949 resultados para thesis coding
Resumo:
Many of the controversies around the concept of homology rest on the subjectivity inherent to primary homology propositions. Dynamic homology partially solves this problem, but there has been up to now scant application of it outside of the molecular domain. This is probably because morphological and behavioural characters are rich in properties, connections and qualities, so that there is less space for conflicting character delimitations. Here we present a new method for the direct optimization of behavioural data, a method that relies on the richness of this database to delimit the characters, and on dynamic procedures to establish character state identity. We use between-species congruence in the data matrix and topological stability to choose the best cladogram. We test the methodology using sequences of predatory behaviour in a group of spiders that evolved the highly modified predatory technique of spitting glue onto prey. The cladogram recovered is fully compatible with previous analyses in the literature, and thus the method seems consistent. Besides the advantage of enhanced objectivity in character proposition, the new procedure allows the use of complex, context-dependent behavioural characters in an evolutionary framework, an important step towards the practical integration of the evolutionary and ecological perspectives on diversity. (C) The Willi Hennig Society 2010.
Resumo:
The aim of this study was to identify molecular pathways involved in audiogenic seizures in the epilepsy-prone Wistar Audiogenic Rat (WAR). For this, we used a suppression-subtractive hybridization (SSH) library from the hippocampus of WARs coupled to microarray comparative gene expression analysis, followed by Northern blot validation of individual genes. We discovered that the levels of the non-protein coding (npc) RNA BC1 were significantly reduced in the hippocampus of WARs submitted to repeated audiogenic seizures (audiogenic kindling) when compared to Wistar resistant rats and to both naive WARs and Wistars. By quantitative in situ hybridization, we verified lower levels of BC1 RNA in the GD-hilus and significant signal ratio reduction in the stratum radiatum and stratum pyramidale of hippocampal CA3 subfield of audiogenic kindled animals. Functional results recently obtained in a BC1-/- mouse model and our current data are supportive of a potential disruption in signaling pathways, upstream of BC1, associated with the seizure susceptibility of WARs. (C) 2010 Elsevier B.V. All rights reserved.
Resumo:
Burst firing is ubiquitous in nervous systems and has been intensively studied in central pattern generators (CPGs). Previous works have described subtle intraburst spike patterns (IBSPs) that, despite being traditionally neglected for their lack of relation to CPG motor function, were shown to be cell-type specific and sensitive to CPG connectivity. Here we address this matter by investigating how a bursting motor neuron expresses information about other neurons in the network. We performed experiments on the crustacean stomatogastric pyloric CPG, both in control conditions and interacting in real-time with computer model neurons. The sensitivity of postsynaptic to presynaptic IBSPs was inferred by computing their average mutual information along each neuron burst. We found that details of input patterns are nonlinearly and inhomogeneously coded through a single synapse into the fine IBSPs structure of the postsynaptic neuron following burst. In this way, motor neurons are able to use different time scales to convey two types of information simultaneously: muscle contraction (related to bursting rhythm) and the behavior of other CPG neurons (at a much shorter timescale by using IBSPs as information carriers). Moreover, the analysis revealed that the coding mechanism described takes part in a previously unsuspected information pathway from a CPG motor neuron to a nerve that projects to sensory brain areas, thus providing evidence of the general physiological role of information coding through IBSPs in the regulation of neuronal firing patterns in remote circuits by the CNS.
Resumo:
We study the reconstruction of visual stimuli from spike trains, representing the reconstructed stimulus by a Volterra series up to second order. We illustrate this procedure in a prominent example of spiking neurons, recording simultaneously from the two H1 neurons located in the lobula plate of the fly Chrysomya megacephala. The fly views two types of stimuli, corresponding to rotational and translational displacements. Second-order reconstructions require the manipulation of potentially very large matrices, which obstructs the use of this approach when there are many neurons. We avoid the computation and inversion of these matrices using a convenient set of basis functions to expand our variables in. This requires approximating the spike train four-point functions by combinations of two-point functions similar to relations, which would be true for gaussian stochastic processes. In our test case, this approximation does not reduce the quality of the reconstruction. The overall contribution to stimulus reconstruction of the second-order kernels, measured by the mean squared error, is only about 5% of the first-order contribution. Yet at specific stimulus-dependent instants, the addition of second-order kernels represents up to 100% improvement, but only for rotational stimuli. We present a perturbative scheme to facilitate the application of our method to weakly correlated neurons.
