965 resultados para VARIABLE SELECTION
Resumo:
Jordens ekologiska system undergår för tillfället stora förändringar pga. människans aktiviteter. Ett växande antal studier visar att dessa förändringar påverkar naturliga och sexuella urvalet och därmed evolutiva processer. Målet med detta arbete var att undersöka effekterna av omgivningsförändringar på sexuella urvalet genom att använda den ökade övergödningen inom storpiggen Gasterosteus aculeatus lekområden som modell system. Sexuella urvalet är en viktig evolutiv kraft med följder på populations- och artnivå (Kapitel 1). Avhandlingens olika delar fokuserar på övergödningens effekter på upptäckandet av partners, användningen av visuella- och doftsignaler i partnersval, och fördelningen av parningsframgången mellan bobyggande hanar. I Kapitel II och III simuleras hur grumlighet orsakad av fytoplankton påverkar hastigheten med vilken potentiella partners påträffas, genom effekter på synligheten. Resultaten visar att normala algblomningar i Östersjön har en måttlig effekt på finnandet av potentiella partners. Detta tyder på att algblomningarna troligen inte kommer att minska på selektiva parningen pga. ökade sökkostnader. I Kapitel IV visas att storspiggen ändrar relativa användningen av olika signaler när vattnets grumlighet ökar; visuella signaler minskar i betydelse medan doftsignaler ökar i betydelse. Samtidigt underlättas användandet av doftsignaler av ändringar i vattnets kemiska sammansättning då fotosyntesen intensifieras (Kapitel V). Lek i övergödda vatten kan ändå vara kostsamt både på individ- och populationsnivån, då parasiterade hanar, som troligen är dåligt genetiskt anpassade till sin miljö, lyckas få mer ägg i sina bon än friskare hanar som troligen är av högre genetisk kvalitet (Kapitel VI). Övergödningen påverkar således partnersval och konkurrensen om partners genom att påverka upptäckandet av potentiella partners, evalueringen av partners och fördelningen av partners inom lekområdena. De följder detta kan ha för evolutionen av sexuellt selekterad egenskaper och för populationers dynamik och livskraft är dock oklara. Avhandlingen visar på svårigheten att förutse följderna av omgivningsförändringar för sexuella urvalet och effekterna på individ och populationsnivå.
Resumo:
Scratch assays are difficult to reproduce. Here we identify a previously overlooked source of variability which could partially explain this difficulty. We analyse a suite of scratch assays in which we vary the initial degree of confluence (initial cell density). Our results indicate that the rate of re-colonisation is very sensitive to the initial density. To quantify the relative roles of cell migration and proliferation, we calibrate the solution of the Fisher–Kolmogorov model to cell density profiles to provide estimates of the cell diffusivity, D, and the cell proliferation rate, λ. This procedure indicates that the estimates of D and λ are very sensitive to the initial density. This dependence suggests that the Fisher–Kolmogorov model does not accurately represent the details of the collective cell spreading process, since this model assumes that D and λ are constants that ought to be independent of the initial density. Since higher initial cell density leads to enhanced spreading, we also calibrate the solution of the Porous–Fisher model to the data as this model assumes that the cell flux is an increasing function of the cell density. Estimates of D and λ associated with the Porous–Fisher model are less sensitive to the initial density, suggesting that the Porous–Fisher model provides a better description of the experiments.
Resumo:
Multimetric ecological condition assessment has become an important biodiversity management tool. This study was the first to examine the reliability of these ecological surrogates across variable environments, and the implications for surrogate efficacy. It was demonstrated that through strategic application and design of the multimetric ecological condition index, the effects of environmental gradients and disturbance regimes can be mitigated, and that ecological condition assessment may serve as a scientifically rigorous approach for conservation planning.
