986 resultados para Defense mechanism
Resumo:
M J Neal and J Timmis. Timidity: A useful mechanism for robot control? Informatica - special issue on perception and emotion based control, 4(27):197-204, 2003.
Resumo:
R. Gunstone and M.H. Lee ?An Hysteresis-Habituation Mechanism for Sensorimotor Scaffolding?, Proc. AISB?03 Second International Symposium on Imitation in Animals and Artifacts, 189-190, 2003.
Resumo:
Projeto de Pós-Graduação/Dissertação apresentado à Universidade Fernando Pessoa como parte dos requisitos para obtenção do grau de Mestre em Ciências Farmacêuticas
Resumo:
Extensible systems allow services to be configured and deployed for the specific needs of individual applications. This paper describes a safe and efficient method for user-level extensibility that requires only minimal changes to the kernel. A sandboxing technique is described that supports multiple logical protection domains within the same address space at user-level. This approach allows applications to register sandboxed code with the system, that may be executed in the context of any process. Our approach differs from other implementations that require special hardware support, such as segmentation or tagged translation look-aside buffers (TLBs), to either implement multiple protection domains in a single address space, or to support fast switching between address spaces. Likewise, we do not require the entire system to be written in a type-safe language, to provide fine-grained protection domains. Instead, our user-level sandboxing technique requires only paged-based virtual memory support, and the requirement that extension code is written either in a type-safe language, or by a trusted source. Using a fast method of upcalls, we show how our sandboxing technique for implementing logical protection domains provides significant performance improvements over traditional methods of invoking user-level services. Experimental results show our approach to be an efficient method for extensibility, with inter-protection domain communication costs close to those of hardware-based solutions leveraging segmentation.
Resumo:
With web caching and cache-related services like CDNs and edge services playing an increasingly significant role in the modern internet, the problem of the weak consistency and coherence provisions in current web protocols is becoming increasingly significant and drawing the attention of the standards community [LCD01]. Toward this end, we present definitions of consistency and coherence for web-like environments, that is, distributed client-server information systems where the semantics of interactions with resource are more general than the read/write operations found in memory hierarchies and distributed file systems. We then present a brief review of proposed mechanisms which strengthen the consistency of caches in the web, focusing upon their conceptual contributions and their weaknesses in real-world practice. These insights motivate a new mechanism, which we call "Basis Token Consistency" or BTC; when implemented at the server, this mechanism allows any client (independent of the presence and conformity of any intermediaries) to maintain a self-consistent view of the server's state. This is accomplished by annotating responses with additional per-resource application information which allows client caches to recognize the obsolescence of currently cached entities and identify responses from other caches which are already stale in light of what has already been seen. The mechanism requires no deviation from the existing client-server communication model, and does not require servers to maintain any additional per-client state. We discuss how our mechanism could be integrated into a fragment-assembling Content Management System (CMS), and present a simulation-driven performance comparison between the BTC algorithm and the use of the Time-To-Live (TTL) heuristic.
Resumo:
This paper focuses on an efficient user-level method for the deployment of application-specific extensions, using commodity operating systems and hardware. A sandboxing technique is described that supports multiple extensions within a shared virtual address space. Applications can register sandboxed code with the system, so that it may be executed in the context of any process. Such code may be used to implement generic routines and handlers for a class of applications, or system service extensions that complement the functionality of the core kernel. Using our approach, application-specific extensions can be written like conventional user-level code, utilizing libraries and system calls, with the advantage that they may be executed without the traditional costs of scheduling and context-switching between process-level protection domains. No special hardware support such as segmentation or tagged translation look-aside buffers (TLBs) is required. Instead, our ``user-level sandboxing'' mechanism requires only paged-based virtual memory support, given that sandboxed extensions are either written by a trusted source or are guaranteed to be memory-safe (e.g., using type-safe languages). Using a fast method of upcalls, we show how our mechanism provides significant performance improvements over traditional methods of invoking user-level services. As an application of our approach, we have implemented a user-level network subsystem that avoids data copying via the kernel and, in many cases, yields far greater network throughput than kernel-level approaches.
Resumo:
This article develops a neural model of how the visual system processes natural images under variable illumination conditions to generate surface lightness percepts. Previous models have clarified how the brain can compute the relative contrast of images from variably illuminate scenes. How the brain determines an absolute lightness scale that "anchors" percepts of surface lightness to us the full dynamic range of neurons remains an unsolved problem. Lightness anchoring properties include articulation, insulation, configuration, and are effects. The model quantatively simulates these and other lightness data such as discounting the illuminant, the double brilliant illusion, lightness constancy and contrast, Mondrian contrast constancy, and the Craik-O'Brien-Cornsweet illusion. The model also clarifies the functional significance for lightness perception of anatomical and neurophysiological data, including gain control at retinal photoreceptors, and spatioal contrast adaptation at the negative feedback circuit between the inner segment of photoreceptors and interacting horizontal cells. The model retina can hereby adjust its sensitivity to input intensities ranging from dim moonlight to dazzling sunlight. A later model cortical processing stages, boundary representations gate the filling-in of surface lightness via long-range horizontal connections. Variants of this filling-in mechanism run 100-1000 times faster than diffusion mechanisms of previous biological filling-in models, and shows how filling-in can occur at realistic speeds. A new anchoring mechanism called the Blurred-Highest-Luminance-As-White (BHLAW) rule helps simulate how surface lightness becomes sensitive to the spatial scale of objects in a scene. The model is also able to process natural images under variable lighting conditions.
