550 resultados para execute
Resumo:
Planning in realistic domains typically involves reasoning under uncertainty, operating under time and resource constraints, and finding the optimal subset of goals to work on. Creating optimal plans that consider all of these features is a computationally complex, challenging problem. This dissertation develops an AO* search based planner named CPOAO* (Concurrent, Probabilistic, Over-subscription AO*) which incorporates durative actions, time and resource constraints, concurrent execution, over-subscribed goals, and probabilistic actions. To handle concurrent actions, action combinations rather than individual actions are taken as plan steps. Plan optimization is explored by adding two novel aspects to plans. First, parallel steps that serve the same goal are used to increase the plan’s probability of success. Traditionally, only parallel steps that serve different goals are used to reduce plan execution time. Second, actions that are executing but are no longer useful can be terminated to save resources and time. Conventional planners assume that all actions that were started will be carried out to completion. To reduce the size of the search space, several domain independent heuristic functions and pruning techniques were developed. The key ideas are to exploit dominance relations for candidate action sets and to develop relaxed planning graphs to estimate the expected rewards of states. This thesis contributes (1) an AO* based planner to generate parallel plans, (2) domain independent heuristics to increase planner efficiency, and (3) the ability to execute redundant actions and to terminate useless actions to increase plan efficiency.
Resumo:
With the insatiable curiosity of human beings to explore the universe and our solar system, it is essential to benefit from larger propulsion capabilities to execute efficient transfers and carry more scientific equipment. In the field of space trajectory optimization the fundamental advances in using low-thrust propulsion and exploiting the multi-body dynamics has played pivotal role in designing efficient space mission trajectories. The former provides larger cumulative momentum change in comparison with the conventional chemical propulsion whereas the latter results in almost ballistic trajectories with negligible amount of propellant. However, the problem of space trajectory design translates into an optimal control problem which is, in general, time-consuming and very difficult to solve. Therefore, the goal of the thesis is to address the above problem by developing a methodology to simplify and facilitate the process of finding initial low-thrust trajectories in both two-body and multi-body environments. This initial solution will not only provide mission designers with a better understanding of the problem and solution but also serves as a good initial guess for high-fidelity optimal control solvers and increases their convergence rate. Almost all of the high-fidelity solvers enjoy the existence of an initial guess that already satisfies the equations of motion and some of the most important constraints. Despite the nonlinear nature of the problem, it is sought to find a robust technique for a wide range of typical low-thrust transfers with reduced computational intensity. Another important aspect of our developed methodology is the representation of low-thrust trajectories by Fourier series with which the number of design variables reduces significantly. Emphasis is given on simplifying the equations of motion to the possible extent and avoid approximating the controls. These facts contribute to speeding up the solution finding procedure. Several example applications of two and three-dimensional two-body low-thrust transfers are considered. In addition, in the multi-body dynamic, and in particular the restricted-three-body dynamic, several Earth-to-Moon low-thrust transfers are investigated.
