681 research outputs found

    Defining the Cytoplasmic and Nuclear Transport of CPV Capsids in Cells

    Full text link
    Canine parvovirus (CPV) is a non-enveloped virus that replicates in the nucleus during infection. While it is known that it uses the cell?s microtubule network to traverse the cytoplasm, the route of nuclear entry is unclear. The nuclear pore complex was thought to be used by the virus due to the presence of nuclear localization sequences (NLS) in the VP1 protein. But recent studies in the minute virus of mice (MVM) have proposed that it induces breaks in the nuclear envelop before entering the nucleus via these breaks. In this study, Crandell Feline Kidney (CRFK) cells stably transfected with GFP-lamin A/C were micro-injected with CPV capsids whose distribution within the cells was then detected using fluorescent-labeled antibodies. The CPV capsids did not appear to induce breaks in the nuclear lamin structure of the cells that was observed for the MVM

    Service management for multi-domain Active Networks

    Get PDF
    The Internet is an example of a multi-agent system. In our context, an agent is synonymous with network operators, Internet service providers (ISPs) and content providers. ISPs mutually interact for connectivity's sake, but the fact remains that two peering agents are inevitably self-interested. Egoistic behaviour manifests itself in two ways. Firstly, the ISPs are able to act in an environment where different ISPs would have different spheres of influence, in the sense that they will have control and management responsibilities over different parts of the environment. On the other hand, contention occurs when an ISP intends to sell resources to another, which gives rise to at least two of its customers sharing (hence contending for) a common transport medium. The multi-agent interaction was analysed by simulating a game theoretic approach and the alignment of dominant strategies adopted by agents with evolving traits were abstracted. In particular, the contention for network resources is arbitrated such that a self-policing environment may emerge from a congested bottleneck. Over the past 5 years, larger ISPs have simply peddled as fast as they could to meet the growing demand for bandwidth by throwing bandwidth at congestion problems. Today, the dire financial positions of Worldcom and Global Crossing illustrate, to a certain degree, the fallacies of over-provisioning network resources. The proposed framework in this thesis enables subscribers of an ISP to monitor and police each other's traffic in order to establish a well-behaved norm in utilising limited resources. This framework can be expanded to other inter-domain bottlenecks within the Internet. One of the main objectives of this thesis is also to investigate the impact on multi-domain service management in the future Internet, where active nodes could potentially be located amongst traditional passive routers. The advent of Active Networking technology necessitates node-level computational resource allocations, in addition to prevailing resource reservation approaches for communication bandwidth. Our motivation is to ensure that a service negotiation protocol takes account of these resources so that the response to a specific service deployment request from the end-user is consistent and predictable. To promote the acceleration of service deployment by means of Active Networking technology, a pricing model is also evaluated for computational resources (e.g., CPU time and memory). Previous work in these areas of research only concentrate on bandwidth (i.e., communication) - related resources. Our pricing approach takes account of both guaranteed and best-effort service by adapting the arbitrage theorem from financial theory. The central tenet for our approach is to synthesise insights from different disciplines to address problems in data networks. The greater parts of research experience have been obtained during direct and indirect participation in the 1ST-10561 project known as FAIN (Future Active IP Networks) and ACTS-AC338 project called MIAMI (Mobile Intelligent Agent for Managing the Information Infrastructure). The Inter-domain Manager (IDM) component was integrated as an integral part of the FAIN policy-based network management systems (PBNM). Its monitoring component (developed during the MIAMI project) learns about routing changes that occur within a domain so that the management system and the managed nodes have the same topological view of the network. This enabled our reservation mechanism to reserve resources along the existing route set up by whichever underlying routing protocol is in place

    Consumption and Wealth

    Get PDF
    Two remarkable features of the Australian economy over recent years have been strong growth in private consumption expenditure and household wealth. This paper examines the relationship between consumption and wealth in an effort to better understand aggregate consumption behaviour. We find a reasonably robust steady-state relationship between non-durables consumption, labour income and aggregate household wealth for the period 1988:Q4–1999:Q3. Based upon this relationship, an increase in per capita wealth of one dollar is eventually associated with a rise in annual non-durables consumption of approximately four cents. We also find that changes in both non-financial and financial assets have significant effects on consumption. Above-trend growth of wealth in recent years has contributed significantly to growth in consumption over this time. A further noteworthy result concerns the recent demutualisations and share floats in Australia; perhaps surprisingly, we find no evidence that these events had a significant effect on consumption growth. Finally, we place our results within the broader empirical literature and examine whether they are consistent with standard economic theories of consumption.consumption; life-cycle hypothesis; wealth

    Iterative multilevel particle approximation for McKean–Vlasov SDEs

    Get PDF
    The mean field limits of systems of interacting diffusions (also called stochastic interacting particle systems (SIPS)) have been intensively studied since McKean \cite{mckean1966class}. The interacting diffusions pave a way to probabilistic representations for many important nonlinear/nonlocal PDEs, but provide a great challenge for Monte Carlo simulations. This is due to the nonlinear dependence of the bias on the statistical error arising through the approximation of the law of the process. This and the fact that particles/diffusions are not independent render classical variance reduction techniques not directly applicable and consequently make simulations of interacting diffusions prohibitive. In this article, we provide an alternative iterative particle representation, inspired by the fixed point argument by Sznitman \cite{sznitman1991topics}. This new representation has the same mean field limit as the classical SIPS. However, unlike classical SIPS, it also allows decomposing the statistical error and the approximation bias. We develop a general framework to study integrability and regularity properties of the iterated particle system. Moreover, we establish its weak convergence to the McKean-Vlasov SDEs (MVSDEs). One of the immediate advantages of iterative particle system is that it can be combined with the Multilevel Monte Carlo (MLMC) approach for the simulation of MVSDEs. We proved that the MLMC approach reduces the computational complexity of calculating expectations by an order of magnitude. Another perspective on this work is that we analyse the error of nested Multilevel Monte Carlo estimators, which is of independent interest. Furthermore, we work with state dependent functionals, unlike scalar outputs which are common in literature on MLMC. The error analysis is carried out in uniform, and what seems to be new, weighted norms

