998 resultados para Exact sequences


Relevância:

20.00% 20.00%

Publicador:

Resumo:

This research examines the entrepreneurship phenomenon, and the question: Why are some venture attempts more successful than others? This question is not a new one. Prior research has answered this by describing those that engage in nascent entrepreneurship. Yet, this approach yielded little consensus and offers little comfort for those newly considering venture creation (Gartner, 1988). Rather, this research considers the process of venture creation, by focusing on the actions of nascent entrepreneurs. However, the venture creation process is complex (Liao, Welsch, & Tan, 2005), and multi-dimensional (Davidsson, 2004). The process can vary in the amount of action engaged by the entrepreneur; the temporal dynamics of how action is enacted (Lichtenstein, Carter, Dooley, and Gartner 2007); or the sequence in which actions are undertaken. And little is known about whether any, or all three, of these dimensions matter. Further, there exists scant general knowledge about how the venture creation process influences venture creation outcomes (Gartner & Shaver, 2011). Therefore, this research conducts a systematic study of what entrepreneurs do as they create a new venture. The primary goal is to develop general principles so that advice may be offered on how to ‘proceed’, rather than how to ‘be’. Three integrated empirical studies were conducted that separately focus on each of the interrelated dimensions. The basis for this was a randomly sampled, longitudinal panel, of nascent ventures. Upon recruitment these ventures were in the process of being created, but yet to be established as new businesses. The ventures were tracked one year latter to follow up on outcomes. Accordingly, this research makes the following original contributions to knowledge. First, the findings suggest that all three of the dimensions play an important role: action, dynamics, and sequence. This implies that future research should take a multi-dimensional view of the venture creation process. Failing to do so can only result in a limited understanding of a complex phenomenon. Second, action is the fundamental means through which venture creation is achieved. Simply put, more active venture creation efforts are more likely more successful. Further, action is the medium which allows resource endowments their effect upon venture outcomes. Third, the dynamics of how venture creation plays out over time is also influential. Here, a process with a high rate of action which increases in intensity will more likely achieve positive outcomes. Forth, sequence analysis, suggests that the order in which actions are taken will also drive outcomes. Although venture creation generally flows in sequence from discovery toward exploitation (Shane & Venkataraman, 2000; Eckhardt & Shane, 2003; Shane, 2003), processes that actually proceed in this way are less likely to be realized. Instead, processes which specifically intertwine discovery and exploitation action together in symbiosis more likely achieve better outcomes (Sarasvathy, 2001; Baker, Miner, & Eesley, 2003). Further, an optimal venture creation order exists somewhere between these sequential and symbiotic process archetypes. A process which starts out as symbiotic discovery and exploitation, but switches to focus exclusively on exploitation later on is most likely to achieve venture creation. These sequence findings are unique, and suggest future integration between opposing theories for order in venture creation.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Data structures such as k-D trees and hierarchical k-means trees perform very well in approximate k nearest neighbour matching, but are only marginally more effective than linear search when performing exact matching in high-dimensional image descriptor data. This paper presents several improvements to linear search that allows it to outperform existing methods and recommends two approaches to exact matching. The first method reduces the number of operations by evaluating the distance measure in order of significance of the query dimensions and terminating when the partial distance exceeds the search threshold. This method does not require preprocessing and significantly outperforms existing methods. The second method improves query speed further by presorting the data using a data structure called d-D sort. The order information is used as a priority queue to reduce the time taken to find the exact match and to restrict the range of data searched. Construction of the d-D sort structure is very simple to implement, does not require any parameter tuning, and requires significantly less time than the best-performing tree structure, and data can be added to the structure relatively efficiently.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In this thesis, I contribute to the study of how arrangements are made in social interaction. Using conversation analysis, I examine a corpus of 375 telephone calls between employees and clients of three Community Home Care (CHC) service agencies in metropolitan Adelaide, South Australia. My analysis of the CHC data corpus draws upon existing empirical findings within conversation analysis in order to generate novel findings about how people make arrangements with one another, and some of the attendant considerations that parties to such an activity can engage in: Prospective informings as remote proposals for a future arrangement – Focusing on how employees make arrangements with clients, I show how the employees in the CHC data corpus use ‘prospective informings’ to detail a future course of action that will involve the recipient of that informing. These informings routinely occasion a double-paired sequence, where informers pursue a response to their informing. This pursuit often occurs even after recipients have provided an initial response. This practice for making arrangements has been previously described by Houtkoop (1987) as ‘remote proposing.’ I develop Houtkoop’s analysis to show how an informing of a future arrangement can be recompleted, with response solicitation, as a proposal that is contingent upon a recipient’s acceptance. Participants’ understanding of references to non-present third parties – In the process of making arrangements, references are routinely made to non-present third parties. In the CHC data corpus, these third parties are usually care workers. Prior research (e.g., Sacks & Schegloff, 1979; Schegloff, 1996b) explains how the use of ‘recognitional references’ (such as the bare name ‘Kerry’), conveys to recipients that they should be able to locate the referent from amongst their acquaintances. Conversely, the use of ‘non-recognitional references’ (such as the description ‘a lady called Kerry’), conveys that recipients are unacquainted with the referent. I examine instances where the selection of a recognitional or non-recognitional reference form is followed by a recipient initiating repair on that reference. My analysis provides further evidence thatthe existing analytic account of these references corresponds to the way in which participants themselves make sense of them. My analysis also advances an understanding of how repair can be used, by recipients, to indicate the inappositeness of a prior turn. Post-possible-completion accounts – In a case study of a problematic interaction, I examine a misunderstanding that is not resolved within the repair space, the usual defence of intersubjectivity in interaction (cf. Schegloff, 1992b). Rather, I explore how the source of trouble is addressed, outside of the sequence of its production, with a ‘post-possible-completion account.’ This account specifies the basis of a misunderstanding and yet, unlike repair, does so without occasioning a revised response to a trouble-source turn. By considering various aspects of making arrangements in social interaction, I highlight some of the rich order that underpins the maintenance of human relationships across time. In the concluding section of this thesis I review this order, while also discussing practical implications of this analysis for CHC practice.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In this paper we present a new simulation methodology in order to obtain exact or approximate Bayesian inference for models for low-valued count time series data that have computationally demanding likelihood functions. The algorithm fits within the framework of particle Markov chain Monte Carlo (PMCMC) methods. The particle filter requires only model simulations and, in this regard, our approach has connections with approximate Bayesian computation (ABC). However, an advantage of using the PMCMC approach in this setting is that simulated data can be matched with data observed one-at-a-time, rather than attempting to match on the full dataset simultaneously or on a low-dimensional non-sufficient summary statistic, which is common practice in ABC. For low-valued count time series data we find that it is often computationally feasible to match simulated data with observed data exactly. Our particle filter maintains $N$ particles by repeating the simulation until $N+1$ exact matches are obtained. Our algorithm creates an unbiased estimate of the likelihood, resulting in exact posterior inferences when included in an MCMC algorithm. In cases where exact matching is computationally prohibitive, a tolerance is introduced as per ABC. A novel aspect of our approach is that we introduce auxiliary variables into our particle filter so that partially observed and/or non-Markovian models can be accommodated. We demonstrate that Bayesian model choice problems can be easily handled in this framework.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The sidewall additions of diazomethane to (n, n), n = 3–10 armchair single-walled carbon nanotubes (SWCNTs) on two different orientations of C–C bonds have been studied using the ONIOM(B3LYP/6-31G(d):PM3) approach. The binding energies of SWCNTs complexes with CH2N2, CH2 and their transition-state structures were computed at the B3LYP/6-31G(d) level. The effects of diameters of armchair SWCNTs on their binding energies were studied. Relative reactivities of all the SWCNTs and their complexes based on their frontier orbital energies gaps are reported.