893 research outputs found

    Exercise intolerance and fatigue in chronic heart failure: is there a role for group III/IV afferent feedback?

    Get PDF
    Exercise intolerance and early fatiguability are hallmark symptoms of chronic heart failure. While the malfunction of the heart is certainly the leading cause of chronic heart failure, the patho-physiological mechanisms of exercise intolerance in these patients are more complex, multifactorial and only partially understood. Some evidence points towards a potential role of an exaggerated afferent feedback from group III/IV muscle afferents in the genesis of these symptoms. Overactivity of feedback from these muscle afferents may cause exercise intolerance with a double action: by inducing cardiovascular dysregulation, by reducing motor output and by facilitating the development of central and peripheral fatigue during exercise. Importantly, physical inactivity appears to affect the progression of the syndrome negatively, while physical training can partially counteract this condition. In the present review, the role played by group III/IV afferent feedback in cardiovascular regulation during exercise and exercise-induced muscle fatigue of healthy people and their potential role in inducing exercise intolerance in chronic heart failure patients will be summarised

    The logic of identity and copy for computational artefacts

    Get PDF
    Defining identity for entities is a longstanding logical problem in philosophy, and it has resurfaced in current investigations within the philosophy of technology. The problem has not yet been explored for the philosophy of information, and of Computer Science in particular. This paper provides a logical analysis of identity and copy for computational artefacts. Identity is here understood as the relation holding between an instance of a computational artefact and itself. By contrast, the copy relation holds between two distinct computational artefacts. We distinguish among exact, inexact and approximate copies. We use process algebra to provide suitable formal definitions of these relations, using in particular the notion of bisimulation to define identity and exact copies, and simulation for inexact and approximate copies. Equivalence is unproblematic for identical computational artefacts at each individual time and for inexact copies; we will examine to which extent the formal constraints on identity criteria discussed in the literature are satisfied by our approach. As for inexact and approximate copy, they are intended as a weakening of the identity relation in that equivalence and other constraints on identity are violated. The proposed approach also suggests a computable treatment of identity and copy checking

    WARP: A ICN architecture for social data

    Full text link
    Social network companies maintain complete visibility and ownership of the data they store. However users should be able to maintain full control over their content. For this purpose, we propose WARP, an architecture based upon Information-Centric Networking (ICN) designs, which expands the scope of the ICN architecture beyond media distribution, to provide data control in social networks. The benefit of our solution lies in the lightweight nature of the protocol and in its layered design. With WARP, data distribution and access policies are enforced on the user side. Data can still be replicated in an ICN fashion but we introduce control channels, named \textit{thread updates}, which ensures that the access to the data is always updated to the latest control policy. WARP decentralizes the social network but still offers APIs so that social network providers can build products and business models on top of WARP. Social applications run directly on the user's device and store their data on the user's \textit{butler} that takes care of encryption and distribution. Moreover, users can still rely on third parties to have high-availability without renouncing their privacy

    The Appropriateness Of Selected Inservice Education Practices As Perceived By Secondary School Educators.

    Get PDF
    The purpose of this study was to determine if differences existed between the perceptions of secondary school teachers and the perceptions of principals regarding the appropriateness of selected inservice education practices in the amelioration of specific instructional difficulties. Ancillary purposes of the investiga·tion were to determine if perceptual differences existed among teachers when they were grouped by experience, sex, and teaching assignment