    Combining Competitive Situational Factors: N-Effect and Proximity to a Standard Effect Interaction on Competitive Behavior

    Full text link
    Honors (Bachelor's)PsychologyUniversity of Michiganhttp://deepblue.lib.umich.edu/bitstream/2027.42/98850/1/wenshiao.pd

    Context-Adaptive Deep Neural Networks via Bridge-Mode Connectivity

    Full text link
    The deployment of machine learning models in safety-critical applications comes with the expectation that such models will perform well over a range of contexts (e.g., a vision model for classifying street signs should work in rural, city, and highway settings under varying lighting/weather conditions). However, these one-size-fits-all models are typically optimized for average case performance, encouraging them to achieve high performance in nominal conditions but exposing them to unexpected behavior in challenging or rare contexts. To address this concern, we develop a new method for training context-dependent models. We extend Bridge-Mode Connectivity (BMC) (Garipov et al., 2018) to train an infinite ensemble of models over a continuous measure of context such that we can sample model parameters specifically tuned to the corresponding evaluation context. We explore the definition of context in image classification tasks through multiple lenses including changes in the risk profile, long-tail image statistics/appearance, and context-dependent distribution shift. We develop novel extensions of the BMC optimization for each of these cases and our experiments demonstrate that model performance can be successfully tuned to context in each scenario.Comment: Accepted to the NeurIPS 2022 ML Safety Worksho

    Closing the Loop for Software Remodularisation -- REARRANGE: An Effort Estimation Approach for Software Clustering-based Remodularisation

    Full text link
    Software remodularization through clustering is a common practice to improve internal software quality. However, the true benefit of software clustering is only realized if developers follow through with the recommended refactoring suggestions, which can be complex and time-consuming. Simply producing clustering results is not enough to realize the benefits of remodularization. For the recommended refactoring operations to have an impact, developers must follow through with them. However, this is often a difficult task due to certain refactoring operations' complexity and time-consuming nature.Comment: Accepted for publication at ICSE23 Poster Trac

    THE GLOBAL MIDDLE CLASS AND URBAN MODERNITY: AN INSTITUTIONALIST PERSPECTIVE ON CITY MAKING

    Get PDF
    Master'sMASTER OF SOCIAL SCIENCE

    HUBUNGAN RELIGIOSITAS DENGAN KESEJAHTERAAN SUBJEKTIF PADA REMAJA KOMUNITAS MEZBAH KELUARGA

    Get PDF
    Penelitian ini memiliki tujuan untuk mengetahui hubungan religiositas dengan kesejahteraan subjektif pada remaja komunitas Mezbah Keluarga. Hipotesis yang diajukan penelitian ini adalah adanya hubungan antara religiositas dengan kesejahteraan subjektif remaja Komunitas Mezbah Keluarga, artinya semakin tinggi tingkat religiositas maka semakin tinggi pula kesejahteraan subjektif remaja Komunitas Mezbah Keluarga, begitu pula sebaliknya. Partisipan penelitian ini adalah 80 remaja dari Komunitas Mezbah Keluarga yang dikumpulkan melalui metode snowball sampling. Penelitian ini menggunakan metode kuantitatif korelasional dengan menggunakan skala religiositas dan skala kesejahteraan subjektif yang disebar melalui google form. Hasil penelitian ini diuji menggunakan teknik uji korelasi dari Pearson dengan hasil koefisien korelasi sebesar 0,086 dan nilai signifikansi 0,446 yang menunjukkan hipotesis ditolak. Artinya, tidak ada hubungan antara religiositas dengan kesejahteraan subjektif pada Remaja Komunitas Mezbah Keluarg

    Advancing international criminal justice in southeast Asia through the regionalisation of international criminal law

    Get PDF
    Only two Association of Southeast Asian Nations (ASEAN) countries have ratified the International Criminal Court (ICC) Statute, and this number is unlikely to change dramatically in the near future. This research thus considers how international criminal justice (ICrimJ) can be advanced through the regionalisation of international criminal law (ICL), whilst also serving the interests of ASEAN Member States. The theoretical appeal, practical viability, and political acceptability of regional ICrimJ mechanisms are accordingly examined. Given that the establishment of the ICC has challenged the absolute sovereignty of States over the prosecution of international crimes, regional initiatives have added political allure as they not only better reflect local legal norms and political considerations, but also place the selection of ‘regional crimes’ and enforcement measures primarily in the hands of regional countries. In recognition of the 'ASEAN way' of making decisions, regional initiatives to further ICrimJ in Southeast Asia should be implemented gradually and driven internally through consultation and consensus. Moreover, to achieve the overarching ASEAN goal of maintaining regional peace and security, the modalities and practical effects of ICrimJ may require greater emphasis on deterrence and reconciliation, instead of punishment. The prospect and efficacy of a regional ICrimJ mechanism however also depends, inter alia, on the availability of institutional infrastructure and resources, and will understandably differ between regions. Nevertheless, some general conclusions about the value and attractiveness of a regional approach to ICrimJ can be drawn. Despite variations on what may constitute justice in different geographic areas, these generalisations are useful because they reveal the incentives and favourable conditions for efforts at the regional level. The research therefore proffers a basic framework to assess the costs and benefits of regional solutions against domestic or international methods of enforcing ICL, and determine which may best serve ICrimJ in each unique situation and circumstance
    corecore