Resumo:
The clear cell subtype of renal cell carcinoma (RCC) is the most lethal and prevalent cancer of the urinary system. To investigate the molecular changes associated with malignant transformation in clear cell RCC, the gene expression profiles of matched samples of tumor and adjacent non-neoplastic tissue were obtained from six patients. A custom-built cDNA microarray platform was used, comprising 2292 probes that map to exons of genes and 822 probes for noncoding RNAs mapping to intronic regions. Intronic transcription was detected in all normal and neoplastic renal tissues. A subset of 55 transcripts was significantly down-regulated in clear cell RCC relative to the matched nontumor tissue as determined by a combination of two statistical tests and leave-one-out patient cross-validation. Among the down-regulated transcripts, 49 mapped to untranslated or coding exons and 6 were intronic relative to known exons of protein-coding genes. Lower levels of expression of SIN3B, TRIP3, SYNJ2BP and NDE1 (P<0.02), and of intronic transcripts derived from SND1 and ACTN4 loci (P<0.05), were confirmed in clear cell RCC by Real-time RT-PCR. A subset of 25 transcripts was deregulated in additional six nonclear cell RCC samples, pointing to common transcriptional alterations in RCC irrespective of the histological subtype or differentiation state of the tumor. Our results indicate a novel set of tumor suppressor gene candidates, including noncoding intronic RNAs, which may play a significant role in malignant transformations of normal renal cells. (C) 2008 Wiley-Liss, Inc.
Resumo:
Internet protocol TV (IPTV) is predicted to be the key technology winner in the future. Efforts to accelerate the deployment of IPTV centralized model which is combined of VHO, encoders, controller, access network and Home network. Regardless of whether the network is delivering live TV, VOD, or Time-shift TV, all content and network traffic resulting from subscriber requests must traverse the entire network from the super-headend all the way to each subscriber's Set-Top Box (STB).IPTV services require very stringent QoS guarantees When IPTV traffic shares the network resources with other traffic like data and voice, how to ensure their QoS and efficiently utilize the network resources is a key and challenging issue. For QoS measured in the network-centric terms of delay jitter, packet losses and bounds on delay. The main focus of this thesis is on the optimized bandwidth allocation and smooth datatransmission. The proposed traffic model for smooth delivering video service IPTV network with its QoS performance evaluation. According to Maglaris et al [5] First, analyze the coding bit rate of a single video source. Various statistical quantities are derived from bit rate data collected with a conditional replenishment inter frame coding scheme. Two correlated Markov process models (one in discrete time and one incontinuous time) are shown to fit the experimental data and are used to model the input rates of several independent sources into a statistical multiplexer. Preventive control mechanism which is to be include CAC, traffic policing used for traffic control.QoS has been evaluated of common bandwidth scheduler( FIFO) by use fluid models with Markovian queuing method and analysis the result by using simulator andanalytically, Which is measured the performance of the packet loss, overflow and mean waiting time among the network users.
Resumo:
In recent years, it has been observed that software clones and plagiarism are becoming an increased threat for one?s creativity. Clones are the results of copying and using other?s work. According to the Merriam – Webster dictionary, “A clone is one that appears to be a copy of an original form”. It is synonym to duplicate. Clones lead to redundancy of codes, but not all redundant code is a clone.On basis of this background knowledge ,in order to safeguard one?s idea and to avoid intentional code duplication for pretending other?s work as if their owns, software clone detection should be emphasized more. The objective of this paper is to review the methods for clone detection and to apply those methods for finding the extent of plagiarism occurrence among the Swedish Universities in Master level computer science department and to analyze the results.The rest part of the paper, discuss about software plagiarism detection which employs data analysis technique and then statistical analysis of the results.Plagiarism is an act of stealing and passing off the idea?s and words of another person?s as one?s own. Using data analysis technique, samples(Master level computer Science thesis report) were taken from various Swedish universities and processed in Ephorus anti plagiarism software detection. Ephorus gives the percentage of plagiarism for each thesis document, from this results statistical analysis were carried out using Minitab Software.The results gives a very low percentage of Plagiarism extent among the Swedish universities, which concludes that Plagiarism is not a threat to Sweden?s standard of education in computer science.This paper is based on data analysis, intelligence techniques, EPHORUS software plagiarism detection tool and MINITAB statistical software analysis.
