992 resultados para special functions


Relevância:

30.00% 30.00%

Publicador:

Resumo:

This study investigated whether children aged between 8 and 12 years born very preterm (VPT) and/or at very low birth weight (VLBW) performed lower than same-aged term-born controls in cognitive and behavioral aspects of three executive functions: inhibition, working memory, and shifting. Special attention was given to sex differences. Fifty-two VPT/VLBW children (26 girls, 50%) born in the cohort of 1998-2003 and 36 same-aged term-born children (18 girls, 50%) were recruited. As cognitive measures, children completed tasks of inhibition (Color-Word Interference Test, D-KEFS; Delis, Kaplan, & Kramer, 2001 ), working memory (digit span backwards, HAWIK-IV; Petermann & Petermann, 2008 ), and shifting (Trail Making Test, number-letter-switching, D-KEFS; Delis et al., 2001 ). As behavioral measures, mothers completed the Behavior Rating Inventory of Executive Function (BRIEF; Gioia, Isquith, Guy, & Kenworthy, 2000 ). Scales of interest were inhibit, working memory, and shift. Analyses of the cognitive aspects of executive functions revealed that VPT/VLBW children performed significantly lower than controls in the shifting task but not in the working memory and inhibition tasks. Analyses of behavioral aspects of executive functions revealed that VPT/VLBW children displayed more problems than the controls in working memory in everyday life but not in inhibition and shifting. No sex differences could be detected either in cognitive or behavioral aspects of executive functions. To conclude, cognitive and behavioral measures of executive functions were not congruent in VPT/VLBW children. In clinical practice, the combination of cognitive and behavioral instruments is required to disclose children's executive difficulties.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Numerous time series studies have provided strong evidence of an association between increased levels of ambient air pollution and increased levels of hospital admissions, typically at 0, 1, or 2 days after an air pollution episode. An important research aim is to extend existing statistical models so that a more detailed understanding of the time course of hospitalization after exposure to air pollution can be obtained. Information about this time course, combined with prior knowledge about biological mechanisms, could provide the basis for hypotheses concerning the mechanism by which air pollution causes disease. Previous studies have identified two important methodological questions: (1) How can we estimate the shape of the distributed lag between increased air pollution exposure and increased mortality or morbidity? and (2) How should we estimate the cumulative population health risk from short-term exposure to air pollution? Distributed lag models are appropriate tools for estimating air pollution health effects that may be spread over several days. However, estimation for distributed lag models in air pollution and health applications is hampered by the substantial noise in the data and the inherently weak signal that is the target of investigation. We introduce an hierarchical Bayesian distributed lag model that incorporates prior information about the time course of pollution effects and combines information across multiple locations. The model has a connection to penalized spline smoothing using a special type of penalty matrix. We apply the model to estimating the distributed lag between exposure to particulate matter air pollution and hospitalization for cardiovascular and respiratory disease using data from a large United States air pollution and hospitalization database of Medicare enrollees in 94 counties covering the years 1999-2002.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Creatine kinase catalyses the reversible transphosphorylation of creatine by ATP. In the cell, creatine kinase isoenzymes are specifically localized at strategic sites of ATP consumption to efficiently regenerate ATP in situ via phosphocreatine or at sites of ATP generation to build-up a phosphocreatine pool. Accordingly, the creatine kinase/phosphocreatine system plays a key role in cellular energy buffering and energy transport, particularly in cells with high and fluctuating energy requirements like neurons. Creatine kinases are expressed in the adult and developing human brain and spinal cord, suggesting that the creatine kinase/phosphocreatine system plays a significant role in the central nervous system. Functional impairment of this system leads to a deterioration in energy metabolism, which is phenotypic for many neurodegenerative and age-related diseases. Exogenous creatine supplementation has been shown to reduce neuronal cell loss in experimental paradigms of acute and chronic neurological diseases. In line with these findings, first clinical trials have shown beneficial effects of therapeutic creatine supplementation. Furthermore, creatine was reported to promote differentiation of neuronal precursor cells that might be of importance for improving neuronal cell replacement strategies. Based on these observations there is growing interest on the effects and functions of this compound in the central nervous system. This review gives a short excursion into the basics of the creatine kinase/phosphocreatine system and aims at summarizing findings and concepts on the role of creatine kinase and creatine in the central nervous system with special emphasis on pathological conditions and the positive effects of creatine supplementation.