102 resultados para Unlawful and intentional interference
em CentAUR: Central Archive University of Reading - UK
Resumo:
The authors investigated whether heart rate (HR) responses to voluntary recall of trauma memories (a) are related to posttraumatic stress disorder (PTSD), and (b) predict recovery 6 months later. Sixty-two assault survivors completed a recall task modeled on imaginal reliving in the initial weeks postassault. Possible cognitive modulators of HR responsivity were assessed; dissociation, rumination, trauma memory disorganization. Individuals with PTSD showed a reduced HR response to reliving compared to those without PTSD, but reported greater distress. Notably, higher HR response but not self-reported distress during reliving predicted greater symptom reduction at follow-up in participants with PTSD. Engagement in rumination was the only cognitive factor that predicted lower HR response. The data are in contrast to studies using trauma reminders to trigger memories, which have found greater physiological reactivity in PTSD. The authors' observations are consistent with models of PTSD that highlight differences between cued or stimulus-driven retrieval and intentional trauma recall, and with E B. Foa and M.J. Kozak (1986) hypothesis that full activation of trauma memories facilitates emotional processing.
Resumo:
Information modelling is a topic that has been researched a great deal, but still many questions around it have not been solved. An information model is essential in the design of a database which is the core of an information system. Currently most of databases only deal with information that represents facts, or asserted information. The ability of capturing semantic aspect has to be improved, and yet other types, such as temporal and intentional information, should be considered. Semantic Analysis, a method of information modelling, has offered a way to handle various aspects of information. It employs the domain knowledge and communication acts as sources of information modelling. It lends itself to a uniform structure whereby semantic, temporal and intentional information can be captured, which builds a sound foundation for building a semantic temporal database.
Resumo:
In civil applications, many researches on MIMO technique have achieved great progress. However, we consider military applications here. Differing from civil applications, military MIMO system may face many kinds of interferences, and the interference source may even not be equipped with multiple antennas. So the military MIMO system may receive some kind of strong interference coming from certain direction. Therefore, the military MIMO system must have capability to suppress directional interference. This paper presents a scheme to suppress directional interference for STBC MIMO system based on beam-forming. Simulation result shows that the scheme is valid to suppress directional strong interference for STBC MIMO system although with some performance loss compared with the ideal case of non-interference.
Resumo:
The effect of the surrounding lower buildings on the wind pressure distribution on a high-rise building is investigated by computational fluid dynamics (CFD). When B/H=0.1, it is found that the wind pressure on the windward side was reduced especially on the lower part, but for different layers of surrounding buildings, there was no great difference, which agrees with our previous wind tunnel experiment data. Then we changed the aspect ratio from 0.1 to 2, to represent different airflow regimes: skimming flow (SF), and wake interference (WI). It shows that the average Cp increases when B/H increases. For different air flow regimes, it is found that insignificant difference exists when the number of the building layers is more than 2. From the engineering point of view, it is sufficient to only include the first layer for natural ventilation design by using CFD simulation or wind tunnel experiment.
Resumo:
Human ICT implants, such as RFID implants, cochlear implants, cardiac pacemakers, Deep Brain Stimulation, bionic limbs connected to the nervous system, and networked cognitive prostheses, are becoming increasingly complex. With ever-growing data processing functionalities in these implants, privacy and security become vital concerns. Electronic attacks on human ICT implants can cause significant harm, both to implant subjects and to their environment. This paper explores the vulnerabilities which human implants pose to crime victimisation in light of recent technological developments, and analyses how the law can deal with emerging challenges of what may well become the next generation of cybercrime: attacks targeted at technology implanted in the human body. After a state-of-the-art description of relevant types of human implants and a discussion how these implants challenge existing perceptions of the human body, we describe how various modes of attacks, such as sniffing, hacking, data interference, and denial of service, can be committed against implants. Subsequently, we analyse how these attacks can be assessed under current substantive and procedural criminal law, drawing on examples from UK and Dutch law. The possibilities and limitations of cybercrime provisions (eg, unlawful access, system interference) and bodily integrity provisions (eg, battery, assault, causing bodily harm) to deal with human-implant attacks are analysed. Based on this assessment, the paper concludes that attacks on human implants are not only a new generation in the evolution of cybercrime, but also raise fundamental questions on how criminal law conceives of attacks. Traditional distinctions between physical and non-physical modes of attack, between human bodies and things, between exterior and interior of the body need to be re-interpreted in light of developments in human implants. As the human body and technology become increasingly intertwined, cybercrime legislation and body-integrity crime legislation will also become intertwined, posing a new puzzle that legislators and practitioners will sooner or later have to solve.
