WorldWideScience

Sample records for blood fluke exploitation

  1. Prolyl Oligopeptidase from the Blood Fluke Schistosoma mansoni: From Functional Analysis to Anti-schistosomal Inhibitors

    Czech Academy of Sciences Publication Activity Database

    Fajtová, P.; Štefanić, S.; Hradilek, M.; Dvořák, Jan; Vondrášek, J.; Jílková, A.; Ulrychová, L.; McKerrow, J.H.; Caffrey, C.R.; Mareš, M.; Horn, M.

    2015-01-01

    Roč. 9, č. 6 (2015), e0003827. ISSN 1935-2735 Institutional support: RVO:60077344 Keywords : Schistosoma mansoni * schistosomiasis * prolyl oligopeptidase * blood fluke Subject RIV: EB - Genetics ; Molecular Biology Impact factor: 4.446, year: 2014

  2. Two New Genera of Fish Blood Flukes (Digenea: Aporocotylidae) from Catfishes in the Peruvian Amazon.

    Science.gov (United States)

    Orélis-Ribeiro, Raphael; Bullard, Stephen A

    2016-06-01

    Cladocaecum tomasscholzi n. gen., n. sp. infects the heart (lumen of ventricle) of driftwood catfish, Ageneiosus inermis Linnaeus, 1766 (Siluriformes: Auchenipteridae) from the Nanay River (Amazon River Basin, near Iquitos, Peru). It differs from all other aporocotylid genera by having a highly branched intestine comprising a central cecum that terminates immediately anterior to the ovary and that has numerous laterally directed diverticula. Kritsky platyrhynchi ( Guidelli, Isaac, and Pavanelli, 2002 ) n. gen., n. comb. (= Plehniella p.) is redescribed based on paratypes plus new specimens collected from the body cavity of the type host (porthole shovelnose catfish, Hemisorubim platyrhynchos Valenciennes, 1840) (Pimelodidae) from the nearby Itaya River. Kritsky differs from Sanguinicola Plehn, 1905 , Plehniella Szidat, 1951 , Nomasanguinicola Truong and Bullard, 2013 , and Cladocaecum by the combination of having a spinous anterior sucker, an intestine comprising 6 asymmetrical ceca, a lanceolate body, a straight vas deferens, an ovary with finger-like lateral projections, a small and spheroid oötype, numerous, minute, spheroid uterine eggs, and separate genital pores. An updated list of hosts, tissues infected, and geographic localities for the catfish blood flukes (9 spp.; 5 genera) is provided. This is the first report of a fish blood fluke infecting a member of Auchenipteridae and first proposal of a new genus of blood fluke (Schistosomatoidea) from South America in 64 yr. It brings the total number of Amazonian fish blood flukes to a mere 4 species. PMID:26859799

  3. Prolyl Oligopeptidase from the Blood Fluke Schistosoma mansoni: From Functional Analysis to Anti-schistosomal Inhibitors

    Czech Academy of Sciences Publication Activity Database

    Fajtová, Pavla; Štefanic, S.; Hradilek, Martin; Dvořák, Jan; Vondrášek, Jiří; Jílková, Adéla; Ulrychová, Lenka; McKerrow, J. H.; Caffrey, C. R.; Mareš, Michael; Horn, Martin

    2015-01-01

    Roč. 9, č. 6 (2015), e0003827/1-e0003827/24. ISSN 1935-2735 R&D Projects: GA ČR(CZ) GAP302/11/1481; GA MŠk LO1302 Institutional support: RVO:61388963 ; RVO:68378050 Keywords : Schistosoma mansoni * schistosomiasis * prolyl oligopeptidase * blood fluke Subject RIV: CE - Biochemistry; EB - Genetics ; Molecular Biology (UMG-J) Impact factor: 4.446, year: 2014 http://journals.plos.org/plosntds/article?id=10.1371/journal.pntd.0003827

  4. Prolyl Oligopeptidase from the Blood Fluke Schistosoma mansoni: From Functional Analysis to Anti-schistosomal Inhibitors.

    Directory of Open Access Journals (Sweden)

    Pavla Fajtová

    Full Text Available Blood flukes of the genus Schistosoma cause schistosomiasis, a parasitic disease that infects over 240 million people worldwide, and for which there is a need to identify new targets for chemotherapeutic interventions. Our research is focused on Schistosoma mansoni prolyl oligopeptidase (SmPOP from the serine peptidase family S9, which has not been investigated in detail in trematodes.We demonstrate that SmPOP is expressed in adult worms and schistosomula in an enzymatically active form. By immunofluorescence microscopy, SmPOP is localized in the tegument and parenchyma of both developmental stages. Recombinant SmPOP was produced in Escherichia coli and its active site specificity investigated using synthetic substrate and inhibitor libraries, and by homology modeling. SmPOP is a true oligopeptidase that hydrolyzes peptide (but not protein substrates with a strict specificity for Pro at P1. The inhibition profile is analogous to those for mammalian POPs. Both the recombinant enzyme and live worms cleave host vasoregulatory, proline-containing hormones such as angiotensin I and bradykinin. Finally, we designed nanomolar inhibitors of SmPOP that induce deleterious phenotypes in cultured schistosomes.We provide the first localization and functional analysis of SmPOP together with chemical tools for measuring its activity. We briefly discuss the notion that SmPOP, operating at the host-parasite interface to cleave host bioactive peptides, may contribute to the survival of the parasite. If substantiated, SmPOP could be a new target for the development of anti-schistosomal drugs.

  5. Three new species of blood flukes (Digenea: Aporocotylidae) infecting pufferfishes (Teleostei: Tetraodontidae) from off Bali, Indonesia.

    Science.gov (United States)

    Yong, R Q-Y; Cutmore, S C; Bray, R A; Miller, T L; Semarariana, I W Y; Palm, H W; Cribb, T H

    2016-10-01

    We describe three new species of blood flukes (Aporocotylidae) and propose their classification within the genus Psettarium Goto & Ozaki, 1929. All three species were collected from the circulatory systems of pufferfishes caught off Bali, central Indonesia. Psettarium pulchellum n. sp. was found in the gills of both the narrow-lined puffer (Arothron manilensis de Procé) and the spiny blaasop (Tylerius spinosissimus Regan), while P. ogawai n. sp. and P. jimbaranense n. sp. were found in the gills of the reticulated puffer (Arothron reticularis Bloch & Schneider). The morphological characteristics of these taxa necessitated emendation of the diagnosis for the genus Psettarium, to accommodate the presence of an oral sucker, multiple or entirely post-caecal testes and a degenerate posterior testis. Features such as proportion of body length occupied by the oesophagus, and posterior caeca being ≥7× the length of anterior caeca, are no longer regarded as useful genus-level characters. Additionally, Sasala nolani is reassigned to this genus as Psettarium nolani n. comb. In phylogenetic analyses of the 28S and ITS2 rDNA regions, all three new taxa form a well-supported clade, together with Psettarium sinense and Psettarium nolani n. comb., the two other species of tetraodontid-infecting aporocotylids for which comparative rDNA data were available. The short branch lengths within this clade, despite dramatic morphological differences between the five species, suggest that rapid morphological diversification has occurred among the tetraodontid-infecting aporocotylids. The genus Psettarium has long been considered problematic. Further commentary is given on the history of this genus and how the issues presented might be resolved. PMID:27208886

  6. MOLECULAR APPROACH TO THE STUDY OF TREMATODE PARASITES : THE BLOOD FLUKE

    Directory of Open Access Journals (Sweden)

    Philip T. LoVerde

    2012-09-01

    Full Text Available One important aspect of reproductive development in trematode parasites is the formation of a hardened eggshell which allows the zygote to develop into a miracidium in a hostile environment. The miracidium then can transfer the germline from the vertebrate host to snail intermediate host. Schistosome parasites, unlike other trematodes, have separate sexes and female reproductive development is known to depend on the presence of a male parasite. These facts make the blood flukes ideal material to study the mechanisms that underlie female reproductive development and eggshell formatian. We reasoned that the morphological and biochemical differences between the male and female must be reflected at the molecular level in the differential expression of sexually regulated genes. Radioactive single stranded cDNA was first transcribed from female RNA; and then sequences common to both male and female were removed by hybridization to an excess of male RNA. This probe was used to screen a cDNA library made from mRNA of adult worm paris. One hybridizing clone, pSMf 61-46, was shown to correspond to a 0.9 kilobase mRNA that is present only in mature female worms and is not detectable in female schistosomes from single-sex infections, in male worms or in eggs. Thus expression of the gene was female-specific. During normal bisexual infection this mRNA is first detected 28 days after infection (the time of worm pairing and increases to a high level at 35 days postinfection, coinciding with egg production. Thus the temporal expression of the gene was dependent on paining with male worm. The nucleotide sequence of the gene shows an open reading frame that encodes a 16 kDA polypeptide that shows strong homology with eggshell proteins on insects. A second female-specific cDNA clone, F-4, represents a 1.6 kilobase mRNA whose expression is also correlated with worm pairing and subsequent egg production, encodes a different putative eggshell component of 44 kDA. The

  7. Proteomic analysis of human skin treated with larval schistosome peptidases reveals distinct invasion strategies among species of blood flukes.

    Directory of Open Access Journals (Sweden)

    Jessica Ingram

    2011-09-01

    Full Text Available Skin invasion is the initial step in infection of the human host by schistosome blood flukes. Schistosome larvae have the remarkable ability to overcome the physical and biochemical barriers present in skin in the absence of any mechanical trauma. While a serine peptidase with activity against insoluble elastin appears to be essential for this process in one species of schistosomes, Schistosoma mansoni, it is unknown whether other schistosome species use the same peptidase to facilitate entry into their hosts.Recent genome sequencing projects, together with a number of biochemical studies, identified alternative peptidases that Schistosoma japonicum or Trichobilharzia regenti could use to facilitate migration through skin. In this study, we used comparative proteomic analysis of human skin treated with purified cercarial elastase, the known invasive peptidase of S. mansoni, or S. mansoni cathespin B2, a close homolog of the putative invasive peptidase of S. japonicum, to identify substrates of either peptidase. Select skin proteins were then confirmed as substrates by in vitro digestion assays.This study demonstrates that an S. mansoni ortholog of the candidate invasive peptidase of S. japonicum and T. regenti, cathepsin B2, is capable of efficiently cleaving many of the same host skin substrates as the invasive serine peptidase of S. mansoni, cercarial elastase. At the same time, identification of unique substrates and the broader species specificity of cathepsin B2 suggest that the cercarial elastase gene family amplified as an adaptation of schistosomes to human hosts.

  8. Characterization of microRNAs from Orientobilharzia turkestanicum, a neglected blood fluke of human and animal health significance.

    Directory of Open Access Journals (Sweden)

    Chun-Ren Wang

    Full Text Available The neglected blood flukes Orientobilharzia spp. belonging to the Platyhelminthes, infect animals in a number of countries of the world, and cause cercarial dermatitis in humans, as well as significant diseases and even death in economically-important animals. MicroRNAs (miRNAs are now considered to be a key mechanism of gene regulation. Herein, we investigated the global miRNA expression profile of adult O. turkestanicum using next-generation sequencing technology and real-time quantitative PCR, to gain further information on the role of these molecules in host invasion and the parasitic lifestyle of this species. A total of 13.48 million high quality reads were obtained out of 13.78 million raw sequencing reads, with 828 expressed miRNAs identified. Phylogenetic analysis showed that the miRNAs of O. turkestanicum were still rapidly evolving and there was a "directed mutation" pattern compared with that of other species. Target mRNAs were successfully predicted to 518 miRNAs. These targets included energy metabolism, transcription initiation factors, signal transduction, growth factor receptors. miRNAs targeting egg proteins, including major egg antigen p40, and heat shock proteins were also found. Enrichment analysis indicated enrichment for mRNAs involved in catalytic, binding, transcription regulators and translation regulators. The present study represented the first large-scale characterization of O. turkestanicum miRNAs, which provides novel resources for better understanding the complex biology of this zoonotic parasite, which, in turn, has implications for the effective control of the disease it causes.

  9. In silico analysis of the fucosylation-associated genome of the human blood fluke Schistosoma mansoni: cloning and characterization of the enzymes involved in GDP-L-fucose synthesis and Golgi import

    OpenAIRE

    Peterson, Nathan A; Tavis K Anderson; Wu, Xiao-Jun; Yoshino, Timothy P.

    2013-01-01

    Background Carbohydrate structures of surface-expressed and secreted/excreted glycoconjugates of the human blood fluke Schistosoma mansoni are key determinants that mediate host-parasite interactions in both snail and mammalian hosts. Fucose is a major constituent of these immunologically important glycans, and recent studies have sought to characterize fucosylation-associated enzymes, including the Golgi-localized fucosyltransferases that catalyze the transfer of L-fucose from a GDP-L-fucose...

  10. Discovery of intermediate hosts for two species of blood flukes Cardicola orientalis and Cardicola forsteri (Trematoda: Aporocotylidae) infecting Pacific bluefin tuna in Japan.

    Science.gov (United States)

    Shirakashi, Sho; Tani, Kazuki; Ishimaru, Katsuya; Shin, Sang Phil; Honryo, Tomoki; Uchida, Hiro'omi; Ogawa, Kazuo

    2016-04-01

    Fish blood flukes (Aporocotylidae) are important pathogens of farmed finfish around the world. Among them, Cardicola spp. infecting farmed tuna are considered to be serious threats to tuna farming and have received tremendous attention. We conducted periodical samplings at a tuna farming site in Japan between January and May, 2015 to determine the life cycle of Cardicola spp. We collected over 4700 terebellid polychaetes from ropes, floats and frames of tuna culture cages and found nearly 400 infected worms. Sporocysts and cercariae found in Nicolea gracilibranchis were genetically identified as Cardicola orientalis by 28S and ITS2 ribosomal DNA sequences. This was the first discovery of the intermediate host for this parasite species. Infection prevalence and the abundance of N. gracilibranchis significantly varied between sampling points and the highest number of infected terebellids were collected from ropes. We also demonstrated morphologically and molecularly that asexual stages found in a single Amphitrite sp. (Terebellidae) and adult worms isolated from farmed juvenile tuna were Cardicola forsteri. This is the first report of C. forsteri in Pacific bluefin tuna (PBT) Thunnus orientalis in Japan. Our results demonstrated that all three species of Cardicola orientalis, C. forsteri and Cardicola opisthorchis exist in Japanese farmed PBTs and that they all use terebellid polychaetes as the intermediate hosts. PMID:26571413

  11. Where are the South American freshwater turtle blood flukes (Trematoda: Spirorchiidae)? The first morphological and molecular analysis of spirorchiid cercariae from freshwater snails in Brazil.

    Science.gov (United States)

    Pinto, Hudson Alves; de Melo, Alan Lane; Brant, Sara Vanessa

    2015-12-01

    Trematodes belonging to the family Spirorchiidae are blood parasites mainly of turtles with a worldwide distribution. These flukes were recently reported in some marine turtles from South America, where the occurrence of spirorchiids in freshwater definitive and intermediate hosts is so far unknown. In the present study, three morphotypes of brevifurcate apharyngeate distome cercariae found in freshwater molluscs from an urban reservoir in Brazil were used for morphological and molecular (nuclear 28S rDNA) evaluation. Two morphotypes of cercariae, probably congeneric species, were found in 12/17,465 specimens of Biomphalaria spp. and differ from each other by body size and sequences (0.1%). They present morphology similar to North American freshwater spirorchiids (Spirorchis spp.), however surprisingly molecular data reveals that these lineages are more closely related to marine spirorchiids. A third species found in 2/777 Pomacea sp. differs morphologically from all previously described spirorchiid cercariae and genetically from spirorchiids with available sequences (16-19%), grouping in the phylogenetic tree with freshwater North American species. This is the first report of freshwater spirorchiids in South America and the first molecular confirmation of the involvement of a caenogastropod in the life cycle of spirorchiids. PMID:26253761

  12. Structural basis for the inhibition of histone deacetylase 8 (HDAC8, a key epigenetic player in the blood fluke Schistosoma mansoni.

    Directory of Open Access Journals (Sweden)

    Martin Marek

    Full Text Available The treatment of schistosomiasis, a disease caused by blood flukes parasites of the Schistosoma genus, depends on the intensive use of a single drug, praziquantel, which increases the likelihood of the development of drug-resistant parasite strains and renders the search for new drugs a strategic priority. Currently, inhibitors of human epigenetic enzymes are actively investigated as novel anti-cancer drugs and have the potential to be used as new anti-parasitic agents. Here, we report that Schistosoma mansoni histone deacetylase 8 (smHDAC8, the most expressed class I HDAC isotype in this organism, is a functional acetyl-L-lysine deacetylase that plays an important role in parasite infectivity. The crystal structure of smHDAC8 shows that this enzyme adopts a canonical α/β HDAC fold, with specific solvent exposed loops corresponding to insertions in the schistosome HDAC8 sequence. Importantly, structures of smHDAC8 in complex with generic HDAC inhibitors revealed specific structural changes in the smHDAC8 active site that cannot be accommodated by human HDACs. Using a structure-based approach, we identified several small-molecule inhibitors that build on these specificities. These molecules exhibit an inhibitory effect on smHDAC8 but show reduced affinity for human HDACs. Crucially, we show that a newly identified smHDAC8 inhibitor has the capacity to induce apoptosis and mortality in schistosomes. Taken together, our biological and structural findings define the framework for the rational design of small-molecule inhibitors specifically interfering with schistosome epigenetic mechanisms, and further support an anti-parasitic epigenome targeting strategy to treat neglected diseases caused by eukaryotic pathogens.

  13. The effect on infection of irradiated fasciola gigantic (liver flukes) on goats (Capra hircus linn) blood values

    International Nuclear Information System (INIS)

    This experiment was carried out to study the effect of infection Fasciola gigantic irradiated by using 60Co to goat’s blood values. Twenty local male goats, ten to twelve old months, 115-20 kg of body weight were used for this study. The animals were divided into 5 groups consisting of four replications. Three groups received irradiated metacercariae of Fasciola gigantic a using 45, 55 and 65 Gy respectively. One group in the positive control and another one is the negative control. Each goat received 350 metacercariae. The study in was undertaken for 25 weeks. Body weight, Eosinofil, PCV and Hb were measured. These indicated that infectivity reduced on irradiated Fasciola gigantic. In all parameters, among negative control group and three irradiation-groups showed non significant (p>0,05). (author)

  14. The Sinbad retrotransposon from the genome of the human blood fluke, Schistosoma mansoni, and the distribution of related Pao-like elements

    Directory of Open Access Journals (Sweden)

    Morales Maria E

    2005-02-01

    Full Text Available Abstract Background Of the major families of long terminal repeat (LTR retrotransposons, the Pao/BEL family is probably the least well studied. It is becoming apparent that numerous LTR retrotransposons and other mobile genetic elements have colonized the genome of the human blood fluke, Schistosoma mansoni. Results A proviral form of Sinbad, a new LTR retrotransposon, was identified in the genome of S. mansoni. Phylogenetic analysis indicated that Sinbad belongs to one of five discreet subfamilies of Pao/BEL like elements. BLAST searches of whole genomes and EST databases indicated that members of this clade occurred in species of the Insecta, Nematoda, Echinodermata and Chordata, as well as Platyhelminthes, but were absent from all plants, fungi and lower eukaryotes examined. Among the deuterostomes examined, only aquatic species harbored these types of elements. All four species of nematode examined were positive for Sinbad sequences, although among insect and vertebrate genomes, some were positive and some negative. The full length, consensus Sinbad retrotransposon was 6,287 bp long and was flanked at its 5'- and 3'-ends by identical LTRs of 386 bp. Sinbad displayed a triple Cys-His RNA binding motif characteristic of Gag of Pao/BEL-like elements, followed by the enzymatic domains of protease, reverse transcriptase (RT, RNAseH, and integrase, in that order. A phylogenetic tree of deduced RT sequences from 26 elements revealed that Sinbad was most closely related to an unnamed element from the zebrafish Danio rerio and to Saci-1, also from S. mansoni. It was also closely related to Pao from Bombyx mori and to Ninja of Drosophila simulans. Sinbad was only distantly related to the other schistosome LTR retrotransposons Boudicca, Gulliver, Saci-2, Saci-3, and Fugitive, which are gypsy-like. Southern hybridization and bioinformatics analyses indicated that there were about 50 copies of Sinbad in the S. mansoni genome. The presence of ESTs

  15. Liver Flukes: the Malady Neglected

    Energy Technology Data Exchange (ETDEWEB)

    Lim, Jae Hoon [Samsung Medical Center, Sungkyunkwan University School of Medicine, Seoul (Korea, Republic of)

    2011-06-15

    Liver fluke disease is a chronic parasitic inflammatory disease of the bile ducts. Infection occurs through ingestion of fluke-infested, fresh-water raw fish. The most well-known species that cause human infection are Clonorchis sinensis, Opisthorchis viverrini and Opisthorchis felineus. Adult flukes settle in the small intrahepatic bile ducts and then they live there for 20-30 years. The long-lived flukes cause long-lasting chronic inflammation of the bile ducts and this produces epithelial hyperplasia, periductal fibrosis and bile duct dilatation. The vast majority of patients are asymptomatic, but the patients with heavy infection suffer from lassitude and nonspecific abdominal complaints. The complications are stone formation, recurrent pyogenic cholangitis and cholangiocarcinoma. Approximately 35 million people are infected with liver flukes throughout the world and the exceptionally high incidence of cholangiocarcinoma in some endemic areas is closely related with a high prevalence of liver fluke infection. Considering the impact of this food-borne malady on public health and the severe possible clinical consequences, liver fluke infection should not be forgotten or neglected.

  16. Liver Flukes: the Malady Neglected

    International Nuclear Information System (INIS)

    Liver fluke disease is a chronic parasitic inflammatory disease of the bile ducts. Infection occurs through ingestion of fluke-infested, fresh-water raw fish. The most well-known species that cause human infection are Clonorchis sinensis, Opisthorchis viverrini and Opisthorchis felineus. Adult flukes settle in the small intrahepatic bile ducts and then they live there for 20-30 years. The long-lived flukes cause long-lasting chronic inflammation of the bile ducts and this produces epithelial hyperplasia, periductal fibrosis and bile duct dilatation. The vast majority of patients are asymptomatic, but the patients with heavy infection suffer from lassitude and nonspecific abdominal complaints. The complications are stone formation, recurrent pyogenic cholangitis and cholangiocarcinoma. Approximately 35 million people are infected with liver flukes throughout the world and the exceptionally high incidence of cholangiocarcinoma in some endemic areas is closely related with a high prevalence of liver fluke infection. Considering the impact of this food-borne malady on public health and the severe possible clinical consequences, liver fluke infection should not be forgotten or neglected.

  17. Understanding and exploiting nanoparticles' intimacy with the blood vessel and blood.

    Science.gov (United States)

    Setyawati, Magdiel Inggrid; Tay, Chor Yong; Docter, Dominic; Stauber, Roland H; Leong, David Tai

    2015-11-21

    While the blood vessel is seldom the target tissue, almost all nanomedicine will interact with blood vessels and blood at some point of time along its life cycle in the human body regardless of their intended destination. Despite its importance, many bionanotechnologists do not feature endothelial cells (ECs), the blood vessel cells, or consider blood effects in their studies. Including blood vessel cells in the study can greatly increase our understanding of the behavior of any given nanomedicine at the tissue of interest or to understand side effects that may occur in vivo. In this review, we will first describe the diversity of EC types found in the human body and their unique behaviors and possibly how these important differences can implicate nanomedicine behavior. Subsequently, we will discuss about the protein corona derived from blood with foci on the physiochemical aspects of nanoparticles (NPs) that dictate the protein corona characteristics. We would also discuss about how NPs characteristics can affect uptake by the endothelium. Subsequently, mechanisms of how NPs could cross the endothelium to access the tissue of interest. Throughout the paper, we will share some novel nanomedicine related ideas and insights that were derived from the understanding of the NPs' interaction with the ECs. This review will inspire more exciting nanotechnologies that had accounted for the complexities of the real human body. PMID:26239875

  18. Blood flukes (Digenea: Aporocotylidae) infecting body cavity of South American catfishes (Siluriformes: Pimelodidae): two new species from rivers in Bolivia, Guyana and Peru with a re-assessment of Plehniella Szidat, 1951.

    Science.gov (United States)

    Orelis-Ribeiro, Raphael; Bullard, Stephen A

    2015-01-01

    Plehniella Szidat, 1951 is emended based on new collections from South American long-whiskered catfishes. It is clearly differentiated from Sanguinicola Plehn, 1905 by lacking lateral tegumental body spines and by having 6 asymmetrical caeca. Plehniella sabajperezi sp. n. infects body cavity of Pimelodus albofasciatus (Mees) from the Demerara and Rupununi Rivers (Guyana) and Pimelodus blochii (Valenciennes) from Lake Tumi Chucua (Bolivia) and Napo River (Peru). It differs from Plehniella coelomicola Szidat, 1951 (type species) by having a thin-walled vas deferens that greatly exceeds the length of cirrus-sac and that joins the cirrus-sac at level of ovovitelline duct and ootype, an internal seminal vesicle that is absent or diminutive, and a cirrus-sac that is spheroid, nearly marginal, and envelops the laterally-directed distal portion of the male genitalia. Plehniella armbrusteri sp. n. infects body cavity of P. blochii from Lake Tumi Chucua (Bolivia). It differs from P. coelomicola and P. sabajperezi by having a relatively ovoid body, a massive intestine comprising caeca that are deeply-lobed to diverticulate and terminate in the posterior half of the body, a testis that flanks the distal tips of the posteriorly-directed caeca, and a proximal portion of the vas deferens that loops ventral to the testis. Small adults (Plehniella sp.) collected from body cavity of Pimelodus grosskopfii (Steindachner) from Cienega de Jobo and Canal del Dique (Colombia) differ from congeners by having a posteriorly-constricted body region, an anterior sucker with concentric rows of minute spines, an elongate anterior oesophageal swelling, short and wide caeca, and a male genital pore that opens proportionally more anteriad. This study nearly doubles the number of aporocotylids documented from South America Rivers and comprises the first record of a fish blood fluke from P. blochii, P. albofasciatus and P. grosskopfii as well as from Bolivia, Colombia, Guyana or Peru. PMID:26373332

  19. Identity of rumen fluke in deer.

    Science.gov (United States)

    O'Toole, Ailis; Browne, John A; Hogan, Sean; Bassière, Thomas; DeWaal, Theo; Mulcahy, Grace; Zintl, Annetta

    2014-11-01

    As evidence is growing that in many temperate areas paramphistome infections are becoming more common and widespread, this study was undertaken to determine the role of deer as reservoirs for rumen fluke infections in livestock. A total of 144 deer faecal samples (88 from fallow deer, 32 from red deer and 24 samples from sika, sika/red deer hybrids) were screened for the presence of fluke eggs. Based on the ITS-2 rDNA locus plus flanking 5.8S and 28S sequences (ITS-2+), fluke eggs were identified to species level. Our results indicate that, of the 3 deer species, fallow deer had the highest fluke infection rates. Two rumen fluke species, Calicophoron daubneyi and Paramphistomum leydeni, with morphologically distinct eggs, were identified. Concurrent infections of the two paramphistome species and liver fluke, Fasciola hepatica, were common. Considering the comparatively low egg burdens observed in this study, it is unlikely that deer represent a significant source of infection for Irish livestock. PMID:25127736

  20. IMPORTANT: Fluke is recalling Digital Clamp Meters

    CERN Multimedia

    2013-01-01

    Fluke is voluntarily recalling four models of Digital Clamp Meters: Fluke 373, 374, 375 and 376. If you own one of these clamp meters, please stop using it and send it back to Fluke for repair even if you have not experienced problems.   Description of the problem: "The printed circuit assembly may not be properly fastened to the test lead input jack. This may result in inaccurate voltage readings, including a low or no-voltage reading on a circuit energised with a hazardous voltage, presenting a shock, electrocution or thermal burn hazard." To determine if your clamp meter is affected by this recall notice, and for more information, click here.

  1. Schistosoma mansoni cercariae exploit an elastohydrodynamic coupling to swim efficiently

    CERN Document Server

    Krishnamurthy, Deepak; Bhargava, Arjun; Prakash, Manu

    2016-01-01

    The motility of many parasites is critical for the infection process of their host, as exemplified by the transmission cycle of the blood fluke Schistosoma mansoni. In their human infectious stage, immature, submillimetre-scale forms of the parasite known as cercariae swim in freshwater and infect humans by penetrating through the skin. This infection causes Schistosomiasis, a parasitic disease that is comparable to malaria in its global socio-economic impact. Given that cercariae do not feed and hence have a finite lifetime of around 12 hours, efficient motility is crucial for the parasite's survival and transmission of Schistosomiasis. However, a first-principles understanding of how cercariae swim is lacking. Via a combined experimental, theoretical and robotics based approach, we demonstrate that cercariae propel themselves against gravity by exploiting a unique elastohydrodynamic coupling. We show that cercariae beat their tail in a periodic fashion while maintaining a fixed flexibility near their poster...

  2. Quality and exploitation of umbilical cord blood for cell therapy: Are we beyond our capabilities?

    Science.gov (United States)

    Roura, Santiago; Pujal, Josep Maria; Gálvez-Montón, Carolina; Bayes-Genis, Antoni

    2016-07-01

    There is increasing interest in identifying novel stem cell sources for application in emerging cell therapies. In this context, umbilical cord blood (UCB) shows great promise in multiple clinical settings. The number of UCB banks has therefore increased worldwide, with the objective of preserving potentially life-saving cells that are usually discarded after birth. After a rather long and costly processing procedure, the resultant UCB-derived cell products are cryopreserved until transplantation to patients. However, in many cases, only a small proportion of administered cells engraft successfully. Thus, can we do any better regarding current UCB-based therapeutic approaches? Here we discuss concerns about the use of UCB that are not critically pondered by researchers, clinicians, and banking services, including wasting samples with small volumes and the need for more reliable quality and functional controls to ensure the biological activity of stem cells and subsequent engraftment and treatment efficacy. Finally, we appeal for collaborative agreements between research institutions and UCB banks in order to redirect currently discarded small-volume UCB units for basic and clinical research purposes. Developmental Dynamics 245:710-717, 2016. © 2016 Wiley Periodicals, Inc. PMID:27043849

  3. RNAi dynamics in Juvenile Fasciola spp. Liver flukes reveals the persistence of gene silencing in vitro.

    Directory of Open Access Journals (Sweden)

    Paul McVeigh

    2014-09-01

    Full Text Available Fasciola spp. liver fluke cause pernicious disease in humans and animals. Whilst current control is unsustainable due to anthelmintic resistance, gene silencing (RNA interference, RNAi has the potential to contribute to functional validation of new therapeutic targets. The susceptibility of juvenile Fasciola hepatica to double stranded (dsRNA-induced RNAi has been reported. To exploit this we probe RNAi dynamics, penetrance and persistence with the aim of building a robust platform for reverse genetics in liver fluke. We describe development of standardised RNAi protocols for a commercially-available liver fluke strain (the US Pacific North West Wild Strain, validated via robust transcriptional silencing of seven virulence genes, with in-depth experimental optimisation of three: cathepsin L (FheCatL and B (FheCatB cysteine proteases, and a σ-class glutathione transferase (FheσGST.Robust transcriptional silencing of targets in both F. hepatica and Fasciola gigantica juveniles is achievable following exposure to long (200-320 nt dsRNAs or 27 nt short interfering (siRNAs. Although juveniles are highly RNAi-susceptible, they display slower transcript and protein knockdown dynamics than those reported previously. Knockdown was detectable following as little as 4h exposure to trigger (target-dependent and in all cases silencing persisted for ≥25 days following long dsRNA exposure. Combinatorial silencing of three targets by mixing multiple long dsRNAs was similarly efficient. Despite profound transcriptional suppression, we found a significant time-lag before the occurrence of protein suppression; FheσGST and FheCatL protein suppression were only detectable after 9 and 21 days, respectively.In spite of marked variation in knockdown dynamics, we find that a transient exposure to long dsRNA or siRNA triggers robust RNAi penetrance and persistence in liver fluke NEJs supporting the development of multiple-throughput phenotypic screens for control

  4. The effect of the liver fluke Fasciola gigantica infestation on the leucocyte eosinophil cell profile on sheep

    Directory of Open Access Journals (Sweden)

    S Widjajanti

    2004-10-01

    Full Text Available Eosinophil is one of the major leucocyte cell in the blood which specifically reacted on parasite infection, thus it is important to determine its profile against the F. gigantica infection. The aims of this study is to determine the differences of the eosinophil count profiles on the different breed of sheep infected with F. gigantica and its relation with the resistance of sheep bred against parasitic disease. Four groups of sheep consist of Indonesian Thin Tail (ITT sheep, Merino sheep, backcross sheep (10 families and F2 sheep were infected with 300 metacercariae of Fasciola gigantica. The total sheep used in this trial is 621. Those sheep were observed for 12 weeks and the blood samples were collected every 2 weeks after infection. The results showed that total eosinophil counts in all infected sheep increased after two weeks post infection and ITT sheep showed the highest counts. On the other hand, the mean fluke counts on ITT sheep is the lowest compared with the other groups of sheep. Merino and F2 sheep had the highest mean fluke counts. Three families of backcross sheep had the mean flukes count similar to ITT sheep and the other 7 families were similar to the Merino sheep. In conclusion, the highest total eosinophil count at the early stage of infection on ITT sheep might be related with the genetic resistance, which was showed by the lowest flukes count, and the resistance was inherited to some of the backcross sheep, which had similar flukes count with ITT sheep.

  5. Exploitation Feminism: Trashiness, Lo-Fidelity and Utopia in She-Devils on Wheels and Blood Orgy of the Leather Girls

    OpenAIRE

    Hofer, Kristina Pia

    2016-01-01

    From the mid-1960s onwards, American exploitation cinema has spawned a number of Girl Gang movies whose potential for challenging androcentric and heteronormative modes of representation have been hotly disputed by fans and academics alike. This article discusses this potential by sounding the trashy material textures of two outstanding Girl Gang films: She-Devils on Wheels (Herschell Gordon Lewis, 1968) and Blood Orgy of the Leather Girls (Michael Lucas, 1988). To date, excessive materialiti...

  6. The role of host nutrition in the pathogensis of liver fluke anaemia

    International Nuclear Information System (INIS)

    Although it is widely accepted that the course of many helminth diseases of sheep is determined by two main variables, namely the level of infection and the host's nutritional status, the importance of the latter in the pathogenesis of ovine fascioliasis remains to be determined. The results of the experiment described here demonstrate that dietary quality has no significant effect upon fluke establishment but profoundly influences the severity of the disease as evidenced by the more rapid development of anaemia and by earlier mortalities among sheep restricted to a maintenance ration (containing about 6% crude protein) compared with similarly infected animals receiving a diet commensurate with growth (13% crude protein). Concurrent measurements of blood volume and of red cell turnover using radioisotopic methods revealed that in all animals the anaemia was caused by a combination of haemodilution, intra-hepatic and biliary haemorrhage, but that the earlier and more severe disturbances in protein-restricted sheep reflected the earlier development of these changes in association with a faster rate of fluke migration, and was ultimately complicated by impaired erythropoiesis arising from iron deficiency. (author)

  7. Blood Glucose Control Using a Novel Continuous Blood Glucose Monitor and Repetitive Intravenous Insulin Boluses: Exploiting Natural Insulin Pulsatility as a Principle for a Future Artificial Pancreas

    Directory of Open Access Journals (Sweden)

    Nils K. Skjaervold

    2013-01-01

    Full Text Available The aim of this study was to construct a glucose regulatory algorithm by employing the natural pulsatile pattern of insulin secretion and the oscillatory pattern of resting blood glucose levels and further to regulate the blood glucose level in diabetic pigs by this method. We developed a control algorithm based on repetitive intravenous bolus injections of insulin and combined this with an intravascular blood glucose monitor. Four anesthetized pigs were used in the study. The animals developed a mildly diabetic state from streptozotocin pretreatment. They were steadily brought within the blood glucose target range of 4.5–6.0 mmol/L in 21 to 121 min and kept within that range for 128 to 238 min (hypoglycemic values varied from 2.9 to 51.1 min. The study confirmed our hypotheses regarding the feasibility of this new principle for blood glucose control, and the algorithm was constantly improved during the study to produce the best results in the last animals. The main obstacles were the drift of the IvS-1 sensor and problems with the calibration procedure, which calls for an improvement in the sensor stability before this method can be applied fully in new studies in animals and humans.

  8. Gene discovery for the carcinogenic human liver fluke, Opisthorchis viverrini

    Directory of Open Access Journals (Sweden)

    Gasser Robin B

    2007-06-01

    Full Text Available Abstract Background Cholangiocarcinoma (CCA – cancer of the bile ducts – is associated with chronic infection with the liver fluke, Opisthorchis viverrini. Despite being the only eukaryote that is designated as a 'class I carcinogen' by the International Agency for Research on Cancer, little is known about its genome. Results Approximately 5,000 randomly selected cDNAs from the adult stage of O. viverrini were characterized and accounted for 1,932 contigs, representing ~14% of the entire transcriptome, and, presently, the largest sequence dataset for any species of liver fluke. Twenty percent of contigs were assigned GO classifications. Abundantly represented protein families included those involved in physiological functions that are essential to parasitism, such as anaerobic respiration, reproduction, detoxification, surface maintenance and feeding. GO assignments were well conserved in relation to other parasitic flukes, however, some categories were over-represented in O. viverrini, such as structural and motor proteins. An assessment of evolutionary relationships showed that O. viverrini was more similar to other parasitic (Clonorchis sinensis and Schistosoma japonicum than to free-living (Schmidtea mediterranea flatworms, and 105 sequences had close homologues in both parasitic species but not in S. mediterranea. A total of 164 O. viverrini contigs contained ORFs with signal sequences, many of which were platyhelminth-specific. Examples of convergent evolution between host and parasite secreted/membrane proteins were identified as were homologues of vaccine antigens from other helminths. Finally, ORFs representing secreted proteins with known roles in tumorigenesis were identified, and these might play roles in the pathogenesis of O. viverrini-induced CCA. Conclusion This gene discovery effort for O. viverrini should expedite molecular studies of cholangiocarcinogenesis and accelerate research focused on developing new interventions

  9. Gene discovery for the carcinogenic human liver fluke, Opisthorchis viverrini

    OpenAIRE

    Gasser Robin B; Smout Michael J; Sripa Manop; Sripa Banchob; Mulvenna Jason; Pinlaor Porntip; Laha Thewarach; Brindley Paul J; Loukas Alex

    2007-01-01

    Abstract Background Cholangiocarcinoma (CCA) – cancer of the bile ducts – is associated with chronic infection with the liver fluke, Opisthorchis viverrini. Despite being the only eukaryote that is designated as a 'class I carcinogen' by the International Agency for Research on Cancer, little is known about its genome. Results Approximately 5,000 randomly selected cDNAs from the adult stage of O. viverrini were characterized and accounted for 1,932 contigs, representing ~14% of the entire tra...

  10. Apoptosis of cholangiocytes modulated by thioredoxin of carcinogenic liver fluke.

    Science.gov (United States)

    Matchimakul, Pitchaya; Rinaldi, Gabriel; Suttiprapa, Sutas; Mann, Victoria H; Popratiloff, Anastas; Laha, Thewarach; Pimenta, Rafael N; Cochran, Christina J; Kaewkes, Sasithorn; Sripa, Banchob; Brindley, Paul J

    2015-08-01

    Chronic infection with the food-borne liver fluke, Opisthorchis viverrini, frequently induces cancer of the bile ducts, cholangiocarcinoma. Opisthorchiasis is endemic in Thailand, Lao PDR, Cambodia and Vietnam, where eating undercooked freshwater fish carrying the juvenile stage of this pathogen leads to human infection. Because inhibition of apoptosis facilitates carcinogenesis, this study investigated modulation by thioredoxin from O. viverrini of apoptosis of bile duct epithelial cells, cholangiocytes. Cells of a cholangiocyte line were incubated with the parasite enzyme after which they were exposed hydrogen peroxide. Oxidative stress-induced apoptosis was monitored using flow cytometry, growth in real time and imaging of living cells using laser confocal microscopy. Immunolocalization revealed liver fluke thioredoxin within cholangiocytes. Cells exposed to thioredoxin downregulated apoptotic genes in the mitogen activated protein kinases pathway and upregulated anti-apoptosis-related genes including apoptosis signaling kinase 1, caspase 9, caspase 8, caspase 3, survivin and others. Western blots of immunoprecipitates of cell lysates revealed binding of thioredoxin to apoptosis signaling kinase 1. Together the findings indicated that thioredoxin from O. viverrini inhibited oxidative stress-induced apoptosis of bile duct epithelial cells, which supports a role for this liver fluke oxidoreductase in opisthorchiasis-induced cholangiocarcinogenesis. PMID:26007234

  11. Exploiting Exploitation Cinema: an Introduction

    OpenAIRE

    Roche, David

    2016-01-01

    What is exploitation cinema? Exploitation cinema is not a genre; it is an industry with a specific mode of production. Exploitation films are made cheap for easy profit. “Easy” because they are almost always genre films relying on time-tried formulas (horror, thillers, biker movies, surfer movies, women-in-prison films, martial arts, subgenres like gore, rape-revenge, slashers, nazisploitation, etc.). “Easy” because they offer audiences what they can’t get elsewhere: sex, violence and taboo t...

  12. Schistosoma mansoni cercariae exploit an elastohydrodynamic coupling to swim efficiently

    OpenAIRE

    Krishnamurthy, Deepak; Katsikis, Georgios; Bhargava, Arjun; Prakash, Manu

    2016-01-01

    The motility of many parasites is critical for the infection process of their host, as exemplified by the transmission cycle of the blood fluke Schistosoma mansoni. In their human infectious stage, immature, submillimetre-scale forms of the parasite known as cercariae swim in freshwater and infect humans by penetrating through the skin. This infection causes Schistosomiasis, a parasitic disease that is comparable to malaria in its global socio-economic impact. Given that cercariae do not feed...

  13. Developmental transcriptomic features of the carcinogenic liver fluke, Clonorchis sinensis.

    Directory of Open Access Journals (Sweden)

    Won Gi Yoo

    2011-06-01

    Full Text Available Clonorchis sinensis is the causative agent of the life-threatening disease endemic to China, Korea, and Vietnam. It is estimated that about 15 million people are infected with this fluke. C. sinensis provokes inflammation, epithelial hyperplasia, and periductal fibrosis in bile ducts, and may cause cholangiocarcinoma in chronically infected individuals. Accumulation of a large amount of biological information about the adult stage of this liver fluke in recent years has advanced our understanding of the pathological interplay between this parasite and its hosts. However, no developmental gene expression profiles of C. sinensis have been published. In this study, we generated gene expression profiles of three developmental stages of C. sinensis by analyzing expressed sequence tags (ESTs. Complementary DNA libraries were constructed from the adult, metacercaria, and egg developmental stages of C. sinensis. A total of 52,745 ESTs were generated and assembled into 12,830 C. sinensis assembled EST sequences, and then these assemblies were further categorized into groups according to biological functions and developmental stages. Most of the genes that were differentially expressed in the different stages were consistent with the biological and physical features of the particular developmental stage; high energy metabolism, motility and reproduction genes were differentially expressed in adults, minimal metabolism and final host adaptation genes were differentially expressed in metacercariae, and embryonic genes were differentially expressed in eggs. The higher expression of glucose transporters, proteases, and antioxidant enzymes in the adults accounts for active uptake of nutrients and defense against host immune attacks. The types of ion channels present in C. sinensis are consistent with its parasitic nature and phylogenetic placement in the tree of life. We anticipate that the transcriptomic information on essential regulators of development

  14. Invasion of Flukes of the Echinostomatidae Family in Racing Pigeon ( Columba livia var. domestica) Lofts.

    Science.gov (United States)

    Ledwoń, Aleksandra; Dolka, Beata; Piasecki, Tomasz; Dolka, Izabella; Szeleszczuk, Piotr

    2016-06-01

    Over 4 years, only two known cases of fluke invasions were diagnosed in racing pigeons ( Columba livia ) originating from different regions of Poland. In both cases, the invasion was characterized by a very high mortality (approximately 70%), and the source of the infestation was snails of the Lymnaeidae family eaten by pigeons. Fluke invasions in pigeons are extremely rare and to date have not been described in Poland. Therefore, the occurrence of the symptoms of hemorrhagic diarrhea and sudden deaths of either adult pigeons or nestlings were suspected to be associated with poisoning. Autopsy revealed an invasion of flukes causing hemorrhagic enteritis. Renal failure and spleen atrophy were also found in the birds. Using molecular biology techniques, infestation with the fluke Echinostoma revolutum was determined in the second case. PMID:27309299

  15. The Sigma Class Glutathione Transferase from the Liver Fluke Fasciola hepatica

    OpenAIRE

    LaCourse, E. James; Perally, Samirah; Morphew, Russell M.; Moxon, Joseph V.; Prescott, Mark; Dowling, David J.; O'Neill, Sandra M.; Kipar, Anja; Hetzel, Udo; Hoey, Elizabeth; Zafra Leva, Rafael; Buffoni Perazzo, Leandro; Pérez Arévalo, José; Brophy, Peter M.

    2012-01-01

    Background: Liver fluke infection of livestock causes economic losses of over US$ 3 billion worldwide per annum. The disease is increasing in livestock worldwide and is a re-emerging human disease. There are currently no commercial vaccines, and only one drug with significant efficacy against adult worms and juveniles. A liver fluke vaccine is deemed essential as short-lived chemotherapy, which is prone to resistance, is an unsustainable option in both developed and developing cou...

  16. Simulating the Risk of Liver Fluke Infection using a Mechanistic Hydro-epidemiological Model

    Science.gov (United States)

    Beltrame, Ludovica; Dunne, Toby; Rose, Hannah; Walker, Josephine; Morgan, Eric; Vickerman, Peter; Wagener, Thorsten

    2016-04-01

    Liver Fluke (Fasciola hepatica) is a common parasite found in livestock and responsible for considerable economic losses throughout the world. Risk of infection is strongly influenced by climatic and hydrological conditions, which characterise the host environment for parasite development and transmission. Despite on-going control efforts, increases in fluke outbreaks have been reported in recent years in the UK, and have been often attributed to climate change. Currently used fluke risk models are based on empirical relationships derived between historical climate and incidence data. However, hydro-climate conditions are becoming increasingly non-stationary due to climate change and direct anthropogenic impacts such as land use change, making empirical models unsuitable for simulating future risk. In this study we introduce a mechanistic hydro-epidemiological model for Liver Fluke, which explicitly simulates habitat suitability for disease development in space and time, representing the parasite life cycle in connection with key environmental conditions. The model is used to assess patterns of Liver Fluke risk for two catchments in the UK under current and potential future climate conditions. Comparisons are made with a widely used empirical model employing different datasets, including data from regional veterinary laboratories. Results suggest that mechanistic models can achieve adequate predictive ability and support adaptive fluke control strategies under climate change scenarios.

  17. The role of evolutionary biology in research and control of liver flukes in Southeast Asia.

    Science.gov (United States)

    Echaubard, Pierre; Sripa, Banchob; Mallory, Frank F; Wilcox, Bruce A

    2016-09-01

    Stimulated largely by the availability of new technology, biomedical research at the molecular-level and chemical-based control approaches arguably dominate the field of infectious diseases. Along with this, the proximate view of disease etiology predominates to the exclusion of the ultimate, evolutionary biology-based, causation perspective. Yet, historically and up to today, research in evolutionary biology has provided much of the foundation for understanding the mechanisms underlying disease transmission dynamics, virulence, and the design of effective integrated control strategies. Here we review the state of knowledge regarding the biology of Asian liver Fluke-host relationship, parasitology, phylodynamics, drug-based interventions and liver Fluke-related cancer etiology from an evolutionary biology perspective. We consider how evolutionary principles, mechanisms and research methods could help refine our understanding of clinical disease associated with infection by Liver Flukes as well as their transmission dynamics. We identify a series of questions for an evolutionary biology research agenda for the liver Fluke that should contribute to an increased understanding of liver Fluke-associated diseases. Finally, we describe an integrative evolutionary medicine approach to liver Fluke prevention and control highlighting the need to better contextualize interventions within a broader human health and sustainable development framework. PMID:27197053

  18. OCCURRENCE OF THE LUNG FLUKE, PARAGONIMUS HETEROTREMUS IN MANIPUR, INDIA

    Institute of Scientific and Technical Information of China (English)

    2003-01-01

    Objectives.To determine the natural crustacean host,the Paragonimus species,and to investigate the potential host-parasite relationship between Manipur Paragonimus and some of the laboratory animals.Methods. The laboratory animals such as puppies,albino rats and Swiss mice were infected orally with metacercariae isolated from the fresh water crabs,Potamiscus manipurensis. The fecal specimens of the experimentally infected animals were examined microscopically for Paragonimus eggs at regular intervals. The animals were autopsied on days 35~328 after infection and the isolated worms were flattened between glass slides and fixed in 70% alcohol. The worms were stained with carmine and mounted with Canada balsam for morphological studies. The eggs were collected in 5% formol saline solution for microscopy. The flukes were classified into 4 developmental stages.Results. A total of 11 worms,5 mature,5 immature and 1 pre-adult were recovered. The morphological features of the metacercariae,worms and eggs were similar to those of Paragonimus heterotremus.Conclusion. Manipur is one of the rare areas in the world where Paragonimus heterotremus is prevalent and the puppies are ideal experimental animal host. This species may be one of the important causes of paragonimiasis in animals and humans in Manipur.

  19. Knowledge, attitude and practice related to liver fluke infection in northeast Thailand

    Institute of Scientific and Technical Information of China (English)

    Natthawut Kaewpitoon; Soraya J Kaewpitoon; Prasit Pengsaa; Chutigan Pilasri

    2007-01-01

    AIM:To investigate the knowledge,attitude and practice (KAP) in prevention and control of liver fluke infection in northeast Thailand.METHODS:A descriptive KAP survey pertaining to liver fluke infection was carried out in June 2005 to October 2006 using structured questionnaires. Data were collected by questionnaires consisting of general parameters,knowledge,attitude,practice,and a history of participation in the prevention and control of liver fluke infection.RESULTS:A total of 1077 persons who were interviewed and completed the questionnaires were enrolled in the study. The majority were females (69.5%) and many of them were 15-20 years of age (37.26%). The questionnaires revealed that information resources on Uver fluke infection included local public health volunteers (31.37%),public health officers (18.72%),televisions (14.38%),local heads of sub-districts (12.31%),doctors and nurses (9.18%),newspaper (5.72),internets (5.37%),and others (12.95%). Fifty-five point eleven percent of the population had a good level of liver fluke knowledge concerning the mode of disease transmission and 79.72% of the population had a good level of prevention and control knowledge with regards to defecation and consumption. The attitude and practice in liver fluke prevention and control were also at a good level with a positive awareness,participation,and satisfaction of 72.1% and 60.83% of the persons studied. However,good health behavior was found in 39.26% and 41.42% of the persons studied who had unhygienic defecation and ate raw cyprinoid's fish. Theresult also showed that 41.25% of the persons studied previously joined prevention and control campaigns.CONCLUSION:The persons studied have a high level of liver fluke knowledge and positive attitude. However,improvement is required regarding personal hygiene specifically with hygienic defecation and consumption of undercooked fish.

