962 resultados para Open-system Fractional Crystallization


Relevância:

30.00% 30.00%

Publicador:

Resumo:

Does there exist a Steiner Triple System on v points, whose blocks can be partitioned into partial parallel classes of size m, where m ≤ [v⁄3], m | b and b is the number of blocks of the STS(v)? We give the answer for 9 ≤ v ≤ 43. We also show that whenever 2|b, v ≡ 3 (mod 6) we can find an STS(v) whose blocks can be partitioned into partial parallel classes of size 2, and whenever 4|b , v ≡ 3 (mod 6), there exists an STS(v) whose blocks can be partitioned into partial parallel classes of size 4.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

More than eighteen percent of the world’s population lives without reliable access to clean water, forced to walk long distances to get small amounts of contaminated surface water. Carrying heavy loads of water long distances and ingesting contaminated water can lead to long-term health problems and even death. These problems affect the most vulnerable populations, women, children, and the elderly, more than anyone else. Water access is one of the most pressing issues in development today. Boajibu, a small village in Sierra Leone, where the author served in Peace Corps for two years, lacks access to clean water. Construction of a water distribution system was halted when a civil war broke out in 1992 and has not been continued since. The community currently relies on hand-dug and borehole wells that can become dirty during the dry season, which forces people to drink contaminated water or to travel a far distance to collect clean water. This report is intended to provide a design the system as it was meant to be built. The water system design was completed based on the taps present, interviews with local community leaders, local surveying, and points taken with a GPS. The design is a gravity-fed branched water system, supplied by a natural spring on a hill adjacent to Boajibu. The system’s source is a natural spring on a hill above Boajibu, but the flow rate of the spring is unknown. There has to be enough flow from the spring over a 24-hour period to meet the demands of the users on a daily basis, or what is called providing continuous flow. If the spring has less than this amount of flow, the system must provide intermittent flow, flow that is restricted to a few hours a day. A minimum flow rate of 2.1 liters per second was found to be necessary to provide continuous flow to the users of Boajibu. If this flow is not met, intermittent flow can be provided to the users. In order to aid the construction of a distribution system in the absence of someone with formal engineering training, a table was created detailing water storage tank sizing based on possible source flow rates. A builder can interpolate using the source flow rate found to get the tank size from the table. However, any flow rate below 2.1 liters per second cannot be used in the table. In this case, the builder should size the tank such that it can take in the water that will be supplied overnight, as all the water will be drained during the day because the users will demand more than the spring can supply through the night. In the developing world, there is often a problem collecting enough money to fund large infrastructure projects, such as a water distribution system. Often there is only enough money to add only one or two loops to a water distribution system. It is helpful to know where these one or two loops can be most effectively placed in the system. Various possible loops were designated for the Boajibu water distribution system and the Adaptive Greedy Heuristic Loop Addition Selection Algorithm (AGHLASA) was used to rank the effectiveness of the possible loops to construct. Loop 1 which was furthest upstream was selected because it benefitted the most people for the least cost. While loops which were further downstream were found to be less effective because they would benefit fewer people. Further studies should be conducted on the water use habits of the people of Boajibu to more accurately predict the demands that will be placed on the system. Further population surveying should also be conducted to predict population change over time so that the appropriate capacity can be built into the system to accommodate future growth. The flow at the spring should be measured using a V-notch weir and the system adjusted accordingly. Future studies can be completed adjusting the loop ranking method so that two users who may be using the water system for different lengths of time are not counted the same and vulnerable users are weighted more heavily than more robust users.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Principal Component Analysis (PCA) is a popular method for dimension reduction that can be used in many fields including data compression, image processing, exploratory data analysis, etc. However, traditional PCA method has several drawbacks, since the traditional PCA method is not efficient for dealing with high dimensional data and cannot be effectively applied to compute accurate enough principal components when handling relatively large portion of missing data. In this report, we propose to use EM-PCA method for dimension reduction of power system measurement with missing data, and provide a comparative study of traditional PCA and EM-PCA methods. Our extensive experimental results show that EM-PCA method is more effective and more accurate for dimension reduction of power system measurement data than traditional PCA method when dealing with large portion of missing data set.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

