886 resultados para Nested Model Structure
Resumo:
Based on provious (Hemelrijk 1998; Puga-González, Hildenbrant & Hemelrijk 2009), we have developed an agent-based model and software, called A-KinGDom, which allows us to simulate the emergence of the social structure in a group of non-human primates. The model includes dominance and affiliative interactions and incorporate s two main innovations (preliminary dominance interactions and a kinship factor), which allow us to define four different attack and affiliative strategies. In accordance with these strategies, we compared the data obtained under four simulation conditions with the results obtained in a provious study (Dolado & Beltran 2012) involving empirical observations of a captive group of mangabeys (Cercocebus torquatus)
Resumo:
This work consists of three essays investigating the ability of structural macroeconomic models to price zero coupon U.S. government bonds. 1. A small scale 3 factor DSGE model implying constant term premium is able to provide reasonable a fit for the term structure only at the expense of the persistence parameters of the structural shocks. The test of the structural model against one that has constant but unrestricted prices of risk parameters shows that the exogenous prices of risk-model is only weakly preferred. We provide an MLE based variance-covariance matrix of the Metropolis Proposal Density that improves convergence speeds in MCMC chains. 2. Affine in observable macro-variables, prices of risk specification is excessively flexible and provides term-structure fit without significantly altering the structural parameters. The exogenous component of the SDF is separating the macro part of the model from the term structure and the good term structure fit has as a driving force an extremely volatile SDF and an implied average short rate that is inexplicable. We conclude that the no arbitrage restrictions do not suffice to temper the SDF, thus there is need for more restrictions. We introduce a penalty-function methodology that proves useful in showing that affine prices of risk specifications are able to reconcile stable macro-dynamics with good term structure fit and a plausible SDF. 3. The level factor is reproduced most importantly by the preference shock to which it is strongly and positively related but technology and monetary shocks, with negative loadings, are also contributing to its replication. The slope factor is only related to the monetary policy shocks and it is poorly explained. We find that there are gains in in- and out-of-sample forecast of consumption and inflation if term structure information is used in a time varying hybrid prices of risk setting. In-sample yield forecast are better in models with non-stationary shocks for the period 1982-1988. After this period, time varying market price of risk models provide better in-sample forecasts. For the period 2005-2008, out of sample forecast of consumption and inflation are better if term structure information is incorporated in the DSGE model but yields are better forecasted by a pure macro DSGE model.
Resumo:
EXECUTIVE SUMMARY : Evaluating Information Security Posture within an organization is becoming a very complex task. Currently, the evaluation and assessment of Information Security are commonly performed using frameworks, methodologies and standards which often consider the various aspects of security independently. Unfortunately this is ineffective because it does not take into consideration the necessity of having a global and systemic multidimensional approach to Information Security evaluation. At the same time the overall security level is globally considered to be only as strong as its weakest link. This thesis proposes a model aiming to holistically assess all dimensions of security in order to minimize the likelihood that a given threat will exploit the weakest link. A formalized structure taking into account all security elements is presented; this is based on a methodological evaluation framework in which Information Security is evaluated from a global perspective. This dissertation is divided into three parts. Part One: Information Security Evaluation issues consists of four chapters. Chapter 1 is an introduction to the purpose of this research purpose and the Model that will be proposed. In this chapter we raise some questions with respect to "traditional evaluation methods" as well as identifying the principal elements to be addressed in this direction. Then we introduce the baseline attributes of our model and set out the expected result of evaluations according to our model. Chapter 2 is focused on the definition of Information Security to be used as a reference point for our evaluation model. The inherent concepts of the contents of a holistic and baseline Information Security Program are defined. Based on this, the most common roots-of-trust in Information Security are identified. Chapter 3 focuses on an analysis of the difference and the relationship between the concepts of Information Risk and Security Management. Comparing these two concepts allows us to identify the most relevant elements to be included within our evaluation model, while clearing situating these two notions within a defined framework is of the utmost importance for the results that will be obtained from the evaluation process. Chapter 4 sets out our evaluation model and the way it addresses issues relating to the evaluation of Information Security. Within this Chapter the underlying concepts of assurance and trust are discussed. Based on these two concepts, the structure of the model is developed in order to provide an assurance related platform as well as three evaluation attributes: "assurance structure", "quality issues", and "requirements achievement". Issues relating to each of these evaluation attributes are analysed with reference to sources such as methodologies, standards and published research papers. Then the operation