64 resultados para The job network


Relevância:

90.00% 90.00%

Publicador:

Resumo:



We consider the problem of self-healing in peer-to-peer networks that are under repeated attack by an omniscient adversary. We assume that the following process continues for up to n rounds where n is the total number of nodes initially in the network: the adversary deletesan arbitrary node from the network, then the network responds by quickly adding a small number of new edges.

We present a distributed data structure that ensures two key properties. First, the diameter of the network is never more than O(log Delta) times its original diameter, where Delta is the maximum degree of the network initially. We note that for many peer-to-peer systems, Delta is polylogarithmic, so the diameter increase would be a O(loglog n) multiplicative factor. Second, the degree of any node never increases by more than 3 over its original degree. Our data structure is fully distributed, has O(1) latency per round and requires each node to send and receive O(1) messages per round. The data structure requires an initial setup phase that has latency equal to the diameter of the original network, and requires, with high probability, each node v to send O(log n) messages along every edge incident to v. Our approach is orthogonal and complementary to traditional topology-based approaches to defending against attack.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

We consider the problem of self-healing in networks that are reconfigurable in the sense that they can change their topology during an attack. Our goal is to maintain connectivity in these networks, even in the presence of repeated adversarial node deletion, by carefully adding edges after each attack. We present a new algorithm, DASH, that provably ensures that: 1) the network stays connected even if an adversary deletes up to all nodes in the network; and 2) no node ever increases its degree by more than 2 log n, where n is the number of nodes initially in the network. DASH is fully distributed; adds new edges only among neighbors of deleted nodes; and has average latency and bandwidth costs that are at most logarithmic in n. DASH has these properties irrespective of the topology of the initial network, and is thus orthogonal and complementary to traditional topology- based approaches to defending against attack. We also prove lower-bounds showing that DASH is asymptotically optimal in terms of minimizing maximum degree increase over multiple attacks. Finally, we present empirical results on power-law graphs that show that DASH performs well in practice, and that it significantly outperforms naive algorithms in reducing maximum degree increase.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

We examine the impact of primary and secondary interference on opportunistic relaying in cognitive spectrum sharing networks. In particular, new closed-form exact and asymptotic expressions for the outage probability of cognitive opportunistic relaying are derived over Rayleigh and Nakagami-m fading channels. Our analysis presents revealing insights into the diversity and array gains, diversity-multiplexing tradeoff, impact of primary transceivers' positions, and the optimal position of relays. We highlight that cognitive opportunistic relaying achieves the full diversity gain which is a product of the number of relays and the minimum Nakagami-m fading parameter in the secondary network. Furthermore, we confirm that the diversity gain reduces to zero when the peak interference constraint in the secondary network is proportional to the interference power from the primary network.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

University incubators (UI) are generally believed to be important in the successful commercialisation of university spin-outs (USO) with over half of all UK Universities having established an on-campus UI. In this chapter we examine the value of UIs in the spin-out process, focusing on the structural networks of USOs located in a UI as compared to USOs in a University with no access to a UI. Our primary research question is therefore: to what extent does the structural network of USOs with access to an on-campus UI differ from USOs without? The research therefore con-tributes to a growing critique of the effectiveness of UIs in commercialis-ing academic research and the recognition of positive direct and indirect externalities from participation in networks. Through network mapping of all USOs from two research intensive universities, we profile and ana-lyse the formal and informal network ties of USOs to various partners in-ternal and external to the host university. Through interviews we also consider how these networks enhance the resources and capabilities of USOs. Our findings highlight significant differences, with USOs located in a UI having more informal but fewer formal ties, both to other USOs as well as within the host University. In contrast, location in an incuba-tor was not found to affect the extent and nature of ties with external or-ganisations. Reasons for these differences are examined through inter-views with the USOs and point to various factors including the proactive brokering role of incubator and university staff, university bureaucracy, the hidden networks of executive board members across USOs, university equity investment policy and complementary technologies.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

This study presents a new method for determining the transmission network usage by loads and generators, which can then be used for transmission cost/loss allocation in an explainable and justifiable manner. The proposed method is based on solid physical grounds and circuit theory. It relies on dividing the currents through the network into two components; the first one is attributed to power flows from generators to loads, whereas the second one is because of the generators only. Unlike almost all the available methods, the proposed method is assumption free and hence it is more accurate than similar methods even those having some physical basis. The proposed method is validated through a transformer analogy, and theoretical derivations. The method is verified through application to the IEEE 30 bus system and the IEEE 118 test system. The results obtained verified many desirable features of the proposed method. Being more accurate in determining the network usage, in an explainable transparent manner, and in giving accurate cost signals, indicating the best locations to add loads and generation, are among the many desirable features.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

