953 resultados para Study of multiple cases


Relevância:

100.00% 100.00%

Publicador:

Resumo:

Crystallization and grain growth technique of thin film silicon are among the most promising methods for improving efficiency and lowering cost of solar cells. A major advantage of laser crystallization and annealing over conventional heating methods is its ability to limit rapid heating and cooling to thin surface layers. Laser energy is used to heat the amorphous silicon thin film, melting it and changing the microstructure to polycrystalline silicon (poly-Si) as it cools. Depending on the laser density, the vaporization temperature can be reached at the center of the irradiated area. In these cases ablation effects are expected and the annealing process becomes ineffective. The heating process in the a-Si thin film is governed by the general heat transfer equation. The two dimensional non-linear heat transfer equation with a moving heat source is solve numerically using the finite element method (FEM), particularly COMSOL Multiphysics. The numerical model help to establish the density and the process speed range needed to assure the melting and crystallization without damage or ablation of the silicon surface. The samples of a-Si obtained by physical vapour deposition were irradiated with a cw-green laser source (Millennia Prime from Newport-Spectra) that delivers up to 15 W of average power. The morphology of the irradiated area was characterized by confocal laser scanning microscopy (Leica DCM3D) and Scanning Electron Microscopy (SEM Hitachi 3000N). The structural properties were studied by micro-Raman spectroscopy (Renishaw, inVia Raman microscope).

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Entre los años 2004 y 2007 se hundieron por problemas de estabilidad cinco pesqueros españoles de pequeña eslora, de características parecidas, de relativamente poca edad, que habían sido construidos en un intervalo de pocos años. La mayoría de los tripulantes de esos pesqueros fallecieron o desaparecieron en esos accidentes. Este conjunto de accidentes tuvo bastante repercusión social y mediática. Entre ingenieros navales y marinos del sector de la pesca se relacionó estos accidentes con los condicionantes a los diseños de los pesqueros impuestos por la normativa de control de esfuerzo pesquero. Los accidentes fueron investigados y publicados sus correspondientes informes; en ellos no se exploró esta supuesta relación. Esta tesis pretende investigar la relación entre esos accidentes y los cambios de la normativa de esfuerzo pesquero. En la introducción se expone la normativa de control de esfuerzo pesquero analizada, se presentan datos sobre la estructura de la flota pesquera en España y su accidentalidad, y se detallan los criterios de estabilidad manejados durante el trabajo, explicando su relación con la seguridad de los pesqueros. Seguidamente se realiza un análisis estadístico de la siniestralidad en el sector de la pesca para establecer si el conjunto de accidentes estudiados supone una anomalía, o si por el contrario el conjunto de estos accidentes no es relevante desde el punto de vista estadístico. Se analiza la siniestralidad a partir de diversas bases de datos de buques pesqueros en España y se concluye que el conjunto de accidentes estudiados supone una anomalía estadística, ya que la probabilidad de ocurrencia de los cinco sucesos es muy baja considerando la frecuencia estimada de pérdidas de buques por estabilidad en el subsector de la flota pesquera en el que se encuadran los cinco buques perdidos. A continuación el trabajo se centra en la comparación de los buques accidentados con los buques pesqueros dados de baja para construir aquellos, según exige la normativa de control de esfuerzo pesquero; a estos últimos buques nos referiremos como “predecesores” de los buques accidentados. Se comparan las dimensiones principales de cada buque y de su predecesor, resultando que los buques accidentados comparten características de diseño comunes que son sensiblemente diferentes en los buques predecesores, y enlazando dichas características de diseño con los requisitos de la nueva normativa de control del esfuerzo pesquero bajo la que se construyeron estos barcos. Ello permite establecer una relación entre los accidentes y el mencionado cambio normativo. A continuación se compara el margen con que se cumplían los criterios reglamentarios de estabilidad entre los buques accidentados y los predecesores, encontrándose que en cuatro de los cinco casos los predecesores cumplían los criterios de estabilidad con mayor holgura que los buques accidentados. Los resultados obtenidos en este punto permiten establecer una relación entre el cambio de normativa de esfuerzo pesquero y la estabilidad de los buques. Los cinco buques