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Streamciphers are common cryptographic algorithms used to protect the confidentiality of frame-based communications like mobile phone conversations and Internet traffic. Streamciphers are ideal cryptographic algorithms to encrypt these types of traffic as they have the potential to encrypt them quickly and securely, and have low error propagation. The main objective of this thesis is to determine whether structural features of keystream generators affect the security provided by stream ciphers.These structural features pertain to the state-update and output functions used in keystream generators. Using linear sequences as keystream to encrypt messages is known to be insecure. Modern keystream generators use nonlinear sequences as keystream.The nonlinearity can be introduced through a keystream generator's state-update function, output function, or both. The first contribution of this thesis relates to nonlinear sequences produced by the well-known Trivium stream cipher. Trivium is one of the stream ciphers selected in a final portfolio resulting from a multi-year project in Europe called the ecrypt project. Trivium's structural simplicity makes it a popular cipher to cryptanalyse, but to date, there are no attacks in the public literature which are faster than exhaustive keysearch. Algebraic analyses are performed on the Trivium stream cipher, which uses a nonlinear state-update and linear output function to produce keystream. Two algebraic investigations are performed: an examination of the sliding property in the initialisation process and algebraic analyses of Trivium-like streamciphers using a combination of the algebraic techniques previously applied separately by Berbain et al. and Raddum. For certain iterations of Trivium's state-update function, we examine the sets of slid pairs, looking particularly to form chains of slid pairs. No chains exist for a small number of iterations.This has implications for the period of keystreams produced by Trivium. Secondly, using our combination of the methods of Berbain et al. and Raddum, we analysed Trivium-like ciphers and improved on previous on previous analysis with regards to forming systems of equations on these ciphers. Using these new systems of equations, we were able to successfully recover the initial state of Bivium-A.The attack complexity for Bivium-B and Trivium were, however, worse than exhaustive keysearch. We also show that the selection of stages which are used as input to the output function and the size of registers which are used in the construction of the system of equations affect the success of the attack. The second contribution of this thesis is the examination of state convergence. State convergence is an undesirable characteristic in keystream generators for stream ciphers, as it implies that the effective session key size of the stream cipher is smaller than the designers intended. We identify methods which can be used to detect state convergence. As a case study, theMixer streamcipher, which uses nonlinear state-update and output functions to produce keystream, is analysed. Mixer is found to suffer from state convergence as the state-update function used in its initialisation process is not one-to-one. A discussion of several other streamciphers which are known to suffer from state convergence is given. From our analysis of these stream ciphers, three mechanisms which can cause state convergence are identified.The effect state convergence can have on stream cipher cryptanalysis is examined. We show that state convergence can have a positive effect if the goal of the attacker is to recover the initial state of the keystream generator. The third contribution of this thesis is the examination of the distributions of bit patterns in the sequences produced by nonlinear filter generators (NLFGs) and linearly filtered nonlinear feedback shift registers. We show that the selection of stages used as input to a keystream generator's output function can affect the distribution of bit patterns in sequences produced by these keystreamgenerators, and that the effect differs for nonlinear filter generators and linearly filtered nonlinear feedback shift registers. In the case of NLFGs, the keystream sequences produced when the output functions take inputs from consecutive register stages are less uniform than sequences produced by NLFGs whose output functions take inputs from unevenly spaced register stages. The opposite is true for keystream sequences produced by linearly filtered nonlinear feedback shift registers.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Motivation: Gene silencing, also called RNA interference, requires reliable assessment of silencer impacts. A critical task is to find matches between silencer oligomers and sites in the genome, in accordance with one-to-many matching rules (G-U matching, with provision for mismatches). Fast search algorithms are required to support silencer impact assessments in procedures for designing effective silencer sequences.Results: The article presents a matching algorithm and data structures specialized for matching searches, including a kernel procedure that addresses a Boolean version of the database task called the skyline search. Besides exact matches, the algorithm is extended to allow for the location-specific mismatches applicable in plants. Computational tests show that the algorithm is significantly faster than suffix-tree alternatives. © The Author 2010. Published by Oxford University Press. All rights reserved.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Barley yellow dwarf luteovirus-GPV (BYDV-GPV) is a common problem in Chinese wheat crops but is unrecorded elsewhere. A defining characteristic of GPV is its capacity to be transmitted efficiently by both Schizaphis graminum and Rhopaloshiphum padi. This dual aphid species transmission contrasts with those of BYDV-RPV and BYDV-SGV, globally distributed viruses, which are efficiently transmitted only by Rhopaloshiphum padi and Schizaphis graminum respectively. The viral RNA sequences encoding the coat protein (22K) gene, the movement protein (17K) gene, the region surrounding the conserved GDD motif of the polymerase gene and the intergenic sequences between these genes were determined for GPV and an Australian isolate of BYDV-RPV (RPVa). In all three genes, the sequences of GPV and RPVa were more similar to those of an American isolate of BYDV-RPV (RPVu) than to any other luteovirus for which there is data available. RPVa and RPVu were very similar, especially their coat proteins which had 97% identity at the amino acid level. The coat protein of GPV had 76% and 78% amino acid identity with RPVa and RPVu respectively. The data suggest that RPVu and RPVa are correctly named as strains of the same serotype and that GPV is sufficiently different from either RPV strain to be considered a distinct BYDV type. The coat protein and movement protein genes of GPV are very dissimilar to SGV. The polymerase sequences of RPVu, RPVa and GPV show close affinities with those of the sobemo-like luteoviruses and little similarity with those of the carmo-like luteoviruses. The sequences of the coat proteins, movement proteins and the polymerase segments of BYDV serotypes, other than RPV and GPV, form a cluster that is separate from their counterpart sequences from dicot-infecting luteoviruses. The RPV and GPV isolates consistently fall within a dicot-infecting cluster. This suggests that RPV and GPV evolved from within this group of viruses. Since these other viruses all infect dicots it seems likely that their common ancestor infected a dicot and that RPV and GPV evolved from a virus that switched hosts from a dicot to a monocot.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The genomes of an Australian and a Canadian isolate of potato leafroll virus have been cloned and sequenced. The sequences of both isolates are similar (about 93%), but the Canadian isolate (PLRV-C) is more closely related (about 98% identity) to a Scottish (PLRV-S) and a Dutch isolate (PLRV-N) than to the Australian isolate (PLRV-A). The 5'-terminal 18 nucleotide residues of PLRV-C, PLRV-A, PLRV-N and beet western yellows virus have 17 residues in common. In contrast, PLRV-S shows no obvious similarity in this region. PLRV-A and PLRV-C genomic sequences have localized regions of marked diversity, in particular a 600 nucleotide residue sequence in the polymerase gene. These data provide a world-wide perspective on the molecular biology of PLRV strains and their comparison with other luteoviruses and related RNA plant viruses suggests that there are two major subgroups in the plant luteoviruses.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Exact solutions of partial differential equation models describing the transport and decay of single and coupled multispecies problems can provide insight into the fate and transport of solutes in saturated aquifers. Most previous analytical solutions are based on integral transform techniques, meaning that the initial condition is restricted in the sense that the choice of initial condition has an important impact on whether or not the inverse transform can be calculated exactly. In this work we describe and implement a technique that produces exact solutions for single and multispecies reactive transport problems with more general, smooth initial conditions. We achieve this by using a different method to invert a Laplace transform which produces a power series solution. To demonstrate the utility of this technique, we apply it to two example problems with initial conditions that cannot be solved exactly using traditional transform techniques.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

