WorldWideScience

Sample records for demonstration voc-arid id

  1. Arid sites stakeholder participation in evaluating innovative technologies: VOC-Arid Site Integrated Demonstration

    Energy Technology Data Exchange (ETDEWEB)

    Peterson, T.S.; McCabe, G.H.; Brockbank, B.R. [and others

    1995-05-01

    Developing and deploying innovative environmental cleanup technologies is an important goal for the U.S. Department of Energy (DOE), which faces challenging remediation problems at contaminated sites throughout the United States. Achieving meaningful, constructive stakeholder involvement in cleanup programs, with the aim of ultimate acceptance of remediation decisions, is critical to meeting those challenges. DOE`s Office of Technology Development sponsors research and demonstration of new technologies, including, in the past, the Volatile Organic Compounds Arid Site Integrated Demonstration (VOC-Arid ID), hosted at the Hanford Site in Washington State. The purpose of the VOC-Arid ID has been to develop and demonstrate new technologies for remediating carbon tetrachloride and other VOC contamination in soils and ground water. In October 1994 the VOC-Arid ID became a part of the Contaminant Plume Containment and Remediation Focus Area (Plume Focus Area). The VOC Arid ID`s purpose of involving stakeholders in evaluating innovative technologies will now be carried on in the Plume Focus Area in cooperation with Site Technology Coordination Groups and Site Specific Advisory Boards. DOE`s goal is to demonstrate promising technologies once and deploy those that are successful across the DOE complex. Achieving that goal requires that the technologies be acceptable to the groups and individuals with a stake in DOE facility cleanup. Such stakeholders include groups and individuals with an interest in cleanup, including regulatory agencies, Native American tribes, environmental and civic interest groups, public officials, environmental technology users, and private citizens. This report documents the results of the stakeholder involvement program, which is an integral part of the VOC-Arid ID.

  2. What's Going on in Your Professor's Head? Demonstrating the Id, Ego, and Superego

    Science.gov (United States)

    Segrist, Dan J.

    2009-01-01

    This article describes an in-class activity designed to demonstrate Freud's structural theory of the psyche, specifically the roles of the id, ego, and superego, as well as the interplay among them. Additionally, the activity visually illustrates Freud's ideas about the levels of consciousness associated with these 3 components. Pre-post quiz…

  3. What's Going on in Your Professor's Head? Demonstrating the Id, Ego, and Superego

    Science.gov (United States)

    Segrist, Dan J.

    2009-01-01

    This article describes an in-class activity designed to demonstrate Freud's structural theory of the psyche, specifically the roles of the id, ego, and superego, as well as the interplay among them. Additionally, the activity visually illustrates Freud's ideas about the levels of consciousness associated with these 3 components. Pre-post quiz…

  4. In situ encapsulation bench-scale demonstration report FY-94 (for TTP-ID 142012)

    Energy Technology Data Exchange (ETDEWEB)

    Weidner, J.R.; Shaw, P.G.

    1995-01-01

    This report describes the test objectives, procedures, and results of the laboratory-scale tests of in situ waste encapsulation of buried waste using a synthetic analogue of natural cement. The products of the reaction FeSO{sub 4} {center_dot} 7H{sub 2}O + Ca(OH){sub 2} = gypsum and iron oxide/hydroxide were examined as a possible waste encapsulation material for application at the Subsurface Disposal Area at the Idaho National Engineering Laboratory. This technique for transuranic waste encapsulation is being pursued by the Buried Waste Integrated Demonstration as a possible candidate containment and stabilization method for geologic time. The data indicate that the iron waste encapsulation materials tested are appropriate choices for the intended purpose. Based on these observations and conclusions, full-scale tests are recommended to determine the performance of the iron waste isolation materials under field conditions and for extended time periods. The viscosity of the reagents indicates that jet grouting is probably an appropriate application method.

  5. ARSENIC REMOVAL FROM DRINKING WATER BY POINT OF USE REVERSE OSMOSIS. EPA DEMONSTRATION PROJECT AT SUNSET RANCH DEVELOPMENT IN HOMEDALE, ID. SIX-MONTH EVALUATION REPORT

    Science.gov (United States)

    This report documents the activities performed during and the results obtained from the first six months of the point of use arsenic removal treatment technology demonstration project at the Sunset Ranch Development in Homedale, ID. The objectives of the project are to evaluate t...

  6. ARSENIC REMOVAL FROM DRINKING WATER BY POINT OF USE REVERSE OSMOSIS. EPA DEMONSTRATION PROJECT AT SUNSET RANCH DEVELOPMENT IN HOMEDALE, ID. SIX-MONTH EVALUATION REPORT

    Science.gov (United States)

    This report documents the activities performed during and the results obtained from the first six months of the point of use arsenic removal treatment technology demonstration project at the Sunset Ranch Development in Homedale, ID. The objectives of the project are to evaluate t...

  7. ARSENIC REMOVAL FROM DRINKING WATER BY POINT-OF-USE (POU) REVERSE OSMOSIS. U.S. EPA DEMONSTRATION PROJECT AT SUNSET RANCH DEVELOPMENT IN HOMEDALE, ID. FINAL PERFORMANCE EVALUATION REPORT

    Science.gov (United States)

    This report documents the activities performed during and the results obtained from the arsenic removal technology demonstration project at the Sunset Ranch Development in Homedale, ID. The objectives of the project are to evaluate: 1) the effectiveness of a point of use (POU) re...

  8. ARSENIC REMOVAL FROM DRINKING WATER BY POINT-OF-USE (POU) REVERSE OSMOSIS. U.S. EPA DEMONSTRATION PROJECT AT SUNSET RANCH DEVELOPMENT IN HOMEDALE, ID. FINAL PERFORMANCE EVALUATION REPORT

    Science.gov (United States)

    This report documents the activities performed during and the results obtained from the arsenic removal technology demonstration project at the Sunset Ranch Development in Homedale, ID. The objectives of the project are to evaluate: 1) the effectiveness of a point of use (POU) re...

  9. SecurID

    CERN Document Server

    Now called RSA SecurID, SecurID is a mechanism developed by Security Dynamics that allows two-factor authentication for a user on a network resource. It works on the principle of the unique password mode, based on a shared secret. Every sixty seconds, the component generates a new six-digit token on the screen. The latter comes from the current time (internal clock) and the seed (SecurID private key that is available on the component, and is also from the SecurID server). During an authentication request, the SecurID server will check the entered token by performing exactly the same calculation as that performed by your component. The server knows the two information required for this calculation: the current time and the seed of your component. Access is allowed if the token calculated by the server matches the token you specified.

  10. Combined Id1 and Id3 Deletion Leads to Severe Erythropoietic Disturbances.

    Directory of Open Access Journals (Sweden)

    Qingshi Zhao

    Full Text Available The Inhibitor of DNA Binding (Id proteins play a crucial role in regulating hematopoiesis and are known to interact with E proteins and the bHLH family of transcription factors. Current efforts seek to elucidate the individual roles of Id members in regulating hematopoietic development and specification. However, the nature of their functional redundancies remains elusive since ablation of multiple Id genes is embryonically lethal. We developed a model to test this compensation in the adult. We report that global Id3 ablation with Tie2Cre-mediated conditional ablation of Id1 in both hematopoietic and endothelial cells (Id cDKO extends viability to 1 year but leads to multi-lineage hematopoietic defects including the emergence of anemia associated with defective erythroid development, a novel phenotype unreported in prior single Id knockout studies. We observe decreased cell counts in the bone marrow and splenomegaly to dimensions beyond what is seen in single Id knockout models. Transcriptional dysregulation of hematopoietic regulators observed in bone marrow cells is also magnified in the spleen. E47 protein levels were elevated in Id cDKO bone marrow cell isolates, but decreased in the erythroid lineage. Chromatin immunoprecipitation (ChIP studies reveal increased occupancy of E47 and GATA1 at the promoter regions of β-globin and E2A. Bone marrow transplantation studies highlight the importance of intrinsic Id signals in maintaining hematopoietic homeostasis while revealing a strong extrinsic influence in the development of anemia. Together, these findings demonstrate that loss of Id compensation leads to dysregulation of the hematopoietic transcriptional network and multiple defects in erythropoietic development in adult mice.

  11. Successful I.D. Encounters.

    Science.gov (United States)

    Poorman, Margaret J.

    Instructional Development (I.D.) encounters are dependent for success on such variables as power, politics, promotion, and organizational placement. I.D. consultants must be aware of power bases or orientation of other personnel and clients, e.g., these four "power personalities" which affect their efforts in managing I.D. encounters: the gate…

  12. Id4 Promotes Senescence and Sensitivity to Doxorubicin-induced Apoptosis in DU145 Prostate Cancer Cells

    OpenAIRE

    Carey, Jason P; Knowell, Ashley Evans; Chinaranagari, Swathi; Chaudhary, Jaideep

    2013-01-01

    Inhibitor of differentiation proteins (Id1, 2, 3 and 4) are dominant negative regulators of basic helix loop helix transcription factors and play dominant roles in cancer cells, spanning several molecular pathways including senescence, invasion, metastasis, proliferation and apoptosis. In contrast to high Id1, Id2 and Id3 expression, the expression of Id4 is epigenetically silenced in prostate cancer. In the present study we demonstrated a novel role of Id4, that of promotion of cellular sene...

  13. Nuclear Power 2010 Program Dominion Virginia Power Cooperative Project U.S. Department of Energy Cooperative Agreement DE-FC07-05ID14635 Construction and Operating License Demonstration Project Final Report

    Energy Technology Data Exchange (ETDEWEB)

    Eugene S. Grecheck

    2010-11-30

    This report serves to summarize the major activities completed as part of Virginia Electric and Power Company's North Anna construction and operating license demonstration project with DOE. Project successes, lessons learned, and suggestions for improvement are discussed. Objectives of the North Anna COL project included preparation and submittal of a COLA to the USNRC incorporating ESBWR technology for a third unit a the North Anna Power Station site, support for the NRC review process and mandatory hearing, obtaining NRC approval of the COLA and issuance of a COL, and development of a business case necessary to support a decision on building a new nuclear power plant at the North Anna site.

  14. Improved ID-Based Signature Scheme Solving Key Escrow

    Institute of Scientific and Technical Information of China (English)

    LIAO Jian; QI Ying-hao; HUANG Pei-wei; RONG Men-tian; LI Sheng-hong

    2006-01-01

    Key escrow is an inherent disadvantage for traditional ID-based cryptosystem, i.e. , the dishonest private key generator (PKG) can forge the signature of any user, meanwhile, the user can deny the signature actually signed by him/herself. To avoid the keyescrow problem, an ID-based signature scheme was presented without trusted PKG. The exact proof of security was presented to demonstrate that our scheme is secure against existential forgery on adaptively chosen message and ID attacks assuming the complexity of computational Diffie-Hellman(CDH) problem. Compared with other signature schemes, the proposed scheme is more efficient.

  15. One ID Card for the Entire Campus.

    Science.gov (United States)

    Ridenour, David P.; Ferguson, Linda M.

    1986-01-01

    The implementation by Indiana State University of a machine-readable photo ID system for their food services prompted an investigation into the available alternatives and requirements for a more efficient all-University ID card system. The new ID system is described. (AUTHOR/MLW)

  16. Impaired Thermogenesis and a Molecular Signature for Brown Adipose Tissue in Id2 Null Mice

    Directory of Open Access Journals (Sweden)

    Peng Zhou

    2016-01-01

    Full Text Available Inhibitor of DNA binding 2 (ID2 is a helix-loop-helix transcriptional repressor rhythmically expressed in many adult tissues. Our previous studies have demonstrated that Id2 null mice have sex-specific elevated glucose uptake in brown adipose tissue (BAT. Here we further explored the role of Id2 in the regulation of core body temperature over the circadian cycle and the impact of Id2 deficiency on genes involved in insulin signaling and adipogenesis in BAT. We discovered a reduced core body temperature in Id2−/− mice. Moreover, in Id2−/− BAT, 30 genes including Irs1, PPARs, and PGC-1s were identified as differentially expressed in a sex-specific pattern. These data provide valuable insights into the impact of Id2 deficiency on energy homeostasis of mice in a sex-specific manner.

  17. VLM Tool for IDS Integration

    Directory of Open Access Journals (Sweden)

    Cǎtǎlin NAE

    2010-03-01

    Full Text Available This paper is dedicated to a very specific type of analysis tool (VLM - Vortex Lattice Method to be integrated in a IDS - Integrated Design System, tailored for the usage of small aircraft industry. The major interest is to have the possibility to simulate at very low computational costs a preliminary set of aerodynamic characteristics for basic aerodynamic global characteristics (Lift, Drag, Pitching Moment and aerodynamic derivatives for longitudinal and lateral-directional stability analysis. This work enables fast investigations of the influence of configuration changes in a very efficient computational environment. Using experimental data and/or CFD information for a specific calibration of VLM method, reliability of the analysis may me increased so that a first type (iteration zero aerodynamic evaluation of the preliminary 3D configuration is possible. The output of this tool is basic state aerodynamic and associated stability and control derivatives, as well as a complete set of information on specific loads on major airframe components.The major interest in using and validating this type of methods is coming from the possibility to integrate it as a tool in an IDS system for conceptual design phase, as considered for development for CESAR project (IP, UE FP6.

  18. ID Barrel installed in cryostat

    CERN Multimedia

    Apsimon, R.; Romaniouk, A.

    Wednesday 23rd August was a memorable day for the Inner Detector community as they witnessed the transport and installation of the central part of the inner detector (ID-barrel) into the ATLAS detector. Many members of the collaboration gathered to witness this moment at Point 1. After years of design, construction and commissioning, the outer two detectors (TRT and SCT) of the ID barrel were moved from the SR1 cleanroom to the ATLAS cavern. The barrel was moved across the car park from building 2175 to SX1. Although only a journey of about 100 metres, this required weeks of planning and some degree of luck as far as the weather was concerned. Accelerometers were fitted to the barrel to provide real-time monitoring and no values greater than 0.1 g were recorded, fully satisfying the transport specification for this extremely precise and fragile detector. Muriel, despite her fear of heights, bravely volunteered to keep a close eye on the detector. Swapping cranes to cross the entire parking lot, while Mur...

  19. L’idéologie

    Directory of Open Access Journals (Sweden)

    Paul Aron

    2007-02-01

    Full Text Available De Marx à BourdieuJugée essentielle dans les années septante, déclinée en colloques, ouvrages polémiques ou encyclopédiques divers, rythmée par les interventions théoriques de penseurs comme Antonio Gramsci, que l’on commençait à traduire en français, Louis Althusser, Lucien Sève ou Robert Fossaert, la problématique de l’idéologie a mobilisé les esprits à un point tel que le silence qui l’entoure aujourd’hui peut légitimement surprendre.Je commencerai par situer cette notion dans son cadre hi...

  20. Id-1 promotes osteosarcoma cell growth and inhibits cell apoptosis via PI3K/AKT signaling pathway

    Energy Technology Data Exchange (ETDEWEB)

    Hao, Liang; Liao, Qi; Tang, Qiang [Department of Orthopaedic Surgery, The Second Affiliated Hospital of Nanchang University, Nanchang 300006 (China); Deng, Huan [Department of Pathology, The Fourth Affiliated Hospital of Nanchang University, Nanchang 330006 (China); Chen, Lu, E-mail: chenlu0578@163.com [Department of Orthopaedic Surgery, The Second Affiliated Hospital of Nanchang University, Nanchang 300006 (China)

    2016-02-12

    Accumulating evidence reveals that Id-1 is upregulated and functions as a potential tumor promoter in several human cancer types. However, the role of Id-1 in osteosarcoma (OS) is unknown. In present study, we found that Id-1 expression was elevated in OS tissues than adjacent normal bone tissues. More importantly, we demonstrated that overexpression of Id-1 is significantly correlated with tumor progression and poor survival in OS patients. Furthermore, increased expression of Id-1 was observed in OS cell lines and ectopic expression of Id-1 significantly enhanced in vitro cell proliferation and promoted in vivo tumor growth, whereas knockdown of Id-1 suppressed OS cells growth. Moreover, our experimental data revealed that Id-1 promotes cell proliferation by facilitating cell cycle progression and inhibits cell apoptosis. Mechanistically, the effects of Id-1 in OS cells is at least partly through activation of PI3K/Akt signaling pathway. Therefore, we identified a tumorigenic role of Id-1 in OS and suggested a potential therapeutic target for OS patients. - Highlights: • Id-1 expression is positively correlated in OS patients with poor prognosis. • Overexpression of Id-1 promotes OS cell growth in vitro and in vivo. • Id-1induces cell cycle progression and inhibits cell apoptosis. • PI3K/Akt signaling pathway contributed to the oncogenic effects of Id-1 in OS cells.

  1. Microbe-ID: an open source toolbox for microbial genotyping and species identification

    Directory of Open Access Journals (Sweden)

    Javier F. Tabima

    2016-08-01

    Full Text Available Development of tools to identify species, genotypes, or novel strains of invasive organisms is critical for monitoring emergence and implementing rapid response measures. Molecular markers, although critical to identifying species or genotypes, require bioinformatic tools for analysis. However, user-friendly analytical tools for fast identification are not readily available. To address this need, we created a web-based set of applications called Microbe-ID that allow for customizing a toolbox for rapid species identification and strain genotyping using any genetic markers of choice. Two components of Microbe-ID, named Sequence-ID and Genotype-ID, implement species and genotype identification, respectively. Sequence-ID allows identification of species by using BLAST to query sequences for any locus of interest against a custom reference sequence database. Genotype-ID allows placement of an unknown multilocus marker in either a minimum spanning network or dendrogram with bootstrap support from a user-created reference database. Microbe-ID can be used for identification of any organism based on nucleotide sequences or any molecular marker type and several examples are provided. We created a public website for demonstration purposes called Microbe-ID (microbe-id.org and provided a working implementation for the genus Phytophthora (phytophthora-id.org. In Phytophthora-ID, the Sequence-ID application allows identification based on ITS or cox spacer sequences. Genotype-ID groups individuals into clonal lineages based on simple sequence repeat (SSR markers for the two invasive plant pathogen species P. infestans and P. ramorum. All code is open source and available on github and CRAN. Instructions for installation and use are provided at https://github.com/grunwaldlab/Microbe-ID.

  2. Differential regulation of granulopoiesis by the basic helix-loop-helix transcriptional inhibitors Id1 and Id2

    NARCIS (Netherlands)

    Buitenhuis, M; van Deutekom, HWM; Verhagen, LP; Castor, A; Jacobsen, SEW; Lammers, JWJ; Koenderman, L; Coffer, PJ

    2005-01-01

    Inhibitor of DNA binding (Id) proteins function as inhibitors of members of the basic helix-loop-helix family of transcription factors and have been demonstrated to play an important role in regulating lymphopoiesis. However, the role of these proteins in regulation of myelopoiesis is currently

  3. Tinjauan Desain Website kemlu.go.id

    Directory of Open Access Journals (Sweden)

    Danu Widhyatmoko

    2013-03-01

    Full Text Available Review of kemlu.go.id website design is a research report on Kemlu.go.id website design. Kemlu.go.id website aims to be the information gateway of Ministry of Foreign Affairs, and also as guidelines of foreign politic policies of Republic of Indonesia. The review had been accomplished by using analytical method based on the "Nine Essential Principles for Good Web Design" developed by Collis Ta'eed (2007. At the end of the article, several recommendations in developing kemlu.go.id website are presented to create better appearance.

  4. The Mathematica package TopoID and its application to the Higgs boson production cross section

    Energy Technology Data Exchange (ETDEWEB)

    Hoff, Jens

    2016-07-15

    We present the Mathematica package TopoID which aims at the automation of several steps in multiloop calculations. The algorithm which lies at the very core of the package is described and illustrated with an example. The main features of TopoID are stated and some of them are briefly demonstrated for NLO or NNLO Higgs boson production.

  5. Inhibitor of differentiation 4 (Id4 is a potential tumor suppressor in prostate cancer

    Directory of Open Access Journals (Sweden)

    Carey Jason PW

    2009-06-01

    Full Text Available Abstract Background Inhibitor of differentiation 4 (Id4, a member of the Id gene family is also a dominant negative regulator of basic helix loop helix (bHLH transcription factors. Some of the functions of Id4 appear to be unique as compared to its other family members Id1, Id2 and Id3. Loss of Id4 gene expression in many cancers in association with promoter hypermethylation has led to the proposal that Id4 may act as a tumor suppressor. In this study we provide functional evidence that Id4 indeed acts as a tumor suppressor and is part of a cancer associated epigenetic re-programming. Methods Data mining was used to demonstrate Id4 expression in prostate cancer. Methylation specific polymerase chain reaction (MSP analysis was performed to understand molecular mechanisms associated with Id4 expression in prostate cancer cell lines. The effect of ectopic Id4 expression in DU145 cells was determined by cell cycle analysis (3H thymidine incorporation and FACS, expression of androgen receptor, p53 and cyclin dependent kinase inhibitors p27 and p21 by a combination of RT-PCR, real time-PCR, western blot and immuno-cytochemical analysis. Results Id4 expression was down-regulated in prostate cancer. Id4 expression was also down-regulated in prostate cancer line DU145 due to promoter hyper-methylation. Ectopic Id4 expression in DU145 prostate cancer cell line led to increased apoptosis and decreased cell proliferation due in part by an S-phase arrest. In addition to S-phase arrest, ectopic Id4 expression in PC3 cells also resulted in prolonged G2/M phase. At the molecular level these changes were associated with increased androgen receptor (AR, p21, p27 and p53 expression in DU145 cells. Conclusion The results suggest that Id4 acts directly as a tumor suppressor by influencing a hierarchy of cellular processes at multiple levels that leads to a decreased cell proliferation and change in morphology that is possibly mediated through induction of previously

  6. DNS ID Covert Channel based on Lower Bound Steganography for Normal DNS ID Distribution

    Directory of Open Access Journals (Sweden)

    Abdulrahman H. Altalhi

    2011-11-01

    Full Text Available The covert channel is a method used to send secret data within a communication channel in unauthorized ways. This is performed by exploiting the weaknesses in packet or network communications with the intention to hide the existence of a covert communication. The DNS identification (DNS ID method has been exploited by Thyer. However, the major problem in Thyers implementation is that the encrypted cipher was directly inserted as a DNS ID value, which is abnormal, compared to the normal DNS ID distribution. We have overcome this problem through the application of Steganography to insert the cipher value into the DNS ID. The data set test for normal DNS ID is taken from MAWI. We tested four different message lengths and plotted the distribution graph. We found that the proposed result is normal compared to normal distribution of the DNS ID. Therefore, this method produces a normal distribution for DNS ID covert channel.

  7. Id1 represses osteoclast-dependent transcription and affects bone formation and hematopoiesis.

    Directory of Open Access Journals (Sweden)

    April S Chan

    Full Text Available BACKGROUND: The bone-bone marrow interface is an area of the bone marrow microenvironment in which both bone remodeling cells, osteoblasts and osteoclasts, and hematopoietic cells are anatomically juxtaposed. The close proximity of these cells naturally suggests that they interact with one another, but these interactions are just beginning to be characterized. METHODOLOGY/PRINCIPAL FINDINGS: An Id1(-/- mouse model was used to assess the role of Id1 in the bone marrow microenvironment. Micro-computed tomography and fracture tests showed that Id1(-/- mice have reduced bone mass and increased bone fragility, consistent with an osteoporotic phenotype. Osteoclastogenesis and pit formation assays revealed that loss of Id1 increased osteoclast differentiation and resorption activity, both in vivo and in vitro, suggesting a cell autonomous role for Id1 as a negative regulator of osteoclast differentiation. Examination by flow cytometry of the hematopoietic compartment of Id1(-/- mice showed an increase in myeloid differentiation. Additionally, we found increased expression of osteoclast genes, TRAP, Oscar, and CTSK in the Id1(-/- bone marrow microenvironment. Lastly, transplantation of wild-type bone marrow into Id1(-/- mice repressed TRAP, Oscar, and CTSK expression and activity and rescued the hematopoietic and bone phenotype in these mice. CONCLUSIONS/SIGNIFICANCE: In conclusion, we demonstrate an osteoporotic phenotype in Id1(-/- mice and a mechanism for Id1 transcriptional control of osteoclast-associated genes. Our results identify Id1 as a principal player responsible for the dynamic cross-talk between bone and bone marrow hematopoietic cells.

  8. Inhibitor of differentiation 4 (ID4): From development to cancer.

    Science.gov (United States)

    Patel, Divya; Morton, Derrick J; Carey, Jason; Havrda, Mathew C; Chaudhary, Jaideep

    2015-01-01

    Highly conserved Inhibitors of DNA-Binding (ID1-ID4) genes encode multi-functional proteins whose transcriptional activity is based on dominant negative inhibition of basic helix-loop-helix (bHLH) transcription factors. Initial animal models indicated a degree of compensatory overlap between ID genes such that deletion of multiple ID genes was required to generate easily recognizable phenotypes. More recently, new model systems have revealed alterations in mice harboring deletions in single ID genes suggesting complex gene and tissue specific functions for members of the ID gene family. Because ID genes are highly expressed during development and their function is associated with a primitive, proliferative cellular phenotype there has been significant interest in understanding their potential roles in neoplasia. Indeed, numerous studies indicate an oncogenic function for ID1, ID2 and ID3. In contrast, the inhibitor of differentiation 4 (ID4) presents a paradigm shift in context of well-established role of ID1, ID2 and ID3 in development and cancer. Apart from some degree of functional redundancy such as HLH dependent interactions with bHLH protein E2A, many of the functions of ID4 are distinct from ID1, ID2 and ID3: ID4 proteins a) regulate distinct developmental processes and tissue expression in the adult, b) promote stem cell survival, differentiation and/or timing of differentiation, c) epigenetic inactivation/loss of expression in several advanced stage cancers and d) increased expression in some cancers such as those arising in the breast and ovary. Thus, in spite of sharing the conserved HLH domain, ID4 defies the established model of ID protein function and expression. The underlying molecular mechanism responsible for the unique role of ID4 as compared to other ID proteins still remains largely un-explored. This review will focus on the current understanding of ID4 in context of development and cancer. Copyright © 2014 Elsevier B.V. All rights reserved.

  9. Id-1 and Id-2 genes and products as markers of epithelial cancer

    Energy Technology Data Exchange (ETDEWEB)

    Desprez, Pierre-Yves (El Cerrito, CA); Campisi, Judith (Berkeley, CA)

    2011-10-04

    A method for detection and prognosis of breast cancer and other types of cancer. The method comprises detecting expression, if any, for both an Id-1 and an Id-2 genes, or the ratio thereof, of gene products in samples of breast tissue obtained from a patient. When expressed, Id-1 gene is a prognostic indicator that breast cancer cells are invasive and metastatic, whereas Id-2 gene is a prognostic indicator that breast cancer cells are localized and noninvasive in the breast tissue.

  10. Id-1 and Id-2 genes and products as markers of epithelial cancer

    Science.gov (United States)

    Desprez, Pierre-Yves [El Cerrito, CA; Campisi, Judith [Berkeley, CA

    2011-10-04

    A method for detection and prognosis of breast cancer and other types of cancer. The method comprises detecting expression, if any, for both an Id-1 and an Id-2 genes, or the ratio thereof, of gene products in samples of breast tissue obtained from a patient. When expressed, Id-1 gene is a prognostic indicator that breast cancer cells are invasive and metastatic, whereas Id-2 gene is a prognostic indicator that breast cancer cells are localized and noninvasive in the breast tissue.

  11. Id-1 and Id-2 genes and products as markers of epithelial cancer

    Science.gov (United States)

    Desprez, Pierre-Yves; Campisi, Judith

    2008-09-30

    A method for detection and prognosis of breast cancer and other types of cancer. The method comprises detecting expression, if any, for both an Id-1 and an Id-2 genes, or the ratio thereof, of gene products in samples of breast tissue obtained from a patient. When expressed, Id-1 gene is a prognostic indicator that breast cancer cells are invasive and metastatic, whereas Id-2 gene is a prognostic indicator that breast cancer cells are localized and noninvasive in the breast tissue.

  12. Overexpression of Id1 in transgenic mice promotes mammary basal stem cell activity and breast tumorigenesis.

    Science.gov (United States)

    Shin, Dong-Hui; Park, Ji-Hye; Lee, Jeong-Yeon; Won, Hee-Young; Jang, Ki-Seok; Min, Kyueng-Whan; Jang, Si-Hyong; Woo, Jong-Kyu; Oh, Seung Hyun; Kong, Gu

    2015-07-10

    Inhibitor of differentiation/DNA binding (Id)1 is a crucial regulator of mammary development and breast cancer progression. However, its effect on stemness and tumorigenesis in mammary epithelial cells remains undefined. Herein, we demonstrate that Id1 induces mammary tumorigenesis by increasing normal and malignant mammary stem cell (MaSC) activities in transgenic mice. MaSC-enriched basal cell expansion and increased self-renewal and in vivo regenerative capacity of MaSCs are observed in the mammary glands of MMTV-Id1 transgenic mice. Furthermore, MMTV-Id1 mice develop ductal hyperplasia and mammary tumors with highly expressed basal markers. Id1 also increases breast cancer stem cell (CSC) population and activity in human breast cancer lines. Moreover, the effects of Id1 on normal and malignant stem cell activities are mediated by the Wnt/c-Myc pathway. Collectively, these findings provide in vivo genetic evidence of Id1 functions as an oncogene in breast cancer and indicate that Id1 regulates mammary basal stem cells by activating the Wnt/c-Myc pathway, thereby contributing to breast tumor development.

  13. Guinea pig ID-like families of SINEs.

    Science.gov (United States)

    Kass, David H; Schaetz, Brian A; Beitler, Lindsey; Bonney, Kevin M; Jamison, Nicole; Wiesner, Cathy

    2009-05-01

    Previous studies have indicated a paucity of SINEs within the genomes of the guinea pig and nutria, representatives of the Hystricognathi suborder of rodents. More recent work has shown that the guinea pig genome contains a large number of B1 elements, expanding to various levels among different rodents. In this work we utilized A-B PCR and screened GenBank with sequences from isolated clones to identify potentially uncharacterized SINEs within the guinea pig genome, and identified numerous sequences with a high degree of similarity (>92%) specific to the guinea pig. The presence of A-tails and flanking direct repeats associated with these sequences supported the identification of a full-length SINE, with a consensus sequence notably distinct from other rodent SINEs. Although most similar to the ID SINE, it clearly was not derived from the known ID master gene (BC1), hence we refer to this element as guinea pig ID-like (GPIDL). Using the consensus to screen the guinea pig genomic database (Assembly CavPor2) with Ensembl BlastView, we estimated at least 100,000 copies, which contrasts markedly to just over 100 copies of ID elements. Additionally we provided evidence of recent integrations of GPIDL as two of seven analyzed conserved GPIDL-containing loci demonstrated presence/absence variants in Cavia porcellus and C. aperea. Using intra-IDL PCR and sequence analyses we also provide evidence that GPIDL is derived from a hystricognath-specific SINE family. These results demonstrate that this SINE family continues to contribute to the dynamics of genomes of hystricognath rodents.

  14. Id1 restrains p21 expression to control endothelial progenitor cell formation.

    Directory of Open Access Journals (Sweden)

    Alessia Ciarrocchi

    Full Text Available Loss of Id1 in the bone marrow (BM severely impairs tumor angiogenesis resulting in significant inhibition of tumor growth. This phenotype has been associated with the absence of circulating endothelial progenitor cells (EPCs in the peripheral blood of Id1 mutant mice. However, the manner in which Id1 loss in the BM controls EPC generation or mobilization is largely unknown. Using genetically modified mouse models we demonstrate here that the generation of EPCs in the BM depends on the ability of Id1 to restrain the expression of its target gene p21. Through a series of cellular and functional studies we show that the increased myeloid commitment of BM stem cells and the absence of EPCs in Id1 knockout mice are associated with elevated p21 expression. Genetic ablation of p21 rescues the EPC population in the Id1 null animals, re-establishing functional BM-derived angiogenesis and restoring normal tumor growth. These results demonstrate that the restraint of p21 expression by Id1 is one key element of its activity in facilitating the generation of EPCs in the BM and highlight the critical role these cells play in tumor angiogenesis.

  15. Noorteadlased kaitsesid doktoritöid

    Index Scriptorium Estoniae

    2002-01-01

    13. sept. 2002.a. kaitsesid TPÜ-s doktoritöid Mare Leino ("Sotsiaalsed probleemid koolis ja õpetaja toimetulek" ja Maaris Raudsepp ("Loodussäästlikkus kui regulatiivne idee: sotsiaal-psühholoogiline analüüs")

  16. Independence Day 2004 (ID04) / Raul Hindov

    Index Scriptorium Estoniae

    Hindov, Raul

    2004-01-01

    Ülevaade 20.-22. veebruarini 2004 toimunud kaugluurepatrullide rännaku ja sõdurioskuste kompleksõppusest ID04 (Independence Day 2004 - Iseseisvuspäev 2004), millel osales 25 patrullvõistlusteks valmistuvat meest ja naist

  17. Independence Day 2004 (ID04) / Raul Hindov

    Index Scriptorium Estoniae

    Hindov, Raul

    2004-01-01

    Ülevaade 20.-22. veebruarini 2004 toimunud kaugluurepatrullide rännaku ja sõdurioskuste kompleksõppusest ID04 (Independence Day 2004 - Iseseisvuspäev 2004), millel osales 25 patrullvõistlusteks valmistuvat meest ja naist

  18. Overexpression of Id1 in transgenic mice promotes mammary basal stem cell activity and breast tumorigenesis

    OpenAIRE

    Shin, Dong-Hui; Park, Ji-Hye; Lee, Jeong-Yeon; Won, Hee-Young; Jang, Ki-Seok; MIN, KYUENG-WHAN; Jang, Si-Hyong; Woo, Jong-Kyu; Oh, Seung Hyun; Kong, Gu

    2015-01-01

    Inhibitor of differentiation/DNA binding (Id)1 is a crucial regulator of mammary development and breast cancer progression. However, its effect on stemness and tumorigenesis in mammary epithelial cells remains undefined. Herein, we demonstrate that Id1 induces mammary tumorigenesis by increasing normal and malignant mammary stem cell (MaSC) activities in transgenic mice. MaSC-enriched basal cell expansion and increased self-renewal and in vivo regenerative capacity of MaSCs are observed in th...

  19. Selection of starter cultures for idli batter fermentation and their effect on quality of idlis.

    Science.gov (United States)

    Sridevi, J; Halami, Prakash M; Vijayendra, S V N

    2010-10-01

    Idli batter samples were prepared using lactic starter cultures like Pediococcus pentosaceus (Pp), Enterococcus faecium MTCC 5153 (Ef), Ent. faecium (IB2 Ef-IB2), individually, along with the yeast culture, Candida versatilis (Cv). Idli batter prepared using Ef and Ef-IB2 cultures gave better results, when evaluated for the rise in batter volume (80 ml), level of CO2 production (23.8%), titratable acidity 2.4-3.5% (lactic acid) and pH 4.3-4.4. Storage stability of batter made with selected starter cultures was determined by analyzing the idlis prepared using the batter stored for 1 and 5 days for texture, nutrient composition and sensory quality. Slight variations in the results were seen among the idlis of different combination of cultures, whereas these results are better than that of the idlis made using naturally fermented idli batter. Sensory profile of idlis prepared using starter cultures had a higher score (3.9-4.4) compared to the control (3.6) for overall acceptability.

  20. Smad3 mediates immediate early induction of Id1 by TGF-β

    Institute of Scientific and Technical Information of China (English)

    Yao-Yun Liang; F Charles Brunicardi; Xia Lin

    2009-01-01

    Id1 is a member of the inhibitor of diflferentiation(Id) protein family that regulates a wide range of cell functions.Previous studies have shown that expression of the ID1 gene is down-regulated by TGF-β in epithelial cells,whereas it is up-regulated by BMP in a variety of cell types.During our study of the biological function of TGF-β1,we found that ldl can be strongly up-regulated by TGF-β1 in the human mammary gland epithelial cell line MCF10A.Quanti-taftve real-time RT-PCR has revealed as high as 7.5-fold induction of ID1 mRNA by TGF-β1 in MCFlOA cells after 1 h of TGF-β1 stimulation,and this induction does not require de novo protein synthesis.Using Smad knockdown and knockout approaches.we have identiffed Smad3 as the responsible R-Smad for mediating transcriptional activation of the Id1 gene.Chromatin immunoprecipitation assay confirms that Smad3 and Smad4 bind to the upstream region of the Id1 gene.Our resuIts demonstrate that Smad3,but not Smad2,mediates TGF-β1-dependent early transcrip-tional induction of Id1.

  1. Engagement of membrane immunoglobulin enhances Id3 promoter activity in WEHI-231 B lymphoma cells

    Institute of Scientific and Technical Information of China (English)

    Xiao-jun LI; Kikumi HATA; Junichiro MIZUGUCHI

    2005-01-01

    Aim: We have recently shown that engagement of membrane immunoglobulin (mIg) induced upregulation of inhibitor of differentiation 3 (Id3) mRNA, resulting in growth arrest at G1 phase in WEHI-231 cells. In the present study, we examined whether engagement of mIg will affect promoter activity of the Id3 gene in WEHI231 cells. Methods: DNA fragments corresponding to the 5′-flanking region of mId3 gene were amplified by polymerase chain reaction (PCR) using genomic DNA as the template. Three DNA fragments upstream of the transcription start site (+ 1) of the mId3 gene were subcloned into the luciferase reporter vector PGVB2. The recombinant constructs were transiently transfected into WEHI-231 cells by an electroporation method. After incubation for 24 h, WEHI-231 cells were stimulated with 10 mg/L anti-IgM or irradiated CD40L-expressing NIH3T3 cells or control NIH3T3 cells for further 24 h, followed by assay for luciferase activity. Results: The luciferase analysis demonstrated that basal promoter activity of the Id3 gene was found in the region between -200 and +54. The Id3 promoter activity was increased 2-fold following stimulation with anti-IgM, but not CD40L, compared with medium alone. Conclusion: The mIg-mediated upregulation of Id3 expression is controlled, at least in part, through transcriptional regulation, as assessed by luciferase assay.

  2. Laboratory testing of the in-well vapor-stripping system

    Energy Technology Data Exchange (ETDEWEB)

    Gilmore, T.J.; Francois, O.

    1996-03-01

    The Volatile organic Compounds-Arid Integrated Demonstration (VOC-Arid ID) was implemented by the US Department of Energy`s (DOE`s) Office of Technology Development to develop and test new technologies for the remediation of organic chemicals in the subsurface. One of the technologies being tested under the VOC-Arid ID is the in-well vapor-stripping system. The in-well vapor-stripping concept was initially proposed by researchers at Stanford University and is currently under development through a collaboration between workers at Stanford University and DOE`s Pacific Northwest National Laboratory. The project to demonstrate the in-well vapor-stripping technology is divided into three phases: (1) conceptual model and computer simulation, (2) laboratory testing, and (3) field demonstration. This report provides the methods and results of the laboratory testing in which a full-scale replica was constructed and tested above ground in a test facility located at DOE`s Hanford Site, Washington. The system is a remediation technology designed to preferentially extract volatile organic compounds (VOCs) from contaminated groundwater by converting them to a vapor phase.

  3. The {\\tt Mathematica} package {\\tt TopoID} and its application to the Higgs boson production cross section

    CERN Document Server

    Hoff, Jens

    2016-01-01

    We present the {\\tt Mathematica} package {\\tt TopoID} which aims at the automation of several steps in multiloop calculations. The algorithm which lies at the very core of the package is described and illustrated with an example. The main features of {\\tt TopoID} are stated and some of them are briefly demonstrated for NLO or NNLO Higgs boson production.

  4. IDS in Telecommunication Network using PCA

    Directory of Open Access Journals (Sweden)

    T. K. Abdelhamid

    2013-07-01

    Full Text Available Data Security has become a very serious part of any organizational information system.Internet threatshavebecome moreintelligentso itcan deceivethe basic security solutions such as firewalls and antivirusscanners.To enhance the overall security of the networkan additional security layer such asintrusiondetection system(IDShas to be added.The anomaly detection IDSisa typeof IDS thatcandifferentiatebetweennormal and abnormal in thedata monitored. This paper proposes two types of IDS, oneof themcanbeusedasa network intrusion detection system(NIDS with overallsuccess (0.9161 and highdetection rate (0.9288 andtheothertypecanalso beusedasa host intrusion detection system(HIDS withoverall success (0.8493 and very high detection rate (0.9628using NSL-KDD data set

  5. Haro sur l’idéologie

    Directory of Open Access Journals (Sweden)

    Jean-Pierre Bertrand

    2007-02-01

    Full Text Available Consacrer une journée d’études à la question de l’idéologie dans les études littéraires, ce n’est pas réhabiliter une notion qui a porté toute la tradition sociocritique, de Lukàcs à Hamon, en passant par Barthes, Dubois, Duchet et tant d’autres, en référence à la célèbre définition qu’en avait donné Althusser dans Positions. Ce n’est pas non plus enterrer très idéologiquement une notion dont on découvrirait, en cette ère de postmodernité, l’incongruité opérationnelle. C’est pour le moins fai...

  6. 1-Hydroxy-2-methyl-2-(E)-butenyl 4-diphosphate reductase (IDS) is encoded by multicopy genes in gymnosperms Ginkgo biloba and Pinus taeda.

    Science.gov (United States)

    Kim, Sang-Min; Kuzuyama, Tomohisa; Kobayashi, Akio; Sando, Tomoki; Chang, Yung-Jin; Kim, Soo-Un

    2008-01-01

    Isoprenoids are synthesized through the condensation of five-carbon intermediates, isopentenyl diphosphate (IPP) and dimethylallyl diphosphate (DMAPP), derived from two distinct biosynthetic routes: cytosolic mevalonate (MVA) and plastidial 2-C-methyl-D: -erythritol 4-phosphate (MEP) pathways. 1-Hydroxy-2-methyl-2-(E)-butenyl 4-diphosphate reductase (IDS; EC 1.17.1.2), which catalyzes the last step of MEP pathway, was cloned as a multicopy gene from gymnosperms Ginkgo biloba (GbIDS1, GbIDS2, and GbIDS2-1) and Pinus taeda (PtIDS1 and PtIDS2), and characterized. Phylogenetic tree constructed with other plant IDSs demonstrated gymnosperm IDSs were distinctively different from angiosperm IDSs. The gymnosperm IDS clade contained two subclades, one composed of GbIDS1 and PtIDS1, and the other composed of GbIDS2, GbIDS2-1, and PtIDS2. G. biloba IDSs, except GbIDS2-1, successfully complemented Escherichia coli DLYT1, a lytB disruptant, confirming the in vivo competency of isozymes. During the 4 weeks study period, although transcript levels of GbIDS1s were similar both in roots and leaves of cultured G. biloba embryo, the transcripts of GbIDS2 predominantly occurred in the embryo roots, where diterpene ginkgolides are biosynthesized. Levels of PtIDS2 transcripts in the diterpenoid resin-producing wood were 4-5 times higher than those in other tissues. Higher levels of GbIDS1 transcripts were induced by light, whereas those of GbIDS2 were increased by methyl jasmonate treatment. These results strongly imply GbIDS2 and PtIDS2 have high correlation with secondary metabolism. In Arabidopsis transient expression system, N-terminal 100 amino acid residues of GbIDS1 delivered fused GFP protein into chloroplast as well as cytosol and nucleus, whereas those of GbIDS2, GbIDS2-1, and two PtIDSs delivered GFP only into chloroplast.

  7. Launch Vehicle Dynamics Demonstrator Model

    Science.gov (United States)

    1963-01-01

    Launch Vehicle Dynamics Demonstrator Model. The effect of vibration on launch vehicle dynamics was studied. Conditions included three modes of instability. The film includes close up views of the simulator fuel tank with and without stability control. [Entire movie available on DVD from CASI as Doc ID 20070030984. Contact help@sti.nasa.gov

  8. ATF3 suppresses ESCC via downregulation of ID1

    Science.gov (United States)

    Li, Jian; Yang, Zishan; Chen, Zhiuguo; Bao, Yonghua; Zhang, Huijuan; Fang, Xinhui; Yang, Wancai

    2016-01-01

    Esophageal cancer is one of the most prevalent forms of cancer and has a particularly high mortality rate due to early metastasis; however, the underlying mechanisms of its formation and progression remain unclear. The present study performed immunohistochemical analysis and observed that the expression of activating transcription factor 3 (ATF3) was reduced in esophageal squamous cell carcinoma (ESCC) in comparison with non-tumor adjacent tissues. By contrast, inhibitor of DNA binding 1 (ID1) was overexpressed in ESCC tissues, demonstrating an inverse correlation with ATF3 (P<0.01). In ESCC EC109 and KYSE450 cells lines, transfection with an ATF3-overexpression plasmid resulted in the inhibition of cell proliferation, motility and migration, which was associated with the induction of E-cadherin expression and inhibition of cyclin D1 and Twist. Notably, ATF3 exerted an inverse regulatory interaction with ID1. The results of the present study provide additional evidence of the tumor suppressive features of ATF3 and demonstrate a novel mechanism of ATF3-mediated inhibition of cancer metastasis in esophageal cancer. PMID:27602100

  9. Tarbijakaitse ei sekku esialgu ID-pileti projekti / Urmas Seaver

    Index Scriptorium Estoniae

    Seaver, Urmas, 1973-

    2004-01-01

    Tallinna ID-pileti müügil teenustasu võtmist arvustanud riigi tarbijakaitse amet ei sekku esialgu käivituvasse projekti, sest linnavalitsus võimaldab osta kahest teeninduspunktist ID-piletit ka teenustasuta

  10. Remembering one's ID/E-ntity: E/ID protein regulation of T cell memory.

    Science.gov (United States)

    Omilusik, Kyla D; Shaw, Laura A; Goldrath, Ananda W

    2013-10-01

    Upon infection, CD8(+) T cells proliferate and differentiate into armed effector cells capable of eliminating the assaulting pathogen. Although the majority of the antigen-specific T cells will die as the immune response wanes, a few will survive indefinitely to establish the memory population and provide long-lived protection against reinfection. E protein transcription factors and their inhibitors, ID proteins, operate to balance expression of genes that control CD8(+) T cell differentiation through this process. Here, we discuss the role of ID2 and ID3 in promoting the generation and survival of effector and memory populations, particularly highlighting their reciprocal roles in shaping the CD8(+) T cell response unique to the inflammatory milieu. We further examine this coordinated control of gene expression in the context of additional transcription factors within the transcriptional network that programs CD8(+) effector and memory T cell differentiation.

  11. Analysis list: ID1 [Chip-atlas[Archive

    Lifescience Database Archive (English)

    Full Text Available ID1 Digestive tract + hg19 http://dbarchive.biosciencedbc.jp/kyushu-u/hg19/target/ID...1.1.tsv http://dbarchive.biosciencedbc.jp/kyushu-u/hg19/target/ID1.5.tsv http://dbarchive.biosciencedbc.jp/kyushu-u/hg19/target/ID...1.10.tsv http://dbarchive.biosciencedbc.jp/kyushu-u/hg19/colo/ID1.Digestive_tract.tsv http://dbarchive.biosciencedbc.jp/kyushu-u/hg19/colo/Digestive_tract.gml ...

  12. Id transcriptional regulators in adipogenesis and adipose tissue metabolism.

    Science.gov (United States)

    Patil, Mallikarjun; Sharma, Bal Krishan; Satyanarayana, Ande

    2014-06-01

    Id proteins (Id1-Id4) are helix-loop-helix (HLH) transcriptional regulators that lack a basic DNA binding domain. They act as negative regulators of basic helix-loop-helix (bHLH) transcription factors by forming heterodimers and inhibit their DNA binding and transcriptional activity. Id proteins are implicated in the regulation of various cellular mechanisms such as cell proliferation, cellular differentiation, cell fate determination, angiogenesis and tumorigenesis. A handful of recent studies also disclosed that Id proteins have critical functions in adipocyte differentiation and adipose tissue metabolism. Here, we reviewed the progress made thus far in understanding the specific functions of Id proteins in adipose tissue differentiation and metabolism. In addition to reviewing the known mechanisms of action, we also discuss possible additional mechanisms in which Id proteins might participate in regulating adipogenic and metabolic pathways.

  13. To ID or Not to ID? Changes in Classification Rates of Intellectual Disability Using "DSM-5"

    Science.gov (United States)

    Papazoglou, Aimilia; Jacobson, Lisa A.; McCabe, Marie; Kaufmann, Walter; Zabel, T. Andrew

    2014-01-01

    The "Diagnostic and Statistical Manual of Mental Disorders-Fifth Edition" ("DSM-5") diagnostic criteria for intellectual disability (ID) include a change to the definition of adaptive impairment. New criteria require impairment in one adaptive domain rather than two or more skill areas. The authors examined the diagnostic…

  14. Low Physical Fitness Levels in Older Adults with ID: Results of the HA-ID Study

    Science.gov (United States)

    Hilgenkamp, Thessa I. M.; van Wijck, Ruud; Evenhuis, Heleen M.

    2012-01-01

    Physical fitness is as important to aging adults with ID as in the general population, but to date, the physical fitness levels of this group are unknown. Comfortable walking speed, muscle strength (grip strength), muscle endurance (30 s Chair stand) and cardiorespiratory endurance (10 m incremental shuttle walking test) were tested in a sample of…

  15. Low Physical Fitness Levels in Older Adults with ID: Results of the HA-ID Study

    Science.gov (United States)

    Hilgenkamp, Thessa I. M.; van Wijck, Ruud; Evenhuis, Heleen M.

    2012-01-01

    Physical fitness is as important to aging adults with ID as in the general population, but to date, the physical fitness levels of this group are unknown. Comfortable walking speed, muscle strength (grip strength), muscle endurance (30 s Chair stand) and cardiorespiratory endurance (10 m incremental shuttle walking test) were tested in a sample of…

  16. To ID or Not to ID? Changes in Classification Rates of Intellectual Disability Using "DSM-5"

    Science.gov (United States)

    Papazoglou, Aimilia; Jacobson, Lisa A.; McCabe, Marie; Kaufmann, Walter; Zabel, T. Andrew

    2014-01-01

    The "Diagnostic and Statistical Manual of Mental Disorders-Fifth Edition" ("DSM-5") diagnostic criteria for intellectual disability (ID) include a change to the definition of adaptive impairment. New criteria require impairment in one adaptive domain rather than two or more skill areas. The authors examined the diagnostic…

  17. ID1 Is a Functional Marker for Intestinal Stem and Progenitor Cells Required for Normal Response to Injury

    Directory of Open Access Journals (Sweden)

    Ning Zhang

    2014-11-01

    Full Text Available LGR5 and BMI1 mark intestinal stem cells in crypt base columnar cells and +4 position cells, respectively, but characterization of functional markers in these cell populations is limited. ID1 maintains the stem cell potential of embryonic, neural, and long-term repopulating hematopoietic stem cells. Here, we show in both human and mouse intestine that ID1 is expressed in cycling columnar cells, +4 position cells, and transit-amplifying cells in the crypt. Lineage tracing revealed ID1+ cells to be self-renewing, multipotent stem/progenitor cells that are responsible for the long-term renewal of the intestinal epithelium. Single ID1+ cells can generate long-lived organoids resembling mature intestinal epithelium. Complete knockout of Id1 or selective deletion of Id1 in intestinal epithelium or in LGR5+ stem cells sensitizes mice to chemical-induced colon injury. These experiments identify ID1 as a marker for intestinal stem/progenitor cells and demonstrate a role for ID1 in maintaining the potential for repair in response to colonic injury.

  18. VOCs in Arid soils: Technology summary

    Energy Technology Data Exchange (ETDEWEB)

    1994-02-01

    The Volatile Organic Compounds In Arid Soils Integrated Demonstration (VOC-Arid ID) focuses on technologies to clean up volatile organic compounds and associated contaminants in soil and groundwater at arid sites. The initial host site is the 200 West Area at DOE`s Hanford site in southeastern Washington state. The primary VOC contaminant is carbon tetrachloride, in association with heavy metals and radionuclides. An estimated 580--920 metric tons of carbon tetrachloride were disposed of between 1955 and 1973, resulting in extensive soil and groundwater contamination. The VOC-Arid ID schedule has been divided into three phases of implementation. The phased approach provides for: rapid transfer of technologies to the Environmental Restoration (EM-40) programs once demonstrated; logical progression in the complexity of demonstrations based on improved understanding of the VOC problem; and leveraging of the host site EM-40 activities to reduce the overall cost of the demonstrations. During FY92 and FY93, the primary technology demonstrations within the ID were leveraged with an ongoing expedited response action at the Hanford 200 West Area, which is directed at vapor extraction of VOCs from the vadose (unsaturated) zone. Demonstration efforts are underway in the areas of subsurface characterization including: drilling and access improvements, off-gas and borehole monitoring of vadose zone VOC concentrations to aid in soil vapor extraction performance evaluation, and treatment of VOC-contaminated off-gas. These current demonstration efforts constitute Phase 1 of the ID and, because of the ongoing vadose zone ERA, can result in immediate transfer of successful technologies to EM-40.

  19. DriveID: safety innovation through individuation.

    Science.gov (United States)

    Sawyer, Ben; Teo, Grace; Mouloua, Mustapha

    2012-01-01

    The driving task is highly complex and places considerable perceptual, physical and cognitive demands on the driver. As driving is fundamentally an information processing activity, distracted or impaired drivers have diminished safety margins compared with non- distracted drivers (Hancock and Parasuraman, 1992; TRB 1998 a & b). This competition for sensory and decision making capacities can lead to failures that cost lives. Some groups, teens and elderly drivers for example, have patterns of systematically poor perceptual, physical and cognitive performance while driving. Although there are technologies developed to aid these different drivers, these systems are often misused and underutilized. The DriveID project aims to design and develop a passive, automated face identification system capable of robustly identifying the driver of the vehicle, retrieve a stored profile, and intelligently prescribing specific accident prevention systems and driving environment customizations.

  20. Id2 deletion attenuates Apc-deficient ileal tumor formation

    Directory of Open Access Journals (Sweden)

    Kyoko Biyajima

    2015-08-01

    Full Text Available The expression level of inhibitor of DNA binding 2 (Id2 is increased in colorectal carcinomas and is positively correlated with poor prognosis. However, the functional significance of Id2 in intestinal tumorigenesis has not been fully defined using genetic approaches. Here, we show that Id2 promotes ileal tumor initiation in Apc-deficient mice. Expression of Id2 was stimulated by Wnt signaling through the enhancer region of the Id2 promoter at the early stage of tumorigenesis in Apc+/Δ716 (ApcΔ716 mice. Genetic depletion of Id2 in ApcΔ716 mice caused ∼80% reduction in the number of ileal polyps, but had little effect on tumor size. Notably, the lack of Id2 increased the number of apoptotic cells in the normal crypt epithelium of the mice. Furthermore, DNA microarray analysis revealed that the expression level of Max dimerization protein 1 (Mxd1, known as a c-Myc antagonist, was specifically increased by Id2 deletion in the ileal intestinal epithelium of ApcΔ716 mice. In contrast, the protein level of c-Myc, but not the mRNA level, was decreased by loss of Id2 in these mice. These results indicate that loss of Id2 inhibits tumor initiation by up-regulation of Mxd1 and down-regulation of c-Myc in ApcΔ716 mice.

