964 resultados para source and sink
Resumo:
From Here to Diversity: Globalization and Intercultural Dialogues sees interculturalism as movement, transit, travel, the dynamics between cultures. Contemporary intercultural travel is a global journey, a circumnavigation at the speed of light that underwrites all the comings and goings, the departures and arrivals, the transmissions and receptions that are implicit in this title. Hence, From Here to Diversity examines the motivations, characteristics and implications of cultural interactions in their perpetual movement, devoid of spatial or temporal borders, in a dangerous but stimulating indefinition of limits. In the contemporary intercultural dialogue, new voices are making themselves heard, as valuable sources of study: the voices of women; non-occidentals; the non-powerful; forgotten narratives of a past that was as intercultural as the present (after all, what is colonialism other than a perverse form of interculturality?); global entertainment; tourism; oral literature; diaries; mythical narratives; the cinema; ethnography; new teachings, among so many others. Because this project is also intercultural at its source and subject, From Here to Diversity: Globalization and Intercultural Dialogues adds to the coherence of the project by including contributions from the most wide-ranging backgrounds and nationalities, without fear of the alterity that, after all, we propose to study.
Resumo:
Development of Dual Source Computed Tomography (Definition, Siemens Medical Solutions, Erlanger, Germany) allowed advances in temporal resolution, with the addition of a second X-ray source and an array of detectors to the TCM 64 slices. The ability to run exams on Dual Energy, allows greater differentiation of tissues, showing differences between closer attenuation coefficients. In terms of renal applications, the distinction of kidney stones and masses become one of the main advantages of the use of dual-energy technology. This article pretends to demonstrate operating principles of this equipment, as its main renal applications.
Resumo:
Coronary artery disease (CAD) is currently one of the most prevalent diseases in the world population and calcium deposits in coronary arteries are one direct risk factor. These can be assessed by the calcium score (CS) application, available via a computed tomography (CT) scan, which gives an accurate indication of the development of the disease. However, the ionising radiation applied to patients is high. This study aimed to optimise the protocol acquisition in order to reduce the radiation dose and explain the flow of procedures to quantify CAD. The main differences in the clinical results, when automated or semiautomated post-processing is used, will be shown, and the epidemiology, imaging, risk factors and prognosis of the disease described. The software steps and the values that allow the risk of developingCADto be predicted will be presented. A64-row multidetector CT scan with dual source and two phantoms (pig hearts) were used to demonstrate the advantages and disadvantages of the Agatston method. The tube energy was balanced. Two measurements were obtained in each of the three experimental protocols (64, 128, 256 mAs). Considerable changes appeared between the values of CS relating to the protocol variation. The predefined standard protocol provided the lowest dose of radiation (0.43 mGy). This study found that the variation in the radiation dose between protocols, taking into consideration the dose control systems attached to the CT equipment and image quality, was not sufficient to justify changing the default protocol provided by the manufacturer.
Resumo:
We evaluated the influence of water-related human activities, contaminative behaviour, house location, education and socio-economic status on endemic Schistosoma mansoni infection. The study was conducted in a hilry non-irrigated area of rural northeast Brazil amongst a defined population of subsistence farmers, of whom 93% were infected by age 20. The area was mapped, water bodies were surveyed, and a detailed questionnaire was performed on each household. Infection was assessed by duplicate stool examinations using the sensitive Bell technique to quantify egg excretion. For each household, and index of intensity of infection was computed by grouping individual log-transformed egg counts as an age-sex adjusted Z score. Few households had a sanitary installation or a domestic water supply. However, neither water-contact nor contaminative behavior were indiscriminate. The people made considerable effort to defaecate far from a water source, to obtain household drinking water from the cleanest source, and to bathe only at certain sites where privacy is assured. Land ownership and literacy correlated poorly with the household index of intensity of infection. The key influence on infection status was the relative location of the house and snail-free or snail colonized water sources. In this area, a safe domestic water supply is the critical input needed to achieve definitive control of endemic Schistosomiasis.
