999 resultados para tap selection
Resumo:
Social groups are common across animal species. The reasons for grouping are straightforward when all individuals gain directly from cooperating. However, the situation becomes more complex when helping entails costs to the personal reproduction of individuals. Kin selection theory has offered a fruitful framework to explain such cooperation by stating that individuals may spread their genes not only through their own reproduction, but also by helping related individuals reproduce. However, kin selection theory also implicitly predicts conflicts when groups consist of non-clonal individuals, i.e. relatedness is less than one. Then, individual interests are not perfectly aligned, and each individual is predicted to favour the propagation of their own genome over others. Social insects provide a solid study system to study the interplay between cooperation and conflict. Breeding systems in social insects range from solitary breeding to eusocial colonies displaying complete division of reproduction between the fertile queen and the sterile worker caste. Within colonies, additional variation is provided by the presence of several reproductive individuals. In many species, the queen mates multiply, which causes the colony to consist of half-sib instead of full-sib offspring. Furthermore, in many species colonies contain multiple breeding queens, which further dilutes relatedness between colony members. Evolutionary biology is thus faced with the challenge to answer why such variation in social structure exists, and what the consequences are on the individual and population level. The main part of this thesis takes on this challenge by investing the dynamics of socially polymorphic ant colonies. The first four chapters investigate the causes and consequences of different social structures, using a combination of field studies, genetic analyses and laboratory experiments. The thesis ends with a theoretical chapter focusing on different social interactions (altruism and spite), and the evolution of harming traits. The main results of the thesis show that social polymorphism has the potential to affect the behaviour and traits of both individuals and colonies. For example, we found that genetic polymorphism may increase the phenotypic variation between individuals in colonies, and that socially polymorphic colonies may show different life history patterns. We also show that colony cohesion may be enhanced even in multiple-queen colonies through patterns of unequal reproduction between queens. However, the thesis also demonstrates that spatial and temporal variation between both populations and environments may affect individual and colony traits, to the degree that results obtained in one place or at one time may not be applicable in other situations. This opens up potential further areas of research to explain these differences.
Resumo:
Jordens ekologiska system undergår för tillfället stora förändringar pga. människans aktiviteter. Ett växande antal studier visar att dessa förändringar påverkar naturliga och sexuella urvalet och därmed evolutiva processer. Målet med detta arbete var att undersöka effekterna av omgivningsförändringar på sexuella urvalet genom att använda den ökade övergödningen inom storpiggen Gasterosteus aculeatus lekområden som modell system. Sexuella urvalet är en viktig evolutiv kraft med följder på populations- och artnivå (Kapitel 1). Avhandlingens olika delar fokuserar på övergödningens effekter på upptäckandet av partners, användningen av visuella- och doftsignaler i partnersval, och fördelningen av parningsframgången mellan bobyggande hanar. I Kapitel II och III simuleras hur grumlighet orsakad av fytoplankton påverkar hastigheten med vilken potentiella partners påträffas, genom effekter på synligheten. Resultaten visar att normala algblomningar i Östersjön har en måttlig effekt på finnandet av potentiella partners. Detta tyder på att algblomningarna troligen inte kommer att minska på selektiva parningen pga. ökade sökkostnader. I Kapitel IV visas att storspiggen ändrar relativa användningen av olika signaler när vattnets grumlighet ökar; visuella signaler minskar i betydelse medan doftsignaler ökar i betydelse. Samtidigt underlättas användandet av doftsignaler av ändringar i vattnets kemiska sammansättning då fotosyntesen intensifieras (Kapitel V). Lek i övergödda vatten kan ändå vara kostsamt både på individ- och populationsnivån, då parasiterade hanar, som troligen är dåligt genetiskt anpassade till sin miljö, lyckas få mer ägg i sina bon än friskare hanar som troligen är av högre genetisk kvalitet (Kapitel VI). Övergödningen påverkar således partnersval och konkurrensen om partners genom att påverka upptäckandet av potentiella partners, evalueringen av partners och fördelningen av partners inom lekområdena. De följder detta kan ha för evolutionen av sexuellt selekterad egenskaper och för populationers dynamik och livskraft är dock oklara. Avhandlingen visar på svårigheten att förutse följderna av omgivningsförändringar för sexuella urvalet och effekterna på individ och populationsnivå.
Resumo:
Scratch assays are difficult to reproduce. Here we identify a previously overlooked source of variability which could partially explain this difficulty. We analyse a suite of scratch assays in which we vary the initial degree of confluence (initial cell density). Our results indicate that the rate of re-colonisation is very sensitive to the initial density. To quantify the relative roles of cell migration and proliferation, we calibrate the solution of the Fisher–Kolmogorov model to cell density profiles to provide estimates of the cell diffusivity, D, and the cell proliferation rate, λ. This procedure indicates that the estimates of D and λ are very sensitive to the initial density. This dependence suggests that the Fisher–Kolmogorov model does not accurately represent the details of the collective cell spreading process, since this model assumes that D and λ are constants that ought to be independent of the initial density. Since higher initial cell density leads to enhanced spreading, we also calibrate the solution of the Porous–Fisher model to the data as this model assumes that the cell flux is an increasing function of the cell density. Estimates of D and λ associated with the Porous–Fisher model are less sensitive to the initial density, suggesting that the Porous–Fisher model provides a better description of the experiments.
