932 resultados para ExternaI Time-varying Reference Consumption Level


Relevância:

100.00% 100.00%

Publicador:

Resumo:

Attrition in longitudinal studies can lead to biased results. The study is motivated by the unexpected observation that alcohol consumption decreased despite increased availability, which may be due to sample attrition of heavy drinkers. Several imputation methods have been proposed, but rarely compared in longitudinal studies of alcohol consumption. The imputation of consumption level measurements is computationally particularly challenging due to alcohol consumption being a semi-continuous variable (dichotomous drinking status and continuous volume among drinkers), and the non-normality of data in the continuous part. Data come from a longitudinal study in Denmark with four waves (2003-2006) and 1771 individuals at baseline. Five techniques for missing data are compared: Last value carried forward (LVCF) was used as a single, and Hotdeck, Heckman modelling, multivariate imputation by chained equations (MICE), and a Bayesian approach as multiple imputation methods. Predictive mean matching was used to account for non-normality, where instead of imputing regression estimates, "real" observed values from similar cases are imputed. Methods were also compared by means of a simulated dataset. The simulation showed that the Bayesian approach yielded the most unbiased estimates for imputation. The finding of no increase in consumption levels despite a higher availability remained unaltered. Copyright (C) 2011 John Wiley & Sons, Ltd.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The number of physical activity measures and indexes used in the human literature is large and may result in some difficulty for the average investigator to choose the most appropriate measure. Accordingly, this review is intended to provide information on the utility and limitations of the various measures. Its primary focus is the objective assessment of free-living physical activity in humans based on physiological and biomechanical methods. The physical activity measures have been classified into three categories: Measures based on energy expenditure or oxygen uptake, such as activity energy expenditure, activity-related time equivalent, physical activity level, physical activity ratio, metabolic equivalent, and a new index of potential interest, daytime physical activity level. Measures based on heart rate monitoring, such as net heart rate, physical activity ratio heart rate, physical activity level heart rate, activity-related time equivalent, and daytime physical activity level heart rate. Measures based on whole-body accelerometry (counts/U time). Quantification of the velocity and duration of displacement in outdoor conditions by satellites using the Differential Global Positioning System may constitute a surrogate for physical activity, because walking is the primary activity of man in free-living conditions. A general outline of the measures and indexes described above is presented in tabular form, along with their respective definition, usual applications, advantages, and shortcomings. A practical example is given with typical values in obese and non-obese subjects. The various factors to be considered in the selection of physical activity methods include experimental goals, sample size, budget, cultural and social/environmental factors, physical burden for the subject, and statistical factors, such as accuracy and precision. It is concluded that no single current technique is able to quantify all aspects of physical activity under free-living conditions, requiring the use of complementary methods. In the future, physical activity sensors, which are of low-cost, small-sized, and convenient for subjects, investigators, and clinicians, are needed to reliably monitor, during extended periods in free-living situations, small changes in movements and grade as well as duration and intensity of typical physical activities.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Time series regression models are especially suitable in epidemiology for evaluating short-term effects of time-varying exposures on health. The problem is that potential for confounding in time series regression is very high. Thus, it is important that trend and seasonality are properly accounted for. Our paper reviews the statistical models commonly used in time-series regression methods, specially allowing for serial correlation, make them potentially useful for selected epidemiological purposes. In particular, we discuss the use of time-series regression for counts using a wide range Generalised Linear Models as well as Generalised Additive Models. In addition, recently critical points in using statistical software for GAM were stressed, and reanalyses of time series data on air pollution and health were performed in order to update already published. Applications are offered through an example on the relationship between asthma emergency admissions and photochemical air pollutants

Relevância:

100.00% 100.00%

Publicador:

Resumo:

