916 resultados para Making Links
Resumo:
In this paper we de. ne a partial ordering of knots and links using a special property derived from their minimal diagrams. A link K' is called a predecessor of a link K if Cr(K') < Cr(K) and a diagram of K' can be obtained from a minimal diagram D of K by a single crossing change. In such a case, we say that K' < K. We investigate the sets of links that can be obtained by single crossing changes over all minimal diagrams of a given link. We show that these sets are specific for different links and permit partial ordering of all links. Some interesting results are presented and many questions are raised.
Resumo:
Recent single-cell studies in monkeys (Romo et al., 2004) show that the activity of neurons in the ventral premotor cortex covaries with the animal's decisions in a perceptual comparison task regarding the frequency of vibrotactile events. The firing rate response of these neurons was dependent only on the frequency differences between the two applied vibrations, the sign of that difference being the determining factor for correct task performance. We present a biophysically realistic neurodynamical model that can account for the most relevant characteristics of this decision-making-related neural activity. One of the nontrivial predictions of this model is that Weber's law will underlie the perceptual discrimination behavior. We confirmed this prediction in behavioral tests of vibrotactile discrimination in humans and propose a computational explanation of perceptual discrimination that accounts naturally for the emergence of Weber's law. We conclude that the neurodynamical mechanisms and computational principles underlying the decision-making processes in this perceptual discrimination task are consistent with a fluctuation-driven scenario in a multistable regime.
Resumo:
Decision-making in an uncertain environment is driven by two major needs: exploring the environment to gather information or exploiting acquired knowledge to maximize reward. The neural processes underlying exploratory decision-making have been mainly studied by means of functional magnetic resonance imaging, overlooking any information about the time when decisions are made. Here, we carried out an electroencephalography (EEG) experiment, in order to detect the time when the brain generators responsible for these decisions have been sufficiently activated to lead to the next decision. Our analyses, based on a classification scheme, extract time-unlocked voltage topographies during reward presentation and use them to predict the type of decisions made on the subsequent trial. Classification accuracy, measured as the area under the Receiver Operator's Characteristic curve was on average 0.65 across 7 subjects. Classification accuracy was above chance levels already after 516 ms on average, across subjects. We speculate that decisions were already made before this critical period, as confirmed by a positive correlation with reaction times across subjects. On an individual subject basis, distributed source estimations were performed on the extracted topographies to statistically evaluate the neural correlates of decision-making. For trials leading to exploration, there was significantly higher activity in dorsolateral prefrontal cortex and the right supramarginal gyrus; areas responsible for modulating behavior under risk and deduction. No area was more active during exploitation. We show for the first time the temporal evolution of differential patterns of brain activation in an exploratory decision-making task on a single-trial basis.
Resumo:
The present paper aims at an historical reconstruction, in the framework of the publishing industry in the years between the two World Wars, of the role played by the publisher William W. Norton in the genesis, published in 1932, and new edition in 1938, of Walter B. Cannon"s book The Wisdom of the Body. With the analysis of this case study, we aimed at contributing to the current criticism of the «dominant view», which tries, in an uncritical manner, that scientific popularization follows an ineluctable, continuous and linear evolution.
Resumo:
According to molecular epidemiology theory, two isolates belong to the same chain of transmission if they are similar according to a highly discriminatory molecular typing method. This has been demonstrated in outbreaks, but is rarely studied in endemic situations. Person-to-person transmission cannot be established when isolates of meticillin-resistant Staphylococcus aureus (MRSA) belong to endemically predominant genotypes. By contrast, isolates of infrequent genotypes might be more suitable for epidemiological tracking. The objective of the present study was to determine, in newly identified patients harbouring non-predominant MRSA genotypes, whether putative epidemiological links inferred from molecular typing could replace classical epidemiology in the context of a regional surveillance programme. MRSA genotypes were defined using double-locus sequence typing (DLST) combining clfB and spa genes. A total of 1,268 non-repetitive MRSA isolates recovered between 2005 and 2006 in Western Switzerland were typed: 897 isolates (71%) belonged to four predominant genotypes, 231 (18%) to 55 non-predominant genotypes, and 140 (11%) were unique. Obvious epidemiological links were found in only 106/231 (46%) patients carrying isolates with non-predominant genotypes suggesting that molecular surveillance identified twice as many clusters as those that may have been suspected with classical epidemiological links. However, not all of these molecular clusters represented person-to-person transmission. Thus, molecular typing cannot replace classical epidemiology but is complementary. A prospective surveillance of MRSA genotypes could help to target epidemiological tracking in order to recognise new risk factors in hospital and community settings, or emergence of new epidemic clones.