Tephrochronology, a key tool in the correlation of Quaternary sequences, relies on the extraction of tephra shards from sediments for visual identification and high-precision geochemical comparison. A prerequisite for the reliable correlation of tephra layers is that the geochemical composition of glass shards remains unaltered by natural processes (e.g. chemical exchange in the sedimentary environment) and/or by laboratory analytical procedures. However, natural glasses, particularly when in the form of small shards with a high surface to volume ratio, are prone to chemical alteration in both acidic and basic environments. Current techniques for the extraction of distal tephra from sediments involve the ‘cleaning’ of samples in precisely such environments and at elevated temperatures. The acid phase of the ‘cleaning’ process risks alteration of the geochemical signature of the shards, while the basic phase leads to considerable sample loss through dissolution of the silica network. Here, we illustrate the degree of alteration and loss to which distal tephras may be prone, and introduce a less destructive procedure for their extraction. This method is based on stepped heavy liquid flotation and which results in samples of sufficient quality for analysis while preserving their geochemical integrity. In trials, this method out-performed chemical extraction procedures in terms of the number of shards recovered and has resulted in the detection of new tephra layers with low shard concentrations. The implications of this study are highly significant because (i) the current database of distal tephra records and their corresponding geochemical signatures may require refinement and (ii) the record of distal tephras may be incomplete due to sample loss induced by corrosive laboratory procedures. It is therefore vital that less corrosive laboratory procedures are developed to make the detection and classification of distal glass tephra more secure.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

Cognitive radio has emerged as an essential recipe for future high-capacity high-coverage multi-tier hierarchical networks. Securing data transmission in these networks is of utmost importance. In this paper, we consider the cognitive wiretap channel and propose multiple antennas to secure the transmission at the physical layer, where the eavesdropper overhears the transmission from the secondary transmitter to the secondary receiver. The secondary receiver and the eavesdropper are equipped with multiple antennas, and passive eavesdropping is considered where the channel state information of the eavesdropper’s channel is not available at the secondary transmitter. We present new closedform expressions for the exact and asymptotic secrecy outage probability. Our results reveal the impact of the primary network on the secondary network in the presence of a multi-antenna wiretap channel.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

Retrospective clinical datasets are often characterized by a relatively small sample size and many missing data. In this case, a common way for handling the missingness consists in discarding from the analysis patients with missing covariates, further reducing the sample size. Alternatively, if the mechanism that generated the missing allows, incomplete data can be imputed on the basis of the observed data, avoiding the reduction of the sample size and allowing methods to deal with complete data later on. Moreover, methodologies for data imputation might depend on the particular purpose and might achieve better results by considering specific characteristics of the domain. The problem of missing data treatment is studied in the context of survival tree analysis for the estimation of a prognostic patient stratification. Survival tree methods usually address this problem by using surrogate splits, that is, splitting rules that use other variables yielding similar results to the original ones. Instead, our methodology consists in modeling the dependencies among the clinical variables with a Bayesian network, which is then used to perform data imputation, thus allowing the survival tree to be applied on the completed dataset. The Bayesian network is directly learned from the incomplete data using a structural expectation–maximization (EM) procedure in which the maximization step is performed with an exact anytime method, so that the only source of approximation is due to the EM formulation itself. On both simulated and real data, our proposed methodology usually outperformed several existing methods for data imputation and the imputation so obtained improved the stratification estimated by the survival tree (especially with respect to using surrogate splits).

Relevância:

90.00% 90.00%

Publicador:

Resumo:

We examined a remnant host plant (Primula veris L.) habitat network that was last inhabited by the rare butterfly Hamearis lucina L. in north Wales in 1943, to assess the relative contribution of several spatial parameters to its regional extinction. We first examined relationships between P. veris characteristics and H. lucina eggs in surviving H. lucina populations, and used these to predict the suitability and potential carrying capacity of the habitat network in north Wales. This resulted in an estimate of roughly 4500 eggs (ca 227 adults). We developed a discrete space, discrete time metapopulation model to evaluate the relative contribution of dispersal distance, habitat and environmental stochasticity as possible causes of extinction. We simulated the potential persistence of the butterfly in the current network as well as in three artificial (historical and present) habitat networks that differed in the quantity (current and X3) and fragmentation of the habitat (current and aggregated). We identified that reduced habitat quantity and increased isolation would have increased the probability of regional extinction, in conjunction with environmental stochasticity and H. lucina's dispersal distance. This general trend did not change in a qualitative manner when we modified the ability of dispersing females to stay in, and find suitable habitats (by changing the size of the grid cells used in the model). Contrary to most metapopulation model predictions, system persistence declined with increasing migration rate, suggesting that the mortality of migrating individuals in fragmented landscapes may pose significant risks to system-wide persistence. Based on model predictions for the present landscape we argue that a major programme of habitat restoration would be required for a re-established metapopulation to persist for > 100 years.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