To characterize aphid mitochondrial genome (mitogenome) features, we sequenced the complete mitogenome of the Russian wheat aphid, Diuraphis noxia. The 15,784-bp mitogenome with a high A + T content (84.76%) and strong C skew (− 0.26) was arranged in the same gene order as that of the ancestral insect. Unlike typical insect mitogenomes, D. noxia possessed a large tandem repeat region (644 bp) located between trnE and trnF. Sequencing partial mitogenome of the cotton aphid (Aphis gossypii) further confirmed the presence of the large repeat region in aphids, but with different repeat length and copy number. Another motif (58 bp) tandemly repeated 2.3 times in the control region of D. noxia. All repeat units in D. noxia could be folded into stem-loop secondary structures, which could further promote an increase in copy numbers. Characterization of the D. noxia mitogenome revealed distinct mitogenome architectures, thus advancing our understanding of insect mitogenomic diversities and evolution.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Sequential and one-pot Stille–Heck and Heck–Stille reaction processes have been invoked to give divergent access to polycyclic ring systems. Both reaction conditions and substrate structure are important in determining the nature of the reaction products formed. The Heck–Stille reactions have involved a reversal of the usual Heck regioselectivity and both cine- and ipso-substitutions have been observed in the Stille reaction.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We show, using the PDR1 element of pea, that dispersed repeated sequences of moderate copy number can be used simply and efficiently to generate markers linked to a trait of interest. Inspection of hybridization patterns of repeated sequences to DNA mixtures of pooled genotypes is a sensitive way of detecting such markers. The large number of bands in tracks of digests of these mixtures allows the simultaneous sampling of loci at many places in the genome, and the many unlinked loci serve as internal controls. It is also shown that intensity ratios calculated from these band differences can be used to give a rough estimate of linkage distance.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

