841 resultados para Critical strip
Resumo:
Information can be interpreted as in-formation, which refers to the potential of the form for a mediation of meaning. In this paper we focus on reasoning information and consider the question how form involved in reasoning can be used for an analysis of accounting narratives in corporate disclosures. An evaluation of experimental results is included.
Resumo:
This paper critically examines the impact of decentralization on contemporary and future governance arrangements in Ghana’s artisanal and small-scale mining (ASM) sector. The sector, while providing valuable employment in rural areas, is beleaguered by environmental and social issues. Proponents of decentralization argue that re-distributing decision-making authority leads to more responsive, transparent and efficient natural resource management. The analysis presented here, however, demonstrates how weak decentralization has exacerbated the complex, conflictual and clandestine nature of local resource politics surrounding ASM. If future decentralization reforms are going to reverse this trend and improve the governance of ASM in Ghana, then facilitating the participation of traditional authorities is imperative. It is argued that doing so requires addressing the reticence regarding the role of chiefs in resource governance; simply ironing out existing technical issues with decentralization reforms is unlikely to improve the social and environmental performance of ASM in the country. In light of the chronic resource management deficiencies in Ghana, epitomized in the ASM sector, fostering frank political debates on resource governance is becoming urgent.
Resumo:
CLEC-2 is a member of new family of C-type lectin receptors characterized by a cytosolic YXXL downstream of three acidic amino acids in a sequence known as a hemITAM (hemi-immunoreceptor tyrosine-based activation motif). Dimerization of two phosphorylated CLEC-2 molecules leads to recruitment of the tyrosine kinase Syk via its tandem SH2 domains and initiation of a downstream signaling cascade. Using Syk-deficient and Zap-70-deficient cell lines we show that hemITAM signaling is restricted to Syk and that the upstream triacidic amino acid sequence is required for signaling. Using surface plasmon resonance and phosphorylation studies, we demonstrate that the triacidic amino acids are required for phosphorylation of the YXXL. These results further emphasize the distinct nature of the proximal events in signaling by hemITAM relative to ITAM receptors.
Resumo:
Given capacity limits, only a subset of stimuli 1 give rise to a conscious percept. Neurocognitive models suggest that humans have evolved mechanisms that operate without awareness and prioritize threatening stimuli over neutral stimuli in subsequent perception. In this meta analysis, we review evidence for this ‘standard hypothesis’ emanating from three widely used, but rather different experimental paradigms that have been used to manipulate awareness. We found a small pooled threat-bias effect in the masked visual probe paradigm, a medium effect in the binocular rivalry paradigm and highly inconsistent effects in the breaking continuous flash suppression paradigm. Substantial heterogeneity was explained by the stimulus type: the only threat stimuli that were robustly prioritized across all three paradigms were fearful faces. Meta regression revealed that anxiety may modulate threat biases, but only under specific presentation conditions. We also found that insufficiently rigorous awareness measures, inadequate control of response biases and low level confounds may undermine claims of genuine unconscious threat processing. Considering the data together, we suggest that uncritical acceptance of the standard hypothesis is premature: current behavioral evidence for threat-sensitive visual processing that operates without awareness is weak.
Resumo:
We prove that
∑k,ℓ=1N(nk,nℓ)2α(nknℓ)α≪N2−2α(logN)b(α)
holds for arbitrary integers 1≤n1<⋯
Resumo:
Wireless Sensor Networks (WSNs) have been an exciting topic in recent years. The services offered by a WSN can be classified into three major categories: monitoring, alerting, and information on demand. WSNs have been used for a variety of applications related to the environment (agriculture, water and forest fire detection), the military, buildings, health (elderly people and home monitoring), disaster relief, and area or industrial monitoring. In most WSNs tasks like processing the sensed data, making decisions and generating emergency messages are carried out by a remote server, hence the need for efficient means of transferring data across the network. Because of the range of applications and types of WSN there is a need for different kinds of MAC and routing protocols in order to guarantee delivery of data from the source nodes to the server (or sink). In order to minimize energy consumption and increase performance in areas such as reliability of data delivery, extensive research has been conducted and documented in the literature on designing energy efficient protocols for each individual layer. The most common way to conserve energy in WSNs involves using the MAC layer to put the transceiver and the processor of the sensor node into a low power, sleep state when they are not being used. Hence the energy wasted due to collisions, overhearing and idle listening is reduced. As a result of this strategy for saving energy, the routing protocols need new solutions that take into account the sleep state of some nodes, and which also enable the lifetime of the entire network to be increased by distributing energy usage between nodes over time. This could mean that a combined MAC and routing protocol could significantly improve WSNs because the interaction between the MAC and network layers lets nodes be active at the same time in order to deal with data transmission. In the research presented in this thesis, a cross-layer protocol based on MAC and routing protocols was designed in order to improve the capability of WSNs for a range of different applications. Simulation results, based on a range of realistic scenarios, show that these new protocols improve WSNs by reducing their energy consumption as well as enabling them to support mobile nodes, where necessary. A number of conference and journal papers have been published to disseminate these results for a range of applications.
Resumo:
Effective defense against natural threats in the environment is essential for the survival of individual animals. Thus, instinctive behavioral responses accompanied by fear have evolved to protect individuals from predators and from opponents of the same species (dominant conspecifics). While it has been suggested that all perceived environmental threats trigger the same set of innately determined defensive responses, we tested the alternate hypothesis that different stimuli may evoke differentiable behaviors supported by distinct neural circuitry. The results of behavioral, neuronal immediate early gene activation, lesion, and neuroanatomical experiments indicate that the hypothalamus is necessary for full expression of defensive behavioral responses in a subordinate conspecific, that lesions of the dorsal premammillary nucleus drastically reduce behavioral measures of fear in these animals, and that essentially separate hypothalamic circuitry supports defensive responses to a predator or a dominant conspecific. It is now clear that differentiable neural circuitry underlies defensive responses to fear conditioning associated with painful stimuli, predators, and dominant conspecifics and that the hypothalamus is an essential component of the circuitry for the latter two stimuli.