Proschowsky, Morten Smidt
The reduced size of many mobile devices makes it difficult to enter text with them. The text entry methods are often slow or complicated to use. This affects the performance and user experience of all applications and services on the device. This work introduces new easy-to-use text entry methods...... for mobile devices and a framework for adaptive context-aware language models. Based on analysis of current text entry methods, the requirements to the new text entry methods are established. Transparent User guided Prediction (TUP) is a text entry method for devices with one dimensional touch input. It can...... be touch sensitive wheels, sliders or similar input devices. The interaction design of TUP is done with a combination of high level task models and low level models of human motor behaviour. Three prototypes of TUP are designed and evaluated by more than 30 users. Observations from the evaluations are used...
He, J; Chaparro, A; Nguyen, B; Burge, R J; Crandall, J; Chaparro, B; Ni, R; Cao, S
Research indicates that using a cell phone to talk or text while maneuvering a vehicle impairs driving performance. However, few published studies directly compare the distracting effects of texting using a hands-free (i.e., speech-based interface) versus handheld cell phone, which is an important issue for legislation, automotive interface design and driving safety training. This study compared the effect of speech-based versus handheld text entries on simulated driving performance by asking participants to perform a car following task while controlling the duration of a secondary text-entry task. Results showed that both speech-based and handheld text entries impaired driving performance relative to the drive-only condition by causing more variation in speed and lane position. Handheld text entry also increased the brake response time and increased variation in headway distance. Text entry using a speech-based cell phone was less detrimental to driving performance than handheld text entry. Nevertheless, the speech-based text entry task still significantly impaired driving compared to the drive-only condition. These results suggest that speech-based text entry disrupts driving, but reduces the level of performance interference compared to text entry with a handheld device. In addition, the difference in the distraction effect caused by speech-based and handheld text entry is not simply due to the difference in task duration. Copyright © 2014 Elsevier Ltd. All rights reserved.
Full Text Available Face Interface is a wearable prototype that combines the use of voluntary gaze direction and facial activations, for pointing and selecting objects on a computer screen, respectively. The aim was to investigate the functionality of the prototype for entering text. First, three on-screen keyboard layout designs were developed and tested (n=10 to find a layout that would be more suitable for text entry with the prototype than traditional QWERTY layout. The task was to enter one word ten times with each of the layouts by pointing letters with gaze and select them by smiling. Subjective ratings showed that a layout with large keys on the edge and small keys near the center of the keyboard was rated as the most enjoyable, clearest, and most functional. Second, using this layout, the aim of the second experiment (n=12 was to compare entering text with Face Interface to entering text with mouse. The results showed that text entry rate for Face Interface was 20 characters per minute (cpm and 27 cpm for the mouse. For Face Interface, keystrokes per character (KSPC value was 1.1 and minimum string distance (MSD error rate was 0.12. These values compare especially well with other similar techniques.
Heilimo, J.; Harri, A.-M.; Aleksashkin, S.; Koryanov, V.; Guerrero, H.; Schmidt, W.; Haukka, H.; Finchenko, V.; Martynov, M.; Ostresko, B.; Ponomarenko, A.; Kazakovtsev, V.; Arruego, I.; Martin, S.; Siili, T.
In 2001 - 2011 an inflatable Entry, Descent and Landing System (EDLS) for Martian atmosphere was developed by FMI and the MetNet team. This MetNet Mars Lander EDLS is used in both the initial deceleration during atmospheric entry and in the final deceleration before the semi-hard impact of the penetrator to Martian surface. The EDLS design is ingenious and its applicability to Earth's atmosphere is studied in the on-going project. In particular, the behavior of the system in the critical transonic aerodynamic (from hypersonic to subsonic) regime will be investigated. This project targets to analyze and test the transonic behavior of this compact and light weight payload entry system to Earth's atmosphere . Scaling and adaptation for terrestrial atmospheric conditions, instead of a completely new design, is a favorable approach for providing a new re-entry vehicle for terrestrial space applications.
Jacoline C. Bouvy
Full Text Available As per the EMA definition, adaptive pathways is a scientific concept for the development of medicines which seeks to facilitate patient access to promising medicines addressing high unmet need through a prospectively planned approach in a sustainable way. This review reports the findings of activities undertaken by the ADAPT-SMART consortium to identify enablers and explore the suitability of managed entry agreements for adaptive pathways products in Europe. We found that during 2006–2016 outcomes-based managed entry agreements were not commonly used for products with a conditional marketing authorization or authorized under exceptional circumstances. The barriers and enablers to develop workable managed entry agreements models for adaptive pathways products were discussed through interviews and a multi-stakeholder workshop with a number of recommendations made in this paper.
Southern, Caleb; Clawson, James; Frey, Brian; Abowd, Gregory; Romero, Mario
We present a demonstration of BrailleTouch, an accessible keyboard for blind users on a touchscreen smartphone (see Figure 1). Based on the standard Perkins Brailler, BrailleTouch implements a six-key chorded braille soft keyboard . We will briefly introduce audience members to the braille code, and then allow them to hold the BrailleTouch prototype and enter text, with the aid of a visual chart of the braille alphabet. QC 20160418
Gangopadhyay, Diya; Vasal, Ityam; Yammiyavar, Pradeep
Mobile phones, in the recent times, have become affordable and accessible to a wider range of users including the hitherto technologically and economically under-represented segments. Indian users are a gigantic consumer base for mobile phones. With Hindi being one of the most widely spoken languages in the country and the primary tool of communication for about a third of its population, an effective solution for Hindi text entry in mobile devices is expected to be immensely useful to the non English speaking users. This paper proposes a mobile phone handwriting based text entry solution for Hindi language, which allows for an easy text entry method, while facilitating better recognition accuracy.
Ilievski, F.; Beek, Wouter; van Erp, Marieke; Rietveld, Laurens; Schlobach, Stefan
Finding relevant resources on the Semantic Web today is a dirty job: no centralized query service exists and the support for natural language access is limited. We present LOTUS: Linked Open Text Un- leaShed, a text-based entry point to a massive subset of today’s Linked Open Data Cloud. Recognizing
Renato de Sousa Gomide
Full Text Available Abstract Introduction: Due to the increasing popularization of computers and the internet expansion, Alternative and Augmentative Communication technologies have been employed to restore the ability to communicate of people with aphasia and tetraplegia. Virtual keyboards are one of the most primitive mechanisms for alternatively entering text and play a very important role in accomplishing this task. However, the text entry for this kind of keyboard is much slower than entering information through their physical counterparts. Many techniques and layouts have been proposed to improve the typing performance of virtual keyboards, each one concerning a different issue or solving a specific problem. However, not all of them are suitable to assist seriously people with motor impairment. Methods: In order to develop an assistive virtual keyboard with improved typing performance, we performed a systematic review on scientific databases. Results: We found 250 related papers and 52 of them were selected to compose. After that, we identified eight essentials virtual keyboard features, five methods to optimize data entry performance and five metrics to assess typing performance. Conclusion: Based on this review, we introduce a concept of an assistive, optimized, compact and adaptive virtual keyboard that gathers a set of suitable techniques such as: a new ambiguous keyboard layout, disambiguation algorithms, dynamic scan techniques, static text prediction of letters and words and, finally, the use of phonetic and similarity algorithms to reduce the user's typing error rate.
Full Text Available In this article we report on an innovation project developed with a group of eleventh graders at a public school in Bogotá. Its aim was to encourage students to improve reading comprehension of texts in English. It was conducted taking into account students' needs, interests and level of English. To do it, we implemented two reading strategies: text coding and double entry organizer. We observed the students' attitudes during two lesson plans, compared their level of comprehension before and after using the reading strategies and asked them to self-evaluate their performance. At the end, we could see their improvement, how they enjoyed doing the activities and became more confident.
Haukka, H.; Heilimo, J.; Harri, A.-M.; Aleksashkin, S.; Koryanov, V.; Arruego, I.; Schmidt, W.; Finchenko, V.; Martynov, M.; Ponomarenko, A.; Kazakovtsev, V.; Martin, S.
We have developed an atmospheric re-entry and descent system concept based on inflatable hypersonic decelerator techniques that were originally developed for Mars. The ultimate goal of this EU-funded RITD-project (Re-entry: Inflatable Technology Development) was to assess the benefits of this technology when deploying small payloads from low Earth orbits to the surface of the Earth with modest costs. The principal goal was to assess and develop a preliminary EDLS design for the entire relevant range of aerodynamic regimes expected to be encountered in Earth's atmosphere during entry, descent and landing. Low Earth Orbit (LEO) and even Lunar applications envisaged include the use of the EDLS approach in returning payloads of 4-8 kg down to the surface.
Full Text Available Brain-Computer Interfaces (BCIs based on Event Related Potentials (ERPs strive for offering communication pathways which are independent of muscle activity. While most visual ERP-based BCI paradigms require good control of the user's gaze direction, auditory BCI paradigms overcome this restriction. The present work proposes a novel approach using Auditory Evoked Potentials (AEP for the example of a multiclass text spelling application. To control the ERP speller, BCI users focus their attention to two-dimensional auditory stimuli that vary in both, pitch (high/medium/low and direction (left/middle/right and that are presented via headphones. The resulting nine different control signals are exploited to drive a predictive text entry system. It enables the user to spell a letter by a single 9-class decision plus two additional decisions to confirm a spelled word.This paradigm - called PASS2D - was investigated in an online study with twelve healthy participants. Users spelled with more than 0.8 characters per minute on average (3.4 bits per minute which makes PASS2D a competitive method. It could enrich the toolbox of existing ERP paradigms for BCI end users like late-stage ALS patients.
Bouvy, Jacoline C; Sapede, Claudine; Garner, Sarah
As per the EMA definition, adaptive pathways is a scientific concept for the development of medicines which seeks to facilitate patient access to promising medicines addressing high unmet need through a prospectively planned approach in a sustainable way. This review reports the findings of activities undertaken by the ADAPT-SMART consortium to identify enablers and explore the suitability of managed entry agreements for adaptive pathways products in Europe. We found that during 2006-2016 outcomes-based managed entry agreements were not commonly used for products with a conditional marketing authorization or authorized under exceptional circumstances. The barriers and enablers to develop workable managed entry agreements models for adaptive pathways products were discussed through interviews and a multi-stakeholder workshop with a number of recommendations made in this paper.
Erickson, Lisa; Bertagne, Christopher; Hartl, Darren; Witcomb, John; Cognata, Thomas
The Shape-Morphing Adaptive Radiator Technology (SMART) project builds off the FY16 research effort that developed a flexible composite radiator panel and demonstrated its ability to actuate from SMA's attached to it. The proposed FY17 Shape-Morphing Adaptive Radiator Technology (SMART) project's goal is to 1) develop a practical radiator design with shape memory alloys (SMAs) bonded to the radiator's panel, and 2) build a multi-panel radiator prototype for subsequent system level thermal vacuum tests. The morphing radiator employs SMA materials to passively change its shape to adapt its rate of heat rejection to vehicle requirements. Conceptually, the radiator panel has a naturally closed position (like a cylinder) in a cold environment. Whenever the radiator's temperature gradually rises, SMA's affixed to the face sheet will pull the face sheet open a commensurate amount - increasing the radiators view to space and causing it to reject more heat. In a vehicle, the radiator's variable heat rejection capabilities would reduce the number of additional heat rejection devices in a vehicle's thermal control system. This technology aims to help achieve the required maximum to minimum heat rejection ratio required for manned space vehicles to adopt a lighter, simpler, single loop thermal control architecture (ATCS). Single loop architectures are viewed as an attractive means to reduce mass and complexity over traditional dual-loop solutions. However, fluids generally considered safe enough to flow within crewed cabins (e.g. propylene glycol-water mixtures) have much higher freezing points and viscosities than those used in the external sides of dual loop ATCSs (e.g. Ammonia and HFE7000).
Full Text Available Canine distemper virus (CDV, a close relative of measles virus (MV, is widespread and well known for its broad host range. When the goal of measles eradication may be achieved, and when measles vaccination will be stopped, CDV might eventually cross the species barrier to humans and emerge as a new human pathogen. In order to get an impression how fast such alterations may occur, we characterized required adaptive mutations to the human entry receptors CD150 (SLAM and nectin-4 as first step to infect human target cells. Recombinant wild-type CDV-A75/17(red adapted quickly to growth in human H358 epithelial cells expressing human nectin-4. Sequencing of the viral attachment proteins (hemagglutinin, H, and fusion protein, F genes revealed that no adaptive alteration was required to utilize human nectin-4. In contrast, the virus replicated only to low titres (10(2 pfu/ml in Vero cells expressing human CD150 (Vero-hSLAM. After three passages using these cells virus was adapted to human CD150 and replicated to high titres (10(5 pfu/ml. Sequence analyses revealed that only one amino acid exchange in the H-protein at position 540 Asp→Gly (D540G was required for functional adaptation to human CD150. Structural modelling suggests that the adaptive mutation D540G in H reflects the sequence alteration from canine to human CD150 at position 70 and 71 from Pro to Leu (P70L and Gly to Glu (G71E, and compensates for the gain of a negative charge in the human CD150 molecule. Using this model system our data indicate that only a minimal alteration, in this case one adaptive mutation, is required for adaptation of CDV to the human entry receptors, and help to understand the molecular basis why this adaptive mutation occurs.
Yount, Bryan C.; Arnold, James O.; Gage, Peter J.; Mockelman, Jeffrey; Venkatapathy, Ethiraj
System studies have shown that large deployable aerodynamic decelerators such as the Adaptive Deployable Entry and Placement Technology (ADEPT) concept can revolutionize future robotic and human exploration missions involving atmospheric entry, descent and landing by significantly reducing the maximum heating rate, total heat load, and deceleration loads experienced by the spacecraft during entry [1-3]. ADEPT and the Hypersonic Inflatable Aerodynamic Decelerator (HIAD)  share the approach of stowing the entry system in the shroud of the launch vehicle and deploying it to a much larger diameter prior to entry. The ADEPT concept provides a low ballistic coefficient for planetary entry by employing an umbrella-like deployable structure consisting of ribs, struts and a fabric cover that form an aerodynamic decelerator capable of undergoing hypersonic flight. The ADEPT "skin" is a 3-D woven carbon cloth that serves as a thermal protection system (TPS) and as a structural surface that transfers aerodynamic forces to the underlying ribs . This paper focuses on design activities associated with integrating ADEPT components (cloth, ribs, struts and mechanisms) into a system that can function across all configurations and environments of a typical mission concept: stowed during launch, in-space deployment, entry, descent, parachute deployment and separation from the landing payload. The baseline structures and mechanisms were selected via trade studies conducted during the summer and fall of 2012. They are now being incorporated into the design of a ground test article (GTA) that will be fabricated in 2013. It will be used to evaluate retention of the stowed configuration in a launch environment, mechanism operation for release, deployment and locking, and static strength of the deployed decelerator. Of particular interest are the carbon cloth interfaces, underlying hot structure, (Advanced Carbon- Carbon ribs) and other structural components (nose cap, struts, and
Full Text Available and bad) according to the (subjective) belief system of the person. Informally, Semaffect appraises an emotion from how one reacts to a good/bad person doing a good/bad deed to another good/bad person. Formally, the model appraises a given event in terms... of the good (1) and bad (0) va- lences of its semantic AGENT (A), verb predicate (v) and PATIENT (P). It is important to note that Semaffect de- fines an emotion anonymously based on the composition of the underlying semantic variables A, v and P, and not from...
Full Text Available Social scientists and computer scientist are divided by small differences in perspective and not by any significant disciplinary divide. In the field of text analysis, several such differences are noted: social scientists often use unsupervised models to explore corpora, whereas many computer scientists employ supervised models to train data; social scientists hold to more conventional causal notions than do most computer scientists, and often favor intense exploitation of existing algorithms, whereas computer scientists focus more on developing new models; and computer scientists tend to trust human judgment more than social scientists do. These differences have implications that potentially can improve the practice of social science.
The Adaptable, Deployable Entry and Placement Technology (ADEPT), uses a mechanical skeleton to deploy a revolutionary carbon fabric system that serves as both heat shield and primary structure during atmospheric entry. The NASA ADEPT project, currently funded by the Game Changing Development Program in STMD is currently focused on 1m class hypersonic decelerators for the delivery of very small payloads ( 5 kg) to locations of interest in an effort to leverage low-cost platforms to rapidly mature the technology while simultaneously delivering high-value science. Preliminary mission design and aerothermal performance testing in arcjets have shown the ADEPT system is quite capable of safe delivery of cubesats to Mars surface. The ability of the ADEPT to transit to Mars in a stowed configuration (similar to an umbrella) provides options for integration with the Mars 2020 cruise stage, even to consider multiple ADEPTs. System-level test campaigns are underway for FY15 execution or planning for FY16. These include deployment testing, wind tunnel testing, system-level arc jet testing, and a sounding rocket flight test. The goal is system level maturation (TRL 6) at a 1m class Mars design reference mission configuration.
Heilimo, J.; Harri, A.-M.; Aleksashkin, S.; Koryanov, V.; Arruego, I.; Schmidt, W.; Haukka, H.; Finchenko, V.; Martynov, M.; Ostresko, B.; Ponomarenko, A.; Kazakovtsev, V.; Martin, S.; Siili, T.
The EDLS applicability to Earth’s atmosphere is studied by the EU/RITD project. Project focuses to the analysis and tests of the transonic behaviour of this compact and light weight payload entry system at the Earth re-entry.
Full Text Available Text extraction is a key issue in sealing clay research. The traditional method based on rubbings increases the risk of sealing clay damage and is unfavorable to sealing clay protection. Therefore, using digital image of sealing clay, a new method for text segmentation based on Radon-like features and adaptive enhancement filters is proposed in this paper. First, adaptive enhancement LM filter bank is used to get the maximum energy image; second, the edge image of the maximum energy image is calculated; finally, Radon-like feature images are generated by combining maximum energy image and its edge image. The average image of Radon-like feature images is segmented by the image thresholding method. Compared with 2D Otsu, GA, and FastFCM, the experiment result shows that this method can perform better in terms of accuracy and completeness of the text.
Líliam Cristina Marins Prieto
Full Text Available In this study, multimodal circulation of literary texts in television adaptations is outlined, emphasizing their implications in the conceptualization and value judgment in the Arts (particularly in Literature. The technological boom in several social segments and new reading practices in the current information revolution age have influenced the circulation of literature in new forms and intersemiotic medias. By congregating theories about cyberculture and media convergence (Negroponte, Lévy and Jenkins and the analysis of specific cases, such as the adaptation of Shakespeare´s The Taming of the Shrew (1593 in O Cravo e a Rosa (2000, a Brazilian telenovela directed by Walcyr Carrasco and Mário Teixeira, a new cultural context emerges. In this new configuration where television and cyberspace are part of the convergence culture, the media and their users interact. This interaction contributes towards the survival of the literary text and the emergence of new reading practices.
Engeswick, Lynnette Marie
This study was conducted to discover the extent dental hygiene educators in 25 entry-level dental hygiene programs from the Upper Midwest demonstrate Emotional Resilience, Flexibility and Openness, Perceptual Acuity, and Personal Autonomy as they relate to their level of education and multicultural experiences. An additional purpose was to examine…
Full Text Available Text corpus size is an important issue when building a language model (LM. This is a particularly important issue for languages where little data is available. This paper introduces an LM adaptation technique to improve an LM built using a small amount of task-dependent text with the help of a machine-translated text corpus. Icelandic speech recognition experiments were performed using data, machine translated (MT from English to Icelandic on a word-by-word and sentence-by-sentence basis. LM interpolation using the baseline LM and an LM built from either word-by-word or sentence-by-sentence translated text reduced the word error rate significantly when manually obtained utterances used as a baseline were very sparse.
Full Text Available Brain Computer Interfaces (BCI based on event-related potentials (ERP allow for selection of characters from a visually presented character-matrix and thus provide a communication channel for users with neurodegenerative disease. Although they have been topic of research for more than 20 years and were multiply proven to be a reliable communication method, BCIs are almost exclusively used in experimental settings, handled by qualified experts. This study investigates if ERP-BCIs can be handled independently by laymen without expert interference, which is inevitable for establishing BCIs in end-user’s daily life situations. Furthermore we compared the classic character-by-character text entry against a predictive text entry (PTE that directly incorporates predictive text into the character matrix. N=19 BCI novices handled a user-centred ERP-BCI application on their own without expert interference. The software individually adjusted classifier weights and control parameters in the background, invisible to the user (auto-calibration. All participants were able to operate the software on their own and to twice correctly spell a sentence with the auto-calibrated classifier (once with PTE, once without. Our PTE increased spelling speed and importantly did not reduce accuracy. In sum, this study demonstrates feasibility of auto-calibrating ERP-BCI use, independently by laymen and the strong benefit of integrating predictive text directly into the character-matrix.
Kaufmann, Tobias; Völker, Stefan; Gunesch, Laura; Kübler, Andrea
Brain-computer interfaces (BCI) based on event-related potentials (ERP) allow for selection of characters from a visually presented character-matrix and thus provide a communication channel for users with neurodegenerative disease. Although they have been topic of research for more than 20 years and were multiply proven to be a reliable communication method, BCIs are almost exclusively used in experimental settings, handled by qualified experts. This study investigates if ERP-BCIs can be handled independently by laymen without expert support, which is inevitable for establishing BCIs in end-user's daily life situations. Furthermore we compared the classic character-by-character text entry against a predictive text entry (PTE) that directly incorporates predictive text into the character-matrix. N = 19 BCI novices handled a user-centered ERP-BCI application on their own without expert support. The software individually adjusted classifier weights and control parameters in the background, invisible to the user (auto-calibration). All participants were able to operate the software on their own and to twice correctly spell a sentence with the auto-calibrated classifier (once with PTE, once without). Our PTE increased spelling speed and, importantly, did not reduce accuracy. In sum, this study demonstrates feasibility of auto-calibrating ERP-BCI use, independently by laymen and the strong benefit of integrating predictive text directly into the character-matrix.
Full Text Available AdaBoost is an excellent committee-based tool for classification. However, its effectiveness and efficiency in multiclass categorization face the challenges from methods based on support vector machine (SVM, neural networks (NN, naïve Bayes, and k-nearest neighbor (kNN. This paper uses a novel multi-class AdaBoost algorithm to avoid reducing the multi-class classification problem to multiple two-class classification problems. This novel method is more effective. In addition, it keeps the accuracy advantage of existing AdaBoost. An adaptive group-based kNN method is proposed in this paper to build more accurate weak classifiers and in this way control the number of basis classifiers in an acceptable range. To further enhance the performance, weak classifiers are combined into a strong classifier through a double iterative weighted way and construct an adaptive group-based kNN boosting algorithm (AGkNN-AdaBoost. We implement AGkNN-AdaBoost in a Chinese text categorization system. Experimental results showed that the classification algorithm proposed in this paper has better performance both in precision and recall than many other text categorization methods including traditional AdaBoost. In addition, the processing speed is significantly enhanced than original AdaBoost and many other classic categorization algorithms.
Tsai, Richard Tzong-Han; Lai, Po-Ting
Gene normalization (GN) is the task of identifying the unique database IDs of genes and proteins in literature. The best-known public competition of GN systems is the GN task of the BioCreative challenge, which has been held four times since 2003. The last two BioCreatives, II.5 & III, had two significant differences from earlier tasks: firstly, they provided full-length articles in addition to abstracts; and secondly, they included multiple species without providing species ID information. Full papers introduce more complex targets for GN processing, while the inclusion of multiple species vastly increases the potential size of dictionaries needed for GN. BioCreative III GN uses Threshold Average Precision at a median of k errors per query (TAP-k), a new measure closely related to the well-known average precision, but also reflecting the reliability of the score provided by each GN system. To use full-paper text, we employed a multi-stage GN algorithm and a ranking method which exploit information in different sections and parts of a paper. To handle the inclusion of multiple unknown species, we developed two context-based dynamic strategies to select dictionary entries related to the species that appear in the paper-section-wide and article-wide context. Our originally submitted BioCreative III system uses a static dictionary containing only the most common species entries. It already exceeds the BioCreative III average team performance by at least 24% in every evaluation. However, using our proposed dynamic dictionary strategies, we were able to further improve TAP-5, TAP-10, and TAP-20 by 16.47%, 13.57% and 6.01%, respectively in the Gold 50 test set. Our best dynamic strategy outperforms the best BioCreative III systems in TAP-10 on the Silver 50 test set and in TAP-5 on the Silver 507 set. Our experimental results demonstrate the superiority of our proposed dynamic dictionary selection strategies over our original static strategy and most BioCreative III
Full Text Available Intravital 2-photon microscopy of mucosal membranes across which nanoparticles enter the organism typically generates noisy images. Because the noise results from the random statistics of only very few photons detected per pixel, it cannot be avoided by technical means. Fluorescent nanoparticles contained in the tissue may be represented by a few bright pixels which closely resemble the noise structure. We here present a data-adaptive method for digital denoising of datasets obtained by 2-photon microscopy. The algorithm exploits both local and non-local redundancy of the underlying ground-truth signal to reduce noise. Our approach automatically adapts the strength of noise suppression in a data-adaptive way by using a Bayesian network. The results show that the specific adaption to both signal and noise characteristics improves the preservation of fine structures such as nanoparticles while less artefacts were produced as compared to reference algorithms. Our method is applicable to other imaging modalities as well, provided the specific noise characteristics are known and taken into account.
Full Text Available This article intends to contribute to the understanding of Jesus’ entry into Jerusalem. The author studies the entry, which is found in all the Gospels, in its Jewish context. The author argues that Jesus’ entry into Jerusalem on an ass is to be understood as a prophetic sign which was primarily meant to convey a message to the Jews.
Santhanam, Elizabeth; Lynch, Bernardine; Jones, Jeffrey
Purpose: This paper aims to report the findings of a study into the automated text analysis of student feedback comments to assist in investigating a high volume of qualitative information at various levels in an Australian university. It includes the drawbacks and advantages of using selected applications and established lexicons. There has been…
Full Text Available This research work aims in developing Tamil to English Cross - language text retrieval system using hybrid machine translation approach. The hybrid machine translation system is a combination of rule based and statistical based approaches. In an existing word by word translation system there are lot of issues and some of them are ambiguity, Out-of-Vocabulary words, word inflections, and improper sentence structure. To handle these issues, proposed architecture is designed in such a way that, it contains Improved Part-of-Speech tagger, machine learning based morphological analyser, collocation based word sense disambiguation procedure, semantic dictionary, and tense markers with gerund ending rules, and two pass transliteration algorithm. From the experimental results it is clear that the proposed Tamil Query based translation system achieves significantly better translation quality over existing system, and reaches 95.88% of monolingual performance.
Selma Limam Mansar
Full Text Available Obesity has become a worldwide epidemic. Qatar, a rapidly developing country in the Middle East, has seen a sharp increase in the prevalence of obesity. The increase can be attributed to several reasons, including sedentary lifestyles imposed by a harsh climate and the introduction of Western fast food. Mobile technologies have been used and studied as a technology to support individuals’ weight loss. The authors have developed a mobile application that implements three strategies drawn from proven theories of behavioral change. The application is localized to the cultural context of its proposed users. The objective of this paper is to present a method through which we adapted the messaging content of a weight loss application to the context of its users while retaining an effective degree of automation. The adaptation addressed body image, eating and physical exercise habits, and regional/cultural needs. The paper discusses how surveying potential users can be used to build a profile of a target population, find common patterns, and then develop a database of text messages. The text messages are automated and sent to the users at specific times of day, as suggested by the survey results.
Enabling Venus In-Situ Science - Deployable Entry System Technology, Adaptive Deployable Entry and Placement Technology (ADEPT): A Technology Development Project funded by Game Changing Development Program of the Space Technology Program
Wercinski, Paul F.; Venkatapathy, Ethiraj; Gage, Peter J.; Yount, Bryan C.; Prabhu, Dinesh K.; Smith, Brandon; Arnold, James O.; Makino, alberto; Peterson, Keith Hoppe; Chinnapongse, Ronald I.
Venus is one of the important planetary destinations for scientific exploration, but: The combination of extreme entry environment coupled with extreme surface conditions have made mission planning and proposal efforts very challenging. We present an alternate, game-changing approach (ADEPT) where a novel entry system architecture enables more benign entry conditions and this allows for greater flexibility and lower risk in mission design
Amalia, Rizkiana; Arif Bijaksana, Moch; Darmantoro, Dhinta
The presence of the word negation is able to change the polarity of the text if it is not handled properly it will affect the performance of the sentiment classification. Negation words in Indonesian are ‘tidak’, ‘bukan’, ‘belum’ and ‘jangan’. Also, there is a conjunction word that able to reverse the actual values, as the word ‘tetapi’, or ‘tapi’. Unigram has shortcomings in dealing with the existence of negation because it treats negation word and the negated words as separate words. A general approach for negation handling in English text gives the tag ‘NEG_’ for following words after negation until the first punctuation. But this may gives the tag to un-negated, and this approach does not handle negation and conjunction in one sentences. The rule-based method to determine what words negated by adapting the rules of Indonesian language syntactic of negation to determine the scope of negation was proposed in this study. With adapting syntactic rules and tagging “NEG_” using SVM classifier with RBF kernel has better performance results than the other experiments. Considering the average F1-score value, the performance of this proposed method can be improved against baseline equal to 1.79% (baseline without negation handling) and 5% (baseline with existing negation handling) for a dataset that all tweets contain negation words. And also for the second dataset that has the various number of negation words in document tweet. It can be improved against baseline at 2.69% (without negation handling) and 3.17% (with existing negation handling).
Tweedy, Joshua G; Escriva, Eric; Topf, Maya; Gompels, Ursula A
Tissue-culture adaptation of viruses can modulate infection. Laboratory passage and bacterial artificial chromosome (BAC)mid cloning of human cytomegalovirus, HCMV, resulted in genomic deletions and rearrangements altering genes encoding the virus entry complex, which affected cellular tropism, virulence, and vaccine development. Here, we analyse these effects on the reference genome for related betaherpesviruses, Roseolovirus, human herpesvirus 6A (HHV-6A) strain U1102. This virus is also naturally "cloned" by germline subtelomeric chromosomal-integration in approximately 1% of human populations, and accurate references are key to understanding pathological relationships between exogenous and endogenous virus. Using whole genome next-generation deep-sequencing Illumina-based methods, we compared the original isolate to tissue-culture passaged and the BACmid-cloned virus. This re-defined the reference genome showing 32 corrections and 5 polymorphisms. Furthermore, minor variant analyses of passaged and BACmid virus identified emerging populations of a further 32 single nucleotide polymorphisms (SNPs) in 10 loci, half non-synonymous indicating cell-culture selection. Analyses of the BAC-virus genome showed deletion of the BAC cassette via loxP recombination removing green fluorescent protein (GFP)-based selection. As shown for HCMV culture effects, select HHV-6A SNPs mapped to genes encoding mediators of virus cellular entry, including virus envelope glycoprotein genes gB and the gH/gL complex. Comparative models suggest stabilisation of the post-fusion conformation. These SNPs are essential to consider in vaccine-design, antimicrobial-resistance, and pathogenesis.
Carol D. Weiss
Full Text Available The human immunodeficiency virus (HIV enters cells through a series of molecular interactions between the HIV envelope protein and cellular receptors, thus providing many opportunities to block infection. Entry inhibitors are currently being used in the clinic, and many more are under development. Unfortunately, as is the case for other classes of antiretroviral drugs that target later steps in the viral life cycle, HIV can become resistant to entry inhibitors. In contrast to inhibitors that block viral enzymes in intracellular compartments, entry inhibitors interfere with the function of the highly variable envelope glycoprotein as it continuously adapts to changing immune pressure and available target cells in the extracellular environment. Consequently, pathways and mechanisms of resistance for entry inhibitors are varied and often involve mutations across the envelope gene. This review provides a broad overview of entry inhibitor resistance mechanisms that inform our understanding of HIV entry and the design of new inhibitors and vaccines.
Full Text Available Abstract: A financial management eficiently begin, primarily, with an accounting record kept in the best possible conditions, this being conditioned on the adoption of a uniform forms, rational, clear and simple accounting. Throughout history, there have been known two forms of accounting: the simple and double entry. Romanian society after 1990 underwent a substantial change in social structure, the sector on which put a great emphasis being private, that of small manufacturers, peddler, freelance, who work independently and authorized or as associative form (family enterprises, various associations (owners, tenants, etc., liberal professions, etc.. They are obliged to keep a simple bookkeeping, because they have no juridical personality. Companies with legal personality are required to keep double entry bookkeeping; therefore, knowledge and border demarcation between the two forms of organisation of accounting is an essential. The material used for this work is mainly represented by the financial and accounting documents, by the analysis of the economic, by legislative updated sources, and as the method was used the comparison method, using hypothetical data, in case of an authorized individual and a legal entity. Based on the chosen material, an authorized individual (who perform single entry accounting system and a juridical entity (who perform double entry accounting system were selected comparative case studies, using hypothetical data, were analysed advantages and disadvantages in term of fiscal, if using two accounting systems, then were highlighted some conclusion that result.
Green, Anthony; Hawkey, Roger
The important yet under-researched role of item writers in the selection and adaptation of texts for high-stakes reading tests is investigated through a case study involving a group of trained item writers working on the International English Language Testing System (IELTS). In the first phase of the study, participants were invited to reflect in…
Gundersen, Anne Kathrine Navestad
As the mature markets of developed economies have become increasingly saturated, firms are turning their attention towards emerging markets for further enterprise growth. However, these countries often present significant challenges for foreign entrants, forcing firms to adapt their strategies to the new context. While MNEs? entry mode choice is an extensively studied field, there is a deficit in the entry mode research on SMEs, and even more so when it comes to entry into emerging markets in...
Francisco Jiménez Calderón
Full Text Available Resumen: El objetivo de este artículo es unificar algunos criterios acerca de la utilización de textos literarios en el aula de español como lengua extranjera (ELE, sobre todo en relación con la adaptación de los textos. Para ello, se elabora una propuesta didáctica que consiste en una adaptación de El burlador de Sevilla, que ha sido trabajada en el aula de manera efectiva mediante actividades específicas. La conclusión es que el trabajo con textos literarios puede ser más rentable si se elabora una unidad didáctica basada en el texto aplicando el enfoque por tareas que normalmente se emplea en el método comunicativo. Además, el sentido del texto debe considerarse como el primer objetivo de aprendizaje.Abstract: The aim of this paper is to unify some criteria on the use of literary texts in the classroom of Spanish as a foreign language, especially in relation to the adaptation of the texts. For that, we develop a teaching proposal that is an adaptation of El burlador de Sevilla, which has been tested in the classroom effectively through specific activities. The conclusion is that working with literary texts can be more productive if we develop a teaching unit based on the text using the task-based approach normally used in the communicative approach. Besides, the sense of the text should be established as the most important learning objective.
Rasim M. Alguliev
Full Text Available Extractive multidocument summarization is modeled as a modified p-median problem. The problem is formulated with taking into account four basic requirements, namely, relevance, information coverage, diversity, and length limit that should satisfy summaries. To solve the optimization problem a self-adaptive differential evolution algorithm is created. Differential evolution has been proven to be an efficient and robust algorithm for many real optimization problems. However, it still may converge toward local optimum solutions, need to manually adjust the parameters, and finding the best values for the control parameters is a consuming task. In the paper is proposed a self-adaptive scaling factor in original DE to increase the exploration and exploitation ability. This paper has found that self-adaptive differential evolution can efficiently find the best solution in comparison with the canonical differential evolution. We implemented our model on multi-document summarization task. Experiments have shown that the proposed model is competitive on the DUC2006 dataset.
Broom, Donald M
The term adaptation is used in biology in three different ways. It may refer to changes which occur at the cell and organ level, or at the individual level, or at the level of gene action and evolutionary processes. Adaptation by cells, especially nerve cells helps in: communication within the body, the distinguishing of stimuli, the avoidance of overload and the conservation of energy. The time course and complexity of these mechanisms varies. Adaptive characters of organisms, including adaptive behaviours, increase fitness so this adaptation is evolutionary. The major part of this paper concerns adaptation by individuals and its relationships to welfare. In complex animals, feed forward control is widely used. Individuals predict problems and adapt by acting before the environmental effect is substantial. Much of adaptation involves brain control and animals have a set of needs, located in the brain and acting largely via motivational mechanisms, to regulate life. Needs may be for resources but are also for actions and stimuli which are part of the mechanism which has evolved to obtain the resources. Hence pigs do not just need food but need to be able to carry out actions like rooting in earth or manipulating materials which are part of foraging behaviour. The welfare of an individual is its state as regards its attempts to cope with its environment. This state includes various adaptive mechanisms including feelings and those which cope with disease. The part of welfare which is concerned with coping with pathology is health. Disease, which implies some significant effect of pathology, always results in poor welfare. Welfare varies over a range from very good, when adaptation is effective and there are feelings of pleasure or contentment, to very poor. A key point concerning the concept of individual adaptation in relation to welfare is that welfare may be good or poor while adaptation is occurring. Some adaptation is very easy and energetically cheap and
building skills, knowledge or networks on adaptation, ... the African partners leading the AfricaAdapt network, together with the UK-based Institute of Development Studies; and ... UNCCD Secretariat, Regional Coordination Unit for Africa, Tunis, Tunisia .... 26 Rural–urban Cooperation on Water Management in the Context of.
Department of Homeland Security — HSIP Non-Crossing Ports-of-Entry A Port of Entry is any designated place at which a CBP officer is authorized to accept entries of merchandise to collect duties, and...
Bargatze, L. F.
Active Data Archive Product Tracking (ADAPT) is a collection of software routines that permits one to generate XML metadata files to describe and register data products in support of the NASA Heliophysics Virtual Observatory VxO effort. ADAPT is also a philosophy. The ADAPT concept is to use any and all available metadata associated with scientific data to produce XML metadata descriptions in a consistent, uniform, and organized fashion to provide blanket access to the full complement of data stored on a targeted data server. In this poster, we present an application of ADAPT to describe all of the data products that are stored by using the Common Data File (CDF) format served out by the CDAWEB and SPDF data servers hosted at the NASA Goddard Space Flight Center. These data servers are the primary repositories for NASA Heliophysics data. For this purpose, the ADAPT routines have been used to generate data resource descriptions by using an XML schema named Space Physics Archive, Search, and Extract (SPASE). SPASE is the designated standard for documenting Heliophysics data products, as adopted by the Heliophysics Data and Model Consortium. The set of SPASE XML resource descriptions produced by ADAPT includes high-level descriptions of numerical data products, display data products, or catalogs and also includes low-level "Granule" descriptions. A SPASE Granule is effectively a universal access metadata resource; a Granule associates an individual data file (e.g. a CDF file) with a "parent" high-level data resource description, assigns a resource identifier to the file, and lists the corresponding assess URL(s). The CDAWEB and SPDF file systems were queried to provide the input required by the ADAPT software to create an initial set of SPASE metadata resource descriptions. Then, the CDAWEB and SPDF data repositories were queried subsequently on a nightly basis and the CDF file lists were checked for any changes such as the occurrence of new, modified, or deleted
The Walking Interventions Through Texting (WalkIT) Trial: Rationale, Design, and Protocol for a Factorial Randomized Controlled Trial of Adaptive Interventions for Overweight and Obese, Inactive Adults.
Hurley, Jane C; Hollingshead, Kevin E; Todd, Michael; Jarrett, Catherine L; Tucker, Wesley J; Angadi, Siddhartha S; Adams, Marc A
Walking is a widely accepted and frequently targeted health promotion approach to increase physical activity (PA). Interventions to increase PA have produced only small improvements. Stronger and more potent behavioral intervention components are needed to increase time spent in PA, improve cardiometabolic risk markers, and optimize health. Our aim is to present the rationale and methods from the WalkIT Trial, a 4-month factorial randomized controlled trial (RCT) in inactive, overweight/obese adults. The main purpose of the study was to evaluate whether intensive adaptive components result in greater improvements to adults' PA compared to the static intervention components. Participants enrolled in a 2x2 factorial RCT and were assigned to one of four semi-automated, text message-based walking interventions. Experimental components included adaptive versus static steps/day goals, and immediate versus delayed reinforcement. Principles of percentile shaping and behavioral economics were used to operationalize experimental components. A Fitbit Zip measured the main outcome: participants' daily physical activity (steps and cadence) over the 4-month duration of the study. Secondary outcomes included self-reported PA, psychosocial outcomes, aerobic fitness, and cardiorespiratory risk factors assessed pre/post in a laboratory setting. Participants were recruited through email listservs and websites affiliated with the university campus, community businesses and local government, social groups, and social media advertising. This study has completed data collection as of December 2014, but data cleaning and preliminary analyses are still in progress. We expect to complete analysis of the main outcomes in late 2015 to early 2016. The Walking Interventions through Texting (WalkIT) Trial will further the understanding of theory-based intervention components to increase the PA of men and women who are healthy, insufficiently active and are overweight or obese. WalkIT is one of
Trybula, Walter J.
Reviews the state of research in text mining, focusing on newer developments. The intent is to describe the disparate investigations currently included under the term text mining and provide a cohesive structure for these efforts. A summary of research identifies key organizations responsible for pushing the development of text mining. A section…
Full Text Available L’article analyse le rôle et l’emploi de la voix off dans deux films de Louis Malle : Ascenseur pour l’échafaud (1957 et Le Feu follet (1963, tous deux adaptés d’un roman. Il se concentre notamment sur l’analyse narratologique de la présence de la voix off dans le film, en tenant compte du travail de mise en scène, mais aussi des documents relatifs à l’élaboration du scénario afin de reconstituer le processus d’introduction des éléments off dès la phase d’écriture. Dans Ascenseur pour l’échafaud (1957, on constate l’utilisation récurrente de la « pensée off » d’un personnage féminin créé spécialement pour le film, dont la fonction s’avère être surtout de permettre une caractérisation du personnage masculin. Dans Le Feu follet (1963, l’emploi – atypique parce qu’asynchronique – d’une voix off de commentaire permet d’établir un point de contact avec le roman de Drieu La Rochelle, mais surtout de faire passer dans le film l’inéluctabilité essentielle de l’histoire du protagoniste. Dans les deux films, il apparaît que l’emploi de la voix off contribue à l’élaboration de la narration et constitue un instrument intéressant de « raccord » entre le livre et l’œuvre cinématographique.L’articolo analizza l’impiego e il ruolo della voice-off all’interno di due film di Louis Malle: Ascenseur pour l’échafaud (1957 e Le Feu follet (1963, entrambi frutto dell’adattamento da un romanzo. Si è privilegiata l’analisi narratologica della presenza della voice-off e si è tenuto conto delle note di lavorazione del regista e dei documenti relativi all’elaborazione delle sceneggiature, per ricostruire il processo di introduzione degli elementi off già in fase di scrittura. In Ascenseur pour l’échafaud (1957 si assiste all’utilizzo ricorrente del « pensiero off » di un personaggio femminile creato appositamente per lo schermo, la cui funzione risulta essere
Carl J Baldick
Full Text Available Small molecule inhibitors of hepatitis C virus (HCV are being developed to complement or replace treatments with pegylated interferons and ribavirin, which have poor response rates and significant side effects. Resistance to these inhibitors emerges rapidly in the clinic, suggesting that successful therapy will involve combination therapy with multiple inhibitors of different targets. The entry process of HCV into hepatocytes represents another series of potential targets for therapeutic intervention, involving viral structural proteins that have not been extensively explored due to experimental limitations. To discover HCV entry inhibitors, we utilized HCV pseudoparticles (HCVpp incorporating E1-E2 envelope proteins from a genotype 1b clinical isolate. Screening of a small molecule library identified a potent HCV-specific triazine inhibitor, EI-1. A series of HCVpp with E1-E2 sequences from various HCV isolates was used to show activity against all genotype 1a and 1b HCVpp tested, with median EC50 values of 0.134 and 0.027 µM, respectively. Time-of-addition experiments demonstrated a block in HCVpp entry, downstream of initial attachment to the cell surface, and prior to or concomitant with bafilomycin inhibition of endosomal acidification. EI-1 was equally active against cell-culture adapted HCV (HCVcc, blocking both cell-free entry and cell-to-cell transmission of virus. HCVcc with high-level resistance to EI-1 was selected by sequential passage in the presence of inhibitor, and resistance was shown to be conferred by changes to residue 719 in the carboxy-terminal transmembrane anchor region of E2, implicating this envelope protein in EI-1 susceptibility. Combinations of EI-1 with interferon, or inhibitors of NS3 or NS5A, resulted in additive to synergistic activity. These results suggest that inhibitors of HCV entry could be added to replication inhibitors and interferons already in development.
Full Text Available Organizations that operate in international markets need to make the most important decisions in order to select a best mode of entry into foreign markets. This paper attempts to clarify some of the issues arising in international market selection. A firm must assess before entering a particular market the motives and potential factors that play a significant role during the process of decision making for market selection. An overview of the current methodologies for market selection based on the literature on international marketing is provided. Therefore, the main objective of the paper is to outline and discuss the relevant issues and challenges from a theoretical viewpoint related with the possible entry modes into international and global markets. This paper concentrates on secondary sources of research regarding the internationalisation of businesses. According to the previous literature, scholars have already found out some of determinants influencing the efficiency of foreign entry, such as: economic factors, political risk, legal factors, cultural factor, international experience, etc. A model can be outlined from the theoretical viewpoints about the advantages and disadvantage of each foreign market entry strategy discussed. One of the fundamental steps that need to be taken prior to beginning international marketing is the environmental analysis. There are uncontrollable forces which are external forces upon which the management has no direct control, although it can exert an influence. Internal forces are controllable forces upon which the management administers to adapt to changes in the uncontrollable forces. The conclusion will provide a short summary of identified key elements that need to be considered by management in choosing international markets and their foreign market entry modes.
This paper argues that even temporary barriers to entry present at the very beginning of transition may lead to permanent extortion development. Entry restrictions, if binding, lead to excess profits, which create an incentive to extort. The emergence of extortionists reduces the expected profit from production, making producers expect extortion in the future. If, after this adaptation of expectations, the government removes the barriers to entry, only a few new firms will enter the market. H...
