320 resultados para Security Complex Theory
Resumo:
An economy is a coordinated system of distributed knowledge. Economic evolution occurs as knowledge grows and the structure of the system changes. This paper is about the role of markets in this process. Traditionally, the theory of markets has not been a central feature of evolutionary economics. This seems to be due to the orthodox view of markets as information-processing mechanisms for finding equilibria. But in economic evolution markets are actually knowledge-structuring mechanisms. What then is the relation between knowledge, information, markets and mechanisms? I argue that an evolutionary theory of markets, in the manner of Loasby (1999), requires a clear formulation of these relations. I suggest that a conception of knowledge and markets in terms of a graphical theory of complex systems furnishes precisely this.
Resumo:
Descriptions of the three sibling species of the Anopheles farauti complex in Australia, A. farauti Laveran (formerly A. farauti No. 1), A. hinesorum Schmidt sp.n. (formerly A. farauti No. 2) and A. torresiensis Schmidt sp.n. (formerly A. farauti No. 3) are provided. These species form a part of the punctulatus group, which contains the major malaria vectors in the southwest Pacific. Morphological markers are described for adult females, fourth instar larvae and pupae which identify most specimens, and are presented in keys.
Resumo:
Sec1p-like/Munc-18 (SM) proteins bind to t-SNAREs and inhibit ternary complex formation. Paradoxically, the absence of SM proteins does not result in constitutive membrane fusion, Here, we show that in yeast cells lacking the SM protein Vps45p, the t-SNARE Tlg2p is down-regulated, to undetectable levels, by rapid proteasomal degradation. In the absence of Vps45p, Tlg2p can be stabilized through abolition of proteasome activity. Surprisingly, the stabilized Tlg2p was targeted to the correct intracellular location. However, the stabilized Tlg2p is non-functional and unable to bind its cognate SNARE binding partners, Tlg1p and Vti1p, in the absence of Vps45p, A truncation mutant lacking the first 230 residues of Tlg2p no longer bound Vps45p but was able to form complexes with Tlg1p and Vti1p in the absence of the SM protein. These data provide us with two valuable insights into the function of SM proteins. First, SM proteins act as chaperone-like molecules for their cognate t-SNAREs, Secondly, SM proteins play an essential role in the activation process allowing their cognate t-SNARE to participate in ternary complex formation.
Resumo:
The SOX family of developmental transcription factors is known to play critical roles in cell lineage specification, fate determination and differentiation during development in diverse phyla. Their importance is underscored by their involvement in a number of human diseases and mouse mutants, and by targeted mutation in mice. SOX8 is broadly expressed during development and is located on human chromosome 16p and within the t-complex on mouse chromosome 17, in the vicinity of two mutations t(w18) and t(h20). Here we analyse mutant genomic DNA to show that the Sox8 gene locus lies outside the deletion regions of both t(w18) and t(h20) and between these deletions. These data exclude Sox8 from contributing to the t(w18) and t(h20) phenotypes, and provide an additional marker for structural characterization of this complex genomic region. Copyright (C) 2001 S. Karger AG, Basel.
Resumo:
A new parafermionic algebra associated with the homogeneous space A(2)((2))/U(1) and its corresponding Z-algebra have been recently proposed. In this paper, we give a free boson representation of the A(2)((2)) parafermion algebra in terms of seven free fields. Free field realizations of the parafermionic energy-momentum tensor and screening currents are also obtained. A new algebraic structure is discovered, which contains a W-algebra type primary field with spin two. (C) 2002 Published by Elsevier Science B.V.
Resumo:
Computer simulation of dynamical systems involves a phase space which is the finite set of machine arithmetic. Rounding state values of the continuous system to this grid yields a spatially discrete dynamical system, often with different dynamical behaviour. Discretization of an invertible smooth system gives a system with set-valued negative semitrajectories. As the grid is refined, asymptotic behaviour of the semitrajectories follows probabilistic laws which correspond to a set-valued Markov chain, whose transition probabilities can be explicitly calculated. The results are illustrated for two-dimensional dynamical systems obtained by discretization of fractional linear transformations of the unit disc in the complex plane.
