Academic literature on the topic 'Alpha-information'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Alpha-information.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Alpha-information":

1

Pardo, M. C., and J. A. Pardo. "Statistical applications of order $\alpha$-$\beta$ weighted information energy." Applications of Mathematics 40, no. 4 (1995): 305–17. http://dx.doi.org/10.21136/am.1995.134296.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

&NA;. "Alpha-interferons: safety information updated." Reactions Weekly &NA;, no. 894 (March 2002): 3. http://dx.doi.org/10.2165/00128415-200208940-00005.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Cho, Ji-Ho, Remo Ziegler, Markus Gross, and Kwan H. Lee. "Improving alpha matte with depth information." IEICE Electronics Express 6, no. 22 (2009): 1602–7. http://dx.doi.org/10.1587/elex.6.1602.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Qian, Edward, Eric H. Sorensen, and Ronald Hua. "Information Horizon, Portfolio Turnover, and Optimal Alpha Models." Journal of Portfolio Management 34, no. 1 (October 31, 2007): 27–40. http://dx.doi.org/10.3905/jpm.2007.698030.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Noguchi, Mitsunori. "Alpha cores of games with nonatomic asymmetric information." Journal of Mathematical Economics 75 (March 2018): 1–12. http://dx.doi.org/10.1016/j.jmateco.2017.12.005.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Yao, Yanqing. "A Generalized Constraint of Privacy: $\alpha$ -Mutual Information Security." IEEE Access 7 (2019): 36122–31. http://dx.doi.org/10.1109/access.2019.2905278.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Manza, P., C. L. V. Hau, and H. C. Leung. "Alpha Power Gates Relevant Information during Working Memory Updating." Journal of Neuroscience 34, no. 17 (April 23, 2014): 5998–6002. http://dx.doi.org/10.1523/jneurosci.4641-13.2014.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Kumar, Satish. "Some more results on R-norm information measure." Tamkang Journal of Mathematics 40, no. 1 (March 31, 2009): 41–58. http://dx.doi.org/10.5556/j.tkjm.40.2009.35.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
n the present communication, I have defined the new information measure called '' $ \alpha $-R-norm information measure ''. It has been characterized using infimum oiperation in Section 2 and axiomatically in Section 3. Its properties have been studied in Section 4, joint and conditional $ \alpha $-R-norm information measure are studied in Section 5.
9

Payne, Lisa, Sylvia Guillory, and Robert Sekuler. "Attention-modulated Alpha-band Oscillations Protect against Intrusion of Irrelevant Information." Journal of Cognitive Neuroscience 25, no. 9 (September 2013): 1463–76. http://dx.doi.org/10.1162/jocn_a_00395.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Combining high-density scalp EEG recordings with a sensitive analog measure of STM's fidelity, we characterized the temporal dynamics of intentional ignoring and related those dynamics to the intrusion of task-irrelevant information. On each trial of the task, two study Gabors were briefly presented in succession. A green or red disc preceding each Gabor signified whether that Gabor should be remembered or ignored, respectively. With cue–stimulus intervals of 300, 600, or 900 msec presented in separate sessions, we found that the onset of posterior, prestimulus alpha oscillations varied with the length of the interval. Although stimulus onset time was entirely predictable, the longer the cue–stimulus interval, the earlier the increase in prestimulus alpha power. However, the alpha-band modulation was not simply locked to the cue offset. The temporal envelopes of posterior alpha-band modulation were strikingly similar for both cued attending and cued ignoring and differed only in magnitude. This similarity suggests that cued attending includes suppression of task-irrelevant, spatial processing. Supporting the view that alpha-band oscillations represent inhibition, our graded measure of recall revealed that, when the stimulus to be ignored appears second in the sequence, peristimulus alpha power predicted the degree to which that irrelevant stimulus distorted subsequent recall of the stimulus that was to be remembered. These results demonstrate that timely deployment of attention-related alpha-band oscillations can aid STM by filtering out task-irrelevant information.
10

Ichihara-Takeda, Satoe, Shogo Yazawa, Takashi Murahara, Takanobu Toyoshima, Jun Shinozaki, Masanori Ishiguro, Hideaki Shiraishi, et al. "Modulation of Alpha Activity in the Parieto-occipital Area by Distractors during a Visuospatial Working Memory Task: A Magnetoencephalographic Study." Journal of Cognitive Neuroscience 27, no. 3 (March 2015): 453–63. http://dx.doi.org/10.1162/jocn_a_00718.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Oscillatory brain activity is known to play an essential role in information processing in working memory. Recent studies have indicated that alpha activity (8–13 Hz) in the parieto-occipital area is strongly modulated in working memory tasks. However, the function of alpha activity in working memory is open to several interpretations, such that alpha activity may be a direct neural correlate of information processing in working memory or may reflect disengagement from information processing in other brain areas. To examine the functional contribution of alpha activity to visuospatial working memory, we introduced visuospatial distractors during a delay period and examined neural activity from the whole brain using magnetoencephalography. The strength of event-related alpha activity was estimated using the temporal spectral evolution (TSE) method. The results were as follows: (1) an increase of alpha activity during the delay period as indicated by elevated TSE curves was observed in parieto-occipital sensors in both the working memory task and a control task that did not require working memory; and (2) an increase of alpha activity during the delay period was not observed when distractors were presented, although TSE curves were constructed only from correct trials. These results indicate that the increase of alpha activity is not directly related to information processing in working memory but rather reflects the disengagement of attention from the visuospatial input.