of the model is discussed. Assurance levels, quality levels and maturity levels are defined in order to perform the evaluation according to the model. Part Two: Implementation of the Information Security Assurance Assessment Model (ISAAM) according to the Information Security Domains consists of four chapters. This is the section where our evaluation model is put into a welldefined context with respect to the four pre-defined Information Security dimensions: the Organizational dimension, Functional dimension, Human dimension, and Legal dimension. Each Information Security dimension is discussed in a separate chapter. For each dimension, the following two-phase evaluation path is followed. The first phase concerns the identification of the elements which will constitute the basis of the evaluation: ? Identification of the key elements within the dimension; ? Identification of the Focus Areas for each dimension, consisting of the security issues identified for each dimension; ? Identification of the Specific Factors for each dimension, consisting of the security measures or control addressing the security issues identified for each dimension. The second phase concerns the evaluation of each Information Security dimension by: ? The implementation of the evaluation model, based on the elements identified for each dimension within the first phase, by identifying the security tasks, processes, procedures, and actions that should have been performed by the organization to reach the desired level of protection; ? The maturity model for each dimension as a basis for reliance on security. For each dimension we propose a generic maturity model that could be used by every organization in order to define its own security requirements. Part three of this dissertation contains the Final Remarks, Supporting Resources and Annexes. With reference to the objectives of our thesis, the Final Remarks briefly analyse whether these objectives were achieved and suggest directions for future related research. Supporting resources comprise the bibliographic resources that were used to elaborate and justify our approach. Annexes include all the relevant topics identified within the literature to illustrate certain aspects of our approach. Our Information Security evaluation model is based on and integrates different Information Security best practices, standards, methodologies and research expertise which can be combined in order to define an reliable categorization of Information Security. After the definition of terms and requirements, an evaluation process should be performed in order to obtain evidence that the Information Security within the organization in question is adequately managed. We have specifically integrated into our model the most useful elements of these sources of information in order to provide a generic model able to be implemented in all kinds of organizations. The value added by our evaluation model is that it is easy to implement and operate and answers concrete needs in terms of reliance upon an efficient and dynamic evaluation tool through a coherent evaluation system. On that basis, our model could be implemented internally within organizations, allowing them to govern better their Information Security. RÉSUMÉ : Contexte général de la thèse L'évaluation de la sécurité en général, et plus particulièrement, celle de la sécurité de l'information, est devenue pour les organisations non seulement une mission cruciale à réaliser, mais aussi de plus en plus complexe. A l'heure actuelle, cette évaluation se base principalement sur des méthodologies, des bonnes pratiques, des normes ou des standards qui appréhendent séparément les différents aspects qui composent la sécurité de l'information. Nous pensons que cette manière d'évaluer la sécurité est inefficiente, car elle ne tient pas compte de l'interaction des différentes dimensions et composantes de la sécurité entre elles, bien qu'il soit admis depuis longtemps que le niveau de sécurité globale d'une organisation est toujours celui du maillon le plus faible de la chaîne sécuritaire. Nous avons identifié le besoin d'une approche globale, intégrée, systémique et multidimensionnelle de l'évaluation de la sécurité de l'information. En effet, et c'est le point de départ de notre thèse, nous démontrons que seule une prise en compte globale de la sécurité permettra de répondre aux exigences de sécurité optimale ainsi qu'aux besoins de protection spécifiques d'une organisation. Ainsi, notre thèse propose un nouveau paradigme d'évaluation de la sécurité afin de satisfaire aux besoins d'efficacité et d'efficience d'une organisation donnée. Nous proposons alors un modèle qui vise à évaluer d'une manière holistique toutes les dimensions de la sécurité, afin de minimiser la probabilité qu'une menace potentielle puisse exploiter des vulnérabilités et engendrer des dommages directs ou indirects. Ce modèle se base sur une structure formalisée qui prend en compte tous les éléments d'un système ou programme de sécurité. Ainsi, nous proposons un cadre méthodologique d'évaluation qui considère la sécurité de l'information à partir d'une perspective globale. Structure de la thèse et thèmes abordés Notre document est structuré en trois parties. La première intitulée : « La problématique de l'évaluation de la sécurité de l'information » est composée de quatre chapitres. Le chapitre 1 introduit l'objet de la recherche ainsi que les concepts de base du modèle d'évaluation proposé. La maniéré traditionnelle de l'évaluation de la sécurité fait l'objet d'une analyse critique pour identifier les éléments principaux et invariants à prendre en compte dans notre approche holistique. Les éléments de base de notre modèle d'évaluation ainsi que son fonctionnement attendu sont ensuite présentés pour pouvoir tracer les résultats attendus de ce modèle. Le chapitre 2 se focalise sur la définition de la notion de Sécurité de l'Information. Il ne s'agit pas d'une redéfinition