97 resultados para computer-mediated communications
Resumo:
In this paper, processing methods of Fourier optics implemented in a digital holographic microscopy system are presented. The proposed methodology is based on the possibility of the digital holography in carrying out the whole reconstruction of the recorded wave front and consequently, the determination of the phase and intensity distribution in any arbitrary plane located between the object and the recording plane. In this way, in digital holographic microscopy the field produced by the objective lens can be reconstructed along its propagation, allowing the reconstruction of the back focal plane of the lens, so that the complex amplitudes of the Fraunhofer diffraction, or equivalently the Fourier transform, of the light distribution across the object can be known. The manipulation of Fourier transform plane makes possible the design of digital methods of optical processing and image analysis. The proposed method has a great practical utility and represents a powerful tool in image analysis and data processing. The theoretical aspects of the method are presented, and its validity has been demonstrated using computer generated holograms and images simulations of microscopic objects. (c) 2007 Elsevier B.V. All rights reserved.
Resumo:
We propose a robust and low complexity scheme to estimate and track carrier frequency from signals traveling under low signal-to-noise ratio (SNR) conditions in highly nonstationary channels. These scenarios arise in planetary exploration missions subject to high dynamics, such as the Mars exploration rover missions. The method comprises a bank of adaptive linear predictors (ALP) supervised by a convex combiner that dynamically aggregates the individual predictors. The adaptive combination is able to outperform the best individual estimator in the set, which leads to a universal scheme for frequency estimation and tracking. A simple technique for bias compensation considerably improves the ALP performance. It is also shown that retrieval of frequency content by a fast Fourier transform (FFT)-search method, instead of only inspecting the angle of a particular root of the error predictor filter, enhances performance, particularly at very low SNR levels. Simple techniques that enforce frequency continuity improve further the overall performance. In summary we illustrate by extensive simulations that adaptive linear prediction methods render a robust and competitive frequency tracking technique.
Resumo:
The TCP/IP architecture was consolidated as a standard to the distributed systems. However, there are several researches and discussions about alternatives to the evolution of this architecture and, in this study area, this work presents the Title Model to contribute with the application needs support by the cross layer ontology use and the horizontal addressing, in a next generation Internet. For a practical viewpoint, is showed the network cost reduction for the distributed programming example, in networks with layer 2 connectivity. To prove the title model enhancement, it is presented the network analysis performed for the message passing interface, sending a vector of integers and returning its sum. By this analysis, it is confirmed that the current proposal allows, in this environment, a reduction of 15,23% over the total network traffic, in bytes.
Resumo:
This paper investigates the characteristics of the Power Spectral Density (PSD) of chaotic signals generated by skew tent maps. The influence of the Lyapunov exponent on the autocorrelation sequence and on the PSD is evaluated via computational simulations. We conclude that the essential bandwidth of these signals is strongly related to this exponent and they can be low-pass or high-pass depending on the family`s parameter. This way, the PSD of a chaotic signal is a function of the generating map although this is not a one-to-one relationship. (C) 2009 Elsevier Ltd. All rights reserved.
Resumo:
The increasing adoption of information systems in healthcare has led to a scenario where patient information security is more and more being regarded as a critical issue. Allowing patient information to be in jeopardy may lead to irreparable damage, physically, morally, and socially to the patient, potentially shaking the credibility of the healthcare institution. Medical images play a crucial role in such context, given their importance in diagnosis, treatment, and research. Therefore, it is vital to take measures in order to prevent tampering and determine their provenance. This demands adoption of security mechanisms to assure information integrity and authenticity. There are a number of works done in this field, based on two major approaches: use of metadata and use of watermarking. However, there still are limitations for both approaches that must be properly addressed. This paper presents a new method using cryptographic means to improve trustworthiness of medical images, providing a stronger link between the image and the information on its integrity and authenticity, without compromising image quality to the end user. Use of Digital Imaging and Communications in Medicine structures is also an advantage for ease of development and deployment.
