WorldWideScience

Sample records for efficient unique signature

  1. Unique proteomic signatures distinguish macrophages and dendritic cells.

    Directory of Open Access Journals (Sweden)

    Lev Becker

    Full Text Available Monocytes differentiate into heterogeneous populations of tissue macrophages and dendritic cells (DCs that regulate inflammation and immunity. Identifying specific populations of myeloid cells in vivo is problematic, however, because only a limited number of proteins have been used to assign cellular phenotype. Using mass spectrometry and bone marrow-derived cells, we provided a global view of the proteomes of M-CSF-derived macrophages, classically and alternatively activated macrophages, and GM-CSF-derived DCs. Remarkably, the expression levels of half the plasma membrane proteins differed significantly in the various populations of cells derived in vitro. Moreover, the membrane proteomes of macrophages and DCs were more distinct than those of classically and alternatively activated macrophages. Hierarchical cluster and dual statistical analyses demonstrated that each cell type exhibited a robust proteomic signature that was unique. To interrogate the phenotype of myeloid cells in vivo, we subjected elicited peritoneal macrophages harvested from wild-type and GM-CSF-deficient mice to mass spectrometric and functional analysis. Unexpectedly, we found that peritoneal macrophages exhibited many features of the DCs generated in vitro. These findings demonstrate that global analysis of the membrane proteome can help define immune cell phenotypes in vivo.

  2. Unique Protein Signature of Circulating Microparticles in Systemic Lupus Erythematosus

    DEFF Research Database (Denmark)

    Østergaard, Ole; Nielsen, Christoffer; Iversen, Line V

    2013-01-01

    To characterize the unique qualities of proteins associated with circulating subcellular material in systemic lupus erythematosus (SLE) patients compared with healthy controls and patients with other chronic autoimmune diseases.......To characterize the unique qualities of proteins associated with circulating subcellular material in systemic lupus erythematosus (SLE) patients compared with healthy controls and patients with other chronic autoimmune diseases....

  3. Biomarkers on Europa: Unique signatures produced by radiolysis?

    Science.gov (United States)

    Carlson, R. W.; Hand, K. P.

    A promising habitat for life is Jupiter's moon Europa, with its likely ocean under a young, active surface. Europa orbits in the heart of Jupiter's powerful magnetosphere and suffers intense energetic particle bombardment, producing both good and bad aspects for astrobiology at Europa. Ionizing radiation can produce oxidants that could support a radiation-driven ecology as proposed by Chyba. On the other hand, biomolecular evidence for oceanic life that may be emplaced on the surface is rapidly altered by radiation, perhaps complicating astrobiological searches for evidence of life. We are studying the radiolytic degradation of molecular biomarkers in ice at Europa temperatures by studying both simple organics and more complex biomolecules, including microorganisms. High energy (1-100 keV) electron irradiation is employed and the products are analyzed using infrared spectroscopy, thermal desorption mass spectroscopy, and laser desorption/ionization mass spectroscopy. Hydrocarbon radiolysis yields carbon dioxide and methane which can escape the system and results in the net loss of carbon. Aliphatic molecules with C=O bonds are formed and thought to be mainly polymethylene oxides. When heated, they polymerize to form brown, high-molecular-weight refractory residues with linear, spherical, and ring- shaped macrostructures, typically many tens of micrometers in size. Laser desorption mass spectra of the residues are not overly complex and are different for each initial species. Radiolysis of microorganisms shows the destruction of amine, amide, methyl, and methylene groups, and production of carbon dioxide, carbon monoxide, nitriles, and isocyanates. Mass spectra of irradiated B. pumilus spores are different and surprisingly less complex than those of unirradiated spores. It is possible that unique, diagnostic biosignatures may exist in mass spectra of irradiated microorganisms.

  4. Unique small RNA signatures uncovered in the tammar wallaby genome

    Directory of Open Access Journals (Sweden)

    Lindsay James

    2012-10-01

    discovered crasiRNAs. These small RNAs are derived largely from centromere-enriched retroelements, including a novel SINE. Conclusions This study encompasses the first analyses of the major classes of small RNAs for the newly completed tammar genome, validates preliminary annotations using deep sequencing and computational approaches, and provides a foundation for future work on tammar-specific as well as conserved, but previously unknown small RNA progenitors and targets identified herein. The characterization of new miRNA target genes and a unique profile for crasiRNAs has allowed for insight into multiple RNA mediated processes in the tammar, including gene regulation, species incompatibilities, centromere and chromosome function.

  5. Unique loss of heterozygosity of murine thymic lymphomas as a candidate of radiation signature

    Energy Technology Data Exchange (ETDEWEB)

    Shimada, Yoshiya; Nishimura, Mayumi; Kakinuma, Shizuko [National Inst. of Radiological Sciences, Chiba (Japan); Wakana, Shigeharu; Okumoto, Masaaki

    1999-06-01

    Signature(s) of prior exposure to carcinogens have immediate application to the identification of environmental risk factors. Such signatures have been sought to aid in developing policies for the protection from risks of environmental carcinogens. Although ionizing radiation is a potent carcinogenic agent, little is known about possible radiation signatures. This is because radiation induces a broad spectrum of DNA lesions. Here we describe a diversity of K-ras mutations and a unique locus with frequent loss of heterozygisity (LOH) on chromosome 11 of radiation induced thymic lymphomas. The latter locus has never been observed to be similarly altered in either ethylnitrosourea-induced or spontaneously developed lymphomas. These results describe, to our knowledge for the first time, a molecular basis for radiation signature. (author)

  6. An Efficient Homomorphic Aggregate Signature Scheme Based on Lattice

    Directory of Open Access Journals (Sweden)

    Zhengjun Jing

    2014-01-01

    Full Text Available Homomorphic aggregate signature (HAS is a linearly homomorphic signature (LHS for multiple users, which can be applied for a variety of purposes, such as multi-source network coding and sensor data aggregation. In order to design an efficient postquantum secure HAS scheme, we borrow the idea of the lattice-based LHS scheme over binary field in the single-user case, and develop it into a new lattice-based HAS scheme in this paper. The security of the proposed scheme is proved by showing a reduction to the single-user case and the signature length remains invariant. Compared with the existing lattice-based homomorphic aggregate signature scheme, our new scheme enjoys shorter signature length and high efficiency.

  7. Unique heavy lepton signature at e+e- linear collider with polarized beams

    International Nuclear Information System (INIS)

    Moortgat-Pick, G.; Osland, P.; Pankov, A.A.; Tsytrinov, A.V.

    2013-03-01

    We explore the effects of neutrino and electron mixing with exotic heavy leptons in the process e + e - →W + W - within E 6 models. We examine the possibility of uniquely distinguishing and identifying such effects of heavy neutral lepton exchange from Z-Z' mixing within the same class of models and also from analogous ones due to competitor models with anomalous trilinear gauge couplings (AGC) that can lead to very similar experimental signatures at the e + e - International Linear Collider (ILC) for √(s)=350, 500 GeV and 1 TeV. Such clear identification of the model is possible by using a certain double polarization asymmetry. The availability of both beams being polarized plays a crucial role in identifying such exotic-lepton admixture. In addition, the sensitivity of the ILC for probing exotic-lepton admixture is substantially enhanced when the polarization of the produced W ± bosons is considered.

  8. Secure Computation, I/O-Efficient Algorithms and Distributed Signatures

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Kölker, Jonas; Toft, Tomas

    2012-01-01

    values of form r, gr for random secret-shared r ∈ ℤq and gr in a group of order q. This costs a constant number of exponentiation per player per value generated, even if less than n/3 players are malicious. This can be used for efficient distributed computing of Schnorr signatures. We further develop...... the technique so we can sign secret data in a distributed fashion at essentially the same cost....

  9. Efficient Fair Exchange from Identity-Based Signature

    Science.gov (United States)

    Yum, Dae Hyun; Lee, Pil Joong

    A fair exchange scheme is a protocol by which two parties Alice and Bob exchange items or services without allowing either party to gain advantages by quitting prematurely or otherwise misbehaving. To this end, modern cryptographic solutions use a semi-trusted arbitrator who involves only in cases where one party attempts to cheat or simply crashes. We call such a fair exchange scheme optimistic. When no registration is required between the signer and the arbitrator, we say that the fair exchange scheme is setup free. To date, the setup-free optimist fair exchange scheme under the standard RSA assumption was only possible from the generic construction of [12], which uses ring signatures. In this paper, we introduce a new setup-free optimistic fair exchange scheme under the standard RSA assumption. Our scheme uses the GQ identity-based signature and is more efficient than [12]. The construction can also be generalized by using various identity-based signature schemes. Our main technique is to allow each user to choose his (or her) own “random” public key in the identitybased signature scheme.

  10. Flexible and efficient genome tiling design with penalized uniqueness score

    Directory of Open Access Journals (Sweden)

    Du Yang

    2012-12-01

    Full Text Available Abstract Background As a powerful tool in whole genome analysis, tiling array has been widely used in the answering of many genomic questions. Now it could also serve as a capture device for the library preparation in the popular high throughput sequencing experiments. Thus, a flexible and efficient tiling array design approach is still needed and could assist in various types and scales of transcriptomic experiment. Results In this paper, we address issues and challenges in designing probes suitable for tiling array applications and targeted sequencing. In particular, we define the penalized uniqueness score, which serves as a controlling criterion to eliminate potential cross-hybridization, and a flexible tiling array design pipeline. Unlike BLAST or simple suffix array based methods, computing and using our uniqueness measurement can be more efficient for large scale design and require less memory. The parameters provided could assist in various types of genomic tiling task. In addition, using both commercial array data and experiment data we show, unlike previously claimed, that palindromic sequence exhibiting relatively lower uniqueness. Conclusions Our proposed penalized uniqueness score could serve as a better indicator for cross hybridization with higher sensitivity and specificity, giving more control of expected array quality. The flexible tiling design algorithm incorporating the penalized uniqueness score was shown to give higher coverage and resolution. The package to calculate the penalized uniqueness score and the described probe selection algorithm are implemented as a Perl program, which is freely available at http://www1.fbn-dummerstorf.de/en/forschung/fbs/fb3/paper/2012-yang-1/OTAD.v1.1.tar.gz.

  11. Unique heavy lepton signature at e{sup +}e{sup -} linear collider with polarized beams

    Energy Technology Data Exchange (ETDEWEB)

    Moortgat-Pick, G. [Hamburg Univ. (Germany). 2. Inst. fuer Theoretische Physik; Deutsches Elektronen-Synchrotron (DESY), Hamburg (Germany); Osland, P. [Univ. Bergen (Norway). Dept. of Physics and Technology; Pankov, A.A.; Tsytrinov, A.V. [Technical Univ. Gomel (Belarus). Abdus Salam ICTP Affliated Centre

    2013-03-15

    We explore the effects of neutrino and electron mixing with exotic heavy leptons in the process e{sup +}e{sup -}{yields}W{sup +}W{sup -} within E{sub 6} models. We examine the possibility of uniquely distinguishing and identifying such effects of heavy neutral lepton exchange from Z-Z' mixing within the same class of models and also from analogous ones due to competitor models with anomalous trilinear gauge couplings (AGC) that can lead to very similar experimental signatures at the e{sup +}e{sup -} International Linear Collider (ILC) for {radical}(s)=350, 500 GeV and 1 TeV. Such clear identification of the model is possible by using a certain double polarization asymmetry. The availability of both beams being polarized plays a crucial role in identifying such exotic-lepton admixture. In addition, the sensitivity of the ILC for probing exotic-lepton admixture is substantially enhanced when the polarization of the produced W{sup {+-}} bosons is considered.

  12. A unique epigenetic signature is associated with active DNA replication loci in human embryonic stem cells.

    Science.gov (United States)

    Li, Bing; Su, Trent; Ferrari, Roberto; Li, Jing-Yu; Kurdistani, Siavash K

    2014-02-01

    The cellular epigenetic landscape changes as pluripotent stem cells differentiate to somatic cells or when differentiated cells transform to a cancerous state. These epigenetic changes are commonly correlated with differences in gene expression. Whether active DNA replication is also associated with distinct chromatin environments in these developmentally and phenotypically diverse cell types has not been known. Here, we used BrdU-seq to map active DNA replication loci in human embryonic stem cells (hESCs), normal primary fibroblasts and a cancer cell line, and correlated these maps to the epigenome. In all cell lines, the majority of BrdU peaks were enriched in euchromatin and at DNA repetitive elements, especially at microsatellite repeats, and coincided with previously determined replication origins. The most prominent BrdU peaks were shared between all cells but a sizable fraction of the peaks were specific to each cell type and associated with cell type-specific genes. Surprisingly, the BrdU peaks that were common to all cell lines were associated with H3K18ac, H3K56ac, and H4K20me1 histone marks only in hESCs but not in normal fibroblasts or cancer cells. Depletion of the histone acetyltransferases for H3K18 and H3K56 dramatically decreased the number and intensity of BrdU peaks in hESCs. Our data reveal a unique epigenetic signature that distinguishes active replication loci in hESCs from normal somatic or malignant cells.

  13. Unique signatures of natural background radiation on human Y chromosomes from Kerala, India.

    Directory of Open Access Journals (Sweden)

    Sanjay Premi

    Full Text Available The most frequently observed major consequences of ionizing radiation are chromosomal lesions and cancers, although the entire genome may be affected. Owing to its haploid status and absence of recombination, the human Y chromosome is an ideal candidate to be assessed for possible genetic alterations induced by ionizing radiation. We studied the human Y chromosome in 390 males from the South Indian state of Kerala, where the level of natural background radiation (NBR is ten-fold higher than the worldwide average, and that from 790 unexposed males as control.We observed random microdeletions in the Azoospermia factor (AZF a, b and c regions in >90%, and tandem duplication and copy number polymorphism (CNP of 11 different Y-linked genes in about 80% of males exposed to NBR. The autosomal homologues of Y-linked CDY genes largely remained unaffected. Multiple polymorphic copies of the Y-linked genes showing single Y-specific signals suggested their tandem duplication. Some exposed males showed unilocus duplication of DAZ genes resulting in six copies. Notably, in the AZFa region, approximately 25% of exposed males showed deletion of the DBY gene, whereas flanking genes USP9Y and UTY remained unaffected. All these alterations were detected in blood samples but not in the germline (sperm samples.Exposure to high levels of NBR correlated with several interstitial polymorphisms of the human Y chromosome. CNPs and enhanced transcription of the SRY gene after duplication are envisaged to compensate for the loss of Y chromosome in some cells. The aforesaid changes, confined to peripheral blood lymphocytes, suggest a possible innate mechanism protecting the germline DNA from the NBR. Genome analysis of a larger population focusing on greater numbers of genes may provide new insights into the mechanisms and risks of the resultant genetic damages. The present work demonstrates unique signatures of NBR on human Y chromosomes from Kerala, India.

  14. Transcriptional profiling of whole blood identifies a unique 5-gene signature for myelofibrosis and imminent myelofibrosis transformation.

    Directory of Open Access Journals (Sweden)

    Hans Carl Hasselbalch

    Full Text Available Identifying a distinct gene signature for myelofibrosis may yield novel information of the genes, which are responsible for progression of essential thrombocythemia and polycythemia vera towards myelofibrosis. We aimed at identifying a simple gene signature - composed of a few genes - which were selectively and highly deregulated in myelofibrosis patients. Gene expression microarray studies have been performed on whole blood from 69 patients with myeloproliferative neoplasms. Amongst the top-20 of the most upregulated genes in PMF compared to controls, we identified 5 genes (DEFA4, ELA2, OLFM4, CTSG, and AZU1, which were highly significantly deregulated in PMF only. None of these genes were significantly regulated in ET and PV patients. However, hierarchical cluster analysis showed that these genes were also highly expressed in a subset of patients with ET (n = 1 and PV (n = 4 transforming towards myelofibrosis and/or being featured by an aggressive phenotype. We have identified a simple 5-gene signature, which is uniquely and highly significantly deregulated in patients in transitional stages of ET and PV towards myelofibrosis and in patients with PMF only. Some of these genes are considered to be responsible for the derangement of bone marrow stroma in myelofibrosis. Accordingly, this gene-signature may reflect key processes in the pathogenesis and pathophysiology of myelofibrosis development.

  15. A Secure and Efficient Certificateless Short Signature Scheme

    Directory of Open Access Journals (Sweden)

    Lin Cheng

    2013-07-01

    Full Text Available Certificateless public key cryptography combines advantage of traditional public key cryptography and identity-based public key cryptography as it avoids usage of certificates and resolves the key escrow problem. In 2007, Huang et al. classified adversaries against certificateless signatures according to their attack power into normal, strong and super adversaries (ordered by their attack power. In this paper, we propose a new certificateless short signature scheme and prove that it is secure against both of the super type I and the super type II adversaries. Our new scheme not only achieves the strongest security level but also has the shortest signature length (one group element. Compared with the other short certificateless signature schemes which have a similar security level, our new scheme has less operation cost.

  16. Unique transcriptome signatures and GM-CSF expression in lymphocytes from patients with spondyloarthritis.

    Science.gov (United States)

    Al-Mossawi, M H; Chen, L; Fang, H; Ridley, A; de Wit, J; Yager, N; Hammitzsch, A; Pulyakhina, I; Fairfax, B P; Simone, D; Yi, Yao; Bandyopadhyay, S; Doig, K; Gundle, R; Kendrick, B; Powrie, F; Knight, J C; Bowness, P

    2017-11-15

    Spondyloarthritis encompasses a group of common inflammatory diseases thought to be driven by IL-17A-secreting type-17 lymphocytes. Here we show increased numbers of GM-CSF-producing CD4 and CD8 lymphocytes in the blood and joints of patients with spondyloarthritis, and increased numbers of IL-17A + GM-CSF + double-producing CD4, CD8, γδ and NK cells. GM-CSF production in CD4 T cells occurs both independently and in combination with classical Th1 and Th17 cytokines. Type 3 innate lymphoid cells producing predominantly GM-CSF are expanded in synovial tissues from patients with spondyloarthritis. GM-CSF + CD4 + cells, isolated using a triple cytokine capture approach, have a specific transcriptional signature. Both GM-CSF + and IL-17A + GM-CSF + double-producing CD4 T cells express increased levels of GPR65, a proton-sensing receptor associated with spondyloarthritis in genome-wide association studies and pathogenicity in murine inflammatory disease models. Silencing GPR65 in primary CD4 T cells reduces GM-CSF production. GM-CSF and GPR65 may thus serve as targets for therapeutic intervention of spondyloarthritis.

  17. Identification of unique expression signatures and therapeutic targets in esophageal squamous cell carcinoma

    Directory of Open Access Journals (Sweden)

    Yan Wusheng

    2012-01-01

    Full Text Available Abstract Background Esophageal squamous cell carcinoma (ESCC, the predominant histological subtype of esophageal cancer, is characterized by high mortality. Previous work identified important mRNA expression differences between normal and tumor cells; however, to date there are limited ex vivo studies examining expression changes occurring during normal esophageal squamous cell differentiation versus those associated with tumorigenesis. In this study, we used a unique tissue microdissection strategy and microarrays to measure gene expression profiles associated with cell differentiation versus tumorigenesis in twelve cases of patient-matched normal basal squamous epithelial cells (NB, normal differentiated squamous epithelium (ND, and squamous cell cancer. Class comparison and pathway analysis were used to compare NB versus tumor in a search for unique therapeutic targets. Results As a first step towards this goal, gene expression profiles and pathways were evaluated. Overall, ND expression patterns were markedly different from NB and tumor; whereas, tumor and NB were more closely related. Tumor showed a general decrease in differentially expressed genes relative to NB as opposed to ND that exhibited the opposite trend. FSH and IgG networks were most highly dysregulated in normal differentiation and tumorigenesis, respectively. DNA repair pathways were generally elevated in NB and tumor relative to ND indicating involvement in both normal and pathological growth. PDGF signaling pathway and 12 individual genes unique to the tumor/NB comparison were identified as therapeutic targets, and 10 associated ESCC gene-drug pairs were identified. We further examined the protein expression level and the distribution patterns of four genes: ODC1, POSTN, ASPA and IGF2BP3. Ultimately, three genes (ODC1, POSTN, ASPA were verified to be dysregulated in the same pattern at both the mRNA and protein levels. Conclusions These data reveal insight into genes and

  18. Unique Signatures of Population III Stars in the Global 21-cm Signal

    Science.gov (United States)

    Mirocha, Jordan; Mebane, Richard H.; Furlanetto, Steven R.; Singal, Krishma; Trinh, Donald

    2018-05-01

    We investigate the effects of Population III stars on the sky-averaged 21-cm background radiation, which traces the collective emission from all sources of ultraviolet and X-ray photons before reionization is complete. While UV photons from Pop III stars can in principle shift the onset of radiative coupling of the 21-cm transition - and potentially reionization - to early times, we find that the remnants of Pop III stars are likely to have a more discernible impact on the 21-cm signal than Pop III stars themselves. The X-rays from such sources preferentially heat the IGM at early times, which elongates the epoch of reheating and results in a more gradual transition from an absorption signal to emission. This gradual heating gives rise to broad, asymmetric wings in the absorption signal, which stand in contrast to the relatively sharp, symmetric signals that arise in models treating Pop II sources only. A stronger signature of Pop III, in which the position of the absorption minimum becomes inconsistent with Pop II-only models, requires extreme star-forming events that may not be physically plausible, lending further credence to predictions of relatively high frequency absorption troughs, νmin ˜ 100 MHz. As a result, though the trough location alone may not be enough to indicate the presence of Pop III, the asymmetric wings should arise even if only a few Pop III stars form in each halo before the transition to Pop II star formation occurs, provided that the Pop III IMF is sufficiently top-heavy and at least some Pop III stars form in binaries.

  19. Phase change events of volatile liquid perfluorocarbon contrast agents produce unique acoustic signatures

    International Nuclear Information System (INIS)

    Sheeran, Paul S; Dayton, Paul A; Matsunaga, Terry O

    2014-01-01

    Phase-change contrast agents (PCCAs) provide a dynamic platform to approach problems in medical ultrasound (US). Upon US-mediated activation, the liquid core vaporizes and expands to produce a gas bubble ideal for US imaging and therapy. In this study, we demonstrate through high-speed video microscopy and US interrogation that PCCAs composed of highly volatile perfluorocarbons (PFCs) exhibit unique acoustic behavior that can be detected and differentiated from standard microbubble contrast agents. Experimental results show that when activated with short pulses PCCAs will over-expand and undergo unforced radial oscillation while settling to a final bubble diameter. The size-dependent oscillation phenomenon generates a unique acoustic signal that can be passively detected in both time and frequency domain using confocal piston transducers with an ‘activate high’ (8 MHz, 2 cycles), ‘listen low’ (1 MHz) scheme. Results show that the magnitude of the acoustic ‘signature’ increases as PFC boiling point decreases. By using a band-limited spectral processing technique, the droplet signals can be isolated from controls and used to build experimental relationships between concentration and vaporization pressure. The techniques shown here may be useful for physical studies as well as development of droplet-specific imaging techniques. (paper)

  20. Transcriptome of interstitial cells of Cajal reveals unique and selective gene signatures.

    Directory of Open Access Journals (Sweden)

    Moon Young Lee

    Full Text Available Transcriptome-scale data can reveal essential clues into understanding the underlying molecular mechanisms behind specific cellular functions and biological processes. Transcriptomics is a continually growing field of research utilized in biomarker discovery. The transcriptomic profile of interstitial cells of Cajal (ICC, which serve as slow-wave electrical pacemakers for gastrointestinal (GI smooth muscle, has yet to be uncovered. Using copGFP-labeled ICC mice and flow cytometry, we isolated ICC populations from the murine small intestine and colon and obtained their transcriptomes. In analyzing the transcriptome, we identified a unique set of ICC-restricted markers including transcription factors, epigenetic enzymes/regulators, growth factors, receptors, protein kinases/phosphatases, and ion channels/transporters. This analysis provides new and unique insights into the cellular and biological functions of ICC in GI physiology. Additionally, we constructed an interactive ICC genome browser (http://med.unr.edu/physio/transcriptome based on the UCSC genome database. To our knowledge, this is the first online resource that provides a comprehensive library of all known genetic transcripts expressed in primary ICC. Our genome browser offers a new perspective into the alternative expression of genes in ICC and provides a valuable reference for future functional studies.

  1. Signature movements lead to efficient search for threatening actions.

    Directory of Open Access Journals (Sweden)

    Jeroen J A van Boxtel

    Full Text Available The ability to find and evade fighting persons in a crowd is potentially life-saving. To investigate how the visual system processes threatening actions, we employed a visual search paradigm with threatening boxer targets among emotionally-neutral walker distractors, and vice versa. We found that a boxer popped out for both intact and scrambled actions, whereas walkers did not. A reverse correlation analysis revealed that observers' responses clustered around the time of the "punch", a signature movement of boxing actions, but not around specific movements of the walker. These findings support the existence of a detector for signature movements in action perception. This detector helps in rapidly detecting aggressive behavior in a crowd, potentially through an expedited (subcortical threat-detection mechanism.

  2. The Unique Molecular Signatures of Contact Dermatitis and Implications for Treatment.

    Science.gov (United States)

    Leonard, Alexandra; Guttman-Yassky, Emma

    2018-05-12

    Irritant contact dermatitis (ICD) and allergic contact dermatitis (ACD) are common skin disorders that are characterized by inflammation, oozing, crusting, and pruritus. Atopic dermatitis (AD) is an inflammatory skin disease characterized by immune and barrier abnormalities and is additionally a risk factor for acquiring ICD and ACD. New work on allergic sensitization to common allergens (e.g., nickel and fragrance) in human skin has shown that different allergens have distinct molecular fingerprinting. For example, nickel promotes strong Th1/Th17 polarization, whereas fragrance allergy causes Th2/Th22 skewing, which is similar to the phenotype of AD. While ACD has previously been considered to be constant across all allergens, largely based on mouse models involving strong sensitizers, these new data suggest that ACD differs mechanistically according to allergen. Further, ACD in the setting of concurrent AD shows a different and attenuated phenotype as compared to healthy individuals with ACD, which influences the way AD patients respond to vaccination and other treatment modalities. As in contact sensitization, skin challenged by food patch testing shows that common food allergens (e.g., peanut and barley) also cause distinct immune polarizations in the skin. Additionally, house dust mite reactions in human skin have been profiled to show unique Th2, Th9, and Th17/22 activation as compared to controls, which are similar to the phenotype of psoriasis and contact responses to nickel. Given this information, ACD patients should be treated based on their unique allergen polarity. Refined understanding of the molecular behavior of contact dermatitis and related diseases translates to improved methods of inducing tolerance in sensitized allergic patients, such as with targeted drug therapy and epicutaneous immunotherapy.

  3. The uniquely high-temperature character of Cullinan diamonds: A signature of the Bushveld mantle plume?

    Science.gov (United States)

    Korolev, N. M.; Kopylova, M.; Bussweiler, Y.; Pearson, D. G.; Gurney, J.; Davidson, J.

    2018-04-01

    The mantle beneath the Cullinan kimberlite (formerly known as "Premier") is a unique occurrence of diamondiferous cratonic mantle where diamonds were generated contemporaneously and shortly following a mantle upwelling that led to the formation of a Large Igneous Province that produced the world's largest igneous intrusion - the 2056 Ma Bushveld Igneous Complex (BIC). We studied 332 diamond inclusions from 202 Cullinan diamonds to investigate mantle thermal effects imposed by the formation of the BIC. The overwhelming majority of diamonds come from three parageneses: (1) lithospheric eclogitic (69%), (2) lithospheric peridotitic (21%), and (3) sublithospheric mafic (9%). The lithospheric eclogitic paragenesis is represented by clinopyroxene, garnet, coesite and kyanite. Main minerals of the lithospheric peridotitic paragenesis are forsterite, enstatite, Cr-pyrope, Cr-augite and spinel; the sublithospheric mafic association includes majorite, CaSiO3 phases and omphacite. Diamond formation conditions were calculated using an Al-in-olivine thermometer, a garnet-clinopyroxene thermometer, as well as majorite and Raman barometers. The Cullinan diamonds may be unique on the global stage in recording a cold geotherm of 40 mW/m2 in cratonic lithosphere that was in contact with underlying convecting mantle at temperatures of 1450-1550 °C. The studied Cullinan diamonds contain a high proportion of inclusions equilibrated at temperatures exceeding the ambient 1327 °C adiabat, i.e. 54% of eclogitic diamonds and 41% of peridotitic diamonds. By contrast, ≤ 1% of peridotitic diamond inclusions globally yield equally high temperatures. We propose that the Cullinan diamond inclusions recorded transient, slow-dissipating thermal perturbations associated with the plume-related formation of the 2 Ga Bushveld igneous province. The presence of inclusions in diamond from the mantle transition zone at 300-650 km supports this view. Cullinan xenoliths indicative of the thermal state of

  4. PREDICTION OF SOLAR FLARES USING UNIQUE SIGNATURES OF MAGNETIC FIELD IMAGES

    Energy Technology Data Exchange (ETDEWEB)

    Raboonik, Abbas; Safari, Hossein; Alipour, Nasibe [Department of Physics, University of Zanjan, P.O. Box 45195-313, Zanjan (Iran, Islamic Republic of); Wheatland, Michael S., E-mail: raboonik@alumni.znu.ac.ir, E-mail: safari@znu.ac.ir [Sydney Institute for Astronomy, School of Physics, The University of Sydney, NSW 2006 (Australia)

    2017-01-01

    Prediction of solar flares is an important task in solar physics. The occurrence of solar flares is highly dependent on the structure and topology of solar magnetic fields. A new method for predicting large (M- and X-class) flares is presented, which uses machine learning methods applied to the Zernike moments (ZM) of magnetograms observed by the Helioseismic and Magnetic Imager on board the Solar Dynamics Observatory for a period of six years from 2010 June 2 to 2016 August 1. Magnetic field images consisting of the radial component of the magnetic field are converted to finite sets of ZMs and fed to the support vector machine classifier. ZMs have the capability to elicit unique features from any 2D image, which may allow more accurate classification. The results indicate whether an arbitrary active region has the potential to produce at least one large flare. We show that the majority of large flares can be predicted within 48 hr before their occurrence, with only 10 false negatives out of 385 flaring active region magnetograms and 21 false positives out of 179 non-flaring active region magnetograms. Our method may provide a useful tool for the prediction of solar flares, which can be employed alongside other forecasting methods.

  5. Efficient Signature Based Malware Detection on Mobile Devices

    Directory of Open Access Journals (Sweden)

    Deepak Venugopal

    2008-01-01

    Full Text Available The threat of malware on mobile devices is gaining attention recently. It is important to provide security solutions to these devices before these threats cause widespread damage. However, mobile devices have severe resource constraints in terms of memory and power. Hence, even though there are well developed techniques for malware detection on the PC domain, it requires considerable effort to adapt these techniques for mobile devices. In this paper, we outline the considerations for malware detection on mobile devices and propose a signature based malware detection method. Specifically, we detail a signature matching algorithm that is well suited for use in mobile device scanning due to its low memory requirements. Additionally, the matching algorithm is shown to have high scanning speed which makes it unobtrusive to users. Our evaluation and comparison study with the well known Clam-AV scanner shows that our solution consumes less than 50% of the memory used by Clam-AV while maintaining a fast scanning rate.

  6. Unique proteomic signature for radiation sensitive patients; a comparative study between normo-sensitive and radiation sensitive breast cancer patients

    Energy Technology Data Exchange (ETDEWEB)

    Skiöld, Sara [Center for Radiation Protection Research, Department of Molecular Biosciences, The Wernner-Gren Institute, Stockholm University, Stockholm (Sweden); Azimzadeh, Omid [Institute of Radiation Biology, German Research Center for Environmental Health, Helmholtz Zentrum München (Germany); Merl-Pham, Juliane [Research Unit Protein Science, German Research Center for Environmental Health, Helmholtz Zentrum München, Neuherberg (Germany); Naslund, Ingemar; Wersall, Peter; Lidbrink, Elisabet [Division of Radiotherapy, Radiumhemmet, Karolinska University Hospital, Stockholm (Sweden); Tapio, Soile [Institute of Radiation Biology, German Research Center for Environmental Health, Helmholtz Zentrum München (Germany); Harms-Ringdahl, Mats [Center for Radiation Protection Research, Department of Molecular Biosciences, The Wernner-Gren Institute, Stockholm University, Stockholm (Sweden); Haghdoost, Siamak, E-mail: Siamak.Haghdoost@su.se [Center for Radiation Protection Research, Department of Molecular Biosciences, The Wernner-Gren Institute, Stockholm University, Stockholm (Sweden)

    2015-06-15

    Highlights: • The unique protein expression profiles were found that separate radiosensitive from normal sensitive breast cancer patients. • The oxidative stress response, coagulation properties and acute phase response suggested to be the hallmarks of radiation sensitivity. - Abstract: Radiation therapy is a cornerstone of modern cancer treatment. Understanding the mechanisms behind normal tissue sensitivity is essential in order to minimize adverse side effects and yet to prevent local cancer reoccurrence. The aim of this study was to identify biomarkers of radiation sensitivity to enable personalized cancer treatment. To investigate the mechanisms behind radiation sensitivity a pilot study was made where eight radiation-sensitive and nine normo-sensitive patients were selected from a cohort of 2914 breast cancer patients, based on acute tissue reactions after radiation therapy. Whole blood was sampled and irradiated in vitro with 0, 1, or 150 mGy followed by 3 h incubation at 37 °C. The leukocytes of the two groups were isolated, pooled and protein expression profiles were investigated using isotope-coded protein labeling method (ICPL). First, leukocytes from the in vitro irradiated whole blood from normo-sensitive and extremely sensitive patients were compared to the non-irradiated controls. To validate this first study a second ICPL analysis comparing only the non-irradiated samples was conducted. Both approaches showed unique proteomic signatures separating the two groups at the basal level and after doses of 1 and 150 mGy. Pathway analyses of both proteomic approaches suggest that oxidative stress response, coagulation properties and acute phase response are hallmarks of radiation sensitivity supporting our previous study on oxidative stress response. This investigation provides unique characteristics of radiation sensitivity essential for individualized radiation therapy.

  7. Unique proteomic signature for radiation sensitive patients; a comparative study between normo-sensitive and radiation sensitive breast cancer patients

    International Nuclear Information System (INIS)

    Skiöld, Sara; Azimzadeh, Omid; Merl-Pham, Juliane; Naslund, Ingemar; Wersall, Peter; Lidbrink, Elisabet; Tapio, Soile; Harms-Ringdahl, Mats; Haghdoost, Siamak

    2015-01-01

    Highlights: • The unique protein expression profiles were found that separate radiosensitive from normal sensitive breast cancer patients. • The oxidative stress response, coagulation properties and acute phase response suggested to be the hallmarks of radiation sensitivity. - Abstract: Radiation therapy is a cornerstone of modern cancer treatment. Understanding the mechanisms behind normal tissue sensitivity is essential in order to minimize adverse side effects and yet to prevent local cancer reoccurrence. The aim of this study was to identify biomarkers of radiation sensitivity to enable personalized cancer treatment. To investigate the mechanisms behind radiation sensitivity a pilot study was made where eight radiation-sensitive and nine normo-sensitive patients were selected from a cohort of 2914 breast cancer patients, based on acute tissue reactions after radiation therapy. Whole blood was sampled and irradiated in vitro with 0, 1, or 150 mGy followed by 3 h incubation at 37 °C. The leukocytes of the two groups were isolated, pooled and protein expression profiles were investigated using isotope-coded protein labeling method (ICPL). First, leukocytes from the in vitro irradiated whole blood from normo-sensitive and extremely sensitive patients were compared to the non-irradiated controls. To validate this first study a second ICPL analysis comparing only the non-irradiated samples was conducted. Both approaches showed unique proteomic signatures separating the two groups at the basal level and after doses of 1 and 150 mGy. Pathway analyses of both proteomic approaches suggest that oxidative stress response, coagulation properties and acute phase response are hallmarks of radiation sensitivity supporting our previous study on oxidative stress response. This investigation provides unique characteristics of radiation sensitivity essential for individualized radiation therapy

  8. Characterization of the non-uniqueness of used nuclear fuel burnup signatures through a Mesh-Adaptive Direct Search

    Energy Technology Data Exchange (ETDEWEB)

    Skutnik, Steven E., E-mail: sskutnik@utk.edu; Davis, David R.

    2016-05-01

    The use of passive gamma and neutron signatures from fission indicators is a common means of estimating used fuel burnup, enrichment, and cooling time. However, while characteristic fission product signatures such as {sup 134}Cs, {sup 137}Cs, {sup 154}Eu, and others are generally reliable estimators for used fuel burnup within the context where the assembly initial enrichment and the discharge time are known, in the absence of initial enrichment and/or cooling time information (such as when applying NDA measurements in a safeguards/verification context), these fission product indicators no longer yield a unique solution for assembly enrichment, burnup, and cooling time after discharge. Through the use of a new Mesh-Adaptive Direct Search (MADS) algorithm, it is possible to directly probe the shape of this “degeneracy space” characteristic of individual nuclides (and combinations thereof), both as a function of constrained parameters (such as the assembly irradiation history) and unconstrained parameters (e.g., the cooling time before measurement and the measurement precision for particular indicator nuclides). In doing so, this affords the identification of potential means of narrowing the uncertainty space of potential assembly enrichment, burnup, and cooling time combinations, thereby bounding estimates of assembly plutonium content. In particular, combinations of gamma-emitting nuclides with distinct half-lives (e.g., {sup 134}Cs with {sup 137}Cs and {sup 154}Eu) in conjunction with gross neutron counting (via {sup 244}Cm) are able to reasonably constrain the degeneracy space of possible solutions to a space small enough to perform useful discrimination and verification of fuel assemblies based on their irradiation history.

  9. N-S crustal shear system in the Bundelkhand massif: A unique crustal evolution signature in the northern Indian peninsula

    Science.gov (United States)

    Singh, S. P.; Bhattacharya, A. R.

    2017-12-01

    The Bundelkhand massif, located in the northern part of the Indian shield, is a poly-deformed and poly-metamorphic terrain. This paper reports a new shear system developed throughout the massif in the form of N-S trending quartz veins that are sometimes quartzo-feldspathic and rarely granitic in composition. The veins are vertical and commonly occur in conjugate sets. This tectono-magmatic event appears to represent the youngest shear system of the massif as it cross-cuts all the earlier shear systems (E-W, NE-SE and NW-SE). Emplacement of this N-S vein system may have taken place due to extensional processes that developed some cracks along which siliceous magma was vertically emplaced. The complete absence of signature of the N-S event from the surrounding sedimentary cover of Vindhyan Supergroup, Bijawar and Gwalior Groups suggests that this shear system is pre-tectonic to the nearly E-W trending passive basins developed at the margins of the Bundelkhand craton. Further, several workers have considered the Bundelkhand massif as a part of the Aravalli craton. However, due to the absence of N-S, as well as the other (i.e., E-W, NW-SE and NW-SE), tectonic fabrics of the Bundelkhand massif in other cratons of the Peninsular India, and vice versa, makes the Bundelkhand block a separate and unique craton of its own and is not part of the Aravalli craton.

  10. Transcriptional Profiling of Whole Blood Identifies a Unique 5-Gene Signature for Myelofibrosis and Imminent Myelofibrosis Transformation

    DEFF Research Database (Denmark)

    Hasselbalch, Hans Carl; Skov, Vibe; Stauffer Larsen, Thomas

    2014-01-01

    Identifying a distinct gene signature for myelofibrosis may yield novel information of the genes, which are responsible for progression of essential thrombocythemia and polycythemia vera towards myelofibrosis. We aimed at identifying a simple gene signature - composed of a few genes - which were...

  11. Efficient Serial and Parallel Algorithms for Selection of Unique Oligos in EST Databases.

    Science.gov (United States)

    Mata-Montero, Manrique; Shalaby, Nabil; Sheppard, Bradley

    2013-01-01

    Obtaining unique oligos from an EST database is a problem of great importance in bioinformatics, particularly in the discovery of new genes and the mapping of the human genome. Many algorithms have been developed to find unique oligos, many of which are much less time consuming than the traditional brute force approach. An algorithm was presented by Zheng et al. (2004) which finds the solution of the unique oligos search problem efficiently. We implement this algorithm as well as several new algorithms based on some theorems included in this paper. We demonstrate how, with these new algorithms, we can obtain unique oligos much faster than with previous ones. We parallelize these new algorithms to further improve the time of finding unique oligos. All algorithms are run on ESTs obtained from a Barley EST database.

