933 resultados para Scalar Functions of one Variable


Relevância:

100.00% 100.00%

Publicador:

Resumo:

The reverse Monte Carlo (RMC) method generates sets of points in space which yield radial distribution functions (RDFS) that approximate those of the system of interest. Such sets of configurations should, in principle, be sufficient to determine the structural properties of the system. In this work we apply the RMC technique to fluids of hard diatomic molecules. The experimental RDFs of the hard-dimer fluid were generated by the conventional MC method and used as input in the RMC simulations. Our results indicate that the RMC method is only satisfactory in determining the local structure of the fluid studied by means of only mono-variable RDF. Also we suggest that the use of multi-variable RDFs would improve the technique significantly. However, the accuracy of the method turned out to be very sensitive to the variance of the input experimental RDF. © 1995.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This Article reports a combined experimental and theoretical analysis on the one and two-photon absorption properties of a novel class of organic molecules with a pi-conjugated backbone based on phenylacetylene (JCM874, FD43, and FD48) and azoaromatic (YB3p2S) moieties. Linear optical properties show that the phenylacetylene-based compounds exhibit strong molar absorptivity in the UV and high fluorescence quantum yield with lifetimes of approximately 2.0 ns, while the azoaromatic-compound has a strong absorption in the visible region with very low fluorescence quantum yield. The two-photon absorption was investigated employing nonlinear optical techniques and quantum chemical calculations based on the response functions formalism within the density functional theory framework. The experimental data revealed well-defined 2PA spectra with reasonable cross-section values in the visible and IR. Along the nonlinear spectra we observed two 2PA allowed bands, as well as the resonance enhancement effect due to the presence of one intermediate one-photon allowed state. Quantum chemical calculations revealed that the 2PA allowed bands correspond to transitions to states that are also one-photon allowed, indicating the relaxation of the electric-dipole selection rules. Moreover, using the theoretical results, we were able to interpret the experimental trends of the 2PA spectra. Finally, using a few-energy-level diagram, within the sum-over-essential states approach, we observed strong qualitative and quantitative correlation between experimental and theoretical results.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Since the development of quantum mechanics it has been natural to analyze the connection between classical and quantum mechanical descriptions of physical systems. In particular one should expect that in some sense when quantum mechanical effects becomes negligible the system will behave like it is dictated by classical mechanics. One famous relation between classical and quantum theory is due to Ehrenfest. This result was later developed and put on firm mathematical foundations by Hepp. He proved that matrix elements of bounded functions of quantum observables between suitable coherents states (that depend on Planck's constant h) converge to classical values evolving according to the expected classical equations when h goes to zero. His results were later generalized by Ginibre and Velo to bosonic systems with infinite degrees of freedom and scattering theory. In this thesis we study the classical limit of Nelson model, that describes non relativistic particles, whose evolution is dictated by Schrödinger equation, interacting with a scalar relativistic field, whose evolution is dictated by Klein-Gordon equation, by means of a Yukawa-type potential. The classical limit is a mean field and weak coupling limit. We proved that the transition amplitude of a creation or annihilation operator, between suitable coherent states, converges in the classical limit to the solution of the system of differential equations that describes the classical evolution of the theory. The quantum evolution operator converges to the evolution operator of fluctuations around the classical solution. Transition amplitudes of normal ordered products of creation and annihilation operators between coherent states converge to suitable products of the classical solutions. Transition amplitudes of normal ordered products of creation and annihilation operators between fixed particle states converge to an average of products of classical solutions, corresponding to different initial conditions.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Meprins are members of the astacin family of metalloproteases expressed in epithelial tissues, intestinal leukocytes and certain cancer cells. In mammals, there are two homologous subunits, which form complex glycosylated disulfide-bonded homo- and heterooligomers. Both human meprin alpha and meprin beta cleave several basement membrane components, suggesting a role in epithelial differentiation and cell migration. There is also evidence that meprin beta is involved in immune defence owing to its capability of activating interleukin-1beta and the diminished mobility of intestinal leukocytes in meprin beta-knockout mice. Here we show for the first time by reverse transcription PCR, immunoblotting and immunofluorescence analyses that meprins are expressed not only in mammals, but also in the zebrafish Danio rerio. In contrast to the human, mouse and rat enzymes, zebrafish meprins are encoded by three genes, corresponding to two homologous alpha subunits and one beta subunit. Observations at both the mRNA and protein level indicate a broad distribution of meprins in zebrafish. However, there are strikingly different expression patterns of the three subunits, which is consistent with meprin expression in mammals. Hence, D. rerio appears to be a suitable model to gain insight into the basic physiological functions of meprin metalloproteases.