956 resultados para False confession
Resumo:
Tilasto Suomen eläkkeensaajista perustuu Eläketurvakeskuksen ja Kansaneläkelaitoksen rekistereihin. Julkaisua on tuotettu vuodesta 1981 lähtien. Vuosina 1981–1990 kirja julkaistiin erikseen suomen- ja ruotsinkielisenä. Ruotsinkielinen osa sisälsi suppean englanninkielisen liitteen. Vuodesta 1991 lähtien julkaisu on ollut kolmikielinen. Julkaisu sisältää tietoja kaikista työ- ja kansaneläkkeensaajista, eläkkeelle siirtyneistä ja eläkemenosta. Tietoja on kaikista eläkkeensaajista sekä erikseen Suomessa ja ulkomailla asuvista eläkkeensaajista, poikkeuksena eläkkeelle siirtyneet, joista ei ainakaan toistaiseksi tehdä erillistä tilastoa ulkomailla asuvista. Tilasto on ilmestynyt osana Suomen virallista tilastoa vuodesta 2003 lähtien. Laatuseloste on julkaisun liitteessä 1. Julkaisun alussa on kuvaus eläkejärjestelmästä ja eläke-etuuksista sekä tilastossa käytetyistä käsitteistä. Liitteessä 2 on suppea yhteenveto keskeisistä eläkelainsäädännön muutoksista.
Resumo:
Pirkko Saisio's trilogy Pienin yhteinen jaettava (The Smallest Shared Dividend, 1998), Vastavalo (Against the Light, 2000), and Punainen erokirja (The Red Book of Separation, 2003), depicts the development of a masculine girl who at the end of the trilogy comes out as a homosexual women, a mother, and a writer. The main character is named Pirkko Saisio, and many of the events are picked from Saisio's real life. Nevertheless, the author wants the trilogy to be read as a novel, not a memoir. The present study analyses the generic elements of Saisio s trilogy and contextualizes the narrative identity that Saisio is creating in her fiction. Following Alastair Fowler s theory of genres as types without strict borders and a tendency to hybridity, the trilogy is linked to several genres. Serge Doubrovsky s genre concept of autofiction is the basis for the analysis: it explains the trilogy s borderline identity between autobiography and novel, and designates the main elements that render Saisio s autobiographical narrative into fiction. Both Doubrovsky and Saisio emphasize the role of the unconscious in writing, and at the same time stress the importance of a skilled composition. As well as autofiction, the trilogy is analyzed as a Bildungsroman, a confession and conversion narrative, a coming-out -narrative and a portrait-of-the-artist novel. Each genre is illuminated by its paradigmatic work: Wilhelm Meister s Apprenticeship by Goethe, The Confessions by St. Augustine, and The Well of Loneliness by Radclyffe Hall. The parallelisms between Saisio s trilogy and the typical plots of the genres and thematics of the classics show how the tradition works in Saisio s text. The thematic parallelisms highlight Saisio s concern for the conflicts that occur between an individual and the surrounding society, while the similarities in plots question the autobiographicality of Saisio s narrative but also clarify how Saisio refines the traditional genres. Read in the light of Saisio s trilogy, the classics are shown to have their gender-transgressive elements that the non-normative reader can identify with. Saisio s text also challenges universalizing claims about genre and gender. As a narrative of identity it follows the example of 1970s essentialistic coming-out stories, but at the same time depicts the notion of identity in a manner that manifests postmodern ideas about identity as multiple and ever-transforming. Keywords: autobiographicality, autofiction, identity narrative, genre research, Bildungsroman, conversion narrative, confession, coming-out story, a portrait-of-an-artist novel
Use of gonadotropin and steroid hormone antibodies in studying specific hormone action in the monkey
Resumo:
Most women acquire genital high risk human papillomavirus (HPV) infection during their lifetime, but seldom the infection persists and leads to cervical cancer. However, currently it is not possible to identify the women who will develop HPV mediated cervical cancer and this often results to large scale follow-up and overtreatment of the likely spontaneously regressing infection. Thus, it is important to obtain more information on the course of HPV and find markers that could help to identify HPV infected women in risk for progression of cervical lesions and ultimately cancer. Nitric oxide is a free radical gas that takes part both in immune responses and carcinogenesis. Nitric oxide is produced also by cervical cells and therefore, it is possible that cervical nitric oxide could affect also HPV infection. In the present study, including 801 women from the University of Helsinki between years of 2006 and 2011, association between HPV and cervical nitric oxide was evaluated. The levels of nitric oxide were measured as its metabolites nitrate and nitirite (NOx) by spectrophotometry and the expression of nitric oxide producing enzymes endothelial and inducible synthases (eNOS, iNOS) by Western blotting. Women infected with HPV had two-times higher cervical fluid NOx levels compared with non-infected ones. The expression levels of both eNOS and iNOS were higher in HPV-infected women compared with non-infected. Another sexually transmitted disease Chlamydia trachomatis that is an independent risk factor for cervical cancer was also accompanied with elevated NOx levels, whereas vaginal infections, bacterial vaginosis and candida, did not have any effect on NOx levels. The meaning of the elevated HPV related cervical nitric oxide was evaluated in a 12 months follow-up study. It was revealed that high baseline cervical fluid NOx levels favored HPV persistence with OR 4.1. However, low sensitivity (33%) and high false negative rate (67%) restrict the clinical use of the current NOx test. This study indicated that nitric oxide favors HPV persistence and thus it seems to be one of the cofactor associated with a risk of carcinogenesis.
