999 resultados para activation schemes
Resumo:
Purine compounds, such as caffeine, have many health-promoting properties and have proven to be beneficial in treating a number of different conditions. Theacrine, a purine alkaloid structurally similar to caffeine and abundantly present in Camellia kucha, has recently become of interest as a potential therapeutic compound. In the present study, theacrine was tested using a rodent behavioral model to investigate the effects of the drug on locomotor activity. Long Evans rats were injected with theacrine (24 or 48 mg/kg, i.p.) and activity levels were measured. Results showed that the highest dose of theacrine (48 mg/kg, i.p.) significantly increased locomotor activity compared to control animals and activity remained elevated throughout the duration of the session. To test for the involvement of adenosine receptors underlying theacrine's motor-activating properties, rats were administered a cocktail of the adenosine A₁ agonist, N⁶-cyclopentyladenosine (CPA; 0.1 mg/kg, i.p.) and A(2A) receptor agonist 2-p-(2-carboxyethyl)phenethylamino-5'-N-ethylcarboxamidoadenosine (CGS-21680; 0.2 mg/kg, i.p.). Pre-treatment with theacrine significantly attenuated the motor depression induced by the adenosine receptor agonists, indicating that theacrine is likely acting as an adenosine receptor antagonist. Next, we examined the role of DA D₁ and D₂ receptor antagonism on theacrine-induced hyperlocomotion. Both antagonists, D₁R SCH23390 (0.1 or 0.05 mg/kg, i.p.) and D₂R eticlopride (0.1 mg/kg, i.p.), significantly reduced theacrine-stimulated activity indicating that this behavioral response, at least in part, is mediated by DA receptors. In order to investigate the brain region where theacrine may be acting, the drug (10 or 20 μg) was infused bilaterally into nucleus accumbens (NAc). Theacrine enhanced activity levels in a dose-dependent manner, implicating a role of the NAc in modulating theacrine's effects on locomotion. In addition, theacrine did not induce locomotor sensitization or tolerance after chronic exposure. Taken together, these findings demonstrate that theacrine significantly enhances activity; an effect which is mediated by both the adenosinergic and dopaminergic systems.
Resumo:
The Balanced method was introduced as a class of quasi-implicit methods, based upon the Euler-Maruyama scheme, for solving stiff stochastic differential equations. We extend the Balanced method to introduce a class of stable strong order 1. 0 numerical schemes for solving stochastic ordinary differential equations. We derive convergence results for this class of numerical schemes. We illustrate the asymptotic stability of this class of schemes is illustrated and is compared with contemporary schemes of strong order 1. 0. We present some evidence on parametric selection with respect to minimising the error convergence terms. Furthermore we provide a convergence result for general Balanced style schemes of higher orders.
Resumo:
Proving security of cryptographic schemes, which normally are short algorithms, has been known to be time-consuming and easy to get wrong. Using computers to analyse their security can help to solve the problem. This thesis focuses on methods of using computers to verify security of such schemes in cryptographic models. The contributions of this thesis to automated security proofs of cryptographic schemes can be divided into two groups: indirect and direct techniques. Regarding indirect ones, we propose a technique to verify the security of public-key-based key exchange protocols. Security of such protocols has been able to be proved automatically using an existing tool, but in a noncryptographic model. We show that under some conditions, security in that non-cryptographic model implies security in a common cryptographic one, the Bellare-Rogaway model [11]. The implication enables one to use that existing tool, which was designed to work with a different type of model, in order to achieve security proofs of public-key-based key exchange protocols in a cryptographic model. For direct techniques, we have two contributions. The first is a tool to verify Diffie-Hellmanbased key exchange protocols. In that work, we design a simple programming language for specifying Diffie-Hellman-based key exchange algorithms. The language has a semantics based on a cryptographic model, the Bellare-Rogaway model [11]. From the semantics, we build a Hoare-style logic which allows us to reason about the security of a key exchange algorithm, specified as a pair of initiator and responder programs. The other contribution to the direct technique line is on automated proofs for computational indistinguishability. Unlike the two other contributions, this one does not treat a fixed class of protocols. We construct a generic formalism which allows one to model the security problem of a variety of classes of cryptographic schemes as the indistinguishability between two pieces of information. We also design and implement an algorithm for solving indistinguishability problems. Compared to the two other works, this one covers significantly more types of schemes, but consequently, it can verify only weaker forms of security.
