84 resultados para Sandoval, Gonzalo de, fl. 1518-1528.
Resumo:
Pumping systems are widely used in many applications, including municipal water/wastewater services, domestic, commercial and agricultural services, and industrial processes. They are a very significant energy user and consume nearly 20% of the world’s electrical energy demand. Therefore, improving the energy efficiency of pumping systems can provide great benefits in terms of energy, environment, and cost reduction. In this entry, an overview of pump classification with pros and cons of each type of pump is presented. The procedures used to design pumping systems are also outlined. This is then followed by a discussion on the opportunities for improving the energy efficiency of pumping systems during every stage of design, selection, operation, and maintenance.
Resumo:
Peak bone mass achieved in adolescence is a determinant of bone mass in later life. In order to identify genetic variants affecting bone mineral density (BMD), we performed a genome-wide association study of BMD and related traits in 1518 children from the Avon Longitudinal Study of Parents and Children (ALSPAC). We compared results with a scan of 134 adults with high or low hip BMD. We identified associations with BMD in an area of chromosome 12 containing the Osterix (SP7) locus, a transcription factor responsible for regulating osteoblast differentiation (ALSPAC: P = 5.8 × 10-4; Australia: P = 3.7 × 10-4). This region has previously shown evidence of association with adult hip and lumbar spine BMD in an Icelandic population, as well as nominal association in a UK population. A meta-analysis of these existing studies revealed strong association between SNPs in the Osterix region and adult lumbar spine BMD (P = 9.9 × 10-11). In light of these findings, we genotyped a further 3692 individuals from ALSPAC who had whole body BMD and confirmed the association in children as well (P = 5.4 × 10-5). Moreover, all SNPs were related to height in ALSPAC children, but not weight or body mass index, and when height was included as a covariate in the regression equation, the association with total body BMD was attenuated. We conclude that genetic variants in the region of Osterix are associated with BMD in children and adults probably through primary effects on growth.
Resumo:
PURPOSE The restricted genetic diversity and homogeneous molecular basis of Mendelian disorders in isolated founder populations have rarely been explored in epilepsy research. Our long-term goal is to explore the genetic basis of epilepsies in one such population, the Gypsies. The aim of this report is the clinical and genetic characterization of a Gypsy family with a partial epilepsy syndrome. METHODS Clinical information was collected using semistructured interviews with affected subjects and informants. At least one interictal electroencephalography (EEG) recording was performed for each patient and previous data obtained from records. Neuroimaging included structural magnetic resonance imaging (MRI). Linkage and haplotype analysis was performed using the Illumina IVb Linkage Panel, supplemented with highly informative microsatellites in linked regions and Affymetrix SNP 5.0 array data. RESULTS We observed an early-onset partial epilepsy syndrome with seizure semiology strongly suggestive of temporal lobe epilepsy (TLE), with mild intellectual deficit co-occurring in a large proportion of the patients. Psychiatric morbidity was common in the extended pedigree but did not cosegregate with epilepsy. Linkage analysis definitively excluded previously reported loci, and identified a novel locus on 5q31.3-q32 with an logarithm of the odds (LOD) score of 3 corresponding to the expected maximum in this family. DISCUSSION The syndrome can be classified as familial temporal lobe epilepsy (FTLE) or possibly a new syndrome with mild intellectual deficit. The linked 5q region does not contain any ion channel-encoding genes and is thus likely to contribute new knowledge about epilepsy pathogenesis. Identification of the mutation in this family and in additional patients will define the full phenotypic spectrum.
Resumo:
Game strategies have been developed in past decades and used in the field of economics, engineering, computer science and biology due to their efficiency in solving design optimisation problems. In addition, research on Multi-Objective (MO) and Multidisciplinary Design Optimisation (MDO) has focused on developing robust and efficient optimisation method to produce quality solutions with less computational time. In this paper, a new optimisation method Hybrid Game Strategy for MO problems is introduced and compared to CMA-ES based optimisation approach. Numerical results obtained from both optimisation methods are compared in terms of computational expense and model quality. The benefits of using Game-strategies are demonstrated.
