Academic literature on the topic 'Formal chains'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Formal chains.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Formal chains"

1

Twine, Edgar E., Amos Omore, and Julius Githinji. "Uncertainty in milk production by smallholders in Tanzania and its implications for investment." International Food and Agribusiness Management Review 21, no. 1 (January 9, 2018): 53–72. http://dx.doi.org/10.22434/ifamr2017.0028.

Full text
Abstract:
The study evaluates the impact of risk on enterprises of male, female and young farmers operating in the formal and informal smallholder dairy value chains in Tanzania. It also examines the effect of uncertainty on the decision to invest in milk production in the two value chains. Results indicate that youths in the informal dairy value chain face the greatest level of risk followed by men in the formal value chain, and then men in the informal value chain. Women in both value chains and youths in the formal value chain face relatively low risk. Overall, milk production in the informal value chain is found to be substantially riskier than production in the formal chain. Optimal investment triggers are found to be much larger than the conventional triggers and are sensitive to volatility of returns. The results’ managerial and policy implications for inclusive dairy industry development in Tanzania are highlighted.
APA, Harvard, Vancouver, ISO, and other styles
2

Abate, Alessandro, Roman Andriushchenko, Milan Češka, and Marta Kwiatkowska. "Adaptive formal approximations of Markov chains." Performance Evaluation 148 (July 2021): 102207. http://dx.doi.org/10.1016/j.peva.2021.102207.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Гуменюк, А. С., and A. S. Gumenuk. "Formal Analysis of Structures of Nucleotide Chains." Mathematical Biology and Bioinformatics 8, no. 1 (June 30, 2013): 373–97. http://dx.doi.org/10.17537/2013.8.373.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Chen, Kai, S. Loepp, and John Provine. "Chains of Rings with Local Formal Fibers." Communications in Algebra 34, no. 11 (November 2006): 3891–902. http://dx.doi.org/10.1080/00927870600862722.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Paul, Sarah K. "Deviant Formal Causation." Journal of Ethics and Social Philosophy 5, no. 3 (June 5, 2017): 1–24. http://dx.doi.org/10.26556/jesp.v5i3.55.

Full text
Abstract:
What is the role of practical thought in determining the intentional action that is performed? Donald Davidson’s influential answer to this question is that thought plays an efficient-causal role: intentional actions are those events that have the correct causal pedigree in the agent's beliefs and desires. But the Causal Theory of Action has always been plagued with the problem of “deviant causal chains,” in which the right action is caused by the right mental state but in the wrong way. This paper addresses an alternative approach to understanding intentional action inspired by G.E.M. Anscombe, interpreting that view as casting practical thought in the role of formal rather than efficient cause of action and thereby avoiding the problem of deviant (efficient) causal chains. Specifically, on the neo-Anscombean view, it is the agent’s “practical knowledge” – non-observational, non-inferential knowledge of what one is doing – that confers the form of intentional action on an event and is the contribution of thought to determining what is intentionally done. This paper argues that the Anscombean view is subject to its own problematic type of deviance: deviant formal causation. What we know non-observationally about what we are doing often includes more than what we intend to be doing; we also know that we are bringing about the foreseen side effects of acting in the intended way. It is argued that the neo-Anscombean view faces difficulty in excluding the expected side effects from the specification of what is intentionally done, whereas the Causal Theory has no such difficulty. Thus, the discussion amounts to an argument in favor of the Causal Theory of Action.
APA, Harvard, Vancouver, ISO, and other styles
6

Louw, A., and D. Jordaan. "Supply chain risks and smallholder fresh produce farmers in the Gauteng province of South Africa." Southern African Business Review 20, no. 1 (March 27, 2019): 286–312. http://dx.doi.org/10.25159/1998-8125/6051.

Full text
Abstract:
A survey of 52 smallholder fresh produce farmers was conducted in the Gauteng province of South Africa to grasp how risk and its management affect the mainstreaming of smallholder farmers into formal, high-value markets. The study employed a supply chain analysis approach, which focused on the functions and risks that occur along the fresh produce chain. The results highlight the risks that impede the participation of smallholder farmers in formal, high-value chains. At the production level, risk is prominent from input procurement through to the post-harvest stage of the chains. At the retail and consumption level, risks are linked to the adherence to quality and quantity standards, including prescribed packaging, grading, labelling and traceability and transport requirements. As a result of these risks across the formal chain, smallholder farmers often resort to distributing their products in low-value informal markets. The consequence is that smallholder farmers tend to remain trapped in poverty, in part, because of their risk appetites and their ability to bear risk. 8Further research is required in the areas pertaining to smallholder farmers’ risk appetite and risk-bearing ability and mechanisms to deal with the particular risks in the value chain that impede their all-round ability to escape the “smallholder dilemma”.
APA, Harvard, Vancouver, ISO, and other styles
7

Florenz, Mark, Davina Kunvipusilkul, and Junghee Yang. "CONSTRUCTING CHAINS OF EXCELLENT RINGS WITH LOCAL GENERIC FORMAL FIBERS." Communications in Algebra 30, no. 8 (August 28, 2002): 3569–87. http://dx.doi.org/10.1081/agb-120005807.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Schoenherr, Tobias, Ram Narasimhan, and Piyas (P) Bandyopadhyay. "The assurance of food safety in supply chains via relational networking." International Journal of Operations & Production Management 35, no. 12 (December 7, 2015): 1662–87. http://dx.doi.org/10.1108/ijopm-02-2014-0051.

Full text
Abstract:
Purpose – Taking a social network perspective, the purpose of this paper is to develop a framework for the assurance of food safety via relational networking. Design/methodology/approach – The authors consider both informal and formal relational networking, and explore a firm’s learning orientation, risk aversion and consumer pressure as potential precursors to such relational networking. It is further hypothesized that relational networking generates both industry and supply chain knowledge, which is suggested to be beneficial for contamination detection. The model is tested with survey data collected among food-producing firms in India, the world’s second largest food producer. Findings – The authors find a positive influence of consumer pressure on both a firm’s learning orientation and risk aversion, which in turn affect both informal and formal relational networking. Informal networking further generated industry knowledge and was beneficial for contamination detection. Formal relational networking influenced supply chain knowledge, which in turn enabled contamination detection. Originality/value – Recent food product-related safety breaches, which have, in the worst case, led to fatalities, illustrate the importance of food safety in supply chains. This study represents the first systematic investigation of relational networking in the context of food safety from the perspective of social network theory.
APA, Harvard, Vancouver, ISO, and other styles
9

PN, Sindhuja. "Impact of information security initiatives on supply chain performance." Information Management & Computer Security 22, no. 5 (November 10, 2014): 450–73. http://dx.doi.org/10.1108/imcs-05-2013-0035.

