960 resultados para Complex system


Relevância:

60.00% 60.00%

Publicador:

Resumo:

The solvency rate of banks differs from the other corporations. The equity rate of a bank is lower than it is in corporations of other field of business. However, functional banking industry has huge impact on the whole society. The equity rate of a bank needs to be higher because that makes the banking industry more stable as the probability of the banks going under will decrease. If a bank goes belly up, the government will be compensating the deposits since it has granted the bank’s depositors a deposit insurance. This means that the payment comes from the tax payers in the last resort. Economic conversation has long concentrated on the costs of raising equity ratio. It has been a common belief that raising equity ratio also increases the banks’ funding costs in the same phase and these costs will be redistributed to the banks customers as higher service charges. Regardless of the common belief, the actual reaction of the funding costs to the higher equity ratio has been studied only a little in Europe and no study has been constructed in Finland. Before it can be calculated whether the higher stability of the banking industry that is caused by the raise in equity levels compensates the extra costs in funding costs, it must be calculated how much the actual increase in the funding costs is. Currently the banking industry is controlled by complex and heavy regulation. To maintain such a complex system inflicts major costs in itself. This research leans on the Modigliani and Miller theory, which shows that the finance structure of a firm is irrelevant to their funding costs. In addition, this research follows the calculations of Miller, Yang ja Marcheggianon (2012) and Vale (2011) where they calculate the funding costs after the doubling of specific banks’ equity ratios. The Finnish banks studied in this research are Nordea and Danske Bank because they are the two largest banks operating in Finland and they both also have the right company form to able the calculations. To calculate the costs of halving their leverages this study used the Capital Asset Pricing Model. The halving of the leverage of Danske Bank raised its funding costs for 16—257 basis points depending on the method of assessment. For Nordea the increase in funding costs was 11—186 basis points when its leverage was halved. On the behalf of the results found in this study it can be said that the doubling of an equity ratio does not increase the funding costs of a bank one by one. Actually the increase is quite modest. More solvent banks would increase the stability of the banking industry enormously while the increase in funding costs is low. If the costs of bank regulation exceeds the increase in funding costs after the higher equity ratio, it can be thought that this is the better way of stabilizing the banking industry rather than heavy regulation.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

The past several years have seen the surprising and rapid rise of Bitcoin and other “cryptocurrencies.” These are decentralized peer-to-peer networks that allow users to transmit money, tocompose financial instruments, and to enforce contracts between mutually distrusting peers, andthat show great promise as a foundation for financial infrastructure that is more robust, efficientand equitable than ours today. However, it is difficult to reason about the security of cryptocurrencies. Bitcoin is a complex system, comprising many intricate and subtly-interacting protocol layers. At each layer it features design innovations that (prior to our work) have not undergone any rigorous analysis. Compounding the challenge, Bitcoin is but one of hundreds of competing cryptocurrencies in an ecosystem that is constantly evolving. The goal of this thesis is to formally reason about the security of cryptocurrencies, reining in their complexity, and providing well-defined and justified statements of their guarantees. We provide a formal specification and construction for each layer of an abstract cryptocurrency protocol, and prove that our constructions satisfy their specifications. The contributions of this thesis are centered around two new abstractions: “scratch-off puzzles,” and the “blockchain functionality” model. Scratch-off puzzles are a generalization of the Bitcoin “mining” algorithm, its most iconic and novel design feature. We show how to provide secure upgrades to a cryptocurrency by instantiating the protocol with alternative puzzle schemes. We construct secure puzzles that address important and well-known challenges facing Bitcoin today, including wasted energy and dangerous coalitions. The blockchain functionality is a general-purpose model of a cryptocurrency rooted in the “Universal Composability” cryptography theory. We use this model to express a wide range of applications, including transparent “smart contracts” (like those featured in Bitcoin and Ethereum), and also privacy-preserving applications like sealed-bid auctions. We also construct a new protocol compiler, called Hawk, which translates user-provided specifications into privacy-preserving protocols based on zero-knowledge proofs.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Part 8: Business Strategies Alignment

Relevância:

60.00% 60.00%

Publicador:

Resumo:

As unmanned autonomous vehicles (UAVs) are being widely utilized in military and civil applications, concerns are growing about mission safety and how to integrate dierent phases of mission design. One important barrier to a coste ective and timely safety certication process for UAVs is the lack of a systematic approach for bridging the gap between understanding high-level commander/pilot intent and implementation of intent through low-level UAV behaviors. In this thesis we demonstrate an entire systems design process for a representative UAV mission, beginning from an operational concept and requirements and ending with a simulation framework for segments of the mission design, such as path planning and decision making in collision avoidance. In this thesis, we divided this complex system into sub-systems; path planning, collision detection and collision avoidance. We then developed software modules for each sub-system

