58 resultados para trick


Relevância:

20.00% 20.00%

Publicador:

Resumo:

We consider the statistical properties of the local density of states of a one-dimensional Dirac equation in the presence of various types of disorder with Gaussian white-noise distribution. It is shown how either the replica trick or supersymmetry can be used to calculate exactly all the moments of the local density of states.' Careful attention is paid to how the results change if the local density of states is averaged over atomic length scales. For both the replica trick and supersymmetry the problem is reduced to finding the ground state of a zero-dimensional Hamiltonian which is written solely in terms of a pair of coupled spins which are elements of u(1, 1). This ground state is explicitly found for the particular case of the Dirac equation corresponding to an infinite metallic quantum wire with a single conduction channel. The calculated moments of the local density of states agree with those found previously by Al'tshuler and Prigodin [Sov. Phys. JETP 68 (1989) 198] using a technique based on recursion relations for Feynman diagrams. (C) 2001 Elsevier Science B.V. All rights reserved.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Ethnographic data collected over a 5-year period is analyzed to determine how the Personal Responsibility & Work Opportunity Reconciliation Act of 1996 (PRWORA) has affected the lives of young male drug dealers from AIDS-afflicted families residing in Detroit. The data analysis indicated that the participants perceived drug dealing as the only viable employment opportunity for meeting the quotidian & health care needs of their families. The findings also revealed that the participants were highly aware of local political processes & the necessities of caring for relatives living with AIDS. Additional attention is dedicated to exploring the state of MI's rationale for ending the General Assistance Program, the sociocultural foundations of the PRWORA, various stipulations of the PRWORA, & how the PRWORA has augmented the legal vulnerability of welfare recipients. It is concluded that the PRWORA will force many welfare recipients to engage in illicit activities & will generally decrease recipients' health. 59 References. J. W. Parker

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Plasmacytoid dendritic cells (pDCs) were first described as interferon-producing cells and, for many years, their overlapping characteristics with both lymphocytes and classical dendritic cells (cDCs) created confusion over their exact ontogeny. In this Viewpoint article, Nature Reviews Immunology asks five leaders in the field to discuss their thoughts on the development and functions of pDCs--do these cells serve mainly as a major source of type I interferons or do they also make other important contributions to immune responses?

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Therapeutic drug monitoring (TDM) can be defined as the measurement of drug in biological samples to individualise treatment by adapting drug dose to improve efficacy and/or reduce toxicity. The cytotoxic drugs are characterised by steep dose-response relationships and narrow therapeutic windows. Inter-individual pharmacokinetic (PK) variability is often substantial. There are, however, a multitude of reasons why TDM has never been fully implemented in daily oncology practice. These include difficulties in establishing appropriate concentration target, common use of combination chemotherapies and the paucity of published data from pharmacological trials. The situation is different with targeted therapies. The large interindividual PK variability is influenced by the pharmacogenetic background of the patient (e.g. cytochrome P450 and ABC transporters polymorphisms), patient characteristics such as adherence to treatment and environmental factors (drug-drug interactions). Retrospective studies have shown that targeted drug exposure correlates with treatment response in various cancers. Evidence for imatinib currently exists, others are emerging for compounds including nilotinib, dasatinib, erlotinib, sunitinib, sorafenib and mammalian target of rapamycin (mTOR) inhibitors. Applications for TDM during oral targeted therapies may best be reserved for particular situations including lack of therapeutic response, severe or unexpected toxicities, anticipated drug-drug interactions and concerns over adherence treatment. There are still few data with monoclonal antibodies (mAbs) in favour of TDM approaches, even if data showed encouraging results with rituximab and cetuximab. TDM of mAbs is not yet supported by scientific evidence. Considerable effort should be made for targeted therapies to better define concentration-effect relationships and to perform comparative randomised trials of classic dosing versus pharmacokinetically-guided adaptive dosing.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This article has been written as a comment to Dr Thomas and Dr Baker's article "Teaching an adult brain new tricks: A critical review of evidence for training-dependent structural plasticity in humans". We deliberately expand on the key question about the biological substrates underlying use-dependent brain plasticity rather than reiterating the authors' main points of criticism already addressed in more general way by previous publications in the field. The focus here is on the following main issues: i) controversial brain plasticity findings in voxel-based morphometry studies are partially due to the strong dependency of the widely used T1-weighted imaging protocol on varying magnetic resonance contrast contributions; ii) novel concepts in statistical analysis allow one to directly infer topological specificity of structural brain changes associated with plasticity. We conclude that iii) voxel-based quantification of relaxometry derived parameter maps could provide a new perspective on use-dependent plasticity by characterisation of brain tissue property changes beyond the estimation of volume and cortical thickness changes. In the relevant sections we respond to the concerns raised by Dr Thomas and Dr Baker from the perspective of the proposed data acquisition and analysis strategy.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Presentation at Open Repositories 2014, Helsinki, Finland, June 9-13, 2014

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This study examines how children make sense of “anti-oppressive” children’s literature in the classroom, specifically, books that integrate and promote positive portrayals of gender non-conformity and sexual diversity. Through a feminist poststructural lens, I conducted ethnographic observations and reading groups with twenty students in a grade one/two classroom to explore how children engage with these storybooks. I further explored how the use of these books in the classroom might help to mediate and negotiate existing gendered and heteronormative beliefs and practices within educational settings. The books used in this study challenge oppressive gender and sexuality regimes within mainstream children’s literature that have traditionally served to marginalize and silence gender non-conforming and LGBTQ individuals. Responses from participants in this study aid in questioning how dominant discourses of gender and sexuality are produced and reinforced, as well as where we may find opportunities for change and reform within the elementary school classroom.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We consider an exchange economy under incomplete financiaI markets with purely financiaI securities and finitely many agents. When portfolios are not constrained, Cass [4], Duffie [7] and Florenzano-Gourdel [12] proved that arbitrage-free security prices fully characterize equilibrium security prices. This result is based on a trick initiated by Cass [4] in which one unconstrained agent behaves as if he were in complete markets. This approach is unsatisfactory since it is asymmetric and no more valid when every agent is subject to frictions. We propose a new and symmetric approach to prove that arbitrage-free security prices still fully characterize equilibrium security prices in the more realistic situation where the financiaI market is constrained by convex restrictions, provided that financiaI markets are collectively frictionless.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Il Cryptolocker è un malware diffuso su scala globale appartenente alla categoria ransomware. La mia analisi consiste nel ripercorrere le origini dei software maligni alla ricerca di rappresentanti del genere con caratteristiche simili al virus che senza tregua persevera a partire dal 2013: il Cryptolocker. Per imparare di più sul comportamento di questa minaccia vengono esposte delle analisi del malware, quella statica e quella dinamica, eseguite sul Cryptolocker (2013), CryptoWall (2014) e TeslaCrypt (2015). In breve viene descritta la parte operativa per la concezione e la configurazione di un laboratorio virtuale per la successiva raccolta di tracce lasciate dal malware sul sistema e in rete. In seguito all’analisi pratica e alla concentrazione sui punti deboli di queste minacce, oltre che sugli aspetti tecnici alla base del funzionamento dei crypto, vengono presi in considerazione gli aspetti sociali e psicologici che caratterizzano un complesso background da cui il virus prolifica. Vengono confrontate fonti autorevoli e testimonianze per chiarire i dubbi rimasti dopo i test. Saranno questi ultimi a confermare la veridicità dei dati emersi dai miei esperimenti, ma anche a formare un quadro più completo sottolineando quanto la morfologia del malware sia in simbiosi con la tipologia di utente che va a colpire. Capito il funzionamento generale del crypto sono proprio le sue funzionalità e le sue particolarità a permettermi di stilare, anche con l’aiuto di fonti esterne al mio operato, una lista esauriente di mezzi e comportamenti difensivi per contrastarlo ed attenuare il rischio d’infezione. Vengono citati anche le possibili procedure di recupero per i dati compromessi, per i casi “fortunati”, in quanto il recupero non è sempre materialmente possibile. La mia relazione si conclude con una considerazione da parte mia inaspettata: il potenziale dei crypto, in tutte le loro forme, risiede per la maggior parte nel social engineering, senza il quale (se non per certe categorie del ransomware) l’infezione avrebbe percentuali di fallimento decisamente più elevate.