106 resultados para Efficient welding
Resumo:
Advances in hardware and software technologies allow to capture streaming data. The area of Data Stream Mining (DSM) is concerned with the analysis of these vast amounts of data as it is generated in real-time. Data stream classification is one of the most important DSM techniques allowing to classify previously unseen data instances. Different to traditional classifiers for static data, data stream classifiers need to adapt to concept changes (concept drift) in the stream in real-time in order to reflect the most recent concept in the data as accurately as possible. A recent addition to the data stream classifier toolbox is eRules which induces and updates a set of expressive rules that can easily be interpreted by humans. However, like most rule-based data stream classifiers, eRules exhibits a poor computational performance when confronted with continuous attributes. In this work, we propose an approach to deal with continuous data effectively and accurately in rule-based classifiers by using the Gaussian distribution as heuristic for building rule terms on continuous attributes. We show on the example of eRules that incorporating our method for continuous attributes indeed speeds up the real-time rule induction process while maintaining a similar level of accuracy compared with the original eRules classifier. We termed this new version of eRules with our approach G-eRules.
Resumo:
Advances in hardware technologies allow to capture and process data in real-time and the resulting high throughput data streams require novel data mining approaches. The research area of Data Stream Mining (DSM) is developing data mining algorithms that allow us to analyse these continuous streams of data in real-time. The creation and real-time adaption of classification models from data streams is one of the most challenging DSM tasks. Current classifiers for streaming data address this problem by using incremental learning algorithms. However, even so these algorithms are fast, they are challenged by high velocity data streams, where data instances are incoming at a fast rate. This is problematic if the applications desire that there is no or only a very little delay between changes in the patterns of the stream and absorption of these patterns by the classifier. Problems of scalability to Big Data of traditional data mining algorithms for static (non streaming) datasets have been addressed through the development of parallel classifiers. However, there is very little work on the parallelisation of data stream classification techniques. In this paper we investigate K-Nearest Neighbours (KNN) as the basis for a real-time adaptive and parallel methodology for scalable data stream classification tasks.
Resumo:
Group 6 complexes of the type [M(CO)4(bpy)] (M=Cr, Mo, W) are capable of behaving as electrochemical catalysts for the reduction of CO2 at potentials less negative than those for the reduction of the radical anions [M(CO)4(bpy)].−. Cyclic voltammetric, chronoamperometric and UV/Vis/IR spectro-electrochemical data reveal that five-coordinate [M(CO)3(bpy)]2− are the active catalysts. The catalytic conversion is significantly more efficient in N-methyl-2-pyrrolidone (NMP) compared to tetrahydrofuran, which may reflect easier CO dissociation from 1e−-reduced [M(CO)4(bpy)].− in the former solvent, followed by second electron transfer. The catalytic cycle may also involve [M(CO)4(H-bpy)]− formed by protonation of [M(CO)3(bpy)]2−, especially in NMP. The strongly enhanced catalysis using an Au working electrode is remarkable, suggesting that surface interactions may play an important role, too.
Resumo:
Neural stem cells (NSCs) are potential sources for cell therapy of neurodegenerative diseases and for drug screening. Despite their potential benefits, ethical and practical considerations limit the application of NSCs derived from human embryonic stem cells (ES) or adult brain tissue. Thus, alternative sources are required to satisfy the criteria of ready accessibility, rapid expansion in chemically defined media and reliable induction to a neuronal fate. We isolated somatic stem cells from the human periodontium that were collected during minimally invasive periodontal access flap surgery as part of guided tissue regeneration therapy. These cells could be propagated as neurospheres in serum-free medium, which underscores their cranial neural crest cell origin. Culture in the presence of epidermal growth factor (EGF) and fibroblast growth factor-2 (FGF-2) under serum-free conditions resulted in large numbers of nestin-positive/Sox-2-positive NSCs. These periodontium-derived (pd) NSCs are highly proliferative and migrate in response to chemokines that have been described as inducing NSC migration. We used immunocytochemical techniques and RT-PCR analysis to assess neural differentiation after treatment of the expanded cells with a novel induction medium. Adherence to substrate, growth factor deprivation, and retinoic acid treatment led to the acquisition of neuronal morphology and stable expression of markers of neuronal differentiation by more than 90% of the cells. Thus, our novel method might provide nearly limitless numbers of neuronal precursors from a readily accessible autologous adult human source, which could be used as a platform for further experimental studies and has potential therapeutic implications.
