989 resultados para cognitive cost
Resumo:
This research project was initiated in 1988 to study the effectiveness of four different construction techniques for establishing a stable base on a granular surfaced roadway. After base stabilization, the roadway was then seal coated, eliminating dust problems associated with granular surfaced roads. When monies become available, the roadway can be surfaced with a more permanent structure. A 2.8 mile section of the Horseshoe Road in Dubuque County was divided into four divisions for the study. This report discusses the procedures used during construction of these different divisions. Problems and possible solutions have been analyzed to better understand the capabilities of the materials and construction techniques used on the project.
Resumo:
Hsp70-Hsp40-NEF and possibly Hsp100 are the only known molecular chaperones that can use the energy of ATP to convert stably pre-aggregated polypeptides into natively refolded proteins. However, the kinetic parameters and ATP costs have remained elusive because refolding reactions have only been successful with a molar excess of chaperones over their polypeptide substrates. Here we describe a stable, misfolded luciferase species that can be efficiently renatured by substoichiometric amounts of bacterial Hsp70-Hsp40-NEF. The reactivation rates increased with substrate concentration and followed saturation kinetics, thus allowing the determination of apparent V(max)' and K(m)' values for a chaperone-mediated renaturation reaction for the first time. Under the in vitro conditions used, one Hsp70 molecule consumed five ATPs to effectively unfold a single misfolded protein into an intermediate that, upon chaperone dissociation, spontaneously refolded to the native state, a process with an ATP cost a thousand times lower than expected for protein degradation and resynthesis.
Resumo:
How communication systems emerge and remain stable is an important question in both cognitive science and evolutionary biology. For communication to arise, not only must individuals cooperate by signaling reliable information, but they must also coordinate and perpetuate signals. Most studies on the emergence of communication in humans typically consider scenarios where individuals implicitly share the same interests. Likewise, most studies on human cooperation consider scenarios where shared conventions of signals and meanings cannot be developed de novo. Here, we combined both approaches with an economic experiment where participants could develop a common language, but under different conditions fostering or hindering cooperation. Participants endeavored to acquire a resource through a learning task in a computer-based environment. After this task, participants had the option to transmit a signal (a color) to a fellow group member, who would subsequently play the same learning task. We varied the way participants competed with each other (either global scale or local scale) and the cost of transmitting a signal (either costly or noncostly) and tracked the way in which signals were used as communication among players. Under global competition, players signaled more often and more consistently, scored higher individual payoffs, and established shared associations of signals and meanings. In addition, costly signals were also more likely to be used under global competition; whereas under local competition, fewer signals were sent and no effective communication system was developed. Our results demonstrate that communication involves both a coordination and a cooperative dilemma and show the importance of studying language evolution under different conditions influencing human cooperation.
Resumo:
HIV escape in the central nervous system (CNS) despite undetectable viral load in the plasma has been observed and may contribute to HIV-associated neurocognitive disorders. Favouring the use of HIV drugs with a good penetration into the CNS has been advocated, leading to the establishment of the CNS penetration-effectiveness (CPE) score. However, the relevance of this score is not fully established. Ciccarelli et al. compared two versions of the CPE scores in their capacity to predict cognitive dysfunction in HIV-infected individuals. The revised CPE score, but not the original one, showed an improved association with cognitive impairment. Prospective studies are warranted to assess the validity of the CPE score.
Resumo:
PURPOSE: To examine the effects of the world's most challenging mountain ultra-marathon (Tor des Géants(®) 2012) on the energy cost of three types of locomotion (cycling, level and uphill running) and running kinematics. METHODS: Before (pre-) and immediately after (post-) the competition, a group of ten male experienced ultra-marathon runners performed in random order three submaximal 4-min exercise trials: cycling at a power of 1.5 W kg(-1) body mass; level running at 9 km h(-1) and uphill running at 6 km h(-1) at an inclination of +15 % on a motorized treadmill. Two video cameras recorded running mechanics at different sampling rates. RESULTS: Between pre- and post-, the uphill-running energy cost decreased by 13.8 % (P = 0.004); no change was noted in the energy cost of level running or cycling (NS). There was an increase in contact time (+10.3 %, P = 0.019) and duty factor (+8.1 %, P = 0.001) and a decrease in swing time (-6.4 %, P = 0.008) in the uphill-running condition. CONCLUSION: After this extreme mountain ultra-marathon, the subjects modified only their uphill-running patterns for a more economical step mechanics.
