1000 resultados para Graph usage
Resumo:
A study od Typanosomatidae GC distribution and codon usage is presented. The codon usage patterns in coincidence with the phylogenetical data are similar in Crithidia and Leishmania, whereas they are more divergent in Trypanosoma brucei and T. cruzi. The analyisis of the GC mutational pressure in these organisms reveals that T. brucei, and to a lesser extent T. cruzi, have envolved towards a more balanced use of all bases, whereas Leishmania and Crithidia retain features of a primeval genetic apparatus. Tables with approximated GC mutational pressure in homologous genes, and codon usage in Trypanosomatidae are presented.
Resumo:
L'étude proposée par l'A. comporte trois parties. La première est consacrée à un rapide survol des principales interprétations de la péricope à partir des lectures qu'elles font du v. 27. La deuxième s'articule autour de trois thèses qui sont l'occasion de discuter plus en détails une lecture psychanalytique, une lecture féministe et une lecture sociologique de la péricope. Enfin, une troisième partie s'intéresse au sens du passage de la frontière par Jésus à partir d'une relecture de la péricope dans le contexte de l'Évangile de Marc.
L'usage de faux documents d'identité: situations récurrentes, profil des auteurs et jugements pénaux
Resumo:
Cette étude vise à mesurer les caractéristiques, l'étendue et l'évolution des cas d'usage de faux documents d'identité traités par la police et le système de justice pénale suisse, ainsi qu'à proposer des mesures de prévention spécifiques pour ce délit. La partie empirique repose sur l'analyse de 445 affaires traitées par la police de deux cantons suisses entre 2005 et 2011, ainsi que sur l'analyse de 172 décisions judiciaires concernant ces affaires. L'analyse des dossiers de police est conduite à travers de la grille de lecture du triangle du crime. Cette grille de lecture proposée par l'approche situationnelle en criminologie permet d'établir les profils des auteurs, des faux documents, des situations dans lesquelles ces derniers ont été utilisés, et des gardiens concernés par la fraude documentaire. La période étudiée permet aussi d'évaluer l'influence de l'entrée de la Suisse dans l'espace Schengen sur l'évolution de ce type de délit. De plus, la combinaison de données policières et judiciaires pour un même groupe d'individus permet également d'observer le processus pénal dès la découverte de l'infraction jusqu'à la décision judiciaire, tout en portant une attention spéciale aux taux de condamnations et aux peines imposées. Finalement, ces analyses permettent de proposer des mesures concrètes de prévention situationnelle de la délinquance qui pourraient être mises en place par la police et par certaines institutions privées concernées par la fraude documentaire.
Resumo:
We survey the main theoretical aspects of models for Mobile Ad Hoc Networks (MANETs). We present theoretical characterizations of mobile network structural properties, different dynamic graph models of MANETs, and finally we give detailed summaries of a few selected articles. In particular, we focus on articles dealing with connectivity of mobile networks, and on articles which show that mobility can be used to propagate information between nodes of the network while at the same time maintaining small transmission distances, and thus saving energy.
Resumo:
(Résumé de l'ouvrage) Seventeen innovative studies are collected in this volume which has been produced under the aegis of the Centre for Biblical Studies, University of Manchester, and L'Institut des sciences bibliques, Université de Lausanne. The majority of the studies engage with narrative through providing insightful working examples. Building on the many contributions of recent narratological research, for the most part the studies in this collection avoid the technical language of narratology as they present fresh insights at many levels. Some essays focus more on the implied author, some on the implied reader or hearer, and some on the way particular messages are constructed; some of the studies consider how author, message and reader are all interconnected. There are several creative proposals for refining genre definition, from law and wisdom to gospel and apocryphal writings. Some studies highlight the way in which narratives can contain ethical, religious, and cultural messages. Sensitivity to narrative is also shown by some contributors to expose in intruing ways the redactional processes behind the final form of texts. Students of narrative in the ancient world will find much to consider in this book, and others engaged with literary studies more generally will discover that scholars of the worlds of the Bible and Late Antiquity have much to offer them.
Biased V beta usage in immature thymocytes is independent of DJ beta proximity and pT alpha pairing.
Resumo:
During thymus development, the TCR beta locus rearranges before the TCR alpha locus. Pairing of productively rearranged TCR beta-chains with an invariant pT alpha chain leads to the formation of a pre-TCR and subsequent expansion of immature pre-T cells. Essentially nothing is known about the TCR V beta repertoire in pre-T cells before or after the expression of a pre-TCR. Using intracellular staining, we show here that the TCR V beta repertoire is significantly biased at the earliest developmental stage in which VDJ beta rearrangement has occurred. Moreover (and in contrast to the V(H) repertoire in immature B cells), V beta repertoire biases in immature T cells do not reflect proximity of V beta gene segments to the DJ beta cluster, nor do they depend upon preferential V beta pairing with the pT alpha chain. We conclude that V gene repertoires in developing T and B cells are controlled by partially distinct mechanisms.
Resumo:
Graph pebbling is a network model for studying whether or not a given supply of discrete pebbles can satisfy a given demand via pebbling moves. A pebbling move across an edge of a graph takes two pebbles from one endpoint and places one pebble at the other endpoint; the other pebble is lost in transit as a toll. It has been shown that deciding whether a supply can meet a demand on a graph is NP-complete. The pebbling number of a graph is the smallest t such that every supply of t pebbles can satisfy every demand of one pebble. Deciding if the pebbling number is at most k is NP 2 -complete. In this paper we develop a tool, called theWeight Function Lemma, for computing upper bounds and sometimes exact values for pebbling numbers with the assistance of linear optimization. With this tool we are able to calculate the pebbling numbers of much larger graphs than in previous algorithms, and much more quickly as well. We also obtain results for many families of graphs, in many cases by hand, with much simpler and remarkably shorter proofs than given in previously existing arguments (certificates typically of size at most the number of vertices times the maximum degree), especially for highly symmetric graphs. Here we apply theWeight Function Lemma to several specific graphs, including the Petersen, Lemke, 4th weak Bruhat, Lemke squared, and two random graphs, as well as to a number of infinite families of graphs, such as trees, cycles, graph powers of cycles, cubes, and some generalized Petersen and Coxeter graphs. This partly answers a question of Pachter, et al., by computing the pebbling exponent of cycles to within an asymptotically small range. It is conceivable that this method yields an approximation algorithm for graph pebbling.
Resumo:
Dernière étape avant le monde professionnel, un cursus de spécialisation est un lieu de discussion, au carrefour des savoirs et des savoir-faire, permettant aux étudiants d'envisager sous un angle nouveau les contenus enseignés à l'université. Il ne s'agit plus seulement d'acquérir des connaissances mais aussi de développer des compétences transférables à d'autres types d'activité. L'équipe en charge de la spécialisation en Analyse du discours et de la communication publics proposée par la Faculté des Lettres de l'Université de Lausanne a oeuvré à l'intégration d'un nouvel outil informatique, le e-Portfolio, destiné à faciliter l'expression et la documentation des compétences individuelles développées par l'étudiant lors de son parcours de formation.