16 resultados para Evitamento - Avoidance
em AMS Tesi di Dottorato - Alm@DL - Università di Bologna
Resumo:
The growing interest for constellation of small, less expensive satellites is bringing space junk and traffic management to the attention of space community. At the same time, the continuous quest for more efficient propulsion systems put the spotlight on electric (low thrust) propulsion as an appealing solution for collision avoidance. Starting with an overview of the current techniques for conjunction assessment and avoidance, we then highlight the possible problems when a low thrust propulsion is used. The need for accurate propagation model shows up from the conducted simulations. Thus, aiming at propagation models with low computational burden, we study the available models from the literature and propose an analytical alternative to improve propagation accuracy. The model is then tested in the particular case of a tangential maneuver. Results show that the proposed solution significantly improve on state of the art methods and is a good candidate to be used in collision avoidance operations. For instance to propagate satellite uncertainty or optimizing avoidance maneuver when conjunction occurs within few (3-4) orbits from measurements time.
Resumo:
Recent statistics have demonstrated that two of the most important causes of failures of the UAVs (Uninhabited Aerial Vehicle) missions are related to the low level of decisional autonomy of vehicles and to the man machine interface. Therefore, a relevant issue is to design a display/controls architecture which allows the efficient interaction between the operator and the remote vehicle and to develop a level of automation which allows the vehicle the decision about change in mission. The research presented in this paper focuses on a modular man-machine interface simulator for the UAV control, which simulates UAV missions, developed to experiment solution to this problem. The main components of the simulator are an advanced interface and a block defined automation, which comprehend an algorithm that implements the level of automation of the system. The simulator has been designed and developed following a user-centred design approach in order to take into account the operator’s needs in the communication with the vehicle. The level of automation has been developed following the supervisory control theory which says that the human became a supervisor who sends high level commands, such as part of mission, target, constraints, in then-rule, while the vehicle receives, comprehends and translates such commands into detailed action such as routes or action on the control system. In order to allow the vehicle to calculate and recalculate the safe and efficient route, in term of distance, time and fuel a 3D planning algorithm has been developed. It is based on considering UASs representative of real world systems as objects moving in a virtual environment (terrain, obstacles, and no fly zones) which replicates the airspace. Original obstacle avoidance strategies have been conceived in order to generate mission planes which are consistent with flight rules and with the vehicle performance constraints. The interface is based on a touch screen, used to send high level commands to the vehicle, and a 3D Virtual Display which provides a stereoscopic and augmented visualization of the complex scenario in which the vehicle operates. Furthermore, it is provided with an audio feedback message generator. Simulation tests have been conducted with pilot trainers to evaluate the reliability of the algorithm and the effectiveness and efficiency of the interface in supporting the operator in the supervision of an UAV mission. Results have revealed that the planning algorithm calculate very efficient routes in few seconds, an adequate level of workload is required to command the vehicle and that the 3D based interface provides the operator with a good sense of presence and enhances his awareness of the mission scenario and of the vehicle under his control.