Full text
Abstract:
Purpose – The purpose of this empirical research is to attempt to explore the effect of information security initiatives (ISI) on supply chain performance, considering various intra- and inter-organization information security aspects that are deemed to have an influence on supply chain operations and performance. Design/methodology/approach – Based on extant information security management and supply chain security management literature, a conceptual model was developed and validated. A questionnaire survey instrument was developed and administered among supply chain managers to collect data. Data were collected from 197 organizations belonging to various sectors. The study used exploratory and confirmatory factor analysis for data analysis. Further, to test the hypotheses and to fit the theoretical model, structural equation modeling techniques were used. Findings – Results of this study indicate that ISI, comprising technical, formal and informal security aspects in an intra- and inter-organizational environment, are positively associated with supply chain operations, which, in turn, positively affects supply chain performance. Research limitations/implications – This study provides the foundation for future research in the management of information security in supply chains. Findings are expected to provide the communities of practice with better information security decision-making in a supply chain context, by clearly formulating technical, formal and informal information security policies for improving supply chain performance. Originality/value – In today’s global supply chain environment where competition prevails among supply chains, this research is relevant in terms of capability that an organization has to acquire for managing internal and external information security. In that sense, this study contributes to the body of knowledge with an empirical analysis of organizations’ information security management initiatives as a blend of technical, formal and informal security aspects.
APA, Harvard, Vancouver, ISO, and other styles
10

Liu, Liya, Osman Hasan, and Sofiène Tahar. "Formal Reasoning About Finite-State Discrete-Time Markov Chains in HOL." Journal of Computer Science and Technology 28, no. 2 (March 2013): 217–31. http://dx.doi.org/10.1007/s11390-013-1324-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Formal chains"

1

Kemahlioglu, Ziya Eda. "Formal Methods of Value Sharing in Supply Chains." Diss., Georgia Institute of Technology, 2004. http://hdl.handle.net/1853/4965.

Full text
Abstract:
We consider a decentralized, two-echelon supply chain where the upper echelon --the supplier-- bears the inventory risk. To service the retailers, the supplier either keeps inventory reserved for each of her customers or else pools inventory to share among her customers. The common insight regarding inventory pooling is that it reduces costs and so increases profits for the supply chain party carrying inventory. However, it has recently been shown that inventory pooling may indeed reduce the total supply chain profits. We further show that inventory pooling may reduce supply chain profits even under traditional service contracts based on the frequently invoked measure of service, probability of stock-out. We model the inventory transactions among the retailers and the supplier as a cooperative game. The players have the option of reserving inventory or forming inventory-pooling coalitions. The total profit of the coalitions is allotted to the players using a profit-sharing mechanism based on Shapley value. We analyze the properties of the proposed profit-sharing scheme in two steps. We first consider a stylized model with two retailers who are not necessarily identical. Then we extend the analysis to an arbitrary number of identical retailers. In both cases, we assume the demand across retailers is independent. We find that the Shapley value allocations coordinate the supply chain and are individually rational. However for more than two retailers, they may not be in the core. Even when they satisfy all the stability properties, including membership in the core, they may be perceived unfair since a player's allocation can exceed his contribution to the total supply chain profit. In addition to analyzing the stability properties of the proposed allocation mechanism, we are also interested in the types of behavior the mechanism induces in the players. We find that the retailers prefer pooling partners with either very high or low service level requirements and the supplier prefers retailers with low service requirements since this gives her the ability to maximize her profit allocation. Finally, we analyze the effects of demand variance on the allocations and the profitability of strategic retailer coalitions.
APA, Harvard, Vancouver, ISO, and other styles
2

Worinu, Mark. "The operation and effectiveness of formal and informal supply chains for fresh produce in the Papua New Guinea highlands." Master's thesis, Lincoln University. Agriculture and Life Sciences Division, 2007. http://theses.lincoln.ac.nz/public/adt-NZLIU20080318.100431/.

Full text
Abstract:
The research aim was to gain a more detailed understanding of the operation of different key segments for fresh produce supply chains originating in the Highlands Provinces in Papua New Guinea (PNG). The research investigates a number of supply chain dimensions of effectiveness which include, value creation and integration of processes, logistics, quality, information, relationship/vertical integration and overall effectiveness. These were linked together in SC framework. Two potato chains were investigated, one formal, the other informal. The informal potato chain involves small holder farmers, input suppliers and local markets including kai bars and the urban market. The chain originates and ends within the Western Highlands Province. The formal potato chain has farmers, input suppliers, wholesaler/marker, transport companies (trucking and coastal shipping agents), supermarkets, hotels and kai bars. This chain originates in Mt Hagen, Western Highlands Province and ends in Port Moresby, National Capital District. The effectiveness of both the formal and informal chains was identified, and comparisons were made to see how each chain differed. The informal chain was found to have different problems to the formal chains. However, participants to both chains demonstrate a high entrepreneurial behavior. A key finding of the study was that the chains spread their risk by operating in multiple market segments and this can help to solve issues with variable quality. The marketers in each chain position themselves in these different market segments. It was clear from this work that focusing on functions and not the whole chain can lead to a distorted view of chain performance. For example, for the informal chain, a focus on logistics issues, particularly poor roads and problems with availability of seeds, can misrepresent the effectiveness of this chain. Therefore, it was concluded that it is important to look at the overall performance of each chain rather than looking specifically at particular chain functions in isolation.
APA, Harvard, Vancouver, ISO, and other styles
3

Lefophane, Mapula Hildah. "Comparative analysis of technical efficiency levels of emerging maize and green beans farmers with and without acess to formal agricultural credit along food value chains in Maruleng Municipality , Limpopo Province of South Africa." Thesis, University of Limpopo (Turfloop Campus), 2012. http://hdl.handle.net/10386/798.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Szlifierski, Nicolas. "Contrôle sûr de chaînes d'obfuscation logicielle." Thesis, Ecole nationale supérieure Mines-Télécom Atlantique Bretagne Pays de la Loire, 2020. http://www.theses.fr/2020IMTA0223.

Full text
Abstract:
L’obfuscation de code est une technique de protection de programme qui consiste à rendre la rétro-ingénierie d’un programme plus difficile, afin de protéger des secrets, de la propriété intellectuelle, ou de compliquer la détection (malware). L’obfuscation est généralement effectuée à l’aide d’un ensemble de transformations sur le programme cible. L’obfuscation est également souvent utilisée en conjonction avec d’autres techniques de protection de programmes telles que le watermarking ou le tamperproofing. Ces transformations sont généralement intégrées dans les transformations de code appliquées pendant le processus de compilation, comme les optimisations. Cependant, appliquer des transformations d’obfuscation demande plus de préconditions sur le code et de précisions dans l’application pour offrir un compromis performance/sécurité acceptable ce qui rend les compilateurs traditionnels peu adaptés à l’obfuscation. Pour répondre à ces problèmes, cette thèse propose SCOL, un langage qui permet de décrire le processus de compilation d’un programme en prenant en compte les problématiques spécifiques à l’obfuscation. Celui-ci permet de décrire des chaînes de compilation avec un haut niveau d’abstraction, tout en permettant une précision élevée sur la composition des transformations. Le langage possède un système de types qui permet de vérifier la cohérence de la chaîne de compilation. C’est-à-dire que vérifier que la composition des transformations permet d’obtenir le niveau de protection et de couverture visé
Code obfuscation is a software protection technique that is designed to make reverse engineering a program more challenging, in order to protect secrets, intellectual property, or to complicate detection (malware). The obfuscation is generally carried out using a set of transformations on the target program. Obfuscation is also often used in conjunction with other software protection techniques, such as watermarking or tamperproofing. These transformations are usually integrated into code transformations applied during the compilation process, such as optimisations. However, the application of obfuscation transformations requires more preconditions on the code and more precision in the application to provide an acceptable performance/safety trade-off, making traditional compilers unsuitable for obfuscation. To address these problems, this thesis presents SCOL, a language that is able to describe the process of compiling a program while considering the specific problems of obfuscation. This allows you to describe compilation chains with a high level of abstraction, while allowing a high degree of accuracy on the composition of the transformations. The language has a type system which checks the correctness of the compilation chain. That means that the composition of transformations provides the targeted level of protection and coverage
APA, Harvard, Vancouver, ISO, and other styles
5

Ivanov, Dinko. "Integrating formal analysis techniques into the Progress-IDE." Thesis, Mälardalens högskola, Akademin för innovation, design och teknik, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:mdh:diva-13884.

