959 resultados para time domain windowing


Relevância:

30.00% 30.00%

Publicador:

Resumo:

A minimal model of species migration is presented which takes the form of a parabolic equation with boundary conditions and initial data. Solutions to the differential problem are obtained that can be used to describe the small- and large-time evolution of a species distribution within a bounded domain. These expressions are compared with the results of numerical simulations and are found to be satisfactory within appropriate temporal regimes. The solutions presented can be used to describe existing observations of nematode distributions, can be used as the basis for further work on nematode migration, and may also be interpreted more generally.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

We report on the first realtime ionospheric predictions network and its capabilities to ingest a global database and forecast F-layer characteristics and "in situ" electron densities along the track of an orbiting spacecraft. A global network of ionosonde stations reported around-the-clock observations of F-region heights and densities, and an on-line library of models provided forecasting capabilities. Each model was tested against the incoming data; relative accuracies were intercompared to determine the best overall fit to the prevailing conditions; and the best-fit model was used to predict ionospheric conditions on an orbit-to-orbit basis for the 12-hour period following a twice-daily model test and validation procedure. It was found that the best-fit model often provided averaged (i.e., climatologically-based) accuracies better than 5% in predicting the heights and critical frequencies of the F-region peaks in the latitudinal domain of the TSS-1R flight path. There was a sharp contrast however, in model-measurement comparisons involving predictions of actual, unaveraged, along-track densities at the 295 km orbital altitude of TSS-1R In this case, extrema in the first-principle models varied by as much as an order of magnitude in density predictions, and the best-fit models were found to disagree with the "in situ" observations of Ne by as much as 140%. The discrepancies are interpreted as a manifestation of difficulties in accurately and self-consistently modeling the external controls of solar and magnetospheric inputs and the spatial and temporal variabilities in electric fields, thermospheric winds, plasmaspheric fluxes, and chemistry.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

High-resolution simulations over a large tropical domain (∼20◦S–20◦N and 42◦E–180◦E) using both explicit and parameterized convection are analyzed and compared during a 10-day case study of an active Madden-Julian Oscillation (MJO) event. In Part II, the moisture budgets and moist entropy budgets are analyzed. Vertical subgrid diabatic heating profiles and vertical velocity profiles are also compared; these are related to the horizontal and vertical advective components of the moist entropy budget which contribute to gross moist stability, GMS, and normalized GMS (NGMS). The 4-km model with explicit convection and good MJO performance has a vertical heating structure that increases with height in the lower troposphere in regions of strong convection (like observations), whereas the 12-km model with parameterized convection and a poor MJO does not show this relationship. The 4-km explicit convection model also has a more top-heavy heating profile for the troposphere as a whole near and to the west of the active MJO-related convection, unlike the 12-km parameterized convection model. The dependence of entropy advection components on moisture convergence is fairly weak in all models, and differences between models are not always related to MJO performance, making comparisons to previous work somewhat inconclusive. However, models with relatively good MJO strength and propagation have a slightly larger increase of the vertical advective component with increasing moisture convergence, and their NGMS vertical terms have more variability in time and longitude, with total NGMS that is comparatively larger to the west and smaller to the east.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Medication safety and errors are a major concern in care homes. In addition to the identification of incidents, there is a need for a comprehensive system description to avoid the danger of introducing interventions that have unintended consequences and are therefore unsustainable. The aim of the study was to explore the impact and uniqueness of Work Domain Analysis (WDA) to facilitate an in-depth understanding of medication safety problems within the care home system and identify the potential benefits of WDA to design safety interventions to improve medication safety. A comprehensive, systematic and contextual overview of the care home medication system was developed for the first time. The novel use of the Abstraction Hierarchy (AH) to analyse medication errors revealed the value of the AH to guide a comprehensive analysis of errors and generate system improvement recommendations that took into account the contextual information of the wider system.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The goal of this work is the efficient solution of the heat equation with Dirichlet or Neumann boundary conditions using the Boundary Elements Method (BEM). Efficiently solving the heat equation is useful, as it is a simple model problem for other types of parabolic problems. In complicated spatial domains as often found in engineering, BEM can be beneficial since only the boundary of the domain has to be discretised. This makes BEM easier than domain methods such as finite elements and finite differences, conventionally combined with time-stepping schemes to solve this problem. The contribution of this work is to further decrease the complexity of solving the heat equation, leading both to speed gains (in CPU time) as well as requiring smaller amounts of memory to solve the same problem. To do this we will combine the complexity gains of boundary reduction by integral equation formulations with a discretisation using wavelet bases. This reduces the total work to O(h

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The heat conduction problem, in the presence of a change of state, was solved for the case of an indefinitely long cylindrical layer cavity. As boundary conditions, it is imposed that the internal surface of the cavity is maintained below the fusion temperature of the infilling substance and the external surface is kept above it. The solution, obtained in nondimensional variables, consists in two closed form heat conduction equation solutions for the solidified and liquid regions, which formally depend of the, at first, unknown position of the phase change front. The energy balance through the phase change front furnishes the equation for time dependence of the front position, which is numerically solved. Substitution of the front position for a particular instant in the heat conduction equation solutions gives the temperature distribution inside the cavity at that moment. The solution is illustrated with numerical examples. [DOI: 10.1115/1.4003542]