Resumo:
Neutral point clamped (NPC), three level converters with insulated gate bipolar transistor devices are very popular in medium voltage, high power applications. DC bus short circuit protection is usually done, using the sensed voltage across collector and emitter (i.e., V-CE sensing), of all the devices in a leg. This feature is accommodated with the conventional gate drive circuits used in the two level converters. The similar gate drive circuit, when adopted for NPC three level converter protection, leads to false V-CE fault signals for inner devices of the leg. The paper explains the detailed circuit behavior and reasons, which result in the occurrence of such false V-CE fault signals. This paper also illustrates that such a phenomenon shows dependence on the power factor of the supplied three-phase load. Finally, experimental results are presented to support the analysis. It is shown that the problem can be avoided by blocking out the V-CE sense fault signals of the inner devices of the leg.
Resumo:
The study attempts a reception-historical analysis of the Maccabean martyrs. The concept of reception has fundamentally to do with the re-use and interpretation of a text within new texts. In a religious tradition, certain elements become re-circulated and thus their reception may reflect the development of that particular tradition. The Maccabean martyrs first appear in 2 Maccabees. In my study, it is the Maccabean martyr figures who count as the received text; the focus is shifted from the interrelations between texts onto how the figures have been exploited in early Christian and Rabbinic sources. I have divided my sources into two categories and my analysis is in two parts. First, I analyze the reception of the Maccabean martyrs within Jewish and Christian historiographical sources, focusing on the role given to them in the depictions of the Maccabean Revolt (Chapter 3). I conclude that, within Jewish historiography, the martyrs are given roles, which vary between ultimate efficacy and marginal position with regard to making a historical difference. In Christian historiographical sources, the martyrs role grows in importance by time: however, it is not before a Christian cult of the Maccabean martyrs has been established, that the Christian historiographies consider them historically effective. After the first part, I move on to analyze the reception in sources, which make use of the Maccabean martyrs as paradigmatic figures (Chapter 4). I have suggested that the martyrs are paradigmatic in the context of martyrdom, persecution and destruction, on one hand, and in a homiletic context, inspiring religious celebration, on the other. I conclude that, as the figures are considered pre-Christian and biblical martyrs, they function well in terms of Christian martyrdom and have contributed to the development of its ideals. Furthermore, the presentation of the martyr figures in Rabbinic sources demonstrates how the notion of Jewish martyrdom arises from experiences of destruction and despair, not so much from heroic confession of faith in the face of persecution. Before the emergence of a Christian cult of the Maccabean martyrs, their identity is derived namely from their biblical position. Later on, in the homiletic context, their Jewish identity is debated and sometimes reconstructed as fundamentally Christian , despite of their Jewish origins. Similar debate about their identity is not found in the Rabbinic versions of their martyrdom and nothing there indicates a mutual debate between early Christians and Jews. A thematic comparison shows that the Rabbinic and Christian cases of reception are non-reliant on each other but also that they link to one another. Especially the scriptural connections, often made to the Maccabean mother, reveal the similarities. The results of the analyses confirm that the early history of Christianity and Rabbinic Judaism share, at least partly, the same religious environment and intertwining traditions, not only during the first century or two but until Late Antiquity and beyond. More likely, the reception of the Maccabean martyrs demonstrates that these religious traditions never ceased to influence one another.