  1. Tested Demonstrations.

    Science.gov (United States)

    Sands, Robert; And Others

    1982-01-01

    Procedures for two demonstrations are provided. The solubility of ammonia gas in water is demonstrated by introducing water into a closed can filled with the gas, collapsing the can. The second demonstration relates scale of standard reduction potentials to observed behavior of metals in reactions with hydrogen to produce hydrogen gas. (Author/JN)

  2. Protection against Mycobacterium leprae infection by the ID83/GLA-SE and ID93/GLA-SE vaccines developed for tuberculosis.

    Science.gov (United States)

    Duthie, Malcolm S; Coler, Rhea N; Laurance, John D; Sampaio, Lucas H; Oliveira, Regiane M; Sousa, Ana Lucia M; Stefani, Mariane M A; Maeda, Yumi; Matsuoka, Masanori; Makino, Masahiko; Reed, Steven G

    2014-09-01

    Despite the dramatic reduction in the number of leprosy cases worldwide in the 1990s, transmission of the causative agent, Mycobacterium leprae, is still occurring, and new cases continue to appear. New strategies are required in the pursuit of leprosy elimination. The cross-application of vaccines in development for tuberculosis may lead to tools applicable to elimination of leprosy. In this report, we demonstrate that the chimeric fusion proteins ID83 and ID93, developed as antigens for tuberculosis (TB) vaccine candidates, elicited gamma interferon (IFN-γ) responses from both TB and paucibacillary (PB) leprosy patients and from healthy household contacts of multibacillary (MB) patients (HHC) but not from nonexposed healthy controls. Immunization of mice with either protein formulated with a Toll-like receptor 4 ligand (TLR4L)-containing adjuvant (glucopyranosyl lipid adjuvant in a stable emulsion [GLA-SE]) stimulated antigen-specific IFN-γ secretion from pluripotent Th1 cells. When immunized mice were experimentally infected with M. leprae, both cellular infiltration into the local lymph node and bacterial growth at the site were reduced relative to those of unimmunized mice. Thus, the use of the Mycobacterium tuberculosis candidate vaccines ID83/GLA-SE and ID93/GLA-SE may confer cross-protection against M. leprae infection. Our data suggest these vaccines could potentially be used as an additional control measure for leprosy. Copyright © 2014, American Society for Microbiology. All Rights Reserved.

  3. Memristor Crossbar-based Hardware Implementation of IDS Method

    OpenAIRE

    Merrikh-Bayat, Farnood; Bagheri-Shouraki, Saeed; Rohani, Ali

    2010-01-01

    Ink Drop Spread (IDS) is the engine of Active Learning Method (ALM), which is the methodology of soft computing. IDS, as a pattern-based processing unit, extracts useful information from a system subjected to modeling. In spite of its excellent potential in solving problems such as classification and modeling compared to other soft computing tools, finding its simple and fast hardware implementation is still a challenge. This paper describes a new hardware implementation of IDS method based o...

  4. Commissioning of the IDS Neutron Detector and $\\beta$-decay fast-timing studies at IDS

    CERN Document Server

    Piersa, Monika

    2016-01-01

    The following report describes my scientific activities performed during the Summer Student Programme at ISOLDE. The main part of my project was focused on commissioning the neutron detector dedicated to nuclear decay studies at ISOLDE Decay Station (IDS). I have participated in all the steps needed to make it operational for the IS609 experiment. In the testing phase, we obtained expected detector response and calibrations confirmed its successful commissioning. The detector was mounted in the desired geometry at IDS and used in measurements of the beta-delayed neutron emission of $^8$He. After completing aforementioned part of my project, I became familiar with the fast-timing method. This technique was applied at IDS in the IS610 experiment performed in June 2016 to explore the structure of neutron-rich $^{130-134}$Sn nuclei. Since the main part of my PhD studies will be the analysis of data collected in this experiment, the second part of my project was dedicated to acquiring knowledge about technical de...

  5. Tested Demonstrations.

    Science.gov (United States)

    Gilbert, George L., Ed.

    1983-01-01

    Free radical chlorination of methane is used in organic chemistry to introduce free radical/chain reactions. In spite of its common occurrence, demonstrations of the reaction are uncommon. Therefore, such a demonstration is provided, including background information, preparation of reactants/reaction vessel, introduction of reactants, irradiation,…

  6. Tested Demonstrations.

    Science.gov (United States)

    Gilbert, George L., Ed.

    1983-01-01

    Discusses a supplement to the "water to rose" demonstration in which a pink color is produced. Also discusses blood buffer demonstrations, including hydrolysis of sodium bicarbonate, simulated blood buffer, metabolic acidosis, natural compensation of metabolic acidosis, metabolic alkalosis, acidosis treatment, and alkalosis treatment. Procedures…

  7. Complete Demonstration.

    Science.gov (United States)

    Yelon, Stephen; Maddocks, Peg

    1986-01-01

    Describes four-step approach to educational demonstration: tell learners they will have to perform; what they should notice; describe each step before doing it; and require memorization of steps. Examples illustrate use of this process to demonstrate a general mental strategy, and industrial design, supervisory, fine motor, and specific…

  8. Tested Demonstrations.

    Science.gov (United States)

    Gilbert, George L., Ed.

    1987-01-01

    Describes two laboratory demonstrations in chemistry. One uses dry ice, freon, and freezer bags to demonstrate volume changes, vapor-liquid equilibrium, a simulation of a rain forest, and vaporization. The other uses the clock reaction technique to illustrate fast reactions and kinetic problems in releasing carbon dioxide during respiration. (TW)

  9. Tested Demonstrations.

    Science.gov (United States)

    Gilbert, George L., Ed.

    1986-01-01

    Outlines a simple, inexpensive way of demonstrating electroplating using the reaction between nickel ions and copper metal. Explains how to conduct a demonstration of the electrolysis of water by using a colored Na2SO4 solution as the electrolyte so that students can observe the pH changes. (TW)

  10. Tested Demonstrations.

    Science.gov (United States)

    Gilbert, George L.

    1990-01-01

    Included are three demonstrations that include the phase change of ice when under pressure, viscoelasticity and colloid systems, and flame tests for metal ions. The materials, procedures, probable results, and applications to real life situations are included. (KR)

  11. Tested Demonstrations.

    Science.gov (United States)

    Gilbert, George L., Ed.

    1980-01-01

    Presented is a Corridor Demonstration which can be set up in readily accessible areas such as hallways or lobbies. Equipment is listed for a display of three cells (solar cells, fuel cells, and storage cells) which develop electrical energy. (CS)

  12. Tested Demonstrations.

    Science.gov (United States)

    Gilbert, George L., Ed.

    1987-01-01

    Presents three demonstrations suitable for undergraduate chemistry classes. Focuses on experiments with calcium carbide, the induction by iron of the oxidation of iodide by dichromate, and the classical iodine clock reaction. (ML)

  13. A Contextual Model for Identity Management (IdM) Interfaces

    Science.gov (United States)

    Fuller, Nathaniel J.

    2014-01-01

    The usability of Identity Management (IdM) systems is highly dependent upon design that simplifies the processes of identification, authentication, and authorization. Recent findings reveal two critical problems that degrade IdM usability: (1) unfeasible techniques for managing various digital identifiers, and (2) ambiguous security interfaces.…

  14. Evaluation of the chromogenic agar chromID C. difficile.

    Science.gov (United States)

    Eckert, Catherine; Burghoffer, Béatrice; Lalande, Valérie; Barbut, Frederic

    2013-03-01

    Three selective media (chromID C. difficile agar, taurocholate cycloserine cefoxitin agar [TCCA; homemade], and CLO medium) were compared from 406 stool samples of patients suspected of having Clostridium difficile infection. The sensitivities of chromID C. difficile agar at 24 h and 48 h, CLO medium, and TCCA were 74.1%, 87%, 85.2%, and 70.4%, respectively.

  15. Evaluation of the Chromogenic Agar chromID C. difficile

    OpenAIRE

    2013-01-01

    Three selective media (chromID C. difficile agar, taurocholate cycloserine cefoxitin agar [TCCA; homemade], and CLO medium) were compared from 406 stool samples of patients suspected of having Clostridium difficile infection. The sensitivities of chromID C. difficile agar at 24 h and 48 h, CLO medium, and TCCA were 74.1%, 87%, 85.2%, and 70.4%, respectively.

  16. ID Model Construction and Validation: A Multiple Intelligences Case

    Science.gov (United States)

    Tracey, Monica W.; Richey, Rita C.

    2007-01-01

    This is a report of a developmental research study that aimed to construct and validate an instructional design (ID) model that incorporates the theory and practice of multiple intelligences (MI). The study consisted of three phases. In phase one, the theoretical foundations of multiple Intelligences and ID were examined to guide the development…

  17. Evaluation of ID-PaGIA syphilis antibody test.

    Science.gov (United States)

    Naaber, Paul; Makoid, Ene; Aus, Anneli; Loivukene, Krista; Poder, Airi

    2009-01-01

    Laboratory diagnosis of syphilis is usually accomplished by serology. There are currently a large number of different commercial treponemal tests available that vary in format, sensitivity and specificity. To evaluate the ID-PaGIA Syphilis Antibody Test as an alternative to other specific treponemal tests for primary screening or confirmation of diagnosis. Serum samples from healthy adults (n = 100) were used for detection of specificity of ID-PaGIA. To evaluate sensitivity of ID-PaGIA serum samples (n = 101) from patients with confirmed or suspected syphilis were tested for syphilis antibodies with FTA-Abs IgM, ID-PaGIA, ELISA IgM and TPHA tests. No false-positive results were found with ID-PaGIA. Sensitivity of various treponemal tests was the following: FTA-Abs IgM: 95.5%, ID-PaGIA and ELISA IgM: 94%, and TPHA 75%. The positive and negative predictive values of ID-PaGIA were 100 and 89.5%, respectively. Compared with other treponemal tests ID-PaGIA has excellent sensitivity and specificity.

  18. The antibody response of pregnant Cameroonian women to VAR2CSA ID1-ID2a, a small recombinant protein containing the CSA-binding site

    DEFF Research Database (Denmark)

    Babakhanyan, Anna; Leke, Rose G F; Salanti, Ali;

    2014-01-01

    antigens, malarial antigens, or microbes. Currently, ID1-ID2a is a leading vaccine candidate, since it binds to the CSA with the same affinity as the full-length molecule and elicits binding-inhibitory antibodies in animals. Further studies are needed to determine if the presence of naturally acquired...... cross-reactive antibodies in women living in malaria endemic countries will alter the response to ID1-ID2a following vaccination with ID1-ID2a....

  19. Extending and implementing the Persistent ID pillars

    Science.gov (United States)

    Car, Nicholas; Golodoniuc, Pavel; Klump, Jens

    2017-04-01

    The recent double decade anniversary of scholarly persistent identifier use has triggered journal special editions such as "20 Years of Persistent Identifiers". For such a publication, it is apt to consider the longevity of some persistent identifier (PID) mechanisms (Digital Object Identifiers) and the partial disappearance of others (Life Sciences IDs). We have previously postulated a set of "PID Pillars" [1] which are design principles aimed at ensuring PIDs can survive technology and social change and thus persist for the long term that we have drawn from our observations of PIDs at work over many years. The principles: describe how to ensure identifiers' system and organisation independence; codify the delivery of essential PID system functions; mandate a separation of PID functions from data delivery mechanisms; and require generation of policies detailing how change is handled. In this presentation, first we extend on our previous work of introducing the pillars by refining their descriptions, giving specific suggestions for each and presenting some work that addresses them. Second, we propose a baseline data model for persistent identifiers that, if used, would assist the separation of PID metadata and PID system functioning. This would allow PID system function specifics to change over time (e.g. resolver services or even resolution protocols) and yet preserve the PIDs themselves. Third, we detail our existing PID system — the PID Service [2] — that partially implements the pillars and describe both its successes and shortcomings. Finally, we describe our planned next-generation system that will aim to use the baseline data model and fully implement the pillars.

  20. Classification of artificial intelligence ids for smurf attack

    CERN Document Server

    Ugtakhbayar, N; Sodbileg, Sh

    2012-01-01

    Many methods have been developed to secure the network infrastructure and communication over the Internet. Intrusion detection is a relatively new addition to such techniques. Intrusion detection systems (IDS) are used to find out if someone has intrusion into or is trying to get it the network. One big problem is amount of Intrusion which is increasing day by day. We need to know about network attack information using IDS, then analysing the effect. Due to the nature of IDSs which are solely signature based, every new intrusion cannot be detected; so it is important to introduce artificial intelligence (AI) methods / techniques in IDS. Introduction of AI necessitates the importance of normalization in intrusions. This work is focused on classification of AI based IDS techniques which will help better design intrusion detection systems in the future. We have also proposed a support vector machine for IDS to detect Smurf attack with much reliable accuracy.

  1. Secure Single Sign-On using CAS and OpenID

    Directory of Open Access Journals (Sweden)

    Mihai Gabriel Ionita

    2012-09-01

    Full Text Available As the number of connected applications increases, user convenience makes them use the same password, which can create vulnerabilities in an organization’s infrastructure. Therefore, those with security concerns regarding these activities, conducted in the electronic environment, came to support the idea of ​​Single Sign-On systems, having the user in mind. This concept facilitates the authentication process to various resources available on the Internet, or locally, using a single pair of credentials, only once, so it makes the „one for all” password, the method of writing passwords on post-it’s glued to the monitor , or keeping them stored in unsecured text files, sent into oblivion. This paper aims to make a comprehensive analysis of the infrastructure of security and authentication systems on the market. On the other hand, the project presents the implementation of several open source solutions such as OpenID, NTLM in PHP or the Central Authentication Service. For the application that uses OpenID an online store that has an administration page, to which access is restricted using OpenID credentials, was further secured by filtering these IDs in a MySQL database to prevent access to anyone having a valid OpenID credential. For the demonstration of NTLM enabled SSO, another website is used in which access has been blocked to a page. For accessing the page, a valid Windows authentication credential is required. Both the online-shop and demonstration site for NTLM are written in PHP. In addition, the systems using them are implemented also using PHP. For implementing the CAS demo, two Tomcat servlets have been used for demonstration purposes, additional filtering being done by an ApacheDS server.

  2. Tested Demonstrations.

    Science.gov (United States)

    Gilbert, George L., Ed.

    1987-01-01

    Describes two demonstrations to illustrate characteristics of substances. Outlines a method to detect the changes in pH levels during the electrolysis of water. Uses water pistols, one filled with methane gas and the other filled with water, to illustrate the differences in these two substances. (TW)

  3. ICT Demonstration

    DEFF Research Database (Denmark)

    Jensen, Tine Wirenfeldt; Bay, Gina

    In this demonstration we present and discuss two interrelated on-line learning resources aimed at supporting international students at Danish universities in building study skills (the Study Metro) and avoiding plagiarism (Stopplagiarism). We emphasize the necessity of designing online learning r...

  4. Expression of Id2 in the Second Heart Field and Cardiac Defects in Id2 Knock-Out Mice

    NARCIS (Netherlands)

    Jongbloed, M. R. M.; Vicente-Steijn, R.; Douglas, Y. L.; Wisse, L. J.; Mori, K.; Yokota, Y.; Bartelings, M. M.; Schalij, M. J.; Mahtab, E. A.; Poelmann, R. E.; Gittenberger-De Groot, A. C.

    2011-01-01

    The inhibitor of differentiation Id2 is expressed in mesoderm of the second heart field, which contributes myocardial and mesenchymal cells to the primary heart tube. The role of Id2 in cardiac development is insufficiently known. Heart development was studied in sequential developmental stages in I

  5. Idéologie : le mot, l’idée, la chose.

    Directory of Open Access Journals (Sweden)

    Pierre Macherey

    2008-04-01

    Full Text Available L’article examine les conditions dans lesquelles le néologisme « idéologie », entre 1796, date à laquelle il a été forgé par Destutt de Tracy, et 1845, date à laquelle il a été réutilisé par Marx, est passé d’une valeur positive (en tant que science générale des idées à une valeur connotée négativement (en tant que système social de croyances décalé par rapport à la réalité qu’il évoque.« Ideology : the word, the idea, the thing ». This paper studies the transvaluation of “ideology” as a neologism. Between 1796 (when the notion of “ideology” was invented by Destutt de Tracy and 1845 (when it was reused by Marx, “ideology” changed its positive value (it refers to a general science of ideas into a negative one (because it was referred to a social system of believes, shifted from the reality it mentions.

  6. Biometric authentication for ID cards with hologram watermarks

    Science.gov (United States)

    Croce Ferri, Lucilla; Mayerhoefer, Astrid; Frank, Marcus; Vielhauer, Claus; Steinmetz, Ralf

    2002-04-01

    We present an analysis of a new technique for the authentication of ID cardholders, based on the integration of a biometrics-based authentication system with digital watermarks. The chosen biometric authentication method is the dynamic signature verification of the ID cardholder, while we use a specific integrity watermark technique we developed, called Hologram Watermark, to embed and retrieve the off-line data onto an ID card. We take advantage of the fact, that two static biometric features (images of the user's face and signature) are already integral part of ID cards for manual verification and extent the stored biometric information by embedding on-line handwriting features of the signature as holographic watermarks in the overall image information of an ID card. Manipulation of any of the image information can be detected and will further disallow biometric verification of the forger. The Hologram Watermark technique produces content-related data using computer-generated hologram coding techniques. These data are embedded with watermarking techniques into the personal data printed on an ID card. The content-related data in this specific application are the dynamic features of the cardholder's signature. The main goal of this paper is to analyze the suitability of dynamic signature verification in combination with the Hologram Watermark technique, to facilitate automated user authentication based on information transparently embedded in ID cards.

  7. RPD: Reusable Pseudo-Id Distribution for a Secure and Privacy Preserving VANET

    Directory of Open Access Journals (Sweden)

    Sulaiman Ashraph

    2013-08-01

    Full Text Available In any VANET, security and privacy are the two fundamental issues. Obtaining efficient security in vehicular communication is essential without compromising privacy-preserving mechanisms. Designing a suitable protocol for VANET by having these two issues in mind is challenging because efficiency, unlinkablity and traceability are the three qualities having contradictions between them. In this paper, we introduce an efficient Reusable Pseudo-id Distribution (RPD scheme. The Trusted Authority (TA designating the Road Side Units (RSUs to generate n reusable pseudo ids and distribute them to the On Board Units (OBUs on request characterizes the proposed protocol. RSUs issue the aggregated hashes of all its valid pseudo-ids along with a symmetric shared key and a particular pseudo-id to each vehicle that enters into its coverage range. Through this the certificates attached to the messages can be eliminated and thus resulting in a significantly reduced packet size. The same anonymous keys can then be re-distributed by the RSUs episodically to other vehicles. We analyze the proposed protocol extensively to demonstrate its merits and efficiency.

  8. Identification of an active ID-like group of SINEs in the mouse.

    Science.gov (United States)

    Kass, David H; Jamison, Nicole

    2007-09-01

    The mouse genome consists of five known families of SINEs: B1, B2, B4/RSINE, ID, and MIR. Using RT-PCR we identified a germ-line transcript that demonstrates 92.7% sequence identity to ID (excluding primer sequence), yet a BLAST search identified numerous matches of 100% sequence identity. We analyzed four of these elements for their presence in orthologous genes in strains and subspecies of Mus musculus as well as other species of Mus using a PCR-based assay. All four analyzed elements were identified either only in M. musculus or exclusively in both M. musculus and M. domesticus, indicative of recent integrations. In conjunction with the identification of transcripts, we present an active ID-like group of elements that is not derived from the proposed BC1 master gene of ID elements. A BLAST of the rat genome indicated that these elements were not in the rat. Therefore, this family of SINEs has recently evolved, and since it has thus far been observed mainly in M. musculus, we refer to this family as MMIDL.

  9. BICM-ID with Physical Layer Network Coding in TWR Free Space Optical Communication Links

    Directory of Open Access Journals (Sweden)

    Alaa A. Saeed Al-Rubaie

    2017-07-01

    Full Text Available Physical layer network coding (PNC is a promising technique to improve the network throughput in a two-way relay (TWR channel for two users to exchange messages across a wireless network. The PNC technique incorporating a TWR channel is embraced by a free space optical (FSO communication link for full utilization of network resources, namely TWR-FSO PNC. In this paper, bit interleaved coded modulation with iterative decoding (BICM-ID is adopted to combat the deleterious effect of the turbulence channel by saving the message being transmitted to increase the reliability of the system. Moreover, based on this technique, comparative studies between end-to-end BICM-ID code, non-iterative convolutional coded and uncoded systems are carried out. Furthermore, this paper presents the extrinsic information transfer (ExIT charts to evaluate the performance of BICM-ID code combined with the TWR-FSO PNC system. The simulation results show that the proposed scheme can achieve a significant bit error rate (BER performance improvement through the introduction of an iterative process between a soft demapper and decoder. Similarly, Monte Carlo simulation results are provided to support the findings. Subsequently, the ExIT functions of the two receiver components are thoroughly analysed for a variety of parameters under the influence of a turbulence-induced channel fading, demonstrating the convergence behaviour of BICM-ID to enable the TWR-FSO PNC system, effectively mitigating the impact of the fading turbulence channel.

  10. nuID: a universal naming scheme of oligonucleotides for Illumina, Affymetrix, and other microarrays

    Directory of Open Access Journals (Sweden)

    Kibbe Warren A

    2007-05-01

    Full Text Available Abstract Background Oligonucleotide probes that are sequence identical may have different identifiers between manufacturers and even between different versions of the same company's microarray; and sometimes the same identifier is reused and represents a completely different oligonucleotide, resulting in ambiguity and potentially mis-identification of the genes hybridizing to that probe. Results We have devised a unique, non-degenerate encoding scheme that can be used as a universal representation to identify an oligonucleotide across manufacturers. We have named the encoded representation 'nuID', for nucleotide universal identifier. Inspired by the fact that the raw sequence of the oligonucleotide is the true definition of identity for a probe, the encoding algorithm uniquely and non-degenerately transforms the sequence itself into a compact identifier (a lossless compression. In addition, we added a redundancy check (checksum to validate the integrity of the identifier. These two steps, encoding plus checksum, result in an nuID, which is a unique, non-degenerate, permanent, robust and efficient representation of the probe sequence. For commercial applications that require the sequence identity to be confidential, we have an encryption schema for nuID. We demonstrate the utility of nuIDs for the annotation of Illumina microarrays, and we believe it has universal applicability as a source-independent naming convention for oligomers. Reviewers This article was reviewed by Itai Yanai, Rong Chen (nominated by Mark Gerstein, and Gregory Schuler (nominated by David Lipman.

  11. A Provably Secure Revocable ID-Based Authenticated Group Key Exchange Protocol with Identifying Malicious Participants

    Directory of Open Access Journals (Sweden)

    Tsu-Yang Wu

    2014-01-01

    Full Text Available The existence of malicious participants is a major threat for authenticated group key exchange (AGKE protocols. Typically, there are two detecting ways (passive and active to resist malicious participants in AGKE protocols. In 2012, the revocable identity- (ID- based public key system (R-IDPKS was proposed to solve the revocation problem in the ID-based public key system (IDPKS. Afterwards, based on the R-IDPKS, Wu et al. proposed a revocable ID-based AGKE (RID-AGKE protocol, which adopted a passive detecting way to resist malicious participants. However, it needs three rounds and cannot identify malicious participants. In this paper, we fuse a noninteractive confirmed computation technique to propose the first two-round RID-AGKE protocol with identifying malicious participants, which is an active detecting way. We demonstrate that our protocol is a provably secure AGKE protocol with forward secrecy and can identify malicious participants. When compared with the recently proposed ID/RID-AGKE protocols, our protocol possesses better performance and more robust security properties.

  12. Id-1 and Id-2 genes and products as therapeutic targets for treatment of breast cancer and other types of carcinoma

    Energy Technology Data Exchange (ETDEWEB)

    Desprez, Pierre-Yves; Campisi, Judith

    2014-09-30

    A method for treatment and amelioration of breast, cervical, ovarian, endometrial, squamous cells, prostate cancer and melanoma in a patient comprising targeting Id-1 or Id-2 gene expression with a delivery vehicle comprising a product which modulates Id-1 or Id-2 expression.

  13. Id-1 and Id-2 genes and products as therapeutic targets for treatment of breast cancer and other types of carcinoma

    Science.gov (United States)

    Desprez, Pierre-Yves; Campisi, Judith

    2014-09-30

    A method for treatment and amelioration of breast, cervical, ovarian, endometrial, squamous cells, prostate cancer and melanoma in a patient comprising targeting Id-1 or Id-2 gene expression with a delivery vehicle comprising a product which modulates Id-1 or Id-2 expression.

  14. Lowest-ID with Adaptive ID Reassignment: A Novel Mobile Ad-Hoc Networks Clustering Algorithm

    CERN Document Server

    Gavalas, Damianos; Konstantopoulos, Charalampos; Mamalis, Basilis

    2011-01-01

    Clustering is a promising approach for building hierarchies and simplifying the routing process in mobile ad-hoc network environments. The main objective of clustering is to identify suitable node representatives, i.e. cluster heads (CHs), to store routing and topology information and maximize clusters stability. Traditional clustering algorithms suggest CH election exclusively based on node IDs or location information and involve frequent broadcasting of control packets, even when network topology remains unchanged. More recent works take into account additional metrics (such as energy and mobility) and optimize initial clustering. However, in many situations (e.g. in relatively static topologies) re-clustering procedure is hardly ever invoked; hence initially elected CHs soon reach battery exhaustion. Herein, we introduce an efficient distributed clustering algorithm that uses both mobility and energy metrics to provide stable cluster formations. CHs are initially elected based on the time and cost-efficien...

  15. Role of yeast domination in Indian idli batter fermentation.

    Science.gov (United States)

    Soni, S K; Sandhu, D K

    1991-07-01

    Adding Saccharomyces cerevisiae, along with natural bacterial flora of the ingredients, was the best method for standardizing idli termentation in terms of improved organoleptic characteristics, leavening and nutritional constituents.

  16. Defining the safe current limit for opening ID photon shutter

    Energy Technology Data Exchange (ETDEWEB)

    Seletskiy, S. [Brookhaven National Lab. (BNL), Upton, NY (United States). Photon Sciences Dept.

    2015-12-14

    The NSLS-II storage ring is protected from possible damage from insertion devices (IDs) synchrotron radiation by a dedicated active interlock system (AIS). It monitors electron beam position and angle and triggers beam drop if beam orbit exceeds the boundaries of pre-calculated active interlock envelope (AIE). The beamlines (BL) and beamline frontends (FE) are designed under assumption that the electron beam is interlocked within the AIE. For historic reasons the AIS engages the ID active interlock (AI-ID) at any non-zero beam current whenever the ID photon shutter (IDPS) is getting opened. Such arrangement creates major inconveniences for BLs commissioning. Apparently there is some IDPS safe current limit (SCL) under which the IDPS can be opened without interlocking the e-beam. The goal of this paper is to find such limit.

  17. Scientists ID Key Fetal Cells Vulnerable to Zika

    Science.gov (United States)

    ... html Scientists ID Key Fetal Cells Vulnerable to Zika Lab study suggests possible mechanism for birth defects ... 29, 2016 (HealthDay News) -- The devastating mosquito-borne Zika virus can infect cells that play a role ...

  18. A Good IDS Response Protocol of MANET Containment Strategies

    Science.gov (United States)

    Cheng, Bo-Chao; Chen, Huan; Tseng, Ryh-Yuh

    Much recent research concentrates on designing an Intrusion Detection System (IDS) to detect the misbehaviors of the malicious node in MANET with ad-hoc and mobility natures. However, without rapid and appropriate IDS response mechanisms performing follow-up management services, even the best IDS cannot achieve the desired primary goal of the incident response. A competent containment strategy is needed to limit the extent of an attack in the Incident Response Life Cycle. Inspired by the T-cell mechanisms in the human immune system, we propose an efficient MANET IDS response protocol (T-SecAODV) that can rapidly and accurately disseminate alerts of the malicious node attacks to other nodes so as to modify their AODV routing tables to isolate the malicious nodes. Simulations are conducted by the network simulator (Qualnet), and the experiment results indicate that T-SecAODV is able to spread alerts steadily while greatly reduce faulty rumors under simultaneous multiple malicious node attacks.

  19. Genetics Experts Unite to I.D. Unknown Katrina Victims

    Science.gov (United States)

    ... Current Issue Past Issues Research News From NIH Genetics Experts Unite to I.D. Unknown Katrina Victims ... in the recent Advances in molecular biology and genetics," says team member Stephen Sherry, Ph.D., of ...

  20. FDIC Institution Directory (ID) -- Insured Insitution Download File

    Data.gov (United States)

    Federal Deposit Insurance Corporation — The FDIC's Institution Directory (ID) download file provides a list of all FDIC-insured institutions. The file includes demographic information related to the...

  1. idSpace: Supporting Designers to develop Innovative Products

    NARCIS (Netherlands)

    Sloep, Peter; Bitter-Rijpkema, Marlies; Retalis, Symeon; Georgiakakis, Petros; Dolog, Peter

    2009-01-01

    Sloep, P., Bitter-Rijpkema, M., Retalis, S., Georgiakakis, P., & Dolog, P. (2008). idSpace: Supporting Designers to develop Innovative Products. Presentation at Online Educa. December, 3, 2008. Berlin, Germany.

  2. Security analysis for biometric data in ID documents

    Science.gov (United States)

    Schimke, Sascha; Kiltz, Stefan; Vielhauer, Claus; Kalker, Ton

    2005-03-01

    In this paper we analyze chances and challenges with respect to the security of using biometrics in ID documents. We identify goals for ID documents, set by national and international authorities, and discuss the degree of security, which is obtainable with the inclusion of biometric into documents like passports. Starting from classical techniques for manual authentication of ID card holders, we expand our view towards automatic methods based on biometrics. We do so by reviewing different human biometric attributes by modality, as well as by discussing possible techniques for storing and handling the particular biometric data on the document. Further, we explore possible vulnerabilities of potential biometric passport systems. Based on the findings of that discussion we will expand upon two exemplary approaches for including digital biometric data in the context of ID documents and present potential risks attack scenarios along with technical aspects such as capacity and robustness.

  3. Study IDs 2 Zika Virus Proteins Linked to Microcephaly

    Science.gov (United States)

    ... gov/news/fullstory_160386.html Study IDs 2 Zika Virus Proteins Linked to Microcephaly Discovery might one day ... say they've identified two proteins in the Zika virus linked to the severe birth defect microcephaly. Babies ...

  4. Narva Aleksandri kirikusse paigaldatakse vitraažid / Irina Tokareva

    Index Scriptorium Estoniae

    Tokareva, Irina

    2004-01-01

    1919.a. hävinud vitraažid asendatakse Dolores Hoffmanni originaalsete piiblipersoone kujutavate vitraažidega. Kasutatakse uudset tehnoloogiat. vitraaže on kiriku kaheksa akna jaoks. Villu Jürjo kommentaarid

  5. RadNet Air Data From Idaho Falls, ID

    Science.gov (United States)

    This page presents radiation air monitoring and air filter analysis data for Idaho Falls, ID from EPA's RadNet system. RadNet is a nationwide network of monitoring stations that measure radiation in air, drinking water and precipitation.

  6. Hester Prynne:the Commendable Balance of Id, Ego and Superego

    Institute of Scientific and Technical Information of China (English)

    佴欣欣; 李千

    2014-01-01

    Hester Prynne, the central character in The Scarlet Letter, is the ultimate example of sin in the eyes of Puritans. Howev-er, she finally manages to rewrite the meaning of scarlet letter"A". Through the lenses of Sigmund Freud’id, ego, and superego, it will be demonstrated that how she succeeds in balancing these three psychological elements, and making her spiritual develop-ment and transformation.

  7. GASIS demonstration

    Energy Technology Data Exchange (ETDEWEB)

    Vidas, E.H. [Energy and Environmental Analysis, Inc., Arlington, VA (United States)

    1995-04-01

    A prototype of the GASIS database and retrieval software has been developed and is the subject of this poster session and computer demonstration. The prototype consists of test or preliminary versions of the GASIS Reservoir Data System and Source Directory datasets and the software for query and retrieval. The prototype reservoir database covers the Rocky Mountain region and contains the full GASIS data matrix (all GASIS data elements) that will eventually be included on the CD-ROM. It is populated for development purposes primarily by the information included in the Rocky Mountain Gas Atlas. The software has been developed specifically for GASIS using Foxpro for Windows. The application is an executable file that does not require Foxpro to run. The reservoir database software includes query and retrieval, screen display, report generation, and data export functions. Basic queries by state, basin, or field name will be assisted by scrolling selection lists. A detailed query screen will allow record selection on the basis of any data field, such as depth, cumulative production, or geological age. Logical operators can be applied to any-numeric data element or combination of elements. Screen display includes a {open_quotes}browse{close_quotes} display with one record per row and a detailed single record display. Datasets can be exported in standard formats for manipulation with other software packages. The Source Directory software will allow record retrieval by database type or subject area.

  8. Biometrics and ID Cards — Enablers for Personal Security

    Science.gov (United States)

    Reisen, Andreas

    The electronic ID card is a modernization and security project of the German Government. On the one hand, the multifunctional card is intended to boost security and the convenience of e-government and e-business applications. On the other hand, the new biometric ID card should allow citizens to use it as a travel document in the Schengen area and for specific destinations outside the European Union also in the future.

  9. Accelerated fermentation of 'idli' batter using soy residue okara.

    Science.gov (United States)

    Rekha, C R; Vijayalakshmi, G

    2011-06-01

    The aim of this work was to reduce the natural fermentation period of 'idli' from the conventional 14 h to 10 h by adding underutilized okara for the preparation of 'idli'. Black gram was partially substituted with soy residue okara in the ratio of (1:1). After 14 h of natural fermentation, the pH and total acidity of control 'idli' batter was 4.51 and 0.64% and that of okara fortified 'idli' batter was 4.53 and 0.43%, respectively. The amount of CO2 released by the control and okara fortified batter was 19.7% and 33.6% respectively. The viable count of yeast and mold, lactics and mesophilic bacteria in control & okara batter increased with time reaching 9.00 & 10.34, 8.66 & 7.69, and 8.65 & 9.47 log10 cfu/g, respectively at the end of 10 h of natural fermentation. Okara fortified 'idli' was soft and spongy compared to control 'idli' .

  10. BioID Identification of Lamin-Associated Proteins.

    Science.gov (United States)

    Mehus, Aaron A; Anderson, Ruthellen H; Roux, Kyle J

    2016-01-01

    A- and B-type lamins support the nuclear envelope, contribute to heterochromatin organization, and regulate a myriad of nuclear processes. The mechanisms by which lamins function in different cell types and the mechanisms by which lamin mutations cause over a dozen human diseases (laminopathies) remain unclear. The identification of proteins associated with lamins is likely to provide fundamental insight into these mechanisms. BioID (proximity-dependent biotin identification) is a unique and powerful method for identifying protein-protein and proximity-based interactions in living cells. BioID utilizes a mutant biotin ligase from bacteria that is fused to a protein of interest (bait). When expressed in living cells and stimulated with excess biotin, this BioID-fusion protein promiscuously biotinylates directly interacting and vicinal endogenous proteins. Following biotin-affinity capture, the biotinylated proteins can be identified using mass spectrometry. BioID thus enables screening for physiologically relevant protein associations that occur over time in living cells. BioID is applicable to insoluble proteins such as lamins that are often refractory to study by other methods and can identify weak and/or transient interactions. We discuss the use of BioID to elucidate novel lamin-interacting proteins and its applications in a broad range of biological systems, and provide detailed protocols to guide new applications.

  11. Multimodal biometrics for identity documents (MBioID).

    Science.gov (United States)

    Dessimoz, Damien; Richiardi, Jonas; Champod, Christophe; Drygajlo, Andrzej

    2007-04-11

    The MBioID initiative has been set up to address the following germane question: What and how biometric technologies could be deployed in identity documents in the foreseeable future? This research effort proposes to look at current and future practices and systems of establishing and using biometric identity documents (IDs) and evaluate their effectiveness in large-scale developments. The first objective of the MBioID project is to present a review document establishing the current state-of-the-art related to the use of multimodal biometrics in an IDs application. This research report gives the main definitions, properties and the framework of use related to biometrics, an overview of the main standards developed in the biometric industry and standardisation organisations to ensure interoperability, as well as some of the legal framework and the issues associated to biometrics such as privacy and personal data protection. The state-of-the-art in terms of technological development is also summarised for a range of single biometric modalities (2D and 3D face, fingerprint, iris, on-line signature and speech), chosen according to ICAO recommendations and availabilities, and for various multimodal approaches. This paper gives a summary of the main elements of that report. The second objective of the MBioID project is to propose relevant acquisition and evaluation protocols for a large-scale deployment of biometric IDs. Combined with the protocols, a multimodal database will be acquired in a realistic way, in order to be as close as possible to a real biometric IDs deployment. In this paper, the issues and solutions related to the acquisition setup are briefly presented.

  12. Imaging finite-fault earthquake source by iterative deconvolution and stacking (IDS) of near-field complete seismograms

    Science.gov (United States)

    Wang, Rongjiang; Zhang, Yong; Zschau, Jochen; Chen, Yun-tai; Parolai, Stefano; Diao, Faqi; Dahm, Torsten

    2015-04-01

    By combining the complementary advantages of conventional inversion and back-projection methods, we have developed an iterative deconvolution and stacking (IDS) approach for imaging earthquake rupture processes with near-field complete waveform data. This new approach does not need any manual adjustment of the physical (empirical) constraints, such as restricting the rupture time and duration, smoothing the spatiotemporal slip distribution, etc., and therefore has the ability to image complex multiple ruptures automatically. The advantages of the IDS method over traditional linear or non-linear optimization algorithms are demonstrated by the case studies of the 2008 Wenchuan (China), 2011 Tohoku (Japan) and 2014 Pisagua-Iquique (Chile) earthquakes. For such large earthquakes, the IDS method is considerably more stable and efficient than previous inversion methods. Additionally, the robustness of this method is demonstrated by comprehensive synthetic tests, indicating its potential contribution to tsunami early warning and earthquake rapid response systems. It is also shown that the IDS method can be used for teleseismic waveform inversions. For the 2011 Tohoku earthquakes, for example, the IDS method can provide, without tuning any physical or empirical constraints, teleseismic rupture models consistent with those derived from the near-field GPS and strong-motion data.

  13. Role of Leuconostoc mesenteroides in Leavening the Batter of Idli, a Fermented Food of India1

    Science.gov (United States)

    Mukherjee, S. K.; Albury, M. N.; Pederson, C. S.; Van Veen, A. G.; Steinkraus, K. H.

    1965-01-01

    The fermentation of the batter of idli, a fermented food of India, was studied. The microorganisms responsible for the characteristic changes in the batter were isolated and identified. Although there is a sequential change in the bacterial flora, the predominant microorganism responsible for souring, as well as for gas production, was found to be Leuconostoc mesenteroides. In the later stages of fermentation, growth of Streptococcus faecalis and, still later, of Pediococcus cerevisiae becomes significant. The fermentation of idli demonstrates a leavening action caused by the activity of the heterofermentative lactic acid bacterium, L. mesenteroides. As far as is known, this is the first record of a leavening action produced exclusively by the activity of a lactic acid bacterium. Images Fig. 3 PMID:14325884

  14. ROLE OF LEUCONOSTOC MESENTEROIDES IN LEAVENING THE BATTER OF IDLI, A FERMENTED FOOD OF INDIA.

    Science.gov (United States)

    MUKHERJEE, S K; ALBURY, M N; PEDERSON, C S; VANVEEN, A G; STEINKRAUS, K H

    1965-03-01

    The fermentation of the batter of idli, a fermented food of India, was studied. The microorganisms responsible for the characteristic changes in the batter were isolated and identified. Although there is a sequential change in the bacterial flora, the predominant microorganism responsible for souring, as well as for gas production, was found to be Leuconostoc mesenteroides. In the later stages of fermentation, growth of Streptococcus faecalis and, still later, of Pediococcus cerevisiae becomes significant. The fermentation of idli demonstrates a leavening action caused by the activity of the heterofermentative lactic acid bacterium, L. mesenteroides. As far as is known, this is the first record of a leavening action produced exclusively by the activity of a lactic acid bacterium.

  15. The Self- and Other-Deception Questionnaires-Intellectual Disabilities (SDQ-ID and ODQ-ID): component analysis and reliability.

    Science.gov (United States)

    Jobson, Laura; Stanbury, Alexandra; Langdon, Peter E

    2013-10-01

    The objectives of this research were to: (1) investigate the component structure and psychometric properties of the Self- and Other-Deception Questionnaires-Intellectual Disabilities (SDQ-ID and ODQ-ID), (2) examine the relationship between social desirability and IQ, and (3) compare social desirability scores of those with intellectual disabilities (IDs) and a history of criminal offending to the social desirability scores of participants with IDs and those without IDs and no such history, controlling for general intellectual functioning. Men with mild to borderline IDs detained within medium secure inpatient forensic mental health services (N=40) completed the SDQ-ID and ODQ-ID at Time 1 and then two-weeks later at Time 2. Data for the men with and without IDs and no known criminal offending history were taken from a previous study (N=60). Following exploratory Principal Components Analysis, the number of questionnaire items were reduced, and a two-factor structure was found for the SDQ-ID which was labelled: (1) Positive Self Representation and (2) Denial of Intrusive Thoughts. A two-factor structure was also found for the ODQ-ID and these two factors were labelled: (1) Denial of Negative Social Interaction and (2) Untrustworthiness. Both the SDQ-ID and ODQ-ID had acceptable internal consistency and test-retest reliability. Fifteen percent of the variance in SDQ-ID scores was explained by Full Scale IQ, while 21% of the variance in ODQ-ID scores was explained by Full Scale IQ. Between group comparisons controlling for intelligence did not yield any significant differences. The shortened SDQ-ID and ODQ-ID have promising psychometric properties, and their component structures appear robust. Differences between men with and without IDs on these two measures of social desirability can be accounted for by differences in general intellectual functioning. Copyright © 2013 Elsevier Ltd. All rights reserved.

  16. Novel ID-based anti-collision approach for RFID

    Science.gov (United States)

    Zhang, De-Gan; Li, Wen-Bin

    2016-09-01

    Novel correlation ID-based (CID) anti-collision approach for RFID under the banner of the Internet of Things (IOT) has been presented in this paper. The key insights are as follows: according to the deterministic algorithms which are based on the binary search tree, we propose a method to increase the association between tags so that tags can initiatively send their own ID under certain trigger conditions, at the same time, we present a multi-tree search method for querying. When the number of tags is small, by replacing the actual ID with the temporary ID, it can greatly reduce the number of times that the reader reads and writes to tag's ID. Active tags send data to the reader by the way of modulation binary pulses. When applying this method to the uncertain ALOHA algorithms, the reader can determine the locations of the empty slots according to the position of the binary pulse, so it can avoid the decrease in efficiency which is caused by reading empty slots when reading slots. Theory and experiment show that this method can greatly improve the recognition efficiency of the system when applied to either the search tree or the ALOHA anti-collision algorithms.

  17. Long-range optical character recognition for product ID

    Science.gov (United States)

    Banta, Larry E.; Pertl, Franz A.; Rosenberry-Friend, Kimberly A.

    1998-10-01

    An automated product tag reading system based on CCD cameras and computer image processing has been developed by West Virginia University and demonstrated at the Weirton Steel Corporation. The system reads both a 50-mil barcode and a string of six numbers on a four-inch by six-inch tag fastened to the end of a steel slab. Feedback from the image is used to point and zoom the camera, making the system effective at ranges up to thirty feet, and in bright sunlight-situations where handheld barcode scanners are ineffective. A video camera is mounted on a pan/tilt head and connected to a personal computer through a frame grabber board. The whole system is mounted on a slab hauler--a huge wheeled machine for carrying 100 tons of steel slabs at a time. The slab hauler backs into position and presses `start' on a touchscreen operator interface. A wide-angle image is grabbed, and the computer analyzes the images to find product ID tags in scene. The camera is then zoomed and pointed one-by-one at the tags for closeup images. Geometric warping is done on the closeup images to correct for viewing angle distortion, and both the barcode and the alphanumeric code are read by the software and reported to the inventory management system via radio modern. This paper discusses the neural network-based system for reading the characters on the tag. The camera pointing system and barcode reader are discussed in a companion paper.

  18. Immunisation with ID83 fusion protein induces antigen-specific cell mediated and humoral immune responses in cattle.

    Science.gov (United States)

    Jones, Gareth J; Steinbach, Sabine; Clifford, Derek; Baldwin, Susan L; Ireton, Gregory C; Coler, Rhea N; Reed, Steven G; Vordermeier, H Martin

    2013-10-25

    In this study we have investigated the potential of mycobacterial proteins as candidate subunit vaccines for bovine tuberculosis. In addition, we have explored the use of TLR-ligands as potential adjuvants in cattle. In vitro screening assays with whole blood from Mycobacterium bovis-infected and BCG-vaccinated cattle demonstrated that fusion protein constructs were most commonly recognised, and the ID83 fusion protein was selected for further immunisation studies. Furthermore, glucopyranosyl lipid A (GLA) and resiquimod (R848), agonists for TLR4 and TLR7/8 respectively, stimulated cytokine production (IL-12, TNF-α, MIP-1β and IL-10) in bovine dendritic cell cultures, and these were formulated as novel oil-in-water emulsions (GLA-SE and R848-SE) for immunisation studies. Immunisation with ID83 in a water-in-oil emulsion adjuvant (ISA70) induced both cell mediated and humoral immune responses, as characterised by antigen-specific IFN-γ production, cell proliferation, IgG1 and IgG2 antibody production. In comparison, ID83 immunisation with the novel adjuvants induced weaker (ID83/R848-SE) or no (ID83/GLA-SE) antigen-specific IFN-γ production and cell proliferation. However, both did induce ID83-specific antibody production, which was restricted to IgG1 antibody isotype. Overall, these results provide encouraging preliminary data for the further development of ID83 in vaccine strategies for bovine TB. Crown Copyright © 2013. Published by Elsevier Ltd. All rights reserved.

  19. Increasing Effectiveness of IDS to Improve Security in Intranet

    Directory of Open Access Journals (Sweden)

    Umesh K. Singh

    2005-01-01

    Full Text Available Today Intrusion Detection Systems (IDS are becoming one of the most important tools for intranet security. Research regarding Intrusion Detection Systems (IDSs has become more active with the recent increases in illegal accesses to computer systems. Many researchers focus only on the techniques or mechanisms for detecting intrusions automatically, without considering the security of IDSs themselves. When an intruder attacks and breaks into a system, he or she often deletes system logs and stops auditing processes. Thus, the security of an intrusion detection system is an important aspect of intrusion detection. This study explores the methods for increasing effectiveness in configurations of an IDS for obtaining maximum effects in security in an intranet. We also discuss the hurdles that have blocked successful measurements in this area and present suggestions for improving effectiveness of an IDS.

  20. A Dynamic ID-based Remote User Authentication Scheme

    CERN Document Server

    Das, Manik Lal; Gulati, Ved P

    2004-01-01

    Password-based authentication schemes are the most widely used techniques for remote user authentication. Many static ID-based remote user authentication schemes both with and without smart cards have been proposed. Most of the schemes do not allow the users to choose and change their passwords, and maintain a verifier table to verify the validity of the user login. In this paper we present a dynamic ID-based remote user authentication scheme using smart cards. Our scheme allows the users to choose and change their passwords freely, and do not maintain any verifier table. The scheme is secure against ID-theft, and can resist the reply attacks, forgery attacks, guessing attacks, insider attacks and stolen verifier attacks.

  1. Effect of ingredients on sensory profile of idli.

    Science.gov (United States)

    Durgadevi, Manoharan; Shetty, Prathapkumar H

    2014-09-01

    Idli is a traditional fermented food and is consumed in India and Srilanka. The objective of the present study is to select the ingredients for optimum desirable product characteristics and to identify the optimum ratios of ingredients and fermentation time with respect to sensory attributes using Response Surface Methodology (RSM). The sensory attributes included were color, appearance, texture, taste and overall quality. Preliminary trials were conducted using five variants of rice and common black gram dhal before framing a model using Central Composite Rotatable Design (CCRD). From the study it was found that a desirable score of 0.7439 was obtained for sensory attributes of idli made with the ratio of 3: 1.475 for IR20 idli rice and ADT3 variety black gram (with husk removed after soaking) fermented for 10.2 h. Principal Component Analysis (PCA) helped to discriminate the samples and attributes within the data matrix, depending upon their inter relationships.

  2. Test and calibration of the IDS fast-timing electronics

    CERN Document Server

    AUTHOR|(CDS)2160817

    2016-01-01

    The ISOLDE decay station(IDS) is one of the permanent experimental setups at the ISOLDE facility of CERN. IDS is used to study decay properties of radioactive nuclei. Thus, fast-timing electronics are necessary for extracting nuclear half-lives. The aims of this work are testing and optimization of the IDS fast-timing electronics as well as measuring a nuclear level half-life in the decay of $^{152}$Eu. The energy resolution of LaBr$_3$ $\\gamma$-detectors was characterized and optimized. A nuclear level lifetime of $^{152}$Eu was measured after obtaining the best parameters for energy resolution and time walk. Dedicated sorting scripts were developed in ROOT in order of perform the characterization and optimization automatically.

  3. The Danish eID Case: Twenty years of Delay

    DEFF Research Database (Denmark)

    Hoff, Jens Villiam; Hoff, Frederik Villiam

    2010-01-01

    The focus of this article is to explain why there is still no qualified digital signature in Denmark as defined by the EU eSignatures Directive nor any other nationwide eID even though Denmark had an early start in eGovernment, and a high level of "e-readiness" compared to other nations. Laying out...... of intergovernmental coordination and lack of cooperation between public and private sector. However, with the recent tender on digital signatures won by the PBS and the roll-out of the NemID it seems that Denmark will finally - after twenty years of delay - have an eID which can be widely used in the public as well...

  4. Generating Decision Trees Method Based on Improved ID3 Algorithm

    Institute of Scientific and Technical Information of China (English)

    Yang Ming; Guo Shuxu1; Wang Jun3

    2011-01-01

    The ID3 algorithm is a classical learning algorithm of decision tree in data mining.The algorithm trends to choosing the attribute with more values,affect the efficiency of classification and prediction for building a decision tree.This article proposes a new approach based on an improved ID3 algorithm.The new algorithm introduces the importance factor λ when calculating the information entropy.It can strengthen the label of important attributes of a tree and reduce the label of non-important attributes.The algorithm overcomes the flaw of the traditional ID3 algorithm which tends to choose the attributes with more values,and also improves the efficiency and flexibility in the process of generating decision trees.

  5. Memristor Crossbar-based Hardware Implementation of IDS Method

    CERN Document Server

    Merrikh-Bayat, Farnood; Rohani, Ali

    2010-01-01

    Ink Drop Spread (IDS) is the engine of Active Learning Method (ALM), which is the methodology of soft computing. IDS, as a pattern-based processing unit, extracts useful information from a system subjected to modeling. In spite of its excellent potential in solving problems such as classification and modeling compared to other soft computing tools, finding its simple and fast hardware implementation is still a challenge. This paper describes a new hardware implementation of IDS method based on the memristor crossbar structure. In addition of simplicity, being completely real-time, having low latency and the ability to continue working after the occurrence of power breakdown are some of the advantages of our proposed circuit.

  6. Nuovo terreno cromogeno MRSA ID per la rilevazione di S. aureus meticillino-resistente: affidabilità nella lettura

    Directory of Open Access Journals (Sweden)

    Marco Arosio

    2006-06-01

    Full Text Available We proceeded to the evaluation of the reability of reading and interpretation of cultures on the chromogenic medium MRSA ID for the detection of methicillin-resistant S. aureus, within a surveillance program. Our observations demonstrate such method results a useful instrument of screening for the prevention and the control of the spread of the infections by MRSA.

  7. A functionally significant polymorphism in ID3 is associated with human coronary pathology.

    Directory of Open Access Journals (Sweden)

    Ani Manichaikul

    Full Text Available We previously identified association between the ID3 SNP rs11574 and carotid intima-media thickness in the Diabetes Heart Study, a predominantly White diabetic population. The nonsynonymous SNP rs11574 results in an amino acid substitution in the C-terminal region of ID3, attenuating the dominant negative function of ID3 as an inhibitor of basic HLH factor E12-mediated transcription. In the current investigation, we characterize the association between the functionally significant polymorphism in ID3, rs11574, with human coronary pathology.The Multi-Ethnic Study of Atherosclerosis (MESA is a longitudinal study of subclinical cardiovascular disease, including non-Hispanic White (n = 2,588, African American (n = 2,560 and Hispanic (n = 2,130 participants with data on coronary artery calcium (CAC. The Coronary Assessment in Virginia cohort (CAVA included 71 patients aged 30-80 years, undergoing a medically necessary cardiac catheterization and intravascular ultrasound (IVUS at the University of Virginia. ID3 SNP rs11574 risk allele was associated with the presence of CAC in MESA Whites (P = 0.017. In addition, the risk allele was associated with greater atheroma burden and stenosis in the CAVA cohort (P = 0.003, P = 0.04 respectively. The risk allele remained predictive of atheroma burden in multivariate analysis (Model 1: covariates age, gender, and LDL, regression coefficient = 9.578, SE = 3.657, p = 0.0110; Model 2: covariates Model 1, presence of hypertension, presence of diabetes, regression coefficient = 8.389, SE = 4.788, p = 0.0163.We present additional cohorts that demonstrate association of ID3 SNP rs11574 directly with human coronary artery pathology as measured by CAC and IVUS: one a multiethnic, relatively healthy population with low levels of diabetes and the second a predominantly White population with a higher incidence of T2DM referred for cardiac catheterization.

  8. A Simple Quantum Integro-Differential Solver (SQuIDS)

    CERN Document Server

    Delgado, Carlos Alberto Arguelles; Weaver, Christopher N

    2014-01-01

    Simple Quantum Integro-Differential Solver (SQuIDS) is a C++ code designed to solve semi-analytically the evolution of a set of density matrices and scalar functions. This is done efficiently by expressing all operators in an SU(N) basis. SQuIDS provides a base class from which users can derive new classes to include new non-trivial terms from the right hand sides of density matrix equations. The code was designed in the context of solving neutrino oscillation problems, but can be applied to any problem that involves solving the quantum evolution of a collection of particles with Hilbert space of dimension up to six.

  9. ID-based Key-insulated Authenticated Key Agreement Protocol

    Institute of Scientific and Technical Information of China (English)

    ZHOU Yuan; CHENG Xiao-ming; CHAI Zhen-chuan

    2007-01-01

    The basic idea behind an ID-based cryptosystem is that end user's public key can be determined by his identity information. Comparing with the traditional certificate-based cryptography, identity-based cryptography can eliminate much of the overhead associated with the deployment and management of certificate. However, exposure of private keys can be the most devastating attack on a public key based cryptosystem since such that all security guarantees are lost. In this paper, an ID-based authenticated key agreement protocol was presented. For solving the problem of key exposure of the basic scheme, the technique of key insulation was applied and a key insulated version is developed.

  10. Use of the Research Vessel Savannah in Support of 2015 ONR S and T Demo, Project ID: 104458

    Science.gov (United States)

    2016-07-26

    2015 ONR S& T Demo. Project ID: 104458 Sb. GRANT NUMBER N00014-15-1-2116 Sc. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) Sd. PROJECT NUMBER Sanders...Std Z39. 18 Use of the resea rch vessel Savannah in support of 2015 ONR S& T Demo, Project ID: 104458 James G. Sanders and John B. B ichy The...following project: 1. 2015 ONR S & T Demo- Demonstrating mine warfare and airborne projects at Naval Air Station Patuxent River, Md., Dr. Robert Gibson

  11. A dual TLR agonist adjuvant enhances the immunogenicity and protective efficacy of the tuberculosis vaccine antigen ID93.