  12. An Efficient Code-Based Threshold Ring Signature Scheme with a Leader-Participant Model

    Directory of Open Access Journals (Sweden)

    Guomin Zhou

    2017-01-01

    Full Text Available Digital signature schemes with additional properties have broad applications, such as in protecting the identity of signers allowing a signer to anonymously sign a message in a group of signers (also known as a ring. While these number-theoretic problems are still secure at the time of this research, the situation could change with advances in quantum computing. There is a pressing need to design PKC schemes that are secure against quantum attacks. In this paper, we propose a novel code-based threshold ring signature scheme with a leader-participant model. A leader is appointed, who chooses some shared parameters for other signers to participate in the signing process. This leader-participant model enhances the performance because every participant including the leader could execute the decoding algorithm (as a part of signing process upon receiving the shared parameters from the leader. The time complexity of our scheme is close to Courtois et al.’s (2001 scheme. The latter is often used as a basis to construct other types of code-based signature schemes. Moreover, as a threshold ring signature scheme, our scheme is as efficient as the normal code-based ring signature.

  13. The Interferon-signature of Sjögren’s Syndrome: How Unique Biomarkers Can Identify Underlying Inflammatory and Immunopathological Mechanisms of Specific Diseases

    Directory of Open Access Journals (Sweden)

    Cuong eNguyen

    2013-07-01

    Full Text Available Innate immune responses direct the nature and specificity of downstream adaptive responses in autoimmune diseases. One of the strongest markers of innate immunity is the up-regulated expression of interferon (IFN and IFN-responsive/stimulated genes (IRGs/ISGs. While multiple IRGs are induced during the innate phase of host responses, transcriptome data suggest unique IRG-signatures for different diseases. Sjögren’s syndrome (SjS is characterized by chronic immune attacks against exocrine glands leading to exocrine dysfunction, plus strong up-regulated expressions of IFN IRG transcripts. Genome-wide transcriptome analyses indicate that differentially-expressed IRGs are restricted during disease development and therefore define underlying etiopathological mechanisms. Here we review the innate immune-associated IFN-signature of SjS and show how differential gene expressions of IRG/ISG sets interact molecularly and biologically to identify critical details of SjS etiopathogenesis.

  14. Systematic CpT (ApG) Depletion and CpG Excess Are Unique Genomic Signatures of Large DNA Viruses Infecting Invertebrates

    Science.gov (United States)

    Upadhyay, Mohita; Sharma, Neha; Vivekanandan, Perumal

    2014-01-01

    Differences in the relative abundance of dinucleotides, if any may provide important clues on host-driven evolution of viruses. We studied dinucleotide frequencies of large DNA viruses infecting vertebrates (n = 105; viruses infecting mammals = 99; viruses infecting aves = 6; viruses infecting reptiles = 1) and invertebrates (n = 88; viruses infecting insects = 84; viruses infecting crustaceans = 4). We have identified systematic depletion of CpT(ApG) dinucleotides and over-representation of CpG dinucleotides as the unique genomic signature of large DNA viruses infecting invertebrates. Detailed investigation of this unique genomic signature suggests the existence of invertebrate host-induced pressures specifically targeting CpT(ApG) and CpG dinucleotides. The depletion of CpT dinucleotides among large DNA viruses infecting invertebrates is at least in part, explained by non-canonical DNA methylation by the infected host. Our findings highlight the role of invertebrate host-related factors in shaping virus evolution and they also provide the necessary framework for future studies on evolution, epigenetics and molecular biology of viruses infecting this group of hosts. PMID:25369195

  15. Phylogenetic analysis of canine distemper virus in South America clade 1 reveals unique molecular signatures of the local epidemic.

    Science.gov (United States)

    Fischer, Cristine D B; Gräf, Tiago; Ikuta, Nilo; Lehmann, Fernanda K M; Passos, Daniel T; Makiejczuk, Aline; Silveira, Marcos A T; Fonseca, André S K; Canal, Cláudio W; Lunge, Vagner R

    2016-07-01

    Canine distemper virus (CDV) is a highly contagious pathogen for domestic dogs and several wild carnivore species. In Brazil, natural infection of CDV in dogs is very high due to the large non-vaccinated dog population, a scenario that calls for new studies on the molecular epidemiology. This study investigates the phylodynamics and amino-acid signatures of CDV epidemic in South America by analyzing a large dataset compiled from publicly available sequences and also by collecting new samples from Brazil. A population of 175 dogs with canine distemper (CD) signs was sampled, from which 89 were positive for CDV, generating 42 new CDV sequences. Phylogenetic analysis of the new and publicly available sequences revealed that Brazilian sequences mainly clustered in South America 1 (SA1) clade, which has its origin estimated to the late 1980's. The reconstruction of the demographic history in SA1 clade showed an epidemic expanding until the recent years, doubling in size every nine years. SA1 clade epidemic distinguished from the world CDV epidemic by the emergence of the R580Q strain, a very rare and potentially detrimental substitution in the viral genome. The R580Q substitution was estimated to have happened in one single evolutionary step in the epidemic history in SA1 clade, emerging shortly after introduction to the continent. Moreover, a high prevalence (11.9%) of the Y549H mutation was observed among the domestic dogs sampled here. This finding was associated (p<0.05) with outcome-death and higher frequency in mixed-breed dogs, the later being an indicator of a continuous exchange of CDV strains circulating among wild carnivores and domestic dogs. The results reported here highlight the diversity of the worldwide CDV epidemic and reveal local features that can be valuable for combating the disease. Copyright © 2016 Elsevier B.V. All rights reserved.

  16. Low dose irradiation of thyroid cells reveals a unique transcriptomic and epigenetic signature in RET/PTC-positive cells

    Energy Technology Data Exchange (ETDEWEB)

    Abou-El-Ardat, Khalil, E-mail: kabouela@sckcen.be [Radiobiology Unit, Molecular and Cellular Biology, GKD Building, Studiecentrum voor Kernenergie - Centre d' Etude de l' Energie Nucleaire (SCK-CEN), Boeretang 200, 2400 Mol (Belgium); Department of Molecular Biotechnology, Faculty of Bioscience Engineering, Universiteit Gent, 9000 Ghent (Belgium); Monsieurs, Pieter [Radiobiology Unit, Molecular and Cellular Biology, GKD Building, Studiecentrum voor Kernenergie - Centre d' Etude de l' Energie Nucleaire (SCK-CEN), Boeretang 200, 2400 Mol (Belgium); Anastasov, Natasa; Atkinson, Mike [Department of Radiation Sciences, Helmholtz Zentrum Muenchen, Munich (Germany); Derradji, Hanane [Radiobiology Unit, Molecular and Cellular Biology, GKD Building, Studiecentrum voor Kernenergie - Centre d' Etude de l' Energie Nucleaire (SCK-CEN), Boeretang 200, 2400 Mol (Belgium); De Meyer, Tim [Department of Molecular Biotechnology, Faculty of Bioscience Engineering, Universiteit Gent, 9000 Ghent (Belgium); Department of Applied Mathematics, Biometrics and Process Control, Faculty of Bioscience Engineering, Universiteit Gent, 9000 Ghent (Belgium); Bekaert, Sofie [Clinical Research Center, Faculty for Medicine and Health Sciences, Universiteit Gent, 185 De Pintelaan, 9000 Ghent (Belgium); Van Criekinge, Wim [Department of Molecular Biotechnology, Faculty of Bioscience Engineering, Universiteit Gent, 9000 Ghent (Belgium); and others

    2012-03-01

    The high doses of radiation received in the wake of the Chernobyl incident and the atomic bombing of Hiroshima and Nagasaki have been linked to the increased appearance of thyroid cancer in the children living in the vicinity of the site. However, the data gathered on the effect of low doses of radiation on the thyroid remain limited. We have examined the genome wide transcriptional response of a culture of TPC-1 human cell line of papillary thyroid carcinoma origin with a RET/PTC1 translocation to various doses (0.0625, 0.5, and 4 Gy) of X-rays and compared it to response of thyroids with a RET/PTC3 translocation and against wild-type mouse thyroids irradiated with the same doses using Affymetrix microarrays. We have found considerable overlap at a high dose of 4 Gy in both RET/PTC-positive systems but no common genes at 62.5 mGy. In addition, the response of RET/PTC-positive system at all doses was distinct from the response of wild-type thyroids with both systems signaling down different pathways. Analysis of the response of microRNAs in TPC-1 cells revealed a radiation-responsive signature of microRNAs in addition to dose-responsive microRNAs. Our results point to the fact that a low dose of X-rays seems to have a significant proliferative effect on normal thyroids. This observation should be studied further as opposed to its effect on RET/PTC-positive thyroids which was subtle, anti-proliferative and system-dependent.

  17. Unique molecular signatures as a hallmark of patients with metastatic breast cancer: implications for current treatment paradigms.

    Science.gov (United States)

    Wheler, Jennifer J; Parker, Barbara A; Lee, Jack J; Atkins, Johnique T; Janku, Filip; Tsimberidou, Apostolia M; Zinner, Ralph; Subbiah, Vivek; Fu, Siqing; Schwab, Richard; Moulder, Stacy; Valero, Vicente; Schwaederle, Maria; Yelensky, Roman; Miller, Vincent A; Stephens, M Philip J; Meric-Bernstam, Funda; Kurzrock, Razelle

    2014-05-15

    Our analysis of the tumors of 57 women with metastatic breast cancer with next generation sequencing (NGS) demonstrates that each patient's tumor is unique in its molecular fingerprint. We observed 216 somatic aberrations in 70 different genes, including 131 distinct aberrations. The most common gene alterations (in order of decreasing frequency) included: TP53, PIK3CA, CCND1, MYC, HER2 (ERBB2), MCL1, PTEN, FGFR1, GATA3, NF1, PIK3R1, BRCA2, EGFR, IRS2, CDH1, CDKN2A, FGF19, FGF3 and FGF4. Aberrations included mutations (46%), amplifications (45%), deletions (5%), splices (2%), truncations (1%), fusions (0.5%) and rearrangements (0.5%), with multiple distinct variants within the same gene. Many of these aberrations represent druggable targets, either through direct pathway inhibition or through an associated pathway (via 'crosstalk'). The 'molecular individuality' of these tumors suggests that a customized strategy, using an "N-of-One" model of precision medicine, may represent an optimal approach for the treatment of patients with advanced tumors.

  18. Efficient Calibration of Distributed Catchment Models Using Perceptual Understanding and Hydrologic Signatures

    Science.gov (United States)

    Hutton, C.; Wagener, T.; Freer, J. E.; Duffy, C.; Han, D.

    2015-12-01

    Distributed models offer the potential to resolve catchment systems in more detail, and therefore simulate the hydrological impacts of spatial changes in catchment forcing (e.g. landscape change). Such models may contain a large number of model parameters which are computationally expensive to calibrate. Even when calibration is possible, insufficient data can result in model parameter and structural equifinality. In order to help reduce the space of feasible models and supplement traditional outlet discharge calibration data, semi-quantitative information (e.g. knowledge of relative groundwater levels), may also be used to identify behavioural models when applied to constrain spatially distributed predictions of states and fluxes. The challenge is to combine these different sources of information together to identify a behavioural region of state-space, and efficiently search a large, complex parameter space to identify behavioural parameter sets that produce predictions that fall within this behavioural region. Here we present a methodology to incorporate different sources of data to efficiently calibrate distributed catchment models. Metrics of model performance may be derived from multiple sources of data (e.g. perceptual understanding and measured or regionalised hydrologic signatures). For each metric, an interval or inequality is used to define the behaviour of the catchment system, accounting for data uncertainties. These intervals are then combined to produce a hyper-volume in state space. The state space is then recast as a multi-objective optimisation problem, and the Borg MOEA is applied to first find, and then populate the hyper-volume, thereby identifying acceptable model parameter sets. We apply the methodology to calibrate the PIHM model at Plynlimon, UK by incorporating perceptual and hydrologic data into the calibration problem. Furthermore, we explore how to improve calibration efficiency through search initialisation from shorter model runs.

  19. An Efficient Identity-Based Proxy Blind Signature for Semioffline Services

    Directory of Open Access Journals (Sweden)

    Hongfei Zhu

    2018-01-01

    Full Text Available Fog computing extends the cloud computing to the network edge and allows deploying a new type of semioffline services, which can provide real-time transactions between two entities, while the central cloud server is offline and network edge devices are online. For an e-payment system and e-voting with such feature, proxy blind signature is a cornerstone to protect users’ privacy. However, the signature based on number theorem, such as hard mathematical problems on factoring problem, discrete logarithm problem, and bilinear pairings, cannot defeat quantum computers attack. Meanwhile, these schemes need to depend on complex public key infrastructure. Thus, we construct an identity-based proxy blind signature scheme based on number theorem research unit lattice, which can defeat quantum computers attack and does not need to depend on public key infrastructure. The security of the proposed scheme is dependent on Ring-Small Integer Solution problem over number theorem research unit lattice. The proposed scheme meets the properties of blind signature and proxy signature. Then we compare the proposed scheme with other existing proxy blind signature schemes; the result shows that the proposed scheme outperforms ZM scheme except in proxy signer’s signature size and can be more secure than TA scheme and MMHP scheme.

  20. Rapid Evolutionary Rates and Unique Genomic Signatures Discovered in the First Reference Genome for the Southern Ocean Salp, Salpa thompsoni (Urochordata, Thaliacea).

    Science.gov (United States)

    Jue, Nathaniel K; Batta-Lona, Paola G; Trusiak, Sarah; Obergfell, Craig; Bucklin, Ann; O'Neill, Michael J; O'Neill, Rachel J

    2016-10-30

    A preliminary genome sequence has been assembled for the Southern Ocean salp, Salpa thompsoni (Urochordata, Thaliacea). Despite the ecological importance of this species in Antarctic pelagic food webs and its potential role as an indicator of changing Southern Ocean ecosystems in response to climate change, no genomic resources are available for S. thompsoni or any closely related urochordate species. Using a multiple-platform, multiple-individual approach, we have produced a 318,767,936-bp genome sequence, covering >50% of the estimated 602 Mb (±173 Mb) genome size for S. thompsoni Using a nonredundant set of predicted proteins, >50% (16,823) of sequences showed significant homology to known proteins and ∼38% (12,151) of the total protein predictions were associated with Gene Ontology functional information. We have generated 109,958 SNP variant and 9,782 indel predictions for this species, serving as a resource for future phylogenomic and population genetic studies. Comparing the salp genome to available assemblies for four other urochordates, Botryllus schlosseri, Ciona intestinalis, Ciona savignyi and Oikopleura dioica, we found that S. thompsoni shares the previously estimated rapid rates of evolution for these species. High mutation rates are thus independent of genome size, suggesting that rates of evolution >1.5 times that observed for vertebrates are a broad taxonomic characteristic of urochordates. Tests for positive selection implemented in PAML revealed a small number of genes with sites undergoing rapid evolution, including genes involved in ribosome biogenesis and metabolic and immune process that may be reflective of both adaptation to polar, planktonic environments as well as the complex life history of the salps. Finally, we performed an initial survey of small RNAs, revealing the presence of known, conserved miRNAs, as well as novel miRNA genes; unique piRNAs; and mature miRNA signatures for varying developmental stages. Collectively, these

  1. Azidoimidazolinium Salts: Safe and Efficient Diazo-transfer Reagents and Unique Azido-donors.

    Science.gov (United States)

    Kitamura, Mitsuru

    2017-07-01

    2-Azido-1,3-dimethylimidazolinium chloride (ADMC) and its corresponding hexafluorophosphate (ADMP) were found to be efficient diazo-transfer reagents to various organic compounds. ADMC was prepared by the reaction of 2-chloro-1,3-dimethylimidazolinium chloride (DMC) and sodium azide. ADMP was isolated as a crystal having good thermal stability and low explosibility. ADMC and ADMP reacted with 1,3-dicarbonyl compounds under mild basic conditions to give 2-diazo-1,3-dicarbonyl compounds in high yields, which were easily isolated in virtue of the high water solubility of the by-products. ADMP showed high diazo-transfer ability to primary amines even in the absence of metal salt such as Cu(II). Using this diazotization approach, various alkyl/aryl azides were directly obtained from their corresponding primary amines in high yields. Furthermore, naphthols reacted with ADMC to give the corresponding diazonaphthoquinones in good to high yields. In addition, 2-azido-1,3-dimethylimidazolinium salts were employed as azide-transfer and migratory amidation reagents. © 2017 The Chemical Society of Japan & Wiley-VCH Verlag GmbH & Co. KGaA, Weinheim.

  2. Towards efficient bioethanol production from agricultural and forestry residues: Exploration of unique natural microorganisms in combination with advanced strain engineering.

    Science.gov (United States)

    Zhao, Xinqing; Xiong, Liang; Zhang, Mingming; Bai, Fengwu

    2016-09-01

    Production of fuel ethanol from lignocellulosic feedstocks such as agricultural and forestry residues is receiving increasing attention due to the unsustainable supply of fossil fuels. Three key challenges include high cellulase production cost, toxicity of the cellulosic hydrolysate to microbial strains, and poor ability of fermenting microorganisms to utilize certain fermentable sugars in the hydrolysate. In this article, studies on searching of natural microbial strains for production of unique cellulase for biorefinery of agricultural and forestry wastes, as well as development of strains for improved cellulase production were reviewed. In addition, progress in the construction of yeast strains with improved stress tolerance and the capability to fully utilize xylose and glucose in the cellulosic hydrolysate was also summarized. With the superior microbial strains for high titer cellulase production and efficient utilization of all fermentable sugars in the hydrolysate, economic biofuels production from agricultural residues and forestry wastes can be realized. Copyright © 2016 Elsevier Ltd. All rights reserved.

  3. Radiation signatures

    International Nuclear Information System (INIS)

    McGlynn, S.P.; Varma, M.N.

    1992-01-01

    A new concept for modelling radiation risk is proposed. This concept is based on the proposal that the spectrum of molecular lesions, which we dub ''the radiation signature'', can be used to identify the quality of the causal radiation. If the proposal concerning radiation signatures can be established then, in principle, both prospective and retrospective risk determination can be assessed on an individual basis. A major goal of biophysical modelling is to relate physical events such as ionization, excitation, etc. to the production of radiation carcinogenesis. A description of the physical events is provided by track structure. The track structure is determined by radiation quality, and it can be considered to be the ''physical signature'' of the radiation. Unfortunately, the uniqueness characteristics of this signature are dissipated in biological systems in ∼10 -9 s. Nonetheless, it is our contention that this physical disturbance of the biological system eventuates later, at ∼10 0 s, in molecular lesion spectra which also characterize the causal radiation. (author)

  4. ON THE RADIO POLARIZATION SIGNATURE OF EFFICIENT AND INEFFICIENT PARTICLE ACCELERATION IN SUPERNOVA REMNANT SN 1006

    Energy Technology Data Exchange (ETDEWEB)

    Reynoso, Estela M. [Instituto de Astronomia y Fisica del Espacio (IAFE), C. C. 67, Suc. 28, 1428 Buenos Aires (Argentina); Hughes, John P. [Department of Physics and Astronomy, Rutgers University, Piscataway, NJ 08854-8019 (United States); Moffett, David A., E-mail: ereynoso@iafe.uba.ar, E-mail: jph@physics.rutgers.edu, E-mail: david.moffett@furman.edu [Department of Physics, Furman University, Greenville, SC 29613 (United States)

    2013-04-15

    Radio polarization observations provide essential information on the degree of order and orientation of magnetic fields, which themselves play a key role in the particle acceleration processes that take place in supernova remnants (SNRs). Here we present a radio polarization study of SN 1006, based on combined Very Large Array and Australia Telescope Compact Array observations at 20 cm that resulted in sensitive images with an angular resolution of 10 arcsec. The fractional polarization in the two bright radio and X-ray lobes of the SNR is measured to be 0.17, while in the southeastern sector, where the radio and non-thermal X-ray emission are much weaker, the polarization fraction reaches a value of 0.6 {+-} 0.2, close to the theoretical limit of 0.7. We interpret this result as evidence of a disordered, turbulent magnetic field in the lobes, where particle acceleration is believed to be efficient, and a highly ordered field in the southeast, where the acceleration efficiency has been shown to be very low. Utilizing the frequency coverage of our observations, an average rotation measure of {approx}12 rad m{sup -2} is determined from the combined data set, which is then used to obtain the intrinsic direction of the magnetic field vectors. While the orientation of magnetic field vectors across the SNR shell appear to be radial, a large fraction of the magnetic vectors lie parallel to the Galactic plane. Along the highly polarized southeastern rim, the field is aligned tangent to the shock, and therefore also nearly parallel to the Galactic plane. These results strongly suggest that the ambient field surrounding SN 1006 is aligned with this direction (i.e., from northeast to southwest) and that the bright lobes are due to a polar cap geometry. Our study establishes that the most efficient particle acceleration and generation of magnetic turbulence in SN 1006 is attained for shocks in which the magnetic field direction and shock normal are quasi-parallel, while

  5. ON THE RADIO POLARIZATION SIGNATURE OF EFFICIENT AND INEFFICIENT PARTICLE ACCELERATION IN SUPERNOVA REMNANT SN 1006

    International Nuclear Information System (INIS)

    Reynoso, Estela M.; Hughes, John P.; Moffett, David A.

    2013-01-01

    Radio polarization observations provide essential information on the degree of order and orientation of magnetic fields, which themselves play a key role in the particle acceleration processes that take place in supernova remnants (SNRs). Here we present a radio polarization study of SN 1006, based on combined Very Large Array and Australia Telescope Compact Array observations at 20 cm that resulted in sensitive images with an angular resolution of 10 arcsec. The fractional polarization in the two bright radio and X-ray lobes of the SNR is measured to be 0.17, while in the southeastern sector, where the radio and non-thermal X-ray emission are much weaker, the polarization fraction reaches a value of 0.6 ± 0.2, close to the theoretical limit of 0.7. We interpret this result as evidence of a disordered, turbulent magnetic field in the lobes, where particle acceleration is believed to be efficient, and a highly ordered field in the southeast, where the acceleration efficiency has been shown to be very low. Utilizing the frequency coverage of our observations, an average rotation measure of ∼12 rad m –2 is determined from the combined data set, which is then used to obtain the intrinsic direction of the magnetic field vectors. While the orientation of magnetic field vectors across the SNR shell appear to be radial, a large fraction of the magnetic vectors lie parallel to the Galactic plane. Along the highly polarized southeastern rim, the field is aligned tangent to the shock, and therefore also nearly parallel to the Galactic plane. These results strongly suggest that the ambient field surrounding SN 1006 is aligned with this direction (i.e., from northeast to southwest) and that the bright lobes are due to a polar cap geometry. Our study establishes that the most efficient particle acceleration and generation of magnetic turbulence in SN 1006 is attained for shocks in which the magnetic field direction and shock normal are quasi-parallel, while inefficient

  6. A secure and efficient uniqueness-and-anonymity-preserving remote user authentication scheme for connected health care.

    Science.gov (United States)

    Das, Ashok Kumar; Goswami, Adrijit

    2013-06-01

    Connected health care has several applications including telecare medicine information system, personally controlled health records system, and patient monitoring. In such applications, user authentication can ensure the legality of patients. In user authentication for such applications, only the legal user/patient himself/herself is allowed to access the remote server, and no one can trace him/her according to transmitted data. Chang et al. proposed a uniqueness-and-anonymity-preserving remote user authentication scheme for connected health care (Chang et al., J Med Syst 37:9902, 2013). Their scheme uses the user's personal biometrics along with his/her password with the help of the smart card. The user's biometrics is verified using BioHashing. Their scheme is efficient due to usage of one-way hash function and exclusive-or (XOR) operations. In this paper, we show that though their scheme is very efficient, their scheme has several security weaknesses such as (1) it has design flaws in login and authentication phases, (2) it has design flaws in password change phase, (3) it fails to protect privileged insider attack, (4) it fails to protect the man-in-the middle attack, and (5) it fails to provide proper authentication. In order to remedy these security weaknesses in Chang et al.'s scheme, we propose an improvement of their scheme while retaining the original merit of their scheme. We show that our scheme is efficient as compared to Chang et al.'s scheme. Through the security analysis, we show that our scheme is secure against possible attacks. Further, we simulate our scheme for the formal security verification using the widely-accepted AVISPA (Automated Validation of Internet Security Protocols and Applications) tool to ensure that our scheme is secure against passive and active attacks. In addition, after successful authentication between the user and the server, they establish a secret session key shared between them for future secure communication.

  7. RNA-Sequencing Reveals Unique Transcriptional Signatures of Running and Running-Independent Environmental Enrichment in the Adult Mouse Dentate Gyrus

    Directory of Open Access Journals (Sweden)

    Catherine-Alexandra Grégoire

    2018-04-01

    Full Text Available Environmental enrichment (EE is a powerful stimulus of brain plasticity and is among the most accessible treatment options for brain disease. In rodents, EE is modeled using multi-factorial environments that include running, social interactions, and/or complex surroundings. Here, we show that running and running-independent EE differentially affect the hippocampal dentate gyrus (DG, a brain region critical for learning and memory. Outbred male CD1 mice housed individually with a voluntary running disk showed improved spatial memory in the radial arm maze compared to individually- or socially-housed mice with a locked disk. We therefore used RNA sequencing to perform an unbiased interrogation of DG gene expression in mice exposed to either a voluntary running disk (RUN, a locked disk (LD, or a locked disk plus social enrichment and tunnels [i.e., a running-independent complex environment (CE]. RNA sequencing revealed that RUN and CE mice showed distinct, non-overlapping patterns of transcriptomic changes versus the LD control. Bio-informatics uncovered that the RUN and CE environments modulate separate transcriptional networks, biological processes, cellular compartments and molecular pathways, with RUN preferentially regulating synaptic and growth-related pathways and CE altering extracellular matrix-related functions. Within the RUN group, high-distance runners also showed selective stress pathway alterations that correlated with a drastic decline in overall transcriptional changes, suggesting that excess running causes a stress-induced suppression of running’s genetic effects. Our findings reveal stimulus-dependent transcriptional signatures of EE on the DG, and provide a resource for generating unbiased, data-driven hypotheses for novel mediators of EE-induced cognitive changes.

  8. RNA-Sequencing Reveals Unique Transcriptional Signatures of Running and Running-Independent Environmental Enrichment in the Adult Mouse Dentate Gyrus.

    Science.gov (United States)

    Grégoire, Catherine-Alexandra; Tobin, Stephanie; Goldenstein, Brianna L; Samarut, Éric; Leclerc, Andréanne; Aumont, Anne; Drapeau, Pierre; Fulton, Stephanie; Fernandes, Karl J L

    2018-01-01

    Environmental enrichment (EE) is a powerful stimulus of brain plasticity and is among the most accessible treatment options for brain disease. In rodents, EE is modeled using multi-factorial environments that include running, social interactions, and/or complex surroundings. Here, we show that running and running-independent EE differentially affect the hippocampal dentate gyrus (DG), a brain region critical for learning and memory. Outbred male CD1 mice housed individually with a voluntary running disk showed improved spatial memory in the radial arm maze compared to individually- or socially-housed mice with a locked disk. We therefore used RNA sequencing to perform an unbiased interrogation of DG gene expression in mice exposed to either a voluntary running disk (RUN), a locked disk (LD), or a locked disk plus social enrichment and tunnels [i.e., a running-independent complex environment (CE)]. RNA sequencing revealed that RUN and CE mice showed distinct, non-overlapping patterns of transcriptomic changes versus the LD control. Bio-informatics uncovered that the RUN and CE environments modulate separate transcriptional networks, biological processes, cellular compartments and molecular pathways, with RUN preferentially regulating synaptic and growth-related pathways and CE altering extracellular matrix-related functions. Within the RUN group, high-distance runners also showed selective stress pathway alterations that correlated with a drastic decline in overall transcriptional changes, suggesting that excess running causes a stress-induced suppression of running's genetic effects. Our findings reveal stimulus-dependent transcriptional signatures of EE on the DG, and provide a resource for generating unbiased, data-driven hypotheses for novel mediators of EE-induced cognitive changes.

  9. In-Depth, Label-Free Analysis of the Erythrocyte Cytoplasmic Proteome in Diamond Blackfan Anemia Identifies a Unique Inflammatory Signature.

    Directory of Open Access Journals (Sweden)

    Esther N Pesciotta

    Full Text Available Diamond Blackfan Anemia (DBA is a rare, congenital erythrocyte aplasia that is usually caused by haploinsufficiency of ribosomal proteins due to diverse mutations in one of several ribosomal genes. A striking feature of this disease is that a range of different mutations in ribosomal proteins results in similar disease phenotypes primarily characterized by erythrocyte abnormalities and macrocytic anemia, while most other cell types in the body are minimally affected. Previously, we analyzed the erythrocyte membrane proteomes of several DBA patients and identified several proteins that are not typically associated with this cell type and that suggested inflammatory mechanisms contribute to the pathogenesis of DBA. In this study, we evaluated the erythrocyte cytosolic proteome of DBA patients through in-depth analysis of hemoglobin-depleted erythrocyte cytosols. Simple, reproducible, hemoglobin depletion using nickel columns enabled in-depth analysis of over 1000 cytosolic erythrocyte proteins with only moderate total analysis time per proteome. Label-free quantitation and statistical analysis identified 29 proteins with significantly altered abundance levels in DBA patients compared to matched healthy control donors. Proteins that were significantly increased in DBA erythrocyte cytoplasms included three proteasome subunit beta proteins that make up the immunoproteasome and proteins induced by interferon-γ such as n-myc interactor and interferon-induced 35 kDa protein [NMI and IFI35 respectively]. Pathway analysis confirmed the presence of an inflammatory signature in erythrocytes of DBA patients and predicted key upstream regulators including mitogen activated kinase 1, interferon-γ, tumor suppressor p53, and tumor necrosis factor. These results show that erythrocytes in DBA patients are intrinsically different from those in healthy controls which may be due to an inflammatory response resulting from the inherent molecular defect of ribosomal

  10. BLAST screening of chlamydial genomes to identify signature proteins that are unique for the Chlamydiales, Chlamydiaceae, Chlamydophila and Chlamydia groups of species

    Directory of Open Access Journals (Sweden)

    Gupta Radhey S

    2006-01-01

    Full Text Available Abstract Background Chlamydiae species are of much importance from a clinical viewpoint. Their diversity both in terms of their numbers as well as clinical involvement are presently believed to be significantly underestimated. The obligate intracellular nature of chlamydiae has also limited their genetic and biochemical studies. Thus, it is of importance to develop additional means for their identification and characterization. Results We have carried out analyses of available chlamydiae genomes to identify sets of unique proteins that are either specific for all Chlamydiales genomes, or different Chlamydiaceae family members, or members of the Chlamydia and Chlamydophila genera, or those unique to Protochlamydia amoebophila, but which are not found in any other bacteria. In total, 59 Chlamydiales-specific proteins, 79 Chlamydiaceae-specific proteins, 20 proteins each that are specific for both Chlamydia and Chlamydophila and 445 ORFs that are Protochlamydia-specific were identified. Additionally, 33 cases of possible gene loss or lateral gene transfer were also detected. Conclusion The identified chlamydiae-lineage specific proteins, many of which are highly conserved, provide novel biomarkers that should prove of much value in the diagnosis of these bacteria and in exploration of their prevalence and diversity. These conserved protein sequences (CPSs also provide novel therapeutic targets for drugs that are specific for these bacteria. Lastly, functional studies on these chlamydiae or chlamydiae subgroup-specific proteins should lead to important insights into lineage-specific adaptations with regards to development, infectivity and pathogenicity.

  11. Medroxyprogesterone acetate-treated human, primary endometrial epithelial cells reveal unique gene expression signature linked to innate immunity and HIV-1 susceptibility.

    Science.gov (United States)

    Woods, Matthew W; Zahoor, Muhammad Atif; Dizzell, Sara; Verschoor, Chris P; Kaushic, Charu

    2018-01-01

    Medroxyprogesterone acetate (MPA), a progestin-based hormonal contraceptive designed to mimic progesterone, has been linked to increased human immunodeficiency virus (HIV-1) susceptibility. Genital epithelial cells (GECs) form the mucosal lining of the female genital tract (FGT) and provide the first line of protection against HIV-1. The impact of endogenous sex hormones or MPA on the gene expression profile of GECs has not been comprehensively documented. Using microarray analysis, we characterized the transcriptional profile of primary endometrial epithelial cells grown in physiological levels of E2, P4, and MPA. Each hormone treatment altered the gene expression profile of GECs in a unique manner. Interestingly, although MPA is a progestogen, the gene expression profile induced by it was distinct from P4. MPA increased gene expression of genes related to inflammation and cholesterol synthesis linked to innate immunity and HIV-1 susceptibility. The analysis of gene expression profiles provides insights into the effects of sex hormones and MPA on GECs and allows us to posit possible mechanisms of the MPA-mediated increase in HIV-1 acquisition. © 2017 John Wiley & Sons A/S. Published by John Wiley & Sons Ltd.

  12. Solving for Efficiency or Decision Criteria: When the Non-unique Nature of Solutions Becomes a Benefit

    Science.gov (United States)

    Pierce, S. A.; Ciarleglio, M.; Dulay, M.; Lowry, T. S.; Sharp, J. M.; Barnes, J. W.; Eaton, D. J.; Tidwell, V. C.

    2006-12-01

    Work in the literature for groundwater allocation emphasizes finding a truly optimal solution, often with the drawback of limiting the reported results to either maximizing net benefit in regional scale models or minimizing pumping costs for localized cases. From a policy perspective, limited insight can be gained from these studies because the results are restricted to a single, efficient solution and they neglect non-market values that may influence a management decision. Conversely, economically derived objective functions tend to exhibit a plateau upon nearing the optimal value. This plateau effect, or non-uniqueness, is actually a positive feature in the behavior of groundwater systems because it demonstrates that multiple management strategies, serving numerous community preferences, may be considered while still achieving similar quantitative results. An optimization problem takes the same set of initial conditions and looks for the most efficient solution while a decision problem looks at a situation and asks for a solution that meets certain user-defined criteria. In other words, the election of an alternative course of action using a decision support system will not always result in selection of the most `optimized' alternative. To broaden the analytical toolset available for science and policy interaction, we have developed a groundwater decision support system (GWDSS) that generates a suite of management alternatives by pairing a combinatorial search algorithm with a numerical groundwater model for consideration by decision makers and stakeholders. Subject to constraints as defined by community concerns, the tabu optimization engine systematically creates hypothetical management scenarios running hundreds, and even thousands, of simulations, and then saving the best performing realizations. Results of the search are then evaluated against stakeholder preference sets using ranking methods to aid in identifying a subset of alternatives for final

  13. Signature Balancing

    NARCIS (Netherlands)

    Noordkamp, H.W.; Brink, M. van den

    2006-01-01

    Signatures are an important part of the design of a ship. In an ideal situation, signatures must be as low as possible. However, due to budget constraints it is most unlikely to reach this ideal situation. The arising question is which levels of signatures are optimal given the different scenarios

  14. Signatures de l'invisible

    CERN Multimedia

    CERN Press Office. Geneva

    2000-01-01

    "Signatures of the Invisible" is an unique collaboration between contemporary artists and contemporary physicists which has the potential to help redefine the relationship between science and art. "Signatures of the Invisible" is jointly organised by the London Institute - the world's largest college of art and design and CERN*, the world's leading particle physics laboratory. 12 leading visual artists:

  15. Plutonium uniqueness

    International Nuclear Information System (INIS)

    Silver, G.L.

    1984-01-01

    A standard is suggested against which the putative uniqueness of plutonium may be tested. It is common folklore that plutonium is unique among the chemical elements because its four common oxidation states can coexist in the same solution. Whether this putative uniqueness appears only during transit to equilibrium, or only at equilibrium, or all of the time, is not generally made clear. But while the folklore may contain some truth, it cannot be put to test until some measure of 'uniqueness' is agreed upon so that quantitative comparisons are possible. One way of measuring uniqueness is as the magnitude of the product of the mole fractions of the element at equilibrium. A 'coexistence index' is defined and discussed. (author)

  16. Some Proxy Signature and Designated verifier Signature Schemes over Braid Groups

    OpenAIRE

    Lal, Sunder; Verma, Vandani

    2009-01-01

    Braids groups provide an alternative to number theoretic public cryptography and can be implemented quite efficiently. The paper proposes five signature schemes: Proxy Signature, Designated Verifier, Bi-Designated Verifier, Designated Verifier Proxy Signature And Bi-Designated Verifier Proxy Signature scheme based on braid groups. We also discuss the security aspects of each of the proposed schemes.

  17. Copper(I)-Catalyzed Asymmetric Desymmetrization through Inverse-Electron-Demand aza-Diels-Alder Reaction: Efficient Access to Tetrahydropyridazines Bearing a Unique α-Chiral Silane Moiety.

    Science.gov (United States)

    Wei, Liang; Zhou, Yu; Song, Zhi-Min; Tao, Hai-Yan; Lin, Zhenyang; Wang, Chun-Jiang

    2017-04-11

    An unprecedented copper(I)-catalyzed asymmetric desymmetrization of 5-silylcyclopentadienes with in situ formed azoalkene was realized through an inverse-electron-demand aza-Diels-Alder reaction (IEDDA) pathway, in which 5-silylcyclopentadienes served as efficient enophiles. This new protocol provides a facile access to the biologically important heterocyclic tetrahydropyridazines containing a unique α-chiral silane motif and three adjoining stereogenic centers in generally good yield (up to 92 %) with exclusive regioselectivity, high diastereoselectivity (>20:1 diastereomeric ratio), and excellent enantioselectivity (up to 98 % enantiomeric excess). DFT calculations and control experiments further confirmed the proposed reaction mechanism. © 2017 Wiley-VCH Verlag GmbH & Co. KGaA, Weinheim.

  18. Shape signature based on Ricci flow and optimal mass transportation

    Science.gov (United States)

    Luo, Wei; Su, Zengyu; Zhang, Min; Zeng, Wei; Dai, Junfei; Gu, Xianfeng

    2014-11-01

    A shape signature based on surface Ricci flow and optimal mass transportation is introduced for the purpose of surface comparison. First, the surface is conformally mapped onto plane by Ricci flow, which induces a measure on the planar domain. Second, the unique optimal mass transport map is computed that transports the new measure to the canonical measure on the plane. The map is obtained by a convex optimization process. This optimal transport map encodes all the information of the Riemannian metric on the surface. The shape signature consists of the optimal transport map, together with the mean curvature, which can fully recover the original surface. The discrete theories of surface Ricci flow and optimal mass transportation are explained thoroughly. The algorithms are given in detail. The signature is tested on human facial surfaces with different expressions accquired by structured light 3-D scanner based on phase-shifting method. The experimental results demonstrate the efficiency and efficacy of the method.

  19. Identification of host response signatures of infection.

    Energy Technology Data Exchange (ETDEWEB)

    Branda, Steven S.; Sinha, Anupama; Bent, Zachary

    2013-02-01

    Biological weapons of mass destruction and emerging infectious diseases represent a serious and growing threat to our national security. Effective response to a bioattack or disease outbreak critically depends upon efficient and reliable distinguishing between infected vs healthy individuals, to enable rational use of scarce, invasive, and/or costly countermeasures (diagnostics, therapies, quarantine). Screening based on direct detection of the causative pathogen can be problematic, because culture- and probe-based assays are confounded by unanticipated pathogens (e.g., deeply diverged, engineered), and readily-accessible specimens (e.g., blood) often contain little or no pathogen, particularly at pre-symptomatic stages of disease. Thus, in addition to the pathogen itself, one would like to detect infection-specific host response signatures in the specimen, preferably ones comprised of nucleic acids (NA), which can be recovered and amplified from tiny specimens (e.g., fingerstick draws). Proof-of-concept studies have not been definitive, however, largely due to use of sub-optimal sample preparation and detection technologies. For purposes of pathogen detection, Sandia has developed novel molecular biology methods that enable selective isolation of NA unique to, or shared between, complex samples, followed by identification and quantitation via Second Generation Sequencing (SGS). The central hypothesis of the current study is that variations on this approach will support efficient identification and verification of NA-based host response signatures of infectious disease. To test this hypothesis, we re-engineered Sandia's sophisticated sample preparation pipelines, and developed new SGS data analysis tools and strategies, in order to pioneer use of SGS for identification of host NA correlating with infection. Proof-of-concept studies were carried out using specimens drawn from pathogen-infected non-human primates (NHP). This work provides a strong foundation for

  20. Epstein-Barr virus latent gene sequences as geographical markers of viral origin: unique EBNA3 gene signatures identify Japanese viruses as distinct members of the Asian virus family.