File system security is fundamental to the security of UNIX and Linux systems since in these systems almost everything is in the form of a file. To protect the system files and other sensitive user files from unauthorized accesses, certain security schemes are chosen and used by different organizations in their computer systems. A file system security model provides a formal description of a protection system. Each security model is associated with specified security policies which focus on one or more of the security principles: confidentiality, integrity and availability. The security policy is not only about “who” can access an object, but also about “how” a subject can access an object. To enforce the security policies, each access request is checked against the specified policies to decide whether it is allowed or rejected. The current protection schemes in UNIX/Linux systems focus on the access control. Besides the basic access control scheme of the system itself, which includes permission bits, setuid and seteuid mechanism and the root, there are other protection models, such as Capabilities, Domain Type Enforcement (DTE) and Role-Based Access Control (RBAC), supported and used in certain organizations. These models protect the confidentiality of the data directly. The integrity of the data is protected indirectly by only allowing trusted users to operate on the objects. The access control decisions of these models depend on either the identity of the user or the attributes of the process the user can execute, and the attributes of the objects. Adoption of these sophisticated models has been slow; this is likely due to the enormous complexity of specifying controls over a large file system and the need for system administrators to learn a new paradigm for file protection. We propose a new security model: file system firewall. It is an adoption of the familiar network firewall protection model, used to control the data that flows between networked computers, toward file system protection. This model can support decisions of access control based on any system generated attributes about the access requests, e.g., time of day. The access control decisions are not on one entity, such as the account in traditional discretionary access control or the domain name in DTE. In file system firewall, the access decisions are made upon situations on multiple entities. A situation is programmable with predicates on the attributes of subject, object and the system. File system firewall specifies the appropriate actions on these situations. We implemented the prototype of file system firewall on SUSE Linux. Preliminary results of performance tests on the prototype indicate that the runtime overhead is acceptable. We compared file system firewall with TE in SELinux to show that firewall model can accommodate many other access control models. Finally, we show the ease of use of firewall model. When firewall system is restricted to specified part of the system, all the other resources are not affected. This enables a relatively smooth adoption. This fact and that it is a familiar model to system administrators will facilitate adoption and correct use. The user study we conducted on traditional UNIX access control, SELinux and file system firewall confirmed that. The beginner users found it easier to use and faster to learn then traditional UNIX access control scheme and SELinux.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Tissue engineering and regenerative medicine have emerged in an effort to generate replacement tissues capable of restoring native tissue structure and function, but because of the complexity of biologic system, this has proven to be much harder than originally anticipated. Silica based bioactive glasses are popular as biomaterials because of their ability to enhance osteogenesis and angiogenesis. Sol-gel processing methods are popular in generating these materials because it offers: 1) mild processing conditions; 2) easily controlled structure and composition; 3) the ability to incorporate biological molecules; and 4) inherent biocompatibility. The goal of this work was to develop a bioactive vaporization system for the deposition of silica sol-gel particles as a means to modify the material properties of a substrate at the nano- and micro- level to better mimic the instructive conditions of native bone tissue, promoting appropriate osteoblast attachment, proliferation, and differentiation as a means for supporting bone tissue regeneration. The size distribution, morphology and degradation behavior of the vapor deposited sol-gel particles developed here were found to be dependent upon formulation (H2O:TMOS, pH, Ca/P incorporation) and manufacturing (substrate surface character, deposition time). Additionally, deposition of these particles onto substrates can be used to modify overall substrate properties including hydrophobicity, roughness, and topography. Deposition of Ca/P sol particles induced apatite-like mineral formation on both two- and three-dimensional materials when exposed to body fluids. Gene expression analysis suggests that Ca/P sol particles induce upregulation osteoblast gene expression (Runx2, OPN, OCN) in preosteoblasts during early culture time points. Upon further modification-specifically increasing particle stability-these Ca/P sol particles possess the potential to serve as a simple and unique means to modify biomaterial surface properties as a means to direct osteoblast differentiation.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Open Source (OS) community offers numerous eLearning platforms of both types: Learning Management Systems (LMS) and Learning Content Systems (LCS). General purpose OS intermediaries such as SourceForge, ObjectWeb, Apache or specialized intermediaries like CampusSource reduce the cost to locate such eLearning platforms. Still, it is impossible to directly compare the functionalities of those OS software products without performing detailed testing on each product. Some articles available from eLearning Wikipedia show comparisons between eLearning platforms which can help, but at the end they barely serve as documentation which are becoming out of date quickly [1]. The absence of integration activities between OS eLearning platforms - which are sometimes quite similar in terms of functionalities and implementation technologies - is sometimes critical since most of the OS projects possess small financial and human resources. This paper shows a possible solution for these barriers of OS eLearning platforms. We propose the Model Driven Architecture (MDA) concept to capture functionalities and to identify similarities between available OS eLearning platforms. This contribution evolved from a fruitful discussion at the 2nd CampusSource Developer Conference at the University of Muenster (27th August 2004).