Resumo:
INTRODUCTION: Hamstring strain injuries (HSI) are the predominant non-contact injury in many sports. Eccentric hamstring muscle weakness following intermittent running has been implicated within the aetiology of HSI. This weakness following intermittent running is often greater eccentrically than concentrically, however the cause of this unique, contraction mode specific phenomenon is unknown. AIM: To determine if this preferential eccentric decline in strength is caused by declines in voluntary hamstring muscle activation. METHODS: Fifteen recreationally active males completed 18 × 20m overground sprints. Maximal strength (concentric and eccentric knee flexor and concentric knee extensor) was determined isokinetically at the velocities of ±1800.s-1 and ±600.s- while hamstring muscle activation was assessed using surface electromyography, before and 15 minutes after the running protocol. RESULTS: Overground intermittent running caused greater eccentric (27.2 Nm; 95% CI = 11.2 to 43.3; p=0.0001) than concentric knee flexor weakness (9.3 Nm; 95% CI = -6.7 to 25.3; P=0.6361). Following the overground running, voluntary activation levels of the lateral hamstrings showed a significant decline (0.08%; 95% CI = 0.045 to 0.120; P<0.0001). In comparison, medial hamstring activation showed no change following intermittent running. CONCLUSION: Eccentric hamstring strength is decreased significantly following intermittent overground running. Voluntary activation deficits in the biceps femoris muscle are responsible for some portion of this weakness. The implications of this finding are significant because the biceps femoris muscle is the most frequently strained of all the hamstring muscles and because fatigue appears to play an important part in injury occurrence.
Resumo:
Hamstring strain injuries (HSI) are the predominant non-contact injury in many sports. Eccentric hamstring muscle weakness following intermittent running has been implicated within the aetiology of HSI. This weakness following intermittent running is often greater eccentrically than concentrically, however the cause of this unique, contraction mode specific phenomenon is unknown. PURPOSE: To determine if this preferential eccentric decline in strength is caused by declines in voluntary hamstring muscle activation. METHODS: Fifteen recreationally active males completed 18 × 20m overground sprints. Maximal strength (concentric and eccentric knee flexor and concentric knee extensor) was determined isokinetically at the velocities of ±1800.s-1 and ±600.s- while hamstring muscle activation was assessed using surface electromyography, before and 15 minutes after the running protocol. RESULTS: Overground intermittent running caused greater eccentric (27.2 Nm; 95% CI = 11.2 to 43.3; p=0.0001) than concentric knee flexor weakness (9.3 Nm; 95% CI = -6.7 to 25.3; P=0.6361). Following the overground running, voluntary activation levels of the lateral hamstrings showed a significant decline (0.08%; 95% CI = 0.045 to 0.120; P<0.0001). In comparison, medial hamstring activation showed an increased level of activation following intermittent running (0.12%; 95% CI = 0.049 to 0.030; P = 0.0102). CONCLUSION: Eccentric hamstring strength is decreased significantly following intermittent overground running. Voluntary activation deficits in the biceps femoris muscle are responsible for some portion of this weakness. The implications of this finding are significant because the biceps femoris muscle is the most frequently strained of all the hamstring muscles and because fatigue appears to play an important part in injury occurrence.
