5,123 research outputs found

    Local and nonlocal solvable structures in ODEs reduction

    Full text link
    Solvable structures, likewise solvable algebras of local symmetries, can be used to integrate scalar ODEs by quadratures. Solvable structures, however, are particularly suitable for the integration of ODEs with a lack of local symmetries. In fact, under regularity assumptions, any given ODE always admits solvable structures even though finding them in general could be a very difficult task. In practice a noteworthy simplification may come by computing solvable structures which are adapted to some admitted symmetry algebra. In this paper we consider solvable structures adapted to local and nonlocal symmetry algebras of any order (i.e., classical and higher). In particular we introduce the notion of nonlocal solvable structure

    Beyond and beneath the hierarchical market economy: global production and working-class conflict in Argentina's automobile industry

    Get PDF
    This paper argues that the hierarchical market economy (HME) category does not provide an adequate starting point for addressing capitalist diversity in Latin America. Building from a critical perspective on the global commodity chain (GCC) and global production network (GPN) approaches, it instead considers the impact of firms’ transnational relations and the often neglected role of working-class struggles. It will argue that capitalist diversity can only be understood at the nexus of these ostensibly global and local phenomena; and by specifying the strategic decisions taken by firms in Argentina’s automobile industry, it will account for the failure of that sector. Finally, it examines the role of working-class struggles in the industry in Córdoba, Argentina, arguing that these were vital in shaping the specific and unstable form of capitalist diversity in Argentina, as well as potential alternatives to it

    Blurring the boundaries between synthesis and evaluation. A customized realist evaluative synthesis into adolescent risk behavior prevention

    Get PDF
    Realist methodologies have been increasingly advocated for the investigation of complex social issues. Public health programs, such as those designed to prevent adolescent risk behavior, are typically considered complex. In conducting a realist review of the empirical literature relating to such programs, we encountered several challenges, including (a) an overabundance of empirical evidence, (b) a problematic level of heterogeneity within and between methodological approaches, (c) discrepancies between theoretical underpinnings and program operationalization, (d) homogeneity of program outcomes, with very little variation in program effectiveness, and (d) a paucity of description relating to content and process. To overcome these challenges, we developed a customized approach to realist evidence synthesis, drawing on the VICTORE (Volition, Implementation, Contexts, Time, Outcomes, Rivalry, and Emergence) complexity checklist and incorporating stakeholder engagement as primary data to achieve greater depth of understanding relating to contextual and mechanistic factors, and the complex interactions between them. Here we discuss the benefits of this adapted methodology alongside an overview of the research through which the methodology was developed. A key finding from this research was that combining the complexity checklist with primary data from stakeholder engagement enabled us to systematically interrogate the data across data sources, uncovering and evidencing mechanisms which may otherwise have remained hidden, giving greater ontological depth to our research findings. This paper builds on key methodological developments in realist research, demonstrating how realist methodologies can be customized to overcome challenges in developing and refining program theory from the literature, and contributes to the broader literature of innovative approaches to realist research

    Disintegration of the genus Prosopis L. (Leguminosae, Caesalpinioideae, mimosoid clade)

    Full text link
    Robust evidence from phylogenomic analyses of 997 nuclear genes has recently shown, beyond doubt, that the genus Prosopis is polyphyletic with three separate lineages, each with affinities to other genera of mimosoids: (i) Prosopis africana is an isolated lineage placed in the grade of Plathymenia, Newtonia and Fillaeopsis that subtends the core mimosoid clade; (ii) the remaining Old World species of Prosopis form a clade that is sister to the Indo-Nepalese monospecific genus Indopiptadenia and (iii) New World Prosopis has the Namibian / Namaqualand monospecific endemic genus Xerocladia nested within it. This means that it is now clear that maintaining the unity of the genus Prosopis sensu Burkart (1976) is no longer tenable. These three distinct lineages of Prosopis species correspond directly to Burkart’s (1976) sectional classification of the genus, to previously recognised genera and to the differences in types of armature that underpin Burkart’s sections. Here, we address this non-monophyly by resurrecting three segregate genera – Anonychium, Neltuma and Strombocarpa and provide 57 new name combinations where necessary, while maintaining the morphologically distinctive and geographically isolated genera Xerocladia and Indopiptadenia. The genus Prosopis itself is reduced to just three species and an emended description is presented. The impacts of these name changes for a genus of such high ecological and human use importance are discussed. These impacts are mitigated by clear differences in armature which facilitate identification and by potential benefits from the deeper biological understanding brought about by recognition of these divergent lineages at generic rank. We provide an identification key to genera and present a map showing the distributions of the segregate genera, as well as drawings and photos illustrating variation in armature and fruits