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Dissertação (mestrado)—Universidade de Brasília, Instituto de Artes, Programa de Pós-Graduação em Arte, 2016.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Adaptability and invisibility are hallmarks of modern terrorism, and keeping pace with its dynamic nature presents a serious challenge for societies throughout the world. Innovations in computer science have incorporated applied mathematics to develop a wide array of predictive models to support the variety of approaches to counterterrorism. Predictive models are usually designed to forecast the location of attacks. Although this may protect individual structures or locations, it does not reduce the threat—it merely changes the target. While predictive models dedicated to events or social relationships receive much attention where the mathematical and social science communities intersect, models dedicated to terrorist locations such as safe-houses (rather than their targets or training sites) are rare and possibly nonexistent. At the time of this research, there were no publically available models designed to predict locations where violent extremists are likely to reside. This research uses France as a case study to present a complex systems model that incorporates multiple quantitative, qualitative and geospatial variables that differ in terms of scale, weight, and type. Though many of these variables are recognized by specialists in security studies, there remains controversy with respect to their relative importance, degree of interaction, and interdependence. Additionally, some of the variables proposed in this research are not generally recognized as drivers, yet they warrant examination based on their potential role within a complex system. This research tested multiple regression models and determined that geographically-weighted regression analysis produced the most accurate result to accommodate non-stationary coefficient behavior, demonstrating that geographic variables are critical to understanding and predicting the phenomenon of terrorism. This dissertation presents a flexible prototypical model that can be refined and applied to other regions to inform stakeholders such as policy-makers and law enforcement in their efforts to improve national security and enhance quality-of-life.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

In this article the authors use two EERA networks as a case for a discussion on the development of research networks within the European Educational Research Association (EERA). They contend that EERA networks through their way of working create a European research space. As their case shows, the development of networks is diverse. The emergence of networks and the current group of thirty-one networks do not display a coherent and unified system. Thus they argue that EERA networks have to be studied as an open complex system in order to comprehend the multiplicity and creative and innovative space that these networks represent. They create a space for knowledge production in a European context, enabling educational researchers to see and experience their research in a more diverse setting.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

A segurança é um princípio fundamental nos cuidados prestados e exige um complexo sistema de sinergias e um amplo leque de ações para a melhoria da qualidade. É indiscutível que a ocorrência de erros cria uma preocupação constante para os profissionais, sendo primordial fomentar uma cultura de segurança. Este artigo tem por objetivo identificar os fatores determinantes na segurança e qualidade dos cuidados de Enfermagem. Realizou-se uma revisão da literatura, utilizando descritores “Segurança do doente”, “Cultura de Segurança”, “Enfermagem”, “Qualidade dos Cuidados”, emergindo 309 artigos. Efetou-se uma pesquisa na PubMed, SciELO, Web of Science, com artigos publicados entre janeiro de 2010 e março de 2016. Foram selecionados 11 artigos que respondiam à questão de investigação “Quais os fatores determinantes da segurança e qualidade dos cuidados de Enfermagem?“. Dos 11 artigos seleccionados emergiram duas temáticas: a consciencialização do erro e a criação de uma cultura de segurança nas organizações. Este estudo evidencia que a ocorrência de erros constitui uma ameaça à qualidade dos cuidados e segurança dos utentes, contudo, a consciencialização dos riscos e a aplicação de medidas para o desenvolvimento de uma cultura de segurança contribui para a diminuição da frequência e severidade dos erros nas instituições de saúde.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

A distributed network of cortical and subcortical brain regions mediates the control of voluntary behavior, but it is unclear how this complex system may flexibly shift between different behavioral events. This thesis describes the neurophysiological changes in several key nuclei across the brain during flexible behavior, using saccadic eye movements in rhesus macaque monkeys. We examined five nuclei critical for saccade initiation and modulation: the frontal eye field (FEF) in the cerebral cortex, the subthalamic nucleus (STN), caudate nucleus (CD), and substantia nigra pars reticulata (SNr) in the basal ganglia (BG), and the superior colliculus (SC) in the midbrain. The first study tested whether a ‘threshold’ theory of how neuronal activity cues saccade initiation is consistent with the flexible control of behavior. The theory suggests there is a fixed level of FEF and SC neuronal activation at which saccades are initiated. Our results provide strong evidence against a fixed saccade threshold in either structure during flexible behavior, and indicate that threshold variability might depend on the level of inhibitory signals applied to the FEF or SC. The next two studies investigated the BG network as a likely candidate to modulate a saccade initiation mechanism, based on strong inhibitory output signals from the BG to the FEF and SC. We investigated the STN and CD (BG input), and the SNr (BG oculomotor output) to examine changes across the BG network. This revealed robust task-contingent shifts in BG signaling (Chapter 3), which uniquely impacted saccade initiation according to behavioral condition (Chapters 3 and 4). The thesis concludes with a published short review of the mechanistic effects of BG deep brain stimulation (Chapter 5), and a general discussion including proof of concept saccade behavioral changes in an MPTP-induced Parkinsonian model (Chapter 6). The studies presented here demonstrate that the conditions for saccade initiation by the FEF and SC vary according to behavioral condition, while simultaneously, large-scale task dependent shifts occur in BG signaling consistent with the observed modulation of FEF and SC activity. Taken together, these describe a mechanistic framework by which the cortico-BG loop may contribute to the flexible control of behavior.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