    Science.gov (United States)

    Orr, Mark T; Beebe, Elyse A; Hudson, Thomas E; Moon, James J; Fox, Christopher B; Reed, Steven G; Coler, Rhea N

    2014-01-01

    With over eight million cases of tuberculosis each year there is a pressing need for the development of new vaccines against Mycobacterium tuberculosis. Subunit vaccines consisting of recombinant proteins are an attractive vaccine approach due to their inherent safety compared to attenuated live vaccines and the uniformity of manufacture. Addition of properly formulated TLR agonist-containing adjuvants to recombinant protein vaccines enhances the antigen-specific CD4(+) T cell response characterized by IFN-γ and TNF, both of which are critical for the control of TB. We have developed a clinical stage vaccine candidate consisting of a recombinant fusion protein ID93 adjuvanted with the TLR4 agonist GLA-SE. Here we examine whether ID93+GLA-SE can be improved by the addition of a second TLR agonist. Addition of CpG containing DNA to ID93+GLA-SE enhanced the magnitude of the multi-functional TH1 response against ID93 characterized by co-production of IFN-γ, TNF, and IL-2. Addition of CpG also improved the protective efficacy of ID93+GLA-SE. Finally we demonstrate that this adjuvant synergy between GLA and CpG is independent of TRIF signaling, whereas TRIF is necessary for the adjuvant activity of GLA-SE in the absence of CpG.

  12. A dual TLR agonist adjuvant enhances the immunogenicity and protective efficacy of the tuberculosis vaccine antigen ID93.

    Directory of Open Access Journals (Sweden)

    Mark T Orr

    Full Text Available With over eight million cases of tuberculosis each year there is a pressing need for the development of new vaccines against Mycobacterium tuberculosis. Subunit vaccines consisting of recombinant proteins are an attractive vaccine approach due to their inherent safety compared to attenuated live vaccines and the uniformity of manufacture. Addition of properly formulated TLR agonist-containing adjuvants to recombinant protein vaccines enhances the antigen-specific CD4(+ T cell response characterized by IFN-γ and TNF, both of which are critical for the control of TB. We have developed a clinical stage vaccine candidate consisting of a recombinant fusion protein ID93 adjuvanted with the TLR4 agonist GLA-SE. Here we examine whether ID93+GLA-SE can be improved by the addition of a second TLR agonist. Addition of CpG containing DNA to ID93+GLA-SE enhanced the magnitude of the multi-functional TH1 response against ID93 characterized by co-production of IFN-γ, TNF, and IL-2. Addition of CpG also improved the protective efficacy of ID93+GLA-SE. Finally we demonstrate that this adjuvant synergy between GLA and CpG is independent of TRIF signaling, whereas TRIF is necessary for the adjuvant activity of GLA-SE in the absence of CpG.

  13. Berberine suppresses Id-1 expression and inhibits the growth and development of lung metastases in hepatocellular carcinoma.

    Science.gov (United States)

    Tsang, Chi Man; Cheung, Kenneth Chat Pan; Cheung, Yuk Chun; Man, Kwan; Lui, Vivian Wai-Yan; Tsao, Sai Wah; Feng, Yibin

    2015-03-01

    Hepatocellular carcinoma (HCC) is an invasive cancer with a high rate of recurrence and metastasis. Agents with anti-proliferative as well as anti-metastatic activity will be ideal for effective treatment. Here, we demonstrated that berberine, an isoquinoline alkaloid, harbored potent anti-metastatic and anti-proliferative activities in vivo. Using an orthotopic model of HCC (MHCC-97L), which spontaneously develops lung metastases (one of the most common sites of HCC metastasis), we found that berberine treatment (10mg/kg/2days) significantly reduced lung metastasis from the liver tumors by ~85% (quantitated by bioluminescence emitted from lung metastases). Histological examination also confirmed the reduced incidence and number of lung metastases in berberine-treated mice. Furthermore, berberine effectively suppressed extra-tumor invasion of the primary HCC implant into the surrounding normal liver tissue, illustrating its potent anti-metastatic action in vivo. Consistent with previous reports in other cancer, berberine's anti-tumor activity was accompanied by suppression of cellular proliferation, invasiveness and HIF-1α/VEGF signaling. Strikingly, further mechanistic investigation revealed that berberine exerted profound inhibitory effect on the expression of Id-1, which is a key regulator for HCC development and metastasis. Berberine could suppress the transcription level of Id-1 through inhibiting its promotor activity. Specific downregulation of Id-1 by knocking down its RNA transcripts in HCC cells inhibited cellular growth, invasion and VEGF secretion, demonstrating the functional relevance of Id-1 downregulation induced by berberine. Lastly, berberine's anti-proliferative and anti-invasive activities could be partially rescued by Id-1 overexpression in HCC models, revealing a novel anti-cancer/anti-invasive mechanism of berberine via Id-1 suppression.

  14. Combination of Id2 Knockdown Whole Tumor Cells and Checkpoint Blockade: A Potent Vaccine Strategy in a Mouse Neuroblastoma Model.

    Directory of Open Access Journals (Sweden)

    Lina Chakrabarti

    Full Text Available Tumor vaccines have held much promise, but to date have demonstrated little clinical success. This lack of success is conceivably due to poor tumor antigen presentation combined with immuno-suppressive mechanisms exploited by the tumor itself. Knock down of Inhibitor of differentiation protein 2 (Id2-kd in mouse neuroblastoma whole tumor cells rendered these cells immunogenic. Id2-kd neuroblastoma (Neuro2a cells (Id2-kd N2a failed to grow in most immune competent mice and these mice subsequently developed immunity against further wild-type Neuro2a tumor cell challenge. Id2-kd N2a cells grew aggressively in immune-compromised hosts, thereby establishing the immunogenicity of these cells. Therapeutic vaccination with Id2-kd N2a cells alone suppressed tumor growth even in established neuroblastoma tumors and when used in combination with immune checkpoint blockade eradicated large established tumors. Mechanistically, immune cell depletion studies demonstrated that while CD8+ T cells are critical for antitumor immunity, CD4+ T cells are also required to induce a sustained long-lasting helper effect. An increase in number of CD8+ T-cells and enhanced production of interferon gamma (IFNγ was observed in tumor antigen stimulated splenocytes of vaccinated mice. More importantly, a massive influx of cytotoxic CD8+ T-cells infiltrated the shrinking tumor following combined immunotherapy. These findings show that down regulation of Id2 induced tumor cell immunity and in combination with checkpoint blockade produced a novel, potent, T-cell mediated tumor vaccine strategy.

  15. Imagery Measures of Ego, Id, Superego, and Identity: Validity Studies.

    Science.gov (United States)

    Cartwright, D.; DeBruin, J.

    1988-01-01

    Five validity studies of the id, ego, superego, and identity scales of the Study of Imagery are reported, using undergraduate students. Multistage Bonferroni procedures are used to evaluate the significance of results. The scales are related to each other and to toughmindedness, self-control, and behavioral conflict. (TJH)

  16. 59 FR- Realty Action; Ada and Owyhee, ID

    Science.gov (United States)

    1994-05-03

    ...-332A-02; IDI-29516] Realty Action; Ada and Owyhee, ID AGENCY: Bureau of Land Management, Interior. ACTION: Notice of Realty Action--IDI-29516; Exchange of public and private lands in Ada and Owyhee.... Containing 640 acres, more or less, in Owyhee County. The purpose of this exchange is to dispose of...

  17. Chronic arsenic intoxication diagnostic score (CAsIDS).

    Science.gov (United States)

    Dani, Sergio Ulhoa; Walter, Gerhard Franz

    2017-08-31

    Arsenic and its compounds are well-established, potent, environmentally widespread and persistent toxicants with metabolic, genotoxic, mutagenic, teratogenic, epigenetic and carcinogenic effects. Arsenic occurs naturally in the Earth's crust, but anthropogenic arsenic emissions have surmounted the emissions from important natural sources such as volcanism. Inorganic arsenicals exhibit acute and chronic toxicities in virtually all cell types and tissues, and hence arsenic intoxication affects multiple systems. Whereas acute arsenic intoxication is rare and relatively easy to diagnose, chronic arsenic intoxication (CAsI) is common but goes often misdiagnosed. Based on a review of the literature as well as our own clinical experience, we propose a chronic arsenic intoxication diagnostic score (CAsIDS). A distinctive feature of CAsIDS is the use of bone arsenic load as an essential criterion for the individual risk assessment of chronic arsenic intoxication, combined with a systemic clinical assessment. We present clinical examples where CAsIDS is applied for the diagnosis of CAsI, review the main topics of the toxicity of arsenic in different cell and organ systems and discuss the therapy and prevention of disease caused or aggravated by chronic arsenic intoxication. CAsIDS can help physicians establish the diagnosis of CAsI and associated conditions. Copyright © 2017 John Wiley & Sons, Ltd.

  18. 76 FR 33651 - Approval and Promulgation of Implementation Plans; ID

    Science.gov (United States)

    2011-06-09

    ... AGENCY 40 CFR Part 52 Approval and Promulgation of Implementation Plans; ID AGENCY: Environmental... Implementation Plan (SIP) that were submitted to EPA by the State of Idaho on April 16, 2007. This SIP submittal... through 668. Sec. 52.670 Identification of plan. * * * * * (c) * * * EPA-Approved Idaho Regulations State...

  19. Evolution of the ID Process at Sprint: A Practitioner's Perspective.

    Science.gov (United States)

    Beard, Michael W.

    1999-01-01

    Provides instructional developers' (ID) insights and observations based on the experiences of a training and development organization, Sprint's University of Excellence (UE), as it evolved from a small group of 20-25 individuals in 1990 to a large business unit comprising almost 400 individuals in 1999. Discussion includes course development…

  20. Student ID Cards: What You Should Know About Them

    Science.gov (United States)

    Hoffman, Jonathan; McGuire, Agnes C.

    1973-01-01

    Discusses the usefulness of photo ID cards for school security purposes, library control, student activities, and bus transportation control. Examines ways in which card costs can be reduced and the pros and cons of producing the cards at the school or of letting the work out. Problems involving card abuse and student rights are also considered.…

  1. LED-ID System: Coverage And Fast Link Recovery Technique

    Directory of Open Access Journals (Sweden)

    Muhammad Shahin Uddin

    2012-11-01

    Full Text Available Recently Light Emitting Diodes (LEDs are considered to represent the next generation of lighting and communication technology. LED-ID (Light Emitting Diode – Identification is one of the key technologies for identification, data transmission and illumination simultaneously. This is the new paradigm in theidentification technology environment. LED-ID system typically needs line of sight (LOS to support narrow FOV transceivers links to achieve high data rate but reduced the coverage, increase the disconnection rate of the link. Also when the receiver moves horizontally or vertically, in that case coverage also varied and LOS relies upon direct link between transmitter and receiver. Link recovery is a new challenge for reliable LED-ID system. Fast link recovery techniques are essential for the making the system robust. In this paper we discuss about the horizontal and vertical coverage variation in terms of received power and fast link recovery technique for the LED-ID system considering both LOS and NLOS reflection.

  2. Sequence ID and annotation information - Gclust Server | LSDB Archive [Life Science Database Archive metadata

    Lifescience Database Archive (English)

    Full Text Available List Contact us Gclust Server Sequence ID and annotation information Data detail Data name Sequence ID and ann...e specifying the ID, length and annotation information of the amino acid sequences of the predicted proteins...f amino acid sequence (Sequence ID) Field 2 Length of amino acid sequence Field 3 Ann...of This Database Site Policy | Contact Us Sequence ID and annotation information - Gclust Server | LSDB Archive ...

  3. Subgroups associated with lower physical fitness in older adults with ID : Results of the HA-ID study

    NARCIS (Netherlands)

    Hilgenkamp, Thessa I. M.; van Wijck, Ruud; Evenhuis, Heleen M.

    2014-01-01

    Although physical fitness is generally very low in older adults with intellectual disabilities (ID), levels may differ across subgroups. It is important to identify which subgroups need to be targeted specifically in physical activity and fitness interventions and reference values. Physical fitness

  4. ID-Based Fair Off-Line Electronic Cash System with Multiple Banks

    Institute of Scientific and Technical Information of China (English)

    Chang-Ji Wang; Yong Tang; Qing Li

    2007-01-01

    ID-based public key cryptography (ID-PKC) has many advantages over certificate-based public key cryptog-raphy (CA-PKC), and has drawn researchers’ extensive attention in recent years. However, the existing electronic cash schemes are constructed under CA-PKC, and there seems no electronic cash scheme under ID-PKC up to now to the best of our knowledge. It is important to study how to construct electronic cash schemes based on ID-PKC from views on both practical perspective and pure research issue. In this paper, we present a simpler and provably secure ID-based restrictive partially blind signature (RPBS), and then propose an ID-based fair off-line electronic cash (ID-FOLC) scheme with multiple banks based on the proposed ID-based RPBS. The proposed ID-FOLC scheme with multiple banks is more efficient than existing electronic cash schemes with multiple banks based on group blind signature.

  5. The small molecule harmine regulates NFATc1 and Id2 expression in osteoclast progenitor cells.

    Science.gov (United States)

    Egusa, Hiroshi; Doi, Masanori; Saeki, Makio; Fukuyasu, Sho; Akashi, Yoshihiro; Yokota, Yoshifumi; Yatani, Hirofumi; Kamisaki, Yoshinori

    2011-08-01

    Small molecule compounds that potently affect osteoclastogenesis could be useful as chemical probes for elucidating the mechanisms of various biological phenomena and as effective therapeutic strategies against bone resorption. An osteoclast progenitor cell-based high-throughput screening system was designed to target activation of NFAT, which is a key event for osteoclastogenesis. Orphan ligand library screening using this system identified the β-carboline derivative harmine, which is a highly potent inhibitor of dual-specificity tyrosine-phosphorylation regulated kinase 1A (DYRK1A), to be an NFAT regulator in osteoclasts. RAW264.7 cells highly expressed DYRK1A protein, and in vitro phosphorylation assay demonstrated that harmine directly inhibited the DYRK1A-mediated phosphorylation (in-activation) of NFATc1. Harmine promoted the dephosphorylation (activation) of NFATc1 in RAW264.7 cells within 24h, and it significantly increased the expression of NFATc1 in RAW264.7 cells and mouse primary bone marrow macrophages (BMMs) both in the presence and absence of RANKL stimulation. Although harmine promoted NFATc1 expression and stimulated target genes for osteoclastogenesis, cell-cell fusion and the formation of TRAP-positive multinucleated osteoclasts from RAW264.7 cells and BMMs was significantly inhibited by harmine treatment. Meanwhile, harmine remarkably promoted the expression of inhibitor of DNA binding/differentiation-2 (Id2), which is a negative regulator for osteoclastogenesis, in RAW264.7 cells and BMMs. An Id2-null-mutant showed slightly increased osteoclast formation from BMMs, and the harmine-mediated inhibition of osteoclast formation was abolished in the BMMs of Id2-null-mutant mice. These results suggest that harmine is a potent activator of NFATc1 that interferes with the function of DYRK1A in osteoclast precursors and also up-regulates Id2 protein, which may dominantly inhibit expression pathways associated with cell-cell fusion, thereby leading to

  6. Direct use geothermal PON and PRDA projects under DOE-ID Administration. Annual report FY 1983

    Energy Technology Data Exchange (ETDEWEB)

    Childs, F.W.

    1984-01-01

    This report presents the status of Geothermal PRDA and PON projects administered by the DOE-ID as of the end of FY-1983. Both programs were instituted to assist the development of the direct application of geothermal energy. The PRDA Program consists of a series of studies designed to investigate the engineering and economic feasibility of geothermal direct applications. The PON Program consists of demonstration projects in which project costs are shared between DOE and a private company, municipality, or other organizations. During this reporting period, fiscal year 1983 (October 1, 1982 through September 30, 1983), EG and G Idaho provided program management and technical support for eleven demonstration projects, three engineering and economic studies plus some general institutional support. Each project is summarized. The general format for the project descriptions is to review the activities in FY-1983 separately from background information on project scope and previous years activities. All of the DOE-ID PON experimental demonstration projects are described, but, of 20 studies performed, only the three active PRDA feasibility contracts are covered since they were smaller, more specialized studies.

  7. Entitlement Management: Ready to Enter the IdM Mainstream

    Science.gov (United States)

    Gebel, Gerry; Wang, Alice

    Externalizing authorization processing from business applications has been a goal for architects and developers for many years. Recent compliance demands for more granular access control and policy transparency have increased the urgency to adopt an architectural model where authorization and entitlement management are consumed as a service rather than embedded within business applications. Major software vendors, such as Microsoft, Oracle, and SAP, are making significant steps to separate IdM functionality, including entitlement management from application logic. The market has also responded with a plethora of products that provide entitlement management and authorization functionality for commercial or custom-built application environments. Finally, the Extensible Access Control Markup Language (XACML) has emerged as the consensus authorization standard being supported by a growing number of IT and application vendors. Collectively, these forces form the basis of a nascent IdM market segment referred to as entitlement management.

  8. La I+D en las pymes: Intensidad y estrategia

    Directory of Open Access Journals (Sweden)

    Anna Arbussà

    2004-01-01

    Full Text Available ¿Es importante la innovación en las pequeñas y medianas empresas? ¿De qué dependen sus estrategias de inversión en I+D? En este artículo respondemos a estas preguntas basándonos en nuevos datos obtenidos sobre una muestra de pymes catalanas. Explicamos cómo varía la intensidad de la I+D según sean la demanda, la oportunidad tecnológica y las condiciones de apropiabilidad en el sector industrial donde se halle la empresa; y presentamos las estrategias de desarrollo interno y adquisición externa de tecnología seguidas por las empresas más competitivas.

  9. De l'idée au businessplan

    OpenAIRE

    Frey, Urs

    2012-01-01

    La création est l'une des nombreuses voies pour arriver à sa propre entreprise. Si vous choisissez cette voie, il est déterminant, pour le succès ultérieur de votre jeune entreprise, que la planification et la mise en oeuvre soient optimales. Le businessplan a pour but de détailler pas à pas l'idée d'entreprise, d'opposer les opportunités aux risques et d'élaborer des budgets. Nous vous indiquons les obstacles que vous pouvez rencontrer sur ce chemin, de l'idée à la création d'une entreprise ...

  10. A NEW EFFICIENT ID-BASED PROXY BLIND SIGNATURE SCHEME

    Institute of Scientific and Technical Information of China (English)

    Ming Yang; Wang Yumin

    2008-01-01

    In a proxy blind signature scheme, the proxy signer is allowed to generate a blind signature on behalf of the original signer. The proxy blind signature scheme is useful in several applications such as e-voting, e-payment, etc. Recently, Zheng, et al. presented an IDentity (ID)-based proxy blind signature. In this paper, a new efficient ID-based proxy blind signature scheme from bilinear pairings is proposed, which can satisfy the security properties of both the proxy signatures and the blind signature schemes. Analysis of the scheme efficiency shows that the new scheme is more efficient than Zheng, et al.'s scheme. The proposed scheme is more practical in the real world.

  11. Tailoring a corporate compliance program for an IDS.

    Science.gov (United States)

    Berkey, M F

    1999-01-01

    Integrated delivery systems (IDSs) face a particular challenge in implementing a corporate compliance program--that of ensuring the program addresses issues of compliance with payment rules and regulations consistently across every component of the health system. To successfully implement an effective compliance program, the various components of the IDS first must understand what such a program is intended to accomplish, and any internal resistance to developing the program must be overcome. The IDS then can undertake identifying and assessing areas of the health system at risk of being in noncompliance, designing and implementing the program, auditing claims processing and cost reporting throughout the health system to ensure systemwide compliance, and maintaining the program through ongoing monitoring and training.

  12. An analysis of Staphylococcus aureus infections at a military medical center using the PLEX-ID combined polymerase chain reaction-mass spectrometry system.

    Science.gov (United States)

    Washington, Michael A; Agee, Willie A; Kajiura, Lauren; Staege, Catherine M; Uyehara, Catherine Ft; Barnhill, Jason C

    2014-04-01

    Staphylococcus aureus (S. aureus) is a major cause of morbidity in the military health care setting. Culture-based methods are the most common means of identifying infections caused by this agent. However, culture-based methods lack sensitivity and specificity. The Abbott PLEX-ID instrument uses a combination of the polymerase chain reaction and mass spectrometry for the identification of bacterial isolates. We investigated whether the Abbott PLEX-ID system could identify S. aureus in clinical material and facilitate the epidemiological analysis of individual isolates. The PLEX-ID system positively identified 100% of isolates previously found to be methicillin resistant S. aureus by culture. In addition, analysis using the PLEX-ID software revealed that the majority of S. aureus isolates at Tripler Army Medical Center derive from clonal complex 8 and nearly 100% of these strains express the R-variant of the Panton-Valentine leukocidin virulence factor. These results demonstrate the utility of the PLEX-ID system in identifying clinical isolates and reveal an unexpected level of homogeneity among clinical S. aureus isolates recovered at Tripler Army Medical Center. These results also demonstrate the utility of the PLEX-ID system in identifying the resistance patterns, predicting the virulence properties, and tracking the migration of bacterial pathogens in the clinical setting. Reprint & Copyright © 2014 Association of Military Surgeons of the U.S.

  13. ID-kaart on mugav ja praktiline dokument / Heiki Raudla

    Index Scriptorium Estoniae

    Raudla, Heiki, 1949-

    2001-01-01

    Ilmunud ka: Severnoje Poberezhje 12. okt., lk. 2; Lääne Elu 13. okt., lk. 2; Hiiumaa 13. okt., lk. 2; Koit 16. okt., lk. 6; Nädaline 16. okt., lk. 4; Sakala 18. okt., lk. 2; Valgamaalane 18. okt., lk. 2; Pjarnuskii Ekspress 12. okt., lk. 2; Meie Maa 19. okt., lk. 2; Hiiu Leht 23. okt., lk. 2; Järva Teataja 30. okt., lk. 2. Siseministri nõunik Heiki Raudla ID-kaardist

  14. FastID: Extremely Fast Forensic DNA Comparisons

    Science.gov (United States)

    2017-05-19

    FastID: Extremely Fast Forensic DNA Comparisons Darrell O. Ricke, PhD Bioengineering Systems & Technologies Massachusetts Institute of...Technology Lincoln Laboratory Lexington, MA USA Darrell.Ricke@ll.mit.edu Abstract—Rapid analysis of DNA forensic samples can have a critical impact on...time sensitive investigations. Analysis of forensic DNA samples by massively parallel sequencing is creating the next gold standard for DNA

  15. ID-kaart on mugav ja praktiline dokument / Heiki Raudla

    Index Scriptorium Estoniae

    Raudla, Heiki, 1949-

    2001-01-01

    Ilmunud ka: Severnoje Poberezhje 12. okt., lk. 2; Lääne Elu 13. okt., lk. 2; Hiiumaa 13. okt., lk. 2; Koit 16. okt., lk. 6; Nädaline 16. okt., lk. 4; Sakala 18. okt., lk. 2; Valgamaalane 18. okt., lk. 2; Pjarnuskii Ekspress 12. okt., lk. 2; Meie Maa 19. okt., lk. 2; Hiiu Leht 23. okt., lk. 2; Järva Teataja 30. okt., lk. 2. Siseministri nõunik Heiki Raudla ID-kaardist

  16. El sistema español de I+D

    Directory of Open Access Journals (Sweden)

    López Facal, Javier

    1997-06-01

    Full Text Available Not available.Para centrar el lugar que ocupan las Bibliotecas y Centros de documentación en el Sistema de I+D, se resume la evolución de la política científica española desde los años cincuenta y se describe la estructura actual de este sistema, sus magnitudes principales y sus deficiencias.

  17. Applying Fuzzy ID3 Decision Tree for Software Effort Estimation

    CERN Document Server

    Elyassami, Sanaa

    2011-01-01

    Web Effort Estimation is a process of predicting the efforts and cost in terms of money, schedule and staff for any software project system. Many estimation models have been proposed over the last three decades and it is believed that it is a must for the purpose of: Budgeting, risk analysis, project planning and control, and project improvement investment analysis. In this paper, we investigate the use of Fuzzy ID3 decision tree for software cost estimation; it is designed by integrating the principles of ID3 decision tree and the fuzzy set-theoretic concepts, enabling the model to handle uncertain and imprecise data when describing the software projects, which can improve greatly the accuracy of obtained estimates. MMRE and Pred are used as measures of prediction accuracy for this study. A series of experiments is reported using two different software projects datasets namely, Tukutuku and COCOMO'81 datasets. The results are compared with those produced by the crisp version of the ID3 decision tree.

  18. Applying Fuzzy ID3 Decision Tree for Software Effort Estimation

    Directory of Open Access Journals (Sweden)

    Ali Idri

    2011-07-01

    Full Text Available Web Effort Estimation is a process of predicting the efforts and cost in terms of money, schedule and staff for any software project system. Many estimation models have been proposed over the last three decades and it is believed that it is a must for the purpose of: Budgeting, risk analysis, project planning and control, and project improvement investment analysis. In this paper, we investigate the use of Fuzzy ID3 decision tree for software cost estimation; it is designed by integrating the principles of ID3 decision tree and the fuzzy set-theoretic concepts, enabling the model to handle uncertain and imprecise data when describing the software projects, which can improve greatly the accuracy of obtained estimates. MMRE and Pred are used as measures of prediction accuracy for this study. A series of experiments is reported using two different software projects datasets namely, Tukutuku and COCOMO'81 datasets. The results are compared with those produced by the crisp version of the ID3 decision tree.

  19. Id4 and FABP7 are preferentially expressed in cells with astrocytic features in oligodendrogliomas and oligoastrocytomas

    Directory of Open Access Journals (Sweden)

    Nicholas M Kelly

    2005-07-01

    Full Text Available Abstract Background Oligodendroglioma (ODG and oligoastrocytoma (OAC are diffusely infiltrating primary brain tumors whose pathogenesis remains unclear. We previously identified a group of genes whose expression was inversely correlated with survival in a cohort of patients with glioblastoma (GBM, and some of these genes are also reportedly expressed in ODG and OAC. We examined the expression patterns and localization of these survival-associated genes in ODG and OAC in order to analyze their possible roles in the oncogenesis of these two tumor types. Methods We used UniGene libraries derived from GBM and ODG specimens to examine the expression levels of the transcripts for each of the 50 GBM survival-associated genes. We used immunohistochemistry and cDNA microarrays to examine expression of selected survival-associated genes and Id4, a gene believed to control the timing of oligodendrocyte development. The expression of FABP7 and Id4 and the survival of patients with ODG and OAC were also analyzed. Results Transcripts of most survival-associated genes as well as Id4 were present in both GBM and ODG tumors, whereas protein expression of Id4 and one of the survival-associated genes, brain-type fatty acid-binding protein (FABP7, was present in cells with astrocytic features, including reactive and neoplastic astrocytes, but not in neoplastic oligodendrocytes. Id4 was co-expressed with FABP7 in microgemistocytes in ODG and in neoplastic astrocytes in OAC. Id4 and FABP7 expression, however, did not correlate with the clinical outcome of patients with ODG or OAC tumors. Conclusion Expression of Id4 and some of our previously identified GBM survival-associated genes is present in developing or mature oligodendrocytes. However, protein expression of Id4 and FABP7 in GBM, ODG, and OAC suggests that this group of functionally important genes might demonstrate two patterns of expression in these glioma subtypes: one group is universally expressed in

  20. Ablation of the ID2 gene results in altered circadian feeding behavior, and sex-specific enhancement of insulin sensitivity and elevated glucose uptake in skeletal muscle and brown adipose tissue.

    Directory of Open Access Journals (Sweden)

    Deepa Mathew

    Full Text Available Inhibitor of DNA binding 2 (ID2 is a helix-loop-helix transcriptional repressor rhythmically expressed in many adult tissues. Our earlier studies have demonstrated a role for ID2 in the input pathway, core clock function and output pathways of the mouse circadian system. We have also reported that Id2 null (Id2-/- mice are lean with low gonadal white adipose tissue deposits and lower lipid content in the liver. These results coincided with altered or disrupted circadian expression profiles of liver genes including those involved in lipid metabolism. In the present phenotypic study we intended to decipher, on a sex-specific basis, the role of ID2 in glucose metabolism and in the circadian regulation of activity, important components of energy balance. We find that Id2-/- mice exhibited altered daily and circadian rhythms of feeding and locomotor activity; activity profiles extended further into the late night/dark phase of the 24-hr cycle, despite mice showing reduced total locomotor activity. Also, male Id2-/- mice consumed a greater amount of food relative to body mass, and displayed less weight gain. Id2-/- females had smaller adipocytes, suggesting sexual-dimorphic programing of adipogenesis. We observed increased glucose tolerance and insulin sensitivity in male Id2-/- mice, which was exacerbated in older animals. FDG-PET analysis revealed increased glucose uptake by skeletal muscle and brown adipose tissue of male Id2-/- mice, suggesting increased glucose metabolism and thermogenesis in these tissues. Reductions in intramuscular triacylglycerol and diacylglycerol were detected in male Id2-/- mice, highlighting its possible mechanistic role in enhanced insulin sensitivity in these mice. Our findings indicate a role for ID2 as a regulator of glucose and lipid metabolism, and in the circadian control of feeding/locomotor behavior; and contribute to the understanding of the development of obesity and diabetes, particularly in shift work

  1. Batf3 and Id2 have a synergistic effect on Irf8-directed classical CD8α+ dendritic cell development

    KAUST Repository

    Jaiswal, Hemant

    2013-11-13

    Dendritic cells (DCs) are heterogeneous cell populations represented by different subtypes, each varying in terms of gene expression patterns and specific functions. Recent studies identified transcription factors essential for the development of different DC subtypes, yet molecular mechanisms for the developmental program and functions remain poorly understood. In this study, we developed and characterized a mouse DC progenitor-like cell line, designated DC9, from Irf8-/- bone marrow cells as a model for DC development and function. Expression of Irf8 in DC9 cells led to plasmacytoid DCs and CD8α+ DC-like cells, with a concomitant increase in plasmacytoid DC- and CD8α+ DC-specific gene transcripts and induction of type I IFNs and IL12p40 following TLR ligand stimulation. Irf8 expression in DC9 cells led to an increase in Id2 and Batf3 transcript levels, transcription factors shown to be important for the development of CD8α+ DCs. We show that, without Irf8 , expression of Id2 and Batf3 was not sufficient for directing classical CD8α+ DC development. When coexpressed with Irf8, Batf3 and Id2 had a synergistic effect on classical CD8α+ DC development. We demonstrate that Irf8 is upstream of Batf3 and Id2 in the classical CD8α+ DC developmental program and define the hierarchical relationship of transcription factors important for classical CD8α+ DC development.

  2. 78 FR 8596 - Hartford Financial Services Group, Inc., Commercial/Actuarial/ Information Delivery Services (IDS...

    Science.gov (United States)

    2013-02-06

    .../ Information Delivery Services (IDS)/Corporate & Financial Reporting Group, Hartford, CT; Notice of Negative... Services Group, Inc., Commercial/Actuarial/Information Delivery Services (IDS)/Corporate & Financial... Hartford Financial Services Group, Inc., Commercial/Actuarial/Information Delivery Services...

  3. Technology Catalogue. First edition

    Energy Technology Data Exchange (ETDEWEB)

    1994-02-01

    The Department of Energy`s Office of Environmental Restoration and Waste Management (EM) is responsible for remediating its contaminated sites and managing its waste inventory in a safe and efficient manner. EM`s Office of Technology Development (OTD) supports applied research and demonstration efforts to develop and transfer innovative, cost-effective technologies to its site clean-up and waste management programs within EM`s Office of Environmental Restoration and Office of Waste Management. The purpose of the Technology Catalogue is to provide performance data on OTD-developed technologies to scientists and engineers assessing and recommending technical solutions within the Department`s clean-up and waste management programs, as well as to industry, other federal and state agencies, and the academic community. OTD`s applied research and demonstration activities are conducted in programs referred to as Integrated Demonstrations (IDs) and Integrated Programs (IPs). The IDs test and evaluate.systems, consisting of coupled technologies, at specific sites to address generic problems, such as the sensing, treatment, and disposal of buried waste containers. The IPs support applied research activities in specific applications areas, such as in situ remediation, efficient separations processes, and site characterization. The Technology Catalogue is a means for communicating the status. of the development of these innovative technologies. The FY93 Technology Catalogue features technologies successfully demonstrated in the field through IDs and sufficiently mature to be used in the near-term. Technologies from the following IDs are featured in the FY93 Technology Catalogue: Buried Waste ID (Idaho National Engineering Laboratory, Idaho); Mixed Waste Landfill ID (Sandia National Laboratories, New Mexico); Underground Storage Tank ID (Hanford, Washington); Volatile organic compound (VOC) Arid ID (Richland, Washington); and VOC Non-Arid ID (Savannah River Site, South Carolina).

  4. Does extending the dual-task functional exercises workout improve postural balance in individuals with ID?

    Science.gov (United States)

    Mikolajczyk, Edyta; Jankowicz-Szymanska, Agnieszka

    2015-03-01

    Maintaining postural balance, overcoming visual and motor coordination disorders and experiencing problems with low general fitness - typical of intellectually disabled individuals - adversely affect the performance quality of their activities of daily living (ADLs). Physical fitness and postural balance can be improved by taking part in special intervention programs. Our study was designed to test whether extending the dual-task intervention program (combining ADLs with balance exercises on unstable surfaces) from 12 to 24 weeks additionally improved postural balance in individuals with intellectual disability (ID). We also attempted to assess whether the effects of the above intervention program were still noticeable after 8 weeks of holidays, in which participants did not take any rehabilitation exercises. A total of 34 adolescents, aged 14-16 years (15.06±0.9), with moderate ID took part in our study. The experimental group (E) consisted of 17 individuals, who continued the intervention program originated 3 months earlier, and the control group (C) comprised the same number of participants. Postural balance was assessed on a stabilometric platform Alfa. Having extended the workout period by another 12 weeks, we noticed that the path length of the center of pressure (COP) covered by participants on tests with their eyes open and closed significantly shortened. After a lapse of 8 weeks from the completion of the program, the experimental group revealed a statistically significant decrease in the velocity along the medio-lateral (M/L) and anterior-posterior (A/P) axes. The remaining variables stayed at the same level and the control group did not demonstrate any statistically significant changes. Dual-task exercises, in which enhancing functional tasks of daily living is combined with a parallel stimulation of balance reactions, may improve static balance in persons with ID.

  5. Multicenter Evaluation of the Portrait Staph ID/R Blood Culture Panel for Rapid Identification of Staphylococci and Detection of the mecA Gene.

    Science.gov (United States)

    Denys, Gerald A; Collazo-Velez, Vanessa; Young, Stephen; Daly, Judy A; Couturier, Marc Roger; Faron, Matthew L; Buchan, Blake W; Ledeboer, Nathan

    2017-04-01

    Bloodstream infections are a leading cause of morbidity and mortality in the United States and are associated with increased health care costs. We evaluated the Portrait Staph ID/R blood culture panel (BCP) multiplex PCR assay (Great Basin Scientific, Salt Lake City, UT) for the rapid and simultaneous identification (ID) of Staphylococcus aureus, Staphylococcus lugdunensis, and Staphylococcus species to the genus level and the detection of the mecA gene directly from a positive blood culture bottle. A total of 765 Bactec bottles demonstrating Gram-positive cocci in singles or clusters were tested during the prospective trial at 3 clinical sites. The Portrait Staph ID/R BCP results were compared with results from conventional biochemical and cefoxitin disk methods performed at an independent laboratory. Discordant ID and mecA results were resolved by rpoB gene sequencing and mecA gene sequencing, respectively. A total of 658 Staphylococcus species isolates (S. aureus, 211 isolates; S. lugdunensis, 3 isolates; and Staphylococcus spp., 444 isolates) were recovered from monomicrobial and 33 polymicrobial blood cultures. After discrepant analysis, the overall ratios of Portrait Staph ID/R BCP positive percent agreement and negative percent agreement were 99.4%/99.9% for Staphylococcus ID and 99.7%/99.2% for mecA detection. Copyright © 2017 American Society for Microbiology.

  6. Iron deficiency (ID) at both birth and 9 months predicts right frontal EEG asymmetry in infancy.

    Science.gov (United States)

    Armony-Sivan, Rinat; Zhu, Bingquan; Clark, Katy M; Richards, Blair; Ji, Chai; Kaciroti, Niko; Shao, Jie; Lozoff, Betsy

    2016-05-01

    This study considered effects of timing and duration of iron deficiency (ID) on frontal EEG asymmetry in infancy. In healthy term Chinese infants, EEG was recorded at 9 months in three experimental conditions: baseline, peek-a-boo, and stranger approach. Eighty infants provided data for all conditions. Prenatal ID was defined as low cord ferritin or high ZPP/H. Postnatal ID was defined as ≥ two abnormal iron measures at 9 months. Study groups were pre- and postnatal ID, prenatal ID only, postnatal ID only, and not ID. GLM repeated measure analysis showed a main effect for iron group. The pre- and postnatal ID group had negative asymmetry scores, reflecting right frontal EEG asymmetry (mean ± SE: -.18 ± .07) versus prenatal ID only (.00 ± .04), postnatal ID only (.03 ± .04), and not ID (.02 ± .04). Thus, ID at both birth and 9 months was associated with right frontal EEG asymmetry, a neural correlate of behavioral withdrawal and negative emotions.

  7. 6 CFR 37.25 - Renewal of REAL ID driver's licenses and identification cards.

    Science.gov (United States)

    2010-01-01

    ... SECRETARY REAL ID DRIVER'S LICENSES AND IDENTIFICATION CARDS Minimum Documentation, Verification, and Card Issuance Requirements § 37.25 Renewal of REAL ID driver's licenses and identification cards. (a) In-person renewals. States must require holders of REAL ID driver's licenses and identification cards to renew...

  8. 6 CFR 37.23 - Reissued REAL ID driver's licenses and identification cards.

    Science.gov (United States)

    2010-01-01

    ... SECRETARY REAL ID DRIVER'S LICENSES AND IDENTIFICATION CARDS Minimum Documentation, Verification, and Card Issuance Requirements § 37.23 Reissued REAL ID driver's licenses and identification cards. (a) State... time a REAL ID driver's license or identification card is reissued, to ensure that the...

  9. Picture This: How to Establish an Effective School ID Card Program

    Science.gov (United States)

    Finkelstein, David

    2013-01-01

    Most school districts do not have an ID card policy that everyone knows and follows, yet. many school districts are implementing ID card programs to address concerns about safety, efficiency, and convenience. A well-thought-out ID card program leads to greater security and smoother operations throughout the school and should thus be a priority.…

  10. People with ID as interviewers and co-researchers: experiences and reflection.

    NARCIS (Netherlands)

    Lieshout, H. van

    2012-01-01

    Aim: To share the experience of working with people with intellectual disabilities (ID) as interviewers in a qualitative study about community participation of people with ID. We reflect on two perspectives: the interviewers and the researchers. Method: Eighteen people with ID were interviewed by th

  11. A role for Id2 in regulating photic entrainment of the mammalian circadian system.

    Science.gov (United States)

    Duffield, Giles E; Watson, Nathan P; Mantani, Akio; Peirson, Stuart N; Robles-Murguia, Maricela; Loros, Jennifer J; Israel, Mark A; Dunlap, Jay C

    2009-02-24

    Inhibitor of DNA binding genes (Id1-Id4) encode helix-loop-helix (HLH) transcriptional repressors associated with development and tumorigenesis [1, 2], but little is known concerning the function(s) of these genes in normal adult animals. Id2 was identified in DNA microarray screens for rhythmically expressed genes [3-5], and further analysis revealed a circadian pattern of expression of all four Id genes in multiple tissues including the suprachiasmatic nucleus. To explore an in vivo function, we generated and characterized deletion mutations of Id2 and of Id4. Id2(-/-) mice exhibit abnormally rapid entrainment and an increase in the magnitude of the phase shift of the pacemaker. A significant proportion of mice also exhibit disrupted rhythms when maintained under constant darkness. Conversely, Id4(-/-) mice did not exhibit a noticeable circadian phenotype. In vitro studies using an mPer1 and an AVP promoter reporter revealed the potential for ID1, ID2, and ID3 proteins to interact with the canonical basic HLH clock proteins BMAL1 and CLOCK. These data suggest that the Id genes may be important for entrainment and operation of the mammalian circadian system, potentially acting through BMAL1 and CLOCK targets.

  12. The Id, the Ego and the Superego of The Simpsons

    OpenAIRE

    Stefán Birgir Stefánsson 1985

    2013-01-01

    The purpose of this essay is to explore three main characters from the popular television series The Simpsons in regards to Sigmund Freud’s theories in psychoanalytical analysis. This exploration is done because of great interest by the author and the lack of psychoanalytical analysis found connected to The Simpsons television show. The main aim is to show that these three characters, Homer Simpson, Marge Simpson and Ned Flanders, represent Freud’s three parts of the psyche, the id, the ego a...

  13. RFID and Auto-ID in planning and logistics

    CERN Document Server

    Jones, Erick C

    2011-01-01

    As RFID technology is becoming increasingly popular, the need has arisen to address the challenges and approaches to successful implementation. RFID and Auto-ID in Planning and Logistics: A Practical Guide for Military UID Applications presents the concepts for students, military personnel and contractors, and corporate managers to learn about RFID and other automatic information capture technologies, and their integration into planning and logistics functions. The text includes comparisons of RFID with technologies such as bar codes, satellite tags, and global positioning systems and provides

  14. Midkine-A functions upstream of Id2a to regulate cell cycle kinetics in the developing vertebrate retina

    Directory of Open Access Journals (Sweden)

    Luo Jing

    2012-10-01

    Full Text Available Abstract Background Midkine is a small heparin binding growth factor expressed in numerous tissues during development. The unique midkine gene in mammals has two paralogs in zebrafish: midkine-a (mdka and midkine-b (mdkb. In the zebrafish retina, during both larval development and adult photoreceptor regeneration, mdka is expressed in retinal stem and progenitor cells and functions as a molecular component of the retina’s stem cell niche. In this study, loss-of-function and conditional overexpression were used to investigate the function of Mdka in the retina of the embryonic zebrafish. Results The results show that during early retinal development Mdka functions to regulate cell cycle kinetics. Following targeted knockdown of Mdka synthesis, retinal progenitors cycle more slowly, and this results in microphthalmia, a diminished rate of cell cycle exit and a temporal delay of cell cycle exit and neuronal differentiation. In contrast, Mdka overexpression results in acceleration of the cell cycle and retinal overgrowth. Mdka gain-of-function, however, does not temporally advance cell cycle exit. Experiments to identify a potential Mdka signaling pathway show that Mdka functions upstream of the HLH regulatory protein, Id2a. Gene expression analysis shows Mdka regulates id2a expression, and co-injection of Mdka morpholinos and id2a mRNA rescues the Mdka loss-of-function phenotype. Conclusions These data show that in zebrafish, Mdka resides in a shared Id2a pathway to regulate cell cycle kinetics in retinal progenitors. This is the first study to demonstrate the function of Midkine during retinal development and adds Midkine to the list of growth factors that transcriptionally regulate Id proteins.

  15. A 12-MW-scale pilot study of in-duct scrubbing (IDS) using a rotary atomizer

    Energy Technology Data Exchange (ETDEWEB)

    Samuel, E.A.; Murphy, K.R.; Demian, A.

    1989-11-01

    A low-cost, moderate-removal efficiency, flue gas desulfurization (FGD) technology was selected by the US Department of Energy for pilot demonstration in its Acid Rain Precursor Control Technology Initiative. The process, identified as In-Duct Scrubbing (IDS), applies rotary atomizer techniques developed for lime-based spray dryer FGD while utilizing existing flue gas ductwork and particulate collectors. IDS technology is anticipated to result in a dry desulfurization process with a moderate removal efficiency (50% or greater) for high-sulfur coal-fired boilers. The critical elements for successful application are: (1) adequate mixing of sorbent droplets with flue gas for efficient reaction contact, (2) sufficient residence time to produce a non-wetting product, and (3) appropriate ductwork cross-sectional area to prevent deposition of wet reaction products before particle drying is comple. The ductwork in many older plants, previously modified to meet 1970 Clean Air Act requirements for particulate control, usually meet these criteria. A 12 MW-scale IDS pilot plant was constructed at the Muskingum River Plant of the American Electric Power System. The pilot plant, which operates from a slipstrem attached to the air-preheater outlet duct from the Unit 5 boiler at the Muskingum River Plant (which burns about 4% sulfur coal), is equipped with three atomizer stations to test the IDS concept in vertical and horizontal configurations. In addition, the pilot plant is equipped to test the effect of injecting IDS off- product upstream of the atomizer, on SO{sub 2}and NO{sub x} removals.

  16. A 12-MW-scale pilot study of in-duct scrubbing (IDS) using a rotary atomizer

    Energy Technology Data Exchange (ETDEWEB)

    Samuel, E.A.; Murphy, K.R.; Demian, A.

    1989-11-01

    A low-cost, moderate-removal efficiency, flue gas desulfurization (FGD) technology was selected by the US Department of Energy for pilot demonstration in its Acid Rain Precursor Control Technology Initiative. The process, identified as In-Duct Scrubbing (IDS), applies rotary atomizer techniques developed for lime-based spray dryer FGD while utilizing existing flue gas ductwork and particulate collectors. IDS technology is anticipated to result in a dry desulfurization process with a moderate removal efficiency (50% or greater) for high-sulfur coal-fired boilers. The critical elements for successful application are: (1) adequate mixing of sorbent droplets with flue gas for efficient reaction contact, (2) sufficient residence time to produce a non-wetting product, and (3) appropriate ductwork cross-sectional area to prevent deposition of wet reaction products before particle drying is comple. The ductwork in many older plants, previously modified to meet 1970 Clean Air Act requirements for particulate control, usually meet these criteria. A 12 MW-scale IDS pilot plant was constructed at the Muskingum River Plant of the American Electric Power System. The pilot plant, which operates from a slipstrem attached to the air-preheater outlet duct from the Unit 5 boiler at the Muskingum River Plant (which burns about 4% sulfur coal), is equipped with three atomizer stations to test the IDS concept in vertical and horizontal configurations. In addition, the pilot plant is equipped to test the effect of injecting IDS off- product upstream of the atomizer, on SO{sub 2}and NO{sub x} removals.

  17. Intrusion Detection System Inside Grid Computing Environment (IDS-IGCE

    Directory of Open Access Journals (Sweden)

    Basappa B. Kodada

    2012-01-01

    Full Text Available Grid Computing is a kind of important information technology which enables resource sharing globally to solve the large scale problem. It is based on networks and able to enable large scale aggregation and sharing of computational, data, sensors and other resources across institutional boundaries. Integrated Globus Tool Kit with Web services is to present OGSA (Open Grid Services Architecture as the standardservice grid architecture. In OGSA, everything is abstracted as a service, including computers, applications, data as well as instruments. The services and resources in Grid are heterogeneous and dynamic, and they also belong to different domains. Grid Services are still new to business system & asmore systems are being attached to it, any threat to it could bring collapse and huge harm. May be intruder come with a new form of attack. Grid Computing is a Global Infrastructure on the internet has led to asecurity attacks on the Computing Infrastructure. The wide varieties of IDS (Intrusion Detection System are available which are designed to handle the specific types of attacks. The technique of [27] will protect future attacks in Service Grid Computing Environment at the Grid Infrastructure but there is no technique can protect these types of attacks inside the grid at the node level. So this paper proposes the Architecture of IDS-IGCE (Intrusion Detection System – Inside Grid Computing Environment which can provide the protection against the complete threats inside the Grid Environment.

  18. Secure OpenID Authentication Model by Using Trusted Computing

    Directory of Open Access Journals (Sweden)

    E. Ghazizadeh

    2014-01-01

    Full Text Available The growth of Internet online services has been very quick in recent years. Each online service requires Internet users to create a new account to use the service. The problem can be seen when each user usually needs more than one service and, consequently, has numerous accounts. These numerous accounts have to be managed in a secure and simple way to be protected against identity theft. Single sign-on (SSO and OpenID have been used to decrease the complexity of managing numerous accounts required in the Internet identity environment. Trusted Platform Module (TPM and Trust Multitenancy are great trusted computing-based technologies to solve security concerns in the Internet identity environment. Since trust is one of the pillars of security in the cloud, this paper analyzes the existing cloud identity techniques in order to investigate their strengths and weaknesses. This paper proposes a model in which One Time Password (OTP, TPM, and OpenID are used to provide a solution against phishing as a common identity theft in cloud environment.

  19. AN IMPROVED DOS-RESISTANT ID-BASED PASSWORD AUTHENTICATION SCHEME WITHOUT USING SMART CARD

    Institute of Scientific and Technical Information of China (English)

    Wen Fengtong; Li Xuelei; Cui Shenjun

    2011-01-01

    In 2010,Hwang,et al.proposed a 'DoS-resistant ID-based password authentication scheme using smart cards' as an improvement of Kim-Lee-Yoo's ‘ID-based password authentication scheme'.In this paper,we cryptanalyze Hwang,et al.'s scheme and point out that the revealed session key could threat the security of the scheme.We demonstrate that extracting information from smart cards is equal to knowing the session key.Thus known session key attacks are also effective under the assumption that the adversary could obtain the information stored in the smart cards.We proposed an improved scheme with security analysis to remedy the weaknesses of Hwang,et al.'s scheme.The new scheme does not only keep all the merits of the original,but also provides several additional phases to improve the flexibility.Finally,the improved scheme is more secure,efficient,practical,and convenient,because elliptic curve cryptosystem is introduced,the expensive smart cards and synchronized clock system are replaced by mobile devices and nonces.

  20. Id3 induces an Elk-1–caspase-8-dependent apoptotic pathway in squamous carcinoma cells

    OpenAIRE

    Chen, You-Shin; Aubee, Joseph; Divito, Kyle A.; Zhou, Hengbo; Zhang, Weiyi; Chou, Fen-Pi; Simbulan-Rosenthal, Cynthia M.; Rosenthal, Dean S.

    2015-01-01

    Inhibitor of differentiation/DNA-binding (Id) proteins are helix–loop–helix (HLH) transcription factors. The Id protein family (Id1–Id4) mediates tissue homeostasis by regulating cellular processes including differentiation, proliferation, and apoptosis. Ids typically function as dominant negative HLH proteins, which bind other HLH proteins and sequester them away from DNA promoter regions. Previously, we have found that Id3 induced apoptosis in immortalized human keratinocytes upon UVB expos...

  1. Comparison of Perinatal Risk Factors Associated with Autism Spectrum Disorder (ASD), Intellectual Disability (ID), and Co-Occurring ASD and ID

    Science.gov (United States)

    Schieve, Laura A.; Clayton, Heather B.; Durkin, Maureen S.; Wingate, Martha S.; Drews-Botsch, Carolyn

    2015-01-01

    While studies report associations between perinatal outcomes and both autism spectrum disorder (ASD) and intellectual disability (ID), there has been little study of ASD with versus without co-occurring ID. We compared perinatal risk factors among 7547 children in the 2006-2010 Autism and Developmental Disability Monitoring Network classified as…

  2. Comparison of Perinatal Risk Factors Associated with Autism Spectrum Disorder (ASD), Intellectual Disability (ID), and Co-Occurring ASD and ID

    Science.gov (United States)

    Schieve, Laura A.; Clayton, Heather B.; Durkin, Maureen S.; Wingate, Martha S.; Drews-Botsch, Carolyn

    2015-01-01

    While studies report associations between perinatal outcomes and both autism spectrum disorder (ASD) and intellectual disability (ID), there has been little study of ASD with versus without co-occurring ID. We compared perinatal risk factors among 7547 children in the 2006-2010 Autism and Developmental Disability Monitoring Network classified as…

  3. ID4 promotes AR expression and blocks tumorigenicity of PC3 prostate cancer cells

    Energy Technology Data Exchange (ETDEWEB)

    Komaragiri, Shravan Kumar; Bostanthirige, Dhanushka H.; Morton, Derrick J.; Patel, Divya; Joshi, Jugal; Upadhyay, Sunil; Chaudhary, Jaideep, E-mail: jchaudhary@cau.edu

    2016-09-09

    Deregulation of tumor suppressor genes is associated with tumorigenesis and the development of cancer. In prostate cancer, ID4 is epigenetically silenced and acts as a tumor suppressor. In normal prostate epithelial cells, ID4 collaborates with androgen receptor (AR) and p53 to exert its tumor suppressor activity. Previous studies have shown that ID4 promotes tumor suppressive function of AR whereas loss of ID4 results in tumor promoter activity of AR. Previous study from our lab showed that ectopic ID4 expression in DU145 attenuates proliferation and promotes AR expression suggesting that ID4 dependent AR activity is tumor suppressive. In this study, we examined the effect of ectopic expression of ID4 on highly malignant prostate cancer cell, PC3. Here we show that stable overexpression of ID4 in PC3 cells leads to increased apoptosis and decreased cell proliferation and migration. In addition, in vivo studies showed a decrease in tumor size and volume of ID4 overexpressing PC3 cells, in nude mice. At the molecular level, these changes were associated with increased androgen receptor (AR), p21, and AR dependent FKBP51 expression. At the mechanistic level, ID4 may regulate the expression or function of AR through specific but yet unknown AR co-regulators that may determine the final outcome of AR function. - Highlights: • ID4 expression induces AR expression in PC3 cells, which generally lack AR. • ID4 expression increased apoptosis and decreased cell proliferation and invasion. • Overexpression of ID4 reduces tumor growth of subcutaneous xenografts in vivo. • ID4 induces p21 and FKBP51 expression- co-factors of AR tumor suppressor activity.

  4. Radikal konservativ idédebat og højreautoritær fascination i Danmark, ca. 1928-1940

    DEFF Research Database (Denmark)

    Holm, Adam

    1999-01-01

    Historie, Højreradikalisme, Konservatisme, Fascisme, Mellemkrigstid, Idéhistorie, Intellektuelle......Historie, Højreradikalisme, Konservatisme, Fascisme, Mellemkrigstid, Idéhistorie, Intellektuelle...

  5. ANGIOTENSIN CONVERTING ENZIME GENE I/D POLYMORPHISM AND PROMISSING OF RENOPROTECTIVE AND IMMUNOSUPRESSIVE THERAPY IN CHILDREN WITH NEPHROTIC SYNDROME

    Directory of Open Access Journals (Sweden)

    Zh.P. Sharnova

    2007-01-01

    Full Text Available To investigate the role of i/d polymorphism gene angiotensin converting enzyme (ACE in promissing of renoprotective and immunosupressive therapy in children with nephrotic syndrome syndrome (NS we determined the genotypes of ACE in 76 children with ns including 22 children with chronic renal failure (CRF. the analysis of treatment effect with inhibitor ace in patients with steroid resistant ns (SRNS demonstrated decreasing of renoprotective effect of these drugs in patients with DD genotype compared with ii and id genotypes (р = 0,033 by similar degree of the glomerular filtration rate (GFR, proteinuria and blood pressure decrease in these patients. Percentage of DD genotype in patients with ns refractory to therapy of cyclosporin a were height compared with patients, sensitive to this therapy.Key words: nephrotic syndrome, chronic renal failure, polymorphism of genes, renin-angiotensin system.

