986 resultados para demerit point loss
Resumo:
Methods of diagnosis in Biomedical applications can be broadly divided into contact and non-contact based methods. So far, ultrasound based methods have been found to be most favorable for non-contact, non-invasive diagnosis, especially in the case of tissue stiffness analysis. We report here, the fabrication and characterization details of a new contact based transducer system for qualitative determination of the stiffnesses of non-piezoelectric substrates using the phenomenon of Surface Acoustic Waves (SAW). Preliminary trials to study the functionality of this system were carried out on various metallic and non-metallic substrates, and the results were found to be satisfactory. To confirm the suitability of this system for biomedical applications, similar trials have been conducted on tissue mimicking phantoms with varying degrees of stiffness.
Resumo:
An analysis is performed to study the unsteady combined forced and free convection flow (mixed convection flow) of a viscous incompressible electrically conducting fluid in the vicinity of an axisymmetric stagnation point adjacent to a heated vertical surface. The unsteadiness in the flow and temperature fields is due to the free stream velocity, which varies arbitrarily with time. Both constant wall temperature and constant heat flux conditions are considered in this analysis. By using suitable transformations, the Navier-Stokes and energy equations with four independent variables (x, y, z, t) are reduced to a system of partial differential equations with two independent variables (eta, tau). These transformations also uncouple the momentum and energy equations resulting in a primary axisymmetric flow, in an energy equation dependent on the primary flow and in a buoyancy-induced secondary flow dependent on both primary flow and energy. The resulting system of partial differential equations has been solved numerically by using both implicit finite-difference scheme and differential-difference method. An interesting result is that for a decelerating free stream velocity, flow reversal occurs in the primary flow after certain instant of time and the magnetic field delays or prevents the flow reversal. The surface heat transfer and the surface shear stress in the primary flow increase with the magnetic field, but the surface shear stress in the buoyancy-induced secondary flow decreases. Further the heat transfer increases with the Prandtl number, but the surface shear stress in the secondary flow decreases.
Resumo:
Modification of tryptophan side chains of soybean agglutinin (SBA) with N-bromosuccinimide results in a loss of the hemagglutinating and carbohydrate binding activities of the protein. One residue/subunit is probably essential for the binding activity. Modification leads to a large decrease in the fluorescene of the protein accompained by a blue shift. Iodide ion quenching of the protein fluorescence shows that saccharide binding results in a decreased accessibility of some of the tryptophan side chains. These results strongly point towards the involvement of tryptophan residues in the active site of SBA.
Resumo:
We have found an exact similarity solution of the point explosion problem in the case when the total energy of the shock wave that is produced is not constant but decreases with time and when the loss due to radiation escape is significant. We have compared the results of our exact solution with those of exact numerical solutions of Elliot and Wang and have explained the cause why our solution differs from theirs in certain aspects.
Resumo:
"The genetic diversity of Puumala hantavirus (PUUV) was studied in a local population of its natural host, the bank vole (Myodes glareolus). The trapping area (2.5x2.5 km) at Konnevesi, Central Finland, included 14 trapping sites, at least 500 m apart; altogether, 147 voles were captured during May and October 2005. Partial sequences of the S, M and L viral genome segments were recovered from 40 animals. Seven, 12 and 17 variants were detected for the S, M and L sequences, respectively; these represent new wild-type PUUV strains that belong to the Finnish genetic lineage. The genetic diversity of PUUV strains from Konnevesi was 0.2-4.9% for the S segment, 0.2-4.8% for the M segment and 0.2-9.7% for the L segment. Most nucleotide substitutions were synonymous and most deduced amino acid substitutions were conservative, probably due to strong stabilizing selection operating at the protein level. Based on both sequence markers and phylogenetic clustering, the S, M and L sequences could be assigned to two groups, 'A' and 'B'. Notably, not all bank voles carried S, M and L sequences belonging to the same group, i.e. SAMALA or SBMBLB.. A substantial proportion (8/40, 20%) of the newly characterized PUUV strains possessed reassortant genomes such as SBMALA, SAMBLB or SBMALB. These results suggest that at least some of the PUUV reassortants are viable and can survive in the presence of their parental strains."
