444 resultados para Duplicate tuples


Relevância:

10.00% 10.00%

Publicador:

Resumo:

Issued in portfolio.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Extracted from the Memoirs of the American society of arts and sciences, v. 12, 1902.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

There are two major groups of ticks: soft ticks and hard ticks. The hard ticks comprise the prostriate ticks and the metastriate ticks. The mitochondrial (mt) genomes of one species of prostriate tick and two species of metastriate ticks had been sequenced prior to our study. The prostriate tick has the ancestral arrangement of mt genes of arthropods, whereas the two metastriate ticks have rearrangements of eight genes and duplicate control regions. However, the arrangement of genes in the mt genomes of soft ticks had not been studied. We sequenced the mt genomes of two species of soft ticks, Carios capensis and Ornithodoros moubata, and a metastriate tick, Haemaphysalis flava. We found that the soft ticks have the ancestral arrangement of mt genes of arthropods, whereas the metastriate tick, H. flava, shares the rearrangements of mt genes and duplicate control regions with the other two metastriate ticks that have previously been studied. Our study indicates that gene rearrangements and duplicate control regions in mt genomes occurred once in the most recent common ancestor of metastriate ticks, whereas the ancestral arrangement of arthropods has remained unchanged for over 400 million years in the lineages leading to the soft ticks and the prostriate ticks.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Consider a haploid population and, within its genome, a gene whose presence is vital for the survival of any individual. Each copy of this gene is subject to mutations which destroy its function. Suppose one member of the population somehow acquires a duplicate copy of the gene, where the duplicate is fully linked to the original gene's locus. Preservation is said to occur if eventually the entire population consists of individuals descended from this one which initially carried the duplicate. The system is modelled by a finite state-space Markov process which in turn is approximated by a diffusion process, whence an explicit expression for the probability of preservation is derived. The event of preservation can be compared to the fixation of a selectively neutral gene variant initially present in a single individual, the probability of which is the reciprocal of the population size. For very weak mutation, this and the probability of preservation are equal, while as mutation becomes stronger, the preservation probability tends to double this reciprocal. This is in excellent agreement with simulation studies.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

As a discipline, supply chain management (SCM) has traditionally been primarily concerned with the procurement, processing, movement and sale of physical goods. However an important class of products has emerged - digital products - which cannot be described as physical as they do not obey commonly understood physical laws. They do not possess mass or volume, and they require no energy in their manufacture or distribution. With the Internet, they can be distributed at speeds unimaginable in the physical world, and every copy produced is a 100% perfect duplicate of the original version. Furthermore, the ease with which digital products can be replicated has few analogues in the physical world. This paper assesses the effect of non-physicality on one such product – software – in relation to the practice of SCM. It explores the challenges that arise when managing the software supply chain and how practitioners are addressing these challenges. Using a two-pronged exploratory approach that examines the literature around software management as well as direct interviews with software distribution practitioners, a number of key challenges associated with software supply chains are uncovered, along with responses to these challenges. This paper proposes a new model for software supply chains that takes into account the non-physicality of the product being delivered. Central to this model is the replacement of physical flows with flows of intellectual property, the growing importance of innovation over duplication and the increased centrality of the customer in the entire process. Hybrid physical / digital supply chains are discussed and a framework for practitioners concerned with software supply chains is presented.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

*Research partially supported by INTAS grant 97-1644.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Research partially supported by INTAS grant 97-1644

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Aim: To evaluate OneTouch® Verio™ test strip performance at hypoglycaemic blood glucose (BG) levels (<3.9mmol/L [<70mg/dL]) at seven clinical studies. Methods: Trained clinical staff performed duplicate capillary BG monitoring system tests on 700 individuals with type 1 and type 2 diabetes using blood from a single fingerstick lancing. BG reference values were obtained using a YSI 2300 STAT™ Glucose Analyzer. The number and percentage of BG values within ±0.83. mmol/L (±15. mg/dL) and ±0.56. mmol/L (±10. mg/dL) were calculated at BG concentrations of <3.9. mmol/L (<70. mg/dL), <3.3. mmol/L (<60. mg/dL), and <2.8. mmol/L (<50. mg/dL). Results: At BG concentrations <3.9. mmol/L (<70. mg/dL), 674/674 (100%) of meter results were within ±0.83. mmol/L (±15. mg/dL) and 666/674 (98.8%) were within ±0.56. mmol/L (±10. mg/dL) of reference values. At BG concentrations <3.3. mmol/L (<60. mg/dL), and <2.8. mmol/L (<50. mg/dL), 358/358 (100%) and 270/270 (100%) were within ±0.56. mmol/L (±10. mg/dL) of reference values, respectively. Conclusion: In this analysis of data from seven independent studies, OneTouch Verio test strips provide highly accurate results at hypoglycaemic BG levels. © 2012 Elsevier Ireland Ltd.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