    Non-Abelian orbifolds in string theory

    Get PDF
    Two dimensional conformal field theories (CFT) play a key role in String theory, in particular they provide a suitable description of dynamics of the string in a given space-time. In this thesis we study 2D conformal theories constructed through toroidal orbifold techniques and arising from superstring compactification on some singular limit of a Calabi-Yau manifold. Orbifolds are one of the main techniques used to construct new two dimensional conformal field theories from known ones. They are obtained by first projecting the CFT on the subsector inva-riant under some finite group of symmetries. In order to obtain a consistent new theory, one is then forced to introduce new sectors (twisted) whose analysis represent the most subtle part of the orbifold construction. In this thesis, we consider orbifolds of the form T 4/G, where T 4 is a four-dimensional torus and G is a finite non-abelian group of discrete symmetries which do not admit a geometric de-scription as isometries of T 4. Torus orbifolds T 4/G may be interpreted as singular limits of Calabi-Yau manifolds of complex dimension two (K3 surfaces). K3 surfaces are the simplest cases of Calabi-Yau manifolds: strings compactifications on K3 have been the background for the first microscopic description in string theory of the Bekenstein-Hawking formula for Black Hole entropy; they are also the framework for one of the most important examples of holographic duality in the AdS/CFT correspondence. Despite these results, generic K3 string models are difficult to describe explicitly: orbifolds T 4/G are some of the few examples where exact computations can be performed. The goal of the thesis is to analyze the main proprieties of orbifolds T 4/G, such as the spectrum, the currents algebra and boundary states, using CFT methods that do not rely on the geometri-cal action of the group G. These methods are then applied to provide the first explicit description of certain examples of T 4/G orbifolds where the group G is non-abelian and/or non-geometric. In particular, we performed explicitly the computation for the group G = 2.A5.ope

    Beyond the expectations: a citizens-oriented approach towards local shared services performance assessment

    Get PDF
    Since the '90s, local governments decided to establish cooperation agreements to share some of their services in a joint effort to achieve economies of scale and scope and to reduce expenses for the benefit of efficiency. Nowadays, service sharing, whether established voluntarily or forcibly, is a widespread strategy in many countries. Despite being so common, though, it generally lacks policies of control and evaluation of its effectiveness. Although new approaches to public administration management suggest focusing on a broader scope of performance (Alvesson and Sandberg 2020, Aldag, Warner and Bel 2020) and citizen's needs-based satisfaction (Dunleavy et al., 2006) rather than on the mere cost, most literature does not yet represent the complexity of the performance of shared services and cooperation agreements at the local level. One aspect of such complexity is represented by the perception of final users of shared services. Citizen satisfaction can be linked to place brand and site attachment, leading to positive citizen behaviour (Zenker and Rütter, 2014), and can throw the foundations for the co-creation of public value (Osborne et al., 2016). The research highlighted how the perceived efficiency of public services could and should be measured through citizen satisfaction, for instance, by employing questionnaires (Kushner and Siegel, 2005; Gutiérrez Rodríguez et al., 2009). Nevertheless, the research conducted so far does not, for the most part, consider users' points of view on shared services. This study aims at understanding the extent to which performance is measured in local shared services and eventually digs to explore the extent to which citizen satisfaction is taken into account as a measure of performance. By employing an inductive approach spread over two international studies and one Italian double-case study, we provide new foundations for further research in the field, new propositions and a research agenda for empirically testing the new theory that emerges from this study. For this purpose, this research is divided into three outputs. First, a critical literature review to summarise the research that has already been done internationally about performance evaluation of municipal shared services, and specifically, the methodology (where existing) for the assessment of the performance of such inter-municipal collaborations, to highlight the gap in this part of literature. The second article goes in-depth into an Italian case study of Unioni di Comuni that can be deemed "successful" since their municipalities share all the services, to understand the drivers of success and formulate a research agenda to better understand which measure of performance future research should consider for assessing the effectiveness of sharing policies. Within the framework provided by the first two studies, the third article dives into the gap that was hereby identified: the use of citizen satisfaction as a measure of the performance of local shared services. Starting from the assumption that most local services are delivered by Arm's Length Bodies, we conduct an explorative study involving local government experts from eleven countries to compile an inventory of the use of citizen satisfaction as a measure of the performance of local services

    A Novel null homozygous mutation confirms <i>CACNA2D2</i> as a gene mutated in epileptic encephalopathy