Full text
Abstract:
In this thesis we contribute to the Progress IDE, an integrated development enviroment for real-time embedded systems and more precisely to the REMES toolchain, a set of tools to enabling construction and analysis of embedded system behavior models. The contribution aims to facilitate the formal analysis of behavioral models, so that certain extra-functional properties might be verified during early stages of development. Previous work in the field proposes use of the Priced Timed Automata framework for verification of such properties. The thesis outlines the main points where the current toolchain should be extended in order to allow formal analysis of modeled components. Result of the work is a prototype, which minimizes the manual efforts of system designer by model to model transformations and provides seamless integration with existing tools for formal analysis.
APA, Harvard, Vancouver, ISO, and other styles
6

Herms, Paolo. "Certification of a Tool Chain for Deductive Program Verification." Phd thesis, Université Paris Sud - Paris XI, 2013. http://tel.archives-ouvertes.fr/tel-00789543.

Full text
Abstract:
This thesis belongs to the domain of software verification. The goalof verifying software is to ensure that an implementation, a program,satisfies the requirements, the specification. This is especiallyimportant for critical computer programs, such as control systems forair planes, trains and power plants. Here a malfunctioning occurringduring operation would have catastrophic consequences. Software requirements can concern safety or functioning. Safetyrequirements, such as not accessing memory locations outside validbounds, are often implicit, in the sense that any implementation isexpected to be safe. On the other hand, functional requirementsspecify what the program is supposed to do. The specification of aprogram is often expressed informally by describing in English or someother natural language the mission of a part of the program code.Usually program verification is then done by manual code review,simulation and extensive testing. But this does not guarantee that allpossible execution cases are captured. Deductive program proving is a complete way to ensure soundness of theprogram. Here a program along with its specificationis a mathematical object and its desired properties are logicaltheorems to be formally proved. This way, if the underlying logicsystem is consistent, we can be absolutely sure that the provenproperty holds for the program in any case.Generation of verification conditions is a technique helpingthe programmer to prove the properties he wants about his programs.Here a VCG tool analyses a program and its formal specification andproduces a mathematical formula, whose validity implies the soundnessof the program with respect to its specification. This is particularlyinteresting when the generated formulas can be proved automatically byexternal SMT solvers.This approach is based on works of Hoare and Dijkstra and iswell-understood and shown correct in theory. Deductive verificationtools have nowadays reached a maturity allowing them to be used inindustrial context where a very high level of assurance isrequired. But implementations of this approach must deal with allkinds of language features and can therefore become quite complex andcontain errors -- in the worst case stating that a program correcteven if it is not. This raises the question of the level ofconfidence granted to these tools themselves. The aim of this thesis is to address this question. We develop, inthe Coq system, a certified verification-condition generator (VCG) forACSL-annotated C programs.Our first contribution is the formalisation of an executableVCG for the Whycert intermediate language,an imperative language with loops, exceptions and recursive functionsand its soundness proof with respect to the blocking big-step operational semantics of the language.A second contribution is the formalisation of the ACSL logicallanguage and the semantics of ACSL annotations of Compcert's Clight.From the compilation of ACSL annotated Clight programs to Whycertprograms and its semantics preservation proof combined with a Whycertaxiomatisation of the Compcert memory model results our maincontribution: an integrated certified tool chainfor verification of C~programs on top of Compcert. By combining oursoundness result with the soundness of the Compcert compiler we obtaina Coq theorem relating the validity of the generated proof obligationswith the safety of the compiled assembly code.
APA, Harvard, Vancouver, ISO, and other styles
7

Hennion, Benjamin. "Formal loops spaces and tangent Lie algebras." Thesis, Montpellier, 2015. http://www.theses.fr/2015MONTS160/document.

Full text
Abstract:
L'espace des lacets lisses C(S^1,M) associé à une variété symplectique M se voit doté d'une structure (quasi-)symplectique induite par celle de M.Nous traiterons dans cette thèse d'un analogue algébrique de cet énoncé.Dans leur article, Kapranov et Vasserot ont introduit l'espace des lacets formels associé à un schéma. Il s'agit d'un analogue algébrique à l'espace des lacets lisses.Nous generalisons ici leur construction à des lacets de dimension supérieure. Nous associons à tout schéma X -- pas forcément lisse -- l'espace L^d(X) de ses lacets formels de dimension d.Nous démontrerons que ce dernier admet une structure de schéma (dérivé) de Tate : son espace tangent est de Tate, c'est-à-dire de dimension infinie mais suffisamment structuré pour se soumettre à la dualité.Nous définirons également l'espace B^d(X) des bulles de X, une variante de l'espace des lacets, et nous montrerons que le cas échéant, il hérite de la structure symplectique de X. Notons que ces résultats sont toujours valides dans des cas plus généraux : X peut être un champs d'Artin dérivé.Pour démontrer nos résultats, nous définirons ce que sont les objets de Tate dans une infinie-catégorie C stable et complète par idempotence.Nous prouverons au passage que le spectre de K-théorie non-connective de Tate(C) est équivalent à la suspension de celui de C, donnant une version infini-catégorique d'un résultat de Saito.Dans le dernier chapitre, nous traiterons d'un problème différent. Nous démontrerons l'existence d'une structure d'algèbre de Lie sur le tangent décalé de n'importe quel champ d'Artin dérivé X. Qui plus est, ce tangent agit sur tout quasi-cohérent E, l'action étant donnée par la classe d'Atiyah de E.Ces résultats sont par exemple valides dans le cas d'un schéma X sans hypothèse de lissité
If M is a symplectic manifold then the space of smooth loops C(S^1,M) inherits of a quasi-symplectic form. We will focus in this thesis on an algebraic analogue of that result.In their article, Kapranov and Vasserot introduced and studied the formal loop space of a scheme X. It is an algebraic version of the space of smooth loops in a differentiable manifold.We generalize their construction to higher dimensional loops. To any scheme X -- not necessarily smooth -- we associate L^d(X), the space of loops of dimension d. We prove it has a structure of (derived) Tate scheme -- ie its tangent is a Tate module: it is infinite dimensional but behaves nicely enough regarding duality.We also define the bubble space B^d(X), a variation of the loop space.We prove that B^d(X) is endowed with a natural symplectic form as soon as X has one.To prove our results, we develop a theory of Tate objects in a stable infinity category C. We also prove that the non-connective K-theory of Tate(C) is the suspension of that of C, giving an infinity categorical version of a result of Saito.The last chapter is aimed at a different problem: we prove there the existence of a Lie structure on the tangent of a derived Artin stack X. Moreover, any quasi-coherent module E on X is endowed with an action of this tangent Lie algebra through the Atiyah class of E. This in particular applies to not necessarily smooth schemes X
APA, Harvard, Vancouver, ISO, and other styles
8

Canuto, Jáder Almeida. "Efeitos da Violaceína sobre as formas evolutivas de Trypanosoma cruzi." reponame:Repositório Institucional da UFC, 2016. http://www.repositorio.ufc.br/handle/riufc/17623.

