WorldWideScience

Sample records for blood fluke exploitation

  1. Parasite-Associated Cancers (Blood Flukes/Liver Flukes).

    Science.gov (United States)

    Feng, Meng; Cheng, Xunjia

    2017-01-01

    Parasitic infection remains as a persistent public health problem and can be carcinogenic. Three helminth parasites, namely, Clonorchis sinensis (liver fluke) and Opisthorchis viverrini as well as Schistosoma haematobium (blood fluke), are classified as Group 1 carcinogens by the World Health Organization's International Agency for Research on Cancer (IARC Infection with liver flukes (Opisthorchis viverrini, Opisthorchis felineus and Clonorchis sinensis), World Health Organization, International Agency for Research on Cancer, 2011). Infection by these parasites is frequently asymptomatic and is thus rarely diagnosed at early exposure. Persistent infection can cause severe cancer complications. Until now, the cellular and molecular mechanisms linking fluke infections to cancer formation have yet to be defined, although many studies have focused on these mechanisms in recent years, and numerous findings were made in various aspects of parasite-associated cancers. Herein, we only introduce the fluke-induced cholangiocarcinoma (CCA) and bladder carcinoma and mainly focus on key findings in the last 5 years.

  2. Prolyl Oligopeptidase from the Blood Fluke Schistosoma mansoni: From Functional Analysis to Anti-schistosomal Inhibitors

    Czech Academy of Sciences Publication Activity Database

    Fajtová, P.; Štefanić, S.; Hradilek, M.; Dvořák, Jan; Vondrášek, J.; Jílková, A.; Ulrychová, L.; McKerrow, J.H.; Caffrey, C.R.; Mareš, M.; Horn, M.

    2015-01-01

    Roč. 9, č. 6 (2015), e0003827 ISSN 1935-2735 Institutional support: RVO:60077344 Keywords : Schistosoma mansoni * schistosomiasis * prolyl oligopeptidase * blood fluke Subject RIV: EB - Genetics ; Molecular Biology Impact factor: 3.948, year: 2015

  3. Prolyl Oligopeptidase from the Blood Fluke Schistosoma mansoni: From Functional Analysis to Anti-schistosomal Inhibitors

    Czech Academy of Sciences Publication Activity Database

    Fajtová, Pavla; Štefanic, S.; Hradilek, Martin; Dvořák, Jan; Vondrášek, Jiří; Jílková, Adéla; Ulrychová, Lenka; McKerrow, J. H.; Caffrey, C. R.; Mareš, Michael; Horn, Martin

    2015-01-01

    Roč. 9, č. 6 (2015), e0003827/1-e0003827/24 ISSN 1935-2735 R&D Projects: GA ČR(CZ) GAP302/11/1481; GA MŠk LO1302 Institutional support: RVO:61388963 ; RVO:68378050 Keywords : Schistosoma mansoni * schistosomiasis * prolyl oligopeptidase * blood fluke Subject RIV: CE - Biochemistry; EB - Genetics ; Molecular Biology (UMG-J) Impact factor: 3.948, year: 2015 http://journals.plos.org/plosntds/article?id=10.1371/journal.pntd.0003827

  4. SmCL3, a gastrodermal cysteine protease of the human blood fluke Schistosoma mansoni.

    Directory of Open Access Journals (Sweden)

    Jan Dvorák

    2009-06-01

    Full Text Available Blood flukes of the genus Schistosoma are platyhelminth parasites that infect 200 million people worldwide. Digestion of nutrients from the host bloodstream is essential for parasite development and reproduction. A network of proteolytic enzymes (proteases facilitates hydrolysis of host hemoglobin and serum proteins.We identified a new cathepsin L termed SmCL3 using PCR strategies based on S. mansoni EST sequence data. An ortholog is present in Schistosoma japonicum. SmCL3 was heterologously expressed as an active enzyme in the yeast, Pichia pastoris. Recombinant SmCL3 has a broad pH activity range against peptidyl substrates and is inhibited by Clan CA protease inhibitors. Consistent with a function in degrading host proteins, SmCL3 hydrolyzes serum albumin and hemoglobin, is localized to the adult gastrodermis, and is expressed mainly in those life stages infecting the mammalian host. The predominant form of SmCL3 in the parasite exists as a zymogen, which is unusual for proteases. This zymogen includes an unusually long prodomain with alpha helical secondary structure motifs. The striking specificity of SmCL3 for amino acids with large aromatic side chains (Trp and Tyr at the P2 substrate position, as determined with positional scanning-synthetic combinatorial library, is consistent with a molecular model that shows a large and deep S2 pocket. A sequence similarity network (SSN view clusters SmCL3 and other cathepsins L in accordance with previous large-scale phylogenetic analyses that identify six super kingdoms.SmCL3 is a gut-associated cathepsin L that may contribute to the network of proteases involved in degrading host blood proteins as nutrients. Furthermore, this enzyme exhibits some unusual sequence and biophysical features that may result in additional functions. The visualization of network inter-relationships among cathepsins L suggests that these enzymes are suitable 'marker sequences' for inclusion in future phylogenetic analyses.

  5. Three new species of blood flukes (Digenea: Aporocotylidae) infecting pufferfishes (Teleostei: Tetraodontidae) from off Bali, Indonesia.

    Science.gov (United States)

    Yong, R Q-Y; Cutmore, S C; Bray, R A; Miller, T L; Semarariana, I W Y; Palm, H W; Cribb, T H

    2016-10-01

    We describe three new species of blood flukes (Aporocotylidae) and propose their classification within the genus Psettarium Goto & Ozaki, 1929. All three species were collected from the circulatory systems of pufferfishes caught off Bali, central Indonesia. Psettarium pulchellum n. sp. was found in the gills of both the narrow-lined puffer (Arothron manilensis de Procé) and the spiny blaasop (Tylerius spinosissimus Regan), while P. ogawai n. sp. and P. jimbaranense n. sp. were found in the gills of the reticulated puffer (Arothron reticularis Bloch & Schneider). The morphological characteristics of these taxa necessitated emendation of the diagnosis for the genus Psettarium, to accommodate the presence of an oral sucker, multiple or entirely post-caecal testes and a degenerate posterior testis. Features such as proportion of body length occupied by the oesophagus, and posterior caeca being ≥7× the length of anterior caeca, are no longer regarded as useful genus-level characters. Additionally, Sasala nolani is reassigned to this genus as Psettarium nolani n. comb. In phylogenetic analyses of the 28S and ITS2 rDNA regions, all three new taxa form a well-supported clade, together with Psettarium sinense and Psettarium nolani n. comb., the two other species of tetraodontid-infecting aporocotylids for which comparative rDNA data were available. The short branch lengths within this clade, despite dramatic morphological differences between the five species, suggest that rapid morphological diversification has occurred among the tetraodontid-infecting aporocotylids. The genus Psettarium has long been considered problematic. Further commentary is given on the history of this genus and how the issues presented might be resolved. Copyright © 2016 Elsevier Ireland Ltd. All rights reserved.

  6. MicroRNAs Are Involved in the Regulation of Ovary Development in the Pathogenic Blood Fluke Schistosoma japonicum.

    Directory of Open Access Journals (Sweden)

    Lihui Zhu

    2016-02-01

    Full Text Available Schistosomes, blood flukes, are an important global public health concern. Paired adult female schistosomes produce large numbers of eggs that are primarily responsible for the disease pathology and critical for dissemination. Consequently, understanding schistosome sexual maturation and egg production may open novel perspectives for intervening with these processes to prevent clinical symptoms and to interrupt the life-cycle of these blood-flukes. microRNAs (miRNAs are key regulators of many biological processes including development, cell proliferation, metabolism, and signal transduction. Here, we report on the identification of Schistosoma japonicum miRNAs using small RNA deep sequencing in the key stages of male-female pairing, gametogenesis, and egg production. We identified 38 miRNAs, including 10 previously unknown miRNAs. Eighteen of the miRNAs were differentially expressed between male and female schistosomes and during different stages of sexual maturation. We identified 30 potential target genes for 16 of the S. japonicum miRNAs using antibody-based pull-down assays and bioinformatic analyses. We further validated some of these target genes using either in vitro luciferase assays or in vivo miRNA suppression experiments. Notably, suppression of the female enriched miRNAs bantam and miR-31 led to morphological alteration of ovaries in female schistosomes. These findings uncover key roles for specific miRNAs in schistosome sexual maturation and egg production.

  7. MicroRNAs Are Involved in the Regulation of Ovary Development in the Pathogenic Blood Fluke Schistosoma japonicum.

    Science.gov (United States)

    Zhu, Lihui; Zhao, Jiangping; Wang, Jianbin; Hu, Chao; Peng, Jinbiao; Luo, Rong; Zhou, Chunjing; Liu, Juntao; Lin, Jiaojiao; Jin, Youxin; Davis, Richard E; Cheng, Guofeng

    2016-02-01

    Schistosomes, blood flukes, are an important global public health concern. Paired adult female schistosomes produce large numbers of eggs that are primarily responsible for the disease pathology and critical for dissemination. Consequently, understanding schistosome sexual maturation and egg production may open novel perspectives for intervening with these processes to prevent clinical symptoms and to interrupt the life-cycle of these blood-flukes. microRNAs (miRNAs) are key regulators of many biological processes including development, cell proliferation, metabolism, and signal transduction. Here, we report on the identification of Schistosoma japonicum miRNAs using small RNA deep sequencing in the key stages of male-female pairing, gametogenesis, and egg production. We identified 38 miRNAs, including 10 previously unknown miRNAs. Eighteen of the miRNAs were differentially expressed between male and female schistosomes and during different stages of sexual maturation. We identified 30 potential target genes for 16 of the S. japonicum miRNAs using antibody-based pull-down assays and bioinformatic analyses. We further validated some of these target genes using either in vitro luciferase assays or in vivo miRNA suppression experiments. Notably, suppression of the female enriched miRNAs bantam and miR-31 led to morphological alteration of ovaries in female schistosomes. These findings uncover key roles for specific miRNAs in schistosome sexual maturation and egg production.

  8. MOLECULAR APPROACH TO THE STUDY OF TREMATODE PARASITES : THE BLOOD FLUKE

    Directory of Open Access Journals (Sweden)

    Philip T. LoVerde

    2012-09-01

    Full Text Available One important aspect of reproductive development in trematode parasites is the formation of a hardened eggshell which allows the zygote to develop into a miracidium in a hostile environment. The miracidium then can transfer the germline from the vertebrate host to snail intermediate host. Schistosome parasites, unlike other trematodes, have separate sexes and female reproductive development is known to depend on the presence of a male parasite. These facts make the blood flukes ideal material to study the mechanisms that underlie female reproductive development and eggshell formatian. We reasoned that the morphological and biochemical differences between the male and female must be reflected at the molecular level in the differential expression of sexually regulated genes. Radioactive single stranded cDNA was first transcribed from female RNA; and then sequences common to both male and female were removed by hybridization to an excess of male RNA. This probe was used to screen a cDNA library made from mRNA of adult worm paris. One hybridizing clone, pSMf 61-46, was shown to correspond to a 0.9 kilobase mRNA that is present only in mature female worms and is not detectable in female schistosomes from single-sex infections, in male worms or in eggs. Thus expression of the gene was female-specific. During normal bisexual infection this mRNA is first detected 28 days after infection (the time of worm pairing and increases to a high level at 35 days postinfection, coinciding with egg production. Thus the temporal expression of the gene was dependent on paining with male worm. The nucleotide sequence of the gene shows an open reading frame that encodes a 16 kDA polypeptide that shows strong homology with eggshell proteins on insects. A second female-specific cDNA clone, F-4, represents a 1.6 kilobase mRNA whose expression is also correlated with worm pairing and subsequent egg production, encodes a different putative eggshell component of 44 kDA. The

  9. Developmental stages of fish blood flukes, Cardicola forsteri and Cardicola opisthorchis (Trematoda: Aporocotylidae), in their polychaete intermediate hosts collected at Pacific bluefin tuna culture sites in Japan.

    Science.gov (United States)

    Ogawa, Kazuo; Shirakashi, Sho; Tani, Kazuki; Shin, Sang Phil; Ishimaru, Katsuya; Honryo, Tomoki; Sugihara, Yukitaka; Uchida, Hiro'omi

    2017-02-01

    Farming of Pacific bluefin tuna (PBT), Thunnus orientalis, is a rapidly growing industry in Japan. Aporocotylid blood flukes of the genus Cardicola comprising C. orientalis, C. opisthorchis and C. forsteri are parasites of economic importance for PBT farming. Recently, terebellid polychaetes have been identified as the intermediate hosts for all these parasites. We collected infected polychaetes, Terebella sp., the intermediate host of C. opisthorchis, from ropes and floats attached to tuna cages in Tsushima, Nagasaki Prefecture, Japan. Also, Neoamphitrite vigintipes (formerly as Amphitrite sp. sensu Shirakashi et al., 2016), the intermediate host of C. forsteri, were collected from culture cages in Kushimoto, Wakayama Prefecture, Japan. The terebellid intermediate hosts harbored the sporocysts and cercariae in their body cavity. Developmental stages of these blood flukes were molecularly identified using species specific PCR primers. In this paper, we describe the cercaria and sporocyst stages of C. opisthorchis and C. forsteri and compare their morphological characteristics among three Cardicola blood flukes infecting PBT. We also discuss phylogenetic relations of the six genera of the terebellid intermediate hosts (Artacama, Lanassa, Longicarpus, Terebella, Nicolea and Neoamphitrite) of blood flukes infecting marine fishes, based on their morphological characters. Copyright © 2016 Elsevier Ireland Ltd. All rights reserved.

  10. Blood Fluke Exploitation of Innate-Adaptive Immune Interactions to Facilitate Parasite Development

    Science.gov (United States)

    2007-01-01

    epidemiology 25:1292-1300. 7. Alonso , D., J. Munoz, J. Gascon, M. E. Valls, and M. Corachan. 2006. Failure of standard treatment with praziquantel in two...of naive and memory CD8 T cells in vivo. Nature immunology 1:426-432. 105. Pearce, E. J., A. Cheever, S. Leonard, M. Covalesky, R. Fernandez - Botran...Transactions of the Royal Society of Tropical Medicine and Hygiene 48:3–4. 149 148. Garcia , S., J. DiSanto, and B. Stockinger. 1999. Following the

  11. Blood flukes (Digenea: Aporocotylidae) of walking catfishes (Siluriformes: Clariidae): new genus and species from the Mekong River (Vietnam) with comments on related catfish aporocotylids.

    Science.gov (United States)

    Truong, Triet Nhat; Bullard, Stephen A

    2013-07-01

    Nomasanguinicola canthoensis gen. et sp. n. infects the branchial vessels of bighead catfish, Clarias macrocephalus Günther (Siluriformes: Clariidae), in the Mekong River near Can Tho, southern Vietnam. Nomasanguinicola differs from all other genera of fish blood flukes (Digenea: Aporocotylidae) by the combination of lacking body spines and by having an anterior sucker with two flanking columns of large denticles, an intestine comprising several short papilla-like caeca, an inverse U-shaped uterus, and an ootype located near the separate genital pores. The new species has an ootype that is posterior to the level of the female genital pore. That feature most easily differentiates it from the only other putative aporocotylid species having an anterior sucker with two flanking columns of large denticles, Plehniella dentata Paperna, 1964 and Sanguinicola clarias Imam, Marzouk, Hassan et Itman, 1984, which have an ootype that is lateral (P. dentata) or anterior (S. clarias) to the level of the female genital pore. These two species apparently lack extant type materials, infect North African catfish, Clarias gariepinus (Burchell), and herein are considered incertae sedis, but likely comprise species of Nomasanguinicola. An updated list of hosts, sites of infection and geographic localities for the six species and three genera of blood flukes that mature in catfishes is provided. The new species is the first fish blood fluke recorded from Vietnam and only the third reported from a walking catfish (Clariidae).

  12. Proteomic analysis of human skin treated with larval schistosome peptidases reveals distinct invasion strategies among species of blood flukes.

    Directory of Open Access Journals (Sweden)

    Jessica Ingram

    2011-09-01

    Full Text Available Skin invasion is the initial step in infection of the human host by schistosome blood flukes. Schistosome larvae have the remarkable ability to overcome the physical and biochemical barriers present in skin in the absence of any mechanical trauma. While a serine peptidase with activity against insoluble elastin appears to be essential for this process in one species of schistosomes, Schistosoma mansoni, it is unknown whether other schistosome species use the same peptidase to facilitate entry into their hosts.Recent genome sequencing projects, together with a number of biochemical studies, identified alternative peptidases that Schistosoma japonicum or Trichobilharzia regenti could use to facilitate migration through skin. In this study, we used comparative proteomic analysis of human skin treated with purified cercarial elastase, the known invasive peptidase of S. mansoni, or S. mansoni cathespin B2, a close homolog of the putative invasive peptidase of S. japonicum, to identify substrates of either peptidase. Select skin proteins were then confirmed as substrates by in vitro digestion assays.This study demonstrates that an S. mansoni ortholog of the candidate invasive peptidase of S. japonicum and T. regenti, cathepsin B2, is capable of efficiently cleaving many of the same host skin substrates as the invasive serine peptidase of S. mansoni, cercarial elastase. At the same time, identification of unique substrates and the broader species specificity of cathepsin B2 suggest that the cercarial elastase gene family amplified as an adaptation of schistosomes to human hosts.

  13. Elucidation of the first definitively identified life cycle for a marine turtle blood fluke (Trematoda: Spirorchiidae) enables informed control.

    Science.gov (United States)

    Cribb, Thomas H; Crespo-Picazo, Jose L; Cutmore, Scott C; Stacy, Brian A; Chapman, Phoebe A; García-Párraga, Daniel

    2017-01-01

    Blood flukes of the family Spirorchiidae are significant pathogens of both free-ranging and captive marine turtles. Despite a significant proportion of marine turtle mortality being attributable to spirorchiid infections, details of their life cycles remain almost entirely unknown. Here we report on the molecular elucidation of the complete life cycle of a marine spirorchiid, identified as Amphiorchis sp., infecting vermetid gastropods and captive hatched neonate Caretta caretta in the Oceanogràfic Aquarium, in Valencia, Spain. Specimens of a vermetid gastropod, Thylaeodus cf. rugulosus (Monterosato, 1878), collected from the aquarium filtration system housing diseased C. caretta, were infected with sporocysts and cercariae consistent with the family Spirorchiidae. We generated rDNA sequence data [internal transcribed spacer 2 (ITS2) and partial 28S rDNA] from infections from the vermetid which were identical to sequences generated from eggs from the serosa of the intestine of neonate C. caretta, and an adult spirorchiid from the liver of a C. caretta from Florida, USA. Given the reliability of these markers in the delineation of trematode species, we consider all three stages to represent the same species and tentatively identify it as a species of Amphiorchis Price, 1934. The source of infection at the Oceanogràfic Foundation Rehabilitation Centre, Valencia, Spain, is inferred to be an adult C. caretta from the western Mediterranean being rehabilitated in the same facility. Phylogenetic analysis suggests that this Amphiorchis sp. is closely related to other spirorchiids of marine turtles (species of Carettacola Manter & Larson, 1950, Hapalotrema Looss, 1899 and Learedius Price, 1934). We discuss implications of the present findings for the control of spirorchiidiasis in captivity, for the better understanding of epidemiology in wild individuals, and the elucidation of further life cycles. Copyright © 2016 Australian Society for Parasitology. Published by

  14. Biodiversity of flukes

    Directory of Open Access Journals (Sweden)

    Dreyfuss G.

    2008-09-01

    Full Text Available As many others parasites, speciation of flukes depends on the genetic characteristics and on ploidia. Ploidia of flukes can be different in a same species. In Asia, diploid, triploid and hybrid (2n/3n populations are encountered. The comparison of morphological parameters between diploid and triploid flukes showed that they were morphologically different. Nevertheless, a genetic relationship between parthenogenetic organisms would exist regardless of their ploidia. In the Fasciola genus, the main consequence of the high level of diversity is the frequent probability of development of resistance to anthelmintics and fast adaptation to climatic changes. In the Paragonimus genus, diversity can enhance different forms of pathogenicity, can also be related to the species of intermediate hosts, and to the definitive host. The strain of flukes plays a part in the visceral localization of P. westermani adults.

  15. Structural basis for the inhibition of histone deacetylase 8 (HDAC8, a key epigenetic player in the blood fluke Schistosoma mansoni.

    Directory of Open Access Journals (Sweden)

    Martin Marek

    Full Text Available The treatment of schistosomiasis, a disease caused by blood flukes parasites of the Schistosoma genus, depends on the intensive use of a single drug, praziquantel, which increases the likelihood of the development of drug-resistant parasite strains and renders the search for new drugs a strategic priority. Currently, inhibitors of human epigenetic enzymes are actively investigated as novel anti-cancer drugs and have the potential to be used as new anti-parasitic agents. Here, we report that Schistosoma mansoni histone deacetylase 8 (smHDAC8, the most expressed class I HDAC isotype in this organism, is a functional acetyl-L-lysine deacetylase that plays an important role in parasite infectivity. The crystal structure of smHDAC8 shows that this enzyme adopts a canonical α/β HDAC fold, with specific solvent exposed loops corresponding to insertions in the schistosome HDAC8 sequence. Importantly, structures of smHDAC8 in complex with generic HDAC inhibitors revealed specific structural changes in the smHDAC8 active site that cannot be accommodated by human HDACs. Using a structure-based approach, we identified several small-molecule inhibitors that build on these specificities. These molecules exhibit an inhibitory effect on smHDAC8 but show reduced affinity for human HDACs. Crucially, we show that a newly identified smHDAC8 inhibitor has the capacity to induce apoptosis and mortality in schistosomes. Taken together, our biological and structural findings define the framework for the rational design of small-molecule inhibitors specifically interfering with schistosome epigenetic mechanisms, and further support an anti-parasitic epigenome targeting strategy to treat neglected diseases caused by eukaryotic pathogens.

  16. The Fluke Security Project

    Science.gov (United States)

    2000-04-01

    be an extension of Utah’s nascent Quarks system, oriented to closely coupled cluster environments. However, the grant did not actually begin until... Intel x86, implemented ten virtual machine monitors and servers, including a virtual memory manager, a checkpointer, a process manager, a file server...Fluke, we developed a novel hierarchical processor scheduling frame- work called CPU inheritance scheduling [5]. This is a framework for scheduling

  17. The effect on infection of irradiated fasciola gigantic (liver flukes) on goats (Capra hircus linn) blood values

    International Nuclear Information System (INIS)

    Tuasikal, BJ.; M-Arifin; Yusneti; Dinardi; Suhardono

    2006-01-01

    This experiment was carried out to study the effect of infection Fasciola gigantic irradiated by using 60 Co to goat’s blood values. Twenty local male goats, ten to twelve old months, 115-20 kg of body weight were used for this study. The animals were divided into 5 groups consisting of four replications. Three groups received irradiated metacercariae of Fasciola gigantic a using 45, 55 and 65 Gy respectively. One group in the positive control and another one is the negative control. Each goat received 350 metacercariae. The study in was undertaken for 25 weeks. Body weight, Eosinofil, PCV and Hb were measured. These indicated that infectivity reduced on irradiated Fasciola gigantic. In all parameters, among negative control group and three irradiation-groups showed non significant (p>0,05). (author)

  18. The Sinbad retrotransposon from the genome of the human blood fluke, Schistosoma mansoni, and the distribution of related Pao-like elements

    Directory of Open Access Journals (Sweden)

    Morales Maria E

    2005-02-01

    Full Text Available Abstract Background Of the major families of long terminal repeat (LTR retrotransposons, the Pao/BEL family is probably the least well studied. It is becoming apparent that numerous LTR retrotransposons and other mobile genetic elements have colonized the genome of the human blood fluke, Schistosoma mansoni. Results A proviral form of Sinbad, a new LTR retrotransposon, was identified in the genome of S. mansoni. Phylogenetic analysis indicated that Sinbad belongs to one of five discreet subfamilies of Pao/BEL like elements. BLAST searches of whole genomes and EST databases indicated that members of this clade occurred in species of the Insecta, Nematoda, Echinodermata and Chordata, as well as Platyhelminthes, but were absent from all plants, fungi and lower eukaryotes examined. Among the deuterostomes examined, only aquatic species harbored these types of elements. All four species of nematode examined were positive for Sinbad sequences, although among insect and vertebrate genomes, some were positive and some negative. The full length, consensus Sinbad retrotransposon was 6,287 bp long and was flanked at its 5'- and 3'-ends by identical LTRs of 386 bp. Sinbad displayed a triple Cys-His RNA binding motif characteristic of Gag of Pao/BEL-like elements, followed by the enzymatic domains of protease, reverse transcriptase (RT, RNAseH, and integrase, in that order. A phylogenetic tree of deduced RT sequences from 26 elements revealed that Sinbad was most closely related to an unnamed element from the zebrafish Danio rerio and to Saci-1, also from S. mansoni. It was also closely related to Pao from Bombyx mori and to Ninja of Drosophila simulans. Sinbad was only distantly related to the other schistosome LTR retrotransposons Boudicca, Gulliver, Saci-2, Saci-3, and Fugitive, which are gypsy-like. Southern hybridization and bioinformatics analyses indicated that there were about 50 copies of Sinbad in the S. mansoni genome. The presence of ESTs

  19. Unusual thiol-based redox metabolism of parasitic flukes.

    Science.gov (United States)

    Tripathi, Timir; Suttiprapa, Sutas; Sripa, Banchob

    2017-08-01

    Parasitic flukes are exposed to free radicals and, to a greater extent, reactive oxygen species (ROS) during their life cycle. Despite being relentlessly exposed to ROS released by activated immune cells, these parasites can survive for many years in the host. Cellular thiol-based redox metabolism plays a crucial role in parasite survival within their hosts. Evidence shows that oxidative stress and redox homeostasis maintenance are important clinical and pathobiochemical as well as effective therapeutic principles in various diseases. The characterization of redox and antioxidant enzymes is likely to yield good target candidates for novel drugs and vaccines. The absence of active catalase in fluke parasites offers great potential for the development of chemotherapeutic agents that act by perturbing the redox equilibrium of the cell. One of the redox-sensitive enzymes, thioredoxin glutathione reductase (TGR), has been accepted as a drug target against blood fluke infections, and related clinical trials are in progress. TGR is the sole enzyme responsible for Trx and GSH reduction in parasitic flukes. The availability of helminth genomes has accelerated the research on redox metabolism of flukes; however, significant achievements have yet to be attained. The present review summarizes current knowledge on the redox and antioxidant system of the parasitic flukes. Copyright © 2016 Elsevier Ireland Ltd. All rights reserved.

  20. Liver Flukes: the Malady Neglected

    Energy Technology Data Exchange (ETDEWEB)

    Lim, Jae Hoon [Samsung Medical Center, Sungkyunkwan University School of Medicine, Seoul (Korea, Republic of)

    2011-06-15

    Liver fluke disease is a chronic parasitic inflammatory disease of the bile ducts. Infection occurs through ingestion of fluke-infested, fresh-water raw fish. The most well-known species that cause human infection are Clonorchis sinensis, Opisthorchis viverrini and Opisthorchis felineus. Adult flukes settle in the small intrahepatic bile ducts and then they live there for 20-30 years. The long-lived flukes cause long-lasting chronic inflammation of the bile ducts and this produces epithelial hyperplasia, periductal fibrosis and bile duct dilatation. The vast majority of patients are asymptomatic, but the patients with heavy infection suffer from lassitude and nonspecific abdominal complaints. The complications are stone formation, recurrent pyogenic cholangitis and cholangiocarcinoma. Approximately 35 million people are infected with liver flukes throughout the world and the exceptionally high incidence of cholangiocarcinoma in some endemic areas is closely related with a high prevalence of liver fluke infection. Considering the impact of this food-borne malady on public health and the severe possible clinical consequences, liver fluke infection should not be forgotten or neglected.

  1. Liver Flukes: the Malady Neglected

    International Nuclear Information System (INIS)

    Lim, Jae Hoon

    2011-01-01

    Liver fluke disease is a chronic parasitic inflammatory disease of the bile ducts. Infection occurs through ingestion of fluke-infested, fresh-water raw fish. The most well-known species that cause human infection are Clonorchis sinensis, Opisthorchis viverrini and Opisthorchis felineus. Adult flukes settle in the small intrahepatic bile ducts and then they live there for 20-30 years. The long-lived flukes cause long-lasting chronic inflammation of the bile ducts and this produces epithelial hyperplasia, periductal fibrosis and bile duct dilatation. The vast majority of patients are asymptomatic, but the patients with heavy infection suffer from lassitude and nonspecific abdominal complaints. The complications are stone formation, recurrent pyogenic cholangitis and cholangiocarcinoma. Approximately 35 million people are infected with liver flukes throughout the world and the exceptionally high incidence of cholangiocarcinoma in some endemic areas is closely related with a high prevalence of liver fluke infection. Considering the impact of this food-borne malady on public health and the severe possible clinical consequences, liver fluke infection should not be forgotten or neglected.

  2. In silico analysis of the fucosylation-associated genome of the human blood fluke Schistosoma mansoni: cloning and characterization of the enzymes involved in GDP-L-fucose synthesis and Golgi import.

    Science.gov (United States)

    Peterson, Nathan A; Anderson, Tavis K; Wu, Xiao-Jun; Yoshino, Timothy P

    2013-07-09

    Carbohydrate structures of surface-expressed and secreted/excreted glycoconjugates of the human blood fluke Schistosoma mansoni are key determinants that mediate host-parasite interactions in both snail and mammalian hosts. Fucose is a major constituent of these immunologically important glycans, and recent studies have sought to characterize fucosylation-associated enzymes, including the Golgi-localized fucosyltransferases that catalyze the transfer of L-fucose from a GDP-L-fucose donor to an oligosaccharide acceptor. Importantly, GDP-L-fucose is the only nucleotide-sugar donor used by fucosyltransferases and its availability represents a bottleneck in fucosyl-glycotope expression. A homology-based genome-wide bioinformatics approach was used to identify and molecularly characterize the enzymes that contribute to GDP-L-fucose synthesis and Golgi import in S. mansoni. Putative functions were further investigated through molecular phylogenetic and immunocytochemical analyses. We identified homologs of GDP-D-mannose-4,6-dehydratase (GMD) and GDP-4-keto-6-deoxy-D-mannose-3,5-epimerase-4-reductase (GMER), which constitute a de novo pathway for GDP-L-fucose synthesis, in addition to a GDP-L-fucose transporter (GFT) that putatively imports cytosolic GDP-L-fucose into the Golgi. In silico primary sequence analyses identified characteristic Rossman loop and short-chain dehydrogenase/reductase motifs in GMD and GMER as well as 10 transmembrane domains in GFT. All genes are alternatively spliced, generating variants of unknown function. Observed quantitative differences in steady-state transcript levels between miracidia and primary sporocysts may contribute to differential glycotope expression in early larval development. Additionally, analyses of protein expression suggest the occurrence of cytosolic GMD and GMER in the ciliated epidermal plates and tegument of miracidia and primary sporocysts, respectively, which is consistent with previous localization of highly

  3. Routes for Drug Translocation Across the Blood-Brain Barrier: Exploiting Peptides as Delivery Vectors.

    Science.gov (United States)

    Kristensen, Mie; Brodin, Birger

    2017-09-01

    A number of potent drugs for the treatment of brain diseases are available. However, in order for them to reach their target site of action, they must pass the blood-brain barrier (BBB). The capillary endothelium comprises the major barrier of the BBB and allows only passive permeation of some small lipophilic molecules. Brain delivery of the larger biopharmaceuticals, which today includes an increasing number of novel drug entities, is therefore restricted, both due to their molecular size and their hydrophilic nature. Thus, the development of novel drug entities intended for the treatment of brain diseases such as neurodegenerative diseases or brain cancers require a delivery strategy for overcoming the BBB before reaching its final target within the brain. Peptide-based delivery vector is an emerging tool as shuttles for drug delivery across the BBB and one may explore receptor-mediated transcytosis, adsorptive-mediated transcytosis, and the paracellular route. The latter, however, being controversial due to the risk of co-delivery of blood-borne potential harmful substances. On the other hand, a number of studies report on drug delivery across the BBB exploiting receptor-mediated transcytosis and adsorptive-mediated transcytosis, indicating that peptides and peptide vectors may be of use in a central nervous system delivery context. Copyright © 2017 American Pharmacists Association®. Published by Elsevier Inc. All rights reserved.

  4. IMPORTANT: Fluke is recalling Digital Clamp Meters

    CERN Multimedia

    2013-01-01

    Fluke is voluntarily recalling four models of Digital Clamp Meters: Fluke 373, 374, 375 and 376. If you own one of these clamp meters, please stop using it and send it back to Fluke for repair even if you have not experienced problems.   Description of the problem: "The printed circuit assembly may not be properly fastened to the test lead input jack. This may result in inaccurate voltage readings, including a low or no-voltage reading on a circuit energised with a hazardous voltage, presenting a shock, electrocution or thermal burn hazard." To determine if your clamp meter is affected by this recall notice, and for more information, click here.

  5. RNAi dynamics in Juvenile Fasciola spp. Liver flukes reveals the persistence of gene silencing in vitro.

    Directory of Open Access Journals (Sweden)

    Paul McVeigh

    2014-09-01

    Full Text Available Fasciola spp. liver fluke cause pernicious disease in humans and animals. Whilst current control is unsustainable due to anthelmintic resistance, gene silencing (RNA interference, RNAi has the potential to contribute to functional validation of new therapeutic targets. The susceptibility of juvenile Fasciola hepatica to double stranded (dsRNA-induced RNAi has been reported. To exploit this we probe RNAi dynamics, penetrance and persistence with the aim of building a robust platform for reverse genetics in liver fluke. We describe development of standardised RNAi protocols for a commercially-available liver fluke strain (the US Pacific North West Wild Strain, validated via robust transcriptional silencing of seven virulence genes, with in-depth experimental optimisation of three: cathepsin L (FheCatL and B (FheCatB cysteine proteases, and a σ-class glutathione transferase (FheσGST.Robust transcriptional silencing of targets in both F. hepatica and Fasciola gigantica juveniles is achievable following exposure to long (200-320 nt dsRNAs or 27 nt short interfering (siRNAs. Although juveniles are highly RNAi-susceptible, they display slower transcript and protein knockdown dynamics than those reported previously. Knockdown was detectable following as little as 4h exposure to trigger (target-dependent and in all cases silencing persisted for ≥25 days following long dsRNA exposure. Combinatorial silencing of three targets by mixing multiple long dsRNAs was similarly efficient. Despite profound transcriptional suppression, we found a significant time-lag before the occurrence of protein suppression; FheσGST and FheCatL protein suppression were only detectable after 9 and 21 days, respectively.In spite of marked variation in knockdown dynamics, we find that a transient exposure to long dsRNA or siRNA triggers robust RNAi penetrance and persistence in liver fluke NEJs supporting the development of multiple-throughput phenotypic screens for control

  6. Reducing liver fluke transmission in northeastern Thailand | IDRC ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    2016-04-29

    Apr 29, 2016 ... ... leaders, local health officials, school teachers—were agents of change. ... visited 186 households and organized liver fluke campaigns in local schools, ... The Lawa Model has since gained national and international ...

  7. Molecular phylogenetic identification of Fasciola flukes in Nepal.

    Science.gov (United States)

    Shoriki, Takuya; Ichikawa-Seki, Madoka; Devkota, Bhuminand; Rana, Hari B; Devkota, Shiva P; Humagain, Sudeep K; Itagaki, Tadashi

    2014-12-01

    Eighty-one Fasciola flukes collected from 8 districts in Nepal were analyzed for their species identification on the basis of their spermatogenic status and nuclear ribosomal internal transcribed spacer 1 (ITS1) and for their phylogenetic relation with Fasciola flukes from other Asian countries on the basis of the mitochondrial NADH dehydrogenase subunit 1 (nad1) gene. Sixty-one flukes (75.3%) were aspermic Fasciola sp., and 20 flukes (24.7%) were identified as Fasciola gigantica. All of the aspermic flukes displayed the Fh/Fg type in ITS1, which was predominant in aspermic Fasciola sp. from China, and most (60 flukes) displayed the Fsp-ND1-N1 haplotype in the nad1, which had an identical nucleotide sequence to the major haplotype (Fg-C2) of the aspermic flukes from China. These results suggest that aspermic Fasciola sp. was introduced into Nepal from China. Furthermore, the results of the diversity indices, neutrality indices, and median-joining network analysis with reference haplotypes from Asian countries suggest that aspermic Fasciola sp. rapidly expanded its distribution. In contrasts, F. gigantica displayed 10 nad1 haplotypes, which showed higher population diversity indices than the haplotypes of aspermic flukes, indicating that the F. gigantica population was clearly distributed in Nepal earlier than the aspermic Fasciola population. Although the F. gigantica haplotypes from Nepal formed a star-like phylogeny consisting of a main founder haplotype (Fg-ND1-N1), together with some F. gigantica haplotypes from Myanmar and Thailand, the Nepal population differed genetically from F. gigantica populations of neighboring countries as each country had distinct founder haplotype(s). Copyright © 2014 Elsevier Inc. All rights reserved.

  8. Granulin Secreted by the Food-Borne Liver Fluke Opisthorchis viverrini Promotes Angiogenesis in Human Endothelial Cells

    Directory of Open Access Journals (Sweden)

    Brandon Haugen

    2018-02-01

    Full Text Available The liver fluke Opisthorchis viverrini is a food-borne, zoonotic pathogen endemic to Thailand and adjacent countries in Southeast Asia. The adult developmental stage of the O. viverrini parasite excretes and secretes numerous proteins within the biliary tract including the gall bladder. Lesions caused by the feeding activities of the liver fluke represent wounds that undergo protracted cycles of healing and re-injury during chronic infection, which can last for decades. Components of the excretory/secretory (ES complement released by the worms capably drive proliferation of bile duct epithelial cells and are implicated in establishing the oncogenic milieu that leads to bile duct cancer, cholangiocarcinoma. An ES protein, the secreted granulin-like growth factor termed Ov-GRN-1, accelerates wound resolution in mice and in vitro. To investigate angiogenesis (blood vessel development that may contribute to wound healing promoted by liver fluke granulin and, by implication, to carcinogenesis during chronic opisthorchiasis, we employed an in vitro tubule formation assay (TFA where human umbilical vein endothelial cells were grown on gelled basement matrix. Ten and 40 nM Ov-GRN-1 significantly stimulated angiogenesis as monitored by cellular proliferation and by TFA in real time. This demonstration of potent angiogenic property of Ov-GRN-1 bolsters earlier reports on the therapeutic potential for chronic non-healing wounds of diabetics, tobacco users, and the elderly and, in addition, showcases another of the hallmark of cancer characteristic of this carcinogenic liver fluke.

  9. Molecular phylogenetic analysis of Fasciola flukes from eastern India.

    Science.gov (United States)

    Hayashi, Kei; Ichikawa-Seki, Madoka; Mohanta, Uday Kumar; Singh, T Shantikumar; Shoriki, Takuya; Sugiyama, Hiromu; Itagaki, Tadashi

    2015-10-01

    Fasciola flukes from eastern India were characterized on the basis of spermatogenesis status and nuclear ITS1. Both Fasciola gigantica and aspermic Fasciola flukes were detected in Imphal, Kohima, and Gantoku districts. The sequences of mitochondrial nad1 were analyzed to infer their phylogenetical relationship with neighboring countries. The haplotypes of aspermic Fasciola flukes were identical or showed a single nucleotide substitution compared to those from populations in the neighboring countries, corroborating the previous reports that categorized them in the same lineage. However, the prevalence of aspermic Fasciola flukes in eastern India was lower than those in the neighboring countries, suggesting that they have not dispersed throughout eastern India. In contrast, F. gigantica was predominant and well diversified, and the species was thought to be distributed in the area for a longer time than the aspermic Fasciola flukes. Fasciola gigantica populations from eastern India were categorized into two distinct haplogroups A and B. The level of their genetic diversity suggests that populations belonging to haplogroup A have dispersed from the west side of the Indian subcontinent to eastern India with the artificial movement of domestic cattle, Bos indicus, whereas populations belonging to haplogroup B might have spread from Myanmar to eastern India with domestic buffaloes, Bubalus bubalis. Copyright © 2015 Elsevier Ireland Ltd. All rights reserved.

  10. Schistosome and liver fluke derived catechol-estrogens and helminth associated cancers

    Directory of Open Access Journals (Sweden)

    José M Correia da Costa

    2014-12-01

    Full Text Available Infection with helminth parasites remains a persistent public health problem in developing countries. Three of these pathogens, the liver flukes Clonorchis sinensis, Opisthorchis viverrini and the blood fluke Schistosoma haematobium, are of particular concern due to their classification as Group 1 carcinogens: infection with these worms is carcinogenic. Using liquid chromatography-mass spectrometry (LC-MS/MS approaches, we identified steroid hormone like (e.g. oxysterol-like, catechol estrogen quinone-like, etc. metabolites and related DNA-adducts, apparently of parasite origin, in developmental stages including eggs of S. haematobium, in urine of people with urogenital schistosomiasis, and in the adult stage of Opisthorchis viverrini. Since these kinds of sterol derivatives are metabolized to active quinones that can modify DNA, which in other contexts can lead to breast and other cancers, helminth parasite associated sterols might induce tumor-like phenotypes in the target cells susceptible to helminth parasite associated cancers, i.e. urothelial cells of the bladder in the case of urogenital schistosomiasis and the bile duct epithelia or cholangiocytes, in the case of O. viverrini and C. sinensis. Indeed we postulate that helminth induced cancers originate from parasite estrogen-host epithelial/urothelial cell chromosomal DNA adducts, and here we review recent findings that support this conjecture.

  11. The role of host nutrition in the pathogensis of liver fluke anaemia

    International Nuclear Information System (INIS)

    Berry, C.I.; Dargie, J.D.

    1976-01-01

    Although it is widely accepted that the course of many helminth diseases of sheep is determined by two main variables, namely the level of infection and the host's nutritional status, the importance of the latter in the pathogenesis of ovine fascioliasis remains to be determined. The results of the experiment described here demonstrate that dietary quality has no significant effect upon fluke establishment but profoundly influences the severity of the disease as evidenced by the more rapid development of anaemia and by earlier mortalities among sheep restricted to a maintenance ration (containing about 6% crude protein) compared with similarly infected animals receiving a diet commensurate with growth (13% crude protein). Concurrent measurements of blood volume and of red cell turnover using radioisotopic methods revealed that in all animals the anaemia was caused by a combination of haemodilution, intra-hepatic and biliary haemorrhage, but that the earlier and more severe disturbances in protein-restricted sheep reflected the earlier development of these changes in association with a faster rate of fluke migration, and was ultimately complicated by impaired erythropoiesis arising from iron deficiency. (author)

  12. Molecular characterization of Fasciola flukes obtained from wild sika deer and domestic cattle in Hokkaido, Japan.

    Science.gov (United States)

    Ichikawa-Seki, Madoka; Shiroma, Tomoko; Kariya, Tatsuya; Nakao, Ryo; Ohari, Yuma; Hayashi, Kei; Fukumoto, Shinya

    2017-10-01

    The number of wild sika deer (Cervus nippon yesoensis) continues to increase in Hokkaido Prefecture, Japan. The major concern for the livestock industry is the transmission of pathogens between sika deer and cattle. Fasciolosis is an important disease that can occur in both animals. The aim of this study was to examine the possible mutual transmission of this disease in Hokkaido Prefecture. A total of 105 Fasciola flukes were obtained from sika deer and 96 from domestic cattle. The Fasciola flukes in Japan are reported to possess no mature sperm. However, in this study, 14 flukes from sika deer and eight flukes from cattle contained mature sperm in their seminal vesicles. All the Fasciola flukes from the two host animals had Fh/Fg type in nuclear phosphoenolpyruvate carboxykinase (pepck) gene, with a mixed fragment pattern derived from F. hepatica and F. gigantica, which are considered to be hybrid Fasciola flukes. However, almost all the flukes had Fsp1 haplotype in NADH dehydrogenase subunit 1 (nad1) gene, indicating that their maternal lineage was F. hepatica. A new haplotype, Fsp3, was detected in one fluke obtained from cattle and differed in one nucleotide from Fsp1. Therefore, the Fasciola flukes detected in both host species had almost identical molecular characteristics. These findings suggest the mutual transmission of Fasciola flukes between sika deer and domestic cattle in Hokkaido. Copyright © 2017. Published by Elsevier B.V.

  13. Gene discovery for the carcinogenic human liver fluke, Opisthorchis viverrini

    Directory of Open Access Journals (Sweden)

    Gasser Robin B

    2007-06-01

    Full Text Available Abstract Background Cholangiocarcinoma (CCA – cancer of the bile ducts – is associated with chronic infection with the liver fluke, Opisthorchis viverrini. Despite being the only eukaryote that is designated as a 'class I carcinogen' by the International Agency for Research on Cancer, little is known about its genome. Results Approximately 5,000 randomly selected cDNAs from the adult stage of O. viverrini were characterized and accounted for 1,932 contigs, representing ~14% of the entire transcriptome, and, presently, the largest sequence dataset for any species of liver fluke. Twenty percent of contigs were assigned GO classifications. Abundantly represented protein families included those involved in physiological functions that are essential to parasitism, such as anaerobic respiration, reproduction, detoxification, surface maintenance and feeding. GO assignments were well conserved in relation to other parasitic flukes, however, some categories were over-represented in O. viverrini, such as structural and motor proteins. An assessment of evolutionary relationships showed that O. viverrini was more similar to other parasitic (Clonorchis sinensis and Schistosoma japonicum than to free-living (Schmidtea mediterranea flatworms, and 105 sequences had close homologues in both parasitic species but not in S. mediterranea. A total of 164 O. viverrini contigs contained ORFs with signal sequences, many of which were platyhelminth-specific. Examples of convergent evolution between host and parasite secreted/membrane proteins were identified as were homologues of vaccine antigens from other helminths. Finally, ORFs representing secreted proteins with known roles in tumorigenesis were identified, and these might play roles in the pathogenesis of O. viverrini-induced CCA. Conclusion This gene discovery effort for O. viverrini should expedite molecular studies of cholangiocarcinogenesis and accelerate research focused on developing new interventions

  14. Potential role of hares in the spread of liver fluke in the Netherlands

    NARCIS (Netherlands)

    Walker, S.M.; Johnston, C.; Hoey, E.M.; Fairweather, I.; Borgsteede, F.H.M.; Gaasenbeek, C.P.H.; Prodohl, P.A.; Trudgett, A.

    2011-01-01

    Hares (Lepus europeanus) sharing pasture with cattle from six locations in the Netherlands were examined for the presence of liver fluke (Fasciola hepatica) and shown to have prevalences of infection ranging from 0 to 41%. The mitochondrial haplotypes of liver flukes present in the hare populations

  15. Molecular analysis of aspermic Fasciola flukes from Korea on the basis of the nuclear ITS1 region and mitochondrial DNA markers and comparison with Japanese aspermic Fasciola flukes.

    Science.gov (United States)

    Ichikawa, Madoka; Itagaki, Tadashi

    2012-07-01

    It has been speculated that populations of aspermic Fasciola flukes in Korea and Japan have a close phylogenetic relationship. To evaluate this, we analyzed 33 Korean aspermic Fasciola flukes on the basis of nuclear ribosomal internal transcribed spacer 1 (ITS1) and mitochondrial NADH dehydrogenase subunit 1 (nad1) and cytochrome c oxidase 1 (cox1) sequences. Fh, Fg, and Fh/Fg types were detected in the ITS1 region and displayed the fragment patterns of F. hepatica, F. gigantica, and both species, respectively by a polymerase chain reaction-restriction fragment length polymorphism (PCR-RFLP) method. Additionally, three concatenated haplotypes of nad1 and cox1(nad1/cox1) were detected, and 2 of these, Kor1/Kor1 (Fsp1/Fsp1) haplotype and Kor2a/Kor2 (Fsp2/Fsp2) haplotype, were shared by Korean and Japanese aspermic flukes. The Fst value (0.019), calculated using the concatenated sequences, indicated that Korean and Japanese aspermic Fasciola populations were genetically undifferentiated. Interestingly, a combination of the Fh/Fg type and Kor1/Kor1 haplotype was found at the highest frequency in Korean aspermic flukes, whereas the Fg type and Fsp2/Fsp2 haplotype combination was found at a conspicuously high frequency in Japanese aspermic flukes. This indicates that a founder effect caused by the introduction of infected hosts may have played a key role in the introduction of aspermic Fasciola flukes from Korea into Japan.

  16. Random and systematic sampling error when hooking fish to monitor skin fluke (Benedenia seriolae) and gill fluke (Zeuxapta seriolae) burden in Australian farmed yellowtail kingfish (Seriola lalandi).

    Science.gov (United States)

    Fensham, J R; Bubner, E; D'Antignana, T; Landos, M; Caraguel, C G B

    2018-05-01

    The Australian farmed yellowtail kingfish (Seriola lalandi, YTK) industry monitor skin fluke (Benedenia seriolae) and gill fluke (Zeuxapta seriolae) burden by pooling the fluke count of 10 hooked YTK. The random and systematic error of this sampling strategy was evaluated to assess potential impact on treatment decisions. Fluke abundance (fluke count per fish) in a study cage (estimated 30,502 fish) was assessed five times using the current sampling protocol and its repeatability was estimated the repeatability coefficient (CR) and the coefficient of variation (CV). Individual body weight, fork length, fluke abundance, prevalence, intensity (fluke count per infested fish) and density (fluke count per Kg of fish) were compared between 100 hooked and 100 seined YTK (assumed representative of the entire population) to estimate potential selection bias. Depending on the fluke species and age category, CR (expected difference in parasite count between 2 sampling iterations) ranged from 0.78 to 114 flukes per fish. Capturing YTK by hooking increased the selection of fish of a weight and length in the lowest 5th percentile of the cage (RR = 5.75, 95% CI: 2.06-16.03, P-value = 0.0001). These lower end YTK had on average an extra 31 juveniles and 6 adults Z. seriolae per Kg of fish and an extra 3 juvenile and 0.4 adult B. seriolae per Kg of fish, compared to the rest of the cage population (P-value sampling towards the smallest and most heavily infested fish in the population, resulting in poor repeatability (more variability amongst sampled fish) and an overestimation of parasite burden in the population. In this particular commercial situation these finding supported that health management program, where the finding of an underestimation of parasite burden could provide a production impact on the study population. In instances where fish populations and parasite burdens are more homogenous, sampling error may be less severe. Sampling error when capturing fish

  17. Developmental Transcriptomic Features of the Carcinogenic Liver Fluke, Clonorchis sinensis

    Science.gov (United States)

    Cho, Pyo Yun; Kim, Tae Im; Cho, Shin-Hyeong; Choi, Sang-Haeng; Park, Hong-Seog; Kim, Tong-Soo; Hong, Sung-Jong

    2011-01-01

    Clonorchis sinensis is the causative agent of the life-threatening disease endemic to China, Korea, and Vietnam. It is estimated that about 15 million people are infected with this fluke. C. sinensis provokes inflammation, epithelial hyperplasia, and periductal fibrosis in bile ducts, and may cause cholangiocarcinoma in chronically infected individuals. Accumulation of a large amount of biological information about the adult stage of this liver fluke in recent years has advanced our understanding of the pathological interplay between this parasite and its hosts. However, no developmental gene expression profiles of C. sinensis have been published. In this study, we generated gene expression profiles of three developmental stages of C. sinensis by analyzing expressed sequence tags (ESTs). Complementary DNA libraries were constructed from the adult, metacercaria, and egg developmental stages of C. sinensis. A total of 52,745 ESTs were generated and assembled into 12,830 C. sinensis assembled EST sequences, and then these assemblies were further categorized into groups according to biological functions and developmental stages. Most of the genes that were differentially expressed in the different stages were consistent with the biological and physical features of the particular developmental stage; high energy metabolism, motility and reproduction genes were differentially expressed in adults, minimal metabolism and final host adaptation genes were differentially expressed in metacercariae, and embryonic genes were differentially expressed in eggs. The higher expression of glucose transporters, proteases, and antioxidant enzymes in the adults accounts for active uptake of nutrients and defense against host immune attacks. The types of ion channels present in C. sinensis are consistent with its parasitic nature and phylogenetic placement in the tree of life. We anticipate that the transcriptomic information on essential regulators of development, bile chemotaxis, and

  18. Developmental transcriptomic features of the carcinogenic liver fluke, Clonorchis sinensis.

    Directory of Open Access Journals (Sweden)

    Won Gi Yoo

    2011-06-01

    Full Text Available Clonorchis sinensis is the causative agent of the life-threatening disease endemic to China, Korea, and Vietnam. It is estimated that about 15 million people are infected with this fluke. C. sinensis provokes inflammation, epithelial hyperplasia, and periductal fibrosis in bile ducts, and may cause cholangiocarcinoma in chronically infected individuals. Accumulation of a large amount of biological information about the adult stage of this liver fluke in recent years has advanced our understanding of the pathological interplay between this parasite and its hosts. However, no developmental gene expression profiles of C. sinensis have been published. In this study, we generated gene expression profiles of three developmental stages of C. sinensis by analyzing expressed sequence tags (ESTs. Complementary DNA libraries were constructed from the adult, metacercaria, and egg developmental stages of C. sinensis. A total of 52,745 ESTs were generated and assembled into 12,830 C. sinensis assembled EST sequences, and then these assemblies were further categorized into groups according to biological functions and developmental stages. Most of the genes that were differentially expressed in the different stages were consistent with the biological and physical features of the particular developmental stage; high energy metabolism, motility and reproduction genes were differentially expressed in adults, minimal metabolism and final host adaptation genes were differentially expressed in metacercariae, and embryonic genes were differentially expressed in eggs. The higher expression of glucose transporters, proteases, and antioxidant enzymes in the adults accounts for active uptake of nutrients and defense against host immune attacks. The types of ion channels present in C. sinensis are consistent with its parasitic nature and phylogenetic placement in the tree of life. We anticipate that the transcriptomic information on essential regulators of development

  19. Redefining Exploitation

    DEFF Research Database (Denmark)

    Agarwala, Rina

    2016-01-01

    This article examines how self-employed workers are organizing in the garments and waste collection industries in India. Although the question of who is profiting from self-employed workers’ labor is complex, the cases outlined in this paper highlight telling instances of how some self......-employed workers are organizing as workers. They are fighting labor exploitation by redefining the concept to include additional exploitation axes (from the state and middle class) and forms (including sexual). In doing so, they are redefining potential solutions, including identities and material benefits, to fit...... their unique needs. By expanding the category of “workers” beyond those defined by a narrow focus on a standard employer-employee relationship, these movements are also fighting exclusion from earlier labor protections by increasing the number of entitled beneficiaries. These struggles provide an important...

  20. Invasion of Flukes of the Echinostomatidae Family in Racing Pigeon ( Columba livia var. domestica) Lofts.

    Science.gov (United States)

    Ledwoń, Aleksandra; Dolka, Beata; Piasecki, Tomasz; Dolka, Izabella; Szeleszczuk, Piotr

    2016-06-01

    Over 4 years, only two known cases of fluke invasions were diagnosed in racing pigeons ( Columba livia ) originating from different regions of Poland. In both cases, the invasion was characterized by a very high mortality (approximately 70%), and the source of the infestation was snails of the Lymnaeidae family eaten by pigeons. Fluke invasions in pigeons are extremely rare and to date have not been described in Poland. Therefore, the occurrence of the symptoms of hemorrhagic diarrhea and sudden deaths of either adult pigeons or nestlings were suspected to be associated with poisoning. Autopsy revealed an invasion of flukes causing hemorrhagic enteritis. Renal failure and spleen atrophy were also found in the birds. Using molecular biology techniques, infestation with the fluke Echinostoma revolutum was determined in the second case.

  1. MOLECULAR MECHANISMS THAT LEAD TO CHOLANGIOCARCINOMA, DURING CHRONIC INFECTION OF LIVER FLUKES

    Directory of Open Access Journals (Sweden)

    A. O. Bogdanov

    2015-01-01

    Full Text Available Cholangiocarcinoma is a malignant tumor, characterized by poor prognosis and a low five-year survival rate. There is a clear correlation between the incidence of opisthorchiasis and high incidence of cholangiocarcinoma in South-East Asia. Liver flukes Clonorchis sinensis and Opisthorchis viverrini are I class carcinogens. There are some endemic regions of opisthorchiasis In the Russian Federation. The most important factor that leads to carcinogenesis during liver fluke infection is chronic inflammation. This review article focuses on the communication of chronic inflammation caused by invasion of liver flukes and cholangiocarcinoma. This paper summarizes the current knowledge about the risk factors for cholangiocarcinoma, as well as knowledge about the molecular aspects of the induction of carcinogenesis by liver flukes.