    Science.gov (United States)

    Sawada, Akihisa; Croom-Carter, Deborah; Kondo, Osamu; Yasui, Masahiro; Koyama-Sato, Maho; Inoue, Masami; Kawa, Keisei; Rickinson, Alan B; Tierney, Rosemary J

    2011-05-01

    Polymorphisms in Epstein-Barr virus (EBV) latent genes can identify virus strains from different human populations and individual strains within a population. An Asian EBV signature has been defined almost exclusively from Chinese viruses, with little information from other Asian countries. Here we sequenced polymorphic regions of the EBNA1, 2, 3A, 3B, 3C and LMP1 genes of 31 Japanese strains from control donors and EBV-associated T/NK-cell lymphoproliferative disease (T/NK-LPD) patients. Though identical to Chinese strains in their dominant EBNA1 and LMP1 alleles, Japanese viruses were subtly different at other loci. Thus, while Chinese viruses mainly fall into two families with strongly linked 'Wu' or 'Li' alleles at EBNA2 and EBNA3A/B/C, Japanese viruses all have the consensus Wu EBNA2 allele but fall into two families at EBNA3A/B/C. One family has variant Li-like sequences at EBNA3A and 3B and the consensus Li sequence at EBNA3C; the other family has variant Wu-like sequences at EBNA3A, variants of a low frequency Chinese allele 'Sp' at EBNA3B and a consensus Sp sequence at EBNA3C. Thus, EBNA3A/B/C allelotypes clearly distinguish Japanese from Chinese strains. Interestingly, most Japanese viruses also lack those immune-escape mutations in the HLA-A11 epitope-encoding region of EBNA3B that are so characteristic of viruses from the highly A11-positive Chinese population. Control donor-derived and T/NK-LPD-derived strains were similarly distributed across allelotypes and, by using allelic polymorphisms to track virus strains in patients pre- and post-haematopoietic stem-cell transplant, we show that a single strain can induce both T/NK-LPD and B-cell-lymphoproliferative disease in the same patient.

  1. Ultrasonic signature

    International Nuclear Information System (INIS)

    Borloo, E.; Crutzen, S.

    1974-12-01

    The unique and tamperproof identification technique developed at Ispra is based on ultrasonic Non-Destructive-Techniques. Reading fingerprints with ultrasonic requires high reproducibility of standard apparatus and transducers. The present report gives an exhaustive description of the ultrasonic technique developed for identification purposes. Different applications of the method are described

  2. An efficient, second-generation synthesis of the signature dioxabicyclo[3.2.1]octane core of (+)-sorangicin A and elaboration of the (Z,Z,E)-triene acid system.

    Science.gov (United States)

    Smith, Amos B; Dong, Shuzhi

    2009-03-05

    An efficient, second-generation synthesis of the signature dioxabicyclo[3.2.1]octane core of (+)-sorangicin A (1), in conjunction with an effective, stereocontrolled protocol to arrive at the requisite (Z,Z,E)-triene acid system has been developed. Highlights of the core construction entail a three-component union, a KHMDS-promoted epoxide ring formation-ring opening cascade, a Takai olefination, and a chemoselective Sharpless dihydroxylation. Assembly of the triene acid system was then achieved via Stille cross-coupling with the ethyl ester of (Z,Z)-5-tributylstannyl-2,4-pentadienoic acid, followed by mild hydrolysis preserving the triene configuration.

  3. An Arbitrated Quantum Signature Scheme without Entanglement*

    International Nuclear Information System (INIS)

    Li Hui-Ran; Luo Ming-Xing; Peng Dai-Yuan; Wang Xiao-Jun

    2017-01-01

    Several quantum signature schemes are recently proposed to realize secure signatures of quantum or classical messages. Arbitrated quantum signature as one nontrivial scheme has attracted great interests because of its usefulness and efficiency. Unfortunately, previous schemes cannot against Trojan horse attack and DoS attack and lack of the unforgeability and the non-repudiation. In this paper, we propose an improved arbitrated quantum signature to address these secure issues with the honesty arbitrator. Our scheme takes use of qubit states not entanglements. More importantly, the qubit scheme can achieve the unforgeability and the non-repudiation. Our scheme is also secure for other known quantum attacks . (paper)

  4. High efficiency light harvesting by carotenoids in the LH2 complex from photosynthetic bacteria: unique adaptation to growth under low-light conditions.

    Science.gov (United States)

    Magdaong, Nikki M; LaFountain, Amy M; Greco, Jordan A; Gardiner, Alastair T; Carey, Anne-Marie; Cogdell, Richard J; Gibson, George N; Birge, Robert R; Frank, Harry A

    2014-09-25

    Rhodopin, rhodopinal, and their glucoside derivatives are carotenoids that accumulate in different amounts in the photosynthetic bacterium, Rhodoblastus (Rbl.) acidophilus strain 7050, depending on the intensity of the light under which the organism is grown. The different growth conditions also have a profound effect on the spectra of the bacteriochlorophyll (BChl) pigments that assemble in the major LH2 light-harvesting pigment-protein complex. Under high-light conditions the well-characterized B800-850 LH2 complex is formed and accumulates rhodopin and rhodopin glucoside as the primary carotenoids. Under low-light conditions, a variant LH2, denoted B800-820, is formed, and rhodopinal and rhodopinal glucoside are the most abundant carotenoids. The present investigation compares and contrasts the spectral properties and dynamics of the excited states of rhodopin and rhodopinal in solution. In addition, the systematic differences in pigment composition and structure of the chromophores in the LH2 complexes provide an opportunity to explore the effect of these factors on the rate and efficiency of carotenoid-to-BChl energy transfer. It is found that the enzymatic conversion of rhodopin to rhodopinal by Rbl. acidophilus 7050 grown under low-light conditions results in nearly 100% carotenoid-to-BChl energy transfer efficiency in the LH2 complex. This comparative analysis provides insight into how photosynthetic systems are able to adapt and survive under challenging environmental conditions.

  5. Conifers have a unique small RNA silencing signature

    OpenAIRE

    Dolgosheina, Elena V.; Morin, Ryan D.; Aksay, Gozde; Sahinalp, S. Cenk; Magrini, Vincent; Mardis, Elaine R.; Mattsson, Jim; Unrau, Peter J.

    2008-01-01

    Plants produce small RNAs to negatively regulate genes, viral nucleic acids, and repetitive elements at either the transcriptional or post-transcriptional level in a process that is referred to as RNA silencing. While RNA silencing has been extensively studied across the different phyla of the animal kingdom (e.g., mouse, fly, worm), similar studies in the plant kingdom have focused primarily on angiosperms, thus limiting evolutionary studies of RNA silencing in plants. Here we report on an u...

  6. Conifers have a unique small RNA silencing signature.

    Science.gov (United States)

    Dolgosheina, Elena V; Morin, Ryan D; Aksay, Gozde; Sahinalp, S Cenk; Magrini, Vincent; Mardis, Elaine R; Mattsson, Jim; Unrau, Peter J

    2008-08-01

    Plants produce small RNAs to negatively regulate genes, viral nucleic acids, and repetitive elements at either the transcriptional or post-transcriptional level in a process that is referred to as RNA silencing. While RNA silencing has been extensively studied across the different phyla of the animal kingdom (e.g., mouse, fly, worm), similar studies in the plant kingdom have focused primarily on angiosperms, thus limiting evolutionary studies of RNA silencing in plants. Here we report on an unexpected phylogenetic difference in the size distribution of small RNAs among the vascular plants. By extracting total RNA from freshly growing shoot tissue, we conducted a survey of small RNAs in 24 vascular plant species. We find that conifers, which radiated from the other seed-bearing plants approximately 260 million years ago, fail to produce significant amounts of 24-nucleotide (nt) RNAs that are known to guide DNA methylation and heterochromatin formation in angiosperms. Instead, they synthesize a diverse population of small RNAs that are exactly 21-nt long. This finding was confirmed by high-throughput sequencing of the small RNA sequences from a conifer, Pinus contorta. A conifer EST search revealed the presence of a novel Dicer-like (DCL) family, which may be responsible for the observed change in small RNA expression. No evidence for DCL3, an enzyme that matures 24-nt RNAs in angiosperms, was found. We hypothesize that the diverse class of 21-nt RNAs found in conifers may help to maintain organization of their unusually large genomes.

  7. A high-throughput pipeline for the design of real-time PCR signatures

    Directory of Open Access Journals (Sweden)

    Reifman Jaques

    2010-06-01

    Full Text Available Abstract Background Pathogen diagnostic assays based on polymerase chain reaction (PCR technology provide high sensitivity and specificity. However, the design of these diagnostic assays is computationally intensive, requiring high-throughput methods to identify unique PCR signatures in the presence of an ever increasing availability of sequenced genomes. Results We present the Tool for PCR Signature Identification (TOPSI, a high-performance computing pipeline for the design of PCR-based pathogen diagnostic assays. The TOPSI pipeline efficiently designs PCR signatures common to multiple bacterial genomes by obtaining the shared regions through pairwise alignments between the input genomes. TOPSI successfully designed PCR signatures common to 18 Staphylococcus aureus genomes in less than 14 hours using 98 cores on a high-performance computing system. Conclusions TOPSI is a computationally efficient, fully integrated tool for high-throughput design of PCR signatures common to multiple bacterial genomes. TOPSI is freely available for download at http://www.bhsai.org/downloads/topsi.tar.gz.

  8. Signature-based User Authentication

    OpenAIRE

    Hámorník, Juraj

    2015-01-01

    This work aims on missing handwritten signature authentication in Windows. Result of this work is standalone software that allow users to log into Windows by writing signature. We focus on security of signature authentification and best overall user experience. We implemented signature authentification service that accept signature and return user access token if signature is genuine. Signature authentification is done by comparing given signature to signature patterns by their similarity. Si...

  9. Electronic Signature Policy

    Science.gov (United States)

    Establishes the United States Environmental Protection Agency's approach to adopting electronic signature technology and best practices to ensure electronic signatures applied to official Agency documents are legally valid and enforceable

  10. Lesson 6: Signature Validation

    Science.gov (United States)

    Checklist items 13 through 17 are grouped under the Signature Validation Process, and represent CROMERR requirements that the system must satisfy as part of ensuring that electronic signatures it receives are valid.

  11. Exotic signatures from supersymmetry

    International Nuclear Information System (INIS)

    Hall, L.J.

    1989-08-01

    Minor changes to the standard supersymmetric model, such as soft flavor violation and R parity violation, cause large changes in the signatures. The origin of these changes and the resulting signatures are discussed. 15 refs., 7 figs., 2 tabs

  12. Blinding for unanticipated signatures

    NARCIS (Netherlands)

    D. Chaum (David)

    1987-01-01

    textabstractPreviously known blind signature systems require an amount of computation at least proportional to the number of signature types, and also that the number of such types be fixed in advance. These requirements are not practical in some applications. Here, a new blind signature technique

  13. Fair quantum blind signatures

    International Nuclear Information System (INIS)

    Tian-Yin, Wang; Qiao-Yan, Wen

    2010-01-01

    We present a new fair blind signature scheme based on the fundamental properties of quantum mechanics. In addition, we analyse the security of this scheme, and show that it is not possible to forge valid blind signatures. Moreover, comparisons between this scheme and public key blind signature schemes are also discussed. (general)

  14. Real Traceable Signatures

    Science.gov (United States)

    Chow, Sherman S. M.

    Traceable signature scheme extends a group signature scheme with an enhanced anonymity management mechanism. The group manager can compute a tracing trapdoor which enables anyone to test if a signature is signed by a given misbehaving user, while the only way to do so for group signatures requires revealing the signer of all signatures. Nevertheless, it is not tracing in a strict sense. For all existing schemes, T tracing agents need to recollect all N' signatures ever produced and perform RN' “checks” for R revoked users. This involves a high volume of transfer and computations. Increasing T increases the degree of parallelism for tracing but also the probability of “missing” some signatures in case some of the agents are dishonest.

  15. Magnetic signature surveillance of nuclear fuel

    International Nuclear Information System (INIS)

    Bernatowicz, H.; Schoenig, F.C.

    1981-01-01

    Typical nuclear fuel material contains tramp ferromagnetic particles of random size and distribution. Also, selected amounts of paramagnetic or ferromagnetic material can be added at random or at known positions in the fuel material. The fuel material in its non-magnetic container is scanned along its length by magnetic susceptibility detecting apparatus whereby susceptibility changes along its length are obtained and provide a unique signal waveform of the container of fuel material as a signature thereof. The output signature is stored. At subsequent times in its life the container is again scanned and respective signatures obtained which are compared with the initially obtained signature, any differences indicating alteration or tampering with the fuel material. If the fuel material includes a paramagnetic additive by taking two measurements along the container the effects thereof can be cancelled out. (author)

  16. Blind Quantum Signature with Blind Quantum Computation

    Science.gov (United States)

    Li, Wei; Shi, Ronghua; Guo, Ying

    2017-04-01

    Blind quantum computation allows a client without quantum abilities to interact with a quantum server to perform a unconditional secure computing protocol, while protecting client's privacy. Motivated by confidentiality of blind quantum computation, a blind quantum signature scheme is designed with laconic structure. Different from the traditional signature schemes, the signing and verifying operations are performed through measurement-based quantum computation. Inputs of blind quantum computation are securely controlled with multi-qubit entangled states. The unique signature of the transmitted message is generated by the signer without leaking information in imperfect channels. Whereas, the receiver can verify the validity of the signature using the quantum matching algorithm. The security is guaranteed by entanglement of quantum system for blind quantum computation. It provides a potential practical application for e-commerce in the cloud computing and first-generation quantum computation.

  17. Fast switching and signature of efficient domain wall motion driven by spin-orbit torques in a perpendicular anisotropy magnetic insulator/Pt bilayer

    Science.gov (United States)

    Avci, Can Onur; Rosenberg, Ethan; Baumgartner, Manuel; Beran, Lukáš; Quindeau, Andy; Gambardella, Pietro; Ross, Caroline A.; Beach, Geoffrey S. D.

    2017-08-01

    We report fast and efficient current-induced switching of a perpendicular anisotropy magnetic insulator thulium iron garnet by using spin-orbit torques (SOT) from the Pt overlayer. We first show that, with quasi-DC (10 ms) current pulses, SOT-induced switching can be achieved with an external field as low as 2 Oe, making TmIG an outstanding candidate to realize efficient switching in heterostructures that produce moderate stray fields without requiring an external field. We then demonstrate deterministic switching with fast current pulses (≤20 ns) with an amplitude of ˜1012 A/m2, similar to all-metallic structures. We reveal that, in the presence of an initially nucleated domain, the critical switching current is reduced by up to a factor of five with respect to the fully saturated initial state, implying efficient current-driven domain wall motion in this system. Based on measurements with 2 ns-long pulses, we estimate the domain wall velocity of the order of ˜400 m/s per j = 1012 A/m2.

  18. A novel data mining method to identify assay-specific signatures in functional genomic studies

    Directory of Open Access Journals (Sweden)

    Guidarelli Jack W

    2006-08-01

    Full Text Available Abstract Background: The highly dimensional data produced by functional genomic (FG studies makes it difficult to visualize relationships between gene products and experimental conditions (i.e., assays. Although dimensionality reduction methods such as principal component analysis (PCA have been very useful, their application to identify assay-specific signatures has been limited by the lack of appropriate methodologies. This article proposes a new and powerful PCA-based method for the identification of assay-specific gene signatures in FG studies. Results: The proposed method (PM is unique for several reasons. First, it is the only one, to our knowledge, that uses gene contribution, a product of the loading and expression level, to obtain assay signatures. The PM develops and exploits two types of assay-specific contribution plots, which are new to the application of PCA in the FG area. The first type plots the assay-specific gene contribution against the given order of the genes and reveals variations in distribution between assay-specific gene signatures as well as outliers within assay groups indicating the degree of importance of the most dominant genes. The second type plots the contribution of each gene in ascending or descending order against a constantly increasing index. This type of plots reveals assay-specific gene signatures defined by the inflection points in the curve. In addition, sharp regions within the signature define the genes that contribute the most to the signature. We proposed and used the curvature as an appropriate metric to characterize these sharp regions, thus identifying the subset of genes contributing the most to the signature. Finally, the PM uses the full dataset to determine the final gene signature, thus eliminating the chance of gene exclusion by poor screening in earlier steps. The strengths of the PM are demonstrated using a simulation study, and two studies of real DNA microarray data – a study of

  19. Quantum signature scheme for known quantum messages

    International Nuclear Information System (INIS)

    Kim, Taewan; Lee, Hyang-Sook

    2015-01-01

    When we want to sign a quantum message that we create, we can use arbitrated quantum signature schemes which are possible to sign for not only known quantum messages but also unknown quantum messages. However, since the arbitrated quantum signature schemes need the help of a trusted arbitrator in each verification of the signature, it is known that the schemes are not convenient in practical use. If we consider only known quantum messages such as the above situation, there can exist a quantum signature scheme with more efficient structure. In this paper, we present a new quantum signature scheme for known quantum messages without the help of an arbitrator. Differing from arbitrated quantum signature schemes based on the quantum one-time pad with the symmetric key, since our scheme is based on quantum public-key cryptosystems, the validity of the signature can be verified by a receiver without the help of an arbitrator. Moreover, we show that our scheme provides the functions of quantum message integrity, user authentication and non-repudiation of the origin as in digital signature schemes. (paper)

  20. Tightly Secure Signatures From Lossy Identification Schemes

    OpenAIRE

    Abdalla , Michel; Fouque , Pierre-Alain; Lyubashevsky , Vadim; Tibouchi , Mehdi

    2015-01-01

    International audience; In this paper, we present three digital signature schemes with tight security reductions in the random oracle model. Our first signature scheme is a particularly efficient version of the short exponent discrete log-based scheme of Girault et al. (J Cryptol 19(4):463–487, 2006). Our scheme has a tight reduction to the decisional short discrete logarithm problem, while still maintaining the non-tight reduction to the computational version of the problem upon which the or...

  1. An algorithm of discovering signatures from DNA databases on a computer cluster.

    Science.gov (United States)

    Lee, Hsiao Ping; Sheu, Tzu-Fang

    2014-10-05

    Signatures are short sequences that are unique and not similar to any other sequence in a database that can be used as the basis to identify different species. Even though several signature discovery algorithms have been proposed in the past, these algorithms require the entirety of databases to be loaded in the memory, thus restricting the amount of data that they can process. It makes those algorithms unable to process databases with large amounts of data. Also, those algorithms use sequential models and have slower discovery speeds, meaning that the efficiency can be improved. In this research, we are debuting the utilization of a divide-and-conquer strategy in signature discovery and have proposed a parallel signature discovery algorithm on a computer cluster. The algorithm applies the divide-and-conquer strategy to solve the problem posed to the existing algorithms where they are unable to process large databases and uses a parallel computing mechanism to effectively improve the efficiency of signature discovery. Even when run with just the memory of regular personal computers, the algorithm can still process large databases such as the human whole-genome EST database which were previously unable to be processed by the existing algorithms. The algorithm proposed in this research is not limited by the amount of usable memory and can rapidly find signatures in large databases, making it useful in applications such as Next Generation Sequencing and other large database analysis and processing. The implementation of the proposed algorithm is available at http://www.cs.pu.edu.tw/~fang/DDCSDPrograms/DDCSD.htm.

  2. Unconditionally Secure Quantum Signatures

    Directory of Open Access Journals (Sweden)

    Ryan Amiri

    2015-08-01

    Full Text Available Signature schemes, proposed in 1976 by Diffie and Hellman, have become ubiquitous across modern communications. They allow for the exchange of messages from one sender to multiple recipients, with the guarantees that messages cannot be forged or tampered with and that messages also can be forwarded from one recipient to another without compromising their validity. Signatures are different from, but no less important than encryption, which ensures the privacy of a message. Commonly used signature protocols—signatures based on the Rivest–Adleman–Shamir (RSA algorithm, the digital signature algorithm (DSA, and the elliptic curve digital signature algorithm (ECDSA—are only computationally secure, similar to public key encryption methods. In fact, since these rely on the difficulty of finding discrete logarithms or factoring large primes, it is known that they will become completely insecure with the emergence of quantum computers. We may therefore see a shift towards signature protocols that will remain secure even in a post-quantum world. Ideally, such schemes would provide unconditional or information-theoretic security. In this paper, we aim to provide an accessible and comprehensive review of existing unconditionally securesecure signature schemes for signing classical messages, with a focus on unconditionally secure quantum signature schemes.

  3. Radar Signature Calculation Facility

    Data.gov (United States)

    Federal Laboratory Consortium — FUNCTION: The calculation, analysis, and visualization of the spatially extended radar signatures of complex objects such as ships in a sea multipath environment and...

  4. Nonlinear control of magnetic signatures

    Science.gov (United States)

    Niemoczynski, Bogdan

    Magnetic properties of ferrite structures are known to cause fluctuations in Earth's magnetic field around the object. These fluctuations are known as the object's magnetic signature and are unique based on the object's geometry and material. It is a common practice to neutralize magnetic signatures periodically after certain time intervals, however there is a growing interest to develop real time degaussing systems for various applications. Development of real time degaussing system is a challenging problem because of magnetic hysteresis and difficulties in measurement or estimation of near-field flux data. The goal of this research is to develop a real time feedback control system that can be used to minimize magnetic signatures for ferrite structures. Experimental work on controlling the magnetic signature of a cylindrical steel shell structure with a magnetic disturbance provided evidence that the control process substantially increased the interior magnetic flux. This means near field estimation using interior sensor data is likely to be inaccurate. Follow up numerical work for rectangular and cylindrical cross sections investigated variations in shell wall flux density under a variety of ambient excitation and applied disturbances. Results showed magnetic disturbances could corrupt interior sensor data and magnetic shielding due to the shell walls makes the interior very sensitive to noise. The magnetic flux inside the shell wall showed little variation due to inner disturbances and its high base value makes it less susceptible to noise. This research proceeds to describe a nonlinear controller to use the shell wall data as an input. A nonlinear plant model of magnetics is developed using a constant tau to represent domain rotation lag and a gain function k to describe the magnetic hysteresis curve for the shell wall. The model is justified by producing hysteresis curves for multiple materials, matching experimental data using a particle swarm algorithm, and

  5. Unique Path Partitions

    DEFF Research Database (Denmark)

    Bessenrodt, Christine; Olsson, Jørn Børling; Sellers, James A.

    2013-01-01

    We give a complete classification of the unique path partitions and study congruence properties of the function which enumerates such partitions.......We give a complete classification of the unique path partitions and study congruence properties of the function which enumerates such partitions....

  6. Threshold Signature Schemes Application

    Directory of Open Access Journals (Sweden)

    Anastasiya Victorovna Beresneva

    2015-10-01

    Full Text Available This work is devoted to an investigation of threshold signature schemes. The systematization of the threshold signature schemes was done, cryptographic constructions based on interpolation Lagrange polynomial, elliptic curves and bilinear pairings were examined. Different methods of generation and verification of threshold signatures were explored, the availability of practical usage of threshold schemes in mobile agents, Internet banking and e-currency was shown. The topics of further investigation were given and it could reduce a level of counterfeit electronic documents signed by a group of users.

  7. Advanced Missile Signature Center

    Data.gov (United States)

    Federal Laboratory Consortium — The Advanced Missile Signature Center (AMSC) is a national facility supporting the Missile Defense Agency (MDA) and other DoD programs and customers with analysis,...

  8. THE ELECTRONIC SIGNATURE

    Directory of Open Access Journals (Sweden)

    Voiculescu Madalina Irena

    2009-05-01

    Full Text Available Article refers to significance and the digital signature in electronic commerce. Internet and electronic commerce open up many new opportunities for the consumer, yet, the security (or perceived lack of security of exchanging personal and financial data

  9. Digital signature feasibility study

    Science.gov (United States)

    2008-06-01

    The purpose of this study was to assess the advantages and disadvantages of using digital signatures to assist the Arizona Department of Transportation in conducting business. The Department is evaluating the potential of performing more electronic t...

  10. Physics Signatures at CLIC

    CERN Document Server

    Battaglia, Marco

    2001-01-01

    A set of signatures for physics processes of potential interests for the CLIC programme at = 1 - 5 TeV are discussed. These signatures, that may correspond to the manifestation of different scenarios of new physics as well as to Standard Model precision tests, are proposed as benchmarks for the optimisation of the CLIC accelerator parameters and for a first definition of the required detector response.

  11. Uniqueness in time measurement

    International Nuclear Information System (INIS)

    Lorenzen, P.

    1981-01-01

    According to P. Janich a clock is defined as an apparatus in which a point ( hand ) is moving uniformly on a straight line ( path ). For the definition of uniformly first the scaling (as a constant ratio of velocities) is defined without clocks. Thereafter the uniqueness of the time measurement can be proved using the prove of scaling of all clocks. But the uniqueness can be defined without scaling, as it is pointed out here. (orig.) [de

  12. Arbitrated quantum signature scheme with message recovery

    International Nuclear Information System (INIS)

    Lee, Hwayean; Hong, Changho; Kim, Hyunsang; Lim, Jongin; Yang, Hyung Jin

    2004-01-01

    Two quantum signature schemes with message recovery relying on the availability of an arbitrator are proposed. One scheme uses a public board and the other does not. However both schemes provide confidentiality of the message and a higher efficiency in transmission

  13. A Meta-Assembly of Selection Signatures in Cattle

    Science.gov (United States)

    Randhawa, Imtiaz A. S.; Khatkar, Mehar S.; Thomson, Peter C.; Raadsma, Herman W.

    2016-01-01

    Since domestication, significant genetic improvement has been achieved for many traits of commercial importance in cattle, including adaptation, appearance and production. In response to such intense selection pressures, the bovine genome has undergone changes at the underlying regions of functional genetic variants, which are termed “selection signatures”. This article reviews 64 recent (2009–2015) investigations testing genomic diversity for departure from neutrality in worldwide cattle populations. In particular, we constructed a meta-assembly of 16,158 selection signatures for individual breeds and their archetype groups (European, African, Zebu and composite) from 56 genome-wide scans representing 70,743 animals of 90 pure and crossbred cattle breeds. Meta-selection-scores (MSS) were computed by combining published results at every given locus, within a sliding window span. MSS were adjusted for common samples across studies and were weighted for significance thresholds across and within studies. Published selection signatures show extensive coverage across the bovine genome, however, the meta-assembly provides a consensus profile of 263 genomic regions of which 141 were unique (113 were breed-specific) and 122 were shared across cattle archetypes. The most prominent peaks of MSS represent regions under selection across multiple populations and harboured genes of known major effects (coat color, polledness and muscle hypertrophy) and genes known to influence polygenic traits (stature, adaptation, feed efficiency, immunity, behaviour, reproduction, beef and dairy production). As the first meta-assembly of selection signatures, it offers novel insights about the hotspots of selective sweeps in the bovine genome, and this method could equally be applied to other species. PMID:27045296

  14. General Conversion for Obtaining Strongly Existentially Unforgeable Signatures

    Science.gov (United States)

    Teranishi, Isamu; Oyama, Takuro; Ogata, Wakaha

    We say that a signature scheme is strongly existentially unforgeable (SEU) if no adversary, given message/signature pairs adaptively, can generate a signature on a new message or a new signature on a previously signed message. We propose a general and efficient conversion in the standard model that transforms a secure signature scheme to SEU signature scheme. In order to construct that conversion, we use a chameleon commitment scheme. Here a chameleon commitment scheme is a variant of commitment scheme such that one can change the committed value after publishing the commitment if one knows the secret key. We define the chosen message security notion for the chameleon commitment scheme, and show that the signature scheme transformed by our proposed conversion satisfies the SEU property if the chameleon commitment scheme is chosen message secure. By modifying the proposed conversion, we also give a general and efficient conversion in the random oracle model, that transforms a secure signature scheme into a SEU signature scheme. This second conversion also uses a chameleon commitment scheme but only requires the key only attack security for it.

  15. Time-dependent delayed signatures from energetic photon interrogations

    International Nuclear Information System (INIS)

    Norman, Daren R.; Jones, James L.; Blackburn, Brandon W.; Haskell, Kevin J.; Johnson, James T.; Watson, Scott M.; Hunt, Alan W.; Spaulding, Randy; Harmon, Frank

    2007-01-01

    Pulsed photonuclear interrogation environments generated by 8-24 MeV electron linac are rich with time-dependent, material-specific, radiation signatures. Nitrogen-based explosives and nuclear materials can be detected by exploiting these signatures in different delayed-time regions. Numerical and experimental results presented in this paper show the unique time and energy dependence of these signatures. It is shown that appropriate delayed-time windows are essential to acquire material-specific signatures in pulsed photonuclear assessment environments. These developments demonstrate that pulsed, high-energy, photon-inspection environments can be exploited for time-dependent, material-specific signatures through the proper operation of specialized detectors and detection methods

  16. Uncertainty in hydrological signatures

    Science.gov (United States)

    McMillan, Hilary; Westerberg, Ida

    2015-04-01

    Information that summarises the hydrological behaviour or flow regime of a catchment is essential for comparing responses of different catchments to understand catchment organisation and similarity, and for many other modelling and water-management applications. Such information types derived as an index value from observed data are known as hydrological signatures, and can include descriptors of high flows (e.g. mean annual flood), low flows (e.g. mean annual low flow, recession shape), the flow variability, flow duration curve, and runoff ratio. Because the hydrological signatures are calculated from observed data such as rainfall and flow records, they are affected by uncertainty in those data. Subjective choices in the method used to calculate the signatures create a further source of uncertainty. Uncertainties in the signatures may affect our ability to compare different locations, to detect changes, or to compare future water resource management scenarios. The aim of this study was to contribute to the hydrological community's awareness and knowledge of data uncertainty in hydrological signatures, including typical sources, magnitude and methods for its assessment. We proposed a generally applicable method to calculate these uncertainties based on Monte Carlo sampling and demonstrated it for a variety of commonly used signatures. The study was made for two data rich catchments, the 50 km2 Mahurangi catchment in New Zealand and the 135 km2 Brue catchment in the UK. For rainfall data the uncertainty sources included point measurement uncertainty, the number of gauges used in calculation of the catchment spatial average, and uncertainties relating to lack of quality control. For flow data the uncertainty sources included uncertainties in stage/discharge measurement and in the approximation of the true stage-discharge relation by a rating curve. The resulting uncertainties were compared across the different signatures and catchments, to quantify uncertainty

  17. Practical quantum digital signature

    Science.gov (United States)

    Yin, Hua-Lei; Fu, Yao; Chen, Zeng-Bing

    2016-03-01

    Guaranteeing nonrepudiation, unforgeability as well as transferability of a signature is one of the most vital safeguards in today's e-commerce era. Based on fundamental laws of quantum physics, quantum digital signature (QDS) aims to provide information-theoretic security for this cryptographic task. However, up to date, the previously proposed QDS protocols are impractical due to various challenging problems and most importantly, the requirement of authenticated (secure) quantum channels between participants. Here, we present the first quantum digital signature protocol that removes the assumption of authenticated quantum channels while remaining secure against the collective attacks. Besides, our QDS protocol can be practically implemented over more than 100 km under current mature technology as used in quantum key distribution.

  18. Signatures of Extended Storage of Used Nuclear Fuel in Casks

    Energy Technology Data Exchange (ETDEWEB)

    Rauch, Eric Benton [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2016-09-28

    As the amount of used nuclear fuel continues to grow, more and more used nuclear fuel will be transferred to storage casks. A consolidated storage facility is currently in the planning stages for storing these casks, where at least 10,000 MTHM of fuel will be stored. This site will have potentially thousands of casks once it is operational. A facility this large presents new safeguards and nuclear material accounting concerns. A new signature based on the distribution of neutron sources and multiplication within casks was part of the Department of Energy Office of Nuclear Energy’s Material Protection, Account and Control Technologies (MPACT) campaign. Under this project we looked at fingerprinting each cask's neutron signature. Each cask has a unique set of fuel, with a unique spread of initial enrichment, burnup, cooling time, and power history. The unique set of fuel creates a unique signature of neutron intensity based on the arrangement of the assemblies. The unique arrangement of neutron sources and multiplication produces a reliable and unique identification of the cask that has been shown to be relatively constant over long time periods. The work presented here could be used to restore from a loss of continuity of knowledge at the storage site. This presentation will show the steps used to simulate and form this signature from the start of the effort through its conclusion in September 2016.

  19. Lattice-Based Revocable Certificateless Signature

    Directory of Open Access Journals (Sweden)

    Ying-Hao Hung

    2017-10-01

    Full Text Available Certificateless signatures (CLS are noticeable because they may resolve the key escrow problem in ID-based signatures and break away the management problem regarding certificate in conventional signatures. However, the security of the mostly previous CLS schemes relies on the difficulty of solving discrete logarithm or large integer factorization problems. These two problems would be solved by quantum computers in the future so that the signature schemes based on them will also become insecure. For post-quantum cryptography, lattice-based cryptography is significant due to its efficiency and security. However, no study on addressing the revocation problem in the existing lattice-based CLS schemes is presented. In this paper, we focus on the revocation issue and present the first revocable CLS (RCLS scheme over lattices. Based on the short integer solution (SIS assumption over lattices, the proposed lattice-based RCLS scheme is shown to be existential unforgeability against adaptive chosen message attacks. By performance analysis and comparisons, the proposed lattice-based RCLS scheme is better than the previously proposed lattice-based CLS scheme, in terms of private key size, signature length and the revocation mechanism.

  20. Calculated NWIS signatures for enriched uranium metal

    International Nuclear Information System (INIS)

    Valentine, T.E.; Mihalczo, J.T.; Koehler, P.E.

    1995-01-01

    Nuclear Weapons Identification System (NWIS) signatures have been calculated using a Monte Carlo transport code for measurement configurations of a 252 Cf source, detectors, and a uranium metal casting. NWIS signatures consist of a wide variety of time-and frequency-analysis signatures such as the time distribution of neutrons after californium fission, the time distribution of counts in a detector after a previous count, the number of times n pulses occur in a time interval, and various frequency-analysis signatures, such as auto-power and cross-power spectral densities, coherences, and a ratio of spectral densities. This ratio is independent of detection efficiency. The analysis presented here, using the MCNP-DSP code, evaluates the applicability of this method for measurement of the 235 U content of 19-kg castings of depleted uranium and uranium with enrichments of 20, 40, 60, 80, 90, and 93.2 wt % 235 U. The dependence of the wide variety of NWIS signatures on 235 U content and possible configurations of a measurement system are presented. These preliminary calculations indicate short measurement times. Additional calculations are being performed to optimize the source-detector-moderator-casting configuration for the shortest measurement time. Although the NWIS method was developed for nuclear weapons identification, the development of a small processor now allows it to be also applied in a practical way to subcriticality measurements, nuclear fuel process monitoring and qualitative nondestructive assay of special nuclear material

  1. Real-Time Capable Micro-Doppler Signature Decomposition of Walking Human Limbs

    OpenAIRE

    Abdulatif, Sherif; Aziz, Fady; Kleiner, Bernhard; Schneider, Urs

    2017-01-01

    Unique micro-Doppler signature ($\\boldsymbol{\\mu}$-D) of a human body motion can be analyzed as the superposition of different body parts $\\boldsymbol{\\mu}$-D signatures. Extraction of human limbs $\\boldsymbol{\\mu}$-D signatures in real-time can be used to detect, classify and track human motion especially for safety application. In this paper, two methods are combined to simulate $\\boldsymbol{\\mu}$-D signatures of a walking human. Furthermore, a novel limbs $\\mu$-D signature time independent...

  2. Signatures of the Invisible

    CERN Multimedia

    Strom, D

    2003-01-01

    On the Net it is possible to take a look at art from afar via Virtual Museums. One such exhibition was recently in the New York Museum of Modern Art's branch, PS1. Entitled 'Signatures of the Invisible' it was a collaborative effort between artists and physicists (1/2 page).

  3. Lattices with unique complements

    CERN Document Server

    Saliĭ, V N

    1988-01-01

    The class of uniquely complemented lattices properly contains all Boolean lattices. However, no explicit example of a non-Boolean lattice of this class has been found. In addition, the question of whether this class contains any complete non-Boolean lattices remains unanswered. This book focuses on these classical problems of lattice theory and the various attempts to solve them. Requiring no specialized knowledge, the book is directed at researchers and students interested in general algebra and mathematical logic.

  4. Using Quantum Confinement to Uniquely Identify Devices

    Science.gov (United States)

    Roberts, J.; Bagci, I. E.; Zawawi, M. A. M.; Sexton, J.; Hulbert, N.; Noori, Y. J.; Young, M. P.; Woodhead, C. S.; Missous, M.; Migliorato, M. A.; Roedig, U.; Young, R. J.

    2015-11-01

    Modern technology unintentionally provides resources that enable the trust of everyday interactions to be undermined. Some authentication schemes address this issue using devices that give a unique output in response to a challenge. These signatures are generated by hard-to-predict physical responses derived from structural characteristics, which lend themselves to two different architectures, known as unique objects (UNOs) and physically unclonable functions (PUFs). The classical design of UNOs and PUFs limits their size and, in some cases, their security. Here we show that quantum confinement lends itself to the provision of unique identities at the nanoscale, by using fluctuations in tunnelling measurements through quantum wells in resonant tunnelling diodes (RTDs). This provides an uncomplicated measurement of identity without conventional resource limitations whilst providing robust security. The confined energy levels are highly sensitive to the specific nanostructure within each RTD, resulting in a distinct tunnelling spectrum for every device, as they contain a unique and unpredictable structure that is presently impossible to clone. This new class of authentication device operates with minimal resources in simple electronic structures above room temperature.

  5. Is Life Unique?

    Science.gov (United States)

    Abel, David L.

    2011-01-01

    Is life physicochemically unique? No. Is life unique? Yes. Life manifests innumerable formalisms that cannot be generated or explained by physicodynamics alone. Life pursues thousands of biofunctional goals, not the least of which is staying alive. Neither physicodynamics, nor evolution, pursue goals. Life is largely directed by linear digital programming and by the Prescriptive Information (PI) instantiated particularly into physicodynamically indeterminate nucleotide sequencing. Epigenomic controls only compound the sophistication of these formalisms. Life employs representationalism through the use of symbol systems. Life manifests autonomy, homeostasis far from equilibrium in the harshest of environments, positive and negative feedback mechanisms, prevention and correction of its own errors, and organization of its components into Sustained Functional Systems (SFS). Chance and necessity—heat agitation and the cause-and-effect determinism of nature’s orderliness—cannot spawn formalisms such as mathematics, language, symbol systems, coding, decoding, logic, organization (not to be confused with mere self-ordering), integration of circuits, computational success, and the pursuit of functionality. All of these characteristics of life are formal, not physical. PMID:25382119

  6. A Directed Signature Scheme and its Applications

    OpenAIRE

    Lal, Sunder; Kumar, Manoj

    2004-01-01

    This paper presents a directed signature scheme with the property that the signature can be verified only with the help of signer or signature receiver. We also propose its applications to share verification of signatures and to threshold cryptosystems.

  7. An ID-based Blind Signature Scheme from Bilinear Pairings

    OpenAIRE

    B.Umaprasada Rao; K.A.Ajmath

    2010-01-01

    Blind signatures, introduced by Chaum, allow a user to obtain a signature on a message without revealing any thing about the message to the signer. Blind signatures play on important role in plenty of applications such as e-voting, e-cash system where anonymity is of great concern. Identity based(ID-based) public key cryptography can be a good alternative for certified based public key setting, especially when efficient key management and moderate security are required. In this paper, we prop...