accidentados cumplían con los criterios reglamentarios de estabilidad en vigor, lo que cuestiona la relación entre esos criterios y la seguridad. Por ello se extiende la comparativa entre pesqueros a dos nuevos campos relacionados con la estabilidad y la seguridad delos buques: • Movimientos a bordo (operatividad del buque), y • Criterios de estabilidad en condiciones meteorológicas adversas El estudio de la operatividad muestra que los buques accidentados tenían, en general, una mayor operatividad que sus predecesores, contrariamente a lo que sucedía con el cumplimiento de los criterios reglamentarios de estabilidad. Por último, se comprueba el desempeño de los diez buques en dos criterios específicos de estabilidad en caso de mal tiempo: el criterio IMO de viento y balance intenso, y un criterio de estabilidad de nueva generación, incluyendo la contribución original del autor de considerar agua en cubierta. Las tendencias observadas en estas dos comparativas son opuestas, lo que permite cuestionar la validez del último criterio sin un control exhaustivo de los parámetros de su formulación, poniendo de manifiesto la necesidad de más investigaciones sobre ese criterio antes de su adopción para uso regulatorio. El conjunto de estos resultados permite obtener una serie de conclusiones en la comparativa entre ambos conjuntos de buques pesqueros. Si bien los resultados de este trabajo no muestran que la aprobación de la nueva normativa de esfuerzo pesquero haya significado una merma general de seguridad en sectores enteros de la flota pesquera, sí se concluye que permitió que algunos diseños de buques pesqueros, posiblemente en busca de la mayor eficiencia compatible con dicha normativa, quedaran con una estabilidad precaria, poniendo de manifiesto que la relación entre seguridad y criterios de estabilidad no es unívoca, y la necesidad de que éstos evolucionen y se adapten a los nuevos diseños de buques pesqueros para continuar garantizando su seguridad. También se concluye que la estabilidad es un aspecto transversal del diseño de los buques, por lo que cualquier reforma normativa que afecte al diseño de los pesqueros o su forma de operar debería estar sujeta a evaluación por parte de las autoridades responsables de la seguridad marítima con carácter previo a su aprobación. ABSTRACT Between 2004 and 2007 five small Spanish fishing vessels sank in stability related accidents. These vessels had similar characteristics, had relatively short age, and had been built in a period of a few years. Most crewmembers of these five vessels died or disappeared in those accidents. This set of accidents had significant social and media impact. Among naval architects and seamen of the fishing sector these accidents were related to the design constraints imposed by the fishing control effort regulations. The accidents were investigated and the official reports issued; this alleged relationship was not explored. This thesis aims to investigate the relationship between those accidents and changes in fishing effort control regulations. In the introduction, the fishing effort control regulation is exposed, data of the Spanish fishing fleet structure and its accident rates are presented, and stability criteria dealt with in this work are explained, detailing its relationship with fishing vessel safety. A statistical analysis of the accident rates in the fishing sector in Spain is performed afterwards. The objective is determining whether the set of accidents studied constitute an anomaly or, on the contrary, they are not statistically relevant. Fishing vessels accident rates is analyzed from several fishing vessel databases in Spain. It is concluded that the set of studied accidents is statistically relevant, as the probability of occurrence of the five happenings is extremely low, considering the loss rates in the subsector of the Spanish fishing fleet where the studied vessels are fitted within. From this point the thesis focuses in comparing the vessels lost and the vessels that were decommissioned to build them as required by the fishing effort control regulation; these vessels will be referred to as “predecessors” of the sunk vessels. The main dimensions between each lost vessel and her predecessor are compared, leading to the conclusion that the lost vessels share design characteristics which are sensibly different from the predecessors, and linking these design characteristics with the requirements imposed by the new fishing control effort regulations. This allows establishing a relationship between the accidents and this regulation change. Then the margin in fulfilling the regulatory stability criteria among the vessels is compared, resulting, in four of the five cases, that predecessors meet the stability criteria with greater clearance