990 resultados para Old Latin metrics


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Almost all metapopulation modelling assumes that connectivity between patches is only a function of distance, and is therefore symmetric. However, connectivity will not depend only on the distance between the patches, as some paths are easy to traverse, while others are difficult. When colonising organisms interact with the heterogeneous landscape between patches, connectivity patterns will invariably be asymmetric. There have been few attempts to theoretically assess the effects of asymmetric connectivity patterns on the dynamics of metapopulations. In this paper, we use the framework of complex networks to investigate whether metapopulation dynamics can be determined by directly analysing the asymmetric connectivity patterns that link the patches. Our analyses focus on “patch occupancy” metapopulation models, which only consider whether a patch is occupied or not. We propose three easily calculated network metrics: the “asymmetry” and “average path strength” of the connectivity pattern, and the “centrality” of each patch. Together, these metrics can be used to predict the length of time a metapopulation is expected to persist, and the relative contribution of each patch to a metapopulation’s viability. Our results clearly demonstrate the negative effect that asymmetry has on metapopulation persistence. Complex network analyses represent a useful new tool for understanding the dynamics of species existing in fragmented landscapes, particularly those existing in large metapopulations.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

A new accelerometer, the Kenz Lifecorder EX (LC; Suzuken Co. Ltd, Nagoya, Japan), offers promise as a feasible monitor alternative to the commonly used Actigraph (AG: Actigraph LLC, Fort Walton Beach, FL). Purpose: This study compared the LC and AG accelerometers and the Yamax SW-200 pedometer (DW) under free-living conditions with regard to children's steps taken and time in light-intensity physical activity (PA) and moderate to vigorous PA (MVPA). Methods: Participants (N = 31, age = 10.2 ± 0.4 yr) wore LC, AG, and DW monitors from arrival at school (7:45 a.m.) until they went to bed. Time in light and MVPA intensities were calculated using two separate intensity classifications for the LC (LC_4 and LC_5) and four classifications for the AG (AG_Treuth, AG_Puyau, AG_Trost, and AG_Freedson). Both accelerometers provided steps as outputs. DW steps were self-recorded. Repeated-measures ANOVA was used to assess overlapping monitor outputs. Results: There was no difference between DW and LC steps (Δ = 200 steps), but a nonsignificant trend was observed in the pairwise comparison between DW and AG steps (Δ = 1001 steps, P = 0.058). AG detected significantly greater steps than the LC (Δ = 801 steps, P = 0.001). Estimates of light-intensity activity minutes ranged from a low of 75.6 ± 18.4 min (LC_4) to a high of 309 ± 69.2 min (AG_Treuth). Estimates of MVPA minutes ranged from a low of 25.9 ± 9.4 min (LC_5) to a high of 112.2 ± 34.5 min (AG_Freedson). No significant differences in MVPA were seen between LC_5 and AG_Treuth (Δ = 4.9 min) or AG_Puyau (Δ = 1.7 min). Conclusion: The LC detected a comparable number of steps as the DW but significantly fewer steps than the AG in children. Current results indicate that the LC_5 and either AG_Treuth or AG_Puyau intensity derivations provide similar mean estimates of time in MVPA during-free living activity in 10-yr-old children.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This study contributes to the literature on international retailing by addressing a gap in the literature as to how retailers from emerging markets expand internationally. This historical case study analyzes the growth and internationalization process of Chilean retailer Falabella, one of the largest in Latin America and has been able to compete with multinationals from developed countries. The research is based upon primary and secondary data sources including 33 oral interviews with company managers and family executives, as well as industry data, corporate reports, and trade journals. Drawing on institutional theory, the findings show that by belonging to a family conglomerate, engaging in networks and partnerships, organizational learning, and having an experienced management team helped Falabella gain legitimacy in all international markets.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Seventeen year olds who come into contact with the police in Queensland are classified as adults and are not afforded the protections available under the Youth Justice Act 1992 (Qld) (YJA). As with any other adult, their offences are dealt with under a raft of legislative provisions including the Criminal Code 1889 (Qld) (the Code), the Police Powers and Responsibilities Act 2000 (Qld) (PPRA) and the Penalties and Sentences Act 1992 (Qld) (PSA). This article argues that this situation is unfair and contravenes international human rights agreements which Australia has ratified, in particular the United Nations Convention on the Rights of the Child (CROC). Article 1 of that Convention defines a child as a person under the age of 18. The youth offences legislation in Queensland only applies to those who have not yet turned 17. This article examines the effects of this anomaly in Queensland, focusing in particular on the pre-adjudication treatment of ‘17 year old adults’.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Existing secure software development principles tend to focus on coding vulnerabilities, such as buffer or integer overflows, that apply to individual program statements, or issues associated with the run-time environment, such as component isolation. Here we instead consider software security from the perspective of potential information flow through a program’s object-oriented module structure. In particular, we define a set of quantifiable "security metrics" which allow programmers to quickly and easily assess the overall security of a given source code program or object-oriented design. Although measuring quality attributes of object-oriented programs for properties such as maintainability and performance has been well-covered in the literature, metrics which measure the quality of information security have received little attention. Moreover, existing securityrelevant metrics assess a system either at a very high level, i.e., the whole system, or at a fine level of granularity, i.e., with respect to individual statements. These approaches make it hard and expensive to recognise a secure system from an early stage of development. Instead, our security metrics are based on well-established compositional properties of object-oriented programs (i.e., data encapsulation, cohesion, coupling, composition, extensibility, inheritance and design size), combined with data flow analysis principles that trace potential information flow between high- and low-security system variables. We first define a set of metrics to assess the security quality of a given object-oriented system based on its design artifacts, allowing defects to be detected at an early stage of development. We then extend these metrics to produce a second set applicable to object-oriented program source code. The resulting metrics make it easy to compare the relative security of functionallyequivalent system designs or source code programs so that, for instance, the security of two different revisions of the same system can be compared directly. This capability is further used to study the impact of specific refactoring rules on system security more generally, at both the design and code levels. By measuring the relative security of various programs refactored using different rules, we thus provide guidelines for the safe application of refactoring steps to security-critical programs. Finally, to make it easy and efficient to measure a system design or program’s security, we have also developed a stand-alone software tool which automatically analyses and measures the security of UML designs and Java program code. The tool’s capabilities are demonstrated by applying it to a number of security-critical system designs and Java programs. Notably, the validity of the metrics is demonstrated empirically through measurements that confirm our expectation that program security typically improves as bugs are fixed, but worsens as new functionality is added.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Effective enterprise information security policy management requires review and assessment activities to ensure information security policies are aligned with business goals and objectives. As security policy management involves the elements of policy development process and the security policy as output, the context for security policy assessment requires goal-based metrics for these two elements. However, the current security management assessment methods only provide checklist types of assessment that are predefined by industry best practices and do not allow for developing specific goal-based metrics. Utilizing theories drawn from literature, this paper proposes the Enterprise Information Security Policy Assessment approach that expands on the Goal-Question-Metric (GQM) approach. The proposed assessment approach is then applied in a case scenario example to illustrate a practical application. It is shown that the proposed framework addresses the requirement for developing assessment metrics and allows for the concurrent undertaking of process-based and product-based assessment. Recommendations for further research activities include the conduct of empirical research to validate the propositions and the practical application of the proposed assessment approach in case studies to provide opportunities to introduce further enhancements to the approach.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