  8. Observed mixed standing-wave signatures in Cochin Estuary on the southwest coast of India

    Digital Repository Service at National Institute of Oceanography (India)

    DineshKumar, P.K.; Srinivas, K.; Muraleedharan, K.R.; Thottam, T.J.

    Study of the characteristics of currents and water-level variations in the Cochin estuary reveals, for the first time, unique signatures of mixed standing-waves in the southern region. Analysis of the simultaneous water-level data generated...

  9. Signatures of topological superconductivity

    Energy Technology Data Exchange (ETDEWEB)

    Peng, Yang

    2017-07-19

    The prediction and experimental discovery of topological insulators brought the importance of topology in condensed matter physics into the limelight. Topology hence acts as a new dimension along which more and more new states of matter start to emerge. One of these topological states of matter, namely topological superconductors, comes into the focus because of their gapless excitations. These gapless excitations, especially in one dimensional topological superconductors, are Majorana zero modes localized at the ends of the superconductor and exhibit exotic nonabelian statistics, which can be potentially applied to fault-tolerant quantum computation. Given their highly interesting physical properties and potential applications to quantum computation, both theorists and experimentalists spend great efforts to realize topological supercondoctors and to detect Majoranas. In two projects within this thesis, we investigate the properties of Majorana zero modes in realistic materials which are absent in simple theoretical models. We find that the superconducting proximity effect, an essential ingredient in all existing platforms for topological superconductors, plays a significant role in determining the localization property of the Majoranas. Strong proximity coupling between the normal system and the superconducting substrate can lead to strongly localized Majoranas, which can explain the observation in a recent experiment. Motivated by experiments in Molenkamp's group, we also look at realistic quantum spin Hall Josephson junctions, in which charge puddles acting as magnetic impurities are coupled to the helical edge states. We find that with this setup, the junction generically realizes an exotic 8π periodic Josephson effect, which is absent in a pristine Josephson junction. In another two projects, we propose more pronounced signatures of Majoranas that are accessible with current experimental techniques. The first one is a transport measurement, which uses

  10. Modem Signature Analysis.

    Science.gov (United States)

    1982-10-01

    AD-A127 993 MODEM SIGNATURE ANALISIS (U) PAR TECHNOLOGY CORP NEW / HARTFORD NY V EDWARDS ET AL. OCT 82 RADC-TR-82-269 F30602-80-C-0264 NCLASSIFIED F/G...as an indication of the class clustering and separation between different classes in the modem data base. It is apparent from the projection that the...that as the clusters disperse, the likelihood of a sample crossing the boundary into an adjacent region and causing a symbol decision error increases. As

  11. Electronic Signature (eSig)

    Data.gov (United States)

    Department of Veterans Affairs — Beginning with the Government Paperwork Elimination Act of 1998 (GPEA), the Federal government has encouraged the use of electronic / digital signatures to enable...

  12. Expressiveness considerations of XML signatures

    DEFF Research Database (Denmark)

    Jensen, Meiko; Meyer, Christopher

    2011-01-01

    XML Signatures are used to protect XML-based Web Service communication against a broad range of attacks related to man-in-the-middle scenarios. However, due to the complexity of the Web Services specification landscape, the task of applying XML Signatures in a robust and reliable manner becomes...... more and more challenging. In this paper, we investigate this issue, describing how an attacker can still interfere with Web Services communication even in the presence of XML Signatures. Additionally, we discuss the interrelation of XML Signatures and XML Encryption, focussing on their security...

  13. Electronic Warfare Signature Measurement Facility

    Data.gov (United States)

    Federal Laboratory Consortium — The Electronic Warfare Signature Measurement Facility contains specialized mobile spectral, radiometric, and imaging measurement systems to characterize ultraviolet,...

  14. Cancer: Unique to Older Adults

    Science.gov (United States)

    ... A to Z › Cancer › Unique to Older Adults Font size A A A Print Share Glossary Unique ... group with other older people with the same type of cancer. Researchers have found that support groups ...

  15. Molecular signatures for the Crenarchaeota and the Thaumarchaeota.

    Science.gov (United States)

    Gupta, Radhey S; Shami, Ali

    2011-02-01

    Crenarchaeotes found in mesophilic marine environments were recently placed into a new phylum of Archaea called the Thaumarchaeota. However, very few molecular characteristics of this new phylum are currently known which can be used to distinguish them from the Crenarchaeota. In addition, their relationships to deep-branching archaeal lineages are unclear. We report here detailed analyses of protein sequences from Crenarchaeota and Thaumarchaeota that have identified many conserved signature indels (CSIs) and signature proteins (SPs) (i.e., proteins for which all significant blast hits are from these groups) that are specific for these archaeal groups. Of the identified signatures 6 CSIs and 13 SPs are specific for the Crenarchaeota phylum; 6 CSIs and >250 SPs are uniquely found in various Thaumarchaeota (viz. Cenarchaeum symbiosum, Nitrosopumilus maritimus and a number of uncultured marine crenarchaeotes) and 3 CSIs and ~10 SPs are found in both Thaumarchaeota and Crenarchaeota species. Some of the molecular signatures are also present in Korarchaeum cryptofilum, which forms the independent phylum Korarchaeota. Although some of these molecular signatures suggest a distant shared ancestry between Thaumarchaeota and Crenarchaeota, our identification of large numbers of Thaumarchaeota-specific proteins and their deep branching between the Crenarchaeota and Euryarchaeota phyla in phylogenetic trees shows that they are distinct from both Crenarchaeota and Euryarchaeota in both genetic and phylogenetic terms. These observations support the placement of marine mesophilic archaea into the separate phylum Thaumarchaeota. Additionally, many CSIs and SPs have been found that are specific for different orders within Crenarchaeota (viz. Sulfolobales-3 CSIs and 169 SPs, Thermoproteales-5 CSIs and 25 SPs, Desulfurococcales-4 SPs, and Sulfolobales and Desulfurococcales-2 CSIs and 18 SPs). The signatures described here provide novel means for distinguishing the Crenarchaeota and

  16. Signatures of Mechanosensitive Gating.

    Science.gov (United States)

    Morris, Richard G

    2017-01-10

    The question of how mechanically gated membrane channels open and close is notoriously difficult to address, especially if the protein structure is not available. This perspective highlights the relevance of micropipette-aspirated single-particle tracking-used to obtain a channel's diffusion coefficient, D, as a function of applied membrane tension, σ-as an indirect assay for determining functional behavior in mechanosensitive channels. While ensuring that the protein remains integral to the membrane, such methods can be used to identify not only the gating mechanism of a protein, but also associated physical moduli, such as torsional and dilational rigidity, which correspond to the protein's effective shape change. As an example, three distinct D-versus-σ "signatures" are calculated, corresponding to gating by dilation, gating by tilt, and gating by a combination of both dilation and tilt. Both advantages and disadvantages of the approach are discussed. Copyright © 2017 Biophysical Society. Published by Elsevier Inc. All rights reserved.

  17. An interpretation of signature inversion

    International Nuclear Information System (INIS)

    Onishi, Naoki; Tajima, Naoki

    1988-01-01

    An interpretation in terms of the cranking model is presented to explain why signature inversion occurs for positive γ of the axially asymmetric deformation parameter and emerges into specific orbitals. By introducing a continuous variable, the eigenvalue equation can be reduced to a one dimensional Schroedinger equation by means of which one can easily understand the cause of signature inversion. (author)

  18. Cell short circuit, preshort signature

    Science.gov (United States)

    Lurie, C.

    1980-01-01

    Short-circuit events observed in ground test simulations of DSCS-3 battery in-orbit operations are analyzed. Voltage signatures appearing in the data preceding the short-circuit event are evaluated. The ground test simulation is briefly described along with performance during reconditioning discharges. Results suggest that a characteristic signature develops prior to a shorting event.

  19. Ship Signature Management System : Functionality

    NARCIS (Netherlands)

    Arciszewski, H.F.R.; Lier, L. van; Meijer, Y.G.S.; Noordkamp, H.W.; Wassenaar, A.S.

    2010-01-01

    A signature of a platform is the manner in which the platform manifests itself to a certain type of sensor and how observable it is when such a sensor is used to detect the platform. Because many military platforms use sensors in different media, it is the total of its different signatures that

  20. Characteristics and Validation Techniques for PCA-Based Gene-Expression Signatures

    Directory of Open Access Journals (Sweden)

    Anders E. Berglund

    2017-01-01

    Full Text Available Background. Many gene-expression signatures exist for describing the biological state of profiled tumors. Principal Component Analysis (PCA can be used to summarize a gene signature into a single score. Our hypothesis is that gene signatures can be validated when applied to new datasets, using inherent properties of PCA. Results. This validation is based on four key concepts. Coherence: elements of a gene signature should be correlated beyond chance. Uniqueness: the general direction of the data being examined can drive most of the observed signal. Robustness: if a gene signature is designed to measure a single biological effect, then this signal should be sufficiently strong and distinct compared to other signals within the signature. Transferability: the derived PCA gene signature score should describe the same biology in the target dataset as it does in the training dataset. Conclusions. The proposed validation procedure ensures that PCA-based gene signatures perform as expected when applied to datasets other than those that the signatures were trained upon. Complex signatures, describing multiple independent biological components, are also easily identified.

  1. Measurement of MMP-9 and -12 degraded elastin (ELM) provides unique information on lung tissue degradation

    DEFF Research Database (Denmark)

    Skjøt-Arkil, Helene; Clausen, Rikke E; Nguyen, Quoc Hai Trieu

    2012-01-01

    Elastin is an essential component of selected connective tissues that provides a unique physiological elasticity. Elastin may be considered a signature protein of lungs where matrix metalloprotease (MMP) -9-and -12, may be considered the signature proteases of the macrophages, which in part...... are responsible for tissue damage during disease progression. Thus, we hypothesized that a MMP-9/-12 generated fragment of elastin may be a relevant biochemical maker for lung diseases....

  2. Arbitrated quantum signature scheme based on χ-type entangled states

    International Nuclear Information System (INIS)

    Zuo, Huijuan; Huang, Wei; Qin, Sujuan

    2013-01-01

    An arbitrated quantum signature scheme, which is mainly applied in electronic-payment systems, is proposed and investigated. The χ-type entangled states are used for quantum key distribution and quantum signature in this protocol. Compared with previous quantum signature schemes which also utilize χ-type entangled states, the proposed scheme provides higher efficiency. Finally, we also analyze its security under various kinds of attacks. (paper)

  3. Searchable Signatures: Context and the Struggle for Recognition

    Directory of Open Access Journals (Sweden)

    Gina Schlesselman-Tarango

    2013-09-01

    Full Text Available Social networking sites made possible through Web 2.0 allow for unique user-generated tags called “searchable signatures.”  These tags move beyond the descriptive and act as means for users to assert online individual and group identities.  A study of searchable signatures on the Instagram application demonstrates that these types of tags are valuable not only because they allow for both individuals and groups to engage in what social theorist Axel Honneth calls the struggle for recognition, but also because they provide contextual use data and sociohistorical information so important to the understanding of digital objects.  This article explores how searchable signatures might be used by both patrons and staff in library environments.

  4. Initial Semantics for Strengthened Signatures

    Directory of Open Access Journals (Sweden)

    André Hirschowitz

    2012-02-01

    Full Text Available We give a new general definition of arity, yielding the companion notions of signature and associated syntax. This setting is modular in the sense requested by Ghani and Uustalu: merging two extensions of syntax corresponds to building an amalgamated sum. These signatures are too general in the sense that we are not able to prove the existence of an associated syntax in this general context. So we have to select arities and signatures for which there exists the desired initial monad. For this, we follow a track opened by Matthes and Uustalu: we introduce a notion of strengthened arity and prove that the corresponding signatures have initial semantics (i.e. associated syntax. Our strengthened arities admit colimits, which allows the treatment of the λ-calculus with explicit substitution.

  5. Retail applications of signature verification

    Science.gov (United States)

    Zimmerman, Thomas G.; Russell, Gregory F.; Heilper, Andre; Smith, Barton A.; Hu, Jianying; Markman, Dmitry; Graham, Jon E.; Drews, Clemens

    2004-08-01

    The dramatic rise in identity theft, the ever pressing need to provide convenience in checkout services to attract and retain loyal customers, and the growing use of multi-function signature captures devices in the retail sector provides favorable conditions for the deployment of dynamic signature verification (DSV) in retail settings. We report on the development of a DSV system to meet the needs of the retail sector. We currently have a database of approximately 10,000 signatures collected from 600 subjects and forgers. Previous work at IBM on DSV has been merged and extended to achieve robust performance on pen position data available from commercial point of sale hardware, achieving equal error rates on skilled forgeries and authentic signatures of 1.5% to 4%.

  6. Magnetic Signature Analysis & Validation System

    National Research Council Canada - National Science Library

    Vliet, Scott

    2001-01-01

    The Magnetic Signature Analysis and Validation (MAGSAV) System is a mobile platform that is used to measure, record, and analyze the perturbations to the earth's ambient magnetic field caused by object such as armored vehicles...

  7. Uniquely Strongly Clean Group Rings

    Institute of Scientific and Technical Information of China (English)

    WANG XIU-LAN

    2012-01-01

    A ring R is called clean if every element is the sum of an idempotent and a unit,and R is called uniquely strongly clean (USC for short) if every element is uniquely the sum of an idempotent and a unit that commute.In this article,some conditions on a ring R and a group G such that RG is clean are given.It is also shown that if G is a locally finite group,then the group ring RG is USC if and only if R is USC,and G is a 2-group.The left uniquely exchange group ring,as a middle ring of the uniquely clean ring and the USC ring,does not possess this property,and so does the uniquely exchange group ring.

  8. Brain morphological signatures for chronic pain.

    Directory of Open Access Journals (Sweden)

    Marwan N Baliki

    Full Text Available Chronic pain can be understood not only as an altered functional state, but also as a consequence of neuronal plasticity. Here we use in vivo structural MRI to compare global, local, and architectural changes in gray matter properties in patients suffering from chronic back pain (CBP, complex regional pain syndrome (CRPS and knee osteoarthritis (OA, relative to healthy controls. We find that different chronic pain types exhibit unique anatomical 'brain signatures'. Only the CBP group showed altered whole-brain gray matter volume, while regional gray matter density was distinct for each group. Voxel-wise comparison of gray matter density showed that the impact on the extent of chronicity of pain was localized to a common set of regions across all conditions. When gray matter density was examined for large regions approximating Brodmann areas, it exhibited unique large-scale distributed networks for each group. We derived a barcode, summarized by a single index of within-subject co-variation of gray matter density, which enabled classification of individual brains to their conditions with high accuracy. This index also enabled calculating time constants and asymptotic amplitudes for an exponential increase in brain re-organization with pain chronicity, and showed that brain reorganization with pain chronicity was 6 times slower and twice as large in CBP in comparison to CRPS. The results show an exuberance of brain anatomical reorganization peculiar to each condition and as such reflecting the unique maladaptive physiology of different types of chronic pain.

  9. Persistence of social signatures in human communication.

    Science.gov (United States)

    Saramäki, Jari; Leicht, E A; López, Eduardo; Roberts, Sam G B; Reed-Tsochas, Felix; Dunbar, Robin I M

    2014-01-21

    The social network maintained by a focal individual, or ego, is intrinsically dynamic and typically exhibits some turnover in membership over time as personal circumstances change. However, the consequences of such changes on the distribution of an ego's network ties are not well understood. Here we use a unique 18-mo dataset that combines mobile phone calls and survey data to track changes in the ego networks and communication patterns of students making the transition from school to university or work. Our analysis reveals that individuals display a distinctive and robust social signature, captured by how interactions are distributed across different alters. Notably, for a given ego, these social signatures tend to persist over time, despite considerable turnover in the identity of alters in the ego network. Thus, as new network members are added, some old network members either are replaced or receive fewer calls, preserving the overall distribution of calls across network members. This is likely to reflect the consequences of finite resources such as the time available for communication, the cognitive and emotional effort required to sustain close relationships, and the ability to make emotional investments.

  10. Genome signature analysis of thermal virus metagenomes reveals Archaea and thermophilic signatures

    Directory of Open Access Journals (Sweden)

    Pride David T

    2008-09-01

    Full Text Available Abstract Background Metagenomic analysis provides a rich source of biological information for otherwise intractable viral communities. However, study of viral metagenomes has been hampered by its nearly complete reliance on BLAST algorithms for identification of DNA sequences. We sought to develop algorithms for examination of viral metagenomes to identify the origin of sequences independent of BLAST algorithms. We chose viral metagenomes obtained from two hot springs, Bear Paw and Octopus, in Yellowstone National Park, as they represent simple microbial populations where comparatively large contigs were obtained. Thermal spring metagenomes have high proportions of sequences without significant Genbank homology, which has hampered identification of viruses and their linkage with hosts. To analyze each metagenome, we developed a method to classify DNA fragments using genome signature-based phylogenetic classification (GSPC, where metagenomic fragments are compared to a database of oligonucleotide signatures for all previously sequenced Bacteria, Archaea, and viruses. Results From both Bear Paw and Octopus hot springs, each assembled contig had more similarity to other metagenome contigs than to any sequenced microbial genome based on GSPC analysis, suggesting a genome signature common to each of these extreme environments. While viral metagenomes from Bear Paw and Octopus share some similarity, the genome signatures from each locale are largely unique. GSPC using a microbial database predicts most of the Octopus metagenome has archaeal signatures, while bacterial signatures predominate in Bear Paw; a finding consistent with those of Genbank BLAST. When using a viral database, the majority of the Octopus metagenome is predicted to belong to archaeal virus Families Globuloviridae and Fuselloviridae, while none of the Bear Paw metagenome is predicted to belong to archaeal viruses. As expected, when microbial and viral databases are combined, each of

  11. Genome signature analysis of thermal virus metagenomes reveals Archaea and thermophilic signatures.

    Science.gov (United States)

    Pride, David T; Schoenfeld, Thomas

    2008-09-17

    Metagenomic analysis provides a rich source of biological information for otherwise intractable viral communities. However, study of viral metagenomes has been hampered by its nearly complete reliance on BLAST algorithms for identification of DNA sequences. We sought to develop algorithms for examination of viral metagenomes to identify the origin of sequences independent of BLAST algorithms. We chose viral metagenomes obtained from two hot springs, Bear Paw and Octopus, in Yellowstone National Park, as they represent simple microbial populations where comparatively large contigs were obtained. Thermal spring metagenomes have high proportions of sequences without significant Genbank homology, which has hampered identification of viruses and their linkage with hosts. To analyze each metagenome, we developed a method to classify DNA fragments using genome signature-based phylogenetic classification (GSPC), where metagenomic fragments are compared to a database of oligonucleotide signatures for all previously sequenced Bacteria, Archaea, and viruses. From both Bear Paw and Octopus hot springs, each assembled contig had more similarity to other metagenome contigs than to any sequenced microbial genome based on GSPC analysis, suggesting a genome signature common to each of these extreme environments. While viral metagenomes from Bear Paw and Octopus share some similarity, the genome signatures from each locale are largely unique. GSPC using a microbial database predicts most of the Octopus metagenome has archaeal signatures, while bacterial signatures predominate in Bear Paw; a finding consistent with those of Genbank BLAST. When using a viral database, the majority of the Octopus metagenome is predicted to belong to archaeal virus Families Globuloviridae and Fuselloviridae, while none of the Bear Paw metagenome is predicted to belong to archaeal viruses. As expected, when microbial and viral databases are combined, each of the Octopus and Bear Paw metagenomic contigs

  12. A Black Hole Spectral Signature

    Science.gov (United States)

    Titarchuk, Lev; Laurent, Philippe

    2000-03-01

    An accreting black hole is, by definition, characterized by the drain. Namely, the matter falls into a black hole much the same way as water disappears down a drain matter goes in and nothing comes out. As this can only happen in a black hole, it provides a way to see ``a black hole'', an unique observational signature. The accretion proceeds almost in a free-fall manner close to the black hole horizon, where the strong gravitational field dominates the pressure forces. In this paper we present analytical calculations and Monte-Carlo simulations of the specific features of X-ray spectra formed as a result of upscattering of the soft (disk) photons in the converging inflow (CI) into the black hole. The full relativistic treatment has been implemented to reproduce these spectra. We show that spectra in the soft state of black hole systems (BHS) can be described as the sum of a thermal (disk) component and the convolution of some fraction of this component with the CI upscattering spread (Greens) function. The latter boosted photon component is seen as an extended power-law at energies much higher than the characteristic energy of the soft photons. We demonstrate the stability of the power spectral index over a wide range of the plasma temperature 0 - 10 keV and mass accretion rates (higher than 2 in Eddington units). We also demonstrate that the sharp high energy cutoff occurs at energies of 200-400 keV which are related to the average energy of electrons mec2 impinging upon the event horizon. The spectrum is practically identical to the standard thermal Comptonization spectrum when the CI plasma temperature is getting of order of 50 keV (the typical ones for the hard state of BHS). In this case one can see the effect of the bulk motion only at high energies where there is an excess in the CI spectrum with respect to the pure thermal one. Furthermore we demonstrate that the change of spectral shapes from the soft X-ray state to the hard X-ray state is clearly to be

  13. 21 CFR 11.50 - Signature manifestations.

    Science.gov (United States)

    2010-04-01

    ... 21 Food and Drugs 1 2010-04-01 2010-04-01 false Signature manifestations. 11.50 Section 11.50 Food... RECORDS; ELECTRONIC SIGNATURES Electronic Records § 11.50 Signature manifestations. (a) Signed electronic...: (1) The printed name of the signer; (2) The date and time when the signature was executed; and (3...

  14. 76 FR 30542 - Adult Signature Services

    Science.gov (United States)

    2011-05-26

    ... POSTAL SERVICE 39 CFR Part 111 Adult Signature Services AGENCY: Postal Service\\TM\\. ACTION: Final..., Domestic Mail Manual (DMM[supreg]) 503.8, to add a new extra service called Adult Signature. This new service has two available options: Adult Signature Required and Adult Signature Restricted Delivery. DATES...

  15. 1 CFR 18.7 - Signature.

    Science.gov (United States)

    2010-01-01

    ... 1 General Provisions 1 2010-01-01 2010-01-01 false Signature. 18.7 Section 18.7 General Provisions... PREPARATION AND TRANSMITTAL OF DOCUMENTS GENERALLY § 18.7 Signature. The original and each duplicate original... stamped beneath the signature. Initialed or impressed signatures will not be accepted. Documents submitted...

  16. Attribute-Based Digital Signature System

    NARCIS (Netherlands)

    Ibraimi, L.; Asim, Muhammad; Petkovic, M.

    2011-01-01

    An attribute-based digital signature system comprises a signature generation unit (1) for signing a message (m) by generating a signature (s) based on a user secret key (SK) associated with a set of user attributes, wherein the signature generation unit (1) is arranged for combining the user secret

  17. Observational signature of high spin at the Event Horizon Telescope

    Science.gov (United States)

    Gralla, Samuel E.; Lupsasca, Alexandru; Strominger, Andrew

    2018-04-01

    We analytically compute the observational appearance of an isotropically emitting point source on a circular, equatorial orbit near the horizon of a rapidly spinning black hole. The primary image moves on a vertical line segment, in contrast to the primarily horizontal motion of the spinless case. Secondary images, also on the vertical line, display a rich caustic structure. If detected, this unique signature could serve as a `smoking gun' for a high spin black hole in nature.

  18. Quantum messages with signatures forgeable in arbitrated quantum signature schemes

    International Nuclear Information System (INIS)

    Kim, Taewan; Choi, Jeong Woon; Jho, Nam-Su; Lee, Soojoon

    2015-01-01

    Even though a method to perfectly sign quantum messages has not been known, the arbitrated quantum signature scheme has been considered as one of the good candidates. However, its forgery problem has been an obstacle to the scheme becoming a successful method. In this paper, we consider one situation, which is slightly different from the forgery problem, that we use to check whether at least one quantum message with signature can be forged in a given scheme, although all the messages cannot be forged. If there are only a finite number of forgeable quantum messages in the scheme, then the scheme can be secured against the forgery attack by not sending forgeable quantum messages, and so our situation does not directly imply that we check whether the scheme is secure against the attack. However, if users run a given scheme without any consideration of forgeable quantum messages, then a sender might transmit such forgeable messages to a receiver and in such a case an attacker can forge the messages if the attacker knows them. Thus it is important and necessary to look into forgeable quantum messages. We show here that there always exists such a forgeable quantum message-signature pair for every known scheme with quantum encryption and rotation, and numerically show that there are no forgeable quantum message-signature pairs that exist in an arbitrated quantum signature scheme. (paper)

  19. SIGNATURE: A workbench for gene expression signature analysis

    Directory of Open Access Journals (Sweden)

    Chang Jeffrey T

    2011-11-01

    Full Text Available Abstract Background The biological phenotype of a cell, such as a characteristic visual image or behavior, reflects activities derived from the expression of collections of genes. As such, an ability to measure the expression of these genes provides an opportunity to develop more precise and varied sets of phenotypes. However, to use this approach requires computational methods that are difficult to implement and apply, and thus there is a critical need for intelligent software tools that can reduce the technical burden of the analysis. Tools for gene expression analyses are unusually difficult to implement in a user-friendly way because their application requires a combination of biological data curation, statistical computational methods, and database expertise. Results We have developed SIGNATURE, a web-based resource that simplifies gene expression signature analysis by providing software, data, and protocols to perform the analysis successfully. This resource uses Bayesian methods for processing gene expression data coupled with a curated database of gene expression signatures, all carried out within a GenePattern web interface for easy use and access. Conclusions SIGNATURE is available for public use at http://genepattern.genome.duke.edu/signature/.

  20. Angiogenic Gene Signature Derived from Subtype Specific Cell Models Segregate Proneural and Mesenchymal Glioblastoma

    Directory of Open Access Journals (Sweden)

    Aman Sharma

    2017-07-01

    Full Text Available Intertumoral molecular heterogeneity in glioblastoma identifies four major subtypes based on expression of molecular markers. Among them, the two clinically interrelated subtypes, proneural and mesenchymal, are the most aggressive with proneural liable for conversion to mesenchymal upon therapy. Using two patient-derived novel primary cell culture models (MTA10 and KW10, we developed a minimal but unique four-gene signature comprising genes vascular endothelial growth factor A (VEGF-A, vascular endothelial growth factor B (VEGF-B and angiopoietin 1 (ANG1, angiopoietin 2 (ANG2 that effectively segregated the proneural (MTA10 and mesenchymal (KW10 glioblastoma subtypes. The cell culture preclassified as mesenchymal showed elevated expression of genes VEGF-A, VEGF-B and ANG1, ANG2 as compared to the other cell culture model that mimicked the proneural subtype. The differentially expressed genes in these two cell culture models were confirmed by us using TCGA and Verhaak databases and we refer to it as a minimal multigene signature (MMS. We validated this MMS on human glioblastoma tissue sections with the use of immunohistochemistry on preclassified (YKL-40 high or mesenchymal glioblastoma and OLIG2 high or proneural glioblastoma tumor samples (n = 30. MMS segregated mesenchymal and proneural subtypes with 83% efficiency using a simple histopathology scoring approach (p = 0.008 for ANG2 and p = 0.01 for ANG1. Furthermore, MMS expression negatively correlated with patient survival. Importantly, MMS staining demonstrated spatiotemporal heterogeneity within each subclass, adding further complexity to subtype identification in glioblastoma. In conclusion, we report a novel and simple sequencing-independent histopathology-based biomarker signature comprising genes VEGF-A, VEGF-B and ANG1, ANG2 for subtyping of proneural and mesenchymal glioblastoma.

  1. Diabetes: Unique to Older Adults

    Science.gov (United States)

    ... Stroke Urinary Incontinence Related Documents PDF Choosing Wisely: Diabetes Tests and Treatments Download Related Video Join our e-newsletter! Aging & Health A to Z Diabetes Unique to Older Adults This section provides information ...

  2. A Provably Secure Aggregate Signature Scheme for Healthcare Wireless Sensor Networks.

    Science.gov (United States)

    Shen, Limin; Ma, Jianfeng; Liu, Ximeng; Miao, Meixia

    2016-11-01

    Wireless sensor networks (WSNs) are being used in a wide range of applications for healthcare monitoring, like heart rate monitors and blood pressure monitors, which can minimize the need for healthcare professionals. In medical system, sensors on or in patients produce medical data which can be easily compromised by a vast of attacks. Although signature schemes can protect data authenticity and data integrity, when the number of users involved in the medical system becomes huge, the bandwidth and storage cost will rise sharply so that existing signature schemes are inapplicability for WSNs. In this paper, we propose an efficient aggregate signature scheme for healthcare WSNs according to an improved security model, which can combine multiple signatures into a single aggregate signature. The length of such an aggregate signature may be as long as that of an individual one, which can greatly decrease the bandwidth and storage cost for networks.

  3. Signature molecular descriptor : advanced applications.

    Energy Technology Data Exchange (ETDEWEB)

    Visco, Donald Patrick, Jr. (Tennessee Technological University, Cookeville, TN)

    2010-04-01

    In this work we report on the development of the Signature Molecular Descriptor (or Signature) for use in the solution of inverse design problems as well as in highthroughput screening applications. The ultimate goal of using Signature is to identify novel and non-intuitive chemical structures with optimal predicted properties for a given application. We demonstrate this in three studies: green solvent design, glucocorticoid receptor ligand design and the design of inhibitors for Factor XIa. In many areas of engineering, compounds are designed and/or modified in incremental ways which rely upon heuristics or institutional knowledge. Often multiple experiments are performed and the optimal compound is identified in this brute-force fashion. Perhaps a traditional chemical scaffold is identified and movement of a substituent group around a ring constitutes the whole of the design process. Also notably, a chemical being evaluated in one area might demonstrate properties very attractive in another area and serendipity was the mechanism for solution. In contrast to such approaches, computer-aided molecular design (CAMD) looks to encompass both experimental and heuristic-based knowledge into a strategy that will design a molecule on a computer to meet a given target. Depending on the algorithm employed, the molecule which is designed might be quite novel (re: no CAS registration number) and/or non-intuitive relative to what is known about the problem at hand. While CAMD is a fairly recent strategy (dating to the early 1980s), it contains a variety of bottlenecks and limitations which have prevented the technique from garnering more attention in the academic, governmental and industrial institutions. A main reason for this is how the molecules are described in the computer. This step can control how models are developed for the properties of interest on a given problem as well as how to go from an output of the algorithm to an actual chemical structure. This report

  4. Proteomic Signatures of Thymomas.

    Directory of Open Access Journals (Sweden)

    Linan Wang

    Full Text Available Based on the histological features and outcome, the current WHO classification separates thymomas into A, AB, B1, B2 and B3 subtypes. It is hypothesized that the type A thymomas are derived from the thymic medulla while the type B thymomas are derived from the cortex. Due to occasional histological overlap between the tumor subtypes creating difficulties in their separation, the aim of this study was to provide their proteomic characterization and identify potential immunohistochemical markers aiding in tissue diagnosis. Pair-wise comparison of neoplastic and normal thymus by liquid chromatography tandem mass spectrometry (LC-MS/MS of formalin fixed paraffin embedded tissue revealed 61 proteins differentially expressed in thymomas compared to normal tissue. Hierarchical clustering showed distinct segregation of subtypes AB, B1 and B2 from that of A and B3. Most notably, desmoyokin, a protein that is encoded by the AHNAK gene, was associated with type A thymomas and medulla of normal thymus, by LC-MS/MS and immunohistochemistry. In this global proteomic characterization of the thymoma, several proteins unique to different thymic compartments and thymoma subtypes were identified. Among differentially expressed proteins, desmoyokin is a marker specific for thymic medulla and is potentially promising immunohistochemical marker in separation of type A and B3 thymomas.

  5. Method of Anti-Virus Protection Based on (n, t Threshold Proxy Signature with an Arbitrator

    Directory of Open Access Journals (Sweden)

    E. A. Tolyupa

    2014-01-01

    Full Text Available The article suggests the method of anti-virus protection of mobile devices based on the usage of proxy digital signatures and an (n;t-threshold proxy signature scheme with an arbitrator. The unique feature of the suggested method is in the absence of necessity to install anti-virus software in a mobile device. It will be enough only to have the software verifying digital signatures and the Internet. The method is used on the base of public keys infrastructure /PKI/, thus minimizing implementation expenses.

  6. Five Guidelines for Selecting Hydrological Signatures

    Science.gov (United States)

    McMillan, H. K.; Westerberg, I.; Branger, F.

    2017-12-01

    Hydrological signatures are index values derived from observed or modeled series of hydrological data such as rainfall, flow or soil moisture. They are designed to extract relevant information about hydrological behavior, such as to identify dominant processes, and to determine the strength, speed and spatiotemporal variability of the rainfall-runoff response. Hydrological signatures play an important role in model evaluation. They allow us to test whether particular model structures or parameter sets accurately reproduce the runoff generation processes within the watershed of interest. Most modeling studies use a selection of different signatures to capture different aspects of the catchment response, for example evaluating overall flow distribution as well as high and low flow extremes and flow timing. Such studies often choose their own set of signatures, or may borrow subsets of signatures used in multiple other works. The link between signature values and hydrological processes is not always straightforward, leading to uncertainty and variability in hydrologists' signature choices. In this presentation, we aim to encourage a more rigorous approach to hydrological signature selection, which considers the ability of signatures to represent hydrological behavior and underlying processes for the catchment and application in question. To this end, we propose a set of guidelines for selecting hydrological signatures. We describe five criteria that any hydrological signature should conform to: Identifiability, Robustness, Consistency, Representativeness, and Discriminatory Power. We describe an example of the design process for a signature, assessing possible signature designs against the guidelines above. Due to their ubiquity, we chose a signature related to the Flow Duration Curve, selecting the FDC mid-section slope as a proposed signature to quantify catchment overall behavior and flashiness. We demonstrate how assessment against each guideline could be used to

  7. Proteolytic signatures define unique thrombin-derived peptides present in human wound fluid in vivo.

    Science.gov (United States)

    Saravanan, Rathi; Adav, Sunil S; Choong, Yeu Khai; van der Plas, Mariena J A; Petrlova, Jitka; Kjellström, Sven; Sze, Siu Kwan; Schmidtchen, Artur

    2017-10-13

    The disease burden of failing skin repair and non-healing ulcers is extensive. There is an unmet need for new diagnostic approaches to better predict healing activity and wound infection. Uncontrolled and excessive protease activity, of endogenous or bacterial origin, has been described as a major contributor to wound healing impairments. Proteolytic peptide patterns could therefore correlate and "report" healing activity and infection. This work describes a proof of principle delineating a strategy by which peptides from a selected protein, human thrombin, are detected and attributed to proteolytic actions. With a particular focus on thrombin-derived C-terminal peptides (TCP), we show that distinct peptide patterns are generated in vitro by the human S1 peptidases human neutrophil elastase and cathepsin G, and the bacterial M4 peptidases Pseudomonas aeruginosa elastase and Staphylococcus aureus aureolysin, respectively. Corresponding peptide sequences were identified in wound fluids from acute and non-healing ulcers, and notably, one peptide, FYT21 (FYTHVFRLKKWIQKVIDQFGE), was only present in wound fluid from non-healing ulcers colonized by P. aeruginosa and S. aureus. Our result is a proof of principle pointing at the possibility of defining peptide biomarkers reporting distinct proteolytic activities, of potential implication for improved diagnosis of wound healing and infection.

  8. Unique behavioral characteristics and microRNA signatures in a drug resistant epilepsy model.

    Directory of Open Access Journals (Sweden)

    Jangsup Moon

    Full Text Available BACKGROUND: Pharmacoresistance is a major issue in the treatment of epilepsy. However, the mechanism underlying pharmacoresistance to antiepileptic drugs (AEDs is still unclear, and few animal models have been established for studying drug resistant epilepsy (DRE. In our study, spontaneous recurrent seizures (SRSs were investigated by video-EEG monitoring during the entire procedure. METHODS/PRINCIPAL FINDINGS: In the mouse pilocarpine-induced epilepsy model, we administered levetiracetam (LEV and valproate (VPA in sequence. AED-responsive and AED-resistant mice were naturally selected after 7-day treatment of LEV and VPA. Behavioral tests (open field, object exploration, elevated plus maze, and light-dark transition test and a microRNA microarray test were performed. Among the 37 epileptic mice with SRS, 23 showed significantly fewer SRSs during administration of LEV (n = 16, LEV sensitive (LS group or VPA (n = 7, LEV resistant/VPA sensitive (LRVS group, while 7 epileptic mice did not show any amelioration with either of the AEDs (n = 7, multidrug resistant (MDR group. On the behavioral assessment, MDR mice displayed distinctive behaviors in the object exploration and elevated plus maze tests, which were not observed in the LS group. Expression of miRNA was altered in LS and MDR groups, and we identified 4 miRNAs (miR-206, miR-374, miR-468, and miR-142-5p, which were differently modulated in the MDR group versus both control and LS groups. CONCLUSION: This is the first study to identify a pharmacoresistant subgroup, resistant to 2 AEDs, in the pilocarpine-induced epilepsy model. We hypothesize that modulation of the identified miRNAs may play a key role in developing pharmacoresistance and behavioral alterations in the MDR group.

  9. Identification of unique microRNA signature associated with lupus nephritis.

    Directory of Open Access Journals (Sweden)

    Jeannie L Te

    2010-05-01

    Full Text Available MicroRNAs (miRNA have emerged as an important new class of modulators of gene expression. In this study we investigated miRNA that are differentially expressed in lupus nephritis. Microarray technology was used to investigate differentially expressed miRNA in peripheral blood mononuclear cells (PBMCs and Epstein-Barr Virus (EBV-transformed cell lines obtained from lupus nephritis affected patients and unaffected controls. TaqMan-based stem-loop real-time polymerase chain reaction was used for validation. Microarray analysis of miRNA expressed in both African American (AA and European American (EA derived lupus nephritis samples revealed 29 and 50 differentially expressed miRNA, respectively, of 850 tested. There were 18 miRNA that were differentially expressed in both racial groups. When samples from both racial groups and different specimen types were considered, there were 5 primary miRNA that were differentially expressed. We have identified 5 miRNA; hsa-miR-371-5P, hsa-miR-423-5P, hsa-miR-638, hsa-miR-1224-3P and hsa-miR-663 that were differentially expressed in lupus nephritis across different racial groups and all specimen types tested. Hsa-miR-371-5P, hsa-miR-1224-3P and hsa-miR-423-5P, are reported here for the first time to be associated with lupus nephritis. Our work establishes EBV-transformed B cell lines as a useful model for the discovery of miRNA as biomarkers for SLE. Based on these findings, we postulate that these differentially expressed miRNA may be potential novel biomarkers for SLE as well as help elucidate pathogenic mechanisms of lupus nephritis. The investigation of miRNA profiles in SLE may lead to the discovery and development of novel methods to diagnosis, treat and prevent SLE.

  10. Commensal–dendritic-cell interaction specifies a unique protective skin immune signature

    Science.gov (United States)

    Naik, Shruti; Bouladoux, Nicolas; Linehan, Jonathan L.; Han, Seong-Ji; Harrison, Oliver J.; Wilhelm, Christoph; Conlan, Sean; Himmelfarb, Sarah; Byrd, Allyson L.; Deming, Clayton; Quinones, Mariam; Brenchley, Jason M.; Kong, Heidi H.; Tussiwand, Roxanne; Murphy, Kenneth M.; Merad, Miriam; Segre, Julia A; Belkaid, Yasmine

    2015-01-01

    The skin represents the primary interface between the host and the environment. This organ is also home to trillions of microorganisms that play an important role in tissue homeostasis and local immunity1–4. Skin microbial communities are highly diverse and can be remodelled over time or in response to environmental challenges5–7. How, in the context of this complexity, individual commensal microorganisms may differentially modulate skin immunity and the consequences of these responses for tissue physiology remains unclear. Here we show that defined commensals dominantly affect skin immunity and identify the cellular mediators involved in this specification. In particular, colonization with Staphylococcus epidermidis induces IL-17A+ CD8+ T cells that home to the epidermis, enhance innate barrier immunity and limit pathogen invasion. Commensal-specific T-cell responses result from the coordinated action of skin-resident dendritic cell subsets and are not associated with inflammation, revealing that tissue-resident cells are poised to sense and respond to alterations in microbial communities. This interaction may represent an evolutionary means by which the skin immune system uses fluctuating commensal signals to calibrate barrier immunity and provide heterologous protection against invasive pathogens. These findings reveal that the skin immune landscape is a highly dynamic environment that can be rapidly and specifically remodelled by encounters with defined commensals, findings that have profound implications for our understanding of tissue-specific immunity and pathologies. PMID:25539086

  11. Proteolytic signatures define unique thrombin-derived peptides present in human wound fluid in vivo

    DEFF Research Database (Denmark)

    Saravanan, Rathi; Adav, Sunil S; Choong, Yeu Khai

    2017-01-01

    The disease burden of failing skin repair and non-healing ulcers is extensive. There is an unmet need for new diagnostic approaches to better predict healing activity and wound infection. Uncontrolled and excessive protease activity, of endogenous or bacterial origin, has been described as a majo...

