914 resultados para Central Nucleus Theory
Resumo:
Abstract We present ideas about creating a next generation Intrusion Detection System (IDS) based on the latest immunological theories. The central challenge with computer security is determining the difference between normal and potentially harmful activity. For half a century, developers have protected their systems by coding rules that identify and block specific events. However, the nature of current and future threats in conjunction with ever larger IT systems urgently requires the development of automated and adaptive defensive tools. A promising solution is emerging in the form of Artificial Immune Systems (AIS): The Human Immune System (HIS) can detect and defend against harmful and previously unseen invaders, so can we not build a similar Intrusion Detection System (IDS) for our computers? Presumably, those systems would then have the same beneficial properties as HIS like error tolerance, adaptation and self-monitoring. Current AIS have been successful on test systems, but the algorithms rely on self-nonself discrimination, as stipulated in classical immunology. However, immunologist are increasingly finding fault with traditional self-nonself thinking and a new 'Danger Theory' (DT) is emerging. This new theory suggests that the immune system reacts to threats based on the correlation of various (danger) signals and it provides a method of 'grounding' the immune response, i.e. linking it directly to the attacker. Little is currently understood of the precise nature and correlation of these signals and the theory is a topic of hot debate. It is the aim of this research to investigate this correlation and to translate the DT into the realms of computer security, thereby creating AIS that are no longer limited by self-nonself discrimination. It should be noted that we do not intend to defend this controversial theory per se, although as a deliverable this project will add to the body of knowledge in this area. Rather we are interested in its merits for scaling up AIS applications by overcoming self-nonself discrimination problems.
Resumo:
This study is concerned with the significance of Jungian and post-Jungian theory to the development of the contemporary Western Goddess Movement, which includes the various self-identified nature-based, Pagan, Goddess Feminism, Goddess Consciousness, Goddess Spirituality, Wicca, and Goddess-centred faith traditions that have seen a combined increase in Western adherents over the past five decades and share a common goal to claim Goddess as an active part of Western consciousness and faith traditions. The Western Goddess Movement has been strongly influenced by Jung’s thought, and by feminist revisions of Jungian Theory, sometimes interpreted idiosyncratically, but presented as a route to personal and spiritual transformation. The analysis examines ways in which women encounter Goddess through a process of Jungian Individuation and traces the development of Jungian and post-Jungian theories by identifying the key thinkers and central ideas that helped to shape the development of the Western Goddess Movement. It does so through a close reading and analysis of five biographical ‘rebirth’ memoirs published between 1981 and 1998: Christine Downing’s (1981) The Goddess: Mythological Images of the Feminine; Jean Shinoda Bolen’s (1994) Crossing to Avalon: A Woman’s Midlife Pilgrimage; Sue Monk Kidd’s (1996) The Dance of the Dissident Daughter: A Woman’s Journey from Christian Tradition to the Sacred Feminine; Margaret Starbird’s (1998) The Goddess in the Gospels: Reclaiming the Sacred Feminine; and Phyllis Curott’s (1998) Book of Shadows: A Modern Woman’s Journey into the Wisdom of Witchcraft and the Magic of the Goddess. These five memoirs reflect the diversity of the faith traditions in the Western Goddess Movement. The enquiry centres upon two parallel and complementary research threads: 1) critically examining the content of the memoirs in order to determine their contribution to the development of the Goddess Movement and 2) charting and sourcing the development of the major Jungian and post-Jungian theories championed in the memoirs in order to evaluate the significance of Jungian and post-Jungian thought in the Movement. The aim of this study was to gain a better understanding of the original research question: what is the significance of Jungian and post-Jungian theory for the development of the Western Goddess Movement? Each memoir is subjected to critical review of its intended audiences, its achievements, its functions and strengths, and its theoretical frameworks. Research results offered more than the experiences of five Western women, it also provided evidence to analyse the significance of Jungian and post-Jungian theory to the development of the Western Goddess Movement. The findings demonstrate the vital contributions of the analytical psychology of Carl Jung, and post-Jungians M Esther Harding, Erich Neumann, Christine Downing, E.C. Whitmont, and Jean Shinoda Bolen; the additional contributions of Sue Monk Kidd, Margaret Starbird, and Phyllis Curott, and exhibit Jungian and post-Jungian pathways to Goddess. Through a variety of approaches to Jungian categories, these memoirs constitute a literature of Individuation for the Western Goddess Movement.
