986 resultados para orthogonal memory patterns
Resumo:
Multiple sclerosis (MS) is a complex autoimmune disorder of the CNS with both genetic and environmental contributing factors. Clinical symptoms are broadly characterized by initial onset, and progressive debilitating neurological impairment. In this study, RNA from MS chronic active and MS acute lesions was extracted, and compared with patient matched normal white matter by fluorescent cDNA microarray hybridization analysis. This resulted in the identification of 139 genes that were differentially regulated in MS plaque tissue compared to normal tissue. Of these, 69 genes showed a common pattern of expression in the chronic active and acute plaque tissues investigated (Pvalue<0.0001, ρ=0.73, by Spearman's ρ analysis); while 70 transcripts were uniquely differentially expressed (≥1.5-fold) in either acute or chronic active tissues. These results included known markers of MS such as the myelin basic protein (MBP) and glutathione S-transferase (GST) M1, nerve growth factors, such as nerve injury-induced protein 1 (NINJ1), X-ray and excision DNA repair factors (XRCC9 and ERCC5) and X-linked genes such as the ribosomal protein, RPS4X. Primers were then designed for seven array-selected genes, including transferrin (TF), superoxide dismutase 1 (SOD1), glutathione peroxidase 1 (GPX1), GSTP1, crystallin, alpha-B (CRYAB), phosphomannomutase 1 (PMM1) and tubulin β-5 (TBB5), and real time quantitative (Q)-PCR analysis was performed. The results of comparative Q-PCR analysis correlated significantly with those obtained by array analysis (r=0.75, Pvalue<0.01, by Pearson's bivariate correlation). Both chronic active and acute plaques shared the majority of factors identified suggesting that quantitative, rather than gross qualitative differences in gene expression pattern may define the progression from acute to chronic active plaques in MS.
Resumo:
The brief for the creative work was to produce a digital backdrop that would be projected behind and enhance a dance performance. The animation needed to display a static kolam pattern that would then dissolve at a choreographed point in the performance. The dissolving mimics the fragmentation that occurs to physical kolam patterns throughout the day as people interact with the drawings. The final animated work was incorporated into Vanessa Mafe-Keane’s performance titled “Paired Back” performed at the Judith Wright Centre, Brisbane 2013 as part of “Dance. Indie Dance. Through the use of motion capture technology the process of dissolving the pattern is a direct result of the performer’s movements allowing visual and temporal connection between motion of performer and digital graphic to be observed. This creative work presented an opportunity to expand upon experiments conducted in the production of experimental visual forms undertaken at QUT using the Xsens MVN Inertial Motion Capture System. The project took on the form of an investigation into practice with a focus on the additional complexities of capturing, then applying multiple data sources into the production of animated visuals along with bringing to light the considerations taken into account when producing this type of generative art work for live performance. The reported outcomes from this investigation have contributed to a larger study on the use of motion capture in the generative arts, furthering the understanding of and generating theories on practice.
Resumo:
Exposure to ultrafine particles (UFPs) is deemed to be a major risk affecting human health. Therefore, airborne particle studies were performed in the recent years to evaluate the most critical micro-environments, as well as identifying the main UFP sources. Nonetheless, in order to properly evaluate the UFP exposure, personal monitoring is required as the only way to relate particle exposure levels to the activities performed and micro-environments visited. To this purpose, in the present work, the results of experimental analysis aimed at showing the effect of the time-activity patterns on UFP personal exposure are reported. In particular, 24 non-smoking couples (12 during winter and summer time, respectively), comprised of a man who worked full-time and a woman who was a homemaker, were analyzed using personal particle counter and GPS monitors. Each couple was investigated for a 48-h period, during which they also filled out a diary reporting the daily activities performed. Time activity patterns, particle number concentration exposure and the related dose received by the participants, in terms of particle alveolar-deposited surface area, were measured. The average exposure to particle number concentration was higher for women during both summer and winter (Summer: women 1.8×104 part. cm-3; men 9.2×103 part. cm-3; Winter: women 2.9×104 part. cm-3; men 1.3×104 part. cm-3), which was likely due to the time spent undertaking cooking activities. Staying indoors after cooking also led to higher alveolar-deposited surface area dose for both women and men during the winter time (9.12×102 and 6.33×102 mm2, respectively), when indoor ventilation was greatly reduced. The effect of cooking activities was also detected in terms of women’s dose intensity (dose per unit time), being 8.6 and 6.6 in winter and summer, respectively. On the contrary, the highest dose intensity activity for men was time spent using transportation (2.8 in both winter and summer).