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Speaking about professionals, working with children at child care homes in Lithuania, first of all we encounter a problem of terminology. This problem rises, because in various countries and languages we call these professionals differently. In Lithuania we call them ”aukletojai”. We also use the word ”aukletojas” when speaking about both professionals, working directly with children at kindergartens, and parents, as all parents are educators of their children. We suppose, that the word ”aukletojas” corresponds to the German “erzieher”, and “aukleti” to “erziehen”. Every “aukletojas” in Lithuania clearly realizes, that he is a pedagogue, because in this country every professional, involved in educational work with children – an ”aukletojas”, a teacher, a social pedagogue and a special pedagogue – is called a pedagogue. In this context it is essential to conceive that in Lithuania an ”educator” and a ”social pedagogue” are different pedagogical professions and that none of the ”aukletojas” identify himself as a social pedagogue.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Given a reproducing kernel Hilbert space (H,〈.,.〉)(H,〈.,.〉) of real-valued functions and a suitable measure μμ over the source space D⊂RD⊂R, we decompose HH as the sum of a subspace of centered functions for μμ and its orthogonal in HH. This decomposition leads to a special case of ANOVA kernels, for which the functional ANOVA representation of the best predictor can be elegantly derived, either in an interpolation or regularization framework. The proposed kernels appear to be particularly convenient for analyzing the effect of each (group of) variable(s) and computing sensitivity indices without recursivity.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Aims: This study investigated whether children aged between 8 - 12 years born very preterm (VPT) and/or at very low birth weight (VLBW) performed lower than same-aged term-born controls in cognitive and behavioral aspects of three executive functions: inhibition, working memory, and shifting. Special attention was given to sex differences. Methods: Fifty-two VPT/VLBW children (26 girls) born in the cohort of 1998–2003 at the Children’s University Hospital in Bern, Switzerland, and 36 same-aged term-born controls (18 girls) were recruited. As cognitive measures, children completed tasks of inhibition (Colour-Word Interference Test, D-KEFS), working memory (digit span backwards, WISC-IV) and shifting (Trail Making Test, number-letter switching, D-KEFS). As behavioral measures, mothers completed the Behavior Rating Inventory of Executive Function (BRIEF), assessing executive functions in everyday life.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Our last study with regularly developed children demonstrated a positive effect of working memory training on cognitive abilities. Building upon these findings, the aim of this multidisciplinary study is to investigate the effects of training of core functions with children who are suffering from different learning disabilities, like AD/HD, developmental dyslexia or specific language impairment. In addition to working memory training (BrainTwister), we apply a perceptual training, which concentrates on auditory-visual matching (Audilex), as well as an implicit concept learning task. We expect differential improvements of mental capacities, specifically of executive functions (working memory, attention, auditory and visual processing), scholastic abilities (language and mathematical skills), as well as of problem solving. With that, we hope to find further directions regarding helpful and individually adapted interventions in educational settings. Interested parties are invited to discuss and comment the design, the research question, and the possibilities in recruiting the subjects.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

We introduce the block numerical range Wn(L) of an operator function L with respect to a decomposition H = H1⊕. . .⊕Hn of the underlying Hilbert space. Our main results include the spectral inclusion property and estimates of the norm of the resolvent for analytic L . They generalise, and improve, the corresponding results for the numerical range (which is the case n = 1) since the block numerical range is contained in, and may be much smaller than, the usual numerical range. We show that refinements of the decomposition entail inclusions between the corresponding block numerical ranges and that the block numerical range of the operator matrix function L contains those of its principal subminors. For the special case of operator polynomials, we investigate the boundedness of Wn(L) and we prove a Perron-Frobenius type result for the block numerical radius of monic operator polynomials with coefficients that are positive in Hilbert lattice sense.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Fibroblasts are cells of mesenchymal origin. They are responsible for the production of most extracellular matrix in connective tissues and are essential for wound healing and repair. In recent years, it has become clear that fibroblasts from different tissues have various distinct traits. Moreover, wounds in the oral cavity heal under very special environmental conditions compared with skin wounds. Here, we reviewed the current literature on the various interconnected functions of gingival and mucoperiosteal fibroblasts during the repair of oral wounds. The MEDLINE database was searched with the following terms: (gingival OR mucoperiosteal) AND fibroblast AND (wound healing OR repair). The data gathered were used to compare oral fibroblasts with fibroblasts from other tissues in terms of their regulation and function during wound healing. Specifically, we sought answers to the following questions: (i) what is the role of oral fibroblasts in the inflammatory response in acute wounds; (ii) how do growth factors control the function of oral fibroblasts during wound healing; (iii) how do oral fibroblasts produce, remodel and interact with extracellular matrix in healing wounds; (iv) how do oral fibroblasts respond to mechanical stress; and (v) how does aging affect the fetal-like responses and functions of oral fibroblasts? The current state of research indicates that oral fibroblasts possess unique characteristics and tightly controlled specific functions in wound healing and repair. This information is essential for developing new strategies to control the intraoral wound-healing processes of the individual patient.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Embryonic stem cells (ESCs) possess two unique characteristics: infinite self-renewal and the potential to differentiate into almost every cell type (pluripotency). Recently, global expression analyses of metastatic breast and lung cancers revealed an ESC-like expression program or signature, specifically for cancers that are mutant for p53 function. Surprisingly, although p53 is widely recognized as the guardian of the genome, due to its roles in cell cycle checkpoints, programmed cell death or senescence, relatively little is known about p53 functions in normal cells, especially in ESCs. My hypothesis is that p53 has specific transcription regulatory functions in human ESCs (hESCs) that a) oppose pluripotency and b) protect the stem cell genome in response to DNA damage and stress signaling. In mouse ESCs, these roles are believed to coincide, as p53 promotes differentiation in response to DNA damage, but this is unexplored in hESCs. To determine the biological roles of p53, specifically in hESCs, we mapped genome-wide chromatin interactions of p53 by chromatin immunoprecipitation and massively parallel tag sequencing (ChIP-Seq), and did so under three VIdifferent conditions of hESC status: pluripotency, differentiation-initiated and DNA-damage-induced. ChIP-Seq showed that p53 is enriched at distinct, induction-specific gene loci during each of these different conditions. Microarray gene expression analysis and functional annotation of the distinct p53-target genes revealed that p53 regulates specific genes encoding developmental regulators, which are expressed in differentiation-initiated but not DNA- damaged hESCs. We further discovered that, in response to differentiation signaling, p53 binds regions of chromatin that are repressed but also poised for rapid activation by core pluripotency factors OCT4 and NANOG in pluripotent hESCs. In response to DNA damage, genes associated with migration and motility are targeted by p53; whereas, the prime targets of p53 in control of cell death are conserved for p53 regulation in both differentiation and DNA damage. Our genome-wide profiling and bioinformatics analyses show that p53 occupies a special set of developmental regulatory genes during early differentiation of hESCs and functions in an induction-specific manner. In conclusion, our research unveiled previously unknown functions of p53 in ESC biology, which augments our understanding of one of the most deregulated proteins in human cancers.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

El extraordinario auge de las nuevas tecnologías de la información, el desarrollo de la Internet de las Cosas, el comercio electrónico, las redes sociales, la telefonía móvil y la computación y almacenamiento en la nube, han proporcionado grandes beneficios en todos los ámbitos de la sociedad. Junto a éstos, se presentan nuevos retos para la protección y privacidad de la información y su contenido, como la suplantación de personalidad y la pérdida de la confidencialidad e integridad de los documentos o las comunicaciones electrónicas. Este hecho puede verse agravado por la falta de una frontera clara que delimite el mundo personal del mundo laboral en cuanto al acceso de la información. En todos estos campos de la actividad personal y laboral, la Criptografía ha jugado un papel fundamental aportando las herramientas necesarias para garantizar la confidencialidad, integridad y disponibilidad tanto de la privacidad de los datos personales como de la información. Por otro lado, la Biometría ha propuesto y ofrecido diferentes técnicas con el fin de garantizar la autentificación de individuos a través del uso de determinadas características personales como las huellas dáctilares, el iris, la geometría de la mano, la voz, la forma de caminar, etc. Cada una de estas dos ciencias, Criptografía y Biometría, aportan soluciones a campos específicos de la protección de datos y