990 resultados para Dark objects method


Relevância:

20.00% 20.00%

Publicador:

Resumo:

The experiential sampling method (ESM) was used to collect data from 74 parttimestudents who described and assessed the risks involved in their current activitieswhen interrupted at random moments by text messages. The major categories ofperceived risk were short-term in nature and involved loss of time or materials relatedto work and physical damage (e.g., from transportation). Using techniques of multilevelanalysis, we demonstrate effects of gender, emotional state, and types of risk onassessments of risk. Specifically, females do not differ from males in assessing thepotential severity of risks but they see these as more likely to occur. Also, participantsassessed risks to be lower when in more positive self-reported emotional states. Wefurther demonstrate the potential of ESM by showing that risk assessments associatedwith current actions exceed those made retrospectively. We conclude by notingadvantages and disadvantages of ESM for collecting data about risk perceptions.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We address the problem of scheduling a multi-station multiclassqueueing network (MQNET) with server changeover times to minimizesteady-state mean job holding costs. We present new lower boundson the best achievable cost that emerge as the values ofmathematical programming problems (linear, semidefinite, andconvex) over relaxed formulations of the system's achievableperformance region. The constraints on achievable performancedefining these formulations are obtained by formulatingsystem's equilibrium relations. Our contributions include: (1) aflow conservation interpretation and closed formulae for theconstraints previously derived by the potential function method;(2) new work decomposition laws for MQNETs; (3) new constraints(linear, convex, and semidefinite) on the performance region offirst and second moments of queue lengths for MQNETs; (4) a fastbound for a MQNET with N customer classes computed in N steps; (5)two heuristic scheduling policies: a priority-index policy, anda policy extracted from the solution of a linear programmingrelaxation.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The case of two transition tables is considered, that is two squareasymmetric matrices of frequencies where the rows and columns of thematrices are the same objects observed at three different timepoints. Different ways of visualizing the tables, either separatelyor jointly, are examined. We generalize an existing idea where asquare matrix is descomposed into symmetric and skew-symmetric partsto two matrices, leading to a decomposition into four components: (1)average symmetric, (2) average skew-symmetric, (3) symmetricdifference from average, and (4) skew-symmetric difference fromaverage. The method is illustrated with an artificial example and anexample using real data from a study of changing values over threegenerations.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

PURPOSE: Recent work practices in the conservation and restoration involve the use of cyclododecane (CDD, CAS 294-62-2) to protect fragile artifacts during their handling or transportation. Little is known about its toxicity, and no previous exposure has been reported. A short field investigation was conducted to characterize the exposure conditions to both CDD vapors and aerosols.METHODS: Measurements were conducted in the laboratory of conservation and restoration of the archeological service in Bern (Switzerland). Three indoor and four outdoor typical work situations, either during brush or spray gun applications, were investigated. Measurements were performed on charcoal adsorbent tube and analyzed by a gas chromatograph equipped with a flame ionization detector.RESULTS: Measurements have been conducted during both brush and spray gun applications. Indoor exposures were of 0.75-15.5 mg/m(3), while outdoors exposures were 19.5-53.9 mg/m(3). Exposures appear to be extremely localized due to both physicochemical properties and application methods of the CDD. Vapor exposure increases dramatically with the confinement of the workplace.CONCLUSION: Preventive measures should be undertaken to limit as much as possible these exposures. Field work in confined areas (ditches, underground) is of particular concern. CDD-coated artifacts or materials should be stored in ventilated areas to avoid delayed exposures. [Authors]

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Spatial evaluation of Culicidae (Diptera) larvae from different breeding sites: application of a geospatial method and implications for vector control. This study investigates the spatial distribution of urban Culicidae and informs entomological monitoring of species that use artificial containers as larval habitats. Collections of mosquito larvae were conducted in the São Paulo State municipality of Santa Bárbara d' Oeste between 2004 and 2006 during house-to-house visits. A total of 1,891 samples and nine different species were sampled. Species distribution was assessed using the kriging statistical method by extrapolating municipal administrative divisions. The sampling method followed the norms of the municipal health services of the Ministry of Health and can thus be adopted by public health authorities in disease control and delimitation of risk areas. Moreover, this type of survey and analysis can be employed for entomological surveillance of urban vectors that use artificial containers as larval habitat.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In this paper, an extension of the multi-scale finite-volume (MSFV) method is devised, which allows to Simulate flow and transport in reservoirs with complex well configurations. The new framework fits nicely into the data Structure of the original MSFV method,and has the important property that large patches covering the whole well are not required. For each well. an additional degree of freedom is introduced. While the treatment of pressure-constraint wells is trivial (the well-bore reference pressure is explicitly specified), additional equations have to be solved to obtain the unknown well-bore pressure of rate-constraint wells. Numerical Simulations of test cases with multiple complex wells demonstrate the ability of the new algorithm to capture the interference between the various wells and the reservoir accurately. (c) 2008 Elsevier Inc. All rights reserved.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We continue the development of a method for the selection of a bandwidth or a number of design parameters in density estimation. We provideexplicit non-asymptotic density-free inequalities that relate the $L_1$ error of the selected estimate with that of the best possible estimate,and study in particular the connection between the richness of the classof density estimates and the performance bound. For example, our methodallows one to pick the bandwidth and kernel order in the kernel estimatesimultaneously and still assure that for {\it all densities}, the $L_1$error of the corresponding kernel estimate is not larger than aboutthree times the error of the estimate with the optimal smoothing factor and kernel plus a constant times $\sqrt{\log n/n}$, where $n$ is the sample size, and the constant only depends on the complexity of the family of kernels used in the estimate. Further applications include multivariate kernel estimates, transformed kernel estimates, and variablekernel estimates.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