D. A. Seliverstov
Full Text Available The prime focus in this article is on key findings concerning theoretical aspects of strategic behavior by incumbents to deter market entry of new firms. The author summarizes main lines of scientific research in the topic which give an insight into the patterns of the incumbent’s impact on the behavior of the entrants, the entry deterrence instruments and the consequences of these actions. Today the free entry markets are considered to be a rare phenomenon. The market entry of new firms is associated with significant entry costs, which allow the incumbents to take advantage of their dominant position and derive positive economic profits. In case of entry threat by potential competitors the incumbents take strategic actions aimed at deterring entry and preserving their dominant position. Among the most efficient strategic actions one can emphasize the erection of additional barriers to entry for the newcomers through producing the limit output and price, investments in sunk assets, capacity expansion and product differentiation. Meanwhile by taking strategic actions the incumbents are not always trying to affect the entrant’s costs and profit directly, they often aim at changing the entrant’s expectations regarding future intentions of the incumbents to preserve dominant position.
Abstract: A financial management eficiently begin, primarily, with an accounting record kept in the best possible conditions, this being conditioned on the adoption of a uniform forms, rational, clear and simple accounting. Throughout history, there have been known two forms of accounting: the simple and double entry. Romanian society after 1990 underwent a substantial change in social structure, the sector on which put a great emphasis being private, that of small manufacturers, ped...
Full Text Available Flaviviruses enter host cells by endocytosis initiated when the virus particles interact with cell surface receptors. The current model suggests that flaviviruses use at least two different sets of molecules for infectious entry: attachment factors that concentrate and/or recruit viruses on the cell surface and primary receptor(s that bind to virions and direct them to the endocytic pathway. Here, we present the currently available knowledge regarding the flavivirus receptors described so far with specific attention to C-type lectin receptors and the phosphatidylserine receptors, T-cell immunoglobulin and mucin domain (TIM and TYRO3, AXL and MER (TAM. Their role in flavivirus attachment and entry as well as their implication in the virus biology will be discussed in depth.
Department of Transportation — The Bureau of Transportation Statistics (BTS) Border Crossing/Entry Data provides summary statistics for inbound crossings at the U.S.-Canadian and the U.S.-Mexican...
1. Introduction R Analyses of industrial competition have attained a new vigor with the application of game -theoretic methods. The process of... competition is represented in models that reflect genuine struggles for entry, market power, and continuing survival. Dynamics and informational effects are...presents a few of the models developed recently to study competitive processes that affect a firm’s entry into a market , and the decision to exit. The
Preventing recurrence of endometriosis by means of long-acting progestogen therapy (PRE-EMPT): report of an internal pilot, multi-arm, randomised controlled trial incorporating flexible entry design and adaption of design based on feasibility of recruitment.
Middleton, Lee J; Daniels, Jane P; Weckesser, Annalise; Bhattacharya, Siladitya
Endometriosis is associated with the growth of endometrium in ectopic sites mainly within the pelvis. This results in inflammation and scarring, causing pain and impaired quality of life. Endometriotic lesions can be excised or ablated surgically, but the risk of recurrence is high. A Heath Technology Assessment commissioning call in 2011 sought applications for trials aimed at evaluating long-term effectiveness of postoperative, long-acting, reversible contraceptives (LARCs) in preventing recurrence of endometriosis. A survey of gynaecologists indicated that there was no consensus about which LARC (Levonorgestrel Intrauterine System (LNG-IUS) or depot medroxyprogesterone acetate injection (DMPA)) or comparator (combined oral contraceptive pill (COCP) or no treatment) should be evaluated. Hence, we designed a 'flexible-entry' internal pilot to assess whether a four-arm trial was feasible including a possible design adaption based on pilot findings. In this pilot, women could be randomised to two, three or four treatment options provided that one was a LARC and one was a non-LARC. An assessment of feasibility based on recruitment to these options and a revised substantive trial design was considered by an independent oversight committee. The study ran for 1 year from April 2014 and 77 women were randomised. Only 5 (6%) women accepted randomisation to all groups, with 63 (82%) having a LARC preference and 55 (71%) a non-LARC preference. Four-way and three-way designs were ruled out with a two-way LARC versus COCP design, stratified by prerandomisation choice of LARC and optional subrandomisation to LNG-IUS versus DMPA considered a feasible substantive study. Multi-arm studies are potentially efficient as they can answer multiple questions simultaneously but are difficult to recruit to if there are strong patient or clinician preferences. A flexible approach to randomisation in a pilot phase can be used to assess feasibility of such studies and modify a trial design
Perotti, E.; Vorage, M.
We model a setting in which citizens form coalitions to seek preferential entry to a given market. The lower entry the higher firm profits and political contributions, but the lower social welfare. Politicians choose to either control entry directly and be illegally bribed, or regulate entry using a
This paper examines the use of exclusive dealing agreements to prevent the entry of rival firms. An exclusive dealing agreement is a contract between a buyer and a seller where the buyer commits to buy a good exclusively from the seller. One main concern of the literature is to explain how an incumbent seller is able to persuade the buyers to sign an exclusive dealing agreement that deters the entry of a more efficient rival seller. We propose a new explanation when the buyers are downstream ...
John W. UPSON
Full Text Available Market entry is the essence of strategy and is largely viewed as a dichotomous event: entry or no entry. What has not been acknowledged is the uniqueness of each market entry. Our study highlights the scale of market entry in the context of multipoint competition. We assert that entry scale varies based on the risk of market incumbent retaliation. Theory suggests that when risk associated with retaliation are low, firms enter with large scale and when associated risks are high, firms enter with low scale. Further, survival is viewed as dependent on following theory. We argue and find supporting evidence that firms behave in the opposite manner and do so to their own benefit, thereby revealing a unique discrepancy between theory and practice among 75 product market entries by 27 firms.
Perotti, E.C.; Volpin, P.
We develop a model of endogenous lobby formation in which wealth inequality and political accountability undermine entry and financial development. Incumbents seek a low level of effective investor protection to prevent potential entrants from raising capital. They succeed because they can promise
Full Text Available For sustainable utilization of limited coal resources, it is important to increase the coal recovery rate and reduce mine accidents, especially those occurring in the entry (gateroad. Entry stabilities are vital for ventilation, transportation and other essential services in underground coal mining. In the present study, a finite difference model was built to investigate stress evolutions around the entry, and true triaxial tests were carried out at the laboratory to explore entry wall stabilities under different mining conditions. The modeling and experimental results indicated that a wide coal pillar was favorable for entry stabilities, but oversize pillars caused a serious waste of coal resources. As the width of the entry wall decreased, the integrated vertical stress, induced by two adjacent mining panels, coupled with each other and experienced an increase on the entry wall, which inevitably weakened the stability of the entry. Therefore, mining with coal pillars always involves a tradeoff between economy and safety. To address this problem, an innovative non-pillar mining technique by optimizing the entry surrounding structures was proposed. Numerical simulation showed that the deformation of the entry roof decreased by approximately 66% after adopting the new approach, compared with that using the conventional mining method. Field monitoring indicated that the stress condition of the entry was signiﬁcantly improved and the average roof pressure decreased by appropriately 60.33% after adopting the new technique. This work provides an economical and effective approach to achieve sustainable exploitation of underground coal resources.
Steed, Chad A [ORNL; Symons, Christopher T [ORNL; Senter, James K [ORNL; DeNap, Frank A [ORNL
This research demonstrates the promise of augmenting interactive visualizations with semi- supervised machine learning techniques to improve the discovery of significant associations and insights in the search and analysis of textual information. More specifically, we have developed a system called Gryffin that hosts a unique collection of techniques that facilitate individualized investigative search pertaining to an ever-changing set of analytical questions over an indexed collection of open-source documents related to critical national infrastructure. The Gryffin client hosts dynamic displays of the search results via focus+context record listings, temporal timelines, term-frequency views, and multiple coordinate views. Furthermore, as the analyst interacts with the display, the interactions are recorded and used to label the search records. These labeled records are then used to drive semi-supervised machine learning algorithms that re-rank the unlabeled search records such that potentially relevant records are moved to the top of the record listing. Gryffin is described in the context of the daily tasks encountered at the US Department of Homeland Security s Fusion Center, with whom we are collaborating in its development. The resulting system is capable of addressing the analysts information overload that can be directly attributed to the deluge of information that must be addressed in the search and investigative analysis of textual information.
Agrawal, P.; Allen, G. A.; Hwang, H. H.; Marley, M. S.; McGuire, M. K.; Garcia, J. A.; Sklyanskiy, E.; Huynh, L. C.; Moses, R. W.
To better understand the technology requirements for Uranus atmospheric entry probe, Entry Vehicle Technology project funded an internal study with a multidisciplinary team from NASA Ames, Langley and JPL. The results of this study are communicated.
Department of Transportation — The dataset is known as “Border Crossing/Entry Data.” The Bureau of Transportation Statistics (BTS) Border Crossing/Entry Data provides summary statistics to the...
Full Text Available This paper expands the discussion of the importance and function of adjusting entries for loan receivables. Discussion of the cyclical development of adjusting entries, their negative impact on the business cycle and potential solutions has intensified during the financial crisis. These discussions are still ongoing and continue to be relevant to members of the professional public, banking regulators and representatives of international accounting institutions. The objective of this paper is to evaluate a method of journaling dynamic adjusting entries under current accounting law. It also expresses the authors’ opinions on the potential for consistently implementing basic accounting principles in journaling adjusting entries for loan receivables under a dynamic model.
Full Text Available A computationally sufficient technique is used to solve the 3-D cooperative re-entry guidance problem for hypersonic gliding vehicles. Due to the poor surrounding adaptive ability of the traditional cooperative guidance methods, a novel methodology, named as model predictive static programming (MPSP, is used to solve a class of finite-horizon optimal control problems with hard terminal constraints. The main feature of this guidance law is that it is capable of hitting the target with high accuracy for each one of the cooperative vehicles at the same time. In addition, it accurately satisfies variable constraints. Performance of the proposed MPSP-based guidance is demonstrated in 3-D nonlinear dynamics scenario. The numerical simulation results show that the proposed cooperative re-entry guidance methodology has the advantage of computational efficiency and better robustness against the perturbations.
Full Text Available Despite the unquestionable success of antiretroviral therapy (ART in the treatment of HIV infection, the cost, need for daily adherence, and HIV-associated morbidities that persist despite ART all underscore the need to develop a cure for HIV. The cure achieved following an allogeneic hematopoietic stem cell transplant (HSCT using HIV-resistant cells, and more recently, the report of short-term but sustained, ART-free control of HIV replication following allogeneic HSCT, using HIV susceptible cells, have served to both reignite interest in HIV cure research, and suggest potential mechanisms for a cure. In this review, we highlight some of the obstacles facing HIV cure research today, and explore the roles of gene therapy targeting HIV entry, and allogeneic stem cell transplantation in the development of strategies to cure HIV infection.
The effect of purely persuasive advertising on generic market entry and social welfare is analysed. An incumbent has the possibility to invest in advertising which affects the prescribing physician's perceived relative qualities of the brand-name and the generic version of the drug. Advertising creates product differentiation and can induce generic market entry which is deterred without differentiation due to strong Bertrand competition. However, over-investment in advertising can deter generic market entry under certain conditions and reduces welfare as compared to accommodated market entry.
The function of an entry-control system in a total Physical Protection System is to allow the movement of authorized personnel and material through normal access routes, yet detect and delay unauthorized movement of personnel and material from uncontrolled areas. The ten chapters of this handbook cover: introduction, credentials, personnel identity verification systems, special nuclear materials monitors, metal detectors, explosives sensors, package search systems, criteria for selection of entry-control equipment, machine-aided manual entry-control systems, and automated entry-control systems. A system example and its cost are included as an appendix
Инесса Анатольевна Воробьёва
Full Text Available To ensure the effectiveness of settings (adaptation created software and hardware on the particular subject of the method was developed for adaptation under the parameters of the subject of information interaction in the form of a set of operations to build a network dialog procedures on the basis of accounting for entry-level qualification of the subject, assessment of the current level of skills and operational restructuring of the network in accordance with the assessment of his level.
Full Text Available Purpose: The purpose of the paper is to explore the entry modes of EU firms setting up operations in Vietnam. Design/methodology/approach: we use a case study approach on Haymarket, Cadbury, Creative Education, Fairchild, Aventis and Artemisinin and Farming International using interviews from managerial professionals in Vietnam. Findings: Despite the fact that Vietnam has been opening up for more than 20 years, licensing is the preferred entry mode because of the risks involved in venturing with local firms; that preference signals a low level commitment and a high perception of risk and state interference. In line with Vietnam transition to state - rather than private market - capitalism, a foreign company opting for a joint-venture will do so with a state-owned rather than privately-owned company. The choice of a subsidiary can be explained by the lack of trust in partners and institutions, not by improvement in the socio-political environment. Limitations: In determining the entry mode strategy, the paper focuses on the Uppsala school’s “psychic distance” (e.g. cultural distance, lack of trust rather than on firm-specific advantages (Rugman, 1980; 2006. Key-words: international entry mode; emerging markets; subsidiary; joint-venture; India; Vietnam
Full Text Available Enterovirus B species (EV-B are responsible for a vast number of mild and serious acute infections. They are also suspected of remaining in the body, where they cause persistent infections contributing to chronic diseases such as type I diabetes. Recent studies of the infectious entry pathway of these viruses revealed remarkable similarities, including non-clathrin entry of large endosomes originating from the plasma membrane invaginations. Many cellular factors regulating the efficient entry have recently been associated with macropinocytic uptake, such as Rac1, serine/threonine p21-activated kinase (Pak1, actin, Na/H exchanger, phospholipace C (PLC and protein kinase Cα (PKCα. Another characteristic feature is the entry of these viruses to neutral endosomes, independence of endosomal acidification and low association with acidic lysosomes. The biogenesis of neutral multivesicular bodies is crucial for their infection, at least for echovirus 1 (E1 and coxsackievirus A9 (CVA9. These pathways are triggered by the virus binding to their receptors on the plasma membrane, and they are not efficiently recycled like other cellular pathways used by circulating receptors. Therefore, the best “markers” of these pathways may be the viruses and often their receptors. A deeper understanding of this pathway and associated endosomes is crucial in elucidating the mechanisms of enterovirus uncoating and genome release from the endosomes to start efficient replication.
Marvin O. Bates
Full Text Available Purpose – The purpose of this article is to describe the marketing-oriented market entry approaches that businesses are currently using across the three levels of the world economic pyramid (i.e., WEP. These levels are the Top-tier, the Middle-tier, and the Base of the Pyramid-tier (i.e., BoP-tier. Methodology – The literature of the BoP was reviewed, and market entry approaches were itemized across the three WEP levels. Secondly, BoP strategic theorists including Prahalad identified the need for a BoP marketing focus replacing the traditional 4Ps marketing approach (i.e., Product, Price, Place and Promotion with the BoP-specific 4As marketing approach (i.e., Awareness, Affordability, Access and Availability. This 4As marketing approach is discussed. Findings – New marketing-oriented market-entry approaches are proposed for each of the three WEP levels. These approaches are based on where in the WEP the firm currently exists, and where in the WEP the firm desires to refocus market-entry activities; identified approaches include: inter-country expansion, intra-country entry, adjacent market entry, and extended market entry. Secondly, the absence of a clearly articulated marketing strategy for middle-tier markets was observed. Practical implications – This article has two specific applications. First, it summarizes the evolving market entry perspectives to provide a context for future market research in both emerging markets and the pre-emerging BoP markets. Second, the future requirement for an articulated marketing strategy for middle-tier markets is suggested. Originality – This article examined existing market entry approaches across all three levels of the WEP, inclusive of the BoP economic level. The language used to clarify market entry movements was extended, providing a specificity of description not previously found in either the existing market entry or BoP literature.
Davies, Florence; Greene, Terry
This paper describes Directed Activities Related to Text (DART), procedures that were developed and are used in the Reading for Learning Project at the University of Nottingham (England) to enhance learning from texts and that fall into two broad categories: (1) text analysis procedures, which require students to engage in some form of analysis of…
Mo Xiao; Peter F. Orazem
Past empirical literature provides strong evidence that competition increases when new firms enter a market. However, rarely have economists been able to examine how competition changes with the threat of entry. This paper uses the evolution of the zip code level market structure of facilities-based broadband providers from 1999 to 2004 to investigate how a firm adjusts its entry strategy when facing the threat of additional entrants. We identify the potential entrant into a local market as t...
Full Text Available In this study, we examine how initial public offerings (IPO entry rates are affected when stock markets are boundedly rational and IPO firms infer information from their counterparts in the market. We hypothesize a curvilinear relationship between the number of comparable stocks and initial public offerings (IPO entry rates into the NASDAQ Stock Exchange. Furthermore, we argue that trading volume and changes in stock returns partially mediates the relationship between the number of comparable stocks and IPO entry rates. The statistical evidence provides strong support for the hypotheses.
Full Text Available Japanese Foreign Direct Investment (FDI in the European Union and its performance were analysed in this work. Three different FDI or entry modes used by Japanese companies to enter the European market were compared, and the presence of a relationship between the selected entry mode and the performance of the subsidiary was investigated. We found that more than half of the Japanese investments in Europe took the form of new ventures, approximately 40% were joint ventures and less than 6% were acquisitions. We found that no specific entry mode performed better than another.
Full Text Available Text mining deals with complex and unstructured texts. Usually a particular collection of texts that is specified to one or more domains is necessary. We have developed a customizable text classifier for users to mine the collection automatically. It derives from the sentence category of the HNC theory and corresponding techniques. It can start with a few texts, and it can adjust automatically or be adjusted by user. The user can also control the number of domains chosen and decide the standard with which to choose the texts based on demand and abundance of materials. The performance of the classifier varies with the user's choice.
This reference authority has been created and is maintained to provide standard forms for recording the names of organizations consistently in bibliographic citations. This revision includes approximately 42,000 entries established since 1973
Calzada, Joan; Valletti, Tommaso
We develop a model of logit demand that extends to a multi-firm industry the traditional duopoly framework of network competition with access charges. Firstly, we show that, when incumbents do not face the threat of entry and compete in prices, they inefficiently establish the reciprocal access charge below cost. This inefficiency disappears if incumbents compete in utilities instead of prices. Secondly, we study how incumbents change their choices under the threat of entry when they determin...
Recent research suggests that adopting a common currency increases bilateral trade. In this paper, I explore experiences of currency union entry in the post-war period and find no effect on trade. Previous results derived from a large panel data set (covering more than 200 countries from 1948 through 1997) appear to depend crucially on the assumption of symmetry between currency union exits and entries: While countries leaving a currency union experience significant declines in trade, currenc...
MSc. Florida Veljanoska
Full Text Available This paper investigates the effects of foreign bank entry in emerging markets. We developed a picture of a multinational bank in an emerging markets by combining statistics from several sources, in order to explore broad range of effects that brings foreign bank entry in the developing countries. Some impacts of foreign bank entry have been thoroughly studied, while others are hardly mention. Entry of foreign bank brings large benefits to host country’s financial system and economies at large. This paper is studying those benefits very carefully, by analyzing the impact of foreign bank entry on economy, government, monetary policy, large enterprises, small and medium size enterprises, domestic bank etc. But, we also consider the fact that at the same time, foreign investment in the financial sector, rises some concerns, and therefore we analyze the negative effects as well. At the end we must admit that although there are some negative consequences from foreign bank entry in emerging markets, the benefits that arise from foreign banks penetration are much more, and this trend of foreign bank entry has brought new positive economic impulse in developing world.
Full Text Available In human and nonhuman primates, filoviruses (Ebola and Marburg viruses cause severe hemorrhagic fever．Recently, other animals such as pigs and some species of fruit bats have also been shown to be susceptible to these viruses. While having a preference for some cell types such as hepatocytes, endothelial cells, dendritic cells, monocytes, and macrophages, filoviruses are known to be pantropic in infection of primates. The envelope glycoprotein (GP is responsible for both receptor binding and fusion of the virus envelope with the host cell membrane. It has been demonstrated that filovirus GP interacts with multiple molecules for entry into host cells, whereas none of the cellular molecules so far identified as a receptor/coreceptor fully explains filovirus tissue tropism and host range. Available data suggest that the mucin-like region (MLR on GP plays an important role in attachment to the preferred target cells, whose infection is likely involved in filovirus pathogenesis, whereas the MLR is not essential for the fundamental function of the GP in viral entry into cells in vitro. Further studies elucidating the mechanisms of cellular entry of filoviruses may shed light on the development of strategies for prophylaxis and treatment of Ebola and Marburg hemorrhagic fevers.
The text of the relationship agreement which the Agency has concluded with the United Nations Industrial Development Organization, together with the protocol regarding its entry into force is reproduced. The agreement entered into force on 9 October 1987
Gerard de Valence
Full Text Available This research looks at the significance of barriers that firms considering entry into the construction industry might face. Drawing on the microeconomic characteristics of imperfectly competitive and oligopolistic markets the analysis finds that there are a dozen barriers to entry that affect the industry, but their significance depends on the product type. The discussion covers the question of product homogeneity in construction and evidence for the existence of barriers to entry in concentration levels. Barriers to entry specific to construction are then identified, which leads to an analysis of how they operate and their significance (high, medium or low in different market types, thus increasing our understanding of construction industry dynamics.
Roger Lee Mendoz
Full Text Available BACKGROUND Unlike many other countries, only 19% of physicians remain independent or solo practitioners in the United States. This study seeks to determine if entry barriers to solo practice exist in physician services markets with a predominantly suburban patient base. Any entry barrier will play a critical role in a wide variety of competition and income-related issues in these markets. MATERIALS AND METHODS This study hypothesizes that substantial deterrence to entry is present in suburban settings where physician competition is typically much less than metropolitan areas. Information about their competitive position was obtained from solo primary care physicians (PCPs and specialists in southern New Jersey municipalities. Two-sample t - tests (α =0.05 ascertained whether the means differences of these two groups are statistically significant for the population from which they were sampled. Regression coefficients were computed for the magnitude of differences in barrier impact between samples. RESULTS Adapting the Orr model, E = ß0 e ß 1 (πp -π* e ß 2 Q . S ß 3 µ, to this study allowed us to estimate the overall height of entry barriers to suburban solo practice. The study finds that entry barriers tend to have moderate effects on PCPs, with the exception of legal and regulatory compliance which are just as burdensome to specialists. Risk and insurance, capital, advertising, research and development (R & D as well as market concentration are far more challenging to solo specialists mainly due to overuse of already costly tests, procedures, and medications by specialists for "defensive medicine," and heavy reliance on specialists by PCPs. Labor costs are associated with several barriers. CONCLUSION Despite their declining population, market entry (and presumably survival of solo physicians is not as straightforward of a phenomenon as conjectural and anecdotal evidence might suggest. Medical specialty offers an explanatory variable
Spencer, Brenda H.
Notes that a text map is an instructional approach designed to help students gain fluency in reading content area materials. Discusses how the goal is to teach students about the important features of the material and how the maps can be used to build new understandings. Presents the procedures for preparing and using a text map. (SG)
Kafkas, Şenay; Kim, Jee-Hyub; McEntyre, Johanna R
Molecular biology and literature databases represent essential infrastructure for life science research. Effective integration of these data resources requires that there are structured cross-references at the level of individual articles and biological records. Here, we describe the current patterns of how database entries are cited in research articles, based on analysis of the full text Open Access articles available from Europe PMC. Focusing on citation of entries in the European Nucleotide Archive (ENA), UniProt and Protein Data Bank, Europe (PDBe), we demonstrate that text mining doubles the number of structured annotations of database record citations supplied in journal articles by publishers. Many thousands of new literature-database relationships are found by text mining, since these relationships are also not present in the set of articles cited by database records. We recommend that structured annotation of database records in articles is extended to other databases, such as ArrayExpress and Pfam, entries from which are also cited widely in the literature. The very high precision and high-throughput of this text-mining pipeline makes this activity possible both accurately and at low cost, which will allow the development of new integrated data services.
Travers, Debbie A; Haas, Stephanie W
Emergency Medical Text Processor (EMT-P) version 1, a natural language processing system that cleans emergency department text (e.g., chst pn, chest pai), was developed to maximize extraction of standard terms (e.g., chest pain). The authors compared the number of standard terms extracted from raw chief complaint (CC) data with that for CC data cleaned with EMT-P and evaluated the accuracy of EMT-P. This cross-sectional observation study included CC text entries for all emergency department visits to three tertiary care centers in 2001. Terms were extracted from CC entries before and after cleaning with EMT-P. Descriptive statistics included number and percentage of all entries (tokens) and all unique entries (types) that matched a standard term from the Unified Medical Language System (UMLS). An expert panel rated the accuracy of the CC-UMLS term matches; inter-rater reliability was measured with kappa. The authors collected 203,509 CC entry tokens, of which 63,946 were unique entry types. For the raw data, 89,337 tokens (44%) and 5,081 types (8%) matched a standard term. After EMT-P cleaning, 168,050 tokens (83%) and 44,430 types (69%) matched a standard term. The expert panel reached consensus on 201 of the 222 CC-UMLS term matches reviewed (kappa=0.69-0.72). Ninety-six percent of the 201 matches were rated equivalent or related. Thirty-eight percent of the nonmatches were found to match UMLS concepts. EMT-P version 1 is relatively accurate, and cleaning with EMT-P improved the CC-UMLS term match rate over raw data. The authors identified areas for improvement in future EMT-P versions and issues to be resolved in developing a standard CC terminology.
Coquin, Didier; Tailland, Johan; Cintract, Michel
Intelligent surveillance has become an important research issue due to the high cost and low efficiency of human supervisors, and machine intelligence is required to provide a solution for automated event detection. In this paper we describe a real-time system that has been used for detecting car park entries, using an adaptive background learning algorithm and two indicators representing activity and identity to overcome the difficulty of tracking objects.
van der Made, Allard; Schoonbeek, Lambert
We consider a model of vertical product differentiation where consumers care about the environmental damage their consumption causes. An environmental group is capable of increasing consumers' environmental concern via a costly campaign. We show that the prospect of such a campaign can induce entry
Ebola virus is an enveloped virus with filamentous structure and causes a severe hemorrhagic fever in human and nonhuman primates. Host cell entry is the first essential step in the viral life cycle, which has been extensively studied as one of the therapeutic targets. A virus factor of cell entry is a surface glycoprotein (GP), which is an only essential viral protein in the step, as well as the unique particle structure. The virus also interacts with a lot of host factors to successfully enter host cells. Ebola virus at first binds to cell surface proteins and internalizes into cells, followed by trafficking through endosomal vesicles to intracellular acidic compartments. There, host proteases process GPs, which can interact with an intracellular receptor. Then, under an appropriate circumstance, viral and endosomal membranes are fused, which is enhanced by major structural changes of GPs, to complete host cell entry. Recently the basic research of Ebola virus infection mechanism has markedly progressed, largely contributed by identification of host factors and detailed structural analyses of GPs. This article highlights the mechanism of Ebola virus host cell entry, including recent findings.
Jessica Camara Siqueira
Full Text Available Language dictionaries present the meaning of an entry in a way not restricted to linguistic information, since we also have interdisciplinary and contextual aspects that dialogue with socio-cultural issues in which the entry is inserted. Considering the potential character of the study of contextual meanings, the “death” entry was chosen to carry out a comparative analysis among language dictionaries. The choice was motivated by the recurrence of this entry in ancient and contemporary dictionaries, and the fact of its having a concept that allows various historical, social and ideological discussions. The goal is to reveal the diﬀerent nuances of the “death” entry in language dictionaries, observing four main aspects: etymology, diachrony, synonymic construction and meaning of “death” in school dictionaries. Based on lexicographical studies of classical authors, we did a comparative analysis of meanings of “death” in diﬀerent types of language dictionaries. We found that in each group dictionary we may ﬁnd traces of ideological choices in the construction of the contextual meaning of the “death” entry.
Full Text Available This paper analyzes the effects of investment in advertising in the three-stage entry game model with one incumbent and one potential entrant firm. It is shown that if a game theory is applied, under particular conditions, advertising can be used as a strategic weapon in the market entry game. Depending on the level of the advertising interaction factor, conditions for over-investment in advertising for strategic purposes are given. Furthermore, three specific cases are analyzed: strictly predatory advertising, informative advertising and the case when one firm’s advertising cannot directly influence the other firm's profit. For each of them, depending on the costs of advertising and marginal costs, equilibrium is determined, and conditions under which it is possible to deter the entry are given. It is shown that if the value of the advertising interaction factor increases, power of using advertising as a weapon to deter entry into the market decreases. Thus, in the case of informative advertising, advertising cannot be used as a tool for deterring entry into the market, while in the case of predatory advertising, it can. Also, we have proved that in the case of strictly informative advertising an over-investment never occurs, while in the two other cases, there is always over-investment either to deter or to accommodate the entry.
Full Text Available The entry of a multinational into a cluster, a geographic agglomeration in a given place or region of predominantly small and medium enterprises specialized in a given industry or related industries, impacts the incumbent in the cluster. Aiming to identify the main effects of a multinational entry on the firms’ strategy in a cluster, it was analyzed the entry of IKEA, a Swedish multinational, into the cluster of furniture production in Paços de Ferreira and Paredes, in Portugal. In this study, the data collection technique to access primary data was a survey. The sample has small enterprises, which is similar to the structure of firms in the studied cluster. Results show that more than half the sample thinks that the entry of the multinational had not affected them. However, the firms that acknowledge a significant impact, assess that impact as negative. The competitiveness factors that have improved more significantly after IKEA’s entry were new product development and exporting strategies. The main responses of incumbent firms to the multinational entry were internationalization and the development of generic strategies of differentiation and focus based on differentiation.
Full Text Available Herpes Simplex virus (HSV is associated with a variety of diseases such as genital herpes and numerous ocular diseases. At the global level, high prevalence of individuals who are seropositive for HSV, combined with its inconspicuous infection, remains a cause for major concern. At the molecular level, HSV entry into a host cell involves multiple steps, primarily the interaction of viral glycoproteins with various cell surface receptors, many of which have alternate substitutes. The molecular complexity of the virus to enter a cell is also enhanced by the existence of different modes of viral entry. The availability of many entry receptors, along with a variety of entry mechanisms, has resulted in a virus that is capable of infecting virtually all cell types. While HSV uses a wide repertoire of viral and host factors in establishing infection, current therapeutics aimed against the virus are not as diversified. In this particular review, we will focus on the initial entry of the virus into the cell, while highlighting potential novel therapeutics that can control this process. Virus entry is a decisive step and effective therapeutics can translate to less virus replication, reduced cell death, and detrimental symptoms.
Smith, Brandon; Jan, Darrell Leslie; Venkatapathy, Etiraj
The Nano Entry System for CubeSat-Class Payloads led to the development of the Nano-Adaptable Deployable Entry and Placement Technology ("Nano-ADEPT"). Nano-ADEPT is a mechanically deployed entry, descent, and landing (EDL) system that stows during launch and cruise (like an umbrella) and serves as both heat shield and primary structure during EDL. It is especially designed for small spacecraft where volume is a limiting constraint.
Brammer, Jeremy R; Brunet, Nicolas D; Burton, A Cole; Cuerrier, Alain; Danielsen, Finn; Dewan, Kanwaljeet; Herrmann, Thora Martina; Jackson, Micha V; Kennett, Rod; Larocque, Guillaume; Mulrennan, Monica; Pratihast, Arun Kumar; Saint-Arnaud, Marie; Scott, Colin; Humphries, Murray M
Many argue that monitoring conducted exclusively by scientists is insufficient to address ongoing environmental challenges. One solution entails the use of mobile digital devices in participatory monitoring (PM) programs. But how digital data entry affects programs with varying levels of stakeholder participation, from nonscientists collecting field data to nonscientists administering every step of a monitoring program, remains unclear. We reviewed the successes, in terms of management interventions and sustainability, of 107 monitoring programs described in the literature (hereafter programs) and compared these with case studies from our PM experiences in Australia, Canada, Ethiopia, Ghana, Greenland, and Vietnam (hereafter cases). Our literature review showed that participatory programs were less likely to use digital devices, and 2 of our 3 more participatory cases were also slow to adopt digital data entry. Programs that were participatory and used digital devices were more likely to report management actions, which was consistent with cases in Ethiopia, Greenland, and Australia. Programs engaging volunteers were more frequently reported as ongoing, but those involving digital data entry were less often sustained when data collectors were volunteers. For the Vietnamese and Canadian cases, sustainability was undermined by a mismatch in stakeholder objectives. In the Ghanaian case, complex field protocols diminished monitoring sustainability. Innovative technologies attract interest, but the foundation of effective participatory adaptive monitoring depends more on collaboratively defined questions, objectives, conceptual models, and monitoring approaches. When this foundation is built through effective partnerships, digital data entry can enable the collection of more data of higher quality. Without this foundation, or when implemented ineffectively or unnecessarily, digital data entry can be an additional expense that distracts from core monitoring objectives
Text-Fabric is a Python3 package for Text plus Annotations. It provides a data model, a text file format, and a binary format for (ancient) text plus (linguistic) annotations. The emphasis of this all is on: data processing; sharing data; and contributing modules. A defining characteristic is that
With the dramatic growth of text information, there is an increasing need for powerful text mining systems that can automatically discover useful knowledge from text. Text is generally associated with all kinds of contextual information. Those contexts can be explicit, such as the time and the location where a blog article is written, and the…
Riggs, Ken Roger
Discusses problems with marking free text, text that is either natural language or semigrammatical but unstructured, that prevent well-formed XML from marking text for readily available meaning. Proposes a solution to mark meaning in free text that is consistent with the intended simplicity of XML versus SGML. (Author/LRW)
Improving Eleventh Graders' Reading Comprehension through Text Coding and Double Entry Organizer Reading Strategies (Mejoramiento de la comprensión lectora de estudiantes de grado once mediante las estrategias de lectura de codificación de texto y organizador de doble entrada)
Mahecha, Rocío; Urrego, Stella; Lozano, Erika
In this article we report on an innovation project developed with a group of eleventh graders at a public school in Bogotá. Its aim was to encourage students to improve reading comprehension of texts in English. It was conducted taking into account students' needs, interests and level of English. To do it, we implemented two reading strategies:…
Delgado de Valencia Sonia
Full Text Available The use of supplementary materials in the classroom has always been an essential part of the teaching and learning process. To restrict our teaching to the scope of one single textbook means to stand behind the advances of knowledge, in any area and context. Young learners appreciate any new and varied support that expands their knowledge of the world: diaries, letters, panels, free texts, magazines, short stories, poems or literary excerpts, and articles taken from Internet are materials that will allow learnersto share more and work more collaboratively. In this article we are going to deal with some of these materials, with the criteria to select, adapt, and create them that may be of interest to the learner and that may promote reading and writing processes. Since no text can entirely satisfy the needs of students and teachers, the creativity of both parties will be necessary to improve the quality of teaching through the adequate use and adaptation of supplementary materials.
Two full-scale passive Earth Entry Vehicles (EEV) with realistic structure, surrogate sample container, and surrogate Thermal Protection System (TPS) were built at NASA Langley Research Center (LaRC) and tested at the Utah Test and Training Range (UTTR). The main test objective was to demonstrate structural integrity and investigate possible impact response deviations of the realistic vehicle as compared to rigid penetrometer responses. With the exception of the surrogate TPS and minor structural differences in the back shell construction, the two test vehicles were identical in geometry and both utilized the Integrated Composite Stiffener Structure (ICoSS) structural concept in the forward shell. The ICoSS concept is a lightweight and highly adaptable composite concept developed at NASA LaRC specifically for entry vehicle TPS carrier structures. The instrumented test vehicles were released from a helicopter approximately 400 m above ground. The drop height was selected such that at least 98% of the vehicles terminal velocity would be achieved. While drop tests of spherical penetrometers and a low fidelity aerodynamic EEV model were conducted at UTTR in 1998 and 2000, this was the first time a passive EEV with flight-like structure, surrogate TPS, and sample container was tested at UTTR for the purpose of complete structural system validation. Test results showed that at a landing vertical speed of approximately 30 m/s, the test vehicle maintained structural integrity and enough rigidity to penetrate the sandy clay surface thus attenuating the landing load, as measured at the vehicle CG, to less than 600 g. This measured deceleration was found to be in family with rigid penetrometer test data from the 1998 and 2000 test campaigns. Design implications of vehicle structure/soil interaction with respect to sample container and sample survivability are briefly discussed.
We propose to develop a robust guidance and control system for the ADEPT (Adaptable Deployable Entry and Placement Technology) entry vehicle. A control-centric model of ADEPT will be developed to quantify the performance of candidate guidance and control architectures for both aerocapture and precision landing missions. The evaluation will be based on recent breakthroughs in constrained controllability/reachability analysis of control systems and constrained-based energy-minimum trajectory optimization for guidance development operating in complex environments.
Finnemann, Niels Ole
text can be defined by taking as point of departure the digital format in which everything is represented in the binary alphabet. While the notion of text, in most cases, lends itself to be independent of medium and embodiment, it is also often tacitly assumed that it is, in fact, modeled around...... the print medium, rather than written text or speech. In late 20th century, the notion of text was subject to increasing criticism as in the question raised within literary text theory: is there a text in this class? At the same time, the notion was expanded by including extra linguistic sign modalities...
George Maksimovich Noseevich
Full Text Available The problem of the oblique water entry of a three dimensional body is considered. Wagner theory is the theoretical framework. Applications are discussed for an elliptic paraboloid entering an initially flat free surface. A dedicated experimental campaign yields a data base for comparisons. In the present analysis, pressure, force and dynamics of the wetted surface expansion are assessed.
Full Text Available Brian Sims,1,2,* Linlin Gu,3,* Alexandre Krendelchtchikov,3 Qiana L Matthews3,4 1Division of Neonatology, Department of Pediatrics, 2Department of Cell, Developmental, and Integrative Biology, 3Division of Infectious Diseases, Department of Medicine, 4Center for AIDS Research, University of Alabama at Birmingham, Birmingham, AL, USA *These authors contributed equally to this work Background: Viruses enter host cells through interactions of viral ligands with cellular receptors. Viruses can also enter cells in a receptor-independent fashion. Mechanisms regarding the receptor-independent viral entry into cells have not been fully elucidated. Exosomal trafficking between cells may offer a mechanism by which viruses can enter cells.Methods: To investigate the role of exosomes on cellular viral entry, we employed neural stem cell-derived exosomes and adenovirus type 5 (Ad5 for the proof-of-principle study. Results: Exosomes significantly enhanced Ad5 entry in Coxsackie virus and adenovirus receptor (CAR-deficient cells, in which Ad5 only had very limited entry. The exosomes were shown to contain T-cell immunoglobulin mucin protein 4 (TIM-4, which binds phosphatidylserine. Treatment with anti-TIM-4 antibody significantly blocked the exosome-mediated Ad5 entry.Conclusion: Neural stem cell-derived exosomes mediated significant cellular entry of Ad5 in a receptor-independent fashion. This mediation may be hampered by an antibody specifically targeting TIM-4 on exosomes. This set of results will benefit further elucidation of virus/exosome pathways, which would contribute to reducing natural viral infection by developing therapeutic agents or vaccines. Keywords: neural stem cell-derived exosomes, adenovirus type 5, TIM-4, viral entry, phospholipids
... text. What's the Big Deal? The problem is multitasking. No matter how young and agile we are, ... on something other than the road. In fact, driving while texting (DWT) can be more dangerous than ...
Hashai, Niron; Geisler Asmussen, Christian; Benito, Gabriel
diversity across value chain activities and host markets. Analyzing a sample of Israeli based firms we show that larger firms exhibit a higher degree of entry mode diversity both across value chain activities and across host markets. Higher levels of knowledge intensity are also associated with more......This paper expands entry mode literature by referring to multiple modes exerted in different value chain activities within and across host markets, rather than to a single entry mode at the host market level. Scale of operations and knowledge intensity are argued to affect firms' entry mode...... diversity in firms' entry modes across both dimensions....
Morton, F M
Data on all generic drug entries in the period 1984-1994 are used to estimate which markets heterogeneous potential entrants will decide to enter. I find that organizational experience predicts entry. Firms tend to enter markets with supply and demand characteristics similar to the firm's existing drugs. Larger revenue markets, markets with more hospital sales, and products that treat chronic conditions attract more entry. The simultaneous nature of entry leads to an additional interpretation: specialization is profitable because of the severe risk to profits when a market is "overentered." However, I am unable to make any conclusions about the efficiency of entry decisions.
In the thesis a coherent text is defined as a continuity of senses of the outcome of combining concepts and relations into a network composed of knowledge space centered around main topics. And the author maintains that in order to obtain the coherence of a target language text from a source text during the process of translation, a translator can…
Alan L. Landgraf
Full Text Available An experiment was conducted to design a corporate author index to a large bibliographic file. The nature of corporate entries necessitates a different search key construction from that of personal names or titles. Derivation of a search key to select distinct corporate entry records is discussed.
Auweter-Kurtz, M.; Endlich, P.; Herdrich, G.; Kurtz, H.; Laux, T.; Löhle, S.; Nazina, N.; Pidan, S.
Entering the atmosphere of celestial bodies, spacecrafts encounter gases at velocities of several km/s, thereby being subjected to great heat loads. The thermal protection systems and the environment (plasma) have to be investigated by means of computational and ground facility based simulations. For more than a decade, plasma wind tunnels at IRS have been used for the investigation of TPS materials. Nevertheless, ground tests and computer simulations cannot re- place space flights completely. Particularly, entry mission phases encounter challenging problems, such as hypersonic aerothermodynamics. Concerning the TPS, radiation-cooled materials used for reuseable spacecrafts and ablator tech- nologies are of importance. Besides the mentioned technologies, there is the goal to manage guidance navigation, con- trol, landing technology and inflatable technologies such as ballutes that aim to keep vehicles in the atmosphere without landing. The requirement to save mass and energy for planned interplanetary missions such as Mars Society Balloon Mission, Mars Sample Return Mission, Mars Express or Venus Sample Return mission led to the need for manoeuvres like aerocapture, aero-breaking and hyperbolic entries. All three are characterized by very high kinetic vehicle energies to be dissipated by the manoeuvre. In this field flight data are rare. The importance of these manoeuvres and the need to increase the knowledge of required TPS designs and behavior during such mission phases point out the need of flight experiments. As result of the experience within the plasma diagnostic tool development and the plasma wind tunnel data base, flight experiments like the PYrometric RE-entry EXperiment PYREX were developed, fully qualified and successfully flown. Flight experiments such as the entry spectrometer RESPECT and PYREX on HOPE-X are in the conceptual phase. To increase knowledge in the scope of atmospheric manoeuvres and entries, data bases have to be created combining both
Richard K Plemper
Full Text Available Measles virus (MeV, a member of the paramyxovirus family of enveloped RNA viruses and one of the most infectious viral pathogens identified, accounts for major pediatric morbidity and mortality worldwide although coordinated efforts to achieve global measles control are in place. Target cell entry is mediated by two viral envelope glycoproteins, the attachment (H and fusion (F proteins, which form a complex that achieves merger of the envelope with target cell membranes. Despite continually expanding knowledge of the entry strategies employed by enveloped viruses, our molecular insight into the organization of functional paramyxovirus fusion complexes and the mechanisms by which the receptor binding by the attachment protein triggers the required conformational rearrangements of the fusion protein remain incomplete. Recently reported crystal structures of the MeV attachment protein in complex with its cellular receptors CD46 or SLAM and newly developed functional assays have now illuminated some of the fundamental principles that govern cell entry by this archetype member of the paramyxovirus family. Here, we review these advances in our molecular understanding of MeV entry in the context of diverse entry strategies employed by other members of the paramyxovirus family.
Full Text Available Interferon-induced BST2/Tetherin prevents budding of vpu-deficient HIV-1 by tethering mature viral particles to the plasma membrane. BST2 also inhibits release of other enveloped viruses including Ebola virus and Kaposi's sarcoma associated herpesvirus (KSHV, indicating that BST2 is a broadly acting antiviral host protein. Unexpectedly however, recovery of human cytomegalovirus (HCMV from supernatants of BST2-expressing human fibroblasts was increased rather than decreased. Furthermore, BST2 seemed to enhance viral entry into cells since more virion proteins were released into BST2-expressing cells and subsequent viral gene expression was elevated. A significant increase in viral entry was also observed upon induction of endogenous BST2 during differentiation of the pro-monocytic cell line THP-1. Moreover, treatment of primary human monocytes with siRNA to BST2 reduced HCMV infection, suggesting that BST2 facilitates entry of HCMV into cells expressing high levels of BST2 either constitutively or in response to exogenous stimuli. Since BST2 is present in HCMV particles we propose that HCMV entry is enhanced via a reverse-tethering mechanism with BST2 in the viral envelope interacting with BST2 in the target cell membrane. Our data suggest that HCMV not only counteracts the well-established function of BST2 as inhibitor of viral egress but also employs this anti-viral protein to gain entry into BST2-expressing hematopoietic cells, a process that might play a role in hematogenous dissemination of HCMV.
Peter J Gaskill
Full Text Available Macrophages are the primary cell type infected with HIV in the central nervous system, and infection of these cells is a major component in the development of neuropathogenesis and HIV-associated neurocognitive disorders. Within the brains of drug abusers, macrophages are exposed to increased levels of dopamine, a neurotransmitter that mediates the addictive and reinforcing effects of drugs of abuse such as cocaine and methamphetamine. In this study we examined the effects of dopamine on HIV entry into primary human macrophages. Exposure to dopamine during infection increased the entry of R5 tropic HIV into macrophages, irrespective of the concentration of the viral inoculum. The entry pathway affected was CCR5 dependent, as antagonizing CCR5 with the small molecule inhibitor TAK779 completely blocked entry. The effect was dose-dependent and had a steep threshold, only occurring above 108 M dopamine. The dopamine-mediated increase in entry required dopamine receptor activation, as it was abrogated by the pan-dopamine receptor antagonist flupenthixol, and could be mediated through both subtypes of dopamine receptors. These findings indicate that the effects of dopamine on macrophages may have a significant impact on HIV pathogenesis. They also suggest that drug-induced increases in CNS dopamine may be a common mechanism by which drugs of abuse with distinct modes of action exacerbate neuroinflammation and contribute to HIV-associated neurocognitive disorders in infected drug abusers.
