982 resultados para Elastically restrained edges


Relevância:

10.00% 10.00%

Publicador:

Resumo:

Several gene regulatory network models containing concepts of directionality at the edges have been proposed. However, only a few reports have an interpretable definition of directionality. Here, differently from the standard causality concept defined by Pearl, we introduce the concept of contagion in order to infer directionality at the edges, i.e., asymmetries in gene expression dependences of regulatory networks. Moreover, we present a bootstrap algorithm in order to test the contagion concept. This technique was applied in simulated data and, also, in an actual large sample of biological data. Literature review has confirmed some genes identified by contagion as actually belonging to the TP53 pathway.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Denote by R(L, L, L) the minimum integer N such that any 3-coloring of the edges of the complete graph on N vertices contains a monochromatic copy of a graph L. Bondy and Erdos conjectured that when L is the cycle C(n) on n vertices, R(C(n), C(n), C(n)) = 4n - 3 for every odd n > 3. Luczak proved that if n is odd, then R(C(n), C(n), C(n)) = 4n + o(n), as n -> infinity, and Kohayakawa, Simonovits and Skokan confirmed the Bondy-Erdos conjecture for all sufficiently large values of n. Figaj and Luczak determined an asymptotic result for the `complementary` case where the cycles are even: they showed that for even n, we have R(C(n), C(n), C(n)) = 2n + o(n), as n -> infinity. In this paper, we prove that there exists n I such that for every even n >= n(1), R(C(n), C(n), C(n)) = 2n. (C) 2009 Elsevier Inc. All rights reserved.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Consider the following problem: Forgiven graphs G and F(1),..., F(k), find a coloring of the edges of G with k colors such that G does not contain F; in color i. Rodl and Rucinski studied this problem for the random graph G,,, in the symmetric case when k is fixed and F(1) = ... = F(k) = F. They proved that such a coloring exists asymptotically almost surely (a.a.s.) provided that p <= bn(-beta) for some constants b = b(F,k) and beta = beta(F). This result is essentially best possible because for p >= Bn(-beta), where B = B(F, k) is a large constant, such an edge-coloring does not exist. Kohayakawa and Kreuter conjectured a threshold function n(-beta(F1,..., Fk)) for arbitrary F(1), ..., F(k). In this article we address the case when F(1),..., F(k) are cliques of different sizes and propose an algorithm that a.a.s. finds a valid k-edge-coloring of G(n,p) with p <= bn(-beta) for some constant b = b(F(1),..., F(k)), where beta = beta(F(1),..., F(k)) as conjectured. With a few exceptions, this algorithm also works in the general symmetric case. We also show that there exists a constant B = B(F,,..., Fk) such that for p >= Bn(-beta) the random graph G(n,p) a.a.s. does not have a valid k-edge-coloring provided the so-called KLR-conjecture holds. (C) 2008 Wiley Periodicals, Inc. Random Struct. Alg., 34, 419-453, 2009

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The performance of noble metal (Pt, Ru, Ir)-promoted Co/MgAl(2)O(4) catalysts for the steam reforming of ethanol was investigated. The catalysts were characterized by energy-dispersive X-ray spectroscopy, Xray diffraction, UV-vis diffuse reflectance spectroscopy, temperature-programmed reduction, temperature-programmed oxidation and X-ray absorption near edge structure (XANES). The results showed that the formation of inactive cobalt aluminate was suppressed by the presence of a MgAl(2)O(4) spinel phase. The effects of the noble metals included a marked lowering of the reduction temperatures of the cobalt surface species interacting with the support. It was seen that the addition of noble metal stabilized the Co sites in the reduced state throughout the reaction. Catalytic performance was enhanced in the promoted catalysts, particularly CoRu/MgAl(2)O(4), which showed the highest selectivity for H(2) production. (C) 2009 Elsevier B.V. All rights reserved.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