  2. The role of evolutionary biology in research and control of liver flukes in Southeast Asia.

    Science.gov (United States)

    Echaubard, Pierre; Sripa, Banchob; Mallory, Frank F; Wilcox, Bruce A

    2016-09-01

    Stimulated largely by the availability of new technology, biomedical research at the molecular-level and chemical-based control approaches arguably dominate the field of infectious diseases. Along with this, the proximate view of disease etiology predominates to the exclusion of the ultimate, evolutionary biology-based, causation perspective. Yet, historically and up to today, research in evolutionary biology has provided much of the foundation for understanding the mechanisms underlying disease transmission dynamics, virulence, and the design of effective integrated control strategies. Here we review the state of knowledge regarding the biology of Asian liver Fluke-host relationship, parasitology, phylodynamics, drug-based interventions and liver Fluke-related cancer etiology from an evolutionary biology perspective. We consider how evolutionary principles, mechanisms and research methods could help refine our understanding of clinical disease associated with infection by Liver Flukes as well as their transmission dynamics. We identify a series of questions for an evolutionary biology research agenda for the liver Fluke that should contribute to an increased understanding of liver Fluke-associated diseases. Finally, we describe an integrative evolutionary medicine approach to liver Fluke prevention and control highlighting the need to better contextualize interventions within a broader human health and sustainable development framework. Copyright © 2016 Elsevier B.V. All rights reserved.

  3. Simulating the Risk of Liver Fluke Infection using a Mechanistic Hydro-epidemiological Model

    Science.gov (United States)

    Beltrame, Ludovica; Dunne, Toby; Rose, Hannah; Walker, Josephine; Morgan, Eric; Vickerman, Peter; Wagener, Thorsten

    2016-04-01

    Liver Fluke (Fasciola hepatica) is a common parasite found in livestock and responsible for considerable economic losses throughout the world. Risk of infection is strongly influenced by climatic and hydrological conditions, which characterise the host environment for parasite development and transmission. Despite on-going control efforts, increases in fluke outbreaks have been reported in recent years in the UK, and have been often attributed to climate change. Currently used fluke risk models are based on empirical relationships derived between historical climate and incidence data. However, hydro-climate conditions are becoming increasingly non-stationary due to climate change and direct anthropogenic impacts such as land use change, making empirical models unsuitable for simulating future risk. In this study we introduce a mechanistic hydro-epidemiological model for Liver Fluke, which explicitly simulates habitat suitability for disease development in space and time, representing the parasite life cycle in connection with key environmental conditions. The model is used to assess patterns of Liver Fluke risk for two catchments in the UK under current and potential future climate conditions. Comparisons are made with a widely used empirical model employing different datasets, including data from regional veterinary laboratories. Results suggest that mechanistic models can achieve adequate predictive ability and support adaptive fluke control strategies under climate change scenarios.

  4. Paramphistomum cervi: surface topography of the tegument of adult fluke.

    Science.gov (United States)

    Panyarachun, Busaba; Sobhon, Prasert; Tinikul, Yotsawan; Chotwiwatthanakun, Charoonroj; Anupunpisit, Vipavee; Anuracpreeda, Panat

    2010-06-01

    Adult Paramphistomum cervi or rumen fluke are pear-shaped, slightly concave ventrally and convex dorsally. The worm measures about 5-13 mm in length and 2-5 mm in width across the mid-section. As observed by scanning electron microscopy (SEM), the tegumental surface in all part of the body, appears highly corrugated with transverse folds alternating with grooves and is spineless. At high magnification, the surface of the fold is composed of microfolds or ridges separated by microgrooves or pits. Corrugations and invaginations of the ventral surface are also more extensive than on the dorsal surface of the body. Both anterior and posterior suckers have thick rims covered with transverse folds without spine. The genital pore is situated at the anterior third of the body. There are two types of sensory papillae on the surface: type 1 is bulbous in shape, measuring 10-15 microm in diameter at the base with nipple-like tips, and type 2 has a similar shape and size and also a short cilia on top. These sensory papillae usually occur in large clusters, each having between 5 and 20 units depending on the region of the body. Clusters of papillae on the ventral surface and around the anterior suckers tend to be more numerous and larger in size. The dorsal surface of the body has the least number of papillae. Copyright (c) 2009 Elsevier Inc. All rights reserved.

  5. Presence and species identity of rumen flukes in cattle and sheep in the Netherlands.

    Science.gov (United States)

    Ploeger, H W; Ankum, L; Moll, L; van Doorn, D C K; Mitchell, G; Skuce, P J; Zadoks, R N; Holzhauer, M

    2017-08-30

    The purpose of the study was to gain knowledge about the prevalence and identity of rumen flukes (RF) in cattle and sheep in the Netherlands. Routine faecal examinations of diagnostic submissions between May 2009 and September 2014 showed a mean annual herd or flock RF prevalence of 15.8% for cattle and 8.0% for sheep. Prevalence in cattle was higher after 2012 than before, which may reflect a change in detection method as well as an increase in true prevalence. During November and December 2014, an abattoir survey was conducted to allow for scoring of rumen fluke burden and to obtain specimens for molecular species characterization. Over 8 visits to 5 abattoirs in areas deemed to pose a high risk for trematode infection, 116 cows and 41 sheep from 27 herds and 10 flocks were examined. Prevalence of RF was higher in beef cattle than in dairy cattle and higher in cattle than in sheep. Median fluke burden was >100 specimens per animal for most positive animals. Using a semi-quantitative RF density score as a gold standard, sensitivity and specificity of a modified quantitative Dorsman egg counting method were estimated at 82.6% and 83.3%, respectively. Of 14 collected adult rumen flukes, twelve (8 bovine and 4 ovine specimens) were identified as Calicophoron daubneyi. The other two, of bovine origin, were identified as Paramphistomum leydeni, which was unexpected as in other European countries all recently collected rumen flukes in both cattle and sheep were identified as C. daubneyi. The findings implicate that multiple rumen fluke species, intermediate host species and transmission cycles may play a role in rumen fluke infections in the Netherlands. Copyright © 2017. Published by Elsevier B.V.

  6. Knowledge, attitude and practice related to liver fluke infection in northeast Thailand

    Institute of Scientific and Technical Information of China (English)

    Natthawut Kaewpitoon; Soraya J Kaewpitoon; Prasit Pengsaa; Chutigan Pilasri

    2007-01-01

    AIM:To investigate the knowledge,attitude and practice (KAP) in prevention and control of liver fluke infection in northeast Thailand.METHODS:A descriptive KAP survey pertaining to liver fluke infection was carried out in June 2005 to October 2006 using structured questionnaires. Data were collected by questionnaires consisting of general parameters,knowledge,attitude,practice,and a history of participation in the prevention and control of liver fluke infection.RESULTS:A total of 1077 persons who were interviewed and completed the questionnaires were enrolled in the study. The majority were females (69.5%) and many of them were 15-20 years of age (37.26%). The questionnaires revealed that information resources on Uver fluke infection included local public health volunteers (31.37%),public health officers (18.72%),televisions (14.38%),local heads of sub-districts (12.31%),doctors and nurses (9.18%),newspaper (5.72),internets (5.37%),and others (12.95%). Fifty-five point eleven percent of the population had a good level of liver fluke knowledge concerning the mode of disease transmission and 79.72% of the population had a good level of prevention and control knowledge with regards to defecation and consumption. The attitude and practice in liver fluke prevention and control were also at a good level with a positive awareness,participation,and satisfaction of 72.1% and 60.83% of the persons studied. However,good health behavior was found in 39.26% and 41.42% of the persons studied who had unhygienic defecation and ate raw cyprinoid's fish. Theresult also showed that 41.25% of the persons studied previously joined prevention and control campaigns.CONCLUSION:The persons studied have a high level of liver fluke knowledge and positive attitude. However,improvement is required regarding personal hygiene specifically with hygienic defecation and consumption of undercooked fish.

  7. A case of a facultative life-cycle diversification in the fluke Pleurogenoides sp. (Lecithodendriidae, Plagiorchiida).

    Science.gov (United States)

    Hassl, Andreas R

    2010-10-01

    Numerous specimens of the native, intestinal digenean fluke Pleurogenoides sp. (Lecithodendriidae, Plagiorchiida), a genus known for the simultaneous co-existence of genuine adults and progenetic, adult-like metacercaria, were found by chance parasitizing in the oesophagus of a recently imported, tropical Bristly Bush Viper (Atheris hispida). The snake had before been force-fed with native water frogs, the assumed definitive host of these flukes. Hence water frogs act as the second intermediate host or as a paratenic host for Pleurogenoides flukes, as they must house progenetic fluke larvae, which develop to genuine adults when transmitted to an appropriate consecutive host, the ancestral definitive host, a reptile. The European Pleurogenoides fluke species seem to display a facultative life-cycle diversification, they can adjust their life-history strategy according to their immediate transmission opportunities. This phenotypic plasticity allows the parasite to respond quickly to any changes in the abundance of a host; usually this biological oddity results in a life-cycle truncation by the elimination of the definitive host.

  8. The draft genome of the carcinogenic human liver fluke Clonorchis sinensis

    Science.gov (United States)

    2011-01-01

    Background Clonorchis sinensis is a carcinogenic human liver fluke that is widespread in Asian countries. Increasing infection rates of this neglected tropical disease are leading to negative economic and public health consequences in affected regions. Experimental and epidemiological studies have shown a strong association between the incidence of cholangiocarcinoma and the infection rate of C. sinensis. To aid research into this organism, we have sequenced its genome. Results We combined de novo sequencing with computational techniques to provide new information about the biology of this liver fluke. The assembled genome has a total size of 516 Mb with a scaffold N50 length of 42 kb. Approximately 16,000 reliable protein-coding gene models were predicted. Genes for the complete pathways for glycolysis, the Krebs cycle and fatty acid metabolism were found, but key genes involved in fatty acid biosynthesis are missing from the genome, reflecting the parasitic lifestyle of a liver fluke that receives lipids from the bile of its host. We also identified pathogenic molecules that may contribute to liver fluke-induced hepatobiliary diseases. Large proteins such as multifunctional secreted proteases and tegumental proteins were identified as potential targets for the development of drugs and vaccines. Conclusions This study provides valuable genomic information about the human liver fluke C. sinensis and adds to our knowledge on the biology of the parasite. The draft genome will serve as a platform to develop new strategies for parasite control. PMID:22023798

  9. Prevalence of cattle flukes infection at Andassa Livestock Research Center in north-west of Ethiopia

    Directory of Open Access Journals (Sweden)

    Asressa Yeneneh

    2012-06-01

    Full Text Available A cross sectional study was carried out from October 2010 to March 2011 at Andassa Livestock Research Center, North-West Ethiopia. The objective was to determine the prevalence of cattle flukes infection. Faecal samples were collected from a total of 384 cattle, cross breed (n= 39 and Fogera breed (n=345 of all age groups and sex. Sedimentation technique was employed for the recovery of fluke eggs from freshly collected fecal sample. The results indicated that the overall prevalence of bovine flukes infection was 60.42%. In this study, the highest prevalence was recorded from Paramphistomosis (45.83% followed by Fasciolosis (23.96%, and Schistosomosis (9.89%. The prevalence of flukes infection was higher in age group 1- 2 years old. There was significant difference in case of Paramphistomosis among age groups. No significant association was found between crossed breeds and sex groups for fluke’s infection. The prevalence of Paramphistomosis was high in cross breed (58.97% than Fogera breed (44.35%. However, in both cases, there was no significant difference. The result of the present study revealed that the prevalence of major bovine fluke infection in the study area was relatively low and is the definite proof of active infection.

  10. Insights into SCP/TAPS proteins of liver flukes based on large-scale bioinformatic analyses of sequence datasets.

    Directory of Open Access Journals (Sweden)

    Cinzia Cantacessi

    Full Text Available BACKGROUND: SCP/TAPS proteins of parasitic helminths have been proposed to play key roles in fundamental biological processes linked to the invasion of and establishment in their mammalian host animals, such as the transition from free-living to parasitic stages and the modulation of host immune responses. Despite the evidence that SCP/TAPS proteins of parasitic nematodes are involved in host-parasite interactions, there is a paucity of information on this protein family for parasitic trematodes of socio-economic importance. METHODOLOGY/PRINCIPAL FINDINGS: We conducted the first large-scale study of SCP/TAPS proteins of a range of parasitic trematodes of both human and veterinary importance (including the liver flukes Clonorchis sinensis, Opisthorchis viverrini, Fasciola hepatica and F. gigantica as well as the blood flukes Schistosoma mansoni, S. japonicum and S. haematobium. We mined all current transcriptomic and/or genomic sequence datasets from public databases, predicted secondary structures of full-length protein sequences, undertook systematic phylogenetic analyses and investigated the differential transcription of SCP/TAPS genes in O. viverrini and F. hepatica, with an emphasis on those that are up-regulated in the developmental stages infecting the mammalian host. CONCLUSIONS: This work, which sheds new light on SCP/TAPS proteins, guides future structural and functional explorations of key SCP/TAPS molecules associated with diseases caused by flatworms. Future fundamental investigations of these molecules in parasites and the integration of structural and functional data could lead to new approaches for the control of parasitic diseases.

  11. Protease Inhibitors of Parasitic Flukes: Emerging Roles in Parasite Survival and Immune Defence.

    Science.gov (United States)

    Ranasinghe, Shiwanthi L; McManus, Donald P

    2017-05-01

    Protease inhibitors play crucial roles in parasite development and survival, counteracting the potentially damaging immune responses of their vertebrate hosts. However, limited information is currently available on protease inhibitors from schistosomes and food-borne trematodes. Future characterization of these molecules is important not only to expand knowledge on parasitic fluke biology but also to determine whether they represent novel vaccine and/or drug targets. Moreover, protease inhibitors from flukes may represent lead compounds for the development of a new range of therapeutic agents against inflammatory disorders and cancer. This review discusses already identified protease inhibitors of fluke origin, emphasizing their biological function and their possible future development as new intervention targets. Copyright © 2016 Elsevier Ltd. All rights reserved.

  12. Prevalence, risk factors and spatial analysis of infections with liver flukes in Danish cattle herds

    DEFF Research Database (Denmark)

    Hisham Beshara Halasa, Tariq; Frankena, K.; Olsen, A.

    Liver fluke infection, also known as fasciolosis, is a world-wide prevalent zoonotic parasitic disease infecting a wide range of host species and is caused by Fasciola hepatica. Despite of the substantial economic and animal welfare effects of the disease, knowledge on its prevalence and the fact......Liver fluke infection, also known as fasciolosis, is a world-wide prevalent zoonotic parasitic disease infecting a wide range of host species and is caused by Fasciola hepatica. Despite of the substantial economic and animal welfare effects of the disease, knowledge on its prevalence...

  13. Prevalence and Sequence-Based Identity of Rumen Fluke in Cattle and Deer in New Caledonia.

    Directory of Open Access Journals (Sweden)

    Laura Cauquil

    Full Text Available An abattoir survey was performed in the French Melanesian archipelago of New Caledonia to determine the prevalence of paramphistomes in cattle and deer and to generate material for molecular typing at species and subspecies level. Prevalence in adult cattle was high at animal level (70% of 387 adult cattle and batch level (81%. Prevalence was lower in calves at both levels (33% of 484 calves, 51% at batch level. Animals from 2 of 7 deer farms were positive for rumen fluke, with animal-level prevalence of 41.4% (29/70 and 47.1% (33/70, respectively. Using ITS-2 sequencing, 3 species of paramphistomes were identified, i.e. Calicophoron calicophorum, Fischoederius elongatus and Orthocoelium streptocoelium. All three species were detected in cattle as well as deer, suggesting the possibility of rumen fluke transmission between the two host species. Based on heterogeneity in ITS-2 sequences, the C. calicophorum population comprises two clades, both of which occur in cattle as well as deer. The results suggest two distinct routes of rumen fluke introduction into this area. This approach has wider applicability for investigations of the origin of rumen fluke infections and for the possibility of parasite transmission at the livestock-wildlife interface.

  14. Some studies on liver and rumen flukes of bovines in Sri Lanka

    African Journals Online (AJOL)

    nkpc001

    Keywords: liver and rumen flukes, bovines, influence of climate, Sri Lanka. INTRODUCTION .... they were given two changes of absolute alcohol, each longing ..... inland and where fresh water ditches, streams and large water ... India. Res. ull. Panjab Univ., New series, 18: 369-337. sen J, Perry B. 1994. The epidemiology,.

  15. High Prevalence of Human Liver Infection by Amphimerus spp. Flukes, Ecuador

    OpenAIRE

    Calvopiña, Manuel; Cevallos, William; Kumazawa, Hideo; Eisenberg, Joseph

    2011-01-01

    Amphimerus spp. flukes are known to infect mammals, but human infections have not been confirmed. Microscopy of fecal samples from 397 persons from Ecuador revealed Opisthorchiidae eggs in 71 (24%) persons. Light microscopy of adult worms and scanning electron microscopy of eggs were compatible with descriptions of Amphimerus spp. This pathogen was only observed in communities that consumed undercooked fish.

  16. Determination Of Irradiation Doses For Fasciola gigantica (Liver Flukes) For Protection In Goat (Capra hircus Linn.)

    International Nuclear Information System (INIS)

    Tuasikal, B.J.; Arifin, M.; Tarmizi

    2002-01-01

    An experiment was conducted to study the cange of pathogenicity of 6 O C o-irradiated F. gigantica that give immunological responses in goat. The aim of the study was to see immunity respond of goats against F. gigantica, which at the end to develop a new strategic technique for fluke control in small ruminant. Irradiated and non-irradiated -using y-cell of 6 0 C o -metacercariae (mc.) of F.gigantica were used as the infection material that administered into 18 locally bred goats averagely 10 months of age. These animal are divided into 6 groups of treatment as the following : (I) infection with 0 Gy irradiated mc as positive control; (2) without any infection, as negative contral; (3) infection with 25 Gy inaiiated mc; (4) immunisation with 25 Gy irradiated mc and then challenge by pure infective mc; (5) infection with 35 Gy irradiated mc; and (6) immunisation with 35 Gy irradiated mc an then challenge by pure infective mc. A period of 8 weeks was given to challenge immunisation. Body weight change, blood value (eosinophyl, haemoglobin, PCV, and reticulocyte) and liver anatomical pathology (AP) are observed and recorded. Result of this experiment showed a reduction in body weight change, 130 grams/week, in group I as compare to animal in group 4, which gain body weight of 80 grams/week. The proportion of eosinophyl in group 4 found to re higher as compare to group 6,90.6% and 66.8%, respectively, which indicates that 25Gy mc immunization enables elimination of the mc challenge given. This condition was confirmed by the ''normal'' seen on the anatomical pathology of the liver as compare to animal in- group 1, which found to be more cirrhosis with eosinophyl proportion of 98,6%. Furthermore, results from the observation of PCV and Hb indicate that anaemia was found in animal from group 1 compare to the respective groups: 22.33% and 8.94% vs 25.90% and 10.10% and 27.10% and 10.10%, respectively for PCV and HB in-group animal 1,4 and 6. It can be concluded that mc

  17. Hybrid origin of Asian aspermic Fasciola flukes is confirmed by analyzing two single-copy genes, pepck and pold

    Science.gov (United States)

    HAYASHI, Kei; ICHIKAWA-SEKI, Madoka; MOHANTA, Uday Kumar; SHORIKI, Takuya; CHAICHANASAK, Pannigan; ITAGAKI, Tadashi

    2017-01-01

    Nuclear gene markers, phosphoenolpyruvate carboxykinase (pepck) and DNA polymerase delta (pold), have been developed for precise discrimination of Fasciola flukes instead of internal transcribed spacer 1. In this study, these two genes of 730 Fasciola flukes from eight Asian countries were analyzed. The results were compared with their mitochondrial NADH dehydrogenase subunit 1 (nad1) lineages for obtaining a definitive evidence of the hybrid origin of aspermic Fasciola flukes. All the flukes categorized into the aspermic nad1 lineages possessed both the fragment patterns of F. hepatica and F. gigantica (mixed types) in pepck and/or pold. These findings provide clear evidence for the hybrid origin of aspermic Fasciola lineages and suggest that “aspermic Fasciola flukes” should hereafter be called “hybrid Fasciola flukes”. PMID:29187710

  18. Exploiting dynamic reaction cell inductively coupled plasma mass spectrometry (DRC-ICP-MS) for sequential determination of trace elements in blood using a dilute-and-shoot procedure

    International Nuclear Information System (INIS)

    Lemos Batista, Bruno; Lisboa Rodrigues, Jairo; Andrade Nunes, Juliana; Oliveira Souza, Vanessa Cristina de; Barbosa, Fernando

    2009-01-01

    Inductively coupled plasma mass spectrometry with quadrupole (q-ICP-MS) and dynamic reaction cell (DRC-ICP-MS) were evaluated for sequential determination of As, Cd, Co, Cr, Cu, Mn, Pb, Se, Tl, V and Zn in blood. The method requires as little as 100 μL of blood. Prior to analysis, samples (100 μL) were diluted 1:50 in a solution containing 0.01% (v/v) Triton X-100 and 0.5% (v/v) nitric acid. The use of the DRC was only mandatory for Cr, Cu, V and Zn. For the other elements the equipment may be operated in a standard mode (q-ICP-MS). Ammonia was used as reaction gas. Selection of best flow rate of ammonium gas and optimization of the quadrupole dynamic band-pass tuning parameter (RPq) were carried out, using a ovine base blood for Cr and V and a synthetic matrix solution (SMS) for Zn and Cu diluted 1:50 and spiked to contain 1 μg L -1 of each element. Method detection limits (3 s) for 75 As, 114 Cd, 59 Co, 51 Cr, 63 Cu 55 Mn, 208 Pb, 82 Se, 205 Tl, 51 V, and 64 Zn were 14.0, 3.0, 11.0, 7.0, 280, 9.0, 3.0, 264, 0.7, 6.0 and 800 ng L -1 , respectively. Method validation was accomplished by the analysis of blood Reference Materials produced by the L'Institut National de Sante Publique du Quebec (Canada).

  19. Prevalence, risk factors and spatial analysis of liver fluke infections in Danish cattle herds

    DEFF Research Database (Denmark)

    Olsen, Abbey; Frankena, Klaas; Bødker, Rene

    2015-01-01

    Background: Fasciola hepatica, a trematode parasite (liver fluke), infects a wide range of host species causing fasciolosis. The disease is prevalent world-wide and causes considerable economic losses to the livestock industry. Fasciolosis is regarded as an emerging food-borne zoonosis. To promote...... awareness among farmers and to implement strategies to control the infection, this study examined the prevalence, spatial distribution and risk factors for Fasciola hepatica infection in Danish cattle herds. Methods: A retrospective population based study was performed using meat inspection data...... of approximately 1.5 million cattle slaughtered in the period 2011 to 2013. Annual cumulative prevalence of recorded liver fluke findings was calculated for each year. Global and local spatial cluster analysis was used to identify and map spatial patterns of Fasciola hepatica positive and negative herds to explore...

  20. [Genomics and transcriptomics of the Chinese liver fluke Clonorchis sinensis (Opisthorchiidae, Trematoda)].

    Science.gov (United States)

    Chelomina, G N

    2017-01-01

    The review summarizes the results of first genomic and transcriptomic investigations of the liver fluke Clonorchis sinensis (Opisthorchiidae, Trematoda). The studies mark the dawn of the genomic era for opisthorchiids, which cause severe hepatobiliary diseases in humans and animals. Their results aided in understanding the molecular mechanisms of adaptation to parasitism, parasite survival in mammalian biliary tracts, and genome dynamics in the individual development and the development of parasite-host relationships. Special attention is paid to the achievements in studying the codon usage bias and the roles of mobile genetic elements (MGEs) and small interfering RNAs (siRNAs). Interspecific comparisons at the genomic and transcriptomic levels revealed molecular differences, which may contribute to understanding the specialized niches and physiological needs of the respective species. The studies in C. sinensis provide a basis for further basic and applied research in liver flukes and, in particular, the development of efficient means to prevent, diagnose, and treat clonorchiasis.

  1. In vitro antihelmintic effect of fifteen tropical plant extracts on excysted flukes of Fasciola hepatica

    OpenAIRE

    Alvarez-Mercado, Jos? Manuel; Ibarra-Velarde, Froyl?n; Alonso-D?az, Miguel ?ngel; Vera-Montenegro, Yolanda; Avila-Acevedo, Jos? Guillermo; Garc?a-Bores, Ana Mar?a

    2015-01-01

    Background Fasciolosis due to Fasciola hepatica is the most important hepatic disease in veterinary medicine. Its relevance is important because of the major economical losses to the cattle industry such as: reduction in milk, meat and wool production; miscarriages, anemia, liver condemnation and occasionally deaths, are estimated in billons of dollars. The emergence of fluke resistance due to over or under dosing of fasciolides as well as environmental damage produced by the chemicals elimin...

  2. Liver fluke (Fasciola hepatica) infection in cattle in Northern Ireland: a large-scale epidemiological investigation utilising surveillance data.

    Science.gov (United States)

    Byrne, Andrew W; McBride, Stewart; Lahuerta-Marin, Angela; Guelbenzu, Maria; McNair, Jim; Skuce, Robin A; McDowell, Stanley W J

    2016-04-14

    Liver fluke (Fasciola hepatica) is a widespread parasite of ruminants which can have significant economic impact on cattle production. Fluke infection status at the animal-level is captured during meat inspection of all animals processed for human consumption within Northern Ireland. These national datasets have not been analysed to assess their utility in uncovering patterns in fluke infection at animal- and herd-levels in Northern Ireland. We utilised a dataset of 1.2 million animal records from ~18,000 herds across 3 years (2011-2013) to assess animal- and herd-level apparent prevalence and risk-factors associated with fluke infection. Animal-level apparent prevalence was measured as the proportion of animals exhibiting evidence of fluke infection at slaughter; between herd-level infection prevalence was measured by binary categorisation of herds (infected or not). "Within herd" infection prevalence was measured using the proportion of animals within a herd that showed evidence of fluke infection per year (ranging from 0-100%). "Within herd" infection prevalence at the herd level was investigated using multivariable modelling. At the animal level, the proportion of animals slaughtered that exhibited evidence of infection was 21-25% amongst years. Across herds, the proportion of herds with at least one infected animal, varied between 61 and 65%. However, there was a significant sampling effect at the herd-level; all herds where at least 105 animals slaughtered over the study period exhibited evidence of fluke infection (100%). There was significant variation in terms of within-herd infection prevalence. Risk factors included herd type, long-term weather variation, geographic location (region) and the abattoir. Liver fluke apparent prevalence was high at the herd-level across years. However, there was lower prevalence at the animal level, which may indicate significant variation in the exposure to fluke infection within herds. The proportion infected within

  3. The Ethics of Exploitation

    Directory of Open Access Journals (Sweden)

    Paul McLaughlin

    2008-11-01

    Full Text Available Philosophical inquiry into exploitation has two major deficiencies to date: it assumes that exploitation is wrong by definition; and it pays too much attention to the Marxian account of exploitation. Two senses of exploitation should be distinguished: the ‘moral’ or pejorative sense and the ‘non-moral’ or ‘non-prejudicial’ sense. By demonstrating the conceptual inadequacy of exploitation as defined in the first sense, and by defining exploitation adequately in the latter sense, we seek to demonstrate the moral complexity of exploitation. We contend, moreover, that moral evaluation of exploitation is only possible once we abandon a strictly Marxian framework and attempt, in the long run, to develop an integral ethic along Godwinian lines.

  4. Detection of major climatic and environmental predictors of liver fluke exposure risk in Ireland using spatial cluster analysis.

    Science.gov (United States)

    Selemetas, Nikolaos; de Waal, Theo

    2015-04-30

    Fasciolosis caused by Fasciola hepatica (liver fluke) can cause significant economic and production losses in dairy cow farms. The aim of the current study was to identify important weather and environmental predictors of the exposure risk to liver fluke by detecting clusters of fasciolosis in Ireland. During autumn 2012, bulk-tank milk samples from 4365 dairy farms were collected throughout Ireland. Using an in-house antibody-detection ELISA, the analysis of BTM samples showed that 83% (n=3602) of dairy farms had been exposed to liver fluke. The Getis-Ord Gi* statistic identified 74 high-risk and 130 low-risk significant (Pclimatic variables (monthly and seasonal mean rainfall and temperatures, total wet days and rain days) and environmental datasets (soil types, enhanced vegetation index and normalised difference vegetation index) were used to investigate dissimilarities in the exposure to liver fluke between clusters. Rainfall, total wet days and rain days, and soil type were the significant classes of climatic and environmental variables explaining the differences between significant clusters. A discriminant function analysis was used to predict the exposure risk to liver fluke using 80% of data for modelling and the remaining subset of 20% for post hoc model validation. The most significant predictors of the model risk function were total rainfall in August and September and total wet days. The risk model presented 100% sensitivity and 91% specificity and an accuracy of 95% correctly classified cases. A risk map of exposure to liver fluke was constructed with higher probability of exposure in western and north-western regions. The results of this study identified differences between clusters of fasciolosis in Ireland regarding climatic and environmental variables and detected significant predictors of the exposure risk to liver fluke. Copyright © 2015 Elsevier B.V. All rights reserved.

  5. Identification of lead chemotherapeutic agents from medicinal plants against blood flukes and whipworms.

    Science.gov (United States)

    Wangchuk, Phurpa; Giacomin, Paul R; Pearson, Mark S; Smout, Michael J; Loukas, Alex

    2016-08-30

    Schistosomiasis and trichuriasis are two of the most common neglected tropical diseases (NTD) that affect almost a billion people worldwide. There is only a limited number of effective drugs to combat these NTD. Medicinal plants are a viable source of parasiticides. In this study, we have investigated six of the 19 phytochemicals isolated from two Bhutanese medicinal plants, Corydalis crispa and Pleurospermum amabile, for their anthelmintic properties. We used the xWORM technique and Scanning Electron Microscope-based imaging to determine the activity of the compounds. Of the six compounds tested, isomyristicin and bergapten showed significant anthelmintic activity against Schistosoma mansoni and Trichuris muris with bergapten being the most efficacious compound one against both parasites (S. mansoni IC50 = 8.6 μg/mL and T. muris IC50 = 10.6 μg/mL) and also against the schistosomulum stage of S. mansoni. These two compounds induced tegumental damage to S. mansoni and affected the cuticle, bacillary bands and bacillary glands of T. muris. The efficacy against multiple phylogenetically distinct parasites and different life stages, especially the schistosomulum where praziquantel is ineffective, makes isomyristicin and bergapten novel scaffolds for broad-spectrum anthelmintic drug development that could be used for the control of helminths infecting humans and animals.

  6. Structural Basis for Inhibition of Cathepsin B Drug Target from the Human Blood Fluke, Schistosoma mansoni

    Czech Academy of Sciences Publication Activity Database

    Jílková, Adéla; Řezáčová, Pavlína; Lepšík, Martin; Horn, Martin; Váchová, Jana; Fanfrlík, Jindřich; Brynda, Jiří; McKerrow, J. H.; Caffrey, C. R.; Mareš, Michael

    2011-01-01

    Roč. 286, č. 41 (2011), s. 35770-35881 ISSN 0021-9258 R&D Projects: GA ČR GA203/09/1585; GA ČR GAP208/11/0295; GA MŠk OC09007 Institutional research plan: CEZ:AV0Z40550506; CEZ:AV0Z50520514 Keywords : cathepsin B * schistosoma * crystal structure Subject RIV: CC - Organic Chemistry Impact factor: 4.773, year: 2011

  7. A systematically improved high quality genome and transcriptome of the human blood fluke Schistosoma mansoni.

    Directory of Open Access Journals (Sweden)

    Anna V Protasio

    2012-01-01

    Full Text Available Schistosomiasis is one of the most prevalent parasitic diseases, affecting millions of people in developing countries. Amongst the human-infective species, Schistosoma mansoni is also the most commonly used in the laboratory and here we present the systematic improvement of its draft genome. We used Sanger capillary and deep-coverage Illumina sequencing from clonal worms to upgrade the highly fragmented draft 380 Mb genome to one with only 885 scaffolds and more than 81% of the bases organised into chromosomes. We have also used transcriptome sequencing (RNA-seq from four time points in the parasite's life cycle to refine gene predictions and profile their expression. More than 45% of predicted genes have been extensively modified and the total number has been reduced from 11,807 to 10,852. Using the new version of the genome, we identified trans-splicing events occurring in at least 11% of genes and identified clear cases where it is used to resolve polycistronic transcripts. We have produced a high-resolution map of temporal changes in expression for 9,535 genes, covering an unprecedented dynamic range for this organism. All of these data have been consolidated into a searchable format within the GeneDB (www.genedb.org and SchistoDB (www.schistodb.net databases. With further transcriptional profiling and genome sequencing increasingly accessible, the upgraded genome will form a fundamental dataset to underpin further advances in schistosome research.

  8. Cathepsin F cysteine protease of the human liver fluke, Opisthorchis viverrini.

    Directory of Open Access Journals (Sweden)

    Porntip Pinlaor

    Full Text Available The liver fluke Opisthorchis viverrini is classified as a class I carcinogen due to the association between cholangiocarcinoma and chronic O. viverrini infection. During its feeding activity within the bile duct, the parasite secretes several cathepsin F cysteine proteases that may induce or contribute to the pathologies associated with hepatobiliary abnormalities.Here, we describe the cDNA, gene organization, phylogenetic relationships, immunolocalization, and functional characterization of the cathepsin F cysteine protease gene, here termed Ov-cf-1, from O. viverrini. The full length mRNA of 1020 nucleotides (nt encoded a 326 amino acid zymogen consisting of a predicted signal peptide (18 amino acids, aa, prosegment (95 aa, and mature protease (213 aa. BLAST analysis using the Ov-CF-1 protein as the query revealed that the protease shared identity with cathepsin F-like cysteine proteases of other trematodes, including Clonorchis sinensis (81%, Paragonimus westermani (58%, Schistosoma mansoni and S. japonicum (52%, and with vertebrate cathepsin F (51%. Transcripts encoding the protease were detected in all developmental stages that parasitize the mammalian host. The Ov-cf-1 gene, of approximately 3 kb in length, included seven exons interrupted by six introns; the exons ranged from 69 to 267 bp in length, the introns from 43 to 1,060 bp. The six intron/exon boundaries of Ov-cf-1 were conserved with intron/exon boundaries in the human cathepsin F gene, although the gene structure of human cathepsin F is more complex. Unlike Ov-CF-1, human cathepsin F zymogen includes a cystatin domain in the prosegment region. Phylogenetic analysis revealed that the fluke, human, and other cathepsin Fs branched together in a clade discrete from the cathepsin L cysteine proteases. A recombinant Ov-CF-1 zymogen that displayed low-level activity was expressed in the yeast Pichia pastoris. Although the recombinant protease did not autocatalytically process and

  9. Exploit Kit traffic analysis

    OpenAIRE

    Καπίρης, Σταμάτης; Kapiris, Stamatis

    2017-01-01

    Exploit kits have become one of the most widespread and destructive threat that Internet users face on a daily basis. Since the first actor, which has been categorized as exploit kit, namely MPack, appeared in 2006, we have seen a new era on exploit kit variants compromising popular websites, infecting hosts and delivering destructive malware, following an exponentially evolvement to date. With the growing threat landscape, large enterprises to domestic networks, have starte...

  10. Exploitability Assessment with TEASER

    Science.gov (United States)

    2017-05-01

    for architectural neutral taint analysis on top of LLVM and QEMU. POC Proof of Concept : Demonstration of an exploit on a program . vii RCE Remote Code...bug with a Proof of Concept (POC), or input to a program demonstrating the ability to use a bug to exploit the application, to demonstrate the...often leads to either computationally difficult constraint solving problems or taint explosion. Given the computational difficulty of exploit

  11. Anthropology of sexual exploitation

    Directory of Open Access Journals (Sweden)

    Lalić Velibor

    2009-01-01

    Full Text Available In this paper, the authors observe sexual exploitation from an anthropological perspective. They analyze the rational, ethical, emotional and mythological dimensions of human sexuality. Consequently, after setting the phenomenon in a social and historical context, sexual exploitation is closely observed in the contemporary age. Based on thoughts of relevant thinkers, they make the conclusion that the elimination of sexual exploitation is not an utterly legal issue, but political and economical issues as well. Namely, legal norms are not sufficient to overcome sexual exploitation, but, political and economical relationships in contemporary societies, which will be based on sincere equal opportunities must be established.

  12. Functional Analysis of the Unique Cytochrome P450 of the Liver Fluke Opisthorchis felineus.

    Directory of Open Access Journals (Sweden)

    Mariya Y Pakharukova

    2015-12-01

    Full Text Available The basic metabolic cytochrome P450 (CYP system is essential for biotransformation of sterols and xenobiotics including drugs, for synthesis and degradation of signaling molecules in all living organisms. Most eukaryotes including free-living flatworms have numerous paralogues of the CYP gene encoding heme monooxygenases with specific substrate range. Notably, by contrast, the parasitic flatworms have only one CYP gene. The role of this enzyme in the physiology and biochemistry of helminths is not known. The flukes and tapeworms are the etiologic agents of major neglected tropical diseases of humanity. Three helminth infections (Opisthorchis viverrini, Clonorchis sinensis and Schistosoma haematobium are considered by the International Agency for Research on Cancer (IARC as definite causes of cancer. We focused our research on the human liver fluke Opisthorchis felineus, an emerging source of biliary tract disease including bile duct cancer in Russia and central Europe. The aims of this study were (i to determine the significance of the CYP activity for the morphology and survival of the liver fluke, (ii to assess CYP ability to metabolize xenobiotics, and (iii to localize the CYP activity in O. felineus tissues. We observed high constitutive expression of CYP mRNA (Real-time PCR in O. felineus. This enzyme metabolized xenobiotics selective for mammalian CYP2E1, CYP2B, CYP3A, but not CYP1A, as determined by liquid chromatography and imaging analyses. Tissue localization studies revealed the CYP activity in excretory channels, while suppression of CYP mRNA by RNA interference was accompanied by morphological changes of the excretory system and increased mortality rates of the worms. These results suggest that the CYP function is linked to worm metabolism and detoxification. The findings also suggest that the CYP enzyme is involved in vitally important processes in the organism of parasites and is a potential drug target.

  13. Blood

    Science.gov (United States)

    ... a reduced production of red blood cells, including: Iron deficiency anemia. Iron deficiency anemia is the most common type of anemia and ... inflammatory bowel disease are especially likely to have iron deficiency anemia. Anemia due to chronic disease. People with chronic ...

  14. Exploitation and disadvantage

    NARCIS (Netherlands)

    Ferguson, B.

    2016-01-01

    According to some accounts of exploitation, most notably Ruth Sample's (2003) degradation-based account and Robert Goodin's (1987) vulnerability-based account, exploitation occurs when an advantaged party fails to constrain their advantage in light of another's disadvantage, regardless of the cause

  15. EXPLOITATION OF GRANITE BOULDER

    Directory of Open Access Journals (Sweden)

    Ivan Cotman

    1994-12-01

    Full Text Available The processes of forming, petrography, features, properties and exploitation of granite boulders are described. The directional drilling and black powder blasting is the succesful method in exploitation of granite boulders (boulder technology (the paper is published in Croatian.

  16. A comparison of the efficacy of doramectin, closantel and levamisole in the treatment of the 'oriental eye fluke', Philophthalmus gralli, in commercially reared ostriches (Struthio camelus : short communication

    Directory of Open Access Journals (Sweden)

    S. Mukaratirwa

    2008-05-01

    Full Text Available Commercially reared ostriches at Msengi farm situated in the Chinhoyi area of Mashonaland West province in Zimbabwe were found to be infected with the 'oriental eye fluke', Philopthalmus gralli, in 2001. This was the 1st record of the fluke in Zimbabwe. Trials were conducted to identify a suitable drug for the treatment of this fluke. A total of 12 ostriches confirmed to be infected with the fluke through clinical examination of the eyes and identification of the fluke were randomly divided into 3 equal groups, with each group receiving a different treatment protocol. The 3 drugs used were doramectin, levamisole and closantel. Each of the drugs was used in combination with chloramphenicol as an eye ointment. Levamisole was administered topically into the eye whereas doramectin and closantel were administered parenterally as an intramuscular injection. The results indicated a positive response in levamisole-treated birds but there were no noticeable responses to doramectin and closantel treatments.

  17. Nuclear magnetic resonance (NMR): application to examine liver tissues during invasion of the Liver fluke in cattle

    International Nuclear Information System (INIS)

    Wranicz, M.; Podbielski, T.; Grabiec, S.

    1989-01-01

    The T 1 and T 2 relaxation times of protons of hydrogen in the liver parenchyma and biliary ducts in normal and parazitized by the Liver fluke cows were determined. A method of the NMR in which a lenght or relaxation time is an index was applied. The value of this index is characteristic for determined physiological and pathological states of cells and it reveals changes which developed in body cells. It was found that tissues of cows parazitized by the Liver fluke (parenchyma and biliary ducts) and healthy ones differ significantly by the lenght of relaxation times. Parazitized tissues show a longer relaxation time than tissues of normal cows. (author)

  18. Clonorchis sinensis, an oriental liver fluke, as a human biological agent of cholangiocarcinoma: a brief review.

    Science.gov (United States)

    Kim, Tong-Soo; Pak, Jhang Ho; Kim, Jong-Bo; Bahk, Young Yil

    2016-11-01

    Parasitic diseases remain an unarguable public health problem worldwide. Liver fluke Clonorchis sinensis is a high risk pathogenic parasitic helminth which is endemic predominantly in Asian countries, including Korea, China, Taiwan, Vietnam, and the far eastern parts of Russia, and is still actively transmitted. According to the earlier 8th National Survey on the Prevalence of Intestinal Parasitic Infections in 2012, C. sinensis was revealed as the parasite with highest prevalence of 1.86% in general population among all parasite species surveyed in Korea. This fluke is now classified under one of the definite Group 1 human biological agents (carcinogens) by International Agency of Research on Cancer (IARC) along with two other parasites, Opisthorchis viverrini and Schistosoma haematobium. C. sinensis infestation is mainly linked to liver and biliary disorders, especially cholangiocarcinoma (CCA). For the purposes of this mini-review, we will only focus on C. sinensis and review pathogenesis and carcinogenesis of clonorchiasis, disease condition by C. sinensis infestation, and association between C. sinensis infestation and CCA. In this presentation, we briefly consider the current scientific status for progression of CCA by heavy C. sinensis infestation from the food-borne trematode and development of CCA. [BMB Reports 2016; 49(11): 590-597].

  19. Poverty-Exploitation-Alienation.

    Science.gov (United States)

    Bronfenbrenner, Martin

    1980-01-01

    Illustrates how knowledge derived from the discipline of economics can be used to help shed light on social problems such as poverty, exploitation, and alienation, and can help decision makers form policy to minimize these and similar problems. (DB)

  20. Exploiting VM/XA

    International Nuclear Information System (INIS)

    Boeheim, C.

    1990-03-01

    The Stanford Linear Accelerator Center has recently completed a conversion to IBM's VM/XA SP Release 2 operating system. The primary physics application had been constrained by the previous 16 megabyte memory limit. Work is underway to enable this application to exploit the new features of VM/XA. This paper presents a brief tutorial on how to convert an application to exploit VM/XA and discusses some of the SLAC experiences in doing so. 13 figs

  1. Genetic diversity of the Chinese liver fluke Clonorchis sinensis from Russia and Vietnam.

    Science.gov (United States)

    Chelomina, Galina N; Tatonova, Yulia V; Hung, Nguyen Manh; Ngo, Ha Duy

    2014-10-01

    Clonorchiasis is a parasitic disease of high public health importance in many countries in southeastern Asia and is caused by the Chinese liver fluke Clonorchis sinensis. However, the genetic structure and demographic history of its populations has not been sufficiently studied throughout the geographic range of the species and available data are based mainly on partial gene sequencing. In this study, we explored the genetic diversity of the complete 1560 bp cytochrome c oxidase subunit 1 (cox1) gene sequence for geographically isolated C. sinensis populations in Russia and Vietnam, to our knowledge for the first time. The results demonstrated low nucleotide and high haplotype differentiation within and between the two compared regions and a clear geographical vector for the distribution of genetic diversity patterns among the studied populations. These results suggest a deep local adaptation of the parasite to its environment including intermediate hosts and the existence of gene flow across the species' range. Additionally, we have predicted an amino acid substitution in the functional site of the COX1 protein among the Vietnamese populations, which were reported to be difficult to treat with praziquantel. The haplotype networks consisted of several region-specific phylogenetic lineages, the formation of which could have occurred during the most extensive penultimate glaciations in the Pleistocene Epoch. The patterns of genetic diversity and demographics are consistent with population growth of the liver fluke in the late Pleistocene following the Last Glacial Maximum, indicating the lack of a population bottleneck during the recent past in the species' history. The data obtained have important implications for understanding the phylogeography of C. sinensis, its host-parasite interactions, the ability of this parasite to evolve drug resistance, and the epidemiology of clonorchiasis under global climate change. Copyright © 2014 Australian Society for

  2. Genome-wide characterization of microsatelittes and marker development in the carcinogenic liver fluke Clonorchis sinensis

    Science.gov (United States)

    Nguyen, Thao T.B.; Arimatsu, Yuji; Hong, Sung-Jong; Brindley, Paul J.; Blair, David; Laha, Thewarach; Sripa, Banchob

    2015-01-01

    Clonorchis sinensis is an important carcinogenic human liver fluke endemic in East and Southeast Asia. There are several conventional molecular markers have been used for identification and genetic diversity, however, no information about microsatellites of this liver fluke published so far. We here report microsatellite characterization and marker development for genetic diversity study in C. sinensis using genome-wide bioinformatics approach. Based on our search criteria, a total of 256,990 microsatellites (≥ 12 base pairs) were identified from genome database of C. sinensis with hexa-nucleotide motif being the most abundant (51%) followed by penta-nucleotide (18.3%) and tri-nucleotide (12.7%). The tetra-nucleotide, di-nucleotide and mononucleotide motifs accounted for 9.75 %, 7.63% and 0.14%, respectively. The total length of all microsatellites accounts for 0. 72 % of 547 Mb of the whole genome size and the frequency of microsatellites were found to be one microsatellite in every 2.13 kb of DNA. For the di-, tri, and tetra-nucleotide, the repeat numbers redundant are six (28%), four (45%) and three (76%), respectively. The ATC repeat is the most abundant microsatellites followed by AT, AAT and AC, respectively. Within 40 microsatellite loci developed, 24 microsatellite markers showed potential to differentiate between C. sinensis and O. viverrini. Seven out of 24 loci showed heterozygous with observed heterozygosity ranged from 0.467 to 1. Four-primer sets could amplify both C. sinensis and O. viverrini DNA with different sizes. This study provides basic information of C. sinensis microsatellites and the genome-wide markers developed may be a useful tool for genetic study of C. sinensis. PMID:25782682

  3. Genome-wide characterization of microsatellites and marker development in the carcinogenic liver fluke Clonorchis sinensis.

    Science.gov (United States)

    Nguyen, Thao T B; Arimatsu, Yuji; Hong, Sung-Jong; Brindley, Paul J; Blair, David; Laha, Thewarach; Sripa, Banchob

    2015-06-01

    Clonorchis sinensis is an important carcinogenic human liver fluke endemic in East and Southeast Asia. There are several conventional molecular markers that have been used for identification and genetic diversity; however, no information about microsatellites of this liver fluke is published so far. We here report microsatellite characterization and marker development for a genetic diversity study in C. sinensis, using a genome-wide bioinformatics approach. Based on our search criteria, a total of 256,990 microsatellites (≥12 base pairs) were identified from a genome database of C. sinensis, with hexanucleotide motif being the most abundant (51%) followed by pentanucleotide (18.3%) and trinucleotide (12.7%). The tetranucleotide, dinucleotide, and mononucleotide motifs accounted for 9.75, 7.63, and 0.14%, respectively. The total length of all microsatellites accounts for 0. 72% of 547 Mb of the whole genome size, and the frequency of microsatellites was found to be one microsatellite in every 2.13 kb of DNA. For the di-, tri-, and tetranucleotide, the repeat numbers redundant are six (28%), four (45%), and three (76%), respectively. The ATC repeat is the most abundant microsatellites followed by AT, AAT, and AC, respectively. Within 40 microsatellite loci developed, 24 microsatellite markers showed potential to differentiate between C. sinensis and Opisthorchis viverrini. Seven out of 24 loci showed to be heterozygous with observed heterozygosity that ranged from 0.467 to 1. Four primer sets could amplify both C. sinensis and O. viverrini DNA with different sizes. This study provides basic information of C. sinensis microsatellites, and the genome-wide markers developed may be a useful tool for the genetic study of C. sinensis.

  4. Dissemination and Exploitation Strategy

    DEFF Research Database (Denmark)

    Badger, Merete; Monaco, Lucio; Fransson, Torsten

    of Technology in Sweden, Politecnico di Torino in Italy, and Eindhoven University of Technology in the Netherlands. The project is partially funded by the European Commission under the 7th Framework Programme (project no. RI-283746). This report describes the final dissemination and exploitation strategy...... for project Virtual Campus Hub. A preliminary dissemination and exploitation plan was setup early in the project as described in the deliverable D6.1 Dissemination strategy paper - preliminary version. The plan has been revised on a monthly basis during the project’s lifecycle in connection with the virtual...

  5. Molecular identification of Clonorchis sinensis and discrimination with other opisthorchid liver fluke species using Multiple Ligation-dependent Probe Amplification (MLPA).

    NARCIS (Netherlands)

    Sun, J.; Xu, J.; Liang, P.; Mao, Q.; Huang, Y.; Lu, X.; Deng, C.; Liang, C.; de Hoog, G.S.; Yu, X.

    2011-01-01

    Background Infections with the opisthorchid liver flukes Clonorchis sinensis, Opisthorchis viverrini, and O. felineus cause severe health problems globally, particularly in Southeast Asia. Early identification of the infection is essential to provide timely and appropriate chemotherapy to patients.

  6. GIS-based spatial statistical analysis of risk areas for liver flukes in Surin Province of Thailand.

    Science.gov (United States)

    Rujirakul, Ratana; Ueng-arporn, Naporn; Kaewpitoon, Soraya; Loyd, Ryan J; Kaewthani, Sarochinee; Kaewpitoon, Natthawut

    2015-01-01

    It is urgently necessary to be aware of the distribution and risk areas of liver fluke, Opisthorchis viverrini, for proper allocation of prevention and control measures. This study aimed to investigate the human behavior, and environmental factors influencing the distribution in Surin Province of Thailand, and to build a model using stepwise multiple regression analysis with a geographic information system (GIS) on environment and climate data. The relationship between the human behavior, attitudes (R Square=0.878, and, Adjust R Square=0.849. By GIS analysis, we found Si Narong, Sangkha, Phanom Dong Rak, Mueang Surin, Non Narai, Samrong Thap, Chumphon Buri, and Rattanaburi to have the highest distributions in Surin province. In conclusion, the combination of GIS and statistical analysis can help simulate the spatial distribution and risk areas of liver fluke, and thus may be an important tool for future planning of prevention and control measures.

  7. Assessing the Role of Climate Variability on Liver Fluke Risk in the UK Through Mechanistic Hydro-Epidemiological Modelling

    Science.gov (United States)

    Beltrame, L.; Dunne, T.; Rose, H.; Walker, J.; Morgan, E.; Vickerman, P.; Wagener, T.

    2016-12-01

    Liver fluke is a flatworm parasite infecting grazing animals worldwide. In the UK, it causes considerable production losses to cattle and sheep industries and costs farmers millions of pounds each year due to reduced growth rates and lower milk yields. Large part of the parasite life-cycle takes place outside of the host, with its survival and development strongly controlled by climatic and hydrologic conditions. Evidence of climate-driven changes in the distribution and seasonality of fluke disease already exists, as the infection is increasingly expanding to new areas and becoming a year-round problem. Therefore, it is crucial to assess current and potential future impacts of climate variability on the disease to guide interventions at the farm scale and mitigate risk. Climate-based fluke risk models have been available since the 1950s, however, they are based on empirical relationships derived between historical climate and incidence data, and thus are unlikely to be robust for simulating risk under changing conditions. Moreover, they are not dynamic, but estimate risk over large regions in the UK based on monthly average climate conditions, so they do not allow investigating the effects of climate variability for supporting farmers' decisions. In this study, we introduce a mechanistic model for fluke, which represents habitat suitability for disease development at 25m resolution with a daily time step, explicitly linking the parasite life-cycle to key hydro-climate conditions. The model is used on a case study in the UK and sensitivity analysis is performed to better understand the role of climate variability on the space-time dynamics of the disease, while explicitly accounting for uncertainties. Comparisons are presented with experts' knowledge and a widely used empirical model.

  8. Molecular evidence shows that the liver fluke Fasciola gigantica is the predominant Fasciola species in ruminants from Pakistan.

    Science.gov (United States)

    Chaudhry, U; van Paridon, B; Shabbir, M Z; Shafee, M; Ashraf, K; Yaqub, T; Gilleard, J

    2016-03-01

    Fascioliasis is an important disease affecting livestock, with great costs to producers worldwide. It has also become a serious issue for human populations in some endemic areas as an emerging zoonotic infection. There are two Fasciola species of liver fluke responsible for this disease, which occur worldwide, Fasciola hepatica and Fasciola gigantica. Identifying these two species on the basis of adult or egg morphology requires specialist knowledge due to the similarity of characters, and may misidentify putative intermediate or hybrid forms. In this study we sequenced the internal transcribed spacer 2 (ITS-2) rDNA of liver flukes collected from multiple species of hosts from seven localities in the Punjab and Baluchistan provinces of Pakistan, to determine the distribution of these two species. All 46 flukes processed in this study, collected from seven sites, showed the rDNA ITS-2 genotype corresponding to F. gigantica, contradicting previous reports, based on adult and egg morphology, that both species are present in Pakistan, with F. hepatica being the more common.

  9. Cyclophilin A enhances cell proliferation and tumor growth of liver fluke-associated cholangiocarcinoma

    Directory of Open Access Journals (Sweden)

    Sawanyawisuth Kanlayanee

    2011-08-01

    Full Text Available Abstract Background Cyclophilin A (CypA expression is associated with malignant phenotypes in many cancers. However, the role and mechanisms of CypA in liver fluke-associated cholangiocarcinoma (CCA are not presently known. In this study, we investigated the expression of CypA in CCA tumor tissues and CCA cell lines as well as regulation mechanisms of CypA in tumor growth using CCA cell lines. Methods CypA expression was determined by real time RT-PCR, Western blot or immunohistochemistry. CypA silence or overexpression in CCA cells was achieved using gene delivery techniques. Cell proliferation was assessed using MTS assay or Ki-67 staining. The effect of silencing CypA on CCA tumor growth was determined in nude mice. The effect of CypA knockdown on ERK1/2 activation was assessed by Western blot. Results CypA was upregulated in 68% of CCA tumor tissues. Silencing CypA significantly suppressed cell proliferation in several CCA cell lines. Likewise, inhibition of CypA peptidyl-prolyl cis-trans isomerase (PPIase activity using cyclosporin A (CsA decreased cell proliferation. In contrast, overexpression of CypA resulted in 30% to 35% increases in proliferation of CCA cell lines. Interestingly, neither silence nor overexpression of CypA affected cell proliferation of a non-tumor human cholangiocyte cell line, MMNK1. Suppression of CypA expression attenuated ERK1/2 activity in CCA M139 cells by using both transient and stable knockdown methods. In the in vivo study, there was a 43% reduction in weight of tumors derived from CypA-silenced CCA cell lines compared with control vector CCA tumors in mice; these tumors with stable CypA silencing showed a reduced cell proliferation. Conclusions CypA is upregulated in majority of CCA patients' tissues and confers a significant growth advantage in CCA cells. Suppression of CypA expression decreases proliferation of CCA cell lines in vitro and reduces tumor growth in the nude mouse model. Inhibition of Cyp

  10. Experimental studies on the blood loss and intake of /sup 51/Cr labelled red cells by Clonorchis sinensis in rabbits

    Energy Technology Data Exchange (ETDEWEB)

    Lee, M.J.; Kim, J.R.; Rim, H.J. (Korea Univ, Seoul (Republic of Korea). Coll. of Medicine)

    1982-03-01

    Experimental study was carried out to observe the blood loss due to the ingestion of host blood by Colonorchis sinensis in the rabbits by using chromium radioisotope /sup 51/Cr. On the other hand, in order to confirm the blood intake activity by the worms, the radioactivity was measured on blood, bile juice and flukes removed from the bile ducts of the rabbits experimentally infected with C. sinensis.

  11. Experimental studies on the blood loss and intake of 51Cr labelled red cells by Clonorchis sinensis in rabbits

    International Nuclear Information System (INIS)

    Lee, M.J.; Kim, J.R.; Rim, H.J.