Full Text Available When Caenorhabditis elegans senses dauer pheromone (daumone, signaling inadequate growth conditions, it enters the dauer state, which is capable of long-term survival. However, the molecular pathway of dauer entry in C. elegans has remained elusive. To systematically monitor changes in gene expression in dauer paths, we used a DNA microarray containing 22,625 gene probes corresponding to 22,150 unique genes from C. elegans. We employed two different paths: direct exposure to daumone (Path 1 and normal growth media plus liquid culture (Path 2. Our data reveal that entry into dauer is accomplished through the multi-step process, which appears to be compartmentalized in time and according to metabolic flux. That is, a time-course of dauer entry in Path 1 shows that dauer larvae formation begins at post-embryonic stage S4 (48 h and is complete at S6 (72 h. Our results also suggest the presence of a unique adaptive metabolic control mechanism that requires both stage-specific expression of specific genes and tight regulation of different modes of fuel metabolite utilization to sustain the energy balance in the context of prolonged survival under adverse growth conditions. It is apparent that worms entering dauer stage may rely heavily on carbohydrate-based energy reserves, whereas dauer larvae utilize fat or glyoxylate cycle-based energy sources. We created a comprehensive web-based dauer metabolic database for C. elegans (www.DauerDB.org that makes it possible to search any gene and compare its relative expression at a specific stage, or evaluate overall patterns of gene expression in both paths. This database can be accessed by the research community and could be widely applicable to other related nematodes as a molecular atlas.
Full Text Available Signal degradation suffered by the vehicle is a combination brownout and blackout during Mars atmospheric entry. The communications brownout means that signal fades and blackout means that the signal is lost completely. The communications brownout and blackout periods are analyzed and predicted with an altitude and velocity profiles. In the brownout period, the range measurements between the vehicle and the orbiters are modeled as intermittent measurements with the radio signal arrival probabilities, which are distributed as a Rayleigh distribution of the electron number density around the entry vehicle. A new integrated navigation strategy during the Mars atmospheric entry phase is proposed to consider the probabilities of the radio measurements in the communications brownout and blackout periods under the IMU/beacon scenario based on the information filter with intermittent measurements. Numerical navigation simulations are designed to show the performance of the proposed navigation strategy under the integrated navigation scenario.
Full Text Available This case study was carried out in the English Education Department of State University of Malang. The aim of the study was to identify and describe the vocabulary in the reading text and to seek if the text is useful for reading skill development. A descriptive qualitative design was applied to obtain the data. For this purpose, some available computer programs were used to find the description of vocabulary in the texts. It was found that the 20 texts containing 7,945 words are dominated by low frequency words which account for 16.97% of the words in the texts. The high frequency words occurring in the texts were dominated by function words. In the case of word levels, it was found that the texts have very limited number of words from GSL (General Service List of English Words (West, 1953. The proportion of the first 1,000 words of GSL only accounts for 44.6%. The data also show that the texts contain too large proportion of words which are not in the three levels (the first 2,000 and UWL. These words account for 26.44% of the running words in the texts.Â It is believed that the constraints are due to the selection of the texts which are made of a series of short-unrelated texts. This kind of text is subject to the accumulation of low frequency words especially those of content words and limited of words from GSL. It could also defeat the development of students' reading skills and vocabulary enrichment.
Fuertes-Olivera, Pedro; Bergenholtz, Henning
Dictionaries for Text Production are information tools that are designed and constructed for helping users to produce (i.e. encode) texts, both oral and written texts. These can be broadly divided into two groups: (a) specialized text production dictionaries, i.e., dictionaries that only offer...... a small amount of lexicographic data, most or all of which are typically used in a production situation, e.g. synonym dictionaries, grammar and spelling dictionaries, collocation dictionaries, concept dictionaries such as the Longman Language Activator, which is advertised as the World’s First Production...... Dictionary; (b) general text production dictionaries, i.e., dictionaries that offer all or most of the lexicographic data that are typically used in a production situation. A review of existing production dictionaries reveals that there are many specialized text production dictionaries but only a few general...
A starter which teaches the basic tasks to be performed with Sublime Text with the necessary practical examples and screenshots. This book requires only basic knowledge of the Internet and basic familiarity with any one of the three major operating systems, Windows, Linux, or Mac OS X. However, as Sublime Text 2 is primarily a text editor for writing software, many of the topics discussed will be specifically relevant to software development. That being said, the Sublime Text 2 Starter is also suitable for someone without a programming background who may be looking to learn one of the tools of
A model for how text interpretation proceeds from what is pronounced, through what is said to what is comunicated, and definition of the concepts 'presupposition' and 'implicature'.......A model for how text interpretation proceeds from what is pronounced, through what is said to what is comunicated, and definition of the concepts 'presupposition' and 'implicature'....
Cejuela, Juan Miguel; Vinchurkar, Shrikant; Goldberg, Tatyana
trees and was trained and evaluated on a newly improved LocTextCorpus. Combined with an automatic named-entity recognizer, LocText achieved high precision (P = 86%±4). After completing development, we mined the latest research publications for three organisms: human (Homo sapiens), budding yeast...
To present background, principles, and procedures for a strategy for qualitative analysis called systematic text condensation and discuss this approach compared with related strategies.......To present background, principles, and procedures for a strategy for qualitative analysis called systematic text condensation and discuss this approach compared with related strategies....
A chemistry teacher describes the elements of the ideal chemistry textbook. The perfect text is focused and helps students draw a coherent whole out of the myriad fragments of information and interpretation. The text would show chemistry as the central science necessary for understanding other sciences and would also root chemistry firmly in the…
This is a review of the web resource 'Text 2 Mind Map' www.Text2MindMap.com. It covers what the resource is, and how it might be used in Library and education context, in particular for School Librarians.
Kotler, R. S.
File Comparator program IFCOMP, is text file comparator for IBM OS/VScompatable systems. IFCOMP accepts as input two text files and produces listing of differences in pseudo-update form. IFCOMP is very useful in monitoring changes made to software at the source code level.
Full Text Available The paper discusses the issues of compiling the entry list for the Encyclopaedic Dictionary of Russian Christian Words. It presents a fragment of the classifi cation of the terminology in the domain and suggests to use the frequency of a lexical item in relevant texts as a criterion of its terminologization. The paper also considers whether proper names should be included in the Dictionary.
Full Text Available Biblical education as a holistic process goes far beyond biblical learning. It must be understood as a lifelong process, in which both biblical texts and their understanders operate appropriating their counterpart in a dialogical way. – Neither does the recipient’s horizon of understanding appear as an empty room, which had to be filled with the text only, nor is the latter a dead material one could only examine cognitively. The recipient discovers the meaning of the biblical text recomposing it by existential appropriation. So the text is brought to live in each individual reality. Both scientific insights and subjective structures as well as the understanders’ community must be included to avoid potential one-sidednesses. Unfortunately, a special negative association obscures the approach of the bible very often: Still biblical work as part of religious education appears in a cognitively oriented habit, which is neither regarding the vitality and sovereignty of the biblical texts nor the students’ desire for meaning. Moreover, the bible is getting misused for teaching moral terms or pontifications. Such downfalls can be disrupted by biblical didactics which are empowerment didactics. Regarding the sovereignty of biblical texts, these didactics assist the understander with his/her individuation by opening the texts with focus on the understander’s otherness. Thus each the text and the recipient become subjects in a dialogue. The approach of the Biblical-Enabling-Didactics leads the Bible to become always new a book of life. Understanding them from within their hermeneutics, empowerment didactics could be raised to the principle of biblical didactics in general and grow into an essential element of holistic education.
Thais Flores Nogueira Diniz
Full Text Available The article begins by historicizing film adaptation from the arrival of cinema, pointing out the many theoretical approaches under which the process has been seen: from the concept of “the same story told in a different medium” to a comprehensible definition such as “the process through which works can be transformed, forming an intersection of textual surfaces, quotations, conflations and inversions of other texts”. To illustrate this new concept, the article discusses Spike Jonze’s film Adaptation. according to James Naremore’s proposal which considers the study of adaptation as part of a general theory of repetition, joined with the study of recycling, remaking, and every form of retelling. The film deals with the attempt by the scriptwriter Charles Kaufman, cast by Nicholas Cage, to adapt/translate a non-fictional book to the cinema, but ends up with a kind of film which is by no means what it intended to be: a film of action in the model of Hollywood productions. During the process of creation, Charles and his twin brother, Donald, undergo a series of adventures involving some real persons from the world of film, the author and the protagonist of the book, all of them turning into fictional characters in the film. In the film, adaptation then signifies something different from itstraditional meaning. The article begins by historicizing film adaptation from the arrival of cinema, pointing out the many theoretical approaches under which the process has been seen: from the concept of “the same story told in a different medium” to a comprehensible definition such as “the process through which works can be transformed, forming an intersection of textual surfaces, quotations, conflations and inversions of other texts”. To illustrate this new concept, the article discusses Spike Jonze’s film Adaptation. according to James Naremore’s proposal which considers the study of adaptation as part of a general theory of repetition
Examines chemical engineering students' attitudes to text and other parts of English language textbooks. A questionnaire was administered to a group of undergraduates. Results reveal one way students get around the problem of textbook reading. (Author/VWL)
with literary texts written in indigenous South African languages. The project ... Homi Bhabha uses the words of Salman Rushdie to underline the fact that new .... I could not conceptualise an African-language-to-African-language dictionary. An.
Marta Eugenia Rojas-Porras
Full Text Available The ethical and social responsibility of citing the sources in a scientific or artistic work is undeniable. This paper explores, in a preliminary way, academic plagiarism in its various forms. It includes findings based on a forensic analysis. The purpose of this paper is to raise awareness on the importance of considering these details when writing and publishing a text. Hopefully, this analysis may put the issue under discussion.
Habash, Nizar; Olive, Joseph; Christianson, Caitlin; McCary, John
Machine translation (MT) from text, the topic of this chapter, is perhaps the heart of the GALE project. Beyond being a well defined application that stands on its own, MT from text is the link between the automatic speech recognition component and the distillation component. The focus of MT in GALE is on translating from Arabic or Chinese to English. The three languages represent a wide range of linguistic diversity and make the GALE MT task rather challenging and exciting.
Ream, W.K.; Espinoza, J.
An entry control system to automatically control access to nuclear facilities is described. The design uses a centrally located console, integrated into the regular security system, to monitor the computer-controlled passage into and out of sensitive areas. Four types of entry control points are used: an unmanned enclosed portal with metal and SNM detectors for contraband detection with positive personnel identification, a bypass portal for contraband search after a contraband alarm in a regular portal also with positive personnel identification, a single door entry point with positive personnel identification, and a single door entry point with only a magnetic card-type identification. Security force action is required only as a response to an alarm. The integration of the entry control function into the security system computer is also described. The interface between the entry control system and the monitoring security personnel utilizing a color graphics display with touch screen input is emphasized. 2 refs., 7 figs
Hansen, Lars Kai; Sigurdsson, Sigurdur; Kolenda, Thomas
We apply and discuss generalizable Gaussian mixture (GGM) models for text mining. The model automatically adapts model complexity for a given text representation. We show that the generalizability of these models depends on the dimensionality of the representation and the sample size. We discuss...
The development of a capability for automated processing of natural language text is a long-range goal of artificial intelligence. This paper discusses an investigation into the issues involved in the comprehension of descriptive, as opposed to illustrative, textual material. The comprehension process is viewed as the conversion of knowledge from one representation into another. The proposed target representation consists of statements of the prolog language, which can be interpreted both declaratively and procedurally, much like production rules. A computer program has been written to model in detail some ideas about this process. The program successfully analyzes several heavily edited paragraphs adapted from an elementary textbook on programming, automatically synthesizing as a result of the analysis a working Prolog program which, when executed, can parse and interpret let commands in the basic language. The paper discusses the motivations and philosophy of the project, the many kinds of prerequisite knowledge which are necessary, and the structure of the text analysis program. A sentence-by-sentence account of the analysis of the sample text is presented, describing the syntactic and semantic processing which is involved. The paper closes with a discussion of lessons learned from the project, possible alternative approaches, and possible extensions for future work. The entire project is presented as illustrative of the nature and complexity of the text analysis process, rather than as providing definitive or optimal solutions to any aspects of the task. 12 references.
Collie, Rebecca J.; Holliman, Andrew J.; Martin, Andrew J.
University entry is a time of great change for students. The extent to which students are able to effectively navigate such change likely has an impact on their success in university. In the current study, we examined this by way of adaptability, the extent to which students' adaptability is associated with their behavioural engagement at…
Kort, Peter M.; Wrzaczek, Stefan
The paper studies the incumbent-entrant problem in a fully dynamic setting. We find that under an open-loop information structure the incumbent anticipates entry by overinvesting, whereas in the Markov perfect equilibrium the incumbent slightly underinvests in the period before the entry. The entry cost level where entry accommodation passes into entry deterrence is lower in the Markov perfect equilibrium. Further we find that the incumbent’s capital stock level needed to deter entry is hump shaped as a function of the entry time, whereas the corresponding entry cost, where the entrant is indifferent between entry and non-entry, is U-shaped. PMID:26435573
D. A. Seliverstov
The prime focus in this article is on key findings concerning theoretical aspects of strategic behavior by incumbents to deter market entry of new firms. The author summarizes main lines of scientific research in the topic which give an insight into the patterns of the incumbent’s impact on the behavior of the entrants, the entry deterrence instruments and the consequences of these actions. Today the free entry markets are considered to be a rare phenomenon. The market entry of new firms is a...
One of the controls for information entered into the data bases created and maintained by the DOE Technical Information Center is the standardized name for the corporate entity or the corporate author. The purpose of Energy Information Data Base: Corporate Author Entries is to provide a means for the consistent citing of the names of organizations in bibliographic records. These entries serve as guides for users of the DOE/RECON computerized data bases who want to locate information originating in particular organizations. The entries in this revision include the corporate entries used in report bibliographic citations since 1973 and list approximately 28,000 corporate sources
Peng, S.S. [West Virginia University, Morgantown, WV (USA). Mining Engineering Dept.
The paper explains the applications of open entries in mining and different roof techniques to relieve longwall abutment pressures. The primary support for the open (or cut-through) entries and recovery rooms are normally similar to other development entries in the same mines. The supplementary supports installed can be divided into the following three types: complete backfill of open entries, supplemental roof and/or rib-bolt reinforcement only - no standing support and rows of standing support with or without supplemental roof and/or rib-bolt reinforcement. 3 figs.
Thais Flores Nogueira Diniz
Full Text Available The article begins by historicizing film adaptation from the arrival of cinema, pointing out the many theoretical approaches under which the process has been seen: from the concept of “the same story told in a different medium” to a comprehensible definition such as “the process through which works can be transformed, forming an intersection of textual surfaces, quotations, conflations and inversions of other texts”. To illustrate this new concept, the article discusses Spike Jonze’s film Adaptation. according to James Naremore’s proposal which considers the study of adaptation as part of a general theory of repetition, joined with the study of recycling, remaking, and every form of retelling. The film deals with the attempt by the scriptwriter Charles Kaufman, cast by Nicholas Cage, to adapt/translate a non-fictional book to the cinema, but ends up with a kind of film which is by no means what it intended to be: a film of action in the model of Hollywood productions. During the process of creation, Charles and his twin brother, Donald, undergo a series of adventures involving some real persons from the world of film, the author and the protagonist of the book, all of them turning into fictional characters in the film. In the film, adaptation then signifies something different from itstraditional meaning.
Weldon, W.F.; Rylander, H.G.; Woodson, H.H.
The Texas Experimental Tokamak (TEXT) Enery Storage System, designed by the Center for Electromechanics (CEM), consists of four 50 MJ, 125 V homopolar generators and their auxiliaries and is designed to power the toroidal and poloidal field coils of TEXT on a two-minute duty cycle. The four 50 MJ generators connected in series were chosen because they represent the minimum cost configuration and also represent a minimal scale up from the successful 5.0 MJ homopolar generator designed, built, and operated by the CEM
Jorgensen, C.C.; Haas, P.M.; Selby, D.L.; Lowry, J.C.
This paper summarizes the early results and current status of a research program at ORNL which is intended to provide the methods and technical basis for NRC to initiate the use of the Systems Approach to Training (SAT) in the evaluation of training programs and entry level qualifications for NPP control room personnel. The program is an outgrowth of previous studies of simulator hardware and simulator training requirements under the Safety Related Operator Actions Program which recommended adaptation of a systems methodology to development and evaluation of NPP training programs
Tsaltas, Jim; Pearce, Scott; Lawrence, Anthony; Meads, Alan; Mezzatesta, Joseph; Nicolson, Scott
This prospective observational study aimed to assess the feasibility of adapting peritoneal hyperdistention to 25 mmHg during laparoscopy in an Australian hospital environment. A total of 1150 consecutive diagnostic or operative laparoscopies were performed. All cases were monitored for early detection of untoward physiological changes. All patients had Veress needle insufflation with distension to 25 mmHg prior to insertion of the primary trocar. No patients experienced any surgical entry complications or adverse clinical effects noted during anaesthetic. The aim of the current study is to assess the feasibility and safety of increasing the peritoneal insufflation pressure to 25 mmHg for primary trocar insertion.
Department of Transportation — The dataset is known as “Border Crossing/Entry Data.” The Bureau of Transportation Statistics (BTS) Border Crossing/Entry Data provides summary statistics to the...
This monograph presents in great detail a large number of both unpublished and previously published Babylonian mathematical texts in the cuneiform script. It is a continuation of the work A Remarkable Collection of Babylonian Mathematical Texts (Springer 2007) written by Jöran Friberg, the leading expert on Babylonian mathematics. Focussing on the big picture, Friberg explores in this book several Late Babylonian arithmetical and metro-mathematical table texts from the sites of Babylon, Uruk and Sippar, collections of mathematical exercises from four Old Babylonian sites, as well as a new text from Early Dynastic/Early Sargonic Umma, which is the oldest known collection of mathematical exercises. A table of reciprocals from the end of the third millennium BC, differing radically from well-documented but younger tables of reciprocals from the Neo-Sumerian and Old-Babylonian periods, as well as a fragment of a Neo-Sumerian clay tablet showing a new type of a labyrinth are also discussed. The material is presen...
This four-part work provides a philological analysis and a theoretical interpretation of the cuneiform lexical texts found in the Late Bronze Age city of Emar, in present-day Syria. These word and sign lists, commonly dated to around 1100 BC, were almost all found in the archive of a single school.
We present TISC, a language-independent and context-sensitive spelling checking and correction system designed to facilitate the automatic removal of non-word spelling errors in large corpora. Its lexicon is derived from a very large corpus of raw text, without supervision, and contains word
Notes that, since fictional discourse need not reflect prevailing systems of meaning and norms or values, readers gain detachment from their own presuppositions; by constituting and formulating text-sense, readers are constituting and formulating their own cognition and becoming aware of the operations for doing so. (FL)
This section treats of the following documents and legal texts: 1 - Belgium 29 June 2014 - Act amending the Act of 22 July 1985 on Third-Party Liability in the Field of Nuclear Energy; 2 - Belgium, 7 December 2016. - Act amending the Act of 22 July 1985 on Third-Party Liability in the Field of Nuclear Energy
Bergeron, Bryan; Cline, Andrew
Conventional intelligent or adaptive tutoring online systems rely on domain-specific models of learner behavior based on rules, deep domain knowledge, and other resource-intensive methods. We have developed and studied a domain-independent methodology of adaptive tutoring based on domain-independent signal-processing approaches that obviate the need for the construction of explicit expert and student models. A key advantage of our method over conventional approaches is a lower barrier to entry for educators who want to develop adaptive online learning materials.
Obed Madsen, Søren
of the strategy into four categories. Second, the managers produce new texts based on the original strategy document by using four different ways of translation models. The study’s findings contribute to three areas. Firstly, it shows that translation is more than a sociological process. It is also...... a craftsmanship that requires knowledge and skills, which unfortunately seems to be overlooked in both the literature and in practice. Secondly, it shows that even though a strategy text is in singular, the translation makes strategy plural. Thirdly, the article proposes a way to open up the black box of what......This article shows empirically how managers translate a strategy plan at an individual level. By analysing how managers in three organizations translate strategies, it identifies that the translation happens in two steps: First, the managers decipher the strategy by coding the different parts...
Botti, Lucia; Ferrari, Emilio; Mora, Cristina
Work in confined spaces poses a significant risk to workers and rescuers involved in the emergency response when an accident occurs. Despite several standards and regulations define the safety requirements for such activities, injuries, and fatalities still occur. Furthermore, the on-site inspections after accidents often reveal that both employers and employees fail to implement safe entry procedures. Removing the risk is possible by avoiding the worker entry, but many activities require the presence of the operator inside the confined space to perform manual tasks. The following study investigates the available technologies for hazardous confined space work activities, e.g., cleaning, inspecting, and maintenance tasks. The aim is to provide a systematic review of the automated solutions for high-risk activities in confined spaces, considering the non-man entry as the most effective confined space safety strategy. Second, this survey aims to provide suggestions for future research addressing the design of new technologies. The survey consists of about 60 papers concerning innovative technologies for confined space work activities. The document review shows that several solutions have been developed and automation can replace the workers for a limited number of hazardous tasks. Several activities still require the manual intervention due to the complex characteristics of confined spaces, e.g., to remove the remains of the automatic cleaning process from the bottom of a tank. The results show that available technologies require more flexibility to adapt to such occupational environments and further research is needed.
A. S. Morozova
Full Text Available A company must have distinctly described alternatives for taking strategically correct decisions. For this reason the purpose of the paper is to provide comparative characteristics and systematize strategies on entry to foreign market. It is necessary to select the required criteria and carry out multi-criterion analysis in order to arrange systematization and comparative characteristics of numerous institutional forms being established within the framework of export, cooperation or integration, main strategies on entry to foreign market. The paper contains an analysis and systematization prepared in accordance with the following criteria: strategic purpose of entry to foreign market, time factor in respect of entry to foreign market, distribution of company’s business-cycle stages among countries, level of investments, form of investments, distribution of investment and management level among countries, risk level, market involvement, legal grounds for foreign activity, status of a subject entering foreign market. The paper makes it possible to give comparative characteristics of the analyzed strategies.
Full Text Available Abstract Aims This study aimed to assess the prevalence of women who entered antenatal care (ANC late and to identify factors related to the late entry to ANC in New South Wales (NSW in 2004. Methods The NSW Midwives Data Collection contained data of 85,034 women who gave birth in 2004. Data were downloaded using SAS and transferred to STATA 8.0. Entering ANC after 12 weeks of gestation was classified as late. The Andersen Health Seeking Behaviour Model was used for selection and analyses of related factors. Regression and hierarchical analyses were used to identify significant factors and their relative contributions to the variation of pregnancy duration at entry to ANC. Results 41% of women commenced ANC after 12 weeks of gestation. Inequality existed between groups of women with predisposing characteristics and enabling resources contributed more to the variation in pregnancy duration at entry to ANC than needs. The groups of women with highest risk were teenagers, migrants from developing countries, women living in Western Sydney, Aboriginal and Torres Strait Islanders, women with three or more previous pregnancies and heavy smokers. The high risk groups with largest number of women were migrants from developing countries and women living in Western Sydney. Conclusion A large number of women in NSW entered ANC late in their pregnancies. Efforts to increase early entry to ANC should be targeted on identified high risk groups of women.
Donna M. Grant
Full Text Available This study investigates the skill sets necessary for entry level systems analysts. Towards this end, the study combines two sources of data, namely, a content analysis of 200 systems analysts’ online job advertisements and a survey of 20 senior Information Systems (IS professionals. Based on Chi-square tests, the results reveal that most employers prefer entry level systems analysts with an undergraduate Computer Science degree. Furthermore, most of the employers prefer entry level systems analysts to have some years of experience as well as industry certifications. The results also reveal that there is a higher preference for entry level systems analysts who have non-technical and people skills (e.g., problem solving and oral communication. The empirical results from this study will inform IS educators as they develop future systems analysts. Additionally, the results will be useful to the aspiring systems analysts who need to make sure that they have the necessary job skills before graduating and entering the labor market.
Eileen M. Geoghegan
Full Text Available Summary: Progressive multifocal leukoencephalopathy (PML is a lethal brain disease caused by uncontrolled replication of JC polyomavirus (JCV. JCV strains recovered from the brains of PML patients carry mutations that prevent the engagement of sialylated glycans, which are thought to serve as receptors for the infectious entry of wild-type JCV. In this report, we show that non-sialylated glycosaminoglycans (GAGs can serve as alternative attachment receptors for the infectious entry of both wild-type and PML mutant JCV strains. After GAG-mediated attachment, PML mutant strains engage non-sialylated non-GAG co-receptor glycans, such as asialo-GM1. JCV-neutralizing monoclonal antibodies isolated from patients who recovered from PML appear to block infection by preventing the docking of post-attachment co-receptor glycans in an apical pocket of the JCV major capsid protein. Identification of the GAG-dependent/sialylated glycan-independent alternative entry pathway should facilitate the development of infection inhibitors, including recombinant neutralizing antibodies. : Geoghegan et al. show that JC polyomavirus strains that cause brain disease infect cells via a pathway involving a heparin-like attachment receptor and a non-sialylated co-receptor. Candidate therapeutic human monoclonal antibodies neutralize by blocking co-receptor engagement. Keywords: polyomavirus, JC, BK, SV40, progressive multifocal leukoencephalopathy, PML, monoclonal antibody, mAb, virus entry, receptor
Corporate author entries provide a means for consistent citing of the names of organizations in bibliographic records in the data bases of the DOE Technical Information Center. These entries serve as guides for users of the DOE/RECON computerized data bases who want to locate information originating in particular organizations
...-entry interval applies, including, but not limited to, soil, water, air, or surfaces of plants; and (2...-entry activity, the agricultural employer shall provide a decontamination site in accordance with § 170... running water for routine and emergency decontamination and mechanical devices that would reduce the...
Schaumans, C.B.C.; Verboven, F.L.
We propose a methodology for estimating the competition effects from entry when firms sell differentiated products. We first derive precise conditions under which Bres- nahan and Reiss'entry threshold ratios (ETRs) can be used to test for the presence and to measure the magnitude of competition
We analyse a simple entry-deterrence game, where a `Potential Intruder' only imperfectly observes the decision of an `Incumbent' to commit or to not commit to fight any entry by the Potential Intruder. Our game generalises the one studied in Bonanno (1992) by allowing for a richer information tec...
Deng, Paul Duo; Jefferson, Gary H.
We adopt the framework of Schumpeterian creative destruction formalized by Aghion et al. (2009) to analyze the impact of foreign entry on the productivity growth of domestic firms. In the face of foreign entry, domestic firms exhibit heterogeneous patterns of growth depending on their technologic...... manufacturing. Our empirical results confirm that foreign entry indeed generates strong heterogeneous growth patterns among domestic firms.......We adopt the framework of Schumpeterian creative destruction formalized by Aghion et al. (2009) to analyze the impact of foreign entry on the productivity growth of domestic firms. In the face of foreign entry, domestic firms exhibit heterogeneous patterns of growth depending on their technological...... distance from foreign firms. Domestic firms with smaller technological distance from their foreign counterparts tend to experience faster productivity growth, while firms with larger technological distance tend to lag further behind. We test this hypothesis using a unique firm-level data of Chinese...
Balling, Laura Winther
Most research on cognates has focused on words presented in isolation that are easily defined as cognate between L1 and L2. In contrast, this study investigates what counts as cognate in authentic texts and how such cognates are read. Participants with L1 Danish read news articles in their highly...... proficient L2, English, while their eye-movements were monitored. The experiment shows a cognate advantage for morphologically simple words, but only when cognateness is defined relative to translation equivalents that are appropriate in the context. For morphologically complex words, a cognate disadvantage...... word predictability indexed by the conditional probability of each word....
This section treats of the following documents and legal texts: 1 - Brazil: Law No. 13,260 of 16 March 2016 (To regulate the provisions of item XLIII of Article 5 of the Federal Constitution on terrorism, dealing with investigative and procedural provisions and redefining the concept of a terrorist organisation; and amends Laws No. 7,960 of 21 December 1989 and No. 12,850 of 2 August 2013); 2 - India: The Atomic Energy (Amendment) Act, 2015; Department Of Atomic Energy Notification (Civil Liability for Nuclear Damage); 3 - Japan: Act on Subsidisation, etc. for Nuclear Damage Compensation Funds following the implementation of the Convention on Supplementary Compensation for Nuclear Damage
Haugaard, Rikke Hartmann
, a multiple case study investigated three professional text producers’ practices as they unfolded in their natural setting at the Spanish newspaper, El Mundo. • Results indicate that journalists’ revisions are related to form markedly more often than to content. • Results suggest two writing phases serving...... at the Spanish newspaper, El Mundo, in Madrid. The study applied a combination of quantitative and qualitative methods, i.e. keystroke logging, participant observation and retrospective interview. Results indicate that journalists’ revisions are related to form markedly more often than to content (approx. three...
Aziz, Anealka; Fook, Chan Yuen; Alsree, Zubaidah
ESL instructors generally use ready-made reading materials in commercially published coursebooks. However, it would be more effective for learners if ESL instructors are involved in developing reading materials for them. This is because they are closer, more sensitive and responsive to the needs of their learners and they are also aware of the…
Full Text Available The present article offers the edition of three cuneiform texts belonging to the Akkadian handbook of omens drawn from the physical appearance as well as the morals and behaviour of man. The book comprising up to 27 chapters with more than 100 omens each was entitled in antiquity Alamdimmû. The edition of the three cuneiform tablets completes, thus, the author's monographic study on the ancient Mesopotamian divinatory discipline of physiognomy (Die babylonisch-assyrische Morphoskopie (Wien 2000 [=AfO Beih. 27].
En este artículo se presenta la editio princeps de tres textos cuneiformes conservados en el British Museum (Londres y el Vorderasiatisches Museum (Berlín, que pertenecen al libro asirio-babilonio de presagios fisiognómicos. Este libro, titulado originalmente Alamdimmû ('forma, figura', consta de 27 capítulos, cada uno con más de cien presagios escritos en lengua acadia. Los tres textos completan así el estudio monográfico de la autora sobre la disciplina adivinatoria de la fisiognomía en el antiguo Oriente (Die babylonisch-assyrische Morphoskopie (Wien 2000 [=AfO Beih. 27].
Hollaar, L A
The Utah Text Retrieval project seeks well-engineered solutions to the implementation of large, inexpensive, rapid text information retrieval systems. The project has three major components. Perhaps the best known is the work on the specialized processors, particularly search engines, necessary to achieve the desired performance and cost. The other two concern the user interface to the system and the system's internal structure. The work on user interface development is not only concentrating on the syntax and semantics of the query language, but also on the overall environment the system presents to the user. Environmental enhancements include convenient ways to browse through retrieved documents, access to other information retrieval systems through gateways supporting a common command interface, and interfaces to word processing systems. The system's internal structure is based on a high-level data communications protocol linking the user interface, index processor, search processor, and other system modules. This allows them to be easily distributed in a multi- or specialized-processor configuration. It also allows new modules, such as a knowledge-based query reformulator, to be added. 15 references.
Full Text Available Spatial competition plays important roles in economics, which attracts extensive research. This paper addresses spatial competitions along with horizontal product differentiations and entry deterrence. By the dynamic game theory model about one firm and a potential entrant with different cost in a linear city, this paper finds that both the higher fixed setup cost and the higher transportation cost deter entrants. To efficiently deter the entrants, the establisher is inclined to locating at the middle point of the linear city.
Full Text Available Airborne-launched AUVs withstand great fluid impact force at the early stage when entering the water, which may cause damage to their structure and inner components in severe cases. Due to their large volume and mass, the major challenge involved in conducting experiments to measure the water entry impacts on real-life AUVs is the high demand for the experimental devices, finding a suitable site, and the cost of the experiments. Using a gas gun as launching device, water entry experiments using a full-size AUV model are conducted under various conditions. The axial and radial force changes that occur during the water entry process are obtained, and some accompanied phenomena such as cavitation and turnover under different water entry conditions are observed. Computational fluid dynamics (CFD is used to simulate the water entry process of airborne-launched AUVs. The simulation results fit well with the experimental data, the latter of which show that both the water entry velocity and entry angle have a great influence on the impact load during the water entry process. These data can provide valuable reference information for AUV structure design and launch condition selection.
Computerized provider order entry (CPOE) systems are designed to replace a hospital's paper-based ordering system. They allow users to electronically write the full range of orders, maintain an online medication administration record, and review changes made to an order by successive personnel. They also offer safety alerts that are triggered when an unsafe order (such as for a duplicate drug therapy) is entered, as well as clinical decision support to guide caregivers to less expensive alternatives or to choices that better fit established hospital protocols. CPOE systems can, when correctly configured, markedly increase efficiency and improve patient safety and patient care. However, facilities need to recognize that currently available CPOE systems require a tremendous amount of time and effort to be spent in customization before their safety and clinical support features can be effectively implemented. What's more, even after they've been customized, the systems may still allow certain unsafe orders to be entered. Thus, CPOE systems are not currently a quick or easy remedy for medical errors. ECRI's Evaluation of CPOE systems--conducted in collaboration with the Institute for Safe Medication Practices (ISMP)--discusses these and other related issues. It also examines and compares CPOE systems from three suppliers: Eclipsys Corp., IDX Systems Corp., and Siemens Medical Solutions Health Services Corp. Our testing focuses primarily on the systems' interfacing capabilities, patient safeguards, and ease of use.
This section reprints a selection of recently published legislative texts and documents: - Russian Federation: Federal Law No.170 of 21 November 1995 on the use of atomic energy, Adopted by the State Duma on 20 October 1995; - Uruguay: Law No.19.056 On the Radiological Protection and Safety of Persons, Property and the Environment (4 January 2013); - Japan: Third Supplement to Interim Guidelines on Determination of the Scope of Nuclear Damage resulting from the Accident at the Tokyo Electric Power Company Fukushima Daiichi and Daini Nuclear Power Plants (concerning Damages related to Rumour-Related Damage in the Agriculture, Forestry, Fishery and Food Industries), 30 January 2013; - France and the United States: Joint Statement on Liability for Nuclear Damage (Aug 2013); - Franco-Russian Nuclear Power Declaration (1 November 2013)
The text of the relationship agreement with the Agency has concluded with the United Nations Industrial Development Organization, together with the protocol regarding its entry into force, is reproduced in this document for the information of all Members of the Agency. The agreement entered into force on 9 October 1987 pursuant to Article 10
Full Text Available People live in a world in which they are surrounded by potential disgust elicitors such as ``used'' chairs, air, silverware, and money as well as excretory activities. People function in this world by ignoring most of these, by active avoidance, reframing, or adaptation. The issue is particularly striking for professions, such as morticians, surgeons, or sanitation workers, in which there is frequent contact with major disgust elicitors. In this study, we study the ``adaptation'' process to dead bodies as disgust elicitors, by measuring specific types of disgust sensitivity in medical students before and after they have spent a few months dissecting a cadaver. Using the Disgust Scale, we find a significant reduction in disgust responses to death and body envelope violation elicitors, but no significant change in any other specific type of disgust. There is a clear reduction in discomfort at touching a cold dead body, but not in touching a human body which is still warm after death.
Full Text Available Zusammenfassung Die multimedialen Informationsdienste im Internet werden immer umfangreicher und umfassender, wobei auch die nur in gedruckter Form vorliegenden Dokumente von den Bibliotheken digitalisiert und ins Netz gestellt werden. Über Online-Dokumentenverwaltungen oder Suchmaschinen können diese Dokumente gefunden und dann in gängigen Formaten wie z.B. PDF bereitgestellt werden. Dieser Artikel beleuchtet die Funktionsweise der Humboldt Digital Library, die seit mehr als zehn Jahren Dokumente von Alexander von Humboldt in englischer Übersetzung im Web als HDL (Humboldt Digital Library kostenfrei zur Verfügung stellt. Anders als eine digitale Bibliothek werden dabei allerdings nicht nur digitalisierte Dokumente als Scan oder PDF bereitgestellt, sondern der Text als solcher und in vernetzter Form verfügbar gemacht. Das System gleicht damit eher einem Informationssystem als einer digitalen Bibliothek, was sich auch in den verfügbaren Funktionen zur Auffindung von Texten in unterschiedlichen Versionen und Übersetzungen, Vergleichen von Absätzen verschiedener Dokumente oder der Darstellung von Bilden in ihrem Kontext widerspiegelt. Die Entwicklung von dynamischen Hyperlinks auf der Basis der einzelnen Textabsätze der Humboldt‘schen Werke in Form von Media Assets ermöglicht eine Nutzung der Programmierschnittstelle von Google Maps zur geographischen wie auch textinhaltlichen Navigation. Über den Service einer digitalen Bibliothek hinausgehend, bietet die HDL den Prototypen eines mehrdimensionalen Informationssystems, das mit dynamischen Strukturen arbeitet und umfangreiche thematische Auswertungen und Vergleiche ermöglicht. Summary The multimedia information services on Internet are becoming more and more comprehensive, even the printed documents are digitized and republished as digital Web documents by the libraries. Those digital files can be found by search engines or management tools and provided as files in usual formats as
This section treats of the following Documents and legal texts: 1 - Canada: Nuclear Liability and Compensation Act (An Act respecting civil liability and compensation for damage in case of a nuclear incident, repealing the Nuclear Liability Act and making consequential amendments to other acts); 2 - Japan: Act on Compensation for Nuclear Damage (The purpose of this act is to protect persons suffering from nuclear damage and to contribute to the sound development of the nuclear industry by establishing a basic system regarding compensation in case of nuclear damage caused by reactor operation etc.); Act on Indemnity Agreements for Compensation of Nuclear Damage; 3 - Slovak Republic: Act on Civil Liability for Nuclear Damage and on its Financial Coverage and on Changes and Amendments to Certain Laws (This Act regulates: a) The civil liability for nuclear damage incurred in the causation of a nuclear incident, b) The scope of powers of the Nuclear Regulatory Authority (hereinafter only as the 'Authority') in relation to the application of this Act, c) The competence of the National Bank of Slovakia in relation to the supervised financial market entities in the financial coverage of liability for nuclear damage; and d) The penalties for violation of this Act)
This section of the Bulletin presents the recently published documents and legal texts sorted by country: - Brazil: Resolution No. 169 of 30 April 2014. - Japan: Act Concerning Exceptions to Interruption of Prescription Pertaining to Use of Settlement Mediation Procedures by the Dispute Reconciliation Committee for Nuclear Damage Compensation in relation to Nuclear Damage Compensation Disputes Pertaining to the Great East Japan Earthquake (Act No. 32 of 5 June 2013); Act Concerning Measures to Achieve Prompt and Assured Compensation for Nuclear Damage Arising from the Nuclear Plant Accident following the Great East Japan Earthquake and Exceptions to the Extinctive Prescription, etc. of the Right to Claim Compensation for Nuclear Damage (Act No. 97 of 11 December 2013); Fourth Supplement to Interim Guidelines on Determination of the Scope of Nuclear Damage Resulting from the Accident at the Tokyo Electric Power Company Fukushima Daiichi and Daini Nuclear Power Plants (Concerning Damages Associated with the Prolongation of Evacuation Orders, etc.); Outline of 'Fourth Supplement to Interim Guidelines (Concerning Damages Associated with the Prolongation of Evacuation Orders, etc.)'. - OECD Nuclear Energy Agency: Decision and Recommendation of the Steering Committee Concerning the Application of the Paris Convention to Nuclear Installations in the Process of Being Decommissioned; Joint Declaration on the Security of Supply of Medical Radioisotopes. - United Arab Emirates: Federal Decree No. (51) of 2014 Ratifying the Convention on Supplementary Compensation for Nuclear Damage; Ratification of the Federal Supreme Council of Federal Decree No. (51) of 2014 Ratifying the Convention on Supplementary Compensation for Nuclear Damage
The future exploration of the Solar System will require innovations in transportation and the use of entry, descent, and landing (EDL) systems at many planetary landing sites. The cost of space missions has always been prohibitive, and using the natural planetary and planet s moons atmospheres for entry, descent, and landing can reduce the cost, mass, and complexity of these missions. This paper will describe some of the EDL ideas for planetary entry and survey the overall technologies for EDL that may be attractive for future Solar System missions.
Beaumont, A.; Brundige, E.; DesJardin, R.; Rivera, R.
The exchange badge system which was used at the Plutonium Facility located in Technical Area 55 was replaced on a trial basis with an automated Entry Control System. As a result of the success of the trial system, a new system incorporating expanded features and increased reliability is being implemented. The new Entry Control System incorporates several features not previously available in relatively inexpensive entry systems. The reliability of the system is enhanced by redundant microprocessors incorporating bubble memory for nonvolatile storage of the system data base. The badge readers incorporate dual communication lines to two different controllers to further increase the total system reliability
Entry control hardware has been used extensively in the past to assist security forces in separating the authorized from the unauthorized at the plant perimeter. As more attention is being focused on the insider threat, these entry control elements are being used to extend the security inspectors' presence into the plant by compartmentalizing access and monitoring vital components. This paper summarizes the experiences expressed by the participants at the March 16 to 19, 1982 INMM Physical Protection Workshop in utilizing access control and contraband detection hardware for plant wide entry control applications
Full Text Available The main purpose of the paper is to analyse the international market entry strategies in the light of globalisation processes and to propose a conceptual model of turnkey projects as market entry mode. The specific research objectives are as follows: 1. to develop an integrated framework of the turnkey marketing process as a conceptual model; 2. to analyse BRICS countries as potential host countries for turnkey projects implementation; 3. to assess potential implications of proposed conceptual model for global market entry decisions.
Full Text Available Detailed knowledge of the host-virus interactions that accompany filovirus entry into cells is expected to identify determinants of viral virulence and host range, and to yield targets for the development of antiviral therapeutics. While it is generally agreed that filovirus entry into the host cytoplasm requires viral internalization into acidic endosomal compartments and proteolytic cleavage of the envelope glycoprotein by endo/lysosomal cysteine proteases, our understanding of the specific endocytic pathways co-opted by filoviruses remains limited. This review addresses the current knowledge on cellular endocytic pathways implicated in filovirus entry, highlights the consensus as well as controversies, and discusses important remaining questions.
Peter J. Hume
Full Text Available Salmonella causes disease in humans and animals ranging from mild self-limiting gastroenteritis to potentially life-threatening typhoid fever. Salmonellosis remains a considerable cause of morbidity and mortality globally, and hence imposes a huge socio-economic burden worldwide. A key property of all pathogenic Salmonella strains is the ability to invade non-phagocytic host cells. The major determinant of this invasiveness is a Type 3 Secretion System (T3SS, a molecular syringe that injects virulence effector proteins directly into target host cells. These effectors cooperatively manipulate multiple host cell signaling pathways to drive pathogen internalization. Salmonella does not only rely on these injected effectors, but also uses several other T3SS-independent mechanisms to gain entry into host cells. This review summarizes our current understanding of the methods used by Salmonella for cell invasion, with a focus on the host signaling networks that must be coordinately exploited for the pathogen to achieve its goal.
Full Text Available To date, six human coronaviruses have been known, all of which are associated with respiratory infections in humans. With the exception of the highly pathogenic SARS and MERS coronaviruses, human coronaviruses (HCoV-NL63, HCoV-OC43, HCoV-229E, and HCoV-HKU1 circulate worldwide and typically cause the common cold. In most cases, infection with these viruses does not lead to severe disease, although acute infections in infants, the elderly, and immunocompromised patients may progress to severe disease requiring hospitalization. Importantly, no drugs against human coronaviruses exist, and only supportive therapy is available. Previously, we proposed the cationically modified chitosan, N-(2-hydroxypropyl-3-trimethylammonium chitosan chloride (HTCC, and its hydrophobically-modified derivative (HM-HTCC as potent inhibitors of the coronavirus HCoV-NL63. Here, we show that HTCC inhibits interaction of a virus with its receptor and thus blocks the entry. Further, we demonstrate that HTCC polymers with different degrees of substitution act as effective inhibitors of all low-pathogenic human coronaviruses.
Full Text Available Gob-side entry retaining (GER is a popular non-pillar mining technique regarding how to reserve a gateroad for the use of next panel mining. When used in thick coal seams, the conventional entry retaining method requires a huge amount of filling materials and may cause entry (gateroad accidents. Thus, an innovative non-pillar longwall mining approach is introduced. First, structural and mechanical models were built to explore the mechanism of the new approach. The modeling results indicate that effective bulking of the gob roof and reasonable support of the entry roof were key governing factors in improving entry stabilities and reducing roof deformations. Accordingly, a directional roof fracturing technique was proposed to contribute to gob roof caving, and a constant resistance and large deformation anchor (CRLDA cable was used to stabilize the entry roof. Subsequently, the evolutionary laws of the roof structure and stresses were explored using numerical simulation. It was found that the structure of the surrounding rocks around the retained entry changed significantly after roof fracturing. The stress-bearing center was transferred to the gob area, and the entry roof was in a low stress environment after adopting the approach. Finally, the approach was tested on a thick coal seam longwall mining panel. Field monitoring indicates that the retained entry was in a stable state and the index of the retained entry met the requirement of the next mining panel. This work provides an effective and economical approach to non-pillar longwall mining in thick coal seams.
Светлана Евгеньевна Боброва
Full Text Available The author of the article has been writing English entry examinations for PFUR for over a decade. In this article she analyses the structure and contents of the English language entry examination for prospective students of Linguistics at the Faculty of Philology. The requirements for the entry written test are set by the State standards of complete secondary education for foreign languages at the level of a major subject. The PFUR entry examination has always been written in accordance with recommendations of the Education and Science Ministry and the Federal Institute of Pedagogical Assessment.
Full Text Available This paper aims at investigating the relationship between financial inclusion and the formation of entrepreneurs, both theoretically and empirically. We first construct a theoretical model to examine how the development of financial inclusion affects the formation of entrepreneurs. The model suggests that the development of financial inclusion can mitigate credit constraints on entrepreneurial activities by reducing information asymmetry in financial transactions, and in addition this effect is greater in industries with lower barriers to entry. Then, using data from 31 provinces and 19 industries in China during the period 2005–2014, we test the impact of financial inclusion on the formation of entrepreneurs. The estimation results confirm the positive effect of financial inclusion development on the formation of entrepreneurs, and indicate that this effect is heterogeneous across industries. Moreover, the development of financial inclusion is often beneficial to the formations of entrepreneurs in sectors with lower entry barriers.
