65 resultados para paradigms
Resumo:
Previous research has suggested collateral has the role of sorting entrepreneurs either by observed risk or by private information. In order to test these roles, this paper develops a model which incorporates a signalling process (sorting by observed risk) into the design of an incentivecompatible menu of loan contracts which works as a self-selection mechanism (sorting by private information). It then tests this Sorting by Signalling and Self-Selection Model, using the 1998 US Survey of Small Business Finances. It reports for the first time that: high type entrepreneurs are more likely to pledge collateral and pay a lower interest rate; and entrepreneurs who transfer good signals enjoy better contracts than those transferring bad signals. These findings suggest that the Sorting by Signalling and Self-Selection Model sheds more light on entrepreneurial debt finance than either the sorting-by-observed-risk or the sorting-by-private information paradigms on their own.
Resumo:
Among all the paradigms in economic theory, the theoretical predictions of oligopoly were the first to be examined in the laboratory. In this chapter, instead of surveying all the experiments with few sellers, we adopt a narrower definition of the term “oligopoly”, and focus on the experiments that were directly inspired by the basic oligopolistic models of Cournot, Bertrand, Hotelling, Stackelberg, and some extensions. Most of the experiments we consider in this chapter have been run in the last three decades. This literature can be considered as a new wave of experimental works aiming at representing basic oligopolistic markets and testing their properties. The chapter is divided into independent sections referring to different parts of the oligopolistic theory, including both monopoly as well as a number of extensions of the basic models, which have been chosen with the aim of providing a representative list of the relevant experimental findings.
Resumo:
Background: Some studies have proven that a conventional visual brain computer interface (BCI) based on overt attention cannot be used effectively when eye movement control is not possible. To solve this problem, a novel visual-based BCI system based on covert attention and feature attention has been proposed and was called the gaze-independent BCI. Color and shape difference between stimuli and backgrounds have generally been used in examples of gaze-independent BCIs. Recently, a new paradigm based on facial expression changes has been presented, and obtained high performance. However, some facial expressions were so similar that users couldn't tell them apart, especially when they were presented at the same position in a rapid serial visual presentation (RSVP) paradigm. Consequently, the performance of the BCI is reduced. New Method: In this paper, we combined facial expressions and colors to optimize the stimuli presentation in the gaze-independent BCI. This optimized paradigm was called the colored dummy face pattern. It is suggested that different colors and facial expressions could help users to locate the target and evoke larger event-related potentials (ERPs). In order to evaluate the performance of this new paradigm, two other paradigms were presented, called the gray dummy face pattern and the colored ball pattern. Comparison with Existing Method(s): The key point that determined the value of the colored dummy faces stimuli in BCI systems was whether the dummy face stimuli could obtain higher performance than gray faces or colored balls stimuli. Ten healthy participants (seven male, aged 21–26 years, mean 24.5 ± 1.25) participated in our experiment. Online and offline results of four different paradigms were obtained and comparatively analyzed. Results: The results showed that the colored dummy face pattern could evoke higher P300 and N400 ERP amplitudes, compared with the gray dummy face pattern and the colored ball pattern. Online results showed that the colored dummy face pattern had a significant advantage in terms of classification accuracy (p < 0.05) and information transfer rate (p < 0.05) compared to the other two patterns. Conclusions: The stimuli used in the colored dummy face paradigm combined color and facial expressions. This had a significant advantage in terms of the evoked P300 and N400 amplitudes and resulted in high classification accuracies and information transfer rates. It was compared with colored ball and gray dummy face stimuli.
Resumo:
Hormonal ligands for the nuclear receptor superfamily have at least two interacting mechanisms of action: 1) classical transcriptional regulation of target genes (genomic mechanisms); and 2) nongenomic actions that are initiated at the cell membrane, which could impact transcription. Although transcriptional mechanisms are increasingly well understood, membrane-initiated actions of these ligands are incompletely understood. Historically, this has led to a considerable divergence of thought in the molecular endocrine field. We have attempted to uncover principles of hormone action that are relevant to membrane-initiated actions of estrogens. There is evidence that the membrane-limited actions of hormones, particularly estrogens, involve the rapid activation of kinases and the release of calcium. Membrane actions of estrogens, which activate these rapid signaling cascades, can also potentiate nuclear transcription. These signaling cascades may occur in parallel or in series but subsequently converge at the level of modification of transcriptionally relevant molecules such as nuclear receptors and/or coactivators. In addition, other hormones or neurotransmitters may also activate cascades to crosstalk with estrogen receptor-mediated transcription. The idea of synergistic coupling between membrane-initiated and genomic actions of hormones fundamentally revises the paradigms of cell signaling in neuroendocrinology.
Resumo:
IoT, crowd sensing and smart cities will be a traffic challenge. New communication paradigms as asynchronous messaging carry and forward, scheduled delivery and temporary storage will be needed to manage network resources dynamically. Since traditional end to end security will require keeping security associations among devices for a long time draining valuable resources, we propose and evaluate the use of proxy re-encryption protocols in these scenarios as a solution for reliable and flexible security.