This paper explores the relative effects of host plant dynamics and butterfly-related parameters on butterfly persistence. It considers an empty habitat network where a rare butterfly (Cupido minimus) became extinct in 1939 in part of its historical range in north Wales, UK. Surviving populations of the butterfly in southern Britain were visited to assess use of its host plant (Anthyllis vulneraria) in order to calibrate habitat suitability and carrying capacity in the empty network in north Wales. These data were used to deduce that only a portion ( similar to 19%) of the host plant network from north Wales was likely to be highly suitable for oviposition. Nonetheless, roughly 65,460 eggs (3273 adult equivalents) could be expected to be laid in north Wales, were the empty network to be populated at the same levels as observed on comparable plants in surviving populations elsewhere. Simulated metapopulations of C. minimus in the empty network revealed that time to extinction and patch occupancy were significantly influenced by carrying capacity, butterfly mean dispersal distance and environmental stochasticity, although for most reasonable parameter values, the model system persisted. Simulation outputs differed greatly when host plant dynamics was incorporated into the modelled butterfly dynamics. Cupido minimus usually went extinct when host plant were at low densities. In these simulations host plant dynamics appeared to be the most important determinant of the butterfly's regional extirpation. Modelling the outcome of a reintroduction programme to C. minimus variation at high quality locations, revealed that 65% of systems survived at least 100 years. Given the current amount of resources of the north Wales landscape, the persistence of C. minimus under a realistic reintroduction programme has a good chance of being successful, if carried out in conjunction with a host plant management programme.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

IMPORTANCE Systematic reviews and meta-analyses of individual participant data (IPD) aim to collect, check, and reanalyze individual-level data from all studies addressing a particular research question and are therefore considered a gold standard approach to evidence synthesis. They are likely to be used with increasing frequency as current initiatives to share clinical trial data gain momentum and may be particularly important in reviewing controversial therapeutic areas.

OBJECTIVE To develop PRISMA-IPD as a stand-alone extension to the PRISMA (Preferred Reporting Items for Systematic Reviews and Meta-Analyses) Statement, tailored to the specific requirements of reporting systematic reviews and meta-analyses of IPD. Although developed primarily for reviews of randomized trials, many items will apply in other contexts, including reviews of diagnosis and prognosis.

DESIGN Development of PRISMA-IPD followed the EQUATOR Network framework guidance and used the existing standard PRISMA Statement as a starting point to draft additional relevant material. A web-based survey informed discussion at an international workshop that included researchers, clinicians, methodologists experienced in conducting systematic reviews and meta-analyses of IPD, and journal editors. The statement was drafted and iterative refinements were made by the project, advisory, and development groups. The PRISMA-IPD Development Group reached agreement on the PRISMA-IPD checklist and flow diagram by consensus.

FINDINGS Compared with standard PRISMA, the PRISMA-IPD checklist includes 3 new items that address (1) methods of checking the integrity of the IPD (such as pattern of randomization, data consistency, baseline imbalance, and missing data), (2) reporting any important issues that emerge, and (3) exploring variation (such as whether certain types of individual benefit more from the intervention than others). A further additional item was created by reorganization of standard PRISMA items relating to interpreting results. Wording was modified in 23 items to reflect the IPD approach.

CONCLUSIONS AND RELEVANCE PRISMA-IPD provides guidelines for reporting systematic reviews and meta-analyses of IPD.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

