851 resultados para Correlation based analysis
Resumo:
Purpose – The purpose of this paper is to challenge the assumption that process losses of individuals working in teams are unavoidable. The paper aims to challenge this assumption on the basis of social identity theory and recent research. Design/methodology/approach – The approach adopted in this paper is to review the mainstream literature providing strong evidence for motivation problems of individuals working in groups. Based on more recent literature, innovative ways to overcome these problems are discussed. Findings – A social identity-based analysis and recent findings summarized in this paper show that social loafing can be overcome and that even motivation gains in group work can be expected when groups are important for the individual group members' self-concepts. Practical implications – The paper provides human resource professionals and front-line managers with suggestions as to how individual motivation and performance might be increased when working in teams. Originality/value – The paper contributes to the literature by challenging the existing approach to reducing social loafing, i.e. individualizing workers as much as possible, and proposes a team-based approach instead to overcome motivation problems.
Resumo:
Studies of political dynamics between multinational enterprise (MNE) parents and subsidiaries during subsidiary role evolution have focused largely on control and resistance. This paper adopts a critical discursive approach to enable an exploration of subtle dynamics in the way that both headquarters and subsidiaries subjectively reconstruct their independent-interdependent relationships with each other during change. We draw from a real-time qualitative study of a revealing case of charter change in an important European subsidiary of an MNE attempting to build closer integration across European country operations. Our results illustrate the role of three discourses – selling, resistance and reconciliation – in the reconstruction of the subsidiary–parent relationship. From this analysis we develop a process framework that elucidates the important role of these three discourses in the reconstruction of subsidiary roles, showing how resistance is not simply subversive but an important part of integration. Our findings contribute to a better understanding of the micro-level political dynamics in subsidiary role evolution, and of how voice is exercised in MNEs. This study also provides a rare example of discourse-based analysis in an MNE context, advancing our knowledge of how discursive methods can help to advance international business research more generally.
Resumo:
The literature relating to the performance of pulsed sieve plate liquid-liquid extraction columns and the relevant hydrodynamic phenomenon have been surveyed. Hydrodynamic behaviour and mass transfer characteristics of droplets in turbulent and non-turbulent conditions have also been reviewed. Hydrodynamic behaviour, i.e. terminal and characteristic velocity of droplets, droplet size and droplet breakup processes, and mass transfer characteristics of single droplets (d≤0.6 cm) were investigated under pulsed (mixer-settler & transitional regimes) and non-pulsed conditions in a 5.0 cm diameter, 100 cm high, pulsed sieve plate column with three different sieve plate types and variable plate spacing. The system used was toluene (displaced) - acetone - distilled water. Existing photographic techniques for following and recording the droplet behaviour, and for observing the parameters of the pulse and the pulse shape were further developed and improved. A unique illumination technique was developed by which a moving droplet could be photographed using cine or video photography with good contrast without using any dye. Droplet size from a given nozzle and droplet velocity for a given droplet diameter are reduced under pulsing condition, and it was noted that this effect is enhanced in the presence of sieve plate. The droplet breakup processes are well explained by reference to an impact-breakup mechanism. New correlations to predict droplet diameter based on this mechanism are given below.vskip 1.0cm or in dimensionless groups as follows:- (We)crit= 3.12 - 1.79 (Eo)crit A correlation based on the isotropic turbulence theory was developed to calculate droplet diameter in the emulsion regime.vskip 1.0cm Experimental results show that in the mixer-settler and transitional regimes, pulsing parameters had little effect on the overall dispersed phase mass transfer coefficient during the droplet formation and unhindered travel periods.
Resumo:
In this thesis, standard algorithms are used to carry out the optimisation of cold-formed steel purlins such as zed, channel and sigma sections, which are assumed to be simply supported and subjected to a gravity load. For zed, channel and sigma section, the local buckling, distortional buckling and lateral-torsional buckling are considered respectively herein. Currently, the local buckling is based on the BS 5950-5:1998 and EN 1993-1-3:2006. The distortional buckling is calculated by the direct strength method employing the elastic distortional buckling which is calculated by three available approaches such as Hancock (1995), Schafer and Pekoz (1998), Yu (2005). In the optimisation program, the lateral-torsional buckling based on BS 5950-5:1998, AISI and analytical model of Li (2004) are investigated. For the optimisation program, the programming codes are written for optimisation of channel, zed and sigma beam. The full study has been coded into a computer-based analysis program (MATLAB).