An empty classroom is shown here at the New York Trade School. This was likely a piano tuning classroom. Black and white photograph with some damage around the edges.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Students are shown working in the drafting section of the Air Conditioning Department of the New York Trade School. Black and white photograph that has some damage around the edges.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Several students are shown working in a section of the Television Laboratory at the New York Trade School. Black and white photograph with some damage due to writing in red ink along the long edges.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Students in the Plumbing Department at the New York Trade School are shown working on bathroom equipment in a plumbing classroom. Black and white photograph with some damage to the edges.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The aim of this work is to investigate Ant Colony Algorithm for the traveling salesman problem (TSP). Ants of the artificial colony are able to generate successively shorter feasible tours by using information accumulated in the form of a pheromone trail deposited on the edges of the TSP graph. This paper is based on the ideas of ant colony algorithm and analysis the main parameters of the ant colony algorithm. Experimental results for solving TSP problems with ant colony algorithm show great effectiveness.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This thesis has the aim to evaluate the role of gay spaces in Gran Canaria as a gay tourists destination with particular reference to gay exclusive resorts. The validation of the gay identity is a key motivation for homosexuals to travel, in order to connect with other homosexuals and experience the gay life that they might not be able to experience at home. Gay spaces have been defined both as liberated areas as well as ghettos, where the homosexuals are, in a way, restrained. The method chosen, a small number of semi- structured interviews with managers of gay exclusive resorts in Maspalomas, the hub of gay life in Gran Canaria, where major LGBT events are held, there is a gay friendly environment, a thriving gay scene and many gay exclusive resorts. In the case of Gran Canaria the gay-specific offer is complementary to the ‘regular’ tourism offer, as they coexist, complement and at times overlap. Nevertheless the gay centric holiday is still predominant amongst gay men, and it is likely to continue to be according to the informants. This is because gay tourists seek freedom and a sense of inclusion that they would not be able to find in mixed environments.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The rapid development of data transfer through internet made it easier to send the data accurate and faster to the destination. There are many transmission media to transfer the data to destination like e-mails; at the same time it is may be easier to modify and misuse the valuable information through hacking. So, in order to transfer the data securely to the destination without any modifications, there are many approaches like cryptography and steganography. This paper deals with the image steganography as well as with the different security issues, general overview of cryptography, steganography and digital watermarking approaches.  The problem of copyright violation of multimedia data has increased due to the enormous growth of computer networks that provides fast and error free transmission of any unauthorized duplicate and possibly manipulated copy of multimedia information. In order to be effective for copyright protection, digital watermark must be robust which are difficult to remove from the object in which they are embedded despite a variety of possible attacks. The message to be send safe and secure, we use watermarking. We use invisible watermarking to embed the message using LSB (Least Significant Bit) steganographic technique. The standard LSB technique embed the message in every pixel, but my contribution for this proposed watermarking, works with the hint for embedding the message only on the image edges alone. If the hacker knows that the system uses LSB technique also, it cannot decrypt correct message. To make my system robust and secure, we added cryptography algorithm as Vigenere square. Whereas the message is transmitted in cipher text and its added advantage to the proposed system. The standard Vigenere square algorithm works with either lower case or upper case. The proposed cryptography algorithm is Vigenere square with extension of numbers also. We can keep the crypto key with combination of characters and numbers. So by using these modifications and updating in this existing algorithm and combination of cryptography and steganography method we develop a secure and strong watermarking method. Performance of this watermarking scheme has been analyzed by evaluating the robustness of the algorithm with PSNR (Peak Signal to Noise Ratio) and MSE (Mean Square Error) against the quality of the image for large amount of data. While coming to see results of the proposed encryption, higher value of 89dB of PSNR with small value of MSE is 0.0017. Then it seems the proposed watermarking system is secure and robust for hiding secure information in any digital system, because this system collect the properties of both steganography and cryptography sciences.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The present study was designed to increase our understanding of the co-morbidity between problem drinking and binge eating. The study investigated both consummatory behaviors in relation to restrained drinking, restrained eating, and a general measure of self-control. The participants were a sample of 658 boys and 414 girls aged between 14 and 17 years. The dimension of restraint, which best predicted the two problem behaviors when examined separately for both boys and girls, was cognitive and emotional preoccupation (CEP) about controlling one's consummatory intake. In addition, evidence was found linking both problem drinking and binge eating to restraint and poor general self-control. The struggle with self-control and the high emphasis on CEP about controlling one's consummatory intake, which characterise restrained drinking and restrained eating, closely resembles Baumeister and Heatherton's notion of misregulation [Psychol. Inquiry 7 (1996) 1]. Discussed are the similarities between restraint and misregulation, and the kinds of strategies that can be used to improve self-control.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The study examined differences in gender stereotypes, restrained drinking and self-efficacy for alcohol refusal between moderate and high risk drinkers among a university sample of 301 women and 118 men. Both female and male high risk drinkers displayed a response conflict, typified by high scores on restrained drinking but low scores on self-efficacy. This pattern of response conflict was more pronounced for high risk drinking women, who also identified poorly with feminine traits (e.g. ‘nurturing’, ‘love children’, ‘appreciative’). The findings are discussed in relation to society's double standard that accepts intoxication in men but condemns it in women.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Wool and alpaca fibers were coated with polypyrrole by vapor-phase polymerisation method. The changes in frictional and tensile properties of the single fibers upon coating with the conductive polymer are presented. Coating a thin layer of polypyrrole on the alpaca and wool fibers results in a significant reduction in the fiber coefficient of friction, as the conducting polymer layer smooths the protruding edges of the fiber scales. It also reduces the directional friction effect of the fibers. Depending on the type of fiber, the coating may slightly enhance the tensile properties of the coated fibers.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This work describes an error correction method based on the Euler Superpath problem. Sequence data is mapped to an Euler Superpath dynamically by Merging Transformation. With restriction and guiding rules, data consistency is maintained and error paths are separated from correct data: Error edges are mapped to the correct ones and after substitution (of error edges with right paths), corresponding errors in the sequencing data are eliminated.