Jason M Baron
Full Text Available Clinicians have traditionally ordered laboratory tests using paper-based orders and requisitions. However, paper orders are becoming increasingly incompatible with the complexities, challenges, and resource constraints of our modern healthcare systems and are being replaced by electronic order entry systems. Electronic systems that allow direct provider input of diagnostic testing or medication orders into a computer system are known as Computerized Provider Order Entry (CPOE systems. Adoption of laboratory CPOE systems may offer institutions many benefits, including reduced test turnaround time, improved test utilization, and better adherence to practice guidelines. In this review, we outline the functionality of various CPOE implementations, review the reported benefits, and discuss strategies for using CPOE to improve the test ordering process. Further, we discuss barriers to the implementation of CPOE systems that have prevented their more widespread adoption.
including the proposed moderating effect, on average, yield higher post-entry performance. This study sheds light on inconsistent results found in previous research investigating the impact of international experience and has practical implications for managerial decision-making.......This study investigates whether the relationship between mode of international market entry and non-location bound international experience is weaker for firms that are large or have a high foreign to total sales ratio, labeled multinational experience. Empirical evidence based on 250 foreign...... market entries made by Norwegian, Danish and Swedish firms suggests that the association between equity mode choice and non-location bound international experience diminishes in the presence of higher levels of multinational experience. Furthermore, firms whose entry mode choice is predicted by the model...
Department of Transportation — Border Crossing/Entry Data provides summary statistics for incoming crossings at the U.S.-Canadian and the U.S.-Mexican border at the port level. Data are available...
Boyd, Britta; Dyhr Ulrich, Anna Marie
Based on a sample of 177 exporting SMEs, this study investigates what market entry strategy is used by Danish family and non-family businesses. From a resource-based view, three critical internal factors (risk, flexibility and control) affecting the entry mode choice into the BRIC markets...... are analysed. The effective management of firms’ resources and capabilities is influenced by the perception of these internal factors when expanding into foreign markets. Our results confirmed that family firms build up longer lasting relationships in the host country by choosing high commitment entry modes...... when entering the BRIC markets. In contrast, family firms choose high commitment entry modes which involve high risk and low flexibility when entering the BRIC markets. Further implications discuss the suitability of export strategies to BRIC markets for managers of Danish family and non-family firms....
One of the controls for information entered into the data bases created and maintained by the DOE Technical Information Center is the standardized name for the corporate entity or the corporate author. The purpose of Energy Information Data Base: Corporate Author Entries (TID-4585-R1) and this supplemental list of authorized or standardized corporate entries is to provide a means for the consistent citing of the names of organizations in bibliographic records. In general, an entry in Corporate Author Entries consists of the seven-digit code number assigned to the particular corporate entity, the two-letter country code, the largest element of the corporate name, the location of the corporate entity, and the smallest element of the corporate name (if provided). This supplement [DOE/TIC-4585-R1(Suppl.5)] contains additions to the base document (TID-4585-R1) and is intended to be used with that publication
National Aeronautics and Space Administration — Building on our successful Phase I Tactile Data Entry program, Barron Associates proposes development of a Glove-Enabled Computer Operations (GECO) system to permit...
Noriyuki Yanagawa; Ryoko Oki
This paper examines the effects of exclusive dealing contracts in a simple model with manufacturers-distributors relations. We consider entrants in both manufacturing and distribution sectors. It is well-known that a potential entry threat is welfare increasing under homogenous price competition, even though the potential entrant is less productive. This paper reexamines this intuition by employing the above model. We show that the entry threat of a less-productive manufacturer is welfare dec...
Kongsted, Hans Christian
This paper establishes the general deterministic limit that corresponds to Dixit's model of entry and exit decisions under uncertainty. The interlinked nature of decisions is shown to be essential also in the deterministic limit. A numerical example illustrates the result......This paper establishes the general deterministic limit that corresponds to Dixit's model of entry and exit decisions under uncertainty. The interlinked nature of decisions is shown to be essential also in the deterministic limit. A numerical example illustrates the result...
Full Text Available Several studies on firms' marketing strategy in foreign markets revealed inconsistent resultsregarding the relationship between entry mode strategies and the adoption of marketing policies. Thisinconsistency was due to the diversity of assumptions used for the conceptualization of the influence of entrymodes on marketing strategies. The purpose of this paper is to offer a conceptual model that can support theanalysis of how the firm’s choice of entry mode may influence the adoption of marketing tools in the selectedmarket.
Pernet, Olivier; Pohl, Christine; Ainouze, Michelle; Kweder, Hasan; Buckland, Robin
Nipah virus (NiV) is a zoonotic biosafety level 4 paramyxovirus that emerged recently in Asia with high mortality in man. NiV is a member, with Hendra virus (HeV), of the Henipavirus genus in the Paramyxoviridae family. Although NiV entry, like that of other paramyxoviruses, is believed to occur via pH-independent fusion with the host cell's plasma membrane we present evidence that entry can occur by an endocytic pathway. The NiV receptor ephrinB2 has receptor kinase activity and we find that ephrinB2's cytoplasmic domain is required for entry but is dispensable for post-entry viral spread. The mutation of a single tyrosine residue (Y304F) in ephrinB2's cytoplasmic tail abrogates NiV entry. Moreover, our results show that NiV entry is inhibited by constructions and drugs specific for the endocytic pathway of macropinocytosis. Our findings could potentially permit the rapid development of novel low-cost antiviral treatments not only for NiV but also HeV.
This paper reviews existing models of radon entry into houses. The primary mechanism of radon entry in houses with high indoor concentrations is, in most cases, convective entry of radon bearing soil-gas from the surrounding soil. The driving force for this convective entry is the small indoor-outdoor pressure difference arising from the stack effect and other causes. Entry points for the soil-gas generally are the cracks or gaps in the building substructure, or though other parts of the building shell in direct contact with the soil, although entry may also occur by flow though permeable concrete or cinder block walls of the substructure. Models using analytical solutions to idealized geometrical configurations with simplified boundary conditions obtain analytical tractability of equations to be solved at the cost of severe approximations; their strength is in the insights they offer with their solutions. Models based on lumped parameters attempt to characterize the significant physical behavioral characteristics of the soil-gas and radon flow. When realistic approximations are desired for the boundary conditions and terms in the governing equations, numerical models must be used; these are usually based on finite difference or finite element solutions to the governing equations. Limited data are now available for experimental verification of model predictions. The models are briefly reviewed and their strengths and limitations are discussed
Mohanan Valiya Veettil
Full Text Available Virus entry is a complex process characterized by a sequence of events. Since the discovery of KSHV in 1994, tremendous progress has been made in our understanding of KSHV entry into its in vitro target cells. KSHV entry is a complex multistep process involving viral envelope glycoproteins and several cell surface molecules that is utilized by KSHV for its attachment and entry. KSHV has a broad cell tropism and the attachment and receptor engagement on target cells have an important role in determining the cell type-specific mode of entry. KSHV utilizes heparan sulfate, integrins and EphrinA2 molecules as receptors which results in the activation of host cell pre-existing signal pathways that facilitate the subsequent cascade of events resulting in the rapid entry of virus particles, trafficking towards the nucleus followed by viral and host gene expression. KSHV enters human fibroblast cells by dynamin dependant clathrin mediated endocytosis and by dynamin independent macropinocytosis in dermal endothelial cells. Once internalized into endosomes, fusion of the viral envelope with the endosomal membranes in an acidification dependent manner results in the release of capsids which subsequently reaches the nuclear pore vicinity leading to the delivery of viral DNA into the nucleus. In this review, we discuss the principal mechanisms that enable KSHV to interact with the host cell surface receptors as well as the mechanisms that are required to modulate cell signaling machinery for a successful entry.
The purpose of this act is to safeguard against the dangers and harmful effects of radioactive waste and to contribute to public safety and environmental protection by laying down requirements for the safe and efficient management of radioactive waste. We will find definitions, interrelation with other legislation, responsibilities of the state and local governments, responsibilities of radioactive waste management companies and generators, formulation of the basic plan for the control of radioactive waste, radioactive waste management ( with public information, financing and part of spent fuel management), Korea radioactive waste management corporation ( business activities, budget), establishment of a radioactive waste fund in order to secure the financial resources required for radioactive waste management, and penalties in case of improper operation of radioactive waste management. (N.C.)
Full Text Available Gopala Kallapura,1 Xochitl Hernandez-Velasco,2 Neil R Pumford,1 Lisa R Bielke,1 Billy M Hargis,1 Guillermo Tellez1 1Department of Poultry Science, University of Arkansas, Fayetteville, AR, USA; 2College of Veterinary Medicine and Animal Husbandry, The National Autonomous University of Mexico, Mexico Abstract: With increasing reports of Salmonella infection, we are forced to question whether the fecal–oral route is the major route of infection and consider the possibility that airborne Salmonella infections might have a major unappreciated role. Today's large-scale poultry production, with densely stocked and enclosed production buildings, is often accompanied by very high concentrations of airborne microorganisms. Considering that the upper and lower respiratory lymphoid tissue requires up to 6 weeks to be fully developed, these immune structures seem to have a very minor role in preventing pathogen infection. In addition, the avian respiratory system in commercial poultry has anatomic and physiologic properties that present no challenge to the highly adapted Salmonella. The present review evaluates the hypothesis that transmission by the fecal–respiratory route may theoretically be a viable portal of entry for Salmonella in poultry. First, we update the current knowledge on generation of Salmonella bioaerosols, and the transport and fate of Salmonella at various stages of commercial poultry production. Further, emphasis is placed on survivability of Salmonella in these bioaerosols, as a means to assess the transport and subsequent risk of exposure and infection of poultry. Additionally, the main anatomic structures, physiologic functions, and immunologic defense in the avian respiratory system are discussed to understand the potential entry points inherent in each component that could potentially lead to infection and subsequent systemic infection of poultry by Salmonella. In this context, we also evaluate the role of the mucosal immune
DeWitt, Dawn; Canny, Benedict J; Nitzberg, Michael; Choudri, Jennifer; Porter, Sarah
There is ongoing debate regarding the optimal length of medical training, with concern about the cost of prolonged training. Two simultaneous tracks currently exist in Australia: direct entry from high school and graduate entry for students with a bachelor degree. Medical schools are switching to graduate entry based on maturity, academic preparedness and career-choice surety. We tested the assumption that graduate entry is better by exploring student preferences, coping, burnout, empathy and alcohol use. From a potential pool of 2188 participants, enrolled at five Australian medical schools, a convenience sample of 688 (31%) first and second year students completed a survey in the middle of the academic year. Participants answered questions about demographics, satisfaction and coping and completed three validated instruments. Over 90% of students preferred their own entry-type, though more graduate-entry students were satisfied with their programme (82.4% versus 65.3%, p students in self-reported coping or in the proportion of students meeting criteria for burnout (50.7% versus 51.2%). Direct-entry students rated significantly higher for empathy (concern, p = 0.022; personal distress, p = 0.031). Graduate-entry students reported significantly more alcohol use and hazardous drinking (30.0% versus 22.8%; p = 0.017). Our multi-institution data confirm that students are generally satisfied with their choice of entry pathway and do not confirm significant psychosocial benefits of graduate entry. Overall, our data suggest that direct-entry students cope with the workload and psychosocial challenges of medical school, in the first 2 years, as well as graduate-entry students. Burnout and alcohol use should be addressed in both pathways. Despite studies showing similar academic outcomes, and higher total costs, more programmes in Australia are becoming graduate entry. Further research on non-cognitive issues and outcomes is needed so that universities, government
Full Text Available More than 170 million patients worldwide are chronically infected with hepatitis C virus (HCV. Prevalence rates range from 0.5% in Northern European countries to 28% in some areas of Egypt. HCV is hepatotropic, and in many countries chronic hepatitis C is a leading cause of liver disease including fibrosis, cirrhosis and hepatocellular carcinoma. HCV persists in 50–85% of infected patients, and once chronic infection is established, spontaneous clearance is rare. HCV is a member of the Flaviviridae family, in which it forms its own genus. Many lines of evidence suggest that the HCV life cycle displays many differences to that of other Flaviviridae family members. Some of these differences may be due to the close interaction of HCV with its host’s lipid and particular triglyceride metabolism in the liver, which may explain why the virus can be found in association with lipoproteins in serum of infected patients. This review focuses on the molecular events underlying the HCV cell entry process and the respective roles of cellular co-factors that have been implied in these events. These include, among others, the lipoprotein receptors low density lipoprotein receptor and scavenger receptor BI, the tight junction factors occludin and claudin-1 as well as the tetraspanin CD81. We discuss the roles of these cellular factors in HCV cell entry and how association of HCV with lipoproteins may modulate the cell entry process.
Jones, Cindy D.; Clark, Sarah K.; Reutzel, D. Ray
This study investigated the affordances of informational texts to serve as model texts for teaching text structure to elementary school children. Content analysis of a random sampling of children's informational texts from top publishers was conducted on text structure organization and on the inclusion of text features as signals of text…
... 19 Customs Duties 2 2010-04-01 2010-04-01 false Information on entry summary. 151.41 Section 151... Products § 151.41 Information on entry summary. On the entry summary for petroleum or petroleum products in.... If the exact volumetric quantity cannot be determined in advance, the entry summary may be made for...
Ana Paula Bianconcini Anjos
Full Text Available http://dx.doi.org/10.5007/2175-8026.2017v70n1p161 The aim of the present article is to recover the history of the cinematic adaptations of the novel An American Tragedy (1925, by Theodore Dreiser, reinstating the discussions of the drowning scene. Sergei Eisenstein’s writings on the possibilities of the use of the interior monologue in films and Bertolt Brecht’s remarks on the role of the soundtrack in Dreiser’s novel adaptation offer an important entry into the analysis of the film Match Point (2005, by Woody Allen. In Match Point, the use of the soundtrack, in particular the collage with the opera Othello (1887, by Giuseppe Verdi, instigates the spectator to reflect on the narrative possibilities of film adaptation.
An Entry Control System has been developed which is appropriate for use at an installation with a large population requiring access over a large area. This is accomplished by centralizing the data base management and enrollment functions and decentralizing the guard-assisted, positive personnel identification and access functions. Current information pertaining to all enrollees is maintained through user-friendly enrollment stations. These stations may be used to enroll individuals, alter their area access authorizations, change expiration dates, and other similar functions. An audit trail of data base alterations is provided to the System Manager. Decentrailized systems exist at each area to which access is controlled. The central system provides these systems with the necessary entry control information to allow them to operate microprocessor-driven entry control devices. The system is comprised of commercially available entry control components and is structured such that it will be able to incorporate improved devices as technology porogresses. Currently, access is granted to individuals who possess a valid credential, have current access authorization, can supply a memorized personal identification number, and whose physical hand dimensions match their profile obtained during enrollment. The entry control devices report misuses as security violations to a Guard Alarm Display and Assessment System
Boyd, Britta; Dyhr Ulrich, Anna Marie; Hollensen, Svend
Based on a survey of 170 Danish SMEs the paper examines influences on entry mode choices and the financial outcome of these decisions. The main research objectives are divided into two steps: Step 1: To determine the factors influencing the choice of foreign entry modes by Danish companies. Step ...... and implications are provided for companies willing to invest more into foreign markets in order to achieve a higher degree of control and better financial results.......Based on a survey of 170 Danish SMEs the paper examines influences on entry mode choices and the financial outcome of these decisions. The main research objectives are divided into two steps: Step 1: To determine the factors influencing the choice of foreign entry modes by Danish companies. Step 2......: To determine the relationship between the choice of entry mode and export performance, measured in terms of financial outcome. Drawing from transaction cost theory the authors develop and test a model where different factors affect the level of control chosen by the parent company. This study contributes...
Guus A Ten Broeke
Full Text Available Adaptation of agents through learning or evolution is an important component of the resilience of Complex Adaptive Systems (CAS. Without adaptation, the flexibility of such systems to cope with outside pressures would be much lower. To study the capabilities of CAS to adapt, social simulations with agent-based models (ABMs provide a helpful tool. However, the value of ABMs for studying adaptation depends on the availability of methodologies for sensitivity analysis that can quantify resilience and adaptation in ABMs. In this paper we propose a sensitivity analysis methodology that is based on comparing time-dependent probability density functions of output of ABMs with and without agent adaptation. The differences between the probability density functions are quantified by the so-called earth-mover's distance. We use this sensitivity analysis methodology to quantify the probability of occurrence of critical transitions and other long-term effects of agent adaptation. To test the potential of this new approach, it is used to analyse the resilience of an ABM of adaptive agents competing for a common-pool resource. Adaptation is shown to contribute positively to the resilience of this ABM. If adaptation proceeds sufficiently fast, it may delay or avert the collapse of this system.
Full Text Available The paper is embedded in the following fields: strategic management in terms of behavioural strategy concept, adaptability construct, and micro-foundations realm as well as organizational theory and psychology. Moreover, the paper concerns to some extent a multi-level approach in strategic management involving individual, team, and organizational level. The aim of the paper is to contribute to extend, on one hand, the ascertainment set in the field of behavioural strategy as behavioural strategy encompasses a mindboggling diversity of topics and methods and its conceptual unity has been hard to achieve (Powell, Lovallo, Fox 2011, p. 1371, and on the other hand, to order mixed approaches to adaptability especially to gain insights on micro-level adapting processes (individual adaptability and adaptive performance in terms of the multi-level approach. The method that has been used is literature studies and the interference is mostly deductive. The structure of the manuscript is four-fold. The first part involves the considerations in the field of adaptability and adaptive performance at the individual level. The issues of adaptability and adaptive performance at the team level have been presented in the second part. The third part encompasses the organizational adaptability assertions. Finally, the conclusion, limitations of the considerations highlighted as well as the future research directions have been emphasized. The overarching key finding is that the behavioural strategy concept may constitute the boundary spanner in exploring and explaining adaptability phenomenon at different levels of analysis.
Prabhu, Dinesh K.; Spilker, Thomas R.; Allen, Gary A., Jr.; Hwang, Helen H.; Cappuccio, Gelsomina; Moses, Robert W.
The present study considers direct ballistic entries into the atmosphere of Venus using a 45deg sphere-cone rigid aeroshell, a legacy shape that has been used successfully in the past in the Pioneer Venus Multiprobe Mission. For a number of entry mass and heatshield diameter combinations (i.e., various ballistic coefficients) and entry velocities, the trajectory space in terms of entry flight path angles between skip out and -30deg is explored with a 3DoF trajectory code, TRAJ. From these trajectories, the viable entry flight path angle space is determined through the use of mechanical and thermal performance limits on the thermal protection material and science payload; the thermal protection material of choice is entry-grade carbon phenolic, for which a material thermal response model is available. For mechanical performance, a 200 g limit is placed on the peak deceleration load experienced by the science instruments, and 10 bar is assumed as the pressure limit for entry-grade carbon-phenolic material. For thermal performance, inflection points in the total heat load distribution are used as cut off criteria. Analysis of the results shows the existence of a range of critical ballistic coefficients beyond which the steepest possible entries are determined by the pressure limit of the material rather than the deceleration load limit.
Kim, Bo Hyun; Paik, Chul Hwa; Lee, Won Yong
To improve efficacy in producing and searching the radiological reported of prostate US in daily practice and clinical research by developing an automated reporting system using structured data entry system. The report database was established with appropriate fields. A structured data entry form for prostate US was created. The rules for automated transformation from the entered data a text report have been decide. Two programmers coded the programs according to the rules. We have successful developed an automated reporting system for prostate US using structured data entry. Patients. deg Φs demographic information, the order information, and the contents of the main body and conclusion of the radiological report were included as individual fields in the database. The report contents were input by selecting corresponding fields in a structured data entry entry form, which has transformed into a text report. The automated reporting system using structured data entry is an efficient way to establish radiological report database and could be successfully applied to prostate US. If its utility can be extended to other US examinations, it will become a useful tool for both radiological reporting and database management.
All organisms interact with fluids in one way or another, and some have presumably adapted their behaviors or features in response to fluid-mechanical forces. Particularly, fluid forces are of great importance when organisms or their body parts move in and out of water. In this talk, I will discuss three problems in which fluid mechanics principles affect form and function of animals. The first problem is how several seabirds (e.g. Gannets and Boobies) dive into water at up to 24 m/s without any injuries. This study examines the effects of their beak shape and dense feathers during water entry to reduce or spread the impact force on the body. The second problem is how animals jump out of water, from plankton to whales. Some aquatic animals generate enough force to exit the water surface as an effective method of capturing prey or escaping from predators. Finally, I will discuss about lapping animals (e.g. dog and cat) as a combined water entry and exit. During the tongue-lapping, associated fluid forces and pinch-off instability will be discussed.
Esposito, Anthony M. [Division of Infectious Diseases, Department of Medicine, Icahn School of Medicine at Mount Sinai, Immunology Institute, New York, NY (United States); Cheung, Pamela [Integrated Screening Core, Icahn School of Medicine at Mount Sinai, New York, NY (United States); Swartz, Talia H.; Li, Hongru [Division of Infectious Diseases, Department of Medicine, Icahn School of Medicine at Mount Sinai, Immunology Institute, New York, NY (United States); Tsibane, Tshidi [Department of Microbiology, Icahn School of Medicine at Mount Sinai, New York, NY (United States); Durham, Natasha D. [Division of Infectious Diseases, Department of Medicine, Icahn School of Medicine at Mount Sinai, Immunology Institute, New York, NY (United States); Basler, Christopher F. [Department of Microbiology, Icahn School of Medicine at Mount Sinai, New York, NY (United States); Felsenfeld, Dan P. [Integrated Screening Core, Icahn School of Medicine at Mount Sinai, New York, NY (United States); Chen, Benjamin K., E-mail: email@example.com [Division of Infectious Diseases, Department of Medicine, Icahn School of Medicine at Mount Sinai, Immunology Institute, New York, NY (United States)
Enveloped virus entry occurs when viral and cellular membranes fuse releasing particle contents into the target cell. Human immunodeficiency virus (HIV) entry occurs by cell-free virus or virus transferred between infected and uninfected cells through structures called virological synapses. We developed a high-throughput cell-based assay to identify small molecule inhibitors of cell-free or virological synapse-mediated entry. An HIV clone carrying Cre recombinase as a Gag-internal gene fusion releases active Cre into cells upon viral entry activating a recombinatorial gene switch changing dsRed to GFP-expression. A screen of a 1998 known-biological profile small molecule library identified pharmacological HIV entry inhibitors that block both cell-free and cell-to-cell infection. Many top hits were noted as HIV inhibitors in prior studies, but not previously recognized as entry antagonists. Modest therapeutic indices for simvastatin and nigericin were observed in confirmatory HIV infection assays. This robust assay is adaptable to study HIV and heterologous viral pseudotypes. - Highlights: • Cre recombinase viral fusion assay screens cell-free or cell–cell entry inhibitors. • This Gag-iCre based assay is specific for the entry step of HIV replication. • Screened a library of known pharmacologic compounds for HIV fusion antagonists. • Many top hits were previously noted as HIV inhibitors, but here are classified as entry antagonists. Many top hits were previously noted as HIV inhibitors, but not as entry antagonists. • The assay is compatible with pseudotyping with HIV and heterologous viruses.
Esposito, Anthony M.; Cheung, Pamela; Swartz, Talia H.; Li, Hongru; Tsibane, Tshidi; Durham, Natasha D.; Basler, Christopher F.; Felsenfeld, Dan P.; Chen, Benjamin K.
Enveloped virus entry occurs when viral and cellular membranes fuse releasing particle contents into the target cell. Human immunodeficiency virus (HIV) entry occurs by cell-free virus or virus transferred between infected and uninfected cells through structures called virological synapses. We developed a high-throughput cell-based assay to identify small molecule inhibitors of cell-free or virological synapse-mediated entry. An HIV clone carrying Cre recombinase as a Gag-internal gene fusion releases active Cre into cells upon viral entry activating a recombinatorial gene switch changing dsRed to GFP-expression. A screen of a 1998 known-biological profile small molecule library identified pharmacological HIV entry inhibitors that block both cell-free and cell-to-cell infection. Many top hits were noted as HIV inhibitors in prior studies, but not previously recognized as entry antagonists. Modest therapeutic indices for simvastatin and nigericin were observed in confirmatory HIV infection assays. This robust assay is adaptable to study HIV and heterologous viral pseudotypes. - Highlights: • Cre recombinase viral fusion assay screens cell-free or cell–cell entry inhibitors. • This Gag-iCre based assay is specific for the entry step of HIV replication. • Screened a library of known pharmacologic compounds for HIV fusion antagonists. • Many top hits were previously noted as HIV inhibitors, but here are classified as entry antagonists. Many top hits were previously noted as HIV inhibitors, but not as entry antagonists. • The assay is compatible with pseudotyping with HIV and heterologous viruses.
Ulhøi, John Parm
(first-mover or follower). Invention is understood as the conversion of human creativity, time and financial resources into new ideas. Innovation in turn reflects the practical and financial return on such investments. While there is little disagreement about what an innovator strategy is, imitative......This paper focuses on the initial questions of how and when to enter a market from the perspective of a firm. By entry mode is meant a firm’s strategy (innovation or imitation) for entering the market in response to environmental changes. Entry order refers to the related issue of market timing...... strategies are more ambiguous. Based on a corporate technology and innovation strategy perspective, the paper reconceptualises and extends existing modes and orders of market entry, and in particular clarifies the ambiguity associated with imitative strategies. Four distinct imitator strategies...
Fitzgerald, Jill; Elmore, Jeff; Koons, Heather; Hiebert, Elfrieda H.; Bowen, Kimberly; Sanford-Moore, Eleanor E.; Stenner, A. Jackson
The Common Core set a standard for all children to read increasingly complex texts throughout schooling. The purpose of the present study was to explore text characteristics specifically in relation to early-grades text complexity. Three hundred fifty primary-grades texts were selected and digitized. Twenty-two text characteristics were identified…
It is worth stressing that distinguishing between the form and its meaning in comparing the material 6 languages belonging to three different groups of Slavic languages (as is the case in the MONDILEX Project will allow us to avoid numeorus substantiva mistakes and erroneous conclusions. Hence dictionary entries should be verified and made uniform in that respect before they are “digitalized”... Distinction between the form and its meaning in a dictionary entry is fully possible, as shown by works of Z. Saloni (2002 and A.Przepiórkowski (2008.
Johnson, Wyatt R.; Lu, Ping; Stachowiak, Susan J.
This paper discusses the implementation and simulated performance of the FNPEG (Fully Numerical Predictor-corrector Entry Guidance) algorithm into GNC FSW (Guidance, Navigation, and Control Flight Software) for use in an autonomous re-entry vehicle. A few modifications to FNPEG are discussed that result in computational savings -- a change to the state propagator, and a modification to cross-range lateral logic. Finally, some Monte Carlo results are presented using a representative vehicle in both a high-fidelity 6-DOF (degree-of-freedom) sim as well as in a 3-DOF sim for independent validation.
Describes the design and construction of Resume Automatique a Fragments Indicateurs (RAFI), a system of automatic text summary which sums up scientific and technical texts. The RAFI system transforms a long source text into several versions of more condensed texts, using discourse analysis, to make searching easier; it could be adapted to the…
Full Text Available This paper aims at modelling an electronically coupled distributed energy resource with an adaptive protection scheme. The electronically coupled distributed energy resource is a microgrid framework formed by coupling the renewable energy source electronically. Further, the proposed adaptive protection scheme provides a suitable protection to the microgrid for various fault conditions irrespective of the operating mode of the microgrid: namely, grid connected mode and islanded mode. The outstanding aspect of the developed adaptive protection scheme is that it monitors the microgrid and instantly updates relay fault current according to the variations that occur in the system. The proposed adaptive protection scheme also employs auto reclosures, through which the proposed adaptive protection scheme recovers faster from the fault and thereby increases the consistency of the microgrid. The effectiveness of the proposed adaptive protection is studied through the time domain simulations carried out in the PSCAD⧹EMTDC software environment.
Full Text Available On the background of the dramatic swings in the Swedish TFR since the mid-1980s we present a first attempt at assessing the impact of labor-market trends on the timing of the first birth based on individual-level register data covering all Swedish women born in 1950 or later. Among our covariates we have each woman's income, partitioned into any income earned from work, any unemployment benefits, and any public support for educational activities. We also have employment trends in her home municipality. The latter variables are included for every relevant year. We find that first-birth rates rose and fell in step with municipal employment levels. The effect is especially strong for young women, and the decline in first birth during the 1990s was concentrated primarily among women aged below 30. First-birth rates increased with a woman's earned income. Unemployed women did not have particularly low first-birth rates, but students did.
H.G. Barkema (Harry); J.H.J. Bell (John); J.M.E. Pennings
textabstractThis paper examines the longevity of foreign entries. Hypotheses are developed on the mode (start-ups vs. acquisitions) and ownership structure (wholly owned vs. joint ventures) in relation to cultural distance. The hypotheses are tested within a framework of organizational learning,
In this study, the investigator examines the correlation between entry requirements and academic performance of undergraduate students at the University of Buea. The quality of performance on the Cameroon General Certificate Examination at the Advanced Level is the predictor while the criterion is the cumulative grade ...
Smit, Jolanda M.; Moesker, Bastiaan; Rodenhuis-Zybert, Izabela; Wilschut, Jan
Flaviviruses, such as dengue virus and West Nile virus, are enveloped viruses that infect cells through receptor-mediated endocytosis and fusion from within acidic endosomes. The cell entry process of flaviviruses is mediated by the viral E glycoprotein. This short review will address recent
Russell, Dorothy S.
The author reviews the entry of women into the teaching profession in nineteenth-century America, noting that, while the primary motivation for encouraging women to teach was that they could be paid less than men, this economic justification was obscured by sentimental pronouncements about women's superior moral and nurturant power. (SJL)
Lutz, C.H.M.; Kemp, R.G.M.; Dijkstra, S.G.
This article uses factor analysis to identify the underlying dimensions of strategic and structural entry barriers. We find that, in the perception of firms, both types of barriers are important and that the effectiveness of strategic barriers depends on attributes of the market structure. Based on
Lutz, Clemens H. M.; Kemp, Ron G. M.; Dijkstra, S. Gerhard
This article uses factor analysis to identify the underlying dimensions of strategic and structural entry barriers. We find that, in the perception of firms, both types of barriers are important and that the effectiveness of strategic barriers depends on attributes of the market structure. Based on
The DOE Energy Information Data Base has been created and is maintained by the DOE Technical Information Center. One of the controls for information entered into the base is the standardized name of the corporate entity or the corporate author. The purpose of this list of authorized or standardized corporate entries is to provide a means for the consistent citing of the names of organizations in bibliographic records. It also serves as a guide for users who retrieve information from a bibliographic data base and who want to locate information originating in particular organizations. This authority is a combination of entries established by the Technical Information Center and the International Atomic Energy Agency's International Nuclear Information System (INIS). The format calls, in general, for the name of the organization represented by the literature being cataloged to be cited as follows: the largest element, the place, the smallest element, e.g., Brigham Young Univ., Provo, Utah (USA), Dept. of Chemical Engineering. Code numbers are assigned to each entry to provide manipulation by computer. Cross references are used to reflect name changes and invalid entries
state which mainly determines its polarizability . ∆r2 = r2u− r2l is the difference between Radiation Database for Earth and Mars Entry RTO-EN-AVT...NO A← X (0,0) band in the presence of argon and nitrogen. Journal of Quantitative Spectroscopy and Radiative Transfer, 47:375–390, 1992. Radiation
... DEPARTMENT OF HOMELAND SECURITY Bureau of Customs and Border Protection DEPARTMENT OF THE TREASURY 19 CFR Part 141 Entry of Merchandise CFR Correction In Title 19 of the Code of Federal Regulations, Parts 141 to 199, revised as of April 1, 2010, on page 6, the second general authority citation for part...
Eiselein, E. B.; Topper, Martin
The article describes some of the roles open to anthropologists in radio and television. Entry strategies for occupying these roles include taking the first step in approaching the broadcast station, learning about broadcasting, and communicating anthropology to the broadcasters. (Author/NQ)
Anderson, Lorin W.
Schools have devised several ways to adapt instruction to a wide variety of student abilities and needs. Judged by criteria for what adaptive education should be, most learning for mastery programs look good. (Author/JM)
Che Maznah Binti Mat Isa
Full Text Available The paper aims to provide a holistic approach to address how construction firms make decisions covering all three domains (location, timing and mode across country, market, firm and project factors within the Ownership, Locational and Internalisation plus Specialty (OLI+S paradigm. Questionnaires were administered to 62 project managers based on a sampling frame provided by the Construction Industry Development Board Malaysia. The findings provide empirical and theoretical insights on how the OLI+S model addresses firms’ entry decisions to penetrate international markets. It suggests that the ownership-entry decision factors focus on firms’ internal transferable advantages. The locational-entry decision factors emphasise attractiveness of certain locations where firms decided to invest and operate. The internalisation– entry decision factors emphasise the extent to which firms were able to manipulate their internal competitive assets (firm’s resources and capabilities. Finally, the specialty-entry decision factors emphasise on firms’ competency in project management and specialist expertise to handle complex projects based on their previous project experience. An example of construction firms’ unique characteristics, namely, specialty advantages based on the original Dunning’s OLI eclectic paradigm has been adopted. The established OLI+S entry decision model could be investigated to further refine other related internationalisation theory.
Kara G Lassen
Full Text Available Elite suppressors (ES are a rare subset of HIV-1-infected individuals who are able to maintain HIV-1 viral loads below the limit of detection by ultra-sensitive clinical assays in the absence of antiretroviral therapy. Mechanism(s responsible for this elite control are poorly understood but likely involve both host and viral factors. This study assesses ES plasma-derived envelope glycoprotein (env fitness as a function of entry efficiency as a possible contributor to viral suppression. Fitness of virus entry was first evaluated using a novel inducible cell line with controlled surface expression levels of CD4 (receptor and CCR5 (co-receptor. In the context of physiologic CCR5 and CD4 surface densities, ES envs exhibited significantly decreased entry efficiency relative to chronically infected viremic progressors. ES envs also demonstrated slow entry kinetics indicating the presence of virus with reduced entry fitness. Overall, ES env clones were less efficient at mediating entry than chronic progressor envs. Interestingly, acute infection envs exhibited an intermediate phenotypic pattern not distinctly different from ES or chronic progressor envs. These results imply that lower env fitness may be established early and may directly contribute to viral suppression in ES individuals.
J. Sharana Basavaraja
Full Text Available The work presented in this paper aims to study the performance of a two-lobe hole-entry hybrid journal bearing system compensated by orifice restrictors. The Reynolds equation governing the flow of lubricant in the clearance space between the journal and bearing together with the equation of flow through an orifice restrictor has been solved using FEM and Galerkin's method. The bearing performance characteristics results have been simulated for an orifice compensated nonrecessed two-lobe hole-entry hybrid journal bearing symmetric configuration for the various values of offset factor (, restrictor design parameter (2, and the value of external load (0. Further, a comparative study of the performance of a two-lobe hole-entry hybrid journal bearing system with a circular hole-entry symmetric hybrid journal bearing system has also been carried out so that a designer has a better flexibility in choosing a suitable bearing configuration. The simulated numerical results indicate that for the two-lobe symmetric hole-entry hybrid journal bearing system with an offset factor ( greater than one provides 30 to 50 percent larger values of direct stiffness and direct damping coefficients as compared to a circular symmetric hole-entry hybrid journal bearing system.
Whitney, Paul D; Willse, Alan R; Lopresti, Charles A; White, Amanda M
Text analysis methods, text analysis apparatuses, and articles of manufacture are described according to some aspects. In one aspect, a text analysis method includes accessing information indicative of data content of a collection of text comprising a plurality of different topics, using a computing device, analyzing the information indicative of the data content, and using results of the analysis, identifying a presence of a new topic in the collection of text.
Pettijohn, Terry F.; Frazier, Erik; Rieser, Elizabeth; Vaughn, Nicholas; Hupp-Wilds, Bobbi
A 21-item survey on texting in the classroom was given to 235 college students. Overall, 99.6% of students owned a cellphone and 98% texted daily. Of the 138 students who texted in the classroom, most texted friends or significant others, and indicate the reason for classroom texting is boredom or work. Students who texted sent a mean of 12.21…
Volchik Vyacheslav, V.
Full Text Available The economic literature focused on understanding decision-making and choice processes reveals a vast collection of approaches to human rationality. Theorists’ attention has moved from absolutely rational, utility-maximizing individuals to boundedly rational and adaptive ones. A number of economists have criticized the concepts of adaptive rationality and adaptive behavior. One of the recent trends in the economic literature is to consider humans irrational. This paper offers an approach which examines adaptive behavior in the context of existing institutions and constantly changing institutional environment. It is assumed that adaptive behavior is a process of evolutionary adjustment to fundamental uncertainty. We emphasize the importance of actors’ engagement in trial and error learning, since if they are involved in this process, they obtain experience and are able to adapt to existing and new institutions. The paper aims at identifying relevant institutions, adaptive mechanisms, informal working rules and practices that influence actors’ behavior in the field of Higher Education in Russia (Rostov Region education services market has been taken as an example. The paper emphasizes the application of qualitative interpretative methods (interviews and discourse analysis in examining actors’ behavior.
Full Text Available Figures are ubiquitous in biomedical full-text articles, and they represent important biomedical knowledge. However, the sheer volume of biomedical publications has made it necessary to develop computational approaches for accessing figures. Therefore, we are developing the Biomedical Figure Search engine (http://figuresearch.askHERMES.org to allow bioscientists to access figures efficiently. Since text frequently appears in figures, automatically extracting such text may assist the task of mining information from figures. Little research, however, has been conducted exploring text extraction from biomedical figures.We first evaluated an off-the-shelf Optical Character Recognition (OCR tool on its ability to extract text from figures appearing in biomedical full-text articles. We then developed a Figure Text Extraction Tool (FigTExT to improve the performance of the OCR tool for figure text extraction through the use of three innovative components: image preprocessing, character recognition, and text correction. We first developed image preprocessing to enhance image quality and to improve text localization. Then we adapted the off-the-shelf OCR tool on the improved text localization for character recognition. Finally, we developed and evaluated a novel text correction framework by taking advantage of figure-specific lexicons.The evaluation on 382 figures (9,643 figure texts in total randomly selected from PubMed Central full-text articles shows that FigTExT performed with 84% precision, 98% recall, and 90% F1-score for text localization and with 62.5% precision, 51.0% recall and 56.2% F1-score for figure text extraction. When limiting figure texts to those judged by domain experts to be important content, FigTExT performed with 87.3% precision, 68.8% recall, and 77% F1-score. FigTExT significantly improved the performance of the off-the-shelf OCR tool we used, which on its own performed with 36.6% precision, 19.3% recall, and 25.3% F1-score for
Bushnell, Catherine; Kemp, Nenagh; Martin, Frances Heritage
This study investigated 10- to 12-year-old Australian children's text-messaging practices and their relationship to traditional spelling ability. Of the 227 children tested, 82% reported sending text-messages; a median of 5 per day. Use of predictive and multi-press entry methods was roughly equal. Children produced a wide range of text-message…
Full Text Available A starting point for adapting to longer-term climate change could be adaptation to short-term climate variability and extreme events. Making more informed choices about the use of remittances can enhance the adaptive capacity of remittance-receiving households.
Aaij, R; Adeva, B; Adinolfi, M; Ajaltouni, Z; Akar, S; Albrecht, J; Alessio, F; Alexander, M; Ali, S; Alkhazov, G; Alvarez Cartelle, P; Alves, A A; Amato, S; Amerio, S; Amhis, Y; An, L; Anderlini, L; Andreassi, G; Andreotti, M; Andrews, J E; Appleby, R B; Archilli, F; d'Argent, P; Arnau Romeu, J; Artamonov, A; Artuso, M; Aslanides, E; Auriemma, G; Baalouch, M; Babuschkin, I; Bachmann, S; Back, J J; Badalov, A; Baesso, C; Baker, S; Baldini, W; Barlow, R J; Barschel, C; Barsuk, S; Barter, W; Baszczyk, M; Batozskaya, V; Batsukh, B; Battista, V; Bay, A; Beaucourt, L; Beddow, J; Bedeschi, F; Bediaga, I; Bel, L J; Bellee, V; Belloli, N; Belous, K; Belyaev, I; Ben-Haim, E; Bencivenni, G; Benson, S; Benton, J; Berezhnoy, A; Bernet, R; Bertolin, A; Betancourt, C; Betti, F; Bettler, M-O; van Beuzekom, M; Bezshyiko, Ia; Bifani, S; Billoir, P; Bird, T; Birnkraut, A; Bitadze, A; Bizzeti, A; Blake, T; Blanc, F; Blouw, J; Blusk, S; Bocci, V; Boettcher, T; Bondar, A; Bondar, N; Bonivento, W; Bordyuzhin, I; Borgheresi, A; Borghi, S; Borisyak, M; Borsato, M; Bossu, F; Boubdir, M; Bowcock, T J V; Bowen, E; Bozzi, C; Braun, S; Britsch, M; Britton, T; Brodzicka, J; Buchanan, E; Burr, C; Bursche, A; Buytaert, J; Cadeddu, S; Calabrese, R; Calvi, M; Calvo Gomez, M; Camboni, A; Campana, P; Campora Perez, D H; Capriotti, L; Carbone, A; Carboni, G; Cardinale, R; Cardini, A; Carniti, P; Carson, L; Carvalho Akiba, K; Casse, G; Cassina, L; Castillo Garcia, L; Cattaneo, M; Cauet, Ch; Cavallero, G; Cenci, R; Charles, M; Charpentier, Ph; Chatzikonstantinidis, G; Chefdeville, M; Chen, S; Cheung, S-F; Chobanova, V; Chrzaszcz, M; Cid Vidal, X; Ciezarek, G; Clarke, P E L; Clemencic, M; Cliff, H V; Closier, J; Coco, V; Cogan, J; Cogneras, E; Cogoni, V; Cojocariu, L; Collazuol, G; Collins, P; Comerma-Montells, A; Contu, A; Cook, A; Coombs, G; Coquereau, S; Corti, G; Corvo, M; Costa Sobral, C M; Couturier, B; Cowan, G A; Craik, D C; Crocombe, A; Cruz Torres, M; Cunliffe, S; Currie, R; D'Ambrosio, C; Da Cunha Marinho, F; Dall'Occo, E; Dalseno, J; David, P N Y; Davis, A; De Aguiar Francisco, O; De Bruyn, K; De Capua, S; De Cian, M; De Miranda, J M; De Paula, L; De Serio, M; De Simone, P; Dean, C-T; Decamp, D; Deckenhoff, M; Del Buono, L; Demmer, M; Dendek, A; Derkach, D; Deschamps, O; Dettori, F; Dey, B; Di Canto, A; Dijkstra, H; Dordei, F; Dorigo, M; Dosil Suárez, A; Dovbnya, A; Dreimanis, K; Dufour, L; Dujany, G; Dungs, K; Durante, P; Dzhelyadin, R; Dziurda, A; Dzyuba, A; Déléage, N; Easo, S; Ebert, M; Egede, U; Egorychev, V; Eidelman, S; Eisenhardt, S; Eitschberger, U; Ekelhof, R; Eklund, L; Ely, S; Esen, S; Evans, H M; Evans, T; Falabella, A; Farley, N; Farry, S; Fay, R; Fazzini, D; Ferguson, D; Fernandez Prieto, A; Ferrari, F; Ferreira Rodrigues, F; Ferro-Luzzi, M; Filippov, S; Fini, R A; Fiore, M; Fiorini, M; Firlej, M; Fitzpatrick, C; Fiutowski, T; Fleuret, F; Fohl, K; Fontana, M; Fontanelli, F; Forshaw, D C; Forty, R; Franco Lima, V; Frank, M; Frei, C; Fu, J; Furfaro, E; Färber, C; Gallas Torreira, A; Galli, D; Gallorini, S; Gambetta, S; Gandelman, M; Gandini, P; Gao, Y; Garcia Martin, L M; García Pardiñas, J; Garra Tico, J; Garrido, L; Garsed, P J; Gascon, D; Gaspar, C; Gavardi, L; Gazzoni, G; Gerick, D; Gersabeck, E; Gersabeck, M; Gershon, T; Ghez, Ph; Gianì, S; Gibson, V; Girard, O G; Giubega, L; Gizdov, K; Gligorov, V V; Golubkov, D; Golutvin, A; Gomes, A; Gorelov, I V; Gotti, C; Govorkova, E; Grabalosa Gándara, M; Graciani Diaz, R; Granado Cardoso, L A; Graugés, E; Graverini, E; Graziani, G; Grecu, A; Griffith, P; Grillo, L; Gruberg Cazon, B R; Grünberg, O; Gushchin, E; Guz, Yu; Gys, T; Göbel, C; Hadavizadeh, T; Hadjivasiliou, C; Haefeli, G; Haen, C; Haines, S C; Hall, S; Hamilton, B; Han, X; Hansmann-Menzemer, S; Harnew, N; Harnew, S T; Harrison, J; Hatch, M; He, J; Head, T; Heister, A; Hennessy, K; Henrard, P; Henry, L; Hernando Morata, J A; van Herwijnen, E; Heß, M; Hicheur, A; Hill, D; Hombach, C; Hopchev, H; Hulsbergen, W; Humair, T; Hushchyn, M; Hussain, N; Hutchcroft, D; Idzik, M; Ilten, P; Jacobsson, R; Jaeger, A; Jalocha, J; Jans, E; Jawahery, A; Jiang, F; John, M; Johnson, D; Jones, C R; Joram, C; Jost, B; Jurik, N; Kandybei, S; Kanso, W; Karacson, M; Kariuki, J M; Karodia, S; Kecke, M; Kelsey, M; Kenyon, I R; Kenzie, M; Ketel, T; Khairullin, E; Khanji, B; Khurewathanakul, C; Kirn, T; Klaver, S; Klimaszewski, K; Koliiev, S; Kolpin, M; Komarov, I; Koopman, R F; Koppenburg, P; Kosmyntseva, A; Kozachuk, A; Kozeiha, M; Kravchuk, L; Kreplin, K; Kreps, M; Krokovny, P; Kruse, F; Krzemien, W; Kucewicz, W; Kucharczyk, M; Kudryavtsev, V; Kuonen, A K; Kurek, K; Kvaratskheliya, T; Lacarrere, D; Lafferty, G; Lai, A; Lanfranchi, G; Langenbruch, C; Latham, T; Lazzeroni, C; Le Gac, R; van Leerdam, J; Lees, J-P; Leflat, A; Lefrançois, J; Lefèvre, R; Lemaitre, F; Lemos Cid, E; Leroy, O; Lesiak, T; Leverington, B; Li, Y; Likhomanenko, T; Lindner, R; Linn, C; Lionetto, F; Liu, B; Liu, X; Loh, D; Longstaff, I; Lopes, J H; Lucchesi, D; Lucio Martinez, M; Luo, H; Lupato, A; Luppi, E; Lupton, O; Lusiani, A; Lyu, X; Machefert, F; Maciuc, F; Maev, O; Maguire, K; Malde, S; Malinin, A; Maltsev, T; Manca, G; Mancinelli, G; Manning, P; Maratas, J; Marchand, J F; Marconi, U; Marin Benito, C; Marino, P; Marks, J; Martellotti, G; Martin, M; Martinelli, M; Martinez Santos, D; Martinez Vidal, F; Martins Tostes, D; Massacrier, L M; Massafferri, A; Matev, R; Mathad, A; Mathe, Z; Matteuzzi, C; Mauri, A; Maurin, B; Mazurov, A; McCann, M; McCarthy, J; McNab, A; McNulty, R; Meadows, B; Meier, F; Meissner, M; Melnychuk, D; Merk, M; Merli, A; Michielin, E; Milanes, D A; Minard, M-N; Mitzel, D S; Mogini, A; Molina Rodriguez, J; Monroy, I A; Monteil, S; Morandin, M; Morawski, P; Mordà, A; Morello, M J; Moron, J; Morris, A B; Mountain, R; Muheim, F; Mulder, M; Mussini, M; Müller, D; Müller, J; Müller, K; Müller, V; Naik, P; Nakada, T; Nandakumar, R; Nandi, A; Nasteva, I; Needham, M; Neri, N; Neubert, S; Neufeld, N; Neuner, M; Nguyen, A D; Nguyen, T D; Nguyen-Mau, C; Nieswand, S; Niet, R; Nikitin, N; Nikodem, T; Novoselov, A; O'Hanlon, D P; Oblakowska-Mucha, A; Obraztsov, V; Ogilvy, S; Oldeman, R; Onderwater, C J G; Otalora Goicochea, J M; Otto, A; Owen, P; Oyanguren, A; Pais, P R; Palano, A; Palombo, F; Palutan, M; Panman, J; Papanestis, A; Pappagallo, M; Pappalardo, L L; Parker, W; Parkes, C; Passaleva, G; Pastore, A; Patel, G D; Patel, M; Patrignani, C; Pearce, A; Pellegrino, A; Penso, G; Pepe Altarelli, M; Perazzini, S; Perret, P; Pescatore, L; Petridis, K; Petrolini, A; Petrov, A; Petruzzo, M; Picatoste Olloqui, E; Pietrzyk, B; Pikies, M; Pinci, D; Pistone, A; Piucci, A; Playfer, S; Plo Casasus, M; Poikela, T; Polci, F; Poluektov, A; Polyakov, I; Polycarpo, E; Pomery, G J; Popov, A; Popov, D; Popovici, B; Poslavskii, S; Potterat, C; Price, E; Price, J D; Prisciandaro, J; Pritchard, A; Prouve, C; Pugatch, V; Puig Navarro, A; Punzi, G; Qian, W; Quagliani, R; Rachwal, B; Rademacker, J H; Rama, M; Ramos Pernas, M; Rangel, M S; Raniuk, I; Ratnikov, F; Raven, G; Redi, F; Reichert, S; Dos Reis, A C; Remon Alepuz, C; Renaudin, V; Ricciardi, S; Richards, S; Rihl, M; Rinnert, K; Rives Molina, V; Robbe, P; Rodrigues, A B; Rodrigues, E; Rodriguez Lopez, J A; Rodriguez Perez, P; Rogozhnikov, A; Roiser, S; Rollings, A; Romanovskiy, V; Romero Vidal, A; Ronayne, J W; Rotondo, M; Rudolph, M S; Ruf, T; Ruiz Valls, P; Saborido Silva, J J; Sadykhov, E; Sagidova, N; Saitta, B; Salustino Guimaraes, V; Sanchez Mayordomo, C; Sanmartin Sedes, B; Santacesaria, R; Santamarina Rios, C; Santimaria, M; Santovetti, E; Sarti, A; Satriano, C; Satta, A; Saunders, D M; Savrina, D; Schael, S; Schellenberg, M; Schiller, M; Schindler, H; Schlupp, M; Schmelling, M; Schmelzer, T; Schmidt, B; Schneider, O; Schopper, A; Schubert, K; Schubiger, M; Schune, M-H; Schwemmer, R; Sciascia, B; Sciubba, A; Semennikov, A; Sergi, A; Serra, N; Serrano, J; Sestini, L; Seyfert, P; Shapkin, M; Shapoval, I; Shcheglov, Y; Shears, T; Shekhtman, L; Shevchenko, V; Siddi, B G; Silva Coutinho, R; Silva de Oliveira, L; Simi, G; Simone, S; Sirendi, M; Skidmore, N; Skwarnicki, T; Smith, E; Smith, I T; Smith, J; Smith, M; Snoek, H; Sokoloff, M D; Soler, F J P; Souza De Paula, B; Spaan, B; Spradlin, P; Sridharan, S; Stagni, F; Stahl, M; Stahl, S; Stefko, P; Stefkova, S; Steinkamp, O; Stemmle, S; Stenyakin, O; Stevenson, S; Stoica, S; Stone, S; Storaci, B; Stracka, S; Straticiuc, M; Straumann, U; Sun, L; Sutcliffe, W; Swientek, K; Syropoulos, V; Szczekowski, M; Szumlak, T; T'Jampens, S; Tayduganov, A; Tekampe, T; Tellarini, G; Teubert, F; Thomas, E; van Tilburg, J; Tilley, M J; Tisserand, V; Tobin, M; Tolk, S; Tomassetti, L; Tonelli, D; Topp-Joergensen, S; Toriello, F; Tournefier, E; Tourneur, S; Trabelsi, K; Traill, M; Tran, M T; Tresch, M; Trisovic, A; Tsaregorodtsev, A; Tsopelas, P; Tully, A; Tuning, N; Ukleja, A; Ustyuzhanin, A; Uwer, U; Vacca, C; Vagnoni, V; Valassi, A; Valat, S; Valenti, G; Vallier, A; Vazquez Gomez, R; Vazquez Regueiro, P; Vecchi, S; van Veghel, M; Velthuis, J J; Veltri, M; Veneziano, G; Venkateswaran, A; Vernet, M; Vesterinen, M; Viaud, B; Vieira, D; Vieites Diaz, M; Viemann, H; Vilasis-Cardona, X; Vitti, M; Volkov, V; Vollhardt, A; Voneki, B; Vorobyev, A; Vorobyev, V; Voß, C; de Vries, J A; Vázquez Sierra, C; Waldi, R; Wallace, C; Wallace, R; Walsh, J; Wang, J; Ward, D R; Wark, H M; Watson, N K; Websdale, D; Weiden, A; Whitehead, M; Wicht, J; Wilkinson, G; Wilkinson, M; Williams, M; Williams, M P; Williams, M; Williams, T; Wilson, F F; Wimberley, J; Wishahi, J; Wislicki, W; Witek, M; Wormser, G; Wotton, S A; Wraight, K; Wyllie, K; Xie, Y; Xing, Z; Xu, Z; Yang, Z; Yin, H; Yu, J; Yuan, X; Yushchenko, O; Zarebski, K A; Zavertyaev, M; Zhang, L; Zhang, Y; Zhang, Y; Zhelezov, A; Zheng, Y; Zhokhov, A; Zhu, X; Zhukov, V; Zucchelli, S
The decays [Formula: see text] and [Formula: see text] are observed for the first time using a data sample corresponding to an integrated luminosity of 3.0 fb[Formula: see text], collected by the LHCb experiment in proton-proton collisions at the centre-of-mass energies of 7 and 8[Formula: see text]. The branching fractions relative to that of [Formula: see text] are measured to be [Formula: see text]where the first uncertainties are statistical and the second are systematic.