  12. The liberal illusion of uniqueness.

    Science.gov (United States)

    Stern, Chadly; West, Tessa V; Schmitt, Peter G

    2014-01-01

    In two studies, we demonstrated that liberals underestimate their similarity to other liberals (i.e., display truly false uniqueness), whereas moderates and conservatives overestimate their similarity to other moderates and conservatives (i.e., display truly false consensus; Studies 1 and 2). We further demonstrated that a fundamental difference between liberals and conservatives in the motivation to feel unique explains this ideological distinction in the accuracy of estimating similarity (Study 2). Implications of the accuracy of consensus estimates for mobilizing liberal and conservative political movements are discussed.

  13. Digital Signature Schemes with Complementary Functionality and Applications

    OpenAIRE

    S. N. Kyazhin

    2012-01-01

    Digital signature schemes with additional functionality (an undeniable signature, a signature of the designated confirmee, a signature blind, a group signature, a signature of the additional protection) and examples of their application are considered. These schemes are more practical, effective and useful than schemes of ordinary digital signature.

  14. Induced Temporal Signatures for Point-Source Detection

    International Nuclear Information System (INIS)

    Stephens, Daniel L.; Runkle, Robert C.; Carlson, Deborah K.; Peurrung, Anthony J.; Seifert, Allen; Wyatt, Cory R.

    2005-01-01

    Detection of radioactive point-sized sources is inherently divided into two regimes encompassing stationary and moving detectors. The two cases differ in their treatment of background radiation and its influence on detection sensitivity. In the stationary detector case the statistical fluctuation of the background determines the minimum detectable quantity. In the moving detector case the detector may be subjected to widely and irregularly varying background radiation, as a result of geographical and environmental variation. This significant systematic variation, in conjunction with the statistical variation of the background, requires a conservative threshold to be selected to yield the same false-positive rate as the stationary detection case. This results in lost detection sensitivity for real sources. This work focuses on a simple and practical modification of the detector geometry that increase point-source recognition via a distinctive temporal signature. A key part of this effort is the integrated development of both detector geometries that induce a highly distinctive signature for point sources and the development of statistical algorithms able to optimize detection of this signature amidst varying background. The identification of temporal signatures for point sources has been demonstrated and compared with the canonical method showing good results. This work demonstrates that temporal signatures are efficient at increasing point-source discrimination in a moving detector system

  15. Signature Pedagogy in Theatre Arts

    Science.gov (United States)

    Kornetsky, Lisa

    2017-01-01

    Critique in undergraduate theatre programs is at the heart of training actors at all levels. It is accepted as the signature pedagogy and is practiced in multiple ways. This essay defines critique and presents the case for why it is used as the single most important way that performers come to understand the language, values, and discourse of the…

  16. Motif signatures of transcribed enhancers

    KAUST Repository

    Kleftogiannis, Dimitrios

    2017-09-14

    In mammalian cells, transcribed enhancers (TrEn) play important roles in the initiation of gene expression and maintenance of gene expression levels in spatiotemporal manner. One of the most challenging questions in biology today is how the genomic characteristics of enhancers relate to enhancer activities. This is particularly critical, as several recent studies have linked enhancer sequence motifs to specific functional roles. To date, only a limited number of enhancer sequence characteristics have been investigated, leaving space for exploring the enhancers genomic code in a more systematic way. To address this problem, we developed a novel computational method, TELS, aimed at identifying predictive cell type/tissue specific motif signatures. We used TELS to compile a comprehensive catalog of motif signatures for all known TrEn identified by the FANTOM5 consortium across 112 human primary cells and tissues. Our results confirm that distinct cell type/tissue specific motif signatures characterize TrEn. These signatures allow discriminating successfully a) TrEn from random controls, proxy of non-enhancer activity, and b) cell type/tissue specific TrEn from enhancers expressed and transcribed in different cell types/tissues. TELS codes and datasets are publicly available at http://www.cbrc.kaust.edu.sa/TELS.

  17. Quark-Gluon Plasma Signatures

    CERN Document Server

    Vogt, Ramona

    1998-01-01

    Aspects of quark-gluon plasma signatures that can be measured by CMS are discussed. First the initial conditions of the system from minijet production are introduced, including shadowing effects. Color screening of the Upsilon family is then presented, followed by energy loss effects on charm and bottom hadrons, high Pt jets and global observables.

  18. Galaxy interactions : The HI signature

    NARCIS (Netherlands)

    Sancisi, R; Barnes, JE; Sanders, DB

    1999-01-01

    HI observations are an excellent tool for investigating tidal interactions. Ongoing major and minor interactions which can lead to traumatic mergers or to accretion and the triggering of star formation, show distinct HI signatures. Interactions and mergers in the recent past can also be recognized

  19. The spectrum of genomic signatures: from dinucleotides to chaos game representation.

    Science.gov (United States)

    Wang, Yingwei; Hill, Kathleen; Singh, Shiva; Kari, Lila

    2005-02-14

    In the post genomic era, access to complete genome sequence data for numerous diverse species has opened multiple avenues for examining and comparing primary DNA sequence organization of entire genomes. Previously, the concept of a genomic signature was introduced with the observation of species-type specific Dinucleotide Relative Abundance Profiles (DRAPs); dinucleotides were identified as the subsequences with the greatest bias in representation in a majority of genomes. Herein, we demonstrate that DRAP is one particular genomic signature contained within a broader spectrum of signatures. Within this spectrum, an alternative genomic signature, Chaos Game Representation (CGR), provides a unique visualization of patterns in sequence organization. A genomic signature is associated with a particular integer order or subsequence length that represents a measure of the resolution or granularity in the analysis of primary DNA sequence organization. We quantitatively explore the organizational information provided by genomic signatures of different orders through different distance measures, including a novel Image Distance. The Image Distance and other existing distance measures are evaluated by comparing the phylogenetic trees they generate for 26 complete mitochondrial genomes from a diversity of species. The phylogenetic tree generated by the Image Distance is compatible with the known relatedness of species. Quantitative evaluation of the spectrum of genomic signatures may be used to ultimately gain insight into the determinants and biological relevance of the genome signatures.

  20. Gene Expression Signature in Endemic Osteoarthritis by Microarray Analysis

    Directory of Open Access Journals (Sweden)

    Xi Wang

    2015-05-01

    Full Text Available Kashin-Beck Disease (KBD is an endemic osteochondropathy with an unknown pathogenesis. Diagnosis of KBD is effective only in advanced cases, which eliminates the possibility of early treatment and leads to an inevitable exacerbation of symptoms. Therefore, we aim to identify an accurate blood-based gene signature for the detection of KBD. Previously published gene expression profile data on cartilage and peripheral blood mononuclear cells (PBMCs from adults with KBD were compared to select potential target genes. Microarray analysis was conducted to evaluate the expression of the target genes in a cohort of 100 KBD patients and 100 healthy controls. A gene expression signature was identified using a training set, which was subsequently validated using an independent test set with a minimum redundancy maximum relevance (mRMR algorithm and support vector machine (SVM algorithm. Fifty unique genes were differentially expressed between KBD patients and healthy controls. A 20-gene signature was identified that distinguished between KBD patients and controls with 90% accuracy, 85% sensitivity, and 95% specificity. This study identified a 20-gene signature that accurately distinguishes between patients with KBD and controls using peripheral blood samples. These results promote the further development of blood-based genetic biomarkers for detection of KBD.

  1. SSC physics signatures and trigger requirements

    International Nuclear Information System (INIS)

    1985-01-01

    Strategies are considered for triggering on new physics processes on the environment of the SSC, where interaction rates will be very high and most new physics processes quite rare. The quantities available for use in the trigger at various levels are related to the signatures of possible new physics. Two examples were investigated in some detail using the ISAJET Monte Carlo program: Higgs decays to W pairs and a missing energy trigger applied to gluino pair production. In both of the examples studied in detail, it was found that workable strategies for reducing the trigger rate were obtainable which also produced acceptable efficiency for the processes of interest. In future work, it will be necessary to carry out such a program for the full spectrum of suggested new physics

  2. Kosovo case: A unique arbitrariness

    Directory of Open Access Journals (Sweden)

    Nakarada Radmila

    2007-01-01

    Full Text Available The end of Cold war, contrary to expectations has brought new conflicts and forms of violence, new divisions and new relativizations of the international legal order. Taking as an example the endeavors to resolve the Kosovo conflict, the author attempts to indicate the broader implications of the international efforts to constitute an independent state on part of the territory of an existing sovereign state. The arguments used to justify the redefinition of the borders of the Serbian state without its consent, the moral, democratic, peace arguments, are reviewed. Particular attention is paid to the argument that Kosovo is a unique case and therefore unique rules should be applied. The author seeks to understand the deeper significance of these efforts, concluding that dismantling the present international legal order is not only a potential danger but a possible aim.

  3. Uniqueness theorems in linear elasticity

    CERN Document Server

    Knops, Robin John

    1971-01-01

    The classical result for uniqueness in elasticity theory is due to Kirchhoff. It states that the standard mixed boundary value problem for a homogeneous isotropic linear elastic material in equilibrium and occupying a bounded three-dimensional region of space possesses at most one solution in the classical sense, provided the Lame and shear moduli, A and J1 respectively, obey the inequalities (3 A + 2 J1) > 0 and J1>O. In linear elastodynamics the analogous result, due to Neumann, is that the initial-mixed boundary value problem possesses at most one solution provided the elastic moduli satisfy the same set of inequalities as in Kirchhoffs theorem. Most standard textbooks on the linear theory of elasticity mention only these two classical criteria for uniqueness and neglect altogether the abundant literature which has appeared since the original publications of Kirchhoff. To remedy this deficiency it seems appropriate to attempt a coherent description ofthe various contributions made to the study of uniquenes...

  4. Online Signature Verification on MOBISIG Finger-Drawn Signature Corpus

    Directory of Open Access Journals (Sweden)

    Margit Antal

    2018-01-01

    Full Text Available We present MOBISIG, a pseudosignature dataset containing finger-drawn signatures from 83 users captured with a capacitive touchscreen-based mobile device. The database was captured in three sessions resulting in 45 genuine signatures and 20 skilled forgeries for each user. The database was evaluated by two state-of-the-art methods: a function-based system using local features and a feature-based system using global features. Two types of equal error rate computations are performed: one using a global threshold and the other using user-specific thresholds. The lowest equal error rate was 0.01% against random forgeries and 5.81% against skilled forgeries using user-specific thresholds that were computed a posteriori. However, these equal error rates were significantly raised to 1.68% (random forgeries case and 14.31% (skilled forgeries case using global thresholds. The same evaluation protocol was performed on the DooDB publicly available dataset. Besides verification performance evaluations conducted on the two finger-drawn datasets, we evaluated the quality of the samples and the users of the two datasets using basic quality measures. The results show that finger-drawn signatures can be used by biometric systems with reasonable accuracy.

  5. Unsupervised signature extraction from forensic logs

    NARCIS (Netherlands)

    Thaler, S.M.; Menkovski, V.; Petkovic, M.; Altun, Y.; Das, K.; Mielikäinen, T.; Malerba, D.; Stefanowski, J.; Read, J.; Žitnik, M.; Ceci, M.

    2017-01-01

    Signature extraction is a key part of forensic log analysis. It involves recognizing patterns in log lines such that log lines that originated from the same line of code are grouped together. A log signature consists of immutable parts and mutable parts. The immutable parts define the signature, and

  6. 7 CFR 718.9 - Signature requirements.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 7 2010-01-01 2010-01-01 false Signature requirements. 718.9 Section 718.9... MULTIPLE PROGRAMS General Provisions § 718.9 Signature requirements. (a) When a program authorized by this chapter or Chapter XIV of this title requires the signature of a producer; landowner; landlord; or tenant...

  7. 42 CFR 424.36 - Signature requirements.

    Science.gov (United States)

    2010-10-01

    ... 42 Public Health 3 2010-10-01 2010-10-01 false Signature requirements. 424.36 Section 424.36... (CONTINUED) MEDICARE PROGRAM CONDITIONS FOR MEDICARE PAYMENT Claims for Payment § 424.36 Signature requirements. (a) General rule. The beneficiary's own signature is required on the claim unless the beneficiary...

  8. 17 CFR 12.12 - Signature.

    Science.gov (United States)

    2010-04-01

    ... 17 Commodity and Securities Exchanges 1 2010-04-01 2010-04-01 false Signature. 12.12 Section 12.12... General Information and Preliminary Consideration of Pleadings § 12.12 Signature. (a) By whom. All... document on behalf of another person. (b) Effect. The signature on any document of any person acting either...

  9. 25 CFR 213.10 - Lessor's signature.

    Science.gov (United States)

    2010-04-01

    ... 25 Indians 1 2010-04-01 2010-04-01 false Lessor's signature. 213.10 Section 213.10 Indians BUREAU... MEMBERS OF FIVE CIVILIZED TRIBES, OKLAHOMA, FOR MINING How to Acquire Leases § 213.10 Lessor's signature... thumbprint which shall be designated as “right” or “left” thumbmark. Such signatures must be witnessed by two...

  10. Signature effects in 2-qp rotational bands

    International Nuclear Information System (INIS)

    Jain, A.K.; Goel, A.

    1992-01-01

    The authors briefly review the progress in understanding the 2-qp rotational bands in odd-odd nuclei. Signature effects and the phenomenon of signature inversion are discussed. The Coriolis coupling appears to have all the ingredients to explain the inversion. Some recent work on signature dependence in 2-qp bands of even-even nuclei is also discussed; interesting features are pointed out

  11. 27 CFR 17.6 - Signature authority.

    Science.gov (United States)

    2010-04-01

    ... 27 Alcohol, Tobacco Products and Firearms 1 2010-04-01 2010-04-01 false Signature authority. 17.6... PRODUCTS General Provisions § 17.6 Signature authority. No claim, bond, tax return, or other required... other proper notification of signature authority has been filed with the TTB office where the required...

  12. High-speed high-security signatures

    NARCIS (Netherlands)

    Bernstein, D.J.; Duif, N.; Lange, T.; Schwabe, P.; Yang, B.Y.

    2011-01-01

    This paper shows that a $390 mass-market quad-core 2.4GHz Intel Westmere (Xeon E5620) CPU can create 108000 signatures per second and verify 71000 signatures per second on an elliptic curve at a 2128 security level. Public keys are 32 bytes, and signatures are 64 bytes. These performance figures

  13. Imprecise system reliability and component importance based on survival signature

    International Nuclear Information System (INIS)

    Feng, Geng; Patelli, Edoardo; Beer, Michael; Coolen, Frank P.A.

    2016-01-01

    The concept of the survival signature has recently attracted increasing attention for performing reliability analysis on systems with multiple types of components. It opens a new pathway for a structured approach with high computational efficiency based on a complete probabilistic description of the system. In practical applications, however, some of the parameters of the system might not be defined completely due to limited data, which implies the need to take imprecisions of component specifications into account. This paper presents a methodology to include explicitly the imprecision, which leads to upper and lower bounds of the survival function of the system. In addition, the approach introduces novel and efficient component importance measures. By implementing relative importance index of each component without or with imprecision, the most critical component in the system can be identified depending on the service time of the system. Simulation method based on survival signature is introduced to deal with imprecision within components, which is precise and efficient. Numerical example is presented to show the applicability of the approach for systems. - Highlights: • Survival signature is a novel way for system reliability and component importance • High computational efficiency based on a complete description of system. • Include explicitly the imprecision, which leads to bounds of the survival function. • A novel relative importance index is proposed as importance measure. • Allows to identify critical components depending on the service time of the system.

  14. Air-gun signature modelling considering the influence of mechanical structure factors

    International Nuclear Information System (INIS)

    Li, Guofa; Liu, Zhao; Wang, Jianhua; Cao, Mingqiang

    2014-01-01

    In marine seismic prospecting, as the air-gun array is usually composed of different types of air-guns, the signature modelling of different air-guns is particularly important to the array design. Different types of air-guns have different mechanical structures, which directly or indirectly affect the signatures. In order to simulate the influence of the mechanical structure, five parameters—the throttling constant, throttling power law exponent, mass release efficiency, fluid viscosity and heat transfer coefficient—are used in signature modelling. Through minimizing the energy relative error between the simulated and the measured signatures by the simulated annealing method, the five optimal parameters can be estimated. The method is tested in a field experiment, and the consistency between the simulated and the measured signatures is improved with the optimal parameters. (paper)

  15. Leak Signature Space: An Original Representation for Robust Leak Location in Water Distribution Networks

    Directory of Open Access Journals (Sweden)

    Myrna V. Casillas

    2015-03-01

    Full Text Available In this paper, an original model-based scheme for leak location using pressure sensors in water distribution networks is introduced. The proposed approach is based on a new representation called the Leak Signature Space (LSS that associates a specific signature to each leak location being minimally affected by leak magnitude. The LSS considers a linear model approximation of the relation between pressure residuals and leaks that is projected onto a selected hyperplane. This new approach allows to infer the location of a given leak by comparing the position of its signature with other leak signatures. Moreover, two ways of improving the method’s robustness are proposed. First, by associating a domain of influence to each signature and second, through a time horizon analysis. The efficiency of the method is highlighted by means of a real network using several scenarios involving different number of sensors and considering the presence of noise in the measurements.

  16. Nonlinear analysis of dynamic signature

    Science.gov (United States)

    Rashidi, S.; Fallah, A.; Towhidkhah, F.

    2013-12-01

    Signature is a long trained motor skill resulting in well combination of segments like strokes and loops. It is a physical manifestation of complex motor processes. The problem, generally stated, is that how relative simplicity in behavior emerges from considerable complexity of perception-action system that produces behavior within an infinitely variable biomechanical and environmental context. To solve this problem, we present evidences which indicate that motor control dynamic in signing process is a chaotic process. This chaotic dynamic may explain a richer array of time series behavior in motor skill of signature. Nonlinear analysis is a powerful approach and suitable tool which seeks for characterizing dynamical systems through concepts such as fractal dimension and Lyapunov exponent. As a result, they can be analyzed in both horizontal and vertical for time series of position and velocity. We observed from the results that noninteger values for the correlation dimension indicates low dimensional deterministic dynamics. This result could be confirmed by using surrogate data tests. We have also used time series to calculate the largest Lyapunov exponent and obtain a positive value. These results constitute significant evidence that signature data are outcome of chaos in a nonlinear dynamical system of motor control.

  17. Experimental statistical signature of many-body quantum interference

    Science.gov (United States)

    Giordani, Taira; Flamini, Fulvio; Pompili, Matteo; Viggianiello, Niko; Spagnolo, Nicolò; Crespi, Andrea; Osellame, Roberto; Wiebe, Nathan; Walschaers, Mattia; Buchleitner, Andreas; Sciarrino, Fabio

    2018-03-01

    Multi-particle interference is an essential ingredient for fundamental quantum mechanics phenomena and for quantum information processing to provide a computational advantage, as recently emphasized by boson sampling experiments. Hence, developing a reliable and efficient technique to witness its presence is pivotal in achieving the practical implementation of quantum technologies. Here, we experimentally identify genuine many-body quantum interference via a recent efficient protocol, which exploits statistical signatures at the output of a multimode quantum device. We successfully apply the test to validate three-photon experiments in an integrated photonic circuit, providing an extensive analysis on the resources required to perform it. Moreover, drawing upon established techniques of machine learning, we show how such tools help to identify the—a priori unknown—optimal features to witness these signatures. Our results provide evidence on the efficacy and feasibility of the method, paving the way for its adoption in large-scale implementations.

  18. Flow-Signature Analysis of Water Consumption in Nonresidential Building Water Networks Using High-Resolution and Medium-Resolution Smart Meter Data: Two Case Studies

    Science.gov (United States)

    Clifford, Eoghan; Mulligan, Sean; Comer, Joanne; Hannon, Louise

    2018-01-01

    Real-time monitoring of water consumption activities can be an effective mechanism to achieve efficient water network management. This approach, largely enabled by the advent of smart metering technologies, is gradually being practiced in domestic and industrial contexts. In particular, identifying water consumption habits from flow-signatures, i.e., the specific end-usage patterns, is being investigated as a means for conservation in both the residential and nonresidential context. However, the quality of meter data is bivariate (dependent on number of meters and data temporal resolution) and as a result, planning a smart metering scheme is relatively difficult with no generic design approach available. In this study, a comprehensive medium-resolution to high-resolution smart metering program was implemented at two nonresidential trial sites to evaluate the effect of spatial and temporal data aggregation. It was found that medium-resolution water meter data were capable of exposing regular, continuous, peak use, and diurnal patterns which reflect group wide end-usage characteristics. The high-resolution meter data permitted flow-signature at a personal end-use level. Through this unique opportunity to observe water usage characteristics via flow-signature patterns, newly defined hydraulic-based design coefficients determined from Poisson rectangular pulse were developed to intuitively aid in the process of pattern discovery with implications for automated activity recognition applications. A smart meter classification and siting index was introduced which categorizes meter resolution in terms of their suitable application.

  19. Edges and vertices in a unique signed circle in a signed graph

    Directory of Open Access Journals (Sweden)

    Richard Behr

    2017-12-01

    Full Text Available We examine the conditions under which a signed graph contains an edge or a vertex that is contained in a unique negative circle or a unique positive circle. For an edge in a unique signed circle, the positive and negative case require the same structure on the underlying graph, but the requirements on the signature are different. We characterize the structure of the underlying graph necessary to support such an edge in terms of bridges of a circle. We then use the results from the edge version of the problem to help solve the vertex version.

  20. The Uniqueness of Milton Friedman

    OpenAIRE

    J. Daniel Hammond

    2013-01-01

    That there is no Milton Friedman today is not a mystery; the mystery is how Milton Friedman could have been. The facts of Friedman’s biography make him unique among twentieth-century public figures. He had extensive knowledge and expertise in mathematics and statistics. Yet he became a critic of ‘formal’ theory, exemplified by mathematical economics, that failed to engage with real-world facts and data, and of econometric modeling that presumed more knowledge of economic structure than Friedm...

  1. Unique Features of Halophilic Proteins.

    Science.gov (United States)

    Arakawa, Tsutomu; Yamaguchi, Rui; Tokunaga, Hiroko; Tokunaga, Masao

    2017-01-01

    Proteins from moderate and extreme halophiles have unique characteristics. They are highly acidic and hydrophilic, similar to intrinsically disordered proteins. These characteristics make the halophilic proteins soluble in water and fold reversibly. In addition to reversible folding, the rate of refolding of halophilic proteins from denatured structure is generally slow, often taking several days, for example, for extremely halophilic proteins. This slow folding rate makes the halophilic proteins a novel model system for folding mechanism analysis. High solubility and reversible folding also make the halophilic proteins excellent fusion partners for soluble expression of recombinant proteins.

  2. A unique gesture of sharing

    International Nuclear Information System (INIS)

    Mustafa, T.

    1985-01-01

    The Atoms for Peace program was a unique gesture of sharing on the part of the leading industrialized nation, and has very few parallels in modern history. The author says one of the major advantages of the program for developing nations was the much needed stimulation of their indigenous science and technology efforts and the awakening of their governments to the multifaceted benefits of atomic energy. The author discusses how the program benefited Pakistan in the production of electrical energy and in the application of nuclear techniques in the fields of agriculture and medicine, which help to alleviate hunger and combat disease

  3. Spectral signature selection for mapping unvegetated soils

    Science.gov (United States)

    May, G. A.; Petersen, G. W.

    1975-01-01

    Airborne multispectral scanner data covering the wavelength interval from 0.40-2.60 microns were collected at an altitude of 1000 m above the terrain in southeastern Pennsylvania. Uniform training areas were selected within three sites from this flightline. Soil samples were collected from each site and a procedure developed to allow assignment of scan line and element number from the multispectral scanner data to each sampling location. These soil samples were analyzed on a spectrophotometer and laboratory spectral signatures were derived. After correcting for solar radiation and atmospheric attenuation, the laboratory signatures were compared to the spectral signatures derived from these same soils using multispectral scanner data. Both signatures were used in supervised and unsupervised classification routines. Computer-generated maps using the laboratory and multispectral scanner derived signatures resulted in maps that were similar to maps resulting from field surveys. Approximately 90% agreement was obtained between classification maps produced using multispectral scanner derived signatures and laboratory derived signatures.

  4. Time Series Based for Online Signature Verification

    Directory of Open Access Journals (Sweden)

    I Ketut Gede Darma Putra

    2013-11-01

    Full Text Available Signature verification system is to match the tested signature with a claimed signature. This paper proposes time series based for feature extraction method and dynamic time warping for match method. The system made by process of testing 900 signatures belong to 50 participants, 3 signatures for reference and 5 signatures from original user, simple imposters and trained imposters for signatures test. The final result system was tested with 50 participants with 3 references. This test obtained that system accuracy without imposters is 90,44897959% at threshold 44 with rejection errors (FNMR is 5,2% and acceptance errors (FMR is 4,35102%, when with imposters system accuracy is 80,1361% at threshold 27 with error rejection (FNMR is 15,6% and acceptance errors (average FMR is 4,263946%, with details as follows: acceptance errors is 0,391837%, acceptance errors simple imposters is 3,2% and acceptance errors trained imposters is 9,2%.

  5. Uranium isotopic signatures measured in samples of dirt collected at two former uranium facilities

    International Nuclear Information System (INIS)

    Meyers, L.A.; Stalcup, A.M.; LaMont, S.P.; Spitz, H.B.

    2014-01-01

    Nuclear forensics is a multidisciplinary science that uses a variety of analytical methods and tools to explore the physical, chemical, and isotopic characteristics of nuclear and radiological materials. These characteristics, when evaluated alone or in combination, become signatures that may reveal how and when the material was fabricated. The signatures contained in samples of dirt collected at two different uranium metal processing facilities in the United States were evaluated to determine uranium isotopic composition and compare results with processes that were conducted at these sites. One site refined uranium and fabricated uranium metal ingots for fuel and targets and the other site rolled hot forged uranium and other metals into dimensional rods. Unique signatures were found that are consistent with the activities and processes conducted at each facility and establish confidence in using these characteristics to reveal the provenance of other materials that exhibit similar signatures. (author)

  6. A signature correlation study of ground target VHF/UHF ISAR imagery

    Science.gov (United States)

    Gatesman, Andrew J.; Beaudoin, Christopher J.; Giles, Robert H.; Kersey, William T.; Waldman, Jerry; Carter, Steve; Nixon, William E.

    2003-09-01

    VV and HH-polarized radar signatures of several ground targets were acquired in the VHF/UHF band (171-342 MHz) by using 1/35th scale models and an indoor radar range operating from 6 to 12 GHz. Data were processed into medianized radar cross sections as well as focused, ISAR imagery. Measurement validation was confirmed by comparing the radar cross section of a test object with a method of moments radar cross section prediction code. The signatures of several vehicles from three vehicle classes (tanks, trunks, and TELs) were measured and a signature cross-correlation study was performed. The VHF/UHF band is currently being exploited for its foliage penetration ability, however, the coarse image resolution which results from the relatively long radar wavelengths suggests a more challenging target recognition problem. One of the study's goals was to determine the amount of unique signature content in VHF/UHF ISAR imagery of military ground vehicles. Open-field signatures are compared with each other as well as with simplified shapes of similar size. Signatures were also acquired on one vehicle in a variety of configurations to determine the impact of monitor target variations on the signature content at these frequencies.

  7. Numerical Predictions of Sonic Boom Signatures for a Straight Line Segmented Leading Edge Model

    Science.gov (United States)

    Elmiligui, Alaa A.; Wilcox, Floyd J.; Cliff, Susan; Thomas, Scott

    2012-01-01

    A sonic boom wind tunnel test was conducted on a straight-line segmented leading edge (SLSLE) model in the NASA Langley 4- by 4- Foot Unitary Plan Wind Tunnel (UPWT). The purpose of the test was to determine whether accurate sonic boom measurements could be obtained while continuously moving the SLSLE model past a conical pressure probe. Sonic boom signatures were also obtained using the conventional move-pause data acquisition method for comparison. The continuous data acquisition approach allows for accurate signatures approximately 15 times faster than a move-pause technique. These successful results provide an incentive for future testing with greatly increased efficiency using the continuous model translation technique with the single probe to measure sonic boom signatures. Two widely used NASA codes, USM3D (Navier-Stokes) and CART3D-AERO (Euler, adjoint-based adaptive mesh), were used to compute off-body sonic boom pressure signatures of the SLSLE model at several different altitudes below the model at Mach 2.0. The computed pressure signatures compared well with wind tunnel data. The effect of the different altitude for signature extraction was evaluated by extrapolating the near field signatures to the ground and comparing pressure signatures and sonic boom loudness levels.

  8. Photon signature analysis using template matching

    Energy Technology Data Exchange (ETDEWEB)

    Bradley, D.A., E-mail: d.a.bradley@surrey.ac.uk [Department of Physics, University of Surrey, Guildford GU2 7XH (United Kingdom); Hashim, S., E-mail: suhairul@utm.my [Department of Physics, Universiti Teknologi Malaysia, 81310 Skudai, Johor (Malaysia); Saripan, M.I. [Faculty of Engineering, Universiti Putra Malaysia, 43400 Serdang, Selangor (Malaysia); Wells, K. [Centre for Vision, Speech and Signal Processing, University of Surrey, Guildford GU2 7XH (United Kingdom); Dunn, W.L. [Department of Mechanical and Nuclear Engineering, Kansas State University, 3002 Rathbone Hall, Manhattan, KS 66506 (United States)

    2011-10-01

    We describe an approach to detect improvised explosive devices (IEDs) by using a template matching procedure. This approach relies on the signature due to backstreaming {gamma} photons from various targets. In this work we have simulated cylindrical targets of aluminum, iron, copper, water and ammonium nitrate (nitrogen-rich fertilizer). We simulate 3.5 MeV source photons distributed on a plane inside a shielded area using Monte Carlo N-Particle (MCNP{sup TM}) code version 5 (V5). The 3.5 MeV source gamma rays yield 511 keV peaks due to pair production and scattered gamma rays. In this work, we simulate capture of those photons that backstream, after impinging on the target element, toward a NaI detector. The captured backstreamed photons are expected to produce a unique spectrum that will become part of a simple signal processing recognition system based on the template matching method. Different elements were simulated using different sets of random numbers in the Monte Carlo simulation. To date, the sum of absolute differences (SAD) method has been used to match the template. In the examples investigated, template matching was found to detect all elements correctly.

  9. Unique Features of Mobile Commerce

    Institute of Scientific and Technical Information of China (English)

    DING Xiaojun; IIJIMA Junichi; HO Sho

    2004-01-01

    While the market potentials and impacts of web-based e-commerce are still in the ascendant, the advances in wireless technologies and mobile networks have brought about a new business opportunity and research attention, what is termed mobile commerce. Commonly, mobile commerce is considered to be another new application of existing web-based e-commerce onto wireless networks, but as an independent business area, mobile commerce has its own advantages and challenges as opposed to traditional e-commerce applications. This paper focuses on exploring the unique features of mobile commerce as. Compared with traditional e-commerce. Also, there are still some limitations arisen in m-commerce in contrast to web-based e-commerce. Finally, current state of mobile commerce in Japan is presented in brief, with an introduction of several cases involving mobile commerce applications in today 's marketplace.

  10. Unique features of space reactors

    International Nuclear Information System (INIS)

    Buden, D.

    1990-01-01

    This paper reports on space reactors that are designed to meet a unique set of requirements; they must be sufficiently compact to be launched in a rocket to their operational location, operate for many years without maintenance and servicing, operate in extreme environments, and reject heat by radiation to space. To meet these restrictions, operating temperatures are much greater than in terrestrial power plants, and the reactors tend to have a fast neutron spectrum. Currently, a new generation of space reactor power plants is being developed. The major effort is in the SP-100 program, where the power plant is being designed for seven years of full power, and no maintenance operation at a reactor outlet operating temperature of 1350 K

  11. The Uniqueness of Islamic Culture

    Directory of Open Access Journals (Sweden)

    Sinan YILMAZ

    2014-12-01

    Full Text Available Abstract This paper examines the main reasons behind why Islamic culture is different than other cultures. In the introduction part of the paper, the usage area of the words culture and civilization were tackled. In the first part of the paper, an evaluation of the uniqueness of Islamic culture was made and examples about this were given. In the second part of the paper, evaluations about how Islamic culture has struggled with modernization and secularization and how it has shaped itself as a result of this were made. In the third part of the paper, the situation in which Islamic civilization has regressed against the Western civilization causing emerging arguments and the current situation in Islamic civilization have been addressed by making evaluations on culture and civilization. In the final part, evaluations on thesis this paper has used were made.

  12. Authentication of gold nanoparticle encoded pharmaceutical tablets using polarimetric signatures.

    Science.gov (United States)

    Carnicer, Artur; Arteaga, Oriol; Suñé-Negre, Josep M; Javidi, Bahram

    2016-10-01

    The counterfeiting of pharmaceutical products represents concerns for both industry and the safety of the general public. Falsification produces losses to companies and poses health risks for patients. In order to detect fake pharmaceutical tablets, we propose producing film-coated tablets with gold nanoparticle encoding. These coated tablets contain unique polarimetric signatures. We present experiments to show that ellipsometric optical techniques, in combination with machine learning algorithms, can be used to distinguish genuine and fake samples. To the best of our knowledge, this is the first report using gold nanoparticles encoded with optical polarimetric classifiers to prevent the counterfeiting of pharmaceutical products.

  13. Literacy Course Priorities and Signature Aspects of Nine Elementary Initial Licensure Programs

    Science.gov (United States)

    Lenski, Susan; Ganske, Kathy; Chambers, Sandy; Wold, Linda; Dobler, Elizabeth; Grisham, Dana L.; Scales, Roya; Smetana, Linda; Wolsey, Thomas Devere; Yoder, Karen K.; Young, Janet

    2013-01-01

    The purpose of this article is to describe the first part of a three-phase study to learn what makes an effective elementary literacy initial licensure program. The first step was to identify how nine programs prioritized research-based literacy practices and to identify each program's unique features, which we called "signature aspects." Findings…

  14. Infrared signatures for remote sensing

    International Nuclear Information System (INIS)

    McDowell, R.S.; Sharpe, S.W.; Kelly, J.F.

    1994-04-01

    PNL's capabilities for infrared and near-infrared spectroscopy include tunable-diode-laser (TDL) systems covering 300--3,000 cm -1 at 2 laser. PNL also has a beam expansion source with a 12-cm slit, which provides a 3-m effective path for gases at ∼10 K, giving a Doppler width of typically 10 MHz; and long-path static gas cells (to 100 m). In applying this equipment to signatures work, the authors emphasize the importance of high spectral resolution for detecting and identifying atmospheric interferences; for identifying the optimum analytical frequencies; for deriving, by spectroscopic analysis, the molecular parameters needed for modeling; and for obtaining data on species and/or bands that are not in existing databases. As an example of such spectroscopy, the authors have assigned and analyzed the C-Cl stretching region of CCl 4 at 770--800 cm -1 . This is an important potential signature species whose IR absorption has remained puzzling because of the natural isotopic mix, extensive hot-band structure, and a Fermi resonance involving a nearby combination band. Instrument development projects include the IR sniffer, a small high-sensitivity, high-discrimination (Doppler-limited) device for fence-line or downwind monitoring that is effective even in regions of atmospheric absorption; preliminary work has achieved sensitivities at the low-ppb level. Other work covers trace species detection with TDLs, and FM-modulated CO 2 laser LIDAR. The authors are planning a field experiment to interrogate the Hanford tank farm for signature species from Rattlesnake Mountain, a standoff of ca. 15 km, to be accompanied by simultaneous ground-truthing at the tanks

  15. Signature Curves Statistics of DNA Supercoils

    OpenAIRE

    Shakiban, Cheri; Lloyd, Peter

    2004-01-01

    In this paper we describe the Euclidean signature curves for two dimensional closed curves in the plane and their generalization to closed space curves. The focus will be on discrete numerical methods for approximating such curves. Further we will apply these numerical methods to plot the signature curves related to three-dimensional simulated DNA supercoils. Our primary focus will be on statistical analysis of the data generated for the signature curves of the supercoils. We will try to esta...

  16. Institute of Geophysics, Planetary Physics, and Signatures

    Data.gov (United States)

    Federal Laboratory Consortium — The Institute of Geophysics, Planetary Physics, and Signatures at Los Alamos National Laboratory is committed to promoting and supporting high quality, cutting-edge...

  17. On reliable discovery of molecular signatures

    Directory of Open Access Journals (Sweden)

    Björkegren Johan

    2009-01-01

    Full Text Available Abstract Background Molecular signatures are sets of genes, proteins, genetic variants or other variables that can be used as markers for a particular phenotype. Reliable signature discovery methods could yield valuable insight into cell biology and mechanisms of human disease. However, it is currently not clear how to control error rates such as the false discovery rate (FDR in signature discovery. Moreover, signatures for cancer gene expression have been shown to be unstable, that is, difficult to replicate in independent studies, casting doubts on their reliability. Results We demonstrate that with modern prediction methods, signatures that yield accurate predictions may still have a high FDR. Further, we show that even signatures with low FDR may fail to replicate in independent studies due to limited statistical power. Thus, neither stability nor predictive accuracy are relevant when FDR control is the primary goal. We therefore develop a general statistical hypothesis testing framework that for the first time provides FDR control for signature discovery. Our method is demonstrated to be correct in simulation studies. When applied to five cancer data sets, the method was able to discover molecular signatures with 5% FDR in three cases, while two data sets yielded no significant findings. Conclusion Our approach enables reliable discovery of molecular signatures from genome-wide data with current sample sizes. The statistical framework developed herein is potentially applicable to a wide range of prediction problems in bioinformatics.

  18. Modeling the Thermal Signature of Natural Backgrounds

    National Research Council Canada - National Science Library

    Gamborg, Marius

    2002-01-01

    Two measuring stations have been established the purpose being to collect comprehensive databases of thermal signatures of background elements in addition to the prevailing meteorological conditions...

  19. Crossover Can Be Constructive When Computing Unique Input Output Sequences

    DEFF Research Database (Denmark)

    Lehre, Per Kristian; Yao, Xin

    2010-01-01

    Unique input output (UIO) sequences have important applications in conformance testing of finite state machines (FSMs). Previous experimental and theoretical research has shown that evolutionary algorithms (EAs) can compute UIOs efficiently on many FSM instance classes, but fail on others. However...

  20. Gene Signature in Sessile Serrated Polyps Identifies Colon Cancer Subtype

    Science.gov (United States)

    Kanth, Priyanka; Bronner, Mary P.; Boucher, Kenneth M.; Burt, Randall W.; Neklason, Deborah W.; Hagedorn, Curt H.; Delker, Don A.