Resumo:
This thesis intends to investigate two aspects of Constraint Handling Rules (CHR). It proposes a compositional semantics and a technique for program transformation. CHR is a concurrent committed-choice constraint logic programming language consisting of guarded rules, which transform multi-sets of atomic formulas (constraints) into simpler ones until exhaustion [Frü06] and it belongs to the declarative languages family. It was initially designed for writing constraint solvers but it has recently also proven to be a general purpose language, being as it is Turing equivalent [SSD05a]. Compositionality is the first CHR aspect to be considered. A trace based compositional semantics for CHR was previously defined in [DGM05]. The reference operational semantics for such a compositional model was the original operational semantics for CHR which, due to the propagation rule, admits trivial non-termination. In this thesis we extend the work of [DGM05] by introducing a more refined trace based compositional semantics which also includes the history. The use of history is a well-known technique in CHR which permits us to trace the application of propagation rules and consequently it permits trivial non-termination avoidance [Abd97, DSGdlBH04]. Naturally, the reference operational semantics, of our new compositional one, uses history to avoid trivial non-termination too. Program transformation is the second CHR aspect to be considered, with particular regard to the unfolding technique. Said technique is an appealing approach which allows us to optimize a given program and in more detail to improve run-time efficiency or spaceconsumption. Essentially it consists of a sequence of syntactic program manipulations which preserve a kind of semantic equivalence called qualified answer [Frü98], between the original program and the transformed ones. The unfolding technique is one of the basic operations which is used by most program transformation systems. It consists in the replacement of a procedure-call by its definition. In CHR every conjunction of constraints can be considered as a procedure-call, every CHR rule can be considered as a procedure and the body of said rule represents the definition of the call. While there is a large body of literature on transformation and unfolding of sequential programs, very few papers have addressed this issue for concurrent languages. We define an unfolding rule, show its correctness and discuss some conditions in which it can be used to delete an unfolded rule while preserving the meaning of the original program. Finally, confluence and termination maintenance between the original and transformed programs are shown. This thesis is organized in the following manner. Chapter 1 gives some general notion about CHR. Section 1.1 outlines the history of programming languages with particular attention to CHR and related languages. Then, Section 1.2 introduces CHR using examples. Section 1.3 gives some preliminaries which will be used during the thesis. Subsequentely, Section 1.4 introduces the syntax and the operational and declarative semantics for the first CHR language proposed. Finally, the methodologies to solve the problem of trivial non-termination related to propagation rules are discussed in Section 1.5. Chapter 2 introduces a compositional semantics for CHR where the propagation rules are considered. In particular, Section 2.1 contains the definition of the semantics. Hence, Section 2.2 presents the compositionality results. Afterwards Section 2.3 expounds upon the correctness results. Chapter 3 presents a particular program transformation known as unfolding. This transformation needs a particular syntax called annotated which is introduced in Section 3.1 and its related modified operational semantics !0t is presented in Section 3.2. Subsequently, Section 3.3 defines the unfolding rule and prove its correctness. Then, in Section 3.4 the problems related to the replacement of a rule by its unfolded version are discussed and this in turn gives a correctness condition which holds for a specific class of rules. Section 3.5 proves that confluence and termination are preserved by the program modifications introduced. Finally, Chapter 4 concludes by discussing related works and directions for future work.
Resumo:
Aging is a physiological process characterized by a progressive decline of the “cellular homeostatic reserve”, refereed as the capability to respond suitably to exogenous and endogenous stressful stimuli. Due to their high energetic requests and post-mitotic nature, neurons are peculiarly susceptible to this phenomenon. However, the aged brain maintains a certain level of adaptive capacities and if properly stimulated may warrant a considerable functional recovery. Aim of the present research was to verify the plastic potentialities of the aging brain of rats subjected to two kind of exogenous stimuli: A) the replacement of the standard diet with a ketogenic regimen (the change forces the brain to use ketone bodies (KB) in alternative to glucose to satisfy the energetic needs) and B) a behavioural task able to induce the formation of inhibitory avoidance memory. A) Fifteen male Wistar rats of 19 months of age were divided into three groups (average body weight pair-matched), and fed for 8 weeks with different dietary regimens: i) diet