Resumo:
Security in a mobile communication environment is always a matter for concern, even after deploying many security techniques at device, network, and application levels. The end-to-end security for mobile applications can be made robust by developing dynamic schemes at application level which makes use of the existing security techniques varying in terms of space, time, and attacks complexities. In this paper we present a security techniques selection scheme for mobile transactions, called the Transactions-Based Security Scheme (TBSS). The TBSS uses intelligence to study, and analyzes the security implications of transactions under execution based on certain criterion such as user behaviors, transaction sensitivity levels, and credibility factors computed over the previous transactions by the users, network vulnerability, and device characteristics. The TBSS identifies a suitable level of security techniques from the repository, which consists of symmetric, and asymmetric types of security algorithms arranged in three complexity levels, covering various encryption/decryption techniques, digital signature schemes, andhashing techniques. From this identified level, one of the techniques is deployed randomly. The results shows that, there is a considerable reduction in security cost compared to static schemes, which employ pre-fixed security techniques to secure the transactions data.
Resumo:
In this paper we consider the task of prototype selection whose primary goal is to reduce the storage and computational requirements of the Nearest Neighbor classifier while achieving better classification accuracies. We propose a solution to the prototype selection problem using techniques from cooperative game theory and show its efficacy experimentally.
Resumo:
Objective: To determine the extent to which different strength training exercises selectively activate the commonly injured biceps femoris long head (BFLH) muscle. Methods: This two-part observational study recruited 24 recreationally active males. Part 1 explored the amplitudes and the ratios of lateral to medial hamstring (BF/MH) normalised electromyography (nEMG) during the concentric and eccentric phases of 10 common strength training exercises. Part 2 used functional magnetic resonance imaging (fMRI) to determine the spatial patterns of hamstring activation during two exercises which i) most selectively, and ii) least selectively activated the BF in part 1. Results: Eccentrically, the largest BF/MH nEMG ratio was observed in the 45° hip extension exercise and the lowest was observed in the Nordic hamstring (NHE) and bent-knee bridge exercises. Concentrically, the highest BF/MH nEMG ratio was observed during the lunge and 45° hip extension and the lowest was observed for the leg curl and bent-knee bridge. fMRI revealed a greater BFLH to semitendinosus activation ratio in the 45° hip extension than the NHE (p<0.001). The T2 increase after hip extension for BFLH, semitendinosus and semimembranosus muscles were greater than that for BFSH (p<0.001). During the NHE, the T2 increase was greater for the semitendinosus than for the other hamstrings (p≤0.002). Conclusion: This investigation highlights the non-uniformity of hamstring activation patterns in different tasks and suggests that hip extension exercise more selectively activates the BFLH while the NHE preferentially recruits the semitendinosus. These findings have implications for strength training interventions aimed at preventing hamstring injury.
Resumo:
In this work, we explore simultaneous geometry design and material selection for statically determinate trusses by posing it as a continuous optimization problem. The underlying principles of our approach are structural optimization and Ashby’s procedure for material selection from a database. For simplicity and ease of initial implementation, only static loads are considered in this work with the intent of maximum stiffness, minimum weight/cost, and safety against failure. Safety of tensile and compression members in the truss is treated differently to prevent yield and buckling failures, respectively. Geometry variables such as lengths and orientations of members are taken to be the design variables in an assumed layout. Areas of cross-section of the members are determined to satisfy the failure constraints in each member. Along the lines of Ashby’s material indices, a new design index is derived for trusses. The design index helps in choosing the most suitable material for any geometry of the truss. Using the design index, both the design space and the material database are searched simultaneously using gradient-based optimization algorithms. The important feature of our approach is that the formulated optimization problem is continuous, although the material selection from a database is an inherently discrete problem. A few illustrative examples are included. It is observed that the method is capable of determining the optimal topology in addition to optimal geometry when the assumed layout contains more links than are necessary for optimality.
Resumo:
Relay selection for cooperative communications promises significant performance improvements, and is, therefore, attracting considerable attention. While several criteria have been proposed for selecting one or more relays, distributed mechanisms that perform the selection have received relatively less attention. In this paper, we develop a novel, yet simple, asymptotic analysis of a splitting-based multiple access selection algorithm to find the single best relay. The analysis leads to simpler and alternate expressions for the average number of slots required to find the best user. By introducing a new contention load' parameter, the analysis shows that the parameter settings used in the existing literature can be improved upon. New and simple bounds are also derived. Furthermore, we propose a new algorithm that addresses the general problem of selecting the best Q >= 1 relays, and analyze and optimize it. Even for a large number of relays, the scalable algorithm selects the best two relays within 4.406 slots and the best three within 6.491 slots, on average. We also propose a new and simple scheme for the practically relevant case of discrete metrics. Altogether, our results develop a unifying perspective about the general problem of distributed selection in cooperative systems and several other multi-node systems.
