995 resultados para THEORETIC MODELS


Relevância:

70.00% 70.00%

Publicador:

Resumo:

The optimized delta-expansion is a nonperturbative approach for field theoretic models which combines the techniques of perturbation theory and the variational principle. This technique is discussed in the lambda phi(4) model and then implemented in the Walecka model for the equation of state of nuclear matter. The results obtained with the delta expansion are compared with those obtained with the traditional mean field, relativistic Hartree and Hartree-Fock approximations.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Resumen: Existen varias posibilidades a la hora de analizar las distintas corrientes en la historiografía reciente del peronismo; sin embargo, en líneas generales, se puede decir que a lo largo de los años el foco del debate se ha trasladado de los sociólogos a los historiadores, de las perspectivas macro a las micro y de lo político a lo social. El énfasis inicial acerca de la supuesta ruptura y anomalía que representaba el peronismo ha prácticamente desaparecido a favor de la continuidad y de su contextualización en el proceso histórico argentino. La imagen homogénea ha sido reemplazada por un cuadro complejo y heterogéneo. Desde la perspectiva de los estudios de género, las investigaciones sobre el peronismo han producido no solamente trabajos sobre el Partido Peronista Femenino, sino otros que también han explorado temas como la reproducción, la maternidad, la infancia y las dinámicas familiares. Asimismo, la dimensión nacional, basada en la experiencia de la Capital Federal y sus alrededores, es decir la óptica metropolitana, ha dado lugar a distintas miradas provinciales, regionales y locales. Con cierta exageración se podría hablar de un desplazamiento de los grandes relatos y los modelos teóricos a los estudios de pequeña escala de la vida cotidiana bajo el peronismo.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

How animals use sensory information to weigh the risks vs. benefits of behavioral decisions remains poorly understood. Inter-male aggression is triggered when animals perceive both the presence of an appetitive resource, such as food or females, and of competing conspecific males. How such signals are detected and integrated to control the decision to fight is not clear. Here we use the vinegar fly, Drosophila melanogaster, to investigate the manner in which food and females promotes aggression.

In the first chapter, we explore how food controls aggression. As in many other species, food promotes aggression in flies, but it is not clear whether food increases aggression per se, or whether aggression is a secondary consequence of increased social interactions caused by aggregation of flies on food. Furthermore, nothing is known about how animals evaluate the quality and quantity of food in the context of competition. We show that food promotes aggression independently of any effect to increase the frequency of contact between males. Food increases aggression but not courtship between males, suggesting that the effect of food on aggression is specific. Next, we show that flies tune the level of aggression according to absolute amount of food rather than other parameters, such as area or concentration of food. Sucrose, a sugar molecule present in many fruits, is sufficient to promote aggression, and detection of sugar via gustatory receptor neurons is necessary for food-promoted aggression. Furthermore, we show that while food is necessary for aggression, too much food decreases aggression. Finally, we show that flies exhibit strategies consistent with a territorial strategy. These data suggest that flies use sweet-sensing gustatory information to guide their decision to fight over a limited quantity of a food resource.

Following up on the findings of the first chapter, we asked how the presence of a conspecific female resource promotes male-male aggression. In the absence of food, group-housed male flies, who normally do not fight even in the presence of food, fight in the presence of females. Unlike food, the presence of females strongly influences proximity between flies. Nevertheless, as group-housed flies do not fight even when they are in small chambers, it is unlikely that the presence of female indirectly increases aggression by first increasing proximity. Unlike food, the presence of females also leads to large increases in locomotion and in male-female courtship behaviors, suggesting that females may influence aggression as well as general arousal. Female cuticular hydrocarbons are required for this effect, as females that do not produce CH pheromones are unable to promote male-male aggression. In particular, 7,11-HD––a female-specific cuticular hydrocarbon pheromone critical for male-female courtship––is sufficient to mediate this effect when it is perfumed onto pheromone-deficient females or males. Recent studies showed that ppk23+ GRNs label two population of GRNs, one of which detects male cuticular hydrocarbons and another labeled by ppk23 and ppk25, which detects female cuticular hydrocarbons. I show that in particular, both of these GRNs control aggression, presumably via detection of female or male pheromones. To further investigate the ways in which these two classes of GRNs control aggression, I developed new genetic tools to independently test the male- and female-sensing GRNs. I show that ppk25-LexA and ppk25-GAL80 faithfully recapitulate the expression pattern of ppk25-GAL4 and label a subset of ppk23+ GRNs. These tools can be used in future studies to dissect the respective functions of male-sensing and female-sensing GRNs in male social behaviors.