Resumo:
A method for prediction of the radiation pattern of N strongly coupled antennas with mismatched sources is presented. The method facilitates fast and accurate design of compact arrays. The prediction is based on the measured N-port S parameters of the coupled antennas and the N active element patterns measured in a 50 ω environment. By introducing equivalent power sources, the radiation pattern with excitation by sources with arbitrary impedances and various decoupling and matching networks (DMN) can be accurately predicted without the need for additional measurements. Two experiments were carried out for verification: pattern prediction for parasitic antennas with different loads and for antennas with DMN. The difference between measured and predicted patterns was within 1 to 2 dB.
Resumo:
Universities are increasingly offering capstone subjects as part of curricula to prepare final year undergraduates for employment through consolidating and integrating their knowledge and skills while bridging the gap between academic learning and professional work. This study investigates capstone subjects offered by Australian business schools, drawing on national survey data collected in 2010-2011, complemented by interviews with associate deans teaching and learning instrumental in course and curricula design. Findings indicate the sector-wide use of capstone subjects in business disciplines, diversity in the patterns of offerings, and instances where subjects labelled as capstones do not meet the definition of capstones. We argue that these features are explained by a range of historic and strategic factors, such as the ad hoc development of subjects and a lack of understanding of the features of capstones. The findings of this paper inform the debate on the design, development, value and use of capstone subjects identifying the implications for staff development and knowledge management in higher education.
Resumo:
Streamciphers are common cryptographic algorithms used to protect the confidentiality of frame-based communications like mobile phone conversations and Internet traffic. Streamciphers are ideal cryptographic algorithms to encrypt these types of traffic as they have the potential to encrypt them quickly and securely, and have low error propagation. The main objective of this thesis is to determine whether structural features of keystream generators affect the security provided by stream ciphers.These structural features pertain to the state-update and output functions used in keystream generators. Using linear sequences as keystream to encrypt messages is known to be insecure. Modern keystream generators use nonlinear sequences as keystream.The nonlinearity can be introduced through a keystream generator's state-update function, output function, or both. The first contribution of this thesis relates to nonlinear sequences produced by the well-known Trivium stream cipher. Trivium is one of the stream ciphers selected in a final portfolio resulting from a multi-year project in Europe called the ecrypt project. Trivium's structural simplicity makes it a popular cipher to cryptanalyse, but to date, there are no attacks in the public literature which are faster than exhaustive keysearch. Algebraic analyses are performed on the Trivium stream cipher, which uses a nonlinear state-update and linear output function to produce keystream. Two algebraic investigations are performed: an examination of the sliding property in the initialisation process and algebraic analyses of Trivium-like streamciphers using a combination of the algebraic techniques previously applied separately by Berbain et al. and Raddum. For certain iterations of Trivium's state-update function, we examine the sets of slid pairs, looking particularly to form chains of slid pairs. No chains exist for a small number of iterations.This has implications for the period of keystreams produced by Trivium. Secondly, using our combination of the methods of Berbain et al. and Raddum, we analysed Trivium-like ciphers and improved on previous on previous analysis with regards to forming systems of equations on these ciphers. Using these new systems of equations, we were able to successfully recover the initial state of Bivium-A.The attack complexity for Bivium-B and Trivium were, however, worse than exhaustive keysearch. We also show that the selection of stages which are used as input to the output function and the size of registers which are used in the construction of the system of equations affect the success of the attack. The second contribution of this thesis is the examination of state convergence. State convergence is an undesirable characteristic in keystream generators for stream ciphers, as it implies that the effective session key size of the stream cipher is smaller than the designers intended. We identify methods which can be used to detect state convergence. As a case study, theMixer streamcipher, which uses nonlinear state-update and output functions to produce keystream, is analysed. Mixer is found to suffer from state convergence as the state-update function used in its initialisation process is not one-to-one. A discussion of several other streamciphers which are known to suffer from state convergence is given. From our analysis of these stream ciphers, three mechanisms which can cause state convergence are identified.The effect state convergence can have on stream cipher cryptanalysis is examined. We show that state convergence can have a positive effect if the goal of the attacker is to recover the initial state of the keystream generator. The third contribution of this thesis is the examination of the distributions of bit patterns in the sequences produced by nonlinear filter generators (NLFGs) and linearly filtered nonlinear feedback shift registers. We show that the selection of stages used as input to a keystream generator's output function can affect the distribution of bit patterns in sequences produced by these keystreamgenerators, and that the effect differs for nonlinear filter generators and linearly filtered nonlinear feedback shift registers. In the case of NLFGs, the keystream sequences produced when the output functions take inputs from consecutive register stages are less uniform than sequences produced by NLFGs whose output functions take inputs from unevenly spaced register stages. The opposite is true for keystream sequences produced by linearly filtered nonlinear feedback shift registers.
