7 resultados para Selective capture of transcribed sequences

em Universidad Politécnica de Madrid


Relevância:

100.00% 100.00%

Publicador:

Resumo:

We study the evolution of a finite size population formed by mutationally isolated lineages of error-prone replicators in a two-peak fitness landscape. Computer simulations are performed to gain a stochastic description of the system dynamics. More specifically, for different population sizes, we compute the probability of each lineage being selected in terms of their mutation rates and the amplification factors of the fittest phenotypes. We interpret the results as the compromise between the characteristic time a lineage takes to reach its fittest phenotype by crossing the neutral valley and the selective value of the sequences that form the lineages. A main conclusion is drawn: for finite population sizes, the survival probability of the lineage that arrives first to the fittest phenotype rises significantly

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This paper proposes and analyzes the use of a nonrotating tethered system for a direct capture in Jovian orbit using the electrodynamic force generated along the cable. A detailed dynamical model is developed showing a strong gravitational and electrodynamic coupling between the center of mass and the attitude motions. This paper shows the feasibility of a direct capture in Jovian orbit of a rigid tethered system preventing the tether from rotating. Additional mechanical–thermal requirements are explored, and preliminary operational limits are defined to complete the maneuver. In particular, to ensure that the system remains nonrotating, a nominal attitude profile for a self-balanced electrodynamic tether is proposed, as well as a simple feedback control.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The integrated Safety Assessment (ISA) methodology, developed by the Spanish Nuclear Safety Council (CSN), has been applied to a thermal-hydraulic analysis of PWR Station Blackout (SBO) sequences in the context of the IDPSA (Integrated Deterministic-Probabilistic Safety Assessment) network objectives. The ISA methodology allows obtaining the damage domain (the region of the uncertain parameters space where the damage limit is exceeded) for each sequence of interest as a function of the operator actuations times. Given a particular safety limit or damage limit, several data of every sequence are necessary in order to obtain the exceedance frequency of that limit. In this application these data are obtained from the results of the simulations performed with MAAP code transients inside each damage domain and the time-density probability distributions of the manual actions. Damage limits that have been taken into account within this analysis are: local cladding damage (PCT>1477 K); local fuel melting (T>2499 K); fuel relocation in lower plenum and vessel failure. Therefore, to every one of these damage variables corresponds a different damage domain. The operation of the new passive thermal shutdown seals developed by several companies since Fukushima accident is considered in the paper. The results show the capability and necessity of the ISA methodology, or similar, in order to obtain accurate results that take into account time uncertainties.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Selective injection of magnetic domain walls in Permalloy nanostripes

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Monolithical series connection of silicon thin-film solar cells modules performed by laser scribing plays a very important role in the entire production of these devices. In the current laser process interconnection the two last steps are developed for a configuration of modules where the glass is essential as transparent substrate. In addition, the change of wavelength in the employed laser sources is sometimes enforced due to the nature of the different materials of the multilayer structure which make up the device. The aim of this work is to characterize the laser patterning involved in the monolithic interconnection process in a different configurations of processing than the usually performed with visible laser sources. To carry out this study, we use nanosecond and picosecond laser sources working at 355nm of wavelength in order to achieve the selective ablation of the material from the film side. To assess this selective removal of material has been used EDX (energy dispersive using X-ray) analysis

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The Integrated Safety Assessment (ISA) methodology, developed by the Spanish Nuclear Safety Council (CSN), has been applied to a thermo-hydraulical analysis of a Westinghouse 3-loop PWR plant by means of the dynamic event trees (DET) for Steam Generator Tube Rupture (SGTR) sequences. The ISA methodology allows obtaining the SGTR Dynamic Event Tree taking into account the operator actuation times. Simulations are performed with SCAIS (Simulation Code system for Integrated Safety Assessment), which includes a dynamic coupling with MAAP thermal hydraulic code. The results show the capability of the ISA methodology and SCAIS platform to obtain the DET of complex sequences.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Due to the sensitive international situation caused by still-recent terrorist attacks, there is a common need to protect the safety of large spaces such as government buildings, airports and power stations. To address this problem, developments in several research fields, such as video and cognitive audio, decision support systems, human interface, computer architecture, communications networks and communications security, should be integrated with the goal of achieving advanced security systems capable of checking all of the specified requirements and spanning the gap that presently exists in the current market. This paper describes the implementation of a decision system for crisis management in infrastructural building security. Specifically, it describes the implementation of a decision system in the management of building intrusions. The positions of the unidentified persons are reported with the help of a Wireless Sensor Network (WSN). The goal is to achieve an intelligent system capable of making the best decision in real time in order to quickly neutralise one or more intruders who threaten strategic installations. It is assumed that the intruders’ behaviour is inferred through sequences of sensors’ activations and their fusion. This article presents a general approach to selecting the optimum operation from the available neutralisation strategies based on a Minimax algorithm. The distances among different scenario elements will be used to measure the risk of the scene, so a path planning technique will be integrated in order to attain a good performance. Different actions to be executed over the elements of the scene such as moving a guard, blocking a door or turning on an alarm will be used to neutralise the crisis. This set of actions executed to stop the crisis is known as the neutralisation strategy. Finally, the system has been tested in simulations of real situations, and the results have been evaluated according to the final state of the intruders. In 86.5% of the cases, the system achieved the capture of the intruders, and in 59.25% of the cases, they were intercepted before they reached their objective.