911 resultados para Chain Split and Computations in Practical Rule Mining
Resumo:
Spotted fever is a disease caused by bacteria from the genus Rickettsia of the spotted fever group (SFG). Rickettsia rickettsii is likely the main agent of Brazilian spotted fever (BSF). With the objective of gathering information on the circulation of SFG rickettsiae in Londrina, Parana state, ticks from dogs and horses and also blood from dogs, horses and humans were collected in a neighbourhood of the city which presented potential for circulation of rickettsiae between hosts and vectors. Amblyomma cajennense, Dermacentor nitens, and Rhipicephalus sanguineus ticks were subjected to Polymerase Chain Reaction targeting a fragment of the Rickettsia gltA gene. This specific gene encodes the enzyme citrate synthase of Rickettsia spp., and results on all ticks were negative. Human and animal sera were tested by Indirect Immunofluorescence Assay in which R. rickettsii and R. parkeri were used as antigens. Sera from 4.7% human, 2.7% canine and 38.5% equine were positive for R. rickettsii. For R. parkeri, 0.9% human, 2.7% canine and 11.5% equine samples were positive. All samples reactive to R. parkeri also reacted to R. rickettsii. An epidemiological questionnaire was applied, but there were no statistically significant results. Comparison of our serological results with previous studies in Brazil, among BSF endemic and non-endemic areas, indicates that there is no established rickettsial infection in the study area, a statement corroborated with our molecular analysis. Nonetheless, as humans of the present study are highly exposed to tick infestations, health education within the population is needed to obtain efficient tick control. Zoonoses and Public Health 416 (C) 2011 Blackwell Verlag GmbH . Zoonoses Public Health. 58 (2011) 416-423
Resumo:
Despite a large number of T cells infiltrating the liver of patients with chronic hepatitis B, little is known about their complexity or specificity. To characterize the composition of these T cells involved with the pathogenesis of chronic hepatitis B (CHB), we have studied the clonality of V beta T cell receptor (TCR)-bearing populations in liver tissue by size spectratyping the complementarity-determining region (CDR3) lengths of TCR transcripts. We have also compared the CDR3 profiles of the lymphocytes infiltrating the liver with those circulating in the blood to see whether identical clonotypes may be detected that would indicate a virus-induced expansion in both compartments. Our studies show that in most of the patients examined, the T cell composition of liver infiltrating lymphocytes is highly restricted, with evidence of clonotypic expansions in 4 to 9 TCR V beta subfamilies. In contrast, the blood compartment contains an average of 1 to 3 expansions. This pattern is seen irrespective of the patient's viral load or degree of liver pathology. Although the TCR repertoire profiles between the 2 compartments are generally distinct, there is evidence of some T cell subsets being equally distributed between the blood and the liver. Finally, we provide evidence for a putative public binding motif within the CDR3 region with the sequence G-X-S, which may be involved with hepatitis B virus recognition.
Resumo:
Using differential display PCR, we identified a novel gene upregulated in renal cell carcinoma. Characterization of the full-length cDNA and gene revealed that the encoded protein is a human homologue of the Drosophila melanogaster Tweety protein, and so we have termed the novel protein TTYH2. The orthologous mouse cDNA was also identified and the predicted mouse protein is 81% identical to the human protein. The encoded human TTYH2 protein is 534 amino acids and, like the other members of the tweety-related protein family, is a putative cell surface protein with five transmembrane regions. TTYH2 is located at 17q24; it is expressed most highly in brain and testis and at lower levels in heart, ovary, spleen, and peripheral blood leukocytes. Expression of this gene is upregulated in 13 of 16 (81%) renal cell carcinoma samples examined. In addition to a putative role in brain and testis, the overexpression of TTYH2 in renal cell carcinoma suggests that it may have an important role in kidney tumorigenesis.
