285 resultados para Implicit Function


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Maternally inherited diabetes and deafness (MIDD) is an autosomal dominant inherited syndrome caused by the mitochondrial DNA (mtDNA) nucleotide mutation A3243G. It affects various organs including the eye with external ophthalmoparesis, ptosis, and bilateral macular pattern dystrophy.1, 2 The prevalence of retinal involvement in MIDD is high, with 50% to 85% of patients exhibiting some macular changes.1 Those changes, however, can vary between patients and within families dramatically based on the percentage of retinal mtDNA mutations, making it difficult to give predictions on an individual’s visual prognosis...

Relevância:

20.00% 20.00%

Publicador:

Resumo:

DOUBLE-STRANDED RNA BIN DIN G (DRB) proteins have been functionally characterized in viruses, prokaryotes and eukaryotes and are involved in all aspects of RNA biology. Arabidopsis thaliana (Arabidopsis) encodes five closely related DRB proteins, DRB1 to DRB5. DRB1 and DRB4 are required by DICER-LIKE (DCL) proteins DCL1 and DCL4 to accurately and efficiently process structurally distinct double-stranded RNA (dsRNA) precursor substrates in the microRNA (miRNA) and trans-acting small-interfering RNA (tasiRNA) biogenesis pathways respectively. We recently reported that DRB2 is also involved in the biogenesis of specific miRNA subsets. Furthermore, the severity of the developmental phenotype displayed by the drb235 triple mutant plant, compared with those expressed by either drb2, drb3 and drb5 single mutants, or double mutant combinations thereof, indicates that DRB3 and DRB5 function in the same non-canonical miRNA pathway as DRB2. Through the use of our artificial miRNA (amiRNA) plant expression vector, pBlueGreen 2,3 we demonstrate here that unlike DRB2, DRB3 and DRB5 are not involved in the dsRNA processing stages of the miRNA biogenesis pathway, but are required to mediate RNA silencing of target genes of DRB2-associated miRNA s. © 2012 Landes Bioscience.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The complete nucleotide sequence of genome segment S4 of rice ragged stunt oryzavirus (RRSV, Thai-isolate) was determined. The 3823 bp sequence contains two large open reading frames (ORFs). ORF1, spanning nucleotides 12 to 3776, is capable of encoding a protein of M(r) 141,380 (P4a). The P4a amino acid sequence predicted from the nucleotide sequence contains sequence motifs conserved in RNA-dependent RNA polymerases (RDRPs). When compared for evolutionary relationships with RDRPs of other reoviruses using the amino acid sequences around the conserved GDD motif, P4a was shown to be more related to Nilaparvata lugens reovirus and reovirus serotype 3 than to rice dwarf phytoreovirus, bovine rotavirus or bluetongue virus. The ORF2, spanning nucleotides 491 to 1468, is out of frame with ORF1 and is capable of encoding a protein of 36, 920 (P4b). Coupled in vitro transcription-translation from cloned ORF2 in wheat germ extract confirmed the existence of ORF2 but in vivo production and possible function of P4b is yet to be determined.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Human genetic association studies have shown gene variants in the α5 subunit of the neuronal nicotinic receptor (nAChR) influence both ethanol and nicotine dependence. The α5 subunit is an accessory subunit that facilitates α4* nAChRs assembly in vitro. However, it is unknown whether this occurs in the brain, as there are few research tools to adequately address this question. As the α4*-containing nAChRs are highly expressed in the ventral tegmental area (VTA) we assessed the molecular, functional and pharmacological roles of α5 in α4*-containing nAChRs in the VTA. We utilized transgenic mice α5+/+(α4YFP) and α5-/-(α4YFP) that allow the direct visualization and measurement of α4-YFP expression and the effect of the presence (α5+/+) and absence of α5 (-/-) subunit, as the antibodies for detecting the α4* subunits of the nAChR are not specific. We performed voltage clamp electrophysiological experiments to study baseline nicotinic currents in VTA dopaminergic neurons. We show that in the presence of the α5 subunit, the overall expression of α4 subunit is increased significantly by 60% in the VTA. Furthermore, the α5 subunit strengthens baseline nAChR currents, suggesting the increased expression of α4* nAChRs to be likely on the cell surface. While the presence of the α5 subunit blunts the desensitization of nAChRs following nicotine exposure, it does not alter the amount of ethanol potentiation of VTA dopaminergic neurons. Our data demonstrates a major regulatory role for the α5 subunit in both the maintenance of α4*-containing nAChRs expression and in modulating nicotinic currents in VTA dopaminergic neurons. Additionally, the α5α4* nAChR in VTA dopaminergic neurons regulates the effect of nicotine but not ethanol on currents. Together, the data suggest that the α5 subunit is critical for controlling the expression and functional role of a population of α4*-containing nAChRs in the VTA.