3,538 research outputs found

    Computation-Aware Data Aggregation

    Get PDF
    Data aggregation is a fundamental primitive in distributed computing wherein a network computes a function of every nodes\u27 input. However, while compute time is non-negligible in modern systems, standard models of distributed computing do not take compute time into account. Rather, most distributed models of computation only explicitly consider communication time. In this paper, we introduce a model of distributed computation that considers both computation and communication so as to give a theoretical treatment of data aggregation. We study both the structure of and how to compute the fastest data aggregation schedule in this model. As our first result, we give a polynomial-time algorithm that computes the optimal schedule when the input network is a complete graph. Moreover, since one may want to aggregate data over a pre-existing network, we also study data aggregation scheduling on arbitrary graphs. We demonstrate that this problem on arbitrary graphs is hard to approximate within a multiplicative 1.5 factor. Finally, we give an O(log n ? log(OPT/t_m))-approximation algorithm for this problem on arbitrary graphs, where n is the number of nodes and OPT is the length of the optimal schedule

    Unitarity constraints on asymmetric freeze-in

    Full text link
    This paper considers unitarity and CPT constraints on asymmetric freeze-in, the use of freeze-in to store baryon number in a dark sector. In this scenario, Sakharov's out of equilibrium condition is satisfied by placing the visible and hidden sectors at different temperatures while a net visible baryon number is produced by storing negative baryon number in a dark sector. It is shown that unitarity and CPT lead to unexpected cancellations. In particular, the transfer of baryon number cancels completely at leading order.Comment: 15 pages, 7 figures, change in notation, accepted to pr

    Brownian molecular motors driven by rotation-translation coupling

    Full text link
    We investigated three models of Brownian motors which convert rotational diffusion into directed translational motion by switching on and off a potential. In the first model a spatially asymmetric potential generates directed translational motion by rectifying rotational diffusion. It behaves much like a conventional flashing ratchet. The second model utilizes both rotational diffusion and drift to generate translational motion without spatial asymmetry in the potential. This second model can be driven by a combination of a Brownian motor mechanism (diffusion driven) or by powerstroke (drift driven) depending on the chosen parameters. In the third model, elements of both the Brownian motor and powerstroke mechanisms are combined by switching between three distinct states. Relevance of the model to biological motor proteins is discussed.Comment: 11 pages, 8 figure

    Efficacy of cognitive behaviour therapy versus anxiety management for body dysmorphic disorder: a randomised controlled trial

    Get PDF
    Background: The evidence base for the effectiveness of cognitive behaviour therapy (CBT) for treating Body Dysmorphic Disorder (BDD) is weak. Aims: To determine if CBT is more effective than anxiety management (AM) in an out-patient setting. Method: A single blind, stratified parallel-group randomized controlled trial. The primary endpoint was at 12 weeks, and the Yale Brown Obsessive Compulsive Scale for BDD (BDD-YBOCS) was the primary outcome measure. Secondary measures for BDD included the Brown Assessment of Beliefs (BABS), the Appearance Anxiety Inventory (AAI) and the Body Image Quality of Life Inventory (BIQLI). The outcome measures were collected at baseline and week 12. The CBT group, unlike the AM group, had 4 further weekly sessions that were analysed for their added value. Both groups then completed measures at their 1-month follow-up. Forty-six participants, with DSM-IV diagnosis of BDD including those with a delusional BDD were randomly allocated to either CBT or AM. Results: At 12 weeks, CBT was found to be significantly superior to AM on the BDD-YBOCS ( = -7.19, S.E. () = 2.61, p < .01, C.I. = -12.31, -2.07, d 0.99) as well as the secondary outcome measures of the BABS, AAI and BIQL. Further benefits occurred by Week 16 within the CBT group. There were no differences in outcome for those with delusional BDD or depression. Conclusions: CBT is an effective intervention for people with BDD even with delusional beliefs or depression and is more effective than anxiety management over 12 weeks

    Identification of amino acid residues of the NR2A subunit that control glutamate potency in recombinant NR1/NR2A NMDA receptors

    Get PDF
    The NMDA type of ligand-gated glutamate receptor requires the presence of both glutamate and glycine for gating. These receptors are hetero-oligomers of NR1 and NR2 subunits. Previously it was thought that the binding sites for glycine and glutamate were formed by residues on the NR1 subunit. Indeed, it has been shown that the effects of glycine are controlled by residues on the NR1 subunit, and a “Venus flytrap” model for the glycine binding site has been suggested by analogy with bacterial periplasmic amino acid binding proteins. By analysis of 10 mutant NMDA receptors, we now show that residues on the NR2A subunit control glutamate potency in recombinant NR1/NR2A receptors, without affecting glycine potency. Furthermore, we provide evidence that, at least for some mutated residues, the reduced potency of glutamate cannot be explained by alteration of gating but has to be caused primarily by impairing the binding of the agonist to the resting state of the receptor. One NR2A mutant, NR2A(T671A), had anEC50for glutamate 1000-fold greater than wild type and a 255-fold reduced affinity for APV, yet it had single-channel openings very similar to those of wild type. Therefore we propose that the glutamate binding site is located on NR2 subunits and (taking our data together with previous work) is not on the NR1 subunit. Our data further imply that each NMDA receptor subunit possesses a binding site for an agonist (glutamate or glycine).</jats:p

