988 resultados para Hartree Fock scheme correlation errors


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Many cell types form clumps or aggregates when cultured in vitro through a variety of mechanisms including rapid cell proliferation, chemotaxis, or direct cell-to-cell contact. In this paper we develop an agent-based model to explore the formation of aggregates in cultures where cells are initially distributed uniformly, at random, on a two-dimensional substrate. Our model includes unbiased random cell motion, together with two mechanisms which can produce cell aggregates: (i) rapid cell proliferation, and (ii) a biased cell motility mechanism where cells can sense other cells within a finite range, and will tend to move towards areas with higher numbers of cells. We then introduce a pair-correlation function which allows us to quantify aspects of the spatial patterns produced by our agent-based model. In particular, these pair-correlation functions are able to detect differences between domains populated uniformly at random (i.e. at the exclusion complete spatial randomness (ECSR) state) and those where the proliferation and biased motion rules have been employed - even when such differences are not obvious to the naked eye. The pair-correlation function can also detect the emergence of a characteristic inter-aggregate distance which occurs when the biased motion mechanism is dominant, and is not observed when cell proliferation is the main mechanism of aggregate formation. This suggests that applying the pair-correlation function to experimental images of cell aggregates may provide information about the mechanism associated with observed aggregates. As a proof of concept, we perform such analysis for images of cancer cell aggregates, which are known to be associated with rapid proliferation. The results of our analysis are consistent with the predictions of the proliferation-based simulations, which supports the potential usefulness of pair correlation functions for providing insight into the mechanisms of aggregate formation.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper presents a distributed communication based active power curtailment (APC) control scheme for grid connected photovoltaic (PV) systems to address voltage rise. A simple distribution feeder model is presented and simulated using MATLAB. The resource sharing based control scheme proposed is shown to be effective at reducing voltage rise during times of peak generation and low load. Simulations also show the even distribution of APC using simple communications. Simulations demonstrate the versatility of the proposed control method under major communication failure conditions. Further research may lead to possible applications in coordinated electric vehicle (EV) charging.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

With new developments in battery technologies, increasing application of Battery Energy Storage System (BESS) in power system is anticipated in near future. BESS has already been used for primary frequency regulation in the past. This paper examines the feasibility of using BESS with load shedding, in application for large disturbances in power system. Load shedding is one of the conventional ways during large disturbances, and the performance of frequency control will increase in combination with BESS application. According to the latest news, BESS which are applied in high power side will be employed in practice in next 5 year. A simple low order SMR model is used as a test system, while an incremental model of BESS is applied in this paper. As continuous disturbances are not the main concern in this paper, df/dt is not considered in article.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Proxy re-encryption (PRE) is a highly useful cryptographic primitive whereby Alice and Bob can endow a proxy with the capacity to change ciphertext recipients from Alice to Bob, without the proxy itself being able to decrypt, thereby providing delegation of decryption authority. Key-private PRE (KP-PRE) specifies an additional level of confidentiality, requiring pseudo-random proxy keys that leak no information on the identity of the delegators and delegatees. In this paper, we propose a CPA-secure PK-PRE scheme in the standard model (which we then transform into a CCA-secure scheme in the random oracle model). Both schemes enjoy highly desirable properties such as uni-directionality and multi-hop delegation. Unlike (the few) prior constructions of PRE and KP-PRE that typically rely on bilinear maps under ad hoc assumptions, security of our construction is based on the hardness of the standard Learning-With-Errors (LWE) problem, itself reducible from worst-case lattice hard problems that are conjectured immune to quantum cryptanalysis, or “post-quantum”. Of independent interest, we further examine the practical hardness of the LWE assumption, using Kannan’s exhaustive search algorithm coupling with pruning techniques. This leads to state-of-the-art parameters not only for our scheme, but also for a number of other primitives based on LWE published the literature.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Dispute resolution in strata schemes in Peninsular Malaysia should focus on more than just "settlement." The quality of the outcome, its sustainability and its relevance in supporting the basic principles of a good neighbourhood and self-governance in a strata scheme are also fundamental. Based on the comprehensive law movement, this thesis develops a theoretical framework for strata scheme disputes within the parameters of therapeutic jurisprudence, preventive law, alternative dispute resolution (ADR) and problem-solving courts. The therapeutic orientation of this model offers approaches that promote positive communication between disputing parties, preserve neighbour relations and optimise people's psychological and emotional well-being.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We consider the following problem: members in a dynamic group retrieve their encrypted data from an untrusted server based on keywords and without any loss of data confidentiality and member’s privacy. In this paper, we investigate common secure indices for conjunctive keyword-based retrieval over encrypted data, and construct an efficient scheme from Wang et al. dynamic accumulator, Nyberg combinatorial accumulator and Kiayias et al. public-key encryption system. The proposed scheme is trapdoorless and keyword-field free. The security is proved under the random oracle, decisional composite residuosity and extended strong RSA assumptions.