Full text
Abstract:
CANUTO, J. A. Efeitos da Violaceína sobre as formas evolutivas de Trypanosoma cruzi. 2016. 78 f. Dissertação (Mestrado em Ciências Farmacêuticas) - Faculdade de Farmácia, Odontologia e Enfermagem, Universidade Federal do Ceará, Fortaleza, 2016.
Submitted by Erika Fernandes (erikaleitefernandes@gmail.com) on 2016-06-13T12:12:37Z No. of bitstreams: 1 2016_dis_jacanuto.pdf: 1383413 bytes, checksum: 294fb79f391911aa314db8d5184e0e10 (MD5)
Approved for entry into archive by Erika Fernandes (erikaleitefernandes@gmail.com) on 2016-06-13T12:12:48Z (GMT) No. of bitstreams: 1 2016_dis_jacanuto.pdf: 1383413 bytes, checksum: 294fb79f391911aa314db8d5184e0e10 (MD5)
Made available in DSpace on 2016-06-13T12:12:48Z (GMT). No. of bitstreams: 1 2016_dis_jacanuto.pdf: 1383413 bytes, checksum: 294fb79f391911aa314db8d5184e0e10 (MD5) Previous issue date: 2016-02-19
The World Health Organization estimates that about 7 to 8 million people are infected with Trypanosoma cruzi in the world. Treatment of Chagas disease has limited efficacy and side effects that limit tolerability and patient compliance. The search for new therapeutic alternatives from bioactive substances has grown significantly in recent years. Violacein (VIO), a bacterial pigment produced by Chromobacterium violaceum has shown several biological actions, among them, antiulcer action, antitumor, antiviral, and antiparasitic. In this paper, we studied the effects of VIO on the evolutionary forms of Trypanosoma cruzi. Epimastigotes were cultured in LIT at 28 ° C in the presence of VIO (0.97; 1.9; 3.9; 7.8; 15.62; 31.25; 62.5; 125; 250 ; 500; 1000μM) for 24, 48 and 72 hours. The trypomastigotes were obtained after infection in LLC-MK2 cells resuspended in DMEM 2% FBS and incubated with VIO (0.97; 1.9; 3.9; 7.8; 15.62; 31,25μM ) for 24h. amastigotes were cultivated on circular coverslips within culture plates containing LLC-MK2 cells and treated with violacein (4.97 and 9.94 mM). Cytotoxicity on LLC-MK2 mammalian cells was assessed using the MTT reduction assay, after incubation with VIO (3.9; 7.8; 15.62; 31.25; 62.5; 125; 250; 500μM ) for 24h. The evaluation of the process of cell death was made from the marking epimastigotes with 7AAD and Annexin V-PE after treatment with VIO (51.39 and 102,78μM). To determine the production of reactive oxygen species, epimastigotes were incubated with VIO (51.39 and 102,78μM). In determining the effect on the mitochondrial membrane potential, it was used Rhodamine 123 marker in epimastigotes treated with VIO (102,78μM). In epimastigotes, the substance showed trypanocidal action, with IC50 value of 51.39; 104.7 67,78μM and 24, 48 and 72h of treatment, respectively. In trypomastigotes, the IC 50 was 4,97μM in 24 hours. The analysis of amastigotes reduced the percentage of infected cells and the survival rate of these, at 24 and 48 hours at concentrations of 4.97 and 9.94 uM. In determining the cytotoxic effect on LLC-MK2, there was obtained an IC50 of 47,91μM. The analysis of the mechanisms of cell death allowed to infer that the VIO cause death in parasites predominantly by apoptosis. It was observed the production of reactive oxygen species (ROS), which can contribute to the aforementioned type of death. It was also observed a reduction in the mitochondrial membrane potential in the treated groups. All experiments were performed in triplicate (n = 3). For comparison of the experimental groups, the ANOVA was used, with post-test Dunnett, using p <0.05 as significance criterion. Thus, VIO presented trypanocidal effects on all of the evolutionary cycle of the parasite forms, suggesting involvement of reactive oxygen species and changes in mitochondrial membrane potential in the process of cell death by apoptosis.
A Organização Mundial de Saúde estima que aproximadamente 7 a 8 milhões de pessoas encontram-se infectadas pelo Trypanosoma cruzi no mundo. O tratamento da doença de Chagas apresenta eficácia limitada e efeitos colaterais que limitam a tolerabilidade e a adesão dos pacientes. A busca de novas alternativas terapêuticas a partir de substâncias bioativas cresceu bastante nos últimos anos. A violaceína (VIO), um pigmento bacteriano produzido por Chromobacterium violaceum tem mostrado diversas ações biológicas, dentre elas, ações antiulcerogênica, antitumoral, antiviral e antiparasitária. No presente trabalho, estudamos os efeitos da VIO sobre as formas evolutivas do Trypanosoma cruzi. As formas epimastigotas foram cultivadas em meio LIT, a 28°C, na presença de VIO (0,97; 1,9; 3,9; 7,8; 15,62; 31,25; 62,5; 125; 250; 500; 1000μM) por 24, 48 e 72h. As formas tripomastigotas, foram obtidas após infecção em células LLC-MK2, ressuspensas em meio DMEM 2% de SBF e incubadas com VIO (0,97; 1,9; 3,9; 7,8; 15,62; 31,25μM) por 24h. Formas amastigotas foram cultivadas em lamínulas circulares no interior de placas de cultura contendo células LLC-MK2 e tratadas com violaceína (4,97 e 9,94 μM). A citotoxicidade sobre células de mamíferos LLC-MK2 foi avaliada por meio do ensaio de redução do MTT, após incubação com VIO (3,9; 7,8; 15,62; 31,25; 62,5; 125; 250; 500μM) por 24h. A avaliação do processo de morte celular foi feita a partir da marcação de formas epimastigotas com 7AAD e Anexina V-PE após tratamento com VIO (51,39 e 102,78μM). Para a determinação da produção de espécies reativas de oxigênio, formas epimastigotas foram incubadas com VIO (51,39 e 102,78μM). Na determinação do efeito sobre o potencial de membrana mitocondrial, foi utilizado o marcador Rodamina 123 em formas epimastigotas tratadas com VIO (102,78μM). Em formas epimastigotas, a substância demonstrou ação tripanocida, com valor de CI50 igual a 51,39; 104,7 e 67,78μM em 24, 48 e 72h de tratamento, respectivamente. Em formas tripomastigotas, a CI50 foi de 4,97μM em 24h. A análise sobre formas amastigotas reduziu o percentual de células infectadas e o índice de sobrevivência destes, nos tempos de 24 e 48h, nas concentrações de 4,97 e 9,94 μM. Na determinação do efeito citotóxico sobre LLC-MK2, obteve-se uma CI50 de 47,91μM. A análise dos mecanismos de morte celular permitiu inferir que a VIO causa morte nos parasitos predominantemente por apoptose. Foi observado a produção de espécies reativas de oxigênio (ERO), que podem contribuir para o tipo de morte supracitado. Foi ainda observada a redução do potencial de membrana mitocondrial nos grupos tratados. Todos os experimentos foram realizados em triplicata (n=3). Para comparação dos grupos experimentais, foi utilizado o teste estatístico ANOVA, com pós-teste de Dunnet, utilizando p<0,05 como critério de significância. Dessa forma, a VIO apresentou efeitos tripanocida em todas as formas do ciclo evolutivo do parasito, sugerindo envolvimento de espécies reativas de oxigênio e alterações no potencial de membrana mitocondrial no processo de morte celular por apoptose.
APA, Harvard, Vancouver, ISO, and other styles
9

Santos, Junior Agenor de Castro Moreira. "Análise proteômica da fração nuclear de formas epimastigotas de Trypanosoma cruzi." reponame:Repositório Institucional da UnB, 2014. http://repositorio.unb.br/handle/10482/15632.