Resumo:
pp. 229-253
Resumo:
Dissertação para a obtenção de grau de doutor em Biologia pelo Instituto de Tecnologia Química e Biológica da Universidade Nova de Lisboa
Resumo:
We study the problem of privacy-preserving proofs on authenticated data, where a party receives data from a trusted source and is requested to prove computations over the data to third parties in a correct and private way, i.e., the third party learns no information on the data but is still assured that the claimed proof is valid. Our work particularly focuses on the challenging requirement that the third party should be able to verify the validity with respect to the specific data authenticated by the source — even without having access to that source. This problem is motivated by various scenarios emerging from several application areas such as wearable computing, smart metering, or general business-to-business interactions. Furthermore, these applications also demand any meaningful solution to satisfy additional properties related to usability and scalability. In this paper, we formalize the above three-party model, discuss concrete application scenarios, and then we design, build, and evaluate ADSNARK, a nearly practical system for proving arbitrary computations over authenticated data in a privacy-preserving manner. ADSNARK improves significantly over state-of-the-art solutions for this model. For instance, compared to corresponding solutions based on Pinocchio (Oakland’13), ADSNARK achieves up to 25× improvement in proof-computation time and a 20× reduction in prover storage space.
Resumo:
Stink bugs are seed/fruit sucking insects feeding on an array of host plants. Among them, an exotic tree called privet, Ligustrum lucidum Ait. (Oleaceae), is very common in the urban areas of the Brazilian subtropics, where it is utilized as food source and shelter for over a decem species of bugs, year round. The species composition, their performance and abundance on this host, and possible causes for this association are discussed and illustrated.
Resumo:
Report for the scientific sojourn at the Multimedia Communications Laboratory, University of Texas at Dallas, USA, from September to December 2005. The cooperative transmission has been analyzed taking a broadcast relay channel which assumes a scenario with one source and multiple destinations. Moreover, in order to improve the performance in terms of mutual information, it has been considered that for each destination there is another nearby terminal (called relay) which will help to improve the performance of the destination. This scheme combines different types of channels considered in the information theory, such as the relay channel, broadcast channel and interference channel (if the relays transmit information intended only to its associated destination). In this work, the author has studied the optimal way to encode the signals for the different users, known as capacity region (i.e. related to radio resources management ), of the broadcast relay channel.
Resumo:
Report for the scientific sojourn carried out at the Université Catholique de Louvain, Belgium, from March until June 2007. In the first part, the impact of important geometrical parameters such as source and drain thickness, fin spacing, spacer width, etc. on the parasitic fringing capacitance component of multiple-gate field-effect transistors (MuGFET) is deeply analyzed using finite element simulations. Several architectures such as single gate, FinFETs (double gate), triple-gate represented by Pi-gate MOSFETs are simulated and compared in terms of channel and fringing capacitances for the same occupied die area. Simulations highlight the great impact of diminishing the spacing between fins for MuGFETs and the trade-off between the reduction of parasitic source and drain resistances and the increase of fringing capacitances when Selective Epitaxial Growth (SEG) technology is introduced. The impact of these technological solutions on the transistor cut-off frequencies is also discussed. The second part deals with the study of the effect of the volume inversion (VI) on the capacitances of undoped Double-Gate (DG) MOSFETs. For that purpose, we present simulation results for the capacitances of undoped DG MOSFETs using an explicit and analytical compact model. It monstrates that the transition from volume inversion regime to dual gate behaviour is well simulated. The model shows an accurate dependence on the silicon layer thickness,consistent withtwo dimensional numerical simulations, for both thin and thick silicon films. Whereas the current drive and transconductance are enhanced in volume inversion regime, our results show thatintrinsic capacitances present higher values as well, which may limit the high speed (delay time) behaviour of DG MOSFETs under volume inversion regime.
Resumo:
This paper uses a micro-founded DSGE model to compare second-best optimal environmental policy and the resulting allocation to first-best allocation. The focus is on the source and size of uncertainty, and how this affects optimal choices and the inferiority of second best vis-à-vis first best.
Resumo:
There are two vectors of Chagas disease in Chile: Triatoma infestans and Mepraia spinolai. We studied the feeding behavior of these species, looking for differences which could possibly explain the low impact of the latter species on Chagas disease. Both species used thermal cues to locate their feeding source and consumed a similar volume of blood which was inversely related to the body weight before the meal and directly related to the time between meals. The average time between bites were 6.24 and 10.74 days. The average bite of M. spinolai lasted 9.68 min, significantly shorter than the 19.46 min for T. infestans. Furthermore, while T. infestans always defecated on the host, this behavior was observed in M. spinolai in only one case of 27 (3.7%). The delay between the bites and defecation was very long in M. spinolai and short in T. infestans. These differences may affect the reduced efficiency of transmission of Chagas infection by M. spinolai.
