61 resultados para Highly resistive layer
Resumo:
Increasing anthropogenic pressures urge enhanced knowledge and understanding of the current state of marine biodiversity. This baseline information is pivotal to explore present trends, detect future modifications and propose adequate management actions for marine ecosystems. Coralligenous outcrops are a highly diverse and structurally complex deep-water habitat faced with major threats in the Mediterranean Sea. Despite its ecological, aesthetic and economic value, coralligenous biodiversity patterns are still poorly understood. There is currently no single sampling method that has been demonstrated to be sufficiently representative to ensure adequate community assessment and monitoring in this habitat. Therefore, we propose a rapid non-destructive protocol for biodiversity assessment and monitoring of coralligenous outcrops providing good estimates of its structure and species composition, based on photographic sampling and the determination of presence/absence of macrobenthic species. We used an extensive photographic survey, covering several spatial scales (100s of m to 100s of km) within the NW Mediterranean and including 2 different coralligenous assemblages: Paramuricea clavata (PCA) and Corallium rubrum assemblage (CRA). This approach allowed us to determine the minimal sampling area for each assemblage (5000 cm² for PCA and 2500 cm²for CRA). In addition, we conclude that 3 replicates provide an optimal sampling effort in order to maximize the species number and to assess the main biodiversity patterns of studied assemblages in variability studies requiring replicates. We contend that the proposed sampling approach provides a valuable tool for management and conservation planning, monitoring and research programs focused on coralligenous outcrops, potentially also applicable in other benthic ecosystems
Resumo:
With the evolution of the P2P research eld, new problems, such as those related with information security, have arisen. It is important to provide security mechanisms to P2P systems, since it has already become one of the key issues when evaluating them. However, even though many P2P systems have been adapted to provide a security baseline to their underlying applications, more advanced capabilities are becoming necessary. Speci cally, privacy preservation and anonymity are deemed essential to make the information society sustainable. Unfortunately, sometimes, it may be di cult to attain anonymity unless it is included into the system's initial design. The JXTA open protocols speci cation is a good example of this kind of scenario. This work studies how to provide anonymity to JXTA's architecture in a feasible manner and proposes an extension which allows deployed services to process two-way messaging without disclosing the endpoints'identities to third parties.
Resumo:
This paper describes an audio watermarking scheme based on lossy compression. The main idea is taken from an image watermarking approach where the JPEG compression algorithm is used to determine where and how the mark should be placed. Similarly, in the audio scheme suggested in this paper, an MPEG 1 Layer 3 algorithm is chosen for compression to determine the position of the mark bits and, thus, the psychoacoustic masking of the MPEG 1 Layer 3compression is implicitly used. This methodology provides with a high robustness degree against compression attacks. The suggested scheme is also shown to succeed against most of the StirMark benchmark attacks for audio.
Resumo:
JXTA define un conjunto de seis protocolos básicos especialmente adecuados para una computación ad hoc, permanente, multi-hop, peer-to-peer (P2P). Estos protocolos permiten que los iguales cooperen y formen grupos autónomos de pares. Este artículo presenta un método que proporciona servicios de seguridad en los protocolos básicos: protección de datos, autenticidad, integridad y no repudio. Los mecanismos que se presentan son totalmente distribuidos y basados ¿¿en un modelo puro peer-to-peer, que no requieren el arbitraje de un tercero de confianza o una relación de confianza establecida previamente entre pares, que es uno de los principales retos en este tipo de entornos.
Resumo:
Broadcast transmission mode in ad hoc networks is critical to manage multihop routing or providing medium accesscontrol (MAC)-layer fairness. In this paper, it is shown that ahigher capacity to exchange information among neighbors may beobtained through a physical-MAC cross-layer design of the broadcastprotocol exploiting signal separation principles. Coherentdetection and separation of contending nodes is possible throughtraining sequences which are selected at random from a reducedset. Guidelines for the design of this set are derived for a lowimpact on the network performance and the receiver complexity.