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Stigmergy is a biological term used when discussing a sub-set of insect swarm-behaviour describing the apparent organisation seen during their activities. Stigmergy describes a communication mechanism based on environment-mediated signals which trigger responses among the insects. This phenomenon is demonstrated in the behavior of ants and their food gathering process when following pheromone trails, where the pheromones are a form of environment-mediated communication. What is interesting with this phenomenon is that highly organized societies are achieved without an apparent management structure. Stigmergy is also observed in human environments, both natural and engineered. It is implicit in the Web where sites provide a virtual environment supporting coordinative contributions. Researchers in varying disciplines appreciate the power of this phenomenon and have studied how to exploit it. As stigmergy becomes more widely researched we see its definition mutate as papers citing original work become referenced themselves. Each paper interprets these works in ways very specific to the research being conducted. Our own research aims to better understand what improves the collaborative function of a Web site when exploiting the phenomenon. However when researching stigmergy to develop our understanding we discover a lack of a standardized and abstract model for the phenomenon. Papers frequently cited the same generic descriptions before becoming intimately focused on formal specifications of an algorithm, or esoteric discussions regarding sub-facets of the topic. None provide a holistic and macro-level view to model and standardize the nomenclature. This paper provides a content analysis of influential literature documenting the numerous theoretical and experimental papers that have focused on stigmergy. We establish that stigmergy is a phenomenon that transcends the insect world and is more than just a metaphor when applied to the human world. We present from our own research our general theory and abstract model of semantics of stigma in stigmergy. We hope our model will clarify the nuances of the phenomenon into a useful road-map, and standardise vocabulary that we witness becoming confused and divergent. Furthermore, this paper documents the analysis on which we base our next paper: Special Theory of Stigmergy: A Design Pattern for Web 2.0 Collaboration.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This work considers the problem of building high-fidelity 3D representations of the environment from sensor data acquired by mobile robots. Multi-sensor data fusion allows for more complete and accurate representations, and for more reliable perception, especially when different sensing modalities are used. In this paper, we propose a thorough experimental analysis of the performance of 3D surface reconstruction from laser and mm-wave radar data using Gaussian Process Implicit Surfaces (GPIS), in a realistic field robotics scenario. We first analyse the performance of GPIS using raw laser data alone and raw radar data alone, respectively, with different choices of covariance matrices and different resolutions of the input data. We then evaluate and compare the performance of two different GPIS fusion approaches. The first, state-of-the-art approach directly fuses raw data from laser and radar. The alternative approach proposed in this paper first computes an initial estimate of the surface from each single source of data, and then fuses these two estimates. We show that this method outperforms the state of the art, especially in situations where the sensors react differently to the targets they perceive.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