Resumo:
The increasing number of bomb attacks involving improvised explosive devices, as well as the nature of the explosives, give rise to concern among safety and law enforcement agencies. The substances used in explosive charges are often everyday products diverted from their primary licit applications. Thus, reducing or limiting their accessibility for prevention purposes is difficult. Ammonium nitrate, employed in agriculture as a fertiliser, is used worldwide in small and large homemade bombs. Black powder, dedicated to hunting and shooting sports, is used illegally as a filling in pipe bombs causing extensive damage. If the main developments of instrumental techniques in explosive analysis have been constantly pushing the limits of detection, their actual contribution to the investigation of explosives in terms of source discrimination is limited. Forensic science has seen the emergence of a new technology, isotope ratio mass spectrometry (IRMS), that shows promising results. Its very first application in forensic science dates back to 1979. Liu et al. analysed cannabis plants coming from different countries [Liu et al. 1979]. This preliminary study highlighted its potential to discriminate specimens coming from different sources. Thirty years later, the keen interest in this new technology has given rise to a flourishing number of publications in forensic science. The countless applications of IRMS to a wide range of materials and substances attest to its success and suggest that the technique is ready to be used in forensic science. However, many studies are characterised by a lack of methodology and fundamental data. They have been undertaken in a top-down approach, applying this technique in an exploratory manner on a restricted sampling. This manner of procedure often does not allow the researcher to answer a number of questions, such as: do the specimens come from the same source, what do we mean by source or what is the inherent variability of a substance? The production of positive results has prevailed at the expense of forensic fundamentals. This research focused on the evaluation of the contribution of the information provided by isotopic analysis to the investigation of explosives. More specifically, this evaluation was based on a sampling of black powders and ammonium nitrate fertilisers coming from known sources. Not only has the methodology developed in this work enabled us to highlight crucial elements inherent to the methods themselves, but also to evaluate both the longitudinal and transversal variabilities of the information. First, the study of the variability of the profile over time was undertaken. Secondly, the variability of black powders and ammonium nitrate fertilisers within the same source and between different sources was evaluated. The contribution of this information to the investigation of explosives was then evaluated and discussed. --------------------------------------------------------------------------------------------------- Le nombre croissant d'attentats à la bombe impliquant des engins explosifs artisanaux, ainsi que la nature des charges explosives, constituent une préoccupation majeure pour les autorités d'application de la loi et les organismes de sécurité. Les substances utilisées dans les charges explosives sont souvent des produits du quotidien, détournés de leurs applications licites. Par conséquent, réduire ou limiter l'accessibilité de ces produits dans un but de prévention est difficile. Le nitrate d'ammonium, employé dans l'agriculture comme engrais, est utilisé dans des petits et grands engins explosifs artisanaux. La poudre noire, initialement dédiée à la chasse et au tir sportif, est fréquemment utilisée comme charge explosive dans les pipe bombs, qui causent des dommages importants. Si les développements des techniques d'analyse des explosifs n'ont cessé de repousser les limites de détection, leur contribution réelle à l'investigation des explosifs est limitée en termes de discrimination de sources. Une nouvelle technologie qui donne des résultats prometteurs a fait son apparition en science forensique: la spectrométrie de masse à rapport isotopique (IRMS). Sa première application en science forensique remonte à 1979. Liu et al. ont analysé des plants de cannabis provenant de différents pays [Liu et al. 1979]. Cette étude préliminaire, basée sur quelques analyses, a mis en évidence le potentiel de l'IRMS à discriminer des spécimens provenant de sources différentes. Trente ans plus tard, l'intérêt marqué pour cette nouvelle technologie en science forensique se traduit par un nombre florissant de publications. Les innombrables applications de l'IRMS à une large gamme de matériaux et de substances attestent de son succès et suggèrent que la technique est prête à être utilisée en science forensique. Cependant, de nombreuses études sont caractérisées par un manque de méthodologie et de données fondamentales. Elles ont été menées sans définir les hypothèses de recherche et en appliquant cette technique de façon exploratoire sur un échantillonnage restreint. Cette manière de procéder ne permet souvent pas au chercheur de répondre à un certain nombre de questions, tels que: est-ce que deux spécimens proviennent de la même source, qu'entend-on par source ou encore quelle est l'intravariabilité d'une substance? La production de résultats positifs a prévalu au détriment des fondamentaux de science forensique. Cette recherche s'est attachée à évaluer la contribution réelle de l'information isotopique dans les investigations en matière d'explosifs. Plus particulièrement, cette évaluation s'est basée sur un échantillonnage constitué de poudres noires et d'engrais à base de nitrate d'ammonium provenant de sources connues. La méthodologie développée dans ce travail a permis non seulement de mettre en évidence des éléments cruciaux relatifs à la méthode d'analyse elle-même, mais également d'évaluer la variabilité de l'information isotopique d'un point de vue longitudinal et transversal. Dans un premier temps, l'évolution du profil en fonction du temps a été étudiée. Dans un second temps, la variabilité du profil des poudres noires et des engrais à base de nitrate d'ammonium au sein d'une même source et entre différentes sources a été évaluée. La contribution de cette information dans le cadre des investigations d'explosifs a ensuite été discutée et évaluée.
