832 resultados para role based access control
Resumo:
随着机器人应用范围的不断扩展,机器人所面临的工作环境也越来越复杂,多数是未知的、动态的和非结构化的。通过对基于行为的机器人控制技术的研究,设计了一种用于完成多目标任务的移动机器人行为控制系统。将基于行为的控制技术融合进模糊控制的思想中,使移动机器人的行为通过运用模糊控制和基于优先度的行为决策来实现,并且通过视觉信息使机器人能够完成面向目标的任务。
Resumo:
本文提出了一种具有实时性、可靠性保障的INTERNET网络机器人控制系统的设计方法。基于该方法设计的网络实时控制系统能够满足机器人实时、高效、灵活的技术特点。该方法的核心为基于UDP传输协议的网络数据补偿算法,通过对网络传输过程中丢失的数据进行实时在线补偿预测,降低了网络数据的丢失对系统的影响。实验结果证明该方法的有效性、合理性。
Resumo:
针对柔性关节机械臂从自由空间运动控制过渡到约束空间力控制的过程中,存在冲击、震荡甚至不稳定等问题,利用加速度传感器反馈控制,为柔性关节机械臂的接触力控制在较宽的带宽内提供阻尼,克服了利用单纯速度反馈控制带宽窄的局限。对柔性关节机械臂的接触力控制进行建模和基于加速度反馈的控制策略分析,并在柔性关节机械臂上进行了接触力控制的试验研究。结果表明,这种方法有效。
Resumo:
提出了基于加速度传感器的丝杠传动系统建模及控制策略 ,可以通过实验测量存在结构非刚性因素时丝杠系统的模型。基于该模型可以进一步设计基于加速度传感器的控制策略 ,加速度反馈可以抑制系统的扰动力对丝杠传动系统控制精度的影响 ,实验结果表明提出的方法可以有效地提高丝杠系统的性能。
Resumo:
蛇具有细长无肢的身体、独特的半球形关节,使其可在神经系统控制下完成与环境相适应的多种节律运动。模仿蛇的运动机理和行为方式而设计的蛇形机器人克服了轮腿式机器人的缺点,增加了机器人的运动方式,扩大了机器人的应用范围。但应用传统的控制策略实现蛇形机器人运动控制遇到了很难克服的问题。随着社会经济与科技的发展,研究人员把从蛇运动神经系统研究中得到的启示应用到蛇形机器人上,希望不仅可以解决其运动控制问题,更能在构型、步态及控制机制上皆可展示蛇的特征。 生物学家已经证明动物的节律运动是其低级神经中枢的自激行为,是由中枢模式发生器(Central Pattern Generator,CPG)控制的。中枢模式发生器是一种能够在缺乏有规律的感知和中枢控制输入的情况下,产生有节奏模式输出的神经网络。 本文以国家自然科学基金课题《基于CPG的蛇形机器人控制方法研究》和国家“863”高技术计划资助项目《具有环境适应能力的蛇形机器人的研究》为依托,突破以相互抑制机理研究CPG的传统观点,首次创新性地提出应用循环抑制(Cyclic Inhibition, CI)机理来研究蛇形机器人的CPG建模与实现问题。本研究涵概了神经元模型的特性分析、蛇形机器人关节循环抑制CPG建模理论、蛇形机器人循环抑制CPG神经网络稳定性分析以及典型步态的生成方法、循环抑制CPG神经网络控制蛇形机器人蜿蜒运动参数设定策略、应用动力学仿真和实验对该CPG控制方法有效性的验证。 首先,本文介绍了两个用于CPG建模研究的蛇形机器人“勘查者”和“勘查者-I”。给出各自机械系统、控制系统的构成和动力学仿真平台。 其次,详细分析了神经元以及传统的相互抑制(Mutual Inhibition, MI)CPG的特性。从工程角度首次创新性地应用循环抑制建模理论构建了蛇形机器人CPG模型,并对其稳定性进行了深入的分析。首次证明持续型神经元构成的单向循环抑制(Unilateral Cyclic Inhibition, UCI) CPG是能产生振荡输出CPG中微分方程数量最少的,而且其产生振荡输出的机理完全不同于传统的相互抑制CPG。其不需要具备调整功能,只需要神经元之间强的单向循环抑制连接。 第三,首次应用单向激励连接循环抑制CPG构成蛇形机器人神经网络系统。分析了其稳定性,给出其产生振荡输出的条件。通过仿真和实验验证了循环抑制CPG神经网络实现典型步态(蜿蜒运动、伸缩运动和侧向运动)的有效性。首次应用双向循环抑制(Bidirectional Cyclic Inhibition, BCI)CPG神经网络在不同高级控制神经元命令激活下的输出实现蛇形机器人典型运动步态之间的转换。为蛇节律运动生成机制建模提供了新方法。 最后,从实时性、控制方便性等工程应用的角度,对单向循环抑制CPG神经网络实现蛇形机器人蜿蜒运动控制进行了深入的分析。给出了S-波形、幅值、运动速度和运动轨迹曲率的参数设定策略。该系统应用首CPG自激励权重调解成功解决了传统CPG控制系统中CPG的个数比蛇形机器人关节数多一个的问题,并用其实现了一种独特的转弯控制策略。 综上,为蛇形机器人运动控制提供了全新的方法。
Resumo:
在分析谐波传动系统特性的基础上,建立了谐波传动系统的基于加速度传感器反馈控制的数学模型,通过仿真分析和实验研究结果表明,加速度反馈控制能有效地换制谐波传动系统负载端的振动。
Resumo:
Mental dependence, characterized by craving and impulsive seeking behavior, is the matter of intensive study in the field of drug addiction. The mesolimbic dopamine system has been suggested to play an important role in rewarding of drugs and relapse. Although chronic drug use can induce neuroadaptations of the mesolimbic system and changes of drug reinforcement, these mechanisms cannot fully account for the craving and the compulsive drug-using behavior of addicts. Acknowledging the reinforcement effects of drugs, most previous studies have studied the impact of environmental cues and conditioned learning on addiction behavior, often using established classical or operant conditioning model. These studies, however, paid little attention