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Researchers suggest that personalization on the Semantic Web adds up to a Web 3.0 eventually. In this Web, personalized agents process and thus generate the biggest share of information rather than humans. In the sense of emergent semantics, which supplements traditional formal semantics of the Semantic Web, this is well conceivable. An emergent Semantic Web underlying fuzzy grassroots ontology can be accomplished through inducing knowledge from users' common parlance in mutual Web 2.0 interactions [1]. These ontologies can also be matched against existing Semantic Web ontologies, to create comprehensive top-level ontologies. On the Web, if augmented with information in the form of restrictions andassociated reliability (Z-numbers) [2], this collection of fuzzy ontologies constitutes an important basis for an implementation of Zadeh's restriction-centered theory of reasoning and computation (RRC) [3]. By considering real world's fuzziness, RRC differs from traditional approaches because it can handle restrictions described in natural language. A restriction is an answer to a question of the value of a variable such as the duration of an appointment. In addition to mathematically well-defined answers, RRC can likewise deal with unprecisiated answers as "about one hour." Inspired by mental functions, it constitutes an important basis to leverage present-day Web efforts to a natural Web 3.0. Based on natural language information, RRC may be accomplished with Z-number calculation to achieve a personalized Web reasoning and computation. Finally, through Web agents' understanding of natural language, they can react to humans more intuitively and thus generate and process information.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

El extraordinario auge de las nuevas tecnologías de la información, el desarrollo de la Internet de las Cosas, el comercio electrónico, las redes sociales, la telefonía móvil y la computación y almacenamiento en la nube, han proporcionado grandes beneficios en todos los ámbitos de la sociedad. Junto a éstos, se presentan nuevos retos para la protección y privacidad de la información y su contenido, como la suplantación de personalidad y la pérdida de la confidencialidad e integridad de los documentos o las comunicaciones electrónicas. Este hecho puede verse agravado por la falta de una frontera clara que delimite el mundo personal del mundo laboral en cuanto al acceso de la información. En todos estos campos de la actividad personal y laboral, la Criptografía ha jugado un papel fundamental aportando las herramientas necesarias para garantizar la confidencialidad, integridad y disponibilidad tanto de la privacidad de los datos personales como de la información. Por otro lado, la Biometría ha propuesto y ofrecido diferentes técnicas con el fin de garantizar la autentificación de individuos a través del uso de determinadas características personales como las huellas dáctilares, el iris, la geometría de la mano, la voz, la forma de caminar, etc. Cada una de estas dos ciencias, Criptografía y Biometría, aportan soluciones a campos específicos de la protección de datos y autentificación de usuarios, que se verían enormemente potenciados si determinadas características de ambas ciencias se unieran con vistas a objetivos comunes. Por ello es imperativo intensificar la investigación en estos ámbitos combinando los algoritmos y primitivas matemáticas de la Criptografía con la Biometría para dar respuesta a la demanda creciente de nuevas soluciones más técnicas, seguras y fáciles de usar que potencien de modo simultáneo la protección de datos y la identificacíón de usuarios. En esta combinación el concepto de biometría cancelable ha supuesto una piedra angular en el proceso de autentificación e identificación de usuarios al proporcionar propiedades de revocación y cancelación a los ragos biométricos. La contribución de esta tesis se basa en el principal aspecto de la Biometría, es decir, la autentificación segura y eficiente de usuarios a través de sus rasgos biométricos, utilizando tres aproximaciones distintas: 1. Diseño de un esquema criptobiométrico borroso que implemente los principios de la biometría cancelable para identificar usuarios lidiando con los problemas acaecidos de la variabilidad intra e inter-usuarios. 2. Diseño de una nueva función hash que preserva la similitud (SPHF por sus siglas en inglés). Actualmente estas funciones se usan en el campo del análisis forense digital con el objetivo de buscar similitudes en el contenido de archivos distintos pero similares de modo que se pueda precisar hasta qué punto estos archivos pudieran ser considerados iguales. La función definida en este trabajo de investigación, además de mejorar los resultados de las principales funciones desarrolladas hasta el momento, intenta extender su uso a la comparación entre patrones de iris. 3. Desarrollando un nuevo mecanismo de comparación de patrones de iris que considera tales patrones como si fueran señales para compararlos posteriormente utilizando la transformada de Walsh-Hadarmard. Los resultados obtenidos son excelentes teniendo en cuenta los requerimientos