915 resultados para majority rule
Resumo:
This paper uses general equilibrium simulations to explore the role ofresidential mobility in shaping the impact of different types of private school voucher policies. In particular, general vouchers available to all residents in the state are compared to vouchers specifically targeted to either underprivileged school districts or underprivileged households. The simulations are derived from a three-community mo deI of low, middle and high income school districts (calibrated to New York data), where each school district is composed of multiple types of neighborhoods that may vary in house quality as well as the leveI of neighborhood extemalities. Households that differ in both their income and in the ability leveI of their children choose between school districts, between neighborhoods within their school district, and between the local public school or a menu of private school altematives.Local public school quality within a district is endogenously determined bya combination of the average peer quality of public school attending children as well as local property and state income tax supported spending. Financial support (above a required state minimum) is set by local majority rule. Finally, there exists the potential for a private school market composed of competitive schools that face production technologies similar to those ofpublic schools but who set tuition and admissions policies to maximize profits. In tbis model, it is demonstrated that school district targeted vouchers are similar in their impact to non-targeted vouchers but vastIy different from vouchers targeted to low income households. Furthermore, strong migration effects are shown to significantly improve the likely equity consequences of voucher programs.
Resumo:
Fundação de Amparo à Pesquisa do Estado de São Paulo (FAPESP)
Resumo:
En el presente estudio se aborda un tema, el del régimen jurídico de la renuncia a la acción social de responsabilidad, que ha sido objeto de un escaso tratamiento por parte de la doctrina española. Estamos ante una institución controvertida, que regula la posibilidad de que una sociedad de capital abandone voluntariamente las pretensiones indemnizatorias que pudiera ostentar frente a alguno de sus administradores por los daños que éstos hubieran ocasionado en el patrimonio social como consecuencia del incumplimiento sus deberes de diligencia y lealtad. El hecho de que una sociedad de capital pueda acordar esta renuncia es un claro indicio del carácter dispositivo de las normas que regulan la responsabilidad de los administradores frente a la sociedad. Después de abordar de los antecedentes y evolución histórica de la renuncia a la acción social, la primera parte del estudio se centra en el análisis del ámbito material y temporal de su régimen jurídico, concluyendo que éste regula no sólo la renuncia o la transacción procesal, sino que se aplica cualquier acuerdo de la junta general que tenga como efecto una exoneración total o parcial de los administradores. La segunda parte del estudio profundiza en el régimen jurídico de la renuncia, haciendo hincapié en el derecho de veto que la Ley española y el Codice civile reconocen a la minoría y que se configura como una auténtica excepción al principio mayoritario que rige, con carácter general, la formación de la voluntad social. En el último capítulo se analizan los efectos de la renuncia acordada por la junta sobre la legitimación extraordinaria que ostentan los socios minoritarios y los acreedores sociales para el ejercicio de la acción social.
Resumo:
This study aims to analyze citizen participation in state policy decisions, as an essential element of legitimacy in the branches of government, especially in the sphere of the Executive, in the context of deliberative democracy. But, this study still has the desideratum to understand the citizen's role in public life, especially in the sphere of the Executive Branch, in order to effect the Fundamental Right to Public Administration proba, efficient and honest. Thus, to achieve this mister, the proposal is to expose the pesamento the classic contractualist, Thomas Hobbes, John Locke and Rousseau about the legitimacy of governments, through the statutes, and the question of the general will and majority rule as well how to present the comments of Thomas Jefferson on popular sovereignty and dialogical citizen participation in matters of local interest. After, it will be studied the theories of Fundamental Rights in order to demonstrate the need for the Civil Service should be veiled in a more specific custody rights, given the deep crisis in the Public Administrative practice due, especially, corruption. On the other side, the fundamentality of management also covers the aspect of the development of cities, which decisively affects the development of man, which, to join a deliberative governance program needs to be politicized, adopting full participation, dialogue, as duty citizen. Furthermore, taking as most heart, will be presented the doctrine of Jürgen