318 research outputs found

    An error analysis of probabilistic fibre tracking methods: average curves optimization

    Get PDF
    Fibre tractography using diffusion tensor imaging is a promising method for estimating the pathways of white matter tracts in the human brain. The success of fibre tracking methods ultimately depends upon the accuracy of the fibre tracking algorithms and the quality of the data. Uncertainty and its representation have an important role to play in fibre tractography methods to infer useful information from real world noisy diffusion weighted data. Probabilistic fibre tracking approaches have received considerable interest recently for resolving orientational uncertainties. In this study, an average curves approach was used to investigate the impact of SNR and tensor field geometry on the accuracy of three different types of probabilistic tracking algorithms. The accuracy was assessed using simulated data and a range of tract geometries. The average curves representations were employed to represent the optimal fibre path of probabilistic tracking curves. The results are compared with streamline tracking on both simulated and in vivo data

    Decentralized receding horizon control of cooperative vehicles with communication delays

    Get PDF
    This thesis investigates the decentralized receding horizon control (DRHC) for a network of cooperative vehicles where each vehicle in the group plans its future trajectory over a finite prediction horizon time. The vehicles exchange their predicted paths with the neighbouring vehicles through a communication channel in order to maintain the cooperation objectives. In this framework, more frequent communication provides improved performance and stability properties. The main focus of this thesis is on situations where large inter-vehicle communication delays are present. Such large delays may occur due to fault conditions with the communication devices or limited communication bandwidth. Large communication delays can potentially lead to poor performance, unsafe behaviour and even instability for the existing DRHC methods. The main objective of this thesis is to develop new DRHC methods that provide improved performance and stability properties in the presence of large communication delays. Fault conditions are defined and diagnosis algorithms are developed for situations with large communication delays. A fault tolerant DRHC architecture is then proposed which is capable of effectively using the delayed information. The main idea with the proposed approach is to estimate the path of the neighbouring faulty vehicles, when they are unavailable due to large delays, by adding extra decision variables to the cost function. It is demonstrated that this approach can result in significant improvements in performance and stability. Furthermore, the concept of the tube DRHC is proposed to provide the safety of the fleet against collisions during faulty conditions. In this approach, a tube shaped trajectory is assumed in the region around the delayed trajectory of the faulty vehicle instead of a line shaped trajectory. The neighbouring vehicles calculate the tube and are not allowed to enter that region. Feasibility, stability, and performance of the proposed fault tolerant DRHC are also investigated. Finally, a bandwidth allocation algorithm is proposed in order to optimize the communication periods so that the overall teaming performance is optimized. Together, these results form a new and effective framework for decentralized receding horizon control with communication faults and large communication delays

    Interprocedural Reachability for Flat Integer Programs

    Full text link
    We study programs with integer data, procedure calls and arbitrary call graphs. We show that, whenever the guards and updates are given by octagonal relations, the reachability problem along control flow paths within some language w1* ... wd* over program statements is decidable in Nexptime. To achieve this upper bound, we combine a program transformation into the same class of programs but without procedures, with an Np-completeness result for the reachability problem of procedure-less programs. Besides the program, the expression w1* ... wd* is also mapped onto an expression of a similar form but this time over the transformed program statements. Several arguments involving context-free grammars and their generative process enable us to give tight bounds on the size of the resulting expression. The currently existing gap between Np-hard and Nexptime can be closed to Np-complete when a certain parameter of the analysis is assumed to be constant.Comment: 38 pages, 1 figur

    Proving Safety with Trace Automata and Bounded Model Checking

    Full text link
    Loop under-approximation is a technique that enriches C programs with additional branches that represent the effect of a (limited) range of loop iterations. While this technique can speed up the detection of bugs significantly, it introduces redundant execution traces which may complicate the verification of the program. This holds particularly true for verification tools based on Bounded Model Checking, which incorporate simplistic heuristics to determine whether all feasible iterations of a loop have been considered. We present a technique that uses \emph{trace automata} to eliminate redundant executions after performing loop acceleration. The method reduces the diameter of the program under analysis, which is in certain cases sufficient to allow a safety proof using Bounded Model Checking. Our transformation is precise---it does not introduce false positives, nor does it mask any errors. We have implemented the analysis as a source-to-source transformation, and present experimental results showing the applicability of the technique

    Systematic manipulation of experimenters' non-verbal behaviors for the investigation of pain reports and placebo effects