Resumo:
To date, available literature mainly discusses Twitter activity patterns in the context of individual case studies, while comparative research on a large number of communicative events, their dynamics and patterns is missing. By conducting a comparative study of more than forty different cases (covering topics such as elections, natural disasters, corporate crises, and televised events) we identify a number of distinct types of discussion which can be observed on Twitter. Drawing on a range of communicative metrics, we show that thematic and contextual factors influence the usage of different communicative tools available to Twitter users, such as original tweets, @replies, retweets, and URLs. Based on this first analysis of the overall metrics of Twitter discussions, we also demonstrate stable patterns in the use of Twitter in the context of major topics and events.
Resumo:
A key question in neuroscience is how memory is selectively allocated to neural networks in the brain. This question remains a significant research challenge, in both rodent models and humans alike, because of the inherent difficulty in tracking and deciphering large, highly dimensional neuronal ensembles that support memory (i.e., the engram). In a previous study we showed that consolidation of a new fear memory is allocated to a common topography of amygdala neurons. When a consolidated memory is retrieved, it may enter a labile state, requiring reconsolidation for it to persist. What is not known is whether the original spatial allocation of a consolidated memory changes during reconsolidation. Knowledge about the spatial allocation of a memory, during consolidation and reconsolidation, provides fundamental insight into its core physical structure (i.e., the engram). Using design-based stereology, we operationally define reconsolidation by showing a nearly identical quantity of neurons in the dorsolateral amygdala (LAd) that expressed a plasticity-related protein, phosphorylated mitogen-activated protein kinase, following both memory acquisition and retrieval. Next, we confirm that Pavlovian fear conditioning recruits a stable, topographically organized population of activated neurons in the LAd. When the stored fear memory was briefly reactivated in the presence of the relevant conditioned stimulus, a similar topography of activated neurons was uncovered. In addition, we found evidence for activated neurons allocated to new regions of the LAd. These findings provide the first insight into the spatial allocation of a fear engram in the LAd, during its consolidation and reconsolidation phase.
Resumo:
Pavlovian fear conditioning is a robust technique for examining behavioral and cellular components of fear learning and memory. In fear conditioning, the subject learns to associate a previously neutral stimulus with an inherently noxious co-stimulus. The learned association is reflected in the subjects' behavior upon subsequent re-exposure to the previously neutral stimulus or the training environment. Using fear conditioning, investigators can obtain a large amount of data that describe multiple aspects of learning and memory. In a single test, researchers can evaluate functional integrity in fear circuitry, which is both well characterized and highly conserved across species. Additionally, the availability of sensitive and reliable automated scoring software makes fear conditioning amenable to high-throughput experimentation in the rodent model; thus, this model of learning and memory is particularly useful for pharmacological and toxicological screening. Due to the conserved nature of fear circuitry across species, data from Pavlovian fear conditioning are highly translatable to human models. We describe equipment and techniques needed to perform and analyze conditioned fear data. We provide two examples of fear conditioning experiments, one in rats and one in mice, and the types of data that can be collected in a single experiment. © 2012 Springer Science+Business Media, LLC.
Resumo:
Pavlovian fear conditioning, also known as classical fear conditioning is an important model in the study of the neurobiology of normal and pathological fear. Progress in the neurobiology of Pavlovian fear also enhances our understanding of disorders such as posttraumatic stress disorder (PTSD) and with developing effective treatment strategies. Here we describe how Pavlovian fear conditioning is a key tool for understanding both the neurobiology of fear and the mechanisms underlying variations in fear memory strength observed across different phenotypes. First we discuss how Pavlovian fear models aspects of PTSD. Second, we describe the neural circuits of Pavlovian fear and the molecular mechanisms within these circuits that regulate fear memory. Finally, we show how fear memory strength is heritable; and describe genes which are specifically linked to both changes in Pavlovian fear behavior and to its underlying neural circuitry. These emerging data begin to define the essential genes, cells and circuits that contribute to normal and pathological fear.
