WorldWideScience

Sample records for blood fluke exploitation

  1. Parasite-Associated Cancers (Blood Flukes/Liver Flukes).

    Science.gov (United States)

    Feng, Meng; Cheng, Xunjia

    2017-01-01

    Parasitic infection remains as a persistent public health problem and can be carcinogenic. Three helminth parasites, namely, Clonorchis sinensis (liver fluke) and Opisthorchis viverrini as well as Schistosoma haematobium (blood fluke), are classified as Group 1 carcinogens by the World Health Organization's International Agency for Research on Cancer (IARC Infection with liver flukes (Opisthorchis viverrini, Opisthorchis felineus and Clonorchis sinensis), World Health Organization, International Agency for Research on Cancer, 2011). Infection by these parasites is frequently asymptomatic and is thus rarely diagnosed at early exposure. Persistent infection can cause severe cancer complications. Until now, the cellular and molecular mechanisms linking fluke infections to cancer formation have yet to be defined, although many studies have focused on these mechanisms in recent years, and numerous findings were made in various aspects of parasite-associated cancers. Herein, we only introduce the fluke-induced cholangiocarcinoma (CCA) and bladder carcinoma and mainly focus on key findings in the last 5 years.

  2. Prolyl Oligopeptidase from the Blood Fluke Schistosoma mansoni: From Functional Analysis to Anti-schistosomal Inhibitors

    Czech Academy of Sciences Publication Activity Database

    Fajtová, P.; Štefanić, S.; Hradilek, M.; Dvořák, Jan; Vondrášek, J.; Jílková, A.; Ulrychová, L.; McKerrow, J.H.; Caffrey, C.R.; Mareš, M.; Horn, M.

    2015-01-01

    Roč. 9, č. 6 (2015), e0003827 ISSN 1935-2735 Institutional support: RVO:60077344 Keywords : Schistosoma mansoni * schistosomiasis * prolyl oligopeptidase * blood fluke Subject RIV: EB - Genetics ; Molecular Biology Impact factor: 3.948, year: 2015

  3. Unusual thiol-based redox metabolism of parasitic flukes.

    Science.gov (United States)

    Tripathi, Timir; Suttiprapa, Sutas; Sripa, Banchob

    2017-08-01

    Parasitic flukes are exposed to free radicals and, to a greater extent, reactive oxygen species (ROS) during their life cycle. Despite being relentlessly exposed to ROS released by activated immune cells, these parasites can survive for many years in the host. Cellular thiol-based redox metabolism plays a crucial role in parasite survival within their hosts. Evidence shows that oxidative stress and redox homeostasis maintenance are important clinical and pathobiochemical as well as effective therapeutic principles in various diseases. The characterization of redox and antioxidant enzymes is likely to yield good target candidates for novel drugs and vaccines. The absence of active catalase in fluke parasites offers great potential for the development of chemotherapeutic agents that act by perturbing the redox equilibrium of the cell. One of the redox-sensitive enzymes, thioredoxin glutathione reductase (TGR), has been accepted as a drug target against blood fluke infections, and related clinical trials are in progress. TGR is the sole enzyme responsible for Trx and GSH reduction in parasitic flukes. The availability of helminth genomes has accelerated the research on redox metabolism of flukes; however, significant achievements have yet to be attained. The present review summarizes current knowledge on the redox and antioxidant system of the parasitic flukes. Copyright © 2016 Elsevier Ireland Ltd. All rights reserved.

  4. Developmental stages of fish blood flukes, Cardicola forsteri and Cardicola opisthorchis (Trematoda: Aporocotylidae), in their polychaete intermediate hosts collected at Pacific bluefin tuna culture sites in Japan.

    Science.gov (United States)

    Ogawa, Kazuo; Shirakashi, Sho; Tani, Kazuki; Shin, Sang Phil; Ishimaru, Katsuya; Honryo, Tomoki; Sugihara, Yukitaka; Uchida, Hiro'omi

    2017-02-01

    Farming of Pacific bluefin tuna (PBT), Thunnus orientalis, is a rapidly growing industry in Japan. Aporocotylid blood flukes of the genus Cardicola comprising C. orientalis, C. opisthorchis and C. forsteri are parasites of economic importance for PBT farming. Recently, terebellid polychaetes have been identified as the intermediate hosts for all these parasites. We collected infected polychaetes, Terebella sp., the intermediate host of C. opisthorchis, from ropes and floats attached to tuna cages in Tsushima, Nagasaki Prefecture, Japan. Also, Neoamphitrite vigintipes (formerly as Amphitrite sp. sensu Shirakashi et al., 2016), the intermediate host of C. forsteri, were collected from culture cages in Kushimoto, Wakayama Prefecture, Japan. The terebellid intermediate hosts harbored the sporocysts and cercariae in their body cavity. Developmental stages of these blood flukes were molecularly identified using species specific PCR primers. In this paper, we describe the cercaria and sporocyst stages of C. opisthorchis and C. forsteri and compare their morphological characteristics among three Cardicola blood flukes infecting PBT. We also discuss phylogenetic relations of the six genera of the terebellid intermediate hosts (Artacama, Lanassa, Longicarpus, Terebella, Nicolea and Neoamphitrite) of blood flukes infecting marine fishes, based on their morphological characters. Copyright © 2016 Elsevier Ireland Ltd. All rights reserved.

  5. Prolyl Oligopeptidase from the Blood Fluke Schistosoma mansoni: From Functional Analysis to Anti-schistosomal Inhibitors

    Czech Academy of Sciences Publication Activity Database

    Fajtová, Pavla; Štefanic, S.; Hradilek, Martin; Dvořák, Jan; Vondrášek, Jiří; Jílková, Adéla; Ulrychová, Lenka; McKerrow, J. H.; Caffrey, C. R.; Mareš, Michael; Horn, Martin

    2015-01-01

    Roč. 9, č. 6 (2015), e0003827/1-e0003827/24 ISSN 1935-2735 R&D Projects: GA ČR(CZ) GAP302/11/1481; GA MŠk LO1302 Institutional support: RVO:61388963 ; RVO:68378050 Keywords : Schistosoma mansoni * schistosomiasis * prolyl oligopeptidase * blood fluke Subject RIV: CE - Biochemistry; EB - Genetics ; Molecular Biology (UMG-J) Impact factor: 3.948, year: 2015 http://journals.plos.org/plosntds/article?id=10.1371/journal.pntd.0003827

  6. Biodiversity of flukes

    Directory of Open Access Journals (Sweden)

    Dreyfuss G.

    2008-09-01

    Full Text Available As many others parasites, speciation of flukes depends on the genetic characteristics and on ploidia. Ploidia of flukes can be different in a same species. In Asia, diploid, triploid and hybrid (2n/3n populations are encountered. The comparison of morphological parameters between diploid and triploid flukes showed that they were morphologically different. Nevertheless, a genetic relationship between parthenogenetic organisms would exist regardless of their ploidia. In the Fasciola genus, the main consequence of the high level of diversity is the frequent probability of development of resistance to anthelmintics and fast adaptation to climatic changes. In the Paragonimus genus, diversity can enhance different forms of pathogenicity, can also be related to the species of intermediate hosts, and to the definitive host. The strain of flukes plays a part in the visceral localization of P. westermani adults.

  7. Liver Flukes: the Malady Neglected

    Energy Technology Data Exchange (ETDEWEB)

    Lim, Jae Hoon [Samsung Medical Center, Sungkyunkwan University School of Medicine, Seoul (Korea, Republic of)

    2011-06-15

    Liver fluke disease is a chronic parasitic inflammatory disease of the bile ducts. Infection occurs through ingestion of fluke-infested, fresh-water raw fish. The most well-known species that cause human infection are Clonorchis sinensis, Opisthorchis viverrini and Opisthorchis felineus. Adult flukes settle in the small intrahepatic bile ducts and then they live there for 20-30 years. The long-lived flukes cause long-lasting chronic inflammation of the bile ducts and this produces epithelial hyperplasia, periductal fibrosis and bile duct dilatation. The vast majority of patients are asymptomatic, but the patients with heavy infection suffer from lassitude and nonspecific abdominal complaints. The complications are stone formation, recurrent pyogenic cholangitis and cholangiocarcinoma. Approximately 35 million people are infected with liver flukes throughout the world and the exceptionally high incidence of cholangiocarcinoma in some endemic areas is closely related with a high prevalence of liver fluke infection. Considering the impact of this food-borne malady on public health and the severe possible clinical consequences, liver fluke infection should not be forgotten or neglected.

  8. Liver Flukes: the Malady Neglected

    International Nuclear Information System (INIS)

    Lim, Jae Hoon

    2011-01-01

    Liver fluke disease is a chronic parasitic inflammatory disease of the bile ducts. Infection occurs through ingestion of fluke-infested, fresh-water raw fish. The most well-known species that cause human infection are Clonorchis sinensis, Opisthorchis viverrini and Opisthorchis felineus. Adult flukes settle in the small intrahepatic bile ducts and then they live there for 20-30 years. The long-lived flukes cause long-lasting chronic inflammation of the bile ducts and this produces epithelial hyperplasia, periductal fibrosis and bile duct dilatation. The vast majority of patients are asymptomatic, but the patients with heavy infection suffer from lassitude and nonspecific abdominal complaints. The complications are stone formation, recurrent pyogenic cholangitis and cholangiocarcinoma. Approximately 35 million people are infected with liver flukes throughout the world and the exceptionally high incidence of cholangiocarcinoma in some endemic areas is closely related with a high prevalence of liver fluke infection. Considering the impact of this food-borne malady on public health and the severe possible clinical consequences, liver fluke infection should not be forgotten or neglected.

  9. MicroRNAs Are Involved in the Regulation of Ovary Development in the Pathogenic Blood Fluke Schistosoma japonicum.

    Directory of Open Access Journals (Sweden)

    Lihui Zhu

    2016-02-01

    Full Text Available Schistosomes, blood flukes, are an important global public health concern. Paired adult female schistosomes produce large numbers of eggs that are primarily responsible for the disease pathology and critical for dissemination. Consequently, understanding schistosome sexual maturation and egg production may open novel perspectives for intervening with these processes to prevent clinical symptoms and to interrupt the life-cycle of these blood-flukes. microRNAs (miRNAs are key regulators of many biological processes including development, cell proliferation, metabolism, and signal transduction. Here, we report on the identification of Schistosoma japonicum miRNAs using small RNA deep sequencing in the key stages of male-female pairing, gametogenesis, and egg production. We identified 38 miRNAs, including 10 previously unknown miRNAs. Eighteen of the miRNAs were differentially expressed between male and female schistosomes and during different stages of sexual maturation. We identified 30 potential target genes for 16 of the S. japonicum miRNAs using antibody-based pull-down assays and bioinformatic analyses. We further validated some of these target genes using either in vitro luciferase assays or in vivo miRNA suppression experiments. Notably, suppression of the female enriched miRNAs bantam and miR-31 led to morphological alteration of ovaries in female schistosomes. These findings uncover key roles for specific miRNAs in schistosome sexual maturation and egg production.

  10. MicroRNAs Are Involved in the Regulation of Ovary Development in the Pathogenic Blood Fluke Schistosoma japonicum.

    Science.gov (United States)

    Zhu, Lihui; Zhao, Jiangping; Wang, Jianbin; Hu, Chao; Peng, Jinbiao; Luo, Rong; Zhou, Chunjing; Liu, Juntao; Lin, Jiaojiao; Jin, Youxin; Davis, Richard E; Cheng, Guofeng

    2016-02-01

    Schistosomes, blood flukes, are an important global public health concern. Paired adult female schistosomes produce large numbers of eggs that are primarily responsible for the disease pathology and critical for dissemination. Consequently, understanding schistosome sexual maturation and egg production may open novel perspectives for intervening with these processes to prevent clinical symptoms and to interrupt the life-cycle of these blood-flukes. microRNAs (miRNAs) are key regulators of many biological processes including development, cell proliferation, metabolism, and signal transduction. Here, we report on the identification of Schistosoma japonicum miRNAs using small RNA deep sequencing in the key stages of male-female pairing, gametogenesis, and egg production. We identified 38 miRNAs, including 10 previously unknown miRNAs. Eighteen of the miRNAs were differentially expressed between male and female schistosomes and during different stages of sexual maturation. We identified 30 potential target genes for 16 of the S. japonicum miRNAs using antibody-based pull-down assays and bioinformatic analyses. We further validated some of these target genes using either in vitro luciferase assays or in vivo miRNA suppression experiments. Notably, suppression of the female enriched miRNAs bantam and miR-31 led to morphological alteration of ovaries in female schistosomes. These findings uncover key roles for specific miRNAs in schistosome sexual maturation and egg production.

  11. Blood flukes (Digenea: Aporocotylidae) of walking catfishes (Siluriformes: Clariidae): new genus and species from the Mekong River (Vietnam) with comments on related catfish aporocotylids.

    Science.gov (United States)

    Truong, Triet Nhat; Bullard, Stephen A

    2013-07-01

    Nomasanguinicola canthoensis gen. et sp. n. infects the branchial vessels of bighead catfish, Clarias macrocephalus Günther (Siluriformes: Clariidae), in the Mekong River near Can Tho, southern Vietnam. Nomasanguinicola differs from all other genera of fish blood flukes (Digenea: Aporocotylidae) by the combination of lacking body spines and by having an anterior sucker with two flanking columns of large denticles, an intestine comprising several short papilla-like caeca, an inverse U-shaped uterus, and an ootype located near the separate genital pores. The new species has an ootype that is posterior to the level of the female genital pore. That feature most easily differentiates it from the only other putative aporocotylid species having an anterior sucker with two flanking columns of large denticles, Plehniella dentata Paperna, 1964 and Sanguinicola clarias Imam, Marzouk, Hassan et Itman, 1984, which have an ootype that is lateral (P. dentata) or anterior (S. clarias) to the level of the female genital pore. These two species apparently lack extant type materials, infect North African catfish, Clarias gariepinus (Burchell), and herein are considered incertae sedis, but likely comprise species of Nomasanguinicola. An updated list of hosts, sites of infection and geographic localities for the six species and three genera of blood flukes that mature in catfishes is provided. The new species is the first fish blood fluke recorded from Vietnam and only the third reported from a walking catfish (Clariidae).

  12. Molecular phylogenetic identification of Fasciola flukes in Nepal.

    Science.gov (United States)

    Shoriki, Takuya; Ichikawa-Seki, Madoka; Devkota, Bhuminand; Rana, Hari B; Devkota, Shiva P; Humagain, Sudeep K; Itagaki, Tadashi

    2014-12-01

    Eighty-one Fasciola flukes collected from 8 districts in Nepal were analyzed for their species identification on the basis of their spermatogenic status and nuclear ribosomal internal transcribed spacer 1 (ITS1) and for their phylogenetic relation with Fasciola flukes from other Asian countries on the basis of the mitochondrial NADH dehydrogenase subunit 1 (nad1) gene. Sixty-one flukes (75.3%) were aspermic Fasciola sp., and 20 flukes (24.7%) were identified as Fasciola gigantica. All of the aspermic flukes displayed the Fh/Fg type in ITS1, which was predominant in aspermic Fasciola sp. from China, and most (60 flukes) displayed the Fsp-ND1-N1 haplotype in the nad1, which had an identical nucleotide sequence to the major haplotype (Fg-C2) of the aspermic flukes from China. These results suggest that aspermic Fasciola sp. was introduced into Nepal from China. Furthermore, the results of the diversity indices, neutrality indices, and median-joining network analysis with reference haplotypes from Asian countries suggest that aspermic Fasciola sp. rapidly expanded its distribution. In contrasts, F. gigantica displayed 10 nad1 haplotypes, which showed higher population diversity indices than the haplotypes of aspermic flukes, indicating that the F. gigantica population was clearly distributed in Nepal earlier than the aspermic Fasciola population. Although the F. gigantica haplotypes from Nepal formed a star-like phylogeny consisting of a main founder haplotype (Fg-ND1-N1), together with some F. gigantica haplotypes from Myanmar and Thailand, the Nepal population differed genetically from F. gigantica populations of neighboring countries as each country had distinct founder haplotype(s). Copyright © 2014 Elsevier Inc. All rights reserved.

  13. IMPORTANT: Fluke is recalling Digital Clamp Meters

    CERN Multimedia

    2013-01-01

    Fluke is voluntarily recalling four models of Digital Clamp Meters: Fluke 373, 374, 375 and 376. If you own one of these clamp meters, please stop using it and send it back to Fluke for repair even if you have not experienced problems.   Description of the problem: "The printed circuit assembly may not be properly fastened to the test lead input jack. This may result in inaccurate voltage readings, including a low or no-voltage reading on a circuit energised with a hazardous voltage, presenting a shock, electrocution or thermal burn hazard." To determine if your clamp meter is affected by this recall notice, and for more information, click here.

  14. RNAi dynamics in Juvenile Fasciola spp. Liver flukes reveals the persistence of gene silencing in vitro.

    Directory of Open Access Journals (Sweden)

    Paul McVeigh

    2014-09-01

    Full Text Available Fasciola spp. liver fluke cause pernicious disease in humans and animals. Whilst current control is unsustainable due to anthelmintic resistance, gene silencing (RNA interference, RNAi has the potential to contribute to functional validation of new therapeutic targets. The susceptibility of juvenile Fasciola hepatica to double stranded (dsRNA-induced RNAi has been reported. To exploit this we probe RNAi dynamics, penetrance and persistence with the aim of building a robust platform for reverse genetics in liver fluke. We describe development of standardised RNAi protocols for a commercially-available liver fluke strain (the US Pacific North West Wild Strain, validated via robust transcriptional silencing of seven virulence genes, with in-depth experimental optimisation of three: cathepsin L (FheCatL and B (FheCatB cysteine proteases, and a σ-class glutathione transferase (FheσGST.Robust transcriptional silencing of targets in both F. hepatica and Fasciola gigantica juveniles is achievable following exposure to long (200-320 nt dsRNAs or 27 nt short interfering (siRNAs. Although juveniles are highly RNAi-susceptible, they display slower transcript and protein knockdown dynamics than those reported previously. Knockdown was detectable following as little as 4h exposure to trigger (target-dependent and in all cases silencing persisted for ≥25 days following long dsRNA exposure. Combinatorial silencing of three targets by mixing multiple long dsRNAs was similarly efficient. Despite profound transcriptional suppression, we found a significant time-lag before the occurrence of protein suppression; FheσGST and FheCatL protein suppression were only detectable after 9 and 21 days, respectively.In spite of marked variation in knockdown dynamics, we find that a transient exposure to long dsRNA or siRNA triggers robust RNAi penetrance and persistence in liver fluke NEJs supporting the development of multiple-throughput phenotypic screens for control

  15. Random and systematic sampling error when hooking fish to monitor skin fluke (Benedenia seriolae) and gill fluke (Zeuxapta seriolae) burden in Australian farmed yellowtail kingfish (Seriola lalandi).

    Science.gov (United States)

    Fensham, J R; Bubner, E; D'Antignana, T; Landos, M; Caraguel, C G B

    2018-05-01

    The Australian farmed yellowtail kingfish (Seriola lalandi, YTK) industry monitor skin fluke (Benedenia seriolae) and gill fluke (Zeuxapta seriolae) burden by pooling the fluke count of 10 hooked YTK. The random and systematic error of this sampling strategy was evaluated to assess potential impact on treatment decisions. Fluke abundance (fluke count per fish) in a study cage (estimated 30,502 fish) was assessed five times using the current sampling protocol and its repeatability was estimated the repeatability coefficient (CR) and the coefficient of variation (CV). Individual body weight, fork length, fluke abundance, prevalence, intensity (fluke count per infested fish) and density (fluke count per Kg of fish) were compared between 100 hooked and 100 seined YTK (assumed representative of the entire population) to estimate potential selection bias. Depending on the fluke species and age category, CR (expected difference in parasite count between 2 sampling iterations) ranged from 0.78 to 114 flukes per fish. Capturing YTK by hooking increased the selection of fish of a weight and length in the lowest 5th percentile of the cage (RR = 5.75, 95% CI: 2.06-16.03, P-value = 0.0001). These lower end YTK had on average an extra 31 juveniles and 6 adults Z. seriolae per Kg of fish and an extra 3 juvenile and 0.4 adult B. seriolae per Kg of fish, compared to the rest of the cage population (P-value sampling towards the smallest and most heavily infested fish in the population, resulting in poor repeatability (more variability amongst sampled fish) and an overestimation of parasite burden in the population. In this particular commercial situation these finding supported that health management program, where the finding of an underestimation of parasite burden could provide a production impact on the study population. In instances where fish populations and parasite burdens are more homogenous, sampling error may be less severe. Sampling error when capturing fish

  16. Molecular phylogenetic analysis of Fasciola flukes from eastern India.

    Science.gov (United States)

    Hayashi, Kei; Ichikawa-Seki, Madoka; Mohanta, Uday Kumar; Singh, T Shantikumar; Shoriki, Takuya; Sugiyama, Hiromu; Itagaki, Tadashi

    2015-10-01

    Fasciola flukes from eastern India were characterized on the basis of spermatogenesis status and nuclear ITS1. Both Fasciola gigantica and aspermic Fasciola flukes were detected in Imphal, Kohima, and Gantoku districts. The sequences of mitochondrial nad1 were analyzed to infer their phylogenetical relationship with neighboring countries. The haplotypes of aspermic Fasciola flukes were identical or showed a single nucleotide substitution compared to those from populations in the neighboring countries, corroborating the previous reports that categorized them in the same lineage. However, the prevalence of aspermic Fasciola flukes in eastern India was lower than those in the neighboring countries, suggesting that they have not dispersed throughout eastern India. In contrast, F. gigantica was predominant and well diversified, and the species was thought to be distributed in the area for a longer time than the aspermic Fasciola flukes. Fasciola gigantica populations from eastern India were categorized into two distinct haplogroups A and B. The level of their genetic diversity suggests that populations belonging to haplogroup A have dispersed from the west side of the Indian subcontinent to eastern India with the artificial movement of domestic cattle, Bos indicus, whereas populations belonging to haplogroup B might have spread from Myanmar to eastern India with domestic buffaloes, Bubalus bubalis. Copyright © 2015 Elsevier Ireland Ltd. All rights reserved.

  17. Granulin Secreted by the Food-Borne Liver Fluke Opisthorchis viverrini Promotes Angiogenesis in Human Endothelial Cells

    Directory of Open Access Journals (Sweden)

    Brandon Haugen

    2018-02-01

    Full Text Available The liver fluke Opisthorchis viverrini is a food-borne, zoonotic pathogen endemic to Thailand and adjacent countries in Southeast Asia. The adult developmental stage of the O. viverrini parasite excretes and secretes numerous proteins within the biliary tract including the gall bladder. Lesions caused by the feeding activities of the liver fluke represent wounds that undergo protracted cycles of healing and re-injury during chronic infection, which can last for decades. Components of the excretory/secretory (ES complement released by the worms capably drive proliferation of bile duct epithelial cells and are implicated in establishing the oncogenic milieu that leads to bile duct cancer, cholangiocarcinoma. An ES protein, the secreted granulin-like growth factor termed Ov-GRN-1, accelerates wound resolution in mice and in vitro. To investigate angiogenesis (blood vessel development that may contribute to wound healing promoted by liver fluke granulin and, by implication, to carcinogenesis during chronic opisthorchiasis, we employed an in vitro tubule formation assay (TFA where human umbilical vein endothelial cells were grown on gelled basement matrix. Ten and 40 nM Ov-GRN-1 significantly stimulated angiogenesis as monitored by cellular proliferation and by TFA in real time. This demonstration of potent angiogenic property of Ov-GRN-1 bolsters earlier reports on the therapeutic potential for chronic non-healing wounds of diabetics, tobacco users, and the elderly and, in addition, showcases another of the hallmark of cancer characteristic of this carcinogenic liver fluke.

  18. The role of host nutrition in the pathogensis of liver fluke anaemia

    International Nuclear Information System (INIS)

    Berry, C.I.; Dargie, J.D.

    1976-01-01

    Although it is widely accepted that the course of many helminth diseases of sheep is determined by two main variables, namely the level of infection and the host's nutritional status, the importance of the latter in the pathogenesis of ovine fascioliasis remains to be determined. The results of the experiment described here demonstrate that dietary quality has no significant effect upon fluke establishment but profoundly influences the severity of the disease as evidenced by the more rapid development of anaemia and by earlier mortalities among sheep restricted to a maintenance ration (containing about 6% crude protein) compared with similarly infected animals receiving a diet commensurate with growth (13% crude protein). Concurrent measurements of blood volume and of red cell turnover using radioisotopic methods revealed that in all animals the anaemia was caused by a combination of haemodilution, intra-hepatic and biliary haemorrhage, but that the earlier and more severe disturbances in protein-restricted sheep reflected the earlier development of these changes in association with a faster rate of fluke migration, and was ultimately complicated by impaired erythropoiesis arising from iron deficiency. (author)

  19. MOLECULAR MECHANISMS THAT LEAD TO CHOLANGIOCARCINOMA, DURING CHRONIC INFECTION OF LIVER FLUKES

    Directory of Open Access Journals (Sweden)

    A. O. Bogdanov

    2015-01-01

    Full Text Available Cholangiocarcinoma is a malignant tumor, characterized by poor prognosis and a low five-year survival rate. There is a clear correlation between the incidence of opisthorchiasis and high incidence of cholangiocarcinoma in South-East Asia. Liver flukes Clonorchis sinensis and Opisthorchis viverrini are I class carcinogens. There are some endemic regions of opisthorchiasis In the Russian Federation. The most important factor that leads to carcinogenesis during liver fluke infection is chronic inflammation. This review article focuses on the communication of chronic inflammation caused by invasion of liver flukes and cholangiocarcinoma. This paper summarizes the current knowledge about the risk factors for cholangiocarcinoma, as well as knowledge about the molecular aspects of the induction of carcinogenesis by liver flukes.

  20. Molecular analysis of aspermic Fasciola flukes from Korea on the basis of the nuclear ITS1 region and mitochondrial DNA markers and comparison with Japanese aspermic Fasciola flukes.

    Science.gov (United States)

    Ichikawa, Madoka; Itagaki, Tadashi

    2012-07-01

    It has been speculated that populations of aspermic Fasciola flukes in Korea and Japan have a close phylogenetic relationship. To evaluate this, we analyzed 33 Korean aspermic Fasciola flukes on the basis of nuclear ribosomal internal transcribed spacer 1 (ITS1) and mitochondrial NADH dehydrogenase subunit 1 (nad1) and cytochrome c oxidase 1 (cox1) sequences. Fh, Fg, and Fh/Fg types were detected in the ITS1 region and displayed the fragment patterns of F. hepatica, F. gigantica, and both species, respectively by a polymerase chain reaction-restriction fragment length polymorphism (PCR-RFLP) method. Additionally, three concatenated haplotypes of nad1 and cox1(nad1/cox1) were detected, and 2 of these, Kor1/Kor1 (Fsp1/Fsp1) haplotype and Kor2a/Kor2 (Fsp2/Fsp2) haplotype, were shared by Korean and Japanese aspermic flukes. The Fst value (0.019), calculated using the concatenated sequences, indicated that Korean and Japanese aspermic Fasciola populations were genetically undifferentiated. Interestingly, a combination of the Fh/Fg type and Kor1/Kor1 haplotype was found at the highest frequency in Korean aspermic flukes, whereas the Fg type and Fsp2/Fsp2 haplotype combination was found at a conspicuously high frequency in Japanese aspermic flukes. This indicates that a founder effect caused by the introduction of infected hosts may have played a key role in the introduction of aspermic Fasciola flukes from Korea into Japan.

  1. Molecular characterization of Fasciola flukes obtained from wild sika deer and domestic cattle in Hokkaido, Japan.

    Science.gov (United States)

    Ichikawa-Seki, Madoka; Shiroma, Tomoko; Kariya, Tatsuya; Nakao, Ryo; Ohari, Yuma; Hayashi, Kei; Fukumoto, Shinya

    2017-10-01

    The number of wild sika deer (Cervus nippon yesoensis) continues to increase in Hokkaido Prefecture, Japan. The major concern for the livestock industry is the transmission of pathogens between sika deer and cattle. Fasciolosis is an important disease that can occur in both animals. The aim of this study was to examine the possible mutual transmission of this disease in Hokkaido Prefecture. A total of 105 Fasciola flukes were obtained from sika deer and 96 from domestic cattle. The Fasciola flukes in Japan are reported to possess no mature sperm. However, in this study, 14 flukes from sika deer and eight flukes from cattle contained mature sperm in their seminal vesicles. All the Fasciola flukes from the two host animals had Fh/Fg type in nuclear phosphoenolpyruvate carboxykinase (pepck) gene, with a mixed fragment pattern derived from F. hepatica and F. gigantica, which are considered to be hybrid Fasciola flukes. However, almost all the flukes had Fsp1 haplotype in NADH dehydrogenase subunit 1 (nad1) gene, indicating that their maternal lineage was F. hepatica. A new haplotype, Fsp3, was detected in one fluke obtained from cattle and differed in one nucleotide from Fsp1. Therefore, the Fasciola flukes detected in both host species had almost identical molecular characteristics. These findings suggest the mutual transmission of Fasciola flukes between sika deer and domestic cattle in Hokkaido. Copyright © 2017. Published by Elsevier B.V.

  2. Simulating the Risk of Liver Fluke Infection using a Mechanistic Hydro-epidemiological Model

    Science.gov (United States)

    Beltrame, Ludovica; Dunne, Toby; Rose, Hannah; Walker, Josephine; Morgan, Eric; Vickerman, Peter; Wagener, Thorsten

    2016-04-01

    Liver Fluke (Fasciola hepatica) is a common parasite found in livestock and responsible for considerable economic losses throughout the world. Risk of infection is strongly influenced by climatic and hydrological conditions, which characterise the host environment for parasite development and transmission. Despite on-going control efforts, increases in fluke outbreaks have been reported in recent years in the UK, and have been often attributed to climate change. Currently used fluke risk models are based on empirical relationships derived between historical climate and incidence data. However, hydro-climate conditions are becoming increasingly non-stationary due to climate change and direct anthropogenic impacts such as land use change, making empirical models unsuitable for simulating future risk. In this study we introduce a mechanistic hydro-epidemiological model for Liver Fluke, which explicitly simulates habitat suitability for disease development in space and time, representing the parasite life cycle in connection with key environmental conditions. The model is used to assess patterns of Liver Fluke risk for two catchments in the UK under current and potential future climate conditions. Comparisons are made with a widely used empirical model employing different datasets, including data from regional veterinary laboratories. Results suggest that mechanistic models can achieve adequate predictive ability and support adaptive fluke control strategies under climate change scenarios.

  3. Knowledge, attitude and practice related to liver fluke infection in northeast Thailand

    Institute of Scientific and Technical Information of China (English)

    Natthawut Kaewpitoon; Soraya J Kaewpitoon; Prasit Pengsaa; Chutigan Pilasri

    2007-01-01

    AIM:To investigate the knowledge,attitude and practice (KAP) in prevention and control of liver fluke infection in northeast Thailand.METHODS:A descriptive KAP survey pertaining to liver fluke infection was carried out in June 2005 to October 2006 using structured questionnaires. Data were collected by questionnaires consisting of general parameters,knowledge,attitude,practice,and a history of participation in the prevention and control of liver fluke infection.RESULTS:A total of 1077 persons who were interviewed and completed the questionnaires were enrolled in the study. The majority were females (69.5%) and many of them were 15-20 years of age (37.26%). The questionnaires revealed that information resources on Uver fluke infection included local public health volunteers (31.37%),public health officers (18.72%),televisions (14.38%),local heads of sub-districts (12.31%),doctors and nurses (9.18%),newspaper (5.72),internets (5.37%),and others (12.95%). Fifty-five point eleven percent of the population had a good level of liver fluke knowledge concerning the mode of disease transmission and 79.72% of the population had a good level of prevention and control knowledge with regards to defecation and consumption. The attitude and practice in liver fluke prevention and control were also at a good level with a positive awareness,participation,and satisfaction of 72.1% and 60.83% of the persons studied. However,good health behavior was found in 39.26% and 41.42% of the persons studied who had unhygienic defecation and ate raw cyprinoid's fish. Theresult also showed that 41.25% of the persons studied previously joined prevention and control campaigns.CONCLUSION:The persons studied have a high level of liver fluke knowledge and positive attitude. However,improvement is required regarding personal hygiene specifically with hygienic defecation and consumption of undercooked fish.

  4. Schistosome and liver fluke derived catechol-estrogens and helminth associated cancers

    Directory of Open Access Journals (Sweden)

    José M Correia da Costa

    2014-12-01

    Full Text Available Infection with helminth parasites remains a persistent public health problem in developing countries. Three of these pathogens, the liver flukes Clonorchis sinensis, Opisthorchis viverrini and the blood fluke Schistosoma haematobium, are of particular concern due to their classification as Group 1 carcinogens: infection with these worms is carcinogenic. Using liquid chromatography-mass spectrometry (LC-MS/MS approaches, we identified steroid hormone like (e.g. oxysterol-like, catechol estrogen quinone-like, etc. metabolites and related DNA-adducts, apparently of parasite origin, in developmental stages including eggs of S. haematobium, in urine of people with urogenital schistosomiasis, and in the adult stage of Opisthorchis viverrini. Since these kinds of sterol derivatives are metabolized to active quinones that can modify DNA, which in other contexts can lead to breast and other cancers, helminth parasite associated sterols might induce tumor-like phenotypes in the target cells susceptible to helminth parasite associated cancers, i.e. urothelial cells of the bladder in the case of urogenital schistosomiasis and the bile duct epithelia or cholangiocytes, in the case of O. viverrini and C. sinensis. Indeed we postulate that helminth induced cancers originate from parasite estrogen-host epithelial/urothelial cell chromosomal DNA adducts, and here we review recent findings that support this conjecture.

  5. The Fluke Security Project

    Science.gov (United States)

    2000-04-01

    be an extension of Utah’s nascent Quarks system, oriented to closely coupled cluster environments. However, the grant did not actually begin until... Intel x86, implemented ten virtual machine monitors and servers, including a virtual memory manager, a checkpointer, a process manager, a file server...Fluke, we developed a novel hierarchical processor scheduling frame- work called CPU inheritance scheduling [5]. This is a framework for scheduling

  6. SmCL3, a gastrodermal cysteine protease of the human blood fluke Schistosoma mansoni.

    Directory of Open Access Journals (Sweden)

    Jan Dvorák

    2009-06-01

    Full Text Available Blood flukes of the genus Schistosoma are platyhelminth parasites that infect 200 million people worldwide. Digestion of nutrients from the host bloodstream is essential for parasite development and reproduction. A network of proteolytic enzymes (proteases facilitates hydrolysis of host hemoglobin and serum proteins.We identified a new cathepsin L termed SmCL3 using PCR strategies based on S. mansoni EST sequence data. An ortholog is present in Schistosoma japonicum. SmCL3 was heterologously expressed as an active enzyme in the yeast, Pichia pastoris. Recombinant SmCL3 has a broad pH activity range against peptidyl substrates and is inhibited by Clan CA protease inhibitors. Consistent with a function in degrading host proteins, SmCL3 hydrolyzes serum albumin and hemoglobin, is localized to the adult gastrodermis, and is expressed mainly in those life stages infecting the mammalian host. The predominant form of SmCL3 in the parasite exists as a zymogen, which is unusual for proteases. This zymogen includes an unusually long prodomain with alpha helical secondary structure motifs. The striking specificity of SmCL3 for amino acids with large aromatic side chains (Trp and Tyr at the P2 substrate position, as determined with positional scanning-synthetic combinatorial library, is consistent with a molecular model that shows a large and deep S2 pocket. A sequence similarity network (SSN view clusters SmCL3 and other cathepsins L in accordance with previous large-scale phylogenetic analyses that identify six super kingdoms.SmCL3 is a gut-associated cathepsin L that may contribute to the network of proteases involved in degrading host blood proteins as nutrients. Furthermore, this enzyme exhibits some unusual sequence and biophysical features that may result in additional functions. The visualization of network inter-relationships among cathepsins L suggests that these enzymes are suitable 'marker sequences' for inclusion in future phylogenetic analyses.

  7. The draft genome of the carcinogenic human liver fluke Clonorchis sinensis

    Science.gov (United States)

    2011-01-01

    Background Clonorchis sinensis is a carcinogenic human liver fluke that is widespread in Asian countries. Increasing infection rates of this neglected tropical disease are leading to negative economic and public health consequences in affected regions. Experimental and epidemiological studies have shown a strong association between the incidence of cholangiocarcinoma and the infection rate of C. sinensis. To aid research into this organism, we have sequenced its genome. Results We combined de novo sequencing with computational techniques to provide new information about the biology of this liver fluke. The assembled genome has a total size of 516 Mb with a scaffold N50 length of 42 kb. Approximately 16,000 reliable protein-coding gene models were predicted. Genes for the complete pathways for glycolysis, the Krebs cycle and fatty acid metabolism were found, but key genes involved in fatty acid biosynthesis are missing from the genome, reflecting the parasitic lifestyle of a liver fluke that receives lipids from the bile of its host. We also identified pathogenic molecules that may contribute to liver fluke-induced hepatobiliary diseases. Large proteins such as multifunctional secreted proteases and tegumental proteins were identified as potential targets for the development of drugs and vaccines. Conclusions This study provides valuable genomic information about the human liver fluke C. sinensis and adds to our knowledge on the biology of the parasite. The draft genome will serve as a platform to develop new strategies for parasite control. PMID:22023798

  8. A case of a facultative life-cycle diversification in the fluke Pleurogenoides sp. (Lecithodendriidae, Plagiorchiida).

    Science.gov (United States)

    Hassl, Andreas R

    2010-10-01

    Numerous specimens of the native, intestinal digenean fluke Pleurogenoides sp. (Lecithodendriidae, Plagiorchiida), a genus known for the simultaneous co-existence of genuine adults and progenetic, adult-like metacercaria, were found by chance parasitizing in the oesophagus of a recently imported, tropical Bristly Bush Viper (Atheris hispida). The snake had before been force-fed with native water frogs, the assumed definitive host of these flukes. Hence water frogs act as the second intermediate host or as a paratenic host for Pleurogenoides flukes, as they must house progenetic fluke larvae, which develop to genuine adults when transmitted to an appropriate consecutive host, the ancestral definitive host, a reptile. The European Pleurogenoides fluke species seem to display a facultative life-cycle diversification, they can adjust their life-history strategy according to their immediate transmission opportunities. This phenotypic plasticity allows the parasite to respond quickly to any changes in the abundance of a host; usually this biological oddity results in a life-cycle truncation by the elimination of the definitive host.

  9. Potential role of hares in the spread of liver fluke in the Netherlands

    NARCIS (Netherlands)

    Walker, S.M.; Johnston, C.; Hoey, E.M.; Fairweather, I.; Borgsteede, F.H.M.; Gaasenbeek, C.P.H.; Prodohl, P.A.; Trudgett, A.

    2011-01-01

    Hares (Lepus europeanus) sharing pasture with cattle from six locations in the Netherlands were examined for the presence of liver fluke (Fasciola hepatica) and shown to have prevalences of infection ranging from 0 to 41%. The mitochondrial haplotypes of liver flukes present in the hare populations

  10. The role of evolutionary biology in research and control of liver flukes in Southeast Asia.

    Science.gov (United States)

    Echaubard, Pierre; Sripa, Banchob; Mallory, Frank F; Wilcox, Bruce A

    2016-09-01

    Stimulated largely by the availability of new technology, biomedical research at the molecular-level and chemical-based control approaches arguably dominate the field of infectious diseases. Along with this, the proximate view of disease etiology predominates to the exclusion of the ultimate, evolutionary biology-based, causation perspective. Yet, historically and up to today, research in evolutionary biology has provided much of the foundation for understanding the mechanisms underlying disease transmission dynamics, virulence, and the design of effective integrated control strategies. Here we review the state of knowledge regarding the biology of Asian liver Fluke-host relationship, parasitology, phylodynamics, drug-based interventions and liver Fluke-related cancer etiology from an evolutionary biology perspective. We consider how evolutionary principles, mechanisms and research methods could help refine our understanding of clinical disease associated with infection by Liver Flukes as well as their transmission dynamics. We identify a series of questions for an evolutionary biology research agenda for the liver Fluke that should contribute to an increased understanding of liver Fluke-associated diseases. Finally, we describe an integrative evolutionary medicine approach to liver Fluke prevention and control highlighting the need to better contextualize interventions within a broader human health and sustainable development framework. Copyright © 2016 Elsevier B.V. All rights reserved.

  11. Presence and species identity of rumen flukes in cattle and sheep in the Netherlands.

    Science.gov (United States)

    Ploeger, H W; Ankum, L; Moll, L; van Doorn, D C K; Mitchell, G; Skuce, P J; Zadoks, R N; Holzhauer, M

    2017-08-30

    The purpose of the study was to gain knowledge about the prevalence and identity of rumen flukes (RF) in cattle and sheep in the Netherlands. Routine faecal examinations of diagnostic submissions between May 2009 and September 2014 showed a mean annual herd or flock RF prevalence of 15.8% for cattle and 8.0% for sheep. Prevalence in cattle was higher after 2012 than before, which may reflect a change in detection method as well as an increase in true prevalence. During November and December 2014, an abattoir survey was conducted to allow for scoring of rumen fluke burden and to obtain specimens for molecular species characterization. Over 8 visits to 5 abattoirs in areas deemed to pose a high risk for trematode infection, 116 cows and 41 sheep from 27 herds and 10 flocks were examined. Prevalence of RF was higher in beef cattle than in dairy cattle and higher in cattle than in sheep. Median fluke burden was >100 specimens per animal for most positive animals. Using a semi-quantitative RF density score as a gold standard, sensitivity and specificity of a modified quantitative Dorsman egg counting method were estimated at 82.6% and 83.3%, respectively. Of 14 collected adult rumen flukes, twelve (8 bovine and 4 ovine specimens) were identified as Calicophoron daubneyi. The other two, of bovine origin, were identified as Paramphistomum leydeni, which was unexpected as in other European countries all recently collected rumen flukes in both cattle and sheep were identified as C. daubneyi. The findings implicate that multiple rumen fluke species, intermediate host species and transmission cycles may play a role in rumen fluke infections in the Netherlands. Copyright © 2017. Published by Elsevier B.V.

  12. Invasion of Flukes of the Echinostomatidae Family in Racing Pigeon ( Columba livia var. domestica) Lofts.

    Science.gov (United States)

    Ledwoń, Aleksandra; Dolka, Beata; Piasecki, Tomasz; Dolka, Izabella; Szeleszczuk, Piotr

    2016-06-01

    Over 4 years, only two known cases of fluke invasions were diagnosed in racing pigeons ( Columba livia ) originating from different regions of Poland. In both cases, the invasion was characterized by a very high mortality (approximately 70%), and the source of the infestation was snails of the Lymnaeidae family eaten by pigeons. Fluke invasions in pigeons are extremely rare and to date have not been described in Poland. Therefore, the occurrence of the symptoms of hemorrhagic diarrhea and sudden deaths of either adult pigeons or nestlings were suspected to be associated with poisoning. Autopsy revealed an invasion of flukes causing hemorrhagic enteritis. Renal failure and spleen atrophy were also found in the birds. Using molecular biology techniques, infestation with the fluke Echinostoma revolutum was determined in the second case.

  13. Reducing liver fluke transmission in northeastern Thailand | IDRC ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    2016-04-29

    Apr 29, 2016 ... ... leaders, local health officials, school teachers—were agents of change. ... visited 186 households and organized liver fluke campaigns in local schools, ... The Lawa Model has since gained national and international ...

  14. Protease Inhibitors of Parasitic Flukes: Emerging Roles in Parasite Survival and Immune Defence.

    Science.gov (United States)

    Ranasinghe, Shiwanthi L; McManus, Donald P

    2017-05-01

    Protease inhibitors play crucial roles in parasite development and survival, counteracting the potentially damaging immune responses of their vertebrate hosts. However, limited information is currently available on protease inhibitors from schistosomes and food-borne trematodes. Future characterization of these molecules is important not only to expand knowledge on parasitic fluke biology but also to determine whether they represent novel vaccine and/or drug targets. Moreover, protease inhibitors from flukes may represent lead compounds for the development of a new range of therapeutic agents against inflammatory disorders and cancer. This review discusses already identified protease inhibitors of fluke origin, emphasizing their biological function and their possible future development as new intervention targets. Copyright © 2016 Elsevier Ltd. All rights reserved.

  15. Prevalence of cattle flukes infection at Andassa Livestock Research Center in north-west of Ethiopia

    Directory of Open Access Journals (Sweden)

    Asressa Yeneneh

    2012-06-01

    Full Text Available A cross sectional study was carried out from October 2010 to March 2011 at Andassa Livestock Research Center, North-West Ethiopia. The objective was to determine the prevalence of cattle flukes infection. Faecal samples were collected from a total of 384 cattle, cross breed (n= 39 and Fogera breed (n=345 of all age groups and sex. Sedimentation technique was employed for the recovery of fluke eggs from freshly collected fecal sample. The results indicated that the overall prevalence of bovine flukes infection was 60.42%. In this study, the highest prevalence was recorded from Paramphistomosis (45.83% followed by Fasciolosis (23.96%, and Schistosomosis (9.89%. The prevalence of flukes infection was higher in age group 1- 2 years old. There was significant difference in case of Paramphistomosis among age groups. No significant association was found between crossed breeds and sex groups for fluke’s infection. The prevalence of Paramphistomosis was high in cross breed (58.97% than Fogera breed (44.35%. However, in both cases, there was no significant difference. The result of the present study revealed that the prevalence of major bovine fluke infection in the study area was relatively low and is the definite proof of active infection.

  16. Liver fluke (Fasciola hepatica) infection in cattle in Northern Ireland: a large-scale epidemiological investigation utilising surveillance data.

    Science.gov (United States)

    Byrne, Andrew W; McBride, Stewart; Lahuerta-Marin, Angela; Guelbenzu, Maria; McNair, Jim; Skuce, Robin A; McDowell, Stanley W J

    2016-04-14

    Liver fluke (Fasciola hepatica) is a widespread parasite of ruminants which can have significant economic impact on cattle production. Fluke infection status at the animal-level is captured during meat inspection of all animals processed for human consumption within Northern Ireland. These national datasets have not been analysed to assess their utility in uncovering patterns in fluke infection at animal- and herd-levels in Northern Ireland. We utilised a dataset of 1.2 million animal records from ~18,000 herds across 3 years (2011-2013) to assess animal- and herd-level apparent prevalence and risk-factors associated with fluke infection. Animal-level apparent prevalence was measured as the proportion of animals exhibiting evidence of fluke infection at slaughter; between herd-level infection prevalence was measured by binary categorisation of herds (infected or not). "Within herd" infection prevalence was measured using the proportion of animals within a herd that showed evidence of fluke infection per year (ranging from 0-100%). "Within herd" infection prevalence at the herd level was investigated using multivariable modelling. At the animal level, the proportion of animals slaughtered that exhibited evidence of infection was 21-25% amongst years. Across herds, the proportion of herds with at least one infected animal, varied between 61 and 65%. However, there was a significant sampling effect at the herd-level; all herds where at least 105 animals slaughtered over the study period exhibited evidence of fluke infection (100%). There was significant variation in terms of within-herd infection prevalence. Risk factors included herd type, long-term weather variation, geographic location (region) and the abattoir. Liver fluke apparent prevalence was high at the herd-level across years. However, there was lower prevalence at the animal level, which may indicate significant variation in the exposure to fluke infection within herds. The proportion infected within

  17. Gene discovery for the carcinogenic human liver fluke, Opisthorchis viverrini

    Directory of Open Access Journals (Sweden)

    Gasser Robin B

    2007-06-01

    Full Text Available Abstract Background Cholangiocarcinoma (CCA – cancer of the bile ducts – is associated with chronic infection with the liver fluke, Opisthorchis viverrini. Despite being the only eukaryote that is designated as a 'class I carcinogen' by the International Agency for Research on Cancer, little is known about its genome. Results Approximately 5,000 randomly selected cDNAs from the adult stage of O. viverrini were characterized and accounted for 1,932 contigs, representing ~14% of the entire transcriptome, and, presently, the largest sequence dataset for any species of liver fluke. Twenty percent of contigs were assigned GO classifications. Abundantly represented protein families included those involved in physiological functions that are essential to parasitism, such as anaerobic respiration, reproduction, detoxification, surface maintenance and feeding. GO assignments were well conserved in relation to other parasitic flukes, however, some categories were over-represented in O. viverrini, such as structural and motor proteins. An assessment of evolutionary relationships showed that O. viverrini was more similar to other parasitic (Clonorchis sinensis and Schistosoma japonicum than to free-living (Schmidtea mediterranea flatworms, and 105 sequences had close homologues in both parasitic species but not in S. mediterranea. A total of 164 O. viverrini contigs contained ORFs with signal sequences, many of which were platyhelminth-specific. Examples of convergent evolution between host and parasite secreted/membrane proteins were identified as were homologues of vaccine antigens from other helminths. Finally, ORFs representing secreted proteins with known roles in tumorigenesis were identified, and these might play roles in the pathogenesis of O. viverrini-induced CCA. Conclusion This gene discovery effort for O. viverrini should expedite molecular studies of cholangiocarcinogenesis and accelerate research focused on developing new interventions

  18. MOLECULAR APPROACH TO THE STUDY OF TREMATODE PARASITES : THE BLOOD FLUKE

    Directory of Open Access Journals (Sweden)

    Philip T. LoVerde

    2012-09-01

    Full Text Available One important aspect of reproductive development in trematode parasites is the formation of a hardened eggshell which allows the zygote to develop into a miracidium in a hostile environment. The miracidium then can transfer the germline from the vertebrate host to snail intermediate host. Schistosome parasites, unlike other trematodes, have separate sexes and female reproductive development is known to depend on the presence of a male parasite. These facts make the blood flukes ideal material to study the mechanisms that underlie female reproductive development and eggshell formatian. We reasoned that the morphological and biochemical differences between the male and female must be reflected at the molecular level in the differential expression of sexually regulated genes. Radioactive single stranded cDNA was first transcribed from female RNA; and then sequences common to both male and female were removed by hybridization to an excess of male RNA. This probe was used to screen a cDNA library made from mRNA of adult worm paris. One hybridizing clone, pSMf 61-46, was shown to correspond to a 0.9 kilobase mRNA that is present only in mature female worms and is not detectable in female schistosomes from single-sex infections, in male worms or in eggs. Thus expression of the gene was female-specific. During normal bisexual infection this mRNA is first detected 28 days after infection (the time of worm pairing and increases to a high level at 35 days postinfection, coinciding with egg production. Thus the temporal expression of the gene was dependent on paining with male worm. The nucleotide sequence of the gene shows an open reading frame that encodes a 16 kDA polypeptide that shows strong homology with eggshell proteins on insects. A second female-specific cDNA clone, F-4, represents a 1.6 kilobase mRNA whose expression is also correlated with worm pairing and subsequent egg production, encodes a different putative eggshell component of 44 kDA. The

  19. Hybrid origin of Asian aspermic Fasciola flukes is confirmed by analyzing two single-copy genes, pepck and pold

    Science.gov (United States)

    HAYASHI, Kei; ICHIKAWA-SEKI, Madoka; MOHANTA, Uday Kumar; SHORIKI, Takuya; CHAICHANASAK, Pannigan; ITAGAKI, Tadashi

    2017-01-01

    Nuclear gene markers, phosphoenolpyruvate carboxykinase (pepck) and DNA polymerase delta (pold), have been developed for precise discrimination of Fasciola flukes instead of internal transcribed spacer 1. In this study, these two genes of 730 Fasciola flukes from eight Asian countries were analyzed. The results were compared with their mitochondrial NADH dehydrogenase subunit 1 (nad1) lineages for obtaining a definitive evidence of the hybrid origin of aspermic Fasciola flukes. All the flukes categorized into the aspermic nad1 lineages possessed both the fragment patterns of F. hepatica and F. gigantica (mixed types) in pepck and/or pold. These findings provide clear evidence for the hybrid origin of aspermic Fasciola lineages and suggest that “aspermic Fasciola flukes” should hereafter be called “hybrid Fasciola flukes”. PMID:29187710

  20. Three new species of blood flukes (Digenea: Aporocotylidae) infecting pufferfishes (Teleostei: Tetraodontidae) from off Bali, Indonesia.

    Science.gov (United States)

    Yong, R Q-Y; Cutmore, S C; Bray, R A; Miller, T L; Semarariana, I W Y; Palm, H W; Cribb, T H

    2016-10-01

    We describe three new species of blood flukes (Aporocotylidae) and propose their classification within the genus Psettarium Goto & Ozaki, 1929. All three species were collected from the circulatory systems of pufferfishes caught off Bali, central Indonesia. Psettarium pulchellum n. sp. was found in the gills of both the narrow-lined puffer (Arothron manilensis de Procé) and the spiny blaasop (Tylerius spinosissimus Regan), while P. ogawai n. sp. and P. jimbaranense n. sp. were found in the gills of the reticulated puffer (Arothron reticularis Bloch & Schneider). The morphological characteristics of these taxa necessitated emendation of the diagnosis for the genus Psettarium, to accommodate the presence of an oral sucker, multiple or entirely post-caecal testes and a degenerate posterior testis. Features such as proportion of body length occupied by the oesophagus, and posterior caeca being ≥7× the length of anterior caeca, are no longer regarded as useful genus-level characters. Additionally, Sasala nolani is reassigned to this genus as Psettarium nolani n. comb. In phylogenetic analyses of the 28S and ITS2 rDNA regions, all three new taxa form a well-supported clade, together with Psettarium sinense and Psettarium nolani n. comb., the two other species of tetraodontid-infecting aporocotylids for which comparative rDNA data were available. The short branch lengths within this clade, despite dramatic morphological differences between the five species, suggest that rapid morphological diversification has occurred among the tetraodontid-infecting aporocotylids. The genus Psettarium has long been considered problematic. Further commentary is given on the history of this genus and how the issues presented might be resolved. Copyright © 2016 Elsevier Ireland Ltd. All rights reserved.

  1. Cathepsin F cysteine protease of the human liver fluke, Opisthorchis viverrini.

    Directory of Open Access Journals (Sweden)

    Porntip Pinlaor

    Full Text Available The liver fluke Opisthorchis viverrini is classified as a class I carcinogen due to the association between cholangiocarcinoma and chronic O. viverrini infection. During its feeding activity within the bile duct, the parasite secretes several cathepsin F cysteine proteases that may induce or contribute to the pathologies associated with hepatobiliary abnormalities.Here, we describe the cDNA, gene organization, phylogenetic relationships, immunolocalization, and functional characterization of the cathepsin F cysteine protease gene, here termed Ov-cf-1, from O. viverrini. The full length mRNA of 1020 nucleotides (nt encoded a 326 amino acid zymogen consisting of a predicted signal peptide (18 amino acids, aa, prosegment (95 aa, and mature protease (213 aa. BLAST analysis using the Ov-CF-1 protein as the query revealed that the protease shared identity with cathepsin F-like cysteine proteases of other trematodes, including Clonorchis sinensis (81%, Paragonimus westermani (58%, Schistosoma mansoni and S. japonicum (52%, and with vertebrate cathepsin F (51%. Transcripts encoding the protease were detected in all developmental stages that parasitize the mammalian host. The Ov-cf-1 gene, of approximately 3 kb in length, included seven exons interrupted by six introns; the exons ranged from 69 to 267 bp in length, the introns from 43 to 1,060 bp. The six intron/exon boundaries of Ov-cf-1 were conserved with intron/exon boundaries in the human cathepsin F gene, although the gene structure of human cathepsin F is more complex. Unlike Ov-CF-1, human cathepsin F zymogen includes a cystatin domain in the prosegment region. Phylogenetic analysis revealed that the fluke, human, and other cathepsin Fs branched together in a clade discrete from the cathepsin L cysteine proteases. A recombinant Ov-CF-1 zymogen that displayed low-level activity was expressed in the yeast Pichia pastoris. Although the recombinant protease did not autocatalytically process and

  2. Detection of major climatic and environmental predictors of liver fluke exposure risk in Ireland using spatial cluster analysis.

    Science.gov (United States)

    Selemetas, Nikolaos; de Waal, Theo

    2015-04-30

    Fasciolosis caused by Fasciola hepatica (liver fluke) can cause significant economic and production losses in dairy cow farms. The aim of the current study was to identify important weather and environmental predictors of the exposure risk to liver fluke by detecting clusters of fasciolosis in Ireland. During autumn 2012, bulk-tank milk samples from 4365 dairy farms were collected throughout Ireland. Using an in-house antibody-detection ELISA, the analysis of BTM samples showed that 83% (n=3602) of dairy farms had been exposed to liver fluke. The Getis-Ord Gi* statistic identified 74 high-risk and 130 low-risk significant (Pclimatic variables (monthly and seasonal mean rainfall and temperatures, total wet days and rain days) and environmental datasets (soil types, enhanced vegetation index and normalised difference vegetation index) were used to investigate dissimilarities in the exposure to liver fluke between clusters. Rainfall, total wet days and rain days, and soil type were the significant classes of climatic and environmental variables explaining the differences between significant clusters. A discriminant function analysis was used to predict the exposure risk to liver fluke using 80% of data for modelling and the remaining subset of 20% for post hoc model validation. The most significant predictors of the model risk function were total rainfall in August and September and total wet days. The risk model presented 100% sensitivity and 91% specificity and an accuracy of 95% correctly classified cases. A risk map of exposure to liver fluke was constructed with higher probability of exposure in western and north-western regions. The results of this study identified differences between clusters of fasciolosis in Ireland regarding climatic and environmental variables and detected significant predictors of the exposure risk to liver fluke. Copyright © 2015 Elsevier B.V. All rights reserved.

  3. Prevalence and Sequence-Based Identity of Rumen Fluke in Cattle and Deer in New Caledonia.

    Directory of Open Access Journals (Sweden)

    Laura Cauquil

    Full Text Available An abattoir survey was performed in the French Melanesian archipelago of New Caledonia to determine the prevalence of paramphistomes in cattle and deer and to generate material for molecular typing at species and subspecies level. Prevalence in adult cattle was high at animal level (70% of 387 adult cattle and batch level (81%. Prevalence was lower in calves at both levels (33% of 484 calves, 51% at batch level. Animals from 2 of 7 deer farms were positive for rumen fluke, with animal-level prevalence of 41.4% (29/70 and 47.1% (33/70, respectively. Using ITS-2 sequencing, 3 species of paramphistomes were identified, i.e. Calicophoron calicophorum, Fischoederius elongatus and Orthocoelium streptocoelium. All three species were detected in cattle as well as deer, suggesting the possibility of rumen fluke transmission between the two host species. Based on heterogeneity in ITS-2 sequences, the C. calicophorum population comprises two clades, both of which occur in cattle as well as deer. The results suggest two distinct routes of rumen fluke introduction into this area. This approach has wider applicability for investigations of the origin of rumen fluke infections and for the possibility of parasite transmission at the livestock-wildlife interface.

  4. Proteomic analysis of human skin treated with larval schistosome peptidases reveals distinct invasion strategies among species of blood flukes.

    Directory of Open Access Journals (Sweden)

    Jessica Ingram

    2011-09-01

    Full Text Available Skin invasion is the initial step in infection of the human host by schistosome blood flukes. Schistosome larvae have the remarkable ability to overcome the physical and biochemical barriers present in skin in the absence of any mechanical trauma. While a serine peptidase with activity against insoluble elastin appears to be essential for this process in one species of schistosomes, Schistosoma mansoni, it is unknown whether other schistosome species use the same peptidase to facilitate entry into their hosts.Recent genome sequencing projects, together with a number of biochemical studies, identified alternative peptidases that Schistosoma japonicum or Trichobilharzia regenti could use to facilitate migration through skin. In this study, we used comparative proteomic analysis of human skin treated with purified cercarial elastase, the known invasive peptidase of S. mansoni, or S. mansoni cathespin B2, a close homolog of the putative invasive peptidase of S. japonicum, to identify substrates of either peptidase. Select skin proteins were then confirmed as substrates by in vitro digestion assays.This study demonstrates that an S. mansoni ortholog of the candidate invasive peptidase of S. japonicum and T. regenti, cathepsin B2, is capable of efficiently cleaving many of the same host skin substrates as the invasive serine peptidase of S. mansoni, cercarial elastase. At the same time, identification of unique substrates and the broader species specificity of cathepsin B2 suggest that the cercarial elastase gene family amplified as an adaptation of schistosomes to human hosts.

  5. Blood Fluke Exploitation of Innate-Adaptive Immune Interactions to Facilitate Parasite Development

    Science.gov (United States)

    2007-01-01

    epidemiology 25:1292-1300. 7. Alonso , D., J. Munoz, J. Gascon, M. E. Valls, and M. Corachan. 2006. Failure of standard treatment with praziquantel in two...of naive and memory CD8 T cells in vivo. Nature immunology 1:426-432. 105. Pearce, E. J., A. Cheever, S. Leonard, M. Covalesky, R. Fernandez - Botran...Transactions of the Royal Society of Tropical Medicine and Hygiene 48:3–4. 149 148. Garcia , S., J. DiSanto, and B. Stockinger. 1999. Following the

  6. Prevalence, risk factors and spatial analysis of infections with liver flukes in Danish cattle herds

    DEFF Research Database (Denmark)

    Hisham Beshara Halasa, Tariq; Frankena, K.; Olsen, A.

    Liver fluke infection, also known as fasciolosis, is a world-wide prevalent zoonotic parasitic disease infecting a wide range of host species and is caused by Fasciola hepatica. Despite of the substantial economic and animal welfare effects of the disease, knowledge on its prevalence and the fact......Liver fluke infection, also known as fasciolosis, is a world-wide prevalent zoonotic parasitic disease infecting a wide range of host species and is caused by Fasciola hepatica. Despite of the substantial economic and animal welfare effects of the disease, knowledge on its prevalence...

  7. Insights into SCP/TAPS proteins of liver flukes based on large-scale bioinformatic analyses of sequence datasets.

    Directory of Open Access Journals (Sweden)

    Cinzia Cantacessi

    Full Text Available BACKGROUND: SCP/TAPS proteins of parasitic helminths have been proposed to play key roles in fundamental biological processes linked to the invasion of and establishment in their mammalian host animals, such as the transition from free-living to parasitic stages and the modulation of host immune responses. Despite the evidence that SCP/TAPS proteins of parasitic nematodes are involved in host-parasite interactions, there is a paucity of information on this protein family for parasitic trematodes of socio-economic importance. METHODOLOGY/PRINCIPAL FINDINGS: We conducted the first large-scale study of SCP/TAPS proteins of a range of parasitic trematodes of both human and veterinary importance (including the liver flukes Clonorchis sinensis, Opisthorchis viverrini, Fasciola hepatica and F. gigantica as well as the blood flukes Schistosoma mansoni, S. japonicum and S. haematobium. We mined all current transcriptomic and/or genomic sequence datasets from public databases, predicted secondary structures of full-length protein sequences, undertook systematic phylogenetic analyses and investigated the differential transcription of SCP/TAPS genes in O. viverrini and F. hepatica, with an emphasis on those that are up-regulated in the developmental stages infecting the mammalian host. CONCLUSIONS: This work, which sheds new light on SCP/TAPS proteins, guides future structural and functional explorations of key SCP/TAPS molecules associated with diseases caused by flatworms. Future fundamental investigations of these molecules in parasites and the integration of structural and functional data could lead to new approaches for the control of parasitic diseases.

  8. [Genomics and transcriptomics of the Chinese liver fluke Clonorchis sinensis (Opisthorchiidae, Trematoda)].

    Science.gov (United States)

    Chelomina, G N

    2017-01-01

    The review summarizes the results of first genomic and transcriptomic investigations of the liver fluke Clonorchis sinensis (Opisthorchiidae, Trematoda). The studies mark the dawn of the genomic era for opisthorchiids, which cause severe hepatobiliary diseases in humans and animals. Their results aided in understanding the molecular mechanisms of adaptation to parasitism, parasite survival in mammalian biliary tracts, and genome dynamics in the individual development and the development of parasite-host relationships. Special attention is paid to the achievements in studying the codon usage bias and the roles of mobile genetic elements (MGEs) and small interfering RNAs (siRNAs). Interspecific comparisons at the genomic and transcriptomic levels revealed molecular differences, which may contribute to understanding the specialized niches and physiological needs of the respective species. The studies in C. sinensis provide a basis for further basic and applied research in liver flukes and, in particular, the development of efficient means to prevent, diagnose, and treat clonorchiasis.

  9. Elucidation of the first definitively identified life cycle for a marine turtle blood fluke (Trematoda: Spirorchiidae) enables informed control.

    Science.gov (United States)

    Cribb, Thomas H; Crespo-Picazo, Jose L; Cutmore, Scott C; Stacy, Brian A; Chapman, Phoebe A; García-Párraga, Daniel

    2017-01-01

    Blood flukes of the family Spirorchiidae are significant pathogens of both free-ranging and captive marine turtles. Despite a significant proportion of marine turtle mortality being attributable to spirorchiid infections, details of their life cycles remain almost entirely unknown. Here we report on the molecular elucidation of the complete life cycle of a marine spirorchiid, identified as Amphiorchis sp., infecting vermetid gastropods and captive hatched neonate Caretta caretta in the Oceanogràfic Aquarium, in Valencia, Spain. Specimens of a vermetid gastropod, Thylaeodus cf. rugulosus (Monterosato, 1878), collected from the aquarium filtration system housing diseased C. caretta, were infected with sporocysts and cercariae consistent with the family Spirorchiidae. We generated rDNA sequence data [internal transcribed spacer 2 (ITS2) and partial 28S rDNA] from infections from the vermetid which were identical to sequences generated from eggs from the serosa of the intestine of neonate C. caretta, and an adult spirorchiid from the liver of a C. caretta from Florida, USA. Given the reliability of these markers in the delineation of trematode species, we consider all three stages to represent the same species and tentatively identify it as a species of Amphiorchis Price, 1934. The source of infection at the Oceanogràfic Foundation Rehabilitation Centre, Valencia, Spain, is inferred to be an adult C. caretta from the western Mediterranean being rehabilitated in the same facility. Phylogenetic analysis suggests that this Amphiorchis sp. is closely related to other spirorchiids of marine turtles (species of Carettacola Manter & Larson, 1950, Hapalotrema Looss, 1899 and Learedius Price, 1934). We discuss implications of the present findings for the control of spirorchiidiasis in captivity, for the better understanding of epidemiology in wild individuals, and the elucidation of further life cycles. Copyright © 2016 Australian Society for Parasitology. Published by

  10. Some studies on liver and rumen flukes of bovines in Sri Lanka

    African Journals Online (AJOL)

    nkpc001

    Keywords: liver and rumen flukes, bovines, influence of climate, Sri Lanka. INTRODUCTION .... they were given two changes of absolute alcohol, each longing ..... inland and where fresh water ditches, streams and large water ... India. Res. ull. Panjab Univ., New series, 18: 369-337. sen J, Perry B. 1994. The epidemiology,.