Resumo:
File system security is fundamental to the security of UNIX and Linux systems since in these systems almost everything is in the form of a file. To protect the system files and other sensitive user files from unauthorized accesses, certain security schemes are chosen and used by different organizations in their computer systems. A file system security model provides a formal description of a protection system. Each security model is associated with specified security policies which focus on one or more of the security principles: confidentiality, integrity and availability. The security policy is not only about “who” can access an object, but also about “how” a subject can access an object. To enforce the security policies, each access request is checked against the specified policies to decide whether it is allowed or rejected. The current protection schemes in UNIX/Linux systems focus on the access control. Besides the basic access control scheme of the system itself, which includes permission bits, setuid and seteuid mechanism and the root, there are other protection models, such as Capabilities, Domain Type Enforcement (DTE) and Role-Based Access Control (RBAC), supported and used in certain organizations. These models protect the confidentiality of the data directly. The integrity of the data is protected indirectly by only allowing trusted users to operate on the objects. The access control decisions of these models depend on either the identity of the user or the attributes of the process the user can execute, and the attributes of the objects. Adoption of these sophisticated models has been slow; this is likely due to the enormous complexity of specifying controls over a large file system and the need for system administrators to learn a new paradigm for file protection. We propose a new security model: file system firewall. It is an adoption of the familiar network firewall protection model, used to control the data that flows between networked computers, toward file system protection. This model can support decisions of access control based on any system generated attributes about the access requests, e.g., time of day. The access control decisions are not on one entity, such as the account in traditional discretionary access control or the domain name in DTE. In file system firewall, the access decisions are made upon situations on multiple entities. A situation is programmable with predicates on the attributes of subject, object and the system. File system firewall specifies the appropriate actions on these situations. We implemented the prototype of file system firewall on SUSE Linux. Preliminary results of performance tests on the prototype indicate that the runtime overhead is acceptable. We compared file system firewall with TE in SELinux to show that firewall model can accommodate many other access control models. Finally, we show the ease of use of firewall model. When firewall system is restricted to specified part of the system, all the other resources are not affected. This enables a relatively smooth adoption. This fact and that it is a familiar model to system administrators will facilitate adoption and correct use. The user study we conducted on traditional UNIX access control, SELinux and file system firewall confirmed that. The beginner users found it easier to use and faster to learn then traditional UNIX access control scheme and SELinux.
Resumo:
The humanized anti-alpha(4) integrin Ab Natalizumab is an effective treatment for relapsing-remitting multiple sclerosis. Natalizumab is thought to exert its therapeutic efficacy by blocking the alpha(4) integrin-mediated binding of circulating immune cells to the blood-brain barrier (BBB). As alpha(4) integrins control other immunological processes, natalizumab may, however, execute its beneficial effects elsewhere. By means of intravital microscopy we demonstrate that natalizumab specifically inhibits the firm adhesion but not the rolling or capture of human T cells on the inflamed BBB in mice with acute experimental autoimmune encephalomyelitis (EAE). The efficiency of natalizumab to block T cell adhesion to the inflamed BBB was found to be more effective in EAE than in acute systemic TNF-alpha-induced inflammation. Our data demonstrate that alpha(4) integrin-mediated adhesion of human T cells to the inflamed BBB during EAE is efficiently blocked by natalizumab and thus provide the first direct in vivo proof of concept of this therapy in multiple sclerosis.
Resumo:
P-GENESIS is an extension to the GENESIS neural simulator that allows users to take advantage of parallel machines to speed up the simulation of their network models or concurrently simulate multiple models. P-GENESIS adds several commands to the GENESIS script language that let a script running on one processor execute remote procedure calls on other processors, and that let a script synchronize its execution with the scripts running on other processors. We present here some brief comments on the mechanisms underlying parallel script execution. We also offer advice on parallelizing parameter searches, partitioning network models, and selecting suitable parallel hardware on which to run P-GENESIS.
Resumo:
Brian electric activity is viewed as sequences of momentary maps of potential distribution. Frequency-domain source modeling, estimation of the complexity of the trajectory of the mapped brain field distributions in state space, and microstate parsing were used as analysis tools. Input-presentation as well as task-free (spontaneous thought) data collection paradigms were employed. We found: Alpha EEG field strength is more affected by visualizing mentation than by abstract mentation, both input-driven as well as self-generated. There are different neuronal populations and brain locations of the electric generators for different temporal frequencies of the brain field. Different alpha frequencies execute different brain functions as revealed by canonical correlations with mentation profiles. Different modes of mentation engage the same temporal frequencies at different brain locations. The basic structure of alpha electric fields implies inhomogeneity over time — alpha consists of concatenated global microstates in the sub-second range, characterized by quasi-stable field topographies, and rapid transitions between the microstates. In general, brain activity is strongly discontinuous, indicating that parsing into field landscape-defined microstates is appropriate. Different modes of spontaneous and induced mentation are associated with different brain electric microstates; these are proposed as candidates for psychophysiological ``atoms of thought''.
