247 resultados para Basis-set


Relevância:

20.00% 20.00%

Publicador:

Resumo:

The basic principles and equations are developed for elementary finance, based on the concept of compound interest. The five quantities of interest in such problems are present value, future value, amount of periodic payment, number of periods and the rate of interest per period. We consider three distinct means of computing each of these five quantities in Excel 2007: (i) use of algebraic equations, (ii) by recursive schedule and the Goal Seek facility, and (iii) use of Excel's intrinsic financial functions. The paper is intended to be used as the basis for a lesson plan and contains many examples and solved problems. Comment is made regarding the relative difficulty of each approach, and a prominent theme is the systematic use of more than one method to increase student understanding and build confidence in the answer obtained. Full instructions to build each type of model are given and a complete set of examples and solutions may be downloaded (Examples.xlsx and Solutions.xlsx).

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Homologous recombination is needed for meiotic chromosome segregation, genome maintenance, and tumor suppression. RAD51AP1 (RAD51 associated protein 1) has been shown to interact with and enhance the recombinase activity of RAD51. Accordingly, genetic ablation of RAD51AP1 leads to enhanced sensitivity to and also chromosome aberrations upon DNA damage, demonstrating a role for RAD51AP1 in mitotic homologous recombination. Here we show physical association of RAD51AP1 with the meiosis-specific recombinase DMC1 and a stimulatory effect of RAD51AP1 on the DMC1-mediated D-loop reaction. Mechanistic studies have revealed that RAD51AP1 enhances the ability of the DMC1 presynaptic filament to capture the duplex-DNA partner and to assemble the synaptic complex, in which the recombining DNA strands are homologously aligned. We also provide evidence that functional cooperation is dependent on complex formation between DMC1 and RAD51AP1 and that distinct epitopes in RAD51AP1 mediate interactions with RAD51 and DMC1. Finally, we show that RAD51AP1 is expressed in mouse testes, and that RAD51AP1 foci colocalize with a subset of DMC1 foci in spermatocytes. These results suggest that RAD51AP1 also serves an important role in meiotic homologous recombination.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

"This work forms part of a much larger collaborative album project in progress between Tim Bruniges, Julian Knowles and David Trumpmanis which explores the intersections between traditional rock instrumentation and analogue and digital media. All of the creative team are performers, composers and producers. The material for the album was thus generated by a series of in studio improvisations and performances with each collaborator assuming a range of different and alternating roles – guitars, electronics, drums, percussion, bass, keyboards production. Thematically the work explores the intersection of instrumental (post) rock, ambient music, and historical electro-acoustic tape composition traditions. Over the past 10 years, musical practice has become increasingly hybrid, with the traditional boundaries between genre becoming progressively eroded. At the same time, digital tools have replaced many of the major analogue technologies that dominated music production and performance in the 20th century. The disappearance of analogue media in mainstream musical practice has had a profound effect on the sonic characteristics of contemporary music and the gestural basis for its production. Despite the increasing power of digital technologies, a small but dedicated group of practitioners has continued to prize and use analogue technology for its unique sounds and the non-linearity of the media, aestheticising its inherent limitations and flaws. At the most radical end of this spectrum lie glitch and lo-fi musical forms, seen in part as reactions to the clinical nature of digital media and the perceived lack of character associated with its transparency. Such developments have also problematised the traditional relationships between media and genre, where specific techniques and their associated sounds have become genre markers. Tristate is an investigation into this emerging set of dialogues between analogue and digital media across composition, production and performance. It employs analogue tape loops in performance, where a tape machine ‘performer’ records and hand manipulates loops of an electric guitar performer on ‘destroyed’ tape stock (intentionally damaged tape), processing the output of this analogue system in the digital domain with contemporary sound processors. In doing so it investigates how the most extreme sonic signatures of analogue media – tape dropout and noise – can be employed alongside contemporary digital sound gestures in both compositional and performance contexts and how the extremes of the two media signatures can brought together both compositionally and performatively. In respect of genre, the work established strategies for merging compositional techniques from the early musique concrete tradition of the 1940s with late 60s popular music experimentalism and the laptop glitch electronica movement of the early 2000s. Lastly, the work explores how analogue recording studio technologies can be used as performance tools, thus illuminating and foregrounding the performative/gestural dimensions of traditional analogue studio tools in use."