Resumo:
Internet protocol TV (IPTV) is predicted to be the key technology winner in the future. Efforts to accelerate the deployment of IPTV centralized model which is combined of VHO, encoders, controller, access network and Home network. Regardless of whether the network is delivering live TV, VOD, or Time-shift TV, all content and network traffic resulting from subscriber requests must traverse the entire network from the super-headend all the way to each subscriber's Set-Top Box (STB). IPTV services require very stringent QoS guarantees When IPTV traffic shares the network resources with other traffic like data and voice, how to ensure their QoS and efficiently utilize the network resources is a key and challenging issue. For QoS measured in the network-centric terms of delay jitter, packet losses and bounds on delay. The main focus of this thesis is on the optimized bandwidth allocation and smooth data transmission. The proposed traffic model for smooth delivering video service IPTV network with its QoS performance evaluation. According to Maglaris et al [5] first, analyze the coding bit rate of a single video source. Various statistical quantities are derived from bit rate data collected with a conditional replenishment inter frame coding scheme. Two correlated Markov process models (one in discrete time and one in continuous time) are shown to fit the experimental data and are used to model the input rates of several independent sources into a statistical multiplexer. Preventive control mechanism which is to be including CAC, traffic policing used for traffic control. QoS has been evaluated of common bandwidth scheduler( FIFO) by use fluid models with Markovian queuing method and analysis the result by using simulator and analytically, Which is measured the performance of the packet loss, overflow and mean waiting time among the network users.
Resumo:
This essay studies how dialectal speech is reflected in written literature and how this phenomenon functions in translation. With this purpose in mind, Styron's Sophie's Choice and Twain's The Adventures of Huckleberry Finn are analysed using samples of non-standard orthography which have been applied in order to reflect the dialect, or accent, of certain characters. In the same way, Lundgren's Swedish translation of Sophie's Choice and Ferres and Rolfe's Spanish version of The Adventures of Huckleberry Finn are analysed. The method consists of linguistically analysing a few text samples from each novel, establishing how dialect is represented through non-standard orthography, and thereafter, comparing the same samples with their translation into another language in order to establish whether dialectal features are visible also in the translated novels. It is concluded that non-standard orthography is applied in the novels in order to represent each possible linguistic level, including pronunciation, morphosyntax, and vocabulary. Furthermore, it is concluded that while Lundgren's translation intends to orthographically represent dialectal speech on most occasions where the original does so, Ferres and Rolfe's translation pays no attention to dialectology. The discussion following the data analysis establishes some possible reasons for the exclusion of dialectal features in the Spanish translation considered here. Finally, the reason for which this study contributes to the study of dialectology is declared.
Resumo:
Purpose – This research focuses on finding the reasons, why members from different sectors join a cross-sector/multi-stakeholder CSR network and what motivates them to share (or not to share) their knowledge of CSR and their best practices. Design/methodology/approach – Semi-structured interviews were conducted with members of the largest cross-sector CSR network in Sweden. The sample base of 15 people was chosen to be able to represent a wider variety of members from each participating sectors. As well as the CEO of the intermediary organization was interviewed. The interviews were conducted via email and telephone. Findings – The findings include several reasons linked to the business case of CSR such as stakeholder pressure, competitive advantage, legitimacy and reputation as well as new reasons like the importance of CSR, and the access of further knowledge in the field. Further reasons are in line with members wanting to join a network, such as access to contact or having personal contacts. As to why members are sharing their CSR knowledge, the findings indicate to inspire others, to show CSR commitment, to be visible, it leads to business opportunity and the access of others knowledge, and because it was requested. Reasons for not sharing their knowledge would be the lack of opportunity, lack of time and the lack of experience to do so. Originality/value – The research contributes to existing studies, which focused on Corporate Social Responsibility and cross-sector networking as well as to inter-organizational knowledge sharing in the field of CSR.
Resumo:
The English language has become an international language and is globally used as a lingua franca. Therefore, there has been a shift in English-language education toward teaching English as an interna-tional language (EIL). Teaching from the EIL paradigm means that English is seen as an international language used in communication by people from different linguistic and cultural backgrounds. As the approach to English-language education changes from the traditional native-speaker, target country context, so does the role of culture within English-language teaching. The aim of this thesis is to in-vestigate and analyse cultural representations in two Swedish EFL textbooks used in upper-secondary school to see how they correspond with the EIL paradigm. This is done by focusing on the geograph-ical origin of the cultural content as well as looking at what kinds of culture are represented in the textbooks. A content analysis of the textbooks is conducted, using Kachru’s Concentric Circles of English as the model for the analysis of the geographical origin. Horibe’s model of the three different kinds of culture in EIL is the model used for coding the second part of the analysis. The results of the analysis show that culture of target countries and "Culture as social custom" dominate the cultural content of the textbook. Thus, although there are some indications that the EIL paradigm has influ-enced the textbooks, the traditional approach to culture in language teaching still prevails in the ana-lysed textbooks. Because of the relatively small sample included in the thesis, further studies need to be conducted in order to make conclusions regarding the Swedish context as a whole.
