Search results for "manipulation"

showing 10 items of 311 documents

A Characterization of Quintic Helices

2005

A polynomial curve of degree 5, @a, is a helix if and only if both @[email protected]^'@? and @[email protected]^'@[email protected]^''@? are polynomial functions.

PolynomialTheorem of LancreteducationComputingMilieux_LEGALASPECTSOFCOMPUTINGCharacterization (mathematics)behavioral disciplines and activitiesMathematics::Algebraic TopologyCombinatoricsMathematics - Geometric TopologyTheoryofComputation_ANALYSISOFALGORITHMSANDPROBLEMCOMPLEXITYhealth services administrationComputingMethodologies_SYMBOLICANDALGEBRAICMANIPULATIONFOS: Mathematicshealth care economics and organizationsMathematicsPhysics::Biological PhysicsQuantitative Biology::BiomoleculesDegree (graph theory)InformationSystems_INFORMATIONSYSTEMSAPPLICATIONSApplied MathematicsMathematical analysisGeometric Topology (math.GT)Pythagorean hodograph curveshumanitiesQuintic functionComputational MathematicsGeneralized polynomial helices
researchProduct

A New Set of Quartic Trivariate Polynomial Equations for Stratified Camera Self-calibration under Zero-Skew and Constant Parameters Assumptions

2012

This paper deals with the problem of self-calibrating a moving camera with constant parameters. We propose a new set of quartic trivariate polynomial equations in the unknown coordinates of the plane at infinity derived under the no-skew assumption. Our new equations allow to further enforce the constancy of the principal point across all images while retrieving the plane at infinity. Six such polynomials, four of which are independent, are obtained for each triplet of images. The proposed equations can be solved along with the so-called modulus constraints and allow to improve the performance of existing methods.

PolynomialZero skewCalibration (statistics)Mathematical analysisPrincipal point[INFO.INFO-CV]Computer Science [cs]/Computer Vision and Pattern Recognition [cs.CV]020207 software engineering02 engineering and technology[ INFO.INFO-CV ] Computer Science [cs]/Computer Vision and Pattern Recognition [cs.CV]Set (abstract data type)[INFO.INFO-CV] Computer Science [cs]/Computer Vision and Pattern Recognition [cs.CV]Plane at infinityQuartic functionComputingMethodologies_SYMBOLICANDALGEBRAICMANIPULATION0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingConstant (mathematics)ComputingMilieux_MISCELLANEOUSMathematics
researchProduct

Differential influence of two acanthocephalan parasites on the antipredator behaviour of their common intermediate host

2007

7 pages; International audience; Fish acanthocephalans can modify the antipredator behaviour of their intermediate hosts in response to cues from fish predators. However, it is still unclear whether such behavioural changes are adaptive, or are just the consequence of infection. We addressed this question through studying two acanthocephalans, Pomphorhynchus laevis and Polymorphus minutus, and their intermediate host, the amphipod Gammarus pulex. Pomphorhynchus laevis completes its cycle in a freshwater fish, whereas P. minutus exploits waterbirds as final hosts.We first assessed vulnerability of infected and uninfected gammarids to predation by bullheads, Cottus gobio. Pomphorhynchus laevi…

Pomphorynchus laevis0106 biological sciences[ SDV.MP.PAR ] Life Sciences [q-bio]/Microbiology and Parasitology/ParasitologyparasitesAcanthocephalan010603 evolutionary biology01 natural sciencesPredation03 medical and health sciencesantipredator behaviour[ SDV.EE.IEO ] Life Sciences [q-bio]/Ecology environment/Symbiosis[SDV.MP.PAR]Life Sciences [q-bio]/Microbiology and Parasitology/Parasitology14. Life underwaterEcology Evolution Behavior and SystematicsCottus030304 developmental biology0303 health sciencesbiologyEcologyCottus gobioIntermediate hostbiology.organism_classificationPolymorphushost-manipulationGammarus pulexFreshwater fishPolymorphus minutusAnimal Science and ZoologyPomphorhynchus laevisAcanthocephala[SDV.EE.IEO]Life Sciences [q-bio]/Ecology environment/SymbiosisolfactionAnimal Behaviour
researchProduct

Is the host or the parasite the most locally adapted in an amphipod–acanthocephalan relationship? A case study in a biological invasion context

2007

8 pages; International audience; Manipulative endoparasites with complex life cycles can alter their intermediate host immunity and behaviour in ways that increase survival probability within the host body cavity and enhance successful transmission to the definitive host. These parasitic manipulations are variable among and within parasite species and may result from co-evolutionary processes, in which the parasite is constrained for adaptation to the local intermediate host. Hence, arrival of a new host species in a local host population may promote local parasite maladaptation. This study tested the occurrence of local adaptation in two distantly located populations of the acanthocephalan…