Resumo:
As the virtual world grows more complex, finding a standard way for storing data becomes increasingly important. Ideally, each data item would be brought into the computer system only once. References for data items need to be cryptographically verifiable, so the data can maintain its identity while being passed around. This way there will be only one copy of the users family photo album, while the user can use multiple tools to show or manipulate the album. Copies of users data could be stored on some of his family members computer, some of his computers, but also at some online services which he uses. When all actors operate over one replicated copy of the data, the system automatically avoids a single point of failure. Thus the data will not disappear with one computer breaking, or one service provider going out of business. One shared copy also makes it possible to delete a piece of data from all systems at once, on users request. In our research we tried to find a model that would make data manageable to users, and make it possible to have the same data stored at various locations. We studied three systems, Persona, Freenet, and GNUnet, that suggest different models for protecting user data. The main application areas of the systems studied include securing online social networks, providing anonymous web, and preventing censorship in file-sharing. Each of the systems studied store user data on machines belonging to third parties. The systems differ in measures they take to protect their users from data loss, forged information, censorship, and being monitored. All of the systems use cryptography to secure names used for the content, and to protect the data from outsiders. Based on the gained knowledge, we built a prototype platform called Peerscape, which stores user data in a synchronized, protected database. Data items themselves are protected with cryptography against forgery, but not encrypted as the focus has been disseminating the data directly among family and friends instead of letting third parties store the information. We turned the synchronizing database into peer-to-peer web by revealing its contents through an integrated http server. The REST-like http API supports development of applications in javascript. To evaluate the platform’s suitability for application development we wrote some simple applications, including a public chat room, bittorrent site, and a flower growing game. During our early tests we came to the conclusion that using the platform for simple applications works well. As web standards develop further, writing applications for the platform should become easier. Any system this complex will have its problems, and we are not expecting our platform to replace the existing web, but are fairly impressed with the results and consider our work important from the perspective of managing user data.
Resumo:
As the virtual world grows more complex, finding a standard way for storing data becomes increasingly important. Ideally, each data item would be brought into the computer system only once. References for data items need to be cryptographically verifiable, so the data can maintain its identity while being passed around. This way there will be only one copy of the users family photo album, while the user can use multiple tools to show or manipulate the album. Copies of users data could be stored on some of his family members computer, some of his computers, but also at some online services which he uses. When all actors operate over one replicated copy of the data, the system automatically avoids a single point of failure. Thus the data will not disappear with one computer breaking, or one service provider going out of business. One shared copy also makes it possible to delete a piece of data from all systems at once, on users request. In our research we tried to find a model that would make data manageable to users, and make it possible to have the same data stored at various locations. We studied three systems, Persona, Freenet, and GNUnet, that suggest different models for protecting user data. The main application areas of the systems studied include securing online social networks, providing anonymous web, and preventing censorship in file-sharing. Each of the systems studied store user data on machines belonging to third parties. The systems differ in measures they take to protect their users from data loss, forged information, censorship, and being monitored. All of the systems use cryptography to secure names used for the content, and to protect the data from outsiders. Based on the gained knowledge, we built a prototype platform called Peerscape, which stores user data in a synchronized, protected database. Data items themselves are protected with cryptography against forgery, but not encrypted as the focus has been disseminating the data directly among family and friends instead of letting third parties store the information. We turned the synchronizing database into peer-to-peer web by revealing its contents through an integrated http server. The REST-like http API supports development of applications in javascript. To evaluate the platform s suitability for application development we wrote some simple applications, including a public chat room, bittorrent site, and a flower growing game. During our early tests we came to the conclusion that using the platform for simple applications works well. As web standards develop further, writing applications for the platform should become easier. Any system this complex will have its problems, and we are not expecting our platform to replace the existing web, but are fairly impressed with the results and consider our work important from the perspective of managing user data.
