full copy
Recently Published Documents


TOTAL DOCUMENTS

20
(FIVE YEARS 7)

H-INDEX

4
(FIVE YEARS 0)

2021 ◽  
Vol 13 (12) ◽  
pp. 310
Author(s):  
Haoli Sun ◽  
Bingfeng Pi ◽  
Jun Sun ◽  
Takeshi Miyamae ◽  
Masanobu Morinaga

Blockchain technology provides a “tamper-proof distributed ledger” for its users. Typically, to ensure the integrity and immutability of the transaction data, each node in a blockchain network retains a full copy of the ledger; however, this characteristic imposes an increasing storage burden upon each node with the accumulation of data. In this paper, an off-chain solution is introduced to relieve the storage burden of blockchain nodes while ensuring the integrity of the off-chain data. In our solution, an off-chain remote DB server stores the fully replicated data while the nodes only store the commitments of the data to verify whether the off-chain data are tampered with. To minimize the influence on performance, the nodes will store data locally at first and transfer it to the remote DB server when otherwise idle. Our solution also supports accessing all historical data for newly joined nodes through a snapshot mechanism. The solution is implemented based on the Hyperledger Fabric (HLF). Experiments show that our solution reduces the block data for blockchain nodes by 93.3% compared to the original HLF and that our advanced solution enhances the TPS by 9.6% compared to our primary solution.


2021 ◽  
Author(s):  
Konstantinos Giannakis ◽  
Joanna M Chustecki ◽  
Iain Johnston

Mitochondria in plant cells form strikingly dynamic populations of largely individual organelles. Each mitochondrion contains on average less than a full copy of the mitochondrial DNA (mtDNA) genome. Here, we asked whether mitochondrial dynamics may allow individual mitochondria to 'collect' a full copy of the mtDNA genome over time, by facilitating exchange between individuals. Akin to trade on a social network, exchange of mtDNA fragments across organelles may lead to the emergence of full 'effective' genomes in individuals over time. We characterise the collective dynamics of mitochondria in Arabidopsis thaliana hypocotyl cells using a recent approach combining single-cell timelapse microscopy, video analysis, and network science. We then use a quantitative model to predict the capacity for the sharing and accumulation of genetic information through the networks of encounters between mitochondria. We find that biological encounter networks are strikingly well predisposed to support the collection of full genomes over time, outperforming a range of other networks generated from theory and simulation. Using results from the coupon collector's problem, we show that the upper tail of the degree distribution is a key determinant of an encounter network's performance at this task and discuss how features of mitochondrial dynamics observed in biology facilitate the emergence of full effective genomes.


Author(s):  
Vincy Devi V. K ◽  
Rajesh R.

In human body genetic codes are stored in the genes. All of our inherited traits are associated with these genes and are grouped as structures generally called chromosomes. In typical cases, each cell consists of 23 pairs of chromosomes, out of which each parent contributes half. But if a person has a partial or full copy of chromosome 21, the situation is called Down syndrome. It results in intellectual disability, reading impairment, developmental delay, and other medical abnormalities. There is no specific treatment for Down syndrome. Thus, early detection and screening of this disability are the best styles for down syndrome prevention. In this work, recognition of Down syndrome utilizes a set of facial expression images. Solid geometric descriptor is employed for extracting the facial features from the image set. An AdaBoost method is practiced to gather the required data sets and for the categorization. The extracted information is then assigned and used to instruct the Neural Network using Backpropagation algorithm. This work recorded that the presented model meets the requirement with 98.67% accuracy.


2021 ◽  
pp. 026765832098804
Author(s):  
David Stringer

Westergaard (2019) presents an updated account of the Linguistic Proximity Model and the micro-cue approach to the parser as an acquisition device. The property-by-property view of transfer inherent in this approach contrasts with other influential models that assume that third language (L3) acquisition involves the creation of a full copy of only one previously existing language in the mind. In this commentary, I review Westergaard’s proposal that first language (L1), second language (L2), and L3 acquisition proceed on the basis of incremental, conservative learning and her view of the parser as the engine of the acquisition process. I then provide several arguments in support of her position that crosslinguistic influence in L n acquisition may flow from any previously acquired language.


