943 resultados para control mechanisms


Relevância:

30.00% 30.00%

Publicador:

Resumo:

Mineral and chemical composition of alluvial Upper-Pleistocene deposits from the Alto Guadalquivir Basin (SE Spain) were studied as a tool to identify sedimentary and geomorphological processes controlling its formation. Sediments located upstream, in the north-eastern sector of the basin, are rich in dolomite, illite, MgO and KB2BO. Downstream, sediments at the sequence base are enriched in calcite, smectite and CaO, whereas the upper sediments have similar features to those from upstream. Elevated rare-earth elements (REE) values can be related to low carbonate content in the sediments and the increase of silicate material produced and concentrated during soil formation processes in the neighbouring source areas. Two mineralogical and geochemical signatures related to different sediment source areas were identified. Basal levels were deposited during a predominantly erosive initial stage, and are mainly composed of calcite and smectite materials enriched in REE coming from Neogene marls and limestones. Then the deposition of the upper levels of the alluvial sequences, made of dolomite and illitic materials depleted in REE coming from the surrounding Sierra de Cazorla area took place during a less erosive later stage of the fluvial system. Such modification was responsible of the change in the mineralogical and geochemical composition of the alluvial sediments.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Desde la llegada de la revolución bioteconológica en la agricultura mundial, las corporaciones semilleras-agroquímicas han avanzado en el control del mercado internacional de alimentos, a partir de diversos mecanismos, entre ellos el de la legislación de derechos de propiedad intelectual. En América Latina, distintos gobiernos han procurado adecuar la legislación nacional a estas tendencias internacionales, con resultado dispar, ya que se ha generado una fuerte resistencia desde organizaciones populares. Argentina, un país de temprana inserción en el mercado internacional de alimentos y de rápida adopción de los derechos de obtentor, está atravesado hoy por una nueva fase de esta disputa, ante la posible sanción de una nueva Ley de Semillas, en la que empresa estadounidense Monsanto está involucrada. Este trabajo hace un repaso del panorama actual desde un punto de vista geográfico, prestando especial atención a las estrategias de las organizaciones que se oponen a la nueva legislación.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Schistosomiasis, caused by blood flukes of the genus Schistosoma, is a major public health problem which contributes substantially to the economic and financial burdens of many nations in the developing world. An array of survival strategies, such as the unique structure of the tegument which acts as a major host-parasite interface, immune modulation mechanisms, gene regulation, and apoptosis and self-renewal have been adopted by schistosome parasites over the course of long-term evolution with their mammalian definitive hosts. Recent generation of complete schistosome genomes together with numerous biological, immunological, high-throughput "-omics" and gene function studies have revealed the Tao or strategies that schistosomes employ not only to promote long-term survival, but also to ensure effective life cycle transmission. New scenarios for the future control of this important neglected tropical disease will present themselves as our understanding of these Tao increases.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Despite consistent research into the molecular principles of the DNA damage repair pathway for almost two decades, it has only recently been found that RNA metabolism is very tightly related to this pathway, and the two ancient biochemical mechanisms act in alliance to maintain cellular genomic integrity. The close links between these pathways are well exemplified by examining the base excision repair pathway, which is now well known for dual roles of many of its members in DNA repair and RNA surveillance, including APE1, SMUG1, and PARP1. With additional links between these pathways steadily emerging, this review aims to provide a summary of the emerging roles for DNA repair proteins in the post-transcriptional regulation of RNAs. 

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The construction industry requires quality control and regulation of its contingent,unpredictable environment. However, taking too much control from workers candisempower and demotivate. In the 1970s Deci and Ryan developed selfdeterminationtheory which states that in order to be intrinsically motivated, threecomponents are necessary - competence, autonomy and relatedness. This study aimsto examine the way in which the three ‘nutriments’ for intrinsic motivation may beundermined by heavy-handed quality control. A critical literature review analysesconstruction, psychological and management research regarding the control andmotivation of workers, using self-determination theory as a framework. Initialfindings show that quality management systems do not always work as designed.Workers perceive that unnecessary, wasteful and tedious counter checking of theirwork implies that they are not fully trusted by management to work without oversight.Control of workers and pressure for continual improvement may lead to resistanceand deception. Controlling mechanisms can break the link between performance andsatisfaction, reducing motivation and paradoxically reducing the likelihood of thequality they intend to promote. This study will lead to a greater understanding ofcontrol and motivation, facilitating further research into improvements in theapplication of quality control to maintain employee motivation.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Thesis (Ph.D.)--University of Washington, 2016-08