than the sunk vessels. The results obtained at this point would establish a relationship between the change of fishing effort control regulation and the stability of vessels. The five lost vessels complied with the stability criteria in force, so the relation between these criteria and safety is put in question. Consequently, the comparison among vessels is extended to other fields related to safety and stability: • Motions onboard (operability), and • Specific stability criteria in rough weather The operability study shows that the lost vessels had in general greater operability than their predecessors, just the opposite as when comparing stability criteria. Finally, performance under specific rough weather stability criteria is checked. The criteria studied are the IMO Weather Criterion, and one of the 2nd generation stability criteria under development by IMO considering in this last case the presence of water on deck, which is an original contribution by the author. The observed trends in these two cases are opposite, allowing to put into question the last criterion validity without an exhaustive control of its formulation parameters; indicating that further research might be necessary before using it for regulatory purposes. The analysis of this set of results leads to some conclusions when comparing both groups of fishing vessels. While the results obtained are not conclusive in the sense that the entry into force of a new fishing effort control in 1998 caused a generalized safety reduction in whole sectors of the Spanish fishing fleet, it can be concluded that it opened the door for some vessel designs resulting with precarious stability. This evidences that the relation between safety and stability criteria is not univocal, so stability criteria needs to evolve for adapting to new fishing vessels designs so their safety is still guaranteed. It is also concluded that stability is a transversal aspect to ship design and operability, implying that any legislative reform affecting ship design or operating modes should be subjected to assessing by the authorities responsible for marine safety before being adopted.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

El principio de Teoría de Juegos permite desarrollar modelos estocásticos de patrullaje multi-robot para proteger infraestructuras criticas. La protección de infraestructuras criticas representa un gran reto para los países al rededor del mundo, principalmente después de los ataques terroristas llevados a cabo la década pasada. En este documento el termino infraestructura hace referencia a aeropuertos, plantas nucleares u otros instalaciones. El problema de patrullaje se define como la actividad de patrullar un entorno determinado para monitorear cualquier actividad o sensar algunas variables ambientales. En esta actividad, un grupo de robots debe visitar un conjunto de puntos de interés definidos en un entorno en intervalos de tiempo irregulares con propósitos de seguridad. Los modelos de partullaje multi-robot son utilizados para resolver este problema. Hasta el momento existen trabajos que resuelven este problema utilizando diversos principios matemáticos. Los modelos de patrullaje multi-robot desarrollados en esos trabajos representan un gran avance en este campo de investigación. Sin embargo, los modelos con los mejores resultados no son viables para aplicaciones de seguridad debido a su naturaleza centralizada y determinista. Esta tesis presenta cinco modelos de patrullaje multi-robot distribuidos e impredecibles basados en modelos matemáticos de aprendizaje de Teoría de Juegos. El objetivo del desarrollo de estos modelos está en resolver los inconvenientes presentes en trabajos preliminares. Con esta finalidad, el problema de patrullaje multi-robot se formuló utilizando conceptos de Teoría de Grafos, en la cual se definieron varios juegos en cada vértice de un grafo. Los modelos de patrullaje multi-robot desarrollados en este trabajo de investigación se han validado y comparado con los mejores modelos disponibles en la literatura. Para llevar a cabo tanto la validación como la comparación se ha utilizado un simulador de patrullaje y un grupo de robots reales. Los resultados experimentales muestran que los modelos de patrullaje desarrollados en este trabajo de investigación trabajan mejor que modelos de trabajos previos en el 80% de 150 casos de estudio. Además de esto, estos modelos cuentan con varias características importantes tales como distribución, robustez, escalabilidad y dinamismo. Los avances logrados con este trabajo de investigación dan evidencia del potencial de Teoría de Juegos para desarrollar modelos de patrullaje útiles para proteger infraestructuras. ABSTRACT Game theory principle allows to developing stochastic multi-robot