    Get PDF
    Contribution to epileptic encephalopathy (EE) of mutations in CACNA2D2, encoding α2δ-2 subunit of Voltage Dependent Calcium Channels, is unclear. To date only one CACNA2D2 mutation altering channel functionality has been identified in a single family. In the same family, a rare CELSR3 polymorphism also segregated with disease. Involvement of CACNA2D2 in EE is therefore not confirmed, while that of CELSR3 is questionable. In a patient with epilepsy, dyskinesia, cerebellar atrophy, psychomotor delay and dysmorphic features, offspring to consanguineous parents, we performed whole exome sequencing (WES) for homozygosity mapping and mutation detection. WES identified extended autozygosity on chromosome 3, containing two novel homozygous candidate mutations: c.1295delA (p.Asn432fs) in CACNA2D2 and c.G6407A (p.Gly2136Asp) in CELSR3. Gene prioritization pointed to CACNA2D2 as the most prominent candidate gene. The WES finding in CACNA2D2 resulted to be statistically significant (p = 0.032), unlike that in CELSR3. CACNA2D2 homozygous c.1295delA essentially abolished α2δ-2 expression. In summary, we identified a novel null CACNA2D2 mutation associated to a clinical phenotype strikingly similar to the Cacna2d2 null mouse model. Molecular and statistical analyses together argued in favor of a causal contribution of CACNA2D2 mutations to EE, while suggested that finding in CELSR3, although potentially damaging, is likely incidental

    Infringing software property rights : ontological, methodological, and ethical questions

    Get PDF
    This paper contributes to the computer ethics debate on software ownership protection by examining the ontological, methodological, and ethical problems related to property right infringement that should come prior to any legal discussion. The ontological problem consists in determining precisely what it is for a computer program to be a copy of another one, a largely neglected problem in computer ethics. The methodological problem is defined as the difficulty of deciding whether a given software system is a copy of another system. And the ethical problem corresponds to establishing when a copy constitutes, or does not constitute, a property right infringement. The ontological problem is solved on the logical analysis of abstract machines, and the latter are argued to be the appropriate level of abstraction for software at which the methodological and the ethical problems can be successfully addressed

    Explaining Engineered Computing Systems’ Behaviour: the Role of Abstraction and Idealization

    Get PDF
    This paper addresses the methodological problem of analysing what it is to explain observed behaviours of engineered computing systems (BECS), focusing on the crucial role that abstraction and idealization play in explanations of both correct and incorrect BECS. First, it is argued that an understanding of explanatory requests about observed miscomputations crucially involves reference to the rich background afforded by hierarchies of functional specifications. Second, many explanations concerning incorrect BECS are found to abstract away (and profitably so on account of both relevance and intelligibility of the explanans) from descriptions of physical components and processes of computing systems that one finds below the logic circuit and gate layer of functional specification hierarchies. Third, model-based explanations of both correct and incorrect BECS that are provided in the framework of formal verification methods often involve idealizations. Moreover, a distinction between restrictive and permissive idealizations is introduced and their roles in BECS explanations are analysed

    !CHAOS Final Project Report

    Get PDF
    The !CHAOS project has been devoted to the realization of a prototype of Control as a Service open platform suited for a large number of applications in science, industry and society. The Control Server concept has been introduced to give emphasis to the innovative !CHAOS architecture that is represented by a scalable and distributed cloud-like infrastructure providing the services needed for implementing distributed control and data acquisition systems. The project is based on the results of an R&D initiative promoted by INFN-LNF and INFN-Roma "Tor Vergata", aimed to the development of a new architecture for controls of large experimental infrastructures named !CHAOS (Control system based on Highly Abstracted and Open Structure). To fully profit from this new technologies the control system model has been reconsidered, thus leading to the definition of the new !CHAOS "control service" paradigm. The key features and development strategies of !CHAOS are: • scalability of performances and size • integration of all functionalities • abstraction of services, devices and data • easy and modular customization • extensive data catching for performance boost • use of high-performance internet software technologies. In 2015 the !CHAOS project, partially supported by the CNS5, concluded the activities foreseen by the "Premiale" proposal1. Two main deliverables were scheduled for 2015: firstly the release of an Alpha version in June, as conclusion of the design study of all the tasks planned in the project and the development and integration of its core functionality; secondly the release, by the end of the year, of a Beta version where all the functionalities expected have been developed, integrated, tested and qualified. All deliverables and milestones expected by "Premiale" proposal have been achieved without significant deviations. The project has been demonstrated the feasibility of building a scalable multipurpose controls services provider based on the !CHAOS framework and on the INFN e-infrastructure allowing, with unprecedented flexibility, the monitoring, control and data acquisition, storage and analysis of any sensors, devices and SoS
    • …
    corecore