933 resultados para server-side
Resumo:
En s'inspirant de la littérature récente qui a dépeint l'ambivalence comme étant adaptative et en lien avec des comportements stratégiques, cette thèse examine le versant utile des attitudes ambivalentes. Elle met tout d'abord en évidence que son expression peut-être sciemment contrôlée et mise en avant pour des raisons d'auto-présentation. De plus, elle démontre que les individus peuvent présenter une attitude ambivalente afin de gagner l'approbation sociale sur un objet d'attitude controversé alors que l'inverse a été observé sur des objets consensuels (Première ligne de recherche). Cette thèse a également révélé que l'expression d'attitudes ambivalentes pouvait amener à être valorisé socialement. En effet, contrairement à des attitudes plus tranchées (pro-normatives ou contre-normatives), les attitudes ambivalentes ont été évaluées de façon plus importante sur la dimension de l'utilité sociale (une dimension qui indique la compétence d'autrui ou encore la propension à évoluer dans la hiérarchie sociale). La valorisation de l'ambivalence n'est apparue que sur la dimension de l'utilité sociale et non sur la dimension de la désirabilité sociale (une dimension qui indique la sympathie d'autrui ainsi que la propension à être apprécié socialement). De plus, ce résultat a été observé sur des thèmes controversés et non sur des thèmes consensuels (Seconde ligne de recherche). Dans l'ensemble cette thèse soutient une approche de l'ambivalence comme donnant lieu à des bénéfices. Elle peut également ouvrir la voie à l'étude de l'ambivalence en lien avec la pensée critique. - Drawing on the recent literature that portrayed ambivalence as being adaptive and linked with strategic behaviors, this thesis examines the useful side of ambivalent attitudes. It first revealed that the expression of ambivalent attitudes could be controlled and purposely displayed for self-presentational concerns. Furthermore, it demonstrated that people could put ambivalence forward to gain social approval when expressing it on controversial social issues, whereas the opposite was true on consensual social issues (First line of research). The thesis also revealed that the expression of ambivalent attitudes could lead to be socially valued. Indeed, contrary to clear-cut attitudes (either pro-normative or counter-normative attitudes), ambivalent attitudes have been evaluated the highest on the social utility dimension (a dimension indicating people's competence as well as the extent to which they are likely to climb in social hierarchy). The valorization of ambivalent attitudes only appeared on social utility and not on social desirability (a dimension indicating people's niceness as well as the extent to which they are likely to be socially appreciated). This effect was true on controversial social issues but not on consensual ones (Second line of research). Overall, this thesis provides support for an approach that conceives attitudinal ambivalence as leading to benefits. It also may open avenues for the study of ambivalence in relation with critical thinking.
Resumo:
The methodology of the ager Tarraconensis project also included geophysical surveys aiming to distinguish different categories of rural settlements. Two geophysical techniques (resistivity and magnetometry) were combined to reveal traces of unearth structures from a selection of sites identified from the field survey. Results of geophysical surveys of these seven sites as well as conclusions obtained from this approach are discussed here.
Resumo:
The M-Coffee server is a web server that makes it possible to compute multiple sequence alignments (MSAs) by running several MSA methods and combining their output into one single model. This allows the user to simultaneously run all his methods of choice without having to arbitrarily choose one of them. The MSA is delivered along with a local estimation of its consistency with the individual MSAs it was derived from. The computation of the consensus multiple alignment is carried out using a special mode of the T-Coffee package [Notredame, Higgins and Heringa (T-Coffee: a novel method for fast and accurate multiple sequence alignment. J. Mol. Biol. 2000; 302: 205-217); Wallace, O'Sullivan, Higgins and Notredame (M-Coffee: combining multiple sequence alignment methods with T-Coffee. Nucleic Acids Res. 2006; 34: 1692-1699)] Given a set of sequences (DNA or proteins) in FASTA format, M-Coffee delivers a multiple alignment in the most common formats. M-Coffee is a freeware open source package distributed under a GPL license and it is available either as a standalone package or as a web service from www.tcoffee.org.