Resumo:
Abstract We present ideas about creating a next generation Intrusion Detection System (IDS) based on the latest immunological theories. The central challenge with computer security is determining the difference between normal and potentially harmful activity. For half a century, developers have protected their systems by coding rules that identify and block specific events. However, the nature of current and future threats in conjunction with ever larger IT systems urgently requires the development of automated and adaptive defensive tools. A promising solution is emerging in the form of Artificial Immune Systems (AIS): The Human Immune System (HIS) can detect and defend against harmful and previously unseen invaders, so can we not build a similar Intrusion Detection System (IDS) for our computers? Presumably, those systems would then have the same beneficial properties as HIS like error tolerance, adaptation and self-monitoring. Current AIS have been successful on test systems, but the algorithms rely on self-nonself discrimination, as stipulated in classical immunology. However, immunologist are increasingly finding fault with traditional self-nonself thinking and a new 'Danger Theory' (DT) is emerging. This new theory suggests that the immune system reacts to threats based on the correlation of various (danger) signals and it provides a method of 'grounding' the immune response, i.e. linking it directly to the attacker. Little is currently understood of the precise nature and correlation of these signals and the theory is a topic of hot debate. It is the aim of this research to investigate this correlation and to translate the DT into the realms of computer security, thereby creating AIS that are no longer limited by self-nonself discrimination. It should be noted that we do not intend to defend this controversial theory per se, although as a deliverable this project will add to the body of knowledge in this area. Rather we are interested in its merits for scaling up AIS applications by overcoming self-nonself discrimination problems.
Resumo:
This thesis identifies and defines the new African sovereignty. It establishes a modern sovereignty in Africa hatched from the changing nature of sovereignty in which countries come together at various levels or grades of partial surrender of national sovereignty in order to work closer together for their mutual advantage and benefit. To this end, the narrative zooms in on the central issues within the realms of money matters whereby a new model of monetary sovereignty and monetary solutions is designed in an attempt to ease the recurring tensions and challenges of modern national sovereignty in the continent of Africa. As such, this discussion will offer a historical journey through the constitution of sovereignty, to the birth of the nation state and international public law. It develops the theory of the changing nature of sovereignty within the modern state and opens new lines of inquiry for Africa. In this regard, it draws from juxtaposing and mixing elements of regional and global financial integration as well as retaining national financial sovereignty features to form this new design which I dub continental sovereignty. At its core, the thesis will deal with the legal aspects that stem from the co-mingling of legal systems of nation states and communities at the regional and global levels within the context of financial integration. The argument is that the rule of law remains sacrosanct in monetary management. Effective financial integration is the result of properly structured and managed legal frameworks with robust laws and institutions whether at a national, regional or global level. However, the thesis reveals that in order to avoid undermining the progress of Africa’s financial integration project, any solution for Africa must be immersed within a broader global solution where development issues are addressed and resolved and Africa can form a more central part in all relevant international discussion fora. The work will expound these issues by applying them within a regional and global context, with the state of affairs in Africa forming the nucleus. This application consequently presents the six key themes of the thesis which will be considered therein. They are: a.) regional advantage: which exploits the possibilities of deeper and further financial integration between smaller communal arrangements; b.) regional risk and exposure: the extent to which this deeper form of financial integration can spiral out of control if effected too quickly and too ambitiously; c.) global advantage: which considers the merits of global financial integration and the influence exerted by financial laws on the global financial architecture; d.) global risk and exposure: which considers the challenges of global financial integration especially within the background of the Global Financial Crisis 2007-2008; e.) African challenge: which considers the extent to which this analysis impacts the African economic and financial integration agenda; and f.) development challenge: which examines the extent to which global development issues impact the African solution (continental sovereignty) and the need for any solution for the continent to be roped into a broader global solution within which Africa can form an important part. Even though the thesis requests an optimistic undertone on the progress made so far, it unearths the African problem of multiple national sovereignty and multiple overlapping regional sovereignty constituted as the ‘spaghetti bowl’ dilemma. As such, the unique contribution to knowledge on financial integration in Africa can be echoed in these words: Africa‘s financial integration agenda has had little success in authenticating a systematic and dependable legal framework for monetary management. Efforts made have been incomplete, substandard, and not carefully followed through particularly reflected in the impuissant nature of the judicial enforcement mechanisms. Thus, the thesis argues that, any meaningful answer to the problems dogging the continent is inter alia deeply entrenched within a new form of cooperative monetary sovereignty. In other words, the thesis does not prescribe the creation of new laws; rather it advocates the effective enforcement of existing laws.
