86 resultados para GIBBS FORMALISM
Resumo:
We present a formalism for the analysis of sensitivity of nuclear magnetic resonance pulse sequences to variations of pulse sequence parameters, such as radiofrequency pulses, gradient pulses or evolution delays. The formalism enables the calculation of compact, analytic expressions for the derivatives of the density matrix and the observed signal with respect to the parameters varied. The analysis is based on two constructs computed in the course of modified density-matrix simulations: the error interrogation operators and error commutators. The approach presented is consequently named the Error Commutator Formalism (ECF). It is used to evaluate the sensitivity of the density matrix to parameter variation based on the simulations carried out for the ideal parameters, obviating the need for finite-difference calculations of signal errors. The ECF analysis therefore carries a computational cost comparable to a single density-matrix or product-operator simulation. Its application is illustrated using a number of examples from basic NMR spectroscopy. We show that the strength of the ECF is its ability to provide analytic insights into the propagation of errors through pulse sequences and the behaviour of signal errors under phase cycling. Furthermore, the approach is algorithmic and easily amenable to implementation in the form of a programming code. It is envisaged that it could be incorporated into standard NMR product-operator simulation packages.
Resumo:
This article combines information from fathers' rights Web sites with demographic, historical, and other information to provide an empirically based analysis of fathers' rights advocacy in the United States. Content analysis discerns three factors that are central to the groups' rhetoric: representing domestic violence allegations as false, promoting presumptive joint custody and decreasing child support, and portraying women as perpetrators of domestic abuse. Fathers' rights organizations and themes are examined in relation to state-level demographics and custody policy. The implications of fathers' rights activism for battered women and their children are explored.
Resumo:
Proving security of cryptographic schemes, which normally are short algorithms, has been known to be time-consuming and easy to get wrong. Using computers to analyse their security can help to solve the problem. This thesis focuses on methods of using computers to verify security of such schemes in cryptographic models. The contributions of this thesis to automated security proofs of cryptographic schemes can be divided into two groups: indirect and direct techniques. Regarding indirect ones, we propose a technique to verify the security of public-key-based key exchange protocols. Security of such protocols has been able to be proved automatically using an existing tool, but in a noncryptographic model. We show that under some conditions, security in that non-cryptographic model implies security in a common cryptographic one, the Bellare-Rogaway model [11]. The implication enables one to use that existing tool, which was designed to work with a different type of model, in order to achieve security proofs of public-key-based key exchange protocols in a cryptographic model. For direct techniques, we have two contributions. The first is a tool to verify Diffie-Hellmanbased key exchange protocols. In that work, we design a simple programming language for specifying Diffie-Hellman-based key exchange algorithms. The language has a semantics based on a cryptographic model, the Bellare-Rogaway model [11]. From the semantics, we build a Hoare-style logic which allows us to reason about the security of a key exchange algorithm, specified as a pair of initiator and responder programs. The other contribution to the direct technique line is on automated proofs for computational indistinguishability. Unlike the two other contributions, this one does not treat a fixed class of protocols. We construct a generic formalism which allows one to model the security problem of a variety of classes of cryptographic schemes as the indistinguishability between two pieces of information. We also design and implement an algorithm for solving indistinguishability problems. Compared to the two other works, this one covers significantly more types of schemes, but consequently, it can verify only weaker forms of security.
Resumo:
This study aimed to assess the feasibility of a home-based exercise program and examine the effects on the healing rates of venous leg ulcers. A 12 –week randomised controlled trial was conducted investigating the effects of an exercise intervention compared to a usual care group. Participants in both groups (n = 13) had active venous ulceration and were treated in a metropolitan hospital outpatients clinic in Australia. Data were collected on recruitment from medical records, clinical assessment and questionnaires. Follow-up data on progress in healing and treatments were collected fortnightly for 12 weeks. Calf muscle pump function data were collected at baseline and 12 weeks from recruitment. Range of ankle motion data were collected at baseline, 6 and 12 weeks from recruitment. This pilot study indicated that the intervention was feasible. Clinical significance was observed in the intervention group with a 32% greater decrease in ulcer size (p=0.34) than the control group, and a 10% (p=0.74) improvement in the number of participants healed in the intervention group compared to the control group. Significant differences between groups over time were observed in calf muscle pump function parameters; (ejection fraction [p = 0.05]; residual volume fraction [p = 0.04]) and range of ankle motion (p = 0.01). This pilot study is one of the first studies to examine and measure clinical healing rates for participants involved in a home-based progressive resistance exercise program. Further research is warranted with a larger multi-site study.