Dissertations / Theses on the topic "Alpha-information":

1

Perlis, Michael Lloyd. "Alpha sleep and information processing, arousal and perception of sleep in fibromyalgia." Diss., The University of Arizona, 1994. http://hdl.handle.net/10150/186882.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
This dissertation project was designed to examine the relationship between alpha sleep and information processing during sleep in persons with fibromyalgia. The study tested the following hypotheses: (1) persons with alpha sleep are more sensitive to external stimuli during sleep than non-alpha sleepers (2) alpha sleepers are more likely to identify polysomnographically defined sleep as wakefulness than non-alpha sleepers and (3) alpha sleepers are more likely to complain of shallow and non-restorative sleep than non-alpha sleepers. To assess the extent to which subjects manifested alpha sleep, subjects were allowed to sleep undisturbed for the first 60 minutes of the study. Quantitative analyses of alpha activity during this period was performed via visual assessment, signal detection and power spectral technologies. After this period elapsed, two experimental tasks were conducted to test for information processing and memory during sleep. The first task was a test of both implicit and explicit memory for auditory stimuli presented during sleep. The second task was a test of short term memory and of subjective perception of sleep during polysomnographically defined stages of sleep. It was found that alpha activity occurring during sleep in fibromyalgic patients is not associated with increased long term memory for auditory events or the myalgia symptoms of fibromyalgia, but is associated with enhanced short term memory for stimuli presented during stage 2 sleep, the tendency to identify stage 2 sleep as wakefulness, the increased tendency to arouse in relation to auditory stimuli and the perception of shallow sleep.
2

Bruschi, David Edward. "To Alpha Centauri in a box and beyond : motion in Relativistic Quantum Information." Thesis, University of Nottingham, 2012. http://eprints.nottingham.ac.uk/12786/.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
In this work we mainly focus on two main aspects of interest within the field of Relativistic Quantum Information. We first expand on the current knowledge of the effects of relativity on entanglement between global field modes. Within this aspect, we focus on two topics: we address and revise the single mode approximation commonly used in the literature. We study the nonlocal correlations of charged bosonic field modes and the degradation of entanglement initially present in maximally entangled states as a function of acceleration, when one observer is accelerated. In the second part of this work we introduce, develop and exploit a method for confining quantum fields within one (or two) cavities and analyzing the effects of motion of one cavity on the entanglement initially present between cavity field modes. One cavity is always allowed to undergo arbitrary trajectories composed of segments of inertial motion and uniform acceleration. We investigate how entanglement is degraded, conserved and created as a function of the parameters describing the motion and we provide the analytical tools to understand how these effects occur. We conclude this work by analyzing the effects of the change of spatial topology on the nonlocal correlations present in the Hawking-Unruh radiation in the topological geon analogue of black hole spacetimes.
3

Palacios, Arnold Raul. "Role of GSK-3 alpha beta in B cell proliferation during germinal center information." Thesis, Boston University, 2013. https://hdl.handle.net/2144/21229.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Thesis (M.A.) PLEASE NOTE: Boston University Libraries did not receive an Authorization To Manage form for this thesis or dissertation. It is therefore not openly accessible, though it may be available by request. If you are the author or principal advisor of this work and would like to request open access for it, please contact us at open-help@bu.edu. Thank you.
Glycogen Synthase Kinase-3αß is an enzyme that is involved in cell cycle regulation by promoting the degradation of cyclin D1 and cycling D3 in cells. Special emphasis is placed in its regulatory role in B cells, as there it is evidence that suggests that this protein is inhibited during germinal center formation, where B cells undergo proliferation, somatic hypermutation and class switch recombination. By inducing DNA recombination via the Cre/lLxP recombination system and utilizing tamoxifen as a Cre activity inducer, B cells were culture in 40LB cells to form induced germinal center in vitro. Flow cytometry analysis suggests that in the absence of GSK-3 αß B cells proliferate extensively in germinal centers and being the process of class switch recombination. Although the results of this study are in accord with current theory, more experiments and research need to be made to validate the conclusions set forth in this study.
2031-01-01
4