de la notion de la sécurité, mais d'une mise en perspectives des dimensions, critères, indicateurs à utiliser comme base de référence, afin de déterminer l'objet de l'évaluation qui sera utilisé tout au long de notre travail. Les concepts inhérents de ce qui constitue le caractère holistique de la sécurité ainsi que les éléments constitutifs d'un niveau de référence de sécurité sont définis en conséquence. Ceci permet d'identifier ceux que nous avons dénommés « les racines de confiance ». Le chapitre 3 présente et analyse la différence et les relations qui existent entre les processus de la Gestion des Risques et de la Gestion de la Sécurité, afin d'identifier les éléments constitutifs du cadre de protection à inclure dans notre modèle d'évaluation. Le chapitre 4 est consacré à la présentation de notre modèle d'évaluation Information Security Assurance Assessment Model (ISAAM) et la manière dont il répond aux exigences de l'évaluation telle que nous les avons préalablement présentées. Dans ce chapitre les concepts sous-jacents relatifs aux notions d'assurance et de confiance sont analysés. En se basant sur ces deux concepts, la structure du modèle d'évaluation est développée pour obtenir une plateforme qui offre un certain niveau de garantie en s'appuyant sur trois attributs d'évaluation, à savoir : « la structure de confiance », « la qualité du processus », et « la réalisation des exigences et des objectifs ». Les problématiques liées à chacun de ces attributs d'évaluation sont analysées en se basant sur l'état de l'art de la recherche et de la littérature, sur les différentes méthodes existantes ainsi que sur les normes et les standards les plus courants dans le domaine de la sécurité. Sur cette base, trois différents niveaux d'évaluation sont construits, à savoir : le niveau d'assurance, le niveau de qualité et le niveau de maturité qui constituent la base de l'évaluation de l'état global de la sécurité d'une organisation. La deuxième partie: « L'application du Modèle d'évaluation de l'assurance de la sécurité de l'information par domaine de sécurité » est elle aussi composée de quatre chapitres. Le modèle d'évaluation déjà construit et analysé est, dans cette partie, mis dans un contexte spécifique selon les quatre dimensions prédéfinies de sécurité qui sont: la dimension Organisationnelle, la dimension Fonctionnelle, la dimension Humaine, et la dimension Légale. Chacune de ces dimensions et son évaluation spécifique fait l'objet d'un chapitre distinct. Pour chacune des dimensions, une évaluation en deux phases est construite comme suit. La première phase concerne l'identification des éléments qui constituent la base de l'évaluation: ? Identification des éléments clés de l'évaluation ; ? Identification des « Focus Area » pour chaque dimension qui représentent les problématiques se trouvant dans la dimension ; ? Identification des « Specific Factors » pour chaque Focus Area qui représentent les mesures de sécurité et de contrôle qui contribuent à résoudre ou à diminuer les impacts des risques. La deuxième phase concerne l'évaluation de chaque dimension précédemment présentées. Elle est constituée d'une part, de l'implémentation du modèle général d'évaluation à la dimension concernée en : ? Se basant sur les éléments spécifiés lors de la première phase ; ? Identifiant les taches sécuritaires spécifiques, les processus, les procédures qui auraient dû être effectués pour atteindre le niveau de protection souhaité. D'autre part, l'évaluation de chaque dimension est complétée par la proposition d'un modèle de maturité spécifique à chaque dimension, qui est à considérer comme une base de référence pour le niveau global de sécurité. Pour chaque dimension nous proposons un modèle de maturité générique qui peut être utilisé par chaque organisation, afin de spécifier ses propres exigences en matière de sécurité. Cela constitue une innovation dans le domaine de l'évaluation, que nous justifions pour chaque dimension et dont nous mettons systématiquement en avant la plus value apportée. La troisième partie de notre document est relative à la validation globale de notre proposition et contient en guise de conclusion, une mise en perspective critique de notre travail et des remarques finales. Cette dernière partie est complétée par une bibliographie et des annexes. Notre modèle d'évaluation de la sécurité intègre et se base sur de nombreuses sources d'expertise, telles que les bonnes pratiques, les normes, les standards, les méthodes et l'expertise de la recherche scientifique du domaine. Notre proposition constructive répond à un véritable problème non encore résolu, auquel doivent faire face toutes les organisations, indépendamment de la taille et du profil. Cela permettrait à ces dernières de spécifier leurs exigences particulières en matière du niveau de sécurité à satisfaire, d'instancier un processus d'évaluation spécifique à leurs besoins afin qu'elles puissent s'assurer que leur sécurité de l'information soit gérée d'une manière appropriée, offrant ainsi un certain niveau de confiance dans le degré de protection fourni. Nous avons intégré dans notre modèle le meilleur du savoir faire, de l'expérience et de l'expertise disponible actuellement au niveau international, dans le but de fournir un modèle d'évaluation simple, générique et applicable à un grand nombre d'organisations publiques ou privées. La valeur ajoutée de notre modèle d'évaluation réside précisément dans le fait qu'il est suffisamment générique et facile à implémenter tout en apportant des réponses sur les besoins concrets des organisations. Ainsi notre proposition constitue un outil d'évaluation fiable, efficient et dynamique découlant d'une approche d'évaluation cohérente. De ce fait, notre système d'évaluation peut être implémenté à l'interne par l'entreprise elle-même, sans recourir à des ressources supplémentaires et lui donne également ainsi la possibilité de mieux gouverner sa sécurité de l'information.