Resumo:
The European Union institutions represent a complex setting and a specific case of institutional translation. The European Central Bank (ECB) is a particular context as the documents translated belong to the field of economics and, thus, contain many specialised terms and neologisms that pose challenges to translators. This study aims to investigate the translation practices at the ECB, and to analyse their effects on the translated texts. In order to illustrate the way texts are translated at the ECB, the thesis will focus on metaphorical expressions and the conceptual metaphors by which they are sanctioned. Metaphor is often associated with literature and less with specialised texts. However, according to Lakoff and Johnson’s (1980) conceptual metaphor theory, our conceptual system is fundamentally metaphorical in nature and metaphors are pervasive elements of thought and speech. The corpus compiled comprises economic documents translated at the ECB, mainly from English into Romanian. Using corpus analysis, the most salient metaphorical expressions were identified in the source and target texts and explained with reference to the main conceptual metaphors. Translation strategies are discussed on the basis of a comparison of the source and target texts. The text-based analysis is complemented by questionnaires distributed to translators, which give insights into the institution’s translation practices. As translation is an institutional process, translators have to follow certain guidelines and practices; these are discussed with reference to translators’ agency. A gap was identified in the field of institutional translation. The translation process in the EU institutions has been insufficiently explored, especially regarding the new languages of the European Union. By combining the analysis of the institutional practices, the texts produced in the institution and the translators’ work (by the questionnaires distributed to translators), this thesis intends to bring a contribution to institutional translation and metaphor translation, particularly regarding a new EU language, Romanian.
Resumo:
Genetic factors are important in the etiology of bipolar disorder (BD). However, first-degree relatives of BD patients are at risk for a number of psychiatric conditions, most commonly major depressive disorder (MDD), although the majority remain well. The purpose of the present study was to identify potential brain structural correlates for risk and resilience to mood disorders in patients with BD, type I (BD-I) and their relatives. Structural magnetic resonance imaging scans were acquired from 30 patients with BD-I, 50 of their firstdegree relatives (28 had no Axis I disorder, while 14 had MDD) and 52 controls. We used voxel-based morphometry, implemented in SPM5 to identify group differences in regional gray matter volume. From the identified clusters, potential differences were further examined based on diagnostic status (BD-I patients, MDD relatives, healthy relatives, controls). Whole-brain voxel-based analysis identified group differences in the left hemisphere in the insula, cerebellum, and substantia nigra. Increased left insula volume was associated with genetic preposition to BD-I independent of clinical phenotype. In contrast, increased left substantia nigra volume was observed in those with the clinical phenotype of BD-I. Changes uniquely associated with the absence of a clinical diagnosis in BD relatives were observed in the left cerebellum. Our data suggest that in BD, genetic and phenotype-related influences on brain structure are dissociable; if replicated, these findings may help with early identification of high-risk individuals who are more likely to transition to syndromal states. Copyright © 2009 Society for Neuroscience.
Resumo:
Recognising the importance of alliance decision making in a virtual enterprise (VE), this paper proposes an analysis template to facilitate this process. The existing transaction-cost and resource-based theories in the literature are first reviewed, showing some deficiencies in both type of theories, and the potential of the resource based explanations. The paper then goes on to propose a resource-based analysis template, integrating both the motives of using certain business forms and the factors why different forms help achieve different objectives, Resource-combination effectiveness, management complexity and flexibility are identified as the three factors providing fundamental explanations of an organization's alliance making decision process. The template provides a comprehensive and generic approach for analysing alliance decisions.
Resumo:
With the rapid growth of the Internet, computer attacks are increasing at a fast pace and can easily cause millions of dollar in damage to an organization. Detecting these attacks is an important issue of computer security. There are many types of attacks and they fall into four main categories, Denial of Service (DoS) attacks, Probe, User to Root (U2R) attacks, and Remote to Local (R2L) attacks. Within these categories, DoS and Probe attacks continuously show up with greater frequency in a short period of time when they attack systems. They are different from the normal traffic data and can be easily separated from normal activities. On the contrary, U2R and R2L attacks are embedded in the data portions of the packets and normally involve only a single connection. It becomes difficult to achieve satisfactory detection accuracy for detecting these two attacks. Therefore, we focus on studying the ambiguity problem between normal activities and U2R/R2L attacks. The goal is to build a detection system that can accurately and quickly detect these two attacks. In this dissertation, we design a two-phase intrusion detection approach. In the first phase, a correlation-based feature selection algorithm is proposed to advance the speed of detection. Features with poor prediction ability for the signatures of attacks and features inter-correlated with one or more other features are considered redundant. Such features are removed and only indispensable information about the original feature space remains. In the second phase, we develop an ensemble intrusion detection system to achieve accurate detection performance. The proposed method includes multiple feature selecting intrusion detectors and a data mining intrusion detector. The former ones consist of a set of detectors, and each of them uses a fuzzy clustering technique and belief theory to solve the ambiguity problem. The latter one applies data mining technique to automatically extract computer users’ normal behavior from training network traffic data. The final decision is a combination of the outputs of feature selecting and data mining detectors. The experimental results indicate that our ensemble approach not only significantly reduces the detection time but also effectively detect U2R and R2L attacks that contain degrees of ambiguous information.