Resumo:
In this reply to Neal and Hesketh and to the commentators, we argue that implicit knowledge is partly abstract and can be usefully defined by the criteria of both metaknowledge and intentional control. We suggest that the pattern of dissociations supports a claim of separate implicit and explicit learning modes. According to our characterization, implicit learning leads to knowledge that is not automatically represented as knowledge by the learning process; instead, the presence of knowledge has to be inferred by the subject (partial explicitation) if metaknowledge is gained at all. During explicit learning, knowledge is automatically labeled as knowledge by the learning process, so that metaknowledge comes immediately and to the fullest extent. Finally, we suggest that implicit knowledge may to some degree apply regardless of intention.
Resumo:
A bit-level processing (BLP) based linear CDMA detector is derived following the principle of minimum variance distortionless response (MVDR). The combining taps for the MVDR detector are determined from (1) the covariance matrix of the matched filter output, and (2) the corresponding row (or column) of the user correlation matrix. Due to the interference suppression capability of MVDR and the fact that no inversion of the user correlation matrix is involved, the influence of the synchronisation errors is greatly reduced. The detector performance is demonstrated via computer simulations (both synchronisation errors and intercell interference are considered).
Resumo:
This paper investigates the effect of time offset errors on the partial parallel interference canceller (PIC) and compares the performance of it against that of the standard PIC. The BER performances of the standard and partial interference cancellers are simulated in a near far environment with varying time offset errors. These simulations indicate that whilst timing errors significantly affect the performance of both these schemes, they do not diminish the gains that are realised by the partial PIC over that of the standard PIC.
Resumo:
Myostatin is a negative regulator of muscle mass, and several strategies are being developed to knockdown its expression to improve muscle-wasting conditions. Strategies using antimyostatin-blocking antibodies, inhibitory-binding partners, signal transduction blockers, and RNA interference system (RNAi)-based knockdown have yielded promising results and increased muscle mass in experimental animals. These approaches have, however, a number of disadvantages such as transient effects or adverse immune complications. We report here the use of antisense oligonucleotides (AOs) to manipulate myostatin pre-mRNA splicing and knockdown myostatin expression. Both 2’O-methyl phosphorothioate RNA (2’OMePS) and phosphorodiamidate morpholino oligomers (PMO) led to efficient exon skipping in vitro and in vivo and knockdown of myostatin at the transcript level. The substantial myostatin exon skipping observed after systemic injection of Vivo-PMO into normal mice led to a significant increase in soleus muscle mass as compared to the controls injected with normal saline suggesting that this approach could be feasible to ameliorate muscle-wasting pathologies.
Resumo:
This paper focuses on active networks applications and in particular on the possible interactions among these applications. Active networking is a very promising research field which has been developed recently, and which poses several interesting challenges to network designers. A number of proposals for e±cient active network architectures are already to be found in the literature. However, how two or more active network applications may interact has not being investigated so far. In this work, we consider a number of applications that have been designed to exploit the main features of active networks and we discuss what are the main benefits that these applications may derive from them. Then, we introduce some forms of interaction including interference and communications among applications, and identify the components of an active network architecture that are needed to support these forms of interaction. We conclude by presenting a brief example of an active network application exploiting the concept of interaction.