For the first time, we used multilocus sequence typing (MLST) to understand how Romanian group B streptococcus (GBS) strains fit into the global GBS population structure. Colonising isolates recovered from adult human females were tested for antibiotic resistance, were molecularly serotyped based on the capsular polysaccharide synthesis (cps) gene cluster and further characterised using a set of molecular markers (surface protein genes, pilus-encoded islands and mobile genetic elements inserted in the scpB-lmb intergenic region). Pulsed-field gel electrophoresis was used to complement the MLST clonal distribution pattern of selected strains. Among the 55 strains assigned to six cps types (Ia, Ib, II-V), 18 sequence types (STs) were identified by MLST. Five STs represented new entries to the MLST database. The prevalent STs were ST-1, ST-17, ST-19 and ST-28. Twenty molecular marker profiles were identified. The most common profiles (rib+GBSi1+PI-1, rib+GBSi1+PI-1, PI-2b and alp2/3+PI-1, PI-2a) were associated with the cps III/ST-17 and cps V/ST-1 strains. A cluster of fluoroquinolone-resistant strains was detected among the cps V/ST-19 members; these strains shared alp1 and IS1548 and carried PI-1, PI-2a or both. Our results support the usefulness of implementing an integrated genotyping system at the reference laboratory level to obtain the reliable data required to make comparisons between countries.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

We date turning points of the reference cycle for 19 Mediterranean countries andanalyze their structure and interdependences. Fluctuations are volatile and not highlycorrelated across countries; recessions are deep but asynchronous making average outputlosses in the area limited. Heterogeneities across countries and regions are substantial.Mediterranean cycles are time varying but their evolution is not linked withthe Euro-Mediterranean partnership process. The concordance of cyclical fluctuationsis poorly related to trade and financial linkages and to their evolution over time.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This paper investigates the contribution of monetary policy to the changes in outputgrowth and inflation dynamics in the US. We identify a policy shock and a policy rule ina time-varying coefficients VAR using robust sign restrictions. The transmission of policyshocks has been relatively stable. The variance of the policy shock has decreased over time,but policy shocks account for a small fraction of the level and of the variations in inflationand output growth volatility and persistence. We find little evidence of a significant increasein the long run response of the interest rate to inflation. A more aggressive inflation policyin the 1970s would have produced large output growth costs.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This paper analyzes a panel of 18 European countries spanning from 1950 to 2003 toexamine the extent to which the legal reforms leading to easier divorce that took placeduring the second half of the 20th century have contributed to the increase in divorce rates across Europe. We use a quasi-experimental set-up and exploit the different timing of the reforms in divorce laws across countries. We account for unobserved country-specificfactors by introducing country fixed effects, and we include country-specific trends tocontrol for time-varying factors at the country level that may be correlated with divorcerates and divorce laws, such as changing social norms or slow moving demographictrends. We find that the reforms were followed by significant increases in divorce rates.Overall, we estimate that the introduction of no-fault, unilateral divorce increased thedivorce rate by about 1, a sizeable effect given the average rate of 4.2 divorces per 1,000married people in 2002.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Preface In this thesis we study several questions related to transaction data measured at an individual level. The questions are addressed in three essays that will constitute this thesis. In the first essay we use tick-by-tick data to estimate non-parametrically the jump process of 37 big stocks traded on the Paris Stock Exchange, and of the CAC 40 index. We separate the total daily returns in three components (trading continuous, trading jump, and overnight), and we characterize each one of them. We estimate at the individual and index levels the contribution of each return component to the total daily variability. For the index, the contribution of jumps is smaller and it is compensated by the larger contribution of overnight returns. We test formally that individual stocks jump more frequently than the index, and that they do not respond independently to the arrive of news. Finally, we find that daily jumps are larger when their arrival rates are larger. At the contemporaneous level there is a strong negative correlation between the jump frequency and the trading activity measures. The second essay study the general properties of the trade- and volume-duration processes for two stocks traded on the Paris Stock Exchange. These two stocks correspond to a very illiquid stock and to a relatively liquid stock. We estimate a class of autoregressive gamma process with conditional distribution from the family of non-central gamma (up to a scale factor). This process was introduced by Gouriéroux and Jasiak and it is known as Autoregressive gamma process. We also evaluate the ability of the process to fit the data. For this purpose we use the Diebold, Gunther and Tay (1998) test; and the capacity of the model to reproduce the moments of the observed data, and the empirical serial correlation and the partial serial correlation functions. We establish that the model describes correctly the trade duration process of illiquid stocks, but have problems to adjust correctly the trade duration process of liquid stocks which present long-memory characteristics. When the model is adjusted to volume duration, it successfully fit the data. In the third essay we study the economic relevance of optimal liquidation strategies by calibrating a recent and realistic microstructure model with data from the Paris Stock Exchange. We distinguish the case of parameters which are constant through the day from time-varying ones. An optimization problem incorporating this realistic microstructure model is presented and solved. Our model endogenizes the number of trades required before the position is liquidated. A comparative static exercise demonstrates the realism of our model. We find that a sell decision taken in the morning will be liquidated by the early afternoon. If price impacts increase over the day, the liquidation will take place more rapidly.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Multiexponential decays may contain time-constants differing in several orders of magnitudes. In such cases, uniform sampling results in very long records featuring a high degree of oversampling at the final part of the transient. Here, we analyze a nonlinear time scale transformation to reduce the total number of samples with minimum signal distortion, achieving an important reduction of the computational cost of subsequent analyses. We propose a time-varying filter whose length is optimized for minimum mean square error