  11. Prevalence, risk factors and spatial analysis of liver fluke infections in Danish cattle herds

    DEFF Research Database (Denmark)

    Olsen, Abbey; Frankena, Klaas; Bødker, Rene

    2015-01-01

    Background: Fasciola hepatica, a trematode parasite (liver fluke), infects a wide range of host species causing fasciolosis. The disease is prevalent world-wide and causes considerable economic losses to the livestock industry. Fasciolosis is regarded as an emerging food-borne zoonosis. To promote...... awareness among farmers and to implement strategies to control the infection, this study examined the prevalence, spatial distribution and risk factors for Fasciola hepatica infection in Danish cattle herds. Methods: A retrospective population based study was performed using meat inspection data...... of approximately 1.5 million cattle slaughtered in the period 2011 to 2013. Annual cumulative prevalence of recorded liver fluke findings was calculated for each year. Global and local spatial cluster analysis was used to identify and map spatial patterns of Fasciola hepatica positive and negative herds to explore...

  12. High Prevalence of Human Liver Infection by Amphimerus spp. Flukes, Ecuador

    OpenAIRE

    Calvopiña, Manuel; Cevallos, William; Kumazawa, Hideo; Eisenberg, Joseph

    2011-01-01

    Amphimerus spp. flukes are known to infect mammals, but human infections have not been confirmed. Microscopy of fecal samples from 397 persons from Ecuador revealed Opisthorchiidae eggs in 71 (24%) persons. Light microscopy of adult worms and scanning electron microscopy of eggs were compatible with descriptions of Amphimerus spp. This pathogen was only observed in communities that consumed undercooked fish.

  13. Identification of Fasciola flukes in Thailand based on their spermatogenesis and nuclear ribosomal DNA, and their intraspecific relationships based on mitochondrial DNA.

    Science.gov (United States)

    Chaichanasak, Pannigan; Ichikawa, Madoka; Sobhon, Prasert; Itagaki, Tadashi

    2012-12-01

    We analyzed 147 Fasciola flukes obtained from cattle in Thailand based on their spermatogenetic ability, and nuclear ribosomal internal transcribed spacer 1 (ITS1) and mitochondrial nicotiamide adenine dinucleotide dehydrogenase subunit 1 (ND1) genes as molecular markers. One hundred twenty-eight flukes, which had abundant sperm in their seminal vesicles (spermic) and showed the PCR-RFLP pattern of F. gigantica in the ITS1, were accurately identified as F. gigantica. The other 19 flukes that had no sperm in their seminal vesicles were aspermic Fasciola sp. with the RFLP patterns identical to that of F. gigantica. Twenty-nine ND1 haplotypes (Fg-ND1-Thai 2-30) were distinguished in the 128 F. gigantica flukes and were divided into haplotypes unique to Thailand and those common to other countries, suggesting the possibility that ancestral haplotypes were introduced into Thailand. Three haplotypes (Fg-ND1-Thai 7, 9 and 27) appeared to be the major haplotypes found in F. gigantica from Thailand. Only one haplotype (Fg-ND1-Thai 1) was found in the 19 aspermic Fasciola sp. flukes obtained from geographical regions, and the nucleotide sequence of Fg-ND1-Thai 1 was identical to that of the aspermic Fasciola sp. from Japan, Korea, China, Vietnam and Myanmar, suggesting that they were descendants with a common provenance and expanded to these countries in the relatively recent past. Copyright © 2012 Elsevier Ireland Ltd. All rights reserved.

  14. A comparison of the efficacy of doramectin, closantel and levamisole in the treatment of the 'oriental eye fluke', Philophthalmus gralli, in commercially reared ostriches (Struthio camelus : short communication

    Directory of Open Access Journals (Sweden)

    S. Mukaratirwa

    2008-05-01

    Full Text Available Commercially reared ostriches at Msengi farm situated in the Chinhoyi area of Mashonaland West province in Zimbabwe were found to be infected with the 'oriental eye fluke', Philopthalmus gralli, in 2001. This was the 1st record of the fluke in Zimbabwe. Trials were conducted to identify a suitable drug for the treatment of this fluke. A total of 12 ostriches confirmed to be infected with the fluke through clinical examination of the eyes and identification of the fluke were randomly divided into 3 equal groups, with each group receiving a different treatment protocol. The 3 drugs used were doramectin, levamisole and closantel. Each of the drugs was used in combination with chloramphenicol as an eye ointment. Levamisole was administered topically into the eye whereas doramectin and closantel were administered parenterally as an intramuscular injection. The results indicated a positive response in levamisole-treated birds but there were no noticeable responses to doramectin and closantel treatments.

  15. Molecular evidence shows that the liver fluke Fasciola gigantica is the predominant Fasciola species in ruminants from Pakistan.

    Science.gov (United States)

    Chaudhry, U; van Paridon, B; Shabbir, M Z; Shafee, M; Ashraf, K; Yaqub, T; Gilleard, J

    2016-03-01

    Fascioliasis is an important disease affecting livestock, with great costs to producers worldwide. It has also become a serious issue for human populations in some endemic areas as an emerging zoonotic infection. There are two Fasciola species of liver fluke responsible for this disease, which occur worldwide, Fasciola hepatica and Fasciola gigantica. Identifying these two species on the basis of adult or egg morphology requires specialist knowledge due to the similarity of characters, and may misidentify putative intermediate or hybrid forms. In this study we sequenced the internal transcribed spacer 2 (ITS-2) rDNA of liver flukes collected from multiple species of hosts from seven localities in the Punjab and Baluchistan provinces of Pakistan, to determine the distribution of these two species. All 46 flukes processed in this study, collected from seven sites, showed the rDNA ITS-2 genotype corresponding to F. gigantica, contradicting previous reports, based on adult and egg morphology, that both species are present in Pakistan, with F. hepatica being the more common.

  16. Structural basis for the inhibition of histone deacetylase 8 (HDAC8, a key epigenetic player in the blood fluke Schistosoma mansoni.

    Directory of Open Access Journals (Sweden)

    Martin Marek

    Full Text Available The treatment of schistosomiasis, a disease caused by blood flukes parasites of the Schistosoma genus, depends on the intensive use of a single drug, praziquantel, which increases the likelihood of the development of drug-resistant parasite strains and renders the search for new drugs a strategic priority. Currently, inhibitors of human epigenetic enzymes are actively investigated as novel anti-cancer drugs and have the potential to be used as new anti-parasitic agents. Here, we report that Schistosoma mansoni histone deacetylase 8 (smHDAC8, the most expressed class I HDAC isotype in this organism, is a functional acetyl-L-lysine deacetylase that plays an important role in parasite infectivity. The crystal structure of smHDAC8 shows that this enzyme adopts a canonical α/β HDAC fold, with specific solvent exposed loops corresponding to insertions in the schistosome HDAC8 sequence. Importantly, structures of smHDAC8 in complex with generic HDAC inhibitors revealed specific structural changes in the smHDAC8 active site that cannot be accommodated by human HDACs. Using a structure-based approach, we identified several small-molecule inhibitors that build on these specificities. These molecules exhibit an inhibitory effect on smHDAC8 but show reduced affinity for human HDACs. Crucially, we show that a newly identified smHDAC8 inhibitor has the capacity to induce apoptosis and mortality in schistosomes. Taken together, our biological and structural findings define the framework for the rational design of small-molecule inhibitors specifically interfering with schistosome epigenetic mechanisms, and further support an anti-parasitic epigenome targeting strategy to treat neglected diseases caused by eukaryotic pathogens.

  17. Nuclear magnetic resonance (NMR): application to examine liver tissues during invasion of the Liver fluke in cattle

    International Nuclear Information System (INIS)

    Wranicz, M.; Podbielski, T.; Grabiec, S.

    1989-01-01

    The T 1 and T 2 relaxation times of protons of hydrogen in the liver parenchyma and biliary ducts in normal and parazitized by the Liver fluke cows were determined. A method of the NMR in which a lenght or relaxation time is an index was applied. The value of this index is characteristic for determined physiological and pathological states of cells and it reveals changes which developed in body cells. It was found that tissues of cows parazitized by the Liver fluke (parenchyma and biliary ducts) and healthy ones differ significantly by the lenght of relaxation times. Parazitized tissues show a longer relaxation time than tissues of normal cows. (author)

  18. Molecular identification of Clonorchis sinensis and discrimination with other opisthorchid liver fluke species using multiple Ligation-depended Probe Amplification (MLPA

    Directory of Open Access Journals (Sweden)

    Liang Chi

    2011-06-01

    Full Text Available Abstract Background Infections with the opisthorchid liver flukes Clonorchis sinensis, Opisthorchis viverrini, and O. felineus cause severe health problems globally, particularly in Southeast Asia. Early identification of the infection is essential to provide timely and appropriate chemotherapy to patients. Results In this study we evaluate a PCR-based molecular identification method, Multiplex Ligation-dependent Probe Amplification (MLPA, which allows rapid and specific detection of single nucleotide acid differences between Clonorchis sinensis, Opisthorchis viverrini and O. felineus. Three probe pairs were derived from the Internally Transcribed Spacer 1 (ITS1 of three opisthorchid liver flukes using a systematic phylogenetic analysis. Specific loci were detected in all three species, yielding three amplicons with 198,172 and 152 bp, respectively, while no cross reactions were observed. A panel of 66 C. sinensis isolates was screened using MLPA. All species were positively identified, and no inhibition was observed. The detection limit was 103 copies of the ITS gene for the three liver flukes, or about 60 pg genomic DNA for Clonorchis sinensis. Amplification products can be detected by electrophoresis on agarose gel or in a capillary sequencer. In addition, genomic DNA of Clonorchis sinensis in fecal samples of infected rats was positively amplified by MLPA. Conclusion The flexibility and specificity make MLPA a potential tool for specific identification of infections by opisthorchid liver flukes in endemic areas.

  19. Experimental studies on the blood loss and intake of 51Cr labelled red cells by Clonorchis sinensis in rabbits

    International Nuclear Information System (INIS)

    Lee, M.J.; Kim, J.R.; Rim, H.J.

    1982-01-01

    Experimental study was carried out to observe the blood loss due to the ingestion of host blood by Colonorchis sinensis in the rabbits by using chromium radioisotope 51 Cr. On the other hand, in order to confirm the blood intake activity by the worms, the radioactivity was measured on blood, bile juice and flukes removed from the bile ducts of the rabbits experimentally infected with C. sinensis. (Author)

  20. Experimental studies on the blood loss and intake of /sup 51/Cr labelled red cells by Clonorchis sinensis in rabbits

    Energy Technology Data Exchange (ETDEWEB)

    Lee, M.J.; Kim, J.R.; Rim, H.J. (Korea Univ, Seoul (Republic of Korea). Coll. of Medicine)

    1982-03-01

    Experimental study was carried out to observe the blood loss due to the ingestion of host blood by Colonorchis sinensis in the rabbits by using chromium radioisotope /sup 51/Cr. On the other hand, in order to confirm the blood intake activity by the worms, the radioactivity was measured on blood, bile juice and flukes removed from the bile ducts of the rabbits experimentally infected with C. sinensis.

  1. Assessing the Role of Climate Variability on Liver Fluke Risk in the UK Through Mechanistic Hydro-Epidemiological Modelling

    Science.gov (United States)

    Beltrame, L.; Dunne, T.; Rose, H.; Walker, J.; Morgan, E.; Vickerman, P.; Wagener, T.

    2016-12-01

    Liver fluke is a flatworm parasite infecting grazing animals worldwide. In the UK, it causes considerable production losses to cattle and sheep industries and costs farmers millions of pounds each year due to reduced growth rates and lower milk yields. Large part of the parasite life-cycle takes place outside of the host, with its survival and development strongly controlled by climatic and hydrologic conditions. Evidence of climate-driven changes in the distribution and seasonality of fluke disease already exists, as the infection is increasingly expanding to new areas and becoming a year-round problem. Therefore, it is crucial to assess current and potential future impacts of climate variability on the disease to guide interventions at the farm scale and mitigate risk. Climate-based fluke risk models have been available since the 1950s, however, they are based on empirical relationships derived between historical climate and incidence data, and thus are unlikely to be robust for simulating risk under changing conditions. Moreover, they are not dynamic, but estimate risk over large regions in the UK based on monthly average climate conditions, so they do not allow investigating the effects of climate variability for supporting farmers' decisions. In this study, we introduce a mechanistic model for fluke, which represents habitat suitability for disease development at 25m resolution with a daily time step, explicitly linking the parasite life-cycle to key hydro-climate conditions. The model is used on a case study in the UK and sensitivity analysis is performed to better understand the role of climate variability on the space-time dynamics of the disease, while explicitly accounting for uncertainties. Comparisons are presented with experts' knowledge and a widely used empirical model.

  2. Evidence for high genetic diversity of NAD1 and COX1 mitochondrial haplotypes among triclabendazole resistant and susceptible populations and field isolates of Fasciola hepatica (liver fluke) in Australia.

    Science.gov (United States)

    Elliott, T; Muller, A; Brockwell, Y; Murphy, N; Grillo, V; Toet, H M; Anderson, G; Sangster, N; Spithill, T W

    2014-02-24

    In recent years, the global incidence of Fasciola hepatica (liver fluke) infections exhibiting resistance to triclabendazole (TCBZ) has increased, resulting in increased economic losses for livestock producers and threatening future control. The development of TCBZ resistance and the worldwide discovery of F. hepatica population diversity has emphasized the need to further understand the genetic structure of drug susceptible and resistant Fasciola populations within Australia. In this study, the genetic diversity of liver flukes was estimated by sequencing mitochondrial DNA (mtDNA) encoding the NAD1 (530 bp) and COX1 (420 bp) genes of 208 liver flukes (F. hepatica) collected from three populations: field isolates obtained from abattoirs from New South Wales (NSW) and Victoria (Vic); three TCBZ-resistant fluke populations from NSW and Victoria; and the well-established TCBZ-susceptible Sunny Corner laboratory isolate. Overall nucleotide diversity for all flukes analysed of 0.00516 and 0.00336 was estimated for the NAD1 and COX1 genes respectively. Eighteen distinct haplotypes were established for the NAD1 gene and six haplotypes for the COX1 gene, resulting in haplotype diversity levels of 0.832 and 0.482, respectively. One field isolate showed a similar low level of haplotype diversity as seen in the Sunny Corner laboratory isolate. Analysis of TCBZ-resistant infrapopulations from 3 individual cattle grazing one property revealed considerable sequence parasite diversity between cattle. Analysis of parasite TCBZ-resistant infrapopulations from sheep and cattle revealed haplotypes unique to each host, but no significant difference between parasite populations. Fst analysis of fluke populations revealed little differentiation between the resistant and field populations. This study has revealed a high level of diversity in field and drug resistant flukes in South-Eastern Australia. Copyright © 2013 Elsevier B.V. All rights reserved.

  3. Functional Analysis of the Unique Cytochrome P450 of the Liver Fluke Opisthorchis felineus.

    Directory of Open Access Journals (Sweden)

    Mariya Y Pakharukova

    2015-12-01

    Full Text Available The basic metabolic cytochrome P450 (CYP system is essential for biotransformation of sterols and xenobiotics including drugs, for synthesis and degradation of signaling molecules in all living organisms. Most eukaryotes including free-living flatworms have numerous paralogues of the CYP gene encoding heme monooxygenases with specific substrate range. Notably, by contrast, the parasitic flatworms have only one CYP gene. The role of this enzyme in the physiology and biochemistry of helminths is not known. The flukes and tapeworms are the etiologic agents of major neglected tropical diseases of humanity. Three helminth infections (Opisthorchis viverrini, Clonorchis sinensis and Schistosoma haematobium are considered by the International Agency for Research on Cancer (IARC as definite causes of cancer. We focused our research on the human liver fluke Opisthorchis felineus, an emerging source of biliary tract disease including bile duct cancer in Russia and central Europe. The aims of this study were (i to determine the significance of the CYP activity for the morphology and survival of the liver fluke, (ii to assess CYP ability to metabolize xenobiotics, and (iii to localize the CYP activity in O. felineus tissues. We observed high constitutive expression of CYP mRNA (Real-time PCR in O. felineus. This enzyme metabolized xenobiotics selective for mammalian CYP2E1, CYP2B, CYP3A, but not CYP1A, as determined by liquid chromatography and imaging analyses. Tissue localization studies revealed the CYP activity in excretory channels, while suppression of CYP mRNA by RNA interference was accompanied by morphological changes of the excretory system and increased mortality rates of the worms. These results suggest that the CYP function is linked to worm metabolism and detoxification. The findings also suggest that the CYP enzyme is involved in vitally important processes in the organism of parasites and is a potential drug target.

  4. GIS-based spatial statistical analysis of risk areas for liver flukes in Surin Province of Thailand.

    Science.gov (United States)

    Rujirakul, Ratana; Ueng-arporn, Naporn; Kaewpitoon, Soraya; Loyd, Ryan J; Kaewthani, Sarochinee; Kaewpitoon, Natthawut

    2015-01-01

    It is urgently necessary to be aware of the distribution and risk areas of liver fluke, Opisthorchis viverrini, for proper allocation of prevention and control measures. This study aimed to investigate the human behavior, and environmental factors influencing the distribution in Surin Province of Thailand, and to build a model using stepwise multiple regression analysis with a geographic information system (GIS) on environment and climate data. The relationship between the human behavior, attitudes (R Square=0.878, and, Adjust R Square=0.849. By GIS analysis, we found Si Narong, Sangkha, Phanom Dong Rak, Mueang Surin, Non Narai, Samrong Thap, Chumphon Buri, and Rattanaburi to have the highest distributions in Surin province. In conclusion, the combination of GIS and statistical analysis can help simulate the spatial distribution and risk areas of liver fluke, and thus may be an important tool for future planning of prevention and control measures.

  5. The effects of farm management practices on liver fluke prevalence and the current internal parasite control measures employed on Irish dairy farms.

    Science.gov (United States)

    Selemetas, Nikolaos; Phelan, Paul; O'Kiely, Padraig; de Waal, Theo

    2015-01-30

    Fasciolosis caused by Fasciola hepatica is responsible for major production losses in cattle farms. The objectives of this study were to assess the effect of farm management practices on liver fluke prevalence on Irish dairy farms and to document the current control measures against parasitic diseases. In total, 369 dairy farms throughout Ireland were sampled from October to December 2013, each providing a single bulk tank milk (BTM) sample for liver fluke antibody-detection ELISA testing and completing a questionnaire on their farm management. The analysis of samples showed that cows on 78% (n=288) of dairy farms had been exposed to liver fluke. There was a difference (P0.05) between positive and negative farms in (a) the grazing of dry cows together with replacement cows, (b) whether or not grazed grassland was mowed for conservation, (c) the type of drinking water provision system, (d) spreading of cattle manure on grassland or (e) for grazing season length (GSL; mean=262.5 days). Also, there were differences (Pmanagement practices between Irish farms with dairy herds exposed or not exposed to liver fluke and stressed the need of fine-scale mapping of the disease patterns even at farm level to increase the accuracy of risk models. Also, comprehensive advice and professional support services to farmers on appropriate farm management practices are very important for an effective anthelmintic control strategy. Copyright © 2014 Elsevier B.V. All rights reserved.

  6. Developmental Transcriptomic Features of the Carcinogenic Liver Fluke, Clonorchis sinensis

    Science.gov (United States)

    Cho, Pyo Yun; Kim, Tae Im; Cho, Shin-Hyeong; Choi, Sang-Haeng; Park, Hong-Seog; Kim, Tong-Soo; Hong, Sung-Jong

    2011-01-01

    Clonorchis sinensis is the causative agent of the life-threatening disease endemic to China, Korea, and Vietnam. It is estimated that about 15 million people are infected with this fluke. C. sinensis provokes inflammation, epithelial hyperplasia, and periductal fibrosis in bile ducts, and may cause cholangiocarcinoma in chronically infected individuals. Accumulation of a large amount of biological information about the adult stage of this liver fluke in recent years has advanced our understanding of the pathological interplay between this parasite and its hosts. However, no developmental gene expression profiles of C. sinensis have been published. In this study, we generated gene expression profiles of three developmental stages of C. sinensis by analyzing expressed sequence tags (ESTs). Complementary DNA libraries were constructed from the adult, metacercaria, and egg developmental stages of C. sinensis. A total of 52,745 ESTs were generated and assembled into 12,830 C. sinensis assembled EST sequences, and then these assemblies were further categorized into groups according to biological functions and developmental stages. Most of the genes that were differentially expressed in the different stages were consistent with the biological and physical features of the particular developmental stage; high energy metabolism, motility and reproduction genes were differentially expressed in adults, minimal metabolism and final host adaptation genes were differentially expressed in metacercariae, and embryonic genes were differentially expressed in eggs. The higher expression of glucose transporters, proteases, and antioxidant enzymes in the adults accounts for active uptake of nutrients and defense against host immune attacks. The types of ion channels present in C. sinensis are consistent with its parasitic nature and phylogenetic placement in the tree of life. We anticipate that the transcriptomic information on essential regulators of development, bile chemotaxis, and

  7. Developmental transcriptomic features of the carcinogenic liver fluke, Clonorchis sinensis.

    Directory of Open Access Journals (Sweden)

    Won Gi Yoo

    2011-06-01

    Full Text Available Clonorchis sinensis is the causative agent of the life-threatening disease endemic to China, Korea, and Vietnam. It is estimated that about 15 million people are infected with this fluke. C. sinensis provokes inflammation, epithelial hyperplasia, and periductal fibrosis in bile ducts, and may cause cholangiocarcinoma in chronically infected individuals. Accumulation of a large amount of biological information about the adult stage of this liver fluke in recent years has advanced our understanding of the pathological interplay between this parasite and its hosts. However, no developmental gene expression profiles of C. sinensis have been published. In this study, we generated gene expression profiles of three developmental stages of C. sinensis by analyzing expressed sequence tags (ESTs. Complementary DNA libraries were constructed from the adult, metacercaria, and egg developmental stages of C. sinensis. A total of 52,745 ESTs were generated and assembled into 12,830 C. sinensis assembled EST sequences, and then these assemblies were further categorized into groups according to biological functions and developmental stages. Most of the genes that were differentially expressed in the different stages were consistent with the biological and physical features of the particular developmental stage; high energy metabolism, motility and reproduction genes were differentially expressed in adults, minimal metabolism and final host adaptation genes were differentially expressed in metacercariae, and embryonic genes were differentially expressed in eggs. The higher expression of glucose transporters, proteases, and antioxidant enzymes in the adults accounts for active uptake of nutrients and defense against host immune attacks. The types of ion channels present in C. sinensis are consistent with its parasitic nature and phylogenetic placement in the tree of life. We anticipate that the transcriptomic information on essential regulators of development

  8. Survey of gastrointestinal parasites, liver flukes and lungworm in feces from dairy cattle in the high tropics of Antioquia, Colombia

    Directory of Open Access Journals (Sweden)

    Jenny J. Chaparro

    2016-06-01

    Full Text Available A cross sectional study was undertaken to determine the prevalence and intensity of parasitic infections in dairy cattle in the high tropics of Colombia. A total of 1003 rectal samples were collected from dairy cows at 29 farms between May and June 2014 to represent the number of farms, age groups, and size of the 65,000-cow population in the municipality of San Pedro de los Milagros. Coprological techniques were used to detect gastrointestinal nematodes, liver flukes, coccidian oocysts, and first larval stage counts of Dictyocaulus viviparus. In order of decreasing prevalence, the following parasites were detected: coccidial oocyst (36.7%; 95% CIs, 31.6–42.7, strongyle nematodes (31.6%, 27.8–35.4, liver flukes (30.9%, 21.5–37.5, cestodes (8.4%, 7.1–9.7, and D. viviparus (5.4%, 3.4–7.5. Co-infections by all possible combinations of the three most predominant groups occurred in 11 to 15% of the animals. There were significant differences in infection rates between age groups, with higher risk of liver fluke infection in animals older than 1 year of age (odds ratio (OR = 3.2, but lower presence for coccidia and strongyles (OR = 0.19 and 0.51, respectively. For Fasciola hepatica, within-herd prevalences of >25% in 16 farms and 94 of 281 (33.5% animals with >5 eggs per gram (epg indicate that significant production losses are likely occurring. The variation in the prevalence of gastrointestinal parasites and liver flukes, together with the level of infection among age groups, could be used in integrated management programs to establish selective anthelmintic treatments and select for heritable traits of host resistance. These results serve as a baseline for future studies to determine the success of control measures and should increase awareness that subclinical parasitism is widespread in the livestock sector.

  9. Molecular identification of Clonorchis sinensis and discrimination with other opisthorchid liver fluke species using Multiple Ligation-dependent Probe Amplification (MLPA).

    NARCIS (Netherlands)

    Sun, J.; Xu, J.; Liang, P.; Mao, Q.; Huang, Y.; Lu, X.; Deng, C.; Liang, C.; de Hoog, G.S.; Yu, X.

    2011-01-01

    Background Infections with the opisthorchid liver flukes Clonorchis sinensis, Opisthorchis viverrini, and O. felineus cause severe health problems globally, particularly in Southeast Asia. Early identification of the infection is essential to provide timely and appropriate chemotherapy to patients.

  10. In vitro antihelmintic effect of fifteen tropical plant extracts on excysted flukes of Fasciola hepatica

    OpenAIRE

    Alvarez-Mercado, Jos? Manuel; Ibarra-Velarde, Froyl?n; Alonso-D?az, Miguel ?ngel; Vera-Montenegro, Yolanda; Avila-Acevedo, Jos? Guillermo; Garc?a-Bores, Ana Mar?a

    2015-01-01

    Background Fasciolosis due to Fasciola hepatica is the most important hepatic disease in veterinary medicine. Its relevance is important because of the major economical losses to the cattle industry such as: reduction in milk, meat and wool production; miscarriages, anemia, liver condemnation and occasionally deaths, are estimated in billons of dollars. The emergence of fluke resistance due to over or under dosing of fasciolides as well as environmental damage produced by the chemicals elimin...

  11. Routes for Drug Translocation Across the Blood-Brain Barrier: Exploiting Peptides as Delivery Vectors.

    Science.gov (United States)

    Kristensen, Mie; Brodin, Birger

    2017-09-01

    A number of potent drugs for the treatment of brain diseases are available. However, in order for them to reach their target site of action, they must pass the blood-brain barrier (BBB). The capillary endothelium comprises the major barrier of the BBB and allows only passive permeation of some small lipophilic molecules. Brain delivery of the larger biopharmaceuticals, which today includes an increasing number of novel drug entities, is therefore restricted, both due to their molecular size and their hydrophilic nature. Thus, the development of novel drug entities intended for the treatment of brain diseases such as neurodegenerative diseases or brain cancers require a delivery strategy for overcoming the BBB before reaching its final target within the brain. Peptide-based delivery vector is an emerging tool as shuttles for drug delivery across the BBB and one may explore receptor-mediated transcytosis, adsorptive-mediated transcytosis, and the paracellular route. The latter, however, being controversial due to the risk of co-delivery of blood-borne potential harmful substances. On the other hand, a number of studies report on drug delivery across the BBB exploiting receptor-mediated transcytosis and adsorptive-mediated transcytosis, indicating that peptides and peptide vectors may be of use in a central nervous system delivery context. Copyright © 2017 American Pharmacists Association®. Published by Elsevier Inc. All rights reserved.

  12. Clonorchis sinensis, an oriental liver fluke, as a human biological agent of cholangiocarcinoma: a brief review.

    Science.gov (United States)

    Kim, Tong-Soo; Pak, Jhang Ho; Kim, Jong-Bo; Bahk, Young Yil

    2016-11-01

    Parasitic diseases remain an unarguable public health problem worldwide. Liver fluke Clonorchis sinensis is a high risk pathogenic parasitic helminth which is endemic predominantly in Asian countries, including Korea, China, Taiwan, Vietnam, and the far eastern parts of Russia, and is still actively transmitted. According to the earlier 8th National Survey on the Prevalence of Intestinal Parasitic Infections in 2012, C. sinensis was revealed as the parasite with highest prevalence of 1.86% in general population among all parasite species surveyed in Korea. This fluke is now classified under one of the definite Group 1 human biological agents (carcinogens) by International Agency of Research on Cancer (IARC) along with two other parasites, Opisthorchis viverrini and Schistosoma haematobium. C. sinensis infestation is mainly linked to liver and biliary disorders, especially cholangiocarcinoma (CCA). For the purposes of this mini-review, we will only focus on C. sinensis and review pathogenesis and carcinogenesis of clonorchiasis, disease condition by C. sinensis infestation, and association between C. sinensis infestation and CCA. In this presentation, we briefly consider the current scientific status for progression of CCA by heavy C. sinensis infestation from the food-borne trematode and development of CCA. [BMB Reports 2016; 49(11): 590-597].

  13. Prevalence and seasonal incidence of nematode parasites and fluke infections of sheep and goats in eastern Ethiopia.

    Science.gov (United States)

    Sissay, Menkir M; Uggla, Arvid; Waller, Peter J

    2007-10-01

    A 2-year abattoir survey was carried out to determine the prevalence, abundance and seasonal incidence of gastro-intestinal (GI) nematodes and trematodes (flukes) of sheep and goats in the semi-arid zone of eastern Ethiopia. During May 2003 to April 2005, viscera including liver, lungs and GI tracts were collected from 655 sheep and 632 goats slaughtered at 4 abattoirs located in the towns of Haramaya, Harar, Dire Dawa and Jijiga in eastern Ethiopia. All animals were raised in the farming areas located within the community boundaries for each town. Collected materials were transported within 24 h to the parasitology laboratory of Haramaya University for immediate processing. Thirteen species belonging to 9 genera of GI nematodes (Haemonchus contortus, Trichostrongylus axei, T. colubriformis, T. vitrinus, Nematodirus filicollis, N. spathiger Oesopha-gostomum columbianum, O. venulosum, Strongyloides papillosus, Bunostomum trigonocephalum, Trichuris ovis, Cooperia curticei and Chabertia ovina), and 4 species belonging to 3 genera of trematodes (Fasciola hepatica, F. gigantica, Paramphistomum {Calicohoron} microbothrium and Dicrocoelium dendriticum) were recorded in both sheep and goats. All animals in this investigation were infected with multiple species to varying degrees. The mean burdens of adult nematodes were generally moderate in both sheep and goats and showed patterns of seasonal abundance that corresponded with the bi-modal annual rainfall pattern, with highest burdens around the middle of the rainy season. In both sheep and goats there were significant differences in the mean worm burdens and abundance of the different nematode species between the four geographic locations, with worm burdens in the Haramaya and Harar areas greater than those observed in the Dire Dawa and Jijiga locations. Similar seasonal variations were also observed in the prevalence of flukes. But there were no significant differences in the prevalence of each fluke species between the

  14. Genetic diversity of the Chinese liver fluke Clonorchis sinensis from Russia and Vietnam.

    Science.gov (United States)

    Chelomina, Galina N; Tatonova, Yulia V; Hung, Nguyen Manh; Ngo, Ha Duy

    2014-10-01

    Clonorchiasis is a parasitic disease of high public health importance in many countries in southeastern Asia and is caused by the Chinese liver fluke Clonorchis sinensis. However, the genetic structure and demographic history of its populations has not been sufficiently studied throughout the geographic range of the species and available data are based mainly on partial gene sequencing. In this study, we explored the genetic diversity of the complete 1560 bp cytochrome c oxidase subunit 1 (cox1) gene sequence for geographically isolated C. sinensis populations in Russia and Vietnam, to our knowledge for the first time. The results demonstrated low nucleotide and high haplotype differentiation within and between the two compared regions and a clear geographical vector for the distribution of genetic diversity patterns among the studied populations. These results suggest a deep local adaptation of the parasite to its environment including intermediate hosts and the existence of gene flow across the species' range. Additionally, we have predicted an amino acid substitution in the functional site of the COX1 protein among the Vietnamese populations, which were reported to be difficult to treat with praziquantel. The haplotype networks consisted of several region-specific phylogenetic lineages, the formation of which could have occurred during the most extensive penultimate glaciations in the Pleistocene Epoch. The patterns of genetic diversity and demographics are consistent with population growth of the liver fluke in the late Pleistocene following the Last Glacial Maximum, indicating the lack of a population bottleneck during the recent past in the species' history. The data obtained have important implications for understanding the phylogeography of C. sinensis, its host-parasite interactions, the ability of this parasite to evolve drug resistance, and the epidemiology of clonorchiasis under global climate change. Copyright © 2014 Australian Society for

  15. The Sinbad retrotransposon from the genome of the human blood fluke, Schistosoma mansoni, and the distribution of related Pao-like elements

    Directory of Open Access Journals (Sweden)

    Morales Maria E

    2005-02-01

    Full Text Available Abstract Background Of the major families of long terminal repeat (LTR retrotransposons, the Pao/BEL family is probably the least well studied. It is becoming apparent that numerous LTR retrotransposons and other mobile genetic elements have colonized the genome of the human blood fluke, Schistosoma mansoni. Results A proviral form of Sinbad, a new LTR retrotransposon, was identified in the genome of S. mansoni. Phylogenetic analysis indicated that Sinbad belongs to one of five discreet subfamilies of Pao/BEL like elements. BLAST searches of whole genomes and EST databases indicated that members of this clade occurred in species of the Insecta, Nematoda, Echinodermata and Chordata, as well as Platyhelminthes, but were absent from all plants, fungi and lower eukaryotes examined. Among the deuterostomes examined, only aquatic species harbored these types of elements. All four species of nematode examined were positive for Sinbad sequences, although among insect and vertebrate genomes, some were positive and some negative. The full length, consensus Sinbad retrotransposon was 6,287 bp long and was flanked at its 5'- and 3'-ends by identical LTRs of 386 bp. Sinbad displayed a triple Cys-His RNA binding motif characteristic of Gag of Pao/BEL-like elements, followed by the enzymatic domains of protease, reverse transcriptase (RT, RNAseH, and integrase, in that order. A phylogenetic tree of deduced RT sequences from 26 elements revealed that Sinbad was most closely related to an unnamed element from the zebrafish Danio rerio and to Saci-1, also from S. mansoni. It was also closely related to Pao from Bombyx mori and to Ninja of Drosophila simulans. Sinbad was only distantly related to the other schistosome LTR retrotransposons Boudicca, Gulliver, Saci-2, Saci-3, and Fugitive, which are gypsy-like. Southern hybridization and bioinformatics analyses indicated that there were about 50 copies of Sinbad in the S. mansoni genome. The presence of ESTs

  16. Prevalence of liver flukes infections and hydatidosis in slaughtered sheep and goats in Nishapour, Khorasan Razavi, Iran

    Directory of Open Access Journals (Sweden)

    Majid Aminzare

    2018-02-01

    Full Text Available Background: Food-borne trematode infections and hydatidosis are endemic diseases caused by helminths in Iran that are responsible for great economic loss and getting public health at risk. Aim: Aim of this study was to determine the prevalence of fasciolosis, dicrocoeliasis, and hydatidosis infections in slaughtered sheep and goats in Nishapour, Khorasan Razavi province of Iran. Materials and Methods: A survey was implemented on 130,107 sheep and goats slaughtered at an abattoir in Nishapour (Neyshbur city, north central Khorasan Razavi Province, Iran, to determine the prevalence of fascioliasis, dicrocoeliosis and presence of hydatidosis. Results: During a 1-year period of study, among 130,107 of sheep and goats slaughtered at Nishapour abattoir, 1064 and 7124 livers were condemned totally and partially, respectively. A total of 255 (0.19%, 181 (0.12 %, and 7751 (5.95% of livers were condemned due to cysts of Echinococcus granulosus, flukes of Fasciola spp., and Dicrocoelium dendriticum, respectively. Totally, 1932 (1.48% lungs were condemned due to hydatidosis. The significant seasonal pattern was seen for fasciolosis, dicrocoeliosis, and hydatidosis, statistically (p<0.01. Conclusion: According to this study, it seems that Neyshabour is considered as an endemic region for Fasciola spp. and D. dendriticum infections and D. dendriticum is the most widespread liver fluke found in sheep and goats.

  17. Application of tracer techniques to the study of trematode infections: Pathological and epidemiological aspects

    International Nuclear Information System (INIS)

    Nansen, P.

    1976-01-01

    Liver fluke and blood fluke infections cause heavy losses in animal production. The infections are characterized by a concomitant anaemia and dysproteinaemia. A review is made of radioisotopic tracer studies which have contributed to an understanding of the dynamic processes underlying the blood changes. Such studies have provided important information about the activity of the parasites, for example, how they cause disease and how they influence animal production. Radioisotopic techniques have also been utilized in the study of free-living fluke larvae. A brief outline of principles and fields if investigations within this area is given. (author)

  18. Molecular identification of Clonorchis sinensis and discrimination with other opisthorchid liver fluke species using Multiple Ligation-dependent Probe Amplification (MLPA).

    OpenAIRE

    Sun, J.; Xu, J.; Liang, P.; Mao, Q.; Huang, Y.; Lu, X.; Deng, C.; Liang, C.; de Hoog, G.S.; Yu, X.

    2011-01-01

    Background Infections with the opisthorchid liver flukes Clonorchis sinensis, Opisthorchis viverrini, and O. felineus cause severe health problems globally, particularly in Southeast Asia. Early identification of the infection is essential to provide timely and appropriate chemotherapy to patients. Results In this study we evaluate a PCR-based molecular identification method, Multiplex Ligation-dependent Probe Amplification (MLPA), which allows rapid and specific detection of single nucleotid...

  19. Molecular changes in Opisthorchis viverrini (Southeast Asian liver fluke during the transition from the juvenile to the adult stage.

    Directory of Open Access Journals (Sweden)

    Aaron R Jex

    Full Text Available BACKGROUND: The Southeast Asian liver fluke (Opisthorchis viverrini chronically infects and affects tens of millions of people in regions of Asia, leading to chronic illness and, importantly, inducing malignant cancer (= cholangiocarcinoma. In spite of this, little is known, at the molecular level, about the parasite itself, its interplay with its hosts or the mechanisms of disease and/or carcinogenesis. METHODOLOGY/PRINCIPAL FINDINGS: Here, we generated extensive RNA-Seq data (Illumina representing adult and juvenile stages of O. viverrini, and combined these sequences with previously published transcriptomic data (454 technology for this species, yielding a combined assembly of significantly increased quality and allowing quantitative assessment of transcription in the juvenile and adult stage. CONCLUSIONS: This enhanced assembly reveals that, despite the substantial biological similarities between the human liver flukes, O. viverinni and Clonorchis sinensis, there are previously unrecognized differences in major aspects of their molecular biology. Most notable are differences among the C13 and cathepsin L-like cysteine peptidases, which play key roles in tissue migration, immune evasion and feeding, and, thus, represent potential drug and/or vaccine targets. Furthermore, these data indicate that major lineages of cysteine peptidases of socioeconomically important trematodes have evolved through a process of gene loss rather than independent radiation, contrasting previous proposals.

  20. Low Genetic Diversity in Wide-Spread Eurasian Liver Fluke Opisthorchis felineus Suggests Special Demographic History of This Trematode Species

    Science.gov (United States)

    Brusentsov, Ilja I.; Katokhin, Alexey V.; Brusentsova, Irina V.; Shekhovtsov, Sergei V.; Borovikov, Sergei N.; Goncharenko, Grigoriy G.; Lider, Lyudmila A.; Romashov, Boris V.; Rusinek, Olga T.; Shibitov, Samat K.; Suleymanov, Marat M.; Yevtushenko, Andrey V.; Mordvinov, Viatcheslav A.

    2013-01-01

    Opisthorchis felineus or Siberian liver fluke is a trematode parasite (Opisthorchiidae) that infects the hepato-biliary system of humans and other mammals. Despite its public health significance, this wide-spread Eurasian species is one of the most poorly studied human liver flukes and nothing is known about its population genetic structure and demographic history. In this paper, we attempt to fill this gap for the first time and to explore the genetic diversity in O. felineus populations from Eastern Europe (Ukraine, European part of Russia), Northern Asia (Siberia) and Central Asia (Northern Kazakhstan). Analysis of marker DNA fragments from O. felineus mitochondrial cytochrome c oxidase subunit 1 and 3 (cox1, cox3) and nuclear rDNA internal transcribed spacer 1 (ITS1) sequences revealed that genetic diversity is very low across the large geographic range of this species. Microevolutionary processes in populations of trematodes may well be influenced by their peculiar biology. Nevertheless, we suggest that lack of population genetics structure observed in O. felineus can be primarily explained by the Pleistocene glacial events and subsequent sudden population growth from a very limited group of founders. Rapid range expansion of O. felineus through Asian and European territories after severe bottleneck points to a high dispersal potential of this trematode species. PMID:23634228

  1. Genome-wide characterization of microsatelittes and marker development in the carcinogenic liver fluke Clonorchis sinensis

    Science.gov (United States)

    Nguyen, Thao T.B.; Arimatsu, Yuji; Hong, Sung-Jong; Brindley, Paul J.; Blair, David; Laha, Thewarach; Sripa, Banchob

    2015-01-01

    Clonorchis sinensis is an important carcinogenic human liver fluke endemic in East and Southeast Asia. There are several conventional molecular markers have been used for identification and genetic diversity, however, no information about microsatellites of this liver fluke published so far. We here report microsatellite characterization and marker development for genetic diversity study in C. sinensis using genome-wide bioinformatics approach. Based on our search criteria, a total of 256,990 microsatellites (≥ 12 base pairs) were identified from genome database of C. sinensis with hexa-nucleotide motif being the most abundant (51%) followed by penta-nucleotide (18.3%) and tri-nucleotide (12.7%). The tetra-nucleotide, di-nucleotide and mononucleotide motifs accounted for 9.75 %, 7.63% and 0.14%, respectively. The total length of all microsatellites accounts for 0. 72 % of 547 Mb of the whole genome size and the frequency of microsatellites were found to be one microsatellite in every 2.13 kb of DNA. For the di-, tri, and tetra-nucleotide, the repeat numbers redundant are six (28%), four (45%) and three (76%), respectively. The ATC repeat is the most abundant microsatellites followed by AT, AAT and AC, respectively. Within 40 microsatellite loci developed, 24 microsatellite markers showed potential to differentiate between C. sinensis and O. viverrini. Seven out of 24 loci showed heterozygous with observed heterozygosity ranged from 0.467 to 1. Four-primer sets could amplify both C. sinensis and O. viverrini DNA with different sizes. This study provides basic information of C. sinensis microsatellites and the genome-wide markers developed may be a useful tool for genetic study of C. sinensis. PMID:25782682

  2. Genome-wide characterization of microsatellites and marker development in the carcinogenic liver fluke Clonorchis sinensis.

    Science.gov (United States)

    Nguyen, Thao T B; Arimatsu, Yuji; Hong, Sung-Jong; Brindley, Paul J; Blair, David; Laha, Thewarach; Sripa, Banchob

    2015-06-01

    Clonorchis sinensis is an important carcinogenic human liver fluke endemic in East and Southeast Asia. There are several conventional molecular markers that have been used for identification and genetic diversity; however, no information about microsatellites of this liver fluke is published so far. We here report microsatellite characterization and marker development for a genetic diversity study in C. sinensis, using a genome-wide bioinformatics approach. Based on our search criteria, a total of 256,990 microsatellites (≥12 base pairs) were identified from a genome database of C. sinensis, with hexanucleotide motif being the most abundant (51%) followed by pentanucleotide (18.3%) and trinucleotide (12.7%). The tetranucleotide, dinucleotide, and mononucleotide motifs accounted for 9.75, 7.63, and 0.14%, respectively. The total length of all microsatellites accounts for 0. 72% of 547 Mb of the whole genome size, and the frequency of microsatellites was found to be one microsatellite in every 2.13 kb of DNA. For the di-, tri-, and tetranucleotide, the repeat numbers redundant are six (28%), four (45%), and three (76%), respectively. The ATC repeat is the most abundant microsatellites followed by AT, AAT, and AC, respectively. Within 40 microsatellite loci developed, 24 microsatellite markers showed potential to differentiate between C. sinensis and Opisthorchis viverrini. Seven out of 24 loci showed to be heterozygous with observed heterozygosity that ranged from 0.467 to 1. Four primer sets could amplify both C. sinensis and O. viverrini DNA with different sizes. This study provides basic information of C. sinensis microsatellites, and the genome-wide markers developed may be a useful tool for the genetic study of C. sinensis.

  3. Laboratorní cykly schistosom, chov mezihostitelských plžů a jejich ekologické nároky

    OpenAIRE

    Nečasová, Monika

    2016-01-01

    The Schistosomatidae family is an important group of blood flukes, including serious human and livestock animal pathogens. With regard to reproduction, they are gonochoristic parasites. Their life cycle has two stages - asexual reproduction in an intermediary host (fresh water and sea gastropods) and sexual reproduction in the definitive host (mammals and birds). With regard to their pathogenicity at the definitive hosts, the blood fluke life cycle is abundantly maintained in laboratories. To...

  4. Stimulating Neoblast-Like Cell Proliferation in Juvenile Fasciola hepatica Supports Growth and Progression towards the Adult Phenotype In Vitro

    Science.gov (United States)

    Rathinasamy, Vignesh; Toet, Hayley; McCammick, Erin; O’Connor, Anna; Marks, Nikki J.; Mousley, Angela; Brennan, Gerard P.; Halton, David W.; Spithill, Terry W.; Maule, Aaron G.

    2016-01-01

    Fascioliasis (or fasciolosis) is a socioeconomically important parasitic disease caused by liver flukes of the genus Fasciola. Flukicide resistance has exposed the need for new drugs and/or a vaccine for liver fluke control. A rapidly improving ‘molecular toolbox’ for liver fluke encompasses quality genomic/transcriptomic datasets and an RNA interference platform that facilitates functional genomics approaches to drug/vaccine target validation. The exploitation of these resources is undermined by the absence of effective culture/maintenance systems that would support in vitro studies on juvenile fluke development/biology. Here we report markedly improved in vitro maintenance methods for Fasciola hepatica that achieved 65% survival of juvenile fluke after 6 months in standard cell culture medium supplemented with 50% chicken serum. We discovered that this long-term maintenance was dependent upon fluke growth, which was supported by increased proliferation of cells resembling the “neoblast” stem cells described in other flatworms. Growth led to dramatic morphological changes in juveniles, including the development of the digestive tract, reproductive organs and the tegument, towards more adult-like forms. The inhibition of DNA synthesis prevented neoblast-like cell proliferation and inhibited growth/development. Supporting our assertion that we have triggered the development of juveniles towards adult-like fluke, mass spectrometric analyses showed that growing fluke have an excretory/secretory protein profile that is distinct from that of newly-excysted juveniles and more closely resembles that of ex vivo immature and adult fluke. Further, in vitro maintained fluke displayed a transition in their movement from the probing behaviour associated with migrating stage worms to a slower wave-like motility seen in adults. Our ability to stimulate neoblast-like cell proliferation and growth in F. hepatica underpins the first simple platform for their long-term in

  5. Stimulating Neoblast-Like Cell Proliferation in Juvenile Fasciola hepatica Supports Growth and Progression towards the Adult Phenotype In Vitro.

    Science.gov (United States)

    McCusker, Paul; McVeigh, Paul; Rathinasamy, Vignesh; Toet, Hayley; McCammick, Erin; O'Connor, Anna; Marks, Nikki J; Mousley, Angela; Brennan, Gerard P; Halton, David W; Spithill, Terry W; Maule, Aaron G

    2016-09-01

    Fascioliasis (or fasciolosis) is a socioeconomically important parasitic disease caused by liver flukes of the genus Fasciola. Flukicide resistance has exposed the need for new drugs and/or a vaccine for liver fluke control. A rapidly improving 'molecular toolbox' for liver fluke encompasses quality genomic/transcriptomic datasets and an RNA interference platform that facilitates functional genomics approaches to drug/vaccine target validation. The exploitation of these resources is undermined by the absence of effective culture/maintenance systems that would support in vitro studies on juvenile fluke development/biology. Here we report markedly improved in vitro maintenance methods for Fasciola hepatica that achieved 65% survival of juvenile fluke after 6 months in standard cell culture medium supplemented with 50% chicken serum. We discovered that this long-term maintenance was dependent upon fluke growth, which was supported by increased proliferation of cells resembling the "neoblast" stem cells described in other flatworms. Growth led to dramatic morphological changes in juveniles, including the development of the digestive tract, reproductive organs and the tegument, towards more adult-like forms. The inhibition of DNA synthesis prevented neoblast-like cell proliferation and inhibited growth/development. Supporting our assertion that we have triggered the development of juveniles towards adult-like fluke, mass spectrometric analyses showed that growing fluke have an excretory/secretory protein profile that is distinct from that of newly-excysted juveniles and more closely resembles that of ex vivo immature and adult fluke. Further, in vitro maintained fluke displayed a transition in their movement from the probing behaviour associated with migrating stage worms to a slower wave-like motility seen in adults. Our ability to stimulate neoblast-like cell proliferation and growth in F. hepatica underpins the first simple platform for their long-term in vitro study

  6. Stimulating Neoblast-Like Cell Proliferation in Juvenile Fasciola hepatica Supports Growth and Progression towards the Adult Phenotype In Vitro.

    Directory of Open Access Journals (Sweden)

    Paul McCusker

    2016-09-01

    Full Text Available Fascioliasis (or fasciolosis is a socioeconomically important parasitic disease caused by liver flukes of the genus Fasciola. Flukicide resistance has exposed the need for new drugs and/or a vaccine for liver fluke control. A rapidly improving 'molecular toolbox' for liver fluke encompasses quality genomic/transcriptomic datasets and an RNA interference platform that facilitates functional genomics approaches to drug/vaccine target validation. The exploitation of these resources is undermined by the absence of effective culture/maintenance systems that would support in vitro studies on juvenile fluke development/biology. Here we report markedly improved in vitro maintenance methods for Fasciola hepatica that achieved 65% survival of juvenile fluke after 6 months in standard cell culture medium supplemented with 50% chicken serum. We discovered that this long-term maintenance was dependent upon fluke growth, which was supported by increased proliferation of cells resembling the "neoblast" stem cells described in other flatworms. Growth led to dramatic morphological changes in juveniles, including the development of the digestive tract, reproductive organs and the tegument, towards more adult-like forms. The inhibition of DNA synthesis prevented neoblast-like cell proliferation and inhibited growth/development. Supporting our assertion that we have triggered the development of juveniles towards adult-like fluke, mass spectrometric analyses showed that growing fluke have an excretory/secretory protein profile that is distinct from that of newly-excysted juveniles and more closely resembles that of ex vivo immature and adult fluke. Further, in vitro maintained fluke displayed a transition in their movement from the probing behaviour associated with migrating stage worms to a slower wave-like motility seen in adults. Our ability to stimulate neoblast-like cell proliferation and growth in F. hepatica underpins the first simple platform for their long

  7. Cyclophilin A enhances cell proliferation and tumor growth of liver fluke-associated cholangiocarcinoma

    Directory of Open Access Journals (Sweden)

    Sawanyawisuth Kanlayanee

    2011-08-01

    Full Text Available Abstract Background Cyclophilin A (CypA expression is associated with malignant phenotypes in many cancers. However, the role and mechanisms of CypA in liver fluke-associated cholangiocarcinoma (CCA are not presently known. In this study, we investigated the expression of CypA in CCA tumor tissues and CCA cell lines as well as regulation mechanisms of CypA in tumor growth using CCA cell lines. Methods CypA expression was determined by real time RT-PCR, Western blot or immunohistochemistry. CypA silence or overexpression in CCA cells was achieved using gene delivery techniques. Cell proliferation was assessed using MTS assay or Ki-67 staining. The effect of silencing CypA on CCA tumor growth was determined in nude mice. The effect of CypA knockdown on ERK1/2 activation was assessed by Western blot. Results CypA was upregulated in 68% of CCA tumor tissues. Silencing CypA significantly suppressed cell proliferation in several CCA cell lines. Likewise, inhibition of CypA peptidyl-prolyl cis-trans isomerase (PPIase activity using cyclosporin A (CsA decreased cell proliferation. In contrast, overexpression of CypA resulted in 30% to 35% increases in proliferation of CCA cell lines. Interestingly, neither silence nor overexpression of CypA affected cell proliferation of a non-tumor human cholangiocyte cell line, MMNK1. Suppression of CypA expression attenuated ERK1/2 activity in CCA M139 cells by using both transient and stable knockdown methods. In the in vivo study, there was a 43% reduction in weight of tumors derived from CypA-silenced CCA cell lines compared with control vector CCA tumors in mice; these tumors with stable CypA silencing showed a reduced cell proliferation. Conclusions CypA is upregulated in majority of CCA patients' tissues and confers a significant growth advantage in CCA cells. Suppression of CypA expression decreases proliferation of CCA cell lines in vitro and reduces tumor growth in the nude mouse model. Inhibition of Cyp

  8. Fine-scale mapping of vector habitats using very high resolution satellite imagery: a liver fluke case-study.

    Science.gov (United States)

    De Roeck, Els; Van Coillie, Frieke; De Wulf, Robert; Soenen, Karen; Charlier, Johannes; Vercruysse, Jozef; Hantson, Wouter; Ducheyne, Els; Hendrickx, Guy

    2014-12-01

    The visualization of vector occurrence in space and time is an important aspect of studying vector-borne diseases. Detailed maps of possible vector habitats provide valuable information for the prediction of infection risk zones but are currently lacking for most parts of the world. Nonetheless, monitoring vector habitats from the finest scales up to farm level is of key importance to refine currently existing broad-scale infection risk models. Using Fasciola hepatica, a parasite liver fluke, as a case in point, this study illustrates the potential of very high resolution (VHR) optical satellite imagery to efficiently and semi-automatically detect detailed vector habitats. A WorldView2 satellite image capable of transmitted by freshwater snails. The vector thrives in small water bodies (SWBs), such as ponds, ditches and other humid areas consisting of open water, aquatic vegetation and/or inundated grass. These water bodies can be as small as a few m2 and are most often not present on existing land cover maps because of their small size. We present a classification procedure based on object-based image analysis (OBIA) that proved valuable to detect SWBs at a fine scale in an operational and semi-automated way. The classification results were compared to field and other reference data such as existing broad-scale maps and expert knowledge. Overall, the SWB detection accuracy reached up to 87%. The resulting fine-scale SWB map can be used as input for spatial distribution modelling of the liver fluke snail vector to enable development of improved infection risk mapping and management advice adapted to specific, local farm situations.

  9. Distribution and habitats of Lymnaea natalensis, snail intermediate host of the liver fluke Fasciola gigantica, in South Africa

    Directory of Open Access Journals (Sweden)

    Editorial Office

    2001-09-01

    Full Text Available This paper focuses on the geographical distribution and the habitats of Lymnaea natalensis, the snail intermediate host of the liver fluke, Fasciola gigantica, as reflected by the collection sites of its 4 552 samples currently on record in the National Freshwater Snail Collection (NFSC of South Africa. Although this species was represented in a variety of waterbodies, the majority of samples(±70%came from rivers, brooks and dams and in 70.8% of the cases the water was described as permanent and in 71.8% as slow flowing or standing. The results of life-table studies conducted by various authors indicated that temperature should be a relatively unimportant factor in determining its geographical distribution, but that the availability of permanent water should be decisive for its presence in a given habitat. These results are in agreement with the finding that only 7.5% of the samples of this species in the NFSC were collected in habitats which were described as seasonal. Furthermore, it gives a logical explanation for the sporadic occurrence, or total absence of this species in the more arid regions of South Africa. Water impoundments and irrigation networks contribute to a large extent towards creating perennial habitats which would be suitable for L. natalensis. As intermediate host for one of the liver fluke species which already is an economic factor in South Africa, this certainly is an aspect which ought to be reckoned within the planning and construction of new irrigation schemes.

  10. Consensual exploitation : the moral wrong in exploitation and legal restrictions on consensual exploitative transactions

    OpenAIRE

    van der Neut, Wendy

    2014-01-01

    This thesis is about so-­‐called consensual exploitative transactions: transactions to which all parties agree voluntarily, and which are beneficial for all parties, but which are still widely considered exploitative, and for that reason legally restricted in many countries. The thesis asks two main questions: 1. What is wrong with consensual exploitation? 2.What implications does the answer to this question have for the legal restriction of consensual transactions ...

  11. In silico analysis of the fucosylation-associated genome of the human blood fluke Schistosoma mansoni: cloning and characterization of the enzymes involved in GDP-L-fucose synthesis and Golgi import.

    Science.gov (United States)

    Peterson, Nathan A; Anderson, Tavis K; Wu, Xiao-Jun; Yoshino, Timothy P

    2013-07-09

    Carbohydrate structures of surface-expressed and secreted/excreted glycoconjugates of the human blood fluke Schistosoma mansoni are key determinants that mediate host-parasite interactions in both snail and mammalian hosts. Fucose is a major constituent of these immunologically important glycans, and recent studies have sought to characterize fucosylation-associated enzymes, including the Golgi-localized fucosyltransferases that catalyze the transfer of L-fucose from a GDP-L-fucose donor to an oligosaccharide acceptor. Importantly, GDP-L-fucose is the only nucleotide-sugar donor used by fucosyltransferases and its availability represents a bottleneck in fucosyl-glycotope expression. A homology-based genome-wide bioinformatics approach was used to identify and molecularly characterize the enzymes that contribute to GDP-L-fucose synthesis and Golgi import in S. mansoni. Putative functions were further investigated through molecular phylogenetic and immunocytochemical analyses. We identified homologs of GDP-D-mannose-4,6-dehydratase (GMD) and GDP-4-keto-6-deoxy-D-mannose-3,5-epimerase-4-reductase (GMER), which constitute a de novo pathway for GDP-L-fucose synthesis, in addition to a GDP-L-fucose transporter (GFT) that putatively imports cytosolic GDP-L-fucose into the Golgi. In silico primary sequence analyses identified characteristic Rossman loop and short-chain dehydrogenase/reductase motifs in GMD and GMER as well as 10 transmembrane domains in GFT. All genes are alternatively spliced, generating variants of unknown function. Observed quantitative differences in steady-state transcript levels between miracidia and primary sporocysts may contribute to differential glycotope expression in early larval development. Additionally, analyses of protein expression suggest the occurrence of cytosolic GMD and GMER in the ciliated epidermal plates and tegument of miracidia and primary sporocysts, respectively, which is consistent with previous localization of highly

  12. Liver Fluke Infection and Fish Consumption in Khon Kaen, Thailand: A Case Study on Negotiating the Middle Ground between Western Science and Eastern Culture

    Science.gov (United States)

    Samiphak, Sara

    This research investigates why typical strategies for promoting health, prolonging life, and preventing disease do not work in many communities. I use the liver fluke infection endemic in Khon Kaen, Thailand to explore the middle ground between Western science and Eastern culture. Prior work on the O.viverrini infection in Khon Kaen, Thailand has focused almost exclusively on developing effective medical treatment for the liver fluke infection. This dissertation employs a case study designed to explore the conditions that created and perpetuate the problem in the first place. In concrete terms, I analyze how the worldviews of local villagers shape their attitudes toward life (and death), which in turn determine if they engage in the high-risk behavior -- eating undercooked fish -- that makes them vulnerable to the infection. My research focuses on these people in-situ over a three-month period, and includes data from participant-observation, interviews, and video-recordings. This work seeks to illuminate how people's thinking and reasoning skills, and personal/cultural identities affect their abilities to learn and act on new health concepts. This potentially provides a window into future educational strategies in a complex world.

  13. Molecular and structural characteristics of multidrug resistance-associated protein 7 in Chinese liver fluke Clonorchis sinensis.

    Science.gov (United States)

    Dai, Fuhong; Yoo, Won Gi; Lee, Ji-Yun; Lu, Yanyan; Pak, Jhang Ho; Sohn, Woon-Mok; Hong, Sung-Jong

    2017-03-01

    Multidrug resistance-associated protein 7 (MRP7, ABCC10) is a C subfamily member of the ATP-binding cassette (ABC) superfamily. MRP7 is a lipophilic anion transporter that pumps endogenous and xenobiotic substrates from the cytoplasm to the extracellular milieu. Here, we cloned and characterized CsMRP7 as a novel ABC transporter from the Chinese liver fluke, Clonorchis sinensis. Full-length cDNA of CsMRP7 was 5174 nt, encoded 1636 amino acids (aa), and harbored a 147-bp 5'-untranslated region (5'-UTR) and 116-bp 3'-UTR. Phylogenetic analysis confirmed that CsMRP7 was closer to the ABCC subfamily than the ABCB subfamily. Tertiary structures of the N-terminal region (1-322 aa) and core region (323-1621 aa) of CsMRP7 were generated by homology modeling using glucagon receptor (PDB ID: 5ee7_A) and P-glycoprotein (PDB ID: 4f4c_A) as templates, respectively. CsMRP7 nucleotide-binding domain 2 (NBD2) was conserved more than NBD1, which was the sites of ATP binding and hydrolysis. Like typical long MRPs, CsMRP7 has an additional membrane-spanning domain 0 (MSD0) and cytoplasmic loop, along with a common structural fold consisting of MSD1-NBD1-MSD2-NBD2 as a single polypeptide assembly. MSD0, MSD1, and MSD2 consisted of TM1-7, TM8-13, and TM14-19, respectively. The CsMRP7 transcript was more abundant in the metacercariae than in the adult worms. Truncated NBD1 (39 kDa) and NBD2 (44 kDa) were produced in bacteria and mouse immune sera were raised. CsMRP7 was localized in the apical side of the intestinal epithelium, sperm in the testes and seminal receptacle, receptacle membrane, and mesenchymal tissue around intestine in the adult worm. These results provide molecular information and insights into structural and functional characteristics of CsMRP7 and homologs of flukes.

  14. The mitochondrial genome of Paragonimus westermani (Kerbert, 1878, the Indian isolate of the lung fluke representative of the family Paragonimidae (Trematoda

    Directory of Open Access Journals (Sweden)

    Devendra K. Biswal

    2014-08-01

    Full Text Available Among helminth parasites, Paragonimus (zoonotic lung fluke gains considerable importance from veterinary and medical points of view because of its diversified effect on its host. Nearly fifty species of Paragonimus have been described across the globe. It is estimated that more than 20 million people are infected worldwide and the best known species is Paragonimus westermani, whose type locality is probably India and which infects millions of people in Asia causing disease symptoms that mimic tuberculosis. Human infections occur through eating raw crustaceans containing metacercarie or ingestion of uncooked meat of paratenic hosts such as pigs. Though the fluke is known to parasitize a wide range of mammalian hosts representing as many as eleven families, the status of its prevalence, host range, pathogenic manifestations and its possible survivors in nature from where the human beings contract the infection is not well documented in India. We took advantage of the whole genome sequence data for P. westermani, generated by Next Generation Sequencing, and its comparison with the existing data for the P. westermani for comparative mt DNA phylogenomic analyses. Specific primers were designed for the 12 protein coding genes with the aid of existing P. westermani mtDNA as the reference. The Ion torrent next generation sequencing platform was harnessed to completely sequence the mitochondrial genome, and applied innovative approaches to bioinformatically assemble and annotate it. A strategic PCR primer design utilizing the whole genome sequence data from P. westermani enabled us to design specific primers capable of amplifying all regions of the mitochondrial genome from P. westermani. Assembly of NGS data from libraries enriched in mtDNA sequence by PCR gave rise to a total of 11 contigs spanning the entire 14.7 kb mt DNA sequence of P. westermani available at NCBI. We conducted gap-filling by traditional Sanger sequencing to fill in the gaps

  15. The Ethics of Exploitation

    Directory of Open Access Journals (Sweden)

    Paul McLaughlin

    2008-11-01

    Full Text Available Philosophical inquiry into exploitation has two major deficiencies to date: it assumes that exploitation is wrong by definition; and it pays too much attention to the Marxian account of exploitation. Two senses of exploitation should be distinguished: the ‘moral’ or pejorative sense and the ‘non-moral’ or ‘non-prejudicial’ sense. By demonstrating the conceptual inadequacy of exploitation as defined in the first sense, and by defining exploitation adequately in the latter sense, we seek to demonstrate the moral complexity of exploitation. We contend, moreover, that moral evaluation of exploitation is only possible once we abandon a strictly Marxian framework and attempt, in the long run, to develop an integral ethic along Godwinian lines.