Resumo:
It is often claimed that scientists can obtain new knowledge about nature by running computer simulations. How is this possible? I answer this question by arguing that computer simulations are arguments. This view parallels Norton’s argument view about thought experiments. I show that computer simulations can be reconstructed as arguments that fully capture the epistemic power of the simulations. Assuming the extended mind hypothesis, I furthermore argue that running the computer simulation is to execute the reconstructing argument. I discuss some objections and reject the view that computer simulations produce knowledge because they are experiments. I conclude by comparing thought experiments and computer simulations, assuming that both are arguments.
Resumo:
A microbiopsy system for fast excision and transfer of biological specimens from donor to high-pressure freezer was developed. With a modified, commercially available, Promag 1.2 biopsy gun, tissue samples can be excised with a size small enough (0.6 mm x 1.2 mm x 0.3 mm) to be easily transferred into a newly designed specimen platelet. A self-made transfer unit allows fast transfer of the specimen from the needle into the specimen platelet. The platelet is then fixed in a commercially available specimen holder of a high-pressure freezing machine (EM PACT, Leica Microsystems, Vienna, Austria) and frozen therein. The time required by a well-instructed (but not experienced) person to execute all steps is in the range of half a minute. This period is considered short enough to maintain the excised tissue pieces close to their native state. We show that a range of animal tissues (liver, brain, kidney and muscle) are well preserved. To prove the quality of freezing achieved with the system, we show vitrified ivy leaves high-pressure frozen in the new specimen platelet.
Resumo:
INTRODUCTION: Task stressors typically refer to characteristics such as not having enough time or resources, ambiguous demands, or the like. We suggest the perceived lack of legitimacy as an additional feature of tasks as a source of stress. Tasks are “illegitimate” to the extent that it is perceived as improper to expect employees to execute them – not because of difficulties in executing them, but because of their content for a given person, time, and situation; they are illegitimate because a) they are not conforming to a specific occupational role, as in “non-nursing activities” (called unreasonable) or b) there is no legitimate need for them to exist (called unnecessary; Semmer et al., 2007). These features make illegitimate tasks a unique task-related stressor. The concept of illegitimate tasks grew from the “Stress-as-Offense-to-Self” theory (SOS; Semmer et al, 2007); it is conceptually related to role stress (Kahn et al., 1964; Beehr & Glazer, 2005) and the organizational justice tradition (Cropanzano et al., 2001; Greenberg, 2010). SOS argues that a threat to one’s self-image is at the core of many stressful experiences. Violating role expectations, illegitimate tasks can be regarded as a special case of role conflict. As roles shape identities, this violation is postulated to constitute a threat to one’s professional identity. Being assigned a task considered illegitimate is likely to be considered unfair. Lack of fairness, in turn, contains a message about one’s social standing, and thus, the self. However, the aspects discussed have not received much attention in the role stress or the justice/fairness tradition. OBJECTIVE: Illegitimate tasks are a rather recent concept that has to be established as a construct in its own right by showing that it is associated with well-being/strain while controlling for other stressors, most notably role conflict and lack of justice. The aim of the presentation is to present the evidence accumulated so far. METHODS AND RESULTS: We present several studies employing different designs, using different control variables, and testing associations with different criteria. Study 1 demonstrates associations of illegitimate tasks with self-esteem, feelings of resentment against one’s organization, and burnout, controlling for distributive justice, role conflict, and social stressors (i.e. tensions). Study 2 yielded comparable results, using the same outcome variables but controlling for distributive as well as procedural / interactional justice. Study 3 demonstrated associations between illegitimate tasks and feelings of stress, sleeping problems, and emotional exhaustion, controlling for demands, control, and social support among medical doctors. Study 4 showed that feeling appreciated by one’s superior acted as a mediator between illegitimate tasks and job satisfaction and resentments towards the military in Swiss military officers. Study 5 demonstrated an association of illegitimate tasks with counterproductive work behavior (Semmer et al. 2010). Studies 1 to 5 were cross-sectional. In Study 6, illegitimate demands predicted irritability and resentments towards one’s organization longitudinally. Study 7 also was longitudinal, focusing on intra-individual variation in multilevel modeling; occasion-specific illegitimate tasks predicted cortisol among those who judged their health as comparatively poor. Studies 1-3 and 6 used SEM, and measurement models that used unreasonable and unnecessary tasks as indicators (isolated parceling) yielded a good fit. IMPLICATIONS & CONCLUSIONS: These studies demonstrate that illegitimate tasks are a stressor in its own right that is worth studying. It illuminates the social meaning of job design, emphasizing the implications of tasks for the (professional) self, and thus combining aspects that are traditionally treated as separate, that is, social aspects and task characteristics. Practical implications are that supervisors and managers should be alerted to the social messages that may be contained in task assignments (cf. Semmer & Beehr, in press).