Resumo:
Crystal structure determination at room temperature [292 (2) K] of racemic 1,1'-binaphthalene-2,2'-diyl diethyl bis(carbonate), C26H22O6, showed that one of the terminal carbon-carbon bond lengths is very short [Csp(3)-Csp(3) = 1.327 (6) angstrom]. The reason for such a short bond length has been analysed by collecting data sets on the same crystal at 393, 150 and 90 K. The values of the corrected bond lengths clearly suggest that the shortening is mainly due to positional disorder at two sites, with minor perturbations arising as a result of thermal vibrations. The positional disorder has been resolved in the analysis of the 90 K data following the changes in the unit-cell parameters for the data sets at 150 and 90 K, which appear to be an artifact of a near centre of symmetry relationship between the two independent molecules in the space group P (1) over bar at these temperatures. Indeed, the unit cell at low temperature (150 and 90 K) is a supercell of the room-temperature unit cell.
Resumo:
Security in a mobile communication environment is always a matter for concern, even after deploying many security techniques at device, network, and application levels. The end-to-end security for mobile applications can be made robust by developing dynamic schemes at application level which makes use of the existing security techniques varying in terms of space, time, and attacks complexities. In this paper we present a security techniques selection scheme for mobile transactions, called the Transactions-Based Security Scheme (TBSS). The TBSS uses intelligence to study, and analyzes the security implications of transactions under execution based on certain criterion such as user behaviors, transaction sensitivity levels, and credibility factors computed over the previous transactions by the users, network vulnerability, and device characteristics. The TBSS identifies a suitable level of security techniques from the repository, which consists of symmetric, and asymmetric types of security algorithms arranged in three complexity levels, covering various encryption/decryption techniques, digital signature schemes, andhashing techniques. From this identified level, one of the techniques is deployed randomly. The results shows that, there is a considerable reduction in security cost compared to static schemes, which employ pre-fixed security techniques to secure the transactions data.
Resumo:
In this paper we consider the task of prototype selection whose primary goal is to reduce the storage and computational requirements of the Nearest Neighbor classifier while achieving better classification accuracies. We propose a solution to the prototype selection problem using techniques from cooperative game theory and show its efficacy experimentally.
Resumo:
We deal with a single conservation law with discontinuous convex-concave type fluxes which arise while considering sign changing flux coefficients. The main difficulty is that a weak solution may not exist as the Rankine-Hugoniot condition at the interface may not be satisfied for certain choice of the initial data. We develop the concept of generalized entropy solutions for such equations by replacing the Rankine-Hugoniot condition by a generalized Rankine-Hugoniot condition. The uniqueness of solutions is shown by proving that the generalized entropy solutions form a contractive semi-group in L-1. Existence follows by showing that a Godunov type finite difference scheme converges to the generalized entropy solution. The scheme is based on solutions of the associated Riemann problem and is neither consistent nor conservative. The analysis developed here enables to treat the cases of fluxes having at most one extrema in the domain of definition completely. Numerical results reporting the performance of the scheme are presented. (C) 2006 Elsevier B.V. All rights reserved.
Resumo:
We propose a simple and energy efficient distributed change detection scheme for sensor networks based on Page's parametric CUSUM algorithm. The sensor observations are IID over time and across the sensors conditioned on the change variable. Each sensor runs CUSUM and transmits only when the CUSUM is above some threshold. The transmissions from the sensors are fused at the physical layer. The channel is modeled as a multiple access channel (MAC) corrupted with IID noise. The fusion center which is the global decision maker, performs another CUSUM to detect the change. We provide the analysis and simulation results for our scheme and compare the performance with an existing scheme which ensures energy efficiency via optimal power selection.
