942 resultados para Laser therapy -low level
Resumo:
This thesis examines the problem of an autonomous agent learning a causal world model of its environment. Previous approaches to learning causal world models have concentrated on environments that are too "easy" (deterministic finite state machines) or too "hard" (containing much hidden state). We describe a new domain --- environments with manifest causal structure --- for learning. In such environments the agent has an abundance of perceptions of its environment. Specifically, it perceives almost all the relevant information it needs to understand the environment. Many environments of interest have manifest causal structure and we show that an agent can learn the manifest aspects of these environments quickly using straightforward learning techniques. We present a new algorithm to learn a rule-based causal world model from observations in the environment. The learning algorithm includes (1) a low level rule-learning algorithm that converges on a good set of specific rules, (2) a concept learning algorithm that learns concepts by finding completely correlated perceptions, and (3) an algorithm that learns general rules. In addition this thesis examines the problem of finding a good expert from a sequence of experts. Each expert has an "error rate"; we wish to find an expert with a low error rate. However, each expert's error rate and the distribution of error rates are unknown. A new expert-finding algorithm is presented and an upper bound on the expected error rate of the expert is derived.
Resumo:
We constructed a parallelizing compiler that utilizes partial evaluation to achieve efficient parallel object code from very high-level data independent source programs. On several important scientific applications, the compiler attains parallel performance equivalent to or better than the best observed results from the manual restructuring of code. This is the first attempt to capitalize on partial evaluation's ability to expose low-level parallelism. New static scheduling techniques are used to utilize the fine-grained parallelism of the computations. The compiler maps the computation graph resulting from partial evaluation onto the Supercomputer Toolkit, an eight VLIW processor parallel computer.
Resumo:
Conventional parallel computer architectures do not provide support for non-uniformly distributed objects. In this thesis, I introduce sparsely faceted arrays (SFAs), a new low-level mechanism for naming regions of memory, or facets, on different processors in a distributed, shared memory parallel processing system. Sparsely faceted arrays address the disconnect between the global distributed arrays provided by conventional architectures (e.g. the Cray T3 series), and the requirements of high-level parallel programming methods that wish to use objects that are distributed over only a subset of processing elements. A sparsely faceted array names a virtual globally-distributed array, but actual facets are lazily allocated. By providing simple semantics and making efficient use of memory, SFAs enable efficient implementation of a variety of non-uniformly distributed data structures and related algorithms. I present example applications which use SFAs, and describe and evaluate simple hardware mechanisms for implementing SFAs. Keeping track of which nodes have allocated facets for a particular SFA is an important task that suggests the need for automatic memory management, including garbage collection. To address this need, I first argue that conventional tracing techniques such as mark/sweep and copying GC are inherently unscalable in parallel systems. I then present a parallel memory-management strategy, based on reference-counting, that is capable of garbage collecting sparsely faceted arrays. I also discuss opportunities for hardware support of this garbage collection strategy. I have implemented a high-level hardware/OS simulator featuring hardware support for sparsely faceted arrays and automatic garbage collection. I describe the simulator and outline a few of the numerous details associated with a "real" implementation of SFAs and SFA-aware garbage collection. Simulation results are used throughout this thesis in the evaluation of hardware support mechanisms.
Resumo:
CO hydrogenation to light alkenes was carried out on manganese promoted iron catalysts prepared by coprecipitation and sol-gel techniques. Addition of manganese in the range of 1-4 mol.% by means of coprecipitation could improve notably the percentage of C-2 (=) similar to C-4 (=) in the products, but it was not so efficient when the sol-gel method was employed. XRD and H-2-TPR measurements showed that the catalyst samples giving high C-2 (=) similar to C-4 (=) yields possessed ultra. ne particles in the form of pure alpha-(Fe1-xMnx)(2)O-3, and high quality in lowering the reduction temperature of the iron oxide. Furthermore, these samples displayed deep extent of carburization and different surface procedures to the others in the tests of Temperature Programmed Surface Carburization (TPSC). The different surface procedures of these samples were considered to have close relationship with the evolving of surface oxygen. It was also suggested that for the catalysts with high C-2 (=) similar to C-4 (=) yields, the turnover rate of the active site could be kept at a relatively high level due to the improved reducing and carburizing capabilities. Consequently, there would be a large number of sites for CO adsorption/dissociation and an enhanced carburization environment on the catalyst surface, so that the process of hydrogenation could be suppressed relatively to a low level. As a result, the percentage of the light alkenes in the products could be raised.