Resumo:
We examine the potential impact of interconnectivity of value chain partnerships through electronic means (e-business practices) on the management of Public Sector Agriculture R&D in Australia. We review the changing forms of managing research and development, the forces driving these changes, and R&D processes that are theoretically consistent with the move towards value chain involvement and the increase in active constituents in Public Sector Agriculture R&D. We then explore the potential of emerging e-business models to change the patterns of inter-connectivity, speed and omnipresence of partners in the value chain. Three e-business R&D management practices are identified that provide the prerequisite flexibility necessary to take advantage of opportunistic markets. These R&D business practices are: compressing R&D to reduce time to market, fostering co-development to enter a market at the last moment and building flexible products that allow adjustment at the last possible moment. Some fundamental reallocation of existing resources will be required to meet these markets. Implications of these e-business practices for R&D management are discussed.
Resumo:
Levels of expression of mRNAs encoding the different Ephs and ephrins were measured by semi-quantitative reverse-transcription polymerase chain reaction in developing mouse whole inner ears, and in dissected fractions of the neonatal mouse inner ear. Nineteen of the 24 known Ephs and ephrins were surveyed. The results showed that between embryonic age (E) 11.5 days and E12.5, levels increased 10-300 times per unit of tissue. In neonatal mice, the fraction containing combined organ of Corti and spiral ganglion showed relatively strong expression of EphA4, EphB3, ephrin-A3, ephrin-B2 and ephrin-B3. In the lateral wall, EphA4, ephrin-A3 and ephrin-B2 were strongly expressed, while ephrin-A3 was particularly strongly expressed in utricular and saccular sensory epithelia. The results suggest that the Ephs and ephrins are likely to play a part in the differentiation of the structures of the inner ear, and show which Ephs and ephrins are most likely to play important roles in the different structures. (C) 2003 Elsevier Science B.V. All rights reserved.
Resumo:
The authors investigated the extent to which the joint-attention behaviors of gaze following, social referencing, and object-directed imitation were related to each other and to infants vocabulary development in a sample of 60 infants between the ages of 8 and 14 months. Joint-attention skills and vocabulary development were assessed in a laboratory setting. Split-half reliability analyses on the joint-attention measures indicated that the tasks reliably assessed infants' capabilities. In the main analysis, no significant correlations were found among the joint-attention behaviors except for a significant relationship between gaze following and the number of names in infants' productive vocabularies. The overall pattern of results did not replicate results of previous studies (e.g., M. Carpenter, K. Nagell, & M. Tomasello, 1998) that found relationships between various emerging joint-attention behaviors.
Resumo:
In this work, we consider the numerical solution of a large eigenvalue problem resulting from a finite rank discretization of an integral operator. We are interested in computing a few eigenpairs, with an iterative method, so a matrix representation that allows for fast matrix-vector products is required. Hierarchical matrices are appropriate for this setting, and also provide cheap LU decompositions required in the spectral transformation technique. We illustrate the use of freely available software tools to address the problem, in particular SLEPc for the eigensolvers and HLib for the construction of H-matrices. The numerical tests are performed using an astrophysics application. Results show the benefits of the data-sparse representation compared to standard storage schemes, in terms of computational cost as well as memory requirements.
Resumo:
This paper is research oriented and pretends to contribute toward giving empirical evidence about how students develop their reasoning and how they achieved to a proof construction in school context. Its main theme is epistemology. It describes the way in which four students in 9th Grade explored a task related with the discovery of symmetry axes in various geometric figures. The proof constructed by students had essentially an explaining function and it was related with the symmetry axes of regular polygons. The teacher’s role in meaning negotiation of the proof and its need is described through illustrative episodes. The paper presents part of a study which purpose is to analyse the nature of mathematical proof in classroom, its role and the nature of the relationship between the construction of a proof and the social interactions. Assuming a social perspective, attention is focussed on the social construction of knowledge and on the structuring resources that shape mathematical experience. The study’s methodology has an interpretative nature. One outcome of the study discussed here is that students develop first a practical understanding with no awareness of the reasons founding mathematical statements and after a theoretical one leading them to a proof elaboration.
