842 resultados para Cluster anaysis
Resumo:
En este artículo proponemos un abordaje de las formas sociales de producción familiar, articulando la reflexión teórica sobre las dimensiones de interés que comprenden su definición y la propuesta de identificación de distintos subtipos agrarios, dentro de la categoría de explotación familiar. Asimismo revisamos una serie de factores que suelen considerarse al momento de explicar y/o definir el carácter familiar de las unidades productivas familiares, para luego avanzar a través de un ejercicio de estimación de la importancia de los distintos subtipos familiares.A partir de este ejercicio, buscaremos acercarnos al debate sobre los obstáculos al desarrollo del capitalismo en el agro a la luz de los datos obtenidos. El artículo se basa en el reprocesamiento de los datos censales originales del Censo Agropecuario Nacional del año 2002, tomando como caso de aplicación el partido bonaerense de Rojas.
Resumo:
En este artículo proponemos un abordaje de las formas sociales de producción familiar, articulando la reflexión teórica sobre las dimensiones de interés que comprenden su definición y la propuesta de identificación de distintos subtipos agrarios, dentro de la categoría de explotación familiar. Asimismo revisamos una serie de factores que suelen considerarse al momento de explicar y/o definir el carácter familiar de las unidades productivas familiares, para luego avanzar a través de un ejercicio de estimación de la importancia de los distintos subtipos familiares.A partir de este ejercicio, buscaremos acercarnos al debate sobre los obstáculos al desarrollo del capitalismo en el agro a la luz de los datos obtenidos. El artículo se basa en el reprocesamiento de los datos censales originales del Censo Agropecuario Nacional del año 2002, tomando como caso de aplicación el partido bonaerense de Rojas.
Resumo:
En este artículo proponemos un abordaje de las formas sociales de producción familiar, articulando la reflexión teórica sobre las dimensiones de interés que comprenden su definición y la propuesta de identificación de distintos subtipos agrarios, dentro de la categoría de explotación familiar. Asimismo revisamos una serie de factores que suelen considerarse al momento de explicar y/o definir el carácter familiar de las unidades productivas familiares, para luego avanzar a través de un ejercicio de estimación de la importancia de los distintos subtipos familiares.A partir de este ejercicio, buscaremos acercarnos al debate sobre los obstáculos al desarrollo del capitalismo en el agro a la luz de los datos obtenidos. El artículo se basa en el reprocesamiento de los datos censales originales del Censo Agropecuario Nacional del año 2002, tomando como caso de aplicación el partido bonaerense de Rojas.
Resumo:
Background Zoonotic schistosomiasis japonica is a major public health problem in China. Bovines, particularly water buffaloes, are thought to play a major role in the transmission of schistosomiasis to humans in China. Preliminary results (1998–2003) of a praziquantel (PZQ)-based pilot intervention study we undertook provided proof of principle that water buffaloes are major reservoir hosts for S. japonicum in the Poyang Lake region, Jiangxi Province. Methods and Findings Here we present the results of a cluster-randomised intervention trial (2004–2007) undertaken in Hunan and Jiangxi Provinces, with increased power and more general applicability to the lake and marshlands regions of southern China. The trial involved four matched pairs of villages with one village within each pair randomly selected as a control (human PZQ treatment only), leaving the other as the intervention (human and bovine PZQ treatment). A sentinel cohort of people to be monitored for new infections for the duration of the study was selected from each village. Results showed that combined human and bovine chemotherapy with PZQ had a greater effect on human incidence than human PZQ treatment alone. Conclusions The results from this study, supported by previous experimental evidence, confirms that bovines are the major reservoir host of human schistosomiasis in the lake and marshland regions of southern China, and reinforce the rationale for the development and deployment of a transmission blocking anti-S. japonicum vaccine targeting bovines.
