904 resultados para 13627-022


Relevância:

10.00% 10.00%

Publicador:

Resumo:

Two different stocks (A and B) of the bay scallop Argopecten irradialls irradians (Lamarck, 1819) were used to test mass selection on growth. Stock A was a descending stock from the initial introduction from U.S.A. in 1982, which had been cultured in China for about 20 years. Stock B was the third generation from a recent introduction from U.S.A. in 1999. Truncation selection was conducted by selecting the largest 11% scallops in shell length from Stock A and the largest 12.7% scallops from Stock B as parents for the respective selected groups. Before the removal of parents for truncation selection, equal numbers of scallops were randomly chosen from Stock A and B to serve as parents for the control groups. Offspring from the four groups were reared under the same hatchery, nursery, and grow-out conditions. Values of response to selection and realized heritability at larvae, spat and grow-out stages for Stock B were all significantly (P < 0.001) higher than its counterpart for Stock A. For Stock A, no significant response to selection was observed (P > 0.05) at any stage, and the realized heritability for shell length was 0.015 +/- 0.024 for larvae, 0.040 +/- 0.027 for spat, and 0.080 +/- 0.009 for grow-out, respectively. For Stock B, however, significant (P < 0.05) response to selection was observed, and the realized heritability for shell length was 0.511 +/- 0.010 for larvae, 0.341 +/- 0.022 for spat, and 0.338 +/- 0.015 for grow-out. On average, responses to selection at the three stages for Stock B was 30 x, 7.1 x, and 3 x higher than its counterpart for Stock A, respectively. Accordingly, realized heritability at above stages for Stock B was 33 X, 7.5 x, and 3.2 X higher than its counterpart for Stock A, respectively. Differences in response to selection and realized heritability between the two stocks are presumably due to differences in genetic variability. As the 20th generation from the initial introduction consisted of only 26 scallops, Stock A is known to be highly inbred, while inbreeding in Stock B is negligible. (C) 2004 Elsevier B.V. All rights reserved.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

基于1997~1999年野外实验,对高寒草甸小云雀和黄嘴朱顶雀两种雀形目鸟的窝雏数进行增减处理。结果表明,对照组的幼鸟生长率和离巢体重都大于增加组,说明窝雏数增加后,幼鸟质量下降。随着窝雏数增加,这两种幼鸟生长率显著下降(小云雀:r = -0.965, P = 0.035 < 0.05;朱顶雀:r = -0.828, P = 0.022 < 0.05)。窝雏数改变对小云雀幼鸟出飞重影响不显著(r = -0.418, P = 0.528 > 0.05),而对黄嘴朱顶雀有显著的影响(r = -0.901,P = 0.014 < 0.05)。

Relevância:

10.00% 10.00%

Publicador:

Resumo:

From 30 June to 24 September in 2003 ecosystem respiration (Re) in two alpine meadows on the Tibetan Plateau were measured using static chamber- and gas chromatography- (GC) based techniques. Simultaneously, plant removal treatments were set to partition Re into plant autotrophic respiration (Ra) and microbial heterotrophic respiration (Rh). Results indicated that Re had clear diurnal and seasonal variation patterns in both of the meadows. The seasonal variability of Re at both meadow sites was caused mainly by changes in Ra, rather than Rh. Moreover, at the Kobresia humilis meadow site (K_site), Ra and Rh accounted for 54% and 46% of Re, respectively. While at the Potentilla fruticosa scrub meadow (P_site), the counterparts accounted for 61% and 39%, respectively. T test showed that there was significant difference in Re rates between the two meadows (t = 2.387, P = 0.022). However, no significant difference was found in Rh rates, whereas a significant difference was observed in Ra rates between the two meadows. Thus, the difference in Re rate between the two meadows was mainly attributed to plant autotrophic respirations. During the growing season, the two meadows showed relatively low Q(10) values, suggesting that Re, especially Rh was not sensitive to temperature variation in the growing season. Additionally, Re and Rh at the K_site, as well as Rh at the P_site was negatively correlated with soil moisture, indicating that soil moisture would also play an important role in respirations.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Binary image classifiction is a problem that has received much attention in recent years. In this paper we evaluate a selection of popular techniques in an effort to find a feature set/ classifier combination which generalizes well to full resolution image data. We then apply that system to images at one-half through one-sixteenth resolution, and consider the corresponding error rates. In addition, we further observe generalization performance as it depends on the number of training images, and lastly, compare the system's best error rates to that of a human performing an identical classification task given teh same set of test images.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This memo describes the initial results of a project to create a self-supervised algorithm for learning object segmentation from video data. Developmental psychology and computational experience have demonstrated that the motion segmentation of objects is a simpler, more primitive process than the detection of object boundaries by static image cues. Therefore, motion information provides a plausible supervision signal for learning the static boundary detection task and for evaluating performance on a test set. A video camera and previously developed background subtraction algorithms can automatically produce a large database of motion-segmented images for minimal cost. The purpose of this work is to use the information in such a database to learn how to detect the object boundaries in novel images using static information, such as color, texture, and shape. This work was funded in part by the Office of Naval Research contract #N00014-00-1-0298, in part by the Singapore-MIT Alliance agreement of 11/6/98, and in part by a National Science Foundation Graduate Student Fellowship.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Hill, Joe M., Lloyd, Noel G., Pearson, Jane M., 'Limit cycles of a predator-prey model with intratrophic predation', Journal of Mathematical Analysis and Applications Volume 349, Issue 2, 15 January 2009, Pages 544-555

