13 resultados para REDUNDANT
em University of Queensland eSpace - Australia
Resumo:
Sox7, Sox17 and Sox18 constitute group F of the Sox family of HMG box transcription factor genes. Dominant-negative mutations in Sox18 underlie the cardiovascular defects observed in ragged mutant mice. By contrast, Sox18(-/-) mice are viable and fertile, and display no appreciable anomaly in their vasculature, suggesting functional compensation by the two other SoxF genes. Here, we provide direct evidence for redundant function of Sox17 and Sox18 in postnatal neovascularization by generating Sox17(+/-)-Sox18(-/-) double mutant mice. Whereas Sox18(-/-) and Sox17(+/-)-Sox18(+/)-mice showed no vascular defects, approximately half of the Sox17(+/-)-Sox18(-/-) pups died before postnatal day 21 (P21). They showed reduced neovascularization in the liver sinusoids and kidney outer medulla vasa recta at P7, which most likely caused the ischemic necrosis observed by P14 in hepatocytes and renal tubular epithelia. Those that survived to adulthood showed similar, but milder, vascular anomalies in both liver and kidney, and females were infertile with varying degrees of vascular abnormalities in the reproductive organs. These anomalies corresponded with sites of expression of Sox7 and Sox17 in the developing postnatal vasculature. In vitro angiogenesis assays, using primary endothelial cells isolated from the P7 livers, showed that the Sox17(+/-)-Sox18(-/-)endothelial cells were defective in endothelial sprouting and remodeling of the vasculature in a phenotype-dependent manner. Therefore, our findings indicate that Sox17 and Sox18, and possibly all three SoxF genes, are cooperatively involved in mammalian vascular development.
Resumo:
This paper describes the implementation of a TMR (Triple Modular Redundant) microprocessor system on a FPGA. The system exhibits true redundancy in that three instances of the same processor system (both software and hardware) are executed in parallel. The described system uses software to control external peripherals and a voter is used to output correct results. An error indication is asserted whenever two of the three outputs match or all three outputs disagree. The software has been implemented to conform to a particular safety critical coding guideline/standard which is popular in industry. The system was verified by injecting various faults into it.
Resumo:
A major requirement for pervasive systems is to integrate context-awareness to support heterogeneous networks and device technologies and at the same time support application adaptations to suit user activities. However, current infrastructures for pervasive systems are based on centralized architectures which are focused on context support for service adaptations in response to changes in the computing environment or user mobility. In this paper, we propose a hierarchical architecture based on active nodes, which maximizes the computational capabilities of various nodes within the pervasive computing environment, while efficiently gathering and evaluating context information from the user's working environment. The migratable active node architecture employs various decision making processes for evaluating a rich set of context information in order to dynamically allocate active nodes in the working environment, perform application adaptations and predict user mobility. The active node also utilizes the Redundant Positioning System to accurately manage user's mobility. This paper demonstrates the active node capabilities through context-aware vertical handover applications.
Resumo:
This study examined the utility of the Attachment Style Questionnaire (ASQ) in an Italian sample of 487 consecutively admitted psychiatric participants and an independent sample of 605 nonclinical participants. Minimum average partial analysis of data from the psychiatric sample supported the hypothesized five-factor structure of the items; furthermore, multiple-group component analysis showed that this five-factor structure was not an artifact of differences in item distributions. The five-factor structure of the ASQ was largely replicated in the nonclinical sample. Furthermore, in both psychiatric and nonclinical samples, a two-factor higher order structure of the ASQ scales was observed. The higher order factors of Avoidance and Anxious Attachment showed meaningful relations with scales assessing parental bonding, but were not redundant with these scales. Multivariate normal mixture analysis supported the hypothesis that adult attachment patterns, as measured by the ASQ, are best considered as dimensional constructs.