Pomphorynchus laevis[ SDV.MP.PAR ] Life Sciences [q-bio]/Microbiology and Parasitology/ParasitologyMESH : Molecular Sequence DataLocal adaptationMolecular Sequence DataMESH : Host-Parasite InteractionsPopulationZoologyMESH : Behavior AnimalMESH : Hungary[ SDV.IMM.IA ] Life Sciences [q-bio]/Immunology/Adaptive immunologyAcanthocephalaHost-Parasite InteractionsBehavioural manipulationGammarus roeseliMESH : Ecosystem[ SDV.EE.IEO ] Life Sciences [q-bio]/Ecology environment/SymbiosisAnimalsAmphipodaMESH : FranceeducationEcosystemGammarus roeseliLocal adaptationHungaryeducation.field_of_studyBehavior AnimalbiologyMonophenol MonooxygenaseHost (biology)MESH : AcanthocephalaImmunityIntermediate hostMESH : Amphipodabiology.organism_classificationObligate parasiteMESH : Monophenol Monooxygenase[ SDV.BID.EVO ] Life Sciences [q-bio]/Biodiversity/Populations and Evolution [q-bio.PE]Infectious DiseasesPhenoloxidaseParasitologyPomphorhynchus laevisFranceMESH : AnimalsHost adaptationCoevolutionInternational Journal for Parasitology
researchProduct

A Perturbation Approach to Continuous-Time Portfolio Selection Under Stochastic Investment Opportunities

2013

This paper studies portfolio selection in continuous-time models with stochastic investment opportunities. We consider asset allocation problems where preferences are specified as power utility derived from terminal wealth as well as consumption-savings problems with recursive utility Epstein-Zin preferences. The paper approximates the associated dynamic programming problem by perturbing the coefficients of the stochastic dynamics. We represent the Hamilton-Jacobi-Bellman equation as a series of partial differential equations that can be solved iteratively in closed-form through computer algebra software, at any desired accuracy.

Power utilityMathematical optimizationPartial differential equationbusiness.industryMathematicsofComputing_NUMERICALANALYSISPerturbation (astronomy)Asset allocationSymbolic computationDynamic programmingSoftwareComputingMethodologies_SYMBOLICANDALGEBRAICMANIPULATIONEconomicsPortfoliobusinessSSRN Electronic Journal
researchProduct

Anxiété et manipulation parasitaire chez un invertébré aquatique : approches évolutive et mécanistique

2020

Trophically transmitted parasites induce changes in their host’s phenotype. These changes are supposed to increase transmission probability to definitive hosts through the predation of intermediate hosts. This phenomenon is known as ‘parasite manipulation’ has been hypothesized to be an adaptive trait of parasites for a long time. As manipulation involves predator-prey interactions, it is therefore necessary to understand how antipredatory behaviours are modulated by exogenous (predation pressure) and endogenous (infection, emotional state) factors. We tried to go into this phenomenon in depth, in amphipods, by responding toseveral questions : (1) what is the extent of the multidimensionali…

Predator-Prey interactionComportementInteractions prédateur-ProieAnxietyAcanthocephalaAcanthocéphale[SDE.BE] Environmental Sciences/Biodiversity and EcologyParasite manipulationManipulation parasitaireAmphipodaBehaviour[SDE.BE]Environmental Sciences/Biodiversity and EcologyAmphipodeAnxiété
researchProduct

Facebook’s Emotional Contagion Experiment as a Challenge to Research Ethics

2016

This article analyzes the ethical discussion focusing on the Facebook emotional contagion experiment published by the <em>Proceedings of the National Academy of Sciences</em> in 2014. The massive-scale experiment manipulated the News Feeds of a large amount of Facebook users and was successful in proving that emotional contagion happens also in online environments. However, the experiment caused ethical concerns within and outside academia mainly for two intertwined reasons, the first revolving around the idea of research as manipulation, and the second focusing on the problematic definition of informed consent. The article concurs with recent research that the era of social med…