containing 10% medium chain triglycerides (MCT); ii) diet containing 20% MCT; iii) standard commercial chow. Five young (5 months of age) and five old (26-27 months of age) animals fed with the standard diet were used as further controls. The following morphological parameters reflecting synaptic plasticity were evaluated in the stratum moleculare of the hippocampal CA1 region (SM CA1), in the outer molecular layer of the hippocampal dentate gyrus (OML DG), and in the granule cell layer of the cerebellar cortex (GCL-CCx): average area (S), numeric density (Nvs), and surface density (Sv) of synapses, and average volume (V), numeric density (Nvm), and volume density (Vv) of synaptic mitochondria. Moreover, succinic dehydrogenase (SDH) activity was cytochemically determined in Purkinje cells (PC) and V, Nvm, Vv, and cytochemical precipitate area/mitochondrial area (R) of SDH-positive mitochondria were evaluated. In SM CA1, MCT-KDs induced the early appearance of the morphological patterns typical of old animals: higher S and V, and lower Nvs and Nvm. On the contrary, in OML DG, Sv and Vv of MCT-KDs-fed rats were higher (as a result of higher Nvs and Nvm) vs. controls; these modifications are known to improve synaptic function and metabolic supply. The opposite effects of MCT-KDs might reflect the different susceptibility of these brain regions to the aging processes: OML DG is less vulnerable than SM CA1, and the reactivation of ketone bodies uptake and catabolism might occur more efficiently in this region, allowing the exploitation of their peculiar metabolic properties. In GCL-CCx, the results described a new scenario in comparison to that found in the hippocampal formation: 10%MCT-KD induced the early appearance of senescent patterns (decreased Nvs and Nvm; increased V), whereas 20%MCT-KD caused no changes. Since GCL-CCx is more vulnerable to age than DG, and less than CA1, these data further support the hypothesis that MCT-KDs effects in the aging brain critically depend on neuronal vulnerability to age, besides MCT percentage. Regarding PC, it was decided to evaluate only the metabolic effect of the dietetic regimen (20%MCT-KD) characterized by less side effects. KD counteracted age-related decrease in numeric density of SDH-positive mitochondria, and enhanced their energetic efficiency (R was significantly higher in MCT-KD-fed rats vs. all the controls). Since it is well known that Purkinje and dentate gyrus cells are less vulnerable to aging than CA1 neurons, these results corroborate our previous hypothesis. In conclusion, the A) experimental line provides the first evidence that morphological and functional parameters reflecting synaptic plasticity and mitochondrial metabolic competence may be modulated by MCT-KDs in the pre-senescent central nervous system, and that the effects may be heterogeneous in different brain regions. MCT-KDs seem to supply high energy metabolic intermediates and to be beneficial (“anti-aging”) for those neurons that maintain the capability to exploit them. This implies risks but also promising potentialities for the therapeutic use of these diets during aging B) Morphological parameters of synapses and synaptic mitochondria in SM CA1 were investigated in old (26-27 month-old) female Wistar rats following a single trial inhibitory avoidance task. In this memory protocol animals learn to avoid a dark compartment in which they received a mild, inescapable foot-shock. Rats were tested 3 and 6 or 9 hours after the training, divided into good and bad responders according to their performance (retention times above or below 100 s, respectively) and immediately sacrificed. Nvs, S, Sv, Nvm, V, and Vv were evaluated. In the good responder group, the numeric density of synapses and mitochondria was significantly higher and the average mitochondrial volume was significantly smaller 9 hours vs. 6 hours after the training. No significant differences were observed among bad responders. Thus, better performances in passive avoidance memory task are correlated with more efficient plastic remodeling of synaptic contacts and mitochondria in hippocampal CA1. These findings indicate that maintenance of synaptic plastic reactivity during aging is a critical requirement for preserving long-term memory consolidation.
Resumo:
Apple consumption is highly recomended for a healthy diet and is the most important fruit produced in temperate climate regions. Unfortunately, it is also one of the fruit that most ofthen provoks allergy in atopic patients and the only treatment available up to date for these apple allergic patients is the avoidance. Apple allergy is due to the presence of four major classes of allergens: Mal d 1 (PR-10/Bet v 1-like proteins), Mal d 2 (Thaumatine-like proteins), Mal d 3 (Lipid transfer protein) and Mal d 4 (profilin). In this work new advances in the characterization of apple allergen gene families have been reached using a multidisciplinary approach. First of all, a genomic approach was used for the characterization of the allergen gene families of Mal d 1 (task of Chapter 1), Mal d 2 and Mal d 4 (task of Chapter 5). In particular, in Chapter 1 the study of two large contiguos blocks of DNA sequences containing the Mal d 1 gene cluster on LG16 allowed to acquire many new findings on number and orientation of genes in the cluster, their