Resumo:
Ataxia telangiectasia mutated (ATM) is a critical component of the cellular response to DNA damage, where it acts as a damage sensor, and signals to a large network of proteins which execute the important tasks involved in responding to the damage, namely inducing cell cycle checkpoints, inducing DNA repair, modulating transcriptional responses, and regulating cell death pathways if the damage cannot be repaired faithfully. We have now discovered that an additional novel component of this ATM-dependent damage response involves induction of autophagy in response to oxidative stress. In contrast to DNA damage-induced ATM activation however, oxidative stress induced ATM, occurs in the cytoplasm, and does not require nuclear-to-cytoplasmic shuttling of ATM. Using several cell culture systems including MCF7 breast carcinoma cells, SKOV3 ovarian cancer cells, and various lineages of mouse embryonic fibroblasts, we showed that once activated by reactive oxygen species (ROS), ATM signals to mTORC1 to induce autophagy via the LKB1-AMPK-TSC2 pathway. Targeting dysregulation of mTORC1 in Atm-deficient mice, which succumb to lymphomagenesis within 3-4 months of age with daily administration of rapamycin, could significantly extend survival and cause regression of tumors, suggesting that pharmacologically targeting this pathway has therapeutic implications in cancer. We also identified a second contrasting pathway for DNA damage-induced mTORC1 repression which does not require AMPK activation, but does require ATM and TSC2. Several potential mechanisms including mTOR localization and p53-mediated pathways were ruled out however we identified that TSC2 may be an additional cytoplasmic direct ATM substrate that is engaged in response to DNA damage specifically. Lastly, a study was performed to examine whether autophagy induced by ovarian cancer therapeutics (focusing on cisplatin, since paclitaxel does not induce autophagy in the SKOV3 cell line model we used) plays a role in resistance to therapy since autophagy can play both pro-survival mechanisms or be a mechanism of cell death. Using a genetic approach to knock-down Atg5 expression with shRNA in SKOV3 ovarian carcinoma cells, we compared the cytotoxicity of cisplatin in vector or Atg5 knock-down cells, and demonstrated that autophagy does not play any significant role in the response to cisplatin in this cell line.
Resumo:
In lucid dreams the dreamer is aware that he or she is dreaming. Although such dreams are not that uncommon, many aspects of lucid dream phenomenology are still unclear. An online survey was conducted to gather data about lucid dream origination, duration, active or passive participation in the dream, planned actions for lucid dreams, and other phenomenological aspects. Among the 684 respondents who filled out the questionnaire, there were 571 lucid dreamers (83.5%). According to their reports, lucid dreams most often originate spontaneously in adolescence. The average lucid dream duration is about 14 minutes. Lucid dreamers are likely to be active in their lucid dreams and plan to accomplish different actions (e.g., flying, talking with dream characters, or having sex), yet they are not always able to remember or successfully execute their intentions (most often because of awakening or hindrances in the dream environment). The frequency of lucid dream experience was the strongest predictor of lucid dream phenomenology, but some differences were also observed in relation to age, gender, or whether the person is a natural or self-trained lucid dreamer. The findings are discussed in light of lucid dream research, and suggestions for future studies are provided.
