387 resultados para Directional distance function
Resumo:
We report that tumor cells devoid of their mitochondrial genome (mtDNA) show delayed tumor growth and that tumor formation is associated with acquisition of mtDNA from host cells. This leads to partial recovery of mitochondrial function in cells derived from primary tumors grown from cells without mtDNA and a shorter lag in tumor growth. Cell lines from circulating tumor cells showed further recovery of mitochondrial respiration and an intermediate lag to tumor growth, while cells from lung metastases exhibited full restoration of respiratory function and no lag in tumor growth. Stepwise assembly of mitochondrial respiratory supercomplexes was correlated with acquisition of respiratory function. Our findings indicate horizontal transfer of mtDNA from host cells in the tumor microenvironment to tumor cells with compromised respiratory function to re-establish respiration and tumor-initiating efficacy. These results suggest a novel pathophysiological process for overcoming mtDNA damage and support the notion of high plasticity of malignant cells.
Resumo:
In July 1926, the science behind biological control transitioned from an experimental method to a trusted policy tool in invasive species management. In local storytelling, historical writing and scientific analysis, the ‘lucky’ discovery of the South American Cactoblastis cactorum moth was a watershed moment for scientists concerned with prickly pear, Opuntia and Nopalea spp. Within 10 years, Queensland declared itself pest free. Overnight success is the climax in this tale's narrative arc. Articulating this introduction as a ‘lucky break’ worked to stabilize the narrative of human control in the agricultural environments of post-colonial Queensland, and, in doing so, consolidated biological control as critical management technique. I argue that ‘luck’ elides the assemblage of elements and actors necessary to enable this change, allowing settlers to distance themselves from the responsibility for disruptions associated with nineteenth-century plant transfers. To challenge the rhetorical function of luck, three episodes of contingency are discussed: (1) transnational mobility of things and knowledge, (2) the unpredictable adaptation of insect diet, and; (3) human vectors in industrialized insect–plant complexes. There are important distinguishing differences between luck and contingency, which I frame as a critical analytical tool for understanding the political role of non-humans, in the storied worlds of science in prickly pear land.
Resumo:
Many species of bat use ultrasonic frequency modulated (FM) pulses to measure the distance to objects by timing the emission and reception of each pulse. Echolocation is mainly used in flight. Since the flight speed of bats often exceeds 1% of the speed of sound,Doppler effects will lead to compression of the time between emission and reception as well as an elevation of the echo frequencies, resulting in a distortion of the perceived range. This paper describes the consequences of these Doppler effects on the ranging performance of bats using different pulse designs. The consequences of Doppler effects on ranging performance described in this paper assume bats to have a very accurate ranging resolution, which is feasible with a filterbank receiver. By modeling two receiver types, it was first established that the effects of Doppler compression are virtually independent of the receiver type. Then, used a cross-correlation model was used to investigate the effect of flight speed on Doppler tolerance and range–Doppler coupling separately. This paper further shows how pulse duration, bandwidth, function type, and harmonics influence Doppler tolerance and range–Doppler coupling. The influence of each signal parameter is illustrated using calls of several bat species. It is argued that range–Doppler coupling is a significant source of error in bat echolocation, and various strategies bats could employ to deal with this problem, including the use of range rate information are discussed.
Resumo:
We recorded echolocation calls from 14 sympatric species of bat in Britain. Once digitised, one temporal and four spectral features were measured from each call. The frequency-time course of each call was approximated by fitting eight mathematical functions, and the goodness of fit, represented by the mean-squared error, was calculated. Measurements were taken using an automated process that extracted a single call from background noise and measured all variables without intervention. Two species of Rhinolophus were easily identified from call duration and spectral measurements. For the remaining 12 species, discriminant function analysis and multilayer back-propagation perceptrons were used to classify calls to species level. Analyses were carried out with and without the inclusion of curve-fitting data to evaluate its usefulness in distinguishing among species. Discriminant function analysis achieved an overall correct classification rate of 79% with curve-fitting data included, while an artificial neural network achieved 87%. The removal of curve-fitting data improved the performance of the discriminant function analysis by 2 %, while the performance of a perceptron decreased by 2 %. However, an increase in correct identification rates when curve-fitting information was included was not found for all species. The use of a hierarchical classification system, whereby calls were first classified to genus level and then to species level, had little effect on correct classification rates by discriminant function analysis but did improve rates achieved by perceptrons. This is the first published study to use artificial neural networks to classify the echolocation calls of bats to species level. Our findings are discussed in terms of recent advances in recording and analysis technologies, and are related to factors causing convergence and divergence of echolocation call design in bats.