  20. Prevalence of cattle flukes infection at Andassa Livestock Research Center in north-west of Ethiopia

    Directory of Open Access Journals (Sweden)

    Asressa Yeneneh

    2012-06-01

    Full Text Available A cross sectional study was carried out from October 2010 to March 2011 at Andassa Livestock Research Center, North-West Ethiopia. The objective was to determine the prevalence of cattle flukes infection. Faecal samples were collected from a total of 384 cattle, cross breed (n= 39 and Fogera breed (n=345 of all age groups and sex. Sedimentation technique was employed for the recovery of fluke eggs from freshly collected fecal sample. The results indicated that the overall prevalence of bovine flukes infection was 60.42%. In this study, the highest prevalence was recorded from Paramphistomosis (45.83% followed by Fasciolosis (23.96%, and Schistosomosis (9.89%. The prevalence of flukes infection was higher in age group 1- 2 years old. There was significant difference in case of Paramphistomosis among age groups. No significant association was found between crossed breeds and sex groups for fluke’s infection. The prevalence of Paramphistomosis was high in cross breed (58.97% than Fogera breed (44.35%. However, in both cases, there was no significant difference. The result of the present study revealed that the prevalence of major bovine fluke infection in the study area was relatively low and is the definite proof of active infection.

  1. Efficacy of two formulations of albendazole against liver flukes in cattle.

    Science.gov (United States)

    Craig, T M; Qureshi, T; Miller, D K; Wade, C G; Rogers, J A

    1992-07-01

    Albendazole (10 mg/kg of body weight) was administered as a drench suspension or as a feed additive to 24 cattle with naturally acquired infections of Fasciola hepatica and Fascioloides magna. Cattle were euthanatized 16 to 30 days after treatment, and the number of viable flukes was counted. Viable F hepatica and F magna were decreased by 91.4% and 70.6% for drench administration and by 82.9% and 71.9% for the feed additive treatment, respectively. There was no significant difference between the efficacy of the 2 formulations in decreasing viable fluke numbers, compared with untreated controls. PMID:1497187

  2. Hyperparasitism of trichodinid ciliates on monogenean gill flukes of two marine fish.

    Science.gov (United States)

    Colorni, A; Diamant, A

    2005-06-01

    Two unusual cases of hyperparasitism of trichodinid ciliates on monogenean gill flukes are described from southern Israel (Red Sea). The first case occurred in cultured European sea bass Dicentrarchus labrax infected by Diplectanum aequans, while the second was observed in a feral devil firefish Pterois miles infected by Haliotrema sp. In both cases, the trichodinids heavily co-infested the host fish gills. The flukes were completely coated by the ciliates, which gave them a cobblestone appearance, but no damage to their tegument was apparent. Both cases are most likely a result of accidental hyperparasitism, brought about by perturbed environmental conditions. PMID:16060271

  3. The Ethics of Exploitation

    OpenAIRE

    Paul McLaughlin

    2008-01-01

    Philosophical inquiry into exploitation has two major deficiencies to date: it assumes that exploitation is wrong by definition; and it pays too much attention to the Marxian account of exploitation. Two senses of exploitation should be distinguished: the ‘moral’ or pejorative sense and the ‘non-moral’ or ‘non-prejudicial’ sense. By demonstrating the conceptual inadequacy of exploitation as defined in the first sense, and by defining exploitation adequately in the latter sense, we seek to dem...

  4. Prevalence and Sequence-Based Identity of Rumen Fluke in Cattle and Deer in New Caledonia.

    Directory of Open Access Journals (Sweden)

    Laura Cauquil

    Full Text Available An abattoir survey was performed in the French Melanesian archipelago of New Caledonia to determine the prevalence of paramphistomes in cattle and deer and to generate material for molecular typing at species and subspecies level. Prevalence in adult cattle was high at animal level (70% of 387 adult cattle and batch level (81%. Prevalence was lower in calves at both levels (33% of 484 calves, 51% at batch level. Animals from 2 of 7 deer farms were positive for rumen fluke, with animal-level prevalence of 41.4% (29/70 and 47.1% (33/70, respectively. Using ITS-2 sequencing, 3 species of paramphistomes were identified, i.e. Calicophoron calicophorum, Fischoederius elongatus and Orthocoelium streptocoelium. All three species were detected in cattle as well as deer, suggesting the possibility of rumen fluke transmission between the two host species. Based on heterogeneity in ITS-2 sequences, the C. calicophorum population comprises two clades, both of which occur in cattle as well as deer. The results suggest two distinct routes of rumen fluke introduction into this area. This approach has wider applicability for investigations of the origin of rumen fluke infections and for the possibility of parasite transmission at the livestock-wildlife interface.

  5. Prevalence, risk factors and spatial analysis of infections with liver flukes in Danish cattle herds

    DEFF Research Database (Denmark)

    Hisham Beshara Halasa, Tariq; Frankena, K.; Olsen, A.;

    Liver fluke infection, also known as fasciolosis, is a world-wide prevalent zoonotic parasitic disease infecting a wide range of host species and is caused by Fasciola hepatica. Despite of the substantial economic and animal welfare effects of the disease, knowledge on its prevalence...

  6. Prevalence, risk factors and spatial analysis of liver fluke infections in Danish cattle herds

    DEFF Research Database (Denmark)

    Olsen, Abbey; Frankena, Klaas; Bødker, Rene;

    2015-01-01

    of approximately 1.5 million cattle slaughtered in the period 2011 to 2013. Annual cumulative prevalence of recorded liver fluke findings was calculated for each year. Global and local spatial cluster analysis was used to identify and map spatial patterns of F. hepatica positive and negative herds to explore...

  7. Prevalence, risk factors and spatial analysis of liver fluke infections in Danish cattle herds

    DEFF Research Database (Denmark)

    Olsen, Abbey; Frankena, Klaas; Bødker, Rene;

    2015-01-01

    of approximately 1.5 million cattle slaughtered in the period 2011 to 2013. Annual cumulative prevalence of recorded liver fluke findings was calculated for each year. Global and local spatial cluster analysis was used to identify and map spatial patterns of Fasciola hepatica positive and negative herds to explore...

  8. A model to assess the efficacy of vaccines for control of liver fluke infection.

    Science.gov (United States)

    Turner, Joanne; Howell, Alison; McCann, Cathy; Caminade, Cyril; Bowers, Roger G; Williams, Diana; Baylis, Matthew

    2016-01-01

    Fasciola hepatica, common liver fluke, infects cattle and sheep causing disease and production losses costing approximately $3billion annually. Current control relies on drugs designed to kill the parasite. However, resistance is evident worldwide and widespread in some areas. Work towards a vaccine has identified several antigens of F. hepatica that show partial efficacy in terms of reducing worm burden and egg output. A critical question is what level of efficacy is required for such a vaccine to be useful? We have created the first mathematical model to assess the effectiveness of liver fluke vaccines under simulated field conditions. The model describes development of fluke within a group of animals and includes heterogeneity in host susceptibility, seasonal exposure to metacercariae and seasonal changes in temperature affecting metacercarial survival. Our analysis suggests that the potential vaccine candidates could reduce total fluke burden and egg output by up to 43% and 99%, respectively, on average under field conditions. It also suggests that for a vaccine to be effective, it must protect at least 90% of animals for the whole season. In conclusion, novel, partial, vaccines could contribute substantially towards fasciolosis control, reducing usage of anthelmintics and thus delaying the spread of anthelmintic resistance. PMID:27009747

  9. Opisthorchis viverrini-like liver fluke in birds from Vietnam: morphological variability and rDNA/mtDNA sequence confirmation.

    Science.gov (United States)

    Dao, T H; Nguyen, T G; Victor, B; Gabriël, S; Dorny, P

    2014-12-01

    Flukes were found in the bile ducts of domestic ducks (Anas platyrhynchos), necropsied in the Binh Dinh province of Central Vietnam. Following staining, morphological characteristics of the bird flukes were compatible with Opisthorchis viverrini, although some characteristics differed from those described in specimens collected from mammal hosts. Computation of the phylogenetic trees on the partial sequences of the second internal ribosomal spacer (ITS2) of the ribosomal DNA and cytochrome c oxidase subunit I (COI) markers of the mitochondrial DNA showed close similarity of the 'bird' Opisthorchis sp. with O. viverrini. We speculate that these bird flukes are O. viverrini that show intraspecies morphological and molecular variability compared to isolates from mammals. This demonstrates the complex epidemiological situation of opisthorchiasis in Vietnam and urges investigations on the potential of birds as a reservoir host of this zoonotic fluke. PMID:23721954

  10. Population dynamics and host reactions in young foxes following experimental infection with the minute intestinal fluke, Haplorchis pumilio

    Directory of Open Access Journals (Sweden)

    Nissen Sofie

    2013-01-01

    Full Text Available Abstract Background Infections with fish-borne zoonotic trematodes (FZT including the minute intestinal fluke, Haplorchis pumilio, are highly prevalent in Southeast Asia. However, little is known about the infection dynamics and clinical symptoms in the final hosts which include a range of animal species and man. We aimed to generate such information using an experimental model with H. pumilio in foxes. Method Eight commercially bred foxes were each orally infected with 2000 H. pumilio metacercariae. Another three foxes served as uninfected controls. Faecal examination for eggs was performed twice weekly. The body weight was measured, standard haematological and biochemical analysis were performed regularly. All foxes were euthanized at day 56 post infection (p.i.. Adult worms were quantified and location in the small intestine noted. Results Anorexia was observed in all infected foxes starting day 12 p.i. and lasting for approximately a week. A weight loss was noticed in the infected group in weeks 3–6 p.i. Five of eight infected foxes excreted H. pumilio eggs day 9 p.i. onwards, the remaining three started on day 13 p.i. Mean (± SD faecal egg counts showed an initial peak at day 16–20 with a maximum of 1443 ± 1176 eggs per gram of faeces (epg, where after a stable egg output around 4–500 epg was seen. Worm burdens ranged between 116–2070 adult flukes with a mean (± SD worm recovery of 948 ± 666. The majority of worms were found in the lower part of the jejunum. Total white blood cell and lymphocyte counts were significant lower in the infected group from first week p.i. onwards and throughout the study period. A significantly lower level of eosinophils was found in week 2 p.i. and transient anaemia was seen in week 2 and 4 p.i. Conclusion This study showed a short prepatency period, an initial peak in egg excretion, establishment of infection in all animals with predilection site in the lower jejunum and a marked but

  11. The Ethics of Exploitation

    Directory of Open Access Journals (Sweden)

    Paul McLaughlin

    2008-11-01

    Full Text Available Philosophical inquiry into exploitation has two major deficiencies to date: it assumes that exploitation is wrong by definition; and it pays too much attention to the Marxian account of exploitation. Two senses of exploitation should be distinguished: the ‘moral’ or pejorative sense and the ‘non-moral’ or ‘non-prejudicial’ sense. By demonstrating the conceptual inadequacy of exploitation as defined in the first sense, and by defining exploitation adequately in the latter sense, we seek to demonstrate the moral complexity of exploitation. We contend, moreover, that moral evaluation of exploitation is only possible once we abandon a strictly Marxian framework and attempt, in the long run, to develop an integral ethic along Godwinian lines.

  12. The tumorigenic liver fluke Opisthorchis viverrini--multiple pathways to cancer.

    Science.gov (United States)

    Sripa, Banchob; Brindley, Paul J; Mulvenna, Jason; Laha, Thewarach; Smout, Michael J; Mairiang, Eimorn; Bethony, Jeffrey M; Loukas, Alex

    2012-10-01

    Liver fluke infection caused by Opisthorchis viverrini is a major public health problem in Thailand and adjacent countries. In addition to infection-associated morbidity, infection with O. viverrini and the related Clonorchis sinensis are unarguable risk factors for cholangiocarcinoma (CAA, bile-duct cancer). Here we review the pathogenesis of opisthorchiasis and the association between O. viverrini infection and bile-duct cancer, focusing on the molecular parallels between wound healing, chronic inflammation, and cancer development. We review a schema for human disease progression from fluke infection, chronic opisthorchiasis, advanced periductal fibrosis, and cholangiocarcinogenesis, and present a rationale for biomarker discovery to facilitate early intervention. We conclude by addressing post-genomic advances with a view to developing new control strategies to combat this infectious cancer. PMID:22947297

  13. Blood loss estimation in Schistosoma incognitum by the use of 51Cr labelled red cells

    International Nuclear Information System (INIS)

    C42 Red blood cells labelled with 51Cr were used to study the pathophysiology of S. incognitum infection. Blood volume, cell volume, faecal blood excretion and the half life of the red cells were determined. It was shown that in rabbits infected with the blood fluke, there was loss of blood, which may result in the development of anaemia in the infected animals. (author)

  14. The tumorigenic liver fluke Opisthorchis viverrini –multiple pathways to cancer

    OpenAIRE

    Sripa, Banchob; Brindley, Paul J.; Mulvenna, Jason; Laha, Thewarach; Michael J. Smout; Mairiang, Eimorn; Bethony, Jeffrey M; Loukas, Alex

    2012-01-01

    Liver fluke infection caused by Opisthorchis viverrini is a major public health problem in Thailand and adjacent countries. In addition to infection-associated morbidity, infection with O. viverrini and the related Clonorchis sinensis are unarguable risk factors for cholangiocarcinoma, bile duct cancer. Here we review the pathogenesis of opisthorchiasis and the association of O. viverrini infection and bile duct cancer, focusing on the molecular parallels between wound healing, chronic inflam...

  15. Infection with the carcinogenic liver fluke Opisthorchis viverrini modifies intestinal and biliary microbiome

    OpenAIRE

    Plieskatt, Jordan L; Deenonpoe, Raksawan; Mulvenna, Jason P; Krause, Lutz; Sripa, Banchob; Bethony, Jeffrey M; Brindley, Paul J.

    2013-01-01

    Opisthorchis viverrini is a fish-borne trematode endemic in East Asia. Following ingestion, the flukes locate to the biliary treȩ where chronic infection frequently leads to cholangiocarcinoma (CCA). The mechanisms by which O. viverrini infection culminates in CCA remain unknown. An unexplored aspect is its influence on the host microbiome. In the hamster, infection with this pathogen reliably leads to CCA. Genomic DNAs of microbiota from colorectal contents and bile of hamsters and from whol...

  16. CpG-island methylation study of liver fluke-related cholangiocarcinoma

    OpenAIRE

    Sriraksa, R; Zeller, C.; El-Bahrawy, M A; Dai, W; Daduang, J; Jearanaikoon, P; Chau-in, S; Brown, R; Limpaiboon, T

    2011-01-01

    Background: Genetic changes have been widely reported in association with cholangiocarcinoma (CCA), while epigenetic changes are poorly characterised. We aimed to further evaluate CpG-island hypermethylation in CCA at candidate loci, which may have potential as diagnostic or prognostic biomarkers. Methods: We analysed methylation of 26 CpG-islands in 102 liver fluke related-CCA and 29 adjacent normal samples using methylation-specific PCR (MSP). Methylation of interest loci was confirmed usin...

  17. Cathepsin F Cysteine Protease of the Human Liver Fluke, Opisthorchis viverrini

    OpenAIRE

    Pinlaor, Porntip; Kaewpitoon, Natthawut; Laha, Thewarach; Sripa, Banchob; Kaewkes, Sasithorn; Morales, Maria E.; Mann, Victoria H.; Parriott, Sandi K.; Suttiprapa, Sutas; Robinson, Mark W.; To, Joyce; Dalton, John P.; Loukas, Alex; Brindley, Paul J.

    2009-01-01

    Background The liver fluke Opisthorchis viverrini is classified as a class I carcinogen due to the association between cholangiocarcinoma and chronic O. viverrini infection. During its feeding activity within the bile duct, the parasite secretes several cathepsin F cysteine proteases that may induce or contribute to the pathologies associated with hepatobiliary abnormalities. Methodology/Principal Findings Here, we describe the cDNA, gene organization, phylogenetic relationships, immunolocali...

  18. Prevalence, risk factors and spatial analysis of liver fluke infections in Danish cattle herds

    OpenAIRE

    Olsen, A; Frankena, K; Bodker, R.; Toft, N.; Thamsborg, S.M.; Enemark, H. L.; Halasa, T.

    2015-01-01

    Background: Fasciola hepatica, a trematode parasite (liver fluke), infects a wide range of host species causing fasciolosis. The disease is prevalent world-wide and causes considerable economic losses to the livestock industry. Fasciolosis is regarded as an emerging food-borne zoonosis. To promote awareness among farmers and to implement strategies to control the infection, this study examined the prevalence, spatial distribution and risk factors for Fasciola hepatica infection in Danish catt...

  19. Structural Basis for Inhibition of Cathepsin B Drug Target from the Human Blood Fluke, Schistosoma mansoni

    Czech Academy of Sciences Publication Activity Database

    Jílková, Adéla; Řezáčová, Pavlína; Lepšík, Martin; Horn, Martin; Váchová, Jana; Fanfrlík, Jindřich; Brynda, Jiří; McKerrow, J. H.; Caffrey, C. R.; Mareš, Michael

    2011-01-01

    Roč. 286, č. 41 (2011), s. 35770-35881. ISSN 0021-9258 R&D Projects: GA ČR GA203/09/1585; GA ČR GAP208/11/0295; GA MŠk OC09007 Institutional research plan: CEZ:AV0Z40550506; CEZ:AV0Z50520514 Keywords : cathepsin B * schistosoma * crystal structure Subject RIV: CC - Organic Chemistry Impact factor: 4.773, year: 2011

  20. Identification of lead chemotherapeutic agents from medicinal plants against blood flukes and whipworms.

    Science.gov (United States)

    Wangchuk, Phurpa; Giacomin, Paul R; Pearson, Mark S; Smout, Michael J; Loukas, Alex

    2016-01-01

    Schistosomiasis and trichuriasis are two of the most common neglected tropical diseases (NTD) that affect almost a billion people worldwide. There is only a limited number of effective drugs to combat these NTD. Medicinal plants are a viable source of parasiticides. In this study, we have investigated six of the 19 phytochemicals isolated from two Bhutanese medicinal plants, Corydalis crispa and Pleurospermum amabile, for their anthelmintic properties. We used the xWORM technique and Scanning Electron Microscope-based imaging to determine the activity of the compounds. Of the six compounds tested, isomyristicin and bergapten showed significant anthelmintic activity against Schistosoma mansoni and Trichuris muris with bergapten being the most efficacious compound one against both parasites (S. mansoni IC50 = 8.6 μg/mL and T. muris IC50 = 10.6 μg/mL) and also against the schistosomulum stage of S. mansoni. These two compounds induced tegumental damage to S. mansoni and affected the cuticle, bacillary bands and bacillary glands of T. muris. The efficacy against multiple phylogenetically distinct parasites and different life stages, especially the schistosomulum where praziquantel is ineffective, makes isomyristicin and bergapten novel scaffolds for broad-spectrum anthelmintic drug development that could be used for the control of helminths infecting humans and animals. PMID:27572696

  1. Reducing the future threat from (liver) fluke: realistic prospect or quixotic fantasy?

    Science.gov (United States)

    Fairweather, Ian

    2011-08-01

    The liver fluke remains an economically significant parasite of livestock and is emerging as an important zoonotic infection of humans. The incidence of the disease has increased in the last few years, as a possible consequence of changes to the World's climate. Future predictions suggest that this trend is likely to continue. Allied to the changing pattern of disease, reports of resistance to triclabendazole (TCBZ) have appeared in the literature, although they do not all represent genuine cases of resistance. Nevertheless, any reports of resistance are a concern, because triclabendazole is the only drug that has high activity against the migratory and damaging juvenile stages of infection. How to deal with the twin problems (of increasing incidence and drug resistance) is the overall theme of the session on "Trematodes: Fasciola hepatica epidemiology and control" and of this review to introduce the session. Greater knowledge of fluke epidemiology and population genetics will highlight those regions where surveillance is most required and indicate how quickly resistant populations of fluke may arise. Models of disease risk are becoming increasingly sophisticated and precise, with more refined data analysis programmes and Geographic Information Systems (GIS) data. Recent improvements have been made in our understanding of the action of triclabendazole and the ways in which flukes have become resistant to it. While microtubules are the most likely target for drug action, tubulin mutations do not seem to be involved in the resistance mechanism. Rather, upregulation of drug uptake and metabolism processes appear to be more important and the data relating to them will be discussed. The information may help in the design of new treatment strategies or pinpoint potential molecular markers for monitoring fluke populations. Advances in the identification of novel targets for drugs and vaccines will be made by the various "-omics" technologies that are now being applied to

  2. Anthropology of sexual exploitation

    Directory of Open Access Journals (Sweden)

    Lalić Velibor

    2009-01-01

    Full Text Available In this paper, the authors observe sexual exploitation from an anthropological perspective. They analyze the rational, ethical, emotional and mythological dimensions of human sexuality. Consequently, after setting the phenomenon in a social and historical context, sexual exploitation is closely observed in the contemporary age. Based on thoughts of relevant thinkers, they make the conclusion that the elimination of sexual exploitation is not an utterly legal issue, but political and economical issues as well. Namely, legal norms are not sufficient to overcome sexual exploitation, but, political and economical relationships in contemporary societies, which will be based on sincere equal opportunities must be established.

  3. The Facets of Exploitation

    OpenAIRE

    Fleurbaey, Marc

    2012-01-01

    This paper proposes four concepts of exploitation that encapsulate common uses of the word in social interactions: unfair advantage, unequal exchange, using persons as means, free-riding. It briefly discusses how these concepts appear in the literature (the first two are prominent in Roemer's classical work), and then examines how these forms of exploitation are related and how they can occur.

  4. EXPLOITATION OF GRANITE BOULDER

    Directory of Open Access Journals (Sweden)

    Ivan Cotman

    1994-12-01

    Full Text Available The processes of forming, petrography, features, properties and exploitation of granite boulders are described. The directional drilling and black powder blasting is the succesful method in exploitation of granite boulders (boulder technology (the paper is published in Croatian.

  5. Risk Factors for Opisthorchis viverrini and Minute Intestinal Fluke Infections in Lao PDR, 2009–2011

    OpenAIRE

    Yoon, Hee Jung; Ki, Moran; Eom, Keeseon; Yong, Tai-Soon; Chai, Jong-Yil; Min, Duk-Young; Rim, Han-Jong; Sohn, Woon-Mok; Insisiengmay, Bounnaloth; Phommasack, Bounlay

    2014-01-01

    The purpose of this report is to compare the prevalence of Opisthorchis viverrini/minute intestinal fluke (Ov/MIF) in Lao People's Democratic Republic according to different regions and evaluate the effect of ingestion of raw freshwater fish on the infection. Demographic data, behavioral data, and symptoms were obtained, and the Kato–Katz method was used for the diagnosis of Ov/MIF. In total, 3,046 individuals were enrolled. The risk factors associated with acquisition of Ov/MIF were raw fish...

  6. DOREMI - Exploitation plan

    OpenAIRE

    Lupi??ez-Villanueva, Francisco; Colombo, Matteo; Vozzi, Federico; Ferro, Erina; Fortunati, Luigi; Palumbo, Filippo

    2014-01-01

    The objective of this report is to outline the DOREMI solution exploitation strategy that will be followed to define the exploitation plan of DOREMI consortium. The exploitation plan will be developed during the project life cycle and reported in the deliverables 7.3.1, 7.3.2 and 7.3.3. The main element of the report is the definition of the target markets that would be addressed by DOREMI products and services. According to the analysis conducted in the report, the target market relies on tw...

  7. Fasciola hepatica: Histological changes in the somatic and reproductive tissues of liver fluke following closantel treatment of experimentally-infected sheep.

    Science.gov (United States)

    Scarcella, S; Hanna, R E B; Brennan, G P; Solana, H; Fairweather, I

    2016-01-15

    Lambs infected with the Cullompton isolate of Fasciola hepatica were treated orally or subcutaneously with 10mg/kg of closantel at 16 weeks post-infection. Adult flukes were recovered from the liver of individual animals at 12h, 24h, or 36h post-treatment. The flukes were processed for histological analysis. In general, degenerative changes in the reproductive and somatic tissues were progressive, and were most marked in flukes exposed to closantel in vivo for 36h. However, flukes from a 12h subcutaneously-treated lamb showed marked deterioration of the testis, possibly because a portion of the dose has been delivered intravenously. Fewer intact eggs were seen in the uterus of flukes exposed to closantel for longer times (whether administered subcutaneously or orally to the host). The most conspicuous closantel-induced effect in flukes from treated hosts was progressive damage to the tegumental syncytium. While the flukes from 24h-treated hosts showed relatively minor damage to limited areas of the syncytium, towards the posterior end, the flukes from 36h-treated hosts (and flukes from the lamb that putatively received intravenous dosage) had lost large areas of the surface syncytium from the posterior end and dorsal surface, although the syncytium over the anterior end and the anterior ventral surface was largely spared. In areas where the syncytium had sloughed, the underlying structures such as the vitelline follicles, gut profiles and testis profiles, showed marked degeneration and breakdown. Other changes included cell depletion and early stage apoptosis in the testis, ovary and vitelline follicles. This study establishes a model for histological changes in closantel-sensitive F. hepatica exposed to closantel in vivo. Histopathological studies could be complementary to the efficacy controlled test for for closantel resistance in fluke populations. PMID:26790736

  8. FAQ: Child Sexual Exploitation

    Science.gov (United States)

    ... Support FAQ: Child Sexual Exploitation What is child pornography? Federal law (18 U.S.C. §2256(8)) defines ... person under the age of 18. Is child pornography a crime? It is a federal crime to ...

  9. Fasciola hepatica: Histology of the Reproductive Organs and Differential Effects of Triclabendazole on Drug-Sensitive and Drug-Resistant Fluke Isolates and on Flukes from Selected Field Cases

    Directory of Open Access Journals (Sweden)

    Robert Hanna

    2015-06-01

    Full Text Available This review summarises the findings of a series of studies in which the histological changes, induced in the reproductive system of Fasciola hepatica following treatment of the ovine host with the anthelmintic triclabendazole (TCBZ, were examined. A detailed description of the normal macroscopic arrangement and histological features of the testes, ovary, vitelline tissue, Mehlis’ gland and uterus is provided to aid recognition of the drug-induced lesions, and to provide a basic model to inform similar toxicological studies on F. hepatica in the future. The production of spermatozoa and egg components represents the main energy consuming activity of the adult fluke. Thus the reproductive organs, with their high turnover of cells and secretory products, are uniquely sensitive to metabolic inhibition and sub-cellular disorganisation induced by extraneous toxic compounds. The flukes chosen for study were derived from TCBZ-sensitive (TCBZ-S and TCBZ-resistant (TCBZ-R isolates, the status of which had previously been proven in controlled clinical trials. For comparison, flukes collected from flocks where TCBZ resistance had been diagnosed by coprological methods, and from a dairy farm with no history of TCBZ use, were also examined. The macroscopic arrangement of the reproductive system in flukes was studied using catechol/carmine stained whole mounts, and the histology of the main organs was examined using conventional haematoxylin-eosin stained sections. Validation of apoptosis in the fluke sections was carried out using an in situ hybridisation method designed to label endonuclease-induced DNA strand breaks. In TCBZ-S flukes exposed to TCBZ metabolites for 24–96 h in vivo, but not in TCBZ-R flukes, those tissues where active meiosis and/or mitosis occurred (testis, ovary, and vitelline follicles, were found to display progressive loss of cell content. This was due to apparent failure of cell division to keep pace with expulsion of the mature or

  10. Bovine and ovine rumen fluke in Ireland-Prevalence, risk factors and species identity based on passive veterinary surveillance and abattoir findings.

    Science.gov (United States)

    Toolan, Dónal P; Mitchell, Gillian; Searle, Kate; Sheehan, Maresa; Skuce, Philip J; Zadoks, Ruth N

    2015-09-15

    The prevalence of rumen fluke, the incidence of clinical paramphistomosis and the trematode's species identity were studied in cattle and sheep in the Republic of Ireland using passive veterinary surveillance (faecal examination and necropsy results; 2010-2013) and abattoir data. Based on faecal examination, the prevalence of rumen fluke was higher in cattle than in sheep. Rumen fluke prevalence in cattle and sheep fluctuated over the year and in most years (2011-2013), prevalence was higher in winter (December-February) than in summer (June-August). For 3 of 4 years studied, there was no correlation between monthly prevalence of rumen fluke and prevalence of liver fluke as estimated by faecal examination. At sample level, joint occurrence of rumen fluke and liver fluke was 1.1-2.0 times more common than would be expected under the assumption of independence. Based on necropsy data, a spike in deaths attributed to paramphistomosis was observed in 2012, when rainfall was unusually high. This spike in mortality was not accompanied by a spike in faecal prevalence, emphasizing that the incidence of disease, which is due to high burdens of juvenile rumen fluke in the gut, is not correlated with prevalence of infection, which is measured by faecal examination and reflects presence of adult fluke in the rumen. At slaughter, 52% of 518 cattle from 101 herds were positive for rumen fluke, compared to 14% of 158 sheep. Prevalence in cattle was higher than reported in most studies from mainland Europe and varied by animal category, age, sex, abattoir visit and location (county) of farm from which the animal was submitted for slaughter, but in multivariate analysis, only sampling month and county were significantly associated with detection of rumen fluke. The identity of rumen fluke in cattle and sheep was confirmed as Calicophoron daubneyi. Although C. daubneyi is thought to share an intermediate host snail with Fasciola hepatica, the differences in prevalence between host

  11. Multiple liver abscesses in a dog secondary to the liver fluke Metorchis conjunctus treated by percutaneous transhepatic drainage and alcoholization.

    Science.gov (United States)

    Lemetayer, Julie D; Snead, Elizabeth C; Starrak, Greg S; Wagner, Brent A

    2016-06-01

    A 1-year-old German shepherd × husky cross dog was diagnosed with multiple liver abscesses and severe cholangitis secondary to the liver fluke Metorchis conjunctus. The dog was successfully treated with 2 percutaneous transhepatic drainage and alcoholization procedures, and a prolonged course of antibiotics and praziquantel. PMID:27247459

  12. Dissemination and Exploitation Strategy

    DEFF Research Database (Denmark)

    Badger, Merete; Monaco, Lucio; Fransson, Torsten; Farinetti, Laura; Corno, Fulvio; Vercoulen, Frank

    Technology in Sweden, Politecnico di Torino in Italy, and Eindhoven University of Technology in the Netherlands. The project is partially funded by the European Commission under the 7th Framework Programme (project no. RI-283746). This report describes the final dissemination and exploitation strategy for...... project Virtual Campus Hub. A preliminary dissemination and exploitation plan was setup early in the project as described in the deliverable D6.1 Dissemination strategy paper - preliminary version. The plan has been revised on a monthly basis during the project’s lifecycle in connection with the virtual...

  13. Characteristics and molecular phylogeny of Fasciola flukes from Bangladesh, determined based on spermatogenesis and nuclear and mitochondrial DNA analyses.

    Science.gov (United States)

    Mohanta, Uday Kumar; Ichikawa-Seki, Madoka; Shoriki, Takuya; Katakura, Ken; Itagaki, Tadashi

    2014-07-01

    This study aimed to precisely discriminate Fasciola spp. based on DNA sequences of nuclear internal transcribed spacer 1 (ITS1) and mitochondrial nicotinamide adenine dinucleotide (NADH) dehydrogenase subunit 1 (nad1) gene. We collected 150 adult flukes from the bile ducts of cattle, buffaloes, sheep, and goats from six different regions of Bangladesh. Spermatogenic status was determined by analyzing stained seminal vesicles. The ITS1 types were analyzed using the polymerase chain reaction-restriction fragment length polymorphism (PCR-RFLP) method. The nad1 haplotypes were identified based on PCR and direct sequencing and analyzed phylogenetically by comparing with nad1 haplotypes of Fasciola spp. from other Asian countries. Of the 127 aspermic flukes, 98 were identified as Fg type in ITS1, whereas 29 were identified as Fh/Fg type, indicating a combination of ITS1 sequences of Fasciola hepatica and Fasciola gigantica. All the 127 aspermic flukes showed Fsp-NDI-Bd11 in nad1 haplotype with nucleotide sequences identical to aspermic Fasciola sp. from Asian countries. Further, 20 spermic flukes were identified as F. gigantica based on their spermatogenic status and Fg type in ITS1. F. gigantica population was thought to be introduced into Bangladesh considerably earlier than the aspermic Fasciola sp. because 11 haplotypes with high haplotype diversity were detected from the F. gigantica population. However, three flukes from Bangladesh could not be precisely identified, because their spermatogenic status, ITS1 types, and nad1 haplotypes were ambiguous. Therefore, developing a robust method to distinguish aspermic Fasciola sp. from other Fasciola species is necessary in the future. PMID:24781019

  14. Risk factors for Opisthorchis viverrini and minute intestinal fluke infections in Lao PDR, 2009-2011.

    Science.gov (United States)

    Yoon, Hee Jung; Ki, Moran; Eom, Keeseon; Yong, Tai-Soon; Chai, Jong-Yil; Min, Duk-Young; Rim, Han-Jong; Sohn, Woon-Mok; Insisiengmay, Bounnaloth; Phommasack, Bounlay

    2014-08-01

    The purpose of this report is to compare the prevalence of Opisthorchis viverrini/minute intestinal fluke (Ov/MIF) in Lao People's Democratic Republic according to different regions and evaluate the effect of ingestion of raw freshwater fish on the infection. Demographic data, behavioral data, and symptoms were obtained, and the Kato-Katz method was used for the diagnosis of Ov/MIF. In total, 3,046 individuals were enrolled. The risk factors associated with acquisition of Ov/MIF were raw fish consumption and province. Khong Island showed the highest prevalence (odds ratio = 80.1, 95% confidence interval = 47.9-133.9, P hygiene), and access to clean water and sanitation should be considered. PMID:24980495

  15. Liver fluke disease (fascioliasis): epidemiology, economic impact and public health significance.

    Science.gov (United States)

    Saleha, A A

    1991-12-01

    Liver fluke disease (fascioliasis) is an important parasitic disease found worldwide affecting sheep, goats, cattle and buffalo, as well as other domestic ruminants. The common causative agents are Fasciola hepatica and F. gigantica which require various species of Lymnaea, fresh water snails, as their intermediate hosts. The epidemiology of the disease and its prevalence in Malaysia is mentioned briefly. The disease causes considerable impact on the economy of the livestock industry. The economic losses consist of costs of anthelmintics, drenches, labor, liver condemnation at meat inspection; and losses in production due to mortality, reduction in meat, milk and wool production; and reduction in growth rate, fertility and draught power. The disease also has public health significance, causing human fascioliasis and "halzoun". PMID:1822928

  16. DIAGNOSIS AND THERAPY OF LIVER FLUKE (FASCIOLOIDES MAGNA) INFECTION IN FALLOW DEER (DAMA DAMA) IN SERBIA.

    Science.gov (United States)

    Trailović, Saša M; Marinković, Darko; Kulišić, Zoran

    2016-04-28

    Giant liver fluke ( Fascioloides magna ) infection is an important health problem of cervids in southeastern Europe. We measured the prevalence and intensity of infection with F. magna in a fenced area near the Danube River in the South Bačka District of Serbia. Parasitologic, pathomorphologic, and histopathologic examinations were conducted from November 2007 to February 2008, beginning with a population of 127 adult fallow deer ( Dama dama ). After a positive diagnosis, therapy with triclabendazole-medicated corn was applied. Deer were treated at four baiting stations, using medicated feed providing triclabendazole at an estimated dose of 10-14 mg/kg of body weight per deer. Treatment lasted for 7 d in early February 2008 and an additional 7 d 2 wk later. For the complete success of pharmacotherapy it was necessary to prevent any contact of deer with the snail intermediate host ( Galba truncatula ). Intervention in the habitat, removing grass and low vegetation, and draining ponds reduces the possibility of contact. Six months after the treatment, livers of hunted deer were reddish, with fibrous tracks; pigmentation and cysts in the parenchyma were surrounded by a fibrous capsule and their fecal samples contained no eggs of F. magna . Over the following years, livers of hunted deer were negative, and the last control cull in March 2015 confirmed complete absence of infection. We reconfirmed the presence of giant liver flukes in fallow deer in Serbia, apparently the result of natural spread across the Danube from Hungary and Croatia. We also report that the treatment of deer with triclabendazole-medicated corn is an effective method for administration of therapeutic doses of drug in semicaptive deer. Interventions in the environment are necessary to prevent recontact of deer with habitats used by the snail intermediate host, and enable the success of the therapy. PMID:26967130

  17. Transcriptome analysis of the adult rumen fluke Paramphistomum cervi following next generation sequencing.

    Science.gov (United States)

    Choudhary, Vijayata; Garg, Sweta; Chourasia, Reetika; Hasnani, J J; Patel, P V; Shah, Tejas M; Bhatt, Vaibhav D; Mohapatra, Amitbikram; Blake, Damer P; Joshi, Chaitanya G

    2015-10-01

    Rumen flukes are parasitic trematodes (Platyhelminthes: Digenea) of major socioeconomic importance in many countries. Key representatives, such as Paramphistomum cervi, can cause "Rumen fluke disease" or paramphistomosis and undermine economic animal productivity and welfare. P. cervi is primarily a problem in sheep, goat and buffalo production as a consequence of reduced weight gain and milk production, clinical disease or death. Recent technological advances in genomics and bioinformatics now provide unique opportunities for the identification and pre-validation of drug targets and vaccines through improved understanding of the biology of pathogens such as P. cervi and their relationship with their hosts at the molecular level. Here, we report next generation transcriptome sequencing analysis for P. cervi. RNAseq libraries were generated from RNA extracted from 15 adult P. cervi parasites sampled from each of three different host species (sheep, goat and buffalo) and a reference transcriptome was generated by assembly of all Ion Torrent PGM sequencing data. Raw reads (7,433,721 in total) were initially filtered for host nucleotide contamination and ribosomal RNAs and the remaining reads were assembled into 43,753 high confidence transcript contigs. In excess of 50% of the assembled transcripts were annotated with domain- or protein sequence similarity derived functional information. The reference adult P. cervi transcriptome will serve as a basis for future work on the biology of this important parasite. Using the widely investigated trematode virulence factor and vaccine candidate Cathepsin L as an example, the epitope GPISIAINA was found to be conserved in P. cervi isolated from three different host species supporting its candidacy for vaccine development and illustrating the utility of the adult P. cervi transcriptome. PMID:26049095

  18. In vitro evaluation of anthelmintic property of ethno-veterinary plant extracts against the liver fluke Fasciola gigantica.

    Science.gov (United States)

    Jeyathilakan, N; Murali, K; Anandaraj, A; Abdul Basith, S

    2012-04-01

    The present study was envisaged to evaluate the efficacy of ethno-medicinal plant aqueous extracts such as Allium sativum, Lawsonia inermis, and Opuntia ficus indica in vitro in comparison with the chemotherapeutic agent, Oxyclozanide on Fasciola gigantica adults. The efficacy was evaluated by gross visual motility and mortality of F. gigantica with score index, light microscopic examination of carmine stained flukes and histopathology of treated flukes. Based on the in vitro trials conducted using above plant extracts at 1 percent, 2.5 percent and 5 percent concentration, the extracts of O. ficus indica showed flukicidal effect at 2.5 and 5% concentration. However A. sativum and L. inermis were effective at 5% concentration only. The study indicated the potential for developing herbal-based anthelmintics to control F. gigantica in livestock. PMID:23543611

  19. Prevalence of Platynosomum fastosum infection in free roaming cats in northeastern Brazil: Fluke burden and grading of lesions.

    Science.gov (United States)

    Braga, R R; Teixeira, A C; Oliveira, J A A; Cavalcanti, L P G

    2016-08-30

    The objective of this paper was to investigate prevalence and parasite load of the trematode Platynosomum fastosum infection and the risk of developing cholangitis/cholangiohepatitis among infected domestic cats in a city of northeastern Brazil, and to characterize the influence of fluke burden in the formation of lesions in liver and gallbladder. A total of 141 cats was necropsied and examined for the presence of P. fastosum. The observed prevalence was 42.6% (60/141, 95% CI=34.2-50.9). Parasite load varied from 1 to 219 flukes per animal. Adult cats were more frequently infected than kittens (proaming cats in northeastern Brazil, with increased risk of liver disease. PMID:27523932

  20. Genetic and epigenetic alterations of RIZ1 and the correlation to clinicopathological parameters in liver fluke-related cholangiocarcinoma

    OpenAIRE

    Khaenam, Prasong; Jearanaikoon, Patcharee; Pairojkul, Chawalit; Bhudhisawasdi, Vajarabhongsa; LIMPAIBOON, TEMDUANG

    2010-01-01

    The retinoblastoma interacting zinc finger (RIZ1) gene is adjacent to D1S228 where microsatellite instability has been associated with poor patient survival in liver fluke-associated cholangiocarcinoma (CCA). An understanding of the molecular mechanisms underlying the carcinogenesis and pathogenesis of CCA is necessary to improve patient survival. Therefore, we determined the genetic and epigenetic alterations of RIZ1 in 81 CCA samples and 69 matched non-tumor tissues. Methylation was found i...

  1. A Granulin-Like Growth Factor Secreted by the Carcinogenic Liver Fluke, Opisthorchis viverrini, Promotes Proliferation of Host Cells

    OpenAIRE

    Smout, Michael J.; Laha, Thewarach; Mulvenna, Jason; Sripa, Banchob; Suttiprapa, Sutas; Jones, Alun; Brindley, Paul J.; Loukas, Alex

    2009-01-01

    The human liver fluke, Opisthorchis viverrini, infects millions of people throughout south-east Asia and is a major cause of cholangiocarcinoma, or cancer of the bile ducts. The mechanisms by which chronic infection with O. viverrini results in cholangiocarcinogenesis are multi-factorial, but one such mechanism is the secretion of parasite proteins with mitogenic properties into the bile ducts, driving cell proliferation and creating a tumorigenic environment. Using a proteomic approach, we i...

  2. Hacking the art of exploitation

    CERN Document Server

    Erickson, Jon

    2003-01-01

    A comprehensive introduction to the techniques of exploitation and creative problem-solving methods commonly referred to as "hacking," Hacking: The Art of Exploitation is for both technical and non-technical people who are interested in computer security. It shows how hackers exploit programs and write exploits, instead of just how to run other people's exploits. Unlike many so-called hacking books, this book explains the technical aspects of hacking, including stack based overflows, heap based overflows, string exploits, return-into-libc, shellcode, and cryptographic attacks on 802.11b.

  3. Molecular evidence shows that the liver fluke Fasciola gigantica is the predominant Fasciola species in ruminants from Pakistan.

    Science.gov (United States)

    Chaudhry, U; van Paridon, B; Shabbir, M Z; Shafee, M; Ashraf, K; Yaqub, T; Gilleard, J

    2016-03-01

    Fascioliasis is an important disease affecting livestock, with great costs to producers worldwide. It has also become a serious issue for human populations in some endemic areas as an emerging zoonotic infection. There are two Fasciola species of liver fluke responsible for this disease, which occur worldwide, Fasciola hepatica and Fasciola gigantica. Identifying these two species on the basis of adult or egg morphology requires specialist knowledge due to the similarity of characters, and may misidentify putative intermediate or hybrid forms. In this study we sequenced the internal transcribed spacer 2 (ITS-2) rDNA of liver flukes collected from multiple species of hosts from seven localities in the Punjab and Baluchistan provinces of Pakistan, to determine the distribution of these two species. All 46 flukes processed in this study, collected from seven sites, showed the rDNA ITS-2 genotype corresponding to F. gigantica, contradicting previous reports, based on adult and egg morphology, that both species are present in Pakistan, with F. hepatica being the more common. PMID:25758445

  4. Liver fluke-induced hepatic oxysterols stimulate DNA damage and apoptosis in cultured human cholangiocytes.

    Science.gov (United States)

    Jusakul, Apinya; Loilome, Watcharin; Namwat, Nisana; Haigh, W Geoffrey; Kuver, Rahul; Dechakhamphu, Somkid; Sukontawarin, Pradit; Pinlaor, Somchai; Lee, Sum P; Yongvanit, Puangrat

    2012-03-01

    Oxysterols are cholesterol oxidation products that are generated by enzymatic reactions through cytochrome P450 family enzymes or by non-enzymatic reactions involving reactive oxygen and nitrogen species. Oxysterols have been identified in bile in the setting of chronic inflammation, suggesting that biliary epithelial cells are chronically exposed to these compounds in certain clinical settings. We hypothesized that biliary oxysterols resulting from liver fluke infection participate in cholangiocarcinogenesis. Using gas chromatography/mass spectrometry, we identified oxysterols in livers from hamsters infected with Opisthorchis viverrini that develop cholangiocarcinoma. Five oxysterols were found: 7-keto-cholesta-3,5-diene (7KD), 3-keto-cholest-4-ene (3K4), 3-keto-cholest-7-ene (3K7), 3-keto-cholesta-4,6-diene (3KD), and cholestan-3β,5α,6β-triol (Triol). Triol and 3K4 were found at significantly higher levels in the livers of hamsters with O. viverrini-induced cholangiocarcinoma. We therefore investigated the effects of Triol and 3K4 on induction of cholangiocarcinogenesis using an in vitro human cholangiocyte culture model. Triol- and 3K4-treated cells underwent apoptosis. Western blot analysis showed significantly increased levels of Bax and decreased levels of Bcl-2 in these cells. Increased cytochrome c release from mitochondria was found following treatment with Triol and 3K4. Triol and 3K4 also induced formation of the DNA adducts 1,N(6)-etheno-2'-deoxyadenosine, 3,N(4)-etheno-2'-deoxycytidine and 8-oxo-7,8-dihydro-2'-deoxyguanosine in cholangiocytes. The data suggest that Triol and 3K4 cause DNA damage via oxidative stress. Chronic liver fluke infection increases production of the oxysterols Triol and 3K4 in the setting of chronic inflammation in the biliary system. These oxysterols induce apoptosis and DNA damage in cholangiocytes. Insufficient and impaired DNA repair of such mutated cells may enhance clonal expansion and further drive the change in

  5. Raw Fish Consuming Behavior Related to Liver Fluke Infection among Populations at Risk of Cholangiocarcinoma in Nakhon Ratchasima Province, Thailand.

    Science.gov (United States)

    Chavengkun, Wasugree; Kompor, Pontip; Norkaew, Jun; Kujapun, Jirawoot; Pothipim, Mali; Ponphimai, Sukanya; Kaewpitoon, Soraya J; Padchasuwan, Natnapa; Kaewpitoon, Natthawut

    2016-01-01

    Opisthorchiasis is a health problem in rural communities of Thailand, particularly in the northeast and north regions. Therefore, this study aimed to investigate raw fish consuming behavior related to liver fluke infection among the population at risk for opisthorchiasis and cholangiocarcinoma (CCA). A cross-sectional descriptive study was conducted in Meuang Yang district, Nakhon Ratchasima province, northeast Thailand, between June and October 2015. Participants were screened for CCA, and samples who had a high score of CCA risk were purposively selected. A predesigned questionnaire was utilized to collect the data from all participants. X2-test was used for analysis of associations between demographic data and raw fish consumption. The results revealed that participants had past histories of stool examination (33.0%), liver fluke infection (21.0%), praziquantel use (24.0%), raw fish consumption (78.0%), relatives family consuming raw fish (73.0%), and relatives family with CCA (3.0%). Participants consumed several dished related to liver fluke infection, mainly raw fermented fish (13.0%), under smoked catfish (5.00%), raw pickled fish (4.00%), and raw spicy minced fish salad (3.00%). The most common types of cyprinoid fish were Barbodes gonionotus (39%), Hampala dispar (38%), Puntius brevis (37%), Cyclocheilichthys armatus (33%), Puntioplites proctozysron (32%), and Luciosoma bleekeri (30%), respectively. Participants had a low level of knowledge (mean=3.79, SD=0.74), moderate attitude (mean=7.31, SD=7.31) and practice (mean=38.64, SD=6.95) regarding liver fluke prevention and control. Demographic variables like age (>36 years old; X2-test=17.794, p-value=0.001), education (primary school; X2-test=18.952, p-value=0.001), marital status (married; X2-test=12.399, p-value=0.002), and income (<5,000 baht; X2-test=27.757, p-value=0.015) were significantly associated with raw fish consumption. This result indicates that the population had risk consumption for liver

  6. M-Commerce Exploitation

    DEFF Research Database (Denmark)

    Ulhøi, John Parm; Jørgensen, Frances

    2008-01-01

    SMEs venturing into business ventures utilizing mobile devices via wireless communication for commercial purposes, or Mobile commerce (M-commerce), need to be adept at both exploiting cutting edge technology and managing intense collaboration between a host of network participants. Successful entry...... into this emerging market may well depend on development of new business models that emphasize the socio-technical intricacies of these networks. The objective of this paper is to examine the development of these networks as a central part of new M-commerce business models in SME's and report on...... initial findings from the preliminary phase of the project that is aimed at exploring, describing, and facilitating the development of new business models for M-commerce in SME's in Denmark. Data have been collected through in-depth interviews. The paper contributes to theory relative to M...