Resumo:
In this work we investigate the population dynamics of cooperative hunting extending the McCann and Yodzis model for a three-species food chain system with a predator, a prey, and a resource species. The new model considers that a given fraction sigma of predators cooperates in prey's hunting, while the rest of the population 1-sigma hunts without cooperation. We use the theory of symbolic dynamics to study the topological entropy and the parameter space ordering of the kneading sequences associated with one-dimensional maps that reproduce significant aspects of the dynamics of the species under several degrees of cooperative hunting. Our model also allows us to investigate the so-called deterministic extinction via chaotic crisis and transient chaos in the framework of cooperative hunting. The symbolic sequences allow us to identify a critical boundary in the parameter spaces (K, C-0) and (K, sigma) which separates two scenarios: (i) all-species coexistence and (ii) predator's extinction via chaotic crisis. We show that the crisis value of the carrying capacity K-c decreases at increasing sigma, indicating that predator's populations with high degree of cooperative hunting are more sensitive to the chaotic crises. We also show that the control method of Dhamala and Lai [Phys. Rev. E 59, 1646 (1999)] can sustain the chaotic behavior after the crisis for systems with cooperative hunting. We finally analyze and quantify the inner structure of the target regions obtained with this control method for wider parameter values beyond the crisis, showing a power law dependence of the extinction transients on such critical parameters.
Resumo:
Designing electric installation projects, demands not only academic knowledge, but also other types of knowledge not easily acquired through traditional instructional methodologies. A lot of additional empirical knowledge is missing and so the academic instruction must be completed with different kinds of knowledge, such as real-life practical examples and simulations. On the other hand, the practical knowledge detained by the most experienced designers is not formalized in such a way that is easily transmitted. In order to overcome these difficulties present in the engineers formation, we are developing an Intelligent Tutoring System (ITS), for training and support concerning the development of electrical installation projects to be used by electrical engineers, technicians and students.
Resumo:
Mestrado em Engenharia Informática
Resumo:
Dissertation elaborated for the partial fulfilment of the requirements of the Master Degree in Civil Engineering in the Speciality Area of Hydarulics
Resumo:
We focus on large-scale and dense deeply embedded systems where, due to the large amount of information generated by all nodes, even simple aggregate computations such as the minimum value (MIN) of the sensor readings become notoriously expensive to obtain. Recent research has exploited a dominance-based medium access control(MAC) protocol, the CAN bus, for computing aggregated quantities in wired systems. For example, MIN can be computed efficiently and an interpolation function which approximates sensor data in an area can be obtained efficiently as well. Dominance-based MAC protocols have recently been proposed for wireless channels and these protocols can be expected to be used for achieving highly scalable aggregate computations in wireless systems. But no experimental demonstration is currently available in the research literature. In this paper, we demonstrate that highly scalable aggregate computations in wireless networks are possible. We do so by (i) building a new wireless hardware platform with appropriate characteristics for making dominance-based MAC protocols efficient, (ii) implementing dominance-based MAC protocols on this platform, (iii) implementing distributed algorithms for aggregate computations (MIN, MAX, Interpolation) using the new implementation of the dominance-based MAC protocol and (iv) performing experiments to prove that such highly scalable aggregate computations in wireless networks are possible.
Resumo:
In this paper, we focus on large-scale and dense Cyber- Physical Systems, and discuss methods that tightly integrate communication and computing with the underlying physical environment. We present Physical Dynamic Priority Dominance ((PD)2) protocol that exemplifies a key mechanism to devise low time-complexity communication protocols for large-scale networked sensor systems. We show that using this mechanism, one can compute aggregate quantities such as the maximum or minimum of sensor readings in a time-complexity that is equivalent to essentially one message exchange. We also illustrate the use of this mechanism in a more complex task of computing the interpolation of smooth as well as non-smooth sensor data in very low timecomplexity.
Resumo:
The computations performed by the brain ultimately rely on the functional connectivity between neurons embedded in complex networks. It is well known that the neuronal connections, the synapses, are plastic, i.e. the contribution of each presynaptic neuron to the firing of a postsynaptic neuron can be independently adjusted. The modulation of effective synaptic strength can occur on time scales that range from tens or hundreds of milliseconds, to tens of minutes or hours, to days, and may involve pre- and/or post-synaptic modifications. The collection of these mechanisms is generally believed to underlie learning and memory and, hence, it is fundamental to understand their consequences in the behavior of neurons.(...)