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Thesis (Ph.D.)--University of Washington, 2016-08

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Interactive applications do not require more bandwidth to go faster. Instead, they require less latency. Unfortunately, the current design of transport protocols such as TCP limits possible latency reductions. In this paper we evaluate and compare different loss recovery enhancements to fight tail loss latency. The two recently proposed mechanisms "RTO Restart" (RTOR) and "Tail Loss Probe" (TLP) as well as a new mechanism that applies the logic of RTOR to the TLP timer management (TLPR) are considered. The results show that the relative performance of RTOR and TLP when tail loss occurs is scenario dependent, but with TLP having potentially larger gains. The TLPR mechanism reaps the benefits of both approaches and in most scenarios it shows the best performance.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The last two decades have seen many exciting examples of tiny robots from a few cm3 to less than one cm3. Although individually limited, a large group of these robots has the potential to work cooperatively and accomplish complex tasks. Two examples from nature that exhibit this type of cooperation are ant and bee colonies. They have the potential to assist in applications like search and rescue, military scouting, infrastructure and equipment monitoring, nano-manufacture, and possibly medicine. Most of these applications require the high level of autonomy that has been demonstrated by large robotic platforms, such as the iRobot and Honda ASIMO. However, when robot size shrinks down, current approaches to achieve the necessary functions are no longer valid. This work focused on challenges associated with the electronics and fabrication. We addressed three major technical hurdles inherent to current approaches: 1) difficulty of compact integration; 2) need for real-time and power-efficient computations; 3) unavailability of commercial tiny actuators and motion mechanisms. The aim of this work was to provide enabling hardware technologies to achieve autonomy in tiny robots. We proposed a decentralized application-specific integrated circuit (ASIC) where each component is responsible for its own operation and autonomy to the greatest extent possible. The ASIC consists of electronics modules for the fundamental functions required to fulfill the desired autonomy: actuation, control, power supply, and sensing. The actuators and mechanisms could potentially be post-fabricated on the ASIC directly. This design makes for a modular architecture. The following components were shown to work in physical implementations or simulations: 1) a tunable motion controller for ultralow frequency actuation; 2) a nonvolatile memory and programming circuit to achieve automatic and one-time programming; 3) a high-voltage circuit with the highest reported breakdown voltage in standard 0.5 μm CMOS; 4) thermal actuators fabricated using CMOS compatible process; 5) a low-power mixed-signal computational architecture for robotic dynamics simulator; 6) a frequency-boost technique to achieve low jitter in ring oscillators. These contributions will be generally enabling for other systems with strict size and power constraints such as wireless sensor nodes.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Jerne's idiotypic network theory postulates that the immune response involves inter-antibody stimulation and suppression as well as matching to antigens. The theory has proved the most popular Artificial Immune System (AIS) model for incorporation into behavior-based robotics but guidelines for implementing idiotypic selection are scarce. Furthermore, the direct effects of employing the technique have not been demonstrated in the form of a comparison with non-idiotypic systems. This paper aims to address these issues. A method for integrating an idiotypic AIS network with a Reinforcement Learning based control system (RL) is described and the mechanisms underlying antibody stimulation and suppression are explained in detail. Some hypotheses that account for the network advantage are put forward and tested using three systems with increasing idiotypic complexity. The basic RL, a simplified hybrid AIS-RL that implements idiotypic selection independently of derived concentration levels and a full hybrid AIS-RL scheme are examined. The test bed takes the form of a simulated Pioneer robot that is required to navigate through maze worlds detecting and tracking door markers.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Jerne's idiotypic network theory postulates that the immune response involves inter-antibody stimulation and suppression as well as matching to antigens. The theory has proved the most popular Artificial Immune System (AIS) model for incorporation into behavior-based robotics but guidelines for implementing idiotypic selection are scarce. Furthermore, the direct effects of employing the technique have not been demonstrated in the form of a comparison with non-idiotypic systems. This paper aims to address these issues. A method for integrating an idiotypic AIS network with a Reinforcement Learning based control system (RL) is described and the mechanisms underlying antibody stimulation and suppression are explained in detail. Some hypotheses that account for the network advantage are put forward and tested using three systems with increasing idiotypic complexity. The basic RL, a simplified hybrid AIS-RL that implements idiotypic selection independently of derived concentration levels and a full hybrid AIS-RL scheme are examined. The test bed takes the form of a simulated Pioneer robot that is required to navigate through maze worlds detecting and tracking door markers.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