Cheng, Wei. "What can information guess ? : Towards information leakage quantification in side-channel analysis." Electronic Thesis or Diss., Institut polytechnique de Paris, 2021. http://www.theses.fr/2021IPPAT044.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Les algorithmes cryptographiques jouent un rôle prédominant pour établir une connectivité sécurisée dans notre société numérique actuelle. Ces calculs traitent des informations sensibles telles que des clés de chiffrement, qui sont généralement très exposées lors de la manipulation, ce qui représente une menace énorme pour la sécurité des informations sensibles dans les composants cryptographiques et l'ensemble des systèmes connectés. Dans le domaine de la sécurité des systèmes embarqués, l'analyse des canaux auxiliaires est l'une des techniques les plus puissantes contre les implémentations cryptographiques. Le sujet principal de cette thèse concerne la sécurité mesurable des canaux auxiliaires des implémentations cryptographiques, en particulier en présence de masquage aléatoire. Globalement, cette thèse se compose de deux sujets. L'un est la quantification des fuites de la forme la plus générale de masquage équipé des codes linéaires, dit masquage à base de code ; l'autre est l'exploration de l'application de mesures d'information plus génériques dans un contexte d'analyse de canaux auxiliaires. Pour ce qui concerne le premier sujet, nous proposons un cadre théorique de codage unifié pour mesurer la fuite d'informations dans le masquage basé sur les codes. Plus précisément, notre cadre établit des connexions formelles entre les propriétés de codage et les métriques de fuite dans l'analyse des canaux auxiliaires. Ces connexions formelles nous permettent de faire avancer l'évaluation quantitative sur la façon dont les codes linéaires peuvent affecter la sécurité concrète de tous les schémas de masquage basés sur les codes. Notre formalisation est finalement vérifiée par une évaluation basée sur les attaques, où les attaques utilisent des distingueurs basés sur le maximum de vraisemblance et donc optimales. Concernant le deuxième sujet, nous proposons d'utiliser une mesure plus générale du point de vue de la théorie de l'information, à savoir l’information alpha (alpha-information) d'ordre alpha. La nouvelle mesure donne également la limite supérieure du taux de succès et la limite inférieure du nombre de mesures. Ce qui est remarquable, c'est qu'avec des choix appropriés de alpha, l'information alpha fournit des bornes très proches de la réalité; en particulier, lorsque alpha tend vers l'infini (positif), les limites seront exactes. En fait, les distingueurs basés sur le maximum de vraisemblance convergeront vers les limites. Par conséquent, nous démontrons comment les deux mondes, à savoir les mesures du point de vue de la théorie de l'information (limites) et les attaques par canaux auxiliaires basées sur le maximum de vraisemblance, sont parfaitement connectés dans l'analyse par canaux auxiliaires. En résumé, notre étude dans cette thèse fait avancer l'évaluation et la consolidation de la sécurité des canaux auxiliaires des implémentations cryptographiques. Du point de vue de la protection, nous fournissons un guide des meilleures pratiques pour l’application du masquage basé sur le code. Du point de vue de l'évaluation, l'application de l'alpha-information permet aux évaluateurs et concepteurs (développeurs) d'avoir une estimation plus précise (voire exacte) du niveau de sécurité concret des canaux auxiliaires émanant de leurs puces cryptographiques
Cryptographic algorithms are nowadays prevalent in establishing secure connectivity in our digital society. Such computations handle sensitive information like encryption keys, which are usually very exposed during manipulation, resulting in a huge threat to the security of the sensitive information concealed in cryptographic components. In the field of embedded systems security, side-channel analysis is one of the most powerful techniques against cryptographic implementations. The main subject of this thesis is the measurable side-channel security of cryptographic implementations, particularly in the presence of random masking. Overall, this thesis consists of two topics. One is the leakage quantification of the most general form of masking equipped with the linear codes, so-called code-based masking; the other one is exploration of applying more generic information measures in a context of side-channel analysis. Two topics are inherently connected to each other in assessing and enhancing the practical security of cryptographic implementations .Regarding the former, we propose a unified coding-theoretic framework for measuring the information leakage in code-based masking. Specifically, our framework builds formal connections between coding properties and leakage metrics in side-channel analysis. Those formal connections enable us to push forward the quantitative evaluation on how the linear codes can affect the concrete security of all code-based masking schemes. Moreover, relying on our framework, we consolidate code-based masking by providing the optimal linear codes in the sense of maximizing the side-channel resistance of the corresponding masking scheme. Our framework is finally verified by attack-based evaluation, where the attacks utilize maximum-likelihood based distinguishers and are therefore optimal. Regarding the latter, we present a full spectrum of application of alpha-information, a generalization of (Shannon) mutual information, for assessing side-channel security. In this thesis, we propose to utilize a more general information-theoretic measure, namely alpha-information (alpha-information) of order alpha. The new measure also gives the upper bound on success rate and the lower bound on the number of measurements. More importantly, with proper choices of alpha, alpha-information provides very tight bounds, in particular, when alpha approaches to positive infinity, the bounds will be exact. As a matter of fact, maximum-likelihood based distinguishers will converge to the bounds. Therefore, we demonstrate how the two world, information-theoretic measures (bounds) and maximum-likelihood based side-channel attacks, are seamlessly connected in side-channel analysis .In summary, our study in this thesis pushes forward the evaluation and consolidation of side-channel security of cryptographic implementations. From a protection perspective, we provide a best-practice guideline for the application of code-based masking. From an evaluation perspective, the application of alpha-information enables practical evaluators and designers to have a more accurate (or even exact) estimation of concrete side-channel security level of their cryptographic chips
5

Hedin, Stenmark Olof. "Strategy Mapping : The Intended Effects of an Investment in Information Systems - A Case Study on Alpha AB." Thesis, Internationella Handelshögskolan, Högskolan i Jönköping, IHH, Företagsekonomi, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:hj:diva-15193.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Problem Deciding where to spend the information system investment budget with respect to strategic priorities is important for companies, but it is far from every company that does it. There is no consesus in the literature on how information system investment decisions should be assessed. This case study is conducted on Alpha AB. The company consists of several departments that each require different kind of information to support, improve and facilitate their area of operation. They are in the process of deciding where to spend their investment budgets. Purpose The Purpose of this thesis is to identify the processes that will be improved by a new information system and display how it affects the overall goal of Alpha AB, using the strategy map and the balanced scorecard. This will enable decision makers to make better decisions regarding information system investments. Theoretical Framework In order to fulfill the purpose have a review of how information systems improve companies been done, furthermore have investment issues been discussed. In order to display the effects of the intended investment will the strategy map be used, the balanced scorecard will be introduced for performance measurement. Empirical Findings The empirical findings are collected from four high level employees at Alpha AB. Through unstructured and semi-structured interviews have information about the company, its goals, customers, the internal processes and their hopes for the new information system been collected. Analysis The empirical findings have been compiled on the strategy map with the intension to show the causal relationship that the intended investment will have on the company. In order to quantify the targets on which the investment is supposed to cause its effects, have the empirical findings also been compiled on to a balanced scorecard Conclusion The strategy map and the balanced scorecard display the intended effects that the investment causes. The decision makers at Alpha AB can with a holistic view follow the causal relationship from the expectations of the investment and see  which of them will be a priority to invest in.
6

