120 research outputs found

    The Big Five Personality Traits as Predictors of Academic Maturity

    Get PDF
    Kvantni algoritmi su algoritmi koji se izvode na kvantnim računalima i pri tome koriste svojstva poput superpozicije i kvantne prožetosti. Rad sadrži analizu i primjer izvođenja Deutschovog, Shorovog i Groverovog algoritma. Uz rad je napravljena programska biblioteka koja simulira rad kvantnih algoritama te omogućuje bolji uvid u rad kvantnih algoritama.Quantum algorithms are algorithms which are executed on quantum computer while using properties such as superposition and quantum entanglement. This Master thesis contains analysis and example of execution of Deutsch's, Shor's and Grover's algorithm. Library that simualtes execution of quantum algorithms and gives better insight into quantum algorithms is implemented as part of this Master thesis

    Adjusting for Confounders with Text: Challenges and an Empirical Evaluation Framework for Causal Inference

    Full text link
    Leveraging text, such as social media posts, for causal inferences requires the use of NLP models to 'learn' and adjust for confounders, which could otherwise impart bias. However, evaluating such models is challenging, as ground truth is almost never available. We demonstrate the need for empirical evaluation frameworks for causal inference in natural language by showing that existing, commonly used models regularly disagree with one another on real world tasks. We contribute the first such framework, generalizing several challenges across these real world tasks. Using this framework, we evaluate a large set of commonly used causal inference models based on propensity scores and identify their strengths and weaknesses to inform future improvements. We make all tasks, data, and models public to inform applications and encourage additional research

    Pentimento: Data Remanence in Cloud FPGAs

    Full text link
    Cloud FPGAs strike an alluring balance between computational efficiency, energy efficiency, and cost. It is the flexibility of the FPGA architecture that enables these benefits, but that very same flexibility that exposes new security vulnerabilities. We show that a remote attacker can recover "FPGA pentimenti" - long-removed secret data belonging to a prior user of a cloud FPGA. The sensitive data constituting an FPGA pentimento is an analog imprint from bias temperature instability (BTI) effects on the underlying transistors. We demonstrate how this slight degradation can be measured using a time-to-digital (TDC) converter when an adversary programs one into the target cloud FPGA. This technique allows an attacker to ascertain previously safe information on cloud FPGAs, even after it is no longer explicitly present. Notably, it can allow an attacker who knows a non-secret "skeleton" (the physical structure, but not the contents) of the victim's design to (1) extract proprietary details from an encrypted FPGA design image available on the AWS marketplace and (2) recover data loaded at runtime by a previous user of a cloud FPGA using a known design. Our experiments show that BTI degradation (burn-in) and recovery are measurable and constitute a security threat to commercial cloud FPGAs.Comment: 17 Pages, 8 Figure

    Worth a Glance: Using Eye Movements to Investigate the Cognitive Neuroscience of Memory

    Get PDF
    Results of several investigations indicate that eye movements can reveal memory for elements of previous experience. These effects of memory on eye movement behavior can emerge very rapidly, changing the efficiency and even the nature of visual processing without appealing to verbal reports and without requiring conscious recollection. This aspect of eye movement based memory investigations is particularly useful when eye movement methods are used with special populations (e.g., young children, elderly individuals, and patients with severe amnesia), and also permits use of comparable paradigms in animals and humans, helping to bridge different memory literatures and permitting cross-species generalizations. Unique characteristics of eye movement methods have produced findings that challenge long-held views about the nature of memory, its organization in the brain, and its failures in special populations. Recently, eye movement methods have been successfully combined with neuroimaging techniques such as fMRI, single-unit recording, and magnetoencephalography, permitting more sophisticated investigations of memory. Ultimately, combined use of eye-tracking with neuropsychological and neuroimaging methods promises to provide a more comprehensive account of brain–behavior relationships and adheres to the “converging evidence” approach to cognitive neuroscience