    1982-01-01

    Experimental study was carried out to observe the blood loss due to the ingestion of host blood by Colonorchis sinensis in the rabbits by using chromium radioisotope 51 Cr. On the other hand, in order to confirm the blood intake activity by the worms, the radioactivity was measured on blood, bile juice and flukes removed from the bile ducts of the rabbits experimentally infected with C. sinensis. (Author)

  12. Hacking the art of exploitation

    CERN Document Server

    Erickson, Jon

    2003-01-01

    A comprehensive introduction to the techniques of exploitation and creative problem-solving methods commonly referred to as "hacking," Hacking: The Art of Exploitation is for both technical and non-technical people who are interested in computer security. It shows how hackers exploit programs and write exploits, instead of just how to run other people's exploits. Unlike many so-called hacking books, this book explains the technical aspects of hacking, including stack based overflows, heap based overflows, string exploits, return-into-libc, shellcode, and cryptographic attacks on 802.11b.

  13. Heterophysiasis, an intestinal fluke infection of man and vertebrates transmitted by euryhaline gastropods and fish

    Science.gov (United States)

    Taraschewski, H.

    1984-03-01

    Heterophyes heterophyes, agent of human heterophyiasis in the Near East, is transmitted in marine lagoons and saline inland waters, where the euryhaline intermediate hosts are abundant. In Egypt, mullets, the predominant second intermediate hosts, are customarily consumed raw; thus man becomes infected easily. Symptoms of human infections are usually considered mild. Mullets do not seem to be affected by the metacercariae encysted in the muscles, whereas the growth of the snail host Pirenella conica was found to be enhanced due to the infestation by the trematodes. In laboratory experiments, the flukes were found to be well developed in dogs, foxes and cats, but failed to reach sexual maturity in several other potentially piscivorous mammals and birds. In nature, dogs probably serve as the major reservoir hosts. Heterophyiasis is most prevalent in the Nile Delta, a huge brackish water area which is densely populated by humans and, consequently, also by dogs and cats. In the Far East, besides Heterophyes nocens, several other heterophysids with marine or fresh-water life-cycles are known to infect humans.

  14. Recombinant adenylate kinase 3 from liver fluke Clonorchis sinensis for histochemical analysis and serodiagnosis of clonorchiasis.

    Science.gov (United States)

    Kwon, Soon Bin; Kim, Paul; Woo, Hae Sun; Kim, Tae Yun; Kim, Ju Yeong; Lee, Hye Min; Jang, Yun Soo; Kim, Eun-Min; Yong, Tai-Soon; Seong, Baik Lin

    2018-03-27

    Due to the lack of an effective prophylactic intervention and diagnosis, human liver fluke Clonorchis sinensis continues to afflict a large human population, causing a chronic inflammatory bile duct disease. With an aim to identify target antigens for sensitive serodiagnosis, adenylate kinase 3 of C. sinensis (CsAK3) was successfully expressed in soluble form in Escherichia coli by fusion to an RNA-interacting domain derived from human Lys-tRNA synthetase and purified by Ni2+-affinity chromatography. Anti-CsAK3 serum was raised by immunization of mice, and Western blotting confirmed that CsAK3 was expressed in adult-stage C. sinensis. Histochemical analysis showed that CsAK3 was localized to the subtegumental tissue of C. sinensis and was excreted into the bile duct of the host. When tested against sera from various parasite-infected patients by enzyme-linked immunosorbent assay, the recombinant CsAK3 elicited a specific response to C. sinensis-infected sera. The results suggest that CsAK3, either alone or in combination with other antigens, could be used for improving the clinical diagnosis of clonorchiasis.

  15. Nanostructured Basaltfiberconcrete Exploitational Characteristics

    Science.gov (United States)

    Saraykina, K. A.; Shamanov, V. A.

    2017-11-01

    The article demonstrates that the mass use of basalt fiber concrete (BFC) is constrained by insufficient study of their durability and serviceability in a variety of environments. This research is aimed at the study of the basalt fiber corrosion processes in the cement stone of BFC, the control of the new products structure formation in order to protect the reinforcing fiber from alkaline destruction and thereby improve the exploitational characteristics of the composite. The research result revealed that the modification of basaltfiber concrete by the dispersion of MWNTs contributes to the directional formation of new products in the cement matrix. The HAM additive in basaltfiberconcrete provides for the binding of portlandite to low-basic calcium hydroaluminosilicates, thus reducing the aggressive effect of the cement environment on the reinforcing fibers properties. The complex modification of BFC with nanostructured additives provides for an increase in its durability and exploitational properties (strength, frost resistance and water resistance) due to basalt fiber protection from alkali corrosion on account of the compacting of the contact zone “basalt fiber - cement stone” and designing of the new products structure and morphology of cement matrix over the fiber surface.

  16. Exploitation by Economic Necessity

    Directory of Open Access Journals (Sweden)

    Kristian F. Braekkan

    2015-10-01

    Full Text Available This study develops and tests a model that proposes economic necessity moderates the relationship between psychological contract violations (PCVs and organizational commitment and trust in the employing organization among non-unionized manufacturing workers (N = 226. Moderated regression analyses revealed that there was a significant interaction between PCV and economic necessity in predicting both outcomes. Specifically, the findings indicated that individuals experiencing high PCV and high economic necessity did not decrease their organizational commitment like their counterparts who endorsed lower economic necessity. They did, however, experience significantly decreased trust in their employer. The findings suggest that individuals who are forced to sell their labor power and obtain what they need through the market are more likely to continue to be exploited by their employer, as they have no other options than to continue the relationship. The importance of the findings is discussed, and recommendations for future research are provided.

  17. Exploitative Learning by Exporting

    DEFF Research Database (Denmark)

    Golovko, Elena; Lopes Bento, Cindy; Sofka, Wolfgang

    Decisions on entering foreign markets are among the most challenging but also potentially rewarding strategy choices managers can make. In this study, we examine the effect of export entry on the firm investment decisions in two activities associated with learning about new technologies...... and learning about new markets ? R&D investments and marketing investments, in search of novel insights into the content and process underlying learning by exporting. We draw from organizational learning theory for predicting changes in both R&D and marketing investment patterns that accompany firm entry......, it is predominantly the marketing-related investment decisions associated with starting to export that lead to increases in firm productivity. We conclude that learning-by-exporting might be more properly characterized as ?learning about and exploiting new markets? rather than ?learning about new technologies...

  18. Learning Metasploit exploitation and development

    CERN Document Server

    Balapure, Aditya

    2013-01-01

    A practical, hands-on tutorial with step-by-step instructions. The book will follow a smooth and easy-to-follow tutorial approach, covering the essentials and then showing the readers how to write more sophisticated exploits.This book targets exploit developers, vulnerability analysts and researchers, network administrators, and ethical hackers looking to gain advanced knowledge in exploitation development and identifying vulnerabilities. The primary goal is to take readers wishing to get into more advanced exploitation discovery and reaching the next level.Prior experience exploiting basic st

  19. Identification of Fasciola flukes in Thailand based on their spermatogenesis and nuclear ribosomal DNA, and their intraspecific relationships based on mitochondrial DNA.

    Science.gov (United States)

    Chaichanasak, Pannigan; Ichikawa, Madoka; Sobhon, Prasert; Itagaki, Tadashi

    2012-12-01

    We analyzed 147 Fasciola flukes obtained from cattle in Thailand based on their spermatogenetic ability, and nuclear ribosomal internal transcribed spacer 1 (ITS1) and mitochondrial nicotiamide adenine dinucleotide dehydrogenase subunit 1 (ND1) genes as molecular markers. One hundred twenty-eight flukes, which had abundant sperm in their seminal vesicles (spermic) and showed the PCR-RFLP pattern of F. gigantica in the ITS1, were accurately identified as F. gigantica. The other 19 flukes that had no sperm in their seminal vesicles were aspermic Fasciola sp. with the RFLP patterns identical to that of F. gigantica. Twenty-nine ND1 haplotypes (Fg-ND1-Thai 2-30) were distinguished in the 128 F. gigantica flukes and were divided into haplotypes unique to Thailand and those common to other countries, suggesting the possibility that ancestral haplotypes were introduced into Thailand. Three haplotypes (Fg-ND1-Thai 7, 9 and 27) appeared to be the major haplotypes found in F. gigantica from Thailand. Only one haplotype (Fg-ND1-Thai 1) was found in the 19 aspermic Fasciola sp. flukes obtained from geographical regions, and the nucleotide sequence of Fg-ND1-Thai 1 was identical to that of the aspermic Fasciola sp. from Japan, Korea, China, Vietnam and Myanmar, suggesting that they were descendants with a common provenance and expanded to these countries in the relatively recent past. Copyright © 2012 Elsevier Ireland Ltd. All rights reserved.

  20. Prevalence and seasonal incidence of nematode parasites and fluke infections of sheep and goats in eastern Ethiopia.

    Science.gov (United States)

    Sissay, Menkir M; Uggla, Arvid; Waller, Peter J

    2007-10-01

    A 2-year abattoir survey was carried out to determine the prevalence, abundance and seasonal incidence of gastro-intestinal (GI) nematodes and trematodes (flukes) of sheep and goats in the semi-arid zone of eastern Ethiopia. During May 2003 to April 2005, viscera including liver, lungs and GI tracts were collected from 655 sheep and 632 goats slaughtered at 4 abattoirs located in the towns of Haramaya, Harar, Dire Dawa and Jijiga in eastern Ethiopia. All animals were raised in the farming areas located within the community boundaries for each town. Collected materials were transported within 24 h to the parasitology laboratory of Haramaya University for immediate processing. Thirteen species belonging to 9 genera of GI nematodes (Haemonchus contortus, Trichostrongylus axei, T. colubriformis, T. vitrinus, Nematodirus filicollis, N. spathiger Oesopha-gostomum columbianum, O. venulosum, Strongyloides papillosus, Bunostomum trigonocephalum, Trichuris ovis, Cooperia curticei and Chabertia ovina), and 4 species belonging to 3 genera of trematodes (Fasciola hepatica, F. gigantica, Paramphistomum {Calicohoron} microbothrium and Dicrocoelium dendriticum) were recorded in both sheep and goats. All animals in this investigation were infected with multiple species to varying degrees. The mean burdens of adult nematodes were generally moderate in both sheep and goats and showed patterns of seasonal abundance that corresponded with the bi-modal annual rainfall pattern, with highest burdens around the middle of the rainy season. In both sheep and goats there were significant differences in the mean worm burdens and abundance of the different nematode species between the four geographic locations, with worm burdens in the Haramaya and Harar areas greater than those observed in the Dire Dawa and Jijiga locations. Similar seasonal variations were also observed in the prevalence of flukes. But there were no significant differences in the prevalence of each fluke species between the

  1. Survey of gastrointestinal parasites, liver flukes and lungworm in feces from dairy cattle in the high tropics of Antioquia, Colombia

    Directory of Open Access Journals (Sweden)

    Jenny J. Chaparro

    2016-06-01

    Full Text Available A cross sectional study was undertaken to determine the prevalence and intensity of parasitic infections in dairy cattle in the high tropics of Colombia. A total of 1003 rectal samples were collected from dairy cows at 29 farms between May and June 2014 to represent the number of farms, age groups, and size of the 65,000-cow population in the municipality of San Pedro de los Milagros. Coprological techniques were used to detect gastrointestinal nematodes, liver flukes, coccidian oocysts, and first larval stage counts of Dictyocaulus viviparus. In order of decreasing prevalence, the following parasites were detected: coccidial oocyst (36.7%; 95% CIs, 31.6–42.7, strongyle nematodes (31.6%, 27.8–35.4, liver flukes (30.9%, 21.5–37.5, cestodes (8.4%, 7.1–9.7, and D. viviparus (5.4%, 3.4–7.5. Co-infections by all possible combinations of the three most predominant groups occurred in 11 to 15% of the animals. There were significant differences in infection rates between age groups, with higher risk of liver fluke infection in animals older than 1 year of age (odds ratio (OR = 3.2, but lower presence for coccidia and strongyles (OR = 0.19 and 0.51, respectively. For Fasciola hepatica, within-herd prevalences of >25% in 16 farms and 94 of 281 (33.5% animals with >5 eggs per gram (epg indicate that significant production losses are likely occurring. The variation in the prevalence of gastrointestinal parasites and liver flukes, together with the level of infection among age groups, could be used in integrated management programs to establish selective anthelmintic treatments and select for heritable traits of host resistance. These results serve as a baseline for future studies to determine the success of control measures and should increase awareness that subclinical parasitism is widespread in the livestock sector.

  2. Profits and Exploitation: A Reappraisal

    OpenAIRE

    Yoshihara, Naoki; Veneziani, Roberto

    2011-01-01

    This paper provides a mathematical analysis of the Marxian theory of the exploitation of labour in general equilibrium models. The two main definitions of Marxian exploitation in the literature, proposed by Morishima (1974) and Roemer (1982), respectively, are analysed in the context of general convex economies. It is shown that, contrary to the received view, in general these definitions do not preserve the so-called Fundamental Marxian Theorem (FMT), which states that the exploitation of la...

  3. Eye-flukes in fish, living in cooling water from nuclear power plants

    International Nuclear Information System (INIS)

    Hoeglund, J.; Thulin, J.

    1988-01-01

    We report here on the effects of raised water temperature on the prevalence, mean infrapopulation density and consequences of eye-flukes in fish. The study was mainly performed in the Biotest basin situated 120 km north of Stockholm, Sweden. This 1 km 2 basin is an enclosed brackish water (5 permillage) area receiving heated (about 8 degree C) cooling water (90 m 3 /s) from Forsmark nuclear power station. Both morphological and experimental studies of the parasite larvae of sampled fish indicate that we are dealing with four strains of Diplostomum, two of which occur in perch and the other two in roach. Since taxonomic revisions are under hand elsewhere we prefer to name these strains Diplostomum sp1-4. Metacercariae of D.sp 1 were found between the retina and sclera in the eye of perch while that of D.sp 4 were found in the eye-lens of roach in over 90 % of fish examined. Metacercariae of the other two D.-species and of Tylodelphys clavata and Cotylurus sp were found at lower frequencies. Cercariae of Diplostomum spp were found to develop from sporocysts in snails of the genus Lymnaea. The period of cercarial shedding starts about one month earlier and is also prolonged in the Biotest basin compared to the reference locality. The infection procedure, however, is the same in both areas. During experimental infections with cercariae on yearlings of bleak we found a distinct correlation between an increased fry mortality and an increased cercariae density, a connection which was strengthened at increased water temperature. Furthermore, the results indicate that the defence mechanisms of the fish respond slower towards infections with Diplostomum spp than that is known to be the case with bacterial infections. The speed with which the metacercariae accumulate in the eye of the fish is higher in the Biotest basin than in the reference locality. In spite of this, the mean infrapopulation density of metacercariae in older fish is not higher here than in the reference

  4. Molecular changes in Opisthorchis viverrini (Southeast Asian liver fluke during the transition from the juvenile to the adult stage.

    Directory of Open Access Journals (Sweden)

    Aaron R Jex

    Full Text Available BACKGROUND: The Southeast Asian liver fluke (Opisthorchis viverrini chronically infects and affects tens of millions of people in regions of Asia, leading to chronic illness and, importantly, inducing malignant cancer (= cholangiocarcinoma. In spite of this, little is known, at the molecular level, about the parasite itself, its interplay with its hosts or the mechanisms of disease and/or carcinogenesis. METHODOLOGY/PRINCIPAL FINDINGS: Here, we generated extensive RNA-Seq data (Illumina representing adult and juvenile stages of O. viverrini, and combined these sequences with previously published transcriptomic data (454 technology for this species, yielding a combined assembly of significantly increased quality and allowing quantitative assessment of transcription in the juvenile and adult stage. CONCLUSIONS: This enhanced assembly reveals that, despite the substantial biological similarities between the human liver flukes, O. viverinni and Clonorchis sinensis, there are previously unrecognized differences in major aspects of their molecular biology. Most notable are differences among the C13 and cathepsin L-like cysteine peptidases, which play key roles in tissue migration, immune evasion and feeding, and, thus, represent potential drug and/or vaccine targets. Furthermore, these data indicate that major lineages of cysteine peptidases of socioeconomically important trematodes have evolved through a process of gene loss rather than independent radiation, contrasting previous proposals.

  5. Distribution and habitats of Lymnaea natalensis, snail intermediate host of the liver fluke Fasciola gigantica, in South Africa

    Directory of Open Access Journals (Sweden)

    Editorial Office

    2001-09-01

    Full Text Available This paper focuses on the geographical distribution and the habitats of Lymnaea natalensis, the snail intermediate host of the liver fluke, Fasciola gigantica, as reflected by the collection sites of its 4 552 samples currently on record in the National Freshwater Snail Collection (NFSC of South Africa. Although this species was represented in a variety of waterbodies, the majority of samples(±70%came from rivers, brooks and dams and in 70.8% of the cases the water was described as permanent and in 71.8% as slow flowing or standing. The results of life-table studies conducted by various authors indicated that temperature should be a relatively unimportant factor in determining its geographical distribution, but that the availability of permanent water should be decisive for its presence in a given habitat. These results are in agreement with the finding that only 7.5% of the samples of this species in the NFSC were collected in habitats which were described as seasonal. Furthermore, it gives a logical explanation for the sporadic occurrence, or total absence of this species in the more arid regions of South Africa. Water impoundments and irrigation networks contribute to a large extent towards creating perennial habitats which would be suitable for L. natalensis. As intermediate host for one of the liver fluke species which already is an economic factor in South Africa, this certainly is an aspect which ought to be reckoned within the planning and construction of new irrigation schemes.

  6. Prevalence of liver flukes infections and hydatidosis in slaughtered sheep and goats in Nishapour, Khorasan Razavi, Iran

    Directory of Open Access Journals (Sweden)

    Majid Aminzare

    2018-02-01

    Full Text Available Background: Food-borne trematode infections and hydatidosis are endemic diseases caused by helminths in Iran that are responsible for great economic loss and getting public health at risk. Aim: Aim of this study was to determine the prevalence of fasciolosis, dicrocoeliasis, and hydatidosis infections in slaughtered sheep and goats in Nishapour, Khorasan Razavi province of Iran. Materials and Methods: A survey was implemented on 130,107 sheep and goats slaughtered at an abattoir in Nishapour (Neyshbur city, north central Khorasan Razavi Province, Iran, to determine the prevalence of fascioliasis, dicrocoeliosis and presence of hydatidosis. Results: During a 1-year period of study, among 130,107 of sheep and goats slaughtered at Nishapour abattoir, 1064 and 7124 livers were condemned totally and partially, respectively. A total of 255 (0.19%, 181 (0.12 %, and 7751 (5.95% of livers were condemned due to cysts of Echinococcus granulosus, flukes of Fasciola spp., and Dicrocoelium dendriticum, respectively. Totally, 1932 (1.48% lungs were condemned due to hydatidosis. The significant seasonal pattern was seen for fasciolosis, dicrocoeliosis, and hydatidosis, statistically (p<0.01. Conclusion: According to this study, it seems that Neyshabour is considered as an endemic region for Fasciola spp. and D. dendriticum infections and D. dendriticum is the most widespread liver fluke found in sheep and goats.

  7. Low Genetic Diversity in Wide-Spread Eurasian Liver Fluke Opisthorchis felineus Suggests Special Demographic History of This Trematode Species

    Science.gov (United States)

    Brusentsov, Ilja I.; Katokhin, Alexey V.; Brusentsova, Irina V.; Shekhovtsov, Sergei V.; Borovikov, Sergei N.; Goncharenko, Grigoriy G.; Lider, Lyudmila A.; Romashov, Boris V.; Rusinek, Olga T.; Shibitov, Samat K.; Suleymanov, Marat M.; Yevtushenko, Andrey V.; Mordvinov, Viatcheslav A.

    2013-01-01

    Opisthorchis felineus or Siberian liver fluke is a trematode parasite (Opisthorchiidae) that infects the hepato-biliary system of humans and other mammals. Despite its public health significance, this wide-spread Eurasian species is one of the most poorly studied human liver flukes and nothing is known about its population genetic structure and demographic history. In this paper, we attempt to fill this gap for the first time and to explore the genetic diversity in O. felineus populations from Eastern Europe (Ukraine, European part of Russia), Northern Asia (Siberia) and Central Asia (Northern Kazakhstan). Analysis of marker DNA fragments from O. felineus mitochondrial cytochrome c oxidase subunit 1 and 3 (cox1, cox3) and nuclear rDNA internal transcribed spacer 1 (ITS1) sequences revealed that genetic diversity is very low across the large geographic range of this species. Microevolutionary processes in populations of trematodes may well be influenced by their peculiar biology. Nevertheless, we suggest that lack of population genetics structure observed in O. felineus can be primarily explained by the Pleistocene glacial events and subsequent sudden population growth from a very limited group of founders. Rapid range expansion of O. felineus through Asian and European territories after severe bottleneck points to a high dispersal potential of this trematode species. PMID:23634228

  8. Consensual exploitation : the moral wrong in exploitation and legal restrictions on consensual exploitative transactions

    OpenAIRE

    van der Neut, Wendy

    2014-01-01

    This thesis is about so-­‐called consensual exploitative transactions: transactions to which all parties agree voluntarily, and which are beneficial for all parties, but which are still widely considered exploitative, and for that reason legally restricted in many countries. The thesis asks two main questions: 1. What is wrong with consensual exploitation? 2.What implications does the answer to this question have for the legal restriction of consensual transactions ...

  9. Structural basis for vinyl sulfone inhibition of the SmCB1 drug target from the human blood fluke

    Czech Academy of Sciences Publication Activity Database

    Jílková, Adéla; Marešová, Lucie; Rubešová, Petra; Fajtová, Pavla; Horn, Martin; Řezáčová, Pavlína; Brynda, Jiří; McKerrow, J. H.; Caffrey, C. R.; Mareš, Michael

    2017-01-01

    Roč. 284, Suppl 1 (2017), s. 191 ISSN 1742-464X. [FEBS Congress /42./ From Molecules to Cells and Back. 10.09.2017-14.09.2017, Jerusalem] Institutional support: RVO:61388963 Keywords : schistosomiasis * cathepsin B1 * inhibitor Subject RIV: CE - Biochemistry

  10. Secreted serine protease SmSP2 of the blood fluke Schistosoma mansoni: Biochemical characterization, localization and host protein processing

    Czech Academy of Sciences Publication Activity Database

    Leontovyč, Adrian; Ulrychová, Lenka; O'Donoghue, A.J.; Marešová, Lucie; Vondrášek, Jiří; Caffrey, C. R.; Mareš, Michael; Horn, Martin; Dvořák, Jan

    2017-01-01

    Roč. 15, č. 1 (2017), s. 18 ISSN 2336-7202. [Mezioborové setkání mladých biologů, biochemiků a chemiků /17./. 30.05.2017-01.06.2017, Milovy] R&D Projects: GA MŠk LD15101; GA MŠk LO1302 Institutional support: RVO:61388963 Keywords : Schistosoma mansoni * SmSP2 Subject RIV: CE - Biochemistry

  11. The effects of farm management practices on liver fluke prevalence and the current internal parasite control measures employed on Irish dairy farms.

    Science.gov (United States)

    Selemetas, Nikolaos; Phelan, Paul; O'Kiely, Padraig; de Waal, Theo

    2015-01-30

    Fasciolosis caused by Fasciola hepatica is responsible for major production losses in cattle farms. The objectives of this study were to assess the effect of farm management practices on liver fluke prevalence on Irish dairy farms and to document the current control measures against parasitic diseases. In total, 369 dairy farms throughout Ireland were sampled from October to December 2013, each providing a single bulk tank milk (BTM) sample for liver fluke antibody-detection ELISA testing and completing a questionnaire on their farm management. The analysis of samples showed that cows on 78% (n=288) of dairy farms had been exposed to liver fluke. There was a difference (P0.05) between positive and negative farms in (a) the grazing of dry cows together with replacement cows, (b) whether or not grazed grassland was mowed for conservation, (c) the type of drinking water provision system, (d) spreading of cattle manure on grassland or (e) for grazing season length (GSL; mean=262.5 days). Also, there were differences (Pmanagement practices between Irish farms with dairy herds exposed or not exposed to liver fluke and stressed the need of fine-scale mapping of the disease patterns even at farm level to increase the accuracy of risk models. Also, comprehensive advice and professional support services to farmers on appropriate farm management practices are very important for an effective anthelmintic control strategy. Copyright © 2014 Elsevier B.V. All rights reserved.

  12. Molecular identification of Clonorchis sinensis and discrimination with other opisthorchid liver fluke species using multiple Ligation-depended Probe Amplification (MLPA

    Directory of Open Access Journals (Sweden)

    Liang Chi

    2011-06-01

    Full Text Available Abstract Background Infections with the opisthorchid liver flukes Clonorchis sinensis, Opisthorchis viverrini, and O. felineus cause severe health problems globally, particularly in Southeast Asia. Early identification of the infection is essential to provide timely and appropriate chemotherapy to patients. Results In this study we evaluate a PCR-based molecular identification method, Multiplex Ligation-dependent Probe Amplification (MLPA, which allows rapid and specific detection of single nucleotide acid differences between Clonorchis sinensis, Opisthorchis viverrini and O. felineus. Three probe pairs were derived from the Internally Transcribed Spacer 1 (ITS1 of three opisthorchid liver flukes using a systematic phylogenetic analysis. Specific loci were detected in all three species, yielding three amplicons with 198,172 and 152 bp, respectively, while no cross reactions were observed. A panel of 66 C. sinensis isolates was screened using MLPA. All species were positively identified, and no inhibition was observed. The detection limit was 103 copies of the ITS gene for the three liver flukes, or about 60 pg genomic DNA for Clonorchis sinensis. Amplification products can be detected by electrophoresis on agarose gel or in a capillary sequencer. In addition, genomic DNA of Clonorchis sinensis in fecal samples of infected rats was positively amplified by MLPA. Conclusion The flexibility and specificity make MLPA a potential tool for specific identification of infections by opisthorchid liver flukes in endemic areas.

  13. Effect of the Filamentous Fungus Mucor circinelloides On The Development of Eggs of the Rumen Fluke Calicophoron daubneyi (Paramphistomidae).

    Science.gov (United States)

    Arroyo, Fabián; Hernández, José A; Cazapal-Monteiro, Cristiana F; Pedreira, José; Sanchís, Jaime; Romasanta, Ángel; Sánchez-Andrade, Rita; Paz-Silva, Adolfo; Arias, María S

    2017-06-01

    Ruminants infected by Paramphistomidae flukes shed eggs in the feces, which pass through different stages in the environment until the infective stages (metacercariae) are reached. The activity of the soil fungus Mucor circinelloides on the development of eggs of the rumen fluke Calicophoron daubneyi was presently tested with 3 probes, i.e., in petri plates, feces, and an aqueous environment (tubes). The effect of the fungus was assessed by recording the numbers of undeveloped, nonviable, and embryonated eggs. Nonviable eggs were considered when vacuolization occurred, the inner structures were not clearly observed, the eggshell was broken, or the embryo inside was destroyed. By considering the ability of hyphae of M. circinelloides to develop in the presence of C. daubneyi eggs, attach to their surface, and penetrate and destroy the inner embryo, this ovicidal effect was classified as type 3. After a period of 50 days, the percentage of undeveloped eggs in the feces of infected cattle was 40%; furthermore, 27% of the eggs were nonviable, and 33% were embryonated (1 miracidium inside). The addition of 4 doses of M. circinelloides spores directly onto the feces resulted in 9-31% undeveloped eggs, 38-60% nonviable eggs, and 9-21% embryonated eggs, and no statistical significances were obtained among the different doses. Placing the eggs of C. daubneyi into an aqueous solution containing 10 7 spores of M. circinelloides/ml for 29 days resulted in 43% undeveloped eggs, 40% nonviable eggs, and 17% embryonated eggs, whereas in the controls, the percentages were 48%, 12%, and 40%, respectively. These data demonstrate the usefulness of the spores of the fungus M. circinelloides in limiting the development of the eggs of the trematode C. daubneyi.

  14. Fine-scale mapping of vector habitats using very high resolution satellite imagery: a liver fluke case-study.

    Science.gov (United States)

    De Roeck, Els; Van Coillie, Frieke; De Wulf, Robert; Soenen, Karen; Charlier, Johannes; Vercruysse, Jozef; Hantson, Wouter; Ducheyne, Els; Hendrickx, Guy

    2014-12-01

    The visualization of vector occurrence in space and time is an important aspect of studying vector-borne diseases. Detailed maps of possible vector habitats provide valuable information for the prediction of infection risk zones but are currently lacking for most parts of the world. Nonetheless, monitoring vector habitats from the finest scales up to farm level is of key importance to refine currently existing broad-scale infection risk models. Using Fasciola hepatica, a parasite liver fluke, as a case in point, this study illustrates the potential of very high resolution (VHR) optical satellite imagery to efficiently and semi-automatically detect detailed vector habitats. A WorldView2 satellite image capable of transmitted by freshwater snails. The vector thrives in small water bodies (SWBs), such as ponds, ditches and other humid areas consisting of open water, aquatic vegetation and/or inundated grass. These water bodies can be as small as a few m2 and are most often not present on existing land cover maps because of their small size. We present a classification procedure based on object-based image analysis (OBIA) that proved valuable to detect SWBs at a fine scale in an operational and semi-automated way. The classification results were compared to field and other reference data such as existing broad-scale maps and expert knowledge. Overall, the SWB detection accuracy reached up to 87%. The resulting fine-scale SWB map can be used as input for spatial distribution modelling of the liver fluke snail vector to enable development of improved infection risk mapping and management advice adapted to specific, local farm situations.

  15. Molecular identification of Clonorchis sinensis and discrimination with other opisthorchid liver fluke species using Multiple Ligation-dependent Probe Amplification (MLPA).

    OpenAIRE

    Sun, J.; Xu, J.; Liang, P.; Mao, Q.; Huang, Y.; Lu, X.; Deng, C.; Liang, C.; de Hoog, G.S.; Yu, X.

    2011-01-01

    Background Infections with the opisthorchid liver flukes Clonorchis sinensis, Opisthorchis viverrini, and O. felineus cause severe health problems globally, particularly in Southeast Asia. Early identification of the infection is essential to provide timely and appropriate chemotherapy to patients. Results In this study we evaluate a PCR-based molecular identification method, Multiplex Ligation-dependent Probe Amplification (MLPA), which allows rapid and specific detection of single nucleotid...

  16. Molecular and structural characteristics of multidrug resistance-associated protein 7 in Chinese liver fluke Clonorchis sinensis.

    Science.gov (United States)

    Dai, Fuhong; Yoo, Won Gi; Lee, Ji-Yun; Lu, Yanyan; Pak, Jhang Ho; Sohn, Woon-Mok; Hong, Sung-Jong

    2017-03-01

    Multidrug resistance-associated protein 7 (MRP7, ABCC10) is a C subfamily member of the ATP-binding cassette (ABC) superfamily. MRP7 is a lipophilic anion transporter that pumps endogenous and xenobiotic substrates from the cytoplasm to the extracellular milieu. Here, we cloned and characterized CsMRP7 as a novel ABC transporter from the Chinese liver fluke, Clonorchis sinensis. Full-length cDNA of CsMRP7 was 5174 nt, encoded 1636 amino acids (aa), and harbored a 147-bp 5'-untranslated region (5'-UTR) and 116-bp 3'-UTR. Phylogenetic analysis confirmed that CsMRP7 was closer to the ABCC subfamily than the ABCB subfamily. Tertiary structures of the N-terminal region (1-322 aa) and core region (323-1621 aa) of CsMRP7 were generated by homology modeling using glucagon receptor (PDB ID: 5ee7_A) and P-glycoprotein (PDB ID: 4f4c_A) as templates, respectively. CsMRP7 nucleotide-binding domain 2 (NBD2) was conserved more than NBD1, which was the sites of ATP binding and hydrolysis. Like typical long MRPs, CsMRP7 has an additional membrane-spanning domain 0 (MSD0) and cytoplasmic loop, along with a common structural fold consisting of MSD1-NBD1-MSD2-NBD2 as a single polypeptide assembly. MSD0, MSD1, and MSD2 consisted of TM1-7, TM8-13, and TM14-19, respectively. The CsMRP7 transcript was more abundant in the metacercariae than in the adult worms. Truncated NBD1 (39 kDa) and NBD2 (44 kDa) were produced in bacteria and mouse immune sera were raised. CsMRP7 was localized in the apical side of the intestinal epithelium, sperm in the testes and seminal receptacle, receptacle membrane, and mesenchymal tissue around intestine in the adult worm. These results provide molecular information and insights into structural and functional characteristics of CsMRP7 and homologs of flukes.

  17. Pharmacological and morphological characteristics of the muscular system of the giant liver fluke (Fascioloides magna - Bassi 1875).

    Science.gov (United States)

    Trailović, Saša M; Marinković, Darko; Trailović, Jelena Nedeljković; Milovanović, Mirjana; Marjanović, Djordje S; Aničić, Milan R

    2015-12-01

    Motility is required for feeding, reproduction and maintenance of the fluke in the host's liver. According to that, the neuromuscular system can be an attractive drugable target for chemotherapy. Musculature of the Fascioloides magna is organized into three layers, an outer circular layer, beneath this layer the longitudinal layer, and third, the oblique, or diagonal layer underlies the longitudinal layer. In our study, the administration of atropine or caffeine did not cause classic muscle contractions of F. magna muscle strips. However, the Electrical Field Stimulation (EFS) induced stable and repeatable contractions, which enabled us to examine their sensitivity to the various substances. Acetylcholine (ACh) (300 μM and 1 mM), caused only a slight relaxation, without affecting the amplitude of spontaneous contractions or the amplitude of contractions induced by EFS. Contrary to that, atropine (100 μM) caused a significant increase in the basal tone and an increase of EFS-induced contractions. If acetylcholine is an inhibitory neurotransmitter in trematodes, the described effects of atropine are achieved by the blockade of inhibitory neurotransmission. On the other hand, with respect to the process of excitation-contraction coupling, the plant alkaloid ryanodine (30 μM) significantly reduced the basal tone, as well as EFS-induced contractions of F. magna muscle strips. Ryanodine inhibited the potentiating effect of atropine on the basal tone and contractions caused by EFS, which indicates that the contractile effect of atropine is dependent on Ca(++) release from intracellular stores. Caffeine (500 μM) caused relaxation of fluke muscle strips and at the same time significantly enhanced the EFS-induced contractions. Both effects of caffeine can be explained by entry of extracellular Ca(++) into muscle cells. The muscle contractility of F. magna depends both on the entry of extracellular calcium, and calcium release from intracellular stores, which are

  18. Teotihuacan, tepeapulco, and obsidian exploitation.

    Science.gov (United States)

    Charlton, T H

    1978-06-16

    Current cultural ecological models of the development of civilization in central Mexico emphasize the role of subsistence production techniques and organization. The recent use of established and productive archeological surface survey techniques along natural corridors of communication between favorable niches for cultural development within the Central Mexican symbiotic region resulted in the location of sites that indicate an early development of a decentralized resource exploitation, manufacturing, and exchange network. The association of the development of this system with Teotihuacán indicates the importance such nonsubsistence production and exchange had in the evolution of this first central Mexican civilization. The later expansion of Teotihuacán into more distant areas of Mesoamerica was based on this resource exploitation model. Later civilizations centered at Tula and Tenochtitlán also used such a model in their expansion.

  19. Network exploitation using WAMI tracks

    Science.gov (United States)

    Rimey, Ray; Record, Jim; Keefe, Dan; Kennedy, Levi; Cramer, Chris

    2011-06-01

    Creating and exploiting network models from wide area motion imagery (WAMI) is an important task for intelligence analysis. Tracks of entities observed moving in the WAMI sensor data are extracted, then large numbers of tracks are studied over long time intervals to determine specific locations that are visited (e.g., buildings in an urban environment), what locations are related to other locations, and the function of each location. This paper describes several parts of the network detection/exploitation problem, and summarizes a solution technique for each: (a) Detecting nodes; (b) Detecting links between known nodes; (c) Node attributes to characterize a node; (d) Link attributes to characterize each link; (e) Link structure inferred from node attributes and vice versa; and (f) Decomposing a detected network into smaller networks. Experimental results are presented for each solution technique, and those are used to discuss issues for each problem part and its solution technique.

  20. Distribution and habitats of the snail Lymnaea truncatula, intermediate host of the liver fluke Fasciola hepatica, in South Africa

    Directory of Open Access Journals (Sweden)

    K.N. de Kock

    2003-07-01

    Full Text Available This paper focuses on the geographical distribution and habitats of Lymnaea truncatula, the intermediate, snail host of the liver fluke, Fasciola hepatica, as reflected by the 723 samples in the database of the National Freshwater Snail Collection, Potchefstroom, South Africa. The 221 different loci (1/16-degree squares on record reflect an extensive but discontinuous distribution, except in Lesotho and in parts of the Mpumalanga, Gauteng and North West provinces of South Africa. Although recorded from 12 different types of waterbody, it was mostly (42.0 % recovered from swamps. Most samples (45.8 % were collected in habitats with slow-flowing water. A muddy substratum was recorded for 62.5 % of the samples. Most samples (86.3 % were collected in habitats with a mean annual air temperature of 10-20 o C, and more than 69 % came from localities with a mean annual rainfall of 600-900mm. An integrated decision tree constructed from the data indicated that temperature and types of waterbody play a decisive role in determining the presence of L. truncatula in a given area. A temperature index calculated for all mollusc species ranked L. truncatula second in a total of 53 species according to its association with low temperatures. It remains to be established whether its distribution is indeed discontinuous, and whether its preference for a particular habitat, amphibious habits and ability to aestivate could have resulted in some populations having been overlooked during surveys.

  1. Egg-specific expression of protein with DNA methyltransferase activity in the biocarcinogenic liver fluke Clonorchis sinensis.

    Science.gov (United States)

    Kim, Seon-Hee; Cho, Hye-Jeong; Sohn, Woon-Mok; Ahn, Chun-Seob; Kong, Yoon; Yang, Hyun-Jong; Bae, Young-An

    2015-08-01

    Despite recent reports regarding the biology of cytosine methylation in Schistosoma mansoni, the impact of the regulatory machinery remains unclear in diverse platyhelminthes. This ambiguity is reinforced by discoveries of DNA methyltransferase 2 (DNMT2)-only organisms and the substrate specificity of DNMT2 preferential to RNA molecules. Here, we characterized a novel DNA methyltransferase, named CsDNMT2, in a liver fluke Clonorchis sinensis. The protein exhibited structural properties conserved in other members of the DNMT2 family. The native and recombinant CsDNMT2 exhibited considerable enzymatic activity on DNA. The spatiotemporal expression of CsDNMT2 mirrored that of 5-methylcytosine (5 mC), both of which were elevated in the C. sinensis eggs. However, CsDNMT2 and 5 mC were marginally detected in other histological regions of C. sinensis adults including ovaries and seminal receptacle. The methylation site seemed not related to genomic loci occupied by progenies of an active long-terminal-repeat retrotransposon. Taken together, our data strongly suggest that C. sinensis has preserved the functional DNA methylation machinery and that DNMT2 acts as a genuine alternative to DNMT1/DNMT3 to methylate DNA in the DNMT2-only organism. The epigenetic regulation would target functional genes primarily involved in the formation and/or maturation of eggs, rather than retrotransposons.

  2. Evidence for high genetic diversity of NAD1 and COX1 mitochondrial haplotypes among triclabendazole resistant and susceptible populations and field isolates of Fasciola hepatica (liver fluke) in Australia.

    Science.gov (United States)

    Elliott, T; Muller, A; Brockwell, Y; Murphy, N; Grillo, V; Toet, H M; Anderson, G; Sangster, N; Spithill, T W

    2014-02-24

    In recent years, the global incidence of Fasciola hepatica (liver fluke) infections exhibiting resistance to triclabendazole (TCBZ) has increased, resulting in increased economic losses for livestock producers and threatening future control. The development of TCBZ resistance and the worldwide discovery of F. hepatica population diversity has emphasized the need to further understand the genetic structure of drug susceptible and resistant Fasciola populations within Australia. In this study, the genetic diversity of liver flukes was estimated by sequencing mitochondrial DNA (mtDNA) encoding the NAD1 (530 bp) and COX1 (420 bp) genes of 208 liver flukes (F. hepatica) collected from three populations: field isolates obtained from abattoirs from New South Wales (NSW) and Victoria (Vic); three TCBZ-resistant fluke populations from NSW and Victoria; and the well-established TCBZ-susceptible Sunny Corner laboratory isolate. Overall nucleotide diversity for all flukes analysed of 0.00516 and 0.00336 was estimated for the NAD1 and COX1 genes respectively. Eighteen distinct haplotypes were established for the NAD1 gene and six haplotypes for the COX1 gene, resulting in haplotype diversity levels of 0.832 and 0.482, respectively. One field isolate showed a similar low level of haplotype diversity as seen in the Sunny Corner laboratory isolate. Analysis of TCBZ-resistant infrapopulations from 3 individual cattle grazing one property revealed considerable sequence parasite diversity between cattle. Analysis of parasite TCBZ-resistant infrapopulations from sheep and cattle revealed haplotypes unique to each host, but no significant difference between parasite populations. Fst analysis of fluke populations revealed little differentiation between the resistant and field populations. This study has revealed a high level of diversity in field and drug resistant flukes in South-Eastern Australia. Copyright © 2013 Elsevier B.V. All rights reserved.

  3. The ESA Geohazard Exploitation Platform

    Science.gov (United States)

    Bally, Philippe; Laur, Henri; Mathieu, Pierre-Philippe; Pinto, Salvatore

    2015-04-01

    Earthquakes represent one of the world's most significant hazards in terms both of loss of life and damages. In the first decade of the 21st century, earthquakes accounted for 60 percent of fatalities from natural disasters, according to the United Nations International Strategy for Disaster Reduction (UNISDR). To support mitigation activities designed to assess and reduce risks and improve response in emergency situations, satellite EO can be used to provide a broad range of geo-information services. This includes for instance crustal block boundary mapping to better characterize active faults, strain rate mapping to assess how rapidly faults are deforming, soil vulnerability mapping to help estimate how the soil is behaving in reaction to seismic phenomena, geo-information to assess the extent and intensity of the earthquake impact on man-made structures and formulate assumptions on the evolution of the seismic sequence, i.e. where local aftershocks or future main shocks (on nearby faults) are most likely to occur. In May 2012, the European Space Agency and the GEO Secretariat convened the International Forum on Satellite EO for Geohazards now known as the Santorini Conference. The event was the continuation of a series of international workshops such as those organized by the Geohazards Theme of the Integrated Global Observing Strategy Partnership. In Santorini the seismic community has set out a vision of the EO contribution to an operational global seismic risk program, which lead to the Geohazard Supersites and Natural Laboratories (GSNL) initiative. The initial contribution of ESA to suuport the GSNL was the first Supersites Exploitation Platform (SSEP) system in the framework of Grid Processing On Demand (GPOD), now followed by the Geohazard Exploitation Platform (GEP). In this presentation, we will describe the contribution of the GEP for exploiting satellite EO for geohazard risk assessment. It is supporting the GEO Supersites and has been further

  4. Prospects of geothermal resource exploitation

    International Nuclear Information System (INIS)

    Bourrelier, P.H.; Cornet, F.; Fouillac, C.

    1994-01-01

    The use of geothermal energy to generate electricity has only occurred during the past 50 years by drilling wells in aquifers close to magmas and producing either dry steam or hot water. The world's production of electricity from geothermal energy is over 6000 MWe and is still growing. The direct use of geothermal energy for major urban communities has been developed recently by exploitation of aquifers in sedimentary basins under large towns. Scaling up the extraction of heat implies the exploitation of larger and better located fields requiring an appropriate method of extraction; the objective of present attempts in USA, Japan and Europe is to create heat exchangers by the circulation of water between several deep wells. Two field categories are considered: the extension of classical geothermal fields beyond the aquifer areas, and areas favoured by both a high geothermal gradient, fractures inducing a natural permeability at large scale, and good commercial prospects (such as in the Rhenan Graben). Hot dry rocks concept has gained a large interest. 1 fig., 5 tabs., 11 refs

  5. A new measure of interpersonal exploitativeness

    Directory of Open Access Journals (Sweden)

    Amy B. Brunell

    2013-05-01

    Full Text Available Measures of exploitativeness evidence problems with validity and reliability. The present set of studies assessed a new measure (the Interpersonal Exploitativeness Scale that defines exploitativeness in terms of reciprocity. In Studies 1 and 2, 33 items were administered to participants. Exploratory and Confirmatory Factor Analysis demonstrated that a single factor consisting of six items adequately assess interpersonal exploitativeness. Study 3 results revealed that the Interpersonal Exploitativeness Scale was positively associated with normal narcissism, pathological narcissism, psychological entitlement, and negative reciprocity and negatively correlated with positive reciprocity. In Study 4, participants competed in a commons dilemma. Those who scored higher on the Interpersonal Exploitativeness Scale were more likely to harvest a greater share of resources over time, even while controlling for other relevant variables, such as entitlement. Together, these studies show the Interpersonal Exploitativeness Scale to be a valid and reliable measure of interpersonal exploitativeness. The authors discuss the implications of these studies.

  6. Exploitation in International Paid Surrogacy Arrangements

    OpenAIRE

    Wilkinson, Stephen

    2015-01-01

    Abstract Many critics have suggested that international paid surrogacy is exploitative. Taking such concerns as its starting point, this article asks: (1) how defensible is the claim that international paid surrogacy is exploitative and what could be done to make it less exploitative? (2) In the light of the answer to (1), how strong is the case for prohibiting it? Exploitation could in principle be dealt with by improving surrogates' pay and conditions. However, doing so may exacerbate probl...

  7. The exploitation argument against commercial surrogacy.

    Science.gov (United States)

    Wilkinson, Stephen

    2003-04-01

    This paper discusses the exploitation argument against commercial surrogacy: the claim that commercial surrogacy is morally objectionable because it is exploitative. The following questions are addressed. First, what exactly does the exploitation argument amount to? Second, is commercial surrogacy in fact exploitative? Third, if it were exploitative, would this provide a sufficient reason to prohibit (or otherwise legislatively discourage) it? The focus throughout is on the exploitation of paid surrogates, although it is noted that other parties (e.g. 'commissioning parents') may also be the victims of exploitation. It is argued that there are good reasons for believing that commercial surrogacy is often exploitative. However, even if we accept this, the exploitation argument for prohibiting (or otherwise legislatively discouraging) commercial surrogacy remains quite weak. One reason for this is that prohibition may well 'backfire' and lead to potential surrogates having to do other things that are more exploitative and/or more harmful than paid surrogacy. It is concluded therefore that those who oppose exploitation should (rather than attempting to stop particular practices like commercial surrogacy) concentrate on: (a) improving the conditions under which paid surrogates 'work'; and (b) changing the background conditions (in particular, the unequal distribution of power and wealth) which generate exploitative relationships.

  8. The Exploitation of Evolving Resources

    CERN Document Server

    McGlade, Jacqueline; Law, Richard

    1993-01-01

    The impact of man on the biosphere is profound. Quite apart from our capacity to destroy natural ecosystems and to drive species to extinction, we mould the evolution of the survivors by the selection pressures we apply to them. This has implications for the continued health of our natural biological resources and for the way in which we seek to optimise yield from those resources. Of these biological resources, fish stocks are particularly important to mankind as a source of protein. On a global basis, fish stocks provide the major source of protein for human consumption from natural ecosystems, amounting to some seventy million tonnes in 1970. Although fisheries management has been extensively developed over the last century, it has not hitherto considered the evolutionary consequences of fishing activity. While this omission may not have been serious in the past, the ever increasing intensity of exploitation and the deteriorating health of fish stocks has generated an urgent need for a better understanding...

  9. Swedish mines. Underground exploitation methods

    International Nuclear Information System (INIS)

    Paucard, A.

    1960-01-01

    Between 1949 and 1957, 10 engineers of the Mining research and exploitation department of the CEA visited 17 Swedish mines during 5 field trips. This paper presents a compilation of the information gathered during these field trips concerning the different underground mining techniques used in Swedish iron mines: mining with backfilling (Central Sweden and Boliden mines); mining without backfilling (mines of the polar circle area). The following techniques are described successively: pillar drawing and backfilled slices (Ammeberg, Falun, Garpenberg, Boliden group), sub-level pillar drawing (Grangesberg, Bloettberget, Haeksberg), empty room and sub-level pillar drawing (Bodas, Haksberg, Stripa, Bastkarn), storage chamber pillar drawing (Bodas, Haeksberg, Bastkarn), and pillar drawing by block caving (ldkerberget). Reprint of a paper published in Revue de l'Industrie Minerale, vol. 41, no. 12, 1959 [fr

  10. Exploiting social evolution in biofilms

    DEFF Research Database (Denmark)

    Boyle, Kerry E; Heilmann, Silja; van Ditmarsch, Dave

    2013-01-01

    Bacteria are highly social organisms that communicate via signaling molecules, move collectively over surfaces and make biofilm communities. Nonetheless, our main line of defense against pathogenic bacteria consists of antibiotics-drugs that target individual-level traits of bacterial cells...... and thus, regrettably, select for resistance against their own action. A possible solution lies in targeting the mechanisms by which bacteria interact with each other within biofilms. The emerging field of microbial social evolution combines molecular microbiology with evolutionary theory to dissect...... the molecular mechanisms and the evolutionary pressures underpinning bacterial sociality. This exciting new research can ultimately lead to new therapies against biofilm infections that exploit evolutionary cheating or the trade-off between biofilm formation and dispersal....

  11. Energy for lunar resource exploitation

    Science.gov (United States)

    Glaser, Peter E.

    1992-02-01

    Humanity stands at the threshold of exploiting the known lunar resources that have opened up with the access to space. America's role in the future exploitation of space, and specifically of lunar resources, may well determine the level of achievement in technology development and global economic competition. Space activities during the coming decades will significantly influence the events on Earth. The 'shifting of history's tectonic plates' is a process that will be hastened by the increasingly insistent demands for higher living standards of the exponentially growing global population. Key to the achievement of a peaceful world in the 21st century, will be the development of a mix of energy resources at a societally acceptable and affordable cost within a realistic planning horizon. This must be the theme for the globally applicable energy sources that are compatible with the Earth's ecology. It is in this context that lunar resources development should be a primary goal for science missions to the Moon, and for establishing an expanding human presence. The economic viability and commercial business potential of mining, extracting, manufacturing, and transporting lunar resource based materials to Earth, Earth orbits, and to undertake macroengineering projects on the Moon remains to be demonstrated. These extensive activities will be supportive of the realization of the potential of space energy sources for use on Earth. These may include generating electricity for use on Earth based on beaming power from Earth orbits and from the Moon to the Earth, and for the production of helium 3 as a fuel for advanced fusion reactors.

  12. Exploiting Symmetry on Parallel Architectures.

    Science.gov (United States)

    Stiller, Lewis Benjamin

    1995-01-01

    This thesis describes techniques for the design of parallel programs that solve well-structured problems with inherent symmetry. Part I demonstrates the reduction of such problems to generalized matrix multiplication by a group-equivariant matrix. Fast techniques for this multiplication are described, including factorization, orbit decomposition, and Fourier transforms over finite groups. Our algorithms entail interaction between two symmetry groups: one arising at the software level from the problem's symmetry and the other arising at the hardware level from the processors' communication network. Part II illustrates the applicability of our symmetry -exploitation techniques by presenting a series of case studies of the design and implementation of parallel programs. First, a parallel program that solves chess endgames by factorization of an associated dihedral group-equivariant matrix is described. This code runs faster than previous serial programs, and discovered it a number of results. Second, parallel algorithms for Fourier transforms for finite groups are developed, and preliminary parallel implementations for group transforms of dihedral and of symmetric groups are described. Applications in learning, vision, pattern recognition, and statistics are proposed. Third, parallel implementations solving several computational science problems are described, including the direct n-body problem, convolutions arising from molecular biology, and some communication primitives such as broadcast and reduce. Some of our implementations ran orders of magnitude faster than previous techniques, and were used in the investigation of various physical phenomena.

  13. Two questions about surrogacy and exploitation.

    Science.gov (United States)

    Wertheimer, Alan

    1992-01-01

    In this article I will consider two related questions about surrogacy and exploitation: (1) Is surrogacy exploitative? (2) If surrogacy is exploitative, what is the moral force of this exploitation? Briefly stated, I shall argue that whether surrogacy is exploitative depends on whether exploitation must be harmful to the exploited party or whether (as I think) there can be mutually advantageous exploitation. It also depends on some facts about surrogacy about which we have little reliable evidence and on our philosophical view on what counts as a harm to the surrogate. Our answer to the second question will turn in part on the account of exploitation we invoke in answering the first question and in part on the way in which we resolve some other questions about the justification of state interference. I shall suggest, however, that if surrogacy is a form of voluntary and mutually advantageous exploitation, then there is a strong presumption that surrogacy contracts should be permitted and even enforceable, although that presumption may be overridden on other grounds.

  14. High prevalence of the liver fluke Amphimerus sp. in domestic cats and dogs in an area for human amphimeriasis in Ecuador.

    Directory of Open Access Journals (Sweden)

    Manuel Calvopiña

    2015-02-01

    Full Text Available Amphimerus sp. is a liver fluke which recently has been shown to have a high prevalence of infection among an indigenous group, Chachi, who reside in a tropical rainforest in the northwestern region of Ecuador. Since it is unknown which animals can act as a reservoir and/or definitive hosts for Amphimerus sp. in this endemic area, a study was done to determine the prevalence of infection in domestic cats and dogs. This information is important to understand the epidemiology, life cycle and control of this parasite.In July 2012, three Chachi communities located on Rio Cayapas, province of Esmeraldas, were surveyed. A total of 89 of the 109 registered households participated in the study. Of the 27 cats and 43 dogs found residing in the communities, stool samples were collected from 14 cats and 31 dogs (total of 45 animals and examined microscopically for the presence of Amphimerus eggs. The prevalence of infection was 71.4% in cats and 38.7% in dogs, with similar rates of infection in all three communities. Significantly more cats were infected than dogs (p = 0.042.The data show a high rate of Amphimerus sp. infection in domestic cats and dogs residing in Chachi communities. It can be concluded that these animals act as definitive and reservoir hosts for this liver fluke and that amphimeriasis is a zoonotic disease. These findings provide important epidemiological data which will aid in the development and implementation of control strategies against the transmission of Amphimerus.

  15. Liver Fluke Infection and Fish Consumption in Khon Kaen, Thailand: A Case Study on Negotiating the Middle Ground between Western Science and Eastern Culture

    Science.gov (United States)

    Samiphak, Sara

    This research investigates why typical strategies for promoting health, prolonging life, and preventing disease do not work in many communities. I use the liver fluke infection endemic in Khon Kaen, Thailand to explore the middle ground between Western science and Eastern culture. Prior work on the O.viverrini infection in Khon Kaen, Thailand has focused almost exclusively on developing effective medical treatment for the liver fluke infection. This dissertation employs a case study designed to explore the conditions that created and perpetuate the problem in the first place. In concrete terms, I analyze how the worldviews of local villagers shape their attitudes toward life (and death), which in turn determine if they engage in the high-risk behavior -- eating undercooked fish -- that makes them vulnerable to the infection. My research focuses on these people in-situ over a three-month period, and includes data from participant-observation, interviews, and video-recordings. This work seeks to illuminate how people's thinking and reasoning skills, and personal/cultural identities affect their abilities to learn and act on new health concepts. This potentially provides a window into future educational strategies in a complex world.

  16. Radiation environmental impact assessment of copper exploitation

    International Nuclear Information System (INIS)

    Fan Guang; Wen Zhijian

    2010-01-01

    The radiation environmental impact of mineral exploitation on the surrounding environment has become a public concern. This paper presents the radiation environmental impact assessment of copper exploitation. Based on the project description and detailed investigations of surrounding environment, systematic radiation environmental impacts have been identified. The environmental impacts are assessed during both construction and operation phase. The environmental protection measures have also been proposed. The related conclusion and measures can play an active role in copper exploitation and environmental protection. (authors)

  17. Exploitation and exploration dynamics in recessionary times

    OpenAIRE

    Walrave, B.

    2012-01-01

    Firm performance largely depends on the ability to adapt to, and exploit, changes in the business environment. That is, firms should maintain ecological fitness by reconfiguring their resource base to cope with emerging threats and explore new opportunities, while at the same time exploiting existing resources. As such, firms possessing the ability to simultaneously perform exploitative and explorative initiatives are more resilient. In this respect, the performance implications of balancing ...