  16. Paramphistomum cervi: surface topography of the tegument of adult fluke.

    Science.gov (United States)

    Panyarachun, Busaba; Sobhon, Prasert; Tinikul, Yotsawan; Chotwiwatthanakun, Charoonroj; Anupunpisit, Vipavee; Anuracpreeda, Panat

    2010-06-01

    Adult Paramphistomum cervi or rumen fluke are pear-shaped, slightly concave ventrally and convex dorsally. The worm measures about 5-13 mm in length and 2-5 mm in width across the mid-section. As observed by scanning electron microscopy (SEM), the tegumental surface in all part of the body, appears highly corrugated with transverse folds alternating with grooves and is spineless. At high magnification, the surface of the fold is composed of microfolds or ridges separated by microgrooves or pits. Corrugations and invaginations of the ventral surface are also more extensive than on the dorsal surface of the body. Both anterior and posterior suckers have thick rims covered with transverse folds without spine. The genital pore is situated at the anterior third of the body. There are two types of sensory papillae on the surface: type 1 is bulbous in shape, measuring 10-15 microm in diameter at the base with nipple-like tips, and type 2 has a similar shape and size and also a short cilia on top. These sensory papillae usually occur in large clusters, each having between 5 and 20 units depending on the region of the body. Clusters of papillae on the ventral surface and around the anterior suckers tend to be more numerous and larger in size. The dorsal surface of the body has the least number of papillae. Copyright (c) 2009 Elsevier Inc. All rights reserved.

  17. Determination Of Irradiation Doses For Fasciola gigantica (Liver Flukes) For Protection In Goat (Capra hircus Linn.)

    International Nuclear Information System (INIS)

    Tuasikal, B.J.; Arifin, M.; Tarmizi

    2002-01-01

    An experiment was conducted to study the cange of pathogenicity of 6 O C o-irradiated F. gigantica that give immunological responses in goat. The aim of the study was to see immunity respond of goats against F. gigantica, which at the end to develop a new strategic technique for fluke control in small ruminant. Irradiated and non-irradiated -using y-cell of 6 0 C o -metacercariae (mc.) of F.gigantica were used as the infection material that administered into 18 locally bred goats averagely 10 months of age. These animal are divided into 6 groups of treatment as the following : (I) infection with 0 Gy irradiated mc as positive control; (2) without any infection, as negative contral; (3) infection with 25 Gy inaiiated mc; (4) immunisation with 25 Gy irradiated mc and then challenge by pure infective mc; (5) infection with 35 Gy irradiated mc; and (6) immunisation with 35 Gy irradiated mc an then challenge by pure infective mc. A period of 8 weeks was given to challenge immunisation. Body weight change, blood value (eosinophyl, haemoglobin, PCV, and reticulocyte) and liver anatomical pathology (AP) are observed and recorded. Result of this experiment showed a reduction in body weight change, 130 grams/week, in group I as compare to animal in group 4, which gain body weight of 80 grams/week. The proportion of eosinophyl in group 4 found to re higher as compare to group 6,90.6% and 66.8%, respectively, which indicates that 25Gy mc immunization enables elimination of the mc challenge given. This condition was confirmed by the ''normal'' seen on the anatomical pathology of the liver as compare to animal in- group 1, which found to be more cirrhosis with eosinophyl proportion of 98,6%. Furthermore, results from the observation of PCV and Hb indicate that anaemia was found in animal from group 1 compare to the respective groups: 22.33% and 8.94% vs 25.90% and 10.10% and 27.10% and 10.10%, respectively for PCV and HB in-group animal 1,4 and 6. It can be concluded that mc

  18. Pharmacological and morphological characteristics of the muscular system of the giant liver fluke (Fascioloides magna - Bassi 1875).

    Science.gov (United States)

    Trailović, Saša M; Marinković, Darko; Trailović, Jelena Nedeljković; Milovanović, Mirjana; Marjanović, Djordje S; Aničić, Milan R

    2015-12-01

    Motility is required for feeding, reproduction and maintenance of the fluke in the host's liver. According to that, the neuromuscular system can be an attractive drugable target for chemotherapy. Musculature of the Fascioloides magna is organized into three layers, an outer circular layer, beneath this layer the longitudinal layer, and third, the oblique, or diagonal layer underlies the longitudinal layer. In our study, the administration of atropine or caffeine did not cause classic muscle contractions of F. magna muscle strips. However, the Electrical Field Stimulation (EFS) induced stable and repeatable contractions, which enabled us to examine their sensitivity to the various substances. Acetylcholine (ACh) (300 μM and 1 mM), caused only a slight relaxation, without affecting the amplitude of spontaneous contractions or the amplitude of contractions induced by EFS. Contrary to that, atropine (100 μM) caused a significant increase in the basal tone and an increase of EFS-induced contractions. If acetylcholine is an inhibitory neurotransmitter in trematodes, the described effects of atropine are achieved by the blockade of inhibitory neurotransmission. On the other hand, with respect to the process of excitation-contraction coupling, the plant alkaloid ryanodine (30 μM) significantly reduced the basal tone, as well as EFS-induced contractions of F. magna muscle strips. Ryanodine inhibited the potentiating effect of atropine on the basal tone and contractions caused by EFS, which indicates that the contractile effect of atropine is dependent on Ca(++) release from intracellular stores. Caffeine (500 μM) caused relaxation of fluke muscle strips and at the same time significantly enhanced the EFS-induced contractions. Both effects of caffeine can be explained by entry of extracellular Ca(++) into muscle cells. The muscle contractility of F. magna depends both on the entry of extracellular calcium, and calcium release from intracellular stores, which are

  19. High prevalence of the liver fluke Amphimerus sp. in domestic cats and dogs in an area for human amphimeriasis in Ecuador.

    Directory of Open Access Journals (Sweden)

    Manuel Calvopiña

    2015-02-01

    Full Text Available Amphimerus sp. is a liver fluke which recently has been shown to have a high prevalence of infection among an indigenous group, Chachi, who reside in a tropical rainforest in the northwestern region of Ecuador. Since it is unknown which animals can act as a reservoir and/or definitive hosts for Amphimerus sp. in this endemic area, a study was done to determine the prevalence of infection in domestic cats and dogs. This information is important to understand the epidemiology, life cycle and control of this parasite.In July 2012, three Chachi communities located on Rio Cayapas, province of Esmeraldas, were surveyed. A total of 89 of the 109 registered households participated in the study. Of the 27 cats and 43 dogs found residing in the communities, stool samples were collected from 14 cats and 31 dogs (total of 45 animals and examined microscopically for the presence of Amphimerus eggs. The prevalence of infection was 71.4% in cats and 38.7% in dogs, with similar rates of infection in all three communities. Significantly more cats were infected than dogs (p = 0.042.The data show a high rate of Amphimerus sp. infection in domestic cats and dogs residing in Chachi communities. It can be concluded that these animals act as definitive and reservoir hosts for this liver fluke and that amphimeriasis is a zoonotic disease. These findings provide important epidemiological data which will aid in the development and implementation of control strategies against the transmission of Amphimerus.

  20. Effect of the Filamentous Fungus Mucor circinelloides On The Development of Eggs of the Rumen Fluke Calicophoron daubneyi (Paramphistomidae).

    Science.gov (United States)

    Arroyo, Fabián; Hernández, José A; Cazapal-Monteiro, Cristiana F; Pedreira, José; Sanchís, Jaime; Romasanta, Ángel; Sánchez-Andrade, Rita; Paz-Silva, Adolfo; Arias, María S

    2017-06-01

    Ruminants infected by Paramphistomidae flukes shed eggs in the feces, which pass through different stages in the environment until the infective stages (metacercariae) are reached. The activity of the soil fungus Mucor circinelloides on the development of eggs of the rumen fluke Calicophoron daubneyi was presently tested with 3 probes, i.e., in petri plates, feces, and an aqueous environment (tubes). The effect of the fungus was assessed by recording the numbers of undeveloped, nonviable, and embryonated eggs. Nonviable eggs were considered when vacuolization occurred, the inner structures were not clearly observed, the eggshell was broken, or the embryo inside was destroyed. By considering the ability of hyphae of M. circinelloides to develop in the presence of C. daubneyi eggs, attach to their surface, and penetrate and destroy the inner embryo, this ovicidal effect was classified as type 3. After a period of 50 days, the percentage of undeveloped eggs in the feces of infected cattle was 40%; furthermore, 27% of the eggs were nonviable, and 33% were embryonated (1 miracidium inside). The addition of 4 doses of M. circinelloides spores directly onto the feces resulted in 9-31% undeveloped eggs, 38-60% nonviable eggs, and 9-21% embryonated eggs, and no statistical significances were obtained among the different doses. Placing the eggs of C. daubneyi into an aqueous solution containing 10 7 spores of M. circinelloides/ml for 29 days resulted in 43% undeveloped eggs, 40% nonviable eggs, and 17% embryonated eggs, whereas in the controls, the percentages were 48%, 12%, and 40%, respectively. These data demonstrate the usefulness of the spores of the fungus M. circinelloides in limiting the development of the eggs of the trematode C. daubneyi.

  1. Hacking the art of exploitation

    CERN Document Server

    Erickson, Jon

    2003-01-01

    A comprehensive introduction to the techniques of exploitation and creative problem-solving methods commonly referred to as "hacking," Hacking: The Art of Exploitation is for both technical and non-technical people who are interested in computer security. It shows how hackers exploit programs and write exploits, instead of just how to run other people's exploits. Unlike many so-called hacking books, this book explains the technical aspects of hacking, including stack based overflows, heap based overflows, string exploits, return-into-libc, shellcode, and cryptographic attacks on 802.11b.

  2. Exploitation of Labour and Exploitation of Commodities: a “New Interpretation”

    OpenAIRE

    Veneziani, Roberto; Yoshihara, Naoki

    2011-01-01

    In the standard Okishio-Morishima approach, the existence of profits is proved to be equivalent to the exploitation of labour. Yet, it can also be proved that the existence of profits is equivalent to the ‘exploitation’ of any good. Labour and commodity exploitation are just different numerical representations of the productiveness of the economy. This paper presents an alternative approach to exploitation theory which is related to the New Interpretation (Duménil 1980; Foley 1982). In this a...

  3. Exploitation and disadvantage

    NARCIS (Netherlands)

    Ferguson, B.

    2016-01-01

    According to some accounts of exploitation, most notably Ruth Sample's (2003) degradation-based account and Robert Goodin's (1987) vulnerability-based account, exploitation occurs when an advantaged party fails to constrain their advantage in light of another's disadvantage, regardless of the cause

  4. Heterophysiasis, an intestinal fluke infection of man and vertebrates transmitted by euryhaline gastropods and fish

    Science.gov (United States)

    Taraschewski, H.

    1984-03-01

    Heterophyes heterophyes, agent of human heterophyiasis in the Near East, is transmitted in marine lagoons and saline inland waters, where the euryhaline intermediate hosts are abundant. In Egypt, mullets, the predominant second intermediate hosts, are customarily consumed raw; thus man becomes infected easily. Symptoms of human infections are usually considered mild. Mullets do not seem to be affected by the metacercariae encysted in the muscles, whereas the growth of the snail host Pirenella conica was found to be enhanced due to the infestation by the trematodes. In laboratory experiments, the flukes were found to be well developed in dogs, foxes and cats, but failed to reach sexual maturity in several other potentially piscivorous mammals and birds. In nature, dogs probably serve as the major reservoir hosts. Heterophyiasis is most prevalent in the Nile Delta, a huge brackish water area which is densely populated by humans and, consequently, also by dogs and cats. In the Far East, besides Heterophyes nocens, several other heterophysids with marine or fresh-water life-cycles are known to infect humans.

  5. Learning Metasploit exploitation and development

    CERN Document Server

    Balapure, Aditya

    2013-01-01

    A practical, hands-on tutorial with step-by-step instructions. The book will follow a smooth and easy-to-follow tutorial approach, covering the essentials and then showing the readers how to write more sophisticated exploits.This book targets exploit developers, vulnerability analysts and researchers, network administrators, and ethical hackers looking to gain advanced knowledge in exploitation development and identifying vulnerabilities. The primary goal is to take readers wishing to get into more advanced exploitation discovery and reaching the next level.Prior experience exploiting basic st

  6. Anthropology of sexual exploitation

    Directory of Open Access Journals (Sweden)

    Lalić Velibor

    2009-01-01

    Full Text Available In this paper, the authors observe sexual exploitation from an anthropological perspective. They analyze the rational, ethical, emotional and mythological dimensions of human sexuality. Consequently, after setting the phenomenon in a social and historical context, sexual exploitation is closely observed in the contemporary age. Based on thoughts of relevant thinkers, they make the conclusion that the elimination of sexual exploitation is not an utterly legal issue, but political and economical issues as well. Namely, legal norms are not sufficient to overcome sexual exploitation, but, political and economical relationships in contemporary societies, which will be based on sincere equal opportunities must be established.

  7. The exploitation argument against commercial surrogacy.

    Science.gov (United States)

    Wilkinson, Stephen

    2003-04-01

    This paper discusses the exploitation argument against commercial surrogacy: the claim that commercial surrogacy is morally objectionable because it is exploitative. The following questions are addressed. First, what exactly does the exploitation argument amount to? Second, is commercial surrogacy in fact exploitative? Third, if it were exploitative, would this provide a sufficient reason to prohibit (or otherwise legislatively discourage) it? The focus throughout is on the exploitation of paid surrogates, although it is noted that other parties (e.g. 'commissioning parents') may also be the victims of exploitation. It is argued that there are good reasons for believing that commercial surrogacy is often exploitative. However, even if we accept this, the exploitation argument for prohibiting (or otherwise legislatively discouraging) commercial surrogacy remains quite weak. One reason for this is that prohibition may well 'backfire' and lead to potential surrogates having to do other things that are more exploitative and/or more harmful than paid surrogacy. It is concluded therefore that those who oppose exploitation should (rather than attempting to stop particular practices like commercial surrogacy) concentrate on: (a) improving the conditions under which paid surrogates 'work'; and (b) changing the background conditions (in particular, the unequal distribution of power and wealth) which generate exploitative relationships.

  8. Exploitability Assessment with TEASER

    Science.gov (United States)

    2017-05-01

    for architectural neutral taint analysis on top of LLVM and QEMU. POC Proof of Concept : Demonstration of an exploit on a program . vii RCE Remote Code...bug with a Proof of Concept (POC), or input to a program demonstrating the ability to use a bug to exploit the application, to demonstrate the...often leads to either computationally difficult constraint solving problems or taint explosion. Given the computational difficulty of exploit

  9. Two questions about surrogacy and exploitation.

    Science.gov (United States)

    Wertheimer, Alan

    1992-01-01

    In this article I will consider two related questions about surrogacy and exploitation: (1) Is surrogacy exploitative? (2) If surrogacy is exploitative, what is the moral force of this exploitation? Briefly stated, I shall argue that whether surrogacy is exploitative depends on whether exploitation must be harmful to the exploited party or whether (as I think) there can be mutually advantageous exploitation. It also depends on some facts about surrogacy about which we have little reliable evidence and on our philosophical view on what counts as a harm to the surrogate. Our answer to the second question will turn in part on the account of exploitation we invoke in answering the first question and in part on the way in which we resolve some other questions about the justification of state interference. I shall suggest, however, that if surrogacy is a form of voluntary and mutually advantageous exploitation, then there is a strong presumption that surrogacy contracts should be permitted and even enforceable, although that presumption may be overridden on other grounds.

  10. Exploit Kit traffic analysis

    OpenAIRE

    Καπίρης, Σταμάτης; Kapiris, Stamatis

    2017-01-01

    Exploit kits have become one of the most widespread and destructive threat that Internet users face on a daily basis. Since the first actor, which has been categorized as exploit kit, namely MPack, appeared in 2006, we have seen a new era on exploit kit variants compromising popular websites, infecting hosts and delivering destructive malware, following an exponentially evolvement to date. With the growing threat landscape, large enterprises to domestic networks, have starte...

  11. A new measure of interpersonal exploitativeness

    Directory of Open Access Journals (Sweden)

    Amy B. Brunell

    2013-05-01

    Full Text Available Measures of exploitativeness evidence problems with validity and reliability. The present set of studies assessed a new measure (the Interpersonal Exploitativeness Scale that defines exploitativeness in terms of reciprocity. In Studies 1 and 2, 33 items were administered to participants. Exploratory and Confirmatory Factor Analysis demonstrated that a single factor consisting of six items adequately assess interpersonal exploitativeness. Study 3 results revealed that the Interpersonal Exploitativeness Scale was positively associated with normal narcissism, pathological narcissism, psychological entitlement, and negative reciprocity and negatively correlated with positive reciprocity. In Study 4, participants competed in a commons dilemma. Those who scored higher on the Interpersonal Exploitativeness Scale were more likely to harvest a greater share of resources over time, even while controlling for other relevant variables, such as entitlement. Together, these studies show the Interpersonal Exploitativeness Scale to be a valid and reliable measure of interpersonal exploitativeness. The authors discuss the implications of these studies.

  12. Red blood cell populations and membrane levels of peroxiredoxin 2 as candidate biomarkers to reveal blood doping.

    Science.gov (United States)

    Marrocco, Cristina; Pallotta, Valeria; D'alessandro, Angelo; Alves, Gilda; Zolla, Lello

    2012-05-01

    Blood doping represents one main trend in doping strategies. Blood doping refers to the practice of boosting the number of red blood cells (RBCs) in the bloodstream in order to enhance athletic performance, by means of blood transfusions, administration of erythropoiesis-stimulating substances, blood substitutes, natural or artificial altitude facilities, and innovative gene therapies. While detection of recombinant EPO and homologous transfusion is already feasible through electrophoretic, mass spectrometry or flow cytometry-based approaches, no method is currently available to tackle doping strategies relying on autologous transfusions. We exploited an in vitro model of autologous transfusion through a 1:10 dilution of concentrated RBCs after 30 days of storage upon appropriate dilution in freshly withdrawn RBCs from the same donor. Western blot towards membrane Prdx2 and Percoll density gradients were exploited to assess their suitability as biomarkers of transfusion. Membrane Prdx2 was visible in day 30 samples albeit not in day 0, while it was still visible in the 1:10 dilution of day 30 in day 0 RBCs. Cell gradients also highlighted changes in the profile of the RBC subpopulations upon dilution of stored RBCs in the fresh ones. From this preliminary in vitro investigation it emerges that Prdx2 and RBC populations might be further tested as candidate biomarkers of blood doping through autologous transfusion, though it is yet to be assessed whether the kinetics in vivo of Prdx2 exposure in the membrane of transfused RBCs will endow a sufficient time-window to allow reliable anti-doping testing.

  13. EXPLOITATION OF GRANITE BOULDER

    Directory of Open Access Journals (Sweden)

    Ivan Cotman

    1994-12-01

    Full Text Available The processes of forming, petrography, features, properties and exploitation of granite boulders are described. The directional drilling and black powder blasting is the succesful method in exploitation of granite boulders (boulder technology (the paper is published in Croatian.

  14. Studies on Urinary Schistosomiasis in Selected Villages around ...

    African Journals Online (AJOL)

    1Department of Biological Sciences, Usmanu Danfodiyo University, Sokoto, Nigeria. 2Department of ... caused by blood flukes of the genus Schistosoma and ..... Teaching/5480/samplesize.htm ... Evaluation of three diagnostic techniques.

  15. Terminal Restriction Fragment Length Polymorphism for the Identification of Spirorchiid Ova in Tissues from the Green Sea Turtle, Chelonia mydas.

    Directory of Open Access Journals (Sweden)

    Phoebe A Chapman

    Full Text Available Blood flukes are among the most common disease causing pathogens infecting vertebrates, including humans and some of the world's most globally endangered fauna. Spirorchiid blood flukes are parasites of marine turtles, and are associated with pathology, strandings and mortalities worldwide. Their ova embolize in tissues and incite significant inflammatory responses, however attempts to draw correlations between species and lesions are frustrated by difficulties in identifying ova beyond the genus level. In this study, a newly developed terminal restriction fragment length polymorphism (T-RFLP method was validated as a tool for differentiating between mixed spirorchiid ova in turtle tissue. Initially, a multiplex PCR was used to differentiate between the five genera of spirorchiid flukes. Following this, PCR was performed using genus/genera-specific fluorescently tagged primer pairs and PCR products digested analysis using restriction endonucleases. Using capillary electrophoresis, this T-RFLP method could differentiate between twelve species and genotypes of spirorchiid flukes in turtles. It was applied to 151 tissue samples and successfully identified the spirorchiid species present. It was found to be more sensitive than visual diagnosis, detecting infections in 28 of 32 tissues that were negative on histology. Spirorchiids were present in 96.7% of tissues tested, with Neospirorchis genotype 2 being the most prevalent, present in 93% of samples. Mixed infections were common, being present in 60.7% of samples tested. The method described here is, to our knowledge, the first use of the T-RFLP technique on host tissues or in an animal ecology context, and describes a significant advancement in the clinical capacity to diagnose a common cause of illness in our environment. It is proven as a sensitive, specific and cost-efficient means of identifying spirorchiid flukes and ova in turtles, with the potential to contribute valuable information to

  16. Exploiting VM/XA

    International Nuclear Information System (INIS)

    Boeheim, C.

    1990-03-01

    The Stanford Linear Accelerator Center has recently completed a conversion to IBM's VM/XA SP Release 2 operating system. The primary physics application had been constrained by the previous 16 megabyte memory limit. Work is underway to enable this application to exploit the new features of VM/XA. This paper presents a brief tutorial on how to convert an application to exploit VM/XA and discusses some of the SLAC experiences in doing so. 13 figs

  17. The economics of exploiting gas hydrates

    International Nuclear Information System (INIS)

    Döpke, Lena-Katharina; Requate, Till

    2014-01-01

    We investigate the optimal exploitation of methane hydrates, a recent discovery of methane resources under the sea floor, mainly located along the continental margins. Combustion of methane (releasing CO2) and leakage through blow-outs (releasing CH4) contribute to the accumulation of greenhouse gases. A second externality arises since removing solid gas hydrates from the sea bottom destabilizes continental margins and thus increases the risk of marine earthquakes. We show that in such a model three regimes can occur: i) resource exploitation will be stopped in finite time, and some of the resource will stay in situ, ii) the resource will be used up completely in finite time, and iii) the resource will be exhausted in infinite time. We also show how to internalize the externalities by policy instruments. - Highlights: • We set up a model of optimal has hydrate exploitation • We incorporate to types of damages: contribution to global warming and geo-hazards • We characterize optimal exploitation paths and study decentralization with an exploitation tax. • Three regimes can occur: • i) exploitation in finite time and some of the stock remaining in situ, • ii) exploitation in finite time and the resource will be exhausted, • iii) exploitation and exhaustion in infinite time

  18. Recombinant adenylate kinase 3 from liver fluke Clonorchis sinensis for histochemical analysis and serodiagnosis of clonorchiasis.

    Science.gov (United States)

    Kwon, Soon Bin; Kim, Paul; Woo, Hae Sun; Kim, Tae Yun; Kim, Ju Yeong; Lee, Hye Min; Jang, Yun Soo; Kim, Eun-Min; Yong, Tai-Soon; Seong, Baik Lin

    2018-03-27

    Due to the lack of an effective prophylactic intervention and diagnosis, human liver fluke Clonorchis sinensis continues to afflict a large human population, causing a chronic inflammatory bile duct disease. With an aim to identify target antigens for sensitive serodiagnosis, adenylate kinase 3 of C. sinensis (CsAK3) was successfully expressed in soluble form in Escherichia coli by fusion to an RNA-interacting domain derived from human Lys-tRNA synthetase and purified by Ni2+-affinity chromatography. Anti-CsAK3 serum was raised by immunization of mice, and Western blotting confirmed that CsAK3 was expressed in adult-stage C. sinensis. Histochemical analysis showed that CsAK3 was localized to the subtegumental tissue of C. sinensis and was excreted into the bile duct of the host. When tested against sera from various parasite-infected patients by enzyme-linked immunosorbent assay, the recombinant CsAK3 elicited a specific response to C. sinensis-infected sera. The results suggest that CsAK3, either alone or in combination with other antigens, could be used for improving the clinical diagnosis of clonorchiasis.

  19. Exploitation in International Paid Surrogacy Arrangements

    OpenAIRE

    Wilkinson, Stephen

    2015-01-01

    Abstract Many critics have suggested that international paid surrogacy is exploitative. Taking such concerns as its starting point, this article asks: (1) how defensible is the claim that international paid surrogacy is exploitative and what could be done to make it less exploitative? (2) In the light of the answer to (1), how strong is the case for prohibiting it? Exploitation could in principle be dealt with by improving surrogates' pay and conditions. However, doing so may exacerbate probl...

  20. Profits and Exploitation: A Reappraisal

    OpenAIRE

    Yoshihara, Naoki; Veneziani, Roberto

    2011-01-01

    This paper provides a mathematical analysis of the Marxian theory of the exploitation of labour in general equilibrium models. The two main definitions of Marxian exploitation in the literature, proposed by Morishima (1974) and Roemer (1982), respectively, are analysed in the context of general convex economies. It is shown that, contrary to the received view, in general these definitions do not preserve the so-called Fundamental Marxian Theorem (FMT), which states that the exploitation of la...

  1. Performance Production Analysis of Romanian Simmental Exploited at „P.F.A Munteanu Cornel” Farm

    Directory of Open Access Journals (Sweden)

    Alin Florin Avram

    2010-10-01

    Full Text Available Research follow to assess levels of productivity and the main indicators of milk of Romanian Simmental cows and its half blood, exploited in terms of milk production into Alba County environmental conditions. There were studied 45 cows from “P.F.A. Munteanu Cornel” farm. The results show that the maximum average of milk production is 5774 kg, registered in the third lactation and the average percentage of fat and protein is 3.92 respectively 3.34. The conclusion learned from the study is that Romanian Simmental cows studied have quantitative and qualitative productions over race standard and it is trying to reduce the period of exploitation and to intensify the process of milk production in first lactations.

  2. Redefining Exploitation

    DEFF Research Database (Denmark)

    Agarwala, Rina

    2016-01-01

    This article examines how self-employed workers are organizing in the garments and waste collection industries in India. Although the question of who is profiting from self-employed workers’ labor is complex, the cases outlined in this paper highlight telling instances of how some self......-employed workers are organizing as workers. They are fighting labor exploitation by redefining the concept to include additional exploitation axes (from the state and middle class) and forms (including sexual). In doing so, they are redefining potential solutions, including identities and material benefits, to fit...... their unique needs. By expanding the category of “workers” beyond those defined by a narrow focus on a standard employer-employee relationship, these movements are also fighting exclusion from earlier labor protections by increasing the number of entitled beneficiaries. These struggles provide an important...

  3. The effect on infection of irradiated fasciola gigantic (liver flukes) on goats (Capra hircus linn) blood values

    International Nuclear Information System (INIS)

    Tuasikal, BJ.; M-Arifin; Yusneti; Dinardi; Suhardono

    2006-01-01

    This experiment was carried out to study the effect of infection Fasciola gigantic irradiated by using 60 Co to goat’s blood values. Twenty local male goats, ten to twelve old months, 115-20 kg of body weight were used for this study. The animals were divided into 5 groups consisting of four replications. Three groups received irradiated metacercariae of Fasciola gigantic a using 45, 55 and 65 Gy respectively. One group in the positive control and another one is the negative control. Each goat received 350 metacercariae. The study in was undertaken for 25 weeks. Body weight, Eosinofil, PCV and Hb were measured. These indicated that infectivity reduced on irradiated Fasciola gigantic. In all parameters, among negative control group and three irradiation-groups showed non significant (p>0,05). (author)

  4. Data adaptive estimation of transversal blood flow velocities

    DEFF Research Database (Denmark)

    Pirnia, E.; Jakobsson, A.; Gudmundson, E.

    2014-01-01

    the transversal blood flow. In this paper, we propose a novel data-adaptive blood flow estimator exploiting this modulation scheme. Using realistic Field II simulations, the proposed estimator is shown to achieve a notable performance improvement as compared to current state-of-the-art techniques.......The examination of blood flow inside the body may yield important information about vascular anomalies, such as possible indications of, for example, stenosis. Current Medical ultrasound systems suffer from only allowing for measuring the blood flow velocity along the direction of irradiation......, posing natural difficulties due to the complex behaviour of blood flow, and due to the natural orientation of most blood vessels. Recently, a transversal modulation scheme was introduced to induce also an oscillation along the transversal direction, thereby allowing for the measurement of also...

  5. Exploration, Exploitation, and Organizational Coordination Mechanisms

    Directory of Open Access Journals (Sweden)

    Silvio Popadiuk

    2016-03-01

    Full Text Available This paper presents an empirical relationship among exploration, exploitation, and organizational coordination mechanisms, classified as the centralization of decision-making, formalization, and connectedness. In order to analyze the findings of this survey, we used two techniques: Principal Component Analysis (PCA and Partial Least Squares Path Modeling (PLS-PM. Our analysis was supported by 249 answers from managers of companies located in Brazil (convenience sampling. Contrary to expectations, centralization and exploitation were negatively associated. Our data supports the research hypothesis that formalization is positively associated with exploitation. Although the relationship between formalization and exploration were significant, the result is contrary to the research hypothesis that we made. The relationships among connectedness and exploitation, and connectedness and exploration were both positive and significant. This relationship means that the more connectedness increases, the higher the likelihood of exploitation and exploration.

  6. Images of Blood in American Cinema

    DEFF Research Database (Denmark)

    Rødje, Kjetil

    by following one (audio)visual element through an exploration that traverses established standards for film production and reception. This study does not heed distinctions regarding to genres (horror, western, gangster) or models of film production (exploitation, independent, studio productions) but rather......Through studying images of blood in film from the mid-1950s to the end of the 1960s, this path-breaking book explores how blood as an (audio)visual cinematic element went from predominately operating as a signifier, providing audiences with information about a film’s plot and characters......, to increasingly operating in terms of affect, potentially evoking visceral and embodied responses in viewers. Using films such as The Return of Dracula, The Tingler, Blood Feast, Two Thousand Maniacs, Color Me Blood Red, Bonnie and Clyde, and The Wild Bunch, Rødje takes a novel approach to film history...

  7. Images of Blood in American Cinema

    DEFF Research Database (Denmark)

    Rødje, Kjetil

    Through studying images of blood in film from the mid-1950s to the end of the 1960s, this path-breaking book explores how blood as an (audio)visual cinematic element went from predominately operating as a signifier, providing audiences with information about a film’s plot and characters, to incre......Through studying images of blood in film from the mid-1950s to the end of the 1960s, this path-breaking book explores how blood as an (audio)visual cinematic element went from predominately operating as a signifier, providing audiences with information about a film’s plot and characters...... by following one (audio)visual element through an exploration that traverses established standards for film production and reception. This study does not heed distinctions regarding to genres (horror, western, gangster) or models of film production (exploitation, independent, studio productions) but rather...... images as well as with audiences....

  8. Organ sales: exploitative at any price?

    Science.gov (United States)

    Lawlor, Rob

    2014-05-01

    In many cases, claims that a transaction is exploitative will focus on the details of the transaction, such as the price paid or conditions. For example, in a claim that a worker is exploited, the grounds for the claim are usually that the pay is not sufficient or the working conditions too dangerous. In some cases, however, the claim that a transaction is exploitative is not seen to rely on these finer details. Many, for example, claim that organ sales would be exploitative, in a way that doesn't seem to depend on the details. This article considers, but ultimately rejects, a number of arguments which could be used to defend this sort of claim. © 2012 John Wiley & Sons Ltd.

  9. Gambaran Nilai Darah Pada Sapi Yang Terinfeksi Fascioliasis Yang Dipotong di Rumah Potong Hewan Kota Banda Aceh

    Directory of Open Access Journals (Sweden)

    Winaruddin Winaruddin

    2002-04-01

    Full Text Available ABSTRACT.The main purpose of the research was to determain the blood value of fascioliasis on blood of the cattle slaughtered in abattoir. It has been examined fifty samples of fecal, bile fluids and blood of the cattle slaughtered at the Banda Aceh abattoir. The samples were examined for the values of hematocrit, erythrocyte and leucocyte differentiation and the presence of helminth eggs respectively. It was found that the egg count variet from 7.168 ± 0.225 trematode eggs in fecal samples and 14.554 ± 2.154 trematode eggs in bile duct repectively. The result of this study showed that, the prevalence rate of fascioliasis in cattle categorical a mild infestation was 44 %. Both in the length and width of body size of the flukes are affected by the life stage. The size of adult fluke was about 34.649 ± 8.992 mm x 12.030 ± 3.494 mm, while that of young fluke was 1.650 ± 0.240 mm x 1.487 ± 0.227 mm. the blood indices of affected cattle indicated significant (P < 0.05 decrease in hematocrit and erythrocyte count compared with those not affected by the disease. The mean count of hematocrit and erythrocyte 29.773%  ± 3.366% and 547.337 x 104  ± 13.599 in cattle infected and in cattle non infected was 32.357 ± 2.818 and 566.457 x 104  ± 12.886 respectively. The result of this study, also significant (P < 0.05 in increasing of the eosinophilia 16.22%  ± 4.03% compared with that non-affected ones (10.54 ± 4.56.

  10. Herbivory eliminates fitness costs of mutualism exploiters.

    Science.gov (United States)

    Simonsen, Anna K; Stinchcombe, John R

    2014-04-01

    A common empirical observation in mutualistic interactions is the persistence of variation in partner quality and, in particular, the persistence of exploitative phenotypes. For mutualisms between hosts and symbionts, most mutualism theory assumes that exploiters always impose fitness costs on their host. We exposed legume hosts to mutualistic (nitrogen-fixing) and exploitative (non-nitrogen-fixing) symbiotic rhizobia in field conditions, and manipulated the presence or absence of insect herbivory to determine if the costly fitness effects of exploitative rhizobia are context-dependent. Exploitative rhizobia predictably reduced host fitness when herbivores were excluded. However, insects caused greater damage on hosts associating with mutualistic rhizobia, as a consequence of feeding preferences related to leaf nitrogen content, resulting in the elimination of fitness costs imposed on hosts by exploitative rhizobia. Our experiment shows that herbivory is potentially an important factor in influencing the evolutionary dynamic between legumes and rhizobia. Partner choice and host sanctioning are theoretically predicted to stabilize mutualisms by reducing the frequency of exploitative symbionts. We argue that herbivore pressure may actually weaken selection on choice and sanction mechanisms, thus providing one explanation of why host-based discrimination mechanisms may not be completely effective in eliminating nonbeneficial partners. © 2014 The Authors. New Phytologist © 2014 New Phytologist Trust.

  11. Blood group astrology - why the AB0 blood groups do not determine the human character nor the appropriate nutrition

    Directory of Open Access Journals (Sweden)

    Martina Gajšek Grbec

    2016-04-01

    Full Text Available AB0 blood groups are inherited markers on blood cells. Since their discovery, there were numerous attempts to be attributed a wide variety of biological functions they don’t possess. The purpose of this article is primarily to inform the professional, as well as lay public that the theory of healthy nutrition based on AB0 blood groups represents nothing more than a pseudoscience used for mass exploitation and commercial purposes. ABO blood groups were attributed such characteristics by naturopathic doctor Peter D'Adamo, who on the basis of false methods and erroneous assumptions wrote a bestseller "Eat Right For Your Type". It claims that the blood groupsAB0 represent a "key to the functioning of our immune system" and that the blood group based diet represents a “key to the health of every man”. As in the case of nutrition based on the ABO blood groups, the scientific knowledge in the field of immunohematology is misused to mislead the lay public, we are obliged to explain the real meaning and the role of blood groups in health and disease, the misuse of blood groups in relation to healthy nutrition.

  12. Dissemination and Exploitation Strategy

    DEFF Research Database (Denmark)

    Badger, Merete; Monaco, Lucio; Fransson, Torsten

    of Technology in Sweden, Politecnico di Torino in Italy, and Eindhoven University of Technology in the Netherlands. The project is partially funded by the European Commission under the 7th Framework Programme (project no. RI-283746). This report describes the final dissemination and exploitation strategy...... for project Virtual Campus Hub. A preliminary dissemination and exploitation plan was setup early in the project as described in the deliverable D6.1 Dissemination strategy paper - preliminary version. The plan has been revised on a monthly basis during the project’s lifecycle in connection with the virtual...

  13. Exploitative and Deceptive Resource Acquisition Strategies

    Directory of Open Access Journals (Sweden)

    Joshua J. Reynolds

    2015-07-01

    Full Text Available Life history strategy (LHS and life history contingencies (LHCs should theoretically influence the use of exploitative and deceptive resource acquisition strategies. However, little research has been done in this area. The purpose of the present work was to create measures of exploitative strategies and test the predictions of life history theory. Pilot studies developed and validated a behavioral measure of cheating called the Dot Game. The role of individual LHS and LHCs (manipulated via validated story primes on cheating was investigated in Study 1. Studies 2a through 2c were conducted to develop and validate a self-report measure called the Exploitative and Deceptive Resource Acquisition Strategy Scale (EDRASS. Finally, Study 3 investigated life history and EDRASS. Results indicated that while LHS influences exploitative strategies, life history contingences had little effect. Implications of these findings are discussed.

  14. Whole genome analysis of a schistosomiasis-transmitting freshwater snail

    NARCIS (Netherlands)

    Adema, Coen M; Hillier, LaDeana W; Jones, Catherine S; Loker, Eric S; Knight, Matty; Minx, Patrick; Oliveira, Guilherme; Raghavan, Nithya; Shedlock, Andrew; do Amaral, Laurence Rodrigues; Arican-Goktas, Halime D; Assis, Juliana G; Baba, Elio Hideo; Baron, Olga L; Bayne, Christopher J; Bickham-Wright, Utibe; Biggar, Kyle K; Blouin, Michael; Bonning, Bryony C; Botka, Chris; Bridger, Joanna M; Buckley, Katherine M; Buddenborg, Sarah K; Lima Caldeira, Roberta; Carleton, Julia; Carvalho, Omar S; Castillo, Maria G; Chalmers, Iain W; Christensens, Mikkel; Clifton, Sandra; Cosseau, Celine; Coustau, Christine; Cripps, Richard M; Cuesta-Astroz, Yesid; Cummins, Scott F; di Stephano, Leon; Dinguirard, Nathalie; Duval, David; Emrich, Scott; Feschotte, Cédric; Feyereisen, Rene; FitzGerald, Peter; Fronick, Catrina; Fulton, Lucinda; Galinier, Richard; Gava, Sandra G; Geusz, Michael; Geyer, Kathrin K; Giraldo-Calderón, Gloria I; de Souza Gomes, Matheus; Gordy, Michelle A; Gourbal, Benjamin; Grunau, Christoph; Hanington, Patrick C; Hoffmann, Karl F; Hughes, Daniel; Humphries, Judith; Jackson, Daniel J; Jannotti-Passos, Liana K; de Jesus Jeremias, Wander; Jobling, Susan; Kamel, Bishoy; Kapusta, Aurélie; Kaur, Satwant; Koene, Joris M; Kohn, Andrea B; Lawson, Dan; Lawton, Scott P; Liang, D.C.; Limpanont, Yanin; Liu, Sijun; Lockyer, Anne E; Lovato, TyAnna L; Ludolf, Fernanda; Magrini, Vince; McManus, Donald P; Medina, Monica; Misra, Milind; Mitta, Guillaume; Mkoji, Gerald M; Montague, Michael J; Montelongo, Cesar; Moroz, Leonid L; Munoz-Torres, Monica C; Niazi, Umar; Noble, Leslie R; Oliveira, Francislon S; Pais, Fabiano S; Papenfuss, Anthony T; Peace, Rob; Pena, Janeth J; Pila, Emmanuel A; Quelais, Titouan; Raney, Brian J; Rast, Jonathan P; Rollinson, David; Rosse, Izinara C; Rotgans, Bronwyn; Routledge, Edwin J; Ryan, Kathryn M; Scholte, Larissa L S; Storey, Kenneth B; Swain, Martin; Tennessen, Jacob A; Tomlinson, Chad; Trujillo, Damian L; Volpi, Emanuela V; Walker, Anthony J; Wang, Tianfang; Wannaporn, Ittiprasert; Warren, Wesley C; Wu, Xiao-Jun; Yoshino, Timothy P; Yusuf, Mohammed; Zhang, Si-Ming; Zhao, Min; Wilson, Richard K

    2017-01-01

    Biomphalaria snails are instrumental in transmission of the human blood fluke Schistosoma mansoni. With the World Health Organization's goal to eliminate schistosomiasis as a global health problem by 2025, there is now renewed emphasis on snail control. Here, we characterize the genome of

  15. Trajectories and cycles of sexual exploitation and trafficking for sexual exploitation of women in the Peruvian Amazon

    OpenAIRE

    Mujica, Jaris

    2015-01-01

    The commercial sexual exploitation is a constant activity in the Peruvian Amazon. Around the river port of Pucallpa in ucayali region, the practice appears systematically: teenage attend taverns around the port, and those dedicated to the work of cooking camps logging, are victims of constant exploitation and many also of trafficking. this article aims to reconstruct the path of life and reproductive cycle of the forms of exploitation in a sample of 20 women, and focuses on: (i) evidence of s...

  16. Egg-specific expression of protein with DNA methyltransferase activity in the biocarcinogenic liver fluke Clonorchis sinensis.

    Science.gov (United States)

    Kim, Seon-Hee; Cho, Hye-Jeong; Sohn, Woon-Mok; Ahn, Chun-Seob; Kong, Yoon; Yang, Hyun-Jong; Bae, Young-An

    2015-08-01

    Despite recent reports regarding the biology of cytosine methylation in Schistosoma mansoni, the impact of the regulatory machinery remains unclear in diverse platyhelminthes. This ambiguity is reinforced by discoveries of DNA methyltransferase 2 (DNMT2)-only organisms and the substrate specificity of DNMT2 preferential to RNA molecules. Here, we characterized a novel DNA methyltransferase, named CsDNMT2, in a liver fluke Clonorchis sinensis. The protein exhibited structural properties conserved in other members of the DNMT2 family. The native and recombinant CsDNMT2 exhibited considerable enzymatic activity on DNA. The spatiotemporal expression of CsDNMT2 mirrored that of 5-methylcytosine (5 mC), both of which were elevated in the C. sinensis eggs. However, CsDNMT2 and 5 mC were marginally detected in other histological regions of C. sinensis adults including ovaries and seminal receptacle. The methylation site seemed not related to genomic loci occupied by progenies of an active long-terminal-repeat retrotransposon. Taken together, our data strongly suggest that C. sinensis has preserved the functional DNA methylation machinery and that DNMT2 acts as a genuine alternative to DNMT1/DNMT3 to methylate DNA in the DNMT2-only organism. The epigenetic regulation would target functional genes primarily involved in the formation and/or maturation of eggs, rather than retrotransposons.

  17. Exploitation in International Paid Surrogacy Arrangements.

    Science.gov (United States)

    Wilkinson, Stephen

    2016-05-01

    Many critics have suggested that international paid surrogacy is exploitative. Taking such concerns as its starting point, this article asks: (1) how defensible is the claim that international paid surrogacy is exploitative and what could be done to make it less exploitative? (2) In the light of the answer to (1), how strong is the case for prohibiting it? Exploitation could in principle be dealt with by improving surrogates' pay and conditions. However, doing so may exacerbate problems with consent. Foremost amongst these is the argument that surrogates from economically disadvantaged countries cannot validly consent because their background circumstances are coercive. Several versions of this argument are examined and I conclude that at least one has some merit. The article's overall conclusion is that while ethically there is something to be concerned about, paid surrogacy is in no worse a position than many other exploitative commercial transactions which take place against a backdrop of global inequality and constrained options, such as poorly-paid and dangerous construction work. Hence, there is little reason to single surrogacy out for special condemnation. On a policy level, the case for prohibiting international commercial surrogacy is weak, despite legitimate concerns about consent and background poverty.

  18. Exploitation in International Paid Surrogacy Arrangements

    Science.gov (United States)

    Wilkinson, Stephen

    2015-01-01

    Abstract Many critics have suggested that international paid surrogacy is exploitative. Taking such concerns as its starting point, this article asks: (1) how defensible is the claim that international paid surrogacy is exploitative and what could be done to make it less exploitative? (2) In the light of the answer to (1), how strong is the case for prohibiting it? Exploitation could in principle be dealt with by improving surrogates' pay and conditions. However, doing so may exacerbate problems with consent. Foremost amongst these is the argument that surrogates from economically disadvantaged countries cannot validly consent because their background circumstances are coercive. Several versions of this argument are examined and I conclude that at least one has some merit. The article's overall conclusion is that while ethically there is something to be concerned about, paid surrogacy is in no worse a position than many other exploitative commercial transactions which take place against a backdrop of global inequality and constrained options, such as poorly‐paid and dangerous construction work. Hence, there is little reason to single surrogacy out for special condemnation. On a policy level, the case for prohibiting international commercial surrogacy is weak, despite legitimate concerns about consent and background poverty. PMID:27471338

  19. Whole genome analysis of a schistosomiasis-transmitting freshwater snail

    DEFF Research Database (Denmark)

    Adema, Coen M; Hillier, Ladeana W; Jones, Catherine S

    2017-01-01

    Biomphalaria snails are instrumental in transmission of the human blood fluke Schistosoma mansoni. With the World Health Organization's goal to eliminate schistosomiasis as a global health problem by 2025, there is now renewed emphasis on snail control. Here, we characterize the genome of Biompha...

  20. Exploitation and exploration dynamics in recessionary times

    OpenAIRE

    Walrave, B.

    2012-01-01

    Firm performance largely depends on the ability to adapt to, and exploit, changes in the business environment. That is, firms should maintain ecological fitness by reconfiguring their resource base to cope with emerging threats and explore new opportunities, while at the same time exploiting existing resources. As such, firms possessing the ability to simultaneously perform exploitative and explorative initiatives are more resilient. In this respect, the performance implications of balancing ...

  1. Fatal trematodiasis in research turtles.

    Science.gov (United States)

    Johnson, C A; Griffith, J W; Tenorio, P; Hytrek, S; Lang, C M

    1998-08-01

    During a 5-year period, 16 freshwater turtles (Trachemys scripta elegans and Chrysemys picta) that were purchased for research purposes died spontaneously. Clinical signs of disease included lethargy, constant swimming, swimming sideways, hemiplegia, and ulcerative lesions on the carapace. At necropsy, subcutaneous edema, hepatic necrosis, pancreatic necrosis, splenic necrosis, and intestinal parasites were identified. Histologically, trematode eggs were seen within the liver, brain, spleen, kidney, myocardium, lung, pancreas, testes, and bladder, and were associated with granulomatous reactions. The size and distribution of the eggs were consistent with Spirorchis sp. infection, although adults could not be found to confirm the species. Spirorchid flukes are 1 to 2 mm long and inhabit the heart and blood vessels where they produce eggs. Spirorchis parvus are capable of invading various tissues, including pancreas and the central nervous system. The pathogenicity of the flukes seems to be related to widespread deposition of the eggs, which may block small blood vessels within the intestines, causing necrosis and bacteremia. Antemortem diagnosis is made by direct examination of fecal smears for eggs. Postmortem diagnosis is accomplished by examination of tissues for adult parasites and microgranulomas associated with the fluke eggs. The parasite requires a snail intermediate host to complete its life cycle. Intramuscular or oral administration of praziquantel is reported to be an effective treatment.

  2. Poverty-Exploitation-Alienation.

    Science.gov (United States)

    Bronfenbrenner, Martin

    1980-01-01

    Illustrates how knowledge derived from the discipline of economics can be used to help shed light on social problems such as poverty, exploitation, and alienation, and can help decision makers form policy to minimize these and similar problems. (DB)

  3. Advances in Blood Typing.

    Science.gov (United States)

    Quraishy, N; Sapatnekar, S

    The clinical importance of blood group antigens relates to their ability to evoke immune antibodies that are capable of causing hemolysis. The most important antigens for safe transfusion are ABO and D (Rh), and typing for these antigens is routinely performed for patients awaiting transfusion, prenatal patients, and blood donors. Typing for other blood group antigens, typically of the Kell, Duffy, Kidd, and MNS blood groups, is sometimes necessary, for patients who have, or are likely to develop antibodies to these antigens. The most commonly used typing method is serological typing, based on hemagglutination reactions against specific antisera. This method is generally reliable and practical for routine use, but it has certain drawbacks. In recent years, molecular typing has emerged as an alternative or supplemental typing method. It is based on detecting the polymorphisms and mutations that control the expression of blood group antigens, and using this information to predict the probable antigen type. Molecular typing methods are useful when traditional serological typing methods cannot be used, as when a patient has been transfused and the sample is contaminated with red blood cells from the transfused blood component. Moreover, molecular typing methods can precisely identify clinically significant variant antigens that cannot be distinguished by serological typing; this capability has been exploited for the resolution of typing discrepancies and shows promise for the improved transfusion management of patients with sickle cell anemia. Despite its advantages, molecular typing has certain limitations, and it should be used in conjunction with serological methods. © 2016 Elsevier Inc. All rights reserved.

  4. Radiation environmental impact assessment of copper exploitation

    International Nuclear Information System (INIS)

    Fan Guang; Wen Zhijian

    2010-01-01

    The radiation environmental impact of mineral exploitation on the surrounding environment has become a public concern. This paper presents the radiation environmental impact assessment of copper exploitation. Based on the project description and detailed investigations of surrounding environment, systematic radiation environmental impacts have been identified. The environmental impacts are assessed during both construction and operation phase. The environmental protection measures have also been proposed. The related conclusion and measures can play an active role in copper exploitation and environmental protection. (authors)

  5. Competing Discourses about Youth Sexual Exploitation in Canadian News Media.

    Science.gov (United States)

    Saewyc, Elizabeth M; Miller, Bonnie B; Rivers, Robert; Matthews, Jennifer; Hilario, Carla; Hirakata, Pam

    2013-10-01

    Media holds the power to create, maintain, or break down stigmatizing attitudes, which affect policies, funding, and services. To understand how Canadian news media depicts the commercial sexual exploitation of children and youth, we examined 835 Canadian newspaper articles from 1989-2008 using a mixed methods critical discourse analysis approach, comparing representations to existing research about sexually exploited youth. Despite research evidence that equal rates of boys and girls experience exploitation, Canadian news media depicted exploited youth predominantly as heterosexual girls, and described them alternately as victims or workers in a trade, often both in the same story. News media mentioned exploiters far less often than victims, and portrayed them almost exclusively as male, most often called 'customers' or 'consumers,' and occasionally 'predators'; in contrast, research has documented the majority of sexually exploited boys report female exploiters. Few news stories over the past two decades portrayed the diversity of victims, perpetrators, and venues of exploitation reported in research. The focus on victims but not exploiters helps perpetuate stereotypes of sexual exploitation as business or a 'victimless crime,' maintains the status quo, and blurs responsibility for protecting youth under the UN Convention on the Rights of the Child. Health care providers and researchers can be advocates for accuracy in media coverage about sexual exploitation; news reporters and editors should focus on exploiters more than victims, draw on existing research evidence to avoid perpetuating stereotypes, and use accurate terms, such as commercial sexual exploitation, rather than terms related to business or trade.

  6. Simulated population responses of common carp to commercial exploitation

    Energy Technology Data Exchange (ETDEWEB)

    Weber, Michael J.; Hennen, Matthew J.; Brown, Michael L.

    2011-12-01

    Common carp Cyprinus carpio is a widespread invasive species that can become highly abundant and impose deleterious ecosystem effects. Thus, aquatic resource managers are interested in controlling common carp populations. Control of invasive common carp populations is difficult, due in part to the inherent uncertainty of how populations respond to exploitation. To understand how common carp populations respond to exploitation, we evaluated common carp population dynamics (recruitment, growth, and mortality) in three natural lakes in eastern South Dakota. Common carp exhibited similar population dynamics across these three systems that were characterized by consistent recruitment (ages 3 to 15 years present), fast growth (K = 0.37 to 0.59), and low mortality (A = 1 to 7%). We then modeled the effects of commercial exploitation on size structure, abundance, and egg production to determine its utility as a management tool to control populations. All three populations responded similarly to exploitation simulations with a 575-mm length restriction, representing commercial gear selectivity. Simulated common carp size structure modestly declined (9 to 37%) in all simulations. Abundance of common carp declined dramatically (28 to 56%) at low levels of exploitation (0 to 20%) but exploitation >40% had little additive effect and populations were only reduced by 49 to 79% despite high exploitation (>90%). Maximum lifetime egg production was reduced from 77 to 89% at a moderate level of exploitation (40%), indicating the potential for recruitment overfishing. Exploitation further reduced common carp size structure, abundance, and egg production when simulations were not size selective. Our results provide insights to how common carp populations may respond to exploitation. Although commercial exploitation may be able to partially control populations, an integrated removal approach that removes all sizes of common carp has a greater chance of controlling population abundance

  7. Host differences in response to trickle infection with Fasciola gigantica in buffalo, Ongole and Bali calves.

    Science.gov (United States)

    Wiedosari, E; Hayakawa, H; Copeman, B

    2006-01-01

    Progressive weight gain, faecal egg counts, packed cell volume, percent eosinophils in blood, serum antibody and serum levels of glutamate dehydrogenase and gamma-glutamyl transpeptidase were recorded in seven swamp buffalo (Bubalis bubalis), 7 Ongole (Bos indicus) and four Bali calves (Bos sundiacus) which were infected orally with 15 metacercariae of Fasciola gigantica twice weekly for 32 weeks. Similar observations were made on four buffalo, 4 Ongole calves and 3 Bali calves maintained fluke-free as controls. Flukes were counted at slaughter 36 weeks after initial infection. Mean daily weight gains of infected Bali (228 +/- 100 (SD) g/day) and infected Ongole calves (328 +/- 57 (SD) g/day) were lower (p = 0.026 and 0.067, respectively) than those of control calves (405 +/- 107 (SD) g/day), but infected buffalo calves (379 +/- 78 (SD) g/day) had similar weight gains to those of the controls (p = 0.57). Throughout the trial, faecal Fasciola egg counts in buffaloes were about one-fifth of counts of Ongole calves, and counts in Bali calves were intermediate. Ongole calves had three times the number of flukes at slaughter in their liver compared to buffalo and Bali calves, which had similar numbers. However, there was evidence that Bali calves had acquired a degree of resistance about 24 weeks after infection commenced and may have lost adult flukes as a consequence.

  8. Managing the Innovators for Exploration and Exploitation

    Directory of Open Access Journals (Sweden)

    C. Annique UN

    2007-09-01

    Full Text Available I analyze how to manage employees to achieve a balance between exploration and exploitation in large established firms. Previous studies suggest that, although firms need to undertake both exploration and exploitation simultaneously, this is difficult either because of the scarcity of resources or because of the incompatibility of these two processes. Proposed solutions have been ambidexterity, punctuated equilibrium or specialization. I suggest another method: managing employees. Specifically, I argue that using the so-called “innovative” system of human resource management practices, consisting of team-based incentive system, team-based job design, and job rotation, enables the firm to undertake exploration and exploitation simultaneously because it provides the psychological safety for people to explore new knowledge to make novel products and develops employees to have the perspective-taking capability that enables the integration of knowledge cross-functionally for efficiency. Using the so-called “traditional” system of human resource management practices, consisting of individual-based incentive system, individual-based job design, and no job rotation, has limited impact on either exploration or exploitation because it does not create the psychological safety for people to explore new knowledge and does not develop the perspective-taking capability needed for exploitation. Moreover, mixing practices from both systems is better than only using the traditional system in achieving exploration or exploitation, but less effective than only using the innovative system as the mix of practices can create inconsistent expectations on employees.

  9. Transnational gestational surrogacy: does it have to be exploitative?

    Science.gov (United States)

    Kirby, Jeffrey

    2014-01-01

    This article explores the controversial practice of transnational gestational surrogacy and poses a provocative question: Does it have to be exploitative? Various existing models of exploitation are considered and a novel exploitation-evaluation heuristic is introduced to assist in the analysis of the potentially exploitative dimensions/elements of complex health-related practices. On the basis of application of the heuristic, I conclude that transnational gestational surrogacy, as currently practiced in low-income country settings (such as rural, western India), is exploitative of surrogate women. Arising out of consideration of the heuristic's exploitation conditions, a set of public education and enabled choice, enhanced protections, and empowerment reforms to transnational gestational surrogacy practice is proposed that, if incorporated into a national regulatory framework and actualized within a low income country, could possibly render such practice nonexploitative.

  10. Molecular and morphological identification of Cardicola (Trematoda: Aporocotylidae) eggs in hatchery-reared and migratory Atlantic bluefin tuna (Thunnus thynnus L.)

    Czech Academy of Sciences Publication Activity Database

    Forte-Gil, D.; Holzer, Astrid S.; Pecková, Hana; Bartošová-Sojková, Pavla; Peñalver, J.; Dolores, E.M.; Muñoz, P.

    2016-01-01

    Roč. 450, JAN 1 (2016), s. 58-66 ISSN 0044-8486 R&D Projects: GA ČR GBP505/12/G112 Institutional support: RVO:60077344 Keywords : Aquaculture * Atlantic bluefin tuna * Blood fluke * Cardicola * Migration * Thunnus thynnus Subject RIV: EG - Zoology Impact factor: 2.570, year: 2016

  11. Exploitation as the Unequal Exchange of Labour : An Axiomatic Approach

    OpenAIRE

    Yoshihara, Naoki; Veneziani, Roberto

    2009-01-01

    In subsistence economies with general convex technology and rational optimising agents, a new, axiomatic approach is developed, which allows an explicit analysis of the core positive and normative intuitions behind the concept of exploitation. Three main new axioms, called Labour Exploitation in Subsistence Economies , Relational Exploitation , and Feasibility of Non-Exploitation , are presented and it is proved that they uniquely characterise a definition of exploitation conceptually related...

  12. SEXUAL EXPLOITATION AND ABUSE BY UN PEACEKEEPERS ...

    African Journals Online (AJOL)

    Allaiac

    sexual exploitation of children by peacekeepers is particularly insidious. ... sexual exploitation and abuse should involve an understanding of the social .... The charges of sexual misconduct, and the consequent media exposure, have ..... awareness programmes such as video tapes, lectures and training manuals, designed.

  13. Exploitation and exploration dynamics in recessionary times

    NARCIS (Netherlands)

    Walrave, B.

    2012-01-01

    Firm performance largely depends on the ability to adapt to, and exploit, changes in the business environment. That is, firms should maintain ecological fitness by reconfiguring their resource base to cope with emerging threats and explore new opportunities, while at the same time exploiting

  14. Main principles of developing exploitation models of semiconductor devices

    Science.gov (United States)

    Gradoboev, A. V.; Simonova, A. V.

    2018-05-01

    The paper represents primary tasks, solutions of which allow to develop the exploitation modes of semiconductor devices taking into account complex and combined influence of ionizing irradiation and operation factors. The structure of the exploitation model of the semiconductor device is presented, which is based on radiation and reliability models. Furthermore, it was shown that the exploitation model should take into account complex and combine influence of various ionizing irradiation types and operation factors. The algorithm of developing the exploitation model of the semiconductor devices is proposed. The possibility of creating the radiation model of Schottky barrier diode, Schottky field-effect transistor and Gunn diode is shown based on the available experimental data. The basic exploitation model of IR-LEDs based upon double AlGaAs heterostructures is represented. The practical application of the exploitation models will allow to output the electronic products with guaranteed operational properties.

  15. Packaging of Sin Goods - Commitment or Exploitation?

    DEFF Research Database (Denmark)

    Nafziger, Julia

    to such self-control problems, and possibly exploit them, by offering different package sizes. In a competitive market, either one or three (small, medium and large) packages are offered. In contrast to common intuition, the large, and not the small package is a commitment device. The latter serves to exploit...

  16. Eye-flukes in fish, living in cooling water from nuclear power plants

    International Nuclear Information System (INIS)

    Hoeglund, J.; Thulin, J.

    1988-01-01

    We report here on the effects of raised water temperature on the prevalence, mean infrapopulation density and consequences of eye-flukes in fish. The study was mainly performed in the Biotest basin situated 120 km north of Stockholm, Sweden. This 1 km 2 basin is an enclosed brackish water (5 permillage) area receiving heated (about 8 degree C) cooling water (90 m 3 /s) from Forsmark nuclear power station. Both morphological and experimental studies of the parasite larvae of sampled fish indicate that we are dealing with four strains of Diplostomum, two of which occur in perch and the other two in roach. Since taxonomic revisions are under hand elsewhere we prefer to name these strains Diplostomum sp1-4. Metacercariae of D.sp 1 were found between the retina and sclera in the eye of perch while that of D.sp 4 were found in the eye-lens of roach in over 90 % of fish examined. Metacercariae of the other two D.-species and of Tylodelphys clavata and Cotylurus sp were found at lower frequencies. Cercariae of Diplostomum spp were found to develop from sporocysts in snails of the genus Lymnaea. The period of cercarial shedding starts about one month earlier and is also prolonged in the Biotest basin compared to the reference locality. The infection procedure, however, is the same in both areas. During experimental infections with cercariae on yearlings of bleak we found a distinct correlation between an increased fry mortality and an increased cercariae density, a connection which was strengthened at increased water temperature. Furthermore, the results indicate that the defence mechanisms of the fish respond slower towards infections with Diplostomum spp than that is known to be the case with bacterial infections. The speed with which the metacercariae accumulate in the eye of the fish is higher in the Biotest basin than in the reference locality. In spite of this, the mean infrapopulation density of metacercariae in older fish is not higher here than in the reference

  17. A Theory of Exploitative Child Labor

    OpenAIRE

    Carol Ann Rogers; Kenneth A. Swinnerton

    2003-01-01

    Child labor laws should aim to protect children who work, instead of trying to remove children from work. In this paper, we identify an instance when the risk of exploitation lowers the expected bene…t of child labor to the child,and therefore suppresses child labor force participation. Targeted legal intervention that lowers or removes the risk of exploitation raises child participation in the labor market, child welfare, and overall societal welfare. Targeting on child labor more broadly ma...

  18. Rationalising predictors of child sexual exploitation and sex-trading.

    Science.gov (United States)

    Klatt, Thimna; Cavner, Della; Egan, Vincent

    2014-02-01

    Although there is evidence for specific risk factors leading to child sexual exploitation and prostitution, these influences overlap and have rarely been examined concurrently. The present study examined case files for 175 young persons who attended a voluntary organization in Leicester, United Kingdom, which supports people who are sexually exploited or at risk of sexual exploitation. Based on the case files, the presence or absence of known risk factors for becoming a sex worker was coded. Data were analyzed using t-test, logistic regression, and smallest space analysis. Users of the voluntary organization's services who had been sexually exploited exhibited a significantly greater number of risk factors than service users who had not been victims of sexual exploitation. The logistic regression produced a significant model fit. However, of the 14 potential predictors--many of which were associated with each other--only four variables significantly predicted actual sexual exploitation: running away, poverty, drug and/or alcohol use, and having friends or family members in prostitution. Surprisingly, running away was found to significantly decrease the odds of becoming involved in sexual exploitation. Smallest space analysis of the data revealed 5 clusters of risk factors. Two of the clusters, which reflected a desperation and need construct and immature or out-of-control lifestyles, were significantly associated with sexual exploitation. Our research suggests that some risk factors (e.g. physical and emotional abuse, early delinquency, and homelessness) for becoming involved in sexual exploitation are common but are part of the problematic milieu of the individuals affected and not directly associated with sex trading itself. Our results also indicate that it is important to engage with the families and associates of young persons at risk of becoming (or remaining) a sex worker if one wants to reduce the numbers of persons who engage in this activity. Copyright

  19. Changing the Price of Marriage: Evidence from Blood Test Requirements

    Science.gov (United States)

    Buckles, Kasey; Guldi, Melanie; Price, Joseph

    2011-01-01

    We use state repeals of blood test requirements (BTRs) for a marriage license that occurred between 1980 and 2008 to examine the impact of changes in the price of marriage on the marriage decision. Using a within-group estimator that holds constant state and year effects and exploits variation in the repeal dates of BTRs across states, we find…

  20. Shale gas exploitation: Status, problems and prospect

    Directory of Open Access Journals (Sweden)

    Shiqian Wang

    2018-02-01

    Full Text Available Over the past five years, great progress has been made in shale gas exploitation, which has become the most driving force for global gas output growth. Hydrocarbon extraction from shale helps drive the USA on the road to energy independence. Besides, shale oil & gas production has been kept in a sustained growth by continuous improvement in drilling efficiency and well productivity in the case of tumbling oil prices and rig counts. Shale gas reserves and production have been in a rapid growth in China owing to the Lower Paleozoic Wufeng and Longmaxi shale gas exploitation in the Sichuan Basin, which has become an important sector for the future increment of gas reserves and output in China. However, substantial progress has been made neither in non-marine shale gas exploitation as previously expected nor in the broad complicated tectonic areas in South China for which a considerable investment was made. Analysis of the basic situation and issues in domestic shale gas development shows that shale gas exploitation prospects are constrained by many problems in terms of resources endowment, horizontal well fracturing technology, etc. especially in non-marine shale deposits and complicated tectonic areas in South China where hot shales are widely distributed but geological structures are found severely deformed and over matured. Discussion on the prospects shows that the sustained and steady growth in shale gas reserves and production capacity in the coming years lies in the discovery and supersession of new shale plays in addition to Wufeng and Longmaxi shale plays, and that a technological breakthrough in ultra-high-pressure and ultra-deep (over 3500 m buried in the Sichuan Basin marine shale gas exploitation is the key and hope. Keywords: Shale gas, Exploitation, Marine facies, Hot shale, Resource endowment, Sichuan Basin, South China, Complicated tectonic area, Gas play

  1. The possibilities of exploitation of Serbian thermomineral waters

    International Nuclear Information System (INIS)

    Jovanovic, L.

