984 resultados para Single machine
Resumo:
Weed mapping is a useful tool for site-specific herbicide applications. The objectives of this study were (1) to determine the percentage of land area covered by weeds in no-till and conventionally tilled fields of common bean using digital image processing and geostatistics, and (2) to compare two types of cameras. Two digital cameras (color and infrared) and a differential GPS were affixed to a center pivot structure for image acquisition. Sample field images were acquired in a regular grid pattern, and the images were processed to estimate the percentage of weed cover. After calculating the georeferenced weed percentage values, maps were constructed using geostatistical techniques. Based on the results, color images are recommended for mapping the percentage of weed cover in no-till systems, while infrared images are recommended for weed mapping in conventional tillage systems.
Resumo:
The assembly and maintenance of the International Thermonuclear Experimental Reactor (ITER) vacuum vessel (VV) is highly challenging since the tasks performed by the robot involve welding, material handling, and machine cutting from inside the VV. The VV is made of stainless steel, which has poor machinability and tends to work harden very rapidly, and all the machining operations need to be carried out from inside of the ITER VV. A general industrial robot cannot be used due to its poor stiffness in the heavy duty machining process, and this will cause many problems, such as poor surface quality, tool damage, low accuracy. Therefore, one of the most suitable options should be a light weight mobile robot which is able to move around inside of the VV and perform different machining tasks by replacing different cutting tools. Reducing the mass of the robot manipulators offers many advantages: reduced material costs, reduced power consumption, the possibility of using smaller actuators, and a higher payload-to-robot weight ratio. Offsetting these advantages, the lighter weight robot is more flexible, which makes it more difficult to control. To achieve good machining surface quality, the tracking of the end effector must be accurate, and an accurate model for a more flexible robot must be constructed. This thesis studies the dynamics and control of a 10 degree-of-freedom (DOF) redundant hybrid robot (4-DOF serial mechanism and 6-DOF 6-UPS hexapod parallel mechanisms) hydraulically driven with flexible rods under the influence of machining forces. Firstly, the flexibility of the bodies is described using the floating frame of reference method (FFRF). A finite element model (FEM) provided the Craig-Bampton (CB) modes needed for the FFRF. A dynamic model of the system of six closed loop mechanisms was assembled using the constrained Lagrange equations and the Lagrange multiplier method. Subsequently, the reaction forces between the parallel and serial parts were used to study the dynamics of the serial robot. A PID control based on position predictions was implemented independently to control the hydraulic cylinders of the robot. Secondly, in machining, to achieve greater end effector trajectory tracking accuracy for surface quality, a robust control of the actuators for the flexible link has to be deduced. This thesis investigates the intelligent control of a hydraulically driven parallel robot part based on the dynamic model and two schemes of intelligent control for a hydraulically driven parallel mechanism based on the dynamic model: (1) a fuzzy-PID self-tuning controller composed of the conventional PID control and with fuzzy logic, and (2) adaptive neuro-fuzzy inference system-PID (ANFIS-PID) self-tuning of the gains of the PID controller, which are implemented independently to control each hydraulic cylinder of the parallel mechanism based on rod length predictions. The serial component of the hybrid robot can be analyzed using the equilibrium of reaction forces at the universal joint connections of the hexa-element. To achieve precise positional control of the end effector for maximum precision machining, the hydraulic cylinder should be controlled to hold the hexa-element. Thirdly, a finite element approach of multibody systems using the Special Euclidean group SE(3) framework is presented for a parallel mechanism with flexible piston rods under the influence of machining forces. The flexibility of the bodies is described using the nonlinear interpolation method with an exponential map. The equations of motion take the form of a differential algebraic equation on a Lie group, which is solved using a Lie group time integration scheme. The method relies on the local description of motions, so that it provides a singularity-free formulation, and no parameterization of the nodal variables needs to be introduced. The flexible slider constraint is formulated using a Lie group and used for modeling a flexible rod sliding inside a cylinder. The dynamic model of the system of six closed loop mechanisms was assembled using Hamilton’s principle and the Lagrange multiplier method. A linearized hydraulic control system based on rod length predictions was implemented independently to control the hydraulic cylinders. Consequently, the results of the simulations demonstrating the behavior of the robot machine are presented for each case study. In conclusion, this thesis studies the dynamic analysis of a special hybrid (serialparallel) robot for the above-mentioned special task involving the ITER and investigates different control algorithms that can significantly improve machining performance. These analyses and results provide valuable insight into the design and control of the parallel robot with flexible rods.