  18. The geographical distribution and habitats of three liver fluke intermediate hosts in South - Africa and the health implications involved

    Directory of Open Access Journals (Sweden)

    K. N. de Kock

    2008-09-01

    described as permanent, standing, fresh and clear. Although the highest percentage of samples of all three species was reported from loci that fell within the interval ranging from 16-20°C, a significant number of samples of L. truncatula came from loci falling with in the 11-15°C interval. In view of the fact that Lymnaea species are well known as intermediate hosts for liver fluke in South Africa and elsewhere in the world, the widespread occurrence of these snails could have considerable health and economic consequences. Lymnaea natalenis is the most important and probably the only intermediate host of Fasciola gigantica, the most common liver fluke in Africa but F. gigantica has been reliably reported only from Lesotho where its traditional intermediate host, L. truncatula is widespread. However, the epidemiology of fasciolosis in South Africa has been complicated by the invasion of many water-bodies by L. columella because this species has proved to be a successful host for F. hepatica where it had been introduced elsewhere in the world. To our knowledge its role in South Africa in this respect has not yet been evaluated. Due to the fact that no statistics are available in print, the results of positive serological tests on cattle herds all over South Africa were used to compile a map depicting the possible occurrence of Fasciola species in livestock in this country. Although human infections with Fasciola in Africa was considered as very rare in 1975 the situation has changed. It is considered an underrated and underreported disease in humans in Ethiopia and in Egypt an increase in cases of fasciolosis and prevalence’s as high as 12.8% in humans have also recently been reported. To our knowledge the only cases of human fasciolosis reported in literature for South Africa were from northern KwaZulu-Natal where F. hepatica infections were found in 22 out of 7 569 school children examined in 1981. Efforts to obtain recent statisticson human infections from various

  19. The economics of exploiting gas hydrates

    International Nuclear Information System (INIS)

    Döpke, Lena-Katharina; Requate, Till

    2014-01-01

    We investigate the optimal exploitation of methane hydrates, a recent discovery of methane resources under the sea floor, mainly located along the continental margins. Combustion of methane (releasing CO2) and leakage through blow-outs (releasing CH4) contribute to the accumulation of greenhouse gases. A second externality arises since removing solid gas hydrates from the sea bottom destabilizes continental margins and thus increases the risk of marine earthquakes. We show that in such a model three regimes can occur: i) resource exploitation will be stopped in finite time, and some of the resource will stay in situ, ii) the resource will be used up completely in finite time, and iii) the resource will be exhausted in infinite time. We also show how to internalize the externalities by policy instruments. - Highlights: • We set up a model of optimal has hydrate exploitation • We incorporate to types of damages: contribution to global warming and geo-hazards • We characterize optimal exploitation paths and study decentralization with an exploitation tax. • Three regimes can occur: • i) exploitation in finite time and some of the stock remaining in situ, • ii) exploitation in finite time and the resource will be exhausted, • iii) exploitation and exhaustion in infinite time

  20. Exploitation and exploration dynamics in recessionary times

    NARCIS (Netherlands)

    Walrave, B.

    2012-01-01

    Firm performance largely depends on the ability to adapt to, and exploit, changes in the business environment. That is, firms should maintain ecological fitness by reconfiguring their resource base to cope with emerging threats and explore new opportunities, while at the same time exploiting

  1. Packaging of Sin Goods - Commitment or Exploitation?

    DEFF Research Database (Denmark)

    Nafziger, Julia

    to such self-control problems, and possibly exploit them, by offering different package sizes. In a competitive market, either one or three (small, medium and large) packages are offered. In contrast to common intuition, the large, and not the small package is a commitment device. The latter serves to exploit...

  2. SEXUAL EXPLOITATION AND ABUSE BY UN PEACEKEEPERS ...

    African Journals Online (AJOL)

    Allaiac

    sexual exploitation of children by peacekeepers is particularly insidious. ... sexual exploitation and abuse should involve an understanding of the social .... The charges of sexual misconduct, and the consequent media exposure, have ..... awareness programmes such as video tapes, lectures and training manuals, designed.

  3. Exploration, Exploitation, and Organizational Coordination Mechanisms

    Directory of Open Access Journals (Sweden)

    Silvio Popadiuk

    2016-03-01

    Full Text Available This paper presents an empirical relationship among exploration, exploitation, and organizational coordination mechanisms, classified as the centralization of decision-making, formalization, and connectedness. In order to analyze the findings of this survey, we used two techniques: Principal Component Analysis (PCA and Partial Least Squares Path Modeling (PLS-PM. Our analysis was supported by 249 answers from managers of companies located in Brazil (convenience sampling. Contrary to expectations, centralization and exploitation were negatively associated. Our data supports the research hypothesis that formalization is positively associated with exploitation. Although the relationship between formalization and exploration were significant, the result is contrary to the research hypothesis that we made. The relationships among connectedness and exploitation, and connectedness and exploration were both positive and significant. This relationship means that the more connectedness increases, the higher the likelihood of exploitation and exploration.

  4. The mitochondrial genome of Paragonimus westermani (Kerbert, 1878, the Indian isolate of the lung fluke representative of the family Paragonimidae (Trematoda

    Directory of Open Access Journals (Sweden)

    Devendra K. Biswal

    2014-08-01

    Full Text Available Among helminth parasites, Paragonimus (zoonotic lung fluke gains considerable importance from veterinary and medical points of view because of its diversified effect on its host. Nearly fifty species of Paragonimus have been described across the globe. It is estimated that more than 20 million people are infected worldwide and the best known species is Paragonimus westermani, whose type locality is probably India and which infects millions of people in Asia causing disease symptoms that mimic tuberculosis. Human infections occur through eating raw crustaceans containing metacercarie or ingestion of uncooked meat of paratenic hosts such as pigs. Though the fluke is known to parasitize a wide range of mammalian hosts representing as many as eleven families, the status of its prevalence, host range, pathogenic manifestations and its possible survivors in nature from where the human beings contract the infection is not well documented in India. We took advantage of the whole genome sequence data for P. westermani, generated by Next Generation Sequencing, and its comparison with the existing data for the P. westermani for comparative mt DNA phylogenomic analyses. Specific primers were designed for the 12 protein coding genes with the aid of existing P. westermani mtDNA as the reference. The Ion torrent next generation sequencing platform was harnessed to completely sequence the mitochondrial genome, and applied innovative approaches to bioinformatically assemble and annotate it. A strategic PCR primer design utilizing the whole genome sequence data from P. westermani enabled us to design specific primers capable of amplifying all regions of the mitochondrial genome from P. westermani. Assembly of NGS data from libraries enriched in mtDNA sequence by PCR gave rise to a total of 11 contigs spanning the entire 14.7 kb mt DNA sequence of P. westermani available at NCBI. We conducted gap-filling by traditional Sanger sequencing to fill in the gaps

  5. Herbivory eliminates fitness costs of mutualism exploiters.

    Science.gov (United States)

    Simonsen, Anna K; Stinchcombe, John R

    2014-04-01

    A common empirical observation in mutualistic interactions is the persistence of variation in partner quality and, in particular, the persistence of exploitative phenotypes. For mutualisms between hosts and symbionts, most mutualism theory assumes that exploiters always impose fitness costs on their host. We exposed legume hosts to mutualistic (nitrogen-fixing) and exploitative (non-nitrogen-fixing) symbiotic rhizobia in field conditions, and manipulated the presence or absence of insect herbivory to determine if the costly fitness effects of exploitative rhizobia are context-dependent. Exploitative rhizobia predictably reduced host fitness when herbivores were excluded. However, insects caused greater damage on hosts associating with mutualistic rhizobia, as a consequence of feeding preferences related to leaf nitrogen content, resulting in the elimination of fitness costs imposed on hosts by exploitative rhizobia. Our experiment shows that herbivory is potentially an important factor in influencing the evolutionary dynamic between legumes and rhizobia. Partner choice and host sanctioning are theoretically predicted to stabilize mutualisms by reducing the frequency of exploitative symbionts. We argue that herbivore pressure may actually weaken selection on choice and sanction mechanisms, thus providing one explanation of why host-based discrimination mechanisms may not be completely effective in eliminating nonbeneficial partners. © 2014 The Authors. New Phytologist © 2014 New Phytologist Trust.

  6. Peat exploitation - Environment. Effects and measures

    International Nuclear Information System (INIS)

    Stenbeck, G.

    1996-01-01

    This report gives a detailed description of the influence of peat exploitation on the land-, water- and atmospheric environments. Proposals for mitigatory measures to minimize damage to the environment are also given

  7. SEXUAL EXPLOITATION AND ABUSE BY UN PEACEKEEPERS ...

    African Journals Online (AJOL)

    Allaiac

    from sexual exploitation and sexual abuse (ST/SGB/2003/13) (UN, Secretary .... In addition, in most situations, UN personnel have enjoyed immunity from local .... 9 Official UN statistics show a higher incidence of allegations reported against.

  8. Exploitation of linkage learning in evolutionary algorithms

    CERN Document Server

    Chen, Ying-ping

    2010-01-01

    The exploitation of linkage learning is enhancing the performance of evolutionary algorithms. This monograph examines recent progress in linkage learning, with a series of focused technical chapters that cover developments and trends in the field.

  9. Exploitative and Deceptive Resource Acquisition Strategies

    Directory of Open Access Journals (Sweden)

    Joshua J. Reynolds

    2015-07-01

    Full Text Available Life history strategy (LHS and life history contingencies (LHCs should theoretically influence the use of exploitative and deceptive resource acquisition strategies. However, little research has been done in this area. The purpose of the present work was to create measures of exploitative strategies and test the predictions of life history theory. Pilot studies developed and validated a behavioral measure of cheating called the Dot Game. The role of individual LHS and LHCs (manipulated via validated story primes on cheating was investigated in Study 1. Studies 2a through 2c were conducted to develop and validate a self-report measure called the Exploitative and Deceptive Resource Acquisition Strategy Scale (EDRASS. Finally, Study 3 investigated life history and EDRASS. Results indicated that while LHS influences exploitative strategies, life history contingences had little effect. Implications of these findings are discussed.

  10. Organ sales: exploitative at any price?

    Science.gov (United States)

    Lawlor, Rob

    2014-05-01

    In many cases, claims that a transaction is exploitative will focus on the details of the transaction, such as the price paid or conditions. For example, in a claim that a worker is exploited, the grounds for the claim are usually that the pay is not sufficient or the working conditions too dangerous. In some cases, however, the claim that a transaction is exploitative is not seen to rely on these finer details. Many, for example, claim that organ sales would be exploitative, in a way that doesn't seem to depend on the details. This article considers, but ultimately rejects, a number of arguments which could be used to defend this sort of claim. © 2012 John Wiley & Sons Ltd.

  11. A Theory of Exploitative Child Labor

    OpenAIRE

    Carol Ann Rogers; Kenneth A. Swinnerton

    2003-01-01

    Child labor laws should aim to protect children who work, instead of trying to remove children from work. In this paper, we identify an instance when the risk of exploitation lowers the expected bene…t of child labor to the child,and therefore suppresses child labor force participation. Targeted legal intervention that lowers or removes the risk of exploitation raises child participation in the labor market, child welfare, and overall societal welfare. Targeting on child labor more broadly ma...

  12. Managing the Innovators for Exploration and Exploitation

    Directory of Open Access Journals (Sweden)

    C. Annique UN

    2007-09-01

    Full Text Available I analyze how to manage employees to achieve a balance between exploration and exploitation in large established firms. Previous studies suggest that, although firms need to undertake both exploration and exploitation simultaneously, this is difficult either because of the scarcity of resources or because of the incompatibility of these two processes. Proposed solutions have been ambidexterity, punctuated equilibrium or specialization. I suggest another method: managing employees. Specifically, I argue that using the so-called “innovative” system of human resource management practices, consisting of team-based incentive system, team-based job design, and job rotation, enables the firm to undertake exploration and exploitation simultaneously because it provides the psychological safety for people to explore new knowledge to make novel products and develops employees to have the perspective-taking capability that enables the integration of knowledge cross-functionally for efficiency. Using the so-called “traditional” system of human resource management practices, consisting of individual-based incentive system, individual-based job design, and no job rotation, has limited impact on either exploration or exploitation because it does not create the psychological safety for people to explore new knowledge and does not develop the perspective-taking capability needed for exploitation. Moreover, mixing practices from both systems is better than only using the traditional system in achieving exploration or exploitation, but less effective than only using the innovative system as the mix of practices can create inconsistent expectations on employees.

  13. Cloning the genes and DNA binding properties of high mobility group B1 (HMGB1) proteins from the human blood flukes Schistosoma mansoni and Schistosoma japonicum

    Czech Academy of Sciences Publication Activity Database

    De Oliveira, F.M.B.; Da Silva, I.C.dA.; Rumjanek, F.D.; Dias-Neto, E.; Guimaraes, P.E.M.; Verjovski-Almeida, S.; Štros, Michal; Fantappié, M.R.

    2006-01-01

    Roč. 377, - (2006), s. 33-45 ISSN 0378-1119 R&D Projects: GA ČR(CZ) GA204/05/2031 Institutional research plan: CEZ:AV0Z50040507 Keywords : HMGB1 * Schistosoma mansoni * Schistosoma japonicum Subject RIV: BO - Biophysics Impact factor: 2.721, year: 2006

  14. In silico analysis of the fucosylation-associated genome of the human blood fluke Schistosoma mansoni: cloning and characterization of the fucosyltransferase multigene family.

    Science.gov (United States)

    Peterson, Nathan A; Anderson, Tavis K; Yoshino, Timothy P

    2013-01-01

    Fucosylated glycans of the parasitic flatworm Schistosoma mansoni play key roles in its development and immunobiology. In the present study we used a genome-wide homology-based bioinformatics approach to search for genes that contribute to fucosylated glycan expression in S. mansoni, specifically the α2-, α3-, and α6-fucosyltransferases (FucTs), which transfer L-fucose from a GDP-L-fucose donor to an oligosaccharide acceptor. We identified and in silico characterized several novel schistosome FucT homologs, including six α3-FucTs and six α6-FucTs, as well as two protein O-FucTs that catalyze the unrelated transfer of L-fucose to serine and threonine residues of epidermal growth factor- and thrombospondin-type repeats. No α2-FucTs were observed. Primary sequence analyses identified key conserved FucT motifs as well as characteristic transmembrane domains, consistent with their putative roles as fucosyltransferases. Most genes exhibit alternative splicing, with multiple transcript variants generated. A phylogenetic analysis demonstrated that schistosome α3- and α6-FucTs form monophyletic clades within their respective gene families, suggesting multiple gene duplications following the separation of the schistosome lineage from the main evolutionary tree. Quantitative decreases in steady-state transcript levels of some FucTs during early larval development suggest a possible mechanism for differential expression of fucosylated glycans in schistosomes. This study systematically identifies the complete repertoire of FucT homologs in S. mansoni and provides fundamental information regarding their genomic organization, genetic variation, developmental expression, and evolutionary history.

  15. Solution Structure, Membrane Interactions, and Protein Binding Partners of the Tetraspanin Sm-TSP-2, a Vaccine Antigen from the Human Blood Fluke Schistosoma mansoni*

    Science.gov (United States)

    Jia, Xinying; Schulte, Leigh; Loukas, Alex; Pickering, Darren; Pearson, Mark; Mobli, Mehdi; Jones, Alun; Rosengren, Karl J.; Daly, Norelle L.; Gobert, Geoffrey N.; Jones, Malcolm K.; Craik, David J.; Mulvenna, Jason

    2014-01-01

    The tetraspanins (TSPs) are a family of integral membrane proteins that are ubiquitously expressed at the surface of eukaryotic cells. TSPs mediate a range of processes at the surface of the plasma membrane by providing a scaffold for the assembly of protein complexes known as tetraspanin-enriched microdomains (TEMs). We report here the structure of the surface-exposed EC2 domain from Sm-TSP-2, a TSP from Schistosoma mansoni and one of the better prospects for the development of a vaccine against schistosomiasis. This is the first solution structure of this domain, and our investigations of its interactions with lipid micelles provide a general model for interactions between TSPs, membranes, and other proteins. Using chemical cross-linking, eight potential protein constituents of Sm-TSP-2-mediated TEMs were also identified. These include proteins important for membrane maintenance and repair, providing further evidence for the functional role of Sm-TSP-2- and Sm-TSP-2-mediated TEMs. The identification of calpain, Sm29, and fructose-bisphosphate aldolase, themselves potential vaccine antigens, suggests that the Sm-TSP-2-mediated TEMs could be disrupted via multiple targets. The identification of further Sm-TSP-2-mediated TEM proteins increases the available candidates for multiplex vaccines and/or novel drugs targeting TEMs in the schistosome tegument. PMID:24429291

  16. Solution structure, membrane interactions, and protein binding partners of the tetraspanin Sm-TSP-2, a vaccine antigen from the human blood fluke Schistosoma mansoni.

    Science.gov (United States)

    Jia, Xinying; Schulte, Leigh; Loukas, Alex; Pickering, Darren; Pearson, Mark; Mobli, Mehdi; Jones, Alun; Rosengren, Karl J; Daly, Norelle L; Gobert, Geoffrey N; Jones, Malcolm K; Craik, David J; Mulvenna, Jason

    2014-03-07

    The tetraspanins (TSPs) are a family of integral membrane proteins that are ubiquitously expressed at the surface of eukaryotic cells. TSPs mediate a range of processes at the surface of the plasma membrane by providing a scaffold for the assembly of protein complexes known as tetraspanin-enriched microdomains (TEMs). We report here the structure of the surface-exposed EC2 domain from Sm-TSP-2, a TSP from Schistosoma mansoni and one of the better prospects for the development of a vaccine against schistosomiasis. This is the first solution structure of this domain, and our investigations of its interactions with lipid micelles provide a general model for interactions between TSPs, membranes, and other proteins. Using chemical cross-linking, eight potential protein constituents of Sm-TSP-2-mediated TEMs were also identified. These include proteins important for membrane maintenance and repair, providing further evidence for the functional role of Sm-TSP-2- and Sm-TSP-2-mediated TEMs. The identification of calpain, Sm29, and fructose-bisphosphate aldolase, themselves potential vaccine antigens, suggests that the Sm-TSP-2-mediated TEMs could be disrupted via multiple targets. The identification of further Sm-TSP-2-mediated TEM proteins increases the available candidates for multiplex vaccines and/or novel drugs targeting TEMs in the schistosome tegument.

  17. Blood pressure

    Science.gov (United States)

    Normal blood pressure is important for proper blood flow to the body's organs and tissues. The force of the blood on the walls of the arteries is called blood pressure. Blood pressure is measured both as the heart ...

  18. Blood Types

    Science.gov (United States)

    ... blood, safe blood transfusions depend on careful blood typing and cross-matching. There are four major blood ... cause exceptions to the above patterns. ABO blood typing is not sufficient to prove or disprove paternity ...

  19. Exploitation of Labour and Exploitation of Commodities: a “New Interpretation”

    OpenAIRE

    Veneziani, Roberto; Yoshihara, Naoki

    2011-01-01

    In the standard Okishio-Morishima approach, the existence of profits is proved to be equivalent to the exploitation of labour. Yet, it can also be proved that the existence of profits is equivalent to the ‘exploitation’ of any good. Labour and commodity exploitation are just different numerical representations of the productiveness of the economy. This paper presents an alternative approach to exploitation theory which is related to the New Interpretation (Duménil 1980; Foley 1982). In this a...

  20. Exploitation in International Paid Surrogacy Arrangements

    Science.gov (United States)

    Wilkinson, Stephen

    2015-01-01

    Abstract Many critics have suggested that international paid surrogacy is exploitative. Taking such concerns as its starting point, this article asks: (1) how defensible is the claim that international paid surrogacy is exploitative and what could be done to make it less exploitative? (2) In the light of the answer to (1), how strong is the case for prohibiting it? Exploitation could in principle be dealt with by improving surrogates' pay and conditions. However, doing so may exacerbate problems with consent. Foremost amongst these is the argument that surrogates from economically disadvantaged countries cannot validly consent because their background circumstances are coercive. Several versions of this argument are examined and I conclude that at least one has some merit. The article's overall conclusion is that while ethically there is something to be concerned about, paid surrogacy is in no worse a position than many other exploitative commercial transactions which take place against a backdrop of global inequality and constrained options, such as poorly‐paid and dangerous construction work. Hence, there is little reason to single surrogacy out for special condemnation. On a policy level, the case for prohibiting international commercial surrogacy is weak, despite legitimate concerns about consent and background poverty. PMID:27471338

  1. Exploitation in International Paid Surrogacy Arrangements.

    Science.gov (United States)

    Wilkinson, Stephen

    2016-05-01

    Many critics have suggested that international paid surrogacy is exploitative. Taking such concerns as its starting point, this article asks: (1) how defensible is the claim that international paid surrogacy is exploitative and what could be done to make it less exploitative? (2) In the light of the answer to (1), how strong is the case for prohibiting it? Exploitation could in principle be dealt with by improving surrogates' pay and conditions. However, doing so may exacerbate problems with consent. Foremost amongst these is the argument that surrogates from economically disadvantaged countries cannot validly consent because their background circumstances are coercive. Several versions of this argument are examined and I conclude that at least one has some merit. The article's overall conclusion is that while ethically there is something to be concerned about, paid surrogacy is in no worse a position than many other exploitative commercial transactions which take place against a backdrop of global inequality and constrained options, such as poorly-paid and dangerous construction work. Hence, there is little reason to single surrogacy out for special condemnation. On a policy level, the case for prohibiting international commercial surrogacy is weak, despite legitimate concerns about consent and background poverty.

  2. Oil exploitation and the environmental Kuznets curve

    International Nuclear Information System (INIS)

    Esmaeili, Abdoulkarim; Abdollahzadeh, Negar

    2009-01-01

    This study refers to a panel estimation of an environmental Kuznets curve (EKC) for oil to determine the factors most affecting oil exploitation in 38 oil-producing countries during 1990-2000. Control variables such as oil reserves, oil price, population, political rights, and the Gini index were used to determine its contribution to the main EKC model. The empirical results fully support the existence of an EKC for oil exploitation. Furthermore, the result indicates that the proved oil reserves has a significant and positive role in oil production, but oil price and population do not significantly affect crude oil production. Also, increased freedoms and a better income distribution will reduce the rate of oil exploitation. Thus, policies aiming at enhancing democratic society and better income distribution would be more compatible with sustainability. (author)

  3. Oil exploitation and the environmental Kuznets curve

    Energy Technology Data Exchange (ETDEWEB)

    Esmaeili, Abdoulkarim; Abdollahzadeh, Negar [Department of Agricultural Economics, College of Agriculture, Shiraz University, Shiraz, Fars (Iran)

    2009-01-15

    This study refers to a panel estimation of an environmental Kuznets curve (EKC) for oil to determine the factors most affecting oil exploitation in 38 oil-producing countries during 1990-2000. Control variables such as oil reserves, oil price, population, political rights, and the Gini index were used to determine its contribution to the main EKC model. The empirical results fully support the existence of an EKC for oil exploitation. Furthermore, the result indicates that the proved oil reserves has a significant and positive role in oil production, but oil price and population do not significantly affect crude oil production. Also, increased freedoms and a better income distribution will reduce the rate of oil exploitation. Thus, policies aiming at enhancing democratic society and better income distribution would be more compatible with sustainability. (author)

  4. Rethinking exploitation: a process-centered account.

    Science.gov (United States)

    Jansen, Lynn A; Wall, Steven

    2013-12-01

    Exploitation has become an important topic in recent discussions of biomedical and research ethics. This is due in no small measure to the influence of Alan Wertheimer's path-breaking work on the subject. This paper presents some objections to Wertheimer's account of the concept. The objections attempt to show that his account places too much emphasis on outcome-based considerations and too little on process-based considerations. Building on these objections, the paper develops an alternative process-centered account of the concept. This alternative account of exploitation takes as its point of departure the broadly Kantian notion that it is wrong to use another as an instrument for the advancement of one's own ends. It sharpens this slippery notion and adds a number of refinements to it. The paper concludes by arguing that process-centered accounts of exploitation better illuminate the ethical challenges posed by research on human subjects than outcome-centered accounts.

  5. Shale gas exploitation: Status, problems and prospect

    Directory of Open Access Journals (Sweden)

    Shiqian Wang

    2018-02-01

    Full Text Available Over the past five years, great progress has been made in shale gas exploitation, which has become the most driving force for global gas output growth. Hydrocarbon extraction from shale helps drive the USA on the road to energy independence. Besides, shale oil & gas production has been kept in a sustained growth by continuous improvement in drilling efficiency and well productivity in the case of tumbling oil prices and rig counts. Shale gas reserves and production have been in a rapid growth in China owing to the Lower Paleozoic Wufeng and Longmaxi shale gas exploitation in the Sichuan Basin, which has become an important sector for the future increment of gas reserves and output in China. However, substantial progress has been made neither in non-marine shale gas exploitation as previously expected nor in the broad complicated tectonic areas in South China for which a considerable investment was made. Analysis of the basic situation and issues in domestic shale gas development shows that shale gas exploitation prospects are constrained by many problems in terms of resources endowment, horizontal well fracturing technology, etc. especially in non-marine shale deposits and complicated tectonic areas in South China where hot shales are widely distributed but geological structures are found severely deformed and over matured. Discussion on the prospects shows that the sustained and steady growth in shale gas reserves and production capacity in the coming years lies in the discovery and supersession of new shale plays in addition to Wufeng and Longmaxi shale plays, and that a technological breakthrough in ultra-high-pressure and ultra-deep (over 3500 m buried in the Sichuan Basin marine shale gas exploitation is the key and hope. Keywords: Shale gas, Exploitation, Marine facies, Hot shale, Resource endowment, Sichuan Basin, South China, Complicated tectonic area, Gas play

  6. On the dynamics of exploited fish populations

    National Research Council Canada - National Science Library

    Beverton, R. J. H; Holt, Sidney J

    1993-01-01

    ...-brooding cichlids, and viviparity in many sharks and toothcarps. Moreover, fish are of considerable importance to the survival of the human species in the form of nutritious, delicious and diverse food. Rational exploitation and management of our global stocks of fishes must rely upon a detailed and precise insight of their biology. The...

  7. Child Exploitation: Some Pieces of the Puzzle.

    Science.gov (United States)

    Rohlader, Dorothy

    The report addresses the status in North Carolina and in the nation of child exploitation. Legislative and judicial backgrounds of child pornography and child prostitution are reviewed, and difficulties in obtaining statistical data are noted. Law enforcement issues in pornography are cited, and suggestions for further legislation regarding child…

  8. Exploiting a natural auxotrophy for genetic selection.

    Science.gov (United States)

    Ramage, Elizabeth; Gallagher, Larry; Manoil, Colin

    2012-08-01

    We exploited the natural histidine auxotrophy of Francisella species to develop hisD (encodes histidinol dehydrogenase) as a positive selection marker. A shuttle plasmid (pBR103) carrying Escherichia coli hisD and designed for cloning of PCR fragments replicated in both attenuated and highly virulent Francisella strains. During this work, we formulated a simplified defined growth medium for Francisella novicida.

  9. Growth, Mortality and Exploitation Rates of Sarotherodon ...

    African Journals Online (AJOL)

    Evans

    ABSTRACT. Sarotherodon melanotheron population of Dominli Lagoon in the Western Region of Ghana was studied for its growth and mortality parameters as well as exploitation rate. The study generally aimed at providing basic information necessary for the assessment and management of the fish stock in the lagoon.

  10. Economic factors of vulnerability trade and exploitation

    NARCIS (Netherlands)

    Allodi, L.

    2017-01-01

    Cybercrime markets support the development and diffusion of new attack technologies, vulnerability exploits, and malware. Whereas the revenue streams of cyber attackers have been studied multiple times in the literature, no quantitative account currently exists on the economics of attack acquisition

  11. Exploiting indigenous knowledge in the environmental conservation ...

    African Journals Online (AJOL)

    ... of agriculture and reared livestock (especially goats). Over several years, they developed sustainable and effective exploitation mechanisms of the existing biodiversity resources to satisfy their individual needs and those of their societies in general. Journal of Language, Technology and Entrepreneurship in Africa Vol.

  12. Exploiting citation contexts for physics retrieval

    DEFF Research Database (Denmark)

    Dabrowska, Anna; Larsen, Birger

    2015-01-01

    The text surrounding citations within scientific papers may contain terms that usefully describe cited documents and can benefit retrieval. We present a preliminary study that investigates appending ci- tation contexts from citing documents to cited documents in the iSearch test collection. We ex...... in a large collection of physics papers, paving the way for future research that exploits citation contexts for retrieval....

  13. Dissemination and Exploitation: Project Goals beyond Science

    Science.gov (United States)

    Hamann, Kristin; Reitz, Anja

    2017-04-01

    Dissemination and Exploitation are essential parts of public funded projects. In Horizon 2020 a plan for the exploitation and dissemination of results (PEDR) is a requirement. The plan should contain a clear vision on the objectives of the project in relation to actions for dissemination and potential exploitation of the project results. The actions follow the basic idea to spread the knowledge and results gathered within the project and face the challenge of how to bring the results into potentially relevant policy circle and how they impact the market. The plan follows the purpose to assess the impact of the project and to address various target groups who are interested in the project results. Simply put, dissemination concentrates on the transfer of knowledge and exploitation on the commercialization of the project. Beyond the question of the measurability of project`s impact, strategies within science marketing can serve purposes beyond internal and external communication. Accordingly, project managers are facing the challenge to implement a dissemination and exploitation strategy that ideally supports the identification of all partners with the project and matches the current discourse of the project`s content within the society, politics and economy. A consolidated plan might unite all projects partners under a central idea and supports the identification with the project beyond the individual research questions. Which applications, strategies and methods can be used to bring forward a PEDR that accompanies a project successfully and allows a comprehensive assessment of the project afterwards? Which hurdles might project managers experience in the dissemination process and which tasks should be fulfilled by the project manager?

  14. Trolling may intensify exploitation in crappie fisheries

    Science.gov (United States)

    Meals, K. O.; Dunn, A. W.; Miranda, Leandro E.

    2012-01-01

    In some parts of the USA, anglers targeting crappies Pomoxis spp. are transitioning from mostly stationary angling with a single pole around submerged structures to using multiple poles while drifting with the wind or under power. This shift in fishing methods could result in a change in catch efficiency, possibly increasing exploitation rates to levels that would be of concern to managers. We studied the catch statistics of anglers fishing while trolling with multiple poles (trollers) and those fishing with single poles (polers) in Mississippi reservoirs. Specifically, we tested whether (1) various catch statistics differed between trollers and polers, (2) catch rates of trollers were related to the number of poles fished, and (3) trollers could raise exploitation rates to potentially unsustainable levels. Results showed that participation in the crappie fisheries was about equally split between polers and trollers. In spring, 90% of crappie anglers were polers; in summer, 85% of crappie anglers were trollers. The size of harvested crappies was similar for the two angler groups, but the catch per hour was almost three times higher for trollers than for polers. Catch rates by trollers were directly correlated to the number of poles fished, although the relationship flattened as the number of poles increased. The average harvest rate for one troller fishing with three poles was similar to the harvest rate obtained by one poler. Simulations predicted that at the existing mix of about 50% polers and 50% trollers and with no restrictions on the number of poles used by trollers, exploitation of crappies is about 1.3 times higher than that in a polers-only fishery; under a scenario in which 100% of crappie anglers were trollers, exploitation was forecasted to increase to about 1.7 times the polers-only rate. The efficiency of trolling for crappies should be of concern to fishery managers because crappie fisheries are mostly consumptive and may increase exploitation

  15. Intelligence, mapping, and geospatial exploitation system (IMAGES)

    Science.gov (United States)

    Moellman, Dennis E.; Cain, Joel M.

    1998-08-01

    This paper provides further detail to one facet of the battlespace visualization concept described in last year's paper Battlespace Situation Awareness for Force XXI. It focuses on the National Imagery and Mapping Agency (NIMA) goal to 'provide customers seamless access to tailorable imagery, imagery intelligence, and geospatial information.' This paper describes Intelligence, Mapping, and Geospatial Exploitation System (IMAGES), an exploitation element capable of CONUS baseplant operations or field deployment to provide NIMA geospatial information collaboratively into a reconnaissance, surveillance, and target acquisition (RSTA) environment through the United States Imagery and Geospatial Information System (USIGS). In a baseplant CONUS setting IMAGES could be used to produce foundation data to support mission planning. In the field it could be directly associated with a tactical sensor receiver or ground station (e.g. UAV or UGV) to provide near real-time and mission specific RSTA to support mission execution. This paper provides IMAGES functional level design; describes the technologies, their interactions and interdependencies; and presents a notional operational scenario to illustrate the system flexibility. Using as a system backbone an intelligent software agent technology, called Open Agent ArchitectureTM (OAATM), IMAGES combines multimodal data entry, natural language understanding, and perceptual and evidential reasoning for system management. Configured to be DII COE compliant, it would utilize, to the extent possible, COTS applications software for data management, processing, fusion, exploitation, and reporting. It would also be modular, scaleable, and reconfigurable. This paper describes how the OAATM achieves data synchronization and enables the necessary level of information to be rapidly available to various command echelons for making informed decisions. The reasoning component will provide for the best information to be developed in the timeline

  16. Advances in Blood Typing.

    Science.gov (United States)

    Quraishy, N; Sapatnekar, S

    The clinical importance of blood group antigens relates to their ability to evoke immune antibodies that are capable of causing hemolysis. The most important antigens for safe transfusion are ABO and D (Rh), and typing for these antigens is routinely performed for patients awaiting transfusion, prenatal patients, and blood donors. Typing for other blood group antigens, typically of the Kell, Duffy, Kidd, and MNS blood groups, is sometimes necessary, for patients who have, or are likely to develop antibodies to these antigens. The most commonly used typing method is serological typing, based on hemagglutination reactions against specific antisera. This method is generally reliable and practical for routine use, but it has certain drawbacks. In recent years, molecular typing has emerged as an alternative or supplemental typing method. It is based on detecting the polymorphisms and mutations that control the expression of blood group antigens, and using this information to predict the probable antigen type. Molecular typing methods are useful when traditional serological typing methods cannot be used, as when a patient has been transfused and the sample is contaminated with red blood cells from the transfused blood component. Moreover, molecular typing methods can precisely identify clinically significant variant antigens that cannot be distinguished by serological typing; this capability has been exploited for the resolution of typing discrepancies and shows promise for the improved transfusion management of patients with sickle cell anemia. Despite its advantages, molecular typing has certain limitations, and it should be used in conjunction with serological methods. © 2016 Elsevier Inc. All rights reserved.

  17. Sustainable exploitation and management of aquatic resources

    DEFF Research Database (Denmark)

    Neuenfeldt, Stefan; Köster, Fritz

    2014-01-01

    DTU Aqua conducts research, provides advice,educates at university level and contributes toinnovation in sustainable exploitation andmanagement of aquatic resources. The vision of DTUAqua is to enable ecologically and economicallysustainable exploitation of aquatic resourcesapplying an integrated...... management. Marineecosystems aims at understanding the mechanisms that govern the interaction between individuals,species and populations in an ecosystem enabling us to determine the stability and flexibility of theecosystem.Marine living resources looks at the sustainable utilization of fish and shellfish...... stocks.Ecosystem effects expands from the ecosystem approach to fisheries management to an integratedapproach where other human activities are taken into consideration. Fisheries management developsmethods, models and tools for predicting and evaluating the effects of management measures andregulations...

  18. Exploiting HRM in support of lean manufacturing

    DEFF Research Database (Denmark)

    Jørgensen, Frances; Matthiesen, Rikke

    The purpose of this paper is to investigate the ways in HRM practices are-and could potentially be-exploited to support lean manufacturing in practice. First, a review of the pertinent literature regarding HRM, SHRM, and lean manufacturing is presented to provide an understanding of the mechanisms...... by which HRM practices could, theoretically, be used to support a lean implementation. Data presented in the paper are derived from 1) a longitudinal case study on lean implementation and 2) from managers currently involved with lean manufacturing in a second company. The relevant literature and the data...... depicting the potential role in supporting HRM/lean integrated practices. The analysis of the model with respect to the theoretical background emphasizes a number of areas in which HRM could be more fully exploited in order to more successfully support lean implementation, for example, by stressing HRM...

  19. Exploiting Non-Markovianity for Quantum Control.

    Science.gov (United States)

    Reich, Daniel M; Katz, Nadav; Koch, Christiane P

    2015-07-22

    Quantum technology, exploiting entanglement and the wave nature of matter, relies on the ability to accurately control quantum systems. Quantum control is often compromised by the interaction of the system with its environment since this causes loss of amplitude and phase. However, when the dynamics of the open quantum system is non-Markovian, amplitude and phase flow not only from the system into the environment but also back. Interaction with the environment is then not necessarily detrimental. We show that the back-flow of amplitude and phase can be exploited to carry out quantum control tasks that could not be realized if the system was isolated. The control is facilitated by a few strongly coupled, sufficiently isolated environmental modes. Our paradigmatic example considers a weakly anharmonic ladder with resonant amplitude control only, restricting realizable operations to SO(N). The coupling to the environment, when harnessed with optimization techniques, allows for full SU(N) controllability.

  20. Exploiting Quantum Resonance to Solve Combinatorial Problems

    Science.gov (United States)

    Zak, Michail; Fijany, Amir

    2006-01-01

    Quantum resonance would be exploited in a proposed quantum-computing approach to the solution of combinatorial optimization problems. In quantum computing in general, one takes advantage of the fact that an algorithm cannot be decoupled from the physical effects available to implement it. Prior approaches to quantum computing have involved exploitation of only a subset of known quantum physical effects, notably including parallelism and entanglement, but not including resonance. In the proposed approach, one would utilize the combinatorial properties of tensor-product decomposability of unitary evolution of many-particle quantum systems for physically simulating solutions to NP-complete problems (a class of problems that are intractable with respect to classical methods of computation). In this approach, reinforcement and selection of a desired solution would be executed by means of quantum resonance. Classes of NP-complete problems that are important in practice and could be solved by the proposed approach include planning, scheduling, search, and optimal design.

  1. Exploiting Inhibitory Siglecs to Combat Food Allergies

    Science.gov (United States)

    2017-10-01

    AWARD NUMBER: W81XWH-16-1-0302 TITLE: Exploiting Inhibitory Siglecs to Combat Food Allergies PRINCIPAL INVESTIGATOR: Michael Kulis, Ph.D...CONTRACTING ORGANIZATION: University of North Carolina at Chapel Hill Chapel Hill, NC 27599 REPORT DATES: October 2017 TYPE OF REPORT: Annual PREPARED FOR...Department of Defense, Washington Headquarters Services , Directorate for Information Operations and Reports (0704-0188), 1215 Jefferson Davis Highway, Suite

  2. Dandruff: The most commercially exploited skin disease

    Directory of Open Access Journals (Sweden)

    Ranganathan S

    2010-01-01

    Full Text Available The article discuss in detail about the prevalence, pathophysiology, clinical manifestations of dandruff including the etio-pathology. The article also discusses in detail about various treatment methods available for dandruff. The status of dandruff being amphibious - a disease/disorder, and relatively less medical intervention is sought after for the treatment, dandruff is the most commercially exploited skin and scalp disorder/disease by personal care industries.

  3. Exploiting partial knowledge for efficient model analysis

    OpenAIRE

    Macedo, Nuno; Cunha, Alcino; Pessoa, Eduardo José Dias

    2017-01-01

    The advancement of constraint solvers and model checkers has enabled the effective analysis of high-level formal specification languages. However, these typically handle a specification in an opaque manner, amalgamating all its constraints in a single monolithic verification task, which often proves to be a performance bottleneck. This paper addresses this issue by proposing a solving strategy that exploits user-provided partial knowledge, namely by assigning symbolic bounds to the problem’s ...

  4. Amplifiers Exploiting Thermal Noise Canceling: A Review

    OpenAIRE

    Klumperink, Eric A.M.; Bruccoleri, Federico; Stroet, Peter; Nauta, Bram

    2004-01-01

    Wide-band LNAs suffer from a fundamental trade-off between noise figure NF and source impedance matching, which limits NF to values typically above 3dB. Recently, a feed-forward noise canceling technique has been proposed to break this trade-off. This paper reviews the principle of the technique and its key properties. Although the technique has been applied to wideband CMOS LNAs, it can just as well be implemented exploiting transconductance elements realized with oth...

  5. Exploiting thesauri knowledge in medical guideline formalization

    OpenAIRE

    Serban, R.C.; ten Teije, A.C.M.

    2009-01-01

    Objectives: As in software product lifecycle, the effort spent in maintaining medical knowl edge in guidelines can be reduced, if modularization, formalization and tracking of domain knowledge are employed across the guideline development phases. Methods: We propose to exploit and combine knowledge templates with medical background knowledge from existing thesauri in order to produce reusable building blocks used in guideline development. These tem- plates enable easier guideline formalizatio...

  6. Exploitation as the Unequal Exchange of Labour : An Axiomatic Approach

    OpenAIRE

    Yoshihara, Naoki; Veneziani, Roberto

    2009-01-01

    In subsistence economies with general convex technology and rational optimising agents, a new, axiomatic approach is developed, which allows an explicit analysis of the core positive and normative intuitions behind the concept of exploitation. Three main new axioms, called Labour Exploitation in Subsistence Economies , Relational Exploitation , and Feasibility of Non-Exploitation , are presented and it is proved that they uniquely characterise a definition of exploitation conceptually related...

  7. Security option file - Exploitation (DOS-Expl)

    International Nuclear Information System (INIS)

    2016-01-01

    This document aims at presenting functions performed by Cigeo during its exploitation phase, its main technical and security options which are envisaged with respect to different types of internal or external risks, and a first assessment of its impact on mankind and on the environment during its exploitation in normal operation as well as in incidental or accidental situations. A first volume addresses security principles, approach and management in relationship with the legal and regulatory framework. The second volume presents input data related to waste parcels and used for the installation sizing and operation, the main site characteristics, the main technical options regarding structures and equipment, and the main options regarding exploitation (parcel management, organisational and human aspects, and effluent management). The third volume describes how parcel are processed from their arrival to their setting in storage compartment, an inventory of internal and external risks, and a first assessment of consequences of scenarios on mankind and on the environment. The fourth volume presents options and operations which are envisaged regarding Cigeo closure, and inventory of associated risks

  8. Donating Blood

    Science.gov (United States)

    ... The medical history includes questions that help blood bank staff decide if a person is healthy enough to donate blood. They'll ... Food and Drug Administration (FDA) regulates U.S. blood banks. All blood ... operating. Sometimes people who donate blood notice a few minor side ...

  9. What's Blood?

    Science.gov (United States)

    ... Body Make Blood? It's not made in a kitchen, but blood has ingredients, just like a recipe. ... these ingredients together and you have blood — an essential part of the circulatory system. Thanks to your ...

  10. Blood typing

    Science.gov (United States)

    ... detect these minor antigens. It is done before transfusions, except in emergency situations. Alternative Names Cross matching; Rh typing; ABO blood typing; Blood group; Anemia - immune hemolytic blood type; ...

  11. Blood smear

    Science.gov (United States)

    ... smear URL of this page: //medlineplus.gov/ency/article/003665.htm Blood smear To use the sharing features on this ... view of cellular parasites Malaria, photomicrograph of cellular parasites Red blood cells, sickle cells Red blood cells, sickle and ...

  12. Cloud Based Earth Observation Data Exploitation Platforms

    Science.gov (United States)

    Romeo, A.; Pinto, S.; Loekken, S.; Marin, A.

    2017-12-01

    In the last few years data produced daily by several private and public Earth Observation (EO) satellites reached the order of tens of Terabytes, representing for scientists and commercial application developers both a big opportunity for their exploitation and a challenge for their management. New IT technologies, such as Big Data and cloud computing, enable the creation of web-accessible data exploitation platforms, which offer to scientists and application developers the means to access and use EO data in a quick and cost effective way. RHEA Group is particularly active in this sector, supporting the European Space Agency (ESA) in the Exploitation Platforms (EP) initiative, developing technology to build multi cloud platforms for the processing and analysis of Earth Observation data, and collaborating with larger European initiatives such as the European Plate Observing System (EPOS) and the European Open Science Cloud (EOSC). An EP is a virtual workspace, providing a user community with access to (i) large volume of data, (ii) algorithm development and integration environment, (iii) processing software and services (e.g. toolboxes, visualization routines), (iv) computing resources, (v) collaboration tools (e.g. forums, wiki, etc.). When an EP is dedicated to a specific Theme, it becomes a Thematic Exploitation Platform (TEP). Currently, ESA has seven TEPs in a pre-operational phase dedicated to geo-hazards monitoring and prevention, costal zones, forestry areas, hydrology, polar regions, urban areas and food security. On the technology development side, solutions like the multi cloud EO data processing platform provides the technology to integrate ICT resources and EO data from different vendors in a single platform. In particular it offers (i) Multi-cloud data discovery, (ii) Multi-cloud data management and access and (iii) Multi-cloud application deployment. This platform has been demonstrated with the EGI Federated Cloud, Innovation Platform Testbed Poland

  13. Heisenberg's heirs exploit loopholes in his law

    International Nuclear Information System (INIS)

    Taubes, G.

    1994-01-01

    This article describes research into Heisenberg's Uncertainty Principle. Loopholes in the principle have led to a series of experiments using sophisticated optical techniques to extract information from a quantum system without disturbing the variable being measured. The experiments are based on a technique called back-action evasion, which exploits the possibility of channeling all the uncertainty generated by measuring one quantum variable (e.g. laser beam intensity) onto a related variable known as the conjugate observable (beam phase). These experiments and others are described

  14. Liposomal cancer therapy: exploiting tumor characteristics

    DEFF Research Database (Denmark)

    Kaasgaard, Thomas; Andresen, Thomas Lars

    2010-01-01

    an overview of current strategies for improving the different stages of liposomal cancer therapy, which involve transporting drug-loaded liposomes through the bloodstream, increasing tumor accumulation, and improving drug release and cancer cell uptake after accumulation at the tumor target site. What...... the reader will gain: The review focuses on strategies that exploit characteristic features of solid tumors, such as abnormal vasculature, overexpression of receptors and enzymes, as well as acidic and thiolytic characteristics of the tumor microenvironment. Take home message: It is concluded that the design...

  15. Pilot plant for exploitation of geothermal waters

    Directory of Open Access Journals (Sweden)

    Stojiljković Dragan T.

    2006-01-01

    Full Text Available In Sijarinska spa, there are some 15 mineral and thermomineral springs, that are already being used for therapeutic purposes. For the exploitation of heat energy boring B-4 is very interesting. It is a boring of a closed type, with the water temperature of about 78°C and a flow rate of about 33 l/s. Waters with the flow rate of about 6 l/s are currently used for heating of the Gejzer hotel, and waters of the flow rate of about 0,121 l/s for the pilot drying plant. The paper presents this pilot plant. .

  16. Exploiting Redundancy in an OFDM SDR Receiver

    Directory of Open Access Journals (Sweden)

    Tomas Palenik

    2009-01-01

    Full Text Available Common OFDM system contains redundancy necessary to mitigate interblock interference and allows computationally effective single-tap frequency domain equalization in receiver. Assuming the system implements an outer error correcting code and channel state information is available in the receiver, we show that it is possible to understand the cyclic prefix insertion as a weak inner ECC encoding and exploit the introduced redundancy to slightly improve error performance of such a system. In this paper, an easy way to implement modification to an existing SDR OFDM receiver is presented. This modification enables the utilization of prefix redundancy, while preserving full compatibility with existing OFDM-based communication standards.

  17. Geothermal resources: exploration and exploitation. A bibliography

    Energy Technology Data Exchange (ETDEWEB)

    1976-07-01

    This comprehensive bibliography contains 5476 citations of foreign and domestic research reports, journal articles, patents, conference proceedings, and books concerned with the exploration and exploitation of geothermal resources. The coverage dates back as far as useful references could be obtained and extends through June 1976. References are arranged in broad subject categories and are made up of complete bibliographic citations. These are followed by a listing of subject descriptors used to describe the subject content of each reference. Four indexes are included: Corporate, Personal Author, Subject, and Report Number. Also included is a list of journals from which articles were selected. (LBS)

  18. Algorithms exploiting ultrasonic sensors for subject classification

    Science.gov (United States)

    Desai, Sachi; Quoraishee, Shafik

    2009-09-01

    Proposed here is a series of techniques exploiting micro-Doppler ultrasonic sensors capable of characterizing various detected mammalian targets based on their physiological movements captured a series of robust features. Employed is a combination of unique and conventional digital signal processing techniques arranged in such a manner they become capable of classifying a series of walkers. These processes for feature extraction develops a robust feature space capable of providing discrimination of various movements generated from bipeds and quadrupeds and further subdivided into large or small. These movements can be exploited to provide specific information of a given signature dividing it in a series of subset signatures exploiting wavelets to generate start/stop times. After viewing a series spectrograms of the signature we are able to see distinct differences and utilizing kurtosis, we generate an envelope detector capable of isolating each of the corresponding step cycles generated during a walk. The walk cycle is defined as one complete sequence of walking/running from the foot pushing off the ground and concluding when returning to the ground. This time information segments the events that are readily seen in the spectrogram but obstructed in the temporal domain into individual walk sequences. This walking sequence is then subsequently translated into a three dimensional waterfall plot defining the expected energy value associated with the motion at particular instance of time and frequency. The value is capable of being repeatable for each particular class and employable to discriminate the events. Highly reliable classification is realized exploiting a classifier trained on a candidate sample space derived from the associated gyrations created by motion from actors of interest. The classifier developed herein provides a capability to classify events as an adult humans, children humans, horses, and dogs at potentially high rates based on the tested sample

  19. Blood Culture (For Parents)

    Science.gov (United States)

    ... Metabolic Panel (BMP) Blood Test: Complete Blood Count Basic Blood Chemistry Tests Getting a Blood Test (Video) Blood Test: Basic Metabolic Panel Blood Test: Comprehensive Metabolic Panel Blood ...

  20. Prevalence of fascioliasis (liver flukes) infection in cattle and buffaloes slaughtered at the municipal abattoir of El-Kharga, Egypt

    Science.gov (United States)

    Elshraway, Nagwa T.; Mahmoud, Wafaa G.

    2017-01-01

    Aim: The main objectives of this study were to determine the prevalence of fascioliasis infections in cattle and buffaloes, slaughtered in El-Kharga city slaughterhouse at New Valley Governorate. Materials and Methods: The slaughtered animals were daily inspected for liver fascioliasis allover 2016. Macroscopic fascioliasis was detected from a total of 2251 basing on animals specie, sex, season, and Fasciola spp. in addition to microscopic examination of blood, fecal samples which collected from female cattle and buffalo (50 each). Results: The total prevalence rate of Fasciola sp. infection occurs in the study area were about 695/2251 (30.88%) from the total cattle and bovine slaughtered carcasses. The incidence of fascioliasis was 4/12 (33.33%) and 678/2200 (30.82%) for females and males cattle carcasses, respectively, while the infection rate in buffalo carcasses was 1/4 (25.00%) and 12/35 (34.29%) for females and males buffalo carcasses, respectively. Conclusion: The moderate fasciolosis infection in cattle and buffaloes slaughtered at the municipal abattoir of El-Kharga, Egypt. The highest fascioliasis infection was recorded during winter and autumn. It constitutes a major cause of economic losses at El-Kharga abattoir and threat public health. PMID:28919682

  1. Competing Discourses about Youth Sexual Exploitation in Canadian News Media.

    Science.gov (United States)

    Saewyc, Elizabeth M; Miller, Bonnie B; Rivers, Robert; Matthews, Jennifer; Hilario, Carla; Hirakata, Pam

    2013-10-01

    Media holds the power to create, maintain, or break down stigmatizing attitudes, which affect policies, funding, and services. To understand how Canadian news media depicts the commercial sexual exploitation of children and youth, we examined 835 Canadian newspaper articles from 1989-2008 using a mixed methods critical discourse analysis approach, comparing representations to existing research about sexually exploited youth. Despite research evidence that equal rates of boys and girls experience exploitation, Canadian news media depicted exploited youth predominantly as heterosexual girls, and described them alternately as victims or workers in a trade, often both in the same story. News media mentioned exploiters far less often than victims, and portrayed them almost exclusively as male, most often called 'customers' or 'consumers,' and occasionally 'predators'; in contrast, research has documented the majority of sexually exploited boys report female exploiters. Few news stories over the past two decades portrayed the diversity of victims, perpetrators, and venues of exploitation reported in research. The focus on victims but not exploiters helps perpetuate stereotypes of sexual exploitation as business or a 'victimless crime,' maintains the status quo, and blurs responsibility for protecting youth under the UN Convention on the Rights of the Child. Health care providers and researchers can be advocates for accuracy in media coverage about sexual exploitation; news reporters and editors should focus on exploiters more than victims, draw on existing research evidence to avoid perpetuating stereotypes, and use accurate terms, such as commercial sexual exploitation, rather than terms related to business or trade.

  2. ROUNDTABLE - SESSION 2 EXPLOITATION, CONSERVATION AND LEGISLATION

    Directory of Open Access Journals (Sweden)

    EDSMAN L.

    2004-01-01

    Full Text Available The link between socioeconomics and conservation and the role of legislation in conservation work was discussed in the group with participants from nine European countries. Interest and knowledge among the general public, stakeholders and managers is the key to successful conservation of native crayfish species. Exploitation and conservation do not necessarily exclude each other. A controlled fishery, where it can be sustained, may be an essential tool for conservation by increasing the general awareness and involving more people in the task of protecting the native crayfish species. This strategy is mainly possible for the noble crayfish in the northern part of its distribution, where strong traditions connected to crayfish also exist. A balance between utilisation and overexploitation has to be found and local guidelines for sustainable exploitation produced. Media, the Internet and educational material aimed at schools and stakeholders are excellent ways of reaching a wide audience with information. Universal objectives, rules and regulations at the European level are desirable and the noble crayfish and the stone crayfish should be included in Annex II of the Habitat Directive. Based on this framework detailed regulations are best worked out at the national level, considering the specific crayfish situation in the country. Information about the legislation, the purpose of the legislation and the consequences when not obeying it should be distributed. Stricter regulation of the trade with live alien crayfish is vital because of the associated risk of introducing new diseases and species.

  3. Uncovering Indicators of Commercial Sexual Exploitation.

    Science.gov (United States)

    Bounds, Dawn; Delaney, Kathleen R; Julion, Wrenetha; Breitenstein, Susan

    2017-07-01

    It is estimated that annually 100,000 to 300,000 youth are at risk for sex trafficking; a commercial sex act induced by force, fraud, or coercion, or any such act where the person induced to perform such an act is younger than 18 years of age. Increasingly, such transactions are occurring online via Internet-based sites that serve the commercial sex industry. Commercial sex transactions involving trafficking are illegal; thus, Internet discussions between those involved must be veiled. Even so, transactions around sex trafficking do occur. Within these transactions are innuendos that provide one avenue for detecting potential activity. The purpose of this study is to identify linguistic indicators of potential commercial sexual exploitation within the online comments of men posted on an Internet site. Six hundred sixty-six posts from five Midwest cities and 363 unique members were analyzed via content analysis. Three main indicators were found: the presence of youth or desire for youthfulness, presence of pimps, and awareness of vulnerability. These findings begin a much-needed dialogue on uncovering online risks of commercial sexual exploitation and support the need for further research on Internet indicators of sex trafficking.

  4. Large size space construction for space exploitation

    Science.gov (United States)

    Kondyurin, Alexey

    2016-07-01

    Space exploitation is impossible without large space structures. We need to make sufficient large volume of pressurized protecting frames for crew, passengers, space processing equipment, & etc. We have to be unlimited in space. Now the size and mass of space constructions are limited by possibility of a launch vehicle. It limits our future in exploitation of space by humans and in development of space industry. Large-size space construction can be made with using of the curing technology of the fibers-filled composites and a reactionable matrix applied directly in free space. For curing the fabric impregnated with a liquid matrix (prepreg) is prepared in terrestrial conditions and shipped in a container to orbit. In due time the prepreg is unfolded by inflating. After polymerization reaction, the durable construction can be fitted out with air, apparatus and life support systems. Our experimental studies of the curing processes in the simulated free space environment showed that the curing of composite in free space is possible. The large-size space construction can be developed. A project of space station, Moon base, Mars base, mining station, interplanet space ship, telecommunication station, space observatory, space factory, antenna dish, radiation shield, solar sail is proposed and overviewed. The study was supported by Humboldt Foundation, ESA (contract 17083/03/NL/SFe), NASA program of the stratospheric balloons and RFBR grants (05-08-18277, 12-08-00970 and 14-08-96011).