to the role of cognitive control and emotion in addiction. These mental factors that are believed to have an important influence on conditioned learning. The medial prefrontal cortex (mPFC) has close anatomic and functional connections with the mesolimbic dopamine system. A number of the cognitive neurological studies demonstrate that mPFC is involved in motivation, emotional regulation, monitoring of responses and other executive functions. Thus we speculated that the function of abnormality in mPFC following chronic drug use would cause related to the abnormal behavior in addicts including impulse and emotional changes. In the present study of a series of experiments, we used functional magnetic resonance imaging to examine the hemodynamic response of the mPFC and related circuits to various cognitive and emotional stimuli in heroin addicts and to explore the underlying dopamine neuromechnism by microinjection of tool drugs into the mPFC in laboratory animals. In the first experiment, we found that heroin patients, relative to the normal controls, took a much shorter time and committed more errors in completing the more demanding of cognitive regulation in the reverse condition of the task, while the neural activity in anterior cingulate cortex (ACC) was attenuated. In the second experiment, the scores of the heroin patients in self-rating depression scale (SDS) and Self-rating anxiety scale (SAS) were significantly higher than the normal controls and they rated the negative pictures more aversive than the normal controls. Being congruent with the behavioral results, hemodynamic response to negative pictures showed significant difference between the two groups in bilateral ventral mPFC (VMPFC), amygdala, and right thalamus. The VMPFC of patients showed increased activation than normal controls, whereas activation in the amygdala of patients was weaker than that in normal subjects. Our third experiment showed that microinjection of D1 receptor agonist SKF38393 into the mPFC of rats decreased hyperactivity, which was induced by morphine injection, in contrast, D1 receptor antagonist SCH23390 increased the hyperactivity, These findings suggest: (1) The behavior and neural activity in ACC of addicts changed in chronic drug users. Their impulsive behavior might result from the abnormal neural activity in the mPFC especially the ACC. (2) Heroine patients were more depress and anxiety than normal controls. The dysfunction of the mPFC---amygdala circuit of heroine addicts might be related to the abnormal emotion response. (3) Dopamine in the mPFC has an inhibitory effect on morphine induced behavior. The hyperactivity induced by chronic morphine was reduced by dopamine increase with D1 receptor agonist, confirm the first experiment that the neuroadaption of mPFC system induced by chronic morphine administration appears to be the substrate the impulse behavior of drug users.