Full text
Abstract:
Dissertação (mestrado)—Universidade de Brasília, Faculdade de Medicina, Programa de Pós-graduação em Patologia Molecular, 2014.
Submitted by Ruthléa Nascimento (ruthleanascimento@bce.unb.br) on 2014-05-20T12:37:28Z No. of bitstreams: 1 2014_AgenordeCastroMoreiradosSantosJunior.pdf: 2582950 bytes, checksum: b1ada59cf3e421cbc9fe13c04ade54a9 (MD5)
Approved for entry into archive by Guimaraes Jacqueline(jacqueline.guimaraes@bce.unb.br) on 2014-05-21T11:48:14Z (GMT) No. of bitstreams: 1 2014_AgenordeCastroMoreiradosSantosJunior.pdf: 2582950 bytes, checksum: b1ada59cf3e421cbc9fe13c04ade54a9 (MD5)
Made available in DSpace on 2014-05-21T11:48:14Z (GMT). No. of bitstreams: 1 2014_AgenordeCastroMoreiradosSantosJunior.pdf: 2582950 bytes, checksum: b1ada59cf3e421cbc9fe13c04ade54a9 (MD5)
O Trypanosoma cruzi é o protozoário causador da doença de Chagas, uma parasitose de grande relevância na América Latina. A divisão celular do T. cruzi possui características incomuns à maioria dos eucariotos, dado que durante o processo não ocorre o desaparecimento da membrana nuclear e condensação de seus cromossomos. O objetivo deste trabalho foi o estudo do conjunto de proteínas (proteoma) presentes no núcleo da forma epimastigota do T. cruzi. Para tanto, lisados celulares do parasito foram submetidos a um fracionamento celular por ultracentrifugação em gradiente de sacarose. O enriquecimento nuclear foi validado por microscopia de fluorescência com marcação para DNA e as imagens comparadas com a microscopia de campo claro, mostrando que a fração nuclear foi obtida com alto grau de pureza. A análise por SDS-PAGE mostrou diferenças evidentes de perfil proteico entre o extrato nuclear e extratos das demais frações obtidas durante o fracionamento. As proteínas do subproteoma nuclear foram posteriormente analisadas por eletroforese bidimensional (2-DE) e por digestão tríptica seguida de cromatografia líquida acoplada à espectrometria de massas (LC-MS/MS). Usando esta última abordagem foi identificadas mais de 800 proteínas sendo quase 30% hipotéticas. Dentre os principais processos biológicos encontrados para as proteínas identificadas estão processos catabólicos, biossintéticos, geração de metabólitos e energia, processo metabólicos nucleares e tradução. As proteínas encontradas poderão ser alvos de futuros estudos para a elucidação de processos como divisão celular, transcrição gênica e formação de cromossomos, que hoje ainda não são bem elucidados. _________________________________________________________________________________ ABSTRACT
The Trypanosoma cruzi is a protozoan that causes Chagas´ disease, a disease of great relevance in Latin America. The replication process of the T. cruzi possesses unusual features, when compared to other eukaryotes; given that during this process, the nuclear membrane does not disappear and there is not chromosome condensation. The goal of this project was to study the set of proteins (proteome) that are present in the nucleus of the T. cruzi epimastigote life form. To this end, the parasite cell lysates were subjected to cell fractionation by sucrose gradient ultracentrifugation. As a way to validate these purity of the isolated cell fractions, we used optical microscopy methods including bright field analysis and fluorescence microscopy after DNA labeling. The images demonstrated that the nuclear fractions were obtained with high purity. Furthermore, SDS-PAGE analysis showed differences in protein profiles between the nuclear extracts and extracts of other fractions obtained during the fractionation. The proteins of the nuclear subproteome were subsequently analyzed by two-dimensional electrophoresis (2-DE) and liquid chromatography coupled to tandem mass spectrometry (LC-MS/MS). Using the latter approach, we identified more than 800 proteins with almost 30 % being hypothetical. Among these proteins many are involved in important biological processes such as catabolic and biosynthetic pathway, metabolites and energy generation, nuclear metabolites and translation. Hence, the proteins describe in this work may be use in future studies to elucidate processes such as cell division, transcription and chromosomes packaging, which are not fully well understood.
APA, Harvard, Vancouver, ISO, and other styles
10

Robin, Ludovic. "Vérification formelle de protocoles basés sur de courtes chaines authentifiées." Thesis, Université de Lorraine, 2018. http://www.theses.fr/2018LORR0019/document.

Full text
Abstract:
Les protocoles de sécurité modernes peuvent impliquer un participant humain de façon à ce qu'il compare ou copie de courtes chaines de caractères faisant le pont entre différents appareils. C'est par exemple le cas des protocoles basés sur une authentification à facteur multiples comme les protocoles Google 2 factor ou 3D-Secure.Cependant, de telles chaines de caractères peuvent être sujettes à des attaques par force brute. Dans cette thèse nous proposons un modèle symbolique qui inclut les capacités de l'attaquant à deviner des secrets faibles et à produire des collisions avec des fonctions de hachage dont de l'application résulte une courte chaine de caractères. Nous proposons une nouvelle procédure de décision pour analyser un protocole (restreint à un nombre borné de sessions) qui se base sur de courtes chaines de caractères. Cette procédure a été intégré dans l'outil AKISS et testé sur les protocoles du standard ISO/IEC 9798-6:2010
Modern security protocols may involve humans in order to compare or copy short strings betweendifferent devices. Multi-factor authentication protocols, such as Google 2-factor or 3D-Secure are typical examplesof such protocols. However, such short strings may be subject to brute force attacks. In this thesis we propose asymbolic model which includes attacker capabilities for both guessing short strings, and producing collisions whenshort strings result from an application of weak hash functions. We propose a new decision procedure for analyzing(a bounded number of sessions of) protocols that rely on short strings. The procedure has been integrated in theAKISS tool and tested protocols from the ISO/IEC 9798-6:2010 standard
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Formal chains"

1

El canto gregoriano: Historia, liturgia, formas ... Madrid: Alianza Editorial, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Cheglov, Vyacheslav. Trade business. Economics and management of retail chains. ru: INFRA-M Academic Publishing LLC., 2020. http://dx.doi.org/10.12737/1056723.

Full text
Abstract:
The textbook summarizes the author's twenty-year experience in such large network trading companies as Klass, PFC BIN, and X5 Retail Group. It is written in accordance with the curriculum and educational and methodological complex for the discipline "Economic activity of retail chains", which is part of the cycle of academic disciplines of the master's program "Organization and technology of trade business", direction "trade business". Covers a wide range of issues related to the theory and practice of network retail enterprises. Introduces readers to the forms of network business organization in retail, modern formats of retail trade, the organization of the trading process on the network principle and its features, current regulatory legal acts regulating the activities of network retail companies. Meets the requirements of Federal state educational standards of higher education of the latest generation. For students of economic and trade universities, students of universities and training centers of retail trading companies, managers engaged in retail.
APA, Harvard, Vancouver, ISO, and other styles
3

Dalché, Patrick Gautier. Carte marine et portulan au XIIe siècle: Le Liber de existencia riveriarum et forma maris nostri Mediterranei (Pise, circa 1200). Roma: Ecole française de Rome, 1995.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Nesi, Paolo, Kia Ng, and Jaime Delgado, eds. Axmedis 2005. Florence: Firenze University Press, 2005. http://dx.doi.org/10.36253/978-88-6453-146-5.

Full text
Abstract:
The AXMEDIS conference aims to promote discussions and interactions among researchers, practitioners, developers and users of tools, technology transfer experts, and project managers, to bring together a variety of participants. The conference focuses on the challenges in the cross-media domain (which include production, protection, management, representation, formats, aggregation, workflow, distribution, business and transaction models), and the integration of content management systems and distribution chains, with particular emphasis on cost reduction and effective solutions for complex cross-domain problems.
APA, Harvard, Vancouver, ISO, and other styles
5

Ghine, Igor. Hechizos, conjuros y otras fórmulas mágicas: Cómo hacerlos de forma sencilla y práctica para obtener así el mejor resulrado : un libro pequeño que te enseña a realizar una Magia muy grande. [Barcelona]: Ediciones Karma 7, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Tucci, Mario, and Marco Garetti, eds. Proceedings of the third International Workshop of the IFIP WG5.7. Florence: Firenze University Press, 2002. http://dx.doi.org/10.36253/88-8453-042-3.