de seguridad y privacidad mencionados anteriormente. Cada uno de los tres esquemas diseñados han sido implementados para poder realizar experimentos y probar su eficacia operativa en escenarios que simulan situaciones reales: El esquema criptobiométrico borroso y la función SPHF han sido implementados en lenguaje Java mientras que el proceso basado en la transformada de Walsh-Hadamard en Matlab. En los experimentos se ha utilizado una base de datos de imágenes de iris (CASIA) para simular una población de usuarios del sistema. En el caso particular de la función de SPHF, además se han realizado experimentos para comprobar su utilidad en el campo de análisis forense comparando archivos e imágenes con contenido similar y distinto. En este sentido, para cada uno de los esquemas se han calculado los ratios de falso negativo y falso positivo. ABSTRACT The extraordinary increase of new information technologies, the development of Internet of Things, the electronic commerce, the social networks, mobile or smart telephony and cloud computing and storage, have provided great benefits in all areas of society. Besides this fact, there are new challenges for the protection and privacy of information and its content, such as the loss of confidentiality and integrity of electronic documents and communications. This is exarcebated by the lack of a clear boundary between the personal world and the business world as their differences are becoming narrower. In both worlds, i.e the personal and the business one, Cryptography has played a key role by providing the necessary tools to ensure the confidentiality, integrity and availability both of the privacy of the personal data and information. On the other hand, Biometrics has offered and proposed different techniques with the aim to assure the authentication of individuals through their biometric traits, such as fingerprints, iris, hand geometry, voice, gait, etc. Each of these sciences, Cryptography and Biometrics, provides tools to specific problems of the data protection and user authentication, which would be widely strengthen if determined characteristics of both sciences would be combined in order to achieve common objectives. Therefore, it is imperative to intensify the research in this area by combining the basics mathematical algorithms and primitives of Cryptography with Biometrics to meet the growing demand for more secure and usability techniques which would improve the data protection and the user authentication. In this combination, the use of cancelable biometrics makes a cornerstone in the user authentication and identification process since it provides revocable or cancelation properties to the biometric traits. The contributions in this thesis involve the main aspect of Biometrics, i.e. the secure and efficient authentication of users through their biometric templates, considered from three different approaches. The first one is designing a fuzzy crypto-biometric scheme using the cancelable biometric principles to take advantage of the fuzziness of the biometric templates at the same time that it deals with the intra- and inter-user variability among users without compromising the biometric templates extracted from the legitimate users. The second one is designing a new Similarity Preserving Hash Function (SPHF), currently widely used in the Digital Forensics field to find similarities among different files to calculate their similarity level. The function designed in this research work, besides the fact of improving the results of the two main functions of this field currently in place, it tries to expand its use to the iris template comparison. Finally, the last approach of this thesis is developing a new mechanism of handling the iris templates, considering them as signals, to use the Walsh-Hadamard transform (complemented with three other algorithms) to compare them. The results obtained are excellent taking into account the security and privacy requirements mentioned previously. Every one of the three schemes designed have been implemented to test their operational efficacy in situations that simulate real scenarios: The fuzzy crypto-biometric scheme and the SPHF have been implemented in Java language, while the process based on the Walsh-Hadamard transform in Matlab. The experiments have been performed using a database of iris templates (CASIA-IrisV2) to simulate a user population. The case of the new SPHF designed is special since previous to be applied i to the Biometrics field, it has been also tested to determine its applicability in the Digital Forensic field comparing similar and dissimilar files and images. The ratios of efficiency and effectiveness regarding user authentication, i.e. False Non Match and False Match Rate, for the schemes designed have been calculated with different parameters and cases to analyse their behaviour.