Ferm, Johan. "Europa's Lyman-Alpha Shadow on Jupiter." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-285567.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Europa is one of the most interesting satellites in the solar system in the search ofextra-terrestrial life, as it harbours an interior water ocean under its icy surface. Watervapour in Europa’s atmosphere has been previously observed, suggesting water plumeeruptions from the surface. These plumes could potentially originate from the subsurfaceocean, and as such contain ocean constituents that can be examined in orbit. Twoobservations of Europa’s far-ultraviolet shadow on Jupiter were made by the HubbleSpace Telescope in 2018 and 2019. It was observed in Lyman-α (1 216 Å), a spectral lineof hydrogen. This study investigates the imaged Lyman-α shadow in search of potentialplumes at the shadow limb. Examining the shadow instead of the moon itself is a newmethod of remotely studying the Europan atmosphere. Forward modelling is applied tocreate artificial images that are compared to the observations. Any anomalies aroundthe shadow limb are then analysed and evaluated for their statistical significance. Twonoteworthy outliers are found at the limb (one on each occasion) corresponding to H2Oline of sight column densities of 3.07×1017 cm−2 and 4.72×1016 cm−2, for the 2018 and2019 observation, respectively. They are not significant however, as they lie within threestandard deviations from the expected value (< 3σ). An upper limit on what columndensity is detectable in the data is computed, yielding 6.71×1016 cm−2 (using only 2019data due to a weak signal on the 2018 occasion). A constraint on the maximum possibleH2O column density at Europa is thus provided. The new method is shown to be usefulfor the intended purpose and could potentially be applied on other icy moons.
Europa är ett av solsystemets mest intressanta objekt i jakten på utomjordiskt liv, dådet finns ett hav av vatten under månens isiga yta. Vattenånga har tidigare observeratsi Europas atmosfär, vilket kan tyda på vattenplymer som skjuts ut från ytan i kraftigautbrott. Dessa plymer kan möjligtvis ha sitt ursprung i månens inre hav, de kandärför möjliggöra en analys av havsvattnets beståndsdelar i omloppsbana. Europasultravioletta skugga på Jupiter observerades vid två tillfällen 2018 och 2019, av HubbleSpace Telescope. Observationerna gjordes i Lyman-α (1 216 Å), en spektrallinje hos väte.Denna studie undersöker den avbildade skuggan i Lyman-α för att söka efter potentiellavattenplymer vid skuggans rand. Att undersöka skuggan istället för själva månen är en nymetod för att studera Europas atmosfär genom fjärranalys. Metoden forward modellinganvänds för att skapa artificiella bilder, som jämförs med observationerna. Eventuellaavvikelser som hittas runt skuggans rand analyseras sedan och deras statistiska signifikansutvärderas. Två anmärkningsvärda avvikelser kan hittas vid randen (en vid varjeobservationstillfälle), som motsvarar H2O-kolumndensiteter på 3.07 × 1017 cm−2 och4.72 × 1016 cm−2, för 2018-observationen respektive 2019-observationen. Densiteternaär dock inte signifikanta, då de ligger inom tre standardavvikelser från deras förväntadevärden (< 3σ). Istället beräknas en övre gräns för vilken kolumndensitet som kandetekteras i datan, vilket ger 6.71 × 1016 cm−2 (där endast 2019-data används på grundav en svag signal hos 2018-observationen). Den högsta möjliga H2O-kolumndensitetenkan således begränsas. Den nya metoden visar sig vara användbar för det tänkta syftetoch kan eventuellt appliceras på andra ismånar.
7

Eng, Stefan. "Heuristisk profilbaserad optimering av instruktionscache i en online Just-In-Time kompilator." Thesis, Linköping University, Department of Computer and Information Science, 2004. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-2452.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:

This master’s thesis examines the possibility to heuristically optimise instruction cache performance in a Just-In-Time (JIT) compiler.

Programs that do not fit inside the cache all at once may suffer from cache misses as a result of frequently executed code segments competing for the same cache lines. A new heuristic algorithm LHCPA was created to place frequently executed code segments to avoid cache conflicts between them, reducing the overall cache misses and reducing the performance bottlenecks. Set-associative caches are taken into consideration and not only direct mapped caches.

In Ahead-Of-Time compilers (AOT), the problem with frequent cache misses is often avoided by using call graphs derived from profiling and more or less complex algorithms to estimate the performance for different placements approaches. This often results in heavy computation during compilation which is not accepted in a JIT compiler.

A case study is presented on an Alpha processor and an at Ericsson developed JIT Compiler. The results of the case study shows that cache performance can be improved using this technique but also that a lot of other factors influence the result of the cache performance. Such examples are whether the cache is set-associative or not; and especially the size of the cache highly influence the cache performance.

8

Jazayeri, Jahangir. "Ly-α Dayglow on Uranus : Radiative Transfer Modelling." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-292992.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Uranus is one of the least explored planets in our solar system. Event though the Uranian Ly-α emission has been a subject of study for decades, there is not a consensus on the sources contribution to the total signal. This thesis aims to analyse the contribution from scattering of the solar flux to the Uranian Ly-α dayglow by solving the radiative transfer equation in a parameter study for the atmosphere. The sources are solar Ly-α resonant scattering and Rayleigh scattering by atomic and molecular hydrogen respectively. The radiative transfer equation is solved using the Feautrier Method Program, a program written by Randall G. Gladstone. The program was adjusted to the Uranian atmosphere and modelled with different variations in parameters, including the atmospheric temperature and particle density of Ly-α scatterers and absorbers. A parameter study is performed to investigate the dependency on the Ly-α signal on these parameters. The results showed a significant Ly-α limb brightening with a maximum intensity located around 400 km outside one planetary radius as seen from the disk center. The contributions to the Ly-α dayglow from Rayleigh scattering by H2 was calculated to be 160 R whereas the contribution from resonant scattering by H was 550 R. One feature that prevents direct comparison to observed data with this thesis is that some sources that contributes to Uranus Ly-α signal are omitted in the simulations.
Uranus är en av solsystemets minst utforskade planeter. Även om dess Ly-α-strålning har undersökt, råder ännu inte konsensus kring de olika källornas bidrag till den totala Ly-α signalen. Genom att lösa ekvationen för strålningstransport i en parameterstudie ämnar examensarbetet att studera bidraget från solens två källor till Uranus Ly-α- signal. De två källorna är resonant- och Rayleigh strålningsspridning från atomärt och molekulärt väte. Ekvationen för strålningstransport beräknas av ett program som heter Feautrier Method Program, skapat av Randall G. Gladstone. Programmet har justeras till Uranus atmosfär för att kunna beräkna strålningstransport för olika atmosfärersmodeller i en parameterstudie. Parameterna som ändras är temperaturen, partikeldensiteten hos spridare och absorberare i atmosfären. Från resultaten kan parameterstudien svara på beroendet av de olika källorna till Ly-α-signalen från Uranus. Resultaten visar en tydlig ökning av ljusintensitet vid Uranus kanter med maximum runt 400 km utanför planetens radie, sett från planetens mitt. Bidraget till Ly-α-signalen från Rayleigh stålningsspridning beräknades till 160 R och från resonant strålningsspridning till 550 R. En egenskap som hindrar direkt jämförelse med resultaten från detta examensarbete och observerad data är att alla bidragande källor till Uranus Ly-α signal inte simulerats.
9