patrolling models to protect critical infrastructures. Critical infrastructures protection is a great concern for countries around the world, mainly due to terrorist attacks in the last decade. In this document, the term infrastructures includes airports, nuclear power plants, and many other facilities. The patrolling problem is defined as the activity of traversing a given environment to monitoring any activity or sensing some environmental variables If this activity were performed by a fleet of robots, they would have to visit some places of interest of an environment at irregular intervals of time for security purposes. This problem is solved using multi-robot patrolling models. To date, literature works have been solved this problem applying various mathematical principles.The multi-robot patrolling models developed in those works represent great advances in this field. However, the models that obtain the best results are unfeasible for security applications due to their centralized and predictable nature. This thesis presents five distributed and unpredictable multi-robot patrolling models based on mathematical learning models derived from Game Theory. These multi-robot patrolling models aim at overcoming the disadvantages of previous work. To this end, the multi-robot patrolling problem was formulated using concepts of Graph Theory to represent the environment. Several normal-form games were defined at each vertex of a graph in this formulation. The multi-robot patrolling models developed in this research work have been validated and compared with best ranked multi-robot patrolling models in the literature. Both validation and comparison were preformed by using both a patrolling simulator and real robots. Experimental results show that the multirobot patrolling models developed in this research work improve previous ones in as many as 80% of 150 cases of study. Moreover, these multi-robot patrolling models rely on several features to highlight in security applications such as distribution, robustness, scalability, and dynamism. The achievements obtained in this research work validate the potential of Game Theory to develop patrolling models to protect infrastructures.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

In classical distributed systems, each process has a unique identity. Today, new distributed systems have emerged where a unique identity is not always possible to be assigned to each process. For example, in many sensor networks a unique identity is not possible to be included in each device due to its small storage capacity, reduced computational power, or the huge number of devices to be identified. In these cases, we have to work with anonymous distributed systems where processes cannot be identified. Consensus cannot be solved in classical and anonymous asynchronous distributed systems where processes can crash. To bypass this impossibility result, failure detectors are added to these systems. It is known that ? is the weakest failure detector class for solving consensus in classical asynchronous systems when amajority of processes never crashes. Although A? was introduced as an anonymous version of ?, to find the weakest failure detector in anonymous systems to solve consensus when amajority of processes never crashes is nowadays an open question. Furthermore, A? has the important drawback that it is not implementable. Very recently, A? has been introduced as a counterpart of ? for anonymous systems. In this paper, we show that the A? failure detector class is strictly weaker than A? (i.e., A? provides less information about process crashes than A?). We also present in this paper the first implementation of A? (hence, we also show that A? is implementable), and, finally, we include the first implementation of consensus in anonymous asynchronous systems augmented with A? and where a majority of processes does not crash.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The shelter effect of a windbreak protects aggregate piles and provides a reduction of particle emissions in harbours. RANS (Reynolds-averaged Navier–Stokes equations) simulations using three variants of k–ε (standard k–ε, RNG k–ε and realizable k–ε) turbulence closure models have been performed to analyse wind flow characteristics behind an isolated fence located on a flat surface without roughness elements. The performance of the three turbulence models has been assessed by wind tunnel experiments. Cases of fences with different porosities (φ) have been evaluated using wind tunnel experiments as well as numerical simulations. The aim is to determine an optimum porosity for sheltering effect of an isolated windbreak. A value of 0.35 was found as the optimum value among the studied porosities (φ=0, 0.1, 0.24, 0.35, 0.4, 0.5).