This article presents 34 characteristics of texts and tasks ("text features") that can make continuous (prose), noncontinuous (document), and quantitative texts easier or more difficult for adolescents and adults to comprehend and use. The text features were identified by examining the assessment tasks and associated texts in the national…
Williams, Jake Ryland; Clark, Eric M.; Bagrow, James P.; Danforth, Christopher M.; Dodds, Peter Sheridan
In an effort to better understand meaning from natural language texts, we explore methods aimed at organizing lexical objects into contexts. A number of these methods for organization fall into a family defined by word ordering. Unlike demographic or spatial partitions of data, these collocation models are of special importance for their universal applicability. While we are interested here in text and have framed our treatment appropriately, our work is potentially applicable to other areas of research (e.g., speech, genomics, and mobility patterns) where one has ordered categorical data (e.g., sounds, genes, and locations). Our approach focuses on the phrase (whether word or larger) as the primary meaning-bearing lexical unit and object of study. To do so, we employ our previously developed framework for generating word-conserving phrase-frequency data. Upon training our model with the Wiktionary, an extensive, online, collaborative, and open-source dictionary that contains over 100 000 phrasal definitions, we develop highly effective filters for the identification of meaningful, missing phrase entries. With our predictions we then engage the editorial community of the Wiktionary and propose short lists of potential missing entries for definition, developing a breakthrough, lexical extraction technique and expanding our knowledge of the defined English lexicon of phrases.
Kaal, A.R.; Maks, I.; van Elfrinkhof, A.M.E.
ABSTRACT From Text to Political Positions addresses cross-disciplinary innovation in political text analysis for party positioning. Drawing on political science, computational methods and discourse analysis, it presents a diverse collection of analytical models including pure quantitative and
Full Text Available The motion characteristics of trans-media vehicles during the water-entry process were explored in this study in an effort to obtain the optimal water-entry condition of the vehicle for developing a novel, single control strategy integrating underwater non-control and in-air control. A water-entry dynamics model is established by combining the water-entry motion characteristics of the vehicle in uncontrolled conditions at low speed with time-varying parameters (e.g. buoyancy, added mass. A water-entry experiment is designed to confirm the effectiveness of the established model. After that, by comparing the experimental results with the simulated results, the model is further modified to more accurately reflect water-entry motion. The change laws of the vehicle's attitude and position during the water-entry process are also obtained by analyzing the simulation of the modified model under different velocity, angle, and angle of attack conditions. The results presented here have guiding significance for the future realization of reaching the stable underwater navigation state of the vehicle after water-entry process.
An increasing number of European football clubs has developed global strategies with an emphasis on the Chinese market, which seems to be a shortcut to their global success. In order to achieve an effective expansion, the selection of appropriate entry modes should be conducted cautiously. This paper aims to select feasible entry modes for Tottenham Hotspur F.C., an emerging power in the Premier League, to enter into the Chinese market. A framework that combines different theories based ...
The thesis considers the entry strategy and development of the company McDonald's into international markets. The theoretical aspects of the entry strategy of the company into the international markets. Analyzes the key features of the development of McDonald's in Russia. Investigated the prospects of the company in international markets. In theoretic part there was regarded some important aspects of international strategic management, such as: strategic alternatives, elements and levels o...
Dogan, Mevlut; Ulu, Melike; Gennerakis, Giannis; Zouros, Theo J. M.
A new hemispherical deflector analyzer (HDA) which is designed for electron energy analysis in atomic collisions has been constructed and tested. Using the crossed beam technique at the electron spectrometer, test measurements were performed for electron beam (200 eV) - Helium atoms interactions. These first experimental results show that the paracentric entries give almost twice as good resolution as that for the conventional entry. Supporting simulations of the entire lens+HDA spectrometer are found in relatively good agreement with experiment.
David G Angeler
Full Text Available The adaptive cycle was proposed as a conceptual model to portray patterns of change in complex systems. Despite the model having potential for elucidating change across systems, it has been used mainly as a metaphor, describing system dynamics qualitatively. We use a quantitative approach for testing premises (reorganisation, conservatism, adaptation in the adaptive cycle, using Baltic Sea phytoplankton communities as an example of such complex system dynamics. Phytoplankton organizes in recurring spring and summer blooms, a well-established paradigm in planktology and succession theory, with characteristic temporal trajectories during blooms that may be consistent with adaptive cycle phases. We used long-term (1994-2011 data and multivariate analysis of community structure to assess key components of the adaptive cycle. Specifically, we tested predictions about: reorganisation: spring and summer blooms comprise distinct community states; conservatism: community trajectories during individual adaptive cycles are conservative; and adaptation: phytoplankton species during blooms change in the long term. All predictions were supported by our analyses. Results suggest that traditional ecological paradigms such as phytoplankton successional models have potential for moving the adaptive cycle from a metaphor to a framework that can improve our understanding how complex systems organize and reorganize following collapse. Quantifying reorganization, conservatism and adaptation provides opportunities to cope with the intricacies and uncertainties associated with fast ecological change, driven by shifting system controls. Ultimately, combining traditional ecological paradigms with heuristics of complex system dynamics using quantitative approaches may help refine ecological theory and improve our understanding of the resilience of ecosystems.
Petersen, Kjell Yngve; Søndergaard, Karin; Kongshaug, Jesper
Adaptive Lighting Adaptive lighting is based on a partial automation of the possibilities to adjust the colour tone and brightness levels of light in order to adapt to people’s needs and desires. IT support is key to the technical developments that afford adaptive control systems. The possibilities...... offered by adaptive lighting control are created by the ways that the system components, the network and data flow can be coordinated through software so that the dynamic variations are controlled in ways that meaningfully adapt according to people’s situations and design intentions. This book discusses...... differently into an architectural body. We also examine what might occur when light is dynamic and able to change colour, intensity and direction, and when it is adaptive and can be brought into interaction with its surroundings. In short, what happens to an architectural space when artificial lighting ceases...
This book comprises a set of articles that specify the methodology of text mining, describe the creation of lexical resources in the framework of text mining and use text mining for various tasks in natural language processing (NLP). The analysis of large amounts of textual data is a prerequisite to build lexical resources such as dictionaries and ontologies and also has direct applications in automated text processing in fields such as history, healthcare and mobile applications, just to name a few. This volume gives an update in terms of the recent gains in text mining methods and reflects
Tourte, Gregory J L
Text mining tools and technologies have long been a part of the repository world, where they have been applied to a variety of purposes, from pragmatic aims to support tools. Research areas as diverse as biology, chemistry, sociology and criminology have seen effective use made of text mining technologies. Working With Text collects a subset of the best contributions from the 'Working with text: Tools, techniques and approaches for text mining' workshop, alongside contributions from experts in the area. Text mining tools and technologies in support of academic research include supporting research on the basis of a large body of documents, facilitating access to and reuse of extant work, and bridging between the formal academic world and areas such as traditional and social media. Jisc have funded a number of projects, including NaCTem (the National Centre for Text Mining) and the ResDis programme. Contents are developed from workshop submissions and invited contributions, including: Legal considerations in te...
Ali, H. K.; Braun, R. D.
This work aims to study the suitability of multi-pass entry trajectories for harnessing of vehicle kinetic energy through magnetohydrodynamic power generation from the high temperature entry plasma. Potential mission configurations are analyzed.
... UNITED STATES TRADE REPRESENTATIVE ALLOCATION OF TARIFF-RATE QUOTA ON IMPORTED SUGARS, SYRUPS AND... present a certificate to the appropriate customs official at the date of entry of specialty sugars. Entry...
Full Text Available Adaptive Architecture concerns buildings that are specifically designed to adapt to their inhabitants and to their environments. Work in this space has a very long history, with a number of adaptive buildings emerging during the modernist period, such as Rietveld’s Schröder house, Gaudi’s Casa Batlló and Chareau's Maison de Verre. Such early work included manual adaptivity, even if that was motor-assisted. Today, buildings have started to combine this with varying degrees of automation and designed-for adaptivity is commonplace in office buildings and eco homes, where lighting, air conditioning, access and energy generation respond to and influence the behaviour of people, and the internal and external climate.
Kai N. Lee
Full Text Available Adaptive management is appraised as a policy implementation approach by examining its conceptual, technical, equity, and practical strengths and limitations. Three conclusions are drawn: (1 Adaptive management has been more influential, so far, as an idea than as a practical means of gaining insight into the behavior of ecosystems utilized and inhabited by humans. (2 Adaptive management should be used only after disputing parties have agreed to an agenda of questions to be answered using the adaptive approach; this is not how the approach has been used. (3 Efficient, effective social learning, of the kind facilitated by adaptive management, is likely to be of strategic importance in governing ecosystems as humanity searches for a sustainable economy.
Rehman, Zobia; Anwar, Waqas; Bajwa, Usama Ijaz; Xuan, Wang; Chaoying, Zhou
Text tokenization is a fundamental pre-processing step for almost all the information processing applications. This task is nontrivial for the scarce resourced languages such as Urdu, as there is inconsistent use of space between words. In this paper a morpheme matching based approach has been proposed for Urdu text tokenization, along with some other algorithms to solve the additional issues of boundary detection of compound words, affixation, reduplication, names and abbreviations. This study resulted into 97.28% precision, 93.71% recall, and 95.46% F1-measure; while tokenizing a corpus of 57000 words by using a morpheme list with 6400 entries.
Kokotti, H.; Kalliokoski, P.
Radon levels, ventilation rate and pressure differences were monitored continuously in four apartment houses with different ventilation systems. Two of them were ventilated by mechanical exhaust, one by mechanical supply and exhaust, and one by natural ventilation. The two-storey houses were constructed from concrete elements on a slab and located on a gravel esker. It was surprising to find that increasing the ventilation rate increased levels of radon in the apartments. Increased ventilation caused increased outdoor-indoor pressure difference, which in turn increased the entry rate of radon and counteracted the diluting effect of ventilation. The increase was significant when the outdoor-indoor pressure difference exceeded 5 Pa. Especially in the houses with mechanical exhaust ventilation the pressure difference was the most important factor of radon entry rate, and contributed up to several hundred Bq m -3 h -1 . (Author)
Whitnah, A. M.; Howes, D. B.
The aerodynamic data that were derived in 1967 from the analysis of flight-generated data for the Gemini entry module are presented. These data represent the aerodynamic characteristics exhibited by the vehicle during the entry portion of Gemini 2, 3, 5, 8, 10, 11, and 12 missions. For the Gemini, 5, 8, 10, 11, and 12 missions, the flight-generated lift-to-drag ratios and corresponding angles of attack are compared with the wind tunnel data. These comparisons show that the flight generated lift-to-drag ratios are consistently lower than were anticipated from the tunnel data. Numerous data uncertainties are cited that provide an insight into the problems that are related to an analysis of flight data developed from instrumentation systems, the primary functions of which are other than the evaluation of flight aerodynamic performance.
Smith, Kelly M.; Rea, Jeremy
For Exploration Missions 1 and 2, the Orion capsules will be entering the Earth's atmosphere with speeds in excess of 11 km/s. In the event of a degraded Guidance, Navigation, and Control system, attempting the nominal guided entry may be inadvisable due to the potential for failures that result in a loss of vehicle (or crew, when crew are aboard). In such a case, a method of assuring Earth capture, water landing, and observence of trajectory constraints (heating, loads) is desired. Such a method should also be robust to large state uncertainty and variations in entry interface states. This document will explore four approaches evaluated and their performance in ensuring a safe return of the Orion capsule in the event of onboard system degradation.
Automated entry control has become an increasingly important issue at facilities where budget constraints are limiting options for manned entry control points. Ongoing work at Sandia National Laboratories is attempting to establish a data base for use by facility security managers working the problem of how to maintain security on a limited budget. Sandia National Laboratories conducted a performance test of the following biometric verifiers: (1) voice verifier by Alpha Microsystems of Santa Ana, California; (2) signature dynamics verifier by Autosig Systems of Irving, Texas; (3) voice verifier by Ecco Industries of Danvers, Massachusetts (now International Electronics); (4) retinal pattern verifier by EyeDentify of Portland, Oregon; (5) fingerprint verifier by Identix of Sunnyvale, California; and (6) hand geometry verifier by Recognition Systems of San Jose, California
Bartosch, Birke; Cosset, Francois-Loic
Hepatitis C virus (HCV), an important human pathogen, is an enveloped, positive-stranded RNA virus classified in the hepacivirus genus of the Flaviviridae family. Cell attachment of flaviviruses generally leads to endocytosis of bound virions. Systems that support HCV replication and particle formation in vitro are emerging only now, 16 years after the discovery of the virus. Albeit this limitation, the route of HCV cell entry as well as 'capture' molecules involved in low-affinity interactions for the initial contact of HCV with target cells and potential high-affinity receptor candidates that may mediate HCV trafficking and fusion has been described. The objective of this review is to summarize the contribution of different HCV model systems to our current knowledge about structure of the HCV GPs E1 and E2 and their roles in cell entry comprising cell attachment, interactions with cellular receptors, endocytosis, and fusion
Koskenniemi, Kimmo Matti
A practical method for interactive guessing of LEXC lexicon entries is presented. The method is based on describing groups of similarly inflected words using regular expressions. The patterns are compiled into a finite-state transducer (FST) which maps any word form into the possible LEXC lexicon entries which could generate it. The same FST can be used (1) for converting conventional headword lists into LEXC entries, (2) for interactive guessing of entries, (3) for corpus-assisted interactiv...
Heilimo, J.; Harri, A.-M.; Aleksashkin, S.; Koryanov, V.; Arruego, I.; Schmidt, W.; Haukka, H.; Finchenko, V.; Martynov, M.; Ostresko, B.; Ponomarenko, A.; Kazakovtsev, V.; Martin, S.; Siili, T.
A new generation of inflatable Entry, Descent and Landing System (EDLS) for Mars has been developed. It is used in both the initial atmospheric entry and atmospheric descent before the semi-hard impact of the penetrator into Martian surface. The EDLS applicability to Earth's atmosphere is studied by the EU/RITD  project. Project focuses on the analysis and tests of the transonic behaviour of this compact and light weight payload entry system at the Earth re-entry.
Maican, Florin; Orth, ´Matilda
We use a dynamic oligopoly model of entry and exit to evaluate how entry regulations affect profitability and market structure in retail. The model incorporates demand and store-level heterogeneity. Based on unique data for all retail food stores in Sweden, we find that the average entry costs for small and large stores are 10 and 18 percent lower, respectively, in markets with liberal compared with restrictive regulations. Counterfactual simulations show that lower entry costs in restrictive...
Maican, Florin; Orth, Matilda
We use a dynamic oligopoly model of entry and exit with store-type differentiation to evaluate how entry regulations affect profitability, market structure and welfare. Based on unique data for all retail food stores in Sweden, we estimate demand, recover variable profits, and estimate entry costs and fixed costs by store type. Counterfactual policy experiments show that welfare increases when competition is enhanced by lower entry costs. Protecting small stores by imposing licensing fees on ...
Aspen Institute, 2012
What constitutes an informational text covers a broad swath of different types of texts. Biographies & memoirs, speeches, opinion pieces & argumentative essays, and historical, scientific or technical accounts of a non-narrative nature are all included in what the Common Core State Standards (CCSS) envisions as informational text. Also included…
Toth, Cheryl; Sacopulos, Michael J
Many physicians and practice staff use short messaging service (SMS) text messaging to communicate with patients. But SMS text messaging is unencrypted, insecure, and does not meet HIPAA requirements. In addition, the short and abbreviated nature of text messages creates opportunities for misinterpretation, and can negatively impact patient safety and care. Until recently, asking patients to sign a statement that they understand and accept these risks--as well as having policies, device encryption, and cyber insurance in place--would have been enough to mitigate the risk of using SMS text in a medical practice. But new trends and policies have made SMS text messaging unsafe under any circumstance. This article explains these trends and policies, as well as why only secure texting or secure messaging should be used for physician-patient communication.
Falck, Oliver; Heblich, Stephan
This paper takes a different perspective toward the escape entry incentive of incumbent firms to innovate. New entrants spawned from incumbents are not necessarily a threat; they can complement incumbents' production by commercializing knowledge incumbents are not willing or able to exploit. Accordingly, incumbent innovation determines exploitable knowledge externalities for spinoffs while, at the same time, spinoffs are expected to influence incumbent innovation. To overcome this problem of ...
Crampes, Claude; Haritchabalet, Carole; Jullien, Bruno
This paper presents a model of media competition with free entry when media operators are financed both from advertisers and customers. The relation between advertising receipts and sales receipts, which are both complementary and antagonist, is different if media operators impose a price or a quantity to advertisers. When consumers dislike advertising, media operators are better off setting an advertising price than an advertising quantity. We establish a relationship between the equilibrium...
Kellogg, M.; Gallup, J.M.; Shlaer, S.; Spencer, N.
This manual describes the systems for producing histograms and dot plots that were designed for use in connection with the Q general-purpose data-acquisition system. These systems allow for the creation of histograms; the entry, retrieval, and plotting of data in the form of histograms; and the dynamic display of scatter plots as data are acquired. Although the systems are designed for use with Q, they can also be used as a part of other applications. 3 figures
Al-khulaidi, Rami Ali; Akmeliawati, Rini
The speech recognition system is a front end and a back-end process that receives an audio signal uttered by a speaker and converts it into a text transcription. The speech system can be used in several fields including: therapeutic technology, education, social robotics and computer entertainments. In most cases in control tasks, which is the purpose of proposing our system, wherein the speed of performance and response concern as the system should integrate with other controlling platforms such as in voiced controlled robots. Therefore, the need for flexible platforms, that can be easily edited to jibe with functionality of the surroundings, came to the scene; unlike other software programs that require recording audios and multiple training for every entry such as MATLAB and Phoenix. In this paper, a speech recognition system for Malay language is implemented using Microsoft Visual Studio C#. 90 (ninety) Malay phrases were tested by 10 (ten) speakers from both genders in different contexts. The result shows that the overall accuracy (calculated from Confusion Matrix) is satisfactory as it is 92.69%.
Rao, K Sreenivasa
Predicting Prosody from Text for Text-to-Speech Synthesis covers the specific aspects of prosody, mainly focusing on how to predict the prosodic information from linguistic text, and then how to exploit the predicted prosodic knowledge for various speech applications. Author K. Sreenivasa Rao discusses proposed methods along with state-of-the-art techniques for the acquisition and incorporation of prosodic knowledge for developing speech systems. Positional, contextual and phonological features are proposed for representing the linguistic and production constraints of the sound units present in the text. This book is intended for graduate students and researchers working in the area of speech processing.
Macedo, Alexandra Lorandi
Full Text Available This article presents the Concepts Network tool, developed using text mining technology. The main objective of this tool is to extract and relate terms of greatest incidence from a text and exhibit the results in the form of a graph. The Network was implemented in the Collective Text Editor (CTE which is an online tool that allows the production of texts in synchronized or non-synchronized forms. This article describes the application of the Network both in texts produced collectively and texts produced in a forum. The purpose of the tool is to offer support to the teacher in managing the high volume of data generated in the process of interaction amongst students and in the construction of the text. Specifically, the aim is to facilitate the teacher’s job by allowing him/her to process data in a shorter time than is currently demanded. The results suggest that the Concepts Network can aid the teacher, as it provides indicators of the quality of the text produced. Moreover, messages posted in forums can be analyzed without their content necessarily having to be pre-read.
... 31 Money and Finance: Treasury 2 2010-07-01 2010-07-01 false Conversions to book-entry. 337.6... HOUSING ADMINISTRATION DEBENTURES Certificated Debentures § 337.6 Conversions to book-entry. Upon implementation of the book-entry debenture system, to be announced in advance by separate public notice, all new...
... 32 National Defense 4 2010-07-01 2010-07-01 true Rights of entry. 643.11 Section 643.11 National Defense Department of Defense (Continued) DEPARTMENT OF THE ARMY (CONTINUED) REAL PROPERTY REAL ESTATE General § 643.11 Rights of entry. Pending the signing of the formal instrument, no right of entry will be...
... 19 Customs Duties 2 2010-04-01 2010-04-01 false Entry by nonresident corporation. 141.18 Section....18 Entry by nonresident corporation. A nonresident corporation (i.e., one which is not incorporated... entry is located who is authorized to accept service of process against that corporation or, in the case...
... 19 Customs Duties 2 2010-04-01 2010-04-01 false Information on entry summary. 151.63 Section 151.63 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF... Information on entry summary. Each entry summary covering wool or hair subject to duty at a rate per clean...
Mooij, E. [Delft University of Technology, Faculty of Aerospace Engineering, Delft (Netherlands)
Application of simple adaptive control (SAC) theory to the design of guidance and control systems for winged re-entry vehicles has been proven successful. To apply SAC to these non-linear and non-stationary systems, it needs to be Almost Strictly Passive (ASP), which is an extension of the Almost Strictly Positive Real (ASPR) condition for linear, time-invariant systems. To fulfill the ASP condition, the controlled, non-linear system has to be minimum-phase (i.e., the zero dynamics is stable), and there is a specific condition for the product of output and input matrix. Earlier studies indicate that even the linearised system is not ASPR. The two problems at hand are: 1) the system is non-minimum phase when flying with zero bank angle, and 2) whenever there is hybrid control, e.g., yaw control is established by combined reaction and aerodynamic control for the major part of flight, the second ASPR condition cannot be met. In this paper we look at both issues, the former related to the guidance system and the latter to the attitude-control system. It is concluded that whenever the nominal bank angle is zero, the passivity conditions can never be met, and guidance should be based on nominal commands and a redefinition of those whenever the error becomes too large. For the remaining part of the trajectory, the passivity conditions are marginally met, but it is proposed to add feedforward compensators to alleviate these conditions. The issue of hybrid control is avoided by redefining the controls with total control moments and adding a so-called control allocator. Deriving the passivity conditions for rotational motion, and evaluating these conditions along the trajectory shows that the (non-linear) winged entry vehicle is ASP. The sufficient conditions to apply SAC for attitude control are thus met.
Harriman, Stephanie; Patel, Jigisha
Text recycling, also referred to as self-plagiarism, is the reproduction of an author's own text from a previous publication in a new publication. Opinions on the acceptability of this practice vary, with some viewing it as acceptable and efficient, and others as misleading and unacceptable. In light of the lack of consensus, journal editors often have difficulty deciding how to act upon the discovery of text recycling. In response to these difficulties, we have created a set of guidelines for journal editors on how to deal with text recycling. In this editorial, we discuss some of the challenges of developing these guidelines, and how authors can avoid undisclosed text recycling.
Prabu, Dinesh K.; Allen, Gary A., Jr.; Cappuccio, Gelsomina; Spilker, Thomas R.; Hwang, Helen H.; Moses, Robert W.
The present study considers ballistic entries into the atmosphere of Venus using a 45deg sphere-cone rigid aeroshell, a legacy shape that has been used successfully in the past in the Pioneer Venus Multiprobe Mission. For a number of entry mass and capsule diameter combinations (i.e., various ballistic coefficients) and entry velocities, the trajectory space in terms of entry flight path angles between skip out and -30 is explored with a 3DOF trajectory code, TRAJ. Assuming that the thermal protection material of choice is carbon phenolic of flight heritage, the entry flight path angle space is constrained a posteriori by the mechanical and thermal performance parameters of the material. For mechanical performance, a 200 g limit is placed on the peak deceleration load and 10 bar is assumed as the limit for heritage carbon-phenolic material. It is shown that both constraints cannot be active simultaneously. For thermal performance, a heat flux 2.5 kW/sq cm is utilized as a threshold below which the heritage carbon phenolic is considered mass inefficient. Using these constraints, viable entry flight path angle corridors are determined. Analysis of the results also hints at the existence of a range of "critical" ballistic coefficients beyond which the steepest possible entries are determined by the pressure limit of 10 bar. The results are verified against known performance of the various probes used in the Pioneer Venus mission. It is anticipated that the results presented here will serve as a baseline in the development of a new class of ablative materials for future Venus missions.
Tierney, P; Tobin, D P; Blake, C; Delahunt, E
Global Positioning System (GPS) technology is commonly utilized in team sports, including rugby union. It has been used to describe the average running demands of rugby union. This has afforded an enhanced understanding of the physical fitness requirements for players. However, research in team sports has suggested that training players relative to average demands may underprepare them for certain scenarios within the game. To date, no research has investigated the running demands of attacking 22 entries in rugby union. Additionally, no research has been undertaken to determine whether differences exist in the running intensity of successful and unsuccessful attacking 22 entries in rugby union. The first aim of this study was to describe the running intensity of attacking 22 entries. The second aim of this study was to investigate whether differences exist in the running intensity of successful and unsuccessful attacking 22 entries. Running intensity was measured using meters per minute (m min -1 ) for (a) total distance, (b) running distance, (c) high-speed running distance, and (d) very high-speed running distance. This study provides normative data for the running intensity of attacking 22 entries in rugby union. Forwards achieved greater high-speed running intensity in successful (3.6 m min -1 ) compared to unsuccessful (1.8 m min -1 ) attacking 22 entries. Forwards should try and achieve greater high-speed running intensity in attacking 22 entries to increase the likelihood of successful outcomes during this period of gameplay. © 2016 John Wiley & Sons A/S. Published by John Wiley & Sons Ltd.
Damon A Clark
Full Text Available Adaptation is at the heart of sensation and nowhere is it more salient than in early visual processing. Light adaptation in photoreceptors is doubly dynamical: it depends upon the temporal structure of the input and it affects the temporal structure of the response. We introduce a non-linear dynamical adaptation model of photoreceptors. It is simple enough that it can be solved exactly and simulated with ease; analytical and numerical approaches combined provide both intuition on the behavior of dynamical adaptation and quantitative results to be compared with data. Yet the model is rich enough to capture intricate phenomenology. First, we show that it reproduces the known phenomenology of light response and short-term adaptation. Second, we present new recordings and demonstrate that the model reproduces cone response with great precision. Third, we derive a number of predictions on the response of photoreceptors to sophisticated stimuli such as periodic inputs, various forms of flickering inputs, and natural inputs. In particular, we demonstrate that photoreceptors undergo rapid adaptation of response gain and time scale, over ∼ 300[Formula: see text] ms-i. e., over the time scale of the response itself-and we confirm this prediction with data. For natural inputs, this fast adaptation can modulate the response gain more than tenfold and is hence physiologically relevant.
Full Text Available Results from a measurement campaign emulating the high altitude platform (HAP-to-indoor communication channel at S-band are presented in this paper. A link was established between a transmitter carried by a helicopter, representing the HAP, and a receiver placed at several locations in different building types including an airport, an office building, a shopping mall, a residential house, and a skyscraper. A wideband, directive channel sounder was used to measure building entry loss and time delay spread. Results of the building entry loss are presented as a function of building type, elevation, and building entry angle. Results of delay spread for each building are also provided.
Full Text Available Results from a measurement campaign emulating the high altitude platform (HAP-to-indoor communication channel at S-band are presented in this paper. A link was established between a transmitter carried by a helicopter, representing the HAP, and a receiver placed at several locations in different building types including an airport, an office building, a shopping mall, a residential house, and a skyscraper. A wideband, directive channel sounder was used to measure building entry loss and time delay spread. Results of the building entry loss are presented as a function of building type, elevation, and building entry angle. Results of delay spread for each building are also provided.
Full Text Available This study looks at demonstrative descriptions, regarding them as text-deictic procedures which contribute to weave discourse reference. Text deixis is thought of as a metaphorical referential device which maps the ground of utterance onto the text itself. Demonstrative expressions with textual antecedent-triggers, considered as the most important text-deictic units, are identified in a narrative corpus consisting of J. M. Barrie’s Peter Pan and its translation into Catalan. Some linguistic and discourse variables related to DemNPs are analysed to characterise adequately text deixis. It is shown that this referential device is usually combined with abstract nouns, thus categorising and encapsulating (non-nominal complex discourse entities as nouns, while performing a referential cohesive function by means of the text deixis + general noun type of lexical cohesion.
Combining the two statistical techniques of network sampling and adaptive sampling, this book illustrates the advantages of using them in tandem to effectively capture sparsely located elements in unknown pockets. It shows how network sampling is a reliable guide in capturing inaccessible entities through linked auxiliaries. The text also explores how adaptive sampling is strengthened in information content through subsidiary sampling with devices to mitigate unmanageable expanding sample sizes. Empirical data illustrates the applicability of both methods.
National Aeronautics and Space Administration — Advanced Diagnostics and Prognostics Testbed (ADAPT) Project Lead: Scott Poll Subject Fault diagnosis in electrical power systems Description The Advanced...
Full Text Available Introduction: Although thoracic endovascular aortic repair (TEVAR has become a promising treatment for complicated acute type B dissection, its role in treating chronic post-dissection thoraco-abdominal aortic aneurysm (TAA is still limited owing to persistent retrograde flow into the false lumen (FL through abdominal or iliac re-entry tears. Report: A case of chronic post-dissection TAA treatment, in which a dilated descending FL ruptured into the left thorax, is described. The primary entry tear was closed by emergency TEVAR and multiple abdominal re-entries were closed by EVAR. In addition, major re-entries at the detached right renal artery and iliac bifurcation were closed using covered stents. To close re-entries as far as possible, EVAR was carried out using the chimney technique, and additional aortic extenders were placed above the coeliac artery. A few re-entries remained, but complete FL thrombosis of the rupture site was achieved. Follow-up computed tomography showed significant shrinkage of the FL. Discussion: In treating post-dissection TAA, entry closure by TEVAR is sometimes insufficient, owing to persistent retrograde flow into the FL from abdominal or iliac re-entries. Adjunctive techniques are needed to close these distal re-entries to obtain complete FL exclusion, especially in rupture cases. Recently, encouraging results of complete coverage of the thoraco-abdominal aorta with fenestrated or branched endografts have been reported; however, the widespread employment of such techniques appears to be limited owing to technical difficulties. The present method with multiple re-entry closures using off the shelf and immediately available devices is an alternative for the endovascular treatment of post-dissection TAA, especially in the emergency setting. Keywords: Aortic dissection, Ruptured aortic aneurysm, Post-dissection thoracoabdominal aortic aneurysm, Endovascular aortic repair, Reentry closure, Endovascular procedures
Przybyła, Piotr; Shardlow, Matthew; Aubin, Sophie; Bossy, Robert; Eckart de Castilho, Richard; Piperidis, Stelios; McNaught, John; Ananiadou, Sophia
Text mining is a powerful technology for quickly distilling key information from vast quantities of biomedical literature. However, to harness this power the researcher must be well versed in the availability, suitability, adaptability, interoperability and comparative accuracy of current text mining resources. In this survey, we give an overview of the text mining resources that exist in the life sciences to help researchers, especially those employed in biocuration, to engage with text mining in their own work. We categorize the various resources under three sections: Content Discovery looks at where and how to find biomedical publications for text mining; Knowledge Encoding describes the formats used to represent the different levels of information associated with content that enable text mining, including those formats used to carry such information between processes; Tools and Services gives an overview of workflow management systems that can be used to rapidly configure and compare domain- and task-specific processes, via access to a wide range of pre-built tools. We also provide links to relevant repositories in each section to enable the reader to find resources relevant to their own area of interest. Throughout this work we give a special focus to resources that are interoperable-those that have the crucial ability to share information, enabling smooth integration and reusability. © The Author(s) 2016. Published by Oxford University Press.
Shardlow, Matthew; Aubin, Sophie; Bossy, Robert; Eckart de Castilho, Richard; Piperidis, Stelios; McNaught, John; Ananiadou, Sophia
Text mining is a powerful technology for quickly distilling key information from vast quantities of biomedical literature. However, to harness this power the researcher must be well versed in the availability, suitability, adaptability, interoperability and comparative accuracy of current text mining resources. In this survey, we give an overview of the text mining resources that exist in the life sciences to help researchers, especially those employed in biocuration, to engage with text mining in their own work. We categorize the various resources under three sections: Content Discovery looks at where and how to find biomedical publications for text mining; Knowledge Encoding describes the formats used to represent the different levels of information associated with content that enable text mining, including those formats used to carry such information between processes; Tools and Services gives an overview of workflow management systems that can be used to rapidly configure and compare domain- and task-specific processes, via access to a wide range of pre-built tools. We also provide links to relevant repositories in each section to enable the reader to find resources relevant to their own area of interest. Throughout this work we give a special focus to resources that are interoperable—those that have the crucial ability to share information, enabling smooth integration and reusability. PMID:27888231
A study examined whether composition specialists can counterbalance the potential privileging of the assessment perspective, or of self-appointed interpreters of that perspective, through the study of assessment discourse as text. Fourteen assessment texts were examined, most of them journal articles and most of them featuring the common…
Full Text Available Many new biomedical research articles are published every day, accumulating rich information, such as genetic variants, genes, diseases, and treatments. Rapid yet accurate text mining on large-scale scientific literature can discover novel knowledge to better understand human diseases and to improve the quality of disease diagnosis, prevention, and treatment.In this study, we designed and developed an efficient text mining framework called SparkText on a Big Data infrastructure, which is composed of Apache Spark data streaming and machine learning methods, combined with a Cassandra NoSQL database. To demonstrate its performance for classifying cancer types, we extracted information (e.g., breast, prostate, and lung cancers from tens of thousands of articles downloaded from PubMed, and then employed Naïve Bayes, Support Vector Machine (SVM, and Logistic Regression to build prediction models to mine the articles. The accuracy of predicting a cancer type by SVM using the 29,437 full-text articles was 93.81%. While competing text-mining tools took more than 11 hours, SparkText mined the dataset in approximately 6 minutes.This study demonstrates the potential for mining large-scale scientific articles on a Big Data infrastructure, with real-time update from new articles published daily. SparkText can be extended to other areas of biomedical research.
... 48 Federal Acquisition Regulations System 6 2010-10-01 2010-10-01 true Duty-free entry of space articles. 1852.225-8 Section 1852.225-8 Federal Acquisition Regulations System NATIONAL AERONAUTICS AND SPACE ADMINISTRATION CLAUSES AND FORMS SOLICITATION PROVISIONS AND CONTRACT CLAUSES Texts of Provisions...
Full Text Available BACKGROUND Germany, like many OECD countries, faces a shift in the age composition of its population,and will face an even more drastic demographic change in the years ahead. From a theoretical point of view, decreasing cohort sizes may on the one hand reduce unemployment due to inverse cohort crowding or, on the other hand, increase unemploymentif companies reduce jobs disproportionately. Consequently, the actual effect of cohort shrinkage on employment and unemployment is an empirical question. OBJECTIVE We quantitatively assess the relationship between (unemployment and cohort sizes. METHODS We analyze a long panel of population and labor-market data for Western German labor market regions. We isolate the direct, statistical effect of aging in a decomposition approach and estimate the overall effect by regression. In this context, we account for the likely endogeneity of cohort size due to migration of the young workforce across regions using lagged births as instrument. RESULTS The direct effect of the age composition of the labor force on unemployment is negligible.In contrast, the elasticities of unemployment and employment with regard to the labor-market entry cohort's size are significantly positive or negative, respectively. The causal effect indicates an over-elastic reaction by unemployment. CONCLUSIONS Our results provide good news for the Western German labor market: small entry cohorts are indeed likely to decrease the overall unemployment rate and thus to improve the situation of job seekers. Accordingly, we find the employment rate is positively affected by a decrease in the youth proportion.
Full Text Available The study is to analyze Islamic entries in three major English dictionaries; Oxford Dictionary of English (ODE, Merriam-Webster’s Advanced Learners’Dictionary (MWALED, and Macquarie Australian National Dictionary (MAND. The three dictionaries are used the object of this study because they represent the major varieties of English besides the existence of a great number of new Englishness emerges around the globe. The selected entries are in accordance to Islamic sciences such as theology, Islamic Jurisprudence, Quranic exegesis, hadith Science, Islamic mysticism and Islamic History. Inappropriate and inaccurate or misleading definitions given by the dictionaries are identified and analyzed, then they will be examined according to definitions from each Islamic science so that accurate and appropriate definitions can be delivered as the alternatives and in turn more acceptable definitions and understandings of Islam will be given to not only the Muslim communities but also the greater readers.DOI: 10.15408/insaniyat.v2i1.6588
Full Text Available A choice prediction competition is organized that focuses on decisions from experience in market entry games (http://sites.google.com/site/gpredcomp/ and http://www.mdpi.com/si/games/predict-behavior/. The competition is based on two experiments: An estimation experiment, and a competition experiment. The two experiments use the same methods and subject pool, and examine games randomly selected from the same distribution. The current introductory paper presents the results of the estimation experiment, and clarifies the descriptive value of several baseline models. The experimental results reveal the robustness of eight behavioral tendencies that were documented in previous studies of market entry games and individual decisions from experience. The best baseline model (I-SAW assumes reliance on small samples of experiences, and strong inertia when the recent results are not surprising. The competition experiment will be run in May 2010 (after the completion of this introduction, but they will not be revealed until September. To participate in the competition, researchers are asked to E-mail the organizers models (implemented in computer programs that read the incentive structure as input, and derive the predicted behavior as an output. The submitted models will be ranked based on their prediction error. The winners of the competition will be invited to publish a paper that describes their model.
Dawn L. Weir
Full Text Available Australian bat lyssavirus (ABLV is a recently emerged rhabdovirus of the genus lyssavirus considered endemic in Australian bat populations that causes a neurological disease in people indistinguishable from clinical rabies. There are two distinct variants of ABLV, one that circulates in frugivorous bats (genus Pteropus and the other in insectivorous microbats (genus Saccolaimus. Three fatal human cases of ABLV infection have been reported, the most recent in 2013, and each manifested as acute encephalitis but with variable incubation periods. Importantly, two equine cases also arose recently in 2013, the first occurrence of ABLV in a species other than bats or humans. Similar to other rhabdoviruses, ABLV infects host cells through receptor-mediated endocytosis and subsequent pH-dependent fusion facilitated by its single fusogenic envelope glycoprotein (G. Recent studies have revealed that proposed rabies virus (RABV receptors are not sufficient to permit ABLV entry into host cells and that the unknown receptor is broadly conserved among mammalian species. However, despite clear tropism differences between ABLV and RABV, the two viruses appear to utilize similar endocytic entry pathways. The recent human and horse infections highlight the importance of continued Australian public health awareness of this emerging pathogen.
Helder de Souza Aguiar
Full Text Available This study aimed to compare the entry and operations strategies of franchisors of developed countries into foreign countries with Brazilian counterparts. Were there significant differences? An exploratory study was conducted with 16 international franchisors operating in Brazil and 31 Brazilian franchisors operating abroad. The results show that international franchisors operating abroad prefer to use a subsidiary in the destination country. At the same time, this strategy is little used by Brazilian franchisors, which prefer the strategy of direct franchises. For data collection, 47 directors or managers of the international expansion of Brazilian companies and the expansion directors of the international companies which operates in Brazil were interviewed. Although more expensive, the subsidiary in the target country offers greater control over the expansion of business reducing the problems caused by the distance of the country of origin. For the management of franchisors, this paper points out that the subsidiary is a natural evolution of entry and operation mode when it is desired or it is needed to control the expansion of networks in other countries. Thus, managers of franchisors in emerging countries should carefully examine the subsidiary option in the target country when their company considers accelerating international growth.