Akintola, Abayomi Rasheed. "User Adoption of Big Data Analyticsin the Public Sector." Thesis, Linnéuniversitetet, Institutionen för informatik (IK), 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-86641.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
The goal of this thesis was to investigate the factors that influence the adoption of big data analytics by public sector employees based on the adapted Unified Theory of Acceptance and Use of Technology (UTAUT) model. A mixed method of survey and interviews were used to collect data from employees of a Canadian provincial government ministry. The results show that performance expectancy and facilitating conditions have significant positive effects on the adoption intention of big data analytics, while effort expectancy has a significant negative effect on the adoption intention of big data analytics. The result shows that social influence does not have a significant effect on adoption intention. In terms of moderating variables, the results show that gender moderates the effects of effort expectancy, social influence and facilitating condition; data experience moderates the effects of performance expectancy, effort expectancy and facilitating condition; and leadership moderates the effect of social influence. The moderation effects of age on performance expectancy, effort expectancy is significant for only employees in the 40 to 49 age group while the moderation effects of age on social influence is significant for employees that are 40 years and more. Based on the results, implications for public sector organizations planning to implement big data analytics were discussed and suggestions for further research were made. This research contributes to existing studies on the user adoption of big data analytics.
10

Carlsson, Fredrik, and Joey Öhman. "AlphaZero to Alpha Hero : A pre-study on Additional Tree Sampling within Self-Play Reinforcement Learning." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-259200.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
In self-play reinforcement learning an agent plays games against itself and with the help of hindsight and retrospection improves its policy over time. Using this premise, AlphaZero famously managed to become the strongest known Go, Shogi, and Chess entity by training a deep neural network from data collected solely from self-play. AlphaZero couples this deep neural network with a Monte Carlo Tree Search algorithm that drastically improves the networks initial policy and state evaluation. When training AlphaZero relies on the final outcome of the game for the generation of training labels. By altering the learning target to instead make use of the improved state evaluation acquired after the tree search, the creation of training labels for states exclusively visited by tree search becomes possible. We propose the extension of Additional Tree Sampling that exploits the change of learning target and provide theoretical arguments and counterarguments for the validity of this approach. Further, an empirical analysis is performed on the game Connect Four, which harbors results that justifies the change in learning target. The altered learning target seems to have no negative impact on the final player strength nor on the behavior of the learning algorithm over time. Based on these positive results we encourage further research of Additional Tree Sampling in order to validify or reject the usefulness of this method.
I självspelande straffinlärning spelar en agent mot sig själv. Med hjälp av sofistikerade algoritmer och tillbakablickande kan agenten lära sig en bra policy över tid. Denna metod har gjort AlphaZero till världens starkaste spelare i Go, Shogi, och Schack genom att träna ett djupt neuralt nätverk med data samlat enbart från självspel. AlphaZero kombinerar detta djupa neurala nätverk med en Monte Carlo Tree Search-algoritm som kraftigt förstärker nätverkets evaluering av ett bräde. Originalversionen av AlphaZero genererar träningsdata med det slutgiltiga resultatet av ett spel som inlärningsmål. Genom att ändra detta inlärningsmål till resultatet av trädsöket istället, möjliggörs skapandet av träningsdata från bräden som enbart blivit upptäckta genom trädsök. Vi föreslår en utökning, Additional Tree Samling, som utnyttjar denna förändring av inlärningsmål. Detta följs av teoretiska argument för och emot denna utökning av AlphaZero. Vidare utförs en empirisk analys på spelet Fyra i Rad som styrker faktumet att modifieringen av inlärningsmål är rimligt. Det förändrade inlärningsmålet visar inga tecken på att försämra den slutgiltiga spelarens skicklighet eller inlärningsalgoritmens beteende under träning. Vi uppmuntrar, baserat på dessa positiva resultat, ytterligare forskning vad gäller Additional Tree Sampling, för att se huruvida denna metod skulle förändra AlphaZero.