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Maria Roca, Caron James, Adriana Pruzinsk?, Stefan H?rtensteiner, Howard Thomas and Helen Ougham. Analysis of the chlorophyll catabolism pathway in leaves of an introgression senescence mutant of Lolium temulentum. Phytochemistry, 65 (9), 1231-1238. Sponsorship: BBSRC RAE2008

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In a recent paper, Structural Analysis of Network Traffic Flows, we analyzed the set of Origin Destination traffic flows from the Sprint-Europe and Abilene backbone networks. This report presents the complete set of results from analyzing data from both networks. The results in this report are specific to the Sprint-1 and Abilene datasets studied in the above paper. The following results are presented here: 1 Rows of Principal Matrix (V) 2 1.1 Sprint-1 Dataset ................................ 2 1.2 Abilene Dataset.................................. 9 2 Set of Eigenflows 14 2.1 Sprint-1 Dataset.................................. 14 2.2 Abilene Dataset................................... 21 3 Classifying Eigenflows 26 3.1 Sprint-1 Dataset.................................. 26 3.2 Abilene Datase.................................... 44

Relevância:

10.00% 10.00%

Publicador:

Resumo:

We study the impact of heterogeneity of nodes, in terms of their energy, in wireless sensor networks that are hierarchically clustered. In these networks some of the nodes become cluster heads, aggregate the data of their cluster members and transmit it to the sink. We assume that a percentage of the population of sensor nodes is equipped with additional energy resources-this is a source of heterogeneity which may result from the initial setting or as the operation of the network evolves. We also assume that the sensors are randomly (uniformly) distributed and are not mobile, the coordinates of the sink and the dimensions of the sensor field are known. We show that the behavior of such sensor networks becomes very unstable once the first node dies, especially in the presence of node heterogeneity. Classical clustering protocols assume that all the nodes are equipped with the same amount of energy and as a result, they can not take full advantage of the presence of node heterogeneity. We propose SEP, a heterogeneous-aware protocol to prolong the time interval before the death of the first node (we refer to as stability period), which is crucial for many applications where the feedback from the sensor network must be reliable. SEP is based on weighted election probabilities of each node to become cluster head according to the remaining energy in each node. We show by simulation that SEP always prolongs the stability period compared to (and that the average throughput is greater than) the one obtained using current clustering protocols. We conclude by studying the sensitivity of our SEP protocol to heterogeneity parameters capturing energy imbalance in the network. We found that SEP yields longer stability region for higher values of extra energy brought by more powerful nodes.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

System F is the well-known polymorphically-typed λ-calculus with universal quantifiers ("∀"). F+η is System F extended with the eta rule, which says that if term M can be given type τ and M η-reduces to N, then N can also be given the type τ. Adding the eta rule to System F is equivalent to adding the subsumption rule using the subtyping ("containment") relation that Mitchell defined and axiomatized [Mit88]. The subsumption rule says that if M can be given type τ and τ is a subtype of type σ, then M can be given type σ. Mitchell's subtyping relation involves no extensions to the syntax of types, i.e., no bounded polymorphism and no supertype of all types, and is thus unrelated to the system F≤("F-sub"). Typability for F+η is the problem of determining for any term M whether there is any type τ that can be given to it using the type inference rules of F+η. Typability has been proven undecidable for System F [Wel94] (without the eta rule), but the decidability of typability has been an open problem for F+η. Mitchell's subtyping relation has recently been proven undecidable [TU95, Wel95b], implying the undecidability of "type checking" for F+η. This paper reduces the problem of subtyping to the problem of typability for F+η, thus proving the undecidability of typability. The proof methods are similar in outline to those used to prove the undecidability of typability for System F, but the fine details differ greatly.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

We describe and evaluate options for providing anonymous IP service, argue for the further investigation of local anonymity, and sketch a framework for the implementation of locally anonymous networks.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

An appearance-based framework for 3D hand shape classification and simultaneous camera viewpoint estimation is presented. Given an input image of a segmented hand, the most similar matches from a large database of synthetic hand images are retrieved. The ground truth labels of those matches, containing hand shape and camera viewpoint information, are returned by the system as estimates for the input image. Database retrieval is done hierarchically, by first quickly rejecting the vast majority of all database views, and then ranking the remaining candidates in order of similarity to the input. Four different similarity measures are employed, based on edge location, edge orientation, finger location and geometric moments.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

