941 resultados para Sistemi multiagente, Artefatti, Coordinazione basata su tuple, ReSpecT
Resumo:
We derive a class of inequalities for detecting entanglement in the mixed SU(2) and SU(1, 1) systems based on the Schrodinger-Robertson indeterminacy relations in conjugation with the partial transposition. These inequalities are in general stronger than those based on the usual Heisenberg uncertainty relations for detecting entanglement. Furthermore, based on the complete reduction from SU(2) and SU(1,1) systems to bosonic systems, we derive some entanglement conditions for two-mode systems. We also use the partial reduction to obtain some inequalities in the mixed SU(2) (or SU(1, 1)) and bosonic systems.
Resumo:
We give a general SU(2)(L) x SU(2)(R) x U(1)(EM) sigma model with external sources, dynamical breaking and spontaneous vacuum symmetry breaking, and present the general formulation of the model. It is found that sigma and pi(0) without electric charges have electromagnetic interaction effects coming front the internal structures. A general Lorentz transformation relative to external sources J(gauge) - (J(A mu) J(A mu)(kappa)) derived, using the general Lorentz transformation and the four-dimensional current of nuclear matter of the ground si ate with J(gauge) = 0, we give the four-dimensional general relations between the different currents of nuclear matter systems with J(gauge) not equal 0 and those with J(gauge) = 0. The relation of the density's coupling with external magnetic field is derived, which conforms well to dense nuclear matter in a strong magnetic field. We show different condensed effects in strong interaction about fermions and antifermions, and give the concrete scalar and pseudoscalar condensed expressions of sigma(0) and pi(0) bosons. About different dynamical breaking and spontaneous vacuum symmetry breaking, the concrete expressions of different mass spectra are obtained in field theory. This paper acquires the running spontaneous vacuum breaking value sigma'(0), and obtains the spontaneous vacuum breaking in tenus of the running sigma'(0), which make nucleon, sigma, and pi particles gain effective masses. We achieve both the effect of external sources and nonvanishing value of the condensed scalar and pseudoscalar paticles. It is deduced that the masses of nucleons, sigma and pi generally depend on different external sources.
Resumo:
By using phi-mapping topological current theory and gauge potential decomposition, we discuss the self-dual equation and its solution in the SU(N) Dunne-Jackiw-Pi-Trugenberger model and obtain a new concrete self-dual equation with a 6 function. For the SU(3) case, we obtain a new self-duality solution and find the relationship between the soliton solution and topological number which is determined by the Hopf index and Brouwer degree of phi-mapping. In our solution, the flux of this soliton is naturally quantized.
Resumo:
The vibrationally resolved spectra of selected rotamers of m-aminophenol have been recorded by mass analyzed threshold ionization spectroscopy in connection with two-color resonant two-photon excitation scheme. The adiabatic ionization energies of the cis and trans rotamers are 61460 +/- 5 and 61734 +/- 5 cm(-1), respectively. The frequencies of modes 1 (breathing) and 18a (in-plane CH bending) are measured to be 744 and 1097 cm(-1) for the cis, and 736 and 1104 cm(-1) for the trans rotamer, respectively. This indicates that different orientation of the OH with respect to the NH2 substituent only slightly influences these two modes. (C) 2004 Elsevier B.V. All rights reserved.
