926 resultados para Dependent Failures, Interactive Failures, Interactive Coefficients, Reliability, Complex System


Relevância:

40.00% 40.00%

Publicador:

Resumo:

For any number field we calculate the exact proportion of rational numbers which are everywhere locally a norm but not globally a norm from the number field.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

During a four month scholarly leave in United States of America, researchers designed a culturally appropriate prevention program for eating disorders (ED) for Brazilian adolescent girls. The program ""Se Liga na Nutricao"" was modeled on other effective programs identified in a research literature review and was carried out over eleven interactive sessions. It was positively received by the adolescents who suggested that it be part of school curricula. The girls reported that it helped them to develop critical thinking skills with regards to sociocultural norms about body image, food and eating practices. (Eating Weight Disord. 15: e270-e274, 2010). (C)2010, Editrice Kurtis

Relevância:

40.00% 40.00%

Publicador:

Resumo:

The literature reports research efforts allowing the editing of interactive TV multimedia documents by end-users. In this article we propose complementary contributions relative to end-user generated interactive video, video tagging, and collaboration. In earlier work we proposed the watch-and-comment (WaC) paradigm as the seamless capture of an individual`s comments so that corresponding annotated interactive videos be automatically generated. As a proof of concept, we implemented a prototype application, the WACTOOL, that supports the capture of digital ink and voice comments over individual frames and segments of the video, producing a declarative document that specifies both: different media stream structure and synchronization. In this article, we extend the WaC paradigm in two ways. First, user-video interactions are associated with edit commands and digital ink operations. Second, focusing on collaboration and distribution issues, we employ annotations as simple containers for context information by using them as tags in order to organize, store and distribute information in a P2P-based multimedia capture platform. We highlight the design principles of the watch-and-comment paradigm, and demonstrate related results including the current version of the WACTOOL and its architecture. We also illustrate how an interactive video produced by the WACTOOL can be rendered in an interactive video environment, the Ginga-NCL player, and include results from a preliminary evaluation.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

We introduce a flexible technique for interactive exploration of vector field data through classification derived from user-specified feature templates. Our method is founded on the observation that, while similar features within the vector field may be spatially disparate, they share similar neighborhood characteristics. Users generate feature-based visualizations by interactively highlighting well-accepted and domain specific representative feature points. Feature exploration begins with the computation of attributes that describe the neighborhood of each sample within the input vector field. Compilation of these attributes forms a representation of the vector field samples in the attribute space. We project the attribute points onto the canonical 2D plane to enable interactive exploration of the vector field using a painting interface. The projection encodes the similarities between vector field points within the distances computed between their associated attribute points. The proposed method is performed at interactive rates for enhanced user experience and is completely flexible as showcased by the simultaneous identification of diverse feature types.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

Security administrators face the challenge of designing, deploying and maintaining a variety of configuration files related to security systems, especially in large-scale networks. These files have heterogeneous syntaxes and follow differing semantic concepts. Nevertheless, they are interdependent due to security services having to cooperate and their configuration to be consistent with each other, so that global security policies are completely and correctly enforced. To tackle this problem, our approach supports a comfortable definition of an abstract high-level security policy and provides an automated derivation of the desired configuration files. It is an extension of policy-based management and policy hierarchies, combining model-based management (MBM) with system modularization. MBM employs an object-oriented model of the managed system to obtain the details needed for automated policy refinement. The modularization into abstract subsystems (ASs) segment the system-and the model-into units which more closely encapsulate related system components and provide focused abstract views. As a result, scalability is achieved and even comprehensive IT systems can be modelled in a unified manner. The associated tool MoBaSeC (Model-Based-Service-Configuration) supports interactive graphical modelling, automated model analysis and policy refinement with the derivation of configuration files. We describe the MBM and AS approaches, outline the tool functions and exemplify their applications and results obtained. Copyright (C) 2010 John Wiley & Sons, Ltd.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

We previously demonstrated that Bis[(2-oxindol-3-ylimino)-2-(2-aminoethyl) pyridine-N, N`] copper(II) [Cu(isaepy)(2)] was an efficient inducer of the apoptotic mitochondrial pathway. Here, we deeply dissect the mechanisms underlying the ability of Cu(isaepy)(2) to cause mitochondriotoxicity. In particular, we demonstrate that Cu(isaepy)(2) increases NADH-dependent oxygen consumption of isolated mitochondria and that this phenomenon is associated with oxy-radical production and insensitive to adenosine diphosphate. These data indicate that Cu(isaepy)(2) behaves as an uncoupler and this property is also confirmed in cell systems. Particularly, SH-SY5Y cells show: (i) an early loss of mitochondrial transmembrane potential; (ii) a decrease in the expression levels of respiratory complex components and (iii) a significant adenosine triphosphate (ATP) decrement. The causative energetic impairment mediated by Cu(isaepy)(2) in apoptosis is confirmed by experiments carried out with rho(0) cells, or by glucose supplementation, where cell death is significantly inhibited. Moreover, gastric and cervix carcinoma AGS and HeLa cells, which rely most of their ATP production on oxidative phosphorylation, show a marked sensitivity toward Cu(isaepy)(2). Adenosine monophosphate-activated protein kinase (AMPK), which is activated by events increasing the adenosine monophosphate: ATP ratio, is deeply involved in the apoptotic process because the overexpression of its dominant/negative form completely abolishes cell death. Upon glucose supplementation, AMPK is not activated, confirming its role as fuel-sensing enzyme that positively responds to Cu(isaepy)(2)-mediated energetic impairment by committing cells to apoptosis. Overall, data obtained indicate that Cu(isaepy)(2) behaves as delocalized lipophilic cation and induces mitochondrial-sited reactive oxygen species production. This event results in mitochondrial dysfunction and ATP decrease, which in turn triggers AMPK-dependent apoptosis.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

What does the lesson “Finding Citations,” the game “Trivial Pursuit,” and the mechanic “Bluffing” all have in common? In this bootcamp brainstorm facilitated by a CUNY professor, attendees are broken up into design teams whose job it is to enhance a traditional lesson with the mechanics of popular board games in only 20 minutes. Whether you have to teach the rules of citation or the rules of interviewing, there is usually a game plan that can help. This game teaches you how to integrate educational games into your classroom, while providing a fun introduction to the principles of game-based learning.