    2016-01-01

    Sessile serrated colon adenoma/polyps (SSA/Ps) are found during routine screening colonoscopy and may account for 20–30% of colon cancers. However, differentiating SSA/Ps from hyperplastic polyps (HP) with little risk of cancer is challenging and complementary molecular markers are needed. Additionally, the molecular mechanisms of colon cancer development from SSA/Ps are poorly understood. RNA sequencing was performed on 21 SSA/Ps, 10 HPs, 10 adenomas, 21 uninvolved colon and 20 control colon specimens. Differential expression and leave-one-out cross validation methods were used to define a unique gene signature of SSA/Ps. Our SSA/P gene signature was evaluated in colon cancer RNA-Seq data from The Cancer Genome Atlas (TCGA) to identify a subtype of colon cancers that may develop from SSA/Ps. A total of 1422 differentially expressed genes were found in SSA/Ps relative to controls. Serrated polyposis syndrome (n=12) and sporadic SSA/Ps (n=9) exhibited almost complete (96%) gene overlap. A 51-gene panel in SSA/P showed similar expression in a subset of TCGA colon cancers with high microsatellite instability (MSI-H). A smaller seven-gene panel showed high sensitivity and specificity in identifying BRAF mutant, CpG island methylator phenotype high (CIMP-H) and MLH1 silenced colon cancers. We describe a unique gene signature in SSA/Ps that identifies a subset of colon cancers likely to develop through the serrated pathway. These gene panels may be utilized for improved differentiation of SSA/Ps from HPs and provide insights into novel molecular pathways altered in colon cancer arising from the serrated pathway. PMID:27026680

  1. Impact of Electronic Signatures and Time Stamping for the Protection of Electronic Agreements

    Directory of Open Access Journals (Sweden)

    Tadas Limba

    2012-12-01

    Full Text Available The article e495 valuates the impact of e-signatures and time stamping on electronic contracts and electronic documents for performing e-business opportunities and goals, and analyses e-signature application for business cases. Various electronic services, virtual shopping, electronic cash transactions are becoming increasingly popular as they allow users to quickly perform different actions, operations and functions. It is important not only for convenience, but also to ensure consumer data security and reliability. Security reasons are not enough for security transmitted data, since this method does not allow clarification of information about sender identity.Use of electronic signatures, electronic identities, checgs and ensures a very high level of data security in interchange data processes. E-signature allows e-business companies to transfer the company’s operation business processes and their application to the organization and management in the electronic environment, also automate internal and external compans processes, includinggon-going business processes.The object of paper is .-signature and time stamping application in the theoretical and practical way.The goal of this paper while evaluating and estimating the .-signature and time stamping application, i’s regulation and legal implementation worldwidesand in Lithuania—is to provideluseful recommendations for more efficient impact developing -commerce and -business in situations when -signature and time stamping is used for ensuring electronic contracs security.

  2. Impact of Electronic Signatures and Time Stamping for the Protection of Electronic Agreements

    Directory of Open Access Journals (Sweden)

    Tadas Limba

    2013-02-01

    Full Text Available The article e495 valuates the impact of e-signatures and time stamping on electronic contracts and electronic documents for performing e-business opportunities and goals, and analyses e-signature application for business cases. Various electronic services, virtual shopping, electronic cash transactions are becoming increasingly popular as they allow users to quickly perform different actions, operations and functions. It is important not only for convenience, but also to ensure consumer data security and reliability. Security reasons are not enough for security transmitted data, since this method does not allow clarification of information about sender identity. Use of electronic signatures, electronic identities, checgs and ensures a very high level of data security in interchange data processes. E-signature allows e-business companies to transfer the company’s operation business processes and their application to the organization and management in the electronic environment, also automate internal and external compans processes, includinggon-going business processes. The object of paper is .-signature and time stamping application in the theoretical and practical way. The goal of this paper while evaluating and estimating the .-signature and time stamping application, i’s regulation and legal implementation worldwidesand in Lithuania—is to provideluseful recommendations for more efficient impact developing -commerce and -business in situations when -signature and time stamping is used for ensuring electronic contracs security.

  3. Automated Offline Arabic Signature Verification System using Multiple Features Fusion for Forensic Applications

    Directory of Open Access Journals (Sweden)

    Saad M. Darwish

    2016-12-01

    Full Text Available The signature of a person is one of the most popular and legally accepted behavioral biometrics that provides a secure means for verification and personal identification in many applications such as financial, commercial and legal transactions. The objective of the signature verification system is to classify between genuine and forged signatures that are often associated with intrapersonal and interpersonal variability. Unlike other languages, Arabic has unique features; it contains diacritics, ligatures, and overlapping. Because of lacking any form of dynamic information during the Arabic signature’s writing process, it will be more difficult to obtain higher verification accuracy. This paper addresses the above difficulty by introducing a novel offline Arabic signature verification algorithm. The key point is using multiple feature fusion with fuzzy modeling to capture different aspects of a signature individually in order to improve the verification accuracy. State-of-the-art techniques adopt the fuzzy set to describe the properties of the extracted features to handle a signature’s uncertainty; this work also employs the fuzzy variables to describe the degree of similarity of the signature’s features to deal with the ambiguity of questioned document examiner judgment of signature similarity. It is concluded from the experimental results that the verification system performs well and has the ability to reduce both False Acceptance Rate (FAR and False Rejection Rate (FRR.

  4. 21 CFR 11.70 - Signature/record linking.

    Science.gov (United States)

    2010-04-01

    ... 21 Food and Drugs 1 2010-04-01 2010-04-01 false Signature/record linking. 11.70 Section 11.70 Food... RECORDS; ELECTRONIC SIGNATURES Electronic Records § 11.70 Signature/record linking. Electronic signatures and handwritten signatures executed to electronic records shall be linked to their respective...

  5. 15 CFR 908.16 - Signature.

    Science.gov (United States)

    2010-01-01

    ... 15 Commerce and Foreign Trade 3 2010-01-01 2010-01-01 false Signature. 908.16 Section 908.16 Commerce and Foreign Trade Regulations Relating to Commerce and Foreign Trade (Continued) NATIONAL OCEANIC... SUBMITTING REPORTS ON WEATHER MODIFICATION ACTIVITIES § 908.16 Signature. All reports filed with the National...

  6. 12 CFR 269b.731 - Signature.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 3 2010-01-01 2010-01-01 false Signature. 269b.731 Section 269b.731 Banks and Banking FEDERAL RESERVE SYSTEM (CONTINUED) BOARD OF GOVERNORS OF THE FEDERAL RESERVE SYSTEM CHARGES OF UNFAIR LABOR PRACTICES General Rules § 269b.731 Signature. The original of each document filed shall be...

  7. The Pedagogic Signature of the Teaching Profession

    Science.gov (United States)

    Kiel, Ewald; Lerche, Thomas; Kollmannsberger, Markus; Oubaid, Viktor; Weiss, Sabine

    2016-01-01

    Lee S. Shulman deplores that the field of education as a profession does not have a pedagogic signature, which he characterizes as a synthesis of cognitive, practical and moral apprenticeship. In this context, the following study has three goals: 1) In the first theoretical part, the basic problems of constructing a pedagogic signature are…

  8. Infrared ship signature analysis and optimisation

    NARCIS (Netherlands)

    Neele, F.P.

    2005-01-01

    The last decade has seen an increase in the awareness of the infrared signature of naval ships. New ship designs show that infrared signature reduction measures are being incorporated, such as exhaust gas cooling systems, relocation of the exhausts and surface cooling systems. Hull and

  9. Does Social Work Have a Signature Pedagogy?

    Science.gov (United States)

    Earls Larrison, Tara; Korr, Wynne S.

    2013-01-01

    This article contributes to discourse on signature pedagogy by reconceptualizing how our pedagogies are understood and defined for social work education. We critique the view that field education is social work's signature pedagogy and consider what pedagogies are distinct about the teaching and learning of social work. Using Shulman's…

  10. Analysis of signature wrapping attacks and countermeasures

    DEFF Research Database (Denmark)

    Gajek, Sebastian; Jensen, Meiko; Liao, Lijun

    2009-01-01

    In recent research it turned out that Boolean verification, of digital signatures in the context of WSSecurity, is likely to fail: If parts of a SOAP message, are signed and the signature verification applied to, the whole document returns true, then nevertheless the, document may have been...

  11. 48 CFR 4.102 - Contractor's signature.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 1 2010-10-01 2010-10-01 false Contractor's signature. 4.102 Section 4.102 Federal Acquisition Regulations System FEDERAL ACQUISITION REGULATION GENERAL ADMINISTRATIVE MATTERS Contract Execution 4.102 Contractor's signature. (a) Individuals. A contract with an...

  12. Signature Pedagogies in Outdoor Education

    Science.gov (United States)

    Thomas, Glyn

    2015-01-01

    The new National health and physical education curriculum in Australia includes outdoor education activities as a viable way to achieve intended learning outcomes. However, most health and physical education teacher education courses do not provide a strong focus on the theories, skills and pedagogies that are unique to the effective use of…

  13. Heart Failure: Unique to Older Adults

    Science.gov (United States)

    ... to Z › Heart Failure › Unique to Older Adults Font size A A A Print Share Glossary Unique ... will suffer from depression at some point. This type of severe depression is more serious than the ...

  14. Geochemical signature of radioactive waste: oil NORM

    Energy Technology Data Exchange (ETDEWEB)

    Costa, Gilberto T. de Paula; Costa-de-Moura, Jorge; Gomes, Carlos de Almeida; Sampaio, Emidio A. Lopes, E-mail: gilberto.costa@cnen.gov.br, E-mail: jcmoura@cnen.gov.br, E-mail: cgomes@cnen.gov.br [Comissao Nacional de Energia Nuclear (CNEN), Rio de Janeiro, RJ (Brazil). Div. de Controle de Rejeitos e Transporte de Materiais Radioativos

    2017-07-01

    The Brazilian Nuclear Agency (CNEN) rules all nuclear activity in Brazil as demanded by the Federal Constitution, articles 21, XXIII, and 177, V, and by the Federal Acts 4.118/62 and 10.308/2001. Therefore, the CNEN is responsible for any radioactive waste disposal in the country. Oil Naturally Occurring Radioactive Materials (Oil NORM) in this paper refers to waste coming from oil exploration. Oil NORM has called much attention during the last decades, mostly because it is not possible to determine its primary source due to the actual absence of regulatory control mechanism. There is no efficient regulatory tool which allows determining the origin of such NORM wastes even among those facilities under regulatory control. This fact may encourage non-authorized radioactive material transportation, smuggling and terrorism. The aim of this project is to provide a geochemical signature for each oil NORM waste using its naturally occurring isotopic composition to identify its origin. The here proposed method is a specific geochemical modeling of oil sludge NORM samples which are analyzed for radioisotopes normally present in oil pipes, such as {sup 228}Ac, {sup 214}Bi and {sup 214}Pb. The activity ratios are plotted in scatter diagrams. This method was successfully tested with data of different sources obtained from analysis reports from the Campos Basin/Brazil and from literature. (author)

  15. Geochemical signature of radioactive waste: oil NORM

    International Nuclear Information System (INIS)

    Costa, Gilberto T. de Paula; Costa-de-Moura, Jorge; Gomes, Carlos de Almeida; Sampaio, Emidio A. Lopes

    2017-01-01

    The Brazilian Nuclear Agency (CNEN) rules all nuclear activity in Brazil as demanded by the Federal Constitution, articles 21, XXIII, and 177, V, and by the Federal Acts 4.118/62 and 10.308/2001. Therefore, the CNEN is responsible for any radioactive waste disposal in the country. Oil Naturally Occurring Radioactive Materials (Oil NORM) in this paper refers to waste coming from oil exploration. Oil NORM has called much attention during the last decades, mostly because it is not possible to determine its primary source due to the actual absence of regulatory control mechanism. There is no efficient regulatory tool which allows determining the origin of such NORM wastes even among those facilities under regulatory control. This fact may encourage non-authorized radioactive material transportation, smuggling and terrorism. The aim of this project is to provide a geochemical signature for each oil NORM waste using its naturally occurring isotopic composition to identify its origin. The here proposed method is a specific geochemical modeling of oil sludge NORM samples which are analyzed for radioisotopes normally present in oil pipes, such as 228 Ac, 214 Bi and 214 Pb. The activity ratios are plotted in scatter diagrams. This method was successfully tested with data of different sources obtained from analysis reports from the Campos Basin/Brazil and from literature. (author)

  16. Signatures of Extended Storage of Used Nuclear Fuel Comprehensive Final Report

    Energy Technology Data Exchange (ETDEWEB)

    Rauch, Eric Benton [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2016-09-21

    This report serves as a comprehensive overview of the Extended Storage of Used Nuclear Fuel work performed for the Material Protection, Accounting and Control Technologies campaign under the Department of Energy Office of Nuclear Energy. This paper describes a signature based on the source and fissile material distribution found within a population of used fuel assemblies combined with the neutron absorbers found within cask design that is unique to a specific cask with its specific arrangement of fuel. The paper describes all the steps used in producing and analyzing this signature from the beginning to the project end.

  17. Real time gamma-ray signature identifier

    Science.gov (United States)

    Rowland, Mark [Alamo, CA; Gosnell, Tom B [Moraga, CA; Ham, Cheryl [Livermore, CA; Perkins, Dwight [Livermore, CA; Wong, James [Dublin, CA

    2012-05-15

    A real time gamma-ray signature/source identification method and system using principal components analysis (PCA) for transforming and substantially reducing one or more comprehensive spectral libraries of nuclear materials types and configurations into a corresponding concise representation/signature(s) representing and indexing each individual predetermined spectrum in principal component (PC) space, wherein an unknown gamma-ray signature may be compared against the representative signature to find a match or at least characterize the unknown signature from among all the entries in the library with a single regression or simple projection into the PC space, so as to substantially reduce processing time and computing resources and enable real-time characterization and/or identification.

  18. DIGITAL SIGNATURE IN THE WAY OF LAW

    Directory of Open Access Journals (Sweden)

    Ruya Samlı

    2013-01-01

    Full Text Available Signature can be defined as a person’s name or special signs that he/she writes when he/she wants to indicate he/she wrote or confirm that writing. A person signs many times in his/her life. A person’s signature that is used for thousands of times for many things from formal documents to exams has importance for that person. Especially, signing in legal operations is an operation that can build important results. If a person’s signature is imitated by another person, he/she can become beholden, donate his/her whole wealth, commits offences or do some judicial operations. Today, because many operations can be done with digital environments and internet, signature operation that provides identity validation must also be carried to digital environment. In this paper digital signature concept that is approved for this reason and its situation in international areas and Turkish laws are investigated.

  19. Integrative Metabolic Signatures for Hepatic Radiation Injury.

    Directory of Open Access Journals (Sweden)

    Irwin Jack Kurland

    Full Text Available Radiation-induced liver disease (RILD is a dose-limiting factor in curative radiation therapy (RT for liver cancers, making early detection of radiation-associated liver injury absolutely essential for medical intervention. A metabolomic approach was used to determine metabolic signatures that could serve as biomarkers for early detection of RILD in mice.Anesthetized C57BL/6 mice received 0, 10 or 50 Gy Whole Liver Irradiation (WLI and were contrasted to mice, which received 10 Gy whole body irradiation (WBI. Liver and plasma samples were collected at 24 hours after irradiation. The samples were processed using Gas Chromatography/Mass Spectrometry and Liquid Chromatography/Mass Spectrometry.Twenty four hours after WLI, 407 metabolites were detected in liver samples while 347 metabolites were detected in plasma. Plasma metabolites associated with 50 Gy WLI included several amino acids, purine and pyrimidine metabolites, microbial metabolites, and most prominently bradykinin and 3-indoxyl-sulfate. Liver metabolites associated with 50 Gy WLI included pentose phosphate, purine, and pyrimidine metabolites in liver. Plasma biomarkers in common between WLI and WBI were enriched in microbial metabolites such as 3 indoxyl sulfate, indole-3-lactic acid, phenyllactic acid, pipecolic acid, hippuric acid, and markers of DNA damage such as 2-deoxyuridine. Metabolites associated with tryptophan and indoles may reflect radiation-induced gut microbiome effects. Predominant liver biomarkers in common between WBI and WLI were amino acids, sugars, TCA metabolites (fumarate, fatty acids (lineolate, n-hexadecanoic acid and DNA damage markers (uridine.We identified a set of metabolomic markers that may prove useful as plasma biomarkers of RILD and WBI. Pathway analysis also suggested that the unique metabolic changes observed after liver irradiation was an integrative response of the intestine, liver and kidney.

  20. Joint Application of Concentrations and Isotopic Signatures to Investigate the Global Atmospheric Carbon Monoxide Budget: Inverse Modeling Approach

    Science.gov (United States)

    Park, K.; Mak, J. E.; Emmons, L. K.

    2008-12-01

    Carbon monoxide is not only an important component for determining the atmospheric oxidizing capacity but also a key trace gas in the atmospheric chemistry of the Earth's background environment. The global CO cycle and its change are closely related to both the change of CO mixing ratio and the change of source strength. Previously, to estimate the global CO budget, most top-down estimation techniques have been applied the concentrations of CO solely. Since CO from certain sources has a unique isotopic signature, its isotopes provide additional information to constrain its sources. Thus, coupling the concentration and isotope fraction information enables to tightly constrain CO flux by its sources and allows better estimations on the global CO budget. MOZART4 (Model for Ozone And Related chemical Tracers), a 3-D global chemical transport model developed at NCAR, MPI for meteorology and NOAA/GFDL and is used to simulate the global CO concentration and its isotopic signature. Also, a tracer version of MOZART4 which tagged for C16O and C18O from each region and each source was developed to see their contributions to the atmosphere efficiently. Based on the nine-year-simulation results we analyze the influences of each source of CO to the isotopic signature and the concentration. Especially, the evaluations are focused on the oxygen isotope of CO (δ18O), which has not been extensively studied yet. To validate the model performance, CO concentrations and isotopic signatures measured from MPI, NIWA and our lab are compared to the modeled results. The MOZART4 reproduced observational data fairly well; especially in mid to high latitude northern hemisphere. Bayesian inversion techniques have been used to estimate the global CO budget with combining observed and modeled CO concentration. However, previous studies show significant differences in their estimations on CO source strengths. Because, in addition to the CO mixing ratio, isotopic signatures are independent tracers

  1. Computational topology and the Unique Games Conjecture

    OpenAIRE

    Grochow, Joshua A.; Tucker-Foltz, Jamie

    2018-01-01

    Covering spaces of graphs have long been useful for studying expanders (as "graph lifts") and unique games (as the "label-extended graph"). In this paper we advocate for the thesis that there is a much deeper relationship between computational topology and the Unique Games Conjecture. Our starting point is Linial's 2005 observation that the only known problems whose inapproximability is equivalent to the Unique Games Conjecture - Unique Games and Max-2Lin - are instances of Maximum Section of...

  2. Interim Report on Multiple Sequence Alignments and TaqMan Signature Mapping to Phylogenetic Trees

    Energy Technology Data Exchange (ETDEWEB)

    Gardner, S; Jaing, C

    2012-03-27

    The goal of this project is to develop forensic genotyping assays for select agent viruses, addressing a significant capability gap for the viral bioforensics and law enforcement community. We used a multipronged approach combining bioinformatics analysis, PCR-enriched samples, microarrays and TaqMan assays to develop high resolution and cost effective genotyping methods for strain level forensic discrimination of viruses. We have leveraged substantial experience and efficiency gained through year 1 on software development, SNP discovery, TaqMan signature design and phylogenetic signature mapping to scale up the development of forensics signatures in year 2. In this report, we have summarized the Taqman signature development for South American hemorrhagic fever viruses, tick-borne encephalitis viruses and henipaviruses, Old World Arenaviruses, filoviruses, Crimean-Congo hemorrhagic fever virus, Rift Valley fever virus and Japanese encephalitis virus.

  3. DrugSig: A resource for computational drug repositioning utilizing gene expression signatures.

    Directory of Open Access Journals (Sweden)

    Hongyu Wu

    Full Text Available Computational drug repositioning has been proved as an effective approach to develop new drug uses. However, currently existing strategies strongly rely on drug response gene signatures which scattered in separated or individual experimental data, and resulted in low efficient outputs. So, a fully drug response gene signatures database will be very helpful to these methods. We collected drug response microarray data and annotated related drug and targets information from public databases and scientific literature. By selecting top 500 up-regulated and down-regulated genes as drug signatures, we manually established the DrugSig database. Currently DrugSig contains more than 1300 drugs, 7000 microarray and 800 targets. Moreover, we developed the signature based and target based functions to aid drug repositioning. The constructed database can serve as a resource to quicken computational drug repositioning. Database URL: http://biotechlab.fudan.edu.cn/database/drugsig/.

  4. Mycobacterium tuberculosis strains exhibit differential and strain-specific molecular signatures in pulmonary epithelial cells.

    Science.gov (United States)

    Mvubu, Nontobeko Eunice; Pillay, Balakrishna; Gamieldien, Junaid; Bishai, William; Pillay, Manormoney

    2016-12-01

    Although pulmonary epithelial cells are integral to innate and adaptive immune responses during Mycobacterium tuberculosis infection, global transcriptomic changes in these cells remain largely unknown. Changes in gene expression induced in pulmonary epithelial cells infected with M. tuberculosis F15/LAM4/KZN, F11, F28, Beijing and Unique genotypes were investigated by RNA sequencing (RNA-Seq). The Illumina HiSeq 2000 platform generated 50 bp reads that were mapped to the human genome (Hg19) using Tophat (2.0.10). Differential gene expression induced by the different strains in infected relative to the uninfected cells was quantified and compared using Cufflinks (2.1.0) and MeV (4.0.9), respectively. Gene expression varied among the strains with the total number of genes as follows: F15/LAM4/KZN (1187), Beijing (1252), F11 (1639), F28 (870), Unique (886) and H37Rv (1179). A subset of 292 genes was commonly induced by all strains, where 52 genes were down-regulated while 240 genes were up-regulated. Differentially expressed genes were compared among the strains and the number of induced strain-specific gene signatures were as follows: F15/LAM4/KZN (138), Beijing (52), F11 (255), F28 (55), Unique (186) and H37Rv (125). Strain-specific molecular gene signatures associated with functional pathways were observed only for the Unique and H37Rv strains while certain biological functions may be associated with other strain signatures. This study demonstrated that strains of M. tuberculosis induce differential gene expression and strain-specific molecular signatures in pulmonary epithelial cells. Specific signatures induced by clinical strains of M. tuberculosis can be further explored for novel host-associated biomarkers and adjunctive immunotherapies. Copyright © 2016 Elsevier Ltd. All rights reserved.

  5. Dissolved organic matter signatures vary between naturally acidic, circumneutral and groundwater-fed freshwaters in Australia.

    Science.gov (United States)

    Holland, Aleicia; Stauber, Jenny; Wood, Chris M; Trenfield, Melanie; Jolley, Dianne F

    2018-06-15

    Dissolved organic matter (DOM) plays important roles in both abiotic and biotic processes within aquatic ecosystems, and these in turn depend on the quality of the DOM. We collected and characterized chromophoric DOM (CDOM) from different Australian freshwater types (circumneutral, naturally acidic and groundwater-fed waterways), climatic regions and seasons. CDOM quality was characterized using absorbance and fluorescence spectroscopy. Excitation emission scans followed by parallel factor (PARAFAC) analysis showed that CDOM was characterized by three main components: protein-like, fulvic-like and humic-like components commonly associated with various waters globally in the Openfluor database. Principal component analysis showed that CDOM quality varied between naturally acidic, circumneutral and groundwater-fed waters, with unique CDOM quality signatures shown for each freshwater type. CDOM quality also differed significantly within some sites between seasons. Clear differences in dominant CDOM components were shown between freshwater types. Naturally acidic waters were dominated by highly aromatic (as indicated by the specific absorbance co-efficient (SAC 340 ) and the specific UV absorbance (SUVA 254 ) values which ranged between 31 and 50 cm 2  mg -1 and 3.9-5.7 mg C -1  m -1 respectively), humic-like CDOM of high molecular weight (as indicated by abs 254/365 which ranged from 3.8 to 4.3). In contrast, circumneutral waters were dominated by fulvic-like CDOM of lower aromaticity (SAC 340 : 7-21 cm 2  mg -1 and SUVA 254 : 1.5-3.0 mg C -1  m -1 ) and lower molecular weight (abs 254/365 5.1-9.3). The groundwater-fed site had a higher abundance of protein-like CDOM, which was the least aromatic (SAC 340 : 2-5 cm 2  mg -1 and SUVA 254 : 0.58-1.1 mg C -1  m -1 ). CDOM was generally less aromatic, of a lower molecular weight and more autochthonous in nature during the summer/autumn sampling compared to winter/spring. Significant

  6. Implementing Signature Neural Networks with Spiking Neurons.

    Science.gov (United States)

    Carrillo-Medina, José Luis; Latorre, Roberto

    2016-01-01

    Spiking Neural Networks constitute the most promising approach to develop realistic Artificial Neural Networks (ANNs). Unlike traditional firing rate-based paradigms, information coding in spiking models is based on the precise timing of individual spikes. It has been demonstrated that spiking ANNs can be successfully and efficiently applied to multiple realistic problems solvable with traditional strategies (e.g., data classification or pattern recognition). In recent years, major breakthroughs in neuroscience research have discovered new relevant computational principles in different living neural systems. Could ANNs benefit from some of these recent findings providing novel elements of inspiration? This is an intriguing question for the research community and the development of spiking ANNs including novel bio-inspired information coding and processing strategies is gaining attention. From this perspective, in this work, we adapt the core concepts of the recently proposed Signature Neural Network paradigm-i.e., neural signatures to identify each unit in the network, local information contextualization during the processing, and multicoding strategies for information propagation regarding the origin and the content of the data-to be employed in a spiking neural network. To the best of our knowledge, none of these mechanisms have been used yet in the context of ANNs of spiking neurons. This paper provides a proof-of-concept for their applicability in such networks. Computer simulations show that a simple network model like the discussed here exhibits complex self-organizing properties. The combination of multiple simultaneous encoding schemes allows the network to generate coexisting spatio-temporal patterns of activity encoding information in different spatio-temporal spaces. As a function of the network and/or intra-unit parameters shaping the corresponding encoding modality, different forms of competition among the evoked patterns can emerge even in the absence

  7. 48 CFR 804.101 - Contracting officer's signature.

    Science.gov (United States)

    2010-10-01

    ... signature. 804.101 Section 804.101 Federal Acquisition Regulations System DEPARTMENT OF VETERANS AFFAIRS GENERAL ADMINISTRATIVE MATTERS Contract Execution 804.101 Contracting officer's signature. (a) If a... signature. ...

  8. Maximizing biomarker discovery by minimizing gene signatures

    Directory of Open Access Journals (Sweden)

    Chang Chang

    2011-12-01

    Full Text Available Abstract Background The use of gene signatures can potentially be of considerable value in the field of clinical diagnosis. However, gene signatures defined with different methods can be quite various even when applied the same disease and the same endpoint. Previous studies have shown that the correct selection of subsets of genes from microarray data is key for the accurate classification of disease phenotypes, and a number of methods have been proposed for the purpose. However, these methods refine the subsets by only considering each single feature, and they do not confirm the association between the genes identified in each gene signature and the phenotype of the disease. We proposed an innovative new method termed Minimize Feature's Size (MFS based on multiple level similarity analyses and association between the genes and disease for breast cancer endpoints by comparing classifier models generated from the second phase of MicroArray Quality Control (MAQC-II, trying to develop effective meta-analysis strategies to transform the MAQC-II signatures into a robust and reliable set of biomarker for clinical applications. Results We analyzed the similarity of the multiple gene signatures in an endpoint and between the two endpoints of breast cancer at probe and gene levels, the results indicate that disease-related genes can be preferably selected as the components of gene signature, and that the gene signatures for the two endpoints could be interchangeable. The minimized signatures were built at probe level by using MFS for each endpoint. By applying the approach, we generated a much smaller set of gene signature with the similar predictive power compared with those gene signatures from MAQC-II. Conclusions Our results indicate that gene signatures of both large and small sizes could perform equally well in clinical applications. Besides, consistency and biological significances can be detected among different gene signatures, reflecting the

  9. Stable isotope signatures reflect dietary diversity in European forest moths.

    Science.gov (United States)

    Adams, Marc-Oliver; Seifert, Carlo Lutz; Lehner, Lisamarie; Truxa, Christine; Wanek, Wolfgang; Fiedler, Konrad

    2016-01-01

    Information on larval diet of many holometabolous insects remains incomplete. Carbon (C) and nitrogen (N) stable isotope analysis in adult wing tissue can provide an efficient tool to infer such trophic relationships. The present study examines whether moth feeding guild affiliations taken from literature are reflected in isotopic signatures. Non-metric multidimensional scaling and permutational analysis of variance indicate that centroids of dietary groups differ significantly. In particular, species whose larvae feed on mosses or aquatic plants deviated from those that consumed vascular land plants. Moth δ(15)N signatures spanned a broader range, and were less dependent on species identity than δ(13)C values. Comparison between moth samples and ostensible food sources revealed heterogeneity in the lichenivorous guild, indicating only Lithosia quadra as an obligate lichen feeder. Among root-feeding Agrotis segetum, some specimens appear to have developed on crop plants in forest-adjacent farm land. Reed-feeding stem-borers may partially rely on intermediary trophic levels such as fungal or bacterial growth. Diagnostic partitioning of moth dietary guilds based on isotopic signatures alone could not be achieved, but hypotheses on trophic relationships based on often vague literature records could be assessed with high resolution. Hence, the approach is well suited for basic categorization of moths where diet is unknown or notoriously difficult to observe (i.e. Microlepidoptera, lichen-feeders).

  10. Radiation Gene-expression Signatures in Primary Breast Cancer Cells.

    Science.gov (United States)

    Minafra, Luigi; Bravatà, Valentina; Cammarata, Francesco P; Russo, Giorgio; Gilardi, Maria C; Forte, Giusi I

    2018-05-01

    In breast cancer (BC) care, radiation therapy (RT) is an efficient treatment to control localized tumor. Radiobiological research is needed to understand molecular differences that affect radiosensitivity of different tumor subtypes and the response variability. The aim of this study was to analyze gene expression profiling (GEP) in primary BC cells following irradiation with doses of 9 Gy and 23 Gy delivered by intraoperative electron radiation therapy (IOERT) in order to define gene signatures of response to high doses of ionizing radiation. We performed GEP by cDNA microarrays and evaluated cell survival after IOERT treatment in primary BC cell cultures. Real-time quantitative reverse transcription polymerase chain reaction (qRT-PCR) was performed to validate candidate genes. We showed, for the first time, a 4-gene and a 6-gene signature, as new molecular biomarkers, in two primary BC cell cultures after exposure at 9 Gy and 23 Gy respectively, for which we observed a significantly high survival rate. Gene signatures activated by different doses of ionizing radiation may predict response to RT and contribute to defining a personalized biological-driven treatment plan. Copyright© 2018, International Institute of Anticancer Research (Dr. George J. Delinasios), All rights reserved.

  11. Specific extracellular matrix remodeling signature of colon hepatic metastases.

    Directory of Open Access Journals (Sweden)

    Maguy Del Rio

    Full Text Available To identify genes implicated in metastatic colonization of the liver in colorectal cancer, we collected pairs of primary tumors and hepatic metastases before chemotherapy in 13 patients. We compared mRNA expression in the pairs of patients to identify genes deregulated during metastatic evolution. We then validated the identified genes using data obtained by different groups. The 33-gene signature was able to classify 87% of hepatic metastases, 98% of primary tumors, 97% of normal colon mucosa, and 95% of normal liver tissues in six datasets obtained using five different microarray platforms. The identified genes are specific to colon cancer and hepatic metastases since other metastatic locations and hepatic metastases originating from breast cancer were not classified by the signature. Gene Ontology term analysis showed that 50% of the genes are implicated in extracellular matrix remodeling, and more precisely in cell adhesion, extracellular matrix organization and angiogenesis. Because of the high efficiency of the signature to classify colon hepatic metastases, the identified genes represent promising targets to develop new therapies that will specifically affect hepatic metastasis microenvironment.

  12. Security analysis and improvements of arbitrated quantum signature schemes

    International Nuclear Information System (INIS)

    Zou Xiangfu; Qiu Daowen

    2010-01-01

    A digital signature is a mathematical scheme for demonstrating the authenticity of a digital message or document. For signing quantum messages, some arbitrated quantum signature (AQS) schemes have been proposed. It was claimed that these AQS schemes could guarantee unconditional security. However, we show that they can be repudiated by the receiver Bob. To conquer this shortcoming, we construct an AQS scheme using a public board. The AQS scheme not only avoids being disavowed by the receiver but also preserves all merits in the existing schemes. Furthermore, we discover that entanglement is not necessary while all these existing AQS schemes depend on entanglement. Therefore, we present another AQS scheme without utilizing entangled states in the signing phase and the verifying phase. This scheme has three advantages: it does not utilize entangled states and it preserves all merits in the existing schemes; the signature can avoid being disavowed by the receiver; and it provides a higher efficiency in transmission and reduces the complexity of implementation.

  13. Signature proteins for the major clades of Cyanobacteria

    Directory of Open Access Journals (Sweden)

    Mathews Divya W

    2010-01-01

    Full Text Available Abstract Background The phylogeny and taxonomy of cyanobacteria is currently poorly understood due to paucity of reliable markers for identification and circumscription of its major clades. Results A combination of phylogenomic and protein signature based approaches was used to characterize the major clades of cyanobacteria. Phylogenetic trees were constructed for 44 cyanobacteria based on 44 conserved proteins. In parallel, Blastp searches were carried out on each ORF in the genomes of Synechococcus WH8102, Synechocystis PCC6803, Nostoc PCC7120, Synechococcus JA-3-3Ab, Prochlorococcus MIT9215 and Prochlor. marinus subsp. marinus CCMP1375 to identify proteins that are specific for various main clades of cyanobacteria. These studies have identified 39 proteins that are specific for all (or most cyanobacteria and large numbers of proteins for other cyanobacterial clades. The identified signature proteins include: (i 14 proteins for a deep branching clade (Clade A of Gloebacter violaceus and two diazotrophic Synechococcus strains (JA-3-3Ab and JA2-3-B'a; (ii 5 proteins that are present in all other cyanobacteria except those from Clade A; (iii 60 proteins that are specific for a clade (Clade C consisting of various marine unicellular cyanobacteria (viz. Synechococcus and Prochlorococcus; (iv 14 and 19 signature proteins that are specific for the Clade C Synechococcus and Prochlorococcus strains, respectively; (v 67 proteins that are specific for the Low B/A ecotype Prochlorococcus strains, containing lower ratio of chl b/a2 and adapted to growth at high light intensities; (vi 65 and 8 proteins that are specific for the Nostocales and Chroococcales orders, respectively; and (vii 22 and 9 proteins that are uniquely shared by various Nostocales and Oscillatoriales orders, or by these two orders and the Chroococcales, respectively. We also describe 3 conserved indels in flavoprotein, heme oxygenase and protochlorophyllide oxidoreductase proteins that

  14. L1000CDS2: LINCS L1000 characteristic direction signatures search engine.

    Science.gov (United States)

    Duan, Qiaonan; Reid, St Patrick; Clark, Neil R; Wang, Zichen; Fernandez, Nicolas F; Rouillard, Andrew D; Readhead, Ben; Tritsch, Sarah R; Hodos, Rachel; Hafner, Marc; Niepel, Mario; Sorger, Peter K; Dudley, Joel T; Bavari, Sina; Panchal, Rekha G; Ma'ayan, Avi

    2016-01-01

    The library of integrated network-based cellular signatures (LINCS) L1000 data set currently comprises of over a million gene expression profiles of chemically perturbed human cell lines. Through unique several intrinsic and extrinsic benchmarking schemes, we demonstrate that processing the L1000 data with the characteristic direction (CD) method significantly improves signal to noise compared with the MODZ method currently used to compute L1000 signatures. The CD processed L1000 signatures are served through a state-of-the-art web-based search engine application called L1000CDS 2 . The L1000CDS 2 search engine provides prioritization of thousands of small-molecule signatures, and their pairwise combinations, predicted to either mimic or reverse an input gene expression signature using two methods. The L1000CDS 2 search engine also predicts drug targets for all the small molecules profiled by the L1000 assay that we processed. Targets are predicted by computing the cosine similarity between the L1000 small-molecule signatures and a large collection of signatures extracted from the gene expression omnibus (GEO) for single-gene perturbations in mammalian cells. We applied L1000CDS 2 to prioritize small molecules that are predicted to reverse expression in 670 disease signatures also extracted from GEO, and prioritized small molecules that can mimic expression of 22 endogenous ligand signatures profiled by the L1000 assay. As a case study, to further demonstrate the utility of L1000CDS 2 , we collected expression signatures from human cells infected with Ebola virus at 30, 60 and 120 min. Querying these signatures with L1000CDS 2 we identified kenpaullone, a GSK3B/CDK2 inhibitor that we show, in subsequent experiments, has a dose-dependent efficacy in inhibiting Ebola infection in vitro without causing cellular toxicity in human cell lines. In summary, the L1000CDS 2 tool can be applied in many biological and biomedical settings, while improving the extraction of

  15. Genomic Signatures of Sexual Conflict.

    Science.gov (United States)

    Kasimatis, Katja R; Nelson, Thomas C; Phillips, Patrick C

    2017-10-30

    Sexual conflict is a specific class of intergenomic conflict that describes the reciprocal sex-specific fitness costs generated by antagonistic reproductive interactions. The potential for sexual conflict is an inherent property of having a shared genome between the sexes and, therefore, is an extreme form of an environment-dependent fitness effect. In this way, many of the predictions from environment-dependent selection can be used to formulate expected patterns of genome evolution under sexual conflict. However, the pleiotropic and transmission constraints inherent to having alleles move across sex-specific backgrounds from generation to generation further modulate the anticipated signatures of selection. We outline methods for detecting candidate sexual conflict loci both across and within populations. Additionally, we consider the ability of genome scans to identify sexually antagonistic loci by modeling allele frequency changes within males and females due to a single generation of selection. In particular, we highlight the need to integrate genotype, phenotype, and functional information to truly distinguish sexual conflict from other forms of sexual differentiation. © The American Genetic Association 2017. All rights reserved. For permissions, please e-mail: journals.permissions@oup.com.

  16. Transcriptomic signatures in cartilage ageing

    Science.gov (United States)

    2013-01-01

    Introduction Age is an important factor in the development of osteoarthritis. Microarray studies provide insight into cartilage aging but do not reveal the full transcriptomic phenotype of chondrocytes such as small noncoding RNAs, pseudogenes, and microRNAs. RNA-Seq is a powerful technique for the interrogation of large numbers of transcripts including nonprotein coding RNAs. The aim of the study was to characterise molecular mechanisms associated with age-related changes in gene signatures. Methods RNA for gene expression analysis using RNA-Seq and real-time PCR analysis was isolated from macroscopically normal cartilage of the metacarpophalangeal joints of eight horses; four young donors (4 years old) and four old donors (>15 years old). RNA sequence libraries were prepared following ribosomal RNA depletion and sequencing was undertaken using the Illumina HiSeq 2000 platform. Differentially expressed genes were defined using Benjamini-Hochberg false discovery rate correction with a generalised linear model likelihood ratio test (P ageing cartilage. Conclusion There was an age-related dysregulation of matrix, anabolic and catabolic cartilage factors. This study has increased our knowledge of transcriptional networks in cartilage ageing by providing a global view of the transcriptome. PMID:23971731

  17. Reduction of a Ship's Magnetic Field Signatures

    CERN Document Server

    Holmes, John

    2008-01-01

    Decreasing the magnetic field signature of a naval vessel will reduce its susceptibility to detonating naval influence mines and the probability of a submarine being detected by underwater barriers and maritime patrol aircraft. Both passive and active techniques for reducing the magnetic signatures produced by a vessel's ferromagnetism, roll-induced eddy currents, corrosion-related sources, and stray fields are presented. Mathematical models of simple hull shapes are used to predict the levels of signature reduction that might be achieved through the use of alternate construction materials. Al

  18. Molecular signatures of thyroid follicular neoplasia

    DEFF Research Database (Denmark)

    Borup, R.; Rossing, M.; Henao, Ricardo

    2010-01-01

    The molecular pathways leading to thyroid follicular neoplasia are incompletely understood, and the diagnosis of follicular tumors is a clinical challenge. To provide leads to the pathogenesis and diagnosis of the tumors, we examined the global transcriptome signatures of follicular thyroid...... a mechanism for cancer progression, which is why we exploited the results in order to generate a molecular classifier that could identify 95% of all carcinomas. Validation employing public domain and cross-platform data demonstrated that the signature was robust and could diagnose follicular nodules...... and robust genetic signature for the diagnosis of FA and FC. Endocrine-Related Cancer (2010) 17 691-708...