Books on the topic "Alpha-information":

1

1959-, McBride Randolph Alexander, and Geological Survey (U.S.), eds. Louisiana Coastal Geographic Information System Network: Alpha version 0.1, year three final report. [Reston, Va.?]: U.S. Dept. of the Interior, U.S. Geological Survey, 1993.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Wolfram, Conrad. Wolfram/Alpha jōhō keisan soshite chi no shinjidai. Tōkyō: Monbu Kagakushō Kagaku Gijutsu Seisaku Kenkyūjo Kagaku Gijutsu Dōkō Kenkyū Sentā, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Z, Friedman Steven, and Jet Propulsion Laboratory (U.S.), eds. All Source Analysis System (ASAS): Migration from VAX to Alpha AXP computer systems. Pasadena, Calif: National Aeronautics and Space Administration, Jet Propulsion Laboratory, California Institute of Technology, 1994.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Polyakova, Anna, Tat'yana Sergeeva, and Irina Kitaeva. The continuous formation of the stochastic culture of schoolchildren in the context of the digital transformation of general education. ru: INFRA-M Academic Publishing LLC., 2022. http://dx.doi.org/10.12737/1876368.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
The material presented in the monograph shows the possibilities of continuous teaching of mathematics at school, namely, the significant potential of modern information and communication technologies, with the help of which it is possible to form elements of stochastic culture among students. Continuity in learning is considered from two positions: procedural and educational-cognitive. In addition, a distinctive feature of the book is the presentation of the digital transformation of general education as a way to overcome the "new digital divide". Methodological features of promising digital technologies (within the framework of teaching students the elements of the probabilistic and statistical line) that contribute to overcoming the "new digital divide": artificial intelligence, the Internet of Things, additive manufacturing, machine learning, blockchain, virtual and augmented reality are described. The solution of the main questions of probability theory and statistics in the 9th grade mathematics course is proposed to be carried out using a distance learning course built in the Moodle distance learning system. The content, structure and methodological features of the implementation of the stochastics course for students of grades 10-11 of a secondary school are based on the use of such tools in the educational process as an online calculator for plotting functions, the Wolfram Alpha service, Google Docs and Google Tables services, the Yaklass remote training, the Banktest website.<url>", interactive module "Galton Board", educational website "Mathematics at school". It will be interesting for students, undergraduates, postgraduates, mathematics teachers, as well as specialists improving their qualifications in the field of pedagogical education.
5

Louisiana Coastal Geographic Information System Network: Alpha version 0.1, year three final report. [Reston, Va.?]: U.S. Dept. of the Interior, U.S. Geological Survey, 1993.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Louisiana Coastal Geographic Information System Network: Alpha version 0.1, year three final report. [Reston, Va.?]: U.S. Dept. of the Interior, U.S. Geological Survey, 1993.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Seas, Andrew. Alpha Two: True near Future Cyberpunk Where Hacker, Helix Carone, Is Fed Snippets of Information Via the Virtual World, the Neural-Net, from an Android That Is Jacked-In Named Alpha Two. . Independently Published, 2019.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Williamson, Jaden. D⋃ΡΗΑSͲΟΝ: Complete Guide and Information on Duphaston, Uses, Dosage, Side Effeect and Precations. Independently Published, 2019.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

JORDAN, Grizzel GRIZZEL. Password Book: Password Book with Alphabetical Sort , Private Information Keeper , Logins and Web Addresses, Login and Private Information Keeper , So You Can Log into , Password and Email Book , What Do You Want to Be, Private Information Keeper , Alpha. Independently Published, 2021.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Pfurtscheller, Gert, and Fernando Lopes da Silva. EEG Event-Related Desynchronization and Event-Related Synchronization. Edited by Donald L. Schomer and Fernando H. Lopes da Silva. Oxford University Press, 2017. http://dx.doi.org/10.1093/med/9780190228484.003.0040.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Event-related desynchronization (ERD) reflects a decrease of oscillatory activity related to internally or externally paced events. The increase of rhythmic activity is called event-related synchronization (ERS). They represent dynamical states of thalamocortical networks associated with cortical information-processing changes. This chapter discusses differences between ERD/ERS and evoked response potentials and methodologies for quantifying ERD/ERS and selecting frequency bands. It covers the interpretation of ERD/ERS in the alpha and beta bands and theta ERS and alpha ERD in behavioral tasks. ERD/ERS in scalp and subdural recordings, in various frequency bands, is discussed. Also presented is the modulation of alpha and beta rhythms by 0.1-Hz oscillations in the resting state and phase-coupling of the latter with slow changes of prefrontal hemodynamic signals (HbO2), blood pressure oscillations, and heart rate interval variations in the resting state and in relation to behavioral motor tasks. Potential uses of ERD-based strategies in stroke patients are discussed.

Book chapters on the topic "Alpha-information":

1

Neller, Todd W. "Information-Based Alpha-Beta Search and the Homicidal Chau.eur." In Hybrid Systems: Computation and Control, 323–36. Berlin, Heidelberg: Springer Berlin Heidelberg, 2002. http://dx.doi.org/10.1007/3-540-45873-5_26.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Oelert, W. "Structure Information and Reaction Mechanism Studies in the Alpha Transfer." In Clustering Aspects of Nuclear Structure, 245–59. Dordrecht: Springer Netherlands, 1985. http://dx.doi.org/10.1007/978-94-009-5366-6_14.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Altman, Eitan, Konstantin Avrachenkov, and Andrey Garnaev. "Alpha-Fair Resource Allocation under Incomplete Information and Presence of a Jammer." In Lecture Notes in Computer Science, 219–33. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-10406-0_15.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Rioul, Olivier. "A Primer on Alpha-Information Theory with Application to Leakage in Secrecy Systems." In Lecture Notes in Computer Science, 459–67. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-80209-7_50.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Tan, Taizhe, Hailing Liu, Yinwei Zhan, and Yuzhen Jin. "Multi-modality Medical Image Registration Based on Improved I-alpha Information (SNI) with Gradient." In Artificial Intelligence and Computational Intelligence, 59–66. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-33478-8_8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Gronwald, Klaus-Dieter. "Post-Merger Situation: Alpha Beer." In Integrated Business Information Systems, 161–67. Berlin, Heidelberg: Springer Berlin Heidelberg, 2017. http://dx.doi.org/10.1007/978-3-662-53291-1_15.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Calvès, Christophe, and Maribel Fernández. "Nominal Matching and Alpha-Equivalence." In Logic, Language, Information and Computation, 111–22. Berlin, Heidelberg: Springer Berlin Heidelberg, 2008. http://dx.doi.org/10.1007/978-3-540-69937-8_11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Cavender-Bares, Jeannine, Anna K. Schweiger, Jesús N. Pinto-Ledezma, and Jose Eduardo Meireles. "Applying Remote Sensing to Biodiversity Science." In Remote Sensing of Plant Biodiversity, 13–42. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-33157-3_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
AbstractBiodiversity is organized hierarchically from individuals to populations to major lineages in the tree of life. This hierarchical structure has consequences for remote sensing of plant phenotypes and leads to the expectation that more distantly related plants will be more spectrally distinct. Applying remote sensing to understand ecological processes from biodiversity patterns builds on prior efforts that integrate functional and phylogenetic information of organisms with their environmental distributions to discern assembly processes and the rules that govern species distributions. Spectral diversity metrics critical to detecting biodiversity patterns expand on the many metrics for quantifying multiple dimensions of biodiversity—taxonomic, phylogenetic, and functional—and can be applied at local (alpha diversity) to regional (gamma diversity) scales to examine variation among communities (beta diversity). Remote-sensing technologies stand to illuminate the nature of biodiversity-ecosystem function relationships and ecosystem service trade-offs over large spatial extents and to estimate their uncertainties. Such advances will improve our capacity to manage natural resources in the Anthropocene.
9