Resumo:
Objective: To determine the extent to which different strength training exercises selectively activate the commonly injured biceps femoris long head (BFLH) muscle. Methods: This two-part observational study recruited 24 recreationally active males. Part 1 explored the amplitudes and the ratios of lateral to medial hamstring (BF/MH) normalised electromyography (nEMG) during the concentric and eccentric phases of 10 common strength training exercises. Part 2 used functional magnetic resonance imaging (fMRI) to determine the spatial patterns of hamstring activation during two exercises which i) most selectively, and ii) least selectively activated the BF in part 1. Results: Eccentrically, the largest BF/MH nEMG ratio was observed in the 45° hip extension exercise and the lowest was observed in the Nordic hamstring (NHE) and bent-knee bridge exercises. Concentrically, the highest BF/MH nEMG ratio was observed during the lunge and 45° hip extension and the lowest was observed for the leg curl and bent-knee bridge. fMRI revealed a greater BFLH to semitendinosus activation ratio in the 45° hip extension than the NHE (p<0.001). The T2 increase after hip extension for BFLH, semitendinosus and semimembranosus muscles were greater than that for BFSH (p<0.001). During the NHE, the T2 increase was greater for the semitendinosus than for the other hamstrings (p≤0.002). Conclusion: This investigation highlights the non-uniformity of hamstring activation patterns in different tasks and suggests that hip extension exercise more selectively activates the BFLH while the NHE preferentially recruits the semitendinosus. These findings have implications for strength training interventions aimed at preventing hamstring injury.
Resumo:
In this work, we explore simultaneous geometry design and material selection for statically determinate trusses by posing it as a continuous optimization problem. The underlying principles of our approach are structural optimization and Ashby’s procedure for material selection from a database. For simplicity and ease of initial implementation, only static loads are considered in this work with the intent of maximum stiffness, minimum weight/cost, and safety against failure. Safety of tensile and compression members in the truss is treated differently to prevent yield and buckling failures, respectively. Geometry variables such as lengths and orientations of members are taken to be the design variables in an assumed layout. Areas of cross-section of the members are determined to satisfy the failure constraints in each member. Along the lines of Ashby’s material indices, a new design index is derived for trusses. The design index helps in choosing the most suitable material for any geometry of the truss. Using the design index, both the design space and the material database are searched simultaneously using gradient-based optimization algorithms. The important feature of our approach is that the formulated optimization problem is continuous, although the material selection from a database is an inherently discrete problem. A few illustrative examples are included. It is observed that the method is capable of determining the optimal topology in addition to optimal geometry when the assumed layout contains more links than are necessary for optimality.
Resumo:
A second DNA binding protein from stationary-phase cells of Mycobacterium smegmatis (MsDps2) has been identified from the bacterial genome. It was cloned, expressed and characterised and its crystal structure was determined. The core dodecameric structure of MsDps2 is the same as that of the Dps from the organism described earlier (MsDps1). However, MsDps2 possesses a long N-terminal tail instead of the C-terminal tail in MsDps1. This tail appears to be involved in DNA binding. It is also intimately involved in stabilizing the dodecamer. Partly on account of this factor, MsDps2 assembles straightway into the dodecamer, while MsDps1 does so on incubation after going through an intermediate trimeric stage. The ferroxidation centre is similar in the two proteins, while the pores leading to it exhibit some difference. The mode of sequestration of DNA in the crystalline array of molecules, as evidenced by the crystal structures, appears to be different in MsDps1 and MsDps2, highlighting the variability in the mode of Dps–DNA complexation. A sequence search led to the identification of 300 Dps molecules in bacteria with known genome sequences. Fifty bacteria contain two or more types of Dps molecules each, while 195 contain only one type. Some bacteria, notably some pathogenic ones, do not contain Dps. A sequence signature for Dps could also be derived from the analysis.
Resumo:
The quantity of fruit consumed by dispersers is highly variable among individuals within plant populations. The outcome Of Such selection operated by firugivores has been examined mostly with respect to changing spatial contexts. The influence of varying temporal contexts on frugivore choice, and their possible demographic and evolutionary consequences is poorly understood. We examined if temporal variation in fruit availability across a hierarchy of nested temporal levels (interannual, intraseasonal, 120 h, 24 h) altered frugivore choice for a complex seed dispersal system in dry tropical forests of southern India. The interactions between Phyllanthus emblica and its primary disperser (ruminants) was mediated by another frugivore (a primate),which made large quantities of fruit available on the ground to ruminants. The direction and strength of crop size and neighborhood effects on this interaction varied with changing temporal contexts.Fruit availability was higher in the first of the two study years, and at the start of the season in both years. Fruit persistence on trees,determined by primate foraging, was influenced by crop size andconspecific neighborhood densities only in the high fruit availability year. Fruit removal by ruminants was influenced by crop size in both years and neighborhood densities only in the high availability year. In both years, these effects were stronger at the start of the season.Intraseasonal reduction in fruit availability diminished inequalities in fruit removal by ruminants and the influence of crop size and fruiting neighborhoods. All trees were not equally attractive to frugivores in a P. emblica population at all points of time. Temporal asymmetry in frugivore-mediated selection could reduce potential for co-evolution between firugivores and plants by diluting selective pressures. Inter-dependencies; formed between disparate animal consumers can add additional levels of complexity to plant-frugivore mutualistic networks and have potential reproductive consequences for specific individuals within populations.