Finally, in the last chapter, I discuss quantitative approaches to describe how varying quantities of food and females could control the level of aggression. Flies show an inverse-U shaped aggressive response to varying quantities of food and a flat aggressive response to varying quantities of females. I show how two simple game theoretic models, “prisoner’s dilemma” and “coordination game” could be used to describe the level of aggression we observe. These results suggest that flies may use strategic decision-making, using simple comparisons of costs and benefits.

In conclusion, male-male aggression in Drosophila is controlled by simple gustatory cues from food and females, which are detected by gustatory receptor neurons. Different quantities of resource cues lead to different levels of aggression, and flies show putative territorial behavior, suggesting that fly aggression is a highly strategic adaptive behavior. How these resource cues are integrated with male pheromone cues and give rise to this complex behavior is an interesting subject, which should keep researchers busy in the coming years.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

The origin, character, analysis and treatment of subsurface damage (SSD) were summarized in this paper. SSD, which was introduced to substrates by manufacture processes, may bring about the decrease of laser-induced damage threshold (LIDT) of substrates and thin films. Nondestructive evaluation (NDE) methods for the measurement of SSD were used extensively because of their conveniences and reliabilities. The principle, experimental setup and some other technological details were given for total internal reflection microscopy (TIRM), high-frequency scanning acoustic microscopy (HFSAM) and laser-modulated scattering (LMS). However, the spatial resolution, probing depth and theoretic models of these NDE methods demanded further studies. Furthermore, effective surface treatments for minimizing or eliminating SSD were also presented in this paper. Both advantages and disadvantages of ion beam etching (IBE) and magnetorheological finishing (MRF) were discussed. Finally, the key problems and research directions of SSD were summarized. (c) 2005 Elsevier GmbH. All rights reserved.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

In exploration geophysics,velocity analysis and migration methods except reverse time migration are based on ray theory or one-way wave-equation. So multiples are regarded as noise and required to be attenuated. It is very important to attenuate multiples for structure imaging, amplitude preserving migration. So it is an interesting research in theory and application about how to predict and attenuate internal multiples effectively. There are two methods based on wave-equation to predict internal multiples for pre-stack data. One is common focus point method. Another is inverse scattering series method. After comparison of the two methods, we found that there are four problems in common focus point method: 1. dependence of velocity model; 2. only internal multiples related to a layer can be predicted every time; 3. computing procedure is complex; 4. it is difficult to apply it in complex media. In order to overcome these problems, we adopt inverse scattering series method. However, inverse scattering series method also has some problems: 1. computing cost is high; 2. it is difficult to predict internal multiples in the far offset; 3. it is not able to predict internal multiples in complex media. Among those problems, high computing cost is the biggest barrier in field seismic processing. So I present 1D and 1.5D improved algorithms for reducing computing time. In addition, I proposed a new algorithm to solve the problem which exists in subtraction, especially for surface related to multiples. The creative results of my research are following: 1. derived an improved inverse scattering series prediction algorithm for 1D. The algorithm has very high computing efficiency. It is faster than old algorithm about twelve times in theory and faster about eighty times for lower spatial complexity in practice; 2. derived an improved inverse scattering series prediction algorithm for 1.5D. The new algorithm changes the computing domain from pseudo-depth wavenumber domain to TX domain for predicting multiples. The improved algorithm demonstrated that the approach has some merits such as higher computing efficiency, feasibility to many kinds of geometries, lower predictive noise and independence to wavelet; 3. proposed a new subtraction algorithm. The new subtraction algorithm is not used to overcome nonorthogonality, but utilize the nonorthogonality's distribution in TX domain to estimate the true wavelet with filtering method. The method has excellent effectiveness in model testing. Improved 1D and 1.5D inverse scattering series algorithms can predict internal multiples. After filtering and subtracting among seismic traces in a window time, internal multiples can be attenuated in some degree. The proposed 1D and 1.5D algorithms have demonstrated that they are effective to the numerical and field data. In addition, the new subtraction algorithm is effective to the complex theoretic models.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

In this paper, we expose an unorthodox adversarial attack that exploits the transients of a system's adaptive behavior, as opposed to its limited steady-state capacity. We show that a well orchestrated attack could introduce significant inefficiencies that could potentially deprive a network element from much of its capacity, or significantly reduce its service quality, while evading detection by consuming an unsuspicious, small fraction of that element's hijacked capacity. This type of attack stands in sharp contrast to traditional brute-force, sustained high-rate DoS attacks, as well as recently proposed attacks that exploit specific protocol settings such as TCP timeouts. We exemplify what we term as Reduction of Quality (RoQ) attacks by exposing the vulnerabilities of common adaptation mechanisms. We develop control-theoretic models and associated metrics to quantify these vulnerabilities. We present numerical and simulation results, which we validate with observations from real Internet experiments. Our findings motivate the need for the development of adaptation mechanisms that are resilient to these new forms of attacks.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