Resumo:
Security policies are increasingly being implemented by organisations. Policies are mapped to device configurations to enforce the policies. This is typically performed manually by network administrators. The development and management of these enforcement policies is a difficult and error prone task. This thesis describes the development and evaluation of an off-line firewall policy parser and validation tool. This provides the system administrator with a textual interface and the vendor specific low level languages they trust and are familiar with, but the support of an off-line compiler tool. The tool was created using the Microsoft C#.NET language, and the Microsoft Visual Studio Integrated Development Environment (IDE). This provided an object environment to create a flexible and extensible system, as well as simple Web and Windows prototyping facilities to create GUI front-end applications for testing and evaluation. A CLI was provided with the tool, for more experienced users, but it was also designed to be easily integrated into GUI based applications for non-expert users. The evaluation of the system was performed from a custom built GUI application, which can create test firewall rule sets containing synthetic rules, to supply a variety of experimental conditions, as well as record various performance metrics. The validation tool was created, based around a pragmatic outlook, with regard to the needs of the network administrator. The modularity of the design was important, due to the fast changing nature of the network device languages being processed. An object oriented approach was taken, for maximum changeability and extensibility, and a flexible tool was developed, due to the possible needs of different types users. System administrators desire, low level, CLI-based tools that they can trust, and use easily from scripting languages. Inexperienced users may prefer a more abstract, high level, GUI or Wizard that has an easier to learn process. Built around these ideas, the tool was implemented, and proved to be a usable, and complimentary addition to the many network policy-based systems currently available. The tool has a flexible design and contains comprehensive functionality. As opposed to some of the other tools which perform across multiple vendor languages, but do not implement a deep range of options for any of the languages. It compliments existing systems, such as policy compliance tools, and abstract policy analysis systems. Its validation algorithms were evaluated for both completeness, and performance. The tool was found to correctly process large firewall policies in just a few seconds. A framework for a policy-based management system, with which the tool would integrate, is also proposed. This is based around a vendor independent XML-based repository of device configurations, which could be used to bring together existing policy management and analysis systems.
Resumo:
Chungui Lu, Olga A. Koroleva, John F. Farrar, Joe Gallagher, Chris J. Pollock, and A. Deri Tomos (2002). Rubisco small subunit, chlorophyll a/b-binding protein and sucrose : fructan-6-fructosyl transferase gene expression and sugar status in single barley leaf cells in situ. Cell type specificity and induction by light. Plant Physiology, 130 (3) pp.1335-1348 Sponsorship: BBSRC RAE2008
Resumo:
El nucleopoliedrovirus de Spodoptera exigua (SeMNPV) es un patógeno natural de las poblaciones larvarias de S. exigua que constituye la base de un bioinsecticida comercializado en España para el control biológico de esta plaga en pimiento. Recientes estudios han demostrado que la transmisión del virus a la descendencia (transmisión vertical) se da con frecuencia y podría ser una característica deseable para su uso en aplicaciones de campo. En el presente trabajo se discute la conveniencia de utilizar una mezcla de dos genotipos SeAl1 (transmisión vertical) y SeG25 (transmisión horizontal) en determinadas proporciones para mejorar las características que cada uno de ellos presenta por separado y así explotar cada una de las vías de transmisión. La patogenicidad (CL50) del genotipo SeG25, y de cualquiera de las mezclas que contienen un 25, 50 o 75 % del mismo, fue más alta que la del aislado SeAl1. Sin embargo, en términos de virulencia (TMM) y productividad (OBs/larva) no se observaron diferencias significativas entre genotipos ni entre sus mezclas. Además se evaluó la capacidad de producir infecciones encubiertas de cada genotipo y sus mezclas sometiendo larvas de S. exigua a infecciones subletales del virus. Se encontraron transcritos del virus para el gen temprano ie0 mediante RT-PCR en los adultos supervivientes a infecciones provocadas por el genotipo SeG25 y todas las mezclas. También se testaron otros dos genes virales que se expresan de manera temprana y tardía en la infección de baculovirus (DNA-polimerasa y polihedrina) para los que en ningún caso se detectaron transcritos.