physical distances, their regulatory sequences and the presence of other genes or pseudogenes in this genomic region. Three new members were discovered co-localizing with the other Mal d 1 genes of LG16 suggesting that the complexity of the genetic base of allergenicity will increase with new advances. Many retrotranspon elements were also retrieved in this cluster. Due to the developement of molecular markers on the two sequences, the anchoring of the physical and the genetic map of the region has been successfully achieved. Moreover, in Chapter 5 the existence of other loci for the Thaumatine-like protein family in apple (Mal d 2.03 on LG4 and Mal d 2.02 on LG17) respect the one reported up to now was demonstred for the first time. Also one new locus for profilins (Mal d 4.04) was mapped on LG2, close to the Mal d 4.02 locus, suggesting a cluster organization for this gene family, as is well reported for Mal d 1 family. Secondly, a methodological approach was used to set up an highly specific tool to discriminate and quantify the expression of each Mal d 1 allergen gene (task of Chapter 2). In aprticular, a set of 20 Mal d 1 gene specific primer pairs for the quantitative Real time PCR technique was validated and optimized. As a first application, this tool was used on leaves and fruit tissues of the cultivar Florina in order to identify the Mal d 1 allergen genes that are expressed in different tissues. The differential expression retrieved in this study revealed a tissue-specificity for some Mal d 1 genes: 10/20 Mal d 1 genes were expressed in fruits and, indeed, probably more involved in the allergic reactions; while 17/20 Mal d 1 genes were expressed in leaves challenged with the fungus Venturia inaequalis and therefore probably interesting in the study of the plant defense mechanism. In Chapter 3 the specific expression levels of the 10 Mal d 1 isoallergen genes, found to be expressed in fruits, were studied for the first time in skin and flesh of apples of different genotypes. A complex gene expression profile was obtained due to the high gene-, tissue- and genotype-variability. Despite this, Mal d 1.06A and Mal d 1.07 expression patterns resulted particularly associated with the degree of allergenicity of the different cultivars. They were not the most expressed Mal d 1 genes in apple but here it was hypotized a relevant importance in the determination of allergenicity for both qualitative and quantitative aspects of the Mal d 1 gene expression levels. In Chapter 4 a clear modulation for all the 17 PR-10 genes tested in young leaves of Florina after challenging with the fungus V. inaequalis have been reported but with a peculiar expression profile for each gene. Interestingly, all the Mal d 1 genes resulted up-regulated except Mal d 1.10 that was down-regulated after the challenging with the fungus. The differences in direction, timing and magnitude of induction seem to confirm the hypothesis of a subfunctionalization inside the gene family despite an high sequencce and structure similarity. Moreover, a modulation of PR-10 genes was showed both in compatible (Gala-V. inaequalis) and incompatible (Florina-V. inaequalis) interactions contribute to validate the hypothesis of an indirect role for at least some of these proteins in the induced defense responses. Finally, a certain modulation of PR-10 transcripts retrieved also in leaves treated with water confirm their abilty to respond also to abiotic stress. To conclude, the genomic approach used here allowed to create a comprehensive inventory of all the genes of allergen families, especially in the case of extended gene families like Mal d 1. This knowledge can be considered a basal prerequisite for many further studies. On the other hand, the specific transcriptional approach make it possible to evaluate the Mal d 1 genes behavior on different samples and conditions and therefore, to speculate on their involvement on apple allergenicity process. Considering the double nature of Mal d 1 proteins, as apple allergens and as PR-10 proteins, the gene expression analysis upon the attack of the fungus created the base for unravel the Mal d 1 biological functions. In particular, the knowledge acquired in this work about the PR-10 genes putatively more involved in the specific Malus-V. inaequalis interaction will be helpful, in the future, to drive the apple breeding for hypo-allergenicity genotype without compromise the mechanism of response of the plants to stress conditions. For the future, the survey of the differences in allergenicity among cultivars has to be be thorough including other genotypes and allergic patients in the tests. After this, the allelic diversity analysis with the high and low allergenic cultivars on all the allergen genes, in particular on the ones with transcription levels correlated to allergencity, will provide the genetic background of the low ones. This step from genes to alleles will allow the develop of molecular markers for them that might be used to effectively addressed the apple breeding for hypo-allergenicity. Another important step forward for the study of apple allergens will be the use of a specific proteomic approach since apple allergy is a multifactor-determined disease and only an interdisciplinary and integrated approach can be effective for its prevention and treatment.