Resumo:
This work aims at proposing the use of the evolutionary computation methodology in order to jointly solve the multiuser channel estimation (MuChE) and detection problems at its maximum-likelihood, both related to the direct sequence code division multiple access (DS/CDMA). The effectiveness of the proposed heuristic approach is proven by comparing performance and complexity merit figures with that obtained by traditional methods found in literature. Simulation results considering genetic algorithm (GA) applied to multipath, DS/CDMA and MuChE and multi-user detection (MuD) show that the proposed genetic algorithm multi-user channel estimation (GAMuChE) yields a normalized mean square error estimation (nMSE) inferior to 11%, under slowly varying multipath fading channels, large range of Doppler frequencies and medium system load, it exhibits lower complexity when compared to both maximum likelihood multi-user channel estimation (MLMuChE) and gradient descent method (GrdDsc). A near-optimum multi-user detector (MuD) based on the genetic algorithm (GAMuD), also proposed in this work, provides a significant reduction in the computational complexity when compared to the optimum multi-user detector (OMuD). In addition, the complexity of the GAMuChE and GAMuD algorithms were (jointly) analyzed in terms of number of operations necessary to reach the convergence, and compared to other jointly MuChE and MuD strategies. The joint GAMuChE-GAMuD scheme can be regarded as a promising alternative for implementing third-generation (3G) and fourth-generation (4G) wireless systems in the near future. Copyright (C) 2010 John Wiley & Sons, Ltd.
Resumo:
Since the computer viruses pose a serious problem to individual and corporative computer systems, a lot of effort has been dedicated to study how to avoid their deleterious actions, trying to create anti-virus programs acting as vaccines in personal computers or in strategic network nodes. Another way to combat viruses propagation is to establish preventive policies based on the whole operation of a system that can be modeled with population models, similar to those that are used in epidemiological studies. Here, a modified version of the SIR (Susceptible-Infected-Removed) model is presented and how its parameters are related to network characteristics is explained. Then, disease-free and endemic equilibrium points are calculated, stability and bifurcation conditions are derived and some numerical simulations are shown. The relations among the model parameters in the several bifurcation conditions allow a network design minimizing viruses risks. (C) 2009 Elsevier Inc. All rights reserved.
Resumo:
Computer viruses are an important risk to computational systems endangering either corporations of all sizes or personal computers used for domestic applications. Here, classical epidemiological models for disease propagation are adapted to computer networks and, by using simple systems identification techniques a model called SAIC (Susceptible, Antidotal, Infectious, Contaminated) is developed. Real data about computer viruses are used to validate the model. (c) 2008 Elsevier Ltd. All rights reserved.
Resumo:
Fruit-set in tomato (Solanum lycopersicum) depends on gibberellins and auxins (GAs). Here, we show, using the cv MicroTom, that application of N-1-naphthylphthalamic acid (NPA; an inhibitor of auxin transport) to unpollinated ovaries induced parthenocarpic fruit-set, associated with an increase of indole-3-acetic acid (IAA) content, and that this effect was negated by paclobutrazol (an inhibitor of GA biosynthesis). NPA-induced ovaries contained higher content of GA(1) (an active GA) and transcripts of GA biosynthetic genes (SlCPS, SlGA20ox1, and -2). Interestingly, application of NPA to pollinated ovaries prevented their growth, potentially due to supraoptimal IAA accumulation. Plant decapitation and inhibition of auxin transport by NPA from the apical shoot also induced parthenocarpic fruit growth of unpollinated ovaries. Application of IAA to the severed stump negated the plant decapitation effect, indicating that the apical shoot prevents unpollinated ovary growth through IAA transport. Parthenocarpic fruit growth induced by plant decapitation was associated with high levels of GA(1) and was counteracted by paclobutrazol treatment. Plant decapitation also produced changes in transcript levels of genes encoding enzymes of GA biosynthesis (SlCPS and SlGA20ox1) in the ovary, quite similar to those found in NPA-induced fruits. All these results suggest that auxin can have opposing effects on fruit-set, either inducing (when accumulated in the ovary) or repressing (when transported from the apical shoot) that process, and that GAs act as mediators in both cases. The effect of NPA application and decapitation on fruit-set induction was also observed in MicroTom lines bearing introgressed DWARF and SELF-PRUNING wild-type alleles.