Resumo:
Distance education has gone through rapid expansion over the years. Many Australian universities are pushing the use of distance education in delivering construction education programs. However, the critical success factors (CSFs) in distance learning construction programs (DLCPs) are not fully understood. More importantly, students’ demographic features may affect the selection of distance education technologies. Situation-matching strategies should therefore be taken by universities or institutions with different student cohorts. A survey is adopted in Central Queensland University (CQU) to identify and rank the critical success factors in a DLCP in Australia where there is a significant number of earner-learners and students with low socioeconomic background. The findings suggest that the most important CSFs include access to computers and internet, reliability of web-based learning sites, high relevance and clarity of learning materials and assessment items, the availability of web-based learning sites that can be easily manipulated, and the capability of the instructors to provide well-structured courses. The findings also suggest that students with low socioeconomic background have more rigorous requirements on interface design, instructors’ support, and the integration of practical components into courses. The results provide good guidance of the design and delivery of DLCPs and will be useful for universities and institutions that are seeking to implement the distance mode in construction education.
The suffix-free-prefix-free hash function construction and its indifferentiability security analysis
Resumo:
In this paper, we observe that in the seminal work on indifferentiability analysis of iterated hash functions by Coron et al. and in subsequent works, the initial value (IV) of hash functions is fixed. In addition, these indifferentiability results do not depend on the Merkle–Damgård (MD) strengthening in the padding functionality of the hash functions. We propose a generic n -bit-iterated hash function framework based on an n -bit compression function called suffix-free-prefix-free (SFPF) that works for arbitrary IV s and does not possess MD strengthening. We formally prove that SFPF is indifferentiable from a random oracle (RO) when the compression function is viewed as a fixed input-length random oracle (FIL-RO). We show that some hash function constructions proposed in the literature fit in the SFPF framework while others that do not fit in this framework are not indifferentiable from a RO. We also show that the SFPF hash function framework with the provision of MD strengthening generalizes any n -bit-iterated hash function based on an n -bit compression function and with an n -bit chaining value that is proven indifferentiable from a RO.
Resumo:
The security of permutation-based hash functions in the ideal permutation model has been studied when the input-length of compression function is larger than the input-length of the permutation function. In this paper, we consider permutation based compression functions that have input lengths shorter than that of the permutation. Under this assumption, we propose a permutation based compression function and prove its security with respect to collision and (second) preimage attacks in the ideal permutation model. The proposed compression function can be seen as a generalization of the compression function of MD6 hash function.
Resumo:
In this paper, we analyze the SHAvite-3-512 hash function, as proposed and tweaked for round 2 of the SHA-3 competition. We present cryptanalytic results on 10 out of 14 rounds of the hash function SHAvite-3-512, and on the full 14 round compression function of SHAvite-3-512. We show a second preimage attack on the hash function reduced to 10 rounds with a complexity of 2497 compression function evaluations and 216 memory. For the full 14-round compression function, we give a chosen counter, chosen salt preimage attack with 2384 compression function evaluations and 2128 memory (or complexity 2448 without memory), and a collision attack with 2192 compression function evaluations and 2128 memory.
Resumo:
Many RFID protocols use cryptographic hash functions for their security. The resource constrained nature of RFID systems forces the use of light weight cryptographic algorithms. Tav-128 is one such 128-bit light weight hash function proposed by Peris-Lopez et al. for a low-cost RFID tag authentication protocol. Apart from some statistical tests for randomness by the designers themselves, Tav-128 has not undergone any other thorough security analysis. Based on these tests, the designers claimed that Tav-128 does not posses any trivial weaknesses. In this article, we carry out the first third party security analysis of Tav-128 and show that this hash function is neither collision resistant nor second preimage resistant. Firstly, we show a practical collision attack on Tav-128 having a complexity of 237 calls to the compression function and produce message pairs of arbitrary length which produce the same hash value under this hash function. We then show a second preimage attack on Tav-128 which succeeds with a complexity of 262 calls to the compression function. Finally, we study the constituent functions of Tav-128 and show that the concatenation of nonlinear functions A and B produces a 64-bit permutation from 32-bit messages. This could be a useful light weight primitive for future RFID protocols.
Resumo:
The effects of reductions in cell wall lignin content, manifested by RNA interference suppression of coumaroyl 3'-hydroxylase, on plant growth, water transport, gas exchange, and photosynthesis were evaluated in hybrid poplar trees (Populus alba 3 grandidentata). The growth characteristics of the reduced lignin trees were significantly impaired, resulting in smaller stems and reduced root biomass when compared to wild-type trees, as well as altered leaf morphology and architecture. The severe inhibition of cell wall lignification produced trees with a collapsed xylem phenotype, resulting in compromised vascular integrity, and displayed reduced hydraulic conductivity and a greater susceptibility to wall failure and cavitation. In the reduced lignin trees, photosynthetic carbon assimilation and stomatal conductance were also greatly reduced, however, shoot xylem pressure potential and carbon isotope discrimination were higher and water-use efficiency was lower, inconsistent with water stress. Reductions in assimilation rate could not be ascribed to increased stomatal limitation. Starch and soluble sugars analysis of leaves revealed that photosynthate was accumulating to high levels, suggesting that the trees with substantially reduced cell wall lignin were not carbon limited and that reductions in sink strength were, instead, limiting photosynthesis.