Habermas, whose Discourse Theory element is to be followed for the implementation of a This study aims to analyze citizen participation in state policy decisions, as an essential element of legitimacy in the branches of the government, especially in the sphere of the Executive, in the context of deliberative democracy. But, this study also has the desideratum to understand the citizen's role in public life, especially in the sphere of the Executive Branch, in order to actualize the Fundamental Right to a just, efficient and honest Public Administration. Thus, to achieve this necessity, the proposal is to expose the thought of the classic contractualist thinkers, Thomas Hobbes, John Locke and Rousseau about the legitimacy of governments, through the statutes, and the question of the general will and majority rule as well as how to present the comments of Thomas Jefferson on popular sovereignty and dialogical citizen participation in matters of local interest. Later on, the theories of Fundamental Rights will be studied in order to demonstrate that the need for the Civil Service should be veiled in a more specific right custody, given the deep crisis in the Public Administrative practice due to, especially, the corruption. On the other hand, the fundamentality of management also covers the aspect of the development of cities, which decisively affects the development of man, who, to join a deliberative governance program, needs to be politicized, adopting full participation and dialogue as a citizen responsibility. Furthermore, taking as the major heart, it will be presented the doctrine of Jürgen Habermas whose Discourse Theory element is to be followed for the implementation of a broad deliberative and emancipatory democracy, with effective citizen participation. It will also be considered the Condorcet Constitution Project as a comparative link in the linking of the public deliberative will, and the Central Power, in the face of the Theory of “Sluice” Habermas. The proposal, based on communicative action, must allow a continuous flux and influx process of social interests towards the exercise of administrative power. The dialogical deal, brought to the center of the decisions, will allow discussions in the public scope, and may contribute to the legitimacy of government actions, inasmuch as it creates the feeling of politicization demanded by the man in a democratic state.
Resumo:
Objective:We investigated to what extent changes in metabolic rate and composition of weight loss explained the less-than-expected weight loss in obese men and women during a diet-plus-exercise intervention.Design:In all, 16 obese men and women (41±9 years; body mass index (BMI) 39±6 kg m(-2)) were investigated in energy balance before, after and twice during a 12-week very-low-energy diet(565-650 kcal per day) plus exercise (aerobic plus resistance training) intervention. The relative energy deficit (EDef) from baseline requirements was severe (74%-87%). Body composition was measured by deuterium dilution and dual energy X-ray absorptiometry, and resting metabolic rate (RMR) was measured by indirect calorimetry. Fat mass (FM) and fat-free mass (FFM) were converted into energy equivalents using constants 9.45 kcal per g FM and 1.13 kcal per g FFM. Predicted weight loss was calculated from the EDef using the '7700 kcal kg(-1) rule'.Results:Changes in weight (-18.6±5.0 kg), FM (-15.5±4.3 kg) and FFM (-3.1±1.9 kg) did not differ between genders. Measured weight loss was on average 67% of the predicted value, but ranged from 39% to 94%. Relative EDef was correlated with the decrease in RMR (R=0.70, P<0.01), and the decrease in RMR correlated with the difference between actual and expected weight loss (R=0.51, P<0.01). Changes in metabolic rate explained on average 67% of the less-than-expected weight loss, and variability in the proportion of weight lost as FM accounted for a further 5%. On average, after adjustment for changes in metabolic rate and body composition of weight lost, actual weight loss reached 90% of the predicted values.Conclusion:Although weight loss was 33% lower than predicted at baseline from standard energy equivalents, the majority of this differential was explained by physiological variables. Although lower-than-expected weight loss is often attributed to incomplete adherence to prescribed interventions, the influence of baseline calculation errors and metabolic downregulation should not be discounted.
Resumo:
The mean majority deficit in a two-tier voting system is a function of the partition of the population. We derive a new square-root rule: For odd-numbered population sizes and equipopulous units the mean majority deficit is maximal when the member size of the units in the partition is close to the square root of the population size. Furthermore, within the partitions into roughly equipopulous units, partitions with small even numbers of units or small even-sized units yield high mean majority deficits. We discuss the implications for the winner-takes-all system in the US Electoral College.