Relevância:

100.00% 100.00%

Publicador:

Resumo:

OBJECTIVE: Most studies on alcohol as a risk factor for injuries have been mechanism specific, and few have considered several mechanisms simultaneously or reported alcohol-attributable fractions (AAFs)-which was the aim of the current study. METHOD: Data from 3,592 injured and 3,489 noninjured patients collected between January 2003 and June 2004 in the surgical ward of the emergency department of the Lausanne University Hospital (Switzerland) were analyzed. Four injury mechanisms derived from the International Classification of Diseases, 10th Revision, were considered: transportation-related injuries, falls, exposure to forces and other events, and interpersonal violence. Multinomial logistic regression models were calculated to estimate the risk relationships of different levels of alcohol consumption, using noninjured patients as quasi-controls. The AAFs were then calculated. RESULTS: Risk relationships between injury and acute consumption were found across all mechanisms, commonly resulting in dose-response relationships. Marked differences between mechanisms were observed for relative risks and AAFs, which varied between 15.2% and 33.1% and between 10.1% and 35.9%, depending on the time window of consumption (either 6 hours or 24 hours before injury, respectively). Low and medium levels of alcohol consumption generally were associated with the most AAFs. CONCLUSIONS: This study underscores the implications of even low levels of alcohol consumption on the risk of sustaining injuries through any of the mechanisms considered. Substantial AAFs are reported for each mechanism, particularly for injuries resulting from interpersonal violence. Observation of a so-called preventive paradox phenomenon is discussed, and prevention or intervention measures are described.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

BACKGROUND: Many studies have tracked the distribution and persistence of avian haemosporidian communities across space and time at the population level, but few studies have investigated these aspects of infection at the individual level over time. Important aspects of parasite infection at the individual level can be missed if only trends at the population level are studied. This study aimed to determine how persistent Haemosporida are in great tit individuals recaptured over several years, whether parasitaemia differed by parasite lineage (mitochondrial cytochrome b haplotype) and how co-infection (i.e. concurrent infection with multiple genera of parasites) affects parasitaemia and body mass. METHODS: Parasite prevalence was determined by polymerase chain reaction (PCR), quantitative PCR were used to assess parasitaemia and sequencing was employed to determine the identity of the lineages using the MalAvi database. RESULTS: Haemosporidian prevalence was high over sampled years with 98% of 55 recaptured individuals showing infection in at least one year of capture. Eighty-two percent of all positive individuals suffered co-infection, with an overall haemosporidian lineage diversity of seventeen. Plasmodium and Haemoproteus parasites were found to be highly persistent, with lineages from these genera consistently found in individuals across years and with no differences in individual parasitaemia being recorded at subsequent captures. Conversely, Leucocytozoon parasites showed higher turnover with regard to lineage changes or transitions in infection status (infected vs non-infected) across years. Parasitaemia was found to be lineage specific and there was no relationship between Plasmodium parasitaemia or host body condition and the presence of Leucocytozoon parasites. CONCLUSIONS: The findings of this study suggest that different genera of haemosporidian parasites interact differently with their host and other co-infecting parasites, influencing parasite persistence most likely through inter-parasite competition or host-parasite immune interactions. Even-though co-infections do not seem to result in increased virulence (higher parasitaemia or poorer host body condition), further investigation into infection potential of these parasites, both individually and as co-infections, is necessary.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