Resumo:
Single-stranded DNA (ssDNA) plays a major role in several biological processes. It is therefore of fundamental interest to understand how the elastic response and the formation of secondary structures are modulated by the interplay between base pairing and electrostatic interactions. Here we measure force-extension curves (FECs) of ssDNA molecules in optical tweezers set up over two orders of magnitude of monovalent and divalent salt conditions, and obtain its elastic parameters by fitting the FECs to semiflexible models of polymers. For both monovalent and divalent salts, we find that the electrostatic contribution to the persistence length is proportional to the Debye screening length, varying as the inverse of the square root of cation concentration. The intrinsic persistence length is equal to 0.7 nm for both types of salts, and the effectivity of divalent cations in screening electrostatic interactions appears to be 100-fold as compared with monovalent salt, in line with what has been recently reported for single-stranded RNA. Finally, we propose an analysis of the FECs using a model that accounts for the effective thickness of the filament at low salt condition and a simple phenomenological description that quantifies the formation of non-specific secondary structure at low forces.
Resumo:
Résumé Cette étude porte sur le flanc inverse de la nappe de Siviez-Mischabel et sur les unités tectoniques sous jacentes (zone de Stalden supérieur et zone Houillère) dans la vallée menant à Zermatt. L'étude structurale du granite permien de Randa (orthogneiss oeillé) permet de mieux comprendre les effets de la déformation alpine sur les roches de socle. La cartographie détaillée de l'orthogneiss et de son encaissant, ainsi que l'étude lithostratigraphique des terrains sédimentaires associés permettent de proposer un schéma structural et cinématique du flanc inverse de la nappe de Siviez-Mischabel et de mieux comprendre ses relations avec les unités tectoniques sous-jacentes. L'analyse structurale de l'orthogneiss de Randa et de son encaissant révèle la superposition de plusieurs phases de déformation ductile. Cet orthogneiss formé sous des conditions métamorphiques du faciès schiste vert possède une forte schistosité alpine avec au moins deux linéations d'extension. La première, L1, orientée NW-SE est associée à la mise en place de la nappe. La seconde, L2, orientée SW-NE, se corrèle au cisaillement ductile du Simplon. La quantification de la déformation au moyen de la méthode de Fry sur les faciès porphyriques donne des ellipses à rapports axiaux compris entre 1.9 et 5.3, en accord avec les valeurs obtenues par d'autres marqueurs {tourmalines étirées, fibres). Les valeurs mesurées parallèlement à L1 ou L2 sont très semblables. La méthode de Fry a nécessité une étude théorique préalable afin de vérifier son applicabilité aux orthogneiss oeillés. La méthode requiert une distribution spatiale homogène et isotrope des marqueurs utilisés. Les tests statistiques effectués ont révélé que les phénocristaux de feldspath alcalin satisfont à cette condition et qu'ils peuvent être utilisés comme marqueur de la déformation au moyen de la méthode de Fry. Les valeurs obtenues révèlent l'importance du cisaillement ductile du Simplon sur la géométrie de la nappe dans la région d'étude. Le levé cartographique a permis d'améliorer la lithostratigraphie de la base de la nappe de Siviez-Mischabel. Trois formations en position renversée peuvent être observées sous les gneiss formant le coeur de la nappe. Ces trois formations forment le coeur du synclinal de St-Niklaus qui connecte la nappe de Siviez-Mischabel à la zone de Stalden supérieur. La datation par U-Pb de zircons détritiques et magmatiques par LA-ICP-MS permet de contraindre l'âge des formations observées (probablement Carbonifère à Trias précoce). Ces données ont des répercussions importantes sur la structure de la nappe dans la région, prouvant l'existence de plusieurs plis avec des séries normales et renversées bien préservées. La définition et la datation de ces formations, ainsi que leur identification dans la-Zone- Houillère avoisinante permettent de mieux comprendre la géométrie initiale et les relations tectoniques des nappes du Pennique moyen dans la vallée de Zermatt. Summary This study investigates the overturned limb of the Siviez-Mischabel nappe and underlying tectonic units (Upper Stalden zone and Houillère zone) in the Mattertal area. Detailed structural analysis in the Permian Randa granite (augen orthogneiss) allows a better understanding of the Alpine deformation effects on basement rocks. Detailed mapping of this orthogneiss and surrounding rocks, and the study of the lithostratigraphy in the related sedimentary horizons allow the proposition of a structural and kinematic model for the overturned limb of the Siviez-Mischabel and to better understand the relations with the underlying tectonic units. The structural analysis of the Randa orthogneiss and surrounding rocks revealed the superposition