43 resultados para auction aggregation protocols


Relevância:

20.00% 20.00%

Publicador:

Resumo:

We report the first synthesis of amphiphilic four-arm star diblock copolymers consisting of styrene (STY) and acrylic acid (AA) made using reversible addition-fragmentation chain transfer (RAFT; Z group approach with no star-star coupling). The polymerization proceeded in an ideal living manner. The size of the poly(AA(132)-STYm)(4) stars in DMF were small and close to 7 nm, suggesting no star aggregation. Slow addition of water (pH = 6.8) to this mixture resulted in aggregates of 15 stars per micelle with core-shell morphology. Calculations showed that the polyAA blocks were slightly extended with a shell thickness of 15 nm. Treatment of these micelles with piperidine to cleave the block arms from the core resulted in little or no change on micelle size or morphology, but the polyAA shell thickness was close to 29 nm (33 nm is the maximum at full extension) suggesting a release of entropy when the arms are detached from the core molecule. In this work we showed through the use of star amphiphilic polymers that the micelle size, aggregation number, and morphology could be controlled.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The aim of this study was to compare the outcomes associated with two differing right unilateral (RUL) electroconvulsive therapy (ECT) dosing protocols: 2-3X seizure threshold (2-3X ST) and fixed high dose (FHD) at 353 mC. A retrospective chart review was performed to compare patient outcomes during the implementation of two different dosing protocols: 2-3X ST from October 2000 to May 2001 and FHD from June 2001 to February 2002. A total of 56 patients received ECT under the 2-3X ST protocol, and 46 received ECT under the FHD protocol. In total, 13.6% of patients receiving ECT according to the 2-3X ST protocol received more than 12 ECT, whereas none of the FHD group received more than 12 ECT. The mean number of ECT per treatment course reduced significantly from 7.6 to 5.7 following the switch from the 2-3X ST protocol to the FHD protocol. There were no significant differences between the two groups in the incidence of adverse cognitive effects. ECT practitioners adhered to the 2-3X ST protocol for only 51.8% of ECT courses, with protocol adherence improving to 87% following introduction of the FHD protocol. Although this naturalistic retrospective chart survey had significant methodological limitations, it found that practitioners are more likely to correctly adhere to a fixed dose protocol, therefore, increasing its 'real world' effectiveness in comparison to titrated suprathreshold dosing techniques. The FHD protocol was associated with shorter courses of ECT than the 2-3X ST protocol, with no significant difference between the two protocols in clinically discernable adverse cognitive effects.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Pentameric capsomeres of human papillomavirus capsid protein L1 expressed in Escherichia coli self-assemble into virus-like particles (VLPs) in vitro. A multifactorial experimental design was used to explore a wide range of solution conditions to optimize the assembly process. The degree of assembly was measured using an enzyme-linked immunosorbent assay, and a high-throughput turbidity assay was developed to monitor competing aggregation. The presence of zinc ions in the assembly buffer greatly increased the incidence of aggregation and had to be excluded from the experiment for meaningful analysis. Assembly of VLPs was optimal at a pH of about 6.5, calcium and sodium ions had no measurable effect, and dithiothreitol and glutathione inhibited assembly. Tryptophan fluorescence spectroscopy demonstrated that an increase in urea concentration reduced the rate of VLP formation but had no effect on the final concentration of assembled VLPs. This study demonstrates the use of the hanging-drop vapor-diffusion crystallization method to screen for conditions that promote aggregation and the use of tryptophan fluorescence spectroscopy for real-time monitoring of the assembly process.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

While others have attempted to determine, by way of mathematical formulae, optimal resource duplication strategies for random walk protocols, this paper is concerned with studying the emergent effects of dynamic resource propagation and replication. In particular, we show, via modelling and experimentation, that under any given decay (purge) rate the number of nodes that have knowledge of particular resource converges to a fixed point or a limit cycle. We also show that even for high rates of decay - that is, when few nodes have knowledge of a particular resource - the number of hops required to find that resource is small.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Large amounts of information can be overwhelming and costly to process, especially when transmitting data over a network. A typical modern Geographical Information System (GIS) brings all types of data together based on the geographic component of the data and provides simple point-and-click query capabilities as well as complex analysis tools. Querying a Geographical Information System, however, can be prohibitively expensive due to the large amounts of data which may need to be processed. Since the use of GIS technology has grown dramatically in the past few years, there is now a need more than ever, to provide users with the fastest and least expensive query capabilities, especially since an approximated 80 % of data stored in corporate databases has a geographical component. However, not every application requires the same, high quality data for its processing. In this paper we address the issues of reducing the cost and response time of GIS queries by preaggregating data by compromising the data accuracy and precision. We present computational issues in generation of multi-level resolutions of spatial data and show that the problem of finding the best approximation for the given region and a real value function on this region, under a predictable error, in general is "NP-complete.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Security protocols preserve essential properties, such as confidentiality and authentication, of electronically transmitted data. However, such properties cannot be directly expressed or verified in contemporary formal methods. Via a detailed example, we describe the phases needed to formalise and verify the correctness of a security protocol in the state-oriented Z formalism.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Security protocols are often modelled at a high level of abstraction, potentially overlooking implementation-dependent vulnerabilities. Here we use the Z specification language's rich set of data structures to formally model potentially ambiguous messages that may be exploited in a 'type flaw' attack. We then show how to formally verify whether or not such an attack is actually possible in a particular protocol using Z's schema calculus.

Relevância:

20.00% 20.00%

Publicador: