957 resultados para distance function
Resumo:
The use of Mahalanobis squared distance–based novelty detection in statistical damage identification has become increasingly popular in recent years. The merit of the Mahalanobis squared distance–based method is that it is simple and requires low computational effort to enable the use of a higher dimensional damage-sensitive feature, which is generally more sensitive to structural changes. Mahalanobis squared distance–based damage identification is also believed to be one of the most suitable methods for modern sensing systems such as wireless sensors. Although possessing such advantages, this method is rather strict with the input requirement as it assumes the training data to be multivariate normal, which is not always available particularly at an early monitoring stage. As a consequence, it may result in an ill-conditioned training model with erroneous novelty detection and damage identification outcomes. To date, there appears to be no study on how to systematically cope with such practical issues especially in the context of a statistical damage identification problem. To address this need, this article proposes a controlled data generation scheme, which is based upon the Monte Carlo simulation methodology with the addition of several controlling and evaluation tools to assess the condition of output data. By evaluating the convergence of the data condition indices, the proposed scheme is able to determine the optimal setups for the data generation process and subsequently avoid unnecessarily excessive data. The efficacy of this scheme is demonstrated via applications to a benchmark structure data in the field.
Resumo:
Human genetic association studies have shown gene variants in the α5 subunit of the neuronal nicotinic receptor (nAChR) influence both ethanol and nicotine dependence. The α5 subunit is an accessory subunit that facilitates α4* nAChRs assembly in vitro. However, it is unknown whether this occurs in the brain, as there are few research tools to adequately address this question. As the α4*-containing nAChRs are highly expressed in the ventral tegmental area (VTA) we assessed the molecular, functional and pharmacological roles of α5 in α4*-containing nAChRs in the VTA. We utilized transgenic mice α5+/+(α4YFP) and α5-/-(α4YFP) that allow the direct visualization and measurement of α4-YFP expression and the effect of the presence (α5+/+) and absence of α5 (-/-) subunit, as the antibodies for detecting the α4* subunits of the nAChR are not specific. We performed voltage clamp electrophysiological experiments to study baseline nicotinic currents in VTA dopaminergic neurons. We show that in the presence of the α5 subunit, the overall expression of α4 subunit is increased significantly by 60% in the VTA. Furthermore, the α5 subunit strengthens baseline nAChR currents, suggesting the increased expression of α4* nAChRs to be likely on the cell surface. While the presence of the α5 subunit blunts the desensitization of nAChRs following nicotine exposure, it does not alter the amount of ethanol potentiation of VTA dopaminergic neurons. Our data demonstrates a major regulatory role for the α5 subunit in both the maintenance of α4*-containing nAChRs expression and in modulating nicotinic currents in VTA dopaminergic neurons. Additionally, the α5α4* nAChR in VTA dopaminergic neurons regulates the effect of nicotine but not ethanol on currents. Together, the data suggest that the α5 subunit is critical for controlling the expression and functional role of a population of α4*-containing nAChRs in the VTA.
Resumo:
Many cell types form clumps or aggregates when cultured in vitro through a variety of mechanisms including rapid cell proliferation, chemotaxis, or direct cell-to-cell contact. In this paper we develop an agent-based model to explore the formation of aggregates in cultures where cells are initially distributed uniformly, at random, on a two-dimensional substrate. Our model includes unbiased random cell motion, together with two mechanisms which can produce cell aggregates: (i) rapid cell proliferation, and (ii) a biased cell motility mechanism where cells can sense other cells within a finite range, and will tend to move towards areas with higher numbers of cells. We then introduce a pair-correlation function which allows us to quantify aspects of the spatial patterns produced by our agent-based model. In particular, these pair-correlation functions are able to detect differences between domains populated uniformly at random (i.e. at the exclusion complete spatial randomness (ECSR) state) and those where the proliferation and biased motion rules have been employed - even when such differences are not obvious to the naked eye. The pair-correlation function can also detect the emergence of a characteristic inter-aggregate distance which occurs when the biased motion mechanism is dominant, and is not observed when cell proliferation is the main mechanism of aggregate formation. This suggests that applying the pair-correlation function to experimental images of cell aggregates may provide information about the mechanism associated with observed aggregates. As a proof of concept, we perform such analysis for images of cancer cell aggregates, which are known to be associated with rapid proliferation. The results of our analysis are consistent with the predictions of the proliferation-based simulations, which supports the potential usefulness of pair correlation functions for providing insight into the mechanisms of aggregate formation.
Resumo:
An Artificial Neural Network (ANN) is a computational modeling tool which has found extensive acceptance in many disciplines for modeling complex real world problems. An ANN can model problems through learning by example, rather than by fully understanding the detailed characteristics and physics of the system. In the present study, the accuracy and predictive power of an ANN was evaluated in predicting kinetic viscosity of biodiesels over a wide range of temperatures typically encountered in diesel engine operation. In this model, temperature and chemical composition of biodiesel were used as input variables. In order to obtain the necessary data for model development, the chemical composition and temperature dependent fuel properties of ten different types of biodiesels were measured experimentally using laboratory standard testing equipments following internationally recognized testing procedures. The Neural Networks Toolbox of MatLab R2012a software was used to train, validate and simulate the ANN model on a personal computer. The network architecture was optimised following a trial and error method to obtain the best prediction of the kinematic viscosity. The predictive performance of the model was determined by calculating the absolute fraction of variance (R2), root mean squared (RMS) and maximum average error percentage (MAEP) between predicted and experimental results. This study found that ANN is highly accurate in predicting the viscosity of biodiesel and demonstrates the ability of the ANN model to find a meaningful relationship between biodiesel chemical composition and fuel properties at different temperature levels. Therefore the model developed in this study can be a useful tool in accurately predict biodiesel fuel properties instead of undertaking costly and time consuming experimental tests.
Resumo:
Purpose: To investigate the changes occurring in the axial length, choroidal thickness and anterior biometrics of the eye during a 10 minute near task performed in downward gaze. Methods: Twenty young adult subjects (10 emmetropes and 10 myopes) participated in this study. To measure ocular biometrics in downward gaze, an optical biometer was inclined on a custom built, height and tilt adjustable table. Baseline measures were collected after each subject performed a distance primary gaze control task for 10 mins, to provide wash-out period for prior visual tasks before each of three different accommodation/gaze conditions. These other three conditions included a near task (2.5 D) in primary gaze, and a near (2.5 D) and a far (0 D) accommodative task in downward gaze (25°), all for 10 mins duration. Immediately after, and then 5 and 10 mins from the commencement of each trial, measurements of ocular biometrics (e.g. anterior biometrics, axial length, choroidal thickness and retinal thickness) were obtained. Results: Axial length increased with accommodation and was significantly greater for downward gaze with accommodation (mean change ± SD 23 ± 13 µm at 10 mins) compared to primary gaze with accommodation (mean change 8 ± 15 µm at 10 mins) (p < 0.05). A small amount of choroidal thinning was also found during accommodation that was statistically significant in downward gaze (13 ± 14 µm at 10 mins, p < 0.05). Accommodation in downward gaze also caused greater changes in anterior chamber depth and lens thickness compared to accommodation in primary gaze. Conclusion: Axial length, choroidal thickness and anterior eye biometrics change significantly during accommodation in downward gaze as a function of time. These changes appear to be due to the combined influence of biomechanical factors (i.e. extraocular muscle forces, ciliary muscle contraction) associated with near tasks in downward gaze.
Resumo:
The producer has for many years been a central agent in recording studio sessions; the validation of this role was, in many ways, related to the producer’s physical presence in the studio, to a greater or lesser extent. However, improvements in the speed of digital networks have allowed studio sessions to be produced long-distance, in real-time, through communication programs such as Skype or REDIS. How does this impact on the role of the producer, a “nexus between the creative inspiration of the artist, the technology of the recording studio, and the commercial aspirations of the record company” (Howlett 2012)? From observations of a studio recording session in Lisbon produced through Skype from New York, this article focuses on the role of the producer in these relatively new recording contexts involving long distance media networks. Methodology involved participant observation carried out in Estúdios Namouche in Lisbon (where the session took place), as part of doctoral research. This ethnographic approach also included a number of semi-directed ethnographic interviews of the different actors in this scenario—musicians, recording engineers, composers and producers. As a theoretical framework, the research of De Zutter and Sawyer on Distributed Creativity is used, as the recording studio sets an example of “a cognitive system where […] tasks are not accomplished by separate individuals, but rather through the interactions of those individuals” (DeZutter 2009:4). Therefore, creativity often emerges as a result of this interaction.