BILLED as a trip to hell, Bell Shakespeare and Queensland Theatre Company's production of Faustus is adapted from Christopher Marlowe's Doctor Faustus and Johann Wolfgang von Goethe's fragmentary Urfaust, an early version of Goethe's enormous two-volume Faust tragedy published in 1808, then in full in 1832

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Central to Coraline’s experiences in the fantasy world beyond the walls of her flat is the ‘other’ mother, who is initially constructed as an idealised image of maternal care whose only concern is for the welfare and comfort of her child. But as the story unfolds, this belle dame rapidly transforms into the ‘beldam sans merci’, an old crone, a she-devil whose real interest lies in the power she can draw from possessing the souls of children such as Coraline. This paper explores the Gaiman’s use of archetypes and cultural stereotypes of the mother figure that feminisms have been intent on expunging, interrogating, or appropriating in positive ways.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Modern toxicology investigates a wide array of both old and new health hazards. Priority setting is needed to select agents for research from the plethora of exposure circumstances. The changing societies and a growing fraction of the aged have to be taken into consideration. A precise exposure assessment is of importance for risk estimation and regulation. Toxicology contributes to the exploration of pathomechanisms to specify the exposure metrics for risk estimation. Combined effects of co-existing agents are not yet sufficiently understood. Animal experiments allow a separate administration of agents which can not be disentangled by epidemiological means, but their value is limited for low exposure levels in many of today’s settings. As an experimental science, toxicology has to keep pace with the rapidly growing knowledge about the language of the genome and the changing paradigms in cancer development. During the pioneer era of assembling a working draft of the human genome, toxicogenomics has been developed. Gene and pathway complexity have to be considered when investigating gene–environment interactions. For a best conduct of studies, modern toxicology needs a close liaison with many other disciplines like epidemiology and bioinformatics.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This article looks at three main models of intervention that have informed recent policy and practice with people involved in the sex trade. It reveals the inherent contradictions within attempts to both help and punish workers in the existing prostitution strategy.