Resumo:
Malicious software (malware) have significantly increased in terms of number and effectiveness during the past years. Until 2006, such software were mostly used to disrupt network infrastructures or to show coders’ skills. Nowadays, malware constitute a very important source of economical profit, and are very difficult to detect. Thousands of novel variants are released every day, and modern obfuscation techniques are used to ensure that signature-based anti-malware systems are not able to detect such threats. This tendency has also appeared on mobile devices, with Android being the most targeted platform. To counteract this phenomenon, a lot of approaches have been developed by the scientific community that attempt to increase the resilience of anti-malware systems. Most of these approaches rely on machine learning, and have become very popular also in commercial applications. However, attackers are now knowledgeable about these systems, and have started preparing their countermeasures. This has lead to an arms race between attackers and developers. Novel systems are progressively built to tackle the attacks that get more and more sophisticated. For this reason, a necessity grows for the developers to anticipate the attackers’ moves. This means that defense systems should be built proactively, i.e., by introducing some security design principles in their development. The main goal of this work is showing that such proactive approach can be employed on a number of case studies. To do so, I adopted a global methodology that can be divided in two steps. First, understanding what are the vulnerabilities of current state-of-the-art systems (this anticipates the attacker’s moves). Then, developing novel systems that are robust to these attacks, or suggesting research guidelines with which current systems can be improved. This work presents two main case studies, concerning the detection of PDF and Android malware. The idea is showing that a proactive approach can be applied both on the X86 and mobile world. The contributions provided on this two case studies are multifolded. With respect to PDF files, I first develop novel attacks that can empirically and optimally evade current state-of-the-art detectors. Then, I propose possible solutions with which it is possible to increase the robustness of such detectors against known and novel attacks. With respect to the Android case study, I first show how current signature-based tools and academically developed systems are weak against empirical obfuscation attacks, which can be easily employed without particular knowledge of the targeted systems. Then, I examine a possible strategy to build a machine learning detector that is robust against both empirical obfuscation and optimal attacks. Finally, I will show how proactive approaches can be also employed to develop systems that are not aimed at detecting malware, such as mobile fingerprinting systems. In particular, I propose a methodology to build a powerful mobile fingerprinting system, and examine possible attacks with which users might be able to evade it, thus preserving their privacy. To provide the aforementioned contributions, I co-developed (with the cooperation of the researchers at PRALab and Ruhr-Universität Bochum) various systems: a library to perform optimal attacks against machine learning systems (AdversariaLib), a framework for automatically obfuscating Android applications, a system to the robust detection of Javascript malware inside PDF files (LuxOR), a robust machine learning system to the detection of Android malware, and a system to fingerprint mobile devices. I also contributed to develop Android PRAGuard, a dataset containing a lot of empirical obfuscation attacks against the Android platform. Finally, I entirely developed Slayer NEO, an evolution of a previous system to the detection of PDF malware. The results attained by using the aforementioned tools show that it is possible to proactively build systems that predict possible evasion attacks. This suggests that a proactive approach is crucial to build systems that provide concrete security against general and evasion attacks.
Resumo:
En los últimos años se han introducido el Aprendizaje Basado en Problemas (ABP) y de los métodos de Inquiry-Based learning (IBL) o Aprendizaje Basado en la Experimentación en los programas de asignaturas de ciencias experimentales. Estos protocolos pretenden cambiar el modelo actual de evaluación de trabajo de laboratorio basado en el informe de laboratorio o el examen final teórico de las prácticas. En este trabajo presentamos los resultados de la aplicación de un protocolo de IBL para el trabajo de laboratorio de dos asignaturas básicas del Departamento de Ciencias Biomédicas de la Universidad Europea de Madrid. Tanto los resultados de evaluación de los alumnos, como el grado de satisfacción de los mismos con este método ha sido muy satisfactorio. En nuestra opinión, la metodología IBL constituye un buen método que permite trabajar competencias como el trabajo en equipo o el razonamiento crítico, esenciales en la enseñanza de las ciencias. Esta metodología es además aplicable a cualquier curso general que tenga como parte de su programa una pequeña investigación.
Resumo:
El nucleopoliedrovirus de Spodoptera exigua (SeMNPV) es un patógeno natural de las poblaciones larvarias de S. exigua que constituye la base de un bioinsecticida comercializado en España para el control biológico de esta plaga en pimiento. Recientes estudios han demostrado que la transmisión del virus a la descendencia (transmisión vertical) se da con frecuencia y podría ser una característica deseable para su uso en aplicaciones de campo. En el presente trabajo se discute la conveniencia de utilizar una mezcla de dos genotipos SeAl1 (transmisión vertical) y SeG25 (transmisión horizontal) en determinadas proporciones para mejorar las características que cada uno de ellos presenta por separado y así explotar cada una de las vías de transmisión. La patogenicidad (CL50) del genotipo SeG25, y de cualquiera de las mezclas que contienen un 25, 50 o 75 % del mismo, fue más alta que la del aislado SeAl1. Sin embargo, en términos de virulencia (TMM) y productividad (OBs/larva) no se observaron diferencias significativas entre genotipos ni entre sus mezclas. Además se evaluó la capacidad de producir infecciones encubiertas de cada genotipo y sus mezclas sometiendo larvas de S. exigua a infecciones subletales del virus. Se encontraron transcritos del virus para el gen temprano ie0 mediante RT-PCR en los adultos supervivientes a infecciones provocadas por el genotipo SeG25 y todas las mezclas. También se testaron otros dos genes virales que se expresan de manera temprana y tardía en la infección de baculovirus (DNA-polimerasa y polihedrina) para los que en ningún caso se detectaron transcritos.