PrivatsphäreFacebookresearch ethicsuser dataEmotional contagionddc:070Sociology & anthropologylcsh:Communication. Mass mediaForschungsarten der Sozialforschung0508 media and communicationsbig dataSoziale MedienInformed consentyksityisyysUtilitarianismData Protection Act 1998Sociologyta518emotionalitySozialwissenschaften Soziologiescience ethicsCommunication05 social sciencesinformed consentmethodologyMethodologie06 humanities and the artsPublic relationsWissenschaftsethiklcsh:P87-96Deontological ethicsResearch Designtutkimusetiikkaddc:300manipulaatio (psykologia)ddc:301Sociology of Science Sociology of Technology Research on Science and TechnologyWissenschaftssoziologie Wissenschaftsforschung Technikforschung TechniksoziologieSocial psychologyBig data; emotional contagion; informed consent; manipulation; research ethics; user dataCyberpsychologysocial mediasosiaalinen media050801 communication & media studiesemotional contagion0603 philosophy ethics and religionprivacyBig dataInteractive electronic Mediatietoon perustuva suostumusEmotionalitätSocial mediaDatengewinnungSocial sciences sociology anthropologyinteraktive elektronische MedienNews media journalism publishingdata protectionResearch ethicsForschungresearchComputingMilieux_THECOMPUTINGPROFESSIONbusiness.industrymetodologiaDatenschutzdata captureSoziologie AnthropologiemanipulationPublizistische Medien JournalismusVerlagswesen060301 applied ethicsbusinessMedia and Communication
researchProduct

Neural network approach to solving fuzzy nonlinear equations using Z-numbers

2020

In this article, the fuzzy property is described by means of the Z-number as the coefficients and variables of the fuzzy equations. This alteration for the fuzzy equation is appropriate for system modeling with Z-number parameters. In this article, the fuzzy equation with Z-number coefficients and variables is tended to be used as the models for the uncertain systems. The modeling issue related to the uncertain system is to obtain the Z-number coefficients and variables of the fuzzy equation. Nevertheless, it is extremely hard to get the Z-number coefficients of the fuzzy equations. In this article, in order to model the uncertain nonlinear systems, a novel structure of the multilayer neura…

Property (programming)Mathematics::General MathematicsReliability (computer networking)Structure (category theory)MathematicsofComputing_NUMERICALANALYSIS02 engineering and technologyfuzzy equationFuzzy logicArtificial IntelligenceComputingMethodologies_SYMBOLICANDALGEBRAICMANIPULATION0202 electrical engineering electronic engineering information engineeringApplied mathematics/dk/atira/pure/subjectarea/asjc/1700MathematicsArtificial neural networkZ numberApplied MathematicsComputingSystems modelingNonlinear systemComputational Theory and MathematicsControl and Systems EngineeringUncertain nonlinear systemmultilayer neural network020201 artificial intelligence & image processingComputingMethodologies_GENERAL/dk/atira/pure/core/subjects/computingInterpolationComputer Science(all)
researchProduct

Quantum Dual Adversary for Hidden Subgroups and Beyond

2019

An explicit quantum dual adversary for the S-isomorphism problem is constructed. As a consequence, this gives an alternative proof that the query complexity of the dihedral hidden subgroup problem is polynomial.

Property testingDiscrete mathematicsPolynomialComputer scienceComputingMethodologies_SYMBOLICANDALGEBRAICMANIPULATIONQuantum algorithmDUAL (cognitive architecture)Dihedral angleAdversaryHidden subgroup problemQuantum
researchProduct

Immune depression induced by acanthocephalan parasites in their intermediate crustacean host: consequences for the risk of super-infection and links …

2009

9 pages; International audience; Parasite survival in hosts mainly depends on the capacity to circumvent the host immune response. Acanthocephalan infections in gammarids are linked with decreased activity of the prophenoloxidase (ProPO) system, suggesting an active immunosuppression process. Nevertheless, experimental evidence for this hypothesis is lacking: whether these parasites affect several immune pathways is unknown and the consequences of such immune change have not been investigated. In particular, the consequences for other pathogens are not known; neither are the links with other parasite-induced manipulations of the host. Firstly, using experimental infections of Pomphorhynchus…

ProphenoloxidaseMaleImmune depression[ SDV.MP.PAR ] Life Sciences [q-bio]/Microbiology and Parasitology/ParasitologyHemocytesCyprinidaeBiology[ SDV.IMM.IA ] Life Sciences [q-bio]/Immunology/Adaptive immunologyAcanthocephalanAcanthocephalaHost-Parasite InteractionsBehavioural manipulationFish DiseasesImmune systemImmunityCrustacea[ SDV.EE.IEO ] Life Sciences [q-bio]/Ecology environment/SymbiosisParasite hostingAnimalsGammaridEnzyme PrecursorsHost (biology)Intermediate hostHaemocytebiology.organism_classificationGammarus pulexInfectious DiseasesImmunologyParasitologyPomphorhynchus laevisFemaleImmunocompetenceImmunocompetenceCatechol OxidaseInternational journal for parasitology
researchProduct