  7. Biotechnological exploitation of microalgae.

    Science.gov (United States)

    Gangl, Doris; Zedler, Julie A Z; Rajakumar, Priscilla D; Martinez, Erick M Ramos; Riseley, Anthony; Włodarczyk, Artur; Purton, Saul; Sakuragi, Yumiko; Howe, Christopher J; Jensen, Poul Erik; Robinson, Colin

    2015-12-01

    Microalgae are a diverse group of single-cell photosynthetic organisms that include cyanobacteria and a wide range of eukaryotic algae. A number of microalgae contain high-value compounds such as oils, colorants, and polysaccharides, which are used by the food additive, oil, and cosmetic industries, among others. They offer the potential for rapid growth under photoautotrophic conditions, and they can grow in a wide range of habitats. More recently, the development of genetic tools means that a number of species can be transformed and hence used as cell factories for the production of high-value chemicals or recombinant proteins. In this article, we review exploitation use of microalgae with a special emphasis on genetic engineering approaches to develop cell factories, and the use of synthetic ecology approaches to maximize productivity. We discuss the success stories in these areas, the hurdles that need to be overcome, and the potential for expanding the industry in general. PMID:26400987

  8. The Geohazards Exploitation Platform

    Science.gov (United States)

    Laur, Henri; Casu, Francesco; Bally, Philippe; Caumont, Hervé; Pinto, Salvatore

    2016-04-01

    The Geohazards Exploitation Platform, or Geohazards TEP (GEP), is an ESA originated R&D activity of the EO ground segment to demonstrate the benefit of new technologies for large scale processing of EO data. This encompasses on-demand processing for specific user needs, systematic processing to address common information needs of the geohazards community, and integration of newly developed processors for scientists and other expert users. The platform supports the geohazards community's objectives as defined in the context of the International Forum on Satellite EO and Geohazards organised by ESA and GEO in Santorini in 2012. The GEP is a follow on to the Supersites Exploitation Platform (SSEP) an ESA initiative to support the Geohazards Supersites & Natural Laboratories initiative (GSNL). Today the GEP allows to exploit 70+ Terabyte of ERS and ENVISAT archive and the Copernicus Sentinel-1 data available on line. The platform has already engaged 22 European early adopters in a validation activity initiated in March 2015. Since September, this validation has reached 29 single user projects. Each project is concerned with either integrating an application, running on demand processing or systematically generating a product collection using an application available in the platform. The users primarily include 15 geoscience centres and universities based in Europe: British Geological Survey (UK), University of Leeds (UK), University College London (UK), ETH University of Zurich (CH), INGV (IT), CNR-IREA and CNR-IRPI (IT), University of L'Aquila (IT), NOA (GR), Univ. Blaise Pascal & CNRS (FR), Ecole Normale Supérieure (FR), ISTERRE / University of Grenoble-Alpes (FR). In addition, there are users from Africa and North America with the University of Rabat (MA) and the University of Miami (US). Furthermore two space agencies and four private companies are involved: the German Space Research Centre DLR (DE), the European Space Agency (ESA), Altamira Information (ES

  9. MUC1 and MUC5AC mucin expression in liver fluke-associated intrahepatic cholangiocarcinoma

    Institute of Scientific and Technical Information of China (English)

    Chanchai Boonla; Banchob Sripa; Peti Thuwajit; Ubon Cha-On; Anucha Puapairoj; Masanao Miwa; Sopit Wongkham

    2005-01-01

    AIM: To investigate the expressions of MUC1 and MUC5AC in intrahepatic cholangiocarcinoma (ICC). Association of expressions of mucins MUC1 and MUC5AC with clinical findings, metastasis, and survival of the liver fluke-associated ICC patients was determined.METHODS: The expressions of MUC1 and MUC5AC mucins were examined by immunohistochemical staining in 87cases of histologically-proven ICC. The expressions of mucins in relationship between clinicopathological significance and prognosis of the patients were evaluated.RESULTS: Fifty-two patients (60%) exhibited both MUC1 and MUC5AC expressions, whereas 31% expressed either MUC1or MUC5AC, and 9% expressed neither. High MUC1immunoreactivity displayed a significant correlation with tumor progression as reflected by vascular invasion (P<0.001),whereas high expression of MUC5AC significantly correlated with neural invasion (P = 0.022) and advanced ICC stage (P = 0.008). Patients with high expression of MUC1 had a significantly shorter survival (P = 0.0002). According to multivariate analyses, MUC1 reactivity (P = 0.026),histological grading and stage of tumor represented the least probability of survival.CONCLUSION: MUC1 is overexpressed in liver flukeassociated cholangiocarcinoma and relates to vascular invasion and poor prognosis, whereas MUC5AC mucin is neoexpressed and relates to neural invasion and advanced ICC stage. High MUC1 expression in tumor may be useful for predicting the poor outcome of ICC patients.

  10. Learning Metasploit exploitation and development

    CERN Document Server

    Balapure, Aditya

    2013-01-01

    A practical, hands-on tutorial with step-by-step instructions. The book will follow a smooth and easy-to-follow tutorial approach, covering the essentials and then showing the readers how to write more sophisticated exploits.This book targets exploit developers, vulnerability analysts and researchers, network administrators, and ethical hackers looking to gain advanced knowledge in exploitation development and identifying vulnerabilities. The primary goal is to take readers wishing to get into more advanced exploitation discovery and reaching the next level.Prior experience exploiting basic st

  11. Exploitation of Labour and Exploitation of Commodities: A "New Interpretation"

    OpenAIRE

    Veneziani, Roberto; Yoshihara, Naoki

    2011-01-01

    In the standard Okishio-Morishima approach, the existence of profits is proved to be equivalent to the exploitation of labour. Yet, it can also be proved that the existence of profits is equivalent to the ‘exploitation’ of any good. Labour and commodity exploitation are just different numerical representations of the productiveness of the economy. This paper presents an alternative approach to exploitation theory which is related to the New Interpretation (Duménil 1980; Foley 1982). In this a...

  12. Exploiting the plasma potential

    International Nuclear Information System (INIS)

    The concept of plasma potential arises from the interaction of a plasma with a boundary. Due to the high mobility of electrons, a potential difference develops between the two so that a positive space-charge region, the 'sheath', shields the plasma from the boundary. Losses of ions at the boundary, however, means that shielding is ineffective unless ions enter the sheath region with a sufficiently high velocity (the 'Bohm criterion'). Since this ion flux cannot be generated by thermal motion, there is a potential variation within the plasma itself (the 'presheath'), which accelerates the ions towards the plasma edge. The potential difference between a plasma and a boundary has been exploited in a wide variety of plasma surface engineering applications. The surface of a substrate immersed in a plasma will be subject to bombardment by ions accelerated across the sheath which will not only heat the substrate but can also sputter atoms out of the surface, modify the properties of films deposited onto the surface or result in bombarding species being incorporated into the surface. While energetic ion bombardment can be supplied by directed ion beams, it is more easily applied uniformly over complex surfaces by biasing a substrate immersed in a plasma with an appropriate negative potential, either DC or rectified rf. This is a feature of ion assisted deposition processes, both PVD and CVD, ion assisted thermochemical diffusion processes, such as plasma nitriding, and, in the limit of high bias potentials (10-100 kV), Plasma Immersion Ion Implantation (PIII or PI3 - Trade Mark). This paper reviews some of the interesting and intriguing aspects of the behaviour of low pressure rf plasmas when large perturbations occur to the potential distribution described above. These observations have been made as part of our work over the last ten years on the use of low pressure plasmas and high energy ion bombardment to extend the range of applicability of plasma nitriding, in

  13. AMU NEXRAD Exploitation Task

    Science.gov (United States)

    Lambert, Winifred C.; Wheeler, Mark M.

    1997-01-01

    This report documents the results of the Applied Meteorology Unit's NEXRAD Exploitation Task. The objectives of this task are to determine what radar signatures are present prior to and at the time of convection initiation, and to determine radar signatures which will help distinguish whether the ensuing convection will become severe. Radar data from the WSR-88D radar located at NWS Melbourne (WSR-88D/KMLB) were collected between June and September 1995, and 16 convective case studies were analyzed for which the radar was operating during the entire period of interest. All WSR-88D/KMLB products were scrutinized for their utility in detecting convection initiation and severe storm signatures. Through process of elimination, it was found that the 0.5 deg reflectivity product with the lowest reflectivity values displayed is the best product to monitor for convection initiation signatures. Seven meteorological features associated with the initiation of deep convection were identified: the Merritt Island and Indian River convergence zones, interlake convergence, horizontal convective rolls, the sea breeze, storm outflow boundaries, and fires. Their reflectivity values ranged from -5 to 20 dBZ. Of the three severe weather phenomena (winds greater than or equal to 50 kts, tornado, 3/4 inch hail), high wind events due to microbursts were most common in the data set. It was found that the values and trends of composite reflectivity, vertically integrated liquid, and core aspect ratio were key indicators of the potential of a cell to produce a microburst. The data were not analyzed for the other two severe weather phenomena because they rarely occurred during the data collection period. This report also includes suggestions for new WSR-88D products, summaries of ongoing research aimed at creating new products, and explicit recommended procedures for detecting convection initiation and severe storm signatures in the radar data using the currently available technology.

  14. Exploitation and the class struggle

    OpenAIRE

    Juan Carlos Cuestas; Bruce Philp

    2010-01-01

    This paper contributes to our understanding of the determinants and dynamics of Marxian exploitation using quarterly UK data, 1955-2008. Initially a simple model is introduced for the purpose of defining exploitation and its component parts, before elaborating on theoretical issues which are important in estimating the rate of exploitation. In the empirical analysis we seek to explain the effect of class struggle, for the UK economy, using quarterly data. Attention is paid to three forces whi...

  15. Fine-scale mapping of vector habitats using very high resolution satellite imagery: a liver fluke case-study

    Directory of Open Access Journals (Sweden)

    Els De Roeck

    2014-12-01

    Full Text Available The visualization of vector occurrence in space and time is an important aspect of studying vector-borne diseases. Detailed maps of possible vector habitats provide valuable information for the prediction of infection risk zones but are currently lacking for most parts of the world. Nonetheless, monitoring vector habitats from the finest scales up to farm level is of key importance to refine currently existing broad-scale infection risk models. Using Fasciola hepatica, a parasite liver fluke as a case in point, this study illustrates the potential of very high resolution (VHR optical satellite imagery to efficiently and semi-automatically detect detailed vector habitats. A WorldView2 satellite image capable of <5m resolution was acquired in the spring of 2013 for the area around Bruges, Belgium, a region where dairy farms suffer from liver fluke infections transmitted by freshwater snails. The vector thrives in small water bodies (SWBs, such as ponds, ditches and other humid areas consisting of open water, aquatic vegetation and/or inundated grass. These water bodies can be as small as a few m2 and are most often not present on existing land cover maps because of their small size. We present a classification procedure based on object-based image analysis (OBIA that proved valuable to detect SWBs at a fine scale in an operational and semi-automated way. The classification results were compared to field and other reference data such as existing broad-scale maps and expert knowledge. Overall, the SWB detection accuracy reached up to 87%. The resulting fine-scale SWB map can be used as input for spatial distribution modelling of the liver fluke snail vector to enable development of improved infection risk mapping and management advice adapted to specific, local farm situations.

  16. Heap spray exploitation

    OpenAIRE

    Παπαντωνίου, Ιωάννης Δ.

    2012-01-01

    Η διπλωματική αυτή εργασία έχει ως σκοπό την παρουσίαση και ανάλυση τεχνικών heap spray exploitation σε περιβάλλον λειτουργικού συστήματος Windows. Αναλύει τη λειτουργία του heap memory segment και τους τρόπους χρήσης του, με σκοπό την υλοποίηση heap spray επιθέσεως. Επίσης αναλύει μεθόδους και εργαλεία εντοπισμού και αντιμετώπισης των heap spray τεχνικών. Τέλος παρουσιάζονται τέσσερις μελέτες περίπτωσεων heap spray επιθέσεων για την εφαρμογή Internet Explorer (εκδόσεις 6,9,10)....

  17. Interaction between the blood fluke, Sanguinicola inermis and humoral components of the immune response of carp, Cyprinus carpio

    OpenAIRE

    Roberts, M.L.; Lewis, J W; Wiegertjes, G.F.; Hoole, D.

    2005-01-01

    The effect of Sanguinicola inermis on serum antibody and complement activity in Cyprinus carpio was assessed using an ELISA and haemolytic assays. Possible immune evasion strategies were assessed using immunodetection of host proteins on the surface of the parasite. Carp acclimatized to 20 or 25 °C were infected by exposure to 500 cercariae or injected intraperitoneally with 150 cercariae, and serum monitored over a 63-day period. In cercariae-injected carp, irrespective of time and temperatu...

  18. Structural basis for inhibition of the cathepsin B drug target from the human blood fluke, Schistosoma mansoni

    Czech Academy of Sciences Publication Activity Database

    Jílková, Adéla; Řezáčová, Pavlína; Lepšík, Martin; Horn, Martin; Váchová, Jana; Fanfrlík, Jindřich; Brynda, Jiří; McKerrow, J. H.; Caffrey, C. R.; Mareš, Michael

    Hydra : -, 2012. s. 60-60. [Molecular and Cellular Biology of Helminth Parasites. International Conference /7./. 02.09.2012-07.09.2012, Hydra] R&D Projects: GA MŠk LH12023; GA ČR GA203/09/1585 Institutional support: RVO:61388963 Keywords : cathepsin B1 * Schistosoma * protease * structures Subject RIV: CE - Biochemistry

  19. Propeptide of cathepsin B1 from human blood fluke: structure-function mapping and small mimetics design

    Czech Academy of Sciences Publication Activity Database

    Horn, Martin; Jílková, Adéla; Vondrášek, Jiří; Caffrey, C. R.; Mareš, Michael

    Portorož : -, 2010. s. 72-72. [Symposium on Proteases , Inhibitors and Biological Control /12./. 25.9.-29.9.2010, Portorož] R&D Projects: GA ČR GA203/09/1585 Institutional research plan: CEZ:AV0Z40550506 Keywords : protease * schistosoma * propeptide Subject RIV: CE - Biochemistry

  20. Global expression analysis revealed novel gender-specific gene expression features in the blood fluke parasite Schistosoma japonicum.

    Directory of Open Access Journals (Sweden)

    Xianyu Piao

    Full Text Available BACKGROUND: Schistosoma japonicum is one of the remarkable Platyhelminths that are endemic in China and Southeast Asian countries. The parasite is dioecious and can reside inside the host for many years. Rapid reproduction by producing large number of eggs and count-react host anti-parasite responses are the strategies that benefit long term survival of the parasite. Praziquantel is currently the only drug that is effective against the worms. Development of novel antiparasite reagents and immune-prevention measures rely on the deciphering of parasite biology. The decoding of the genomic sequence of the parasite has made it possible to dissect the functions of genes that govern the development of the parasite. In this study, the polyadenylated transcripts from male and female S. japonicum were isolated for deep sequencing and the sequences were systematically analysed. RESULTS: First, the number of genes actively expressed in the two sexes of S. japonicum was similar, but around 50% of genes were biased to either male or female in expression. Secondly, it was, at the first time, found that more than 50% of the coding region of the genome was transcribed from both strands. Among them, 65% of the genes had sense and their cognate antisense transcripts co-expressed, whereas 35% had inverse relationship between sense and antisense transcript abundance. Further, based on gene ontological analysis, more than 2,000 genes were functionally categorized and biological pathways that are differentially functional in male or female parasites were elucidated. CONCLUSIONS: Male and female schistosomal parasites differ in gene expression patterns, many metabolic and biological pathways have been identified in this study and genes differentially expressed in gender specific manner were presented. Importantly, more than 50% of the coding regions of the S. japonicum genome transcribed from both strands, antisense RNA-mediated gene regulation might play a critical role in the parasite biology.

  1. Global Expression Analysis Revealed Novel Gender-Specific Gene Expression Features in the Blood Fluke Parasite Schistosoma japonicum

    OpenAIRE

    Xianyu Piao; Pengfei Cai; Shuai Liu; Nan Hou; Lili Hao; Fan Yang; Heng Wang; Jianwei Wang; Qi Jin; Qijun Chen

    2011-01-01

    BACKGROUND: Schistosoma japonicum is one of the remarkable Platyhelminths that are endemic in China and Southeast Asian countries. The parasite is dioecious and can reside inside the host for many years. Rapid reproduction by producing large number of eggs and count-react host anti-parasite responses are the strategies that benefit long term survival of the parasite. Praziquantel is currently the only drug that is effective against the worms. Development of novel antiparasite reagents and imm...

  2. Fine-scale mapping of vector habitats using very high resolution satellite imagery: a liver fluke case-study.

    Science.gov (United States)

    De Roeck, Els; Van Coillie, Frieke; De Wulf, Robert; Soenen, Karen; Charlier, Johannes; Vercruysse, Jozef; Hantson, Wouter; Ducheyne, Els; Hendrickx, Guy

    2014-01-01

    The visualization of vector occurrence in space and time is an important aspect of studying vector-borne diseases. Detailed maps of possible vector habitats provide valuable information for the prediction of infection risk zones but are currently lacking for most parts of the world. Nonetheless, monitoring vector habitats from the finest scales up to farm level is of key importance to refine currently existing broad-scale infection risk models. Using Fasciola hepatica, a parasite liver fluke, as a case in point, this study illustrates the potential of very high resolution (VHR) optical satellite imagery to efficiently and semi-automatically detect detailed vector habitats. A WorldView2 satellite image capable of OBIA) that proved valuable to detect SWBs at a fine scale in an operational and semi-automated way. The classification results were compared to field and other reference data such as existing broad-scale maps and expert knowledge. Overall, the SWB detection accuracy reached up to 87%. The resulting fine-scale SWB map can be used as input for spatial distribution modelling of the liver fluke snail vector to enable development of improved infection risk mapping and management advice adapted to specific, local farm situations. PMID:25599638

  3. Eye-flukes in fish, living in cooling water from nuclear power plants

    International Nuclear Information System (INIS)

    We report here on the effects of raised water temperature on the prevalence, mean infrapopulation density and consequences of eye-flukes in fish. The study was mainly performed in the Biotest basin situated 120 km north of Stockholm, Sweden. This 1 km2 basin is an enclosed brackish water (5 permillage) area receiving heated (about 8 degree C) cooling water (90 m3/s) from Forsmark nuclear power station. Both morphological and experimental studies of the parasite larvae of sampled fish indicate that we are dealing with four strains of Diplostomum, two of which occur in perch and the other two in roach. Since taxonomic revisions are under hand elsewhere we prefer to name these strains Diplostomum sp1-4. Metacercariae of D.sp 1 were found between the retina and sclera in the eye of perch while that of D.sp 4 were found in the eye-lens of roach in over 90 % of fish examined. Metacercariae of the other two D.-species and of Tylodelphys clavata and Cotylurus sp were found at lower frequencies. Cercariae of Diplostomum spp were found to develop from sporocysts in snails of the genus Lymnaea. The period of cercarial shedding starts about one month earlier and is also prolonged in the Biotest basin compared to the reference locality. The infection procedure, however, is the same in both areas. During experimental infections with cercariae on yearlings of bleak we found a distinct correlation between an increased fry mortality and an increased cercariae density, a connection which was strengthened at increased water temperature. Furthermore, the results indicate that the defence mechanisms of the fish respond slower towards infections with Diplostomum spp than that is known to be the case with bacterial infections. The speed with which the metacercariae accumulate in the eye of the fish is higher in the Biotest basin than in the reference locality. In spite of this, the mean infrapopulation density of metacercariae in older fish is not higher here than in the reference

  4. Intestinal and liver flukes of birds of prey (Accipitriformes, Falconiformes, Strigiformes) from Slovakia: uniform or diverse compound?

    Science.gov (United States)

    Komorová, Petronela; Sitko, Jiljí; Špakulová, Marta; Hurníková, Zuzana

    2016-07-01

    During 2012-2014 up to 286 birds of the orders Falconiformes (5 species), Accipitriformes (11 species), and Strigiformes (7 species) were examined for trematodes and this represents the first detailed study in Slovakia. A total of 12 trematode species belonging to the families Diplostomidae, Cyathocotylidae, Strigeidae, and Opisthorchiidae were identified. Rare infections were found in falcons where only two species (40 %) and three of 85 examined birds (3.5 %) were infected with a low range of two to four worms of generalists Strigea falconis or Plagiorchis elegans. Contrary to that, ten accipitriformes species (90.9 %) and 63 of 156 bird individuals (40.4 %) were infected with nine flukes: Conodiplostomum perlatum, Conodiplostomum spathula, Neodiplostomum attenuatum, Neodiplostomum spathoides, Parastrigea flexilis, Strigea falconis, Strigea vandenbrokae, Paracoenogonimus ovatus, and Metorchis bilis. S. falconis and N. attenuatum were the most frequent, occurring in parallel in eight and four bird species, in numbers up to 575 and 224. The intensity of infection with other fluke species was low ranging from one to 13 worms. Three owl (Strigiformes) representatives (42.9 %) were exclusive hosts for Neodiplostomum canaliculatum and Strigea strigis, and the proportion of positive and dissected individual birds was 10:45 (22.2 %). Both trematodes occurred in two or three owl species. In conclusion, apparent dissimilarity of trematode load of three unrelated lines of falcons, eagles, and owls was revealed. The present study extends our knowledge on the composition of the trematode fauna in Slovakia as all species except S. falconis and P. elegans that represent new host and species records in Slovakia. PMID:27055533

  5. A granulin-like growth factor secreted by the carcinogenic liver fluke, Opisthorchis viverrini, promotes proliferation of host cells.

    Science.gov (United States)

    Smout, Michael J; Laha, Thewarach; Mulvenna, Jason; Sripa, Banchob; Suttiprapa, Sutas; Jones, Alun; Brindley, Paul J; Loukas, Alex

    2009-10-01

    The human liver fluke, Opisthorchis viverrini, infects millions of people throughout south-east Asia and is a major cause of cholangiocarcinoma, or cancer of the bile ducts. The mechanisms by which chronic infection with O. viverrini results in cholangiocarcinogenesis are multi-factorial, but one such mechanism is the secretion of parasite proteins with mitogenic properties into the bile ducts, driving cell proliferation and creating a tumorigenic environment. Using a proteomic approach, we identified a homologue of human granulin, a potent growth factor involved in cell proliferation and wound healing, in the excretory/secretory (ES) products of the parasite. O. viverrini granulin, termed Ov-GRN-1, was expressed in most parasite tissues, particularly the gut and tegument. Furthermore, Ov-GRN-1 was detected in situ on the surface of biliary epithelial cells of hamsters experimentally infected with O. viverrini. Recombinant Ov-GRN-1 was expressed in E. coli and refolded from inclusion bodies. Refolded protein stimulated proliferation of murine fibroblasts at nanomolar concentrations, and proliferation was inhibited by the MAPK kinase inhibitor, U0126. Antibodies raised to recombinant Ov-GRN-1 inhibited the ability of O. viverrini ES products to induce proliferation of murine fibroblasts and a human cholangiocarcinoma cell line in vitro, indicating that Ov-GRN-1 is the major growth factor present in O. viverrini ES products. This is the first report of a secreted growth factor from a parasitic worm that induces proliferation of host cells, and supports a role for this fluke protein in establishment of a tumorigenic environment that may ultimately manifest as cholangiocarcinoma. PMID:19816559

  6. Blood Clots

    Science.gov (United States)

    ... Index A-Z Blood Clots Blood clots are semi-solid masses of blood that can be stationary (thrombosis) ... treated? What are blood clots? Blood clots are semi-solid masses of blood. Normally, blood flows freely through ...

  7. Preventing the Sexual Exploitation of Children

    Science.gov (United States)

    Preventing the Sexual Exploitation of Children The words sexual exploitation evoke a number of reactions and feelings. Perhaps one of the most devastating ... Exploited Children ® (NCMEC) is working to bring sexual exploitation to the forefront; raise awareness about this issue; ...

  8. Morphology and viability of adult Fasciola gigantica(giant liver flukes) from Philippine carabaos(Bubalus bubalis) upon in vitro exposure to lead

    Institute of Scientific and Technical Information of China (English)

    Aimee; Caye; G.; Chang; Mary; Jane; C.; Flores

    2015-01-01

    Objective: To evaluate the effects of lead in the morphology and viability of Fasciola gigantica(F. gigantica)(giant liver fluke) isolated from infected livers of carabaos in vitro using the following concentrations of lead: 0, 100, 150 and 200 mg/L. Methods: In vitro viability and motility assay was conducted to evaluate the ef ects of lead using 1% methylene blue as the vital dye for assessment of the l ukes’ viability. Results: Results indicate that F. gigantica can tolerate lead exposure as high as 200 mg/L with visible morphological variations. Upon exposure to lead, liver l ukes tend to curl and excrete black precipitates as a sign of physiological stress response. Furthermore, the lethal concentration(LC50) of lead against F. gigantica in vitro was 160 mg/L. Conclusions: In conclusion, tolerance of liver flukes to high levels of lead suggests its potential as a possible biomarker of environmental pollution.

  9. Teotihuacan, tepeapulco, and obsidian exploitation.

    Science.gov (United States)

    Charlton, T H

    1978-06-16

    Current cultural ecological models of the development of civilization in central Mexico emphasize the role of subsistence production techniques and organization. The recent use of established and productive archeological surface survey techniques along natural corridors of communication between favorable niches for cultural development within the Central Mexican symbiotic region resulted in the location of sites that indicate an early development of a decentralized resource exploitation, manufacturing, and exchange network. The association of the development of this system with Teotihuacán indicates the importance such nonsubsistence production and exchange had in the evolution of this first central Mexican civilization. The later expansion of Teotihuacán into more distant areas of Mesoamerica was based on this resource exploitation model. Later civilizations centered at Tula and Tenochtitlán also used such a model in their expansion. PMID:17738704

  10. ECOLOGY AFFECTED IN OIL EXPLOITATION

    Institute of Scientific and Technical Information of China (English)

    Wang Mingren; Zeng Dezhang; Zhang Shiquan; Shi Lifeng

    1997-01-01

    @@ Introduction During the Eighth Five-Year Plan period(1991-1995), a study about crude impacts on ecology in oil exploitation was conducted in seven representative onshore oil fields of China. The study discusses crude pollutant's impacts on ecology in terms of its production,movement, transformation and concentration in the ecological system,as well as its toxicity and damage degree on living things , by means of investigation on the spot, test analysis and analogue test.

  11. Exploiting mutagenesis for wheat improvement

    International Nuclear Information System (INIS)

    The chemical mutagen, ethylmethanesulphonate, is being used to introduce into wheat novel variation that can be exploited for crop improvement. We have created mutagenised populations of diploid (Einkorn), tetraploid (Durum) and hexaploid (bread) wheat. The forward genetic approach enables the identification of high yielding or novel phenotypes that can be exploited in conventional breeding programmes. A powerful reverse genetic strategy, TILLING (Targetting Induced Local Lesions IN Genomes), allows the detection of induced point mutations in the populations of mutagenised individuals and allows gene function to be examined. Genetic redundancy in the tetraploid and hexaploid species allows them to tolerate a high level of mutation (up to one mutation per 25kbp). This mutation frequency makes it relatively easy to identify lesions in each homeologue of a particular gene which can then be combined for crop improvement or functional genomics. Novel variation created can be exploited without the regulatory restrictions imposed on genetically modified organisms. Gene targets have been selected in relation to plant architecture, primary metabolism, disease resistance and stress tolerance and over 50 TILLING mutants have so been identified, including mis-sense, non-sense and splice site mutations (author)

  12. Characterisation of a novel panel of polymorphic microsatellite loci for the liver fluke, Fasciola hepatica, using a next generation sequencing approach☆

    Science.gov (United States)

    Cwiklinski, Krystyna; Allen, Katherine; LaCourse, James; Williams, Diana J.; Paterson, Steve; Hodgkinson, Jane E.

    2015-01-01

    The liver fluke, Fasciola hepatica is an economically important pathogen of sheep and cattle and has been described by the WHO as a re-emerging zoonosis. Control is heavily reliant on the use of drugs, particularly triclabendazole and as a result resistance has now emerged. The population structure of F. hepatica is not well known, yet it can impact on host–parasite interactions and parasite control with drugs, particularly regarding the spread of triclabendazole resistance. We have identified 2448 potential microsatellites from 83 Mb of F. hepatica genome sequence using msatfinder. Thirty-five loci were developed and optimised for microsatellite PCR, resulting in a panel of 15 polymorphic loci, with a range of three to 15 alleles. This panel was validated on genomic DNA from 46 adult F. hepatica; 38 liver flukes sourced from a Northwest abattoir, UK and 8 liver flukes from an established isolate (Shrewsbury; Ridgeway Research). Evidence for null alleles was found at four loci (Fh_1, Fh_8, Fh_13 and Fh_14), which showed markedly higher levels of homozygosity than the remaining 11 loci. Of the 38 liver flukes isolated from cattle livers (n = 10) at the abattoir, 37 genotypes were identified. Using a multiplex approach all 15 loci could be amplified from several life cycle stages that typically yield low amounts of DNA, including metacercariae, the infective life cycle stage present on pasture, highlighting the utility of this multiplex microsatellite panel. This study reports the largest panel of microsatellite markers available to date for population studies of F. hepatica and the first multiplex panel of microsatellite markers that can be used for several life cycle stages. PMID:25796359

  13. Characterisation of a novel panel of polymorphic microsatellite loci for the liver fluke, Fasciola hepatica, using a next generation sequencing approach

    OpenAIRE

    Cwiklinski, Krystyna; Allen, Katherine; LaCourse, James; Williams, Diana J; Paterson, Steve; Hodgkinson, Jane E

    2015-01-01

    The liver fluke, Fasciola hepatica is an economically important pathogen of sheep and cattle and has been described by the WHO as a re-emerging zoonosis. Control is heavily reliant on the use of drugs, particularly triclabendazole and as a result resistance has now emerged. The population structure of F. hepatica is not well known, yet it can impact on host-parasite interactions and parasite control with drugs, particularly regarding the spread of triclabendazole resistance. We have identifie...

  14. Characterisation of a novel panel of polymorphic microsatellite loci for the liver fluke, Fasciola hepatica, using a next generation sequencing approach.

    Science.gov (United States)

    Cwiklinski, Krystyna; Allen, Katherine; LaCourse, James; Williams, Diana J; Paterson, Steve; Hodgkinson, Jane E

    2015-06-01

    The liver fluke, Fasciola hepatica is an economically important pathogen of sheep and cattle and has been described by the WHO as a re-emerging zoonosis. Control is heavily reliant on the use of drugs, particularly triclabendazole and as a result resistance has now emerged. The population structure of F. hepatica is not well known, yet it can impact on host-parasite interactions and parasite control with drugs, particularly regarding the spread of triclabendazole resistance. We have identified 2448 potential microsatellites from 83 Mb of F. hepatica genome sequence using msatfinder. Thirty-five loci were developed and optimised for microsatellite PCR, resulting in a panel of 15 polymorphic loci, with a range of three to 15 alleles. This panel was validated on genomic DNA from 46 adult F. hepatica; 38 liver flukes sourced from a Northwest abattoir, UK and 8 liver flukes from an established isolate (Shrewsbury; Ridgeway Research). Evidence for null alleles was found at four loci (Fh_1, Fh_8, Fh_13 and Fh_14), which showed markedly higher levels of homozygosity than the remaining 11 loci. Of the 38 liver flukes isolated from cattle livers (n=10) at the abattoir, 37 genotypes were identified. Using a multiplex approach all 15 loci could be amplified from several life cycle stages that typically yield low amounts of DNA, including metacercariae, the infective life cycle stage present on pasture, highlighting the utility of this multiplex microsatellite panel. This study reports the largest panel of microsatellite markers available to date for population studies of F. hepatica and the first multiplex panel of microsatellite markers that can be used for several life cycle stages. PMID:25796359

  15. Light and electron microscopy observations of embryogenesis and egg development in the human liver fluke, Opisthorchis viverrini (Platyhelminthes, Digenea).

    Science.gov (United States)

    Khampoosa, Panita; Jones, Malcolm K; Lovas, Erica M; Srisawangwong, Tuanchai; Laha, Thewarach; Piratae, Supawadee; Thammasiri, Chalida; Suwannatrai, Apiporn; Sripanidkulchai, Bungorn; Eursitthichai, Veerachai; Tesana, Smarn

    2012-02-01

    Eggs of most species digenean flukes hatch in the external environment to liberate larvae that seek and penetrate a snail intermediate host. Those of the human liver flukes, Opisthorchis viverrini, hatch within the gastrointestinal canal of their snail hosts. While adult parasites are primarily responsible for the pathology in cases of human opisthorchiasis, their eggs also contribute by inducing granulomata and in serving as nidi for gallstone formation. In view of the peculiar biology of O. viverrini eggs and their contribution to pathology, we investigated embryogenesis in this species by light and transmission electron microscopy. Egg development was traced from earliest stages of coalescence in the ootype until full embryonation in the distal region of the uterus. Fully mature eggs were generally impermeable to resin and could not be examined by conventional electron microscopy methods. However, the use of high-pressure freezing and freeze-substitution fixation of previously fixed eggs enabled the internal structure of mature eggs, particularly the subshell envelopes, to be elucidated. Fertilization occurs in the ootype, and the large zygote is seen therein with a single spermatozoon wrapped around its plasma membrane. As the zygote begins to divide, the spent vitellocytes are pushed to the periphery of the eggs, where they progressively degrade. The early eggshell is formed in the ootype by coalescing eggshell precursor material released by approximately six vitelline cells. The early eggs have a thinner eggshell and are larger than, but lack the characteristic shape of, mature eggs. Characteristic shell ornamentation, the "muskmelon" appearance of eggs, appears after eggshell polymerization in the ootype. Pores are not present in the shell of O. viverrini eggs. The inner and outer envelopes are poorly formed in this species, with the outer envelope evident beneath the eggshell at the opercular pole of the mature egg. The miracidium has a conical anterior end

  16. The ESA Geohazard Exploitation Platform

    Science.gov (United States)

    Bally, Philippe; Laur, Henri; Mathieu, Pierre-Philippe; Pinto, Salvatore

    2015-04-01

    Earthquakes represent one of the world's most significant hazards in terms both of loss of life and damages. In the first decade of the 21st century, earthquakes accounted for 60 percent of fatalities from natural disasters, according to the United Nations International Strategy for Disaster Reduction (UNISDR). To support mitigation activities designed to assess and reduce risks and improve response in emergency situations, satellite EO can be used to provide a broad range of geo-information services. This includes for instance crustal block boundary mapping to better characterize active faults, strain rate mapping to assess how rapidly faults are deforming, soil vulnerability mapping to help estimate how the soil is behaving in reaction to seismic phenomena, geo-information to assess the extent and intensity of the earthquake impact on man-made structures and formulate assumptions on the evolution of the seismic sequence, i.e. where local aftershocks or future main shocks (on nearby faults) are most likely to occur. In May 2012, the European Space Agency and the GEO Secretariat convened the International Forum on Satellite EO for Geohazards now known as the Santorini Conference. The event was the continuation of a series of international workshops such as those organized by the Geohazards Theme of the Integrated Global Observing Strategy Partnership. In Santorini the seismic community has set out a vision of the EO contribution to an operational global seismic risk program, which lead to the Geohazard Supersites and Natural Laboratories (GSNL) initiative. The initial contribution of ESA to suuport the GSNL was the first Supersites Exploitation Platform (SSEP) system in the framework of Grid Processing On Demand (GPOD), now followed by the Geohazard Exploitation Platform (GEP). In this presentation, we will describe the contribution of the GEP for exploiting satellite EO for geohazard risk assessment. It is supporting the GEO Supersites and has been further

  17. Genetic and epigenetic alterations of RIZ1 and the correlation to clinicopathological parameters in liver fluke-related cholangiocarcinoma.

    Science.gov (United States)

    Khaenam, Prasong; Jearanaikoon, Patcharee; Pairojkul, Chawalit; Bhudhisawasdi, Vajarabhongsa; Limpaiboon, Temduang

    2010-03-01

    The retinoblastoma interacting zinc finger (RIZ1) gene is adjacent to D1S228 where microsatellite instability has been associated with poor patient survival in liver fluke-associated cholangiocarcinoma (CCA). An understanding of the molecular mechanisms underlying the carcinogenesis and pathogenesis of CCA is necessary to improve patient survival. Therefore, we determined the genetic and epigenetic alterations of RIZ1 in 81 CCA samples and 69 matched non-tumor tissues. Methylation was found in 31 of 81 (38%) tumor samples and in 5 of 69 (7%) matched non-tumor tissues. Frameshift mutations (2 of 81) and loss of heterozygosity (LOH) (14 of 81) were not common. Statistical analysis found no significant correlation between RIZ1 alterations and clinicopathological features, but RIZPro704 LOH was associated with patient survival in the multivariate analysis. RIZ1 hypermethylation may be one of the crucial molecular events contributing to cholangiocarcinogenesis, and RIZPro704 LOH may adversely impact patient survival. The biological function of RIZ1 in CCA should be further investigated in order to verify its potential role in regulating this cancer. PMID:22993552

  18. Prospects of geothermal resource exploitation

    International Nuclear Information System (INIS)

    The use of geothermal energy to generate electricity has only occurred during the past 50 years by drilling wells in aquifers close to magmas and producing either dry steam or hot water. The world's production of electricity from geothermal energy is over 6000 MWe and is still growing. The direct use of geothermal energy for major urban communities has been developed recently by exploitation of aquifers in sedimentary basins under large towns. Scaling up the extraction of heat implies the exploitation of larger and better located fields requiring an appropriate method of extraction; the objective of present attempts in USA, Japan and Europe is to create heat exchangers by the circulation of water between several deep wells. Two field categories are considered: the extension of classical geothermal fields beyond the aquifer areas, and areas favoured by both a high geothermal gradient, fractures inducing a natural permeability at large scale, and good commercial prospects (such as in the Rhenan Graben). Hot dry rocks concept has gained a large interest. 1 fig., 5 tabs., 11 refs

  19. A Theory of Exploitative Child Labor

    OpenAIRE

    Carol Rogers & Kenneth A. Swinnerton

    2002-01-01

    We develop a model of exploitative child labor with two key features: first, parents have imperfect information about whether employment opportunities available to their children are exploitative or not. Second, firms choose whether or not to exploit their child workers. In our model, a ban on exploitative child labor is desirable, because it resolves the problem of imperfect information faced by parents, and therefore leads to Pareto efficiency. We also find that a ban leads to an increase i...

  20. The exploitation argument against commercial surrogacy.

    Science.gov (United States)

    Wilkinson, Stephen

    2003-04-01

    This paper discusses the exploitation argument against commercial surrogacy: the claim that commercial surrogacy is morally objectionable because it is exploitative. The following questions are addressed. First, what exactly does the exploitation argument amount to? Second, is commercial surrogacy in fact exploitative? Third, if it were exploitative, would this provide a sufficient reason to prohibit (or otherwise legislatively discourage) it? The focus throughout is on the exploitation of paid surrogates, although it is noted that other parties (e.g. 'commissioning parents') may also be the victims of exploitation. It is argued that there are good reasons for believing that commercial surrogacy is often exploitative. However, even if we accept this, the exploitation argument for prohibiting (or otherwise legislatively discouraging) commercial surrogacy remains quite weak. One reason for this is that prohibition may well 'backfire' and lead to potential surrogates having to do other things that are more exploitative and/or more harmful than paid surrogacy. It is concluded therefore that those who oppose exploitation should (rather than attempting to stop particular practices like commercial surrogacy) concentrate on: (a) improving the conditions under which paid surrogates 'work'; and (b) changing the background conditions (in particular, the unequal distribution of power and wealth) which generate exploitative relationships. PMID:12812183

  1. The Exploitation of Evolving Resources

    CERN Document Server

    McGlade, Jacqueline; Law, Richard

    1993-01-01

    The impact of man on the biosphere is profound. Quite apart from our capacity to destroy natural ecosystems and to drive species to extinction, we mould the evolution of the survivors by the selection pressures we apply to them. This has implications for the continued health of our natural biological resources and for the way in which we seek to optimise yield from those resources. Of these biological resources, fish stocks are particularly important to mankind as a source of protein. On a global basis, fish stocks provide the major source of protein for human consumption from natural ecosystems, amounting to some seventy million tonnes in 1970. Although fisheries management has been extensively developed over the last century, it has not hitherto considered the evolutionary consequences of fishing activity. While this omission may not have been serious in the past, the ever increasing intensity of exploitation and the deteriorating health of fish stocks has generated an urgent need for a better understanding...

  2. Energy for lunar resource exploitation

    Science.gov (United States)

    Glaser, Peter E.

    1992-01-01

    Humanity stands at the threshold of exploiting the known lunar resources that have opened up with the access to space. America's role in the future exploitation of space, and specifically of lunar resources, may well determine the level of achievement in technology development and global economic competition. Space activities during the coming decades will significantly influence the events on Earth. The 'shifting of history's tectonic plates' is a process that will be hastened by the increasingly insistent demands for higher living standards of the exponentially growing global population. Key to the achievement of a peaceful world in the 21st century, will be the development of a mix of energy resources at a societally acceptable and affordable cost within a realistic planning horizon. This must be the theme for the globally applicable energy sources that are compatible with the Earth's ecology. It is in this context that lunar resources development should be a primary goal for science missions to the Moon, and for establishing an expanding human presence. The economic viability and commercial business potential of mining, extracting, manufacturing, and transporting lunar resource based materials to Earth, Earth orbits, and to undertake macroengineering projects on the Moon remains to be demonstrated. These extensive activities will be supportive of the realization of the potential of space energy sources for use on Earth. These may include generating electricity for use on Earth based on beaming power from Earth orbits and from the Moon to the Earth, and for the production of helium 3 as a fuel for advanced fusion reactors.

  3. Combined effects of social stress and liver fluke infection in a mouse model.

    Science.gov (United States)

    Avgustinovich, Damira F; Marenina, Mariya K; Zhanaeva, Svetlana Ya; Tenditnik, Mikhail V; Katokhin, Alexey V; Pavlov, Konstantin S; Sivkov, Anton Yu; Vishnivetskaya, Galina B; Lvova, Maria N; Tolstikova, Tatiana G; Mordvinov, Viatcheslav A

    2016-03-01

    The effects of two influences, social stress and acute opisthorchiasis, were investigated in inbred C57BL/6J male mice. In the model of social stress, mice were repeatedly attacked and defeated by aggressive outbred ICR male mice and were in continuous sensory contact with an aggressive conspecific mouse in their home cage for 20days. Acute opisthorchiasis was provoked by invasion of Opisthorchis felineus (50 larvae per animal) on the fourth day after the social stress was induced. Simultaneous action of both factors caused the hypertrophy of adrenal glands, as well as elevated the activity of cathepsins B and L in the spleen. This effect on the activity of the cysteine proteases in the hippocampus and hypothalamus following O. felineus invasion was the predominant result of simultaneous action with social stress. Acute opisthorchiasis, social stress, and their combination caused an increase in the level of blood IL-6 in approximately 30% of the animals. Social stress induced a more pronounced effect on mouse plus-maze behavior than O. felineus invasion. Our results suggest a more severe negative effect of the simultaneous influence of both factors on most of the parameters that were investigated. PMID:26778779

  4. Blood pressure

    Science.gov (United States)

    ... the walls of the arteries is called blood pressure. Blood pressure is measured both as the heart contracts, which ... as it relaxes, which is called diastole. Normal blood pressure is considered to be a systolic blood pressure ...

  5. Blood transfusions

    Science.gov (United States)

    ... this page: //medlineplus.gov/ency/patientinstructions/000431.htm Blood transfusions To use the sharing features on this ... several sources of blood which are described below. Blood From the Public (Volunteer Blood Donation) The most ...

  6. Blood Basics

    Science.gov (United States)

    ... Patient Group Links Advocacy Toolkit Home For Patients Blood Basics Blood is a specialized body fluid. It ... about 9 pints. Jump To: The Components of Blood and Their Importance Many people have undergone blood ...

  7. Blood Thinners

    Science.gov (United States)

    If you have some kinds of heart or blood vessel disease, or if you have poor blood flow to your brain, your doctor may recommend that you take a blood thinner. Blood thinners reduce the risk of heart ...

  8. Blood culture

    Science.gov (United States)

    Culture - blood ... A blood sample is needed . The site where blood will be drawn is first cleaned with an antiseptic such ... organism from the skin getting into (contaminating) the blood sample and causing a false-positive result (see ...

  9. Liver Fluke Infection and Fish Consumption in Khon Kaen, Thailand: A Case Study on Negotiating the Middle Ground between Western Science and Eastern Culture

    Science.gov (United States)

    Samiphak, Sara

    This research investigates why typical strategies for promoting health, prolonging life, and preventing disease do not work in many communities. I use the liver fluke infection endemic in Khon Kaen, Thailand to explore the middle ground between Western science and Eastern culture. Prior work on the O.viverrini infection in Khon Kaen, Thailand has focused almost exclusively on developing effective medical treatment for the liver fluke infection. This dissertation employs a case study designed to explore the conditions that created and perpetuate the problem in the first place. In concrete terms, I analyze how the worldviews of local villagers shape their attitudes toward life (and death), which in turn determine if they engage in the high-risk behavior -- eating undercooked fish -- that makes them vulnerable to the infection. My research focuses on these people in-situ over a three-month period, and includes data from participant-observation, interviews, and video-recordings. This work seeks to illuminate how people's thinking and reasoning skills, and personal/cultural identities affect their abilities to learn and act on new health concepts. This potentially provides a window into future educational strategies in a complex world.

  10. First report of the giant liver fluke (Fascioloides magna infection in farmed fallow deer (Dama dama in Poland – pathomorphological changes and molecular identification

    Directory of Open Access Journals (Sweden)

    Karamon Jacek

    2015-09-01

    Full Text Available A 3-year-old female fallow deer was subjected to the necropsy and virological testing, due to a suspected infectious disease in the herd of farmed deer in the Southeastern region of Poland. The animal was found negative for the presence of BVDV, BoHV-1, BTV, and EHDV antibodies and BVDV antigen. The toxicological examination did not reveal any coccidiostats, mycotoxins, rodenticides, carbamate pesticides, and organophosphorus pesticides. The flukes found during postmortem examination were first characterised microscopically as Fascioloides magna and later their identity was confirmed by PCR and sequencing. The autopsy revealed lesions characteristic for F. magna infection, including different size cystic spaces in the liver, filled with brownish mucous fluid and flukes, and black pigment covering the surface of parietal and visceral peritoneum with the highest concentrations localised next to the liver. The changes observed in the liver tissue were typical of liver cirrhosis. The results demonstrated that in Poland, where the cervid farming is developing dynamically, the problem of fascioloidosis is present and may probably exert a significantly negative influence on the productivity of such farms if no antiparasitic treatment is performed.

  11. Identité et exploitation au travail

    OpenAIRE

    Danilo Martuccelli

    2013-01-01

    This article explores some aspects of identity exploitation in the world of work. For this, he proceeds in three stages. First, it presents three major forms of capacity of employees - qualification, skills, identities. Then it draws the outlines of specific objective and subjective identity exploitation at work. Finally, it examines the notions of justice and injustice that can be mobilized to account this process.

  12. The economics of exploiting gas hydrates

    International Nuclear Information System (INIS)

    We investigate the optimal exploitation of methane hydrates, a recent discovery of methane resources under the sea floor, mainly located along the continental margins. Combustion of methane (releasing CO2) and leakage through blow-outs (releasing CH4) contribute to the accumulation of greenhouse gases. A second externality arises since removing solid gas hydrates from the sea bottom destabilizes continental margins and thus increases the risk of marine earthquakes. We show that in such a model three regimes can occur: i) resource exploitation will be stopped in finite time, and some of the resource will stay in situ, ii) the resource will be used up completely in finite time, and iii) the resource will be exhausted in infinite time. We also show how to internalize the externalities by policy instruments. - Highlights: • We set up a model of optimal has hydrate exploitation • We incorporate to types of damages: contribution to global warming and geo-hazards • We characterize optimal exploitation paths and study decentralization with an exploitation tax. • Three regimes can occur: • i) exploitation in finite time and some of the stock remaining in situ, • ii) exploitation in finite time and the resource will be exhausted, • iii) exploitation and exhaustion in infinite time

  13. Localized appropriability: Percuniary externalities in knowledge exploitation

    OpenAIRE

    Antonelli, Cristiano

    2008-01-01

    Pecuniary externalities are crucial in shaping the strategies to value the distinctive competences and the economic success of innovative firms. The analysis of conditions for localized knowledge appropriation and exploitation makes it possible to identify idiosyncratic production factors. The introduction of directed technological change biased towards intensive usage provides the opportunity for the exploitation of technological knowledge.

  14. Exploration, Exploitation, and Organizational Coordination Mechanisms

    Directory of Open Access Journals (Sweden)

    Silvio Popadiuk

    2016-03-01

    Full Text Available This paper presents an empirical relationship among exploration, exploitation, and organizational coordination mechanisms, classified as the centralization of decision-making, formalization, and connectedness. In order to analyze the findings of this survey, we used two techniques: Principal Component Analysis (PCA and Partial Least Squares Path Modeling (PLS-PM. Our analysis was supported by 249 answers from managers of companies located in Brazil (convenience sampling. Contrary to expectations, centralization and exploitation were negatively associated. Our data supports the research hypothesis that formalization is positively associated with exploitation. Although the relationship between formalization and exploration were significant, the result is contrary to the research hypothesis that we made. The relationships among connectedness and exploitation, and connectedness and exploration were both positive and significant. This relationship means that the more connectedness increases, the higher the likelihood of exploitation and exploration.

  15. Optimal exploitation of complex electric energy systems

    International Nuclear Information System (INIS)

    One of the possible manners, to reduce the losses in consumption of electrical energy in Complex Electro-energetic Systems is inventing of optimal solution on a lot of problems which exists in exploitation of CEES (Complexual Electro-energetic Systems), as so as in theirs starting that and in theirs exploitation in CEES, independent of consumption in EPS (Electric Power System). In all this very important is the insuring of optimal exploitation of Power Plants with minimal economic deficit and minimal energetic deficit. In this paper will be proposed concrete example of exploitation of two Power Plants, which one of them is Thermal Power Plant and the other is Hydro Power Plant, and by the way was calculated their necessary optimal working time independent of consumption in Power Grids. It is analyzed regular using of Primary energetic sources in exploitation of Thermal and Hydro Power Plants with maximal saving water in HPP and maximal saving fossil fuel in TPP. (Author)

  16. The geographical distribution and habitats of three liver fluke intermediate hosts in South - Africa and the health implications involved

    Directory of Open Access Journals (Sweden)

    K. N. de Kock

    2008-09-01

    described as permanent, standing, fresh and clear. Although the highest percentage of samples of all three species was reported from loci that fell within the interval ranging from 16-20°C, a significant number of samples of L. truncatula came from loci falling with in the 11-15°C interval. In view of the fact that Lymnaea species are well known as intermediate hosts for liver fluke in South Africa and elsewhere in the world, the widespread occurrence of these snails could have considerable health and economic consequences. Lymnaea natalenis is the most important and probably the only intermediate host of Fasciola gigantica, the most common liver fluke in Africa but F. gigantica has been reliably reported only from Lesotho where its traditional intermediate host, L. truncatula is widespread. However, the epidemiology of fasciolosis in South Africa has been complicated by the invasion of many water-bodies by L. columella because this species has proved to be a successful host for F. hepatica where it had been introduced elsewhere in the world. To our knowledge its role in South Africa in this respect has not yet been evaluated. Due to the fact that no statistics are available in print, the results of positive serological tests on cattle herds all over South Africa were used to compile a map depicting the possible occurrence of Fasciola species in livestock in this country. Although human infections with Fasciola in Africa was considered as very rare in 1975 the situation has changed. It is considered an underrated and underreported disease in humans in Ethiopia and in Egypt an increase in cases of fasciolosis and prevalence’s as high as 12.8% in humans have also recently been reported. To our knowledge the only cases of human fasciolosis reported in literature for South Africa were from northern KwaZulu-Natal where F. hepatica infections were found in 22 out of 7 569 school children examined in 1981. Efforts to obtain recent statisticson human infections from various

  17. Blood Types

    Science.gov (United States)

    ... How Can I Help a Friend Who Cuts? Blood Types KidsHealth > For Teens > Blood Types Print A A ... or straight hair instead of curly. ...Make Eight Blood Types The different markers that can be found in ...