Resumo:
Currently, MVA virus vectors carrying HIV-1 genes are being developed as HIV-1/AIDS prophylactic/therapeutic vaccines. Nevertheless, little is known about the impact of these vectors on human dendritic cells (DC) and their capacity to present HIV-1 antigens to human HIV-specific T cells. This study aimed to characterize the interaction of MVA and MVA expressing the HIV-1 genes Env-Gag-Pol-Nef of clade B (referred to as MVA-B) in human monocyte-derived dendritic cells (MDDC) and the subsequent processes of HIV-1 antigen presentation and activation of memory HIV-1-specific T lymphocytes. For these purposes, we performed ex vivo assays with MDDC and autologous lymphocytes from asymptomatic HIV-infected patients. Infection of MDDC with MVA-B or MVA, at the optimal dose of 0.3 PFU/MDDC, induced by itself a moderate degree of maturation of MDDC, involving secretion of cytokines and chemokines (IL1-ra, IL-7, TNF-α, IL-6, IL-12, IL-15, IL-8, MCP-1, MIP-1α, MIP-1β, RANTES, IP-10, MIG, and IFN-α). MDDC infected with MVA or MVA-B and following a period of 48 h or 72 h of maturation were able to migrate toward CCL19 or CCL21 chemokine gradients. MVA-B infection induced apoptosis of the infected cells and the resulting apoptotic bodies were engulfed by the uninfected MDDC, which cross-presented HIV-1 antigens to autologous CD8+ T lymphocytes. MVA-B-infected MDDC co-cultured with autologous T lymphocytes induced a highly functional HIV-specific CD8+ T cell response including proliferation, secretion of IFN-γ, IL-2, TNF-α, MIP-1β, MIP-1α, RANTES and IL-6, and strong cytotoxic activity against autologous HIV-1-infected CD4+ T lymphocytes. These results evidence the adjuvant role of the vector itself (MVA) and support the clinical development of prophylactic and therapeutic anti-HIV vaccines based on MVA-B.
Resumo:
Currently, MVA virus vectors carrying HIV-1 genes are being developed as HIV-1/AIDS prophylactic/therapeutic vaccines. Nevertheless, little is known about the impact of these vectors on human dendritic cells (DC) and their capacity to present HIV-1 antigens to human HIV-specific T cells. This study aimed to characterize the interaction of MVA and MVA expressing the HIV-1 genes Env-Gag-Pol-Nef of clade B (referred to as MVA-B) in human monocyte-derived dendritic cells (MDDC) and the subsequent processes of HIV-1 antigen presentation and activation of memory HIV-1-specific T lymphocytes. For these purposes, we performed ex vivo assays with MDDC and autologous lymphocytes from asymptomatic HIV-infected patients. Infection of MDDC with MVA-B or MVA, at the optimal dose of 0.3 PFU/MDDC, induced by itself a moderate degree of maturation of MDDC, involving secretion of cytokines and chemokines (IL1-ra, IL-7, TNF-α, IL-6, IL-12, IL-15, IL-8, MCP-1, MIP-1α, MIP-1β, RANTES, IP-10, MIG, and IFN-α). MDDC infected with MVA or MVA-B and following a period of 48 h or 72 h of maturation were able to migrate toward CCL19 or CCL21 chemokine gradients. MVA-B infection induced apoptosis of the infected cells and the resulting apoptotic bodies were engulfed by the uninfected MDDC, which cross-presented HIV-1 antigens to autologous CD8+ T lymphocytes. MVA-B-infected MDDC co-cultured with autologous T lymphocytes induced a highly functional HIV-specific CD8+ T cell response including proliferation, secretion of IFN-γ, IL-2, TNF-α, MIP-1β, MIP-1α, RANTES and IL-6, and strong cytotoxic activity against autologous HIV-1-infected CD4+ T lymphocytes. These results evidence the adjuvant role of the vector itself (MVA) and support the clinical development of prophylactic and therapeutic anti-HIV vaccines based on MVA-B.
Resumo:
Les emulsions concentrades o altament concentrades de betum són un camp molt poc estudiat avui en dia. El treball és un estat de l'art de tots els papers que hi ha sobre aquest tema desde el mètode tradicional fins el HIPR (High Internal Phase Ratio).
Resumo:
Sudoku problems are some of the most known and enjoyed pastimes, with a never diminishing popularity, but, for the last few years those problems have gone from an entertainment to an interesting research area, a twofold interesting area, in fact. On the one side Sudoku problems, being a variant of Gerechte Designs and Latin Squares, are being actively used for experimental design, as in [8, 44, 39, 9]. On the other hand, Sudoku problems, as simple as they seem, are really hard structured combinatorial search problems, and thanks to their characteristics and behavior, they can be used as benchmark problems for refining and testing solving algorithms and approaches. Also, thanks to their high inner structure, their study can contribute more than studies of random problems to our goal of solving real-world problems and applications and understanding problem characteristics that make them hard to solve. In this work we use two techniques for solving and modeling Sudoku problems, namely, Constraint Satisfaction Problem (CSP) and Satisfiability Problem (SAT) approaches. To this effect we define the Generalized Sudoku Problem (GSP), where regions can be of rectangular shape, problems can be of any order, and solution existence is not guaranteed. With respect to the worst-case complexity, we prove that GSP with block regions of m rows and n columns with m = n is NP-complete. For studying the empirical hardness of GSP, we define a series of instance generators, that differ in the balancing level they guarantee between the constraints of the problem, by finely controlling how the holes are distributed in the cells of the GSP. Experimentally, we show that the more balanced are the constraints, the higher the complexity of solving the GSP instances, and that GSP is harder than the Quasigroup Completion Problem (QCP), a problem generalized by GSP. Finally, we provide a study of the correlation between backbone variables – variables with the same value in all the solutions of an instance– and hardness of GSP.