Resumo:
In this paper, general order conditions and a global convergence proof are given for stochastic Runge Kutta methods applied to stochastic ordinary differential equations ( SODEs) of Stratonovich type. This work generalizes the ideas of B-series as applied to deterministic ordinary differential equations (ODEs) to the stochastic case and allows a completely general formalism for constructing high order stochastic methods, either explicit or implicit. Some numerical results will be given to illustrate this theory.
Resumo:
Magnetic zeolite NaA with different Fe3O4 loadings was prepared by hydrothermal synthesis based on metakaolin and Fe3O4. The effect of added Fe3O4 on the removal of ammonium by zeolite NaA was investigated by varying the Fe3O4 loading, pH, adsorption temperature, initial concentration, adsorption time. Langmuir, Freundlich, and pseudo-second-order modeling were used to describe the nature and mechanism of ammonium ion exchange using both zeolite and magnetic zeolite. Thermodynamic parameters such as change in Gibbs free energy, enthalpy and entropy were calculated. The results show that all the selected factors affect the ammonium ion exchange by zeolite and magnetic zeolite, however, the added Fe3O4 apparently does not affect the ion exchange performance of zeolite to the ammonium ion. Freundlich model provides a better description of the adsorption process than Langmuir model. Moreover, kinetic analysis indicates the exchange of ammonium on the two materials follows a pseudosecond-order model. Thermodynamic analysis makes it clear that the adsorption process of ammonium is spontaneous and exothermic. Regardless of kinetic or thermodynamic analysis, all the results suggest that no considerable effect on the adsorption of the ammonium ion by zeolite is found after the addition of Fe3O4. According to the results, magnetic zeolite NaA can be used for the removal of ammonium due to the good adsorption performance and easy separation method from aqueous solution.
Resumo:
Biological systems exhibit a wide range of contextual effects, and this often makes it difficult to construct valid mathematical models of their behaviour. In particular, mathematical paradigms built upon the successes of Newtonian physics make assumptions about the nature of biological systems that are unlikely to hold true. After discussing two of the key assumptions underlying the Newtonian paradigm, we discuss two key aspects of the formalism that extended it, Quantum Theory (QT). We draw attention to the similarities between biological and quantum systems, motivating the development of a similar formalism that can be applied to the modelling of biological processes.
Resumo:
We present a tool for automatic analysis of computational indistinguishability between two strings of information. This is designed as a generic tool for proving cryptographic security based on a formalism that provides computational soundness preservation. The tool has been implemented and tested successfully with several cryptographic schemes.
Resumo:
The addition of surface tension to the classical Stefan problem for melting a sphere causes the solution to blow up at a finite time before complete melting takes place. This singular behaviour is characterised by the speed of the solid-melt interface and the flux of heat at the interface both becoming unbounded in the blow-up limit. In this paper, we use numerical simulation for a particular energy-conserving one-phase version of the problem to show that kinetic undercooling regularises this blow-up, so that the model with both surface tension and kinetic undercooling has solutions that are regular right up to complete melting. By examining the regime in which the dimensionless kinetic undercooling parameter is small, our results demonstrate how physically realistic solutions to this Stefan problem are consistent with observations of abrupt melting of nanoscaled particles.