  18. Blood Types

    Science.gov (United States)

    ... confidence to respond in emergency situations with the skills that can help to save a life. Learn more » Red Cross Information Donating Blood Learn About Blood Hosting a Blood Drive For Hospitals Engage with Us About Us Media ...

  19. Liver Fluke Induces Cholangiocarcinoma

    OpenAIRE

    Sripa, Banchob; Kaewkes, Sasithorn; Sithithaworn, Paiboon; Mairiang, Eimorn; Laha, Thewarach; Smout, Michael; Pairojkul, Chawalit; Bhudhisawasdi, Vajaraphongsa; Tesana, Smarn; Thinkamrop, Bandit; Bethony, Jeffrey M.; Loukas, Alex; Brindley, Paul J.

    2007-01-01

    The authors discuss the molecular pathogenesis of opisthorchiasis and associated cholangiocarcinogenesis, particularly nitrative and oxidative DNA damage and the clinical manifestations of cholangiocarcinoma.

  20. Immunoelectrophoresis - blood

    Science.gov (United States)

    IEP - serum; Immunoglobulin electrophoresis - blood; Gamma globulin electrophoresis; Serum immunoglobulin electrophoresis ... A blood sample is needed. For information on how this is done, see: Venipuncture

  1. Should we envisage shale gas exploitation?

    International Nuclear Information System (INIS)

    Two points of view about shale gas exploitation are presented. The first one is proposed by an American scientist who outlines that the consequences of shale gas exploitation in the USA are already disastrous, notably in terms of water consumption by hydraulic fracturing (50 to 100 times more water for shale gas than for oil or natural gas), of greenhouse gas emissions (a lot a methane is leaking during this exploitation, and methane has a much stronger greenhouse effect than CO2), of environmental risks (shale gas wells are significantly susceptible to pollute underground waters, and radon is present in shale gas and would be released in housing). The second point of view outlines the lack of knowledge of the French underground, and that it is therefore impossible to assess shale gas reserves and exploitation possibilities

  2. Automatic exploitation system for photographic dosemeters

    International Nuclear Information System (INIS)

    The Laboratory of Dosimetry Exploitation (LED) has realized an equipment allowing to exploit automatically photographic film dosemeters. This system uses an identification of the films by code-bars and gives the doses measurement with a completely automatic reader. The principle consists in putting in ribbon the emulsions to be exploited and to develop them in a circulation machine. The measurement of the blackening film is realized on a reading plate having fourteen points of reading, in which are circulating the emulsions in ribbon. The exploitation is made with the usual dose calculation method, with special computers codes. A comparison on 2000 dosemeters has shown that the results are the same in manual and automatical methods. This system has been operating since July 1995 by the LED. (N.C.)

  3. Organ sales: exploitative at any price?

    Science.gov (United States)

    Lawlor, Rob

    2014-05-01

    In many cases, claims that a transaction is exploitative will focus on the details of the transaction, such as the price paid or conditions. For example, in a claim that a worker is exploited, the grounds for the claim are usually that the pay is not sufficient or the working conditions too dangerous. In some cases, however, the claim that a transaction is exploitative is not seen to rely on these finer details. Many, for example, claim that organ sales would be exploitative, in a way that doesn't seem to depend on the details. This article considers, but ultimately rejects, a number of arguments which could be used to defend this sort of claim. PMID:23025892

  4. Exploitation of Children Widespread, ILO Reports.

    Science.gov (United States)

    Kucherov, Tanya

    1980-01-01

    Reports that nearly 55 million children under age 15 are working in violation of labor standards. Discusses industries in which child labor is common, effects on children's safety and health, and social and economic causes of exploitation. (SK)

  5. Identité et exploitation au travail

    Directory of Open Access Journals (Sweden)

    Danilo Martuccelli

    2013-11-01

    Full Text Available This article explores some aspects of identity exploitation in the world of work. For this, he proceeds in three stages. First, it presents three major forms of capacity of employees - qualification, skills, identities. Then it draws the outlines of specific objective and subjective identity exploitation at work. Finally, it examines the notions of justice and injustice that can be mobilized to account this process.

  6. The Political Economy of Wildlife Exploitation

    OpenAIRE

    Anders Skonhoft; Jan Tore Solstad

    1998-01-01

    In this paper we analyze the exploitation of wildlife in a Third World context. In the model there are two agents: an agency managing a habitat area of fixed size and a group of peasants. The agency managing the habitat area has the legal right to exploit the wildlife, while the local people hunt illegally. Introducing the concept of relative harvesting dominance, we demonstrate that the stock utilization depends crucially on the prevailing economic and ecological conditions. It is also shown...

  7. The exploitation of social tagging in libraries

    OpenAIRE

    Κακάλη, Κωνσταντία; Παπαθεοδώρου, Χρήστος

    2011-01-01

    Nowadays, many libraries have developed social tagging services, after the considerable use of social tagging and deployment as key components of Web 2.0. Another set of libraries have enriched the search and indexing services of their OPACs with the folksonomy of Library Thing. The evaluation of these metadata (folksonomies) and further their exploitation is one of our challenges. At the same time, we explore ways to define a methodology for the exploitation of user’s vocabulary by the tradi...

  8. A Theory of Exploitative Child Labor

    OpenAIRE

    Carol Ann Rogers; Kenneth A. Swinnerton

    2005-01-01

    Child labor laws should aim to protect children who work, instead of trying to remove children from work. In this paper, we identify an instance when the risk of exploitation lowers the expected bene…t of child labor to the child,and therefore suppresses child labor force participation. Targeted legal intervention that lowers or removes the risk of exploitation raises child participation in the labor market, child welfare, and overall societal welfare. Targeting on child labor more broadly ma...

  9. Prevalence of Liver Fluke (Fasciola hepatica) in Wild Red Deer (Cervus elaphus): Coproantigen ELISA Is a Practicable Alternative to Faecal Egg Counting for Surveillance in Remote Populations.

    Science.gov (United States)

    French, Andrew S; Zadoks, Ruth N; Skuce, Philip J; Mitchell, Gillian; Gordon-Gibbs, Danielle K; Craine, Alexandra; Shaw, David; Gibb, Stuart W; Taggart, Mark A

    2016-01-01

    Red deer (Cervus elaphus) are hosts of liver fluke (Fasciola hepatica); yet, prevalence is rarely quantified in wild populations. Testing fresh samples from remote regions by faecal examination (FE) can be logistically challenging; hence, we appraise frozen storage and the use of a coproantigen ELISA (cELISA) for F. hepatica surveillance. We also present cELISA surveillance data for red deer from the Highlands of Scotland. Diagnoses in faecal samples (207 frozen, 146 fresh) were compared using a cELISA and by FE. For each storage method (frozen or fresh), agreement between the two diagnostics was estimated at individual and population levels, where population prevalence was stratified into cohorts (e.g., by sampling location). To approximate sensitivity and specificity, 65 post-slaughter whole liver examinations were used as a reference. At the individual level, FE and cELISA diagnoses agreed moderately (κfrozen = 0.46; κfresh = 0.51), a likely reflection of their underlying principles. At the population level, FE and cELISA cohort prevalence correlated strongly (Pearson's R = 0.89, p advantages of cELISA over FE: i) the ability to store samples long term (frozen) without apparent loss in diagnostic power; and ii) reduced labour and the ability to process large batches. Further evaluation of cELISA sensitivity in red deer, where a range of fluke burdens can be obtained, is desirable. In the interim, the cELISA is a practicable diagnostic for F. hepatica surveillance in red deer, and its application here has revealed considerable geographic, temporal, sex and age related differences in F. hepatica prevalence in wild Scottish Highland red deer. PMID:27598003

  10. Artificial blood

    Directory of Open Access Journals (Sweden)

    Sarkar Suman

    2008-01-01

    Full Text Available Artificial blood is a product made to act as a substitute for red blood cells. While true blood serves many different functions, artificial blood is designed for the sole purpose of transporting oxygen and carbon dioxide throughout the body. Depending on the type of artificial blood, it can be produced in different ways using synthetic production, chemical isolation, or recombinant biochemical technology. Development of the first blood substitutes dates back to the early 1600s, and the search for the ideal blood substitute continues. Various manufacturers have products in clinical trials; however, no truly safe and effective artificial blood product is currently marketed. It is anticipated that when an artificial blood product is available, it will have annual sales of over $7.6 billion in the United States alone.

  11. L'exploitation des algues en Bretagne

    OpenAIRE

    Arzel, Pierre

    2003-01-01

    Les algues sont exploitées sur les côtes de Bretagne. Le potentiel y est varié et riche. Depuis plusieurs siècles, cette exploitation fournit de la matière première à l'industrie. Les besoins élevés tant de l'industrie que de l'agriculture ont conduit les administrations impliquées à imposer des règles strictes d'exploitation. Ces mesures ont été complétées de tout temps par des us et coutumes qui visaient à mieux organiser les campagnes de récolte. Aujourd'hui, la récolte porte sur un...

  12. Oil exploitation and the environmental Kuznets curve

    Energy Technology Data Exchange (ETDEWEB)

    Esmaeili, Abdoulkarim; Abdollahzadeh, Negar [Department of Agricultural Economics, College of Agriculture, Shiraz University, Shiraz, Fars (Iran)

    2009-01-15

    This study refers to a panel estimation of an environmental Kuznets curve (EKC) for oil to determine the factors most affecting oil exploitation in 38 oil-producing countries during 1990-2000. Control variables such as oil reserves, oil price, population, political rights, and the Gini index were used to determine its contribution to the main EKC model. The empirical results fully support the existence of an EKC for oil exploitation. Furthermore, the result indicates that the proved oil reserves has a significant and positive role in oil production, but oil price and population do not significantly affect crude oil production. Also, increased freedoms and a better income distribution will reduce the rate of oil exploitation. Thus, policies aiming at enhancing democratic society and better income distribution would be more compatible with sustainability. (author)

  13. PUNISHMENT FOR SEXUAL EXPLOITATION OF THE CHILDREN

    OpenAIRE

    B. P. Tiwari

    2015-01-01

    Sexual Exploitation of the children for any country is worst than other offence against children. It is not only the duty of state to protect the dignity of the women but, Article 51 A(e) of the constitution imposes the duty on every citizen of India in mandatory from which says that “It shall be the duty of every citizen of India, to renounce practices derogatory to the dignity of women.” The Sexual Exploitation of children is a social disease that denies a child their basic rights as ...

  14. Exploitation Cinema and the Lesbian Imagination

    OpenAIRE

    Crémieux, Anne

    2016-01-01

    À leur sortie, les films d’exploitation ont été critiqués pour leur représentation des femmes et des homosexuelles. Cependant, le recul du temps et les transformations de la société permettent aux publics féministes de s’approprier des films et leurs curieux personnages queer qu’ils peuvent désormais apprécier non seulement comme traces du passé, mais aussi comme des personnages véritablement subversifs. Cet article évoque des films d’exploitation comme Faster Pussycat! Kill! Kill! (1965) ou ...

  15. Blood smear

    Science.gov (United States)

    ... osmotic fragility ) Deficiency of an enzyme called lecithin cholesterol acyl transferase Abnormalities of hemoglobin , the protein in ... sickle and Pappenheimer Red blood cells, target cells Formed elements of blood References Bain BJ. The peripheral ...

  16. Child Exploitation: Some Pieces of the Puzzle.

    Science.gov (United States)

    Rohlader, Dorothy

    The report addresses the status in North Carolina and in the nation of child exploitation. Legislative and judicial backgrounds of child pornography and child prostitution are reviewed, and difficulties in obtaining statistical data are noted. Law enforcement issues in pornography are cited, and suggestions for further legislation regarding child…

  17. Randomized Heuristics for Exploiting Jacobian Scarcity

    OpenAIRE

    Lyons, Andrew; Safro, Ilya

    2009-01-01

    Griewank and Vogel introduced the notion of Jacobian scarcity, which generalizes the properties of sparsity and rank to capture a kind of deficiency in the degrees of freedom of the Jacobian matrix $F'(mathbf{x}).$ We describe new randomized heuristics that exploit scarcity for the optimized evaluation of collections of Jacobian-vector or Jacobian-transpose-vector products.

  18. End of the Jouac mines exploitation

    International Nuclear Information System (INIS)

    The Society of Jouac Mines (SMJ) works the uranium deposit of Bernardan since 1978. The document presents the management of this deposit exploitation end. The historical and social aspects, the site remedial, the wastes storage and the economic aspect of the project are provided. (A.L.B.)

  19. Dynamics and exploitation of unstable percid populations.

    NARCIS (Netherlands)

    Buijse, A.D.

    1992-01-01

    The gill net fishery on perch (Perca fluviatilis) and especially the highly valued pikeperch (Stizostedion lucioperca) in Lake IJssel is characterised by large variations in the yield. These variations are caused by variations in yearclass strength in combination with the high exploitation rate. In

  20. Mineral exploitation and development in Greenland

    DEFF Research Database (Denmark)

    Hendriksen, Kåre; Hoffmann, Birgitte; Jørgensen, Ulrik

    using immigrant and migrant labourers that work intensively while living in temporary quarters. The historic experiences of Greenland tell that a different, slower exploitation of mineral resources may contribute to social improvements and competence building thereby providing long-term improvements for...

  1. Exploiting multilevel preconditioning techniques in eigenvalue computations

    NARCIS (Netherlands)

    Sleijpen, Gerard L.G.; Wubs, Fred W.

    2003-01-01

    In the Davidson method, any preconditioner can be exploited for the iterative computation of eigenpairs. However, the convergence of the eigenproblem solver may be poor for a high quality preconditioner. Theoretically, this counter-intuitive phenomenon with the Davidson method is remedied by the Jac

  2. The Illegal Exploitation of Natural Resources

    NARCIS (Netherlands)

    Boekhout van Solinge, T.

    2014-01-01

    This essay discusses the involvement of organized crime in natural resource exploitation and trade. This is accomplished by examining case studies from different tropical regions in the world: Africa (Liberia, Sierra Leone, and DR Congo), Southeast Asia (Indonesia), and Latin America (Brazilian Amaz

  3. Packaging of Sin Goods - Commitment or Exploitation?

    DEFF Research Database (Denmark)

    Nafziger, Julia

    to such self-control problems, and possibly exploit them, by offering different package sizes. In a competitive market, either one or three (small, medium and large) packages are offered. In contrast to common intuition, the large, and not the small package is a commitment device. The latter serves...

  4. Trolling may intensify exploitation in crappie fisheries

    Science.gov (United States)

    Meals, K. O.; Dunn, A. W.; Miranda, Leandro E.

    2012-01-01

    In some parts of the USA, anglers targeting crappies Pomoxis spp. are transitioning from mostly stationary angling with a single pole around submerged structures to using multiple poles while drifting with the wind or under power. This shift in fishing methods could result in a change in catch efficiency, possibly increasing exploitation rates to levels that would be of concern to managers. We studied the catch statistics of anglers fishing while trolling with multiple poles (trollers) and those fishing with single poles (polers) in Mississippi reservoirs. Specifically, we tested whether (1) various catch statistics differed between trollers and polers, (2) catch rates of trollers were related to the number of poles fished, and (3) trollers could raise exploitation rates to potentially unsustainable levels. Results showed that participation in the crappie fisheries was about equally split between polers and trollers. In spring, 90% of crappie anglers were polers; in summer, 85% of crappie anglers were trollers. The size of harvested crappies was similar for the two angler groups, but the catch per hour was almost three times higher for trollers than for polers. Catch rates by trollers were directly correlated to the number of poles fished, although the relationship flattened as the number of poles increased. The average harvest rate for one troller fishing with three poles was similar to the harvest rate obtained by one poler. Simulations predicted that at the existing mix of about 50% polers and 50% trollers and with no restrictions on the number of poles used by trollers, exploitation of crappies is about 1.3 times higher than that in a polers-only fishery; under a scenario in which 100% of crappie anglers were trollers, exploitation was forecasted to increase to about 1.7 times the polers-only rate. The efficiency of trolling for crappies should be of concern to fishery managers because crappie fisheries are mostly consumptive and may increase exploitation

  5. Fasciola hepatica: Specificity of a coproantigen ELISA test for diagnosis of fasciolosis in faecal samples from cattle and sheep concurrently infected with gastrointestinal nematodes, coccidians and/or rumen flukes (paramphistomes), under field conditions.

    Science.gov (United States)

    Kajugu, P-E; Hanna, R E B; Edgar, H W; McMahon, C; Cooper, M; Gordon, A; Barley, J P; Malone, F E; Brennan, G P; Fairweather, I

    2015-09-15

    Chronic fasciolosis is often diagnosed by faecal egg counting (FEC), following concentration of the eggs in the sample by a zinc sulphate floatation method. However, concentration by a sedimentation technique gives improved sensitivity. Interpretation of FEC results for fasciolosis is complicated by factors such as the long pre-patent period and irregular egg shedding. Thus, FEC reduction tests (FECRT), when used alone, are not completely reliable for diagnosis of anthelmintic susceptibility or resistance in local fluke populations, especially when parasite burdens are small. A Fasciola hepatica coproantigen ELISA test has been introduced which more accurately reflects the presence of flukes in the host bile ducts in late pre-patent infections, and absence of flukes following successful chemotherapeutic intervention. The aim of the present study was to elucidate the specificity of the F. hepatica coproantigen ELISA technique, particularly regarding potential cross-reactivity with rumen fluke (paramphistome), gastrointestinal nematode and coccidian infections. The method involved parallel testing of a large battery of faecal samples from field-infected cattle and sheep using floatation and sedimentation FECs and coproantigen analysis. No evidence was found for significant false positivity in the F. hepatica coproantigen ELISA due to paramphistome, coccidian and/or gastrointestinal nematode co-infections. With sedimentation FECs less than 10 F. hepatica eggs per gram (epg), the likelihood of a positive coproantigen result for the sample progressively decreased. Diagnosis of fasciolosis should be based on consideration of both FEC and coproantigen ELISA findings, to ensure optimum sensitivity for pre-patent and low-level infections. PMID:26234898

  6. Cord Blood

    Directory of Open Access Journals (Sweden)

    Saeed Abroun

    2014-05-01

    Full Text Available   Stem cells are naïve or master cells. This means they can transform into special 200 cell types as needed by body, and each of these cells has just one function. Stem cells are found in many parts of the human body, although some sources have richer concentrations than others. Some excellent sources of stem cells, such as bone marrow, peripheral blood, cord blood, other tissue stem cells and human embryos, which last one are controversial and their use can be illegal in some countries. Cord blood is a sample of blood taken from a newborn baby's umbilical cord. It is a rich source of stem cells, umbilical cord blood and tissue are collected from material that normally has no use following a child’s birth. Umbilical cord blood and tissue cells are rich sources of stem cells, which have been used in the treatment of over 80 diseases including leukemia, lymphoma and anemia as bone marrow stem cell potency.  The most common disease category has been leukemia. The next largest group is inherited diseases. Patients with lymphoma, myelodysplasia and severe aplastic anemia have also been successfully transplanted with cord blood. Cord blood is obtained by syringing out the placenta through the umbilical cord at the time of childbirth, after the cord has been detached from the newborn. Collecting stem cells from umbilical blood and tissue is ethical, pain-free, safe and simple. When they are needed to treat your child later in life, there will be no rejection or incompatibility issues, as the procedure will be using their own cells. In contrast, stem cells from donors do have these potential problems. By consider about cord blood potency, cord blood banks (familial or public were established. In IRAN, four cord blood banks has activity, Shariati BMT center cord blood bank, Royan familial cord blood banks, Royan public cord blood banks and Iranian Blood Transfusion Organ cord blood banks. Despite 50,000 sample which storage in these banks, but the

  7. The effect of the liver fluke Fasciola gigantica infestation on the leucocyte eosinophil cell profile on sheep

    OpenAIRE

    S Widjajanti; S.E Estuningsih; Subandriyo; D Piedrafita; Raadsma, H. W.

    2004-01-01

    Eosinophil is one of the major leucocyte cell in the blood which specifically reacted on parasite infection, thus it is important to determine its profile against the F. gigantica infection. The aims of this study is to determine the differences of the eosinophil count profiles on the different breed of sheep infected with F. gigantica and its relation with the resistance of sheep bred against parasitic disease. Four groups of sheep consist of Indonesian Thin Tail (ITT) sheep, Merino sheep, b...

  8. Exploitable underground water reserves; 1 : 500 000

    International Nuclear Information System (INIS)

    The documents of the Slovak Hydrometeorological Institute (the State Water-Economic Balance of the SR, Water-Economic Balance for 1988 - part Underground Waters) were used as the source materials. Calculation of the exploitable underground water reserves was based on the hydrological characteristics of the individual hydro-geological zones. The obtained values of the exploitable underground water supply are expressed in dm3.s-1.km-2 for the particular hydrogeological zone. The seven-grade scale of yield from 0 to 10 dm3.s-1.km-2 and more was compiled from the obtained values. Numerical signing of hydrogeological zone, which agrees with the new Hydrogeological Zoning of the SR from 1998 is also expressed in the map. The zones are numbered from 001 to 142 and the stratigraphic indices, which characterise the stratigraphic appurtenance of the zone, were aligned to the numbers. (authors)

  9. Energy exploitation of agricultural residues in Crete

    Energy Technology Data Exchange (ETDEWEB)

    Vamvuka, D.; Tsoutsos, T.D.

    2002-07-01

    The island of Crete is a typical Mediterranean area with a high biomass potential, the major part of which is still unexploited or irrationally exploited, but at the same time has a problematic energy supply during the high touristic season. In this paper the energy content of the biomass potential is estimated, as a parameter to alleviate the energy system of the island. The exploitation of biomass is studied with reference to the following aspects: the major residue production (olive kernel, husks - citrus fruits, grapes), branches (olive tree, citrus tree, grape tree); the qualitative analysis (proximate, ultimate, calorific value, ash analysis) of samples of basic agricultural residues of the Cretan production (vineshoots, olive tree wood and citrus, olive kernel). (author)

  10. Dynamics and exploitation of unstable percid populations.

    OpenAIRE

    Buijse, A.D.

    1992-01-01

    The gill net fishery on perch (Perca fluviatilis) and especially the highly valued pikeperch (Stizostedion lucioperca) in Lake IJssel is characterised by large variations in the yield. These variations are caused by variations in yearclass strength in combination with the high exploitation rate. In the present study a start has been made to explain the causes for variations in year-class strength. In addition, possible management measures are evaluated for their effectiveness in optimising yi...

  11. Exploiting log files in video retrieval

    OpenAIRE

    Hopfgartner, F.; Urruty, T.; Villa, R.; Gildea, N.; Jose, J.M.

    2008-01-01

    While research into user-centered text retrieval is based on mature evaluation methodologies, user evaluation in multimedia retrieval is still in its infancy. User evaluations can be expensive and are also often non-repeatable. An alternative way of evaluating such systems is the use of simulations. In this poster, we present an evaluation methodology which is based on exploiting log files recorded from a user-study we conducted.

  12. Exploiting tag correlations to improve multilabel learning

    OpenAIRE

    Payne, Brent

    2011-01-01

    This thesis looks at applying tags to musical songs as a multilabeling problem. We focus on the CAL500 dataset which summarizes 1704 student reviews into tags for 502 songs. This summarization loses information, so we create the CAL1700 dataset which uses each of the student reviews to generate a single multilabel. We develop a two-layer technique to exploit tag correlations. The first layer makes tag predictions based on data features. The second layer applies correlation information to thes...

  13. Exploitation of Folksonomies in Subject Analysis

    OpenAIRE

    Παπαθεοδώρου, Χρήστος; Κακάλη, Κωνσταντία

    2010-01-01

    Social tagging is one of the most popular of social media applications and has attracted the interest of a number of libraries and museums, which have developed services that facilitate user-community collaboration. This paper presents a methodology for the exploitation of social tagging in subject indexing, and explores that method through a case study in an academic library setting. The findings reveal the characteristics of users' tagging behavior, which mainly enhances the subject descrip...

  14. Matching characteristic codes: exploiting two directions

    OpenAIRE

    Lehner, Luis

    1999-01-01

    Combining incoming and outgoing characteristic formulations can provide numerical relativists with a natural implementation of Einstein's equations that better exploits the causal properties of the spacetime and gives access to both null infinity and the interior region simultaneously (assuming the foliation is free of caustics and crossovers). We discuss how this combination can be performed and illustrate its behavior in the Einstein-Klein-Gordon field in 1D.

  15. Exploiting Social Semantics for Multilingual Information Retrieval

    OpenAIRE

    Sorg, Philipp

    2011-01-01

    In this thesis we consider how user-generated content that is assembled by different popular Web portals can be exploited for Multilingual Information Retrieval. We define the knowledge that can be derived from such portals as Social Semantics. We present to approaches, Cross-lingual Explicit Semantic Analysis and Discriminative Retrieval Models, that are able to support multilingual retrieval models by integrating Social Semantics derived from Wikipedia and Yahoo! Answers.

  16. PUNISHMENT FOR SEXUAL EXPLOITATION OF THE CHILDREN

    Directory of Open Access Journals (Sweden)

    B. P. Tiwari

    2015-01-01

    Full Text Available Sexual Exploitation of the children for any country is worst than other offence against children. It is not only the duty of state to protect the dignity of the women but, Article 51 A(e of the constitution imposes the duty on every citizen of India in mandatory from which says that “It shall be the duty of every citizen of India, to renounce practices derogatory to the dignity of women.” The Sexual Exploitation of children is a social disease that denies a child their basic rights as their human integrity. It has many form, the most common of which is child prostitutions, but incest abuse, rape, child brides and female genital mutilation are lesser known but equally widespread forms of Sexual abuse. Children around the world are sexually abused and exploited on ways but that can cause permanent physical and psychological harm. ‘Child Sexual Abuse’ is a crime so common hideous and yet completely unspoken about the Indian society. Child labour is another form of abuse. Time to time all news papers shows that the child abuse number is increasing. But surprisingly all the agencies to curb this menace is turning deaf ears to it. All the political party and trade union are also least bothered because these children are not the vote banks.

  17. Human trafficking, modern day slavery, and economic exploitation

    OpenAIRE

    Koettl, Johannes

    2009-01-01

    Human trafficking, as it is defined by international law, subsumes all forms of nonconsensual exploitation. That is, whenever people are forced or lured into exploitation no matter if movement of victims is involved it is considered human trafficking. There is, though, a large overlap with consensual exploitation, namely when economic vulnerabilities forcevictims to accept exploitative work arrangements. Consensual exploitation is mostly addressed through social and labor law, which is also a...

  18. Objectivist versus Subjectivist Approaches to the Marxian Theory of Exploitation

    OpenAIRE

    Veneziani, Roberto; Yoshihara, Naoki

    2009-01-01

    This paper analyses two central issues in exploitation theory. First, the appropriate definition of individual and aggregate measures of exploitation is discussed. Second, the relation between profits and exploitation (the so-called Fundamental Marxian Theorem) is analysed. A general framework for the analysis of exploitation in the context of convex cone economies is proposed and various alternative equilibrium concepts are discussed. The limits of subjectivist approaches to exploitation, wh...

  19. Blood / Money

    OpenAIRE

    Strong, Thomas

    1997-01-01

    Marilyn Strathern has argued that "nature" in Euro-American culture has appeared as constraint; it has figured the givens of existence on which human artifice is seen to construct "society" or "culture."(5) Among those givens is the notion that human beings are naturally individuals. And blood, too, images individuality: "The very thought of blood, individual blood, touches the deepest feelings in man about life and death" ([RIchard Titmuss] 16.) Transfusion medicine, then, draws on a series ...

  20. Characterization of nine microsatellite loci for Dicrocoelium dendriticum, an emerging liver fluke of ungulates in North America, and their use to detect clonemates and random mating.

    Science.gov (United States)

    van Paridon, Bradley J; Goater, Cameron P; Gilleard, John S; Criscione, Charles D

    2016-05-01

    This study characterizes polymorphic microsatellite loci from adults of the liver fluke Dicrocoelium dendriticum sampled from a population of sympatric beef cattle and wapiti in a region of emergence in southern Alberta, Canada. We also scrutinized the markers to validate their use in studying the population genetics of this complex life cycle parasite. Among the nine loci described, four deviated significantly from Hardy Weinberg Equilibrium (HWE) due to technical artefacts. The remaining five loci were in HWE. These five provided sufficient resolution to identify clonemates produced from the obligate asexual reproduction phase of the life cycle in snails and to assess the impact of non-random transmission of clonemates on measures of FIS, FST and genotypic disequilibrium. Excluding clonemates, we show that the sub-population of worms was in HWE, that average FIS within hosts was 0.003 (p=0.4922) and that there was no population genetic structure among hosts FST=0.001 (p=0.3243). These markers will be useful for studies of Dicrocoelium dendriticum ecology, transmission, and evolution. PMID:27188658

  1. 2D-PAGE analysis of the soluble proteins of the tropical liver fluke, Fasciola gigantica and biliary amphistome, Gigantocotyle explanatum, concurrently infecting Bubalus bubalis.

    Science.gov (United States)

    Khan, Yasir A; Khan, Mohd Abdul Hannan; Abidi, S M A

    2016-09-01

    The digenetic trematodes, Fasciola gigantica and Gigantocotyle explanatum, belonging to the family Fasciolidae and Paramphistomidae respectively, have been often found to concurrently infect the liver of Indian water buffalo Bubalus bubalis, causing serious pathological damage to the vital organ, incurring huge economic losses. In the present study the soluble gene products of both F. gigantica and G. explanatum were analyzed by 2 dimensional polyacrylamide gel electrophoresis. The soluble proteomic profile revealed considerable similarity as well as differences in the size, distribution pattern, total number, the isoelectric point (pI) and molecular weight (Mr) of the resolved polypeptide spots. The maximum number of polypeptide spots with a molecular weight range of >10 to 160 kDa were recorded with a pI range of 7-9 followed by pI range of 5-7, 9-10 and 3-5 in both the parasites. However, considerable variation was recorded in the Mr of the polypeptides belonging to each pI range. The genetic heterogeneity could be an obvious contributing factor for such differences but some polypeptides appeared to be conserved in the two species. The molecular similarities and the habitat preference by these worms may be a consequence of microenvironmental cues that guide these flukes to reach their habitat through different routes and establish a successful host-parasite relationship. PMID:27605808

  2. Immune responses in rats and sheep induced by a DNA vaccine containing the phosphoglycerate kinase gene of Fasciola hepatica and liver fluke infection.

    Science.gov (United States)

    Wesołowska, Agnieszka; Zawistowska-Deniziak, Anna; Norbury, Luke J; Wilkowski, Przemysław; Januszkiewicz, Kamil; Pyziel, Anna M; Zygner, Wojciech; Wędrychowicz, Halina

    2016-06-01

    Immune responses of rats and sheep following vaccination with cDNA encoding phosphoglycerate kinase of Fasciola hepatica (cDNA-FhPGK/pCMV) and F. hepatica infection were investigated in the present study. cDNA-FhPGK/pCMV vaccinated female Sprague-Dawley rats were better protected by vaccination than their male counterparts - 48% reduction in fluke burden for females and no protection for males when compared with appropriate infection control groups. Moreover, male rats developed marked leukocytosis during the study with higher neutrophil, eosinophil and monocyte responses than females. Additionally, dynamics of eosinophil and monocyte responses varied between sexes. Increased titres of anti-FhPGK IgG1 and IgG2a correlated with the protective effect of vaccination that was observed among female rats. In the case of male sheep, no differences in worm burdens and in the course of the immune response were observed following vaccination. Titres of specific antibodies detected were low, and cellular responses were not significant. Apparently, sheep immune responses induced by cDNA-FhPGK/pCMV vaccination are not effective at controlling F. hepatica infection. Poor immunogenicity of DNA vaccines in large animals is still a major obstacle of this technology that has to be overcome. PMID:27078643

  3. Understanding Blood Counts

    Science.gov (United States)

    ... Lab and Imaging Tests Understanding Blood Counts Understanding Blood Counts Understanding Blood Counts SHARE: Print Glossary Blood cell counts give ... your blood that's occupied by red cells. Normal Blood Counts Normal blood counts fall within a range ...

  4. Blood donation

    CERN Multimedia

    GS Department

    2009-01-01

    A blood donation is organised by the Cantonal Hospital of Geneva On Thursday 19 March 2009 from 9 a.m. to 5 p.m. CERN RESTAURANT 2 Number of donations during the last blood donations :135 donors in July 2008 122 donors in November 2008 Let’s do better in 2009 !!! Give 30 minutes of your time to save lives...

  5. BLOOD DONATION

    CERN Multimedia

    SC Unit

    2008-01-01

    A blood donation, organized by EFS (Etablissement Français du Sang) of Annemasse will take place On Wednesday 12 November 2008, from 8:30 to 16:00, at CERN Restaurant 2 If possible, please, bring your blood group Card.

  6. Tainted blood

    DEFF Research Database (Denmark)

    Deleuran, Ida; Sheikh, Zainab Afshan; Hoeyer, Klaus

    2015-01-01

    study of the historical rise and current workings of safety practices in the Danish blood system. Here, we identify a strong focus on contamination in order to avoid 'tainted blood', at the expense of working with risks that could be avoided through enhanced blood monitoring practices. Of further...... significance to this focus are the social dynamics found at the heart of safety practices aimed at avoiding contamination. We argue that such dynamics need more attention, in order to achieve good health outcomes in transfusion medicine. Thus, we conclude that, to ensure continuously safe blood systems, we...... need to move beyond the bifurcation of the social and medical aspects of blood supply as two separate issues and approach social dynamics as key medical safety questions....

  7. Exploitation of subsea gas hydrate reservoirs

    Science.gov (United States)

    Janicki, Georg; Schlüter, Stefan; Hennig, Torsten; Deerberg, Görge

    2016-04-01

    Natural gas hydrates are considered to be a potential energy resource in the future. They occur in permafrost areas as well as in subsea sediments and are stable at high pressure and low temperature conditions. According to estimations the amount of carbon bonded in natural gas hydrates worldwide is two times larger than in all known conventional fossil fuels. Besides technical challenges that have to be overcome climate and safety issues have to be considered before a commercial exploitation of such unconventional reservoirs. The potential of producing natural gas from subsea gas hydrate deposits by various means (e.g. depressurization and/or injection of carbon dioxide) is numerically studied in the frame of the German research project »SUGAR«. The basic mechanisms of gas hydrate formation/dissociation and heat and mass transport in porous media are considered and implemented into a numerical model. The physics of the process leads to strong non-linear couplings between hydraulic fluid flow, hydrate dissociation and formation, hydraulic properties of the sediment, partial pressures and seawater solution of components and the thermal budget of the system described by the heat equation. This paper is intended to provide an overview of the recent development regarding the production of natural gas from subsea gas hydrate reservoirs. It aims at giving a broad insight into natural gas hydrates and covering relevant aspects of the exploitation process. It is focused on the thermodynamic principles and technological approaches for the exploitation. The effects occurring during natural gas production within hydrate filled sediment layers are identified and discussed by means of numerical simulation results. The behaviour of relevant process parameters such as pressure, temperature and phase saturations is described and compared for different strategies. The simulations are complemented by calculations for different safety relevant problems.

  8. Exploiting Polyhedral Symmetries in Social Choice

    CERN Document Server

    Schürmann, Achill

    2011-01-01

    A large amount of literature in social choice theory deals with quantifying the probability of certain election outcomes. One way of computing the probability of a specific voting situation under the impartial anonymous culture is via counting integral points in polyhedra. Here, Ehrhart theory can help, but unfortunately the dimension and complexity of the involved polyhedra grows rapidly with the number of candidates. However, if we exploit available polyhedral symmetries, some computations become possible that previously were infeasible. We show this in three well known examples: Condorcet's paradox, Condorcet efficiency of plurality voting and in Plurality voting vs Plurality Runoff.

  9. Geothermal resources: exploration and exploitation. A bibliography

    Energy Technology Data Exchange (ETDEWEB)

    1976-07-01

    This comprehensive bibliography contains 5476 citations of foreign and domestic research reports, journal articles, patents, conference proceedings, and books concerned with the exploration and exploitation of geothermal resources. The coverage dates back as far as useful references could be obtained and extends through June 1976. References are arranged in broad subject categories and are made up of complete bibliographic citations. These are followed by a listing of subject descriptors used to describe the subject content of each reference. Four indexes are included: Corporate, Personal Author, Subject, and Report Number. Also included is a list of journals from which articles were selected. (LBS)

  10. Electromagnetic Optimization Exploiting Aggressive Space Mapping

    DEFF Research Database (Denmark)

    Bandler, J. W.; Biernacki, R.; Chen, S.;

    1995-01-01

    We propose a significantly improved space mapping (SM) strategy for electromagnetic (EM) optimization. Instead of waiting for upfront EM analyses at several base points, our new approach aggressively exploits every available EM analysis, producing dramatic results right from the first step. We...... establish a relationship between the novel SM optimization and the quasi-Newton iteration for solving a system of nonlinear equations. Approximations to the matrix of first-order derivatives are updated by the classic Broyden formula. A high-temperature superconducting microstrip filter design solution...

  11. Exploiting HRM in support of lean manufacturing

    DEFF Research Database (Denmark)

    Jørgensen, Frances; Matthiesen, Rikke

    The purpose of this paper is to investigate the ways in HRM practices are-and could potentially be-exploited to support lean manufacturing in practice. First, a review of the pertinent literature regarding HRM, SHRM, and lean manufacturing is presented to provide an understanding of the mechanisms...... by which HRM practices could, theoretically, be used to support a lean implementation. Data presented in the paper are derived from 1) a longitudinal case study on lean implementation and 2) from managers currently involved with lean manufacturing in a second company. The relevant literature and the...... lean manufacturing....

  12. Exploiting Reference Images in Exposing Geometrical Distortions

    Directory of Open Access Journals (Sweden)

    Rimba Whidiana Ciptasari

    2013-07-01

    Full Text Available Nowadays, image alteration in the mainstream mediahas become common. The degree of manipulation isfacilitated by image editing software. In the pasttwo decades the number indicating manipulation ofimages rapidly grows. Hence, there are many outstanding images which have no provenance informationor certainty of authenticity. Therefore, constructing a scientific and automatic way for evaluating imageauthenticity is an important task, which is the aimof this paper. In spite of having outstandingperformance, all the image forensics schemes developed so far have not provided verifiable informationabout source of tampering. This paper aims to propose a different kind of scheme, by exploiting a group ofsimilar images, to verify the source of tampering.First, we define our definition with regard to tamperedimage. The distinctive features are obtained by exploiting Scale- Invariant Feature Transform (SIFTtechnique. We then proposed clustering technique toidentify the tampered region based on distinctivekeypoints. In contrast to k-means algorithm, our technique does not require the initialization of k value. Theexperimental results over and beyond the dataset indicate the efficacy of our proposed scheme.

  13. Large size space construction for space exploitation

    Science.gov (United States)

    Kondyurin, Alexey

    2016-07-01

    Space exploitation is impossible without large space structures. We need to make sufficient large volume of pressurized protecting frames for crew, passengers, space processing equipment, & etc. We have to be unlimited in space. Now the size and mass of space constructions are limited by possibility of a launch vehicle. It limits our future in exploitation of space by humans and in development of space industry. Large-size space construction can be made with using of the curing technology of the fibers-filled composites and a reactionable matrix applied directly in free space. For curing the fabric impregnated with a liquid matrix (prepreg) is prepared in terrestrial conditions and shipped in a container to orbit. In due time the prepreg is unfolded by inflating. After polymerization reaction, the durable construction can be fitted out with air, apparatus and life support systems. Our experimental studies of the curing processes in the simulated free space environment showed that the curing of composite in free space is possible. The large-size space construction can be developed. A project of space station, Moon base, Mars base, mining station, interplanet space ship, telecommunication station, space observatory, space factory, antenna dish, radiation shield, solar sail is proposed and overviewed. The study was supported by Humboldt Foundation, ESA (contract 17083/03/NL/SFe), NASA program of the stratospheric balloons and RFBR grants (05-08-18277, 12-08-00970 and 14-08-96011).

  14. ROUNDTABLE - SESSION 2 EXPLOITATION, CONSERVATION AND LEGISLATION

    Directory of Open Access Journals (Sweden)

    EDSMAN L.

    2004-01-01

    Full Text Available The link between socioeconomics and conservation and the role of legislation in conservation work was discussed in the group with participants from nine European countries. Interest and knowledge among the general public, stakeholders and managers is the key to successful conservation of native crayfish species. Exploitation and conservation do not necessarily exclude each other. A controlled fishery, where it can be sustained, may be an essential tool for conservation by increasing the general awareness and involving more people in the task of protecting the native crayfish species. This strategy is mainly possible for the noble crayfish in the northern part of its distribution, where strong traditions connected to crayfish also exist. A balance between utilisation and overexploitation has to be found and local guidelines for sustainable exploitation produced. Media, the Internet and educational material aimed at schools and stakeholders are excellent ways of reaching a wide audience with information. Universal objectives, rules and regulations at the European level are desirable and the noble crayfish and the stone crayfish should be included in Annex II of the Habitat Directive. Based on this framework detailed regulations are best worked out at the national level, considering the specific crayfish situation in the country. Information about the legislation, the purpose of the legislation and the consequences when not obeying it should be distributed. Stricter regulation of the trade with live alien crayfish is vital because of the associated risk of introducing new diseases and species.

  15. Donating Blood

    Science.gov (United States)

    ... And be sure to drink plenty of water, milk, or other liquids. Before donating, you'll need to answer some questions about your medical history, and have your temperature, pulse, blood pressure, and ...

  16. Blood smear

    Science.gov (United States)

    ... of RBCs due to body destroying them ( immune hemolytic anemia ) Low number of RBCs due to some red ... of Heinz bodies may indicate: Alpha thalassemia Congenital hemolytic anemia Disorder in which red blood cells break down ...

  17. Amylase - blood

    Science.gov (United States)

    Amylase is an enzyme that helps digest carbohydrates. It is made in the pancreas and the glands ... saliva. When the pancreas is diseased or inflamed, amylase releases into the blood. A test can be ...

  18. Moving blood.

    Science.gov (United States)

    Pelis, K

    1997-01-01

    Our internationally acclaimed journalist Sanguinia has returned safely from her historic assignment. Travelling from Homeric Greece to British Romanticism, she was witness to blood drinking, letting, bathing, and transfusion. In this report, she explores connections between the symbolic and the sadistic; the mythic and the medical--all in an effort to appreciate the layered meanings our culture has given to the movement of blood between our bodies. PMID:9407636

  19. Capitalist exploitation without capitalist production: The consequences of imperfect contracting

    OpenAIRE

    Gilbert Skillman

    2014-01-01

    On the basis of a static general equilibrium analysis premised on frictionless exchange conditions in competitive markets, John Roemer’s General Theory of Exploitation and Class challenges the canonical Marxian account of capitalist exploitation by arguing that unequal distribution of economically scarce productive assets suffices to enable the exploitation of labor by capital. Marxian critics have dismissed Roemer’s characterization partly on the presumption that capitalist exploitation ...

  20. Blood Clotting and Pregnancy

    Medline Plus

    Full Text Available ... Blood Basics Blood Disorders Anemia Bleeding Disorders Blood Cancers Blood Clots Blood Clotting and Pregnancy Clots and ... Increased maternal age Other medical illness (e.g., cancer, infection) back to top How are Blood Clots ...

  1. Biology of Blood

    Science.gov (United States)

    ... Mail Facebook TwitterTitle Google+ LinkedIn Home Blood Disorders Biology of Blood Overview of Blood Medical Dictionary Also ... Version. DOCTORS: Click here for the Professional Version Biology of Blood Overview of Blood Components of Blood ...

  2. Blood (For Parents)

    Science.gov (United States)

    ... Story" 5 Things to Know About Zika & Pregnancy Blood KidsHealth > For Parents > Blood Print A A A ... about the mysterious, life-sustaining fluid called blood. Blood Basics Two types of blood vessels carry blood ...

  3. Blood Facts and Statistics

    Science.gov (United States)

    ... About Blood > Blood Facts and Statistics Printable Version Blood Facts and Statistics Facts about blood needs Facts ... about American Red Cross Blood Services Facts about blood needs Every two seconds someone in the U.S. ...

  4. Catecholamine blood test

    Science.gov (United States)

    Norepinephrine -- blood; Epinephrine -- blood; Adrenalin -- blood; Dopamine -- blood ... A blood sample is needed. ... the test. This is especially true if both blood and urine catecholamines are to be measured. You ...

  5. Total exploitation of an ornamental granite quarry

    Directory of Open Access Journals (Sweden)

    Taboada, J.

    2005-09-01

    Full Text Available In this paper we propose a methodology to estimate the recovery percentage for each of the products which can be obtained from the exploitation of an ornamental granite quarry: block, semiblock, masonry-transverse stone, and the smaller materials that can be used to obtain construction aggregates. This methodology ensures that quarry exploitation is exhaustive, thereby minimising the production of spoils and the consequent negative impact on the environment. The analysis is based on a detailed and exhaustive compilation of discontinuity data from the research fronts, which are then interpreted statistically and projected over the three weakness planes that are a particular feature of ornamental granite deposits. Using this information, and bearing in mind the minimum commercially viable sizes for each kind of granite, the corresponding recovery rates are calculated for each material in each plane. The results are then integrated using spatial techniques, and the result is an evaluation of quarry contents with a view to total exploitation. This methodology was applied to a quarry in the opening phase in order to carry out an a priori assessment of the economic feasibility of the quarry.

    En este trabajo se propone una metodología para estimar el porcentaje de recuperación de cada uno de los productos que se pueden obtener en la explotación de una cantera de granito ornamental: bloque, semibloque, manpostería y per piaños, y material restante destinado a la obtención de áridos. De esta manera se logra un aprovechamiento integral de la cantera, evitándose la generación de estériles y el subsiguiente impacto ambiental producido por éstos. La metodología de análisis se basa en la recopilación detallada y exhaustiva de datos de discontinuidades en los frentes de investigación, que se interpretan estadísticamente y se proyectan sobre los tres planos de debilidad propios del granito ornamental. Con esta información, y las

  6. Excretory/secretory products of the carcinogenic liver fluke are endocytosed by human cholangiocytes and drive cell proliferation and IL6 production.

    Science.gov (United States)

    Chaiyadet, Sujittra; Smout, Michael; Johnson, Michael; Whitchurch, Cynthia; Turnbull, Lynne; Kaewkes, Sasithorn; Sotillo, Javier; Loukas, Alex; Sripa, Banchob

    2015-10-01

    Liver fluke infection caused by Opisthorchis viverrini remains a major public health problem in many parts of Asia including Thailand, Lao PDR, Vietnam and Cambodia, where there is a strikingly high incidence of cholangiocarcinoma (CCA - hepatic cancer of the bile duct epithelium). Among other factors, uptake of O. viverrini excretory/secretory products (OvES) by biliary epithelial cells has been postulated to be responsible for chronic inflammation and proliferation of cholangiocytes, but the mechanisms by which cells internalise O. viverrini excretory/secretory products are still unknown. Herein we incubated normal human cholangiocytes (H69), human cholangiocarcinoma cells (KKU-100, KKU-M156) and human colon cancer (Caco-2) cells with O. viverrini excretory/secretory products and analysed the effects of different endocytic inhibitors to address the mechanism of cellular uptake of ES proteins. Opisthorchis viverrini excretory/secretory products was internalised preferentially by liver cell lines, and most efficiently/rapidly by H69 cells. There was no evidence for trafficking of ES proteins to cholangiocyte organelles, and most of the fluorescence was detected in the cytoplasm. Pretreatment with clathrin inhibitors significantly reduced the uptake of O. viverrini excretory/secretory products, particularly by H69 cells. Opisthorchis viverrini excretory/secretory products induced proliferation of liver cells (H69 and CCA lines) but not intestinal (Caco-2) cells, and proliferation was blocked using inhibitors of the classical endocytic pathways (clathrin and caveolae). Opisthorchis viverrini excretory/secretory products drove IL6 secretion by H69 cells but not Caco-2 cells, and cytokine secretion was significantly reduced by endocytosis inhibitors. This the first known study to address the endocytosis of helminth ES proteins by host epithelial cells and sheds light on the pathways by which this parasite causes one of the most devastating forms of cancer in south

  7. Explosives Detection: Exploitation of the Physical Signatures

    Science.gov (United States)

    Atkinson, David

    2010-10-01

    Explosives based terrorism is an ongoing threat that is evolving with respect to implementation, configuration and materials used. There are a variety of devices designed to detect explosive devices, however, each technology has limitations and operational constraints. A full understanding of the signatures available for detection coupled with the array of detection choices can be used to develop a conceptual model of an explosives screening operation. Physics based sensors provide a robust approach to explosives detection, typically through the identification of anomalies, and are currently used for screening in airports around the world. The next generation of detectors for explosives detection will need to be more sensitive and selective, as well as integrate seamlessly with devices focused on chemical signatures. An appreciation for the details of the physical signature exploitation in cluttered environments with time, space, and privacy constraints is necessary for effective explosives screening of people, luggage, cargo, and vehicles.

  8. Intertemporal Choice of Marine Ecosystem Exploitation

    DEFF Research Database (Denmark)

    Ravn-Jonsen, Lars

    the ecosystem level in the present management. Therefore, economic predictions for an ecosystem managed as a common pool resource must be that  the exploitation probably are conducted at lower sized than optimum. In addition, given its population stock approach, the present management probably......The term ``Fishing Down Marine Food Webs'' describes the gradual transition in landing from marine ecosystems towards organisms lower in the food web. To address this issue and the need to manage the marine ecosystem in a broader perspective, Ecosystem Management is recommended. Ecosystem...... Management, however, requires models that can link the ecosystem level to the operation level, so this paper examines an ecosystem production model and shows that it is suitable for applying ground rent theory. This model is the simplest possible that incorporates the principles of size as the main...