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Numeric sets can be used to store and distribute important information such as currency exchange rates and stock forecasts. It is useful to watermark such data for proving ownership in case of illegal distribution by someone. This paper analyzes the numerical set watermarking model presented by Sion et. al in “On watermarking numeric sets”, identifies it’s weaknesses, and proposes a novel scheme that overcomes these problems. One of the weaknesses of Sion’s watermarking scheme is the requirement to have a normally-distributed set, which is not true for many numeric sets such as forecast figures. Experiments indicate that the scheme is also susceptible to subset addition and secondary watermarking attacks. The watermarking model we propose can be used for numeric sets with arbitrary distribution. Theoretical analysis and experimental results show that the scheme is strongly resilient against sorting, subset selection, subset addition, distortion, and secondary watermarking attacks.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Ever since Cox et. al published their paper, “A Secure, Robust Watermark for Multimedia” in 1996 [6], there has been tremendous progress in multimedia watermarking. The same pattern re-emerged with Agrawal and Kiernan publishing their work “Watermarking Relational Databases” in 2001 [1]. However, little attention has been given to primitive data collections with only a handful works of research known to the authors [11, 10]. This is primarily due to the absence of an attribute that differentiates marked items from unmarked item during insertion and detection process. This paper presents a distribution-independent, watermarking model that is secure against secondary-watermarking in addition to conventional attacks such as data addition, deletion and distortion. The low false positives and high capacity provide additional strength to the scheme. These claims are backed by experimental results provided in the paper.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Over the past decade, the mining industry has come to recognise the importance of water both to itself and to others. Water accounting is a formalisation of this importance that quantifies and communicates how water is used by individual sites and the industry as a whole. While there are a number of different accounting frameworks that could be used within the industry, the Minerals Council of Australia’s (MCA) Water Accounting Framework (WAF) is an industry-led approach that provides a consistent representation of mine site water interactions regardless of their operational, social or environmental context that allows for valid comparisons between sites and companies. The WAF contains definitions of offsite water sources and destinations and onsite water use, a methodology for applying the definitions and a set of metrics to measure site performance. The WAF is comprised of two models: the Input-Output Model, which represents the interactions between sites and their surrounding community and the Operational Model, which represents onsite water interactions. Members of the MCA have recently adopted the WAF’s Input-Output Model to report on their external water interactions in their Australian operations with some adopting it on a global basis. To support this adoption, there is a need for companies to better understand how to implement the WAF in their own operations. Developing a water account is non-trivial, particularly for sites unfamiliar with the WAF or for sites with the need to represent unusual features. This work describes how to build a water account for a given site using the Input-Output Model with an emphasis on how to represent challenging situations.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

