77 resultados para problems on the real line
Resumo:
We have calculated 90% confidence limits on the steady-state rate of catastrophic disruptions of main belt asteroids in terms of the absolute magnitude at which one catastrophic disruption occurs per year as a function of the post-disruption increase in brightness (Δm) and subsequent brightness decay rate (τ ). The confidence limits were calculated using the brightest unknown main belt asteroid (V=18.5) detected with the Pan-STARRS1 (Pan-STARRS1) telescope. We measured the Pan-STARRS1’s catastrophic disruption detection efficiency over a 453-day interval using the Pan-STARRS moving object processing system (MOPS) and a simple model for the catastrophic disruption event’s photometric behavior in a small aperture centered on the catastrophic disruption event. We then calculated the contours in the ranges from and encompassing measured values from known cratering and disruption events and our model’s predictions. Our simplistic catastrophic disruption model suggests that and which would imply that H0≳28—strongly inconsistent withH0,B2005=23.26±0.02 predicted by Bottke et al. (Bottke, W.F., Durda, D.D., Nesvorný, D., Jedicke, R., Morbidelli, A., Vokrouhlický, D., Levison, H.F. [2005]. Icarus, 179, 63–94.) using purely collisional models. However, if we assume that H0=H0,B2005 our results constrain , inconsistent with our simplistic impact-generated catastrophic disruption model. We postulate that the solution to the discrepancy is that >99% of main belt catastrophic disruptions in the size range to which this study was sensitive (∼100 m) are not impact-generated, but are instead due to fainter rotational breakups, of which the recent discoveries of disrupted asteroids P/2013 P5 and P/2013 R3 are probable examples. We estimate that current and upcoming asteroid surveys may discover up to 10 catastrophic disruptions/year brighter than V=18.5.
Resumo:
Differential Reinforcement of Alternative behaviour (DRA) (Athens & Vollmer, 2010; Cooper, Heron, & Heward, 2007) is a procedure that consists in withholding reinforcement for the targeted inappropriate behaviour while reinforcing behaviours, i.e., that have the same function, but socially more acceptable topographies. DRA has repeatedly proven to be effective in reducing problem behaviours in individuals with autism (Campbell, 2003). On the other hand, a number of single-subject research studies have provided evidence for the use of activity schedules as a means to decrease aggressive behaviour (Dooley et al., 2001; Flannery & Hemer, 1994; Lalli, Casey, Goh, & Merlinoet al., 1994). The purpose of the present study was to evaluate the effectiveness of DRA in combination with the use of an activity schedule. We compared the impact of the visual activities schedule used in combination with a DRA procedure versus the impact of the DRA procedure used alone on problem behaviour of a boy diagnosed with an Autism Spectrum Disorder. An alternating treatments design was used to compare the rate of behaviour problems in each of the two treatment conditions. DRA was delivered as treatment A, while the combination of the activities schedule and DRA was treatment B.
Resumo:
While investigations using covert food manipulations tend to suggest that individuals are poor at adjusting for previous energy intake, in the real world adults rarely consume foods of which they are ill-informed. This study investigated the impact in fully complicit consumers of consuming commercially available dark chocolate, milk chocolate, sweet biscuits and fruit bars on subsequent appetite. Using a repeated measures design, participants received four small portions (4 × 10-11 g) of either dark chocolate, milk chocolate, sweet biscuits, fruit bars or no food throughout five separate study days (counterbalanced in order), and test meal intake, hunger, liking and acceptability were measured. Participants consumed significantly less at lunch following dark chocolate, milk chocolate and sweet biscuits compared to no food (smallest t(19) = 2.47, p = 0.02), demonstrating very good energy compensation (269-334%). No effects were found for fruit bars (t(19) = 1.76, p = 0.09), in evening meal intakes (F(4,72) = 0.62, p = 0.65) or in total intake (lunch + evening meal + food portions) (F(4,72) = 0.40, p = 0.69). No differences between conditions were found in measures of hunger (largest F(4,76) = 1.26, p = 0.29), but fruit bars were significantly less familiar than all other foods (smallest t(19) = 3.14, p = 0.01). These findings demonstrate good compensation over the short term for small portions of familiar foods in complicit consumers. Findings are most plausibly explained as a result of participant awareness and cognitions, although the nature of these cognitions cannot be discerned from this study. These findings however, also suggest that covert manipulations may have limited transfer to real world scenarios.