Resumo:
Biomedical natural language processing (BioNLP) is a subfield of natural language processing, an area of computational linguistics concerned with developing programs that work with natural language: written texts and speech. Biomedical relation extraction concerns the detection of semantic relations such as protein-protein interactions (PPI) from scientific texts. The aim is to enhance information retrieval by detecting relations between concepts, not just individual concepts as with a keyword search. In recent years, events have been proposed as a more detailed alternative for simple pairwise PPI relations. Events provide a systematic, structural representation for annotating the content of natural language texts. Events are characterized by annotated trigger words, directed and typed arguments and the ability to nest other events. For example, the sentence “Protein A causes protein B to bind protein C” can be annotated with the nested event structure CAUSE(A, BIND(B, C)). Converted to such formal representations, the information of natural language texts can be used by computational applications. Biomedical event annotations were introduced by the BioInfer and GENIA corpora, and event extraction was popularized by the BioNLP'09 Shared Task on Event Extraction. In this thesis we present a method for automated event extraction, implemented as the Turku Event Extraction System (TEES). A unified graph format is defined for representing event annotations and the problem of extracting complex event structures is decomposed into a number of independent classification tasks. These classification tasks are solved using SVM and RLS classifiers, utilizing rich feature representations built from full dependency parsing. Building on earlier work on pairwise relation extraction and using a generalized graph representation, the resulting TEES system is capable of detecting binary relations as well as complex event structures. We show that this event extraction system has good performance, reaching the first place in the BioNLP'09 Shared Task on Event Extraction. Subsequently, TEES has achieved several first ranks in the BioNLP'11 and BioNLP'13 Shared Tasks, as well as shown competitive performance in the binary relation Drug-Drug Interaction Extraction 2011 and 2013 shared tasks. The Turku Event Extraction System is published as a freely available open-source project, documenting the research in detail as well as making the method available for practical applications. In particular, in this thesis we describe the application of the event extraction method to PubMed-scale text mining, showing how the developed approach not only shows good performance, but is generalizable and applicable to large-scale real-world text mining projects. Finally, we discuss related literature, summarize the contributions of the work and present some thoughts on future directions for biomedical event extraction. This thesis includes and builds on six original research publications. The first of these introduces the analysis of dependency parses that leads to development of TEES. The entries in the three BioNLP Shared Tasks, as well as in the DDIExtraction 2011 task are covered in four publications, and the sixth one demonstrates the application of the system to PubMed-scale text mining.
Resumo:
One of the main challenges in Software Engineering is to cope with the transition from an industry based on software as a product to software as a service. The field of Software Engineering should provide the necessary methods and tools to develop and deploy new cost-efficient and scalable digital services. In this thesis, we focus on deployment platforms to ensure cost-efficient scalability of multi-tier web applications and on-demand video transcoding service for different types of load conditions. Infrastructure as a Service (IaaS) clouds provide Virtual Machines (VMs) under the pay-per-use business model. Dynamically provisioning VMs on demand allows service providers to cope with fluctuations on the number of service users. However, VM provisioning must be done carefully, because over-provisioning results in an increased operational cost, while underprovisioning leads to a subpar service. Therefore, our main focus in this thesis is on cost-efficient VM provisioning for multi-tier web applications and on-demand video transcoding. Moreover, to prevent provisioned VMs from becoming overloaded, we augment VM provisioning with an admission control mechanism. Similarly, to ensure efficient use of provisioned VMs, web applications on the under-utilized VMs are consolidated periodically. Thus, the main problem that we address is cost-efficient VM provisioning augmented with server consolidation and admission control on the provisioned VMs. We seek solutions for two types of applications: multi-tier web applications that follow the request-response paradigm and on-demand video transcoding that is based on video streams with soft realtime constraints. Our first contribution is a cost-efficient VM provisioning approach for multi-tier web applications. The proposed approach comprises two subapproaches: a reactive VM provisioning approach called ARVUE and a hybrid reactive-proactive VM provisioning approach called Cost-efficient Resource Allocation for Multiple web applications with Proactive scaling. Our second contribution is a prediction-based VM provisioning approach for on-demand video transcoding in the cloud. Moreover, to prevent virtualized servers from becoming overloaded, the proposed VM provisioning approaches are augmented with admission control approaches. Therefore, our third contribution is a session-based admission control approach for multi-tier web applications called adaptive Admission Control for Virtualized Application Servers. Similarly, the fourth contribution in this thesis is a stream-based admission control and scheduling approach for on-demand video transcoding called Stream-Based Admission Control and Scheduling. Our fifth contribution is a computation and storage trade-o strategy for cost-efficient video transcoding in cloud computing. Finally, the sixth and the last contribution is a web application consolidation approach, which uses Ant Colony System to minimize the under-utilization of the virtualized application servers.