  6. Differential expression of ID4 and its association with TP53 mutation, SOX2, SOX4 and OCT-4 expression levels.

    Directory of Open Access Journals (Sweden)

    Thais Fernanda de Almeida Galatro

    Full Text Available Inhibitor of DNA Binding 4 (ID4 is a member of the helix-loop-helix ID family of transcription factors, mostly present in the central nervous system during embryonic development, that has been associated with TP53 mutation and activation of SOX2. Along with other transcription factors, ID4 has been implicated in the tumorigenic process of astrocytomas, contributing to cell dedifferentiation, proliferation and chemoresistance. In this study, we aimed to characterize the ID4 expression pattern in human diffusely infiltrative astrocytomas of World Health Organization (WHO grades II to IV of malignancy (AGII-AGIV; to correlate its expression level to that of SOX2, SOX4, OCT-4 and NANOG, along with TP53 mutational status; and to correlate the results with the clinical end-point of overall survival among glioblastoma patients. Quantitative real time PCR (qRT-PCR was performed in 130 samples of astrocytomas for relative expression, showing up-regulation of all transcription factors in tumor cases. Positive correlation was found when comparing ID4 relative expression of infiltrative astrocytomas with SOX2 (r = 0.50; p<0.005, SOX4 (r = 0.43; p<0.005 and OCT-4 (r = 0.39; p<0.05. The results from TP53 coding exon analysis allowed comparisons between wild-type and mutated status only in AGII cases, demonstrating significantly higher levels of ID4, SOX2 and SOX4 in mutated cases (p<0.05. This pattern was maintained in secondary GBM and further confirmed by immunohistochemistry, suggesting a role for ID4, SOX2 and SOX4 in early astrocytoma tumorigenesis. Combined hyperexpression of ID4, SOX4 and OCT-4 conferred a much lower (6 months median survival than did hypoexpression (18 months. Because both ID4 alone and a complex of SOX4 and OCT-4 activate SOX2 transcription, it is possible that multiple activation of SOX2 impair the prognosis of GBM patients. These observational results of associated expression of ID4 with SOX4 and OCT-4 may be used as a

  7. Predicting Students’ Performance using Modified ID3 Algorithm

    Directory of Open Access Journals (Sweden)

    Ramanathan L

    2013-06-01

    Full Text Available The ability to predict performance of students is very crucial in our present education system. We can use data mining concepts for this purpose. ID3 algorithm is one of the famous algorithms present today to generate decision trees. But this algorithm has a shortcoming that it is inclined to attributes with many values. So , this research aims to overcome this shortcoming of the algorithm by using gain ratio(instead of information gain as well as by giving weights to each attribute at every decision making point. Several other algorithms like J48 and Naive Bayes classification algorithm are alsoapplied on the dataset. The WEKA tool was used for the analysis of J48 and Naive Bayes algorithms. The results are compared and presented. The dataset used in our study is taken from the School of Computing Sciences and Engineering (SCSE, VIT University.

  8. Forensic validation of the SNPforID 52-plex assay

    DEFF Research Database (Denmark)

    Musgrave-Brown, Esther; Ballard, David; Balogh, Kinga

    2007-01-01

    The advantages of single nucleotide polymorphism (SNP) typing in forensic genetics are well known and include a wider choice of high-throughput typing platforms, lower mutation rates, and improved analysis of degraded samples. However, if SNPs are to become a realistic supplement to current short...... tandem repeat (STR) typing methods, they must be shown to successfully and reliably analyse the challenging samples commonly encountered in casework situations. The European SNPforID consortium, supported by the EU GROWTH programme, has developed a multiplex of 52 SNPs for forensic analysis...... in forensic casework. A total of 40 extracts were used in the study, each of which was sent to two of the five participating laboratories for typing in duplicate or triplicate. Laboratories were instructed to carry out their analyses as if they were dealing with normal casework samples. Results were reported...

  9. Applying Open Researchers and Contributors ID in scholarly journals

    Directory of Open Access Journals (Sweden)

    Jeonghee Im

    2015-02-01

    Full Text Available Open Researchers and Contributors ID (ORCID launched its registry services in October 2012. Consequently, adding personal information to the ORCID registry became routine work for researchers. To add ORCID to an online article, the tag needs to be included in the Journal Article Tag Suite extensible markup language file, if such a file has been produced by the publisher. Subsequently, all co-authors’ ORCID can be easily and conveniently collected and then integrated into the manuscript management system. In the current age of information and the Internet, journals need to keep pace with the surge of new standards and technologies. Editors should be able to accept and apply these new systems rapidly.

  10. ID-Check: Online Concealed Information Test Reveals True Identity.

    Science.gov (United States)

    Verschuere, Bruno; Kleinberg, Bennett

    2016-01-01

    The Internet has already changed people's lives considerably and is likely to drastically change forensic research. We developed a web-based test to reveal concealed autobiographical information. Initial studies identified a number of conditions that affect diagnostic efficiency. By combining these moderators, this study investigated the full potential of the online ID-check. Participants (n = 101) tried to hide their identity and claimed a false identity in a reaction time-based Concealed Information Test. Half of the participants were presented with personal details (e.g., first name, last name, birthday), whereas the others only saw irrelevant details. Results showed that participants' true identity could be detected with high accuracy (AUC = 0.98; overall accuracy: 86-94%). Online memory detection can reliably and validly detect whether someone is hiding their true identity. This suggests that online memory detection might become a valuable tool for forensic applications.

  11. Improvement of the ID model for quantitative network data

    DEFF Research Database (Denmark)

    Sørensen, Peter Borgen; Damgaard, Christian Frølund; Dupont, Yoko Luise

    2015-01-01

    )1. This presentation will illustrate the application of the ID method based on a data set which consists of counts of visits by 152 pollinator species to 16 plant species. The method is based on two definitions of the underlying probabilities for each combination of pollinator and plant species: (1), pi...... reproduce the high number of zero valued cells in the data set and mimic the sampling distribution. 1 Sørensen et al, Journal of Pollination Ecology, 6(18), 2011, pp129-139......Many interactions are often poorly registered or even unobserved in empirical quantitative networks. Hence, the output of the statistical analyses may fail to differentiate between patterns that are statistical artefacts and those which are real characteristics of ecological networks...

  12. Effectiveness of Iphone’s Touch ID: KSA Case Study

    Directory of Open Access Journals (Sweden)

    Ahmad A. Al-Daraiseh

    2015-01-01

    Full Text Available A new trend of incorporating Touch ID sensors in mobile devices is appearing. Last year, Apple released a new model of its famous iPhone (5s. One of the most anticipated and hailed features of the new device was its Touch ID. Apple advertised that the new technology will increase the security of its device, and it will also be used in different applications as a proof of identity. To make the issue more controversial, Apple announced a new financial service (Apple Pay that allows iPhone 6 users to use their iPhone as a replacement to credit cards. The minute the new technology was introduced; many questions appeared that needed immediate answers. Users were concerned about how it will work? Is it easy to use? Is it really safe? And whether it will be effective in protecting their private data or not? In this paper we provide a comprehensive study of this feature. We discuss the advantages and disadvantages of using it. Then we analyze and share the results of a survey that we conducted to measure the effectiveness of such feature in the Kingdom of Saudi Arabia (KSA. In this study, we only focus on users from KSA, because if the device fails to protect mobile’s data, severe consequences might happen. Due to cultural believes in KSA, releasing mobile contents to unauthorized people could lead to crimes. Survey analysis revealed somewhat controversial results, while 76% of all participants believe that this technology will improve the device security, only 33% use it to lock/unlock their devices, and even a smaller percentage use it to make purchases.

  13. On the security of a dynamic ID-based authentication scheme for telecare medical information systems.

    Science.gov (United States)

    Lin, Han-Yu

    2013-04-01

    Telecare medical information systems (TMISs) are increasingly popular technologies for healthcare applications. Using TMISs, physicians and caregivers can monitor the vital signs of patients remotely. Since the database of TMISs stores patients' electronic medical records (EMRs), only authorized users should be granted the access to this information for the privacy concern. To keep the user anonymity, recently, Chen et al. proposed a dynamic ID-based authentication scheme for telecare medical information system. They claimed that their scheme is more secure and robust for use in a TMIS. However, we will demonstrate that their scheme fails to satisfy the user anonymity due to the dictionary attacks. It is also possible to derive a user password in case of smart card loss attacks. Additionally, an improved scheme eliminating these weaknesses is also presented.

  14. Overview of the ID, EPI and REL tasks of BioNLP Shared Task 2011

    Directory of Open Access Journals (Sweden)

    Pyysalo Sampo

    2012-06-01

    Full Text Available Abstract We present the preparation, resources, results and analysis of three tasks of the BioNLP Shared Task 2011: the main tasks on Infectious Diseases (ID and Epigenetics and Post-translational Modifications (EPI, and the supporting task on Entity Relations (REL. The two main tasks represent extensions of the event extraction model introduced in the BioNLP Shared Task 2009 (ST'09 to two new areas of biomedical scientific literature, each motivated by the needs of specific biocuration tasks. The ID task concerns the molecular mechanisms of infection, virulence and resistance, focusing in particular on the functions of a class of signaling systems that are ubiquitous in bacteria. The EPI task is dedicated to the extraction of statements regarding chemical modifications of DNA and proteins, with particular emphasis on changes relating to the epigenetic control of gene expression. By contrast to these two application-oriented main tasks, the REL task seeks to support extraction in general by separating challenges relating to part-of relations into a subproblem that can be addressed by independent systems. Seven groups participated in each of the two main tasks and four groups in the supporting task. The participating systems indicated advances in the capability of event extraction methods and demonstrated generalization in many aspects: from abstracts to full texts, from previously considered subdomains to new ones, and from the ST'09 extraction targets to other entities and events. The highest performance achieved in the supporting task REL, 58% F-score, is broadly comparable with levels reported for other relation extraction tasks. For the ID task, the highest-performing system achieved 56% F-score, comparable to the state-of-the-art performance at the established ST'09 task. In the EPI task, the best result was 53% F-score for the full set of extraction targets and 69% F-score for a reduced set of core extraction targets, approaching a level

  15. Characterizing and Managing Intrusion Detection System (IDS) Alerts with Multi-Server/Multi-Priority Queuing Theory

    Science.gov (United States)

    2014-12-26

    IDS called SNORT®. ( Roesch & Green, 2014) .......... 3 Figure 2. A basic queuing theory diagram calling out the six defining characteristics of a...particular format is from the popular open source IDS called SNORT®. ( Roesch & Green, 2014) The set of signatures within an IDS is called its rule-set...nicol/ece541/slides/queueing.pdf Roesch , M., & Green, C. (2014). SNORT Users Manual. Retrieved August 2014, from SNORT: http://manual.snort.org/ Saad

  16. The Implementation of C-ID, R2D2 Model on Learning Reading Comprehension

    Science.gov (United States)

    Rayanto, Yudi Hari; Rusmawan, Putu Ngurah

    2016-01-01

    The purposes of this research are to find out, (1) whether C-ID, R2D2 model is effective to be implemented on learning Reading comprehension, (2) college students' activity during the implementation of C-ID, R2D2 model on learning Reading comprehension, and 3) college students' learning achievement during the implementation of C-ID, R2D2 model on…

  17. 6 CFR 37.29 - Prohibition against holding more than one REAL ID card or more than one driver's license.

    Science.gov (United States)

    2010-01-01

    ... ID card or more than one driver's license. 37.29 Section 37.29 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY REAL ID DRIVER'S LICENSES AND IDENTIFICATION CARDS Minimum... REAL ID card or more than one driver's license. (a) An individual may hold only one REAL ID card....

  18. SigmoID: a user-friendly tool for improving bacterial genome annotation through analysis of transcription control signals

    Directory of Open Access Journals (Sweden)

    Yevgeny Nikolaichik

    2016-05-01

    Full Text Available The majority of bacterial genome annotations are currently automated and based on a ‘gene by gene’ approach. Regulatory signals and operon structures are rarely taken into account which often results in incomplete and even incorrect gene function assignments. Here we present SigmoID, a cross-platform (OS X, Linux and Windows open-source application aiming at simplifying the identification of transcription regulatory sites (promoters, transcription factor binding sites and terminators in bacterial genomes and providing assistance in correcting annotations in accordance with regulatory information. SigmoID combines a user-friendly graphical interface to well known command line tools with a genome browser for visualising regulatory elements in genomic context. Integrated access to online databases with regulatory information (RegPrecise and RegulonDB and web-based search engines speeds up genome analysis and simplifies correction of genome annotation. We demonstrate some features of SigmoID by constructing a series of regulatory protein binding site profiles for two groups of bacteria: Soft Rot Enterobacteriaceae (Pectobacterium and Dickeya spp. and Pseudomonas spp. Furthermore, we inferred over 900 transcription factor binding sites and alternative sigma factor promoters in the annotated genome of Pectobacterium atrosepticum. These regulatory signals control putative transcription units covering about 40% of the P. atrosepticum chromosome. Reviewing the annotation in cases where it didn’t fit with regulatory information allowed us to correct product and gene names for over 300 loci.

  19. SigmoID: a user-friendly tool for improving bacterial genome annotation through analysis of transcription control signals.

    Science.gov (United States)

    Nikolaichik, Yevgeny; Damienikan, Aliaksandr U

    2016-01-01

    The majority of bacterial genome annotations are currently automated and based on a 'gene by gene' approach. Regulatory signals and operon structures are rarely taken into account which often results in incomplete and even incorrect gene function assignments. Here we present SigmoID, a cross-platform (OS X, Linux and Windows) open-source application aiming at simplifying the identification of transcription regulatory sites (promoters, transcription factor binding sites and terminators) in bacterial genomes and providing assistance in correcting annotations in accordance with regulatory information. SigmoID combines a user-friendly graphical interface to well known command line tools with a genome browser for visualising regulatory elements in genomic context. Integrated access to online databases with regulatory information (RegPrecise and RegulonDB) and web-based search engines speeds up genome analysis and simplifies correction of genome annotation. We demonstrate some features of SigmoID by constructing a series of regulatory protein binding site profiles for two groups of bacteria: Soft Rot Enterobacteriaceae (Pectobacterium and Dickeya spp.) and Pseudomonas spp. Furthermore, we inferred over 900 transcription factor binding sites and alternative sigma factor promoters in the annotated genome of Pectobacterium atrosepticum. These regulatory signals control putative transcription units covering about 40% of the P. atrosepticum chromosome. Reviewing the annotation in cases where it didn't fit with regulatory information allowed us to correct product and gene names for over 300 loci.

  20. A brief review of revocable ID-based public key cryptosystem

    Directory of Open Access Journals (Sweden)

    Tsu-Yang Wu

    2016-03-01

    Full Text Available The design of ID-based cryptography has received much attention from researchers. However, how to revoke the misbehaviour/compromised user in ID-based public key cryptosystem becomes an important research issue. Recently, Tseng and Tsai proposed a novel public key cryptosystem called revocable ID-based public key cryptosystem (RIBE to solve the revocation problem. Later on, numerous research papers based on the Tseng-Tsai key RIBE were proposed. In this paper, we brief review Tseng and Tsai's RIBE. We hope this review can help the readers to understand the Tseng and Tsai's revocable ID-based public key cryptosystem.

  1. Id expression in amphioxus and lamprey highlights the role of gene cooption during neural crest evolution

    Science.gov (United States)

    Meulemans, Daniel; McCauley, David; Bronner-Fraser, Marianne

    2003-01-01

    Neural crest cells are unique to vertebrates and generate many of the adult structures that differentiate them from their closest invertebrate relatives, the cephalochordates. Id genes are robust markers of neural crest cells at all stages of development. We compared Id gene expression in amphioxus and lamprey to ask if cephalochordates deploy Id genes at the neural plate border and dorsal neural tube in a manner similar to vertebrates. Furthermore, we examined whether Id expression in these cells is a basal vertebrate trait or a derived feature of gnathostomes. We found that while expression of Id genes in the mesoderm and endoderm is conserved between amphioxus and vertebrates, expression in the lateral neural plate border and dorsal neural tube is a vertebrate novelty. Furthermore, expression of lamprey Id implies that recruitment of Id genes to these cells occurred very early in the vertebrate lineage. Based on expression in amphioxus we postulate that Id cooption conferred sensory cell progenitor-like properties upon the lateral neurectoderm, and pharyngeal mesoderm-like properties upon cranial neural crest. Amphioxus Id expression is also consistent with homology between the anterior neurectoderm of amphioxus and the presumptive placodal ectoderm of vertebrates. These observations support the idea that neural crest evolution was driven in large part by cooption of multipurpose transcriptional regulators from other tissues and cell types.

  2. Idaho National Laboratory Supervisory Control and Data Acquisition Intrusion Detection System (SCADA IDS)

    Energy Technology Data Exchange (ETDEWEB)

    Jared Verba; Michael Milvich

    2008-05-01

    Current Intrusion Detection System (IDS) technology is not suited to be widely deployed inside a Supervisory, Control and Data Acquisition (SCADA) environment. Anomaly- and signature-based IDS technologies have developed methods to cover information technology-based networks activity and protocols effectively. However, these IDS technologies do not include the fine protocol granularity required to ensure network security inside an environment with weak protocols lacking authentication and encryption. By implementing a more specific and more intelligent packet inspection mechanism, tailored traffic flow analysis, and unique packet tampering detection, IDS technology developed specifically for SCADA environments can be deployed with confidence in detecting malicious activity.

  3. Achieving Payoffs from an Industry Cloud Ecosystem at BankID

    DEFF Research Database (Denmark)

    Eaton, Ben; Hallingby, Hanne Kristine; Nesse, Per-Jonny

    2014-01-01

    BankID is an industry cloud owned by Norwegian banks. It provides electronic identity, authentication and electronic signing capabilities for banking, merchant and government services. More than 60% of the population uses BankID services. As the broader ecosystem around BankID evolved, challenges......—arising from tensions between different parts of the ecosystem—had to be resolved. The four lessons learned from the BankID case will help others to build an industry cloud and establish a healthy ecosystem to service a broad user base....

  4. Genetic characterization of Venezuelan equine encephalitis virus from Bolivia, Ecuador and Peru: identification of a new subtype ID lineage.

    Directory of Open Access Journals (Sweden)

    Patricia V Aguilar

    Full Text Available Venezuelan equine encephalitis virus (VEEV has been responsible for hundreds of thousands of human and equine cases of severe disease in the Americas. A passive surveillance study was conducted in Peru, Bolivia and Ecuador to determine the arboviral etiology of febrile illness. Patients with suspected viral-associated, acute, undifferentiated febrile illness of <7 days duration were enrolled in the study and blood samples were obtained from each patient and assayed by virus isolation. Demographic and clinical information from each patient was also obtained at the time of voluntary enrollment. In 2005-2007, cases of Venezuelan equine encephalitis (VEE were diagnosed for the first time in residents of Bolivia; the patients did not report traveling, suggesting endemic circulation of VEEV in Bolivia. In 2001 and 2003, VEE cases were also identified in Ecuador. Since 1993, VEEV has been continuously isolated from patients in Loreto, Peru, and more recently (2005, in Madre de Dios, Peru. We performed phylogenetic analyses with VEEV from Bolivia, Ecuador and Peru and compared their relationships to strains from other parts of South America. We found that VEEV subtype ID Panama/Peru genotype is the predominant one circulating in Peru. We also demonstrated that VEEV subtype ID strains circulating in Ecuador belong to the Colombia/Venezuela genotype and VEEV from Madre de Dios, Peru and Cochabamba, Bolivia belong to a new ID genotype. In summary, we identified a new major lineage of enzootic VEEV subtype ID, information that could aid in the understanding of the emergence and evolution of VEEV in South America.

  5. Molecular characterization of lactobacilli isolated from fermented idli batter

    Directory of Open Access Journals (Sweden)

    Perumal Jayaprabha Agaliya

    2013-12-01

    Full Text Available Lactic acid bacteria are non pathogenic organism widely distributed in nature typically involved in a large number of spontaneous food fermentation. The purpose of this study was to characterize the bacteriocinogenic lactobacilli from fermented idli batter which can find application in biopreservation and biomedicine. Eight most promising lactobacilli were chosen from twenty two isolates based on their spectrum of activity against other lactic acid bacteria and pathogens. The eight lactobacilli were characterized based on the various classical phenotypic tests, physiological tests and biochemical tests including various carbohydrate utilization profiles. All isolates were homo fermentative, catalase, and gelatin negative. Molecular characterization was performed by RAPD, 16S rRNA analysis, 16S ARDRA, and Multiplex PCR for species identification. RAPD was carried out using the primer R2 and M13. Five different clusters were obtained based on RAPD indicating strain level variation. 16S rRNA analysis showed 99 to 100% homology towards Lactobacillus plantarum. The restriction digestion pattern was similar for all the isolates with the restriction enzyme AluI. The subspecies were identified by performing Multiplex PCR using species specific primer. Among the five clusters, three clusters were clearly identified as Lactobacillus plantarum subsp. plantarum, Lactobacillus pentosus, and Lactobacillus plantarum subsp. argentoratensis.

  6. Molecular characterization of lactobacilli isolated from fermented idli batter.

    Science.gov (United States)

    Agaliya, Perumal Jayaprabha; Jeevaratnam, Kadirvelu

    2013-12-01

    Lactic acid bacteria are non pathogenic organism widely distributed in nature typically involved in a large number of spontaneous food fermentation. The purpose of this study was to characterize the bacteriocinogenic lactobacilli from fermented idli batter which can find application in biopreservation and biomedicine. Eight most promising lactobacilli were chosen from twenty two isolates based on their spectrum of activity against other lactic acid bacteria and pathogens. The eight lactobacilli were characterized based on the various classical phenotypic tests, physiological tests and biochemical tests including various carbohydrate utilization profiles. All isolates were homo fermentative, catalase, and gelatin negative. Molecular characterization was performed by RAPD, 16S rRNA analysis, 16S ARDRA, and Multiplex PCR for species identification. RAPD was carried out using the primer R2 and M13. Five different clusters were obtained based on RAPD indicating strain level variation. 16S rRNA analysis showed 99 to 100% homology towards Lactobacillus plantarum. The restriction digestion pattern was similar for all the isolates with the restriction enzyme AluI. The subspecies were identified by performing Multiplex PCR using species specific primer. Among the five clusters, three clusters were clearly identified as Lactobacillus plantarum subsp. plantarum, Lactobacillus pentosus, and Lactobacillus plantarum subsp. argentoratensis.

  7. L’idéologie : une notion bien embarrassante

    OpenAIRE

    Dominique Maingueneau

    2007-01-01

    Je ne pense pas être la personne la mieux placée pour réfléchir sur l’intérêt que présente la notion d’idéologie pour ceux qui étudient la littérature. Le travail conceptuel sur cette notion a plutôt été le fait de la génération antérieure à la mienne. Je suppose que si l’on m’a sollicité pour en parler, c’est parce que de l’intérieur de l’analyse du discours j’ai été amené à me confronter – quoique dans un cadre théorique et méthodologique très différent – à des questions du même ordre. Fau...

  8. Generating unique IDs from patient identification data using security models

    Directory of Open Access Journals (Sweden)

    Emad A Mohammed

    2016-01-01

    Full Text Available Background: The use of electronic health records (EHRs has continued to increase within healthcare systems in the developed and developing nations. EHRs allow for increased patient safety, grant patients easier access to their medical records, and offer a wealth of data to researchers. However, various bioethical, financial, logistical, and information security considerations must be addressed while transitioning to an EHR system. The need to encrypt private patient information for data sharing is one of the foremost challenges faced by health information technology. Method: We describe the usage of the message digest-5 (MD5 and secure hashing algorithm (SHA as methods for encrypting electronic medical data. In particular, we present an application of the MD5 and SHA-1 algorithms in encrypting a composite message from private patient information. Results: The results show that the composite message can be used to create a unique one-way encrypted ID per patient record that can be used for data sharing. Conclusion: The described software tool can be used to share patient EMRs between practitioners without revealing patients identifiable data.

  9. Application of Statistical Process Control Methods for IDS

    Directory of Open Access Journals (Sweden)

    Muhammad Sadiq Ali Khan

    2012-11-01

    Full Text Available As technology improves, attackers are trying to get access to the network system resources by so many means. Open loop holes in the network allow them to penetrate in the network more easily; statistical methods have great importance in the area of computer and network security, in detecting the malfunctioning of the network system. Development of internet security solution needed to protect the system and to with stand prolonged and diverse attack. In this paper Statistical approach has been used, conventionally Statistical Control Charts has been used for quality characteristics however in IDS abnormal access can be easily detected and appropriate control limit can be established. Two different charts are investigated and Shewhart chart based on average has produced better accuracy. The approach used here for intrusion detection in such a way that if the data packet is drastically different from normal variation then it can be classified as attack. In other words a system variation may be due to some special reason. If these causes are investigated then natural variation and abnormal variation can be distinguished which can be used for distinction of behaviors of the system.

  10. L’idéologie : une notion bien embarrassante

    Directory of Open Access Journals (Sweden)

    Dominique Maingueneau

    2007-02-01

    Full Text Available Je ne pense pas être la personne la mieux placée pour réfléchir sur l’intérêt que présente la notion d’idéologie pour ceux qui étudient la littérature. Le travail conceptuel sur cette notion a plutôt été le fait de la génération antérieure à la mienne. Je suppose que si l’on m’a sollicité pour en parler, c’est parce que de l’intérieur de l’analyse du discours j’ai été amené à me confronter – quoique dans un cadre théorique et méthodologique très différent – à des questions du même ordre. Faut...

  11. Precise Location Acquisition of Mobility Data Using Cell ID

    Directory of Open Access Journals (Sweden)

    Shafqat Ali Shad

    2012-05-01

    Full Text Available Cellular network data has become a hot source of study for extraction of user-mobility and spatio-temporal trends. Location binding in mobility data can be done through different methods like GPS, service provider assisted faux-GPS and Cell Global Identity (CGI. Among these Cell Global Identity is most inexpensive method and readily available solution for mobility extraction; however exact spatial extraction is somehow a problem in it. This paper presents the spatial extraction technique of mobile phone user raw data which carries the information like location information, proximity location and activity of subjects. This work mainly focuses on the data pre-processing methodology and technique to interpret the low level mobility data into high level mobility information using the designed clustering methodology and publically available Cell-IDs databases. Work proposed the semi- supervised strategy to derive the missing locations thorough the usage of semantic tag information and removal of spatial outliers for precise mobility profile building.

  12. Conventional Chiralpak ID vs. capillary Chiralpak ID-3 amylose tris-(3-chlorophenylcarbamate)-based chiral stationary phase columns for the enantioselective HPLC separation of pharmaceutical racemates.

    Science.gov (United States)

    Ahmed, Marwa; Gwairgi, Marina; Ghanem, Ashraf

    2014-11-01

    A comparative enantioselective analysis using immobilized amylose tris-(3-chlorophenylcarbamate) as chiral stationary phase in conventional high-performance liquid chromatography (HPLC) with Chiralpak ID (4.6 mm ID × 250 mm, 5 µm silica gel) and micro-HPLC with Chiralpak ID-3 (0.30 mm ID × 150 mm, 3 µm silica gel) was conducted. Pharmaceutical racemates of 12 pharmacological classes, namely, α- and β-blockers, anti-inflammatory drugs, antifungal drugs, dopamine antagonists, norepinephrine-dopamine reuptake inhibitors, catecholamines, sedative hypnotics, diuretics, antihistaminics, anticancer drugs, and antiarrhythmic drugs were screened under normal phase conditions. The effect of an organic modifier on the analyte retentions and enantiomer recognition was investigated. Baseline separation was achieved for 1-acenaphthenol, carprofen, celiprolol, cizolirtine carbinol, miconazole, tebuconazole, 4-hydroxy-3-methoxymandelic acid, 1-indanol, 1-(2-chlorophenyl)ethanol, 1-phenyl-2-propanol, flavanone, 6-hydroxyflavanone, 4-bromogluthethimide, and pentobarbital on the 4.6 mm ID packed with a 5 µm silica column using conventional HPLC. Nonetheless, baseline separation was achieved for aminoglutethimide, naftopidil, and thalidomide on the 0.3 mm ID packed with a 3 µm silica capillary column.

  13. 75 FR 22695 - Establishment of Class E Airspace; Bonners Ferry, ID

    Science.gov (United States)

    2010-04-30

    ... Federal Aviation Administration 14 CFR Part 71 Establishment of Class E Airspace; Bonners Ferry, ID AGENCY... E airspace at Bonners Ferry, ID, to accommodate aircraft using a new Area Navigation (RNAV) Global... improve the safety and management of Instrument Flight Rules (IFR) operations at the airport. DATES...

  14. Id2a is required for hepatic outgrowth during liver development in zebrafish.

    Science.gov (United States)

    Khaliq, Mehwish; Choi, Tae-Young; So, Juhoon; Shin, Donghun

    2015-11-01

    During development, inhibitor of DNA binding (Id) proteins, a subclass of the helix-loop-helix family of proteins, regulate cellular proliferation, differentiation, and apoptosis in various organs. However, a functional role of Id2a in liver development has not yet been reported. Here, using zebrafish as a model organism, we provide in vivo evidence that Id2a regulates hepatoblast proliferation and cell death during liver development. Initially, in the liver, id2a is expressed in hepatoblasts and after their differentiation, id2a expression is restricted to biliary epithelial cells. id2a knockdown in zebrafish embryos had no effect on hepatoblast specification or hepatocyte differentiation. However, liver size was greatly reduced in id2a morpholino-injected embryos, indicative of a hepatic outgrowth defect attributable to the significant decrease in proliferating hepatoblasts concomitant with the significant increase in hepatoblast cell death. Altogether, these data support the role of Id2a as an important regulator of hepatic outgrowth via modulation of hepatoblast proliferation and survival during liver development in zebrafish.

  15. Manual of spIds, a software package for parameter identification in dynamic systems

    NARCIS (Netherlands)

    Everaars, C.T.H.; Hemker, P.W.; Stortelder, W.J.H.

    1995-01-01

    This report contains the manual of spIds, version 1.0, a software package for parameter identification in dynamic systems. SpIdslabel{ab:spIds is an acronym of underline{simulation and underline{parameter underline{identification in underline{dynamic underline {systems. It can be applied on wide var

  16. 81 FR 16198 - Deer Flat National Wildlife Refuge, Canyon, Payette, Owyhee, and Washington Counties, ID, and...

    Science.gov (United States)

    2016-03-25

    ... From the Federal Register Online via the Government Publishing Office DEPARTMENT OF THE INTERIOR Fish and Wildlife Service Deer Flat National Wildlife Refuge, Canyon, Payette, Owyhee, and Washington..., 1010 Dearborn St., Caldwell, ID 83605. Homedale Public Library, 125 W Owyhee Ave., Homedale, ID...

  17. 75 FR 41232 - Deer Flat National Wildlife Refuge, Canyon, Owyhee, Payette, and Washington Counties, ID; Malheur...

    Science.gov (United States)

    2010-07-15

    ... Fish and Wildlife Service Deer Flat National Wildlife Refuge, Canyon, Owyhee, Payette, and Washington...). The Refuge has units located in Canyon, Owyhee, Payette, and Washington Counties, ID, and Malheur... the Snake River located in Canyon, Payette, Owyhee, and Washington Counties in ID; and Malheur...

  18. Ubiquitin-SUMO Circuitry Controls Activated Fanconi Anemia ID Complex Dosage in Response to DNA Damage

    DEFF Research Database (Denmark)

    Gibbs-Seymour, Ian; Oka, Yasuyoshi; Rajendra, Eeson

    2015-01-01

    We show that central components of the Fanconi anemia (FA) DNA repair pathway, the tumor suppressor proteins FANCI and FANCD2 (the ID complex), are SUMOylated in response to replication fork stalling. The ID complex is SUMOylated in a manner that depends on the ATR kinase, the FA ubiquitin ligase...

  19. 75 FR 47515 - Identification (ID) Cards for Members of the Uniformed Services, Their Dependents, and Other...

    Science.gov (United States)

    2010-08-06

    ... Services, Their Dependents, and Other Eligible Individuals AGENCY: Office of the Under Secretary of Defense... DoD ID cards. The ID cards shall be issued to uniformed service members, their dependents, and other.... The general policy for comments and other submissions from members of the public is to make...

  20. Wicked ID: Conceptual Framework for Considering Instructional Design as a Wicked Problem

    Science.gov (United States)

    Becker, Katrin

    2007-01-01

    The process of instructional design has parallels in other design disciplines. Software design is one that has experienced intense attention in the last 30 or so years, and many lessons learned there can be applied to ID. Using software design as a springboard, this concept paper seeks to propose a new approach to ID. It suggests that…

  1. The ID23-2 structural biology microfocus beamline at the ESRF

    Energy Technology Data Exchange (ETDEWEB)

    Flot, David, E-mail: flot@esrf.fr [European Molecular Biology Laboratory, 6 rue Jules Horowitz, BP 181, 38042 Grenoble (France); Mairs, Trevor; Giraud, Thierry; Guijarro, Matias; Lesourd, Marc; Rey, Vicente; Brussel, Denis van; Morawe, Christian; Borel, Christine; Hignette, Olivier; Chavanne, Joel; Nurizzo, Didier; McSweeney, Sean; Mitchell, Edward [European Synchrotron Radiation Facility, 6 rue Jules Horowitz, BP 181, 38043 Grenoble (France)

    2010-01-01

    Beamline ID23-2, the first dedicated and highly automated high-throughput monochromatic macromolecular crystallography microfocus beamline, is described. The first phase of the ESRF beamline ID23 to be constructed was ID23-1, a tunable MAD-capable beamline which opened to users in early 2004. The second phase of the beamline to be constructed is ID23-2, a monochromatic microfocus beamline dedicated to macromolecular crystallography experiments. Beamline ID23-2 makes use of well characterized optical elements: a single-bounce silicon (111) monochromator and two mirrors in Kirkpatrick–Baez geometry to focus the X-ray beam. A major design goal of the ID23-2 beamline is to provide a reliable, easy-to-use and routine microfocus beam. ID23-2 started operation in November 2005, as the first beamline dedicated to microfocus macromolecular crystallography. The beamline has taken the standard automated ESRF macromolecular crystallography environment (both hardware and software), allowing users of ID23-2 to be rapidly familiar with the microfocus environment. This paper describes the beamline design, the special considerations taken into account given the microfocus beam, and summarizes the results of the first years of the beamline operation.

  2. Extending the Intermediate Data Structure (IDS for longitudinal historical databases to include geographic data

    Directory of Open Access Journals (Sweden)

    Finn Hedefalk

    2014-09-01

    Full Text Available The Intermediate Data Structure (IDS is a standardised database structure for longitudinal historical databases. Such a common structure facilitates data sharing and comparative research. In this study, we propose an extended version of IDS, named IDS-Geo, that also includes geographic data. The geographic data that will be stored in IDS-Geo are primarily buildings and/or property units, and the purpose of these geographic data is mainly to link individuals to places in space. When we want to assign such detailed spatial locations to individuals (in times before there were any detailed house addresses available, we often have to create tailored geographic datasets. In those cases, there are benefits of storing geographic data in the same structure as the demographic data. Moreover, we propose the export of data from IDS-Geo using an eXtensible Markup Language (XML Schema. IDS-Geo is implemented in a case study using historical property units, for the period 1804 to 1913, stored in a geographically extended version of the Scanian Economic Demographic Database (SEDD. To fit into the IDS-Geo data structure, we included an object lifeline representation of all of the property units (based on the snapshot time representation of single historical maps and poll-tax registers. The case study verifies that the IDS-Geo model is capable of handling geographic data that can be linked to demographic data.

  3. Sexual abuse involving children with an intellectual disability (ID): a narrative review

    NARCIS (Netherlands)

    Wissink, I.B.; van Vugt, E.S.; Moonen, X.; Stams, G.J.J.M.; Hendriks, J.

    2015-01-01

    The current paper provides a narrative review of the literature on sexual abuse, involving children with Intellectual Disability (ID). The thirteen articles that were found and met our criteria vary in their definitions of sexual abuse and in how ID was determined. Still, they do paint a general pic

  4. Cloning and shake flask expression of hrIDS-Like in Pichia pastoris

    African Journals Online (AJOL)

    STORAGESEVER

    2009-06-17

    Jun 17, 2009 ... characterized by a wide spectrum of clinical manifesta- tions, ranging from mild to ... The native IDS processing has been studied after .... the membrane was incubated overnight with a monoclonal antibody anti-IDS (1:250 in ...

  5. Rethinking Social Network Assessment for Students with Intellectual Disabilities (ID) in Postsecondary Education

    Science.gov (United States)

    Eisenman, Laura T.; Farley-Ripple, Elizabeth; Culnane, Mary; Freedman, Brian

    2013-01-01

    Social networks of persons with intellectual disabilities (ID) have been characterized as smaller and less diverse than those of typical peers. Advocates have focused on strengthening those social networks by expanding circles of social support, protection, and friendship. As young adults with ID experience increasing levels of community…

  6. Clarté des idées innées ?

    DEFF Research Database (Denmark)

    Schøsler, Jørn

    2013-01-01

    Der gives en analyse af begreberne 'evidens' og 'medfødte idéer' hos Descartes og Locke samt hos de franske oplysningsfilosoffer.......Der gives en analyse af begreberne 'evidens' og 'medfødte idéer' hos Descartes og Locke samt hos de franske oplysningsfilosoffer....

  7. 76 FR 9266 - Proposed Amendment of Class D and Class E Airspace; Idaho Falls, ID

    Science.gov (United States)

    2011-02-17

    ... Falls, ID AGENCY: Federal Aviation Administration (FAA), DOT. ACTION: Notice of proposed rulemaking (NPRM). SUMMARY: This action proposes to amend the Class D and Class E airspace areas at Idaho Falls, ID, by changing the name of the airport to Idaho Falls Regional Airport, and adjusting the...

  8. 76 FR 28306 - Amendment of Class D and Class E Airspace; Idaho Falls, ID

    Science.gov (United States)

    2011-05-17

    ... Federal Aviation Administration 14 CFR Part 71 Amendment of Class D and Class E Airspace; Idaho Falls, ID... existing Class D and Class E airspace at Idaho Falls, ID, by changing the name of the airport to Idaho Falls Regional Airport, and adjusting the geographic coordinates of the airport. This action also...

  9. 78 FR 25406 - Proposed Modification of Class E Airspace; Twin Falls, ID

    Science.gov (United States)

    2013-05-01

    ... Federal Aviation Administration 14 CFR Part 71 Proposed Modification of Class E Airspace; Twin Falls, ID...: This action proposes to modify Class E airspace at Twin Falls Joslin Field-Magic Valley Regional Airport, Twin Falls, ID. Controlled airspace is necessary to accommodate aircraft using the...

  10. 78 FR 40382 - Modification of Class D and E Airspace; Twin Falls, ID

    Science.gov (United States)

    2013-07-05

    ... Federal Aviation Administration 14 CFR Part 71 Modification of Class D and E Airspace; Twin Falls, ID... Class E airspace at Twin Falls Joslin Field-Magic Valley Regional Airport, Twin Falls, ID, to... areas, as well as corrects the airport name to Twin Falls Joslin Field-Magic Valley Regional...

  11. 77 FR 56241 - Board Meeting; October 17, 2012; Idaho Falls, ID

    Science.gov (United States)

    2012-09-12

    ... REVIEW BOARD Board Meeting; October 17, 2012; Idaho Falls, ID The U.S. Nuclear Waste Technical Review... 1987, the U.S. Nuclear Waste Technical Review Board will hold a public meeting in Idaho Falls, Idaho... Board meeting will be held at the Hilton Garden Inn, 700 Lindsay Boulevard, Idaho Falls, ID 83402;...

  12. Programming Social Applications Building Viral Experiences with OpenSocial, OAuth, OpenID, and Distributed Web Frameworks

    CERN Document Server

    LeBlanc, Jonathan

    2011-01-01

    Social networking has made one thing clear: websites and applications need to provide users with experiences tailored to their preferences. This in-depth guide shows you how to build rich social frameworks, using open source technologies and specifications. You'll learn how to create third-party applications for existing sites, build engaging social graphs, and develop products to host your own socialized experience. Programming Social Apps focuses on the OpenSocial platform, along with Apache Shindig, OAuth, OpenID, and other tools, demonstrating how they work together to help you solve pra

  13. LIMB Demonstration Project Extension and Coolside Demonstration

    Energy Technology Data Exchange (ETDEWEB)

    Goots, T.R.; DePero, M.J.; Nolan, P.S.

    1992-11-10

    This report presents results from the limestone Injection Multistage Burner (LIMB) Demonstration Project Extension. LIMB is a furnace sorbent injection technology designed for the reduction of sulfur dioxide (SO[sub 2]) and nitrogen oxides (NO[sub x]) emissions from coal-fired utility boilers. The testing was conducted on the 105 Mwe, coal-fired, Unit 4 boiler at Ohio Edison's Edgewater Station in Lorain, Ohio. In addition to the LIMB Extension activities, the overall project included demonstration of the Coolside process for S0[sub 2] removal for which a separate report has been issued. The primary purpose of the DOE LIMB Extension testing, was to demonstrate the generic applicability of LIMB technology. The program sought to characterize the S0[sub 2] emissions that result when various calcium-based sorbents are injected into the furnace, while burning coals having sulfur content ranging from 1.6 to 3.8 weight percent. The four sorbents used included calcitic limestone, dolomitic hydrated lime, calcitic hydrated lime, and calcitic hydrated lime with a small amount of added calcium lignosulfonate. The results include those obtained for the various coal/sorbent combinations and the effects of the LIMB process on boiler and plant operations.

  14. ID-based authentication scheme combined with identity-based encryption with fingerprint hashing

    Institute of Scientific and Technical Information of China (English)

    2008-01-01

    Current identity-based (ID) cryptosystem lacks the mechanisms of two-party authentication and user's private key distribution. Some ID-based signcryption schemes and ID-based authenticated key agreement protocols have been presented, but they cannot solve the problem completely. A novel ID-based authentication scheme based on ID-based encryption (IBE) and fingerprint hashing method is proposed to solve the difficulties in the IBE scheme, which includes message receiver authenticating the sender, the trusted authority (TA) authenticating the users and transmitting the private key to them. Furthermore, the scheme extends the application of fingerprint authentication from terminal to network and protects against fingerprint data fabrication. The fingerprint authentication method consists of two factors. This method combines a token key, for example, the USB key, with the user's fingerprint hash by mixing a pseudo-random number with the fingerprint feature. The security and experimental efficiency meet the requirements of practical applications.

  15. ID3算法在汽车售后服务中的应用%Application of ID3 Algorithm in Automotive After-sale Service

    Institute of Scientific and Technical Information of China (English)

    郭春丽; 李明东; 赵刚

    2011-01-01

    Decision tree algorithm has been successfully applied in much classification issue.ID3 algorithm is the representative algorithm.The application of algorithm has been given an instance study for the analysis of the customer features in the automotive after-sale service.Describing the principle and implementation of the ID3 algorithm and analyzing the features of the clients,also explaining concretely the approach of how to use ID3 to manage the clients in the automotive after-sale service.At the end,setting up the customer characteristics analysis model of automotive after-sale services.Through those strategies,the companies can realize the maximization of their total profits.%决策树算法被成功应用到很多分类问题上,其中ID3算法是其典型算法.文中就该算法在汽车售后服务企业客户特征分析中的应用做了实例研究.阐述了ID3算法的原理以及实现算法,分析了客户的特征.以一个具体的案例讲解了ID3算法在汽车售后服务企业中客户管理的具体应用流程.文中实现ID3算法作用于汽车售后客户的数据,得到一个客户特征分析模型,可以帮助汽车企业根据不同特征的客户采取不同的策略,从而获得较大利润.

  16. On the security flaws in ID-based password authentication schemes for telecare medical information systems.

    Science.gov (United States)

    Mishra, Dheerendra

    2015-01-01

    Telecare medical information systems (TMIS) enable healthcare delivery services. However, access of these services via public channel raises security and privacy issues. In recent years, several smart card based authentication schemes have been introduced to ensure secure and authorized communication between remote entities over the public channel for the (TMIS). We analyze the security of some of the recently proposed authentication schemes of Lin, Xie et al., Cao and Zhai, and Wu and Xu's for TMIS. Unfortunately, we identify that these schemes failed to satisfy desirable security attributes. In this article we briefly discuss four dynamic ID-based authentication schemes and demonstrate their failure to satisfy desirable security attributes. The study is aimed to demonstrate how inefficient password change phase can lead to denial of server scenario for an authorized user, and how an inefficient login phase causes the communication and computational overhead and decrease the performance of the system. Moreover, we show the vulnerability of Cao and Zhai's scheme to known session specific temporary information attack, vulnerability of Wu and Xu's scheme to off-line password guessing attack, and vulnerability of Xie et al.'s scheme to untraceable on-line password guessing attack.

  17. Polarized Light Corridor Demonstrations.

    Science.gov (United States)

    Davies, G. R.

    1990-01-01

    Eleven demonstrations of light polarization are presented. Each includes a brief description of the apparatus and the effect demonstrated. Illustrated are strain patterns, reflection, scattering, the Faraday Effect, interference, double refraction, the polarizing microscope, and optical activity. (CW)

  18. The POSEIDON Demonstrator

    NARCIS (Netherlands)

    Laar, P.J.L.J. van de

    2013-01-01

    In this chapter, we discuss the Poseidon demonstrator: a demonstrator that integrates the individual research results of all partners of the Poseidon project. After describing how the Poseidon demonstrator was built, deployed, and operated, we will not only show many results obtained from the demons

  19. Overhead Projector Demonstrations.

    Science.gov (United States)

    Kolb, Doris, Ed.

    1988-01-01

    Details two demonstrations for use with an overhead projector in a chemistry lecture. Includes "A Very Rapidly Growing Silicate Crystal" and "A Colorful Demonstration to Simulate Orbital Hybridization." The materials and directions for each demonstration are included as well as a brief explanation of the essential learning involved. (CW)

  20. Strategy Guideline: Demonstration Home

    Energy Technology Data Exchange (ETDEWEB)

    Savage, C.; Hunt, A.

    2012-12-01

    This guideline will provide a general overview of the different kinds of demonstration home projects, a basic understanding of the different roles and responsibilities involved in the successful completion of a demonstration home, and an introduction into some of the lessons learned from actual demonstration home projects. Also, this guideline will specifically look at the communication methods employed during demonstration home projects. And lastly, we will focus on how to best create a communication plan for including an energy efficient message in a demonstration home project and carry that message to successful completion.

  1. Strategy Guideline. Demonstration Home

    Energy Technology Data Exchange (ETDEWEB)

    Hunt, A.; Savage, C.

    2012-12-01

    This guideline will provide a general overview of the different kinds of demonstration home projects, a basic understanding of the different roles and responsibilities involved in the successful completion of a demonstration home, and an introduction into some of the lessons learned from actual demonstration home projects. Also, this guideline will specifically look at the communication methods employed during demonstration home projects. And lastly, we will focus on how to best create a communication plan for including an energy efficient message in a demonstration home project and carry that message to successful completion.

  2. Bio-fortification and shelf-life extension of idli batter using curry leaves (Murraya koenigii).

    Science.gov (United States)

    Chelliah, R; Ramakrishnan, S R; Premkumar, D; Antony, U

    2016-06-01

    Among several traditional foods of India, idli is one of the most popular and commonly consumed steamed products. A new method of adding Murraya koenigii (curry leaves) to idli batter as a vehicle for fortification and extension of shelf-life has been developed. Dried curry leaves powder was incorporated with other ingredients like rice and dehusked black gram in different proportions to optimize the most palatable formulation. Rate of fermentation and microbial changes in the batter; nutritional qualities, texture and sensory properties of the prepared product were assessed. Incorporation of curry leaves powder (5 %) in idli batter increased the shelf-life and also increased the flavour, texture and appearance of the idli. The calcium content of the prepared idli was 10 times more than that of the control idli, while dietary fiber content increased by 18.6 %. Anti-microbial activity of the curry leaves in idli batter extended the shelf-life from 2 to 5 days when stored at 30 °C.

  3. STOMP Subsurface Transport Over Multiple Phases: User`s guide

    Energy Technology Data Exchange (ETDEWEB)

    White, M.D.; Oostrom, M.

    1997-10-01

    The U.S. Department of Energy, through the Office of Technology Development, has requested the demonstration of remediation technologies for the cleanup of volatile organic compounds and associated radionuclides within the soil and groundwater at arid sites. This demonstration program, called the VOC-Arid Soils Integrated Demonstration Program (Arid-ID), has been initially directed at a volume of unsaturated and saturated soil contaminated with carbon tetrachloride, on the Hanford Site near Richland, Washington. A principal subtask of the Arid-ID program involves the development of an integrated engineering simulator for evaluating the effectiveness and efficiency of various remediation technologies. The engineering simulator`s intended users include scientists and engineers who are investigating soil physics phenomena associated with remediation technologies. Principal design goals for the engineer simulator include broad applicability, verified algorithms, quality assurance controls, and validated simulations against laboratory and field-scale experiments. An important goal for the simulator development subtask involves the ability to scale laboratory and field-scale experiments to full-scale remediation technologies, and to transfer acquired technology to other arid sites. The STOMP (Subsurface Transport Over Multiple Phases) simulator has been developed by the Pacific Northwest National Laboratory for modeling remediation technologies. Information on the use, application, and theoretical basis of the STOMP simulator theory and discussions on the governing equations, constitutive relations, and numerical solution algorithms for the STOMP simulator.

  4. STOMP Subsurface Transport Over Multiple Phases: Application guide

    Energy Technology Data Exchange (ETDEWEB)

    Nichols, W.E.; Aimo, N.J.; Oostrom, M.; White, M.D.

    1997-09-01

    The U.S. Department of Energy (DOE), through the Office of Technology Development, has requested the demonstration of remediation technologies for the cleanup of volatile organic compounds and associated radionuclides within the soil and ground water at arid sites. This demonstration program, called the VOC-Arid Soils Integrated Demonstrated Program (Arid-ID), has been initially directed at a volume of unsaturated and saturated soil contaminated with carbon tetrachloride on the Hanford Site near Richland, Washington. A principal subtask of the Arid-ID program involves the development of an integrated engineering simulator for evaluating the effectiveness and efficiency of various remediation technologies. The engineering simulator`s intended users include scientists and engineers who are investigating soil physics phenomena associated with remediation technologies. Principal design goals for the engineering simulator include broad applicability, verified algorithms, quality assurance controls, and validated simulations against laboratory and field-scale experiments. An important goal for the simulator development subtask involves the ability to scale laboratory and field-scale experiments to full-scale remediation technologies, and to transfer acquired technology to other arid sites. The STOMP (Subsurface Transport Over Multiple Phases) simulator has been developed by the Pacific Northwest Laboratory for modeling remediation technologies. Information on the use, application, and theoretical basis of the STOMP simulator are documented in three companion guide guides. This document, the Application Guide, provides a suite of example applications of the STOMP simulator.

  5. An Improved ID3 Decision Tree Mining Algorithm%一种改进 ID3型决策树挖掘算法

    Institute of Scientific and Technical Information of China (English)

    潘大胜; 屈迟文

    2016-01-01

    By analyzing the problem of ID3 decision tree mining algorithm,the entropy calculation process is improved, and a kind of improved ID3 decision tree mining algorithm is built.Entropy calculation process of decision tree is rede-signed in order to obtain global optimal mining results.The mining experiments are carried out on the UCI data category 6 data set.Experimental results show that the improved mining algorithm is much better than the ID3 type decision tree mining algorithm in the compact degree and the accuracy of the decision tree construction.%分析经典 ID3型决策树挖掘算法中存在的问题,对其熵值计算过程进行改进,构建一种改进的 ID3型决策树挖掘算法。重新设计决策树构建中的熵值计算过程,以获得具有全局最优的挖掘结果,并针对 UCI 数据集中的6类数据集展开挖掘实验。结果表明:改进后的挖掘算法在决策树构建的简洁程度和挖掘精度上,都明显优于 ID3型决策树挖掘算法。

  6. Improvement and analysis of ID3 algorithm in decision-making tree

    Science.gov (United States)

    Xie, Xiao-Lan; Long, Zhen; Liao, Wen-Qi

    2015-12-01

    For the cooperative system under development, it needs to use the spatial analysis and relative technology concerning data mining in order to carry out the detection of the subject conflict and redundancy, while the ID3 algorithm is an important data mining. Due to the traditional ID3 algorithm in the decision-making tree towards the log part is rather complicated, this paper obtained a new computational formula of information gain through the optimization of algorithm of the log part. During the experiment contrast and theoretical analysis, it is found that IID3 (Improved ID3 Algorithm) algorithm owns higher calculation efficiency and accuracy and thus worth popularizing.

  7. The paradox of IDs: an account of an ethnographic experience in the US

    Directory of Open Access Journals (Sweden)

    Mariza Peirano

    2008-01-01

    Full Text Available In the modern world, IDs are indispensable objects, without which we cannot prove that we are who we say we are. We need material substantiation that attests to the authenticity of our self-identification. This paper is an account of an ethnographic experience about IDs and identification processes in the US, based on the examination of two events in which Eliot Spitzer, the New York State governor from January 2007 to March 2008, was a central figure. A comparison with the Brazilian scenario is present throughout the paper, and it ends by focusing on the ID theft phenomenon.

  8. 62 FR 28104 - Union Pacific Railroad CompanyAbandonment Exemptionin Malheur County, OR and Owyhee County, ID...

    Science.gov (United States)

    1997-05-22

    ... and Owyhee County, ID (Homedale Branch) On May 2, 1997, Union Pacific Railroad Company (UP) filed with..., and Owyhee County, ID, and includes the non-agency stations of Napton, OR-- milepost 16.90;...

  9. The treatable intellectual disability APP www.treatable-id.org: a digital tool to enhance diagnosis & care for rare diseases

    National Research Council Canada - National Science Library

    van Karnebeek, Clara D M; Houben, Roderick F A; Lafek, Mirafe; Giannasi, Wynona; Stockler, Sylvia

    2012-01-01

    .... Freely available as a WebAPP via http://www.treatable-id.org and end 2012 via the APP store, this diagnostic tool is designed for all specialists evaluating children with global delay / ID and laboratory scientists...

  10. Manufacturing Demonstration Facility (MDF)

    Data.gov (United States)

    Federal Laboratory Consortium — The U.S. Department of Energy Manufacturing Demonstration Facility (MDF) at Oak Ridge National Laboratory (ORNL) provides a collaborative, shared infrastructure to...

  11. Improving global flood risk awareness through collaborative research: Id-Lab

    Science.gov (United States)

    Weerts, A.; Zijderveld, A.; Cumiskey, L.; Buckman, L.; Verlaan, M.; Baart, F.

    2015-12-01

    Scientific and end-user collaboration on operational flood risk modelling and forecasting requires an environment where scientists and end-users can physically work together and demonstrate, enhance and learn about new tools, methods and models for forecasting and warning purposes. Therefore, Deltares has built a real-time demonstration, training and research infrastructure ('operational' room and ICT backend). This research infrastructure supports various functions like (1) Real time response and disaster management, (2) Training, (3) Collaborative Research, (4) Demonstration. The research infrastructure will be used for a mixture of these functions on a regular basis by Deltares and a multitude of both scientists as well as end users such as universities, research institutes, consultants, governments and aid agencies. This infrastructure facilitates emergency advice and support during international and national disasters caused by rainfall, tropical cyclones or tsunamis. It hosts research flood and storm surge forecasting systems for global/continental/regional scale. It facilitates training for emergency & disaster management (along with hosting forecasting system user trainings in for instance the forecasting platform Delft-FEWS) both internally and externally. The facility is expected to inspire and initiate creative innovations by bringing together different experts from various organizations. The room hosts interactive modelling developments, participatory workshops and stakeholder meetings. State of the art tools, models and software, being applied across the globe are available and on display within the facility. We will present the Id-Lab in detail and we will put particular focus on the global operational forecasting systems GLOFFIS (Global Flood Forecasting Information System) and GLOSSIS (Global Storm Surge Information System).