Resumo:
Due to their broad differentiation potential and their persistence into adulthood, human neural crest-derived stem cells (NCSCs) harbour great potential for autologous cellular therapies, which include the treatment of neurodegenerative diseases and replacement of complex tissues containing various cell types, as in the case of musculoskeletal injuries. The use of serum-free approaches often results in insufficient proliferation of stem cells and foetal calf serum implicates the use of xenogenic medium components. Thus, there is much need for alternative cultivation strategies. In this study we describe for the first time a novel, human blood plasma based semi-solid medium for cultivation of human NCSCs. We cultivated human neural crest-derived inferior turbinate stem cells (ITSCs) within a blood plasma matrix, where they revealed higher proliferation rates compared to a standard serum-free approach. Three-dimensionality of the matrix was investigated using helium ion microscopy. ITSCs grew within the matrix as revealed by laser scanning microscopy. Genetic stability and maintenance of stemness characteristics were assured in 3D cultivated ITSCs, as demonstrated by unchanged expression profile and the capability for self-renewal. ITSCs pre-cultivated in the 3D matrix differentiated efficiently into ectodermal and mesodermal cell types, particularly including osteogenic cell types. Furthermore, ITSCs cultivated as described here could be easily infected with lentiviruses directly in substrate for potential tracing or gene therapeutic approaches. Taken together, the use of human blood plasma as an additive for a completely defined medium points towards a personalisable and autologous cultivation of human neural crest-derived stem cells under clinical grade conditions.
Resumo:
In this paper, we develop an energy-efficient resource-allocation scheme with proportional fairness for downlink multiuser orthogonal frequency-division multiplexing (OFDM) systems with distributed antennas. Our aim is to maximize energy efficiency (EE) under the constraints of the overall transmit power of each remote access unit (RAU), proportional fairness data rates, and bit error rates (BERs). Because of the nonconvex nature of the optimization problem, obtaining the optimal solution is extremely computationally complex. Therefore, we develop a low-complexity suboptimal algorithm, which separates subcarrier allocation and power allocation. For the low-complexity algorithm, we first allocate subcarriers by assuming equal power distribution. Then, by exploiting the properties of fractional programming, we transform the nonconvex optimization problem in fractional form into an equivalent optimization problem in subtractive form, which includes a tractable solution. Next, an optimal energy-efficient power-allocation algorithm is developed to maximize EE while maintaining proportional fairness. Through computer simulation, we demonstrate the effectiveness of the proposed low-complexity algorithm and illustrate the fundamental trade off between energy and spectral-efficient transmission designs.
Resumo:
Water soluble anionic and cationic bis-triazine ligands are able to suppress (mask) the extraction of corrosion and fission products such as Ni(II) and Pd(II) that are found in PUREX raffinates. Thus it is possible to separate these elements from the minor actinide Am(III). Although some masking agents have previously been developed that retard the extraction of Pd(II), this is the first time a masking agent has been developed for Ni(II).
Resumo:
We aim to develop an efficient robotic system for stroke rehabilitation, in which a robotic arm moves the hemiplegic upper limb when the patient tries to move it. In order to achieve this goal we have considered a method to detect the patient's intended motion using EEG (Electroencephalogram), and have designed a rehabilitation robot based on a Redundant Drive Method. In this paper, we propose an EEG driven rehabilitation robot system and present initial results evaluating the feasibility of the proposed system.