Resumo:
We consider online prediction problems where the loss between the prediction and the outcome is measured by the squared Euclidean distance and its generalization, the squared Mahalanobis distance. We derive the minimax solutions for the case where the prediction and action spaces are the simplex (this setup is sometimes called the Brier game) and the \ell_2 ball (this setup is related to Gaussian density estimation). We show that in both cases the value of each sub-game is a quadratic function of a simple statistic of the state, with coefficients that can be efficiently computed using an explicit recurrence relation. The resulting deterministic minimax strategy and randomized maximin strategy are linear functions of the statistic.
Resumo:
Cardiovascular disease is the main cause of morbidity and mortality in patients with kidney disease. The effectiveness of exercise for cardiovascular disease that is accelerated by the presence of chronic kidney disease remains unknown. The present study utilized apolipoprotein E knockout mice with 5/6 nephrectomy as a model of combined kidney disease and cardiovascular disease to investigate the effect of exercise on aortic plaque formation, vascular function and systemic inflammation. Animals were randomly assigned to nephrectomy or control and then to either voluntary wheel running exercise or sedentary. Following 12-weeks, aortic plaque area was significantly (p<0.05, d=1.2) lower in exercising nephrectomised mice compared to sedentary nephrectomised mice. There was a strong, negative correlation between average distance run each week and plaque area in nephrectomised and control mice (r=–0.76, p=0.048 and r=–0.73, p=0.062; respectively). In vitro aortic contraction and endothelial-independent and endothelial-dependent relaxation were not influenced by exercise (p>0.05). Nephrectomy increased IL-6 and TNF-α concentrations compared with control mice (p<0.001 and p<0.05, respectively), while levels of IL-10, MCP-1 and MIP-1α were not significantly influenced by nephrectomy or voluntary exercise (p>0.05). Exercise was an effective non-pharmacologic approach to slow cardiovascular disease in the presence of kidney disease in the apolipoprotein E knockout mouse.
Resumo:
People humanize their ingroup to address existential concerns about their mortality, but the reasons why they do so remain ambiguous. One explanation is that people humanize their ingroup to bolster their social identity in the face of their mortality. Alternatively, people might be motivated to see their ingroup as more uniquely human (UH) to distance themselves from their corporeal “animal” nature. These explanations were tested in Australia, where social identity is tied less to UH and more to human nature (HN) which does not distinguish humans from animals. Australians attributed more HN traits to the ingroup when mortality was salient, while the attribution of UH traits remained unchanged. This indicates that the mortality-buffering function of ingroup humanization lies in reinforcing the humanness of our social identity, rather than just distancing ourselves from our animal nature. Implications for (de)humanization in intergroup relations are discussed.
Resumo:
It’s commonly assumed that psychiatric violence is motivated by delusions, but here the concept of a reversed impetus is explored, to understand whether delusions are formed as ad-hoc or post-hoc rationalizations of behaviour or in advance of the actus reus. The reflexive violence model proposes that perceptual stimuli has motivational power and this may trigger unwanted actions and hallucinations. The model is based on the theory of ecological perception, where opportunities enabled by an object are cues to act. As an apple triggers a desire to eat, a gun triggers a desire to shoot. These affordances (as they are called) are part of the perceptual apparatus, they allow the direct recognition of objects – and in emergencies they enable the fastest possible reactions. Even under normal circumstances, the presence of a weapon will trigger inhibited violent impulses. The presence of a victim will also, but under normal circumstances, these affordances don’t become violent because negative action impulses are totally inhibited, whereas in psychotic illness, negative action impulses are treated as emergencies and bypass frontal inhibitory circuits. What would have been object recognition becomes a blind automatic action. A range of mental illnesses can cause inhibition to be bypassed. At its most innocuous, this causes both simple hallucinations (where the motivational power of an object is misattributed). But ecological perception may have the power to trigger serious violence also –a kind that’s devoid of motives or planning and is often shrouded in amnesia or post-rational delusions.
Resumo:
Traditionally the notion of drawing in-situ has suggested the physical presence of the artist in the environment under scrutiny. The assumption here of enhanced connectivity, however, is hasty in light of the idea that situation implies a relative spatial value determined by the interplay of subject and location, where the possibility of not being “in-situ” is problematic. The fact that traditional drawing in-situ, such as the rendering of landscape, requires a framing of the world “out there” suggests a distance between the perceived object of representation and the drawing surface. Rather than suggesting that some drawing is situated and other sorts of drawing are not, however, I argue that situation or site is variously extended and intensified depending on the nature of mediation between surface and environment. The suggestion here is that site is not so much a precondition as a performative function, developed in the act of drawing and always implicating the drawing surface. In my discussion I focus on specific works by Toba Khedoori and Cameron Robbins. As well, in using my own recent drawing practice as a case study, I argue that the geography of site is delimited neither by horizon nor the boundaries of the paper. Rather, I propose that site and drawing surface coincide in variously intensive and extensive ways.