  19. DIGITAL SIGNATURE IN THE WAY OF LAW

    OpenAIRE

    Ruya Samlı

    2013-01-01

    Signature can be defined as a person’s name or special signs that he/she writes when he/she wants to indicate he/she wrote or confirm that writing. A person signs many times in his/her life. A person’s signature that is used for thousands of times for many things from formal documents to exams has importance for that person. Especially, signing in legal operations is an operation that can build important results. If a person’s signature is imitated by another person, he/she can be...

  20. Analytical validation of a melanoma diagnostic gene signature using formalin-fixed paraffin-embedded melanocytic lesions.

    Science.gov (United States)

    Warf, M Bryan; Flake, Darl D; Adams, Doug; Gutin, Alexander; Kolquist, Kathryn A; Wenstrup, Richard J; Roa, Benjamin B

    2015-01-01

    These studies were to validate the analytical performance of a gene expression signature that differentiates melanoma and nevi, using RNA expression from 14 signature genes and nine normalization genes that generates a melanoma diagnostic score (MDS). Formalin-fixed paraffin-embedded melanocytic lesions were evaluated in these studies. The overall SD of the assay was determined to be 0.69 MDS units. Individual amplicons within the signature had an average amplification efficiency of 92% and a SD less than 0.5 CT. The MDS was reproducible across a 2000-fold dilution range of input RNA. Melanin, an inhibitor of PCR, does not interfere with the signature. These studies indicate this signature is robust and reproducible and is analytically validated on formalin-fixed paraffin-embedded melanocytic lesions.

  1. Magnetic Signature of Brushless Electric Motors

    National Research Council Canada - National Science Library

    Clarke, David

    2006-01-01

    Brushless electric motors are used in a number of underwater vehicles. When these underwater vehicles are used for mine clearance operations the magnetic signature of the brushless motors is important...

  2. Unique Physician Identification Number (UPIN) Directory

    Data.gov (United States)

    U.S. Department of Health & Human Services — The Unique Physician Identification Number (UPIN) Directory contains selected information on physicians, doctors of Osteopathy, limited licensed practitioners and...

  3. Signature scheme based on bilinear pairs

    Science.gov (United States)

    Tong, Rui Y.; Geng, Yong J.

    2013-03-01

    An identity-based signature scheme is proposed by using bilinear pairs technology. The scheme uses user's identity information as public key such as email address, IP address, telephone number so that it erases the cost of forming and managing public key infrastructure and avoids the problem of user private generating center generating forgery signature by using CL-PKC framework to generate user's private key.

  4. Signature for the shape of the universe

    International Nuclear Information System (INIS)

    Gomero, G.I.; Reboucas, M.J.; Teixeira, A.F.F.

    2001-03-01

    If the universe has a nontrival shape (topology) the sky may show multiple correlated images of cosmic objects. These correlations can be counched in terms of distance correlations. We propose a statistical quantity which can be used to reveal the topological signature of any Roberston-Walker (RW) spacetime with nontrivial topology. We also show through computer-aided simulations how one can extract the topological signatures of flat elliptic and hyperbolic RW universes with nontrivial topology. (author)

  5. Signature-based store checking buffer

    Science.gov (United States)

    Sridharan, Vilas; Gurumurthi, Sudhanva

    2015-06-02

    A system and method for optimizing redundant output verification, are provided. A hardware-based store fingerprint buffer receives multiple instances of output from multiple instances of computation. The store fingerprint buffer generates a signature from the content included in the multiple instances of output. When a barrier is reached, the store fingerprint buffer uses the signature to verify the content is error-free.

  6. Neutral signature Walker-VSI metrics

    International Nuclear Information System (INIS)

    Coley, A; McNutt, D; Musoke, N; Brooks, D; Hervik, S

    2014-01-01

    We will construct explicit examples of four-dimensional neutral signature Walker (but not necessarily degenerate Kundt) spaces for which all of the polynomial scalar curvature invariants vanish. We then investigate the properties of some particular subclasses of Ricci flat spaces. We also briefly describe some four-dimensional neutral signature Einstein spaces for which all of the polynomial scalar curvature invariants are constant. (paper)

  7. E-learning platform for automated testing of electronic circuits using signature analysis method

    Science.gov (United States)

    Gherghina, Cǎtǎlina; Bacivarov, Angelica; Bacivarov, Ioan C.; Petricǎ, Gabriel

    2016-12-01

    Dependability of electronic circuits can be ensured only through testing of circuit modules. This is done by generating test vectors and their application to the circuit. Testability should be viewed as a concerted effort to ensure maximum efficiency throughout the product life cycle, from conception and design stage, through production to repairs during products operating. In this paper, is presented the platform developed by authors for training for testability in electronics, in general and in using signature analysis method, in particular. The platform allows highlighting the two approaches in the field namely analog and digital signature of circuits. As a part of this e-learning platform, it has been developed a database for signatures of different electronic components meant to put into the spotlight different techniques implying fault detection, and from this there were also self-repairing techniques of the systems with this kind of components. An approach for realizing self-testing circuits based on MATLAB environment and using signature analysis method is proposed. This paper analyses the benefits of signature analysis method and simulates signature analyzer performance based on the use of pseudo-random sequences, too.

  8. Key-Insulated Undetachable Digital Signature Scheme and Solution for Secure Mobile Agents in Electronic Commerce

    Directory of Open Access Journals (Sweden)

    Yang Shi

    2016-01-01

    Full Text Available Considering the security of both the customers’ hosts and the eShops’ servers, we introduce the idea of a key-insulated undetachable digital signature, enabling mobile agents to generate undetachable digital signatures on remote hosts with the key-insulated property of the original signer’s signing key. From the theoretical perspective, we provide the formal definition and security notion of a key-insulated undetachable digital signature. From the practical perspective, we propose a concrete scheme to secure mobile agents in electronic commerce. The scheme is mainly focused on protecting the signing key from leakage and preventing the misuse of the signature algorithm on malicious servers. Agents do not carry the signing key when they generate digital signatures on behalf of the original signer, so the key is protected on remote servers. Furthermore, if a hacker gains the signing key of the original signer, the hacker is still unable to forge a signature for any time period other than the key being accessed. In addition, the encrypted function is combined with the original signer’s requirement to prevent the misuse of signing algorithm. The scheme is constructed on gap Diffie–Hellman groups with provable security, and the performance testing indicates that the scheme is efficient.

  9. Variability of grip kinetics during adult signature writing.

    Directory of Open Access Journals (Sweden)

    Bassma Ghali

    Full Text Available Grip kinetics and their variation are emerging as important considerations in the clinical assessment of handwriting pathologies, fine motor rehabilitation, biometrics, forensics and ergonomic pen design. This study evaluated the intra- and inter-participant variability of grip shape kinetics in adults during signature writing. Twenty (20 adult participants wrote on a digitizing tablet using an instrumented pen that measured the forces exerted on its barrel. Signature samples were collected over 10 days, 3 times a day, to capture temporal variations in grip shape kinetics. A kinetic topography (i.e., grip shape image was derived per signature by time-averaging the measured force at each of 32 locations around the pen barrel. The normalized cross correlations (NCC of grip shape images were calculated within- and between-participants. Several classification algorithms were implemented to gauge the error rate of participant discrimination based on grip shape kinetics. Four different grip shapes emerged and several participants made grip adjustments (change in grip shape or grip height or rotated the pen during writing. Nonetheless, intra-participant variation in grip kinetics was generally much smaller than inter-participant force variations. Using the entire grip shape images as a 32-dimensional input feature vector, a K-nearest neighbor classifier achieved an error rate of 1.2±0.4% in discriminating among participants. These results indicate that writers had unique grip shape kinetics that were repeatable over time but distinct from those of other participants. The topographic analysis of grip kinetics may inform the development of personalized interventions or customizable grips in clinical and industrial applications, respectively.

  10. A small set of succinct signature patterns distinguishes Chinese and non-Chinese HIV-1 genomes.

    Directory of Open Access Journals (Sweden)

    Yan Wang

    Full Text Available The epidemiology of HIV-1 in China has unique features that may have led to unique viral strains. We therefore tested the hypothesis that it is possible to find distinctive patterns in HIV-1 genomes sampled in China. Using a rule inference algorithm we could indeed extract from sequences of the third variable loop (V3 of HIV-1 gp120 a set of 14 signature patterns that with 89% accuracy distinguished Chinese from non-Chinese sequences. These patterns were found to be specific to HIV-1 subtype, i.e. sequences complying with pattern 1 were of subtype B, pattern 2 almost exclusively covered sequences of subtype 01_AE, etc. We then analyzed the first of these signature patterns in depth, namely that L and W at two V3 positions are specifically occurring in Chinese sequences of subtype B/B' (3% false positives. This pattern was found to be in agreement with the phylogeny of HIV-1 of subtype B inside and outside of China. We could neither reject nor convincingly confirm that the pattern is stabilized by immune escape. For further interpretation of the signature pattern we used the recently developed measure of Direct Information, and in this way discovered evidence for physical interactions between V2 and V3. We conclude by a discussion of limitations of signature patterns, and the applicability of the approach to other genomic regions and other countries.

  11. Revocable identity-based proxy re-signature against signing key exposure.

    Science.gov (United States)

    Yang, Xiaodong; Chen, Chunlin; Ma, Tingchun; Wang, Jinli; Wang, Caifen

    2018-01-01

    Identity-based proxy re-signature (IDPRS) is a novel cryptographic primitive that allows a semi-trusted proxy to convert a signature under one identity into another signature under another identity on the same message by using a re-signature key. Due to this transformation function, IDPRS is very useful in constructing privacy-preserving schemes for various information systems. Key revocation functionality is important in practical IDPRS for managing users dynamically; however, the existing IDPRS schemes do not provide revocation mechanisms that allow the removal of misbehaving or compromised users from the system. In this paper, we first introduce a notion called revocable identity-based proxy re-signature (RIDPRS) to achieve the revocation functionality. We provide a formal definition of RIDPRS as well as its security model. Then, we present a concrete RIDPRS scheme that can resist signing key exposure and prove that the proposed scheme is existentially unforgeable against adaptive chosen identity and message attacks in the standard model. To further improve the performance of signature verification in RIDPRS, we introduce a notion called server-aided revocable identity-based proxy re-signature (SA-RIDPRS). Moreover, we extend the proposed RIDPRS scheme to the SA-RIDPRS scheme and prove that this extended scheme is secure against adaptive chosen message and collusion attacks. The analysis results show that our two schemes remain efficient in terms of computational complexity when implementing user revocation procedures. In particular, in the SA-RIDPRS scheme, the verifier needs to perform only a bilinear pairing and four exponentiation operations to verify the validity of the signature. Compared with other IDPRS schemes in the standard model, our SA-RIDPRS scheme greatly reduces the computation overhead of verification.

  12. Signature Optical Cues: Emerging Technologies for Monitoring Plant Health

    Directory of Open Access Journals (Sweden)

    Anand K. Asundi

    2008-05-01

    Full Text Available Optical technologies can be developed as practical tools for monitoring plant health by providing unique spectral signatures that can be related to specific plant stresses. Signatures from thermal and fluorescence imaging have been used successfully to track pathogen invasion before visual symptoms are observed. Another approach for noninvasive plant health monitoring involves elucidating the manner with which light interacts with the plant leaf and being able to identify changes in spectral characteristics in response to specific stresses. To achieve this, an important step is to understand the biochemical and anatomical features governing leaf reflectance, transmission and absorption. Many studies have opened up possibilities that subtle changes in leaf reflectance spectra can be analyzed in a plethora of ways for discriminating nutrient and water stress, but with limited success. There has also been interest in developing transgenic phytosensors to elucidate plant status in relation to environmental conditions. This approach involves unambiguous signal creation whereby genetic modification to generate reporter plants has resulted in distinct optical signals emitted in response to specific stressors. Most of these studies are limited to laboratory or controlled greenhouse environments at leaf level. The practical translation of spectral cues for application under field conditions at canopy and regional levels by remote aerial sensing remains a challenge. The movement towards technology development is well exemplified by the Controlled Ecological Life Support System under development by NASA which brings together technologies for monitoring plant status concomitantly with instrumentation for environmental monitoring and feedback control.

  13. Global transcriptional profiling of the toxic dinoflagellate Alexandrium fundyense using Massively Parallel Signature Sequencing

    Directory of Open Access Journals (Sweden)

    Anderson Donald M

    2006-04-01

    Full Text Available Abstract Background Dinoflagellates are one of the most important classes of marine and freshwater algae, notable both for their functional diversity and ecological significance. They occur naturally as free-living cells, as endosymbionts of marine invertebrates and are well known for their involvement in "red tides". Dinoflagellates are also notable for their unusual genome content and structure, which suggests that the organization and regulation of dinoflagellate genes may be very different from that of most eukaryotes. To investigate the content and regulation of the dinoflagellate genome, we performed a global analysis of the transcriptome of the toxic dinoflagellate Alexandrium fundyense under nitrate- and phosphate-limited conditions using Massively Parallel Signature Sequencing (MPSS. Results Data from the two MPSS libraries showed that the number of unique signatures found in A. fundyense cells is similar to that of humans and Arabidopsis thaliana, two eukaryotes that have been extensively analyzed using this method. The general distribution, abundance and expression patterns of the A. fundyense signatures were also quite similar to other eukaryotes, and at least 10% of the A. fundyense signatures were differentially expressed between the two conditions. RACE amplification and sequencing of a subset of signatures showed that multiple signatures arose from sequence variants of a single gene. Single signatures also mapped to different sequence variants of the same gene. Conclusion The MPSS data presented here provide a quantitative view of the transcriptome and its regulation in these unusual single-celled eukaryotes. The observed signature abundance and distribution in Alexandrium is similar to that of other eukaryotes that have been analyzed using MPSS. Results of signature mapping via RACE indicate that many signatures result from sequence variants of individual genes. These data add to the growing body of evidence for widespread gene

  14. Uniqueness of time-independent electromagnetic fields

    DEFF Research Database (Denmark)

    Karlsson, Per W.

    1974-01-01

    As a comment on a recent paper by Steele, a more general uniqueness theorem for time-independent fields is mentioned. ©1974 American Institute of Physics......As a comment on a recent paper by Steele, a more general uniqueness theorem for time-independent fields is mentioned. ©1974 American Institute of Physics...

  15. Unique specification of Yang-Mills solutions

    International Nuclear Information System (INIS)

    Campbell, W.B.; Joseph, D.W.; Morgan, T.A.

    1980-01-01

    Screened time-independent cylindrically-symmetric solutions of Yang-Mills equations are given which show that the source does not uniquely determine the field. However, these particular solutions suggest a natural way of uniquely specifying solutions in terms of a physical realization of a symmetry group. (orig.)

  16. Constructing Dense Graphs with Unique Hamiltonian Cycles

    Science.gov (United States)

    Lynch, Mark A. M.

    2012-01-01

    It is not difficult to construct dense graphs containing Hamiltonian cycles, but it is difficult to generate dense graphs that are guaranteed to contain a unique Hamiltonian cycle. This article presents an algorithm for generating arbitrarily large simple graphs containing "unique" Hamiltonian cycles. These graphs can be turned into dense graphs…

  17. Automatic mechanical fault assessment of small wind energy systems in microgrids using electric signature analysis

    DEFF Research Database (Denmark)

    Skrimpas, Georgios Alexandros; Marhadi, Kun Saptohartyadi; Jensen, Bogi Bech

    2013-01-01

    of islanded operation. In this paper, the fault assessment is achieved efficiently and consistently via electric signature analysis (ESA). In ESA the fault related frequency components are manifested as sidebands of the existing current and voltage time harmonics. The energy content between the fundamental, 5...

  18. Early life innate immune signatures of persistent food allergy.

    Science.gov (United States)

    Neeland, Melanie R; Koplin, Jennifer J; Dang, Thanh D; Dharmage, Shyamali C; Tang, Mimi L; Prescott, Susan L; Saffery, Richard; Martino, David J; Allen, Katrina J

    2017-11-14

    Food allergy naturally resolves in a proportion of food-allergic children without intervention; however the underlying mechanisms governing the persistence or resolution of food allergy in childhood are not understood. This study aimed to define the innate immune profiles associated with egg allergy at age 1 year, determine the phenotypic changes that occur with the development of natural tolerance in childhood, and explore the relationship between early life innate immune function and serum vitamin D. This study used longitudinally collected PBMC samples from a population-based cohort of challenge-confirmed egg-allergic infants with either persistent or transient egg allergy outcomes in childhood to phenotype and quantify the functional innate immune response associated with clinical phenotypes of egg allergy. We show that infants with persistent egg allergy exhibit a unique innate immune signature, characterized by increased numbers of circulating monocytes and dendritic cells that produce more inflammatory cytokines both at baseline and following endotoxin exposure when compared with infants with transient egg allergy. Follow-up analysis revealed that this unique innate immune signature continues into childhood in those with persistent egg allergy and that increased serum vitamin D levels correlate with changes in innate immune profiles observed in children who developed natural tolerance to egg. Early life innate immune dysfunction may represent a key immunological driver and predictor of persistent food allergy in childhood. Serum vitamin D may play an immune-modulatory role in the development of natural tolerance. Copyright © 2017 American Academy of Allergy, Asthma & Immunology. Published by Elsevier Inc. All rights reserved.

  19. Does Twitter trigger bursts in signature collections?

    Directory of Open Access Journals (Sweden)

    Rui Yamaguchi

    Full Text Available INTRODUCTION: The quantification of social media impacts on societal and political events is a difficult undertaking. The Japanese Society of Oriental Medicine started a signature-collecting campaign to oppose a medical policy of the Government Revitalization Unit to exclude a traditional Japanese medicine, "Kampo," from the public insurance system. The signature count showed a series of aberrant bursts from November 26 to 29, 2009. In the same interval, the number of messages on Twitter including the keywords "Signature" and "Kampo," increased abruptly. Moreover, the number of messages on an Internet forum that discussed the policy and called for signatures showed a train of spikes. METHODS AND FINDINGS: In order to estimate the contributions of social media, we developed a statistical model with state-space modeling framework that distinguishes the contributions of multiple social media in time-series of collected public opinions. We applied the model to the time-series of signature counts of the campaign and quantified contributions of two social media, i.e., Twitter and an Internet forum, by the estimation. We found that a considerable portion (78% of the signatures was affected from either of the social media throughout the campaign and the Twitter effect (26% was smaller than the Forum effect (52% in total, although Twitter probably triggered the initial two bursts of signatures. Comparisons of the estimated profiles of the both effects suggested distinctions between the social media in terms of sustainable impact of messages or tweets. Twitter shows messages on various topics on a time-line; newer messages push out older ones. Twitter may diminish the impact of messages that are tweeted intermittently. CONCLUSIONS: The quantification of social media impacts is beneficial to better understand people's tendency and may promote developing strategies to engage public opinions effectively. Our proposed method is a promising tool to explore

  20. Does Twitter trigger bursts in signature collections?

    Science.gov (United States)

    Yamaguchi, Rui; Imoto, Seiya; Kami, Masahiro; Watanabe, Kenji; Miyano, Satoru; Yuji, Koichiro

    2013-01-01

    The quantification of social media impacts on societal and political events is a difficult undertaking. The Japanese Society of Oriental Medicine started a signature-collecting campaign to oppose a medical policy of the Government Revitalization Unit to exclude a traditional Japanese medicine, "Kampo," from the public insurance system. The signature count showed a series of aberrant bursts from November 26 to 29, 2009. In the same interval, the number of messages on Twitter including the keywords "Signature" and "Kampo," increased abruptly. Moreover, the number of messages on an Internet forum that discussed the policy and called for signatures showed a train of spikes. In order to estimate the contributions of social media, we developed a statistical model with state-space modeling framework that distinguishes the contributions of multiple social media in time-series of collected public opinions. We applied the model to the time-series of signature counts of the campaign and quantified contributions of two social media, i.e., Twitter and an Internet forum, by the estimation. We found that a considerable portion (78%) of the signatures was affected from either of the social media throughout the campaign and the Twitter effect (26%) was smaller than the Forum effect (52%) in total, although Twitter probably triggered the initial two bursts of signatures. Comparisons of the estimated profiles of the both effects suggested distinctions between the social media in terms of sustainable impact of messages or tweets. Twitter shows messages on various topics on a time-line; newer messages push out older ones. Twitter may diminish the impact of messages that are tweeted intermittently. The quantification of social media impacts is beneficial to better understand people's tendency and may promote developing strategies to engage public opinions effectively. Our proposed method is a promising tool to explore information hidden in social phenomena.

  1. Research on a New Signature Scheme on Blockchain

    Directory of Open Access Journals (Sweden)

    Chao Yuan

    2017-01-01

    Full Text Available With the rise of Bitcoin, blockchain which is the core technology of Bitcoin has received increasing attention. Privacy preserving and performance on blockchain are two research points in academia and business, but there are still some unresolved issues in both respects. An aggregate signature scheme is a digital signature that supports making signatures on many different messages generated by many different users. Using aggregate signature, the size of the signature could be shortened by compressing multiple signatures into a single signature. In this paper, a new signature scheme for transactions on blockchain based on the aggregate signature was proposed. It was worth noting that elliptic curve discrete logarithm problem and bilinear maps played major roles in our signature scheme. And the security properties of our signature scheme were proved. In our signature scheme, the amount will be hidden especially in the transactions which contain multiple inputs and outputs. Additionally, the size of the signature on transaction is constant regardless of the number of inputs and outputs that the transaction contains, which can improve the performance of signature. Finally, we gave an application scenario for our signature scheme which aims to achieve the transactions of big data on blockchain.

  2. Uniqueness conditions for finitely dependent random fields

    International Nuclear Information System (INIS)

    Dobrushin, R.L.; Pecherski, E.A.

    1981-01-01

    The authors consider a random field for which uniqueness and some additional conditions guaranteeing that the correlations between the variables of the field decrease rapidly enough with the distance between the values of the parameter occur. The main result of the paper states that in such a case uniqueness is true for any other field with transition probabilities sufficiently close to those of the original field. Then they apply this result to some ''degenerate'' classes of random fields for which one can check this condition of correlation to decay, and thus obtain some new conditions of uniqueness. (Auth.)

  3. The prognostic value of temporal in vitro and in vivo derived hypoxia gene-expression signatures in breast cancer

    International Nuclear Information System (INIS)

    Starmans, Maud H.W.; Chu, Kenneth C.; Haider, Syed; Nguyen, Francis; Seigneuric, Renaud; Magagnin, Michael G.; Koritzinsky, Marianne; Kasprzyk, Arek; Boutros, Paul C.; Wouters, Bradly G.

    2012-01-01

    Background and purpose: Recent data suggest that in vitro and in vivo derived hypoxia gene-expression signatures have prognostic power in breast and possibly other cancers. However, both tumour hypoxia and the biological adaptation to this stress are highly dynamic. Assessment of time-dependent gene-expression changes in response to hypoxia may thus provide additional biological insights and assist in predicting the impact of hypoxia on patient prognosis. Materials and methods: Transcriptome profiling was performed for three cell lines derived from diverse tumour-types after hypoxic exposure at eight time-points, which include a normoxic time-point. Time-dependent sets of co-regulated genes were identified from these data. Subsequently, gene ontology (GO) and pathway analyses were performed. The prognostic power of these novel signatures was assessed in parallel with previous in vitro and in vivo derived hypoxia signatures in a large breast cancer microarray meta-dataset (n = 2312). Results: We identified seven recurrent temporal and two general hypoxia signatures. GO and pathway analyses revealed regulation of both common and unique underlying biological processes within these signatures. None of the new or previously published in vitro signatures consisting of hypoxia-induced genes were prognostic in the large breast cancer dataset. In contrast, signatures of repressed genes, as well as the in vivo derived signatures of hypoxia-induced genes showed clear prognostic power. Conclusions: Only a subset of hypoxia-induced genes in vitro demonstrates prognostic value when evaluated in a large clinical dataset. Despite clear evidence of temporal patterns of gene-expression in vitro, the subset of prognostic hypoxia regulated genes cannot be identified based on temporal pattern alone. In vivo derived signatures appear to identify the prognostic hypoxia induced genes. The prognostic value of hypoxia-repressed genes is likely a surrogate for the known importance of

  4. Educated for Efficiency

    DEFF Research Database (Denmark)

    Amore, Mario Daniele; Bennedsen, Morten; Larsen, Birthe

    We study the effect of CEO education on a firm’s energy efficiency. Using a unique dataset of Danish firms, we document that firms led by more educated CEOs exhibit greater energy efficiency. We establish causality by employing exogenous CEO hospitalization episodes: the hospitalization of highly......-educated CEOs induces a drop in a firm’s energy efficiency, whereas the hospitalization of low-education CEOs does not have any significant effect. Disentangling the effect of educational length from that of the field of study, we find that the greater energy efficiency is mostly driven by the cumulated years...

  5. Tattoos and piercings: bodily expressions of uniqueness?

    Science.gov (United States)

    Tiggemann, Marika; Hopkins, Louise A

    2011-06-01

    The study aimed to investigate the motivations underlying the body modification practices of tattooing and piercing. There were 80 participants recruited from an Australian music store, who provided descriptions of their tattoos and piercings and completed measures of need for uniqueness, appearance investment and distinctive appearance investment. It was found that tattooed individuals scored significantly higher on need for uniqueness than non-tattooed individuals. Further, individuals with conventional ear piercings scored significantly lower on need for uniqueness than individuals with no piercings or with facial and body piercings. Neither appearance investment nor distinctive appearance investment differed significantly among tattoo or piercing status groups. Strength of identification with music was significantly correlated with number of tattoos, but not number of piercings. It was concluded that tattooing, but not body piercing, represents a bodily expression of uniqueness. Copyright © 2011 Elsevier Ltd. All rights reserved.

  6. High Blood Pressure: Unique to Older Adults

    Science.gov (United States)

    ... our e-newsletter! Aging & Health A to Z High Blood Pressure Hypertension Unique to Older Adults This section provides ... Pressure Targets are Different for Very Old Adults High blood pressure (also called hypertension) increases your chance of having ...

  7. Trace element ink spiking for signature authentication

    International Nuclear Information System (INIS)

    Hatzistavros, V.S.; Kallithrakas-Kontos, N.G.

    2008-01-01

    Signature authentication is a critical question in forensic document examination. Last years the evolution of personal computers made signature copying a quite easy task, so the development of new ways for signature authentication is crucial. In the present work a commercial ink was spiked with many trace elements in various concentrations. Inorganic and organometallic ink soluble compounds were used as spiking agents, whilst ink retained its initial properties. The spiked inks were used for paper writing and the documents were analyzed by a non destructive method, the energy dispersive X-ray fluorescence. The thin target model was proved right for quantitative analysis and a very good linear relationship of the intensity (X-ray signal) against concentration was estimated for all used elements. Intensity ratios between different elements in the same ink gave very stable results, independent on the writing alterations. The impact of time both to written document and prepared inks was also investigated. (author)

  8. A Methodology for Calculating Radiation Signatures

    Energy Technology Data Exchange (ETDEWEB)

    Klasky, Marc Louis [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Wilcox, Trevor [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Bathke, Charles G. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); James, Michael R. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2015-05-01

    A rigorous formalism is presented for calculating radiation signatures from both Special Nuclear Material (SNM) as well as radiological sources. The use of MCNP6 in conjunction with CINDER/ORIGEN is described to allow for the determination of both neutron and photon leakages from objects of interest. In addition, a description of the use of MCNP6 to properly model the background neutron and photon sources is also presented. Examinations of the physics issues encountered in the modeling are investigated so as to allow for guidance in the user discerning the relevant physics to incorporate into general radiation signature calculations. Furthermore, examples are provided to assist in delineating the pertinent physics that must be accounted for. Finally, examples of detector modeling utilizing MCNP are provided along with a discussion on the generation of Receiver Operating Curves, which are the suggested means by which to determine detectability radiation signatures emanating from objects.

  9. Cryptanalysis of the arbitrated quantum signature protocols

    International Nuclear Information System (INIS)

    Gao Fei; Qin Sujuan; Guo Fenzhuo; Wen Qiaoyan

    2011-01-01

    As a new model for signing quantum messages, arbitrated quantum signature (AQS) has recently received a lot of attention. In this paper we study the cryptanalysis of previous AQS protocols from the aspects of forgery and disavowal. We show that in these protocols the receiver, Bob, can realize existential forgery of the sender's signature under known message attack. Bob can even achieve universal forgery when the protocols are used to sign a classical message. Furthermore, the sender, Alice, can successfully disavow any of her signatures by simple attack. The attack strategies are described in detail and some discussions about the potential improvements of the protocols are given. Finally we also present several interesting topics on AQS protocols that can be studied in future.

  10. Molecular Signature in HCV-Positive Lymphomas

    Directory of Open Access Journals (Sweden)

    Valli De Re

    2012-01-01

    Full Text Available Hepatitis C virus (HCV is a positive, single-stranded RNA virus, which has been associated to different subtypes of B-cell non-Hodgkin lymphoma (B-NHL. Cumulative evidence suggests an HCV-related antigen driven process in the B-NHL development. The underlying molecular signature associated to HCV-related B-NHL has to date remained obscure. In this review, we discuss the recent developments in this field with a special mention to different sets of genes whose expression is associated with BCR coupled to Blys signaling which in turn was found to be linked to B-cell maturation stages and NF-κb transcription factor. Even if recent progress on HCV-B-NHL signature has been made, the precise relationship between HCV and lymphoma development and phenotype signature remain to be clarified.

  11. Selection signatures in worldwide sheep populations.

    Science.gov (United States)

    Fariello, Maria-Ines; Servin, Bertrand; Tosser-Klopp, Gwenola; Rupp, Rachel; Moreno, Carole; San Cristobal, Magali; Boitard, Simon

    2014-01-01

    The diversity of populations in domestic species offers great opportunities to study genome response to selection. The recently published Sheep HapMap dataset is a great example of characterization of the world wide genetic diversity in sheep. In this study, we re-analyzed the Sheep HapMap dataset to identify selection signatures in worldwide sheep populations. Compared to previous analyses, we made use of statistical methods that (i) take account of the hierarchical structure of sheep populations, (ii) make use of linkage disequilibrium information and (iii) focus specifically on either recent or older selection signatures. We show that this allows pinpointing several new selection signatures in the sheep genome and distinguishing those related to modern breeding objectives and to earlier post-domestication constraints. The newly identified regions, together with the ones previously identified, reveal the extensive genome response to selection on morphology, color and adaptation to new environments.

  12. Biomarker Gene Signature Discovery Integrating Network Knowledge

    Directory of Open Access Journals (Sweden)

    Holger Fröhlich

    2012-02-01

    Full Text Available Discovery of prognostic and diagnostic biomarker gene signatures for diseases, such as cancer, is seen as a major step towards a better personalized medicine. During the last decade various methods, mainly coming from the machine learning or statistical domain, have been proposed for that purpose. However, one important obstacle for making gene signatures a standard tool in clinical diagnosis is the typical low reproducibility of these signatures combined with the difficulty to achieve a clear biological interpretation. For that purpose in the last years there has been a growing interest in approaches that try to integrate information from molecular interaction networks. Here we review the current state of research in this field by giving an overview about so-far proposed approaches.

  13. Estimating physiological skin parameters from hyperspectral signatures

    Science.gov (United States)

    Vyas, Saurabh; Banerjee, Amit; Burlina, Philippe

    2013-05-01

    We describe an approach for estimating human skin parameters, such as melanosome concentration, collagen concentration, oxygen saturation, and blood volume, using hyperspectral radiometric measurements (signatures) obtained from in vivo skin. We use a computational model based on Kubelka-Munk theory and the Fresnel equations. This model forward maps the skin parameters to a corresponding multiband reflectance spectra. Machine-learning-based regression is used to generate the inverse map, and hence estimate skin parameters from hyperspectral signatures. We test our methods using synthetic and in vivo skin signatures obtained in the visible through the short wave infrared domains from 24 patients of both genders and Caucasian, Asian, and African American ethnicities. Performance validation shows promising results: good agreement with the ground truth and well-established physiological precepts. These methods have potential use in the characterization of skin abnormalities and in minimally-invasive prescreening of malignant skin cancers.

  14. Modularity, comparative cognition and human uniqueness.

    Science.gov (United States)

    Shettleworth, Sara J

    2012-10-05

    Darwin's claim 'that the difference in mind between man and the higher animals … is certainly one of degree and not of kind' is at the core of the comparative study of cognition. Recent research provides unprecedented support for Darwin's claim as well as new reasons to question it, stimulating new theories of human cognitive uniqueness. This article compares and evaluates approaches to such theories. Some prominent theories propose sweeping domain-general characterizations of the difference in cognitive capabilities and/or mechanisms between adult humans and other animals. Dual-process theories for some cognitive domains propose that adult human cognition shares simple basic processes with that of other animals while additionally including slower-developing and more explicit uniquely human processes. These theories are consistent with a modular account of cognition and the 'core knowledge' account of children's cognitive development. A complementary proposal is that human infants have unique social and/or cognitive adaptations for uniquely human learning. A view of human cognitive architecture as a mosaic of unique and species-general modular and domain-general processes together with a focus on uniquely human developmental mechanisms is consistent with modern evolutionary-developmental biology and suggests new questions for comparative research.

  15. Peripheral blood signatures of lead exposure.

    Directory of Open Access Journals (Sweden)

    Heather G LaBreche

    Full Text Available BACKGROUND: Current evidence indicates that even low-level lead (Pb exposure can have detrimental effects, especially in children. We tested the hypothesis that Pb exposure alters gene expression patterns in peripheral blood cells and that these changes reflect dose-specific alterations in the activity of particular pathways. METHODOLOGY/PRINCIPAL FINDING: Using Affymetrix Mouse Genome 430 2.0 arrays, we examined gene expression changes in the peripheral blood of female Balb/c mice following exposure to per os lead acetate trihydrate or plain drinking water for two weeks and after a two-week recovery period. Data sets were RMA-normalized and dose-specific signatures were generated using established methods of supervised classification and binary regression. Pathway activity was analyzed using the ScoreSignatures module from GenePattern. CONCLUSIONS/SIGNIFICANCE: The low-level Pb signature was 93% sensitive and 100% specific in classifying samples a leave-one-out crossvalidation. The high-level Pb signature demonstrated 100% sensitivity and specificity in the leave-one-out crossvalidation. These two signatures exhibited dose-specificity in their ability to predict Pb exposure and had little overlap in terms of constituent genes. The signatures also seemed to reflect current levels of Pb exposure rather than past exposure. Finally, the two doses showed differential activation of cellular pathways. Low-level Pb exposure increased activity of the interferon-gamma pathway, whereas high-level Pb exposure increased activity of the E2F1 pathway.

  16. Search for New Physics through the Reconstruction of Challenging and Long-Lived Signatures with the ATLAS detector $\\sqrt{s}$ = 13 TeV

    CERN Document Server

    Pettersson, Nora Emilia; The ATLAS collaboration

    2017-01-01

    Many theories of beyond the Standard Model (BSM) physics predict unique signatures which are difficult to reconstruct and the background rates are also a challenge. Signatures from displaced vertices anywhere from the inner detector to the muon spectrometer as well as those of new particles with fractional or multiple value of the charge of the electron or high mass stable charged particles are experimentally demanding signatures. The results of searches using data collected by the ATLAS detector of √s = 13 TeV pp collision is presented.

  17. Doppler Velocity Signatures of Idealized Elliptical Vortices

    Directory of Open Access Journals (Sweden)

    Wen-Chau Lee

    2006-01-01

    Full Text Available Doppler radar observations have revealed a class of atmospheric vortices (tropical cyclones, tornadoes, dust devils that possess elliptical radar reflectivity signatures. One famous example is Typhoon Herb (1996 that maintained its elliptical reflectivity structure over a 40-hour period. Theoretical work and dual-Doppler analyses of observed tropical cyclones have suggested two physical mechanisms that can explain the formation of two types of elliptical vortices observed in nature, namely, the combination of a circular vortex with either a wavenumber two vortex Rossby wave or a deformation field. The characteristics of these two types of elliptical vortices and their corresponding Doppler velocity signatures have not been previously examined.

  18. KEA-71 Smart Current Signature Sensor (SCSS)

    Science.gov (United States)

    Perotti, Jose M.

    2010-01-01

    This slide presentation reviews the development and uses of the Smart Current Signature Sensor (SCSS), also known as the Valve Health Monitor (VHM) system. SCSS provides a way to not only monitor real-time the valve's operation in a non invasive manner, but also to monitor its health (Fault Detection and Isolation) and identify potential faults and/or degradation in the near future (Prediction/Prognosis). This technology approach is not only applicable for solenoid valves, and it could be extrapolated to other electrical components with repeatable electrical current signatures such as motors.

  19. Security problem on arbitrated quantum signature schemes

    International Nuclear Information System (INIS)

    Choi, Jeong Woon; Chang, Ku-Young; Hong, Dowon

    2011-01-01

    Many arbitrated quantum signature schemes implemented with the help of a trusted third party have been developed up to now. In order to guarantee unconditional security, most of them take advantage of the optimal quantum one-time encryption based on Pauli operators. However, in this paper we point out that the previous schemes provide security only against a total break attack and show in fact that there exists an existential forgery attack that can validly modify the transmitted pair of message and signature. In addition, we also provide a simple method to recover security against the proposed attack.

  20. Plasma Signatures of Radial Field Power Dropouts

    International Nuclear Information System (INIS)

    Lucek, E.A.; Horbury, T.S.; Balogh, A.; McComas, D.J.

    1998-01-01

    A class of small scale structures, with a near-radial magnetic field and a drop in magnetic field fluctuation power, have recently been identified in the polar solar wind. An earlier study of 24 events, each lasting for 6 hours or more, identified no clear plasma signature. In an extension of that work, radial intervals lasting for 4 hours or more (89 in total), have been used to search for a statistically significant plasma signature. It was found that, despite considerable variations between intervals, there was a small but significant drop, on average, in plasma temperature, density and β during these events

  1. Transient thermal camouflage and heat signature control

    Science.gov (United States)

    Yang, Tian-Zhi; Su, Yishu; Xu, Weikai; Yang, Xiao-Dong

    2016-09-01

    Thermal metamaterials have been proposed to manipulate heat flux as a new way to cloak or camouflage objects in the infrared world. To date, however, thermal metamaterials only operate in the steady-state and exhibit detectable, transient heat signatures. In this letter, the theoretical basis for a thermal camouflaging technique with controlled transient diffusion is presented. This technique renders an object invisible in real time. More importantly, the thermal camouflaging device instantaneously generates a pre-designed heat signature and behaves as a perfect thermal illusion device. A metamaterial coating with homogeneous and isotropic thermal conductivity, density, and volumetric heat capacity was fabricated and very good camouflaging performance was achieved.

  2. Security problem on arbitrated quantum signature schemes

    Energy Technology Data Exchange (ETDEWEB)

    Choi, Jeong Woon [Emerging Technology R and D Center, SK Telecom, Kyunggi 463-784 (Korea, Republic of); Chang, Ku-Young; Hong, Dowon [Cryptography Research Team, Electronics and Telecommunications Research Institute, Daejeon 305-700 (Korea, Republic of)

    2011-12-15

    Many arbitrated quantum signature schemes implemented with the help of a trusted third party have been developed up to now. In order to guarantee unconditional security, most of them take advantage of the optimal quantum one-time encryption based on Pauli operators. However, in this paper we point out that the previous schemes provide security only against a total break attack and show in fact that there exists an existential forgery attack that can validly modify the transmitted pair of message and signature. In addition, we also provide a simple method to recover security against the proposed attack.

  3. All-optical signatures of strong-field QED in the vacuum emission picture

    Science.gov (United States)

    Gies, Holger; Karbstein, Felix; Kohlfürst, Christian

    2018-02-01

    We study all-optical signatures of the effective nonlinear couplings among electromagnetic fields in the quantum vacuum, using the collision of two focused high-intensity laser pulses as an example. The experimental signatures of quantum vacuum nonlinearities are encoded in signal photons, whose kinematic and polarization properties differ from the photons constituting the macroscopic laser fields. We implement an efficient numerical algorithm allowing for the theoretical investigation of such signatures in realistic field configurations accessible in experiment. This algorithm is based on a vacuum emission scheme and can readily be adapted to the collision of more laser beams or further involved field configurations. We solve the case of two colliding pulses in full 3 +1 -dimensional spacetime and identify experimental geometries and parameter regimes with improved signal-to-noise ratios.