  9. Exploiting novel molecular targets in gastrointestinal cancers

    Institute of Scientific and Technical Information of China (English)

    2007-01-01

    Novel molecular targets are being discovered as we learn more about the aberrant processes underlying various cancers. Efforts to translate this knowledge are starting to impact on the care of patients with gastrointestinal cancers. The epidermal growth factor receptor (EGFR) pathway and angiogenesis have been targeted successfully in colorectal cancer with cetuximab, panitunumab and bevacizumab. Similarly, EGFR-targeting with erlotinib yielded significant survival benefit in pancreatic cancer when combined with gemcitabine. The multi-targeting approach with sorafenib has made it the first agent to achieve significant survival benefit in hepatocellular carcinoma. Efforts to exploit the dysregulated Akt/mTOR pathway in GI cancer therapy are ongoing. These molecular targets can be disrupted by various approaches, including the use of monoclonal antibody to intercept extracellular ligands and disrupt receptor-ligand binding, and small molecule inhibitors that interrupt the activation of intracellular kinases.

  10. Protocol to Exploit Waiting Resources for UASNs.

    Science.gov (United States)

    Hung, Li-Ling; Luo, Yung-Jeng

    2016-01-01

    The transmission speed of acoustic waves in water is much slower than that of radio waves in terrestrial wireless sensor networks. Thus, the propagation delay in underwater acoustic sensor networks (UASN) is much greater. Longer propagation delay leads to complicated communication and collision problems. To solve collision problems, some studies have proposed waiting mechanisms; however, long waiting mechanisms result in low bandwidth utilization. To improve throughput, this study proposes a slotted medium access control protocol to enhance bandwidth utilization in UASNs. The proposed mechanism increases communication by exploiting temporal and spatial resources that are typically idle in order to protect communication against interference. By reducing wait time, network performance and energy consumption can be improved. A performance evaluation demonstrates that when the data packets are large or sensor deployment is dense, the energy consumption of proposed protocol is less than that of existing protocols as well as the throughput is higher than that of existing protocols. PMID:27005624

  11. Protocol to Exploit Waiting Resources for UASNs

    Directory of Open Access Journals (Sweden)

    Li-Ling Hung

    2016-03-01

    Full Text Available The transmission speed of acoustic waves in water is much slower than that of radio waves in terrestrial wireless sensor networks. Thus, the propagation delay in underwater acoustic sensor networks (UASN is much greater. Longer propagation delay leads to complicated communication and collision problems. To solve collision problems, some studies have proposed waiting mechanisms; however, long waiting mechanisms result in low bandwidth utilization. To improve throughput, this study proposes a slotted medium access control protocol to enhance bandwidth utilization in UASNs. The proposed mechanism increases communication by exploiting temporal and spatial resources that are typically idle in order to protect communication against interference. By reducing wait time, network performance and energy consumption can be improved. A performance evaluation demonstrates that when the data packets are large or sensor deployment is dense, the energy consumption of proposed protocol is less than that of existing protocols as well as the throughput is higher than that of existing protocols.

  12. Exploiting Resistive Guiding for Fast Ignition

    Science.gov (United States)

    Robinson, Alex

    2012-10-01

    Devising methods and schemes for controlling fast electron transport remains a major challenge in Fast Ignition research. Realistic estimates of the fast electron divergence angle require this control in order to ensure that the fast electron to hot spot coupling efficiency does not reach excessively low values. Resistivity gradients in the target will lead to strong magnetic field growth (via ∇ηxj) which can be exploited for the purposes of controlling the fast electron propagation (Robinson and Sherlock, PoP (2007)). There are a number of possible schemes which might be considered. Here we will report on numerical simulations that we have carried out on both simple configurations such as parabolic reflectors, and complex arrangements (Robinson, Key and Tabak, PRL (2012)). Substantial improvements to the fast electron to hot spot coupling efficiency have been found even for realistic fast electron divergence angles.

  13. The Evolution of Exploitation Strategies by Myrmecophiles

    DEFF Research Database (Denmark)

    Schär, Sämi

    macrogyne host queens in the same nests. This implies that microgynes either reduce host queen life span, or more likely prefer exploitation of colonies containing disproportionally many old host queens. In a second chapter I found that the abundance of entomopathogens was significantly reduced in ant nests......Myrmecophiles are animals which have evolved to live in the nests of ants. This life history strategy appears in animals as different as insects, spiders, snails, crustaceans and even snakes. Myrmecophiles are very speciose with estimates of up to 100'000 species, which raises the question why this...... strategy has evolved so frequently and is maintained by natural selection. The type of association between Myrmecophiles and ants ranges from mutualistic through to parasitic. These types of symbioses can also be found between and within species of ants. Ant associations can therefore be broadly...

  14. CHARACTERISTICS OF HYDROCARBON EXPLOITATION IN ARCTIC CIRCLE

    Directory of Open Access Journals (Sweden)

    Vanja Lež

    2013-12-01

    Full Text Available The existence of large quantities of hydrocarbons is supposed within the Arctic Circle. Assumed quantities are 25% of the total undiscovered hydrocarbon reserves on Earth, mostly natural gas. Over 500 major and minor gas accumulations within the Arctic Circle were discovered so far, but apart from Snøhvit gas field, there is no commercial exploitation of natural gas from these fields. Arctic gas projects are complicated, technically hard to accomplish, and pose a great threat to the return of investment, safety of people and equipment and for the ecosystem. Russia is a country that is closest to the realization of the Arctic gas projects that are based on the giant gas fields. The most extreme weather conditions in the seas around Greenland are the reason why this Arctic region is the least explored and furthest from the realization of any gas project (the paper is published in Croatian .

  15. Redressing China's Strategy of Water Resource Exploitation

    Science.gov (United States)

    Ran, Lishan; Lu, Xi Xi

    2013-03-01

    China, with the confrontation of water-related problems as an element of its long history, has been investing heavily in water engineering projects over the past few decades based on the assumption that these projects can solve its water problems. However, the anticipated benefits did not really occur, or at least not as large as expected. Instead, the results involved additional frustrations, such as biodiversity losses and human-induced disasters (i.e., landslides and earthquakes). Given its inherent shortcomings, the present engineering-dominated strategy for the management of water resources cannot help solve China's water problems and achieve its goal of low-carbon transformation. Therefore, the present strategy for water resources exploitation needs to be reevaluated and redressed. A policy change to achieve better management of Chinese rivers is urgently needed.

  16. Accumulation of miscoding etheno-DNA adducts and highly expressed DNA repair during liver fluke-induced cholangiocarcinogenesis in hamsters.

    Science.gov (United States)

    Dechakhamphu, Somkid; Pinlaor, Somchai; Sitthithaworn, Paiboon; Bartsch, Helmut; Yongvanit, Puangrat

    2010-09-10

    Infection by Opisthorchis viverrini, a risk factor for cholangiocarcinoma (CCA) may act through chronic inflammation, oxidative stress and lipid peroxidation (LPO)-related damage and growth stimuli. 1,N6-etheno-2'-deoxyadenosine (epsilondA), and 3,N4-etheno-2'-deoxycytidine (epsilondC), markers for LPO-derived DNA damage were highly increased in white blood cell and urine of O. viverrini-infected Thai patients. In order to investigate tissue specificity etheno adducts were measured in a cholangiocarcinogenesis model, in O. viverrini-infected hamsters that had received N-nitrosodimethylamine (NDMA, 12.5 ppm in dw) for 2 months. epsilondA- and epsilondC-levels were analyzed in paraffin-embedded liver sections by a novel immunohistochemical method, from 21 up to 180 days post-O. viverrini-infection. In inflamed areas of the liver, etheno adducts were localized in the nuclei of inflammatory cells and in the epithelial lining of the bile duct. Semi-quantitative image analysis showed higher adduct levels in the liver of O. viverrini-infected hamsters, treated with or w/o NDMA when compared with untreated controls. Levels were found highest in the liver of O. viverrini-infected plus NDMA-treated hamsters. Adducts increased in an age-dependent manner from O. viverrini-infection until CCA development. Increased adduct formation paralleled histopathological changes in plasma alkaline phosphatase (ALP) activity, bile duct hyperplasia, dysplasia, precancerous lesions, and CCA appearance. Also elevated expression of alkyladenine DNA glycosylase (AAG), which excises 1,N6-ethenoadenine (epsilonA) was linked to higher adduct formation, suggesting imbalanced repair. Our results implicate accumulation of inflammation-related, promutagenic DNA damage in target tissue and possibly imbalanced repair in the onset of cholangiocarcinogenesis. PMID:20541562

  17. Summary of radiation protection in exploitation

    International Nuclear Information System (INIS)

    This document proposes a large and detailed overview of notions and practices regarding radiation protection in relationship with an NPP exploitation framework. It presents the main notions: matter structure, radioactivity, interactions between matter and radiations, types of ionizing radiation, magnitudes and measurement units, exposure modes, main principles of radiation protection, means of protection against internal and external exposures. The second part proposes an overview of the origin of radiological risks in a nuclear power plant. This origin can be found in fission products, activation products, actinides, designed protections, or circuit contaminations. These radiological risks are more precisely identified and described in terms of detection and prevention (internal exposure risk, contamination risk, iodine-related risk, alpha radiation-related risk, access to the reactor building). The next part addresses the medical and radiological follow-up of exposed workers by a special medical control, by an individual exposure control, by a specific control of female personnel, and by attention to exceptional exposures. Measurement means are presented (detection principles, installation continuous control, workspaces control, personnel contamination control, follow-up of individual dose) as well as collective and individual protection means. The management of radiation protection is addressed through a presentation of decision and management structures for radiation protection, and of EDF objectives and ambitions in this domain. The organization of radiation protection during exploitation is described: responsibilities for radiation protection in a nuclear power station, requirements for workers, preparation of interventions in controlled zone, work execution in controlled zone, zone controls and radiological cleanness of installations. The two last chapters address issues and practices of radiation protection in the case of deconstruction or dismantling, and

  18. Exploiting apoptosis in photodynamic therapy: is it possible?

    Science.gov (United States)

    Rendon, Cesar A.; Lilge, Lothar D.

    2003-06-01

    Glioblastoma Multiforme is the most common form of malignant brain tumors and accounts for approximately 25% of all primary brain tumors. Only 5% of these patients survive longer than 2 years. The standard form of treatment is radiation therapy and surgery if the site is accessible. Different forms of adjuvant chemotherapy have been largely proven unsuccessful. Another form of adjuvant therapy, Photodynamic Therapy (PDT), has undergone preliminary trials showing some promising results but at the cost of increased side effects like rise in intracranial blood pressure and neurological deficiency. Apoptotic cell kill used as a biological treatment endpoint can possibly ameliorate these side effects. This study evaluates the significance of apoptotic cell death in the 9L rat gliosarcoma using the aminolevulinic acid (ALA) induced endogenous photosensitizer Protophorphyrin IX (PpIX). A strong influence of drug incubation time with cell kill was observed. The percentage of apoptotic cell death was less than 10% for 2 and 4 hours incubation times and irradiation times ensuring up to 70 and 80% cell kill respectively. Accumulation of PpIX in the mitochondria and cytoplasm was quantified by confocal fluorescence microscopy showing a linear relationship of PpIX fluorescence with concentration. The possibility of an in vitro threshold in the PDT dose is discussed, above which cell repair mechanisms may become exhausted. In conclusion for the range of parameters investigated, apoptotic cell kill may be hard to exploit therapeutically in this tumor model.

  19. Mission Exploitation Platform PROBA-V

    Science.gov (United States)

    Goor, Erwin

    2016-04-01

    VITO and partners developed an end-to-end solution to drastically improve the exploitation of the PROBA-V EO-data archive (http://proba-v.vgt.vito.be/), the past mission SPOT-VEGETATION and derived vegetation parameters by researchers, service providers and end-users. The analysis of time series of data (+1PB) is addressed, as well as the large scale on-demand processing of near real-time data. From November 2015 an operational Mission Exploitation Platform (MEP) PROBA-V, as an ESA pathfinder project, will be gradually deployed at the VITO data center with direct access to the complete data archive. Several applications will be released to the users, e.g. - A time series viewer, showing the evolution of PROBA-V bands and derived vegetation parameters for any area of interest. - Full-resolution viewing services for the complete data archive. - On-demand processing chains e.g. for the calculation of N-daily composites. - A Virtual Machine will be provided with access to the data archive and tools to work with this data, e.g. various toolboxes and support for R and Python. After an initial release in January 2016, a research platform will gradually be deployed allowing users to design, debug and test applications on the platform. From the MEP PROBA-V, access to Sentinel-2 and landsat data will be addressed as well, e.g. to support the Cal/Val activities of the users. Users can make use of powerful Web based tools and can self-manage virtual machines to perform their work on the infrastructure at VITO with access to the complete data archive. To realise this, private cloud technology (openStack) is used and a distributed processing environment is built based on Hadoop. The Hadoop ecosystem offers a lot of technologies (Spark, Yarn, Accumulo, etc.) which we integrate with several open-source components. The impact of this MEP on the user community will be high and will completely change the way of working with the data and hence open the large time series to a larger

  20. War, plague and exploitation in DR Congo

    Directory of Open Access Journals (Sweden)

    Dimčevska Antoaneta K.

    2007-01-01

    Full Text Available Late in autumn 2006 one of the headlines in world media was the first democratic elections in DR Congo. They took place after 30 years of Mobutu Sese Seko’s dictatorship and bloody civil wars in the period 1996-2002. These conflicts, which took approximately 4 million human lives, are called "The First African World War". Elections were held but they did not guarantee the end of trouble for the divided and tormented people in the northeast of Congo, the real scene of bloodshed. The area is still turbulent because it abounds in mineral wealth - gold, diamonds and raw materials for nuclear technology. For a whole decade, unscrupulous actors of the African crisis were fighting there, for illegal profits (achievable in the chaos of bloodshed rather than for democracy, defense of tribal interests, security, etc. as they claimed. In the mines of Eastern Congo unprecedented exploitation of people is still going on, especially of children, victims of conflicts, who suffer in great numbers from violence, starvation and diseases. These slaves of the crisis make local "warlords" and their mentors rich. The looting of the mines has stabilized the crisis because it makes possible enormous accumulation of wealth among armed decision-makers - which also includes availability of countless slaves-miners who have lost everything except their bare lives. Eastern Congo is, however, one of world’s three old focuses of plague; wild exploitation of ores in the area of this endemic disease has activated a sleepy focus and added pneumonic plague to the burdens suffered by the population of the rich but ill-fated region. This was to be expected because endemic plague in the gold-bearing evil circumstances impedes safe mining - and this will be the crucial challenge in the future of Congo. This article is an anthropological outline of the area where gold, plague, weapons and incomparable suffering of people merge together just because of cynic greed producing abuse

  1. Blood Transfusion

    Science.gov (United States)

    ... to infections including those we develop from our vaccinations (such as poliovirus antibodies, which are made by ... the Transfusion Medicine Unit, Blood Bank, and Stem Cell Storage Facility University of Rochester Medical ... and health educators who are available by phone Monday through Friday, 9 am to 9 pm ( ...

  2. Exploitation of TerraSAR-X

    Science.gov (United States)

    Herrmann, Jorg

    2004-01-01

    InfoTerra is an innovative market-derived EO-services concept with end-to-end products and service chains addressing end user information requirements in existing and new markets, with the advantage of a dedicated SAR satellite system TerraSAR (L+X-band) featuring high spatial and thematic resolution. The services will be provided from integrated value chains in a network with complementary partners, benefiting from most up-to-date and reliable image acquisition. The service development has been initiated in 1998 running in parallel to the TerraSAR space and ground system implementation. Infoterra, a new geo-information services company founded in 2001, implements the business concept. TerraSAR-X will be the first system element being available in 2006. The X-band SAR capability enables various applications, e.g. change detection to rationalize updating of cartographic databases; forest inventories, and de-/afforestation monitoring; crop stand density monitoring to support optimized fungicide application; land use monitoring in support of environmental control. A key challenge addressed in the exploitation development is the largely automated and quality controlled large area processing and feature extraction. The high resolution, multi-polarization, and multi-mode TerraSAR-X data source will considerably improve the short-term event observation from space. Reception of data via dedicated ground stations of customers or partners will also be offered.

  3. Understanding Online Child Sexual Exploitation Offenses.

    Science.gov (United States)

    Ly, Thanh; Murphy, Lisa; Fedoroff, J Paul

    2016-08-01

    In the past three decades, there has been an exponential increase in the worldwide availability of Internet access and devices that are able to access online materials. This literature review investigated whether increased accessibility of Internet child pornography (CP) increases the risk of in-person child sexual exploitation. The current review found little to no evidence that availability of the Internet has increased the worldwide incidence or prevalence of in-person child sexual abuse. In fact, during the time period in which the Internet has flourished, international crime statistics have shown a steady decrease of in-person child sexual abuse. The only exception to this trend is an increase in Internet child pornography or luring offenses (e.g., Stats Can, 2014), which involves child abuse by definition. This article reviews the impact of the Internet on child sexual abuse. It also reviews the characteristics of online CP offenders. Treatment of these offenders and prevention of such offenses is also discussed. PMID:27325170

  4. Fostering the Exploitation of Open Educational Resources

    Directory of Open Access Journals (Sweden)

    Thomas Richter

    2014-07-01

    Full Text Available The central concept behind Open Educational Resources (OER is opening up the access to educational resources for stakeholders who are not the usual target user group. This concept must be perceived as innovative because it describes a general economic and social paradigm shift: Education, which formerly was limited to a specific group of learners, now, is promoted as a public good. However, despite very good intentions, internationally agreed quality standards, and the availability of the required technological infrastructure, the critical threshold is not yet met. Due to several reasons, the usefulness of OER is often limited to the originally targeted context. Questions arise if the existing quality standards for Technology Enhanced Learning (TEL actually meet the specific requirements within the OER value chain, if the existing quality standards are applicable to OER in a meaningful way, and under which conditions related standards generally could support the exploitation of OER.We analyze quality standards for TEL and contrast the life cycle model of commercial learning resources against the life cycle model of OER. We investigate special demands on quality from the context of OER and, taking the former results into account, derive emergent quality criteria for OER. The paper concludes with recommendations for the design of OER and a future standard development.

  5. Exploiting unused cluster resources with virtualization

    International Nuclear Information System (INIS)

    Cluster applications may have timing constraints. One approach to ensuring their satisfaction is over-provisioning, i.e. to provide more hardware resources than needed for processing a certain peak data rate. This concept is used for the HLT-Chain. This application runs in the ALICE HLT cluster and processes events at runtime of the ALICE experiment. Over-provisioning has a drawback: When physical resources are dimensioned for a peak data rate, then these resources are underutilized at times of decreased data rates. From a perspective of efficiency this is not desirable. Therefore a software framework has been developed which allows to run additional third-party applications in order to exploit temporarily unused cluster resources. To avoid relevant negative impact to the time-critical application the third-party applications are encapsulated in Virtual Machines (VMs) and the resource usage of VMs is dynamically adapted at runtime. The adaption is done both globally by e.g. hot-migrating VMs between nodes, but also locally by modifying the local resource share (e.g. CPU) of a VM. Policies allow to tune the trade-off between benefit of third-party applications (increased cluster usage, computed results) and negative impact to the time-critical application. Experiments show that using the framework in parallel to the HLT-Chain leads to additional computed results, increases the cluster CPU usage from 49% to 79% and causes no relevant impact to the HLT-Chain.

  6. Exploiting Genetic Interference for Antiviral Therapy

    Science.gov (United States)

    Kirkegaard, Karla A.; Weinberger, Leor S.

    2016-01-01

    Rapidly evolving viruses are a major threat to human health. Such viruses are often highly pathogenic (e.g., influenza virus, HIV, Ebola virus) and routinely circumvent therapeutic intervention through mutational escape. Error-prone genome replication generates heterogeneous viral populations that rapidly adapt to new selection pressures, leading to resistance that emerges with treatment. However, population heterogeneity bears a cost: when multiple viral variants replicate within a cell, they can potentially interfere with each other, lowering viral fitness. This genetic interference can be exploited for antiviral strategies, either by taking advantage of a virus’s inherent genetic diversity or through generating de novo interference by engineering a competing genome. Here, we discuss two such antiviral strategies, dominant drug targeting and therapeutic interfering particles. Both strategies harness the power of genetic interference to surmount two particularly vexing obstacles—the evolution of drug resistance and targeting therapy to high-risk populations—both of which impede treatment in resource-poor settings. PMID:27149616

  7. Exploiting death: apoptotic immunity in microbial pathogenesis.

    Science.gov (United States)

    Ucker, D S

    2016-06-01

    Innate immunity typically is responsible for initial host responses against infections. Independently, nucleated cells that die normally as part of the physiological process of homeostasis in mammals (including humans) suppress immunity. Specifically, the physiological process of cell death (apoptosis) generates cells that are recognized specifically by viable cells of all types and elicit a profound transient suppression of host immunity (termed 'innate apoptotic immunity' (IAI)). IAI appears to be important normally for the maintenance of self-tolerance and for the resolution of inflammation. In addition, pathogens are able to take advantage of IAI through a variety of distinct mechanisms, to enable their proliferation within the host and enhance pathogenicity. For example, the protist pathogen Leishmania amazonensis, at its infective stage, mimics apoptotic cells by expressing apoptotic-like protein determinants on the cell surface, triggering immunosuppression directly. In contrast, the pathogenic bacterium Listeria monocytogenes triggers cell death in host lymphocytes, relying on those apoptotic cells to suppress host immune control and facilitate bacterial expansion. Finally, although the inhibition of apoptotic cell death is a common attribute of many viruses which facilitates their extended replication, it is clear that adenoviruses also reprogram the non-apoptotic dead cells that arise subsequently to manifest apoptotic-like immunosuppressive properties. These three instances represent diverse strategies used by microbial pathogens to exploit IAI, focusing attention on the potency of this facet of host immune control. Further examination of these cases will be revealing both of varied mechanisms of pathogenesis and the processes involved in IAI control. PMID:26943319

  8. Exploiting Genetic Interference for Antiviral Therapy.

    Science.gov (United States)

    Tanner, Elizabeth J; Kirkegaard, Karla A; Weinberger, Leor S

    2016-05-01

    Rapidly evolving viruses are a major threat to human health. Such viruses are often highly pathogenic (e.g., influenza virus, HIV, Ebola virus) and routinely circumvent therapeutic intervention through mutational escape. Error-prone genome replication generates heterogeneous viral populations that rapidly adapt to new selection pressures, leading to resistance that emerges with treatment. However, population heterogeneity bears a cost: when multiple viral variants replicate within a cell, they can potentially interfere with each other, lowering viral fitness. This genetic interference can be exploited for antiviral strategies, either by taking advantage of a virus's inherent genetic diversity or through generating de novo interference by engineering a competing genome. Here, we discuss two such antiviral strategies, dominant drug targeting and therapeutic interfering particles. Both strategies harness the power of genetic interference to surmount two particularly vexing obstacles-the evolution of drug resistance and targeting therapy to high-risk populations-both of which impede treatment in resource-poor settings. PMID:27149616

  9. Exploiting Genetic Interference for Antiviral Therapy.

    Directory of Open Access Journals (Sweden)

    Elizabeth J Tanner

    2016-05-01

    Full Text Available Rapidly evolving viruses are a major threat to human health. Such viruses are often highly pathogenic (e.g., influenza virus, HIV, Ebola virus and routinely circumvent therapeutic intervention through mutational escape. Error-prone genome replication generates heterogeneous viral populations that rapidly adapt to new selection pressures, leading to resistance that emerges with treatment. However, population heterogeneity bears a cost: when multiple viral variants replicate within a cell, they can potentially interfere with each other, lowering viral fitness. This genetic interference can be exploited for antiviral strategies, either by taking advantage of a virus's inherent genetic diversity or through generating de novo interference by engineering a competing genome. Here, we discuss two such antiviral strategies, dominant drug targeting and therapeutic interfering particles. Both strategies harness the power of genetic interference to surmount two particularly vexing obstacles-the evolution of drug resistance and targeting therapy to high-risk populations-both of which impede treatment in resource-poor settings.

  10. Exploiting tumor epigenetics to improve oncolytic virotherapy

    Directory of Open Access Journals (Sweden)

    Nicole E. Forbes

    2013-09-01

    Full Text Available Oncolytic viruses (OVs comprise a versatile and multi-mechanistic therapeutic platform in the growing arsenal of anticancer biologics. These replicating therapeutics find favorable conditions in the tumor niche, characterized among others by increased metabolism, reduced anti-tumor/antiviral immunity, and disorganized vasculature. Through a self-amplification that is dependent on multiple cancer-specific defects, these agents exhibit remarkable tumor selectivity. With several OVs completing or entering Phase III clinical evaluation, their therapeutic potential as well as the challenges ahead are increasingly clear. One key hurdle is tumor heterogeneity, which results in variations in the ability of tumors to support productive infection by OVs and to induce adaptive anti-tumor immunity. To this end, mounting evidence suggests tumor epigenetics may play a key role. This review will focus on the epigenetic landscape of tumors and how it relates to OV infection. Therapeutic strategies aiming to exploit the epigenetic identity of tumors in order to improve OV therapy are also discussed.

  11. Exploiting intrinsic fluctuations to identify model parameters.

    Science.gov (United States)

    Zimmer, Christoph; Sahle, Sven; Pahle, Jürgen

    2015-04-01

    Parameterisation of kinetic models plays a central role in computational systems biology. Besides the lack of experimental data of high enough quality, some of the biggest challenges here are identification issues. Model parameters can be structurally non-identifiable because of functional relationships. Noise in measured data is usually considered to be a nuisance for parameter estimation. However, it turns out that intrinsic fluctuations in particle numbers can make parameters identifiable that were previously non-identifiable. The authors present a method to identify model parameters that are structurally non-identifiable in a deterministic framework. The method takes time course recordings of biochemical systems in steady state or transient state as input. Often a functional relationship between parameters presents itself by a one-dimensional manifold in parameter space containing parameter sets of optimal goodness. Although the system's behaviour cannot be distinguished on this manifold in a deterministic framework it might be distinguishable in a stochastic modelling framework. Their method exploits this by using an objective function that includes a measure for fluctuations in particle numbers. They show on three example models, immigration-death, gene expression and Epo-EpoReceptor interaction, that this resolves the non-identifiability even in the case of measurement noise with known amplitude. The method is applied to partially observed recordings of biochemical systems with measurement noise. It is simple to implement and it is usually very fast to compute. This optimisation can be realised in a classical or Bayesian fashion. PMID:26672148

  12. Exploiting range imagery: techniques and applications

    Science.gov (United States)

    Armbruster, Walter

    2009-07-01

    Practically no applications exist for which automatic processing of 2D intensity imagery can equal human visual perception. This is not the case for range imagery. The paper gives examples of 3D laser radar applications, for which automatic data processing can exceed human visual cognition capabilities and describes basic processing techniques for attaining these results. The examples are drawn from the fields of helicopter obstacle avoidance, object detection in surveillance applications, object recognition at high range, multi-object-tracking, and object re-identification in range image sequences. Processing times and recognition performances are summarized. The techniques used exploit the bijective continuity of the imaging process as well as its independence of object reflectivity, emissivity and illumination. This allows precise formulations of the probability distributions involved in figure-ground segmentation, feature-based object classification and model based object recognition. The probabilistic approach guarantees optimal solutions for single images and enables Bayesian learning in range image sequences. Finally, due to recent results in 3D-surface completion, no prior model libraries are required for recognizing and re-identifying objects of quite general object categories, opening the way to unsupervised learning and fully autonomous cognitive systems.

  13. Exploiting Microbeams for Membrane Protein Structure Determination.

    Science.gov (United States)

    Warren, Anna J; Axford, Danny; Paterson, Neil G; Owen, Robin L

    2016-01-01

    A reproducible, and sample independent means of predictably obtaining large, well-ordered crystals has proven elusive in macromolecular crystallography. In the structure determination pipeline, crystallisation often proves to be a rate-limiting step, and the process of obtaining even small or badly ordered crystals can prove time-consuming and laborious. This is particularly true in the field of membrane protein crystallography and this is reflected in the limited number of unique membrane protein structures deposited in the protein data bank (less than 650 by June 2016 - http://blanco.biomol.uci.edu/mpstruc ). Over recent years the requirement for, and time and cost associated with obtaining, large crystals has been partially alleviated through the development of beamline instrumentation allowing data collection, and structure solution, from ever-smaller crystals. Advances in several areas have led to a step change in what might be considered achievable during a synchrotron trip over the last decade. This chapter will briefly review the current status of the field, the tools available to ease data collection and processing, and give some examples of exploitation of these for membrane protein microfocus macromolecular crystallography. PMID:27553238

  14. Notations Around the World: Census and Exploitation

    CERN Document Server

    Libbrecht, Paul

    2010-01-01

    Mathematical notations around the world are diverse. Not as much as requiring computing machines' makers to adapt to each culture, but as much as to disorient a person landing on a web-page with a text in mathematics. In order to understand better this diversity, we are building a census of notations: it should allow any content creator or mathematician to grasp which mathematical notation is used in which language and culture. The census is built collaboratively, collected in pages with a given semantic and presenting observations of the widespread notations being used in existing materials by a graphical extract. We contend that our approach should dissipate the fallacies found here and there about the notations in "other cultures" so that a better understanding of the cultures can be realized. The exploitation of the census in the math-bridge project is also presented: this project aims at taking learners "where they are in their math-knowledge" and bring them to a level ready to start engineering studies....

  15. Synthetic aperture radar imaging exploiting multiple scattering

    International Nuclear Information System (INIS)

    In this paper, we consider an imaging scenario, where a bi-static synthetic aperture radar (SAR) system is used in a multiple scattering environment. We consider a ray-theoretic approximation to the Green function to model a multiple scattering environment. This allows us to incorporate the multiple paths followed by the transmitted signal, thereby providing different views of the object to be imaged. However, the received signal from the multiple paths and additive thermal noise may interfere and produce artifacts when standard backprojection-based reconstruction algorithms are used. We use microlocal analysis in a statistical setting to develop a novel filtered-backprojection type image reconstruction method that not only exploits the multi-paths leading to enhancement of the reconstructed image but also suppresses the artifacts due to interference. We assume a priori knowledge of the second-order statistics of the target and noise to suppress the artifacts due to interference in a mean-square error sense. We present numerical simulations to demonstrate the performance of our image reconstruction method. While the focus of this paper is on radar applications, our image formation method is also applicable to other problems arising in fields such as acoustic, geophysical and medical imaging

  16. Exploiting Virtualization and Cloud Computing in ATLAS

    International Nuclear Information System (INIS)

    The ATLAS Computing Model was designed around the concept of grid computing; since the start of data-taking, this model has proven very successful in the federated operation of more than one hundred Worldwide LHC Computing Grid (WLCG) sites for offline data distribution, storage, processing and analysis. However, new paradigms in computing, namely virtualization and cloud computing, present improved strategies for managing and provisioning IT resources that could allow ATLAS to more flexibly adapt and scale its storage and processing workloads on varied underlying resources. In particular, ATLAS is developing a “grid-of-clouds” infrastructure in order to utilize WLCG sites that make resources available via a cloud API. This work will present the current status of the Virtualization and Cloud Computing R and D project in ATLAS Distributed Computing. First, strategies for deploying PanDA queues on cloud sites will be discussed, including the introduction of a “cloud factory” for managing cloud VM instances. Next, performance results when running on virtualized/cloud resources at CERN LxCloud, StratusLab, and elsewhere will be presented. Finally, we will present the ATLAS strategies for exploiting cloud-based storage, including remote XROOTD access to input data, management of EC2-based files, and the deployment of cloud-resident LCG storage elements.

  17. Generating circuit tests by exploiting designed behavior

    Science.gov (United States)

    Shirley, Mark H.

    1988-12-01

    Generating tests for sequential devices is one of the hardest problems in designing and manufacturing digital circuits. This task is difficult primarily because internal components are accessible only indirectly, forcing a test generator to use the surrounding components collectively as a probe for detecting faults. This in turn forces the test generator to reason about complex interactions between the behaviors of these surrounding components. Current automated solutions are becoming ineffective as designs grow larger and more complex. Yet, despite the complexity, human experts remain remarkably successful, in part, because they use knowledge from many sources and use a variety of reasoning techniques. This thesis exploits several kinds of expert knowledge about circuits and test generation not used by the current algorithms. First, many test generation problems can be solved efficiently using operation relations, a novel representation of circuit behavior that connects internal component operations with directly executable circuit operations. Operation relations can be computed efficiently for sequential circuits that provide few operations at their interfaces by searching traces of simulated circuit behavior. Second, experts write test programs rather than test vectors because programs are a more readable and compact representation for tests than vectors are. Test programs can be constructed automatically by merging test program fragments using expert supplied goal-refined rules and domain independent planning techniques from artificial intelligence.

  18. Blood Culture (For Parents)

    Science.gov (United States)

    ... KidsHealth in the Classroom What Other Parents Are Reading Upsetting News Reports? What to Say Vaccines: Which ... BMP) Blood Test: Complete Blood Count Basic Blood Chemistry Tests Getting a Blood Test (Video) Blood Test: ...

  19. High Blood Pressure (Hypertension)

    Science.gov (United States)

    ... your doctor prescribes it, medicine. What Is Blood Pressure? Blood pressure is the force of blood flow inside ... Will I Know if I Have High Blood Pressure? High blood pressure is a silent problem — you won't ...

  20. Blood Pressure Quiz

    Science.gov (United States)

    ... page please turn Javascript on. Feature: High Blood Pressure Blood Pressure Quiz Past Issues / Fall 2011 Table of Contents ... About High Blood Pressure / Treatment: Types of Blood Pressure Medications / Blood Pressure Quiz Fall 2011 Issue: Volume 6 Number ...

  1. Hypertension (High Blood Pressure)

    Science.gov (United States)

    ... right away. continue How Do Doctors Measure Blood Pressure? Blood pressure readings are fast and painless. Blood pressure ... same age, height, and gender have lower blood pressure. Blood pressure between 90% and 95% of the normal ...

  2. Blood pressure measurement

    Science.gov (United States)

    Diastolic blood pressure; Systolic blood pressure; Blood pressure reading; Measuring blood pressure ... or your health care provider will wrap the blood pressure cuff snugly around your upper arm. The ...

  3. Blood Transfusions (For Teens)

    Science.gov (United States)

    ... How Can I Help a Friend Who Cuts? Blood Transfusions KidsHealth > For Teens > Blood Transfusions Print A ... United States get blood transfusions. A Bit About Blood As blood moves throughout the body, it carries ...

  4. Blood Count Tests

    Science.gov (United States)

    Your blood contains red blood cells (RBC), white blood cells (WBC), and platelets. Blood count tests measure the number and types of cells in your blood. This helps doctors check on your overall health. ...

  5. Blood Clotting and Pregnancy

    Medline Plus

    Full Text Available ... About Awards Membership ASH Foundation Global Programs Newsroom facebook twitter youtube linkedin Research In This Section Agenda ... View all publications For Patients Blood Basics Blood Disorders Anemia Bleeding Disorders Blood Cancers Blood Clots Blood ...

  6. Blood Clotting and Pregnancy

    Medline Plus

    Full Text Available ... For Patients Blood Disorders Blood Clots Blood Clotting & Pregnancy If you are pregnant, or you have just ... The risk of developing a blood clot during pregnancy is increased by the following: Previous blood clots ...

  7. Against Permitted Exploitation in Developing World Research Agreements.

    Science.gov (United States)

    Wenner, Danielle M

    2016-04-01

    This paper examines the moral force of exploitation in developing world research agreements. Taking for granted that some clinical research which is conducted in the developing world but funded by developed world sponsors is exploitative, it asks whether a third party would be morally justified in enforcing limits on research agreements in order to ensure more fair and less exploitative outcomes. This question is particularly relevant when such exploitative transactions are entered into voluntarily by all relevant parties, and both research sponsors and host communities benefit from the resulting agreements. I show that defenders of the claim that exploitation ought to be permitted rely on a mischaracterization of certain forms of interference as unjustly paternalistic and two dubious empirical assumptions about the results of regulation. The view I put forward is that by evaluating a system of constraints on international research agreements, rather than individual transaction-level interference, we can better assess the alternatives to permitting exploitative research agreements. PMID:25688922

  8. Transnational gestational surrogacy: does it have to be exploitative?

    Science.gov (United States)

    Kirby, Jeffrey

    2014-01-01

    This article explores the controversial practice of transnational gestational surrogacy and poses a provocative question: Does it have to be exploitative? Various existing models of exploitation are considered and a novel exploitation-evaluation heuristic is introduced to assist in the analysis of the potentially exploitative dimensions/elements of complex health-related practices. On the basis of application of the heuristic, I conclude that transnational gestational surrogacy, as currently practiced in low-income country settings (such as rural, western India), is exploitative of surrogate women. Arising out of consideration of the heuristic's exploitation conditions, a set of public education and enabled choice, enhanced protections, and empowerment reforms to transnational gestational surrogacy practice is proposed that, if incorporated into a national regulatory framework and actualized within a low income country, could possibly render such practice nonexploitative. PMID:24766117

  9. Exploiting spatial descriptions in visual scene analysis.

    Science.gov (United States)

    Ziegler, Leon; Johannsen, Katrin; Swadzba, Agnes; De Ruiter, Jan P; Wachsmuth, Sven

    2012-08-01

    The reliable automatic visual recognition of indoor scenes with complex object constellations using only sensor data is a nontrivial problem. In order to improve the construction of an accurate semantic 3D model of an indoor scene, we exploit human-produced verbal descriptions of the relative location of pairs of objects. This requires the ability to deal with different spatial reference frames (RF) that humans use interchangeably. In German, both the intrinsic and relative RF are used frequently, which often leads to ambiguities in referential communication. We assume that there are certain regularities that help in specific contexts. In a first experiment, we investigated how speakers of German describe spatial relationships between different pieces of furniture. This gave us important information about the distribution of the RFs used for furniture-predicate combinations, and by implication also about the preferred spatial predicate. The results of this experiment are compiled into a computational model that extracts partial orderings of spatial arrangements between furniture items from verbal descriptions. In the implemented system, the visual scene is initially scanned by a 3D camera system. From the 3D point cloud, we extract point clusters that suggest the presence of certain furniture objects. We then integrate the partial orderings extracted from the verbal utterances incrementally and cumulatively with the estimated probabilities about the identity and location of objects in the scene, and also estimate the probable orientation of the objects. This allows the system to significantly improve both the accuracy and richness of its visual scene representation. PMID:22806654

  10. Exploiting Untapped Information Resources in Earth Science

    Science.gov (United States)

    Ramachandran, R.; Fox, P. A.; Kempler, S.; Maskey, M.

    2015-12-01

    One of the continuing challenges in any Earth science investigation is the amount of time and effort required for data preparation before analysis can begin. Current Earth science data and information systems have their own shortcomings. For example, the current data search systems are designed with the assumption that researchers find data primarily by metadata searches on instrument or geophysical keywords, assuming that users have sufficient knowledge of the domain vocabulary to be able to effectively utilize the search catalogs. These systems lack support for new or interdisciplinary researchers who may be unfamiliar with the domain vocabulary or the breadth of relevant data available. There is clearly a need to innovate and evolve current data and information systems in order to improve data discovery and exploration capabilities to substantially reduce the data preparation time and effort. We assert that Earth science metadata assets are dark resources, information resources that organizations collect, process, and store for regular business or operational activities but fail to utilize for other purposes. The challenge for any organization is to recognize, identify and effectively utilize the dark data stores in their institutional repositories to better serve their stakeholders. NASA Earth science metadata catalogs contain dark resources consisting of structured information, free form descriptions of data and pre-generated images. With the addition of emerging semantic technologies, such catalogs can be fully utilized beyond their original design intent of supporting current search functionality. In this presentation, we will describe our approach of exploiting these information resources to provide novel data discovery and exploration pathways to science and education communities

  11. Exploiting laboratory and heliophysics plasma synergies

    Energy Technology Data Exchange (ETDEWEB)

    Dahlburg, J.; Amatucci, W.; Chen, J.; Chua, D.; Dahlburg, R.; Doschek, G.; Howard, R.; Huba, J.; Ko, Y.-K.; Krall, J.; Laming, J. M.; Linton, M.; Lukin, V; Murphy, R.; Rakowski, C.; Socker, D.; Tylka, A.; Vourlidas, A.; Warren, H.; Wood, B. [Naval Research Laboratory, Washington, DC 20375 (United States); Brown, M. [Swarthmore College, Swarthmore, PA 19081 (United States); Chan, V. [General Atomics, San Diego, CA 92186 (United States); Cothran, Ch. [Global Defense Technology and Systems, Inc., Crofton, MD 21114 (United States); Egedal, J. [Massachusetts Institute of Technology, Cambridge, MA 02139 (United States); Forest, C. [University of Wisconsin, Madison, WI 53706 (United States); Lin, R. [University of California, Berkeley, CA 94720 (United States)

    2010-07-01

    Recent advances in space-based heliospheric observations, laboratory experimentation, and plasma simulation codes are creating an exciting new cross-disciplinary opportunity for understanding fast energy release and transport mechanisms in heliophysics and laboratory plasma dynamics, which had not been previously accessible. This article provides an overview of some new observational, experimental, and computational assets, and discusses current and near-term activities towards exploitation of synergies involving those assets. This overview does not claim to be comprehensive, but instead covers mainly activities closely associated with the authors' interests and research. Heliospheric observations reviewed include the Sun Earth Connection Coronal and Heliospheric Investigation (SECCHI) on the National Aeronautics and Space Administration (NASA) Solar Terrestrial Relations Observatory (STEREO) mission, the first instrument to provide remote sensing imagery observations with spatial continuity extending from the Sun to the Earth, and the Extreme-ultraviolet Imaging Spectrometer (EIS) on the Japanese Hinode spacecraft that is measuring spectroscopically physical parameters of the solar atmosphere towards obtaining plasma temperatures, densities, and mass motions. The Solar Dynamics Observatory (SDO) and the upcoming Solar Orbiter with the Heliospheric Imager (SoloHI) on-board will also be discussed. Laboratory plasma experiments surveyed include the line-tied magnetic reconnection experiments at University of Wisconsin (relevant to coronal heating magnetic flux tube observations and simulations), and a dynamo facility under construction there; the Space Plasma Simulation Chamber at the Naval Research Laboratory that currently produces plasmas scalable to ionospheric and magnetospheric conditions and in the future also will be suited to study the physics of the solar corona; the Versatile Toroidal Facility at the Massachusetts Institute of Technology that provides

  12. Exploiting laboratory and heliophysics plasma synergies

    International Nuclear Information System (INIS)

    Recent advances in space-based heliospheric observations, laboratory experimentation, and plasma simulation codes are creating an exciting new cross-disciplinary opportunity for understanding fast energy release and transport mechanisms in heliophysics and laboratory plasma dynamics, which had not been previously accessible. This article provides an overview of some new observational, experimental, and computational assets, and discusses current and near-term activities towards exploitation of synergies involving those assets. This overview does not claim to be comprehensive, but instead covers mainly activities closely associated with the authors' interests and research. Heliospheric observations reviewed include the Sun Earth Connection Coronal and Heliospheric Investigation (SECCHI) on the National Aeronautics and Space Administration (NASA) Solar Terrestrial Relations Observatory (STEREO) mission, the first instrument to provide remote sensing imagery observations with spatial continuity extending from the Sun to the Earth, and the Extreme-ultraviolet Imaging Spectrometer (EIS) on the Japanese Hinode spacecraft that is measuring spectroscopically physical parameters of the solar atmosphere towards obtaining plasma temperatures, densities, and mass motions. The Solar Dynamics Observatory (SDO) and the upcoming Solar Orbiter with the Heliospheric Imager (SoloHI) on-board will also be discussed. Laboratory plasma experiments surveyed include the line-tied magnetic reconnection experiments at University of Wisconsin (relevant to coronal heating magnetic flux tube observations and simulations), and a dynamo facility under construction there; the Space Plasma Simulation Chamber at the Naval Research Laboratory that currently produces plasmas scalable to ionospheric and magnetospheric conditions and in the future also will be suited to study the physics of the solar corona; the Versatile Toroidal Facility at the Massachusetts Institute of Technology that provides

  13. Nanostructures Exploit Hybrid-Polariton Resonances

    Science.gov (United States)

    Anderson, Mark

    2008-01-01

    Nanostructured devices that exploit the hybrid-polariton resonances arising from coupling among photons, phonons, and plasmons are subjects of research directed toward the development of infrared-spectroscopic sensors for measuring extremely small quantities of molecules of interest. The spectroscopic techniques in question are surface enhanced Raman scattering (SERS) and surface enhanced infrared absorption (SEIRA). An important intermediate goal of this research is to increase the sensitivity achievable by these techniques. The basic idea of the approach being followed in this research is to engineer nanostructured devices and thereby engineer their hybrid-polariton resonances to concentrate infrared radiation incident upon their surfaces in such a manner as to increase the absorption of the radiation for SEIRA and measure the frequency shifts of surface vibrational modes. The underlying hybrid-polariton-resonance concept is best described by reference to experimental devices that have been built and tested to demonstrate the concept. The nanostructure of each such device includes a matrix of silicon carbide particles of approximately 1 micron in diameter that are supported on a potassium bromide (KBr) or poly(tetrafluoroethylene) [PTFE] window. These grains are sputter-coated with gold grains of 40-nm size (see figure). From the perspective of classical electrodynamics, in this nanostructure, that includes a particulate or otherwise rough surface, the electric-field portion of an incident electromagnetic field becomes concentrated on the particles when optical resonance conditions are met. Going beyond the perspective of classical electrodynamics, it can be seen that when the resonance frequencies of surface phonons and surface plasmons overlap, the coupling of the resonances gives rise to an enhanced radiation-absorption or -scattering mechanism. The sizes, shapes, and aggregation of the particles determine the frequencies of the resonances. Hence, the task of

  14. Exploiting Laboratory and Heliophysics Plasma Synergies

    Directory of Open Access Journals (Sweden)

    Jill Dahlburg

    2010-05-01

    Full Text Available Recent advances in space-based heliospheric observations, laboratory experimentation, and plasma simulation codes are creating an exciting new cross-disciplinary opportunity for understanding fast energy release and transport mechanisms in heliophysics and laboratory plasma dynamics, which had not been previously accessible. This article provides an overview of some new observational, experimental, and computational assets, and discusses current and near-term activities towards exploitation of synergies involving those assets. This overview does not claim to be comprehensive, but instead covers mainly activities closely associated with the authors’ interests and reearch. Heliospheric observations reviewed include the Sun Earth Connection Coronal and Heliospheric Investigation (SECCHI on the National Aeronautics and Space Administration (NASA Solar Terrestrial Relations Observatory (STEREO mission, the first instrument to provide remote sensing imagery observations with spatial continuity extending from the Sun to the Earth, and the Extreme-ultraviolet Imaging Spectrometer (EIS on the Japanese Hinode spacecraft that is measuring spectroscopically physical parameters of the solar atmosphere towards obtaining plasma temperatures, densities, and mass motions. The Solar Dynamics Observatory (SDO and the upcoming Solar Orbiter with the Heliospheric Imager (SoloHI on-board will also be discussed. Laboratory plasma experiments surveyed include the line-tied magnetic reconnection experiments at University of Wisconsin (relevant to coronal heating magnetic flux tube observations and simulations, and a dynamo facility under construction there; the Space Plasma Simulation Chamber at the Naval Research Laboratory that currently produces plasmas scalable to ionospheric and magnetospheric conditions and in the future also will be suited to study the physics of the solar corona; the Versatile Toroidal Facility at the Massachusetts Institute of Technology that

  15. Simulated population responses of common carp to commercial exploitation

    Energy Technology Data Exchange (ETDEWEB)

    Weber, Michael J.; Hennen, Matthew J.; Brown, Michael L.

    2011-12-01

    Common carp Cyprinus carpio is a widespread invasive species that can become highly abundant and impose deleterious ecosystem effects. Thus, aquatic resource managers are interested in controlling common carp populations. Control of invasive common carp populations is difficult, due in part to the inherent uncertainty of how populations respond to exploitation. To understand how common carp populations respond to exploitation, we evaluated common carp population dynamics (recruitment, growth, and mortality) in three natural lakes in eastern South Dakota. Common carp exhibited similar population dynamics across these three systems that were characterized by consistent recruitment (ages 3 to 15 years present), fast growth (K = 0.37 to 0.59), and low mortality (A = 1 to 7%). We then modeled the effects of commercial exploitation on size structure, abundance, and egg production to determine its utility as a management tool to control populations. All three populations responded similarly to exploitation simulations with a 575-mm length restriction, representing commercial gear selectivity. Simulated common carp size structure modestly declined (9 to 37%) in all simulations. Abundance of common carp declined dramatically (28 to 56%) at low levels of exploitation (0 to 20%) but exploitation >40% had little additive effect and populations were only reduced by 49 to 79% despite high exploitation (>90%). Maximum lifetime egg production was reduced from 77 to 89% at a moderate level of exploitation (40%), indicating the potential for recruitment overfishing. Exploitation further reduced common carp size structure, abundance, and egg production when simulations were not size selective. Our results provide insights to how common carp populations may respond to exploitation. Although commercial exploitation may be able to partially control populations, an integrated removal approach that removes all sizes of common carp has a greater chance of controlling population abundance

  16. Exploiting for medical and biological applications

    Science.gov (United States)

    Giano, Michael C.

    Biotherapeutics are an emerging class of drug composed of molecules ranging in sizes from peptides to large proteins. Due to their poor stability and mucosal membrane permeability, biotherapeutics are administered by a parenteral method (i.e., syringe, intravenous or intramuscular). Therapeutics delivered systemically often experience short half-lives. While, local administration may involve invasive surgical procedures and suffer from poor retention at the site of application. To compensate, the patient receives frequent doses of highly concentrated therapeutic. Unfortunately, the off-target side effects and discomfort associated with multiple injections results in poor patient compliance. Therefore, new delivery methods which can improve therapeutic retention, reduce the frequency of administration and may aid in decreasing the off-target side effects is a necessity. Hydrogels are a class of biomaterials that are gaining interests for tissue engineering and drug delivery applications. Hydrogel materials are defined as porous, 3-dimensional networks that are primarily composed of water. Generally, they are mechanically rigid, cytocompatible and easily chemically functionalized. Collectively, these properties make hydrogels fantastic candidates to perform as drug delivery depots. Current hydrogel delivery systems physically entrap the target therapeutic which is then subsequently released over time at the site of administration. The swelling and degradation of the material effect the diffusion of the therapy from the hydrogel, and therefore should be controlled. Although these strategies provide some regulation over therapeutic release, full control of the delivery is not achieved. Newer approaches are focused on designing hydrogels that exploit known interactions, covalently attach the therapy or respond to an external stimulus in an effort to gain improved control over the therapy's release. Unfortunately, the biotherapeutic is typically required to be chemically

  17. Foregrounding possibilities and backgrounding exploitation in transnational medical research projects in Lusaka, Zambia

    DEFF Research Database (Denmark)

    Bruun, Birgitte

    2016-01-01

    Today medical research funded by resourceful commercial companies and philanthropic organizations increasingly takes place in much less resourceful settings across the globe. Recent academic studies of this trend have observed how global inequalities have shaped the movements of this research, and...... how human subjects who make their blood and bodies available are at risk of exploitation. In Lusaka, people expressed their fears of being used by transnational medical research projects in various idioms of concern. While such concerns were always latent, people were generally eager to join the...... inherent in transnational medical research projects are intertwined with scenarios of possibility....