Resumo:
BACKGROUND AND PURPOSE: A new clinical construct termed embolic stroke of undetermined source (ESUS) was recently introduced, but no such population has been described yet. Our aim is to provide a detailed descriptive analysis of an ESUS population derived from a large prospective ischemic stroke registry using the proposed diagnostic criteria. METHODS: The criteria proposed by the Cryptogenic Stroke/ESUS International Working Group were applied to the Athens Stroke Registry to identify all ESUS patients. ESUS was defined as a radiologically confirmed nonlacunar brain infarct in the absence of (a) extracranial or intracranial atherosclerosis causing ≥50% luminal stenosis in arteries supplying the ischemic area, (b) major-risk cardioembolic source, and (c) any other specific cause of stroke. RESULTS: Among 2735 patients admitted between 1992 and 2011, 275 (10.0%) were classified as ESUS. In the majority of ESUS (74.2%), symptoms were maximal at onset. ESUS were of moderate severity (median National Institute Health Stroke Scale score, 5). The most prevalent risk factor was arterial hypertension (64.7%), and 50.9% of patients were dyslipidemic. Among potential causes of the ESUS, covert atrial fibrillation (AF) was the most prevalent: in 30 (10.9%) patients, AF was diagnosed during hospitalization for stroke recurrence, whereas in 50 (18.2%) patients AF was detected after repeated ECG monitoring during follow-up. Also, covert AF was strongly suggested in 38 patients (13.8%) but never recorded. CONCLUSIONS: About 10% of patients with first-ever ischemic stroke met criteria for ESUS; covert paroxysmal AF seems to be a frequent cause of ESUS.
Resumo:
In the context of the investigation of the use of automated fingerprint identification systems (AFIS) for the evaluation of fingerprint evidence, the current study presents investigations into the variability of scores from an AFIS system when fingermarks from a known donor are compared to fingerprints that are not from the same source. The ultimate goal is to propose a model, based on likelihood ratios, which allows the evaluation of mark-to-print comparisons. In particular, this model, through its use of AFIS technology, benefits from the possibility of using a large amount of data, as well as from an already built-in proximity measure, the AFIS score. More precisely, the numerator of the LR is obtained from scores issued from comparisons between impressions from the same source and showing the same minutia configuration. The denominator of the LR is obtained by extracting scores from comparisons of the questioned mark with a database of non-matching sources. This paper focuses solely on the assignment of the denominator of the LR. We refer to it by the generic term of between-finger variability. The issues addressed in this paper in relation to between-finger variability are the required sample size, the influence of the finger number and general pattern, as well as that of the number of minutiae included and their configuration on a given finger. Results show that reliable estimation of between-finger variability is feasible with 10,000 scores. These scores should come from the appropriate finger number/general pattern combination as defined by the mark. Furthermore, strategies of obtaining between-finger variability when these elements cannot be conclusively seen on the mark (and its position with respect to other marks for finger number) have been presented. These results immediately allow case-by-case estimation of the between-finger variability in an operational setting.