872 resultados para Analytic Expressions
Resumo:
The most common software analysis tools available for measuring fluorescence images are for two-dimensional (2D) data that rely on manual settings for inclusion and exclusion of data points, and computer-aided pattern recognition to support the interpretation and findings of the analysis. It has become increasingly important to be able to measure fluorescence images constructed from three-dimensional (3D) datasets in order to be able to capture the complexity of cellular dynamics and understand the basis of cellular plasticity within biological systems. Sophisticated microscopy instruments have permitted the visualization of 3D fluorescence images through the acquisition of multispectral fluorescence images and powerful analytical software that reconstructs the images from confocal stacks that then provide a 3D representation of the collected 2D images. Advanced design-based stereology methods have progressed from the approximation and assumptions of the original model-based stereology(1) even in complex tissue sections(2). Despite these scientific advances in microscopy, a need remains for an automated analytic method that fully exploits the intrinsic 3D data to allow for the analysis and quantification of the complex changes in cell morphology, protein localization and receptor trafficking. Current techniques available to quantify fluorescence images include Meta-Morph (Molecular Devices, Sunnyvale, CA) and Image J (NIH) which provide manual analysis. Imaris (Andor Technology, Belfast, Northern Ireland) software provides the feature MeasurementPro, which allows the manual creation of measurement points that can be placed in a volume image or drawn on a series of 2D slices to create a 3D object. This method is useful for single-click point measurements to measure a line distance between two objects or to create a polygon that encloses a region of interest, but it is difficult to apply to complex cellular network structures. Filament Tracer (Andor) allows automatic detection of the 3D neuronal filament-like however, this module has been developed to measure defined structures such as neurons, which are comprised of dendrites, axons and spines (tree-like structure). This module has been ingeniously utilized to make morphological measurements to non-neuronal cells(3), however, the output data provide information of an extended cellular network by using a software that depends on a defined cell shape rather than being an amorphous-shaped cellular model. To overcome the issue of analyzing amorphous-shaped cells and making the software more suitable to a biological application, Imaris developed Imaris Cell. This was a scientific project with the Eidgenössische Technische Hochschule, which has been developed to calculate the relationship between cells and organelles. While the software enables the detection of biological constraints, by forcing one nucleus per cell and using cell membranes to segment cells, it cannot be utilized to analyze fluorescence data that are not continuous because ideally it builds cell surface without void spaces. To our knowledge, at present no user-modifiable automated approach that provides morphometric information from 3D fluorescence images has been developed that achieves cellular spatial information of an undefined shape (Figure 1). We have developed an analytical platform using the Imaris core software module and Imaris XT interfaced to MATLAB (Mat Works, Inc.). These tools allow the 3D measurement of cells without a pre-defined shape and with inconsistent fluorescence network components. Furthermore, this method will allow researchers who have extended expertise in biological systems, but not familiarity to computer applications, to perform quantification of morphological changes in cell dynamics.
Resumo:
Purpose To study the protective effects and underlying molecular mechanisms of SAMC on carbon tetrachloride (CCl4)-induced acute hepatotoxicity in the mouse model. Methods Mice were intraperitoneally injected with CCl4 (50 μl/kg; single dose) to induce acute hepatotoxicity with or without a 2-h pre-treatment of SAMC intraperitoneal injection (200 mg/kg; single dose). After 8 h, the blood serum and liver samples of mice were collected and subjected to measurements of histological and molecular parameters of hepatotoxicity. Results SAMC reduced CCl4-triggered cellular necrosis and inflammation in the liver under histological analysis. Since co-treatment of SAMC and CCl4 enhanced the expressions of antioxidant enzymes, reduced the nitric oxide (NO)-dependent oxidative stress, and inhibited lipid peroxidation induced by CCl4. SAMC played an essential antioxidative role during CCl4-induced hepatotoxicity. Administration of SAMC also ameliorated hepatic inflammation induced by CCl4 via inhibiting the activity of NF-κB subunits p50 and p65, thus reducing the expressions of pro-inflammatory cytokines, mediators, and chemokines, as well as promoting pro-regenerative factors at both transcriptional and translational levels. Conclusions Our results indicate that SAMC mitigates cellular damage, oxidative stress, and inflammation in CCl4-induced acute hepatotoxicity mouse model through regulation of NF-κB. Garlic or garlic derivatives may therefore be a potential food supplement in the prevention of liver damage.
