980 resultados para information pattern
Resumo:
Through numerical modeling, we illustrate the possibility of a new approach to digital signal processing in coherent optical communications based on the application of the so-called inverse scattering transform. Considering without loss of generality a fiber link with normal dispersion and quadrature phase shift keying signal modulation, we demonstrate how an initial information pattern can be recovered (without direct backward propagation) through the calculation of nonlinear spectral data of the received optical signal. © 2013 Optical Society of America.
Resumo:
By modification of the classical retrodirective arrays (RDAs) architecture a directional modulation (DM) transmitter can be realized without the need for synthesis. Importantly, through analytical analysis and exemplar simulations, it is proved that, besides the conventional DM application scenario, i.e., secure transmission to one legitimate receiver located along one spatial direction in free space, the proposed synthesis-free DM transmitter should also perform well for systems where there are more than one legitimate receivers positioned along different directions in free space, and where one or more legitimate receivers exist in a multipath environment. None of these have ever been achieved before using synthesis-free DM arrangements.
Resumo:
Information systems for business are frequently heavily reliant on software. Two important feedback-related effects of embedding software in a business process are identified. First, the system dynamics of the software maintenance process can become complex, particularly in the number and scope of the feedback loops. Secondly, responsiveness to feedback can have a big effect on the evolvability of the information system. Ways have been explored to provide an effective mechanism for improving the quality of feedback between stakeholders during software maintenance. Understanding can be improved by using representations of information systems that are both service-based and architectural in scope. The conflicting forces that encourage change or stability can be resolved using patterns and pattern languages. A morphology of information systems pattern languages has been described to facilitate the identification and reuse of patterns and pattern languages. The kind of planning process needed to achieve consensus on a system's evolution is also considered.
Resumo:
Burst firing is ubiquitous in nervous systems and has been intensively studied in central pattern generators (CPGs). Previous works have described subtle intraburst spike patterns (IBSPs) that, despite being traditionally neglected for their lack of relation to CPG motor function, were shown to be cell-type specific and sensitive to CPG connectivity. Here we address this matter by investigating how a bursting motor neuron expresses information about other neurons in the network. We performed experiments on the crustacean stomatogastric pyloric CPG, both in control conditions and interacting in real-time with computer model neurons. The sensitivity of postsynaptic to presynaptic IBSPs was inferred by computing their average mutual information along each neuron burst. We found that details of input patterns are nonlinearly and inhomogeneously coded through a single synapse into the fine IBSPs structure of the postsynaptic neuron following burst. In this way, motor neurons are able to use different time scales to convey two types of information simultaneously: muscle contraction (related to bursting rhythm) and the behavior of other CPG neurons (at a much shorter timescale by using IBSPs as information carriers). Moreover, the analysis revealed that the coding mechanism described takes part in a previously unsuspected information pathway from a CPG motor neuron to a nerve that projects to sensory brain areas, thus providing evidence of the general physiological role of information coding through IBSPs in the regulation of neuronal firing patterns in remote circuits by the CNS.
Resumo:
We present information-theory analysis of the tradeoff between bit-error rate improvement and the data-rate loss using skewed channel coding to suppress pattern-dependent errors in digital communications. Without loss of generality, we apply developed general theory to the particular example of a high-speed fiber communication system with a strong patterning effect. © 2007 IEEE.
Resumo:
This paper introduces an encoding of knowledge representation statements as regular languages and proposes a two-phase approach to processing of explicitly declared conceptual information. The idea is presented for the simple conceptual graphs where conceptual pattern search is implemented by the so called projection operation. Projection calculations are organised into off-line preprocessing and run-time computations. This enables fast run-time treatment of NP-complete problems, given that the intermediate results of the off-line phase are kept in suitable data structures. The experiments with randomly-generated, middle-size knowledge bases support the claim that the suggested approach radically improves the run-time conceptual pattern search.