Resumo:
The identification of an original and idiosyncratic style in the work of the Spanish filmmaker Pedro Almodóvar provides the tone of the speech with a semantic function: linguistic variation and specific registers help to transmit the message and intention of the author. As a consequence of this, the possibilities for the translation being carried away in similar linguistic terms to those of the original text will be higher than in texts without linguistic peculiarities or stylistically unmarked. The purpose of this paper is to reflect on the influence exerted by the original author in the reception of his work abroad and, consequently, in its translation. In this sense, we will analyse the informative value of certain linguistic uses as well as the importance of enriching stylistically the subtitles in these connotative texts through the example of Almodóvar’s film "Volver" and its translation into Polish (2006).
Resumo:
Helicoverpa armigera (Lepidoptera; Noctuidae), conocida como el taladro del tomate, es una especie polífaga y de amplia distribución, responsable de grandes pérdidas económicas en más de 60 cultivos a lo largo de las regiones tropicales y subtropicales del mundo. Estas plagas se controlan mayoritariamente con plaguicidas químicos, aunque existe un gran interés por desarrollar otros agentes de control biológico. Entre estos, se encuentra el nucleopoliedrovirus de Helicoverpa armigera (HearNPV, Baculoviridae), que por sus características de seguridad y eficacia, sería útil para impulsar los programas de gestión integrada de plagas que se fomentan desde la Directiva 2009/128/CEE. El objetivo de este trabajo fue realizar una caracterización bioquímica y biológica de varios aislados de HearNPV : un aislado silvestre español (Badajoz) HearNPV-SP1, un aislado chino HearSNPV-G4, tres aislados sudafricanos (HearNPV-Whl, HearNPV-Kzn, HearNPV-Alb) y la materia activa de un producto comercial en uso en Europa (HearNPV-Hx). El análisis con las enzimas de restricción determinó que la enzima BglII generaba perfiles similares pero con fragmentos característicos en todos los casos a excepción de los aislados HearNPV-Kzn y HearNPVAlb, que no pudieron ser diferenciados entre sí con ninguna de las enzimas probadas. El análisis filogenético, basado en las secuencias parciales de los genes poliedrina (polh), lef-8 y lef-9, donde se incluyeron las secuencias correspondientes a 18 genomas mostró que el aislado HearNPV-Whl es filogenéticamente próximo a las cepas de origen ibérico, mientras que los aislados HearNPV-Hx y HearNPV-Alb comparten la misma rama que los aislados asiáticos y australiano. La caracterización insecticida de los aislados HearNPV-SP1, HearNPV-Hx y HearNPV-G4 reveló que la virulencia (TMM) del aislado HearNPV-SP1 (104 h) fue significativamente menor que la de los aislados HearNPV-G4 (109 h) y HearNPV-Hx (111 h). En este trabajo, se determinó que el tiempo de acción del HearNPV-SP1 es menor al de otros bioinsecticidas en uso en Europa, por lo que se confirma la posibilidad de mejorar los productos activos en uno de los aspectos más sensibles de cara a su comercialización como es su tiempo de actuación.
Resumo:
Esta es la versión no revisada del artículo: Inmaculada Higueras, Natalie Happenhofer, Othmar Koch, and Friedrich Kupka. 2014. Optimized strong stability preserving IMEX Runge-Kutta methods. J. Comput. Appl. Math. 272 (December 2014), 116-140. Se puede consultar la versión final en https://doi.org/10.1016/j.cam.2014.05.011
Resumo:
Signaturas: [ ]1, A-Z4, 2A-2R4, 2S1.
Resumo:
[Vá esta impression cotejada con el original del Autor, y corregida de los innumerables errores que padecen las otras].
Resumo:
Signaturas: A6.
Resumo:
The aim of the present paper is to investigate the connection between ancient medicine and sophistry at the end of 5th century B.C. Beginning with analyses of some passages from the De vetere medicina (VM), De natura hominis (NH) and De arte, the article identifies many similarities between these treatises, on the one hand, and the sophistic doctrines, on the other: these concern primarily perceptual/intellectual knowledge and the interaction between reality, knowledge and language. Among the Sophists, Gorgias was particularly followed and imitated, as he was admired not only for his tremendous rhetorical skills, but also for his philosophically significant work On not being, which probably influenced various discussions in the Hippocratic treatises. However, if Gorgias argues in favor of language as dynastēs megas, the authors of VM, NH and De arte consider knowledge to be far more relevant and reliable than logos. These Hippocratic treatises criticize the philosophical thesis and the resulting kind of reductionism. Above all they defend the supremacy of medicine over any other art. By using the same argumentative and rhetorical strategies that were employed by Gorgias, these treatises reverse the thought of those Sophists who exalted only the technē tōn logōn.
Resumo:
12 hojas : ilustraciones, fotografías a color.