    Eye Movements Predict Recollective Experience

    Get PDF
    Previously encountered stimuli can bring to mind a vivid memory of the episodic context in which the stimulus was first experienced ("remembered'' stimuli), or can simply seem familiar ("known'' stimuli). Past studies suggest that more attentional resources are required to encode stimuli that are subsequently remembered than known. However, it is unclear if the attentional resources are distributed differently during encoding and recognition of remembered and known stimuli. Here, we record eye movements while participants encode photos, and later while indicating whether the photos are remembered, known or new. Eye fixations were more clustered during both encoding and recognition of remembered photos relative to known photos. Thus, recognition of photos that bring to mind a vivid memory for the episodic context in which they were experienced is associated with less distributed overt attention during encoding and recognition. The results suggest that remembering is related to encoding of a few distinct details of a photo rather than the photo as a whole. In turn, during recognition remembering may be trigged by enhanced memory for the salient details of the photos

    The Dual Impact of HIV-1 Infection and Aging on NaĂŻve CD4+ T-Cells: Additive and Distinct Patterns of Impairment

    Get PDF
    HIV-1-infected adults over the age of 50 years progress to AIDS more rapidly than adults in their twenties or thirties. In addition, HIV-1-infected individuals receiving antiretroviral therapy (ART) present with clinical diseases, such as various cancers and liver disease, more commonly seen in older uninfected adults. These observations suggest that HIV-1 infection in older persons can have detrimental immunological effects that are not completely reversed by ART. As naïve T-cells are critically important in responses to neoantigens, we first analyzed two subsets (CD45RA+CD31+ and CD45RA+CD31-) within the naïve CD4+ T-cell compartment in young (20–32 years old) and older (39–58 years old), ART-naïve, HIV-1 seropositive individuals within 1–3 years of infection and in age-matched seronegative controls. HIV-1 infection in the young cohort was associated with lower absolute numbers of, and shorter telomere lengths within, both CD45RA+CD31+CD4+ and CD45RA+CD31-CD4+ T-cell subsets in comparison to age-matched seronegative controls, changes that resembled seronegative individuals who were decades older. Longitudinal analysis provided evidence of thymic emigration and reconstitution of CD45RA+CD31+CD4+ T-cells two years post-ART, but minimal reconstitution of the CD45RA+CD31-CD4+ subset, which could impair de novo immune responses. For both ART-naïve and ART-treated HIV-1-infected adults, a renewable pool of thymic emigrants is necessary to maintain CD4+ T-cell homeostasis. Overall, these results offer a partial explanation both for the faster disease progression of older adults and the observation that viral responders to ART present with clinical diseases associated with older adults

    Insights into the Musa genome: Syntenic relationships to rice and between Musa species

    Get PDF
    <p>Abstract</p> <p>Background</p> <p><it>Musa </it>species (Zingiberaceae, Zingiberales) including bananas and plantains are collectively the fourth most important crop in developing countries. Knowledge concerning <it>Musa </it>genome structure and the origin of distinct cultivars has greatly increased over the last few years. Until now, however, no large-scale analyses of <it>Musa </it>genomic sequence have been conducted. This study compares genomic sequence in two <it>Musa </it>species with orthologous regions in the rice genome.</p> <p>Results</p> <p>We produced 1.4 Mb of <it>Musa </it>sequence from 13 BAC clones, annotated and analyzed them along with 4 previously sequenced BACs. The 443 predicted genes revealed that Zingiberales genes share GC content and distribution characteristics with eudicot and Poaceae genomes. Comparison with rice revealed microsynteny regions that have persisted since the divergence of the Commelinid orders Poales and Zingiberales at least 117 Mya. The previously hypothesized large-scale duplication event in the common ancestor of major cereal lineages within the Poaceae was verified. The divergence time distributions for <it>Musa</it>-Zingiber (Zingiberaceae, Zingiberales) orthologs and paralogs provide strong evidence for a large-scale duplication event in the <it>Musa </it>lineage after its divergence from the Zingiberaceae approximately 61 Mya. Comparisons of genomic regions from <it>M. acuminata </it>and <it>M. balbisiana </it>revealed highly conserved genome structure, and indicated that these genomes diverged circa 4.6 Mya.</p> <p>Conclusion</p> <p>These results point to the utility of comparative analyses between distantly-related monocot species such as rice and <it>Musa </it>for improving our understanding of monocot genome evolution. Sequencing the genome of <it>M. acuminata </it>would provide a strong foundation for comparative genomics in the monocots. In addition a genome sequence would aid genomic and genetic analyses of cultivated <it>Musa </it>polyploid genotypes in research aimed at localizing and cloning genes controlling important agronomic traits for breeding purposes.</p
    • …
    corecore