906 resultados para item response theory


Relevância:

40.00% 40.00%

Publicador:

Resumo:

A large number of processes are involved in the pathogenesis of atherosclerosis but it is unclear which of them play a rate-limiting role. One way of resolving this problem is to investigate the highly non-uniform distribution of disease within the arterial system; critical steps in lesion development should be revealed by identifying arterial properties that differ between susceptible and protected sites. Although the localisation of atherosclerotic lesions has been investigated intensively over much of the 20th century, this review argues that the factor determining the distribution of human disease has only recently been identified. Recognition that the distribution changes with age has, for the first time, allowed it to be explained by variation in transport properties of the arterial wall; hitherto, this view could only be applied to experimental atherosclerosis in animals. The newly discovered transport variations which appear to play a critical role in the development of adult disease have underlying mechanisms that differ from those elucidated for the transport variations relevant to experimental atherosclerosis: they depend on endogenous NO synthesis and on blood flow. Manipulation of transport properties might have therapeutic potential. Copyright (C) 2004 S. Karger AG, Basel.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

This paper considers how the delivery of public leisure services in Britain has been affected by the imposition of Compulsory Competitive Tendering (CCT) on the management of facilities. In particular, it focuses on the changing relationship between the central and local levels of government, theorising a tripartite local response to CCT, incorporating local statism, post-Fordist rejection of CCT and post- Fordist compliance with the aims of the central administration. The paper then discusses the actual implementation of CCT, relating the theorised responses to those witnessed in practice. This results in the delineation of a continuum of stances, ranging from pragmatic forms of local statism, such as the protection of the former direct labour force, to centrist attempts to combine the ethics of socialism with the mechanics of the market, to an outright rejection of state organisation and control. The paper concludes that although legitimate attempts have been made to protect local services, the outcome of the CCT process has undoubtedly been the regeneration of public leisure provision away from its service roots towards a market model of provision.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

In a conjuncture marked by the “resurgence of religion,” the problem of historical materialism’s relation to religious ideologies has acquired a new urgency. The work of Roland Boer, recently awarded the Deutscher Prize for his magnum opus on Marxism and Theology poses this question from a surprising perspective. While his main claim is that religious influences in Marxist theory represent a sort of theological unconscious in historical materialism, at the same time Boer also advances an original Marxist interpretation of the Abrahamic religions, especially Christianity. This line of research, which extends from his dissertation on Jameson and Jeroboam through to his most recent work on The Sacred Economy, proposes that theology is a reflective representation of the social totality. In this article, I criticise Boer’s valorisation of theology as a practical discourse that is post-ideological but non-theoretical, and conclude by indicating an alternative.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

In this work it is proposed an optimized dynamic response of parallel operation of two single-phase inverters with no control communication. The optimization aims the tuning of the slopes of P-ω and Q-V curves so that the system is stable, damped and minimum settling time. The slopes are tuned using an algorithm based on evolutionary theory. Simulation and experimental results are presented to prove the feasibility of the proposed approach. © 2010 IEEE.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

National Highway Traffic Safety Administration, Washington, D.C.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

"Project 7719, Task 17124."

Relevância:

40.00% 40.00%

Publicador:

Resumo:

The convergence on the Big Five in personality theory has produced a demand for efficient yet psychometrically sound measures. Therefore, five single-item measures, using bipolar response scales, were constructed to measure the Big Five and evaluated in terms of their convergent and off-diagonal divergent properties, their pattern of criterion correlations and their reliability when compared with four longer Big Five measures. In a combined sample (N?=?791) the Single-Item Measures of Personality (SIMP) demonstrated a mean convergence of r?=?0.61 with the longer scales. The SIMP also demonstrated acceptable reliability, self–other accuracy, and divergent correlations, and a closely similar pattern of criterion correlations when compared with the longer scales. It is concluded that the SIMP offer a reasonable alternative to longer scales, balancing the demands of brevity versus reliability and validity.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

Abstract We present ideas about creating a next generation Intrusion Detection System (IDS) based on the latest immunological theories. The central challenge with computer security is determining the difference between normal and potentially harmful activity. For half a century, developers have protected their systems by coding rules that identify and block specific events. However, the nature of current and future threats in conjunction with ever larger IT systems urgently requires the development of automated and adaptive defensive tools. A promising solution is emerging in the form of Artificial Immune Systems (AIS): The Human Immune System (HIS) can detect and defend against harmful and previously unseen invaders, so can we not build a similar Intrusion Detection System (IDS) for our computers? Presumably, those systems would then have the same beneficial properties as HIS like error tolerance, adaptation and self-monitoring. Current AIS have been successful on test systems, but the algorithms rely on self-nonself discrimination, as stipulated in classical immunology. However, immunologist are increasingly finding fault with traditional self-nonself thinking and a new 'Danger Theory' (DT) is emerging. This new theory suggests that the immune system reacts to threats based on the correlation of various (danger) signals and it provides a method of 'grounding' the immune response, i.e. linking it directly to the attacker. Little is currently understood of the precise nature and correlation of these signals and the theory is a topic of hot debate. It is the aim of this research to investigate this correlation and to translate the DT into the realms of computer security, thereby creating AIS that are no longer limited by self-nonself discrimination. It should be noted that we do not intend to defend this controversial theory per se, although as a deliverable this project will add to the body of knowledge in this area. Rather we are interested in its merits for scaling up AIS applications by overcoming self-nonself discrimination problems.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

Abstract We present ideas about creating a next generation Intrusion Detection System (IDS) based on the latest immunological theories. The central challenge with computer security is determining the difference between normal and potentially harmful activity. For half a century, developers have protected their systems by coding rules that identify and block specific events. However, the nature of current and future threats in conjunction with ever larger IT systems urgently requires the development of automated and adaptive defensive tools. A promising solution is emerging in the form of Artificial Immune Systems (AIS): The Human Immune System (HIS) can detect and defend against harmful and previously unseen invaders, so can we not build a similar Intrusion Detection System (IDS) for our computers? Presumably, those systems would then have the same beneficial properties as HIS like error tolerance, adaptation and self-monitoring. Current AIS have been successful on test systems, but the algorithms rely on self-nonself discrimination, as stipulated in classical immunology. However, immunologist are increasingly finding fault with traditional self-nonself thinking and a new 'Danger Theory' (DT) is emerging. This new theory suggests that the immune system reacts to threats based on the correlation of various (danger) signals and it provides a method of 'grounding' the immune response, i.e. linking it directly to the attacker. Little is currently understood of the precise nature and correlation of these signals and the theory is a topic of hot debate. It is the aim of this research to investigate this correlation and to translate the DT into the realms of computer security, thereby creating AIS that are no longer limited by self-nonself discrimination. It should be noted that we do not intend to defend this controversial theory per se, although as a deliverable this project will add to the body of knowledge in this area. Rather we are interested in its merits for scaling up AIS applications by overcoming self-nonself discrimination problems.