21 resultados para mental computation strategies
Resumo:
Tethered satellites deployed from the Space Shuttle have been proposed for diverse applications. A funda- mental issue in the utilization of tethers is quick deployment and retrieval of the attached payload. Inordinate librations of the tether during deployment and retrieval is undesirable. The structural damping present in the system is too low to contain the librations. Rupp [1] proposed to control the tether reel located in the parent spacecraft to alter the tension in the tether, which in turn changes the stiffness and the damping of the system. Baker[2] applied the tension control law to a model which included out of plane motion. Modi et al.[3] proposed a control law that included nonlinear feedback of the out-of plane tether angular rate. More recently, nonlinear feedback control laws based on Liapunov functions have been proposed. Two control laws are derived in [4]. The first is based on partial decomposition of the equations of motion and utilization of a two dimensional control law developed in [5]. The other is based on a Liapunov function that takes into consideration out-of-plane motion. It is shown[4] that the control laws are effective when used in conjunction with out-of-plane thrusting. Fujii et al.,[6] used the mission function control approach to study the control law including aerodynamic drag effect explicitly into the control algorithm.
Resumo:
This article is concerned with the evolution of haploid organisms that reproduce asexually. In a seminal piece of work, Eigen and coauthors proposed the quasispecies model in an attempt to understand such an evolutionary process. Their work has impacted antiviral treatment and vaccine design strategies. Yet, predictions of the quasispecies model are at best viewed as a guideline, primarily because it assumes an infinite population size, whereas realistic population sizes can be quite small. In this paper we consider a population genetics-based model aimed at understanding the evolution of such organisms with finite population sizes and present a rigorous study of the convergence and computational issues that arise therein. Our first result is structural and shows that, at any time during the evolution, as the population size tends to infinity, the distribution of genomes predicted by our model converges to that predicted by the quasispecies model. This justifies the continued use of the quasispecies model to derive guidelines for intervention. While the stationary state in the quasispecies model is readily obtained, due to the explosion of the state space in our model, exact computations are prohibitive. Our second set of results are computational in nature and address this issue. We derive conditions on the parameters of evolution under which our stochastic model mixes rapidly. Further, for a class of widely used fitness landscapes we give a fast deterministic algorithm which computes the stationary distribution of our model. These computational tools are expected to serve as a framework for the modeling of strategies for the deployment of mutagenic drugs.
Resumo:
Bidirectional relaying, where a relay helps two user nodes to exchange equal length binary messages, has been an active area of recent research. A popular strategy involves a modified Gaussian MAC, where the relay decodes the XOR of the two messages using the naturally-occurring sum of symbols simultaneously transmitted by user nodes. In this work, we consider the Gaussian MAC in bidirectional relaying with an additional secrecy constraint for protection against a honest but curious relay. The constraint is that, while the relay should decode the XOR, it should be fully ignorant of the individual messages of the users. We exploit the symbol addition that occurs in a Gaussian MAC to design explicit strategies that achieve perfect independence between the received symbols and individual transmitted messages. Our results actually hold for a more general scenario where the messages at the two user nodes come from a finite Abelian group G, and the relay must decode the sum within G of the two messages. We provide a lattice coding strategy and study optimal rate versus average power trade-offs for asymptotically large dimensions.
Resumo:
Space vector based PWM strategies for three-level inverters have a broader choice of switching sequences to generate the required reference vector than triangle comparison based PWM techniques. However, space vector based PWM involves numerous steps which are computationally intensive. A simplified algorithm is proposed here, which is shown to reduce the computation time significantly. The developed algorithm is used to implement synchronous and asynchronous conventional space vector PWM, synchronized modified space vector PWM and an asynchronous advanced bus-clamping PWM technique on a low-cost dsPIC digital controller. Experimental results are presented for a comparative evaluation of the performance of different PWM methods.
Resumo:
This paper presents the proper computational approach for the estimation of strain energy release rates by modified crack closure integral (MCCI). In particular, in the estimation of consistent nodal force vectors used in the MCCI expressions for quarter-point singular elements (wherein all the nodal force vectors participate in computation of strain energy release rates by MCCI). The numerical example of a centre crack tension specimen under uniform loading is presented to illustrate the approach.
Resumo:
Cooperation among unrelated individuals is an enduring evolutionary riddle and a number of possible solutions have been suggested. Most of these suggestions attempt to refine cooperative strategies, while little attention is given to the fact that novel defection strategies can also evolve in the population. Especially in the presence of punishment to the defectors and public knowledge of strategies employed by the players, a defecting strategy that avoids getting punished by selectively cooperating only with the punishers can get a selective benefit over non-conditional defectors. Furthermore, if punishment ensures cooperation from such discriminating defectors, defectors who punish other defectors can evolve as well. We show that such discriminating and punishing defectors can evolve in the population by natural selection in a Prisoner’s Dilemma game scenario, even if discrimination is a costly act. These refined defection strategies destabilize unconditional defectors. They themselves are, however, unstable in the population. Discriminating defectors give selective benefit to the punishers in the presence of non-punishers by cooperating with them and defecting with others. However, since these players also defect with other discriminators they suffer fitness loss in the pure population. Among the punishers, punishing cooperators always benefit in contrast to the punishing defectors, as the latter not only defect with other punishing defectors but also punish them and get punished. As a consequence of both these scenarios, punishing cooperators get stabilized in the population. We thus show ironically that refined defection strategies stabilize cooperation. Furthermore, cooperation stabilized by such defectors can work under a wide range of initial conditions and is robust to mistakes.
