832 resultados para COLUBRINUM LINK
Resumo:
Capacity analysis using simulation is not a new thing in literature. Most of the development process of UMTS standardization have used simulation tools; however, we thing that the use of GIS planning tools and matrix manipulation capacity of MATLAB can show us different scenarios and make a more realistic analysis. Some work is been doing in COST 273 in order to have more realistic scenarios for UMTS planning. Our work initially was centered in uplink analysis, but we are now working in downlink analysis, specifically in two areas: capacity in number of users for RT and NRT services, and Node B power. In this work we will show results for up-link capacity and some results for downlink capacity and BS power consumption.
Resumo:
My dissertation presented seven violin concertos in three recital programs. Three of these concertos are acknowledged masterpieces performed in established concert venues throughout the world. They are the concertos of Mozart, Beethoven and Tchaikovsky. The other four are less standard and are composed by Viotti, Kreutzer, Rode and Spohr. These less standard concertos were popular during their time yet they seem not to have stood the test of time. A curriculum devoted exclusively to the standard concertos creates problems for the young violinist. The Mozart violin concertos are often the first standard concertos that the young violin student encounters. They are considered to be the least technically demanding of the standard concertos. The next most advanced standard concertos that the student will usually encounter are Bruch’s G minor concerto, Wieniawski’s D minor concerto and Barber’s concerto. The trouble is that the work on Mozart concertos does not adequately prepare a student for the next most advanced standard concerto. There is a discontinuous leap in the progression of technical difficulty between the Mozart concertos and the next most advanced concertos. Likewise the standard concerto repertoire provides no smooth historical or stylistic progression between the Mozart concertos and the next most advanced concertos. If the young violinist is limited to the standard repertoire then she has no smooth progression either technical, historical or stylistic. I seek to demonstrate that, by adding concertos of Spohr, Viotti, Kreutzer, and Rode to the standard violin curriculum, one could remedy this problem. The first and third recitals were performed in the Gildenhorn Recital Hall and the second recital in the School of Music’s Smith Lecture Hall, both at the University of Maryland. All three recitals can be found in the Digital Repository at the University of Maryland (DRUM).
Resumo:
Published by: http://npg.nature.com/
Resumo:
Antimicrobial peptides and proteins (AMPs) are widespread in the living kingdom. They are key effectors of defense reactions and mediators of competitions between organisms. They are often cationic and amphiphilic, which favors their interactions with the anionic membranes of microorganisms. Several AMP families do not directly alter membrane integrity but rather target conserved components of the bacterial membranes in a process that provides them with potent and specific antimicrobial activities. Thus, lipopolysaccharides (LPS), lipoteichoic acids (LTA) or the peptidoglycan precursor Lipid II are targeted by a broad series of AMPs. Studying the functional diversity of immune effectors tells us about the essential residues involved in AMP mechanism of action. Marine invertebrates have been found to produce a remarkable diversity of AMPs. Molluscan defensins and crustacean anti-LPS factors (ALF) are diverse in terms of amino acid sequence and show contrasted phenotypes in terms of antimicrobial activity. Their activity is directed essentially against Gram-positive or Gram-negative bacteria due their specific interactions with Lipid II or Lipid A, respectively. Through those interesting examples, we discuss here how sequence diversity generated throughout evolution informs us on residues required for essential molecular interaction at the bacterial membranes and subsequent antibacterial activity. Through the analysis of molecular variants having lost antibacterial activity or shaped novel functions, we also discuss the molecular bases of functional divergence in AMPs.
Resumo:
International audience
Resumo:
Abstract We present ideas about creating a next generation Intrusion Detection System (IDS) based on the latest immunological theories. The central challenge with computer security is determining the difference between normal and potentially harmful activity. For half a century, developers have protected their systems by coding rules that identify and block specific events. However, the nature of current and future threats in conjunction with ever larger IT systems urgently requires the development of automated and adaptive defensive tools. A promising solution is emerging in the form of Artificial Immune Systems (AIS): The Human Immune System (HIS) can detect and defend against harmful and previously unseen invaders, so can we not build a similar Intrusion Detection System (IDS) for our computers? Presumably, those systems would then have the same beneficial properties as HIS like error tolerance, adaptation and self-monitoring. Current AIS have been successful on test systems, but the algorithms rely on self-nonself discrimination, as stipulated in classical immunology. However, immunologist are increasingly finding fault with traditional self-nonself thinking and a new 'Danger Theory' (DT) is emerging. This new theory suggests that the immune system reacts to threats based on the correlation of various (danger) signals and it provides a method of 'grounding' the immune response, i.e. linking it directly to the attacker. Little is currently understood of the precise nature and correlation of these signals and the theory is a topic of hot debate. It is the aim of this research to investigate this correlation and to translate the DT into the realms of computer security, thereby creating AIS that are no longer limited by self-nonself discrimination. It should be noted that we do not intend to defend this controversial theory per se, although as a deliverable this project will add to the body of knowledge in this area. Rather we are interested in its merits for scaling up AIS applications by overcoming self-nonself discrimination problems.