  5. PROBA-V Mission Exploitation Platform

    Directory of Open Access Journals (Sweden)

    Erwin Goor

    2016-07-01

    Full Text Available As an extension of the PROBA-Vegetation (PROBA-V user segment, the European Space Agency (ESA, de Vlaamse Instelling voor Technologisch Onderzoek (VITO, and partners TRASYS and Spacebel developed an operational Mission Exploitation Platform (MEP to drastically improve the exploitation of the PROBA-V Earth Observation (EO data archive, the archive from the historical SPOT-VEGETATION mission, and derived products by researchers, service providers, and thematic users. The analysis of the time series of data (petabyte range is addressed, as well as the large scale on-demand processing of the complete archive, including near real-time data. The platform consists of a private cloud environment, a Hadoop-based processing environment and a data manager. Several applications are released to the users, e.g., a full resolution viewing service, a time series viewer, pre-defined on-demand processing chains, and virtual machines with powerful tools and access to the data. After an initial release in January 2016 a research platform was deployed gradually, allowing users to design, debug, and test applications on the platform. From the PROBA-V MEP, access to, e.g., Sentinel-2 and Sentinel-3 data will be addressed as well.

  6. zero day exploits and national readiness for cyber-warfare

    African Journals Online (AJOL)

    HOD

    A zero day vulnerability is an unknown exploit that divulges security flaws in software before such a flaw is publicly ... Keywords: exploits, zero day, vulnerability, cyberspace, cyber-warfare. 1. ..... industries and companies across the globe. The.

  7. The Theory of Exploitation as the Unequal Exchange of Labour

    OpenAIRE

    Veneziani, Roberto; Yoshihara, Naoki

    2016-01-01

    This paper analyses the normative and positive foundations of the theory of exploitation as the unequal exchange of labour (UEL). The key intuitions behind all of the main approaches to UEL exploitation are explicitly analysed as a series of formal claims in a general economic environment. It is then argued that these intuitions can be captured by one fundamental axiom - called Labour Exploitation - which defines the basic domain of all UEL exploitation forms and identifies the formal and the...

  8. The theory of exploitation as the unequal exchange of labour

    OpenAIRE

    Veneziani, Roberto; Yoshihara, Naoki

    2017-01-01

    This paper analyses the normative and positive foundations of the theory of exploitation as the unequal exchange of labour (UEL). The key intuitions behind all of the main approaches to UEL exploitation are explicitly analysed as a series of formal claims in a general economic environment. It is then argued that these intuitions can be captured by one fundamental axiom - called Labour Exploitation - which defines the basic domain of all UEL exploitation forms and identifies the formal and the...

  9. Total exploitation of an ornamental granite quarry

    Directory of Open Access Journals (Sweden)

    Taboada, J.

    2005-09-01

    Full Text Available In this paper we propose a methodology to estimate the recovery percentage for each of the products which can be obtained from the exploitation of an ornamental granite quarry: block, semiblock, masonry-transverse stone, and the smaller materials that can be used to obtain construction aggregates. This methodology ensures that quarry exploitation is exhaustive, thereby minimising the production of spoils and the consequent negative impact on the environment. The analysis is based on a detailed and exhaustive compilation of discontinuity data from the research fronts, which are then interpreted statistically and projected over the three weakness planes that are a particular feature of ornamental granite deposits. Using this information, and bearing in mind the minimum commercially viable sizes for each kind of granite, the corresponding recovery rates are calculated for each material in each plane. The results are then integrated using spatial techniques, and the result is an evaluation of quarry contents with a view to total exploitation. This methodology was applied to a quarry in the opening phase in order to carry out an a priori assessment of the economic feasibility of the quarry.

    En este trabajo se propone una metodología para estimar el porcentaje de recuperación de cada uno de los productos que se pueden obtener en la explotación de una cantera de granito ornamental: bloque, semibloque, manpostería y per piaños, y material restante destinado a la obtención de áridos. De esta manera se logra un aprovechamiento integral de la cantera, evitándose la generación de estériles y el subsiguiente impacto ambiental producido por éstos. La metodología de análisis se basa en la recopilación detallada y exhaustiva de datos de discontinuidades en los frentes de investigación, que se interpretan estadísticamente y se proyectan sobre los tres planos de debilidad propios del granito ornamental. Con esta información, y las

  10. Environmental effects of geothermal energy exploitation

    Energy Technology Data Exchange (ETDEWEB)

    Nakamura, H [Japan Metals and Chemicals Co., Ltd., Japan

    1975-01-01

    The environmental effects of geothermal power generation which cause air and water pollution and destruction of natural areas are reviewed. The production of steam and hot water affect existing hot springs sources and can cause ground subsidence. Harmful gas can be released onto the atmosphere from fumarolic gas and hot springs. Hydrothermal geothermal fields occasionally contain harmful substances such as arsenic in the hot water. Serious environmental effects can result from geothermal exploitation activities such as the felling of trees for road construction, well drilling, and plant construction. Once geothermal power generation has begun, the release of H/sub 2/S into the atmosphere and the reinjection of hot water are conducted continuously and sufficient countermeasures can be taken. One problem is the effects of plant construction and operation on natural parks. It is important to reach a compromise between development and protection of natural senic areas. Two figures, two tables, and 13 references are provided.

  11. CHARACTERISTICS OF HYDROCARBON EXPLOITATION IN ARCTIC CIRCLE

    Directory of Open Access Journals (Sweden)

    Vanja Lež

    2013-12-01

    Full Text Available The existence of large quantities of hydrocarbons is supposed within the Arctic Circle. Assumed quantities are 25% of the total undiscovered hydrocarbon reserves on Earth, mostly natural gas. Over 500 major and minor gas accumulations within the Arctic Circle were discovered so far, but apart from Snøhvit gas field, there is no commercial exploitation of natural gas from these fields. Arctic gas projects are complicated, technically hard to accomplish, and pose a great threat to the return of investment, safety of people and equipment and for the ecosystem. Russia is a country that is closest to the realization of the Arctic gas projects that are based on the giant gas fields. The most extreme weather conditions in the seas around Greenland are the reason why this Arctic region is the least explored and furthest from the realization of any gas project (the paper is published in Croatian .

  12. Protocol to Exploit Waiting Resources for UASNs

    Directory of Open Access Journals (Sweden)

    Li-Ling Hung

    2016-03-01

    Full Text Available The transmission speed of acoustic waves in water is much slower than that of radio waves in terrestrial wireless sensor networks. Thus, the propagation delay in underwater acoustic sensor networks (UASN is much greater. Longer propagation delay leads to complicated communication and collision problems. To solve collision problems, some studies have proposed waiting mechanisms; however, long waiting mechanisms result in low bandwidth utilization. To improve throughput, this study proposes a slotted medium access control protocol to enhance bandwidth utilization in UASNs. The proposed mechanism increases communication by exploiting temporal and spatial resources that are typically idle in order to protect communication against interference. By reducing wait time, network performance and energy consumption can be improved. A performance evaluation demonstrates that when the data packets are large or sensor deployment is dense, the energy consumption of proposed protocol is less than that of existing protocols as well as the throughput is higher than that of existing protocols.

  13. Exploitation of heterogeneous resources for ATLAS Computing

    CERN Document Server

    Chudoba, Jiri; The ATLAS collaboration

    2018-01-01

    LHC experiments require significant computational resources for Monte Carlo simulations and real data processing and the ATLAS experiment is not an exception. In 2017, ATLAS exploited steadily almost 3M HS06 units, which corresponds to about 300 000 standard CPU cores. The total disk and tape capacity managed by the Rucio data management system exceeded 350 PB. Resources are provided mostly by Grid computing centers distributed in geographically separated locations and connected by the Grid middleware. The ATLAS collaboration developed several systems to manage computational jobs, data files and network transfers. ATLAS solutions for job and data management (PanDA and Rucio) were generalized and now are used also by other collaborations. More components are needed to include new resources such as private and public clouds, volunteers' desktop computers and primarily supercomputers in major HPC centers. Workflows and data flows significantly differ for these less traditional resources and extensive software re...

  14. Geometric saliency to characterize radar exploitation performance

    Science.gov (United States)

    Nolan, Adam; Keserich, Brad; Lingg, Andrew; Goley, Steve

    2014-06-01

    Based on the fundamental scattering mechanisms of facetized computer-aided design (CAD) models, we are able to define expected contributions (EC) to the radar signature. The net result of this analysis is the prediction of the salient aspects and contributing vehicle morphology based on the aspect. Although this approach does not provide the fidelity of an asymptotic electromagnetic (EM) simulation, it does provide very fast estimates of the unique scattering that can be consumed by a signature exploitation algorithm. The speed of this approach is particularly relevant when considering the high dimensionality of target configuration variability due to articulating parts which are computationally burdensome to predict. The key scattering phenomena considered in this work are the specular response from a single bounce interaction with surfaces and dihedral response formed between the ground plane and vehicle. Results of this analysis are demonstrated for a set of civilian target models.

  15. Exploitation and use of coal field gas

    Energy Technology Data Exchange (ETDEWEB)

    Wang, K; Li, Z; Sun, Q

    1982-04-25

    There are slightly more than 440 mine shafts in the world from which gas is pumped at the same time coal is being mined, the volume pumped being 3.125 billion cubic meters. All the countries of the world today widely use gas as a fuel and as a raw material for the chemical industry. In China 40 percent of the total number of mine shafts are high gas mine shafts. In China, gas is used largely as fuel by the people, to fire boilers, to make formaldehyde, and to make carbon ink. Prospects are good for the exploitation of mine shaft gas that is produced in association with coal. Mine shaft gas is a top quality energy source with an extraction life that is longer than coals. (DP)

  16. Summary of radiation protection in exploitation

    International Nuclear Information System (INIS)

    Garcier, Yves; Guers, Rene; Bidard, Francoise; Colson, Philippe; Gonin, Michele; Delabre, Herve; Hemidy, Pierre-Yves; Corgnet, Bruno; Perrin, Marie-Claire; Phan Hoang, Long; Abela, Gonzague; Crepieux, Virginie; Guyot, Pierre; Haranger, Didier; Warembourg, Philippe

    2004-01-01

    This document proposes a large and detailed overview of notions and practices regarding radiation protection in relationship with an NPP exploitation framework. It presents the main notions: matter structure, radioactivity, interactions between matter and radiations, types of ionizing radiation, magnitudes and measurement units, exposure modes, main principles of radiation protection, means of protection against internal and external exposures. The second part proposes an overview of the origin of radiological risks in a nuclear power plant. This origin can be found in fission products, activation products, actinides, designed protections, or circuit contaminations. These radiological risks are more precisely identified and described in terms of detection and prevention (internal exposure risk, contamination risk, iodine-related risk, alpha radiation-related risk, access to the reactor building). The next part addresses the medical and radiological follow-up of exposed workers by a special medical control, by an individual exposure control, by a specific control of female personnel, and by attention to exceptional exposures. Measurement means are presented (detection principles, installation continuous control, workspaces control, personnel contamination control, follow-up of individual dose) as well as collective and individual protection means. The management of radiation protection is addressed through a presentation of decision and management structures for radiation protection, and of EDF objectives and ambitions in this domain. The organization of radiation protection during exploitation is described: responsibilities for radiation protection in a nuclear power station, requirements for workers, preparation of interventions in controlled zone, work execution in controlled zone, zone controls and radiological cleanness of installations. The two last chapters address issues and practices of radiation protection in the case of deconstruction or dismantling, and

  17. Antifibrotic effect of xanthohumol in combination with praziquantel is associated with altered redox status and reduced iron accumulation during liver fluke-associated cholangiocarcinogenesis

    Directory of Open Access Journals (Sweden)

    Wassana Jamnongkan

    2018-01-01

    Full Text Available Cholangiocarcinoma (CCA caused by infection of the liver fluke Opisthorchis viverrini, (Ov is the major public health problem in northeast Thailand. Following Ov infection the subsequent molecular changes can be associated by reactive oxygen species (ROS induced chronic inflammation, advanced periductal fibrosis, and cholangiocarcinogenesis. Notably, resistance to an activation of cell death in prolonged oxidative stress conditions can occur but some damaged/mutated cells could survive and enable clonal expansion. Our study used a natural product, xanthohumol (XN, which is an anti-oxidant and anti-inflammatory compound, to examine whether it could prevent Ov-associated CCA carcinogenesis. We measured the effect of XN with or without praziquantel (PZ, an anti-helminthic treatment, on DNA damage, redox status change including iron accumulation and periductal fibrosis during CCA genesis induced by administration of Ov and N-dinitrosomethylamine (NDMA in hamsters. Animals were randomly divided into four groups: group I, Ov infection and NDMA administration (ON; group II, Ov infection and NDMA administration and PZ treatment (ONP; the latter 2 groups were similar to group I and II, but group III received additional XN (XON and group IV received XN plus PZ (XONP. The results showed that high 8-oxodG (a marker of DNA damage was observed throughout cholangiocarcinogenesis. Moreover, increased expression of CD44v8-10 (a cell surface in regulation of the ROS defense system, whereas decreased expression of phospho-p38MAPK (a major ROS target, was found during the progression of the bile duct cell transformation. In addition, high accumulation of iron and expression of transferrin receptor-1 (TfR-1 in both malignant bile ducts and inflammatory cells were detected. Furthermore, fibrosis also increased with the highest level being on day 180. On the other hand, the groups of XN with or without PZ supplementations showed an effective reduction in all the

  18. Blood transfusions

    Science.gov (United States)

    ... this page: //medlineplus.gov/ency/patientinstructions/000431.htm Blood transfusions To use the sharing features on this page, ... There are many reasons you may need a blood transfusion: After knee or hip replacement surgery, or other ...

  19. Blood Types

    Science.gov (United States)

    ... positive or Rh-negative blood may be given to Rh-positive patients. The rules for plasma are the reverse: ... ethnic and racial groups have different frequency of the main blood types in their populations. Approximately ...

  20. Proba-V Mission Exploitation Platform

    Science.gov (United States)

    Goor, E.

    2017-12-01

    VITO and partners developed the Proba-V Mission Exploitation Platform (MEP) as an end-to-end solution to drastically improve the exploitation of the Proba-V (an EC Copernicus contributing mission) EO-data archive, the past mission SPOT-VEGETATION and derived vegetation parameters by researchers, service providers (e.g. the EC Copernicus Global Land Service) and end-users. The analysis of time series of data (PB range) is addressed, as well as the large scale on-demand processing of near real-time data on a powerful and scalable processing environment. New features are still developed, but the platform is yet fully operational since November 2016 and offers A time series viewer (browser web client and API), showing the evolution of Proba-V bands and derived vegetation parameters for any country, region, pixel or polygon defined by the user. Full-resolution viewing services for the complete data archive. On-demand processing chains on a powerfull Hadoop/Spark backend. Virtual Machines can be requested by users with access to the complete data archive mentioned above and pre-configured tools to work with this data, e.g. various toolboxes and support for R and Python. This allows users to immediately work with the data without having to install tools or download data, but as well to design, debug and test applications on the platform. Jupyter Notebooks is available with some examples python and R projects worked out to show the potential of the data. Today the platform is already used by several international third party projects to perform R&D activities on the data, and to develop/host data analysis toolboxes. From the Proba-V MEP, access to other data sources such as Sentinel-2 and landsat data is also addressed. Selected components of the MEP are also deployed on public cloud infrastructures in various R&D projects. Users can make use of powerful Web based tools and can self-manage virtual machines to perform their work on the infrastructure at VITO with access to

  1. Mission Exploitation Platform PROBA-V

    Science.gov (United States)

    Goor, Erwin

    2016-04-01

    VITO and partners developed an end-to-end solution to drastically improve the exploitation of the PROBA-V EO-data archive (http://proba-v.vgt.vito.be/), the past mission SPOT-VEGETATION and derived vegetation parameters by researchers, service providers and end-users. The analysis of time series of data (+1PB) is addressed, as well as the large scale on-demand processing of near real-time data. From November 2015 an operational Mission Exploitation Platform (MEP) PROBA-V, as an ESA pathfinder project, will be gradually deployed at the VITO data center with direct access to the complete data archive. Several applications will be released to the users, e.g. - A time series viewer, showing the evolution of PROBA-V bands and derived vegetation parameters for any area of interest. - Full-resolution viewing services for the complete data archive. - On-demand processing chains e.g. for the calculation of N-daily composites. - A Virtual Machine will be provided with access to the data archive and tools to work with this data, e.g. various toolboxes and support for R and Python. After an initial release in January 2016, a research platform will gradually be deployed allowing users to design, debug and test applications on the platform. From the MEP PROBA-V, access to Sentinel-2 and landsat data will be addressed as well, e.g. to support the Cal/Val activities of the users. Users can make use of powerful Web based tools and can self-manage virtual machines to perform their work on the infrastructure at VITO with access to the complete data archive. To realise this, private cloud technology (openStack) is used and a distributed processing environment is built based on Hadoop. The Hadoop ecosystem offers a lot of technologies (Spark, Yarn, Accumulo, etc.) which we integrate with several open-source components. The impact of this MEP on the user community will be high and will completely change the way of working with the data and hence open the large time series to a larger

  2. Blood Conservation.

    Science.gov (United States)

    Martin, Jeremiah T; Ferraris, Victor A

    2015-01-01

    Patient blood management requires multi-modality and multidisciplinary collaboration to identify patients who are at increased risk of requiring blood transfusion and therefore decrease exposure to blood products. Transfusion is associated with poor postoperative outcomes, and guidelines exist to minimize transfusion requirements. This review highlights recent studies and efforts to apply patient blood management across disease processes and health care systems. Copyright © 2015 Elsevier Inc. All rights reserved.

  3. Relationship between exploitation, oscillation, MSY and extinction.

    Science.gov (United States)

    Ghosh, Bapan; Kar, T K; Legovic, T

    2014-10-01

    We give answers to two important problems arising in current fisheries: (i) how maximum sustainable yield (MSY) policy is influenced by the initial population level, and (ii) how harvesting, oscillation and MSY are related to each other in prey-predator systems. To examine the impact of initial population on exploitation, we analyze a single species model with strong Allee effect. It is found that even when the MSY exists, the dynamic solution may not converge to the equilibrium stock if the initial population level is higher but near the critical threshold level. In a prey-predator system with Allee effect in the prey species, the initial population does not have such important impact neither on MSY nor on maximum sustainable total yield (MSTY). However, harvesting the top predator may cause extinction of all species if odd number of trophic levels exist in the ecosystem. With regard to the second problem, we study two prey-predator models and establish that increasing harvesting effort either on prey, predator or both prey and predator destroys previously existing oscillation. Moreover, equilibrium stock both at MSY and MSTY level is stable. We also discuss the validity of found results to other prey-predator systems. Copyright © 2014 Elsevier Inc. All rights reserved.

  4. Exploiting Virtualization and Cloud Computing in ATLAS

    International Nuclear Information System (INIS)

    Harald Barreiro Megino, Fernando; Van der Ster, Daniel; Benjamin, Doug; De, Kaushik; Gable, Ian; Paterson, Michael; Taylor, Ryan; Hendrix, Val; Vitillo, Roberto A; Panitkin, Sergey; De Silva, Asoka; Walker, Rod

    2012-01-01

    The ATLAS Computing Model was designed around the concept of grid computing; since the start of data-taking, this model has proven very successful in the federated operation of more than one hundred Worldwide LHC Computing Grid (WLCG) sites for offline data distribution, storage, processing and analysis. However, new paradigms in computing, namely virtualization and cloud computing, present improved strategies for managing and provisioning IT resources that could allow ATLAS to more flexibly adapt and scale its storage and processing workloads on varied underlying resources. In particular, ATLAS is developing a “grid-of-clouds” infrastructure in order to utilize WLCG sites that make resources available via a cloud API. This work will present the current status of the Virtualization and Cloud Computing R and D project in ATLAS Distributed Computing. First, strategies for deploying PanDA queues on cloud sites will be discussed, including the introduction of a “cloud factory” for managing cloud VM instances. Next, performance results when running on virtualized/cloud resources at CERN LxCloud, StratusLab, and elsewhere will be presented. Finally, we will present the ATLAS strategies for exploiting cloud-based storage, including remote XROOTD access to input data, management of EC2-based files, and the deployment of cloud-resident LCG storage elements.

  5. Exploiting intrinsic fluctuations to identify model parameters.

    Science.gov (United States)

    Zimmer, Christoph; Sahle, Sven; Pahle, Jürgen

    2015-04-01

    Parameterisation of kinetic models plays a central role in computational systems biology. Besides the lack of experimental data of high enough quality, some of the biggest challenges here are identification issues. Model parameters can be structurally non-identifiable because of functional relationships. Noise in measured data is usually considered to be a nuisance for parameter estimation. However, it turns out that intrinsic fluctuations in particle numbers can make parameters identifiable that were previously non-identifiable. The authors present a method to identify model parameters that are structurally non-identifiable in a deterministic framework. The method takes time course recordings of biochemical systems in steady state or transient state as input. Often a functional relationship between parameters presents itself by a one-dimensional manifold in parameter space containing parameter sets of optimal goodness. Although the system's behaviour cannot be distinguished on this manifold in a deterministic framework it might be distinguishable in a stochastic modelling framework. Their method exploits this by using an objective function that includes a measure for fluctuations in particle numbers. They show on three example models, immigration-death, gene expression and Epo-EpoReceptor interaction, that this resolves the non-identifiability even in the case of measurement noise with known amplitude. The method is applied to partially observed recordings of biochemical systems with measurement noise. It is simple to implement and it is usually very fast to compute. This optimisation can be realised in a classical or Bayesian fashion.

  6. Fostering the Exploitation of Open Educational Resources

    Directory of Open Access Journals (Sweden)

    Thomas Richter

    2014-07-01

    Full Text Available The central concept behind Open Educational Resources (OER is opening up the access to educational resources for stakeholders who are not the usual target user group. This concept must be perceived as innovative because it describes a general economic and social paradigm shift: Education, which formerly was limited to a specific group of learners, now, is promoted as a public good. However, despite very good intentions, internationally agreed quality standards, and the availability of the required technological infrastructure, the critical threshold is not yet met. Due to several reasons, the usefulness of OER is often limited to the originally targeted context. Questions arise if the existing quality standards for Technology Enhanced Learning (TEL actually meet the specific requirements within the OER value chain, if the existing quality standards are applicable to OER in a meaningful way, and under which conditions related standards generally could support the exploitation of OER.We analyze quality standards for TEL and contrast the life cycle model of commercial learning resources against the life cycle model of OER. We investigate special demands on quality from the context of OER and, taking the former results into account, derive emergent quality criteria for OER. The paper concludes with recommendations for the design of OER and a future standard development.

  7. Exploiting Genetic Interference for Antiviral Therapy.

    Directory of Open Access Journals (Sweden)

    Elizabeth J Tanner

    2016-05-01

    Full Text Available Rapidly evolving viruses are a major threat to human health. Such viruses are often highly pathogenic (e.g., influenza virus, HIV, Ebola virus and routinely circumvent therapeutic intervention through mutational escape. Error-prone genome replication generates heterogeneous viral populations that rapidly adapt to new selection pressures, leading to resistance that emerges with treatment. However, population heterogeneity bears a cost: when multiple viral variants replicate within a cell, they can potentially interfere with each other, lowering viral fitness. This genetic interference can be exploited for antiviral strategies, either by taking advantage of a virus's inherent genetic diversity or through generating de novo interference by engineering a competing genome. Here, we discuss two such antiviral strategies, dominant drug targeting and therapeutic interfering particles. Both strategies harness the power of genetic interference to surmount two particularly vexing obstacles-the evolution of drug resistance and targeting therapy to high-risk populations-both of which impede treatment in resource-poor settings.

  8. Radiation protection in exploitation of uranium ores

    International Nuclear Information System (INIS)

    Pavlov, I.V.; Shalaev, I.L.

    1976-01-01

    The results are analyzed of the study of the radiation conditions in uranium mines, design and testing of protection means, improvement of methods and equipment for the dosimetric control in different countries since 1968 to 1975. There are outlined radiation hazards and their role in the formation of the radiation situation in mines, dispersive composition of aerosols of short-living daughter products of Rn(DPR) in the mine atmosphere. Among means of the radiation protection the following are dealt with: ventilation including the calculation of air requirements, design of ventilation systems, ventilation practices in working mines; lowering of the release of radon into the mine atmosphere by isolating non-exploited pits, application of gas-proof covers to cofferdams in faces of jointing zones, intensification of mining works in dangerous zones. Methods of air cleaning to remove Rn are suggested in brief. Apparatus are described for the individual control of the level of latent energy in the zone of miners' respiration: track dosimeters, thermoluminescent crystalls (TLC), photographic films, semiconductor systems and biophysical methods of the control for uranium mines. The efficient use of existing protection means provides the normal radiation situation in mines without significant additional investments

  9. Accelerating Large Data Analysis By Exploiting Regularities

    Science.gov (United States)

    Moran, Patrick J.; Ellsworth, David

    2003-01-01

    We present techniques for discovering and exploiting regularity in large curvilinear data sets. The data can be based on a single mesh or a mesh composed of multiple submeshes (also known as zones). Multi-zone data are typical to Computational Fluid Dynamics (CFD) simulations. Regularities include axis-aligned rectilinear and cylindrical meshes as well as cases where one zone is equivalent to a rigid-body transformation of another. Our algorithms can also discover rigid-body motion of meshes in time-series data. Next, we describe a data model where we can utilize the results from the discovery process in order to accelerate large data visualizations. Where possible, we replace general curvilinear zones with rectilinear or cylindrical zones. In rigid-body motion cases we replace a time-series of meshes with a transformed mesh object where a reference mesh is dynamically transformed based on a given time value in order to satisfy geometry requests, on demand. The data model enables us to make these substitutions and dynamic transformations transparently with respect to the visualization algorithms. We present results with large data sets where we combine our mesh replacement and transformation techniques with out-of-core paging in order to achieve significant speed-ups in analysis.

  10. Cord Blood

    Directory of Open Access Journals (Sweden)

    Saeed Abroun

    2014-05-01

    Full Text Available   Stem cells are naïve or master cells. This means they can transform into special 200 cell types as needed by body, and each of these cells has just one function. Stem cells are found in many parts of the human body, although some sources have richer concentrations than others. Some excellent sources of stem cells, such as bone marrow, peripheral blood, cord blood, other tissue stem cells and human embryos, which last one are controversial and their use can be illegal in some countries. Cord blood is a sample of blood taken from a newborn baby's umbilical cord. It is a rich source of stem cells, umbilical cord blood and tissue are collected from material that normally has no use following a child’s birth. Umbilical cord blood and tissue cells are rich sources of stem cells, which have been used in the treatment of over 80 diseases including leukemia, lymphoma and anemia as bone marrow stem cell potency.  The most common disease category has been leukemia. The next largest group is inherited diseases. Patients with lymphoma, myelodysplasia and severe aplastic anemia have also been successfully transplanted with cord blood. Cord blood is obtained by syringing out the placenta through the umbilical cord at the time of childbirth, after the cord has been detached from the newborn. Collecting stem cells from umbilical blood and tissue is ethical, pain-free, safe and simple. When they are needed to treat your child later in life, there will be no rejection or incompatibility issues, as the procedure will be using their own cells. In contrast, stem cells from donors do have these potential problems. By consider about cord blood potency, cord blood banks (familial or public were established. In IRAN, four cord blood banks has activity, Shariati BMT center cord blood bank, Royan familial cord blood banks, Royan public cord blood banks and Iranian Blood Transfusion Organ cord blood banks. Despite 50,000 sample which storage in these banks, but the

  11. Main principles of developing exploitation models of semiconductor devices

    Science.gov (United States)

    Gradoboev, A. V.; Simonova, A. V.

    2018-05-01

    The paper represents primary tasks, solutions of which allow to develop the exploitation modes of semiconductor devices taking into account complex and combined influence of ionizing irradiation and operation factors. The structure of the exploitation model of the semiconductor device is presented, which is based on radiation and reliability models. Furthermore, it was shown that the exploitation model should take into account complex and combine influence of various ionizing irradiation types and operation factors. The algorithm of developing the exploitation model of the semiconductor devices is proposed. The possibility of creating the radiation model of Schottky barrier diode, Schottky field-effect transistor and Gunn diode is shown based on the available experimental data. The basic exploitation model of IR-LEDs based upon double AlGaAs heterostructures is represented. The practical application of the exploitation models will allow to output the electronic products with guaranteed operational properties.

  12. Transnational gestational surrogacy: does it have to be exploitative?

    Science.gov (United States)

    Kirby, Jeffrey

    2014-01-01

    This article explores the controversial practice of transnational gestational surrogacy and poses a provocative question: Does it have to be exploitative? Various existing models of exploitation are considered and a novel exploitation-evaluation heuristic is introduced to assist in the analysis of the potentially exploitative dimensions/elements of complex health-related practices. On the basis of application of the heuristic, I conclude that transnational gestational surrogacy, as currently practiced in low-income country settings (such as rural, western India), is exploitative of surrogate women. Arising out of consideration of the heuristic's exploitation conditions, a set of public education and enabled choice, enhanced protections, and empowerment reforms to transnational gestational surrogacy practice is proposed that, if incorporated into a national regulatory framework and actualized within a low income country, could possibly render such practice nonexploitative.

  13. Proba-V Mission Exploitation Platform

    Science.gov (United States)

    Goor, Erwin; Dries, Jeroen

    2017-04-01

    VITO and partners developed the Proba-V Mission Exploitation Platform (MEP) as an end-to-end solution to drastically improve the exploitation of the Proba-V (a Copernicus contributing mission) EO-data archive (http://proba-v.vgt.vito.be/), the past mission SPOT-VEGETATION and derived vegetation parameters by researchers, service providers and end-users. The analysis of time series of data (+1PB) is addressed, as well as the large scale on-demand processing of near real-time data on a powerful and scalable processing environment. Furthermore data from the Copernicus Global Land Service is in scope of the platform. From November 2015 an operational Proba-V MEP environment, as an ESA operation service, is gradually deployed at the VITO data center with direct access to the complete data archive. Since autumn 2016 the platform is operational and yet several applications are released to the users, e.g. - A time series viewer, showing the evolution of Proba-V bands and derived vegetation parameters from the Copernicus Global Land Service for any area of interest. - Full-resolution viewing services for the complete data archive. - On-demand processing chains on a powerfull Hadoop/Spark backend e.g. for the calculation of N-daily composites. - Virtual Machines can be provided with access to the data archive and tools to work with this data, e.g. various toolboxes (GDAL, QGIS, GrassGIS, SNAP toolbox, …) and support for R and Python. This allows users to immediately work with the data without having to install tools or download data, but as well to design, debug and test applications on the platform. - A prototype of jupyter Notebooks is available with some examples worked out to show the potential of the data. Today the platform is used by several third party projects to perform R&D activities on the data, and to develop/host data analysis toolboxes. In parallel the platform is further improved and extended. From the MEP PROBA-V, access to Sentinel-2 and landsat data will

  14. Exploiting Untapped Information Resources in Earth Science

    Science.gov (United States)

    Ramachandran, R.; Fox, P. A.; Kempler, S.; Maskey, M.

    2015-12-01

    One of the continuing challenges in any Earth science investigation is the amount of time and effort required for data preparation before analysis can begin. Current Earth science data and information systems have their own shortcomings. For example, the current data search systems are designed with the assumption that researchers find data primarily by metadata searches on instrument or geophysical keywords, assuming that users have sufficient knowledge of the domain vocabulary to be able to effectively utilize the search catalogs. These systems lack support for new or interdisciplinary researchers who may be unfamiliar with the domain vocabulary or the breadth of relevant data available. There is clearly a need to innovate and evolve current data and information systems in order to improve data discovery and exploration capabilities to substantially reduce the data preparation time and effort. We assert that Earth science metadata assets are dark resources, information resources that organizations collect, process, and store for regular business or operational activities but fail to utilize for other purposes. The challenge for any organization is to recognize, identify and effectively utilize the dark data stores in their institutional repositories to better serve their stakeholders. NASA Earth science metadata catalogs contain dark resources consisting of structured information, free form descriptions of data and pre-generated images. With the addition of emerging semantic technologies, such catalogs can be fully utilized beyond their original design intent of supporting current search functionality. In this presentation, we will describe our approach of exploiting these information resources to provide novel data discovery and exploration pathways to science and education communities

  15. Postural Hand Synergies during Environmental Constraint Exploitation

    Directory of Open Access Journals (Sweden)

    Cosimo Della Santina

    2017-08-01

    Full Text Available Humans are able to intuitively exploit the shape of an object and environmental constraints to achieve stable grasps and perform dexterous manipulations. In doing that, a vast range of kinematic strategies can be observed. However, in this work we formulate the hypothesis that such ability can be described in terms of a synergistic behavior in the generation of hand postures, i.e., using a reduced set of commonly used kinematic patterns. This is in analogy with previous studies showing the presence of such behavior in different tasks, such as grasping. We investigated this hypothesis in experiments performed by six subjects, who were asked to grasp objects from a flat surface. We quantitatively characterized hand posture behavior from a kinematic perspective, i.e., the hand joint angles, in both pre-shaping and during the interaction with the environment. To determine the role of tactile feedback, we repeated the same experiments but with subjects wearing a rigid shell on the fingertips to reduce cutaneous afferent inputs. Results show the persistence of at least two postural synergies in all the considered experimental conditions and phases. Tactile impairment does not alter significantly the first two synergies, and contact with the environment generates a change only for higher order Principal Components. A good match also arises between the first synergy found in our analysis and the first synergy of grasping as quantified by previous work. The present study is motivated by the interest of learning from the human example, extracting lessons that can be applied in robot design and control. Thus, we conclude with a discussion on implications for robotics of our findings.

  16. Exploiting core knowledge for visual object recognition.

    Science.gov (United States)

    Schurgin, Mark W; Flombaum, Jonathan I

    2017-03-01

    Humans recognize thousands of objects, and with relative tolerance to variable retinal inputs. The acquisition of this ability is not fully understood, and it remains an area in which artificial systems have yet to surpass people. We sought to investigate the memory process that supports object recognition. Specifically, we investigated the association of inputs that co-occur over short periods of time. We tested the hypothesis that human perception exploits expectations about object kinematics to limit the scope of association to inputs that are likely to have the same token as a source. In several experiments we exposed participants to images of objects, and we then tested recognition sensitivity. Using motion, we manipulated whether successive encounters with an image took place through kinematics that implied the same or a different token as the source of those encounters. Images were injected with noise, or shown at varying orientations, and we included 2 manipulations of motion kinematics. Across all experiments, memory performance was better for images that had been previously encountered with kinematics that implied a single token. A model-based analysis similarly showed greater memory strength when images were shown via kinematics that implied a single token. These results suggest that constraints from physics are built into the mechanisms that support memory about objects. Such constraints-often characterized as 'Core Knowledge'-are known to support perception and cognition broadly, even in young infants. But they have never been considered as a mechanism for memory with respect to recognition. (PsycINFO Database Record (c) 2017 APA, all rights reserved).

  17. Thermal Property Engineering: Exploiting the Properties of Ceramic Nanocomposites

    Science.gov (United States)

    2018-03-01

    ARL-TR-8308 ● MAR 2018 US Army Research Laboratory Thermal Property Engineering : Exploiting the Properties of Ceramic...return it to the originator. ARL-TR-8308 ● MAR 2018 US Army Research Laboratory Thermal Property Engineering : Exploiting the...2015 – Dec 31 2017 4. TITLE AND SUBTITLE Thermal Property Engineering : Exploiting the Properties of Ceramic Nanocomposites 5a. CONTRACT NUMBER 5b

  18. Performance Production Analysis of Romanian Simmental Exploited at „P.F.A Munteanu Cornel” Farm

    Directory of Open Access Journals (Sweden)

    Alin Florin Avram

    2010-10-01

    Full Text Available Research follow to assess levels of productivity and the main indicators of milk of Romanian Simmental cows and its half blood, exploited in terms of milk production into Alba County environmental conditions. There were studied 45 cows from “P.F.A. Munteanu Cornel” farm. The results show that the maximum average of milk production is 5774 kg, registered in the third lactation and the average percentage of fat and protein is 3.92 respectively 3.34. The conclusion learned from the study is that Romanian Simmental cows studied have quantitative and qualitative productions over race standard and it is trying to reduce the period of exploitation and to intensify the process of milk production in first lactations.

  19. Exploiting Laboratory and Heliophysics Plasma Synergies

    Directory of Open Access Journals (Sweden)

    Jill Dahlburg

    2010-05-01

    Full Text Available Recent advances in space-based heliospheric observations, laboratory experimentation, and plasma simulation codes are creating an exciting new cross-disciplinary opportunity for understanding fast energy release and transport mechanisms in heliophysics and laboratory plasma dynamics, which had not been previously accessible. This article provides an overview of some new observational, experimental, and computational assets, and discusses current and near-term activities towards exploitation of synergies involving those assets. This overview does not claim to be comprehensive, but instead covers mainly activities closely associated with the authors’ interests and reearch. Heliospheric observations reviewed include the Sun Earth Connection Coronal and Heliospheric Investigation (SECCHI on the National Aeronautics and Space Administration (NASA Solar Terrestrial Relations Observatory (STEREO mission, the first instrument to provide remote sensing imagery observations with spatial continuity extending from the Sun to the Earth, and the Extreme-ultraviolet Imaging Spectrometer (EIS on the Japanese Hinode spacecraft that is measuring spectroscopically physical parameters of the solar atmosphere towards obtaining plasma temperatures, densities, and mass motions. The Solar Dynamics Observatory (SDO and the upcoming Solar Orbiter with the Heliospheric Imager (SoloHI on-board will also be discussed. Laboratory plasma experiments surveyed include the line-tied magnetic reconnection experiments at University of Wisconsin (relevant to coronal heating magnetic flux tube observations and simulations, and a dynamo facility under construction there; the Space Plasma Simulation Chamber at the Naval Research Laboratory that currently produces plasmas scalable to ionospheric and magnetospheric conditions and in the future also will be suited to study the physics of the solar corona; the Versatile Toroidal Facility at the Massachusetts Institute of Technology that

  20. Simulated population responses of common carp to commercial exploitation

    Energy Technology Data Exchange (ETDEWEB)

    Weber, Michael J.; Hennen, Matthew J.; Brown, Michael L.

    2011-12-01

    Common carp Cyprinus carpio is a widespread invasive species that can become highly abundant and impose deleterious ecosystem effects. Thus, aquatic resource managers are interested in controlling common carp populations. Control of invasive common carp populations is difficult, due in part to the inherent uncertainty of how populations respond to exploitation. To understand how common carp populations respond to exploitation, we evaluated common carp population dynamics (recruitment, growth, and mortality) in three natural lakes in eastern South Dakota. Common carp exhibited similar population dynamics across these three systems that were characterized by consistent recruitment (ages 3 to 15 years present), fast growth (K = 0.37 to 0.59), and low mortality (A = 1 to 7%). We then modeled the effects of commercial exploitation on size structure, abundance, and egg production to determine its utility as a management tool to control populations. All three populations responded similarly to exploitation simulations with a 575-mm length restriction, representing commercial gear selectivity. Simulated common carp size structure modestly declined (9 to 37%) in all simulations. Abundance of common carp declined dramatically (28 to 56%) at low levels of exploitation (0 to 20%) but exploitation >40% had little additive effect and populations were only reduced by 49 to 79% despite high exploitation (>90%). Maximum lifetime egg production was reduced from 77 to 89% at a moderate level of exploitation (40%), indicating the potential for recruitment overfishing. Exploitation further reduced common carp size structure, abundance, and egg production when simulations were not size selective. Our results provide insights to how common carp populations may respond to exploitation. Although commercial exploitation may be able to partially control populations, an integrated removal approach that removes all sizes of common carp has a greater chance of controlling population abundance

  1. Exploiting for medical and biological applications

    Science.gov (United States)

    Giano, Michael C.

    Biotherapeutics are an emerging class of drug composed of molecules ranging in sizes from peptides to large proteins. Due to their poor stability and mucosal membrane permeability, biotherapeutics are administered by a parenteral method (i.e., syringe, intravenous or intramuscular). Therapeutics delivered systemically often experience short half-lives. While, local administration may involve invasive surgical procedures and suffer from poor retention at the site of application. To compensate, the patient receives frequent doses of highly concentrated therapeutic. Unfortunately, the off-target side effects and discomfort associated with multiple injections results in poor patient compliance. Therefore, new delivery methods which can improve therapeutic retention, reduce the frequency of administration and may aid in decreasing the off-target side effects is a necessity. Hydrogels are a class of biomaterials that are gaining interests for tissue engineering and drug delivery applications. Hydrogel materials are defined as porous, 3-dimensional networks that are primarily composed of water. Generally, they are mechanically rigid, cytocompatible and easily chemically functionalized. Collectively, these properties make hydrogels fantastic candidates to perform as drug delivery depots. Current hydrogel delivery systems physically entrap the target therapeutic which is then subsequently released over time at the site of administration. The swelling and degradation of the material effect the diffusion of the therapy from the hydrogel, and therefore should be controlled. Although these strategies provide some regulation over therapeutic release, full control of the delivery is not achieved. Newer approaches are focused on designing hydrogels that exploit known interactions, covalently attach the therapy or respond to an external stimulus in an effort to gain improved control over the therapy's release. Unfortunately, the biotherapeutic is typically required to be chemically

  2. Early Sexual Exploitation as an Influence in Prostitution.

    Science.gov (United States)

    Silbert, Mimi H.; Pines, Ayala M.

    1983-01-01

    Surveyed 200 female street prostitutes to determine whether they were sexually exploited during childhood. Results showed 60 percent of the subjects were sexually exploited. The few girls who discussed their abuse with others were met with shame and most often inaction. Only 10 percent were abused by strangers. (JAC)

  3. A Descriptive Study on Sexually Exploited Children in Residential Treatment

    Science.gov (United States)

    Twill, Sarah E.; Green, Denise M.; Traylor, Amy

    2010-01-01

    Sexual exploitation and prostitution of children and adolescents is a multibillion dollar industry in the United States (Estes and Weiner in "Medical, legal & social science aspects of child sexual exploitation: A comprehensive review of pornography, prostitution, and internet crimes, vol I," G.W. Medical Publishing, Inc, St Louis,…

  4. Exploiting opportunities at all cost? Entrepreneurial intent and externalities

    NARCIS (Netherlands)

    Urbig, D.; Weitzel, G.U.; Rosenkranz, S.; van Witteloostuijn, A.

    2011-01-01

    they exploit welfare-enhancing opportunities as it is assumed in several normative models? Do we need to prevent potential entrepreneurs from being destructive or are there intrinsic limits to harm others? We experimentally investigate how people with different entrepreneurial intent exploit risky

  5. Exploitation program of ''Adamow'' quarry up to 2015

    International Nuclear Information System (INIS)

    Hadlaw, A.

    1994-01-01

    The brown coal deposits exploited by the quarry ''Adamow'' located in Central Poland are shortly described and the prognosis of their exploitation up to 2015 is given. The basis data on the perspective deposits in the quarry's area are also presented. All deposits are shown on the map. 3 ills, 2 tabs

  6. Panel discussion on exploitation of geothermal resources in thermal zones

    Energy Technology Data Exchange (ETDEWEB)

    Viramonte, J G; Mange, J; Stefani, G

    1978-03-01

    The topics discussed include the major known geothermal resources, varying ways of exploiting geothermal resources, technical and economic difficulties in the exploitation, the place of geothermal energy in the total energy policy of a given country, advanced exploration techniques, and indications of needed areas of study. The panelists represented most of the South American countries, Mexico, and Italy. (JSR)

  7. Blood irradiation

    International Nuclear Information System (INIS)

    Chandy, Mammen

    1998-01-01

    Viable lymphocytes are present in blood and cellular blood components used for transfusion. If the patient who receives a blood transfusion is immunocompetent these lymphocytes are destroyed immediately. However if the patient is immunodefficient or immunosuppressed the transfused lymphocytes survive, recognize the recipient as foreign and react producing a devastating and most often fatal syndrome of transfusion graft versus host disease [T-GVHD]. Even immunocompetent individuals can develop T-GVHD if the donor is a first degree relative since like the Trojan horse the transfused lymphocytes escape detection by the recipient's immune system, multiply and attack recipient tissues. T-GVHD can be prevented by irradiating the blood and different centers use doses ranging from 1.5 to 4.5 Gy. All transfusions where the donor is a first degree relative and transfusions to neonates, immunosuppressed patients and bone marrow transplant recipients need to be irradiated. Commercial irradiators specifically designed for irradiation of blood and cellular blood components are available: however they are expensive. India needs to have blood irradiation facilities available in all large tertiary institutions where immunosuppressed patients are treated. The Atomic Energy Commission of India needs to develop a blood irradiator which meets international standards for use in tertiary medical institutions in the country. (author)

  8. BLOOD DONATION

    CERN Document Server

    SC Unit

    2008-01-01

    A blood donation, organized by EFS (Etablissement Français du Sang) of Annemasse will take place On Wednesday 12 November 2008, from 8:30 to 16:00, at CERN Restaurant 2 If possible, please, bring your blood group Card.

  9. Blood donation

    CERN Multimedia

    GS Department

    2009-01-01

    A blood donation is organised by the Cantonal Hospital of Geneva On Thursday 19 March 2009 from 9 a.m. to 5 p.m. CERN RESTAURANT 2 Number of donations during the last blood donations :135 donors in July 2008 122 donors in November 2008 Let’s do better in 2009 !!! Give 30 minutes of your time to save lives...

  10. [Ecotourism exploitation model in Bita Lake Natural Reserve of Yunnan].

    Science.gov (United States)

    Yang, G; Wang, Y; Zhong, L

    2000-12-01

    Bita lake provincial natural reserve is located in Shangri-La region of North-western Yunnan, and was set as a demonstrating area for ecotourism exploitation in 1998. After a year's exploitation construction and half a year's operation as a branch of the 99' Kunming International Horticulture Exposition to accept tourists, it was proved that the ecotourism demonstrating area attained four integrated functions of ecotourism, i.e., tourism, protection, poverty clearing and environment education. Five exploitation and management models including function zoned exploitation model, featured tourism communication model signs system designing model, local Tibetan family reception model and environmental monitoring model, were also successful, which were demonstrated and spreaded to the whole province. Bita lake provincial natural reserve could be a good sample for the ecotourism exploitation natural reserves of the whole country.

  11. Rationalising predictors of child sexual exploitation and sex-trading.

    Science.gov (United States)

    Klatt, Thimna; Cavner, Della; Egan, Vincent

    2014-02-01

    Although there is evidence for specific risk factors leading to child sexual exploitation and prostitution, these influences overlap and have rarely been examined concurrently. The present study examined case files for 175 young persons who attended a voluntary organization in Leicester, United Kingdom, which supports people who are sexually exploited or at risk of sexual exploitation. Based on the case files, the presence or absence of known risk factors for becoming a sex worker was coded. Data were analyzed using t-test, logistic regression, and smallest space analysis. Users of the voluntary organization's services who had been sexually exploited exhibited a significantly greater number of risk factors than service users who had not been victims of sexual exploitation. The logistic regression produced a significant model fit. However, of the 14 potential predictors--many of which were associated with each other--only four variables significantly predicted actual sexual exploitation: running away, poverty, drug and/or alcohol use, and having friends or family members in prostitution. Surprisingly, running away was found to significantly decrease the odds of becoming involved in sexual exploitation. Smallest space analysis of the data revealed 5 clusters of risk factors. Two of the clusters, which reflected a desperation and need construct and immature or out-of-control lifestyles, were significantly associated with sexual exploitation. Our research suggests that some risk factors (e.g. physical and emotional abuse, early delinquency, and homelessness) for becoming involved in sexual exploitation are common but are part of the problematic milieu of the individuals affected and not directly associated with sex trading itself. Our results also indicate that it is important to engage with the families and associates of young persons at risk of becoming (or remaining) a sex worker if one wants to reduce the numbers of persons who engage in this activity. Copyright

  12. Meaning, function and methods of the recultivation in mining exploitation

    OpenAIRE

    Dambov, Risto; Ljatifi, Ejup

    2015-01-01

    With the exploitation of mineral resources is performed degradation and deformation of the relief and the general part of surface of the Earth's crust. Depending on the type of open pit mine, this degradation can be expressed to a lesser or greater extent, and sometimes in several square kilometers. The exploitation of mineral resources is with unbreakable link with the environment. Very often it is said that mining is „enemy No. 1“ for environment. With exploitation comes to degradation of h...

  13. The possibilities of exploitation of Serbian thermomineral waters

    International Nuclear Information System (INIS)

    Jovanovic, L.

    2002-01-01

    Global ecological problem of petrol resources deficit caused an intensive search of alternative energy sources. Deficit of conventional energy fluids in Yugoslavia requires serious efforts to create a program of alternative energy sources exploitation. Geothermal energy represents an important energetic source for the countries with poor energy resources. Geothermal energy can become the basis for economic development. At present these geothermal resources are not being exploited in Yugoslavia. The possibilities of effective exploitation of thermal and thermomineral water resources in Yugoslavia are presented in this paper

  14. Imouraren mining exploitation : Complementary studies Synthetic report Volum B - Mines

    International Nuclear Information System (INIS)

    1980-01-01

    The object of the current study is to determine the main technical characteristics of the reference project of a mine that can supply the necessary ore quantity at a production of 3000 tonnes uranium per year, along 10 years. The project is one of the possible solutions for exploiting the mine. The current study permits to establish : investment and functioning cost estimation, overall project of the mining exploitation program, necessary strength estimation, average ore grades evaluation and variations of these grades, utilities needs, production vizing program, main exploitation methods and necessary materials. Reference project study of the mine serves as base to the economics studies and studies optimization [fr

  15. Osmolality - blood

    Science.gov (United States)

    ... water loss Poisoning from harmful substances such as ethanol , methanol , or ethylene glycol Problems producing urine In ... may be due to: Diabetes insipidus High blood sugar level ( hyperglycemia ) High level of nitrogen waste products ...

  16. Tainted blood

    DEFF Research Database (Denmark)

    Deleuran, Ida; Sheikh, Zainab Afshan; Hoeyer, Klaus

    2015-01-01

    The existing literature on donor screening in transfusion medicine tends to distinguish between social concerns about discrimination and medical concerns about safety. In this article, we argue that the bifurcation into social and medical concerns is problematic. We build our case on a qualitative...... study of the historical rise and current workings of safety practices in the Danish blood system. Here, we identify a strong focus on contamination in order to avoid 'tainted blood', at the expense of working with risks that could be avoided through enhanced blood monitoring practices. Of further...... significance to this focus are the social dynamics found at the heart of safety practices aimed at avoiding contamination. We argue that such dynamics need more attention, in order to achieve good health outcomes in transfusion medicine. Thus, we conclude that, to ensure continuously safe blood systems, we...

  17. Blood Clots

    Science.gov (United States)

    ... sitting for long periods. If you travel by airplane, walk the aisle periodically. For long car trips, ... Your-Risk-for-Excessive-Blood-Clotting_UCM_448771_Article.jsp. Accessed April 18, 2016. What causes excessive ...

  18. Blood Clots

    Science.gov (United States)

    ... Pregnancy Immobility (including prolonged inactivity, long trips by plane or car ) Smoking Oral contraceptives Certain cancers Trauma Certain surgeries Age (increased risk for people over age 60) A family history of blood clots Chronic inflammatory diseases Diabetes High ...

  19. Moving blood.

    Science.gov (United States)

    Pelis, K

    1997-01-01

    Our internationally acclaimed journalist Sanguinia has returned safely from her historic assignment. Travelling from Homeric Greece to British Romanticism, she was witness to blood drinking, letting, bathing, and transfusion. In this report, she explores connections between the symbolic and the sadistic; the mythic and the medical--all in an effort to appreciate the layered meanings our culture has given to the movement of blood between our bodies.

  20. Biology of Blood

    Science.gov (United States)

    ... switch to the Professional version Home Blood Disorders Biology of Blood Overview of Blood Resources In This ... Version. DOCTORS: Click here for the Professional Version Biology of Blood Overview of Blood Components of Blood ...

  1. Blood Clotting and Pregnancy

    Medline Plus

    Full Text Available ... Blood Basics Blood Disorders Anemia Bleeding Disorders Blood Cancers Blood Clots Blood Clotting and Pregnancy Clots and ... Increased maternal age Other medical illness (e.g., cancer, infection) back to top How are Blood Clots ...

  2. Blood Clotting and Pregnancy

    Medline Plus

    Full Text Available ... all publications For Patients Blood Basics Blood Disorders Anemia Bleeding Disorders Blood Cancers Blood Clots Blood Clotting and Pregnancy Clots and Travel DVT Myths vs. Facts Blood ...

  3. Conflicts Related to Natural Resources Exploitation: A Case Study of ...

    African Journals Online (AJOL)

    Conflicts Related to Natural Resources Exploitation: A Case Study of Oil Crisis in Nigeria's Niger Delta Region and its Socio-Political and Economic Implications. ... on the environment leading to pollution of land, rivers, creeks and waterways.

  4. Exploitation of unconventional protein sources in the feed of weaner ...

    African Journals Online (AJOL)

    Exploitation of unconventional protein sources in the feed of weaner rabbits ... as protein sources for feeding ruminants but rarely considered as feed for micro ... 26.88 g/100g DM in Centrosema pubescens and Moringa oleifera, respectively.

  5. Exploiting Formation Flying for Fuel Saving Supersonic Oblique Wing Aircraft

    Science.gov (United States)

    2007-07-01

    used and developed during recent wing / winglet / morphing design programmes (Refs.13-14). By exploiting this method, we have assessed the aerodynamics ...parameters, Propulsion Issues, Size Issues, Aero-elastic effects 15. SUBJECT TERMS EOARD, Control System, Aerodynamics 16...

  6. Human trafficking and exploitation: A global health concern.

    Science.gov (United States)

    Zimmerman, Cathy; Kiss, Ligia

    2017-11-01

    In this collection review, Cathy Zimmerman and colleague introduce the PLOS Medicine Collection on Human Trafficking, Exploitation and Health, laying out the magnitude of the global trafficking problem and offering a public health policy framework to guide responses to trafficking.

  7. Uncertainty avoidance and the exploration-exploitation trade-off

    NARCIS (Netherlands)

    Broekhuizen, Thijs; Giarratana, Marco S.; Torres, Anna

    2017-01-01

    Purpose - This study aims to investigate how a firm's uncertainty avoidance - as indicated by the headquarters' national culture - impacts firm performance by affecting exploratory (product innovation) and exploitative (brand trademark protection) activities. It aims to show that firms characterized

  8. Enhanced surrogate models for statistical design exploiting space mapping technology

    DEFF Research Database (Denmark)

    Koziel, Slawek; Bandler, John W.; Mohamed, Achmed S.

    2005-01-01

    We present advances in microwave and RF device modeling exploiting Space Mapping (SM) technology. We propose new SM modeling formulations utilizing input mappings, output mappings, frequency scaling and quadratic approximations. Our aim is to enhance circuit models for statistical analysis...

  9. Trajectories and cycles of sexual exploitation and trafficking for sexual exploitation of women in the Peruvian Amazon

    OpenAIRE

    Mujica, Jaris

    2015-01-01

    The commercial sexual exploitation is a constant activity in the Peruvian Amazon. Around the river port of Pucallpa in ucayali region, the practice appears systematically: teenage attend taverns around the port, and those dedicated to the work of cooking camps logging, are victims of constant exploitation and many also of trafficking. this article aims to reconstruct the path of life and reproductive cycle of the forms of exploitation in a sample of 20 women, and focuses on: (i) evidence of s...

  10. Escaping from the exploitation trap by shaping the digital future

    OpenAIRE

    Füzes, Péter; Gódor, Zoltán; Szabó, Zsolt Roland

    2017-01-01

    Even Fortune 500 firms can disappear quickly, because many of them falls into an exploitation trap. Examples show that certain organizations – that manifest ambidextrous features – can avoid the exploitation trap. But, how can they do it? Authors tracked the digital transformation of a Fortune 500 company in order to understand the strategic and organizational challenges and solutions to become resilient and prosperous. A cutting edge example is shown in the paper about how an industry leader...

  11. The concept of exploitation in international human trafficking law

    OpenAIRE

    von der Pütten, Tuija Kaarina

    2017-01-01

    Human trafficking is commonly known as a criminal practice that takes place in the framework of sex trade: women and children are trafficked within a state, or from one state to another, for the purpose of sexual exploitation. Similarly, the early 20th century international conventions aimed to tackle ‘white slave traffic’, trafficking of women and children for sexual exploitation. However, it is misleading to see trafficking only within this context. People are trafficked so that they can be...

  12. Understanding and exploiting the genomic response to hypoxia

    International Nuclear Information System (INIS)

    Giaccia, A.J.