New devices were designed to generate a localized mechanical vibration of flexible gels where human umbilical vein endothelial cells (HUVECs) were cultured. The stimulation setups were able to apply relatively large strains (30%~50%) at high temporal frequencies (140~207 Hz) in a localized subcellular region. One of the advantages of this technique was to be less invasive to the innate cellular functions because there was no direct contact between the stimulating probe and the cell body. A mechanical vibration induced by the device in the substrate gel where cells were seeded could mainly cause global calcium responses of the cells. This global response was initiated by the influx of calcium across the stretch-activated channels in the plasma membrane. The subsequent production of inositol triphosphate (IP3) via phospholipase C (PLC) activation triggered the calcium release from the endoplasmic reticulum (ER) to cause a global intracellular calcium fluctuation over the whole cell body. This global calcium response was also shown to depend on actomyosin contractility and F-actin integrity, probably controlling the membrane stretch-activated channels. The localized nature of the stimulation is one of the most important features of these new designs as it allowed the observation of the calcium signaling propagation by ER calcium release. The next step was to focus on the calcium influx, more specifically the TRPM7 channels. As TRPM7 expression may modulate cell adhesion, an adhesion assay was developed and tested on HUVECs seeded on gel substrates with different treatments: normal treatment on gels showed highest attachment rate, followed by the partially treated gels (only 5% of usual fibronectin amount) and untreated gels, with the lowest attachment rate. The trend of the attachment rates correlated to the magnitude of the calcium signaling observed after mechanical stimulation. TRPM7 expression inhibition by siRNA caused an increased attachment rate when compared to both control and non-targeting siRNA-treated cells, but resulted in an actual weaker response in terms of calcium signaling. It suggests that TRPM7 channels are indeed important for the calcium signaling in response to mechanical stimulation. A complementary study was also conducted consisting in the mechanical stimulation of a dissected Drosophila embryo. Although ionomycin treatment showed calcium influx in the tissue, the mechanical stimulation delivered as a vertical vibration did not elicited calcium signaling in response. One possible reason is the dissection procedure causing desensitization of the tissue due to the scrapings and manipulations to open the embryo.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

In database applications, access control security layers are mostly developed from tools provided by vendors of database management systems and deployed in the same servers containing the data to be protected. This solution conveys several drawbacks. Among them we emphasize: 1) if policies are complex, their enforcement can lead to performance decay of database servers; 2) when modifications in the established policies implies modifications in the business logic (usually deployed at the client-side), there is no other possibility than modify the business logic in advance and, finally, 3) malicious users can issue CRUD expressions systematically against the DBMS expecting to identify any security gap. In order to overcome these drawbacks, in this paper we propose an access control stack characterized by: most of the mechanisms are deployed at the client-side; whenever security policies evolve, the security mechanisms are automatically updated at runtime and, finally, client-side applications do not handle CRUD expressions directly. We also present an implementation of the proposed stack to prove its feasibility. This paper presents a new approach to enforce access control in database applications, this way expecting to contribute positively to the state of the art in the field.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

In database applications, access control security layers are mostly developed from tools provided by vendors of database management systems and deployed in the same servers containing the data to be protected. This solution conveys several drawbacks. Among them we emphasize: (1) if policies are complex, their enforcement can lead to performance decay of database servers; (2) when modifications in the established policies implies modifications in the business logic (usually deployed at the client-side), there is no other possibility than modify the business logic in advance and, finally, 3) malicious users can issue CRUD expressions systematically against the DBMS expecting to identify any security gap. In order to overcome these drawbacks, in this paper we propose an access control stack characterized by: most of the mechanisms are deployed at the client-side; whenever security policies evolve, the security mechanisms are automatically updated at runtime and, finally, client-side applications do not handle CRUD expressions directly. We also present an implementation of the proposed stack to prove its feasibility. This paper presents a new approach to enforce access control in database applications, this way expecting to contribute positively to the state of the art in the field.