Resumo:
Intrusion Detection Systems (IDSs) provide an important layer of security for computer systems and networks, and are becoming more and more necessary as reliance on Internet services increases and systems with sensitive data are more commonly open to Internet access. An IDS’s responsibility is to detect suspicious or unacceptable system and network activity and to alert a systems administrator to this activity. The majority of IDSs use a set of signatures that define what suspicious traffic is, and Snort is one popular and actively developing open-source IDS that uses such a set of signatures known as Snort rules. Our aim is to identify a way in which Snort could be developed further by generalising rules to identify novel attacks. In particular, we attempted to relax and vary the conditions and parameters of current Snort rules, using a similar approach to classic rule learning operators such as generalisation and specialisation. We demonstrate the effectiveness of our approach through experiments with standard datasets and show that we are able to detect previously undetected variants of various attacks. We conclude by discussing the general effectiveness and appropriateness of generalisation in Snort based IDS rule processing. Keywords: anomaly detection, intrusion detection, Snort, Snort rules
Resumo:
Intrusion Detection Systems (IDSs) provide an important layer of security for computer systems and networks, and are becoming more and more necessary as reliance on Internet services increases and systems with sensitive data are more commonly open to Internet access. An IDS’s responsibility is to detect suspicious or unacceptable system and network activity and to alert a systems administrator to this activity. The majority of IDSs use a set of signatures that define what suspicious traffic is, and Snort is one popular and actively developing open-source IDS that uses such a set of signatures known as Snort rules. Our aim is to identify a way in which Snort could be developed further by generalising rules to identify novel attacks. In particular, we attempted to relax and vary the conditions and parameters of current Snort rules, using a similar approach to classic rule learning operators such as generalisation and specialisation. We demonstrate the effectiveness of our approach through experiments with standard datasets and show that we are able to detect previously undetected variants of various attacks. We conclude by discussing the general effectiveness and appropriateness of generalisation in Snort based IDS rule processing. Keywords: anomaly detection, intrusion detection, Snort, Snort rules
Resumo:
In the last decade the Sznajd model has been successfully employed in modeling some properties and scale features of both proportional and majority elections. We propose a version of the Sznajd model with a generalized bounded confidence rule-a rule that limits the convincing capability of agents and that is essential to allow coexistence of opinions in the stationary state. With an appropriate choice of parameters it can be reduced to previous models. We solved this model both in a mean-field approach (for an arbitrary number of opinions) and numerically in a Barabaacutesi-Albert network (for three and four opinions), studying the transient and the possible stationary states. We built the phase portrait for the special cases of three and four opinions, defining the attractors and their basins of attraction. Through this analysis, we were able to understand and explain discrepancies between mean-field and simulation results obtained in previous works for the usual Sznajd model with bounded confidence and three opinions. Both the dynamical system approach and our generalized bounded confidence rule are quite general and we think it can be useful to the understanding of other similar models.
Resumo:
Background: Septins belong to the GTPase superclass of proteins and have been functionally implicated in cytokinesis and the maintenance of cellular morphology. They are found in all eukaryotes, except in plants. In mammals, 14 septins have been described that can be divided into four groups. It has been shown that mammalian septins can engage in homo- and heterooligomeric assemblies, in the form of filaments, which have as a basic unit a hetero-trimeric core. In addition, it has been speculated that the septin filaments may serve as scaffolds for the recruitment of additional proteins. Methodology/Principal Findings: Here, we performed yeast two-hybrid screens with human septins 1-10, which include representatives of all four septin groups. Among the interactors detected, we found predominantly other septins, confirming the tendency of septins to engage in the formation of homo- and heteropolymeric filaments. Conclusions/Significance: If we take as reference the reported arrangement of the septins 2, 6 and 7 within the heterofilament, (7-6-2-2-6-7), we note that the majority of the observed interactions respect the ""group rule"", i.e. members of the same group (e. g. 6, 8, 10 and 11) can replace each other in the specific position along the heterofilament. Septins of the SEPT6 group preferentially interacted with septins of the SEPT2 group (p<0.001), SEPT3 group (p<0.001) and SEPT7 group (p<0.001). SEPT2 type septins preferentially interacted with septins of the SEPT6 group (p<0.001) aside from being the only septin group which interacted with members of its own group. Finally, septins of the SEPT3 group interacted preferentially with septins of the SEPT7 group (p<0.001). Furthermore, we found non-septin interactors which can be functionally attributed to a variety of different cellular activities, including: ubiquitin/sumoylation cycles, microtubular transport and motor activities, cell division and the cell cycle, cell motility, protein phosphorylation/signaling, endocytosis, and apoptosis.