Resumo:
Alternative pathway (AP) of complement can be activated on any surface, self or non-self. In atypical hemolytic uremic syndrome (aHUS) the AP regulation on self surfaces is insufficient and leads to complement attack against self-cells resulting usually in end-stage renal disease. Factor H (FH) is one of the key regulators of AP activation on the self surfaces. The domains 19 and 20 (FH19-20) are critical for the ability of FH to discriminate between C3b-opsonized self and non-self surfaces and are a hot-spot for mutations that have been described from aHUS patients. FH19-20 contains binding sites for both the C3d part of C3b and self surface polyanions that are needed for efficient C3b inactivation. To study the dysfunction of FH19-20, crystallographic structures of FH19-20 and FH19-20 in complex with C3d (FH19-20:C3d) were solved and aHUS-associated and structurally interesting point mutations were induced to FH19-20. Functional defects caused by these mutations were studied by analyzing binding of the FH19-20 mutant proteins to C3d, C3b, heparin, and mouse glomerular endothelial cells (mGEnCs). The results revealed two independent binding interfaces between FH19-20 and C3d - the FH19 site and the FH20 site. Superimposition of the FH19-20:C3d complex on the previously published C3b and FH1-4:C3b structures showed that the FH20 site on C3d is partially occluded, but the FH19 site is fully available. Furthermore, binding of FH19-20 via the FH19 site to C3b did not block binding of the functionally important FH1-4 domains and kept the FH20 site free to bind heparin or an additional C3d. Binding assays were used to show that FH20 domain can bind to heparin while FH19-20 is bound to C3b via the FH19 site, and that both the FH19 site and FH20 are necessary for recognition of non-activator surfaces. Simultaneous binding of FH19 site to C3b and FH20 to anionic self structures are the key interactions in self-surface recognition by FH and thereby enhanced avidity of FH explains how AP discriminates between self and non-self. The aHUS-associated mutations on FH19-20 were found to disrupt binding of the FH19 or FH20 site to C3d/C3b, or to disrupt binding of FH20 to heparin or mGEnC. Any of these dysfunctions leads to loss of FH avidity to C3b bearing self surfaces explaining the molecular pathogenesis of the aHUS-cases where mutations are found within FH19-20.
Resumo:
A polymer containing electron-rich aromatic donors (1,5-dialkoxynaphthalene (DAN)) was coerced into a folded state by an external folding agent that contained an electron-deficient aromatic acceptor (pyromellitic diimide (PM)) unit. The donor-containing polymer was designed to carry a tertiary amine moiety in the linking segment, which served as an H-bonding site for reinforcing the interaction with the acceptor containing folding agent that also bore a carboxylic acid group. The H-bonding interaction of the carboxylic acid and the tertiary amine brings the PDI unit between two adjacent DAN units along the polymer backbone to induce charge-transfer (C-T) interactions, and this in turn causes the polymer chain to form a pleated structure. Evidence for the formation of such a pleated structure was obtained from NMR titration studies and also by monitoring the C-T band in their UV-visible spectra. By varying the length of the segment that links the PDI acceptor to the carboxylic acid group, we showed that the most effective folding agent was the one that had a single carbon spacer, as evident from the highest value of the association constant. Control experiments with propionic acid clearly demonstrated the importance of the additional C-T interactions for venerating the folded structures. Further, solution viscosity measurements in the presence of varying amounts of the folding agent revealed a gradual stiffening of the chain in the case of the PDI carrying carboxylic acid, whereas no such affect was seen in the case of simple propionic acid. These observations were supported by D FT calculations of the interactions of a dimeric model of the polymer with the various folding agents; here too the stability of the complex was seen to be highest in the case of the single carbon spacer.
Resumo:
We propose and demonstrate a dynamic point spread function (PSF) for single and multiphoton fluorescence microscopy. The goal is to generate a PSF whose shape and size can be maneuvered from highly localized to elongated one, thereby allowing shallow-to-depth excitation capability during active imaging. The PSF is obtained by utilizing specially designed spatial filter and dynamically altering the filter parameters. We predict potential applications in nanobioimaging and fluorescence microscopy.
Resumo:
We propose and demonstrate a dynamic point spread function (PSF) for single and multiphoton fluorescence microscopy. The goal is to generate a PSF whose shape and size can be maneuvered from highly localized to elongated one, thereby allowing shallow-to-depth excitation capability during active imaging. The PSF is obtained by utilizing specially designed spatial filter and dynamically altering the filter parameters. We predict potential applications in nanobioimaging and fluorescence microscopy.
Resumo:
The paper presents simple graphical procedures for position synthesis of plane linkage mechanisms to generate functions of two independent variables. The procedures are based on point-position reduction and permit synthesis of the linkage to satisfy up to six arbitrarily selected precision positions.
Resumo:
The paper presents simple graphical procedures for the position synthesis of plane linkage mechanisms with sliding inputs and output to generate functions of two independent variables. The procedures are based on point position reduction and permit synthesis of the linkage to satisfy up to five arbitrarily selected precision positions.