254 resultados para Assymetric loss functions
Resumo:
In many interventions that are based on an exercise program intended to induce weight loss, the mean weight loss observed is modest and sometimes far less than what the individual expected. The individual responses are also widely variable, with some individuals losing a substantial amount of weight, others maintaining weight, and a few actually gaining weight. The media have focused on the subpopulation that loses little weight, contributing to a public perception that exercise has limited utility to cause weight loss. The purpose of the symposium was to present recent, novel data that help explain how compensatory behaviors contribute to a wide discrepancy in exercise-induced weight loss. The presentations provide evidence that some individuals adopt compensatory behaviors, that is, increased energy intake and/or reduced activity, that offset the exercise energy expenditure and limit weight loss. The challenge for both scientists and clinicians is to develop effective tools to identify which individuals are susceptible to such behaviors and to develop strategies to minimize their effect.
Resumo:
BACKGROUND/OBJECTIVEs A decline in resting energy expenditure (REE) beyond that predicted from changes in body composition has been noted following dietary-induced weight loss. However, it is unknown whether a compensatory downregulation in REE also accompanies exercise (EX)-induced weight loss, or whether this adaptive metabolic response influences energy intake (EI). SUBJECTS/METHODS Thirty overweight and obese women (body mass index (BMI)=30.6±3.6 kg/m2) completed 12 weeks of supervised aerobic EX. Body composition, metabolism, EI and metabolic-related hormones were measured at baseline, week 6 and post intervention. The metabolic adaptation (MA), that is, difference between predicted and measured REE was also calculated post intervention (MApost), with REE predicted using a regression equation generated in an independent sample of 66 overweight and obese women (BMI=31.0±3.9 kg/m2). RESULTS Although mean predicted and measured REE did not differ post intervention, 43% of participants experienced a greater-than-expected decline in REE (−102.9±77.5 kcal per day). MApost was associated with the change in leptin (r=0.47; P=0.04), and the change in resting fat (r=0.52; P=0.01) and carbohydrate oxidation (r=−0.44; P=0.02). Furthermore, MApost was also associated with the change in EI following EX (r=−0.44; P=0.01). CONCLUSIONS Marked variability existed in the adaptive metabolic response to EX. Importantly, those who experienced a downregulation in REE also experienced an upregulation in EI, indicating that the adaptive metabolic response to EX influences both physiological and behavioural components of energy balance.
Resumo:
Case note Apache Energy Ltd v Alcoa of Australia Ltd (No 2) [2013] In 2011, headlines were made when Alcoa sued Apache Energy and its partners for $158 million, a loss it claimed was a consequence of Apache Energy failing to adequately inspect and maintain the gas pipelines that supplied the gas used by Alcoa in its business. As the loss was not a consequence of any property damage or injury to Alcoa, the loss is characterised as pure economic loss...
Resumo:
It is widely acknowledged that effective asset management requires an interdisciplinary approach, in which synergies should exist between traditional disciplines such as: accounting, engineering, finance, humanities, logistics, and information systems technologies. Asset management is also an important, yet complex business practice. Business process modelling is proposed as an approach to manage the complexity of asset management through the modelling of asset management processes. A sound foundation for the systematic application and analysis of business process modelling in asset management is, however, yet to be developed. Fundamentally, a business process consists of activities (termed functions), events/states, and control flow logic. As both events/states and control flow logic are somewhat dependent on the functions themselves, it is a logical step to first identify the functions within a process. This research addresses the current gap in knowledge by developing a method to identify functions common to various industry types (termed core functions). This lays the foundation to extract such functions, so as to identify both commonalities and variation points in asset management processes. This method describes the use of a manual text mining and a taxonomy approach. An example is presented.
Resumo:
Many cell types form clumps or aggregates when cultured in vitro through a variety of mechanisms including rapid cell proliferation, chemotaxis, or direct cell-to-cell contact. In this paper we develop an agent-based model to explore the formation of aggregates in cultures where cells are initially distributed uniformly, at random, on a two-dimensional substrate. Our model includes unbiased random cell motion, together with two mechanisms which can produce cell aggregates: (i) rapid cell proliferation, and (ii) a biased cell motility mechanism where cells can sense other cells within a finite range, and will tend to move towards areas with higher numbers of cells. We then introduce a pair-correlation function which allows us to quantify aspects of the spatial patterns produced by our agent-based model. In particular, these pair-correlation functions are able to detect differences between domains populated uniformly at random (i.e. at the exclusion complete spatial randomness (ECSR) state) and those where the proliferation and biased motion rules have been employed - even when such differences are not obvious to the naked eye. The pair-correlation function can also detect the emergence of a characteristic inter-aggregate distance which occurs when the biased motion mechanism is dominant, and is not observed when cell proliferation is the main mechanism of aggregate formation. This suggests that applying the pair-correlation function to experimental images of cell aggregates may provide information about the mechanism associated with observed aggregates. As a proof of concept, we perform such analysis for images of cancer cell aggregates, which are known to be associated with rapid proliferation. The results of our analysis are consistent with the predictions of the proliferation-based simulations, which supports the potential usefulness of pair correlation functions for providing insight into the mechanisms of aggregate formation.