Uohashi, Keiko. "Harmonic Maps Relative to $$\alpha $$ α -Connections." In Geometric Theory of Information, 81–96. Cham: Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-05317-2_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Figueroa-García, Juan-Carlos, Roman Neruda, and Carlos Franco. "On Truncating Fuzzy Numbers with $$\alpha $$-Levels." In Fuzzy Information Processing 2023, 258–67. Cham: Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-46778-3_24.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Alpha-information":

1

Esposito, Amedeo Roberto, Diyuan Wu, and Michael Gastpar. "On conditional Sibson's $\alpha$ -Mutual Information." In 2021 IEEE International Symposium on Information Theory (ISIT). IEEE, 2021. http://dx.doi.org/10.1109/isit45174.2021.9517944.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Liu, Changchun, Jinbao Yang, Shunbo Hu, Jason J. Gu, and Mengsun Yu. "Normalized I-Alpha-Information for Medical Image Registration." In 2007 Canadian Conference on Electrical and Computer Engineering. IEEE, 2007. http://dx.doi.org/10.1109/ccece.2007.296.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Kamimura, R., and S. Nakanishi. "Improving generalization performance by controlling /spl alpha/-information." In Proceedings of 1994 IEEE International Conference on Neural Networks (ICNN'94). IEEE, 1994. http://dx.doi.org/10.1109/icnn.1994.374232.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Mtsuyama, Y., T. Nimoto, N. Katsumata, Y. Suzuki, and S. Furukawa. "/spl alpha/-EM algorithm and /spl alpha/-ICA learning based upon extended logarithmic information measures." In Proceedings of the IEEE-INNS-ENNS International Joint Conference on Neural Networks. IJCNN 2000. Neural Computing: New Challenges and Perspectives for the New Millennium. IEEE, 2000. http://dx.doi.org/10.1109/ijcnn.2000.861329.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Ding, Ni, Mohammad Amin Zarrabian, and Parastoo Sadeghi. "$\alpha$-Information-theoretic Privacy Watchdog and Optimal Privatization Scheme." In 2021 IEEE International Symposium on Information Theory (ISIT). IEEE, 2021. http://dx.doi.org/10.1109/isit45174.2021.9518220.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Uchida, M., and J. Kurose. "An Information-Theoretic Characterization of Weighted alpha-Proportional Fairness." In 2009 Proceedings IEEE INFOCOM. IEEE, 2009. http://dx.doi.org/10.1109/infcom.2009.5062017.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Liu, Yi, Julien Béguinot, Wei Cheng, Sylvain Guilley, Loïc Masure, Olivier Rioul, and François-Xavier Standaert. "Improved Alpha-Information Bounds for Higher-Order Masked Cryptographic Implementations." In 2023 IEEE Information Theory Workshop (ITW). IEEE, 2023. http://dx.doi.org/10.1109/itw55543.2023.10161608.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Liu, Yi, Wei Cheng, Sylvain Guilley, and Olivier Rioul. "On Conditional Alpha-Information and its Application to Side-Channel Analysis." In 2021 IEEE Information Theory Workshop (ITW). IEEE, 2021. http://dx.doi.org/10.1109/itw48936.2021.9611409.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Griffiths, Benjamin J., Stephen D. Mayhew, Karen J. Mullinger, João Jorge, Ian Charest, Maria Wimber, and Simon Hanslmayr. "Alpha/beta power decreases track the fidelity of stimulus-specific information." In 2019 Conference on Cognitive Computational Neuroscience. Brentwood, Tennessee, USA: Cognitive Computational Neuroscience, 2019. http://dx.doi.org/10.32470/ccn.2019.1199-0.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Filipe, Pedro, António Preto, Panos Koukos, Alexandre Bonvin, and Irina Moreira. "Alpha-helical and beta-sheet membrane- membrane protein dimers: centralizing information." In MOL2NET 2017, International Conference on Multidisciplinary Sciences, 3rd edition. Basel, Switzerland: MDPI, 2017. http://dx.doi.org/10.3390/mol2net-03-05107.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Alpha-information":