Resumo:
Wśród niematerialnych potrzeb ludzkich do najważniejszych, z punktu widzenia polityki społecznej, należy potrzeba bezpieczeństwa. Stąd takim istotnym problemem jest gwarantowanie obywatelom poczucia bezpieczeństwa socjalnego. Choć z jednej strony, rozwój gospodarczy przynosi za sobą wzrost zamożności społeczeństwa, a co za tym idzie, wzrost poczucia bezpieczeństwa socjalnego, z drugiej strony w społeczeństwie nadal występują osoby i grupy, które, z różnych powodów, nie korzystają z owoców owego postępu. Dotyczy to zwłaszcza tych, którzy maja ograniczony dostęp do podstawowych dóbr i usług powszechnie przysługujących. Ta kategoria osób – to osoby wykluczone, czy też marginalizowane społecznie. Dla wykluczenia społecznego najbardziej charakterystyczne są trzy cechy: niski poziom uczestnictwa w życiu społecznym, długotrwałość i niedobrowolność takiej sytuacji, ograniczenie możliwości korzystania z podstawowych praw obywatelskich. Kwestia wykluczenia społecznego od niedawna została uznana przez Unię Europejską za jeden z podstawowych problemów społecznych. Stąd ogłoszenie roku 2010 Europejskim Rokiem Walki z Ubóstwem i Wykluczeniem Społecznym i podjęcie konkretnych działań w celu ograniczenia tych zjawisk. Daje to nadzieję, że tak w Unii Europejskiej, jak i w Polsce uda się zmniejszyć ilościowe rozmiary wykluczenia społecznego.
Resumo:
This chapter shows that apart from changes at the systemic and institutional levels, successful reform implementation struggles with a gradual change in academic beliefs, attitudes and behaviours. Currently, visions of the university proposed by the Polish academic community and visions of it proposed by Polish reformers and policymakers (within ongoing reforms) are worlds apart. I shall study recent reforms in the context of specific academic self--protective narratives being produced in the last two decades (at the collective level of the academic profession) and in the context of the Ivory Tower university ideals predominant at the individual level (as studied comparatively through a large--scale European survey of the academic profession). Institutions change both swiftly, radically – and slowly, gradually. Research literature on institutional change until recently was focused almost exclusively on the role of radical changes caused by external shocks, leading to radical institutional reconfigurations. And research literature about the gradual, incremental institutional change have been emergent for about a decade and a half now (Mahoney and Thelen 2010; Streeck and Thelen 2005, 2009; Thelen 2003). Polish higher education provides interesting empirical grounds to test institutional theories. Both types of transformations (radical and gradual) may lead to equally permanent changes in the functioning of institutions, equally deep transformations of their fundamental rules, norms and operating procedures. Questions about institutional change are questions about characteristics of institutions undergoing changes. Endogenous institutional change is as important as exogenous change (Mahoney and Thelen 2010: 3). Moments in which there emerge opportunities of performing deep institutional reforms are short (in Poland these moments occurred in 2009-2012), and between them there are long periods of institutional stasis and stability (Pierson 2004: 134-135). The premises of theories of institutional change can be applied systematically to a system of higher education which shows an unprecedented rate of change and which is exposed to broad, fundamental reform programmes. There are many ways to discuss the Kudrycka reforms - and "constructing Polish universities as organizations" (rather than traditional academic "institutions") is one of more promising. In this account, Polish universities are under construction as organizations, and under siege as institutions. They are being rationalized as organizations, following instrumental rather than institutional logics. Polish academics in their views and attitudes are still following an institutional logic, while Polish reforms are following the new (New Public Management-led) instrumental logics. Both are on a collision course about basic values. Reforms and reformees seem to be worlds apart. I am discussing the the two contrasting visions of the university and describing the Kudrycka reforms as the reistitutionalization of the research mission of Polish universities. The core of reforms is a new level of funding and governance - the intermediary one (and no longer the state one), with four new peer-run institutions, with the KEJN, PKA and NCN in the lead. Poland has been beginning to follow the "global rules of the academic game" since 2009. I am also discussing two academic self-protection modes agains reforms: (Polish) "national academic traditions" and "institutional exceptionalism" (of Polish HE). Both discourses prevailed for two decades, none seems socially (and politically) acceptable any more. Old myths do not seem to fit new realities. In this context I am discussing briefly and through large-scale empirical data the low connectedness to the outside world of Polish HE institutions, low influence of the government on HE policies and the low level of academic entrepreneurialism, as seen through the EUROAC/CAP micro-level data. The conclusion is that the Kudrycka reforms are an imporant first step only - Poland is too slow in reforms, and reforms are both underfunded and inconsistent. Poland is still accumulating disadvantages as public funding and university reforms have not reached a critical point. Ever more efforts lead to ever less results, as macro-level data show. Consequently, it may be useful to construct universities as organizations in Poland to a higher degree than elsewhere in Europe, and especially in Western Europe.