A DNA sequence between two legumin genes in Pisum is a member of the copia-like class of retrotransposons and represents one member of a polymorphic and heterogeneous dispersed repeated sequence family in Pisum. This sequence can be exploited in genetic studies either by RFLP analysis where several markers can be scored together, or the segregation of individual elements can be followed after PCR amplification of specific members.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The 3′ UTRs of eukaryotic genes participate in a variety of post-transcriptional (and some transcriptional) regulatory interactions. Some of these interactions are well characterised, but an undetermined number remain to be discovered. While some regulatory sequences in 3′ UTRs may be conserved over long evolutionary time scales, others may have only ephemeral functional significance as regulatory profiles respond to changing selective pressures. Here we propose a sensitive segmentation methodology for investigating patterns of composition and conservation in 3′ UTRs based on comparison of closely related species. We describe encodings of pairwise and three-way alignments integrating information about conservation, GC content and transition/transversion ratios and apply the method to three closely related Drosophila species: D. melanogaster, D. simulans and D. yakuba. Incorporating multiple data types greatly increased the number of segment classes identified compared to similar methods based on conservation or GC content alone. We propose that the number of segments and number of types of segment identified by the method can be used as proxies for functional complexity. Our main finding is that the number of segments and segment classes identified in 3′ UTRs is greater than in the same length of protein-coding sequence, suggesting greater functional complexity in 3′ UTRs. There is thus a need for sustained and extensive efforts by bioinformaticians to delineate functional elements in this important genomic fraction. C code, data and results are available upon request.