Resumo:
Few studies relating to librarianship as a science, because it is argued that the Library lacks a body of theory, an object of study and methodology of its own. According to Murcia and Tamayo "science is a critical task not dogmatic, that puts all its cases to trial and criticism." 0 is, science tests the presumed knowledge. He adds that science related facts and interconnected with each other, in order to achieve logical connections that allow the provision of postulates and axioms from the systematization achieved through research and the scientific method to determine the objectivity that exists between facts and phenomena. For him, scientific research is the instrument by which science makes it to scientific knowledge. (1982, p. 11)
Resumo:
We present ideas about creating a next generation Intrusion Detection System (IDS) based on the latest immunological theories. The central challenge with computer security is determining the difference between normal and potentially harmful activity. For half a century, developers have protected their systems by coding rules that identify and block specific events. However, the nature of current and future threats in conjunction with ever larger IT systems urgently requires the development of automated and adaptive defensive tools. A promising solution is emerging in the form of Artificial Immune Systems (AIS): The Human Immune System (HIS) can detect and defend against harmful and previously unseen invaders, so can we not build a similar Intrusion Detection System (IDS) for our computers? Presumably, those systems would then have the same beneficial properties as HIS like error tolerance, adaptation and self-monitoring. Current AIS have been successful on test systems, but the algorithms rely on self-nonself discrimination, as stipulated in classical immunology. However, immunologist are increasingly finding fault with traditional self-nonself thinking and a new ‘Danger Theory’ (DT) is emerging. This new theory suggests that the immune system reacts to threats based on the correlation of various (danger) signals and it provides a method of ‘grounding’ the immune response, i.e. linking it directly to the attacker. Little is currently understood of the precise nature and correlation of these signals and the theory is a topic of hot debate. It is the aim of this research to investigate this correlation and to translate the DT into the realms of computer security, thereby creating AIS that are no longer limited by self-nonself discrimination. It should be noted that we do not intend to defend this controversial theory per se, although as a deliverable this project will add to the body of knowledge in this area. Rather we are interested in its merits for scaling up AIS applications by overcoming self-nonself discrimination problems.
Resumo:
Integrated production (IP) is part of the Brazilian government program to promote sustainable agricultural production. IP ensure minimum food quality standards for domestic market, and export. Furthermore, IP is considered a good option to reduce negative environmental impacts of intensive crops in tropical Savannas, including common beans, as a Brazilian staple food. Although its advantages, and the government’s effort to promote IP, few growers are adopting IP. Maybe, the perception about IP usefulness and/or its ease of use is not too clear. Moreover, the production sector is driven by market signs, and there is few information on the consumer's preferences toward IP certified products in Brazil. In this study, we sought to identify some critical factors that can influence the IP adoption in beans' production. Moreover, we sought to verify the consumers’ perceptions and intention of purchasing IP certified beans (hypothetical product). This report comprises four chapters: (1) an introduction illustrating the context in which the research was based; (2) the results on the study of IP adoption based on the Technology Acceptance Model (TAM); (3) the choice experiment results applied to identify consumers preferences and willingness-to-pay (WTP) for IP label; (4) the results on the Theory of Planned Behaviour (TPB) applied to identify consumers’ perception toward IP certified beans. This research contributes with rich information for the beans’ supply chain, providing several insights to growers, retail and other agents, including policy makers. Beans’ production sector seems to be positively intentioned to adopt IP, but further studies should be conducted to test other adoption indicators using TAM model. Surveyed consumers are willing to pay a premium price for IP labelled beans. They showed a positive attitude toward purchasing IP labelled beans. It is an important information to motivate production sector to offer certified beans to the market.
