934 resultados para Information theory in biology


Relevância:

100.00% 100.00%

Publicador:

Resumo:

The cerebral cortex contains circuitry for continuously computing properties of the environment and one's body, as well as relations among those properties. The success of complex perceptuomotor performances requires integrated, simultaneous use of such relational information. Ball catching is a good example as it involves reaching and grasping of visually pursued objects that move relative to the catcher. Although integrated neural control of catching has received sparse attention in the neuroscience literature, behavioral observations have led to the identification of control principles that may be embodied in the involved neural circuits. Here, we report a catching experiment that refines those principles via a novel manipulation. Visual field motion was used to perturb velocity information about balls traveling on various trajectories relative to a seated catcher, with various initial hand positions. The experiment produced evidence for a continuous, prospective catching strategy, in which hand movements are planned based on gaze-centered ball velocity and ball position information. Such a strategy was implemented in a new neural model, which suggests how position, velocity, and temporal information streams combine to shape catching movements. The model accurately reproduces the main and interaction effects found in the behavioral experiment and provides an interpretation of recently observed target motion-related activity in the motor cortex during interceptive reaching by monkeys. It functionally interprets a broad range of neurobiological and behavioral data, and thus contributes to a unified theory of the neural control of reaching to stationary and moving targets.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

La théorie de l'information quantique s'est développée à une vitesse fulgurante au cours des vingt dernières années, avec des analogues et extensions des théorèmes de codage de source et de codage sur canal bruité pour la communication unidirectionnelle. Pour la communication interactive, un analogue quantique de la complexité de la communication a été développé, pour lequel les protocoles quantiques peuvent performer exponentiellement mieux que les meilleurs protocoles classiques pour certaines tâches classiques. Cependant, l'information quantique est beaucoup plus sensible au bruit que l'information classique. Il est donc impératif d'utiliser les ressources quantiques à leur plein potentiel. Dans cette thèse, nous étudions les protocoles quantiques interactifs du point de vue de la théorie de l'information et étudions les analogues du codage de source et du codage sur canal bruité. Le cadre considéré est celui de la complexité de la communication: Alice et Bob veulent faire un calcul quantique biparti tout en minimisant la quantité de communication échangée, sans égard au coût des calculs locaux. Nos résultats sont séparés en trois chapitres distincts, qui sont organisés de sorte à ce que chacun puisse être lu indépendamment. Étant donné le rôle central qu'elle occupe dans le contexte de la compression interactive, un chapitre est dédié à l'étude de la tâche de la redistribution d'état quantique. Nous prouvons des bornes inférieures sur les coûts de communication nécessaires dans un contexte interactif. Nous prouvons également des bornes atteignables avec un seul message, dans un contexte d'usage unique. Dans un chapitre subséquent, nous définissons une nouvelle notion de complexité de l'information quantique. Celle-ci caractérise la quantité d'information, plutôt que de communication, qu'Alice et Bob doivent échanger pour calculer une tâche bipartie. Nous prouvons beaucoup de propriétés structurelles pour cette quantité, et nous lui donnons une interprétation opérationnelle en tant que complexité de la communication quantique amortie. Dans le cas particulier d'entrées classiques, nous donnons une autre caractérisation permettant de quantifier le coût encouru par un protocole quantique qui oublie de l'information classique. Deux applications sont présentées: le premier résultat général de somme directe pour la complexité de la communication quantique à plus d'une ronde, ainsi qu'une borne optimale, à un terme polylogarithmique près, pour la complexité de la communication quantique avec un nombre de rondes limité pour la fonction « ensembles disjoints ». Dans un chapitre final, nous initions l'étude de la capacité interactive quantique pour les canaux bruités. Étant donné que les techniques pour distribuer de l'intrication sont bien étudiées, nous nous concentrons sur un modèle avec intrication préalable parfaite et communication classique bruitée. Nous démontrons que dans le cadre plus ardu des erreurs adversarielles, nous pouvons tolérer un taux d'erreur maximal de une demie moins epsilon, avec epsilon plus grand que zéro arbitrairement petit, et ce avec un taux de communication positif. Il s'ensuit que les canaux avec bruit aléatoire ayant une capacité positive pour la transmission unidirectionnelle ont une capacité positive pour la communication interactive quantique. Nous concluons avec une discussion de nos résultats et des directions futures pour ce programme de recherche sur une théorie de l'information quantique interactive.