There has been considerable work done in the study of Web reference streams: sequences of requests for Web objects. In particular, many studies have looked at the locality properties of such streams, because of the impact of locality on the design and performance of caching and prefetching systems. However, a general framework for understanding why reference streams exhibit given locality properties has not yet emerged. In this work we take a first step in this direction, based on viewing the Web as a set of reference streams that are transformed by Web components (clients, servers, and intermediaries). We propose a graph-based framework for describing this collection of streams and components. We identify three basic stream transformations that occur at nodes of the graph: aggregation, disaggregation and filtering, and we show how these transformations can be used to abstract the effects of different Web components on their associated reference streams. This view allows a structured approach to the analysis of why reference streams show given properties at different points in the Web. Applying this approach to the study of locality requires good metrics for locality. These metrics must meet three criteria: 1) they must accurately capture temporal locality; 2) they must be independent of trace artifacts such as trace length; and 3) they must not involve manual procedures or model-based assumptions. We describe two metrics meeting these criteria that each capture a different kind of temporal locality in reference streams. The popularity component of temporal locality is captured by entropy, while the correlation component is captured by interreference coefficient of variation. We argue that these metrics are more natural and more useful than previously proposed metrics for temporal locality. We use this framework to analyze a diverse set of Web reference traces. We find that this framework can shed light on how and why locality properties vary across different locations in the Web topology. For example, we find that filtering and aggregation have opposing effects on the popularity component of the temporal locality, which helps to explain why multilevel caching can be effective in the Web. Furthermore, we find that all transformations tend to diminish the correlation component of temporal locality, which has implications for the utility of different cache replacement policies at different points in the Web.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Overlay networks have been used for adding and enhancing functionality to the end-users without requiring modifications in the Internet core mechanisms. Overlay networks have been used for a variety of popular applications including routing, file sharing, content distribution, and server deployment. Previous work has focused on devising practical neighbor selection heuristics under the assumption that users conform to a specific wiring protocol. This is not a valid assumption in highly decentralized systems like overlay networks. Overlay users may act selfishly and deviate from the default wiring protocols by utilizing knowledge they have about the network when selecting neighbors to improve the performance they receive from the overlay. This thesis goes against the conventional thinking that overlay users conform to a specific protocol. The contributions of this thesis are threefold. It provides a systematic evaluation of the design space of selfish neighbor selection strategies in real overlays, evaluates the performance of overlay networks that consist of users that select their neighbors selfishly, and examines the implications of selfish neighbor and server selection to overlay protocol design and service provisioning respectively. This thesis develops a game-theoretic framework that provides a unified approach to modeling Selfish Neighbor Selection (SNS) wiring procedures on behalf of selfish users. The model is general, and takes into consideration costs reflecting network latency and user preference profiles, the inherent directionality in overlay maintenance protocols, and connectivity constraints imposed on the system designer. Within this framework the notion of user’s "best response" wiring strategy is formalized as a k-median problem on asymmetric distance and is used to obtain overlay structures in which no node can re-wire to improve the performance it receives from the overlay. Evaluation results presented in this thesis indicate that selfish users can reap substantial performance benefits when connecting to overlay networks composed of non-selfish users. In addition, in overlays that are dominated by selfish users, the resulting stable wirings are optimized to such great extent that even non-selfish newcomers can extract near-optimal performance through naïve wiring strategies. To capitalize on the performance advantages of optimal neighbor selection strategies and the emergent global wirings that result, this thesis presents EGOIST: an SNS-inspired overlay network creation and maintenance routing system. Through an extensive measurement study on the deployed prototype, results presented in this thesis show that EGOIST’s neighbor selection primitives outperform existing heuristics on a variety of performance metrics, including delay, available bandwidth, and node utilization. Moreover, these results demonstrate that EGOIST is competitive with an optimal but unscalable full-mesh approach, remains highly effective under significant churn, is robust to cheating, and incurs minimal overheads. This thesis also studies selfish neighbor selection strategies for swarming applications. The main focus is on n-way broadcast applications where each of n overlay user wants to push its own distinct file to all other destinations as well as download their respective data files. Results presented in this thesis demonstrate that the performance of our swarming protocol for n-way broadcast on top of overlays of selfish users is far superior than the performance on top of existing overlays. In the context of service provisioning, this thesis examines the use of distributed approaches that enable a provider to determine the number and location of servers for optimal delivery of content or services to its selfish end-users. To leverage recent advances in virtualization technologies, this thesis develops and evaluates a distributed protocol to migrate servers based on end-users demand and only on local topological knowledge. Results under a range of network topologies and workloads suggest that the performance of the distributed deployment is comparable to that of the optimal but unscalable centralized deployment.