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Until a few years ago, most of the network communications were based in the wire as the physical media, but due to the advances and the maturity of the wireless communications, this is changing. Nowadays wireless communications offers fast, secure, efficient and reliable connections. Mobile communications are in expansion, clearly driven by the use of smart phones and other mobile devices, the use of laptops, etc… Besides that point, the inversion in the installation and maintenance of the physical medium is much lower than in wired communications, not only because the air has no cost, but because the installation and maintenance of the wire require a high economic cost. Besides the economic cost we find that wire is a more vulnerable medium to external threats such as noise, sabotages, etc… There are two different types of wireless networks: those which the structure is part of the network itself and those which have a lack of structure or any centralization, in a way that the devices that form part of the network can connect themselves in a dynamic and random way, handling also the routing of every control and information messages, this kind of networks is known as Ad-hoc. In the present work we will proceed to study one of the multiple wireless protocols that allows mobile communications, it is Optimized Link State Routing, from now on, OLSR, it is an pro-active routing, standard mechanism that works in a distributed in order to stablish the connections among the different nodes that belong to a wireless network. Thanks to this protocol it is possible to get all the routing tables in all the devices correctly updated every moment through the periodical transmission of control messages and on this way allow a complete connectivity among the devices that are part of the network and also, allow access to other external networks such as virtual private networks o Internet. This protocol could be perfectly used in environments such as airports, malls, etc… The update of the routing tables in all the devices is got thanks to the periodical transmission of control messages and finally it will offer connectivity among all the devices and the corresponding external networks. For the study of OLSR protocol we will have the help of the network simulator “Network Simulator 2”, a freeware network simulator programmed in C++ based in discrete events. This simulator is used mainly in educational and research environments and allows a very extensive range of protocols, both, wired networks protocols and wireless network protocols, what is going to be really useful to proceed to the simulation of different configurations of networks and protocols. In the present work we will also study different simulations with Network Simulator 2, in different scenarios with different configurations, wired networks, and Ad-hoc networks, where we will study OLSR Protocol. RESUMEN. Hasta hace pocos años, la mayoría de las comunicaciones de red estaban basadas en el cable como medio físico pero debido al avance y madurez alcanzados en el campo de las comunicaciones inalámbricas esto está cambiando. Hoy día las comunicaciones inalámbricas nos ofrecen conexiones veloces, seguras, eficientes y fiables. Las comunicaciones móviles se encuentran en su momento de máxima expansión, claramente impulsadas por el uso de teléfonos y demás dispositivos móviles, el uso de portátiles, etc… Además la inversión a realizar en la instalación y el mantenimiento del medio físico en las comunicaciones móviles es muchísimo menor que en comunicaciones por cable, ya no sólo porque el aire no tenga coste alguno, sino porque la instalación y mantenimiento del cable precisan de un elevado coste económico por norma. Además del coste económico nos encontramos con que es un medio más vulnerable a amenazas externas tales como el ruido, escuchas no autorizadas, sabotajes, etc… Existen dos tipos de redes inalámbricas: las constituidas por una infraestructura que forma parte más o menos de la misma y las que carecen de estructura o centralización alguna, de modo que los dispositivos que forman parte de ella pueden conectarse de manera dinámica y arbitraria entre ellos, encargándose además del encaminamiento de todos los mensajes de control e información, a este tipo de redes se las conoce como redes Ad-hoc. En el presente Proyecto de Fin de Carrera se procederá al estudio de uno de los múltiples protocolos inalámbricos que permiten comunicaciones móviles, se trata del protocolo inalámbrico Optimized Link State Routing, de ahora en adelante OLSR, un mecanismo estándar de enrutamiento pro-activo, que trabaja de