Resumo:
Protecting confidential information from improper disclosure is a fundamental security goal. While encryption and access control are important tools for ensuring confidentiality, they cannot prevent an authorized system from leaking confidential information to its publicly observable outputs, whether inadvertently or maliciously. Hence, secure information flow aims to provide end-to-end control of information flow. Unfortunately, the traditionally-adopted policy of noninterference, which forbids all improper leakage, is often too restrictive. Theories of quantitative information flow address this issue by quantifying the amount of confidential information leaked by a system, with the goal of showing that it is intuitively "small" enough to be tolerated. Given such a theory, it is crucial to develop automated techniques for calculating the leakage in a system. ^ This dissertation is concerned with program analysis for calculating the maximum leakage, or capacity, of confidential information in the context of deterministic systems and under three proposed entropy measures of information leakage: Shannon entropy leakage, min-entropy leakage, and g-leakage. In this context, it turns out that calculating the maximum leakage of a program reduces to counting the number of possible outputs that it can produce. ^ The new approach introduced in this dissertation is to determine two-bit patterns, the relationships among pairs of bits in the output; for instance we might determine that two bits must be unequal. By counting the number of solutions to the two-bit patterns, we obtain an upper bound on the number of possible outputs. Hence, the maximum leakage can be bounded. We first describe a straightforward computation of the two-bit patterns using an automated prover. We then show a more efficient implementation that uses an implication graph to represent the two- bit patterns. It efficiently constructs the graph through the use of an automated prover, random executions, STP counterexamples, and deductive closure. The effectiveness of our techniques, both in terms of efficiency and accuracy, is shown through a number of case studies found in recent literature. ^
Resumo:
Despite the remarkable improvements in breast cancer (BC) characterization, accurate prediction of BC clinical behavior is often still difficult to achieve. Some studies have investigated the association between the molecular subtype, namely the basal-like BC and the pattern of relapse, however only few investigated the association between relapse pattern and immunohistochemical defined triple-negative breast cancers (TNBCs). The aim of this study was to evaluate the pattern of relapse in patients with TNBC, namely the primary distant relapse site. One-hundred twenty nine (129) invasive breast carcinomas with follow-up information were classified according to the molecular subtype using immunohistochemistry for ER, PgR and Her2. The association between TNBC and distant relapse primary site was analyzed by logistic regression. Using multivariate logistic regression analysis patients with TNBC displayed only 0.09 (95% CI: 0.00-0.74; p=0.02) the odds of the non-TNBC patients of developing bone primary relapse. Regarding visceral and lymph-node relapse, no differences between in this cohort were found. Though classically regarded as aggressive tumors, TNBCs rarely development primary relapse in bone when compared to non-TNBC, a clinical relevant fact when investigating a metastasis of an occult or non-sampled primary BC.
Resumo:
Gene duplication followed by acquisition of specific targeting information and dual targeting were evolutionary strategies enabling organelles to cope with overlapping functions. We examined the evolutionary trend of dual-targeted single-gene products in Arabidopsis and rice genomes. The number of paralogous proteins encoded by gene families and the dual-targeted orthologous proteins were analysed. The number of dual-targeted proteins and the corresponding gene-family sizes were similar in Arabidopsis and rice irrespective of genome sizes. We show that dual targeting of methionine aminopeptidase, monodehydroascorbate reductase, glutamyl-tRNA synthetase, and tyrosyl-tRNA synthetase was maintained despite occurrence of whole-genome duplications in Arabidopsis and rice as well as a polyploidization followed by a diploidization event (gene loss) in the latter.
Resumo:
Two experiments were conducted on the nature of expert perception in the sport of squash. In the first experiment, ten expert and fifteen novice players attempted to predict the direction and force of squash strokes from either a film display (occluded at variable time periods before and after the opposing player had struck the ball) or a matched point-light display (containing only the basic kinematic features of the opponent's movement pattern). Experts outperformed the novices under both display conditions, and the same basic time windows that characterised expert and novice pick-up of information in the film task also persisted in the point-light task. This suggests that the experts' perceptual advantage is directly related to their superior pick-up of essential kinematic information. In the second experiment, the vision of six expert and six less skilled players was occluded by remotely triggered liquid-crystal spectacles at quasi-random intervals during simulated match play. Players were required to complete their current stroke even when the display was occluded and their prediction performance was assessed with respect to whether they moved to the correct half of the court to match the direction and depth of the opponent's stroke. Consistent with experiment 1, experts were found to be superior in their advance pick-up of both directional and depth information when the display was occluded during the opponent's hitting action. However, experts also remained better than chance, and clearly superior to less skilled players, in their prediction performance under conditions where occlusion occurred before any significant pre-contact preparatory movement by the opposing player was visible. This additional source of expert superiority is attributable to their superior attunement to the information contained in the situational probabilities and sequential dependences within their opponent's pattern of play.