Resumo:
Modern multimedia communication tools must have high security, high availability and high quality of service (QoS). Any security implementation will directly impact on QoS. This paper will investigate how end-to-end security impacts on QoS in Voice over Internet Protocol (VoIP). The QoS is measured in terms of lost packet ratio, latency and jitter using different encryption algorithms, no security and just the use of IP firewalls in Local and Wide Area Networks (LAN and WAN). The results of laboratory tests indicate that the impact on the overall performance of VoIP depends upon the bandwidth availability and encryption algorithm used. The implementation of any encryption algorithm in low bandwidth environments degrades the voice quality due to increased loss packets and packet latency, but as bandwidth increases encrypted VoIP calls provided better service compared to an unsecured environment.
Resumo:
False identity documents represent a serious threat through their production and use in organized crime and by terrorist organizations. The present-day fight against this criminal problem and threats to national security does not appropriately address the organized nature of this criminal activity, treating each fraudulent document on its own during investigation and the judicial process, which causes linkage blindness and restrains the analysis capacity. Given the drawbacks of this case-by-case approach, this article proposes an original model in which false identity documents are used to inform a systematic forensic intelligence process. The process aims to detect links, patterns, and tendencies among false identity documents in order to support strategic and tactical decision making, thus sustaining a proactive intelligence-led approach to fighting identity document fraud and the associated organized criminality. This article formalizes both the model and the process, using practical applications to illustrate its powerful capabilities. This model has a general application and can be transposed to other fields of forensic science facing similar difficulties.
Resumo:
This paper deals with the design of nonregenerativerelaying transceivers in cooperative systems where channel stateinformation (CSI) is available at the relay station. The conventionalnonregenerative approach is the amplify and forward(A&F) approach, where the signal received at the relay is simplyamplified and retransmitted. In this paper, we propose an alternativelinear transceiver design for nonregenerative relaying(including pure relaying and the cooperative transmission cases),making proper use of CSI at the relay station. Specifically, wedesign the optimum linear filtering performed on the data to beforwarded at the relay. As optimization criteria, we have consideredthe maximization of mutual information (that provides aninformation rate for which reliable communication is possible) fora given available transmission power at the relay station. Threedifferent levels of CSI can be considered at the relay station: onlyfirst hop channel information (between the source and relay);first hop channel and second hop channel (between relay anddestination) information, or a third situation where the relaymay have complete cooperative channel information includingall the links: first and second hop channels and also the directchannel between source and destination. Despite the latter beinga more unrealistic situation, since it requires the destination toinform the relay station about the direct channel, it is useful as anupper benchmark. In this paper, we consider the last two casesrelating to CSI.We compare the performance so obtained with theperformance for the conventional A&F approach, and also withthe performance of regenerative relays and direct noncooperativetransmission for two particular cases: narrowband multiple-inputmultiple-output transceivers and wideband single input singleoutput orthogonal frequency division multiplex transmissions.
Resumo:
The production and use of false identity and travel documents in organized crime represent a serious and evolving threat. However, a case-by-case perspective, thus suffering from linkage blindness and a limited analysis capacity, essentially drives the present-day fight against this criminal problem. To assist in overcoming these limitations, a process model was developed using a forensic perspective. It guides the systematic analysis and management of seized false documents to generate forensic intelligence that supports strategic and tactical decision-making in an intelligence-led policing approach. The model is articulated on a three-level architecture that aims to assist in detecting and following-up on general trends, production methods and links between cases or series. Using analyses of a large dataset of counterfeit and forged identity and travel documents, it is possible to illustrate the model, its three levels and their contribution. Examples will point out how the proposed approach assists in detecting emerging trends, in evaluating the black market's degree of structure, in uncovering criminal networks, in monitoring the quality of false documents, and in identifying their weaknesses to orient the conception of more secured travel and identity documents. The process model proposed is thought to have a general application in forensic science and can readily be transposed to other fields of study.
