148 resultados para Modular invariant theory


Relevância:

20.00% 20.00%

Publicador:

Resumo:

The new complex, [Zr(pda)2]n (1, pda2- = N,N'-bis(neo-pentyl)-ortho-phenylenediamide, n = 1 or 2), prepared by the reaction of 2 equiv of pdaLi2 with ZrCl4, reacts rapidly with halogen oxidants to afford the new product ZrX2(disq)2 (3, X = Cl, Br, I; disq- = N,N'-bis(neo-pentyl)-ortho-diiminosemiquinonate) in which each redox-active ligand has been oxidized by one electron. The oxidation products 3a-c have been structurally characterized and display an unusual parallel stacked arrangement of the disq- ligands in the solid state, with a separation of approximately 3 A. Density functional calculations show a bonding-type interaction between the SOMOs of the disq- ligands to form a unique HOMO while the antibonding linear combination forms a unique LUMO. This orbital configuration leads to a closed-shell-singlet ground-state electron configuration (S = 0). Temperature-dependent magnetism measurements indicate a low-lying triplet excited state at approximately 750 cm-1. In solution, 3a-c show strong disq--based absorption bands that are invariant across the halide series. Taken together these spectroscopic measurements provide experimental values for the one- and two-electron energies that characterize the pi-stacked bonding interaction between the two disq- ligands.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This article builds on the recent policy diffusion literature and attempts to overcome one of its major problems, namely the lack of a coherent theoretical framework. The literature defines policy diffusion as a process where policy choices are interdependent, and identifies several diffusion mechanisms that specify the link between the policy choices of the various actors. As these mechanisms are grounded in different theories, theoretical accounts of diffusion currently have little internal coherence. In this article we put forward an expected-utility model of policy change that is able to subsume all the diffusion mechanisms. We argue that the expected utility of a policy depends on both its effectiveness and the payoffs it yields, and we show that the various diffusion mechanisms operate by altering these two parameters. Each mechanism affects one of the two parameters, and does so in distinct ways. To account for aggregate patterns of diffusion, we embed our model in a simple threshold model of diffusion. Given the high complexity of the process that results, strong analytical conclusions on aggregate patterns cannot be drawn without more extensive analysis which is beyond the scope of this article. However, preliminary considerations indicate that a wide range of diffusion processes may exist and that convergence is only one possible outcome.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The principal objective of the knot theory is to provide a simple way of classifying and ordering all the knot types. Here, we propose a natural classification of knots based on their intrinsic position in the knot space that is defined by the set of knots to which a given knot can be converted by individual intersegmental passages. In addition, we characterize various knots using a set of simple quantum numbers that can be determined upon inspection of minimal crossing diagram of a knot. These numbers include: crossing number; average three-dimensional writhe; number of topological domains; and the average relaxation value

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In recent years there has been an explosive growth in the development of adaptive and data driven methods. One of the efficient and data-driven approaches is based on statistical learning theory (Vapnik 1998). The theory is based on Structural Risk Minimisation (SRM) principle and has a solid statistical background. When applying SRM we are trying not only to reduce training error ? to fit the available data with a model, but also to reduce the complexity of the model and to reduce generalisation error. Many nonlinear learning procedures recently developed in neural networks and statistics can be understood and interpreted in terms of the structural risk minimisation inductive principle. A recent methodology based on SRM is called Support Vector Machines (SVM). At present SLT is still under intensive development and SVM find new areas of application (www.kernel-machines.org). SVM develop robust and non linear data models with excellent generalisation abilities that is very important both for monitoring and forecasting. SVM are extremely good when input space is high dimensional and training data set i not big enough to develop corresponding nonlinear model. Moreover, SVM use only support vectors to derive decision boundaries. It opens a way to sampling optimization, estimation of noise in data, quantification of data redundancy etc. Presentation of SVM for spatially distributed data is given in (Kanevski and Maignan 2004).