BubR1 is a well-defined guardian of the mitotic spindle, initiating mitotic arrest in response to the lack of tension and/or chromosome alignment across the mitotic plate. However, the role of BubR1 in combretastatin-induced cell death remains unknown. In this study, we describe the effects of combretastatin A-4 (CA-4) and a synthetic cis-restricted 3,4-diaryl-2-azetidinone (ß-lactam) analogue (CA-432) on the modulation and phosphorylation of BubR1 in human cervical cancer-derived cells. We demonstrate that CA-4 and CA-432 depolymerise the microtubular network of human cervical carcinoma-derived cells. Both compounds induced the disassembly of the microtubules and the loss of microtubule tension led to the early phosphorylation of BubR1 and the late cleavage of BubR1. The phosphorylation of BubR1 correlated with the onset of G2M cell cycle arrest whilst the cleavage of BubR1 coincided with apoptosis induced by the combretastatins. The combretastatin-induced apoptosis and the BubR1 cleavage were caspase-dependent. In vitro enzyme digests demonstrated that combretastatin-activated BubR1 is a substrate for caspase-3. Gene silencing of BubR1 with small interfering RNA severely compromised combretastatin-induced G2M cell cycle arrest with a corresponding increase in the formation of polyploid cells in both cervical and breast cancer-derived cells. In summary, BubR1 is required to maintain the G2M arrest and limit the formation of polyploid cells in response to continued combretastatin exposure. Moreover, substitution of the ethylene bridge with 3,4-diaryl-2-azetidinone did not alter the tubulin depolymerising properties or the subsequent mitotic spindle checkpoint response to CA-4 in human cancer cells.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

Combretastatin-A4 (CA-4) is a natural derivative of the African willow tree Combretum caffrum. CA-4 is one of the most potent antimitotic components of natural origin, but it is, however, intrinsically unstable. A novel series of CA-4 analogs incorporating a 3,4-diaryl-2-azetidinone (β-lactam) ring were designed and synthesized with the objective to prevent cis -trans isomerization and improve the intrinsic stability without altering the biological activity of CA-4. Evaluation of selected β-lactam CA-4 analogs demonstrated potent antitubulin, antiproliferative, and antimitotic effects in human leukemia cells. A lead β-lactam analog, CA-432, displayed comparable antiproliferative activities with CA-4. CA-432 induced rapid apoptosis in HL-60 acute myeloid leukemia cells, which was accompanied by depolymerization of the microtubular network, poly(ADP-ribose) polymerase cleavage, caspase-3 activation, and Bcl-2 cleavage. A prolonged G(2)M cell cycle arrest accompanied by a sustained phosphorylation of mitotic spindle checkpoint protein, BubR1, and the antiapoptotic proteins Bcl-2 and Bcl-x(L) preceded apoptotic events in K562 chronic myeloid leukemia (CML) cells. Molecular docking studies in conjunction with comprehensive cell line data rule out CA-4 and β-lactam derivatives as P-glycoprotein substrates. Furthermore, both CA-4 and CA-432 induced significantly more apoptosis compared with imatinib mesylate in ex vivo samples from patients with CML, including those positive for the T315I mutation displaying resistance to imatinib mesylate and dasatinib. In summary, synthetic intrinsically stable analogs of CA-4 that display significant clinical potential as antileukemic agents have been designed and synthesized.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

Background: Workplace sedentary behaviour is a priority target for health promotion. However, little is known about how to effect change. We aimed to explore desk-based office workers’ perceptions of factors that influenced sedentary behaviour at work and to explore the feasibility of using a novel mobile phone application to track their behaviours.

Methods: We invited office employees (n = 12) and managers (n = 2) in a software engineering company to participate in semi-structured interviews to explore perceived barriers and facilitators affecting workplace sedentary behaviour. We assessed participants’ sedentary behaviours using an accelerometer before and after they used a mobile phone application to record their activities at self-selected time intervals daily for 2 weeks. Interviews were analysed using a thematic framework.

Results: Software engineers (5 employees; 2 managers) were interviewed; 13 tested the mobile phone application; 8 returned feedback. Major barriers to reducing workplace sedentary behaviour included the pressure of ‘getting the job done’, the nature of their work requiring sitting at a computer, personal preferences for the use of time at and after work, and a lack of facilities, such as a canteen, to encourage moving from their desks. Facilitators for reduced sedentariness included having a definite reason to leave their desks, social interaction and relief of physical and mental symptoms of prolonged sitting. The findings were similar for participants with different levels of overall physical activity. Valid accelerometer data were tracked for four participants: all reduced their sedentary behaviour. Participants stated that recording data using the phone application added to their day’s work but the extent to which individuals perceived this as a burden varied and was counter-balanced by its perceived value in increasing awareness of sedentary behaviour. Individuals expressed a wish for flexibility in its configuration.

Conclusions: These findings indicate that employers’ and employees’ perceptions of the cultural context and physical environment of their work, as well as personal factors, must be considered in attempting to effect changes that reduce workplace sedentary behaviour. Further research should investigate appropriate individually tailored approaches to this challenge, using a framework of behaviour change theory which takes account of specific work practices, preferences and settings.