While formal definitions and security proofs are well established in some fields like cryptography and steganography, they are not as evident in digital watermarking research. A systematic development of watermarking schemes is desirable, but at present their development is usually informal, ad hoc, and omits the complete realization of application scenarios. This practice not only hinders the choice and use of a suitable scheme for a watermarking application, but also leads to debate about the state-of-the-art for different watermarking applications. With a view to the systematic development of watermarking schemes, we present a formal generic model for digital image watermarking. Considering possible inputs, outputs, and component functions, the initial construction of a basic watermarking model is developed further to incorporate the use of keys. On the basis of our proposed model, fundamental watermarking properties are defined and their importance exemplified for different image applications. We also define a set of possible attacks using our model showing different winning scenarios depending on the adversary capabilities. It is envisaged that with a proper consideration of watermarking properties and adversary actions in different image applications, use of the proposed model would allow a unified treatment of all practically meaningful variants of watermarking schemes.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Ubiquitin (Ub)-conjugating enzymes (E2s) and ubiquitin ligases (E3s) catalyze the attachment of Ub to lysine residues in substrates and Ub during monoubiquitination and polyubiquitination. Lysine selection is important for the generation of diverse substrate-Ub structures, which provides versatility to this pathway in the targeting of proteins to different fates. The mechanisms of lysine selection remain poorly understood, with previous studies suggesting that the ubiquitination site(s) is selected by the E2/E3-mediated positioning of a lysine(s) toward the E2/E3 active site. By studying the polyubiquitination of Sic1 by the E2 protein Cdc34 and the RING E3 Skp1/Cul1/F-box (SCF) protein, we now demonstrate that in addition to E2/E3-mediated positioning, proximal amino acids surrounding the lysine residues in Sic1 and Ub are critical for ubiquitination. This mechanism is linked to key residues composing the catalytic core of Cdc34 and independent of SCF. Changes to these core residues altered the lysine preference of Cdc34 and specified whether this enzyme monoubiquitinated or polyubiquitinated Sic1. These new findings indicate that compatibility between amino acids surrounding acceptor lysine residues and key amino acids in the catalytic core of ubiquitin-conjugating enzymes is an important mechanism for lysine selection during ubiquitination.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Malaria rapid diagnostic tests (RDTs) play a critical role in malaria case management, surveillance and case investigations. Test performance is largely determined by design and quality characteristics, such as detection sensitivity, specificity, and thermal stability. However, parasite characteristics such as variable or absent expression of antigens targeted by RDTs can also affect RDT performance. Plasmodium falciparum parasites lacking the PfHRP2 protein, the most common target antigen for detection of P. falciparum, have been reported in some regions. Therefore, accurately mapping the presence and prevalence of P. falciparum parasites lacking pfhrp2 would be an important step so that RDTs targeting alternative antigens, or microscopy, can be preferentially selected for use in such regions. Herein the available evidence and molecular basis for identifying malaria parasites lacking PfHRP2 is reviewed, and a set of recommended procedures to apply for future investigations for parasites lacking PfHRP2, is proposed.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The foliage of a plant performs vital functions. As such, leaf models are required to be developed for modelling the plant architecture from a set of scattered data captured using a scanning device. The leaf model can be used for purely visual purposes or as part of a further model, such as a fluid movement model or biological process. For these reasons, an accurate mathematical representation of the surface and boundary is required. This paper compares three approaches for fitting a continuously differentiable surface through a set of scanned data points from a leaf surface, with a technique already used for reconstructing leaf surfaces. The techniques which will be considered are discrete smoothing D2-splines [R. Arcangeli, M. C. Lopez de Silanes, and J. J. Torrens, Multidimensional Minimising Splines, Springer, 2004.], the thin plate spline finite element smoother [S. Roberts, M. Hegland, and I. Altas, Approximation of a Thin Plate Spline Smoother using Continuous Piecewise Polynomial Functions, SIAM, 1 (2003), pp. 208--234] and the radial basis function Clough-Tocher method [M. Oqielat, I. Turner, and J. Belward, A hybrid Clough-Tocher method for surface fitting with application to leaf data., Appl. Math. Modelling, 33 (2009), pp. 2582-2595]. Numerical results show that discrete smoothing D2-splines produce reconstructed leaf surfaces which better represent the original physical leaf.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