Resumo:
This study develops a neuromorphic model of human lightness perception that is inspired by how the mammalian visual system is designed for this function. It is known that biological visual representations can adapt to a billion-fold change in luminance. How such a system determines absolute lightness under varying illumination conditions to generate a consistent interpretation of surface lightness remains an unsolved problem. Such a process, called "anchoring" of lightness, has properties including articulation, insulation, configuration, and area effects. The model quantitatively simulates such psychophysical lightness data, as well as other data such as discounting the illuminant, the double brilliant illusion, and lightness constancy and contrast effects. The model retina embodies gain control at retinal photoreceptors, and spatial contrast adaptation at the negative feedback circuit between mechanisms that model the inner segment of photoreceptors and interacting horizontal cells. The model can thereby adjust its sensitivity to input intensities ranging from dim moonlight to dazzling sunlight. A new anchoring mechanism, called the Blurred-Highest-Luminance-As-White (BHLAW) rule, helps simulate how surface lightness becomes sensitive to the spatial scale of objects in a scene. The model is also able to process natural color images under variable lighting conditions, and is compared with the popular RETINEX model.
Resumo:
An analysis of the reset of visual cortical circuits responsible for the binding or segmentation of visual features into coherent visual forms yields a model that explains properties of visual persistence. The reset mechanisms prevent massive smearing or visual percepts in response to rapidly moving images. The model simulates relationships among psychophysical data showing inverse relations of persistence to flash luminance and duration, greaterr persistence of illusory contours than real contours, a U-shaped temporal function for persistence of illusory contours, a reduction of persistence: due to adaptation with a stimulus of like orientation, an increase or persistence due to adaptation with a stimulus of perpendicular orientation, and an increase of persistence with spatial separation of a masking stimulus. The model suggests that a combination of habituative, opponent, and endstopping mechanisms prevent smearing and limit persistence. Earlier work with the model has analyzed data about boundary formation, texture segregation, shape-from-shading, and figure-ground separation. Thus, several types of data support each model mechanism and new predictions are made.
Resumo:
Bacteriophage-encoded endolysins are produced at the end of the phage lytic cycle for the degradation of the host bacterial cell. Endolysins offer the potential as alternatives to antibiotics as biocontrol agents or therapeutics. The lytic mechanisms of three bacteriophage endolysins that target Clostridium species living under different conditions were investigated. For these endolysins a trigger and release mechanism is proposed for their activation. During host lysis, holin lesion formation suddenly permeabilises the membrane which exposes the cytosol-sequestered endolysins to a sudden environmental shock. This shock is suggested to trigger a conformational switch of the endolysins between two distinct dimer states. The switch between dimer states is proposed to activate a novel autocleavage mechanism that cleaves the linker connecting the N-terminal catalytic domain and the C-terminal domain to release the catalytic domain for more efficient digestion of the bacterial cell wall. Crystal structures of cleaved fragments of CD27L and CTP1L were previously obtained. In these structures cleavage occurs at the stem of the linker connected to the C-terminal domain. Despite a sequence identity of only 22% between 81 residues of the C-terminal domains of CD27L and CTP1L, they represent a novel fold that is identified in a number of different lysins. Within the crystal structures the two distinct dimerization modes are represented: the elongated head‐on dimer and the side-by‐side dimer. Introducing mutations that inhibit either of the dimerization states caused a decrease in the efficiency of both the autocleavage mechanism and the lytic activity of the endolysins. The two dimer states were validated for the full-length endolysins in solution by using right angle light scattering, small angle X‐ray scattering and cross-linking experiments. Overall, the data represents a new type of regulation governed by the C-terminal domains that is used to activate these endolysins once they enter the bacterial cell wall.
Resumo:
Vertebrate eggs are arrested at Metaphase II by Emi2, the meiotic anaphase-promoting complex/cyclosome (APC/C) inhibitor. Although the importance of Emi2 during oocyte maturation has been widely recognized and its regulation extensively studied, its mechanism of action remained elusive. Many APC/C inhibitors have been reported to act as pseudosubstrates, inhibiting the APC/C by preventing substrate binding. Here we show that a previously identified zinc-binding region is critical for the function of Emi2, whereas the D-box is largely dispensable. We further demonstrate that instead of acting through a "pseudosubstrate" mechanism as previously hypothesized, Emi2 can inhibit Cdc20-dependent activation of the APC/C substoichiometrically, blocking ubiquitin transfer from the ubiquitin-charged E2 to the substrate. These findings provide a novel mechanism of APC/C inhibition wherein the final step of ubiquitin transfer is targeted and raise the interesting possibility that APC/C is inhibited by Emi2 in a catalytic manner.