Relevância:

30.00% 30.00%

Publicador:

Resumo:

We describe the use of log file analysis to investigate whether the use of CSCL applications corresponds to its didactical purposes. Exemplarily we examine the use of the web-based system CommSy as software support for project-oriented university courses. We present two findings: (1) We suggest measures to shape the context of CSCL applications and support their initial and continuous use. (2) We show how log files can be used to analyze how, when and by whom a CSCL system is used and thus help to validate further empirical findings. However, log file analyses can only be interpreted reasonably when additional data concerning the context of use is available.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

„Open source and European antitrust laws: An analysis of copyleft and the prohibition of software license fees on the basis of art. 101 TFEU and the block exemptions“ Open source software and open source licenses (like the GNU GPL) are not only relevant for computer nerds or activists – they are already business. They are for example the fundament of LINUX, the only real rival of MICROSOFT’s WINDOWS-line in the field of operating systems for IBM PC compatibles. Art. 101 TFEU (like the identical predecessor art. 81 TEC) as part of the EU antitrust laws prohibits contract terms like price fixing and some forms of technology control. Are copyleft – the „viral effect“, the „cancer“ – and the interdiction of software license fees in the cross hairs of this legal rule? On the other side the European Union has since 2004 a new Technology Transfer Block Exemption with software license agreements for the first time in its scope: a safe harbour and a dry place under a umbrella for open source software? After the introduction (A) with a description of open source software the following text analyses the system of the European Unions competition law respectivley antitrust law and the requirements of the block exemptions (B). Starting point of antitrust analysis are undertakings – but who are the untertakings (C) in the field of widespread, independent developers as part of the „bazar organization“? To see how much open source has to fear from the law of the European Union, at the end the anti competitive and pro competitive effects of open source are totalized within the legal framework (D). The conclusion (E) shows: not nothing, but not much.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Vorträge und Präsentationen von der CampusSource Tagung am 25.04.2013 bei der FernUniversität in Hagen zu den Themen:Liferay, Lecture2Go, Hochschulapps, OERs-MOOCs, Open IDM, e-Identity, CampusSource White Paper Award

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Background: Statistical shape models are widely used in biomedical research. They are routinely implemented for automatic image segmentation or object identification in medical images. In these fields, however, the acquisition of the large training datasets, required to develop these models, is usually a time-consuming process. Even after this effort, the collections of datasets are often lost or mishandled resulting in replication of work. Objective: To solve these problems, the Virtual Skeleton Database (VSD) is proposed as a centralized storage system where the data necessary to build statistical shape models can be stored and shared. Methods: The VSD provides an online repository system tailored to the needs of the medical research community. The processing of the most common image file types, a statistical shape model framework, and an ontology-based search provide the generic tools to store, exchange, and retrieve digital medical datasets. The hosted data are accessible to the community, and collaborative research catalyzes their productivity. Results: To illustrate the need for an online repository for medical research, three exemplary projects of the VSD are presented: (1) an international collaboration to achieve improvement in cochlear surgery and implant optimization, (2) a population-based analysis of femoral fracture risk between genders, and (3) an online application developed for the evaluation and comparison of the segmentation of brain tumors. Conclusions: The VSD is a novel system for scientific collaboration for the medical image community with a data-centric concept and semantically driven search option for anatomical structures. The repository has been proven to be a useful tool for collaborative model building, as a resource for biomechanical population studies, or to enhance segmentation algorithms.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