Resumo:
Desertomycin A is an aminopolyol polyketide containing a macrolactone ring. We have proposed that desertomycin A and similar compounds (marginolactones) are formed by polyketide synthases primed not with gamma-aminobutanoyl-CoA but with 4-guanidinylbutanoyl-CoA, to avoid facile cyclization of the starter unit. This hypothesis requires that there be a final-stage de-amidination of the corresponding guanidino-substituted natural product, but no enzyme for such a process has been described. We have now identified candidate amidinohydrolase genes within the desertomycin and primycin clusters. Deletion of the putative desertomycin amidinohydrolase gene dstH in Streptomyces macronensis led to the accumulation of desertomycin B, the guanidino form of the antibiotic. Also, purified DstH efficiently catalyzed the in vitro conversion of desertomycin B into the A form. Hence this amidinohydrolase furnishes the missing link in this proposed naturally evolved example of protective-group chemistry.
Resumo:
Cover title.
Resumo:
The linked concepts of 'microbial loop' and 'protozoan trophic link' have been very well documented in filter-feeding microzooplankton such as copepods, but have not been applied to energy transfer to benthic suspension-feeding macrofauna, with the exception of the recent demonstration of heterotrophic flagellate assimilation by mussels. The oyster Crassostrea gigas obtains energy resources by filtering microalgae (similar to 5 to 100 mu m). However, in turbid estuaries, light-limited phytoplanktonic production cannot entirely account for oyster energy requirements. Conversely, picoplankters (<2 mu m), which are main effecters of coastal energy flow and matter cycling, are not efficiently retained by oyster filtration. Ciliate protozoal as both micro-sized cells (similar to 5 to 100 run) and bacteria grazers, may represent a major intermediary in trophic transfer between picoplankton and metazoa. The ciliate Uronema was intensely cultured and labelled, using the cyanobacteria Synechococcus as an auto-fluorescent biomarker. The labelled ciliates were offered as potential prey to oysters. We report here the first experimental evidence of a significant retention and ingestion of ciliates by oysters, supporting the role of protozoa as a realistic trophic link between picoplankters and filter-feeding bivalves and thus enhancing their potential importance in estuarine microbial food webs.
Resumo:
We present ideas about creating a next generation Intrusion Detection System (IDS) based on the latest immunological theories. The central challenge with computer security is determining the difference between normal and potentially harmful activity. For half a century, developers have protected their systems by coding rules that identify and block specific events. However, the nature of current and future threats in conjunction with ever larger IT systems urgently requires the development of automated and adaptive defensive tools. A promising solution is emerging in the form of Artificial Immune Systems (AIS): The Human Immune System (HIS) can detect and defend against harmful and previously unseen invaders, so can we not build a similar Intrusion Detection System (IDS) for our computers? Presumably, those systems would then have the same beneficial properties as HIS like error tolerance, adaptation and self-monitoring. Current AIS have been successful on test systems, but the algorithms rely on self-nonself discrimination, as stipulated in classical immunology. However, immunologist are increasingly finding fault with traditional self-nonself thinking and a new ‘Danger Theory’ (DT) is emerging. This new theory suggests that the immune system reacts to threats based on the correlation of various (danger) signals and it provides a method of ‘grounding’ the immune response, i.e. linking it directly to the attacker. Little is currently understood of the precise nature and correlation of these signals and the theory is a topic of hot debate. It is the aim of this research to investigate this correlation and to translate the DT into the realms of computer security, thereby creating AIS that are no longer limited by self-nonself discrimination. It should be noted that we do not intend to defend this controversial theory per se, although as a deliverable this project will add to the body of knowledge in this area. Rather we are interested in its merits for scaling up AIS applications by overcoming self-nonself discrimination problems.
Resumo:
Introduction: Nonagenarian population, clearly increasing, shows different characteristics from the rest of elderly people. Health-related quality of life is a way to study population health in physical, psychological and social dimensions. Objectives: To examine the relationship between nutritional status and health-related quality of life in a group of free-living nonagenarians. Differences with octogenarians were also studied. Methods: Within Villanueva Older Health Study, 20 non-institutionalised people (92.5±3.5 years; 80% women) make the nonagenarian subsample. Nutritional risk was assessed by Mininutritional Assessment questionnaire, dietary intake by a 24-hour dietary recall and health-related quality of life by EuroQoL-5D questionnaire. SPSS was used for statistical analysis. Results: 40% nonagenarians were at risk of malnutrition. Dietary assessment showed magnesium, zinc, potassium, folic acid, vitamin D and vitamin E deficiencies. Problems in mobility were more frequently reported (80%). EQ-5Dindex was associated with MNA (p<0.05). Self-care dimension was associated with calcium and niacin (p<0.05), retinol and cholesterol (p<0.01) intake. Usual activities dimension was associated with niacin (p<0.01) and cholesterol(p<0.05) intake. Pain/discomfort dimension was associated with protein (p<0.01), energy, selenium and niacin (p<0.05) intake. Anxiety/depression was associated with protein(p<0.01) and selenium (p<0.05) intake. Conclusions: Risk of malnutrition is a factor associated to health-related quality of life. Results suggest that energy and some nutrient intakes could be possibly associated to health-related quality of life but further research on this influence is required.
Resumo:
Directed internship
Resumo:
Dissertação de Mestrado, Ciências Biomédicas, Departamento de Ciências Biomédicas e Medicina, Universidade do Algarve, 2015
Resumo:
Poster presented at the Workshop on Flexible Models for Longitudinal and Survival Data with Applications in Biostatistics. University of Warwick, Coventry, UK, 27-29 July 2015