Resumo:
This study examines information security as a process (information securing) in terms of what it does, especially beyond its obvious role of protector. It investigates concepts related to ‘ontology of becoming’, and examines what it is that information securing produces. The research is theory driven and draws upon three fields: sociology (especially actor-network theory), philosophy (especially Gilles Deleuze and Félix Guattari’s concept of ‘machine’, ‘territory’ and ‘becoming’, and Michel Serres’s concept of ‘parasite’), and information systems science (the subject of information security). Social engineering (used here in the sense of breaking into systems through non-technical means) and software cracker groups (groups which remove copy protection systems from software) are analysed as examples of breaches of information security. Firstly, the study finds that information securing is always interruptive: every entity (regardless of whether or not it is malicious) that becomes connected to information security is interrupted. Furthermore, every entity changes, becomes different, as it makes a connection with information security (ontology of becoming). Moreover, information security organizes entities into different territories. However, the territories – the insides and outsides of information systems – are ontologically similar; the only difference is in the order of the territories, not in the ontological status of entities that inhabit the territories. In other words, malicious software is ontologically similar to benign software; they both are users in terms of a system. The difference is based on the order of the system and users: who uses the system and what the system is used for. Secondly, the research shows that information security is always external (in the terms of this study it is a ‘parasite’) to the information system that it protects. Information securing creates and maintains order while simultaneously disrupting the existing order of the system that it protects. For example, in terms of software itself, the implementation of a copy protection system is an entirely external addition. In fact, this parasitic addition makes software different. Thus, information security disrupts that which it is supposed to defend from disruption. Finally, it is asserted that, in its interruption, information security is a connector that creates passages; it connects users to systems while also creating its own threats. For example, copy protection systems invite crackers and information security policies entice social engineers to use and exploit information security techniques in a novel manner.
Resumo:
We describe the isolation of crotoxin, a presynaptic B-neurotoxin, as well as its subunits B (crotactine) and A (crotapotin) from lyophilized Crotalus durissus terrificus venom by a single-step preparative isoelectric focusing procedure. From 98 mg of dried venom protein 20.1 mg of crotactine and 13.1 mg of crotapotin were recovered in the first step of focalization and 4.2 mg in a second run. These values correspond to 35.7% of the total venom protein applied. Crotactine separated in the 9.3-7.0 pH range (tubes 1-6) and crotapotin in the 1.8-2.8 pH range (tubes 15-19) and both were homogeneous by SDS-PAGE and N-terminal amino acid analysis. Crotactine, a 12-kDa protein, presented hemolytic and phospholipase A2 activity. Thus, using isoelectric focusing we simultaneously purified both toxins in high yields. This method can be used as an alternative for the purification and characterization of proteins from other snake venoms under conditions in which biological activity is retained
Neuroethologic differences in sleep deprivation induced by the single- and multiple-platform methods
Resumo:
It has been proposed that the multiple-platform method (MP) for desynchronized sleep (DS) deprivation eliminates the stress induced by social isolation and by the restriction of locomotion in the single-platform (SP) method. MP, however, induces a higher increase in plasma corticosterone and ACTH levels than SP. Since deprivation is of heuristic value to identify the functional role of this state of sleep, the objective of the present study was to determine the behavioral differences exhibited by rats during sleep deprivation induced by these two methods. All behavioral patterns exhibited by a group of 7 albino male Wistar rats submitted to 4 days of sleep deprivation by the MP method (15 platforms, spaced 150 mm apart) and by 7 other rats submitted to sleep deprivation by the SP method were recorded in order to elaborate an ethogram. The behavioral patterns were quantitated in 10 replications by naive observers using other groups of 7 rats each submitted to the same deprivation schedule. Each quantification session lasted 35 min and the behavioral patterns presented by each rat over a period of 5 min were counted. The results obtained were: a) rats submitted to the MP method changed platforms at a mean rate of 2.62 ± 1.17 platforms h-1 animal-1; b) the number of episodes of noninteractive waking patterns for the MP animals was significantly higher than that for SP animals (1077 vs 768); c) additional episodes of waking patterns (26.9 ± 18.9 episodes/session) were promoted by social interaction in MP animals; d) the cumulative number of sleep episodes observed in the MP test (311) was significantly lower (chi-square test, 1 d.f., P<0.05) than that observed in the SP test (534); e) rats submitted to the MP test did not show the well-known increase in ambulatory activity observed after the end of the SP test; f) comparison of 6 MP and 6 SP rats showed a significantly shorter latency to the onset of DS in MP rats (7.8 ± 4.3 and 29.0 ± 25.0 min, respectively; Student t-test, P<0.05). We conclude that the social interaction occurring in the MP test generates additional stress since it increases the time of forced wakefulness and reduces the time of rest promoted by synchronized sleep.