Resumo:
The practical need to partition the world of viruses into distinguishable, universally agreed upon entities is the ultimate justification for developing a virus classification system. The Author of this Book is Andrew MQ King, Elliot Lefkowitz, Eric B. Carstens, Michael J. Adams Since 1971, the International Committee on Taxonomy of Viruses (ICTV) operating on behalf of the world community of virologists has taken on the task of developing a single, universal taxonomic scheme for all viruses infecting animals (vertebrate, invertebrates, and protozoa), plants (higher plants and algae), fungi, bacteria, and archaea.
Resumo:
Carrot mottle umbravirus (CMoV) has always been found co-infecting plants with carrot red leaf luteovirus (CRLV) and in carrot (Daucus carota) these co-infections are associated with carrot motley dwarf disease (CMD). CMD occurs wherever carrots are grown. Hence, CMoV was believed to have a corresponding global distribution. However, little or no hybridisation was detected between cDNA generated from the sequenced Australian isolate of CMoV (CMoV-A) and RNA from the much studied Scottish isolate of CMoV (CMoV-S). A weak hybridisation signal was obtained using cDNA to a conserved part of the RNA-dependent RNA polymerase gene of CMoV-A, but when cDNAs to other parts of the CMoV-A genome were used as probes there was no detectable hybridisation with CMoV-S RNA. This lack of hybridisation suggests that the two virus isolates have relatively divergent genomes and that they should be regarded as distinct virus species. Both viruses are transmitted by Cavariella aegopodii, but only with the help of CRLV, and they yield almost identical double-stranded RNA profiles. For these reasons, we propose that the CMoV isolate from Australia be renamed carrot mottle mimic umbravirus (CMoMV). cDNA to CMoMV RNA hybridised with RNA from an isolate from New Zealand, whereas cDNA to CMoV-S RNA hybridised with RNA from isolates from England and Morocco but not to RNA from the isolate from New Zealand. Although preliminary, these data suggest that CMoV and CMoMV may have different global distributions.
Resumo:
The effectiveness of different promoters for use in Indica rice transformation was compared. Plasmids encoding the Escherichia coli uidA (gus) gene under the control of CaMV 35S, Emu, Act1 or Ubi1 promoters were delivered into cell suspension cultures by particle bombardment. Transient gene expression, 48 h after delivery, was greatest from plasmids utilising the constitutive promoters, Act1 and Ubi1. Gene expression in stably transformed tissue was examined by bombarding embryogenic Indica rice calli with a pUbil-gus plasmid and a plasmid containing either the selectable marker gene, hph, which confers hygromycin resistance, or bar, which confers resistance to the herbicide phosphinothricin (BASTA) each under the control of the CaMV 35S, Emu, Act1 or the Ubi1 promoters. The bombarded calli were placed on the appropriate selection media and stained for GUS activity at 1 day, 3 weeks and 5 weeks after shooting. Callus bombarded with the pUbi1-hph or the pEmu-hph constructs gave a dramatic increase in the size of the GUS staining areas with time. No such increase in the size of GUS staining areas was observed in calli co-bombarded with pUbi1-gus and any of the bar containing constructs. Co-bombardment of calli with either the pEmu-hph or pUbi1-hph construct and a virus minor coat protein (cp) gene construct resulted in many fertile transgenic Indica rice plants, containing one to eight copies of both the hph and cp genes. These genes were stably inherited by the T 1 generation.
Resumo:
The complete nucleotide sequence of the genome segment 5 (S5) of a Thai isolate of rice ragged stunt virus (RRSV) was determined. The 2682 nucleotide sequence contains a single long open reading frame capable of encoding a polypeptide with a molecular mass of ~91 kDa. Polypeptides encoded by various truncated cDNAs of S5 were expressed using the pGEX fusion protein vector and the highest level of fusion protein was obtained from a construct encoding a hydrophilic region of S5 protein. Antibodies raised against this fusion protein recognized a minor polypeptide, with a molecular mass of ~ 91 kDa, that was present in purified preparations of RRSV particles, infected insect vectors and infected rice plants. This indicates that RRSV S5 encodes a minor structural protein. Comparing the RRSV S5 sequence with sequences of other reo-viruses did not reveal any significant sequence similarities.