Resumo:
This article offers a discourse analysis comparing selected articles in the national press over the consultative period for Phase 1 subjects in the new Australian Curriculum, with rationales prefacing official Australian Curriculum Assessment and Reporting Authority documents. It traces how various versions of Australia, its ‘nation-ness’ and its future citizens have been taken up in the final product. The analysis uses Lemke's analytic elaboration of Bakhtin's concept of heteroglossia and its derivative, intertextuality. It identifies a range of intertextual thematic formations around ‘nation’, ‘history’, ‘citizen’ and ‘curriculum’ circulating in the public debates, then traces their presence in official curriculum documents. Rather than concluding that these themes are contradictory and incoherent, the conclusion asks how these multiple dialogic facets of Australian nation-ness potentially offer a better response to complex times than any coherent monologic orthodoxy might.
Resumo:
A qualitative, discourse analytic study of literate practices in a small religious community in a northern Australian city. The chapter documents how this community constructs religious reading and writing, affiliated ideologies and theologies, and how readers/hearers/learners are positions vis a vis the authority of sacred text.
Resumo:
The rank transform is a non-parametric technique which has been recently proposed for the stereo matching problem. The motivation behind its application to the matching problem is its invariance to certain types of image distortion and noise, as well as its amenability to real-time implementation. This paper derives an analytic expression for the process of matching using the rank transform, and then goes on to derive one constraint which must be satisfied for a correct match. This has been dubbed the rank order constraint or simply the rank constraint. Experimental work has shown that this constraint is capable of resolving ambiguous matches, thereby improving matching reliability. This constraint was incorporated into a new algorithm for matching using the rank transform. This modified algorithm resulted in an increased proportion of correct matches, for all test imagery used.
Resumo:
The influence of inflow turbulence on the results of Favre–Reynolds-averaged Navier–Stokes computations of supersonic oblique-shock-wave/turbulent-boundary-layer interactions (shock-wave Mach-number MSW ∼2.9), using seven-equation Reynolds-stress model turbulence closures, is studied. The generation of inflow conditions (and the initialization of the flowfield) for mean flow, Reynolds stresses, and turbulence length scale, based on semi-analytic grid-independent boundary-layer profiles, is described in detail. Particular emphasis is given to freestream turbulence intensity and length scale. The influence of external-flow turbulence intensity is studied in detail both for flat-plate boundary-layer flow and for a compression-ramp interaction with large separation. It is concluded that the Reynolds-stress model correctly reproduces the effects of external flow turbulence.
Resumo:
During the last four decades, educators have created a range of critical literacy approaches for different contexts, including compulsory schooling (Luke & Woods, 2009) and second language education (Luke & Dooley, 2011). Despite inspirational examples of critical work with young students (e.g., O’Brien, 1994; Vasquez, 1994), Comber (2012) laments the persistent myth that critical literacy is not viable in the early years. Assumptions about childhood innocence and the priorities of the back-to-basics movement seem to limit the possibilities for early years literacy teaching and learning. Yet, teachers of young students need not face an either/or choice between the basic and critical dimensions of literacy. Systematic ways of treating literacy in all its complexity exist. We argue that the integrative imperative is especially important in schools that are under pressure to improve technical literacy outcomes. In this chapter, we document how critical literacy was addressed in a fairytales unit taught to 4.5 - 5.5 year olds in a high diversity, high poverty Australian school. We analyze the affordances and challenges of different approaches to critical literacy, concluding they are complementary rather than competing sources of possibility. Furthermore, we make the case for turning familiar classroom activities to critical ends.
Resumo:
Much has been written on Michel Foucault’s reluctance to clearly delineate a research method, particularly with respect to genealogy (Harwood 2000; Meadmore, Hatcher, & McWilliam 2000; Tamboukou 1999). Foucault (1994, p. 288) himself disliked prescription stating, “I take care not to dictate how things should be” and wrote provocatively to disrupt equilibrium and certainty, so that “all those who speak for others or to others” no longer know what to do. It is doubtful, however, that Foucault ever intended for researchers to be stricken by that malaise to the point of being unwilling to make an intellectual commitment to methodological possibilities. Taking criticism of “Foucauldian” discourse analysis as a convenient point of departure to discuss the objectives of poststructural analyses of language, this paper develops what might be called a discursive analytic; a methodological plan to approach the analysis of discourses through the location of statements that function with constitutive effects.