Resumo:
International theory is replete with contested concepts, none more than state sovereignty. Although embodied in the UN Charter, it came under continuous strain during the early Cold War, culminating in the crucial year of 1956. Subsequent Soviet ideologists sought to justify the invasion of Czechoslovakia as „limited sovereignty”, dubbed by US analysts the "Brezhnev Doctrine". A few Western scholars thought this ended with the "non-invasion" of Poland in 1980-1981, but Russian archives reveal that it was not annulled until spring 1989.
Resumo:
Contemporary Central American fiction has become a vital project of revision of the tragic events and the social conditions in the recent history of the countries from which they emerge. The literary projects of Sergio Ramirez (Nicaragua), Dante Liano (Guatemala), Horacio Castellanos Moya (El Salvador), and Ramon Fonseca Mora (Panama), are representative of the latest trends in Central American narrative. These trends conform to a new literary paradigm that consists of an amalgam of styles and discourses, which combine the testimonial, the historical, and the political with the mystery and suspense of noir thrillers. Contemporary Central American noir narrative depicts the persistent war against social injustice, violence, criminal activities, as well as the new technological advances and economic challenges of the post-war neo-liberal order that still prevails throughout the region. Drawing on postmodernism theory proposed by Ihab Hassan, Linda Hutcheon and Brian MacHale, I argued that the new Central American literary paradigm exemplified by Sergio Ramirez’s El cielo llora por mí, Dante Liano’s El hombre de Montserrat, Horacio Castellanos Moya’s El arma en el hombre and La diabla en el espejo, and Ramon Fonseca Mora’s El desenterrador, are highly structured novels that display the characteristic marks of postmodern cultural expression through their ambivalence, which results from the coexistence of multiple styles and conflicting ideologies and narrative trends. The novels analyzed in this dissertation make use of a noir sensitivity in which corruption, decay and disillusionment are at their core to portray the events that shaped the modern history of the countries from which they emerge. The revolutionary armed struggle, the state of terror imposed by military regimes and the fight against drug trafficking and organized crime, are among the major themes of these contemporary works of fiction, which I have categorized as perfect examples of the post-revolutionary post-modernism Central American detective fiction at the turn of the 21st century.
Resumo:
Book review: Organizations in Time, edited by R Daniel Wadhwani and Marcelo Bucheli, Oxford University Press, 2014. The title of this edited volume is slightly misleading, as its various contributions explore the potential for more historical analysis in organization studies rather than addressing issues associated with time and organizing. Hopefully this will not distract from the important achievement of this volume—important especially for business historians—in further expanding and integrating business history into management and organization studies. The various contributions, elegantly tied together by R. Daniel Wadhwani and Marcelo Bucheli in their substantial introduction (which, by the way, presents a significant contribution in its own right), opens up new sets of questions, especially in terms of future methodological and theoretical developments in the field. This book also reflects the changing institutional location of business historians, who increasingly make their careers in business schools rather than history departments, especially in Europe, reopening old questions of history as a social science. There have been several calls to teach more history in business education, such as the Carnegie Foundation report (2011) that found undergraduate business education too narrow in focus and highlighted the need to integrate more liberal arts teaching into the curriculum. However, in the contemporary research-driven environment of business and management schools, historical understanding is unlikely to permeate the curriculum if historical analysis cannot first deliver significant theoretical contributions. This is the central theme around which this edited volume revolves, and it marks a milestone in this ongoing debate. (In the spirit of full disclosure, I should add that even though I did not contribute to this volume, I have coauthored with several of its contributors and view this book as central to my current research practice.)