Resumo:
With the rapid growth of the Internet, computer attacks are increasing at a fast pace and can easily cause millions of dollar in damage to an organization. Detecting these attacks is an important issue of computer security. There are many types of attacks and they fall into four main categories, Denial of Service (DoS) attacks, Probe, User to Root (U2R) attacks, and Remote to Local (R2L) attacks. Within these categories, DoS and Probe attacks continuously show up with greater frequency in a short period of time when they attack systems. They are different from the normal traffic data and can be easily separated from normal activities. On the contrary, U2R and R2L attacks are embedded in the data portions of the packets and normally involve only a single connection. It becomes difficult to achieve satisfactory detection accuracy for detecting these two attacks. Therefore, we focus on studying the ambiguity problem between normal activities and U2R/R2L attacks. The goal is to build a detection system that can accurately and quickly detect these two attacks. In this dissertation, we design a two-phase intrusion detection approach. In the first phase, a correlation-based feature selection algorithm is proposed to advance the speed of detection. Features with poor prediction ability for the signatures of attacks and features inter-correlated with one or more other features are considered redundant. Such features are removed and only indispensable information about the original feature space remains. In the second phase, we develop an ensemble intrusion detection system to achieve accurate detection performance. The proposed method includes multiple feature selecting intrusion detectors and a data mining intrusion detector. The former ones consist of a set of detectors, and each of them uses a fuzzy clustering technique and belief theory to solve the ambiguity problem. The latter one applies data mining technique to automatically extract computer users’ normal behavior from training network traffic data. The final decision is a combination of the outputs of feature selecting and data mining detectors. The experimental results indicate that our ensemble approach not only significantly reduces the detection time but also effectively detect U2R and R2L attacks that contain degrees of ambiguous information.
Resumo:
The meaning of work is a construct that has been studied more systematically from the 80s, through various approaches and in different occupational categories. This dissertation aims to describe and discuss the meanings of work for construction workers. This is an empirical study whose research supports herself in the Model Attributes Meaning of Work and its respective instrument for measuring the Meaning of Work Inventory (STI). The research involved 402 workers in the construction industry sector in the two capitals of the Brazilian Northeast, with a mean age of 35.8 years (SD = 11.4). To collect the data, besides the IST, the Working Conditions Questionnaire and sociodemographic data were also used. Data were organized and analyzed using the SPSS program. The study used data analysis techniques to Smallest Space Analisys (SSA), descriptive statistics, correlation and analysis of variance. There was evidence of validity of the STI which was structured into five types of value attributes (what work should be), and seven types of descriptive attributes (what is working). The results showed that the work has high centrality and profiling for participants after the family, the most important aspect in the lives of workers. Aspects of personal and economic growth were more emphasized in definition of what the work should be and responsibility and effort were characteristics that best described the reality of work.
Resumo:
Emotion-based analysis has raised a lot of interest, particularly in areas such as forensics, medicine, music, psychology, and human-machine interface. Following this trend, the use of facial analysis (either automatic or human-based) is the most common subject to be investigated once this type of data can easily be collected and is well accepted in the literature as a metric for inference of emotional states. Despite this popularity, due to several constraints found in real world scenarios (e.g. lightning, complex backgrounds, facial hair and so on), automatically obtaining affective information from face accurately is a very challenging accomplishment. This work presents a framework which aims to analyse emotional experiences through naturally generated facial expressions. Our main contribution is a new 4-dimensional model to describe emotional experiences in terms of appraisal, facial expressions, mood, and subjective experiences. In addition, we present an experiment using a new protocol proposed to obtain spontaneous emotional reactions. The results have suggested that the initial emotional state described by the participants of the experiment was different from that described after the exposure to the eliciting stimulus, thus showing that the used stimuli were capable of inducing the expected emotional states in most individuals. Moreover, our results pointed out that spontaneous facial reactions to emotions are very different from those in prototypic expressions due to the lack of expressiveness in the latter.