EXECUTIVE SUMMARY : Evaluating Information Security Posture within an organization is becoming a very complex task. Currently, the evaluation and assessment of Information Security are commonly performed using frameworks, methodologies and standards which often consider the various aspects of security independently. Unfortunately this is ineffective because it does not take into consideration the necessity of having a global and systemic multidimensional approach to Information Security evaluation. At the same time the overall security level is globally considered to be only as strong as its weakest link. This thesis proposes a model aiming to holistically assess all dimensions of security in order to minimize the likelihood that a given threat will exploit the weakest link. A formalized structure taking into account all security elements is presented; this is based on a methodological evaluation framework in which Information Security is evaluated from a global perspective. This dissertation is divided into three parts. Part One: Information Security Evaluation issues consists of four chapters. Chapter 1 is an introduction to the purpose of this research purpose and the Model that will be proposed. In this chapter we raise some questions with respect to "traditional evaluation methods" as well as identifying the principal elements to be addressed in this direction. Then we introduce the baseline attributes of our model and set out the expected result of evaluations according to our model. Chapter 2 is focused on the definition of Information Security to be used as a reference point for our evaluation model. The inherent concepts of the contents of a holistic and baseline Information Security Program are defined. Based on this, the most common roots-of-trust in Information Security are identified. Chapter 3 focuses on an analysis of the difference and the relationship between the concepts of Information Risk and Security Management. Comparing these two concepts allows us to identify the most relevant elements to be included within our evaluation model, while clearing situating these two notions within a defined framework is of the utmost importance for the results that will be obtained from the evaluation process. Chapter 4 sets out our evaluation model and the way it addresses issues relating to the evaluation of Information Security. Within this Chapter the underlying concepts of assurance and trust are discussed. Based on these two concepts, the structure of the model is developed in order to provide an assurance related platform as well as three evaluation attributes: "assurance structure", "quality issues", and "requirements achievement". Issues relating to each of these evaluation attributes are analysed with reference to sources such as methodologies, standards and published research papers. Then the operation of the model is discussed. Assurance levels, quality levels and maturity levels are defined in order to perform the evaluation according to the model. Part Two: Implementation of the Information Security Assurance Assessment Model (ISAAM) according to the Information Security Domains consists of four chapters. This is the section where our evaluation model is put into a welldefined context with respect to the four pre-defined Information Security dimensions: the Organizational dimension, Functional dimension, Human dimension, and Legal dimension. Each Information Security dimension is discussed in a separate chapter. For each dimension, the following two-phase evaluation path is followed. The first phase concerns the identification of the elements which will constitute the basis of the evaluation: ? Identification of the key elements within the dimension; ? Identification of the Focus Areas for each dimension, consisting of the security issues identified for each dimension; ? Identification of the Specific Factors for each dimension, consisting of the security measures or control addressing the security issues identified for each dimension. The second phase concerns the evaluation of each Information Security dimension by: ? The implementation of the evaluation model, based on the elements identified for each dimension within the first phase, by identifying the security tasks, processes, procedures, and actions that should have been performed by the organization to reach the desired level of protection; ? The maturity model for each dimension as a basis for reliance on security. For each dimension we propose a generic maturity model that could be used by every organization in order to define its own security requirements. Part three of this dissertation contains the Final Remarks, Supporting Resources and Annexes. With reference to the objectives of our thesis, the Final Remarks briefly analyse whether these objectives were achieved and suggest directions for future related research. Supporting resources comprise the bibliographic resources that were used to elaborate and justify our approach. Annexes include all the relevant topics identified within the literature to illustrate certain aspects of our approach. Our Information Security evaluation model is based on and integrates different Information Security best practices, standards, methodologies and research expertise which can be combined in order to define an reliable categorization of Information Security. After the definition of terms and requirements, an evaluation process should be performed in order to obtain evidence that the Information Security within the organization in question is adequately managed. We have specifically integrated into our model the most useful elements of these sources of information in order to provide a generic model able to be implemented in all kinds of organizations. The value added by our evaluation model is that it is easy to implement and operate and answers concrete needs in terms of reliance upon an efficient and dynamic evaluation tool through a coherent evaluation system. On that basis, our model could be implemented internally within organizations, allowing them to govern better their Information Security. RÉSUMÉ : Contexte général de la thèse L'évaluation de la sécurité en général, et plus particulièrement, celle de la sécurité de l'information, est devenue pour les organisations non seulement une mission cruciale à réaliser, mais aussi de plus en plus complexe. A l'heure actuelle, cette évaluation se base principalement sur des méthodologies, des bonnes pratiques, des normes ou des standards qui appréhendent séparément les différents aspects qui composent la sécurité de l'information. Nous pensons que cette manière d'évaluer la sécurité est inefficiente, car elle ne tient pas compte de l'interaction des différentes dimensions et composantes de la sécurité entre elles, bien qu'il soit admis depuis longtemps que le niveau de sécurité globale d'une organisation est toujours celui du maillon le plus faible de la chaîne sécuritaire. Nous avons identifié le besoin d'une approche globale, intégrée, systémique et multidimensionnelle de l'évaluation de la sécurité de l'information. En effet, et c'est le point de départ de notre thèse, nous démontrons que seule une prise en compte globale de la sécurité permettra de répondre aux exigences de sécurité optimale ainsi qu'aux besoins de protection spécifiques d'une organisation. Ainsi, notre thèse propose un nouveau paradigme d'évaluation de la sécurité afin