expected for cometary dust. The complex and varied mineralogy of these particles may indicate mineral alteration processes that occur in comet nuclei. Depending on the thermal budget of a comet, the upper few meters of nucleus material may maintain temperatures within regimes of hydrocryogenic (200 to 237K) and low-temperature aqueous (274 to 400K) alteration. Thus, layer silicates, carbonates, and sulfates may be important components of cometary dust and, correspondingly are common constituents of chondritic IDPs. Alteration of comet starting materials may be a common occurrence, and depends on the specific physical and chemical properties of each individual comet.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

A firm, as a dynamic, evolving, and quasi-autonomous system of knowledge production and application, develops knowledge management capability (KMC) through strategic learning in order to sustain competitive advantages in a dynamic environment. Knowledge governance mechanisms and knowledge processes connect and interact with each other forming learning mechanisms, which carry out double loop learning that drives genesis and evolution of KMC to modify operating routines that effect desired performance. This paper reports a study that was carried out within a context of construction contractors, a type of project-based firms, operating within the dynamic Hong Kong construction market. A multiple-case design was used to incorporate evidence from the literature and interviews, with the help of system dynamics modeling, to visualize the evolution of KMC. The study demonstrates the feasibility to visualize how a firm's KMC matches its operating environment over time. The findings imply that knowledge management (KM) applications can be better planned and controlled through evaluation of KM performance over time from a capability perspective.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Smartphones started being targets for malware in June 2004 while malware count increased steadily until the introduction of a mandatory application signing mechanism for Symbian OS in 2006. From this point on, only few news could be read on this topic. Even despite of new emerging smartphone platforms, e.g. android and iPhone, malware writers seemed to lose interest in writing malware for smartphones giving users an unappropriate feeling of safety. In this paper, we revisit smartphone malware evolution for completing the appearance list until end of 2008. For contributing to smartphone malware research, we continue this list by adding descriptions on possible techniques for creating the first malware(s) for Android platform. Our approach involves usage of undocumented Android functions enabling us to execute native Linux application even on retail Android devices. This can be exploited to create malicious Linux applications and daemons using various methods to attack a device. In this manner, we also show that it is possible to bypass the Android permission system by using native Linux applications.