Resumo:
Marine microorganisms adapt to their habitat by structural modification of their membrane lipids. This concept is the basis of numerous molecular proxies used for paleoenvironmental reconstruction. Archaeal tetraether lipids from ubiquitous marine planktonic archaea are particularly abundant, well preserved in the sedimentary record and utilized in several molecular proxies. We here introduce the direct, extraction-free analysis of these compounds in intact sediment core sections using laser desorption ionization (LDI) coupled to Fourier transform ion cyclotron resonance mass spectrometry (FTICR-MS). LDI FTICR-MS can detect the target lipids in single sub-mm sized spots on sediment sections, equivalent to a sample mass in the nanogram range, and could thus pave the way for biomarker-based reconstruction of past environments and ecosystems at subannual to decadal resolution. We demonstrate that ratios of selected archaeal tetraethers acquired by LDI FTICR-MS are highly correlated with values obtained by conventional LC/MS protocols. The ratio of the major archaeal lipids, caldarchaeol and crenarchaeol, analyzed in a 6.2-cm intact section of Mediterranean sapropel S1 at 250-µm resolution (~4-year temporal resolution), provides an unprecedented view of the fine-scale patchiness of sedimentary biomarker distributions and the processes involved in proxy signal formation. Temporal variations of this lipid ratio indicate a strong influence of the 200-yr de Vries solar cycle on reconstructed sea surface temperatures with possible amplitudes of several degrees, and suggest signal amplification by a complex interplay of ecological and hydrological factors. Laser-based biomarker analysis of geological samples has the potential to revolutionize molecular stratigraphic studies of paleoenvironments.
Resumo:
Purines are nitrogen-rich compounds that are widely distributed in the marine environment and are an important component of the dissolved organic nitrogen (DON) pool. Even though purines have been shown to be degraded by bacterioplankton, the identities of marine bacteria capable of purine degradation and their underlying catabolic mechanisms are currently unknown. This study shows that Ruegeria pomeroyi, a model marine bacterium and Marine Roseobacter Clade (MRC) representative, utilizes xanthine as a source of carbon and nitrogen. The R. pomeroyi genome contains putative genes that encode xanthine dehydrogenase (XDH), which is expressed during growth with xanthine. RNAseq-based analysis of the R. pomeroyi transcriptome revealed that the transcription of an XDH-initiated catabolic pathway is up-regulated during growth with xanthine, with transcription greatest when xanthine was the only available carbon source. The RNAseq-deduced pathway indicates that glyoxylate and ammonia are the key intermediates from xanthine degradation. Utilising a laboratory model, this study has identified the potential genes and catabolic pathway active during xanthine degradation. The ability of R. pomeroyi to utilize xanthine provides novel insights into the capabilities of the MRC that may contribute to their success in marine ecosystems and the potential biogeochemical importance of the group in processing DON.
Resumo:
Purines are nitrogen-rich compounds that are widely distributed in the marine environment and are an important component of the dissolved organic nitrogen (DON) pool. Even though purines have been shown to be degraded by bacterioplankton, the identities of marine bacteria capable of purine degradation and their underlying catabolic mechanisms are currently unknown. This study shows that Ruegeria pomeroyi, a model marine bacterium and Marine Roseobacter Clade (MRC) representative, utilizes xanthine as a source of carbon and nitrogen. The R. pomeroyi genome contains putative genes that encode xanthine dehydrogenase (XDH), which is expressed during growth with xanthine. RNAseq-based analysis of the R. pomeroyi transcriptome revealed that the transcription of an XDH-initiated catabolic pathway is up-regulated during growth with xanthine, with transcription greatest when xanthine was the only available carbon source. The RNAseq-deduced pathway indicates that glyoxylate and ammonia are the key intermediates from xanthine degradation. Utilising a laboratory model, this study has identified the potential genes and catabolic pathway active during xanthine degradation. The ability of R. pomeroyi to utilize xanthine provides novel insights into the capabilities of the MRC that may contribute to their success in marine ecosystems and the potential biogeochemical importance of the group in processing DON.
Resumo:
The present study focuses on the frequency of phrasal verbs with the particle up in the context of crime and police investigative work. This research emerges from the need to enlarge McCarthy and O’Dell’s (2004) scope from purely criminal behavior to police investigative actions. To do so, we relied on a corpus of 504,124 running words made up of spoken dialogues extracted from the script of the American TV series Castle shown on ABC since 2009. Based on Rudzka-Ostyn’s (2003) cognitive motivations for the particle up, we have identified five different meaning extensions for our phrasal verbs. Drawing from these findings, we have designed pedagogical activities for those L2 learners that study English at the Police Academy.