Resumo:
Alzheimer's disease (AD) is probably caused by both genetic and environmental risk factors. The major genetic risk factor is the E4 variant of apolipoprotein E gene called apoE4. Several risk factors for developing AD have been identified including lifestyle, such as dietary habits. The mechanisms behind the AD pathogenesis and the onset of cognitive decline in the AD brain are presently unknown. In this study we wanted to characterize the effects of the interaction between environmental risk factors and apoE genotype on neurodegeneration processes, with particular focus on behavioural studies and neurodegenerative processes at molecular level. Towards this aim, we used 6 months-old apoE4 and apoE3 Target Replacement (TR) mice fed on different diets (high intake of cholesterol and high intake of carbohydrates). These mice were evaluated for learning and memory deficits in spatial reference (Morris Water Maze (MWM)) and contextual learning (Passive Avoidance) tasks, which involve the hippocampus and the amygdala, respectively. From these behavioural studies we found that the initial cognitive impairments manifested as a retention deficit in apoE4 mice fed on high carbohydrate diet. Thus, the genetic risk factor apoE4 genotype associated with a high carbohydrate diet seems to affect cognitive functions in young mice, corroborating the theory that the combination of genetic and environmental risk factors greatly increases the risk of developing AD and leads to an earlier onset of cognitive deficits. The cellular and molecular bases of the cognitive decline in AD are largely unknown. In order to determine the molecular changes for the onset of the early cognitive impairment observed in the behavioural studies, we performed molecular studies, with particular focus on synaptic integrity and Tau phosphorylation. The most relevant finding of our molecular studies showed a significant decrease of Brain-derived Neurotrophic Factor (BDNF) in apoE4 mice fed on high carbohydrate diet. Our results may suggest that BDNF decrease found in apoE4 HS mice could be involved in the earliest impairment in long-term reference memory observed in behavioural studies. The second aim of this thesis was to study possible involvement of leptin in AD. There is growing evidence that leptin has neuroprotective properties in the Central Nervous System (CNS). Recent evidence has shown that leptin and its receptors are widespread in the CNS and may provide neuronal survival signals. However, there are still numerous questions, regarding the molecular mechanism by which leptin acts, that remain unanswered. Thus, given to the importance of the involvement of leptin in AD, we wanted to clarify the function of leptin in the pathogenesis of AD and to investigate if apoE genotype affect leptin levels through studies in vitro, in mice and in human. Our findings suggest that apoE4 TR mice showed an increase of leptin in the brain. Leptin levels are also increased in the cerebral spinal fluid of AD patients and apoE4 carriers with AD have higher levels of leptin than apoE3 carriers. Moreover, leptin seems to be expressed by reactive glial cells in AD brains. In vitro, ApoE4 together with Amyloid beta increases leptin production by microglia and astrocytes. Taken together, all these findings suggest that leptin replacement might not be a good strategy for AD therapy. Our results show that high leptin levels were found in AD brains. These findings suggest that, as high leptin levels do not promote satiety in obese individuals, it might be possible that they do not promote neuroprotection in AD patients. Therefore, we hypothesized that AD brain could suffer from leptin resistance. Further studies will be critical to determine whether or not the central leptin resistance in SNC could affect its potential neuroprotective effects.
Resumo:
One of the most interesting challenge of the next years will be the Air Space Systems automation. This process will involve different aspects as the Air Traffic Management, the Aircrafts and Airport Operations and the Guidance and Navigation Systems. The use of UAS (Uninhabited Aerial System) for civil mission will be one of the most important steps in this automation process. In civil air space, Air Traffic Controllers (ATC) manage the air traffic ensuring that a minimum separation between the controlled aircrafts is always provided. For this purpose ATCs use several operative avoidance techniques like holding patterns or rerouting. The use of UAS in these context will require the definition of strategies for a common management of piloted and piloted air traffic that allow the UAS to self separate. As a first employment in civil air space we consider a UAS surveillance mission that consists in departing from a ground base, taking pictures over a set of mission targets and coming back to the same ground base. During all mission a set of piloted aircrafts fly in the same airspace and thus the UAS has to self separate using the ATC avoidance as anticipated. We consider two objective, the first consists in the minimization of the air traffic impact over the mission, the second consists in the minimization of the impact of the mission over the air traffic. A particular version of the well known Travelling Salesman Problem (TSP) called Time-Dependant-TSP has been studied to deal with traffic problems in big urban areas. Its basic idea consists in a cost of the route between two clients depending on the period of the day in which it is crossed. Our thesis supports that such idea can be applied to the air traffic too using a convenient time horizon compatible with aircrafts operations. The cost of a UAS sub-route will depend on the air traffic that it will meet starting such route in a specific moment and consequently on the avoidance maneuver that it will use to avoid that conflict. The conflict avoidance is a topic that has been hardly developed in past years using different approaches. In this thesis we purpose a new approach based on the use of ATC operative techniques that makes it possible both to model the UAS problem using a TDTSP framework both to use an Air Traffic Management perspective. Starting from this kind of mission, the problem of the UAS insertion in civil air space is formalized as the UAS Routing Problem (URP). For this reason we introduce a new structure called Conflict Graph that makes it possible to model the avoidance maneuvers and to define the arc cost function of the departing time. Two Integer Linear Programming formulations of the problem are proposed. The first is based on a TDTSP formulation that, unfortunately, is weaker then the TSP formulation. Thus a new formulation based on a TSP variation that uses specific penalty to model the holdings is proposed. Different algorithms are presented: exact algorithms, simple heuristics used as Upper Bounds on the number of time steps used, and metaheuristic algorithms as Genetic Algorithm and Simulated Annealing. Finally an air traffic scenario has been simulated using real air traffic data in order to test our algorithms. Graphic Tools have been used to represent the Milano Linate air space and its air traffic during different days. Such data have been provided by ENAV S.p.A (Italian Agency for Air Navigation Services).