Resumo:
Technical: This looped video work is made up from a number of still images animated in a sequence, not intended to be a smooth action, but syncopated. The gaps in real time suggest blinking, lapses in technology, warps in time and distance. The still images have been manipulated in photoshop and imported into an animation software program, showing subtle emphasis on various aspects of the features of the face and location from the screen shots. Content: Obsession is one of the most constant expressions of love, whether it is a negative attribute, such as stalking, or the need to see or stroke the beloved, or telling and re-telling the story of first meeting. “like the beat, beat, beat of the tom tom when the jungle shadows fall like the tick, tick, tock of the stately clock as it stands against the wall like the drip, drip drip of the rain drops when the summer shower’s through a voice within me keeps repeating you, you, you… only you...” (Cole Porter, Night and Day) My desire to immerse myself in my newly-met adult daughter as a reality is as obsessive as any new parent. The primary means of contact is video cam, which has become a kind of surveillance for me. I stare at her mouth as it moves, her ear as she moves her head, her smile, her grimaces, her high cheekbones, her eyes that are like mine, the shape of her head, her teeth that are like her father’s… hundreds of candid pictures screen shot over a year and a half were the source of the video images.
Resumo:
Threats against computer networks evolve very fast and require more and more complex measures. We argue that teams respectively groups with a common purpose for intrusion detection and prevention improve the measures against rapid propagating attacks similar to the concept of teams solving complex tasks known from field of work sociology. Collaboration in this sense is not easy task especially for heterarchical environments. We propose CIMD (collaborative intrusion and malware detection) as a security overlay framework to enable cooperative intrusion detection approaches. Objectives and associated interests are used to create detection groups for exchange of security-related data. In this work, we contribute a tree-oriented data model for device representation in the scope of security. We introduce an algorithm for the formation of detection groups, show realization strategies for the system and conduct vulnerability analysis. We evaluate the benefit of CIMD by simulation and probabilistic analysis.
Resumo:
Although there has been exponential growth in the number of studies of destination image appearing in the tourism literature, few have addressed the role of affective perceptions. This paper analyses the market positions held by a competitive set of destinations, through a comparison of cognitive, affective and conative perceptions. Cognitive perceptions were measured by trialling a factor analytic adaptation of importance-performance analysis. Affective perceptions were measured using an affective response grid. The alignment of the results from these techniques identified leadership positions held by two quite different destinations on two quite different dimensions of short break destination attractiveness.
Resumo:
A number of security models have been proposed for RFID systems. Recent studies show that current models tend to be limited in the number of properties they capture. Consequently, models are commonly unable to distinguish between protocols with regard to finer privacy properties. This paper proposes a privacy model that introduces previously unavailable expressions of privacy. Based on the well-studied notion of indistinguishability, the model also strives to be simpler, easier to use, and more intuitive compared to previous models.
Resumo:
A number of security models have been proposed for RFID systems. Recent studies show that current models tend to be limited in the number of properties they capture. Consequently, models are commonly unable to distinguish between protocols with regard to finer privacy properties. This paper proposes a privacy model that introduces previously unavailable expressions of privacy. Based on the well-studied notion of indistinguishability, the model also strives to be simpler, easier to use, and more intuitive compared to previous models.
Resumo:
Purpose – The purpose of this paper is to provide a new type of entry mode decision-making model for construction enterprises involved in international business. Design/methodology/approach – A hybrid method combining analytic hierarchy process (AHP) with preference ranking organization method for enrichment evaluations (PROMETHEE) is used to aid entry mode decisions. The AHP is used to decompose the entry mode problem into several dimensions and determine the weight of each criterion. In addition, PROMETHEE method is used to rank candidate entry modes and carry out sensitivity analyses. Findings – The proposed decision-making method is demonstrated to be a suitable approach to resolve the entry mode selection decision problem. Practical implications – The research provides practitioners with a more systematic decision framework and a more precise decision method. Originality/value – The paper sheds light on the further development of entry strategies for international construction markets. It not only introduces a new decision-making model for entry mode decision making, but also provides a conceptual framework with five determinants for a construction company entry mode selection based on the unique properties of the construction industry.
Resumo:
utomatic pain monitoring has the potential to greatly improve patient diagnosis and outcomes by providing a continuous objective measure. One of the most promising methods is to do this via automatically detecting facial expressions. However, current approaches have failed due to their inability to: 1) integrate the rigid and non-rigid head motion into a single feature representation, and 2) incorporate the salient temporal patterns into the classification stage. In this paper, we tackle the first problem by developing a “histogram of facial action units” representation using Active Appearance Model (AAM) face features, and then utilize a Hidden Conditional Random Field (HCRF) to overcome the second issue. We show that both of these methods improve the performance on the task of pain detection in sequence level compared to current state-of-the-art-methods on the UNBC-McMaster Shoulder Pain Archive.