  18. Managing your blood sugar

    Science.gov (United States)

    Hyperglycemia - control; Hypoglycemia - control; Diabetes - blood sugar control ... Know how to: Recognize and treat low blood sugar (hypoglycemia) Recognize and treat high blood sugar (hyperglycemia) ...

  19. A Descriptive Study on Sexually Exploited Children in Residential Treatment

    Science.gov (United States)

    Twill, Sarah E.; Green, Denise M.; Traylor, Amy

    2010-01-01

    Sexual exploitation and prostitution of children and adolescents is a multibillion dollar industry in the United States (Estes and Weiner in "Medical, legal & social science aspects of child sexual exploitation: A comprehensive review of pornography, prostitution, and internet crimes, vol I," G.W. Medical Publishing, Inc, St Louis, 2005; Milloy in…

  20. Self-Report Measure of Financial Exploitation of Older Adults

    Science.gov (United States)

    Conrad, Kendon J.; Iris, Madelyn; Ridings, John W.; Langley, Kate; Wilber, Kathleen H.

    2010-01-01

    Purpose: This study was designed to improve the measurement of financial exploitation (FE) by testing psychometric properties of the older adult financial exploitation measure (OAFEM), a client self-report instrument. Design and Methods: Rasch item response theory and traditional validation approaches were used. Questionnaires were administered by…

  1. On species preservation and Non-Cooperative Exploiters

    DEFF Research Database (Denmark)

    Kronbak, Lone Grønbæk; Lindroos, Marko

    cases where several non-cooperative exploiters are involved in mixed fisheries. This paper is targeting biodiversity preservation by setting up a two species model with the aim of ensuring both species survive harvesting of exploiters adapting a non-cooperative behaviour. The model starts out as a multi...

  2. Exploit and ignore the consequences: A mother of planetary issues.

    Science.gov (United States)

    Moustafa, Khaled

    2016-07-01

    Many environmental and planetary issues are due to an exploitation strategy based on exploit, consume and ignore the consequences. As many natural and environmental resources are limited in time and space, such exploitation approach causes important damages on earth, in the sea and maybe soon in the space. To sustain conditions under which humans and other living species can coexist in productive and dynamic harmony with their environments, terrestrial and space exploration programs may need to be based on 'scrutinize the consequences, prepare adequate solutions and then, only then, exploit'. Otherwise, the exploitation of planetary resources may put the environmental stability and sustainability at a higher risk than it is currently predicted. PMID:27133936

  3. Exploit and ignore the consequences: A mother of planetary issues

    Science.gov (United States)

    Moustafa, K.

    2016-07-01

    Many environmental and planetary issues are due to an exploitation strategy based on exploit, consume and ignore the consequences. As many natural and environmental resources are limited in time and space, such exploitation approach causes important damages on earth, in the sea and maybe soon in the space. To sustain conditions under which humans and other living species can coexist in productive and dynamic harmony with their environments, terrestrial and space exploration programs may need to be based on 'scrutinize the consequences, prepare adequate solutions and then, only then, exploit'. Otherwise, the exploitation of planetary resources may put the environmental stability and sustainability at a higher risk than it is currently predicted. (C) 2016 Elsevier B.V. All rights reserved.

  4. Blood Clotting and Pregnancy

    Medline Plus

    Full Text Available ... 6, 2016, San Diego, CA Abstracts Registration Housing Travel Information Government Concierge View all meetings Publications Blood ... Blood Clots Blood Clotting and Pregnancy Clots and Travel DVT Myths vs. Facts Blood Detectives Find a ...

  5. Types of Blood Donations

    Science.gov (United States)

    ... Double Red Cell Plasma Platelets Red Cells What blood donation type is best for me? **If you do not ... blood type, a whole blood donation is recommended** Blood Donation Types: Volunteer Donations The standard or most common type ...

  6. Blood Type Game

    Science.gov (United States)

    ... Donor Community > Games > Blood Type Game Printable Version Blood Type Game This feature requires version 6 or later ... many points as possible by matching the appropriate blood type of a donor to the blood type of ...

  7. Understanding Blood Pressure Readings

    Science.gov (United States)

    ... What is the AHA recommendation for healthy blood pressure? This blood pressure chart reflects categories defined by the American ... unusually low blood pressure readings. How is high blood pressure diagnosed? Your healthcare providers will want to get ...

  8. Blood Clotting and Pregnancy

    Medline Plus

    Full Text Available ... Research Programs and Awards View all Blood Current Issue First Edition Abstracts Collections Submit to Blood View ... Government Concierge View all meetings Publications Blood Current Issue First Edition Abstracts Blood: How I Treat A ...

  9. High Blood Pressure

    Science.gov (United States)

    ... Connected Home » High Blood Pressure Heath and Aging High Blood Pressure What Is Blood Pressure? Do ... high blood pressure increases as you get older. Gender. Before age 55, men have a greater chance ...

  10. Blood donation before surgery

    Science.gov (United States)

    ... this page: //medlineplus.gov/ency/patientinstructions/000367.htm Blood donation before surgery To use the sharing features ... vessels. Several sources of blood are described here. Blood From the Public (Volunteer Blood Donation) The most ...

  11. Blood Transfusion (For Parents)

    Science.gov (United States)

    ... Story" 5 Things to Know About Zika & Pregnancy Blood Transfusions KidsHealth > For Parents > Blood Transfusions Print A ... and help put your child at ease. About Blood Transfusions Blood is like the body's transportation system. ...

  12. Blood donation before surgery

    Science.gov (United States)

    ... choose to use a method called autologous blood donation. Autologous blood is blood donated by you, which you later receive if you need a transfusion during or after surgery. You can have blood ...

  13. High blood pressure

    Science.gov (United States)

    ... you are at risk for: Bleeding from the aorta, the large blood vessel that supplies blood to ... tests Blood pressure check Blood pressure References American Diabetes Association. Standards of medical care in diabetes-2015 ...

  14. Blood Clotting and Pregnancy

    Medline Plus

    Full Text Available ... raise public awareness of these blood conditions and increase research on the causes, prevention, and treatment. Blood ... of developing a blood clot during pregnancy is increased by the following: Previous blood clots A genetic ...

  15. Blood Clotting and Pregnancy

    Medline Plus

    Full Text Available ... Housing Travel Information Government Concierge View all meetings Publications Blood Current Issue First Edition Abstracts Blood Advances ... reflect the most recent scientific research View all publications For Patients Blood Basics Blood Disorders Anemia Bleeding ...

  16. The Haunted World of El Superbeasto (Rob Zombie, 2009): An Animated Exploitation of Exploitation Cinema

    OpenAIRE

    Floquet, Pierre

    2016-01-01

    Le film de Rob Zombie, sorti en 2009 dans la lignée des films d’exploitation, non seulement se veut transgressif, mais aussi s’appuie sur des sujets scabreux, sinon provocants, afin de viser des publics niches. Son intention est-elle d’exprimer un point de vue politique qui susciterait la controverse en mettant en images la face cachée d’une culture qu’Hollywood étale dans ses films, d’animation ou directs ? Ou bien demeure-t-il une simple expérience distanciée et animée, sans suite dans la c...

  17. Types of Blood Transfusions

    Science.gov (United States)

    ... Home » Health Information for the Public » Health Topics » Blood Transfusion » Types of Blood Transfusions Explore Blood Transfusion What Is... ... Share this page from the NHLBI on Twitter. Types of Blood Transfusions Blood is transfused either as whole blood ( ...

  18. Cord blood testing

    Science.gov (United States)

    ... to evaluate the oxygen, carbon dioxide, and pH levels) Blood sugar level Blood type and Rh Complete blood count ( ... means you have a blood infection (septicemia). High levels of blood sugar (glucose) in the cord blood may be found ...

  19. Blood and Diversity

    Science.gov (United States)

    ... The Process Risks and Complications History of Blood Transfusion Iron and Blood Donation Iron Info. for All Donors Iron Info. for ... Donation Student Donors Donation Process Eligibility Blood FAQs Blood Donor ... of Blood Transfusion Hosting a Blood Drive What to Expect Hosting ...

  20. Uncertainty of exploitation estimates made from tag returns

    Science.gov (United States)

    Miranda, L.E.; Brock, R.E.; Dorr, B.S.

    2002-01-01

    Over 6,000 crappies Pomoxis spp. were tagged in five water bodies to estimate exploitation rates by anglers. Exploitation rates were computed as the percentage of tags returned after adjustment for three sources of uncertainty: postrelease mortality due to the tagging process, tag loss, and the reporting rate of tagged fish. Confidence intervals around exploitation rates were estimated by resampling from the probability distributions of tagging mortality, tag loss, and reporting rate. Estimates of exploitation rates ranged from 17% to 54% among the five study systems. Uncertainty around estimates of tagging mortality, tag loss, and reporting resulted in 90% confidence intervals around the median exploitation rate as narrow as 15 percentage points and as broad as 46 percentage points. The greatest source of estimation error was uncertainty about tag reporting. Because the large investments required by tagging and reward operations produce imprecise estimates of the exploitation rate, it may be worth considering other approaches to estimating it or simply circumventing the exploitation question altogether.

  1. Meaning, function and methods of the recultivation in mining exploitation

    OpenAIRE

    Dambov, Risto; Ljatifi, Ejup

    2015-01-01

    With the exploitation of mineral resources is performed degradation and deformation of the relief and the general part of surface of the Earth's crust. Depending on the type of open pit mine, this degradation can be expressed to a lesser or greater extent, and sometimes in several square kilometers. The exploitation of mineral resources is with unbreakable link with the environment. Very often it is said that mining is „enemy No. 1“ for environment. With exploitation comes to degradation of h...

  2. A major cathepsin B protease from the liver fluke Fasciola hepatica has atypical active site features and a potential role in the digestive tract of newly excysted juvenile parasites.

    Science.gov (United States)

    Beckham, Simone A; Piedrafita, David; Phillips, Carolyn I; Samarawickrema, Nirma; Law, Ruby H P; Smooker, Peter M; Quinsey, Noelene S; Irving, James A; Greenwood, Deanne; Verhelst, Steven H L; Bogyo, Matthew; Turk, Boris; Coetzer, Theresa H; Wijeyewickrema, Lakshmi C; Spithill, Terry W; Pike, Robert N

    2009-07-01

    The newly excysted juvenile (NEJ) stage of the Fasciola hepatica lifecycle occurs just prior to invasion into the wall of the gut of the host, rendering it an important target for drug development. The cathepsin B enzymes from NEJ flukes have recently been demonstrated to be crucial to invasion and migration by the parasite. Here we characterize one of the cathepsin B enzymes (recombinant FhcatB1) from NEJ flukes. FhcatB1 has biochemical properties distinct from mammalian cathepsin B enzymes, with an atypical preference for Ile over Leu or Arg residues at the P(2) substrate position and an inability to act as an exopeptidase. FhcatB1 was active across a broad pH range (optimal activity at pH 5.5-7.0) and resistant to inhibition by cystatin family inhibitors from sheep and humans, suggesting that this enzyme would be able to function in extracellular environments in its mammalian hosts. It appears, however, that the FhcatB1 protease functions largely as a digestive enzyme in the gut of the parasite, due to the localization of a specific, fluorescently labeled inhibitor with an Ile at the P(2) position. Molecular modelling and dynamics were used to predict the basis for the unusual substrate specificity: a P(2) Ile residue positions the substrate optimally for interaction with catalytic residues of the enzyme, and the enzyme lacks an occluding loop His residue crucial for exopeptidase activity. The unique features of the enzyme, particularly with regard to its specificity and likely importance to a vital stage of the parasite's life cycle, make it an excellent target for therapeutic inhibitors or vaccination. PMID:19401154

  3. Understanding and exploiting the genomic response to hypoxia

    International Nuclear Information System (INIS)

    tumor growth delay, but eventually tumor growth resumes in a HIF-1 independent manner. Therefore, it would be more advantageous to kill cells that have elevated levels of HIF-1 than to merely inhibit HIF-1 activity. A second use of understanding the genomic response to hypoxia is in the identification of hypoxia induced genes that encode secreted protein products that can be used as surrogate markers for tumor hypoxia. In this manner, a simple blood test could potentially be developed that would indicate whether aggressive therapy needs to be undertaken if the tumor has elevated levels of a hypoxia secreted marker. In summary, understanding the genomic response to hypoxia has provided insights for the development of new diagnostic tests, and potential therapeutic strategies to exploit this therapeutic problem

  4. Enhanced surrogate models for statistical design exploiting space mapping technology

    DEFF Research Database (Denmark)

    Koziel, Slawek; Bandler, John W.; Mohamed, Achmed S.;

    2005-01-01

    We present advances in microwave and RF device modeling exploiting Space Mapping (SM) technology. We propose new SM modeling formulations utilizing input mappings, output mappings, frequency scaling and quadratic approximations. Our aim is to enhance circuit models for statistical analysis...

  5. Trajectories and cycles of sexual exploitation and trafficking for sexual exploitation of women in the Peruvian Amazon

    OpenAIRE

    Jaris Mujica

    2015-01-01

    The commercial sexual exploitation is a constant activity in the Peruvian Amazon. Around the river port of Pucallpa in ucayali region, the practice appears systematically: teenage attend taverns around the port, and those dedicated to the work of cooking camps logging, are victims of constant exploitation and many also of trafficking. this article aims to reconstruct the path of life and reproductive cycle of the forms of exploitation in a sample of 20 women, and focuses on: (i) evidence of s...

  6. NUMERICAL ANALYSES OF THE UNDERGROUND EXPLOITATION OF DIMENSION STONE

    OpenAIRE

    1996-01-01

    Underground exploitation of dimension stone is spreading lately for three main reasons; economy, organisation and environment. Moreover, underground openings can be used for many purposes. Underground exploitation is different from surface quarrying only in the first stage, the removal of top slice, descending slices are worked as in conventional quarries. In underground stone quarries, stability problems require adequate studies in order to avoid expensive artificial support measures, ...

  7. D1.2_Final Dissemination and Exploitation Plan

    OpenAIRE

    Garavelli, Sara; Jones, Bob; Amsaghrou Rachida

    2016-01-01

    The following summary outlines the major assets and sustainability strategy that PICSE has produced during its eighteen month activity. This second iteration, which is the present report, combines the final strategy of the communication plan as well as addressing the exploitation of the project itself. The PICSE project, in its timeframe produced: Four PICSE Major Sustainable and Exploitable Assets PICSE Roadmap, highlighting the existing challenges, barriers and trends in ...

  8. Sexual exploitation and abuse by peacekeeping operations in contemporary Africa

    OpenAIRE

    Rudén, Fanny; Utas, Mats

    2009-01-01

    In international peacekeeping operations (PKOs) some individuals are involved in sexual exploitation and abuse of the host country’s population, buying of sexual services and trafficking of prostitutes. Far from being a new phenomenon it goes back a long time, and reports on the issue have increased over the years. All too frequently we read about peacekeepers visiting prostitutes, committing rape, or in other ways sexually exploiting host populations. Some peacekeepers are taking advantage o...

  9. Exploiting symmetries in SDP-relaxations for polynomial optimization

    OpenAIRE

    Riener, Cordian; Theobald, Thorsten; Andrén, Lina Jansson; Lasserre, Jean B.

    2011-01-01

    In this paper we study various approaches for exploiting symmetries in polynomial optimization problems within the framework of semi definite programming relaxations. Our special focus is on constrained problems especially when the symmetric group is acting on the variables. In particular, we investigate the concept of block decomposition within the framework of constrained polynomial optimization problems, show how the degree principle for the symmetric group can be computationally exploited...

  10. Exploration and Exploitation Fit and Performance in International Strategic Alliances

    DEFF Research Database (Denmark)

    Nielsen, Bo Bernhard; Gudergan, Siegfried

    2012-01-01

    Exploration and exploitation constitute two separate, potentially conflicting strategic choices for firms engaged in international strategic alliances. Our empirical study challenges the ambidexterity argument and demonstrates that exploration and exploitation are separate (though not necessarily...... significant roles. When the motive is efficiency and downstream market performance, prior experience with the partner instead is beneficial, as are high levels of trust and low levels of cultural distance. These findings have key implications for literature on strategic fit and alliance performance....

  11. Unequal Exchange, Assets, and Power: Recent Developments in Exploitation Theory

    OpenAIRE

    Veneziani, Roberto; Yoshihara, Naoki

    2013-01-01

    This paper surveys and extends some recent contributions on the theory of exploitation as the unequal exchange of labour. A model of dynamic economies with heterogeneous optimising agents is presented which encompasses the models used in the literature as special cases. It is shown that the notion of exploitation is logically coherent and can be meaningfully analysed in such a general framework. It is then shown that the axiomatic approach of social choice theory can be adopted to explore the...

  12. UK Coal resource for new exploitation technologies. Final report

    OpenAIRE

    Jones, N. S.; Holloway, S.; Creedy, D.P.; Gamer, K.; Smith, N.J.P.; Browne, M.A.E.; S. Durucan

    2004-01-01

    This focus of this report are the UK coal resources available for exploitation by the new technologies of Underground Coal Gasification, Coalbed Methane production and Carbon Dioxide Sequestration. It also briefly considers the potential for further underground and opencast mining and the extraction of methane from working and closed mines. The potential for mining was mainly considered because it has a bearing on the scope for the new exploitation technologies rather than to identify resourc...

  13. eCHASE: Sustainable Exploitation of Electronic Cultural Heritage

    OpenAIRE

    Sinclair, Patrick; Lewis, Paul; Martinez, Kirk; Addis, Matthew; Prideaux, Daniel; Fina, Daniela; Da Bormida, Giorgio

    2005-01-01

    Europe’s digital cultural heritage content has tremendous exploitation potential in applications such as Education, Publishing, e-Commerce, Public Access and Tourism. Value is hugely amplified if the content can be aggregated, repurposed and distributed at a European level. The eCHASE project seeks to demonstrate that public-private partnerships between content holders and commercial service providers can create new services and a sustainable business based on access and exploitation of digit...

  14. Micro and nanotechnology commercialization: balance between exploration and exploitation

    OpenAIRE

    WHC Knol

    2005-01-01

    Innovative materials, components, and systems based on micro and nanotechnologies are recognized as promising growth innovators. The coming years the commercialization of micro and nanotechnology will be extended, but in order to commercialize micro and nanotechnology successfully, besides exploration a parallel focus should be aimed at exploitation. This paper presents in a brief and non-exhaustive manor a theoretical introduction and two company introductions related to exploitation and exp...

  15. Exploiting sparsity and sharing in probabilistic sensor data models

    OpenAIRE

    Evers, S

    2008-01-01

    Probabilistic sensor models defined as dynamic Bayesian networks can possess an inherent sparsity that is not reflected in the structure of the network. Classical inference algorithms like variable elimination and junction tree propagation cannot exploit this sparsity. Also, they do not exploit the opportunities for sharing calculations among different time slices of the model. We show that, using a relational representation, inference expressions for these sensor models can be rewritten to m...

  16. Autologous blood donation

    OpenAIRE

    Goodnough, Lawrence T

    2004-01-01

    Although preoperative autologous blood donation is employed in elective surgery, this is declining because of the increasingly safe allogeneic blood supply. However, it continues to be used because of the public's perception of allogeneic blood risks and increasing blood shortages. Patients may donate a unit of blood (450 ± 45 ml) as often as twice weekly, up to 72 hours before surgery. Preoperative autologous blood is most beneficial in procedures that cause significant blood loss. It has be...

  17. Medications and Blood Pressure

    Science.gov (United States)

    ... Blood Pressure Tools & Resources Stroke More Medications and Blood Pressure Updated:Jul 6,2016 When your blood pressure ... was last reviewed on 08/04/2014. High Blood Pressure • Home • About High Blood Pressure (HBP) • Why HBP ...

  18. Alternatives to Blood Transfusion

    Science.gov (United States)

    ... saved articles window. My Saved Articles » My ACS » Blood Transfusion and Donation + - Text Size Download Printable Version [PDF] » TOPICS Document ... Possible risks of blood transfusions Alternatives to blood transfusions Donating blood Blood donation by cancer survivors To learn more References Previous ...

  19. High Blood Pressure

    Science.gov (United States)

    ... normal blood pressure 140/90 or higher is high blood pressure Between 120 and 139 for the top number, ... prehypertension. Prehypertension means you may end up with high blood pressure, unless you take steps to prevent it. High ...

  20. Postpartum Blood Clots

    Science.gov (United States)

    ... Infection Postpartum Blood Clots Postpartum Thyroid Disorders Postpartum Depression The risk of developing blood clots (thrombophlebitis) is increased for about 6 to 8 weeks after delivery (see Thromboembolic Disorders During Pregnancy ). Typically, blood clots occur in the deep veins ...

  1. Blood Type Puzzle.

    Science.gov (United States)

    Kelly, Janet

    1997-01-01

    Presents a blood type puzzle that provides a visual, hands-on mechanism by which students can examine blood group reactions. Offers students an opportunity to construct their own knowledge about blood types. (JRH)

  2. High blood pressure - infants

    Science.gov (United States)

    National High Blood Pressure Education Program Working Group on High Blood Pressure in Children and Adolescents. The fourth report on the diagnosis, evaluation, and treatment of high blood pressure in children and adolescents. Pediatrics . ...

  3. Low Blood Glucose (Hypoglycemia)

    Science.gov (United States)

    ... Other Dental Problems Diabetic Eye Disease Low Blood Glucose (Hypoglycemia) What is hypoglycemia? Hypoglycemia, also called low ... actions can also help prevent hypoglycemia: Check blood glucose levels Knowing your blood glucose level can help ...

  4. What Is Blood?

    Science.gov (United States)

    ... Our Member Blood Centers Our Partners What is blood? PUBLICATIONS EDUCATION PRESS ROOM BLOG CAREERS CONTACT ABC ... for patients who need it. One unit of blood can be separated into the following components: Nearly ...

  5. Ketones blood test

    Science.gov (United States)

    ... Ketones - serum; Nitroprusside test; Ketone bodies - serum; Ketones - blood ... A blood sample is needed. ... When the needle is inserted to draw blood, some people feel slight ... there may be some throbbing or a slight bruise. This soon ...

  6. Magnesium blood test

    Science.gov (United States)

    Magnesium - blood ... A blood sample is needed. ... When the needle is inserted to draw blood, some people feel slight pain. Others feel a prick or stinging. Afterward, there may be some throbbing or a slight bruise. This soon ...

  7. High Blood Pressure Facts

    Science.gov (United States)

    ... Heart Disease Cholesterol Salt Million Hearts® WISEWOMAN High Blood Pressure Facts Recommend on Facebook Tweet Share Compartir ... facts about high blood pressure [PDF-255K] . High Blood Pressure in the United States About 70 million ...

  8. Managing your blood sugar

    Science.gov (United States)

    ... medlineplus.gov/ency/patientinstructions/000086.htm Managing your blood sugar To use the sharing features on this page, ... way your doctor or nurse recommends. Check your Blood Sugar Often Checking your blood sugar levels often and ...

  9. High blood sugar

    Science.gov (United States)

    ... page: //medlineplus.gov/ency/patientinstructions/000332.htm High blood sugar To use the sharing features on this page, ... later when energy is needed. Symptoms of High Blood Sugar Symptoms of high blood sugar can include: Being ...

  10. Home blood sugar testing

    Science.gov (United States)

    ... page: //medlineplus.gov/ency/patientinstructions/000324.htm Home blood sugar testing To use the sharing features on this ... with their nutrition and activity plans. Check Your Blood Sugar Often Usual times to test your blood sugar ...

  11. Hyperglycemia (High Blood Glucose)

    Medline Plus

    Full Text Available ... Blood Pressure Physical Activity High Blood Glucose My Health Advisor Tools To Know Your Risk Alert Day ... DKA (Ketoacidosis) & Ketones Kidney Disease (Nephropathy) Gastroparesis Mental Health Step On Up Treatment & Care Blood Glucose Testing ...

  12. Blood Clotting and Pregnancy

    Medline Plus

    Full Text Available ... back to top How are Blood Clots in Pregnant Women Treated? Typically, blood clots are treated with ... you think you have one. If you are pregnant and have concerns about blood clots, talk with ...

  13. Hyperglycemia (High Blood Glucose)

    Medline Plus

    Full Text Available ... symptoms include the following: High blood glucose High levels of sugar in the urine Frequent urination Increased ... you should check and what your blood glucose levels should be. Checking your blood and then treating ...

  14. High Blood Pressure

    Science.gov (United States)

    ... pressure and should be taken seriously. Over time, consistently high blood pressure weakens and damages ... of landmark NIH blood pressure study confirm that lower blood pressure target can reduce ...

  15. Changing the Price of Marriage: Evidence from Blood Test Requirements

    Science.gov (United States)

    Buckles, Kasey; Guldi, Melanie; Price, Joseph

    2011-01-01

    We use state repeals of blood test requirements (BTRs) for a marriage license that occurred between 1980 and 2008 to examine the impact of changes in the price of marriage on the marriage decision. Using a within-group estimator that holds constant state and year effects and exploits variation in the repeal dates of BTRs across states, we find…

  16. Blood Clotting and Pregnancy

    Medline Plus

    Full Text Available ... these blood conditions and increase research on the causes, prevention, and treatment. Blood clots are also potentially ... immobility (e.g., bedrest, long distance travel) ...

  17. The ALARA project of the EDF nuclear park exploitation

    International Nuclear Information System (INIS)

    To bring the exploitation of the nuclear park of EDF at the level of the best exploiters in the world in matter of collective and individual dosimetry, the ALARA principle coordinates numerous actions: to associate the temporary societies, to define common language, methods and tools for the whole park to organize a level effect in this area, to optimize the maintenance that is expansive in radiation doses, to make the different levels of management responsible on dosimetric stakes, to reduce the singular sources of exposure, to assure the organisation and exploitation of the experience back in this field and adapt consequently the system of information. The results are cheerful and the objectives for 2000 are: less than 1.2 h.Sv by year and by reactor, no intervener whom annual radiation dose is upper than 20 mSv (out of exceptional case). (N.C.)

  18. Trajectories and cycles of sexual exploitation and trafficking for sexual exploitation of women in the Peruvian Amazon

    Directory of Open Access Journals (Sweden)

    Jaris Mujica

    2015-01-01

    Full Text Available The commercial sexual exploitation is a constant activity in the Peruvian Amazon. Around the river port of Pucallpa in ucayali region, the practice appears systematically: teenage attend taverns around the port, and those dedicated to the work of cooking camps logging, are victims of constant exploitation and many also of trafficking. this article aims to reconstruct the path of life and reproductive cycle of the forms of exploitation in a sample of 20 women, and focuses on: (i evidence of seasonal forms of exploitation; (ii the path of life of these women showing steps in a chain holding several stages and in different work areas; (iii in this context, sexual exploitation and trafficking are not permanent phenomena, are concentrated in one point in the path and stopped to motherhood, between 19 and 25 years; (iv with motherhood and matrilocal settlement, daughters and sons repeat the cycle and reproduce the chain.

  19. NUMERICAL ANALYSES OF THE UNDERGROUND EXPLOITATION OF DIMENSION STONE

    Directory of Open Access Journals (Sweden)

    Biljana Kovačević-Zelić

    1996-12-01

    Full Text Available Underground exploitation of dimension stone is spreading lately for three main reasons; economy, organisation and environment. Moreover, underground openings can be used for many purposes. Underground exploitation is different from surface quarrying only in the first stage, the removal of top slice, descending slices are worked as in conventional quarries. In underground stone quarries, stability problems require adequate studies in order to avoid expensive artificial support measures, The article presents numerical analyses of an underground stone quarry made using of the finite difference code FLAC (the paper is published in Croatian.

  20. Short-term price overreaction: Identification, testing, exploitation

    OpenAIRE

    Caporale, Guglielmo Maria; Gil-Alana, Luis; Plastun, Alex

    2014-01-01

    This paper examines short-term price reactions after one-day abnormal price changes and whether they create exploitable profit opportunities in various financial markets. A t-test confirms the presence of overreactions and also suggests that there is an “inertia anomaly”, i.e. after an overreaction day prices tend to move in the same direction for some time. A trading robot approach is then used to test two trading strategies aimed at exploiting the detected anomalies to make abnormal profits...

  1. Short-Term Price Overreactions: Identification, Testing, Exploitation

    OpenAIRE

    Caporale, Guglielmo Maria; Luis A. Gil-Alana; Plastun, Alex

    2014-01-01

    This paper examines short-term price reactions after one-day abnormal price changes and whether they create exploitable profit opportunities in various financial markets. A t-test confirms the presence of overreactions and also suggests that there is an “inertia anomaly”, i.e. after an overreaction day prices tend to move in the same direction for some time. A trading robot approach is then used to test two trading strategies aimed at exploiting the detected anomalies to make abnormal profits...

  2. Manipulation and exploitation of the tumour environment for therapeutic benefit

    International Nuclear Information System (INIS)

    The authors describe aspects of the tumour microenvironment that are available as targets for manipulation. In particular, the question asked is whether hypoxia in tumours is a problem to be overcome, or a physiological abnormality to be exploited? Bioreductive drugs require metabolic reduction to generate cytotoxic metabolites. This process is facilitated by appropriate reductases and the lower oxygen conditions present in solid tumours compared with normal tissues. Because of their specificity, bioreductive drugs are used to help answer this question. Other aspects of tumour physiology and biochemistry that may be exploited include tissue dependent reductase expression, pH and angiogenesis. (author)

  3. Exploitation of Natural Resources and the Public Sector in Greenland

    DEFF Research Database (Denmark)

    Nielsen, Søren Bo

    This paper considers the role of the public sector in future exploitation of non-renewable resources, especially minerals, in Greenland. The focus is on fiscal sustainability, principles for public sector involvement and the form of government take from mining activities. At present, the public...... to GDP. Hence, fiscal policy is quite far from being sustainable. Apart from a need for reforms, these facts also constrain the possible role of the public sector in future resource exploitation. In any case, the government should preferably adhere to strict principles when developing the mineral...

  4. The human traffickers and exploitation of children and young adults.

    Directory of Open Access Journals (Sweden)

    Sara Scala

    2012-06-01

    Full Text Available The article focuses on the traffic of children, who are kidnapped, cheated and purchased by their families to be exploited in many ways. These victims have severe mental and physical traumas. Many of them, slaves of their exploiters, remain invisible and live their lifes without fundamental rights and without any kind of support or help. The traffic in human beings is a new kind of slavery, which acts in the dark, is criminal and involves different subjects of different ages, different nationalities and generations. The traffic in human beings is managed by transnational criminal organizations and is a disturbing and growing phenomena around the world.

  5. Insider Trading in Germany - Do Corporate Insiders Exploit Inside Information?

    Directory of Open Access Journals (Sweden)

    Björn M. Dymke

    2008-12-01

    Full Text Available Our study focuses on the question whether corporate insiders in Germany exploit inside information while trading in their company’s stock. In contrast to prior international studies, which are not able to link insider transactions to a formal definition of inside information, we relate insider transactions to subsequent releases of inside information via ad-hoc news disclosures. We find evidence that corporate insiders as a group seem to trade on inside information. Moreover, members of the supervisory board seem to be most active in exploiting inside information, since they realize exceptionally high profits with their frequent front-running transactions.

  6. From Exploitation to Industry: Definitions, Risks, and Consequences of Domestic Sexual Exploitation and Sex Work Among Women and Girls

    Science.gov (United States)

    Gerassi, Lara

    2015-01-01

    In the last 15 years, terms such as prostitution, sex trafficking, sexual exploitation, modern-day slavery, and sex work have elicited much confusion and debate as to their definitions. Consequently several challenges have emerged for both law enforcement in the prosecution of criminals and practitioners in service provision. This article reviews the state of the literature with regard to domestic, sexual exploitation among women and girls in the United States and seeks to (1) provide definitions and describe the complexity of all terms relating to domestic sexual exploitation of women and girls in the United States, (2) explore available national prevalence data according to the definitions provided, and (3) review the evidence of mental health, social, and structural risk factors at the micro-, mezzo-, and macrolevels. PMID:26726289

  7. Can commercial ferrofluids be exploited in AC magnetic hyperthermia treatment to address diverse biomedical aspects?

    Directory of Open Access Journals (Sweden)

    Angelakeris M.

    2014-07-01

    Full Text Available Multifunctional magnetic nanoparticles are considered as promising candidates for various applications combining diagnosis, imaging and therapy. In the present work, we elaborate on the commercial colloidal solution “FluidMAG” (from Chemicell GmbH as a possible candidate for magnetic hyperthermia application. The current product is a dispersion of magnetite nanoparticles employed for purification or separation of biotinylated biomolecules from different sources (e.g. blood. Transmission Electron Microscopy showed that the NPs have a spherical shape with mean diameter of 12.3 nm (± 20%, and SQUID magnetometry revealed their superparamagnetic character. Our promising results of the AC hyperthermia efficiency of “FluidMAG” suggest that with the appropriate manipulation it can also be exploited as magnetic hyperthermia agent.

  8. Hyperglycemia (High Blood Glucose)

    Medline Plus

    Full Text Available ... how often you should check and what your blood glucose levels should be. Checking your blood and then treating ... I Treat Hyperglycemia? You can often lower your blood glucose level by exercising. However, if your blood glucose is ...

  9. BUN - blood test

    Science.gov (United States)

    Blood urea nitrogen ... A blood sample is needed. Most of the time blood is drawn from a vein located on the inside ... Many medicines can interfere with blood test results. Your health ... if you need to stop taking any medicines before you have this ...

  10. The forecast effectiveness of mining exploitation effects on the exploited area conducted with the use of Bialek`s formulas

    Science.gov (United States)

    Orwat, Justyna

    2016-06-01

    The article presents the results of numerical calculations conducted with the use of a computer programme EDN - OPN for forecasting permanent deformations of a mining area being the result of the underground exploitation of coal deposits. The theoretical values of basic deformation indicators (decreases, inclinations, curvatures, displacements and horizontal strains) were determined with the use of Bialek`s formulas. They were subsequently juxtaposed with the practical values obtained thanks to the geodetic measurements conducted in the years 2001-2011 on the established observation line. The evaluation of the effectiveness of the conducted forecast of effects of the mining exploitation was carried out on this basis.

  11. Multiwavelength erbium-doped fiber laser exploiting intracavity polarization inhomogeneity

    Institute of Scientific and Technical Information of China (English)

    孙军强; 丘军林; 黄德修

    2000-01-01

    Simultaneous multiwavelength lasing is demonstrated exploiting intracavity polarization in-homogeneity in an erbium-doped fiber laser. Experiments indicate that polarization hole burning can be enhanced by the changes of optical MQW waveguide bias current and the polarization states in the laser cavity. Ten wavelengths with 0.9 nm spacing are generated at room temperature.

  12. Six scenarios of exploiting an ontology based, mobilized learning environment

    NARCIS (Netherlands)

    G. Kismihók; I. Szabó; R. Vas

    2012-01-01

    In this article, six different exploitation possibilities of an educational ontology based, mobilized learning management system are presented. The focal point of this system is the educational ontology model. The first version of this educational ontology model serves as a foundation for curriculum

  13. Bats track and exploit changes in insect pest populations

    Science.gov (United States)

    The role of bats or any generalist predator in suppressing prey populations depends on the predator’s ability to exploit available prey in space and time. Using a qPCR faecal DNA assay, we document significant association between numbers of Brazilian free-tailed bats (Tadarida brasiliensis) consumin...

  14. The Sexual Exploitation of Missing Children: A Research Review.

    Science.gov (United States)

    Hotaling, Gerald T.; Finkelhor, David

    This paper evaluates current knowledge about the prevalence, dynamics, and short- and long-term effects of sexual exploitation among missing children. It is based upon empirical research findings from books, papers presented at professional meetings, doctoral dissertations, works in progress, and more than 75 articles in professional journals.…

  15. Exploitation of commercial remote sensing images: reality ignored?

    Science.gov (United States)

    Allen, Paul C.

    1999-12-01

    The remote sensing market is on the verge of being awash in commercial high-resolution images. Market estimates are based on the growing numbers of planned commercial remote sensing electro-optical, radar, and hyperspectral satellites and aircraft. EarthWatch, Space Imaging, SPOT, and RDL among others are all working towards launch and service of one to five meter panchromatic or radar-imaging satellites. Additionally, new advances in digital air surveillance and reconnaissance systems, both manned and unmanned, are also expected to expand the geospatial customer base. Regardless of platform, image type, or location, each system promises images with some combination of increased resolution, greater spectral coverage, reduced turn-around time (request-to- delivery), and/or reduced image cost. For the most part, however, market estimates for these new sources focus on the raw digital images (from collection to the ground station) while ignoring the requirements for a processing and exploitation infrastructure comprised of exploitation tools, exploitation training, library systems, and image management systems. From this it would appear the commercial imaging community has failed to learn the hard lessons of national government experience choosing instead to ignore reality and replicate the bias of collection over processing and exploitation. While this trend may be not impact the small quantity users that exist today it will certainly adversely affect the mid- to large-sized users of the future.

  16. Malware Sandbox Analysis for Secure Observation of Vulnerability Exploitation

    Science.gov (United States)

    Yoshioka, Katsunari; Inoue, Daisuke; Eto, Masashi; Hoshizawa, Yuji; Nogawa, Hiroki; Nakao, Koji

    Exploiting vulnerabilities of remote systems is one of the fundamental behaviors of malware that determines their potential hazards. Understanding what kind of propagation tactics each malware uses is essential in incident response because such information directly links with countermeasures such as writing a signature for IDS. Although recently malware sandbox analysis has been studied intensively, little work is done on securely observing the vulnerability exploitation by malware. In this paper, we propose a novel sandbox analysis method for securely observing malware's vulnerability exploitation in a totally isolated environment. In our sandbox, we prepare two victim hosts. We first execute the sample malware on one of these hosts and then let it attack the other host which is running multiple vulnerable services. As a simple realization of the proposed method, we have implemented a sandbox using Nepenthes, a low-interaction honeypot, as the second victim. Because Nepenthes can emulate a variety of vulnerable services, we can efficiently observe the propagation of sample malware. In the experiments, among 382 samples whose scan capabilities are confirmed, 381 samples successfully started exploiting vulnerabilities of the second victim. This indicates the certain level of feasibility of the proposed method.

  17. Exploiting synergies between nonproliferation verification regimes: A pragmatic approach

    International Nuclear Information System (INIS)

    This paper considers the potential for expanding interaction and exploiting synergies between different multilateral disarmament and nonproliferation regimes. It concludes that although there are political barriers to high-level and pervasive synergization, there are opportunities for pragmatic, functional steps to be taken as a way of building confidence and experience. (author)

  18. Multiwavelength erbium-doped fiber laser exploiting intracavity polarization inhomogeneity

    Institute of Scientific and Technical Information of China (English)

    2000-01-01

    Simultaneous multiwavelength lasing is demonstrated exploiting intracavity polarization inhomogeneity in an erbium-doped fiber laser. Experiments indicate that polarization hole burning can be enhanced by the changes of optical MQW waveguide bias current and the polarization states in the laser cavity. Ten wavelengths with 0.9 nm spacing are generated at room temperature.

  19. Hitch-hiking parasitic wasp learns to exploit butterfly antiaphrodisiac

    NARCIS (Netherlands)

    Huigens, M.E.; Pashalidou, F.G.; Qian, M.H.; Bukovinszky, T.; Smid, H.M.; Loon, van J.J.A.; Dicke, M.; Fatouros, N.E.

    2009-01-01

    Many insects possess a sexual communication system that is vulnerable to chemical espionage by parasitic wasps. We recently discovered that a hitch-hiking (H) egg parasitoid exploits the antiaphrodisiac pheromone benzyl cyanide (BC) of the Large Cabbage White butterfly Pieris brassicae. This pheromo

  20. Space Mapping Optimization of Microwave Circuits Exploiting Surrogate Models

    DEFF Research Database (Denmark)

    Bakr, M. H.; Bandler, J. W.; Madsen, Kaj; Søndergaard, Jacob

    2000-01-01

    convex combination of a mapped coarse model and a linearized fine model. It exploits, in a novel way, a linear frequency-sensitive mapping. During the optimization iterates, the coarse and fine models are simulated at different sets of frequencies. This approach is shown to be especially powerful if a...

  1. Confirmatory Factor Analysis of Perceived Exploitation of College Athletes Questionnaire

    Science.gov (United States)

    Van Rheenen, Derek; Atwood, Jason R.

    2014-01-01

    The exploitation of college athletes has been a topic of controversy within American higher education for over half of a century. Especially in the revenue-generating sports of men's basketball and football, critics have highlighted the surplus gains expropriated by colleges and universities on the backs of these young men, who are…

  2. Commercial Sexual Exploitation of Children and the School Nurse

    Science.gov (United States)

    Grace, Lisa Goldblatt; Starck, Maureen; Potenza, Jane; Kenney, Patricia A.; Sheetz, Anne H.

    2012-01-01

    As trusted health professionals in the school setting, school nurses are well positioned to identify students who may be victims of commercial sexual exploitation of children (CSEC). However, until recently this issue has been clouded by lack of awareness, stigma, and/or denial. Since nationally the average age of entry for girls into the…

  3. eCHASE: Exploiting Cultural Heritage using the Semantic Web

    OpenAIRE

    Sinclair, Patrick; Lewis, Paul; Martinez, Kirk; Addis, Matthew; Pillinger, Adrian; Prideaux, Daniel

    2005-01-01

    The eCHASE project is using semantic web technologies to demonstrate sustainable business models based on access and exploitation of digital cultural heritage content at a European level. In this paper we describe the eCHASE project and outline the system architecture.

  4. Exploiting Network Topology Information to Mitigate Ambiguities in VMP Localization

    DEFF Research Database (Denmark)

    Pedersen, Claus; Pedersen, Troels; Fleury, Bernard Henri

    2011-01-01

    We investigate an extension to the probabilistic model of a wireless sensor network (WSN) in the variational message passing localization algorithm. This extension exploits network topology information to mitigate ambiguities in WSN localization schemes. In a simulation case study we show...

  5. Geographical aspects of exploitation of nuclear energy in Europe

    International Nuclear Information System (INIS)

    The topic of exploitation of nuclear energy is becoming increasingly actual in the present time in connection with frequently discussed question of 'renaissance of nuclear energetics'. The work is aimed at research of geographical aspects of exploitation of nuclear energy for military and civil purposes on the territory of Europe. The base of work represents the analysis of theoretical aspects of research of energy, mainly of nuclear energy. The work examines the historical development of exploitation of nuclear energy since its discovery, through development of military nuclear industry in Europe, big attention is paid to spreading of nuclear energetics on the territory of Europe from its beginnings up to the present time. The main part of the work represents the analysis of the present situation of exploitation of nuclear energy for civil purposes in Europe. The attention is paid to so-called nuclear fuel cycle as complex chain of several reciprocally interconnected operations of nuclear fuel treatment. The monitoring of spatial relations among individual countries within their nuclear fuel cycles is emphasised. The analysis of historical development and of the present state of nuclear energetics finished up in the outline of the perspectives of its further development in Europe. The analysis of the tendencies of evolution of world energetic economy mentions on the trend of growth of energy consumption in the world and Europe, as well as on the important position of nuclear energy in the structure of energy sources. Summary in English language is included. (author)

  6. Human trafficking for labour exploitation: Interpreting the crime

    NARCIS (Netherlands)

    Coster van Voorhout, J.E.B.

    2007-01-01

    The definition of human trafficking for labour exploitation, as follows from the European Council Framework Decision, proves to be unclear. Literal interpretation does not suffice, because it does not clarify all elements of what is deemed to be criminal behaviour, and hermeneutical interpretation a

  7. Exploiting Link Dynamics in LEO-to-Ground Communications

    OpenAIRE

    Palmer, Joseph; Caffrey, Michael

    2009-01-01

    The high dynamics of the LEO-to-ground radio channel are described. An analysis shows how current satellite radio systems largely underutilize the available radio link, and that a radio that can adaptively vary the bit rate can more fully exploit it, resulting in increased data throughput and improved power efficiency. We propose one method for implementing the adaptivity, and present simulation results.

  8. Assisting children born of sexual exploitation and abuse

    Directory of Open Access Journals (Sweden)

    Lauren Rumble

    2007-01-01

    Full Text Available The UN Secretary-General has issued a strategy tosupport victims of sexual exploitation and abuse by UNstaff. It includes a controversial proposal to introduceDNA sampling for all UN staff. Unless this suggestionis adopted, an important opportunity to implementa truly survivor-centred approach may be lost.

  9. Exploiting Patient Labour at Kew Cottages, Australia, 1887-1950

    Science.gov (United States)

    Monk, Lee-Ann

    2010-01-01

    This article examines the exploitation of patient labour at Kew Cottages, Australia's first purpose-built state institution for people with learning disabilities. Analysing historical evidence for the period 1887-1950 shows that unpaid patient labour contributed significantly to the economy of the Cottages and so to the government department of…

  10. Relativistic Quantum Metrology: Exploiting relativity to improve quantum measurement technologies

    CERN Document Server

    Ahmadi, Mehdi; Friis, Nicolai; Sabín, Carlos; Adesso, Gerardo; Fuentes, Ivette

    2013-01-01

    We present a framework for relativistic quantum metrology that is useful for both Earth-based and space-based technologies. Quantum metrology has been so far successfully applied to design precision instruments such as clocks and sensors which outperform classical devices by exploiting quantum properties. There are advanced plans to implement these and other quantum technologies in space, for instance Space-QUEST and Space Optical Clock projects intend to implement quantum communications and quantum clocks at regimes where relativity starts to kick in. However, typical setups do not take into account the effects of relativity on quantum properties. To include and exploit these effects, we introduce techniques for the application of metrology to quantum field theory (QFT). QFT properly incorporates quantum theory and relativity, in particular, at regimes where space-based experiments take place. This framework allows for high precision estimation of parameters that appear in QFT including proper times and acce...

  11. Wireless Jamming Localization by Exploiting Nodes' Hearing Ranges

    Science.gov (United States)

    Liu, Zhenhua; Liu, Hongbo; Xu, Wenyuan; Chen, Yingying

    Jamming attacks are especially harmful when ensuring the dependability of wireless communication. Finding the position of a jammer will enable the network to actively exploit a wide range of defense strategies. Thus, in this paper, we focus on developing mechanisms to localize a jammer. We first conduct jamming effect analysis to examine how a hearing range, e.g., the area from which a node can successfully receive and decode the packet, alters with the jammer's location and transmission power. Then, we show that the affected hearing range can be estimated purely by examining the network topology changes caused by jamming attacks. As such, we solve the jammer location estimation by constructing a least-squares problem, which exploits the changes of the hearing ranges. Compared with our previous iterative-search-based virtual force algorithm, our proposed hearing-range-based algorithm exhibits lower computational cost (i.e., one-step instead of iterative searches) and higher localization accuracy.

  12. EXPLOITING RHETORICAL RELATIONS TO MULTIPLE DOCUMENTS TEXT SUMMARIZATION

    Directory of Open Access Journals (Sweden)

    N. Adilah Hanin Zahri

    2015-03-01

    Full Text Available Many of previous research have proven that the usage of rhetorical relations is capable to enhance many applications such as text summarization, question answering and natural language generation. This work proposes an approach that expands the benefit of rhetorical relations to address redundancy problem for cluster-based text summarization of multiple documents. We exploited rhetorical relations exist between sentences to group similar sentences into multiple clusters to identify themes of common information. The candidate summary were extracted from these clusters. Then, cluster-based text summarization is performed using Conditional Markov Random Walk Model to measure the saliency scores of the candidate summary. We evaluated our method by measuring the cohesion and separation of the clusters constructed by exploiting rhetorical relations and ROUGE score of generated summaries. The experimental result shows that our method performed well which shows promising potential of applying rhetorical relation in text clustering which benefits text summarization of multiple documents

  13. Infomax strategies for an optimal balance between exploration and exploitation

    CERN Document Server

    Reddy, Gautam; Vergassola, Massimo

    2016-01-01

    Proper balance between exploitation and exploration is what makes good decisions, which achieve high rewards like payoff or evolutionary fitness. The Infomax principle postulates that maximization of information directs the function of diverse systems, from living systems to artificial neural networks. While specific applications are successful, the validity of information as a proxy for reward remains unclear. Here, we consider the multi-armed bandit decision problem, which features arms (slot-machines) of unknown probabilities of success and a player trying to maximize cumulative payoff by choosing the sequence of arms to play. We show that an Infomax strategy (Info-p) which optimally gathers information on the highest mean reward among the arms saturates known optimal bounds and compares favorably to existing policies. The highest mean reward considered by Info-p is not the quantity actually needed for the choice of the arm to play, yet it allows for optimal tradeoffs between exploration and exploitation.

  14. Evaluating Maximum Wind Energy Exploitation in Active Distribution Networks

    DEFF Research Database (Denmark)

    Siano, Pierluigi; Chen, Peiyuan; Chen, Zhe;

    2010-01-01

    The increased spreading of distributed and renewable generation requires moving towards active management of distribution networks. In this paper, in order to evaluate maximum wind energy exploitation in active distribution networks, a method based on a multi-period optimal power flow (OPF......) analysis is proposed. Active network management schemes such as coordinated voltage control, energy curtailment and power factor control are integrated in the method in order to investigate their impacts on the maximization of wind energy exploitation. Some case studies, using real data from a Danish...... distribution system, confirmed the effectiveness of the proposed method in evaluating the optimal applications of active management schemes to increase wind energy harvesting without costly network reinforcement for the connection of wind generation....

  15. The remote control of power supplies: Experience of exploitation

    Directory of Open Access Journals (Sweden)

    Petrović Dragana

    2012-01-01

    Full Text Available The remote control of power supplies has been developed according to Telecom Serbia’s technical requirements. It has been exploited for five years. From this system specially developed for the needs of a telecom company, it has evolved into a universal system. After five years of usage of SDNU, analysis and systematization of the detected problems were carried out. The data were collected from about 200 external devices. The analyzed objects were of the first priority, located in larger cities, but also objects in inaccessible locations far from the city. The identified problems were grouped into four categories. According to classification of the problem, recommendations about SDNU users’ work organization were made in order to exploit the results effectively. This paper presents the characteristic forms of signals for every category of the detected problems.