Full text
Abstract:
Contents of the papers presented at the international workshop deal with the wide variety of new and computer-based techniques for production planning and control that has become available to the scientific and industrial world in the past few years: formal modeling techniques, artificial neural networks, autonomous agent theory, genetic algorithms, chaos theory, fuzzy logic, simulated annealing, tabu search, simulation and so on. The approach, while being scientifically rigorous, is focused on the applicability to industrial environment.
APA, Harvard, Vancouver, ISO, and other styles
7

Navy, Hap. Tuanādī rapás iaṇdān knuṅ niṅ krauprabăndh nau knuṅ khaes saṇvâk dī phsār trī nai prades Kambujā: The role of formal and informal credit in the fish marketing chain, Cambodia. Bhnaṃ Beñ: Krasūaṅ Kasikamm Rukkhā Pramâṅ niṅ Nesād, Nayakathān Jalphal, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

World Health Organization (WHO). Global status report on alcohol and health. Geneva: World Health Organization, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Chao, Shi-Yan. Queer Representations in Chinese-language Film and the Cultural Landscape. NL Amsterdam: Amsterdam University Press, 2020. http://dx.doi.org/10.5117/9789462988033.

Full text
Abstract:
Queer Representations in Chinese-language Film and the Cultural Landscape provides a cultural history of queer representations in Chinese-language film and media, negotiated by locally produced knowledge, local cultural agency, and lived histories. Incorporating a wide range of materials in both English and Chinese, this interdisciplinary project investigates the processes through which Chinese tongzhi/queer imaginaries are articulated, focusing on four main themes: the Chinese familial system, Chinese opera, camp aesthetic, and documentary impulse. Chao’s discursive analysis is rooted in and advances genealogical inquiries: a non-essentialist intervention into the "Chinese" idea of filial piety, a transcultural perspective on the contested genre of film melodrama, a historical investigation of the local articulations of mass camp and gay camp, and a transnational inquiry into the different formats of documentary. This book is a must for anyone exploring the cultural history of Chinese tongzhi/queer through the lens of transcultural media.
APA, Harvard, Vancouver, ISO, and other styles
10

Kuznecov, Sergey, and Konstantin Rogozin. All of physics on your palm. Interactive reference. ru: INFRA-M Academic Publishing LLC., 2020. http://dx.doi.org/10.12737/501810.

Full text
Abstract:
This is a unique visual book created by the best techniques of modern education. It presents the basic laws and formulas for all sections of physics with a huge number of interactive additions, explanations, illustrations, charts, graphs, tables, and drawings, allowing you to learn the material more efficiently. A clear and concise style of writing focuses the reader's attention in the target material, and numerous exercises, control questions and tasks allow you to securely fix in the memory the knowledge. Additional materials for all sections of General physics course available to You on the Internet in ABS Znanium.com. Using your mobile device, scan the QR code and get it on your smartphone or tablet access to comprehensive information throughout the course of physics in the media formats. In addition, on the YouTube channels "Salisylate and Isminimal from rocky" (from "the Russian Creative Internet") hosted a large number of additional training materials and videos used in this book. Interactive Handbook is intended for use in the educational activities of teachers and students of technical specialties of full-time and distance learning forms, as well as students of technical schools and secondary schools.
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Formal chains"

1

Jansen, Nils, Erika Ábrahám, Barna Zajzon, Ralf Wimmer, Johann Schuster, Joost-Pieter Katoen, and Bernd Becker. "Symbolic Counterexample Generation for Discrete-Time Markov Chains." In Formal Aspects of Component Software, 134–51. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-35861-6_9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Zhou, Hongbin, and Simon N. Foley. "A Logic for Analysing Subterfuge in Delegation Chains." In Formal Aspects in Security and Trust, 127–41. Berlin, Heidelberg: Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11679219_10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Hermanns, Holger, and Joost-Pieter Katoen. "The How and Why of Interactive Markov Chains." In Formal Methods for Components and Objects, 311–37. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-17071-3_16.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Mühle, Henri. "Proper Mergings of Stars and Chains Are Counted by Sums of Antidiagonals in Certain Convolution Arrays." In Formal Concept Analysis, 172–87. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-38317-5_11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Liu, Liya, Osman Hasan, Vincent Aravantinos, and Sofiène Tahar. "Formal Reasoning about Classified Markov Chains in HOL." In Interactive Theorem Proving, 295–310. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-39634-2_22.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Braitling, Bettina, Ralf Wimmer, Bernd Becker, Nils Jansen, and Erika Ábrahám. "Counterexample Generation for Markov Chains Using SMT-Based Bounded Model Checking." In Formal Techniques for Distributed Systems, 75–89. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-21461-5_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Kwon, YoungMin, and Gul Agha. "Linear Inequality LTL (iLTL): A Model Checker for Discrete Time Markov Chains." In Formal Methods and Software Engineering, 194–208. Berlin, Heidelberg: Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-30482-1_21.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Markovski, J., A. Sokolova, N. Trčka, and E. P. de Vink. "Compositionality for Markov Reward Chains with Fast Transitions." In Formal Methods and Stochastic Models for Performance Evaluation, 18–32. Berlin, Heidelberg: Springer Berlin Heidelberg, 2007. http://dx.doi.org/10.1007/978-3-540-75211-0_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Petrucci, Laure, and Jaco van de Pol. "Parameter Synthesis Algorithms for Parametric Interval Markov Chains." In Formal Techniques for Distributed Objects, Components, and Systems, 121–40. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-92612-4_7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Faragó, András. "On the Convergence Rate of Quasi Lumpable Markov Chains." In Formal Methods and Stochastic Models for Performance Evaluation, 138–47. Berlin, Heidelberg: Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11777830_10.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Formal chains"

1

Alroobaea, Roobaea. "A Formal Approach To Validate Block-Chains." In 2019 International Conference on Advances in the Emerging Computing Technologies (AECT). IEEE, 2020. http://dx.doi.org/10.1109/aect47998.2020.9194183.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Sakli, Leila, Jean Marc Mercantini, and Jean Claude Hennet. ""Study of supply chain vulnerabilities based on cognitive engineering and ARIMA formal models"." In The 11th International Conference on Integrated Modeling and Analysis in Applied Control and Automation. CAL-TEK srl, 2018. http://dx.doi.org/10.46354/i3m.2018.imaaca.009.

Full text
Abstract:
"This research concerns the formulation of models and methods for supply chains risk analysis. An ontological approach using the KOD method (Knowledge Oriented Design) has been implemented to clearly identify relationships between the concepts of supply chain, risk, vulnerability and disturbances (critical scenarios). As a result, conceptual models of supply chains facing risk situations and critical scenarios are proposed. From the resulting conceptual models and mathematical models proposed in the literature, a multi-stage supply chain model using ARIMA models incorporating the randomness of the demand has been elaborated. In order to adapt this model to scenario criticality, constraints on orders and inventories have been taken into account. Under critical disturbances on information flows (demand) and physical flows (quality of the product supplied), constraints can be reached and supply chain behaviours can evolve toward critical dynamics or even become unstable. Supply chain vulnerabilities has been assessed and discussed."
APA, Harvard, Vancouver, ISO, and other styles
3

Schapranow, M.-P., A. Zeier, and H. Plattner. "A Formal Model for Enabling RFID in Pharmaceutical Supply Chains." In 2011 44th Hawaii International Conference on System Sciences (HICSS 2011). IEEE, 2011. http://dx.doi.org/10.1109/hicss.2011.10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Tan, Li, Shenghan Xu, Benjamin Meyer, and Brock Erwin. "An agent-based formal framework for modeling and simulating supply chains." In Integration (IRI). IEEE, 2009. http://dx.doi.org/10.1109/iri.2009.5211555.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Fitzgerald, John, Carl Gamble, Peter Gorm Larsen, Kenneth Pierce, and Jim Woodcock. "Cyber-Physical Systems Design: Formal Foundations, Methods and Integrated Tool Chains." In 2015 IEEE/ACM 3rd FME Workshop on Formal Methods in Software Engineering (FormaliSE). IEEE, 2015. http://dx.doi.org/10.1109/formalise.2015.14.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Xu, Qianli, Jianxin Roger Jiao, and Petri Helo. "Virtual Supply Chain Configuration for Product Families: Conceptualization and Formalism." In ASME 2009 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference. ASMEDC, 2009. http://dx.doi.org/10.1115/detc2009-86672.