Resumo:
Relay selection for cooperative communications promises significant performance improvements, and is, therefore, attracting considerable attention. While several criteria have been proposed for selecting one or more relays, distributed mechanisms that perform the selection have received relatively less attention. In this paper, we develop a novel, yet simple, asymptotic analysis of a splitting-based multiple access selection algorithm to find the single best relay. The analysis leads to simpler and alternate expressions for the average number of slots required to find the best user. By introducing a new contention load' parameter, the analysis shows that the parameter settings used in the existing literature can be improved upon. New and simple bounds are also derived. Furthermore, we propose a new algorithm that addresses the general problem of selecting the best Q >= 1 relays, and analyze and optimize it. Even for a large number of relays, the scalable algorithm selects the best two relays within 4.406 slots and the best three within 6.491 slots, on average. We also propose a new and simple scheme for the practically relevant case of discrete metrics. Altogether, our results develop a unifying perspective about the general problem of distributed selection in cooperative systems and several other multi-node systems.
Resumo:
The motivation behind the fusion of Intrusion Detection Systems was the realization that with the increasing traffic and increasing complexity of attacks, none of the present day stand-alone Intrusion Detection Systems can meet the high demand for a very high detection rate and an extremely low false positive rate. Multi-sensor fusion can be used to meet these requirements by a refinement of the combined response of different Intrusion Detection Systems. In this paper, we show the design technique of sensor fusion to best utilize the useful response from multiple sensors by an appropriate adjustment of the fusion threshold. The threshold is generally chosen according to the past experiences or by an expert system. In this paper, we show that the choice of the threshold bounds according to the Chebyshev inequality principle performs better. This approach also helps to solve the problem of scalability and has the advantage of failsafe capability. This paper theoretically models the fusion of Intrusion Detection Systems for the purpose of proving the improvement in performance, supplemented with the empirical evaluation. The combination of complementary sensors is shown to detect more attacks than the individual components. Since the individual sensors chosen detect sufficiently different attacks, their result can be merged for improved performance. The combination is done in different ways like (i) taking all the alarms from each system and avoiding duplications, (ii) taking alarms from each system by fixing threshold bounds, and (iii) rule-based fusion with a priori knowledge of the individual sensor performance. A number of evaluation metrics are used, and the results indicate that there is an overall enhancement in the performance of the combined detector using sensor fusion incorporating the threshold bounds and significantly better performance using simple rule-based fusion.
Resumo:
Over the past two decades, the selection, optimization, and compensation (SOC) model has been applied in the work context to investigate antecedents and outcomes of employees' use of action regulation strategies. We systematically review, meta-analyze, and critically discuss the literature on SOC strategy use at work and outline directions for future research and practice. The systematic review illustrates the breadth of constructs that have been studied in relation to SOC strategy use, and that SOC strategy use can mediate and moderate relationships of person and contextual antecedents with work outcomes. Results of the meta-analysis show that SOC strategy use is positively related to age (rc = .04), job autonomy (rc = .17), self-reported job performance (rc = .23), non-self-reported job performance (rc = .21), job satisfaction (rc = .25), and job engagement (rc = .38), whereas SOC strategy use is not significantly related to job tenure, job demands, and job strain. Overall, our findings underline the importance of the SOC model for the work context, and they also suggest that its measurement and reporting standards need to be improved to become a reliable guide for future research and organizational practice.