Search Results Heading

MBRLSearchResults

mbrl.module.common.modules.added.book.to.shelf
Title added to your shelf!
View what I already have on My Shelf.
Oops! Something went wrong.
Oops! Something went wrong.
While trying to add the title to your shelf something went wrong :( Kindly try again later!
Are you sure you want to remove the book from the shelf?
Oops! Something went wrong.
Oops! Something went wrong.
While trying to remove the title from your shelf something went wrong :( Kindly try again later!
    Done
    Filters
    Reset
  • Discipline
      Discipline
      Clear All
      Discipline
  • Is Peer Reviewed
      Is Peer Reviewed
      Clear All
      Is Peer Reviewed
  • Reading Level
      Reading Level
      Clear All
      Reading Level
  • Content Type
      Content Type
      Clear All
      Content Type
  • Year
      Year
      Clear All
      From:
      -
      To:
  • More Filters
      More Filters
      Clear All
      More Filters
      Item Type
    • Is Full-Text Available
    • Subject
    • Publisher
    • Source
    • Donor
    • Language
    • Place of Publication
    • Contributors
    • Location
716 result(s) for "Jones, Benjamin R"
Sort by:
Energy security, equality and justice
\"This book applies concepts from ethics, justice, and political philosophy to five sets of contemporary energy problems cutting across time, economics, politics, geography, and technology. In doing so, the authors derive two key energy justice principles from modern theories of distributive justice, procedural justice, and cosmopolitan justice. The prohibitive principle states that \"energy systems must be designed and constructed in such a way that they do not unduly interfere with the ability of people to acquire those basic goods to which they are justly entitled.\" The affirmative principle states that \"if any of the basic goods to which people are justly entitled can only be secured by means of energy services, then in that case there is also a derivative entitlement to the energy services.\" In laying out and employing these principles, the book details a long list of current energy injustices ranging from human rights abuses and energy-related civil conflict to energy poverty and pervasive and growing negative externalities. The book illustrates the significance of energy justice by combining the most up-to-date data on global energy security and climate change, including case studies and examples from the electricity supply, transport, and heating and cooking sectors, with appraisals based on centuries of thought about the meaning of justice in social decisions\"-- Provided by publisher.
Making the Ethical and Philosophical Case for “Energy Justice”
A new conceptual framework, “energy justice,” provides a more comprehensive and, potentially, better way to assess and resolve energy-related dilemmas. This new framework of energy justice builds on four fundamental assumptions and consists of two key principles: a prohibitive principle which states that “energy systems must be designed and constructed in such a way that they do not unduly interfere with the ability of people to acquire those basic goods to which they are justly entitled,” and an affirmative principle which states that “if any of the basic goods to which people are justly entitled can only be secured by means of energy services, then in that case there is also a derivative entitlement to the energy services.” These two principles are premised on the notion that energy serves as a material prerequisite for many of the basic goods to which people are entitled. They also recognize that the externalities associated with energy systems often interfere with the enjoyment of such fundamental goods as security and welfare. They acknowledge that the structuring of energy systems has profound ramifications for human societies, providing historically unprecedented benefits for some, and taking from others the possibility of living a life of basic human dignity.
Minor-closed classes of binary functions
Binary functions are a generalisation of the cocircuit spaces of binary matroids to arbitrary functions. Every rank function is assigned a binary function, and the deletion and contraction operations of binary functions generalise matroid deletion and contraction. We give the excluded minor characterisations for the classes of binary functions with well defined minors, and those with an associated rank function. Within these classes, we also characterise the classes of binary functions corresponding to polymatroids, matroids and binary matroids by their excluded minors. This gives a new proof of Tutte's excluded minor characterisation of binary matroids in the more generalised space of binary functions.
Divergent Soybean Calmodulins Respond Similarly to Calcium Transients: Insight into Differential Target Regulation
Plants commonly respond to stressors by modulating the expression of a large family of calcium binding proteins including isoforms of the ubiquitous signaling protein calmodulin (CaM). The various plant CaM isoforms are thought to differentially regulate the activity of specific target proteins to modulate cellular stress responses. The mechanism(s) behind differential target activation by the plant CaMs is unknown. In this study, we used steady-state and stopped-flow fluorescence spectroscopy to investigate the strategy by which two soybean CaMs (sCaM1 and sCaM4) have evolved to differentially regulate NAD kinase (NADK), which is activated by sCaM1 but inhibited by sCaM4. Although the isolated proteins have different cation binding properties, in the presence of Mg and the CaM binding domains from proteins that are differentially regulated, the two plant CaMs respond nearly identically to rapid and slow Ca transients. Our data suggest that the plant CaMs have evolved to bind certain targets with comparable affinities, respond similarly to a particular Ca signature, but achieve different structural states, only one of which can activate the enzyme. Understanding the basis for differential enzyme regulation by the plant CaMs is the first step to engineering a vertebrate CaM that will selectively alter the CaM signaling network.