Full text
Abstract:
The rationale of product families for mass customization has attracted much attention from both academia and industry alike. While the product family strategy facilitates product differentiation and customization, it inevitably leads to a high variety issue in the downstream fulfillment process. In particular, when assembly-to-order and outsourcing become common practices, the supply chain decisions are deemed to be very complicated in order to accommodate the diverse product and process variants associated with product families. With focus on variety management, this paper proposes a virtual supply chain (VSC) configuration concept. The general gist is to manage various supply chain variants under a generic umbrella. It emphasizes the conceptualization and modeling of VSC to enhance the power of variety handling, with respect to supply chains, as well as products and processes. A domain-based reference model is employed to identify and coordinate the decision factors of supply chains. These decision factors are used to model the VSC based on formal semantics and object-oriented modeling techniques. The management of supply chain variety is formulated as the VSC configuration problem, and is coped with variety handlers and their states. A case study of electrical motor global supply chains is reported. It is demonstrated that the generic characteristics of VSC excel in coordinating the decisions regarding product, process and supply chains towards mass customization.
APA, Harvard, Vancouver, ISO, and other styles
7

Ameri, Farhad, and Christian McArthur. "An Ontological Approach to Manufacturing Supplier Discovery in Virtual Markets." In ASME 2010 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference. ASMEDC, 2010. http://dx.doi.org/10.1115/detc2010-28179.

Full text
Abstract:
Manufacturing supply chains are increasingly becoming global, virtual and short-lived in order to improve their agility and dynamic adaptability to rapid changes in today’s volatile market. In this context, online marketplaces for manufacturing services have become attractive venues for rapid development of supply chain relationships. Despite their numerous benefits, the existing online markets have failed in adequately automating the supply chain deployment process. Heavy reliance of the existing online markets on human agents for formulating supplier queries and evaluating the obtained results can be mainly attributed to the informal nature of the information models used in these markets. To enable active involvement of machine agents in supply chain deployment, the underlying information models that support online markets should represent the semantics of information in a formal and machine-interpretable fashion. This paper introduces Manufacturing Service Description Language (MSDL) as a formal ontology for description of suppliers’ capability at different levels of abstraction including process-level, machine-level, and system level. Also, an agent-based framework is proposed in this paper that facilitates automated discovery and evaluation of potential manufacturing partners based on the MSDL description of the services they provide.
APA, Harvard, Vancouver, ISO, and other styles
8

Ameri, Farhad, Evan Wallace, and Reid Yoder. "Enabling Traceability in Agri-Food Supply Chains Using an Ontological Approach." In ASME 2020 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference. American Society of Mechanical Engineers, 2020. http://dx.doi.org/10.1115/detc2020-22672.

Full text
Abstract:
Abstract Traceability of food products to their sources is critical for quick responses to a food emergency. US law now requires stakeholders in the agri-food supply chain to support traceability by tracking food materials they acquire and sell. However, having complete and consistent information needed to quickly investigate sources and identify affected material has proven difficult. There are multiple reasons that makes food traceability a challenging task including diversity of stakeholders and their lexicons, standards, tools and methods; unwillingness to expose information of internal operations; lack of a common understanding of steps in a supply chain; and incompleteness of data. Ontologies can address the traceability challenge by creating a shared understanding of the traceability model across stakeholders in a food supply chain. They can also support semantic mediation, data integration, and data exploration. This paper reports an on ongoing effort aimed at developing a formal ontology for supply chain traceability using use cases and data from partners in the bulk grain domain. The developed ontology was validated in VocBench environment through creating RDF triples from real datasets and executing SPARQL queries corresponding to predefined competency questions.
APA, Harvard, Vancouver, ISO, and other styles
9

Atia, George, Andre Beckus, Ismail Alkhouri, and Alvaro Velasquez. "Steady-State Policy Synthesis in Multichain Markov Decision Processes." In Twenty-Ninth International Joint Conference on Artificial Intelligence and Seventeenth Pacific Rim International Conference on Artificial Intelligence {IJCAI-PRICAI-20}. California: International Joint Conferences on Artificial Intelligence Organization, 2020. http://dx.doi.org/10.24963/ijcai.2020/563.

Full text
Abstract:
The formal synthesis of automated or autonomous agents has elicited strong interest from the artificial intelligence community in recent years. This problem space broadly entails the derivation of decision-making policies for agents acting in an environment such that a formal specification of behavior is satisfied. Popular formalisms for such specifications include the quintessential Linear Temporal Logic (LTL) and Computation Tree Logic (CTL) which reason over infinite sequences and trees, respectively, of states. However, the related and relevant problem of reasoning over the frequency with which states are visited infinitely and enforcing behavioral specifications on the same has received little attention. That problem, known as Steady-State Policy Synthesis (SSPS) or steady-state control, is the focus of this paper. Prior related work has been mostly confined to unichain Markov Decision Processes (MDPs), while a tractable solution to the general multichain setting heretofore remains elusive. In this paper, we provide a solution to the latter within the context of multichain MDPs over a class of policies that account for all possible transitions in the given MDP. The solution policy is derived from a novel linear program (LP) that encodes constraints on the limiting distributions of the Markov chain induced by said policy. We establish a one-to-one correspondence between the feasible solutions of the LP and the stationary distributions of the induced Markov chains. The derived policy is shown to maximize the reward among the constrained class of stationary policies and to satisfy the specification constraints even when it does not exercise all possible transitions.
APA, Harvard, Vancouver, ISO, and other styles
10

Su, Hai-Jun, Hongliang Shi, and JingJun Yu. "Analytical Compliance Analysis and Synthesis of Flexure Mechanisms." In ASME 2011 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference. ASMEDC, 2011. http://dx.doi.org/10.1115/detc2011-48013.

Full text
Abstract:
This paper presents a symbolic formulation for analytical compliance analysis and synthesis of flexure mechanisms with arbitrary topologies. Compliance analysis or mapping is to determine the relationship between the deformation of a mechanism and the external loading applied. It is a crucial step for the control and design of flexure mechanisms. Most of the current work relies on physical experiments or numerical simulations for studying the compliance or stiffness of flexure mechanisms. There is a lack of formal tools for the compliance synthesis whose goal is to determine the geometry of flexures or assembly of multiple flexures for a prescribed compliance in the motion direction of interest. In this work, we first derive a symbolic formulation of the compliance and stiffness matrices for commonly-used flexure elements, flexure joints and simple chains. Elements of these matrices are all explicit functions of flexure parameters. To analyze a complex flexure mechanism, we subdivide the mechanism into multiple structural modules which we identify as serial, parallel or hybrid chains. We then analyze each module with the known flexure structures in the library. At last we use a bottom-up approach to obtain the compliance matrix for the overall mechanism. Our symbolic formulation enables subsequent compliance synthesis or sensitivity analysis which is to determine how each flexure parameter affects the overall compliance of the mechanism. Four practical examples are provided to demonstrate the approach. The result is a robust design method for the compliance analysis and synthesis of flexure mechanisms.
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Formal chains"

1

Aked, Jody. Supply Chains, the Informal Economy, and the Worst Forms of Child Labour. Institute of Development Studies (IDS), July 2021. http://dx.doi.org/10.19088/clarissa.2021.006.