autentificación de usuarios, que se verían enormemente potenciados si determinadas características de ambas ciencias se unieran con vistas a objetivos comunes. Por ello es imperativo intensificar la investigación en estos ámbitos combinando los algoritmos y primitivas matemáticas de la Criptografía con la Biometría para dar respuesta a la demanda creciente de nuevas soluciones más técnicas, seguras y fáciles de usar que potencien de modo simultáneo la protección de datos y la identificacíón de usuarios. En esta combinación el concepto de biometría cancelable ha supuesto una piedra angular en el proceso de autentificación e identificación de usuarios al proporcionar propiedades de revocación y cancelación a los ragos biométricos. La contribución de esta tesis se basa en el principal aspecto de la Biometría, es decir, la autentificación segura y eficiente de usuarios a través de sus rasgos biométricos, utilizando tres aproximaciones distintas: 1. Diseño de un esquema criptobiométrico borroso que implemente los principios de la biometría cancelable para identificar usuarios lidiando con los problemas acaecidos de la variabilidad intra e inter-usuarios. 2. Diseño de una nueva función hash que preserva la similitud (SPHF por sus siglas en inglés). Actualmente estas funciones se usan en el campo del análisis forense digital con el objetivo de buscar similitudes en el contenido de archivos distintos pero similares de modo que se pueda precisar hasta qué punto estos archivos pudieran ser considerados iguales. La función definida en este trabajo de investigación, además de mejorar los resultados de las principales funciones desarrolladas hasta el momento, intenta extender su uso a la comparación entre patrones de iris. 3. Desarrollando un nuevo mecanismo de comparación de patrones de iris que considera tales patrones como si fueran señales para compararlos posteriormente utilizando la transformada de Walsh-Hadarmard. Los resultados obtenidos son excelentes teniendo en cuenta los requerimientos de seguridad y privacidad mencionados anteriormente. Cada uno de los tres esquemas diseñados han sido implementados para poder realizar experimentos y probar su eficacia operativa en escenarios que simulan situaciones reales: El esquema criptobiométrico borroso y la función SPHF han sido implementados en lenguaje Java mientras que el proceso basado en la transformada de Walsh-Hadamard en Matlab. En los experimentos se ha utilizado una base de datos de imágenes de iris (CASIA) para simular una población de usuarios del sistema. En el caso particular de la función de SPHF, además se han realizado experimentos para comprobar su utilidad en el campo de análisis forense comparando archivos e imágenes con contenido similar y distinto. En este sentido, para cada uno de los esquemas se han calculado los ratios de falso negativo y falso positivo. ABSTRACT The extraordinary increase of new information technologies, the development of Internet of Things, the electronic commerce, the social networks, mobile or smart telephony and cloud computing and storage, have provided great benefits in all areas of society. Besides this fact, there are new challenges for the protection and privacy of information and its content, such as the loss of confidentiality and integrity of electronic documents and communications. This is exarcebated by the lack of a clear boundary between the personal world and the business world as their differences are becoming narrower. In both worlds, i.e the personal and the business one, Cryptography has played a key role by providing the necessary tools to ensure the confidentiality, integrity and availability both of the privacy of the personal data and information. On the other hand, Biometrics has offered and proposed different techniques with the aim to assure the authentication of individuals through their biometric traits, such as fingerprints, iris, hand geometry, voice, gait, etc. Each of these sciences, Cryptography and Biometrics, provides tools to specific problems of the data protection and user authentication, which would be widely strengthen if determined characteristics of both sciences would be combined in order to achieve common objectives. Therefore, it is imperative to intensify the research in this area by combining the basics mathematical algorithms and primitives of Cryptography with Biometrics to meet the growing demand for more secure and usability techniques which would improve the data protection and the user authentication. In this combination, the use of cancelable biometrics makes a cornerstone in the user authentication and identification process since it provides revocable or cancelation properties to the biometric traits. The contributions in this thesis involve the main aspect of Biometrics, i.e. the secure and efficient authentication of users through their biometric templates, considered from three different approaches. The first one is designing a fuzzy crypto-biometric scheme using the cancelable biometric principles to take advantage of the fuzziness of the biometric templates at the same time that it deals with the intra- and inter-user variability among users without compromising the biometric templates extracted from the legitimate users. The second one is designing a new Similarity Preserving Hash Function (SPHF), currently widely used in the Digital Forensics