Resumo:
This paper investigates the challenge of representing structural differences in river channel cross-section geometry for regional to global scale river hydraulic models and the effect this can have on simulations of wave dynamics. Classically, channel geometry is defined using data, yet at larger scales the necessary information and model structures do not exist to take this approach. We therefore propose a fundamentally different approach where the structural uncertainty in channel geometry is represented using a simple parameterization, which could then be estimated through calibration or data assimilation. This paper first outlines the development of a computationally efficient numerical scheme to represent generalised channel shapes using a single parameter, which is then validated using a simple straight channel test case and shown to predict wetted perimeter to within 2% for the channels tested. An application to the River Severn, UK is also presented, along with an analysis of model sensitivity to channel shape, depth and friction. The channel shape parameter was shown to improve model simulations of river level, particularly for more physically plausible channel roughness and depth parameter ranges. Calibrating channel Manning’s coefficient in a rectangular channel provided similar water level simulation accuracy in terms of Nash-Sutcliffe efficiency to a model where friction and shape or depth were calibrated. However, the calibrated Manning coefficient in the rectangular channel model was ~2/3 greater than the likely physically realistic value for this reach and this erroneously slowed wave propagation times through the reach by several hours. Therefore, for large scale models applied in data sparse areas, calibrating channel depth and/or shape may be preferable to assuming a rectangular geometry and calibrating friction alone.
Resumo:
We present a novel but simple enteric coated sphere formulation containing probiotic bacteria (Lactobacillus casei). Oral delivery of live bacterial cells (LBC) requires live cells to survive firstly manufacturing processes and secondly GI microbicidal defenses including gastric acid. We incorporated live L. casei directly in the granulation liquid, followed by granulation, extrusion, spheronization, drying and spray coating to produce dried live probiotic spheres. A blend of MCC, calcium-crosslinked alginate, and lactose was developed that gave improved live cell survival during manufacturing, and gave excellent protection from gastric acid plus rapid release in intestinal conditions. No significant loss of viability was observed in all steps except drying, which resulted in approximately 1 log loss of viable cells. Eudragit coating was used to protect dried live cells from acid, and microcrystalline cellulose (MCC) was combined with sodium alginate to achieve efficient sphere disintegration leading to rapid and complete bacterial cell release in intestinal conditions. Viability and release of L. casei was evaluated in vitro in simulated GI conditions. Uncoated spheres gave partial acid protection, but enteric coated spheres effectively protected dried probiotic LBC from acid for 2 h, and subsequently released all viable cells within 1h of transfer into simulated intestinal fluid.
Resumo:
The use of economic incentives for biodiversity (mostly Compensation and Reward for Environmental Services including Payment for ES) has been widely supported in the past decades and became the main innovative policy tools for biodiversity conservation worldwide. These policy tools are often based on the insight that rational actors perfectly weigh the costs and benefits of adopting certain behaviors and well-crafted economic incentives and disincentives will lead to socially desirable development scenarios. This rationalist mode of thought has provided interesting insights and results, but it also misestimates the context by which ‘real individuals’ come to decisions, and the multitude of factors influencing development sequences. In this study, our goal is to examine how these policies can take advantage of some unintended behavioral reactions that might in return impact, either positively or negatively, general policy performances. We test the effect of income's origin (‘Low effort’ based money vs. ‘High effort’ based money) on spending decisions (Necessity vs. Superior goods) and subsequent pro social preferences (Future pro-environmental behavior) within Madagascar rural areas, using a natural field experiment. Our results show that money obtained under low effort leads to different consumption patterns than money obtained under high efforts: superior goods are more salient in the case of low effort money. In parallel, money obtained under low effort leads to subsequent higher pro social behavior. Compensation and rewards policies for ecosystem services may mobilize knowledge on behavioral biases to improve their design and foster positive spillovers on their development goals.
Resumo:
The cyclocondensation reaction between rigid, electron-rich aromatic diamines and 1,1′-bis(2,4-dinitrophenyl)-4,4′-bipyridinium (Zincke) salts has been harnessed to produce a series of conjugated oligomers containing up to twelve aromatic/heterocyclic residues. These oligomers exhibit discrete, multiple redox processes accompanied by dramatic changes in electronic absorption spectra.