Resumo:
Projeto de Pós-Graduação/Dissertação apresentado à Universidade Fernando Pessoa como parte dos requisitos para obtenção do grau de Mestre em Ciências Farmacêuticas
Resumo:
O selénio (Se) é um micronutriente essencial para o crescimento, desenvolvimento e normal metabolismo dos animais, incluindo o ser humano. É parte integrante de um conjunto de proteínas, as selenoproteínas, com ação antioxidante (protegendo as membranas celulares contra danos dos radicais livres), envolvidas no metabolismo das hormonas da tiróide, na regulação do crescimento e viabilidade celular, nas funções do sistema imune e na reprodução. É introduzido na dieta alimentar (principalmente nas formas de selenometionina e selenocisteína) através das plantas, e de produtos que delas derivam, que assimilam os compostos de selénio presentes no solo. Uma vez que a quantidade de selénio existente nos solos é muito variável, o teor nos alimentos vai depender da sua origem geográfica e, por consequência, a ingestão de selénio varia entre regiões e países. Baixos níveis de selénio estão associados a um declínio na função imune e problemas cognitivos. A deficiência de Se pode também ocasionar problemas musculares e cardiomiopatia. Concentrações reduzidas foram observadas em indíviduos com crises epiléticas e também em casos de pré-eclampsia. A deficiência de selénio pode também desenvolver-se durante a nutrição parenteral. Atualmente, a Dose Diária Recomendada (DDR) é de 55 μg/dia para homens e mulheres adultos e saudáveis. No entanto, existem evidências clínicas de que a ingestão em doses superiores (200-300 μg/dia) pode ter um papel benéfico na prevenção de alguns tipos de cancro e doenças cardiovasculares, na melhoria da resposta imunológica, como neuroprotetor e na fertilidade. O Se desempenha um papel importante na fertilidade masculina, sendo necessário na biossíntese da testosterona e na formação e normal desenvolvimento dos espermatozóides. Em mulheres grávidas o Se, ajuda a prevenir complicações antes e durante o parto e promove o normal desenvolvimento do feto. Como antioxidante o selénio vai combater os danos provocados pelos radicais livres, impedindo que estes exerçam o seu papel prejudicial no organismo. Sendo o sistema imunológico muito suscetível aos danos provocados pelo stress oxidativo, o Se vai exercer efeitos benéficos combatendo os danos por ele causados. Relativamente à capacidade viral, não é possível saber com exatidão qual a quantidade de Se necessária ou concentração ideal no plasma para evitar a ocorrência e desenvolvimento de infeções virais. No entanto, sabe-se que tem um efeito benéfico em pacientes HIV positivos e em indivíduos infetados com o vírus da hepatite (B ou C) contra a progressão para o neoplasia de fígado. Em teoria, a nível cardiovascular, este elemento pode exercer um efeito protetor, embora alguns estudos epidemiológicos não tenham mostrado uma associação clara entre o risco cardiovascular e os níveis selénio. A nível cerebral o Se vai atuar como neuroprotetor, prevenindo o aparecimento de patologias como demência e doença de Alzheimer. Apesar destes indicadores, a maioria dos países europeus, incluindo Portugal, regista uma deficiente ingestão de selénio por parte da população. A suplementação poderá constituir uma opção para garantir os níveis nutricionais recomendados e/ou ser utilizada com o objetivo de prevenir algumas doenças e o envelhecimento. No entanto o selénio pode também ser tóxico se ingerido em excesso, estando a dose máxima admissível fixada em 400 μg/dia. A intoxicação por selénio é chamada selenose e os sintomas comuns incluem: hálito a alho, distúrbios gastrointestinais, perda de cabelo, descamação das unhas, danos neurológicos e fadiga. Assim, atualmente acredita-se que enquanto indivíduos com baixo nível de Se podem obter benefícios da suplementação, esta pode ser prejudicial aqueles com valores normais ou elevados.