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Biological systems exhibit rich and complex behavior through the orchestrated interplay of a large array of components. It is hypothesized that separable subsystems with some degree of functional autonomy exist; deciphering their independent behavior and functionality would greatly facilitate understanding the system as a whole. Discovering and analyzing such subsystems are hence pivotal problems in the quest to gain a quantitative understanding of complex biological systems. In this work, using approaches from machine learning, physics and graph theory, methods for the identification and analysis of such subsystems were developed. A novel methodology, based on a recent machine learning algorithm known as non-negative matrix factorization (NMF), was developed to discover such subsystems in a set of large-scale gene expression data. This set of subsystems was then used to predict functional relationships between genes, and this approach was shown to score significantly higher than conventional methods when benchmarking them against existing databases. Moreover, a mathematical treatment was developed to treat simple network subsystems based only on their topology (independent of particular parameter values). Application to a problem of experimental interest demonstrated the need for extentions to the conventional model to fully explain the experimental data. Finally, the notion of a subsystem was evaluated from a topological perspective. A number of different protein networks were examined to analyze their topological properties with respect to separability, seeking to find separable subsystems. These networks were shown to exhibit separability in a nonintuitive fashion, while the separable subsystems were of strong biological significance. It was demonstrated that the separability property found was not due to incomplete or biased data, but is likely to reflect biological structure.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The financial crisis of 2008 led to new international regulatory controls for the governance, risk and compliance of financial services firms. Information systems play a critical role here as political, functional and social pressures may lead to the deinstitutionalization of existing structures, processes and practices. This research examines how an investment management system is introduced by a leading IT vendor across eight client sites in the post-crisis era. Using institutional theory, it examines changes in working practices occurring at the environmental and organizational levels and the ways in which technological interventions are used to apply disciplinary effects in order to prevent inappropriate behaviors. The results extend the constructs of deinstitutionalization and identify empirical predictors for the deinstitutionalization of compliance and trading practices within financial organizations.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The design of translation invariant and locally defined binary image operators over large windows is made difficult by decreased statistical precision and increased training time. We present a complete framework for the application of stacked design, a recently proposed technique to create two-stage operators that circumvents that difficulty. We propose a novel algorithm, based on Information Theory, to find groups of pixels that should be used together to predict the Output Value. We employ this algorithm to automate the process of creating a set of first-level operators that are later combined in a global operator. We also propose a principled way to guide this combination, by using feature selection and model comparison. Experimental results Show that the proposed framework leads to better results than single stage design. (C) 2009 Elsevier B.V. All rights reserved.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The paper investigates which of Shannon’s measures (entropy, conditional entropy, mutual information) is the right one for the task of quantifying information flow in a programming language. We examine earlier relevant contributions from Denning, McLean and Gray and we propose and motivate a specific quantitative definition of information flow. We prove results relating equivalence relations, interference of program variables, independence of random variables and the flow of confidential information. Finally, we show how, in our setting, Shannon’s Perfect Secrecy theorem provides a sufficient condition to determine whether a program leaks confidential information.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

DDoS is a spy-on-spy game between attackers and detectors. Attackers are mimicking network traffic patterns to disable the detection algorithms which are based on these features. It is an open problem of discriminating the mimicking DDoS attacks from massive legitimate network accessing. We observed that the zombies use controlled function(s) to pump attack packages to the victim, therefore, the attack flows to the victim are always share some properties, e.g. packages distribution behaviors, which are not possessed by legitimate flows in a short time period. Based on this observation, once there appear suspicious flows to a server, we start to calculate the distance of the package distribution behavior among the suspicious flows. If the distance is less than a given threshold, then it is a DDoS attack, otherwise, it is a legitimate accessing. Our analysis and the preliminary experiments indicate that the proposed method- can discriminate mimicking flooding attacks from legitimate accessing efficiently and effectively.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The literature of communication and conflict is long and deep. However, it has focused primarily on cross-border conflict in the northern hemisphere. Not much academic research has been done on intra-state conflicts in general or on Asian conflicts in particular. This research on the Sri Lankan separatist conflict contributes towards filling this void.Newspaper reports in three languages on Operation Jayasikurui (1997) as well as on the capture of Elephant Pass (2000) were analyzed by trained coders with high reliability. In-depth interviews were conducted with Sri Lankan journalists and military personnel who participated in these incidents. Triangulation sources include Sri Lanka Army materials and the Sri Lanka Government Gazette.