manera distribuida para establecer las conexiones entre los nodos que formen parte de las redes inalámbricas Ad-hoc, las cuales carecen de un nodo central y de una infraestructura pre-existente. Gracias a este protocolo es posible conseguir que todos los equipos mantengan en todo momento las tablas de ruta actualizadas correctamente mediante la transmisión periódica de mensajes de control y así permitir una completa conectividad entre todos los equipos que formen parte de la red y, a su vez, también permitir el acceso a otras redes externas tales como redes privadas virtuales o Internet. Este protocolo sería usado en entornos tales como aeropuertos La actualización de las tablas de enrutamiento de todos los equipos se conseguirá mediante la transmisión periódica de mensajes de control y así finalmente se podrá permitir conectividad entre todos los equipos y con las correspondientes redes externas. Para el estudio del protocolo OLSR contaremos con el simulador de redes Network Simulator 2, un simulador de redes freeware programado en C++ basado en eventos discretos. Este simulador es usado principalmente en ambientes educativos y de investigación y permite la simulación tanto de protocolos unicast como multicast. El campo donde más se utiliza es precisamente en el de la investigación de redes móviles Ad-hoc. El simulador Network Simulator 2 no sólo implementa el protocolo OLSR, sino que éste implementa una amplia gama de protocolos, tanto de redes cableadas como de redes inalámbricas, lo cual va a sernos de gran utilidad para proceder a la simulación de distintas configuraciones de redes y protocolos. En el presente Proyecto de Fin de Carrera se estudiarán también diversas simulaciones con el simulador NS2 en diferentes escenarios con diversas configuraciones; redes cableadas, redes inalámbricas Ad-hoc, donde se estudiará el protocolo antes mencionado: OLSR. Este Proyecto de Fin de Carrera consta de cuatro apartados distintos: Primeramente se realizará el estudio completo del protocolo OLSR, se verán los beneficios y contrapartidas que ofrece este protocolo inalámbrico. También se verán los distintos tipos de mensajes existentes en este protocolo y unos pequeños ejemplos del funcionamiento del protocolo OLSR. Seguidamente se hará una pequeña introducción al simulador de redes Network Simulator 2, veremos la historia de este simulador, y también se hará referencia a la herramienta extra NAM, la cual nos permitirá visualizar el intercambio de paquetes que se produce entre los diferentes dispositivos de nuestras simulaciones de forma intuitiva y amigable. Se hará mención a la plataforma MASIMUM, encargada de facilitar en un entorno académico software y documentación a sus alumnos con el fin de facilitarles la investigación y la simulación de redes y sensores Ad-hoc. Finalmente se verán dos ejemplos, uno en el que se realizará una simulación entre dos PCs en un entorno Ethernet y otro ejemplo en el que se realizará una simulación inalámbrica entre cinco dispositivos móviles mediante el protocolo a estudiar, OLSR.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Lethal factor is a protease, one component of Bacillus anthracis exotoxin, which cleaves many of the mitogen-activated protein kinase kinases (MEKs). Given the importance of MEK signaling in tumorigenesis, we assessed the effects of anthrax lethal toxin (LeTx) on tumor cells. LeTx was very effective in inhibiting mitogen-activated protein kinase activation in V12 H-ras-transformed NIH 3T3 cells. In vitro, treatment of transformed cells with LeTx caused them to revert to a nontransformed morphology, and inhibited their abilities to form colonies in soft agar and to invade Matrigel without markedly affecting cell proliferation. In vivo, LeTx inhibited growth of ras-transformed cells implanted in athymic nude mice (in some cases causing tumor regression) at concentrations that caused no apparent animal toxicity. Unexpectedly, LeTx also greatly decreased tumor neovascularization. These results demonstrate that LeTx potently inhibits ras-mediated tumor growth and is a potential antitumor therapeutic.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Traditional mechanisms thought to underlie opioid tolerance include receptor phosphorylation/down-regulation, G-protein uncoupling, and adenylyl cyclase superactivation. A parallel line of investigation also indicates that opioid tolerance development results from a switch from predominantly opioid receptor Giα inhibitory to Gβγ stimulatory signaling. As described previously, this results, in part, from the increased relative abundance of Gβγ-stimulated adenylyl cyclase isoforms as well as from a profound increase in their phosphorylation [Chakrabarti, S., Rivera, M., Yan, S.