Resumo:
Pioneer work on iontophoresis undertaken by David Maurice during the 1970s and 1980s laid the initial groundwork for its potential implementation as a promising ocular therapeutic modality. A better understanding of tissue interactions within the eye during electric current application, along with better designs of drug delivery devices have enabled us to pursue David Maurice's original ideas and take them from the bench to the bed side. In the present study we demonstrate the potential application of an iontophoresis device (Eyegate, Optis, France) for the treatment of certain human eye diseases. Seventeen patients received a penetrating keratoplasty (PKP) at various intervals before presentation with active graft rejection in our clinic and were treated using this iontophoresis device. Methylprednisolone sodium succinate (MP) 62.5 mg/ml was infused within the Eyegate ocular probe container and an electrical current of 1.5 mA was delivered for 4 min with the negative pole connected to the ocular probe. Patients were treated on an ambulatory basis and received a standard course of three iontophoresis applications given once a day over 3 consecutive days. After treatment, 15 of the 17 treated eyes (88%) demonstrated a complete reversal of the rejection processes. In two eyes, only a partial and temporary improvement was observed. The mean best corrected visual acuity of all 17 patients during the last follow up visit was 0.37 +/- 0.2 compared to 0.06 +/- 0.05 before initiation of the iontophoresis treatment. The mean follow-up time was 13.7 months with a range of 5-29 months for the 17 patients. No significant side-effects associated with the iontophoresis treatment were observed. Thus, for the management of active corneal graft rejection, iontophoresis of MP can be an alternative to very frequent instillations of eye drops, or to pulsed intravenous therapy of corticosteroids.
Resumo:
This article introduces a new interface for T-Coffee, a consistency-based multiple sequence alignment program. This interface provides an easy and intuitive access to the most popular functionality of the package. These include the default T-Coffee mode for protein and nucleic acid sequences, the M-Coffee mode that allows combining the output of any other aligners, and template-based modes of T-Coffee that deliver high accuracy alignments while using structural or homology derived templates. These three available template modes are Expresso for the alignment of protein with a known 3D-Structure, R-Coffee to align RNA sequences with conserved secondary structures and PSI-Coffee to accurately align distantly related sequences using homology extension. The new server benefits from recent improvements of the T-Coffee algorithm and can align up to 150 sequences as long as 10,000 residues and is available from both http://www.tcoffee.org and its main mirror http://tcoffee.crg.cat.
Resumo:
Intrathecal injections of 50 to 100 micro g of (N-acetylmuramyl-L-alanyl-D-isoglutamine) muramyl dipeptide (MDP)/rabbit dose-dependently triggered tumor necrosis factor alpha (TNF-alpha) secretion (12 to 40,000 pg/ml) preceding the influx of leukocytes in the subarachnoid space of rabbits. Intrathecal instillation of heat-killed unencapsulated R6 pneumococci produced a comparable leukocyte influx but only a minimal level of preceding TNF-alpha secretion. The stereochemistry of the first amino acid (L-alanine) of the MDP played a crucial role with regard to its inflammatory potential. Isomers harboring D-alanine in first position did not induce TNF-alpha secretion and influx of leukocytes. This stereospecificity of MDPs was also confirmed by measuring TNF-alpha release from human peripheral mononuclear blood cells stimulated in vitro. These data show that the inflammatory potential of MDPs depends on the stereochemistry of the first amino acid of the peptide side chain and suggest that intact pneumococci and MDPs induce inflammation by different pathways.
Resumo:
This study investigates, designs, and implements an inexpensive application that allows local and remote monitoring of a home. The application consists of an array of sensors for monitoring different conditions in a home environment and also for accessing the devices that might be connected to the system. Only a few sensors are initially involved in this study and information about the temperature level, forced entry detection, smoke and water leakage detection can be obtained at any time from any location with an Internet connection. The application software (coded in C language) runs on an embedded system which is basically a wireless Linksys router running on a GNU/Linux based firmware for embedded systems. Interaction between the sensors and the application software is achieved through an implemented sensor interfacing circuit. The communication with the sensor interfacing unit is done through the serial port, and accessibility of the connected sensors is achieved through a telnet client. The sensors can be accessed from local and remote locations with the sensors giving reliable information. The resulting application shows that it is possible to use the router for other applications other than what it is intended for.
Resumo:
The nature of client-server architecture implies that some modules are delivered to customers. These publicly distributed commercial software components are under risk, because users (and simultaneously potential malefactors) have physical access to some components of the distributed system. The problem becomes even worse if interpreted programming languages are used for creation of client side modules. The language Java, which was designed to be compiled into platform independent byte-code is not an exception and runs the additional risk. Along with advantages like verifying the code before execution (to ensure that program does not produce some illegal operations)Java has some disadvantages. On a stage of byte-code a java program still contains comments, line numbers and some other instructions, which can be used for reverse-engineering. This Master's thesis focuses on protection of Java code based client-server applications. I present a mixture of methods to protect software from tortious acts. Then I shall realize all the theoretical assumptions in a practice and examine their efficiency in examples of Java code. One of the criteria's to evaluate the system is that my product is used for specialized area of interactive television.