Resumo:
Introduction: Hamstring strain injuries (HSI) are the predominant non-contact injury in many sports. Eccentric hamstring muscle weakness following intermittent running has been implicated within the aetiology of HSI. This weakness following intermittent running is sometimes greater eccentrically than concentrically, however the cause of this unique, contraction mode specific phenomenon is unknown. The purpose of this research was to determine whether declines in knee flexor strength following overground repeat sprints are caused by declines in voluntary activation of the hamstring muscles. Methods: Seventeen recreationally active males completed 3 sets of 6 by 20m overground sprints. Maximal isokinetic concentric and eccentric knee flexor and concentric knee extensor strength was determined at ±1800.s-1 and ±600.s-1 while hamstring muscle activation was assessed using surface electromyography, before and 15 minutes after the running protocol. Results: Overground repeat sprint running resulted in a significant decline in eccentric knee flexor strength (31.1 Nm; 95% CI = 21.8 to 40.3 Nm; p < 0.001). However, concentric knee flexor strength was not significantly altered (11.1 Nm; 95% CI= -2.8 to 24.9; p=0.2294). Biceps femoris voluntary activation levels displayed a significant decline eccentrically (0.067; 95% CI=0.002 to 0.063; p=0.0325). However, there was no significant decline concentrically (0.025; 95% CI=-0.018 to 0.043; p=0.4243) following sprinting. Furthermore, declines in average peak torque at -1800.s-1 could be explained by changes in hamstring activation (R2 = 0.70). Moreover, it was change in the lateral hamstring muscle activity that was related to the decrease in knee flexor torque (p = 0.0144). In comparison, medial hamstring voluntary activation showed no change for either eccentric (0.06; 95% CI = -0.033 to 0.102; p=0.298) or concentric (0.09; 95% CI = -0.03 to 0.16; p=0.298) muscle actions following repeat sprinting. Discussion: Eccentric hamstring strength is decreased significantly following overground repeat sprinting. Voluntary activation deficits in the biceps femoris muscle explain a large portion of this weakness. The implications of these findings are significant as the biceps femoris muscle is the most frequently strained of the knee flexors and fatigue is implicated in the aetiology of this injury.
Resumo:
Background: Hamstring strain injuries (HSI) are prevalent in sport and re-injury rates have been high for many years. Maladaptation following HSI are implicated in injury recurrence however nervous system function following HSI has received little attention. Aim: To determine if recreational athletes with a history of unilateral HSI, who have returned to training and competition, will exhibit lower levels of voluntary activation (VA) and median power frequency (MPF) in the previously injured limb compared to the uninjured limb at long muscle lengths. Methods: Twenty-eight recreational athletes were recruited. Of these, 13 athletes had a history of unilateral HSI and 15 had no history of HSI. Following familiarisation, all athletes undertook isokinetic dynamometry testing and surface electromyography assessment of the biceps femoris long head and medial hamstrings during concentric and eccentric contractions at ± 180 and ± 60deg/s. Results: The previously injured limb was weaker at all contraction speeds compared to the uninjured limb (+180deg/s mean difference(MD) = 9.3Nm, p = 0.0036; +60deg/s MD = 14.0Nm, p = 0.0013; -60deg/s MD = 18.3Nm, p = 0.0007; -180deg/s MD = 20.5Nm, p = 0.0007) whilst VA was only lower in the biceps femoris long head during eccentric contractions (-60deg/s MD = 0.13, p = 0.0025; -180deg/s MD = 0.13, p = 0.0003). There were no between limb differences in medial hamstring VA or MPF from either biceps femoris long head or medial hamstrings in the injured group. The uninjured group showed no between limb differences with any of the tested variables. Conclusion: Previously injured hamstrings were weaker than the contralateral uninjured hamstring at all tested speeds and contraction modes. During eccentric contractions biceps femoris long head VA was lower in the previously injured limb suggesting neural control of biceps femoris long head may be altered following HSI. Current rehabilitation practices have been unsuccessful in restoring strength and VA following HSI. Restoration of these markers should be considered when determining the success of rehabilitation from HSI. Further investigations are required to elucidate the full impact of lower levels of biceps femoris long head VA following HSI on rehabilitation outcomes and re-injury risk.
Resumo:
Free association norms indicate that words are organized into semantic/associative neighborhoods within a larger network of words and links that bind the net together. We present evidence indicating that memory for a recent word event can depend on implicitly and simultaneously activating related words in its neighborhood. Processing a word during encoding primes its network representation as a function of the density of the links in its neighborhood. Such priming increases recall and recognition and can have long lasting effects when the word is processed in working memory. Evidence for this phenomenon is reviewed in extralist cuing, primed free association, intralist cuing, and single-item recognition tasks. The findings also show that when a related word is presented to cue the recall of a studied word, the cue activates it in an array of related words that distract and reduce the probability of its selection. The activation of the semantic network produces priming benefits during encoding and search costs during retrieval. In extralist cuing recall is a negative function of cue-to-distracter strength and a positive function of neighborhood density, cue-to-target strength, and target-to cue strength. We show how four measures derived from the network can be combined and used to predict memory performance. These measures play different roles in different tasks indicating that the contribution of the semantic network varies with the context provided by the task. We evaluate spreading activation and quantum-like entanglement explanations for the priming effect produced by neighborhood density.