Resumo:
Random problem distributions have played a key role in the study and design of algorithms for constraint satisfaction and Boolean satisfiability, as well as in ourunderstanding of problem hardness, beyond standard worst-case complexity. We consider random problem distributions from a highly structured problem domain that generalizes the Quasigroup Completion problem (QCP) and Quasigroup with Holes (QWH), a widely used domain that captures the structure underlying a range of real-world applications. Our problem domain is also a generalization of the well-known Sudoku puz- zle: we consider Sudoku instances of arbitrary order, with the additional generalization that the block regions can have rectangular shape, in addition to the standard square shape. We evaluate the computational hardness of Generalized Sudoku instances, for different parameter settings. Our experimental hardness results show that we can generate instances that are considerably harder than QCP/QWH instances of the same size. More interestingly, we show the impact of different balancing strategies on problem hardness. We also provide insights into backbone variables in Generalized Sudoku instances and how they correlate to problem hardness.
Resumo:
(S)-2-(4-Bromo-2,4"-bithiazole)-1-(tert-butoxycarbonyl)pyrrolidine ((S)-1) was obtained as a single enantiomer and in high yield by means of a two-step modified Hantzsch thiazole synthesis reaction when bromoketone 3 and thioamide (S)-4 were used. Further conversion of (S)-1 into trimethyltin derivative (S)-2 broadens the scope for further cross-coupling reactions.
Resumo:
Background MicroRNAs (miRNAs) are short non-coding regulatory RNAs that control gene expression usually producing translational repression and gene silencing. High-throughput sequencing technologies have revealed heterogeneity at length and sequence level for the majority of mature miRNAs (IsomiRs). Most isomiRs can be explained by variability in either Dicer1 or Drosha cleavage during miRNA biogenesis at 5" or 3" of the miRNA (trimming variants). Although isomiRs have been described in different tissues and organisms, their functional validation as modulators of gene expression remains elusive. Here we have characterized the expression and function of a highly abundant miR-101 5"-trimming variant (5"-isomiR-101). Results The analysis of small RNA sequencing data in several human tissues and cell lines indicates that 5"-isomiR-101 is ubiquitously detected and a highly abundant, especially in the brain. 5"- isomiR-101 was found in Ago-2 immunocomplexes and complementary approaches showed that 5"-isomiR-101 interacted with different members of the silencing (RISC) complex. In addition, 5"-isomiR-101 decreased the expression of five validated miR-101 targets, suggesting that it is a functional variant. Both the binding to RISC members and the degree of silencing were less efficient for 5"-isomiR-101 compared with miR-101. For some targets, both miR-101 and 5"-isomiR-101 significantly decreased protein expression with no changes in the respective mRNA levels. Although a high number of overlapping predicted targets suggest similar targeted biological pathways, a correlation analysis of the expression profiles of miR-101 variants and predicted mRNA targets in human brains at different ages, suggest specific functions for miR-101- and 5"-isomiR-101. Conclusions These results suggest that isomiRs are functional variants and further indicate that for a given miRNA, the different isomiRs may contribute to the overall effect as quantitative and qualitative fine-tuners of gene expression.
Resumo:
N-type as well P-type top-gate microcrystalline silicon thin film transistors (TFTs) are fabricated on glass substrates at a maximum temperature of 200 °C. The active layer is an undoped μc-Si film, 200 nm thick, deposited by Hot-Wire Chemical Vapor. The drain and source regions are highly phosphorus (N-type TFTs) or boron (P-type TFTs)-doped μc-films deposited by HW-CVD. The gate insulator is a silicon dioxide film deposited by RF sputtering. Al-SiO 2-N type c-Si structures using this insulator present low flat-band voltage,-0.2 V, and low density of states at the interface D it=6.4×10 10 eV -1 cm -2. High field effect mobility, 25 cm 2/V s for electrons and 1.1 cm 2/V s for holes, is obtained. These values are very high, particularly the hole mobility that was never reached previously.
Resumo:
We develop a method for generating focused vector beams with circular polarization at any transverse plane. Based on the Richards-Wolf vector model, we derive analytical expressions to describe the propagation of these set of beams near the focal area. Since the polarization and the amplitude of the input beam are not uniform, an interferometric system capable of generating spatially-variant polarized beams has to be used. In particular, this wavefront is manipulated by means of spatial light modulators displaying computer generated holograms and subsequently focused using a high numerical aperture objective lens. Experimental results using a NA=0.85 system are provided: irradiance and Stokes images of the focused field at different planes near the focal plane are presented and compared with those obtained by numerical simulation.