  12. Id-1 gene and gene products as therapeutic targets for treatment of breast cancer and other types of carcinoma

    Science.gov (United States)

    Desprez, Pierre-Yves; Campisi, Judith

    2014-08-19

    A method for treatment of breast cancer and other types of cancer. The method comprises targeting and modulating Id-1 gene expression, if any, for the Id-1 gene, or gene products in breast or other epithelial cancers in a patient by delivering products that modulate Id-1 gene expression. When expressed, Id-1 gene is a prognostic indicator that cancer cells are invasive and metastatic.

  13. An efficient and secure dynamic ID-based authentication scheme for telecare medical information systems.

    Science.gov (United States)

    Chen, Hung-Ming; Lo, Jung-Wen; Yeh, Chang-Kuo

    2012-12-01

    The rapidly increased availability of always-on broadband telecommunication environments and lower-cost vital signs monitoring devices bring the advantages of telemedicine directly into the patient's home. Hence, the control of access to remote medical servers' resources has become a crucial challenge. A secure authentication scheme between the medical server and remote users is therefore needed to safeguard data integrity, confidentiality and to ensure availability. Recently, many authentication schemes that use low-cost mobile devices have been proposed to meet these requirements. In contrast to previous schemes, Khan et al. proposed a dynamic ID-based remote user authentication scheme that reduces computational complexity and includes features such as a provision for the revocation of lost or stolen smart cards and a time expiry check for the authentication process. However, Khan et al.'s scheme has some security drawbacks. To remedy theses, this study proposes an enhanced authentication scheme that overcomes the weaknesses inherent in Khan et al.'s scheme and demonstrated this scheme is more secure and robust for use in a telecare medical information system.

  14. Toy Demonstrator's "VISIT" Handbook.

    Science.gov (United States)

    Levenstein, Phyllis

    The role of the toy demonstrator in a home-based, mother-involved intervention effort (Verbal Interaction Project) is presented in this handbook for staff members. It is believed that the prerequisites for functioning in the toy demonstrator's role are a sense of responsibility, patience with the children and their mothers, and willingness to be…

  15. Levitation Kits Demonstrate Superconductivity.

    Science.gov (United States)

    Worthy, Ward

    1987-01-01

    Describes the "Project 1-2-3" levitation kit used to demonstrate superconductivity. Summarizes the materials included in the kit. Discusses the effect demonstrated and gives details on how to obtain kits. Gives an overview of the documentation that is included. (CW)

  16. Kinetics and Catalysis Demonstrations.

    Science.gov (United States)

    Falconer, John L.; Britten, Jerald A.

    1984-01-01

    Eleven videotaped kinetics and catalysis demonstrations are described. Demonstrations include the clock reaction, oscillating reaction, hydrogen oxidation in air, hydrogen-oxygen explosion, acid-base properties of solids, high- and low-temperature zeolite reactivity, copper catalysis of ammonia oxidation and sodium peroxide decomposition, ammonia…

  17. Better Ira Remsen Demonstration

    Science.gov (United States)

    Dalby, David K.; Maynard, James H.; Moore, John W.

    2011-01-01

    Many versions of the classic Ira Remsen experience involving copper and concentrated nitric acid have been used as lecture demonstrations. Remsen's original reminiscence from 150 years ago is included in the Supporting Information, and his biography can be found on the Internet. This article presents a new version that makes the demonstration more…

  18. Levitation Kits Demonstrate Superconductivity.

    Science.gov (United States)

    Worthy, Ward

    1987-01-01

    Describes the "Project 1-2-3" levitation kit used to demonstrate superconductivity. Summarizes the materials included in the kit. Discusses the effect demonstrated and gives details on how to obtain kits. Gives an overview of the documentation that is included. (CW)

  19. Toward operation of series IDs at BL43LXU of SPring-8

    Energy Technology Data Exchange (ETDEWEB)

    Baron, A. Q. R.; Tanaka, T.; Soutome, K.; Takao, M.; Nakamura, T.; Kobayashi, K.; Fujita, T.; Takahashi, S.; Aoyagi, H.; Shimosaki, Y.; Seike, T.; Uchiyama, H.; Ishikawa, D.; Chuang, T.-H.; Kimura, H.; Tanaka, H.; Kitamura, H.; Ishikawa, T. [SPring-8, 1-1-1 Kouto, Sayo, Hyogo, 679 (Japan)

    2016-07-27

    This paper discusses two issues relating to using 3 small gap insertion devices in series at BL43LXU of SPring-8 to make a uniquely powerful source in the 15-26 keV region of the x-ray spectrum. The issues discussed are (1) damage to the covers of the downstream IDs by radiation from the upstream IDs and (2) proper steering of the electron beam to get the best photon beam properties. After tests in several configurations, including one where an ID was run without an impedance-reducing cover, the damage issue was solved by installing a distributed absorber in the most downstream ID. The steering issues were mostly resolved by the introduction of appropriate corrector magnets and feedback. The paper is written from the viewpoint of an interested beamline scientist impressed with the cooperation of different groups to make a source for new science possible.

  20. 76 FR 16367 - Implementation of the Truth in Caller ID Act of 2009

    Science.gov (United States)

    2011-03-23

    ...IP service,'' and defining ``Caller identification service'' to mean ``any service or device designed... identification information in technologies that are successor or replacement technologies to telecommunications... from causing any caller identification service to knowingly transmit misleading or inaccurate caller ID...

  1. ID migraine questionnaire in temporomandibular disorders with craniofacial pain: a study by using a multidisciplinary approach.

    Science.gov (United States)

    Di Paolo, Carlo; Di Nunno, Anna; Vanacore, Nicola; Bruti, Gianluca

    2009-08-01

    To evaluate the prevalence of migraine and related disability and the role of ID migraine questionnaire as a screening tool in patients with temporomandibular disorders (TMDs) and craniofacial pain (CFP). TMDs patients with CFP underwent stomatognathic (RDC/TMD criteria) and neurological visits (IHS criteria, 2004). ID migraine questionnaire and MIgraine Disability Assessment Scale (MIDAS) were also administered. Out of 45 patients, 69% met diagnosis of migraine plus chronic tension-type headache (CTTH); 9% presented CTTH and 20% were migraineurs. Out of 39 migraineurs who completed MIDAS, 56% presented the highest disability grade. Out of 37 patients who completed ID migraine questionnaire, 32 resulted affected by probable migraine with a diagnostic sensibility and specificity of 94% and 100%, respectively. Our findings showed a clinical association between TMDs and migraine. We support a clinical role of ID migraine and MIDAS in TMDs patients with CFP and we underline the importance of a multidisciplinary evaluation in this group of migraineurs.

  2. 80 FR 9279 - Deer Flat National Wildlife Refuge, Canyon, Payette, Owyhee, and Washington Counties, ID, and...

    Science.gov (United States)

    2015-02-20

    ...-2013-N279; 1265-0000-10137-S3] Deer Flat National Wildlife Refuge, Canyon, Payette, Owyhee, and..., 1010 Dearborn St, Caldwell, ID 83605. [ssquf] Homedale Public Library, 125 W Owyhee Ave, Homedale,...

  3. 76 FR 78940 - Minidoka National Wildlife Refuge, Blaine, Cassia, Minidoka, and Power Counties, ID...

    Science.gov (United States)

    2011-12-20

    ... From the Federal Register Online via the Government Publishing Office DEPARTMENT OF THE INTERIOR Fish and Wildlife Service Minidoka National Wildlife Refuge, Blaine, Cassia, Minidoka, and Power Counties, ID; Comprehensive Conservation Plan and Environmental Assessment AGENCY: Fish and...

  4. 78 FR 773 - Hartford Financial Services Group, Inc., Commercial/Actuarial/Information Delivery Services (IDS...

    Science.gov (United States)

    2013-01-04

    ... Employment and Training Administration Hartford Financial Services Group, Inc., Commercial/Actuarial/ Information Delivery Services (IDS)/Corporate & Financial Reporting Group, Hartford, CT; Notice of Affirmative... workers of Hartford Financial Services Group, Inc., Commercial/ Actuarial/Information Delivery...

  5. Infant-directed speech (IDS) vowel clarity and child language outcomes.

    Science.gov (United States)

    Hartman, Kelly M; Ratner, Nan Bernstein; Newman, Rochelle S

    2017-09-01

    There have been many studies examining the differences between infant-directed speech (IDS) and adult-directed speech (ADS). However, investigations asking whether mothers clarify vowel articulation in IDS have reached equivocal findings. Moreover, it is unclear whether maternal speech clarification has any effect on a child's developing language skills. This study examined vowel clarification in mothers' IDS at 0;10-11, 1;6, and 2;0, as compared to their vowel production in ADS. Relationships between vowel space, vowel duration, and vowel variability and child language outcomes at two years were also explored. Results show that vowel space and vowel duration tended to be greater in IDS than in ADS, and that one measure of vowel clarity, a mother's vowel space at 1;6, was significantly related to receptive as well as expressive child language outcomes at two years of age.

  6. The Evolution of IDS Solutions in Wireless Ad-Hoc Networks To Wireless Mesh Networks

    Directory of Open Access Journals (Sweden)

    Novarun Deb

    2011-12-01

    Full Text Available The domain of wireless networks is inherently vulnerable to attacks due to the unreliable wireless medium. Such networks can be secured from intrusions using either prevention or detection schemes. This paper focuses its study on intrusion detection rather than prevention of attacks. As attackers keep onimprovising too, an active prevention method alone cannot provide total security to the system. Here in lies the importance of intrusion detection systems (IDS that are solely designed to detect intrusions in real time. Wireless networks are broadly classified into Wireless Ad-hoc Networks (WAHNs, Mobile Adhoc Networks (MANETs, Wireless Sensor Networks (WSNs and the most recent Wireless Mesh Networks (WMNs. Several IDS solutions have been proposed for these networks. This paper is an extension to a survey of IDS solutions for MANETs and WMNs published earlier in the sense that the present survey offers a comparative insight of recent IDS solutions for all the sub domains of wireless networks.

  7. Family Impact in Intellectual Disability, Severe Mental Health Disorders and Mental Health Disorders in ID. A Comparison

    Science.gov (United States)

    Martorell, Almudena; Gutierrez-Recacha, Pedro; Irazabal, Marcia; Marsa, Ferran; Garcia, Mercedes

    2011-01-01

    Family impact (or family burden) is a concept born in the field of mental health that has successfully been exported to the ambit of intellectual disability (ID). However, differences in family impact associated with severe mental health disorders (schizophrenia), to ID or to mental health problems in ID should be expected. Seventy-two adults with…

  8. 6 CFR 37.5 - Validity periods and deadlines for REAL ID driver's licenses and identification cards.

    Science.gov (United States)

    2010-01-01

    ... SECURITY, OFFICE OF THE SECRETARY REAL ID DRIVER'S LICENSES AND IDENTIFICATION CARDS General § 37.5 Validity periods and deadlines for REAL ID driver's licenses and identification cards. (a) Driver's... individuals born after December 1, 1964, unless such license or card is a REAL ID-compliant driver's...

  9. Improved D-IDS using the federated peer-to-peer architecture

    Institute of Scientific and Technical Information of China (English)

    Hoan Kyu Lee; In Joo Jang; Hyeong Seon Yoo

    2007-01-01

    A number of IDSs have been proposed for a networked or distributed environment. A modified D-IDS using federated peer-to-peer architecture, MCR (Multicast Reflector) and modified shaker protocol were proposed. The suggested scheme can be implemented easily and performs the information sharing between low-level IDS agents. As all users within a group monitor each other's, the common control server can perform detect intrusions with less cost and support the detection of the inside intruders.

  10. ACE I/D polymorphism in Indian patients with hypertrophic cardiomyopathy and dilated cardiomyopathy

    DEFF Research Database (Denmark)

    Rai, Taranjit Singh; Dhandapany, Perundurai Subramaniam; Ahluwalia, Tarun Veer Singh

    2008-01-01

    The study was carried to determine the association of angiotensin converting enzyme (ACE) insertion/deletion (I/D) polymorphism with the risk of hypertrophic cardiomyopathy (HCM), dilated cardiomyopathy (DCM), and restrictive cardiomyopathy (RCM).......The study was carried to determine the association of angiotensin converting enzyme (ACE) insertion/deletion (I/D) polymorphism with the risk of hypertrophic cardiomyopathy (HCM), dilated cardiomyopathy (DCM), and restrictive cardiomyopathy (RCM)....

  11. Id2 controls specification of Lgr5(+) intestinal stem cell progenitors during gut development.

    Science.gov (United States)

    Nigmatullina, Lira; Norkin, Maxim; Dzama, Margarita M; Messner, Berith; Sayols, Sergi; Soshnikova, Natalia

    2017-04-03

    The adult intestinal stem cells (ISCs), their hierarchies, mechanisms of maintenance and differentiation have been extensively studied. However, when and how ISCs are established during embryogenesis remains unknown. We show here that the transcription regulator Id2 controls the specification of embryonic Lgr5(+) progenitors in the developing murine small intestine. Cell fate mapping analysis revealed that Lgr5(+) progenitors emerge at E13.5 in wild-type embryos and differ from the rest on the intestinal epithelium by a characteristic ISC signature. In the absence of Id2, the intestinal epithelium differentiates into Lgr5(+) cells already at E9.5. Furthermore, the size of the Lgr5(+) cell pool is significantly increased. We show that Id2 restricts the activity of the Wnt signalling pathway at early stages and prevents precocious differentiation of the embryonic intestinal epithelium. Id2-deficient embryonic epithelial cells cultured ex vivo strongly activate Wnt target genes as well as markers of neoplastic transformation and form fast growing undifferentiated spheroids. Furthermore, adult ISCs from Id2-deficient mice display a distinct transcriptional signature, supporting an essential role for Id2 in the correct specification of ISCs. © 2017 The Authors.

  12. System Virtualization and Efficient ID Transmission Method for RFID Tag Infrastructure Network

    Directory of Open Access Journals (Sweden)

    Shin-ichi Kuribayashi

    2010-11-01

    Full Text Available The use of RFID tag which identifies a thing and an object will be expanded with progress of ubiquitoussociety, and it is necessary to study how to construct RFID network system as a social infrastructure likethe Internet. First, this paper proposes the virtualization method of RFID tag network system to enablethe same physical RFID network system to be used by multiple different service systems. The systemvirtualization not only reduces the system cost but also can dramatically reduce the installation space ofphysical readers and the operation cost. It is proposed that all equipments in the RFID network systemexcept RFID tag could be shared with the conventional virtual technologies. Then, this paper proposesthe conditional tag ID processing and the efficient tag ID transmission method which can greatly reducethe processing time and processing load in RFID tag Infrastructure network The conditional tag IDprocessing allows that tag ID is valid only at a certain time zone of day or in a certain area. The efficienttag ID transmission method uses the virtual network address of the service center as a part of the ID of anRF tag, which allows the direct ID forwarding to the service center.

  13. Intra-domain phage display (ID-PhD of peptides and protein mini-domains censored from canonical pIII phage display

    Directory of Open Access Journals (Sweden)

    Katrina F Tjhung

    2015-04-01

    Full Text Available In this paper, we describe multivalent display of peptide and protein sequences typically censored from traditional N-terminal display on protein pIII of filamentous bacteriophage M13. Using site-directed mutagenesis of commercially available M13KE phage cloning vector, we introduced sites that permit efficient cloning using restriction enzymes between domains N1 and N2 of the pIII protein. As infectivity of phage is directly linked to the integrity of the connection between N1 and N2 domains, intra-domain phage display (ID-PhD allows for simple quality control of the display and the natural variations in the displayed sequences. Additionally, direct linkage to phage propagation allows efficient monitoring of sequence cleavage, providing a convenient system for selection and evolution of protease-susceptible or protease-resistant sequences. As an example of the benefits of such an ID-PhD system, we displayed a charged FLAG sequence, which is known to be post-translationally excised from pIII when displayed on the N-terminus. ID-PhD of FLAG exhibited sub-nanomolar apparent Kd suggesting multivalent nature of the display. A TEV-protease recognition sequence (TEVrs co-expressed in tandem with FLAG, allowed us to demonstrate that 99.9997% of the phage displayed the FLAG-TEVrs tandem and can be recognized and cleaved by TEV-protease. The residual 0.0003% consisted of phage clones that have excised the insert from their genome. ID-PhD is also amenable to display of protein mini-domains, such as the 33-residue minimized Z-domain of protein A. We show that it is thus possible to use ID-PhD for multivalent display and selection of mini-domain proteins (Affibodies, scFv, etc..

  14. Methanol Cannon Demonstrations Revisited.

    Science.gov (United States)

    Dolson, David A.; And Others

    1995-01-01

    Describes two variations on the traditional methanol cannon demonstration. The first variation is a chain reaction using real metal chains. The second example involves using easily available components to produce sequential explosions that can be musical in nature. (AIM)

  15. TENCompetence tool demonstration

    NARCIS (Netherlands)

    Kluijfhout, Eric

    2010-01-01

    Kluijfhout, E. (2009). TENCompetence tool demonstration. Presented at Zorgacademie Parkstad (Health Academy Parkstad), Limburg Leisure Academy, Life Long Learning Limburg and a number of regional educational institutions. May, 18, 2009, Heerlen, The Netherlands: Open University of the Netherlands, T

  16. Land Management Research Demonstration

    Data.gov (United States)

    US Fish and Wildlife Service, Department of the Interior — In 2002, Neal Smith National Wildlife Refuge became one of the first Land Management and Research Demonstration (LMRD) sites. These sites are intended to serve as...

  17. Pancreaticopleural fistula : CT demonstration

    Energy Technology Data Exchange (ETDEWEB)

    Hahm, Jin Kyeung [Chuncheon Medical Center, ChunChon (Korea, Republic of)

    1997-03-01

    In patients with chronic pancreatitis, the pancreaticopleural fistula is known to cause recurrent exudative or hemorrhagic pleural effusions. These are often large in volume and require treatment, unlike the effusions in acute pancreatitis. Diagnosis can be made either by the finding of elevated pleural fluid amylase level or, using imaging studies, by the direct demonstration of the fistulous tract. We report two cases of pancreaticopleural fistula demonstrated by computed tomography.

  18. Education Payload Operation - Demonstrations

    Science.gov (United States)

    Keil, Matthew

    2009-01-01

    Education Payload Operation - Demonstrations (EPO-Demos) are recorded video education demonstrations performed on the International Space Station (ISS) by crewmembers using hardware already onboard the ISS. EPO-Demos are videotaped, edited, and used to enhance existing NASA education resources and programs for educators and students in grades K-12. EPO-Demos are designed to support the NASA mission to inspire the next generation of explorers.

  19. Edible Astronomy Demonstrations

    Science.gov (United States)

    Lubowich, Donald A.

    2007-12-01

    Astronomy demonstrations with edible ingredients are an effective way to increase student interest and knowledge of astronomical concepts. This approach has been successful with all age groups from elementary school through college students - and the students remember these demonstrations after they are presented. In this poster I describe edible demonstrations I have created to simulate the expansion of the universe (using big-bang chocolate chip cookies); differentiation during the formation of the Earth and planets (using chocolate or chocolate milk with marshmallows, cereal, candy pieces or nuts); and radioactivity/radioactive dating (using popcorn). Other possible demonstrations include: plate tectonics (crackers with peanut butter and jelly); convection (miso soup or hot chocolate); mud flows on Mars (melted chocolate poured over angel food cake); formation of the Galactic disk (pizza); formation of spiral arms (coffee with cream); the curvature of Space (Pringles); constellations patterns with chocolate chips and chocolate chip cookies; planet shaped cookies; star shaped cookies with different colored frostings; coffee or chocolate milk measurement of solar radiation; Oreo cookie lunar phases. Sometimes the students eat the results of the astronomical demonstrations. These demonstrations are an effective teaching tool and can be adapted for cultural, culinary, and ethnic differences among the students.

  20. Recombinant DNA technology for melanoma immunotherapy: anti-Id DNA vaccines targeting high molecular weight melanoma-associated antigen.

    Science.gov (United States)

    Barucca, A; Capitani, M; Cesca, M; Tomassoni, D; Kazmi, U; Concetti, F; Vincenzetti, L; Concetti, A; Venanzi, F M

    2014-11-01

    Anti-idiotypic MK2-23 monoclonal antibody (anti-Id MK2-23 mAb), which mimics the high molecular weight melanoma-associated antigen (HMW-MAA), has been used to implement active immunotherapy against melanoma. However, due to safety and standardization issues, this approach never entered extensive clinical trials. In the present study, we investigated the usage of DNA vaccines as an alternative to MK2-23 mAb immunization. MK2-23 DNA plasmids coding for single chain (scFv) MK2-23 antibody were constructed via the insertion of variable heavy (V H) and light (V L) chains of MK2-23 into the pVAC-1mcs plasmids. Two alternative MK2-23 plasmids format V H/V L, and V L/V H were assembled. We demonstrate that both polypeptides expressed by scFv plasmids in vitro retained the ability to mimic HMW-MAA antigen, and to elicit specific anti-HMW-MAA humoral and cellular immunoresponses in immunized mice. Notably, MK2-23 scFv DNA vaccines impaired the onset and growth of transplantable B16 melanoma cells not engineered to express HMW-MAA. This pilot study suggests that optimized MK2-23 scFv DNA vaccines could potentially provide a safer and cost-effective alternative to anti-Id antibody immunization, for melanoma immunotherapy.

  1. Solar renovation demonstration projects

    Energy Technology Data Exchange (ETDEWEB)

    Bruun Joergensen, O. [ed.

    1998-10-01

    In the framework of the IEA SHC Programme, a Task on building renovation was initiated, `Task 20, Solar Energy in Building Renovation`. In a part of the task, Subtask C `Design of Solar Renovation Projects`, different solar renovation demonstration projects were developed. The objective of Subtask C was to demonstrate the application of advanced solar renovation concepts on real buildings. This report documents 16 different solar renovation demonstration projects including the design processes of the projects. The projects include the renovation of houses, schools, laboratories, and factories. Several solar techniques were used: building integrated solar collectors, glazed balconies, ventilated solar walls, transparent insulation, second skin facades, daylight elements and photovoltaic systems. These techniques are used in several simple as well as more complex system designs. (au)

  2. Demonstrating marketing accountability.

    Science.gov (United States)

    Gombeski, William R; Britt, Jason; Taylor, Jan; Riggs, Karen; Wray, Tanya; Adkins, Wanda; Springate, Suzanne

    2008-01-01

    Pressure on health care marketers to demonstrate effectiveness of their strategies and show their contribution to organizational goals is growing. A seven-tiered model based on the concepts of structure (having the right people, systems), process (doing the right things in the right way), and outcomes (results) is discussed. Examples of measures for each tier are provided and the benefits of using the model as a tool for measuring, organizing, tracking, and communicating appropriate information are provided. The model also provides a framework for helping management understand marketing's value and can serve as a vehicle for demonstrating marketing accountability.

  3. Demonstrating Supernova Remnant Evolution

    Science.gov (United States)

    Leahy, Denis A.; Williams, Jacqueline

    2017-01-01

    We have created a software tool to calculate at display supernova remnant evolution which includes all stages from early ejecta dominated phase to late-time merging with the interstellar medium. The software was created using Python, and can be distributed as Python code, or as an executable file. The purpose of the software is to demonstrate the different phases and transitions that a supernova remnant undergoes, and will be used in upper level undergraduate astrophysics courses as a teaching tool. The usage of the software and its graphical user interface will be demonstrated.

  4. Gigashot Optical Laser Demonstrator

    Energy Technology Data Exchange (ETDEWEB)

    Deri, R. J. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States)

    2015-10-13

    The Gigashot Optical Laser Demonstrator (GOLD) project has demonstrated a novel optical amplifier for high energy pulsed lasers operating at high repetition rates. The amplifier stores enough pump energy to support >10 J of laser output, and employs conduction cooling for thermal management to avoid the need for expensive and bulky high-pressure helium subsystems. A prototype amplifier was fabricated, pumped with diode light at 885 nm, and characterized. Experimental results show that the amplifier provides sufficient small-signal gain and sufficiently low wavefront and birefringence impairments to prove useful in laser systems, at repetition rates up to 60 Hz.

  5. Monty Roberts’ public demonstrations

    NARCIS (Netherlands)

    Loftus, Loni; Marks, Kelly; Jones-McVey, Rosie; Gonzales, Jose L.; Fowler, Veronica L.

    2016-01-01

    Effective training of horses relies on the trainer’s awareness of learning theory and equine ethology, and should be undertaken with skill and time. Some trainers, such as Monty Roberts, share their methods through the medium of public demonstrations. This paper describes the opportunistic analys

  6. Arctic Craft Demonstration Report

    Science.gov (United States)

    2012-11-01

    it received a lot of attention from the local population. Demonstration personnel, both Coast Guard and contractors, were asked to be receptive to...www.uscg.mil/top/missions/ . Counter-Drug Interdiction and Alien Migrant Interdiction operations are currently not included. In the non-Polar regions

  7. Participatory Lecture Demonstrations.

    Science.gov (United States)

    Battino, Rubin

    1979-01-01

    The use of participatory lecture demonstrations in the classroom is described. Examples are given for the following topics: chromatography, chemical kinetics, balancing equations, the gas laws, kinetic molecular theory, Henry's law of gas solubility, electronic energy levels in atoms, and translational, vibrational, and rotational energies of…

  8. Demonstrating the Gas Laws.

    Science.gov (United States)

    Holko, David A.

    1982-01-01

    Presents a complete computer program demonstrating the relationship between volume/pressure for Boyle's Law, volume/temperature for Charles' Law, and volume/moles of gas for Avagadro's Law. The programing reinforces students' application of gas laws and equates a simulated moving piston to theoretical values derived using the ideal gas law.…

  9. Polarized Light: Three Demonstrations.

    Science.gov (United States)

    Goehmann, Ruth; Welty, Scott

    1984-01-01

    Describes three demonstrations used in the Chicago Museum of Science and Industry polarized light show. The procedures employed are suitable for the classroom by using smaller polarizers and an overhead projector. Topic areas include properties of cellophane tape, nondisappearing arrows, and rope through a picket fence. (JN)

  10. Passive damping technology demonstration

    Science.gov (United States)

    Holman, Robert E.; Spencer, Susan M.; Austin, Eric M.; Johnson, Conor D.

    1995-05-01

    A Hughes Space Company study was undertaken to (1) acquire the analytical capability to design effective passive damping treatments and to predict the damped dynamic performance with reasonable accuracy; (2) demonstrate reasonable test and analysis agreement for both baseline and damped baseline hardware; and (3) achieve a 75% reduction in peak transmissibility and 50% reduction in rms random vibration response. Hughes Space Company teamed with CSA Engineering to learn how to apply passive damping technology to their products successfully in a cost-effective manner. Existing hardware was selected for the demonstration because (1) previous designs were lightly damped and had difficulty in vibration test; (2) multiple damping concepts could be investigated; (3) the finite element model, hardware, and test fixture would be available; and (4) damping devices could be easily implemented. Bracket, strut, and sandwich panel damping treatments that met the performance goals were developed by analysis. The baseline, baseline with damped bracket, and baseline with damped strut designs were built and tested. The test results were in reasonable agreement with the analytical predictions and demonstrated that the desired reduction in dynamic response could be achieved. Having successfully demonstrated this approach, it can now be used with confidence for future designs as a means for reducing weight and enhancing reliability.

  11. PHARUS ASAR demonstrator

    NARCIS (Netherlands)

    Smith, A.J.E.; Bree, R.J.P. van; Calkoen, C.J.; Dekker, R.J.; Otten, M.P.G.; Rossum, W.L. van

    2001-01-01

    PHARUS is a polarimetric phased array C-band Synthetic Aperture Radar (SAR), designed and built for airborne use. Advanced SAR (ASAR) data in image and alternating polarization mode have been simulated with PHARUS to demonstrate the use of Envisat for a number of typical SAR applications that are no

  12. Distance Learning Environment Demonstration.

    Science.gov (United States)

    1996-11-01

    The Distance Learning Environment Demonstration (DLED) was a comparative study of distributed multimedia computer-based training using low cost high...measurement. The DLED project provides baseline research in the effective use of distance learning and multimedia communications over a wide area ATM/SONET

  13. Calculus Demonstrations Using MATLAB

    Science.gov (United States)

    Dunn, Peter K.; Harman, Chris

    2002-01-01

    The note discusses ways in which technology can be used in the calculus learning process. In particular, five MATLAB programs are detailed for use by instructors or students that demonstrate important concepts in introductory calculus: Newton's method, differentiation and integration. Two of the programs are animated. The programs and the…

  14. Palpability Support Demonstrated

    DEFF Research Database (Denmark)

    Brønsted, Jeppe; Grönvall, Erik; Fors, David

    2007-01-01

    is based on the Active Surfaces concept in which therapists rehabilitate physically and mentally impaired children by means of an activity that stimulates the children both physically and cognitively. In this paper we demonstrate how palpability can be supported in a prototype of the Active Surfaces...

  15. Polarized Light: Three Demonstrations.

    Science.gov (United States)

    Goehmann, Ruth; Welty, Scott

    1984-01-01

    Describes three demonstrations used in the Chicago Museum of Science and Industry polarized light show. The procedures employed are suitable for the classroom by using smaller polarizers and an overhead projector. Topic areas include properties of cellophane tape, nondisappearing arrows, and rope through a picket fence. (JN)

  16. 基于生物特征的Auto ID技术——BioID%Automated Biometric Personal Identification and Verification--BioID

    Institute of Scientific and Technical Information of China (English)

    李雄军; 苏廷弼

    2002-01-01

    文章全面而系统地综述了基于生物特征的Auto ID-BioID.重点分析了该技术与系统中的特殊问题,包括BioID系统通用模型、所使用的生物特征的类型、识别技术与系统设计上的共性与差异、性能要求及信号传输和存储两个关键问题;比较了声音、掌形、签名、脸谱、指纹、视网膜和虹膜几种典型的BioID技术的特点、性能与应用现状;探讨了BioID技术发展的动向与前景.

  17. The mathematical model for ID-201 semiconductor single photon counter%ID-201单光子计数器计数模型研究

    Institute of Scientific and Technical Information of China (English)

    曹攀; 朱广浩; 金飚兵

    2016-01-01

    InGaAs半导体单光子探测器具备探测性能强,集成度高等优势,在光谱分析和量子通信等领域有广泛的应用.本文以ID Quantique公司出品的ID-201半导体单光子计数器为研究对象,结合计数器核心部件雪崩光电二极管的工作原理探究其计数光子时的内部过程,推导出每秒钟光子计数值和该计数器几个重要参数触发频率(trigger frequency),门脉冲宽度(gate width),门强制关闭时间(dead time),探测效率(detection efficiency)之间的数学表达式.推导过程着重分析了计数门脉冲的关闭效应对光子探测概率的影响.首先利用泊松分布求解光子计数值与探测效率(detection efficiency)之间的关系,然后将计数过程分成两大部分,分析计数结果与门强制关闭时间(dead time)之间关系.求解得表达式后,利用1550 nm激光器作为ID-201的输入光源,在各种不同实验条件下,对该表达式的正确性进行了检验.%The technology of photon counting has wide applications in physics and electrical engineering.Single photon detectors based on avalanche photodiodes are attractive,Considering their advantages including compact sizes,broad spectrum of responses,and high detection efficiencies.The semiconductor single photon detector normally works in the gated mode,where photons can only be detected when the gate is open.However,if any photon is detected by the photon counter during the gate,several gates after the detection will be forced to shut down so that no photon can be detected during this period.The timing duration that the gates are down is called the dead time.This article mainly focuses on the photon counting performance of the ID-201 semiconductor photon counter,which is produced by the ID Quantique company.The purpose is to derive a photon counting formula for ID-201 and verify it using experiments.Starting with a simple Poisson distribution,we first studied the relationship between the detection

  18. Risk Factors Assessment of the Difficult Intubation using Intubation Difficulty Scale (IDS).

    Science.gov (United States)

    K Nasa, Vaibhav; S Kamath, Shaila

    2014-07-01

    The major responsibility of anaesthesiologist is to maintain adequate gas exchange in his patients in all circumstances and this require that patency of upper airway is constantly maintained. Problems with upper airway management are among the most frequent causes of anaesthetic mishaps. Using intubation difficulty scale (IDS) we made an attempt to objectively assess the predictors of difficult intubation. We assessed classical bedside tests such as modified Mallampati test, Thyromental distance test and also neck extension test. We prospectively observed 400 patients undergoing general anaesthesia with endotracheal intubation, for each patient intubation difficulty score was recorded during intubation. Risk factors assessment of difficult intubation done using IDS. Risk factor assessed includes modified mallampati class III and IV, thyromental distance ≤ 6cm and neck extension intubation (IDS, 0 to 2), slightly difficult intubation (IDS, 3 to 4) and difficult intubation (IDS 5). Preoperative airway assessment was done by thyromental distance measurement, neck extension measurement and modified mallampati test. Data was analysed using Receiver operating characteristic curve (ROC) and area under curve (AUC) for each test computed. pintubation was 8% and there were no failure to intubate the trachea. The AUC were as follows: modified Mallampati test 0.473 (ppredictor of difficult intubation (IDS≥5) in comparison to Thyromental test and modified mallampati test.

  19. Dynamic Programming for Single Nucleotide Polymorphism ID Identification in Systematic Association Studies

    Directory of Open Access Journals (Sweden)

    Cheng-Hong Yang

    2009-04-01

    Full Text Available Single nucleotide polymorphisms (SNPs play an important role in personalized medicine. However, the SNP data reported in many association studies provide only the SNP nucleotide/amino acid position, without providing the SNP ID recorded in National Center for Biotechnology Information databases. A tool with the ability to provide SNP ID identification, with a user-friendly interface, is needed. In this paper, a dynamic programming algorithm was used to compare homologs when the processed input sequence is aligned with the SNP FASTA database. Our novel system provides a web-based tool that uses the National Center for Biotechnology Information dbSNP database, which provides SNP sequence identification and SNP FASTA formats. Freely selectable sequence formats for alignment can be used, including general sequence formats (ACGT, [dNTP1/dNTP2] or IUPAC formats and orientation with bidirectional sequence matching. In contrast to the National Center for Biotechnology Information SNP-BLAST, the proposed system always provides the correct targeted SNP ID (SNP hit, as well as nearby SNPs (flanking hits, arranged in their chromosomal order and contig positions. The system also solves problems inherent in SNP-BLAST, which cannot always provide the correct SNP ID for a given input sequence. Therefore, this system constitutes a novel application which uses dynamic programming to identify SNP IDs from the literature and keyed-in sequences for systematic association studies. It is freely available at http://bio.kuas.edu.tw/SNPosition/.

  20. Changes of osteosarcoma cell biological behavior afterId1 gene silencing by siRNA

    Institute of Scientific and Technical Information of China (English)

    De-Li Xu

    2016-01-01

    Objective:To study the changes of osteosarcoma cell biological behaviors proliferation, migration and invasion afterId1gene silencing by siRNA.Methods:Osteosarcoma HEK293 cell lines were cultured and transfected with Id1-siRNA and NC-siRNA respectively, cell proliferation, migration and invasion were detected after 24 h and 48 h of transfection, and the expression levels of proliferation-promoting genes, proliferation-inhibiting genes as well as migration and invasion-related genes in cells were detected after 48 h of transfection. Results:After 24 h and 48 h of transfection, cell OD value and the number of invasive cells of Id1-siRNA group were significantly lower than those of NC-siRNA group, and scratch area was significantly larger than that of NC-siRNA group; after 48 h of transfection, hnRNP A2, hnRNP B1, S100A6, RUNX2, Aurora-A, Grb2, Gab2 and Rap2a expression levels of Id1-siRNA group were significantly lower than those of NC-siRNA group, and p53, TAp73 and IGFBP5 were significantly higher than those of NC-siRNA group.Conclusions:Id1 gene silencing by siRNA can inhibit osteosarcoma cell proliferation, migration and invasion.

  1. Relationship between major depressive disorder and ACE gene I/D polymorphism in a Turkish population

    Directory of Open Access Journals (Sweden)

    Sema Inanir

    2016-04-01

    Full Text Available Abstract Background Major depressive disorder (MDD is a complex disease and a significant health problem that is prevalent across the world. Angiotensin-converting enzyme (ACE has an important role in renin-angiotensin system (RAS and converts inactive angiotensin I to a potent vasopressor and aldosterone-stimulating peptide angiotensin II. Levels of ACE in plasma vary according to the insertion/deletion (I/D polymorphism of ACE gene. Objective The aim of the current study was to examine the influence ACE gene I/D variations on the risk of MDD. Methods In the present case-control study, we analyzed ACE I/D polymorphism in 346 MDD patients and 210 healthy subjects using polymerase chain reaction technique. Results Comparing the two groups, no significant difference was observed with regard to either genotype distributions or allele frequencies of the I/D polymorphism of ACE gene. Discussion Our findings suggest that the ACE I/D polymorphism is not associated with MDD in Turkish case-control study. Further studies are still needed.

  2. ACE I/D gene polymorphism in diabetic nephropathy: Clinical implications

    Directory of Open Access Journals (Sweden)

    M. Kaleemullah Khan

    2011-01-01

    Full Text Available Diabetic nephropathy (DN is a major microvascular complication accounting for about 30% of End-Stage Renal Disease (ESRD cases. An insertion/deletion (I/D polymorphism of the gene encoding angiotensin-I converting enzyme (ACE is reported to be a candidate gene predisposing to diabetic nephropathy. Accordingly, we investigated the ACE I/D gene polymorphism in 52 Type 2 diabetes mellitus (T2DM cases suffering from nephropathy as assessed by 24 hrs urinary protein levels. 50 age and sex matched healthy subjects served as controls. ACE I/D genotyping was carried out by polymerase chain reaction (PCR amplification using allele specific primers. The frequencies of ACE DD, ID and II genotypes in the diabetic nephropathy patients were 38.5% , 50% and 11.5% and in the control subjects, 22%, 38% and 40% respectively. There was an increase of 16.5% in the frequency of DD genotype in the patients compared to controls. The frequency of D allele in the patients was 63% which was found to be statistically significant (p< 0.05, Odds ratio=2.6 compared to 41% in the controls. These results indicate that Type 2 diabetic patients with D allele (those with DD & ID genotypes have more than two fold risk of developing nephropathy. Clinical implications of ACE genotyping in planning for patient’s management have been discussed.

  3. Increasing the Efficiency of IDS Systems by Hardware Implementation of Packet Capturing

    Directory of Open Access Journals (Sweden)

    Zeinab Latifi

    2013-08-01

    Full Text Available Capturing is the first step in intrusion detection system (IDS. Having wire speed, omitting the OS from capturing process and no need for making a copy of packets from the system’s environment to the user’s environment are some of the system characteristics. If these requirements are not met, packet capture system is considered as the main bottleneck of IDS and the overall efficiency of this system will be influenced. Presence of all these three characteristics calls for utilization of hardware methods. In this paper, by using of FPGA, a line sniffing and load balancing system are designed in order to be applied in IDS systems. The main contribution of our work is the feasibility of attaching labels to the beginning part of each packet, aiming at quick easy access of other IDS modules to information of each packet and also reducing workload of these modules. Packet classification in the proposed system can be configured to 2, 3, and 5 tuple, which can also be applied in IDS detection module in addition to load balancing part of this system. Load balancing module uses Hash table and its Hash function has the least flows collisions. This system is implemented on a set of virtex 6 and 7 families and is able to capture packets 100% and perform the above mentioned processes by speed of 12 Gbit/s.

  4. Nucla CFB Demonstration Project

    Energy Technology Data Exchange (ETDEWEB)

    1990-12-01

    This report documents Colorado-Ute Electric Association's Nucla Circulating Atmospheric Fluidized-Bed Combustion (AFBC) demonstration project. It describes the plant equipment and system design for the first US utility-size circulating AFBC boiler and its support systems. Included are equipment and system descriptions, design/background information and appendices with an equipment list and selected information plus process flow and instrumentation drawings. The purpose of this report is to share the information gathered during the Nucla circulating AFBC demonstration project and present it so that the general public can evaluate the technical feasibility and cost effectiveness of replacing pulverized or stoker-fired boiler units with circulating fluidized-bed boiler units. (VC)

  5. IGCC technology and demonstration

    Energy Technology Data Exchange (ETDEWEB)

    Palonen, J. [A. Ahlstrom Corporation, Karhula (Finland). Hans Ahlstrom Lab.; Lundqvist, R.G. [A. Ahlstrom Corporation, Helsinki (Finland); Staahl, K. [Sydkraft AB, Malmoe (Sweden)

    1996-12-31

    Future energy production will be performed by advanced technologies that are more efficient, more environmentally friendly and less expensive than current technologies. Integrated gasification combined cycle (IGCC) power plants have been proposed as one of these systems. Utilising biofuels in future energy production will also be emphasised since this lowers substantially carbon dioxide emissions into the atmosphere due to the fact that biomass is a renewable form of energy. Combining advanced technology and biomass utilisation is for this reason something that should and will be encouraged. A. Ahlstrom Corporation of Finland and Sydkraft AB of Sweden have as one part of company strategies adopted this approach for the future. The companies have joined their resources in developing a biomass-based IGCC system with the gasification part based on pressurised circulating fluidized-bed technology. With this kind of technology electrical efficiency can be substantially increased compared to conventional power plants. As a first concrete step, a decision has been made to build a demonstration plant. This plant, located in Vaernamo, Sweden, has already been built and is now in commissioning and demonstration stage. The system comprises a fuel drying plant, a pressurised CFB gasifier with gas cooling and cleaning, a gas turbine, a waste heat recovery unit and a steam turbine. The plant is the first in the world where the integration of a pressurised gasifier with a gas turbine will be realised utilising a low calorific gas produced from biomass. The capacity of the Vaernamo plant is 6 MW of electricity and 9 MW of district heating. Technology development is in progress for design of plants of sizes from 20 to 120 MWe. The paper describes the Bioflow IGCC system, the Vaernamo demonstration plant and experiences from the commissioning and demonstration stages. (orig.)

  6. The Majorana Demonstrator

    CERN Document Server

    Aguayo, E; Hoppe, E W; Keillor, M E; Kephart, J D; Kouzes, R T; LaFerriere, B D; Merriman, J; Orrell, J L; Overman, N R; Avignone, F T; Back, H O; Combs, D C; Leviner, L E; Young, A R; Barabash, A S; Konovalov, S I; Vanyushin, I; Yumatov, V; Bergevin, M; Chan, Y-D; Detwiler, J A; Loach, J C; Martin, R D; Poon, A W P; Prior, G; Vetter, K; Bertrand, F E; Cooper, R J; Radford, D C; Varner, R L; Yu, C -H; Boswell, M; Elliott, S R; Gehman, V M; Hime, A; Kidd, M F; LaRoque, B H; Rielage, K; Ronquest, M C; Steele, D; Brudanin, V; Egorov, V; Gusey, K; Kochetov, O; Shirchenko, M; Timkin, V; Yakushev, E; Busch, M; Esterline, J; Tornow, W; Christofferson, C D; Horton, M; Howard, S; Sobolev, V; Collar, J I; Fields, N; Creswick, R J; Doe, P J; Johnson, R A; Knecht, A; Leon, J; Marino, M G; Miller, M L; Robertson, R G H; Schubert, A G; Wolfe, B A; Efremenko, Yu; Ejiri, H; Hazama, R; Nomachi, M; Shima, T; Finnerty, P; Fraenkle, F M; Giovanetti, G K; Green, M P; Henning, R; Howe, M A; MacMullin, S; Phillips, D G; Snavely, K J; Strain, J; Vorren, K; Guiseppe, V E; Keller, C; Mei, D -M; Perumpilly, G; Thomas, K; Zhang, C; Hallin, A L; Keeter, K J; Mizouni, L; Wilkerson, J F

    2011-01-01

    A brief review of the history and neutrino physics of double beta decay is given. A description of the MAJORANA DEMONSTRATOR research and development program including background reduction techniques is presented in some detail. The application of point contact (PC) detectors to the experiment is discussed, including the effectiveness of pulse shape analysis. The predicted sensitivity of a PC detector array enriched to 86% in 76Ge is given.

  7. The Majorana Demonstrator

    Energy Technology Data Exchange (ETDEWEB)

    Aguayo, Estanislao; Fast, James E.; Hoppe, Eric W.; Keillor, Martin E.; Kephart, Jeremy D.; Kouzes, Richard T.; LaFerriere, Brian D.; Merriman, Jason H.; Orrell, John L.; Overman, Nicole R.; Avignone, Frank T.; Back, Henning O.; Combs, Dustin C.; Leviner, L.; Young, A.; Barabash, Alexander S.; Konovalov, S.; Vanyushin, I.; Yumatov, Vladimir; Bergevin, M.; Chan, Yuen-Dat; Detwiler, Jason A.; Loach, J. C.; Martin, R. D.; Poon, Alan; Prior, Gersende; Vetter, Kai; Bertrand, F.; Cooper, R. J.; Radford, D. C.; Varner, R. L.; Yu, Chang-Hong; Boswell, M.; Elliott, S.; Gehman, Victor M.; Hime, Andrew; Kidd, M. F.; LaRoque, B. H.; Rielage, Keith; Ronquest, M. C.; Steele, David; Brudanin, V.; Egorov, Viatcheslav; Gusey, K.; Kochetov, Oleg; Shirchenko, M.; Timkin, V.; Yakushev, E.; Busch, Matthew; Esterline, James H.; Tornow, Werner; Christofferson, Cabot-Ann; Horton, Mark; Howard, S.; Sobolev, V.; Collar, J. I.; Fields, N.; Creswick, R.; Doe, Peter J.; Johnson, R. A.; Knecht, A.; Leon, Jonathan D.; Marino, Michael G.; Miller, M. L.; Robertson, R. G. H.; Schubert, Alexis G.; Wolfe, B. A.; Efremenko, Yuri; Ejiri, H.; Hazama, R.; Nomachi, Masaharu; Shima, T.; Finnerty, P.; Fraenkle, Florian; Giovanetti, G. K.; Green, M.; Henning, Reyco; Howe, M. A.; MacMullin, S.; Phillips, D.; Snavely, Kyle J.; Strain, J.; Vorren, Kris R.; Guiseppe, Vincente; Keller, C.; Mei, Dong-Ming; Perumpilly, Gopakumar; Thomas, K.; Zhang, C.; Hallin, A. L.; Keeter, K.; Mizouni, Leila; Wilkerson, J. F.

    2011-09-03

    A brief review of the history and neutrino physics of double beta decay is given. A description of the MAJORANA DEMONSTRATOR research and development program, including background reduction techniques, is presented in some detail. The application of point contact (PC) detectors to the experiment is discussed, including the effectiveness of pulse shape analysis. The predicted sensitivity of a PC detector array enriched to 86% to 76Ge is given.

  8. FHL2 Antagonizes Id1-Promoted Proliferation and Invasive Capacity of Human MCF-7 Breast Cancer Cells

    Institute of Scientific and Technical Information of China (English)

    Wei-dong Han; Zhi-qiang Wu; Ya-li Zhao; Yi-ling Si; Ming-zhou Guo; Xiao-bing Fu

    2010-01-01

    Objective:FHL2 was previously identified to be a novel interacting factor of Id family proteins.The aim of this study was to investigate,the effects of FHL2 on Id1-mediated transcriptional regulation activity and its oncogenic activity in human breast cancer cells.Methods:Cell transfection was performed by Superfect reagent.Id1 stably overexpressed MCF-7 cells was cloned by G418 screening.The protein level of Id1 was detected by western blot analysis.Dual relative luciferase assays were used to measure the effect of E47-mediated transcriptional activity in MCF-7 human breast cancer cells.MTT assay was used to measure cell proliferation.Transwell assay was used to measure the invasive capacity of MCF-7 cancer cells.Results:The basic helix-loop-helix(bHLH)factor E47-mediated transcription activity was markedly repressed by Id1 in MCF-7 cells.This Id1-mediated repression was effectively antagonized by FHL2 transduction.Overexpression of Id1 markedly promoted the proliferation rate and invasive capacity of MCF-7 cells; however,these effects induced by Id1 were significantly suppressed by overexpression of FHL2 in cells.Conclusion:FHL2 can inhibit the proliferation and invasiveness of human breast cancer cells by repressing the functional activity of Id1.These findings provide the basis for further investigating the functional roles of FHL2-Id1 signaling in the carcinogenesis and development of human breast cancer.

  9. Direct-use geothermal PON and PRDA projects under DOE-ID administration. Annual report FY 1982, October 1, 1981-September 30, 1982

    Energy Technology Data Exchange (ETDEWEB)

    Childs, F.W.; Sanders, R.D.

    1983-01-01

    The status of Geothermal PRDA and PON projects administered by the DOE-ID as of the end of FY-1982 is reported. Both programs were instituted to assist the development of the direct application of geothermal energy. The PRDA Program consists of a series of studies designed to investigate the engineering and economic feasibility of geothermal direct applications. The PON Program consists of demonstration projects in which project costs are shared between DOE and the private companies, municipalities, or organizations. During this reporting period, fiscal year 1982, EG and G Idaho provided program management and technical support for 12 demonstration projects and five engineering ad economic studies. Each project is summarized.

  10. Analysis of data mining classification by comparison of C4.5 and ID algorithms

    Science.gov (United States)

    Sudrajat, R.; Irianingsih, I.; Krisnawan, D.

    2017-01-01

    The rapid development of information technology, triggered by the intensive use of information technology. For example, data mining widely used in investment. Many techniques that can be used assisting in investment, the method that used for classification is decision tree. Decision tree has a variety of algorithms, such as C4.5 and ID3. Both algorithms can generate different models for similar data sets and different accuracy. C4.5 and ID3 algorithms with discrete data provide accuracy are 87.16% and 99.83% and C4.5 algorithm with numerical data is 89.69%. C4.5 and ID3 algorithms with discrete data provides 520 and 598 customers and C4.5 algorithm with numerical data is 546 customers. From the analysis of the both algorithm it can classified quite well because error rate less than 15%.

  11. ID-based deniable ring authentication with constant-size signature

    Institute of Scientific and Technical Information of China (English)

    Lingling WANG; Guoyin ZHANG; Chunguang MA

    2008-01-01

    Deniable ring authentication allows a member of an ad-hoc sunset of participants to authenticate a message without revealing which member has issued the signature, and the verifier cannot transfer the signature to any third party. It is an important cryptographic primitive for privacy and anonymous communication. Unfortunately, the size of the signature of the proposed deniable ring authentication is dependent on the size of the ring. It is inefficient especially when the size of the ring is large. In this paper, we propose an ID-based version of deniable ring authentication. We present a generic construction which uses dynamic accumu-lators to construct ID-based deniable ring authentication with constant-size signature. We also give an ID-based deni-able ring authentication based on bilinear pairings, which is proved to be secure in the random oracle model.

  12. Formalization and Parsing of Typed Unification-Based ID/LP Grammars

    CERN Document Server

    Morawietz, F

    1999-01-01

    This paper defines unification based ID/LP grammars based on typed feature structures as nonterminals and proposes a variant of Earley's algorithm to decide whether a given input sentence is a member of the language generated by a particular typed unification ID/LP grammar. A solution to the problem of the nonlocal flow of information in unification ID/LP grammars as discussed in Seiffert (1991) is incorporated into the algorithm. At the same time, it tries to connect this technical work with linguistics by presenting an example of the problem resulting from HPSG approaches to linguistics (Hinrichs and Nakasawa 1994, Richter and Sailer 1995) and with computational linguistics by drawing connections from this approach to systems implementing HPSG, especially the TROLL system, Gerdemann et al. (forthcoming).

  13. Comportamiento del inversionista a diferentes niveles de inversión en I+D

    Directory of Open Access Journals (Sweden)

    Ángel Samaniego Alcántar

    2012-01-01

    Full Text Available Este trabajo analiza, usando una metodología alterna a la existente en la literatura del tema, la existencia de rendimientos anormales en el corto plazo ocasionados por cambios en la intensidad de la inversión en proyectos de investigación y desarrollo, I+D (R&D intensity. Se observa que los inversionistas obtienen rendimientos anormales en portafolios de empresas que incrementan entre cinco a diez unidades la intensidad del I+D (o cuando este incremento es mayor a 25 unidades. Sin embargo, ante decrementos en la intensidad del I+D no se observan desviaciones en los rendimientos esperados; asimismo, el rendimiento anormal es mayor en empresas de alta tecnología. El periodo analizado es 2001-2006 en los mercados AMEX, NYSE y NASDAQ.

  14. Learning From Demonstration?

    DEFF Research Database (Denmark)

    Koch, Christian; Bertelsen, Niels Haldor

    2014-01-01

    . This paper reports on an early demonstration project, the Building of a passive house dormitory in the Central Region of Denmark in 2006-2009. The project was supposed to deliver value, lean design, prefabrication, quality in sustainability, certification according to German standards for passive houses...... of control, driven by such challenges as complying with cost goals, the need to choose a German prefab supplier, and local contractors. Energy calculations, indoor climate, issues related to square meter requirements, and the hydrogen element became problematic. The aim to obtain passive house certification...

  15. Learning From Demonstration?

    DEFF Research Database (Denmark)

    Koch, Christian; Bertelsen, Niels Haldor

    2014-01-01

    , and micro combined heat and power using hydrogen. Using sociological and business economic theories of innovation, the paper discusses how early movers of innovation tend to obtain only partial success when demonstrating their products and often feel obstructed by minor details. The empirical work...... encompasses both an evaluation of the design and Construction process as well as a post-occupancy evaluation. Process experiences include the use of a multidisciplinary competence group and performance measurement. The commencement of the project was enthusiastic, but it was forced into more traditional forms...

  16. Visual Electricity Demonstrator

    Science.gov (United States)

    Lincoln, James

    2017-09-01

    The Visual Electricity Demonstrator (VED) is a linear diode array that serves as a dynamic alternative to an ammeter. A string of 48 red light-emitting diodes (LEDs) blink one after another to create the illusion of a moving current. Having the current represented visually builds an intuitive and qualitative understanding about what is happening in a circuit. In this article, I describe several activities for this device and explain how using this technology in the classroom can enhance the understanding and appreciation of physics.

  17. Exploration Medical System Demonstration

    Science.gov (United States)

    Rubin, D. A.; Watkins, S. D.

    2014-01-01

    BACKGROUND: Exploration class missions will present significant new challenges and hazards to the health of the astronauts. Regardless of the intended destination, beyond low Earth orbit a greater degree of crew autonomy will be required to diagnose medical conditions, develop treatment plans, and implement procedures due to limited communications with ground-based personnel. SCOPE: The Exploration Medical System Demonstration (EMSD) project will act as a test bed on the International Space Station (ISS) to demonstrate to crew and ground personnel that an end-to-end medical system can assist clinician and non-clinician crew members in optimizing medical care delivery and data management during an exploration mission. Challenges facing exploration mission medical care include limited resources, inability to evacuate to Earth during many mission phases, and potential rendering of medical care by non-clinicians. This system demonstrates the integration of medical devices and informatics tools for managing evidence and decision making and can be designed to assist crewmembers in nominal, non-emergent situations and in emergent situations when they may be suffering from performance decrements due to environmental, physiological or other factors. PROJECT OBJECTIVES: The objectives of the EMSD project are to: a. Reduce or eliminate the time required of an on-orbit crew and ground personnel to access, transfer, and manipulate medical data. b. Demonstrate that the on-orbit crew has the ability to access medical data/information via an intuitive and crew-friendly solution to aid in the treatment of a medical condition. c. Develop a common data management framework that can be ubiquitously used to automate repetitive data collection, management, and communications tasks for all activities pertaining to crew health and life sciences. d. Ensure crew access to medical data during periods of restricted ground communication. e. Develop a common data management framework that

  18. NAVAJO ELECTRIFICATION DEMONSTRATION PROJECT

    Energy Technology Data Exchange (ETDEWEB)

    Terry W. Battiest

    2008-06-11

    The Navajo Electrification Demonstration Project (NEDP) is a multi-year project which addresses the electricity needs of the unserved and underserved Navajo Nation, the largest American Indian tribe in the United States. The program serves to cumulatively provide off-grid electricty for families living away from the electricty infrastructure, line extensions for unserved families living nearby (less than 1/2 mile away from) the electricity, and, under the current project called NEDP-4, the construction of a substation to increase the capacity and improve the quality of service into the central core region of the Navajo Nation.