Resumo:
Cognitive radio is a wireless technology aimed at improvingthe efficiency use of the radio-electric spectrum, thus facilitating a reductionin the load on the free frequency bands. Cognitive radio networkscan scan the spectrum and adapt their parameters to operate in the unoccupiedbands. To avoid interfering with licensed users operating on a givenchannel, the networks need to be highly sensitive, which is achieved byusing cooperative sensing methods. Current cooperative sensing methodsare not robust enough against occasional or continuous attacks. This articleoutlines a Group Fusion method that takes into account the behavior ofusers over the short and long term. On fusing the data, the method is basedon giving more weight to user groups that are more unanimous in their decisions.Simulations have been performed in a dynamic environment withinterferences. Results prove that when attackers are present (both reiterativeor sporadic), the proposed Group Fusion method has superior sensingcapability than other methods.
Resumo:
Cognitive radio networks (CRN) sense spectrum occupancy and manage themselves to operate in unused bands without disturbing licensed users. The detection capability of a radio system can be enhanced if the sensing process is performed jointly by a group of nodes so that the effects of wireless fading and shadowing can be minimized. However, taking a collaborative approach poses new security threats to the system as nodes can report false sensing data to force a wrong decision. Providing security to the sensing process is also complex, as it usually involves introducing limitations to the CRN applications. The most common limitation is the need for a static trusted node that is able to authenticate and merge the reports of all CRN nodes. This paper overcomes this limitation by presenting a protocol that is suitable for fully distributed scenarios, where there is no static trusted node.
Resumo:
Spectrum is an essential resource for the provision of mobile services. In order to control and delimit its use, governmental agencies set up regulatory policies. Unfortunately, such policies have led to a deficiency of spectrum as only few frequency bands are left unlicensed, and these are used for the majority of new emerging wireless applications. One promising way to alleviate the spectrum shortage problem is adopting a spectrum sharing paradigm in which frequency bands are used opportunistically. Cognitive radio is the key technology to enable this shift of paradigm.Cognitive radio networks are self-organized systems in which devices cooperate to use those spectrum ranges that are not occupied by licensed users. They carry out spectrum sensing in order to detect vacant channels that can be used for communication. Even though spectrum sensing is an active area of research, an important issue remains unsolved: the secure authentication of sensing reports. Not providing security enables the input of false data in the system thus empowering false results. This paper presents a distributed protocol based on wireless physical layer security, symmetric cryptography and one-way functions that allows determining a final sensing decision from multiple sources in a quick and secure way, as well as it preserves users¿ privacy.
Resumo:
Spectrum scarcity demands thinking new ways tomanage the distribution of radio frequency bands so that its use is more effective. The emerging technology that can enable this paradigm shift is the cognitive radio. Different models fororganizing and managing cognitive radios have emerged, all with specific strategic purposes. In this article we review the allocation spectrum patterns of cognitive radio networks andanalyse which are the common basis of each model.We expose the vulnerabilities and open challenges that still threaten the adoptionand exploitation of cognitive radios for open civil networks.
Resumo:
Cognitive radio networks sense spectrum occupancyand manage themselves to operate in unused bands without disturbing licensed users. Spectrum sensing is more accurate if jointly performed by several reliable nodes. Even though cooperative sensing is an active area of research, the secureauthentication of local sensing reports remains unsolved, thus empowering false results. This paper presents a distributed protocol based on digital signatures and hash functions, and ananalysis of its security features. The system allows determining a final sensing decision from multiple sources in a quick and secure way.