of several phases of ductile deformation. This orthogneiss formed under greenschist facies metamorphic conditions displays a strong Alpine foliation with at least two stretching lineations. The first lineation, L1, is oriented NW-SE and is related to the nappe emplacement northward. The second one, L2, is related to the Simplon ductile shear zone. Strain estimation using the Fry method has been performed on porphyritic facies of the Randa orthogneiss. The obtained ellipses have axial ratios varying between 1.9 and 5.3, in agreement with strain estimation obtained from other markers (stretched turmalines, fringes). The strain values are very similar if measured parallel to L1 or to L2. A theoretical approach was necessary to verify the relevant application of the Fry method to augen orthogneiss. This method requires that the distribution of the used markers has to be homogeneous and isotropic. Statistical tests have been done and revealed that K-feldspar phenocrysts satisfy these conditions and can be used as strain markers with the Fry method. The obtained strain measurements revealed the importance of the Simplon ductile shear zone on the geometry of the nappe in the studied area. Mapping has improved the lithostratigraphy at the base of the Siviez-Mischabel nappe. Three overturned formations can be observed below the gneisses forming the core of the nappe. These three formations form the St-Niklaus syncline, which connects the Siviez-Mischabel nappe to the underlying Upper Stalden zone. U-Pb dating of detrital and magmatic zircons by LA-ICPMS allowed the age of the observed formations to be constrained (presumably Carboniferous to Early Triassic). This data has critical implications for nappe structure in the region, composed of few recumbent folds with well preserved normal and overturned limbs. The definition and dating of these formations, as well as their identification in the adjacent "Houillère Zone" improve the understanding of the geometry and tectonic relations of the Middle Penninic nappes in the Mattertal.
Resumo:
This report details the port interconnection of two subsystems: a power electronics subsystem (a back-to-back AC/AC converter (B2B), coupled to a phase of the power grid), and an electromechanical subsystem (a doubly-fed induction machine (DFIM), coupled mechanically to a flywheel and electrically to the power grid and to a local varying load). Both subsystems have been essentially described in previous reports (deliverables D 0.5 and D 4.3.1), although some previously unpublished details are presented here. The B2B is a variable structure system (VSS), due to the presence of control-actuated switches: however from a modelling and simulation, as well as a control-design, point of view, it is sensible to consider modulated transformers (MTF in the bond-graph language) instead of the pairs of complementary switches. The port-Hamiltonian models of both subsystems are presents and coupled through a power-preserving interconnection, and the Hamiltonian description of the whole system is obtained; detailed bond-graphs of all the subsystems and the complete system are provided.
Resumo:
Context. The understanding of Galaxy evolution can be facilitated by the use of population synthesis models, which allow to test hypotheses on the star formation history, star evolution, as well as chemical and dynamical evolution of the Galaxy. Aims. The new version of the Besanc¸on Galaxy Model (hereafter BGM) aims to provide a more flexible and powerful tool to investigate the Initial Mass Function (IMF) and Star Formation Rate (SFR) of the Galactic disc. Methods. We present a new strategy for the generation of thin disc stars which assumes the IMF, SFR and evolutionary tracks as free parameters. We have updated most of the ingredients for the star count production and, for the first time, binary stars are generated in a consistent way. We keep in this new scheme the local dynamical self-consistency as in Bienayme et al (1987). We then compare simulations from the new model with Tycho-2 data and the local luminosity function, as a first test to verify and constrain the new ingredients. The effects of changing thirteen different ingredients of the model are systematically studied. Results. For the first time, a full sky comparison is performed between BGM and data. This strategy allows to constrain the IMF slope at high masses which is found to be close to 3.0, excluding a shallower slope such as Salpeter"s one. The SFR is found decreasing whatever IMF is assumed. The model is compatible with a local dark matter density of 0.011 M pc−3 implying that there is no compelling evidence for significant amount of dark matter in the disc. While the model is fitted to Tycho2 data, a magnitude limited sample with V<11, we check that it is still consistent with fainter stars. Conclusions. The new model constitutes a new basis for further comparisons with large scale surveys and is being prepared to become a powerful tool for the analysis of the Gaia mission data.