Resumo:
This thesis is a study of how the contents of volatile memory on the Windows operating system can be better understood and utilised for the purposes of digital forensic investigations. It proposes several techniques to improve the analysis of memory, with a focus on improving the detection of unknown code such as malware. These contributions allow the creation of a more complete reconstruction of the state of a computer at acquisition time, including whether or not the computer has been infected by malicious code.
Resumo:
Physical activity (PA) has many beneficial physical and mental health effects. Physical inactivity is considered the fourth leading risk factor for global mortality. At present there are no systematic reviews on PA patterns among South Asian adults residing in the region. The present study aims to systematically evaluate studies on PA patterns in South Asian countries. A five-staged comprehensive search of the literature was conducted in Medline, Web of Science and SciVerse Scopus using keywords ‘Exercise’, ‘Walking’, ‘Physical activity’, ‘Inactivity’, ‘Physical Activity Questionnaire’, ‘International Physical Activity Questionnaire’, ‘IPAQ’, ‘Global Physical Activity Questionnaire’ and ‘GPAQ’, combined with individual country names. The search was restricted to English language articles conducted in humans and published before 31st December 2012. To obtain additional data a manual search of the reference lists of articles was performed. Data were also retrieved from the search of relevant web sites and online resources. The total number of hits obtained from the initial search was 1,771. The total number of research articles included in the present review is eleven (India-8, Sri Lanka-2, Pakistan-1). In addition, eleven country reports (Nepal-3, Bangladesh-2, India-2, Sri Lanka-2, Bhutan-1, Maldives-1) of World Health Organization STEPS survey from the South-Asian countries were retrieved online. In the research articles the overall prevalence of inactivity was as follows; India (18.5%-88.4%), Pakistan (60.1%) and Sri Lanka (11.0%-31.8%). STEPS survey reports were available from all countries except Pakistan. Overall in majority of STEPS surveys females were more inactive compared to males. Furthermore, leisure related inactivity was >75% in studies reporting inactivity in this domain and people were more active in transport domain when compared with the other domains. In conclusion, our results show that there is a wide variation in the prevalence of physical inactivity among South-Asian adults within and between countries. Furthermore, physical inactivity in South Asian adults was associated with several socio-demographic characteristics. Majority of South Asian adults were inactive during their leisure time. These Factors need to be considered when planning future interventions and research aimed at improving PA in the region.
Resumo:
Purpose To investigate hyperopic shifts and the oblique (or 45-degree/135-degree) component of astigmatism at large angles in the horizontal visual field using the Hartmann-Shack technique. Methods The adult participants consisted of 6 hypermetropes, 13 emmetropes and 11 myopes. Measurements were made with a modified COAS-HD Hartmann-Shack aberrometer across T60 degrees along the horizontal visual field in 5-degree steps. Eyes were dilated with 1% cyclopentolate. Peripheral refraction was estimated as mean spherical (or spherical equivalent) refraction, with/against the rule of astigmatism and oblique astigmatism components, and as horizontal and vertical refraction components based on 3-mm major diameter elliptical pupils. Results Thirty percent of eyes showed a pattern that was a combination of type IV and type I patterns of Rempt et al. (Rempt F, Hoogerheide J, Hoogenboom WP. Peripheral retinoscopy and the skiagram. Ophthalmologica 1971;162:1Y10), which shows the characteristics of type IV (relative hypermetropia along the vertical meridian and relative myopia along the horizontal meridian) out to an angle of between 40 and 50 degrees before behaving like type I (both meridians show relative hypermetropia). We classified this pattern as type IV/I. Seven of 13 emmetropes had this pattern. As a group, there was no significant variation of the oblique component of astigmatism with angle, but about one-half of the eyes showed significant positive slopes (more positive or less negative values in the nasal field than in the temporal field) and one-fourth showed significant negative slopes. Conclusions It is often considered that a pattern of relative peripheral hypermetropia predisposes to the development of myopia. In this context, the finding of a considerable portion of emmetropes with the IV/I pattern suggests that it is unlikely that refraction at visual field angles beyond 40 degrees from fixation contributes to myopia development.