[1] Two millimeter-sized hydrothermal monazites from an open fissure (cleft) that developed late during a dextral transpressional deformation event in the Aar Massif, Switzerland, have been investigated using electron microprobe and ion probe. The monazites are characterized by high Th/U ratios typical of other hydrothermal monazites. Deformation events in the area have been subdivided into three phases: (D1) main thrusting including formation of a new schistosity, (D2) dextral transpression, and (D3) local crenulation including development of a new schistosity. The two younger deformational structures are related to a subvertically oriented intermediate stress axis, which is characteristic for strike slip deformation. The inferred stress environment is consistent with observed kinematics and the opening of such clefts. Therefore, the investigated monazite-bearing cleft formed at the end of D2 and/or D3, and during dextral movements along NNW dipping planes. Interaction of cleft-filling hydrothermal fluid with wall rock results in rare earth element (REE) mineral formation and alteration of the wall rock. The main newly formed REE minerals are Y-Si, Y-Nb-Ti minerals, and monazite. Despite these mineralogical changes, the bulk chemistry of the system remains constant and thus these mineralogical changes require redistribution of elements via a fluid over short distances (centimeter). Low-grade alteration enables local redistribution of REE, related to the stability of the accessory phases. This allows high precision isotope dating of cleft monazite. 232Th/208Pb ages are not affected by excess Pb and yield growth domain ages between 8.03 ± 0.22 and 6.25 ± 0.60 Ma. Monazite crystallization in brittle structures is coeval or younger than 8 Ma zircon fission track data and hence occurred below 280°C.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The Agrobacterium tumefaciens VirB/D4 type IV secretion system (T4SS) delivers oncogenic T-DNA and effector proteins to susceptible plant cells. This leads to the formation of tumors termed Crown Galls. The VirB/D4 T4SS is comprised of 12 subunits (VirB1 to VirB11 and VirD4), which assemble to form two structures, a secretion channel spanning the cell envelope and a T-pilus extending from the cell surface. In A. tumefaciens, the VirB2 pilin subunit is required for assembly of the secretion channel and is the main subunit of the T-pilus. The focus of this thesis is to define key reactions associated with the T4SS biogenesis pathway involving the VirB2 pilin. Topology studies demonstrated that VirB2 integrates into the inner membrane with two transmembrane regions, a small cytoplasmic loop, and a long periplasmic loop comprised of covalently linked N and C termini. VirB2 was shown by the substituted cysteine accessibility method (SCAM) to adopt distinct structural states when integrated into the inner membrane and when assembled as a component of the secretion channel and the T-pilus. The VirB4 and VirB11 ATPases were shown by SCAM to modulate the structural state of membrane-integrated VirB2 pilin, and evidence was also obtained that VirB4 mediates extraction of pilin from the membrane. A model that VirB4 functions as a pilin dislocase by an energy-dependent mechanism was further supported by coimmunoprecipitation and osmotic shock studies. Mutational studies identified two regions of VirB10, an N-terminal transmembrane domain and an outer membrane-associated domain termed the antennae projection, that contribute selectively to T-pilus biogenesis. Lastly, characterization of a VirB10 mutant that confers a ‘leaky’ channel phenotype further highlighted the role of VirB10 in gating substrate translocation across the outer membrane as well as T-pilus biogenesis. Results of my studies support a working model in which the VirB4 ATPase catalyzes dislocation of membrane-integrated pilin, and distinct domains of VirB10 coordinate pilin incorporation into the secretion channel and the extracellular T-pilus.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Spiders, as all other arthropods, have an open circulatory system, and their body fluid, the hemolymph, freely moves between lymphatic vessels and the body cavities (see Wirkner and Huckstorf 2013). The hemolymph can be considered as a multifunctional organ, central for locomotion (Kropf 2013), respiration (Burmester 2013) and nutrition, and it amounts to approximately 20 % of a spider’s body weight. Any injury includes not only immediate hemolymph loss but also pathogen attacks and subsequent infections. Therefore spiders have to react to injuries in a combined manner to stop fluid loss and to defend against microbial invaders. This is achieved by an innate immune system which involves several host defence systems such as hemolymph coagulation and the production of a variety of defensive substances (Fukuzawa et al.2008). In spiders, the immune system is localised in hemocytes which are derived from the myocardium cells of the heart wall where they are produced as prohemocytes and from where they are released as different cell types into the hemolymph (Seitz 1972). They contribute to the defence against pathogens by phagocytosis, nodulation and encapsulation of invaders. The humoral response includes mechanisms which induce melanin production to destroy pathogens, a clotting cascade to stop hemolymph loss and the constitutive production of several types of antimicrobial peptides, which are stored in hemocyte granules and released into the hemolymph (Fukuzawa et al.2008) (Fig.7.1). The immune system of spiders is an innate immune system. It is hemolymph-based and characterised by a broad but not very particular specificity. Its advantage is a fast response within minutes to a few hours. This is in contrast to the adaptive immune system of vertebrates which can react to very specific pathogens, thus resulting in much more specific responses. Moreover, it creates an immunological memory during the lifetime of the species. The disadvantage is that it needs more time to react with antibody production, usually many hours to a few days, and needs to be built up during early ontogenesis.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