Full text
Abstract:
As a cohort of people, ‘children in work’ have become critical to the everyday functioning of diverse supply chain systems. This Working Paper considers diverse commodity chains (leather, waste, recycling and sex) to explore the business realities that generate child labour in its worst forms. A review of the literature finds that occurrence of the worst forms of child labour (WFCL) in supply chain systems is contingent on the organising logics and strategies adopted by actors in both the formal and informal economies. Piecing together the available evidence, the paper hypothesises that a supply chain system is sensitive to the use of WFCL when downward pressure to take on business risk cannot be matched by the economic resilience to absorb that risk. Emergencies and persistent stressors may increase risk and reduce resilience, shifting norms and behaviour. There is a need for further work to learn from business owners and workers in the informal economy.
APA, Harvard, Vancouver, ISO, and other styles
2

Gaddi, Matteo, and Nadia Garbellini. Automotive Global Value Chains in Europe. Institute for New Economic Thinking Working Paper Series, July 2021. http://dx.doi.org/10.36687/inetwp160.

Full text
Abstract:
In this paper we examine the main transformations that are affecting European automotive industry and which challenges, in particular due to the transition to new forms of propulsion, the industry is going to face. The automotive industry is central to the European economy and the nature of the Global Value Chains are rapidly shifting. While individual countries have developed economic plans to address this, a broader EU wide plan is critically important to addressing the employment and environmental effects of these shifts.
APA, Harvard, Vancouver, ISO, and other styles
3

Arezzi, Mark. Hastily Formed Networks-Chaos to Recovery. Fort Belvoir, VA: Defense Technical Information Center, September 2015. http://dx.doi.org/10.21236/ad1008965.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Chinsinga, Blessings, and Mirriam Matita. The Political Economy of the Groundnut Value Chain in Malawi: Its Re-Emergence Amidst Policy Chaos, Strategic Neglect, and Opportunism. Institute of Development Studies (IDS), March 2021. http://dx.doi.org/10.19088/apra.2021.010.

Full text
Abstract:
This paper explores the political economy of the groundnut value chain in Malawi. The paper uses a combination of insights from the theoretical perspectives of political settlement, rents and policymaking to examine this value chain. Fused together, these theoretical perspectives underpin a political economy analysis framework, which entails systematically mapping all key actors in an issue area; identifying their interests and recognising their forms of power (political, economic, social, and ideological); understanding their relationships with each other; and appreciating the issues, narratives, and ideas that shape how and why they interact with each other.
APA, Harvard, Vancouver, ISO, and other styles
5

Garfinkel, Simson L. Providing Cryptographic Security and Evidentiary Chain-of-Custody with the Advanced Forensic Format, Library, and Tools. Fort Belvoir, VA: Defense Technical Information Center, August 2008. http://dx.doi.org/10.21236/ada485606.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Bosch, Mariano, Stephanie González, and María Teresa Silva Porto. Chasing Informality: Evidence from Increasing Enforcement in Large Firms in Peru. Inter-American Development Bank, March 2021. http://dx.doi.org/10.18235/0003128.

Full text
Abstract:
Evasion of labor market regulations in middle income countries is systemic. This is generally known as informality. In Latin America, where less than 50% of workers are registered with social security, this is a permanent phenomenon and encompasses a variety of economic realities ranging from subsistence self-employment to evasion of certain regulations including social security contributions. In this study we analyze the role of enforcement in curbing informality in large formal firms in Peru, where informality levels are around 70%. Through the Peruvian National Labor Control Superintendence (SUNAFIL) we randomly sent 697 letters to formal Peruvian firms of more than 50 workers, indicating their obligation to enroll workers in social insurance systems (health and pensions). Two types of letters were sent, one with a deterrence message and one emphasizing the benefits of formalization. One year after the letters were sent, we found a positive and statistically significant effect on the number of workers enrolled in social security (9.8% on average). Only strict deterrence messages had a significant impact, and only in very large firms. This evidence suggests that there is room for improvement in compliance with labor regulations through more proactive monitoring and behavioral tools such as reminders, but effects could be concentrated in the largest firms.
APA, Harvard, Vancouver, ISO, and other styles
7

Johnson, G. W., and G. Kallianpur. Homogeneous Chaos, p-Forms, Scaling and the Feynman Integral. Fort Belvoir, VA: Defense Technical Information Center, September 1989. http://dx.doi.org/10.21236/ada218339.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Mosha, Devotha B., John Jeckoniah, Aida Isinika, and Gideon Boniface. The Influence of Sunflower Commercialisation and Diversity on Women's Empowerment: The Case of Iramba and Mkalama Districts, Singida Region. Institute of Development Studies (IDS), June 2021. http://dx.doi.org/10.19088/apra.2021.014.

Full text
Abstract:
There is a growing body of literature that argues that normally women derive little benefit from cash crops. Some of the barriers leading to women having less benefit from cash crop value chains include cultural norms and power differences in access to, and control over, resources among actors in value chains. It is also argued that women’s participation in different forms of collective action help women to increase benefits to them through their increased agency, hence enabling them to utilise existing and diverse options for their empowerment. This paper explores how women have benefited from their engagement in sunflower commercialisation and how culture has influenced changes in access to, and control over, resources, including land, for their empowerment.
APA, Harvard, Vancouver, ISO, and other styles
9

Gorman, Clare. Exposing the Worst Forms of Child Labour in Bangladesh’s Leather Sector. Institute of Development Studies (IDS), February 2021. http://dx.doi.org/10.19088/clarissa.2021.001.

Full text
Abstract:
As one of the country’s biggest employers and its second largest exporter, the leather sector is big business in Bangladesh. But it is also in crisis. A dramatic decrease in the global demand for leather since COVID-19 has led to the collapse of the supply chain with workers, especially children, bearing the worst of the brunt. As cracks in the industry’s surface widen, new research from the Child Labour: Action-Research-Innovation in South and South-Eastern Asia (CLARISSA) programme shines a light into its hidden corners, revealing examples of the worst forms of child labour (WFCL) at almost every turn.
APA, Harvard, Vancouver, ISO, and other styles
10

Maksud, A. K. M., Khandaker Reaz Hossain, Sayma Sayed, and Amit Arulanantham. Mapping of Children Engaged in the Worst Forms of Child Labour in the Supply Chain of the Leather Industry in Bangladesh. Institute of Development Studies (IDS), July 2021. http://dx.doi.org/10.19088/clarissa.2021.005.

Full text
Abstract:
This mapping of children in the worst forms of child labour (WFCL) in the leather sector of Bangladesh was conducted in May–August 2020. WFCL are not always obvious and, without better understanding of where, why and how it is happening, the exploitation and abuse of children in the workforce in Bangladesh will continue. This mapping provides a detailed assessment of where children are working in the leather supply chain in Bangladesh, what they are doing, how they came to be doing it and what their conditions of work and experiences are. Furthermore, and critically, it evidences the children’s perceptions of themselves and others as child labourers – the jobs and areas of the sector that they feel comprise WFCL, and the jobs they feel are the most difficult or dangerous to do and that children should not have to do.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography