5,756 research outputs found

    Genetic insights on sleep schedules: this time, it's PERsonal.

    Get PDF
    The study of circadian rhythms is emerging as a fruitful opportunity for understanding cellular mechanisms that govern human physiology and behavior, fueled by evidence directly linking sleep disorders to genetic mutations affecting circadian molecular pathways. Familial advanced sleep-phase disorder (FASPD) is the first recognized Mendelian circadian rhythm trait, and affected individuals exhibit exceptionally early sleep-wake onset due to altered post-translational regulation of period homolog 2 (PER2). Behavioral and cellular circadian rhythms are analogously affected because the circadian period length of behavior is reduced in the absence of environmental time cues, and cycle duration of the molecular clock is likewise shortened. In light of these findings, we review the PER2 dynamics in the context of circadian regulation to reveal the mechanism of sleep-schedule modulation. Understanding PER2 regulation and functionality may shed new light on how our genetic composition can influence our sleep-wake behaviors

    Voicing Transformations and a Linear Representation of Uniform Triadic Transformations (Preprint name)

    No full text
    Motivated by analytical methods in mathematical music theory, we determine the structure of the subgroup J\mathcal{J} of GL(3,Z12)GL(3,\mathbb{Z}_{12}) generated by the three voicing reflections. We determine the centralizer of J\mathcal{J} in both GL(3,Z12)GL(3,\mathbb{Z}_{12}) and the monoid Aff(3,Z12){Aff}(3,\mathbb{Z}_{12}) of affine transformations, and recover a Lewinian duality for trichords containing a generator of Z12\mathbb{Z}_{12}. We present a variety of musical examples, including Wagner's hexatonic Grail motive and the diatonic falling fifths as cyclic orbits, an elaboration of our earlier work with Satyendra on Schoenberg, String Quartet in DD minor, op. 7, and an affine musical map of Joseph Schillinger. Finally, we observe, perhaps unexpectedly, that the retrograde inversion enchaining operation RICH (for arbitrary 3-tuples) belongs to the setwise stabilizer H\mathcal{H} in Σ3J\Sigma_3 \ltimes \mathcal{J} of root position triads. This allows a more economical description of a passage in Webern, Concerto for Nine Instruments, op. 24 in terms of a morphism of group actions. Some of the proofs are located in the Supplementary Material file, so that this main article can focus on the applications

    The structural and diagenetic evolution of injected sandstones: examples from the Kimmeridgian of NE Scotland

    Get PDF
    Abstract: Injected sandstones occurring in the Kimmeridgian of NE Scotland along the bounding Great Glen and Helmsdale faults formed when basinal fluids moved upward along the fault zones, fluidizing Oxfordian sands encountered at shallow depth and injecting them into overlying Kimmeridgian strata. The orientation of dykes, in addition to coeval faults and fractures, was controlled by a stress state related to dextral strike-slip along the bounding fault zones. Diagenetic studies of cements allow the reconstruction of the fluid flow history. The origin of deformation bands in sandstone dykes and sills was related to the contraction of the host-rocks against dyke and sill walls following the initial stage of fluidized flow, and these deformation bands are the earliest diagenetic imprint. Early non-ferroan calcite precipitated in injection structures at temperatures between 70 and 100 8C, indicating that it precipitated from relatively hot basinal fluids that drove injection. Coeval calcite-filled fractures show similar temperatures, suggesting that relatively hot fluids were responsible for calcite precipitation in any permeable pathway created by dextral simple shear along the faults. During progressive burial, percolating sea water was responsible for completely cementing the still relatively porous injected sandstones with a second generation of ferroan calcite, which contains fluid inclusions with homogenization temperatures below 50 8C. During this phase, depositional host sandstones were also cemented

    Collinear antiferromagnetic phases of a frustrated spin-12\frac{1}{2} J1J_{1}--J2J_{2}--J1J_{1}^{\perp} Heisenberg model on an AAAA-stacked bilayer honeycomb lattice