de satisfaire aux besoins d'efficacité et d'efficience d'une organisation donnée. Nous proposons alors un modèle qui vise à évaluer d'une manière holistique toutes les dimensions de la sécurité, afin de minimiser la probabilité qu'une menace potentielle puisse exploiter des vulnérabilités et engendrer des dommages directs ou indirects. Ce modèle se base sur une structure formalisée qui prend en compte tous les éléments d'un système ou programme de sécurité. Ainsi, nous proposons un cadre méthodologique d'évaluation qui considère la sécurité de l'information à partir d'une perspective globale. Structure de la thèse et thèmes abordés Notre document est structuré en trois parties. La première intitulée : « La problématique de l'évaluation de la sécurité de l'information » est composée de quatre chapitres. Le chapitre 1 introduit l'objet de la recherche ainsi que les concepts de base du modèle d'évaluation proposé. La maniéré traditionnelle de l'évaluation de la sécurité fait l'objet d'une analyse critique pour identifier les éléments principaux et invariants à prendre en compte dans notre approche holistique. Les éléments de base de notre modèle d'évaluation ainsi que son fonctionnement attendu sont ensuite présentés pour pouvoir tracer les résultats attendus de ce modèle. Le chapitre 2 se focalise sur la définition de la notion de Sécurité de l'Information. Il ne s'agit pas d'une redéfinition de la notion de la sécurité, mais d'une mise en perspectives des dimensions, critères, indicateurs à utiliser comme base de référence, afin de déterminer l'objet de l'évaluation qui sera utilisé tout au long de notre travail. Les concepts inhérents de ce qui constitue le caractère holistique de la sécurité ainsi que les éléments constitutifs d'un niveau de référence de sécurité sont définis en conséquence. Ceci permet d'identifier ceux que nous avons dénommés « les racines de confiance ». Le chapitre 3 présente et analyse la différence et les relations qui existent entre les processus de la Gestion des Risques et de la Gestion de la Sécurité, afin d'identifier les éléments constitutifs du cadre de protection à inclure dans notre modèle d'évaluation. Le chapitre 4 est consacré à la présentation de notre modèle d'évaluation Information Security Assurance Assessment Model (ISAAM) et la manière dont il répond aux exigences de l'évaluation telle que nous les avons préalablement présentées. Dans ce chapitre les concepts sous-jacents relatifs aux notions d'assurance et de confiance sont analysés. En se basant sur ces deux concepts, la structure du modèle d'évaluation est développée pour obtenir une plateforme qui offre un certain niveau de garantie en s'appuyant sur trois attributs d'évaluation, à savoir : « la structure de confiance », « la qualité du processus », et « la réalisation des exigences et des objectifs ». Les problématiques liées à chacun de ces attributs d'évaluation sont analysées en se basant sur l'état de l'art de la recherche et de la littérature, sur les différentes méthodes existantes ainsi que sur les normes et les standards les plus courants dans le domaine de la sécurité. Sur cette base, trois différents niveaux d'évaluation sont construits, à savoir : le niveau d'assurance, le niveau de qualité et le niveau de maturité qui constituent la base de l'évaluation de l'état global de la sécurité d'une organisation. La deuxième partie: « L'application du Modèle d'évaluation de l'assurance de la sécurité de l'information par domaine de sécurité » est elle aussi composée de quatre chapitres. Le modèle d'évaluation déjà construit et analysé est, dans cette partie, mis dans un contexte spécifique selon les quatre dimensions prédéfinies de sécurité qui sont: la dimension Organisationnelle, la dimension Fonctionnelle, la dimension Humaine, et la dimension Légale. Chacune de ces dimensions et son évaluation spécifique fait l'objet d'un chapitre distinct. Pour chacune des dimensions, une évaluation en deux phases est construite comme suit. La première phase concerne l'identification des éléments qui constituent la base de l'évaluation: ? Identification des éléments clés de l'évaluation ; ? Identification des « Focus Area » pour chaque dimension qui représentent les problématiques se trouvant dans la dimension ; ? Identification des « Specific Factors » pour chaque Focus Area qui représentent les mesures de sécurité et de contrôle qui contribuent à résoudre ou à diminuer les impacts des risques. La deuxième phase concerne l'évaluation de chaque dimension précédemment présentées. Elle est constituée d'une part, de l'implémentation du modèle général d'évaluation à la dimension concernée en : ? Se basant sur les éléments spécifiés lors de la première phase ; ? Identifiant les taches sécuritaires spécifiques, les processus, les procédures qui auraient dû être effectués pour atteindre le niveau de protection souhaité. D'autre part, l'évaluation de chaque dimension est complétée par la proposition d'un modèle de maturité spécifique à chaque dimension, qui est à considérer comme une base de référence pour le niveau global de sécurité. Pour chaque dimension nous proposons un modèle de maturité générique qui peut être utilisé par chaque organisation, afin de spécifier ses propres exigences en matière de sécurité. Cela constitue une innovation dans le domaine de l'évaluation, que nous justifions pour chaque dimension et dont nous mettons systématiquement en avant la plus value apportée. La troisième partie de notre document est relative à la validation globale de notre proposition et contient en guise de conclusion, une mise en perspective critique de notre travail et des remarques finales. Cette dernière partie est complétée par une bibliographie et des annexes. Notre modèle d'évaluation de la sécurité intègre et se base sur de nombreuses sources d'expertise, telles que les bonnes pratiques, les normes, les standards, les méthodes et l'expertise de la recherche scientifique du domaine. Notre proposition constructive répond à un véritable problème non encore résolu, auquel doivent faire face toutes les organisations, indépendamment de la taille et du profil. Cela permettrait à ces dernières de spécifier leurs exigences particulières en matière du niveau de sécurité à satisfaire, d'instancier un processus d'évaluation spécifique à leurs besoins afin qu'elles puissent s'assurer que leur sécurité de l'information soit gérée d'une manière appropriée, offrant ainsi un certain niveau de confiance dans le degré de protection fourni. Nous avons intégré dans notre modèle le meilleur du savoir faire, de l'expérience et de l'expertise disponible actuellement au niveau international, dans le but de fournir un modèle d'évaluation simple, générique et applicable à un grand nombre d'organisations publiques ou privées. La valeur ajoutée de notre modèle d'évaluation réside précisément dans le fait qu'il est suffisamment générique et facile à implémenter tout en apportant des réponses sur les besoins concrets des organisations. Ainsi notre proposition constitue un outil d'évaluation fiable, efficient et dynamique découlant d'une approche d'évaluation cohérente. De ce fait, notre système d'évaluation peut être implémenté à l'interne par l'entreprise elle-même, sans recourir à des ressources supplémentaires et lui donne également ainsi la possibilité de mieux gouverner sa sécurité de l'information.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