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Orthotopic or intracardiac injection of human breast cancer cell lines into immunocompromised mice allows study of the molecular basis of breast cancer metastasis. We have established a quantitative real-time PCR approach to analyze metastatic spread of human breast cancer cells inoculated into nude mice via these routes. We employed MDA-MB-231 human breast cancer cells genetically tagged with a bacterial β-galactosidase (Lac-Z) retroviral vector, enabling their detection by TaqMan® real-time PCR. PCR detection was linear, specific, more sensitive than conventional PCR, and could be used to directly quantitate metastatic burden in bone and soft organs. Attesting to the sensitivity and specificity of the PCR detection strategy, as few as several hundred metastatic MDA-MB-231 cells were detectable in 100 μm segments of paraffin-embedded lung tissue, and only in samples adjacent to sections that scored positive by histological detection. Moreover, the measured real-time PCR metastatic burden in the bone environment (mouse hind-limbs, n = 48) displayed a high correlation to the degree of osteolytic damage observed by high resolution X-ray analysis (r2 = 0.972). Such a direct linear relationship to tumor burden and bone damage substantiates the so-called 'vicious cycle' hypothesis in which metastatic tumor cells promote the release of factors from the bone which continue to stimulate the tumor cells. The technique provides a useful tool for molecular and cellular analysis of human breast cancer metastasis to bone and soft organs, can easily be extended to other cell/marker/organ systems, and should also find application in preclinical assessment of anti-metastatic modalities.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Interfacing converters used in connecting energy storage systems like supercapacitors and battery banks to wind power systems introduce additional cost and power losses. This paper therefore presents a direct integration scheme for supercapacitors used in mitigating short-term power fluctuations in wind power systems. This scheme uses a dual inverter topology for both grid connection and interfacing a supercapacitor bank. The main inverter of the dual inverter system is powered by the rectified output of a wind turbine-coupled permanent-magnet synchronous generator. The auxiliary inverter is directly connected to the supercapacitor bank. With this approach, an interfacing converter is not required, and there are no associated costs and power losses incurred. The operation of the proposed system is discussed in detail. Simulation and experimental results are presented to verify the efficacy of the proposed system in suppressing short-term wind power fluctuations.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In the present study, we examined a panel of human breast cancer cell lines with regard to their expression of CD44 and ability to bind and degrade hyaluronan. The cell lines expressed varying amounts of different molecular weight forms of CD44 (85-200 kDa) and, in general, those that expressed the greatest amounts of CD44 were the most invasive as judged by in vitro assays. In addition, the ability to bind and degrade hyaluronan was restricted to the cell lines expressing high levels of CD44, and both these functions were blocked by an antibody to CD44 (Hermes-1). Moreover, the rate of [3H]hyaluronan degradation was highly correlated with the amount of CD44 (r = 0.951, P < 0.0001), as well as with the invasive potential of the cells. Scatchard analysis of the [3H]hyaluronan binding of these cells revealed the existence of significant differences in both their binding capacity and their dissociation constant. To determine the source of this deviation, the different molecular weight forms of CD44 were partially separated by gel filtration chromatography. In all cell lines, the 85 kDa form was able to bind hyaluronan, although with different affinities. In contrast, not all of the high molecular weight forms of CD44 had this ability. These results illustrate the diversity of CD44 molecules in invasive tumor cells, and suggest that one of their major functions is to degrade hyaluronan.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper describes a diode-clamped three-level inverter-based battery/supercapacitor direct integration scheme for renewable energy systems. The study is carried out for three different cases. In the first case, one of the two dc-link capacitors of the inverter is replaced by a battery bank and the other by a supercapacitor bank. In the second case, dc-link capacitors are replaced by two battery banks. In the third case, ordinary dc-link capacitors are replaced by two supercapacitor banks. The first system is supposed to mitigate both long-term and short-term power fluctuations while the last two systems are intended for smoothening long-term and short-term power fluctuations, respectively. These topologies eliminate the need for interfacing dc-dc converters and thus considerably improve the overall system efficiency. The major issue in aforementioned systems is the unavoidable imbalance in dc-link voltages. An analysis on the effects of unbalance and a space vector modulation method, which can produce undistorted current even in the presence of such unbalances, are presented in this paper. Furthermore, small vector selection-based power sharing and state of charge balancing techniques are proposed. Experimental results, obtained from a laboratory prototype, are presented to verify the efficacy of the proposed modulation and control techniques.