Resumo:
Korkeasaatavuus on olennainen osa nykyaikaisissa, integroiduissa yritysjärjestelmissä. Yritysten kansainvälistyessä tiedon on oltava saatavissa ympärivuorokautisesti, mikä asettaa yhä kovempia vaatimuksia järjestelmän yksittäisten osien saatavuudelle. Kasvava tietojärjestelmäintegraatio puolestaan tekee järjestelmän solmukohdista kriittisiä liiketoiminnan kannalta. Tässä työssä perehdytään hajautettujen järjestelmien ominaisuuksiin ja niiden asettamiin haasteisiin. Esiteltyjä teknologioita ovat muun muassa väliohjelmistot, klusterit ja kuormantasaus. Yrityssovellusten pohjana käytetty Java 2 Enterprise Edition (J2EE) -teknologia käsitellään olennaisilta osiltaan. Työssä käytetään sovelluspalvelinalustana BEA WebLogic Server -ohjelmistoa, jonka ominaisuudet käydään läpi hajautuksen kannalta. Työn käytännön osuudessa toteutetaan kahdelle erilaiselle olemassa olevalle yrityssovellukselle korkean saatavuuden sovelluspalvelinympäristö, joissa sovellusten asettamat rajoitukset on otettu huomioon.
Resumo:
Työssä kehitettin läpinäkyvä Internet Small Computer Systems Interface-verkkolevyä (iSCSI) käyttävä varmistusjärjestelmä. Verkkolevyn sisältö suojattiin asiakaspään salauskerroksella (dm-crypt). Järjestely mahdollisti sen, että verkkolevylle tallennetut varmuuskopiot pysyivät luottamuksellisina, vaikka levypalvelinta tarjoava taho oli joko epäluotettava tai suorastaan vihamielinen. Järjestelmän hyötykäyttöä varten kehitettiin helppokäyttöinen prototyyppisovellus. Järjestelmän riskit ja haavoittuvuudet käytiin läpi ja analysoitiin. Järjestelmälle tehtiin myös karkea kryptoanalyysi sen teknistenominaisuuksien pohjalta. Suorituskykymittaukset tehtiin sekä salatulle että salaamattomalle iSCSI-liikenteelle. Näistä todettiin, että salauksen vaikutus suorituskykyyn oli häviävän pieni jopa 100 megabittiä sekunnissa siirtävillä verkkonopeuksilla. Lisäksi pohdittiin teknologian muita sovelluskohteita ja tulevia tutkimusalueita.
Resumo:
The protection of arginine (Arg) side chains is a crucial issue in peptide chemistry because of the propensity of the basic guanidinium group to produce side reactions. Currently, sulfonyl-type protecting groups, such as 2,2,5,7,8-pentamethylchroman (Pmc) and 2,2,4,6,7-pentamethyldihydrobenzofurane (Pbf), are the most widely used for this purpose. Nevertheless, Arg side chain protection remains problematic as a result of the acid stability of these two compounds. This issue is even more relevant in Arg-rich sequences, acid-sensitive peptides and large-scale syntheses. The 1,2-dimethylindole-3-sulfonyl (MIS) group is more acid-labile than Pmc and Pbf and can therefore be a better option for Arg side chain protection. In addition, MIS is compatible with tryptophan-containing peptides.
Resumo:
Background: Reconstruction of genes and/or protein networks from automated analysis of the literature is one of the current targets of text mining in biomedical research. Some user-friendly tools already perform this analysis on precompiled databases of abstracts of scientific papers. Other tools allow expert users to elaborate and analyze the full content of a corpus of scientific documents. However, to our knowledge, no user friendly tool that simultaneously analyzes the latest set of scientific documents available on line and reconstructs the set of genes referenced in those documents is available. Results: This article presents such a tool, Biblio-MetReS, and compares its functioning and results to those of other user-friendly applications (iHOP, STRING) that are widely used. Under similar conditions, Biblio-MetReS creates networks that are comparable to those of other user friendly tools. Furthermore, analysis of full text documents provides more complete reconstructions than those that result from using only the abstract of the document. Conclusions: Literature-based automated network reconstruction is still far from providing complete reconstructions of molecular networks. However, its value as an auxiliary tool is high and it will increase as standards for reporting biological entities and relationships become more widely accepted and enforced. Biblio- MetReS is an application that can be downloaded from http://metres.udl.cat/. It provides an easy to use environment for researchers to reconstruct their networks of interest from an always up to date set of scientific documents.