220 research outputs found

    Genetic study of grape cultivars belonging to the muscat family by random amplified polymorphic DNA markers

    Get PDF
    Eleven decamer primers of arbitrary nucleotide sequence were used to amplify genomic DNA through the polymerase chain reaction (PCR-RAPD) in order to identify and discriminate between 14 grape cultivars (types or synonyms) belonging to the muscat family. Over 115 reproducible polymorphic fragments were generated by this method. On the basis of these fragments the degree of genetic similarity was calculated and the dendrogram of the 14 cultivars was established. The results indicate that there is genetic variation among the cultivars of the muscat family with values of the genetic similarity ranging from 0.666 to 1.00. On the basis of the observed bands it was possible to identify and discriminate between the cultivars studied except for Moschato aspro and Moscudi which were found to be identical

    Identification and discrimination of eight Greek grape cultivars (Vitis vinifera L.) by random amplified polymorphic DNA markers

    Get PDF
    Fifteen decamer primers of an arbitrary nucleotide sequence were used to amplify genomic DNA by polymerase chain reaction (PCR-RAPD) in order to identify and discriminate between 8 cultivars of Vitis vinifera L., grown at the Island of Crete. Over 140 reproducible polymorphic fragments were generated by this method. Each grape cultivar showed a unique banding pattern for more than 5 of the primers used. Herefrom, the degree of genetic similarity was calculated and the dendrogram of the 8 cultivars was constructed. The results show that RAPD is a reliable and very useful method for the identification and genomic analysis of grape cultivars

    Lessons learnt from mining meter data of residential consumers

    Get PDF
    Tracking end-users' usage patterns can enable more accurate demand forecasting and the automation of demand response execution. Accordingly, more advanced applications, such as electricity market design, integration of distributed generation and theft detection can be developed. By employing data mining techniques on smart meter recordings, the suppliers can efficiently investigate the load patterns of consumers. This paper presents applications where data mining of energy usage can derive useful information. Higher demands, on one side, and the energy price increase on the other side, have caused serious issues with regards to electricity theft, especially among developing countries. This phenomenon leads to considerable operational losses within the electrical network. In order to identify illegal residential consumers, a new method of analysing and identifying electricity consumption patterns of consumers is proposed in this paper. Moreover, the importance of data mining for analysing the consumer's usage curves was investigated. This helps to determine the behaviour of end-users for demand response purposes and improve the reliability and security of the electricity network. Clustering load profiles for large scale energy datasets are discussed in detail

    Analysis of a Probabilistic Topology-Unaware TDMA MAC Policy for Ad Hoc Networks

    Full text link

    Proučavanje seizmičkog zoniranja na području Grčke na osnovi magnitude najbolje opažljivog potresa

    Get PDF
    The Greek seismicity file developed by Makropoulos and Burton (1981) for earthquakes up to 1978 and extended up to 1983 (Makropoulos et al., 1986), is examined in terms of magnitude frequency using Gumbel’s third type asymptotic distribution of extreme values. The forecasting parameters are obtained by subdividing Greek seismicity in a cellular manner. Combination of the Gumbel III earthquake occurrence statistics for each cell with acceleration attenuation law leads to perceptibility curves which give the probability of perceiving specific acceleration levels from each earthquake magnitude up to local upper bound magnitude w. These curves show a peak probability which occurs at similar magnitudes defined as the “most perceptible” earthquake. The range of these “most perceptible” earthquake magnitudes is for an Ms of about 5.3 to 7.2. The results are presented as contouring maps for two average depths of 10 km and 20 km respectively. The features of the contoured perceptibility maps are compatible with existing hazard maps of Greece based on different approaches. This, coupled with the fact that these values may be used as a criterion for choosing engineering design time histories, shows the usefulness of the method for seismic zoning problems

    Capturing Desire: Rhetorical Strategies and the Affectivity of Discourse

    Get PDF
    In this article I argue that psychoanalytical theory can help us understand the emotional force of political rhetoric. I undertake a theoretical enquiry into the method of interpreting political speeches as strategies of affective persuasion. Both rhetorical and psychoanalytical studies converge in their concern with the production of ‘plausible stories’ that aim to fold psychic investments into political judgements. To capture desire, I claim, political rhetoric must articulate ‘symptomatic beliefs’ in relation to wider situational exigencies. I sketch three distinct psychoanalytical approaches, each of which emphasises a different scenario of unconscious organisation where rhetorical strategies are pertinent: namely Freudian, Kleinian, and Lacanian approaches. These are then applied to the example of a controversial rhetorical intervention – Enoch Powell’s infamous Birmingham speech of 1968 – to demonstrate the various potential focii when undertaking analysis

    Populist communication in the new media environment: a cross-regional comparative perspective

    Get PDF
    The changing terms of mediation place new demands, opportunities and risks on the performance of the political persona. Visibility has become a double-edged sword, leaving representatives vulnerable to exposure while new tools provide opportunities for emerging entrepreneurial actors. This double risk to elites’ mediated personas—exposure and challenge from entrepreneurs—renders their armour of authenticity dangerously fragile, which nourishes a public sense of being inefficaciously represented. It is this climate in which populism currently flourishes around the globe. Three primary criteria of mediated self-representation by politicians—visibility, authenticity and efficacy—form the focus of this paper: how do populists negotiate such demands in different democratic contexts, and wherein lies the symbiosis between populism and the new media environment suggested by the literature? To answer this, the paper compares two populist cases responding to different democratic contexts: UKIP, a right-wing party from an established democracy (UK), and the Economic Freedom Fighters (EFF), a left-wing party from a transitional democracy (South Africa). The objects of study are disruptive performances by these parties, which are considered emblematic manifestations of populist ideology as they establish a Manichaean relationship between the elite and populist actors who embody the people. The paper introduces disruption as a multi-faceted and significant analytical concept to explain the populist behaviour and strategies that underlie populist parties’ responses to the demands for visibility, authenticity and efficacy that the new media environment places upon political representatives. Using mixed methods with an interpretive focus, the paper paints a rich picture of the contexts, meanings and means of construction of populist performances
    corecore