  19. ACE I/D genotype, adiposity, and blood pressure in children

    Directory of Open Access Journals (Sweden)

    Rothschild Max

    2009-03-01

    Full Text Available Abstract Background Angiotensin converting enzyme (ACE is a possible candidate gene that may influence both body fatness and blood pressure. Although several genetic studies have been conducted in adults, relatively few studies have examined the contribution of potential candidate genes, and specifically ACE I/D, on adiposity and BP phenotypes in childhood. Such studies may prove insightful for the development of the obesity-hypertension phenotype early in life. The purpose of this study was to examine differences in body fatness and resting blood pressure (BP by ACE I/D genotype, and determine if the association between adiposity and BP varies by ACE I/D genotype in children. Methods 152 children (75 girls, 77 boys were assessed for body composition (% body fat using dual energy x-ray absorbtiometry and resting BP according to American Heart Association recommendations. Buccal cell samples were genotyped using newly developed PCR-RFLP tests for two SNPs (rs4341 and rs4343 in complete linkage disequilibrium with the ACE I/D polymorphism. Partial correlations were computed to assess the ociations between % body fat and BP in the total sample and by genotype. ANCOVA was used to examine differences in resting BP by ACE I/D genotype and fatness groups. Results Approximately 39% of youth were overfat based on % body fat (>30% fat in girls, 25% fat in boys. Body mass, body mass index, and fat-free mass were significantly higher in the ACE D-carriers compared to the II group (p Conclusion ACE D-carriers are heavier than ACE II children; however, BP did not differ by ACE I/D genotype but was adversely influenced in the overfat D-carriers. Further studies are warranted to investigate the genetics of fatness and BP phenotypes in children.

  20. Education Demonstration Equipment

    Science.gov (United States)

    Nagy, A.; Lee, R. L.

    2003-10-01

    The General Atomics fusion education program ``Scientist in the Classroom" (SIC) now in its sixth year, uses scientists and engineers to present plasma as a state of matter to students in the classroom. Using hands-on equipment, students see how magnets, gas pressure changes, and different gases are turned into plasmas. A piston, sealed volume, and vacuum chamber illuminate ideal gas laws. Liquid nitrogen is used to explore thermodynamic temperature effects and changes in states of matter. Light bulbs are excited with a Tesla coil to ionize gases, thus becoming an inexpensive plasma devices and a plasma tube shows magnetic interactions with plasma. The demonstration equipment used in this program is built with simple designs and common commercial equipment keeping in mind a teacher's tight budget. The SIC program ( ˜25 school presentations per year) has become very popular and has acquired an enthusiastic group of regular teacher clientele requesting repeat visits. In addition, three very popular and successful ``Build-It" days, sponsored by the General Atomics Fusion Education Outreach Program, enables teachers to build and keep in their classroom some of this equipment. The demonstration devices will be presented along with their ``build-it" details.

  1. Inseparable phone books demonstration

    Science.gov (United States)

    Balta, Nuri; Çetin, Ali

    2017-05-01

    This study is aimed at first introducing a well-known discrepant event; inseparable phone books and second, turning it into an experiment for high school or middle school students. This discrepant event could be used especially to indicate how friction force can be effective in producing an unexpected result. Demonstration, discussion, explanation and experiment steps are presented on how to turn a simple discrepant event into an instructional activity. Results showed the relationships between number of pages and force, as well as between amounts of interleave and force. In addition to these, the mathematical equation for the total force between all interleaved pages is derived. As a conclusion, this study demonstrated that not only can phone books be used, but also ordinary books, to investigate this discrepant event. This experiment can be conducted as an example to show the agreement between theoretical and experimental results along with the confounding variables. This discrepant event can be used to create a cognitive conflict in students’ minds about the concepts of ‘force and motion’ and ‘friction force’.

  2. PFBC Utility Demonstration Project

    Energy Technology Data Exchange (ETDEWEB)

    1992-11-01

    This report provides a summary of activities by American Electric Power Service Corporation during the first budget period of the PFBC Utility Demonstration Project. In April 1990, AEP signed a Cooperative Agreement with the US Department of Energy to repower the Philip Sporn Plant, Units 3 4 in New Haven, West Virginia, with a 330 KW PFBC plant. The purpose of the program was to demonstrate and verify PFBC in a full-scale commercial plant. The technical and cost baselines of the Cooperative Agreement were based on a preliminary engineering and design and a cost estimate developed by AEP subsequent to AEP's proposal submittal in May 1988, and prior to the signing of the Cooperative Agreement. The Statement of Work in the first budget period of the Cooperative Agreement included a task to develop a preliminary design and cost estimate for erecting a Greenfield plant and to conduct a comparison with the repowering option. The comparative assessment of the options concluded that erecting a Greenfield plant rather than repowering the existing Sporn Plant could be the technically and economically superior alternative. The Greenfield plant would have a capacity of 340 MW. The ten additional MW output is due to the ability to better match the steam cycle to the PFBC system with a new balance of plant design. In addition to this study, the conceptual design of the Sporn Repowering led to several items which warranted optimization studies with the goal to develop a more cost effective design.

  3. Smart Grid Demonstration Project

    Energy Technology Data Exchange (ETDEWEB)

    Miller, Craig [National Rural Electric Cooperative Association, Arlington, VA (United States); Carroll, Paul [National Rural Electric Cooperative Association, Arlington, VA (United States); Bell, Abigail [National Rural Electric Cooperative Association, Arlington, VA (United States)

    2015-03-11

    The National Rural Electric Cooperative Association (NRECA) organized the NRECA-U.S. Department of Energy (DOE) Smart Grid Demonstration Project (DE-OE0000222) to install and study a broad range of advanced smart grid technologies in a demonstration that spanned 23 electric cooperatives in 12 states. More than 205,444 pieces of electronic equipment and more than 100,000 minor items (bracket, labels, mounting hardware, fiber optic cable, etc.) were installed to upgrade and enhance the efficiency, reliability, and resiliency of the power networks at the participating co-ops. The objective of this project was to build a path for other electric utilities, and particularly electrical cooperatives, to adopt emerging smart grid technology when it can improve utility operations, thus advancing the co-ops’ familiarity and comfort with such technology. Specifically, the project executed multiple subprojects employing a range of emerging smart grid technologies to test their cost-effectiveness and, where the technology demonstrated value, provided case studies that will enable other electric utilities—particularly electric cooperatives— to use these technologies. NRECA structured the project according to the following three areas: Demonstration of smart grid technology; Advancement of standards to enable the interoperability of components; and Improvement of grid cyber security. We termed these three areas Technology Deployment Study, Interoperability, and Cyber Security. Although the deployment of technology and studying the demonstration projects at coops accounted for the largest portion of the project budget by far, we see our accomplishments in each of the areas as critical to advancing the smart grid. All project deliverables have been published. Technology Deployment Study: The deliverable was a set of 11 single-topic technical reports in areas related to the listed technologies. Each of these reports has already been submitted to DOE, distributed to co-ops, and

  4. Role of ID Proteins in BMP4 Inhibition of Profibrotic Effects of TGF-β2 in Human TM Cells

    Science.gov (United States)

    Mody, Avani A.; Wordinger, Robert J.; Clark, Abbot F.

    2017-01-01

    Purpose Increased expression of TGF-β2 in primary open-angle glaucoma (POAG) aqueous humor (AH) and trabecular meshwork (TM) causes deposition of extracellular matrix (ECM) in the TM and elevated IOP. Bone morphogenetic proteins (BMPs) regulate TGF-β2–induced ECM production. The underlying mechanism for BMP4 inhibition of TGF-β2–induced fibrosis remains undetermined. Bone morphogenic protein 4 induces inhibitor of DNA binding proteins (ID1, ID3), which suppress transcription factor activities to regulate gene expression. Our study will determine whether ID1and ID3 proteins are downstream targets of BMP4, which attenuates TGF-β2 induction of ECM proteins in TM cells. Methods Primary human TM cells were treated with BMP4, and ID1 and ID3 mRNA, and protein expression was determined by quantitative PCR (Q-PCR) and Western immunoblotting. Intracellular ID1 and ID3 protein localization was studied by immunocytochemistry. Transformed human TM cells (GTM3 cells) were transfected with ID1 or ID3 expression vectors to determine their potential inhibitory effects on TGF-β2–induced fibronectin and plasminogen activator inhibitor-I (PAI-1) protein expression. Results Basal expression of ID1-3 was detected in primary human TM cells. Bone morphogenic protein 4 significantly induced early expression of ID1 and ID3 mRNA (P < 0.05) and protein in primary TM cells, and a BMP receptor inhibitor blocked this induction. Overexpression of ID1 and ID3 significantly inhibited TGF-β2–induced expression of fibronectin and PAI-1 in TM cells (P < 0.01). Conclusions Bone morphogenic protein 4 induced ID1 and ID3 expression suppresses TGF-β2 profibrotic activity in human TM cells. In the future, targeting specific regulators may control the TGF-β2 profibrotic effects on the TM, leading to disease modifying IOP lowering therapies. PMID:28159972

  5. Suurnimed jäid müümata / Maria-Kristiina Soomre

    Index Scriptorium Estoniae

    Soomre, Maria-Kristiina, 1978-

    2001-01-01

    9. mai Christie' oksjonist, müümata jäänud Picasso, Degas', Cezanne'i tööd. 8. mai Sotheby oksjonist, kus edukalt müüdi töid S. J. Seegeri kogust, 3,85 miljoni dollari eest M. Beckmanni "Perseuse viimane katsumus". Sotheby kaasaegse kunsti oksjonil New Yorgis müüdi 5,6 miljoni dollari eest J. Koonsi skulptuur M. Jacksonist. Müümata jäid A. Warholi "Viis supipurki", A. Calderi 3 skulptuuri

  6. Pairing-Free ID-Based Key-Insulated Signature Scheme

    Institute of Scientific and Technical Information of China (English)

    Guo-Bin Zhu; Hu Xiong; Zhi-Guang Qin

    2015-01-01

    Abstract⎯Without the assumption that the private keys are kept secure perfectly, cryptographic primitives cannot be deployed in the insecure environments where the key leakage is inevitable. In order to reduce the damage caused by the key exposure in the identity-based (ID-based) signature scenarios efficiently, we propose an ID-based key-insulated signature scheme in this paper, which eliminates the expensive bilinear pairing operations. Compared with the previous work, our scheme minimizes the computation cost without any extra cost. Under the discrete logarithm (DL) assumption, a security proof of our scheme in the random oracle model has also been given.

  7. Tamaño, restricciones financieras e inversión en i+d

    OpenAIRE

    María Ángeles Marra Domínguez

    2007-01-01

    Este trabajo analiza empíricamente los efectos de restricciones de liquidez en la inversión en actividades de I+D de una muestra de empresas manufactureras españolas clasificada según su tamaño durante el periodo 1991-1999. Las estimaciones confirman que la inversión en I+D emprendida por las empresas de menor tamaño presenta una mayor sensibilidad al cash flow y una relación negativa fuerte con la tasa de endeudamiento, lo que sugiere la posible presencia de restricciones financieras. Por el...

  8. MA- IDS: A Distributed Intrusion Detection System Based on Data Mining

    Institute of Scientific and Technical Information of China (English)

    SUN Jian-hua; JIN Hai; CHEN Hao; HAN Zong-fen

    2005-01-01

    Aiming at the shortcomings in intrusion detection systems (IDSs) used in commercial and research fields,we propose the MA-IDS system, a distributed intrusion detection system based on data mining. In this model, misuse intrusion detection system (MIDS) and anomaly intrusion detection system (AIDS) are combined. Data mining is applied to raise detection performance, and distributed mechanism is employed to increase the scalability and efficiency. Host- and network-based mining algorithms employ an improved Bayesian decision theorem that suits for real security environment to minimize the risks incurred by false decisions. We describe the overall architecture of the MA-IDS system, and discuss specific design and implementation issue.

  9. Evaluation of S. aureus ID, a New Chromogenic Agar Medium for Detection of Staphylococcus aureus

    OpenAIRE

    Perry, John D.; Rennison, Claire; Butterworth, Lynne A.; Hopley, Andrew L. J.; Gould, F. Kate

    2003-01-01

    S. aureus ID (bioMérieux, La Balme Les Grottes, France) is a new chromogenic agar medium designed to enable the isolation of staphylococci and the specific identification of Staphylococcus aureus. S. aureus produces green colonies on this medium due to production of α-glucosidase. To evaluate this medium, a total of 350 wound swabs were cultured onto S. aureus ID, CHROMagar Staph. aureus, and conventional media routinely used in our laboratory. After 18 to 20 h of incubation, 96.8% of strains...

  10. Projectc conception for city logistics with utilization of IDS element applicated to the Nitra city

    Directory of Open Access Journals (Sweden)

    Michal Balog

    2010-02-01

    Full Text Available Nowadays traffic situation in the town-residential area is characterized by growing requirement for quality and quantityof transfer performance and services that result in congestion increasing in the some towns. Currently the similar problem has Nitracity, where it is necessary to solve this situation immediately. One of the possibilities of increasing traffic fluency is to extend roads, butin case of Nitra that possibility is irrelevant because of non-available space. Other possibility is an utilization of IDS elements(Intelligent Transport System. The contribution presents the conception of transportation in the town, founded on creation of trafficcircles with subsequent IDS elements application.

  11. Comportamiento del inversionista a diferentes niveles de inversión en I+D

    OpenAIRE

    Ángel Samaniego Alcántar; Carlos Omar Trejo Pech; Samuel Mongrut Montalván; Darcy Fuenzalida O´Shee

    2012-01-01

    Este trabajo analiza, usando una metodología alterna a la existente en la literatura del tema, la existencia de rendimientos anormales en el corto plazo ocasionados por cambios en la intensidad de la inversión en proyectos de investigación y desarrollo, I+D (R D intensity). Se observa que los inversionistas obtienen rendimientos anormales en portafolios de empresas que incrementan entre cinco a diez unidades la intensidad del I+D (o cuando este incremento es mayor a 25 unidades). Sin embargo,...

  12. Investigation on AQ11, ID3 and the Principle of Discernibility Matrix

    Institute of Scientific and Technical Information of China (English)

    王珏; 崔佳; 赵凯

    2001-01-01

    The principle of discernibility matrix serves as a tool to discuss and analyze two algorithms of traditional inductive machine learning, AQ11 and ID3. The results are: (1) AQ11 and its family can be completely specified by the principle of discernibility matrix; (2) ID3 can be partly, but not naturally, specified by the principle of discernibility matrix; and (3) The principle of discernibility matrix is employed to analyze Cendrowska sample set, and it shows the weaknesses of knowledge representation style of decision tree in theory.

  13. Gestión de la incertidumbre en los proyectos de I+D

    OpenAIRE

    García Muntión, Paula

    2014-01-01

    En el presente TFM se estudian diferentes metodologías y herramientas con el objeto de presentar una propuesta metodológica basada en el PMBOK que facilite la gestión de los Proyectos I+D. Para realizar esta propuesta y facilitar la implantación de una gestión de proyectos adecuada a las características de los proyectos de I+D será fundamental identificar cuáles son los principales bloqueadores y facilitadores que se encuentran. La propuesta metodológica deberá contemplar el tratamiento de...

  14. Fuel Cell Demonstration Program

    Energy Technology Data Exchange (ETDEWEB)

    Gerald Brun

    2006-09-15

    In an effort to promote clean energy projects and aid in the commercialization of new fuel cell technologies the Long Island Power Authority (LIPA) initiated a Fuel Cell Demonstration Program in 1999 with six month deployments of Proton Exchange Membrane (PEM) non-commercial Beta model systems at partnering sites throughout Long Island. These projects facilitated significant developments in the technology, providing operating experience that allowed the manufacturer to produce fuel cells that were half the size of the Beta units and suitable for outdoor installations. In 2001, LIPA embarked on a large-scale effort to identify and develop measures that could improve the reliability and performance of future fuel cell technologies for electric utility applications and the concept to establish a fuel cell farm (Farm) of 75 units was developed. By the end of October of 2001, 75 Lorax 2.0 fuel cells had been installed at the West Babylon substation on Long Island, making it the first fuel cell demonstration of its kind and size anywhere in the world at the time. Designed to help LIPA study the feasibility of using fuel cells to operate in parallel with LIPA's electric grid system, the Farm operated 120 fuel cells over its lifetime of over 3 years including 3 generations of Plug Power fuel cells (Lorax 2.0, Lorax 3.0, Lorax 4.5). Of these 120 fuel cells, 20 Lorax 3.0 units operated under this Award from June 2002 to September 2004. In parallel with the operation of the Farm, LIPA recruited government and commercial/industrial customers to demonstrate fuel cells as on-site distributed generation. From December 2002 to February 2005, 17 fuel cells were tested and monitored at various customer sites throughout Long Island. The 37 fuel cells operated under this Award produced a total of 712,635 kWh. As fuel cell technology became more mature, performance improvements included a 1% increase in system efficiency. Including equipment, design, fuel, maintenance

  15. Jennings Demonstration PLant

    Energy Technology Data Exchange (ETDEWEB)

    Russ Heissner

    2010-08-31

    Verenium operated a demonstration plant with a capacity to produce 1.4 million gallons of cellulosic ethanol from agricultural resiues for about two years. During this time, the plant was able to evaluate the technical issues in producing ethanol from three different cellulosic feedstocks, sugar cane bagasse, energy cane, and sorghum. The project was intended to develop a better understanding of the operating parameters that would inform a commercial sized operation. Issues related to feedstock variability, use of hydrolytic enzymes, and the viability of fermentative organisms were evaluated. Considerable success was achieved with pretreatment processes and use of enzymes but challenges were encountered with feedstock variability and fermentation systems. Limited amounts of cellulosic ethanol were produced.

  16. Wnt1 is epistatic to Id2 in inducing mammary hyperplasia, ductal side-branching, and tumors in the mouse

    Directory of Open Access Journals (Sweden)

    Yokota Yoshifumi

    2004-12-01

    Full Text Available Abstract Background During pregnancy, the mammary glands from Id2 mutant animals are deficient in lobulo-alveolar development. This failure of development is believed to be due to a proliferation defect. Methods We have asked whether functional Id2 expression is necessary for Wnt induced mammary hyperplasia, side branching, and cancer, by generating mice expressing a Wnt1 transgene in an Id2 mutant background. Results We show in this work that forced expression of Wnt1 in the mammary gland is capable of overcoming the block to proliferation caused by the absence of Id2. We also show that Wnt1 expression is able to cause mammary tumors in an Id2 mutant background. Conclusions We conclude that functional Id2 expression is not required for Wnt1 to induce mammary hyperplasia and mammary tumors.

  17. Combination of electron beam irradiation and thermal treatment to enhance the shelf-life of traditional Indian fermented food (Idli)

    Science.gov (United States)

    Mulmule, Manoj D.; Shimmy, Shankar M.; Bambole, Vaishali; Jamdar, Sahayog N.; Rawat, K. P.; Sarma, K. S. S.

    2017-02-01

    Idli, a steam-cooked breakfast food item consumed in India, is famous as a staple food for its spongy texture and unique fermented taste. Idli preparation is a time consuming process; although instant Idli pre-mixes as powder or batter are available in the market, they do not have the distinctive taste and aroma similar to the Idli prepared at home. Hence ready-to-eat (RTE) form of this food is in demand. Therefore, an attempt was made to prepare RTE Idli bearing similar taste as home-cooked Idli with an extended shelf-life of up to two months at an ambient temperature using Electron Beam Irradiation (EBI) at dosages 2.5 kGy, 5 kGy and 7.5 kGy and combination processing comprised of EBI dosage at 2.5 kGy and thermal treatment (80 °C for 20 min). The treated Idli's were microbiologically and sensorially evaluated at storage periods of zero day, 14 days, 30 days and 60 days. Idli's irradiated at 7.5 kGy and subjected to combination processing at 2.5 kGy and thermal treatment were shelf-stable for 60 days. 2.5 kGy and 5 kGy radiation dosages alone were not sufficient to preserve Idli samples for more than 14 days. Undesirable change in sensory properties of Idli was observed at an EBI dosage of 7.5 kGy. Sensory properties of combination processed Idli's were found to undergo minor change over the storage period. The present work suggests that lowest radiation dosage in combination with thermal treatment could be useful to achieve the extended shelf-life without considerably impairing the organoleptic quality of Ready-to-Eat Idli.

  18. Attitudes of Israeli Teachers and Paraprofessionals towards the New Definition of ID and Their Willingness to Cope with Special Education Law Changes

    Science.gov (United States)

    Lifshitz, Hefziba; Nissim, Shoshanna; Cohen, Sara

    2008-01-01

    Attitudes of teachers (N = 96) and paraprofessionals (N = 48) working with students with intellectual disability (ID) towards the new definition of ID (Luckasson et al., 1992, 2002), was examined. The main innovation of the new definition of ID is the cancellation of the four ID levels, suggesting an optimistic view, especially towards individuals…

  19. Hydrocarbon-oil encapsulated bubble flotation of fine coal using 3-in. ID flotation column. Technical progress report for the eleventh quarter, April 1--June 30, 1993

    Energy Technology Data Exchange (ETDEWEB)

    Peng, F.F.

    1996-05-01

    There are four modes of the collector dispersion techniques. They are (1) direct liquid additions and stirring, (2) ultrasonic energy collector dispersion, (3) atomized collector dispersion, and (4) gasified collector transported in air stream. Among those collector dispersion techniques, the technique using the gasified collector transported in air phase can be used to enhance the flotation performance with substantial reduction in collector usage and selectivity, compared to the flotation using direct liquid addition (and mechanical agitation) technique. In this phase of study, two modes of collector addition techniques including gasified collector transported in gas phase and direct collector addition techniques were applied in the column flotation to demonstrate the selectivity of utilizing the hydrocarbon-oil encapsulated air bubbles in the fine coal flotation process. The 1-in. ID flotation column was used to scale-up to 3-in. ID flotation column. The initial starting point to operate the 3-in ID flotation column were determined using both 1-in. and 3-in. flotation columns based on the three phases of work plans and experiment design. A 3-in. flotation column was used to evaluate two modes of collector dispersion and addition techniques on the recovery and grade of fine coals using various ranks of coal.

  20. Id3 Maintains Foxp3 Expression in Regulatory T Cells by Controlling a Transcriptional Network of E47, Spi-B, and SOCS3.

    Science.gov (United States)

    Rauch, Katharina S; Hils, Miriam; Lupar, Ekaterina; Minguet, Susana; Sigvardsson, Mikael; Rottenberg, Martin E; Izcue, Ana; Schachtrup, Christian; Schachtrup, Kristina

    2016-12-13

    The transcription factor Foxp3 dominantly controls regulatory T (Treg) cell function, and only its continuous expression guarantees the maintenance of full Treg cell-suppressive capacity. However, transcriptional regulators maintaining Foxp3 transcription are incompletely described. Here, we report that high E47 transcription factor activity in Treg cells resulted in unstable Foxp3 expression. Under homeostatic conditions, Treg cells expressed high levels of the E47 antagonist Id3, thus restricting E47 activity and maintaining Foxp3 expression. In contrast, stimulation of Id3-deficient or E47-overexpressing Treg cells resulted in the loss of Foxp3 expression in a subset of Treg cells in vivo and in vitro. Mechanistic analysis indicated that E47 activated expression of the transcription factor Spi-B and the suppressor of cytokine signaling 3 (SOCS3), which both downregulated Foxp3 expression. These findings demonstrate that the balance of Id3 and E47 controls the maintenance of Foxp3 expression in Treg cells and, thus, contributes to Treg cell plasticity.

  1. NASA Bioreactor Demonstration System

    Science.gov (United States)

    2002-01-01

    Leland W. K. Chung (left), Director, Molecular Urology Therapeutics Program at the Winship Cancer Institute at Emory University, is principal investigator for the NASA bioreactor demonstration system (BDS-05). With him is Dr. Jun Shu, an assistant professor of Orthopedics Surgery from Kuming Medical University China. The NASA Bioreactor provides a low turbulence culture environment which promotes the formation of large, three-dimensional cell clusters. Due to their high level of cellular organization and specialization, samples constructed in the bioreactor more closely resemble the original tumor or tissue found in the body. The Bioreactor is rotated to provide gentle mixing of fresh and spent nutrient without inducing shear forces that would damage the cells. The work is sponsored by NASA's Office of Biological and Physical Research. The bioreactor is managed by the Biotechnology Cell Science Program at NASA's Johnson Space Center (JSC). NASA-sponsored bioreactor research has been instrumental in helping scientists to better understand normal and cancerous tissue development. In cooperation with the medical community, the bioreactor design is being used to prepare better models of human colon, prostate, breast and ovarian tumors. Cartilage, bone marrow, heart muscle, skeletal muscle, pancreatic islet cells, liver and kidney are just a few of the normal tissues being cultured in rotating bioreactors by investigators. Credit: Emory University.

  2. Nuclear power demonstrating

    Energy Technology Data Exchange (ETDEWEB)

    Basmajian, V. V.; Haldeman, C. W.

    1980-08-12

    Apparatus for demonstrating the operation of a closed loop nuclear steam electric generating plant includes a transparent boiler assembly having immersion heating elements, which may be quartz lamps or stainless steel encased resistive immersion heating units with a quartz iodide lamp providing a source of visible radiation when using the encased immersion heating units. A variable voltage autotransformer is geared to a support rod for simulated reactor control rods for controlling the energy delivered to the heating elements and arranged so that when the voltage is high, the rods are withdrawn from the boiler to produce increased heating and illumination proportional to rod position, thereby simulating nuclear reaction. A relief valve, steam outlet pipe and water inlet pipe are connected to the boiler with a small stainless steel resistive heating element in the steam outlet pipe providing superheat. This heater is connected in series with a rheostat mounted on the front panel to provide superheat adjustments and an interlock switch that prevents the superheater from being energized when the steam valve is off with with no flow through the superheater. A heavy blue plastic radiation shield surrounds the boiler inside a bell jar.

  3. Tidd PFBC demonstration project

    Energy Technology Data Exchange (ETDEWEB)

    Marrocco, M. [American Electric Power, Columbus, OH (United States)

    1997-12-31

    The Tidd project was one of the first joint government-industry ventures to be approved by the US Department of Energy (DOE) in its Clean Coal Technology Program. In March 1987, DOE signed an agreement with the Ohio Power Company, a subsidiary of American Electric Power, to refurbish the then-idle Tidd plant on the banks of the Ohio River with advanced pressurized fluidized bed technology. Testing ended after 49 months of operation, 100 individual tests, and the generation of more than 500,000 megawatt-hours of electricity. The demonstration plant has met its objectives. The project showed that more than 95 percent of sulfur dioxide pollutants could be removed inside the advanced boiler using the advanced combustion technology, giving future power plants an attractive alternative to expensive, add-on scrubber technology. In addition to its sulfur removal effectiveness, the plant`s sustained periods of steady-state operation boosted its availability significantly above design projections, heightening confidence that pressurized fluidized bed technology will be a reliable, baseload technology for future power plants. The technology also controlled the release of nitrogen oxides to levels well below the allowable limits set by federal air quality standards. It also produced a dry waste product that is much easier to handle than wastes from conventional power plants and will likely have commercial value when produced by future power plants.

  4. A Demonstration of Lusail

    KAUST Repository

    Mansour, Essam

    2017-05-10

    There has been a proliferation of datasets available as interlinked RDF data accessible through SPARQL endpoints. This has led to the emergence of various applications in life science, distributed social networks, and Internet of Things that need to integrate data from multiple endpoints. We will demonstrate Lusail; a system that supports the need of emerging applications to access tens to hundreds of geo-distributed datasets. Lusail is a geo-distributed graph engine for querying linked RDF data. Lusail delivers outstanding performance using (i) a novel locality-aware query decomposition technique that minimizes the intermediate data to be accessed by the subqueries, and (ii) selectivityawareness and parallel query execution to reduce network latency and to increase parallelism. During the demo, the audience will be able to query actually deployed RDF endpoints as well as large synthetic and real benchmarks that we have deployed in the public cloud. The demo will also show that Lusail outperforms state-of-the-art systems by orders of magnitude in terms of scalability and response time.

  5. 77 FR 59639 - Bear Lake National Wildlife Refuge, Bear Lake County, ID and Oxford Slough Waterfowl Production...

    Science.gov (United States)

    2012-09-28

    ... public, including opportunities for hunting, fishing, wildlife observation and photography, and... review at the following libraries: Bear Lake County Library, 138 North 6th Street, Montpelier, ID 83254...

  6. Genetic diversity of VAR2CSA ID1-DBL2Xb in worldwide Plasmodium falciparum populations: impact on vaccine design for placental malaria.

    Science.gov (United States)

    Bordbar, Bita; Tuikue Ndam, Nicaise; Renard, Emmanuelle; Jafari-Guemouri, Sayeh; Tavul, Livingstone; Jennison, Charlie; Gnidehou, Sédami; Tahar, Rachida; Gamboa, Dionicia; Bendezu, Jorge; Menard, Didier; Barry, Alyssa E; Deloron, Philippe; Sabbagh, Audrey

    2014-07-01

    In placental malaria (PM), sequestration of infected erythrocytes in the placenta is mediated by an interaction between VAR2CSA, a Plasmodium falciparum protein expressed on erythrocytes, and chondroitin sulfate A (CSA) on syncytiotrophoblasts. Recent works have identified ID1-DBL2Xb as the minimal CSA-binding region within VAR2CSA able to induce strong protective immunity, making it the leading candidate for the development of a vaccine against PM. Assessing the existence of population differences in the distribution of ID1-DBL2Xb polymorphisms is of paramount importance to determine whether geographic diversity must be considered when designing a candidate vaccine based on this fragment. In this study, we examined patterns of sequence variation of ID1-DBL2Xb in a large collection of P. falciparum field isolates (n=247) from different malaria-endemic areas, including Africa (Benin, Senegal, Cameroon and Madagascar), Asia (Cambodia), Oceania (Papua New Guinea), and Latin America (Peru). Detection of variants and estimation of their allele frequencies were performed using next-generation sequencing of DNA pools. A considerable amount of variation was detected along the whole gene segment, suggesting that several allelic variants may need to be included in a candidate vaccine to achieve broad population coverage. However, most sequence variants were common and extensively shared among worldwide parasite populations, demonstrating long term persistence of those polymorphisms, probably maintained through balancing selection. Therefore, a vaccine mixture including such stable antigen variants will be putatively applicable and efficacious in all world regions where malaria occurs. Despite similarity in ID1-DBL2Xb allele repertoire across geographic areas, several peaks of strong population differentiation were observed at specific polymorphic loci, pointing out putative targets of humoral immunity subject to positive immune selection.

  7. Permutations with Kazhdan-Lusztig polynomial P_{id,w}(q) = 1 + q^h

    OpenAIRE

    Woo, Alexander; Billey, Sara; Weed, Jonathan

    2008-01-01

    Using resolutions of singularities introduced by Cortez and a method for calculating Kazhdan-Lusztig polynomials due to Polo, we prove the conjecture of Billey and Braden characterizing permutations w with Kazhdan-Lusztig polynomial P_{id,w}(q)=1+q^h for some h.

  8. 76 FR 36896 - Salmon-Challis National Forest, ID; Forestwide Invasive Plant Treatment Environmental Impact...

    Science.gov (United States)

    2011-06-23

    ... Forest Service Salmon-Challis National Forest, ID; Forestwide Invasive Plant Treatment Environmental... impact statement. SUMMARY: Invasive plants have been identified as a major threat to the biological diversity and ecological integrity within and outside the Salmon-Challis National Forest. Invasive plants...

  9. Accelerated fermentation of Idli batter using Eleusine coracana and Pennisetum glaucum.

    Science.gov (United States)

    Chelliah, Ramachandran; Ramakrishnan, Sudha Rani; Premkumar, Divya; Antony, Usha

    2017-08-01

    The present study focuses on reduction in fermentation time of idli batter and its enrichment with calcium and iron using finger millet and pearl millet. Fermentation time decreased from 12 to 6 h with addition of finger millet and to 8 h with pearl millet. Rate of fermentation, bulk density, viscosity, microbial changes and particle morphology were assessed in the batter; nutritional quality, sensory, phytochemicals and internal characteristics of idli were investigated. The color and texture characteristics of both batter and idli were evaluated. The pH and titratable acidity of control batter at 6 h was 5.32 and 0.27%, addition of finger and pearl millet changed to 4.32, 0.45% and 4.53, 0.45% at respective fermentation times (6 and 8 h). The viable yeast, lactic acid bacteria and total bacterial count (log CFU g(-1)) in the batters increased with time, reaching 1.26, 3.85, 4.56 (control); 2.32, 9.84, 9.58 (finger millet) and 1.76, 7.34, 7.74 (pearl millet) respectively at the end of 6 h of fermentation. Addition of finger millet and pearl millet flour (10% w/w) to the batter enhanced the dietary fiber by 28 and 23%, calcium by 113 and 56%, iron by 51 and 258% in the respective idlies when compared with the control.

  10. 76 FR 46721 - Salmon-Challis National Forest, ID; Upper North Fork HFRA Ecosystem Restoration Project...

    Science.gov (United States)

    2011-08-03

    ... this project area to improve the health of the ecosystem and reach the desired future condition. DATES...; ] DEPARTMENT OF AGRICULTURE Forest Service Salmon-Challis National Forest, ID; Upper North Fork HFRA Ecosystem... the potential for large-scale, high-intensity wildfires that threaten human life, property, and...

  11. Enrolment Data of Disabled Students Of IGNOU: A Case Study Using ID3

    Directory of Open Access Journals (Sweden)

    Nidhi Chopra

    2013-06-01

    Full Text Available In this paper, a methodology based on ID3 – a decision based learning technique for classification of disabled students of IGNOU has been evolved, for creating peer-to-peer groups. This can facilitate an environment for mutual help and academic interaction. The purpose is to promote blended social learning.

  12. Support and Self-Efficacy among Latino and White Parents of Children with ID

    Science.gov (United States)

    Cohen, Shana R.; Holloway, Susan D.; Dominguez-Pareto, Irenka; Kuppermann, Miriam

    2015-01-01

    Research indicates that mothers of children with ID who receive familial support experience less stress than those who receive less support. Less is known about the relation of support to mothers' evaluation of parenting self-efficacy, particularly in Latino families. We examined the relationship of different types of family support to life…

  13. 61 FR 42052 - Owyhee Resource Area, ID; Resource Management Plan, etc.

    Science.gov (United States)

    1996-08-13

    ... Bureau of Land Management Owyhee Resource Area, ID; Resource Management Plan, etc. AGENCY: Bureau of Land... Management Plan (RMP) and associated draft Environmental Impact Statement (EIS) for the Owyhee Resource Area... be sent to: Owyhee Area Manager, Bureau of Land Management, Boise Field Office, 3948...

  14. 70 FR 9098 - Notice of Realty Action, Sale of Public Land in Owyhee County, ID

    Science.gov (United States)

    2005-02-24

    ... Bureau of Land Management Notice of Realty Action, Sale of Public Land in Owyhee County, ID AGENCY: Bureau of Land Management, Interior. ACTION: Notice of Realty Action, Sale of Public Land in Owyhee... located in Owyhee County, Idaho is suitable for direct sale to Owyhee County under Sections 203 and 209...

  15. 81 FR 23746 - Temporary Road Closure on Public Lands in Owyhee County, ID

    Science.gov (United States)

    2016-04-22

    ... Bureau of Land Management Temporary Road Closure on Public Lands in Owyhee County, ID AGENCY: Bureau of... 1-mile road segment that crosses public lands located in Owyhee County, Idaho, approximately 5 miles... the Owyhee Field Office, 20 First Avenue West, Marsing, Idaho, 83639. National Environmental...

  16. 61 FR 11862 - Shooting Closures and Restrictions in Ada, Canyon, Elmore, and Owyhee Counties, ID

    Science.gov (United States)

    1996-03-22

    ... From the Federal Register Online via the Government Publishing Office DEPARTMENT OF THE INTERIOR Shooting Closures and Restrictions in Ada, Canyon, Elmore, and Owyhee Counties, ID AGENCY: Bureau of Land... Bruneau, Kuna, and Owyhee Management Framework Plans. Violation of this order is punishable by a fine...

  17. 77 FR 75654 - Notice of Temporary Closures on Public Lands in Owyhee County, ID

    Science.gov (United States)

    2012-12-21

    ... Bureau of Land Management Notice of Temporary Closures on Public Lands in Owyhee County, ID AGENCY... are in effect on public lands administered by the Owyhee Field Office, Bureau of Land Management (BLM... contact Loretta Chandler, Owyhee Field Office Manager at 20 First Ave. West, Marsing, Idaho, 83639,...

  18. 75 FR 57053 - Camas National Wildlife Refuge, Jefferson County, ID; Comprehensive Conservation Plan and...

    Science.gov (United States)

    2010-09-17

    ... Conservation Plan and Environmental Assessment AGENCY: Fish and Wildlife Service, Interior. ACTION: Notice of... prepare a comprehensive conservation plan (CCP) for Camas National Wildlife Refuge (refuge) in Hamer, ID... Refuge System, consistent with sound principles of fish and wildlife management, conservation,...

  19. Epigenetic regulation of ID4 in the determination of the BRCAness phenotype in breast cancer.

    Science.gov (United States)

    Branham, M T; Campoy, E; Laurito, S; Branham, R; Urrutia, G; Orozco, J; Gago, F; Urrutia, R; Roqué, M

    2016-01-01

    BRCAness breast tumors represent a group of sporadic tumors characterized by a reduction in BRCA1 gene expression. As BRCA1 is involved in double-strand breaks (DSBs) repair, dysfunctional BRCA pathway could make a tumor sensitive to DNA damaging drugs (e.g., platinum agents). Thus, accurately identifying BRCAness could contribute to therapeutic decision making in patients harboring these tumors. The purpose of this study was to identify if BRCAness tumors present a characteristic methylation profile and/or were related to specific clinico-pathological features. BRCAness was measured by MLPA in 63 breast tumors; methylation status of 98 CpG sites within 84 cancer-related genes was analyzed by MS-MLPA. Protein and mRNA expressions of the selected genes were measured by quantitative real-time PCR and Western Blot. BRCAness was associated with younger age, higher nuclear pleomorphism, and triple-negative (TN) status. Epigenetically, we found that the strongest predictors for BRCAness tumors were the methylations of MLH1 and PAX5 plus the unmethylations of CCND2 and ID4. We determined that ID4 unmethylation correlated with the expression levels of both its mRNA and protein. We observed an inverse relation between the expressions of ID4 and BRCA1. To the best of our knowledge, this is the first report suggesting an epigenetic regulation of ID4 in BRCAness tumors. Our findings give new information of BRCAness etiology and encourage future studies on potential drug targets for BRCAness breast tumors.

  20. Espen Schaannings Foucault: Idéhistoriske intervensjoner i den norske Foucault-resepsjonen

    OpenAIRE

    Lillebø, Jonas Gamborg; Vik, Bjørnar Mortensen

    2009-01-01

    Artikkelen konsentrerer seg om et sentralt problem: Foucault som historiker og som filosof. Problemet aktualiseres ved en kritisk gjennomgang av Espen Schaannings lesing og formidling av Foucault som idéhistorisk intervenør. Er dette en for generaliserende lesning? Og er dette holdbart som en allmenn teori om historievitenskap?

  1. 78 FR 77024 - Telemarketing Sales Rule; Notice of Termination of Caller ID Rulemaking

    Science.gov (United States)

    2013-12-20

    ...' Caller ID displays, subjecting them to consumer complaints and the loss of business goodwill.\\16\\ \\14\\ E...., Herb Weisbaum, Why aren't phone companies doing more to block robocalls?, NBC News, July 17, 2013, www.nbcnews.com/business/why-arent-phone-companies-doing-more-block-robocalls-6C10641251 ; www.nomorobo.com...

  2. 76 FR 23321 - New Sweden Irrigation District, ID; Notice of Preliminary Permit Application Accepted for Filing...

    Science.gov (United States)

    2011-04-26

    ... Energy Regulatory Commission New Sweden Irrigation District, ID; Notice of Preliminary Permit Application..., 2011, New Sweden Irrigation District filed an application for a preliminary permit, pursuant to section 4(f) of the Federal Power Act (FPA), proposing to study the feasibility of the New...

  3. Validation of the Inventory of Depressive Symptomatology (IDS) in Cocaine Dependent Inmates.

    Science.gov (United States)

    Suris, Alina; Kashner, T. Michael; Gillaspy, James A., Jr.; Biggs, Melanie; Rush, A. John

    2001-01-01

    While the reliability and validity of Inventory of Depressive Symptomatology (IDS) scores have been established with outpatient adults being treated in community psychiatric clinics, it has not been used in special or dually diagnosed populations. Establishes internal consistency, concurrent validity, and construct validity for both the clinical…

  4. Perspectives on the Role of Geo-Technologies for Addressing Contemporary Urban Issues: Implications for IDS

    NARCIS (Netherlands)

    Pfeffer, K.; Verrest, H.

    2016-01-01

    Contemporary patterns of urbanization come with many challenges regarding the quality of urban life, especially with respect to the provision of urban infrastructures and housing, exposure to environmental risks and urban inequalities. In International Development Studies (IDS) it is understood that

  5. Typing of Amerindian Kichwas and Mestizos from Ecuador with the SNPforID multiplex

    DEFF Research Database (Denmark)

    Poulsen, Lena; Børsting, Claus; Tomas, Carmen

    2011-01-01

    A total of 119 unrelated individuals from two of the major ethnic groups in Ecuador were typed for 49 of the autosomal single nucleotide polymorphisms (SNPs) in the SNPforID 52plex using the SNapShot® assay. Of the above, 42 samples originated from Mestizos (an admixed population) and the remaining...

  6. The Critical Role of the ID in Interactive Television: The Value of Immediacy.

    Science.gov (United States)

    Murphy, Karen L.; Farr, Charlotte W.

    The instructional designer (ID) plays a critical role in the development and viability of each course taught at a distance, particularly in the incorporation of immediacy behaviors, or communication behaviors that convey approachability and communicate interpersonal warmth and closeness. Faculty development must be fostered to encourage immediacy…

  7. Hizbollah lubab : "Me tahame ameeriklastega häid suhteid" / Mohamad Afif ; interv. Ivar Soopan

    Index Scriptorium Estoniae

    Afif, Mohamad

    2005-01-01

    Liibanoni shiiitide organisatsiooni Hizbollah meediasuhete direktor ütleb, et Hizbollah ei ole terroriorganisatsioon. Religioosse ja poliitilise grupina tahab Hizbollah häid suhteid teistega kõikjal maailmas, kuid probleem on poliitikas, selles, kuidas USA suhtub nende regiooni, tõekspidamistesse

  8. KorAP: the new corpus analysis platform at IDS Mannheim

    DEFF Research Database (Denmark)

    Banski, Piotr; Bingel, Joachim; Diewald, Nils

    2013-01-01

    The KorAP project (“Korpusanalyseplattform der nächste Generation”, “Corpus-analysis platform of the next generation”), carried out at the Institut für Deutsche Sprache (IDS) in Mannheim, Germany, has as its goal the development of a modern, state-of-the-art corpus-analysis platform, capable...

  9. 75 FR 22625 - Notice of Realty Action; Direct Sale of Public Land in Jerome County, ID

    Science.gov (United States)

    2010-04-29

    ... Bureau of Land Management Notice of Realty Action; Direct Sale of Public Land in Jerome County, ID AGENCY... for direct (non-competitive) sale to Todd and Bridget Buschhorn under the provisions of the Federal...: In order to ensure consideration in the environmental analysis of the proposed sale, comments must...

  10. 76 FR 29784 - Notice of Realty Action; Direct Sale of Public Lands in Jerome County, ID

    Science.gov (United States)

    2011-05-23

    ... Bureau of Land Management Notice of Realty Action; Direct Sale of Public Lands in Jerome County, ID... being proposed for direct sale to Todd and Bridget Buschhorn in accordance with Sections 203 and 209 of..., and is not needed for any other Federal purposes. The direct sale will allow for the subject parcel...

  11. 78 FR 39767 - Notice of Realty Action: Direct Sale of Public Land in Blaine County, ID

    Science.gov (United States)

    2013-07-02

    ... Bureau of Land Management Notice of Realty Action: Direct Sale of Public Land in Blaine County, ID AGENCY... proposed for direct sale to PORR in accordance with Sections 203 and 209 of the Federal Land Policy and... best be served by modified competitive bidding or direct (non-competitive) sale. In this instance,...

  12. 75 FR 71143 - Notice of Realty Action: Direct Sale of Public Land in Blaine County, ID

    Science.gov (United States)

    2010-11-22

    ... Bureau of Land Management Notice of Realty Action: Direct Sale of Public Land in Blaine County, ID AGENCY.... SUPPLEMENTARY INFORMATION: The following described public land is being proposed for direct sale to the Animal... Animal Shelter. Regulations contained in 43 CFR 2711.3-3 permit direct sales when a competitive sale...

  13. Coupling Molecular Modeling to the Traditional "IR-ID" Exercise in the Introductory Organic Chemistry Laboratory

    Science.gov (United States)

    Stokes-Huby, Heather; Vitale, Dale E.

    2007-01-01

    This exercise integrates the infrared unknown identification ("IR-ID") experiment common to most organic laboratory syllabi with computer molecular modeling. In this modification students are still required to identify unknown compounds from their IR spectra, but must additionally match some of the absorptions with computed frequencies they…

  14. Hizbollah lubab : "Me tahame ameeriklastega häid suhteid" / Mohamad Afif ; interv. Ivar Soopan

    Index Scriptorium Estoniae

    Afif, Mohamad

    2005-01-01

    Liibanoni shiiitide organisatsiooni Hizbollah meediasuhete direktor ütleb, et Hizbollah ei ole terroriorganisatsioon. Religioosse ja poliitilise grupina tahab Hizbollah häid suhteid teistega kõikjal maailmas, kuid probleem on poliitikas, selles, kuidas USA suhtub nende regiooni, tõekspidamistesse

  15. External validity of the Indonesian Wechsler Adult Intelligence Scale - Fourth edition (WAIS-IV-ID)

    NARCIS (Netherlands)

    Suwartono, C.; Hidajat, L.L.; Halim, M.S.; Hendriks, M.P.H.; Kessels, R.P.C.

    2016-01-01

    The Wechsler Adult Intelligence Scale-Fourth Edition (WAIS-IV-ID) has been adapted and proved to be valid for its internal structure for Indonesian population. The same structure found as in the American WAIS-IV (WAIS-IV-US; Suwartono, Hendriks, Hidajat, Halim, & Kessels, 2015). Despite its strong i

  16. OpenID connect as a security service in Cloud-based diagnostic imaging systems

    Science.gov (United States)

    Ma, Weina; Sartipi, Kamran; Sharghi, Hassan; Koff, David; Bak, Peter

    2015-03-01

    The evolution of cloud computing is driving the next generation of diagnostic imaging (DI) systems. Cloud-based DI systems are able to deliver better services to patients without constraining to their own physical facilities. However, privacy and security concerns have been consistently regarded as the major obstacle for adoption of cloud computing by healthcare domains. Furthermore, traditional computing models and interfaces employed by DI systems are not ready for accessing diagnostic images through mobile devices. RESTful is an ideal technology for provisioning both mobile services and cloud computing. OpenID Connect, combining OpenID and OAuth together, is an emerging REST-based federated identity solution. It is one of the most perspective open standards to potentially become the de-facto standard for securing cloud computing and mobile applications, which has ever been regarded as "Kerberos of Cloud". We introduce OpenID Connect as an identity and authentication service in cloud-based DI systems and propose enhancements that allow for incorporating this technology within distributed enterprise environment. The objective of this study is to offer solutions for secure radiology image sharing among DI-r (Diagnostic Imaging Repository) and heterogeneous PACS (Picture Archiving and Communication Systems) as well as mobile clients in the cloud ecosystem. Through using OpenID Connect as an open-source identity and authentication service, deploying DI-r and PACS to private or community clouds should obtain equivalent security level to traditional computing model.

  17. The Id, Ego and Super-Ego in "Pride and Prejudice"

    Science.gov (United States)

    Liang, Yamin

    2011-01-01

    This paper mainly analyses the the id, ego, and super-ego which exists in the main character Elizabeth from several aspects, such as her pursuit for love, her prejudice towards Mr. Darcy, and the changes in her attitudes towards Wickham. This analysis helps readers appreciate this masterpiece from a different aspect which is related to the…

  18. System Virtualization and Efficient ID Transmission Method for RFID Tag Infrastructure Network

    CERN Document Server

    Kuribayashi, Shin-ichi

    2010-01-01

    The use of RFID tag which identifies a thing and an object will be expanded with progress of ubiquitous society, and it is necessary to study how to construct RFID network system as a social infrastructure like the Internet. First, this paper proposes the virtualization method of RFID tag network system to enable the same physical RFID network system to be used by multiple different service systems. The system virtualization not only reduces the system cost but also can dramatically reduce the installation space of physical readers and the operation cost. It is proposed that all equipments in the RFID network system except RFID tag could be shared with the conventional virtual technologies. Then, this paper proposes the conditional tag ID processing and the efficient tag ID transmission method which can greatly reduce the processing time and processing load in RFID tag Infrastructure network The conditional tag ID processing allows that tag ID is valid only at a certain time zone of day or in a certain area. ...

  19. 77 FR 56608 - Designation for the Pocatello, ID; Evansville, IN; and Salt Lake City, UT Areas

    Science.gov (United States)

    2012-09-13

    ... regarding the designation criteria in section 79(f) of the USGSA (7 U.S.C. 79(f)) and determined that Idaho... location and Designation Designation Official agency telephone start end Idaho Pocatello, ID (208) 233-8303... unless terminated by the Secretary; however, designations may be renewed according to the criteria...

  20. 77 FR 55813 - Transition of DOE-ID Public Reading Room

    Science.gov (United States)

    2012-09-11

    ... Library at 1776 Science Center Drive, Idaho Falls, ID 83401, beginning September 1, 2012. Access to documents will also be electronically accessible through the World Wide Web. For direction in accessing documents electronically through the World Wide Web, please refer to the Idaho Operations FOIA Web site...

  1. 76 FR 13976 - Eastern Idaho Resource Advisory Committee; Caribou-Targhee National Forest, Idaho Falls, ID

    Science.gov (United States)

    2011-03-15

    ... Forest Service Eastern Idaho Resource Advisory Committee; Caribou-Targhee National Forest, Idaho Falls, ID AGENCY: Forest Service, USDA. ACTION: Notice of meeting. SUMMARY: Pursuant to the authorities in... Self-Determination Act of 2000 (Pub. L. 106-393) the Caribou-Targhee National Forests' Eastern Idaho...

  2. OpenID Connect as a security service in cloud-based medical imaging systems.

    Science.gov (United States)

    Ma, Weina; Sartipi, Kamran; Sharghigoorabi, Hassan; Koff, David; Bak, Peter

    2016-04-01

    The evolution of cloud computing is driving the next generation of medical imaging systems. However, privacy and security concerns have been consistently regarded as the major obstacles for adoption of cloud computing by healthcare domains. OpenID Connect, combining OpenID and OAuth together, is an emerging representational state transfer-based federated identity solution. It is one of the most adopted open standards to potentially become the de facto standard for securing cloud computing and mobile applications, which is also regarded as "Kerberos of cloud." We introduce OpenID Connect as an authentication and authorization service in cloud-based diagnostic imaging (DI) systems, and propose enhancements that allow for incorporating this technology within distributed enterprise environments. The objective of this study is to offer solutions for secure sharing of medical images among diagnostic imaging repository (DI-r) and heterogeneous picture archiving and communication systems (PACS) as well as Web-based and mobile clients in the cloud ecosystem. The main objective is to use OpenID Connect open-source single sign-on and authorization service and in a user-centric manner, while deploying DI-r and PACS to private or community clouds should provide equivalent security levels to traditional computing model.

  3. Identification of clinical yeasts by Vitek MS system compared with API ID 32 C.

    Science.gov (United States)

    Durán-Valle, M Teresa; Sanz-Rodríguez, Nuria; Muñoz-Paraíso, Carmen; Almagro-Moltó, María; Gómez-Garcés, José Luis

    2014-05-01

    We performed a clinical evaluation of the Vitek MS matrix-assisted laser desorption ionization-time-of-flight mass spectrometry (MALDI-TOF MS) system with the commercial database version 2.0 for rapid identification of medically important yeasts as compared with the conventional phenotypic method API ID 32 C. We tested 161 clinical isolates, nine isolates from culture collections and five reference strains. In case of discrepant results or no identification with one or both methods, molecular identification techniques were employed. Concordance between both methods was observed with 160/175 isolates (91.42%) and misidentifications by both systems occurred only when taxa were not included in the respective databases, i.e., one isolate of Candida etchellsii was identified as C. globosa by Vitek MS and two isolates of C. orthopsilosis were identified as C. parapsilosis by API ID 32 C. Vitek MS could not identify nine strains (5.14%) and API ID 32 C did not identify 13 (7.42%). Vitek MS was more reliable than API ID 32 C and reduced the time required for the identification of clinical isolates to only a few minutes.

  4. Événement, idéologie et utopie

    Directory of Open Access Journals (Sweden)

    Jean-Luc AMALRIC

    2014-12-01

    Full Text Available RESUMEL’hypothèse que tente d’esquisser cet article est que l’idée ricœurienne d’une médiatisation dynamique des contradictions de l’imaginaire social présuppose une corrélation originaire de l’idéologie et de l’utopie qui ne peut elle-même être comprise qu’à partir de l’événement de l’institution d’un imaginaire social constituant. Dans un premier temps, l’article s’efforce de cerner ce qui fait la spécificité de la théorie ricœurienne de l’idéologie et de l’utopie comme « pratiques imaginatives », en soulignant à ce titre l’influence déterminante des thèses de Jacques Ellul sur l’idéologie. Puis, dans un second temps, il s’engage dans une analyse régressive qui conduit de la réappropriation ricœurienne de la conception dialectique de l’idéologie et de l’utopie exposée par Mannheim à l’idée d’un fondement événementiel de ces deux formes opposées de l’imaginaire social.Mots-Clés : Evénement, idéologie, utopie, Ellul, Mannheim. ABSTRACTThis paper attempts to sketch out the hypothesis that the Ricœurian conception of a dynamic mediatization of the contradictions of the social imaginary presupposes an original correlation between ideology and utopia, which can itself be understood only from the event that institutes a constitutive social imaginary. The first part of the paper marks out the specificity of the Ricœurian theory of ideology and utopia in terms of “imaginative practices”, underlining the determining influence of Jacques Ellul’s theses on ideology. The second part tries to develop a regressive argument, starting from the Ricœurian re-appropriation of Mannheim’s dialectical conception of ideology and utopia, and leading back to the idea of an event foundation for these two opposed forms of the social imaginary.Keywords : Event, Ideology, Utopia, Ellul, Mannheim   

  5. [Identification of a novel mutation of IDS gene from a Chinese pedigree with MPS II].