    2003-01-01

    tumor growth delay, but eventually tumor growth resumes in a HIF-1 independent manner. Therefore, it would be more advantageous to kill cells that have elevated levels of HIF-1 than to merely inhibit HIF-1 activity. A second use of understanding the genomic response to hypoxia is in the identification of hypoxia induced genes that encode secreted protein products that can be used as surrogate markers for tumor hypoxia. In this manner, a simple blood test could potentially be developed that would indicate whether aggressive therapy needs to be undertaken if the tumor has elevated levels of a hypoxia secreted marker. In summary, understanding the genomic response to hypoxia has provided insights for the development of new diagnostic tests, and potential therapeutic strategies to exploit this therapeutic problem

  13. Managing your blood sugar

    Science.gov (United States)

    Hyperglycemia - control; Hypoglycemia - control; Diabetes - blood sugar control; Blood glucose - managing ... sugar ( hypoglycemia ) Recognize and treat high blood sugar ( hyperglycemia ) Plan healthy meals Monitor your blood sugar (glucose) ...

  14. From Exploitation to Industry: Definitions, Risks, and Consequences of Domestic Sexual Exploitation and Sex Work Among Women and Girls

    OpenAIRE

    Gerassi, Lara

    2015-01-01

    In the last 15 years, terms such as prostitution, sex trafficking, sexual exploitation, modern-day slavery, and sex work have elicited much confusion and debate as to their definitions. Consequently several challenges have emerged for both law enforcement in the prosecution of criminals and practitioners in service provision. This article reviews the state of the literature with regard to domestic, sexual exploitation among women and girls in the United States and seeks to (1) provide definit...

  15. Rational Exploitation and Utilizing of Groundwater in Jiangsu Coastal Area

    Science.gov (United States)

    Kang, B.; Lin, X.

    2017-12-01

    Jiangsu coastal area is located in the southeast coast of China, where is a new industrial base and an important coastal and Land Resources Development Zone of China. In the areas with strong human exploitation activities, regional groundwater evolution is obviously affected by human activities. In order to solve the environmental geological problems caused by groundwater exploitation fundamentally, we must find out the forming conditions of regional groundwater hydrodynamic field, and the impact of human activities on groundwater hydrodynamic field evolution and hydrogeochemical evolition. Based on these results, scientific management and reasonable exploitation of the regional groundwater resources can be provided for the utilization. Taking the coastal area of Jiangsu as the research area, we investigate and analyze of the regional hydrogeological conditions. The numerical simulation model of groundwater flow was established according to the water power, chemical and isotopic methods, the conditions of water flow and the influence of hydrodynamic field on the water chemical field. We predict the evolution of regional groundwater dynamics under the influence of human activities and climate change and evaluate the influence of groundwater dynamic field evolution on the environmental geological problems caused by groundwater exploitation under various conditions. We get the following conclusions: Three groundwater exploitation optimal schemes were established. The groundwater salinization was taken as the primary control condition. The substitution model was proposed to model groundwater exploitation and water level changes by BP network method.Then genetic algorithm was used to solve the optimization solution. Three groundwater exploitation optimal schemes were submit to local water resource management. The first sheme was used to solve the groundwater salinization problem. The second sheme focused on dual water supply. The third sheme concerned on emergency water

  16. Blood Tests

    Science.gov (United States)

    ... of your immune system, which fights infections and diseases. Abnormal white blood cell levels may be a sign ... fall outside the normal range for many reasons. Abnormal results might be a sign of a disorder or disease. Other factors—such as diet, menstrual ...

  17. Exploitation and Utilization of Oilfield Geothermal Resources in China

    Directory of Open Access Journals (Sweden)

    Shejiao Wang

    2016-09-01

    Full Text Available Geothermal energy is a clean, green renewable resource, which can be utilized for power generation, heating, cooling, and could effectively replace oil, gas, and coal. In recent years, oil companies have put more efforts into exploiting and utilizing geothermal energy with advanced technologies for heat-tracing oil gathering and transportation, central heating, etc., which has not only reduced resource waste, but also improved large-scale and industrial resource utilization levels, and has achieved remarkable economic and social benefits. Based on the analysis of oilfield geothermal energy development status, resource potential, and exploitation and utilization modes, the advantages and disadvantages of harnessing oilfield geothermal resource have been discussed. Oilfield geothermal energy exploitation and utilization have advantages in resources, technical personnel, technology, and a large number of abandoned wells that could be reconstructed and utilized. Due to the high heat demand in oilfields, geothermal energy exploitation and utilization can effectively replace oil, gas, coal, and other fossil fuels, and has bright prospects. The key factors limiting oilfield geothermal energy exploitation and utilization are also pointed out in this paper, including immature technologies, lack of overall planning, lack of standards in resource assessment, and economic assessment, lack of incentive policies, etc.

  18. Blood Clotting and Pregnancy

    Medline Plus

    Full Text Available ... For Patients Blood Disorders Blood Clots Blood Clotting & Pregnancy If you are pregnant, or you have just ... The risk of developing a blood clot during pregnancy is increased by the following: Previous blood clots ...

  19. Special Blood Donation Procedures

    Science.gov (United States)

    ... Blood Products Special Blood Donation Procedures Precautions and Adverse Reactions During Blood Transfusion (See Overview of Blood Transfusion .) Plateletpheresis (platelet donation) In plateletpheresis, a donor gives only platelets rather than whole blood. Whole ...

  20. Blood Clotting and Pregnancy

    Medline Plus

    Full Text Available ... Section Action Alerts Advocacy Toolkit Policy News Sickle Cell Disease Initiative Policy Statements Congressional Fellowship Testimony and ... Blood Basics Blood Disorders Anemia Bleeding Disorders Blood Cancers Blood Clots Blood Clotting and Pregnancy Clots and ...

  1. Blood Clotting and Pregnancy

    Medline Plus

    Full Text Available ... This Section Action Alerts Advocacy Toolkit Policy News Sickle Cell Disease Initiative Policy Statements Congressional Fellowship Testimony and ... all publications For Patients Blood Basics Blood Disorders Anemia Bleeding Disorders Blood Cancers Blood Clots Blood Clotting ...

  2. Sexual exploitation and labor during adolescence: A case study

    Directory of Open Access Journals (Sweden)

    Luciana Dutra-Thomé

    2011-09-01

    Full Text Available The present article focused on the perception of sexual exploitation as a job, using a single case study design. The aim of the study was to investigate the case of a 14 year-old girl, involved in commercial sexual exploitation, who considered this situation as her labor activity. A content analysis showed protective and risk factors as categories, especially related to her labor activities. The girl perceived the sexual exploitation activity as a job that provided autonomy, subsistence, and survival. The study revealed that the negative effects of working during adolescence may bring consequences to health and development. Youth work may be defined as a risk factor, especially when the labour conditions are not adequate and protected.

  3. Information source exploitation/exploration and NPD decision-making

    DEFF Research Database (Denmark)

    Jespersen, Kristina Risom

    different Scandinavian companies. Data was analyzed using hierarchical regression models across decision criteria dimensions and NPD stages as well as analyzing the combination of selected information sources. Rather than forwarding one optimal search behavior for the entire NPD process, we find optimal...... information search behavior at either end of the exploitation/exploration continuum. Additionally, we find that overexploitation and overexploration is caused by managerial bias. This creates managerial misbehavior at gate decision-points of the NPD process.......The purpose of this study is to examine how the exploration/exploitation continuum is applied by decision-makers in new product gate decision-making. Specifically, we analyze at gate decision-points how the evaluation of a new product project is affected by the information source exploitation...

  4. The ALARA project of the EDF nuclear park exploitation

    International Nuclear Information System (INIS)

    Potoczek, J.

    1998-01-01

    To bring the exploitation of the nuclear park of EDF at the level of the best exploiters in the world in matter of collective and individual dosimetry, the ALARA principle coordinates numerous actions: to associate the temporary societies, to define common language, methods and tools for the whole park to organize a level effect in this area, to optimize the maintenance that is expansive in radiation doses, to make the different levels of management responsible on dosimetric stakes, to reduce the singular sources of exposure, to assure the organisation and exploitation of the experience back in this field and adapt consequently the system of information. The results are cheerful and the objectives for 2000 are: less than 1.2 h.Sv by year and by reactor, no intervener whom annual radiation dose is upper than 20 mSv (out of exceptional case). (N.C.)

  5. The exploitation of swamp plants for dewatering liquid sewage sludge

    Directory of Open Access Journals (Sweden)

    Jiří Šálek

    2006-01-01

    Full Text Available The operators of little rural wastewater treatment plants have been interested in economic exploitation of sewage sludge in local conditions. The chance is searching simply and natural ways of processing and exploitation stabilized sewage sludge in agriculture. Manure substrate have been obtained by composting waterless sewage sludge including rest plant biomass after closing 6–8 years period of filling liquid sewage sludge to the basin. Main attention was focused on exploitation of swamp plants for dewatering liquid sewage sludge and determination of influence sewage sludge on plants, intensity and course of evapotranspiration and design and setting of drying beds. On the base of determined ability of swamp plants evapotranspiration were edited suggestion solutions of design and operation sludge bed facilities in the conditions of small rural wastewater treatment plant.

  6. Cultural Work as a Site of Struggle: Freelancers and Exploitation

    Directory of Open Access Journals (Sweden)

    Nicole S. Cohen

    2012-05-01

    Full Text Available This paper argues that Marxist political economy is a useful framework for understanding contemporary conditions of cultural work. Drawing on Karl Marx’s foundational concepts, labour process theory, and a case study of freelance writers, I argue that the debate over autonomy and control in cultural work ignores exploitation in labour-capital relationships, which is a crucial process shaping cultural work. To demonstrate the benefits of this approach, I discuss two methods media firms use to extract surplus value from freelance writers: exploitation of unpaid labour time and exploitation of intellectual property through aggressive copyright regimes. I argue that a Marxist perspective can uncover the dynamics that are transforming cultural industries and workers’ experiences. From this perspective, cultural work is understood as a site of struggle.

  7. Exploiting Thread Parallelism for Ocean Modeling on Cray XC Supercomputers

    Energy Technology Data Exchange (ETDEWEB)

    Sarje, Abhinav [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Jacobsen, Douglas W. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Williams, Samuel W. [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Ringler, Todd [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Oliker, Leonid [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States)

    2016-05-01

    The incorporation of increasing core counts in modern processors used to build state-of-the-art supercomputers is driving application development towards exploitation of thread parallelism, in addition to distributed memory parallelism, with the goal of delivering efficient high-performance codes. In this work we describe the exploitation of threading and our experiences with it with respect to a real-world ocean modeling application code, MPAS-Ocean. We present detailed performance analysis and comparisons of various approaches and configurations for threading on the Cray XC series supercomputers.

  8. Influence of Machine Exploitation Effectiveness on Furniture Production Quality Level

    Directory of Open Access Journals (Sweden)

    Stasiak-Betlejewska Renata

    2015-12-01

    Full Text Available One of the most important factors determining the company‘s capacity to produce high quality products is the level of machinery operation effectiveness. Companies having modern machinery are characterized by high productivity. To obtain a high quality product, the equipment should be properly used, without any failure, which contributes significantly to the exploitation level increase. The modernity level and the exploitation effectiveness level for chosen machine producing furniture components in relation to the product quality level were analysed in the paper. As a result of the research findings analysis, proposals for corrective actions with regard to machinery maintenance and production processes were presented.

  9. On species preservation and Non-Cooperative Exploiters

    DEFF Research Database (Denmark)

    Kronbak, Lone Grønbæk; Lindroos, Marko

    cases where several non-cooperative exploiters are involved in mixed fisheries. This paper is targeting biodiversity preservation by setting up a two species model with the aim of ensuring both species survive harvesting of exploiters adapting a non-cooperative behaviour. The model starts out as a multi......-species model without biological dependency and is then modified to include also biological dependency. We contribute to the literature by analytically finding the limits on the number of players preserving both species including the conditions to be satisfied. For visual purposes we simulate a two species...

  10. Final Report, “Exploiting Global View for Resilience”

    Energy Technology Data Exchange (ETDEWEB)

    Chien, Andrew [Univ. of Chicago, IL (United States)

    2017-03-29

    Final technical report for the "Exploiting Global View for Resilience" project. The GVR project aims to create a new approach to portable, resilient applications. The GVR approach builds on a global view data model,, adding versioning (multi-version), user control of timing and rate (multi-stream), and flexible cross layer error signalling and recovery. With a versioned array as a portable abstraction, GVR enables application programmers to exploit deep scientific and application code insights to manage resilience (and its overhead) in a flexible, portable fashion.

  11. Fishery Development and Exploitation in South East Australia

    Directory of Open Access Journals (Sweden)

    Camilla Novaglio

    2018-04-01

    Full Text Available Understanding the full extent of past ecological changes in human-influenced marine systems is needed to inform present management policies, but is often hampered by the scarcity of information about exploitation practices and population status over the entire history of fishing. The history of commercial fishing in South East Australia is relatively recent and thus easier to document. Our aim is to reconstruct such history and to use this information to understand general patterns and consequences of fishing exploitation. Intense exploitation of marine resources arrived in South East Australia with European colonization in the early 1800s, and unregulated sealing, whaling and oyster dredging resulted in the first documented significant impact on local marine populations. Exploitation extended to demersal resources in 1915 when the trawl fishery developed. Between the early 1800s and the 1980s, some of the exploited stocks collapsed, but fishing moved further offshore and in deeper waters as technology improved and new resources became available or were discovered. This phase of fisheries expansion masked the unsustainable nature of some fishing industries, such as trawling and whaling, and postponed the need for management regulations. From the 1990s onward, an increasing awareness of the depleted nature of some fisheries led to the establishment of management strategies aiming at a more sustainable exploitation of target stocks and, from the mid-2000s onwards, management strategies were revised and improved to better address the effect of fishing on multiple components of marine ecosystems. This led to the recovery of some depleted populations and to increased habitat protection. The relatively short history of fishing exploitation and the small scale of the fishing industry in South East Australia played a significant role in limiting the magnitude of fishing impacts on local populations and helped to achieve recoveries when fisheries

  12. From Exploitation to Industry: Definitions, Risks, and Consequences of Domestic Sexual Exploitation and Sex Work Among Women and Girls.

    Science.gov (United States)

    Gerassi, Lara

    In the last 15 years, terms such as prostitution, sex trafficking, sexual exploitation, modern-day slavery, and sex work have elicited much confusion and debate as to their definitions. Consequently several challenges have emerged for both law enforcement in the prosecution of criminals and practitioners in service provision. This article reviews the state of the literature with regard to domestic, sexual exploitation among women and girls in the United States and seeks to (1) provide definitions and describe the complexity of all terms relating to domestic sexual exploitation of women and girls in the United States, (2) explore available national prevalence data according to the definitions provided, and (3) review the evidence of mental health, social, and structural risk factors at the micro-, mezzo-, and macrolevels.

  13. From Exploitation to Industry: Definitions, Risks, and Consequences of Domestic Sexual Exploitation and Sex Work Among Women and Girls

    Science.gov (United States)

    Gerassi, Lara

    2015-01-01

    In the last 15 years, terms such as prostitution, sex trafficking, sexual exploitation, modern-day slavery, and sex work have elicited much confusion and debate as to their definitions. Consequently several challenges have emerged for both law enforcement in the prosecution of criminals and practitioners in service provision. This article reviews the state of the literature with regard to domestic, sexual exploitation among women and girls in the United States and seeks to (1) provide definitions and describe the complexity of all terms relating to domestic sexual exploitation of women and girls in the United States, (2) explore available national prevalence data according to the definitions provided, and (3) review the evidence of mental health, social, and structural risk factors at the micro-, mezzo-, and macrolevels. PMID:26726289

  14. Wideband Low Noise Amplifiers Exploiting Thermal Noise Cancellation

    NARCIS (Netherlands)

    Bruccoleri, F.; Klumperink, Eric A.M.; Nauta, Bram

    2005-01-01

    Low Noise Amplifiers (LNAs) are commonly used to amplify signals that are too weak for direct processing for example in radio or cable receivers. Traditionally, low noise amplifiers are implemented via tuned amplifiers, exploiting inductors and capacitors in resonating LC-circuits. This can render

  15. Human trafficking for labour exploitation: Interpreting the crime

    NARCIS (Netherlands)

    Coster van Voorhout, J.E.B.

    2007-01-01

    The definition of human trafficking for labour exploitation, as follows from the European Council Framework Decision, proves to be unclear. Literal interpretation does not suffice, because it does not clarify all elements of what is deemed to be criminal behaviour, and hermeneutical interpretation

  16. Efficient Depth Map Compression Exploiting Segmented Color Data

    DEFF Research Database (Denmark)

    Milani, Simone; Zanuttigh, Pietro; Zamarin, Marco

    2011-01-01

    performances is still an open research issue. This paper presents a novel compression scheme that exploits a segmentation of the color data to predict the shape of the different surfaces in the depth map. Then each segment is approximated with a parameterized plane. In case the approximation is sufficiently...

  17. Bats track and exploit changes in insect pest populations

    Science.gov (United States)

    The role of bats or any generalist predator in suppressing prey populations depends on the predator’s ability to exploit available prey in space and time. Using a qPCR faecal DNA assay, we document significant association between numbers of Brazilian free-tailed bats (Tadarida brasiliensis) consumin...

  18. Describing Data Format Exploits Using Bitstream Segment Graphs

    NARCIS (Netherlands)

    Hartle, Michael; Schumann, Daniel; Botchak, Arsene; Tews, Erik; Mühlhäuser, Max

    2008-01-01

    Exploits based on data processing bugs are delivered through crafted data that seems to follow a data format, yet is altered in some way to trigger a specific bug during processing, eg. in order to execute contained malicious code. Decomposing crafted data according to the purported data format and

  19. Exploiting Patient Labour at Kew Cottages, Australia, 1887-1950

    Science.gov (United States)

    Monk, Lee-Ann

    2010-01-01

    This article examines the exploitation of patient labour at Kew Cottages, Australia's first purpose-built state institution for people with learning disabilities. Analysing historical evidence for the period 1887-1950 shows that unpaid patient labour contributed significantly to the economy of the Cottages and so to the government department of…

  20. Exploiting serological data to understand the epidemiology of foot ...

    African Journals Online (AJOL)

    Exploiting serological data to understand the epidemiology of foot-and-mouth disease virus serotypes circulating in Libya. Ibrahim Eldaghayes, Abdunaser Dayhum, Abdulwahab Kammon, Monier Sharif, Giancarlo Ferrari, Christianus Bartels, Keith Sumption, Donald P. King, Santina Grazioli, Emiliana Brocchi ...

  1. Open pit coal exploitation viability. Margarita mine. Case of study

    International Nuclear Information System (INIS)

    Veloza, Julia; Molina, Jorge; Mejia, Humberto

    2006-01-01

    This paper provides an analysis of financial viability, planning and design for the new coal open pit exploitation for La Margarita mine, with coal-resources estimated on 440.139,7 ton. Dimension, design and economic evaluation were possible by three exploitation methods: (multiple bench, open cast contour, and terraces). Net present values (NVP) were calculated: $c 817,5; $c 518,5 and $c 645,2 respectively for each method (given in million current Colombian pesos $. $c 2380 are equivalent to $us 1) and rate of return (ROR) 78,33%; 34,0% and 38,62% respectively for each method. These indicators served as a parameter to choose the multiple bench method, which should be recalculated because it was necessary to work jointly with two pits and making feasible the project. in addition a general environmental evaluation was done, which is vital for the exploitation. Important impacts on the flower, animals, air, water were found, and measures of control, prevention and mitigation were stated. it is expected that this paper can be useful as a technical-economical support for the development of the open pit exploitation in the margarita mine

  2. Exploiting wild relatives of S. lycopersicum for quality traits

    NARCIS (Netherlands)

    Víquez Zamora, A.M.

    2015-01-01

    Exploiting wild relatives of S. lycopersicum for quality traits Ana Marcela Víquez Zamora Tomatoes are consumed worldwide and became a model for crop plant research. A part of the research aims at expanding genetic diversity in tomato; this can be done by incorporating

  3. Geographical aspects of exploitation of nuclear energy in Europe

    International Nuclear Information System (INIS)

    Kurucova, S.

    2007-05-01

    The topic of exploitation of nuclear energy is becoming increasingly actual in the present time in connection with frequently discussed question of 'renaissance of nuclear energetics'. The work is aimed at research of geographical aspects of exploitation of nuclear energy for military and civil purposes on the territory of Europe. The base of work represents the analysis of theoretical aspects of research of energy, mainly of nuclear energy. The work examines the historical development of exploitation of nuclear energy since its discovery, through development of military nuclear industry in Europe, big attention is paid to spreading of nuclear energetics on the territory of Europe from its beginnings up to the present time. The main part of the work represents the analysis of the present situation of exploitation of nuclear energy for civil purposes in Europe. The attention is paid to so-called nuclear fuel cycle as complex chain of several reciprocally interconnected operations of nuclear fuel treatment. The monitoring of spatial relations among individual countries within their nuclear fuel cycles is emphasised. The analysis of historical development and of the present state of nuclear energetics finished up in the outline of the perspectives of its further development in Europe. The analysis of the tendencies of evolution of world energetic economy mentions on the trend of growth of energy consumption in the world and Europe, as well as on the important position of nuclear energy in the structure of energy sources. Summary in English language is included. (author)

  4. Exploitation of Free Markets and Globalization to Finance Terrorists

    Science.gov (United States)

    2008-09-01

    is their capability to exploit the black market peso exchange or the international foreign exchange arbitrage . Under the scenario of a weak U.S...appears legitimate. By using intermediaries or legitimate businesses, the financial markets are wide open for terrorists to hedge funds and

  5. Exploitation of commercial remote sensing images: reality ignored?

    Science.gov (United States)

    Allen, Paul C.

    1999-12-01

    The remote sensing market is on the verge of being awash in commercial high-resolution images. Market estimates are based on the growing numbers of planned commercial remote sensing electro-optical, radar, and hyperspectral satellites and aircraft. EarthWatch, Space Imaging, SPOT, and RDL among others are all working towards launch and service of one to five meter panchromatic or radar-imaging satellites. Additionally, new advances in digital air surveillance and reconnaissance systems, both manned and unmanned, are also expected to expand the geospatial customer base. Regardless of platform, image type, or location, each system promises images with some combination of increased resolution, greater spectral coverage, reduced turn-around time (request-to- delivery), and/or reduced image cost. For the most part, however, market estimates for these new sources focus on the raw digital images (from collection to the ground station) while ignoring the requirements for a processing and exploitation infrastructure comprised of exploitation tools, exploitation training, library systems, and image management systems. From this it would appear the commercial imaging community has failed to learn the hard lessons of national government experience choosing instead to ignore reality and replicate the bias of collection over processing and exploitation. While this trend may be not impact the small quantity users that exist today it will certainly adversely affect the mid- to large-sized users of the future.

  6. Human trafficking and exploitation: A global health concern.

    Directory of Open Access Journals (Sweden)

    Cathy Zimmerman

    2017-11-01

    Full Text Available In this collection review, Cathy Zimmerman and colleague introduce the PLOS Medicine Collection on Human Trafficking, Exploitation and Health, laying out the magnitude of the global trafficking problem and offering a public health policy framework to guide responses to trafficking.

  7. Six scenarios of exploiting an ontology based, mobilized learning environment

    NARCIS (Netherlands)

    Kismihók, G.; Szabó, I.; Vas, R.

    2012-01-01

    In this article, six different exploitation possibilities of an educational ontology based, mobilized learning management system are presented. The focal point of this system is the educational ontology model. The first version of this educational ontology model serves as a foundation for curriculum

  8. Risk assessment by dynamic representation of vulnerability, exploitation, and impact

    Science.gov (United States)

    Cam, Hasan

    2015-05-01

    Assessing and quantifying cyber risk accurately in real-time is essential to providing security and mission assurance in any system and network. This paper presents a modeling and dynamic analysis approach to assessing cyber risk of a network in real-time by representing dynamically its vulnerabilities, exploitations, and impact using integrated Bayesian network and Markov models. Given the set of vulnerabilities detected by a vulnerability scanner in a network, this paper addresses how its risk can be assessed by estimating in real-time the exploit likelihood and impact of vulnerability exploitation on the network, based on real-time observations and measurements over the network. The dynamic representation of the network in terms of its vulnerabilities, sensor measurements, and observations is constructed dynamically using the integrated Bayesian network and Markov models. The transition rates of outgoing and incoming links of states in hidden Markov models are used in determining exploit likelihood and impact of attacks, whereas emission rates help quantify the attack states of vulnerabilities. Simulation results show the quantification and evolving risk scores over time for individual and aggregated vulnerabilities of a network.

  9. Indicators of Nuclear safety and exploitation in ANAV

    International Nuclear Information System (INIS)

    Quintana Prieto, M.; Jorda Alcove, M.

    2013-01-01

    The use of indicators by ANAV plants, aims to be a tool to facilitate the assessment of the behaviour of the plants nuclear over a specific time period. The following are and are they explain those related to Nuclear safety and exploitation.

  10. Desiring TESOL and International Education: Market Abuse and Exploitation

    Science.gov (United States)

    Chowdhury, Raqib; Ha, Phan Le

    2014-01-01

    This book addresses how Western universities have constructed themselves as global providers of education, and are driven to be globally competitive. It examines how the term "international" has been exploited by the market in the form of government educational policies and agencies, host institutions, academia and the mass media. The…

  11. Exploiting Elementary Landscapes for TSP, Vehicle Routing and Scheduling

    Science.gov (United States)

    2015-09-03

    similar mathematical foundation to enable gradient descent methods for discrete combinatorial optimization problems. We are also generalizing our prior...research has exploited statistical and mathematical properties of elementary landscapes to develop new gradient methods for combinatorial optimization... mathematically methods to more automatically identify elementary landscapes. If a combinatorial optimization problem is a superposition of elemen

  12. 77 FR 36491 - Request for Information Regarding Senior Financial Exploitation

    Science.gov (United States)

    2012-06-19

    ... BUREAU OF CONSUMER FINANCIAL PROTECTION [Docket CFPB-2012-0018] Request for Information Regarding Senior Financial Exploitation AGENCY: Bureau of Consumer Financial Protection. ACTION: Request for Information. SUMMARY: Section 1013(g)(1) of the Dodd-Frank Wall Street Reform and Consumer Protection Act of...

  13. Features for Exploiting Black-Box Optimization Problem Structure

    DEFF Research Database (Denmark)

    Tierney, Kevin; Malitsky, Yuri; Abell, Tinus

    2013-01-01

    landscape of BBO problems and show how an algorithm portfolio approach can exploit these general, problem indepen- dent features and outperform the utilization of any single minimization search strategy. We test our methodology on data from the GECCO Workshop on BBO Benchmarking 2012, which contains 21...

  14. Assisting children born of sexual exploitation and abuse

    Directory of Open Access Journals (Sweden)

    Lauren Rumble

    2007-01-01

    Full Text Available The UN Secretary-General has issued a strategy tosupport victims of sexual exploitation and abuse by UNstaff. It includes a controversial proposal to introduceDNA sampling for all UN staff. Unless this suggestionis adopted, an important opportunity to implementa truly survivor-centred approach may be lost.

  15. Beyond the Bravado: Sex Roles and the Exploitive Male.

    Science.gov (United States)

    Taubman, Stan

    1986-01-01

    Examines the tendency of men to engage in domestic violence and sexual exploitation and presents male sex-role acquisition as a process of psychosocial violence against young boys, which creates a sense of shame, powerlessness, self-alienation, isolation from others, and retaliatory rage and inhibits capacities for intimacy and mutuality.…

  16. Grooming Cybervictims: The Psychosocial Effects of Online Exploitation for Youth.

    Science.gov (United States)

    Berson, Ilene R.

    2003-01-01

    Presents an overview of the benefits and risks of Web-based interactions for youth. Discusses, as an illustrative example, the psychosocial effects of online "grooming" practices that are designed to lure and exploit children by enticing them, typically in a nonsexual way, toward a sexual encounter. Suggests constructive solutions and a…

  17. Malware Sandbox Analysis for Secure Observation of Vulnerability Exploitation

    Science.gov (United States)

    Yoshioka, Katsunari; Inoue, Daisuke; Eto, Masashi; Hoshizawa, Yuji; Nogawa, Hiroki; Nakao, Koji

    Exploiting vulnerabilities of remote systems is one of the fundamental behaviors of malware that determines their potential hazards. Understanding what kind of propagation tactics each malware uses is essential in incident response because such information directly links with countermeasures such as writing a signature for IDS. Although recently malware sandbox analysis has been studied intensively, little work is done on securely observing the vulnerability exploitation by malware. In this paper, we propose a novel sandbox analysis method for securely observing malware's vulnerability exploitation in a totally isolated environment. In our sandbox, we prepare two victim hosts. We first execute the sample malware on one of these hosts and then let it attack the other host which is running multiple vulnerable services. As a simple realization of the proposed method, we have implemented a sandbox using Nepenthes, a low-interaction honeypot, as the second victim. Because Nepenthes can emulate a variety of vulnerable services, we can efficiently observe the propagation of sample malware. In the experiments, among 382 samples whose scan capabilities are confirmed, 381 samples successfully started exploiting vulnerabilities of the second victim. This indicates the certain level of feasibility of the proposed method.

  18. Images of Blood in American Cinema

    DEFF Research Database (Denmark)

    Rødje, Kjetil

    Through studying images of blood in film from the mid-1950s to the end of the 1960s, this path-breaking book explores how blood as an (audio)visual cinematic element went from predominately operating as a signifier, providing audiences with information about a film’s plot and characters, to incre......Through studying images of blood in film from the mid-1950s to the end of the 1960s, this path-breaking book explores how blood as an (audio)visual cinematic element went from predominately operating as a signifier, providing audiences with information about a film’s plot and characters...... by following one (audio)visual element through an exploration that traverses established standards for film production and reception. This study does not heed distinctions regarding to genres (horror, western, gangster) or models of film production (exploitation, independent, studio productions) but rather...... images as well as with audiences....

  19. Images of Blood in American Cinema

    DEFF Research Database (Denmark)

    Rødje, Kjetil

    by following one (audio)visual element through an exploration that traverses established standards for film production and reception. This study does not heed distinctions regarding to genres (horror, western, gangster) or models of film production (exploitation, independent, studio productions) but rather......Through studying images of blood in film from the mid-1950s to the end of the 1960s, this path-breaking book explores how blood as an (audio)visual cinematic element went from predominately operating as a signifier, providing audiences with information about a film’s plot and characters......, to increasingly operating in terms of affect, potentially evoking visceral and embodied responses in viewers. Using films such as The Return of Dracula, The Tingler, Blood Feast, Two Thousand Maniacs, Color Me Blood Red, Bonnie and Clyde, and The Wild Bunch, Rødje takes a novel approach to film history...

  20. Blood Clotting and Pregnancy

    Medline Plus

    Full Text Available ... of articles from the 2017 ASH Annual Meeting Education Program Blood: How I Treat A compendium of Blood articles updated ... Clots Blood Clotting and Pregnancy Clots and Travel DVT Myths vs. Facts Blood ...

  1. Low Blood Pressure

    Science.gov (United States)

    ... a problem. Sometimes blood pressure that is too low can also cause problems. Blood pressure is the ... reading is 90/60 or lower, you have low blood pressure. Some people have low blood pressure ...

  2. Blood Donation Process

    Science.gov (United States)

    ... Drive Biomedical Services Hospital Partners Blood Products Blood Banking Resources Order Blood Products Invoice Central Case Reports ... Speed up your donation by completing a RapidPass® online or on the Blood Donor app on the ...

  3. Blood Clotting and Pregnancy

    Medline Plus

    Full Text Available ... Schedule & Program Registration Receipts Abstracts View all meetings Publications Blood Current Issue First Edition Abstracts Blood Advances ... reflect the most recent scientific research View all publications For Patients Blood Basics Blood Disorders Anemia Bleeding ...

  4. Low Blood Pressure (Hypotension)

    Science.gov (United States)

    ... lowest at night and rises sharply on waking. Blood pressure: How low can you go? What's considered low ... low blood pressure. Medications that can cause low blood pressure Some medications can cause low blood pressure, including: ...

  5. Blood Pressure Test

    Science.gov (United States)

    ... pressure monitors may have some limitations. Tracking your blood pressure readings It can be helpful in diagnosing or ... more Stage 2 high blood pressure (hypertension) Elevated blood pressure and stages 1 and 2 high blood pressure ( ...

  6. Blood Clotting and Pregnancy

    Medline Plus

    Full Text Available ... Blood articles updated to reflect the most recent scientific research View all publications For Patients Blood Basics ... help: Results of Clinical Studies Published in Blood Search Blood , the official journal of ASH, for the ...

  7. Blood Clotting and Pregnancy

    Medline Plus

    Full Text Available ... scientific research View all publications For Patients Blood Basics Blood Disorders Anemia Bleeding Disorders Blood Cancers Blood ... that provide information. back to top ASH Foundation Support the mission of ASH and help move hematology ...

  8. Haptoglobin blood test

    Science.gov (United States)

    The haptoglobin blood test measures the level of haptoglobin in your blood. Haptoglobin is a protein produced by the liver. It attaches to a certain type of hemoglobin in the blood. Hemoglobin is a blood cell that carries oxygen.

  9. Porphyrins - blood test

    Science.gov (United States)

    ... page: //medlineplus.gov/ency/article/003372.htm Porphyrins blood test To use the sharing features on this page, ... blood or the urine . This article discusses the blood test. How the Test is Performed A blood sample ...

  10. Platelet antibodies blood test

    Science.gov (United States)

    This blood test shows if you have antibodies against platelets in your blood. Platelets are a part of the blood ... Chernecky CC, Berger BJ. Platelet antibody - blood. In: Chernecky ... caused by platelet destruction, hypersplenism, or hemodilution. ...

  11. Blood Clotting and Pregnancy

    Medline Plus

    Full Text Available ... Blood Clots Blood Clotting and Pregnancy Clots and Travel DVT Myths vs. Facts Blood Disorder Fact Sheets ... that occurs when a DVT breaks off and travels to the blood vessels of the lungs. DVT ...

  12. Blood sugar test

    Science.gov (United States)

    ... sugar; Blood sugar level; Fasting blood sugar; Glucose test; Diabetic screening - blood sugar test; Diabetes - blood sugar test ... The test may be done in the following ways: After you have not eaten anything for at least 8 ...

  13. Blood Clotting and Pregnancy

    Medline Plus

    Full Text Available ... Research Programs and Awards View all Blood Current Issue First Edition Abstracts Blood Advances A peer-reviewed ... Email Updates View all meetings Publications Blood Current Issue First Edition Abstracts Blood Advances A peer-reviewed, ...

  14. Blood Clotting and Pregnancy

    Medline Plus

    Full Text Available ... Research Programs and Awards View all Blood Current Issue First Edition Abstracts Blood Advances A peer-reviewed ... Receipts Abstracts View all meetings Publications Blood Current Issue First Edition Abstracts Blood Advances A peer-reviewed, ...

  15. Annexe 3. Constitution d'une exploitation à Homs

    OpenAIRE

    2015-01-01

    ‘Abd al-Laṭīf, né en 1925, est jardinier à Horns. Il exploite avec son fils aîné et l'aide de deux de ses petits-fils un jardin de quelques 35 dunum (3,5 hectares) situé dans le zūr al-Ǧdīdeh, secteur central de la zone agricole. Cette grande exploitation, constituée de plusieurs parcelles ayant différents statuts, est en partie le produit d'une histoire familiale dont je voudrais présenter ici brièvement les principaux aspects. Figure 50 – Alliances matrimoniales entre la lignée de ‘Abbās e...

  16. Design and Exploitation Problems of Drill String in Directional Drilling

    Directory of Open Access Journals (Sweden)

    Bednarz Stanislaw

    2004-09-01

    Full Text Available Drill string design for directional drilling requires accounting for a number of factors. First, types and expected values of loads should be determined. Then, elements of the drill string should be so selected as to enable realization of the plan at specified loads. Some of additional factors, e. g. purchase, exploitation cost, geological conditions in the bore-hole, washing of the bore-hole, stability, trajectory, rig parameters, accuracy of gauges, pumps parameters remain in conflict. Drill pipes are made of rolled pipes, upset and welded with tool joints to 9,5 m long; the shorter ones can be made of hot forged rods. Exploitation requirements, being a result of practical experience supported by theoretical and laboratory analyses should be a part of syllabuses of technical staff educational programs. Apart from designing the string, it is also vital to lower the risk of a drilling failure. The significance of these aspects seems to be unquestionable.

  17. Environmental Impacts of Sand Exploitation. Analysis of Sand Market

    Directory of Open Access Journals (Sweden)

    Marius Dan Gavriletea

    2017-06-01

    Full Text Available Sand is an indispensable natural resource for any society. Despite society’s increasing dependence on sand, there are major challenges that this industry needs to deal with: limited sand resources, illegal mining, and environmental impact of sand mining. The purpose of this paper is twofold: to present an overview of the sand market, highlighting the main trends and actors for production, export and import, and to review the main environmental impacts associated with sand exploitation process. Based on these findings, we recommend different measures to be followed to reduce negative impacts. Sand mining should be done in a way that limits environmental damage during exploitation and restores the land after mining operations are completed.

  18. Analysis Of Damage Arising From Exploitation Of The Aircraft

    Directory of Open Access Journals (Sweden)

    Woźny Piotr

    2014-12-01

    Full Text Available During exploitation, due to a variety of reasons, aircrafts are damaged or suffer from different failures. In the process of operation, using appropriate methods of diagnosis, failure, damage, and relative deregulation of individual elements or units can be detected. For this purpose, one can apply a number of indirect diagnostic methods with the use of recorded diagnostic signals or a direct diagnosis with the use of non-destructive methods. The proper identification of the technical condition allows to determine the causes of irregularities and take actions aimed at preventing their occurrence. The article presents the types of exploitation damage of a multi-purpose aircraft. In addition, the criteria for the division of damage and research methods of the causes of damage are presented. Furthermore, an analysis of the scope of activities to be performed during the research of causes of damage to the aircraft is made.

  19. Target Localization with a Single Antenna via Directional Multipath Exploitation

    Directory of Open Access Journals (Sweden)

    Ali H. Muqaibel

    2015-01-01

    Full Text Available Target localization in urban sensing can benefit from angle dependency of the pulse shape at a radar receiver antenna. We propose a localization approach that utilizes the embedded directivity in ultra-wideband (UWB antennas to estimate target positions. A single radar unit sensing operation of indoor targets surrounded by interior walls is considered, where interior wall multipaths are exploited to provide target cross-range. This exploitation assumes resolvability of the multipath components, which is made possible by the virtue of using UWB radar signals. The proposed approach is most attractive when only few multipaths are detectable due to propagation obstructions or owing to low signal-to-noise ratios. Both simulated and experimental data are used to demonstrate the effectiveness of the proposed approach.

  20. Exploring, exploiting and evolving diversity of aquatic ecosystem models

    DEFF Research Database (Denmark)

    Janssen, Annette B G; Arhonditsis, George B.; Beusen, Arthur

    2015-01-01

    Here, we present a community perspective on how to explore, exploit and evolve the diversity in aquatic ecosystem models. These models play an important role in understanding the functioning of aquatic ecosystems, filling in observation gaps and developing effective strategies for water quality...... management. In this spirit, numerous models have been developed since the 1970s. We set off to explore model diversity by making an inventory among 42 aquatic ecosystem modellers, by categorizing the resulting set of models and by analysing them for diversity. We then focus on how to exploit model diversity...... available through open-source policies, to standardize documentation and technical implementation of models, and to compare models through ensemble modelling and interdisciplinary approaches. We end with our perspective on how the field of aquatic ecosystem modelling might develop in the next 5–10 years...

  1. Exploiting Social Media Sensor Networks through Novel Data Fusion Techniques

    Energy Technology Data Exchange (ETDEWEB)

    Kouri, Tina [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2017-11-01

    Unprecedented amounts of data are continuously being generated by sensors (“hard” data) and by humans (“soft” data), and this data needs to be exploited to its full potential. The first step in exploiting this data is determine how the hard and soft data are related to each other. In this project we fuse hard and soft data, using the attributes of each (e.g., time and space), to gain more information about interesting events. Next, we attempt to use social networking textual data to predict the present (i.e., predict that an interesting event is occurring and details about the event) using data mining, machine learning, natural language processing, and text analysis techniques.

  2. Exploitation Strategies in Social Parasites of Fungus Growing Ants

    DEFF Research Database (Denmark)

    Clement, Janni Dolby

    One of the most remarkable and complex parasitic interactions is social parasitism, where a parasite exploits a complete society, rather than an individual organism. By integrating into a society the parasite gains protection against predators and diseases, and can redirect resources from the host...... to increase its own fitness. The host will use a sophisticated recognition system in order to accept nestmates and expel intruders from their societies. However this defence barrier can be overcome by parasites. Among the most specialized social parasites are the inquilines that exploit social insect colonies...... to this are Acromyrmex insinuator and Acromyrmex ameliae, parasites of fungus-growing ants. By still producing a worker caste both species offers a rare opportunity to study adaptive features in parasite worker behaviour. Furthermore can closely related inquiline-host combinations give us an insight in the trade...

  3. Do singing rock hyraxes exploit conspecific calls to gain attention?

    Directory of Open Access Journals (Sweden)

    Amiyaal Ilany

    Full Text Available Signal detection theory predicts that signals directed at distant or busy receivers in noisy backgrounds will begin with an alert component, in order to draw attention. Instead of an alert component, however, animals could get the same effect by using an external stimulus. Here we combined observations of free-living rock hyraxes (Procavia capensis with playback experiments to elucidate the circumstances under which males begin singing. We show that males sing following hyrax pup screams, which elicit a strong response from hyraxes within hearing distance, which are potential receivers. We hypothesize that singers enhance their singing display by exploiting the rarely emitted pup screams. To our knowledge, our findings are the first indication that animals may enhance signal reception by exploiting conspecifics' signals and the differential attention to these signals. We suggest that the utilization of external stimuli by signalers may be widespread, as an adaptive strategy for communication in complex environments.

  4. Host exploitation strategies of the social parasite Maculinea alcon

    DEFF Research Database (Denmark)

    Fürst, Matthias Alois

    as model systems. These enable the study of adaptations and counter-adaptations that might evolve in the arms-race between a parasite pursuing maximum gain and a host trying to avoid exploitation. One such system is the socially parasitic butterfly Maculinea alcon and its host the ant Myrmica rubra....... Throughout the first instars M. alcon lives on a specific food plant, however, in the last instar before pupation it develops into an obligate social parasite, posing a considerably cost to its host ant colony. I here focus on the different exploitation strategies of M. alcon throughout its lifecycle...... a fitness cost to infected host ant colonies, the host ants are expected to have developed defense mechanisms in response to the presence of the social parasite. I was able to demonstrate that the efficiency of ant colonies to defend themselves against intruders depends on a multitude of often correlated...

  5. Exploitation of Natural Resources and the Public Sector in Greenland

    DEFF Research Database (Denmark)

    Nielsen, Søren Bo

    This paper considers the role of the public sector in future exploitation of non-renewable resources, especially minerals, in Greenland. The focus is on fiscal sustainability, principles for public sector involvement and the form of government take from mining activities. At present, the public...... budget in Greenland is nearly in balance, but at unchanged policies and standards public expenditures relative to GDP are bound to increase dramatically over the next decades due to population ageing. At the same time, the freezing of the block grant from Denmark implies a decrease in revenues relative...... to GDP. Hence, fiscal policy is quite far from being sustainable. Apart from a need for reforms, these facts also constrain the possible role of the public sector in future resource exploitation. In any case, the government should preferably adhere to strict principles when developing the mineral sector...

  6. Evaluating Maximum Wind Energy Exploitation in Active Distribution Networks

    DEFF Research Database (Denmark)

    Siano, Pierluigi; Chen, Peiyuan; Chen, Zhe

    2010-01-01

    The increased spreading of distributed and renewable generation requires moving towards active management of distribution networks. In this paper, in order to evaluate maximum wind energy exploitation in active distribution networks, a method based on a multi-period optimal power flow (OPF......) analysis is proposed. Active network management schemes such as coordinated voltage control, energy curtailment and power factor control are integrated in the method in order to investigate their impacts on the maximization of wind energy exploitation. Some case studies, using real data from a Danish...... distribution system, confirmed the effectiveness of the proposed method in evaluating the optimal applications of active management schemes to increase wind energy harvesting without costly network reinforcement for the connection of wind generation....

  7. Exploitation of the Virtual Worlds in Tourism and Tourism Education

    Directory of Open Access Journals (Sweden)

    Zejda Pavel

    2016-12-01

    Full Text Available Academics perceive a great potential of virtual worlds in various areas, including tourism and education. Efforts adapting the virtual worlds in practice are, however, still marginal. There is no clear definition of the virtual world. Therefore the author of this article attempts to provide one. The paper also focuses on the barriers of a wider exploitation of the virtual worlds and discusses the principles that might help to increase their potential in tourism area. One of the principles – gamification – favours a wider adaptation of the virtual worlds in tourism. Applying gamification principles provides visitors with some unique experiences while serving as a powerful marketing tool for institutions. The benefits of implementing tourism education activities based on cooperative principles set in an immersive environment of the virtual worlds are depicted afterwards. Finally, this paper includes successful case studies, which show advantages and drawbacks of some approaches in exploiting the virtual worlds in tourism and tourism education.

  8. The ESA Scientific Exploitation of Operational Missions element

    Science.gov (United States)

    Desnos, Yves-Louis; Regner, Peter; Delwart, Steven; Benveniste, Jerome; Engdahl, Marcus; Zehner, Claus; Mathieu, Pierre-Philippe; Bojkov, Bojan; Gascon, Ferran; Donlon, Craig; Davidson, Malcolm; Goryl, Philippe; Pinnock, Simon

    2015-04-01

    SEOM is a program element within the fourth period (2013-2017) of ESA's Earth Observation Envelope Programme (http://seom.esa.int/). The prime objective is to federate, support and expand the international research community that the ERS,ENVISAT and the Envelope programmes have built up over the last 25 years. It aims to further strengthen the leadership of the European Earth Observation research community by enabling them to extensively exploit future European operational EO missions. SEOM will enable the science community to address new scientific research that are opened by free and open access to data from operational EO missions. Based on community-wide recommendations for actions on key research issues, gathered through a series of international thematic workshops and scientific user consultation meetings, a work plan has been established and is approved every year by ESA Members States. The 2015 SEOM work plan is covering the organisation of three Science users consultation workshops for Sentinel1/3/5P , the launch of new R&D studies for scientific exploitation of the Sentinels, the development of open-source multi-mission scientific toolboxes, the organisation of advanced international training courses, summer schools and educational materials, as well as activities for promoting the scientific use of EO data. The first SEOM projects have been tendered since 2013 including the development of Sentinel toolboxes, advanced INSAR algorithms for Sentinel-1 TOPS data exploitation, Improved Atmospheric Spectroscopic data-base (IAS), as well as grouped studies for Sentinel-1, -2, and -3 land and ocean applications and studies for exploiting the synergy between the Sentinels. The status and first results from these SEOM projects will be presented and an outlook for upcoming SEOM studies will be given.

  9. Exploitation of the Virtual Worlds in Tourism and Tourism Education

    OpenAIRE

    Zejda Pavel; Zejda David

    2016-01-01

    Academics perceive a great potential of virtual worlds in various areas, including tourism and education. Efforts adapting the virtual worlds in practice are, however, still marginal. There is no clear definition of the virtual world. Therefore the author of this article attempts to provide one. The paper also focuses on the barriers of a wider exploitation of the virtual worlds and discusses the principles that might help to increase their potential in tourism area. One of the principles – g...

  10. Exploration and Exploitation of Victorian Science in Darwin's Reading Notebooks

    OpenAIRE

    Murdock, Jaimie; Allen, Colin; DeDeo, Simon

    2015-01-01

    Search in an environment with an uncertain distribution of resources involves a trade-off between exploitation of past discoveries and further exploration. This extends to information foraging, where a knowledge-seeker shifts between reading in depth and studying new domains. To study this decision-making process, we examine the reading choices made by one of the most celebrated scientists of the modern era: Charles Darwin. From the full-text of books listed in his chronologically-organized r...

  11. Exploiting Lexical Regularities in Designing Natural Language Systems.

    Science.gov (United States)

    1988-04-01

    ELEMENT. PROJECT. TASKN Artificial Inteligence Laboratory A1A4WR NTumet 0) 545 Technology Square Cambridge, MA 02139 Ln *t- CONTROLLING OFFICE NAME AND...RO-RI95 922 EXPLOITING LEXICAL REGULARITIES IN DESIGNING NATURAL 1/1 LANGUAGE SYSTENS(U) MASSACHUSETTS INST OF TECH CAMBRIDGE ARTIFICIAL INTELLIGENCE...oes.ary and ftdou.Ip hr Nl wow" L,2This paper presents the lexical component of the START Question Answering system developed at the MIT Artificial

  12. Television production, Funding Models and Exploitation of Content

    OpenAIRE

    Doyle, Gillian

    2016-01-01

    The rise of digital platforms has transformative implications for strategies of financing media production and for exploitation of the economic value in creative content. In the television industry, changes in technologies for distribution and the emergence of SVOD services such as Netflix are gradually shifting audiences and financial power away from broadcasters while at the same time creating unprecedented opportunities for programme-makers.  Drawing on findings from recent RCUK-funded res...

  13. Exploitation and Utilization of Oilfield Geothermal Resources in China

    OpenAIRE

    Shejiao Wang; Jiahong Yan; Feng Li; Junwen Hu; Kewen Li

    2016-01-01

    Geothermal energy is a clean, green renewable resource, which can be utilized for power generation, heating, cooling, and could effectively replace oil, gas, and coal. In recent years, oil companies have put more efforts into exploiting and utilizing geothermal energy with advanced technologies for heat-tracing oil gathering and transportation, central heating, etc., which has not only reduced resource waste, but also improved large-scale and industrial resource utilization levels, and has ac...

  14. Low-Level Exploitation Mitigation by Diverse Microservices

    OpenAIRE

    Otterstad , Christian; Yarygina , Tetiana

    2017-01-01

    Part 2: Microservices and Containers; International audience; This paper discusses a combination of isolatable microservices and software diversity as a mitigation technique against low-level exploitation; the effectiveness and benefits of such an architecture are substantiated. We argue that the core security benefit of microservices with diversity is increased control flow isolation. Additionally, a new microservices mitigation technique leveraging a security monitor service is introduced t...

  15. Organizational Ambidexterity : Balancing Exploitation and Exploration in Organizations

    OpenAIRE

    Yigit, Mert

    2013-01-01

    Purpose: This paper aims to investigate necessity of ambidexterity for organizations. The main interest of this thesis is to investigate why organizations should be ambidextrous and how organizations can reach ambidexterity under the pressure of limited resources and competitive market condition. Findings: This thesis explored relations and tensions between exploitation and exploration in organizational and individual aspects. Findings in the research show that communication skill of the subu...

  16. Exploiting Child-Robot Aesthetic Interaction for a Social Robot

    OpenAIRE

    Lee, Jae-Joon; Kim, Dae-Won; Kang, Bo-Yeong

    2012-01-01

    A social robot interacts and communicates with humans by using the embodied knowledge gained from interactions with its social environment. In recent years, emotion has emerged as a popular concept for designing social robots. Several studies on social robots reported an increase in robot sociability through emotional imitative interactions between the robot and humans. In this paper conventional emotional interactions are extended by exploiting the aesthetic theories that the sociability of ...

  17. Preventing Exploits Against Software of Uncertain Provenance (PEASOUP)

    Science.gov (United States)

    2015-05-01

    two common synchronization idioms: conditional variables (e.g., pthread_cond_wait()) and semaphores that count up and are used for signaling...delay prior to certain synchronization operations. The operations include thread creation, the first lock of each mutex (or decrement of a semaphore ...permissions are shared by all threads in the same process. • Synchronization Primitives . To exploit the race condition, two attacker-controlled

  18. Endangered Species and Natural Resource Exploitation: Extinction vs. Coexistence

    OpenAIRE

    Tsur, Yacov; Zemel, Amos

    1994-01-01

    The threat on the survival of animal species due to intensive use of natural resources is incorporated within resource management models, paying special attention to uncertainty regarding the conditions that lead to extinction. The manner in which the potential benefits forgone due to the species extinction (denoted extinction penalty) induce more conservative exploitation policies is studied in detail. When the extinction penalty is ignored, the optimal policy is to drive the resource stock ...

  19. An Equity Centered Management Approach to Exploiting Sport Employee Productivity

    OpenAIRE

    Schneider, Robert C.

    2017-01-01

    A primary goal ofsport organizations is to exploit employees’ abilities to their fullestcapacities. Sport managers who successfully maximize employee productivity willgreatly increase the chances of achieving the organization’s goals andobjectives. The full potential of sport employees’ abilities can be realizedthrough the application of the equity component grounded in Adam’s EquityTheory (Adams, 1963). Centered on the premise that the relationship betweensport manager and employer must be o...

  20. Exploiting GPUs in Virtual Machine for BioCloud

    OpenAIRE

    Jo, Heeseung; Jeong, Jinkyu; Lee, Myoungho; Choi, Dong Hoon

    2013-01-01

    Recently, biological applications start to be reimplemented into the applications which exploit many cores of GPUs for better computation performance. Therefore, by providing virtualized GPUs to VMs in cloud computing environment, many biological applications will willingly move into cloud environment to enhance their computation performance and utilize infinite cloud computing resource while reducing expenses for computations. In this paper, we propose a BioCloud system architecture that ena...

  1. Exploiting Innocuous Activity for Correlating Users Across Sites

    OpenAIRE

    Goga , Oana; Lei , Howard; Parthasarathi , Sree Hari Krishnan; Friedland , Gerald; Sommer , Robin; Teixeira , Renata

    2013-01-01

    International audience; We study how potential attackers can identify accounts on different social network sites that all belong to the same user, exploiting only innocuous activity that inherently comes with posted content. We examine three specific features on Yelp, Flickr, and Twitter: the geo-location attached to a user's posts, the timestamp of posts, and the user's writing style as captured by language models. We show that among these three features the location of posts is the most powe...

  2. Blood Clotting and Pregnancy

    Medline Plus

    Full Text Available ... of articles from the 2017 ASH Annual Meeting Education Program Blood: How I Treat A compendium of Blood articles updated to reflect the most recent scientific research View all publications For Patients Blood Basics Blood Disorders Anemia Bleeding Disorders Blood Cancers Blood ...

  3. Assessing uncertainty and risk in exploited marine populations

    International Nuclear Information System (INIS)

    Fogarty, M.J.; Mayo, R.K.; O'Brien, L.; Serchuk, F.M.; Rosenberg, A.A.

    1996-01-01

    The assessment and management of exploited fish and invertebrate populations is subject to several types of uncertainty. This uncertainty translates into risk to the population in the development and implementation of fishery management advice. Here, we define risk as the probability that exploitation rates will exceed a threshold level where long term sustainability of the stock is threatened. We distinguish among several sources of error or uncertainty due to (a) stochasticity in demographic rates and processes, particularly in survival rates during the early fife stages; (b) measurement error resulting from sampling variation in the determination of population parameters or in model estimation; and (c) the lack of complete information on population and ecosystem dynamics. The first represents a form of aleatory uncertainty while the latter two factors represent forms of epistemic uncertainty. To illustrate these points, we evaluate the recent status of the Georges Bank cod stock in a risk assessment framework. Short term stochastic projections are made accounting for uncertainty in population size and for random variability in the number of young surviving to enter the fishery. We show that recent declines in this cod stock can be attributed to exploitation rates that have substantially exceeded sustainable levels

  4. Fishing elevates variability in the abundance of exploited species.

    Science.gov (United States)

    Hsieh, Chih-Hao; Reiss, Christian S; Hunter, John R; Beddington, John R; May, Robert M; Sugihara, George

    2006-10-19

    The separation of the effects of environmental variability from the impacts of fishing has been elusive, but is essential for sound fisheries management. We distinguish environmental effects from fishing effects by comparing the temporal variability of exploited versus unexploited fish stocks living in the same environments. Using the unique suite of 50-year-long larval fish surveys from the California Cooperative Oceanic Fisheries Investigations we analyse fishing as a treatment effect in a long-term ecological experiment. Here we present evidence from the marine environment that exploited species exhibit higher temporal variability in abundance than unexploited species. This remains true after accounting for life-history effects, abundance, ecological traits and phylogeny. The increased variability of exploited populations is probably caused by fishery-induced truncation of the age structure, which reduces the capacity of populations to buffer environmental events. Therefore, to avoid collapse, fisheries must be managed not only to sustain the total viable biomass but also to prevent the significant truncation of age structure. The double jeopardy of fishing to potentially deplete stock sizes and, more immediately, to amplify the peaks and valleys of population variability, calls for a precautionary management approach.