Resumo:
Cardiac hypertrophy, an important adaptational response, is associated with up-regulation of the immediate early gene, c- jun, which encodes the c-Jun transcription factor. c-Jun may feed back to up-regulate its own transcription and, since the c-Jun N-terminal kinase (JNK) family of mitogen-activated protein kinases (MAPKs) phosphorylate c-Jun(Ser-63/73) to increase its transactivating activity, JNKs are thought to be the principal factors involved in c- jun up-regulation. Hypertrophy in primary cultures of cardiac myocytes is induced by endothelin-1, phenylephrine or PMA, probably through activation of one or more of the MAPK family. These three agonists increased c- jun mRNA with the rank order of potency of PMA approximately endothelin-1>phenylephrine. Up-regulation of c- jun mRNA by endothelin-1 was attenuated by inhibitors of protein kinase C (GF109203X) and the extracellular signal-regulated kinase (ERK) cascade (PD98059 or U0126), but not by inhibitors of the JNK (SP600125) or p38-MAPK (SB203580) cascades. Hyperosmotic shock (0.5 M sorbitol) powerfully activates JNKs, but did not increase c- jun mRNA. These data suggest that ERKs, rather than JNKs, are required for c- jun up-regulation. However, endothelin-1 and phenylephrine induced greater up-regulation of c-Jun protein than PMA and phosphorylation of c-Jun(Ser-63/73) correlated with the level of c-Jun protein. Up-regulation of c-Jun protein by endothelin-1 was attenuated by inhibitors of protein kinase C and the ERK cascade, probably correlating with a primary input of ERKs into transcription. In addition, SP600125 inhibited the phosphorylation of c-Jun(Ser-63/73), attenuated the increase in c-Jun protein induced by endothelin-1 and increased the rate of c-Jun degradation. Thus whereas ERKs are the principal MAPKs required for c- jun transcription, JNKs are necessary to stabilize c-Jun for efficient up-regulation of the protein.
Resumo:
An efficient and rapid synthesis of 1-acetyl-1H-indol-3-yl acetate 1 and its derivatives 7 via the microwave-assisted cyclisation and decarboxylation of 2-[(carboxymethyl)amino]benzoic acids 5 is described. The latter were left to react with acetic anhydride using triethylamine as the base and were subjected to microwave irradiation for 1 minute, at 80 °C with initial power of 300 W. The target 1-acetyl-1H-indol-3-yl acetate 1 and derivatives 7 were isolated in 34-71% yield. In particular, synthesis of 1-acetyl-6-(trifluoromethyl)-1H-indol-3-yl acetate 7f and 1-acetyl-3-methyl-1H-indol-3-yl acetate 7h is reported for the first time.
Resumo:
A Universal Serial Bus (USB) Mass Storage Device (MSD), often termed a USB flash drive, is ubiquitously used to store important information in unencrypted binary format. This low cost consumer device is incredibly popular due to its size, large storage capacity and relatively high transfer speed. However, if the device is lost or stolen an unauthorized person can easily retrieve all the information. Therefore, it is advantageous in many applications to provide security protection so that only authorized users can access the stored information. In order to provide security protection for a USB MSD, this paper proposes a session key agreement protocol after secure user authentication. The main aim of this protocol is to establish session key negotiation through which all the information retrieved, stored and transferred to the USB MSD is encrypted. This paper not only contributes an efficient protocol, but also does not suffer from the forgery attack and the password guessing attack as compared to other protocols in the literature. This paper analyses the security of the proposed protocol through a formal analysis which proves that the information is stored confidentially and is protected offering strong resilience to relevant security attacks. The computational cost and communication cost of the proposed scheme is analyzed and compared to related work to show that the proposed scheme has an improved tradeoff for computational cost, communication cost and security.