Resumo:
Web data can often be represented in free tree form; however, free tree mining methods seldom exist. In this paper, a computationally fast algorithm FreeS is presented to discover all frequently occurring free subtrees in a database of labelled free trees. FreeS is designed using an optimal canonical form, BOCF that can uniquely represent free trees even during the presence of isomorphism. To avoid enumeration of false positive candidates, it utilises the enumeration approach based on a tree-structure guided scheme. This paper presents lemmas that introduce conditions to conform the generation of free tree candidates during enumeration. Empirical study using both real and synthetic datasets shows that FreeS is scalable and significantly outperforms (i.e. few orders of magnitude faster than) the state-of-the-art frequent free tree mining algorithms, HybridTreeMiner and FreeTreeMiner.
Resumo:
There is an increase in the uptake of cloud computing services (CCS). CCS is adopted in the form of a utility, and it incorporates business risks of the service providers and intermediaries. Thus, the adoption of CCS will change the risk profile of an organization. In this situation, organisations need to develop competencies by reconsidering their IT governance structures to achieve a desired level of IT-business alignment and maintain their risk appetite to source business value from CCS. We use the resource-based theories to suggest that collaborative board oversight of CCS, competencies relating to CCS information and financial management, and a CCS-related continuous audit program can contribute to business process performance improvements and overall firm performance. Using survey data, we find evidence of a positive association between these IT governance considerations and business process performance. We also find evidence of positive association between business process performance improvements and overall firm performance. The results suggest that the suggested considerations on IT governance structures can contribute to CCS-related IT-business alignment and lead to anticipated business value from CCS. This study provides guidance to organizations on competencies required to secure business value from CCS.
Resumo:
The concept of cloud computing services (CCS) is appealing to small and medium enterprises (SMEs). However, while there is a significant push by various authorities on SMEs to adopt the CCS, knowledge of the key considerations to adopt the CCS is very limited. We use the technology-organization-environment (TOE) framework to suggest that a strategic and incremental intent, understanding the organizational structure and culture, understanding the external factors, and consideration of the human resource capacity can contribute to sustainable business value from CCS. Using survey data, we find evidence of a positive association between these considerations and the CCS-related business objectives. We also find evidence of positive association between the CCS-related business objectives and CCS-related financial objectives. The results suggest that the proposed considerations can ensure sustainable business value from the CCS. This study provides guidance to SMEs on a path to adopting the CCS with the intention of a long-term commitment and achieving sustainable business value from these services.
Resumo:
While much has been written about the relationship between personal epistemologies and learning-teaching approaches, outcomes, and intentions, little has focused specifically on these relationships in the context of teacher education. This chapter addresses changes in preservice teachers’ personal epistemologies by overviewing this emerging body of research and arguing for a new approach to conceptualizing and supporting changes in personal epistemologies based on reflexivity. The overview includes definitions of key concepts and research traditions that have been used since the 1970s and a discussion of the emerging role of epistemic justification as a key mechanism of change in the process of belief development.
Resumo:
Identifying unusual or anomalous patterns in an underlying dataset is an important but challenging task in many applications. The focus of the unsupervised anomaly detection literature has mostly been on vectorised data. However, many applications are more naturally described using higher-order tensor representations. Approaches that vectorise tensorial data can destroy the structural information encoded in the high-dimensional space, and lead to the problem of the curse of dimensionality. In this paper we present the first unsupervised tensorial anomaly detection method, along with a randomised version of our method. Our anomaly detection method, the One-class Support Tensor Machine (1STM), is a generalisation of conventional one-class Support Vector Machines to higher-order spaces. 1STM preserves the multiway structure of tensor data, while achieving significant improvement in accuracy and efficiency over conventional vectorised methods. We then leverage the theory of nonlinear random projections to propose the Randomised 1STM (R1STM). Our empirical analysis on several real and synthetic datasets shows that our R1STM algorithm delivers comparable or better accuracy to a state-of-the-art deep learning method and traditional kernelised approaches for anomaly detection, while being approximately 100 times faster in training and testing.