One signature of adaptive radiation is a high level of trait change early during the diversification process and a plateau toward the end of the radiation. Although the study of the tempo of evolution has historically been the domain of paleontologists, recently developed phylogenetic tools allow for the rigorous examination of trait evolution in a tremendous diversity of organisms. Enemy-driven adaptive radiation was a key prediction of Ehrlich and Raven's coevolutionary hypothesis [Ehrlich PR, Raven PH (1964) Evolution 18:586-608], yet has remained largely untested. Here we examine patterns of trait evolution in 51 North American milkweed species (Asclepias), using maximum likelihood methods. We study 7 traits of the milkweeds, ranging from seed size and foliar physiological traits to defense traits (cardenolides, latex, and trichomes) previously shown to impact herbivores, including the monarch butterfly. We compare the fit of simple random-walk models of trait evolution to models that incorporate stabilizing selection (Ornstein-Ulenbeck process), as well as time-varying rates of trait evolution. Early bursts of trait evolution were implicated for 2 traits, while stabilizing selection was implicated for several others. We further modeled the relationship between trait change and species diversification while allowing rates of trait evolution to vary during the radiation. Species-rich lineages underwent a proportionately greater decline in latex and cardenolides relative to species-poor lineages, and the rate of trait change was most rapid early in the radiation. An interpretation of this result is that reduced investment in defensive traits accelerated diversification, and disproportionately so, early in the adaptive radiation of milkweeds.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