-Z., Tang, W.-J. & Gintzler, A. R. (1998) Mol. Pharmacol. 54, 655–662; Chakrabarti, S., Wang, L., Tang, W.-J. & Gintzler, A. R. (1998) Mol. Pharmacol. 54, 949–953]. The present study demonstrates that chronic morphine administration results in the concomitant phosphorylation of three key signaling proteins, G protein receptor kinase (GRK) 2/3, β-arrestin, and Gβ, in the guinea pig longitudinal muscle myenteric plexus tissue. Augmented phosphorylation of all three proteins is evident in immunoprecipitate obtained by using either anti-GRK2/3 or Gβ antibodies, but the phosphorylation increment is greater in immunoprecipitate obtained with Gβ antibodies. Analyses of coimmunoprecipitated proteins indicate that phosphorylation of GRK2/3, β-arrestin, and Gβ has varying consequences on their ability to associate. As a result, increased availability of and signaling via Gβγ could occur without compromising the membrane content (and presumably activity) of GRK2/3. Induction of the concomitant phosphorylation of multiple proteins in a multimolecular complex with attendant modulation of their association represents a novel mechanism for increasing Gβγ signaling and opioid tolerance formation.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Event-related brain potentials (ERPs) provide high-resolution measures of the time course of neuronal activity patterns associated with perceptual and cognitive processes. New techniques for ERP source analysis and comparisons with data from blood-flow neuroimaging studies enable improved localization of cortical activity during visual selective attention. ERP modulations during spatial attention point toward a mechanism of gain control over information flow in extrastriate visual cortical pathways, starting about 80 ms after stimulus onset. Paying attention to nonspatial features such as color, motion, or shape is manifested by qualitatively different ERP patterns in multiple cortical areas that begin with latencies of 100–150 ms. The processing of nonspatial features seems to be contingent upon the prior selection of location, consistent with early selection theories of attention and with the hypothesis that spatial attention is “special.”

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Mutations in 12 genes regulating Drosophila melanogaster mushroom body (MB) development were each studied in two genetic backgrounds. In all cases, brain structure was qualitatively or quantitatively different after replacement of the "original" genetic background with that of the Canton Special wild-type strain. The mushroom body miniature gene (mbm) was investigated in detail. mbm supports the maintenance of MB Kenyon cell fibers in third instar larvae and their regrowth during metamorphosis. Adult mbm1 mutant females are lacking many or most Kenyon cell fibers and are impaired in MB-mediated associative odor learning. We show here that structural defects in mbm1 are apparent only in combination with an X-linked, dosage-dependent modifier (or modifiers). In the Canton Special genetic background, the mbm1 anatomical phenotype is suppressed, and MBs develop to a normal size. However, the olfactory learning phenotype is not fully restored, suggesting that submicroscopic defects persist in the MBs. Mutant mbm1 flies with full-sized MBs have normal retention but show a specific acquisition deficit that cannot be attributed to reductions in odor avoidance, shock reactivity, or locomotor behavior. We propose that polymorphic gene interactions (in addition to ontogenetic factors) determine MB size and, concomitantly, the ability to recognize and learn odors.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

We present coordinated multiwavelength observations of the bright, nearby BL Lacertae object Mrk 421 taken in 2013 January–March, involving GASP-WEBT, Swift, NuSTAR, Fermi-LAT, MAGIC, VERITAS, and other collaborations and instruments, providing data from radio to very high energy (VHE) γ-ray bands. NuSTAR yielded previously unattainable sensitivity in the 3–79 keV range, revealing that the spectrum softens when the source is dimmer until the X-ray spectral shape saturates into a steep G » 3 power law, with no evidence for an exponential cutoff or additional hard components up "aprox" 80keV. For the first time, we observed both the synchrotron and the inverse-Compton peaks of the spectral energy distribution (SED) simultaneously shifted to frequencies below the typical quiescent state by an order of magnitude. The fractional variability as a function of photon energy shows a double-bump structure that