An Artificial Neural Network (ANN) is a computational modeling tool which has found extensive acceptance in many disciplines for modeling complex real world problems. An ANN can model problems through learning by example, rather than by fully understanding the detailed characteristics and physics of the system. In the present study, the accuracy and predictive power of an ANN was evaluated in predicting kinetic viscosity of biodiesels over a wide range of temperatures typically encountered in diesel engine operation. In this model, temperature and chemical composition of biodiesel were used as input variables. In order to obtain the necessary data for model development, the chemical composition and temperature dependent fuel properties of ten different types of biodiesels were measured experimentally using laboratory standard testing equipments following internationally recognized testing procedures. The Neural Networks Toolbox of MatLab R2012a software was used to train, validate and simulate the ANN model on a personal computer. The network architecture was optimised following a trial and error method to obtain the best prediction of the kinematic viscosity. The predictive performance of the model was determined by calculating the absolute fraction of variance (R2), root mean squared (RMS) and maximum average error percentage (MAEP) between predicted and experimental results. This study found that ANN is highly accurate in predicting the viscosity of biodiesel and demonstrates the ability of the ANN model to find a meaningful relationship between biodiesel chemical composition and fuel properties at different temperature levels. Therefore the model developed in this study can be a useful tool in accurately predict biodiesel fuel properties instead of undertaking costly and time consuming experimental tests.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

G protein-coupled receptors (GPCRs) are critical for cardiovascular physiology. Cardiac cells express >100 nonchemosensory GPCRs, indicating that important physiological and potential therapeutic targets remain to be discovered. Moreover, there is a growing appreciation that members of the large, distinct taste and odorant GPCR families have specific functions in tissues beyond the oronasal cavity, including in the brain, gastrointestinal tract and respiratory system. To date, these chemosensory GPCRs have not been systematically studied in the heart. We performed RT-qPCR taste receptor screens in rodent and human heart tissues that revealed discrete subsets of type 2 taste receptors (TAS2/Tas2) as well as Tas1r1 and Tas1r3 (comprising the umami receptor) are expressed. These taste GPCRs are present in cultured cardiac myocytes and fibroblasts, and are enriched in myocytes, which we corroborated using in situ hybridization. Tas1r1 gene-targeted mice (Tas1r1Cre/Rosa26tdRFP) strikingly recapitulated these data. In vivo taste receptor expression levels were developmentally regulated in the postnatal period. Intriguingly, several Tas2rs were upregulated in cultured rat myocytes and in mouse heart in vivo following starvation. The discovery of taste GPCRs in the heart opens an exciting new field of cardiac research. We predict that these taste receptors may function as nutrient sensors in the heart.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

A pilot experiment was performed using the WOMBAT powder diffraction instrument at ANSTO in which the first neutron diffraction peak (Q0) was measured for D2O flowing in a 2 mm internal diameter aluminium tube. Measurements of Q0 were made at -9, 4.3, 6.9, 12, 18.2 and 21.5 °C. The D2O was circulated using a siphon with water in the lower reservoir returned to the upper reservoir using a small pump. This enabled stable flow to be maintained for several hours. For example, if the pump flow increased slightly, the upper reservoir level rose, increasing the siphon flow until it matched the return flow. A neutron wavelength of 2.4 Å was used and data integrated over 60 minutes for each temperature. A jet of nitrogen from a liquid N2 Dewar was directed over the aluminium tube to vary water temperature. After collection of the data, the d spacing of the aluminium peaks was used to calculate the temperature of the aluminium within the neutron beam and therefore was considered to be an accurate measure of water temperature within the beam. Sigmaplot version 12.3 was used to fit a Weibull five parameter peak fit to the first neutron diffraction peak. The values of Q0 obtained in this experiment showed an increase with temperature consistent with data in the literature [1] but were consistently higher than published values for bulk D20. For example at 21.5 °C we obtained a value of 2.008 Å-1 for Q0 compared to a literature value of 1.988 Å-1 for bulk D2O at 20 °C, a difference of 1%. Further experiments are required to see if this difference is real or artifactual.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