With the increasing importance of Application Domain Specific Processor (ADSP) design, a significant challenge is to identify special-purpose operations for implementation as a customized instruction. While many methodologies have been proposed for this purpose, they all work for a single algorithm chosen from the target application domain. Such algorithm-specific approaches are not suitable for designing instruction sets applicable to a whole family of related algorithms. For an entire range of related algorithms, this paper develops a methodology for identifying compound operations, as a basis for designing “domain-specific” Instruction Set Architectures (ISAs) that can efficiently run most of the algorithms in a given domain. Our methodology combines three different static analysis techniques to identify instruction sequences common to several related algorithms: identification of (non-branching) instruction sequences that occur commonly across the algorithms; identification of instruction sequences nested within iterative constructs that are thus executed frequently; and identification of commonly-occurring instruction sequences that span basic blocks. Choosing different combinations of these results enables us to design domain-specific special operations with different desired characteristics, such as performance or suitability as a library function. To demonstrate our approach, case studies are carried out for a family of thirteen string matching algorithms. Finally, the validity of our static analysis results is confirmed through independent dynamic analysis experiments and performance improvement measurements.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This chapter describes decentralized data fusion algorithms for a team of multiple autonomous platforms. Decentralized data fusion (DDF) provides a useful basis with which to build upon for cooperative information gathering tasks for robotic teams operating in outdoor environments. Through the DDF algorithms, each platform can maintain a consistent global solution from which decisions may then be made. Comparisons will be made between the implementation of DDF using two probabilistic representations. The first, Gaussian estimates and the second Gaussian mixtures are compared using a common data set. The overall system design is detailed, providing insight into the overall complexity of implementing a robust DDF system for use in information gathering tasks in outdoor UAV applications.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Abstract: Australia’s ecosystems are the basis of our current and future prosperity, and our national well-being.A strong and sustainable Australian ecosystem science enterprise is vital for understanding and securing these ecosystems in the face of current and future challenges. This Plan defines the vision and key directions for a national ecosystem science capability that will enable Australia to understand and effectively manage its ecosystems for decades to come.The Plan’s underlying theme is that excellent science supports a range of activities, including public engagement, that enable us to understand and maintain healthy ecosystems.Those healthy ecosystems are the cornerstone of our social and economic well-being.The vision guiding the development of this Plan is that in 20 years’ time the status of Australian ecosystems and how they change will be widely reported and understood, and the prosperity and well-being they provide will be secure. To enable this, Australia’s national ecosystem science capability will be coordinated, collaborative and connected.The Plan is based on an extensive set of collaboratively generated proposals from national town hall meetings that also formthe basis for its implementation. Some directions within the Plan are for the Australian ecosystem science community itself to implement, others will involve the users of ecosystem science and the groups that fund ecosystem science.We identify six equal priority areas for action to achieve our vision: (i) delivering maximum impact for Australia: enhancing relationships between scientists and end-users; (ii) supporting long-termresearch; (iii) enabling ecosystem surveillance; (iv) making the most of data resources; (v) inspiring a generation: empowering the public with knowledge and opportunities; (vi) facilitating coordination, collaboration and leadership. This shared vision will enable us to consolidate our current successes, overcome remaining barriers and establish the foundations to ensure Australian ecosystem science delivers for the future needs of Australia..

Relevância:

20.00% 20.00%

Publicador:

Resumo:

A framework supporting the systematic development of safety cases for Unmanned Aircraft System (UAS) operations in a broad range of civil and commercial applications is presented. The case study application is the use of UAS for disaster response. In those States where regulations do not preclude UAS operations altogether, approvals for UAS operations can be granted on a case-by-case basis contingent on the provision of a safety case acceptable to the relevant National Airworthiness Authority (NAA). A safety case for UAS operations must show how the risks associated with the hazards have been managed to an acceptable level. The foundational components necessary for structuring and assessing these safety cases have not yet been proposed. Barrier-bow-tie models are used in this paper to structure the safety case for the two primary hazards of 1) a ground impact, and 2) a Mid-Air Collision (MAC). The models establish the set of Risk Control Variables (RCVs) available to reduce the risk. For the ground-impact risk model, seven RCVs are identified which in combination govern the probability of an accident. Similarly, ten RCVs are identified within the MAC model. The effectiveness of the RCVs and how they can implemented in terms of processes, policies, devices, practices, or other actions for each of the case-study applications are discussed. The framework presented can provide for the more systematic and consistent regulation of UAS through a "safety target" approach.