    2002-01-01

    Global ecological problem of petrol resources deficit caused an intensive search of alternative energy sources. Deficit of conventional energy fluids in Yugoslavia requires serious efforts to create a program of alternative energy sources exploitation. Geothermal energy represents an important energetic source for the countries with poor energy resources. Geothermal energy can become the basis for economic development. At present these geothermal resources are not being exploited in Yugoslavia. The possibilities of effective exploitation of thermal and thermomineral water resources in Yugoslavia are presented in this paper

  2. Thermal Property Engineering: Exploiting the Properties of Ceramic Nanocomposites

    Science.gov (United States)

    2018-03-01

    ARL-TR-8308 ● MAR 2018 US Army Research Laboratory Thermal Property Engineering : Exploiting the Properties of Ceramic...return it to the originator. ARL-TR-8308 ● MAR 2018 US Army Research Laboratory Thermal Property Engineering : Exploiting the...2015 – Dec 31 2017 4. TITLE AND SUBTITLE Thermal Property Engineering : Exploiting the Properties of Ceramic Nanocomposites 5a. CONTRACT NUMBER 5b

  3. Rethinking exploitation: a process-centered account.

    Science.gov (United States)

    Jansen, Lynn A; Wall, Steven

    2013-12-01

    Exploitation has become an important topic in recent discussions of biomedical and research ethics. This is due in no small measure to the influence of Alan Wertheimer's path-breaking work on the subject. This paper presents some objections to Wertheimer's account of the concept. The objections attempt to show that his account places too much emphasis on outcome-based considerations and too little on process-based considerations. Building on these objections, the paper develops an alternative process-centered account of the concept. This alternative account of exploitation takes as its point of departure the broadly Kantian notion that it is wrong to use another as an instrument for the advancement of one's own ends. It sharpens this slippery notion and adds a number of refinements to it. The paper concludes by arguing that process-centered accounts of exploitation better illuminate the ethical challenges posed by research on human subjects than outcome-centered accounts.

  4. Use of ionizing radiation in the development of vaccines against Fasciola gigantica and Schistosoma bovis in Sudanese cattle, sheep and goats

    International Nuclear Information System (INIS)

    Haroun, E.M.; Yagi, A.I.; Younis, S.A.; El Sanhouri, A.A.; Gadir, H.A.; Gameel, A.A.; Bushara, H.O.

    1988-01-01

    A primary infection with Fasciola gigantica, which had been eliminated by anthelmintic treatment after eight weeks, stimulated partial resistance to homologous challenge in calves and goats. Similar sensitization with F. gigantica or Schistosoma bovis also stimulated significant resistance to heterologous challenge in calves. The level of resistance was indicated by reduced fluke recoveries from sensitized animals compared with controls, by lower values of the enzymes sorbitol dehydrogenase and glutamate dehydrogenase, indicating less hepatic damage, and by lower blood indices, indicating more severe anaemia. Infection of calves with metacercariae of F. gigantica irradiated at 30 Gy or 200 Gy resulted in mean fluke recoveries of 75 and 41 respectively, whereas 332 flukes were recovered from controls infected with non-irradiated metacercariae. The flukes recovered from animals infected with irradiated metacercariae were stunted and resided in the small bile ductules. Sensitization for eight weeks with metacercariae of F. gigantica irradiated at 30 Gy resulted in significant resistance in calves, sheep and goats to homologous challenge. Significant resistance was also stimulated in calves by sensitization for eight weeks with metacercariae of F. gigantica irradiated at 200 Gy. However, sensitization for four weeks with F. gigantica irradiated at 30 Gy failed to stimulate significant resistance in calves to homologous challenge, but similar sensitization, twice at an interval of four weeks, resulted in an average reduction of 62% in fluke recovery from calves with homologous challenge. This reduction was, however, statistically insignificant. Moreover, sensitization for eight weeks with cercariae of Schistosoma bovis irradiated at 30 Gy did not stimulate heterologous resistance in calves or goats to F. gigantica. A similar result was also obtained after sensitization of calves for 36 weeks with cercariae of S. bovis irradiated at 30 Gy before challenge with F

  5. Neurological and ocular fascioliasis in humans.

    Science.gov (United States)

    Mas-Coma, Santiago; Agramunt, Verónica H; Valero, María Adela

    2014-01-01

    techniques and neuroimaging useful for the diagnosis of neurological cases are exposed. Within fascioliasis infection indirectly causing ocular manifestations, case distribution and frequency are similarly analysed. A short analysis is devoted to clarify the first reports of a human eye infection. The affection of related and close organs is discussed by differentiating between cases of the dorsal spine, pulmonary manifestations, heart and vessel affection, findings in blood vessels, skin and dermatologic reactions, cases of ectopic mature flukes, and upper body locations. The clinical complexity of the puzzling polymorphisms, the disconcerting multifocality of the manifestations, and their changes along the evolution of the disease in the same patient, as well as the differences between the clinical pictures shown by different patients, are highlighted. The many syndromes involved are enumerated. The pathogenic and physiological mechanisms underlying neurofascioliasis and ophthalmofascioliasis caused by ectopic flukes and the physiopathogenic processes indirectly affecting the central nervous system and causing genuine neurological, meningeal, psychiatric, and ocular manifestations are discussed. The diagnosis of neurological and ophthalmologic fascioliasis is analysed in depth, including clinical and paraclinical diagnosis, eosinophilia in the blood and cerebrospinal fluid, differential diagnosis from other parasitic infections such as helminthiases and myiases, an update of human fascioliasis diagnosis, and fluke and/or fluke egg recovery by surgery. Diagnostic analyses with faecal and blood samples for fascioliasis patients are updated. Therapy for patients with major neurological manifestations includes both antiparasitic treatments and anti-inflammatory therapeutics. Prognosis in fascioliasis patients with neurological manifestations is discussed, with emphasis on sequelae and fatal cases, and the care of patients with ophthalmologic manifestations is added

  6. The Theory of Exploitation as the Unequal Exchange of Labour

    OpenAIRE

    Veneziani, Roberto; Yoshihara, Naoki

    2016-01-01

    This paper analyses the normative and positive foundations of the theory of exploitation as the unequal exchange of labour (UEL). The key intuitions behind all of the main approaches to UEL exploitation are explicitly analysed as a series of formal claims in a general economic environment. It is then argued that these intuitions can be captured by one fundamental axiom - called Labour Exploitation - which defines the basic domain of all UEL exploitation forms and identifies the formal and the...

  7. The theory of exploitation as the unequal exchange of labour

    OpenAIRE

    Veneziani, Roberto; Yoshihara, Naoki

    2017-01-01

    This paper analyses the normative and positive foundations of the theory of exploitation as the unequal exchange of labour (UEL). The key intuitions behind all of the main approaches to UEL exploitation are explicitly analysed as a series of formal claims in a general economic environment. It is then argued that these intuitions can be captured by one fundamental axiom - called Labour Exploitation - which defines the basic domain of all UEL exploitation forms and identifies the formal and the...

  8. Fishery Development and Exploitation in South East Australia

    Directory of Open Access Journals (Sweden)

    Camilla Novaglio

    2018-04-01

    Full Text Available Understanding the full extent of past ecological changes in human-influenced marine systems is needed to inform present management policies, but is often hampered by the scarcity of information about exploitation practices and population status over the entire history of fishing. The history of commercial fishing in South East Australia is relatively recent and thus easier to document. Our aim is to reconstruct such history and to use this information to understand general patterns and consequences of fishing exploitation. Intense exploitation of marine resources arrived in South East Australia with European colonization in the early 1800s, and unregulated sealing, whaling and oyster dredging resulted in the first documented significant impact on local marine populations. Exploitation extended to demersal resources in 1915 when the trawl fishery developed. Between the early 1800s and the 1980s, some of the exploited stocks collapsed, but fishing moved further offshore and in deeper waters as technology improved and new resources became available or were discovered. This phase of fisheries expansion masked the unsustainable nature of some fishing industries, such as trawling and whaling, and postponed the need for management regulations. From the 1990s onward, an increasing awareness of the depleted nature of some fisheries led to the establishment of management strategies aiming at a more sustainable exploitation of target stocks and, from the mid-2000s onwards, management strategies were revised and improved to better address the effect of fishing on multiple components of marine ecosystems. This led to the recovery of some depleted populations and to increased habitat protection. The relatively short history of fishing exploitation and the small scale of the fishing industry in South East Australia played a significant role in limiting the magnitude of fishing impacts on local populations and helped to achieve recoveries when fisheries

  9. Pathology and clinicopathology of buffalo against trickle infection with Fasciola gigantica

    Directory of Open Access Journals (Sweden)

    Ening Wiedosari

    1998-06-01

    Full Text Available Eleven male buffalo calves were divided into infected group of 7 animals and non-infected control group of 4 animals. The infected group was then inoculated with trickle doses of 15 Inetacercariae of Fasciola gigantica twice weekly for 32 weeks and killed 36 weeks after first infection. There were no clinical symptoms observed . Infected and non-infected buffaloes, had similar values of packed cell volume, haemoglobin and red blood cell counts . In infected buffaloes, plasma glutamate dehydrogenase enzyme activity increased in proportion to the dregree of hepatocyte destruction level and evidence of necrosis caused by the migrating of immature flukes through the parenchyma prior to their entry into the bile ducts. While the values of plasma glutamyl transpeptidase showed only a minimal rise with a small peak in week 20 as evidenced by histological observation that infected caused limited damage to epithelial surface of the bile duct . These results indicates that, the resistance mechaninisms of buffalo against fasciolosis infection occurred in the liver or before flukes entering into the bile ducts. These results seem to indicate that, in buffalo, resistance mechanisms to fasciolosis infection occured in the liver or before flukes entry into the bile ducts.

  10. From Exploitation to Industry: Definitions, Risks, and Consequences of Domestic Sexual Exploitation and Sex Work Among Women and Girls.

    Science.gov (United States)

    Gerassi, Lara

    In the last 15 years, terms such as prostitution, sex trafficking, sexual exploitation, modern-day slavery, and sex work have elicited much confusion and debate as to their definitions. Consequently several challenges have emerged for both law enforcement in the prosecution of criminals and practitioners in service provision. This article reviews the state of the literature with regard to domestic, sexual exploitation among women and girls in the United States and seeks to (1) provide definitions and describe the complexity of all terms relating to domestic sexual exploitation of women and girls in the United States, (2) explore available national prevalence data according to the definitions provided, and (3) review the evidence of mental health, social, and structural risk factors at the micro-, mezzo-, and macrolevels.

  11. The ESA Geohazard Exploitation Platform

    Science.gov (United States)

    Bally, Philippe; Laur, Henri; Mathieu, Pierre-Philippe; Pinto, Salvatore

    2015-04-01

    Earthquakes represent one of the world's most significant hazards in terms both of loss of life and damages. In the first decade of the 21st century, earthquakes accounted for 60 percent of fatalities from natural disasters, according to the United Nations International Strategy for Disaster Reduction (UNISDR). To support mitigation activities designed to assess and reduce risks and improve response in emergency situations, satellite EO can be used to provide a broad range of geo-information services. This includes for instance crustal block boundary mapping to better characterize active faults, strain rate mapping to assess how rapidly faults are deforming, soil vulnerability mapping to help estimate how the soil is behaving in reaction to seismic phenomena, geo-information to assess the extent and intensity of the earthquake impact on man-made structures and formulate assumptions on the evolution of the seismic sequence, i.e. where local aftershocks or future main shocks (on nearby faults) are most likely to occur. In May 2012, the European Space Agency and the GEO Secretariat convened the International Forum on Satellite EO for Geohazards now known as the Santorini Conference. The event was the continuation of a series of international workshops such as those organized by the Geohazards Theme of the Integrated Global Observing Strategy Partnership. In Santorini the seismic community has set out a vision of the EO contribution to an operational global seismic risk program, which lead to the Geohazard Supersites and Natural Laboratories (GSNL) initiative. The initial contribution of ESA to suuport the GSNL was the first Supersites Exploitation Platform (SSEP) system in the framework of Grid Processing On Demand (GPOD), now followed by the Geohazard Exploitation Platform (GEP). In this presentation, we will describe the contribution of the GEP for exploiting satellite EO for geohazard risk assessment. It is supporting the GEO Supersites and has been further

  12. Oil exploitation and the environmental Kuznets curve

    International Nuclear Information System (INIS)

    Esmaeili, Abdoulkarim; Abdollahzadeh, Negar

    2009-01-01

    This study refers to a panel estimation of an environmental Kuznets curve (EKC) for oil to determine the factors most affecting oil exploitation in 38 oil-producing countries during 1990-2000. Control variables such as oil reserves, oil price, population, political rights, and the Gini index were used to determine its contribution to the main EKC model. The empirical results fully support the existence of an EKC for oil exploitation. Furthermore, the result indicates that the proved oil reserves has a significant and positive role in oil production, but oil price and population do not significantly affect crude oil production. Also, increased freedoms and a better income distribution will reduce the rate of oil exploitation. Thus, policies aiming at enhancing democratic society and better income distribution would be more compatible with sustainability. (author)

  13. Oil exploitation and the environmental Kuznets curve

    Energy Technology Data Exchange (ETDEWEB)

    Esmaeili, Abdoulkarim; Abdollahzadeh, Negar [Department of Agricultural Economics, College of Agriculture, Shiraz University, Shiraz, Fars (Iran)

    2009-01-15

    This study refers to a panel estimation of an environmental Kuznets curve (EKC) for oil to determine the factors most affecting oil exploitation in 38 oil-producing countries during 1990-2000. Control variables such as oil reserves, oil price, population, political rights, and the Gini index were used to determine its contribution to the main EKC model. The empirical results fully support the existence of an EKC for oil exploitation. Furthermore, the result indicates that the proved oil reserves has a significant and positive role in oil production, but oil price and population do not significantly affect crude oil production. Also, increased freedoms and a better income distribution will reduce the rate of oil exploitation. Thus, policies aiming at enhancing democratic society and better income distribution would be more compatible with sustainability. (author)

  14. Prevalence of Snail Vectors of Schistosomiasis in the Kpong Head ...

    African Journals Online (AJOL)

    Schistosomiasis, a parasitic disease caused by the blood fluke Schistosoma sp. became a serious public health problem in Ghana after the Volta River was dammed in Akosombo in 1964. The formation of the Kpong head pond, about 25 km below the Akosombo dam, as a result of a second dam built at Kpong became an ...

  15. Security option file - Exploitation (DOS-Expl)

    International Nuclear Information System (INIS)

    2016-01-01

    This document aims at presenting functions performed by Cigeo during its exploitation phase, its main technical and security options which are envisaged with respect to different types of internal or external risks, and a first assessment of its impact on mankind and on the environment during its exploitation in normal operation as well as in incidental or accidental situations. A first volume addresses security principles, approach and management in relationship with the legal and regulatory framework. The second volume presents input data related to waste parcels and used for the installation sizing and operation, the main site characteristics, the main technical options regarding structures and equipment, and the main options regarding exploitation (parcel management, organisational and human aspects, and effluent management). The third volume describes how parcel are processed from their arrival to their setting in storage compartment, an inventory of internal and external risks, and a first assessment of consequences of scenarios on mankind and on the environment. The fourth volume presents options and operations which are envisaged regarding Cigeo closure, and inventory of associated risks

  16. From Exploitation to Industry: Definitions, Risks, and Consequences of Domestic Sexual Exploitation and Sex Work Among Women and Girls

    Science.gov (United States)

    Gerassi, Lara

    2015-01-01

    In the last 15 years, terms such as prostitution, sex trafficking, sexual exploitation, modern-day slavery, and sex work have elicited much confusion and debate as to their definitions. Consequently several challenges have emerged for both law enforcement in the prosecution of criminals and practitioners in service provision. This article reviews the state of the literature with regard to domestic, sexual exploitation among women and girls in the United States and seeks to (1) provide definitions and describe the complexity of all terms relating to domestic sexual exploitation of women and girls in the United States, (2) explore available national prevalence data according to the definitions provided, and (3) review the evidence of mental health, social, and structural risk factors at the micro-, mezzo-, and macrolevels. PMID:26726289

  17. Early Sexual Exploitation as an Influence in Prostitution.

    Science.gov (United States)

    Silbert, Mimi H.; Pines, Ayala M.

    1983-01-01

    Surveyed 200 female street prostitutes to determine whether they were sexually exploited during childhood. Results showed 60 percent of the subjects were sexually exploited. The few girls who discussed their abuse with others were met with shame and most often inaction. Only 10 percent were abused by strangers. (JAC)

  18. Dissemination and Exploitation: Project Goals beyond Science

    Science.gov (United States)

    Hamann, Kristin; Reitz, Anja

    2017-04-01

    Dissemination and Exploitation are essential parts of public funded projects. In Horizon 2020 a plan for the exploitation and dissemination of results (PEDR) is a requirement. The plan should contain a clear vision on the objectives of the project in relation to actions for dissemination and potential exploitation of the project results. The actions follow the basic idea to spread the knowledge and results gathered within the project and face the challenge of how to bring the results into potentially relevant policy circle and how they impact the market. The plan follows the purpose to assess the impact of the project and to address various target groups who are interested in the project results. Simply put, dissemination concentrates on the transfer of knowledge and exploitation on the commercialization of the project. Beyond the question of the measurability of project`s impact, strategies within science marketing can serve purposes beyond internal and external communication. Accordingly, project managers are facing the challenge to implement a dissemination and exploitation strategy that ideally supports the identification of all partners with the project and matches the current discourse of the project`s content within the society, politics and economy. A consolidated plan might unite all projects partners under a central idea and supports the identification with the project beyond the individual research questions. Which applications, strategies and methods can be used to bring forward a PEDR that accompanies a project successfully and allows a comprehensive assessment of the project afterwards? Which hurdles might project managers experience in the dissemination process and which tasks should be fulfilled by the project manager?

  19. [Ecotourism exploitation model in Bita Lake Natural Reserve of Yunnan].

    Science.gov (United States)

    Yang, G; Wang, Y; Zhong, L

    2000-12-01

    Bita lake provincial natural reserve is located in Shangri-La region of North-western Yunnan, and was set as a demonstrating area for ecotourism exploitation in 1998. After a year's exploitation construction and half a year's operation as a branch of the 99' Kunming International Horticulture Exposition to accept tourists, it was proved that the ecotourism demonstrating area attained four integrated functions of ecotourism, i.e., tourism, protection, poverty clearing and environment education. Five exploitation and management models including function zoned exploitation model, featured tourism communication model signs system designing model, local Tibetan family reception model and environmental monitoring model, were also successful, which were demonstrated and spreaded to the whole province. Bita lake provincial natural reserve could be a good sample for the ecotourism exploitation natural reserves of the whole country.

  20. Molecular characterization and phylogenetic analysis of Fasciola gigantica from western Java, Indonesia.

    Science.gov (United States)

    Hayashi, Kei; Ichikawa-Seki, Madoka; Allamanda, Puttik; Wibowo, Putut Eko; Mohanta, Uday Kumar; Sodirun; Guswanto, Azirwan; Nishikawa, Yoshifumi

    2016-10-01

    Fasciola gigantica and aspermic (hybrid) Fasciola flukes are thought to be distributed in Southeast Asian countries. The objectives of this study were to investigate the distribution of these flukes from unidentified ruminants in western Java, Indonesia, and to determine their distribution history into the area. Sixty Fasciola flukes from western Java were identified as F. gigantica based on the nucleotide sequences of the nuclear phosphoenolpyruvate carboxykinase (pepck) and DNA polymerase delta (pold) genes. The flukes were then analyzed phylogenetically based on the nucleotide sequence of the mitochondrial NADH dehydrogenase subunit 1 (nad1) gene, together with Fasciola flukes from other Asian countries. All but one F. gigantica fluke were classified in F. gigantica haplogroup C, which mainly contains nad1 haplotypes detected in flukes from Thailand, Vietnam, and China. A population genetic analysis suggested that haplogroup C spread from Thailand to the neighboring countries including Indonesia together with domestic ruminants, such as the swamp buffalo, Bubalus bubalis. The swamp buffalo is one of the important definitive hosts of Fasciola flukes in Indonesia, and is considered to have been domesticated in the north of Thailand. The remaining one fluke displayed a novel nad1 haplotype that has never been detected in the reference countries. Therefore, the origin of the fluke could not be established. No hybrid Fasciola flukes were detected in this study, in contrast to neighboring Asian countries. Copyright © 2016. Published by Elsevier Ireland Ltd.

  1. Exploitation program of ''Adamow'' quarry up to 2015

    International Nuclear Information System (INIS)

    Hadlaw, A.

    1994-01-01

    The brown coal deposits exploited by the quarry ''Adamow'' located in Central Poland are shortly described and the prognosis of their exploitation up to 2015 is given. The basis data on the perspective deposits in the quarry's area are also presented. All deposits are shown on the map. 3 ills, 2 tabs

  2. zero day exploits and national readiness for cyber-warfare

    African Journals Online (AJOL)

    HOD

    A zero day vulnerability is an unknown exploit that divulges security flaws in software before such a flaw is publicly ... Keywords: exploits, zero day, vulnerability, cyberspace, cyber-warfare. 1. ..... industries and companies across the globe. The.

  3. Continuous blood fractionation using an array of slanted grooves

    Science.gov (United States)

    Bernate, Jorge A.; Chengxun, Liu; Lagae, Liesbet; Drazer, German

    2011-11-01

    Blood is a complex fluid having different specialized biological functions and containing a plethora of clinical information. The separation of different blood components is a crucial step in many research and clinical applications. In this work we take advantage of the flow characteristics in microfluidic devices in which the bottom surface is patterned with slanted rectangular grooves to continuously fractionate blood. We exploit the flow in the vicinity of the patterned surface when the dimensions of the grooves are much smaller than the dimensions of the main channel. In these devices, we observed that the grooves act as open channels guiding flow along them with the flow over them being in the direction of the main channel. We present experiments in which the different blood components are deflected laterally to a different extent by the flow along the grooves depending on their sedimentation velocity, which allows their continuous fractionation. In particular, the heavier red blood cells experience the largest deflection while the lighter white blood cells deflect the least, allowing their passive and minimally invasive isolation. In addition, this fluidic platform can also be used to separate magnetically labeled circulating cancer cells which can be retained in the flow along the grooves using a sufficiently strong magnetic force.

  4. From Exploitation to Industry: Definitions, Risks, and Consequences of Domestic Sexual Exploitation and Sex Work Among Women and Girls

    OpenAIRE

    Gerassi, Lara

    2015-01-01

    In the last 15 years, terms such as prostitution, sex trafficking, sexual exploitation, modern-day slavery, and sex work have elicited much confusion and debate as to their definitions. Consequently several challenges have emerged for both law enforcement in the prosecution of criminals and practitioners in service provision. This article reviews the state of the literature with regard to domestic, sexual exploitation among women and girls in the United States and seeks to (1) provide definit...

  5. Teotihuacan, tepeapulco, and obsidian exploitation.

    Science.gov (United States)

    Charlton, T H

    1978-06-16

    Current cultural ecological models of the development of civilization in central Mexico emphasize the role of subsistence production techniques and organization. The recent use of established and productive archeological surface survey techniques along natural corridors of communication between favorable niches for cultural development within the Central Mexican symbiotic region resulted in the location of sites that indicate an early development of a decentralized resource exploitation, manufacturing, and exchange network. The association of the development of this system with Teotihuacán indicates the importance such nonsubsistence production and exchange had in the evolution of this first central Mexican civilization. The later expansion of Teotihuacán into more distant areas of Mesoamerica was based on this resource exploitation model. Later civilizations centered at Tula and Tenochtitlán also used such a model in their expansion.

  6. Aspects économiques de l'exploitation des resources halieutiques ...

    African Journals Online (AJOL)

    Aspects économiques de l'exploitation des resources halieutiques des petits barrages du Nord de la Côte d' lvoire : Economic aspects of the exploitation of halieutic resources of petits barrages inland waters in the north of Côte d'lvoire.

  7. Information source exploitation/exploration and NPD decision-making

    DEFF Research Database (Denmark)

    Jespersen, Kristina Risom

    different Scandinavian companies. Data was analyzed using hierarchical regression models across decision criteria dimensions and NPD stages as well as analyzing the combination of selected information sources. Rather than forwarding one optimal search behavior for the entire NPD process, we find optimal...... information search behavior at either end of the exploitation/exploration continuum. Additionally, we find that overexploitation and overexploration is caused by managerial bias. This creates managerial misbehavior at gate decision-points of the NPD process.......The purpose of this study is to examine how the exploration/exploitation continuum is applied by decision-makers in new product gate decision-making. Specifically, we analyze at gate decision-points how the evaluation of a new product project is affected by the information source exploitation...

  8. Exploiting opportunities at all cost? Entrepreneurial intent and externalities

    NARCIS (Netherlands)

    Urbig, D.; Weitzel, G.U.; Rosenkranz, S.; van Witteloostuijn, A.

    2011-01-01

    they exploit welfare-enhancing opportunities as it is assumed in several normative models? Do we need to prevent potential entrepreneurs from being destructive or are there intrinsic limits to harm others? We experimentally investigate how people with different entrepreneurial intent exploit risky

  9. Distribution and habitats of the snail Lymnaea truncatula, intermediate host of the liver fluke Fasciola hepatica, in South Africa

    Directory of Open Access Journals (Sweden)

    K.N. de Kock

    2003-07-01

    Full Text Available This paper focuses on the geographical distribution and habitats of Lymnaea truncatula, the intermediate, snail host of the liver fluke, Fasciola hepatica, as reflected by the 723 samples in the database of the National Freshwater Snail Collection, Potchefstroom, South Africa. The 221 different loci (1/16-degree squares on record reflect an extensive but discontinuous distribution, except in Lesotho and in parts of the Mpumalanga, Gauteng and North West provinces of South Africa. Although recorded from 12 different types of waterbody, it was mostly (42.0 % recovered from swamps. Most samples (45.8 % were collected in habitats with slow-flowing water. A muddy substratum was recorded for 62.5 % of the samples. Most samples (86.3 % were collected in habitats with a mean annual air temperature of 10-20 o C, and more than 69 % came from localities with a mean annual rainfall of 600-900mm. An integrated decision tree constructed from the data indicated that temperature and types of waterbody play a decisive role in determining the presence of L. truncatula in a given area. A temperature index calculated for all mollusc species ranked L. truncatula second in a total of 53 species according to its association with low temperatures. It remains to be established whether its distribution is indeed discontinuous, and whether its preference for a particular habitat, amphibious habits and ability to aestivate could have resulted in some populations having been overlooked during surveys.

  10. Fluid Mechanics of Blood Clot Formation.

    Science.gov (United States)

    Fogelson, Aaron L; Neeves, Keith B

    2015-01-01

    Intravascular blood clots form in an environment in which hydrodynamic forces dominate and in which fluid-mediated transport is the primary means of moving material. The clotting system has evolved to exploit fluid dynamic mechanisms and to overcome fluid dynamic challenges to ensure that clots that preserve vascular integrity can form over the wide range of flow conditions found in the circulation. Fluid-mediated interactions between the many large deformable red blood cells and the few small rigid platelets lead to high platelet concentrations near vessel walls where platelets contribute to clotting. Receptor-ligand pairs with diverse kinetic and mechanical characteristics work synergistically to arrest rapidly flowing cells on an injured vessel. Variations in hydrodynamic stresses switch on and off the function of key clotting polymers. Protein transport to, from, and within a developing clot determines whether and how fast it grows. We review ongoing experimental and modeling research to understand these and related phenomena.

  11. Exploitation and Utilization of Oilfield Geothermal Resources in China

    Directory of Open Access Journals (Sweden)

    Shejiao Wang

    2016-09-01

    Full Text Available Geothermal energy is a clean, green renewable resource, which can be utilized for power generation, heating, cooling, and could effectively replace oil, gas, and coal. In recent years, oil companies have put more efforts into exploiting and utilizing geothermal energy with advanced technologies for heat-tracing oil gathering and transportation, central heating, etc., which has not only reduced resource waste, but also improved large-scale and industrial resource utilization levels, and has achieved remarkable economic and social benefits. Based on the analysis of oilfield geothermal energy development status, resource potential, and exploitation and utilization modes, the advantages and disadvantages of harnessing oilfield geothermal resource have been discussed. Oilfield geothermal energy exploitation and utilization have advantages in resources, technical personnel, technology, and a large number of abandoned wells that could be reconstructed and utilized. Due to the high heat demand in oilfields, geothermal energy exploitation and utilization can effectively replace oil, gas, coal, and other fossil fuels, and has bright prospects. The key factors limiting oilfield geothermal energy exploitation and utilization are also pointed out in this paper, including immature technologies, lack of overall planning, lack of standards in resource assessment, and economic assessment, lack of incentive policies, etc.

  12. Network exploitation using WAMI tracks

    Science.gov (United States)

    Rimey, Ray; Record, Jim; Keefe, Dan; Kennedy, Levi; Cramer, Chris

    2011-06-01

    Creating and exploiting network models from wide area motion imagery (WAMI) is an important task for intelligence analysis. Tracks of entities observed moving in the WAMI sensor data are extracted, then large numbers of tracks are studied over long time intervals to determine specific locations that are visited (e.g., buildings in an urban environment), what locations are related to other locations, and the function of each location. This paper describes several parts of the network detection/exploitation problem, and summarizes a solution technique for each: (a) Detecting nodes; (b) Detecting links between known nodes; (c) Node attributes to characterize a node; (d) Link attributes to characterize each link; (e) Link structure inferred from node attributes and vice versa; and (f) Decomposing a detected network into smaller networks. Experimental results are presented for each solution technique, and those are used to discuss issues for each problem part and its solution technique.

  13. Improving the blood supply chain: simulation and optimisation models to support collection, production and location-allocation decisions

    OpenAIRE

    Osorio Muriel, Andres

    2016-01-01

    This thesis introduces and studies different problems in the blood supply chain. The problems are focused on aspects less frequently studied in the literature such as the exploitation of the different collection and production alternatives, consideration of multiple products and uncertainty in demand and supply. These important features can be found in different decision levels, including daily collections, annual planning and at the strategic level when the blood supply chain is designed. Fo...

  14. Nanostructured Basaltfiberconcrete Exploitational Characteristics

    Science.gov (United States)

    Saraykina, K. A.; Shamanov, V. A.

    2017-11-01

    The article demonstrates that the mass use of basalt fiber concrete (BFC) is constrained by insufficient study of their durability and serviceability in a variety of environments. This research is aimed at the study of the basalt fiber corrosion processes in the cement stone of BFC, the control of the new products structure formation in order to protect the reinforcing fiber from alkaline destruction and thereby improve the exploitational characteristics of the composite. The research result revealed that the modification of basaltfiber concrete by the dispersion of MWNTs contributes to the directional formation of new products in the cement matrix. The HAM additive in basaltfiberconcrete provides for the binding of portlandite to low-basic calcium hydroaluminosilicates, thus reducing the aggressive effect of the cement environment on the reinforcing fibers properties. The complex modification of BFC with nanostructured additives provides for an increase in its durability and exploitational properties (strength, frost resistance and water resistance) due to basalt fiber protection from alkali corrosion on account of the compacting of the contact zone “basalt fiber - cement stone” and designing of the new products structure and morphology of cement matrix over the fiber surface.

  15. On species preservation and Non-Cooperative Exploiters

    DEFF Research Database (Denmark)

    Kronbak, Lone Grønbæk; Lindroos, Marko

    cases where several non-cooperative exploiters are involved in mixed fisheries. This paper is targeting biodiversity preservation by setting up a two species model with the aim of ensuring both species survive harvesting of exploiters adapting a non-cooperative behaviour. The model starts out as a multi......-species model without biological dependency and is then modified to include also biological dependency. We contribute to the literature by analytically finding the limits on the number of players preserving both species including the conditions to be satisfied. For visual purposes we simulate a two species...

  16. Trolling may intensify exploitation in crappie fisheries

    Science.gov (United States)

    Meals, K. O.; Dunn, A. W.; Miranda, Leandro E.

    2012-01-01

    In some parts of the USA, anglers targeting crappies Pomoxis spp. are transitioning from mostly stationary angling with a single pole around submerged structures to using multiple poles while drifting with the wind or under power. This shift in fishing methods could result in a change in catch efficiency, possibly increasing exploitation rates to levels that would be of concern to managers. We studied the catch statistics of anglers fishing while trolling with multiple poles (trollers) and those fishing with single poles (polers) in Mississippi reservoirs. Specifically, we tested whether (1) various catch statistics differed between trollers and polers, (2) catch rates of trollers were related to the number of poles fished, and (3) trollers could raise exploitation rates to potentially unsustainable levels. Results showed that participation in the crappie fisheries was about equally split between polers and trollers. In spring, 90% of crappie anglers were polers; in summer, 85% of crappie anglers were trollers. The size of harvested crappies was similar for the two angler groups, but the catch per hour was almost three times higher for trollers than for polers. Catch rates by trollers were directly correlated to the number of poles fished, although the relationship flattened as the number of poles increased. The average harvest rate for one troller fishing with three poles was similar to the harvest rate obtained by one poler. Simulations predicted that at the existing mix of about 50% polers and 50% trollers and with no restrictions on the number of poles used by trollers, exploitation of crappies is about 1.3 times higher than that in a polers-only fishery; under a scenario in which 100% of crappie anglers were trollers, exploitation was forecasted to increase to about 1.7 times the polers-only rate. The efficiency of trolling for crappies should be of concern to fishery managers because crappie fisheries are mostly consumptive and may increase exploitation

  17. Comparative Transcriptomic Exploration Reveals Unique Molecular Adaptations of Neuropathogenic Trichobilharzia to Invade and Parasitize Its Avian Definitive Host.

    Directory of Open Access Journals (Sweden)

    Roman Leontovyč

    2016-02-01

    Full Text Available To date, most molecular investigations of schistosomatids have focused principally on blood flukes (schistosomes of humans. Despite the clinical importance of cercarial dermatitis in humans caused by Trichobilharzia regenti and the serious neuropathologic disease that this parasite causes in its permissive avian hosts and accidental mammalian hosts, almost nothing is known about the molecular aspects of how this fluke invades its hosts, migrates in host tissues and how it interacts with its hosts' immune system. Here, we explored selected aspects using a transcriptomic-bioinformatic approach. To do this, we sequenced, assembled and annotated the transcriptome representing two consecutive life stages (cercariae and schistosomula of T. regenti involved in the first phases of infection of the avian host. We identified key biological and metabolic pathways specific to each of these two developmental stages and also undertook comparative analyses using data available for taxonomically related blood flukes of the genus Schistosoma. Detailed comparative analyses revealed the unique involvement of carbohydrate metabolism, translation and amino acid metabolism, and calcium in T. regenti cercariae during their invasion and in growth and development, as well as the roles of cell adhesion molecules, microaerobic metabolism (citrate cycle and oxidative phosphorylation, peptidases (cathepsins and other histolytic and lysozomal proteins in schistosomula during their particular migration in neural tissues of the avian host. In conclusion, the present transcriptomic exploration provides new and significant insights into the molecular biology of T. regenti, which should underpin future genomic and proteomic investigations of T. regenti and, importantly, provides a useful starting point for a range of comparative studies of schistosomatids and other trematodes.

  18. Models of Social Exploitation with Special Emphasis on Slovenc Traffic Economics

    Directory of Open Access Journals (Sweden)

    Iztok Ostan

    2005-01-01

    Full Text Available In order to decipher the organisational behaviour operatingin the transport sector of the economy it is necessary to discoverthe prevalent patterns of social exploitation at work. PreliminaJyresults of a study of experienced irregular traffic studentsshow that, according to them there is no significant differencein Slovenia between exploitation in traffic and other sectors.Thus, general models of exploitation could be used to explainthe behaviour in the traffic sector. Empirical research amongSlovene students showed that according to their statements inthe 90s the managerial and capitalistic types of exploitation prevailedin Slovenia over non-exploitative types of economic behaviour.It also showed that statements of students do not differmuch from those of the general public regarding this question,nor from the statements of irregular students with extensivework experience. It was also found that there were no substantialdifferences between the statements of Italian and Slovenestudents regarding the type of exploitation operative in theircountries. Students of traffic are basically of the same opinionregarding this topic as students in general, though slightly morecritical, especially towards business managers and politicians.

  19. Detection of endotoxins and other pyrogens using human whole blood.

    Science.gov (United States)

    Fennrich, S; Fischer, M; Hartung, T; Lexa, P; Montag-Lessing, T; Sonntag, H G; Weigandt, M; Wendel, A

    1999-01-01

    When cells of the immune system, i.e. primarily blood monocytes and macrophages, come into contact with pyrogens (fever-inducing contaminations) they release mediators transmitting the fever reaction through the organism to the thermoregulatory centres of the brain. The new test discussed here exploits this reaction for the detection of pyrogens: human whole blood taken from healthy volunteers is incubated in the presence of the test sample. If there is pyrogen contamination, the endogenous pyrogen interleukin-1 is released, which is then determined by ELISA. According to the pharmacopoeia, the rabbit pyrogen test determines the fever reaction following injection of a test sample. In comparison, the new whole blood assay is more sensitive, less expensive and determines the reaction of the targeted species. Compared to the well established in vitro alternative, i.e. the limulus amebocyte lysate assay (LAL), the new blood assay is not restricted to endotoxins of gram-negative bacteria, it is not affected by endotoxin-binding blood proteins and it reflects the potency of different endotoxin preparations in mammals. Here, interim results of the ongoing optimization and pre-validation are reported and the present state of the evaluation for biological and pharmaceutical drugs are presented.

  20. Understanding the main route of drug entry in adult Fasciola hepatica: Further insights into closantel pharmacological activity.

    Science.gov (United States)

    Ceballos, L; Canton, C; Cadenazzi, G; Larsen, K; Virkel, G; Moreno, L; Fairweather, I; Lanusse, C; Alvarez, L

    2017-10-01

    Closantel (CLS) is highly effective against adult liver flukes after its oral or subcutaneous (sc) administration in ruminants. Trans-tegumental diffusion and oral ingestion are the two potential routes available for the entry of drugs into Fasciola hepatica. The work reported here contributes to improve the understanding of CLS pharmacology. The main goals of were: I) to determine the pattern of in vivo CLS accumulation into adult F. hepatica and relevant tissues in CLS-treated sheep; II) to investigate the influence of the physicochemical composition of the incubation medium on the CLS diffusion process into adult F. hepatica; III) to assess the ovicidal activity of CLS against F. hepatica eggs; and IV) to investigate the in vivo effect of CLS treatment on glutathione S-transferases activity in adult liver flukes exposed to CLS. Fourteen healthy sheep were each orally infected with 75 F. hepatica metacercariae. Sixteen (16) weeks after infection, animals were treated with CLS by oral (n = 6, 10 mg/kg) or sub-cutaneous (sc) (n = 6, 5 mg/kg) route. At 12, 24 and 36 h post-treatment, animals were sacrificed (n = 2) and samples of blood, bile and adult F. hepatica were collected. In addition, flukes recovered from non-treated sheep (n = 2) were ex vivo incubated (60 min) in the presence of CLS in either RPMI or bile as incubation medium. CLS concentration was measured by HPLC. The ovicidal activity of CLS was investigated using eggs obtained from the bile of untreated sheep. Finally, glutathione S-transferase activity in F. hepatica recovered from untreated and CLS-treated sheep was assessed. In the in vivo studies, the highest CLS concentrations were measured in plasma and adult liver flukes. A positive correlation was observed between CLS concentration in plasma and in F. hepatica. Results obtained in the current work indicate that the in vivo accumulation of CLS into adult liver flukes occurs mainly by the oral route. After ex

  1. Meaning, function and methods of the recultivation in mining exploitation

    OpenAIRE

    Dambov, Risto; Ljatifi, Ejup

    2015-01-01

    With the exploitation of mineral resources is performed degradation and deformation of the relief and the general part of surface of the Earth's crust. Depending on the type of open pit mine, this degradation can be expressed to a lesser or greater extent, and sometimes in several square kilometers. The exploitation of mineral resources is with unbreakable link with the environment. Very often it is said that mining is „enemy No. 1“ for environment. With exploitation comes to degradation of h...

  2. Investigating the impact of fasciolosis on cattle carcase performance.

    Science.gov (United States)

    Sanchez-Vazquez, Manuel J; Lewis, Fraser I

    2013-03-31

    Liver fluke is a manifestation of bovine fasciolosis and its presence is compulsorily investigated as part of routine official abattoir inspections. It is known that the presence of fasciolosis negatively influences beef production, interfering with weight gain and fertility. Recent reports suggest increased occurrence of this parasite worldwide. This paper aims to investigate the impact of fasciolosis on beef cattle performance by examining the association of liver fluke with carcase characteristics and its value. Cattle slaughtered between 2005 and 2010 (328, 137 cattle (of which 12.6% were positive to liver fluke) sourced from 2278 farms) are analysed adjusting for the effect of gender, age, breed, season and year. Carcases with liver fluke have lower cold weight than those carcases free of fluke, estimated coefficient -0.63 kg (95% confidence intervals (CI) -0.93, -0.33). Carcases with liver fluke have lower price than those carcases free of fluke, estimated coefficient -£1.5 (95% CI -2.24, -0.74). The presence of liver fluke is associated with lower carcase conformation scores compared to carcases with fluke absence, proportional odds ratio (POR) 0.89 (95% CI 0.87-0.91). Similarly, the presence of liver fluke is associated with lower levels of fat in the carcase compared to carcases with fluke absence, POR 0.97 (95% CI 0.95-0.99). These results indicate a potential negative effect of the parasitism on carcase performance. The downgrading of the carcase impacts its value and therefore the price paid to the farmer. Both farmers and abattoir operators share a common interest in the control of fasciolosis in order to optimise the profitability of beef production. This study shows the utility of abattoir post-mortem inspection as a tool to monitoring animal health and production. Copyright © 2012 Elsevier B.V. All rights reserved.

  3. Microarray Beads for Identifying Blood Group Single Nucleotide Polymorphisms

    OpenAIRE

    Drago, Francesca; Karpasitou, Katerina; Poli, Francesca

    2009-01-01

    We have developed a high-throughput system for single nucleotide polymorphism (SNP) genotyping of alleles of diverse blood group systems exploiting Luminex technology. The method uses specific oligonucleotide probes coupled to a specific array of fluorescent microspheres and is designed for typing Jka/Jkb, Fya/Fyb, S/s, K/k, Kpa/Kpb, Jsa/Jsb, Coa/Cob and Lua/Lub alleles. Briefly, two multiplex PCR reactions (PCR I and PCR II) according to the laboratory specific needs are set up. PCR I amplif...

  4. Peat exploitation - Environment. Effects and measures

    International Nuclear Information System (INIS)

    Stenbeck, G.

    1996-01-01

    This report gives a detailed description of the influence of peat exploitation on the land-, water- and atmospheric environments. Proposals for mitigatory measures to minimize damage to the environment are also given

  5. Intelligence, mapping, and geospatial exploitation system (IMAGES)

    Science.gov (United States)

    Moellman, Dennis E.; Cain, Joel M.

    1998-08-01

    This paper provides further detail to one facet of the battlespace visualization concept described in last year's paper Battlespace Situation Awareness for Force XXI. It focuses on the National Imagery and Mapping Agency (NIMA) goal to 'provide customers seamless access to tailorable imagery, imagery intelligence, and geospatial information.' This paper describes Intelligence, Mapping, and Geospatial Exploitation System (IMAGES), an exploitation element capable of CONUS baseplant operations or field deployment to provide NIMA geospatial information collaboratively into a reconnaissance, surveillance, and target acquisition (RSTA) environment through the United States Imagery and Geospatial Information System (USIGS). In a baseplant CONUS setting IMAGES could be used to produce foundation data to support mission planning. In the field it could be directly associated with a tactical sensor receiver or ground station (e.g. UAV or UGV) to provide near real-time and mission specific RSTA to support mission execution. This paper provides IMAGES functional level design; describes the technologies, their interactions and interdependencies; and presents a notional operational scenario to illustrate the system flexibility. Using as a system backbone an intelligent software agent technology, called Open Agent ArchitectureTM (OAATM), IMAGES combines multimodal data entry, natural language understanding, and perceptual and evidential reasoning for system management. Configured to be DII COE compliant, it would utilize, to the extent possible, COTS applications software for data management, processing, fusion, exploitation, and reporting. It would also be modular, scaleable, and reconfigurable. This paper describes how the OAATM achieves data synchronization and enables the necessary level of information to be rapidly available to various command echelons for making informed decisions. The reasoning component will provide for the best information to be developed in the timeline

  6. Skoulekia erythrini n. sp (Digenea: Aporocotylidae): a parasite of Pagellus erythrinus (L.) (Perciformes: Sparidae) from the western Mediterranean with an amendment of the generic diagnosis

    Czech Academy of Sciences Publication Activity Database

    Palacios-Abella, J. F.; Georgieva, Simona; Mele, S.; Raga, J. A.; Isbert, W.; Kostadinova, Aneta; Montero, F. E.

    2017-01-01

    Roč. 94, č. 6 (2017), s. 669-688 ISSN 0165-5752 R&D Projects: GA ČR(CZ) GBP505/12/G112 Institutional support: RVO:60077344 Keywords : southern bluefin tuna * blood flukes digenea * trematoda aporocotylidae * life-cycle * maximum-likelihood * sequence alignment * seriola-dumerili * cardicola * paradeontacylix Subject RIV: GJ - Animal Vermins ; Diseases, Veterinary Medicine OBOR OECD: Veterinary science Impact factor: 1.181, year: 2016

  7. Morphological and molecular characterisation of Aporocotyle margolisi Smith, 1967 (Digenea: Aporocotylidae) from the North Pacific hake Merluccius productus (Ayres) (Gadiformes: Merlucciidae) off Oregon, USA

    Czech Academy of Sciences Publication Activity Database

    Hernandez-Orts, J. S.; Hernández-Mena, D. I.; Alama-Bermejo, Gema; Kuchta, Roman; Jacobson, K. C.

    2017-01-01

    Roč. 94, č. 7 (2017), s. 819-829 ISSN 0165-5752 R&D Projects: GA ČR(CZ) GBP505/12/G112; GA ČR(CZ) GP14-28784P Institutional support: RVO:60077344 Keywords : blood flukes * phylogeny * platyhelminthes * sequences * sanguinicolidae * perciformes * models * gene Subject RIV: GJ - Animal Vermins ; Diseases, Veterinary Medicine OBOR OECD: Veterinary science Impact factor: 1.181, year: 2016

  8. Rational Exploitation and Utilizing of Groundwater in Jiangsu Coastal Area

    Science.gov (United States)

    Kang, B.; Lin, X.

    2017-12-01

    Jiangsu coastal area is located in the southeast coast of China, where is a new industrial base and an important coastal and Land Resources Development Zone of China. In the areas with strong human exploitation activities, regional groundwater evolution is obviously affected by human activities. In order to solve the environmental geological problems caused by groundwater exploitation fundamentally, we must find out the forming conditions of regional groundwater hydrodynamic field, and the impact of human activities on groundwater hydrodynamic field evolution and hydrogeochemical evolition. Based on these results, scientific management and reasonable exploitation of the regional groundwater resources can be provided for the utilization. Taking the coastal area of Jiangsu as the research area, we investigate and analyze of the regional hydrogeological conditions. The numerical simulation model of groundwater flow was established according to the water power, chemical and isotopic methods, the conditions of water flow and the influence of hydrodynamic field on the water chemical field. We predict the evolution of regional groundwater dynamics under the influence of human activities and climate change and evaluate the influence of groundwater dynamic field evolution on the environmental geological problems caused by groundwater exploitation under various conditions. We get the following conclusions: Three groundwater exploitation optimal schemes were established. The groundwater salinization was taken as the primary control condition. The substitution model was proposed to model groundwater exploitation and water level changes by BP network method.Then genetic algorithm was used to solve the optimization solution. Three groundwater exploitation optimal schemes were submit to local water resource management. The first sheme was used to solve the groundwater salinization problem. The second sheme focused on dual water supply. The third sheme concerned on emergency water

  9. The diterpenoid 7-keto-sempervirol, derived from Lycium chinense, displays anthelmintic activity against both Schistosoma mansoni and Fasciola hepatica.

    Directory of Open Access Journals (Sweden)

    Jennifer Edwards

    2015-03-01

    Full Text Available BACKGROUND: Two platyhelminths of biomedical and commercial significance are Schistosoma mansoni (blood fluke and Fasciola hepatica (liver fluke. These related trematodes are responsible for the chronic neglected tropical diseases schistosomiasis and fascioliasis, respectively. As no vaccine is currently available for anti-flukicidal immunoprophylaxis, current treatment is mediated by mono-chemical chemotherapy in the form of mass drug administration (MDA (praziquantel for schistosomiasis or drenching (triclabendazole for fascioliasis programmes. This overreliance on single chemotherapeutic classes has dramatically limited the number of novel chemical entities entering anthelmintic drug discovery pipelines, raising significant concerns for the future of sustainable blood and liver fluke control. METHODOLOGY/ PRINCIPLE FINDINGS: Here we demonstrate that 7-keto-sempervirol, a diterpenoid isolated from Lycium chinense, has dual anthelmintic activity against related S. mansoni and F. hepatica trematodes. Using a microtiter plate-based helminth fluorescent bioassay (HFB, this activity is specific (Therapeutic index = 4.2, when compared to HepG2 cell lines and moderately potent (LD50 = 19.1 μM against S. mansoni schistosomula cultured in vitro. This anti-schistosomula effect translates into activity against both adult male and female schistosomes cultured in vitro where 7-keto-sempervirol negatively affects motility/behaviour, surface architecture (inducing tegumental holes, tubercle swelling and spine loss/shortening, oviposition rates and egg morphology. As assessed by the HFB and microscopic phenotypic scoring matrices, 7-keto-sempervirol also effectively kills in vitro cultured F. hepatica newly excysted juveniles (NEJs, LD50 = 17.7 μM. Scanning electron microscopy (SEM evaluation of adult F. hepatica liver flukes co-cultured in vitro with 7-keto-sempervirol additionally demonstrates phenotypic abnormalities including breaches in tegumental

  10. Elder Financial Exploitation: Implications for Future Policy and Research in Elder Mistreatment

    Directory of Open Access Journals (Sweden)

    Price, Thomas

    2011-07-01

    Full Text Available Recent advances in the understanding of elder mistreatment have demonstrated that financial exploitation tends to be one of the most common forms of mistreatment affecting older populations. Agencies such as the World Bank and World Health Organization show significant concern regarding financial exploitation and its connection to physical and emotional injury to victims. The World Bank uses the term “financial violence” as a means of generally describing the harm caused to an individual as a result of financial exploitation or abuse. The proportion of financial exploitation in relation to other forms of elder mistreatment is defined in our research. We discuss the potential impact of elder financial exploitation on victims as well as explore the implications for future research and policy development focused on financial aspects of elder mistreatment and call for further study in the concept of financial exploitation as a violent act. [West J Emerg Med. 2011;12(3:354-356.

  11. Exploitation of commercial remote sensing images: reality ignored?

    Science.gov (United States)

    Allen, Paul C.

    1999-12-01

    The remote sensing market is on the verge of being awash in commercial high-resolution images. Market estimates are based on the growing numbers of planned commercial remote sensing electro-optical, radar, and hyperspectral satellites and aircraft. EarthWatch, Space Imaging, SPOT, and RDL among others are all working towards launch and service of one to five meter panchromatic or radar-imaging satellites. Additionally, new advances in digital air surveillance and reconnaissance systems, both manned and unmanned, are also expected to expand the geospatial customer base. Regardless of platform, image type, or location, each system promises images with some combination of increased resolution, greater spectral coverage, reduced turn-around time (request-to- delivery), and/or reduced image cost. For the most part, however, market estimates for these new sources focus on the raw digital images (from collection to the ground station) while ignoring the requirements for a processing and exploitation infrastructure comprised of exploitation tools, exploitation training, library systems, and image management systems. From this it would appear the commercial imaging community has failed to learn the hard lessons of national government experience choosing instead to ignore reality and replicate the bias of collection over processing and exploitation. While this trend may be not impact the small quantity users that exist today it will certainly adversely affect the mid- to large-sized users of the future.

  12. Exploitation of cloud computing in management of construction projects in Slovakia

    Directory of Open Access Journals (Sweden)

    Mandičák Tomáš

    2016-12-01

    Full Text Available The issue of cloud computing is a highly topical issue. Cloud computing represents a new model for information technology (IT services based on the exploitation of Web (it represents a cloud and other application platforms, as well as software as a service. In general, the exploitation of cloud computing in construction project management has several advantages, as demonstrated by several research reports. Currently, research quantifying the exploitation of cloud computing in the Slovak construction industry has not yet been carried out. The article discusses the issue of exploitation of cloud computing in construction project management in Slovakia. The main objective of the research is to confirm whether factors such as size of construction enterprise, owner of construction enterprise and participant of construction project have any impact on the exploitation level of cloud computing in construction project management. It includes confirmation of differences in use between different participants of the construction project or between construction enterprises broken down by size and shareholders.

  13. Sexual exploitation and labor during adolescence: A case study

    Directory of Open Access Journals (Sweden)

    Luciana Dutra-Thomé

    2011-09-01

    Full Text Available The present article focused on the perception of sexual exploitation as a job, using a single case study design. The aim of the study was to investigate the case of a 14 year-old girl, involved in commercial sexual exploitation, who considered this situation as her labor activity. A content analysis showed protective and risk factors as categories, especially related to her labor activities. The girl perceived the sexual exploitation activity as a job that provided autonomy, subsistence, and survival. The study revealed that the negative effects of working during adolescence may bring consequences to health and development. Youth work may be defined as a risk factor, especially when the labour conditions are not adequate and protected.

  14. Automated UAV-based video exploitation using service oriented architecture framework

    Science.gov (United States)

    Se, Stephen; Nadeau, Christian; Wood, Scott

    2011-05-01

    Airborne surveillance and reconnaissance are essential for successful military missions. Such capabilities are critical for troop protection, situational awareness, mission planning, damage assessment, and others. Unmanned Aerial Vehicles (UAVs) gather huge amounts of video data but it is extremely labour-intensive for operators to analyze hours and hours of received data. At MDA, we have developed a suite of tools that can process the UAV video data automatically, including mosaicking, change detection and 3D reconstruction, which have been integrated within a standard GIS framework. In addition, the mosaicking and 3D reconstruction tools have also been integrated in a Service Oriented Architecture (SOA) framework. The Visualization and Exploitation Workstation (VIEW) integrates 2D and 3D visualization, processing, and analysis capabilities developed for UAV video exploitation. Visualization capabilities are supported through a thick-client Graphical User Interface (GUI), which allows visualization of 2D imagery, video, and 3D models. The GUI interacts with the VIEW server, which provides video mosaicking and 3D reconstruction exploitation services through the SOA framework. The SOA framework allows multiple users to perform video exploitation by running a GUI client on the operator's computer and invoking the video exploitation functionalities residing on the server. This allows the exploitation services to be upgraded easily and allows the intensive video processing to run on powerful workstations. MDA provides UAV services to the Canadian and Australian forces in Afghanistan with the Heron, a Medium Altitude Long Endurance (MALE) UAV system. On-going flight operations service provides important intelligence, surveillance, and reconnaissance information to commanders and front-line soldiers.

  15. Prospects of geothermal resource exploitation

    International Nuclear Information System (INIS)

    Bourrelier, P.H.; Cornet, F.; Fouillac, C.

    1994-01-01

    The use of geothermal energy to generate electricity has only occurred during the past 50 years by drilling wells in aquifers close to magmas and producing either dry steam or hot water. The world's production of electricity from geothermal energy is over 6000 MWe and is still growing. The direct use of geothermal energy for major urban communities has been developed recently by exploitation of aquifers in sedimentary basins under large towns. Scaling up the extraction of heat implies the exploitation of larger and better located fields requiring an appropriate method of extraction; the objective of present attempts in USA, Japan and Europe is to create heat exchangers by the circulation of water between several deep wells. Two field categories are considered: the extension of classical geothermal fields beyond the aquifer areas, and areas favoured by both a high geothermal gradient, fractures inducing a natural permeability at large scale, and good commercial prospects (such as in the Rhenan Graben). Hot dry rocks concept has gained a large interest. 1 fig., 5 tabs., 11 refs

  16. Malware Sandbox Analysis for Secure Observation of Vulnerability Exploitation

    Science.gov (United States)

    Yoshioka, Katsunari; Inoue, Daisuke; Eto, Masashi; Hoshizawa, Yuji; Nogawa, Hiroki; Nakao, Koji

    Exploiting vulnerabilities of remote systems is one of the fundamental behaviors of malware that determines their potential hazards. Understanding what kind of propagation tactics each malware uses is essential in incident response because such information directly links with countermeasures such as writing a signature for IDS. Although recently malware sandbox analysis has been studied intensively, little work is done on securely observing the vulnerability exploitation by malware. In this paper, we propose a novel sandbox analysis method for securely observing malware's vulnerability exploitation in a totally isolated environment. In our sandbox, we prepare two victim hosts. We first execute the sample malware on one of these hosts and then let it attack the other host which is running multiple vulnerable services. As a simple realization of the proposed method, we have implemented a sandbox using Nepenthes, a low-interaction honeypot, as the second victim. Because Nepenthes can emulate a variety of vulnerable services, we can efficiently observe the propagation of sample malware. In the experiments, among 382 samples whose scan capabilities are confirmed, 381 samples successfully started exploiting vulnerabilities of the second victim. This indicates the certain level of feasibility of the proposed method.

  17. Final Report, “Exploiting Global View for Resilience”

    Energy Technology Data Exchange (ETDEWEB)

    Chien, Andrew [Univ. of Chicago, IL (United States)

    2017-03-29

    Final technical report for the "Exploiting Global View for Resilience" project. The GVR project aims to create a new approach to portable, resilient applications. The GVR approach builds on a global view data model,, adding versioning (multi-version), user control of timing and rate (multi-stream), and flexible cross layer error signalling and recovery. With a versioned array as a portable abstraction, GVR enables application programmers to exploit deep scientific and application code insights to manage resilience (and its overhead) in a flexible, portable fashion.

  18. How Less Alienation Creates More Exploitation? Audience Labour on Social Network Sites.

    Directory of Open Access Journals (Sweden)

    Eran Fisher

    2012-05-01

    Full Text Available Abstract: The notion of audience labour has been an important contribution to Marxist political economy of the media. It revised the traditional political economy analysis, which focused on media ownership, by suggesting that media was also a site of production, constituting particular relations of production. Such analysis highlighted the active role of audience in the creation of media value as both commodities and workers, thus pointing to audience exploitation. Recently, in light of paradigmatic transformations in the media environment – particularly the emergence of Web 2.0 and social network sites – there has been a renewed interest in such analysis, and a reexamination of audience exploitation. Focusing on Facebook as a case-study, this article examines audience labour on social network sites along two Marxist themes – exploitation and alienation. It argues for a historical shift in the link between exploitation and alienation of audience labour, concurrent with the shift from mass media to social media. In the mass media, the capacity for exploitation of audience labour was quite limited while the alienation that such work created was high. In contrast, social media allows for the expansion and intensification of exploitation. Simultaneously, audience labour on social media – because it involves communication and sociability – also ameliorates alienation by allowing self-expression, authenticity, and relations with others. Moreover, the article argues that the political economy of social network sites is founded on a dialectical link between exploitation and alienation: in order to be de-alienated, Facebook users must communicate and socialize, thus exacerbating their exploitation. And vice-versa, in order for Facebook to exploit the work of its users, it must contribute to their de-alienation.

  19. Boys are not exempt: Sexual exploitation of adolescents in sub-Saharan Africa.

    Science.gov (United States)

    Adjei, Jones K; Saewyc, Elizabeth M

    2017-03-01

    Research on youth sexual exploitation in Africa has largely neglected the experiences of exploited boys. To date, much of the research in sub-Saharan Africa continues to consider boys mainly as exploiters but not as exploited. Using the only publicly available population-based surveys from the National Survey of Adolescents, conducted in four sub-Saharan African countries - Burkina Faso, Ghana, Malawi, and Uganda-we assessed factors associated with transactional sexual behaviour among never-married adolescent boys and girls. We also examined whether boys' reported sexual exploitation was linked to similar risky sexual behaviours as has been noted among girls in sub-Saharan Africa. Results from our analyses indicated that even though adolescent girls have a somewhat higher likelihood of reporting sexual abuse and exploitation, the odds of trading sex were significantly elevated for previously traumatized boys (that is those with a history of sexual and physical abuse) but not for their female counterparts. Just like adolescent girls, transactional sexual behaviour was associated with the risk of having concurrent multiple sexual partners for boys. These findings support the reality of boys' sexual exploitation within the African context, and further highlight the importance of including males in general and boys in particular in population-based studies on sexual health, risk, and protective factors in the sub-Saharan African region. Understanding the factors linked to sexual exploitation for both boys and girls will help in developing policies and programs that could improve the overall sexual and reproductive health outcomes among adolescents and youth in sub-Saharan Africa. Copyright © 2017 Elsevier Ltd. All rights reserved.

  20. A Descriptive Study on Sexually Exploited Children in Residential Treatment

    Science.gov (United States)

    Twill, Sarah E.; Green, Denise M.; Traylor, Amy

    2010-01-01

    Sexual exploitation and prostitution of children and adolescents is a multibillion dollar industry in the United States (Estes and Weiner in "Medical, legal & social science aspects of child sexual exploitation: A comprehensive review of pornography, prostitution, and internet crimes, vol I," G.W. Medical Publishing, Inc, St Louis,…

  1. Sustainable exploitation and management of aquatic resources

    DEFF Research Database (Denmark)

    Neuenfeldt, Stefan; Köster, Fritz

    2014-01-01

    DTU Aqua conducts research, provides advice,educates at university level and contributes toinnovation in sustainable exploitation andmanagement of aquatic resources. The vision of DTUAqua is to enable ecologically and economicallysustainable exploitation of aquatic resourcesapplying an integrated...... management. Marineecosystems aims at understanding the mechanisms that govern the interaction between individuals,species and populations in an ecosystem enabling us to determine the stability and flexibility of theecosystem.Marine living resources looks at the sustainable utilization of fish and shellfish...... stocks.Ecosystem effects expands from the ecosystem approach to fisheries management to an integratedapproach where other human activities are taken into consideration. Fisheries management developsmethods, models and tools for predicting and evaluating the effects of management measures andregulations...

  2. Blood cleaner on-chip design for artificial human kidney manipulation

    Directory of Open Access Journals (Sweden)

    Suwanpayak N

    2011-05-01

    Full Text Available N Suwanpayak1, MA Jalil2, MS Aziz3, FD Ismail3, J Ali3, PP Yupapin11Nanoscale Science and Engineering Research Alliance (N'SERA, Advanced Research Center for Photonics, Faculty of Science, King Mongkut's Institute of Technology, Ladkrabang, Bangkok, Thailand; 2Ibnu Sina Institute of Fundamental Science Studies (IIS, 3Institute of Advanced Photonics Science, Nanotechnology Research Alliance, Universiti Teknologi Malaysia, Johor Bahru, MalaysiaAbstract: A novel design of a blood cleaner on-chip using an optical waveguide known as a PANDA ring resonator is proposed. By controlling some suitable parameters, the optical vortices (gradient optical fields/wells can be generated and used to form the trapping tools in the same way as optical tweezers. In operation, the trapping force is formed by the combination between the gradient field and scattering photons by using the intense optical vortices generated within the PANDA ring resonator. This can be used for blood waste trapping and moves dynamically within the blood cleaner on-chip system (artificial kidney, and is performed within the wavelength routers. Finally, the blood quality test is exploited by the external probe before sending to the destination. The advantage of the proposed kidney on-chip system is that the unwanted substances can be trapped and filtered from the artificial kidney, which can be available for blood cleaning applications.Keywords: optical trapping, blood dialysis, blood cleaner, human kidney manipulation

  3. The roles of water, sanitation and hygiene in reducing schistosomiasis: a review

    OpenAIRE

    Grimes, Jack ET; Croll, David; Harrison, Wendy E; Utzinger, J?rg; Freeman, Matthew C; Templeton, Michael R

    2015-01-01

    Schistosomiasis is a disease caused by infection with blood flukes of the genus Schistosoma. Transmission of, and exposure to, the parasite result from faecal or urinary contamination of freshwater containing intermediate host snails, and dermal contact with the same water. The World Health Assembly resolution 65.21 from May 2012 urges member states to eliminate schistosomiasis through preventive chemotherapy (i.e. periodic large-scale administration of the antischistosomal drug praziquantel ...

  4. Imouraren mining exploitation : Complementary studies Synthetic report Volum B - Mines

    International Nuclear Information System (INIS)

    1980-01-01

    The object of the current study is to determine the main technical characteristics of the reference project of a mine that can supply the necessary ore quantity at a production of 3000 tonnes uranium per year, along 10 years. The project is one of the possible solutions for exploiting the mine. The current study permits to establish : investment and functioning cost estimation, overall project of the mining exploitation program, necessary strength estimation, average ore grades evaluation and variations of these grades, utilities needs, production vizing program, main exploitation methods and necessary materials. Reference project study of the mine serves as base to the economics studies and studies optimization [fr

  5. Exploitative and hierarchical antagonism in a cooperative bacterium.

    Directory of Open Access Journals (Sweden)

    Francesca Fiegna

    2005-11-01

    Full Text Available Social organisms that cooperate with some members of their own species, such as close relatives, may fail to cooperate with other genotypes of the same species. Such noncooperation may take the form of outright antagonism or social exploitation. Myxococcus xanthus is a highly social prokaryote that cooperatively develops into spore-bearing, multicellular fruiting bodies in response to starvation. Here we have characterized the nature of social interactions among nine developmentally proficient strains of M. xanthus isolated from spatially distant locations. Strains were competed against one another in all possible pairwise combinations during starvation-induced development. In most pairings, at least one competitor exhibited strong antagonism toward its partner and a majority of mixes showed bidirectional antagonism that decreased total spore production, even to the point of driving whole populations to extinction. Differential response to mixing was the primary determinant of competitive superiority rather than the sporulation efficiencies of unmixed populations. In some competitive pairings, the dominant partner sporulated more efficiently in mixed populations than in clonal isolation. This finding represents a novel form of exploitation in bacteria carried out by socially competent genotypes and is the first documentation of social exploitation among natural bacterial isolates. Patterns of antagonistic superiority among these strains form a highly linear dominance hierarchy. At least some competition pairs construct chimeric, rather than segregated, fruiting bodies. The cooperative prokaryote M. xanthus has diverged into a large number of distinct social types that cooperate with clone-mates but exhibit intense antagonism toward distinct social types of the same species. Most lengthy migration events in nature may thus result in strong antagonism between migratory and resident populations, and this antagonism may have large effects on local

  6. EXPLOITATION OF GLASS SAND ON THE OPEN PIT »VRTLINSKA« (MOSLAVINA, CROATIA

    Directory of Open Access Journals (Sweden)

    Slavko Vujec

    1994-12-01

    Full Text Available The exploitation of glass sand in Slavonia and Moslavina has a long tradition. The open-pit »Vrtlinska« is-accordirtg to its dimensions and production capacity the biggest one in this regions. Exploitation reserves within this open pit amount about 1 000 000 t glass sand of a very good quality, and the production capacity is 200 000 t yearly according to real needs during design and opening the pit, i. e. before the war. This article discusses geological and geomechanical characteristics of the deposit, as well as the exploitation process, which is considerably matching natural characteristics of the deposit. A more detailed description is given of the planned exploitation phase I above groundwater level which is carried out according to discontinuous system. For the exploitation of the depth part under groundwater level in the phase II, the necessity of further examination of hydrogeological characteristics of the deposit is presented, in order to acquire necessary information on groundwater regime and drainage conditions. Such knowledge will influence the choice of the most appropriate solutions in the exploitation of the depth part of the deposit.