Resumo:
The nature of the distinction between conscious and unconscious knowledge is a core issue in the implicit learning field. Furthermore, the phenomenological experience associated with having knowledge is central to the conscious or unconscious status of that knowledge. Consistently, Dienes and Scott (2005) measured the conscious or unconscious status of structure knowledge using subjective measures. Believing that one is purely guessing when in fact one knows indicates unconscious knowledge. But unconscious structural knowledge can also be associated with feelings of intuition or familiarity. In this thesis, we explored whether phenomenological feelings, like familiarity, associated with unconscious structural knowledge could be used, paradoxically, to exert conscious control over the use of the knowledge, and whether people could obtain repetition structure knowledge. We also investigated the neural correlates of awareness of knowing, as measured phenomenologically. In study one, subjects were trained on two grammars and then asked to endorse strings from only one of the grammars. Subjects also rated how familiar each string they felt and reported whether or not they used familiarity to make their grammaticality judgment. We found subjects could endorse the strings of just one grammar and ignore the strings from the other. Importantly, when subjects said they were using familiarity, the rated familiarity for test strings consistent with their chosen grammar was greater than that for strings from the other grammar. Familiarity, subjectively defined, is sensitive to intentions and can play a key role in strategic control. In study two, we manipulated the structural characteristic of stings and explored whether participants could learn repetition structures in the grammatical strings. We measured phenomenology again and also ERPs. Deviant letters of ungrammatical strings violating the repetition structure elicited the N2 component; we took this to be an indication of knowledge, whether conscious or not. Strings which were attributed to conscious categories (rules and recollection) rather than phenomenology associated with unconscious structural knowledge (guessing, intuition and familiarity) elicited the P300 component. Different waveforms provided evidence for the neural correlates of different phenomenologies associated with knowledge of an artificial grammar.
Resumo:
We present a transport protocol whose goal is to reduce power consumption without compromising delivery requirements of applications. To meet its goal of energy efficiency, our transport protocol (1) contains mechanisms to balance end-to-end vs. local retransmissions; (2) minimizes acknowledgment traffic using receiver regulated rate-based flow control combined with selected acknowledgements and in-network caching of packets; and (3) aggressively seeks to avoid any congestion-based packet loss. Within a recently developed ultra low-power multi-hop wireless network system, extensive simulations and experimental results demonstrate that our transport protocol meets its goal of preserving the energy efficiency of the underlying network.
Resumo:
Natural killer (NK) cells play an essential role in innate immune control of poxviral infections in vivo. However, the mechanism(s) underlying NK cell activation and function in response to poxviruses remains poorly understood. In a mouse model of infection with vaccinia virus (VV), the most studied member of the poxvirus family, we identified that the Toll-like receptor (TLR) 2-myeloid differentiating factor 88 (MyD88) pathway was critical for the activation of NK cells and the control of VV infection in vivo. We further showed that TLR2 signaling on NK cells, but not on accessory cells such as dendritic cells (DCs), was necessary for NK cell activation and that this intrinsic TLR2-MyD88 signaling pathway was required for NK cell activation and played a critical role in the control of VV infection in vivo. In addition, we showed that the activating receptor NKG2D was also important for efficient NK activation and function, as well as recognition of VV-infected targets. We further demonstrated that VV could directly activate NK cells via TLR2 in the presence of cytokines in vitro and TLR2-MyD88-dependent activation of NK cells by VV was mediated through the phosphatidylinositol 3-kinase (PI3K)-extracellular signal-regulated kinase (ERK) pathway. Taken together, these results represent the first evidence that intrinsic TLR signaling is critical for NK cell activation and function in the control of a viral infection in vivo, indicate that multiple pathways are required for efficient NK cell activation and function in response to VV infection, and may provide important insights into the design of effective strategies to combat poxviral infections.
Association between DNA damage response and repair genes and risk of invasive serous ovarian cancer.
Resumo:
BACKGROUND: We analyzed the association between 53 genes related to DNA repair and p53-mediated damage response and serous ovarian cancer risk using case-control data from the North Carolina Ovarian Cancer Study (NCOCS), a population-based, case-control study. METHODS/PRINCIPAL FINDINGS: The analysis was restricted to 364 invasive serous ovarian cancer cases and 761 controls of white, non-Hispanic race. Statistical analysis was two staged: a screen using marginal Bayes factors (BFs) for 484 SNPs and a modeling stage in which we calculated multivariate adjusted posterior probabilities of association for 77 SNPs that passed the screen. These probabilities were conditional on subject age at diagnosis/interview, batch, a DNA quality metric and genotypes of other SNPs and allowed for uncertainty in the genetic parameterizations of the SNPs and number of associated SNPs. Six SNPs had Bayes factors greater than 10 in favor of an association with invasive serous ovarian cancer. These included rs5762746 (median OR(odds ratio)(per allele) = 0.66; 95% credible interval (CI) = 0.44-1.00) and rs6005835 (median OR(per allele) = 0.69; 95% CI = 0.53-0.91) in CHEK2, rs2078486 (median OR(per allele) = 1.65; 95% CI = 1.21-2.25) and rs12951053 (median OR(per allele) = 1.65; 95% CI = 1.20-2.26) in TP53, rs411697 (median OR (rare homozygote) = 0.53; 95% CI = 0.35 - 0.79) in BACH1 and rs10131 (median OR( rare homozygote) = not estimable) in LIG4. The six most highly associated SNPs are either predicted to be functionally significant or are in LD with such a variant. The variants in TP53 were confirmed to be associated in a large follow-up study. CONCLUSIONS/SIGNIFICANCE: Based on our findings, further follow-up of the DNA repair and response pathways in a larger dataset is warranted to confirm these results.