Resumo:
Candida albicans is a commensal opportunistic pathogen, which can cause superficial infections as well as systemic infections in immuocompromised hosts. Among nosocomial fungal infections, infections by C. albicans are associated with highest mortality rates even though incidence of infections by other related species is on the rise world over. Since C. albicans and other Candida species differ in their susceptibility to antifungal drug treatment, it is crucial to accurately identify the species for effective drug treatment. Most diagnostic tests that differentiate between C. albicans and other Candida species are time consuming, as they necessarily involve laboratory culturing. Others, which employ highly sensitive PCR based technologies often, yield false positives which is equally dangerous since that leads to unnecessary antifungal treatment. This is the first report of phage display technology based identification of short peptide sequences that can distinguish C. albicans from other closely related species. The peptides also show high degree of specificity towards its different morphological forms. Using fluorescence microscopy, we show that the peptides bind on the surface of these cells and obtained clones that could even specifically bind to only specific regions of cells indicating restricted distribution of the epitopes. What was peculiar and interesting was that the epitopes were carbohydrate in nature. This gives insight into the complexity of the carbohydrate composition of fungal cell walls. In an ELISA format these peptides allow specific detection of relatively small numbers of C. albicans cells. Hence, if used in combination, such a test could help accurate diagnosis and allow physicians to initiate appropriate drug therapy on time.
Resumo:
This paper considers the problem of spectrum sensing, i.e., the detection of whether or not a primary user is transmitting data by a cognitive radio. The Bayesian framework is adopted, with the performance measure being the probability of detection error. A decentralized setup, where N sensors use M observations each to arrive at individual decisions that are combined at a fusion center to form the overall decision is considered. The unknown fading channel between the primary sensor and the cognitive radios makes the individual decision rule computationally complex, hence, a generalized likelihood ratio test (GLRT)-based approach is adopted. Analysis of the probabilities of false alarm and miss detection of the proposed method reveals that the error exponent with respect to M is zero. Also, the fusion of N individual decisions offers a diversity advantage, similar to diversity reception in communication systems, and a tight bound on the error exponent is presented. Through an analysis in the low power regime, the number of observations needed as a function of received power, to achieve a given probability of error is determined. Monte-Carlo simulations confirm the accuracy of the analysis.
Resumo:
In the knowledge-based clustering approaches reported in the literature, explicit know ledge, typically in the form of a set of concepts, is used in computing similarity or conceptual cohesiveness between objects and in grouping them. We propose a knowledge-based clustering approach in which the domain knowledge is also used in the pattern representation phase of clustering. We argue that such a knowledge-based pattern representation scheme reduces the complexity of similarity computation and grouping phases. We present a knowledge-based clustering algorithm for grouping hooks in a library.
Resumo:
A link failure in the path of a virtual circuit in a packet data network will lead to premature disconnection of the circuit by the end-points. A soft failure will result in degraded throughput over the virtual circuit. If these failures can be detected quickly and reliably, then appropriate rerouteing strategies can automatically reroute the virtual circuits that use the failed facility. In this paper, we develop a methodology for analysing and designing failure detection schemes for digital facilities. Based on errored second data, we develop a Markov model for the error and failure behaviour of a T1 trunk. The performance of a detection scheme is characterized by its false alarm probability and the detection delay. Using the Markov model, we analyse the performance of detection schemes that use physical layer or link layer information. The schemes basically rely upon detecting the occurrence of severely errored seconds (SESs). A failure is declared when a counter, that is driven by the occurrence of SESs, reaches a certain threshold.For hard failures, the design problem reduces to a proper choice;of the threshold at which failure is declared, and on the connection reattempt parameters of the virtual circuit end-point session recovery procedures. For soft failures, the performance of a detection scheme depends, in addition, on how long and how frequent the error bursts are in a given failure mode. We also propose and analyse a novel Level 2 detection scheme that relies only upon anomalies observable at Level 2, i.e. CRC failures and idle-fill flag errors. Our results suggest that Level 2 schemes that perform as well as Level 1 schemes are possible.
Resumo:
The basic characteristic of a chaotic system is its sensitivity to the infinitesimal changes in its initial conditions. A limit to predictability in chaotic system arises mainly due to this sensitivity and also due to the ineffectiveness of the model to reveal the underlying dynamics of the system. In the present study, an attempt is made to quantify these uncertainties involved and thereby improve the predictability by adopting a multivariate nonlinear ensemble prediction. Daily rainfall data of Malaprabha basin, India for the period 1955-2000 is used for the study. It is found to exhibit a low dimensional chaotic nature with the dimension varying from 5 to 7. A multivariate phase space is generated, considering a climate data set of 16 variables. The chaotic nature of each of these variables is confirmed using false nearest neighbor method. The redundancy, if any, of this atmospheric data set is further removed by employing principal component analysis (PCA) method and thereby reducing it to eight principal components (PCs). This multivariate series (rainfall along with eight PCs) is found to exhibit a low dimensional chaotic nature with dimension 10. Nonlinear prediction employing local approximation method is done using univariate series (rainfall alone) and multivariate series for different combinations of embedding dimensions and delay times. The uncertainty in initial conditions is thus addressed by reconstructing the phase space using different combinations of parameters. The ensembles generated from multivariate predictions are found to be better than those from univariate predictions. The uncertainty in predictions is decreased or in other words predictability is increased by adopting multivariate nonlinear ensemble prediction. The restriction on predictability of a chaotic series can thus be altered by quantifying the uncertainty in the initial conditions and also by including other possible variables, which may influence the system. (C) 2011 Elsevier B.V. All rights reserved.