  7. [Impacts of hydroelectric cascade exploitation on river ecosystem and landscape: a review].

    Science.gov (United States)

    Yang, Kun; Deng, Xi; Li, Xue-Ling; Wen, Ping

    2011-05-01

    Hydroelectric cascade exploitation, one of the major ways for exploiting water resources and developing hydropower, not only satisfies the needs of various national economic sectors, but also promotes the socio-economic sustainable development of river basin. unavoidable anthropogenic impacts on the entire basin ecosystem. Based on the process of hydroelectric cascade exploitation and the ecological characteristics of river basins, this paper reviewed the major impacts of hydroelectric cascade exploitation on dam-area ecosystems, river reservoirs micro-climate, riparian ecosystems, river aquatic ecosystems, wetlands, and river landscapes. Some prospects for future research were offered, e.g., strengthening the research of chain reactions and cumulative effects of ecological factors affected by hydroelectric cascade exploitation, intensifying the study of positive and negative ecological effects under the dam networks and their joint operations, and improving the research of successional development and stability of basin ecosystems at different temporal and spatial scales.

  8. The exploitation of living resources in the Dutch Wadden Sea : a historical overview

    NARCIS (Netherlands)

    Wolff, W J

    An overview, based on written sources and personal observations, is presented of exploitation of living resources in and around the Dutch Wadden Sea during the past few centuries. It is concluded that before about 1900 exploitation was almost unrestricted. Exploitation of plants has been documented

  9. PROBA-V Mission Exploitation Platform

    Directory of Open Access Journals (Sweden)

    Erwin Goor

    2016-07-01

    Full Text Available As an extension of the PROBA-Vegetation (PROBA-V user segment, the European Space Agency (ESA, de Vlaamse Instelling voor Technologisch Onderzoek (VITO, and partners TRASYS and Spacebel developed an operational Mission Exploitation Platform (MEP to drastically improve the exploitation of the PROBA-V Earth Observation (EO data archive, the archive from the historical SPOT-VEGETATION mission, and derived products by researchers, service providers, and thematic users. The analysis of the time series of data (petabyte range is addressed, as well as the large scale on-demand processing of the complete archive, including near real-time data. The platform consists of a private cloud environment, a Hadoop-based processing environment and a data manager. Several applications are released to the users, e.g., a full resolution viewing service, a time series viewer, pre-defined on-demand processing chains, and virtual machines with powerful tools and access to the data. After an initial release in January 2016 a research platform was deployed gradually, allowing users to design, debug, and test applications on the platform. From the PROBA-V MEP, access to, e.g., Sentinel-2 and Sentinel-3 data will be addressed as well.

  10. Risk assessment by dynamic representation of vulnerability, exploitation, and impact

    Science.gov (United States)

    Cam, Hasan

    2015-05-01

    Assessing and quantifying cyber risk accurately in real-time is essential to providing security and mission assurance in any system and network. This paper presents a modeling and dynamic analysis approach to assessing cyber risk of a network in real-time by representing dynamically its vulnerabilities, exploitations, and impact using integrated Bayesian network and Markov models. Given the set of vulnerabilities detected by a vulnerability scanner in a network, this paper addresses how its risk can be assessed by estimating in real-time the exploit likelihood and impact of vulnerability exploitation on the network, based on real-time observations and measurements over the network. The dynamic representation of the network in terms of its vulnerabilities, sensor measurements, and observations is constructed dynamically using the integrated Bayesian network and Markov models. The transition rates of outgoing and incoming links of states in hidden Markov models are used in determining exploit likelihood and impact of attacks, whereas emission rates help quantify the attack states of vulnerabilities. Simulation results show the quantification and evolving risk scores over time for individual and aggregated vulnerabilities of a network.

  11. Panel discussion on exploitation of geothermal resources in thermal zones

    Energy Technology Data Exchange (ETDEWEB)

    Viramonte, J G; Mange, J; Stefani, G

    1978-03-01

    The topics discussed include the major known geothermal resources, varying ways of exploiting geothermal resources, technical and economic difficulties in the exploitation, the place of geothermal energy in the total energy policy of a given country, advanced exploration techniques, and indications of needed areas of study. The panelists represented most of the South American countries, Mexico, and Italy. (JSR)

  12. Exploiting Non-Markovianity for Quantum Control.

    Science.gov (United States)

    Reich, Daniel M; Katz, Nadav; Koch, Christiane P

    2015-07-22

    Quantum technology, exploiting entanglement and the wave nature of matter, relies on the ability to accurately control quantum systems. Quantum control is often compromised by the interaction of the system with its environment since this causes loss of amplitude and phase. However, when the dynamics of the open quantum system is non-Markovian, amplitude and phase flow not only from the system into the environment but also back. Interaction with the environment is then not necessarily detrimental. We show that the back-flow of amplitude and phase can be exploited to carry out quantum control tasks that could not be realized if the system was isolated. The control is facilitated by a few strongly coupled, sufficiently isolated environmental modes. Our paradigmatic example considers a weakly anharmonic ladder with resonant amplitude control only, restricting realizable operations to SO(N). The coupling to the environment, when harnessed with optimization techniques, allows for full SU(N) controllability.

  13. Local Perspectives on Environmental Insecurity and Its Influence on Illegal Biodiversity Exploitation.

    Directory of Open Access Journals (Sweden)

    Meredith L Gore

    Full Text Available Environmental insecurity is a source and outcome of biodiversity declines and social conflict. One challenge to scaling insecurity reduction policies is that empirical evidence about local attitudes is overwhelmingly missing. We set three objectives: determine how local people rank risk associated with different sources of environmental insecurity; assess perceptions of environmental insecurity, biodiversity exploitation, myths of nature and risk management preferences; and explore relationships between perceptions and biodiversity exploitation. We conducted interviews (N = 88 with residents of Madagascar's Torotorofotsy Protected Area, 2014. Risk perceptions had a moderate effect on perceptions of environmental insecurity. We found no effects of environmental insecurity on biodiversity exploitation. Results offer one if not the first exploration of local perceptions of illegal biodiversity exploitation and environmental security. Local people's perception of risk seriousness associated with illegal biodiversity exploitation such as lemur hunting (low overall may not reflect perceptions of policy-makers (considered to be high. Discord is a key entry point for attention.

  14. An Exploitability Analysis Technique for Binary Vulnerability Based on Automatic Exception Suppression

    Directory of Open Access Journals (Sweden)

    Zhiyuan Jiang

    2018-01-01

    Full Text Available To quickly verify and fix vulnerabilities, it is necessary to judge the exploitability of the massive crash generated by the automated vulnerability mining tool. While the current manual analysis of the crash process is inefficient and time-consuming, the existing automated tools can only handle execute exceptions and some write exceptions but cannot handle common read exceptions. To address this problem, we propose a method of determining the exploitability based on the exception type suppression. This method enables the program to continue to execute until an exploitable exception is triggered. The method performs a symbolic replay of the crash sample, constructing and reusing data gadget, to bypass the complex exception, thereby improving the efficiency and accuracy of vulnerability exploitability analysis. The testing of typical CGC/RHG binary software shows that this method can automatically convert a crash that cannot be judged by existing analysis tools into a different crash type and judge the exploitability successfully.

  15. Expression profile of the Schistosoma japonicum degradome reveals differential protease expression patterns and potential anti-schistosomal intervention targets.

    Directory of Open Access Journals (Sweden)

    Shuai Liu

    2014-10-01

    Full Text Available Blood fluke proteases play pivotal roles in the processes of invasion, nutrition acquisition, immune evasion, and other host-parasite interactions. Hundreds of genes encoding putative proteases have been identified in the recently published schistosome genomes. However, the expression profiles of these proteases in Schistosoma species have not yet been systematically analyzed. We retrieved and culled the redundant protease sequences of Schistosoma japonicum, Schistosoma mansoni, Echinococcus multilocularis, and Clonorchis sinensis from public databases utilizing bioinformatic approaches. The degradomes of the four parasitic organisms and Homo sapiens were then comparatively analyzed. A total of 262 S. japonicum protease sequences were obtained and the expression profiles generated using whole-genome microarray. Four main clusters of protease genes with different expression patterns were identified: proteases up-regulated in hepatic schistosomula and adult worms, egg-specific or predominantly expressed proteases, cercaria-specific or predominantly expressed proteases, and constantly expressed proteases. A subset of protease genes with different expression patterns were further validated using real-time quantitative PCR. The present study represents the most comprehensive analysis of a degradome in Schistosoma species to date. These results provide a firm foundation for future research on the specific function(s of individual proteases and may help to refine anti-proteolytic strategies in blood flukes.

  16. The ALARA project of the EDF nuclear park exploitation

    International Nuclear Information System (INIS)

    Potoczek, J.

    1998-01-01

    To bring the exploitation of the nuclear park of EDF at the level of the best exploiters in the world in matter of collective and individual dosimetry, the ALARA principle coordinates numerous actions: to associate the temporary societies, to define common language, methods and tools for the whole park to organize a level effect in this area, to optimize the maintenance that is expansive in radiation doses, to make the different levels of management responsible on dosimetric stakes, to reduce the singular sources of exposure, to assure the organisation and exploitation of the experience back in this field and adapt consequently the system of information. The results are cheerful and the objectives for 2000 are: less than 1.2 h.Sv by year and by reactor, no intervener whom annual radiation dose is upper than 20 mSv (out of exceptional case). (N.C.)

  17. Cloud Based Earth Observation Data Exploitation Platforms

    Science.gov (United States)

    Romeo, A.; Pinto, S.; Loekken, S.; Marin, A.

    2017-12-01

    In the last few years data produced daily by several private and public Earth Observation (EO) satellites reached the order of tens of Terabytes, representing for scientists and commercial application developers both a big opportunity for their exploitation and a challenge for their management. New IT technologies, such as Big Data and cloud computing, enable the creation of web-accessible data exploitation platforms, which offer to scientists and application developers the means to access and use EO data in a quick and cost effective way. RHEA Group is particularly active in this sector, supporting the European Space Agency (ESA) in the Exploitation Platforms (EP) initiative, developing technology to build multi cloud platforms for the processing and analysis of Earth Observation data, and collaborating with larger European initiatives such as the European Plate Observing System (EPOS) and the European Open Science Cloud (EOSC). An EP is a virtual workspace, providing a user community with access to (i) large volume of data, (ii) algorithm development and integration environment, (iii) processing software and services (e.g. toolboxes, visualization routines), (iv) computing resources, (v) collaboration tools (e.g. forums, wiki, etc.). When an EP is dedicated to a specific Theme, it becomes a Thematic Exploitation Platform (TEP). Currently, ESA has seven TEPs in a pre-operational phase dedicated to geo-hazards monitoring and prevention, costal zones, forestry areas, hydrology, polar regions, urban areas and food security. On the technology development side, solutions like the multi cloud EO data processing platform provides the technology to integrate ICT resources and EO data from different vendors in a single platform. In particular it offers (i) Multi-cloud data discovery, (ii) Multi-cloud data management and access and (iii) Multi-cloud application deployment. This platform has been demonstrated with the EGI Federated Cloud, Innovation Platform Testbed Poland

  18. Optical sensor technology for a noninvasive medical blood diagnosis

    Science.gov (United States)

    Kraitl, Jens; Ewald, Hartmut; Gehring, Hartmut

    2007-02-01

    NIR-spectroscopy and Photoplethysmography (PPG) and is used for a measurement of blood components. The fact that the absorption-coefficients μ a and scattering-coefficients μ s for blood differ at difference wavelengths has been exploited and is used for calculation of the optical absorbability characteristics of human blood yielding information on blood components like hemoglobin and oxygen saturation. The measured PPG time signals and the ratio between the peak to peak pulse amplitudes are used for a measurement of these parameters. A newly developed PMD device has been introduced. The non-invasive in-vivo multi-spectral method is based on the radiation of monochromatic light, emitted by laser diodes, through an area of skin on the finger. Deferrals between the proportions of hemoglobin and plasma in the intravasal volume should be detected photo-electrically by signal-analytic evaluation of the signals. The computed nonlinear coefficients are used for the measurement and calculation of the relative hemoglobin concentration change. Results with this photometric method to measure changes in the hemoglobin concentration were demonstrated during measurements with a hemodynamic model and healthy subjects. The PMD is suitable for non-invasive continuous online monitoring of one or more biologic constituent values. The objective of this development is to reduce the dependence on measurement techniques which require that a sample of blood be withdrawn from the patient for in-vitro analysis. Any invasive method used on the patient to obtain blood is accompanied by problems of inconvenience, stress, and discomfort. The patient is also exposed to the normal risks of infection associated with such invasive methods.

  19. Immunological studies of amphistomiasis in sheep and goats. II Viability of amphistome metacercariae after irradiation. [Gamma radiation

    Energy Technology Data Exchange (ETDEWEB)

    Hafeez, Md.; Rao, B.V. (College of Veterinary Science, Tirupati (India). Dept. of Parasitology)

    1983-06-01

    The viability of gamma-irradiated (2 krad) amphistome metacercariae (C.indicae XXV1) was determined in lambs and kids. After storing the irradiated metacercariae at 4/sup 0/C for 21 days, a mean of 1024 and 965 flukes were recovered in lambs and kids respectively 50 days after infection compared to 1724 and 1689 flukes respectively in control animals. Increasing the storage time of the irradiated metacercariae to 35 days resulted in no flukes being recovered 50 days after infection compared to 1567 and 1482 flukes in the control lambs and kids respectively.

  20. Immunological studies of amphistomiasis in sheep and goats. II Viability of amphistome metacercariae after irradiation

    International Nuclear Information System (INIS)

    Hafeez, Md.; Rao, B.V.

    1983-01-01

    The viability of gamma-irradiated (2 krad) amphistome metacercariae (C.indicae XXV1) was determined in lambs and kids. After storing the irradiated metacercariae at 4 0 C for 21 days, a mean of 1024 and 965 flukes were recovered in lambs and kids respectively 50 days after infection compared to 1724 and 1689 flukes respectively in control animals. Increasing the storage time of the irradiated metacercariae to 35 days resulted in no flukes being recovered 50 days after infection compared to 1567 and 1482 flukes in the control lambs and kids respectively. (U.K.)

  1. The concept of exploitation in international human trafficking law

    OpenAIRE

    von der Pütten, Tuija Kaarina

    2017-01-01

    Human trafficking is commonly known as a criminal practice that takes place in the framework of sex trade: women and children are trafficked within a state, or from one state to another, for the purpose of sexual exploitation. Similarly, the early 20th century international conventions aimed to tackle ‘white slave traffic’, trafficking of women and children for sexual exploitation. However, it is misleading to see trafficking only within this context. People are trafficked so that they can be...

  2. Assessing uncertainty and risk in exploited marine populations

    International Nuclear Information System (INIS)

    Fogarty, M.J.; Mayo, R.K.; O'Brien, L.; Serchuk, F.M.; Rosenberg, A.A.

    1996-01-01

    The assessment and management of exploited fish and invertebrate populations is subject to several types of uncertainty. This uncertainty translates into risk to the population in the development and implementation of fishery management advice. Here, we define risk as the probability that exploitation rates will exceed a threshold level where long term sustainability of the stock is threatened. We distinguish among several sources of error or uncertainty due to (a) stochasticity in demographic rates and processes, particularly in survival rates during the early fife stages; (b) measurement error resulting from sampling variation in the determination of population parameters or in model estimation; and (c) the lack of complete information on population and ecosystem dynamics. The first represents a form of aleatory uncertainty while the latter two factors represent forms of epistemic uncertainty. To illustrate these points, we evaluate the recent status of the Georges Bank cod stock in a risk assessment framework. Short term stochastic projections are made accounting for uncertainty in population size and for random variability in the number of young surviving to enter the fishery. We show that recent declines in this cod stock can be attributed to exploitation rates that have substantially exceeded sustainable levels

  3. Commercial sexual exploitation and sex trafficking of adolescents.

    Science.gov (United States)

    Chung, Richard J; English, Abigail

    2015-08-01

    This review describes the current state of commercial sexual exploitation and sex trafficking of adolescents in the United States and globally, the legal and health implications of this severe form of abuse, and the roles that pediatric and adolescent healthcare providers can play in addressing this issue. Although this form of exploitation and abuse is shrouded in secrecy, pediatric and adolescent healthcare providers are well positioned to respond when it arises. However, awareness and understanding of the issue are generally lacking among healthcare professionals, currently limiting their effectiveness in combating this problem. Although the empirical evidence base available to guide clinical care of victims of trafficking remains limited given the secretive nature of the abuse, important contributions to the multidisciplinary literature on this issue have been made in recent years, including the Institute of Medicine's landmark report in the United States. Commercial sexual exploitation and sex trafficking of adolescents represent a human rights tragedy that remains inadequately addressed. As preeminent advocates for the health and well-being of adolescents, pediatric and adolescent healthcare providers can play a crucial role in advancing efforts not only to intervene but also to prevent further victimization of vulnerable youth.

  4. Exploitation of linkage learning in evolutionary algorithms

    CERN Document Server

    Chen, Ying-ping

    2010-01-01

    The exploitation of linkage learning is enhancing the performance of evolutionary algorithms. This monograph examines recent progress in linkage learning, with a series of focused technical chapters that cover developments and trends in the field.

  5. Novel methods for the molecular discrimination of Fasciola spp. on the basis of nuclear protein-coding genes.

    Science.gov (United States)

    Shoriki, Takuya; Ichikawa-Seki, Madoka; Suganuma, Keisuke; Naito, Ikunori; Hayashi, Kei; Nakao, Minoru; Aita, Junya; Mohanta, Uday Kumar; Inoue, Noboru; Murakami, Kenji; Itagaki, Tadashi

    2016-06-01

    Fasciolosis is an economically important disease of livestock caused by Fasciola hepatica, Fasciola gigantica, and aspermic Fasciola flukes. The aspermic Fasciola flukes have been discriminated morphologically from the two other species by the absence of sperm in their seminal vesicles. To date, the molecular discrimination of F. hepatica and F. gigantica has relied on the nucleotide sequences of the internal transcribed spacer 1 (ITS1) region. However, ITS1 genotypes of aspermic Fasciola flukes cannot be clearly differentiated from those of F. hepatica and F. gigantica. Therefore, more precise and robust methods are required to discriminate Fasciola spp. In this study, we developed PCR restriction fragment length polymorphism and multiplex PCR methods to discriminate F. hepatica, F. gigantica, and aspermic Fasciola flukes on the basis of the nuclear protein-coding genes, phosphoenolpyruvate carboxykinase and DNA polymerase delta, which are single locus genes in most eukaryotes. All aspermic Fasciola flukes used in this study had mixed fragment pattern of F. hepatica and F. gigantica for both of these genes, suggesting that the flukes are descended through hybridization between the two species. These molecular methods will facilitate the identification of F. hepatica, F. gigantica, and aspermic Fasciola flukes, and will also prove useful in etiological studies of fasciolosis. Copyright © 2015 Elsevier Ireland Ltd. All rights reserved.

  6. Annexe 3. Constitution d'une exploitation à Homs

    OpenAIRE

    2015-01-01

    ‘Abd al-Laṭīf, né en 1925, est jardinier à Horns. Il exploite avec son fils aîné et l'aide de deux de ses petits-fils un jardin de quelques 35 dunum (3,5 hectares) situé dans le zūr al-Ǧdīdeh, secteur central de la zone agricole. Cette grande exploitation, constituée de plusieurs parcelles ayant différents statuts, est en partie le produit d'une histoire familiale dont je voudrais présenter ici brièvement les principaux aspects. Figure 50 – Alliances matrimoniales entre la lignée de ‘Abbās e...

  7. Open pit coal exploitation viability. Margarita mine. Case of study

    International Nuclear Information System (INIS)

    Veloza, Julia; Molina, Jorge; Mejia, Humberto

    2006-01-01

    This paper provides an analysis of financial viability, planning and design for the new coal open pit exploitation for La Margarita mine, with coal-resources estimated on 440.139,7 ton. Dimension, design and economic evaluation were possible by three exploitation methods: (multiple bench, open cast contour, and terraces). Net present values (NVP) were calculated: $c 817,5; $c 518,5 and $c 645,2 respectively for each method (given in million current Colombian pesos $. $c 2380 are equivalent to $us 1) and rate of return (ROR) 78,33%; 34,0% and 38,62% respectively for each method. These indicators served as a parameter to choose the multiple bench method, which should be recalculated because it was necessary to work jointly with two pits and making feasible the project. in addition a general environmental evaluation was done, which is vital for the exploitation. Important impacts on the flower, animals, air, water were found, and measures of control, prevention and mitigation were stated. it is expected that this paper can be useful as a technical-economical support for the development of the open pit exploitation in the margarita mine

  8. SEXUAL EXPLOITATION AND ABUSE BY UN PEACEKEEPERS ...

    African Journals Online (AJOL)

    Allaiac

    from sexual exploitation and sexual abuse (ST/SGB/2003/13) (UN, Secretary .... In addition, in most situations, UN personnel have enjoyed immunity from local .... 9 Official UN statistics show a higher incidence of allegations reported against.

  9. The exploitation of swamp plants for dewatering liquid sewage sludge

    Directory of Open Access Journals (Sweden)

    Jiří Šálek

    2006-01-01

    Full Text Available The operators of little rural wastewater treatment plants have been interested in economic exploitation of sewage sludge in local conditions. The chance is searching simply and natural ways of processing and exploitation stabilized sewage sludge in agriculture. Manure substrate have been obtained by composting waterless sewage sludge including rest plant biomass after closing 6–8 years period of filling liquid sewage sludge to the basin. Main attention was focused on exploitation of swamp plants for dewatering liquid sewage sludge and determination of influence sewage sludge on plants, intensity and course of evapotranspiration and design and setting of drying beds. On the base of determined ability of swamp plants evapotranspiration were edited suggestion solutions of design and operation sludge bed facilities in the conditions of small rural wastewater treatment plant.

  10. Cultural Work as a Site of Struggle: Freelancers and Exploitation

    Directory of Open Access Journals (Sweden)

    Nicole S. Cohen

    2012-05-01

    Full Text Available This paper argues that Marxist political economy is a useful framework for understanding contemporary conditions of cultural work. Drawing on Karl Marx’s foundational concepts, labour process theory, and a case study of freelance writers, I argue that the debate over autonomy and control in cultural work ignores exploitation in labour-capital relationships, which is a crucial process shaping cultural work. To demonstrate the benefits of this approach, I discuss two methods media firms use to extract surplus value from freelance writers: exploitation of unpaid labour time and exploitation of intellectual property through aggressive copyright regimes. I argue that a Marxist perspective can uncover the dynamics that are transforming cultural industries and workers’ experiences. From this perspective, cultural work is understood as a site of struggle.

  11. Financial Exploitation Is Associated With Structural and Functional Brain Differences in Healthy Older Adults.

    Science.gov (United States)

    Spreng, R Nathan; Cassidy, Benjamin N; Darboh, Bri S; DuPre, Elizabeth; Lockrow, Amber W; Setton, Roni; Turner, Gary R

    2017-10-01

    Age-related brain changes leading to altered socioemotional functioning may increase vulnerability to financial exploitation. If confirmed, this would suggest a novel mechanism leading to heightened financial exploitation risk in older adults. Development of predictive neural markers could facilitate increased vigilance and prevention. In this preliminary study, we sought to identify structural and functional brain differences associated with financial exploitation in older adults. Financially exploited older adults (n = 13, 7 female) and a matched cohort of older adults who had been exposed to, but avoided, a potentially exploitative situation (n = 13, 7 female) were evaluated. Using magnetic resonance imaging, we examined cortical thickness and resting state functional connectivity. Behavioral data were collected using standardized cognitive assessments, self-report measures of mood and social functioning. The exploited group showed cortical thinning in anterior insula and posterior superior temporal cortices, regions associated with processing affective and social information, respectively. Functional connectivity encompassing these regions, within default and salience networks, was reduced, while between network connectivity was increased. Self-reported anger and hostility was higher for the exploited group. We observed financial exploitation associated with brain differences in regions involved in socioemotional functioning. These exploratory and preliminary findings suggest that alterations in brain regions implicated in socioemotional functioning may be a marker of financial exploitation risk. Large-scale, prospective studies are necessary to validate this neural mechanism, and develop predictive markers for use in clinical practice. © The Author 2017. Published by Oxford University Press on behalf of The Gerontological Society of America.

  12. Availability Control for Means of Transport in Decisive Semi-Markov Models of Exploitation Process

    Science.gov (United States)

    Migawa, Klaudiusz

    2012-12-01

    The issues presented in this research paper refer to problems connected with the control process for exploitation implemented in the complex systems of exploitation for technical objects. The article presents the description of the method concerning the control availability for technical objects (means of transport) on the basis of the mathematical model of the exploitation process with the implementation of the decisive processes by semi-Markov. The presented method means focused on the preparing the decisive for the exploitation process for technical objects (semi-Markov model) and after that specifying the best control strategy (optimal strategy) from among possible decisive variants in accordance with the approved criterion (criteria) of the activity evaluation of the system of exploitation for technical objects. In the presented method specifying the optimal strategy for control availability in the technical objects means a choice of a sequence of control decisions made in individual states of modelled exploitation process for which the function being a criterion of evaluation reaches the extreme value. In order to choose the optimal control strategy the implementation of the genetic algorithm was chosen. The opinions were presented on the example of the exploitation process of the means of transport implemented in the real system of the bus municipal transport. The model of the exploitation process for the means of transports was prepared on the basis of the results implemented in the real transport system. The mathematical model of the exploitation process was built taking into consideration the fact that the model of the process constitutes the homogenous semi-Markov process.

  13. Risk analysis and detection of thrombosis by measurement of electrical resistivity of blood.

    Science.gov (United States)

    Sapkota, Achyut; Asakura, Yuta; Maruyama, Osamu; Kosaka, Ryo; Yamane, Takashi; Takei, Masahiro

    2013-01-01

    Monitoring of thrombogenic process is very important in ventricular assistance devices (VADs) used as temporary or permanent measures in patients with advanced heart failure. Currently, there is a lack of a system which can perform a real-time monitoring of thrombogenic activity. Electrical signals vary according to the change in concentration of coagulation factors as well as the distribution of blood cells, and thus have potential to detect the thrombogenic process in an early stage. In the present work, we have made an assessment of an instrumentation system exploiting the electrical properties of blood. The experiments were conducted using bovine blood. Electrical resistance tomography with eight-electrode sensor was used to monitor the spatio-temporal change in electrical resistivity of blood in thrombogenic and non-thrombogenic condition. Under non-thrombogenic condition, the resistivity was uniform across the cross-section and average resistivity monotonically decreased with time before remaining almost flat. In contrary, under thrombogenic condition, there was non-uniform distribution across the cross-section, and average resistivity fluctuated with time.

  14. Preparation and characterization of chitosan-heparin composite matrices for blood contacting tissue engineering

    International Nuclear Information System (INIS)

    He Qing; Gong Kai; Gong Yandao; Zhang Xiufang; Ao Qiang; Zhang Lihai; Hu Min

    2010-01-01

    Chitosan has been widely used for biomaterial scaffolds in tissue engineering because of its good mechanical properties and cytocompatibility. However, the poor blood compatibility of chitosan has greatly limited its biomedical utilization, especially for blood contacting tissue engineering. In this study, we exploited a polymer blending procedure to heparinize the chitosan material under simple and mild conditions to improve its antithrombogenic property. By an optimized procedure, a macroscopically homogeneous chitosan-heparin (Chi-Hep) blended suspension was obtained, with which Chi-Hep composite films and porous scaffolds were fabricated. X-ray photoelectron spectroscopy and sulfur elemental analysis confirmed the successful immobilization of heparin in the composite matrices (i.e. films and porous scaffolds). Toluidine blue staining indicated that heparin was distributed homogeneously in the composite matrices. Only a small amount of heparin was released from the matrices during incubation in normal saline for 10 days. The composite matrices showed improved blood compatibility, as well as good mechanical properties and endothelial cell compatibility. These results suggest that the Chi-Hep composite matrices are promising candidates for blood contacting tissue engineering.

  15. Geographical aspects of exploitation of nuclear energy in Europe

    International Nuclear Information System (INIS)

    Kurucova, S.

    2007-05-01

    The topic of exploitation of nuclear energy is becoming increasingly actual in the present time in connection with frequently discussed question of 'renaissance of nuclear energetics'. The work is aimed at research of geographical aspects of exploitation of nuclear energy for military and civil purposes on the territory of Europe. The base of work represents the analysis of theoretical aspects of research of energy, mainly of nuclear energy. The work examines the historical development of exploitation of nuclear energy since its discovery, through development of military nuclear industry in Europe, big attention is paid to spreading of nuclear energetics on the territory of Europe from its beginnings up to the present time. The main part of the work represents the analysis of the present situation of exploitation of nuclear energy for civil purposes in Europe. The attention is paid to so-called nuclear fuel cycle as complex chain of several reciprocally interconnected operations of nuclear fuel treatment. The monitoring of spatial relations among individual countries within their nuclear fuel cycles is emphasised. The analysis of historical development and of the present state of nuclear energetics finished up in the outline of the perspectives of its further development in Europe. The analysis of the tendencies of evolution of world energetic economy mentions on the trend of growth of energy consumption in the world and Europe, as well as on the important position of nuclear energy in the structure of energy sources. Summary in English language is included. (author)

  16. Exploiting HRM in support of lean manufacturing

    DEFF Research Database (Denmark)

    Jørgensen, Frances; Matthiesen, Rikke

    The purpose of this paper is to investigate the ways in HRM practices are-and could potentially be-exploited to support lean manufacturing in practice. First, a review of the pertinent literature regarding HRM, SHRM, and lean manufacturing is presented to provide an understanding of the mechanisms...... by which HRM practices could, theoretically, be used to support a lean implementation. Data presented in the paper are derived from 1) a longitudinal case study on lean implementation and 2) from managers currently involved with lean manufacturing in a second company. The relevant literature and the data...... depicting the potential role in supporting HRM/lean integrated practices. The analysis of the model with respect to the theoretical background emphasizes a number of areas in which HRM could be more fully exploited in order to more successfully support lean implementation, for example, by stressing HRM...

  17. SEXUAL EXPLOITATION OF CHILDREN IN THE TOURISM – THE DARK SIDE OF TOURISM

    Directory of Open Access Journals (Sweden)

    Janez Mekinc

    2015-05-01

    Full Text Available The underlying causes of sexual exploitation and prostitution are poverty, inequality between women and men, high population growth and rural - urban migration. Victims are, predominantly, women and children with lower socio-economic status. One particular form of sexual exploitation is child sex tourism. This ruthless exploitation of children can be found throughout the world, predominantly in the third world and developing countries. Children, mainly between the ages of 6 to 14 years, are trapped in a vicious battle between large impoverished families who are dependent on their support, and a society that ruthlessly exploits them. In line with the trend in increasing child exploitation, there is, also, increasing exploitation of children for the purposes of child sex tourism. Based on the analysis of forms, reasons, impacts, consequences and trends of child sex tourism, it has been possible to develop from these findings some necessary measures to prevent this practice from occurring. Analysis of the phenomenon of child sex tourism has highlighted some fundamental conditions for preventing it becoming a social phenomenon. These include the strict implementation of laws against child labour and the political will to enforce them.

  18. The ESA Scientific Exploitation of Operational Missions element

    Science.gov (United States)

    Desnos, Yves-Louis; Regner, Peter; Delwart, Steven; Benveniste, Jerome; Engdahl, Marcus; Zehner, Claus; Mathieu, Pierre-Philippe; Bojkov, Bojan; Gascon, Ferran; Donlon, Craig; Davidson, Malcolm; Goryl, Philippe; Pinnock, Simon

    2015-04-01

    SEOM is a program element within the fourth period (2013-2017) of ESA's Earth Observation Envelope Programme (http://seom.esa.int/). The prime objective is to federate, support and expand the international research community that the ERS,ENVISAT and the Envelope programmes have built up over the last 25 years. It aims to further strengthen the leadership of the European Earth Observation research community by enabling them to extensively exploit future European operational EO missions. SEOM will enable the science community to address new scientific research that are opened by free and open access to data from operational EO missions. Based on community-wide recommendations for actions on key research issues, gathered through a series of international thematic workshops and scientific user consultation meetings, a work plan has been established and is approved every year by ESA Members States. The 2015 SEOM work plan is covering the organisation of three Science users consultation workshops for Sentinel1/3/5P , the launch of new R&D studies for scientific exploitation of the Sentinels, the development of open-source multi-mission scientific toolboxes, the organisation of advanced international training courses, summer schools and educational materials, as well as activities for promoting the scientific use of EO data. The first SEOM projects have been tendered since 2013 including the development of Sentinel toolboxes, advanced INSAR algorithms for Sentinel-1 TOPS data exploitation, Improved Atmospheric Spectroscopic data-base (IAS), as well as grouped studies for Sentinel-1, -2, and -3 land and ocean applications and studies for exploiting the synergy between the Sentinels. The status and first results from these SEOM projects will be presented and an outlook for upcoming SEOM studies will be given.

  19. Regulatory Framework on Exploration and Exploitation of Croatian Part of Adriatic

    International Nuclear Information System (INIS)

    Mudric, M.

    2015-01-01

    As the prelude to the regulation of marine exploration and exploitation activities in the Croatian Adriatic waters, the new Mining Act and Act on exploration and exploitation of hydrocarbons have provided a general legal framework for the natural resources exploration and exploitation. The latter Act also appropriated the establishment of the independent regulatory body, the Hydrocarbon Agency. It is important to mention the Decree on Fees for exploration and production of hydrocarbons, and the Decree on main technical requirements on safety and security of offshore exploration and production of hydrocarbons in the Republic of Croatia, that are of special relevance for the current activities with regard the proposed project of exploration and exploitation of the Croatian waters in search for gas and oil sea-bed deposits. The Hydrocarbon Agency has published the Strategic Study of the Likely Significant Environmental Impact of the Framework Plan and Program of Exploration and Production of Hydrocarbons in the Adriatic, a document receiving a lot of criticism from the legal experts and general public. At the same time, the experts tend to support the general idea of sea-bed exploration and exploitation, with the major antagonism still being present in the general public, with several initiatives introducing the possibility of a public referenda to oppose the sea-bed exploration and exploitation. The Government is currently preparing the Act on the Safety of Offshore Hydrocarbon Exploration and Production Operations, based on the Directive 94/22/EC of the European Parliament and of the Council of 30 May 1994 on the conditions for granting and using authorizations for the prospection, exploration and production of hydrocarbons, the Commission Implementing Regulation (EU) No 1112/2014 of 13 October 2014 determining a common format for sharing of information on major hazard indicators by the operators and owners of offshore oil and gas installations and a common format

  20. Exploitation of Factory Workers: A Study of Union Dicon Salt, Lagos ...

    African Journals Online (AJOL)

    The study examined labour exploitation in Nigeria with particular reference to Union Dicon Salt Plc., Lagos. The review of literature points to the fact that exploitation of the factory workers in the long run leads to strained relationships between management and staff. The situation becomes conflictual to the extent that both ...

  1. Economic factors of vulnerability trade and exploitation

    NARCIS (Netherlands)

    Allodi, L.

    2017-01-01

    Cybercrime markets support the development and diffusion of new attack technologies, vulnerability exploits, and malware. Whereas the revenue streams of cyber attackers have been studied multiple times in the literature, no quantitative account currently exists on the economics of attack acquisition

  2. Effect of ionizing radiation on Amphistome metacercariae

    International Nuclear Information System (INIS)

    Hafeez, Md.; Rao, B.V.

    1986-01-01

    The effect of gamma irradiation on amphistome metacercariae and the parasitological and cytological findings of the resultant flukes were studied in lambs and kids. The flukes recovered from the metacercariae irradiated at 2.0 Krad were less in percentage with stunted growth, degenerative changes of gonads, absence of eggs in uterus and hampered spermatogenesis. The metacercariae irradiated at 2.5 and 3.0 Krad could be developed into flukes and seen only 15 days post exposure but not 87/120 days. Fifteen days flukes were showing retarded development and without any reproductive organs. 39 refs., 3 tables. (author)

  3. Revision of the Neotropical Xanthandrus Verral (Diptera, Syrphidae

    Directory of Open Access Journals (Sweden)

    Borges Zuleica M.

    2003-01-01

    Full Text Available The Neotropical genus Xanthandrus Verral, 1901 is revised. Six species are redescribed: X. bucephalus (Wiedemann, 1830, X. cubanus Fluke, 1936, X. mellinoides (Macquart, 1846, X. mexicanus Curran, 1930, X. nitidulus Fluke, 1937, and X. plaumanni Fluke, 1937. Three species are included based on original descriptions: X. flavomaculatus Shannon, 1927, X. palliatus (Fluke, 1945, and X. simplex (Loew, 1861. New synonyms proposed: Argentinomyia longicornis (Walker, 1837 = Xanthandrus biguttatus Hull, 1945 syn. nov., and Xanthandrus bucephalus (Wiedemann, 1830 = Melanostoma quadrinotata Bigot, 1884 syn. nov. Description of terminalia, a key for Neotropical species, and illustrations are also presented.

  4. Thermal exploitation of shallow aquifers. Guide for the preparation of preliminary studies of technical feasibility

    International Nuclear Information System (INIS)

    Ausseur, J.Y.; Sauty, J.P.

    1982-08-01

    This report presents the main devices aimed at exploiting surface aquifers. After an introduction to the different systems of thermal exploitation of aquifers (generalities, very low energy geothermal, sensitive heat storage, interest of thermal exploitation of aquifers, indication of possible systems), this report presents the different possible systems and analyses their characteristics and performance. These systems are: direct exploitation of groundwater bodies at their natural temperature by heat sink and with release in surface networks or by geothermal dipole, or exploitation with artificial thermal refill. Thus the report addresses the single sink device with or without storage, heat pumps on dipole in surface groundwater bodies or very low temperature geothermal, the scanning dipole system, and the dipole system with hot sink and cold sink. It discusses the choice and sizing of the exploitation system. An appendix reports a feasibility preliminary study of nine cases of thermal exploitation of surface aquifers by double drills

  5. Ultrasonic imaging of material flaws exploiting multipath information

    Science.gov (United States)

    Shen, Xizhong; Zhang, Yimin D.; Demirli, Ramazan; Amin, Moeness G.

    2011-05-01

    In this paper, we consider ultrasonic imaging for the visualization of flaws in a material. Ultrasonic imaging is a powerful nondestructive testing (NDT) tool which assesses material conditions via the detection, localization, and classification of flaws inside a structure. Multipath exploitations provide extended virtual array apertures and, in turn, enhance imaging capability beyond the limitation of traditional multisensor approaches. We utilize reflections of ultrasonic signals which occur when encountering different media and interior discontinuities. The waveforms observed at the physical as well as virtual sensors yield additional measurements corresponding to different aspect angles. Exploitation of multipath information addresses unique issues observed in ultrasonic imaging. (1) Utilization of physical and virtual sensors significantly extends the array aperture for image enhancement. (2) Multipath signals extend the angle of view of the narrow beamwidth of the ultrasound transducers, allowing improved visibility and array design flexibility. (3) Ultrasonic signals experience difficulty in penetrating a flaw, thus the aspect angle of the observation is limited unless access to other sides is available. The significant extension of the aperture makes it possible to yield flaw observation from multiple aspect angles. We show that data fusion of physical and virtual sensor data significantly improves the detection and localization performance. The effectiveness of the proposed multipath exploitation approach is demonstrated through experimental studies.

  6. Sexual slavery without borders: trafficking for commercial sexual exploitation in India

    Science.gov (United States)

    Joffres, Christine; Mills, Edward; Joffres, Michel; Khanna, Tinku; Walia, Harleen; Grund, Darrin

    2008-01-01

    Trafficking in women and children is a gross violation of human rights. However, this does not prevent an estimated 800 000 women and children to be trafficked each year across international borders. Eighty per cent of trafficked persons end in forced sex work. India has been identified as one of the Asian countries where trafficking for commercial sexual exploitation has reached alarming levels. While there is a considerable amount of internal trafficking from one state to another or within states, India has also emerged as a international supplier of trafficked women and children to the Gulf States and South East Asia, as well as a destination country for women and girls trafficked for commercial sexual exploitation from Nepal and Bangladesh. Trafficking for commercial sexual exploitation is a highly profitable and low risk business that preys on particularly vulnerable populations. This paper presents an overview of the trafficking of women and girls for sexual exploitation (CSE) in India; identifies the health impacts of CSE; and suggest strategies to respond to trafficking and related issues. PMID:18817576

  7. Sexual slavery without borders: trafficking for commercial sexual exploitation in India.

    Science.gov (United States)

    Joffres, Christine; Mills, Edward; Joffres, Michel; Khanna, Tinku; Walia, Harleen; Grund, Darrin

    2008-09-25

    Trafficking in women and children is a gross violation of human rights. However, this does not prevent an estimated 800 000 women and children to be trafficked each year across international borders. Eighty per cent of trafficked persons end in forced sex work. India has been identified as one of the Asian countries where trafficking for commercial sexual exploitation has reached alarming levels. While there is a considerable amount of internal trafficking from one state to another or within states, India has also emerged as a international supplier of trafficked women and children to the Gulf States and South East Asia, as well as a destination country for women and girls trafficked for commercial sexual exploitation from Nepal and Bangladesh. Trafficking for commercial sexual exploitation is a highly profitable and low risk business that preys on particularly vulnerable populations. This paper presents an overview of the trafficking of women and girls for sexual exploitation (CSE) in India; identifies the health impacts of CSE; and suggest strategies to respond to trafficking and related issues.

  8. Piloting the older adult financial exploitation measure in adult safeguarding services.

    Science.gov (United States)

    Phelan, A; Fealy, G; Downes, C

    Financial abuse is arguably the most complex form of elder abuse as it may occur remote to the older person and it is impacted by issues such as cultural values, perpetrator intent and family expectations. Financial abuse may not be recognised by either the older person or the perpetrator, thus, its prevention, early identification and amelioration are important. The (Irish) National Centre for the Protection of Older People undertook a study to determine the appropriateness of the Older Adult Financial Exploitation Measure for use by the national safeguarding older person services. Findings from a small pilot study involving 16 safeguarding staff's use of the Older Adult Financial Exploitation Measure with 52 community dwelling older people referred to their service demonstrate a higher suspicion of financial abuse as well as identifying multiple instances of possible financial exploitation in a single individual. Thus, the Older Adult Financial Exploitation Measure is considered appropriate to assist safeguarding personnel's assessment of older people related to a suspicion of financial abuse. Copyright © 2017 Elsevier B.V. All rights reserved.

  9. Algorithms exploiting ultrasonic sensors for subject classification

    Science.gov (United States)

    Desai, Sachi; Quoraishee, Shafik

    2009-09-01

    Proposed here is a series of techniques exploiting micro-Doppler ultrasonic sensors capable of characterizing various detected mammalian targets based on their physiological movements captured a series of robust features. Employed is a combination of unique and conventional digital signal processing techniques arranged in such a manner they become capable of classifying a series of walkers. These processes for feature extraction develops a robust feature space capable of providing discrimination of various movements generated from bipeds and quadrupeds and further subdivided into large or small. These movements can be exploited to provide specific information of a given signature dividing it in a series of subset signatures exploiting wavelets to generate start/stop times. After viewing a series spectrograms of the signature we are able to see distinct differences and utilizing kurtosis, we generate an envelope detector capable of isolating each of the corresponding step cycles generated during a walk. The walk cycle is defined as one complete sequence of walking/running from the foot pushing off the ground and concluding when returning to the ground. This time information segments the events that are readily seen in the spectrogram but obstructed in the temporal domain into individual walk sequences. This walking sequence is then subsequently translated into a three dimensional waterfall plot defining the expected energy value associated with the motion at particular instance of time and frequency. The value is capable of being repeatable for each particular class and employable to discriminate the events. Highly reliable classification is realized exploiting a classifier trained on a candidate sample space derived from the associated gyrations created by motion from actors of interest. The classifier developed herein provides a capability to classify events as an adult humans, children humans, horses, and dogs at potentially high rates based on the tested sample

  10. Exploiting indigenous knowledge in the environmental conservation ...

    African Journals Online (AJOL)

    ... of agriculture and reared livestock (especially goats). Over several years, they developed sustainable and effective exploitation mechanisms of the existing biodiversity resources to satisfy their individual needs and those of their societies in general. Journal of Language, Technology and Entrepreneurship in Africa Vol.

  11. Managerial attention to exploitation versus exploration : Toward a dynamic perspective on ambidexterity

    NARCIS (Netherlands)

    Walrave, B.; Romme, A.G.L.; van Oorschot, K.E.; Langerak, F.

    2017-01-01

    Managerial attention to exploitation and exploration has a strong influence on organizational performance. However, there is hardly any knowledge about whether senior managers need to adjust their distribution of attention to exploitation and exploration in response to major changes in demand

  12. Water Exploitation and Its Outcomes Caused by Capitalism as Reflected on Gore Verbinski's Rango Movie

    OpenAIRE

    SETIAWAN, DANIEL NUGRAHA

    2014-01-01

    Nugraha Setiawan, Daniel. 2014. Water Exploitation and Its Outcome Caused byCapitalism as Reflected on Gore Verbinski's Rango Movie. Study Program ofEnglish, Universitas Brawijaya.Supervisor: Yusri Fajar, Co-supervisor: Melania Shinta Harendika.Keywords: water exploitation, environment, capitalism, Rango movie. Water exploitation threats ecosystem and causes a great damage to environment. One of the causes of the water exploitation is capitalism. The movie entitled Rango reveals some causes a...

  13. Boldness predicts an individual's position along an exploration-exploitation foraging trade-off.

    Science.gov (United States)

    Patrick, Samantha C; Pinaud, David; Weimerskirch, Henri

    2017-09-01

    Individuals do not have complete information about the environment and therefore they face a trade-off between gathering information (exploration) and gathering resources (exploitation). Studies have shown individual differences in components of this trade-off but how stable these strategies are in a population and the intrinsic drivers of these differences is not well understood. Top marine predators are expected to experience a particularly strong trade-off as many species have large foraging ranges and their prey often have a patchy distribution. This environment leads these species to exhibit pronounced exploration and exploitation phases but differences between individuals are poorly resolved. Personality differences are known to be important in foraging behaviour but also in the trade-off between exploration and exploitation. Here we test whether personality predicts an individual exploration-exploitation strategy using wide ranging wandering albatrosses (Diomedea exulans) as a model system. Using GPS tracking data from 276 wandering albatrosses, we extract foraging parameters indicative of exploration (searching) and exploitation (foraging) and show that foraging effort, time in patch and size of patch are strongly correlated, demonstrating these are indicative of an exploration-exploitation (EE) strategy. Furthermore, we show these are consistent within individuals and appear stable in the population, with no reproductive advantage. The searching and foraging behaviour of bolder birds placed them towards the exploration end of the trade-off, whereas shy birds showed greater exploitation. This result provides a mechanism through which individual foraging strategies may emerge. Age and sex affected components of the trade-off, but not the trade-off itself, suggesting these factors may drive behavioural compensation to maintain resource acquisition and this was supported by the evidence that there were no fitness consequence of any EE trait nor the trade

  14. Approaches to genotyping individual miracidia of Schistosoma japonicum

    OpenAIRE

    Xiao, Ning; Remais, Justin V.; Brindley, Paul J.; Qiu, Dong-chuan; Carlton, Elizabeth J.; Li, Rong-zhi; Lei, Yang; Blair, David

    2013-01-01

    Molecular genetic tools are needed to address questions as to the source and dynamics of transmission of the human blood fluke Schistosoma japonicum in regions where human infections have re-emerged, and to characterize infrapopulations in individual hosts. The life-stage that interests us as a target for collecting genotypic data is the miracidium, a very small larval stage that consequently yields very little DNA for analysis. Here, we report the successful development of a multiplex format...

  15. Exploiting citation contexts for physics retrieval

    DEFF Research Database (Denmark)

    Dabrowska, Anna; Larsen, Birger

    2015-01-01

    The text surrounding citations within scientific papers may contain terms that usefully describe cited documents and can benefit retrieval. We present a preliminary study that investigates appending ci- tation contexts from citing documents to cited documents in the iSearch test collection. We ex...... in a large collection of physics papers, paving the way for future research that exploits citation contexts for retrieval....

  16. Normative Beliefs about Aggression as a Mediator of Narcissistic Exploitativeness and Cyberbullying

    Science.gov (United States)

    Ang, Rebecca P.; Tan, Kit-Aun; Mansor, Abu Talib

    2011-01-01

    The current study examined normative beliefs about aggression as a mediator between narcissistic exploitativeness and cyberbullying using two Asian adolescent samples from Singapore and Malaysia. Narcissistic exploitativeness was significantly and positively associated with cyberbullying and normative beliefs about aggression and normative beliefs…

  17. SEXUAL EXPLOITATION OF CHILDREN IN THE TOURISM – THE DARK SIDE OF TOURISM

    OpenAIRE

    Janez Mekinc; Katarina Music

    2015-01-01

    The underlying causes of sexual exploitation and prostitution are poverty, inequality between women and men, high population growth and rural - urban migration. Victims are, predominantly, women and children with lower socio-economic status. One particular form of sexual exploitation is child sex tourism. This ruthless exploitation of children can be found throughout the world, predominantly in the third world and developing countries. Children, mainly between the ages of 6 to 14 years, are t...

  18. A Systematic Evaluation of Blood Serum and Plasma Pre-Analytics for Metabolomics Cohort Studies

    Directory of Open Access Journals (Sweden)

    Elodie Jobard

    2016-12-01

    Full Text Available The recent thriving development of biobanks and associated high-throughput phenotyping studies requires the elaboration of large-scale approaches for monitoring biological sample quality and compliance with standard protocols. We present a metabolomic investigation of human blood samples that delineates pitfalls and guidelines for the collection, storage and handling procedures for serum and plasma. A series of eight pre-processing technical parameters is systematically investigated along variable ranges commonly encountered across clinical studies. While metabolic fingerprints, as assessed by nuclear magnetic resonance, are not significantly affected by altered centrifugation parameters or delays between sample pre-processing (blood centrifugation and storage, our metabolomic investigation highlights that both the delay and storage temperature between blood draw and centrifugation are the primary parameters impacting serum and plasma metabolic profiles. Storing the blood drawn at 4 °C is shown to be a reliable routine to confine variability associated with idle time prior to sample pre-processing. Based on their fine sensitivity to pre-analytical parameters and protocol variations, metabolic fingerprints could be exploited as valuable ways to determine compliance with standard procedures and quality assessment of blood samples within large multi-omic clinical and translational cohort studies.

  19. Escaping from the exploitation trap by shaping the digital future

    OpenAIRE

    Füzes, Péter; Gódor, Zoltán; Szabó, Zsolt Roland

    2017-01-01

    Even Fortune 500 firms can disappear quickly, because many of them falls into an exploitation trap. Examples show that certain organizations – that manifest ambidextrous features – can avoid the exploitation trap. But, how can they do it? Authors tracked the digital transformation of a Fortune 500 company in order to understand the strategic and organizational challenges and solutions to become resilient and prosperous. A cutting edge example is shown in the paper about how an industry leader...

  20. Identification of lead chemotherapeutic agents from medicinal plants against blood flukes and whipworms.

    Science.gov (United States)

    Wangchuk, Phurpa; Giacomin, Paul R; Pearson, Mark S; Smout, Michael J; Loukas, Alex

    2016-08-30

    Schistosomiasis and trichuriasis are two of the most common neglected tropical diseases (NTD) that affect almost a billion people worldwide. There is only a limited number of effective drugs to combat these NTD. Medicinal plants are a viable source of parasiticides. In this study, we have investigated six of the 19 phytochemicals isolated from two Bhutanese medicinal plants, Corydalis crispa and Pleurospermum amabile, for their anthelmintic properties. We used the xWORM technique and Scanning Electron Microscope-based imaging to determine the activity of the compounds. Of the six compounds tested, isomyristicin and bergapten showed significant anthelmintic activity against Schistosoma mansoni and Trichuris muris with bergapten being the most efficacious compound one against both parasites (S. mansoni IC50 = 8.6 μg/mL and T. muris IC50 = 10.6 μg/mL) and also against the schistosomulum stage of S. mansoni. These two compounds induced tegumental damage to S. mansoni and affected the cuticle, bacillary bands and bacillary glands of T. muris. The efficacy against multiple phylogenetically distinct parasites and different life stages, especially the schistosomulum where praziquantel is ineffective, makes isomyristicin and bergapten novel scaffolds for broad-spectrum anthelmintic drug development that could be used for the control of helminths infecting humans and animals.

  1. Tingkat Infeksi Cacing Hati Kaitannya dengan Kerugian Ekonomi Sapi Potong yang Disembelih di Rumah Potong Hewan Wilayah Eks-Kresidenan Banyumas

    Directory of Open Access Journals (Sweden)

    Munadi Munadi

    2011-04-01

    Full Text Available The level of liver flukes infection and its relation to the economic loss of beef cattle at the abattoir of banyumas ex-resident ABSTRACT. The aims of this study was (i to find out the level of liver flukes infection based on body weight, age of beef cattle and their background of origin, and (ii to know the relationship between the level of liver flukes infection, body weight, age, background of origin and the level of economic losses of beef cattle. This study was conducted at four abattoir located at Banyumas, Cilacap, Purbalingga and Banjarnegara regencies, Central Java province. The sample was taken by purposive sampling. 20 beef cattle that infected by liver fluke in each abattoir were involved in this study. Multiple linear regression was applied in data analysis. This study revealed that (1 Average of the liver flukes infection level in this areas was 47 present. (2 Under 1-2 of age, the highest liver flukes infection level found at thin body condition (53% and moderate (31%; under 2,5-3 of age, they are found at fat body condition (75% and moderate (62%; under 3,5-4 of age the highest liver flukes infection level found at moderate and far body condition (100% and 67%, respectively. (3 Economic loss of beef cattle (Y affected by factors of the liver flukes infection level (X1, body weight (X2, age (X3, background of origin (Dummy with determinant coefficient 0,625 and regression equation as fallow; Y = 18792,397 + 207,334 X1 - 17,905 X2 – 1981,969 X3 - 1178,544 D.

  2. Impact socio-environnemental de l'exploitation du sable marin sur le ...

    African Journals Online (AJOL)

    En effet, l'exploitation du sable marin dans cette contrée s'est ouverte et évolue du fait de l'urbanisation galopante de la Commune liée à l'érection des ... In addition, the uncontrolled exploitation increased coastal erosion and does little to improve the conditions of economic and social life of the people who indulge ...

  3. Nuclear and mitochondrial DNA analysis reveals that hybridization between Fasciola hepatica and Fasciola gigantica occurred in China.

    Science.gov (United States)

    Ichikawa-Seki, Madoka; Peng, Mao; Hayashi, Kei; Shoriki, Takuya; Mohanta, Uday Kumar; Shibahara, Toshiyuki; Itagaki, Tadashi

    2017-02-01

    The well-known pathogens of fasciolosis, Fasciola hepatica (Fh) and Fasciola Gigantica (Fg), possess abundant mature sperms in their seminal vesicles, and thus, they reproduce bisexually. On the other hand, aspermic Fasciola flukes reported from Asian countries, which have no sperm in their seminal vesicles, probably reproduce parthenogenetically. The aim of this study was to reveal the origin of aspermic Fasciola flukes. The nuclear single copy markers, phosphoenolpyruvate carboxykinase and DNA polymerase delta, were employed for analysis of Fasciola species from China. The hybrid origin of aspermic Fasciola flukes was strongly suggested by the presence of the Fh/Fg type, which includes DNA fragments of both F. hepatica and F. gigantica. China can be regarded as the cradle of the interspecific hybridization because F. hepatica and F. gigantica were detected in the northern and southern parts of China, respectively, and hybrids flukes were distributed between the habitats of the two species. The Chinese origin was supported by the fact that a larger number of mitochondrial NADH dehydrogenase subunit 1 (nad1) haplotypes was detected in Chinese aspermic Fasciola populations than in aspermic populations from the neighbouring countries. Hereafter, 'aspermic' Fasciola flukes should be termed as 'hybrid' Fasciola flukes.

  4. Uncovering Indicators of Commercial Sexual Exploitation.

    Science.gov (United States)

    Bounds, Dawn; Delaney, Kathleen R; Julion, Wrenetha; Breitenstein, Susan

    2017-07-01

    It is estimated that annually 100,000 to 300,000 youth are at risk for sex trafficking; a commercial sex act induced by force, fraud, or coercion, or any such act where the person induced to perform such an act is younger than 18 years of age. Increasingly, such transactions are occurring online via Internet-based sites that serve the commercial sex industry. Commercial sex transactions involving trafficking are illegal; thus, Internet discussions between those involved must be veiled. Even so, transactions around sex trafficking do occur. Within these transactions are innuendos that provide one avenue for detecting potential activity. The purpose of this study is to identify linguistic indicators of potential commercial sexual exploitation within the online comments of men posted on an Internet site. Six hundred sixty-six posts from five Midwest cities and 363 unique members were analyzed via content analysis. Three main indicators were found: the presence of youth or desire for youthfulness, presence of pimps, and awareness of vulnerability. These findings begin a much-needed dialogue on uncovering online risks of commercial sexual exploitation and support the need for further research on Internet indicators of sex trafficking.

  5. Growth, Mortality and Exploitation Rates of Sarotherodon ...

    African Journals Online (AJOL)

    Evans

    ABSTRACT. Sarotherodon melanotheron population of Dominli Lagoon in the Western Region of Ghana was studied for its growth and mortality parameters as well as exploitation rate. The study generally aimed at providing basic information necessary for the assessment and management of the fish stock in the lagoon.

  6. Incorporating placental tissue in cord blood banking for stem cell transplantation.

    Science.gov (United States)

    Teofili, Luciana; Silini, Antonietta R; Bianchi, Maria; Valentini, Caterina Giovanna; Parolini, Ornella

    2018-06-01

    Human term placenta is comprised of various tissues from which different cell populations can be obtained, including hematopoietic stem cells and mesenchymal stem/stromal cells (MSCs). Areas covered: This review will discuss the possibility to incorporate placental tissue cells in cord blood banking. It will discuss general features of human placenta, with a brief review of the immune cells at the fetal-maternal interface and the different cell populations isolated from placenta, with a particular focus on MSCs. It will address the question as to why placenta-derived MSCs should be banked with their hematopoietic counterparts. It will discuss clinical trials which are studying safety and efficacy of placenta tissue-derived MSCs in selected diseases, and preclinical studies which have proven their therapeutic properties in other diseases. It will discuss banking of umbilical cord blood and raise several issues for improvement, and the applications of cord blood cells in non-malignant disorders. Expert Commentary: Umbilical cord blood banking saves lives worldwide. The concomitant banking of non-hematopoietic cells from placenta, which could be applied therapeutically in the future, alone or in combination to their hematopoietic counterparts, could exploit current banking processes while laying the foundation for clinical trials exploring placenta-derived cell therapies in regenerative medicine.

  7. The exploitation of "Exploitation" in the tenofovir prep trial in Cameroon: Lessons learned from media coverage of an HIV prevention trial.

    Science.gov (United States)

    Mack, Natasha; Robinson, Elizabeth T; MacQueen, Kathleen M; Moffett, Jill; Johnson, Laura M

    2010-06-01

    media coverage influences how clinical trials are perceived internationally and in communities where trials occur, affecting recruitment, retention, and political support for research. We conducted a discourse analysis of news coverage from 2004-2005 of a trial in Cameroon on oral PrEP for HIV prevention, to identify messages, communication techniques, and sources of messages that were amplified via media. We identified two parallel discourses: one on ethical concerns about the Cameroon trial, and a second, more general "science exploitation" discourse concerned with the potential for trials with vulnerable participant populations to be conducted unethically, benefiting only wealthy populations. Researchers should overtly address exploitation as an integral, ongoing component of research, particularly where historical or cultural conditions set the stage for controversy to emerge.

  8. The exploration-exploitation dilemma: a multidisciplinary framework.

    Directory of Open Access Journals (Sweden)

    Oded Berger-Tal

    Full Text Available The trade-off between the need to obtain new knowledge and the need to use that knowledge to improve performance is one of the most basic trade-offs in nature, and optimal performance usually requires some balance between exploratory and exploitative behaviors. Researchers in many disciplines have been searching for the optimal solution to this dilemma. Here we present a novel model in which the exploration strategy itself is dynamic and varies with time in order to optimize a definite goal, such as the acquisition of energy, money, or prestige. Our model produced four very distinct phases: Knowledge establishment, Knowledge accumulation, Knowledge maintenance, and Knowledge exploitation, giving rise to a multidisciplinary framework that applies equally to humans, animals, and organizations. The framework can be used to explain a multitude of phenomena in various disciplines, such as the movement of animals in novel landscapes, the most efficient resource allocation for a start-up company, or the effects of old age on knowledge acquisition in humans.

  9. Exploiting Quantum Resonance to Solve Combinatorial Problems

    Science.gov (United States)

    Zak, Michail; Fijany, Amir

    2006-01-01

    Quantum resonance would be exploited in a proposed quantum-computing approach to the solution of combinatorial optimization problems. In quantum computing in general, one takes advantage of the fact that an algorithm cannot be decoupled from the physical effects available to implement it. Prior approaches to quantum computing have involved exploitation of only a subset of known quantum physical effects, notably including parallelism and entanglement, but not including resonance. In the proposed approach, one would utilize the combinatorial properties of tensor-product decomposability of unitary evolution of many-particle quantum systems for physically simulating solutions to NP-complete problems (a class of problems that are intractable with respect to classical methods of computation). In this approach, reinforcement and selection of a desired solution would be executed by means of quantum resonance. Classes of NP-complete problems that are important in practice and could be solved by the proposed approach include planning, scheduling, search, and optimal design.

  10. Legal Approaches to Combating the Exploitation of Third-Country National Seasonal Workers

    NARCIS (Netherlands)

    Rijken, Conny

    2015-01-01

    The Directive on Seasonal workers is aimed at combating exploitative practices vis-a-vis seasonal workers from outside the EU. After a thorough analysis of the conditions under which practices can be qualified as exploitative, this article assesses the extent to which the directive is equipped to

  11. Exploiting the opportunities of Internet and multi-channel pricing : An exploratory research

    NARCIS (Netherlands)

    Sotgiu, Francesca; Ancarani, Fabio

    2004-01-01

    Smart firms are not worried about the impact of the Internet on pricing, but realise that they have the unique opportunity to exploit new options and improve their marketing performance. Multi-channel pricing is one of the most interesting opportunities firms can exploit in the digital economy.

  12. Residual coal exploitation and its impact on sustainable development of the coal industry in China

    International Nuclear Information System (INIS)

    Zhang, Yujiang; Feng, Guorui; Zhang, Min; Ren, Hongrui; Bai, Jinwen; Guo, Yuxia; Jiang, Haina; Kang, Lixun

    2016-01-01

    Although China owns large coal reserves, it now faces the problem of depletion of its coal resources in advance. The coal-based energy mix in China will not change in the short term, and a means of delaying the coal resources depletion is therefore urgently required. The residual coal was exploited first with a lower recovery percentage and was evaluated as commercially valuable damaged coal. This approach is in comparison to past evaluations when the residual coal was allocated as exploitation losses. Coal recovery rates, the calculation method of residual coal reserves and statistics of its mines in China were given. On this basis, a discussion concerning the impacts on the delay of China's coal depletion, development of coal exploitation and sustainable developments, as well as technologies and relevant policies, were presented. It is considered that the exploitation of residual coal can effectively delay China's coal depletion, inhibit the construction of new mines, redress the imbalance between supply and demand of coal in eastern China, improve the mining area environment and guarantee social stability. The Chinese government supports the exploitation technologies of residual coal. Hence, exploiting residual coal is of considerable importance in sustainable development of the coal industry in China. - Highlights: •Pay attention to residual coal under changing energy-mix environment in China. •Estimate residual coal reserves and investigate its exploitation mines. •Discuss impacts of residual coal exploitation on delay of coal depletion in China. •Discuss impacts on coal mining industry and residual coal exploitation technology. •Give corresponding policy prescriptions.