I Wayan Sukadana
Full Text Available The paper analyzes subject’s behavior in evolutionary process of entry game. The experiment is designed to analyze the behavior of the subject. The experiment is set in sequential entry games. Process of the game was conducted under asymmetric information, uncertainty, payoff perturbation and random matching. The subjects of the experiment were students of the Universitas Udayana, Bali, Indonesia. Subjects who play as new-entrance firms tend to choose “stay-out” strategy when the uncertainty and the amount of loss increase. Meanwhile, the subjects who play as an incumbent firm, which set to have more information about the game (market rather than the new-entrances, most of the time abuse their position by choose “threat” strategy, which not a credible strategy for some of them. Experimental studies shows that New-entrance tend to weight more on lost when the risk increase (from risk averse setting to risk seeking setting, and tend to choose sure value over a lotteries although the expected value from lotteries is higher or the same. These findings support the reason that Indonesian youngsters tend to choose a job as a PNS or employee of existing firms. The results also support the reason that Indonesian businessman is more willing to open a new business if they have a guarantee for their losses.
Mohammad F Saeed
Full Text Available The phosphoinositide-3 kinase (PI3K pathway regulates diverse cellular activities related to cell growth, migration, survival, and vesicular trafficking. It is known that Ebola virus requires endocytosis to establish an infection. However, the cellular signals that mediate this uptake were unknown for Ebola virus as well as many other viruses. Here, the involvement of PI3K in Ebola virus entry was studied. A novel and critical role of the PI3K signaling pathway was demonstrated in cell entry of Zaire Ebola virus (ZEBOV. Inhibitors of PI3K and Akt significantly reduced infection by ZEBOV at an early step during the replication cycle. Furthermore, phosphorylation of Akt-1 was induced shortly after exposure of cells to radiation-inactivated ZEBOV, indicating that the virus actively induces the PI3K pathway and that replication was not required for this induction. Subsequent use of pseudotyped Ebola virus and/or Ebola virus-like particles, in a novel virus entry assay, provided evidence that activity of PI3K/Akt is required at the virus entry step. Class 1A PI3Ks appear to play a predominant role in regulating ZEBOV entry, and Rac1 is a key downstream effector in this regulatory cascade. Confocal imaging of fluorescently labeled ZEBOV indicated that inhibition of PI3K, Akt, or Rac1 disrupted normal uptake of virus particles into cells and resulted in aberrant accumulation of virus into a cytosolic compartment that was non-permissive for membrane fusion. We conclude that PI3K-mediated signaling plays an important role in regulating vesicular trafficking of ZEBOV necessary for cell entry. Disruption of this signaling leads to inappropriate trafficking within the cell and a block in steps leading to membrane fusion. These findings extend our current understanding of Ebola virus entry mechanism and may help in devising useful new strategies for treatment of Ebola virus infection.
Full Text Available Human cytomegalovirus (HCMV depends on and modulates multiple host cell membrane proteins during each stage of the viral life cycle. To gain a global view of the impact of HCMV-infection on membrane proteins, we analyzed HCMV-induced changes in the abundance of membrane proteins in fibroblasts using stable isotope labeling with amino acids (SILAC, membrane fractionation and protein identification by two-dimensional liquid chromatography and tandem mass spectrometry. This systematic approach revealed that CD81, CD44, CD98, caveolin-1 and catenin delta-1 were down-regulated during infection whereas GRP-78 was up-regulated. Since CD81 downregulation was also observed during infection with UV-inactivated virus we hypothesized that this tetraspanin is part of the viral entry process. Interestingly, additional members of the tetraspanin family, CD9 and CD151, were also downregulated during HCMV-entry. Since tetraspanin-enriched microdomains (TEM cluster host cell membrane proteins including known CMV receptors such as integrins, we studied whether TEMs are required for viral entry. When TEMs were disrupted with the cholesterol chelator methyl-β-cylcodextrin, viral entry was inhibited and this inhibition correlated with reduced surface levels of CD81, CD9 and CD151, whereas integrin levels remained unchanged. Furthermore, simultaneous siRNA-mediated knockdown of multiple tetraspanins inhibited viral entry whereas individual knockdown had little effect suggesting essential, but redundant roles for individual tetraspanins during entry. Taken together, our data suggest that TEM act as platforms for receptors utilized by HCMV for entry into cells.
Mousten, Birthe; Locmele, Gunta
Today, information travels fast. Texts travel, too. In a corporate context, the question is how to manage which knowledge elements should travel to a new language area or market and in which form? The decision to let knowledge elements travel or not travel highly depends on the limitation...... and the purpose of the text in a new context as well as on predefined parameters for text travel. For texts used in marketing and in technology, the question is whether culture-bound knowledge representation should be domesticated or kept as foreign elements, or should be mirrored or moulded—or should not travel...... at all! When should semantic and pragmatic elements in a text be replaced and by which other elements? The empirical basis of our work is marketing and technical texts in English, which travel into the Latvian and Danish markets, respectively....
He, Karen Y.; Wang, Kai
Background Many new biomedical research articles are published every day, accumulating rich information, such as genetic variants, genes, diseases, and treatments. Rapid yet accurate text mining on large-scale scientific literature can discover novel knowledge to better understand human diseases and to improve the quality of disease diagnosis, prevention, and treatment. Results In this study, we designed and developed an efficient text mining framework called SparkText on a Big Data infrastructure, which is composed of Apache Spark data streaming and machine learning methods, combined with a Cassandra NoSQL database. To demonstrate its performance for classifying cancer types, we extracted information (e.g., breast, prostate, and lung cancers) from tens of thousands of articles downloaded from PubMed, and then employed Naïve Bayes, Support Vector Machine (SVM), and Logistic Regression to build prediction models to mine the articles. The accuracy of predicting a cancer type by SVM using the 29,437 full-text articles was 93.81%. While competing text-mining tools took more than 11 hours, SparkText mined the dataset in approximately 6 minutes. Conclusions This study demonstrates the potential for mining large-scale scientific articles on a Big Data infrastructure, with real-time update from new articles published daily. SparkText can be extended to other areas of biomedical research. PMID:27685652
Ye, Zhan; Tafti, Ahmad P; He, Karen Y; Wang, Kai; He, Max M
Many new biomedical research articles are published every day, accumulating rich information, such as genetic variants, genes, diseases, and treatments. Rapid yet accurate text mining on large-scale scientific literature can discover novel knowledge to better understand human diseases and to improve the quality of disease diagnosis, prevention, and treatment. In this study, we designed and developed an efficient text mining framework called SparkText on a Big Data infrastructure, which is composed of Apache Spark data streaming and machine learning methods, combined with a Cassandra NoSQL database. To demonstrate its performance for classifying cancer types, we extracted information (e.g., breast, prostate, and lung cancers) from tens of thousands of articles downloaded from PubMed, and then employed Naïve Bayes, Support Vector Machine (SVM), and Logistic Regression to build prediction models to mine the articles. The accuracy of predicting a cancer type by SVM using the 29,437 full-text articles was 93.81%. While competing text-mining tools took more than 11 hours, SparkText mined the dataset in approximately 6 minutes. This study demonstrates the potential for mining large-scale scientific articles on a Big Data infrastructure, with real-time update from new articles published daily. SparkText can be extended to other areas of biomedical research.
Text classification approaches are used extensively to solve real-world challenges. The success or failure of text classification systems hangs on the datasets used to train them, without a good dataset it is impossible to build a quality system. This thesis examines the applicability of active learning in text classification for the rapid and economical creation of labelled training data. Four main contributions are made in this thesis. First, we present two novel selection strategies to cho...
Berry, Michael W
Text Mining: Applications and Theory presents the state-of-the-art algorithms for text mining from both the academic and industrial perspectives. The contributors span several countries and scientific domains: universities, industrial corporations, and government laboratories, and demonstrate the use of techniques from machine learning, knowledge discovery, natural language processing and information retrieval to design computational models for automated text analysis and mining. This volume demonstrates how advancements in the fields of applied mathematics, computer science, machine learning
Full Text Available The micropolar lubricated symmetric/asymmetric hole-entry bearings using capillary restrictor have been analyzed in the present work. Reynolds equation for micropolar lubricant has been derived and solved by FEM. The results have been computed using selected parameters of micropolar lubricant for hole-entry hydrostatic/hybrid journal bearings. A significant increase in damping and stiffness coefficients is observed for bearings having micropolar parameter N2=0.9, lm=10 than similar bearings under Newtonian lubricant. The threshold speed gets increased when symmetric bearing lubricated under micropolar fluid than Newtonian lubricant. The threshold speed gets increased when symmetric bearing lubricated under micropolar fluid than Newtonian lubricant.
Cristina Lelis Leal Calegario
Full Text Available Our study makes an analysis of American’ multinationals foreign market entry strategies in the European Union agribusiness context. We have used a logistic regression analysis using generalized estimating equation method to make hypothesis about the multinationals’ choices. Our results suggest that American food companies operating in EU appear not to choose their mode of entry based merely on host country factors, but mostly on firm related factors, including firm-specific factors and firm financial performance. Despite the creation of a common institutional framework for M&As in the EU, they are still subject to peculiarities due mostly to organizational characteristics of investing firms.
When the product is digital, it will most often be distributed directly to the customer through the Internet, and therefore the entry modes, considered in this paper, are different flavors of the entry mode called direct export: Virtual export channel are generally understood as the entry mode fo...... for digital product providers. However other types of entry modes like what wee call direct digital export with F2F-sales, direct digital export with F2F-support and virtual sales subsidiary are entry modes that respond to a higher degree of pre- and after-sales complexity....
Møller Larsen, Marcus; Lyngsie, Jacob
We investigate the connection between contract duration, relational mechanisms, and premature relationship termination. Based on an analysis of a large sample of exchange relationships in the global service-provider industry, we argue that investments in either longer contract duration or more in...... ambiguous reference points for adaption and thus increase the likelihood of premature termination by restricting the parties' set of adaptive actions....
Kinzig, Ann P.
This paper is intended as a brief introduction to climate adaptation in a conference devoted otherwise to the physics of sustainable energy. Whereas mitigation involves measures to reduce the probability of a potential event, such as climate change, adaptation refers to actions that lessen the impact of climate change. Mitigation and adaptation differ in other ways as well. Adaptation does not necessarily have to be implemented immediately to be effective; it only needs to be in place before the threat arrives. Also, adaptation does not necessarily require global, coordinated action; many effective adaptation actions can be local. Some urban communities, because of land-use change and the urban heat-island effect, currently face changes similar to some expected under climate change, such as changes in water availability, heat-related morbidity, or changes in disease patterns. Concern over those impacts might motivate the implementation of measures that would also help in climate adaptation, despite skepticism among some policy makers about anthropogenic global warming. Studies of ancient civilizations in the southwestern US lends some insight into factors that may or may not be important to successful adaptation.
Maria Eduarda Gonçalves Peixoto
Full Text Available The article aims to contribute to the understanding of the connection between text and ideology articulated by the text-oriented analysis of discourse (ADTO. Based on the reflections of Fairclough (1989, 2001, 2003 and Fairclough and Chouliaraki (1999, the debate presents the social ontology that ADTO uses to base its conception of social life as an open system and textually mediated; the article then explains the chronological-narrative development of the main critical theories of ideology, by virtue of which ADTO organizes the assumptions that underpin the particular use it makes of the term. Finally, the discussion presents the main aspects of the connection between text and ideology, offering a conceptual framework that can contribute to the domain of the theme according to a critical discourse analysis approach.
Berndt, Donald J; McCart, James A; Luther, Stephen L
Statistical text mining treats documents as bags of words, with a focus on term frequencies within documents and across document collections. Unlike natural language processing (NLP) techniques that rely on an engineered vocabulary or a full-featured ontology, statistical approaches do not make use of domain-specific knowledge. The freedom from biases can be an advantage, but at the cost of ignoring potentially valuable knowledge. The approach proposed here investigates a hybrid strategy based on computing graph measures of term importance over an entire ontology and injecting the measures into the statistical text mining process. As a starting point, we adapt existing search engine algorithms such as PageRank and HITS to determine term importance within an ontology graph. The graph-theoretic approach is evaluated using a smoking data set from the i2b2 National Center for Biomedical Computing, cast as a simple binary classification task for categorizing smoking-related documents, demonstrating consistent improvements in accuracy.
Full Text Available The foreign market entry is a strategic choice of any company. The firms use a practical approach in order to select and utilize the most appropriate market entry strategies and modes. This paper aims at showing how the multi-factorial grid can check up t
Chandramouli, Rajarathnam; Li, Grace; Memon, Nasir D.
Steganalysis techniques attempt to differentiate between stego-objects and cover-objects. In recent work we developed an explicit analytic upper bound for the steganographic capacity of LSB based steganographic techniques for a given false probability of detection. In this paper we look at adaptive steganographic techniques. Adaptive steganographic techniques take explicit steps to escape detection. We explore different techniques that can be used to adapt message embedding to the image content or to a known steganalysis technique. We investigate the advantages of adaptive steganography within an analytical framework. We also give experimental results with a state-of-the-art steganalysis technique demonstrating that adaptive embedding results in a significant number of bits embedded without detection.
Petersen, Kjell Yngve; Søndergaard, Karin; Kongshaug, Jesper
the investigations of lighting scenarios carried out in two test installations: White Cube and White Box. The test installations are discussed as large-scale experiential instruments. In these test installations we examine what could potentially occur when light using LED technology is integrated and distributed......Adaptive Lighting Adaptive lighting is based on a partial automation of the possibilities to adjust the colour tone and brightness levels of light in order to adapt to people’s needs and desires. IT support is key to the technical developments that afford adaptive control systems. The possibilities...... differently into an architectural body. We also examine what might occur when light is dynamic and able to change colour, intensity and direction, and when it is adaptive and can be brought into interaction with its surroundings. In short, what happens to an architectural space when artificial lighting ceases...
Ahmad Amin Dalimunte, M.Hum
Full Text Available The objectives of this research are to identify what Metafunctions are applied in chemistry text and how they characterize a scientific text. It was conducted by applying content analysis. The data for this research was a twelve-paragraph chemistry text. The data were collected by applying a documentary technique. The document was read and analyzed to find out the Metafunction. The data were analyzed by some procedures: identifying the types of process, counting up the number of the processes, categorizing and counting up the cohesion devices, classifying the types of modulation and determining modality value, finally counting up the number of sentences and clauses, then scoring the grammatical intricacy index. The findings of the research show that Material process (71of 100 is mostly used, circumstance of spatial location (26 of 56 is more dominant than the others. Modality (5 is less used in order to avoid from subjectivity. Impersonality is implied through less use of reference either pronouns (7 or demonstrative (7, conjunctions (60 are applied to develop ideas, and the total number of the clauses are found much more dominant (109 than the total number of the sentences (40 which results high grammatical intricacy index. The Metafunction found indicate that the chemistry text has fulfilled the characteristics of scientific or academic text which truly reflects it as a natural science.
Introduction: Text genres used by so-called information organizers in the processes of information organization in information systems were explored in this research. Method: The research employed text genre socio-functional analysis. Five genre groups in information organization were distinguished. Every genre group used in information…
Full Text Available The paper deals with the linguistic and cultural elements of vocative texts and the techniques used in translating them by giving some examples of texts that are typically vocative (i.e. advertisements and instructions for use. Semantic and communicative strategies are popular in translation studies and each of them has its own advantages and disadvantages in translating vocative texts. The advantage of semantic translation is that it takes more account of the aesthetic value of the SL text, while communicative translation attempts to render the exact contextual meaning of the original text in such a way that both content and language are readily acceptable and comprehensible to the readership. Focus is laid on the strategies used in translating vocative texts, strategies that highlight and introduce a cultural context to the target audience, in order to achieve their overall purpose, that is to sell or persuade the reader to behave in a certain way. Thus, in order to do that, a number of advertisements from the field of cosmetics industry and electronic gadgets were selected for analysis. The aim is to gather insights into vocative text translation and to create new perspectives on this field of research, now considered a process of innovation and diversion, especially in areas as important as economy and marketing.
Ujino, Saneyuki; Nishitsuji, Hironori; Hishiki, Takayuki; Sugiyama, Kazuo; Takaku, Hiroshi; Shimotohno, Kunitada
Various host factors are involved in the cellular entry of hepatitis C virus (HCV). In addition to the factors previously reported, we discovered that the very-low-density lipoprotein receptor (VLDLR) mediates HCV entry independent of CD81. Culturing Huh7.5 cells under hypoxic conditions significantly increased HCV entry as a result of the expression of VLDLR, which was not expressed under normoxic conditions in this cell line. Ectopic VLDLR expression conferred susceptibility to HCV entry of CD81-deficient Huh7.5 cells. Additionally, VLDLR-mediated HCV entry was not affected by the knockdown of cellular factors known to act as HCV receptors or HCV entry factors. Because VLDLR is expressed in primary human hepatocytes, our results suggest that VLDLR functions in vivo as an HCV receptor independent of canonical CD81-mediated HCV entry.
Full Text Available Abstract: British children enter school younger than their European counterparts. Research suggests that this disadvantages boys who may be unready for formal literacy instruction.This longitudinal study explores the effect of age of entry to school on boys’ reading development, focussing on attitudes and beliefs. Data from 60 summer-born boys, divided into two cohorts, was collected on three occasions: before entry to Year One, end of Year One and end of Year Two. Comparisons were drawn between 31 boys with part-time nursery education before Year One, and 29 with full-time Reception class experience. This paper presents data collected at Time One. Employing both quantitative and qualitative methodologies the study explores how beliefs about and attitudes towards reading emerge in the context of these contrasting early years settings. Implications of the findings are considered in the context of policies and trends in age of entry to school.
Nsiah K. Acheampong
Full Text Available This article empirically examines the effects of foreign bank entry on the financial performance of Merchant Bank Ghana Limited and Ghana Commercial Banks Limited in Ghana from 1975 to 2008. The main result of the pooled regression was that foreign bank entry relatively increased domestic banks’ return on assets for the period 1992-2008; a period with a high influx of foreign banks into Ghana. This result supported the studies by Beck, Demirguc-Kunt, and Levine (2006 and Boldrin and Levine (2009 that found that foreign bank entry enhanced domestic banks profitability margins. The presence of foreign-owned banks was not detrimental to the financial performance of the domestic-owned banks in Ghana.
Meghan E. McGrady
Full Text Available Preschool years (ages 3–5 are a critical period in growth and development. Emerging studies suggest that preschool attendance may be linked to future weight, and perhaps obesity. This study examined relationships between public preschool attendance, demographic variables, and weight at kindergarten entry. Participants included 2,400 children entering kindergarten in 2006. Height and weight were used to calculate a child's BMI category based on CDC norms. At kindergarten entry, 17% of participants were overweight, and 18% were obese. Children attending a public preschool were at an increased risk for overweight (OR=1.06 and obesity (OR=1.34 at kindergarten entry, χ2(2=6.81, P=.03 relative to children who did not attend preschool. No significant trends relationships between demographics and weight status were found, but demographic variables are summarized descriptively. Policy and clinical implications are provided.
Full Text Available In this article we review a variety of methods to enable understanding and modelling the spread of a pest or pathogen post-entry. Building upon our experience of multidisciplinary research in this area, we propose practical guidelines and a framework for model development, to help with the application of mathematical modelling in the field of invasion ecology for post-entry spread. We evaluate the pros and cons of a range of methods, including references to examples of the methods in practice. We also show how issues of data deficiency and uncertainty can be addressed. The aim is to provide guidance to the reader on the most suitable elements to include in a model of post-entry dispersal in a risk assessment, under differing circumstances. We identify both the strengths and weaknesses of different methods and their application as part of a holistic, multidisciplinary approach to biosecurity research.
Manuel Portugal Ferreira
Full Text Available Multinational corporations (MNCs are subject to the various dimensions of the external institutional environments. Institutional theory suggests that MNCs need to conform to the prevailing rules, norms and procedures of the locations where they operate in order to survive and grow. This means that MNCs need to develop the best possible configuration of strategy-structure for their worldwide operations. Previous research has noted that in these conditions firms may simply seek to follow a referent other. However, MNCs’ specific strategy for a focal foreign operation is likely to determine the entry mode for each host country. In certain circumstances it may be whether MNCs are pursuing a market-seeking strategy or a strategic resource seeking strategy that shapes the entry mode in face of the prevailing institutional pressures. We contribute to the understanding of entry modes into foreign markets as a reflection of a strategic choice that is bound by institutional constraints.
Greg L. Bryan
Full Text Available As an entry for the 2001 Gordon Bell Award in the "special" category, we describe our 3-d, hybrid, adaptive mesh refinement (AMR code Enzo designed for high-resolution, multiphysics, cosmological structure formation simulations. Our parallel implementation places no limit on the depth or complexity of the adaptive grid hierarchy, allowing us to achieve unprecedented spatial and temporal dynamic range. We report on a simulation of primordial star formation which develops over 8000 subgrids at 34 levels of refinement to achieve a local refinement of a factor of 1012 in space and time. This allows us to resolve the properties of the first stars which form in the universe assuming standard physics and a standard cosmological model. Achieving extreme resolution requires the use of 128-bit extended precision arithmetic (EPA to accurately specify the subgrid positions. We describe our EPA AMR implementation on the IBM SP2 Blue Horizon system at the San Diego Supercomputer Center.
Sun, Zhaohui; Errami, Mounir; Long, Tara; Renard, Chris; Choradia, Nishant; Garner, Harold
Computational methods have been used to find duplicate biomedical publications in MEDLINE. Full text articles are becoming increasingly available, yet the similarities among them have not been systematically studied. Here, we quantitatively investigated the full text similarity of biomedical publications in PubMed Central. 72,011 full text articles from PubMed Central (PMC) were parsed to generate three different datasets: full texts, sections, and paragraphs. Text similarity comparisons were performed on these datasets using the text similarity algorithm eTBLAST. We measured the frequency of similar text pairs and compared it among different datasets. We found that high abstract similarity can be used to predict high full text similarity with a specificity of 20.1% (95% CI [17.3%, 23.1%]) and sensitivity of 99.999%. Abstract similarity and full text similarity have a moderate correlation (Pearson correlation coefficient: -0.423) when the similarity ratio is above 0.4. Among pairs of articles in PMC, method sections are found to be the most repetitive (frequency of similar pairs, methods: 0.029, introduction: 0.0076, results: 0.0043). In contrast, among a set of manually verified duplicate articles, results are the most repetitive sections (frequency of similar pairs, results: 0.94, methods: 0.89, introduction: 0.82). Repetition of introduction and methods sections is more likely to be committed by the same authors (odds of a highly similar pair having at least one shared author, introduction: 2.31, methods: 1.83, results: 1.03). There is also significantly more similarity in pairs of review articles than in pairs containing one review and one nonreview paper (frequency of similar pairs: 0.0167 and 0.0023, respectively). While quantifying abstract similarity is an effective approach for finding duplicate citations, a comprehensive full text analysis is necessary to uncover all potential duplicate citations in the scientific literature and is helpful when
Full Text Available Text line segmentation is an essential stage in off-line optical character recognition (OCR systems. It is a key because inaccurately segmented text lines will lead to OCR failure. Text line segmentation of handwritten documents is a complex and diverse problem, complicated by the nature of handwriting. Hence, text line segmentation is a leading challenge in handwritten document image processing. Due to inconsistencies in measurement and evaluation of text segmentation algorithm quality, some basic set of measurement methods is required. Currently, there is no commonly accepted one and all algorithm evaluation is custom oriented. In this paper, a basic test framework for the evaluation of text feature extraction algorithms is proposed. This test framework consists of a few experiments primarily linked to text line segmentation, skew rate and reference text line evaluation. Although they are mutually independent, the results obtained are strongly cross linked. In the end, its suitability for different types of letters and languages as well as its adaptability are its main advantages. Thus, the paper presents an efficient evaluation method for text analysis algorithms.
Ehrensvärd, Martin Gustaf
For two centuries, scholars have pointed to consistent differences in the Hebrew of certain biblical texts and interpreted these differences as reflecting the date of composition of the texts. Until the 1980s, this was quite uncontroversial as the linguistic findings largely confirmed the chronol......For two centuries, scholars have pointed to consistent differences in the Hebrew of certain biblical texts and interpreted these differences as reflecting the date of composition of the texts. Until the 1980s, this was quite uncontroversial as the linguistic findings largely confirmed...... the chronology of the texts established by other means: the Hebrew of Genesis-2 Kings was judged to be early and that of Esther, Daniel, Ezra, Nehemiah, and Chronicles to be late. In the current debate where revisionists have questioned the traditional dating, linguistic arguments in the dating of texts have...... come more into focus. The study critically examines some linguistic arguments adduced to support the traditional position, and reviewing the arguments it points to weaknesses in the linguistic dating of EBH texts to pre-exilic times. When viewing the linguistic evidence in isolation it will be clear...
Full Text Available Identifying molecular biomarkers has become one of the important tasks for scientists to assess the different phenotypic states of cells or organisms correlated to the genotypes of diseases from large-scale biological data. In this paper, we proposed a text-mining-based method to discover biomarkers from PubMed. First, we construct a database based on a dictionary, and then we used a finite state machine to identify the biomarkers. Our method of text mining provides a highly reliable approach to discover the biomarkers in the PubMed database.
Hollis, Brian R.; Borrelli, Salvatore
In this chapter, the aerothermodynamic phenomena of blunt body entry vehicles are discussed. Four topics will be considered that present challenges to current computational modeling techniques for blunt body environments: turbulent flow, non-equilibrium flow, rarefied flow, and radiation transport. Examples of comparisons between computational tools to ground and flight-test data will be presented in order to illustrate the challenges existing in the numerical modeling of each of these phenomena and to provide test cases for evaluation of computational fluid dynamics (CFD) code predictions.
Laskowski, Roman A.; Jabłońska, Jagoda; Pravda, Lukáš; Vařeková, Radka Svobodová; Thornton, Janet M.
Debra J. Aron
Under what circumstances will a successful incumbent in a related market be the first to enter a new market? We present a model in which the order of entry into new markets has long run effects on the firms' profits. We assume that a firm that is successfully producing in a related market has valuable information about the demand in the new market. By his choice of location in product space in the new market the incumbent reveals information about the demand to the potential entrant. Thus, th...
Laskowski, Roman A; Jabłońska, Jagoda; Pravda, Lukáš; Vařeková, Radka Svobodová; Thornton, Janet M
Tegtmeier, Silke; Kurczewska, Agnieszka
with a positive influence, namely having an entrepreneurial role model and having attended seminars about starting a business. In our model, these factors support waiting longer before starting a business. In light of these results, we call for a more experimental approach in entrepreneurship education.......This paper explores the nascence period - the time between idea generation and business entry -among women entrepreneurs with a graduate degree. To address this research problem and to better understand the specifics of a window of opportunity, we combine selected theories of human and social...
Yasukawa, Michiko; Lim, Hui Tian; Yokoo, Hidetoshi
In Malay language, there are no conjugations and declensions and affixes have important grammatical functions. In Malay, the same word may function as a noun, an adjective, an adverb, or, a verb, depending on its position in the sentence. Although extensively simple root words are used in informal conversations, it is essential to use the precise words in formal speech or written texts. In Malay, to make sentences clear, derivative words are used. Derivation is achieved mainly by the use of affixes. There are approximately a hundred possible derivative forms of a root word in written language of the educated Malay. Therefore, the composition of Malay words may be complicated. Although there are several types of stemming algorithms available for text processing in English and some other languages, they cannot be used to overcome the difficulties in Malay word stemming. Stemming is the process of reducing various words to their root forms in order to improve the effectiveness of text processing in information systems. It is essential to avoid both over-stemming and under-stemming errors. We have developed a new Malay stemmer (stemming algorithm) for removing inflectional and derivational affixes. Our stemmer uses a set of affix rules and two types of dictionaries: a root-word dictionary and a derivative-word dictionary. The use of set of rules is aimed at reducing the occurrence of under-stemming errors, while that of the dictionaries is believed to reduce the occurrence of over-stemming errors. We performed an experiment to evaluate the application of our stemmer in text mining software. For the experiment, text data used were actual web pages collected from the World Wide Web to demonstrate the effectiveness of our Malay stemming algorithm. The experimental results showed that our stemmer can effectively increase the precision of the extracted Boolean expressions for text categorization.
National Aeronautics and Space Administration — Many existing complex space systems have a significant amount of historical maintenance and problem data bases that are stored in unstructured text forms. The...
Curriculum Review, 1979
This review of selected social studies texts, series, and supplements, mainly for the secondary level, includes a special section examining eight titles on warfare and terrorism for grades 4-12. (SJL)
Smith, Brandon Patrick
This project is developing a mechanically deployed system through a mission application study, deployment/ejection testing, and wind tunnel testing. Adaptable Deployable Entry and Placement Technology (ADEPT) has been under development at NASA since 2011. Nano-ADEPT is the application of this revolutionary entry technology for small spacecraft. The unique capability of ADEPT for small science payloads comes from its ability to stow within a slender volume and deploy passively to achieve a mass-efficient drag surface with a high heat rate capability. Near-term applications for this technology include return of small science payloads or CubeSat technology from Low Earth Orbit (LEO) and delivery of secondary payloads to the surface of Mars.
Full Text Available The aim of this study was to establish a typology of job market entry strategies among Olympic athletes. Guided by rational choice theory and social reproduction theory, we conducted a telephone survey among 94 athletes (68 men and 26 women. Hierarchical cluster analysis was used to identify four distinct groups, which we called parallel life strategists, freelance strategists, lifetime athletes, and non-strategists: it’s a job. The results show that athletes from families with greater economic and cultural capital implement career transition strategies further in advance and achieve greater career success and satisfaction. These findings can be used to develop support programs tailored to the needs of athletes according to their profile.
Full Text Available The Dissociative Recombination (DR processes play a significant role in plasma chemistry. This article illustrates this role from the modeling point of view in the case of reactive flows related to atmospheric entry plasmas. Two situations are investigated, for which the studied plasma is nitrogen. The first configuration corresponds to the relaxation process behind a strong shock wave moving at high Mach number in a shock tube, the second one to the recombination taking place in an expanding plasma flowing in a diverging nozzle. In both cases, the collisional-radiative model CoRaM-N2, involving N2, N, N2+, N+ and electrons, is implemented in an Eulerian 1D code able to compute the aerodynamic fields; calculations are performed in standard conditions. We show that, according to the rate coefficients used for the DR processes, the population density of the charged species especially N2+ is strongly modified only for the post-shock flow.
Kobayashi, Vladimer B; Mol, Stefan T; Berkers, Hannah A; Kismihók, Gábor; Den Hartog, Deanne N
Despite the ubiquity of textual data, so far few researchers have applied text mining to answer organizational research questions. Text mining, which essentially entails a quantitative approach to the analysis of (usually) voluminous textual data, helps accelerate knowledge discovery by radically increasing the amount data that can be analyzed. This article aims to acquaint organizational researchers with the fundamental logic underpinning text mining, the analytical stages involved, and contemporary techniques that may be used to achieve different types of objectives. The specific analytical techniques reviewed are (a) dimensionality reduction, (b) distance and similarity computing, (c) clustering, (d) topic modeling, and (e) classification. We describe how text mining may extend contemporary organizational research by allowing the testing of existing or new research questions with data that are likely to be rich, contextualized, and ecologically valid. After an exploration of how evidence for the validity of text mining output may be generated, we conclude the article by illustrating the text mining process in a job analysis setting using a dataset composed of job vacancies.
Kozdras, Deborah; Joseph, Christine; Schneider, Jenifer Jasinski
In this article, we describe how literacy strategies can be adapted for playing (and reading) video games--games that embed disciplinary content in multimedia texts. Using close viewing and guided playing strategies with online games and simulations, we share ideas for helping students navigate and comprehend multimedia texts in order to learn…
The texts of the following agreements and supplementary agreements between the Agency and the United Nations are reproduced in this document for the information of all Members of the Agency: I. A. Agreement Governing the Relationship Between the United Nations and the International Atomic Energy Agency; B. Protocol Concerning the Entry into Force of the Agreement between the United Nations and the International Atomic Energy Agency; II. Administrative Arrangement Concerning the Use of the United Nations Laissez-Passer by Officials of the International Atomic Energy Agency; and III. Agreement for the Admission of the International Atomic Energy Agency into the United Nations Joint Staff Pension Fund
The texts of the following agreements and supplementary agreements between the Agency and the United Nations are reproduced in this document for the information of all Members of the Agency: I. A. Agreement Governing the Relationship Between the United Nations and the International Atomic Energy Agency; B. Protocol Concerning the Entry into Force of the Agreement between the United Nations and the International Atomic Energy Agency; II. Administrative Arrangement Concerning the Use of the United Nations Laissez-Passer by Officials of the International Atomic Energy Agency; and III. Agreement for the Admission of the International Atomic Energy Agency into the United Nations Joint Staff Pension Fund.
The texts of the following agreements and supplementary agreements between the Agency and the United Nations are reproduced in this document for the information of all Members of the Agency: I. A. Agreement Governing the Relationship Between the United Nations and the International Atomic Energy Agency; B. Protocol Concerning the Entry into Force of the Agreement between the United Nations and the International Atomic Energy Agency; II. Administrative Arrangement Concerning the Use of the United Nations Laissez-Passer by Officials of the International Atomic Energy Agency; and III. Agreement for the Admission of the International Atomic Energy Agency into the United Nations Joint Staff Pension Fund [ru
The texts of the following agreements and supplementary agreements between the Agency and the United Nations are reproduced in this document for the information of all Members of the Agency: I. A. Agreement Governing the Relationship Between the United Nations and the International Atomic Energy Agency; B. Protocol Concerning the Entry into Force of the Agreement between the United Nations and the International Atomic Energy Agency; II. Administrative Arrangement Concerning the Use of the United Nations Laissez-Passer by Officials of the International Atomic Energy Agency; and III. Agreement for the Admission of the International Atomic Energy Agency into the United Nations Joint Staff Pension Fund [es
Addressing Climate Change Adaptation in Africa through Participatory Action Research. A Regional Observatory ... while the average annual rainfall recorded between. 1968 and 1999 was .... the region of Thies. For sustainability reasons, the.
adaptation to climate change from various regions of the Sahel. Their .... This simple system, whose cost and maintenance were financially sustainable, brought ... method that enables him to learn from experience and save time, which he ...
The US Department of Energy is one of three agencies funding the major portion of government-supported research. One of the ways to locate the results of this research is to find reports in the Energy Data Base (EDB), the comprehensive data base of the Office of Scientific and Technical Information, Technical Information Center, and in publications derived therefrom by referring to the corporate organization performing the research. This information field has been established as an index point retrievable in on-line searching and is included as an index in printed publications. To provide consistent citing of names in bibliographic entries, this authority has been created and maintained as a means of entry of corporate names into the EDB. To locate such information, one can (1) use the seven-digit code number assigned to the corporate entity of interest (enter, for example, IC=9506086) or (2) use one word at a time from the corporate name given (enter, for example, CS=Dominion)
Charles J Shoemaker
Full Text Available Ebola virus (EBOV is an enveloped RNA virus that causes hemorrhagic fever in humans and non-human primates. Infection requires internalization from the cell surface and trafficking to a late endocytic compartment, where viral fusion occurs, providing a conduit for the viral genome to enter the cytoplasm and initiate replication. In a concurrent study, we identified clomiphene as a potent inhibitor of EBOV entry. Here, we screened eleven inhibitors that target the same biosynthetic pathway as clomiphene. From this screen we identified six compounds, including U18666A, that block EBOV infection (IC(50 1.6 to 8.0 µM at a late stage of entry. Intriguingly, all six are cationic amphiphiles that share additional chemical features. U18666A induces phenotypes, including cholesterol accumulation in endosomes, associated with defects in Niemann-Pick C1 protein (NPC1, a late endosomal and lysosomal protein required for EBOV entry. We tested and found that all six EBOV entry inhibitors from our screen induced cholesterol accumulation. We further showed that higher concentrations of cationic amphiphiles are required to inhibit EBOV entry into cells that overexpress NPC1 than parental cells, supporting the contention that they inhibit EBOV entry in an NPC1-dependent manner. A previously reported inhibitor, compound 3.47, inhibits EBOV entry by blocking binding of the EBOV glycoprotein to NPC1. None of the cationic amphiphiles tested had this effect. Hence, multiple cationic amphiphiles (including several FDA approved agents inhibit EBOV entry in an NPC1-dependent fashion, but by a mechanism distinct from that of compound 3.47. Our findings suggest that there are minimally two ways of perturbing NPC1-dependent pathways that can block EBOV entry, increasing the attractiveness of NPC1 as an anti-filoviral therapeutic target.
Cui, X.; Mueller, F.; Zhang, Y.; Potok, Thomas E.
Accelerating hardware devices represent a novel promise for improving the performance for many problem domains but it is not clear for which domains what accelerators are suitable. While there is no room in general-purpose processor design to significantly increase the processor frequency, developers are instead resorting to multi-core chips duplicating conventional computing capabilities on a single die. Yet, accelerators offer more radical designs with a much higher level of parallelism and novel programming environments. This present work assesses the viability of text mining on CUDA. Text mining is one of the key concepts that has become prominent as an effective means to index the Internet, but its applications range beyond this scope and extend to providing document similarity metrics, the subject of this work. We have developed and optimized text search algorithms for GPUs to exploit their potential for massive data processing. We discuss the algorithmic challenges of parallelization for text search problems on GPUs and demonstrate the potential of these devices in experiments by reporting significant speedups. Our study may be one of the first to assess more complex text search problems for suitability for GPU devices, and it may also be one of the first to exploit and report on atomic instruction usage that have recently become available in NVIDIA devices
Purić Daliborka S.
Full Text Available The paper discusses the problem of understanding a text and the contribution of methodological apparatus in the reader book to comprehension of a text being read in junior classes of elementary school. By using the technique of content analysis from methodological apparatuses in eight reader books for the fourth grade of elementary school, approved for usage in 2014/2015 academic year, and surveying 350 teachers in 33 elementary schools and 11 administrative districts in the Republic of Serbia we examined: (a to what extent the Serbian language text book contents enable junior students to understand a literary text; (b to what extent teachers accept the suggestions offered in the textbook for preparing literature teaching. The results show that a large number of suggestions relate to reading comprehension, but some of categories of understanding are unevenly distributed in the methodological apparatus. On the other hand, the majority of teachers use the methodological apparatus given in a textbook for preparing classes, not only the textbook he or she selected for teaching but also other textbooks for the same grade.
... Entry Summary-- Declaration of Value AGENCY: Customs and Border Protection, Department of Homeland... manner by which the declared transaction value on imported merchandise was determined. This requirement... whether the transaction value of imported merchandise is determined on the basis of the price paid by the...
This note shows that a feasible reference drag profile for the first entry portion of a skip entry can be generated as a polynomial expression of the velocity. The coefficients of that polynomial are found through the resolution of a system composed of m + 1 equations, where m is the degree of the drag polynomial. It has been shown that a minimum of five equations (m = 4) are required to establish the range and the initial and final conditions on velocity and flight path angle. It has been shown that at least one constraint on the trajectory can be imposed through the addition of one extra equation in the system, which must be accompanied by the increase in the degree of the drag polynomial. In order to simplify the resolution of the system of equations, the drag was considered as being a probability density function of the velocity, with the velocity as a distribution function of the drag. Combining this notion with the introduction of empirically derived constants, it has been shown that the system of equations required to generate the drag profile can be successfully reduced to a system of linear algebraic equations. For completeness, the resulting drag profiles have been flown using the feedback linearization method of differential geometric control as a guidance law with the error dynamics of a second order homogeneous equation in the form of a damped oscillator. Satisfactory results were achieved when the gains in the error dynamics were changed at a certain point along the trajectory that is dependent on the velocity and the curvature of the drag as a function of the velocity. Future work should study the capacity to update the drag profile in flight when dispersions are introduced. Also, future studies should attempt to link the first entry, as presented and controlled in this note, with a more standard control concept for the second entry, such as the Apollo entry guidance, to try to assess the overall skip entry performance. A guidance law that includes
LUCIAN CIPRIAN CRISAN
Full Text Available The new rising “ME” generation in the labor force became one of the most challenging need of change for the actual leaders. A self-branding man child is arising in the work market area and occupies the new entry positions in any organization. The actual leaders faces with self -centered people who are rejecting the system opting for parental continuous help. Ready or not, the nowadays leader must face and adopt his leadership style to a new free generation who would rather climb the highest mountains then the organizational or corporative leader, but asking for their parents money. In less than five years 50% of the work force will be represented by Millennials, a self-focused generation with different views than we are used to have and the question is how to deal with them to achieve the corporate goals and at the same time to grow them, in order to create a new generation of leaders, by using their positive attitude and their new, different vision of life. The purpose of this paper is to highlight the nowadays leaders need for adaptive change in order to develop other leaders and to deliver the requested expectations, by using the new Facebook generation vision of life and work. At the same time It will highlight how this model can be translated into the daily activity so that Millennials be perceived as precious source for the future leadership way.
Full Text Available Abstract: First-line health services with a primary health care approach are a strong trigger for adequate health-care-seeking behavior. Research on the association between prevalence of chronic diseases and acute illnesses and use of health services emphasizes the importance of socioeconomic determinants in such patterns of utilization. In a cross-sectional study of 408 families in Centro Habana, Cuba, home interviews were conducted between April and June 2010 to analyze socio-demographic determinants of acute and chronic health problems and use of formal health services. Bivariate and logistic regression models were used. 529 persons reported a chronic disease. During the previous month, 155 of the latter reported an exacerbation and 50 experienced an unrelated acute health problem. 107 persons without chronic diseases reported acute health problems. Age was the strongest determinant of chronic disease prevalence. Adult women and the elderly were more likely to report acute problems. Acute patients with underlying chronic disease used formal services more often. No socio-demographic variable was associated with services use or consultation with the family physician. While the family physician is defined as the system's entry-point, this was the case for only 54% of patients that had used formal services, thus compromising the physician's role in counseling patients and summarizing their health issues. The importance of chronic diseases highlights the need to strengthen the family physician's pivotal role. New economic policies in Cuba, stimulating self-employment and private initiative, may increase the strain on the exclusively public health care system. Still, the Cuban health system has demonstrated its ability to adapt to new challenges, and the basic premises of Cuba's health policy are expected to be preserved.
Full Text Available There is substantial evidence indicating that disruption of Ca(2+ homeostasis and activation of cytosolic proteases play a key role in the pathogenesis and progression of Duchenne Muscular Dystrophy (DMD. However, the exact nature of the Ca(2+ deregulation and the Ca(2+ signaling pathways that are altered in dystrophic muscles have not yet been resolved. Here we examined the contribution of the store-operated Ca(2+ entry (SOCE for the pathogenesis of DMD. RT-PCR and Western blot found that the expression level of Orai1, the pore-forming unit of SOCE, was significantly elevated in the dystrophic muscles, while parallel increases in SOCE activity and SR Ca(2+ storage were detected in adult mdx muscles using Fura-2 fluorescence measurements. High-efficient shRNA probes against Orai1 were delivered into the flexor digitorum brevis muscle in live mice and knockdown of Orai1 eliminated the differences in SOCE activity and SR Ca(2+ storage between the mdx and wild type muscle fibers. SOCE activity was repressed by intraperitoneal injection of BTP-2, an Orai1 inhibitor, and cytosolic calpain1 activity in single muscle fibers was measured by a membrane-permeable calpain substrate. We found that BTP-2 injection for 2 weeks significantly reduced the cytosolic calpain1 activity in mdx muscle fibers. Additionally, ultrastructural changes were observed by EM as an increase in the number of triad junctions was identified in dystrophic muscles. Compensatory changes in protein levels of SERCA1, TRP and NCX3 appeared in the mdx muscles, suggesting that comprehensive adaptations occur following altered Ca(2+ homeostasis in mdx muscles. Our data indicates that upregulation of the Orai1-mediated SOCE pathway and an overloaded SR Ca(2+ store contributes to the disrupted Ca(2+ homeostasis in mdx muscles and is linked to elevated proteolytic activity, suggesting that targeting Orai1 activity may be a promising therapeutic approach for the prevention and treatment of
AFRL-AFOSR-UK-TR-2016-0011 Individual Profiling using Text Analysis 140333 Mark Stevenson UNIVERSITY OF SHEFFIELD, DEPARTMENT OF PSYCHOLOGY Final...REPORT TYPE Final 3. DATES COVERED (From - To) 15 Sep 2014 to 14 Sep 2015 4. TITLE AND SUBTITLE Individual Profiling using Text Analysis ...consisted of collections of tweets for a number of Twitter users whose gender, age and personality scores are known. The task was to construct some system
Full Text Available Framing, the effect of context on cognitive processes, is a prominent topic of research in psychology and public opinion research. Research on framing has traditionally relied on controlled experiments and manually annotated document collections. In this paper we present a method that allows for quantifying the relative strengths of competing linguistic frames based on corpus analysis. This method requires little human intervention and can therefore be efficiently applied to large bodies of text. We demonstrate its effectiveness by tracking changes in the framing of terror over time and comparing the framing of abortion by Democrats and Republicans in the U.S.
Zhou, Jiangying; Lopresti, Daniel P.; Tasdizen, Tolga
In this paper, we consider the problem of locating and extracting text from WWW images. A previous algorithm based on color clustering and connected components analysis works well as long as the color of each character is relatively uniform and the typography is fairly simple. It breaks down quickly, however, when these assumptions are violated. In this paper, we describe more robust techniques for dealing with this challenging problem. We present an improved color clustering algorithm that measures similarity based on both RGB and spatial proximity. Layout analysis is also incorporated to handle more complex typography. THese changes significantly enhance the performance of our text detection procedure.
Louis F. Dmytryk
Full Text Available The Accreditation Council for Occupational Therapy Education (ACOTE requires programs to instruct entrylevel occupational therapy (OT and occupational therapy assistant (OTA students in technology that may include electronic documentation systems, distance communication, virtual environments, and telehealth (standard B1.8. At this time, there are no publications describing if and how electronic health record (EHR instruction is implemented in entry-level OT and OTA programs. The purpose of this study is to investigate awareness and use of EHRs in entry-level OT and OTA curricula. Respondents from 76 nationally accredited entry-level programs (two OT doctoral, 24 OT masters, two OT combined bachelors/masters, and 48 OTA completed a survey. The findings showed inconsistent and incomplete EHR instruction in entry-level OT and OTA education. This study provides a baseline for investigating best practices in EHR education for entrylevel OT and OTA students
Lukasz Maciej Mazur
Full Text Available Medication errors occurring in hospitals are a growing national concern. These medication errors and their related costs (or wastes are seen as major factors leading to increased patient safety risks and increased waste in the hospital setting. This article presents a study in which sixteen entry-level nurses utilized a Toyota Production System (TPS analysis procedure to solve medication delivery problems at one community hospital. The objective of this research was to study and evaluate the TPS analysis procedure for problem solving with entry-level nurses. Personal journals, focus group discussions, and a survey study were used to collect data about entry-level nurses’ perceptions of using the TPS problem solving approach to study medication delivery. A regression analysis was used to identify characteristics that enhance problem solving efforts. In addition, propositions for effective problem solving by entry-level nurses to aid in the reduction of medication errors in healthcare delivery settings are offered.