Author(s):  
Hugo D. Lodge

The Blackstone's Guide Series delivers concise and accessible books covering the latest legislative changes and amendments. Published soon after enactment, they offer expert commentary by leading names on the scope, extent, and effects of the legislation, plus a copy of the Act itself. They offer a cost-effective solution to key information needs and are the perfect companion for any practitioner needing to get up to speed with the latest changes. Following the UK withdrawal from the European Union, the Sanctions and Anti-Money Laundering Act 2018 was enacted to enable the UK to continue to implement a regime originating in the EU. This book covers the implementation of a new system for the enforcement of sanctions, including a new mechanism for an appropriate minister to review listings of designated persons and a mechanism for review of that ministerial decision by the High Court. This guide covers the background and Parliamentary scrutiny through to enactment. It offers an approachable commentary to the statute, enabling practitioners to get to grips with the key provisions and the implications for practice. As with all Blackstone's Guides, this book will be in two parts; the first providing detailed commentary on the effects and scope of the Act and the second providing a full copy of the Act itself.


2019 ◽  
Vol 6 (1) ◽  
pp. 1-12

This article reproduces in abridged form a strategy for developing restorative justice in Ireland that emerged from a symposium held in March 2019 in Maynooth University and through subsequent consultations with participants and other interested parties. The purpose of the strategy is to help embed restorative justice and restorative practices within the Irish criminal justice system, building on existing practices and stimulating new work to fill gaps in policy and practice. The strategy initiative is part of a four-year project involving ten European jurisdictions, coordinated by Maynooth University, Restorative Justice Nederland and the European Forum for Restorative Justice. The key elements of the strategy and implementation steps are set our below; changes to the original document are limited to the omission of three appendices which provided information on the background to the project, a brief overview of the current state of play of the field in Ireland and the report of the March symposium. A full copy of the complete document can be accessed at http://www.probation.ie/EN/PB/WebPages/WP19000022


Author(s):  
Maya Semrau ◽  
Alistair Burns ◽  
Antonio Lobo ◽  
Marcel Olde Rikkert ◽  
Philippe Robert ◽  
...  

This chapter provides detailed information on the ‘Menu of care options’ that is attached to the International Schedule for the Integrated Assessment and Staging of Care for Dementia (IDEAL schedule). It provides recommended priorities for interventions (although not all possible interventions) for each of the different symptoms and severity patterns of dementia, as measured by the IDEAL schedule. The chapter includes an overview of the ‘Menu of care options’, a full copy of the ‘Menu of care options’ itself (which can be applied across countries worldwide), and five country example tables of the ‘Menu of care options’—for the Netherlands, Spain, Croatia, India, and Nigeria—illustrating the kind of interventions that may be relevant in countries with different levels of resources and experience. The chapter also includes a sub-chapter on the ‘Dementia Networking’ approach used for dementia care in the Netherlands.


MaRBLe ◽  
2016 ◽  
Vol 4 ◽  
Author(s):  
Artur Albach ◽  
Prof. Dr. Ir. Marjolein BA Van Asselt ◽  
Marisol Bock ◽  
Lukas Bühl ◽  
Laura Drott ◽  
...  
Keyword(s):  

MaRBLe ◽  
2016 ◽  
Vol 3 ◽  
Author(s):  
Matt Bucholski ◽  
Konrad Duffy ◽  
Caro Gröne ◽  
Maxime Hensels ◽  
Magdalena König ◽  
...  
Keyword(s):  

2012 ◽  
Vol 601 ◽  
pp. 318-324 ◽  
Author(s):  
Jiang Jiang Wu ◽  
Yong Cheng ◽  
Song Zhu Mei ◽  
Jiang Chun Ren ◽  
Zhi Ying Wang ◽  
...  

With the rapid development of computer networks, invasion and attack becomes more and more frequent in network environment. Therefore, insuring the information system continuously and correctly working has become an urgent problem in the information security field. And continuous data protection (CDP) supporting service recovery provides us a good idea to resolve it. In this article, we have designed and implemented a continuous data protection system supporting service recovery, which is named SSR-CDPS. The basic design idea of the SSR-CDPS architecture is dividing the whole protection process into three stages: monitoring, protecting and recovery. Meanwhile, we propose a multi versioning data backup mechanism for the protecting process and a novel file failure recovery mechanism. Especially, we transfer the full copy operation of file contents into the merely slight modification operation on the FAT table, MFT table or other similar data structures; so that we achieve the aim of greatly reducing the direct disks read and write overhead. The test toward the SSR-CDPS prototype system shows that the system can significantly improve the efficiency of data protection within limited change to the existing file system; thus, it can meet the high real-time and the continuity requirements of the information system recovery applications.


Sign in / Sign up

Export Citation Format

Share Document