relates to the two bumps of the broadband SED. In each bump, the variability increases with energy, which, in the framework of the synchrotron self-Compton model, implies that the electrons with higher energies are more variable. The measured multi band variability, the significant X-ray-toVHE correlation down to some of the lowest fluxes ever observed in both bands, the lack of correlation between optical/UV and X-ray flux, the low degree of polarization and its significant (random) variations, the short estimated electron cooling time, and the significantly longer variability timescale observed in the NuSTAR light curves point toward in situ electron acceleration and suggest that there are multiple compact regions contributing to the broadband emission of Mrk 421 during low-activity states.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This study involves a qualitative analysis of a doctoral-level psychology trainee's first-hand account of sexual attraction and boundary violations that occurred in her clinical supervision and psychotherapy. Concepts of power, gender, social performance theory, and relational framing are applied to two case examples, illustrating the differing demands on a trainee when her relationships were sexualized in two distinct professional contexts. Ramifications of supervisory exploitation and the impact of such an experience on a trainee's professional development are discussed. Recommendations are provided for improving psychology training programs' prevention and response efforts.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This capstone reviews uses of the Continental Divide National Scenic Trail. Policies governing use of the trail appear to be ambiguous, especially regarding mountain bicycles. Mountain biking has grown since the trail was created, but is not fully addressed in existing or proposed policy. 382 people on five segments of the trail in Colorado were interviewed for this capstone. Mountain bikes, hiking, and motorized recreation were observed uses. User conflict, overcrowding, degraded recreation experiences, or user displacement was not reported. User satisfaction was high and most would return. Interviewees requested increased public involvement and recognition of user needs in setting policy. Trail degradation occurs, but is unassociated with any particular use. Recommendations for trail improvement and maintenance are presented.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Kinetics of 1,3-dipolar cycloaddition involving azomethine ylides, generated from thermal [1,2]-prototropy of the corresponding imino ester, employing differential scanning calorimetry (DSC), is surveyed. Glycine and phenylalanine derived imino esters have different behavior. The first one prefers reacting with itself at 75 ºC, rather than with the dipolarophile. However, the α-substituted imino ester gives the cycloadduct at higher temperatures. The thermal dynamic analysis by 1H NMR of the neat reaction mixture of the glycine derivative reveals the presence of signals corresponding to the dipole in very small proportion. The non-isothermal and isothermal DSC curves of the cycloaddition of phenylalaninate and diisobutyl fumarate are obtained from freshly prepared samples. The application of known kinetic models and mathematical multiple non-linear regressions (NLR) allow to determine and to compare Ea, lnA, reaction orders, and reaction enthalpy. Finally a rate equation for each different temperature can be established for this particular thermal cycloaddition.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Poly(lactic acid) (PLA) was melt-blended with a bio-based oligomeric lactic acid (OLA) plasticizer at different concentrations between 15 wt% and 25 wt% in order to enhance PLA ductility and to get a fully biodegradable material with potential application in films manufacturing. OLA was an efficient plasticizer for PLA, as it caused a significant decrease on glass transition temperature (Tg) while improving considerably ductile properties. Only one Tg value was observed in all cases and no apparent phase separation was detected. Films obtained by compression moulding were stored during 3 months under ambient controlled conditions and thermal, mechanical, structural and oxygen barrier properties were studied in order to evaluate the stability of the PLA–OLA films over time. Blends with 20 and 25 wt% OLA remained stable and compatible with PLA within the ageing period. Besides, PLA–20 wt% OLA formulation was the only one which maintained its amorphous state with adequate thermal, mechanical and oxygen barrier properties for flexible films manufacturing.