Resumo:
Fig trees are pollinated by fig wasps, which also oviposit in female flowers. The wasp larvae gall and eat developing seeds. Although fig trees benefit from allowing wasps to oviposit, because the wasp offspring disperse pollen, figs must prevent wasps from ovipositing in all flowers, or seed production would cease, and the mutualism would go extinct. In Ficus racemosa, we find that syconia (‘figs’) that have few foundresses (ovipositing wasps) are underexploited in the summer (few seeds, few galls, many empty ovules) and are overexploited in the winter (few seeds, many galls, few empty ovules). Conversely, syconia with many foundresses produce intermediate numbers of galls and seeds, regardless of season. We use experiments to explain these patterns, and thus, to explain how this mutualism is maintained. In the hot summer, wasps suffer short lifespans and therefore fail to oviposit in many flowers. In contrast, cooler temperatures in the winter permit longer wasp lifespans, which in turn allows most flowers to be exploited by the wasps. However, even in winter, only in syconia that happen to have few foundresses are most flowers turned into galls. In syconia with higher numbers of foundresses, interference competition reduces foundress lifespans, which reduces the proportion of flowers that are galled. We further show that syconia encourage the entry of multiple foundresses by delaying ostiole closure. Taken together, these factors allow fig trees to reduce galling in the wasp-benign winter and boost galling (and pollination) in the wasp-stressing summer. Interference competition has been shown to reduce virulence in pathogenic bacteria. Our results show that interference also maintains cooperation in a classic, cooperative symbiosis, thus linking theories of virulence and mutualism. More generally, our results reveal how frequency-dependent population regulation can occur in the fig-wasp mutualism, and how a host species can ‘set the rules of the game’ to ensure mutualistic behavior in its symbionts.
Resumo:
The VISIR instrument for the European Southern Observatory (ESO) Very Large Telescope (VLT) is a thermal-infrared imager and spectrometer currently being developed by the French Service d'Astrophysique of CEA Saclay, and Dutch NFRA ASTRON Dwingeloo consortium. This cryogenic instrument will employ precision infrared bandpass filters in the N-( =7.5-14µm) and Q-( =16-28µm) band mid-IR atmospheric windows to study interstellar and circumstellar environments crucial for star and planetary formation theories. As the filters in these mid-IR wavelength ranges are of interest to many astronomical cryogenic instruments, a worldwide astronomical filter consortium was set up with participation from 12 differing institutes, each requiring instrument specific filter operating environments and optical metrology. This paper describes the design and fabrication methods used to manufacture these astronomical consortium filters, including the rationale for the selection of multilayer coating designs, temperature-dependant optical properties of the filter materials and FTIR spectral measurements showing the changes in passband and blocking performance on cooling to <50K. We also describe the development of a 7-14µm broadband antireflection coating deposited on Ge lenses and KRS-5 grisms for cryogenic operation at 40K
Resumo:
The General Packet Radio Service (GPRS) has been developed for the mobile radio environment to allow the migration from the traditional circuit switched connection to a more efficient packet based communication link particularly for data transfer. GPRS requires the addition of not only the GPRS software protocol stack, but also more baseband functionality for the mobile as new coding schemes have be en defined, uplink status flag detection, multislot operation and dynamic coding scheme detect. This paper concentrates on evaluating the performance of the GPRS coding scheme detection methods in the presence of a multipath fading channel with a single co-channel interferer as a function of various soft-bit data widths. It has been found that compressing the soft-bit data widths from the output of the equalizer to save memory can influence the likelihood decision of the coding scheme detect function and hence contribute to the overall performance loss of the system. Coding scheme detection errors can therefore force the channel decoder to either select the incorrect decoding scheme or have no clear decision which coding scheme to use resulting in the decoded radio block failing the block check sequence and contribute to the block error rate. For correct performance simulation, the performance of the full coding scheme detection must be taken into account.