We present TISC, a multilingual, language-independent and context-sensitive spelling checking and correction system designed to facilitate the automatic removal of non-word spelling errors in large corpora. Its lexicon is derived from raw text corpora, without supervision, and contains word unigrams
Gorham, Jonathan W.
This text is designed to provide teachers, students, and the general public with an overview of key solar energy concepts. Various energy terms are defined and explained. Basic thermodynamic laws are discussed. Alternative energy production is described in the context of the present energy situation. Described are the principal contemporary solar…
Describes the use of file transfer protocol (FTP) on the INTERNET computer network and considers its use as an electronic publishing system. The differing electronic formats of text files are discussed; the preparation and access of documents are described; and problems are addressed, including a lack of consistency. (LRW)
Pedersen, Jesper Ballisager; Nasrollahi, Kamal; Moeslund, Thomas B.
-folded: for costumers of the printing and verification system, the overall grade used to verify if the text is of sufficient quality, while for printer's manufacturer, the detailed character/symbols grades and quality measurements are used for the improvement and optimization of the printing task. The proposed system...
Ream, W.K.; Espinoza, J.
An entry control system to automatically control access to nuclear facilities is described. The design uses a centrally located console, integrated into the regular security system, to monitor the computer-controlled passage into and out of sensitive areas. Four types of entry control points are used: an unmanned enclosed portal with metal and SNM detectors for contraband detection with positive personnel identification, a bypass portal for contraband search after a contraband alarm in a regular portal also with positive personnel identification, a single door entry point with positive personnel identification, and a single door entry point with only a magnetic card-type identification. Security force action is required only as a response to an alarm. The integration of the entry control function into the security system computer is also described. The interface between the entry control system and the monitoring security personnel utilizing a color graphics display with touch screen input is emphasized
Bengali, Zain; Satheshkumar, P.S. [Laboratory of Viral Diseases, National Institute of Allergy and Infectious Diseases, National Institutes of Health, Bethesda, MD 20892-3210 (United States); Moss, Bernard, E-mail: firstname.lastname@example.org [Laboratory of Viral Diseases, National Institute of Allergy and Infectious Diseases, National Institutes of Health, Bethesda, MD 20892-3210 (United States)
Vaccinia virus (VACV) enters cells by a low pH endosomal route or by direct fusion with the plasma membrane. We previously found differences in entry properties of several VACV strains: entry of WR was enhanced by low pH, reduced by bafilomycin A1 and relatively unaffected by heparin, whereas entry of IHD-J, Copenhagen and Elstree were oppositely affected. Since binding and entry modes may have been selected by specific conditions of in vitro propagation, we now examined the properties of three distinct, recently isolated cowpox viruses and a monkeypox virus as well as additional VACV and cowpox virus strains. The recent isolates were more similar to WR than to other VACV strains, underscoring the biological importance of endosomal entry by orthopoxviruses. Sequence comparisons, gene deletions and gene swapping experiments indicated that viral determinants, other than or in addition to the A26 and A25 'fusion-suppressor' proteins, impact entry properties.
Full Text Available A hallmark of HIV-1 infection is the continuously declining number of the virus' predominant target cells, activated CD4+ T cells. With diminishing CD4+ T cell levels, the capacity to utilize alternate cell types and receptors, including cells that express low CD4 receptor levels such as macrophages, thus becomes crucial. To explore evolutionary paths that allow HIV-1 to acquire a wider host cell range by infecting cells with lower CD4 levels, we dissected the evolution of the envelope-CD4 interaction under in vitro culture conditions that mimicked the decline of CD4high target cells, using a prototypic subtype B, R5-tropic strain. Adaptation to CD4low targets proved to severely alter envelope functions including trimer opening as indicated by a higher affinity to CD4 and loss in shielding against neutralizing antibodies. We observed a strikingly decreased infectivity on CD4high target cells, but sustained infectivity on CD4low targets, including macrophages. Intriguingly, the adaptation to CD4low targets altered the kinetic of the entry process, leading to rapid CD4 engagement and an extended transition time between CD4 and CCR5 binding during entry. This phenotype was also observed for certain central nervous system (CNS derived macrophage-tropic viruses, highlighting that the functional perturbation we defined upon in vitro adaptation to CD4low targets occurs in vivo. Collectively, our findings suggest that CD4low adapted envelopes may exhibit severe deficiencies in entry fitness and shielding early in their evolution. Considering this, adaptation to CD4low targets may preferentially occur in a sheltered and immune-privileged environment such as the CNS to allow fitness restoring compensatory mutations to occur.
Tiago Villac Adde
Full Text Available The history of Brazilian accounting has not been explored at length. Through a historical survey, this article presents the history of the Double-entry Bookkeeping Committee of 1914. After the Proclamation of the Republic was announced in 1889, the government started to expand its administrative bodies, necessitating the introduction of a bureaucracy able to perform new functions. In the same period, Brazil experienced a strong economic development with the development of its coffee industry. In 1905, under the leadership of Carlos de Carvalho, São Paulo State Treasury bookkeeping tasks were introduced under a double-entry bookkeeping system and through accrual and financial accounting. Double-entry bookkeeping practices in the federal public accounting system, although enshrined in law since 1808, were only fully realized after the creation of the Double-entry Bookkeeping Committee in 1914. In that same year, due to the negotiation of a second funding loan, English creditor bank auditors requested a balance of the National Treasury from the Minister of Finance Rivadávia Corrêa. Because the balance had not been prepared in eight years, the Double-entry Bookkeeping Committee was established in June of 1914, and this body completed a technical audit of Revenues and Expenditures. The committee also conducted the state administration's first Asset and Liability audit since the colonial era. The Double-entry Bookkeeping Committee of 1914 spearheaded changes to the Brazilian public accounting system, including the creation of the Public Accounting Code in 1922 and the approval of Central Accounting Office of the Republic regulation in 1924, strengthening and ascribing perpetuity to practices adopted after 1914.
This paper examines the impact of restricting foreign bank entry on bank net interest margins while controlling for (a) impediments to domestic bank entry, (b) the degree of foreign bank ownership of the domestic banking industry, (c) an array of bank-specific characteristics, (c) banking sectorconcentration, and (d) various country traits. Using data on almost 1200 banks across 47 countries, the results suggest that restricting foreign bank entry boosts bank net interest margins. Also, restr...
Chinese firms and other emerging markets firms aim to select a favourable entry mode to start or expand their international business, thus this is significant issue for research. This study demonstrates that the Chinese firms’ choice of entry mode is determined by internal-factors, external-factors and transaction cost factors. This is illustrated through the investigation of a case study of the Haier Group’s choice of entry mode and internationalization. Therefore, four processes of choice o...
Full Text Available The majority of H. pylori reside on gastric epithelial cell surfaces and in the overlying mucus, but a small fraction of H. pylori enter host epithelial and immune cells. To explore the role of the nudA invasin in host cell entry, a ΔnudA deletion derivative of strain J99 was constructed and transformants were verified by PCR and by fluorescence in situ hybridization. AGS cells were inoculated with either wild type (WT strain J99 or its ΔnudA mutant to determine the fraction of bacteria that were bound to the cells and inside these cells using the gentamicin protection assay. We observed no significant difference between either the density of H. pylori bound to AGS cell membranes or the density of intracellular H. pylori. To further explore this finding, separate chambers of each culture were fixed in glutaraldehyde for transmission electron microscopy (TEM and immunogold TEM. This addition to the classical gentamicin assay demonstrated that there were significantly more intracellular, and fewer membrane-bound, H. pylori in WT-infected AGS cells than in ΔnudA allele infected cells. Thus, the sum of intracellular and membrane-bound H. pylori was similar in the two groups. Since no other similar TEM study has been performed, it is at present unknown whether our observations can be reproduced by others Taken together however, our observations suggest that the classical gentamicin protection assay is not sufficiently sensitive to analyze H. pylori cell entry and that the addition of TEM to the test demonstrate that nudA plays a role in H. pylori entry into AGS cells in vitro. In addition, deletion of the invasin gene appears to limit H. pylori to the AGS cell surface, where it may be partly protected against gentamicin. In contrast, this specific environment may render H. pylori more vulnerable to host defense and therapeutic intervention, and less prone to trigger normal immune, carcinogenic, and other developmental response pathways.
Nizamani, Sarwat; Memon, Nasrullah; Wiil, Uffe Kock
We propose a cluster based classification model for suspicious email detection and other text classification tasks. The text classification tasks comprise many training examples that require a complex classification model. Using clusters for classification makes the model simpler and increases...... the accuracy at the same time. The test example is classified using simpler and smaller model. The training examples in a particular cluster share the common vocabulary. At the time of clustering, we do not take into account the labels of the training examples. After the clusters have been created......, the classifier is trained on each cluster having reduced dimensionality and less number of examples. The experimental results show that the proposed model outperforms the existing classification models for the task of suspicious email detection and topic categorization on the Reuters-21578 and 20 Newsgroups...
Young, Ian; Rezetko, Robert; Ehrensvärd, Martin Gustaf
Since the beginning of critical scholarship biblical texts have been dated using linguistic evidence. In recent years this has become a controversial topic, especially with the publication of Ian Young (ed.), Biblical Hebrew: Studies in Chronology and Typology (2003). However, until now there has...... been no introduction and comprehensive study of the field. Volume 1 introduces the field of linguistic dating of biblical texts, particularly to intermediate and advanced students of biblical Hebrew who have a reasonable background in the language, having completed at least an introductory course...... in this volume are: What is it that makes Archaic Biblical Hebrew archaic , Early Biblical Hebrew early , and Late Biblical Hebrew late ? Does linguistic typology, i.e. different linguistic characteristics, convert easily and neatly into linguistic chronology, i.e. different historical origins? A large amount...
Nicolaisen, Maria Skou
The aim of the present research article is to discuss the possibilities and limitations in addressing text as an autopoietic system. The theory of autopoiesis originated in the field of biology in order to explain the dynamic processes entailed in sustaining living organisms at cellular level. Th....... By comparing the biological with the textual account of autopoietic agency, the end conclusion is that a newly derived concept of sociopoiesis might be better suited for discussing the architecture of textual systems....
Hallock, G.A.; Gartman, M.L.; Li, W.; Chiang, K.; Shin, S.; Castles, R.L.; Chatterjee, R.; Rahman, A.S.
A far-infrared interferometer has been installed on TEXT upgrade to obtain electron density profiles. The primary system views the plasma vertically through a set of large (60-cm radialx7.62-cm toroidal) diagnostic ports. A 1-cm channel spacing (59 channels total) and fast electronic time response is used, to provide high resolution for radial profiles and perturbation experiments. Initial operation of the vertical system was obtained late in 1991, with six operating channels
Ma , Yue; Lévy , François; Ghimire , Sudeep
International audience; Linguistic and semantic annotations are important features for text-based applications. However, achieving and maintaining a good quality of a set of annotations is known to be a complex task. Many ad hoc approaches have been developed to produce various types of annotations, while comparing those annotations to improve their quality is still rare. In this paper, we propose a framework in which both linguistic and domain information can cooperate to reason with annotat...
Hattori, Keisuke; Yoshikawa, Takeshi
We investigate the social desirability of free entry in the co-opetition model in which firms compete in a homogeneous product market while sharing common property resources that affect market size or consumers' willingness to pay for products. We show that free entry leads to socially excessive or insufficient entry into the market in the case of non-commitment co-opetition, depending on the magnitude of "business stealing" and "common property" effects of entry. On the other hand, in the ca...
Dyhr Ulrich, Anna Marie; Boyd, Britta; Hollensen, Svend
The aim of this article is to investigate the choice of entry modes for international markets in a control perspective. A survey from The Confederation of Danish Industry with 234 Danish small- and medium sized enterprises served as a data base. The entry modes are categorized into three groups...... depending on the control that the company has over its activities abroad. The paper examines selected factors that influence the ‘entry modes’ of Danish SMEs in different strategic settings. Results show that the most deciding factor for the choice of high control entry mode (subsidiary) was the factor...
Conner, Sean D.; Schmid, Sandra L.
The plasma membrane is the interface between cells and their harsh environment. Uptake of nutrients and all communication among cells and between cells and their environment occurs through this interface. `Endocytosis' encompasses several diverse mechanisms by which cells internalize macromolecules and particles into transport vesicles derived from the plasma membrane. It controls entry into the cell and has a crucial role in development, the immune response, neurotransmission, intercellular communication, signal transduction, and cellular and organismal homeostasis. As the complexity of molecular interactions governing endocytosis are revealed, it has become increasingly clear that it is tightly coordinated and coupled with overall cell physiology and thus, must be viewed in a broader context than simple vesicular trafficking.
Louw, Arnt Vestergaard
This article reports on methodological experiences obtained in an anthropologically inspired qualitative study among students of carpentry in Denmark. On the one hand the article deals with methodological issues of doing anthropological research among students of carpentry, while on the other...... it deals with the research findings that such a research design produced. As well as the methodological issues of researcher access, entry and participant position in the field, this article reports on the following questions: What kinds of implicit expectations of the students are embedded in the way...... the school introduces and initiates the programme? What kinds of effects does this have on the motivation of the students? How do the terms and professional language of the profession work on the individual students in including and excluding ways? These specific descriptions of classroom pedagogy, inspired...
Andersen, C.E.; Søgaard-Hansen, J.; Majborn, B.
A simple test structure for studies of radon entry into houses has been constructed at a field site at Riso National Laboratory. It consists of a 40 1, stainless-steel cylinder placed in a 0.52 m deep quadratic excavation with a side length of 2.4 m. The excavation is lined with an airtight...... membrane, and soil gas enters the cylinder through a changeable interface in the bottom. The depressurisation of the cylinder is controlled by a mass-flow controller, thereby limiting the influence of natural driving forces. Pressures, temperatures and radon concentrations are measured continuously...... in the cylinder and in selected locations in the soil. In this paper, the test structure is described, and initial results concerning the transport of soil gas and radon under steady-state conditions are reported. It is found that the soil in the vicinity of the structure is partially depleted with respect...
Full Text Available Pattern recognition receptors (PRRs belonging to the multigene family of receptor-like kinases (RLKs are the sensing devices of plants for microbe- or pathogen-associated molecular patterns released from microbial organisms. Here we describe Rnr8 (for required for nonhost resistance 8 encoding HvLEMK1, a LRR-malectin domain-containing transmembrane RLK that mediates nonhost resistance of barley to the non-adapted wheat powdery mildew fungus Blumeria graminis f.sp. tritici. Transgenic barley lines with silenced HvLEMK1 allow entry and colony growth of the non-adapted pathogen, although sporulation was reduced and final colony size did not reach that of the adapted barley powdery mildew fungus Blumeria graminis f.sp. hordei. Transient expression of the barley or wheat LEMK1 genes enhanced resistance in wheat to the adapted wheat powdery mildew fungus while expression of the same genes did not protect barley from attack by the barley powdery mildew fungus. The results suggest that HvLEMK1 is a factor mediating nonhost resistance in barley and quantitative host resistance in wheat to the wheat powdery mildew fungus.
Mochida, Satoru; Rata, Scott; Hino, Hirotsugu; Nagai, Takeharu; Novák, Béla
The abrupt and irreversible transition from interphase to M phase is essential to separate DNA replication from chromosome segregation. This transition requires the switch-like phosphorylation of hundreds of proteins by the cyclin-dependent kinase 1 (Cdk1):cyclin B (CycB) complex. Previous studies have ascribed these switch-like phosphorylations to the auto-activation of Cdk1:CycB through the removal of inhibitory phosphorylations on Cdk1-Tyr15 [1, 2]. The positive feedback in Cdk1 activation creates a bistable switch that makes mitotic commitment irreversible [2-4]. Here, we surprisingly find that Cdk1 auto-activation is dispensable for irreversible, switch-like mitotic entry due to a second mechanism, whereby Cdk1:CycB inhibits its counteracting phosphatase (PP2A:B55). We show that the PP2A:B55-inhibiting Greatwall (Gwl)-endosulfine (ENSA) pathway is both necessary and sufficient for switch-like phosphorylations of mitotic substrates. Using purified components of the Gwl-ENSA pathway in a reconstituted system, we found a sharp Cdk1 threshold for phosphorylation of a luminescent mitotic substrate. The Cdk1 threshold to induce mitotic phosphorylation is distinctly higher than the Cdk1 threshold required to maintain these phosphorylations-evidence for bistability. A combination of mathematical modeling and biochemical reconstitution show that the bistable behavior of the Gwl-ENSA pathway emerges from its mutual antagonism with PP2A:B55. Our results demonstrate that two interlinked bistable mechanisms provide a robust solution for irreversible and switch-like mitotic entry. Copyright © 2016 Elsevier Ltd. All rights reserved.
Robinson, Maxine F; Mihalopoulos, Cathrine; Merlin, Tracy; Roughead, Elizabeth
Australia relies on managed entry agreements (MEAs) for many medicines added to the national Pharmaceutical Benefits Scheme (PBS). Previous studies of Australian MEAs examined public domain documents and were not able to provide a comprehensive assessment of the types and operation of MEAs. This study used government documents approved for release to examine the implementation and administration of MEAs implemented January 2012 to May 2016. We accessed documents for medicines with MEAs on the PBS between January 2012 and May 2016. Data were extracted on Anatomical Therapeutic Classification (ATC), type of MEA (financial, financial with outcomes, outcomes, and subcategories within each group), implementation and administration methods, source of MEA recommendation, and type of economic analysis. Of all medication indication pairs (MIPs) recommended for listing, one-third had MEAs implemented. Our study of eighty-seven MIPs had 170 MEAs in place. The Government's expert health technology assessment (HTA) committee recommended MEAs for 90 percent of the eighty-seven MIPs. A total of 81 percent of MEAs were simple financial agreements: the majority either discounts (32 percent) or reimbursement caps (43 percent). Outcome-based MEAs were least common (5 percent). Ninety-two percent of MEAs were implemented and operated through legal agreements. Approximately half of the MIPs were listed on the basis of accepted claims of cost-minimization. Forty-nine percent of medicines were in ATC L group. Advice from HTA evaluations strongly influences the implementation of ways to manage uncertainties while providing access to medicines. The government relied primarily on simple financial agreements for the managed entry of medicines for which there were perceived risks.
Full Text Available The paper focuses on J.G. Ballard’s various adaptations of his own material related to the issue of the sexual and sensual nature of an automobile crash, and suggests that adaptation is one of the key methods in art and literature which can be used as a means of contemplating and developing various aesthetic and political ideas. Ballard’s short story “Crash!” was first published in the ICA’s (Institute of Contemporary Arts Eventsheet in February 1969, and later became a chapter of his experimental novel The Atrocity Exhibition (1970. At the same time, Ballard adapts the idea into the “Crashed Cars” exhibition (1970 in London. The short story was then adapted into a short film, Crash!, directed by Harley Cokeliss (1971 and starring Ballard himself, to be finally adapted into the novel Crash (1973. Ballard’s adaptation of his initial ideas across literary forms and media testifies to the importance of adaptation as a process and method of creating art. Thus, rather than suggesting that adaptations merely “breathe life” into the written word, the paper points to the conclusion that the form and content are mutually influential and that, in this case, the novel itself is an adaptation, rather than a hypotext (which it becomes in 1996 to David Cronenberg as he adapts it to film. The complexity of the relationship between the source text and its many adaptations has already contributed to the deconstruction, in Derrida’s terms, of the hierarchy (opposition between the original and the copy. Rather, Ballard’s crossmedial and transmedial adaptations of his own ideas show how, as Ray would suggest, an adaptation cites the source and grafts it into a new context, giving it a new function, both aesthetic and political.
Kumimoto Roderick W
Full Text Available Abstract Background Monocots, especially the temperate grasses, represent some of the most agriculturally important crops for both current food needs and future biofuel development. Because most of the agriculturally important grass species are difficult to study (e.g., they often have large, repetitive genomes and can be difficult to grow in laboratory settings, developing genetically tractable model systems is essential. Brachypodium distachyon (hereafter Brachypodium is an emerging model system for the temperate grasses. To fully realize the potential of this model system, publicly accessible discovery tools are essential. High quality cDNA libraries that can be readily adapted for multiple downstream purposes are a needed resource. Additionally, yeast two-hybrid (Y2H libraries are an important discovery tool for protein-protein interactions and are not currently available for Brachypodium. Results We describe the creation of two high quality, publicly available Gateway™ cDNA entry libraries and their derived Y2H libraries for Brachypodium. The first entry library represents cloned cDNA populations from both short day (SD, 8/16-h light/dark and long day (LD, 20/4-h light/dark grown plants, while the second library was generated from hormone treated tissues. Both libraries have extensive genome coverage (~5 × 107 primary clones each and average clone lengths of ~1.5 Kb. These entry libraries were then used to create two recombination-derived Y2H libraries. Initial proof-of-concept screens demonstrated that a protein with known interaction partners could readily re-isolate those partners, as well as novel interactors. Conclusions Accessible community resources are a hallmark of successful biological model systems. Brachypodium has the potential to be a broadly useful model system for the grasses, but still requires many of these resources. The Gateway™ compatible entry libraries created here will facilitate studies for multiple user
Kozak Christine A
Full Text Available Abstract Background The evolutionary interactions between retroviruses and their receptors result in adaptive selection of restriction variants that can allow natural populations to evade retrovirus infection. The mouse xenotropic/polytropic (X/PMV gammaretroviruses rely on the XPR1 cell surface receptor for entry into host cells, and polymorphic variants of this receptor have been identified in different rodent species. Results We screened a panel of X/PMVs for infectivity on rodent cells carrying 6 different XPR1 receptor variants. The X/PMVs included 5 well-characterized laboratory and wild mouse virus isolates as well as a novel cytopathic XMV-related virus, termed Cz524, isolated from an Eastern European wild mouse-derived strain, and XMRV, a xenotropic-like virus isolated from human prostate cancer. The 7 viruses define 6 distinct tropisms. Cz524 and another wild mouse isolate, CasE#1, have unique species tropisms. Among the PMVs, one Friend isolate is restricted by rat cells. Among the XMVs, two isolates, XMRV and AKR6, differ from other XMVs in their PMV-like restriction in hamster cells. We generated a set of Xpr1 mutants and chimeras, and identified critical amino acids in two extracellular loops (ECLs that mediate entry of these different viruses, including 3 residues in ECL3 that are involved in PMV entry (E500, T507, and V508 and can also influence infectivity by AKR6 and Cz524. Conclusion We used a set of natural variants and mutants of Xpr1 to define 6 distinct host range variants among naturally occurring X/PMVs (2 XMV variants, 2 PMVs, 2 different wild mouse variants. We identified critical amino acids in XPR1 that mediate entry of these viruses. These gammaretroviruses and their XPR1 receptor are thus highly functionally polymorphic, a consequence of the evolutionary pressures that favor both host resistance and virus escape mutants. This variation accounts for multiple naturally occurring virus resistance phenotypes and
Varsha D Badal
Full Text Available The rapidly growing amount of publicly available information from biomedical research is readily accessible on the Internet, providing a powerful resource for predictive biomolecular modeling. The accumulated data on experimentally determined structures transformed structure prediction of proteins and protein complexes. Instead of exploring the enormous search space, predictive tools can simply proceed to the solution based on similarity to the existing, previously determined structures. A similar major paradigm shift is emerging due to the rapidly expanding amount of information, other than experimentally determined structures, which still can be used as constraints in biomolecular structure prediction. Automated text mining has been widely used in recreating protein interaction networks, as well as in detecting small ligand binding sites on protein structures. Combining and expanding these two well-developed areas of research, we applied the text mining to structural modeling of protein-protein complexes (protein docking. Protein docking can be significantly improved when constraints on the docking mode are available. We developed a procedure that retrieves published abstracts on a specific protein-protein interaction and extracts information relevant to docking. The procedure was assessed on protein complexes from Dockground (http://dockground.compbio.ku.edu. The results show that correct information on binding residues can be extracted for about half of the complexes. The amount of irrelevant information was reduced by conceptual analysis of a subset of the retrieved abstracts, based on the bag-of-words (features approach. Support Vector Machine models were trained and validated on the subset. The remaining abstracts were filtered by the best-performing models, which decreased the irrelevant information for ~ 25% complexes in the dataset. The extracted constraints were incorporated in the docking protocol and tested on the Dockground unbound
Andersen, Torben Juul
This article provides an overview of theoretical contributions that have influenced the discourse around strategic adaptation including contingency perspectives, strategic fit reasoning, decision structure, information processing, corporate entrepreneurship, and strategy process. The related...... concepts of strategic renewal, dynamic managerial capabilities, dynamic capabilities, and strategic response capabilities are discussed and contextualized against strategic responsiveness. The insights derived from this article are used to outline the contours of a dynamic process of strategic adaptation....... This model incorporates elements of central strategizing, autonomous entrepreneurial behavior, interactive information processing, and open communication systems that enhance the organization's ability to observe exogenous changes and respond effectively to them....
Petersen, Kjell Yngve; Kongshaug, Jesper; Søndergaard, Karin
offered by adaptive lighting control are created by the ways that the system components, the network and data flow can be coordinated through software so that the dynamic variations are controlled in ways that meaningfully adapt according to people’s situations and design intentions. This book discusses...... to be static, and no longer acts as a kind of spatial constancy maintaining stability and order? Moreover, what new potentials open in lighting design? This book is one of four books that is published in connection with the research project entitled LED Lighting; Interdisciplinary LED Lighting Research...
Kjeldsen, Lars Peter; Eriksen, Mette Rose
Artikelen er en evaluering af de adaptive tests, som blev indført i folkeskolen. Artiklen sætter særligt fokus på evaluering i folkeskolen, herunder bidrager den med vejledning til evaluering, evalueringsværktøjer og fagspecifkt evalueringsmateriale.......Artikelen er en evaluering af de adaptive tests, som blev indført i folkeskolen. Artiklen sætter særligt fokus på evaluering i folkeskolen, herunder bidrager den med vejledning til evaluering, evalueringsværktøjer og fagspecifkt evalueringsmateriale....
Meyer, Klaus E.; Tran, Yen Thi Thu
to adapt their strategies, most notably their marketing and acquisition strategies, to the local context. In this paper, we outline why globalisation drives MNEs into emerging economies, and we provide conceptual frameworks that may aid investors to adapt their strategies to emerging economy contexts. MNEs...... requires the acquisition of complementary local resources controlled by local firms. However, acquisitions in emerging economies are inhibited by institutional obstacles and weak local firms. Thus, foreign investors may pursue staged, multiple, indirect, or Brownfield acquisitions to build their projected...... operation. We illustrate our proposed strategies by analysing how one multination enterprise - Carlsberg Breweries - has developed its operations in three very different emerging economies: Poland, Lithuania and Vietnam....
Jamaati, Maryam; Mehri, Ali
Long-range correlations between the elements of natural languages enable them to convey very complex information. Complex structure of human language, as a manifestation of natural languages, motivates us to apply nonextensive statistical mechanics in text mining. Tsallis entropy appropriately ranks the terms' relevance to document subject, taking advantage of their spatial correlation length. We apply this statistical concept as a new powerful word ranking metric in order to extract keywords of a single document. We carry out an experimental evaluation, which shows capability of the presented method in keyword extraction. We find that, Tsallis entropy has reliable word ranking performance, at the same level of the best previous ranking methods.
Phillips, P.E.; Wootton, A.J.; Rowan, W.L.; Ritz, C.P.; Rhodes, T.L.; Bengtson, R.D.; Hodge, W.L.; Durst, R.D.; McCool, S.C.; Richards, B.; Gentle, K.W.; Schoch, P.; Forster, J.C.; Hickok, R.L.; Evans, T.E.
Experiments using an electrically biased limiter have been performed on the Texas Experimental Tokamak (TEXT). A small movable limiter is inserted past the main poloidal ring limiter (which is electrically connected to the vacuum vessel) and biased at V Lim with respect to it. The floating potential, plasma potential and shear layer position can be controlled. With vertical strokeV Lim vertical stroke ≥ 50 V the plasma density increases. For V Lim Lim > 0 the results obtained are inconclusive. Variation of V Lim changes the electrostatic turbulence which may explain the observed total flux changes. (orig.)
Violeta M. Vesić
Full Text Available During most of the twentieth century history was seen as a phenomenon outside of literature that guaranteed the veracity of literary interpretation. History was unique and it functioned as a basis for reading literary works. During the seventies of the twentieth century there occurred a change of attitude towards history in American literary theory, and there appeared a new theoretical approach which soon became known as New Historicism. Since its inception, New Historicism has been identified with the study of Renaissance and Romanticism, but nowadays it has been increasingly involved in other literary trends. Although there are great differences in the arguments and practices at various representatives of this school, New Historicism has clearly recognizable features and many new historicists will agree with the statement of Walter Cohen that New Historicism, when it appeared in the eighties, represented something quite new in reference to the studies of theory, criticism and history (Cohen 1987, 33. Theoretical connection with Bakhtin, Foucault and Marx is clear, as well as a kind of uneasy tie with deconstruction and the work of Paul de Man. At the center of this approach is a renewed interest in the study of literary works in the light of historical and political circumstances in which they were created. Foucault encouraged readers to begin to move literary texts and to link them with discourses and representations that are not literary, as well as to examine the sociological aspects of the texts in order to take part in the social struggles of today. The study of literary works using New Historicism is the study of politics, history, culture and circumstances in which these works were created. With regard to one of the main fact which is located in the center of the criticism, that history cannot be viewed objectively and that reality can only be understood through a cultural context that reveals the work, re-reading and interpretation of
Hendrickx, Iris; Onrust, Louis; Kunneman, Florian; Hürriyetoglu, Ali; Stoop, Wessel; van den Bosch, A.
We investigate what distinguishes reported dreams from other personal narratives. The continuity hypothesis, stemming from psychological dream analysis work, states that most dreams refer to a person’s daily life and personal concerns, similar to other personal narratives such as diary entries.
Firms, whichhave to compete with global firms in domestic market, try to internationalizefor gaining competitive advantage. The aim of this study is to recommend a conceptual framework to explain thedynamics of internationalization process of leader and follower firms thatinternationalize from an emerging country. In this study, author tries tofigure out the determinants of entrymode decisions of follower firms. In addition, bandwagon effect of leaders'entry mode strategies on followers&...
Mengi V. Ondar
Full Text Available Contemporary information technologies and mathematical modelling has made creating corpora of natural languages significantly easier. A corpus is an information and reference system based on a collection of digitally processed texts. A corpus includes various written and oral texts in the given language, a set of dictionaries and markup – information on the properties of the text. It is the presence of the markup which distinguishes a corpus from an electronic library. At the moment, national corpora are being set up for many languages of the Russian Federation, including those of the Turkic peoples. Faculty members, postgraduate and undergraduate students at Tuvan State University and Siberian Federal University are working on the National corpus of Tuvan language. This article describes the structure of a dictionary entry in the National corpus of Tuvan language. The corpus database comprises the following tables: MAIN – the headword table, RUS, ENG, GER — translations of the headword into three languages, MORPHOLOGY — the table containing morphological data on the headword. The database is built in Microsoft Office Access. Working with the corpus dictionary includes the following functions: adding, editing and removing an entry, entry search (with transcription, setting and visualizing morphological features of a headword. The project allows us to view the corpus dictionary as a multi-structure entity with a complex hierarchical structure and a dictionary entry as its key component. The corpus dictionary we developed can be used for studying Tuvan language in its pronunciation, orthography and word analysis, as well as for searching for words and collocations in the texts included into the corpus.
vital sector is under threat. While it is far from the only development challenge facing local farmers, extreme variations in the climate of West Africa in the past several decades have dealt the region a bad hand. Drought and flood now follow each other in succession. Adaptation is... “The floods spoiled our harvests and we.
Møller Larsen, Marcus; Lyngsie, Jacob
and reciprocal adaptation of informal governance structure create ambiguity in situations of contingencies, which, subsequently, increases the likelihood of premature relationship termination. Using a large sample of exchange relationships in the global service provider industry, we find support for a hypothesis...
COLIN W TAYLOR
Full Text Available A capacitative Ca2+ entry (CCE pathway, activated by depletion of intracellular Ca2+ stores, is thought to mediate much of the Ca2+ entry evoked by receptors that stimulate phospholipase C (PLC. However, in A7r5 vascular smooth muscle cells, vasopressin, which stimulates PLC, empties intracellular Ca2+ stores but simultaneously inhibits their ability to activate CCE. The diacylglycerol produced with the IP3 that empties the stores is metabolized to arachidonic and this leads to activation of nitric oxide (NO synthase, production of NO and cyclic GMP, and consequent activation of protein kinase G. The latter inhibits CCE. In parallel, NO directly activates a non-capacitative Ca2+ entry (NCCE pathway, which is entirely responsible for the Ca2+ entry that occurs in the presence of vasopressin. This reciprocal regulation of two Ca2+ entry pathways ensures that there is sequential activation of first NCCE in the presence of vasopressin, and then a transient activation of CCE when vasopressin is removed. We suggest that the two routes for Ca2+ entry may selectively direct Ca2+ to processes that mediate activation and then recovery of the cell.
Transfer learning is a new machine learning and data mining framework that allows the training and test data to come from different distributions or feature spaces. We can find many novel applications of machine learning and data mining where transfer learning is necessary. While much has been done in transfer learning in text classification and reinforcement learning, there has been a lack of documented success stories of novel applications of transfer learning in other areas. In this invited article, I will argue that transfer learning is in fact quite ubiquitous in many real world applications. In this article, I will illustrate this point through an overview of a broad spectrum of applications of transfer learning that range from collaborative filtering to sensor based location estimation and logical action model learning for AI planning. I will also discuss some potential future directions of transfer learning.
Boggiano, Cesar; Jiang Shibo; Lu Hong; Zhao Qian; Liu Shuwen; Binley, James; Blondelle, Sylvie E.
Entry of human immunodeficiency virus type 1 (HIV-1) virion into host cells involves three major steps, each being a potential target for the development of entry inhibitors: gp120 binding to CD4, gp120-CD4 complex interacting with a coreceptor, and gp41 refolding to form a six-helix bundle. Using a D-amino acid decapeptide combinatorial library, we identified peptide DC13 as having potent HIV-1 fusion inhibitory activity, and effectively inhibiting infection by several laboratory-adapted and primary HIV-1 strains. While DC13 did not block binding of gp120 to CD4, nor disrupt the gp41 six-helix bundle formation, it effectively blocked the binding of an anti-CXCR4 monoclonal antibody and chemokine SDF-1α to CXCR4-expressing cells. However, because R5-using primary viruses were also neutralized, the antiviral activity of DC13 implies additional mode(s) of action. These results suggest that DC13 is a useful HIV-1 coreceptor antagonist for CXCR4 and, due to its biostability and simplicity, may be of value for developing a new class of HIV-1 entry inhibitors
Tews, J.K.; Greenwood, J.; Pratt, O.E.; Harper, A.E.
Passage of amino acids across the blood-brain barrier is assumed to be modified by amino acid composition of the blood. To gain a better understanding of the effects of protein intake on brain amino acid uptake, the authors examined associations among diet, plasma amino acid patterns, and the rate of entry of valine into the brain. Rats were fed diets containing 6, 18, or 50% casein before receiving one meal of a diet containing 0, 6, 18, or 50% casein. After 4-7 h, they were anesthetized and infused intravenously with [ 14 C]valine for 5 min before plasma and brain samples were taken for determination of radioactivity and content of individual amino acids. As protein content of the meal was increased from 0 to 50% casein, plasma and brain concentrations of valine and most other large neutral amino acid (LNAA) increased severalfold; also the ratio of [ 14 C]valine in brain to that in plasma decreased by >50%, and the rate of valine entry into the brain increased 3.5-fold. The increase in valine flux slowed as plasma levels of LNAA, competitors for valine transport, increased. The results were far more dependent on protein content of the final meal than on that of the adaptation diet; thus changes in protein intake, as reflected in altered plasma amino acid patterns, markedly altered valine entry into the brain
Justin H. Park
Full Text Available I evaluate the use of the byproduct concept in psychology, particularly the adaptation-byproduct distinction that is commonly invoked in discussions of psychological phenomena. This distinction can be problematic when investigating algorithmic mechanisms and their effects, because although all byproducts may be functionless concomitants of adaptations, not all incidental effects of algorithmic adaptations are byproducts (although they have sometimes been labeled as such. I call attention to Sperber's (1994 distinction between proper domains and actual domains of algorithmic mechanisms. Extending Sperber's distinction, I propose the terms adaptive effects and non-adaptive effects, which more accurately capture the phenomena of interest to psychologists and prevent fruitless adaptation-versus-byproduct debates.
Rifenburg, J. Michael; Allgood, Lindsey
Drawing on Lindsey Allgood's scripts, journal entries, and images of a specific participatory performance piece she executed, we argue for seeing performance art as a form of embodied text. Such an assertion is particularly pertinent for postsecondary writing center praxis as it allows for the mindful intersections of the body and writing during…
Goethe Inst., Munich (West Germany).
Teachers of German will find 120 items dating from 1960 entered in this alphabetized and annotated bibliography of texts and references. Language entries include material on: (1) grammar, (2) vocabulary, (3) pronunciation, (4) writing and style, (5) syntax, (6) morphology, (7) etymology, (8) dictation, (9) translation exercises, (10) verbs, (11)…
Full Text Available In automotive applications radial gas turbines are commonly fitted with a twin-entry volute connected to a divided exhaust manifold, ensuring a better scavenge process owing to less interference between engines’ cylinders. This paper is concerned with the study of the unsteady performances related to the pulsating flows of a twin-entry radial turbine in engine-like conditions and the hysteresis-like behaviour during the pulses period. The results show that the aerodynamic performances deviate noticeably from the steady state and depend mainly on the time shifting between the actual output power and the isentropic power, which is distantly related to the apparent length. The maximum of efficiency and output shaft power are accompanied by low entropy generation through the shroud entry side, and their instantaneous behaviours tend to follow mainly the inlet total pressure curve. As revealed a billow is created by the interaction between the main flow and the infiltrated flow, affecting the flow incidence at rotor entry and producing high losses.
Full Text Available For better discussing and understanding the physical phenomena and body-fluid interaction of water-entry problem, here mechanical-energy transport (wedge, fluid, and each other of water-entry model for free falling wedge is studied by numerical method based on free surface capturing method and Cartesian cut cell mesh. In this method, incompressible Euler equations for a variable density fluid are numerically calculated by the finite volume method. Then artificial compressibility method, dual-time stepping technique, and Roe's approximate Riemann solver are applied in the numerical scheme. Furthermore, the projection method of momentum equations and exact Riemann solution are used to calculate the fluid pressure on solid boundary. On this basis, during water-entry phase of the free-falling wedge, macroscopic energy conversion of overall body-fluid system and microscopic energy transformation in fluid field are analyzed and discussed. Finally, based on test cases, many useful conclusions about mechanical energy transport for water entry problem are made and presented.
Full Text Available The study examined the market entry strategies of multinational services companies into Ghana’s service sector and the linkages to firm level performance after entry. Literature was reviewed on market entry strategies, internationalisation, globalisation of service firms and resource-based theory. The study adopted a combination of both quantitative and qualitative research approaches in this study. The qualitative approach was for deeper enquiry and quantitative for empirical testing. The study found that firm specific factors affect the market entry strategy while the entry strategy also affects performance after it enters the market. Home country factors and the features of services are also seen to moderate on the effects mentioned. Respondents also indicated that the features of services were an industry wide issue not so much consideration is given to it.
... 18 Conservation of Power and Water Resources 1 2010-04-01 2010-04-01 false Proposed accounting... § 33.5 Proposed accounting entries. If the applicant is required to maintain its books of account in... present proposed accounting entries showing the effect of the transaction with sufficient detail to...
... 36 Parks, Forests, and Public Property 2 2010-07-01 2010-07-01 false Single entry sales or permits... MINERALS Disposal of Mineral Materials General Provisions § 228.54 Single entry sales or permits. The... plan which describes operating procedures and reclamation measures, unless the requirement is waived by...
... CERTAIN ANIMALS, BIRDS, FISH, AND POULTRY, AND CERTAIN ANIMAL, BIRD, AND POULTRY PRODUCTS; REQUIREMENTS FOR MEANS OF CONVEYANCE AND SHIPPING CONTAINERS Poultry Mexico 8 § 93.220 Inspection at port of entry. (a) All poultry offered for entry from Mexico, including such poultry intended for movement through...
... CERTAIN ANIMALS, BIRDS, FISH, AND POULTRY, AND CERTAIN ANIMAL, BIRD, AND POULTRY PRODUCTS; REQUIREMENTS FOR MEANS OF CONVEYANCE AND SHIPPING CONTAINERS Ruminants Mexico 10 § 93.426 Inspection at port of entry. (a) All ruminants offered for entry from Mexico, including such ruminants intended for movement...
Degryse, H.A.; Havrylchyk, O.; Jurzyk, E.; Kozak, S.
We employ a unique data set containing bank-specific information to explore how foreign bank entry determines credit allocation in emerging markets. We investigate the impact of the mode of foreign entry (greenfield or takeover) on banks’ portfolio allocation to borrowers with different degrees of
... 19 Customs Duties 1 2010-04-01 2010-04-01 false Procedures for permitted entry. 12.99 Section 12.99 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF THE TREASURY SPECIAL CLASSES OF MERCHANDISE Switchblade Knives § 12.99 Procedures for permitted entry...
Ferreira, F. A.; Ferreira, Fl.
We study the effects of entry of a foreign firm on domestic welfare in the presence of licensing, when the entrant is technologically inferior to the incumbent. We show that foreign entry increases domestic welfare for intermediate (respectively, sufficiently large) technological differences between the firms under licensing with fixed fee (respectively, output royalty).
... 27 Alcohol, Tobacco Products and Firearms 3 2010-04-01 2010-04-01 false Right of entry and... Administrative and Miscellaneous Provisions § 478.23 Right of entry and examination. (a) Except as provided in... of a criminal investigation of a person or persons other than the licensee, (2) For insuring...
... 19 Customs Duties 2 2010-04-01 2010-04-01 false Entry for consumption. 146.63 Section 146.63... TREASURY (CONTINUED) FOREIGN TRADE ZONES Transfer of Merchandise From a Zone § 146.63 Entry for consumption... status may be entered for consumption from a zone. (b) Zone-restricted merchandise. Merchandise in a zone...
Kraaij, W.; Westerveld, T.H.W.; Hiemstra, Djoerd
An important class of searches on the world-wide-web has the goal to find an entry page (homepage) of an organisation. Entry page search is quite different from Ad Hoc search. Indeed a plain Ad Hoc system performs disappointingly. We explored three non-content features of web pages: page length,
... MARITIME ADMINISTRATION, DEPARTMENT OF TRANSPORTATION A-NATIONAL SHIPPING AUTHORITY GENERAL AGENT'S RESPONSIBILITY IN CONNECTION WITH FOREIGN REPAIR CUSTOM'S ENTRIES Sec. 2 Submission of repair entries. At the... with the District Director of Customs as defined in 19 CFR 1.1(d) an affidavit on Custom's Form 3417...
Full Text Available Adaptation to climate change has gained a prominent place next to mitigation on global, national and local policy agendas. However, while an abundance of adaptation strategies, plans and programmes have been developed, progress in turning these into action has been slow. The development of a sound knowledge basis to support adaptation globally is suggested to accelerate progress, but has lagged behind. The emphasis in both current and newly proposed programmes is very much on practice-oriented research with strong stakeholder participation. This paper supports such practice-oriented research, but argues that this is insufficient to support adaptation policy and practice in a productive manner. We argue that there is not only a need for science for adaptation, but also a science of adaptation. The paper argues that participatory, practice-oriented research is indeed essential, but has to be complemented by and connected to more fundamental inquiry and concept development, which takes into account knowledge that has been developed in disciplinary sciences and on issues other than climate change adaptation. At the same time, the level and method of participation in science for adaptation should be determined on the basis of the specific project context and goals. More emphasis on science of adaptation can lead to improved understanding of the conditions for successful science for adaptation.
Full Text Available Climate adaptation is a dynamic social and institutional process where the governance dimension is receiving growing attention. Adaptive governance is an approach that promises to reduce uncertainty by improving the knowledge base for decision making. As uncertainty is an inherent feature of climate adaptation, adaptive governance seems to be a promising approach for improving climate adaptation governance. However, the adaptive governance literature has so far paid little attention to decision-making tools and methods, and the literature on the governance of adaptation is in its infancy in this regard. We argue that climate adaptation governance would benefit from systematic and yet flexible decision-making tools and methods such as participatory multicriteria methods for the evaluation of adaptation options, and that these methods can be linked to key adaptive governance principles. Moving from these premises, we propose a framework that integrates key adaptive governance features into participatory multicriteria methods for the governance of climate adaptation.
Full Text Available This paper discusses the enhancements made on the current mobile phone messaging software, namely the predictive text entry. In addition, the application also has a facility to abbreviate any unabbreviated words that exist in the dictionary, so that the message length can be reduced. The application was tested in a computer-simulated mobile environment and the results of the tests are presented here. These additional features will potentially enable users to send messages at a reduced length and thus reduce the cost of sending messages. Moreover, users who are not adept in using the abbreviations can now do so with features made available on their mobile phones. It is believed that these additional features will also encourage more users to use the predictive software as well as further improve users’ messaging satisfaction.
Zečević Snežana M.
Full Text Available The aim of this paper is the analysis of translational eqivalents as well as of the composition of the entries in bilingual English-Serbian dictionaries. It is initially assumed that there are different microstructure and macrostructure of the dictionaries of different volume and purpose, likewise the correspondence of translational equivalents of their entries. The analysis conducted for the requirements of this paper included six randomly chosen lexemes of the English language taken from three bilingual dictionaries that were contrasted with their equivalent lexemes presented in the monolingual English dictionary which was later used for checking. The results of the analysis presented less meaning of the lexemes in Colloquial and Universal English-Serbian Dictionary while the utmost variety of semantic dimensions was noted in Encyclopedic English-Serbian Dictionary which by its quality and organization presents an inexhaustible source of information necessary for translating texts from English to Serbian language.