    Full text link
    The zero-temperature quantum phase diagram of the spin-12\frac{1}{2} J1J_{1}--J2J_{2}--J1J_{1}^{\perp} model on an AAAA-stacked bilayer honeycomb lattice is investigated using the coupled cluster method (CCM). The model comprises two monolayers in each of which the spins, residing on honeycomb-lattice sites, interact via both nearest-neighbor (NN) and frustrating next-nearest-neighbor isotropic antiferromagnetic (AFM) Heisenberg exchange iteractions, with respective strengths J1>0J_{1} > 0 and J2κJ1>0J_{2} \equiv \kappa J_{1}>0. The two layers are coupled via a comparable Heisenberg exchange interaction between NN interlayer pairs, with a strength J1δJ1J_{1}^{\perp} \equiv \delta J_{1}. The complete phase boundaries of two quasiclassical collinear AFM phases, namely the N\'{e}el and N\'{e}el-II phases, are calculated in the κδ\kappa \delta half-plane with κ>0\kappa > 0. Whereas on each monolayer in the N\'{e}el state all NN pairs of spins are antiparallel, in the N\'{e}el-II state NN pairs of spins on zigzag chains along one of the three equivalent honeycomb-lattice directions are antiparallel, while NN interchain spins are parallel. We calculate directly in the thermodynamic (infinite-lattice) limit both the magnetic order parameter MM and the excitation energy Δ\Delta from the sTz=0s^{z}_{T}=0 ground state to the lowest-lying sTz=1|s^{z}_{T}|=1 excited state (where sTzs^{z}_{T} is the total zz component of spin for the system as a whole, and where the collinear ordering lies along the zz direction) for both quasiclassical states used (separately) as the CCM model state, on top of which the multispin quantum correlations are then calculated to high orders (n10n \leq 10) in a systematic series of approximations involving nn-spin clusters. The sole approximation made is then to extrapolate the sequences of nnth-order results for MM and Δ\Delta to the exact limit, nn \to \infty

    Train driver automation strategies to mitigate signals passed at danger on South African railways

    Get PDF
    A research project report submitted to the Faculty of Engineering and the Built Environment, University of the Witwatersrand, in fulfillment of the requirements for the degree of Masters in Engineering. Date 2018/04/18Train derailments or collisions have the potential to result in catastrophic loss of life and/or destruction of property. Ever higher demands for train density (i.e. trains per hour for a given section of track) as well as the catastrophic results when accidents do occur have given rise to the development of railway signalling systems as mitigation measures (Rolt, 2009; Theeg & Vlasenko (2009b). Signals Passed At Danger (SPADs) refers to when a train driver passes a stop signal without authority and is one of the typical causes of such accidents resulting in significant damages reported within Transnet Freight Rail (TFR) in recent years. Studies have shown human train driver error and violation of signals to be a significant cause of SPAD events. This study investigated the application of train driver automation as a mitigation measure against SPADs within the South African railway environment in general and TFR in particular. The study was qualitative in nature, following a model development methodology and used in-depth, semi-structured interviews with railway signalling engineers for data collection. The primary goal was defined to be the development of a train driver function automation method that could be considered the most appropriate within the TFR operational environment. The study determined the most appropriate method to be that of having a human driver with technical supervision. In this arrangement, the human driver could remain in his conventional role of driving the train but with a technical supervision system superimposed that automatically intervenes if a train driver exceeds his movement authority (e.g. Automatic Train Protection or ATP). This approach mitigates many of the costs imposed by human failure associated with SPAD events, yet retains the value of human flexibility which is especially useful under abnormal circumstances.MT 201

    Complete Model-Based Testing Applied to the Railway Domain

    Get PDF
    Testing is the most important verification technique to assert the correctness of an embedded system. Model-based testing (MBT) is a popular approach that generates test cases from models automatically. For the verification of safety-critical systems, complete MBT strategies are most promising. Complete testing strategies can guarantee that all errors of a certain kind are revealed by the generated test suite, given that the system-under-test fulfils several hypotheses. This work presents a complete testing strategy which is based on equivalence class abstraction. Using this approach, reactive systems, with a potentially infinite input domain but finitely many internal states, can be abstracted to finite-state machines. This allows for the generation of finite test suites providing completeness. However, for a system-under-test, it is hard to prove the validity of the hypotheses which justify the completeness of the applied testing strategy. Therefore, we experimentally evaluate the fault-detection capabilities of our equivalence class testing strategy in this work. We use a novel mutation-analysis strategy which introduces artificial errors to a SystemC model to mimic typical HW/SW integration errors. We provide experimental results that show the adequacy of our approach considering case studies from the railway domain (i.e., a speed-monitoring function and an interlocking-system controller) and from the automotive domain (i.e., an airbag controller). Furthermore, we present extensions to the equivalence class testing strategy. We show that a combination with randomisation and boundary-value selection is able to significantly increase the probability to detect HW/SW integration errors
    corecore