Resumo:
G protein-coupled receptors (GPCRs) are critical for cardiovascular physiology. Cardiac cells express >100 nonchemosensory GPCRs, indicating that important physiological and potential therapeutic targets remain to be discovered. Moreover, there is a growing appreciation that members of the large, distinct taste and odorant GPCR families have specific functions in tissues beyond the oronasal cavity, including in the brain, gastrointestinal tract and respiratory system. To date, these chemosensory GPCRs have not been systematically studied in the heart. We performed RT-qPCR taste receptor screens in rodent and human heart tissues that revealed discrete subsets of type 2 taste receptors (TAS2/Tas2) as well as Tas1r1 and Tas1r3 (comprising the umami receptor) are expressed. These taste GPCRs are present in cultured cardiac myocytes and fibroblasts, and are enriched in myocytes, which we corroborated using in situ hybridization. Tas1r1 gene-targeted mice (Tas1r1Cre/Rosa26tdRFP) strikingly recapitulated these data. In vivo taste receptor expression levels were developmentally regulated in the postnatal period. Intriguingly, several Tas2rs were upregulated in cultured rat myocytes and in mouse heart in vivo following starvation. The discovery of taste GPCRs in the heart opens an exciting new field of cardiac research. We predict that these taste receptors may function as nutrient sensors in the heart.
Resumo:
A pilot experiment was performed using the WOMBAT powder diffraction instrument at ANSTO in which the first neutron diffraction peak (Q0) was measured for D2O flowing in a 2 mm internal diameter aluminium tube. Measurements of Q0 were made at -9, 4.3, 6.9, 12, 18.2 and 21.5 °C. The D2O was circulated using a siphon with water in the lower reservoir returned to the upper reservoir using a small pump. This enabled stable flow to be maintained for several hours. For example, if the pump flow increased slightly, the upper reservoir level rose, increasing the siphon flow until it matched the return flow. A neutron wavelength of 2.4 Å was used and data integrated over 60 minutes for each temperature. A jet of nitrogen from a liquid N2 Dewar was directed over the aluminium tube to vary water temperature. After collection of the data, the d spacing of the aluminium peaks was used to calculate the temperature of the aluminium within the neutron beam and therefore was considered to be an accurate measure of water temperature within the beam. Sigmaplot version 12.3 was used to fit a Weibull five parameter peak fit to the first neutron diffraction peak. The values of Q0 obtained in this experiment showed an increase with temperature consistent with data in the literature [1] but were consistently higher than published values for bulk D20. For example at 21.5 °C we obtained a value of 2.008 Å-1 for Q0 compared to a literature value of 1.988 Å-1 for bulk D2O at 20 °C, a difference of 1%. Further experiments are required to see if this difference is real or artifactual.
Resumo:
X-ray diffraction structure functions for water flowing in a 1.5 mm diameter siphon in the temperature range 4 – 63 °C were obtained using a 20 keV beam at the Australian Synchrotron. These functions were compared with structure functions obtained at the Advanced Light Source for a 0.5 mm thick sample of water in the temperature range 1 – 77 °C irradiated with an 11 keV beam. The two sets of structure functions are similar, but there are subtle differences in the shape and relative position of the two functions suggesting a possible differences between the structure of bulk and siphon water. In addition, the first structural peak (Q0) for water in a siphon, showed evidence of a step-wise increase in Q0 with increasing temperature rather than a smoothly varying increase. More experiments are required to investigate this apparent difference.
Resumo:
RC4-Based Hash Function is a new proposed hash function based on RC4 stream cipher for ultra low power devices. In this paper, we analyse the security of the function against collision attack. It is shown that the attacker can find collision and multi-collision messages with complexity only 6 compress function operations and negligible memory with time complexity 2 13. In addition, we show the hashing algorithm can be distinguishable from a truly random sequence with probability close to one.
