3,407 research outputs found
Molecular mechanisms regulating perivascular adipose tissue - potential pharmacological targets?
No abstract available
Mammalian Septins Nomenclature
There are 10 known mammalian septin genes, some of which produce multiple splice variants. The
current nomenclature for the genes and gene products is very confusing, with several different names
having been given to the same gene product and distinct names given to splice variants of the same
gene. Moreover, some names are based on those of yeast or Drosophila septins that are not the closest
homologues. Therefore, we suggest that the mammalian septin field adopt a common nomenclature
system, based on that adopted by the Mouse Genomic Nomenclature Committee and accepted by the Human Genome Organization Gene Nomenclature Committee. The human and mouse septin genes
will be named SEPT1âSEPT10 and Sept1âSept10, respectively. Splice variants will be designated by an
underscore followed by a lowercase âvâ and a number, e.g., SEPT4_v1
Getting it right for children and young people: overcoming cultural barriers in the NHS so as to meet their needs
Redeeming The Aural: Amodal Resonance And Media History
Sounding New Media: Immersion and Embodiment in the Arts and Culture by Frances Dyson. Berkeley: University of California Press, 2009. Pp. 262. 28.95 paper
Recommended from our members
A Framework for the Systematic Evaluation of Malware Forensic Tools
Following a series of high profile miscarriages of justice linked to questionable expert evidence, the post of the Forensic Science Regulator was created in 2008 with a remit to improve the standard of practitioner competences and forensic procedures. It has since moved to incorporate a greater level of scientific practice in these areas, as used in the production of expert evidence submitted to the UK Criminal Justice System. Accreditation to their codes of practice and conduct will become mandatory for all forensic practitioners by October 2017. A variety of challenges with expert evidence are explored and linked to a lack of a scientific methodology underpinning the processes followed. In particular, the research focuses upon investigations where malicious software (âmalwareâ) has been identified.
A framework, called the âMalware Analysis Tool Evaluation Frameworkâ (MATEF), has been developed to address this lack of methodology to evaluate software tools used during investigations involving malware. A prototype implementation of the framework was used to evaluate two tools against a population of over 350,000 samples of malware. Analysis of the findings indicated that the choice of tool could impact on the number of artefacts observed in malware forensic investigations as well as identifying the optimal execution time for a given tool when observing malware artefacts.
Three different measures were used to evaluate the framework. The first of these evaluated the framework against the requirements and determined that these were largely met. Where the requirements were not met these are attributed to matters either outside scope or the fledgling nature of the research. Another measure used to evaluate the framework was to consider its performance in terms of speed and resource utilisation. This identified scope for improvement in terms of the time to complete a test and the need for more economical use of disk space. Finally, the framework provides a scientific means to evaluate malware analysis tools, hence addressing the Research Question subject to the level at which ground truth is established.
A number of contributions are produced as the output of this work. First there is confirmation for the case for a lack of trusted practice in the field of malware forensics. Second, the MATEF itself, as it facilitates the production of empirical evidence of a toolâs ability to detect malware artefacts. A third contribution is a set of requirements for establishing trusted practice in the use of malware artefact detection tools. Finally, empirical evidence that supports both the notion that the choice of tool can impact on the number of artefacts observed in malware forensic investigations as well as identifying the optimal execution time for a given tool when observing malware artefacts
Influence of gross regional and industrial product ranks on data call connections.
A thesis submitted to the Faculty of Engineering,
University of the '\Vitwatersrand, Johannesburg,
in fulfilment of the requirements for the degree
of
Doctor of PhilosophyTHIS STUDY identifies and evaluates factors that affect call connections in the South
African public data networks, modelling these factors to aid data network planning. The research
shows the relationship between the economic rank of each region served and the data
communication resources required for that region. Moreover, it shows the resources required
between regions.
THE THRUST of this thesis is that the volume of cans from a region can be estimated
from its economic ...k and more than 75% olthe variation in the volume of calls between regions
can be explained using the ranks of the originating and terminating regions. To prove this, records
of more than four million calls are accumulated for all regions of the South African packet
switched data network. An appropriate filtering and aggregation method is developed.
EXISTING growth models including the gravity model are separately examined. Based
on probability and dimensional arguments, the Bell System growth model is selected. It is
revealed that the success of this model depends on one premise being satisfied: this model tacitly
anti implicitly assumes that the originating and terminating calls are statistically independent.
RETURNING to the data network, it is found that the call connections (after filtering
and aggregation) display dependence of destination on origin. Reasons for the dependence are
discovered. Multiple linear regression reveals the nature of this dependence. Surprisingly,
distance is not a factor. The importance of regional ranks and an inter-regional indicator variable
are also discovered.
FINALL Y, call volume from a node is shown to be directly linked with the weighted
Gross Regional and Industrial Product of the region. This quantity, in tum, is inversely related
to the rank of the region. Call connections are then modelled to be equal to the call connections
within the first tanked region divided by the product of the originating region's rank and the
terminating region's rank. This simple and economical model explains 76% of the variations that
occur in call connections. It has proved its use by being included in the data transfer services
product-line report.Andrew Chakane 201
Initial Assessment of Potential Relationships Between Plant Communities and the Soil Microbiome in Closed Forest and Longleaf Pine Restoration Sites.
Longleaf pine is an endangered ecosystem characterized by high levels of biodiversity.
Our study took place in the Sheffield Wildlife Management Area located in the Piedmont ecoregion of Georgia in Paulding County. Fifty plots of 10 x 30 m2 were setup on south or north facing slopes, some in covered forest, and some in an area actively being restored for the longleaf pine. All trees above 1.37 m were identified and had their diameter measured, and species diversity, relative density, dominance, and frequency were determined. Herbaceous plant cover percentages were recorded in select plots. Soil samples were also collected in sterile plastic tubes in six of the above-mentioned plots, at the center and 10 m above and below the central point of each plot.
Plant species diversity was slightly higher in south facing compared to north facing slopes, and the soil microbiome suggests high levels of bacterial diversity and differences in fungal microbiome among plots. Our aim is to begin to determine potential associations between below and above-ground communities
- âŠ