X-ray diffraction structure functions for water flowing in a 1.5 mm diameter siphon in the temperature range 4 – 63 °C were obtained using a 20 keV beam at the Australian Synchrotron. These functions were compared with structure functions obtained at the Advanced Light Source for a 0.5 mm thick sample of water in the temperature range 1 – 77 °C irradiated with an 11 keV beam. The two sets of structure functions are similar, but there are subtle differences in the shape and relative position of the two functions suggesting a possible differences between the structure of bulk and siphon water. In addition, the first structural peak (Q0) for water in a siphon, showed evidence of a step-wise increase in Q0 with increasing temperature rather than a smoothly varying increase. More experiments are required to investigate this apparent difference.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Review(s) of: Settling the Pop Score: Pop Texts and Identity Politics, Stan Hawkins, Aldershot, Hants. : Ashgate, 2002, ISBN 0 7546 0352 0; pb, 234pp, ill, music exx, bibl. , discog. , index. The scholarly study of popular music has its origins in sociology and cultural studies, disciplinary areas in which musical meaning is often attributed to aspects of economical and sociological function. Against this tradition, recent writers have offered what is now referred to as ‘popular musicology’: a method or approach that tends towards a specific engagement with ‘pop texts’ on aesthetic, and perhaps even ‘musical’ terms. Stan Hawkins uses the term popular musicology ‘at his own peril,’ clearly recognising the implicit scholarly danger in his approach, whereby ‘formalist questions of musical analysis’ are dealt with ‘alongside the more intertextual discursive theorisations of musical expression’ (p. xii). In other words, popular musicologists dare to tread that fine line between text and context. As editor of the journal Popular Musicology Online, Hawkins is a leading advocate of this practice, specifically in the application of music-analytical techniques to popular music. His methodology attests to the influence of other leading figures in the area, notably Richard Middleton, Allan F. Moore and Derek Scott (general editor of the Ashgate Popular and Folk Music Series in which this book is published).

Relevância:

20.00% 20.00%

Publicador:

Resumo:

RC4-Based Hash Function is a new proposed hash function based on RC4 stream cipher for ultra low power devices. In this paper, we analyse the security of the function against collision attack. It is shown that the attacker can find collision and multi-collision messages with complexity only 6 compress function operations and negligible memory with time complexity 2 13. In addition, we show the hashing algorithm can be distinguishable from a truly random sequence with probability close to one.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

At Crypto 2008, Shamir introduced a new algebraic attack called the cube attack, which allows us to solve black-box polynomials if we are able to tweak the inputs by varying an initialization vector. In a stream cipher setting where the filter function is known, we can extend it to the cube attack with annihilators: By applying the cube attack to Boolean functions for which we can find low-degree multiples (equivalently annihilators), the attack complexity can be improved. When the size of the filter function is smaller than the LFSR, we can improve the attack complexity further by considering a sliding window version of the cube attack with annihilators. Finally, we extend the cube attack to vectorial Boolean functions by finding implicit relations with low-degree polynomials.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The cryptographic hash function literature has numerous hash function definitions and hash function requirements, and many of them disagree. This survey talks about the various definitions, and takes steps towards cleaning up the literature by explaining how the field has evolved and accurately depicting the research aims people have today.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In the current market, extensive software development is taking place and the software industry is thriving. Major software giants have stated source code theft as a major threat to revenues. By inserting an identity-establishing watermark in the source code, a company can prove it's ownership over the source code. In this paper, we propose a watermarking scheme for C/C++ source codes by exploiting the language restrictions. If a function calls another function, the latter needs to be defined in the code before the former, unless one uses function pre-declarations. We embed the watermark in the code by imposing an ordering on the mutually independent functions by introducing bogus dependency. Removal of dependency by the attacker to erase the watermark requires extensive manual intervention thereby making the attack infeasible. The scheme is also secure against subtractive and additive attacks. Using our watermarking scheme, an n-bit watermark can be embedded in a program having n independent functions. The scheme is implemented on several sample codes and performance changes are analyzed.