    Science.gov (United States)

    GUO, Yi-Bin; PAN, Hong-Da; GUO, Chun-Miao; LI, Yong-Mei; CHEN, Lu-Ming

    2009-11-01

    The purpose of this study was to understand the molecular genetic mechanism of mucopolysaccharidosis type II (MPS II) and to provide a prerequisite for future prenatal gene diagnosis. A preliminary diagnosis was made by qualitative detection of Urinary Glycosaminoglycans of the suspected MPS II proband. Then, mutation detection was performed on the proband and his family members with PCR and direct sequencing of PCR products. After the novel mutation of c.876 del 2 in IDS gene was detected, sequence analysis was performed on exon 6 of IDS gene of the 135 cases, which consisted of 120 randomly selected normal controls, and other 15 patients with MPS I, IV, and VI other than MPS II. Besides, the patho-genicity of the novel mutation was analyzed with the following 2 methods: conservative analysis of the sequence of muta-tion spots of different species and the direct test of the IDS enzyme activity of the patient and his relative family members. The result of uroscopy of the proband was strong positive (GAGs +++). There was a novel deletion mutation of c.876-877 del TC in the coding region of exon 6 of IDS gene, which was a hemizygous mutation. However, the mutation of his mother and sister was a heterozygous mutation. Detection of the exon 6 of IDS gene showed that the mutation was not found among normal controls and other patients with MPS I, IV, and VI other than MPS II. Homology comparison of amino acid sequences from different species showed that the phenylalanine (F) glutamine (Q) of the mutation site of c.876-877 del TC located in p.292-293 was highly conserved. The activity of IDS enzyme of the proband was only 2.3 nmol/4 h/mL, which was much lower than normal; but the activity of IDS enzyme of his father, mother and sister was 641.9 nmol/4 h/mL, 95.8 nmol/4h/mL and 103.2 nmol/4h/mL, respectively. These results illustrated that the deletion and frame-shift mutation of c.876-877 del TC detected was a novel pathologic mutation, which was the underlying cause of

  6. ID3算法在ATM选点预测系统中的应用%Application of ID3 algorithm in ATM election prediction system

    Institute of Scientific and Technical Information of China (English)

    于海涛; 姚耀文

    2010-01-01

    ATM的应用日益广泛,如何部署一个利用率高的ATM已成为一个值得探讨的问题.运用数据挖掘知识和决策树ID3算法,可以对已经部署ATM的地区进行分析,从而找出高利用率ATM地区的特征,并建立ATM选点模型,作为金融机构在何处部署高效的ATM的参考.

  7. The regulation of matrix metalloproteinases by Id1 in gastric cancer%由Id1介导的MMP-2、MMP-9对胃癌生成的调控作用

    Institute of Scientific and Technical Information of China (English)

    雷婷; 韩霜; 郭雪艳; 丁杰

    2011-01-01

    Background and purpose: Angiogenesis is critical for the development of all malignancies.Id transcription factors have been shown to regulate key steps in tumor growth and metastasis due to their effects on angiogenesis.This study investigated the possible relationship between Id1 and matrix metalloproteinases (MMPs)in angiogenesis of gastric cancer.Methods: Expressions of Id1 and MMPs in gastric cancer tissues were examined by immunohistochemistry.The human gastric cancer SGC7901 sub-cell lines expressing Id1-siRNA was established.Expressions of MMP-2 and MMP-9 in Id1-siRNA transfectants were examined by semi-quantitative RT-PCR and Western blot.Enzyme activity of MMP-2 and MMP-9 in Id1-siRNA cells were detected by zymography method.Expressions of MMP-2 and MMP-9 in Id1-siRNA cell-transplanted tumor tissues in nude mice were identified by immunohistochemical method and Western blot.Results: Id1 and MMP-2, MMP-9 co-expressions were identified in the gastric cancer tissues.Significantly decreased expressions of both Id1 and MMP-2, MMP-9 on both protein and mRNA levels in SGC7901 Id1-siRNA transfectants were found.Data from zymography method showed that the activations of MMPs in Id1-siRNA cell lines were reduced compared to the control groups.Decreased expression of MMP-2 and MMP-9 in the Id1-siRNA transplanted tumor tissues in nude mice were found compared to those from the control cells.Conclusion: Id1 and MMP-2, MMP-9 were co-expressed in gastric cancer tissues; Id1 could upregulate the expression of MMP-2 and MMP-9 in gastric cancer.Downregulation of Id1 in the gastric cancer cells inhibited the transcriptional activities of MMP-2 and MMP-9.So we presumed that Id1 might promote tumorigenesis by transactivating MMP-2 and MMP-9 in gastric cancer.%背景与目的:肿瘤血管生成是肿瘤的一大重要特性,肿瘤微血管密度已被作为许多恶性肿瘤预后的一个重要指标.分化抑制因子(Id)是新近发现的与血管生成密切相关的分子.Id

  8. Examining Trends and Coexisting Conditions Among Children Qualifying for SSI Under ADHD, ASD, and ID.

    Science.gov (United States)

    Pulcini, Christian D; Perrin, James M; Houtrow, Amy J; Sargent, John; Shui, Amy; Kuhlthau, Karen

    2015-01-01

    To examine the prevalence trends and coexisting conditions in attention-deficit/hyperactivity disorder (ADHD), autism spectrum disorder (ASD), and intellectual disability (ID) in the pediatric Supplemental Security Income (SSI) population and general population. The Social Security Administration (SSA) provided data on primary and secondary diagnoses of children qualifying for SSI for years 2000 to 2011. We compared SSA data with 2000-2011 National Health Interview Survey data on the prevalence of mental health diagnoses among children in the general population living between 0 and 199% of the federal poverty line. We utilized linear regression analysis to test the statistical significance of differences in the trends of the conditions' prevalence. Over this time period, the SSI population experienced increases in ADHD (5.8%) and ASD (7.2%) and a decrease in ID (-10.3%). Comparison with change in the general population indicated no significant difference in ADHD but significant differences in ASD and ID. Relative percentage changes reflect similar changes. The SSI population qualifying for SSI with ADHD (70.8%) had higher rates of coexisting conditions than the general population (66.1%), but lower rates of coexisting conditions for ASD and ID. ADHD is on the rise among children receiving SSI and in the general population. This suggests that the rise of ADHD in the SSI population is expected and does not represent a misallocation of resources. Changes described among the SSI population in ASD and ID may allude to diagnostic/coding trends and/or true changes in prevalence. Limitations arise from the comparability of the 2 data sets. Copyright © 2015 Academic Pediatric Association. Published by Elsevier Inc. All rights reserved.

  9. FHL2 Interacts with and Acts as a Functional Repressor of Id2 in Human Neuroblastoma Cells

    Institute of Scientific and Technical Information of China (English)

    Wei-dong Han; Zhi-qiang Wu; Ya-li Zhao; Yi-ling Si; Xiao-bing Fu

    2009-01-01

    Objective: Id2 is a natural inhibitor of the basic helix-loop-helix(bHLH) transcription factors. Although it is well known that active Id2 prevents differentiation and promotes cell cycle progression and tumorigenesis, the molecular events that regulate Id2 activity remain to be investigated.Methods: Yeast two-hybrid, mammalian two-hybrid, GST-pulldown and immunoprecipitation (CoIP) assays were used to screen and identify novel Id2 interactors. Luciferase assays were used to detect E47-mediated transcription activity. Colony formation and BrdU incorporation assays were used to determine cellular proliferation abilities. Northorn blot, western blot and quantitative PCR methods were used to measure gene expression levels. Electrophoretic mobility shift assays (EMSAs) were performed to investigate protein/DNA binding.Results: The LIM-only protein FHL2 (four-and-a-half-LIM-only protein 2) was identified to be a novel Id2 interactor. The HLH domain within Id2 is not required for its interaction with FHL2. FHL2 antagonizes the inhibitory effect of Id2 on the basic helix-loop-helix protein E47-mediated transcription. FHL2 prevents the formation of Id2-E47 heterdimer, thus releasing E47 to its target DNA and restoring its transcriptional activity. FHL2 expression was remarkably up-regulated during retinoic acid-induced differentiation of neuroblastoma cells, during which the expression of Id2 is opposite to that. Ectopic FHL2 expression in neuroblastoma cells markedly reduces the transcriptional and cell-cycle promoting functions of Id2.Conclusion: These results indicate that FHL2 is an important repressor of the oncogenic activity of Id2 in neuroblastoma cells.

  10. Evaluation of the iPLEX(®) Sample ID Plus Panel designed for the Sequenom MassARRAY(®) system. A SNP typing assay developed for human identification and sample tracking based on the SNPforID panel

    DEFF Research Database (Denmark)

    Johansen, P; Andersen, J D; Børsting, Claus

    2013-01-01

    ) and Matrix Assisted Laser Desorption/Ionization-Time of Flight Mass Spectrometry (MALDI-TOF MS). In this study, we evaluated the accuracy and sensitivity of the iPLEX(®) Sample ID Plus Panel by comparing the typing results of the iPLEX(®) Sample ID Plus Panel with those obtained with our ISO 17025 accredited...

  11. [Comparison of Phoenix™ Yeast ID Panel and API® ID 32C commercial systems for the identification of Candida species isolated from clinical samples].

    Science.gov (United States)

    Gayibova, Ülkü; Dalyan Cılo, Burcu; Ağca, Harun; Ener, Beyza

    2014-07-01

    Opportunistic fungal pathogens are one of the important causes of nosocomial infections, and several different types of yeasts, especially Candida species are increasingly recovered from immunocompromised patients. Since many of the yeasts are resistant to the commonly used antifungal agents, the introduction of appropriate therapy depends on rapid and accurate identification. The aims of this study were to compare the commercial identification systems namely API® ID 32C (bioMerieux, France) and Phoenix™ Yeast ID Panel (Becton Dickinson Diagnostics, USA) for the identification of Candida species and to evaluate the effect of morphological findings in the identification process. A total of 211 yeast strains isolated from different clinical samples (111 urine, 34 blood/vascular catheter, 27 upper/lower respiratory tract, 16 abscess/pus, 13 throat/vagina swabs and 10 sterile body fluids) of 137 patients hospitalized in Uludag University Health and Research Center between October 2013 to January 2014, were included in the study. Samples were cultured on blood agar, chromogenic agar (CHROMagar Candida, BD, USA) and Saboraud's dextrose agar (SDA), and isolated yeast colonies were evaluated with germ tube test and morphological examination by microscopy on cornmeal/Tween-80 agar. The isolates were identified as well by two commercial systems according to the manufacturers' recommendations. Discrepant results between the systems were tried to be resolved by using morphological characteristics of the yeasts. Of the isolates 159 were identified identical by both of the systems, and the concordance between those systems were estimated as 75.4%. According to the concordant identification, the most frequently isolated species was C.albicans (44.1%) followed by C.tropicalis (9.9%), C.glabrata (9.5%), C.parapsilosis (8.5%) and C.kefyr (8.1%). The concordance rate was 81.7% in identification of frequently isolated species (C.albicans, C.tropicalis, C.parapsilosis, C.glabrata, C

  12. 11 CFR 300.50 - Prohibited fundraising by national party committees (2 U.S.C. 441i(d)).

    Science.gov (United States)

    2010-01-01

    ... 11 Federal Elections 1 2010-01-01 2010-01-01 false Prohibited fundraising by national party committees (2 U.S.C. 441i(d)). 300.50 Section 300.50 Federal Elections FEDERAL ELECTION COMMISSION BIPARTISAN... Prohibited fundraising by national party committees (2 U.S.C. 441i(d)). (a) Prohibitions on fundraising...

  13. Initial Validation of the Chinese Quality of Life Questionnaire-Intellectual Disabilities (CQOL-ID): A Cultural Perspective

    Science.gov (United States)

    Wong, P. K. S.; Wong, D. F. K.; Schalock, R. L.; Chou, Y-C.

    2011-01-01

    Background: In the field of intellectual disabilities (ID), the quality of life concept has been developing rapidly in Chinese societies including Hong Kong, mainland China and Taiwan. However, there is a lack of locally validated instruments to measure the quality of life of people with ID. The study reported in this paper attempted to validate…

  14. Limited concordance between teachers, parents and healthcare professionals on the presence of chronic diseases in ID-adolescents

    NARCIS (Netherlands)

    Oeseburg, B.; Jansen, D. E. M. C.; Reijneveld, S. A.; Dijkstra, G. J.; Groothoff, J. W.

    2010-01-01

    Evidence on teachers' knowledge about somatic and mental chronic diseases among ID-adolescent compared to the knowledge parents and healthcare professionals have, is limited. The aim of this study is: (1) to assess the knowledge of teachers on the presence of chronic diseases in ID-adolescents; (2)

  15. Limited Concordance between Teachers, Parents and Healthcare Professionals on the Presence of Chronic Diseases in ID-Adolescents

    Science.gov (United States)

    Oeseburg, B.; Jansen, D. E. M. C.; Reijneveld, S. A.; Dijkstra, G. J.; Groothoff, J. W.

    2010-01-01

    Evidence on teachers' knowledge about somatic and mental chronic diseases among ID-adolescent compared to the knowledge parents and healthcare professionals have, is limited. The aim of this study is: (1) to assess the knowledge of teachers on the presence of chronic diseases in ID-adolescents; (2) to compare teachers with parents and healthcare…

  16. ACE I/D polymorphism is associated with mortality in a cohort study of patients starting with dialysis

    NARCIS (Netherlands)

    van der Sman-de Beer, F; Verhagen, C; Rombach, SM; Boorsma, P; van Manen, JG; Korevaar, JC; van den Bogaard, R; Boeschoten, EW; Krediet, RT; Navis, GJ; Vandenbroucke, JP; Dekker, FW

    2005-01-01

    ACE I/D polymorphism is associated with mortality in a cohort study of patients starting with dialysis. Background. In dialysis patients, only a few follow-up studies have addressed the relationship between the insertion/deletion (I/D) polymorphism in the angiotensin-converting enzyme (ACE) gene and

  17. Quality assessment of IDS contribution to ITRF2014 performed by DGFI-TUM

    Science.gov (United States)

    Bloßfeld, Mathis; Seitz, Manuela; Angermann, Detlef; Moreaux, Guilhem

    2016-12-01

    The International DORIS Service (IDS) submitted input data for the most recent realization of the International Terrestrial Reference System (ITRS), the International Terrestrial Reference Frame 2014 (ITRF2014). As one of the ITRS Combination Centers, DGFI-TUM is in charge to analyze and assess the quality of the submitted data and to compute a combined global TRF solution (called DTRF2014) using observations of the four geodetic space techniques GNSS, VLBI, SLR and DORIS. The combination methodology used at DGFI-TUM is based on the combination of datum-free normal equations. Together with station coordinates and velocities, terrestrial pole coordinates are estimated in one common adjustment. The paper presents the analysis results of the most recent DORIS submission IDS-d09 and evaluates its quality w.r.t. the DTRF2008 (IDS-only) solution. In the most recent version of the analysis, we introduce in total 55 station discontinuities and reduce 15 stations due to a too short time span or too few observations. Time series of weekly IDS solutions are computed and validated w.r.t. DTRF2008. The transformation parameter time series and the station residuals are discussed in detail. Especially the scale parameter time series shows a significant improvement compared to the DTRF2008 input data. The scatter of the x- and y-translation is significantly reduced to 5.7 mm and 7.1 mm compared to 6.6 mm and 8.1 mm for the DTRF2008 (IDS-only) solution. The z-translation time series still shows a high correlation with solar activity. 10% of all station residuals are significantly affected by spectral peaks at draconitic period harmonics of the altimetry satellites Jason and TOPEX/Poseidon and up to 48% of all station residual time series contain significantly determined frequencies with a 14 day period. The multi-year IDS solution is validated w.r.t. DTRF2008 and the consistently estimated terrestrial pole coordinates are analyzed and compared to IERS 08 C04. The x-pole spectra

  18. Regulatory substances produced by lymphocytes. V. Production of inhibitor of DNA synthesis (IDS) by proliferating T lymphocytes.

    Science.gov (United States)

    Namba, Y; Jegasothy, B V; Waksman, B H

    1977-04-01

    The conditions neccessary for production of inhibitor of DNA synthesis (IDS) by rat lymphocytes were investigated. In concanavalin A (Con A)-stimulated lymph node cell (LNC) cultures, IDS production was not detected in the culture supernatant during the first 24 hr, and it increased gradually after that to reach a maximum at 3 to 4 days. When the cells were pretreated with mitomycin C, IDS was not produced, suggesting that DNA synthesis of LNC or a LNC subpopulation is necessary for IDS production. In contrast, Con A-stimulated spleen cells priduced a high level of IDS within 24 hr, and its production fell off sharply thereafter. Con A-stimulated rat thymocytes also produced IDS reaching a maximum at 2 to 3 dyas. However, thymus cells from rats treated with hydrocortisone 48 hr previously did not produce IDS. This finding implies that cortisol-sensitive (cortical) thymocytes are capable of producing IDS and cortisol-resistant (medullary) thymocytes are not. IDS production by lymphoblasts was proportional to cell number and unaffected eith by cell density (1 to 10 x 106/ml) or by the concomitant presence of normal cells from spleen, lymph node, or thymus. Thus Con A-stimulated cells, after becoming blasts, appear to produce IDS automatically wihtout affecting or being affected by other cells. Both spleen and thymus cells from rats injected with a large dose of antigen (ovalbumin, 100 mg, i.p.) 24 hr in advance produced substantial amounts of IDS in culture within 24 hr in the absence of mitogen or additional antigen, but not the cells from rats injected with an immunizing dose (1 mg) of the same antigen. The cells producing IDS in the spleen were shown to be adherent to glass wool, and those in the thymus were partially so. IDS production by antigen-stimulated spleen cells was abrogated by injecting rats with bromodexyuridine (BUdR) at 0 and 12 hr after the ovalbumin. These findings suggest that a subpopulation ofadherent spleen cells (possibly resembling cortical

  19. ORCID Integration: Services to Create and Use ORCID IDs at KAUST

    KAUST Repository

    Grenz, Daryl M.

    2015-06-09

    As ORCID IDs become accepted as a global standard, the potential benefits to researchers and institutions of making use of them are multiplying. At King Abdullah University of Science and Technology (KAUST) we adopted the first institutional open access policy in the Arab region in June 2014 and are integrating with ORCID as part of services to researchers that improve the preservation and dissemination of their research. We started by using ORCID IDs to identify authors in our institutional repository. Our next step was to join ORCID as an institutional member and then set up a plan to support our faculty, researchers and students in the creation and use of ORCID identifiers. This presentation will look at the choices made and lessons learned during this process, focusing on the tools we developed to interact with the ORCID member API and the ways in which introducing ORCID has complemented other repository initiatives, such as the implementation of our institutional open access policy.

  20. ID-TIMS Geochronology of ca 1 Ma leucogranites from the core of Nanga Parbat

    Science.gov (United States)

    Bowring, S. A.; Searle, M. P.; Waters, D. J.; Hodges, K. V.; Schmitz, M. D.; Crowley, J.

    2003-12-01

    Although isotope-dilution, themal-ioniaztion mass spectrometry (ID-TIMS) is the most precise method available for U-Th-Pb geochronology of accessory minerals, the technique is traditionally not applied to samples youger than ca. 10 Ma due to low concentrations of radiogenic Pb. However, recent analytical advances allow the routine measurement of less than 5-10 picograms of radiogenic Pb, and the reduction of laboratory blanks to extremely low levels. As a consequence, it is now possible to use ID-TIMS for U-Pb geochronology of very young accessory mineral suites to develop new insights regarding the time scales and patterns of inheritance, melt production, and segregation in collisional orogens. The Nanga Parbat syntaxis of the northwestern Himalaya has had a long and complex thermal history, but it is famous for the evidence it provides for extremely young (Nanga Parbat in less than 1 million years.

  1. PERFORMANCE EVALUATION OF C-FUZZY DECISION TREE BASED IDS WITH DIFFERENT DISTANCE MEASURES

    Directory of Open Access Journals (Sweden)

    Vinayak Mantoor

    2012-01-01

    Full Text Available With the ever-increasing growth of computer networks and emergence of electronic commerce in recent years, computer security has become a priority. Intrusion detection system (IDS is often used as another wall of protection in addition to intrusion prevention techniques. This paper introduces a concept and design of decision trees based on Fuzzy clustering. Fuzzy clustering is the core functional part of the overall decision tree development and the developed tree will be referred to as C-fuzzy decision trees. Distance measure plays an important role in clustering data points. Choosing the right distance measure for a given dataset is a non-trivial problem. In this paper, we study the performance of C-fuzzy decision tree based IDS with different distance measures. We analyzed the results of our study using KDD Cup 1999 data and compared the accuracy of the classifier with different distance measures.

  2. New Cryptanalysis of an ID-based Password Authentication Scheme using Smart Cards and Fingerprints

    Directory of Open Access Journals (Sweden)

    MING-JHENG LI

    2010-11-01

    Full Text Available In 2002, Lee, Ryu and Yoo proposed a fingerprint-based remote user authentication scheme using a smart card. Their scheme would strengthen system security by verifying the smart card owner’s fingerprint. In 2003, Kim, Lee and Yoo proposed two ID-based password authentication schemes without passwords or verification tables,with smart card and fingerprints. The proposed nonce-based and timestamp-based schemes can withstand message replay attacks. In addition, the schemes can withstand impersonation attack. In this paper, we will first review Kim et al.’s ID-based password authentication schemes. Next, we will show that Kim et al.’s scheme still has the disadvantage of being vulnerable to impersonation attack.

  3. OpenID, a Single Sign-On Solution for E-learning Applications

    Directory of Open Access Journals (Sweden)

    Felician Alecu

    2011-09-01

    Full Text Available The e-learning applications of today require a special focus on security. Distributed e- learning applications have several modules user can access using different clients (desktop or mobile. The same user has several accounts with different credentials. In this context, the SSO (Single Sign-On solutions become very attractive since the user has to log in once and can access all the needed resources without being prompted again for the username and password. Using the OpenID standard for e-learning Web-based applications is a good and reliable solution because it supports both URL and XRI identifiers. This paper presents the main characteristics of OpenID standard and how this standard could be implemented for a distributed, Web-based, e-learning application.

  4. Hacia una complementariedad del espacio de trabajo idóneo

    OpenAIRE

    Verdugo, Paula

    2015-01-01

    En este trabajo se muestra el Espacio de Trabajo Matemático (ETM) de referencia y el ETM Idóneo del docente relativo a la sucesión an=(1+1/n)n, la cual es de nuestro interés por ser estudiada tanto en la enseñanza secundaria como en la enseñanza universitaria. Para nuestro estudio se considera una parte teórica de la matemática (ETM de Referencia) y otra parte en donde el profesor muestra como enseñaría la sucesión (ETM idóneo), el cual realiza cursos en los primeros años de universidad. A...

  5. We.I.Pe: Web Identification of People using e-mail ID

    CERN Document Server

    Kuppusamy, K S

    2012-01-01

    With the phenomenal growth of content in the World Wide Web, the diversity of user supplied queries have become vivid. Searching for people on the web has become an important type of search activity in the web search engines. This paper proposes a model named "We.I.Pe" to identify people on the World Wide Web using e-mail Id as the primary input. The approach followed in this research work provides the collected information, based on the user supplied e-mail id, in an easier to navigate manner. The grouping of collected information based on various sources makes the result visualization process more effective. The proposed model is validated by a prototype implementation. Experiments conducted on the prototype implementation provide encouraging results

  6. Preparation of idli batter, its properties and nutritional improvement during fermentation.

    Science.gov (United States)

    Ghosh, Debasree; Chattopadhyay, Parimal

    2011-10-01

    Idli is a traditional fermented rice and black gram based food. Idli batter is prepared by soaking polished parboiled rice and decorticated black gram for 4 h at 30 ± 1 °C in water. The soaked mass was ground using a grinder with adequate amount of water. The blend ratios of 2:1, 3:1 and 4:1 (w/w) batter were allowed for fermentation for different periods with the addition of 2% (w/w) of salt. The rheology of the product was assessed using a Brookfield Viscometer having disc spindles. Shear stress values were in the range of 0.22 and 4 Pa and reached a maximum value at 7 h of fermentation. The density, pH, and percentage total acidity of batter during fermentation for different blend ratios ranged between 0.93 and 0.59 gm cm(-3), 4.21 and 5.9 and 0.44 and 0.91% respectively. During fermentation, maximum production of riboflavin and thiamine were found to be 0.76 mg/100 gm and 0.73 mg/100 gm in 3:1 blend ratio of idli batter; and the folic acid content was found to be at a maximum of 0.75 mg/100 gm of idli batter after 10 h of fermentation. Digestibility in terms of amino N2 content was analysed by formol titration.

  7. A non-parametric peak calling algorithm for DamID-Seq.

    Directory of Open Access Journals (Sweden)

    Renhua Li

    Full Text Available Protein-DNA interactions play a significant role in gene regulation and expression. In order to identify transcription factor binding sites (TFBS of double sex (DSX-an important transcription factor in sex determination, we applied the DNA adenine methylation identification (DamID technology to the fat body tissue of Drosophila, followed by deep sequencing (DamID-Seq. One feature of DamID-Seq data is that induced adenine methylation signals are not assured to be symmetrically distributed at TFBS, which renders the existing peak calling algorithms for ChIP-Seq, including SPP and MACS, inappropriate for DamID-Seq data. This challenged us to develop a new algorithm for peak calling. A challenge in peaking calling based on sequence data is estimating the averaged behavior of background signals. We applied a bootstrap resampling method to short sequence reads in the control (Dam only. After data quality check and mapping reads to a reference genome, the peaking calling procedure compromises the following steps: 1 reads resampling; 2 reads scaling (normalization and computing signal-to-noise fold changes; 3 filtering; 4 Calling peaks based on a statistically significant threshold. This is a non-parametric method for peak calling (NPPC. We also used irreproducible discovery rate (IDR analysis, as well as ChIP-Seq data to compare the peaks called by the NPPC. We identified approximately 6,000 peaks for DSX, which point to 1,225 genes related to the fat body tissue difference between female and male Drosophila. Statistical evidence from IDR analysis indicated that these peaks are reproducible across biological replicates. In addition, these peaks are comparable to those identified by use of ChIP-Seq on S2 cells, in terms of peak number, location, and peaks width.

  8. A non-parametric peak calling algorithm for DamID-Seq.

    Science.gov (United States)

    Li, Renhua; Hempel, Leonie U; Jiang, Tingbo

    2015-01-01

    Protein-DNA interactions play a significant role in gene regulation and expression. In order to identify transcription factor binding sites (TFBS) of double sex (DSX)-an important transcription factor in sex determination, we applied the DNA adenine methylation identification (DamID) technology to the fat body tissue of Drosophila, followed by deep sequencing (DamID-Seq). One feature of DamID-Seq data is that induced adenine methylation signals are not assured to be symmetrically distributed at TFBS, which renders the existing peak calling algorithms for ChIP-Seq, including SPP and MACS, inappropriate for DamID-Seq data. This challenged us to develop a new algorithm for peak calling. A challenge in peaking calling based on sequence data is estimating the averaged behavior of background signals. We applied a bootstrap resampling method to short sequence reads in the control (Dam only). After data quality check and mapping reads to a reference genome, the peaking calling procedure compromises the following steps: 1) reads resampling; 2) reads scaling (normalization) and computing signal-to-noise fold changes; 3) filtering; 4) Calling peaks based on a statistically significant threshold. This is a non-parametric method for peak calling (NPPC). We also used irreproducible discovery rate (IDR) analysis, as well as ChIP-Seq data to compare the peaks called by the NPPC. We identified approximately 6,000 peaks for DSX, which point to 1,225 genes related to the fat body tissue difference between female and male Drosophila. Statistical evidence from IDR analysis indicated that these peaks are reproducible across biological replicates. In addition, these peaks are comparable to those identified by use of ChIP-Seq on S2 cells, in terms of peak number, location, and peaks width.

  9. 集装箱编码图像的识别%Container Image ID Recognition

    Institute of Scientific and Technical Information of China (English)

    朱秋煜; 韩锦成; 阚伟

    2000-01-01

    The paper studies a technique of container image ID recognition. In the image preprocessing phase, thresholdiong based on histogram and adaptive thresholding is used. In the character segmentation phase, a labeling method is used, which is based on connected region, location of character block, location of character line recovery of absent and fragmented characters. In the recognition phase, adaptive template match and multiple image results synthesis are used. A high recognition rate is obtained.

  10. 集装箱编码图像的识别%Container Image ID Recognition

    Institute of Scientific and Technical Information of China (English)

    朱秋煜; 韩锦成; 阚伟

    2001-01-01

    The paper studies a technique of container image ID recognition. In the image preprocessing phase, thresholdiong based on histogram and adaptive thresholding is used. In the character segmentation phase, a labeling method is used, which is based on connected region, location of character block, location of character line recovery of absent and fragmented characters. In the recognition phase, adaptive template match and multiple image results synthesis are used. A high recognition rate is obtained.

  11. Secure and trustworthy file sharing over cloud storage using eID tokens

    OpenAIRE

    Duarte, E; Pinheiro, F; Zúquete, A.; Gomes, H.

    2015-01-01

    This paper presents a multi-platform, open-source application that aims to protect data stored and shared in existing cloud storage services. The access to the cryptographic material used to protect data is implemented using the identification and authentication functionalities of national electronic identity (eID) tokens. All peer to peer dialogs to exchange cryptographic material is implemented using the cloud storage facilities. Furthermore, we have included a set of mechanisms to prevent ...

  12. SIMULASI SAHAM BERBASIS WEB DENGAN TEKNOLOGI VIRTUAL PRIVATE NETWORK DI PORTAL WWW.KONTAN.CO.ID

    Directory of Open Access Journals (Sweden)

    Albert Verasius Dian Sano

    2011-11-01

    forwarded through an official data vendor PT XYZ. Data from the IDX will be captured by a middleware application at PT XYZ and forwarded to www.kontan.co.id. This application has been tested and successfully run by around 700 users. This tool is expected to provide a kind of education and motivation to beginner-level investors who want to be engaged with the stock-trading activities.

  13. Torma ringtallist jäid vaid müürid / Bianca Mikovitš

    Index Scriptorium Estoniae

    Mikovitš, Bianca

    2011-01-01

    Pärast 29. aprillil 2011 toimunud tulekahju jäid Torma mõisa muinsuskaitse all olevast ringtallist järele vaid müürid. Muinsuskaitseameti Jõgevamaa vaneminspektori Sille Raidvere hinnangul päästaks Torma ringtalli lõplikust hävingust hoone müüride kiire konserveerimine, mis annaks edaspidiseks võimaluse tallihoone taastada

  14. The angiotensin converting enzyme gene i/d polymorphism in ellite polish and lithuanian judo players

    Directory of Open Access Journals (Sweden)

    J Eider

    2010-06-01

    Full Text Available A common polymorphism in the angiotensin converting enzyme I gene (the ACE I/D variant represents one of the first characterized and the most widely studied genetic variants in the context of elite athletes status and performance related traits. The aim of this study is to perform preliminary studies to analyze the possible importance of the ACE gene polymorphisms in elite Polish and Lithuanian judo players and sedentary individuals representing the possible relationships with genotype and physical performance. 28 male of elite Polish and Lithuania judo players were recruited for this study. For controls samples were prepared from 115 unrelated volunteers. DNA was extracted from the buccal cells donated by the subjects, and the PCR amplification of the polymorphic region of ACE gene contained either the insertion (I or deletion (D fragment was performed. Compared with sedentary controls, the frequency of I allele differ significantly from that found in judo player’s group: 60.7% vs. 44.3%(p=0.02 and ACE genotype frequency amongst the whole athletes group (28.6% II, 64.3% ID, 7.1% DD was also different from expected values (control group 19.1% II, 50.4% ID, 30.4% DD; p=0.019. Our investigation have proved the ACE I/D allele could be one of the factors influencing the elite endurance exercise performance. The research suggests that those most predisposed to judo are individuals with the allele distribution in the ACE gene that is most significant with regard to the duration of a fight, and not with regard to the character of the performed moves, as could be supposed.

  15. Evaluation of the Organon-Teknika MICRO-ID LISTERIA system.

    Science.gov (United States)

    Bannerman, E; Yersin, M N; Bille, J

    1992-06-01

    The MICRO-ID LISTERIA system, designed to identify Listeria isolates to species level within 24 h, was compared with conventional biochemical identification. MICRO-ID LISTERIA used in combination with the CAMP test correctly identified 409 (98.8%) of 414 strains isolated from human, animal, food, and environmental sources belonging to the seven species currently defined within the genus Listeria. The kit was easy to use and simple to interpret. However, 8 of the 15 tests (i.e., phenylalanine deaminase, hydrogen sulfide, indole, ornithine decarboxylase, lysine decarboxylase, malonate, urease, and o-nitrophenyl-beta-D-galactopyranoside) were considered superfluous for the differentiation of Listeria spp. The CAMP test was indispensable when using the MICRO-ID LISTERIA system, in particular to differentiate CAMP test-positive L. monocytogenes from the nonhemolytic, rhamnose-positive L. innocua. The hemolytic L. seeligeri and L. ivanovii strains and the nonhemolytic, non-rhamnose-acidifying L. welshimeri strains could also be differentiated from one another only on the basis of their CAMP test results. The very few strains of L. grayi and L. murrayi were easily differentiated from the other nonhemolytic species. Catalase-negative cocci should not be tested, because 12 out of 19 catalase-negative strains (all enterococci) in our test were misidentified as Listeria spp. The MICRO-ID LISTERIA system identified strains within 18 to 24 h and is thus less time-consuming than conventional tests. The system could, therefore, be used together with correctly done CAMP tests for the rapid identification of Listeria isolates, especially food and environmental isolates, for which rapid species differentiation is important.

  16. 基于计算模型的 OpenID Connect协议认证性的自动化分析%Automatic Analysis of Authentication of OpenID Connect Protocol Based on the Computational Model

    Institute of Scientific and Technical Information of China (English)

    孟博; 张金丽; 鲁金钿

    2016-01-01

    In this paper , we get the message term of OpenID Connect by analyzing its authentication message flow , model it with Blanchet calculus in computational model , and use the automatic verification tool CryptoVerif to analyze its authentication .The result shows that , in OpenID Connect protocol , Client can authenticate Token Endpoint , while there is no authentication between the End-User and Authorization Server , and Token Endpoint can′t authenticate Client .Finally, the solutions for the problem of no authentication in OpenID Connect protocol are presented .%分析了OpenID Connect 协议的消息结构,基于计算模型应用Blanchet 演算对OpenID Connect 协议进行了形式化建模,应用自动化验证工具CryptoVerif 验证了其认证性。结果表明:在OpenID Connect 协议中,客户端能够认证终端用户,但是终端用户与授权服务器之间不能相互认证、令牌终端不能认证客户端。为此,给出了OpenID Connect协议中不具有认证性问题的解决方法。

  17. ID4 regulates transcriptional activity of wild type and mutant p53 via K373 acetylation.

    Science.gov (United States)

    Morton, Derrick J; Patel, Divya; Joshi, Jugal; Hunt, Aisha; Knowell, Ashley E; Chaudhary, Jaideep

    2017-01-10

    Given that mutated p53 (50% of all human cancers) is over-expressed in many cancers, restoration of mutant p53 to its wild type biological function has been sought after as cancer therapy. The conformational flexibility has allowed to restore the normal biological function of mutant p53 by short peptides and small molecule compounds. Recently, studies have focused on physiological mechanisms such as acetylation of lysine residues to rescue the wild type activity of mutant p53. Using p53 null prostate cancer cell line we show that ID4 dependent acetylation promotes mutant p53 DNA-binding capabilities to its wild type consensus sequence, thus regulating p53-dependent target genes leading to subsequent cell cycle arrest and apoptosis. Specifically, by using wild type, mutant (P223L, V274F, R175H, R273H), acetylation mimics (K320Q and K373Q) and non-acetylation mimics (K320R and K373R) of p53, we identify that ID4 promotes acetylation of K373 and to a lesser extent K320, in turn restoring p53-dependent biological activities. Together, our data provides a molecular understanding of ID4 dependent acetylation that suggests a strategy of enhancing p53 acetylation at sites K373 and K320 that may serve as a viable mechanism of physiological restoration of mutant p53 to its wild type biological function.

  18. Targeted tumor-penetrating siRNA nanocomplexes for credentialing the ovarian cancer oncogene ID4.

    Science.gov (United States)

    Ren, Yin; Cheung, Hiu Wing; von Maltzhan, Geoffrey; Agrawal, Amit; Cowley, Glenn S; Weir, Barbara A; Boehm, Jesse S; Tamayo, Pablo; Karst, Alison M; Liu, Joyce F; Hirsch, Michelle S; Mesirov, Jill P; Drapkin, Ronny; Root, David E; Lo, Justin; Fogal, Valentina; Ruoslahti, Erkki; Hahn, William C; Bhatia, Sangeeta N

    2012-08-15

    The comprehensive characterization of a large number of cancer genomes will eventually lead to a compendium of genetic alterations in specific cancers. Unfortunately, the number and complexity of identified alterations complicate endeavors to identify biologically relevant mutations critical for tumor maintenance because many of these targets are not amenable to manipulation by small molecules or antibodies. RNA interference provides a direct way to study putative cancer targets; however, specific delivery of therapeutics to the tumor parenchyma remains an intractable problem. We describe a platform for the discovery and initial validation of cancer targets, composed of a systematic effort to identify amplified and essential genes in human cancer cell lines and tumors partnered with a novel modular delivery technology. We developed a tumor-penetrating nanocomplex (TPN) that comprised small interfering RNA (siRNA) complexed with a tandem tumor-penetrating and membrane-translocating peptide, which enabled the specific delivery of siRNA deep into the tumor parenchyma. We used TPN in vivo to evaluate inhibitor of DNA binding 4 (ID4) as a novel oncogene. Treatment of ovarian tumor-bearing mice with ID4-specific TPN suppressed growth of established tumors and significantly improved survival. These observations not only credential ID4 as an oncogene in 32% of high-grade ovarian cancers but also provide a framework for the identification, validation, and understanding of potential therapeutic cancer targets.

  19. The ID93 tuberculosis vaccine candidate does not induce sensitivity to purified protein derivative.

    Science.gov (United States)

    Baldwin, Susan L; Reese, Valerie; Granger, Brian; Orr, Mark T; Ireton, Gregory C; Coler, Rhea N; Reed, Steven G

    2014-09-01

    The tuberculin skin test (TST) is a simple and inexpensive test to determine whether individuals have been exposed to Mycobacterium tuberculosis. This test is not always reliable, however, in people previously immunized with BCG and/or who have been exposed to environmental mycobacterial species due to a reaction to purified protein derivative (PPD) used in the skin test. An issue with BCG, therefore, is that the resulting sensitization to PPD in some individuals compromises the diagnostic use of the skin test. The ability to induce protective immune responses without sensitizing to the tuberculin skin test will be important properties of next-generation tuberculosis (TB) vaccine candidates. We show here that guinea pigs immunized with the candidate TB vaccine ID93/GLA-SE, currently in clinical trials, do not react to intradermal PPD administration. In contrast, positive DTH responses to both ID93 and components thereof were induced in ID93/GLA-SE-immunized animals, indicating robust but specific cellular responses were present in the immunized animals. Noninterference with the TST is an important factor for consideration in the development of a vaccine against M. tuberculosis. Copyright © 2014, American Society for Microbiology. All Rights Reserved.

  20. A new improved ID-based proxy ring signature scheme from bilinear pairings

    Institute of Scientific and Technical Information of China (English)

    2006-01-01

    Ring signature and proxy signature are of vital importance to secure electronic commerce. Recently,the bilinear pairing such as Weil pairing or Tate pairing on elliptic curves and hyperelliptic curves is playing an important role in security solutions. Several ID-based signature schemes have been put forward, many of which are based on bilinear pairings. In key management and moderate security demand scenarios, ID-based public key cryptosystem is more preferable than other public key infrastructure based systems. In this paper, an improved ID-based proxy ring signature scheme from bilinear pairings is proposed which combines the advantages of proxy signature and of ring signatures. Our scheme can guarantee the profits of the proxy signer via preventing the original signer form generating the proxy ring signature. Furthermore, bilinear pairings are introduced to minimize the computation overhead and to improve the related performance of our scheme. In contrast with Zhang's scheme, our scheme is a computational efficiency improvement for signature verification because the computational cost of bilinear pairings required is reduced from O(n) to O( 1 ). In addition, the proxy ring signature presented in this paper can perfectly satisfy all the security requirements of proxy ring signature, i.e.signer-ambiguity, non-forgeability, verification, non-deniability and distinguishability.

  1. Towards fraud-proof ID documents using multiple data hiding technologies and biometrics

    Science.gov (United States)

    Picard, Justin; Vielhauer, Claus; Thorwirth, Niels

    2004-06-01

    Identity documents, such as ID cards, passports, and driver's licenses, contain textual information, a portrait of the legitimate holder, and eventually some other biometric characteristics such as a fingerprint or handwritten signature. As prices for digital imaging technologies fall, making them more widely available, we have seen an exponential increase in the ease and the number of counterfeiters that can effectively forge documents. Today, with only limited knowledge of technology and a small amount of money, a counterfeiter can effortlessly replace a photo or modify identity information on a legitimate document to the extent that it is very diffcult to differentiate from the original. This paper proposes a virtually fraud-proof ID document based on a combination of three different data hiding technologies: digital watermarking, 2-D bar codes, and Copy Detection Pattern, plus additional biometric protection. As will be shown, that combination of data hiding technologies protects the document against any forgery, in principle without any requirement for other security features. To prevent a genuine document to be used by an illegitimate user,biometric information is also covertly stored in the ID document, to be used for identification at the detector.

  2. Quand l’idée fixe se met « à table »

    Directory of Open Access Journals (Sweden)

    Cécile de Bary

    2008-03-01

    Full Text Available Un livre de cuisine, comme A table de Claudian, édité en 1963, peut relever de la prose d’idées dans la mesure où son projet est sous-tendu par une idéologie très précise, qui seule lui donne sa cohérence. Si l’ethnocentrisme consiste à ne pas reconnaître à l’autre une culture, par exemple, ce livre apparaît comme ethnocentrique, puisqu’il a pour projet de départager les peuples qui savent et ceux qui ne savent pas. Il est encore réactionnaire, voué au rétablissement des savoir-faire des terroirs, contre les corruptions parisiennes en particulier. Dès lors, la présentation d’un plat est toujours susceptible de s’étendre ou de se faire discours, sous la poussée d’un lyrisme acrimonieux. Pour autant, il ne s’agit pas d’un faux livre de cuisine, d’un traité ou d’une « physiologie ». La recette est l’aboutissement logique de l’idée fixe. Elle est le lieu d’une bataille que l’argumentation sert, qu’elle met en scène et qu’elle prépare.

  3. DNA origami-based shape IDs for single-molecule nanomechanical genotyping

    Science.gov (United States)

    Zhang, Honglu; Chao, Jie; Pan, Dun; Liu, Huajie; Qiang, Yu; Liu, Ke; Cui, Chengjun; Chen, Jianhua; Huang, Qing; Hu, Jun; Wang, Lianhui; Huang, Wei; Shi, Yongyong; Fan, Chunhai

    2017-04-01

    Variations on DNA sequences profoundly affect how we develop diseases and respond to pathogens and drugs. Atomic force microscopy (AFM) provides a nanomechanical imaging approach for genetic analysis with nanometre resolution. However, unlike fluorescence imaging that has wavelength-specific fluorophores, the lack of shape-specific labels largely hampers widespread applications of AFM imaging. Here we report the development of a set of differentially shaped, highly hybridizable self-assembled DNA origami nanostructures serving as shape IDs for magnified nanomechanical imaging of single-nucleotide polymorphisms. Using these origami shape IDs, we directly genotype single molecules of human genomic DNA with an ultrahigh resolution of ~10 nm and the multiplexing ability. Further, we determine three types of disease-associated, long-range haplotypes in samples from the Han Chinese population. Single-molecule analysis allows robust haplotyping even for samples with low labelling efficiency. We expect this generic shape ID-based nanomechanical approach to hold great potential in genetic analysis at the single-molecule level.

  4. ID-based Signcryption Scheme%基于身份的签密方案

    Institute of Scientific and Technical Information of China (English)

    李虓; 何明星; 罗大文

    2009-01-01

    现有基于身份的签密方案存在签密不能被公开验证、签密能被伪造和签密不具有健壮性等缺陷.分析LHL方案的安全性,利用双线性对提出一个基于身份的签密方案,该方案能保证签密具有公开验证性、不可伪造性、健壮性、不可否认性和前向安全性,它只需要4个对运算,其效率高于其他慕于身份的签密方案.%The existing ID-based signcryption schemes have some drawbacks, such as the signcryption can not be public verified, the signcryption can be forged, the signcryption is not robust, and etc. This paper analyzes the security of the LHL scheme and adopts the bilinear parings to propose an ID-based signcryption scheme. This scheme can ensure the signcryption has some characters, such as public verifiability, unforgeability, robustness, non-repudiation and forward security. It only needs four pairs of operation and it is more efficient than other ID-based signcryption schemes.

  5. An ID/Locator Separation Based Group Mobility Management in Wireless Body Area Network

    Directory of Open Access Journals (Sweden)

    Moneeb Gohar

    2015-01-01

    Full Text Available Mobility management in wireless sensor network is the most important factor to be considered for applications such as healthcare system. Recently, Identifier (ID/Locator (LOC separation based mobility management scheme has been proposed for wireless sensor network. However, it does not perform well in group-based mobility management in wireless body area network, and thus it tends to induce large registration, packet delivery, and handover delays. To overcome these limitations, we propose a group-based mobility management scheme based on ID/LOC separation concept for ID-based communications with location-based routing to reduce the number of control messages. In the proposed scheme, each sensor device has a globally unique device identifier (GDID which contains the information of its home network domain. For handover support, each access gateway maintains its home GDID register (HGR and visiting GDID register (VGR which are used to keep the GDID-locator (LOC mappings for primary mobile devices in the distributed manner. Besides, in the proposed scheme, only the coordinator will send Router Solicitation and Router Advertisement messages to reduce the control messages further. By numerical analysis, we show that the proposed scheme can significantly reduce the registration, packet delivery, and handover delays, compared to the existing schemes.

  6. ACE insertion/deletion (I/D) polymorphism and diabetic nephropathy.

    Science.gov (United States)

    Rahimi, Zohreh

    2012-10-01

    Angiotensin converting enzyme (ACE) gene encodes ACE, a key component of renin angiotensin system (RAS), plays an important role in blood pressure homeostasis by generating the vasoconstrictor peptide angiotensin II. Directory of Open Access Journals (DOAJ), Google Scholar, Pubmed (NLM), LISTA (EBSCO) and Web of Science have been searched. The presence of ACE insertion/deletion (I/D) polymorphism affects the plasma level of ACE. ACE DD genotype is associated with the highest systemic and renal ACE levels compared with the lowest ACE activity in carriers of II genotype. In this review focus has been performed on the study of ACE I/D polymorphism in various populations and its influence on the risk of onset and progression of diabetic nephropathy. Also, association between ACE I/D polymorphism and response to ACE inhibitor and angiotensin II receptor antagonists will be reviewed. Further, synergistic effect of this polymorphism and variants of some genes on the risk of development of diabetic nephropathy will be discussed.

  7. ZigID: Improving visibility in industrial environments by combining WSN and RFID

    Institute of Scientific and Technical Information of China (English)

    Pablo GARCIA ANSOLA; Andrés GARCIA; Javier de las MORENAS; Javier GARCIA ESCRIBANO; Francisco Javier OTAMENDI

    2011-01-01

    The objective of this work is to provide decision-making processes with an updated/real picture of the mobile resources in industrial environments through a constant feedback of information.The combination of identification technologies and wireless sensor networks(WSN)is proposed as a key development to guarantee an accurate and timely supply of online information regarding the localization and tracking of the mobile wireless devices.This approach uses a cooperative and distributed localization system,called ZigID,which is a WSN based on a Zigbee network with radio frequency identification(RFID)active tags as end nodes.The WSN can recover not only the ID information stored at the tags attached to mobile resources,but also any other useful data captured by specific sensors for acceleration,temperature,humidity and fuel status.This paper also shows the development of ZigID,including devices and information flows,as well as its implementation in ground handling operations at the Ciudad Real Central Airport,Spain.

  8. Is there an ACE ID - ACTN3 R577X polymorphisms interaction that influences sprint performance?

    Science.gov (United States)

    Eynon, N; Alves, A J; Yamin, C; Sagiv, M; Duarte, J A; Oliveira, J; Ayalon, M; Goldhammer, E; Sagiv, M; Meckel, Y

    2009-12-01

    Functional R577X (rs.1815739) and ID (rs.5186) polymorphisms in the alpha-actinin-3 ( ACTN3) and the angiotensin converting enzyme (ACE) genes, respectively, have been associated with sprint performance. The aim of this study was to determine their effect on sprint performance among 81 Israeli sprinters and 240 healthy controls. Results revealed that the ACE II genotype+ ACTN3 R allele (P=0.003 for sprinters vs. controls), and the ACTN3 RR genotype +ACE I allele (P=0.001 for sprinters vs. controls) might be the genotype for sprinters. In the whole cohort the probability of ACTN3 RR genotype+ ACE I allele being a sprinter (odds ratio 2.67, 95% confidence interval 1.45-4.93) and of ACE II genotype+ ACTN3 R allele being a sprinter (odds ratio 3.57, 95% confidence interval 1.78-7.15) was significantly higher than that in the controls. In conclusion, the above data suggest that ACE ID/ ACTN3 R577X genotype combination is associated with sprint ability. However, ACE ID/ ACTN3 R577X genotype combination is not related to the level of performance.

  9. Identifying IDS Agent Nodes Based on 3-Layered Key Management Framework for MANET

    Directory of Open Access Journals (Sweden)

    Marjan KUCHAKI RAFSANJANI

    2014-02-01

    Full Text Available Nowadays, Mobile Ad Hoc Networks (MANETs have become one of the most important networks in advanced technologies. However, MANETs are more vulnerable than wired and wireless networks to active and passive attacks. So, security and intrusion detection are very important in these networks. In this paper, we have presented a method of identifying IDS agent nodes in MANET. Whereas, IDS agent nodes due to monitoring activities in Intrusion Detection Systems (IDSs need more battery energy than other nodes in the network. In the first step, our method uses a 3-layered key management framework in order to authenticate and then in the second step, nodes with higher battery power from among authorized nodes as IDS agent nodes are considered. Therefore, with this method, some authorized nodes contribute in monitoring activities and the network lifetime will be increased and also communication cost in the 3-layered key management framework is less than other frameworks, thus communication performance will be increased.doi:10.14456/WJST.2014.30

  10. Evaluation of the iPLEX(®) Sample ID Plus Panel designed for the Sequenom MassARRAY(®) system. A SNP typing assay developed for human identification and sample tracking based on the SNPforID panel

    DEFF Research Database (Denmark)

    Johansen, P; Andersen, J D; Børsting, Claus;

    2013-01-01

    Sequenom launched the first commercial SNP typing kit for human identification, named the iPLEX(®) Sample ID Plus Panel. The kit amplifies 47 of the 52 SNPs in the SNPforID panel, amelogenin and two Y-chromosome SNPs in one multiplex PCR. The SNPs were analyzed by single base extension (SBE...... SNPforID assay. The average call rate for duplicate typing of any one SNPs in the panel was 90.0% when the mass spectra were analyzed automatically with the MassARRAY(®) TYPER 4.0 genotyping software in real time. Two reproducible inconsistencies were observed (error rate: 0.05%) at two different SNP...

  11. Elevated endogenous expression of the dominant negative basic helix-loop-helix protein ID1 correlates with significant centrosome abnormalities in human tumor cells

    Directory of Open Access Journals (Sweden)

    Gutmann Anja

    2010-01-01

    Full Text Available Abstract Background ID proteins are dominant negative inhibitors of basic helix-loop-helix transcription factors that have multiple functions during development and cellular differentiation. Ectopic (over-expression of ID1 extends the lifespan of primary human epithelial cells. High expression levels of ID1 have been detected in multiple human malignancies, and in some have been correlated with unfavorable clinical prognosis. ID1 protein is localized at the centrosomes and forced (over-expression of ID1 results in errors during centrosome duplication. Results Here we analyzed the steady state expression levels of the four ID-proteins in 18 tumor cell lines and assessed the number of centrosome abnormalities. While expression of ID1, ID2, and ID3 was detected, we failed to detect protein expression of ID4. Expression of ID1 correlated with increased supernumerary centrosomes in most cell lines analyzed. Conclusions This is the first report that shows that not only ectopic expression in tissue culture but endogenous levels of ID1 modulate centrosome numbers. Thus, our findings support the hypothesis that ID1 interferes with centrosome homeostasis, most likely contributing to genomic instability and associated tumor aggressiveness.

  12. Ability of RapID Yeast Plus System to identify 304 clinically significant yeasts within 5 hours.

    OpenAIRE

    Kitch, T T; Jacobs, M R; McGinnis, M R; Appelbaum, P C

    1996-01-01

    The RapID Yeast Plus System (Innovative Diagnostic Systems, Norcross, Ga.) is a qualitative micromethod that uses conventional and chromogenic substrates for the identification of medically important yeasts. The ability of the RapID Yeast Plus system to accurately identify 304 clinical yeast isolates within 5 h was evaluated. The RapID Yeast Plus method correctly identified 286 (94.1%) of strains to the species level without the need for additional tests. A further 12 strains (3.9%) were clas...

  13. body mass (ID 1412), reduction of post-prandial glycaemic responses (ID 1414), and maintenance of a normal blood lipid profile (1421) pursuant to Article 13(1) of Regulation (EC) No 1924/2006

    DEFF Research Database (Denmark)

    Tetens, Inge

    claims in relation to very low calorie diets (VLCDs) and reduction in body weight, reduction in the sense of hunger, reduction in body fat mass while maintaining lean body mass, reduction of post-prandial glycaemic responses, and maintenance of normal blood lipid profile. The scientific substantiation......), very low calorie diet is not sufficiently characterised in relation to: reduction of post-prandial glycaemic responses (ID 1414) and maintenance of normal blood lipid profile (ID 1421), mainly owing to the lack of standardisation of the type of available carbohydrates and of most of the fatty acids...... that formula foods for use in very low calorie diets should contain. The Panel concludes that a cause and effect relationship cannot be established between the consumption of a very low calorie diet and reduction of post-prandial glycaemic responses (ID 1414) and maintenance of normal blood lipid profile (ID...

  14. Satellite range scheduling with the priority constraint: An improved genetic algorithm using a station ID encoding method

    Directory of Open Access Journals (Sweden)

    Li Yuqing

    2015-06-01

    Full Text Available Satellite range scheduling with the priority constraint is one of the most important problems in the field of satellite operation. This paper proposes a station coding based genetic algorithm to solve this problem, which adopts a new chromosome encoding method that arranges tasks according to the ground station ID. The new encoding method contributes to reducing the complexity in conflict checking and resolving, and helps to improve the ability to find optimal resolutions. Three different selection operators are designed to match the new encoding strategy, namely random selection, greedy selection, and roulette selection. To demonstrate the benefits of the improved genetic algorithm, a basic genetic algorithm is designed in which two cross operators are presented, a single-point crossover and a multi-point crossover. For the purpose of algorithm test and analysis, a problem-generating program is designed, which can simulate problems by modeling features encountered in real-world problems. Based on the problem generator, computational results and analysis are made and illustrated for the scheduling of multiple ground stations.