1

Bounds, J. A. Technology information profile: Long-Range Alpha Detector (LRAD). Office of Scientific and Technical Information (OSTI), February 1995. http://dx.doi.org/10.2172/10116822.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Hlushak, Oksana M., Volodymyr V. Proshkin, and Oksana S. Lytvyn. Using the e-learning course “Analytic Geometry” in the process of training students majoring in Computer Science and Information Technology. [б. в.], September 2019. http://dx.doi.org/10.31812/123456789/3268.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
As a result of literature analysis the expediency of free access of bachelors majoring in Computer Sciences and Information Technologies to modern information educational resources, in particular, e-learning courses in the process of studying mathematical disciplines is substantiated. It was established that the e-learning course is a complex of teaching materials and educational services created for the organization of individual and group training using information and communication technologies. Based on the outlined possibilities of applying the e-learning course, as well as its didactic functions, the structure of the certified e-learning course “Analytic Geometry” based on the Moodle platform was developed and described. Features of application of cloud-oriented resources are considered: Desmos, Geogebra, Wolfram|Alpha, Sage in the study of the discipline “Analytic Geometry”. The results of the pedagogical experiment on the basis of Borys Grinchenko Kyiv University and A. S. Makarenko Sumy State Pedagogical University are presented. The experiment was conducted to verify the effectiveness of the implementation of the e-learning course “Analytic Geometry”. Using the Pearson criterion it is proved that there are significant differences in the level of mathematical preparation of experimental and control group of students. The prospect of further scientific research is outlined through the effectiveness of the use of e-learning courses for the improvement of additional professional competences of students majoring in Computer Sciences and Information Technologies (specialization “Programming”, “Internet of Things”).
3

Miller, R. E., and D. L. Smith. A compilation of information on the {sup 31}P(p,{alpha}){sup 28}Si reaction and properties of excited levels in the compound nucleus {sup 32}S. Office of Scientific and Technical Information (OSTI), November 1997. http://dx.doi.org/10.2172/578637.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Gurevitz, Michael, Michael E. Adams, Boaz Shaanan, Oren Froy, Dalia Gordon, Daewoo Lee, and Yong Zhao. Interacting Domains of Anti-Insect Scorpion Toxins and their Sodium Channel Binding Sites: Structure, Cooperative Interactions with Agrochemicals, and Application. United States Department of Agriculture, December 2001. http://dx.doi.org/10.32747/2001.7585190.bard.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Integrated pest management in modern crop protection may combine chemical and biological insecticides, particularly due to the risks to the environment and livestock arising from the massive use of non-selective chemicals. Thus, there is a need for safer alternatives, which target insects more specifically. Scorpions produce anti-insect selective polypeptide toxins that are biodegradable and non-toxic to warm-blooded animals. Therefore, integration of these substances into insect pest control strategies is of major importance. Moreover, clarification of the molecular basis of this selectivity may provide valuable information pertinent to their receptor sites and to the future design of peptidomimetic anti-insect specific substances. These toxins may also be important for reducing the current overuse of chemical insecticides if they produce a synergistic effect with conventional pesticides. Based on these considerations, our major objectives were: 1) To elucidate the three-dimensional structure and toxic-site of scorpion excitatory, "depressant, and anti-insect alpha toxins. 2) To obtain an initial view to the sodium channel recognition sites of the above toxins by generating peptide decoys through a phage display system. 3) To investigate the synergism between toxins and chemical insecticides. Our approach was to develop a suitable expression system for toxin production in a recombinant form and for elucidation of toxin bioactive sites via mutagenesis. In parallel, the mode of action and synergistic effects of scorpion insecticidal toxins with pyrethroids were studied at the sodium channel level using electrophysiological methods. Objective 1 was achieved for the alpha toxin, LqhaIT Zilberberg et al., 1996, 1997; Tugarinov et al., 1997; Froy et al., 2002), and the excitatory toxin, Bj-xtrIT (Oren et al., 1998; Froy et al., 1999; unpublished data). The bioactive surface of the depressant toxin, LqhIT2, has been clarified and a crystal of the toxin is now being analyzed (unpublished). Objective 2 was not successful thus far as no phages that recognize the toxins were obtained. We therefore initiated recently an alternative approach, which is introduction of mutations into recombinant channels and creation of channel chimeras. Objective 3 was undertaken at Riverside and the results demonstrated synergism between LqhaIT or AaIT and pyrethroids (Lee et al., 2002). Furthermore, negative cross-resistance between pyrethroids and scorpion toxins (LqhaIT and AaIT) was demonstrated at the molecular level. Although our study did not yield a product, it paves the way for future design of selective pesticides by capitalizing on the natural competence of scorpion toxins to distinguish between sodium channels of insects and vertebrates. We also show that future application of anti-insect toxins may enable to decrease the amounts of chemical pesticides due to their synergism.
5

Gurevitz, Michael, Michael E. Adams, and Boaz Shaanan. Structural Elements and Neuropharmacological Features Involved in the Insecticidal Properties of an Alpha Scorpion Neurotoxin: A Multidisciplinary Approach. United States Department of Agriculture, August 1995. http://dx.doi.org/10.32747/1995.7573061.bard.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Integrated pest management in modern crop protection requires the use of chemical or biological insecticides in many instances. Nontheless, the use non-selective chemical insecticides poses risks to the environment and livestock and consequently urgent need exists for safer alternatives, which target insects more specifically. Scorpions produce anti-insect selective polypeptide toxins that are biodegradable and not toxic to wam-blooded animals. Therefore, mobilization of these substances into insect pest targets is of major interest. Moreover, clarification of the molecular basis of this selectivity may provide valuable information pertinent to their receptor sites and to the future design of peptidomimetic anti-insect specific substances. These toxins may also be important for reducing the current overuse of chamical insecticides provided they have a synergistic effect with conventional pesticides. All of these objectives were addressed in this research. A direct approach for plant protection was the mobilization of toxins into target pests using baculoviral vectors. The other approach was to develop a suitable system enabling the elucidation of the toxin bioactive site, which would enable design of insecticidal peptidomimetics. In parallel, the mode of action and synergistic effects of scorpion insecticidal toxins, were studied at the sodium channel receptor site. All the above approaches show great promise and clearly indicate that scorpion insecticidal toxins may provide powerful means in insect pest control.

To the bibliography