Resumo:
Beta-hemolytic Streptococcus agalactiae is the leading cause of bacteremia and invasive infections. These diseases are treated with β-lactams or macrolides, but the emergence of less susceptible and even fully resistant strains is a cause for concern. New bacteriophage lysins could be promising alternatives against such organisms. They hydrolyze the bacterial peptidoglycan at the end of the phage cycle, in order to release the phage progeny. By using a bioinformatic approach to screen several beta-hemolytic streptococci, a gene coding for a lysin was identified on a prophage carried by Streptococcus dysgalactiae subsp. equisimilis SK1249. The gene product, named PlySK1249, harbored an original three-domain structure with a central cell wall-binding domain surrounded by an N-terminal amidase and a C-terminal CHAP domain. Purified PlySK1249 was highly lytic and bactericidal for S. dysgalactiae (2-log10 CFU/ml decrease within 15 min). Moreover, it also efficiently killed S. agalactiae (1.5-log10 CFU/ml decrease within 15 min) but not several streptococcal commensal species. We further investigated the activity of PlySK1249 in a mouse model of S. agalactiae bacteremia. Eighty percent of the animals (n = 10) challenged intraperitoneally with 10(6) CFU of S. agalactiae died within 72 h, whereas repeated injections of PlySK1249 (45 mg/kg 3 times within 24 h) significantly protected the mice (P < 0.01). Thus, PlySK1249, which was isolated from S. dysgalactiae, demonstrated high cross-lytic activity against S. agalactiae both in vitro and in vivo. These encouraging results indicated that PlySK1249 might represent a good candidate to be developed as a new enzybiotic for the treatment of systemic S. agalactiae infections.
Resumo:
The saphenous vein is the conduit of choice in bypass graft procedures. Haemodynamic factors play a major role in the development of intimal hyperplasia (IH), and subsequent bypass failure. To evaluate the potential protective effect of external reinforcement on such a failure, we developed an ex vivo model for the perfusion of segments of human saphenous veins under arterial shear stress. In veins submitted to pulsatile high pressure (mean pressure at 100 mmHg) for 3 or 7 days, the use of an external macroporous polyester mesh 1) prevented the dilatation of the vessel, 2) decreased the development of IH, 3) reduced the apoptosis of smooth muscle cells, and the subsequent fibrosis of the media layer, 4) prevented the remodelling of extracellular matrix through the up-regulation of matrix metalloproteinases (MMP-2, MMP-9) and plasminogen activator type I. The data show that, in an experimental ex vivo setting, an external scaffold decreases IH and maintains the integrity of veins exposed to arterial pressure, via increase in shear stress and decrease wall tension, that likely contribute to trigger selective molecular and cellular changes.
Resumo:
1. Species distribution models are increasingly used to address conservation questions, so their predictive capacity requires careful evaluation. Previous studies have shown how individual factors used in model construction can affect prediction. Although some factors probably have negligible effects compared to others, their relative effects are largely unknown. 2. We introduce a general "virtual ecologist" framework to study the relative importance of factors involved in the construction of species distribution models. 3. We illustrate the framework by examining the relative importance of five key factors-a missing covariate, spatial autocorrelation due to a dispersal process in presences/absences, sample size, sampling design and modeling technique-in a real study framework based on plants in a mountain landscape at regional scale, and show that, for the parameter values considered here, most of the variation in prediction accuracy is due to sample size and modeling technique. Contrary to repeatedly reported concerns, spatial autocorrelation has only comparatively small effects. 4. This study shows the importance of using a nested statistical framework to evaluate the relative effects of factors that may affect species distribution models.