  13. Child Exploitation: Some Pieces of the Puzzle.

    Science.gov (United States)

    Rohlader, Dorothy

    The report addresses the status in North Carolina and in the nation of child exploitation. Legislative and judicial backgrounds of child pornography and child prostitution are reviewed, and difficulties in obtaining statistical data are noted. Law enforcement issues in pornography are cited, and suggestions for further legislation regarding child…

  14. Fishing elevates variability in the abundance of exploited species.

    Science.gov (United States)

    Hsieh, Chih-Hao; Reiss, Christian S; Hunter, John R; Beddington, John R; May, Robert M; Sugihara, George

    2006-10-19

    The separation of the effects of environmental variability from the impacts of fishing has been elusive, but is essential for sound fisheries management. We distinguish environmental effects from fishing effects by comparing the temporal variability of exploited versus unexploited fish stocks living in the same environments. Using the unique suite of 50-year-long larval fish surveys from the California Cooperative Oceanic Fisheries Investigations we analyse fishing as a treatment effect in a long-term ecological experiment. Here we present evidence from the marine environment that exploited species exhibit higher temporal variability in abundance than unexploited species. This remains true after accounting for life-history effects, abundance, ecological traits and phylogeny. The increased variability of exploited populations is probably caused by fishery-induced truncation of the age structure, which reduces the capacity of populations to buffer environmental events. Therefore, to avoid collapse, fisheries must be managed not only to sustain the total viable biomass but also to prevent the significant truncation of age structure. The double jeopardy of fishing to potentially deplete stock sizes and, more immediately, to amplify the peaks and valleys of population variability, calls for a precautionary management approach.

  15. Administrative, institutional and legislative issues on agricultural waste exploitation in Turkey

    International Nuclear Information System (INIS)

    Kaya, Durmus; Baban, Ahmet; Dikec, Stephanie; Canka Kilic, Fatma

    2008-01-01

    In this study, the influence of non-technical issues on the exploitation of agricultural waste in Turkey was investigated in accordance with the work program requirements for the project entitled ''Exploitation of Agricultural Waste in Turkey'' under the EU Life Third Countries Program. The study has been organized and presented according to the following four phases: (i) study of existing Turkish legislation and the administrative and institutional framework, (ii) review and analysis of the EU policy and legislation relevant to agricultural waste, including identification of potential market instruments, (iii) identification of barriers to the promotion of agricultural waste exploitation in Turkey, and (iv) Identification of gaps and formulation of recommendations. An ultimate objective of this study is to transfer the European experience and practices relative to the overall framework of managing agricultural waste. (author)

  16. Exploiting Thread Parallelism for Ocean Modeling on Cray XC Supercomputers

    Energy Technology Data Exchange (ETDEWEB)

    Sarje, Abhinav [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Jacobsen, Douglas W. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Williams, Samuel W. [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Ringler, Todd [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Oliker, Leonid [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States)

    2016-05-01

    The incorporation of increasing core counts in modern processors used to build state-of-the-art supercomputers is driving application development towards exploitation of thread parallelism, in addition to distributed memory parallelism, with the goal of delivering efficient high-performance codes. In this work we describe the exploitation of threading and our experiences with it with respect to a real-world ocean modeling application code, MPAS-Ocean. We present detailed performance analysis and comparisons of various approaches and configurations for threading on the Cray XC series supercomputers.

  17. Interpretation of Blood Microbiology Results - Function of the Clinical Microbiologist.

    Science.gov (United States)

    Kristóf, Katalin; Pongrácz, Júlia

    2016-04-01

    The proper use and interpretation of blood microbiology results may be one of the most challenging and one of the most important functions of clinical microbiology laboratories. Effective implementation of this function requires careful consideration of specimen collection and processing, pathogen detection techniques, and prompt and precise reporting of identification and susceptibility results. The responsibility of the treating physician is proper formulation of the analytical request and to provide the laboratory with complete and precise patient information, which are inevitable prerequisites of a proper testing and interpretation. The clinical microbiologist can offer advice concerning the differential diagnosis, sampling techniques and detection methods to facilitate diagnosis. Rapid detection methods are essential, since the sooner a pathogen is detected, the better chance the patient has of getting cured. Besides the gold-standard blood culture technique, microbiologic methods that decrease the time in obtaining a relevant result are more and more utilized today. In the case of certain pathogens, the pathogen can be identified directly from the blood culture bottle after propagation with serological or automated/semi-automated systems or molecular methods or with MALDI-TOF MS (matrix-assisted laser desorption-ionization time of flight mass spectrometry). Molecular biology methods are also suitable for the rapid detection and identification of pathogens from aseptically collected blood samples. Another important duty of the microbiology laboratory is to notify the treating physician immediately about all relevant information if a positive sample is detected. The clinical microbiologist may provide important guidance regarding the clinical significance of blood isolates, since one-third to one-half of blood culture isolates are contaminants or isolates of unknown clinical significance. To fully exploit the benefits of blood culture and other (non- culture

  18. On the dynamics of exploited fish populations

    National Research Council Canada - National Science Library

    Beverton, R. J. H; Holt, Sidney J

    1993-01-01

    ...-brooding cichlids, and viviparity in many sharks and toothcarps. Moreover, fish are of considerable importance to the survival of the human species in the form of nutritious, delicious and diverse food. Rational exploitation and management of our global stocks of fishes must rely upon a detailed and precise insight of their biology. The...

  19. 25 CFR 20.516 - How are child abuse, neglect or exploitation cases to be handled?

    Science.gov (United States)

    2010-04-01

    ... 25 Indians 1 2010-04-01 2010-04-01 false How are child abuse, neglect or exploitation cases to be... FINANCIAL ASSISTANCE AND SOCIAL SERVICES PROGRAMS Child Assistance Foster Care § 20.516 How are child abuse, neglect or exploitation cases to be handled? Reported child abuse, neglect or exploitation cases and the...

  20. Administrative, institutional and legislative issues on agricultural waste exploitation in Turkey

    Energy Technology Data Exchange (ETDEWEB)

    Kaya, Durmus; Baban, Ahmet; Dikec, Stephanie [TUBITAK MRC Chemistry and Enviorenment Institute, P.O. Box 21, 41470 Gebze-Kocaeli (Turkey); Canka Kilic, Fatma [Kocaeli University, KMYO, Department of Air Conditioning and Refrigeration, Kullar/Kocaeli (Turkey)

    2008-02-15

    In this study, the influence of non-technical issues on the exploitation of agricultural waste in Turkey was investigated in accordance with the work program requirements for the project entitled ''Exploitation of Agricultural Waste in Turkey'' under the EU Life Third Countries Program. The study has been organized and presented according to the following four phases: (i) study of existing Turkish legislation and the administrative and institutional framework, (ii) review and analysis of the EU policy and legislation relevant to agricultural waste, including identification of potential market instruments, (iii) identification of barriers to the promotion of agricultural waste exploitation in Turkey, and (iv) Identification of gaps and formulation of recommendations. An ultimate objective of this study is to transfer the European experience and practices relative to the overall framework of managing agricultural waste. (author)

  1. Environmental Impacts of Sand Exploitation. Analysis of Sand Market

    Directory of Open Access Journals (Sweden)

    Marius Dan Gavriletea

    2017-06-01

    Full Text Available Sand is an indispensable natural resource for any society. Despite society’s increasing dependence on sand, there are major challenges that this industry needs to deal with: limited sand resources, illegal mining, and environmental impact of sand mining. The purpose of this paper is twofold: to present an overview of the sand market, highlighting the main trends and actors for production, export and import, and to review the main environmental impacts associated with sand exploitation process. Based on these findings, we recommend different measures to be followed to reduce negative impacts. Sand mining should be done in a way that limits environmental damage during exploitation and restores the land after mining operations are completed.

  2. Uncertainty avoidance and the exploration-exploitation trade-off

    NARCIS (Netherlands)

    Broekhuizen, Thijs; Giarratana, Marco S.; Torres, Anna

    2017-01-01

    Purpose - This study aims to investigate how a firm's uncertainty avoidance - as indicated by the headquarters' national culture - impacts firm performance by affecting exploratory (product innovation) and exploitative (brand trademark protection) activities. It aims to show that firms characterized

  3. Un premier service mobile en Égypte qui relie les petits exploitants ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Un premier service mobile en Égypte qui relie les petits exploitants aux acheteurs. Un homme qui parle sur un téléphone mobile. Les petits exploitants agricoles dominent l'agriculture égyptienne, mais leur manque de connaissances en matière de commercialisation et de compétences techniques, ainsi qu'une mauvaise ...

  4. Direct and long-term detection of gene doping in conventional blood samples.

    Science.gov (United States)

    Beiter, T; Zimmermann, M; Fragasso, A; Hudemann, J; Niess, A M; Bitzer, M; Lauer, U M; Simon, P

    2011-03-01

    The misuse of somatic gene therapy for the purpose of enhancing athletic performance is perceived as a coming threat to the world of sports and categorized as 'gene doping'. This article describes a direct detection approach for gene doping that gives a clear yes-or-no answer based on the presence or absence of transgenic DNA in peripheral blood samples. By exploiting a priming strategy to specifically amplify intronless DNA sequences, we developed PCR protocols allowing the detection of very small amounts of transgenic DNA in genomic DNA samples to screen for six prime candidate genes. Our detection strategy was verified in a mouse model, giving positive signals from minute amounts (20 μl) of blood samples for up to 56 days following intramuscular adeno-associated virus-mediated gene transfer, one of the most likely candidate vector systems to be misused for gene doping. To make our detection strategy amenable for routine testing, we implemented a robust sample preparation and processing protocol that allows cost-efficient analysis of small human blood volumes (200 μl) with high specificity and reproducibility. The practicability and reliability of our detection strategy was validated by a screening approach including 327 blood samples taken from professional and recreational athletes under field conditions.

  5. Human trafficking and exploitation: A global health concern.

    Science.gov (United States)

    Zimmerman, Cathy; Kiss, Ligia

    2017-11-01

    In this collection review, Cathy Zimmerman and colleague introduce the PLOS Medicine Collection on Human Trafficking, Exploitation and Health, laying out the magnitude of the global trafficking problem and offering a public health policy framework to guide responses to trafficking.

  6. Optical coherence tomography for blood glucose monitoring in vitro through spatial and temporal approaches

    Science.gov (United States)

    De Pretto, Lucas Ramos; Yoshimura, Tania Mateus; Ribeiro, Martha Simões; Zanardi de Freitas, Anderson

    2016-08-01

    As diabetes causes millions of deaths worldwide every year, new methods for blood glucose monitoring are in demand. Noninvasive approaches may increase patient adherence to treatment while reducing costs, and optical coherence tomography (OCT) may be a feasible alternative to current invasive diagnostics. This study presents two methods for blood sugar monitoring with OCT in vitro. The first, based on spatial statistics, exploits changes in the light total attenuation coefficient caused by different concentrations of glucose in the sample using a 930-nm commercial OCT system. The second, based on temporal analysis, calculates differences in the decorrelation time of the speckle pattern in the OCT signal due to blood viscosity variations with the addition of glucose with data acquired by a custom built Swept Source 1325-nm OCT system. Samples consisted of heparinized mouse blood, phosphate buffer saline, and glucose. Additionally, further samples were prepared by diluting mouse blood with isotonic saline solution to verify the effect of higher multiple scattering components on the ability of the methods to differentiate glucose levels. Our results suggest a direct relationship between glucose concentration and both decorrelation rate and attenuation coefficient, with our systems being able to detect changes of 65 mg/dL in glucose concentration.

  7. Energy for lunar resource exploitation

    Science.gov (United States)

    Glaser, Peter E.

    1992-02-01

    Humanity stands at the threshold of exploiting the known lunar resources that have opened up with the access to space. America's role in the future exploitation of space, and specifically of lunar resources, may well determine the level of achievement in technology development and global economic competition. Space activities during the coming decades will significantly influence the events on Earth. The 'shifting of history's tectonic plates' is a process that will be hastened by the increasingly insistent demands for higher living standards of the exponentially growing global population. Key to the achievement of a peaceful world in the 21st century, will be the development of a mix of energy resources at a societally acceptable and affordable cost within a realistic planning horizon. This must be the theme for the globally applicable energy sources that are compatible with the Earth's ecology. It is in this context that lunar resources development should be a primary goal for science missions to the Moon, and for establishing an expanding human presence. The economic viability and commercial business potential of mining, extracting, manufacturing, and transporting lunar resource based materials to Earth, Earth orbits, and to undertake macroengineering projects on the Moon remains to be demonstrated. These extensive activities will be supportive of the realization of the potential of space energy sources for use on Earth. These may include generating electricity for use on Earth based on beaming power from Earth orbits and from the Moon to the Earth, and for the production of helium 3 as a fuel for advanced fusion reactors.

  8. Molecular and phylogenetic analyses of the liver amphistome Explanatum explanatum (Creplin, 1847) Fukui, 1929 in ruminants from Bangladesh and Nepal based on nuclear ribosomal ITS2 and mitochondrial nad1 sequences.

    Science.gov (United States)

    Mohanta, U K; Rana, H B; Devkota, B; Itagaki, T

    2017-07-01

    Explanatum explanatum flukes, liver amphistomes of ruminants, cause significant economic loss in the livestock industry by inducing severe liver damage. A total of 66 flukes from 26 buffaloes and 7 cattle in four different geographic areas of Bangladesh and 20 flukes from 10 buffaloes in the Chitwan district of Nepal were subjected for analysis. The sequences (442 bp) of the second internal transcribed spacer (ITS2) of ribosomal DNA and the variable fragments (657 bp) of mitochondrial nicotinamide dehydrogenase subunit 1 (nad1) of E. explanatum flukes from Bangladesh and Nepal were analysed. The aim of this study was molecular characterization of the flukes and to elucidate their origin and biogeography. In the ITS2 region, two genotypes were detected among the flukes from Bangladesh, while flukes from Nepal were of only one genotype. Phylogenetic analyses inferred from the nad1 gene revealed that at least four divergent populations (groups I-IV) are distributed in Bangladesh, whereas two divergent populations were found to be distributed in Nepal. Fst values (pairwise fixation index) suggest that Bangladeshi and Nepalese populations of group I to IV are significantly different from each other; but within groups III and IV, the populations from Bangladesh and Nepal were genetically close. This divergence in the nad1 gene indicates that each lineage of E. explanatum from diverse geography was co-adapted during the multiple domestication events of ruminants. This study, for the first time, provides molecular characterization of E. explanatum in Bangladesh and Nepal, and may provide useful information for elucidating its origin and dispersal route in Asia.

  9. Fasciola hepatica: a light and electron microscope study of the ovary and of the development of oocytes within eggs in the uterus provides an insight into reproductive strategy.

    Science.gov (United States)

    Hanna, R E B; Moffett, D; Forster, F I; Trudgett, A G; Brennan, G P; Fairweather, I

    2016-05-15

    The ultrastructure of the ovary of Fasciola hepatica collected from field-infected sheep, was compared with that of flukes from laboratory-infected rats harbouring the Oberon or the Cullompton fluke isolate. At the periphery of the ovarian tubules, in all flukes, interstitial tissue was identified that appears to provide physical support and facilitate the metabolism of the germinal-line cells. Oogonia undergo mitotic division to maintain the cell population and to produce oocytes. Early oocytes feature conspicuous synaptonemal complexes in the nucleoplasm, and these become less evident as the oocytes grow in size, move towards the core of the ovarian tubule, and synthesise osmiophilic bodies. The latter may represent cortical granules, and serve to block polyspermy. The identity of the synaptonemal complexes was confirmed by immunocytochemical labelling of synaptonemal proteins. The occurrence of synaptonemal complexes in the oocytes of all fluke types examined indicates that pairing of bivalent chromosomes, with the potential for genetic recombination and chiasmata formation, is a feature of the triploid aspermic parthenogenetic Cullompton flukes, as well as of the wild-type out-breeding field-derived and Oberon isolate flukes. In oocytes within shelled eggs in the proximal uterus of all flukes, condensed chromosomes align at meiotic metaphase plates. Following the reduction division, two equal pronuclei appear in each oocyte in the distal uterus. On the basis of these observations, a mechanism of facultative parthenogenesis for F. hepatica is proposed that accommodates the survival and clonal expansion of triploid aspermic isolates. Copyright © 2016 Elsevier B.V. All rights reserved.

  10. Research on Factors Affecting the Optimal Exploitation of Natural Gas Resources in China

    Directory of Open Access Journals (Sweden)

    Jianzhong Xiao

    2016-05-01

    Full Text Available This paper develops an optimizing model for the long-term exploitation of limited natural gas reserves in China. In addition to describing the life cycle characteristics of natural gas production and introducing the inter-temporal allocation theory, this paper builds the optimal exploitation model of natural gas resources within a gas field in the Ordos Basin as an example to analyze its exploitation scale and how influence factors, such as recovery rate, discount rate and the gas well exhausting cycle, affect the optimal exploration path of this gas field. We determine that an increase in the discount rate stimulates investors to invest more aggressively in natural gas exploitation in the early period due to the lower discounted value, thereby increasing the pace of the exploitation of natural gas and the exhaustion of gas fields. A higher recoverable factor implies more recoverable reserves and greater potential of increasing the output of gas fields. The exhaustion rate of gas wells affects the capability of converting capacity to output. When exhaustion occurs quickly in gas wells, the output will likely increase in the output rising period, and the output will likely decrease at a faster rate in the output reduction period. Price reform affects the economic recoverable reserves of gas fields.

  11. Understanding and Responding to the Needs of Commercially Sexually Exploited Youth: Recommendations for the Mental Health Provider.

    Science.gov (United States)

    Ijadi-Maghsoodi, Roya; Cook, Mekeila; Barnert, Elizabeth S; Gaboian, Shushanik; Bath, Eraka

    2016-01-01

    Mental health providers are frequently at the forefront of addressing the multifaceted needs of commercially sexually exploited youth. This article provides an overview of the definition of commercial sexual exploitation of children and relevant legislation including the shift toward decriminalization of commercially sexually exploited youth. To provide clinicians with tools needed to deliver competent care to this population, a review of risk factors for commercial sexual exploitation of children and the role of the clinician in identification, assessment, and treatment of commercially sexually exploited youth are discussed. Published by Elsevier Inc.

  12. Human trafficking for labour exploitation: Interpreting the crime

    NARCIS (Netherlands)

    Coster van Voorhout, J.E.B.

    2007-01-01

    The definition of human trafficking for labour exploitation, as follows from the European Council Framework Decision, proves to be unclear. Literal interpretation does not suffice, because it does not clarify all elements of what is deemed to be criminal behaviour, and hermeneutical interpretation

  13. Indicators of Nuclear safety and exploitation in ANAV

    International Nuclear Information System (INIS)

    Quintana Prieto, M.; Jorda Alcove, M.

    2013-01-01

    The use of indicators by ANAV plants, aims to be a tool to facilitate the assessment of the behaviour of the plants nuclear over a specific time period. The following are and are they explain those related to Nuclear safety and exploitation.

  14. Human trafficking and exploitation: A global health concern.

    Directory of Open Access Journals (Sweden)

    Cathy Zimmerman

    2017-11-01

    Full Text Available In this collection review, Cathy Zimmerman and colleague introduce the PLOS Medicine Collection on Human Trafficking, Exploitation and Health, laying out the magnitude of the global trafficking problem and offering a public health policy framework to guide responses to trafficking.

  15. Multidimensional protein fractionation of blood proteins coupled to data-independent nanoLC-MS/MS analysis.

    Science.gov (United States)

    Levin, Yishai; Jaros, Julian A J; Schwarz, Emanuel; Bahn, Sabine

    2010-01-03

    In order to exploit human blood as a source of protein disease biomarkers, robust analytical methods are needed to overcome the inherent molecular complexity of this bio-fluid. We present the coupling of label-free SAX chromatography and IMAC to a data-independent nanoLC-MS/MS (nanoLC-MS(E)) platform for analysis of blood plasma and serum proteins. The methods were evaluated using protein standards added at different concentrations to two groups of samples. The results demonstrate that both techniques enable accurate protein quantitation using low sample volumes and a minimal number of fractions. Combining both methods, 883 unique proteins were identified, of which 423 proteins showed high reproducibility. The two approaches resulted in identification of unique molecular signatures with an overlap of approximately 30%, thus providing complimentary information on sub-proteomes. These methods are potentially useful for systems biology, biomarker discovery, and investigation of phosphoproteins in blood. (c) 2009 Elsevier B.V. All rights reserved.

  16. Passive blood plasma separation at the microscale: a review of design principles and microdevices

    International Nuclear Information System (INIS)

    Tripathi, Siddhartha; Varun Kumar, Y V Bala; Joshi, Suhas S; Agrawal, Amit; Prabhakar, Amit

    2015-01-01

    Blood plasma separation is vital in the field of diagnostics and health care. Due to the inherent advantages obtained in the transition to microscale, the recent trend in these fields is a rapid shift towards the miniaturization of complex macro processes. Plasma separation in microdevices is one such process which has received extensive attention from researchers globally. Blood plasma separation techniques based on microfluidic platforms can be broadly classified into two categories. While active techniques utilize external force fields for separation, the passive techniques are dependent on biophysical effects, cell behavior, hydrodynamic forces and channel geometry for blood plasma separation. In general, passive separation methods are favored in comparison to active methods because they tend to avoid design complexities and are relatively easy to integrate with biosensors; additionally they are cost effective. Here we review passive separation techniques demonstrating separation and blood behavior at microscale. We present an extensive review of relevant biophysical laws, along with experimental details of various passive separation techniques and devices exploiting these physical effects. The relative performances, and the advantages and disadvantages of microdevices discussed in the literature, are compared and future challenges are brought about. (topical review)

  17. Human collective intelligence under dual exploration-exploitation dilemmas.

    Directory of Open Access Journals (Sweden)

    Wataru Toyokawa

    Full Text Available The exploration-exploitation dilemma is a recurrent adaptive problem for humans as well as non-human animals. Given a fixed time/energy budget, every individual faces a fundamental trade-off between exploring for better resources and exploiting known resources to optimize overall performance under uncertainty. Colonies of eusocial insects are known to solve this dilemma successfully via evolved coordination mechanisms that function at the collective level. For humans and other non-eusocial species, however, this dilemma operates within individuals as well as between individuals, because group members may be motivated to take excessive advantage of others' exploratory findings through social learning. Thus, even though social learning can reduce collective exploration costs, the emergence of disproportionate "information scroungers" may severely undermine its potential benefits. We investigated experimentally whether social learning opportunities might improve the performance of human participants working on a "multi-armed bandit" problem in groups, where they could learn about each other's past choice behaviors. Results showed that, even though information scroungers emerged frequently in groups, social learning opportunities reduced total group exploration time while increasing harvesting from better options, and consequentially improved collective performance. Surprisingly, enriching social information by allowing participants to observe others' evaluations of chosen options (e.g., Amazon's 5-star rating system in addition to choice-frequency information had a detrimental impact on performance compared to the simpler situation with only the choice-frequency information. These results indicate that humans groups can handle the fundamental "dual exploration-exploitation dilemmas" successfully, and that social learning about simple choice-frequencies can help produce collective intelligence.

  18. Evaluating Maximum Wind Energy Exploitation in Active Distribution Networks

    DEFF Research Database (Denmark)

    Siano, Pierluigi; Chen, Peiyuan; Chen, Zhe

    2010-01-01

    The increased spreading of distributed and renewable generation requires moving towards active management of distribution networks. In this paper, in order to evaluate maximum wind energy exploitation in active distribution networks, a method based on a multi-period optimal power flow (OPF......) analysis is proposed. Active network management schemes such as coordinated voltage control, energy curtailment and power factor control are integrated in the method in order to investigate their impacts on the maximization of wind energy exploitation. Some case studies, using real data from a Danish...... distribution system, confirmed the effectiveness of the proposed method in evaluating the optimal applications of active management schemes to increase wind energy harvesting without costly network reinforcement for the connection of wind generation....

  19. Wideband Low Noise Amplifiers Exploiting Thermal Noise Cancellation

    NARCIS (Netherlands)

    Bruccoleri, F.; Klumperink, Eric A.M.; Nauta, Bram

    2005-01-01

    Low Noise Amplifiers (LNAs) are commonly used to amplify signals that are too weak for direct processing for example in radio or cable receivers. Traditionally, low noise amplifiers are implemented via tuned amplifiers, exploiting inductors and capacitors in resonating LC-circuits. This can render

  20. The Flux OSKit: A Substrate for Kernel and Language Research

    Science.gov (United States)

    1997-10-01

    unclassified Standard Form 298 (Rev. 8-98) Prescribed by ANSI Std Z39-18 tions. Our own microkernel -based OS, Fluke [17], puts almost all of the OSKit to use...kernels distance the language from the hardware; even microkernels and other extensible kernels enforce some default policy which often conflicts with a...be particu- larly useful in these research projects. 6.1.1 The Fluke OS In 1996 we developed an entirely new microkernel - based system called Fluke

  1. Exploitative Learning by Exporting

    DEFF Research Database (Denmark)

    Golovko, Elena; Lopes Bento, Cindy; Sofka, Wolfgang

    Decisions on entering foreign markets are among the most challenging but also potentially rewarding strategy choices managers can make. In this study, we examine the effect of export entry on the firm investment decisions in two activities associated with learning about new technologies...... and learning about new markets ? R&D investments and marketing investments, in search of novel insights into the content and process underlying learning by exporting. We draw from organizational learning theory for predicting changes in both R&D and marketing investment patterns that accompany firm entry......, it is predominantly the marketing-related investment decisions associated with starting to export that lead to increases in firm productivity. We conclude that learning-by-exporting might be more properly characterized as ?learning about and exploiting new markets? rather than ?learning about new technologies...

  2. Exploiting a natural auxotrophy for genetic selection.

    Science.gov (United States)

    Ramage, Elizabeth; Gallagher, Larry; Manoil, Colin

    2012-08-01

    We exploited the natural histidine auxotrophy of Francisella species to develop hisD (encodes histidinol dehydrogenase) as a positive selection marker. A shuttle plasmid (pBR103) carrying Escherichia coli hisD and designed for cloning of PCR fragments replicated in both attenuated and highly virulent Francisella strains. During this work, we formulated a simplified defined growth medium for Francisella novicida.

  3. Assessment of the potential for exploitation of the remaining reserves of coal in Poland

    International Nuclear Information System (INIS)

    Wodarski, K.; Bijanska, J.

    2014-01-01

    In mining areas belonging to the Polish mining companies, there is a significant amount of coal, contained in remaining reserves, that have not been exploited so far. For years, the mines have been evaluating the possibility of its exploitation, since it would expand its resource base and would extend its useful life. In addition, exploitation of the remaining reserves can minimize stress concentration zones in the soil, the rebel y improving conditions for maintenance of excavations and limiting the risk of shock rock. (Author)

  4. Potentially exploitable supercritical geothermal resources in the ductile crust

    Science.gov (United States)

    Watanabe, Noriaki; Numakura, Tatsuya; Sakaguchi, Kiyotoshi; Saishu, Hanae; Okamoto, Atsushi; Ingebritsen, Steven E.; Tsuchiya, Noriyoshi

    2017-01-01

    The hypothesis that the brittle–ductile transition (BDT) drastically reduces permeability implies that potentially exploitable geothermal resources (permeability >10−16 m2) consisting of supercritical water could occur only in rocks with unusually high transition temperatures such as basalt. However, tensile fracturing is possible even in ductile rocks, and some permeability–depth relations proposed for the continental crust show no drastic permeability reduction at the BDT. Here we present experimental results suggesting that the BDT is not the first-order control on rock permeability, and that potentially exploitable resources may occur in rocks with much lower BDT temperatures, such as the granitic rocks that comprise the bulk of the continental crust. We find that permeability behaviour for fractured granite samples at 350–500 °C under effective confining stress is characterized by a transition from a weakly stress-dependent and reversible behaviour to a strongly stress-dependent and irreversible behaviour at a specific, temperature-dependent effective confining stress level. This transition is induced by onset of plastic normal deformation of the fracture surface (elastic–plastic transition) and, importantly, causes no ‘jump’ in the permeability. Empirical equations for this permeability behaviour suggest that potentially exploitable resources exceeding 450 °C may form at depths of 2–6 km even in the nominally ductile crust.

  5. Features for Exploiting Black-Box Optimization Problem Structure

    DEFF Research Database (Denmark)

    Tierney, Kevin; Malitsky, Yuri; Abell, Tinus

    2013-01-01

    landscape of BBO problems and show how an algorithm portfolio approach can exploit these general, problem indepen- dent features and outperform the utilization of any single minimization search strategy. We test our methodology on data from the GECCO Workshop on BBO Benchmarking 2012, which contains 21...

  6. Relativistic quantum metrology: exploiting relativity to improve quantum measurement technologies.

    Science.gov (United States)

    Ahmadi, Mehdi; Bruschi, David Edward; Sabín, Carlos; Adesso, Gerardo; Fuentes, Ivette

    2014-05-22

    We present a framework for relativistic quantum metrology that is useful for both Earth-based and space-based technologies. Quantum metrology has been so far successfully applied to design precision instruments such as clocks and sensors which outperform classical devices by exploiting quantum properties. There are advanced plans to implement these and other quantum technologies in space, for instance Space-QUEST and Space Optical Clock projects intend to implement quantum communications and quantum clocks at regimes where relativity starts to kick in. However, typical setups do not take into account the effects of relativity on quantum properties. To include and exploit these effects, we introduce techniques for the application of metrology to quantum field theory. Quantum field theory properly incorporates quantum theory and relativity, in particular, at regimes where space-based experiments take place. This framework allows for high precision estimation of parameters that appear in quantum field theory including proper times and accelerations. Indeed, the techniques can be applied to develop a novel generation of relativistic quantum technologies for gravimeters, clocks and sensors. As an example, we present a high precision device which in principle improves the state-of-the-art in quantum accelerometers by exploiting relativistic effects.

  7. Exploitation of puddles for breakthroughs in claustrum research

    Directory of Open Access Journals (Sweden)

    John Irwin Johnson

    2014-05-01

    Full Text Available Since its first identification as a thin strip of gray matter enclosed between stretches of neighboring fiber bundles, the claustrum has been considered impossible to study by many modern techniques that need a certain roominess of tissue for their application. The claustrum was known as the front wall, vormauren in German from 1822, and is still called avant-mur in French. We here propose a means for breaking into and through this wall, by utilizing the instances where the claustral tissue itself has broken free into more spacious dimensions. This has occurred several times in the evolution of modern mammals, and all that needs be done is to exploit these natural expansions in order to take advantage of a great panoply of technological advances now at our disposal. So here we review the kinds of breakout puddles that await productive exploitation, to bring our knowledge of structure and function up to the level enjoyed for other more accessible regions of the brain..

  8. Expelling Slavery from the Nation: Representations of labour exploitation in Australia’s supply chain

    Directory of Open Access Journals (Sweden)

    Anna Szörényi

    2016-09-01

    Full Text Available On 4 May 2015, the Australian national broadcaster’s current affairs programme Four Corners aired an episode titled ‘Slaving Away: The dirty secrets behind Australia’s fresh food’, that provided revelations of labour exploitation of migrant workers on working holiday visas. The government reacted swiftly to these allegations with an ‘operation’ ostensibly designed to stop the exploitation. In reports of Operation Cloudburst, however, there was a shift in the media’s definition of the problem: worker exploitation became visa violations and newspapers shortly reported the resulting action taken: the ‘illegal workers’ in Australia’s food industry had been arrested. This paper tracks the competing discursive and visual representations of this case that ultimately made questions of labour rights become questions of immigration, making it plausible and acceptable that concern over exploitation of workers should be addressed by deportation of ‘illegal immigrants’. Such discursive slippage is enabled by cultural amnesia over Australia’s history of exploitation of racialised and migrant labourers, which allows ‘slavery’ to be represented as a ‘foreign’ problem that can be expelled in defence of the purity of the national domestic space.

  9. Preliminary studies of dry rock geothermal exploitation in south west England

    Energy Technology Data Exchange (ETDEWEB)

    Batchelor, A. S.; Pearson, C. M.

    1978-07-01

    A research program to develop a method to exploit the heat usually found in mines in the Cornwall area is described. Temperature gradients range from 27 to 34/sup 0/C/Km with a mean of 29.8/sup 0/C/Km. The exploitable area is defined and methods of creating an artificial geothermal field or artificial reservoir are described. Tests to determine fractures in rocks including gamma-gamma logging, tv camera, caliper, and 3-D sonic are described as are pumping tests. 15 references, 3 figures.

  10. Influence of Machine Exploitation Effectiveness on Furniture Production Quality Level

    Directory of Open Access Journals (Sweden)

    Stasiak-Betlejewska Renata

    2015-12-01

    Full Text Available One of the most important factors determining the company‘s capacity to produce high quality products is the level of machinery operation effectiveness. Companies having modern machinery are characterized by high productivity. To obtain a high quality product, the equipment should be properly used, without any failure, which contributes significantly to the exploitation level increase. The modernity level and the exploitation effectiveness level for chosen machine producing furniture components in relation to the product quality level were analysed in the paper. As a result of the research findings analysis, proposals for corrective actions with regard to machinery maintenance and production processes were presented.

  11. A Case Study of How Organisational Members do Affect the Balancing of Exploitation and Exploration

    DEFF Research Database (Denmark)

    Andreassen, Mads R.

    2008-01-01

    study using semi-structured interviews and observation techniques this paper explores exploitation and exploration in a Danish industrial manufacture. Findings suggest that conditions affecting the balance between exploitation and exploration activities would depend on how an organisational member......Combing operations between the main parties in integration of new products, efficiently, are in practice for most organisations a challenging task demanding strong organisational capabilities, and in accordance to literature, achieving a successfully combination would be possible through...... an organisation's ability to establish dual capabilities in terms of exploitation and exploration (March, 1991). Few studies, however, suggest a classification of which organisational conditions would support a balance allowing exploitation and exploration operating side by side. Based on a single indept case...

  12. Efficient Depth Map Compression Exploiting Segmented Color Data

    DEFF Research Database (Denmark)

    Milani, Simone; Zanuttigh, Pietro; Zamarin, Marco

    2011-01-01

    performances is still an open research issue. This paper presents a novel compression scheme that exploits a segmentation of the color data to predict the shape of the different surfaces in the depth map. Then each segment is approximated with a parameterized plane. In case the approximation is sufficiently...

  13. Describing Data Format Exploits Using Bitstream Segment Graphs

    NARCIS (Netherlands)

    Hartle, Michael; Schumann, Daniel; Botchak, Arsene; Tews, Erik; Mühlhäuser, Max

    2008-01-01

    Exploits based on data processing bugs are delivered through crafted data that seems to follow a data format, yet is altered in some way to trigger a specific bug during processing, eg. in order to execute contained malicious code. Decomposing crafted data according to the purported data format and

  14. Assisting children born of sexual exploitation and abuse

    Directory of Open Access Journals (Sweden)

    Lauren Rumble

    2007-01-01

    Full Text Available The UN Secretary-General has issued a strategy tosupport victims of sexual exploitation and abuse by UNstaff. It includes a controversial proposal to introduceDNA sampling for all UN staff. Unless this suggestionis adopted, an important opportunity to implementa truly survivor-centred approach may be lost.

  15. Exploiting Inhibitory Siglecs to Combat Food Allergies

    Science.gov (United States)

    2017-10-01

    AWARD NUMBER: W81XWH-16-1-0302 TITLE: Exploiting Inhibitory Siglecs to Combat Food Allergies PRINCIPAL INVESTIGATOR: Michael Kulis, Ph.D...CONTRACTING ORGANIZATION: University of North Carolina at Chapel Hill Chapel Hill, NC 27599 REPORT DATES: October 2017 TYPE OF REPORT: Annual PREPARED FOR...Department of Defense, Washington Headquarters Services , Directorate for Information Operations and Reports (0704-0188), 1215 Jefferson Davis Highway, Suite

  16. Low-Level Exploitation Mitigation by Diverse Microservices

    OpenAIRE

    Otterstad , Christian; Yarygina , Tetiana

    2017-01-01

    Part 2: Microservices and Containers; International audience; This paper discusses a combination of isolatable microservices and software diversity as a mitigation technique against low-level exploitation; the effectiveness and benefits of such an architecture are substantiated. We argue that the core security benefit of microservices with diversity is increased control flow isolation. Additionally, a new microservices mitigation technique leveraging a security monitor service is introduced t...

  17. Forced Flexibility and Exploitation: Experiences of Migrant Workers in the Cleaning Industry

    Directory of Open Access Journals (Sweden)

    Natalia Ollus

    2016-03-01

    Full Text Available Globalization has resulted in structural changes in the labor markets over the last decades. These changes have weakened some of the economic and social dimensions of work. At the same time, migration and especially labor migration have increased on the global level. This article looks at the situation of migrant workers in the cleaning industry in Finland. It is based on interviews with migrant workers who have experienced labor exploitation in the cleaning industry, representatives of cleaning industry employers, and representatives of labor unions. The primary aim is to give voice to the migrant workers themselves and to analyze how they experience their work and their position in working life. The findings suggest that there is a risk that migrant workers in the cleaning sector experience various forms of exploitation. This article argues that the demand and need for (employee flexibility may turn into forced flexibility that exploits the powerless and vulnerable migrant workers who have few other options than to agree to work on poor terms. The article suggests that the structural reasons that make the exploitation of migrant labor possible should be identified and addressed in order to prevent misuse of any workers, especially migrants.

  18. Precarious Working Conditions and Exploitation of Workers in the Nigerian Informal Economy

    Directory of Open Access Journals (Sweden)

    Akeem Ayofe Akinwale

    2014-06-01

    Full Text Available Situations in the informal economy expose workers to dangers without opportunity for hazard pay, thereby reflecting exploitation. Based on the Marxist theory of conflict, this paper examines the extent of precarious working conditions and exploitation of workers in the Nigerian informal economy. A total of 500 respondents randomly selected from various informal economy organizations participated in the survey conducted in Lagos State, Nigeria. The findings revealed that most of the respondents (76.4% had worked for up to five years consecutively, followed by a few (18%, who had worked for up to ten years consecutively. Their monthly income ranged from 10,000 naira ($60 to 80,000 naira ($485. Their mean monthly income was 30,000 naira ($182. Most of them (73.5% worked for 10 to 12 hours daily, while 26.5% worked for seven to nine hours daily. The experience of low pay with relatively long daily working hours shows the extent of exploitation in the Nigerian informal economy. Several background characteristics, such as gender, age, level of education, and marital status influenced the workers’ experience of precarious working conditions and exploitation. Therefore, there is an urgent need for a progressive workplace policy that can ensure decent work and adequate protection for workers in the Nigerian informal economy.

  19. Liposomal cancer therapy: exploiting tumor characteristics

    DEFF Research Database (Denmark)

    Kaasgaard, Thomas; Andresen, Thomas Lars

    2010-01-01

    an overview of current strategies for improving the different stages of liposomal cancer therapy, which involve transporting drug-loaded liposomes through the bloodstream, increasing tumor accumulation, and improving drug release and cancer cell uptake after accumulation at the tumor target site. What...... the reader will gain: The review focuses on strategies that exploit characteristic features of solid tumors, such as abnormal vasculature, overexpression of receptors and enzymes, as well as acidic and thiolytic characteristics of the tumor microenvironment. Take home message: It is concluded that the design...

  20. 75 FR 40838 - Establishment of the Advisory Board on Elder Abuse, Neglect, and Exploitation

    Science.gov (United States)

    2010-07-14

    ... DEPARTMENT OF HEALTH AND HUMAN SERVICES Establishment of the Advisory Board on Elder Abuse...: Notice. Authority: The Advisory Board on Elder Abuse, Neglect, and Exploitation is authorized under... Services announces establishment of the Advisory Board on Elder Abuse, Neglect, and Exploitation, as...

  1. Balancing the Budget through Social Exploitation: Why Hard Times Are Even Harder for Some.

    Science.gov (United States)

    Tropman, John; Nicklett, Emily

    2012-01-01

    In all societies needs and wants regularly exceed resources. Thus societies are always in deficit; demand always exceeds supply and "balancing the budget" is a constant social problem. To make matters somewhat worse, research suggests that need- and want-fulfillment tends to further stimulate the cycle of wantseeking rather than satiating desire. Societies use various resource-allocation mechanisms, including price, to cope with gaps between wants and resources. Social exploitation is a second mechanism, securing labor from population segments that can be coerced or convinced to perform necessary work for free or at below-market compensation. Using practical examples, this article develops a theoretical framework for understanding social exploitation. It then offers case examples of how different segments of the population emerge as exploited groups in the United States, due to changes in social policies. These exploitative processes have been exacerbated and accelerated by the economic downturn that began in 2007.

  2. The Role of External Knowledge Sources and Organizational Design in the Process of Opportunity Exploitation

    DEFF Research Database (Denmark)

    Foss, Nicolai Juul; Lyngsie, Jacob; A. Zahra, Shaker

    involving 536 Danish firms shows that the use of external knowledge sources is positively associated with opportunity exploitation, but the strength of this association is significantly influenced by organizational designs that enable the firm to access external knowledge during the process of exploiting......Research highlights the role of external knowledge sources in the recognition of strategic opportunities, but is less forthcoming with respect to the role of such sources during the process of exploiting or realizing opportunities. We build on the knowledge-based view to propose that realizing...... opportunities often involves significant interactions with external knowledge sources. Organizational design can facilitate a firm’s interactions with these sources, while achieving coordination among organizational members engaged in opportunity exploitation. Our analysis of a double-respondent survey...

  3. The Role of External Knowledge Sources and Organizational Design in the Process of Opportunity Exploitation

    DEFF Research Database (Denmark)

    Foss, Nicolai Juul; Lyngsie, Jacob; Zahra, Shaker A.

    2013-01-01

    involving 536 Danish firms shows that the use of external knowledge sources is positively associated with opportunity exploitation, but the strength of this association is significantly influenced by organizational designs that enable the firm to access external knowledge during the process of exploiting......Research highlights the role of external knowledge sources in the recognition of strategic opportunities but is less forthcoming with respect to the role of such sources during the process of exploiting or realizing opportunities. We build on the knowledge-based view to propose that realizing...... opportunities often involves significant interactions with external knowledge sources. Organizational design can facilitate a firm's interactions with these sources, while achieving coordination among organizational members engaged in opportunity exploitation. Our analysis of a double-respondent survey...

  4. Root Exploit Detection and Features Optimization: Mobile Device and Blockchain Based Medical Data Management.

    Science.gov (United States)

    Firdaus, Ahmad; Anuar, Nor Badrul; Razak, Mohd Faizal Ab; Hashem, Ibrahim Abaker Targio; Bachok, Syafiq; Sangaiah, Arun Kumar

    2018-05-04

    The increasing demand for Android mobile devices and blockchain has motivated malware creators to develop mobile malware to compromise the blockchain. Although the blockchain is secure, attackers have managed to gain access into the blockchain as legal users, thereby comprising important and crucial information. Examples of mobile malware include root exploit, botnets, and Trojans and root exploit is one of the most dangerous malware. It compromises the operating system kernel in order to gain root privileges which are then used by attackers to bypass the security mechanisms, to gain complete control of the operating system, to install other possible types of malware to the devices, and finally, to steal victims' private keys linked to the blockchain. For the purpose of maximizing the security of the blockchain-based medical data management (BMDM), it is crucial to investigate the novel features and approaches contained in root exploit malware. This study proposes to use the bio-inspired method of practical swarm optimization (PSO) which automatically select the exclusive features that contain the novel android debug bridge (ADB). This study also adopts boosting (adaboost, realadaboost, logitboost, and multiboost) to enhance the machine learning prediction that detects unknown root exploit, and scrutinized three categories of features including (1) system command, (2) directory path and (3) code-based. The evaluation gathered from this study suggests a marked accuracy value of 93% with Logitboost in the simulation. Logitboost also helped to predicted all the root exploit samples in our developed system, the root exploit detection system (RODS).

  5. Efforts to Overcome Child Commercial Sexual Exploitation Victims in City Tourism Area, Manado

    Directory of Open Access Journals (Sweden)

    Rahmat Hidayat

    2017-09-01

    Full Text Available The tourism sector has a significant contribution to the economy of Manado City, North Sulawesi Province. However, on the other hand, it has a negative effect on the increase in the number of child commercial sexual exploitation victims and makes children into commercial sex workers. Despite not effective, the Local Government of Manado City, North Sulawesi Province, has made efforts to cope with the child commercial sexual exploitation victims. In connection with the case, this study is designed to analyze the causes of ineffectiveness of Local Government efforts in tackling child commercial sexual exploitation victims. The study was conducted in tourism area of Manado City, North Sulawesi Province. The informants involved in this study were divided into two types: experts and non-experts. The informants were determined by using Opportunistic Sampling, and the sampling is using Snowball Sampling. The results of the study showed that the development of tourism sector has negative effect on children in the communities. Efforts made to cope with child commercial sexual exploitation victims by the local government and relevant parties have not been effective due to limited allocation of budgets and skilled, quality human resources, the lack of harmonious understanding between police with judges and public prosecutors as law apparatus, supervision, and protection of victims in solving the cases of child commercial sexual exploitation victims, the implementation of action committee’s duties and responsibility have been not effect, the number of obstacles facing them.

  6. Rapid detection and identification of four major Schistosoma species by high-resolution melt (HRM) analysis.

    Science.gov (United States)

    Li, Juan; Zhao, Guang-Hui; Lin, RuiQing; Blair, David; Sugiyama, Hiromu; Zhu, Xing-Quan

    2015-11-01

    Schistosomiasis, caused by blood flukes belonging to several species of the genus Schistosoma, is a serious and widespread parasitic disease. Accurate and rapid differentiation of these etiological agents of animal and human schistosomiasis to species level can be difficult. We report a real-time PCR assay coupled with a high-resolution melt (HRM) assay targeting a portion of the nuclear 18S rDNA to detect, identify, and distinguish between four major blood fluke species (Schistosoma japonicum, Schistosoma mansoni, Schistosoma haematobium, and Schistosoma mekongi). Using this system, the Schistosoma spp. was accurately identified and could also be distinguished from all other trematode species with which they were compared. As little as 10(-5) ng genomic DNA from a Schistosoma sp. could be detected. This process is inexpensive, easy, and can be completed within 3 h. Examination of 21 representative Schistosoma samples from 15 geographical localities in seven endemic countries validated the value of the HRM detection assay and proved its reliability. The melting curves were characterized by peaks of 83.65 °C for S. japonicum and S. mekongi, 85.65 °C for S. mansoni, and 85.85 °C for S. haematobium. The present study developed a real-time PCR coupled with HRM analysis assay for detection and differential identification of S. mansoni, S. haematobium, S. japonicum, and S. mekongi. This method is rapid, sensitive, and inexpensive. It has important implications for epidemiological studies of Schistosoma.

  7. Disrupting established tumor blood vessels: an emerging therapeutic strategy for cancer.

    Science.gov (United States)

    McKeage, Mark J; Baguley, Bruce C

    2010-04-15

    The unique characteristics of tumor vasculature represent an attractive target that may be exploited by vascular-targeting anticancer agents. A promising strategy involves the selective disruption of established tumor blood vessels by tumor-vascular disrupting agents (tumor-VDAs), which exhibit antivascular activity, resulting in inhibition of tumor blood flow and extensive necrosis within the tumor core. The tumor-VDA class can be subdivided into flavonoid compounds, which are related to flavone acetic acid, and tubulin-binding compounds. ASA404, of the flavonoid class, is the most advanced tumor-VDA in clinical development and has been evaluated preclinically and in several phase 1 and phase 2 studies. Preclinical studies have demonstrated the selective apoptosis of tumor endothelial cells and the inhibition of tumor blood flow. Synergistic activity was observed with ASA404 and with several chemotherapeutic agents, particularly taxanes. In clinical trials, compared with chemotherapy alone, ASA404 was tolerated well and produced improved activity in patients with nonsmall cell lung cancer when combined with paclitaxel and carboplatin. Phase 3 clinical trials are ongoing. Selectively targeting established tumor vasculature with tumor-VDAs represents a promising and innovative approach to improving the efficacy of standard anticancer therapies. (c) 2010 American Cancer Society.

  8. Exploiting Social Media Sensor Networks through Novel Data Fusion Techniques

    Energy Technology Data Exchange (ETDEWEB)

    Kouri, Tina [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2017-11-01

    Unprecedented amounts of data are continuously being generated by sensors (“hard” data) and by humans (“soft” data), and this data needs to be exploited to its full potential. The first step in exploiting this data is determine how the hard and soft data are related to each other. In this project we fuse hard and soft data, using the attributes of each (e.g., time and space), to gain more information about interesting events. Next, we attempt to use social networking textual data to predict the present (i.e., predict that an interesting event is occurring and details about the event) using data mining, machine learning, natural language processing, and text analysis techniques.

  9. Dandruff: The most commercially exploited skin disease

    Directory of Open Access Journals (Sweden)

    Ranganathan S

    2010-01-01

    Full Text Available The article discuss in detail about the prevalence, pathophysiology, clinical manifestations of dandruff including the etio-pathology. The article also discusses in detail about various treatment methods available for dandruff. The status of dandruff being amphibious - a disease/disorder, and relatively less medical intervention is sought after for the treatment, dandruff is the most commercially exploited skin and scalp disorder/disease by personal care industries.

  10. Exploiting thesauri knowledge in medical guideline formalization

    OpenAIRE

    Serban, R.C.; ten Teije, A.C.M.

    2009-01-01

    Objectives: As in software product lifecycle, the effort spent in maintaining medical knowl edge in guidelines can be reduced, if modularization, formalization and tracking of domain knowledge are employed across the guideline development phases. Methods: We propose to exploit and combine knowledge templates with medical background knowledge from existing thesauri in order to produce reusable building blocks used in guideline development. These tem- plates enable easier guideline formalizatio...

  11. Exploitation Strategies in Social Parasites of Fungus Growing Ants

    DEFF Research Database (Denmark)

    Clement, Janni Dolby

    One of the most remarkable and complex parasitic interactions is social parasitism, where a parasite exploits a complete society, rather than an individual organism. By integrating into a society the parasite gains protection against predators and diseases, and can redirect resources from the host...... to increase its own fitness. The host will use a sophisticated recognition system in order to accept nestmates and expel intruders from their societies. However this defence barrier can be overcome by parasites. Among the most specialized social parasites are the inquilines that exploit social insect colonies...... to this are Acromyrmex insinuator and Acromyrmex ameliae, parasites of fungus-growing ants. By still producing a worker caste both species offers a rare opportunity to study adaptive features in parasite worker behaviour. Furthermore can closely related inquiline-host combinations give us an insight in the trade...

  12. Exploring, exploiting and evolving diversity of aquatic ecosystem models

    DEFF Research Database (Denmark)

    Janssen, Annette B G; Arhonditsis, George B.; Beusen, Arthur

    2015-01-01

    Here, we present a community perspective on how to explore, exploit and evolve the diversity in aquatic ecosystem models. These models play an important role in understanding the functioning of aquatic ecosystems, filling in observation gaps and developing effective strategies for water quality...... management. In this spirit, numerous models have been developed since the 1970s. We set off to explore model diversity by making an inventory among 42 aquatic ecosystem modellers, by categorizing the resulting set of models and by analysing them for diversity. We then focus on how to exploit model diversity...... available through open-source policies, to standardize documentation and technical implementation of models, and to compare models through ensemble modelling and interdisciplinary approaches. We end with our perspective on how the field of aquatic ecosystem modelling might develop in the next 5–10 years...

  13. Exploiting serological data to understand the epidemiology of foot ...

    African Journals Online (AJOL)

    Exploiting serological data to understand the epidemiology of foot-and-mouth disease virus serotypes circulating in Libya. Ibrahim Eldaghayes, Abdunaser Dayhum, Abdulwahab Kammon, Monier Sharif, Giancarlo Ferrari, Christianus Bartels, Keith Sumption, Donald P. King, Santina Grazioli, Emiliana Brocchi ...

  14. Commix: Automating Evaluation and Exploitation of Command Injection Vulnerabilities in Web Applications

    OpenAIRE

    Stasinopoulos, Anastasios; Ntantogian, Christoforos; Xenakis, Christos

    2018-01-01

    Despite the prevalence and the high impact of command injection attacks, little attention has been given by the research community to this type of code injections. Although there are many software tools to detect and exploit other types of code injections, such as SQL injections or Cross Site Scripting, there is no dedicated and specialized software that detects and exploits, automatically, command injection vulnerabilities. This paper proposes an open source tool that automates the process o...

  15. Exploiting social evolution in biofilms

    DEFF Research Database (Denmark)

    Boyle, Kerry E; Heilmann, Silja; van Ditmarsch, Dave

    2013-01-01

    Bacteria are highly social organisms that communicate via signaling molecules, move collectively over surfaces and make biofilm communities. Nonetheless, our main line of defense against pathogenic bacteria consists of antibiotics-drugs that target individual-level traits of bacterial cells...... and thus, regrettably, select for resistance against their own action. A possible solution lies in targeting the mechanisms by which bacteria interact with each other within biofilms. The emerging field of microbial social evolution combines molecular microbiology with evolutionary theory to dissect...... the molecular mechanisms and the evolutionary pressures underpinning bacterial sociality. This exciting new research can ultimately lead to new therapies against biofilm infections that exploit evolutionary cheating or the trade-off between biofilm formation and dispersal....

  16. Exploitation of pocket gophers and their food caches by grizzly bears

    Science.gov (United States)

    Mattson, D.J.

    2004-01-01

    I investigated the exploitation of pocket gophers (Thomomys talpoides) by grizzly bears (Ursus arctos horribilis) in the Yellowstone region of the United States with the use of data collected during a study of radiomarked bears in 1977-1992. My analysis focused on the importance of pocket gophers as a source of energy and nutrients, effects of weather and site features, and importance of pocket gophers to grizzly bears in the western contiguous United States prior to historical extirpations. Pocket gophers and their food caches were infrequent in grizzly bear feces, although foraging for pocket gophers accounted for about 20-25% of all grizzly bear feeding activity during April and May. Compared with roots individually excavated by bears, pocket gopher food caches were less digestible but more easily dug out. Exploitation of gopher food caches by grizzly bears was highly sensitive to site and weather conditions and peaked during and shortly after snowmelt. This peak coincided with maximum success by bears in finding pocket gopher food caches. Exploitation was most frequent and extensive on gently sloping nonforested sites with abundant spring beauty (Claytonia lanceolata) and yampah (Perdieridia gairdneri). Pocket gophers are rare in forests, and spring beauty and yampah roots are known to be important foods of both grizzly bears and burrowing rodents. Although grizzly bears commonly exploit pocket gophers only in the Yellowstone region, this behavior was probably widespread in mountainous areas of the western contiguous United States prior to extirpations of grizzly bears within the last 150 years.

  17. Examples of Sentinel-2A Mission Exploitation Results

    Science.gov (United States)

    Koetz, Benjamin; Hoersch, Bianca; Gascon, Ferran; Desnos, Yves-Louis; Seifert, Frank Martin; Paganini, Marc; Ramoino, Fabrizio; Arino, Olivier

    2017-04-01

    The Sentinel-2 Copernicus mission will bring significant breakthrough in the exploitation of space borne optical data. Sentinel-2 time series will transform land cover, agriculture, forestry, in-land water and costal EO applications from mapping to monitoring, from snapshot to time series data analysis, from image-based to pixel-based processing. The 5-days temporal revisiting of the Sentinel-2 satellites, when both units will be operated together, will usher us in a new era for time series analysis at high spatial resolutions (HR) of 10-20 meters. The monitoring of seasonal variations and processes in phenology and hydrology are examples of the many R&D areas to be studied. The mission's large swath and systematic acquisitions will further support unprecedented coverage at the national scale addressing information requirements of national to regional policies. Within ESA programs, such as the Data User Element (DUE), Scientific Exploitation of Operational Missions (SEOM) and Climate Change Initiative (CCI), several R&D activities are preparing the exploitation of the Sentinel-2 mission towards reliable measurements and monitoring of e.g. Essential Climate Variables and indicators for the Sustainable Development Goals. Early Sentinel-2 results will be presented related to a range of applications and scientific domains such as agricultural monitoring at national scale (DUE Sen2Agri), wetland extent and condition over African Ramsar sites (DUE GlobWetland-Africa), land cover mapping for climate change (CCI Land Cover), national land monitoring (Cadaster-Env), forest degradation (DUE ForMoSa), urban mapping (DUE EO4Urban), in-land water quality (DUE SPONGE), map of Mediterranean aquaculture (DUE SMART) and coral reef habitat mapping (SEOM S2-4Sci Coral). The above-mentioned activities are only a few examples from the very active international land imaging community building on the long-term Landsat and Spot heritage and knowledge.

  18. FSH: fast spaced seed hashing exploiting adjacent hashes.

    Science.gov (United States)

    Girotto, Samuele; Comin, Matteo; Pizzi, Cinzia

    2018-01-01

    Patterns with wildcards in specified positions, namely spaced seeds , are increasingly used instead of k -mers in many bioinformatics applications that require indexing, querying and rapid similarity search, as they can provide better sensitivity. Many of these applications require to compute the hashing of each position in the input sequences with respect to the given spaced seed, or to multiple spaced seeds. While the hashing of k -mers can be rapidly computed by exploiting the large overlap between consecutive k -mers, spaced seeds hashing is usually computed from scratch for each position in the input sequence, thus resulting in slower processing. The method proposed in this paper, fast spaced-seed hashing (FSH), exploits the similarity of the hash values of spaced seeds computed at adjacent positions in the input sequence. In our experiments we compute the hash for each positions of metagenomics reads from several datasets, with respect to different spaced seeds. We also propose a generalized version of the algorithm for the simultaneous computation of multiple spaced seeds hashing. In the experiments, our algorithm can compute the hashing values of spaced seeds with a speedup, with respect to the traditional approach, between 1.6[Formula: see text] to 5.3[Formula: see text], depending on the structure of the spaced seed. Spaced seed hashing is a routine task for several bioinformatics application. FSH allows to perform this task efficiently and raise the question of whether other hashing can be exploited to further improve the speed up. This has the potential of major impact in the field, making spaced seed applications not only accurate, but also faster and more efficient. The software FSH is freely available for academic use at: https://bitbucket.org/samu661/fsh/overview.

  19. User-driven sampling strategies in image exploitation

    Science.gov (United States)

    Harvey, Neal; Porter, Reid

    2013-12-01

    Visual analytics and interactive machine learning both try to leverage the complementary strengths of humans and machines to solve complex data exploitation tasks. These fields overlap most significantly when training is involved: the visualization or machine learning tool improves over time by exploiting observations of the human-computer interaction. This paper focuses on one aspect of the human-computer interaction that we call user-driven sampling strategies. Unlike relevance feedback and active learning sampling strategies, where the computer selects which data to label at each iteration, we investigate situations where the user selects which data is to be labeled at each iteration. User-driven sampling strategies can emerge in many visual analytics applications but they have not been fully developed in machine learning. User-driven sampling strategies suggest new theoretical and practical research questions for both visualization science and machine learning. In this paper we identify and quantify the potential benefits of these strategies in a practical image analysis application. We find user-driven sampling strategies can sometimes provide significant performance gains by steering tools towards local minima that have lower error than tools trained with all of the data. In preliminary experiments we find these performance gains are particularly pronounced when the user is experienced with the tool and application domain.

  20. Trypsin- and Chymotrypsin-Like Serine Proteases in Schistosoma mansoni - 'The Undiscovered Country'

    Czech Academy of Sciences Publication Activity Database

    Horn, Martin; Fajtová, Pavla; Arreola, L. R.; Ulrychová, Lenka; Bartošová-Sojková, Pavla; Franta, Zdeněk; Protasio, A. V.; Opavský, David; Vondrášek, Jiří; McKerrow, J. H.; Mareš, Michael; Caffrey, C. R.; Dvořák, Jan

    2014-01-01

    Roč. 8, č. 3 (2014), e2766/1-e2766/13 ISSN 1935-2735 R&D Projects: GA ČR(CZ) GAP302/11/1481; GA MŠk(CZ) ME10011 EU Projects: European Commission(XE) 248642 - SCHISTOSOMA PROTEASE Institutional support: RVO:61388963 ; RVO:68378050 ; RVO:60077344 Keywords : schistosomiasis * blood fluke * serine protease Subject RIV: CE - Biochemistry; EB - Genetics ; Molecular Biology (UMG-J); FN - Epidemiology, Contagious Diseases ; Clinical Immunology (BC-A) Impact factor: 4.446, year: 2014 http://www.plosntds.org/article/info%3Adoi%2F10.1371%2Fjournal.pntd.0002766

  1. Explore or Exploit? A Generic Model and an Exactly Solvable Case

    Science.gov (United States)

    Gueudré, Thomas; Dobrinevski, Alexander; Bouchaud, Jean-Philippe

    2014-02-01

    Finding a good compromise between the exploitation of known resources and the exploration of unknown, but potentially more profitable choices, is a general problem, which arises in many different scientific disciplines. We propose a stylized model for these exploration-exploitation situations, including population or economic growth, portfolio optimization, evolutionary dynamics, or the problem of optimal pinning of vortices or dislocations in disordered materials. We find the exact growth rate of this model for treelike geometries and prove the existence of an optimal migration rate in this case. Numerical simulations in the one-dimensional case confirm the generic existence of an optimum.

  2. Explore or exploit? A generic model and an exactly solvable case.

    Science.gov (United States)

    Gueudré, Thomas; Dobrinevski, Alexander; Bouchaud, Jean-Philippe

    2014-02-07

    Finding a good compromise between the exploitation of known resources and the exploration of unknown, but potentially more profitable choices, is a general problem, which arises in many different scientific disciplines. We propose a stylized model for these exploration-exploitation situations, including population or economic growth, portfolio optimization, evolutionary dynamics, or the problem of optimal pinning of vortices or dislocations in disordered materials. We find the exact growth rate of this model for treelike geometries and prove the existence of an optimal migration rate in this case. Numerical simulations in the one-dimensional case confirm the generic existence of an optimum.

  3. Atomic Energy Authority Bill (amendment on exploitation of results of research)

    International Nuclear Information System (INIS)

    Gray, J.H.N.; Stoddart, D.L.; Lloyd, R.G.

    1986-01-01

    This amendment arises from legal doubts about the extent of the UKAEA's present powers to exploit the results of its research. The new clause, which amends the Atomic Energy Authority Bill, allows that the Authority has power to exploit commercially by selling, licensing the use of, or otherwise dealing with any intellectual property (patents, trademarks, copyright, registered designs etc) resulting from research carried out by it, or on its behalf, or which is available because of exchange of results or collaboration with others. The 12 minute debate is reported verbatim. The amendment was agreed to. (U.K.)

  4. Conceptualizing child labour trafficking and exploitation: The case of Roma children in Montenegro

    Directory of Open Access Journals (Sweden)

    Arhin Antonela

    2012-01-01

    Full Text Available Trafficking of children for labour exploitation is a profit-oriented criminal activity by which children are recruited, transported, harboured or received for the purpose of labour exploitation irrespective of whether or not force, abduction, fraud or other means were used. This paper examines child labour trafficking in the context of human rights violations and as the worst form of child labour. In an attempt to situate the discourse of alleged labour exploitation and trafficking of Roma children in Montenegro, focusing in particular on instances of child begging, this paper offers an overview of the international legal framework as well as the Government of Montenegro’s policy framework relevant to this issue; an analysis of implicated historical, familial and cultural structures; and focuses on identifying root causes in terms of push-pull factors that are associated with enhancing children’s vulnerability and proneness to exploitation. Along with a set of recommendations, in closing, the paper calls for a more sophisticated analysis of child labour trafficking and, in the case of Roma children, a more nuanced understanding of historical and cultural pretexts against the backdrop of labour trafficking.

  5. Exploitation of Clustering Techniques in Transactional Healthcare Data

    Directory of Open Access Journals (Sweden)

    Naeem Ahmad Mahoto

    2014-03-01

    Full Text Available Healthcare service centres equipped with electronic health systems have improved their resources as well as treatment processes. The dynamic nature of healthcare data of each individual makes it complex and difficult for physicians to manually mediate them; therefore, automatic techniques are essential to manage the quality and standardization of treatment procedures. Exploratory data analysis, patternanalysis and grouping of data is managed using clustering techniques, which work as an unsupervised classification. A number of healthcare applications are developed that use several data mining techniques for classification, clustering and extracting useful information from healthcare data. The challenging issue in this domain is to select adequate data mining algorithm for optimal results. This paper exploits three different clustering algorithms: DBSCAN (Density-Based Clustering, agglomerative hierarchical and k-means in real transactional healthcare data of diabetic patients (taken as case study to analyse their performance in large and dispersed healthcare data. The best solution of cluster sets among the exploited algorithms is evaluated using clustering quality indexes and is selected to identify the possible subgroups of patients having similar treatment patterns

  6. Activity-based exploitation of Full Motion Video (FMV)

    Science.gov (United States)

    Kant, Shashi

    2012-06-01

    Video has been a game-changer in how US forces are able to find, track and defeat its adversaries. With millions of minutes of video being generated from an increasing number of sensor platforms, the DOD has stated that the rapid increase in video is overwhelming their analysts. The manpower required to view and garner useable information from the flood of video is unaffordable, especially in light of current fiscal restraints. "Search" within full-motion video has traditionally relied on human tagging of content, and video metadata, to provision filtering and locate segments of interest, in the context of analyst query. Our approach utilizes a novel machine-vision based approach to index FMV, using object recognition & tracking, events and activities detection. This approach enables FMV exploitation in real-time, as well as a forensic look-back within archives. This approach can help get the most information out of video sensor collection, help focus the attention of overburdened analysts form connections in activity over time and conserve national fiscal resources in exploiting FMV.

  7. Exploitation by Economic Necessity

    Directory of Open Access Journals (Sweden)

    Kristian F. Braekkan

    2015-10-01

    Full Text Available This study develops and tests a model that proposes economic necessity moderates the relationship between psychological contract violations (PCVs and organizational commitment and trust in the employing organization among non-unionized manufacturing workers (N = 226. Moderated regression analyses revealed that there was a significant interaction between PCV and economic necessity in predicting both outcomes. Specifically, the findings indicated that individuals experiencing high PCV and high economic necessity did not decrease their organizational commitment like their counterparts who endorsed lower economic necessity. They did, however, experience significantly decreased trust in their employer. The findings suggest that individuals who are forced to sell their labor power and obtain what they need through the market are more likely to continue to be exploited by their employer, as they have no other options than to continue the relationship. The importance of the findings is discussed, and recommendations for future research are provided.