Resumo:
Porcine circovirus type 2 (PCV2) nucleic acid and/or antigens are consistently observed in cells of monocytic morphology in lesions of pigs affected by post-weaning multisystemic wasting syndrome (PMWS). In this study, PCV2 antigen was detected in the cytoplasm of monocytes, pulmonary macrophages (PMs) and monocyte-derived macrophages exposed to the virus in vitro, by immunofluorescence analysis (IFA) and the phenotype of these cells confirmed by detection of monocytic cell surface markers using flow cytometry. Viral antigen was not observed in lymphocytic cells. Replication of the virus in PMs was investigated further by comparison to that observed in the continuous pig kidney cell line (PK15A) using quantitative virus titration, quantitative PCR and by the detection of double stranded DNA intermediates of viral replication by Southern blotting analyses. Although increases in viral DNA and levels of infectious virus progeny and the presence of replicative intermediates, indicative of viral replication, were observed in PK15A cells, no such changes were observed in PMs in spite of the fact that infectious virus, viral antigen and viral DNA persisted in the cells for at least the duration of the experiment. These results suggest that in vivo, monocytic cells may not represent the primary target for PCV2 replication. (C) 2003 Elsevier B.V. All rights reserved.
On the complexity of solving polytree-shaped limited memory influence diagrams with binary variables
Resumo:
Influence diagrams are intuitive and concise representations of structured decision problems. When the problem is non-Markovian, an optimal strategy can be exponentially large in the size of the diagram. We can avoid the inherent intractability by constraining the size of admissible strategies, giving rise to limited memory influence diagrams. A valuable question is then how small do strategies need to be to enable efficient optimal planning. Arguably, the smallest strategies one can conceive simply prescribe an action for each time step, without considering past decisions or observations. Previous work has shown that finding such optimal strategies even for polytree-shaped diagrams with ternary variables and a single value node is NP-hard, but the case of binary variables was left open. In this paper we address such a case, by first noting that optimal strategies can be obtained in polynomial time for polytree-shaped diagrams with binary variables and a single value node. We then show that the same problem is NP-hard if the diagram has multiple value nodes. These two results close the fixed-parameter complexity analysis of optimal strategy selection in influence diagrams parametrized by the shape of the diagram, the number of value nodes and the maximum variable cardinality.
Resumo:
Credal networks are graph-based statistical models whose parameters take values on a set, instead of being sharply specified as in traditional statistical models (e.g., Bayesian networks). The result of inferences with such models depends on the irrelevance/independence concept adopted. In this paper, we study the computational complexity of inferences under the concepts of epistemic irrelevance and strong independence. We strengthen complexity results by showing that inferences with strong independence are NP-hard even in credal trees with ternary variables, which indicates that tractable algorithms, including the existing one for epistemic trees, cannot be used for strong independence. We prove that the polynomial time of inferences in credal trees under epistemic irrelevance is not likely to extend to more general models, because the problem becomes NP-hard even in simple polytrees. These results draw a definite line between networks with efficient inferences and those where inferences are hard, and close several open questions regarding the computational complexity of such models.
Resumo:
Energy consumption has become an important area of research of late. With the advent of new manycore processors, situations have arisen where not all the processors need to be active to reach an optimal relation between performance and energy usage. In this paper a study of the power and energy usage of a series of benchmarks, the PARSEC and the SPLASH- 2X Benchmark Suites, on the Intel Xeon Phi for different threads configurations, is presented. To carry out this study, a tool was designed to monitor and record the power usage in real time during execution time and afterwards to compare the r
Resumo:
We break down photoelectron diffraction intensities into four terms in analogy to optical holography and discuss the effect of each term on reconstructed images. The second term involving products of scattered waves SIGMA-SIGMA-O(i)O(j)*, is in this case not structure-less. Theoretical analysis and simulations demonstrate that this term may lead to spurious features in real space images in holographic transforms of medium energy electron diffraction patterns. If it is small enough the problem may be overcome by an iterative correction process.