    Heterologous prime-boost-boost immunisation of Chinese cynomolgus macaques using DNA and recombinant poxvirus vectors expressing HIV-1 virus-like particles

    Get PDF
    Background: There is renewed interest in the development of poxvirus vector-based HIV vaccines due to the protective effect observed with repeated recombinant canarypox priming with gp120 boosting in the recent Thai placebo-controlled trial. This study sought to investigate whether a heterologous prime-boost-boost vaccine regimen in Chinese cynomolgus macaques with a DNA vaccine and recombinant poxviral vectors expressing HIV virus-like particles bearing envelopes derived from the most prevalent clades circulating in sub-Saharan Africa, focused the antibody response to shared neutralising epitopes. Methods: Three Chinese cynomolgus macaques were immunised via intramuscular injections using a regimen composed of a prime with two DNA vaccines expressing clade A Env/clade B Gag followed by boosting with recombinant fowlpox virus expressing HIV-1 clade D Gag, Env and cholera toxin B subunit followed by the final boost with recombinant modified vaccinia virus Ankara expressing HIV-1 clade C Env, Gag and human complement protein C3d. We measured the macaque serum antibody responses by ELISA, enumerated T cell responses by IFN-gamma ELISpot and assessed seroneutralisation of HIV-1 using the TZM-bl beta-galactosidase assay with primary isolates of HIV-1. Results: This study shows that large and complex synthetic DNA sequences can be successfully cloned in a single step into two poxvirus vectors: MVA and FPV and the recombinant poxviruses could be grown to high titres. The vaccine candidates showed appropriate expression of recombinant proteins with the formation of authentic HIV virus-like particles seen on transmission electron microscopy. In addition the b12 epitope was shown to be held in common by the vaccine candidates using confocal immunofluorescent microscopy. The vaccine candidates were safely administered to Chinese cynomolgus macaques which elicited modest T cell responses at the end of the study but only one out of the three macaques elicited an HIV-specific antibody response. However, the antibodies did not neutralise primary isolates of HIV-1 or the V3-sensitive isolate SF162 using the TZM-bl b-galactosidase assay. Conclusions: MVA and FP9 are ideal replication-deficient viral vectors for HIV-1 vaccines due to their excellent safety profile for use in humans. This study shows this novel prime-boost-boost regimen was poorly immunogenic in Chinese cynomolgus macaques

    The Linear Perturbation Theory of Reionization in Position-Space: Cosmological Radiative Transfer Along the Light-Cone

    Full text link
    The linear perturbation theory of inhomogeneous reionization (LPTR) has been developed as an analytical tool for predicting the global ionized fraction and large-scale power spectrum of ionized density fluctuations during reionization. In the original formulation of the LPTR, the ionization balance and radiative transfer equations are linearized and solved in Fourier space. However, the LPTR's approximation to the full solution of the radiative transfer equation is not straightforward to interpret, since the latter is most intuitively conceptualized in position space. To bridge the gap between the LPTR and the language of numerical radiative transfer, we present a new, equivalent, position-space formulation of the LPTR that clarifies the approximations it makes and facilitates its interpretation. We offer a comparison between the LPTR and the excursion-set model of reionization (ESMR), and demonstrate the built-in capability of the LPTR to explore a wide range of reionization scenarios, and to go beyond the ESMR in exploring scenarios involving X-rays.Comment: 10 pages, 1 figure, 1 table. Accepted by PRD with minor change

    Maintenance Task Classification: Towards Automated Robotic Maintenance for Industry

    Get PDF
    AbstractThe business model of high-value capital assets is shifting from purchasing a physical product to acquiring a result or a function supported by the product combined with a number of related services. One such service, maintenance, is perhaps the most efficient way to keep the function available during the product lifecycle. Automation has played a vital role in industry throughout history, particularly within the production line. With the movement towards providing product service systems the need for services such as maintenance are increasingly important for a manufactured product, and the pull towards automation may drive down costs and improve performance time. Although currently robotic applications to maintenance beyond monitoring and inspection tasks are not common, this research aims at exploring the feasibility of future maintenance robots that can perform a variety of maintenance tasks. As its first step, this work looks first at investigation, cataloging and classification of a number of maintenance tasks using standard industrial engineering techniques such as time motion, method or workflow analysis. This involves decomposing the maintenance work into a number of ‘unit tasks’ required to be performed in order to accomplish the specified maintenance
    corecore