Resumo:
Studies suggest that activation of phosphoinositide 3-kinase-Akt may protect against neuronal cell death in Alzheimer's disease (AD). Here, however, we provide evidence of increased Akt activation, and hyperphosphorylation of critical Akt substrates in AD brain, which link to AD pathogenesis, suggesting that treatments aiming to activate the pathway in AD need to be considered carefully. A different distribution of Akt and phospho-Akt was detected in AD temporal cortex neurons compared with control neurons, with increased levels of active phosphorylated-Akt in particulate fractions, and significant decreases in Akt levels in AD cytosolic fractions, causing increased activation of Akt (phosphorylated-Akt/total Akt ratio) in AD. In concordance, significant increases in the levels of phosphorylation of total Akt substrates, including: GSK3ßSer9, tauSer214, mTORSer2448, and decreased levels of the Akt target, p27kip1, were found in AD temporal cortex compared with controls. A significant loss and altered distribution of the major negative regulator of Akt, PTEN (phosphatase and tensin homologue deleted on chromosome 10), was also detected in AD neurons. Loss of phosphorylated-Akt and PTEN-containing neurons were found in hippocampal CA1 at end stages of AD. Taken together, these results support a potential role for aberrant control of Akt and PTEN signalling in AD.
Resumo:
A novel wireless local area network (WLAN) security processor is described in this paper. It is designed to offload security encapsulation processing from the host microprocessor in an IEEE 802.11i compliant medium access control layer to a programmable hardware accelerator. The unique design, which comprises dedicated cryptographic instructions and hardware coprocessors, is capable of performing wired equivalent privacy, temporal key integrity protocol, counter mode with cipher block chaining message authentication code protocol, and wireless robust authentication protocol. Existing solutions to wireless security have been implemented on hardware devices and target specific WLAN protocols whereas the programmable security processor proposed in this paper provides support for all WLAN protocols and thus, can offer backwards compatibility as well as future upgrade ability as standards evolve. It provides this additional functionality while still achieving equivalent throughput rates to existing architectures. © 2006 IEEE.
Resumo:
Previous studies have identified the DUB family of cytokine-regulated murine deubiquitinating enzymes, which play a role in the control of cell proliferation and survival. Through data base analyses and cloning, we have identified a human cDNA (DUB-3) that shows significant homology to the known murine DUB family members. Northern blotting has shown expression of this gene in a number of tissues including brain, liver, and muscle, with two transcripts being apparent (1.6 and 1.7 kb). In addition, expression was observed in cell lines including those derived from a number of hematopoietic tumors such as the Burkitt's lymphoma cell line RAJI. We have also demonstrated that DUB-3, which was shown to be an active deubiquitinating enzyme, is induced in response to interleukin-4 and interleukin-6 stimulation. Finally, we have demonstrated that constitutive expression of DUB-3 blocks proliferation and can initiate apoptosis in both IL-3-dependent Ba/F3 cells and NIH3T3 fibroblasts. These findings suggest that human DUB-3, like the murine DUB family members, is transiently induced in response to cytokines and can, when constitutively expressed, block growth factor-dependent proliferation.
Resumo:
A proportion of Hodgkin lymphoma (HL) cases are causally associated with the Epstein-Barr virus (EBV) but the aetiology of the remaining cases remains obscure. Over the last 3 decades several studies have found an association between HL and measles virus (MV) including a recent cohort study describing the detection of MV antigens in Hodgkin and Reed-Sternberg cells, the tumour cells in HL. In the present study we looked at the relationship between history of MV infection and risk of developing HL in a population-based, case/control study of HL. In addition we used immunohistochemistry and RT-PCR to look for direct evidence of MV in HL biopsies. There was no significant difference in the proportion of cases reporting previous measles compared to controls in the entire data set or when young adults were considered separately. Using a robust immunohistochemical assay for MV infection, we failed to find evidence of MV in biopsies from 97 cases of HL and RT-PCR studies similarly gave negative results. This study therefore provides no evidence that MV is directly involved in the development of HL. However, when age at first reported MV infection was investigated, significant differences emerged with children infected before school-age having higher risk, especially of EBV-ve HL, when compared with children infected at older ages; the interpretation of these latter results is unclear.