    Get PDF
    ObjectiveNon-verbal behaviors (NBs) of caregivers affect pain reports and placebo effects. However, little experimental research has systematically examined the caregivers' NBs. This study protocol and preparatory study report a systematic manipulation of experimenters' NBs to investigate pain report and placebo effects.MethodsWe propose an experiment in which videotaped experimenters (VEs) conduct a pain stimulation and a placebo treatment study. The VEs express one positively enhanced NB and keep the other NBs neutral. Participants will be randomized to either the positive facial expressions (+FE), tone of voice (+TV), body movement (+BM), or neutral NBs (i.e., neutral condition; NC) of the VEs. As a preparatory study for proof of concept, two groups of NB coders from Norway and the USA separately rated the degree of NBs (eye contact, body postures and movements, and tone of voice), and impressions of dominance and being in charge, positivity, and expressivity from each NB video. The NB videos had construct validity and reliability. The +BM and +FE were rated as more dominant and in charge than the +TV and the NC. The +FE and +BM were rated as the most positive and expressive NBs, respectively.Expected results+FE will have the largest placebo effects on pain and stress levels. However, transmitting the NBs to patients by VEs is challenging. Moreover, controlling for the effects of research assistants present in the testing room is challenging.DiscussionWe propose that caregivers' NBs affect pain reports and placebo effects. Moreover, different NBs elicit different impressions, and a better understanding of the role of caregiver NBs requires more rigorous investigations. Lastly, aiming to investigate the caregiver NBs, the varying degrees of micro-NBs and their effects on the formation of impressions should be considered

    Wnt5a induces ROR1 to associate with 14-3-3ζ for enhanced chemotaxis and proliferation of chronic lymphocytic leukemia cells.

    Get PDF
    Wnt5a can activate Rho GTPases in chronic lymphocytic leukemia (CLL) cells by inducing the recruitment of ARHGEF2 to ROR1. Mass spectrometry on immune precipitates of Wnt5a-activated ROR1 identified 14-3-3ζ, which was confirmed by co-immunoprecipitation. The capacity of Wnt5a to induce ROR1 to complex with 14-3-3ζ could be blocked in CLL cells by treatment with cirmtuzumab, a humanized mAb targeting ROR1. Silencing 14-3-3ζ via small interfering RNA impaired the capacity of Wnt5a to: (1) induce recruitment of ARHGEF2 to ROR1, (2) enhance in vitro exchange activity of ARHGEF2 and (3) induce activation of RhoA and Rac1 in CLL cells. Furthermore, CRISPR/Cas9 deletion of 14-3-3ζ in ROR1-negative CLL cell-line MEC1, and in MEC1 cells transfected to express ROR1 (MEC1-ROR1), demonstrated that 14-3-3ζ was necessary for the growth/engraftment advantage of MEC1-ROR1 over MEC1 cells. We identified a binding motif (RSPS857SAS) in ROR1 for 14-3-3ζ. Site-directed mutagenesis of ROR1 demonstrated that serine-857 was required for the recruitment of 14-3-3ζ and ARHGEF2 to ROR1, and activation of RhoA and Rac1. Collectively, this study reveals that 14-3-3ζ plays a critical role in Wnt5a/ROR1 signaling, leading to enhanced CLL migration and proliferation

    Aqua­(4,4′-dimethyl-2,2′-bipyridine-κ2 N,N′)(nitrato-κO)(nitrato-κ2 O,O′)zinc

    Get PDF
    In the title compound, [Zn(NO3)2(C12H12N2)(H2O)], the ZnII atom is six-coordinated in a distorted octa­hedral geometry by two N atoms from a chelating 4,4′-dimethyl-2,2′-bipyridine ligand, one water O atom, one O atom from a monodentate nitrate anion and two O atoms from a chelating nitrate anion. In the crystal, there are aromatic π–π contacts between the pyridine rings [centroid–centroid distances = 3.9577 (13) Å] and inter­molecular O—H⋯O and C—H⋯O hydrogen bonds

    A simple abstraction of arrays and maps by program translation

    Full text link
    We present an approach for the static analysis of programs handling arrays, with a Galois connection between the semantics of the array program and semantics of purely scalar operations. The simplest way to implement it is by automatic, syntactic transformation of the array program into a scalar program followed analysis of the scalar program with any static analysis technique (abstract interpretation, acceleration, predicate abstraction,.. .). The scalars invariants thus obtained are translated back onto the original program as universally quantified array invariants. We illustrate our approach on a variety of examples, leading to the " Dutch flag " algorithm
    corecore