New method for rearing Spodoptera frugiperda in laboratory shows that larval cannibalism is not obligatory. Here we show, for the first time, that larvae of the fall armyworm (FAW), Spodoptera frugiperda (Lepidoptera, Noctuidae), can be successfully reared in a cohort-based manner with virtually no cannibalism. FAW larvae were reared since the second instar to pupation in rectangular plastic containers containing 40 individuals with a surprisingly ca. 90% larval survivorship. Adult females from the cohort-based method showed fecundity similar to that already reported on literature for larvae reared individually, and fertility higher than 99%, with the advantage of combining economy of time, space and material resources. These findings suggest that the factors affecting cannibalism of FAW larvae in laboratory rearings need to be reevaluated, whilst the new technique also show potential to increase the efficiency of both small and mass FAW rearings.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Capillary morphogenesis gene 2 (CMG2) is a type I membrane protein involved in the homeostasis of the extracellular matrix. While it shares interesting similarities with integrins, its exact molecular role is unknown. The interest and knowledge about CMG2 largely stems from the fact that it is involved in two diseases, one infectious and one genetic. CMG2 is the main receptor of the anthrax toxin, and knocking out this gene in mice renders them insensitive to infection with Bacillus anthracis spores. On the other hand, mutations in CMG2 lead to a rare but severe autosomal recessive disorder in humans called Hyaline Fibromatosis Syndrome (HFS). We will here review what is known about the structure of CMG2 and its ability to mediate anthrax toxin entry into cell. We will then describe the limited knowledge available concerning the physiological role of CMG2. Finally, we will describe HFS and the consequences of HFS-associated mutations in CMG2 at the molecular and cellular level.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Ultra-high-throughput sequencing (UHTS) techniques are evolving rapidly and may soon become an affordable and routine tool for sequencing plant DNA, even in smaller plant biology labs. Here we review recent insights into intraspecific genome variation gained from UHTS, which offers a glimpse of the rather unexpected levels of structural variability among Arabidopsis thaliana accessions. The challenges that will need to be addressed to efficiently assemble and exploit this information are also discussed.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper describes an optimized model to support QoS by mean of Congestion minimization on LSPs (Label Switching Path). In order to perform this model, we start from a CFA (Capacity and Flow Allocation) model. As this model does not consider the buffer size to calculate the capacity cost, our model- named BCA (Buffer Capacity Allocation)- take into account this issue and it improve the CFA performance. To test our proposal, we perform several simulations; results show that BCA model minimizes LSP congestion and uniformly distributes flows on the network

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Enhanced degradation of the fungicide metalaxyl was investigated in two soils: a gley humic (GH) and a Dark Red Latosol (LE), collected at sites never exposed to the fungicide. The soil samples were treated with successive applications of metalaxyl as a commercial formulation and 14C-metalaxyl in laboratory. Metalaxyl biodegradation was analyzed during 63 days by means of radiometric techniques to verify biomineralization and degradation product formation from the applied 14C-metalaxyl. Although biomineralization (maximum of 14 and 8% in the GH and LE soils, respectively), and partial degradation (about 32 and 48%, respectively) were detected in both soils, enhanced degradation was verified only in the GH soil. Results proved that metalaxyl behaves differently in soils.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Under the influence of intelligence-led policing models, crime analysis methods have known of important developments in recent years. Applications have been proposed in several fields of forensic science to exploit and manage various types of material evidence in a systematic and more efficient way. However, nothing has been suggested so far in the field of false identity documents.This study seeks to fill this gap by proposing a simple and general method for profiling false identity documents which aims to establish links based on their visual forensic characteristics. A sample of more than 200 false identity documents including French stolen blank passports, counterfeited driving licenses from Iraq and falsified Bulgarian driving licenses was gathered from nine Swiss police departments and integrated into an ad hoc developed database called ProfID. Links detected automatically and systematically through this database were exploited and analyzed to produce strategic and tactical intelligence useful to the fight against identity document fraud.The profiling and intelligence process established for these three types of false identity documents has confirmed its efficiency, more than 30% of documents being linked. Identity document fraud appears as a structured and interregional criminality, against which material and forensic links detected between false identity documents might serve as a tool for investigation.