Resumo:
An automatic email handling system (AutoRouter) was introduced at a national counselling service in Australia. In 2003, counsellors responded to a total of 7421 email messages. Over nine days in early May 2004 the administrator responsible for the management of the manual email counselling service recorded the time spent on managing email messages. The AutoRouter was then introduced. Since the implementation of the AutoRouter the administrator's management role has become redundant, an average of 12 h 5 min per week of staff time has been saved. There have been further savings in supervisor time. Counsellors were taking an average of 6.2 days to respond to email messages (n=4307), with an average delay of 1.2 days from the time counsellors wrote the email to when the email was sent. Thus the response was sent on average 7.4 days after receipt of the original client email message. A significant decrease in response time has been noted since implementation of the AutoRouter, with client responses now taking an average of 5.4 days, a decrease of 2.0 days. Automatic message handling appears to be a promising method of managing the administration of a steadily increasing email counselling service.
Resumo:
Minimal representations are known to have no redundant elements, and are therefore of great importance. Based on the notions of performance and size indices and measures for process systems, the paper proposes conditions for a process model being minimal in a set of functionally equivalent models with respect to a size norm. Generalized versions of known procedures to obtain minimal process models for a given modelling goal, model reduction based on sensitivity analysis and incremental model building are proposed and discussed. The notions and procedures are illustrated and compared on a simple example, that of a simple nonlinear fermentation process with different modelling goals and on a case study of a heat exchanger modelling. (C) 2004 Elsevier Ltd. All rights reserved.
Resumo:
Expression of the mouse transcription factor EC (Tfec) is restricted to the myeloid compartment, suggesting a function for Tfec in the development or function of these cells. However, mice lacking Tfec develop normally, indicating a redundant role for Tfec in myeloid cell development. We now report that Tfec is specifically induced in bone marrow-derived macrophages upon stimulation with the Th2 cytokines, IL-4 and IL-13, or LPS. LPS induced a rapid and transient up-regulation of Tfec mRNA expression and promoter activity, which was dependent on a functional NF-kappa B site. IL-4, however, induced a rapid, but long-lasting, increase in Tfec mRNA, which, in contrast to LPS stimulation, also resulted in detectable levels of Tfec protein. IL-4-induced transcription of Tfec was absent in macrophages lacking Stat6, and its promoter depended on two functional Stat6-binding sites. A global comparison of IL-4-induced genes in both wild-type and Tfec mutant macrophages revealed a surprisingly mild phenotype with only a few genes affected by Tfec deficiency. These included the G-CSFR (Csf3r) gene that was strongly up-regulated by IL-4 in wild-type macrophages and, to a lesser extent, in Tfec mutant macrophages. Our study also provides a general definition of the transcriptome in alternatively activated mouse macrophages and identifies a large number of novel genes characterizing this cell type.
Resumo:
In the English literature, facial approximation methods have been commonly classified into three types: Russian, American, or Combination. These categorizations are based on the protocols used, for example, whether methods use average soft-tissue depths (American methods) or require face muscle construction (Russian methods). However, literature searches outside the usual realm of English publications reveal key papers that demonstrate that the Russian category above has been founded on distorted views. In reality, Russian methods are based on limited face muscle construction, with heavy reliance on modified average soft-tissue depths. A closer inspection of the American method also reveals inconsistencies with the recognized classification scheme. This investigation thus demonstrates that all major methods of facial approximation depend on both face anatomy and average soft-tissue depths, rendering common method classification schemes redundant. The best way forward appears to be for practitioners to describe the methods they use (including the weight each one gives to average soft-tissue depths and deep face tissue construction) without placing them in any categorical classificatory group or giving them an ambiguous name. The state of this situation may need to be reviewed in the future in light of new research results and paradigms.