Resumo:
The experiences of the loss reduction projects in electric power distribution companies (EPDCs) of Iran are presented. The loss reduction methods, which are proposed individually by 14 EPDCs, corresponding energy saving (ES), Investment costs (IC), and loss rate reductions are provided. In order to illustrate the effectiveness and performance of the loss reduction methods, three parameters are proposed as energy saving per investment costs (ESIC), energy saving per quantity (ESPQ), and investment costs per quantity (ICPQ). The overall ESIC of 14 EPDC as well as individual average and standard deviation of the EISC for each method is presented and compared. In addition, the average and standard deviation of the ESPQs and ICPQs for the loss reduction methods, individually, are provided and investigated. These parameters are useful for EPDCs that intend to reduce the electric losses in distribution networks as a benchmark and as a background in the planning purposes.
Resumo:
In this paper, a loss reduction planning in electric distribution networks is presented based on the successful experiences in distribution utilities of IRAN and some developed countries. The necessary technical and economical parameters of planning are calculated from related projects in IRAN. Cost, time, and benefits of every sub-program including seven loss reduction approaches are determined. Finally, the loss reduction program, the benefit per cost, and the return of investment in optimistic and pessimistic conditions are introduced.
An improved chemically inducible gene switch that functions in the monocotyledonous plant sugar cane
Resumo:
Chemically inducible gene switches can provide precise control over gene expression, enabling more specific analyses of gene function and expanding the plant biotechnology toolkit beyond traditional constitutive expression systems. The alc gene expression system is one of the most promising chemically inducible gene switches in plants because of its potential in both fundamental research and commercial biotechnology applications. However, there are no published reports demonstrating that this versatile gene switch is functional in transgenic monocotyledonous plants, which include some of the most important agricultural crops. We found that the original alc gene switch was ineffective in the monocotyledonous plant sugar cane, and describe a modified alc system that is functional in this globally significant crop. A promoter consisting of tandem copies of the ethanol receptor inverted repeat binding site, in combination with a minimal promoter sequence, was sufficient to give enhanced sensitivity and significantly higher levels of ethanol inducible gene expression. A longer CaMV 35S minimal promoter than was used in the original alc gene switch also substantially improved ethanol inducibility. Treating the roots with ethanol effectively induced the modified alc system in sugar cane leaves and stem, while an aerial spray was relatively ineffective. The extension of this chemically inducible gene expression system to sugar cane opens the door to new opportunities for basic research and crop biotechnology.
Resumo:
Cryptosystems based on the hardness of lattice problems have recently acquired much importance due to their average-case to worst-case equivalence, their conjectured resistance to quantum cryptanalysis, their ease of implementation and increasing practicality, and, lately, their promising potential as a platform for constructing advanced functionalities. In this work, we construct “Fuzzy” Identity Based Encryption from the hardness of the Learning With Errors (LWE) problem. We note that for our parameters, the underlying lattice problems (such as gapSVP or SIVP) are assumed to be hard to approximate within supexponential factors for adversaries running in subexponential time. We give CPA and CCA secure variants of our construction, for small and large universes of attributes. All our constructions are secure against selective-identity attacks in the standard model. Our construction is made possible by observing certain special properties that secret sharing schemes need to satisfy in order to be useful for Fuzzy IBE. We also discuss some obstacles towards realizing lattice-based attribute-based encryption (ABE).
Resumo:
We introduce Kamouflage: a new architecture for building theft-resistant password managers. An attacker who steals a laptop or cell phone with a Kamouflage-based password manager is forced to carry out a considerable amount of online work before obtaining any user credentials. We implemented our proposal as a replacement for the built-in Firefox password manager, and provide performance measurements and the results from experiments with large real-world password sets to evaluate the feasibility and effectiveness of our approach. Kamouflage is well suited to become a standard architecture for password managers on mobile devices.
Resumo:
To this day, realizations in the standard-model of (lossy) trapdoor functions from discrete-log-type assumptions require large public key sizes, e.g., about Θ(λ 2) group elements for a reduction from the decisional Diffie-Hellman assumption (where λ is a security parameter). We propose two realizations of lossy trapdoor functions that achieve public key size of only Θ(λ) group elements in bilinear groups, with a reduction from the decisional Bilinear Diffie-Hellman assumption. Our first construction achieves this result at the expense of a long common reference string of Θ(λ 2) elements, albeit reusable in multiple LTDF instantiations. Our second scheme also achieves public keys of size Θ(λ), entirely in the standard model and in particular without any reference string, at the cost of a slightly more involved construction. The main technical novelty, developed for the second scheme, is a compact encoding technique for generating compressed representations of certain sequences of group elements for the public parameters.
Resumo:
Boolean functions and their Möbius transforms are involved in logical calculation, digital communications, coding theory and modern cryptography. So far, little is known about the relations of Boolean functions and their Möbius transforms. This work is composed of three parts. In the first part, we present relations between a Boolean function and its Möbius transform so as to convert the truth table/algebraic normal form (ANF) to the ANF/truth table of a function in different conditions. In the second part, we focus on the special case when a Boolean function is identical to its Möbius transform. We call such functions coincident. In the third part, we generalize the concept of coincident functions and indicate that any Boolean function has the coincidence property even it is not coincident.
Loss of chromosomal integrity in human mammary epithelial cells subsequent to escape from senescence
Resumo:
The genomic changes that foster cancer can be either genetic or epigenetic in nature. Early studies focused on genetic changes and how mutational events contribute to changes in gene expression. These point mutations, deletions and amplifications are known to activate oncogenes and inactivate tumor suppressor genes. More recently, multiple epigenetic changes that can have a profound effect on carcinogenesis have been identified. These epigenetic events, such as the methylation of promoter sequences in genes, are under active investigation. In this review we will describe a methylation event that occurs during the propagation of human mammary epithelial cells (HMEC) in culture and detail the accompanying genetic alterations that have been observed.