Resumo:
Background: A major goal in the post-genomic era is to identify and characterise disease susceptibility genes and to apply this knowledge to disease prevention and treatment. Rodents and humans have remarkably similar genomes and share closely related biochemical, physiological and pathological pathways. In this work we utilised the latest information on the mouse transcriptome as revealed by the RIKEN FANTOM2 project to identify novel human disease-related candidate genes. We define a new term patholog to mean a homolog of a human disease-related gene encoding a product ( transcript, anti-sense or protein) potentially relevant to disease. Rather than just focus on Mendelian inheritance, we applied the analysis to all potential pathologs regardless of their inheritance pattern. Results: Bioinformatic analysis and human curation of 60,770 RIKEN full-length mouse cDNA clones produced 2,578 sequences that showed similarity ( 70 - 85% identity) to known human-disease genes. Using a newly developed biological information extraction and annotation tool ( FACTS) in parallel with human expert analysis of 17,051 MEDLINE scientific abstracts we identified 182 novel potential pathologs. Of these, 36 were identified by computational tools only, 49 by human expert analysis only and 97 by both methods. These pathologs were related to neoplastic ( 53%), hereditary ( 24%), immunological ( 5%), cardio-vascular (4%), or other (14%), disorders. Conclusions: Large scale genome projects continue to produce a vast amount of data with potential application to the study of human disease. For this potential to be realised we need intelligent strategies for data categorisation and the ability to link sequence data with relevant literature. This paper demonstrates the power of combining human expert annotation with FACTS, a newly developed bioinformatics tool, to identify novel pathologs from within large-scale mouse transcript datasets.
Resumo:
Non-astringent persimmon is rapidly expanding as a new fruit crop in warm subtropical regions of the world, Most research and development of this fruit crop has occurred in Japan, where there is a considerable amount of published literature on its performance. Much of this information is not readily accessible to other countries and needs to be interpreted and modified for other climatic regions. This paper reviews reproductive events from floral initiation to the completion of fruit growth. The timing and significance of these events is described in relation to the phenological cycle. Method of improving flowering, reducing fruit drop and altering the fruit maturity period are discussed. (C) 1997 Elsevier Science B.V.
Resumo:
Objective: To determine the degree of knowledge that cardiologists from Sao Paulo, Brazil, have regarding a low-prevalent entity associated with a high rate of sudden death-Brugada syndrome. Methods: Two hundred forty-four cardiologists were interviewed by an instrument divided in two parts: in the first, we recorded gender, age, and data related to academic profile. The second-answered only by the professionals that manifested having some degree of knowledge on the syndrome-had 28 questions that evaluated their knowledge. The answers were spontaneous and they did not have a chance to consult. We used uni- and multivariate analysis on the average percentage of right and wrong answers, and the influence of the academic profile. Results: The predominant gender was the male gender (61.1%), the average age was 44.32 +/- 10.83 years, 40% with more than 20 years after obtaining their degree, 44% were educated in public institutions, 69% had a residency in cardiology, 20% had overseas practice, 12% had postdegree, 41% were linked to an educational institution, 24% with publication(s) in an indexed journal, 17.2% were authors of chapters in books, 2.5% had edited books, and 10% were linked to the Brazilian Society of Cardiac Arrhythmias. The average percentage of right answers was 45.7%. Conclusion: The sample studied revealed a little knowledge on the entity. A residency in cardiology was the factor of greater significance in the percentage of right answers. Other significant factors were the link of the interviewed person to an educational institution, or the Brazilian Society of Cardiac Arrhythmias, and having a specialist degree.
Resumo:
The intracellular bacterium Legionella pneumophila induces a severe form of pneumonia called Legionnaires diseases, which is characterized by a strong neutrophil (NE) infiltrate to the lungs of infected individuals. Although the participation of pattern recognition receptors, such as Toll-like receptors, was recently demonstrated, there is no information on the role of nod-like receptors (NLRs) for bacterial recognition in vivo and for NE recruitment to the lungs. Here, we employed a murine model of Legionnaires disease to evaluate host and bacterial factors involved in NE recruitment to the mice lungs. We found that L. pneumophila type four secretion system, known as Dot/Icm, was required for NE recruitment as dot/icm mutants fail to trigger NE recruitment in a process independent of bacterial multiplication. By using mice deficient for Nod1, Nod2, and Rip2, we found that these receptors accounted for NE recruitment to the lungs of infected mice. In addition, Rip2-dependent responses were important for cytokine production and bacterial clearance. Collectively, these studies show that Nod1, Nod2, and Rip2 account for generation of innate immune responses in vivo, which are important for NE recruitment and bacterial clearance in a murine model of Legionnaires diseases. (C) 2010 Institut Pasteur. Published by Elsevier Masson SAS. All rights reserved.