field to find similarities among different files to calculate their similarity level. The function designed in this research work, besides the fact of improving the results of the two main functions of this field currently in place, it tries to expand its use to the iris template comparison. Finally, the last approach of this thesis is developing a new mechanism of handling the iris templates, considering them as signals, to use the Walsh-Hadamard transform (complemented with three other algorithms) to compare them. The results obtained are excellent taking into account the security and privacy requirements mentioned previously. Every one of the three schemes designed have been implemented to test their operational efficacy in situations that simulate real scenarios: The fuzzy crypto-biometric scheme and the SPHF have been implemented in Java language, while the process based on the Walsh-Hadamard transform in Matlab. The experiments have been performed using a database of iris templates (CASIA-IrisV2) to simulate a user population. The case of the new SPHF designed is special since previous to be applied i to the Biometrics field, it has been also tested to determine its applicability in the Digital Forensic field comparing similar and dissimilar files and images. The ratios of efficiency and effectiveness regarding user authentication, i.e. False Non Match and False Match Rate, for the schemes designed have been calculated with different parameters and cases to analyse their behaviour.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

In this paper, we give two infinite families of explicit exact formulas that generalize Jacobi’s (1829) 4 and 8 squares identities to 4n2 or 4n(n + 1) squares, respectively, without using cusp forms. Our 24 squares identity leads to a different formula for Ramanujan’s tau function τ(n), when n is odd. These results arise in the setting of Jacobi elliptic functions, Jacobi continued fractions, Hankel or Turánian determinants, Fourier series, Lambert series, inclusion/exclusion, Laplace expansion formula for determinants, and Schur functions. We have also obtained many additional infinite families of identities in this same setting that are analogous to the η-function identities in appendix I of Macdonald’s work [Macdonald, I. G. (1972) Invent. Math. 15, 91–143]. A special case of our methods yields a proof of the two conjectured [Kac, V. G. and Wakimoto, M. (1994) in Progress in Mathematics, eds. Brylinski, J.-L., Brylinski, R., Guillemin, V. & Kac, V. (Birkhäuser Boston, Boston, MA), Vol. 123, pp. 415–456] identities involving representing a positive integer by sums of 4n2 or 4n(n + 1) triangular numbers, respectively. Our 16 and 24 squares identities were originally obtained via multiple basic hypergeometric series, Gustafson’s Cℓ nonterminating 6φ5 summation theorem, and Andrews’ basic hypergeometric series proof of Jacobi’s 4 and 8 squares identities. We have (elsewhere) applied symmetry and Schur function techniques to this original approach to prove the existence of similar infinite families of sums of squares identities for n2 or n(n + 1) squares, respectively. Our sums of more than 8 squares identities are not the same as the formulas of Mathews (1895), Glaisher (1907), Ramanujan (1916), Mordell (1917, 1919), Hardy (1918, 1920), Kac and Wakimoto, and many others.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Over four hundred years ago, Sir Walter Raleigh asked his mathematical assistant to find formulas for the number of cannonballs in regularly stacked piles. These investigations aroused the curiosity of the astronomer Johannes Kepler and led to a problem that has gone centuries without a solution: why is the familiar cannonball stack the most efficient arrangement possible? Here we discuss the solution that Hales found in 1998. Almost every part of the 282-page proof relies on long computer verifications. Random matrix theory was developed by physicists to describe the spectra of complex nuclei. In particular, the statistical fluctuations of the eigenvalues (“the energy levels”) follow certain universal laws based on symmetry types. We describe these and then discuss the remarkable appearance of these laws for zeros of the Riemann zeta function (which is the generating function for prime numbers and is the last special function from the last century that is not understood today.) Explaining this phenomenon is a central problem. These topics are distinct, so we present them separately with their own introductory remarks.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The OSCE’s Special Monitoring Mission in Ukraine functions as the eyes and ears of the international community in Eastern Ukraine; it monitors, impartially, the ongoing conflict between Ukraine and Russia and observes whether or not both parties comply with the Minsk II Agreement. The success, or failure, of this Mission will not only be of crucial importance for the situation in Eastern Ukraine, but will also determine the OSCE’s entire future and ability to operate in conflict regions. Although the SMM is a flawed tool, Dennis Sammut and Joseph D’Urso argue that its deployment and the subsequent reinvigoration of OSCE is the perfect opportunity for the EU to rethink its relation to and position in the organisation, and to assume a bigger and more decisive role.