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Human ovarian carcinoma samples were orthotopically implanted into SCID mice to investigate the contribution of matrix metalloproteases (MMPs) to the spread of ovarian tumors. Mice were inoculated with patient tumor samples, and developed ovarian tumors over a 16-week period with metastasis occurring in some mice. Species-specific quantitative RT-PCR was used to identify the source of tumor-associated MMPs. Membrane-type (MT)1-MMP mRNA was significantly increased in high-grade tumors, tumors with evidence of serosal involvement, and tumors in which distant metastases were detected. The increase in MT1-MMP expression was predominantly from the human tumor cells, with a minor contribution from the mouse ovarian stroma. Neither human nor mouse MT2-MMP were correlated with tumor progression and MT3-MMP levels were negligible. While tumor cells did not produce significant amounts of MMP-2 or MMP-9, the presence of tumor was associated with increased levels of MMP-2 expression by mouse ovarian stroma. Stromal-derived MT1-MMP was greater in large tumors and was associated with stromal MMP-2 expression but neither was significantly linked with metastasis. These studies indicate that tumor-derived MT1-MMP, more so than other gelatinolytic MMPs, is strongly linked to aggressive tumor behavior. This orthotopic model of human ovarian carcinoma is appropriate for studying ovarian tumor progression, and will be valuable in the further investigation of the metastatic process.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Fractional differential equations have been increasingly used as a powerful tool to model the non-locality and spatial heterogeneity inherent in many real-world problems. However, a constant challenge faced by researchers in this area is the high computational expense of obtaining numerical solutions of these fractional models, owing to the non-local nature of fractional derivatives. In this paper, we introduce a finite volume scheme with preconditioned Lanczos method as an attractive and high-efficiency approach for solving two-dimensional space-fractional reaction–diffusion equations. The computational heart of this approach is the efficient computation of a matrix-function-vector product f(A)bf(A)b, where A A is the matrix representation of the Laplacian obtained from the finite volume method and is non-symmetric. A key aspect of our proposed approach is that the popular Lanczos method for symmetric matrices is applied to this non-symmetric problem, after a suitable transformation. Furthermore, the convergence of the Lanczos method is greatly improved by incorporating a preconditioner. Our approach is show-cased by solving the fractional Fisher equation including a validation of the solution and an analysis of the behaviour of the model.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We present a text watermarking scheme that embeds a bitstream watermark Wi in a text document P preserving the meaning, context, and flow of the document. The document is viewed as a set of paragraphs, each paragraph being a set of sentences. The sequence of paragraphs and sentences used to embed watermark bits is permuted using a secret key. Then, English language sentence transformations are used to modify sentence lengths, thus embedding watermarking bits in the Least Significant Bits (LSB) of the sentences’ cardinalities. The embedding and extracting algorithms are public, while the secrecy and security of the watermark depends on a secret key K. The probability of False Positives is extremely small, hence avoiding incidental occurrences of our watermark in random text documents. Majority voting provides security against text addition, deletion, and swapping attacks, further reducing the probability of False Positives. The scheme is secure against the general attacks on text watermarks such as reproduction (photocopying, FAX), reformatting, synonym substitution, text addition, text deletion, text swapping, paragraph shuffling and collusion attacks.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This article presents the field applications and validations for the controlled Monte Carlo data generation scheme. This scheme was previously derived to assist the Mahalanobis squared distance–based damage identification method to cope with data-shortage problems which often cause inadequate data multinormality and unreliable identification outcome. To do so, real-vibration datasets from two actual civil engineering structures with such data (and identification) problems are selected as the test objects which are then shown to be in need of enhancement to consolidate their conditions. By utilizing the robust probability measures of the data condition indices in controlled Monte Carlo data generation and statistical sensitivity analysis of the Mahalanobis squared distance computational system, well-conditioned synthetic data generated by an optimal controlled Monte Carlo data generation configurations can be unbiasedly evaluated against those generated by other set-ups and against the original data. The analysis results reconfirm that controlled Monte Carlo data generation is able to overcome the shortage of observations, improve the data multinormality and enhance the reliability of the Mahalanobis squared distance–based damage identification method particularly with respect to false-positive errors. The results also highlight the dynamic structure of controlled Monte Carlo data generation that makes this scheme well adaptive to any type of input data with any (original) distributional condition.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Texture information in the iris image is not uniform in discriminatory information content for biometric identity verification. The bits in an iris code obtained from the image differ in their consistency from one sample to another for the same identity. In this work, errors in bit strings are systematically analysed in order to investigate the effect of light-induced and drug-induced pupil dilation and constriction on the consistency of iris texture information. The statistics of bit errors are computed for client and impostor distributions as functions of radius and angle. Under normal conditions, a V-shaped radial trend of decreasing bit errors towards the central region of the iris is obtained for client matching, and it is observed that the distribution of errors as a function of angle is uniform. When iris images are affected by pupil dilation or constriction the radial distribution of bit errors is altered. A decreasing trend from the pupil outwards is observed for constriction, whereas a more uniform trend is observed for dilation. The main increase in bit errors occurs closer to the pupil in both cases.