Resumo:
We consider a Delay Tolerant Network (DTN) whose users (nodes) are connected by an underlying Mobile Ad hoc Network (MANET) substrate. Users can declaratively express high-level policy constraints on how "content" should be routed. For example, content may be diverted through an intermediary DTN node for the purposes of preprocessing, authentication, etc. To support such capability, we implement Predicate Routing [7] where high-level constraints of DTN nodes are mapped into low-level routing predicates at the MANET level. Our testbed uses a Linux system architecture and leverages User Mode Linux [2] to emulate every node running a DTN Reference Implementation code [5]. In our initial prototype, we use the On Demand Distance Vector (AODV) MANET routing protocol. We use the network simulator ns-2 (ns-emulation version) to simulate the mobility and wireless connectivity of both DTN and MANET nodes. We show preliminary throughput results showing the efficient and correct operation of propagating routing predicates, and as a side effect, the performance benefit of content re-routing that dynamically (on-demand) breaks the underlying end-to-end TCP connection into shorter-length TCP connections.
Resumo:
We consider a Delay Tolerant Network (DTN) whose users (nodes) are connected by an underlying Mobile Ad hoc Network (MANET) substrate. Users can declaratively express high-level policy constraints on how “content” should be routed. For example, content can be directed through an intermediary DTN node for the purposes of preprocessing, authentication, etc., or content from a malicious MANET node can be dropped. To support such content routing at the DTN level, we implement Predicate Routing [1] where high-level constraints of DTN nodes are mapped into low-level routing predicates within the MANET nodes. Our testbed [2] uses a Linux system architecture with User Mode Linux [3] to emulate every DTN node with a DTN Reference Implementation code [4]. In our initial architecture prototype, we use the On Demand Distance Vector (AODV) routing protocol at the MANET level. We use the network simulator ns-2 (ns-emulation version) to simulate the wireless connectivity of both DTN and MANET nodes. Preliminary results show the efficient and correct operation of propagating routing predicates. For the application of content re-routing through an intermediary, as a side effect, results demonstrate the performance benefit of content re-routing that dynamically (on-demand) breaks the underlying end-to-end TCP connections into shorter-length TCP connections.
Resumo:
A combined 2D, 3D approach is presented that allows for robust tracking of moving bodies in a given environment as observed via a single, uncalibrated video camera. Tracking is robust even in the presence of occlusions. Low-level features are often insufficient for detection, segmentation, and tracking of non-rigid moving objects. Therefore, an improved mechanism is proposed that combines low-level (image processing) and mid-level (recursive trajectory estimation) information obtained during the tracking process. The resulting system can segment and maintain the tracking of moving objects before, during, and after occlusion. At each frame, the system also extracts a stabilized coordinate frame of the moving objects. This stabilized frame is used to resize and resample the moving blob so that it can be used as input to motion recognition modules. The approach enables robust tracking without constraining the system to know the shape of the objects being tracked beforehand; although, some assumptions are made about the characteristics of the shape of the objects, and how they evolve with time. Experiments in tracking moving people are described.
Resumo:
A mechanism is proposed that integrates low-level (image processing), mid-level (recursive 3D trajectory estimation), and high-level (action recognition) processes. It is assumed that the system observes multiple moving objects via a single, uncalibrated video camera. A novel extended Kalman filter formulation is used in estimating the relative 3D motion trajectories up to a scale factor. The recursive estimation process provides a prediction and error measure that is exploited in higher-level stages of action recognition. Conversely, higher-level mechanisms provide feedback that allows the system to reliably segment and maintain the tracking of moving objects before, during, and after occlusion. The 3D trajectory, occlusion, and segmentation information are utilized in extracting stabilized views of the moving object. Trajectory-guided recognition (TGR) is proposed as a new and efficient method for adaptive classification of action. The TGR approach is demonstrated using "motion history images" that are then recognized via a mixture of Gaussian classifier. The system was tested in recognizing various dynamic human outdoor activities; e.g., running, walking, roller blading, and cycling. Experiments with synthetic data sets are used to evaluate stability of the trajectory estimator with respect to noise.