  16. Analysis Of Damage Arising From Exploitation Of The Aircraft

    Directory of Open Access Journals (Sweden)

    Woźny Piotr

    2014-12-01

    Full Text Available During exploitation, due to a variety of reasons, aircrafts are damaged or suffer from different failures. In the process of operation, using appropriate methods of diagnosis, failure, damage, and relative deregulation of individual elements or units can be detected. For this purpose, one can apply a number of indirect diagnostic methods with the use of recorded diagnostic signals or a direct diagnosis with the use of non-destructive methods. The proper identification of the technical condition allows to determine the causes of irregularities and take actions aimed at preventing their occurrence. The article presents the types of exploitation damage of a multi-purpose aircraft. In addition, the criteria for the division of damage and research methods of the causes of damage are presented. Furthermore, an analysis of the scope of activities to be performed during the research of causes of damage to the aircraft is made.

  17. Exploiting Innocuous Activity for Correlating Users Across Sites

    OpenAIRE

    Goga, Oana; Lei, Howard; Parthasarathi, Sree Hari Krishnan; Friedland, Gerald; Sommer, Robin; Teixeira, Renata

    2013-01-01

    International audience We study how potential attackers can identify accounts on different social network sites that all belong to the same user, exploiting only innocuous activity that inherently comes with posted content. We examine three specific features on Yelp, Flickr, and Twitter: the geo-location attached to a user's posts, the timestamp of posts, and the user's writing style as captured by language models. We show that among these three features the location of posts is the most po...

  18. How to Exploit Domain Knowledge in Multiple Software Product Lines?

    OpenAIRE

    Urli, Simon; Mosser, Sébastien; Blay-Fornarino, Mireille; Collet, Philippe

    2013-01-01

    International audience As Software Product Lines (SPL) are inevitably moving towards a multiple form to tackle issues of reuse and complexity, variability management across the composed SPLs is still addressed with basic inter-constraints. Based on two disjoint case studies (digital signage and cloud computing), we identified this challenging problem for the SPL community. In this paper we describe how the domain knowledge needs to be exploited to support a more complete definition of Mult...

  19. Endangered Species and Natural Resource Exploitation: Extinction vs. Coexistence

    OpenAIRE

    Tsur, Yacov; Zemel, Amos

    1994-01-01

    The threat on the survival of animal species due to intensive use of natural resources is incorporated within resource management models, paying special attention to uncertainty regarding the conditions that lead to extinction. The manner in which the potential benefits forgone due to the species extinction (denoted extinction penalty) induce more conservative exploitation policies is studied in detail. When the extinction penalty is ignored, the optimal policy is to drive the resource stock ...

  20. CORPORATE CULTURE AS AN ANTECEDENT OF SUCCESSFUL EXPLORATION AND EXPLOITATION

    OpenAIRE

    KURT MATZLER; DAGMAR E. ABFALTER; TODD A. MOORADIAN; FRANZ BAILOM

    2013-01-01

    Organisational culture is a decisive factor for a firm's innovativeness and performance. Our empirical model explores the relationship between organisational culture — based on the competing values model — as an antecedent of exploration and exploitation, innovation success and firm performance. It is tested on a sample of 232 CEOs of corporations in the US. Relationships between the constructs were analysed through path modelling, using the Partial Least Squares (PLS) method, employing the S...

  1. HUMAN TRAFFICKING. TRAFFICKING IN CHILDREN. PRACTICAL ASPECTS REGARDING CHILDREN EXPLOITATION

    OpenAIRE

    Raluca-Ioana Rosu

    2010-01-01

    900 thousand children are working in their own households and 70 thousand were victims of worst forms of child labor, including sexual exploitation, forced work, trafficking in children, involvement in criminal activities and risk exposure. Also, approximately 3 thousand street children were involved in: products selling in the street, beggary or windshields washing. In Roma communities, the work of young children (even of 5 years old) is still a frequent practice. Isolated cases of girls inv...

  2. Exploiting GPUs in Virtual Machine for BioCloud

    OpenAIRE

    Heeseung Jo; Jinkyu Jeong; Myoungho Lee; Dong Hoon Choi

    2013-01-01

    Recently, biological applications start to be reimplemented into the applications which exploit many cores of GPUs for better computation performance. Therefore, by providing virtualized GPUs to VMs in cloud computing environment, many biological applications will willingly move into cloud environment to enhance their computation performance and utilize infinite cloud computing resource while reducing expenses for computations. In this paper, we propose a BioCloud system architecture that ena...

  3. Anisotropic Assembly of Colloidal Nanoparticles: Exploiting Substrate Crystallinity

    OpenAIRE

    Hayton, JA; Pauliac-Vaujour, E.; Moriarty, P.

    2007-01-01

    We show that the crystal structure of a substrate can be exploited to drive the anisotropic assembly of colloidal nanoparticles. Pentanethiol-passivated Au particles of approximately 2 nm diameter deposited from toluene onto hydrogen-passivated Si(111) surfaces form linear assemblies (rods) with a narrow width distribution. The rod orientations mirror the substrate symmetry, with a high degree of alignment along principal crystallographic axes of the Si(111) surface. There is a strong prefere...

  4. The exploitation of small cetaceans in Coastal Peru

    OpenAIRE

    Read, A J; Van Waerebeek, K.; Reyes, J.C.; McKinnon, J.S.; Lehman, L.C.

    1988-01-01

    Several species of small cetaceans are captured by fishermen in Peruvian coastal waters and used for human consumption. A large directed fishery exists for one species, the dusky dolphin Lagenorhynchus obscurus. In addition, two other species, the Burmeister's porpoise Phocoena spinipinnis and bottlenose dolphin Tursiops truncatus, are commonly taken in both directed fisheries and incidentally to other fishing operations. To examine the exploitation of these species in detail, we monitored th...

  5. Sicilian Protected Areas Among Tourist Exploitation and Environmental Guardianship

    OpenAIRE

    Genna, Vito

    2006-01-01

    This report pursues the objective to define the connection that ties exploitation of the environment quality in the protected areas and the opportunities of economic and tourist development. Sicilian protected areas involve a territory full of an extraordinary variety and concentration of historical, artistic and environmental resources, so that they represent one of the main tourist attractions of the Island. Unfortunately, the Sicilian protected areas system shows serious backwardnesses, so...

  6. Compressed Sensing MR Image Reconstruction Exploiting TGV and Wavelet Sparsity

    OpenAIRE

    Di Zhao; Huiqian Du; Yu Han; Wenbo Mei

    2014-01-01

    Compressed sensing (CS) based methods make it possible to reconstruct magnetic resonance (MR) images from undersampled measurements, which is known as CS-MRI. The reference-driven CS-MRI reconstruction schemes can further decrease the sampling ratio by exploiting the sparsity of the difference image between the target and the reference MR images in pixel domain. Unfortunately existing methods do not work well given that contrast changes are incorrectly estimated or motion compensation is inac...

  7. Sea cucumber exploitation in the Toliara region of southwest Madagascar

    OpenAIRE

    Rasolofonirina, R.; Conand, Chantal

    1998-01-01

    Sea cucumber harvesting is a traditional activity in Madagascar (Conand et al., 1997) and is very actively pursued in the south-west (Toliara). Several sources (e.g. Provincial Trade Department, Provincial Marine Fisheries Service) indicate that, between 1979 and 1986, exports fluctuated between 10 and 56 t. Data on recent exports show a very large increase, with volumes of more than 500 t. However, available data are insufficient to diagnose and analyse current over-exploitation, as the fish...

  8. A New Index Coding Scheme Exploiting Interlinked Cycles

    OpenAIRE

    Thapa, Chandra; Ong, Lawrence; Johnson, Sarah J.

    2015-01-01

    We study the index coding problem in the unicast message setting, i.e., where each message is requested by one unique receiver. This problem can be modeled by a directed graph. We propose a new scheme called interlinked cycle cover, which exploits interlinked cycles in the directed graph, for designing index codes. This new scheme generalizes the existing clique cover and cycle cover schemes. We prove that for a class of infinitely many digraphs with messages of any length, interlinked cycle ...

  9. Unconventional coal exploitation methods in Republic of Macedonia

    OpenAIRE

    Panov, Zoran; Popovski, Risto; Karanakova Stefanovska, Radmila

    2014-01-01

    Traditional mining methods however are not suited to working offshore reserves, and development and infrastructure costs of new mines can render the exploitation of landward reserves uneconomical. Underground coal gasification (UCG) has the potential to provide a clean and convenient source of energy from coal seams where traditional mining methods are either impossible or uneconomical. UCG is a method of converting unworked coal, deep underground, into a combustible gas, which can be use...

  10. A Trainable Neuromorphic Integrated Circuit that Exploits Device Mismatch

    OpenAIRE

    Thakur, Chetan Singh; Wang, Runchun; Hamilton, Tara Julia; Tapson, Jonathan; van Schaik, Andre

    2015-01-01

    Random device mismatch that arises as a result of scaling of the CMOS (complementary metal-oxide semi-conductor) technology into the deep submicron regime degrades the accuracy of analogue circuits. Methods to combat this increase the complexity of design. We have developed a novel neuromorphic system called a Trainable Analogue Block (TAB), which exploits device mismatch as a means for random projections of the input to a higher dimensional space. The TAB framework is inspired by the princip...

  11. Register Based Research Exploiting a Goldmine of Knowledge

    OpenAIRE

    Thaulow, Ivan; Thygesen, Lars

    2014-01-01

    Part 10: Short Summaries International audience Researchers in Denmark have for many years had outstanding opportunities for exploiting data from a wide range of registers. They can carry out research based on a goldmine of information on social and demographic characteristics of the population, labour market participation, health data and medical treatment, and more. All these data can be combined, and longitudinal analysis can be made.

  12. Organizational Ambidexterity : Balancing Exploitation and Exploration in Organizations

    OpenAIRE

    Yigit, Mert

    2013-01-01

    Purpose: This paper aims to investigate necessity of ambidexterity for organizations. The main interest of this thesis is to investigate why organizations should be ambidextrous and how organizations can reach ambidexterity under the pressure of limited resources and competitive market condition. Findings: This thesis explored relations and tensions between exploitation and exploration in organizational and individual aspects. Findings in the research show that communication skill of the subu...

  13. Birds of a Feather: Neanderthal Exploitation of Raptors and Corvids

    OpenAIRE

    Finlayson, Clive; Brown, Kimberly; Blasco, Ruth; Rossell, Jordi; Negro, Juan J.; Bortolotti, Gary R.; Finlayson, Geraldine; Sánchez-Marco, A.; Rodríguez Vidal, Joaquín.; Carrión, José S.; Rodríguez-Llanes, J.M.

    2012-01-01

    The hypothesis that Neanderthals exploited birds for the use of their feathers or claws as personal ornaments in symbolic behaviour is revolutionary as it assigns unprecedented cognitive abilities to these hominins. This inference, however, is based on modest faunal samples and thus may not represent a regular or systematic behaviour. Here we address this issue by looking for evidence of such behaviour across a large temporal and geographical framework. Our analyses try to answer four main qu...

  14. Exploiting Child-Robot Aesthetic Interaction for a Social Robot

    OpenAIRE

    Jae-Joon Lee; Dae-Won Kim; Bo-Yeong Kang

    2012-01-01

    A social robot interacts and communicates with humans by using the embodied knowledge gained from interactions with its social environment. In recent years, emotion has emerged as a popular concept for designing social robots. Several studies on social robots reported an increase in robot sociability through emotional imitative interactions between the robot and humans. In this paper conventional emotional interactions are extended by exploiting the aesthetic theories that the sociability of ...

  15. Exploitation de la faune en République Centrafricaine

    Directory of Open Access Journals (Sweden)

    Hardouin, J.

    1983-01-01

    Full Text Available Exploitation of wildlife in Central African Republic. Potentialities of wildlife and tourism in the area of Bamangui-Bangoran are high, but local population has been omitted from the development programmes. Hunting economy has always been in force. A better use of the local production is possible. Fight against commercial poaching should be intensified. Scientific observations must be regularly organized to avoid destruction of a most interesting renewable natural resource.

  16. Exploitation de la faune en République Centrafricaine

    OpenAIRE

    Hardouin, J.

    1983-01-01

    Exploitation of wildlife in Central African Republic. Potentialities of wildlife and tourism in the area of Bamangui-Bangoran are high, but local population has been omitted from the development programmes. Hunting economy has always been in force. A better use of the local production is possible. Fight against commercial poaching should be intensified. Scientific observations must be regularly organized to avoid destruction of a most interesting renewable natural resource.

  17. Online users of child sexual exploitation material (CSEM)

    OpenAIRE

    Kettleborough, Danielle; Merdian, Hannah Lena; Roberts, Amanda; Perkins, Derek

    2016-01-01

    Recent years have seen a substantial increase in the number of individuals engaging in offences relating to the online use of child sexual exploitation material (CSEM), to the point that UK police forces have stated that they “cannot arrest their way out of the problem”. Current movements are shifting the focus towards primary and secondary prevention efforts through public health campaigns, yet our knowledge of this typology of offending still remains somewhat limited. As such, a research pr...

  18. Catch and release: Rab1 exploitation by Legionella pneumophila

    OpenAIRE

    Machner, Matthias P.; Chen, Yang

    2011-01-01

    The intracellular pathogen Legionella pneumophila exploits host cell vesicular transport by manipulating the activity of the small GTPase Rab1. Bacterial proteins, so called effectors, that are delivered into the infected cell play a key role in this process. Here, we summarize recent developments in our quest to understand the molecular function of these effectors, and describe how L. pneumophila employs post-translational modification in a reversible manner to manipulate the activity of Rab...

  19. Architectures for intelligent robots in the age of exploitation

    Science.gov (United States)

    Hall, E. L.; Ali, S. M. Alhaj; Ghaffari, M.; Liao, X.; Sarkar, Saurabh; Mathur, Kovid; Tennety, Srinivas

    2009-01-01

    History shows that problems that cause human confusion often lead to inventions to solve the problems, which then leads to exploitation of the invention, creating a confusion-invention-exploitation cycle. Robotics, which started as a new type of universal machine implemented with a computer controlled mechanism in the 1960's, has progressed from an Age of Over-expectation, a Time of Nightmare, an Age of Realism, and is now entering the Age of Exploitation. The purpose of this paper is to propose architecture for the modern intelligent robot in which sensors permit adaptation to changes in the environment are combined with a "creative controller" that permits adaptive critic, neural network learning, and a dynamic database that permits task selection and criteria adjustment. This ideal model may be compared to various controllers that have been implemented using Ethernet, CAN Bus and JAUS architectures and to modern, embedded, mobile computing architectures. Several prototypes and simulations are considered in view of peta-computing. The significance of this comparison is that it provides some insights that may be useful in designing future robots for various manufacturing, medical, and defense applications.

  20. Pork and Carcasses Quality in Swine Exploited in Family Farms

    Directory of Open Access Journals (Sweden)

    Loredana Heber

    2010-10-01

    Full Text Available Maximum values of dry matter and fat (% of the carcass weight is achieved in swine exploited on small private family farms at 137 kg of dry matter and 115 kg of protein. Slaughtering swine at higher weight results in an increase of the dry matter and of the caloric value because of the increase of the amount of fat in the muscular fibber; thus, pork is of low quality because of the massive accumulation fat substance and the economic efficiency of producing pork is improper, with supplementary expenses on feed. Fattening swine on small family exploitations up to over 11 kg results in changes of the meat /fat ratio, detrimental to pork meat because of both thickening of lard on the animals' back and of fat depositions in the muscular fibber; though this improves pork quality, it is done with high expenses of energy, resulting in inefficient exploitation on private family farms that in most cases only supply for their families and rarely sell extra production.

  1. Neanderthal exploitation of ibex and chamois in southwestern Europe.

    Science.gov (United States)

    Yravedra, José; Cobo-Sánchez, Lucía

    2015-01-01

    There is increasing evidence that Neanderthals had a diverse and flexible diet. They exploited a wide range of resources from large proboscideans to small animals like turtles, rabbits, and marine species. Here, we discuss the importance of ibex and chamois in Neanderthal hunting strategies. The exploitation of both animals has traditionally been regarded as typical of Homo sapiens hunting behavior but was not a feature of Neanderthal behavior, which was thought to have focused on other kinds of game like deer, horses or large bovids. Our analysis of an extensive sample of Middle Paleolithic sites with faunal remains in the Iberian Peninsula reveals that Iberian ibex and chamois were frequently present throughout this period. Statistical analyses allowed us to assess the conditions that might have favored the presence or absence of these animals in the sites, while the taphonomic analyses enabled us to address the issue of whether ibex and chamois were indeed hunted by Neanderthals in the Iberian Peninsula. Our results indicate a better representation of both species in rocky and mountainous areas. The taphonomy of some sites reveals that chamois and ibex were hunted by Neanderthals, who showed great adaptive capacities to a wide variety of environments, including mountainous habitats. In contrast, other sites with favorable ecological conditions for ibex and chamois where these animals were not exploited by Neanderthals, who chose to hunt other species like deer, horses or aurochs, suggest behavioral complexity and large versatility. PMID:25481629

  2. Distinct Urban Mines: Exploiting secondary resources in unique anthropogenic spaces.

    Science.gov (United States)

    Ongondo, F O; Williams, I D; Whitlock, G

    2015-11-01

    Fear of scarcity of resources highlight the need to exploit secondary materials from urban mines in the anthroposphere. Analogous to primary mines rich in one type of material (e.g. copper, gold, etc.), some urban mines are unique/distinct. We introduce, illustrate and discuss the concept of Distinct Urban Mines (DUM). Using the example of a university DUM in the UK, analogous to a primary mine, we illustrate potential product/material yields in respect of size, concentration and spatial location of the mine. Product ownership and replacement cycles for 17 high-value electrical and electronic equipment (EEE) among students showed that 20 tonnes of valuable e-waste were in stockpile in this DUM and a further 87 tonnes would 'soon' be available for exploitation. We address the opportunities and challenges of exploiting DUMs and conclude that they are readily available reservoirs for resource recovery. Two original contributions arise from this work: (i) a novel approach to urban mining with a potential for maximising resource recovery within the anthroposphere is conceptualised; and (ii) previously unavailable data for high-value products for a typical university DUM are presented and analysed. PMID:26066575

  3. High Blood Pressure (Hypertension)

    Science.gov (United States)

    ... Radiation-Emitting Products Vaccines, Blood & Biologics Animal & Veterinary Cosmetics Tobacco Products For Consumers Home For Consumers Consumer Information by Audience For Women High Blood Pressure (Hypertension) Share Tweet Linkedin Pin ...

  4. High blood pressure medications

    Science.gov (United States)

    ... this page: //medlineplus.gov/ency/article/007484.htm High blood pressure medicines To use the sharing features on this page, please enable JavaScript. Treating high blood pressure will help prevent problems such as heart disease, ...

  5. Blood Clotting and Pregnancy

    Medline Plus

    Full Text Available ... predisposition to blood clots Obesity Prolonged immobility (e.g., bedrest, long distance travel) Multiple births Increased maternal age Other medical illness (e.g., cancer, infection) back to top How are Blood ...

  6. Blood Clotting and Pregnancy

    Medline Plus

    Full Text Available ... in the field Hematology 2015 A collection of articles from the 2015 ASH Annual Meeting Education Program Blood: How I Treat A compendium of Blood articles updated to reflect the most recent scientific research ...

  7. Blood Donation Process

    Science.gov (United States)

    ... Home > Donating Blood > Donation Process Printable Version Donation Process View Video Getting Ready for Your Donation The ... worry about. Make a Donation Appointment The Donation Process Step by Step Donating blood is a simple ...

  8. Hyperglycemia (High Blood Glucose)

    Medline Plus

    Full Text Available ... Overweight Smoking High Blood Pressure Physical Activity High Blood Glucose My Health Advisor Tools To Know Your Risk Alert Day Diabetes Basics Home Symptoms Diagnosis America's Diabetes Challenge Type 1 Type 2 Facts About Type 2 Enroll ...

  9. Blood Clotting and Pregnancy

    Medline Plus

    Full Text Available ... Current Issue First Edition Abstracts Blood Advances A peer-reviewed, online only, open access journal with a ... If you find that you are interested in learning more about blood diseases and disorders, here are ...

  10. Blood Pressure Medicines

    Science.gov (United States)

    High blood pressure, also called hypertension, usually has no symptoms. But it can cause serious problems such as stroke, heart ... kidney failure. If you cannot control your high blood pressure through lifestyle changes such as losing weight and ...

  11. Blood Clotting and Pregnancy

    Medline Plus

    Full Text Available ... ASH Apps Share Your Idea Donate My Account Search Show Main Menu + About Awards Membership ASH Foundation ... help: Results of Clinical Studies Published in Blood Search Blood , the official journal of ASH, for the ...

  12. Hyperglycemia (High Blood Glucose)

    Medline Plus

    Full Text Available ... and eAG Hypoglycemia (Low blood glucose) Hyperglycemia (High blood glucose) Dawn Phenomenon Checking for Ketones Tight Diabetes Control donate en -- Diabetes Must Be Stopped - 2016-06-donation- ...

  13. Genetics Blood Card Use

    Data.gov (United States)

    US Fish and Wildlife Service, Department of the Interior — SOP guiding collection of blood for genetics analysis. Provides stepwise instructions and guidance on how to collect DNA sample using a whole blood blot card

  14. Blood Clotting and Pregnancy

    Medline Plus

    Full Text Available ... San Diego, CA Abstracts Registration Housing Travel Information Government Concierge View all meetings Publications Blood Current Issue ... clot. Blood clots in pregnant women tend to form in the deep veins of the legs or ...

  15. Blood Sugar and Fats

    Science.gov (United States)

    ... hyperglycemia) can be a sign of the disease diabetes mellitus. High blood sugar levels can eventually damage ... treated with the same medications used to treat diabetes. There is no simple blood test for insulin ...

  16. America's Blood Centers

    Science.gov (United States)

    ... or less. Please donate now! Full Stoplight Report America's Blood Centers is... FEATURED TODAY Support the Foundation ... purchase will be donated to the Foundation for America's Blood Centers! Simply Click Here! "We Are" This ...

  17. Blood Clotting and Pregnancy

    Medline Plus

    Full Text Available ... blood clots A genetic predisposition to blood clots Obesity Prolonged immobility (e.g., bedrest, long distance travel) ... Programs and Awards ASH Agenda for Hematology Research Education For Clinicians For Trainees For Educators For Patients ...

  18. Hypertension (High Blood Pressure)

    Science.gov (United States)

    ... blood pressure with the development of a practical method to measure it. Physicians began to note associations between hypertension and risk of heart failure, stroke, and kidney failure. Although scientists had yet to prove that lowering blood pressure ...

  19. Hyperglycemia (High Blood Glucose)

    Medline Plus

    Full Text Available ... Risk Healthy Eating Overweight Smoking High Blood Pressure Physical Activity High Blood Glucose My Health Advisor Tools To ... Index Low-Calorie Sweeteners Sugar and Desserts Fitness Exercise & Type 1 Diabetes Get Started Safely Get And ...

  20. Blood Clotting and Pregnancy

    Medline Plus

    Full Text Available ... harming your baby. Jump To: Am I at Risk? The risk of developing a blood clot during pregnancy is ... prevent blood clots during pregnancy: Be aware of risk factors. Know your family history. Make sure your ...

  1. Symptoms of Blood Disorders

    Science.gov (United States)

    ... 2 Diabetes, Heart Disease a Dangerous Combo Are 'Workaholics' Prone to OCD, Anxiety? ALL NEWS > Resources First ... Blood Disorders Bone Marrow Examination Blood disorders can cause various symptoms in almost any area of the ...

  2. Blood Clotting and Pregnancy

    Medline Plus

    Full Text Available ... Advances A peer-reviewed, online only, open access journal with a unique focus on scholarly and educational ... Studies Published in Blood Search Blood , the official journal of ASH, for the results of the latest ...

  3. Blood Clotting and Pregnancy

    Medline Plus

    Full Text Available ... Hematologist Clinical Trials Talking with Your Doctor Patient Group Links Advocacy Toolkit Home For Patients Blood Disorders ... a request to the Blood Publishing Office . Patient Groups A list of Web links to patient groups ...

  4. Blood Culture Test

    Science.gov (United States)

    ... difficult to grow in culture, and additional blood cultures using special nutrient media may be done to try to grow and identify the pathogen . Viruses cannot be detected using blood culture bottles designed to grow bacteria. If the health ...

  5. National Blood Clot Alliance

    Science.gov (United States)

    ... Navigation Home About Us Mission & Vision Board of Directors and Officers Medical & Scientific Advisory Board (MASAB) NBCA Operations Programs & Services About Clots Know Your Risk for Blood Clots Signs and Symptoms of Blood ...

  6. Home blood sugar testing

    Science.gov (United States)

    Check your blood sugar level as often as instructed by your health care provider. Write down the results. This will tell you how ... everyone with diabetes needs to check their blood sugar every day. Some people need to check it ...

  7. Ferritin blood test

    Science.gov (United States)

    Serum ferritin level ... The amount of ferritin in the blood (serum ferritin level) is directly related to the amount of iron stored in your body. Iron is important for red blood cell production. Your doctor ...

  8. Blood Clotting and Pregnancy

    Medline Plus

    Full Text Available ... Blood: How I Treat A compendium of Blood articles that have been updated to reflect the most ... Sixth Edition Hematology 2015 A collection of review articles from the Education Program at the 2015 ASH ...

  9. Anthrax - blood test

    Science.gov (United States)

    ... The best test for diagnosing anthrax is a culture of affected tissue or blood. Alternative Names Anthrax serology test; Antibody test for anthrax; Serologic test for B anthracis Images Blood test Bacillus anthracis References Hall GS, Woods GL. Medical bacteriology. ...

  10. Blood Clotting and Pregnancy

    Medline Plus

    Full Text Available ... pregnancy: Be aware of risk factors. Know your family history. Make sure your doctor knows about any ... blood clots or blood clotting disorders in your family. Remain active, with your doctor's approval. Be aware ...

  11. Blood and Lymph Diseases

    Science.gov (United States)

    ... in direct contact with the external environment, the circulatory system acts as a transport system for these cells. Two distinct fluids move through the circulatory system: blood and lymph. Blood carries oxygen and nutrients ...

  12. Hyperglycemia (High Blood Glucose)

    Medline Plus

    Full Text Available ... Health Step On Up Treatment & Care Blood Glucose Testing Medication Doctors, Nurses & More Oral Health & Hygiene Women ... Living With Diabetes > Treatment and Care > Blood Glucose Testing Share: Print Page Text Size: A A A ...

  13. Blood Clotting and Pregnancy

    Medline Plus

    Full Text Available ... Patients Resources for Industry Professionals View all Guidelines & Quality Care Resources to help practitioners improve patient care ... Concierge View all meetings Publications Blood Current Issue First Edition Abstracts Blood: How I Treat A compendium ...

  14. Blood groups systems

    OpenAIRE

    Ranadhir Mitra; Nitasha Mishra; Girija Prasad Rath

    2014-01-01

    International Society of Blood Transfusion has recently recognized 33 blood group systems. Apart from ABO and Rhesus system, many other types of antigens have been noticed on the red cell membranes. Blood grouping and cross-matching is one of the few important tests that the anaesthesiologist orders during perioperative period. Hence, a proper understanding of the blood group system, their clinical significance, typing and cross-matching tests, and current perspective are of paramount importa...

  15. Blood Donation Management System

    OpenAIRE

    K M Akkas Ali; Israt Jahan; Md. Ariful Islam; Md. Shafa-at Parvez

    2015-01-01

    This paper is focused on Blood Donation Management System which is a web application with supporting mobile application aimed to serve as a communication tool between patients (who need blood) and blood donor. To become members of the system, donors need to create their profiles by providing fundamental information like name, blood group, email address, password, and exact location from “Google Map”. In order to find out the exact location of a donor, Google Map is integrated with this app...

  16. Exploitative and hierarchical antagonism in a cooperative bacterium.

    Directory of Open Access Journals (Sweden)

    2005-11-01

    Full Text Available Social organisms that cooperate with some members of their own species, such as close relatives, may fail to cooperate with other genotypes of the same species. Such noncooperation may take the form of outright antagonism or social exploitation. Myxococcus xanthus is a highly social prokaryote that cooperatively develops into spore-bearing, multicellular fruiting bodies in response to starvation. Here we have characterized the nature of social interactions among nine developmentally proficient strains of M. xanthus isolated from spatially distant locations. Strains were competed against one another in all possible pairwise combinations during starvation-induced development. In most pairings, at least one competitor exhibited strong antagonism toward its partner and a majority of mixes showed bidirectional antagonism that decreased total spore production, even to the point of driving whole populations to extinction. Differential response to mixing was the primary determinant of competitive superiority rather than the sporulation efficiencies of unmixed populations. In some competitive pairings, the dominant partner sporulated more efficiently in mixed populations than in clonal isolation. This finding represents a novel form of exploitation in bacteria carried out by socially competent genotypes and is the first documentation of social exploitation among natural bacterial isolates. Patterns of antagonistic superiority among these strains form a highly linear dominance hierarchy. At least some competition pairs construct chimeric, rather than segregated, fruiting bodies. The cooperative prokaryote M. xanthus has diverged into a large number of distinct social types that cooperate with clone-mates but exhibit intense antagonism toward distinct social types of the same species. Most lengthy migration events in nature may thus result in strong antagonism between migratory and resident populations, and this antagonism may have large effects on local

  17. Monitor blood glucose - slideshow

    Science.gov (United States)

    ... medlineplus.gov/ency/presentations/100220.htm Monitoring blood glucose - Series—Monitoring blood glucose: Using a self-test meter To use the ... A.M. Editorial team. Related MedlinePlus Health Topics Blood Sugar A.D.A.M., Inc. is accredited by ...

  18. Blood Test: Glucose

    Science.gov (United States)

    ... Things to Know About Zika & Pregnancy Blood Test: Glucose KidsHealth > For Parents > Blood Test: Glucose Print A A A Text Size What's in ... de sangre: glucosa What It Is A blood glucose test measures the amount of glucose (the main ...

  19. Right patient, Right blood

    DEFF Research Database (Denmark)

    Selberg, Hanne; Madsen, Trine Stougaard

    2014-01-01

    Right patient, Right Blood Simulation based training in blood transfusion practice in nursing education Background: In spite of strict checking procedures to handling transfusion of blood severe adverse reactions are likely to happen and the major cause of morbidity occurs to be liable to human...

  20. Hyperglycemia (High Blood Glucose)

    Medline Plus

    Full Text Available ... by Mail Close www.diabetes.org > Living With Diabetes > Treatment and Care > Blood Glucose Testing Share: Print Page Text Size: ... and-how-tos, In this section Living With Diabetes Treatment and Care Blood Glucose Testing Checking Your Blood Glucose A1C ...

  1. Hyperglycemia (High Blood Glucose)

    Science.gov (United States)

    ... by Mail Close www.diabetes.org > Living With Diabetes > Treatment and Care > Blood Glucose Testing Share: Print Page Text Size: ... and-how-tos, In this section Living With Diabetes Treatment and Care Blood Glucose Testing Checking Your Blood Glucose A1C ...

  2. Examining blood vessels

    International Nuclear Information System (INIS)

    This patent specification relates to an invention concerned with improvements in or relating to the examination of blood vessels of interest. Particles of dimensions not greater than 8 microns capable of providing detectable signals, are introduced into the blood for examination of a blood vessel. The particles may be sources of radiation, e.g. Ga68. (author)

  3. Hyperglycemia (High Blood Glucose)

    Medline Plus

    Full Text Available ... by Mail Close www.diabetes.org > Living With Diabetes > Treatment and Care > Blood Glucose Testing Share: Print Page ... and-how-tos, In this section Living With Diabetes Treatment and Care Blood Glucose Testing Checking Your Blood ...

  4. Common Ground Station For Imagery Processing And Exploitation

    Science.gov (United States)

    Johnston, Morris V.

    1989-02-01

    The Joint Service Imagery Processing System (JSIPS) provides the services with an imagery receipt, processing, exploitation, and reporting capability that is responsive to the requirements of the tactical commanders. JSIPS combines existing and modified hardware and software with all-source digital imagery processing and exploitationto provide intelligence support that enhances the commander's ability to act within the enemy's decision cycle. JSIPS provides not only Tactical all-source imagery processing but integrates the Tactical, National, Auxiliary and Secondary imagery sources into one resource available to the image analyst for production of the commander's comprehensive report. JSIPS has been designed as a modular architecture which is readily expandable and reconfigurable to meet individual user needs. Pre-planned capabilities along with allocated space has been provided for growth in processing, throughput, and I/O requirements. JSIPS provides interoperability with several other imagery programs such as IDPS, TRAC, SYERS, IITS/FIST, NITF, UPD-8, and ATARS. It provides the ability to add additional imagery programs with little or no changes in the JSIPS design. JSIPS provides a softcopy and hardcopy exploitation capability for all military branches with output to their respective intelligence centers. The JSIPS system design, as shown in figure 1.0-1, has the following segments: Tactical Input Segment (TIS), National Input Segment (NIS), Exploitation Support Segment (ESS), Softcopy Exploitation Segment (SES), Hardcopy Exploitation Segment (HES), Communications Support Segment (CSS), and System Support Segment (SSS). JSIPS consists of standardized modules and segments with the collective capability to receive, process, exploit and disseminate imagery and reports based on multi-source imagery from the Tactical and National inputs. The overall JSIPS System operates in either a shelterized or non-shelterized configuration. Tailored JSIPS Systems are packaged in

  5. What Is a Blood Transfusion?

    Science.gov (United States)

    ... see "What Are the Risks of a Blood Transfusion?" ) Blood bank staff also screen each blood donation to find out whether it's type A, B, AB, or O and whether it's Rh-positive or Rh-negative. Getting a blood type that ... blood for a transfusion, some blood banks remove white blood cells. This ...

  6. Blood Component Therapy

    OpenAIRE

    Kelton, J. G.

    1984-01-01

    Human blood has been transfused for about 60-70 years. Over this time, the practice of blood transfusion has changed dramatically. One major change is the separation of blood into its various components. As a result, the patient can receive only the blood component in which he is deficient. In this way, the risk of side effects—particularly hepatitis—is lessened. This article briefly reviews the various blood products, the indications for their use, and some associated risks. These products i...

  7. BLOOD SERVICE IN FINLAND

    OpenAIRE

    TASHTEMIROV K.K.; LATVALA E.; IMANGAZINOV S.B.

    2016-01-01

    The goal of the post is to summarize the experience of blood service in Finland by the result of the business move and examination of the service activities at the point.The research materials indicate that the blood service in Finland is a non-profit organization and is an independent part of the Finnish Red Cross (FRC). All expenses and development of Blood Service are covered by the sale of blood and blood products and expert services in the Finnish health care system. It is responsible fo...

  8. Blood Donation Management System

    Directory of Open Access Journals (Sweden)

    K M Akkas Ali

    2015-06-01

    Full Text Available This paper is focused on Blood Donation Management System which is a web application with supporting mobile application aimed to serve as a communication tool between patients (who need blood and blood donor. To become members of the system, donors need to create their profiles by providing fundamental information like name, blood group, email address, password, and exact location from “Google Map”. In order to find out the exact location of a donor, Google Map is integrated with this application. The mobile application always updates the location of a donor. As a result, the system can automatically find a registered donor wherever he/she goes. Visitors can search blood donors from the home page by blood group and the place where blood is needed. The system will show the available donors along with their phone number, email address and mailing address through arranging them by nearest place and blood donation expire date. Visitors can send message to all donors through email but a member can send message using email and mobile phone. An appointment will be created only whenever a donor confirms that he/she will donate blood. Then the system will alert the donor before 12 hours of donation. Blood donors can also be searched from the mobile application, but this is only accessible for registered members. The goal of this paper is to reduce the complexity of the system to find blood donors in an emergency situation.

  9. Blood groups systems

    Directory of Open Access Journals (Sweden)

    Ranadhir Mitra

    2014-01-01

    Full Text Available International Society of Blood Transfusion has recently recognized 33 blood group systems. Apart from ABO and Rhesus system, many other types of antigens have been noticed on the red cell membranes. Blood grouping and cross-matching is one of the few important tests that the anaesthesiologist orders during perioperative period. Hence, a proper understanding of the blood group system, their clinical significance, typing and cross-matching tests, and current perspective are of paramount importance to prevent transfusion-related complications. Nonetheless, the knowledge on blood group system is necessary to approach blood group-linked diseases which are still at the stage of research. This review addresses all these aspects of the blood groups system.

  10. Blood groups systems.

    Science.gov (United States)

    Mitra, Ranadhir; Mishra, Nitasha; Rath, Girija Prasad

    2014-09-01

    International Society of Blood Transfusion has recently recognized 33 blood group systems. Apart from ABO and Rhesus system, many other types of antigens have been noticed on the red cell membranes. Blood grouping and cross-matching is one of the few important tests that the anaesthesiologist orders during perioperative period. Hence, a proper understanding of the blood group system, their clinical significance, typing and cross-matching tests, and current perspective are of paramount importance to prevent transfusion-related complications. Nonetheless, the knowledge on blood group system is necessary to approach blood group-linked diseases which are still at the stage of research. This review addresses all these aspects of the blood groups system. PMID:25535412

  11. Monitoring Blood Sugar: The Importance of Checking Blood Sugar Levels

    Science.gov (United States)

    ... 5 Things to Know About Zika & Pregnancy Monitoring Blood Sugar KidsHealth > For Parents > Monitoring Blood Sugar Print ... Other Tests Record Keeping The Importance of Checking Blood Sugar Levels Besides helping to keep blood sugar ...

  12. Human collective intelligence under dual exploration-exploitation dilemmas.

    Directory of Open Access Journals (Sweden)

    Wataru Toyokawa

    Full Text Available The exploration-exploitation dilemma is a recurrent adaptive problem for humans as well as non-human animals. Given a fixed time/energy budget, every individual faces a fundamental trade-off between exploring for better resources and exploiting known resources to optimize overall performance under uncertainty. Colonies of eusocial insects are known to solve this dilemma successfully via evolved coordination mechanisms that function at the collective level. For humans and other non-eusocial species, however, this dilemma operates within individuals as well as between individuals, because group members may be motivated to take excessive advantage of others' exploratory findings through social learning. Thus, even though social learning can reduce collective exploration costs, the emergence of disproportionate "information scroungers" may severely undermine its potential benefits. We investigated experimentally whether social learning opportunities might improve the performance of human participants working on a "multi-armed bandit" problem in groups, where they could learn about each other's past choice behaviors. Results showed that, even though information scroungers emerged frequently in groups, social learning opportunities reduced total group exploration time while increasing harvesting from better options, and consequentially improved collective performance. Surprisingly, enriching social information by allowing participants to observe others' evaluations of chosen options (e.g., Amazon's 5-star rating system in addition to choice-frequency information had a detrimental impact on performance compared to the simpler situation with only the choice-frequency information. These results indicate that humans groups can handle the fundamental "dual exploration-exploitation dilemmas" successfully, and that social learning about simple choice-frequencies can help produce collective intelligence.

  13. Widespread exploitation of the honeybee by early Neolithic farmers.

    Science.gov (United States)

    Roffet-Salque, Mélanie; Regert, Martine; Evershed, Richard P; Outram, Alan K; Cramp, Lucy J E; Decavallas, Orestes; Dunne, Julie; Gerbault, Pascale; Mileto, Simona; Mirabaud, Sigrid; Pääkkönen, Mirva; Smyth, Jessica; Šoberl, Lucija; Whelton, Helen L; Alday-Ruiz, Alfonso; Asplund, Henrik; Bartkowiak, Marta; Bayer-Niemeier, Eva; Belhouchet, Lotfi; Bernardini, Federico; Budja, Mihael; Cooney, Gabriel; Cubas, Miriam; Danaher, Ed M; Diniz, Mariana; Domboróczki, László; Fabbri, Cristina; González-Urquijo, Jesus E; Guilaine, Jean; Hachi, Slimane; Hartwell, Barrie N; Hofmann, Daniela; Hohle, Isabel; Ibáñez, Juan J; Karul, Necmi; Kherbouche, Farid; Kiely, Jacinta; Kotsakis, Kostas; Lueth, Friedrich; Mallory, James P; Manen, Claire; Marciniak, Arkadiusz; Maurice-Chabard, Brigitte; Mc Gonigle, Martin A; Mulazzani, Simone; Özdoğan, Mehmet; Perić, Olga S; Perić, Slaviša R; Petrasch, Jörg; Pétrequin, Anne-Marie; Pétrequin, Pierre; Poensgen, Ulrike; Pollard, C Joshua; Poplin, François; Radi, Giovanna; Stadler, Peter; Stäuble, Harald; Tasić, Nenad; Urem-Kotsou, Dushka; Vuković, Jasna B; Walsh, Fintan; Whittle, Alasdair; Wolfram, Sabine; Zapata-Peña, Lydia; Zoughlami, Jamel

    2015-11-12

    The pressures on honeybee (Apis mellifera) populations, resulting from threats by modern pesticides, parasites, predators and diseases, have raised awareness of the economic importance and critical role this insect plays in agricultural societies across the globe. However, the association of humans with A. mellifera predates post-industrial-revolution agriculture, as evidenced by the widespread presence of ancient Egyptian bee iconography dating to the Old Kingdom (approximately 2400 BC). There are also indications of Stone Age people harvesting bee products; for example, honey hunting is interpreted from rock art in a prehistoric Holocene context and a beeswax find in a pre-agriculturalist site. However, when and where the regular association of A. mellifera with agriculturalists emerged is unknown. One of the major products of A. mellifera is beeswax, which is composed of a complex suite of lipids including n-alkanes, n-alkanoic acids and fatty acyl wax esters. The composition is highly constant as it is determined genetically through the insect's biochemistry. Thus, the chemical 'fingerprint' of beeswax provides a reliable basis for detecting this commodity in organic residues preserved at archaeological sites, which we now use to trace the exploitation by humans of A. mellifera temporally and spatially. Here we present secure identifications of beeswax in lipid residues preserved in pottery vessels of Neolithic Old World farmers. The geographical range of bee product exploitation is traced in Neolithic Europe, the Near East and North Africa, providing the palaeoecological range of honeybees during prehistory. Temporally, we demonstrate that bee products were exploited continuously, and probably extensively in some regions, at least from the seventh millennium cal BC, likely fulfilling a variety of technological and cultural functions. The close association of A. mellifera with Neolithic farming communities dates to the early onset of agriculture and may provide

  14. Enhancing data exploitation through DTN-based data transmission protocols

    Science.gov (United States)

    Daglis, Ioannis A.; Tsaoussidis, Vassilis; Rontogiannis, Athanasios; Balasis, Georgios; Keramitsoglou, Iphigenia; Paronis, Dimitrios; Sykioti, Olga; Tsinganos, Antonios

    2014-05-01

    Data distribution and data access are major issues in space sciences and geosciences as they strongly influence the degree of data exploitation. Processing and analysis of large volumes of Earth observation and space/planetary data face two major impediments: limited access capabilities due to narrow connectivity windows between spacecraft and ground receiving stations and lack of sufficient communication and dissemination mechanisms between space data receiving centres and the end-user community. Real-time data assimilation that would be critical in a number of forecasting capabilities is particularly affected by such limitations. The FP7-Space project "Space-Data Routers" (SDR) has the aim of allowing space agencies, academic institutes and research centres to disseminate/share space data generated by single or multiple missions, in an efficient, secure and automated manner. The approach of SDR relies on space internetworking - and in particular on Delay-Tolerant Networking (DTN), which marks the new era in space communications, unifies space and earth communication infrastructures and delivers a set of tools and protocols for space-data exploitation. The project includes the definition of limitations imposed by typical space mission scenarios in which the National Observatory of Athens is currently involved, including space and planetary exploration, as well as satellite-supported geoscience applications. In this paper, we present the mission scenarios, the SDR-application and the evaluation of the associated impact from the space-data router enhancements. The work leading to this paper has received funding from the European Union's Seventh Framework Programme (FP7-SPACE-2010-1) under grant agreement no. 263330 for the SDR (Space-Data Routers for Exploiting Space Data) collaborative research project. This paper reflects only the authors' views and the Union is not liable for any use that may be made of the information contained therein.

  15. Exploiting the Potential of Data Centers in the Smart Grid

    Science.gov (United States)

    Wang, Xiaoying; Zhang, Yu-An; Liu, Xiaojing; Cao, Tengfei

    As the number of cloud computing data centers grows rapidly in recent years, from the perspective of smart grid, they are really large and noticeable electric load. In this paper, we focus on the important role and the potential of data centers as controllable loads in the smart grid. We reviewed relevant research in the area of letting data centers participate in the ancillary services market and demand response programs of the grid, and further investigate the possibility of exploiting the impact of data center placement on the grid. Various opportunities and challenges are summarized, which could provide more chances for researches to explore this field.

  16. Nonlinear Cherenkov difference-frequency generation exploiting birefringence of KTP

    Energy Technology Data Exchange (ETDEWEB)

    Ni, R.; Du, L.; Wu, Y.; Hu, X. P., E-mail: xphu@nju.edu.cn; Zou, J.; Zhang, Y.; Zhu, S. N. [National Laboratory of Solid State Microstructures and School of Physics, Nanjing University, Nanjing 210093 (China); Sheng, Y. [Laser Physics Center, Research School of Physics and Engineering, Australian National University, Canberra ACT 0200 (Australia); Arie, A. [School of Electrical Engineering, Faculty of Engineering, Tel-Aviv University, Tel-Aviv 69978 (Israel)

    2016-01-18

    In this letter, we demonstrate the realization of nonlinear Cherenkov difference-frequency generation (CDFG) exploiting the birefringence property of KTiOPO{sub 4} (KTP) crystal. The pump and signal waves were set to be along different polarizations, thus the phase-matching requirement of CDFG, which is, the refractive index of the pump wave should be smaller than that of the signal wave, was fulfilled. The radiation angles and the intensity dependence of the CDFG on the pump wave were measured, which agreed well with the theoretical ones.

  17. Cues That Language Users Exploit to Segment Speech

    Institute of Scientific and Technical Information of China (English)

    陈冰茹

    2015-01-01

    <正>The capability to segment words from fluent speech is an important step for learning and acquiring a language(Jusczyk,1999).Therefore,a number of researches and studies have focused on various cues that language learners exploit to locate word boundaries.During the half century,it has been discussed that there are mainly four crucial cues can be used by listeners to segment words in speech.Particularly,they are:(1)Prosody(Echols et al.1997;Jusczyk et al.1996):(2)Statistical and distributional regularities(Brent et al.1996;Saffran et al.1996);(3)Phonotactics(Brent et al.1996;Myers et al.1996);

  18. Labour exploitation of illegal immigrants in the developed north

    OpenAIRE

    Renovčević Anja

    2013-01-01

    The theme of this paper is the exploitation of illegal immigrants working in the developed North, while the main objective is analysis of the relation between illegal migration and market demand for low-cost labor, in the context of globalization, growing inequalities and the new global division of labor. The basic assumption is that the market of so-called developed countries of the North has an internal, self-built need for illegal labor, and that the overall economy in the North larg...

  19. Nonlinear Cherenkov difference-frequency generation exploiting birefringence of KTP

    International Nuclear Information System (INIS)

    In this letter, we demonstrate the realization of nonlinear Cherenkov difference-frequency generation (CDFG) exploiting the birefringence property of KTiOPO4 (KTP) crystal. The pump and signal waves were set to be along different polarizations, thus the phase-matching requirement of CDFG, which is, the refractive index of the pump wave should be smaller than that of the signal wave, was fulfilled. The radiation angles and the intensity dependence of the CDFG on the pump wave were measured, which agreed well with the theoretical ones

  20. VCSELs and silicon light sources exploiting SOI grating mirrors

    DEFF Research Database (Denmark)

    Chung, Il-Sug; Mørk, Jesper

    2012-01-01

    In this talk, novel vertical-cavity laser structure consisting of a dielectric Bragg reflector, a III-V active region, and a high-index-contrast grating made in the Si layer of a silicon-on-insulator (SOI) wafer will be presented. In the Si light source version of this laser structure, the SOI...... Bragg reflector. Numerical simulations show that both the silicon light source and the VCSEL exploiting SOI grating mirrors have superior performances, compared to existing silicon light sources and long wavelength VCSELs. These devices are highly adequate for chip-level optical interconnects as well as...

  1. Cyber-Herding: Exploiting Islamic Extremists Use of the Internet

    OpenAIRE

    Moon, David B.

    2007-01-01

    The internet has many characteristics that support extremists' information operations, such as being able to reach large audiences. Yet the internet also has inherent weaknesses that can be exploited. One of these weaknesses is the ambiguous nature of the net. You trust that when you go to a website that it is legitimate. If it looks professional, you tend to believe that the site is real. However, criminals or terrorists could just as easily be running that website. The same is true when you...

  2. On the Exploitation of Sensitivity Derivatives for Improving Sampling Methods

    Science.gov (United States)

    Cao, Yanzhao; Hussaini, M. Yousuff; Zang, Thomas A.

    2003-01-01

    Many application codes, such as finite-element structural analyses and computational fluid dynamics codes, are capable of producing many sensitivity derivatives at a small fraction of the cost of the underlying analysis. This paper describes a simple variance reduction method that exploits such inexpensive sensitivity derivatives to increase the accuracy of sampling methods. Three examples, including a finite-element structural analysis of an aircraft wing, are provided that illustrate an order of magnitude improvement in accuracy for both Monte Carlo and stratified sampling schemes.

  3. Efficient Depth Map Compression Exploiting Segmented Color Data

    DEFF Research Database (Denmark)

    Milani, Simone; Zanuttigh, Pietro; Zamarin, Marco;

    2011-01-01

    performances is still an open research issue. This paper presents a novel compression scheme that exploits a segmentation of the color data to predict the shape of the different surfaces in the depth map. Then each segment is approximated with a parameterized plane. In case the approximation is sufficiently...... accurate for the target bit rate, the surface coefficients are compressed and transmitted. Otherwise, the region is coded using a standard H.264/AVC Intra coder. Experimental results show that the proposed scheme permits to outperformthe standardH.264/AVC Intra codec on depth data and can be effectively...