  5. Commercial sexual exploitation and sex trafficking of adolescents.

    Science.gov (United States)

    Chung, Richard J; English, Abigail

    2015-08-01

    This review describes the current state of commercial sexual exploitation and sex trafficking of adolescents in the United States and globally, the legal and health implications of this severe form of abuse, and the roles that pediatric and adolescent healthcare providers can play in addressing this issue. Although this form of exploitation and abuse is shrouded in secrecy, pediatric and adolescent healthcare providers are well positioned to respond when it arises. However, awareness and understanding of the issue are generally lacking among healthcare professionals, currently limiting their effectiveness in combating this problem. Although the empirical evidence base available to guide clinical care of victims of trafficking remains limited given the secretive nature of the abuse, important contributions to the multidisciplinary literature on this issue have been made in recent years, including the Institute of Medicine's landmark report in the United States. Commercial sexual exploitation and sex trafficking of adolescents represent a human rights tragedy that remains inadequately addressed. As preeminent advocates for the health and well-being of adolescents, pediatric and adolescent healthcare providers can play a crucial role in advancing efforts not only to intervene but also to prevent further victimization of vulnerable youth.

  6. Potentially exploitable supercritical geothermal resources in the ductile crust

    Science.gov (United States)

    Watanabe, Noriaki; Numakura, Tatsuya; Sakaguchi, Kiyotoshi; Saishu, Hanae; Okamoto, Atsushi; Ingebritsen, Steven E.; Tsuchiya, Noriyoshi

    2017-01-01

    The hypothesis that the brittle–ductile transition (BDT) drastically reduces permeability implies that potentially exploitable geothermal resources (permeability >10−16 m2) consisting of supercritical water could occur only in rocks with unusually high transition temperatures such as basalt. However, tensile fracturing is possible even in ductile rocks, and some permeability–depth relations proposed for the continental crust show no drastic permeability reduction at the BDT. Here we present experimental results suggesting that the BDT is not the first-order control on rock permeability, and that potentially exploitable resources may occur in rocks with much lower BDT temperatures, such as the granitic rocks that comprise the bulk of the continental crust. We find that permeability behaviour for fractured granite samples at 350–500 °C under effective confining stress is characterized by a transition from a weakly stress-dependent and reversible behaviour to a strongly stress-dependent and irreversible behaviour at a specific, temperature-dependent effective confining stress level. This transition is induced by onset of plastic normal deformation of the fracture surface (elastic–plastic transition) and, importantly, causes no ‘jump’ in the permeability. Empirical equations for this permeability behaviour suggest that potentially exploitable resources exceeding 450 °C may form at depths of 2–6 km even in the nominally ductile crust.

  7. Relativistic quantum metrology: exploiting relativity to improve quantum measurement technologies.

    Science.gov (United States)

    Ahmadi, Mehdi; Bruschi, David Edward; Sabín, Carlos; Adesso, Gerardo; Fuentes, Ivette

    2014-05-22

    We present a framework for relativistic quantum metrology that is useful for both Earth-based and space-based technologies. Quantum metrology has been so far successfully applied to design precision instruments such as clocks and sensors which outperform classical devices by exploiting quantum properties. There are advanced plans to implement these and other quantum technologies in space, for instance Space-QUEST and Space Optical Clock projects intend to implement quantum communications and quantum clocks at regimes where relativity starts to kick in. However, typical setups do not take into account the effects of relativity on quantum properties. To include and exploit these effects, we introduce techniques for the application of metrology to quantum field theory. Quantum field theory properly incorporates quantum theory and relativity, in particular, at regimes where space-based experiments take place. This framework allows for high precision estimation of parameters that appear in quantum field theory including proper times and accelerations. Indeed, the techniques can be applied to develop a novel generation of relativistic quantum technologies for gravimeters, clocks and sensors. As an example, we present a high precision device which in principle improves the state-of-the-art in quantum accelerometers by exploiting relativistic effects.

  8. Ultrasonic imaging of material flaws exploiting multipath information

    Science.gov (United States)

    Shen, Xizhong; Zhang, Yimin D.; Demirli, Ramazan; Amin, Moeness G.

    2011-05-01

    In this paper, we consider ultrasonic imaging for the visualization of flaws in a material. Ultrasonic imaging is a powerful nondestructive testing (NDT) tool which assesses material conditions via the detection, localization, and classification of flaws inside a structure. Multipath exploitations provide extended virtual array apertures and, in turn, enhance imaging capability beyond the limitation of traditional multisensor approaches. We utilize reflections of ultrasonic signals which occur when encountering different media and interior discontinuities. The waveforms observed at the physical as well as virtual sensors yield additional measurements corresponding to different aspect angles. Exploitation of multipath information addresses unique issues observed in ultrasonic imaging. (1) Utilization of physical and virtual sensors significantly extends the array aperture for image enhancement. (2) Multipath signals extend the angle of view of the narrow beamwidth of the ultrasound transducers, allowing improved visibility and array design flexibility. (3) Ultrasonic signals experience difficulty in penetrating a flaw, thus the aspect angle of the observation is limited unless access to other sides is available. The significant extension of the aperture makes it possible to yield flaw observation from multiple aspect angles. We show that data fusion of physical and virtual sensor data significantly improves the detection and localization performance. The effectiveness of the proposed multipath exploitation approach is demonstrated through experimental studies.

  9. Exploitative and hierarchical antagonism in a cooperative bacterium.

    Directory of Open Access Journals (Sweden)

    Francesca Fiegna

    2005-11-01

    Full Text Available Social organisms that cooperate with some members of their own species, such as close relatives, may fail to cooperate with other genotypes of the same species. Such noncooperation may take the form of outright antagonism or social exploitation. Myxococcus xanthus is a highly social prokaryote that cooperatively develops into spore-bearing, multicellular fruiting bodies in response to starvation. Here we have characterized the nature of social interactions among nine developmentally proficient strains of M. xanthus isolated from spatially distant locations. Strains were competed against one another in all possible pairwise combinations during starvation-induced development. In most pairings, at least one competitor exhibited strong antagonism toward its partner and a majority of mixes showed bidirectional antagonism that decreased total spore production, even to the point of driving whole populations to extinction. Differential response to mixing was the primary determinant of competitive superiority rather than the sporulation efficiencies of unmixed populations. In some competitive pairings, the dominant partner sporulated more efficiently in mixed populations than in clonal isolation. This finding represents a novel form of exploitation in bacteria carried out by socially competent genotypes and is the first documentation of social exploitation among natural bacterial isolates. Patterns of antagonistic superiority among these strains form a highly linear dominance hierarchy. At least some competition pairs construct chimeric, rather than segregated, fruiting bodies. The cooperative prokaryote M. xanthus has diverged into a large number of distinct social types that cooperate with clone-mates but exhibit intense antagonism toward distinct social types of the same species. Most lengthy migration events in nature may thus result in strong antagonism between migratory and resident populations, and this antagonism may have large effects on local

  10. Changing the Price of Marriage: Evidence from Blood Test Requirements

    Science.gov (United States)

    Buckles, Kasey; Guldi, Melanie; Price, Joseph

    2011-01-01

    We use state repeals of blood test requirements (BTRs) for a marriage license that occurred between 1980 and 2008 to examine the impact of changes in the price of marriage on the marriage decision. Using a within-group estimator that holds constant state and year effects and exploits variation in the repeal dates of BTRs across states, we find…

  11. Exploration and exploitation of Victorian science in Darwin's reading notebooks.

    Science.gov (United States)

    Murdock, Jaimie; Allen, Colin; DeDeo, Simon

    2017-02-01

    Search in an environment with an uncertain distribution of resources involves a trade-off between exploitation of past discoveries and further exploration. This extends to information foraging, where a knowledge-seeker shifts between reading in depth and studying new domains. To study this decision-making process, we examine the reading choices made by one of the most celebrated scientists of the modern era: Charles Darwin. From the full-text of books listed in his chronologically-organized reading journals, we generate topic models to quantify his local (text-to-text) and global (text-to-past) reading decisions using Kullback-Liebler Divergence, a cognitively-validated, information-theoretic measure of relative surprise. Rather than a pattern of surprise-minimization, corresponding to a pure exploitation strategy, Darwin's behavior shifts from early exploitation to later exploration, seeking unusually high levels of cognitive surprise relative to previous eras. These shifts, detected by an unsupervised Bayesian model, correlate with major intellectual epochs of his career as identified both by qualitative scholarship and Darwin's own self-commentary. Our methods allow us to compare his consumption of texts with their publication order. We find Darwin's consumption more exploratory than the culture's production, suggesting that underneath gradual societal changes are the explorations of individual synthesis and discovery. Our quantitative methods advance the study of cognitive search through a framework for testing interactions between individual and collective behavior and between short- and long-term consumption choices. This novel application of topic modeling to characterize individual reading complements widespread studies of collective scientific behavior. Copyright © 2016 Elsevier B.V. All rights reserved.

  12. Cyber Child Sexual Exploitation dalam Perspektif Perlindungan atas Kejahatan Siber

    Directory of Open Access Journals (Sweden)

    Go Lisanawati

    2013-04-01

    Full Text Available Perkembangan teknologi, yang diwujudkan dengan adanya inovasi berupa Internet, yang semakin pesat menempatkan semua pihak berada pada sebuah posisi yang rentan. Kerentanan tersebut dapat berupa tereksploitasinya orang menjadi korban maupun pelaku kejahatan. Teknologi menjadi pedang bermata dua dengan segala kelebihan dan eksplorasi serta eksploitasi atas kelemahan atas pemanfaatan teknologi tersebut oleh orang-orang yang tidak bertanggungjawab. Pada posisi yang sama, anak menjadi korban yang sangat potensial atas penyalahgunaan teknologi, khususnya atas eksploitasi seksual yang dapat meliputi pornografi anak, perdagangan anak, dan child sex tourism. Indonesia memang telah memiliki berbagai perangkat aturan hukum yang dipergunakan untuk memberikan perlindungan kepada anak, termasuk juga di dalamnya adalah perangkat hukum di bidang telematika. Namun demikian belum semua perangkat hukum tersebut dapat dipergunakan secara maksimal untuk mewujudkan perlindungan hukum bagi anak. The rapid development of technology through Internet nowadays has been put all parties in the vulnerable position. The vulnerable form which may appear is the possibility of the exploited parties to be victims and/or the offender of crime. Technology itself brings not only advancement but also the weaknesses which may be explored and exploited by the irresponsible people by doing such a crime. In the same position, children are potentially to be the very vulnerable victims of the misuse of the technology, especially sexual exploitation which including child pornography, child trafficking, and also child sex tourism. Indonesia is already having such kind of law to give protection to children, including also the law related to telematics matter. But not each law could maximize yet implemented to give the law protection for child.

  13. Widespread exploitation of the honeybee by early Neolithic farmers.

    Science.gov (United States)

    Roffet-Salque, Mélanie; Regert, Martine; Evershed, Richard P; Outram, Alan K; Cramp, Lucy J E; Decavallas, Orestes; Dunne, Julie; Gerbault, Pascale; Mileto, Simona; Mirabaud, Sigrid; Pääkkönen, Mirva; Smyth, Jessica; Šoberl, Lucija; Whelton, Helen L; Alday-Ruiz, Alfonso; Asplund, Henrik; Bartkowiak, Marta; Bayer-Niemeier, Eva; Belhouchet, Lotfi; Bernardini, Federico; Budja, Mihael; Cooney, Gabriel; Cubas, Miriam; Danaher, Ed M; Diniz, Mariana; Domboróczki, László; Fabbri, Cristina; González-Urquijo, Jesus E; Guilaine, Jean; Hachi, Slimane; Hartwell, Barrie N; Hofmann, Daniela; Hohle, Isabel; Ibáñez, Juan J; Karul, Necmi; Kherbouche, Farid; Kiely, Jacinta; Kotsakis, Kostas; Lueth, Friedrich; Mallory, James P; Manen, Claire; Marciniak, Arkadiusz; Maurice-Chabard, Brigitte; Mc Gonigle, Martin A; Mulazzani, Simone; Özdoğan, Mehmet; Perić, Olga S; Perić, Slaviša R; Petrasch, Jörg; Pétrequin, Anne-Marie; Pétrequin, Pierre; Poensgen, Ulrike; Pollard, C Joshua; Poplin, François; Radi, Giovanna; Stadler, Peter; Stäuble, Harald; Tasić, Nenad; Urem-Kotsou, Dushka; Vuković, Jasna B; Walsh, Fintan; Whittle, Alasdair; Wolfram, Sabine; Zapata-Peña, Lydia; Zoughlami, Jamel

    2015-11-12

    The pressures on honeybee (Apis mellifera) populations, resulting from threats by modern pesticides, parasites, predators and diseases, have raised awareness of the economic importance and critical role this insect plays in agricultural societies across the globe. However, the association of humans with A. mellifera predates post-industrial-revolution agriculture, as evidenced by the widespread presence of ancient Egyptian bee iconography dating to the Old Kingdom (approximately 2400 BC). There are also indications of Stone Age people harvesting bee products; for example, honey hunting is interpreted from rock art in a prehistoric Holocene context and a beeswax find in a pre-agriculturalist site. However, when and where the regular association of A. mellifera with agriculturalists emerged is unknown. One of the major products of A. mellifera is beeswax, which is composed of a complex suite of lipids including n-alkanes, n-alkanoic acids and fatty acyl wax esters. The composition is highly constant as it is determined genetically through the insect's biochemistry. Thus, the chemical 'fingerprint' of beeswax provides a reliable basis for detecting this commodity in organic residues preserved at archaeological sites, which we now use to trace the exploitation by humans of A. mellifera temporally and spatially. Here we present secure identifications of beeswax in lipid residues preserved in pottery vessels of Neolithic Old World farmers. The geographical range of bee product exploitation is traced in Neolithic Europe, the Near East and North Africa, providing the palaeoecological range of honeybees during prehistory. Temporally, we demonstrate that bee products were exploited continuously, and probably extensively in some regions, at least from the seventh millennium cal BC, likely fulfilling a variety of technological and cultural functions. The close association of A. mellifera with Neolithic farming communities dates to the early onset of agriculture and may provide

  14. The strv 1 microsatellite semes: Exploiting the geosynchronous transfer orbit

    Science.gov (United States)

    Blott, R. J.; Wells, N. S.; Eves, J.

    Following 3 successful years in orbit, the UK Defence Evaluation and Research Agency's two Space Technology Research Vehicle microsatellites (STRV) 1 a&b will be followed by a second mission. STRV 1 c&d are now in construction for a planned launch in 1999. The new mission, which includes 22 experimental payloads and developmental spacecraft bus technologies from European, US and Canadian military, civil and commercial sponsors, exploits the Geosynchronous Transfer Orbit (GTO) to offer an affordable, working space research tool for both government and industry. The STRV 1 programme objective is to promote the enhancement of military and civil space communications, remote sensing and navigation capabilities at reduced cost and risk. Additional aims are to help industry to achieve commercial benefit from investment in emerging technologies and to develop the synergy between government, commercial and civilian space applications. The paper explains how STRV 1 exploits the variable altitude and high radiation environment of GTO to investigate the performance of emerging technologies and techniques. This includes the accelerated life testing of components and materials, such as infra-red detectors, advanced microprocessors and solar cell technologies, and the prototyping of new techniques to improve communications and spacecraft autonomy. Experiments include implementing a secure version of the Consultative Committee for Space Data Systems (CCSDS) packet telecommand and telemetry standards, further development of the Internet-based Space Communication Protocol Standards (SCPS) and evaluating the exploitation of the Global Positioning System (GPS) in geosynchronous orbit. The new mission also builds on and extends the comprehensive environmental monitoring achieved by STRV 1 a&b.

  15. Using choice architecture to exploit a university Distinct Urban Mine.

    Science.gov (United States)

    Pierron, Xavier; Williams, Ian D; Shaw, Peter J; Cleaver, Victoria

    2017-10-01

    There are widespread concerns regarding the potential future scarcity of ferrous and non-ferrous materials. However, there are already potentially rich reserves of secondary materials via high ownership of Electrical and Electronic Equipment (EEE) in economically-developed nations. Young people are particularly high consumers of EEE, thus university students and campuses may present an opportunity to harness this potential. University Distinct Urban Mines (DUM) may be used to exemplify how potential reserves of secondary metals may be exploited, and could contribute to the transition from a linear to a circular economy. This study aimed to evaluate small household appliances (SHA) DUM from a UK university, with the objectives to identify and quantify student households' SHA ownership, WEEE recycling, stockpiling and discarding habits amongst student households, assess and evaluate the monetary potential of SHA DUM at UK level, and propose methods to exploit DUM for universities in the UK. To this purpose, a quantitative survey was undertaken to measure students' ownership and discarding behaviour with respect to SHA. The amounts of ferrous and non-ferrous materials were then estimated and converted to monetary values from secondary materials market data to appraise the SHA DUM overall value. Thirty-five per cent of SHA are discarded in the general refuse. Broken personal care appliances (PCA) tend to be discarded due to hygiene and small size factors. When in working order, SHA tend to be equally reused, recycled or stockpiled. We conclude that a total of 189 tonnes of ferrous and non-ferrous materials were available via discarding or being stockpiled at the University of Southampton. Extrapolated to UK higher education level, discarded and stockpiled SHA represent a potential worth ∼USD 11 million. To initiate DUM exploitation within Higher Education campuses, we suggest improving users' choice architecture by providing collection methods specific to broken SHA

  16. Human collective intelligence under dual exploration-exploitation dilemmas.

    Directory of Open Access Journals (Sweden)

    Wataru Toyokawa

    Full Text Available The exploration-exploitation dilemma is a recurrent adaptive problem for humans as well as non-human animals. Given a fixed time/energy budget, every individual faces a fundamental trade-off between exploring for better resources and exploiting known resources to optimize overall performance under uncertainty. Colonies of eusocial insects are known to solve this dilemma successfully via evolved coordination mechanisms that function at the collective level. For humans and other non-eusocial species, however, this dilemma operates within individuals as well as between individuals, because group members may be motivated to take excessive advantage of others' exploratory findings through social learning. Thus, even though social learning can reduce collective exploration costs, the emergence of disproportionate "information scroungers" may severely undermine its potential benefits. We investigated experimentally whether social learning opportunities might improve the performance of human participants working on a "multi-armed bandit" problem in groups, where they could learn about each other's past choice behaviors. Results showed that, even though information scroungers emerged frequently in groups, social learning opportunities reduced total group exploration time while increasing harvesting from better options, and consequentially improved collective performance. Surprisingly, enriching social information by allowing participants to observe others' evaluations of chosen options (e.g., Amazon's 5-star rating system in addition to choice-frequency information had a detrimental impact on performance compared to the simpler situation with only the choice-frequency information. These results indicate that humans groups can handle the fundamental "dual exploration-exploitation dilemmas" successfully, and that social learning about simple choice-frequencies can help produce collective intelligence.

  17. Examples of Sentinel-2A Mission Exploitation Results

    Science.gov (United States)

    Koetz, Benjamin; Hoersch, Bianca; Gascon, Ferran; Desnos, Yves-Louis; Seifert, Frank Martin; Paganini, Marc; Ramoino, Fabrizio; Arino, Olivier

    2017-04-01

    The Sentinel-2 Copernicus mission will bring significant breakthrough in the exploitation of space borne optical data. Sentinel-2 time series will transform land cover, agriculture, forestry, in-land water and costal EO applications from mapping to monitoring, from snapshot to time series data analysis, from image-based to pixel-based processing. The 5-days temporal revisiting of the Sentinel-2 satellites, when both units will be operated together, will usher us in a new era for time series analysis at high spatial resolutions (HR) of 10-20 meters. The monitoring of seasonal variations and processes in phenology and hydrology are examples of the many R&D areas to be studied. The mission's large swath and systematic acquisitions will further support unprecedented coverage at the national scale addressing information requirements of national to regional policies. Within ESA programs, such as the Data User Element (DUE), Scientific Exploitation of Operational Missions (SEOM) and Climate Change Initiative (CCI), several R&D activities are preparing the exploitation of the Sentinel-2 mission towards reliable measurements and monitoring of e.g. Essential Climate Variables and indicators for the Sustainable Development Goals. Early Sentinel-2 results will be presented related to a range of applications and scientific domains such as agricultural monitoring at national scale (DUE Sen2Agri), wetland extent and condition over African Ramsar sites (DUE GlobWetland-Africa), land cover mapping for climate change (CCI Land Cover), national land monitoring (Cadaster-Env), forest degradation (DUE ForMoSa), urban mapping (DUE EO4Urban), in-land water quality (DUE SPONGE), map of Mediterranean aquaculture (DUE SMART) and coral reef habitat mapping (SEOM S2-4Sci Coral). The above-mentioned activities are only a few examples from the very active international land imaging community building on the long-term Landsat and Spot heritage and knowledge.

  18. FSH: fast spaced seed hashing exploiting adjacent hashes.

    Science.gov (United States)

    Girotto, Samuele; Comin, Matteo; Pizzi, Cinzia

    2018-01-01

    Patterns with wildcards in specified positions, namely spaced seeds , are increasingly used instead of k -mers in many bioinformatics applications that require indexing, querying and rapid similarity search, as they can provide better sensitivity. Many of these applications require to compute the hashing of each position in the input sequences with respect to the given spaced seed, or to multiple spaced seeds. While the hashing of k -mers can be rapidly computed by exploiting the large overlap between consecutive k -mers, spaced seeds hashing is usually computed from scratch for each position in the input sequence, thus resulting in slower processing. The method proposed in this paper, fast spaced-seed hashing (FSH), exploits the similarity of the hash values of spaced seeds computed at adjacent positions in the input sequence. In our experiments we compute the hash for each positions of metagenomics reads from several datasets, with respect to different spaced seeds. We also propose a generalized version of the algorithm for the simultaneous computation of multiple spaced seeds hashing. In the experiments, our algorithm can compute the hashing values of spaced seeds with a speedup, with respect to the traditional approach, between 1.6[Formula: see text] to 5.3[Formula: see text], depending on the structure of the spaced seed. Spaced seed hashing is a routine task for several bioinformatics application. FSH allows to perform this task efficiently and raise the question of whether other hashing can be exploited to further improve the speed up. This has the potential of major impact in the field, making spaced seed applications not only accurate, but also faster and more efficient. The software FSH is freely available for academic use at: https://bitbucket.org/samu661/fsh/overview.

  19. The ESA Scientific Exploitation of Operational Missions element, first results

    Science.gov (United States)

    Desnos, Yves-Louis; Regner, Peter; Delwart, Steven; Benveniste, Jerome; Engdahl, Marcus; Mathieu, Pierre-Philippe; Gascon, Ferran; Donlon, Craig; Davidson, Malcolm; Pinnock, Simon; Foumelis, Michael; Ramoino, Fabrizio

    2016-04-01

    SEOM is a program element within the fourth period (2013-2017) of ESA's Earth Observation Envelope Programme (http://seom.esa.int/). The prime objective is to federate, support and expand the international research community that the ERS, ENVISAT and the Envelope programmes have built up over the last 25 years. It aims to further strengthen the leadership of the European Earth Observation research community by enabling them to extensively exploit future European operational EO missions. SEOM will enable the science community to address new scientific research that are opened by free and open access to data from operational EO missions. Based on community-wide recommendations for actions on key research issues, gathered through a series of international thematic workshops and scientific user consultation meetings, a work plan is established and is approved every year by ESA Members States. During 2015 SEOM, Science users consultation workshops have been organized for Sentinel1/3/5P ( Fringe, S3 Symposium and Atmospheric science respectively) , new R&D studies for scientific exploitation of the Sentinels have been launched ( S3 for Science SAR Altimetry and Ocean Color , S2 for Science,) , open-source multi-mission scientific toolboxes have been launched (in particular the SNAP/S1-2-3 Toolbox). In addition two advanced international training courses have been organized in Europe to exploit the new S1-A and S2-A data for Land and Ocean remote sensing (over 120 participants from 25 countries) as well as activities for promoting the first scientific results ( e.g. Chili Earthquake) . In addition the First EO Open Science 2.0 was organised at ESA in October 2015 with 225 participants from 31 countries bringing together young EO scientists and data scientists. During the conference precursor activities in EO Open Science and Innovation were presented, while developing a Roadmap preparing for future ESA scientific exploitation activities. Within the conference, the first

  20. Exploiting the Potential of Data Centers in the Smart Grid

    Science.gov (United States)

    Wang, Xiaoying; Zhang, Yu-An; Liu, Xiaojing; Cao, Tengfei

    As the number of cloud computing data centers grows rapidly in recent years, from the perspective of smart grid, they are really large and noticeable electric load. In this paper, we focus on the important role and the potential of data centers as controllable loads in the smart grid. We reviewed relevant research in the area of letting data centers participate in the ancillary services market and demand response programs of the grid, and further investigate the possibility of exploiting the impact of data center placement on the grid. Various opportunities and challenges are summarized, which could provide more chances for researches to explore this field.

  1. Exploitation of natural resources and conflict in Colombia

    Directory of Open Access Journals (Sweden)

    Luis Eduardo Sandoval

    2017-11-01

    Full Text Available Colombia has increasingly been specializing in the extraction of mineral and energy resources such as gold, coal, oil and ferronickel. These activities, in the context of state weakness, have engendered conflicts of different dimensions. This paper proposes an indicator of conflict related to mineral exploitation that classifies five dimensions of conflict: social, economic, cultural, political and environmental. The aggregate indicator shows that murders, displacement of Afrodescendent populations, flooding, pollution, fires, infant mortality, coca crops and sexual offenses are highly and positively correlated with the number of conflicts.

  2. Assessing Africa-wide Pangolin exploitation by scaling local data

    DEFF Research Database (Denmark)

    Ingram, Daniel J.; Coad, Lauren; Abernethy, Katharine A.

    2018-01-01

    on regional trends in exploitation of threatened species to inform conservation actions and policy. We estimate that 0.4-2.7 million pangolins are hunted annually in Central African forests. The number of pangolins hunted has increased by ∼150% and the proportion of pangolins of all vertebrates hunted...... increased from 0.04% to 1.83% over the past four decades. However, there were no trends in pangolins observed at markets, suggesting use of alternative supply chains. We found evidence that the price of giant (Smutsia gigantea) and arboreal (Phataginus sp.) pangolins in urban markets has increased...

  3. The largest renewable, easily exploitable, and economically sustainable energy resource

    Science.gov (United States)

    Abbate, Giancarlo; Saraceno, Eugenio

    2018-02-01

    Sun, the ultimate energy resource of our planet, transfers energy to the Earth at an average power of 23,000 TW. Earth surface can be regarded as a huge panel transforming solar energy into a more convenient mechanical form, the wind. Since millennia wind is recognized as an exploitable form of energy and it is common knowledge that the higher you go, the stronger the winds flow. To go high is difficult; however Bill Gates cites high wind among possible energy miracles in the near future. Public awareness of this possible miracle is still missing, but today's technology is ready for it.

  4. On the Exploitation of Sensitivity Derivatives for Improving Sampling Methods

    Science.gov (United States)

    Cao, Yanzhao; Hussaini, M. Yousuff; Zang, Thomas A.

    2003-01-01

    Many application codes, such as finite-element structural analyses and computational fluid dynamics codes, are capable of producing many sensitivity derivatives at a small fraction of the cost of the underlying analysis. This paper describes a simple variance reduction method that exploits such inexpensive sensitivity derivatives to increase the accuracy of sampling methods. Three examples, including a finite-element structural analysis of an aircraft wing, are provided that illustrate an order of magnitude improvement in accuracy for both Monte Carlo and stratified sampling schemes.

  5. Synergy in spreading processes: from exploitative to explorative foraging strategies.

    Science.gov (United States)

    Pérez-Reche, Francisco J; Ludlam, Jonathan J; Taraskin, Sergei N; Gilligan, Christopher A

    2011-05-27

    An epidemiological model which incorporates synergistic effects that allow the infectivity and/or susceptibility of hosts to be dependent on the number of infected neighbors is proposed. Constructive synergy induces an exploitative behavior which results in a rapid invasion that infects a large number of hosts. Interfering synergy leads to a slower and sparser explorative foraging strategy that traverses larger distances by infecting fewer hosts. The model can be mapped to a dynamical bond percolation with spatial correlations that affect the mechanism of spread but do not influence the critical behavior of epidemics. © 2011 American Physical Society

  6. VCSELs and silicon light sources exploiting SOI grating mirrors

    DEFF Research Database (Denmark)

    Chung, Il-Sug; Mørk, Jesper

    2012-01-01

    In this talk, novel vertical-cavity laser structure consisting of a dielectric Bragg reflector, a III-V active region, and a high-index-contrast grating made in the Si layer of a silicon-on-insulator (SOI) wafer will be presented. In the Si light source version of this laser structure, the SOI...... the Bragg reflector. Numerical simulations show that both the silicon light source and the VCSEL exploiting SOI grating mirrors have superior performances, compared to existing silicon light sources and long wavelength VCSELs. These devices are highly adequate for chip-level optical interconnects as well...

  7. Construct exploit constraint in crash analysis by bypassing canary

    Science.gov (United States)

    Huang, Ning; Huang, Shuguang; Huang, Hui; Chang, Chao

    2017-08-01

    Selective symbolic execution is a common program testing technology. Developed on the basis of it, some crash analysis systems are often used to test the fragility of the program by constructing exploit constraints, such as CRAX. From the study of crash analysis based on symbolic execution, this paper find that this technology cannot bypass the canary stack protection mechanisms. This paper makes the improvement uses the API hook in Linux. Experimental results show that the use of API hook can effectively solve the problem that crash analysis cannot bypass the canary protection.

  8. Geothermal exploitation activity by the United Nations in Ethiopia

    Energy Technology Data Exchange (ETDEWEB)

    Nakamura, H. (Geological Survey of Japan)

    1971-01-01

    The Rift Valley in Ethiopia was investigated for geothermal exploitation by the United Nations because it has Quaternary volcanoes which often indicate possible geothermal power generation. Preparations for the project are still being made, and the chemical analysis of hot springs is being conducted. The Rift Valley has high temperature springs and potential mineral deposits. The Danakil basin in Ethiopia which is included in the Northern Afar, has several active volcanoes made up of basalt deposits and has active hot springs. The East Africa Rift Valley, the Red Sea Rift Valley, and the Afar area are also areas suitable for investigation. Seven maps are included.

  9. Cord Blood and Transplants

    Science.gov (United States)

    ... donate their baby’s umbilical cord blood to a public cord blood bank. We have more than 249,000 cord blood ... stored as a cord blood unit at a public cord blood bank for future use. It can then be listed ...

  10. Blood Clotting and Pregnancy

    Medline Plus

    Full Text Available ... with Your Doctor Patient Group Links Advocacy Toolkit Home For Patients Blood Disorders Blood Clots Blood Clotting & Pregnancy If you are pregnant, or you have just had a baby, you are at greater risk of developing a blood clot. Blood clots in pregnant women tend to form in the deep veins of ...

  11. Data adaptive estimation of transversal blood flow velocities

    DEFF Research Database (Denmark)

    Pirnia, E.; Jakobsson, A.; Gudmundson, E.

    2014-01-01

    the transversal blood flow. In this paper, we propose a novel data-adaptive blood flow estimator exploiting this modulation scheme. Using realistic Field II simulations, the proposed estimator is shown to achieve a notable performance improvement as compared to current state-of-the-art techniques.......The examination of blood flow inside the body may yield important information about vascular anomalies, such as possible indications of, for example, stenosis. Current Medical ultrasound systems suffer from only allowing for measuring the blood flow velocity along the direction of irradiation......, posing natural difficulties due to the complex behaviour of blood flow, and due to the natural orientation of most blood vessels. Recently, a transversal modulation scheme was introduced to induce also an oscillation along the transversal direction, thereby allowing for the measurement of also...

  12. Cheating by exploitation of developmental prestalk patterning in Dictyostelium discoideum.

    Directory of Open Access Journals (Sweden)

    Anupama Khare

    2010-02-01

    Full Text Available The cooperative developmental system of the social amoeba Dictyostelium discoideum is susceptible to exploitation by cheaters-strains that make more than their fair share of spores in chimerae. Laboratory screens in Dictyostelium have shown that the genetic potential for facultative cheating is high, and field surveys have shown that cheaters are abundant in nature, but the cheating mechanisms are largely unknown. Here we describe cheater C (chtC, a strong facultative cheater mutant that cheats by affecting prestalk differentiation. The chtC gene is developmentally regulated and its mRNA becomes stalk-enriched at the end of development. chtC mutants are defective in maintaining the prestalk cell fate as some of their prestalk cells transdifferentiate into prespore cells, but that defect does not affect gross developmental morphology or sporulation efficiency. In chimerae between wild-type and chtC mutant cells, the wild-type cells preferentially give rise to prestalk cells, and the chtC mutants increase their representation in the spore mass. Mixing chtC mutants with other cell-type proportioning mutants revealed that the cheating is directly related to the prestalk-differentiation propensity of the victim. These findings illustrate that a cheater can victimize cooperative strains by exploiting an established developmental pathway.

  13. Noise-exploitation and adaptation in neuromorphic sensors

    Science.gov (United States)

    Hindo, Thamira; Chakrabartty, Shantanu

    2012-04-01

    Even though current micro-nano fabrication technology has reached integration levels where ultra-sensitive sensors can be fabricated, the sensing performance (resolution per joule) of synthetic systems are still orders of magnitude inferior to those observed in neurobiology. For example, the filiform hairs in crickets operate at fundamental limits of noise; auditory sensors in a parasitoid fly can overcome fundamental limitations to precisely localize ultra-faint acoustic signatures. Even though many of these biological marvels have served as inspiration for different types of neuromorphic sensors, the main focus these designs have been to faithfully replicate the biological functionalities, without considering the constructive role of "noise". In man-made sensors device and sensor noise are typically considered as a nuisance, where as in neurobiology "noise" has been shown to be a computational aid that enables biology to sense and operate at fundamental limits of energy efficiency and performance. In this paper, we describe some of the important noise-exploitation and adaptation principles observed in neurobiology and how they can be systematically used for designing neuromorphic sensors. Our focus will be on two types of noise-exploitation principles, namely, (a) stochastic resonance; and (b) noise-shaping, which are unified within our previously reported framework called Σ▵ learning. As a case-study, we describe the application of Σ▵ learning for the design of a miniature acoustic source localizer whose performance matches that of its biological counterpart(Ormia Ochracea).

  14. The environmental impacts of foamed concrete production and exploitation

    Science.gov (United States)

    Namsone, E.; Korjakins, A.; Sahmenko, G.; Sinka, M.

    2017-10-01

    This paper presents a study focusing on the environmental impacts of foamed concrete production and exploitation. CO2 emissions are very important factor for describing durability and sustainability of any building material and its life cycle. The building sector is one of the largest energy-consuming sectors in the world. In this study CO2 emissions are evaluated with regard to three types of energy resources (gas, coal and eco-friendly fuel). The related savings on raw materials are up to 120 t of water per 1000 t of traditionally mixed foamed concrete and up to 350 t of sand per 1000 t of foamed concrete produced with intensive mixing technology. In addition, total reduction of CO2 emissions (up to 60 t per 1000 m3 of material) and total energy saving from introduction of foamed concrete production (depending on the type of fuel) were calculated. In order to analyze the conditions of exploitation, both thermal conductivity and thickness of wall was determined. All obtained and calculated results were compared to those of the commercially produced autoclaved aerated concrete.

  15. The exploration-exploitation dilemma: a multidisciplinary framework.

    Directory of Open Access Journals (Sweden)

    Oded Berger-Tal

    Full Text Available The trade-off between the need to obtain new knowledge and the need to use that knowledge to improve performance is one of the most basic trade-offs in nature, and optimal performance usually requires some balance between exploratory and exploitative behaviors. Researchers in many disciplines have been searching for the optimal solution to this dilemma. Here we present a novel model in which the exploration strategy itself is dynamic and varies with time in order to optimize a definite goal, such as the acquisition of energy, money, or prestige. Our model produced four very distinct phases: Knowledge establishment, Knowledge accumulation, Knowledge maintenance, and Knowledge exploitation, giving rise to a multidisciplinary framework that applies equally to humans, animals, and organizations. The framework can be used to explain a multitude of phenomena in various disciplines, such as the movement of animals in novel landscapes, the most efficient resource allocation for a start-up company, or the effects of old age on knowledge acquisition in humans.

  16. The HACMS program: using formal methods to eliminate exploitable bugs.

    Science.gov (United States)

    Fisher, Kathleen; Launchbury, John; Richards, Raymond

    2017-10-13

    For decades, formal methods have offered the promise of verified software that does not have exploitable bugs. Until recently, however, it has not been possible to verify software of sufficient complexity to be useful. Recently, that situation has changed. SeL4 is an open-source operating system microkernel efficient enough to be used in a wide range of practical applications. Its designers proved it to be fully functionally correct, ensuring the absence of buffer overflows, null pointer exceptions, use-after-free errors, etc., and guaranteeing integrity and confidentiality. The CompCert Verifying C Compiler maps source C programs to provably equivalent assembly language, ensuring the absence of exploitable bugs in the compiler. A number of factors have enabled this revolution, including faster processors, increased automation, more extensive infrastructure, specialized logics and the decision to co-develop code and correctness proofs rather than verify existing artefacts. In this paper, we explore the promise and limitations of current formal-methods techniques. We discuss these issues in the context of DARPA's HACMS program, which had as its goal the creation of high-assurance software for vehicles, including quadcopters, helicopters and automobiles.This article is part of the themed issue 'Verified trustworthy software systems'. © 2017 The Authors.

  17. Exploiting Software Tool Towards Easier Use And Higher Efficiency

    Science.gov (United States)

    Lin, G. H.; Su, J. T.; Deng, Y. Y.

    2006-08-01

    In developing countries, using data based on instrument made by themselves in maximum extent is very important. It is not only related to maximizing science returns upon prophase investment -- deep accumulations in every aspects but also science output. Based on the idea, we are exploiting a software (called THDP: Tool of Huairou Data Processing). It is used for processing a series of issues, which is met necessary in processing data. This paper discusses its designed purpose, functions, method and specialities. The primary vehicle for general data interpretation is through various techniques of data visualization, techniques of interactive. In the software, we employed Object Oriented approach. It is appropriate to the vehicle. it is imperative that the approach provide not only function, but do so in as convenient a fashion as possible. As result of the software exploiting, it is not only easier to learn data processing for beginner and more convenienter to need further improvement for senior but also increase greatly efficiency in every phrases include analyse, parameter adjusting, result display. Under frame of virtual observatory, for developing countries, we should study more and newer related technologies, which can advance ability and efficiency in science research, like the software we are developing

  18. User-driven sampling strategies in image exploitation

    Science.gov (United States)

    Harvey, Neal; Porter, Reid

    2013-12-01

    Visual analytics and interactive machine learning both try to leverage the complementary strengths of humans and machines to solve complex data exploitation tasks. These fields overlap most significantly when training is involved: the visualization or machine learning tool improves over time by exploiting observations of the human-computer interaction. This paper focuses on one aspect of the human-computer interaction that we call user-driven sampling strategies. Unlike relevance feedback and active learning sampling strategies, where the computer selects which data to label at each iteration, we investigate situations where the user selects which data is to be labeled at each iteration. User-driven sampling strategies can emerge in many visual analytics applications but they have not been fully developed in machine learning. User-driven sampling strategies suggest new theoretical and practical research questions for both visualization science and machine learning. In this paper we identify and quantify the potential benefits of these strategies in a practical image analysis application. We find user-driven sampling strategies can sometimes provide significant performance gains by steering tools towards local minima that have lower error than tools trained with all of the data. In preliminary experiments we find these performance gains are particularly pronounced when the user is experienced with the tool and application domain.

  19. Exploiting GPUs in Virtual Machine for BioCloud

    Science.gov (United States)

    Jo, Heeseung; Jeong, Jinkyu; Lee, Myoungho; Choi, Dong Hoon

    2013-01-01

    Recently, biological applications start to be reimplemented into the applications which exploit many cores of GPUs for better computation performance. Therefore, by providing virtualized GPUs to VMs in cloud computing environment, many biological applications will willingly move into cloud environment to enhance their computation performance and utilize infinite cloud computing resource while reducing expenses for computations. In this paper, we propose a BioCloud system architecture that enables VMs to use GPUs in cloud environment. Because much of the previous research has focused on the sharing mechanism of GPUs among VMs, they cannot achieve enough performance for biological applications of which computation throughput is more crucial rather than sharing. The proposed system exploits the pass-through mode of PCI express (PCI-E) channel. By making each VM be able to access underlying GPUs directly, applications can show almost the same performance as when those are in native environment. In addition, our scheme multiplexes GPUs by using hot plug-in/out device features of PCI-E channel. By adding or removing GPUs in each VM in on-demand manner, VMs in the same physical host can time-share their GPUs. We implemented the proposed system using the Xen VMM and NVIDIA GPUs and showed that our prototype is highly effective for biological GPU applications in cloud environment. PMID:23710465

  20. An automated data exploitation system for airborne sensors

    Science.gov (United States)

    Chen, Hai-Wen; McGurr, Mike

    2014-06-01

    Advanced wide area persistent surveillance (WAPS) sensor systems on manned or unmanned airborne vehicles are essential for wide-area urban security monitoring in order to protect our people and our warfighter from terrorist attacks. Currently, human (imagery) analysts process huge data collections from full motion video (FMV) for data exploitation and analysis (real-time and forensic), providing slow and inaccurate results. An Automated Data Exploitation System (ADES) is urgently needed. In this paper, we present a recently developed ADES for airborne vehicles under heavy urban background clutter conditions. This system includes four processes: (1) fast image registration, stabilization, and mosaicking; (2) advanced non-linear morphological moving target detection; (3) robust multiple target (vehicles, dismounts, and human) tracking (up to 100 target tracks); and (4) moving or static target/object recognition (super-resolution). Test results with real FMV data indicate that our ADES can reliably detect, track, and recognize multiple vehicles under heavy urban background clutters. Furthermore, our example shows that ADES as a baseline platform can provide capability for vehicle abnormal behavior detection to help imagery analysts quickly trace down potential threats and crimes.

  1. Exploitation of Clustering Techniques in Transactional Healthcare Data

    Directory of Open Access Journals (Sweden)

    Naeem Ahmad Mahoto

    2014-03-01

    Full Text Available Healthcare service centres equipped with electronic health systems have improved their resources as well as treatment processes. The dynamic nature of healthcare data of each individual makes it complex and difficult for physicians to manually mediate them; therefore, automatic techniques are essential to manage the quality and standardization of treatment procedures. Exploratory data analysis, patternanalysis and grouping of data is managed using clustering techniques, which work as an unsupervised classification. A number of healthcare applications are developed that use several data mining techniques for classification, clustering and extracting useful information from healthcare data. The challenging issue in this domain is to select adequate data mining algorithm for optimal results. This paper exploits three different clustering algorithms: DBSCAN (Density-Based Clustering, agglomerative hierarchical and k-means in real transactional healthcare data of diabetic patients (taken as case study to analyse their performance in large and dispersed healthcare data. The best solution of cluster sets among the exploited algorithms is evaluated using clustering quality indexes and is selected to identify the possible subgroups of patients having similar treatment patterns

  2. Exploiting similarity in turbulent shear flows for turbulence modeling

    Science.gov (United States)

    Robinson, David F.; Harris, Julius E.; Hassan, H. A.

    1992-01-01

    It is well known that current k-epsilon models cannot predict the flow over a flat plate and its wake. In an effort to address this issue and other issues associated with turbulence closure, a new approach for turbulence modeling is proposed which exploits similarities in the flow field. Thus, if we consider the flow over a flat plate and its wake, then in addition to taking advantage of the log-law region, we can exploit the fact that the flow becomes self-similar in the far wake. This latter behavior makes it possible to cast the governing equations as a set of total differential equations. Solutions of this set and comparison with measured shear stress and velocity profiles yields the desired set of model constants. Such a set is, in general, different from other sets of model constants. The rational for such an approach is that if we can correctly model the flow over a flat plate and its far wake, then we can have a better chance of predicting the behavior in between. It is to be noted that the approach does not appeal, in any way, to the decay of homogeneous turbulence. This is because the asymptotic behavior of the flow under consideration is not representative of the decay of homogeneous turbulence.

  3. JPEG2000-coded image error concealment exploiting convex sets projections.

    Science.gov (United States)

    Atzori, Luigi; Ginesu, Giaime; Raccis, Alessio

    2005-04-01

    Transmission errors in JPEG2000 can be grouped into three main classes, depending on the affected area: LL, high frequencies at the lower decomposition levels, and high frequencies at the higher decomposition levels. The first type of errors are the most annoying but can be concealed exploiting the signal spatial correlation like in a number of techniques proposed in the past; the second are less annoying but more difficult to address; the latter are often imperceptible. In this paper, we address the problem of concealing the second class or errors when high bit-planes are damaged by proposing a new approach based on the theory of projections onto convex sets. Accordingly, the error effects are masked by iteratively applying two procedures: low-pass (LP) filtering in the spatial domain and restoration of the uncorrupted wavelet coefficients in the transform domain. It has been observed that a uniform LP filtering brought to some undesired side effects that negatively compensated the advantages. This problem has been overcome by applying an adaptive solution, which exploits an edge map to choose the optimal filter mask size. Simulation results demonstrated the efficiency of the proposed approach.

  4. Exploiting similarity in turbulent shear flows for turbulence modeling

    Science.gov (United States)

    Robinson, David F.; Harris, Julius E.; Hassan, H. A.

    1992-12-01

    It is well known that current k-epsilon models cannot predict the flow over a flat plate and its wake. In an effort to address this issue and other issues associated with turbulence closure, a new approach for turbulence modeling is proposed which exploits similarities in the flow field. Thus, if we consider the flow over a flat plate and its wake, then in addition to taking advantage of the log-law region, we can exploit the fact that the flow becomes self-similar in the far wake. This latter behavior makes it possible to cast the governing equations as a set of total differential equations. Solutions of this set and comparison with measured shear stress and velocity profiles yields the desired set of model constants. Such a set is, in general, different from other sets of model constants. The rational for such an approach is that if we can correctly model the flow over a flat plate and its far wake, then we can have a better chance of predicting the behavior in between. It is to be noted that the approach does not appeal, in any way, to the decay of homogeneous turbulence. This is because the asymptotic behavior of the flow under consideration is not representative of the decay of homogeneous turbulence.

  5. Exploitation of puddles for breakthroughs in claustrum research

    Directory of Open Access Journals (Sweden)

    John Irwin Johnson

    2014-05-01

    Full Text Available Since its first identification as a thin strip of gray matter enclosed between stretches of neighboring fiber bundles, the claustrum has been considered impossible to study by many modern techniques that need a certain roominess of tissue for their application. The claustrum was known as the front wall, vormauren in German from 1822, and is still called avant-mur in French. We here propose a means for breaking into and through this wall, by utilizing the instances where the claustral tissue itself has broken free into more spacious dimensions. This has occurred several times in the evolution of modern mammals, and all that needs be done is to exploit these natural expansions in order to take advantage of a great panoply of technological advances now at our disposal. So here we review the kinds of breakout puddles that await productive exploitation, to bring our knowledge of structure and function up to the level enjoyed for other more accessible regions of the brain..

  6. Activity-based exploitation of Full Motion Video (FMV)

    Science.gov (United States)

    Kant, Shashi

    2012-06-01

    Video has been a game-changer in how US forces are able to find, track and defeat its adversaries. With millions of minutes of video being generated from an increasing number of sensor platforms, the DOD has stated that the rapid increase in video is overwhelming their analysts. The manpower required to view and garner useable information from the flood of video is unaffordable, especially in light of current fiscal restraints. "Search" within full-motion video has traditionally relied on human tagging of content, and video metadata, to provision filtering and locate segments of interest, in the context of analyst query. Our approach utilizes a novel machine-vision based approach to index FMV, using object recognition & tracking, events and activities detection. This approach enables FMV exploitation in real-time, as well as a forensic look-back within archives. This approach can help get the most information out of video sensor collection, help focus the attention of overburdened analysts form connections in activity over time and conserve national fiscal resources in exploiting FMV.

  7. Exploiting GPUs in Virtual Machine for BioCloud

    Directory of Open Access Journals (Sweden)

    Heeseung Jo

    2013-01-01

    Full Text Available Recently, biological applications start to be reimplemented into the applications which exploit many cores of GPUs for better computation performance. Therefore, by providing virtualized GPUs to VMs in cloud computing environment, many biological applications will willingly move into cloud environment to enhance their computation performance and utilize infinite cloud computing resource while reducing expenses for computations. In this paper, we propose a BioCloud system architecture that enables VMs to use GPUs in cloud environment. Because much of the previous research has focused on the sharing mechanism of GPUs among VMs, they cannot achieve enough performance for biological applications of which computation throughput is more crucial rather than sharing. The proposed system exploits the pass-through mode of PCI express (PCI-E channel. By making each VM be able to access underlying GPUs directly, applications can show almost the same performance as when those are in native environment. In addition, our scheme multiplexes GPUs by using hot plug-in/out device features of PCI-E channel. By adding or removing GPUs in each VM in on-demand manner, VMs in the same physical host can time-share their GPUs. We implemented the proposed system using the Xen VMM and NVIDIA GPUs and showed that our prototype is highly effective for biological GPU applications in cloud environment.

  8. Exploiting first-class arrays in Fortran for accelerator programming

    International Nuclear Information System (INIS)

    Rasmussen, Craig E.; Weseloh, Wayne N.; Robey, Robert W.; Sottile, Matthew J.; Quinlan, Daniel; Overbey, Jeffrey

    2010-01-01

    Emerging architectures for high performance computing often are well suited to a data parallel programming model. This paper presents a simple programming methodology based on existing languages and compiler tools that allows programmers to take advantage of these systems. We will work with the array features of Fortran 90 to show how this infrequently exploited, standardized language feature is easily transformed to lower level accelerator code. Our transformations are based on a mapping from Fortran 90 to C++ code with OpenCL extensions. The sheer complexity of programming for clusters of many or multi-core processors with tens of millions threads of execution make the simplicity of the data parallel model attractive. Furthermore, the increasing complexity of todays applications (especially when convolved with the increasing complexity of the hardware) and the need for portability across hardware architectures make a higher-level and simpler programming model like data parallel attractive. The goal of this work has been to exploit source-to-source transformations that allow programmers to develop and maintain programs at a high-level of abstraction, without coding to a specific hardware architecture. Furthermore these transformations allow multiple hardware architectures to be targeted without changing the high-level source. It also removes the necessity for application programmers to understand details of the accelerator architecture or to know OpenCL.

  9. Human trafficking for labour exploitation:
    Interpreting the crime

    Directory of Open Access Journals (Sweden)

    Jill E.B. Coster van Voorhout

    2007-12-01

    Full Text Available The definition of human trafficking for labour exploitation, as follows from the European Council Framework Decision, proves to be unclear. Literal interpretation does not suffice, because it does not clarify all elements of what is deemed to be criminal behaviour, and hermeneutical interpretation also falls short discouraging the aim of this legislation, namely harmonisation. Hence, another solution is required. This article does so by firstly challenging assumptions about human trafficking for labour exploitation that are generally pertinent, but nonetheless untrue. This accurate appraisal of the crime’s nature is followed by a synopsis of national legislation and adjudication in three Member States, so as to also focus on these actualities regarding the crime that are commonly not conceived. This article examines two countries that have implemented the Framework Decision, namely Belgium and the Netherlands, and one that has not yet done so, the United Kingdom. Thereafter remaining unexplained elements of the Framework Decision’s definition are interpreted with use of international, pan-European and European legislation and adjudication. Based upon all this, a suggested interpretation of the Framework Decision’s definition is provided so as to overcome all identified difficulties with it.

  10. Film-induced, steps for a Real Exploitation in Europe

    Directory of Open Access Journals (Sweden)

    Francesco di Cesare

    2015-03-01

    Full Text Available One of the possible ways to enhance Europe visibility, its entirety rather than a set of destinations, is implementing cooperation between the Member States especially in creating and developing trans-border thematic tourist products and experiences. One of them could be the film-induced tourism. In looking back over the past two cycles of European programming it is possible to find some examples, described in the article, in which the theme of audiovisual productions in their shooting phase in European locations has been the subject of EU attention.This article refers to some previous research results reminding how movie-induced tourism seems to be used just through sporadic attempts and therefore not developed and exploited in a strategic way. Whether from demand-side is clear what potential is inherent in the relationship between movie and tourism, on the supply side there is still much to do.As the current EC funding period (2014-2020 is favouring, at least in the first calls for proposal that came out, SMEs projects and being aware of the apparent lack of such activities developed by private businesses, the article explores new opportunities to be gathered suggesting a new exploitation path.

  11. Cheating by Exploitation of Developmental Prestalk Patterning in Dictyostelium discoideum

    Science.gov (United States)

    Khare, Anupama; Shaulsky, Gad

    2010-01-01

    The cooperative developmental system of the social amoeba Dictyostelium discoideum is susceptible to exploitation by cheaters—strains that make more than their fair share of spores in chimerae. Laboratory screens in Dictyostelium have shown that the genetic potential for facultative cheating is high, and field surveys have shown that cheaters are abundant in nature, but the cheating mechanisms are largely unknown. Here we describe cheater C (chtC), a strong facultative cheater mutant that cheats by affecting prestalk differentiation. The chtC gene is developmentally regulated and its mRNA becomes stalk-enriched at the end of development. chtC mutants are defective in maintaining the prestalk cell fate as some of their prestalk cells transdifferentiate into prespore cells, but that defect does not affect gross developmental morphology or sporulation efficiency. In chimerae between wild-type and chtC mutant cells, the wild-type cells preferentially give rise to prestalk cells, and the chtC mutants increase their representation in the spore mass. Mixing chtC mutants with other cell-type proportioning mutants revealed that the cheating is directly related to the prestalk-differentiation propensity of the victim. These findings illustrate that a cheater can victimize cooperative strains by exploiting an established developmental pathway. PMID:20195510

  12. Indirect evolution of social fitness inequalities and facultative social exploitation.

    Science.gov (United States)

    Nair, Ramith R; Fiegna, Francesca; Velicer, Gregory J

    2018-03-28

    Microbial genotypes with similarly high proficiency at a cooperative behaviour in genetically pure groups often exhibit fitness inequalities caused by social interaction in mixed groups. Winning competitors in this scenario have been referred to as 'cheaters' in some studies. Such interaction-specific fitness inequalities, as well as social exploitation (in which interaction between genotypes increases absolute fitness), might evolve due to selection for competitiveness at the focal behaviour or might arise non-adaptively due to pleiotropy, hitchhiking or genetic drift. The bacterium Myxococcus xanthus sporulates during cooperative development of multicellular fruiting bodies. Using M. xanthus lineages that underwent experimental evolution in allopatry without selection on sporulation, we demonstrate that interaction-specific fitness inequalities and facultative social exploitation during development readily evolved indirectly among descendant lineages. Fitness inequalities between evolved genotypes were not caused by divergence in developmental speed, as faster-developing strains were not over-represented among competition winners. In competitions between ancestors and several evolved strains, all evolved genotypes produced more spores than the ancestors, including losers of evolved-versus-evolved competitions, indicating that adaptation in non-developmental contexts pleiotropically increased competitiveness for spore production. Overall, our results suggest that fitness inequalities caused by social interaction during cooperative processes may often evolve non-adaptively in natural populations. © 2018 The Authors.

  13. Gas exploitation and gas conversion; Gassutnyttelse og gasskonvertering

    Energy Technology Data Exchange (ETDEWEB)

    Laading, Gjert

    1998-07-01

    This presentation deals with some of the challenges and possibilities connected with ''stranded'' gas. These are offshore gas reserves, especially associated gas, that is not connected with the market and that cannot be piped onshore, and where reinjection is not profitable, and where flaring off is not an option. There is increasing interest all over the world to find economical and environmentally friendly solutions to this problem. A good solution will render such fields economically developable and will to a high degree increase the total volume of the world's exploitable gas reserves. Since synthesis gas is a dominating cost element in most chemical conversion processes for gas, the synthesis gases are discussed in some detail. There is also a discussion of the conversion of the gas to Methanol, Synthetic oil (Syncrude and Synfuels) and to DME (Di-methyl-ether). Two methods for gas transport from the field are discussed; LNG on floating production storage and off loading (FPSO), and Gas hydrates. Principles, limitations and conditions for placing those processes on a FPSO. Finally, the presentation discusses the most important economic factors related to the exploitation of offshore gas, and suggests some possibilities for future development.11 figs.