Resumo:
Combining bacterial bioreporters with microfluidics systems holds great promise for in-field detection of chemical or toxicity targets. Recently we showed how Escherichia coli cells engineered to produce a variant of green fluorescent protein after contact to arsenite and arsenate can be encapsulated in agarose beads and incorporated into a microfluidic chip to create a device for in-field detection of arsenic, a contaminant of well known toxicity and carcinogenicity in potable water both in industrialized and developing countries. Cell-beads stored in the microfluidics chip at -20°C retained inducibility up to one month and we were able to reproducibly discriminate concentrations of 10 and 50 μg arsenite per L (the drinking water standards for European countries and the United States, and for the developing countries, respectively) from the blank in less than 200 minutes. We discuss here the reasons for decreasing bioreporter signal development upon increased storage of cell beads but also show how this decrease can be reduced, leading to a faster detection and a longer lifetime of the device.
Resumo:
INTRODUCTION: Deficits in decision making (DM) are commonly associated with prefrontal cortical damage, but may occur with multiple sclerosis (MS). There are no data concerning the impact of MS on tasks evaluating DM under explicit risk, where different emotional and cognitive components can be distinguished. METHODS: We assessed 72 relapsing-remitting MS (RRMS) patients with mild to moderate disease and 38 healthy controls in two DM tasks involving risk with explicit rules: (1) The Wheel of Fortune (WOF), which probes the anticipated affects of decisions outcomes on future choices; and (2) The Cambridge Gamble Task (CGT) which measures risk taking. Participants also underwent a neuropsychological and emotional assessment, and skin conductance responses (SCRs) were recorded. RESULTS: In the WOF, RRMS patients showed deficits in integrating positive counterfactual information (p<0.005) and greater risk aversion (p<0.001). They reported less negative affect than controls (disappointment: p = 0.007; regret: p = 0.01), although their implicit emotional reactions as measured by post-choice SCRs did not differ. In the CGT, RRMS patients differed from controls in quality of DM (p = 0.01) and deliberation time (p = 0.0002), the latter difference being correlated with attention scores. Such changes did not result in overall decreases in performance (total gains). CONCLUSIONS: The quality of DM under risk was modified by MS in both tasks. The reduction in the expression of disappointment coexisted with an increased risk aversion in the WOF and alexithymia features. These concomitant emotional alterations may have implications for better understanding the components of explicit DM and for the clinical support of MS patients.
Resumo:
Charcot-Marie-Tooth neuropathy (CMT) represents a heterogenous group of inherited disorders of the peripheral nervous system. One form of autosomal recessive demyelinating CMT (CMT4C, 5q32) is caused by mutations in the gene encoding KIAA1985, a protein of so far unknown function. Here we show that KIAA1985 is exclusively expressed in Schwann cells. KIAA1985 is tethered to cellular membranes through an N-terminal myristic acid anchor and localizes to the perinuclear recycling compartment. A search for proteins that interact with KIAA1985 identified the small GTPase Rab11, a key regulator of recycling endosome functions. CMT4C-related missense mutations disrupt the KIAA1985/Rab11 interaction. Protein binding studies indicate that KIAA1985 functions as a Rab11 effector, as it interacts only with active forms of Rab11 (WT and Q70L) and does not interact with the GDP locked mutant (S25N). Consistent with a function of Rab11 in Schwann cell myelination, myelin formation was strongly impaired when dorsal root ganglion neurons were co-cultured with Schwann cells infected with Rab11 S25N. Our data indicate that the KIAA1985/Rab11 interaction is relevant for peripheral nerve pathophysiology and place endosomal recycling on the list of cellular mechanisms involved in Schwann cell myelination.