Resumo:
This thesis deals with distributed control strategies for cooperative control of multi-robot systems. Specifically, distributed coordination strategies are presented for groups of mobile robots. The formation control problem is initially solved exploiting artificial potential fields. The purpose of the presented formation control algorithm is to drive a group of mobile robots to create a completely arbitrarily shaped formation. Robots are initially controlled to create a regular polygon formation. A bijective coordinate transformation is then exploited to extend the scope of this strategy, to obtain arbitrarily shaped formations. For this purpose, artificial potential fields are specifically designed, and robots are driven to follow their negative gradient. Artificial potential fields are then subsequently exploited to solve the coordinated path tracking problem, thus making the robots autonomously spread along predefined paths, and move along them in a coordinated way. Formation control problem is then solved exploiting a consensus based approach. Specifically, weighted graphs are used both to define the desired formation, and to implement collision avoidance. As expected for consensus based algorithms, this control strategy is experimentally shown to be robust to the presence of communication delays. The global connectivity maintenance issue is then considered. Specifically, an estimation procedure is introduced to allow each agent to compute its own estimate of the algebraic connectivity of the communication graph, in a distributed manner. This estimate is then exploited to develop a gradient based control strategy that ensures that the communication graph remains connected, as the system evolves. The proposed control strategy is developed initially for single-integrator kinematic agents, and is then extended to Lagrangian dynamical systems.
Resumo:
La ricerca oggetto della tesi riguarda la disamina delle esperienze comunitarie e nazionali in Europa in materia di elusione IVA ed antielusione IVA, al fine di esaminare le utilizzabili esperienze in materia per la Cina che dovrebbe iniziare a prendere le giuste azioni per fronteggiare il problema della crescente diffusione dei fenomeni dell’elusione IVA, in particolare nel contesto della riforma perdurante dell’IVA cinese verso il modello moderno. A questo fine, prima la tesi ha analizzato dettagliatamente le seguenti principali questioni sulla base delle esperienze comunitarie e nazionali dei determinati Stati Membri dell’UE: la definizione dell’elusione fiscale generale (a tale proposito, più rilevanti le differenze tra elusione fiscale ed altri relativi concetti come risparmio d’imposta, evasione fiscale e simulazione e la relazione intrinseca tra elusione fiscale ed altri relativi concetti come frode alla legge ed abuso del diritto), la definizione dell’elusione IVA (a tale proposito, più rilevanti gli aspetti di particolare interesse ai fini della definizione dell’elusione IVA), i principi e metodologie dell’elusione IVA, le applicazioni delle varie misure antielusive rivolte all’elusione IVA nell’ordinamento comunitario e negli ordinamenti interni degli alcuni principali Stati Membri dell’UE (a tale proposito, più rilevanti l’applicazone del principio Halifax, quale norma antielusiva generale basata sul principio di divieto dell’abuso del diritto, e la considerazione delle altre soluzioni antielusive applicabili nell’IVA, comprese correzioni normative e clausole antielusive specifiche), gli effetti dell’antielusione IVA e i limiti entro cui l’autorità impositiva può esercitare l’antielusione IVA per la tutela degli interessi legittimi dei soggetti passivi come certezza giuridica ed autonomia contrattuale. Poi, la tesi ha avanzato le proposte relative al perfezionamento delle soluzioni antielusive IVA nell’ordinamento tributario cinese, dopo presentati i principali regimi attuali dell’IVA cinese e analizzate le situazioni attuali realtive all’elusione IVA e all’antielusione IVA nel sistema fiscale cinese.