  14. Exploiting the Dynamics of Soft Materials for Machine Learning.

    Science.gov (United States)

    Nakajima, Kohei; Hauser, Helmut; Li, Tao; Pfeifer, Rolf

    2018-06-01

    Soft materials are increasingly utilized for various purposes in many engineering applications. These materials have been shown to perform a number of functions that were previously difficult to implement using rigid materials. Here, we argue that the diverse dynamics generated by actuating soft materials can be effectively used for machine learning purposes. This is demonstrated using a soft silicone arm through a technique of multiplexing, which enables the rich transient dynamics of the soft materials to be fully exploited as a computational resource. The computational performance of the soft silicone arm is examined through two standard benchmark tasks. Results show that the soft arm compares well to or even outperforms conventional machine learning techniques under multiple conditions. We then demonstrate that this system can be used for the sensory time series prediction problem for the soft arm itself, which suggests its immediate applicability to a real-world machine learning problem. Our approach, on the one hand, represents a radical departure from traditional computational methods, whereas on the other hand, it fits nicely into a more general perspective of computation by way of exploiting the properties of physical materials in the real world.

  15. Exploitation of the in-seam miner and operational experience

    Energy Technology Data Exchange (ETDEWEB)

    Wilson, W I.S.; Morris, A H

    1977-12-01

    The In-seam Miner started as an investigatory project at MRDE in 1969. Since that time it has passed through the classic development stages of design of prototype, surface trials, underground trials, modification, production of more machines, assessment of experience and then wider exploitation. At the present time well over 100 machines have been supplied to the National Coal Board. The original machine was hydraulically driven and all but five of the machines supplied to date are of this type. The variety of applications that the machine has found in the mining industry has caused derivative development to embrace machines of length varying from 12-ft centers to 44-ft centers, to work in seams ranging from 40 in. up to 68 in. The range of applications has included face drivages, stablehole operations, in-seam retreat roadways and dirt-absorbing headings. Five electrically driven machines are now coming onto the market and experience with them, though limited, is very encouraging. The paper concentrates on two major aspects of the overall development process: first, the management of exploitation; and second, some operational experience of the In-seam Miner in South Midlands area.

  16. Self-report measure of financial exploitation of older adults.

    Science.gov (United States)

    Conrad, Kendon J; Iris, Madelyn; Ridings, John W; Langley, Kate; Wilber, Kathleen H

    2010-12-01

    this study was designed to improve the measurement of financial exploitation (FE) by testing psychometric properties of the older adult financial exploitation measure (OAFEM), a client self-report instrument. rasch item response theory and traditional validation approaches were used. Questionnaires were administered by 22 adult protective services investigators from 7 agencies in Illinois to 227 substantiated abuse clients. Analyses included tests for dimensionality, model fit, and additional construct validation. Results from the OAFEM were also compared with the substantiation decision of abuse and with investigators' assessments of FE using a staff report version. Hypotheses were generated to test hypothesized relationships. the OAFEM, including the original 79-, 54-, and 30-item measures, met stringent Rasch analysis fit and unidimensionality criteria and had high internal consistency and item reliability. The validation results were supportive, while leading to reconsideration of aspects of the hypothesized theoretical hierarchy. Thresholds were suggested to demonstrate levels of severity. the measure is now available to aid in the assessment of FE of older adults by both clinicians and researchers. Theoretical refinements developed using the empirically generated item hierarchy may help to improve assessment and intervention.

  17. Exploiting GPUs in virtual machine for BioCloud.

    Science.gov (United States)

    Jo, Heeseung; Jeong, Jinkyu; Lee, Myoungho; Choi, Dong Hoon

    2013-01-01

    Recently, biological applications start to be reimplemented into the applications which exploit many cores of GPUs for better computation performance. Therefore, by providing virtualized GPUs to VMs in cloud computing environment, many biological applications will willingly move into cloud environment to enhance their computation performance and utilize infinite cloud computing resource while reducing expenses for computations. In this paper, we propose a BioCloud system architecture that enables VMs to use GPUs in cloud environment. Because much of the previous research has focused on the sharing mechanism of GPUs among VMs, they cannot achieve enough performance for biological applications of which computation throughput is more crucial rather than sharing. The proposed system exploits the pass-through mode of PCI express (PCI-E) channel. By making each VM be able to access underlying GPUs directly, applications can show almost the same performance as when those are in native environment. In addition, our scheme multiplexes GPUs by using hot plug-in/out device features of PCI-E channel. By adding or removing GPUs in each VM in on-demand manner, VMs in the same physical host can time-share their GPUs. We implemented the proposed system using the Xen VMM and NVIDIA GPUs and showed that our prototype is highly effective for biological GPU applications in cloud environment.

  18. The HACMS program: using formal methods to eliminate exploitable bugs

    Science.gov (United States)

    Launchbury, John; Richards, Raymond

    2017-01-01

    For decades, formal methods have offered the promise of verified software that does not have exploitable bugs. Until recently, however, it has not been possible to verify software of sufficient complexity to be useful. Recently, that situation has changed. SeL4 is an open-source operating system microkernel efficient enough to be used in a wide range of practical applications. Its designers proved it to be fully functionally correct, ensuring the absence of buffer overflows, null pointer exceptions, use-after-free errors, etc., and guaranteeing integrity and confidentiality. The CompCert Verifying C Compiler maps source C programs to provably equivalent assembly language, ensuring the absence of exploitable bugs in the compiler. A number of factors have enabled this revolution, including faster processors, increased automation, more extensive infrastructure, specialized logics and the decision to co-develop code and correctness proofs rather than verify existing artefacts. In this paper, we explore the promise and limitations of current formal-methods techniques. We discuss these issues in the context of DARPA’s HACMS program, which had as its goal the creation of high-assurance software for vehicles, including quadcopters, helicopters and automobiles. This article is part of the themed issue ‘Verified trustworthy software systems’. PMID:28871050

  19. The Potential Socio-economic Impacts of Gas Hydrate Exploitation

    Science.gov (United States)

    Riley, David; Schaafsma, Marije; Marin-Moreno, Héctor; Minshull, Tim A.

    2017-04-01

    Gas hydrate has garnered significant interest as a possible clean fossil fuel resource, especially in countries with limited energy supplies. Whilst the sector is still in its infancy, there has been escalating development towards commercial production. To the best of our knowledge it appears that, despite its potential, existing analyses of the social and economic impacts of hydrate exploitation have been very limited. Before any viable commercial production commences, the potential impacts across society must be considered. It is likely that such impact assessments will become a legislative requirement for hydrate exploitation, similar to their requirement in conventional oil and gas projects. Social impact analysis should guide hydrate development to have the highest possible net benefits to the human and natural environment. Without active commercial hydrate operations, potential socio-economic impacts can only be inferred from other fossil fuel resource focused communities, including those directly or indirectly affected by the oil and gas industry either in the vicinity of the well or further afield. This review attempts to highlight potential impacts by synthesising current literature, focusing on social impacts at the extraction stage of operation, over time. Using a DPSIR (Driving forces; Pressures; States; Impacts; Responses) framework, we focus on impacts upon: health and wellbeing, land use and access, services and infrastructure, population, employment opportunities, income and lifestyles. Human populations directly or indirectly related with fossil fuel extraction activities often show boom and bust dynamics, and so any impacts may be finite or change temporally. Therefore potential impacts have to be reassessed throughout the lifetime of the exploitation. Our review shows there are a wide range of possible positive and negative socio-economic impacts from hydrate development. Exploitation can bring jobs and infrastructure to remote areas, although

  20. Hyperglycemia (High Blood Glucose)

    Medline Plus

    Full Text Available ... symptoms include the following: High blood glucose High levels of sugar in the urine Frequent urination Increased ... you should check and what your blood glucose levels should be. Checking your blood and then treating ...

  1. Blood in Semen

    Science.gov (United States)

    Symptoms Blood in semen By Mayo Clinic Staff Blood in semen (hematospermia) can be frightening, but the cause of this uncommon condition is usually benign. Typically, blood in semen goes away on its own. If you're ...

  2. Blood in the semen

    Science.gov (United States)

    Semen - bloody; Blood in ejaculation ... Most of the time, blood in the semen is caused by swelling or infection of the prostate or seminal vesicles. The problem may occur after a prostate biopsy . Blood in the ...

  3. Hyperglycemia (High Blood Glucose)

    Medline Plus

    Full Text Available ... can often lower your blood glucose level by exercising. However, if your blood glucose is above 240 ... ketones. If you have ketones, do not exercise. Exercising when ketones are present may make your blood ...

  4. Blood Type Puzzle.

    Science.gov (United States)

    Kelly, Janet

    1997-01-01

    Presents a blood type puzzle that provides a visual, hands-on mechanism by which students can examine blood group reactions. Offers students an opportunity to construct their own knowledge about blood types. (JRH)

  5. Blood Clotting and Pregnancy

    Medline Plus

    Full Text Available ... these blood conditions and increase research on the causes, prevention, and treatment. Blood clots are also potentially ... Increased maternal age Other medical illness (e.g., cancer, infection) back to top How are Blood Clots ...

  6. Blood Clotting and Pregnancy

    Medline Plus

    Full Text Available ... If you find that you are interested in learning more about blood diseases and disorders, here are ... article in Blood may obtain a copy by e-mailing a request to the Blood Publishing Office . ...

  7. Home blood sugar testing

    Science.gov (United States)

    Diabetes - home glucose testing; Diabetes - home blood sugar testing ... Usual times to test your blood sugar are before meals and at bedtime. Your provider may ask you to check your blood sugar 2 hours after a meal or ...

  8. Blood and Diversity

    Science.gov (United States)

    ... Drive Biomedical Services Hospital Partners Blood Products Blood Banking Resources Order Blood Products Invoice Central Case Reports ... app (over 1 million downloads and counting!) and online scheduler make it quick to set up your ...

  9. Blood Clotting and Pregnancy

    Medline Plus

    Full Text Available ... that may be of some help: Results of Clinical Studies Published in Blood Search Blood , the official journal of ASH, for the results of the latest blood research. While recent articles generally require a subscriber login, ...

  10. Blood Transfusion and Donation

    Science.gov (United States)

    ... people in the United States receive life-saving blood transfusions. During a transfusion, you receive whole blood or ... have liver failure or a severe infection. Most blood transfusions go very smoothly. Some infectious agents, such as ...

  11. Hyperglycemia (High Blood Glucose)

    Medline Plus

    Full Text Available ... Español Hyperglycemia (High Blood Glucose) Hyperglycemia is the technical term for high blood glucose (blood sugar). High ... We Are Research Leaders We Support Your Doctor Student Resources Patient Access to Research Research Resources Practice ...

  12. Hyperglycemia (High Blood Glucose)

    Medline Plus

    Full Text Available ... Blood Pressure Physical Activity High Blood Glucose My Health Advisor Tools To Know Your Risk Alert Day ... DKA (Ketoacidosis) & Ketones Kidney Disease (Nephropathy) Gastroparesis Mental Health Step On Up Treatment & Care Blood Glucose Testing ...

  13. Blood Clotting and Pregnancy

    Medline Plus

    Full Text Available ... of articles from the 2017 ASH Annual Meeting Education Program Blood: How I Treat A compendium of Blood articles ... Pregnancy Clots and Travel DVT Myths vs. Facts Blood Disorder Fact Sheets ...

  14. Types of Blood Donations

    Science.gov (United States)

    ... Red Cell Plasma Platelets Red Cells What blood donation type is best for me? **If you do ... type, a whole blood donation is recommended** Blood Donation Types: Volunteer Donations The standard or most common ...

  15. Hyperglycemia (High Blood Glucose)

    Medline Plus

    Full Text Available ... Your Carbs Count Glycemic Index Low-Calorie Sweeteners Sugar and Desserts Fitness Exercise & Type 1 Diabetes Get ... the technical term for high blood glucose (blood sugar). High blood glucose happens when the body has ...

  16. Gastrin blood test

    Science.gov (United States)

    Peptic ulcer - gastrin blood test ... A blood sample is needed . ... in the stomach, gastrin is released into the blood. As the acid ... provider may order this test if you have signs or symptoms of a ...

  17. Catecholamine blood test

    Science.gov (United States)

    ... page: //medlineplus.gov/ency/article/003561.htm Catecholamine blood test To use the sharing features on this page, ... measured with a urine test than with a blood test. How the Test is Performed A blood sample ...

  18. Phosphorus blood test

    Science.gov (United States)

    ... page: //medlineplus.gov/ency/article/003478.htm Phosphorus blood test To use the sharing features on this page, please enable JavaScript. The phosphorus blood test measures the amount of phosphate in the blood. ...

  19. Calcium blood test

    Science.gov (United States)

    ... page: //medlineplus.gov/ency/article/003477.htm Calcium blood test To use the sharing features on this page, please enable JavaScript. The calcium blood test measures the level of calcium in the blood. ...

  20. Renin blood test

    Science.gov (United States)

    ... page: //medlineplus.gov/ency/article/003698.htm Renin blood test To use the sharing features on this page, ... renin test measures the level of renin in blood. How the Test is Performed A blood sample is needed . How ...

  1. Prolactin blood test

    Science.gov (United States)

    ... page: //medlineplus.gov/ency/article/003718.htm Prolactin blood test To use the sharing features on this page, ... test measures the amount of prolactin in the blood. How the Test is Performed A blood sample is needed . How ...

  2. Pyruvate kinase blood test

    Science.gov (United States)

    ... medlineplus.gov/ency/article/003357.htm Pyruvate kinase blood test To use the sharing features on this page, ... energy when oxygen levels are low. How the Test is Performed A blood sample is needed. In the laboratory, white blood ...

  3. Ammonia blood test

    Science.gov (United States)

    ... page: //medlineplus.gov/ency/article/003506.htm Ammonia blood test To use the sharing features on this page, ... Encephalopathy - ammonia; Cirrhosis - ammonia; Liver failure - ammonia Images Blood test References Chernecky CC, Berger BJ. Ammonia (NH3) - blood ...

  4. Antithrombin III blood test

    Science.gov (United States)

    ... medlineplus.gov/ency/article/003661.htm Antithrombin III blood test To use the sharing features on this page, ... a protein that helps control blood clotting. A blood test can determine the amount of AT III present ...

  5. Fibrinopeptide A blood test

    Science.gov (United States)

    ... medlineplus.gov/ency/article/003373.htm Fibrinopeptide A blood test To use the sharing features on this page, ... measure the level of this substance in your blood. How the Test is Performed A blood sample is needed. How ...

  6. Cord blood testing

    Science.gov (United States)

    ... Blood culture (if an infection is suspected) Blood gases (including oxygen, carbon dioxide, and pH levels) Blood ... 2018, A.D.A.M., Inc. Duplication for commercial use must be authorized in writing by ADAM ...

  7. Ketones blood test

    Science.gov (United States)

    Acetone bodies; Ketones - serum; Nitroprusside test; Ketone bodies - serum; Ketones - blood; Ketoacidosis - ketones blood test ... fat cells break down in the blood. This test is used to diagnose ketoacidosis . This is a ...

  8. Myoglobin blood test

    Science.gov (United States)

    Serum myoglobin; Heart attack - myoglobin blood test; Myositis - myoglobin blood test; Rhabdomyolysis - myoglobin blood test ... too high, it can damage the kidneys. This test is ordered when your health care provider suspects ...

  9. Blood Clotting and Pregnancy

    Medline Plus

    Full Text Available ... may be of some help: Results of Clinical Studies Published in Blood Search Blood , the official journal of ASH, for the results of the latest blood research. While recent articles generally require a subscriber login, ...

  10. Blood Clotting and Pregnancy

    Medline Plus

    Full Text Available ... back to top How are Blood Clots in Pregnant Women Treated? Typically, blood clots are treated with ... you think you have one. If you are pregnant and have concerns about blood clots, talk with ...

  11. Blood Clotting and Pregnancy

    Medline Plus

    Full Text Available ... blood clots are treated with an anticoagulant, a medicine that prevents the blood from clotting. Certain anticoagulants are safe to use during pregnancy. back to top Are Blood Clots Preventable? There ...

  12. Blood Clotting and Pregnancy

    Medline Plus

    Full Text Available ... clot. Blood clots in pregnant women tend to form in the deep veins of the legs or ... potentially dangerous to your baby. Blood clots can form inside the placenta, cutting off blood flow and ...

  13. Blood Clotting and Pregnancy

    Medline Plus

    Full Text Available ... resource to help stay current with the latest advances in the field Hematology 2017 A collection of articles ... Disorders Blood Cancers Blood Clots Blood Clotting and Pregnancy Clots and ...

  14. Symptoms of Blood Disorders

    Science.gov (United States)

    ... or immune system proteins can cause increased blood viscosity (thickening of the blood). Increased platelets or blood ... by anemia Pica (eating of ice, dirt, or clay) suggests iron deficiency anemia Drugs Mentioned In This ...

  15. High Blood Pressure

    Science.gov (United States)

    ... normal blood pressure 140/90 or higher is high blood pressure Between 120 and 139 for the top number, ... prehypertension. Prehypertension means you may end up with high blood pressure, unless you take steps to prevent it. High ...

  16. High Blood Pressure Facts

    Science.gov (United States)

    ... Stroke Heart Disease Cholesterol Salt Million Hearts® WISEWOMAN High Blood Pressure Facts Recommend on Facebook Tweet Share Compartir On ... Top of Page CDC Fact Sheets Related to High Blood Pressure High Blood Pressure Pulmonary Hypertension Heart Disease Signs ...

  17. High Blood Pressure (Hypertension)

    Science.gov (United States)

    ... Print Page Text Size: A A A Listen High Blood Pressure (Hypertension) Nearly 1 in 3 American adults has ... weight. How Will I Know if I Have High Blood Pressure? High blood pressure is a silent problem — you ...

  18. Blood Clotting and Pregnancy

    Medline Plus

    Full Text Available ... to Action on DVT and PE to raise public awareness of these blood conditions and increase research ... may be of some help: Results of Clinical Studies Published in Blood Search Blood , the official journal ...

  19. Ambidextrous Organizations: A Multiple-Level Study of Absorptive Capacity, Exploratory and Exploitative Innovation and Performance

    NARCIS (Netherlands)

    J.J.P. Jansen (Justin)

    2005-01-01

    textabstractBalancing and synchronizing exploration and exploitation is fundamental to the competitive success of firms in dynamic environments. Despite the importance of reconciling exploration and exploitation within organizations, however, relatively little empirical research has examined this

  20. Complete Blood Count (For Parents)

    Science.gov (United States)

    ... Kids Deal With Injections and Blood Tests Blood Culture Anemia Blood Test: Basic Metabolic Panel (BMP) Blood Test: Hemoglobin Basic Blood Chemistry Tests Word! Complete Blood Count (CBC) Medical Tests and Procedures ( ...

  1. Water Exploitation and Its Outcomes Caused by Capitalism as Reflected on Gore Verbinski's Rango Movie

    OpenAIRE

    SETIAWAN, DANIEL NUGRAHA

    2014-01-01

    Nugraha Setiawan, Daniel. 2014. Water Exploitation and Its Outcome Caused byCapitalism as Reflected on Gore Verbinski's Rango Movie. Study Program ofEnglish, Universitas Brawijaya.Supervisor: Yusri Fajar, Co-supervisor: Melania Shinta Harendika.Keywords: water exploitation, environment, capitalism, Rango movie. Water exploitation threats ecosystem and causes a great damage to environment. One of the causes of the water exploitation is capitalism. The movie entitled Rango reveals some causes a...

  2. Blood Clotting and Pregnancy

    Medline Plus

    Full Text Available ... Workshop on Genome Editing Publications Blood Blood Advances The Hematologist ASH Clinical News ... Society of Hematology Support Opportunities | Privacy Policy | Terms of Service | Contact Us

  3. Child Sexual Abuse and Exploitation: Guest Editor’s Introduction

    Directory of Open Access Journals (Sweden)

    Michael Salter

    2015-07-01

    Full Text Available One of the most unnerving aspects of child sexual abuse is that it is constantly manifesting in unexpected ways. The current Royal Commission into Institutional Responses to Child Sexual Abuse has collected testimony of abuse in churches, schools, out-of-home care, hospitals and religious communities, demonstrating the breadth of institutional arrangements whose structures and cultures have facilitated child sexual abuse. Cases of serious and prolonged sexual abuse in family contexts have been excluded from the terms of reference of the Royal Commission but nonetheless continue to surface in media reports. In 2013, twelve children were permanently removed from an extended family living in rural NSW in what has been described as one of the worst cases of child abuse in Australia, involving intergenerational incest going back at least three generations (Auebach 2014. Another recent high-profile case involved the use of the Internet to facilitate the sexual exploitation of an adopted child by his parents in Queensland (Ralston 2013. These cases challenge the received wisdom that child sexual abuse is characterised by the victimisation of one child by one opportunistic offender. Such incidents suggest instead that child sexual abuse takes varied and systemic forms, and can operate to perpetuate and entrench toxic cultures and power structures.   This special issue on Child Sexual Abuse and Exploitation is a timely contribution to ongoing efforts to understand the multiplicity of child sexual abuse. It is an interdisciplinary collection of insights drawn from criminology, sociology, psychiatry, psychology and psychoanalysis, and includes papers from academic researchers alongside academic practitioners whose writing is grounded in their work with affected individuals and communities. A key aim of the special issue is to contextualise the diversity of child sexual abuse socially, politically and historically, recognising the dynamic and iterative

  4. Shale Gas Exploration and Exploitation Induced Risks - SHEER

    Science.gov (United States)

    Capuano, Paolo; Orlecka-Sikora, Beata; Lasocki, Stanislaw; Cesca, Simone; Gunning, Andrew; jaroslawsky, Janusz; Garcia-Aristizabal, Alexander; Westwood, Rachel; Gasparini, Paolo

    2017-04-01

    Shale gas operations may affect the quality of air, water and landscapes; furthermore, it can induce seismic activity, with the possible impacts on the surrounding infrastructure. The SHEER project aims at setting up a probabilistic methodology to assess and mitigate the short and the long term environmental risks connected to the exploration and exploitation of shale gas. In particular we are investigating risks associated with groundwater contamination, air pollution and induced seismicity. A shale gas test site located in Poland (Wysin) has been monitored before, during and after the fracking operations with the aim of assessing environmental risks connected with groundwater contamination, air pollution and earthquakes induced by fracking and injection of waste water. The severity of each of these hazards depends strongly on the unexpected enhanced permeability pattern, which may develop as an unwanted by-product of the fracking processes and may become pathway for gas and fluid migration towards underground water reservoirs or the surface. The project is devoted to monitor and understand how far this enhanced permeability pattern develops both in space and time. The considered hazards may be at least partially inter-related as they all depend on this enhanced permeability pattern. Therefore they are being approached from a multi-hazard, multi parameter perspective. We expect to develop methodologies and procedures to track and model fracture evolution around shale gas exploitation sites and a robust statistically based, multi-parameter methodology to assess environmental impacts and risks across the operational lifecycle of shale gas. The developed methodologies are going to be applied and tested on a comprehensive database consisting of seismicity, changes of the quality of ground-waters and air, ground deformations, and operational data collected from the ongoing monitoring episode (Wysin) and past episodes: Lubocino (Poland), Preese Hall (UK), Oklahoma (USA

  5. The exploitation of living resources in the Dutch Wadden Sea : a historical overview

    NARCIS (Netherlands)

    Wolff, W J

    An overview, based on written sources and personal observations, is presented of exploitation of living resources in and around the Dutch Wadden Sea during the past few centuries. It is concluded that before about 1900 exploitation was almost unrestricted. Exploitation of plants has been documented

  6. 25 CFR 20.516 - How are child abuse, neglect or exploitation cases to be handled?

    Science.gov (United States)

    2010-04-01

    ... 25 Indians 1 2010-04-01 2010-04-01 false How are child abuse, neglect or exploitation cases to be... FINANCIAL ASSISTANCE AND SOCIAL SERVICES PROGRAMS Child Assistance Foster Care § 20.516 How are child abuse, neglect or exploitation cases to be handled? Reported child abuse, neglect or exploitation cases and the...

  7. Precautions and Adverse Reactions during Blood Transfusion

    Science.gov (United States)

    ... the Professional Version Blood Transfusion Overview of Blood Transfusion Blood Donation Process Blood Products Special Blood Donation Procedures ... CORTEF, SOLU-CORTEF Blood Transfusion Overview of Blood Transfusion Blood Donation Process Blood Products Special Blood Donation Procedures ...

  8. The strategic and economic value of exploiting heavy crude

    International Nuclear Information System (INIS)

    Saniere, A.

    2003-01-01

    Non-conventional oil, and particularly heavy crude varieties, will play an increasingly important role in meeting growing global energy requirements by 2030 and beyond. These heavy oils currently account for high volumes in certain areas but their proportion of global oil production remains modest for the moment, This should significantly change with the completion of several projects currently underway in Canada and Venezuela. Indeed, the technological innovations occurring over recent years have allowed for a considerable reduction in exploitation costs for these crude varieties and improved economic profitability conditions for the projects. The geographical location of resources (which are independent of the Middle East) and the fact that they are not subject to OPEC quotas also make these crude varieties particularly attractive. (authors)

  9. Exploiting peer group concept for adaptive and highly available services

    CERN Document Server

    Jan, M A; Fraz, M M; Ali, A; Ali, Arshad; Fraz, Mohammad Moazam; Jan, Muhammad Asif; Zahid, Fahd Ali

    2003-01-01

    This paper presents a prototype for redundant, highly available and fault tolerant peer to peer framework for data management. Peer to peer computing is gaining importance due to its flexible organization, lack of central authority, distribution of functionality to participating nodes and ability to utilize unused computational resources. Emergence of GRID computing has provided much needed infrastructure and administrative domain for peer to peer computing. The components of this framework exploit peer group concept to scope service and information search, arrange services and information in a coherent manner, provide selective redundancy and ensure availability in face of failure and high load conditions. A prototype system has been implemented using JXTA peer to peer technology and XML is used for service description and interfaces, allowing peers to communicate with services implemented in various platforms including web services and JINI services. It utilizes code mobility to achieve role interchange amo...

  10. Sustained Administration of Hormones Exploiting Nanoconfined Diffusion through Nanochannel Membranes

    Directory of Open Access Journals (Sweden)

    Thomas Geninatti

    2015-08-01

    Full Text Available Implantable devices may provide a superior means for hormone delivery through maintaining serum levels within target therapeutic windows. Zero-order administration has been shown to reach an equilibrium with metabolic clearance, resulting in a constant serum concentration and bioavailability of released hormones. By exploiting surface-to-molecule interaction within nanochannel membranes, it is possible to achieve a long-term, constant diffusive release of agents from implantable reservoirs. In this study, we sought to demonstrate the controlled release of model hormones from a novel nanochannel system. We investigated the delivery of hormones through our nanochannel membrane over a period of 40 days. Levothyroxine, osteocalcin and testosterone were selected as representative hormones based on their different molecular properties and structures. The release mechanisms and transport behaviors of these hormones within 3, 5 and 40 nm channels were characterized. Results further supported the suitability of the nanochannels for sustained administration from implantable platforms.

  11. Commercial Sexual Exploitation of Children and State Child Welfare Systems.

    Science.gov (United States)

    Bounds, Dawn; Julion, Wrenetha A; Delaney, Kathleen R

    2015-01-01

    In several states, commercial sexual exploitation of children (CSEC) is now a reportable child abuse offense. Illinois has taken the lead in tackling the issue and the Illinois experience illuminates valuable lessons. This article delineates the protection, practice, and policy implications that evolve when CSEC falls under a state child welfare system. The specific aims are to (a) discuss CSEC, its victims, risks, harms, and challenges inherent in providing effective care; (b) use Illinois as an exemplar to explicate the consequences and implementation challenges of establishing a state reporting system that frames CSEC as a child welfare issue; (c) recommend strategies for developing effective state reporting models, and (d) demonstrate how nurses are well poised to advocate for victims of human trafficking on both state and national levels. Recommendations for improving the identification of CSEC victims and overcoming challenges to state implementation are offered. © The Author(s) 2015.

  12. Shale gas, Poland pioneer of exploitation in Europe

    International Nuclear Information System (INIS)

    Rybicka, Urszula; Khalatbari, Azar; Schneider, Frederic; Nabrdalik, Maciek

    2012-01-01

    This article presents an installation built by a Polish company to perform drillings in the search for shale gas pockets from which gas would be extracted by hydraulic fracturing. Some technical characteristics of the installation and process are evoked. The article outlines the confidence the population now has gained in this installation. However and despite the fact that the region possesses important underground water reserves, water consumption is reported to be too high with respect to farmer needs. Besides, some farmers have had a compulsory purchase order made on their land and could afford to buy new lands. However, in some other places, the population did not accept the arrival of the multinational company Chevron. In parallel, a brief overview of shale gas exploitation projects or status in other European countries is given

  13. Exploiting CRISPR/Cas: Interference Mechanisms and Applications

    Directory of Open Access Journals (Sweden)

    André Plagens

    2013-07-01

    Full Text Available The discovery of biological concepts can often provide a framework for the development of novel molecular tools, which can help us to further understand and manipulate life. One recent example is the elucidation of the prokaryotic adaptive immune system, clustered regularly interspaced short palindromic repeats (CRISPR/CRISPR-associated (Cas that protects bacteria and archaea against viruses or conjugative plasmids. The immunity is based on small RNA molecules that are incorporated into versatile multi-domain proteins or protein complexes and specifically target viral nucleic acids via base complementarity. CRISPR/Cas interference machines are utilized to develop novel genome editing tools for different organisms. Here, we will review the latest progress in the elucidation and application of prokaryotic CRISPR/Cas systems and discuss possible future approaches to exploit the potential of these interference machineries.

  14. Exploitation of wind energy and its potential in Czechoslovakia

    International Nuclear Information System (INIS)

    Rychetnik, V.

    1990-01-01

    Examples from over the world are shown to demonstrate the potential of wind energy in power generation. The basic types of wind motors and the installed capacities are given. In Czechoslovakia the wind conditions are rather complex. Wind energy can be economically exploited at sites where the mean wind velocity at 10 m above the ground exceeds 4 m/s. This can cover about 2% of annual power generation in Czechoslovakia. The amount of electricity generated and its cost are estimated. The investment into a wind power plant would pay back in several years. The use of small wind power plants to supply, e.g., individual houses will be of limited importance. (M.D.). 4 figs., 8 refs

  15. Microbial biosurfactants: challenges and opportunities for future exploitation.

    Science.gov (United States)

    Marchant, Roger; Banat, Ibrahim M

    2012-11-01

    The drive for industrial sustainability has pushed biosurfactants to the top of the agenda of many companies. Biosurfactants offer the possibility of replacing chemical surfactants, produced from nonrenewable resources, with alternatives produced from cheap renewable feedstocks. Biosurfactants are also attractive because they are less damaging to the environment yet are robust enough for industrial use. The most promising biosurfactants at the present time are the glycolipids, sophorolipids produced by Candida yeasts, mannosylerythritol lipids (MELs) produced by Pseudozyma yeasts, and rhamnolipids produced by Pseudomonas. Despite the current enthusiasm for these compounds several residual problems remain. This review highlights remaining problems and indicates the prospects for imminent commercial exploitation of a new generation of microbial biosurfactants. Copyright © 2012 Elsevier Ltd. All rights reserved.

  16. International petroleum exploration and exploitation agreements: a comprehensive environmental appraisal

    International Nuclear Information System (INIS)

    Zhiguo Gao

    1994-01-01

    The evolution of the environmental aspects of international petroleum exploration and exploitation is outlined. Four case studies of modern petroleum contracts from four developing countries are presented. These are Thailand's modern concession contract, Indonesia's production sharing contract, Brazil's risk service contract and China's hybrid contract. The failure of these four countries to provide adequate environmental regulation through their petroleum contracts is typical of many countries in the developing world. An urgent need exists to recognise that important environmental and resource consequences are associated with the developments authorised by petroleum contracts and that appropriate legal changes must be made to take them into account. Environmental sustainability should be an explicit part of all investment arrangements. (UK)

  17. Exploiting PV technology for basic need provision in Nigeria

    International Nuclear Information System (INIS)

    Gyoh, L.; Gyoh, S.

    2004-01-01

    Transitional economies are confronted with ever declining standard of living and low per capita income. Development institutions around the world have come to realize the strategic importance of Sustainable Energy as a Basic Need in the development process. Despite the efforts made by emerging democracies to eradicate poverty, there are still millions of people without access to electricity. Unreliable energy supply currently presents a constant obstacle to many poverty alleviation programmes. Against this background, some states government in Nigeria are exploiting the unique advantage offered by PV technology in the provision of Basic Needs. This study appraises some of the scheme in which the authors have been heavily involved with. This paper identifies some of the strategic policies that might accelerate the successful implementation of PV technology as a poverty alleviation tool in terms of electricity provision in transitional economies. (authors)

  18. Television production, Funding Models and Exploitation of Content

    Directory of Open Access Journals (Sweden)

    Gillian Doyle

    2016-07-01

    Full Text Available The rise of digital platforms has transformative implications for strategies of financing media production and for exploitation of the economic value in creative content. In the television industry, changes in technologies for distribution and the emergence of SVOD services such as Netflix are gradually shifting audiences and financial power away from broadcasters while at the same time creating unprecedented opportunities for programme-makers.  Drawing on findings from recent RCUK-funded research, this article examines how these shifts are affecting production financing and the economics of supplying television content.  In particular, it focuses on how changes in the dynamics of rights markets and in strategic approaches towards the financing of television production might mean for markets, industries and for policies intended to support the economic sustainability of independent television content production businesses.

  19. Exploitation and Benefits of BIM in Construction Project Management

    Science.gov (United States)

    Mesároš, Peter; Mandičák, Tomáš

    2017-10-01

    BIM is increasingly getting into the awareness in construction industry. BIM is the process of creating and data managing of the building during its life cycle. BIM became a part of management tools in modern construction companies. Construction projects have a number of participants. It means difficulty process of construction project management and a serious requirement for processing the huge amount of information including design, construction, time and cost parameters, economic efficiency and sustainability. Progressive information and communication technologies support cost management and management of construction project. One of them is Building Information Modelling. Aim of the paper is to examine the impact of BIM exploitation and benefits on construction project management in Slovak companies.

  20. Environmental impact of atomic minerals exploration and exploitation

    International Nuclear Information System (INIS)

    Dwivedy, K.K.

    1998-01-01

    Terrestrial radiation in the earth's environment is existing since its formation and is shared by all types of rocks, minerals, gases, and water, and to some extent aided by the interstellar radiation. Environmental radiation is ubiquitous and the man and other living beings have been living in such environment for thousands of years. Today they are much concerned about health and environmental risks so that a balance must be achieved between the activities that promote economic growth and the preservation of the natural environment. Atomic minerals are one of the main sources of natural environmental radiation and they are being explored by Atomic Minerals Division (AMD). Mining and milling activities sometimes may cause some radiological impacts but proper monitoring and remedial measures keep them under check. Some of the important aspects related to environmental impacts of uranium exploration and exploitation are presented

  1. Exploiting nonlinearities of micro-machined resonators for filtering applications

    KAUST Repository

    Ilyas, Saad; Chappanda, K. N.; Younis, Mohammad I.

    2017-01-01

    We demonstrate the exploitation of the nonlinear behavior of two electrically coupled microbeam resonators to realize a band-pass filter. More specifically, we combine their nonlinear hardening and softening responses to realize a near flat pass band filter with sharp roll-off characteristics. The device is composed of two near identical doubly clamped and electrostatically actuated microbeams made of silicon. One of the resonators is buckled via thermal loading to produce a softening frequency response. It is then further tuned to create the desired overlap with the second resonator response of hardening behavior. This overlapping improves the pass band flatness. Also, the sudden jumps due to the softening and hardening behaviors create sharp roll-off characteristics. This approach can be promising for the future generation of filters with superior characteristics.

  2. Analysis of ecological environment impact of coal exploitation and utilization

    Science.gov (United States)

    Zhang, Baoliu; Luo, Hong; Lv, Lianhong; Wang, Jian; Zhang, Baoshi

    2018-02-01

    Based on the theory of life cycle assessment, the ecological and environmental impacts of coal mining, processing, utilization and transportation will be analyzed, with analysing the status of china’s coal exploitation and utilization as the basis, it will find out the ecological and environmental impact in the development and utilization of coal, mainly consist of ecological impact including land damage, water resource destructionand biodiversity loss, etc., while the environmental impact include air, water, solid waste pollutions. Finally with a summary of the ecological and environmental problems, to propose solutionsand countermeasures to promote the rational development and consumption of coal, as well as to reduce the impact of coal production and consumption on the ecological environment, finally to achieve the coordinated development of energy and the environment.

  3. Exploiting nonlinearities of micro-machined resonators for filtering applications

    KAUST Repository

    Ilyas, Saad

    2017-06-21

    We demonstrate the exploitation of the nonlinear behavior of two electrically coupled microbeam resonators to realize a band-pass filter. More specifically, we combine their nonlinear hardening and softening responses to realize a near flat pass band filter with sharp roll-off characteristics. The device is composed of two near identical doubly clamped and electrostatically actuated microbeams made of silicon. One of the resonators is buckled via thermal loading to produce a softening frequency response. It is then further tuned to create the desired overlap with the second resonator response of hardening behavior. This overlapping improves the pass band flatness. Also, the sudden jumps due to the softening and hardening behaviors create sharp roll-off characteristics. This approach can be promising for the future generation of filters with superior characteristics.

  4. Tricking the guard: exploiting plant defense for disease susceptibility.

    Science.gov (United States)

    Lorang, J; Kidarsa, T; Bradford, C S; Gilbert, B; Curtis, M; Tzeng, S-C; Maier, C S; Wolpert, T J

    2012-11-02

    Typically, pathogens deploy virulence effectors to disable defense. Plants defeat effectors with resistance proteins that guard effector targets. We found that a pathogen exploits a resistance protein by activating it to confer susceptibility in Arabidopsis. The guard mechanism of plant defense is recapitulated by interactions among victorin (an effector produced by the necrotrophic fungus Cochliobolus victoriae), TRX-h5 (a defense-associated thioredoxin), and LOV1 (an Arabidopsis susceptibility protein). In LOV1's absence, victorin inhibits TRX-h5, resulting in compromised defense but not disease by C. victoriae. In LOV1's presence, victorin binding to TRX-h5 activates LOV1 and elicits a resistance-like response that confers disease susceptibility. We propose that victorin is, or mimics, a conventional pathogen virulence effector that was defeated by LOV1 and confers virulence to C. victoriae solely because it incites defense.

  5. Selfrando: Securing the Tor Browser against De-anonymization Exploits

    Directory of Open Access Journals (Sweden)

    Conti Mauro

    2016-10-01

    Full Text Available Tor is a well-known anonymous communication system used by millions of users, including journalists and civil rights activists all over the world. The Tor Browser gives non-technical users an easy way to access the Tor Network. However, many government organizations are actively trying to compromise Tor not only in regions with repressive regimes but also in the free world, as the recent FBI incidents clearly demonstrate. Exploiting software vulnerabilities in general, and browser vulnerabilities in particular, constitutes a clear and present threat to the Tor software. The Tor Browser shares a large part of its attack surface with the Firefox browser. Therefore, Firefox vulnerabilities (even patched ones are highly valuable to attackers trying to monitor users of the Tor Browser.

  6. Exploiting large-scale correlations to detect continuous gravitational waves.

    Science.gov (United States)

    Pletsch, Holger J; Allen, Bruce

    2009-10-30

    Fully coherent searches (over realistic ranges of parameter space and year-long observation times) for unknown sources of continuous gravitational waves are computationally prohibitive. Less expensive hierarchical searches divide the data into shorter segments which are analyzed coherently, then detection statistics from different segments are combined incoherently. The novel method presented here solves the long-standing problem of how best to do the incoherent combination. The optimal solution exploits large-scale parameter-space correlations in the coherent detection statistic. Application to simulated data shows dramatic sensitivity improvements compared with previously available (ad hoc) methods, increasing the spatial volume probed by more than 2 orders of magnitude at lower computational cost.

  7. SMARTS: Exploiting Temporal Locality and Parallelism through Vertical Execution

    International Nuclear Information System (INIS)

    Beckman, P.; Crotinger, J.; Karmesin, S.; Malony, A.; Oldehoeft, R.; Shende, S.; Smith, S.; Vajracharya, S.

    1999-01-01

    In the solution of large-scale numerical prob- lems, parallel computing is becoming simultaneously more important and more difficult. The complex organization of today's multiprocessors with several memory hierarchies has forced the scientific programmer to make a choice between simple but unscalable code and scalable but extremely com- plex code that does not port to other architectures. This paper describes how the SMARTS runtime system and the POOMA C++ class library for high-performance scientific computing work together to exploit data parallelism in scientific applications while hiding the details of manag- ing parallelism and data locality from the user. We present innovative algorithms, based on the macro -dataflow model, for detecting data parallelism and efficiently executing data- parallel statements on shared-memory multiprocessors. We also desclibe how these algorithms can be implemented on clusters of SMPS

  8. Thirteen years of exploitation with constant oilfield pressure

    Energy Technology Data Exchange (ETDEWEB)

    Dontov-Danu, Gh

    1966-12-01

    The paper describes a restoring and maintaining reservoir pressure by gas injection in two blocks of the Dacian stratum at Buscani. At the beginning of gas injection, the wells produced in gas lift and the crude oil flows were markedly decreasing. After about 6 months of injection the reservoir pressure has been restored, the wells flowed. This system allows constant crude oil flows for long periods. The oilfield recovery factor until December 31, 1965, is 51% i.e. by 150% higher than expected in the case of an exploitation without gas injection. This increase represents the extra crude oil and gasoline production obtained as a result of the application of the reservoir pressure maintenance process. The average consumption of working agent has been of 382 cu m gas per ton of additionally extracted crude oil.

  9. Exploiting CRISPR/Cas: Interference Mechanisms and Applications

    Science.gov (United States)

    Richter, Hagen; Randau, Lennart; Plagens, André

    2013-01-01

    The discovery of biological concepts can often provide a framework for the development of novel molecular tools, which can help us to further understand and manipulate life. One recent example is the elucidation of the prokaryotic adaptive immune system, clustered regularly interspaced short palindromic repeats (CRISPR)/CRISPR-associated (Cas) that protects bacteria and archaea against viruses or conjugative plasmids. The immunity is based on small RNA molecules that are incorporated into versatile multi-domain proteins or protein complexes and specifically target viral nucleic acids via base complementarity. CRISPR/Cas interference machines are utilized to develop novel genome editing tools for different organisms. Here, we will review the latest progress in the elucidation and application of prokaryotic CRISPR/Cas systems and discuss possible future approaches to exploit the potential of these interference machineries. PMID:23857052

  10. Synthetic biology approaches: Towards sustainable exploitation of marine bioactive molecules.

    Science.gov (United States)

    Seghal Kiran, G; Ramasamy, Pasiyappazham; Sekar, Sivasankari; Ramu, Meenatchi; Hassan, Saqib; Ninawe, A S; Selvin, Joseph

    2018-06-01

    The discovery of genes responsible for the production of bioactive metabolites via metabolic pathways combined with the advances in synthetic biology tools, has allowed the establishment of numerous microbial cell factories, for instance the yeast cell factories, for the manufacture of highly useful metabolites from renewable biomass. Genome mining and metagenomics are two platforms provide base-line data for reconstruction of genomes and metabolomes which is based in the development of synthetic/semi-synthetic genomes for marine natural products discovery. Engineered biofilms are being innovated on synthetic biology platform using genetic circuits and cell signalling systems as represillators controlling biofilm formation. Recombineering is a process of homologous recombination mediated genetic engineering, includes insertion, deletion or modification of any sequence specifically. Although this discipline considered new to the scientific domain, this field has now developed as promising endeavor on the accomplishment of sustainable exploitation of marine natural products. Copyright © 2018 Elsevier B.V. All rights reserved.

  11. ANALYSIS OF ANDROID VULNERABILITIES AND MODERN EXPLOITATION TECHNIQUES

    Directory of Open Access Journals (Sweden)

    Himanshu Shewale

    2014-03-01

    Full Text Available Android is an operating system based on the Linux kernel. It is the most widely used and popular operating system among Smartphones and portable devices. Its programmable and open nature attracts attackers to take undue advantage. Android platform allows developers to freely access and modify source code. But at the same time it increases the security issue. A user is likely to download and install malicious applications written by software hackers. This paper focuses on understanding and analyzing the vulnerabilities present in android platform. In this paper firstly we study the android architecture; analyze the existing threats and security weaknesses. Then we identify various exploit mitigation techniques to mitigate known vulnerabilities. A detailed analysis will help us to identify the existing loopholes and it will give strategic direction to make android operating system more secure.

  12. SMARTS: Exploiting Temporal Locality and Parallelism through Vertical Execution

    Energy Technology Data Exchange (ETDEWEB)

    Beckman, P.; Crotinger, J.; Karmesin, S.; Malony, A.; Oldehoeft, R.; Shende, S.; Smith, S.; Vajracharya, S.

    1999-01-04

    In the solution of large-scale numerical prob- lems, parallel computing is becoming simultaneously more important and more difficult. The complex organization of today's multiprocessors with several memory hierarchies has forced the scientific programmer to make a choice between simple but unscalable code and scalable but extremely com- plex code that does not port to other architectures. This paper describes how the SMARTS runtime system and the POOMA C++ class library for high-performance scientific computing work together to exploit data parallelism in scientific applications while hiding the details of manag- ing parallelism and data locality from the user. We present innovative algorithms, based on the macro -dataflow model, for detecting data parallelism and efficiently executing data- parallel statements on shared-memory multiprocessors. We also desclibe how these algorithms can be implemented on clusters of SMPS.

  13. Exploiting CRISPR-Cas to manipulate Enterococcus faecalis populations.

    Science.gov (United States)

    Hullahalli, Karthik; Rodrigues, Marinelle; Palmer, Kelli L

    2017-06-23

    CRISPR-Cas provides a barrier to horizontal gene transfer in prokaryotes. It was previously observed that functional CRISPR-Cas systems are absent from multidrug-resistant (MDR) Enterococcus faecalis , which only possess an orphan CRISPR locus, termed CRISPR2, lacking cas genes. Here, we investigate how the interplay between CRISPR-Cas genome defense and antibiotic selection for mobile genetic elements shapes in vitro E. faecalis populations. We demonstrate that CRISPR2 can be reactivated for genome defense in MDR strains. Interestingly, we observe that E. faecalis transiently maintains CRISPR targets despite active CRISPR-Cas systems. Subsequently, if selection for the CRISPR target is present, toxic CRISPR spacers are lost over time, while in the absence of selection, CRISPR targets are lost over time. We find that forced maintenance of CRISPR targets induces a fitness cost that can be exploited to alter heterogeneous E. faecalis populations.

  14. The mobility of radioactive elements in a Uranium exploitation zone

    International Nuclear Information System (INIS)

    Bragea, M.; Toro, L.

    2002-01-01

    One of the purposes of this study is to gain knowledge on the possibilities of accumulations of the radioelements (2 38U , 2 32T h, 2 26R a) in a given ecosystem, and, particularly, the knowledge of the mechanisms implied in the transfer of these radioelements around the abandoned mining exploitations. The final purpose is the evaluation of the quantity of the radioelements susceptible to reach the man. The research is directed towards a quantitative evaluation of the transport rate of the contaminating element in the soil. There have been studied the surroundings of ore mines in the Boul Massif in Poiana Rusca Mountains in Romania. These exploitations had been closed and abandoned in 1990. From a geological point of view, the region is formed from crystalline schists, banat eruptive and sedimentary rocks. The iron deposit is totally situated in crystalline rocks in Poiana Rusca Mountains. The concentration of magnetite in the deposit is 25% with a relatively uniform dissemination in the ore. Brannerite (UCaThY)(TiFe) 2 O 6 , was also found in the same place. It is an ore should contain UO3 in proportion of up to about 33%. In 1963 there were stood out areas with radioactive minerals with gamma doses in the range of 500-9100 nGy/hour. In the same time, there were also identified a few points in which the concentration of thorium and uranium were significant. The areas with radioactive mineralizations were generally limited and strictly located in the limit of the iron ores deposit. By closing the mining activities huge quantities of waste rock stored in unprotected dump remained abandoned. As a result of the process of ore extraction, the waste rock and a very low percentage of metallic minerals were stored in tailing ponds, with a clay liner necessary to isolate the tailing from the reast of the aquifer

  15. Automated motion imagery exploitation for surveillance and reconnaissance

    Science.gov (United States)

    Se, Stephen; Laliberte, France; Kotamraju, Vinay; Dutkiewicz, Melanie

    2012-06-01

    Airborne surveillance and reconnaissance are essential for many military missions. Such capabilities are critical for troop protection, situational awareness, mission planning and others, such as post-operation analysis / damage assessment. Motion imagery gathered from both manned and unmanned platforms provides surveillance and reconnaissance information that can be used for pre- and post-operation analysis, but these sensors can gather large amounts of video data. It is extremely labour-intensive for operators to analyse hours of collected data without the aid of automated tools. At MDA Systems Ltd. (MDA), we have previously developed a suite of automated video exploitation tools that can process airborne video, including mosaicking, change detection and 3D reconstruction, within a GIS framework. The mosaicking tool produces a geo-referenced 2D map from the sequence of video frames. The change detection tool identifies differences between two repeat-pass videos taken of the same terrain. The 3D reconstruction tool creates calibrated geo-referenced photo-realistic 3D models. The key objectives of the on-going project are to improve the robustness, accuracy and speed of these tools, and make them more user-friendly to operational users. Robustness and accuracy are essential to provide actionable intelligence, surveillance and reconnaissance information. Speed is important to reduce operator time on data analysis. We are porting some processor-intensive algorithms to run on a Graphics Processing Unit (GPU) in order to improve throughput. Many aspects of video processing are highly parallel and well-suited for optimization on GPUs, which are now commonly available on computers. Moreover, we are extending the tools to handle video data from various airborne platforms and developing the interface to the Coalition Shared Database (CSD). The CSD server enables the dissemination and storage of data from different sensors among NATO countries. The CSD interface allows

  16. Sensor Exposure, Exploitation, and Experimentation Environment (SE4)

    Science.gov (United States)

    Buell, D.; Duff, F.; Goding, J.; Bankston, M.; McLaughlin, T.; Six, S.; Taylor, S.; Wootton, S.

    2011-09-01

    As the resident space object population increases from new launches and events such as the COSMOS/IRIDIUM collision, the maintenance of high-level Space Situational Awareness (SSA) has become increasingly difficult. To maintain situational awareness of the changing environment, new systems and methods must be developed. The Sensor Exposure, Exploitation and Experimentation Environment (SE4) provides a platform to illustrate “The Art of the Possible” that shows the potential benefit of enriched sensor data collections and real-time data sharing. Through modeling and simulation, and a net-centric architecture, SE4 shows the added value of sharing data in real-time and exposing new types of sensor data. The objective of SE4 is to develop an experimentation and innovation environment for sensor data exposure, composable sensor capabilities, reuse, and exploitation that accelerates the delivery of needed Command and Control, Intelligence, Surveillance, and Reconnaissance capabilities to the warfighter. Through modeling, simulation and rapid prototyping, the art of the possible for a fully-connected, net-centric space Command and Control (C2) and sensor enterprise can be demonstrated. This paper provides results that demonstrate the potential for faster cataloging of breakup events and additional event monitoring that are possible with data available today in the Space Surveillance Network (SSN). Demonstrating the art of the possible for the enterprise will guide net-centric requirements definition and facilitate discussions with stakeholder organizations on the Concept of Operations (CONOPS), policy, and Tactics, Techniques, and Procedures (TTP) evolution necessary to take full advantage of net-centric operations. SE4 aligns with direction from Secretary Gates and the Chairman Joint Chief of Staff that emphasizes the need to get the most out of our existing systems. Continuing to utilize SE4 will enable the enterprise by demonstrating the benefits of applying

  17. Exploiting tumor shrinkage through temporal optimization of radiotherapy

    International Nuclear Information System (INIS)

    Unkelbach, Jan; Craft, David; Hong, Theodore; Papp, Dávid; Wolfgang, John; Bortfeld, Thomas; Ramakrishnan, Jagdish; Salari, Ehsan

    2014-01-01

    In multi-stage radiotherapy, a patient is treated in several stages separated by weeks or months. This regimen has been motivated mostly by radiobiological considerations, but also provides an approach to reduce normal tissue dose by exploiting tumor shrinkage. The paper considers the optimal design of multi-stage treatments, motivated by the clinical management of large liver tumors for which normal liver dose constraints prohibit the administration of an ablative radiation dose in a single treatment. We introduce a dynamic tumor model that incorporates three factors: radiation induced cell kill, tumor shrinkage, and tumor cell repopulation. The design of multi-stage radiotherapy is formulated as a mathematical optimization problem in which the total dose to the normal tissue is minimized, subject to delivering the prescribed dose to the tumor. Based on the model, we gain insight into the optimal administration of radiation over time, i.e. the optimal treatment gaps and dose levels. We analyze treatments consisting of two stages in detail. The analysis confirms the intuition that the second stage should be delivered just before the tumor size reaches a minimum and repopulation overcompensates shrinking. Furthermore, it was found that, for a large range of model parameters, approximately one-third of the dose should be delivered in the first stage. The projected benefit of multi-stage treatments in terms of normal tissue sparing depends on model assumptions. However, the model predicts large dose reductions by more than a factor of 2 for plausible model parameters. The analysis of the tumor model suggests that substantial reduction in normal tissue dose can be achieved by exploiting tumor shrinkage via an optimal design of multi-stage treatments. This suggests taking a fresh look at multi-stage radiotherapy for selected disease sites where substantial tumor regression translates into reduced target volumes. (paper)

  18. Exploiting risk-reward structures in decision making under uncertainty.

    Science.gov (United States)

    Leuker, Christina; Pachur, Thorsten; Hertwig, Ralph; Pleskac, Timothy J

    2018-06-01

    People often have to make decisions under uncertainty-that is, in situations where the probabilities of obtaining a payoff are unknown or at least difficult to ascertain. One solution to this problem is to infer the probability from the magnitude of the potential payoff and thus exploit the inverse relationship between payoffs and probabilities that occurs in many domains in the environment. Here, we investigated how the mind may implement such a solution: (1) Do people learn about risk-reward relationships from the environment-and if so, how? (2) How do learned risk-reward relationships impact preferences in decision-making under uncertainty? Across three experiments (N = 352), we found that participants can learn risk-reward relationships from being exposed to choice environments with a negative, positive, or uncorrelated risk-reward relationship. They were able to learn the associations both from gambles with explicitly stated payoffs and probabilities (Experiments 1 & 2) and from gambles about epistemic events (Experiment 3). In subsequent decisions under uncertainty, participants often exploited the learned association by inferring probabilities from the magnitudes of the payoffs. This inference systematically influenced their preferences under uncertainty: Participants who had been exposed to a negative risk-reward relationship tended to prefer the uncertain option over a smaller sure option for low payoffs, but not for high payoffs. This pattern reversed in the positive condition and disappeared in the uncorrelated condition. This adaptive change in preferences is consistent with the use of the risk-reward heuristic. Copyright © 2018 Elsevier B.V. All rights reserved.

  19. Preliminary exploitation of industrial facility for flue gas treatment

    International Nuclear Information System (INIS)

    Chmielewski, A.G.; Zimek, Z.; Iller, E.; Tyminski, B.; Licki, J.

    2001-01-01

    laboratory and pilot installation in Poland has lead to decision concerning design and construction of the industrial demonstration plant for electron beam flue gas treatment. Industrial demonstration facility for electron beam flue gas treatment was designed and installed in EPS Pomorzany in Szczecin. This flue gas purification installation treats exhaust gases coming from a block which consists of two Benson type boilers of power 56 MWe each, supplying additional steam for heating purposes up to 40 MWth each. The 270,000 Nm 3 /h flue gases (half of produced by the blocks) is treated meet Polish regulations which are imposed since 1997. Four electron accelerators has been constructed by Nissin High Voltage, Kyoto, Japan to provide 1200 kW of total beam power with electron energy 0,8 MeV to be installed in EPS Pomorzany. Two-stage irradiation was applied as it was tested at the pilot plant. The industrial installation located at EPS Pomorzany consist of two independent reaction chambers, humidification tower with water and steam supply systems, ammonia water handling system with ammonia injection, electrostatic precipitator, by product handling system, measuring and control systems. Solid particles which are formed as salts are separated in ESP and byproduct pretreated in handling system with amount up to 700 kg/h. All systems including accelerators were tested separately to meet EPS regulations (72 h continues run) and confirm producer warranted parameters and facility design specification. Some necessary modifications including accelerators were introduced by equipment producers depends on obtained results of performed measurements. The quality of shielding properties of accelerator chamber walls was tested according to national regulation and the license on accelerator exploitation and personnel qualification were issued by polish authorities. The spatial dose distribution and dose rate measurement were carried on with electron energy 700 and 800 keV. Preliminary results

  20. Radiolabelled cellular blood elements

    International Nuclear Information System (INIS)

    Sinzinger, H.

    1990-01-01

    This book reports on radiolabelled cellular blood elements, covering new advances made during the past several years, in particular the use of Tc-99 as a tracer for blood elements. Coverage extends to several radiolabelled monoclonal antibodies that are specific for blood components and may label blood elements in vivo