Resumo:
Background The problem of silent multiple comparisons is one of the most difficult statistical problems faced by scientists. It is a particular problem for investigating a one-off cancer cluster reported to a health department because any one of hundreds, or possibly thousands, of neighbourhoods, schools, or workplaces could have reported a cluster, which could have been for any one of several types of cancer or any one of several time periods. Methods This paper contrasts the frequentist approach with a Bayesian approach for dealing with silent multiple comparisons in the context of a one-off cluster reported to a health department. Two published cluster investigations were re-analysed using the Dunn-Sidak method to adjust frequentist p-values and confidence intervals for silent multiple comparisons. Bayesian methods were based on the Gamma distribution. Results Bayesian analysis with non-informative priors produced results similar to the frequentist analysis, and suggested that both clusters represented a statistical excess. In the frequentist framework, the statistical significance of both clusters was extremely sensitive to the number of silent multiple comparisons, which can only ever be a subjective "guesstimate". The Bayesian approach is also subjective: whether there is an apparent statistical excess depends on the specified prior. Conclusion In cluster investigations, the frequentist approach is just as subjective as the Bayesian approach, but the Bayesian approach is less ambitious in that it treats the analysis as a synthesis of data and personal judgements (possibly poor ones), rather than objective reality. Bayesian analysis is (arguably) a useful tool to support complicated decision-making, because it makes the uncertainty associated with silent multiple comparisons explicit.
Resumo:
BACKGROUND: Literature and clinical experience suggest that some people experience atypical, complicated or pathological bereavement reactions in response to a major loss. METHOD: Three groups of community-based bereaved subjects--spouses (n = 44), adult children (n = 40), and parents (n = 36)--were followed up four times in the 13 months after a loss. A 17-item scale of core bereavement times was developed and used to investigate the intensity of the bereavement response over time. RESULTS: Cluster analysis revealed a pattern of bereavement-related symptoms approximating a syndrome of chronic grief in 11 (9.2%) of the 120 subjects. None of the respondents displayed a pattern consistent with delayed or absent grief. CONCLUSIONS: In a non-clinical community sample of bereaved people, delayed or absent grief is infrequently seen, unlike chronic grief, which is demonstrated in a minority.
Resumo:
This paper considers the history of the cluster concept in urban economic geography, and its relationship to recent debates about creative cities. It then looks at the role that universities can play in the development of a creative cluster, as well as some of the potential pitfalls.
Resumo:
Maximisation of Knowledge-Based Development (KBD) benefits requires effective dissemination and utilisation mechanisms to accompany the initial knowledge creation process. This work highlights the potential for interactions between Supply Chains (SCs) and Small and Medium sized Enterprise Clusters (SMECs), (including via ‘junction’ firms which are members of both networks), to facilitate such effective dissemination and utilisation of knowledge. In both these network types there are firms that readily utilise their relationships and ties for ongoing business success through innovation. The following chapter highlights the potential for such beneficial interactions between SCs and SMECs in key elements of KBD, particularly knowledge management, innovation and technology transfer. Because there has been little focus on the interactions between SCs and SMECs, particularly when firms simultaneously belong to both, this chapter examines the conduits through which information and knowledge can be transferred and utilised. It shows that each network type has its own distinct advantages in the types of information searched for and transferred amongst network member firms. Comparing and contrasting these advantages shows opportunities for both networks to leverage the knowledge sharing strengths of each other, through these ‘junctions’ to address their own weaknesses, allowing implications to be drawn concerning new ways of utilising relationships for mutual network gains.
Resumo:
The ad hoc networks are vulnerable to attacks due to distributed nature and lack of infrastructure. Intrusion detection systems (IDS) provide audit and monitoring capabilities that offer the local security to a node and help to perceive the specific trust level of other nodes. The clustering protocols can be taken as an additional advantage in these processing constrained networks to collaboratively detect intrusions with less power usage and minimal overhead. Existing clustering protocols are not suitable for intrusion detection purposes, because they are linked with the routes. The route establishment and route renewal affects the clusters and as a consequence, the processing and traffic overhead increases due to instability of clusters. The ad hoc networks are battery and power constraint, and therefore a trusted monitoring node should be available to detect and respond against intrusions in time. This can be achieved only if the clusters are stable for a long period of time. If the clusters are regularly changed due to routes, the intrusion detection will not prove to be effective. Therefore, a generalized clustering algorithm has been proposed that can run on top of any routing protocol and can monitor the intrusions constantly irrespective of the routes. The proposed simplified clustering scheme has been used to detect intrusions, resulting in high detection rates and low processing and memory overhead irrespective of the routes, connections, traffic types and mobility of nodes in the network. Clustering is also useful to detect intrusions collaboratively since an individual node can neither detect the malicious node alone nor it can take action against that node on its own.