Resumo:
Numerous research studies have evaluated whether distance learning is a viable alternative to traditional learning methods. These studies have generally made use of cross-sectional surveys for collecting data, comparing distance to traditional learners with intent to validate the former as a viable educational tool. Inherent fundamental differences between traditional and distance learning pedagogies, however, reduce the reliability of these comparative studies and constrain the validity of analyses resulting from this analytical approach. This article presents the results of a research project undertaken to analyze expectations and experiences of distance learners with their degree programs. Students were given surveys designed to examine factors expected to affect their overall value assessment of their distance learning program. Multivariate statistical analyses were used to analyze the correlations among variables of interest to support hypothesized relationships among them. Focusing on distance learners overcomes some of the limitations with assessments that compare off- and on-campus student experiences. Evaluation and modeling of distance learner responses on perceived value for money of the distance education they received indicate that the two most important influences are course communication requirements, which had a negative effect, and course logistical simplicity, which revealed a positive effect. Combined, these two factors accounted for approximately 47% of the variability in perceived value for money of the educational program of sampled students. A detailed focus on comparing expectations with outcomes of distance learners complements the existing literature dominated by comparative studies of distance and nondistance learners.
Resumo:
The cryptographic hash function literature has numerous hash function definitions and hash function requirements, and many of them disagree. This survey talks about the various definitions, and takes steps towards cleaning up the literature by explaining how the field has evolved and accurately depicting the research aims people have today.
Resumo:
In the current market, extensive software development is taking place and the software industry is thriving. Major software giants have stated source code theft as a major threat to revenues. By inserting an identity-establishing watermark in the source code, a company can prove it's ownership over the source code. In this paper, we propose a watermarking scheme for C/C++ source codes by exploiting the language restrictions. If a function calls another function, the latter needs to be defined in the code before the former, unless one uses function pre-declarations. We embed the watermark in the code by imposing an ordering on the mutually independent functions by introducing bogus dependency. Removal of dependency by the attacker to erase the watermark requires extensive manual intervention thereby making the attack infeasible. The scheme is also secure against subtractive and additive attacks. Using our watermarking scheme, an n-bit watermark can be embedded in a program having n independent functions. The scheme is implemented on several sample codes and performance changes are analyzed.
Resumo:
Bandwidths and offsets are important components in vehicle traffic control strategies. This article proposes new methods for quantifying and selecting them. Bandwidth is the amount of green time available for vehicles to travel through adjacent intersections without the requirement to stop at the second traffic light. The offset is the difference between the starting-time of ``green'' periods at two adjacent intersections, along a given route. The core ideas in this article were developed during the 2013 Maths and Industry Study Group in Brisbane, Australia. Analytical expressions for computing bandwidth, as a function of offset, are developed. An optimisation model, for selecting offsets across an arterial, is proposed. Arterial roads were focussed upon, as bandwidth and offset have a greater impact on these types of road as opposed to a full traffic network. A generic optimisation-simulation approach is also proposed to refine an initial starting solution, according to a specified metric. A metric that reflects the number of stops, and the distance between stops, is proposed to explicitly reduce the dissatisfaction of road users, and to implicitly reduce fuel consumption and emissions. Conceptually the optimisation-simulation approach is superior as it handles real-life complexities and is a global optimisation approach. The models and equations in this article can be used in road planning and traffic control.
Resumo:
A key derivation function (KDF) is a function that transforms secret non-uniformly random source material together with some public strings into one or more cryptographic keys. These cryptographic keys are used with a cryptographic algorithm for protecting electronic data during both transmission over insecure channels and storage. In this thesis, we propose a new method for constructing a generic stream cipher based key derivation function. We show that our proposed key derivation function based on stream ciphers is secure if the under-lying stream cipher is secure. We simulate instances of this stream cipher based key derivation function using three eStream nalist: Trivium, Sosemanuk and Rabbit. The simulation results show these stream cipher based key derivation functions offer efficiency advantages over the more commonly used key derivation functions based on block ciphers and hash functions.