Resumo:
The existence of juxtaposed regions of distinct cultures in spite of the fact that people's beliefs have a tendency to become more similar to each other's as the individuals interact repeatedly is a puzzling phenomenon in the social sciences. Here we study an extreme version of the frequency-dependent bias model of social influence in which an individual adopts the opinion shared by the majority of the members of its extended neighborhood, which includes the individual itself. This is a variant of the majority-vote model in which the individual retains its opinion in case there is a tie among the neighbors' opinions. We assume that the individuals are fixed in the sites of a square lattice of linear size L and that they interact with their nearest neighbors only. Within a mean-field framework, we derive the equations of motion for the density of individuals adopting a particular opinion in the single-site and pair approximations. Although the single-site approximation predicts a single opinion domain that takes over the entire lattice, the pair approximation yields a qualitatively correct picture with the coexistence of different opinion domains and a strong dependence on the initial conditions. Extensive Monte Carlo simulations indicate the existence of a rich distribution of opinion domains or clusters, the number of which grows with L(2) whereas the size of the largest cluster grows with ln L(2). The analysis of the sizes of the opinion domains shows that they obey a power-law distribution for not too large sizes but that they are exponentially distributed in the limit of very large clusters. In addition, similarly to other well-known social influence model-Axelrod's model-we found that these opinion domains are unstable to the effect of a thermal-like noise.
Resumo:
Drosophila pair-rule genes are expressed in striped patterns with a precise order of overlap between stripes of different genes. We investigated the role of Giant (Gt) in the regulation of even-skipped, hairy, runt, and fushi tarazu stripes formed in the vicinity of Gt expression domains. In gt null embryos, specific stripes of eve, h, run, and ftz are disrupted. With an ectopic expression system, we verified that stripes affected in the mutant are also repressed. Simultaneously hybridizing gt misxpressing embryos with two pair-rule gene probes, we were able to distinguish differences in the repression of pairs of stripes that overlap extensively. Together, our results showed Gt repression roles in the regulation of two groups of partially overlapping stripes and that Gt morphogen activity is part of the mechanism responsible for the differential positioning of these stripes borders. We discuss the possibility that other factors regulate Gt stripe targets as well. Developmental Dynamics 239:2989-2999, 2010. (C) 2010 Wiley-Liss, Inc.
Resumo:
The first problem of the Seleucid mathematical cuneiform tablet BM 34 568 calculates the diagonal of a rectangle from its sides without resorting to the Pythagorean rule. For this reason, it has been a source of discussion among specialists ever since its first publication. but so far no consensus in relation to its mathematical meaning has been attained. This paper presents two new interpretations of the scribe`s procedure. based on the assumption that he was able to reduce the problem to a standard Mesopotamian question about reciprocal numbers. These new interpretations are then linked to interpretations of the Old Babylonian tablet Plimpton 322 and to the presence of Pythagorean triples in the contexts of Old Babylonian and Hellenistic mathematics. (C) 2007 Elsevier Inc. All rights reserved.
Resumo:
This paper describes the modeling of a weed infestation risk inference system that implements a collaborative inference scheme based on rules extracted from two Bayesian network classifiers. The first Bayesian classifier infers a categorical variable value for the weed-crop competitiveness using as input categorical variables for the total density of weeds and corresponding proportions of narrow and broad-leaved weeds. The inferred categorical variable values for the weed-crop competitiveness along with three other categorical variables extracted from estimated maps for the weed seed production and weed coverage are then used as input for a second Bayesian network classifier to infer categorical variables values for the risk of infestation. Weed biomass and yield loss data samples are used to learn the probability relationship among the nodes of the first and second Bayesian classifiers in a supervised fashion, respectively. For comparison purposes, two types of Bayesian network structures are considered, namely an expert-based Bayesian classifier and a naive Bayes classifier. The inference system focused on the knowledge interpretation by translating a Bayesian classifier into a set of classification rules. The results obtained for the risk inference in a corn-crop field are presented and discussed. (C) 2009 Elsevier Ltd. All rights reserved.
Resumo:
The interlayer magnetoresistance of the quasi-two-dimensional metal alpha-(BEDT-TTF)(2)KHg(SCN)(4) is considered. In the temperature range from 0.5 to 10 K and for fields up to 10 T the magnetoresistance has a stronger temperature dependence than the zero-field resistance. Consequently Kohler's rule is not obeyed for any range of temperatures or fields. This means that the magnetoresistance cannot be described in terms of semiclassical transport on a single Fermi surface with a single scattering time. Possible explanations for the violations of Kohler's rule are considered, both within the framework of semiclassical transport theory and involving incoherent interlayer transport. The issues considered are similar to those raised by the magnetotransport of the cuprate superconductors. [S0163-1829(98)13219-8].