Resumo:
Infrastructure forms a vital component in supporting today’s way of life and has a significant role or impact on economic, environmental and social outcomes of the region around it. The design, construction and operation of such assets are a multi-billion dollar industry in Australia alone. Another issue that will play a major role in our way life is that of climate change and the greater concept of sustainability. With limited resources and a changing natural world it is necessary for infrastructure to be developed and maintained in a manner that is sustainable. In order to achieve infrastructure sustainability in operations it is necessary for there to be: a sustainability assessment scheme that provides a scientifically sound and realistic approach to measuring an assets level of sustainability; and, systems and tools to support the making of decisions that result in sustainable outcomes by providing feedback in a timely manner. Having these in place will then help drive the consideration of sustainability during the decision making process for infrastructure operations and maintenance. In this paper we provide two main contributions; a comparison and review of sustainability assessment schemes for infrastructure and their suitability for use in the operations phase; and, a review of decision support systems/tools in the area of infrastructure sustainability in operations. For this paper, sustainability covers not just the environment, but also finance/economic and societal/community aspects as well. This is often referred to as the Triple Bottom Line and forms one of the three dimensions of corporate sustainability [Stapledon, 2004].
Resumo:
Secure communications in distributed Wireless Sensor Networks (WSN) operating under adversarial conditions necessitate efficient key management schemes. In the absence of a priori knowledge of post-deployment network configuration and due to limited resources at sensor nodes, key management schemes cannot be based on post-deployment computations. Instead, a list of keys, called a key-chain, is distributed to each sensor node before the deployment. For secure communication, either two nodes should have a key in common in their key-chains, or they should establish a key through a secure-path on which every link is secured with a key. We first provide a comparative survey of well known key management solutions for WSN. Probabilistic, deterministic and hybrid key management solutions are presented, and they are compared based on their security properties and re-source usage. We provide a taxonomy of solutions, and identify trade-offs in them to conclude that there is no one size-fits-all solution. Second, we design and analyze deterministic and hybrid techniques to distribute pair-wise keys to sensor nodes before the deployment. We present novel deterministic and hybrid approaches based on combinatorial design theory and graph theory for deciding how many and which keys to assign to each key-chain before the sensor network deployment. Performance and security of the proposed schemes are studied both analytically and computationally. Third, we address the key establishment problem in WSN which requires key agreement algorithms without authentication are executed over a secure-path. The length of the secure-path impacts the power consumption and the initialization delay for a WSN before it becomes operational. We formulate the key establishment problem as a constrained bi-objective optimization problem, break it into two sub-problems, and show that they are both NP-Hard and MAX-SNP-Hard. Having established inapproximability results, we focus on addressing the authentication problem that prevents key agreement algorithms to be used directly over a wireless link. We present a fully distributed algorithm where each pair of nodes can establish a key with authentication by using their neighbors as the witnesses.
Resumo:
Modelling how a word is activated in human memory is an important requirement for determining the probability of recall of a word in an extra-list cueing experiment. Previous research assumed a quantum-like model in which the semantic network was modelled as entangled qubits, however the level of activation was clearly being over-estimated. This paper explores three variations of this model, each of which are distinguished by a scaling factor designed to compensate the overestimation.
Resumo:
We report a comprehensive theoretical study on reaction of methane by Fe4 cluster. This Letter gains insight into the mechanism of the reaction and indicate the Fe4 cluster has strong catalytic effect on the activation reaction of methane. In detail, the results show the cleavage of the first C–H bond is both an energetically and kinetically favourable process and the breaking of the second C–H is the rate-determining step. Moreover, our Letter demonstrates that the different cluster size of iron can not only determine the catalytic activity of methane but also control the product selectivity.