Resumo:
Understanding the interconversion between thermodynamically distinguishable states present in a protein folding pathway provides not only the kinetics and energetics of protein folding but also insights into the functional roles of these states in biological systems. The protein component of the bacterial RNase P holoenzyme from Bacillus subtilis (P protein) was previously shown to be unfolded in the absence of its cognate RNA or other anionic ligands. P protein was used in this study as a model system to explore general features of intrinsically disordered protein (IDP) folding mechanisms. The use of trimethylamine N-oxide (TMAO), an osmolyte that stabilizes the unliganded folded form of the protein, enabled us to study the folding process of P protein in the absence of ligand. Transient stopped-flow kinetic traces at various final TMAO concentrations exhibited multiphasic kinetics. Equilibrium "cotitration" experiments were performed using both TMAO and urea during the titration to produce a urea-TMAO titration surface of P protein. Both kinetic and equilibrium studies show evidence of a previously undetected intermediate state in the P protein folding process. The intermediate state is significantly populated, and the folding rate constants are relatively slow compared to those of intrinsically folded proteins similar in size and topology. The experiments and analysis described serve as a useful example for mechanistic folding studies of other IDPs.
Resumo:
We report here the nonlinear rheological properties of metallo-supramolecular networks formed by the reversible cross-linking of semi-dilute unentangled solutions of poly(4-vinylpyridine) (PVP) in dimethyl sulfoxide (DMSO). The reversible cross-linkers are bis-Pd(II) or bis-Pt(II) complexes that coordinate to the pyridine functional groups on the PVP. Under steady shear, shear thickening is observed above a critical shear rate, and that critical shear rate is experimentally correlated with the lifetime of the metal-ligand bond. The onset and magnitude of the shear thickening depend on the amount of cross-linkers added. In contrast to the behavior observed in most transient networks, the time scale of network relaxation is found to increase during shear thickening. The primary mechanism of shear thickening is ascribed to the shear-induced transformation of intrachain cross-linking to interchain cross-linking, rather than nonlinear high tension along polymer chains that are stretched beyond the Gaussian range.
Resumo:
© 2010 by the American Geophysical Union.The cross-scale probabilistic structure of rainfall intensity records collected over time scales ranging from hours to decades at sites dominated by both convective and frontal systems is investigated. Across these sites, intermittency build-up from slow to fast time-scales is analyzed in terms of heavy tailed and asymmetric signatures in the scale-wise evolution of rainfall probability density functions (pdfs). The analysis demonstrates that rainfall records dominated by convective storms develop heavier-Tailed power law pdfs toward finer scales when compared with their frontal systems counterpart. Also, a concomitant marked asymmetry build-up emerges at such finer time scales. A scale-dependent probabilistic description of such fat tails and asymmetry appearance is proposed based on a modified q-Gaussian model, able to describe the cross-scale rainfall pdfs in terms of the nonextensivity parameter q, a lacunarity (intermittency) correction and a tail asymmetry coefficient, linked to the rainfall generation mechanism.
Resumo:
BACKGROUND: Like other vertebrates, primates recognize their relatives, primarily to minimize inbreeding, but also to facilitate nepotism. Although associative, social learning is typically credited for discrimination of familiar kin, discrimination of unfamiliar kin remains unexplained. As sex-biased dispersal in long-lived species cannot consistently prevent encounters between unfamiliar kin, inbreeding remains a threat and mechanisms to avoid it beg explanation. Using a molecular approach that combined analyses of biochemical and microsatellite markers in 17 female and 19 male ring-tailed lemurs (Lemur catta), we describe odor-gene covariance to establish the feasibility of olfactory-mediated kin recognition. RESULTS: Despite derivation from different genital glands, labial and scrotal secretions shared about 170 of their respective 338 and 203 semiochemicals. In addition, these semiochemicals encoded information about genetic relatedness within and between the sexes. Although the sexes showed opposite seasonal patterns in signal complexity, the odor profiles of related individuals (whether same-sex or mixed-sex dyads) converged most strongly in the competitive breeding season. Thus, a strong, mutual olfactory signal of genetic relatedness appeared specifically when such information would be crucial for preventing inbreeding. That weaker signals of genetic relatedness might exist year round could provide a mechanism to explain nepotism between unfamiliar kin. CONCLUSION: We suggest that signal convergence between the sexes may reflect strong selective pressures on kin recognition, whereas signal convergence within the sexes may arise as its by-product or function independently to prevent competition between unfamiliar relatives. The link between an individual's genome and its olfactory signals could be mediated by biosynthetic pathways producing polymorphic semiochemicals or by carrier proteins modifying the individual bouquet of olfactory cues. In conclusion, we unveil a possible olfactory mechanism of kin recognition that has specific relevance to understanding inbreeding avoidance and nepotistic behavior observed in free-ranging primates, and broader relevance to understanding the mechanisms of vertebrate olfactory communication.