  8. Énergie et environnement: l’exploitation des sables bitumineux en Alberta (Canada

    Directory of Open Access Journals (Sweden)

    Stéphane Héritier

    2007-09-01

    Full Text Available Découverts dans les années 1930, les secteurs de sables bitumineux (ou pétrolifères de l’Ouest canadien sont caractérisés par une intense exploitation, accélérée et stimulée depuis la décennie 1990, liée à l’explosion de la demande mondiale et aux prix élevés du baril de pétrole. Grâce à cette activité, l’Alberta est devenue l’une des provinces les plus dynamiques du Canada. L’exploitation, concédée à des entreprises pétrolières nationales et internationales, contribue à stimuler à la fois l’économie et la démographie de la province, où les revenus et les conditions économiques générales sont devenus particulièrement attractifs. Dans le même temps l’Alberta et le Canada se trouvent en situation délicate par rapport aux engagements internationaux, l’exploitation et la production du pétrole ayant des effets environnementaux importants tels que l’augmentation de la production de gaz à effets de serre, alors que les économies locales et régionales fondent leurs projets de croissance sur les revenus dégagés par cette exploitation.

  9. Ambidextrous Organizations: A Multiple-Level Study of Absorptive Capacity, Exploratory and Exploitative Innovation and Performance

    NARCIS (Netherlands)

    J.J.P. Jansen (Justin)

    2005-01-01

    textabstractBalancing and synchronizing exploration and exploitation is fundamental to the competitive success of firms in dynamic environments. Despite the importance of reconciling exploration and exploitation within organizations, however, relatively little empirical research has examined this

  10. Potential Pathways for CNS Drug Delivery Across the Blood-Cerebrospinal Fluid Barrier

    Science.gov (United States)

    Strazielle, Nathalie; Ghersi-Egea, Jean-François

    2016-01-01

    The blood-brain interfaces restrict the cerebral bioavailability of pharmacological compounds. Various drug delivery strategies have been developed to improve drug penetration into the brain. Most strategies target the microvascular endothelium forming the blood-brain barrier proper. Targeting the blood-cerebrospinal fluid (CSF) barrier formed by the epithelium of the choroid plexuses in addition to the blood-brain barrier may offer added-value for the treatment of central nervous system diseases. For instance, targeting the CSF spaces, adjacent tissue, or the choroid plexuses themselves is of interest for the treatment of neuroinflammatory and infectious diseases, cerebral amyloid angiopathy, selected brain tumors, hydrocephalus or neurohumoral dysregulation. Selected CSF-borne materials seem to reach deep cerebral structures by mechanisms that need to be understood in the context of chronic CSF delivery. Drug delivery through both barriers can reduce CSF sink action towards parenchymal drugs. Finally, targeting the choroid plexus-CSF system can be especially relevant in the context of neonatal and pediatric diseases of the central nervous system. Transcytosis appears the most promising mechanism to target in order to improve drug delivery through brain barriers. The choroid plexus epithelium displays strong vesicular trafficking and secretory activities that deserve to be explored in the context of cerebral drug delivery. Folate transport and exosome release into the CSF, plasma protein transport, and various receptor-mediated endocytosis pathways may prove useful mechanisms to exploit for efficient drug delivery into the CSF. This calls for a clear evaluation of transcytosis mechanisms at the blood-CSF barrier, and a thorough evaluation of CSF drug delivery rates. PMID:27464721

  11. Exploiting partial knowledge for efficient model analysis

    OpenAIRE

    Macedo, Nuno; Cunha, Alcino; Pessoa, Eduardo José Dias

    2017-01-01

    The advancement of constraint solvers and model checkers has enabled the effective analysis of high-level formal specification languages. However, these typically handle a specification in an opaque manner, amalgamating all its constraints in a single monolithic verification task, which often proves to be a performance bottleneck. This paper addresses this issue by proposing a solving strategy that exploits user-provided partial knowledge, namely by assigning symbolic bounds to the problem’s ...

  12. Spatio-temporal analysis of blood perfusion by imaging photoplethysmography

    Science.gov (United States)

    Zaunseder, Sebastian; Trumpp, Alexander; Ernst, Hannes; Förster, Michael; Malberg, Hagen

    2018-02-01

    Imaging photoplethysmography (iPPG) has attracted much attention over the last years. The vast majority of works focuses on methods to reliably extract the heart rate from videos. Only a few works addressed iPPGs ability to exploit spatio-temporal perfusion pattern to derive further diagnostic statements. This work directs at the spatio-temporal analysis of blood perfusion from videos. We present a novel algorithm that bases on the two-dimensional representation of the blood pulsation (perfusion map). The basic idea behind the proposed algorithm consists of a pairwise estimation of time delays between photoplethysmographic signals of spatially separated regions. The probabilistic approach yields a parameter denoted as perfusion speed. We compare the perfusion speed versus two parameters, which assess the strength of blood pulsation (perfusion strength and signal to noise ratio). Preliminary results using video data with different physiological stimuli (cold pressure test, cold face test) show that all measures are influenced by those stimuli (some of them with statistical certainty). The perfusion speed turned out to be more sensitive than the other measures in some cases. However, our results also show that the intraindividual stability and interindividual comparability of all used measures remain critical points. This work proves the general feasibility of employing the perfusion speed as novel iPPG quantity. Future studies will address open points like the handling of ballistocardiographic effects and will try to deepen the understanding of the predominant physiological mechanisms and their relation to the algorithmic performance.

  13. Characteristics of thermal-mineral waters in Backa region (Vojvodina) and their exploitation in spa tourism

    Energy Technology Data Exchange (ETDEWEB)

    Kosic, Kristina; Pivac, Tatjana; Romelic, Jovan; Lazic, Lazar; Stojanovic, Vladimir [Faculty of Science, Department of Geography, Tourism and Hotel Management, University of Novi Sad, Trg Dositeja Obradovica 3, 21000 Novi Sad (RS)

    2011-01-15

    Hydropower, biomass, biogas, biofuels, wind power, solar energy and geothermal energy are the major resources to provide Backa region with most of its. Backa extends between 45 16' and 46 22' of the northern latitude and 18 36' and 20 37' of the eastern longitude. It occupies the north-eastern part of Vojvodina, i.e. the most north-western part of the Republic of Serbia. That is historical-geographic territory bordered on the Danube on its western and eastern side, the Tisa on its eastern side and with the state border towards Hungary on the north. In this paper, the focus will be on renewable sources, specifically geothermal energy in Backa region. The paper analyzes the characteristics of thermal-mineral waters in Backa, the condition and possibilities of their exploitation in spa tourism, and in other economic branches. The tradition of thermo-mineral waters exploitation in spas and public baths is rather long. Today, this type of thermo-mineral waters exploitation in Backa is the widest spread. Permanent, i.e. continuous exploiters of thermal-mineral waters in Backa are primarily balneal-rehabilitation centres and exploiters using the water for technological purposes. (author)

  14. Target Localization with a Single Antenna via Directional Multipath Exploitation

    Directory of Open Access Journals (Sweden)

    Ali H. Muqaibel

    2015-01-01

    Full Text Available Target localization in urban sensing can benefit from angle dependency of the pulse shape at a radar receiver antenna. We propose a localization approach that utilizes the embedded directivity in ultra-wideband (UWB antennas to estimate target positions. A single radar unit sensing operation of indoor targets surrounded by interior walls is considered, where interior wall multipaths are exploited to provide target cross-range. This exploitation assumes resolvability of the multipath components, which is made possible by the virtue of using UWB radar signals. The proposed approach is most attractive when only few multipaths are detectable due to propagation obstructions or owing to low signal-to-noise ratios. Both simulated and experimental data are used to demonstrate the effectiveness of the proposed approach.

  15. Analysis Of Damage Arising From Exploitation Of The Aircraft

    Directory of Open Access Journals (Sweden)

    Woźny Piotr

    2014-12-01

    Full Text Available During exploitation, due to a variety of reasons, aircrafts are damaged or suffer from different failures. In the process of operation, using appropriate methods of diagnosis, failure, damage, and relative deregulation of individual elements or units can be detected. For this purpose, one can apply a number of indirect diagnostic methods with the use of recorded diagnostic signals or a direct diagnosis with the use of non-destructive methods. The proper identification of the technical condition allows to determine the causes of irregularities and take actions aimed at preventing their occurrence. The article presents the types of exploitation damage of a multi-purpose aircraft. In addition, the criteria for the division of damage and research methods of the causes of damage are presented. Furthermore, an analysis of the scope of activities to be performed during the research of causes of damage to the aircraft is made.

  16. Host exploitation strategies of the social parasite Maculinea alcon

    DEFF Research Database (Denmark)

    Fürst, Matthias Alois

    as model systems. These enable the study of adaptations and counter-adaptations that might evolve in the arms-race between a parasite pursuing maximum gain and a host trying to avoid exploitation. One such system is the socially parasitic butterfly Maculinea alcon and its host the ant Myrmica rubra....... Throughout the first instars M. alcon lives on a specific food plant, however, in the last instar before pupation it develops into an obligate social parasite, posing a considerably cost to its host ant colony. I here focus on the different exploitation strategies of M. alcon throughout its lifecycle...... a fitness cost to infected host ant colonies, the host ants are expected to have developed defense mechanisms in response to the presence of the social parasite. I was able to demonstrate that the efficiency of ant colonies to defend themselves against intruders depends on a multitude of often correlated...

  17. Hacking the Cell: Network Intrusion and Exploitation by Adenovirus E1A.

    Science.gov (United States)

    King, Cason R; Zhang, Ali; Tessier, Tanner M; Gameiro, Steven F; Mymryk, Joe S

    2018-05-01

    As obligate intracellular parasites, viruses are dependent on their infected hosts for survival. Consequently, viruses are under enormous selective pressure to utilize available cellular components and processes to their own advantage. As most, if not all, cellular activities are regulated at some level via protein interactions, host protein interaction networks are particularly vulnerable to viral exploitation. Indeed, viral proteins frequently target highly connected "hub" proteins to "hack" the cellular network, defining the molecular basis for viral control over the host. This widespread and successful strategy of network intrusion and exploitation has evolved convergently among numerous genetically distinct viruses as a result of the endless evolutionary arms race between pathogens and hosts. Here we examine the means by which a particularly well-connected viral hub protein, human adenovirus E1A, compromises and exploits the vulnerabilities of eukaryotic protein interaction networks. Importantly, these interactions identify critical regulatory hubs in the human proteome and help define the molecular basis of their function. Copyright © 2018 King et al.

  18. Sex trafficking and sexual exploitation in settings affected by armed conflicts in Africa, Asia and the Middle East: systematic review.

    Science.gov (United States)

    McAlpine, Alys; Hossain, Mazeda; Zimmerman, Cathy

    2016-12-28

    Sex trafficking and sexual exploitation has been widely reported, especially in conflict-affected settings, which appear to increase women's and children's vulnerabilities to these extreme abuses. We conducted a systematic search of ten databases and extensive grey literature to gather evidence of sex trafficking and sexual exploitation in conflict-affected settings. International definitions of "sexual exploitation" and "sex trafficking" set the indicator parameters. We focused on sexual exploitation in forms of early or forced marriage, forced combatant sexual exploitation and sexual slavery. We extracted prevalence measures, health outcomes and sexual exploitation terminology definitions. The review adhered to PRISMA guidelines and includes quality appraisal. The search identified 29 eligible papers with evidence of sex trafficking and sexual exploitation in armed conflict settings in twelve countries in Africa, Asia, and the Middle East. The evidence was limited and not generalizable, due to few prevalence estimates and inconsistent definitions of "sexual exploitation". The prevalence estimates available indicate that females were more likely than males to be victims of sexual exploitation in conflict settings. In some settings, as many as one in four forced marriages took place before the girls reached 18 years old. Findings suggest that the vast majority of former female combatants were sexually exploited during the conflict. These studies provided various indicators of sexual exploitation compatible to the United Nation's definition of sex trafficking, but only 2 studies identified the exploitation as trafficking. None of the studies solely aimed to measure the prevalence of sex trafficking or sexual exploitation. Similar descriptions of types of sexual exploitation and trafficking were found, but the inconsistent terminology or measurements inhibited a meta-analysis. Findings indicate there are various forms of human trafficking and sexual exploitation in

  19. Exploitation of Free Markets and Globalization to Finance Terrorists

    Science.gov (United States)

    2008-09-01

    is their capability to exploit the black market peso exchange or the international foreign exchange arbitrage . Under the scenario of a weak U.S...appears legitimate. By using intermediaries or legitimate businesses, the financial markets are wide open for terrorists to hedge funds and

  20. Drug-perturbation-based stratification of blood cancer

    Science.gov (United States)

    Dietrich, Sascha; Lu, Junyan; Wu, Bian; Hüllein, Jennifer; da Silva Liberio, Michelle; Walther, Tatjana; Wagner, Lena; Rabe, Sophie; Ghidelli-Disse, Sonja; Bantscheff, Marcus; Słabicki, Mikołaj; Mock, Andreas; Oakes, Christopher C.; Wang, Shihui; Oppermann, Sina; Lukas, Marina; Kim, Vladislav; Sill, Martin; Jauch, Anna; Sutton, Lesley Ann; Rosenquist, Richard; Liu, Xiyang; Jethwa, Alexander; Lee, Kwang Seok; Lewis, Joe; Putzker, Kerstin; Lutz, Christoph; Rossi, Davide; Oellerich, Thomas; Herling, Marco; Nguyen-Khac, Florence; Plass, Christoph; von Kalle, Christof; Ho, Anthony D.; Hensel, Manfred; Dürig, Jan; Ringshausen, Ingo; Huber, Wolfgang

    2017-01-01

    As new generations of targeted therapies emerge and tumor genome sequencing discovers increasingly comprehensive mutation repertoires, the functional relationships of mutations to tumor phenotypes remain largely unknown. Here, we measured ex vivo sensitivity of 246 blood cancers to 63 drugs alongside genome, transcriptome, and DNA methylome analysis to understand determinants of drug response. We assembled a primary blood cancer cell encyclopedia data set that revealed disease-specific sensitivities for each cancer. Within chronic lymphocytic leukemia (CLL), responses to 62% of drugs were associated with 2 or more mutations, and linked the B cell receptor (BCR) pathway to trisomy 12, an important driver of CLL. Based on drug responses, the disease could be organized into phenotypic subgroups characterized by exploitable dependencies on BCR, mTOR, or MEK signaling and associated with mutations, gene expression, and DNA methylation. Fourteen percent of CLLs were driven by mTOR signaling in a non–BCR-dependent manner. Multivariate modeling revealed immunoglobulin heavy chain variable gene (IGHV) mutation status and trisomy 12 as the most important modulators of response to kinase inhibitors in CLL. Ex vivo drug responses were associated with outcome. This study overcomes the perception that most mutations do not influence drug response of cancer, and points to an updated approach to understanding tumor biology, with implications for biomarker discovery and cancer care. PMID:29227286

  1. Amplifiers Exploiting Thermal Noise Canceling: A Review

    OpenAIRE

    Klumperink, Eric A.M.; Bruccoleri, Federico; Stroet, Peter; Nauta, Bram

    2004-01-01

    Wide-band LNAs suffer from a fundamental trade-off between noise figure NF and source impedance matching, which limits NF to values typically above 3dB. Recently, a feed-forward noise canceling technique has been proposed to break this trade-off. This paper reviews the principle of the technique and its key properties. Although the technique has been applied to wideband CMOS LNAs, it can just as well be implemented exploiting transconductance elements realized with oth...

  2. Guide d'exploitation des filières de traitement par boues activées

    OpenAIRE

    Boutin, C.; Caquel, O.; Dimastromatteo, N.,; Dumaine, J.,; Fernandes. G.,; Gervasi, C.; Parotin, S.; Prost Boucle, S.; Tscherter, C.

    2015-01-01

    / Ce guide, à destination des maîtres d'ouvrage et des exploitants, a pour objet de présenter de façon synthétique, les modalités d'exploitation courante d'une station d'épuration par boues activées de capacité < 600 kg DBO5/jour (soit 10 000 équivalents habitants (EH)), et dimensionnée dans le domaine de charge de l'aération prolongée (Cm < 0,1 kg DBO5 /kg MVS/jour). Conçu au fil de l'eau, il recense, tant pour la file eau que pour la file boues, l'ensemble des tâches d'exploitation courante...

  3. Sequential ambidexterity in practice : a longitudinal study on shifts from exploration to exploitation and reverse

    NARCIS (Netherlands)

    de Visser, Matthias; Faems, Dries; Visscher, Klaasjan; de Weerd-Nederhof, Petronella C.

    2017-01-01

    Many scholars have stressed the need for balancing exploitation with sufficient levels of exploration (Levinthal and March, 1993; March, 1991, 2006). Organizations that have a one-sided focus on exploitation by allocating resources to refinement of existing technologies rather than to developing new

  4. Exploiting wild relatives of S. lycopersicum for quality traits

    NARCIS (Netherlands)

    Víquez Zamora, A.M.

    2015-01-01

    Exploiting wild relatives of S. lycopersicum for quality traits Ana Marcela Víquez Zamora Tomatoes are consumed worldwide and became a model for crop plant research. A part of the research aims at expanding genetic diversity in tomato; this can be done by incorporating

  5. Bats track and exploit changes in insect pest populations

    Science.gov (United States)

    The role of bats or any generalist predator in suppressing prey populations depends on the predator’s ability to exploit available prey in space and time. Using a qPCR faecal DNA assay, we document significant association between numbers of Brazilian free-tailed bats (Tadarida brasiliensis) consumin...

  6. Seroprevalence of Fasciola hepatica in cattle in Estonia

    DEFF Research Database (Denmark)

    Petersson, Jennifer; Jokelainen, Pikka; Lassen, Brian

    2017-01-01

    Fasciolosis, an infectious disease caused by the liver fluke Fasciola hepatica, affects grazing cattle world-wide. Liver fluke F. hepatica is prevalent and well-documented in cattle in many European countries, but for the Baltic countries such information is limited. This study investigated...

  7. Optimization of conditions to extract high quality DNA for PCR analysis from whole blood using SDS-proteinase K method

    Directory of Open Access Journals (Sweden)

    Wajhul Qamar

    2017-11-01

    Full Text Available In case of studies associated with human genetics, genomics, and pharmacogenetics the genomic DNA is extracted from the buccal cells, whole blood etc. Several methods are exploited by the researchers to extract DNA from the whole blood. One of these methods, which utilizes cell lysis and proteolytic properties of sodium dodecyl sulfate (SDS and proteinase K respectively, might also be called SDS-PK method. It does not include any hazardous chemicals such as phenol or chloroform and is inexpensive. However, several researchers report the same method with different formulas and conditions. During our experiments with whole blood DNA extraction we experienced problems such as protein contamination, DNA purity and yield when followed some SDS-PK protocols reported elsewhere. A260/A280 and A260/A230 ratios along with PCR amplification give a clear idea about the procedure that was followed to extract the DNA. In an effort to increase the DNA purity from human whole blood, we pointed out some steps of the protocol that play a crucial role in determining the extraction of high quality DNA.

  8. The Potential Socio-economic Impacts of Gas Hydrate Exploitation

    Science.gov (United States)

    Riley, David; Schaafsma, Marije; Marin-Moreno, Héctor; Minshull, Tim A.

    2017-04-01

    Gas hydrate has garnered significant interest as a possible clean fossil fuel resource, especially in countries with limited energy supplies. Whilst the sector is still in its infancy, there has been escalating development towards commercial production. To the best of our knowledge it appears that, despite its potential, existing analyses of the social and economic impacts of hydrate exploitation have been very limited. Before any viable commercial production commences, the potential impacts across society must be considered. It is likely that such impact assessments will become a legislative requirement for hydrate exploitation, similar to their requirement in conventional oil and gas projects. Social impact analysis should guide hydrate development to have the highest possible net benefits to the human and natural environment. Without active commercial hydrate operations, potential socio-economic impacts can only be inferred from other fossil fuel resource focused communities, including those directly or indirectly affected by the oil and gas industry either in the vicinity of the well or further afield. This review attempts to highlight potential impacts by synthesising current literature, focusing on social impacts at the extraction stage of operation, over time. Using a DPSIR (Driving forces; Pressures; States; Impacts; Responses) framework, we focus on impacts upon: health and wellbeing, land use and access, services and infrastructure, population, employment opportunities, income and lifestyles. Human populations directly or indirectly related with fossil fuel extraction activities often show boom and bust dynamics, and so any impacts may be finite or change temporally. Therefore potential impacts have to be reassessed throughout the lifetime of the exploitation. Our review shows there are a wide range of possible positive and negative socio-economic impacts from hydrate development. Exploitation can bring jobs and infrastructure to remote areas, although

  9. An automated data exploitation system for airborne sensors

    Science.gov (United States)

    Chen, Hai-Wen; McGurr, Mike

    2014-06-01

    Advanced wide area persistent surveillance (WAPS) sensor systems on manned or unmanned airborne vehicles are essential for wide-area urban security monitoring in order to protect our people and our warfighter from terrorist attacks. Currently, human (imagery) analysts process huge data collections from full motion video (FMV) for data exploitation and analysis (real-time and forensic), providing slow and inaccurate results. An Automated Data Exploitation System (ADES) is urgently needed. In this paper, we present a recently developed ADES for airborne vehicles under heavy urban background clutter conditions. This system includes four processes: (1) fast image registration, stabilization, and mosaicking; (2) advanced non-linear morphological moving target detection; (3) robust multiple target (vehicles, dismounts, and human) tracking (up to 100 target tracks); and (4) moving or static target/object recognition (super-resolution). Test results with real FMV data indicate that our ADES can reliably detect, track, and recognize multiple vehicles under heavy urban background clutters. Furthermore, our example shows that ADES as a baseline platform can provide capability for vehicle abnormal behavior detection to help imagery analysts quickly trace down potential threats and crimes.

  10. The age of exploration and exploitation: Younger-looking leaders endorsed for change and older-looking leaders endorsed for stability

    NARCIS (Netherlands)

    Spisak, B.R.; Grabo, A.E.; Arvey, R.D.; van Vugt, M.

    2014-01-01

    The current contribution extends theorizing on leadership and the exploration-exploitation dilemma using an evolutionary perspective. A theoretical connection is made between the exploration-exploitation dilemma and age-biased leadership preferences for exploratory change versus stable exploitation.

  11. Conflicts Related to Natural Resources Exploitation: A Case Study of ...

    African Journals Online (AJOL)

    Conflicts Related to Natural Resources Exploitation: A Case Study of Oil Crisis in Nigeria's Niger Delta Region and its Socio-Political and Economic Implications. ... on the environment leading to pollution of land, rivers, creeks and waterways.

  12. Human Impact and Vegetation History on Salt Spring Exploitation (Halabutoaia - Tolici, Petricani, Neamt, Romania

    Directory of Open Access Journals (Sweden)

    Mihaela DANU

    2010-09-01

    Full Text Available Salt exploitation from the mineral spring of Halabutoaia - Tolici (Neamt, Romania is one of the earliest in Europe. Salt production is documented from the Early Neolithic to the end of Chalcolithic period (6000-3500 BC with an important stratigraphy of 8 m high. In 2008, a core drilling with a Russian auger in the salty swamp of the spring closed to archaeological site, was realized. Pollen analysis, study of non-pollen palynomorphs and sedimentary signal (geophysical measurements of magnetic susceptibility, suggest a very anthropic environment since the Early Neolithic. Salt exploitation, agriculture and pastoralism (presence of spores of coprophilous fungi are directly in connection with these variations. After this intense exploitation, the forest environment closes but the human impact is always perceptible.

  13. Rumours about blood and reimbursements in a microbicide gel trial.

    Science.gov (United States)

    Stadler, Jonathan; Saethre, Eirik

    2010-12-01

    A rumour that emerged during a microbicide gel trial tells the tale of clinic staff purchasing trial participants' blood. This paper documents the rumour and explores its divergent interpretations and meanings in relation to the context of the trial and the social and economic setting at two of the trial sites (Soweto and Orange Farm) in South Africa. The article is based on qualitative research conducted during the Microbicides Development Programme (MDP) 301 trial to evaluate a microbicide vaginal gel for HIV prevention in women. The research incorporated in-depth interviews with female trial participants and their male partners, focus group discussions with male and female community members, and participant observation in the trial clinic and community setting at the two sites. The article analyses the different perspectives among the clinic staff, community and trial participants in terms of which the rumour about the exchange of blood for cash is seen as: 1) the result of ignorance of the clinical trial procedures; 2) the exploitation of poor and vulnerable women; 3) an example of young women's desire for material gain; and 4) a reciprocal exchange of 'clean blood' for cash between women trial participants and the health services. We suggest that the rumours about selling blood verbalise notions of gender and morality while also providing an appraisal of the behaviour of young women and a critique of social relationships between foreign researchers and local participants. Through stories about the clinical trial procedures and its potential reimbursements, the participants were creating and reconfiguring social relationships. Ultimately, rumours are one way in which foreign enterprises such as a clinical trial are rendered local.

  14. Sex workers perspectives on strategies to reduce sexual exploitation and HIV risk: a qualitative study in Tijuana, Mexico.

    Science.gov (United States)

    Goldenberg, Shira M; Engstrom, David; Rolon, Maria Luisa; Silverman, Jay G; Strathdee, Steffanie A

    2013-01-01

    Globally, female sex workers are a population at greatly elevated risk of HIV infection, and the reasons for and context of sex industry involvement have key implications for HIV risk and prevention. Evidence suggests that experiences of sexual exploitation (i.e., forced/coerced sex exchange) contribute to health-related harms. However, public health interventions that address HIV vulnerability and sexual exploitation are lacking. Therefore, the objective of this study was to elicit recommendations for interventions to prevent sexual exploitation and reduce HIV risk from current female sex workers with a history of sexual exploitation or youth sex work. From 2010-2011, we conducted in-depth interviews with sex workers (n = 31) in Tijuana, Mexico who reported having previously experienced sexual exploitation or youth sex work. Participants recommended that interventions aim to (1) reduce susceptibility to sexual exploitation by providing social support and peer-based education; (2) mitigate harms by improving access to HIV prevention resources and psychological support, and reducing gender-based violence; and (3) provide opportunities to exit the sex industry via vocational supports and improved access to effective drug treatment. Structural interventions incorporating these strategies are recommended to reduce susceptibility to sexual exploitation and enhance capacities to prevent HIV infection among marginalized women and girls in Mexico and across international settings.

  15. Preventing Exploits Against Software of Uncertain Provenance (PEASOUP)

    Science.gov (United States)

    2015-05-01

    two common synchronization idioms: conditional variables (e.g., pthread_cond_wait()) and semaphores that count up and are used for signaling...delay prior to certain synchronization operations. The operations include thread creation, the first lock of each mutex (or decrement of a semaphore ...permissions are shared by all threads in the same process. • Synchronization Primitives . To exploit the race condition, two attacker-controlled

  16. On Roof Geometry for Urban Wind Energy Exploitation in High-Rise Buildings

    Directory of Open Access Journals (Sweden)

    Francisco Toja-Silva

    2015-06-01

    Full Text Available The European program HORIZON2020 aims to have 20% of electricity produced by renewable sources. The building sector represents 40% of the European Union energy consumption. Reducing energy consumption in buildings is therefore a priority for energy efficiency. The present investigation explores the most adequate roof shapes compatible with the placement of different types of small wind energy generators on high-rise buildings for urban wind energy exploitation. The wind flow around traditional state-of-the-art roof shapes is considered. In addition, the influence of the roof edge on the wind flow on high-rise buildings is analyzed. These geometries are investigated, both qualitatively and quantitatively, and the turbulence intensity threshold for horizontal axis wind turbines is considered. The most adequate shapes for wind energy exploitation are identified, studying vertical profiles of velocity, turbulent kinetic energy and turbulence intensity. Curved shapes are the most interesting building roof shapes from the wind energy exploitation point of view, leading to the highest speed-up and the lowest turbulence intensity.

  17. Swedish mines. Underground exploitation methods

    International Nuclear Information System (INIS)

    Paucard, A.

    1960-01-01

    Between 1949 and 1957, 10 engineers of the Mining research and exploitation department of the CEA visited 17 Swedish mines during 5 field trips. This paper presents a compilation of the information gathered during these field trips concerning the different underground mining techniques used in Swedish iron mines: mining with backfilling (Central Sweden and Boliden mines); mining without backfilling (mines of the polar circle area). The following techniques are described successively: pillar drawing and backfilled slices (Ammeberg, Falun, Garpenberg, Boliden group), sub-level pillar drawing (Grangesberg, Bloettberget, Haeksberg), empty room and sub-level pillar drawing (Bodas, Haksberg, Stripa, Bastkarn), storage chamber pillar drawing (Bodas, Haeksberg, Bastkarn), and pillar drawing by block caving (ldkerberget). Reprint of a paper published in Revue de l'Industrie Minerale, vol. 41, no. 12, 1959 [fr

  18. Exploitation et importance socio-économique du bambou de chine ...

    African Journals Online (AJOL)

    importante dans l'adaptation au changement climatique et le .... et de la nature du matériau remplacé par le bambou de chine. ... comprend quatre grandes phases: la production, l'exploitation, ..... https://www.researchgate.net/publication.

  19. Exploitation of unconventional protein sources in the feed of weaner ...

    African Journals Online (AJOL)

    Exploitation of unconventional protein sources in the feed of weaner rabbits ... as protein sources for feeding ruminants but rarely considered as feed for micro ... 26.88 g/100g DM in Centrosema pubescens and Moringa oleifera, respectively.

  20. The effect of x-irradiation on the development of Fasciola gigantica (cobbold, 1885) in goats

    International Nuclear Information System (INIS)

    Ravi Chandra

    1976-01-01

    The effect of varying doses (1 kr, 3 kr, 5 kr) of x-irradiation on the development of Fasciola gigantica, the common liver fluke of livestock in India has been investigated in goat kids with a view to develop a radiation attenuated vaccine against the pathogen. The growth and development of the flukes recovered from animals infected with irradiated metacercarie is found to be retarded. Metacecariae exposed to 3 kr can develop further, but number of flukes recovered from animals infected with metacecariae exposed to 5 kr is considerably less than the one from animals infected with non-irradiated metacercariae. (M.G.B.)

  1. Exploitation of labour: A study of Migrant labourers in West Bengal

    Directory of Open Access Journals (Sweden)

    Sribas Goswami

    2015-07-01

    Full Text Available Migrant workers, who constitute a major work force, in the unorganized sector, face various psychological stresses and arrive in an aggravated mental position due to their habit of using different varieties of intoxicants. The researcher’s attempt in this paper is to find out the connection of addiction- related stress and social disintegration of the migrant workers with the wide web of exploitation of labour through an empirical analysis. The intoxicants are the only medium for the migrants to leave the sufferings behind them for a time being. This paper highlights the push factors as the fabricated trap to exploit the migrants physically, socially and mentally for surplus production with cheap labour.

  2. Ancient Human Parasites in Ethnic Chinese Populations.

    Science.gov (United States)

    Yeh, Hui-Yuan; Mitchell, Piers D

    2016-10-01

    Whilst archaeological evidence for many aspects of life in ancient China is well studied, there has been much less interest in ancient infectious diseases, such as intestinal parasites in past Chinese populations. Here, we bring together evidence from mummies, ancient latrines, and pelvic soil from burials, dating from the Neolithic Period to the Qing Dynasty, in order to better understand the health of the past inhabitants of China and the diseases endemic in the region. Seven species of intestinal parasite have been identified, namely roundworm, whipworm, Chinese liver fluke, oriental schistosome, pinworm, Taenia sp. tapeworm, and the intestinal fluke Fasciolopsis buski . It was found that in the past, roundworm, whipworm, and Chinese liver fluke appear to have been much more common than the other species. While roundworm and whipworm remained common into the late 20th century, Chinese liver fluke seems to have undergone a marked decline in its prevalence over time. The iconic transport route known as the Silk Road has been shown to have acted as a vector for the transmission of ancient diseases, highlighted by the discovery of Chinese liver fluke in a 2,000 year-old relay station in northwest China, 1,500 km outside its endemic range.

  3. Exploiting Patient Labour at Kew Cottages, Australia, 1887-1950

    Science.gov (United States)

    Monk, Lee-Ann

    2010-01-01

    This article examines the exploitation of patient labour at Kew Cottages, Australia's first purpose-built state institution for people with learning disabilities. Analysing historical evidence for the period 1887-1950 shows that unpaid patient labour contributed significantly to the economy of the Cottages and so to the government department of…

  4. Desiring TESOL and International Education: Market Abuse and Exploitation

    Science.gov (United States)

    Chowdhury, Raqib; Ha, Phan Le

    2014-01-01

    This book addresses how Western universities have constructed themselves as global providers of education, and are driven to be globally competitive. It examines how the term "international" has been exploited by the market in the form of government educational policies and agencies, host institutions, academia and the mass media. The…

  5. Beyond the Bravado: Sex Roles and the Exploitive Male.

    Science.gov (United States)

    Taubman, Stan

    1986-01-01

    Examines the tendency of men to engage in domestic violence and sexual exploitation and presents male sex-role acquisition as a process of psychosocial violence against young boys, which creates a sense of shame, powerlessness, self-alienation, isolation from others, and retaliatory rage and inhibits capacities for intimacy and mutuality.…

  6. Molecular detection of Sarcocystis aucheniae in the blood of llamas from Argentina.

    Science.gov (United States)

    Martin, Mara; Decker Franco, Cecilia; Romero, Sandra; Carletti, Tamara; Schnittger, Leonhard; Florin-Christensen, Monica

    Sarcocystis aucheniae are apicomplexan protozoa that infect South American camelids (SACs), giving rise to macroscopic cysts similar to rice grains in skeletal muscles. Visual detection of macrocysts in slaughtered animals hampers commercialization of SAC meat, a highly relevant economic exploitation for Andean rural families. Importantly, the consumption of undercooked S. aucheniae-infested meat causes gastroenteritis. A carnivore definitive host, possibly the dog, acquires the parasite when feeding on infected SAC meat, and later eliminates infective oocysts in its feces. The parasite cycle is completed when SACs ingest contaminated water or pastures. We hypothesized that parasite DNA can be detected in SAC blood using molecular methods. In order to test this hypothesis, a seminested PCR format was specifically designed to target the hypervariable 18S rRNA gene region of S. aucheniae. PCR conditions were optimized using genomic DNA extracted from macrocyst bradyzoites. A detection limit of up to 1 parasite in 10μl of llama blood was established based on DNA samples extracted from aliquots of S. aucheniae bradyzoite-spiked non-infected llama blood. The seminested PCR allowed to detect natural infections of S. aucheniae in llama blood samples originating in the Andean flatlands of Argentina. Specific amplification of S. aucheniae DNA was corroborated by amplicon sequencing. This is the first report of S. aucheniae detection in llama blood, which provides a valuable diagnostic tool for epidemiological studies and for the evaluation of the efficacy of control measures for this parasitosis. Copyright © 2016 Asociación Argentina de Microbiología. Publicado por Elsevier España, S.L.U. All rights reserved.

  7. Exploitation of low-temperature energy sources from cogeneration gas engines

    International Nuclear Information System (INIS)

    Caf, A.; Urbancl, D.; Trop, P.; Goricanec, D.

    2016-01-01

    This paper describes an original and innovative technical solution for exploiting low-temperature energy sources from cogeneration gas reciprocating engines installed within district heating systems. This solution is suitable for those systems in which the heat is generated by the use of reciprocating engines powered by gaseous fuel for combined heat and power production. This new technical solution utilizes low-temperature energy sources from a reciprocating gas engine which is used for a combined production of heat and power. During the operation of the cogeneration system low-temperature heat is released, which can be raised to as much as 85 °C with the use of a high-temperature heat-pump, thus enabling a high-temperature regime for heating commercial buildings, district heating or in industrial processes. In order to demonstrate the efficiency of utilizing low-temperature heat sources in the cogeneration system, an economic calculation is included which proves the effectiveness and rationality of integrating high-temperature heat-pumps into new or existing systems for combined heat and power production with reciprocating gas engines. - Highlights: • The use of low-temperature waste heat from the CHP is described. • Total energy efficiency of the CHP can be increased to more than 103.3%. • Low-temperature heat is exploited with high-temperature heat pump. • High-temperature heat pump allows temperature rise to up to 85 °C. • Exploitation of low-temperature waste heat increases the economics of the CHP.

  8. Exploiting Formation Flying for Fuel Saving Supersonic Oblique Wing Aircraft

    Science.gov (United States)

    2007-07-01

    used and developed during recent wing / winglet / morphing design programmes (Refs.13-14). By exploiting this method, we have assessed the aerodynamics ...parameters, Propulsion Issues, Size Issues, Aero-elastic effects 15. SUBJECT TERMS EOARD, Control System, Aerodynamics 16...

  9. Measurement of the ultrasound attenuation and dispersion in whole human blood and its components from 0-70 MHz.

    Science.gov (United States)

    Treeby, Bradley E; Zhang, Edward Z; Thomas, Alison S; Cox, Ben T

    2011-02-01

    The ultrasound attenuation coefficient and dispersion from 0-70 MHz in whole human blood and its components (red blood cells and plasma) at 37°C is reported. The measurements are made using a fixed path substitution technique that exploits optical mechanisms for the generation and detection of ultrasound. This allows the measurements to cover a broad frequency range with a single source and receiver. The measured attenuation coefficient and dispersion in solutions of red blood cells and physiological saline for total haemoglobin concentrations of 10, 15 and 20 g/dL are presented. The attenuation coefficient and dispersion in whole human blood taken from four healthy volunteers by venipuncture is also reported. The power law dependence of the attenuation coefficient is shown to vary across the measured frequency range. This is due to the varying frequency dependence of the different mechanisms responsible for the attenuation. The attenuation coefficient measured at high frequencies is found to be significantly higher than that predicted by historical power law parameters. A review of the attenuation mechanisms in blood along with previously reported experimental measurements is given. Values for the sound speed and density in the tested samples are also presented. Copyright © 2011 World Federation for Ultrasound in Medicine & Biology. Published by Elsevier Inc. All rights reserved.

  10. Exploitation of Natural Resources and the Public Sector in Greenland

    DEFF Research Database (Denmark)

    Nielsen, Søren Bo

    This paper considers the role of the public sector in future exploitation of non-renewable resources, especially minerals, in Greenland. The focus is on fiscal sustainability, principles for public sector involvement and the form of government take from mining activities. At present, the public...... budget in Greenland is nearly in balance, but at unchanged policies and standards public expenditures relative to GDP are bound to increase dramatically over the next decades due to population ageing. At the same time, the freezing of the block grant from Denmark implies a decrease in revenues relative...... to GDP. Hence, fiscal policy is quite far from being sustainable. Apart from a need for reforms, these facts also constrain the possible role of the public sector in future resource exploitation. In any case, the government should preferably adhere to strict principles when developing the mineral sector...

  11. Immaterial Boys? A Large-Scale Exploration of Gender-Based Differences in Child Sexual Exploitation Service Users.

    Science.gov (United States)

    Cockbain, Ella; Ashby, Matthew; Brayley, Helen

    2017-10-01

    Child sexual exploitation is increasingly recognized nationally and internationally as a pressing child protection, crime prevention, and public health issue. In the United Kingdom, for example, a recent series of high-profile cases has fueled pressure on policy makers and practitioners to improve responses. Yet, prevailing discourse, research, and interventions around child sexual exploitation have focused overwhelmingly on female victims. This study was designed to help redress fundamental knowledge gaps around boys affected by sexual exploitation. This was achieved through rigorous quantitative analysis of individual-level data for 9,042 users of child sexual exploitation services in the United Kingdom. One third of the sample were boys, and gender was associated with statistically significant differences on many variables. The results of this exploratory study highlight the need for further targeted research and more nuanced and inclusive counter-strategies.

  12. Heisenberg's heirs exploit loopholes in his law

    International Nuclear Information System (INIS)

    Taubes, G.

    1994-01-01

    This article describes research into Heisenberg's Uncertainty Principle. Loopholes in the principle have led to a series of experiments using sophisticated optical techniques to extract information from a quantum system without disturbing the variable being measured. The experiments are based on a technique called back-action evasion, which exploits the possibility of channeling all the uncertainty generated by measuring one quantum variable (e.g. laser beam intensity) onto a related variable known as the conjugate observable (beam phase). These experiments and others are described

  13. Toward laboratory blood test-comparable photometric assessments for anemia in veterinary hematology

    Science.gov (United States)

    Kim, Taehoon; Choi, Seung Ho; Lambert-Cheatham, Nathan; Xu, Zhengbin; Kritchevsky, Janice E.; Bertin, Francois-René; Kim, Young L.

    2016-10-01

    Anemia associated with intestinal parasites and malnutrition is the leading cause of morbidity and mortality in small ruminants worldwide. Qualitative scoring of conjunctival redness has been developed so that farmers can gauge anemia in sheep and goats to identify animals that require treatment. For clinically relevant anemia diagnosis, complete blood count-comparable quantitative methods often rely on complicated and expensive optical instruments, requiring detailed spectral information of hemoglobin. We report experimental and numerical results for simple, yet reliable, noninvasive hemoglobin detection that can be correlated with laboratory-based blood hemoglobin testing for anemia diagnosis. In our pilot animal study using calves, we exploit the third eyelid (i.e., palpebral conjunctiva) as an effective sensing site. To further test spectrometer-free (or spectrometerless) hemoglobin assessments, we implement full spectral reconstruction from RGB data and partial least square regression. The unique combination of RGB-based spectral reconstruction and partial least square regression could potentially offer uncomplicated instrumentation and avoid the use of a spectrometer, which is vital for realizing a compact and inexpensive hematology device for quantitative anemia detection in the farm field.

  14. The energy metabolism of Fasciola hepatica during its development in the final host

    NARCIS (Netherlands)

    Tielens, A.G.M.; Heuvel, J.M. van den; Bergh, S.G. van den

    1984-01-01

    Mature liver flukes, Fasciola hepatica, of different ages were isolated from the bile ducts of experimentally infected rats. Their energy metabolism was studied during aerobic incubation with [6-14C]glucose. The results showed that the aerobic potentials of the parenchymal liver flukes are not lost

  15. Global status of fish-borne zoonotic trematodiasis in humans

    DEFF Research Database (Denmark)

    Hung, Nguyen Manh; Madsen, Henry; Fried, Bernard

    2013-01-01

    ) are listed. Some trematodes, which are highly pathogenic for humans such as Clonorchis sinensis, Opisthorchis viverrini, O. felineus are discussed in detail, i.e. infection status in humans in endemic areas, clinical aspects, symptoms and pathology of disease caused by these flukes. Other liver fluke species...

  16. Enhanced surrogate models for statistical design exploiting space mapping technology

    DEFF Research Database (Denmark)

    Koziel, Slawek; Bandler, John W.; Mohamed, Achmed S.

    2005-01-01

    We present advances in microwave and RF device modeling exploiting Space Mapping (SM) technology. We propose new SM modeling formulations utilizing input mappings, output mappings, frequency scaling and quadratic approximations. Our aim is to enhance circuit models for statistical analysis...

  17. Organizational Ambidexterity : Balancing Exploitation and Exploration in Organizations

    OpenAIRE

    Yigit, Mert

    2013-01-01

    Purpose: This paper aims to investigate necessity of ambidexterity for organizations. The main interest of this thesis is to investigate why organizations should be ambidextrous and how organizations can reach ambidexterity under the pressure of limited resources and competitive market condition. Findings: This thesis explored relations and tensions between exploitation and exploration in organizational and individual aspects. Findings in the research show that communication skill of the subu...

  18. Exploiting GPUs in Virtual Machine for BioCloud

    OpenAIRE

    Jo, Heeseung; Jeong, Jinkyu; Lee, Myoungho; Choi, Dong Hoon

    2013-01-01

    Recently, biological applications start to be reimplemented into the applications which exploit many cores of GPUs for better computation performance. Therefore, by providing virtualized GPUs to VMs in cloud computing environment, many biological applications will willingly move into cloud environment to enhance their computation performance and utilize infinite cloud computing resource while reducing expenses for computations. In this paper, we propose a BioCloud system architecture that ena...

  19. Sex workers perspectives on strategies to reduce sexual exploitation and HIV risk: a qualitative study in Tijuana, Mexico.

    Directory of Open Access Journals (Sweden)

    Shira M Goldenberg

    Full Text Available Globally, female sex workers are a population at greatly elevated risk of HIV infection, and the reasons for and context of sex industry involvement have key implications for HIV risk and prevention. Evidence suggests that experiences of sexual exploitation (i.e., forced/coerced sex exchange contribute to health-related harms. However, public health interventions that address HIV vulnerability and sexual exploitation are lacking. Therefore, the objective of this study was to elicit recommendations for interventions to prevent sexual exploitation and reduce HIV risk from current female sex workers with a history of sexual exploitation or youth sex work. From 2010-2011, we conducted in-depth interviews with sex workers (n = 31 in Tijuana, Mexico who reported having previously experienced sexual exploitation or youth sex work. Participants recommended that interventions aim to (1 reduce susceptibility to sexual exploitation by providing social support and peer-based education; (2 mitigate harms by improving access to HIV prevention resources and psychological support, and reducing gender-based violence; and (3 provide opportunities to exit the sex industry via vocational supports and improved access to effective drug treatment. Structural interventions incorporating these strategies are recommended to reduce susceptibility to sexual exploitation and enhance capacities to prevent HIV infection among marginalized women and girls in Mexico and across international settings.

  20. Modeling the ischemic blood-brain barrier; the effects of oxygen-glucose deprivation (OGD) on endothelial cells in culture

    DEFF Research Database (Denmark)

    Tornabene, Erica; Helms, Hans Christian Cederberg; Berndt, Philipp

    Introduction - The blood-brain barrier (BBB) is a physical, transport and metabolic barrier which plays a key role in preventing uncontrolled exchanges between blood and brain, ensuring an optimal environment for neurons activity. This extent interface is created by the endothelial cells forming...... pathways across the barrier in ischemic and postischemic brain endothelium is important for developing new medical therapies capable to exploit the barrier changes occurring during/after ischemia to permeate in the brain and treat this devastating disease. Materials and Methods - Primary cultures...... the wall of brain capillaries. The restrictive nature of the BBB is due to the tight junctions (TJs), which seal the intercellular clefts, limiting the paracellular diffusion, efflux transporters, which extrude xenobiotics, and metabolizing enzymes, which may break down or convert molecules during...

  1. Noise-exploitation and adaptation in neuromorphic sensors

    Science.gov (United States)

    Hindo, Thamira; Chakrabartty, Shantanu

    2012-04-01

    Even though current micro-nano fabrication technology has reached integration levels where ultra-sensitive sensors can be fabricated, the sensing performance (resolution per joule) of synthetic systems are still orders of magnitude inferior to those observed in neurobiology. For example, the filiform hairs in crickets operate at fundamental limits of noise; auditory sensors in a parasitoid fly can overcome fundamental limitations to precisely localize ultra-faint acoustic signatures. Even though many of these biological marvels have served as inspiration for different types of neuromorphic sensors, the main focus these designs have been to faithfully replicate the biological functionalities, without considering the constructive role of "noise". In man-made sensors device and sensor noise are typically considered as a nuisance, where as in neurobiology "noise" has been shown to be a computational aid that enables biology to sense and operate at fundamental limits of energy efficiency and performance. In this paper, we describe some of the important noise-exploitation and adaptation principles observed in neurobiology and how they can be systematically used for designing neuromorphic sensors. Our focus will be on two types of noise-exploitation principles, namely, (a) stochastic resonance; and (b) noise-shaping, which are unified within our previously reported framework called Σ▵ learning. As a case-study, we describe the application of Σ▵ learning for the design of a miniature acoustic source localizer whose performance matches that of its biological counterpart(Ormia Ochracea).

  2. ROUNDTABLE - SESSION 2 EXPLOITATION, CONSERVATION AND LEGISLATION

    Directory of Open Access Journals (Sweden)

    EDSMAN L.

    2004-01-01

    Full Text Available The link between socioeconomics and conservation and the role of legislation in conservation work was discussed in the group with participants from nine European countries. Interest and knowledge among the general public, stakeholders and managers is the key to successful conservation of native crayfish species. Exploitation and conservation do not necessarily exclude each other. A controlled fishery, where it can be sustained, may be an essential tool for conservation by increasing the general awareness and involving more people in the task of protecting the native crayfish species. This strategy is mainly possible for the noble crayfish in the northern part of its distribution, where strong traditions connected to crayfish also exist. A balance between utilisation and overexploitation has to be found and local guidelines for sustainable exploitation produced. Media, the Internet and educational material aimed at schools and stakeholders are excellent ways of reaching a wide audience with information. Universal objectives, rules and regulations at the European level are desirable and the noble crayfish and the stone crayfish should be included in Annex II of the Habitat Directive. Based on this framework detailed regulations are best worked out at the national level, considering the specific crayfish situation in the country. Information about the legislation, the purpose of the legislation and the consequences when not obeying it should be distributed. Stricter regulation of the trade with live alien crayfish is vital because of the associated risk of introducing new diseases and species.

  3. Large size space construction for space exploitation

    Science.gov (United States)

    Kondyurin, Alexey

    2016-07-01

    Space exploitation is impossible without large space structures. We need to make sufficient large volume of pressurized protecting frames for crew, passengers, space processing equipment, & etc. We have to be unlimited in space. Now the size and mass of space constructions are limited by possibility of a launch vehicle. It limits our future in exploitation of space by humans and in development of space industry. Large-size space construction can be made with using of the curing technology of the fibers-filled composites and a reactionable matrix applied directly in free space. For curing the fabric impregnated with a liquid matrix (prepreg) is prepared in terrestrial conditions and shipped in a container to orbit. In due time the prepreg is unfolded by inflating. After polymerization reaction, the durable construction can be fitted out with air, apparatus and life support systems. Our experimental studies of the curing processes in the simulated free space environment showed that the curing of composite in free space is possible. The large-size space construction can be developed. A project of space station, Moon base, Mars base, mining station, interplanet space ship, telecommunication station, space observatory, space factory, antenna dish, radiation shield, solar sail is proposed and overviewed. The study was supported by Humboldt Foundation, ESA (contract 17083/03/NL/SFe), NASA program of the stratospheric balloons and RFBR grants (05-08-18277, 12-08-00970 and 14-08-96011).

  4. Widespread exploitation of the honeybee by early Neolithic farmers.

    Science.gov (United States)

    Roffet-Salque, Mélanie; Regert, Martine; Evershed, Richard P; Outram, Alan K; Cramp, Lucy J E; Decavallas, Orestes; Dunne, Julie; Gerbault, Pascale; Mileto, Simona; Mirabaud, Sigrid; Pääkkönen, Mirva; Smyth, Jessica; Šoberl, Lucija; Whelton, Helen L; Alday-Ruiz, Alfonso; Asplund, Henrik; Bartkowiak, Marta; Bayer-Niemeier, Eva; Belhouchet, Lotfi; Bernardini, Federico; Budja, Mihael; Cooney, Gabriel; Cubas, Miriam; Danaher, Ed M; Diniz, Mariana; Domboróczki, László; Fabbri, Cristina; González-Urquijo, Jesus E; Guilaine, Jean; Hachi, Slimane; Hartwell, Barrie N; Hofmann, Daniela; Hohle, Isabel; Ibáñez, Juan J; Karul, Necmi; Kherbouche, Farid; Kiely, Jacinta; Kotsakis, Kostas; Lueth, Friedrich; Mallory, James P; Manen, Claire; Marciniak, Arkadiusz; Maurice-Chabard, Brigitte; Mc Gonigle, Martin A; Mulazzani, Simone; Özdoğan, Mehmet; Perić, Olga S; Perić, Slaviša R; Petrasch, Jörg; Pétrequin, Anne-Marie; Pétrequin, Pierre; Poensgen, Ulrike; Pollard, C Joshua; Poplin, François; Radi, Giovanna; Stadler, Peter; Stäuble, Harald; Tasić, Nenad; Urem-Kotsou, Dushka; Vuković, Jasna B; Walsh, Fintan; Whittle, Alasdair; Wolfram, Sabine; Zapata-Peña, Lydia; Zoughlami, Jamel

    2015-11-12

    The pressures on honeybee (Apis mellifera) populations, resulting from threats by modern pesticides, parasites, predators and diseases, have raised awareness of the economic importance and critical role this insect plays in agricultural societies across the globe. However, the association of humans with A. mellifera predates post-industrial-revolution agriculture, as evidenced by the widespread presence of ancient Egyptian bee iconography dating to the Old Kingdom (approximately 2400 BC). There are also indications of Stone Age people harvesting bee products; for example, honey hunting is interpreted from rock art in a prehistoric Holocene context and a beeswax find in a pre-agriculturalist site. However, when and where the regular association of A. mellifera with agriculturalists emerged is unknown. One of the major products of A. mellifera is beeswax, which is composed of a complex suite of lipids including n-alkanes, n-alkanoic acids and fatty acyl wax esters. The composition is highly constant as it is determined genetically through the insect's biochemistry. Thus, the chemical 'fingerprint' of beeswax provides a reliable basis for detecting this commodity in organic residues preserved at archaeological sites, which we now use to trace the exploitation by humans of A. mellifera temporally and spatially. Here we present secure identifications of beeswax in lipid residues preserved in pottery vessels of Neolithic Old World farmers. The geographical range of bee product exploitation is traced in Neolithic Europe, the Near East and North Africa, providing the palaeoecological range of honeybees during prehistory. Temporally, we demonstrate that bee products were exploited continuously, and probably extensively in some regions, at least from the seventh millennium cal BC, likely fulfilling a variety of technological and cultural functions. The close association of A. mellifera with Neolithic farming communities dates to the early onset of agriculture and may provide

  5. Exploiting Elementary Landscapes for TSP, Vehicle Routing and Scheduling

    Science.gov (United States)

    2015-09-03

    similar mathematical foundation to enable gradient descent methods for discrete combinatorial optimization problems. We are also generalizing our prior...research has exploited statistical and mathematical properties of elementary landscapes to develop new gradient methods for combinatorial optimization... mathematically methods to more automatically identify elementary landscapes. If a combinatorial optimization problem is a superposition of elemen

  6. Influence on exploitation and processing of coal on vital environment in Kostolac coal basin (Yugoslavia)

    International Nuclear Information System (INIS)

    Miletic, Radisa; Milenkovic, Milutin; Milosevic, Vesna

    1997-01-01

    Fast development of industry, makes need of electrical energy bigger and bigger, intensiving exploitation and modification of coal, which constantly imperilment live environment. This paper has purpose to show of the possible reflection on warning and live environment by analysing the factors of exploitation and modification of coal in Kostolac basin in Yugoslavia. (Author)

  7. Sequential ambidexterity in practice : a longitudinal study on shifts from exploration to exploitation and vice versa

    NARCIS (Netherlands)

    de Visser, Matthias; Faems, Dries; Visscher, Klaasjan; de Weerd-Nederhof, Petronella C.

    2017-01-01

    Many scholars have stressed the need for balancing exploitation with sufficient levels of exploration (Levinthal and March, 1993; March, 1991, 2006). Organizations that have a one-sided focus on exploitation by allocating resources to refinement of existing technologies rather than to developing new

  8. The environmental impacts of foamed concrete production and exploitation

    Science.gov (United States)

    Namsone, E.; Korjakins, A.; Sahmenko, G.; Sinka, M.

    2017-10-01

    This paper presents a study focusing on the environmental impacts of foamed concrete production and exploitation. CO2 emissions are very important factor for describing durability and sustainability of any building material and its life cycle. The building sector is one of the largest energy-consuming sectors in the world. In this study CO2 emissions are evaluated with regard to three types of energy resources (gas, coal and eco-friendly fuel). The related savings on raw materials are up to 120 t of water per 1000 t of traditionally mixed foamed concrete and up to 350 t of sand per 1000 t of foamed concrete produced with intensive mixing technology. In addition, total reduction of CO2 emissions (up to 60 t per 1000 m3 of material) and total energy saving from introduction of foamed concrete production (depending on the type of fuel) were calculated. In order to analyze the conditions of exploitation, both thermal conductivity and thickness of wall was determined. All obtained and calculated results were compared to those of the commercially produced autoclaved aerated concrete.

  9. Current state of exploitation of low enthalpy geothermal energy in France

    International Nuclear Information System (INIS)

    Boisdet, A.; Fouillac, C.; Jaudin, F.; Menjoz, A.; Rojas, J.; Ferrandes, R.; Lemale, J.

    1990-01-01

    This paper reports that at present, the geothermal exploitation in France is characterized by sixty plants using geothermal energy for direct heat in district heating. Drilling and connection to networks occurred mainly during the years 1980-1985. From 1985 to 1990, the research efforts have been focused on detailed reservoir knowledge, corrosion-scaling process induced by the fluid composition, methods and techniques for maintenance, rehabilitation of some wells and equipments after work over. Concentrated in two main area, the Paris and Aquitaine basins, the French geothermal potential is large. The improved knowledge obtained during the last five years spared to the valorization of existing plants will allow a new start of geothermal exploitation. Nevertheless this latter is highly dependent on the international energy context

  10. Six scenarios of exploiting an ontology based, mobilized learning environment

    NARCIS (Netherlands)

    Kismihók, G.; Szabó, I.; Vas, R.

    2012-01-01

    In this article, six different exploitation possibilities of an educational ontology based, mobilized learning management system are presented. The focal point of this system is the educational ontology model. The first version of this educational ontology model serves as a foundation for curriculum

  11. 77 FR 36491 - Request for Information Regarding Senior Financial Exploitation

    Science.gov (United States)

    2012-06-19

    ... BUREAU OF CONSUMER FINANCIAL PROTECTION [Docket CFPB-2012-0018] Request for Information Regarding Senior Financial Exploitation AGENCY: Bureau of Consumer Financial Protection. ACTION: Request for Information. SUMMARY: Section 1013(g)(1) of the Dodd-Frank Wall Street Reform and Consumer Protection Act of...

  12. Toward a dynamic perspective on explorative and exploitative innovation activities: a longitudinal study of innovation in the wind blade industry

    NARCIS (Netherlands)

    de Visser, Matthias

    2010-01-01

    Innovation requires a combination of explorative and exploitative innovation activities. Previous studies have provided valuable insights in the antecedents of investing in explorative and exploitative activities, the structural governance of exploration and exploitation and the performance

  13. Toward a dynamic perspective on explorative and exploitative innovation activities: A longitudinal study of innovation in the wind blade industry

    NARCIS (Netherlands)

    de Visser, Matthias; Faems, D.L.M.

    2010-01-01

    Innovation requires a combination of explorative and exploitative innovation activities. Previous studies have provided valuable insights in the antecedents of investing in explorative and exploitative activities, the structural governance of exploration and exploitation and the performance

  14. Gas exploitation and gas conversion; Gassutnyttelse og gasskonvertering

    Energy Technology Data Exchange (ETDEWEB)

    Laading, Gjert

    1998-07-01

    This presentation deals with some of the challenges and possibilities connected with ''stranded'' gas. These are offshore gas reserves, especially associated gas, that is not connected with the market and that cannot be piped onshore, and where reinjection is not profitable, and where flaring off is not an option. There is increasing interest all over the world to find economical and environmentally friendly solutions to this problem. A good solution will render such fields economically developable and will to a high degree increase the total volume of the world's exploitable gas reserves. Since synthesis gas is a dominating cost element in most chemical conversion processes for gas, the synthesis gases are discussed in some detail. There is also a discussion of the conversion of the gas to Methanol, Synthetic oil (Syncrude and Synfuels) and to DME (Di-methyl-ether). Two methods for gas transport from the field are discussed; LNG on floating production storage and off loading (FPSO), and Gas hydrates. Principles, limitations and conditions for placing those processes on a FPSO. Finally, the presentation discusses the most important economic factors related to the exploitation of offshore gas, and suggests some possibilities for future development.11 figs.

  15. Summary of radiation protection in exploitation

    International Nuclear Information System (INIS)

    Garcier, Yves; Guers, Rene; Bidard, Francoise; Colson, Philippe; Gonin, Michele; Delabre, Herve; Hemidy, Pierre-Yves; Corgnet, Bruno; Perrin, Marie-Claire; Phan Hoang, Long; Abela, Gonzague; Crepieux, Virginie; Guyot, Pierre; Haranger, Didier; Warembourg, Philippe

    2004-01-01

    This document proposes a large and detailed overview of notions and practices regarding radiation protection in relationship with an NPP exploitation framework. It presents the main notions: matter structure, radioactivity, interactions between matter and radiations, types of ionizing radiation, magnitudes and measurement units, exposure modes, main principles of radiation protection, means of protection against internal and external exposures. The second part proposes an overview of the origin of radiological risks in a nuclear power plant. This origin can be found in fission products, activation products, actinides, designed protections, or circuit contaminations. These radiological risks are more precisely identified and described in terms of detection and prevention (internal exposure risk, contamination risk, iodine-related risk, alpha radiation-related risk, access to the reactor building). The next part addresses the medical and radiological follow-up of exposed workers by a special medical control, by an individual exposure control, by a specific control of female personnel, and by attention to exceptional exposures. Measurement means are presented (detection principles, installation continuous control, workspaces control, personnel contamination control, follow-up of individual dose) as well as collective and individual protection means. The management of radiation protection is addressed through a presentation of decision and management structures for radiation protection, and of EDF objectives and ambitions in this domain. The organization of radiation protection during exploitation is described: responsibilities for radiation protection in a nuclear power station, requirements for workers, preparation of interventions in controlled zone, work execution in controlled zone, zone controls and radiological cleanness of installations. The two last chapters address issues and practices of radiation protection in the case of deconstruction or dismantling, and

  16. Noninvasive Monitoring of Blood Glucose with Raman Spectroscopy.

    Science.gov (United States)

    Pandey, Rishikesh; Paidi, Santosh Kumar; Valdez, Tulio A; Zhang, Chi; Spegazzini, Nicolas; Dasari, Ramachandra Rao; Barman, Ishan

    2017-02-21

    The successful development of a noninvasive blood glucose sensor that can operate reliably over sustained periods of time has been a much sought after but elusive goal in diabetes management. Since diabetes has no well-established cure, control of elevated glucose levels is critical for avoiding severe secondary health complications in multiple organs including the retina, kidney and vasculature. While fingerstick testing continues to be the mainstay of blood glucose detection, advances in electrochemical sensing-based minimally invasive approaches have opened the door for alternate methods that would considerably improve the quality of life for people with diabetes. In the quest for better sensing approaches, optical technologies have surfaced as attractive candidates as researchers have sought to exploit the endogenous contrast of glucose, notably its absorption, scattering, and polarization properties. Vibrational spectroscopy, especially spontaneous Raman scattering, has exhibited substantial promise due to its exquisite molecular specificity and minimal interference of water in the spectral profiles acquired from the blood-tissue matrix. Yet, it has hitherto been challenging to leverage the Raman scattering signatures of glucose for prediction in all but the most basic studies and under the least demanding conditions. In this Account, we discuss the newly developed array of methodologies that address the key challenges in measuring blood glucose accurately using Raman spectroscopy and unlock new prospects for translation to sustained noninvasive measurements in people with diabetes. Owing to the weak intensity of spontaneous Raman scattering, recent research has focused on enhancement of signals from the blood constituents by designing novel excitation-collection geometries and tissue modulation methods while our attempts have led to the incorporation of nonimaging optical elements. Additionally, invoking mass transfer modeling into chemometric algorithms has

  17. Life history traits and exploitation affect the spatial mean-variance relationship in fish abundance.

    Science.gov (United States)

    Kuo, Ting-chun; Mandal, Sandip; Yamauchi, Atsushi; Hsieh, Chih-hao

    2016-05-01

    Fishing is expected to alter the spatial heterogeneity of fishes. As an effective index to quantify spatial heterogeneity, the exponent b in Taylor's power law (V = aMb) measures how spatial variance (V) varies with changes in mean abundance (M) of a population, with larger b indicating higher spatial aggregation potential (i.e., more heterogeneity). Theory predicts b is related with life history traits, but empirical evidence is lacking. Using 50-yr spatiotemporal data from the California Current Ecosystem, we examined fishing and life history effects on Taylor's exponent by comparing spatial distributions of exploited and unexploited fishes living in the same environment. We found that unexploited species with smaller size and generation time exhibit larger b, supporting theoretical prediction. In contrast, this relationship in exploited species is much weaker, as the exponents of large exploited species were higher than unexploited species with similar traits. Our results suggest that fishing may increase spatial aggregation potential of a species, likely through degrading their size/age structure. Results of moving-window cross-correlation analyses on b vs. age structure indices (mean age and age evenness) for some exploited species corroborate our findings. Furthermore, through linking our findings to other fundamental ecological patterns (occupancy-abundance and size-abundance relationships), we provide theoretical arguments for the usefulness of monitoring the exponent b for management purposes. We propose that age/size-truncated species might have lower recovery rate in spatial occupancy, and the spatial variance-mass relationship of a species might be non-linear. Our findings provide theoretical basis explaining why fishery management strategy should be concerned with changes to the age and spatial structure of exploited fishes.