Exercises for Section 2 42 Physical sciences and engineering 42 43 Biological sciences 45 Social sciences Solutions to Exercises, Section 1 47 Physical sciences and engineering 47 49 Biological sciences 49 Social sciences Solutions to Exercises, Section 2 51 51 PhYSical sciences and engineering 55 Biological sciences 58 Social sciences 62 Tables 2 62 x - tests involving variances 2 63,64 x - one tailed tests 2 65 x - two tailed tests F-distribution 66-69 Preface This project started some years ago when the Nuffield Foundation kindly gave a grant for writing a pro grammed text to use with service courses in statistics. The work carried out by Mrs. Joan Hine and Professor G. B. Wetherill at Bath University, together with some other help from time to time by colleagues at Bath University and elsewhere. Testing was done at various colleges and universities, and some helpful comments were received, but we particularly mention King Edwards School, Bath, who provided some sixth formers as 'guinea pigs' for the fir...
Full Text Available The concept of ecosystem-based adaptation is advocated at international, national, and regional levels. The concept is thought to foster sustainability transitions and is receiving increasing interest from academic and governmental bodies alike. However, there is little theory regarding the pathways for its systematic implementation. It furthermore remains unclear to what degree the concept is already applied in urban planning practice, how it is integrated into existing planning structures and processes, and what drivers exist for further integration. Against this background, this study examines potential ways to sustainably mainstream ecosystem-based adaptation into urban planning. Eight municipalities in Southern Germany were investigated to analyze the processes of mainstreaming ecosystem-based adaptation into current planning practice. Although the mainstreaming entry points for ecosystem-based adaptation were identified to be appreciably different, the results of the study show how mainstreaming has generally led to patterns of change in: (1 on-the-ground measures, (2 organizational structures and assets, (3 formal and informal policies and instruments, (4 external cooperation and networking, and (5 the general working language. In all these areas, ecosystem-based adaptation to heat and flood risk is highly compartmentalized. Furthermore, although scholars have drawn attention to the risk of "mainstreaming overload," the results suggest that at the local level, the integration of ecosystem-based adaptation is strongly driven by departments' experience in mainstreaming other cross-cutting issues, namely environmental planning, climate change mitigation, and disaster risk management. Based on the findings, ways to leverage sustainability transitions via mainstreaming are discussed. It is concluded that systematic mainstreaming is a promising avenue for initiating and promoting local transitions and transformative adaptation. The study
Adams, M.E.; Trau, M.; Gilbert, R.C.; Napper, D.R.
Mechanistic understanding of the processes governing the kinetics of emulsion polymerization has both scientific and technical interest. One component of this process that is poorly understood at present is that of free radical entry into latex particles. Measurements were made of the entry rate coefficient as a function of temperature for free radicals entering polystyrene latex particles in seeded emulsion polymerizations initiated by γ-rays. The activation energy for entry was found to be less than 24 ± 3 kJ mol -1 , consistent with entry being controlled by a physical (e.g. diffusional) rather than a chemical process. Measurement of the entry rate coefficient as a function of the γ-ray dose rate suggested that the factors that determine the entry rate when the primary free radicals are uncharged are similar to those that determine the entry rate for charged free radicals derived from chemical initiation by peroxydisulfate. This result was consistent with measurements of the entry rate coefficient of charged free radicals derived from peroxydisulfate; these data were found to be virtually independent of both the extent of the latex surface coverage by the anionic surfactant sodium dodecyl sulfate and the ionic strength of the continuous phase. The data refute several proposals given in the literature for the rate-determining step for entry, being inconsistent with control by collision of free radicals with the latex particles, surfactant desorption, and an electrostatic barrier arising from the colloidal nature of the entering free radical. The origin of the activation energy for entry remains obscure
Thomas R. Rimmele
Full Text Available Adaptive optics (AO has become an indispensable tool at ground-based solar telescopes. AO enables the ground-based observer to overcome the adverse effects of atmospheric seeing and obtain diffraction limited observations. Over the last decade adaptive optics systems have been deployed at major ground-based solar telescopes and revitalized ground-based solar astronomy. The relatively small aperture of solar telescopes and the bright source make solar AO possible for visible wavelengths where the majority of solar observations are still performed. Solar AO systems enable diffraction limited observations of the Sun for a significant fraction of the available observing time at ground-based solar telescopes, which often have a larger aperture than equivalent space based observatories, such as HINODE. New ground breaking scientific results have been achieved with solar adaptive optics and this trend continues. New large aperture telescopes are currently being deployed or are under construction. With the aid of solar AO these telescopes will obtain observations of the highly structured and dynamic solar atmosphere with unprecedented resolution. This paper reviews solar adaptive optics techniques and summarizes the recent progress in the field of solar adaptive optics. An outlook to future solar AO developments, including a discussion of Multi-Conjugate AO (MCAO and Ground-Layer AO (GLAO will be given.
tenKate, LP; Verheij, JBGM; Wildhagen, MF; Hilderink, HBM; Kooij, L; Verzijl, JG; Habbema, JDF
Both single-entry two-step (SETS) couple screening and double-entry two-step (DETS) couple screening have been recommended as methods to screen for cystic fibrosis gene carriers. In this paper we compare the expected results from both types of screening. In general, DETS results in a higher
Efforts to help the world's poor will face crises in coming decades as climate change radically alters conditions. Action Research for Community Adapation in Bangladesh (ARCAB) is an action-research programme on responding to climate change impacts through community-based adaptation. Set in Bangladesh at 20 sites that are vulnerable to floods, droughts, cyclones and sea level rise, ARCAB will follow impacts and adaptation as they evolve over half a century or more. National and international 'research partners', collaborating with ten NGO 'action partners' with global reach, seek knowledge and solutions applicable worldwide. After a year setting up ARCAB, we share lessons on the programme's design and move into our first research cycle.
Vihinen-Ranta, Maija; Kalela, Anne; Mäkinen, Päivi; Kakkola, Laura; Marjomäki, Varpu; Vuento, Matti
The present study was designed to investigate the endocytic pathway involved in canine parvovirus (CPV) infection. Reduced temperature (18°C) or the microtubule-depolymerizing drug nocodazole was found to inhibit productive infection of canine A72 cells by CPV and caused CPV to be retained in cytoplasmic vesicles as indicated by immunofluorescence microscopy. Consistent with previously published results, these data indicate that CPV enters a host cell via an endocytic route and further suggest that microtubule-dependent delivery of CPV to late endosomes is required for productive infection. Cytoplasmic microinjection of CPV particles was used to circumvent the endocytosis and membrane fusion steps in the entry process. Microinjection experiments showed that CPV particles which were injected directly into the cytoplasm, thus avoiding the endocytic pathway, were unable to initiate progeny virus production. CPV treated at pH 5.0 prior to microinjection was unable to initiate virus production, showing that factors of the endocytic route other than low pH are necessary for the initiation of infection by CPV. PMID:9420290
Labrador Pavon, I.
This paper describes the circuits and programs in assembly language, developed to control the two DC motors that give mobility to a mechanical arm with two degrees of freedom. As a whole, the system is based in a adaptable regulator designed around a 8 bit microprocessor that, starting from a mode of regulation based in the successive approximation method, evolve to another mode through which, only one approximation is sufficient to get the right position of each motor. (Author) 22 fig. 6 ref
Labrador Pavon, I.
This paper describes the circuits and programs in assembly language, developed to control the two DC motors that give mobility to a mechanical arm with two degrees of freedom. As a whole, the system is based in a adaptable regulator designed around a 8 bit microprocessor that, starting from a mode of regulation based in the successive approximation method, evolve to another mode through which, only one approximation is sufficient to get the right position of each motor. (Author) 6 refs
This paper focuses on the use of an adaptive ethnography when studying such phenomena as young people's use of mobile media in a learning perspective. Mobile media such as PDAs and mobile phones have a number of affordances which make them potential tools for learning. However, before we begin to...... formal and informal learning contexts. The paper also proposes several adaptive methodological techniques for studying young people's interaction with mobiles.......This paper focuses on the use of an adaptive ethnography when studying such phenomena as young people's use of mobile media in a learning perspective. Mobile media such as PDAs and mobile phones have a number of affordances which make them potential tools for learning. However, before we begin...... to design and develop educational materials for mobile media platforms we must first understand everyday use and behaviour with a medium such as a mobile phone. The paper outlines the research design for a PhD project on mobile learning which focuses on mobile phones as a way to bridge the gap between...
A raw stream of posts from a microblogging platform such as Twitter contains text written in a large variety of languages and writing systems, in registers ranging from formal to internet slang. A significant amount has been expended in recent years to adapt standard NLP processing pipelines to be
Flanagan, Helen E.; Smith, Isabel M.; Vaillancourt, Tracy; Duku, Eric; Szatmari, Peter; Bryson, Susan; Fombonne, Eric; Mirenda, Pat; Roberts, Wendy; Volden, Joanne; Waddell, Charlotte; Zwaigenbaum, Lonnie; Bennett, Teresa; Elsabbagh, Mayada; Georgiades, Stelios
We examined the stability of cognitive and adaptive behaviour standard scores in children with autism spectrum disorder (ASD) between diagnosis and school entry approximately age 6. IQ increased 18 points in 2-year-olds, 12 points in 3-year-olds, and 9 points in 4-year-olds (N = 281). Adaptive behaviour scores increased 4 points across age groups…
Bruce D Keefe
Full Text Available Adaptation to facial characteristics, such as gender and viewpoint, has been shown to both bias our perception of faces and improve facial discrimination. In this study, we examined whether adapting to two levels of face trustworthiness improved sensitivity around the adapted level. Facial trustworthiness was manipulated by morphing between trustworthy and untrustworthy prototypes, each generated by morphing eight trustworthy and eight untrustworthy faces respectively. In the first experiment, just-noticeable differences (JNDs were calculated for an untrustworthy face after participants adapted to an untrustworthy face, a trustworthy face, or did not adapt. In the second experiment, the three conditions were identical, except that JNDs were calculated for a trustworthy face. In the third experiment we examined whether adapting to an untrustworthy male face improved discrimination to an untrustworthy female face. In all experiments, participants completed a two-interval forced-choice adaptive staircase procedure, in which they judged which face was more untrustworthy. JNDs were derived from a psychometric function fitted to the data. Adaptation improved sensitivity to faces conveying the same level of trustworthiness when compared to no adaptation. When adapting to and discriminating around a different level of face trustworthiness there was no improvement in sensitivity and JNDs were equivalent to those in the no adaptation condition. The improvement in sensitivity was found to occur even when adapting to a face with different gender and identity. These results suggest that adaptation to facial trustworthiness can selectively enhance mechanisms underlying the coding of facial trustworthiness to improve perceptual sensitivity. These findings have implications for the role of our visual experience in the decisions we make about the trustworthiness of other individuals.
Jean Kaoru Millet
Full Text Available BACKGROUND: Entry of Severe Acute Respiratory Syndrome coronavirus (SARS-CoV and its envelope fusion with host cell membrane are controlled by a series of complex molecular mechanisms, largely dependent on the viral envelope glycoprotein Spike (S. There are still many unknowns on the implication of cellular factors that regulate the entry process. METHODOLOGY/PRINCIPAL FINDINGS: We performed a yeast two-hybrid screen using as bait the carboxy-terminal endodomain of S, which faces the cytosol during and after opening of the fusion pore at early stages of the virus life cycle. Here we show that the ezrin membrane-actin linker interacts with S endodomain through the F1 lobe of its FERM domain and that both the eight carboxy-terminal amino-acids and a membrane-proximal cysteine cluster of S endodomain are important for this interaction in vitro. Interestingly, we found that ezrin is present at the site of entry of S-pseudotyped lentiviral particles in Vero E6 cells. Targeting ezrin function by small interfering RNA increased S-mediated entry of pseudotyped particles in epithelial cells. Furthermore, deletion of the eight carboxy-terminal amino acids of S enhanced S-pseudotyped particles infection. Expression of the ezrin dominant negative FERM domain enhanced cell susceptibility to infection by SARS-CoV and S-pseudotyped particles and potentiated S-dependent membrane fusion. CONCLUSIONS/SIGNIFICANCE: Ezrin interacts with SARS-CoV S endodomain and limits virus entry and fusion. Our data present a novel mechanism involving a cellular factor in the regulation of S-dependent early events of infection.
Elizabeth A Nelson
Full Text Available Phosphatidylinositol-3-phosphate 5-kinase (PIKfyve is a lipid kinase involved in endosome maturation that emerged from a haploid genetic screen as being required for Ebola virus (EBOV infection. Here we analyzed the effects of apilimod, a PIKfyve inhibitor that was reported to be well tolerated in humans in phase 2 clinical trials, for its effects on entry and infection of EBOV and Marburg virus (MARV. We first found that apilimod blocks infections by EBOV and MARV in Huh 7, Vero E6 and primary human macrophage cells, with notable potency in the macrophages (IC50, 10 nM. We next observed that similar doses of apilimod block EBOV-glycoprotein-virus like particle (VLP entry and transcription-replication competent VLP infection, suggesting that the primary mode of action of apilimod is as an entry inhibitor, preventing release of the viral genome into the cytoplasm to initiate replication. After providing evidence that the anti-EBOV action of apilimod is via PIKfyve, we showed that it blocks trafficking of EBOV VLPs to endolysosomes containing Niemann-Pick C1 (NPC1, the intracellular receptor for EBOV. Concurrently apilimod caused VLPs to accumulate in early endosome antigen 1-positive endosomes. We did not detect any effects of apilimod on bulk endosome acidification, on the activity of cathepsins B and L, or on cholesterol export from endolysosomes. Hence by antagonizing PIKfyve, apilimod appears to block EBOV trafficking to its site of fusion and entry into the cytoplasm. Given the drug's observed anti-filoviral activity, relatively unexplored mechanism of entry inhibition, and reported tolerability in humans, we propose that apilimod be further explored as part of a therapeutic regimen to treat filoviral infections.
Viswanathan, Gopinath; Jafurulla, Md; Kumar, G Aditya; Raghunand, Tirumalai R; Chattopadhyay, Amitabha
Mycobacteria are intracellular pathogens that can invade and survive within host macrophages. Mycobacterial infections remain a major cause of mortality and morbidity worldwide, with serious concerns of emergence of multi and extensively drug-resistant tuberculosis. While significant advances have been made in identifying mycobacterial virulence determinants, the detailed molecular mechanism of internalization of mycobacteria into host cells remains poorly understood. Although several studies have highlighted the crucial role of sphingolipids in mycobacterial growth, persistence and establishment of infection, the role of sphingolipids in the entry of mycobacteria into host cells is not known. In this work, we explored the role of host membrane sphingolipids in the entry of Mycobacterium smegmatis into J774A.1 macrophages. Our results show that metabolic depletion of sphingolipids in host macrophages results in a significant reduction in the entry of M. smegmatis. Importantly, the entry of Escherichia coli into host macrophages under similar conditions remained invariant, implying the specificity of the requirement of sphingolipids in mycobacterial entry. To the best of our knowledge, our results constitute the first report demonstrating the role of host macrophage sphingolipids in the entry of mycobacteria. Our results could help in the development of novel therapeutic strategies targeting sphingolipid-mediated entry of mycobacteria into host cells. Copyright © 2018 Elsevier B.V. All rights reserved.
Tooley, Jeffrey; Desai, Prasun N.; Lynos, Daniel T.; Hirst, Edward A.; Wahl, Tom E.; Wawrzyniak, Georffery G.
Stardust is a comet sample return mission that successfully returned to Earth on January 15, 2006. Stardust's targeted landing area was the Utah Test and Training Range in the Northwest corner of Utah. Requirements for the risks associated with landing were levied on Stardust by the Utah Test and Training Range and NASA. This paper describes the analysis to verify that these requirements were met and and includes calculation of debris survivability, generation of landing site selection plots, and identification of keep-out zones, as well as appropriate selection of the landing site. Operationally the risk requirements were all met for both of the GOMO-GO polls, so entry was authorized.
Pichkhadze, K.; Vorontsov, V.; Polyakov, A.; Ivankov, A.; Taalas, P.; Pellinen, R.; Harri, A.-M.; Linkin, V.
Martian meteorological lander (MML) is intended for landing on the Martian surface in order to monitor the atmosphere at landing point for one Martian year. MMLs shall become the basic elements of a global network of meteorological mini-landers, observing the dynamics of changes of the atmospheric parameters on the Red Planet. The MML main scientific tasks are as follows: (1) Study of vertical structure of the Martian atmosphere throughout the MML descent; (2) On-surface meteorological observations for one Martian year. One of the essential factors influencing the lander's design is its entry, descent, and landing (EDL) sequence. During Phase A of the MML development, five different options for the lander's design were carefully analyzed. All of these options ensure the accomplishment of the above-mentioned scientific tasks with high effectiveness. CONCEPT A (conventional approach): Two lander options (with a parachute system + airbag and an inflatable airbrake + airbag) were analyzed. They are similar in terms of fulfilling braking phases and completely analogous in landing by means of airbags. CONCEPT B (innovative approach): Three lander options were analyzed. The distinguishing feature is the presence of inflatable braking units (IBU) in their configurations. SELECTED OPTION (innovative approach): Incorporating a unique design approach and modern technologies, the selected option of the lander represents a combination of the options analyzed in the framework of Concept B study. Currently, the selected lander option undergoes systems testing (Phase D1). Several MMLs can be delivered to Mars in frameworks of various missions as primary or piggybacking payload: (1) USA-led "Mars Scout" (2007); (2) France-led "NetLander" (2007/2009); (3) Russia-led "Mars-Deimos-Phobos sample return" (2007); (4) Independent mission (currently under preliminary study); etc.
Bonnie J. F. MEYER
Full Text Available In this review of the literature we examine empirical studies designed to teach the structure strategy to increase reading comprehension of expository texts. First, we review the research that has served as a foundation for many of the studies examining the effects of text structure instruction. Text structures generally can be grouped into six categories: comparison, problem-and solution, causation, sequence, collection, and description. Next, we provide a historical look at research of structure strategyinterventions. Strategy interventions employ modeling, practice, and feedback to teach students how to use text structure strategically and eventually automatically. Finally, we review recent text structure interventions for elementary school students. We present similarities and differences among these studies and applications for instruction. Our review of intervention research suggests that direct instruction, modeling, scaffolding, elaborated feedback, and adaptation of instruction to student performance are keys in teaching students to strategically use knowledge about text structure.
We discussed a second entry port for the Accelerator Test Facility (ATF) injection system at Brookhaven National Laboratory, which consists of a photocathode rf gun and a straight - ahead beamline directly into the 50 MeV linac. The proposed second entry port should improve the beam quality and lower the emittance needed for FEL (Free Electron Laser), and laser - acceleration experiments. A discussion on the laser driven high brightness photoelectrons through the primary entry port (a low energy 180 degrees achromatic double bend transport line) now in operation, and a beam analysis for the proposed secondary port is also given
Entry, Descent and Landing (EDL) Modeling and Simulation (MS) is an enabling capability for complex NASA entry missions such as MSL and Orion. MS is used in every mission phase to define mission concepts, select appropriate architectures, design EDL systems, quantify margin and risk, ensure correct system operation, and analyze data returned from the entry. In an environment where it is impossible to fully test EDL concepts on the ground prior to use, accurate MS capability is required to extrapolate ground test results to expected flight performance.
A new research effort at NASA Ames Research Center has been initiated in Planetary Defense, which integrates the disciplines of planetary science, atmospheric entry physics, and physics-based risk assessment. This paper describes work within the new program and is focused on meteor entry and breakup.Over the last six decades significant effort was expended in the US and in Europe to understand meteor entry including ablation, fragmentation and airburst (if any) for various types of meteors ranging from stony to iron spectral types. These efforts have produced primarily empirical mathematical models based on observations. Weaknesses of these models, apart from their empiricism, are reliance on idealized shapes (spheres, cylinders, etc.) and simplified models for thermal response of meteoritic materials to aerodynamic and radiative heating. Furthermore, the fragmentation and energy release of meteors (airburst) is poorly understood.On the other hand, flight of human-made atmospheric entry capsules is well understood. The capsules and their requisite heatshields are designed and margined to survive entry. However, the highest speed Earth entry for capsules is 13 kms (Stardust). Furthermore, Earth entry capsules have never exceeded diameters of 5 m, nor have their peak aerothermal environments exceeded 0.3 atm and 1 kW/sq cm. The aims of the current work are: (i) to define the aerothermal environments for objects with entry velocities from 13 to 20 kms; (ii) to explore various hypotheses of fragmentation and airburst of stony meteors in the near term; (iii) to explore the possibility of performing relevant ground-based tests to verify candidate hypotheses; and (iv) to quantify the energy released in airbursts. The results of the new simulations will be used to anchor said risk assessment analyses. With these aims in mind, state-of-the-art entry capsule design tools are being extended for meteor entries. We describe: (i) applications of current simulation tools to
Full Text Available In spite of the noticeable practices within the field of Adaptation, Adaptation theory seems to be lagging behind whilst perpetuating various fallacies. Geoffrey Wagner’s types of Adaptation and Kamilla Elliott’s proposed concepts for examining adaptations have proved useful but due to their general applicability they seem to perpetuate the fallacies existing within the field of Adaptation. This article will propose a context-specific concept pertaining to Media Franchise Culture for the purpose of examining Adaptations and re-assessing long-held debates concerning the Original, the Content/Form debate and Fidelity issues that cater to the twelve fallacies discussed by Thomas Leitch.
Full Text Available The purpose of this paper is to approach film adaptation as a modality of translation and to provide a systematic analysis of the changes occurring in the adaptation of a novel for the big screen. These changes, i.e. adaptation shifts, are examined by means of a model that consists of a descriptive/comparative component and an interpretive component. The model is derived from combining insights from adaptation and translation studies and thus builds on the interdisciplinary nature of adaptation studies so as to offer a comprehensive methodological tool for the analysis of adaptations. As processes and products, adaptation and translation involve an act of communication between a source and a target text within a new sociocultural context. In this light, adaptation can be examined as a case of intersemiotic translation in that it involves the transfer of meaning between two different media; in the case of film adaptation, more specifically, meaning is transferred from book to film and the dynamics between the source novel and adaptation is juxtaposed with that between a source text and its translation. The adaptation model is applied to the film adaptation Silver Linings Playbook with an aim to understand the aspects in which the adaptation differs from the source novel and the rationale behind the adaptation shifts. Finally, it is argued that such an analysis from a descriptive as well as an interpretive perspective can lead to a more holistic understanding of adaptation as a cultural phenomenon in the contemporary creative industries.
Dimitar B. Nikolov
Full Text Available The Paramyxoviridae genus Henipavirus is presently represented by the type species Hendra and Nipah viruses which are both recently emerged zoonotic viral pathogens responsible for repeated outbreaks associated with high morbidity and mortality in Australia, Southeast Asia, India and Bangladesh. These enveloped viruses bind and enter host target cells through the coordinated activities of their attachment (G and class I fusion (F envelope glycoproteins. The henipavirus G glycoprotein interacts with host cellular B class ephrins, triggering conformational alterations in G that lead to the activation of the F glycoprotein, which facilitates the membrane fusion process. Using the recently published structures of HeV-G and NiV-G and other paramyxovirus glycoproteins, we review the features of the henipavirus envelope glycoproteins that appear essential for mediating the viral fusion process, including receptor binding, G-F interaction, F activation, with an emphasis on G and the mutations that disrupt viral infectivity. Finally, recent candidate therapeutics for henipavirus-mediated disease are summarized in light of their ability to inhibit HeV and NiV entry by targeting their G and F glycoproteins.
Full Text Available Der Originalbeitrag in deutscher Sprache ist verfügbar unter: Bd. 40 (2015: Ausgewählte deutsche BeiträgeThe article examines entry into the postparental phase of the family life cycle, which is the familial situation when all children have moved out of the parental household. We position this event chronologically within the life course and examine the probability of occurrence. Using panel data (3 survey waves covering a period of 40 years of a cohort of former North-Rhine Westphalian grammar school pupils, event history models (Cox regression are employed to analyse what factors accelerate or decelerate the transition. This revealed that the parent’s individual biography (in particular the age at the own move out, age at the birth of the first child and the number of children has a major impact on the time of occurrence, while the occupational history has no effect. In addition, sons delay the transition, while children’s academic studies and occupation accelerate it.
Full Text Available Human cytomegalovirus (HCMV infection can lead to congenital hearing loss and mental retardation. Upon immune suppression, reactivation of latent HCMV or primary infection increases morbidity in cancer, transplantation, and late stage AIDS patients. Current treatments include nucleoside analogues, which have significant toxicities limiting their usefulness. In this study we screened a panel of synthetic heparin-binding peptides for their ability to prevent CMV infection in vitro. A peptide designated, p5+14 exhibited ~ 90% reduction in murine CMV (MCMV infection. Because negatively charged, cell-surface heparan sulfate proteoglycans (HSPGs, serve as the attachment receptor during the adsorption phase of the CMV infection cycle, we hypothesized that p5+14 effectively competes for CMV adsorption to the cell surface resulting in the reduction in infection. Positively charged Lys residues were required for peptide binding to cell-surface HSPGs and reducing viral infection. We show that this inhibition was not due to a direct neutralizing effect on the virus itself and that the peptide blocked adsorption of the virus. The peptide also inhibited infection of other herpesviruses: HCMV and herpes simplex virus 1 and 2 in vitro, demonstrating it has broad-spectrum antiviral activity. Therefore, this peptide may offer an adjunct therapy for the treatment of herpes viral infections and other viruses that use HSPGs for entry.
Full Text Available Target Corporation, the second largest retailing company in the United States, is well known for their value to guests (customers, continuous innovation, and exceptional guest experience. With a desire of international expansion, Target announced their Foreign Direct Investment (FDI plans for Target Canada in January 2011. In August 2012, headquarters opened in Mississauga with 124 store openings following throughout 2013. Two years later an unsuccessful attempt at entering the Canadian retail market resulted in a loss of over $5.4B. Target Canada rushed into its expansion into the Canadian foreign market and corporation was unable to repeat the successful US concept in Canada for several factors. Target’s scale was too large, the timeline was too aggressive, and the entrance method was attractive from a price perspective. As a consequence, Target was unable to efficiently manage the whole supply-chain, resulting in an unpleasant shopping experience for the customers. Finally, the incapability to differentiate itself from other retailers led to an unsuccessful attempt at gaining greater market share from the competition. Despite the fact that Target does not have a plan to enter back into Canada, this case offers suggestions for Target’s location strategy and plausible alternatives when revisiting potential re-entry into the international retail market. Recommendations are given based on what they learned from their first attempt at failed expansion.
Full Text Available experienced miner, in order to determine whether loose rocks are present in the roof of the excavation, during the entry inspection. Tests of the ESD show a high degree of correlation with skilled human operators, allowing the device to be used where skilled...
Gatenby, Robert A; Silva, Ariosto S; Gillies, Robert J; Frieden, B Roy
A number of successful systemic therapies are available for treatment of disseminated cancers. However, tumor response is often transient, and therapy frequently fails due to emergence of resistant populations. The latter reflects the temporal and spatial heterogeneity of the tumor microenvironment as well as the evolutionary capacity of cancer phenotypes to adapt to therapeutic perturbations. Although cancers are highly dynamic systems, cancer therapy is typically administered according to a fixed, linear protocol. Here we examine an adaptive therapeutic approach that evolves in response to the temporal and spatial variability of tumor microenvironment and cellular phenotype as well as therapy-induced perturbations. Initial mathematical models find that when resistant phenotypes arise in the untreated tumor, they are typically present in small numbers because they are less fit than the sensitive population. This reflects the "cost" of phenotypic resistance such as additional substrate and energy used to up-regulate xenobiotic metabolism, and therefore not available for proliferation, or the growth inhibitory nature of environments (i.e., ischemia or hypoxia) that confer resistance on phenotypically sensitive cells. Thus, in the Darwinian environment of a cancer, the fitter chemosensitive cells will ordinarily proliferate at the expense of the less fit chemoresistant cells. The models show that, if resistant populations are present before administration of therapy, treatments designed to kill maximum numbers of cancer cells remove this inhibitory effect and actually promote more rapid growth of the resistant populations. We present an alternative approach in which treatment is continuously modulated to achieve a fixed tumor population. The goal of adaptive therapy is to enforce a stable tumor burden by permitting a significant population of chemosensitive cells to survive so that they, in turn, suppress proliferation of the less fit but chemoresistant
Alexander V. Nazarenko
Full Text Available According to the Novgorod First Chronicle (in entries from 1055 and 1058, a servant (xolopъ and probably steward (tiunъ of the Novgorodian bishop Luka had the name Dudika. The name seems to be of Lower German origin ( old Russian rob-, a virtual form like the Old Russian *Nigvarъ might have appeared. The further transformation *Nigvarъ > Negvar was induced by frequent personal name models either with the initial group Ne- (such as Nedanъ, Nevidъ or with the first stem Něg- (such as Něgoradъ. So the Old Scandinavian Ingvarr was reflected as a loan-name in the Old Russian dialects three times: Igorь (before losing the nasal vowels, Inъgvarъ, and Negvarъ (before and after losing the reduced vowels in unaccented positions.
We are living in an ever more complex world, an epoch where human actions can accordingly acquire far-reaching potentialities. Complex and adaptive dynamical systems are ubiquitous in the world surrounding us and require us to adapt to new realities and the way of dealing with them. This primer has been developed with the aim of conveying a wide range of "commons-sense" knowledge in the field of quantitative complex system science at an introductory level, providing an entry point to this both fascinating and vitally important subject. The approach is modular and phenomenology driven. Examples of emerging phenomena of generic importance treated in this book are: -- The small world phenomenon in social and scale-free networks. -- Phase transitions and self-organized criticality in adaptive systems. -- Life at the edge of chaos and coevolutionary avalanches resulting from the unfolding of all living. -- The concept of living dynamical systems and emotional diffusive control within cognitive system theory. Techn...
We are living in an ever more complex world, an epoch where human actions can accordingly acquire far-reaching potentialities. Complex and adaptive dynamical systems are ubiquitous in the world surrounding us and require us to adapt to new realities and the way of dealing with them. This primer has been developed with the aim of conveying a wide range of "commons-sense" knowledge in the field of quantitative complex system science at an introductory level, providing an entry point to this both fascinating and vitally important subject. The approach is modular and phenomenology driven. Examples of emerging phenomena of generic importance treated in this book are: -- The small world phenomenon in social and scale-free networks. -- Phase transitions and self-organized criticality in adaptive systems. -- Life at the edge of chaos and coevolutionary avalanches resulting from the unfolding of all living. -- The concept of living dynamical systems and emotional diffusive control within cognitive system theory. Techn...
Full Text Available The first part of the article deals with the function of the examples in bilingual dictionaries, compared to their function in monolingual ones. First, it is argued that examples in an active bilingual dictionary should principally exemplify the use of the headword’s translation equivalents rather than the headword itself, as it is in the case of monolingual dictionaries. Then a survey is made dealing with examples selected from all simple preposition entries in a recent Polish-French dictionary, taking into consideration both the structure and the function of these examples. The general conclusion is that in the investigated entries exemplifi cation fails seriously enough to make it impossible for users to choose the appropriate equivalent of a particular preposition.
Full Text Available This paper discusses the firm-level determinants of international hotels’ foreign markets entry choices, contrasting acquisition with management and franchise contracts, based on a resource-dependency perspective and appropriability theory. It points out that brand equity, relatedness of products and market segmentation, partner-specific knowledge of hotels, international experience, and the duration of proprietary knowledge impact hotels’ decisions on how to enter a foreign market. In addition, the paper suggests the existence of entry choices sequence favorable to acquisition probability after the end of management contract when the franchisors’ or management companies’ proprietary knowledge attenuates. Contract activity is likely to be renewed after the acquisition, once the management company has established a new form or a higher level of proprietary knowledge.
Gary R. Whittaker
Full Text Available Coronaviruses are enveloped positive-stranded RNA viruses that replicate in the cytoplasm. To deliver their nucleocapsid into the host cell, they rely on the fusion of their envelope with the host cell membrane. The spike glycoprotein (S mediates virus entry and is a primary determinant of cell tropism and pathogenesis. It is classified as a class I fusion protein, and is responsible for binding to the receptor on the host cell as well as mediating the fusion of host and viral membranes—A process driven by major conformational changes of the S protein. This review discusses coronavirus entry mechanisms focusing on the different triggers used by coronaviruses to initiate the conformational change of the S protein: receptor binding, low pH exposure and proteolytic activation. We also highlight commonalities between coronavirus S proteins and other class I viral fusion proteins, as well as distinctive features that confer distinct tropism, pathogenicity and host interspecies transmission characteristics to coronaviruses.
Full Text Available Abstract Craigslist, a website that hosts job- and help-wanted ads, expanded rapidly across the states in the USA over a very short period of time, thereby changing abruptly the market structure faced by competing employment websites. We exploit this abrupt change to evaluate its impact on competing websites’ online traffic and pricing. We find that Craigslist’s entry was associated with a decrease in the number of visitors that an average competing employment website attracted and with a decrease in the number of pages an average visitor reviewed during a typical visit. We also find that employment websites lowered some of the fees they charged their users. Overall, these findings offer one explanation for why Craigslist, despite its popularity, had little effect on the unemployment rate in the labor markets it entered: the entry of Craigslist cannibalized online traffic at competing employment websites. JEL Classification: J20, L10, L86
Dr.Sc. Nasir Selimi
Full Text Available The purpose of this study is to analyze the factors of foreign companies that have already entered Macedonia in any mode of entry by finding out the factors and motives that influenced their decision making while choosing the proper mode for that particular market. As a research methodology for collecting initial data, a structured questionnaire is used with 28 variables as factors which influence decision making of the modes of entry into the foreign market. A statistical software was used in order to evaluate the variables used in the study. The raised hypothesis were tested using One Sample T-test. According to the obtained results, the variables political stability and the law on foreign investments seem to be as more important factors for companies that operate in Macedonia. Finally, companies need to analyze the internal and external factors from the environment in order to able to create strategies to operate in the domestic and international markets.
National Aeronautics and Space Administration — The innovative adpative deployable entry and placement technology (ADEPT), also known as transformable entry system technology (TEST) concept, akin to an umbrella,...
Dillman, Robert; Corliss, James
NASA's Mars Sample Return (MSR) project will bring Mars surface and atmosphere samples back to Earth for detailed examination. Langley Research Center's MSR Earth Entry Vehicle (EEV) is a core part of the mission, protecting the sample container during atmospheric entry, descent, and landing. Planetary protection requirements demand a higher reliability from the EEV than for any previous planetary entry vehicle. An overview of the EEV design and preliminary analysis is presented, with a follow-on discussion of recommended future design trade studies to be performed over the next several years in support of an MSR launch in 2018 or 2020. Planned topics include vehicle size for impact protection of a range of sample container sizes, outer mold line changes to achieve surface sterilization during re-entry, micrometeoroid protection, aerodynamic stability, thermal protection, and structural materials selection.
... AIR COMMERCE REGULATIONS Private Aircraft § 122.26 Entry and clearance. Private aircraft, as defined... information as set forth in § 122.22(c), and grants electronic clearance via electronic mail or telephone...
Gold, David L.
Reviews issues to be considered in determining the order of meanings for a lexeme in a dictionary entry and compares techniques for deciding order. Types of ordering include importance, frequency, logical ordering, dominant meaning, syntactic, and historical. (MSE)
Sklarin, Nancy T.; Granovsky, Svetlana; O'Reilly, Eileen M.; Zelenetz, Andrew D.
Implementation of computerized provider order entry for complex chemotherapy regimens supported Memorial Sloan-Kettering Cancer Center's strategic plan to successfully establish a distributive, networked health care delivery system.
... conditions as he may prescribe to assure that allowing the entry of such articles will be consistent with the... inventory controls are maintained at all times. Inedible egg products may be processed in official plants...
The increased demand for freight movements through international ports of entry and the signing of the North American Free Trade Agreement (NAFTA) have increased freight traffic at border ports of entry. The State-of-the-Art Port of Entry Workshop initiated a dialogue among technologists and stakeholders to explore the potential uses of technology at border crossings and to set development priorities. International ports of entry are both information and labor intensive, and there are many promising technologies that could be used to provide timely information and optimize inspection resources. Participants universally held that integration of technologies and operations is critical to improving port services. A series of Next Steps was developed to address stakeholder issues and national priorities, such as the National Transportation Policy and National Drug Policy. This report documents the views of the various stakeholders and technologists present at the workshop and outlines future directions of study.
Apr 4, 2018 ... ... made in superior and inferior entry points at supine position at 0° .... Trendelenburg degree, taking all risks into consideration. As a result of our .... patient's position influences the incidence of dysrhythmias during pulmonary.
... of consignee—(1) Authorized agent with knowledge of the facts. When entry is made in a consignee's name by an agent who has knowledge of the facts and who is authorized under a proper power of attorney...
Borrow, P; Oldstone, M B
The path that the arenavirus lymphocytic choriomeningitis virus (LCMV) uses to enter rodent fibroblastic cell lines was dissected by infectivity and inhibition studies and immunoelectron microscopy. Lysosomotropic weak bases (chloroquine and ammonium chloride) and carboxylic ionophores (monensin and nigericin) inhibited virus entry, assessed as virus nucleoprotein expression at early times post-infection, indicating that the entry process involved a pH-dependent fusion step in intracellular vesicles. That entry occurred in vesicles rather than by direct fusion of virions with the plasma membrane was confirmed by immunoelectron microscopy. The vesicles involved were large (150-300 nm diameter), smooth-walled, and not associated with clathrin. Unlike classical phagocytosis, virus uptake in these vesicles was a microfilament-independent process, as it was not blocked by cytochalasins. LCMV entry into rodent fibroblast cell lines thus involves viropexis in large smooth-walled vesicles, followed by a pH-dependent fusion event inside the cell.
A selected list of references in the fields of astronautics and re-entry mechanics is classified and discussed, and a comprehensive subject and author index is included for ease in locating the references. (Author)
.... Airline deregulation has led to lower fares and better service for most air travelers largely because of increased competition spurred by the entry of new airlines into the industry and established...
...) of the Intelligence Reform and Terrorism Prevention Act of 2004 (IRTPA), 118 Stat. 3638, as amended... major airport authority printed its own signs for Global Entry and strategically placed them throughout...
Full Text Available Abstract This paper provides evidence of the effect of age at school entry on college admission and earnings. It does so by exploiting a number of features in the application process to one of the major flagship universities in Brazil. By comparing applicants with different ages at school entry depending on whether they were born on December 31 or on January 1, our estimates show that applicants who delayed first-grade enrollment present higher aptitude test scores and probability of admission. Our results further suggest that advantaged applicants also earn more early in their careers. JEL Classification: I21, J24
Louis R Hollingsworth
Full Text Available Multiple approaches are being utilized to develop therapeutics to treat HIV infection. One approach is designed to inhibit entry of HIV into host cells, with a target being the viral envelope glycoprotein, gp120. Polyanionic compounds have been shown to be effective in inhibiting HIV entry, with a mechanism involving electrostatic interactions with the V3 loop of gp120 being proposed. In this study, we applied computational methods to elucidate molecular interactions between the repeat unit of the precisely alternating polyanion, Poly(4,4'-stilbenedicarboxylate-alt-maleic acid (DCSti-alt-MA and the V3 loop of gp120 from strains of HIV against which these polyanions were previously tested (IIIb, BaL, 92UG037, JR-CSF as well as two strains for which gp120 crystal structures are available (YU2, 2B4C. Homology modeling was used to create models of the gp120 proteins. Using monomers of the gp120 protein, we applied extensive molecular dynamics simulations to obtain dominant morphologies that represent a variety of open-closed states of the V3 loop to examine the interaction of 112 ligands of the repeating units of DCSti-alt-MA docked to the V3 loop and surrounding residues. Using the distance between the V1/V2 and V3 loops of gp120 as a metric, we revealed through MD simulations that gp120 from the lab-adapted strains (BaL and IIIb, which are more susceptible to inhibition by DCSti-alt-MA, clearly transitioned to the closed state in one replicate of each simulation set, whereas none of the replicates from the Tier II strains (92UG037 and JR-CSF did so. Docking repeat unit microspecies to the gp120 protein before and after MD simulation enabled identification of residues that were key for binding. Notably, only a few residues were found to be important for docking both before and after MD simulation as a result of the conformational heterogeneity provided by the simulations. Consideration of the residues that were consistently involved in interactions
Bastida Virgili, B.; Krag, H.; Lips, T.; De Pasquale, E.
The first ATV was launched on 9th March 2008 and, after a successful mission, the last phase was a controlled destructive re-entry on 29th September 2008, shortly after 13:30 UTC, in which the remains of the ATV and its load fell into the South Pacific Ocean. In order to better understand the re-entry processes, an insitu optical observation campaign was launched to record and analyze the ATV controlled re-entry with several instruments on board of two airplanes and also from the ISS. This observation campaign was successful and triggered several different still-ongoing studies on the extraction and analysis of data to draw conclusions on the adequacy of the re-entry break-up and explosion models used for the safety analysis of the ATV re-entry. This paper addresses the validation process for ESA’s model for re-entry survivability and on-ground risk assessment for explosive re-entry events using the observation data. The underlying rationale is to improve the models for the benefit of planning and execution of future controlled re-entries and in risk calculation in case of uncontrolled ones. The re-entry trajectory of the ATV, the explosive event and the trajectories of the fragments are simulated with the existing ESA tools and the EVOLVE explosion model. Additional software has been developed to simulate airborne sensor field of view(FOV) crossings based on the aircraft trajectories, attitude profile, sensor mounts and FOVs. Sensor performance and object radiation are modeled in order to generate synthetic images for the different sensors in the ISS and the two airplanes. These synthetic images and synthetic videos are compared with the available reentry observations of the ATV. This paper will present the software and techniques to generate synthetic imagery. It will give results of the comparison between the simulated and the real trajectories and fragmentation and explain the subsequent validation process of the ESA re-entry tools and the potential
The subject of presented bachelor thesis is Franchising as a method of entry to the market. The first part of this thesis deals with characteristics of franchising such as the definition of franchising and its advantages and disadvantages for both parties involved. Then there is also provided the current situation of franchising in the Czech Republic. The second part deals with entry into the market by franchising. In this section franchise agreement is mainly mentioned, how to start a franch...
Singh, Mamta K.
Although the educational evaluation process is useful and valuable and is supported by the Higher Education Act, a strong research base for program evaluation of college entry-level science courses is still lacking. Studies in science disciplines such as, biology, chemistry, and physics have addressed various affective and demographic factors and their relationships to student achievement. However, the literature contains little information that specifically addresses student biology content knowledge skills (basics and higher order thinking skills) and identifies factors that affect students' success in entry-level college science courses. These gate-keeping courses require detailed evaluation if the goal of an institution is to increase students' performance and success in these courses. These factors are, in fact, a stepping stone for increasing the number of graduates in Science, Technology, Engineering, and Mathematics (STEM) majors. The present study measured students' biology content knowledge and investigated students' performance and success in college biology, chemistry, and physics entry-level courses. Seven variables---gender, ethnicity, high school Grade Point Average (GPA), high school science, college major, school financial aid support, and work hours were used as independent variables and course final performance as a dichotomous dependent variable. The sample comprised voluntary student participants in entry-level science courses. The study attempted to explore eight research questions. Content knowledge assessments, demographic information analysis, multiple regression analysis, and binary logistic regression analysis were used to address research questions. The results suggested that high school GPA was a consistently good predictor of students' performance and success in entry-level science courses. Additionally, high school chemistry was a significant predictor variable for student success in entry-level biology and chemistry courses
Ferri, F.; Lewis, S. R.; Withers, P.; Aboudan, A.; Bettanini, C.; Colombatti, G.; Debei, S.; Golombek, M.; Harri, A. M.; Komatsu, G.; Leese, M. R.; Mäkinen, T.; Müller-Wodarg, I.; Ori, G. G.; Patel, M. R.
The entry, descent and landing of ExoMars offer a rare (once-per-mission) opportunity to perform in situ investigation of the martian environment over a wide altitude range. Entry, Descent and Landing System (EDLS) measurements can provide essential data for atmospheric scientific investigations.\\ud \\ud We intend to perform atmospheric science measurements by exploiting data from EDLS engineering sensors and exploiting their readings beyond the expected engineering information.
Örten, Remzi; Kurt, Ganite; Torun, Salih
It is known that accounting is applied since the existence of human being. When historical development of accounting is examined, recording methods may be summarized as single sided and double sided. The first method used in accounting is the single entry bookkeeping. According to this entry, not all of information related to financial events but important part of them are recorded in a single way. We can specify follow-up of receivable, payable, incomes and expenses as single sided recording...
The purpose of this thesis was to carry out a market entry planning by franchising Kungfu catering in Finland. Kungfu catering was a typical Chinese fast food restaurant, of which there was a gap in Finnish fast food market. McDonald’s and Hesburger were succesful examples of franchise business, experiences of those 2 restaurants were used for reference to create a suitable franchise strategy for Kungfu Finland. Finnish market entry planning of Kungfu Finland has been explained from several a...
Multinationals’ mode of foreign expansion may depend on whether or not they expect technological externalities or spillovers to generate new competition. Existing models where ex-post spillovers affect the ex-ante entry choice usually study the choice between exporting and FDI with horizontal spillovers. I consider a monopoly firm with a vertical production structure that has four possible modes of entry, one of which includes outsourcing of intermediate input production to a h...
Ajay Kalra; Surendra Rajiv; Kannan Srinivasan
Empirical studies examining responses to new product entries come to the puzzling conclusion that, in general, an incumbent reacts to a new entrant after a significant delay. Even easy-to-implement price cuts are observed after significant lag following entry. These findings seem to contradict the existing literature that either implicitly assumes or strongly advocates immediate defensive responses to limit competitive encroachment. When a competing firm enters the market, consumers may be un...
Features of an entry control system designed to automatically control access to nuclear facilities is described. Control independent of variable human factors is stressed, but security force action is required for assessment and response as a result of an alarm. A design based on a distributed processing capability is utilized. Flexibility and generality are emphasized in an effort to maximize applicability to the entry-control problem faced by nuclear facilities upgrading security as a result of the Safeguards Program