  15. Research on ChromID Vibrio Agar for Detection Effect of Vibrio Cholera%弧菌显色培养基(ChromID Vibrio)对霍乱弧菌检测效果的探讨

    Institute of Scientific and Technical Information of China (English)

    沈飚; 胡兴娟; 汪云泉; 徐君辉

    2010-01-01

    [目的]探讨梅里埃弧菌显色培养基(简称ChromID Vibrio)对霍乱弧菌的检测效果.[方法]通过ChromID Vibrio弧菌显色培养基同硫代硫酸盐-柠檬酸盐-胆盐-蔗糖(简称TCBS)琼脂培养基进行比对,采用阳性菌株直接平板计数、人工污染样品和实际样品检测的方法,对ChromID Vibrio的灵敏性、特异性和检测效果进行了评价.[结果]ChromID Vibrio弧菌显色培养基上霍乱弧菌典型菌落是蓝绿色.阳性菌株直接平板计数及人工污染试验均表明ChromID Vibrio平板的敏感性均比TCBS平板高.对采集的300份实际样品进行检测,都未检出霍乱弧菌.[结论]ChromID Vibrio具有较好的灵敏性、特异性,能提高霍乱弧菌检测效率.

  16. CRED SVP Drifting Buoy Argos_ID 35650 Swain's Atoll, American Samoa, 200202-200211 (NODC Accession 0067474)

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — CRED SVP drifter Argos_ID 35650 was deployed in the region of American Samoa to assess ocean currents and sea surface temperature. SVP drifter data files contain...

  17. CRED SVP Drifting Buoy Argos_ID 35647 Data Tutuila, American Samoa, 200202-200307 (NODC Accession 0067474)

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — CRED SVP drifter Argos_ID 35647 was deployed in the region of American Samoa to assess ocean currents and sea surface temperature. SVP drifter data files contain...

  18. CRED APEX Drifting Buoy Argos_ID 25333 Data in the NW Hawaiian Islands, 200110-200204 (NODC Accession 0049436)

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — CRED APEX drifter Argos_ID 25333 was deployed in the region of NW Hawaiian Islands to assess ocean currents and sea surface temperature. APEX drifter data files...

  19. CRED SVP Drifting Buoy Argos_ID 30147 Data Nihoa, Northwestern Hawaiian Islands, 200209-200501 (NODC Accession 0049436)

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — CRED SVP drifter Argos_ID 30147 was deployed in the region of NW Hawaiian Islands to assess ocean currents and sea surface temperature. SVP drifter data files...

  20. CRED SVP Drifting Buoy Argos_ID 35648 Data Pago Pago, American Samoa, 200203-200204 (NODC Accession 0067474)

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — CRED SVP drifter Argos_ID 35648 was deployed in the region of American Samoa to assess ocean currents and sea surface temperature. SVP drifter data files contain...

  1. CRED SVP Drifting Buoy Argos_ID 30340 Data Kauai Channel, Main Hawaiian Islands, 200210-200409 (NODC Accession 0049436)

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — CRED SVP drifter Argos_ID 30340 was deployed in the region of Main Hawaiian Islands to assess ocean currents and sea surface temperature. SVP drifter data files...

  2. CRED APEX Drifting Buoy Argos_ID 25330 Data Maro Reef, Northwestern Hawaiian Islands, 200109-200201 (NODC Accession 0049436)

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — CRED APEX drifter Argos_ID 25330 was deployed in the region of NW Hawaiian Islands to assess ocean currents and sea surface temperature. APEX drifter data files...

  3. CRED SVP Drifting Buoy Argos_ID 29099 Data, Rota in the Marianas Archipelago, 200309-200402 (NODC Accession 0067473)

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — CRED SVP drifter Argos_ID 29099 was deployed in the region of Marianas Archipelago to assess ocean currents and sea surface temperature. SVP drifter data files...

  4. CRED SVP Drifting Buoy Argos_ID 52299 Data, Arakane in the Marianas Archipelago, 200509-200607 (NODC Accession 0067473)

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — CRED SVP drifter Argos_ID 52299 was deployed in the region of the Marianas Archipelago to assess ocean currents and sea surface temperature. drifter data files...

  5. CRED SVP Drifting Buoy Argos_ID 30225 Data in the Northwestern Hawaiian Islands, 200209-200401 (NODC Accession 0049436)

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — CRED SVP drifter Argos_ID 30225 was deployed in the region of NW Hawaiian Islands to assess ocean currents and sea surface temperature. SVP drifter data files...

  6. CRED SVP Drifting Buoy Argos_ID 29938 Data in the Northwestern Hawaiian Islands, 200209-200312 (NODC Accession 0049436)

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — CRED SVP drifter Argos_ID 29938 was deployed in the region of NW Hawaiian Islands to assess ocean currents and sea surface temperature. SVP drifter data files...

  7. CRED SVP Drifting Buoy Argos_ID 24753 Data in American Samoa, 200307-200407 (NODC Accession 0067474)

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — CRED SVP drifter Argos_ID 24753 was deployed in the region of American Samoa to assess ocean currents and sea surface temperature. SVP drifter data files contain...

  8. CRED SVP Drifting Buoy Argos_ID 44765 Data, Manua in the American Samoa, 200402-200406 (NODC Accession 0067474)

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — CRED SVP drifter Argos_ID 44765 was deployed in the region of American Samoa to assess ocean currents and sea surface temperature. SVP drifter data files contain...

  9. Telomere length is associated with ACE I/D polymorphism in hypertensive patients with left ventricular hypertrophy

    DEFF Research Database (Denmark)

    Fyhrquist, Frej; Eriksson, Anders; Saijonmaa, Outi

    2013-01-01

    and association of telomere length with cardiovascular risk is affected by ACE (I/D) genotype. METHODS: We measured leucocyte telomere length (LTL) by Southern blot and analysed ACE I/D genotypes in 1249 subjects with hypertension and left ventricular hypertrophy (LVH). We examined interactions of ACE I......INTRODUCTION: Short telomeres are often associated with cardiovascular risk factors and age-related diseases, while the angiotensin converting enzyme (ACE) gene insertion/deletion polymorphism (DD, ID, II) has shown such associations less consistently. We hypothesized that telomere length....../D genotype with LTL and cardiovascular risk. RESULTS: Mean LTL in DD or ID genotype was shorter (8.15 and 8.14 kb, respectively), than in II genotype (8.27 kb, p=0.0005). This difference was significant in the younger subjects (55-64 years, p=0.02) but not in the older group (65-80 years, p=0.56 ). In DD...

  10. CRED SVP Drifting Buoy Argos_ID 24666 Data in the American Samoa, 200309-200503 (NODC Accession 0067474)

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — CRED SVP drifter Argos_ID 24666 was deployed in the region of American Samoa to assess ocean currents and sea surface temperature. SVP drifter data files contain...

  11. CRED SVP Drifting Buoy Argos_ID 35646 Data in the American Samoa, 200202-200302 (NODC Accession 0067474)

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — CRED SVP drifter Argos_ID 35646 was deployed in the region of American Samoa to assess ocean currents and sea surface temperature. SVP drifter data files contain...

  12. Frontal Brain Electrical Activity (EEG) and Heart Rate in Response to Affective Infant-Directed (ID) Speech in 9-Month-Old Infants

    Science.gov (United States)

    Santesso, Diane L.; Schmidt, Louis A.; Trainor, Laurel J.

    2007-01-01

    Many studies have shown that infants prefer infant-directed (ID) speech to adult-directed (AD) speech. ID speech functions to aid language learning, obtain and/or maintain an infant's attention, and create emotional communication between the infant and caregiver. We examined psychophysiological responses to ID speech that varied in affective…

  13. 6 CFR 37.71 - Driver's licenses and identification cards issued under section 202(d)(11) of the REAL ID Act.

    Science.gov (United States)

    2010-01-01

    ... HOMELAND SECURITY, OFFICE OF THE SECRETARY REAL ID DRIVER'S LICENSES AND IDENTIFICATION CARDS Driver's Licenses and Identification Cards Issued Under Section 202(d)(11) of the REAL ID Act § 37.71 Driver's licenses and identification cards issued under section 202(d)(11) of the REAL ID Act. (a) Except...

  14. The effect of IDS (immediate dentin sealing) on dentin bond strength under various thermocycling periods

    Science.gov (United States)

    Leesungbok, Richard; Lee, Sang-Min; Park, Su-Jung; Lee, Suk-Won; Lee, Do Yun; Im, Byung-Jin

    2015-01-01

    PURPOSE The purpose of this study was to find out the effect of immediate dentin sealing (IDS) on bond strength of ceramic restoration under various thermocycling periods with DBA (dentin bonding agent system). MATERIALS AND METHODS Fifty freshly extracted human mandibular third molars were divided into 5 groups (1 control and 4 experimental groups) of 10 teeth. We removed enamel layer of sound teeth and embedded them which will proceed to be IDS, using All Bond II. A thermocycling was applied to experimental groups for 1, 2, 7, 14 days respectively and was not applied to control group. IPS Empress II for ceramic was acid-etched with ceramic etchant (9.5% HF) and silane was applied. Each ceramic disc was bonded to specimens with Duo-link, dual curable resin cement by means of light curing for 100 seconds. After the cementation procedures, shear bond strength measurement and SEM analysis of the fractured surface were done. The data were analyzed with a one-way ANOVA and Tukey multiple comparison test (α=.05). RESULTS There were no statistically significant differences between 4 experimental groups and control group, however the mean value started to decrease in group 7d, and group 14d showed the lowest mean bond strength in all groups. Also, group 7d and 14d showed distinct exposed dentin and collapsed hybrid layer was observed in SEM analysis. CONCLUSION In the present study, it can be concluded that ceramic restorations like a laminate veneer restoration should be bonded using resin cement within one week after IDS procedure. PMID:26140174

  15. Association of I/D angiotensin-converting enzyme genotype with erythropoietin stimulation in kidney failure

    Directory of Open Access Journals (Sweden)

    Savin Marina

    2017-01-01

    Full Text Available Angiotensin-converting enzyme (ACE-gene polymorphism is a possible predisposing factor of erythropoietin response under hypoxic conditions. However, it is not completely clear whether the ACE insertion/deletion (I/D genotype has an impact on anemia in patients with permanent kidney failure. A 9-month prospective trial was conducted on 53 patients on hemodialysis aimed at determining the beneficial effect of oral vs intravenous iron in anemia management with recombinant human erythropoietin (rHuEpo, and identifying a possible association of the ACE gene I/D polymorphism with the response to rHuEpo. Patients were randomly allocated to receive 50-100 mg daily of ferrous gluconate orally (N=26 or intravenously every two weeks (N=27, together with rHuEpo-beta (200 IU/kg subcutaneously, to achieve a hemoglobin increase to 105 g/L; subsequently the rHuEpo dose was adjusted at one or two week intervals. In 34 patients who regularly received ACE-inhibitor (ACEi medication, genotyping for ACE-gene I/D polymorphism was performed using PCR, gel analysis and appropriate restriction digestion. After prolonged rHuEpo treatment, 24.5% of patients attained the targeted 9th-month hemoglobin concentration (105 g/L. Of these, 6/26 of patients received elemental iron orally and 7/27 received it intravenously. We observed an association between homozygous DD (deletion of the ACE gene and a remarkable early increase in blood hemoglobin (p=0.028, erythrocyte count (p=0.020 and hematocrit (p=0.043 after reduction of the dose of rHuEpo (F=3.95; p=0.029, irrespective of the iron repletion mode (p=0.960. This is the first report on DD genotype as a linkage marker for the optimization of rHuEpo dose for anemia management in hemodialysis patients.

  16. A thought-provoking demonstration

    Science.gov (United States)

    Cowley, E. Roger; Holton, Brian; Horton, George K.

    1998-01-01

    We present and discuss a physics demonstration, similar to, but distinct from, the ballistic-pendulum demonstration, one that illustrates all three conservation laws of mechanics (for energy, momentum, and angular momentum) simultaneously.

  17. Predictors of difficult intubation defined by the intubation difficulty scale (IDS): predictive value of 7 airway assessment factors

    OpenAIRE

    Seo, Suk-Hwan; Lee, Jeong-Gil; Yu, Soo-Bong; Kim, Doo-Sik; Ryu, Sie-Jeong; Kim, Kyung-Han

    2012-01-01

    Background The intubation difficulty scale (IDS) has been used as a validated difficulty score to define difficult intubation (DI). The purpose of this study is to identify airway assessment factors and total airway score (TAS) for predicting DI defined by the IDS. Methods There were 305 ASA physical status 1-2 patients, aged 19-70 years, who underwent elective surgery with endotracheal intubation. During the pre-anesthetic visit, we evaluated patients by 7 preoperative airway assessment fact...

  18. An Automatic Generation System for Examination ID Cards%考场考证自动生成系统

    Institute of Scientific and Technical Information of China (English)

    杨姝

    2001-01-01

    The paper describes the feature of the automatic generation system for examination ID cards,the strategy of random scheduling and the main algorithm for creating examination ID cards.%论述了考场考证自动生成系统的特点,随机生成考证的策略及考证生成的主要算法.

  19. Muon capture in the front end of the IDS neutrino factory

    CERN Document Server

    Neuffer, D.; Prior, G.; Rogers, C.; Yoshikawa, C.

    2010-01-01

    We discuss the design of the muon capture front end of the neutrino factory International Design Study. In the front end, a proton bunch on a target creates secondary pions that drift into a capture transport channel, decaying into muons. A sequence of rf cavities forms the resulting muon beams into strings of bunches of differing energies, aligns the bunches to (nearly) equal central energies, and initiates ionization cooling. For the International Design Study (IDS), a baseline design must be developed and optimized for an engineering and cost study. The design is affected by limitations on accelerating gradients within magnetic fields. The effects of gradient limitations are explored, and mitigation strategies are presented

  20. Alternative Muon Front-end for the International Design Study (IDS)

    CERN Document Server

    Alekou, A; Martini, M; Prior, G; Rogers, C; Stratakis, D; Yoshikawa, C; Zisman, M

    2010-01-01

    We discuss alternative designs of the muon capture front end of the Neutrino Factory International Design Study (IDS). In the front end, a proton bunch on a target creates secondary pions that drift into a capture channel, decaying into muons. A sequence of RF cavities forms the resulting muon beams into strings of bunches of differing energies, aligns the bunches to (nearly) equal central energies, and initiates ionization cooling. This design is affected by limitations on accelerating gradients within magnetic fields. The effects of gradient limitations are explored, and mitigation strategies are presented

  1. Wicked ID: Conceptual Framework for Considering Instructional Design as a Wicked Problem

    Directory of Open Access Journals (Sweden)

    Katrin Becker

    2007-02-01

    Full Text Available The process of instructional design has parallels in other design disciplines. Software design is one that has experienced intense attention in the last 30 or so years, and many lessons learned there can be applied to ID. Using software design as a springboard, this concept paper seeks to propose a new approach to ID. It suggests that instructional design is almost always a Wicked Problem. The connection is formed between Wicked Problems as first described by Rittel and Webber in 1973, and the models in and processes of instructional design. The areas of social planning, organizational management and software design all posses some accepted and tested approaches to the solution of Wicked Problems. These will be described, and how they can be applied to ID will be explained. Finally, this paper will propose a meta-model for ID and explain how it can be used in the current context. Résumé : Le processus de conception pédagogique a des similitudes avec d’autres disciplines. La conception de logiciels a fait l’objet d’une grande attention dans les trente dernières années et de nombreuses leçons tirées peuvent s’appliquer à la conception pédagogique. En se basant sur la conception de logiciels, cet article cherche à proposer une nouvelle méthode à la conception pédagogique. Il laisse entendre que la conception pédagogique constitue presque toujours un problème épineux. Le lien est formé entre les problèmes épineux tels que décrits par Rittel et Webber en 1973 et les modèles et processus de la conception pédagogique. Les secteurs de l’organisation sociale, de la gestion des organisations et de la conception de logiciels comptent des méthodes acceptées et validées à la résolution de problèmes épineux. Nous les décrirons et expliquerons comment ils peuvent servir à la conception pédagogique. Enfin, l’article proposera un meta-modèle de la conception pédagogique et expliquera comment il peut servir dans le

  2. lipID--a software tool for automated assignment of lipids in mass spectra.

    Science.gov (United States)

    Hübner, Göran; Crone, Catharina; Lindner, Buko

    2009-12-01

    A new software tool called lipID is reported, which supports the identification of glycerophospholipids, glycosphingolipids, fatty acids and small oligosaccharides in mass spectra. The user-extendable software is a Microsoft (MS) Excel Add-In developed using Visual Basic for Applications and is compatible with all Versions of MS Excel since MS Excel 97. It processes singly given mass-to-charge values as well as mass lists considering a number of user-defined options. The software's mode of operation, usage and options are explained and the benefits and limitations of the tool are illustrated by means of three typical analytical examples of lipid analyses.

  3. A Provable Secure ID-Based Explicit Authenticated Key Agreement Protocol Without Random Oracles

    Institute of Scientific and Technical Information of China (English)

    Hai-Bo Tian; Willy Susilo; Yang Ming; Yu-Min Wang

    2008-01-01

    In this paper, we present an identity-based explicit authenticated key agreement protocol that is provably secure without random oracles. The protocol employs a new method to isolate a session key from key confirmation keys so that there is no direct usage of hash functions in the protocol. The protocol is proved secure without random oracles in a variant of Bellare and Rogaway style model, an exception to current proof method in this style model in the ID-based setting. We believe that this key isolation method is novel and can be further studied for constructing more efficient protocols.

  4. KorAP: the new corpus analysis platform at IDS Mannheim

    DEFF Research Database (Denmark)

    Banski, Piotr; Bingel, Joachim; Diewald, Nils

    2013-01-01

    The KorAP project (“Korpusanalyseplattform der nächste Generation”, “Corpus-analysis platform of the next generation”), carried out at the Institut für Deutsche Sprache (IDS) in Mannheim, Germany, has as its goal the development of a modern, state-of-the-art corpus-analysis platform, capable...... of handling very large corpora and opening the perspectives for innovative linguistic research. The platform will facilitate new linguistic findings by making it possible to manage and analyse extremely large amounts of primary data and annotations, while at the same time allowing an undistorted view...

  5. ID1 inhibits USF2 and blocks TGF-beta-induced apoptosis in mesangial cells

    OpenAIRE

    Simoes Sato, Alex Yuri; Antonioli, Eliane; Tambellini, Rodrigo [UNIFESP; Campos, Alexandre Holthausen [UNIFESP

    2011-01-01

    Sato AY, Antonioli E, Tambellini R, Campos AH. ID1 inhibits USF2 and blocks TGF-beta-induced apoptosis in mesangial cells. Am J Physiol Renal Physiol 301: F1260-F1269, 2011. First published September 14, 2011; doi: 10.1152/ajprenal.00128.2011.-Mesangial cells (MC) play an essential role in normal function of the glomerulus. Phenotypic changes in MC lead to the development of glomerular diseases such as diabetic nephropathy and glomerulosclerosis. the late phase of diabetic glomerulopathy is c...

  6. Happening'id ja disain - visioon kunsti ja elu terviklikkusest / Mari Laanemets

    Index Scriptorium Estoniae

    Laanemets, Mari, 1975-

    2010-01-01

    Analüüsitakse kunsti ja disaini vahelist suhet 1970. aastatel esile kerkinud uue kunstikäsitluse ja kunstilise tegevuse ümbermõtestamise kontekstis. Mõlemad pidid lepitama inimest reaalsusega - disain elukeskkonda ülendades, õilistades ja happening'id - elu formaalseid struktuure lõhkudes. Ka almanahhi "Kunst ja Kodu" erilisest positsioonist lääne kaasaegse kunsti ja disaini tuvustamisel (toimetajaks 1973. aastast Andres Tolts) ning rühmitusest SOUP 1969 ja nende ideoloogide - Ando Keskküla, Andres Toltsi ja Leonhard Lapini tegevusest ja mõjust

  7. Long range thermal weapon sights for the German future infantryman program IdZ

    Science.gov (United States)

    Breiter, Rainer; Ihle, Tobias; Mauk, Karl-Heinz; Münzberg, Mario; Rode, Werner

    2007-04-01

    In December 2004 AIM started the series production of the HuntIR long range thermal weapon sight. The sight is fielded in the Germany Future Infantryman (IdZ) basic system and since that time in continuous service in various out of area missions with German participation. For very long identification ranges >1500m cooled technology still outperforms uncooled sights, even with respect to smaller size and lower weight because the typical F/1 design of uncooled systems overcompensates cooler weight for focal length >175mm. The HuntIR sight is therefore based on a cooled MWIR detection module for long range battlefield surveillance and target engagement. The device specifically is a perfect match to state of the art small arms like 0.50 cal sniper rifles or crew served weapons like the 40mm high velocity grenade machine gun (GMG) which provide engagement ranges >1500m and need an adequate sight performance beyond that. A recent modification of HuntIR was done to provide a wider field of view for improved situation awareness in urban operations and specifically to allow the engagement of the 40mm GMG in ranges between 250-1200m. The qualification tests of the sight by the German infantry were successfully completed mid 2006. To match the demand of the follow-up program IdZ-ES additional components have to be integrated. Most important are a laser range finder (LRF), 3 axis digital magnetic compass (DMC) and a wireless data link. LRF and DMC together with a highly sophisticated fire control computer provide improved first round hit probability, the DMC additionally improves the fire control in any case of steep trajectories or for pronounced ballistic trajectories to avoid any need to precisely level the GMG. This new sight is done under the brand name RangIR. An important additional feature is the interface for air burst ammunition (ABM). The optical distance is measured by the LRF, the fire control computer accurately evaluates the trajectory under the given angle

  8. The 2-ID-B intermediate-energy scanning X-ray microscope at the APS

    Energy Technology Data Exchange (ETDEWEB)

    McNulty, I.; Paterson, D.; Arko, J.; Erdmann, M.; Goetze, K.; Ilinski, P.; Mooney, T.; Vogt, S.; Xu, S. [Argonne National Lab., IL (United States); Frigo, S.P. [Chicago Univ., IL (United States). Dept. of Physics; Retsch, C.C. [Saint-Gobain Sekurit Deutschland (Germany); Stampfl, A.P.J. [Australian Nuclear Science and Technology Organisation, Div. Physics, Menai, NSW (Australia); Wang, Y. [X-Radia Inc., Concord, CA (United States)

    2002-08-01

    The intermediate-energy scanning x-ray microscope at beamline 2-ID-B at the Advanced Photon Source is a dedicated instrument for materials and biological research. The microscope uses a zone plate lens to focus coherent 1-4 keV x-rays to a 60 nm focal spot of 10{sup 9} photons/s onto the sample. It records simultaneous transmission and energy-resolved fluorescence images. We have used the microscope for nano-tomography of chips and micro-spectroscopy of cells. (authors)

  9. DATABASE SECURITY IN WIRELESS SENSOR NETWORK THROUGH PGP AND ID3*

    Directory of Open Access Journals (Sweden)

    Mandeep Kaur

    2012-06-01

    Full Text Available In the new era of this century, data is sent and receive in electronic form i.e. E-mail. So the risk of data hack and loss is increased. So for the security of data is the main requirement of any organization. This paper propose an idea of using wireless sensor network for the security of database. For this purpose two algorithms are used PGP(Pretty Good Privacy algorithm and ID3(Iterative Dichotomiser 3 algorithm which will help for security as well as speed of data.

  10. Happening'id ja disain - visioon kunsti ja elu terviklikkusest / Mari Laanemets

    Index Scriptorium Estoniae

    Laanemets, Mari, 1975-

    2010-01-01

    Analüüsitakse kunsti ja disaini vahelist suhet 1970. aastatel esile kerkinud uue kunstikäsitluse ja kunstilise tegevuse ümbermõtestamise kontekstis. Mõlemad pidid lepitama inimest reaalsusega - disain elukeskkonda ülendades, õilistades ja happening'id - elu formaalseid struktuure lõhkudes. Ka almanahhi "Kunst ja Kodu" erilisest positsioonist lääne kaasaegse kunsti ja disaini tuvustamisel (toimetajaks 1973. aastast Andres Tolts) ning rühmitusest SOUP 1969 ja nende ideoloogide - Ando Keskküla, Andres Toltsi ja Leonhard Lapini tegevusest ja mõjust

  11. An ID-Based Authenticated Key Agreement Protocol for Peer-to-Peer Computing

    Institute of Scientific and Technical Information of China (English)

    LU Rong-xing; CAO Zhen-fu; SU Ren-wang; CHAI Zhen-chuan

    2006-01-01

    Peer-to-peer computing has recently started to gain significant acceptance, since it can greatly increase the performance and reliability of overall system. However, the security issue is still a major gating factor for its full adoption. In order to guarantee the security of data exchanged between two peers in Peer-to-Peer system, this paper comes up with an ID-based authenticated key agreement from bilinear pairings and uses BAN logic to prove the protocol's security. Compared with other existing protocols, the proposed protocol seems more secure and efficient, since it adopts the static shared Diffie-Hellman key.

  12. Carbohydrate assimilation profiles of Brazilian Candida dubliniensis isolates based on ID 32C system.

    Science.gov (United States)

    Alves, Sydney Hartz; Horta, Jorge A; Milán, Eveline P; Scheid, Liliane A; Vainstein, Marilene H; Santurio, Janio M; Colombo, Arnaldo L

    2005-01-01

    The purpose of the present study was to evaluate the identification of 19 Brazilian C. dubliniensis based on the biochemical profile exhibited when tested by the commercial identification kit ID 32C (bioMerieux). Thirteen of the isolates were rigorously identified as C. dubliniensis and the remaining isolates (six) were considered as having a doubtful profile but the software also suggested that there was 83.6% of chances for them to be C. dubliniensis. As well as pointed by the literature the identification obtained by phenotypic tests should be considered presumptive for C. dubliniensis due to variability of this new species.

  13. Teleoperation for learning by demonstration

    DEFF Research Database (Denmark)

    Kukliński, Kamil; Fischer, Kerstin; Marhenke, Ilka

    2014-01-01

    Learning by demonstration is a useful technique to augment a robot's behavioral inventory, and teleoperation allows lay users to demonstrate novel behaviors intuitively to the robot. In this paper, we compare two modes of teleoperation of an industrial robot, the demonstration by means of a data...... glove and by means of a control object (peg). Experiments with 16 lay users, performing assembly task on the Cranfield benchmark objects, show that the control peg leads to more success, more efficient demonstration and fewer errors....

  14. Teleoperation for learning by demonstration

    DEFF Research Database (Denmark)

    Kukliński, Kamil; Fischer, Kerstin; Marhenke, Ilka;

    2014-01-01

    Learning by demonstration is a useful technique to augment a robot's behavioral inventory, and teleoperation allows lay users to demonstrate novel behaviors intuitively to the robot. In this paper, we compare two modes of teleoperation of an industrial robot, the demonstration by means of a data...... glove and by means of a control object (peg). Experiments with 16 lay users, performing assembly task on the Cranfield benchmark objects, show that the control peg leads to more success, more efficient demonstration and fewer errors....

  15. Wide allelic heterogeneity with predominance of large IDS gene complex rearrangements in a sample of Mexican patients with Hunter syndrome.

    Science.gov (United States)

    Alcántara-Ortigoza, M A; García-de Teresa, B; González-Del Angel, A; Berumen, J; Guardado-Estrada, M; Fernández-Hernández, L; Navarrete-Martínez, J I; Maza-Morales, M; Rius-Domínguez, R

    2016-05-01

    Hunter syndrome or mucopolysaccharidosis type II (MPSII) is caused by pathogenic variants in the IDS gene. This is the first study that examines the mutational spectrum in 25 unrelated Mexican MPSII families. The responsible genotype was identified in 96% of the families (24/25) with 10 novel pathogenic variants: c.133G>C, c.1003C>T, c.1025A>C, c.463_464delinsCCGTATAGCTGG, c.754_767del, c.1132_1133del, c.1463del, c.508-1G>C, c.1006+1G>T and c.(-217_103del). Extensive IDS gene deletions were identified in four patients; using DNA microarray analysis two patients showed the loss of the entire AFF2 gene, and epilepsy developed in only one of them. Wide allelic heterogeneity was noted, with large gene alterations (e.g. IDS/IDSP1 gene inversions, partial to extensive IDS deletions, and one chimeric IDS-IDSP1 allele) that occurred at higher frequencies than previously reported (36% vs 18.9-29%). The frequency of carrier mothers (80%) is consistent with previous descriptions (>70%). Carrier assignment allowed molecular prenatal diagnoses. Notably, somatic and germline mosaicism was identified in one family, and two patients presented thrombocytopenic purpura and pancytopenia after idursulfase enzyme replacement treatment. Our findings suggest a wide allelic heterogeneity in Mexican MPSII patients; DNA microarray analysis contributes to further delineation of the resulting phenotype for IDS and neighboring loci deletions.

  16. Field Demonstration of a Novel Biotreatment Process for Perchlorate Reduction in Groundwater

    Science.gov (United States)

    2010-12-01

    Certification Program FeCO3 siderite FOB freight on board ID inside diameter Mo molybdenum MPN most probably number NaHCO3 sodium bicarbonate...of an organic substrate.  Possibility of treating both perchlorate and possible co-contaminants such as nitrate, chlorinated solvents such as TCE...continuously extracted from a single well, from where it was distributed to the different demonstration projects. The water average contaminant

  17. The Id2+ distal tip lung epithelium contains individual multipotent embryonic progenitor cells.

    Science.gov (United States)

    Rawlins, Emma L; Clark, Cheryl P; Xue, Yan; Hogan, Brigid L M

    2009-11-01

    The conducting airways (bronchi and bronchioles) and peripheral gas exchange (alveolar) regions of the mammalian lung are generated by a process of branching morphogenesis. Evidence suggests that during embryonic development, the undifferentiated epithelial progenitors are located at the distal tips of the branching epithelium. To test this hypothesis, we used an Id2-CreER(T2) knock-in mouse strain to lineage trace the distal epithelial tip cells during either the pseudoglandular or canalicular phases of development. During the pseudoglandular stage, the tip cells both self-renew and contribute descendents to all epithelial cell lineages, including neuroendocrine cells. In addition, individual Id2(+) tip cells can self-renew and contribute descendents to both the bronchiolar and alveolar compartments. By contrast, during the later canalicular stage, the distal epithelial tip cells only contribute descendents to the alveoli. Taken together, this evidence supports a model in which the distal tip of the developing lung contains a multipotent epithelial population, the fate of which changes during development.

  18. A Neighborhood Condition for Fractional ID-[A, B]-Factor-Critical Graphs

    Directory of Open Access Journals (Sweden)

    Zhou Sizhong

    2016-05-01

    Full Text Available Let G be a graph of order n, and let a and b be two integers with 1 ≤ a ≤ b. Let h : E(G → [0, 1] be a function. If a ≤ ∑e∋x h(e ≤ b holds for any x ∈ V (G, then we call G[Fh] a fractional [a, b]-factor of G with indicator function h, where Fh = {e ∈ E(G : h(e > 0}. A graph G is fractional independent-set-deletable [a, b]-factor-critical (in short, fractional ID-[a, b]- factor-critical if G − I has a fractional [a, b]-factor for every independent set I of G. In this paper, it is proved that if for any two nonadjacent vertices x, y ∈ V (G, then G is fractional ID-[a, b]-factor-critical. Furthermore, it is shown that this result is best possible in some sense.

  19. The ego and the id revisited Freud and Damasio on the body ego/self.

    Science.gov (United States)

    Sletvold, Jon

    2013-10-01

    Freud's statement in The Ego and the Id (1923) that the ego is first and foremost a bodily ego is well known. This paper tempts to clarify the premises underlying Freud's thesis. Particular attention is paid to Freud's investigation of internal perceptions. Freud argued that internal perceptions are more primordial than perceptions arising externally. In Freud's opinion the roots of the ego, the id, are to be found in body sensations and feelings, but he had to admit that very little was known about these sensations and feelings. Only much later was neuroscience in a position to offer evidence that feelings can be the direct perception of the internal state of the body. Damasio (2010) has recently suggested that the core of the self might be found in what he, like Freud, terms primordial feelings. Not only was Freud able to conceive of the ego as the perception and feeling of our own body but also to conceive of knowing the mental life of another by means of recreating the bodily state of another through imitation. Copyright © 2013 Institute of Psychoanalysis.

  20. REAL TIME CLASSIFICATION AND CLUSTERING OF IDS ALERTS USING MACHINE LEARNING ALGORITHMS

    Directory of Open Access Journals (Sweden)

    T. Subbulakshmi

    2010-01-01

    Full Text Available Intrusion Detection Systems (IDS monitor a secured network for the evidence of malicious activities originating either inside or outside. Upon identifying a suspicious traffic, IDS generates and logs an alert. Unfortunately, most of the alerts generated are either false positive, i.e. benign traffic that has been classified as intrusions, or irrelevant, i.e. attacks that are not successful. The abundance of false positive alerts makes it difficult for the security analyst to find successful attacks and take remedial action. This paper describes a two phase automatic alert classification system to assist the human analyst in identifying the false positives. In the first phase, the alerts collected from one or more sensors are normalized and similar alerts are grouped to form a meta-alert. These meta-alerts are passively verified with an asset database to find out irrelevant alerts. In addition, an optional alert generalization is also performed for root cause analysis and thereby reduces false positives with human interaction. In the second phase, the reduced alerts are labeled and passed to an alert classifier which uses machine learning techniques for building the classification rules. This helps the analyst in automatic classification of the alerts. The system is tested in real environments and found to be effective in reducing the number of alerts as well as false positives dramatically, and thereby reducing the workload of human analyst.

  1. Practical In-Depth Analysis of IDS Alerts for Tracing and Identifying Potential Attackers on Darknet

    Directory of Open Access Journals (Sweden)

    Jungsuk Song

    2017-02-01

    Full Text Available The darknet (i.e., a set of unused IP addresses is a very useful solution for observing the global trends of cyber threats and analyzing attack activities on the Internet. Since the darknet is not connected with real systems, in most cases, the incoming packets on the darknet (‘the darknet traffic’ do not contain a payload. This means that we are unable to get real malware from the darknet traffic. This situation makes it difficult for security experts (e.g., academic researchers, engineers, operators, etc. to identify whether the source hosts of the darknet traffic are infected by real malware or not. In this paper, we present the overall procedure of the in-depth analysis between the darknet traffic and IDS alerts using real data collected at the Science and Technology Cyber Security Center (S&T CSC in Korea and provide the detailed in-depth analysis results. The ultimate goal of this paper is to provide practical experience, insight and know-how to security experts so that they are able to identify and trace the root cause of the darknet traffic. The experimental results show that correlation analysis between the darknet traffic and IDS alerts is very useful to discover potential attack hosts, especially internal hosts, and to find out what kinds of malware infected them.

  2. Parallel Exploration of Interaction Space by BioID and Affinity Purification Coupled to Mass Spectrometry.

    Science.gov (United States)

    Hesketh, Geoffrey G; Youn, Ji-Young; Samavarchi-Tehrani, Payman; Raught, Brian; Gingras, Anne-Claude

    2017-01-01

    Complete understanding of cellular function requires knowledge of the composition and dynamics of protein interaction networks, the importance of which spans all molecular cell biology fields. Mass spectrometry-based proteomics approaches are instrumental in this process, with affinity purification coupled to mass spectrometry (AP-MS) now widely used for defining interaction landscapes. Traditional AP-MS methods are well suited to providing information regarding the temporal aspects of soluble protein-protein interactions, but the requirement to maintain protein-protein interactions during cell lysis and AP means that both weak-affinity interactions and spatial information is lost. A more recently developed method called BioID employs the expression of bait proteins fused to a nonspecific biotin ligase, BirA*, that induces in vivo biotinylation of proximal proteins. Coupling this method to biotin affinity enrichment and mass spectrometry negates many of the solubility and interaction strength issues inherent in traditional AP-MS methods, and provides unparalleled spatial context for protein interactions. Here we describe the parallel implementation of both BioID and FLAG AP-MS allowing simultaneous exploration of both spatial and temporal aspects of protein interaction networks.

  3. Development of Cutting Condition Monitoring System for ID-blade Saw Slicing Machine

    Institute of Scientific and Technical Information of China (English)

    JIANG Zhongwei; LI Fenlan; KAWASHIMA Kazuo

    2006-01-01

    The purpose of this study is focused on development of an online monitoring system for measuring and evaluating the cutting condition as the ID-blade saw is cutting a silicon ingot. First, the cutting experiments are carried out and the cutting signals during the blade slicing a six-inch ingot are measured by a 3-axes load sensor which is mounted on the top of the ingot. To evaluate the blade condition in slicing, a novel data processing method, combining the discrete Fourier transform(DFT) with the discrete Wavelet transform(DWT), is proposed in this paper for extracting the components due to the rotation of the blade and the cutting impedance. To validate the effect of the method, four ID-blades with three different types of the blade edge are used and discussed. The obtained results show that the component induced from the rotation and the component due to the blade slicing can be extracted efficiently by introduction of the proposed method. Furthermore, a simple online monitoring system,which consists of a 3-axes load sensor or acceleration sensor, DC cuts high-pass filter, and AD converter embedded microcomputer, is designed. The estimated cutting condition information obtained from the proposed monitoring system can be used as a feedback signal to the slicing machine for production of high quality wafer.

  4. A idéia de identidade sob uma perspectiva semiótica

    Directory of Open Access Journals (Sweden)

    Juliane Noack

    2008-11-01

    Full Text Available O tema do artigo é o conceito de identidade. O ponto de partida é a observação de que as idéias de unidade, coerência e continuidade, enquanto constituintes do conceito de identidade, parecem perder o seu poder explicativo atualmente, na assim chamada pós-modernidade. O ideal de um EU uno e total levou a muitos debates e fez perguntar sobre se se deveria abdicar do conceito de identidade. O presente artigo pretende contribuir com esse debate, apresentando algumas reflexões sobre a idéia de identidade desde a perspectiva da Semiótica. Palavras-chave: identidade; semiótica; semiose; identidade como signo Abstract The notion of identity from the standpoint of semiotics - The subject of this article is the concept of identity. The starting point is the observation that the ideas of unity, coherence and continuity, which constitute the concept of identity, appear to be losing their explanatory power in so-called postmodernity. The ideal of a unique and complete "I" has led to heated debate about whether the concept of identity should be abandoned. This article aims to contribute to this debate, offering reflections about the concept of identity from the perspective of Semiotics and about how this perspective can enrich both the concept of identity and identity as such. Keywords: identity; semiotic; semiosis; identity as a sign

  5. Can technology help to reduce underage drinking? Evidence from the false ID laws with scanner provision.

    Science.gov (United States)

    Yörük, Barış K

    2014-07-01

    Underage drinkers often use false identification to purchase alcohol or gain access into bars. In recent years, several states have introduced laws that provide incentives to retailers and bar owners who use electronic scanners to ensure that the customer is 21 years or older and uses a valid identification to purchase alcohol. This paper is the first to investigate the effects of these laws using confidential data from the National Longitudinal Survey of Youth, 1997 Cohort (NLSY97). Using a difference-in-differences methodology, I find that the false ID laws with scanner provision significantly reduce underage drinking, including up to a 0.22 drink decrease in the average number of drinks consumed by underage youth per day. This effect is observed particularly in the short-run and more pronounced for non-college students and those who are relatively younger. These results are also robust under alternative model specifications. The findings of this paper highlight the importance of false ID laws in reducing alcohol consumption among underage youth.

  6. Association of Angiotensin Converting Enzyme Gene I/D Polymorphism With Type 2 Diabetes Mellitus

    Institute of Scientific and Technical Information of China (English)

    MIN YANG; CHANG-CHUN QIU; QUN XU; HONG-DING XIANG

    2006-01-01

    To investigate the association of angiotensin converting enzyme (ACE) gene insertion/deletion (I/D)polymorphism with type 2 diabetes mellitus (T2DM). Methods Two hundred and nine patients with T2DM diagnosed based on the criteria for diabetes mellitus in 1999 by WHO and 221 controls were recruited from general population of Dongcheng District in Beijing. All subjects were genotyped for the I/D polymorphism of ACE gene by PCR-fragment length polymorphism (FLP) assay. Blood pressure, levels of plasma glucose, lipids and serum insulin were determined. Body mass index (BMI),waist-hip ratio (WHR) and homeostasis model assessment-insulin resistance index (HOMA-IR) were calculated. Results The genotype frequencies for ACE genes DD, ID, and Ⅱ were 19.1%, 42.1%, and 38.8% in patients, respectively, and 9.6%,49.4%, and 41.0% in controls, respectively. The ACE DD genotype frequency was significantly higher in patients than in controls (χ2=7.61, P=0.022). Multivariate logistic regression analysis showed that the ACE DD genotype was a risk factor for T2DM, with the OR of 2.35 (95% CI 1.17-4.71) adjusted for age, sex, BMI, WHR, blood pressure, and serum cholesterol levels.Conclusion The ACE DD genotype is associated with the increased susceptibility to type 2 diabetes mellitus.

  7. Confinement margins for ignition and driven operation in Iter Eda ID

    Energy Technology Data Exchange (ETDEWEB)

    Johner, J.

    1995-09-01

    Preliminary calculations for ITER EDA ID have been performed using the 1/2D thermal equilibrium code HELIOS. It is found that: - The maximum ignition margin for ITER ID (29%) is 6% less than for ITER OD (35%) and 5% less than for ITER CDA (34%). - Decreasing the ration {tau}{sup *}{sub He}/{tau}{sub E} from the nominal value 10 to a value of 5 gives a 12% gain in the maximum ignition margin. Increasing the ration from 10 to 15 causes a 22% loss in the margin. Furthermore, ignited equilibria non longer exist for {tau}{sup *}{sub He}/{tau}{sub E} {>=} 17.6. - Operation in driven mode with 50 MW of external power increases the confinement capability by 13%. With 100 MW, the improvement is 24%. - Lowering the fusion power from 1500 to 1000 MW slightly improves the maximum ignition margin (+5%) and allows operation below the Greenwald density limit. - A 10% reduction of the toroidal magnetic field with a correlative diminution of the plasma current for constant safety factor operation, causes a dramatic reduction (-18%) of the maximum ignition margin. - A fraction of neon of 0.68% would completely suppress the ignition margin. Furthermore, ignited equilibria, with the nominal fusion power and {tau}{sup *}{sub He}/{tau}{sub E}, no longer exist when the neon fraction exceeds 0.75%. (Author). 2 refs., 10 figs.

  8. Monetizing a Meme: YouTube, Content ID, and the Harlem Shake

    Directory of Open Access Journals (Sweden)

    Michael Soha

    2016-01-01

    Full Text Available This article analyzes the creation, evolution, and monetization of the Harlem Shake meme on YouTube to explore contemporary implementation of copyright and understanding of authorship in regard to monetization of works with distributed authorship. This article has three main findings: first, we highlight the collection of digital labor that comprises the “Harlem Shake” meme, its rise in popularity, and the subsequent rise in popularity of Baauer, the composer of the song which forms the backbone of the meme; second, we examine how YouTube’s “new bargain” of Content ID, as a departure from the site’s origins creates coercive control mechanisms, shedding new light on the concept of and debate over “digital sharecropping.” Finally, we argue for a “Fair(er use” system by exploring how memes might be understood outside of the contemporary copyright system, rethinking the rights of users engaged in collective production. The article is significant in that it challenges the current distribution of Content ID payments solely to copyright holders in an attempt to rethink a system that acknowledges the creative labor of memetic phenomena and collective authorship.

  9. Optimising operational amplifiers by evolutionary algorithms and gm/Id method

    Science.gov (United States)

    Tlelo-Cuautle, E.; Sanabria-Borbon, A. C.

    2016-10-01

    The evolutionary algorithm called non-dominated sorting genetic algorithm (NSGA-II) is applied herein in the optimisation of operational transconductance amplifiers. NSGA-II is accelerated by applying the gm/Id method to estimate reduced search spaces associated to widths (W) and lengths (L) of the metal-oxide-semiconductor field-effect-transistor (MOSFETs), and to guarantee their appropriate bias levels conditions. In addition, we introduce an integer encoding for the W/L sizes of the MOSFETs to avoid a post-processing step for rounding-off their values to be multiples of the integrated circuit fabrication technology. Finally, from the feasible solutions generated by NSGA-II, we introduce a second optimisation stage to guarantee that the final feasible W/L sizes solutions support process, voltage and temperature (PVT) variations. The optimisation results lead us to conclude that the gm/Id method and integer encoding are quite useful to accelerate the convergence of the evolutionary algorithm NSGA-II, while the second optimisation stage guarantees robustness of the feasible solutions to PVT variations.

  10. An interactive version of PropID for the aerodynamic design of horizontal axis wind turbines

    Energy Technology Data Exchange (ETDEWEB)

    Ninham, C.P.; Selig, M.S. [Univ. of Illinois, Urbana-Champaign, IL (United States)

    1997-12-31

    The original PROP code developed by AeroVironment, Inc. and its various versions have been in use for wind turbine performance predictions for over ten years. Due to its simplicity, rapid execution times and relatively accurate predictions, it has become an industry standard in the US. The Europeans have similar blade-element/momentum methods in use for design. Over the years, PROP has continued to be improved (in its accuracy and capability), e.g., PROPSH, PROPPC, PROP93, and PropID. The latter version incorporates a unique inverse design capability that allows the user to specify the desired aerodynamic characteristics from which the corresponding blade geometry is determined. Through this approach, tedious efforts related to manually adjusting the chord, twist, pitch and rpm to achieve desired aerodynamic/performance characteristics can be avoided, thereby making it possible to perform more extensive trade studies in an effort to optimize performance. Past versions of PropID did not have supporting graphics software. The more current version to be discussed includes a Matlab-based graphical user interface (GUI) and additional features that will be discussed in this paper.

  11. Pendekatan Metode Pohon Keputusan Menggunakan Algoritma ID3 Untuk Sistem Informasi Pengukuran Kinerja PNS

    Directory of Open Access Journals (Sweden)

    Julce Adiana Sidette

    2016-01-01

    Full Text Available Decision tree method is a classification method that has been widely used for the solution of problems of classification. Decision tree classification provides a rapid and effective method. The approach has been proven decision tree method can be applied in various fields of life. Capability classification is indicated by the decision tree method is what encourages authors to use decision tree methods approach to measure the performance of civil servants. To build a decision tree induction algorithms used. In this study, the ID3 algorithm method is used to construct a decision tree. Starting with the data collecting training samples and then measuring the entropy and information gain. Information Gain value will be used as the root of a decision tree. And translates it into a decision tree classification rules. The results show that the decision tree method is used to produce classification rules into groups employee performance Good and Bad. The resulting rules are used to measure the performance of employees and classifying employees into two groups above are constructed in an information system. Information system built to assist management in making more objective assessment process.    * Penulis korespondensi: utje_caem@yahoo.com   Keywords: ID3 Algorithm; Decision tree; Employee performance

  12. In situ X-ray data collection and structure phasing of protein crystals at Structural Biology Center 19-ID

    Energy Technology Data Exchange (ETDEWEB)

    Michalska, Karolina; Tan, Kemin; Chang, Changsoo; Li, Hui; Hatzos-Skintges, Catherine; Molitsky, Michael; Alkire, Randy; Joachimiak, Andrzej

    2015-10-15

    A prototype of a 96-well plate scanner forin situdata collection has been developed at the Structural Biology Center (SBC) beamline 19-ID, located at the Advanced Photon Source, USA. The applicability of this instrument for protein crystal diffraction screening and data collection at ambient temperature has been demonstrated. Several different protein crystals, including selenium-labeled, were used for data collection and successful SAD phasing. Without the common procedure of crystal handling and subsequent cryo-cooling for data collection atT= 100 K, crystals in a crystallization buffer show remarkably low mosaicity (<0.1°) until deterioration by radiation damage occurs. Data presented here show that cryo-cooling can cause some unexpected structural changes. Based on the results of this study, the integration of the plate scanner into the 19-ID end-station with automated controls is being prepared. With improvement of hardware and software,in situdata collection will become available for the SBC user program including remote access.

  13. Effects of human endothelial gene polymorphisms on cellular responses to hyperglycaemia: role of NOS3 (Glu298Asp) and ACE (I/D) polymorphisms.

    Science.gov (United States)

    Joshi, Mandar S; Wattanapitayakul, Suvara; Schanbacher, Brandon L; Bauer, John A

    2011-10-01

    The functional relevance of NOS3 and ACE genetic variations to endothelial cell function is largely unstudied. Here we tested the functional relevance of the NOS3 (Glu298Asp) polymorphism and ACE (I/D) polymorphism in endothelial cells in vitro. Our hypothesis was that these genetic polymorphisms alter endothelial cell sensitivity to glucose and 3-nitrotyrosine (3NT). Genotyped HUVECs were incubated with glucose, free 3NT or a combination of these two toxicants. Significant differences in glucose-induced cell death and free 3NT-induced cell death were observed among the NOS3 genotypes. Combined glucose/3NT caused increased toxicity among the NOS3 genotypes. No differences were observed among the ACE genotypes in their responses to glucose/3NT. These data demonstrate that the NOS3 genotype may be an important predictor of, or be mechanistically involved in, endothelial vulnerability, whereas the ACE I/D genotype is apparently less important. Thus this NOS3 genetic variation may play a role in vulnerability to endothelium-dependent diabetic vascular complications.

  14. RETRACTED: Association of the ACE I/D gene polymorphism with sepsis susceptibility and sepsis progression.

    Science.gov (United States)

    Yang, Chun-Hua; Zhou, Tian-Biao

    2015-12-01

    This article has been included in a multiple retraction: Chun-Hua Yang and Tian-Biao Zhou Association of the ACE I/D gene polymorphism with sepsis susceptibility and sepsis progression Journal of Renin-Angiotensin-Aldosterone System 1470320314568521, first published on February 3, 2015 doi: 10.1177/1470320314568521 This article has been retracted at the request of the Editors and the Publisher. After conducting a thorough investigation, SAGE found that the submitting authors of a number of papers published in the Journal of the Renin-Angiotensin Aldosterone System ( JRAAS) (listed below) had supplied fabricated contact details for their nominated reviewers. The Editors accepted these papers based on the reports supplied by the individuals using these fake reviewer email accounts. After concluding that the peer review process was therefore seriously compromised, SAGE and the journal Editors have decided to retract all affected articles. Online First articles (these articles will not be published in an issue) Wenzhuang Tang, Tian-Biao Zhou, and Zongpei Jiang Association of the angiotensinogen M235T gene polymorphism with risk of diabetes mellitus developing into diabetic nephropathy Journal of Renin-Angiotensin-Aldosterone System 1470320314563426, first published on December 18, 2014 doi: 10.1177/1470320314563426 Tian-Biao Zhou, Hong-Yan Li, Zong-Pei Jiang, Jia-Fan Zhou, Miao-Fang Huang, and Zhi-Yang Zhou Role of renin-angiotensin-aldosterone system inhibitors in radiation nephropathy Journal of Renin-Angiotensin-Aldosterone System 1470320314563424, first published on December 18, 2014 doi: 10.1177/1470320314563424 Weiqiang Zhong, Zongpei Jiang, and Tian-Biao Zhou Association between the ACE I/D gene polymorphism and T2DN susceptibility: The risk of T2DM developing into T2DN in the Asian population Journal of Renin-Angiotensin-Aldosterone System 1470320314566019, first published on January 26, 2015 doi: 10.1177/1470320314566019 Tian-Biao Zhou, Xue-Feng Guo, Zongpei

  15. Laser Communications Relay Demonstration Project

    Data.gov (United States)

    National Aeronautics and Space Administration — The Laser Communications Relay Demonstration project will advance optical communications technology, expanding industry’s capability to produce competitive,...

  16. Interaction Between ACE I/D and ACTN3 R557X Polymorphisms in Polish Competitive Swimmers

    Directory of Open Access Journals (Sweden)

    Grenda Agata

    2014-10-01

    Full Text Available We hypothesized that the ACE ID / ACTN3 R577X genotype combination was associated with sprint and endurance performance. Therefore, the purpose of the present study was to determine the interaction between both ACE ID and ACTN3 R577X polymorphisms and sprint and endurance performance in swimmers. Genomic DNA was extracted from oral epithelial cells using GenElute Mammalian Genomic DNA Miniprep Kit (Sigma, Germany. All samples were genotyped using a real-time poly- merase chain reaction. The ACE I/D and the ACTN3 R577X genotype frequencies met Hardy-Weinberg expectations in both swimmers and controls. When the two swimmer groups, long distance swimmers (LDS and short distance swimmers (SDS, were compared with control subjects in a single test, a significant association was found only for the ACE polymorphism, but not for ACTN3. Additionally, four ACE/ACTN3 combined genotypes (ID/RX, ID/XX, II/RX and II/XX were statistically significant for the LDS versus Control comparison, but none for the SDS versus Control comparison. The ACE I/D and the ACTN3 R577X polymorphisms did not show any association with sprint swimming, taken individually or in combination. In spite of numerous previous reports of associations with athletic status or sprint performance in other sports, the ACTN3 R577X polymorphism, in contrast to ACE I/D, was not significantly associated with elite swimming status when considered individually. However, the combined analysis of the two loci suggests that the co-occurrence of the ACE I and ACTN3 X alleles may be beneficial to swimmers who compete in long distance races

  17. Policies Conflict Detection Algorithm Coordinated Defense-oriented of Firewall and IDS/IPS%面向防火墙和IDS/IPS协同防御的策略冲突检测算法

    Institute of Scientific and Technical Information of China (English)

    邱松; 焦健; 张东阳

    2015-01-01

    为应对分布式、复杂的网络攻击威胁,防火墙和IDS(Intrusion Detection System)/IPS(Intrusion Prevention System)协同防御的需求越来越迫切.由于IDS/IPS对入侵判断不确定等问题的存在,当防火墙策略和IDS/IPS策略中的规则对同样数据包执行的动作矛盾时,会产生冲突.冲突会导致允许非法访问或者阻断合法访问.通过研究面向防火墙和IDS/IPS协同防御的策略冲突检测算法.给出了防火墙策略和IDS/IPS策略的语义模型,实现了策略冲突的分类,设计基于OBDD(ordered binary decision diagram,有序决策二叉图)的策略冲突检测算法,在实际场景下验证了算法的正确性和可扩展性,并分析了冲突的分布比例.

  18. A Comprehensive General Chemistry Demonstration

    Science.gov (United States)

    Sweeder, Ryan D.; Jeffery, Kathleen A.

    2013-01-01

    This article describes the use of a comprehensive demonstration suitable for a high school or first-year undergraduate introductory chemistry class. The demonstration involves placing a burning candle in a container adjacent to a beaker containing a basic solution with indicator. After adding a lid, the candle will extinguish and the produced…

  19. Teaching and Demonstrating Classical Conditioning.

    Science.gov (United States)

    Sparrow, John; Fernald, Peter

    1989-01-01

    Discusses classroom demonstrations of classical conditioning and notes tendencies to misrepresent Pavlov's procedures. Describes the design and construction of the conditioner that is used for demonstrating classical conditioning. Relates how students experience conditioning, generalization, extinction, discrimination, and spontaneous recovery.…

  20. A Comprehensive General Chemistry Demonstration

    Science.gov (United States)

    Sweeder, Ryan D.; Jeffery, Kathleen A.

    2013-01-01

    This article describes the use of a comprehensive demonstration suitable for a high school or first-year undergraduate introductory chemistry class. The demonstration involves placing a burning candle in a container adjacent to a beaker containing a basic solution with indicator. After adding a lid, the candle will extinguish and the produced…