Resumo:
In this Letter, an unambiguous synthetic strategy is reported for the preparation of enantiomerically purecis-5-halo-piperazic acid derivatives in single diastereoisomer form. Contrary to the recent report by Shin and co-workers (Chem. Lett. 2001, 1172), in which it is claimed that the Ph3P and N-chlorosuccinimide (NCS)-mediated chlorination of (3R,5S)-trans-N(1),N(2)-di-t-Boc-5-hydroxy-piperazic acid derivative 1proceeds with retention of configuration at C(5) to give 2, we now show that this and related Ph3P-mediated halogenations all occur with SN2 inversion at the alcohol center, as is customary for such reactions. Specifically, we demonstrate that the (3R,5S)-trans-5-Cl-piperazic acid derivative 2 claimed by Shin and co-workers (Chem. Lett. 2001, 1172) is in actual fact the chlorinated (3S,5R)-enantiomer 6, which must have been prepared from the cis-(3S,5S)-alcohol 3, a molecule whose synthesis is not formally described in the Shin paper. We further show here that the cis-(3R,5R)-5-Cl-Piz 13 claimed by Shin and co-workers inChem. Lett. 2001, 1172, is also (3S,5R)-trans-5-Cl-Piz 6. Authentic 13 has now been synthesized by us, for the very first time, here. Since Lindsley and Kennedy have recently utilized the now invalid Shin and co-workers’ retentive Ph3P/NCS chlorination procedure on 1 in their synthetic approach to piperazimycin A (Tetrahedron Lett. 2010, 51, 2493), it follows that their claimed 5-Cl-Piz-containing dipeptide 25 probably has the alternate structure 26, where the 5-Cl-Piz residue has a 3,5-cis-configuration. The aforementioned stereochemical misassignments appear to have come from a mix-up of starting materials by Shin and co-workers (Chem. Lett. 2001, 1172), and an under-appreciation of the various steric and conformational effects that operate in N(2)-acylated piperazic acid systems, most especially rotameric A1,3-strain. The latter has now been unambiguously delineated and defined here under the banner of the A1,3-rotamer effect.
Resumo:
Many high-state non-magnetic cataclysmic variables (CVs) exhibit blueshifted absorption or P-Cygni profiles associated with ultraviolet (UV) resonance lines. These features imply the existence of powerful accretion disc winds in CVs. Here, we use our Monte Carlo ionization and radiative transfer code to investigate whether disc wind models that produce realistic UV line profiles are also likely to generate observationally significant recombination line and continuum emission in the optical waveband. We also test whether outflows may be responsible for the single-peaked emission line profiles often seen in high-state CVs and for the weakness of the Balmer absorption edge (relative to simple models of optically thick accretion discs). We find that a standard disc wind model that is successful in reproducing the UV spectra of CVs also leaves a noticeable imprint on the optical spectrum, particularly for systems viewed at high inclination. The strongest optical wind-formed recombination lines are H alpha and He ii lambda 4686. We demonstrate that a higher density outflow model produces all the expected H and He lines and produces a recombination continuum that can fill in the Balmer jump at high inclinations. This model displays reasonable verisimilitude with the optical spectrum of RW Trianguli. No single-peaked emission is seen, although we observe a narrowing of the double-peaked emission lines from the base of the wind. Finally, we show that even denser models can produce a single-peaked H alpha line. On the basis of our results, we suggest that winds can modify, and perhaps even dominate, the line and continuum emission from CVs.
Resumo:
There is increasing interest in developing abattoir-based welfare measures for pigs.The primary aim of this study was to determine the most appropriate place on theslaughter line to conduct assessments of welfare-related lesions, namely apparentaggression-related skin lesions (hereafter referred to as 'skin lesions'), loin bruising andapparent tail biting damage. The study also lent itself to an assessment of theprevalence of these lesions, and the extent to which they were linked with productionparameters. Finishing pigs processed at two abattoirs on the Island of Ireland (n =1950 in abattoir A, and n = 1939 in abattoir B) were used. Data were collected over 6days in each abattoir in July 2014. Lesion scoring took place at two points on theslaughter line: (1) at exsanguination (Slaughter Stage 1 [SS1]), and (2) followingscalding and dehairing of carcasses (Slaughter Stage 2 [SS2]). At both points, eachcarcass was assigned a skin and tail lesion score ranging from 0 (lesion absent) to 3 or4 (severe lesions), respectively. Loin bruising was recorded as present or absent.Differences in the percentage of pigs with observable lesions of each type werecompared between SS1 and SS2 using McNemar/McNemar-Bowker tests. Theassociations between each lesion type, and both cold carcass weight andcondemnations, were examined at batch level using Pearson's correlations. Batch wasdefined as the group of animals with a particular farm identification code on a givenday. The overall percentage of pigs with a visible skin lesion (i.e. score > 0) decreasedbetween SS1 and SS2 (P<0.001). However, the percentage of pigs with a severe skinlesion increased numerically from SS1 to SS2. The percentage of pigs with a visible taillesion and with loin bruising also increased between SS1 and SS2 (P<0.001). Therewas a positive correlation between the percentage of carcasses that were partiallycondemned, and the percentage of pigs with skin lesions, tail lesions and loin bruising(P<0.05). Additionally, as the batch-level frequency of each lesion type increased,average cold carcass weight decreased (P<0.001). These findings suggest that severeskin lesions, tail lesions and loin bruising are more visible on pig carcasses after theyhave been scalded and dehaired, and that this is when abattoir-based lesion scoringshould take place. The high prevalence of all three lesion types, and the links witheconomically important production parameters, suggests more research into identifying key risk factors is warranted.