Resumo:
Circadian clocks maintain robust and accurate timing over a broad range of physiological temperatures, a characteristic termed temperature compensation. In Arabidopsis thaliana, ambient temperature affects the rhythmic accumulation of transcripts encoding the clock components TIMING OF CAB EXPRESSION1 (TOC1), GIGANTEA (GI), and the partially redundant genes CIRCADIAN CLOCK ASSOCIATED1 (CCA1) and LATE ELONGATED HYPOCOTYL (LHY). The amplitude and peak levels increase for TOC1 and GI RNA rhythms as the temperature increases (from 17 to 27 degrees C), whereas they decrease for LHY. However, as temperatures decrease ( from 17 to 12 degrees C), CCA1 and LHY RNA rhythms increase in amplitude and peak expression level. At 27 degrees C, a dynamic balance between GI and LHY allows temperature compensation in wild-type plants, but circadian function is impaired in Ihy and gi mutant plants. However, at 12 degrees C, CCA1 has more effect on the buffering mechanism than LHY, as the cca1 and gi mutations impair circadian rhythms more than Ihy at the lower temperature. At 17 degrees C, GI is apparently dispensable for free-running circadian rhythms, although partial GI function can affect circadian period. Numerical simulations using the interlocking-loop model show that balancing LHY/CCA1 function against GI and other evening-expressed genes can largely account for temperature compensation in wild-type plants and the temperature-specific phenotypes of gi mutants.
Resumo:
Recent terrorist events in the UK, such as the security alerts at British airports in August 2006 and the London bombings of July 2005 gained extensive media and academic analysis. This study contends, however, that much of the commentary demonstrated a wide degree of failure among government agencies, academic and analytic experts and the wider media, about the nature of the threat and continues to distort comprehension of the extant danger. The principal failure, this argument maintains, was, and continues to be, one of an asymmetry of comprehension that mistakes the still relatively limited means of violent jihadist radicals with limited political ends. The misapprehension often stems from the language that surrounds the idea of 'terrorism', which increasingly restricts debate to an intellectually redundant search for the 'root causes' that give rise to the politics of complacency. In recent times this outlook has consistently underestimated the level of the threat to the security of the UK. This article argues that a more realistic appreciation of the current security condition requires abandoning the prevailing view that the domestic threat is best prosecuted as a criminal conspiracy. It demands instead a total strategy to deal with a totalizing threat. The empirical evidence demonstrates the existence of a physical threat, not merely the political fear of threat. The implementation of a coherent set of social policies for confronting the threat at home recognizes that securing state borders and maintaining internal stability are the first tasks of government. Fundamentally, this requires a return to an understanding of the Hobbesian conditions for sovereignty, which, despite the delusions of post-Cold War cosmopolitan multiculturalism, never went away.
Resumo:
Spatial data are particularly useful in mobile environments. However, due to the low bandwidth of most wireless networks, developing large spatial database applications becomes a challenging process. In this paper, we provide the first attempt to combine two important techniques, multiresolution spatial data structure and semantic caching, towards efficient spatial query processing in mobile environments. Based on the study of the characteristics of multiresolution spatial data (MSD) and multiresolution spatial query, we propose a new semantic caching model called Multiresolution Semantic Caching (MSC) for caching MSD in mobile environments. MSC enriches the traditional three-category query processing in semantic cache to five categories, thus improving the performance in three ways: 1) a reduction in the amount and complexity of the remainder queries; 2) the redundant transmission of spatial data already residing in a cache is avoided; 3) a provision for satisfactory answers before 100% query results have been transmitted to the client side. Our extensive experiments on a very large and complex real spatial database show that MSC outperforms the traditional semantic caching models significantly
Resumo:
Non-technical losses (NTL) identification and prediction are important tasks for many utilities. Data from customer information system (CIS) can be used for NTL analysis. However, in order to accurately and efficiently perform NTL analysis, the original data from CIS need to be pre-processed before any detailed NTL analysis can be carried out. In this paper, we propose a feature selection based method for CIS data pre-processing in order to extract the most relevant information for further analysis such as clustering and classifications. By removing irrelevant and redundant features, feature selection is an essential step in data mining process in finding optimal subset of features to improve the quality of result by giving faster time processing, higher accuracy and simpler results with fewer features. Detailed feature selection analysis is presented in the paper. Both time-domain and load shape data are compared based on the accuracy, consistency and statistical dependencies between features.