Resumo:
Formulations of fuzzy integral equations in terms of the Aumann integral do not reflect the behavior of corresponding crisp models. Consequently, they are ill-adapted to describe physical phenomena, even when vagueness and uncertainty are present. A similar situation for fuzzy ODEs has been obviated by interpretation in terms of families of differential inclusions. The paper extends this formalism to fuzzy integral equations and shows that the resulting solution sets and attainability sets are fuzzy and far better descriptions of uncertain models involving integral equations. The investigation is restricted to Volterra type equations with mildly restrictive conditions, but the methods are capable of extensive generalization to other types and more general assumptions. The results are illustrated by integral equations relating to control models with fuzzy uncertainties.
Resumo:
This paper describes the inception, planning and first delivery of a security course as part of a postgraduate ecommerce program. The course is reviewed in terms of existing literature on security courses, the common body of knowledge established for security professionals and the job market into which students will graduate. The course described in this paper is a core subject for the e-commerce program. This program was established in 1999 and the first batch of students graduated in 2001. The program is offered at both postgraduate and undergraduate level. The work described here relates to the postgraduate offering. Students on this program are graduates of diverse disciplines and do not have a common e-commerce or business background.
Resumo:
We have previously reported successful trans-complementation of defective Kunjin virus genomic RNAs with a range of large lethal deletions in the nonstructural genes NSI, NS3, and NS5 (A. A. Khromykh et al., J. Virol. 74:3253-3263, 2000). In this study we have mapped further the minimal region in the NS5 gene essential for efficient trans-complementation of genome-length RNAs in repBHK cells to the first 316 of the 905 codons. To allow amplification and easy detection of complemented defective RNAs with deletions apparently affecting virus assembly, we have developed a dual replicon complementation system. In this system defective replicon RNAs with a deletion(s) in the nonstructural genes also encoded the puromycin resistance gene (PAC gene) and the reporter gene for beta-galactosidase (beta-Gal). Complementation of these defective replicon RNAs in repBHK cells resulted in expression of PAC and beta-Gal which allowed establishment of cell lines stably producing replicating defective RNAs by selection with puromycin and comparison of replication efficiencies of complemented defective RNAs by beta-Gal assay. Using this system we demonstrated that deletions in the C-terminal 434 codons of NS3 (codons 178 to 611) were complemented for RNA replication, while any deletions in the first 178 codons were not. None of the genome-length RNAs containing deletions in NS3 shown to be complementable for RNA replication produced secreted defective viruses during complementation in repBHK cells. In contrast, structural proteins produced from these complemented defective RNAs were able to package helper replicon RNA. The results define minimal regions in the NS3 and NS5 genes essential for the formation of complementable replication complex and show a requirement of NS3 in cis for virus assembly.
Resumo:
This study presents an investigation of the communicative behaviors and strategies employed in the stimulation and management of productive and destructive conflict in culturally heterogeneous workgroups. Using communication accommodation theory (CAT), we argue that the type and course of conflict in culturally heterogeneous workgroups is impacted by the communicative behaviors and strategies employed by group members during interactions. Analysis of data from participant observations, non-participant observations, semi-structured interviews, and self-report questionnaires support CA T-based predictions and provide fresh insights into the triggers and management strategies associated with conflict in culturally heterogeneous workgroups. In particular, results indicated that the more groups used discourse management Strategies, the more they experienced productive conflict. In addition, the use of explanation and checking of own and others' understanding was a major feature of productive conflict, while speech interruptions emerged as a strategy leading to potential destructive conflict. Groups where leaders emerged and assisted in reversing communication breakdowns were better able to manage their discourse, and achieved consensus On task processes. Contributions to the understanding of the triggers and the management of productive conflict in culturally heterogeneous workgroups are discussed.