Resumo:
Objective: to evaluate the psychopathological profile in primary Restless Legs Syndrome (p-RLS) patients with and without nocturnal eating disorder (NED), analysing obsessive-compulsive traits, mood and anxiety disorder, and the two domains of personality proposed by Cloninger, temperament and character. Methods: we tested ten p-RLS patients without NED, ten p-RLS patients with NED and ten healthy control subjects, age and sex-matched, using Hamilton Depression and Anxiety Rating Scales, State-Trait Anxiety Inventory, Maudsley Obsessive Compulsive Inventory (MOCI) and Temperament and Character Inventory - revised (TCI). Results: p-RLS patients, particularly those with NED, had increased anxiety factor scores. MOCI-total, doubting and checking compulsion, and TCI-harm avoidance scores were significantly higher in p-RLS patients with NED. p-RLS patients without NED had significantly higher MOCI-doubting scores and a trend toward higher checking compulsion and harm avoidance scores with an apparent grading from controls to p-RLS patients without NED to p-RLS with NED. Conclusions: higher harm avoidance might predispose to display obsessive-compulsive symptoms, RLS and then, with increasing severity, compulsive nocturnal eating. RLS and NED could represent a pathological continuum in which a dysfunction in the limbic system, possibly driven by a dopaminergic dysfunction, could be the underlying pathophysiological mechanism.
Resumo:
Progress in miniaturization of electronic components and design of wireless systems paved the way towards ubiquitous and pervasive communications, enabling anywhere and anytime connectivity. Wireless devices present on, inside, around the human body are becoming commonly used, leading to the class of body-centric communications. The presence of the body with all its peculiar characteristics has to be properly taken into account in the development and design of wireless networks in this context. This thesis addresses various aspects of body-centric communications, with the aim of investigating network performance achievable in different scenarios. The main original contributions pertain to the performance evaluation for Wireless Body Area Networks (WBANs) at the Medium Access Control layer: the application of Link Adaptation to these networks is proposed, Carrier Sense Multiple Access with Collision Avoidance algorithms used for WBAN are extensively investigated, coexistence with other wireless systems is examined. Then, an analytical model for interference in wireless access network is developed, which can be applied to the study of communication between devices located on humans and fixed nodes of an external infrastructure. Finally, results on experimental activities regarding the investigation of human mobility and sociality are presented.
Resumo:
The present dissertation focuses on the dual number in Ancient Greek in a diachronical lapse stretching from the Mycenaean age to the Attic Drama and Comedy of the 5th century BC. In the first chapter morphological issues are addressed, chiefly in a comparative perspective. The Indo European evidence on the dual is hence gathered in order to sketch patterns of grammaticalisation and paradigmatisation of specific grams, growing increasingly functional within the Greek domain. In the second chapter syntactical problems are tackled. After a survey of scholarly literature on the Greek dual, we engage in a functional and typological approach, in order to disentangle some biased assessments on the dual, namely its alleged lack of regularity and intermittent agreement. Some recent frameworks in General Linguistics provide useful grounds for casting new light on the subject. Internal Reconstruction, for instance, supports the facultativity of the dual in each and every stage of its development; Typology and the Animacy Hierarcy add precious cross linguistical insight on the behaviour of the dual toward agreement. Glaring differences also arise as to the adoption — or avoidance — of the dual by different authors. Idiolectal varieties prove in fact conditioned by stylistical and register necessity. By means of a comparison among Epics, Tragedy and Comedy it is possible to enhance differences in the evaluation of the dual, which led sometimes to forms of ‘censure’ — thus triggering the onset of competing strategies to express duality. The last two chapters delve into the tantalising variety of the Homeric evidence, first of all in an account of the notorious issue of the Embassy of Iliad IX, and last in a commentary of all significant Homeric duals — mostly represented by archaisms, formulae, and ad hoc coinages.