Early morning headache with vomiting in a 5 year old boy
[...]group 4 tumours, which are typically seen in boys age 7 years, have classic histology, carry isochromosome 17q, and have an intermediate prognosis. 4 4 How would you manage this patient? [...]look surgery may be necessary, but the advent of intraoperative MRI should mean that it will be used less often. To date, no single strategy has proved to be significantly better than any other, although the approach reported by the Milan group is the current recommended strategy in the UK. 5 Patients are monitored closely during and after treatment for any side effects or complications. Because of the relatively high rate of relapse, follow-up imaging of the brain and spine is generally recommended every three months for the first two years. Rehabilitation services should be offered, including speech and language therapy, physiotherapy, and educational support. 5 What are the long term complications of neurosurgery, chemotherapy, and radiotherapy in children?
Comment: Virtual Neighborhood Watch: Open Source Software and Community Policing against Cybercrime
Cybercrime--crime committed through the use of a computer--is a real and growing problem that costs governments, businesses, and individual computer users millions of dollars annually and that facilitates many of the same crimes committed in realspace, such as identity theft and the trafficking of child pornography, only on a larger scale. However, the current strategies deployed by law enforcement to combat cybercrime have proven ineffective. Borne out of traditional notions of criminal behavior, these strategies and tactics are often ill-suited to prevent or punish cybercrime, which often defies the traditional notions of criminal behavior bounded by the corporeal world such as scale and proximity. This Comment argues that a more effective methodology in the fight against cybercrime is to develop a model of community policing, in which the power to deter and prevent cybercrime is divested into the hands of individual computer users. One such strategy for achieving effective community policing against cybercrime is through the increased use of open-source software, software in which users are given access to the underlying source code and may make modifications to that source code in order to ameliorate vulnerabilities that may enable cybercrime. This Comment looks at the development of traditional community policing strategies and argues that the increased use of open source software--spurned by greater involvement by government and corporations--may be a more effective technique in the fight against cybercrime.
Minor-closed classes of binary functions
Binary functions are a generalisation of the cocircuit spaces of binary matroids to arbitrary functions. Every rank function is assigned a binary function, and the deletion and contraction operations of binary functions generalise matroid deletion and contraction. We give the excluded minor characterisations for the classes of binary functions with well defined minors, and those with an associated rank function. Within these classes, we also characterise the classes of binary functions corresponding to polymatroids, matroids and binary matroids by their excluded minors. This gives a new proof of Tutte's excluded minor characterisation of binary matroids in the more generalised space of binary functions.
Establishing the Construct of Subtle Identity PerformancesDAO and Providing an Answer to Successful Intergroup Leadership
Leaders responsible for overseeing multiple groups increase the likelihood of accomplishing organizational goals if they can successfully garner support and trust from all the groups they lead. However, when a leader emerges from one group, he or she may be viewed by others as having an inherit bias to his or her own group. How can a leader gain the support and trust of those in other groups without alienating him or herself from his or her base? This is a common, but understudied, intergroup leadership dilemma. In this dissertation, I aim to show that subtle identity performances directed at the outgroup (subtle identity performancesDAO), subtle appeals that are effectively invisible to those who are not familiar with the targeted outgroup’s norms, can be used by leaders to gain support and trust from their outgroup members, allowing them to maximize their potential following. Indeed, subtle identity performancesDAO are increasingly possible in today’s technological age; motivated leaders can access information that informs them of a targeted outgroup’s normative behavior and utilize this information to conduct subtle appeals to gain trust and support from their opposition. In my dissertation, I conduct three studies that introduce the construct subtle identity performancesDAO and test its effectiveness as a solution to a common problem of intergroup leadership. While the results of the studies ultimately do not support my primary hypotheses, that leaders can utilize subtle identity performances to gain trust and support from outgroup members, I offer suggestions for future research to help extend the body of work on subtle appeals.
The Newcomer Absorption Model: When are Newcomers Integrated Into Their Teams’ Transactive Memory Systems?
Teams often experience membership changes, requiring them to absorb newcomers into their teams. Transactive memory systems, a cornerstone of high performing teams, have to be rewired to incorporate team newcomers. Despite the drastic effects newcomers can have on team functioning, the extant literature is rooted in the newcomer perspective (e.g., Chen, 2005), and focuses almost exclusively on how newcomers become socialized into the team (e.g. Moreland & Levine, 2002). In contrast, I explore the team’s perspective on newcomers, examining how the team reacts to the newcomer. This study suggests the identity threat evoked by a newcomer determines whether or not a newcomer will be successfully absorbed into the transactive memory system of the recomposed team. This research integrates two competing bodies of literature, team creativity research and social identity theory, to explain newcomer absorption and, more generally, the effects of newcomers on team functioning.