Relevância:

30.00% 30.00%

Publicador:

Resumo:

We study stochastic billiards on general tables: a particle moves according to its constant velocity inside some domain D R(d) until it hits the boundary and bounces randomly inside, according to some reflection law. We assume that the boundary of the domain is locally Lipschitz and almost everywhere continuously differentiable. The angle of the outgoing velocity with the inner normal vector has a specified, absolutely continuous density. We construct the discrete time and the continuous time processes recording the sequence of hitting points on the boundary and the pair location/velocity. We mainly focus on the case of bounded domains. Then, we prove exponential ergodicity of these two Markov processes, we study their invariant distribution and their normal (Gaussian) fluctuations. Of particular interest is the case of the cosine reflection law: the stationary distributions for the two processes are uniform in this case, the discrete time chain is reversible though the continuous time process is quasi-reversible. Also in this case, we give a natural construction of a chord ""picked at random"" in D, and we study the angle of intersection of the process with a (d - 1) -dimensional manifold contained in D.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The genome sequence of Aedes aegypti was recently reported. A significant amount of Expressed Sequence Tags (ESTs) were sequenced to aid in the gene prediction process. In the present work we describe an integrated analysis of the genomic and EST data, focusing on genes with preferential expression in larvae (LG), adults (AG) and in both stages (SG). A total of 913 genes (5.4% of the transcript complement) are LG, including ion transporters and cuticle proteins that are important for ion homeostasis and defense. From a starting set of 245 genes encoding the trypsin domain, we identified 66 putative LG, AG, and SG trypsins by manual curation. Phylogenetic analyses showed that AG trypsins are divergent from their larval counterparts (LG), grouping with blood-induced trypsins from Anopheles gambiae and Simulium vittatum. These results support the hypothesis that blood-feeding arose only once, in the ancestral Culicomorpha. Peritrophins are proteins that interlock chitin fibrils to form the peritrophic membrane (PM) that compartmentalizes the food in the midgut. These proteins are recognized by having chitin-binding domains with 6 conserved Cys and may also present mucin-like domains (regions expected to be highly O-glycosylated). PM may be formed by a ring of cells (type 2, seen in Ae. aegypti larvae and Drosophila melanogaster) or by most midgut cells (type 1, found in Ae. aegypti adult and Tribolium castaneum). LG and D. melanogaster peritrophins have more complex domain structures than AG and T. castaneum peritrophins. Furthermore, mucin-like domains of peritrophins from T. castaneum (feeding on rough food) are lengthier than those of adult Ae. aegypti (blood-feeding). This suggests, for the first time, that type 1 and type 2 PM may have variable molecular architectures determined by different peritrophins and/or ancillary proteins, which may be partly modulated by diet.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The rapid development of data transfer through internet made it easier to send the data accurate and faster to the destination. There are many transmission media to transfer the data to destination like e-mails; at the same time it is may be easier to modify and misuse the valuable information through hacking. So, in order to transfer the data securely to the destination without any modifications, there are many approaches like cryptography and steganography. This paper deals with the image steganography as well as with the different security issues, general overview of cryptography, steganography and digital watermarking approaches.  The problem of copyright violation of multimedia data has increased due to the enormous growth of computer networks that provides fast and error free transmission of any unauthorized duplicate and possibly manipulated copy of multimedia information. In order to be effective for copyright protection, digital watermark must be robust which are difficult to remove from the object in which they are embedded despite a variety of possible attacks. The message to be send safe and secure, we use watermarking. We use invisible watermarking to embed the message using LSB (Least Significant Bit) steganographic technique. The standard LSB technique embed the message in every pixel, but my contribution for this proposed watermarking, works with the hint for embedding the message only on the image edges alone. If the hacker knows that the system uses LSB technique also, it cannot decrypt correct message. To make my system robust and secure, we added cryptography algorithm as Vigenere square. Whereas the message is transmitted in cipher text and its added advantage to the proposed system. The standard Vigenere square algorithm works with either lower case or upper case. The proposed cryptography algorithm is Vigenere square with extension of numbers also. We can keep the crypto key with combination of characters and numbers. So by using these modifications and updating in this existing algorithm and combination of cryptography and steganography method we develop a secure and strong watermarking method. Performance of this watermarking scheme has been analyzed by evaluating the robustness of the algorithm with PSNR (Peak Signal to Noise Ratio) and MSE (Mean Square Error) against the quality of the image for large amount of data. While coming to see results of the proposed encryption, higher value of 89dB of PSNR with small value of MSE is 0.0017. Then it seems the proposed watermarking system is secure and robust for hiding secure information in any digital system, because this system collect the properties of both steganography and cryptography sciences.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Fundação de Amparo à Pesquisa do Estado de São Paulo (FAPESP)

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Fundação de Amparo à Pesquisa do Estado de São Paulo (FAPESP)

Relevância:

30.00% 30.00%

Publicador:

Resumo:

In this paper, we prove the exponential decay as time goes to infinity of regular solutions of the problem for the Kirchhoff wave equation with nonlocal condition and weak dampingu(tt) - M (\\delU\\(2)(2)) Deltau + integral(0)(t) g(t - s)Deltau(.,s) ds + alphau(t) = 0, in (Q) over cap,where (Q) over cap is a noncylindrical domain of Rn+1 (n greater than or equal to 1) with the lateral boundary (&USigma;) over cap and alpha is a positive constant. (C) 2004 Elsevier Ltd. All rights reserved.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Tensor3D is a geometric modeling program with the capacity to simulate and visualize in real-time the deformation, specified through a tensor matrix and applied to triangulated models representing geological bodies. 3D visualization allows the study of deformational processes that are traditionally conducted in 2D, such as simple and pure shears. Besides geometric objects that are immediately available in the program window, the program can read other models from disk, thus being able to import objects created with different open-source or proprietary programs. A strain ellipsoid and a bounding box are simultaneously shown and instantly deformed with the main object. The principal axes of strain are visualized as well to provide graphical information about the orientation of the tensor's normal components. The deformed models can also be saved, retrieved later and deformed again, in order to study different steps of progressive strain, or to make this data available to other programs. The shape of stress ellipsoids and the corresponding Mohr circles defined by any stress tensor can also be represented. The application was written using the Visualization ToolKit, a powerful scientific visualization library in the public domain. This development choice, allied to the use of the Tcl/Tk programming language, which is independent on the host computational platform, makes the program a useful tool for the study of geometric deformations directly in three dimensions in teaching as well as research activities. (C) 2007 Elsevier Ltd. All rights reserved.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Recent structural investigations and geochronological studies of rocks from the Médio Coreaú domain in the NW part of northeast Brazil's Borborema Province provide important constraints on the tectonic evolution of the region both preceeding and during the assembly of West Gondwana. Field observations of structural features and fabrics have revealed the presence of four distinct deformational phases in the MCD: D1, D2, D3 and D4. Only the early Paleoproterozoic gneisses record the D1 tectonic event and its preservation is cryptic owing to strong overprinting by the subsequent tectonic phases. The D2, D3 and D4 events affected younger supracrustal rocks and Neoproterzoic magmatic units, and U-Pb geochronological constraints show that all of these tectonic phases represent deformational events that occurred during Brasiliano collision between the West African craton and the NW part of the Borborema Province. The D2 phase, lasting between ca. 622 and 591 Ma, represents a frontal collision stage, which generated NW verging thrust-nappe systems, low-angle foliation, high-grade metamorphism and crustal anatexis. Transition to a strike-slip regime (D3) occurred at around 591 Ma when the region entered a phase of escape tectonics. During this time, the motion of crustal blocks towards NE and E was accommodated along numerous anastomosing shear zones. Syntectonic emplacement of granitoid plutons took place in transtensional domains of the shear zone system. The intrusion of late tectonic granitoids and rapid uplift and cooling of the orogen around 560 Ma as a result of D4 transpressional movements marked the end of the D3 transcurrent regime. These findings show that only the early Paleoproterozoic gneisses in the Médio Coreaú domain are polycyclic in nature. Rather than representing distinct orogenic events, the D2, D3 and D4 tectonic phases are a manifestation of progressive deformational events that developed in response to changes in the regional stress field during convergence and collision between the Borborema Province and its surrounding cratons.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Kaposi's sarcoma-associated herpesvirus (KSHV/human herpesvirus 8 [HHV8]) and Epstein-Barr virus (EBV/HHV4) are distantly related gammaherpesviruses causing tumors in humans. KSHV latency-associated nuclear antigen 1 (LANA1) is functionally similar to the EBV nuclear antigen-1 (EBNA1) protein expressed during viral latency, although they have no amino acid similarities. EBNA1 escapes cytotoxic lymphocyte (CTL) antigen processing by inhibiting its own proteosomal degradation and retarding its own synthesis to reduce defective ribosomal product processing. We show here that the LANA1 QED-rich central repeat (CR) region, particularly the CR2CR3 subdomain, also retards LANA1 synthesis and markedly enhances LANA1 stability in vitro and in vivo. LANA1 isoforms have half-lives greater than 24 h, and fusion of the LANA1 CR2CR3 domain to a destabilized heterologous protein markedly decreases protein turnover. Unlike EBNA1, the LANA1 CR2CR3 subdomain retards translation regardless of whether it is fused to the 5′ or 3′ end of a heterologous gene construct. Manipulation of sequence order, orientation, and composition of the CR2 and CR3 subdomains suggests that specific peptide sequences rather than RNA structures are responsible for synthesis retardation. Although mechanistic differences exist between LANA1 and EBNA1, the primary structures of both proteins have evolved to minimize provoking CTL immune responses. Simple strategies to eliminate these viral inhibitory regions may markedly improve vaccine effectiveness by maximizing CTL responses. Copyright © 2007, American Society for Microbiology. All Rights Reserved.