  4. The ESA Scientific Exploitation of Operational Missions element, first results

    Science.gov (United States)

    Desnos, Yves-Louis; Regner, Peter; Delwart, Steven; Benveniste, Jerome; Engdahl, Marcus; Mathieu, Pierre-Philippe; Gascon, Ferran; Donlon, Craig; Davidson, Malcolm; Pinnock, Simon; Foumelis, Michael; Ramoino, Fabrizio

    2016-04-01

    SEOM is a program element within the fourth period (2013-2017) of ESA's Earth Observation Envelope Programme (http://seom.esa.int/). The prime objective is to federate, support and expand the international research community that the ERS, ENVISAT and the Envelope programmes have built up over the last 25 years. It aims to further strengthen the leadership of the European Earth Observation research community by enabling them to extensively exploit future European operational EO missions. SEOM will enable the science community to address new scientific research that are opened by free and open access to data from operational EO missions. Based on community-wide recommendations for actions on key research issues, gathered through a series of international thematic workshops and scientific user consultation meetings, a work plan is established and is approved every year by ESA Members States. During 2015 SEOM, Science users consultation workshops have been organized for Sentinel1/3/5P ( Fringe, S3 Symposium and Atmospheric science respectively) , new R&D studies for scientific exploitation of the Sentinels have been launched ( S3 for Science SAR Altimetry and Ocean Color , S2 for Science,) , open-source multi-mission scientific toolboxes have been launched (in particular the SNAP/S1-2-3 Toolbox). In addition two advanced international training courses have been organized in Europe to exploit the new S1-A and S2-A data for Land and Ocean remote sensing (over 120 participants from 25 countries) as well as activities for promoting the first scientific results ( e.g. Chili Earthquake) . In addition the First EO Open Science 2.0 was organised at ESA in October 2015 with 225 participants from 31 countries bringing together young EO scientists and data scientists. During the conference precursor activities in EO Open Science and Innovation were presented, while developing a Roadmap preparing for future ESA scientific exploitation activities. Within the conference, the first

  5. Exploiting Maximum Parallelism in Loop Using Heterogeneous Computing

    Institute of Scientific and Technical Information of China (English)

    ZENG Guosun

    2001-01-01

    In this paper, we present the defini-tion of maximum loop speedup, which is the metricof parallelism hidden in loop body. We also studythe classes of Do-loop and their dependence as wellas the parallelism they contain. How to exploit suchparallelism under heterogeneous computing environ-ment? The paper proposes several approaches, whichare eliminating serial bottleneck by means of heteroge-neous computing, heterogeneous Do-all-loop schedul-ing, heterogeneous Do-a-cross scheduling. We findthat, not only on theoretical analysis but also on ex-perimental results, these schemes acquire better per-formance than in homogeneous computing.

  6. Exploring, exploiting and evolving diversity of aquatic ecosystem models

    DEFF Research Database (Denmark)

    Janssen, Annette B. G.; Arhonditsis, George B.; Beusen, Arthur;

    2015-01-01

    Here, we present a community perspective on how to explore, exploit and evolve the diversity in aquatic ecosystem models. These models play an important role in understanding the functioning of aquatic ecosystems, filling in observation gaps and developing effective strategies for water quality...... by comparing and combining different aspects of existing models. Finally, we discuss how model diversity came about in the past and could evolve in the future. Throughout our study, we use analogies from biodiversity research to analyse and interpret model diversity. We recommend to make models...

  7. Exploitation Strategies in Social Parasites of Fungus Growing Ants

    DEFF Research Database (Denmark)

    Clement, Janni Dolby

    to increase its own fitness. The host will use a sophisticated recognition system in order to accept nestmates and expel intruders from their societies. However this defence barrier can be overcome by parasites. Among the most specialized social parasites are the inquilines that exploit social insect...... colonies. Inquilines are usually close relatives of their host and so share ancestral characteristics (Emery’s rule). They are dependent on being fully integrated into their host’s colony throughout their lives in order to reproduce. Most inquiline ants have completely lost their sterile worker caste...

  8. Use of blood and blood products.

    Science.gov (United States)

    Hunt, E; Wood, B

    1999-11-01

    It is sometimes necessary for the practitioner to transfuse the ruminant with whole blood or plasma. These techniques are often difficult to perform in practice, are time-consuming, expensive, and stressful to the animal. Acute loss of 20% to 25% of the blood volume will result in marked clinical signs of anemia, including tachycardia and maniacal behavior. The PCV is only a useful tool with which to monitor acute blood loss after intravascular equilibration with other fluid compartments has occurred. An acutely developing PCV of 15% or less may require transfusion. Chronic anemia with PCV of 7% to 12% can be tolerated without transfusion if the animal is not stressed and no further decline in erythrocyte mass occurs. Seventy-five percent of transfused bovine erythrocytes are destroyed within 48 hours of transfusion. A transfusion rate of 10 to 20 mL/kg recipient weight is necessary to result in any appreciable increase in PCV. A nonpregnant donor can contribute 10 to 15 mL of blood/kg body weight at 2- to 4-week intervals. Sodium citrate is an effective anticoagulant, but acid citrate dextrose should be used if blood is to be stored for more than a few hours. Blood should not be stored more than 2 weeks prior to administration. Heparin is an unsuitable anticoagulant because the quantity of heparin required for clot-free blood collection will lead to coagulation defects in the recipient. Blood cross-matching is only rarely performed in the ruminant. In field situations, it is advisable to inject 200 mL of donor blood into the adult recipient and wait 10 minutes. If no reaction occurs, the rest of the blood can probably be safely administered as long as volume overload problems do not develop. Adverse reactions are most commonly seen in very young animals or pregnant cattle. Signs of blood or plasma transfusion reaction include hiccoughing, tachycardia, tachypnea, sweating, muscle tremors, pruritus, salivation, cough, dyspnea, fever, lacrimation, hematuria

  9. Amplification of chromosome 2:Lq22.3 harboring trefoil factor family genes in liver fluke related cholangiocarcinoma is associated with poor prognosis

    Institute of Scientific and Technical Information of China (English)

    Kanuengnuch Muenphon; Temduang Limpaiboon; Patcharee Jearanaikoon; Chawalit Pairojkul; Banchob Sripa; Vajarabhongsa Bhudhisawasdi

    2006-01-01

    AIM: To determine allelic imbalance on chromosomal region 21q22-qter including trefoil factor family genes (TFF) in cholangiocarcinoma (CCA) patients and analyze the correlation between allelic imbalances and clinicopathological parameters.METHODS: Quantitative PCR amplification was performed on four microsatellite markers and trefoil factor family genes (TFF1, TFF2, and TFF3) using a standard curve and SYBR Green Ⅰ dye method. The relative copy number was determined by DNA copy number of tested locus to reference locus. The relative copy number was interpreted as deletion or amplification by comparison with normal reference range. Associations between allelic imbalance and clinicopathological parameters of CCA patients were evaluated by x2-tests.Kaplan-Meier method was used to analyze survival.RESULTS: The frequencies of amplification at D21S1890,D21S1893, and TFF3 were 32.5%, 30.0%, and 28.7%,respectively. Patients who had amplification at regions covering D21S1893, D21S1890, and TFF showed poor prognosis, whereas patients who had deletion showed favorable prognosis (mean: 51.7 wk vs 124.82 wk,P = 0.012). Multivariate Cox regression analysis revealed that amplification of D21S1893, D21S1890 and TFF,blood vessel invasion, and staging were associated with poor prognosis.CONCLUSION: D21S1893-D21S1890 region may harbor candidate genes especially TFF and serine protease family, which might be involved in tumor invasion and metastasis contributing to poor survival. The amplification in this region may be used as a prognostic marker in the treatment of CCA patients.

  10. What Causes High Blood Pressure?

    Science.gov (United States)

    ... whether imbalances in this system cause high blood pressure. Blood Vessel Structure and Function Changes in the structure ... can affect blood pressure. Genetic Causes of High Blood Pressure Much of the understanding of the body systems ...

  11. Controlling your high blood pressure

    Science.gov (United States)

    ... that is healthy for you. Checking Your Blood Pressure Your blood pressure can be measured at many places, including: ... Alternative Names Controlling hypertension Images Taking your blood pressure at home Blood pressure check Low sodium diet References American Diabetes ...

  12. What Is High Blood Pressure?

    Science.gov (United States)

    ... also known as blood vessels and capillaries. The pressure --- blood pressure --- is the result of two forces. The ... was last reviewed on 08/04/2014. High Blood Pressure • Home • About High Blood Pressure (HBP) Introduction What ...

  13. High Blood Pressure Fact Sheet

    Science.gov (United States)

    ... much alcohol. Signs and Symptoms of High Blood Pressure High blood pressure usually has no warning signs or symptoms , ... they are at high risk for high blood pressure . Blood Pressure Levels Normal systolic: less than 120 mmHg ...

  14. Exploitation of Clustering Techniques in Transactional Healthcare Data

    Directory of Open Access Journals (Sweden)

    Naeem Ahmad Mahoto

    2014-03-01

    Full Text Available Healthcare service centres equipped with electronic health systems have improved their resources as well as treatment processes. The dynamic nature of healthcare data of each individual makes it complex and difficult for physicians to manually mediate them; therefore, automatic techniques are essential to manage the quality and standardization of treatment procedures. Exploratory data analysis, patternanalysis and grouping of data is managed using clustering techniques, which work as an unsupervised classification. A number of healthcare applications are developed that use several data mining techniques for classification, clustering and extracting useful information from healthcare data. The challenging issue in this domain is to select adequate data mining algorithm for optimal results. This paper exploits three different clustering algorithms: DBSCAN (Density-Based Clustering, agglomerative hierarchical and k-means in real transactional healthcare data of diabetic patients (taken as case study to analyse their performance in large and dispersed healthcare data. The best solution of cluster sets among the exploited algorithms is evaluated using clustering quality indexes and is selected to identify the possible subgroups of patients having similar treatment patterns

  15. Exploiting GPUs in Virtual Machine for BioCloud

    Directory of Open Access Journals (Sweden)

    Heeseung Jo

    2013-01-01

    Full Text Available Recently, biological applications start to be reimplemented into the applications which exploit many cores of GPUs for better computation performance. Therefore, by providing virtualized GPUs to VMs in cloud computing environment, many biological applications will willingly move into cloud environment to enhance their computation performance and utilize infinite cloud computing resource while reducing expenses for computations. In this paper, we propose a BioCloud system architecture that enables VMs to use GPUs in cloud environment. Because much of the previous research has focused on the sharing mechanism of GPUs among VMs, they cannot achieve enough performance for biological applications of which computation throughput is more crucial rather than sharing. The proposed system exploits the pass-through mode of PCI express (PCI-E channel. By making each VM be able to access underlying GPUs directly, applications can show almost the same performance as when those are in native environment. In addition, our scheme multiplexes GPUs by using hot plug-in/out device features of PCI-E channel. By adding or removing GPUs in each VM in on-demand manner, VMs in the same physical host can time-share their GPUs. We implemented the proposed system using the Xen VMM and NVIDIA GPUs and showed that our prototype is highly effective for biological GPU applications in cloud environment.

  16. Noise-exploitation and adaptation in neuromorphic sensors

    Science.gov (United States)

    Hindo, Thamira; Chakrabartty, Shantanu

    2012-04-01

    Even though current micro-nano fabrication technology has reached integration levels where ultra-sensitive sensors can be fabricated, the sensing performance (resolution per joule) of synthetic systems are still orders of magnitude inferior to those observed in neurobiology. For example, the filiform hairs in crickets operate at fundamental limits of noise; auditory sensors in a parasitoid fly can overcome fundamental limitations to precisely localize ultra-faint acoustic signatures. Even though many of these biological marvels have served as inspiration for different types of neuromorphic sensors, the main focus these designs have been to faithfully replicate the biological functionalities, without considering the constructive role of "noise". In man-made sensors device and sensor noise are typically considered as a nuisance, where as in neurobiology "noise" has been shown to be a computational aid that enables biology to sense and operate at fundamental limits of energy efficiency and performance. In this paper, we describe some of the important noise-exploitation and adaptation principles observed in neurobiology and how they can be systematically used for designing neuromorphic sensors. Our focus will be on two types of noise-exploitation principles, namely, (a) stochastic resonance; and (b) noise-shaping, which are unified within our previously reported framework called Σ▵ learning. As a case-study, we describe the application of Σ▵ learning for the design of a miniature acoustic source localizer whose performance matches that of its biological counterpart(Ormia Ochracea).

  17. Are shale gas exploitation and water resources security compatible?

    International Nuclear Information System (INIS)

    Shale gas- or more precisely gas from source rock- is a potential resource, diffused and largely distributed. The exploitation of non-conventional hydrocarbons raises issues even if most techniques are well known and properly controlled: drilling, casing cementing, the development of natural rock discontinuities for gas or oil production. The most worrying repercussions will be on the surface: multiple boreholes, usage conflicts, linear production infrastructures, access paths and safety of aging constructions. The potential impacts on groundwater at the depth it is traditionally exploited are more indirect than direct. The impacts in depth will be presumably less threatening due to a lack of elements at stake. The cost of projects at such a depth will impose to combine exploration and experimentation in real size. The potential resource is only known through the American administration's indirect and approximate assessment: France would appear to be the second country (after Poland) with the largest quantity in Europe. France must engage in producing its own assessment. The 'code for mines' yet referred to is no more adapted for non-conventional resources, thus minimizing the WFD objectives, the French law on water and the code for the environment, without involving the stake holders. Recently, the administration decided to ban the hydraulic fracturing technique, though in practice since a long time, thus penalizing a professional branch. Policies, regulation, communication, decision process, validation of techniques and security checks on works should be improved. (author)

  18. Infomax Strategies for an Optimal Balance Between Exploration and Exploitation

    Science.gov (United States)

    Reddy, Gautam; Celani, Antonio; Vergassola, Massimo

    2016-06-01

    Proper balance between exploitation and exploration is what makes good decisions that achieve high reward, like payoff or evolutionary fitness. The Infomax principle postulates that maximization of information directs the function of diverse systems, from living systems to artificial neural networks. While specific applications turn out to be successful, the validity of information as a proxy for reward remains unclear. Here, we consider the multi-armed bandit decision problem, which features arms (slot-machines) of unknown probabilities of success and a player trying to maximize cumulative payoff by choosing the sequence of arms to play. We show that an Infomax strategy (Info-p) which optimally gathers information on the highest probability of success among the arms, saturates known optimal bounds and compares favorably to existing policies. Conversely, gathering information on the identity of the best arm in the bandit leads to a strategy that is vastly suboptimal in terms of payoff. The nature of the quantity selected for Infomax acquisition is then crucial for effective tradeoffs between exploration and exploitation.

  19. JPEG2000-coded image error concealment exploiting convex sets projections.

    Science.gov (United States)

    Atzori, Luigi; Ginesu, Giaime; Raccis, Alessio

    2005-04-01

    Transmission errors in JPEG2000 can be grouped into three main classes, depending on the affected area: LL, high frequencies at the lower decomposition levels, and high frequencies at the higher decomposition levels. The first type of errors are the most annoying but can be concealed exploiting the signal spatial correlation like in a number of techniques proposed in the past; the second are less annoying but more difficult to address; the latter are often imperceptible. In this paper, we address the problem of concealing the second class or errors when high bit-planes are damaged by proposing a new approach based on the theory of projections onto convex sets. Accordingly, the error effects are masked by iteratively applying two procedures: low-pass (LP) filtering in the spatial domain and restoration of the uncorrupted wavelet coefficients in the transform domain. It has been observed that a uniform LP filtering brought to some undesired side effects that negatively compensated the advantages. This problem has been overcome by applying an adaptive solution, which exploits an edge map to choose the optimal filter mask size. Simulation results demonstrated the efficiency of the proposed approach. PMID:15825483

  20. A case study of exploiting enterprise resource planning requirements

    Science.gov (United States)

    Niu, Nan; Jin, Mingzhou; Cheng, Jing-Ru C.

    2011-05-01

    The requirements engineering (RE) processes have become a key to conceptualising corporate-wide integrated solutions based on packaged enterprise resource planning (ERP) software. The RE literature has mainly focused on procuring the most suitable ERP package. Little is known about how an organisation exploits the chosen ERP RE model to frame the business application development. This article reports an exploratory case study of a key tenet of ERP RE adoption, namely that aligning business applications to the packaged RE model leads to integral practices and economic development. The case study analysed a series interrelated pilot projects developed for a business division of a large IT manufacturing and service company, using Oracle's appl1ication implementation method (AIM). The study indicated that AIM RE improved team collaboration and project management experience, but needed to make hidden assumptions explicit to support data visibility and integrity. Our study can direct researchers towards rigorous empirical evaluations of ERP RE adoption, collect experiences and lessons learned for practitioners, and help generate more effective and mature processes when exploiting ERP RE methods.

  1. Characterization of CRISPR RNA transcription by exploiting stranded metatranscriptomic data.

    Science.gov (United States)

    Ye, Yuzhen; Zhang, Quan

    2016-07-01

    CRISPR-Cas systems are bacterial adaptive immune systems, each typically composed of a locus of cas genes and a CRISPR array of spacers flanked by repeats. Processed transcripts of CRISPR arrays (crRNAs) play important roles in the interference process mediated by these systems, guiding targeted immunity. Here we developed computational approaches that allow us to characterize the expression of many CRISPRs in their natural environments, using community RNA-seq (metatranscriptomic) data. By exploiting public human gut metatranscriptomic data sets, we studied the expression of 56 repeat-sequence types of CRISPRs, revealing that most CRISPRs are transcribed in one direction (producing crRNAs). In rarer cases, including a type II system associated with Bacteroides fragilis, CRISPRs are transcribed in both directions. Type III CRISPR-Cas systems were found in the microbiomes, but metatranscriptomic reads were barely found for their CRISPRs. We observed individual-level variation of the crRNA transcription, and an even greater transcription of a CRISPR from the antisense strand than the crRNA strand in one sample. The orientations of CRISPR expression implicated by metatranscriptomic data are largely in agreement with prior predictions for CRISPRs, with exceptions. Our study shows the promise of exploiting community RNA-seq data for investigating the transcription of CRISPR-Cas systems. PMID:27190232

  2. Infomax Strategies for an Optimal Balance Between Exploration and Exploitation

    Science.gov (United States)

    Reddy, Gautam; Celani, Antonio; Vergassola, Massimo

    2016-04-01

    Proper balance between exploitation and exploration is what makes good decisions that achieve high reward, like payoff or evolutionary fitness. The Infomax principle postulates that maximization of information directs the function of diverse systems, from living systems to artificial neural networks. While specific applications turn out to be successful, the validity of information as a proxy for reward remains unclear. Here, we consider the multi-armed bandit decision problem, which features arms (slot-machines) of unknown probabilities of success and a player trying to maximize cumulative payoff by choosing the sequence of arms to play. We show that an Infomax strategy (Info-p) which optimally gathers information on the highest probability of success among the arms, saturates known optimal bounds and compares favorably to existing policies. Conversely, gathering information on the identity of the best arm in the bandit leads to a strategy that is vastly suboptimal in terms of payoff. The nature of the quantity selected for Infomax acquisition is then crucial for effective tradeoffs between exploration and exploitation.

  3. Human trafficking for labour exploitation: Interpreting the crime

    Directory of Open Access Journals (Sweden)

    Jill E.B. Coster van Voorhout

    2007-12-01

    Full Text Available The definition of human trafficking for labour exploitation, as follows from the European Council Framework Decision, proves to be unclear. Literal interpretation does not suffice, because it does not clarify all elements of what is deemed to be criminal behaviour, and hermeneutical interpretation also falls short discouraging the aim of this legislation, namely harmonisation. Hence, another solution is required. This article does so by firstly challenging assumptions about human trafficking for labour exploitation that are generally pertinent, but nonetheless untrue. This accurate appraisal of the crime’s nature is followed by a synopsis of national legislation and adjudication in three Member States, so as to also focus on these actualities regarding the crime that are commonly not conceived. This article examines two countries that have implemented the Framework Decision, namely Belgium and the Netherlands, and one that has not yet done so, the United Kingdom. Thereafter remaining unexplained elements of the Framework Decision’s definition are interpreted with use of international, pan-European and European legislation and adjudication. Based upon all this, a suggested interpretation of the Framework Decision’s definition is provided so as to overcome all identified difficulties with it.

  4. Exploiting first-class arrays in Fortran for accelerator programming

    International Nuclear Information System (INIS)

    Emerging architectures for high performance computing often are well suited to a data parallel programming model. This paper presents a simple programming methodology based on existing languages and compiler tools that allows programmers to take advantage of these systems. We will work with the array features of Fortran 90 to show how this infrequently exploited, standardized language feature is easily transformed to lower level accelerator code. Our transformations are based on a mapping from Fortran 90 to C++ code with OpenCL extensions. The sheer complexity of programming for clusters of many or multi-core processors with tens of millions threads of execution make the simplicity of the data parallel model attractive. Furthermore, the increasing complexity of todays applications (especially when convolved with the increasing complexity of the hardware) and the need for portability across hardware architectures make a higher-level and simpler programming model like data parallel attractive. The goal of this work has been to exploit source-to-source transformations that allow programmers to develop and maintain programs at a high-level of abstraction, without coding to a specific hardware architecture. Furthermore these transformations allow multiple hardware architectures to be targeted without changing the high-level source. It also removes the necessity for application programmers to understand details of the accelerator architecture or to know OpenCL.

  5. Exploiting SCADA vulnerabilities using a Human Interface Device

    Directory of Open Access Journals (Sweden)

    Grigoris Tzokatziou

    2015-07-01

    Full Text Available SCADA (Supervisory Control and Data Acquisition systems are used to control and monitor critical national infras-tructure functions like electricity, gas, water and railways. Field devices such as PLC’s (Programmable Logic Controllers are one of the most critical components of a control system. Cyber-attacks usually target valuable infrastructures assets, taking advantage of architectural/technical vulnerabilities or even weaknesses in the defense systems. Even though novel intrusion detection systems are being implemented and used for defending cyber-attacks, certain vulnerabilities of SCADA systems can still be exploited. In this article we present an attack scenario based on a Human Interface Device (HID device which is used as a means of communication/exploitation tool to compromise SCADA systems. The attack, which is a normal series of commands that are sent from the HID to the PLC cannot be detected through current intrusion detection mechanisms. Finaly we provide possible counter measures and defense mechanisms against this kind of cyber attacks.

  6. Film-induced, steps for a Real Exploitation in Europe

    Directory of Open Access Journals (Sweden)

    Francesco di Cesare

    2015-03-01

    Full Text Available One of the possible ways to enhance Europe visibility, its entirety rather than a set of destinations, is implementing cooperation between the Member States especially in creating and developing trans-border thematic tourist products and experiences. One of them could be the film-induced tourism. In looking back over the past two cycles of European programming it is possible to find some examples, described in the article, in which the theme of audiovisual productions in their shooting phase in European locations has been the subject of EU attention.This article refers to some previous research results reminding how movie-induced tourism seems to be used just through sporadic attempts and therefore not developed and exploited in a strategic way. Whether from demand-side is clear what potential is inherent in the relationship between movie and tourism, on the supply side there is still much to do.As the current EC funding period (2014-2020 is favouring, at least in the first calls for proposal that came out, SMEs projects and being aware of the apparent lack of such activities developed by private businesses, the article explores new opportunities to be gathered suggesting a new exploitation path.

  7. Coordinating Exploration and Exploitation To Construct Genetic Algorithms

    Institute of Scientific and Technical Information of China (English)

    江瑞; 罗予频; 胡东成; 司徒国业

    2002-01-01

    A new genetic algorithm is proposed based on the careful coordination of the exploration in the solution space of the given problem and the exploitation of the information from the previous search. In the new algorithm architecture, the population in each generation consists of three sub-populations: a preserved part, a reproduced part, and a randomized part. Two parameters are incorporated into the algorithm to efficiently control the percentage of each sub-population to achieve good balance between the exploration and exploitation processes during the optimization. By modeling the algorithm as a homogeneous finite Markov chain, the new genetic algorithm is shown to converge towards the global optimum of the problem at hand. Experiments were designed to test the algorithm using the Rastrigin function, the Griewangk function, and the Schaffer function. Data analyses using the average success ratio, the average objective calculating number, the average first passage time to solution, and the standard deviation of the first passage time were compared with those of the canonical genetic algorithm, the elitist genetic algorithm, and the steady genetic algorithm. The results show strong evidence that our algorithm is superior in performance in terms of economy, robustness and efficiency.

  8. Activity-based exploitation of Full Motion Video (FMV)

    Science.gov (United States)

    Kant, Shashi

    2012-06-01

    Video has been a game-changer in how US forces are able to find, track and defeat its adversaries. With millions of minutes of video being generated from an increasing number of sensor platforms, the DOD has stated that the rapid increase in video is overwhelming their analysts. The manpower required to view and garner useable information from the flood of video is unaffordable, especially in light of current fiscal restraints. "Search" within full-motion video has traditionally relied on human tagging of content, and video metadata, to provision filtering and locate segments of interest, in the context of analyst query. Our approach utilizes a novel machine-vision based approach to index FMV, using object recognition & tracking, events and activities detection. This approach enables FMV exploitation in real-time, as well as a forensic look-back within archives. This approach can help get the most information out of video sensor collection, help focus the attention of overburdened analysts form connections in activity over time and conserve national fiscal resources in exploiting FMV.

  9. Exploitation of induced 2n-gametes for plant breeding.

    Science.gov (United States)

    Younis, Adnan; Hwang, Yoon-Jung; Lim, Ki-Byung

    2014-02-01

    Unreduced gamete formation derived via abnormal meiotic cell division is an important approach to polyploidy breeding. This process is considered the main driving force in spontaneous polyploids formation in nature, but the potential application of these gametes to plant breeding has not been fully exploited. An effective mechanism for their artificial induction is needed to attain greater genetic variation and enable efficient use of unreduced gametes in breeding programs. Different approaches have been employed for 2n-pollen production including interspecific hybridization, manipulation of environmental factors and treatment with nitrous oxide, trifluralin, colchicine, oryzalin and other chemicals. These chemicals can act as a stimulus to produce viable 2n pollen; however, their exact mode of action, optimum concentration and developmental stages are still not known. Identification of efficient methods of inducing 2n-gamete formation will help increase pollen germination of sterile interspecific hybrids for inter-genomic recombination and introgression breeding to develop new polyploid cultivars and increase heterozygosity among plant populations. Additionally, the application of genomic tools and identification and isolation of genes and mechanisms involved in the induction of 2n-gamete will enable increased exploitation in different plant species, which will open new avenues for plant breeding. PMID:24311154

  10. The control of coal mine gas and coordinated exploitation of coal bed methane in China

    Institute of Scientific and Technical Information of China (English)

    LIU Jian-zhong

    2009-01-01

    Based on the characteristics of the coalfield geology and the distribution of coal bed methane (CBM) in China, the geological conditions for exploiting the CBM and drain-ing the coal mine gas were analyzed, as well as the characteristics of CBM production. By comparing the current situation of CBM exploitation in China with that in the United States, the current technology and characteristics of the CBM exploitation in China were summa-rized and the major technical problems of coal mine gas control and CBM exploitation analyzed. It was emphasized that the CBM exploitation in China should adopt the coal mine gas drainage method coordinated with coal mine exploitation as the main model. It was proposed that coal mine gas control should be coordinated with coal mine gas ex-ploitation. The technical countermeasure should be integrating the exploitation of coal and CBM and draining gas before coal mining.

  11. Potential impact on climate of the exploitation of methane hydrate deposits offshore

    Digital Repository Service at National Institute of Oceanography (India)

    Glasby, G.P.

    of exploiting these deposits offshore on global climate may therefore be limited provided serious efforts are made to minimize environmental impacts. At present, prospects for the commercial exploitation of methane hydrates are in their infancy. Considerable...

  12. Model 1: Blood

    International Nuclear Information System (INIS)

    Because most radiopharmaceuticals are introduced into the body via the vascular system and may remain in the circulation for prolonged periods of time, it is useful to have a model of the blood as an aid in the estimation of radiation dose. It is extremely difficult to devise a precise blood model; the geometry is complex and distribution of blood may vary with position, physiological state and disease process. Estimates of blood volume distribution vary among investigators. Furthermore, the regional hematocrit varies throughout the body, thus affecting distribution of the labeled material according to whether it is attached to cellular elements or in the plasma. The size of the blood pool volumes range from the heart to the capillaries. Variable amounts of non-penetrating radiation contributions to organs depend on the volume of blood in the various sized vessels and the energy of the electrons which may penetrate into tissue from the blood vessel. The present model represents an advance in that it takes into account to some extent the distribution of significant blood pools in the body. Further refinement of the macro-geometry is possible with data which can now be obtained from modern radionuclide imaging equipment. A more difficult problem is definging the micro-geometry relative to the distribution of blood in capillaries and sinusoids, and their relationship to one another

  13. Hyperglycemia (High Blood Glucose)

    Medline Plus

    Full Text Available ... Nephropathy) Gastroparesis Mental Health Step On Up Treatment & Care Blood Glucose Testing Medication Doctors, Nurses & More Oral Health & Hygiene Women A1C Insulin Pregnancy ...

  14. Hyperglycemia (High Blood Glucose)

    Medline Plus

    Full Text Available ... Disease (Nephropathy) Gastroparesis Mental Health Step On Up Treatment & Care Blood Glucose Testing Medication Doctors, Nurses & More Oral Health & Hygiene Women A1C Insulin ...

  15. The Exploitation of shale gas – A Grave peril for human health and life

    OpenAIRE

    Dumitru Mazilu

    2014-01-01

    In recent years the American example is evoked insistently for the exploitation of shale gas. The main argument for this exploitation is the positive impact of this exploitation for the energy crisis. A movie produced by Americans who are concerned about the serious human consequences of shale gas exploitation, and which was broadcasted by many televisions including Romanian ones – shows terrifying images: „the tap water that was drinkable before drilling for shale gas started to burst into f...

  16. To exploit or not to exploit: The structure and development of arguments over the use of wetlands

    Directory of Open Access Journals (Sweden)

    Tiina Korvela

    2013-07-01

    Full Text Available This paper considers the discourse surrounding the exploitation of wetlands (also called marshlands, bogs, mires and peatlands in Finland. The focus of the paper is on the development of the arguments used in the discourse – thus the paper also gives an insight into how the legal regimes concerning wetlands have developed. The arguments are analysed using the dualistic and deconstructive model developed in Critical Legal Studies by Martti Koskenniemi. The hypothesis is that, to some extent, the model developed for international law can be adapted to fit national laws, but that significant problems may still arise. Throughout the history of discourse on wetlands, legal arguments have essentially dealt with the conflict between the conservation of wetlands or their exploitation for peat, which is a source of energy. Three arguments are discussed in this paper: 1 The ‘sovereignty argument’; 2 The ‘no harm argument’; and 3 The ‘climate change argument’. The sovereignty argument has been dominant from the beginning of the industrialised production of peat, but the no harm argument has been steadily gaining weight. Interestingly, the climate change argument lacks traction in the discourse even though the importance of wetlands in adaptation to climate change is common knowledge. This paper argues that regional and national authorities use legislation and the no harm argument in innovative ways. These innovations may be useful for the aims underlying the climate change argument.

  17. Child Sexual Abuse and Exploitation: Guest Editor’s Introduction

    Directory of Open Access Journals (Sweden)

    Michael Salter

    2015-07-01

    Full Text Available One of the most unnerving aspects of child sexual abuse is that it is constantly manifesting in unexpected ways. The current Royal Commission into Institutional Responses to Child Sexual Abuse has collected testimony of abuse in churches, schools, out-of-home care, hospitals and religious communities, demonstrating the breadth of institutional arrangements whose structures and cultures have facilitated child sexual abuse. Cases of serious and prolonged sexual abuse in family contexts have been excluded from the terms of reference of the Royal Commission but nonetheless continue to surface in media reports. In 2013, twelve children were permanently removed from an extended family living in rural NSW in what has been described as one of the worst cases of child abuse in Australia, involving intergenerational incest going back at least three generations (Auebach 2014. Another recent high-profile case involved the use of the Internet to facilitate the sexual exploitation of an adopted child by his parents in Queensland (Ralston 2013. These cases challenge the received wisdom that child sexual abuse is characterised by the victimisation of one child by one opportunistic offender. Such incidents suggest instead that child sexual abuse takes varied and systemic forms, and can operate to perpetuate and entrench toxic cultures and power structures.   This special issue on Child Sexual Abuse and Exploitation is a timely contribution to ongoing efforts to understand the multiplicity of child sexual abuse. It is an interdisciplinary collection of insights drawn from criminology, sociology, psychiatry, psychology and psychoanalysis, and includes papers from academic researchers alongside academic practitioners whose writing is grounded in their work with affected individuals and communities. A key aim of the special issue is to contextualise the diversity of child sexual abuse socially, politically and historically, recognising the dynamic and iterative

  18. The Illusions and Juxtapositions of Commercial Sexual Exploitation among Youth: Identifying Effective Street-Outreach Strategies

    Science.gov (United States)

    Holger-Ambrose, Beth; Langmade, Cheree; Edinburgh, Laurel D.; Saewyc, Elizabeth

    2013-01-01

    To explore sexually exploited youths' perspectives of how street outreach workers can effectively provide outreach and connections to services, we conducted qualitative interviews with 13 female participants, ages 14 to 22, in a Midwest U.S. city. Participants reported multiple types of exploitation, most first exploited by age 13, plus…

  19. 75 FR 40838 - Establishment of the Advisory Board on Elder Abuse, Neglect, and Exploitation

    Science.gov (United States)

    2010-07-14

    ... HUMAN SERVICES Establishment of the Advisory Board on Elder Abuse, Neglect, and Exploitation AGENCY... Board on Elder Abuse, Neglect, and Exploitation is authorized under section 2021, Subtitle H--Elder... establishment of the Advisory Board on Elder Abuse, Neglect, and Exploitation, as directed by section...

  20. Shale gas, Poland pioneer of exploitation in Europe

    International Nuclear Information System (INIS)

    This article presents an installation built by a Polish company to perform drillings in the search for shale gas pockets from which gas would be extracted by hydraulic fracturing. Some technical characteristics of the installation and process are evoked. The article outlines the confidence the population now has gained in this installation. However and despite the fact that the region possesses important underground water reserves, water consumption is reported to be too high with respect to farmer needs. Besides, some farmers have had a compulsory purchase order made on their land and could afford to buy new lands. However, in some other places, the population did not accept the arrival of the multinational company Chevron. In parallel, a brief overview of shale gas exploitation projects or status in other European countries is given

  1. On the exploitability of thermo-charged capacitors

    CERN Document Server

    D'Abramo, Germano

    2009-01-01

    Recently (arXiv:0904.3188) the concept of vacuum capacitors spontaneously charged thanks to the heat absorbed from single thermal source at room temperature has been introduced, along with a detailed mathematical description of the functioning and a discussion on its main paradoxical feature that seems to violate the Second Law of Thermodynamics. In the present paper we investigate the theoretical and practical possibility of exploiting such thermo-charged capacitors as voltage/current generators: we show that if very weak provisos on the physical characteristics of the capacitors are fulfilled, then a measurable current should flow across the device, allowing the generation of potentially usable voltage, current and electric power out of a single thermal source at room temperature.

  2. How Polyomaviruses Exploit the ERAD Machinery to Cause Infection.

    Science.gov (United States)

    Dupzyk, Allison; Tsai, Billy

    2016-01-01

    To infect cells, polyomavirus (PyV) traffics from the cell surface to the endoplasmic reticulum (ER) where it hijacks elements of the ER-associated degradation (ERAD) machinery to penetrate the ER membrane and reach the cytosol. From the cytosol, the virus transports to the nucleus, enabling transcription and replication of the viral genome that leads to lytic infection or cellular transformation. How PyV exploits the ERAD machinery to cross the ER membrane and access the cytosol, a decisive infection step, remains enigmatic. However, recent studies have slowly unraveled many aspects of this process. These emerging insights should advance our efforts to develop more effective therapies against PyV-induced human diseases. PMID:27589785

  3. Exploiting the Errors: A Simple Approach for Improved Volatility Forecasting

    DEFF Research Database (Denmark)

    Bollerslev, Tim; Patton, Andrew J.; Quaedvlieg, Rogier

    We propose a new family of easy-to-implement realized volatility based forecasting models. The models exploit the asymptotic theory for high-frequency realized volatility estimation to improve the accuracy of the forecasts. By allowing the parameters of the models to vary explicitly with the...... (estimated) degree of measurement error, the models exhibit stronger persistence, and in turn generate more responsive forecasts, when the measurement error is relatively low. Implementing the new class of models for the S&P500 equity index and the individual constituents of the Dow Jones Industrial Average......, we document significant improvements in the accuracy of the resulting forecasts compared to the forecasts from some of the most popular existing models that implicitly ignore the temporal variation in the magnitude of the realized volatility measurement errors....

  4. Exploration and Exploitation of Victorian Science in Darwin's Reading Notebooks

    CERN Document Server

    Murdock, Jaimie; DeDeo, Simon

    2015-01-01

    Search in an environment with an uncertain distribution of resources involves a trade-off between local exploitation and distant exploration. This extends to the problem of information foraging, where a knowledge-seeker shifts between reading in depth and studying new domains. To study this, we examine the reading choices made by one of the most celebrated scientists of the modern era: Charles Darwin. Darwin built his theory of natural selection in part by synthesizing disparate parts of Victorian science. When we analyze his extensively self-documented reading we find shifts, on multiple timescales, between choosing to remain with familiar topics and seeking cognitive surprise in novel fields. On the longest timescales, these shifts correlate with major intellectual epochs of his career, as detected by Bayesian epoch estimation. When we compare Darwin's reading path with publication order of the same texts, we find Darwin more adventurous than the culture as a whole.

  5. Impact of Exploitation System on Commercial Hogs’ Behaviour

    Directory of Open Access Journals (Sweden)

    Ioan Petroman

    2010-10-01

    Full Text Available Rest is the etho-physiological activity with the most prolonged duration within the 24 hours: thus, males rest for about 61-62% of their time while females rest for about 66-68% of their time. Feed consumption in ad libitum feeding conditions lasts differently: thus, castrated males feed for about 16' 23" ± 0.44" while females feed for about 18'46" ± 0.62". Conflicts within the groups take place in 2.30 ± 0.34 sessions for attacks and in 0.45-0.83 session for defence fights. Attack sessions, foraging sessions, defecation sessions, and urinating sessions to differ between castrated males and females exploited in farming systems since neither feeding, nor living conditions are always acceptable and regular.

  6. Exploiting CRISPR/Cas: Interference Mechanisms and Applications

    Directory of Open Access Journals (Sweden)

    André Plagens

    2013-07-01

    Full Text Available The discovery of biological concepts can often provide a framework for the development of novel molecular tools, which can help us to further understand and manipulate life. One recent example is the elucidation of the prokaryotic adaptive immune system, clustered regularly interspaced short palindromic repeats (CRISPR/CRISPR-associated (Cas that protects bacteria and archaea against viruses or conjugative plasmids. The immunity is based on small RNA molecules that are incorporated into versatile multi-domain proteins or protein complexes and specifically target viral nucleic acids via base complementarity. CRISPR/Cas interference machines are utilized to develop novel genome editing tools for different organisms. Here, we will review the latest progress in the elucidation and application of prokaryotic CRISPR/Cas systems and discuss possible future approaches to exploit the potential of these interference machineries.

  7. Exploiting digital systems technology to improve nuclear safety

    International Nuclear Information System (INIS)

    Nuclear plant designers in the 1990's have exceptional opportunities to exploit rapidly evolving computer and information system technology to make significant improvements in public safety. CANDU reactors have utilized extensive computer automation for reactor control for 20 years. A direct consequence is that the frequencies for forced outages and spurious protection system trips have been among the lowest for all reactor types. Historically, CANDU was among the first commercial power reactor to utilize computers to implement protection system. System functions with the PDC's (Programmable Digital Comparators) used in the CANDU 600 reactors. PDC's were used to implement the trip decision logic for the process trip parameters. The paper provides detail on safety benefits that have been realized from the use of digital automation for control and protection. The paper describes how accident risk reduction can be achieved in other ways with digital systems

  8. The strategic and economic value of exploiting heavy crude

    International Nuclear Information System (INIS)

    Non-conventional oil, and particularly heavy crude varieties, will play an increasingly important role in meeting growing global energy requirements by 2030 and beyond. These heavy oils currently account for high volumes in certain areas but their proportion of global oil production remains modest for the moment, This should significantly change with the completion of several projects currently underway in Canada and Venezuela. Indeed, the technological innovations occurring over recent years have allowed for a considerable reduction in exploitation costs for these crude varieties and improved economic profitability conditions for the projects. The geographical location of resources (which are independent of the Middle East) and the fact that they are not subject to OPEC quotas also make these crude varieties particularly attractive. (authors)

  9. Exploiting tumor shrinkage through temporal optimization of radiotherapy

    CERN Document Server

    Unkelbach, Jan; Hong, Theodore; Papp, David; Ramakrishnan, Jagdish; Salari, Ehsan; Wolfgang, John; Bortfeld, Thomas

    2013-01-01

    In multi-stage radiotherapy, a patient is treated in several stages separated by weeks or months. This regimen has been motivated mostly by radiobiological considerations, but also provides an approach to reduce normal tissue dose by exploiting tumor shrinkage. The paper considers the optimal design of multi-stage treatments, motivated by the clinical management of large liver tumors for which normal liver dose constraints prohibit the administration of an ablative radiation dose in a single treatment. We introduce a dynamic tumor model that incorporates three factors: radiation induced cell kill, tumor shrinkage, and tumor cell repopulation. The design of multi-stage radiotherapy is formulated as a mathematical optimization problem in which the total dose to the liver is minimized, subject to delivering the prescribed dose to the tumor. Based on the model, we gain insight into the optimal administration of radiation over time, i.e. the optimal treatment gaps and dose levels. We analyze treatments consisting ...

  10. Safe industrial electron accelerators operation in extended period of exploitation

    International Nuclear Information System (INIS)

    construction. Safe industrial electron accelerators operation in extended period of exploitation became a question due to over 30 years long period in service of some units and second hand accelerators sometime offered on the market. The careful evaluation should be performed to establish critical parameters like: - Accelerator reliability (availability); - Access to the spare parts and cost of accelerator servicing; - Safety interlocks condition and reliability; - Quality of cables, wires and rubber tubes which are irradiated by scattered radiation (in some cases replacement is needed in 10-15 years intervals). One should recognize if second hand accelerator was renovated and it is adequate in spite of: - Lack of computer based accelerator control and technological process management; - Limited quality control capabilities in relation to present industrial standards; - Certain accelerator parameters (electron energy, beam power, electrical efficiency, exploitation cost). Positive answer on above topics may allow on successful accelerator exploitation in extended period of time. Such evaluation should be repeated in 2-5 years period to avoid rapid change in accelerator availability. More conservative direct (transformer) accelerator construction is better suited for longer exploitation period to compare with microwave linacs where microwave components with limited life period are applied. Progress in development of microwave components creates difficulties in access to old fashion spare parts. The accelerator upgrading program can be applied in some cases to increase electron energy, beam power or both, replace certain components when ageing process is particularly intense or replace components which are no more accessible as spare parts. The detail investigation should be made to recognize manpower in development and implementation such upgrading program, time needed and available financial resources. New accelerator purchasing could be better solution in some cases. (author)

  11. Improvong alloys exploitation characteristics under powerful ion beams action

    International Nuclear Information System (INIS)

    Methods of positron annihilation, X-ray diffraction analysis, mass spectroscopy of secondary ions, Auger-electron spectroscopy and metallographic investigations were used to study structures of high-speed R6M5 steel, T14K8 hard alloy and KNT-16, TN-20 tungsten-free alloys, irradiated by heavy-current carbon ion beams. Modified layer of complex structure of 50-100 mm thickness forms on the surface of samples under investigation irradiated by powerful ion beam. All structural changes taking place in the layer result to improvement of alloy exploitation characteristics: 1.5-2 time increase of microhardness and 2.2-3.5 time elevation of resistance to cutting as compared to reference check samples

  12. Commercial Sexual Exploitation of Children and State Child Welfare Systems.

    Science.gov (United States)

    Bounds, Dawn; Julion, Wrenetha A; Delaney, Kathleen R

    2015-01-01

    In several states, commercial sexual exploitation of children (CSEC) is now a reportable child abuse offense. Illinois has taken the lead in tackling the issue and the Illinois experience illuminates valuable lessons. This article delineates the protection, practice, and policy implications that evolve when CSEC falls under a state child welfare system. The specific aims are to (a) discuss CSEC, its victims, risks, harms, and challenges inherent in providing effective care; (b) use Illinois as an exemplar to explicate the consequences and implementation challenges of establishing a state reporting system that frames CSEC as a child welfare issue; (c) recommend strategies for developing effective state reporting models, and (d) demonstrate how nurses are well poised to advocate for victims of human trafficking on both state and national levels. Recommendations for improving the identification of CSEC victims and overcoming challenges to state implementation are offered. PMID:25908664

  13. SMARTS: Exploiting Temporal Locality and Parallelism through Vertical Execution

    International Nuclear Information System (INIS)

    In the solution of large-scale numerical prob- lems, parallel computing is becoming simultaneously more important and more difficult. The complex organization of today's multiprocessors with several memory hierarchies has forced the scientific programmer to make a choice between simple but unscalable code and scalable but extremely com- plex code that does not port to other architectures. This paper describes how the SMARTS runtime system and the POOMA C++ class library for high-performance scientific computing work together to exploit data parallelism in scientific applications while hiding the details of manag- ing parallelism and data locality from the user. We present innovative algorithms, based on the macro -dataflow model, for detecting data parallelism and efficiently executing data- parallel statements on shared-memory multiprocessors. We also desclibe how these algorithms can be implemented on clusters of SMPS

  14. Smart facility application: exploiting space technology for smart city solution

    Science.gov (United States)

    Termizi, A. A. A.; Ahmad, N.; Omar, M. F.; Wahap, N. A.; Zainal, D.; Ismail, N. M.

    2016-06-01

    Facilities and amenities management is amongst the core functionalities of local government. Considering the vast area that local government has to manage, a smart solution is extremely inevitable to solve issues such as inefficient maintenance of public parks, drainage system and so forth. Therefore, this paper aims to offer a smart city solution which exploits the benefit of space technology. This proposed solution is one of the modules developed in Spatial Smart City Service Delivery Engine (SSC SDE) Project undertaken by Agensi Angkasa Negara (ANGKASA). Various levels of local government have been chosen to understand real issues faced by them. Based on this data, a Smart Facility application has been developed with the aim to enhance the service delivery by the local government hence improving citizens’ satisfaction. Since this project is still in progress, this paper will merely discussing the concept of this application.

  15. Groundwater exploration and exploitation of the Caracas aquifer, Venezuela

    International Nuclear Information System (INIS)

    The Caracas valley is bordered by crystalline rocks, and the valley fill (Caracas aquifer) comprises the weathering products of these rocks, such as fluvial gravels and sands, in addition to clay and silts from former lakes. All these sediments intercalate in a very irregular manner. Groundwater recharge below Caracas is pronounced because of significant exfiltrations of drinking water out of the distribution net. This creates an important dilution potential for pollutants and stimulates the development of microbiological activity. These, however, cannot favour groundwater withdrawal from the active recharge zone, because protection measures will be difficult to realize. It is therefore recommended that groundwater exploitation be restricted to the passive recharge zone by wells with filter screens more than 100 m below the surface

  16. Understanding and Exploiting Information Spreading and Integrating Technologies

    Institute of Scientific and Technical Information of China (English)

    Petter Holme; Mikael Huss

    2011-01-01

    Our daily life leaves an increasing amount of digital traces,footprints that are improving our lives.Data-mining tools,like recommender systems,convert these traces to information for aiding decisions in an ever-increasing number of areas in our lives.The feedback loop from what we do,to the information this produces,to decisions what to do next,will likely be an increasingly important factor in human behavior on all levels from individuals to societies.In this essay,we review some effects of this feedback and discuss how to understand and exploit them beyond mapping them on more well-understood phenomena.We take examples from models of spreading phenomena in social media to argue that analogies can be deceptive,instead we need to fresh approaches to the new types of data,something we exemplify with promising applications in medicine.

  17. Apoptosis pathways and their therapeutic exploitation in pancreatic cancer.

    Science.gov (United States)

    Fulda, Simone

    2009-07-01

    Resistance to apoptosis (programmed cell death) is a characteristic feature of human malignancies including pancreatic cancer, which is one of the leading causes of cancer deaths in the western world. Defects in this intrinsic cell death program can contribute to the multistep process of tumorigenesis, because too little cell death can disturb tissue homeostasis. Further, blockade of apoptosis pathways can cause treatment failure, because intact apoptosis signalling cascades largely mediate therapy-induced cytotoxicity. The elucidation of apoptosis pathways in pancreatic carcinoma over the last decade has resulted in the identification of various molecular defects. How apoptosis pathways can be exploited for the treatment of pancreatic cancer will be discussed in this review. PMID:19382915

  18. Host exploitation strategies of the social parasite Maculinea alcon

    DEFF Research Database (Denmark)

    Fürst, Matthias Alois

    . Throughout the first instars M. alcon lives on a specific food plant, however, in the last instar before pupation it develops into an obligate social parasite, posing a considerably cost to its host ant colony. I here focus on the different exploitation strategies of M. alcon throughout its lifecycle and the...... the nest where it will feed on ant regurgitations and ant brood. It is thus crucial for the caterpillar's survival to attract the host ant, get picked up and brought back to the ant's colony. My study shows that 3rd and 4th instar caterpillars are distinct from each other not only morphologically but...... caterpillar constitutes a fitness cost to infected host ant colonies, the host ants are expected to have developed defense mechanisms in response to the presence of the social parasite. I was able to demonstrate that the efficiency of ant colonies to defend themselves against intruders depends on a multitude...

  19. Exploiting the geomagnetic distortion of the inclined atmospheric showers

    CERN Document Server

    Billoir, Pierre; Blanco, Miguel

    2015-01-01

    We propose a novel approach for the determination of the nature of ultra-high energy cosmic rays by exploiting the geomagnetic deviation of muons in nearly horizontal showers. The distribution of the muons at ground level is well described by a simple parametrization providing a few shape parameters tightly correlated to $X^\\mu_\\mathrm{max}$, the depth of maximal muon production, which is a mass indicator tightly correlated to the usual parameter $X_\\mathrm{max}$, the depth of maximal development of the shower. We show that some constraints can be set on the predictions of hadronic models, especially by combining the geomagnetic distortion with standard measurement of the longitudinal profile. We discuss the precision needed to obtain significant results and we propose a schematic layout of a detector.

  20. Autonomous Industrial Mobile Manipulation (AIMM) - Maturation, Exploitation and Implementation

    DEFF Research Database (Denmark)

    Bøgh, Simon

    2012-01-01

    a state-of-the-art review, it is observed that implementations of mobile manipulators in industry have been limited although the needs for flexible automation are present. The second topic is “Identifying skills for AIMM robots” and is dedicated to defining a unifying terminology for task...... for AIMM robots. Firstly an application-based analysis is conducted, to identify skills in the logistic domain, based on real-world experiments at the industrial partner. Secondly an analysis based on standard operating procedures (SOPs) is conducted.......The overall topic of this PhD thesis is Autonomous Industrial Mobile Manipulation (AIMM) - maturation, exploitation and implementation. The thesis addresses two topics. The first topic is “From research to industry” and the challenges this holds. The Autonomous Industrial Mobile Manipulator (AIMM...