Resumo:
A technique for computing the spectral and angular (both the zenith and azimuthal) distribution of the solar energy reaching the surface of earth and any other plane in the atmosphere has been developed. Here the computer code LOWTRAN is used for getting the atmospheric transmittances in conjunction with two approximate procedures: one based on the Eddington method and the other on van de Hulst's adding method, for solving the equation of radiative transfer to obtain the diffuse radiation in the cloud-free situation. The aerosol scattering phase functions are approximated by the Hyeney-Greenstein functions. When the equation of radiative transfer is solved using the adding method, the azimuthal and zenith angle dependence of the scattered radiation is evaluated, whereas when the Eddington technique is utilized only the total downward flux of scattered solar radiation is obtained. Results of the diffuse and beam components of solar radiation received on surface of earth compare very well with those computed by other methods such as the more exact calculations using spherical harmonics and when atmospheric conditions corresponding to that prevailing locally in a tropical location (as in India) are used as inputs the computed values agree closely with the measured values.
Resumo:
Screen-less oscillation photography is the method of choice for recording three-dimensional X-ray diffraction data for crystals of biological macromolecules. The geometry of an oscillation camera is extremely simple. However, the manner in which the reciprocal lattice is recorded in any experiment is fairly complex. This depends on the Laue symmetry of the reciprocal lattice, the lattice type, the orientation of the crystal on the camera and to a lesser extent on the unit-cell dimensions. Exploring the relative efficiency of collecting X-ray diffraction data for different crystal orientations prior to data collection might reduce the number of films required to record most of the unique data and the consequent amount of time required for processing these films. Here algorithms are presented suitable for this purpose and results are reported for the 11 Laue groups, different lattice types and crystal orientations often employed in data collection.
Resumo:
Cyclohexa-1, 4-dienes with appropriate substituents, obtained by birch reduction of the substituted benzene, react directly with derivatives of propiolic ester or aldchyde to yield aromatic polyketides. The following compounds have been synthesized; mycophenolic acid, nidulol methyl other, the root growth hormone 3, 5-dihydroxy-2-formyl-4-mythyl-benzoic acid, antibiotic DB 2073, the macrocyclic lactones lasiodiplodin and dihydrozearalenone and the biphenyl derivatives alternario and altenusin. Polyketide anthraquinones can be made from naphthoquinone precursors.
Resumo:
1-Methoxycyclohexa-1,4-dienes are readily available from the metal-ammonia-alcohol reduction of aromatic ethers. The use of these dihydrocompounds in the synthesis of a variety of natural products is reviewed.
Resumo:
A study of the essential features of piston rings in the cylinder liner of an internal combustion engine reveals that the lubrication problem posed by it is basically that of a slider bearing. According to steady-flow-hydrodynamics, viz. Image the oil film thickness becomes zero at the dead centre positions as the velocity, U = 0. In practice, however, such a phenomenon cannot be supported by consideration of the wear rates of pistion rings and cylinder liners. This can be explained by including the “squeeze” action term in the
Resumo:
The transforms dealt with in this paper are defined in terms of the transform kernels which are Kroneeker products of the two or more component kernels. The signal flow-graph for the computation of such a transform is obtained with the flow-graphs for the component transforms as building blocks.
Resumo:
An error-free computational approach is employed for finding the integer solution to a system of linear equations, using finite-field arithmetic. This approach is also extended to find the optimum solution for linear inequalities such as those arising in interval linear programming probloms.
Resumo:
The modified local stability scheme is applied to several two-dimensional problems—blunt body flow, regular reflection of a shock and lambda shock. The resolution of the flow features obtained by the modified local stability scheme is found to be better than that achieved by the other first order schemes and almost identical to that achieved by the second order schemes incorporating artificial viscosity. The scheme is easy for coding, consumes moderate amount of computer storage and time. The scheme can be advantageously used in place of second order schemes.
Resumo:
Protein kinases phosphorylate several cellular proteins providing control mechanisms for various signalling processes. Their activity is impeded in a number of ways and restored by alteration in their structural properties leading to a catalytically active state. Most protein kinases are subjected to positive and negative regulation by phosphorylation of Ser/Thr/Tyr residues at specific sites within and outside the catalytic core. The current review describes the analysis on 3D structures of protein kinases that revealed features distinct to active states of Ser/Thr and Tyr kinases. The nature and extent of interactions among well-conserved residues surrounding the permissive phosphorylation sites differ among the two classes of enzymes. The network of interactions of highly conserved Arg preceding the catalytic base that mediates stabilization of the activation segment exemplifies such diverse interactions in the two groups of kinases. The N-terminal and the C-terminal lobes of various groups of protein kinases further show variations in their extent of coupling as suggested from the extent of interactions between key functional residues in activation segment and the N-terminal αC-helix. We observe higher similarity in the conformations of ATP bound to active forms of protein kinases compared to ATP conformations in the inactive forms of kinases. The extent of structural variations accompanying phosphorylation of protein kinases is widely varied. The comparison of their crystal structures and the distinct features observed are hoped to aid in the understanding of mechanisms underlying the control of the catalytic activity of distinct subgroups of protein kinases.