Resumo:
TITULO DEL TRABAJO: Evaluación de las causas de los eventos adversos o incidentes que afectan la seguridad del paciente, en el hospital central de la policía de enero 2012 a diciembre 2013. OBJETIVO: Determinar y analizar la causa raíz de los principales factores de riesgo que afectan la seguridad del paciente que puedan ocasionar eventos adversos en la atención de los pacientes, con el uso de la teoría de restricciones TOC en el Hospital Central de la Policía HOCEN. MATERIALES Y METODO: Se realizó una investigación descriptiva de naturaleza mixta – cuantitativa de tipo correlacional, la población es la totalidad de pacientes atendidos en el hospital de la policía entre enero de 2012 a diciembre de 2013, en el cual se presentaron un total de 189 eventos adversos los cuales sirvieron de objeto a esta investigación, la recolección de datos se realizó por medio de tablas de Excel 2010, posterior a esto se exporto la información al software de IBM SPSS Statistics 19 donde se analiza la información arrojando datos descriptivos y tablas de frecuencia. Finalmente haciendo uso de la Teoría de restricciones TOC se identificó la causa raíz para la ocurrencia de eventos adversos y plantear una intervención estratégica que promueva un sistema efectivo de seguridad del paciente en pro de la búsqueda de la mejora continua. RESULTADOS: Se analizaron 189 eventos adversos, de los cuales 89 fueron reportados en el turno de la noche, seguido por el turno de la mañana con 57, el turno tarde con 27, 28 eventos que no registraron horario, el servicio con mayor ocurrencia es el de medicina interna con 25 eventos, y finalmente la caída de pacientes, lo relacionado con medicamentos, nutriciones y accesos vasculares son los eventos con mayor incidencia. CONCLUSIONES: Se pudo concluir que es necesario que los procesos de seguridad del paciente deben tener un lineamiento directo desde la dirección de la organización permitiendo que las mejoras sean de inmediata aplicación, también es importante generar en el personal una actitud de compromiso frente al proceso de mejora, hay que redefinir las políticas institucionales ya que se concluyó por medio de la teoría de restricciones TOC que el principal factor para la ocurrencia de eventos adversos son las multitareas que el personal tiene que realizar en el proceso de atención.
Resumo:
La teoría de la complejidad, propia del estudio de fenómenos relativos a las ciencias naturales, se muestra como un marco alternativo para comprender los eventos emergentes que surgen en el sistema internacional. Esta monografía correlaciona el lenguaje de la complejidad con las relaciones internacionales, enfocándose en la relación Visegrad—Ucrania, ya que ha sido escenario de una serie de eventos emergentes e inesperados desde las protestas civiles de noviembre de 2013 en Kiev. El sistema complejo que existe entre el Grupo Visegrad y Ucrania se ve , desde entonces, en la necesidad de adaptarse ante los recurrentes eventos emergentes y de auto organizarse. De ese modo, podrá comportarse en concordancia con escenarios impredecibles, particularmente en lo relacionado con sus interacciones energéticas y sus interconexiones políticas.
Resumo:
The Covariant Spectator Theory (CST) is used to calculate the mass spectrum and vertex functions of heavy–light and heavy mesons in Minkowski space. The covariant kernel contains Lorentz scalar, pseudoscalar, and vector contributions. The numerical calculations are performed in momentum space, where special care is taken to treat the strong singularities present in the confining kernel. The observed meson spectrum is very well reproduced after fitting a small number of model parameters. Remarkably, a fit to a few pseudoscalar meson states only, which are insensitive to spin–orbit and tensor forces and do not allow to separate the spin–spin from the central interaction, leads to essentially the same model parameters as a more general fit. This demonstrates that the covariance of the chosen interaction kernel is responsible for the very accurate prediction of the spin-dependent quark–antiquark interactions.