A new creep test, Partial Triaxial Test (PTT), was developed to study the permanent deformation properties of asphalt mixtures. The PTT used two duplicate platens whose diameters were smaller than the diameter of the cylindrical asphalt mixtures specimen. One base platen was centrally placed under the specimen and another loading platen was centrally placed on the top surface of the specimen. Then the compressive repeated load was applied on the loading platen and the vertical deformation of the asphalt mixture was recorded in the PTTs. Triaxial repeated load permanent deformation tests (TRT) and PTTs were respectively conducted on AC20 and SMA13 asphalt mixtures at 40°C and 60°C so as to provide the parameters of the creep constitutive relations in the ABAQUS finite element models (FEMs) which were built to simulate the laboratory wheel tracking tests. The real laboratory wheel tracking tests were also conducted on AC20 and SMA13 asphalt mixtures at 40°C and 60°C. Then the calculated rutting depth from the FEMs were compared with the measured rutting depth of the laboratory wheeling tracking tests. Results indicated that PTT was able to characterize the permanent deformation of the asphalt mixtures in laboratory. The rutting depth calculated using the parameters estimated from PTTs' results was closer to and showed better matches with the measured rutting than the rutting depth calculated using the parameters estimated from TRTs' results. Main reason was that PTT could better simulate the changing confinement conditions of asphalt mixtures in the laboratory wheeling tracking tests than the TRT.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Content creation and presentation are key activities in a multimedia digital library (MDL). The proper design and intelligent implementation of these services provide a stable base for overall MDL functionality. This paper presents the framework and the implementation of these services in the latest version of the “Virtual Encyclopaedia of Bulgarian Iconography” multimedia digital library. For the semantic description of the iconographical objects a tree-based annotation template is implemented. It provides options for autocompletion, reuse of values, bilingual entering of data, automated media watermarking, resizing and conversing. The paper describes in detail the algorithm for automated appearance of dependent values for different characteristics of an iconographical object. An algorithm for avoiding duplicate image objects is also included. The service for automated appearance of new objects in a collection after their entering is included as an important part of the content presentation. The paper also presents the overall service-based architecture of the library, covering its main service panels, repositories and their relationships. The presented vision is based on a long-term observation of the users’ preferences, cognitive goals, and needs, aiming to find an optimal functionality solution for the end users.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Христина Костадинова, Красимир Йорджев - В статията се обсъжда представянето на произволна бинарна матрица с помощта на последователност от цели неотрицателни числа. Разгледани са някои предимства и недостатъци на това представяне като алтернатива на стандартното, общоприето представяне чрез двумерен масив. Показано е, че представянето на бинарните матрици с помощта на наредени n-торки от естествени числа води до по-бързи алгоритми и до съществена икономия на оперативна памет. Използуван е апарата на обектно-ориентираното програмиране със синтаксиса и семантиката на езика C++.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Spamming has been a widespread problem for social networks. In recent years there is an increasing interest in the analysis of anti-spamming for microblogs, such as Twitter. In this paper we present a systematic research on the analysis of spamming in Sina Weibo platform, which is currently a dominant microblogging service provider in China. Our research objectives are to understand the specific spamming behaviors in Sina Weibo and find approaches to identify and block spammers in Sina Weibo based on spamming behavior classifiers. To start with the analysis of spamming behaviors we devise several effective methods to collect a large set of spammer samples, including uses of proactive honeypots and crawlers, keywords based searching and buying spammer samples directly from online merchants. We processed the database associated with these spammer samples and interestingly we found three representative spamming behaviors: Aggressive advertising, repeated duplicate reposting and aggressive following. We extract various features and compare the behaviors of spammers and legitimate users with regard to these features. It is found that spamming behaviors and normal behaviors have distinct characteristics. Based on these findings we design an automatic online spammer identification system. Through tests with real data it is demonstrated that the system can effectively detect the spamming behaviors and identify spammers in Sina Weibo.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

To assess the role of shark cartilage as an immune modulator, acid, salt-soluble, and phosphate-buffered saline extracts were prepared from three different commercial sources (SL, TL, FDC) of cartilage and used to stimulate human leukocytes in vitro. Duplicate leukocyte cultures were set up, each containing 50 $\mu$l of endotoxin-free extract, 200 $\mu$l of cell suspension (2.4-2.5 $\times$ 10$\sp5$ cells) and 100 $\mu$l of medium and incubated at 37$\sp\circ$C. Cultures stimulated with LPS (5 $\mu$g/ml) or medium served as the positive and negative controls, respectively. Culture supernatants were assayed for TNF$\alpha$ by ELISA. Cartilage extracts stimulated cells to release significant levels of TNF$\alpha$ (p $<$.005); the highest response was obtained with the acid extract of SL cartilage. In comparison, response to corresponding extracts of bovine cartilage was lower (p $<$.05). The stimulatory activity was reduced (85%) following proteolytic digestion, and lost when extract was heated (60$\sp\circ$C, 20 min) or treated with urea (6M), suggesting that the active component(s) is a protein. ^

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Mediation techniques provide interoperability and support integrated query processing among heterogeneous databases. While such techniques help data sharing among different sources, they increase the risk for data security, such as violating access control rules. Successful protection of information by an effective access control mechanism is a basic requirement for interoperation among heterogeneous data sources. ^ This dissertation first identified the challenges in the mediation system in order to achieve both interoperability and security in the interconnected and collaborative computing environment, which includes: (1) context-awareness, (2) semantic heterogeneity, and (3) multiple security policy specification. Currently few existing approaches address all three security challenges in mediation system. This dissertation provides a modeling and architectural solution to the problem of mediation security that addresses the aforementioned security challenges. A context-aware flexible authorization framework was developed in the dissertation to deal with security challenges faced by mediation system. The authorization framework consists of two major tasks, specifying security policies and enforcing security policies. Firstly, the security policy specification provides a generic and extensible method to model the security policies with respect to the challenges posed by the mediation system. The security policies in this study are specified by 5-tuples followed by a series of authorization constraints, which are identified based on the relationship of the different security components in the mediation system. Two essential features of mediation systems, i. e., relationship among authorization components and interoperability among heterogeneous data sources, are the focus of this investigation. Secondly, this dissertation supports effective access control on mediation systems while providing uniform access for heterogeneous data sources. The dynamic security constraints are handled in the authorization phase instead of the authentication phase, thus the maintenance cost of security specification can be reduced compared with related solutions. ^