Resumo:
Filtering methods are explored for removing noise from data while preserving sharp edges that many indicate a trend shift in gas turbine measurements. Linear filters are found to be have problems with removing noise while preserving features in the signal. The nonlinear hybrid median filter is found to accurately reproduce the root signal from noisy data. Simulated faulty data and fault-free gas path measurement data are passed through median filters and health residuals for the data set are created. The health residual is a scalar norm of the gas path measurement deltas and is used to partition the faulty engine from the healthy engine using fuzzy sets. The fuzzy detection system is developed and tested with noisy data and with filtered data. It is found from tests with simulated fault-free and faulty data that fuzzy trend shift detection based on filtered data is very accurate with no false alarms and negligible missed alarms.
Resumo:
The cis-regulatory regions on DNA serve as binding sites for proteins such as transcription factors and RNA polymerase. The combinatorial interaction of these proteins plays a crucial role in transcription initiation, which is an important point of control in the regulation of gene expression. We present here an analysis of the performance of an in silico method for predicting cis-regulatory regions in the plant genomes of Arabidopsis (Arabidopsis thaliana) and rice (Oryza sativa) on the basis of free energy of DNA melting. For protein-coding genes, we achieve recall and precision of 96% and 42% for Arabidopsis and 97% and 31% for rice, respectively. For noncoding RNA genes, the program gives recall and precision of 94% and 75% for Arabidopsis and 95% and 90% for rice, respectively. Moreover, 96% of the false-positive predictions were located in noncoding regions of primary transcripts, out of which 20% were found in the first intron alone, indicating possible regulatory roles. The predictions for orthologous genes from the two genomes showed a good correlation with respect to prediction scores and promoter organization. Comparison of our results with an existing program for promoter prediction in plant genomes indicates that our method shows improved prediction capability.
Resumo:
We are concerned with the situation in which a wireless sensor network is deployed in a region, for the purpose of detecting an event occurring at a random time and at a random location. The sensor nodes periodically sample their environment (e.g., for acoustic energy),process the observations (in our case, using a CUSUM-based algorithm) and send a local decision (which is binary in nature) to the fusion centre. The fusion centre collects these local decisions and uses a fusion rule to process the sensors’ local decisions and infer the state of nature, i.e., if an event has occurred or not. Our main contribution is in analyzing two local detection rules in combination with a simple fusion rule. The local detection algorithms are based on the nonparametric CUSUMprocedure from sequential statistics. We also propose two ways to operate the local detectors after an alarm. These alternatives when combined in various ways yield several approaches. Our contribution is to provide analytical techniques to calculate false alarm measures, by the use of which the local detector thresholds can be set. Simulation results are provided to evaluate the accuracy of our analysis. As an illustration we provide a design example. We also use simulations to compare the detection delays incurred in these algorithms.
Resumo:
Software transactional memory (STM) has been proposed as a promising programming paradigm for shared memory multi-threaded programs as an alternative to conventional lock based synchronization primitives. Typical STM implementations employ a conflict detection scheme, which works with uniform access granularity, tracking shared data accesses either at word/cache line or at object level. It is well known that a single fixed access tracking granularity cannot meet the conflicting goals of reducing false conflicts without impacting concurrency adversely. A fine grained granularity while improving concurrency can have an adverse impact on performance due to lock aliasing, lock validation overheads, and additional cache pressure. On the other hand, a coarse grained granularity can impact performance due to reduced concurrency. Thus, in general, a fixed or uniform granularity access tracking (UGAT) scheme is application-unaware and rarely matches the access patterns of individual application or parts of an application, leading to sub-optimal performance for different parts of the application(s). In order to mitigate the disadvantages associated with UGAT scheme, we propose a Variable Granularity Access Tracking (VGAT) scheme in this paper. We propose a compiler based approach wherein the compiler uses inter-procedural whole program static analysis to select the access tracking granularity for different shared data structures of the application based on the application's data access pattern. We describe our prototype VGAT scheme, using TL2 as our STM implementation. Our experimental results reveal that VGAT-STM scheme can improve the application performance of STAMP benchmarks from 1.87% to up to 21.2%.