GABA-A receptors are chloride ion channels composed of five subunits, mediating fast synaptic and tonic inhibition in the mammalian brain. 19 different subunit isoforms have been identified, with the major receptor type in mammalian adult brain consisting of α1, β2, and γ2 subunits. GABA-A receptors are the target of numerous sedating and anxiolytic drugs such as benzodiazepines. The currently known endogenous ligands are GABA, neurosteroids and the endocannabinoid 2- arachidonoyl glycerol (2-AG). The pharmacological properties of this chloride ion channel strictly depend on receptor subunit composition and arrangement. GABA-A receptors bind and are inhibited by epileptogenic agents such as picrotoxin, and cyclodiene insecticides such as dieldrin. We screened aromatic monovalent anions with five-fold symmetry for inhibition of GABA-A receptors. One of the anions, PCCPinhibited currents elicited by GABA with comparable potency as picrotoxin. This inhibition showed all characteristics of an open channel block. The GABA-A receptor ion channel is lined by residues from the M2 membrane-spanning segment. To identify important residues of the pore involved in the interaction with the blocking molecules PCCP-, a mutation scan was performed in combination with subsequent analysis of the expressed mutant proteins using electrophysiological techniques. In a second project we characterised a light-switchable modulator of GABA-A receptors based on propofol. It was my responsibility to investigate the switching kinetics in patch clamp experiments. After its discovery in 1980, propofol has become the most widely used intravenous general anaesthetic. It is commonly accepted that the anaesthesia induced by this unusually lipophilic drug mostly results from potentiation of GABA induced currents. While GABA-A receptors respond to a variety of ligands, they are normally not sensitive towards light. This light sensitivity could be indirectly achieved by using modulators that can be optically switched between an active and an inactive form. We tested an azobenzene derivative of propofol where an aryldiazene unit is directly coupled to the pharmacophore. This molecule was termed azopropofol (AP2). The effect of AP2 on Cl- currents was investigated with electrophysiological techniques using α1β2γ2 GABA-A receptors expressed in Xenopus oocytes and HEK-cells. In the third project we wanted to investigate the functional role of GABA-A receptors in the liver, and their possible involvement in cell proliferation. GABA-A receptors are also found in a wide range of peripheral tissues, including parts of the peripheral nervous system and non-neural tissues such as smooth muscle, the female reproductive system, liver and several cancer tissues. However their precise function in non neuronal or cancerous cells is still unknown. For this purpose we investigated expression, localization and function of the hepatocytes GABA-A receptors in model cell lines and healthy and cancerous hepatocytes.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

We consider a large quantum system with spins 12 whose dynamics is driven entirely by measurements of the total spin of spin pairs. This gives rise to a dissipative coupling to the environment. When one averages over the measurement results, the corresponding real-time path integral does not suffer from a sign problem. Using an efficient cluster algorithm, we study the real-time evolution from an initial antiferromagnetic state of the two-dimensional Heisenberg model, which is driven to a disordered phase, not by a Hamiltonian, but by sporadic measurements or by continuous Lindblad evolution.