3,922 research outputs found

    Entrainment and chaos in a pulse-driven Hodgkin-Huxley oscillator

    Full text link
    The Hodgkin-Huxley model describes action potential generation in certain types of neurons and is a standard model for conductance-based, excitable cells. Following the early work of Winfree and Best, this paper explores the response of a spontaneously spiking Hodgkin-Huxley neuron model to a periodic pulsatile drive. The response as a function of drive period and amplitude is systematically characterized. A wide range of qualitatively distinct responses are found, including entrainment to the input pulse train and persistent chaos. These observations are consistent with a theory of kicked oscillators developed by Qiudong Wang and Lai-Sang Young. In addition to general features predicted by Wang-Young theory, it is found that most combinations of drive period and amplitude lead to entrainment instead of chaos. This preference for entrainment over chaos is explained by the structure of the Hodgkin-Huxley phase resetting curve.Comment: Minor revisions; modified Fig. 3; added reference

    Effect of ventilation on thermal comfort in campus hostel bedrooms after sunset

    Full text link
    After sunset, the indoor of buildings would be relatively warmer as compared to that of the outdoor due to thermal was associated with the heat stored in the building structures and furniture. In tropical countries, doors and windows are usually shut after sunset in order to avoid mosquitoes. Thus, the condition of the indoor air is worsened as the hot air is trapped inside the bedroom and takes long time to be fully dissipated to the surrounding. This causes discomfort to the occupants as bedrooms where they are expecting to have a good rest to rejuvenate from hard day works. The objective of this study was to analyze the nature of air temperature profile in bedrooms of a hostel at night and the effect of ventilation systems in reducing the indoor air temperature. The study was conducted by measuring temperature of air in the bedrooms throughout a night. It was found that the exhaust fan gave the best results by reducing the air temperature by 1.5°C to 2.5°C

    Implementing Controlled Digital Lending with Google Drive and Apps Script: A Case Study at the NYU Shanghai Library

    Get PDF
    The unexpected outbreak of COVID-19 near the beginning of 2020 has significantly interrupted the daily operation of a wide range of academic institutions worldwide. As a result, libraries faced a challenge of providing their patrons access to physical collections while the campuses may remain closed. Discussions on the implementation of Controlled Digital Lending (CDL) among libraries have been trending ever since. In theory, CDL enables libraries to digitize a physical item from their collections and loan the access-restricted file to one user at a time based on the “owned to loaned” ratio in the library’s collections, for a limited time. Despite all the discussions and enthusiasm about CDL, there is, however, still a lack of technical infrastructure to support individual libraries to manage their self-hosted collections. With COVID-19 still very much a presence in our lives, many libraries are more than eager to figure out the best approach to circulating materials that only exist in print form to their users in a secure and legitimate way. This article describes the author's temporary but creative implementation of CDL amid the COVID-19 pandemic. We managed to work out a technical solution in a very short time, to lend out digital versions of library materials to users when the library is physically inaccessible to them. By collaborating with our campus IT, a Google Spreadsheet with Google Apps Scripts was developed to allow a team of Access Services Staff to do hourly loans, which is a desired function for our reserve collection. Further, when the access to a file expires, staff will be notified via email. We hope our experience can be useful for those libraries that are interested in lending their physical materials using CDL and are in urgent need for an applicable solution without a cost

    Genetic and clinical assessment of 2009 pandemic influenza in southern China

    Get PDF
    Introduction: South China has a proven role in the global epidemiology of previous influenza outbreaks due to its dual seasonal pattern. We present the virologic, genetic and clinical characterization of pandemic H1N1 influenza infection (pH1N1) in Shantou and Nanchang, cities in southern China, during the second wave of the 2009-2010 pandemic. Methodology: Nasopharyngeal swabs were collected from 165 individuals with influenza-like illness (ILI) who presented to the hospitals in Shantou and Nanchang. Laboratory diagnosis and characterization was performed by real-time PCR, virus isolation in embryonated chicken eggs, and sequencing. Results: pH1N1 activity was sustained in three different temporal patterns throughout the study period. The overall positivity rate of pH1N1 was 50% with major distribution among young adults between the ages of 13 and 30 years. High fever, cough, expectoration, chest pain, myalgia, nasal discharge and efficient viral replication were observed as major clinical markers whereas a substantial number of afebrile cases (17%) was also observed. Rate of hospitalization and disease severity (39%) and recovery (100%) were also high within the region. Furthermore, severe complications were likely to develop in young adults upon pH1N1 infection. Genetic characterization of the HA and NA genes of pH1N1 strains exhibited homogenous spread of pH1N1 strains with 99% identity with prototypic strains; however, minor unique mutations were also observed in the HA gene. Conclusion: The study illustrates the detailed characteristics of 2009 influenza pandemic in southern parts of China that might help to strategize preparedness for future pandemics and subsequent influenza seasons.</br