Resumo:
A single electroconvulsive shock (ECS) or a sham ECS was administered to male 3-4-month-old Wistar rats 1, 2, and 4 h before training in an inhibitory avoidance test and in cued classical fear conditioning (measured by means of freezing time in a new environment). ECS impaired inhibitory avoidance at all times and, at 1 or 2 h before training, reduced freezing time before and after re-presentation of the ECS. These results are interpreted as a transient conditioned stimulus (CS)-induced anxiolytic or analgesic effect lasting about 2 h after a single treatment, in addition to the known amnesic effect of the stimulus. This suggests that the effect of anterograde learning impairment is demonstrated unequivocally only when the analgesic/anxiolytic effect is over (about 4 h after ECS administration) and that this impairment of learning is selective, affecting inhibitory avoidance but not classical fear conditioning to a discrete stimulus.
Resumo:
Bothrops venoms are complex mixtures of components with a wide range of biological activities. Among these substances, myotoxins have been investigated by several groups. Bothropstoxin-1 (Bthtx-1) is a phospholipase A2-like basic myotoxin from Bothrops jararacussu. The purification of this component involves two chromatographic steps. Although providing a pure material, the association of these two steps is time consuming and a single-step method using high performance chromatography media would be useful. In the present study, we describe a single-step purification method for Bthtx-1. Bothrops jararacussu venom was dissolved in 1 ml buffer. After centrifugation, the supernatant was injected into a Resource-S cation exchange column connected to an FPLC system and eluted with a linear salt gradient. The complete procedure took 20 min, representing a considerable time gain when compared to a previously described method (Homsi-Brandenburgo MI et al. (1988) Toxicon, 26: 615-627). Bthtx-1 purity and identity, assessed by SDS-PAGE and N-terminal sequencing, resulted in a single band with a molecular mass of about 14 kDa and the expected sequence of the first 5 residues, S-L-F-E-L. Although the amount of protein purified after each run is lower than in the previously described method, we believe that this method may be useful for small-scale purifications.
Resumo:
We have developed a procedure for nonradioactive single strand conformation polymorphism analysis and applied it to the detection of point mutations in the human tumor suppressor gene p53. The protocol does not require any particular facilities or equipment, such as radioactive handling, large gel units for sequencing, or a semiautomated electrophoresis system. This technique consists of amplification of DNA fragments by PCR with specific oligonucleotide primers, denaturation, and electrophoresis on small neutral polyacrylamide gels, followed by silver staining. The sensitivity of this procedure is comparable to other described techniques and the method is easy to perform and applicable to a variety of tissue specimens.
Resumo:
We describe the expression of an anti-Z-DNA single chain variable region antibody fragment (scFv) on a filamentous phage surface. Four vectors for phage display were constructed. Two of them are able to display multiple copies of the antibody fragment, and the others can be used to make monovalent libraries. The vectors use different promoter/leader sequences to direct the expression of the fused proteins. All were able to promote the assembly of fusion virion particles. In this paper we also show the affinity selection (biopanning) of those phage-antibodies based on the capacity of their products to recognize the antigen. We used biotinylated Z-DNA and the selection was performed in a solution phase fashion. The data presented here indicate that these vectors can be further used to construct anti-nucleic acid antibody fragment libraries that can be used to study the basis of nucleic acid-protein interaction and its role in autoimmunity mechanisms.
Resumo:
Breast cancer in families with germ line mutations in the TP53 gene has been described in the medical literature. Mutation screening for susceptibility genes should allow effective prophylactic and preventive measures. Using single-strand conformational polymorphism, we screened for mutations in exons 5, 6, 7 and 8 of gene TP53 in the peripheral blood of 8 young non-affected members (17 to 36 years old) of families with a history of breast cancer. Studies of this type on young patients (mean age, 25 years) are very rare in the literature. The identification of these mutations would contribute to genetic counseling of members of families with predisposition to breast cancer. The results obtained did not show any polymorphism indicating mutation. In our sample, the familial tumorigenesis is probably related to other gene etiologies.