In this paper, the theory of hidden Markov models (HMM) isapplied to the problem of blind (without training sequences) channel estimationand data detection. Within a HMM framework, the Baum–Welch(BW) identification algorithm is frequently used to find out maximum-likelihood (ML) estimates of the corresponding model. However, such a procedureassumes the model (i.e., the channel response) to be static throughoutthe observation sequence. By means of introducing a parametric model fortime-varying channel responses, a version of the algorithm, which is moreappropriate for mobile channels [time-dependent Baum-Welch (TDBW)] isderived. Aiming to compare algorithm behavior, a set of computer simulationsfor a GSM scenario is provided. Results indicate that, in comparisonto other Baum–Welch (BW) versions of the algorithm, the TDBW approachattains a remarkable enhancement in performance. For that purpose, onlya moderate increase in computational complexity is needed.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Several papers document idiosyncratic volatility is time-varying and many attempts have been made to reveal whether idiosyncratic risk is priced. This research studies behavior of idiosyncratic volatility around information release dates and also its relation with return after public announcement. The results indicate that when a company discloses specific information to the market, firm’s specific volatility level shifts and short-horizon event-induced volatility vary significantly however, the category to which the announcement belongs is not important in magnitude of change. This event-induced volatility is not small in size and should not be downplayed in event studies. Moreover, this study shows stocks with higher contemporaneous realized idiosyncratic volatility earn lower return after public announcement consistent with “divergence of opinion hypothesis”. While no significant relation is found between EGARCH estimated idiosyncratic volatility and return and also between one-month lagged idiosyncratic volatility and return presumably due to significant jump around public announcement both may provide some signals regarding future idiosyncratic volatility through their correlations with contemporaneous realized idiosyncratic volatility. Finally, the study show that positive relation between return and idiosyncratic volatility based on under-diversification is inadequate to explain all different scenarios and this negative relation after public announcement may provide a useful trading rule.