2,512 research outputs found
"Orthodox versus Heterodox (Minskyan) Perspectives of Financial Crises: Explosion in the 1990s versus Implosion in the 2000s"
Orthodox and heterodox theories of financial crises are hereby compared from a theoretical viewpoint, with emphasis on their genesis. The former view (represented by the fourth-generation models of Paul Krugman) reflects the neoclassical vision whereby turbulence is an exception; the latter insight (represented by the theories of Hyman P. Minsky) validates and extends John Maynard Keynes's vision, since it is related to a modern financial world. The result of this theoretical exercise is that Minsky's vision represents a superior explanation of financial crises and current events in financial systems because it considers the causes of financial crises as endogenous to the system. Crucial facts in relevant financial crises are mentioned in section 1, as an introduction; the orthodox models of financial crises are described in section 2; the heterodox models of financial crises are outlined in section 3; the main similarities and differences between orthodox and heterodox models of financial crises are identified in section 4; and conclusions based on the information provided by the previous section are outlined in section 5. References are listed at the end of the paper.John Maynard Keynes; Hyman P. Minsky; Paul Krugman; Financial Crises; Financial Fragility; Asset Bubbles; Speculation
WHAT IS THE LENGTH OF A SNAKE?
The way that herpetologists have traditionally measuredlive snakes is by stretching them on a ruler andrecording the total length (TL). However, due to the thinconstitution of the snake, the large number of intervertebraljoints, and slim muscular mass of most snakes,it is easier to stretch a snake than it is to stretch anyother vertebrate. The result of this is that the length ofa snake recorded is infl uenced by how much the animalis stretched. Stretching it as much as possible is perhapsa precise way to measure the length of the specimenbut it might not correspond to the actual length ofa live animal. Furthermore, it may seriously injure a livesnake. Another method involves placing the snake in aclear plexiglass box and pressing it with a soft materialsuch as rubber foam against a clear surface. Measuringthe length of the snake may be done by outlining itsbody with a string (Fitch 1987; Frye 1991). However, thismethod is restricted to small animals that can be placedin a box, and in addition, no indications of accuracy of thetechnique are given. Measuring the snakes with a fl exibletape has also been reported (Blouin-Demers 2003)but when dealing with a large animals the way the tapeis positioned can produce great variance on the fi nal outcome.In this contribution we revise alternative ways tomeasuring a snake and propose a method that offers repeatableresults. We further analyze the precision of thismethod by using a sample of measurements taken fromwild populations of green anacondas (Eunectes murinus)with a large range of sizes
Green Security Plugin for Pervasive Computing using the HADAS toolkit
Energy is a critical resource in pervasive computing devices. However, information about energy consumption is not directly accessible through software development environments,
making it difficult to reuse the knowledge provided by existing energy-consumption experimental studies. To address this limitation, this paper presents a solution to enrich Android
Studio with energy consumption information. We have developed a Green Security Plugin that provides energy-aware information to developers that make use of Android Security
API. This plugin has been developed taking advantage of the functionalities provided by the HADAS toolkit. HADAS is a repository of energy consuming concerns in which researchers
can store the energy measures obtained during their experimental studies and developers can perform a sustainability analysis to make green design/implementation decisions.Universidad de Málaga. Campus de Excelencia Internacional Andalucía Tec
Recommended from our members
Development of the Plug-in Electric Vehicle Charging Infrastructure via Smart-Charging Algorithms
Electricity generation and the transportation sector make up a large portion of greenhouse gas emissions in the United States. Meeting ambitious reductions in greenhouse gasses requires large scale adoption of plug-in electric vehicles (PEVs) and has led to several policies and laws aimed at incentivizing PEV sales. An inadequate charging infrastructure, however, could be a major obstacle for a large-scale adoption of PEVs. Large electrical demands from PEVs could negatively affect circuitry, increase electricity costs, and exacerbate stress to local electrical components during times of high electricity usage. These issues, however, can be addressed by deploying smart-charging strategies.This work is focused on the development of smart-charging protocols for workplace battery electric vehicle (BEV) charging. Three comprehensive smart-charging protocols with different applications are proposed. Each protocol is developed with varying degrees of focus on communication requirements and privacy concerns. The BEV-based Optimization Protocol is a decentralized, non-iterative strategy that allows BEVs to individually schedule their charging schedules. The Octopus Charger-based MILP Protocol allows octopus chargers (i.e., charging stations with multiple cables) to independently schedule charging for their assigned BEVs. The Real-Time Octopus Charger-based MILP Protocol allows octopus chargers to schedule BEV charging in real time, without prior information from BEVs. By using the appropriate cost signal and assignment algorithms, the proposed protocols can manage a parking structure demand load while reducing the number of installed charging stations. Driving patterns from the National Household Travel Survey were used to perform simulations, to verify and quantify the effectiveness of each protocol. The proposed protocols resulted in improved peak load reductions for all simulated smart-charging scenarios, when compared with uncontrolled charging. By using octopus chargers, all protocols were able to reduce the number of charging stations needed at parking structures, while meeting the charging requests of all BEVs. Time-Of-Use rate plans from Southern California Edison were used to estimate monthly electricity costs for the simulated parking structures. The smart-charging protocols resulted in reduced electricity costs for most cases studied, when compared to uncontrolled charging
Automated Network Service Scaling in NFV: Concepts, Mechanisms and Scaling Workflow
Next-generation systems are anticipated to be digital platforms supporting