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Abstract This PhD thesis addresses the issue of alleviating the burden of developing ad hoc applications. Such applications have the particularity of running on mobile devices, communicating in a peer-to-peer manner and implement some proximity-based semantics. A typical example of such application can be a radar application where users see their avatar as well as the avatars of their friends on a map on their mobile phone. Such application become increasingly popular with the advent of the latest generation of mobile smart phones with their impressive computational power, their peer-to-peer communication capabilities and their location detection technology. Unfortunately, the existing programming support for such applications is limited, hence the need to address this issue in order to alleviate their development burden. This thesis specifically tackles this problem by providing several tools for application development support. First, it provides the location-based publish/subscribe service (LPSS), a communication abstraction, which elegantly captures recurrent communication issues and thus allows to dramatically reduce the code complexity. LPSS is implemented in a modular manner in order to be able to target two different network architectures. One pragmatic implementation is aimed at mainstream infrastructure-based mobile networks, where mobile devices can communicate through fixed antennas. The other fully decentralized implementation targets emerging mobile ad hoc networks (MANETs), where no fixed infrastructure is available and communication can only occur in a peer-to-peer fashion. For each of these architectures, various implementation strategies tailored for different application scenarios that can be parametrized at deployment time. Second, this thesis provides two location-based message diffusion protocols, namely 6Shot broadcast and 6Shot multicast, specifically aimed at MANETs and fine tuned to be used as building blocks for LPSS. Finally this thesis proposes Phomo, a phone motion testing tool that allows to test proximity semantics of ad hoc applications without having to move around with mobile devices. These different developing support tools have been packaged in a coherent middleware framework called Pervaho.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Arising from M. A. Nowak, C. E. Tarnita & E. O. Wilson 466, 1057-1062 (2010); Nowak et al. reply. Nowak et al. argue that inclusive fitness theory has been of little value in explaining the natural world, and that it has led to negligible progress in explaining the evolution of eusociality. However, we believe that their arguments are based upon a misunderstanding of evolutionary theory and a misrepresentation of the empirical literature. We will focus our comments on three general issues.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Introduction and objectives: The AMS 800TM is considered the gold standard for sphincter replacement. However, the one-ring design can erode the urethra and lead to severe complications. A mechanism that could alternatively compress successive segments of the urethra would limit such deleterious outcome. We report 12 weeks animal urethral tissue analysis following implantation of a new modular artificial sphincter. METHODS: The device is composed by three parts: the contractile unit, two rings and an integrated microprocessor. The contractile unit is made of Nitinol fibers. The rings are placed around the urethra to control the flow of urine by squeezing the urethra. They work in a sequential alternative mode and are controlled by a microprocessor connected to an external computer. The computer can reveal specific failure of device components. The device was impkanted in eight male sheep. The rings were positioned around the urethra and the control unit was placed 5cm away. The device was working twenty hours per day; it was open 10min. per hour to allow urination. The animals were sacrificed after 12 weeks. The urethra and the tissues surrounding the control unit were macroscopically and microscopically examined. Two transversal sections crossing the sphincter and two transversal sections crossing the urethra alone were obtained and stained with modified Paragon after resin embedding. Urethra was also embedded in paraffin. The first section was stained with safranin-hematoxylin-eosin, the second section was stained with Masson's Trichrome and the remaining eight sections were available for immunolabelling of the macrophages.Results: The chronic study went uneventful. No clinical infection or pain was observed. The computer registered no specific failure in ring function, Nitinol wires and tube connectors. At explantation, except for a slight grade of lymphocytes in two out of eight specimens, no urethral stricture or atrophy could be observed. Immunohistochemistry confirmed the absence of macrophages. Tissue structure and organization of the urethra with and without artificial sphincter were similar. No migration of the device was observed.Conclusions: The study clearly showed no tissue damage or inflammation of the urethra. Electronic design, preservation of urethral vascularisation and adjustability after implantation are the key ideas to improve the actual AUS. Further studies will be carried out to evaluate this potential.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The objective of this paper is to discuss whether children have a capacity for deonticreasoning that is irreducible to mentalizing. The results of two experiments point tothe existence of such non-mentalistic understanding and prediction of the behaviourof others. In Study 1, young children (3- and 4-year-olds) were told different versionsof classic false-belief tasks, some of which were modified by the introduction of a ruleor a regularity. When the task (a standard change of location task) included a rule, theperformance of 3-year-olds, who fail traditional false-belief tasks, significantly improved.In Study 2, 3-year-olds proved to be able to infer a rule from a social situation and touse it in order to predict the behaviour of a character involved in a modified versionof the false-belief task. These studies suggest that rules play a central role in the socialcognition of young children and that deontic reasoning might not necessarily involvemind reading.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

BACKGROUND: The aim of our study was to assess the feasibility of minimally invasive digestive anastomosis using a modular flexible magnetic anastomotic device made up of a set of two flexible chains of magnetic elements. The assembly possesses a non-deployed linear configuration which allows it to be introduced through a dedicated small-sized applicator into the bowel where it takes the deployed form. A centering suture allows the mating between the two parts to be controlled in order to include the viscerotomy between the two magnetic rings and the connected viscera. METHODS AND PROCEDURES: Eight pigs were involved in a 2-week survival experimental study. In five colorectal anastomoses, the proximal device was inserted by a percutaneous endoscopic technique, and the colon was divided below the magnet. The distal magnet was delivered transanally to connect with the proximal magnet. In three jejunojejunostomies, the first magnetic chain was injected in its linear configuration through a small enterotomy. Once delivered, the device self-assembled into a ring shape. A second magnet was injected more distally through the same port. The centering sutures were tied together extracorporeally and, using a knot pusher, magnets were connected. Ex vivo strain testing to determine the compression force delivered by the magnetic device, burst pressure of the anastomosis, and histology were performed. RESULTS: Mean operative time including endoscopy was 69.2 ± 21.9 min, and average time to full patency was 5 days for colorectal anastomosis. Operative times for jejunojejunostomies were 125, 80, and 35 min, respectively. The postoperative period was uneventful. Burst pressure of all anastomoses was ≥ 110 mmHg. Mean strain force to detach the devices was 6.1 ± 0.98 and 12.88 ± 1.34 N in colorectal and jejunojejunal connections, respectively. Pathology showed a mild-to-moderate inflammation score. CONCLUSIONS: The modular magnetic system showed enormous potential to create minimally invasive digestive anastomoses, and may represent an alternative to stapled anastomoses, being easy to deliver, effective, and low cost.