Resumo:
Two attenuated bacillus Calmette-Guérin (BCG) preparations derived from the same Moreau strain, Copenhagen but grown in Sauton medium containing starch and bacto-peptone (onco BCG, O-BCG), or asparagine (intradermal BCG, ID-BCG), exhibited indistinguishable DNA sequences and bacterial morphology. The number of viable bacilli recovered from spleen, liver and lungs was approximately the same in mice inoculated with the vaccines and was similarly reduced (over 90%) in mice previously immunized with either BCG vaccine. The humoral immune response evoked by the vaccines was, however, distinct. Spleen cell proliferation accompanying the growth of bacilli in tissue was significantly higher in mice inoculated with O-BCG. These cells proliferated in vitro upon challenge with the corresponding BCG extract. Previous cell treatment with mAb anti-CD4 T cells abolished this effect. Anti-BCG antibodies, as assayed either in serum by ELISA or by determining the number of antibody-producing spleen cells by the spot-ELISA method, were significantly higher in mice inoculated with ID-BCG. Anti-BCG antibodies were detected in all immunoglobulin classes, but they were more prevalent in IgG with the following distribution among its isotypes: IgG1>(IgG2a = IgG2b)>IgG3. When some well-characterized Mycobacterium tuberculosis antigens were used as substitutes for BCG extracts in ELISA, although antibodies against the 65-kDa and 96-kDa proteins were detected significantly, antibodies against the 71-kDa, 38-kDa proteins and lipoarabinomannan were only barely detected or even absent. These results indicate that BCG bacilli cultured in Sauton-asparagine medium permitted the multiplication of bacilli, tending to induce a stronger humoral immune response as compared with bacilli grown in Sauton-starch/bacto-peptone-enriched medium.
Resumo:
We are using molecular, biochemical, and genetic approaches to study the structural and regulatory genes controlling the assimilation of inorganic nitrogen into the amino acids glutamine, glutamate, aspartate and asparagine. These amino acids serve as the principal nitrogen-transport amino acids in most crop and higher plants including Arabidopsis thaliana. We have begun to investigate the regulatory mechanisms controlling nitrogen assimilation into these amino acids in plants using molecular and genetic approaches in Arabidopsis. The synthesis of the amide amino acids glutamine and asparagine is subject to tight regulation in response to environmental factors such as light and to metabolic factors such as sucrose and amino acids. For instance, light induces the expression of glutamine synthetase (GLN2) and represses expression of asparagine synthetase (ASN1) genes. This reciprocal regulation of GLN2 and ASN1 genes by light is reflected at the level of transcription and at the level of glutamine and asparagine biosynthesis. Moreover, we have shown that the regulation of these genes is also reciprocally controlled by both organic nitrogen and carbon metabolites. We have recently used a reverse genetic approach to study putative components of such metabolic sensing mechanisms in plants that may be conserved in evolution. These components include an Arabidopsis homolog for a glutamate receptor gene originally found in animal systems and a plant PII gene, which is a homolog of a component of the bacterial Ntr system. Based on our observations on the biology of both structural and regulatory genes of the nitrogen assimilatory pathway, we have developed a model for metabolic control of the genes involved in the nitrogen assimilatory pathway in plants.
Resumo:
The objective of the present study was to identify the single photon emission computed tomography (SPECT) and magnetic resonance (MR) findings in juvenile systemic lupus erythematosus (JSLE) patients with CNS involvement and to try to correlate them with neurological clinical history data and neurological clinical examination. Nineteen patients with JSLE (16 girls and 3 boys, mean age at onset 9.2 years) were submitted to neurological examination, electroencephalography, cerebrospinal fluid analysis, SPECT and MR. All the evaluations were made separately within a period of 15 days. SPECT and MR findings were analyzed independently by two radiologists. Electroencephalography and cerebrospinal fluid analysis revealed no relevant alterations. Ten of 19 patients (53%) presented neurological abnormalities including present or past neurological clinical history (8/19, 42%), abnormal neurological clinical examination (5/19, 26%), and abnormal SPECT or MR (8/19, 42% and 3/19, 16%, respectively). The most common changes in SPECT were cerebral hypoperfusion and heterogeneous distribution of blood flow. The most common abnormalities in MR were leukomalacia and diffuse alterations of white matter. There was a correlation between SPECT and MR (P<0.05). We conclude that SPECT and MR are complementary and useful exams in the evaluation of neurological involvement of lupus.