Resumo:
The motivation behind the fusion of Intrusion Detection Systems was the realization that with the increasing traffic and increasing complexity of attacks, none of the present day stand-alone Intrusion Detection Systems can meet the high demand for a very high detection rate and an extremely low false positive rate. Multi-sensor fusion can be used to meet these requirements by a refinement of the combined response of different Intrusion Detection Systems. In this paper, we show the design technique of sensor fusion to best utilize the useful response from multiple sensors by an appropriate adjustment of the fusion threshold. The threshold is generally chosen according to the past experiences or by an expert system. In this paper, we show that the choice of the threshold bounds according to the Chebyshev inequality principle performs better. This approach also helps to solve the problem of scalability and has the advantage of failsafe capability. This paper theoretically models the fusion of Intrusion Detection Systems for the purpose of proving the improvement in performance, supplemented with the empirical evaluation. The combination of complementary sensors is shown to detect more attacks than the individual components. Since the individual sensors chosen detect sufficiently different attacks, their result can be merged for improved performance. The combination is done in different ways like (i) taking all the alarms from each system and avoiding duplications, (ii) taking alarms from each system by fixing threshold bounds, and (iii) rule-based fusion with a priori knowledge of the individual sensor performance. A number of evaluation metrics are used, and the results indicate that there is an overall enhancement in the performance of the combined detector using sensor fusion incorporating the threshold bounds and significantly better performance using simple rule-based fusion.
Resumo:
Over the past two decades, the selection, optimization, and compensation (SOC) model has been applied in the work context to investigate antecedents and outcomes of employees' use of action regulation strategies. We systematically review, meta-analyze, and critically discuss the literature on SOC strategy use at work and outline directions for future research and practice. The systematic review illustrates the breadth of constructs that have been studied in relation to SOC strategy use, and that SOC strategy use can mediate and moderate relationships of person and contextual antecedents with work outcomes. Results of the meta-analysis show that SOC strategy use is positively related to age (rc = .04), job autonomy (rc = .17), self-reported job performance (rc = .23), non-self-reported job performance (rc = .21), job satisfaction (rc = .25), and job engagement (rc = .38), whereas SOC strategy use is not significantly related to job tenure, job demands, and job strain. Overall, our findings underline the importance of the SOC model for the work context, and they also suggest that its measurement and reporting standards need to be improved to become a reliable guide for future research and organizational practice.
Resumo:
This paper describes a concept for a collision avoidance system for ships, which is based on model predictive control. A finite set of alternative control behaviors are generated by varying two parameters: offsets to the guidance course angle commanded to the autopilot and changes to the propulsion command ranging from nominal speed to full reverse. Using simulated predictions of the trajectories of the obstacles and ship, compliance with the Convention on the International Regulations for Preventing Collisions at Sea and collision hazards associated with each of the alternative control behaviors are evaluated on a finite prediction horizon, and the optimal control behavior is selected. Robustness to sensing error, predicted obstacle behavior, and environmental conditions can be ensured by evaluating multiple scenarios for each control behavior. The method is conceptually and computationally simple and yet quite versatile as it can account for the dynamics of the ship, the dynamics of the steering and propulsion system, forces due to wind and ocean current, and any number of obstacles. Simulations show that the method is effective and can manage complex scenarios with multiple dynamic obstacles and uncertainty associated with sensors and predictions.
Resumo:
Guo and Nixon proposed a feature selection method based on maximizing I(x; Y),the multidimensional mutual information between feature vector x and class variable Y. Because computing I(x; Y) can be difficult in practice, Guo and Nixon proposed an approximation of I(x; Y) as the criterion for feature selection. We show that Guo and Nixon's criterion originates from approximating the joint probability distributions in I(x; Y) by second-order product distributions. We remark on the limitations of the approximation and discuss computationally attractive alternatives to compute I(x; Y).
Resumo:
This paper reports a measurement of the cross section for the pair production of top quarks in ppbar collisions at sqrt(s) = 1.96 TeV at the Fermilab Tevatron. The data was collected from the CDF II detector in a set of runs with a total integrated luminosity of 1.1 fb^{-1}. The cross section is measured in the dilepton channel, the subset of ttbar events in which both top quarks decay through t -> Wb -> l nu b where l = e, mu, or tau. The lepton pair is reconstructed as one identified electron or muon and one isolated track. The use of an isolated track to identify the second lepton increases the ttbar acceptance, particularly for the case in which one W decays as W -> tau nu. The purity of the sample may be further improved at the cost of a reduction in the number of signal events, by requiring an identified b-jet. We present the results of measurements performed with and without the request of an identified b-jet. The former is the first published CDF result for which a b-jet requirement is added to the dilepton selection. In the CDF data there are 129 pretag lepton + track candidate events, of which 69 are tagged. With the tagging information, the sample is divided into tagged and untagged sub-samples, and a combined cross section is calculated by maximizing a likelihood. The result is sigma_{ttbar} = 9.6 +/- 1.2 (stat.) -0.5 +0.6 (sys.) +/- 0.6 (lum.) pb, assuming a branching ratio of BR(W -> ell nu) = 10.8% and a top mass of m_t = 175 GeV/c^2.