Resumo:
The worsening of process variations and the consequent increased spreads in circuit performance and consumed power hinder the satisfaction of the targeted budgets and lead to yield loss. Corner based design and adoption of design guardbands might limit the yield loss. However, in many cases such methods may not be able to capture the real effects which might be way better than the predicted ones leading to increasingly pessimistic designs. The situation is even more severe in memories which consist of substantially different individual building blocks, further complicating the accurate analysis of the impact of variations at the architecture level leaving many potential issues uncovered and opportunities unexploited. In this paper, we develop a framework for capturing non-trivial statistical interactions among all the components of a memory/cache. The developed tool is able to find the optimum memory/cache configuration under various constraints allowing the designers to make the right choices early in the design cycle and consequently improve performance, energy, and especially yield. Our, results indicate that the consideration of the architectural interactions between the memory components allow to relax the pessimistic access times that are predicted by existing techniques.
Resumo:
Most cryptographic devices should inevitably have a resistance against the threat of side channel attacks. For this, masking and hiding schemes have been proposed since 1999. The security validation of these countermeasures is an ongoing research topic, as a wider range of new and existing attack techniques are tested against these countermeasures. This paper examines the side channel security of the balanced encoding countermeasure, whose aim is to process the secret key-related data under a constant Hamming weight and/or Hamming distance leakage. Unlike previous works, we assume that the leakage model coefficients conform to a normal distribution, producing a model with closer fidelity to real-world implementations. We perform analysis on the balanced encoded PRINCE block cipher with simulated leakage model and also an implementation on an AVR board. We consider both standard correlation power analysis (CPA) and bit-wise CPA. We confirm the resistance of the countermeasure against standard CPA, however, we find with a bit-wise CPA that we can reveal the key with only a few thousands traces.
Resumo:
The recent European economic crisis has dramatically exposed the failures of
the various institutional mechanisms in place to maintain economic stability
in Europe, and has unveiled the difficulty in achieving international coordination
on fiscal and financial stability policies. Drawing on the European
experience, this article analyzes the concept of economic stability in international
law and highlights the peculiar problems connected to its maintenance
or promotion. First, we demonstrate that policies that safeguard and
protect economic stability are largely regulated and managed at the national
level, due to their inextricable relationship with the exercise of national political
power. Until recently, more limited levels of pan-European integration
did not make the coordination of economic stability policies seem necessary.
However, a much deeper level of economic integration makes it very difficult
to tackle an international economic crisis through national responses. If EU
Member states wish to maintain and deepen economic integration, they
must accept an erosion of sovereignty over their economic stability policies.
This will not only deprive states of a fundamental anchor of political power,
but also create a challenge for the maintenance of democratic control over
economic policies. Second, this article argues that soft law approaches are
likely ineffective in enforcing the regulatory disciplines required to ensure
economic stability.
Resumo:
AIM:
To utilise a novel method for making measurements in the anterior chamber in order to compare the anterior chamber angles of people of European, African, and east Asian descent aged 40 years and over.
METHODS:
A cross sectional study on 15 people of each sex from each decade from the 40s to the 70s, from each of three racial groups-black, white, and Chinese Singaporeans. Biometric gonioscopy (BG) utilises a slit lamp mounted reticule to make measurements from the apparent iris insertion to Schwalbe's line through a Goldmann one mirror goniolens. The main outcome measures were BG measurements of the anterior chamber angle as detailed above.
RESULTS:
There was no significant difference in angle measurement between black, white, and Chinese races in this study. However, at younger ages people of Chinese race appeared to have deeper angles than white or black people, whereas the angles of older Chinese were significantly narrower (p = 0.004 for the difference in slope of BG by age between Chinese and both black and white people).
CONCLUSION:
The failure to detect a difference in angle measurements between these groups was surprising, given the much higher prevalence of angle closure among Chinese. It appears that the overall apparent similarity of BG means between Chinese and Western populations may mask very different trends with age. The apparently more rapid decline in angle width measurements with age among Chinese may be due to the higher prevalence of cataract or "creeping angle closure." However, longitudinal inferences from cross sectional data are problematic, and this may represent a cohort phenomenon caused by the increasing prevalence of myopia in the younger Singaporean population.