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The Ising problem consists in finding the analytical solution of the partition function of a lattice once the interaction geometry among its elements is specified. No general analytical solution is available for this problem, except for the one-dimensional case. Using site-specific thermodynamics, it is shown that the partition function for ligand binding to a two-dimensional lattice can be obtained from those of one-dimensional lattices with known solution. The complexity of the lattice is reduced recursively by application of a contact transformation that involves a relatively small number of steps. The transformation implemented in a computer code solves the partition function of the lattice by operating on the connectivity matrix of the graph associated with it. This provides a powerful new approach to the Ising problem, and enables a systematic analysis of two-dimensional lattices that model many biologically relevant phenomena. Application of this approach to finite two-dimensional lattices with positive cooperativity indicates that the binding capacity per site diverges as Na (N = number of sites in the lattice) and experiences a phase-transition-like discontinuity in the thermodynamic limit N → ∞. The zeroes of the partition function tend to distribute on a slightly distorted unit circle in complex plane and approach the positive real axis already for a 5×5 square lattice. When the lattice has negative cooperativity, its properties mimic those of a system composed of two classes of independent sites with the apparent population of low-affinity binding sites increasing with the size of the lattice, thereby accounting for a phenomenon encountered in many ligand-receptor interactions.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Sequences of the variable heavy (VH) and κ (Vκ) domains of Ig structures were divided into 21 fragments that correspond to strands, loops, or parts of these structural units of the variable domains. Amino acid sequences of fragments (termed “words”) were collected from the 1,172 human heavy and 668 human κ chains available in the Kabat database. Statistical analysis of words of 17 fragments was performed (fragments that comprise the complementary determining regions′ fragments will not be discussed in this paper). The number of different words (those with different residues in at least one position) ranged, for various fragments, from 11 to 75 in the κ chains, and from 23 to 189 in the heavy chains. The main result of this study is that very few keywords, or main patterns of words, were necessary to describe over 90% of the sequences (no more than two keywords per fragment in the κ and no more than five per fragment in the heavy chains). No identical keywords were found for different fragments of the variable domains. Keywords of aligned fragments of the VH and Vκ domains were different in all but two instances. Thus, knowing the keywords, one can determine whether any given small part of a sequence belongs to a heavy or κ chain and predict its precise localization in the sequence. In addition, by using all of the keywords obtained through analysis of the Kabat database, it was possible to describe completely the sequences of the human VH and Vκ germ-line segments.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Saccharomyces cerevisiae is dimorphic and switches from a yeast form to a pseudohyphal (PH) form when starved for nitrogen. PH cells are elongated, bud in a unipolar manner, and invade the agar substrate. We assessed the requirements for actin in mediating the dramatic morphogenetic events that accompany the transition to PH growth. Twelve “alanine scan” alleles of the single yeast actin gene (ACT1) were tested for effects on filamentation, unipolar budding, agar invasion, and cell elongation. Some act1 mutations affect all phenotypes, whereas others affect only one or two aspects of PH growth. Tests of intragenic complementation among specific act1 mutations support the phenotypic evidence for multiple actin functions in filamentous growth. We present evidence that interaction between actin and the actin-binding protein fimbrin is important for PH growth and suggest that association of different actin-binding proteins with actin mediates the multiple functions of actin in filamentous growth. Furthermore, characterization of cytoskeletal structure in wild type and act1/act1 mutants indicates that PH cell morphogenesis requires the maintenance of a highly polarized actin cytoskeleton. Collectively, this work demonstrates that actin plays a central role in fungal dimorphism.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Although extensively studied biochemically, members of the Protein 4.1 superfamily have not been as well characterized genetically. Studies of coracle, a Drosophila Protein 4.1 homologue, provide an opportunity to examine the genetic functions of this gene family. coracle was originally identified as a dominant suppressor of EgfrElp, a hypermorphic form of the Drosophila Epidermal growth factor receptor gene. In this article, we present a phenotypic analysis of coracle, one of the first for a member of the Protein 4.1 superfamily. Screens for new coracle alleles confirm the null coracle phenotype of embryonic lethality and failure in dorsal closure, and they identify additional defects in the embryonic epidermis and salivary glands. Hypomorphic coracle alleles reveal functions in many imaginal tissues. Analysis of coracle mutant cells indicates that Coracle is a necessary structural component of the septate junction required for the maintenance of the transepithelial barrier but is not necessary for apical–basal polarity, epithelial integrity, or cytoskeletal integrity. In addition, coracle phenotypes suggest a specific role in cell signaling events. Finally, complementation analysis provides information regarding the functional organization of Coracle and possibly other Protein 4.1 superfamily members. These studies provide insights into a range of in vivo functions for coracle in developing embryos and adults.