Resumo:
Audio coding is used to compress digital audio signals, thereby reducing the amount of bits needed to transmit or to store an audio signal. This is useful when network bandwidth or storage capacity is very limited. Audio compression algorithms are based on an encoding and decoding process. In the encoding step, the uncompressed audio signal is transformed into a coded representation, thereby compressing the audio signal. Thereafter, the coded audio signal eventually needs to be restored (e.g. for playing back) through decoding of the coded audio signal. The decoder receives the bitstream and reconverts it into an uncompressed signal. ISO-MPEG is a standard for high-quality, low bit-rate video and audio coding. The audio part of the standard is composed by algorithms for high-quality low-bit-rate audio coding, i.e. algorithms that reduce the original bit-rate, while guaranteeing high quality of the audio signal. The audio coding algorithms consists of MPEG-1 (with three different layers), MPEG-2, MPEG-2 AAC, and MPEG-4. This work presents a study of the MPEG-4 AAC audio coding algorithm. Besides, it presents the implementation of the AAC algorithm on different platforms, and comparisons among implementations. The implementations are in C language, in Assembly of Intel Pentium, in C-language using DSP processor, and in HDL. Since each implementation has its own application niche, each one is valid as a final solution. Moreover, another purpose of this work is the comparison among these implementations, considering estimated costs, execution time, and advantages and disadvantages of each one.
Resumo:
O historiador Frederick Jackson Turner (1862-1931) é considerado o grande pai da historiografia moderna nos Estados Unidos. Sua frontier thesis postulava a centralidade da expansão das fronteiras ocidentais no processo de formação da nacionalidade estadunidense e na consolidação da democracia política naquela nação, abandonando uma história política factual e introduzindo uma interpretação calcada em fatores econômicos e sociais, com claras implicações presentistas. Graças a esta análise revolucionária, Turner tornou-se uma espécie de patrono da profissionalização da disciplina nos Estados Unidos, formando toda uma geração de historiadores a partir de seus seminários na Universidade Estadual do Wisconsin e em Harvard. Não só isso, mas a sua teoria encontrou apelo entre elementos da classe política e empresarial, incluindo dois Presidentes da República, Theodore Roosevelt (1901-1909) e Woodrow Wilson (1913-1921). A explicação para tal sucesso pode ser encontrada na relação entre a frontier thesis e o Mito da Fronteira, através de uma narrativa que fazia uso dos ícones e imagens do Mito enquadrados em uma retórica extremamente persuasiva. Nas páginas dos escritos de Turner, os norte-americanos marcham triunfalmente em direção a conquista de todo o continente, justificada pelo seu amor à democracia e por sua devoção ao progresso material e mental dos homens. Com isso, o historiador conseguiu unir uma valorização do agrarianismo primitivo com um elogio à evolução histórica dos Estados Unidos.
Resumo:
O Brasil é um dos principais atores do novo ambiente econômico mundial, mas para permanecer atrativo, deve fazer progressos significativos no campo das Tecnologias de Informação e da Comunicação (TIC). Assim, um serviço de internet banda larga é primordial para o desenvolvimento de regiões distantes, geralmente de baixa renda e que não têm acesso a instalações de telecomunicações, nem aos serviços de internet banda larga. De fato, a penetração da banda larga no Brasil apresenta situação inferior à média mundial e boa parte da população ainda está excluída do mundo digital por causa das desigualdades sociais e as dimensões continentais do país. Para preencher esta lacuna, o governo federal lançou, em 2010, o Programa Nacional de Banda Larga (PNBL). No entanto, a penetração de banda larga permanece em níveis baixos, mesmo em grandes centros urbanos e com uma distribuição regional desigual, especialmente quando comparados internacionalmente. As concessionárias não estão desempenhando o seu papel de universalização dos serviços de banda larga e as pequenas e médias operadoras podem desempenhar um papel fundamental na promoção desse objetivo. Esse trabalho tem o propósito de investigar se é possível conciliar o modelo vigente de telecomunicações regido pela Lei Geral das Telecomunicações (LGT) com a universalização dos serviços de banda larga, desde que apoiado num mercado competitivo e menos concentrado, com pequenas e médias operadoras. Como verificação, foi feito um trabalho empírico com base em entrevistas semiestruturadas com profissionais de telecomunicações do setor público e privado, assim como uma análise de padrão de codificação dessas entrevistas. Os resultados mostram, porém, que o ambiente regulatório atual pode gerar incentivos à operação de qualidade nas áreas remotas e de baixa renda, mas não de forma generalizada. A universalização requer uma mudança estrutural do modelo e é a política pública federal que deve dar as diretrizes, com objetivos claros. Tampouco há modelo ideal de regulação, mas um entorno regulatório adequado pode ser motor de desenvolvimento do setor. O estabelecimento de compromissos entre os atores também é fundamental, assim como a decisão política na origem, dando suporte para o planejamento e projetos de longo prazo. E é a partir dessa decisão que se desenvolvem as medidas regulatórias de competição e fiscalização que vão garantir a execução do que foi previsto e desenhado.