  18. Impacts d’un changement de politiques énergétiques sur les exploitations irriguées : éclairage sur la base d’un échantillon d’exploitations dans le Saiss (Maroc

    Directory of Open Access Journals (Sweden)

    Imane Rais

    2016-10-01

    Full Text Available Au Maroc, le gaz butane est fortement subventionné pour son usage domestique, et est devenu depuis une dizaine d’années une des sources principales d’énergie utilisées pour le pompage de l’eau souterraine dans les exploitations agricoles. Du fait de son coût élevé pour les finances publiques, il est envisagé un arrêt de cette subvention, couplé à une éventuelle subvention à l’investissement en énergie solaire. La présente étude analyse l’impact de scénarios d’évolutions des politiques énergétiques nationales sur des exploitations irrigantes. Ces évolutions possibles de type d’énergie utilisé sont analysées à la fois en termes de rentabilité et selon le point de vue de l’exploitant lui-même. Un ensemble de 18 exploitations, utilisant 4 différents types d’énergie (gasoil, butane, électrique, photovoltaïque, ont été enquêtées dans la plaine du Saiss. Trois scénarios ont été établis : 1 un arrêt de la subvention au butane ; 2 un arrêt de la subvention couplé à une subvention à l’investissement dans l’énergie solaire ; et 3 un arrêt de la subvention butane couplé à une subvention à l’investissement dans l’énergie électrique. Les résultats montrent que, en cas d’arrêt de la subvention sur le butane, la moitié des exploitants utilisant le butane lors de l’étude envisagent de revenir au gasoil. En cas de subvention de 50% des coûts d’installation de l’énergie photovoltaïque, trois quarts des agriculteurs utilisant le butane ou le gasoil changeraient de système. Seule la moitié des exploitations en butane ou gasoil serait intéressée par un passage à l’électrique, même dans le cas d’une forte subvention à l’investissement. La transition vers le photovoltaïque, préférée par les agriculteurs utilisant le butane ou le gasoil, ne sera pas cependant qu’une question de taux de subvention, du fait notamment d’un fort besoin d’appui technique pour

  19. Cyber Child Sexual Exploitation dalam Perspektif Perlindungan atas Kejahatan Siber

    Directory of Open Access Journals (Sweden)

    Go Lisanawati

    2013-04-01

    Full Text Available Perkembangan teknologi, yang diwujudkan dengan adanya inovasi berupa Internet, yang semakin pesat menempatkan semua pihak berada pada sebuah posisi yang rentan. Kerentanan tersebut dapat berupa tereksploitasinya orang menjadi korban maupun pelaku kejahatan. Teknologi menjadi pedang bermata dua dengan segala kelebihan dan eksplorasi serta eksploitasi atas kelemahan atas pemanfaatan teknologi tersebut oleh orang-orang yang tidak bertanggungjawab. Pada posisi yang sama, anak menjadi korban yang sangat potensial atas penyalahgunaan teknologi, khususnya atas eksploitasi seksual yang dapat meliputi pornografi anak, perdagangan anak, dan child sex tourism. Indonesia memang telah memiliki berbagai perangkat aturan hukum yang dipergunakan untuk memberikan perlindungan kepada anak, termasuk juga di dalamnya adalah perangkat hukum di bidang telematika. Namun demikian belum semua perangkat hukum tersebut dapat dipergunakan secara maksimal untuk mewujudkan perlindungan hukum bagi anak. The rapid development of technology through Internet nowadays has been put all parties in the vulnerable position. The vulnerable form which may appear is the possibility of the exploited parties to be victims and/or the offender of crime. Technology itself brings not only advancement but also the weaknesses which may be explored and exploited by the irresponsible people by doing such a crime. In the same position, children are potentially to be the very vulnerable victims of the misuse of the technology, especially sexual exploitation which including child pornography, child trafficking, and also child sex tourism. Indonesia is already having such kind of law to give protection to children, including also the law related to telematics matter. But not each law could maximize yet implemented to give the law protection for child.

  20. Exploration and exploitation of Victorian science in Darwin's reading notebooks.

    Science.gov (United States)

    Murdock, Jaimie; Allen, Colin; DeDeo, Simon

    2017-02-01

    Search in an environment with an uncertain distribution of resources involves a trade-off between exploitation of past discoveries and further exploration. This extends to information foraging, where a knowledge-seeker shifts between reading in depth and studying new domains. To study this decision-making process, we examine the reading choices made by one of the most celebrated scientists of the modern era: Charles Darwin. From the full-text of books listed in his chronologically-organized reading journals, we generate topic models to quantify his local (text-to-text) and global (text-to-past) reading decisions using Kullback-Liebler Divergence, a cognitively-validated, information-theoretic measure of relative surprise. Rather than a pattern of surprise-minimization, corresponding to a pure exploitation strategy, Darwin's behavior shifts from early exploitation to later exploration, seeking unusually high levels of cognitive surprise relative to previous eras. These shifts, detected by an unsupervised Bayesian model, correlate with major intellectual epochs of his career as identified both by qualitative scholarship and Darwin's own self-commentary. Our methods allow us to compare his consumption of texts with their publication order. We find Darwin's consumption more exploratory than the culture's production, suggesting that underneath gradual societal changes are the explorations of individual synthesis and discovery. Our quantitative methods advance the study of cognitive search through a framework for testing interactions between individual and collective behavior and between short- and long-term consumption choices. This novel application of topic modeling to characterize individual reading complements widespread studies of collective scientific behavior. Copyright © 2016 Elsevier B.V. All rights reserved.

  1. The strv 1 microsatellite semes: Exploiting the geosynchronous transfer orbit

    Science.gov (United States)

    Blott, R. J.; Wells, N. S.; Eves, J.

    Following 3 successful years in orbit, the UK Defence Evaluation and Research Agency's two Space Technology Research Vehicle microsatellites (STRV) 1 a&b will be followed by a second mission. STRV 1 c&d are now in construction for a planned launch in 1999. The new mission, which includes 22 experimental payloads and developmental spacecraft bus technologies from European, US and Canadian military, civil and commercial sponsors, exploits the Geosynchronous Transfer Orbit (GTO) to offer an affordable, working space research tool for both government and industry. The STRV 1 programme objective is to promote the enhancement of military and civil space communications, remote sensing and navigation capabilities at reduced cost and risk. Additional aims are to help industry to achieve commercial benefit from investment in emerging technologies and to develop the synergy between government, commercial and civilian space applications. The paper explains how STRV 1 exploits the variable altitude and high radiation environment of GTO to investigate the performance of emerging technologies and techniques. This includes the accelerated life testing of components and materials, such as infra-red detectors, advanced microprocessors and solar cell technologies, and the prototyping of new techniques to improve communications and spacecraft autonomy. Experiments include implementing a secure version of the Consultative Committee for Space Data Systems (CCSDS) packet telecommand and telemetry standards, further development of the Internet-based Space Communication Protocol Standards (SCPS) and evaluating the exploitation of the Global Positioning System (GPS) in geosynchronous orbit. The new mission also builds on and extends the comprehensive environmental monitoring achieved by STRV 1 a&b.

  2. An ethnomethodological approach to examine exploitation in the context of capacity, trust and experience of commercial surrogacy in India

    Science.gov (United States)

    2013-01-01

    The socio-ethical concerns regarding exploitation in commercial surrogacy are premised on asymmetric vulnerability and the commercialization of women’s reproductive capacity to suit individualistic motives. In examining the exploitation argument, this article reviews the social contract theory that describes an individual as an ‘economic man’ with moral and/or political motivations to satisfy individual desires. This study considers the critique by feminists, who argue that patriarchal and medical control prevails in the surrogacy contracts. It also explores the exploitative dynamics amongst actors in the light of Baier’s conceptualization of trust and human relationship, within which both justice and exploitation thrive, and Foucault’s concept of bio-power. Drawing on these concepts, this paper aims to investigate the manifestations of exploitation in commercial surrogacy in the context of trust, power and experiences of actors, using a case study of one clinic in India. The actors’ experiences are evaluated at different stages of the surrogacy process: recruitment, medical procedures, living in the surrogate home, bonding with the child and amongst actors, financial dealings, relinquishment and post-relinquishment. This study applies ethnomethodology to identify phenomena as perceived by the actors in a situation, giving importance to their interpretations of the rules that make collective activity possible. The methods include semi-structured interviews, discussions, participant observation and explanation of the phenomena from the actors’ perspectives. Between August 2009 and April 2010, 13 surrogate mothers (SMs), 4 intended parents (IPs) and 2 medical practitioners (MPs) from one clinic in Western India were interviewed. This study reveals that asymmetries of capacity amongst the MPs, SMs, IPs and surrogate agents (SAs) lead to a network of trust and designation of powers through rules, bringing out the relevance of Baier’s conceptualization

  3. An ethnomethodological approach to examine exploitation in the context of capacity, trust and experience of commercial surrogacy in India.

    Science.gov (United States)

    Saravanan, Sheela

    2013-08-20

    The socio-ethical concerns regarding exploitation in commercial surrogacy are premised on asymmetric vulnerability and the commercialization of women's reproductive capacity to suit individualistic motives. In examining the exploitation argument, this article reviews the social contract theory that describes an individual as an 'economic man' with moral and/or political motivations to satisfy individual desires. This study considers the critique by feminists, who argue that patriarchal and medical control prevails in the surrogacy contracts. It also explores the exploitative dynamics amongst actors in the light of Baier's conceptualization of trust and human relationship, within which both justice and exploitation thrive, and Foucault's concept of bio-power. Drawing on these concepts, this paper aims to investigate the manifestations of exploitation in commercial surrogacy in the context of trust, power and experiences of actors, using a case study of one clinic in India. The actors' experiences are evaluated at different stages of the surrogacy process: recruitment, medical procedures, living in the surrogate home, bonding with the child and amongst actors, financial dealings, relinquishment and post-relinquishment.This study applies ethnomethodology to identify phenomena as perceived by the actors in a situation, giving importance to their interpretations of the rules that make collective activity possible. The methods include semi-structured interviews, discussions, participant observation and explanation of the phenomena from the actors' perspectives. Between August 2009 and April 2010, 13 surrogate mothers (SMs), 4 intended parents (IPs) and 2 medical practitioners (MPs) from one clinic in Western India were interviewed.This study reveals that asymmetries of capacity amongst the MPs, SMs, IPs and surrogate agents (SAs) lead to a network of trust and designation of powers through rules, bringing out the relevance of Baier's conceptualization of asymmetric

  4. The microeconomics of sexual exploitation of girls and young women in the Peruvian Amazon.

    Science.gov (United States)

    Mujica, Jaris

    2013-01-01

    This paper examines the sexual exploitation of girls and young women as an increasing phenomenon within the extractive industries of wood, oil, minerals and gas in Peruvian Amazonia. The analysis focuses on the city of Pucallpa and the northern part of the Ucayali River and aims to identify the social and economic dynamics underpinning the commercial sexual exploitation of female children and teenagers around the main river port. The study describes the local operating mechanisms of bars and restaurants in the port, the demand for and perceptions of the sexual exploitation of children and teenagers, and the economic logic that it entails. Using a discourse analytic approach, it is argued that this is a business whose profitability is tied to the trade in alcoholic beverages and foods and which responds to a set of family connections and networks.

  5. Exploiting Lexical Regularities in Designing Natural Language Systems.

    Science.gov (United States)

    1988-04-01

    ELEMENT. PROJECT. TASKN Artificial Inteligence Laboratory A1A4WR NTumet 0) 545 Technology Square Cambridge, MA 02139 Ln *t- CONTROLLING OFFICE NAME AND...RO-RI95 922 EXPLOITING LEXICAL REGULARITIES IN DESIGNING NATURAL 1/1 LANGUAGE SYSTENS(U) MASSACHUSETTS INST OF TECH CAMBRIDGE ARTIFICIAL INTELLIGENCE...oes.ary and ftdou.Ip hr Nl wow" L,2This paper presents the lexical component of the START Question Answering system developed at the MIT Artificial

  6. Television production, Funding Models and Exploitation of Content

    OpenAIRE

    Doyle, Gillian

    2016-01-01

    The rise of digital platforms has transformative implications for strategies of financing media production and for exploitation of the economic value in creative content. In the television industry, changes in technologies for distribution and the emergence of SVOD services such as Netflix are gradually shifting audiences and financial power away from broadcasters while at the same time creating unprecedented opportunities for programme-makers.  Drawing on findings from recent RCUK-funded res...

  7. A systematically improved high quality genome and transcriptome of the human blood fluke Schistosoma mansoni.

    Directory of Open Access Journals (Sweden)

    Anna V Protasio

    2012-01-01

    Full Text Available Schistosomiasis is one of the most prevalent parasitic diseases, affecting millions of people in developing countries. Amongst the human-infective species, Schistosoma mansoni is also the most commonly used in the laboratory and here we present the systematic improvement of its draft genome. We used Sanger capillary and deep-coverage Illumina sequencing from clonal worms to upgrade the highly fragmented draft 380 Mb genome to one with only 885 scaffolds and more than 81% of the bases organised into chromosomes. We have also used transcriptome sequencing (RNA-seq from four time points in the parasite's life cycle to refine gene predictions and profile their expression. More than 45% of predicted genes have been extensively modified and the total number has been reduced from 11,807 to 10,852. Using the new version of the genome, we identified trans-splicing events occurring in at least 11% of genes and identified clear cases where it is used to resolve polycistronic transcripts. We have produced a high-resolution map of temporal changes in expression for 9,535 genes, covering an unprecedented dynamic range for this organism. All of these data have been consolidated into a searchable format within the GeneDB (www.genedb.org and SchistoDB (www.schistodb.net databases. With further transcriptional profiling and genome sequencing increasingly accessible, the upgraded genome will form a fundamental dataset to underpin further advances in schistosome research.

  8. "Nobody Told Me It Was Rape": A Parent's Guide for Talking with Teenagers about Acquaintance Rape and Sexual Exploitation.

    Science.gov (United States)

    Adams, Caren; Fay, Jennifer

    This book was written to help parents talk to their adolescent children about acquaintance rape and sexual exploitation. It may also be useful to family life educators presenting units on rape and sexual exploitation. Acquaintance rape and sexual exploitation are explained in the first section. The second section discusses talking with teenagers…

  9. Exploitation de la non-circularité pour les transmissions et l'écoute passive

    OpenAIRE

    Sadok , Mustapha

    2017-01-01

    This thesis is devoted to exploit the non-circularity and non-gaussianity properties of signals of interest (SOI) and/or interference for wireless transmissions and passive listening. In the first part of this thesis, we are interested in the extension of conventional SIMO-MLSE receivers to new architectures exploiting the potential second order non-circularity of co-channel interference (CCI), for the demodulation of rectilinear signals (BPSK, ASK), quasi-rectilinear (MSK, GMSK and OQAM) and...

  10. Paradise lost: Sovereign State Interest, Global Resource Exploitation and the Politics of Human Rights

    OpenAIRE

    Augenstein, Daniel

    2016-01-01

    Taking its cue from the US Supreme Court judgment in Kiobel that restricted the extraterritorial reach of the Alien Tort Claims Act, this article explores how sovereignty structures the relationship between global resource exploitation and the localization of human rights in the international order of states. The argument situates international human rights law in an area of tension between national political self-determination and the global economic exploitation of natural resources. Global...

  11. Diel horizontal migration in streams: juvenile fish exploit spatial heterogeneity in thermal and trophic resources

    Science.gov (United States)

    Armstrong, Jonathan B.; Schindler, Daniel E.; Ruff, Casey P.; Brooks, Gabriel T.; Bentley, Kale E.; Torgersen, Christian E.

    2013-01-01

    Vertical heterogeneity in the physical characteristics of lakes and oceans is ecologically salient and exploited by a wide range of taxa through diel vertical migration to enhance their growth and survival. Whether analogous behaviors exploit horizontal habitat heterogeneity in streams is largely unknown. We investigated fish movement behavior at daily timescales to explore how individuals integrated across spatial variation in food abundance and water temperature. Juvenile coho salmon made feeding forays into cold habitats with abundant food, and then moved long distances (350–1300 m) to warmer habitats that accelerated their metabolism and increased their assimilative capacity. This behavioral thermoregulation enabled fish to mitigate trade-offs between trophic and thermal resources by exploiting thermal heterogeneity. Fish that exploited thermal heterogeneity grew at substantially faster rates than did individuals that assumed other behaviors. Our results provide empirical support for the importance of thermal diversity in lotic systems, and emphasize the importance of considering interactions between animal behavior and habitat heterogeneity when managing and restoring ecosystems.

  12. Relative Occurrence of Fasciola species in cattle, sheep and goats ...

    African Journals Online (AJOL)

    All liver flukes detected in cattle, sheep and goats were collected and transported to laboratory for analysis to determine the relative occurrence of Fasciola gigantica and Fasciola hepatic in slaughtered cattle, sheep, and goats by observing their size and morphology. The study showed that all the liver flukes collected in ...

  13. Mission Exploitation Platform PROBA-V

    Science.gov (United States)

    Goor, Erwin

    2016-04-01

    VITO and partners developed an end-to-end solution to drastically improve the exploitation of the PROBA-V EO-data archive (http://proba-v.vgt.vito.be/), the past mission SPOT-VEGETATION and derived vegetation parameters by researchers, service providers and end-users. The analysis of time series of data (+1PB) is addressed, as well as the large scale on-demand processing of near real-time data. From November 2015 an operational Mission Exploitation Platform (MEP) PROBA-V, as an ESA pathfinder project, will be gradually deployed at the VITO data center with direct access to the complete data archive. Several applications will be released to the users, e.g. - A time series viewer, showing the evolution of PROBA-V bands and derived vegetation parameters for any area of interest. - Full-resolution viewing services for the complete data archive. - On-demand processing chains e.g. for the calculation of N-daily composites. - A Virtual Machine will be provided with access to the data archive and tools to work with this data, e.g. various toolboxes and support for R and Python. After an initial release in January 2016, a research platform will gradually be deployed allowing users to design, debug and test applications on the platform. From the MEP PROBA-V, access to Sentinel-2 and landsat data will be addressed as well, e.g. to support the Cal/Val activities of the users. Users can make use of powerful Web based tools and can self-manage virtual machines to perform their work on the infrastructure at VITO with access to the complete data archive. To realise this, private cloud technology (openStack) is used and a distributed processing environment is built based on Hadoop. The Hadoop ecosystem offers a lot of technologies (Spark, Yarn, Accumulo, etc.) which we integrate with several open-source components. The impact of this MEP on the user community will be high and will completely change the way of working with the data and hence open the large time series to a larger

  14. Mathematics of Sensing, Exploitation, and Execution (MSEE) Hierarchical Representations for the Evaluation of Sensed Data

    Science.gov (United States)

    2016-06-01

    AFRL-RY-WP-TR-2016-0123 MATHEMATICS OF SENSING, EXPLOITATION, AND EXECUTION (MSEE) Hierarchical Representations for the Evaluation of Sensed...December 2015 4. TITLE AND SUBTITLE MATHEMATICS OF SENSING, EXPLOITATION, AND EXECUTION (MSEE) Hierarchical Representations for the Evaluation of...8-98) Prescribed by ANSI Std. Z39-18 Hierarchical Representations for the Evaluation of Sensed Data Final Report Mathematics of Sensing

  15. Prototype Design and Mission Analysis for a Small Satellite Exploiting Environmental Disturbances for Attitude Stabilization

    Science.gov (United States)

    2016-03-01

    AND MISSION ANALYSIS FOR A SMALL SATELLITE EXPLOITING ENVIRONMENTAL DISTURBANCES FOR ATTITUDE STABILIZATION by Halis C. Polat March 2016...FOR A SMALL SATELLITE EXPLOITING ENVIRONMENTAL DISTURBANCES FOR ATTITUDE STABILIZATION 5. FUNDING NUMBERS 6. AUTHOR(S) Halis C. Polat 7...need a robust and accurate attitude control system. Due to the mass- and volume-constrained design environment of CubeSat, conventional methods are

  16. April 1977 The Cape gurnard is a commercially exploited species of ...

    African Journals Online (AJOL)

    The Cape gurnard is a commercially exploited species of which the annual landings between ... fishing operations took place along the eastern Cape coast of South Africa ..... Handbook of computation for biological statistics offish populations.

  17. Propulsion of a fin whale (Balaenoptera physalus): why the fin whale is a fast swimmer.

    Science.gov (United States)

    Bose, N; Lien, J

    1989-07-22

    Measurements of an immature fin whale (Balaenoptera physalus), which died as a result of entrapment in fishing gear near Frenchmans Cove, Newfoundland (47 degrees 9' N, 55 degrees 25' W), were made to obtain estimates of volume and surface area of the animal. Detailed measurements of the flukes, both planform and sections, were also obtained. A strip theory was developed to calculate the hydrodynamic performance of the whale's flukes as an oscillating propeller. This method is based on linear, two-dimensional, small-amplitude, unsteady hydrofoil theory with correction factors used to account for the effects of finite span and finite amplitude motion. These correction factors were developed from theoretical results of large-amplitude heaving motion and unsteady lifting-surface theory. A model that makes an estimate of the effects of viscous flow on propeller performance was superimposed on the potential-flow results. This model estimates the drag of the hydrofoil sections by assuming that the drag is similar to that of a hydrofoil section in steady flow. The performance characteristics of the flukes of the fin whale were estimated by using this method. The effects of the different correction factors, and of the frictional drag of the fluke sections, are emphasized. Frictional effects in particular were found to reduce the hydrodynamic efficiency of the flukes significantly. The results are discussed and compared with the known characteristics of fin-whale swimming.

  18. Explorative and exploitative learning strategies in technology-based alliance networks

    NARCIS (Netherlands)

    Vanhaverbeke, W.P.M.; Beerkens, B.E.; Duysters, G.M.

    2003-01-01

    This paper aims to improve our understanding of how exploitative and explorative learning of firms is enhanced through their social capital. Both types of learning differ considerably from each other and we argue that the distinction between them may be an important contingency factor in explaining

  19. Shale Gas Exploration and Exploitation Induced Risks - SHEER

    Science.gov (United States)

    Capuano, Paolo; Orlecka-Sikora, Beata; Lasocki, Stanislaw; Cesca, Simone; Gunning, Andrew; jaroslawsky, Janusz; Garcia-Aristizabal, Alexander; Westwood, Rachel; Gasparini, Paolo

    2017-04-01

    Shale gas operations may affect the quality of air, water and landscapes; furthermore, it can induce seismic activity, with the possible impacts on the surrounding infrastructure. The SHEER project aims at setting up a probabilistic methodology to assess and mitigate the short and the long term environmental risks connected to the exploration and exploitation of shale gas. In particular we are investigating risks associated with groundwater contamination, air pollution and induced seismicity. A shale gas test site located in Poland (Wysin) has been monitored before, during and after the fracking operations with the aim of assessing environmental risks connected with groundwater contamination, air pollution and earthquakes induced by fracking and injection of waste water. The severity of each of these hazards depends strongly on the unexpected enhanced permeability pattern, which may develop as an unwanted by-product of the fracking processes and may become pathway for gas and fluid migration towards underground water reservoirs or the surface. The project is devoted to monitor and understand how far this enhanced permeability pattern develops both in space and time. The considered hazards may be at least partially inter-related as they all depend on this enhanced permeability pattern. Therefore they are being approached from a multi-hazard, multi parameter perspective. We expect to develop methodologies and procedures to track and model fracture evolution around shale gas exploitation sites and a robust statistically based, multi-parameter methodology to assess environmental impacts and risks across the operational lifecycle of shale gas. The developed methodologies are going to be applied and tested on a comprehensive database consisting of seismicity, changes of the quality of ground-waters and air, ground deformations, and operational data collected from the ongoing monitoring episode (Wysin) and past episodes: Lubocino (Poland), Preese Hall (UK), Oklahoma (USA

  20. Design and Exploitation Problems of Drill String in Directional Drilling

    Directory of Open Access Journals (Sweden)

    Bednarz Stanislaw

    2004-09-01

    Full Text Available Drill string design for directional drilling requires accounting for a number of factors. First, types and expected values of loads should be determined. Then, elements of the drill string should be so selected as to enable realization of the plan at specified loads. Some of additional factors, e. g. purchase, exploitation cost, geological conditions in the bore-hole, washing of the bore-hole, stability, trajectory, rig parameters, accuracy of gauges, pumps parameters remain in conflict. Drill pipes are made of rolled pipes, upset and welded with tool joints to 9,5 m long; the shorter ones can be made of hot forged rods. Exploitation requirements, being a result of practical experience supported by theoretical and laboratory analyses should be a part of syllabuses of technical staff educational programs. Apart from designing the string, it is also vital to lower the risk of a drilling failure. The significance of these aspects seems to be unquestionable.

  1. Concerted actions to support investments exploiting low-enthalpy geothermal energy

    International Nuclear Information System (INIS)

    Catsis, P.; Papadopoulou, A.; Petrogona-Emmanouil, E.

    1996-01-01

    A brief outline is presented of the project 'Information and support to investors for establishment of plants exploiting geothermal energy' co-financed by the Directorate General for Energy of the European Commission in the context of ALTENER programme for promotion of renewable energy sources. The basic supporting products of this project are: 1) Information Guide on the Geothermal Energy Exploitation Possibilities in Greece: 2) Investment Guide for the Use of Geothermal Energy in Productive Activities in Greece: 3) A convenient and user-friendly software GAIN (Microsoft Access 2.0)) for designing and economic evaluation of investments for an 'ideal' geothermal plant . The following steps are executed by GAIN: representation of the entire plant; determination of the size and energy requirements of each respective uses; determination of the type of application installations (heating system); determination of equipment needed for the geothermal plant: series of calculations for economic evaluation. In addition, some organizational measures as training of personnel, demonstration activities, conferences etc. are also foreseen in the programme

  2. Do singing rock hyraxes exploit conspecific calls to gain attention?

    Directory of Open Access Journals (Sweden)

    Amiyaal Ilany

    Full Text Available Signal detection theory predicts that signals directed at distant or busy receivers in noisy backgrounds will begin with an alert component, in order to draw attention. Instead of an alert component, however, animals could get the same effect by using an external stimulus. Here we combined observations of free-living rock hyraxes (Procavia capensis with playback experiments to elucidate the circumstances under which males begin singing. We show that males sing following hyrax pup screams, which elicit a strong response from hyraxes within hearing distance, which are potential receivers. We hypothesize that singers enhance their singing display by exploiting the rarely emitted pup screams. To our knowledge, our findings are the first indication that animals may enhance signal reception by exploiting conspecifics' signals and the differential attention to these signals. We suggest that the utilization of external stimuli by signalers may be widespread, as an adaptive strategy for communication in complex environments.

  3. Exploitation of the Virtual Worlds in Tourism and Tourism Education

    Directory of Open Access Journals (Sweden)

    Zejda Pavel

    2016-12-01

    Full Text Available Academics perceive a great potential of virtual worlds in various areas, including tourism and education. Efforts adapting the virtual worlds in practice are, however, still marginal. There is no clear definition of the virtual world. Therefore the author of this article attempts to provide one. The paper also focuses on the barriers of a wider exploitation of the virtual worlds and discusses the principles that might help to increase their potential in tourism area. One of the principles – gamification – favours a wider adaptation of the virtual worlds in tourism. Applying gamification principles provides visitors with some unique experiences while serving as a powerful marketing tool for institutions. The benefits of implementing tourism education activities based on cooperative principles set in an immersive environment of the virtual worlds are depicted afterwards. Finally, this paper includes successful case studies, which show advantages and drawbacks of some approaches in exploiting the virtual worlds in tourism and tourism education.

  4. Blood Types

    Science.gov (United States)

    ... blood, safe blood transfusions depend on careful blood typing and cross-matching. There are four major blood ... cause exceptions to the above patterns. ABO blood typing is not sufficient to prove or disprove paternity ...

  5. Estimating fish exploitation and aquatic habitat loss across diffuse inland recreational fisheries.

    Science.gov (United States)

    de Kerckhove, Derrick Tupper; Minns, Charles Kenneth; Chu, Cindy

    2015-01-01

    The current state of many freshwater fish stocks worldwide is largely unknown but suspected to be vulnerable to exploitation from recreational fisheries and habitat degradation. Both these factors, combined with complex ecological dynamics and the diffuse nature of inland fisheries could lead to an invisible collapse: the drastic decline in fish stocks without great public or management awareness. In this study we provide a method to address the pervasive knowledge gaps in regional rates of exploitation and habitat degradation, and demonstrate its use in one of North America's largest and most diffuse recreational freshwater fisheries (Ontario, Canada). We estimated that (1) fish stocks were highly exploited and in apparent danger of collapse in management zones close to large population centres, and (2) fish habitat was under a low but constant threat of degradation at rates comparable to deforestation in Ontario and throughout Canada. These findings confirm some commonly held, but difficult to quantify, beliefs in inland fisheries management but also provide some further insights including (1) large anthropogenic projects greater than one hectare could contribute much more to fish habitat loss on an area basis than the cumulative effect of smaller projects within one year, (2) hooking mortality from catch-and-release fisheries is likely a greater source of mortality than the harvest itself, and (3) in most northern management zones over 50% of the fisheries resources are not yet accessible to anglers. While this model primarily provides a framework to prioritize management decisions and further targeted stock assessments, we note that our regional estimates of fisheries productivity and exploitation were similar to broadscale monitoring efforts by the Province of Ontario. We discuss the policy implications from our results and extending the model to other jurisdictions and countries.

  6. Blood pressure

    Science.gov (United States)

    Normal blood pressure is important for proper blood flow to the body's organs and tissues. The force of the blood on the walls of the arteries is called blood pressure. Blood pressure is measured both as the heart ...

  7. Pilot plant for exploitation of geothermal waters

    Directory of Open Access Journals (Sweden)

    Stojiljković Dragan T.

    2006-01-01

    Full Text Available In Sijarinska spa, there are some 15 mineral and thermomineral springs, that are already being used for therapeutic purposes. For the exploitation of heat energy boring B-4 is very interesting. It is a boring of a closed type, with the water temperature of about 78°C and a flow rate of about 33 l/s. Waters with the flow rate of about 6 l/s are currently used for heating of the Gejzer hotel, and waters of the flow rate of about 0,121 l/s for the pilot drying plant. The paper presents this pilot plant. .

  8. Geothermal resources: exploration and exploitation. A bibliography

    Energy Technology Data Exchange (ETDEWEB)

    1976-07-01

    This comprehensive bibliography contains 5476 citations of foreign and domestic research reports, journal articles, patents, conference proceedings, and books concerned with the exploration and exploitation of geothermal resources. The coverage dates back as far as useful references could be obtained and extends through June 1976. References are arranged in broad subject categories and are made up of complete bibliographic citations. These are followed by a listing of subject descriptors used to describe the subject content of each reference. Four indexes are included: Corporate, Personal Author, Subject, and Report Number. Also included is a list of journals from which articles were selected. (LBS)

  9. Inequality, Sexual Exploitation and the Risk of Contacting HIV/AIDS ...

    African Journals Online (AJOL)

    Lwati: A Journal of Contemporary Research ... consequent sexual exploitation has continued for centuries due to many factors, which include patriarchal idea that obscures the history of women. This is an idea that affects women's potentials by limiting them mainly to reproductive and nurturing roles. There are various ...

  10. Fight for your alienation: The fantasy of employability and the ironic struggle for self-exploitation

    OpenAIRE

    Bloom, Peter

    2013-01-01

    This paper draws on Lacanian psychoanalysis, to introduce employability as a cultural fantasy that organizes identity around the desire to shape, exploit and ultimately profit from an employable self. Specifically, the paper shows how individuals seek to overcome their subjective and material alienation by maximizing their self-exploitation through constantly enhancing their employability. This linking of empowerment to selfexploitation has expanded into a broader organizational and political...

  11. Total exploitation of an ornamental granite quarry

    Directory of Open Access Journals (Sweden)

    Taboada, J.

    2005-09-01

    Full Text Available In this paper we propose a methodology to estimate the recovery percentage for each of the products which can be obtained from the exploitation of an ornamental granite quarry: block, semiblock, masonry-transverse stone, and the smaller materials that can be used to obtain construction aggregates. This methodology ensures that quarry exploitation is exhaustive, thereby minimising the production of spoils and the consequent negative impact on the environment. The analysis is based on a detailed and exhaustive compilation of discontinuity data from the research fronts, which are then interpreted statistically and projected over the three weakness planes that are a particular feature of ornamental granite deposits. Using this information, and bearing in mind the minimum commercially viable sizes for each kind of granite, the corresponding recovery rates are calculated for each material in each plane. The results are then integrated using spatial techniques, and the result is an evaluation of quarry contents with a view to total exploitation. This methodology was applied to a quarry in the opening phase in order to carry out an a priori assessment of the economic feasibility of the quarry.

    En este trabajo se propone una metodología para estimar el porcentaje de recuperación de cada uno de los productos que se pueden obtener en la explotación de una cantera de granito ornamental: bloque, semibloque, manpostería y per piaños, y material restante destinado a la obtención de áridos. De esta manera se logra un aprovechamiento integral de la cantera, evitándose la generación de estériles y el subsiguiente impacto ambiental producido por éstos. La metodología de análisis se basa en la recopilación detallada y exhaustiva de datos de discontinuidades en los frentes de investigación, que se interpretan estadísticamente y se proyectan sobre los tres planos de debilidad propios del granito ornamental. Con esta información, y las

  12. Comparing recent and abandoned shell middens to detect the impact of human exploitation on the intertidal ecosystem

    NARCIS (Netherlands)

    Boer, de W.F.; Pereira, T.; Guissamulo, A.

    2000-01-01

    Abandoned and recent shell middens were compared from Inhaca island, Mozambique, to investigate the impact of human exploitation. The growing human population was expected to increase the exploitation pressure, decrease the mean shell size, and increase the species diversity. Moreover,

  13. Exploiting dynamic reaction cell inductively coupled plasma mass spectrometry (DRC-ICP-MS) for sequential determination of trace elements in blood using a dilute-and-shoot procedure

    International Nuclear Information System (INIS)

    Lemos Batista, Bruno; Lisboa Rodrigues, Jairo; Andrade Nunes, Juliana; Oliveira Souza, Vanessa Cristina de; Barbosa, Fernando

    2009-01-01

    Inductively coupled plasma mass spectrometry with quadrupole (q-ICP-MS) and dynamic reaction cell (DRC-ICP-MS) were evaluated for sequential determination of As, Cd, Co, Cr, Cu, Mn, Pb, Se, Tl, V and Zn in blood. The method requires as little as 100 μL of blood. Prior to analysis, samples (100 μL) were diluted 1:50 in a solution containing 0.01% (v/v) Triton X-100 and 0.5% (v/v) nitric acid. The use of the DRC was only mandatory for Cr, Cu, V and Zn. For the other elements the equipment may be operated in a standard mode (q-ICP-MS). Ammonia was used as reaction gas. Selection of best flow rate of ammonium gas and optimization of the quadrupole dynamic band-pass tuning parameter (RPq) were carried out, using a ovine base blood for Cr and V and a synthetic matrix solution (SMS) for Zn and Cu diluted 1:50 and spiked to contain 1 μg L -1 of each element. Method detection limits (3 s) for 75 As, 114 Cd, 59 Co, 51 Cr, 63 Cu 55 Mn, 208 Pb, 82 Se, 205 Tl, 51 V, and 64 Zn were 14.0, 3.0, 11.0, 7.0, 280, 9.0, 3.0, 264, 0.7, 6.0 and 800 ng L -1 , respectively. Method validation was accomplished by the analysis of blood Reference Materials produced by the L'Institut National de Sante Publique du Quebec (Canada).

  14. Film-induced, steps for a Real Exploitation in Europe

    Directory of Open Access Journals (Sweden)

    Francesco di Cesare

    2015-03-01

    Full Text Available One of the possible ways to enhance Europe visibility, its entirety rather than a set of destinations, is implementing cooperation between the Member States especially in creating and developing trans-border thematic tourist products and experiences. One of them could be the film-induced tourism. In looking back over the past two cycles of European programming it is possible to find some examples, described in the article, in which the theme of audiovisual productions in their shooting phase in European locations has been the subject of EU attention.This article refers to some previous research results reminding how movie-induced tourism seems to be used just through sporadic attempts and therefore not developed and exploited in a strategic way. Whether from demand-side is clear what potential is inherent in the relationship between movie and tourism, on the supply side there is still much to do.As the current EC funding period (2014-2020 is favouring, at least in the first calls for proposal that came out, SMEs projects and being aware of the apparent lack of such activities developed by private businesses, the article explores new opportunities to be gathered suggesting a new exploitation path.

  15. Human trafficking for labour exploitation:
    Interpreting the crime

    Directory of Open Access Journals (Sweden)

    Jill E.B. Coster van Voorhout

    2007-12-01

    Full Text Available The definition of human trafficking for labour exploitation, as follows from the European Council Framework Decision, proves to be unclear. Literal interpretation does not suffice, because it does not clarify all elements of what is deemed to be criminal behaviour, and hermeneutical interpretation also falls short discouraging the aim of this legislation, namely harmonisation. Hence, another solution is required. This article does so by firstly challenging assumptions about human trafficking for labour exploitation that are generally pertinent, but nonetheless untrue. This accurate appraisal of the crime’s nature is followed by a synopsis of national legislation and adjudication in three Member States, so as to also focus on these actualities regarding the crime that are commonly not conceived. This article examines two countries that have implemented the Framework Decision, namely Belgium and the Netherlands, and one that has not yet done so, the United Kingdom. Thereafter remaining unexplained elements of the Framework Decision’s definition are interpreted with use of international, pan-European and European legislation and adjudication. Based upon all this, a suggested interpretation of the Framework Decision’s definition is provided so as to overcome all identified difficulties with it.

  16. Exploiting the Dynamics of Soft Materials for Machine Learning.

    Science.gov (United States)

    Nakajima, Kohei; Hauser, Helmut; Li, Tao; Pfeifer, Rolf

    2018-06-01

    Soft materials are increasingly utilized for various purposes in many engineering applications. These materials have been shown to perform a number of functions that were previously difficult to implement using rigid materials. Here, we argue that the diverse dynamics generated by actuating soft materials can be effectively used for machine learning purposes. This is demonstrated using a soft silicone arm through a technique of multiplexing, which enables the rich transient dynamics of the soft materials to be fully exploited as a computational resource. The computational performance of the soft silicone arm is examined through two standard benchmark tasks. Results show that the soft arm compares well to or even outperforms conventional machine learning techniques under multiple conditions. We then demonstrate that this system can be used for the sensory time series prediction problem for the soft arm itself, which suggests its immediate applicability to a real-world machine learning problem. Our approach, on the one hand, represents a radical departure from traditional computational methods, whereas on the other hand, it fits nicely into a more general perspective of computation by way of exploiting the properties of physical materials in the real world.

  17. Exploitation of the in-seam miner and operational experience

    Energy Technology Data Exchange (ETDEWEB)

    Wilson, W I.S.; Morris, A H

    1977-12-01

    The In-seam Miner started as an investigatory project at MRDE in 1969. Since that time it has passed through the classic development stages of design of prototype, surface trials, underground trials, modification, production of more machines, assessment of experience and then wider exploitation. At the present time well over 100 machines have been supplied to the National Coal Board. The original machine was hydraulically driven and all but five of the machines supplied to date are of this type. The variety of applications that the machine has found in the mining industry has caused derivative development to embrace machines of length varying from 12-ft centers to 44-ft centers, to work in seams ranging from 40 in. up to 68 in. The range of applications has included face drivages, stablehole operations, in-seam retreat roadways and dirt-absorbing headings. Five electrically driven machines are now coming onto the market and experience with them, though limited, is very encouraging. The paper concentrates on two major aspects of the overall development process: first, the management of exploitation; and second, some operational experience of the In-seam Miner in South Midlands area.

  18. Self-report measure of financial exploitation of older adults.

    Science.gov (United States)

    Conrad, Kendon J; Iris, Madelyn; Ridings, John W; Langley, Kate; Wilber, Kathleen H

    2010-12-01

    this study was designed to improve the measurement of financial exploitation (FE) by testing psychometric properties of the older adult financial exploitation measure (OAFEM), a client self-report instrument. rasch item response theory and traditional validation approaches were used. Questionnaires were administered by 22 adult protective services investigators from 7 agencies in Illinois to 227 substantiated abuse clients. Analyses included tests for dimensionality, model fit, and additional construct validation. Results from the OAFEM were also compared with the substantiation decision of abuse and with investigators' assessments of FE using a staff report version. Hypotheses were generated to test hypothesized relationships. the OAFEM, including the original 79-, 54-, and 30-item measures, met stringent Rasch analysis fit and unidimensionality criteria and had high internal consistency and item reliability. The validation results were supportive, while leading to reconsideration of aspects of the hypothesized theoretical hierarchy. Thresholds were suggested to demonstrate levels of severity. the measure is now available to aid in the assessment of FE of older adults by both clinicians and researchers. Theoretical refinements developed using the empirically generated item hierarchy may help to improve assessment and intervention.

  19. Exploiting GPUs in Virtual Machine for BioCloud

    Science.gov (United States)

    Jo, Heeseung; Jeong, Jinkyu; Lee, Myoungho; Choi, Dong Hoon

    2013-01-01

    Recently, biological applications start to be reimplemented into the applications which exploit many cores of GPUs for better computation performance. Therefore, by providing virtualized GPUs to VMs in cloud computing environment, many biological applications will willingly move into cloud environment to enhance their computation performance and utilize infinite cloud computing resource while reducing expenses for computations. In this paper, we propose a BioCloud system architecture that enables VMs to use GPUs in cloud environment. Because much of the previous research has focused on the sharing mechanism of GPUs among VMs, they cannot achieve enough performance for biological applications of which computation throughput is more crucial rather than sharing. The proposed system exploits the pass-through mode of PCI express (PCI-E) channel. By making each VM be able to access underlying GPUs directly, applications can show almost the same performance as when those are in native environment. In addition, our scheme multiplexes GPUs by using hot plug-in/out device features of PCI-E channel. By adding or removing GPUs in each VM in on-demand manner, VMs in the same physical host can time-share their GPUs. We implemented the proposed system using the Xen VMM and NVIDIA GPUs and showed that our prototype is highly effective for biological GPU applications in cloud environment. PMID:23710465

  20. Exploiting GPUs in Virtual Machine for BioCloud

    Directory of Open Access Journals (Sweden)

    Heeseung Jo

    2013-01-01

    Full Text Available Recently, biological applications start to be reimplemented into the applications which exploit many cores of GPUs for better computation performance. Therefore, by providing virtualized GPUs to VMs in cloud computing environment, many biological applications will willingly move into cloud environment to enhance their computation performance and utilize infinite cloud computing resource while reducing expenses for computations. In this paper, we propose a BioCloud system architecture that enables VMs to use GPUs in cloud environment. Because much of the previous research has focused on the sharing mechanism of GPUs among VMs, they cannot achieve enough performance for biological applications of which computation throughput is more crucial rather than sharing. The proposed system exploits the pass-through mode of PCI express (PCI-E channel. By making each VM be able to access underlying GPUs directly, applications can show almost the same performance as when those are in native environment. In addition, our scheme multiplexes GPUs by using hot plug-in/out device features of PCI-E channel. By adding or removing GPUs in each VM in on-demand manner, VMs in the same physical host can time-share their GPUs. We implemented the proposed system using the Xen VMM and NVIDIA GPUs and showed that our prototype is highly effective for biological GPU applications in cloud environment.

  1. Exploiting GPUs in virtual machine for BioCloud.

    Science.gov (United States)

    Jo, Heeseung; Jeong, Jinkyu; Lee, Myoungho; Choi, Dong Hoon

    2013-01-01

    Recently, biological applications start to be reimplemented into the applications which exploit many cores of GPUs for better computation performance. Therefore, by providing virtualized GPUs to VMs in cloud computing environment, many biological applications will willingly move into cloud environment to enhance their computation performance and utilize infinite cloud computing resource while reducing expenses for computations. In this paper, we propose a BioCloud system architecture that enables VMs to use GPUs in cloud environment. Because much of the previous research has focused on the sharing mechanism of GPUs among VMs, they cannot achieve enough performance for biological applications of which computation throughput is more crucial rather than sharing. The proposed system exploits the pass-through mode of PCI express (PCI-E) channel. By making each VM be able to access underlying GPUs directly, applications can show almost the same performance as when those are in native environment. In addition, our scheme multiplexes GPUs by using hot plug-in/out device features of PCI-E channel. By adding or removing GPUs in each VM in on-demand manner, VMs in the same physical host can time-share their GPUs. We implemented the proposed system using the Xen VMM and NVIDIA GPUs and showed that our prototype is highly effective for biological GPU applications in cloud environment.

  2. Blood wastage management in a regional blood transfusion centre.

    Science.gov (United States)

    Javadzadeh Shahshahani, H; Taghvai, N

    2017-10-01

    The aim of this study was to determine the rate of blood component wastage before and after interventions at Yazd Blood Transfusion Center. The growing need for blood components along with blood safety issues and rising costs constantly pressurise blood centres to improve their efficiency. Reducing the quantity of discarded blood at all stages of the supply chain can decrease the total costs. Data on discarded blood components were extracted from the database of Yazd Blood Transfusion Center. Multiple interventions, including implementation of wastage management standard operating procedures and reduction of red blood cells (RBCs) inventory level, were implemented. Discard rates of blood components in the 3 years after intervention (2013-2015) were compared with the discard rates in the 3 years before interventions. The total wastage rate of blood components decreased by almost 60%. Discard rates of RBCs, platelets and plasma decreased from 9·7%, 18·5% and 5·4% to 2·9%, 10·5% and 2·3%, (P supply saving. © 2017 British Blood Transfusion Society.

  3. For your first born child: an ethical defense of the exploitation argument against commercial surrogacy.

    Science.gov (United States)

    Osberg, Brendan

    2006-01-01

    In this essay I explore two arguments against commercial surrogacy, based on commodification and exploitation respectively. I adopt a consequentialist framework and argue that commodification arguments must be grounded in a resultant harm to either child or surrogate, and that a priori arguments which condemn the practice for puritanical reasons cannot form a basis for public law. Furthermore there is no overwhelming evidence of harm caused to either party involved in commercial surrogacy, and hence Canadian law (which forbids the practice) must (and can) be justified on exploitative grounds. Objections raised by Wilkinson based on an 'isolated case' approach are addressed when one takes into account the political implications of public policy. I argue that is precisely these implications that justify laws forbidding commercial surrogacy on the grounds of preventing systematic exploitation.

  4. Donating Blood

    Science.gov (United States)

    ... The medical history includes questions that help blood bank staff decide if a person is healthy enough to donate blood. They'll ... Food and Drug Administration (FDA) regulates U.S. blood banks. All blood ... operating. Sometimes people who donate blood notice a few minor side ...

  5. The Role of Ambidexterity in Marketing Strategy Implementation: Resolving the Exploration-Exploitation Dilemma

    Directory of Open Access Journals (Sweden)

    Christiane Prange

    2009-12-01

    Full Text Available Formulating consistent marketing strategies is a difficult task, but successfully implementing them is even more challenging. This is even more pertinent as marketing strategies quite often incorporate inherent conflicts between major breakthroughs and consolidation. Consequently, marketers need to balance exploratory and exploitative strategies. However, the literature lacks concrete insights for marketing managers as to how exploratory and exploitative strategies can be best combined. This paper addresses this issue by introducing a framework of multiple types of ambidexterity. Based on qualitative research, tools and procedures are identified to overcome marketing dilemmas and support strategy implementation by drawing on ambidextrous designs.

  6. The ESA Scientific Exploitation of Operational Missions element, first results

    Science.gov (United States)

    Desnos, Yves-Louis; Regner, Peter; Delwart, Steven; Benveniste, Jerome; Engdahl, Marcus; Mathieu, Pierre-Philippe; Gascon, Ferran; Donlon, Craig; Davidson, Malcolm; Pinnock, Simon; Foumelis, Michael; Ramoino, Fabrizio

    2016-04-01

    SEOM is a program element within the fourth period (2013-2017) of ESA's Earth Observation Envelope Programme (http://seom.esa.int/). The prime objective is to federate, support and expand the international research community that the ERS, ENVISAT and the Envelope programmes have built up over the last 25 years. It aims to further strengthen the leadership of the European Earth Observation research community by enabling them to extensively exploit future European operational EO missions. SEOM will enable the science community to address new scientific research that are opened by free and open access to data from operational EO missions. Based on community-wide recommendations for actions on key research issues, gathered through a series of international thematic workshops and scientific user consultation meetings, a work plan is established and is approved every year by ESA Members States. During 2015 SEOM, Science users consultation workshops have been organized for Sentinel1/3/5P ( Fringe, S3 Symposium and Atmospheric science respectively) , new R&D studies for scientific exploitation of the Sentinels have been launched ( S3 for Science SAR Altimetry and Ocean Color , S2 for Science,) , open-source multi-mission scientific toolboxes have been launched (in particular the SNAP/S1-2-3 Toolbox). In addition two advanced international training courses have been organized in Europe to exploit the new S1-A and S2-A data for Land and Ocean remote sensing (over 120 participants from 25 countries) as well as activities for promoting the first scientific results ( e.g. Chili Earthquake) . In addition the First EO Open Science 2.0 was organised at ESA in October 2015 with 225 participants from 31 countries bringing together young EO scientists and data scientists. During the conference precursor activities in EO Open Science and Innovation were presented, while developing a Roadmap preparing for future ESA scientific exploitation activities. Within the conference, the first

  7. Time-dependent tegumental surface changes in juvenile Fasciola gigantica in response to triclabendazole treatment in goat.

    Science.gov (United States)

    Shareef, P A Ahammed; Brennan, Gerard P; McVeigh, Paul; Khan, M A Hannan; Morphew, Russell M; Mousley, Angela; Marks, Nikki J; Saifullah, M K; Brophy, Peter M; Maule, Aaron G; Abidi, S M A

    2014-08-01

    Triclabendazole (TCBZ), the anthelmintic drug active against both mature and immature liver flukes, was used to investigate the effect of in vivo treatment on the tegumental surface of juvenile Fasciola gigantica. Five goats were infected with 150 F. gigantica metacercariae each by oral gavage. Four of them were treated with single dose of TCBZ at 10mg/kg at four weeks post-infection. They were euthanized at 0 (untreated), 24, 48, 72 and 96h post treatment. Juvenile flukes were manually retrieved from the goat livers and processed for scanning electron microscopy. In control flukes, the anterior region was adorned with sharply pointed spines projecting away from the surface, while in the posterior region, spines become shorter and narrower, loosing serration and with the appearance of distinct furrows and papillae. The dorsal surface retained the same pattern of surface architecture similar to that of ventral surface. Flukes obtained from 24h post-treatment did not show any apparent change and were still very active. However, there were limited movements and some blebbing, swelling, deposition of tegumental secretions and some flattening displayed by the flukes of 48h post-treatment. All the worms were found dead 72h post-treatment and showed advanced level of tegumental disruptions, consisting of severe distortion of spines, sloughing off the tegument to expose the basal lamina, formation of pores and isolated patches of lesions. By 96h post-treatment, the disruption was extremely severe and the tegument was completely sheared off causing deeper lesions that exposed the underlying musculature. The disruption was more severe at posterior than anterior region and on ventral than dorsal surface. The present study further establishes the time-course of TCBZ action in vivo with 100% efficacy against the juvenile tropical liver fluke. Copyright © 2014 Elsevier B.V. All rights reserved.

  8. Granulocytes in Helminth Infection - Who is Calling the Shots?

    Science.gov (United States)

    Makepeace, BL; Martin, C; Turner, JD; Specht, S

    2012-01-01

    Helminths are parasitic organisms that can be broadly described as “worms” due to their elongated body plan, but which otherwise differ in shape, development, migratory routes and the predilection site of the adults and larvae. They are divided into three major groups: trematodes (flukes), which are leaf-shaped, hermaphroditic (except for blood flukes) flatworms with oral and ventral suckers; cestodes (tapeworms), which are segmented, hermaphroditic flatworms that inhabit the intestinal lumen; and nematodes (roundworms), which are dioecious, cylindrical parasites that inhabit intestinal and peripheral tissue sites. Helminths exhibit a sublime co-evolution with the host´s immune system that has enabled them to successfully colonize almost all multicellular species present in every geographical environment, including over two billion humans. In the face of this challenge, the host immune system has evolved to strike a delicate balance between attempts to neutralize the infectious assault versus limitation of damage to host tissues. Among the most important cell types during helminthic invasion are granulocytes: eosinophils, neutrophils and basophils. Depending on the specific context, these leukocytes may have pivotal roles in host protection, immunopathology, or facilitation of helminth establishment. This review provides an overview of the function of granulocytes in helminthic infections. PMID:22360486

  9. Development and evaluation of a new lateral flow immunoassay for serodiagnosis of human fasciolosis.

    Directory of Open Access Journals (Sweden)

    Victoria Martínez-Sernández

    2011-11-01

    Full Text Available BACKGROUND: Human fasciolosis is a re-emerging disease worldwide and is caused by species of the genus Fasciola (F. hepatica and F. gigantica. Human fasciolosis can be diagnosed by classical coprological techniques, such as the Kato-Katz test, to reveal parasite eggs in faeces. However, although 100% specific, these methods are generally not adequate for detection of acute infections, ectopic infections, or infections with low number of parasites. In such cases immunological methods may be a good alternative and are recommended for use in major hospitals where trained personnel are available, although they are not usually implemented for individual testing. METHODOLOGY/PRINCIPAL FINDINGS: We have developed a new lateral flow test (SeroFluke for the serodiagnosis of human fasciolosis. The new test was constructed with a recombinant cathepsin L1 from F. hepatica, and uses protein A and mAb MM3 as detector reagents in the test and control lines, respectively. In comparison with an ELISA test (MM3-SERO the SeroFluke test showed maximal specificity and sensitivity and can be used with serum or whole blood samples. CONCLUSIONS/SIGNIFICANCE: The new test can be used in major hospitals in hypoendemic countries as well as in endemic/hyperendemic regions where point-of-care testing is required.

  10. Grooming Cybervictims: The Psychosocial Effects of Online Exploitation for Youth.

    Science.gov (United States)

    Berson, Ilene R.

    2003-01-01

    Presents an overview of the benefits and risks of Web-based interactions for youth. Discusses, as an illustrative example, the psychosocial effects of online "grooming" practices that are designed to lure and exploit children by enticing them, typically in a nonsexual way, toward a sexual encounter. Suggests constructive solutions and a…

  11. Exploiting Innocuous Activity for Correlating Users Across Sites

    OpenAIRE

    Goga , Oana; Lei , Howard; Parthasarathi , Sree Hari Krishnan; Friedland , Gerald; Sommer , Robin; Teixeira , Renata

    2013-01-01

    International audience; We study how potential attackers can identify accounts on different social network sites that all belong to the same user, exploiting only innocuous activity that inherently comes with posted content. We examine three specific features on Yelp, Flickr, and Twitter: the geo-location attached to a user's posts, the timestamp of posts, and the user's writing style as captured by language models. We show that among these three features the location of posts is the most powe...

  12. Cord Blood

    Directory of Open Access Journals (Sweden)

    Saeed Abroun

    2014-05-01

    Full Text Available   Stem cells are naïve or master cells. This means they can transform into special 200 cell types as needed by body, and each of these cells has just one function. Stem cells are found in many parts of the human body, although some sources have richer concentrations than others. Some excellent sources of stem cells, such as bone marrow, peripheral blood, cord blood, other tissue stem cells and human embryos, which last one are controversial and their use can be illegal in some countries. Cord blood is a sample of blood taken from a newborn baby's umbilical cord. It is a rich source of stem cells, umbilical cord blood and tissue are collected from material that normally has no use following a child’s birth. Umbilical cord blood and tissue cells are rich sources of stem cells, which have been used in the treatment of over 80 diseases including leukemia, lymphoma and anemia as bone marrow stem cell potency.  The most common disease category has been leukemia. The next largest group is inherited diseases. Patients with lymphoma, myelodysplasia and severe aplastic anemia have also been successfully transplanted with cord blood. Cord blood is obtained by syringing out the placenta through the umbilical cord at the time of childbirth, after the cord has been detached from the newborn. Collecting stem cells from umbilical blood and tissue is ethical, pain-free, safe and simple. When they are needed to treat your child later in life, there will be no rejection or incompatibility issues, as the procedure will be using their own cells. In contrast, stem cells from donors do have these potential problems. By consider about cord blood potency, cord blood banks (familial or public were established. In IRAN, four cord blood banks has activity, Shariati BMT center cord blood bank, Royan familial cord blood banks, Royan public cord blood banks and Iranian Blood Transfusion Organ cord blood banks. Despite 50,000 sample which storage in these banks, but the

  13. Technical dialogue on High-level and Intermediate-level wastes. Risks during exploitation: co-activity

    International Nuclear Information System (INIS)

    Sene, Monique; Lheureux, Yves; Demet, Michel; Jaquet, Benoit; Gueritte, Michel; Rollinger, Francois; Le Bars, Igor; Bauduin, Eloi; Flachet, Margot; Besnus, Francois; Espivent, Camille; Tichauer, Michael; Serres, Christophe; Rocher, Muriel; Michel, Maurice; Perroud, Geraldine; Sauvage, Marite; Stupien, Maurice; Delamare, Thierry; Klajman, Irene; Castel, Cecile; Makhijani, Arjun; Pellegrini, Delphine; Dessaint, Anthony; Proust, Christophe; Gratton, Laura; Vinot, Thierry; Michel, Maurice; Demet, Michel

    2015-04-01

    This publication contains contributions and the content of debates on these contributions. After introduction speeches, a contribution on safety challenges during exploitation, and an overview of questions asked about these risks by the Citizen Conference, the following issues have been addressed: the accident of the American Isolation Pilot Plant with a fire and a radioactive release in 2014 (facts and analysis, other points of view, debate), fire risks in Cigeo as a major challenge which combines constraints related to mining activities and to the exploitation of a nuclear installation (IRSN point of view, debate), risks related to transportation, risks related to parallel surface and underground activities such as storage filling, digging, road traffic and so on (points of view of SNCF and ANDRA, debate), risk of radioactivity dispersion within Cigeo (problem description, IRSN point of view, debate), and exploitation risks within Cigeo (risks of explosion due to heat and hydrogen releases, IRSN point of view, debate)

  14. The Exploitation of Evolving Resources

    CERN Document Server

    McGlade, Jacqueline; Law, Richard

    1993-01-01

    The impact of man on the biosphere is profound. Quite apart from our capacity to destroy natural ecosystems and to drive species to extinction, we mould the evolution of the survivors by the selection pressures we apply to them. This has implications for the continued health of our natural biological resources and for the way in which we seek to optimise yield from those resources. Of these biological resources, fish stocks are particularly important to mankind as a source of protein. On a global basis, fish stocks provide the major source of protein for human consumption from natural ecosystems, amounting to some seventy million tonnes in 1970. Although fisheries management has been extensively developed over the last century, it has not hitherto considered the evolutionary consequences of fishing activity. While this omission may not have been serious in the past, the ever increasing intensity of exploitation and the deteriorating health of fish stocks has generated an urgent need for a better understanding...

  15. SSC-EKE: Semi-Supervised Classification with Extensive Knowledge Exploitation.

    Science.gov (United States)

    Qian, Pengjiang; Xi, Chen; Xu, Min; Jiang, Yizhang; Su, Kuan-Hao; Wang, Shitong; Muzic, Raymond F

    2018-01-01

    We introduce a new, semi-supervised classification method that extensively exploits knowledge. The method has three steps. First, the manifold regularization mechanism, adapted from the Laplacian support vector machine (LapSVM), is adopted to mine the manifold structure embedded in all training data, especially in numerous label-unknown data. Meanwhile, by converting the labels into pairwise constraints, the pairwise constraint regularization formula (PCRF) is designed to compensate for the few but valuable labelled data. Second, by further combining the PCRF with the manifold regularization, the precise manifold and pairwise constraint jointly regularized formula (MPCJRF) is achieved. Third, by incorporating the MPCJRF into the framework of the conventional SVM, our approach, referred to as semi-supervised classification with extensive knowledge exploitation (SSC-EKE), is developed. The significance of our research is fourfold: 1) The MPCJRF is an underlying adjustment, with respect to the pairwise constraints, to the graph Laplacian enlisted for approximating the potential data manifold. This type of adjustment plays the correction role, as an unbiased estimation of the data manifold is difficult to obtain, whereas the pairwise constraints, converted from the given labels, have an overall high confidence level. 2) By transforming the values of the two terms in the MPCJRF such that they have the same range, with a trade-off factor varying within the invariant interval [0, 1), the appropriate impact of the pairwise constraints to the graph Laplacian can be self-adaptively determined. 3) The implication regarding extensive knowledge exploitation is embodied in SSC-EKE. That is, the labelled examples are used not only to control the empirical risk but also to constitute the MPCJRF. Moreover, all data, both labelled and unlabelled, are recruited for the model smoothness and manifold regularization. 4) The complete framework of SSC-EKE organically incorporates multiple

  16. The law and economics of international sex slavery: prostitution laws and trafficking for sexual exploitation

    OpenAIRE

    Jakobsson, Niklas; Kotsadam, Andreas

    2013-01-01

    International trafficking in humans for sexual exploitation is an eco- nomic activity driven by profit motives. Laws regarding commercial sex influence the profitability of trafficking and may thus affect the inflow of trafficking to a country. Using two recent sources of European cross country data we show that trafficking of persons for commercial sexual exploitation (as proxied by the data sets we are using) is least prevalent in coun...

  17. Blood lead levels and chronic blood loss

    Energy Technology Data Exchange (ETDEWEB)

    Manci, E.A.; Cabaniss, M.L.; Boerth, R.C.; Blackburn, W.R.

    1986-03-01

    Over 90% of lead in blood is bound to the erythrocytes. This high affinity of lead for red cells may mean that chronic blood loss is a significant means for excretion of lead. This study sought correlations between blood lead levels and clinical conditions involving chronic blood loss. During May, June and July, 146 patients with normal hematocrits and red cell indices were identified from the hospital and clinic populations. For each patient, age, race, sex and medical history were noted, and a whole blood sample was analyzed by flameless atomic absorption spectrophotometry. Age-and race-matched pairs showed a significant correlation of chronic blood loss with lead levels. Patients with the longest history of blood loss (menstruating women) had the lowest level (mean 6.13 ..mu..g/dl, range 3.6-10.3 ..mu..g/dl). Post-menopausal women had levels (7.29 ..mu..g/dl, 1.2-14 ..mu..g/dl) comparable to men with peptic ulcer disease, or colon carcinoma (7.31 ..mu..g/dl, 5.3-8.6 ..mu..g/dl). The highest levels were among men who had no history of bleeding problems (12.39 ..mu..g/dl, 2.08-39.35 ..mu..g/dl). Chronic blood loss may be a major factor responsible for sexual differences in blood lead levels. Since tissue deposition of environmental pollutants is implicated in diseases, menstruation may represent a survival advantage for women.

  18. Impact of tidal phenomenon “Met Ef” on the exploitation of benthos at inshore shoals in Kei islands, Indonesia

    Science.gov (United States)

    Renjaan, Eugenius Alfred; Makailipessy, Marvin Mario

    2017-10-01

    A study on benthos exploitation at five shoals located in Rosenberg and Nerong Straits, the kei islands had been conducted during period of the lowest ebb tide phenomenon which locally termed Met Ef on 2016. The purpose of the study is to know the impact of the Met Ef on benthos exploitation at the shoals by local communities during the Met Ef. Data of tidal amplitudes were obtained from the Tide Charts Mobile Applications which confirmed the observations on tide pole during October, November, and December 2013 until 2016. Data of benthos exploited during periods of Met Ef at the shoals was obtained through direct observation on benthos exploited by the local communities, also by interviewing them using questionnaires. The results showed that the lowest ebb tide of the Met Ef occurred in November, i.e., at 2 to 5 days after the full moon and/or new moon, with an average tidal range of 2.66 m and even have ever one reached 2.80 m. The most exploited benthos at the shoals is Giant clam (Tridacna sp.), Spider conch (Lambis sp.), Hammer oyster (Malleus sp.), Octopus (Octopus spp.). The intensity of benthos exploited at the shoals increased during the period of Met Ef especially in October because at that time the sea was very calm and clear due to relatively lower wind speed and the rain fall was relatively lower. This has promoted an easier accessibility of the communities to exploit benthos at shoals and, therefore October is considered by the local communities as the peak of Met Ef, instead of November. During November and, December the availability of benthos in shoals has been reduced due to it has been exploited intensely in October.

  19. Causation and Effectuation Processes: Opportunity Discovery and Exploitation Logics of Habitual Entrepreneurs

    DEFF Research Database (Denmark)

    Müller, Sabine

    2010-01-01

    This study investigates how habitual entrepreneurs (i.e. serial and portfolio entrepreneurs) discover and exploit opportunities, deal with risk and uncertainty, predict or control the future, and plan their businesses based on a causation and effectuation perspective. This study thereby uncovered...... the causation and effectuation logics applied by habitual entrepreneurs with regard to four dimensions of the venture creation: View of the future (VF), Opportunity Discovery (OD), Opportunity Exploitation (OE), and Dealing with Risk (DR). Six habitual entrepreneurs, who had to meet three strictly defined...... criteria, where sampled and case studies performed. The findings clearly indicate that habitual entrepreneurs mainly apply an effectual logic with regards to the four dimensions examined. Some of the more inexperienced habitual entrepreneurs tend to apply both logics, but almost exclusively become...

  20. Selective layer-free blood serum ionogram based on ion-specific interactions with a nanotransistor

    Science.gov (United States)

    Sivakumarasamy, R.; Hartkamp, R.; Siboulet, B.; Dufrêche, J.-F.; Nishiguchi, K.; Fujiwara, A.; Clément, N.

    2018-05-01

    Despite being ubiquitous in the fields of chemistry and biology, the ion-specific effects of electrolytes pose major challenges for researchers. A lack of understanding about ion-specific surface interactions has hampered the development and application of materials for (bio-)chemical sensor applications. Here, we show that scaling a silicon nanotransistor sensor down to 25 nm provides a unique opportunity to understand and exploit ion-specific surface interactions, yielding a surface that is highly sensitive to cations and inert to pH. The unprecedented sensitivity of these devices to Na+ and divalent ions can be attributed to an overscreening effect via molecular dynamics. The surface potential of multi-ion solutions is well described by the sum of the electrochemical potentials of each cation, enabling selective measurements of a target ion concentration without requiring a selective organic layer. We use these features to construct a blood serum ionogram for Na+, K+, Ca2+ and Mg2+, in an important step towards the development of a versatile, durable and mobile chemical or blood diagnostic tool.