    A new constrained mKP hierarchy and the generalized Darboux transformation for the mKP equation with self-consistent sources

    Full text link
    The mKP equation with self-consistent sources (mKPESCS) is treated in the framework of the constrained mKP hierarchy. We introduce a new constrained mKP hierarchy which may be viewed as the stationary hierarchy of the mKP hierarchy with self-consistent sources. This offers a natural way to obtain the Lax representation for the mKPESCS. Based on the conjugate Lax pairs, we construct the generalized Darboux transformation with arbitrary functions in time tt for the mKPESCS which, in contrast with the Darboux transformation for the mKP equation, provides a non-auto-B\"{a}cklund transformation between two mKPESCSs with different degrees. The formula for nn-times repeated generalized Darboux transformation is proposed and enables us to find the rational solutions (including the lump solutions), soliton solutions and the solutions of breather type of the mKPESCS.Comment: 23 pages, no figures. to appeare in Physica

    LLM-based policy generation for intent-based management of applications

    Full text link
    Automated management requires decomposing high-level user requests, such as intents, to an abstraction that the system can understand and execute. This is challenging because even a simple intent requires performing a number of ordered steps. And the task of identifying and adapting these steps (as conditions change) requires a decomposition approach that cannot be exactly pre-defined beforehand. To tackle these challenges and support automated intent decomposition and execution, we explore the few-shot capability of Large Language Models (LLMs). We propose a pipeline that progressively decomposes intents by generating the required actions using a policy-based abstraction. This allows us to automate the policy execution by creating a closed control loop for the intent deployment. To do so, we generate and map the policies to APIs and form application management loops that perform the necessary monitoring, analysis, planning and execution. We evaluate our proposal with a use-case to fulfill and assure an application service chain of virtual network functions. Using our approach, we can generalize and generate the necessary steps to realize intents, thereby enabling intent automation for application management.Comment: This article has been accepted for publication in 2023 19th International Conference on Network and Service Management (CNSM), 3rd International Workshop on Analytics for Service and Application Management (AnServApp 2023

    Inhibitory Plasticity in a Lateral Band Improves Cortical Detection of Natural Vocalizations

    Get PDF
    SummaryThe interplay between excitation and inhibition in the auditory cortex is crucial for the processing of acoustic stimuli. However, the precise role that inhibition plays in the distributed cortical encoding of natural vocalizations has not been well studied. We recorded single units (SUs) and local field potentials (LFPs) in the awake mouse auditory cortex while presenting pup isolation calls to animals that either do (mothers) or do not (virgins) recognize the sounds as behaviorally relevant. In both groups, we observed substantial call-evoked inhibition. However, in mothers this was earlier, longer, stronger, and more stereotyped compared to virgins. This difference was most apparent for recording sites tuned to tone frequencies lower than the pup calls' high-ultrasonic frequency range. We hypothesize that this auditory cortical inhibitory plasticity improves pup call detection in a relatively specific manner by increasing the contrast between call-evoked responses arising from high-ultrasonic and lateral frequency neural populations

    Immunodomination during peripheral vaccinia virus infection

    No full text
    Immunodominance is a fundamental property of CD8+ T cell responses to viruses and vaccines. It had been observed that route of administration alters immunodominance after vaccinia virus (VACV) infection, but only a few epitopes were examined and no mechanism was provided. We re-visited this issue, examining a panel of 15 VACV epitopes and four routes, namely intradermal (i.d.), subcutaneous (s.c.), intraperitoneal (i.p.) and intravenous (i.v.) injection. We found that immunodominance is sharpened following peripheral routes of infection (i.d. and s.c.) compared with those that allow systemic virus dissemination (i.p. and i.v.). This increased immunodominance was demonstrated with native epitopes of VACV and with herpes simplex virus glycoprotein B when expressed from VACV. Responses to some subdominant epitopes were altered by as much as fourfold. Tracking of virus, examination of priming sites, and experiments restricting virus spread showed that priming of CD8+ T cells in the spleen was necessary, but not sufficient to broaden responses. Further, we directly demonstrated that immunodomination occurs more readily when priming is mainly in lymph nodes. Finally, we were able to reduce immunodominance after i.d., but not i.p. infection, using a VACV expressing the costimulators CD8+ (B7-1) and CD8+ (B7-2), which is notable because VACV-based vaccines incorporating these molecules are in clinical trials. Taken together, our data indicate that resources for CD8+ T cell priming are limiting in local draining lymph nodes, leading to greater immunodomination. Further, we provide evidence that costimulation can be a limiting factor that contributes to immunodomination. These results shed light on a possible mechanism of immunodomination and highlight the need to consider multiple epitopes across the spectrum of immunogenicities in studies aimed at understanding CD8+ T cell immunity to viruses.NHMRC (National Health and Medical Research Council of Australia
    • …
    corecore