Resumo:
Symptoms resembling giant calyx, a graft-transmissible disease, were observed on 1-5% of eggplant (aubergine; Solanum melongena L.) plants in production fields in Sao Paulo state, Brazil. Phytoplasmas were detected in 1 2 of 1 2 samples from symptomatic plants that were analysed by a nested PCR assay employing 16S rRNA gene primers R16mF2/R16mR1 followed by R16F2n/R16R2. RFLP analysis of the resulting rRNA gene products (1.2 kb) indicated that all plants contained similar phytoplasmas, each closely resembling strains previously classified as members of RFLP group 16SrIII (X-disease group). Virtual RFLP and phylogenetic analyses of sequences derived from PCR products identified phytoplasmas infecting eggplant crops grown in Piracicaba as a lineage of the subgroup 16SrIII-J, whereas phytoplasmas detected in plants grown in Braganca Paulista were tentatively classified as members of a novel subgroup 16SrIII-U. These findings confirm eggplant as a new host of group 16SrIII-J phytoplasmas and extend the known diversity of strains belonging to this group in Brazil.
Resumo:
Metalloproteinases, especially metal loprotemase-2 (MMP-2), are known for their role in the degradation of the extracellular matrix. Nevertheless, a thorough understanding of MMP-2 expression in neoplastic lesions of the uterine cervix has yet to be accomplished. This study aimed to analyze the MMP-2 expression in cervical intraepithelial neoplasia III (CIN3) and in cervical squamous cell carcinoma, in tumor cells and adjacent stromal cells. MMP-2 expression was assessed by an immunohistochernical technique. MMP-2 expression was greater in the stromal cells of invasive carcinomas than in CIN3 (p < 0.0001). MMP-2 expression in stromal cells correlates with the clinical stage, gradually increasing as the tumor progresses (p = 0.04). This study corroborates that stromal cells play an important role in tumor invasion and progression, mediated by the progressive enhancement of MMP-2 expression from CIN3 to advanced invasive tumor. The intense MMP-2 expression most probably is associated with poor tumor prognosis.
Resumo:
In this work we report on a study of the morphological changes of LDL induced in vitro by metallic ions (Cu(2+) and Fe(3+)). These modifications were characterized by transmission electron microscopy, nuclear magnetic resonance and the Z-scan technique. The degree of oxidative modification of LDL was determined by the TBARS and lipid hydroperoxides assays. It is shown that distinct pathways for modifying lipoproteins lead to different morphological transformations of the particles characterized by changes in size and/or shape of the resulting particles, and by the tendency to induce aggregation of the particles. There were no evidence of melting of particles promoted by oxidative processes with Cu and Fe. (C) 2010 Elsevier Ireland Ltd. All rights reserved.
Resumo:
RECK is an anti-tumoral gene whose activity has been associated with its inhibitory effects regulating MMP-2, MMP-9, and MT1-MMP. RECK level decreases as gliobastoma progresses, varying from less invasive grade II gliomas to very invasive human glioblastoma multiforme (GBM). Since RECK expression and glioma invasiveness show an inverse correlation, the aim of the present study is to investigate whether RECK expression would inhibit glioma invasive behavior. We conducted this study to explore forced RECK expression in the highly invasive T98G human GBM cell line. Expression levels as well as protein levels of RECK, MMP-2, MMP-9, and MT1-MMP were assessed by qPCR and immunoblotting in T98G/RECK+ cells. The invasion and migration capacity of RECK+ cells was inhibited in transwell and wound assays. Dramatic cytoskeleton modifications were observed in the T98G/RECK+ cells, when compared to control cells, such as the abundance of stress fibers (contractile actin-myosin II bundles) and alteration of lamellipodia. T98G/RECK+ cells also displayed phosphorylatecl focal adhesion kinase (P-FAK) in mature focal adhesions associated with stress fibers; whereas P-FAK in control cells was mostly associated with immature focal complexes. Interestingly, the RECK protein was predominantly localized at the leading edge of migrating cells, associated with membrane ruffles. Unexpectedly, introduced expression of RECK effectively inhibited the invasive process through rearrangement of actin filaments, promoting a decrease in migratory ability. This work has associated RECK tumor-suppressing activity with the inhibition of motility and invasion in this GBM model, which are two glioma characteristics responsible for the inefficiency of current available treatments. J. Cell. Biochem. 110: 52-61, 2010. (C) 2010 Wiley-Liss. Inc.
Resumo:
A convenient, mild and highly stereoselective method for C-glycosidation (alkynylation) of D-glucal with various potassium alkynyltrifluoroborates, mediated by BF(3)center dot OEt(2) and involving oxonium intermediates, preferentially provides the alpha-acetylene glycoside products with good yields.
Resumo:
In this Letter, a cysteine-derived prolinamide is described to act as a robust and effective organocatalyst for enantioselective aldol reactions. (c) 2008 Elsevier Ltd. All rights reserved.