This thesis investigates how the strong verb system inherited from Old English evolved in the regional dialects of Middle English (ca. 1100-1500). Old English texts preserve a relatively complex system of strong verbs, in which traditionally seven different ablaut classes are distinguished. This system becomes seriously disrupted from the Late Old English and Early Middle English periods onwards. As a result, many strong verbs die out, or have their ablaut patterns affected by sound change and morphological analogy, or transfer to the weak conjugation. In my thesis, I study the beginnings of two of these developments in two strong verb classes to find out what the evidence from Middle English regional dialects can tell us about their origins and diffusion. Chapter 2 concentrates on the strong-to-weak shift in Class III verbs, and investigates to what extent strong, mixed and weak past tense and participle forms vary in Middle English dialects, and whether the variation is more pronounced in the paradigms of specific verbs or sub-classes. Chapter 3 analyses the regional distribution of ablaut levelling in strong Class IV verbs throughout the Middle English period. The Class III and IV data for the Early Middle English period are drawn from A Linguistic Atlas of Early Middle English, and the data for the Late Middle English period from a sub-corpus of files from The Penn-Helsinki Parsed Corpus of Middle English and The Middle English Grammar Corpus. Furthermore, The English Dialect Dictionary and Grammar are consulted as an additional reference point to find out to what extent the Middle English developments are reflected in Late Modern English dialects. Finally, referring to modern insights into language variation and change and linguistic interference, Chapter 4 discusses to what extent intra- and extra-linguistc factors, such as token and type frequency, stem structure and language contact, might correlate with the strong-to-weak shift and ablaut levelling in Class III and IV verbs in the Middle English period. The thesis is accompanied by six appendices that contain further information about my distinction of Middle English dialect areas (Appendix A), historical Class III and IV verbs (B and C) and the text samples and linguistic data from the Middle English text corpora (D, E and F).

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Éste estudio describe la dinámica del sistema complejo emergente de la salud pública ambiental y su aplicación en el distrito capital, mediante la medición, ajuste, análisis y comparación de actividades y resultados en salud, obtenidos por el componente territorios ambientalmente saludables, en el área de mortalidad infantil asociada a EDA, IRA y neumonía, del proyecto Salud para el Buen Vivir ejecutado en el año 2013. De igual manera realiza aportes, mediante los cuales se proponen alternativas de solución que, por medio de la focalización poblacional, buscan superar las restricciones del sistema en pro del mejoramiento y el avance en la utilización de los recursos públicos de la salud ambiental.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

This paper investigates the use of visual artifacts to represent a complex adaptive system (CAS). The integrated master schedule (IMS) is one of those visuals widely used in complex projects for scheduling, budgeting, and project management. In this paper, we discuss how the IMS outperforms the traditional timelines and acts as a ‘multi-level and poly-temporal boundary object’ that visually represents the CAS. We report the findings of a case study project on the way the IMS mapped interactions, interdependencies, constraints and fractal patterns in a complex project. Finally, we discuss how the IMS was utilised as a complex boundary object by eliciting commitment and development of shared mental models, and facilitating negotiation through the layers of multiple interpretations from stakeholders.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

One remaining difficulty in the Information Technology (IT) business value evaluation domain is the direct linkage between IT value and the underlying determinants of IT value or surrogates of IT value. This paper proposes a research that examines the interacting effects of the determinants of IT value, and their influences on IT value. The overarching research question is how those determinants interact with each other and affect the IT value at organizational value. To achieve this, this research embraces a multilevel, complex, and adaptive system view, where the IT value emerges from the interacting of underlying determinants. This research is theoretically grounded on three organizational theories – multilevel theory, complex adaptive systems theory, and adaptive structuration theory. By integrating those theoretical paradigms, this research proposes a conceptual model that focuses on the process where IT value is created from interactions of those determinants. To answer the research question, agent-based modeling technique is used in this research to build a computational representation based on the conceptual model. Computational experimentation will be conducted based on the computational representation. Validation procedures will be applied to consolidate the validity of this model. In the end, hypotheses will be tested using computational experimentation data.