Resumo:
A permutation is said to avoid a pattern if it does not contain any subsequence which is order-isomorphic to it. Donald Knuth, in the first volume of his celebrated book "The art of Computer Programming", observed that the permutations that can be computed (or, equivalently, sorted) by some particular data structures can be characterized in terms of pattern avoidance. In more recent years, the topic was reopened several times, while often in terms of sortable permutations rather than computable ones. The idea to sort permutations by using one of Knuth’s devices suggests to look for a deterministic procedure that decides, in linear time, if there exists a sequence of operations which is able to convert a given permutation into the identical one. In this thesis we show that, for the stack and the restricted deques, there exists an unique way to implement such a procedure. Moreover, we use these sorting procedures to create new sorting algorithms, and we prove some unexpected commutation properties between these procedures and the base step of bubblesort. We also show that the permutations that can be sorted by a combination of the base steps of bubblesort and its dual can be expressed, once again, in terms of pattern avoidance. In the final chapter we give an alternative proof of some enumerative results, in particular for the classes of permutations that can be sorted by the two restricted deques. It is well-known that the permutations that can be sorted through a restricted deque are counted by the Schrӧder numbers. In the thesis, we show how the deterministic sorting procedures yield a bijection between sortable permutations and Schrӧder paths.
Resumo:
Il temperamento può essere definito come l’attitudine che un cane esprime verso le persone e verso altri animali, la combinazione di tratti fisici e mentali, acquisiti e non, che determinano il comportamento del cane. Tale parametro delinea perciò il carattere di un individuo, inclinazioni e tendenze, eccitabilità, tristezza, rabbia e il modo caratteristico di comportarsi di un individuo, con particolare riferimento alle interazioni sociali. La presente tesi di Dottorato rappresenta uno studio su alcuni tratti del temperamento nel cane domestico elaborato in 3 progetti sperimentali. Nei primi due progetti sono state analizzate le differenze attitudinali tra alcune razze canine attraverso l’applicazione di un test di temperamento in cuccioli di 60 giorni e in cani adulti, per valutare e confrontarne il temperamento, la socialità ed identificare profili tipici di razza. Nel terzo progetto un campione di cani morsicatori di canile e di proprietà è stato confrontato con due rispettivi gruppi di controllo. Analizzando i risultati è stato possibile mettere in evidenza caratteristiche di razza omogenee nell’interazione con stimoli inanimati, nelle interazioni sociali e in relazione alla possessività e sono stati delineati profili di razza sia nei cuccioli sia negli adulti. Si sono tuttavia, osservate variabilità individuali, intra-razza e intra-cucciolata, a testimonianza dell’influenza complessa e multifattoriale delle componenti genetica e ambientale sul comportamento dei cani. Il confronto tra cani morsicatori di canile e di proprietà ha messo in luce interessanti differenze tra i soggetti in termini di reattività, socievolezza, propensione all’interazione con il proprietario o con un estraneo, comportamenti di evitamento e velocità di reazione agli stimoli presentati. Il test applicato è risultato un valido strumento per valutare il temperamento di cani dichiarati aggressivi che sono stati sottoposti a situazioni nuove e a stimoli sconosciuti per poter ottenere una migliore visione d’insieme del temperamento del soggetto.
Resumo:
The main areas of research of this thesis are Interference Management and Link-Level Power Efficiency for Satellite Communications. The thesis is divided in two parts. Part I tackles the problem of interference environments in satellite communications, and interference mitigation strategies, not just in terms of avoidance of the interferers, but also in terms of actually exploiting the interference present in the system as a useful signal. The analysis follows a top-down approach across different levels of investigation, starting from system level consideration on interference management, down to link-level aspects and to intra-receiver design. Interference Management techniques are proposed at all the levels of investigation, with interesting results. Part II is related to efficiency in the power domain, for instance in terms of required Input Back-off at the power amplifiers, which can be an issue for waveform based on linear modulations, due to their varying envelope. To cope with such aspects, an analysis is carried out to compare linear modulation with waveforms based on constant envelope modulations. It is shown that in some scenarios, constant envelope waveforms, even if at lower spectral efficiency, outperform linear modulation waveform in terms of energy efficiency.