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Unilateral intrahippocampal injections of tetrodotoxin were used to temporarily inactivate one hippocampus during specific phases of training in an active allothetic place avoidance task. The rat was required to use landmarks in the room to avoid a room-defined sector of a slowly rotating circular arena. The continuous rotation dissociated room cues from arena cues and moved the arena surface through a part of the room in which foot-shock was delivered. The rat had to move away from the shock zone to prevent being transported there by the rotation. Unilateral hippocampal inactivations profoundly impaired acquisition and retrieval of the allothetic place avoidance. Posttraining unilateral hippocampal inactivation also impaired performance in subsequent sessions. This allothetic place avoidance task seems more sensitive to hippocampal disruption than the standard water maze task because the same unilateral hippocampal inactivation does not impair performance of the variable-start, fixed hidden goal task after procedural training. The results suggest that the hippocampus not only encodes allothetic relationships amongst landmarks, it also organizes perceived allothetic stimuli into systems of mutually stable coordinates. The latter function apparently requires greater hippocampal integrity.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

In the 7 years since dynamin was first isolated from bovine brain in search of novel microtubule-based motors, our understanding of this enzyme has expanded significantly. We now know that brain dynamin belongs to a family of large GTPases, which mediate vesicle trafficking. Furthermore, this enzymatic activity is markedly increased through association with microtubules, acidic phospholipids, and certain regulatory proteins that contain Src homology 3 (SH3) domains. From functional, genetic, and cellular manipulations, it is now generally accepted that dynamin participates in the endocytic uptake of receptors, associated ligands, and plasma membrane following an exocytic event. These observations have confirmed at least one function of dynamin that was predicted from seminal studies on a pleiotropic mutant, shibirets (shits) in Drosophila melanogaster. Of equal interest is the finding that there are multiple dynamin gene products, including two that are expressed in a tissue-specific manner, and they share marked homology with a larger family of distinct but related proteins. Therefore, it is attractive to speculate that the different dynamins may participate in related cellular functions, such as distinct endocytic processes and even secretion. In turn, dynamin could play an important role in cell growth, cell spreading, and neurite outgrowth. The purpose of this review is to enumerate on the expansive dynamin literature and to discuss the nomenclature, expression, and putative functions of this growing and interesting family of proteins.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The variable immunoglobulin (Ig) domains contain hypervariable regions that are involved in the formation of the antigen binding site. Besides the canonical antigen binding site, so-called unconventional sites also reside in the variable region that bind bacterial and viral proteins. Docking to these unconventional sites does not typically interfere with antigen binding, which suggests that these sites may be a part of the biological functions of Igs. Herein, a novel unconventional binding site is described. The site is detected with 8-azidopurine nucleotide photoaffinity probes that label antibodies efficiently and under mild conditions. Tryptic peptides were isolated from photolabeled monoclonal antibodies and aligned with the variable antibody domains of heavy and light chains. The structure of a variable Ig fragment was used to model the binding of the purine nucleotide to invariant residues in a hydrophobic pocket of the Ig molecule at a location distant from the antigen binding site. Monoclonal and polyclonal antibodies were biotinylated with the photoaffinity linker and used in fluorescence-activated cell sorter and ELISA analyses. The data support the utility of this site for tethering diagnostic and therapeutic agents to the variable Ig fragment region without impairing the structural and functional integrity of antibodies.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This survey of well-documented repeated fault rupture confirms that some faults have exhibited a "characteristic" behavior during repeated large earthquakes--that is, the magnitude, distribution, and style of slip on the fault has repeated during two or more consecutive events. In two cases faults exhibit slip functions that vary little from earthquake to earthquake. In one other well-documented case, however, fault lengths contrast markedly for two consecutive ruptures, but the amount of offset at individual sites was similar. Adjacent individual patches, 10 km or more in length, failed singly during one event and in tandem during the other. More complex cases of repetition may also represent the failure of several distinct patches. The faults of the 1992 Landers earthquake provide an instructive example of such complexity. Together, these examples suggest that large earthquakes commonly result from the failure of one or more patches, each characterized by a slip function that is roughly invariant through consecutive earthquake cycles. The persistence of these slip-patches through two or more large earthquakes indicates that some quasi-invariant physical property controls the pattern and magnitude of slip. These data seem incompatible with theoretical models that produce slip distributions that are highly variable in consecutive large events.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Thesis (Ph.D.)--University of Washington, 2016-05