A foundational issue underlying many overlay network applications ranging from routing to P2P file sharing is that of connectivity management, i.e., folding new arrivals into an existing overlay, and re-wiring to cope with changing network conditions. Previous work has considered the problem from two perspectives: devising practical heuristics for specific applications designed to work well in real deployments, and providing abstractions for the underlying problem that are analytically tractable, especially via game-theoretic analysis. In this paper, we unify these two thrusts by using insights gleaned from novel, realistic theoretic models in the design of Egoist – a prototype overlay routing system that we implemented, deployed, and evaluated on PlanetLab. Using measurements on PlanetLab and trace-based simulations, we demonstrate that Egoist's neighbor selection primitives significantly outperform existing heuristics on a variety of performance metrics, including delay, available bandwidth, and node utilization. Moreover, we demonstrate that Egoist is competitive with an optimal, but unscalable full-mesh approach, remains highly effective under significant churn, is robust to cheating, and incurs minimal overhead. Finally, we discuss some of the potential benefits Egoist may offer to applications.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

A foundational issue underlying many overlay network applications ranging from routing to peer-to-peer file sharing is that of connectivity management, i.e., folding new arrivals into an existing overlay, and rewiring to cope with changing network conditions. Previous work has considered the problem from two perspectives: devising practical heuristics for specific applications designed to work well in real deployments, and providing abstractions for the underlying problem that are analytically tractable, especially via game-theoretic analysis. In this paper, we unify these two thrusts by using insights gleaned from novel, realistic theoretic models in the design of Egoist – a distributed overlay routing system that we implemented, deployed, and evaluated on PlanetLab. Using extensive measurements of paths between nodes, we demonstrate that Egoist’s neighbor selection primitives significantly outperform existing heuristics on a variety of performance metrics, including delay, available bandwidth, and node utilization. Moreover, we demonstrate that Egoist is competitive with an optimal, but unscalable full-mesh approach, remains highly effective under significant churn, is robust to cheating, and incurs minimal overhead. Finally, we use a multiplayer peer-to-peer game to demonstrate the value of Egoist to end-user applications. This technical report supersedes BUCS-TR-2007-013.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

We investigate the Nash equilibria of game theoretic models of network formation based on explicit consent in link formation. These so-called “consent models” explicitly take account of link formation costs. We provide characterizations of Nash equilibria of such consent models under both one-sided and two-sided costs of link formation. We relate these equilibrium concepts to link-based stability concepts, in particular strong link deletion proofness.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

In recent years, there has been an increase in research on conventions motivated by the game-theoretic contributions of the philosopher David Lewis. Prior to this surge in interest, discussions of convention in economics had been tied to the analysis of John Maynard Keynes's writings. These literatures are distinct and have very little overlap. Yet this confluence of interests raises interesting methodological questions. Does the use of a common term, convention, denote a set of shared concerns? Can we identify what differentiates the game theoretic models from the Keynesian ones? This paper maps out the three most developed accounts of convention within economics and discusses their relations with each other in an attempt to provide an answer.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Previous literature is reviewed to account for the existing experimental tests of standard oligopoly-theoretic models.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

We consider the three-particle scattering S-matrix for the Landau-Lifshitz model by directly computing the set of the Feynman diagrams up to the second order. We show, following the analogous computations for the non-linear Schrdinger model [1, 2], that the three-particle S-matrix is factorizable in the first non-trivial order.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Este artigo empreende a análise do discurso dos capítulos cinco e sete do documento do Banco Mundial: Para além do consenso de Washington: a importância das instituições, identificando e questionando a proposição de modelos teóricos para as reformas da administração pública e educacional na América Latina, com fundamento em autores preocupados em examinar o conceito de modelo teórico. A intenção é discutir as categorias envolvidas, suas ambigüidades e seu caráter inovador/conservador e definir se as propostas contidas no texto referido são nacional e regionalmente adequadas, se detêm o poder de transformar a realidade ou constituem apenas algo mais sobre a mesma coisa ou, pior, traduzem o resgate/elogio de modelos remodelados, inspirados na teoria empresarial, que alimentam a crítica dos acadêmicos regionais há décadas.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

The δ-expansion is a nonperturbative approach for field theoretic models which combines the techniques of perturbation theory and the variational principle. Different ways of implementing the principle of minimal sensitivity to the δ-expansion produce in general different results for observables. For illustration we use the Nambu-Jona-Lasinio model for chiral symmetry restoration at finite density and compare results with those obtained with the Hartree-Fock approximation.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Pós-graduação em Física - IFT