Resumo:
Duchenne muscular dystrophy (DMD) is a severe disorder characterized by progressive muscle wasting,respiratory and cardiac impairments, and premature death. No treatment exists so far, and the identification of active substances to fight DMD is urgently needed. We found that tamoxifen, a drug used to treat estrogen-dependent breast cancer, caused remarkable improvements of muscle force and of diaphragm and cardiac structure in the mdx(5Cv) mouse model of DMD. Oral tamoxifen treatment from 3 weeks of age for 15 months at a dose of 10 mg/kg/day stabilized myofiber membranes, normalized whole body force, and increased force production and resistance to repeated contractions of the triceps muscle above normal values. Tamoxifen improved the structure of leg muscles and diminished cardiac fibrosis by~ 50%. Tamoxifen also reduced fibrosis in the diaphragm, while increasing its thickness,myofiber count, and myofiber diameter, thereby augmenting by 72% the amount of contractile tissue available for respiratory function. Tamoxifen conferred a markedly slower phenotype to the muscles.Tamoxifen and its metabolites were present in nanomolar concentrations in plasma and muscles,suggesting signaling through high-affinity targets. Interestingly, the estrogen receptors ERa and ERb were several times more abundant in dystrophic than in normal muscles, and tamoxifen normalized the relative abundance of ERb isoforms. Our findings suggest that tamoxifen might be a useful therapy for DMD.
Resumo:
Parasite population structure is often thought to be largely shaped by that of its host. In the case of a parasite with a complex life cycle, two host species, each with their own patterns of demography and migration, spread the parasite. However, the population structure of the parasite is predicted to resemble only that of the most vagile host species. In this study, we tested this prediction in the context of a vector-transmitted parasite. We sampled the haemosporidian parasite Polychromophilus melanipherus across its European range, together with its bat fly vector Nycteribia schmidlii and its host, the bent-winged bat Miniopterus schreibersii. Based on microsatellite analyses, the wingless vector, and not the bat host, was identified as the least structured population and should therefore be considered the most vagile host. Genetic distance matrices were compared for all three species based on a mitochondrial DNA fragment. Both host and vector populations followed an isolation-by-distance pattern across the Mediterranean, but not the parasite. Mantel tests found no correlation between the parasite and either the host or vector populations. We therefore found no support for our hypothesis; the parasite population structure matched neither vector nor host. Instead, we propose a model where the parasite's gene flow is represented by the added effects of host and vector dispersal patterns.
Resumo:
The goal of this dissertation is to find and provide the basis for a managerial tool that allows a firm to easily express its business logic. The methodological basis for this work is design science, where the researcher builds an artifact to solve a specific problem. In this case the aim is to provide an ontology that makes it possible to explicit a firm's business model. In other words, the proposed artifact helps a firm to formally describe its value proposition, its customers, the relationship with them, the necessary intra- and inter-firm infrastructure and its profit model. Such an ontology is relevant because until now there is no model that expresses a company's global business logic from a pure business point of view. Previous models essentially take an organizational or process perspective or cover only parts of a firm's business logic. The four main pillars of the ontology, which are inspired by management science and enterprise- and processmodeling, are product, customer interface, infrastructure and finance. The ontology is validated by case studies, a panel of experts and managers. The dissertation also provides a software prototype to capture a company's business model in an information system. The last part of the thesis consists of a demonstration of the value of the ontology in business strategy and Information Systems (IS) alignment. Structure of this thesis: The dissertation is structured in nine parts: Chapter 1 presents the motivations of this research, the research methodology with which the goals shall be achieved and why this dissertation present a contribution to research. Chapter 2 investigates the origins, the term and the concept of business models. It defines what is meant by business models in this dissertation and how they are situated in the context of the firm. In addition this chapter outlines the possible uses of the business model concept. Chapter 3 gives an overview of the research done in the field of business models and enterprise ontologies. Chapter 4 introduces the major contribution of this dissertation: the business model ontology. In this part of the thesis the elements, attributes and relationships of the ontology are explained and described in detail. Chapter 5 presents a case study of the Montreux Jazz Festival which's business model was captured by applying the structure and concepts of the ontology. In fact, it gives an impression of how a business model description based on the ontology looks like. Chapter 6 shows an instantiation of the ontology into a prototype tool: the Business Model Modelling Language BM2L. This is an XML-based description language that allows to capture and describe the business model of a firm and has a large potential for further applications. Chapter 7 is about the evaluation of the business model ontology. The evaluation builds on literature review, a set of interviews with practitioners and case studies. Chapter 8 gives an outlook on possible future research and applications of the business model ontology. The main areas of interest are alignment of business and information technology IT/information systems IS and business model comparison. Finally, chapter 9 presents some conclusions.