Resumo:
It has been repeatedly demonstrated that athletes often choke in high pressure situations because anxiety can affect attention regulation and in turn performance. There are two competing theoretical approaches to explain the negative anxiety-performance relationship. According to skillfocus theories, anxious athletes’ attention is directed at how to execute the sport-specific movements which interrupts execution of already automatized movements in expert performers. According to distraction theories, anxious athletes are distractible and focus less on the relevant stimuli. We tested these competing assumptions in a between-subject design, as semi-professional tennis players were either assigned to an anxiety group (n = 25) or a neutral group (n = 28), and performed a series of second tennis serves into predefined target areas. As expected, anxiety was negatively related to serve accuracy. However, mediation analyses with the bootstrapping method revealed that this relationship was fully mediated by self-reported distraction and not by skill-focus.
Resumo:
Injury is an inevitable part of life, making wound healing essential for survival. In postembryonic skin, wound closure requires that epidermal cells recognize the presence of a gap and change their behavior to migrate across it. In Drosophila larvae, wound closure requires two signaling pathways (the Jun N-terminal kinase (JNK) pathway and the Pvr receptor tyrosine kinase signaling pathway) and regulation of the actin cytoskeleton. In this and other systems, it remains unclear how the signaling pathways that initiate wound closure connect to the actin regulators that help execute wound- induced cell migrations. Here we show that chickadee, which encodes the Drosophila Profilin, a protein important for actin filament recycling and cell migration during development, is required for the physiological process of larval epidermal wound closure. After injury, chickadee is transcriptionally upregulated in cells proximal to the wound. We found that JNK, but not Pvr, mediates the increase in chic transcription through the Jun and Fos transcription factors. Finally, we show that chic deficient larvae fail to form a robust actin cable along the wound edge and also fail to form normal filopodial and lamellipodial extensions into the wound gap. Our results thus connect a factor that regulates actin monomer recycling to the JNK signaling pathway during wound closure. They also reveal a physiological function for an important developmental regulator of actin and begin to tease out the logic of how the wound repair response is organized.
Resumo:
El artículo presenta la incorporación de prácticas socio-comunitaria durante el trayecto de formación de grado de Profesores y Licenciados en Educación Especial en la Universidad Nacional de Río Cuarto. Desde un marco institucional, las prácticas socio-comunitarias se entienden como experiencias de aprendizaje de contenidos académicos orientadas por los docentes, realizadas con sectores de la comunidad excluidos de la vida económica, política, social y cultural, dirigida a contribuir a la comprensión, abordaje o resolución de problemáticas sociales críticas. Se trata que los estudiantes aprendan contenidos de sus respectivos campos profesionales participando en experiencias socio-comunitarias. Se hace referencia a una experiencia en la asignatura “Planeamiento Institucional" , cuyo propósito es aportar a la formación de los alumnos del Profesorado de Educación Especial mediante la construcción de competencias profesionales establecidas en el perfil del egresado tales como: “Planificar, ejecutar y evaluar proyectos de educación especial en diferentes contextos institucionales y grupales".La práctica socio-comunitaria consistió en la ejecución de un relevamiento socio-educativo en diversos barrios de la ciudad como parte del Programa Alfabetizando que coordina la Sub-Secretaría de Educación de la Municipalidad de Río Cuarto.
Resumo:
La descentralización de políticas sociales hacia los municipios es planteada como una alternativa de desarrollo a partir de las relaciones micro sociales. Los municipios deben asumir una nueva responsabilidad y plantearse una nueva función: definir y ejecutar políticas sociales locales o regionales. Esta nueva relación del municipio con su población ha sido uno de los elementos, en un proceso que tiene múltiples explicaciones, que ha favorecido nuevas prácticas clientelares denominadas Clientelismo fino o institucional. Este clientelismo favorece una situación de sometimiento y de asistencialismo, dificultando nuevas formas de relación que permitan el desarrollo humano y el ejercicio de derechos.