Results clearly show that despite stringent governmental regulations, censorship had no effect on these Sri Lankan newspapers, which employed unique cultural techniques to circumvent these restrictions. Despite their apparent divergent ethnic backgrounds, all newspaper samples are consensual in their depiction of the conflict all the time while managing to set different agendas for their individual readerships. Media regulations could not impose censorship as proposed by Western theoretical constructs. Results show no correspondence between media samples and imposition of government or military policy. The press enjoyed freedom to convey war information to the public and exhibited a distinct streak of social responsibility in their watchdog instincts.Dominant Western propaganda models and theoretical perspectives do not apply to the Sri Lankan context. Understanding the cultural dimensions is essential before theorizing on media behaviour. No particular theoretical framework from the literature could be used to make inferences. One further interesting finding suggested from this research: Internal conflict within the Asian region may have its own unique theoretical perspective. The study concludes by proposing an alternative model.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The previous decade has been well known in Australia for the methodological wars. This culminated in a modest increase in interpretivist research. However, critical theory and postmodernist methodologies have not been taken up with any great enthusiasm both here in Australia or elsewhere. This paper attempts to outline the practical and historical reasons and the theoretical difficulties for the failure of these paradigms in contemporary IS. Secondly, it attempts to identify why IS must embrace these paradigms for the future, and the emerging postmodernist approaches in particular, in the light of the rise of ubiquitous information systems. The paper proposes a new set of research questions for the discipline.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This paper critically analyzes the use of Absorptive Capacity (ACAP) theory in information systems (IS) research. Drawing on a comprehensive review of the evolution of ACAP theory and models for the construct, we empirically investigate a number of ACAP-related papers published in reputable IS journals. The analysis involves four main areas: 1) summary analysis of ACAP in IS papers; 2) domains of ACAP usage; 3) analysis of hypotheses to show how ACAP is being used to explain various organizational phenomena in IS research; and 4) analysis of measures to gain insights into the operationalization of ACAP in IS research. This research advocates that organization-level ACAP should be applied as the dependent variable in studying the impact of IS. Furthermore, ACAP should be conceptualized as a “capability,” rather than an “asset.” This paper contributes to IS and ACAP studies by investigating and clearly specifying the utility of ACAP in IS research.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This paper describes a data mining environment for knowledge discovery in bioinformatics applications. The system has a generic kernel that implements the mining functions to be applied to input primary databases, with a warehouse architecture, of biomedical information. Both supervised and unsupervised classification can be implemented within the kernel and applied to data extracted from the primary database, with the results being suitably stored in a complex object database for knowledge discovery. The kernel also includes a specific high-performance library that allows designing and applying the mining functions in parallel machines. The experimental results obtained by the application of the kernel functions are reported. © 2003 Elsevier Ltd. All rights reserved.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The `Critically Endangered` Cone-billed Tanager Conothraupis mesoleuca was described in 71 93 9, based on a single specimen collected in the state of Mato Grosso, western Brazil. Not seen again in the wild until 2003, this poorly-known species was rediscovered in Emas National Park, in the Brazilian state of Goias. We describe here the discovery of a new population of Cone-billed Tanager in Chapada dos Parecis, along the upper Juruena River basin, in the state of Mato Grosso. The birds were always detected in (or near) flooded habitats along rivers. At least 40 individuals were found, but the population may be larger since areas of potential habitat are available in the upper Juruena basin and these have not yet been surveyed. We also provide here the first information on the biology and behaviour of the species based on observations in Juruena and Emas, as well as a first description of the female. Historical documents and our records support our suggestion that ""Juruena"", i.e. the type locality of the Cone-billed Tanager, refers to the Juruena telegraph station (12 degrees 50`S, 58 degrees 55`W). Considering that the range of the species is being settled, research on different aspects of its biology are urgent.