innovative services with rapidly changing traffic patterns. To cope with this
dynamicity in a cost-efficient manner, operators need advanced service
management capabilities such as those provided by NFV. NFV enables operators to
scale network services with higher granularity and agility than today. For this
end, automation is key. In search of this automation, the European
Telecommunications Standards Institute (ETSI) has defined a reference NFV
framework that make use of model-driven templates called Network Service
Descriptors (NSDs) to operate network services through their lifecycle. For the
scaling operation, an NSD defines a discrete set of instantiation levels among
which a network service instance can be resized throughout its lifecycle. Thus,
the design of these levels is key for ensuring an effective scaling. In this
article, we provide an overview of the automation of the network service
scaling operation in NFV, addressing the options and boundaries introduced by
ETSI normative specifications. We start by providing a description of the NSD
structure, focusing on how instantiation levels are constructed. For
illustrative purposes, we propose an NSD for a representative NS. This NSD
includes different instantiation levels that enable different ways to
automatically scale this NS. Then, we show the different scaling procedures the
NFV framework has available, and how it may automate their triggering. Finally,
we propose an ETSI-compliant workflow to describe in detail a representative
scaling procedure. This workflow clarifies the interactions and information
exchanges between the functional blocks in the NFV framework when performing
the scaling operation.Comment: This work has been accepted for publication in the IEEE
Communications Magazin
A new buffering theory of social support and psychological stress
A dynamical model linking stress, social support, and health has been recently proposed and numerically analyzed from a classical point of view of integer-order calculus. Although interesting observations have been obtained in this way, the present work conducts a fractional-order analysis of that model. Under a periodic forcing of an environmental stress variable, the perceived stress has been analyzed through bifurcation diagrams and two well-known metrics of entropy and complexity, such as spectral entropy and C0 complexity. The results obtained by numerical simulations have shown novel insights into how stress evolves with frequency and amplitude of the perturbation, as well as with initial conditions for the system variables. More precisely, it has been observed that stress can alternate between chaos, periodic oscillations, and stable behaviors as the fractional order varies. Moreover, the perturbation frequency has revealed a narrow interval for the chaotic oscillations, while its amplitude may present different values indicating a low sensitivity regarding chaos generation. Also, the perceived stress has been noted to be highly sensitive to initial conditions for the symptoms of stress-related ill-health and for the social support received from family and friends. This work opens new directions of research whereby fractional calculus might offer more insight into psychology, life sciences, mental disorders, and stress-free well-being
Role of lipid peroxidation and antioxidant enzymes in omega 3 fatty acids induced suppression of breast cancer xenograft growth in mice
BACKGROUND: Supplementing mice with high levels of dietary n-3 polyunsaturated fatty acids (PUFAs) increases the n-3 PUFAs in cell membranes, increases the susceptibility of the cells for lipid peroxidation (LPO) and decreases the growth rate of mammary and other tumors. However, the results of an earlier study indicated that a factor in addition to LPO was involved in the reduction in tumor growth in n-3 PUFAs fed mice. Athymic mice bearing MDA-MB-231 human breast carcinoma xenografts, were fed fish oil concentrate (FOC) or control diets, with and without supplemental Vitamin E (2000 IU /kg diet) and were sacrificed both before and after doxorubicin (DOX) treatment to evaluate factors involved in tumor growth suppression. RESULTS: Prior to DOX, basal LPO in the tumor of 3% FOC fed mice was slightly higher than in the control fed mice and was decreased in mice consuming FOC with vitamin E. Vitamin E suppressed the DOX induced increase in LPO in the tumors of control mice, however, vitamin E was not sufficient to suppress a DOX induced increase in LPO in the tumors of FOC fed mice. The mean growth rate of tumors of FOC fed mice was significantly less than the mean growth rate of the tumors of control mice. Multiple regression analyses indicated that suppression of glutathione peroxidase (GPX) activity by FOC prior to DOX therapy was more important than increased LPO as an explanation of tumor growth suppression. Tumor induced cachexia was decreased in mice consuming FOC. CONCLUSIONS: It appears that the increased sensitivity to DOX was related to an FOC induced reduction in GPX activity. FOC reduced tumor induced cachexia
Vestido de Novia Film Screening and Conversation with the Filmmakers
Join the Steven J. Green School of International and Public Affairs for the Miami premiere of the film Vestido de Novia, followed by a conversation with the filmmakers at the Coral Gables Museum (across from Coral Gables Art Cinema).
Set in Havana in 1994, the film explores transgender culture in Cuba. Rosa Elena - a 40-year-old assistant nurse, caretaker for her sick father and recently married to Ernesto, the chief engineer of a construction brigade - is unhappy with the life she is living and returns to sing in the all-male choir where she worked before meeting her husband. As a secret of the past reveals itself, both Rosa Elena and Ernesto are exposed to the structural violence of the hegemonic patriarchal context in which they live.
Marilyn Solaya is an actress, documentarían and director of the Cuban Institute of Cinematographic Art and Industry (ICAIC). She is a member of the Network of Artists UNETE for Non-Violence against Women and author of documentaries including Mírame mi amor, En el cuerpo equivocado and the fiction feature Vestido de Novia, recognized in both national and international film festivals since its release in December 2014.
Lisandra Chaveco Valdés is a journalist, member of the Ibero-American and African Network of Masculinities (RIAM), reporter for Revista Mujeres of Editorial de la Mujer and collaborator with the United Nations System in Cuba.
Jesús E. Muñoz Machín is a journalist, member of the Ibero-American and African Network of Masculinities (RIAM) and consultant on gender issues for the United Nations Development Program in Cuba.https://digitalcommons.fiu.edu/cri_events/1347/thumbnail.jp
- …