Resumo:
In order that the radius and thus ununiform structure of the teeth and otherelectrical and magnetic parts of the machine may be taken into consideration the calculation of an axial flux permanent magnet machine is, conventionally, doneby means of 3D FEM-methods. This calculation procedure, however, requires a lotof time and computer recourses. This study proves that also analytical methods can be applied to perform the calculation successfully. The procedure of the analytical calculation can be summarized into following steps: first the magnet is divided into slices, which makes the calculation for each section individually, and then the parts are submitted to calculation of the final results. It is obvious that using this method can save a lot of designing and calculating time. Thecalculation program is designed to model the magnetic and electrical circuits of surface mounted axial flux permanent magnet synchronous machines in such a way, that it takes into account possible magnetic saturation of the iron parts. Theresult of the calculation is the torque of the motor including the vibrations. The motor geometry and the materials and either the torque or pole angle are defined and the motor can be fed with an arbitrary shape and amplitude of three-phase currents. There are no limits for the size and number of the pole pairs nor for many other factors. The calculation steps and the number of different sections of the magnet are selectable, but the calculation time is strongly depending on this. The results are compared to the measurements of real prototypes. The permanent magnet creates part of the flux in the magnetic circuit. The form and amplitude of the flux density in the air-gap depends on the geometry and material of the magnetic circuit, on the length of the air-gap and remanence flux density of the magnet. Slotting is taken into account by using the Carter factor in the slot opening area. The calculation is simple and fast if the shape of the magnetis a square and has no skew in relation to the stator slots. With a more complicated magnet shape the calculation has to be done in several sections. It is clear that according to the increasing number of sections also the result will become more accurate. In a radial flux motor all sections of the magnets create force with a same radius. In the case of an axial flux motor, each radial section creates force with a different radius and the torque is the sum of these. The magnetic circuit of the motor, consisting of the stator iron, rotor iron, air-gap, magnet and the slot, is modelled with a reluctance net, which considers the saturation of the iron. This means, that several iterations, in which the permeability is updated, has to be done in order to get final results. The motor torque is calculated using the instantaneous linkage flux and stator currents. Flux linkage is called the part of the flux that is created by the permanent magnets and the stator currents passing through the coils in stator teeth. The angle between this flux and the phase currents define the torque created by the magnetic circuit. Due to the winding structure of the stator and in order to limit the leakage flux the slot openings of the stator are normally not made of ferromagnetic material even though, in some cases, semimagnetic slot wedges are used. In the slot opening faces the flux enters the iron almost normally (tangentially with respect to the rotor flux) creating tangential forces in the rotor. This phenomenon iscalled cogging. The flux in the slot opening area on the different sides of theopening and in the different slot openings is not equal and so these forces do not compensate each other. In the calculation it is assumed that the flux entering the left side of the opening is the component left from the geometrical centre of the slot. This torque component together with the torque component calculated using the Lorenz force make the total torque of the motor. It is easy to assume that when all the magnet edges, where the derivative component of the magnet flux density is at its highest, enter the slot openings at the same time, this will have as a result a considerable cogging torque. To reduce the cogging torquethe magnet edges can be shaped so that they are not parallel to the stator slots, which is the common way to solve the problem. In doing so, the edge may be spread along the whole slot pitch and thus also the high derivative component willbe spread to occur equally along the rotation. Besides forming the magnets theymay also be placed somewhat asymmetric on the rotor surface. The asymmetric distribution can be made in many different ways. All the magnets may have a different deflection of the symmetrical centre point or they can be for example shiftedin pairs. There are some factors that limit the deflection. The first is that the magnets cannot overlap. The magnet shape and the relative width compared to the pole define the deflection in this case. The other factor is that a shifting of the poles limits the maximum torque of the motor. If the edges of adjacent magnets are very close to each other the leakage flux from one pole to the other increases reducing thus the air-gap magnetization. The asymmetric model needs some assumptions and simplifications in order to limit the size of the model and calculation time. The reluctance net is made for symmetric distribution. If the magnets are distributed asymmetrically the flux in the different pole pairs will not be exactly the same. Therefore, the assumption that the flux flows from the edges of the model to the next pole pairs, in the calculation model from one edgeto the other, is not correct. If it were wished for that this fact should be considered in multi-pole pair machines, this would mean that all the poles, in other words the whole machine, should be modelled in reluctance net. The error resulting from this wrong assumption is, nevertheless, irrelevant.
Resumo:
Flow structures above vegetation canopies have received much attention within terrestrial and aquatic literature. This research has led to a good process understanding of mean and turbulent canopy flow structure. However, much of this research has focused on rigid or semi-rigid vegetation with relatively simple morphology. Aquatic macrophytes differ from this form, exhibiting more complex morphologies, predominantly horizontal posture in the flow and a different force balance. While some recent studies have investigated such canopies, there is still the need to examine the relevance and applicability of general canopy layer theory to these types of vegetation. Here, we report on a range of numerical experiments, using both semi-rigid and highly flexible canopies. The results for the semi-rigid canopies support existing canopy layer theory. However, for the highly flexible vegetation, the flow pattern is much more complex and suggests that a new canopy model may be required.