    Estimating Exploitation Rates in the Alabama Red Snapper Fishery Using a High-Reward Tag–Recapture Approach

    Get PDF
    Accurate estimates of exploitation are essential to managing an exploited fishery. However, these estimates are often dependent on the area and vulnerable sizes of fish considered in a study. High-reward tagging studies offer a simple and direct approach to estimating exploitation rates at these various scales and in examining how model parameters impact exploitation rate estimates. These methods can ultimately provide a better understanding of the spatial dynamics of exploitation at smaller local and regional scales within a fishery—a measure often needed for more site-attached species, such as the Red Snapper Lutjanus campechanus. We used this approach to tag 724 Red Snapper during 2016 in the Alabama Artificial Reef Zone within the northern Gulf of Mexico to estimate recreational exploitation rates in Alabama waters. We fitted a series of tag return models, analyzed using maximum likelihood, to examine how release depth, movement between depth strata, fish length, and the rate at which anglers released fish impacted estimates of exploitation rate under a range of assumed natural and tagging mortality rates. Our model results suggested higher fishing mortality in the shallower depth stratum than in the deep stratum, constant movement rates with release depth, and constant release rates across fish lengths. Exploitation rate for the aggregate tagged population across the entire sample area was estimated at 0.14. Exploitation rates estimated for each depth stratum were 0.20 (shallow stratum

    Detection of human bocavirus in children with Kawasaki disease

    Get PDF
    ABSTRACTHuman bocavirus (HboV) is an emerging virus that has been implicated as a cause of acute upper and lower respiratory tract infection in children. As no serological assay is available, PCR was used to screen nasopharyngeal, serum or stool samples from 16 patients with Kawasaki disease for HBoV nucleic acid. HBoV was identified by PCR in five (31.2%) patients, suggesting that this emerging virus may also play a pathogenic role in some cases of Kawasaki disease

    The GOAL study: a prospective examination of the impact of factor V Leiden and ABO(H) blood groups on haemorrhagic and thrombotic pregnancy outcomes

    Get PDF
    Factor V Leiden (FVL) and ABO(H) blood groups are the common influences on haemostasis and retrospective studies have linked FVL with pregnancy complications. However, only one sizeable prospective examination has taken place. As a result, neither the impact of FVL in unselected subjects, any interaction with ABO(H) in pregnancy, nor the utility of screening for FVL is defined. A prospective study of 4250 unselected pregnancies was carried out. A venous thromboembolism (VTE) rate of 1·23/1000 was observed, but no significant association between FVL and pre-eclampsia, intra-uterine growth restriction or pregnancy loss was seen. No influence of FVL and/or ABO(H) on ante-natal bleeding or intra-partum or postpartum haemorrhage was observed. However, FVL was associated with birth-weights >90th centile [odds ratio (OR) 1·81; 95% confidence interval (CI<sub>95</sub>) 1·04–3·31] and neonatal death (OR 14·79; CI<sub>95</sub> 2·71–80·74). No association with ABO(H) alone, or any interaction between ABO(H) and FVL was observed. We neither confirmed the protective effect of FVL on pregnancy-related blood loss reported in previous smaller studies, nor did we find the increased risk of some vascular complications reported in retrospective studies

    Efficient noninteractive certification of RSA moduli and beyond

    Get PDF
    In many applications, it is important to verify that an RSA public key (N; e) speci es a permutation over the entire space ZN, in order to prevent attacks due to adversarially-generated public keys. We design and implement a simple and e cient noninteractive zero-knowledge protocol (in the random oracle model) for this task. Applications concerned about adversarial key generation can just append our proof to the RSA public key without any other modi cations to existing code or cryptographic libraries. Users need only perform a one-time veri cation of the proof to ensure that raising to the power e is a permutation of the integers modulo N. For typical parameter settings, the proof consists of nine integers modulo N; generating the proof and verifying it both require about nine modular exponentiations. We extend our results beyond RSA keys and also provide e cient noninteractive zero- knowledge proofs for other properties of N, which can be used to certify that N is suitable for the Paillier cryptosystem, is a product of two primes, or is a Blum integer. As compared to the recent work of Auerbach and Poettering (PKC 2018), who provide two-message protocols for similar languages, our protocols are more e cient and do not require interaction, which enables a broader class of applications.https://eprint.iacr.org/2018/057First author draf
    corecore