  4. An Anonymous Access Authentication Scheme Based on Proxy Ring Signature for CPS-WMNs

    Directory of Open Access Journals (Sweden)

    Tianhan Gao

    2017-01-01

    Full Text Available Access security and privacy have become a bottleneck for the popularization of future Cyber-Physical System (CPS networks. Furthermore, users’ need for privacy-preserved access during movement procedure is more urgent. To address the anonymous access authentication issue for CPS Wireless Mesh Network (CPS-WMN, a novel anonymous access authentication scheme based on proxy ring signature is proposed. A hierarchical authentication architecture is presented first. The scheme is then achieved from the aspect of intergroup and intragroup anonymous mutual authentication through proxy ring signature mechanism and certificateless signature mechanism, respectively. We present a formal security proof of the proposed protocol with SVO logic. The simulation and performance analysis demonstrate that the proposed scheme owns higher efficiency and adaptability than the typical one.

  5. COMPUTER-IMPLEMENTED METHOD OF PERFORMING A SEARCH USING SIGNATURES

    DEFF Research Database (Denmark)

    2017-01-01

    A computer-implemented method of processing a query vector and a data vector), comprising: generating a set of masks and a first set of multiple signatures and a second set of multiple signatures by applying the set of masks to the query vector and the data vector, respectively, and generating...... candidate pairs, of a first signature and a second signature, by identifying matches of a first signature and a second signature. The set of masks comprises a configuration of the elements that is a Hadamard code; a permutation of a Hadamard code; or a code that deviates from a Hadamard code...

  6. Quantum multi-signature protocol based on teleportation

    International Nuclear Information System (INIS)

    Wen Xiao-jun; Liu Yun; Sun Yu

    2007-01-01

    In this paper, a protocol which can be used in multi-user quantum signature is proposed. The scheme of signature and verification is based on the correlation of Greenberger-Horne-Zeilinger (GHZ) states and the controlled quantum teleportation. Different from the digital signatures, which are based on computational complexity, the proposed protocol has perfect security in the noiseless quantum channels. Compared to previous quantum signature schemes, this protocol can verify the signature independent of an arbitrator as well as realize multi-user signature together. (orig.)

  7. A group signature scheme based on quantum teleportation

    International Nuclear Information System (INIS)

    Wen Xiaojun; Tian Yuan; Ji Liping; Niu Xiamu

    2010-01-01

    In this paper, we present a group signature scheme using quantum teleportation. Different from classical group signature and current quantum signature schemes, which could only deliver either group signature or unconditional security, our scheme guarantees both by adopting quantum key preparation, quantum encryption algorithm and quantum teleportation. Security analysis proved that our scheme has the characteristics of group signature, non-counterfeit, non-disavowal, blindness and traceability. Our quantum group signature scheme has a foreseeable application in the e-payment system, e-government, e-business, etc.

  8. A group signature scheme based on quantum teleportation

    Energy Technology Data Exchange (ETDEWEB)

    Wen Xiaojun; Tian Yuan; Ji Liping; Niu Xiamu, E-mail: wxjun36@gmail.co [Information Countermeasure Technique Research Institute, Harbin Institute of Technology, Harbin 150001 (China)

    2010-05-01

    In this paper, we present a group signature scheme using quantum teleportation. Different from classical group signature and current quantum signature schemes, which could only deliver either group signature or unconditional security, our scheme guarantees both by adopting quantum key preparation, quantum encryption algorithm and quantum teleportation. Security analysis proved that our scheme has the characteristics of group signature, non-counterfeit, non-disavowal, blindness and traceability. Our quantum group signature scheme has a foreseeable application in the e-payment system, e-government, e-business, etc.

  9. High-efficiency wind turbine

    Science.gov (United States)

    Hein, L. A.; Myers, W. N.

    1980-01-01

    Vertical axis wind turbine incorporates several unique features to extract more energy from wind increasing efficiency 20% over conventional propeller driven units. System also features devices that utilize solar energy or chimney effluents during periods of no wind.

  10. Human cancer cells express Slug-based epithelial-mesenchymal transition gene expression signature obtained in vivo

    International Nuclear Information System (INIS)

    Anastassiou, Dimitris; Rumjantseva, Viktoria; Cheng, Weiyi; Huang, Jianzhong; Canoll, Peter D; Yamashiro, Darrell J; Kandel, Jessica J

    2011-01-01

    The biological mechanisms underlying cancer cell motility and invasiveness remain unclear, although it has been hypothesized that they involve some type of epithelial-mesenchymal transition (EMT). We used xenograft models of human cancer cells in immunocompromised mice, profiling the harvested tumors separately with species-specific probes and computationally analyzing the results. Here we show that human cancer cells express in vivo a precise multi-cancer invasion-associated gene expression signature that prominently includes many EMT markers, among them the transcription factor Slug, fibronectin, and α-SMA. We found that human, but not mouse, cells express the signature and Slug is the only upregulated EMT-inducing transcription factor. The signature is also present in samples from many publicly available cancer gene expression datasets, suggesting that it is produced by the cancer cells themselves in multiple cancer types, including nonepithelial cancers such as neuroblastoma. Furthermore, we found that the presence of the signature in human xenografted cells was associated with a downregulation of adipocyte markers in the mouse tissue adjacent to the invasive tumor, suggesting that the signature is triggered by contextual microenvironmental interactions when the cancer cells encounter adipocytes, as previously reported. The known, precise and consistent gene composition of this cancer mesenchymal transition signature, particularly when combined with simultaneous analysis of the adjacent microenvironment, provides unique opportunities for shedding light on the underlying mechanisms of cancer invasiveness as well as identifying potential diagnostic markers and targets for metastasis-inhibiting therapeutics

  11. Design and Implementation of a Mobile Voting System Using a Novel Oblivious and Proxy Signature

    Directory of Open Access Journals (Sweden)

    Shin-Yan Chiou

    2017-01-01

    Full Text Available Electronic voting systems can make the voting process much more convenient. However, in such systems, if a server signs blank votes before users vote, it may cause undue multivoting. Furthermore, if users vote before the signing of the server, voting information will be leaked to the server and may be compromised. Blind signatures could be used to prevent leaking voting information from the server; however, malicious users could produce noncandidate signatures for illegal usage at that time or in the future. To overcome these problems, this paper proposes a novel oblivious signature scheme with a proxy signature function to satisfy security requirements such as information protection, personal privacy, and message verification and to ensure that no one can cheat other users (including the server. We propose an electronic voting system based on the proposed oblivious and proxy signature scheme and implement this scheme in a smartphone application to allow users to vote securely and conveniently. Security analyses and performance comparisons are provided to show the capability and efficiency of the proposed scheme.

  12. Temporally isolated lineages of Pink salmon reveal unique signatures of selection on distinct pools of standing genetic variation

    DEFF Research Database (Denmark)

    Limborg, Morten; Waples, R.K.; Seeb, J.E.

    2014-01-01

    A species’ genetic diversity bears the marks of evolutionary processes that have occurred throughout its history. However, robust detection of selection in wild populations is difficult and often impeded by lack of replicate tests. Here, we investigate selection in pink salmon (Oncorhynchus gorbu...

  13. Systems Signatures Reveal Unique Remission-path of Type 2 Diabetes Following Roux-en-Y Gastric Bypass Surgery

    DEFF Research Database (Denmark)

    Li, Qing-Run; Wang, Zi-Ming; Wewer Albrechtsen, Nicolai J

    2018-01-01

    metabolites and proteins of 10 normal glucose-tolerant obese (NO) and 9 diabetic obese (DO) patients before and 1-week, 3-months, 1-year after RYGB. 146 proteins and 128 metabolites from both NO and DO groups at all four stages were selected for further analysis. By analyzing a set of bi....... The principal component analyses (PCA) revealed that the edge states of the post-RYGB NO subjects were significantly different from those of the post-RYGB DO patients. Particularly, the time-dependent changes of the molecular hub-networks differed between DO and NO groups after RYGB. In conclusion......-molecular associations among the corresponding network of the subjects with our newly developed computational method, we defined the represented physiological states (called the edge-states that reflect the interactions among the bio-molecules), and the related molecular networks of NO and DO patients, respectively...

  14. Unique protein expression signatures of survival time in kidney renal clear cell carcinoma through a pan-cancer screening.

    Science.gov (United States)

    Han, Guangchun; Zhao, Wei; Song, Xiaofeng; Kwok-Shing Ng, Patrick; Karam, Jose A; Jonasch, Eric; Mills, Gordon B; Zhao, Zhongming; Ding, Zhiyong; Jia, Peilin

    2017-10-03

    In 2016, it is estimated that there will be 62,700 new cases of kidney cancer in the United States, and 14,240 patients will die from the disease. Because the incidence of kidney renal clear cell carcinoma (KIRC), the most common type of kidney cancer, is expected to continue to increase in the US, there is an urgent need to find effective diagnostic biomarkers for KIRC that could help earlier detection of and customized treatment strategies for the disease. Accordingly, in this study we systematically investigated KIRC's prognostic biomarkers for survival using the reverse phase protein array (RPPA) data and the high throughput sequencing data from The Cancer Genome Atlas (TCGA). With comprehensive data available in TCGA, we systematically screened protein expression based survival biomarkers in 10 major cancer types, among which KIRC presented many protein prognostic biomarkers of survival time. This is in agreement with a previous report that expression level changes (mRNAs, microRNA and protein) may have a better performance for prognosis of KIRC. In this study, we also identified 52 prognostic genes for KIRC, many of which are involved in cell-cycle and cancer signaling, as well as 15 tumor-stage-specific prognostic biomarkers. Notably, we found fewer prognostic biomarkers for early-stage than for late-stage KIRC. Four biomarkers (the RPPA protein IDs: FASN, ACC1, Cyclin_B1 and Rad51) were found to be prognostic for survival based on both protein and mRNA expression data. Through pan-cancer screening, we found that many protein biomarkers were prognostic for patients' survival in KIRC. Stage-specific survival biomarkers in KIRC were also identified. Our study indicated that these protein biomarkers might have potential clinical value in terms of predicting survival in KIRC patients and developing individualized treatment strategies. Importantly, we found many biomarkers in KIRC at both the mRNA expression level and the protein expression level. These biomarkers shared a significant overlap, indicating that they were technically replicable.

  15. Condition monitoring of machinery using motor current signature analysis

    International Nuclear Information System (INIS)

    Kryter, R.C.; Haynes, H.D.

    1989-01-01

    Motor current signature analysis (MCSA) is a powerful monitoring tool for motor-driven equipment that provides a nonintrusive means for detecting the presence of mechanical and electrical abnormalities in the motor and the driven equipment, including altered conditions in the process ''downstream'' of the motor-driven equipment. It was developed at the Oak Ridge National Laboratory as a means for determining the effects of aging and service wear systems, but it is applicable to a broad range of machinery. MCSA is based on the recognition that an electric motor (ac or dc) driving a mechanical load acts as an efficient and permanently available transducer by sensing mechanical load variations, large and small, long-term and rapid, and converting them into variations in the induced current generated in the motor windings. These motor current variations are carried by the electrical cables processes as desired. Motor current signatures, obtained in both time and over time to provide early indication of degradation. Successful applications of MCSA technology (patent applied for) include not only motor-operated valves but also pumps of various designs, blowers, and air conditioning systems. Examples are presented briefly, and speculation regarding the applicability of MCSA to a broader range of equipment monitoring and production line testing is also given. 1 ref., 13 figs

  16. Lorentz violations and Euclidean signature metrics

    International Nuclear Information System (INIS)

    Barbero G, J. Fernando; Villasenor, Eduardo J.S.

    2003-01-01

    We show that the families of effective actions considered by Jacobson et al. to study Lorentz invariance violations contain a class of models that represent pure general relativity with a Euclidean signature. We also point out that some members of this family of actions preserve Lorentz invariance in a generalized sense

  17. Mechanical System Simulations for Seismic Signature Modeling

    National Research Council Canada - National Science Library

    Lacombe, J

    2001-01-01

    .... Results for an M1A1 and T72 are discussed. By analyzing the simulated seismic signature data in conjunction with the spectral features associated with the vibrations of specific vehicle sprung and un-sprung components we are able to make...

  18. Exploring Signature Pedagogies in Undergraduate Leadership Education

    Science.gov (United States)

    Jenkins, Daniel M.

    2012-01-01

    This research explores the instructional strategies most frequently used by leadership educators who teach academic credit-bearing undergraduate leadership studies courses through a national survey and identifies signature pedagogies within the leadership discipline. Findings from this study suggest that class discussion--whether in the form of…

  19. The Pedagogic Signature of Special Needs Education

    Science.gov (United States)

    Weiß, Sabine; Kollmannsberger, Markus; Lerche, Thomas; Oubaid, Viktor; Kiel, Ewald

    2014-01-01

    The goal of the following study is to identify a pedagogic signature, according to LS Shulman, for working with students who have special educational needs. Special educational needs are defined as significant limitations in personal development and learning which require particular educational measures beyond regular education. The development of…

  20. Hyperspectral signature analysis of skin parameters

    Science.gov (United States)

    Vyas, Saurabh; Banerjee, Amit; Garza, Luis; Kang, Sewon; Burlina, Philippe

    2013-02-01

    The temporal analysis of changes in biological skin parameters, including melanosome concentration, collagen concentration and blood oxygenation, may serve as a valuable tool in diagnosing the progression of malignant skin cancers and in understanding the pathophysiology of cancerous tumors. Quantitative knowledge of these parameters can also be useful in applications such as wound assessment, and point-of-care diagnostics, amongst others. We propose an approach to estimate in vivo skin parameters using a forward computational model based on Kubelka-Munk theory and the Fresnel Equations. We use this model to map the skin parameters to their corresponding hyperspectral signature. We then use machine learning based regression to develop an inverse map from hyperspectral signatures to skin parameters. In particular, we employ support vector machine based regression to estimate the in vivo skin parameters given their corresponding hyperspectral signature. We build on our work from SPIE 2012, and validate our methodology on an in vivo dataset. This dataset consists of 241 signatures collected from in vivo hyperspectral imaging of patients of both genders and Caucasian, Asian and African American ethnicities. In addition, we also extend our methodology past the visible region and through the short-wave infrared region of the electromagnetic spectrum. We find promising results when comparing the estimated skin parameters to the ground truth, demonstrating good agreement with well-established physiological precepts. This methodology can have potential use in non-invasive skin anomaly detection and for developing minimally invasive pre-screening tools.

  1. Dictionary of Large Hadron Collider signatures

    Indian Academy of Sciences (India)

    We report on a plan to establish a `Dictionary of LHC Signatures', an initiative that started at the WHEPP-X workshop in Chennai, January 2008. This study aims at the strategy of distinguishing 3 classes of dark matter motivated scenarios such as -parity conserved supersymmetry, little Higgs models with -parity ...

  2. Signatures of mutational processes in human cancer

    NARCIS (Netherlands)

    Alexandrov, L.B.; Nik-Zainal, S.; Wedge, D.C.; Aparicio, S.A.; Behjati, S.; Biankin, A.V.; Bignell, G.R.; Bolli, N.; Borg, A.; Borresen-Dale, A.L.; Boyault, S.; Burkhardt, B.; Butler, A.P.; Caldas, C.; Davies, H.R.; Desmedt, C.; Eils, R.; Eyfjord, J.E.; Foekens, J.A.; Greaves, M.; Hosoda, F.; Hutter, B.; Ilicic, T.; Imbeaud, S.; Imielinsk, M.; Jager, N.; Jones, D.T.; Knappskog, S.; Kool, M.; Lakhani, S.R.; Lopez-Otin, C.; Martin, S.; Munshi, N.C.; Nakamura, H.; Northcott, P.A.; Pajic, M.; Papaemmanuil, E.; Paradiso, A.; Pearson, J.V.; Puente, X.S.; Raine, K.; Ramakrishna, M.; Richardson, A.L.; Richter, J.; Rosenstiel, P.; Schlesner, M.; Schumacher, T.N.; Span, P.N.; Teague, J.W.; Totoki, Y.; Tutt, A.N.; Valdes-Mas, R.; Buuren, M.M. van; Veer, L. van 't; Vincent-Salomon, A.; Waddell, N.; Yates, L.R.; Zucman-Rossi, J.; Futreal, P.A.; McDermott, U.; Lichter, P.; Meyerson, M.; Grimmond, S.M.; Siebert, R.; Campo, E.; Shibata, T.; Pfister, S.M.; Campbell, P.J.; Stratton, M.R.; Schlooz-Vries, M.S.; Tol, J.J. van; Laarhoven, H.W. van; Sweep, F.C.; Bult, P.; et al.,

    2013-01-01

    All cancers are caused by somatic mutations; however, understanding of the biological processes generating these mutations is limited. The catalogue of somatic mutations from a cancer genome bears the signatures of the mutational processes that have been operative. Here we analysed 4,938,362

  3. Ankle and Other Signatures in Uhecr

    Science.gov (United States)

    Berezinsky, Veniamin

    2015-03-01

    The interaction signatures of UHE protons propagating through CMB are discussed. Much attention is given to ankle, which starting from 1963 is usually interpreted as a feature of transition from galactic to extragalactic cosmic rays. We argue here that this interpretation is now excluded. It gives more credit to alternative explanation of the ankle as an intrinsic part of the pair-production dip.

  4. Detection of proteolytic signatures for Parkinson's disease

    DEFF Research Database (Denmark)

    Jordal, Peter Lüttge; Dyrlund, Thomas F.; Winge, Kristian

    2016-01-01

    Aim: To investigate if idiopathic Parkinson's disease (IPD) is associated with distinct proteolytic signatures relative to non-neurodegenerative controls (NND) and patients with multiple system atrophy (MSA). Materials & methods: A subtiligase-based N-terminomics screening method was exploited...

  5. Lipidomic Profiling of Lung Pleural Effusion Identifies Unique Metabotype for EGFR Mutants in Non-Small Cell Lung Cancer

    OpenAIRE

    Ying Swan Ho; Lian Yee Yip; Nurhidayah Basri; Vivian Su Hui Chong; Chin Chye Teo; Eddy Tan; Kah Ling Lim; Gek San Tan; Xulei Yang; Si Yong Yeo; Mariko Si Yue Koh; Anantham Devanand; Angela Takano; Eng Huat Tan; Daniel Shao Weng Tan

    2016-01-01

    Cytology and histology forms the cornerstone for the diagnosis of non-small cell lung cancer (NSCLC) but obtaining sufficient tumour cells or tissue biopsies for these tests remains a challenge. We investigate the lipidome of lung pleural effusion (PE) for unique metabolic signatures to discriminate benign versus malignant PE and EGFR versus non-EGFR malignant subgroups to identify novel diagnostic markers that is independent of tumour cell availability. Using liquid chromatography mass spect...

  6. Perancangan Aplikasi Undeniable Digital Signature Dengan Algoritma Chaum’s Blind Signature

    OpenAIRE

    Simanjuntak, Martin Dennain

    2012-01-01

    Desperaty need a securiry system in the exchange of information via computer media, so that information can not be accessed by unauthorized parties. One of the security system is to use a system of digital signatures as a means of authenticating the authenticity of digital document that are exchanged. By using a digital a digital signature system is undeniable, the security system can be generated digital document exchange, where the system is free from the from of rejection...

  7. The effects of extrinsic motivation on signature authorship opinions in forensic signature blind trials.

    Science.gov (United States)

    Dewhurst, Tahnee N; Found, Bryan; Ballantyne, Kaye N; Rogers, Doug

    2014-03-01

    Expertise studies in forensic handwriting examination involve comparisons of Forensic Handwriting Examiners' (FHEs) opinions with lay-persons on blind tests. All published studies of this type have reported real and demonstrable skill differences between the specialist and lay groups. However, critics have proposed that any difference shown may be indicative of a lack of motivation on the part of lay participants, rather than a real difference in skill. It has been suggested that qualified FHEs would be inherently more motivated to succeed in blinded validation trials, as their professional reputations could be at risk, should they perform poorly on the task provided. Furthermore, critics suggest that lay-persons would be unlikely to be highly motivated to succeed, as they would have no fear of negative consequences should they perform badly. In an effort to investigate this concern, a blind signature trial was designed and administered to forty lay-persons. Participants were required to compare known (exemplar) signatures of an individual to questioned signatures and asked to express an opinion regarding whether the writer of the known signatures wrote each of the questioned signatures. The questioned signatures comprised a mixture of genuine, disguised and simulated signatures. The forty participants were divided into two separate groupings. Group 'A' were requested to complete the trial as directed and were advised that for each correct answer they would be financially rewarded, for each incorrect answer they would be financially penalized, and for each inconclusive opinion they would receive neither penalty nor reward. Group 'B' was requested to complete the trial as directed, with no mention of financial recompense or penalty. The results of this study do not support the proposition that motivation rather than skill difference is the source of the statistical difference in opinions between individuals' results in blinded signature proficiency trials. Crown

  8. Optical/Infrared Signatures for Space-Based Remote Sensing

    National Research Council Canada - National Science Library

    Picard, R. H; Dewan, E. M; Winick, J. R; O'Neil, R. R

    2007-01-01

    This report describes work carried out under the Air Force Research Laboratory's basic research task in optical remote-sensing signatures, entitled Optical / Infrared Signatures for Space-Based Remote Sensing...

  9. Methods and apparatus for multi-parameter acoustic signature inspection

    Energy Technology Data Exchange (ETDEWEB)

    Diaz, Aaron A [Richland, WA; Samuel, Todd J [Pasco, WA; Valencia, Juan D [Kennewick, WA; Gervais, Kevin L [Richland, WA; Tucker, Brian J [Pasco, WA; Kirihara, Leslie J [Richland, WA; Skorpik, James R [Kennewick, WA; Reid, Larry D [Benton City, WA; Munley, John T [Benton City, WA; Pappas, Richard A [Richland, WA; Wright, Bob W [West Richland, WA; Panetta, Paul D [Richland, WA; Thompson, Jason S [Richland, WA

    2007-07-24

    A multiparameter acoustic signature inspection device and method are described for non-invasive inspection of containers. Dual acoustic signatures discriminate between various fluids and materials for identification of the same.

  10. Passive Infrared Signature Augmentation of Full-Scale Plastic Targets

    National Research Council Canada - National Science Library

    Gebus, Lisa M; Sanders, Jeffrey S

    2002-01-01

    ... (IR), and radar signatures of threat systems. To address this need, a program was initiated by TMO to augment an existing full-scale, vacuum-formed plastic target with sufficient signature fidelity to adequately stress U.S...

  11. Common patterns and disease-related signatures in tuberculosis and sarcoidosis.

    Science.gov (United States)

    Maertzdorf, Jeroen; Weiner, January; Mollenkopf, Hans-Joachim; Bauer, Torsten; Prasse, Antje; Müller-Quernheim, Joachim; Kaufmann, Stefan H E

    2012-05-15

    In light of the marked global health impact of tuberculosis (TB), strong focus has been on identifying biosignatures. Gene expression profiles in blood cells identified so far are indicative of a persistent activation of the immune system and chronic inflammatory pathology in active TB. Definition of a biosignature with unique specificity for TB demands that identified profiles can differentiate diseases with similar pathology, like sarcoidosis (SARC). Here, we present a detailed comparison between pulmonary TB and SARC, including whole-blood gene expression profiling, microRNA expression, and multiplex serum analytes. Our analysis reveals that previously disclosed gene expression signatures in TB show highly similar patterns in SARC, with a common up-regulation of proinflammatory pathways and IFN signaling and close similarity to TB-related signatures. microRNA expression also presented a highly similar pattern in both diseases, whereas cytokines in the serum of TB patients revealed a slightly elevated proinflammatory pattern compared with SARC and controls. Our results indicate several differences in expression between the two diseases, with increased metabolic activity and significantly higher antimicrobial defense responses in TB. However, matrix metallopeptidase 14 was identified as the most distinctive marker of SARC. Described communalities as well as unique signatures in blood profiles of two distinct inflammatory pulmonary diseases not only have considerable implications for the design of TB biosignatures and future diagnosis, but they also provide insights into biological processes underlying chronic inflammatory disease entities of different etiology.

  12. Molecular subsets in the gene expression signatures of scleroderma skin.

    Directory of Open Access Journals (Sweden)

    Ausra Milano

    2008-07-01

    Full Text Available Scleroderma is a clinically heterogeneous disease with a complex phenotype. The disease is characterized by vascular dysfunction, tissue fibrosis, internal organ dysfunction, and immune dysfunction resulting in autoantibody production.We analyzed the genome-wide patterns of gene expression with DNA microarrays in skin biopsies from distinct scleroderma subsets including 17 patients with systemic sclerosis (SSc with diffuse scleroderma (dSSc, 7 patients with SSc with limited scleroderma (lSSc, 3 patients with morphea, and 6 healthy controls. 61 skin biopsies were analyzed in a total of 75 microarray hybridizations. Analysis by hierarchical clustering demonstrates nearly identical patterns of gene expression in 17 out of 22 of the forearm and back skin pairs of SSc patients. Using this property of the gene expression, we selected a set of 'intrinsic' genes and analyzed the inherent data-driven groupings. Distinct patterns of gene expression separate patients with dSSc from those with lSSc and both are easily distinguished from normal controls. Our data show three distinct patient groups among the patients with dSSc and two groups among patients with lSSc. Each group can be distinguished by unique gene expression signatures indicative of proliferating cells, immune infiltrates and a fibrotic program. The intrinsic groups are statistically significant (p<0.001 and each has been mapped to clinical covariates of modified Rodnan skin score, interstitial lung disease, gastrointestinal involvement, digital ulcers, Raynaud's phenomenon and disease duration. We report a 177-gene signature that is associated with severity of skin disease in dSSc.Genome-wide gene expression profiling of skin biopsies demonstrates that the heterogeneity in scleroderma can be measured quantitatively with DNA microarrays. The diversity in gene expression demonstrates multiple distinct gene expression programs in the skin of patients with scleroderma.

  13. Asian Eocene monsoons as revealed by leaf architectural signatures

    Science.gov (United States)

    Spicer, Robert A.; Yang, Jian; Herman, Alexei B.; Kodrul, Tatiana; Maslova, Natalia; Spicer, Teresa E. V.; Aleksandrova, Galina; Jin, Jianhua

    2016-09-01

    The onset and development of the Asian monsoon systems is a topic that has attracted considerable research effort but proxy data limitations, coupled with a diversity of definitions and metrics characterizing monsoon phenomena, have generated much debate. Failure of geological proxies to yield metrics capable of distinguishing between rainfall seasonality induced by migrations of the Inter-tropical Convergence Zone (ITCZ) from that attributable to topographically modified seasonal pressure reversals has frustrated attempts to understand mechanisms underpinning monsoon development and dynamics. Here we circumvent the use of such single climate parameter metrics in favor of detecting directly the distinctive attributes of different monsoon regimes encoded in leaf fossils. Leaf form adapts to the prevailing climate, particularly under the extreme seasonal stresses imposed by monsoons, so it is likely that fossil leaves carry a unique signature of past monsoon regimes. Leaf form trait spectra obtained from fossils from Eocene basins in southern China were compared with those seen in modern leaves growing under known climate regimes. The fossil leaf trait spectra, including those derived from previously published fossil floras from northwestern India, were most similar to those found in vegetation exposed to the modern Indonesia-Australia Monsoon (I-AM), which is largely a product of seasonal migrations of the ITCZ. The presence of this distinctive leaf physiognomic signature suggests that although a monsoon climate existed in Eocene time across southern Asia the characteristics of the modern topographically-enhanced South Asia Monsoon had yet to develop. By the Eocene leaves in South Asia had become well adapted to an I-AM type regime across many taxa and points to the existence of a pervasive monsoon climate prior to the Eocene. No fossil trait spectra typical of exposure to the modern East Asia monsoon were seen, suggesting the effects of this system in southern

  14. Incorporating X–ray summing into gamma–gamma signature quantification

    International Nuclear Information System (INIS)

    Britton, R.; Jackson, M.J.; Davies, A.V.

    2016-01-01

    A method for quantifying coincidence signatures has been extended to incorporate the effects of X–ray summing, and tested using a high–efficiency γ–γ system. An X–ray library has been created, allowing all possible γ, X–ray and conversion electron cascades to be generated. The equations for calculating efficiency and cascade summing corrected coincidence signature probabilities have also been extended from a two γ, two detector ‘special case’ to an arbitrarily large system. The coincidence library generated is fully searchable by energy, nuclide, coincidence pair, γ multiplicity, cascade probability and the half–life of the cascade, allowing the user to quickly identify coincidence signatures of interest. The method and software described is inherently flexible, as it only requires evaluated nuclear data, an X–ray library, and accurate efficiency characterisations to quickly and easily calculate coincidence signature probabilities for a variety of systems. Additional uses for the software include the fast identification of γ coincidence signals with required multiplicities and branching ratios, identification of the optimal coincidence signatures to measure for a particular system, and the calculation of cascade summing corrections for single detector systems. - Highlights: • Method for incorporating X-ray summing into coincidence measurements developed. • Calculation routines have been extended to an arbitrarily large detector system, and re-written to take advantage of multiple computing cores. • Data collected in list-mode with all events timestamped for offline coincidence analysis. • Coincidence analysis of environmental samples will dramatically improve the detection sensitivity achievable.

  15. Quantifying radionuclide signatures from a γ–γ coincidence system

    International Nuclear Information System (INIS)

    Britton, Richard; Jackson, Mark J.; Davies, Ashley V.

    2015-01-01

    A method for quantifying gamma coincidence signatures has been developed, and tested in conjunction with a high-efficiency multi-detector system to quickly identify trace amounts of radioactive material. The γ–γ system utilises fully digital electronics and list-mode acquisition to time–stamp each event, allowing coincidence matrices to be easily produced alongside typical ‘singles’ spectra. To quantify the coincidence signatures a software package has been developed to calculate efficiency and cascade summing corrected branching ratios. This utilises ENSDF records as an input, and can be fully automated, allowing the user to quickly and easily create/update a coincidence library that contains all possible γ and conversion electron cascades, associated cascade emission probabilities, and true-coincidence summing corrected γ cascade detection probabilities. It is also fully searchable by energy, nuclide, coincidence pair, γ multiplicity, cascade probability and half-life of the cascade. The probabilities calculated were tested using measurements performed on the γ–γ system, and found to provide accurate results for the nuclides investigated. Given the flexibility of the method, (it only relies on evaluated nuclear data, and accurate efficiency characterisations), the software can now be utilised for a variety of systems, quickly and easily calculating coincidence signature probabilities. - Highlights: • Monte-Carlo based software developed to easily create/update a coincidence signal library for environmental radionuclides. • Coincidence library utilised to accurately quantify gamma coincidence signatures. • All coincidence signature probabilities are corrected for cascade summing, conversion electron emission and pair production. • Key CTBTO relevant radionuclides have been tested to verify the calculated correction factors. • Accurately quantifying coincidence signals during routine analysis will allow dramatically improved detection

  16. Marketing the Uniqueness of Small Towns. Revised.

    Science.gov (United States)

    Dunn, Douglas; Hogg, David H.

    The key to marketing a town is determining and promoting the town's "differential advantage" or uniqueness that would make people want to visit or live there. Exercises to help communities gain important insights into the town's competitive edge include a brainstorming session with knowledgeable community members, a visitor…

  17. On uniqueness in evolution quasivariational inequalities

    Czech Academy of Sciences Publication Activity Database

    Brokate, M.; Krejčí, Pavel; Schnabel, H.

    2004-01-01

    Roč. 11, č. 1 (2004), s. 111-130 ISSN 0944-6532 Institutional research plan: CEZ:AV0Z1019905 Keywords : evolution quasivariational inequality * uniqueness * sweeping process Subject RIV: BA - General Mathematics Impact factor: 0.425, year: 2004 http://www.heldermann-verlag.de/jca/jca11/jca0386.pdf

  18. Esperanto: A Unique Model for General Linguistics.

    Science.gov (United States)

    Dulichenko, Aleksandr D.

    1988-01-01

    Esperanto presents a unique model for linguistic research by allowing the study of language development from project to fully functioning language. Esperanto provides insight into the growth of polysemy and redundancy, as well as into language universals and the phenomenon of social control. (Author/CB)

  19. Weeping dragon, a unique ornamenal citrus

    Science.gov (United States)

    ‘Weeping Dragon’ is a new ornamental citrus cultivar developed by intercrossing of two unusual and unique citrus types, Poncirus trifoliata cultivated variety (cv.) Flying Dragon, and Citrus sinensis cv. ‘Cipo’. This new hybrid cultivar combines strongly contorted and weeping growth traits in a smal...

  20. The end of the unique myocardial band

    DEFF Research Database (Denmark)

    MacIver, David H; Partridge, John B; Agger, Peter

    2018-01-01

    Two of the leading concepts of mural ventricular architecture are the unique myocardial band and the myocardial mesh model. We have described, in an accompanying article published in this journal, how the anatomical, histological and high-resolution computed tomographic studies strongly favour th...

  1. Re-examining the security of blind quantum signature protocols

    International Nuclear Information System (INIS)

    Wang Mingming; Chen Xiubo; Niu Xinxin; Yang Yixian

    2012-01-01

    Recently, blind quantum signature (BQS) protocols have been proposed with the help of a third-party verifier. However, our research shows that some of the BQS protocols are unable to complete the blind signature task fairly if the verifier is dishonest. Indeed, these protocols can be viewed as variants of the classical digital signature scheme of symmetric-key cryptography. If nobody is trusted in such protocols, digital signature cannot be implemented since disagreements cannot be solved fairly.

  2. Quantum signature scheme based on a quantum search algorithm

    International Nuclear Information System (INIS)

    Yoon, Chun Seok; Kang, Min Sung; Lim, Jong In; Yang, Hyung Jin

    2015-01-01

    We present a quantum signature scheme based on a two-qubit quantum search algorithm. For secure transmission of signatures, we use a quantum search algorithm that has not been used in previous quantum signature schemes. A two-step protocol secures the quantum channel, and a trusted center guarantees non-repudiation that is similar to other quantum signature schemes. We discuss the security of our protocol. (paper)

  3. A Signature Comparing Android Mobile Application Utilizing Feature Extracting Algorithms

    Directory of Open Access Journals (Sweden)

    Paul Grafilon

    2017-08-01

    Full Text Available The paper presented one of the application that can be done using smartphones camera. Nowadays forgery is one of the most undetected crimes. With the forensic technology used today it is still difficult for authorities to compare and define what a real signature is and what a forged signature is. A signature is a legal representation of a person. All transactions are based on a signature. Forgers may use a signature to sign illegal contracts and withdraw from bank accounts undetected. A signature can also be forged during election periods for repeated voting. Addressing the issues a signature should always be secure. Signature verification is a reduced problem that still poses a real challenge for researchers. The literature on signature verification is quite extensive and shows two main areas of research off-line and on-line systems. Off-line systems deal with a static image of the signature i.e. the result of the action of signing while on-line systems work on the dynamic process of generating the signature i.e. the action of signing itself. The researchers have found a way to resolve the concerns. A mobile application that integrates the camera to take a picture of a signature analyzes it and compares it to other signatures for verification. It will exist to help citizens to be more cautious and aware with issues regarding the signatures. This might also be relevant to help organizations and institutions such as banks and insurance companies in verifying signatures that may avoid unwanted transactions and identity theft. Furthermore this might help the authorities in the never ending battle against crime especially against forgers and thieves. The project aimed to design and develop a mobile application that integrates the smartphone camera for verifying and comparing signatures for security using the best algorithm possible. As the result of the development the said smartphone camera application is functional and reliable.

  4. Can specific transcriptional regulators assemble a universal cancer signature?

    Science.gov (United States)

    Roy, Janine; Isik, Zerrin; Pilarsky, Christian; Schroeder, Michael

    2013-10-01

    Recently, there is a lot of interest in using biomarker signatures derived from gene expression data to predict cancer progression. We assembled signatures of 25 published datasets covering 13 types of cancers. How do these signatures compare with each other? On one hand signatures answering the same biological question should overlap, whereas signatures predicting different cancer types should differ. On the other hand, there could also be a Universal Cancer Signature that is predictive independently of the cancer type. Initially, we generate signatures for all datasets using classical approaches such as t-test and fold change and then, we explore signatures resulting from a network-based method, that applies the random surfer model of Google's PageRank algorithm. We show that the signatures as published by the authors and the signatures generated with classical methods do not overlap - not even for the same cancer type - whereas the network-based signatures strongly overlap. Selecting 10 out of 37 universal cancer genes gives the optimal prediction for all cancers thus taking a first step towards a Universal Cancer Signature. We furthermore analyze and discuss the involved genes in terms of the Hallmarks of cancer and in particular single out SP1, JUN/FOS and NFKB1 and examine their specific role in cancer progression.

  5. Radar micro-doppler signatures processing and applications

    CERN Document Server

    Chen, Victor C; Miceli, William J

    2014-01-01

    Radar Micro-Doppler Signatures: Processing and applications concentrates on the processing and application of radar micro-Doppler signatures in real world situations, providing readers with a good working knowledge on a variety of applications of radar micro-Doppler signatures.

  6. Acoustic Signature Monitoring and Management of Naval Platforms

    NARCIS (Netherlands)

    Basten, T.G.H.; Jong, C.A.F. de; Graafland, F.; Hof, J. van 't

    2015-01-01

    Acoustic signatures make naval platforms susceptible to detection by threat sensors. The variable operational conditions and lifespan of a platform cause variations in the acoustic signature. To deal with these variations, a real time signature monitoring capability is being developed, with advisory

  7. 22 CFR 92.28 - Signature of affiant on affidavit.

    Science.gov (United States)

    2010-04-01

    ... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Signature of affiant on affidavit. 92.28 Section 92.28 Foreign Relations DEPARTMENT OF STATE LEGAL AND RELATED SERVICES NOTARIAL AND RELATED SERVICES Specific Notarial Acts § 92.28 Signature of affiant on affidavit. The signature of the affiant is...

  8. 45 CFR 81.32 - Signature of documents.

    Science.gov (United States)

    2010-10-01

    ... 45 Public Welfare 1 2010-10-01 2010-10-01 false Signature of documents. 81.32 Section 81.32 Public... UNDER PART 80 OF THIS TITLE Form, Execution, Service and Filing of Documents § 81.32 Signature of documents. The signature of a party, authorized officer, employee or attorney constitutes a certificate that...

  9. 21 CFR 1309.32 - Application forms; contents; signature.

    Science.gov (United States)

    2010-04-01

    ... 21 Food and Drugs 9 2010-04-01 2010-04-01 false Application forms; contents; signature. 1309.32... Application forms; contents; signature. (a) Any person who is required to be registered pursuant to § 1309.21... this paragraph and shall contain the signature of the individual being authorized to sign the...

  10. 17 CFR 201.65 - Identity and signature.

    Science.gov (United States)

    2010-04-01

    ... 17 Commodity and Securities Exchanges 2 2010-04-01 2010-04-01 false Identity and signature. 201.65... of 1934 § 201.65 Identity and signature. Applications pursuant to this subpart may omit the identity, mailing address, and signature of the applicant; provided, that such identity, mailing address and...

  11. Signature Pedagogies in Support of Teachers' Professional Learning

    Science.gov (United States)

    Parker, Melissa; Patton, Kevin; O'Sullivan, Mary

    2016-01-01

    Signature pedagogies [Shulman, L. 2005. "Signature pedagogies in the professions." "Daedalus" 134 (3): 52--59.] are a focus of teacher educators seeking to improve teaching and teacher education. The purpose of this paper is to present a preliminary common language of signature pedagogies for teacher professional development…

  12. 34 CFR 101.32 - Signature of documents.

    Science.gov (United States)

    2010-07-01

    ... 34 Education 1 2010-07-01 2010-07-01 false Signature of documents. 101.32 Section 101.32 Education Regulations of the Offices of the Department of Education OFFICE FOR CIVIL RIGHTS, DEPARTMENT OF EDUCATION... Documents § 101.32 Signature of documents. The signature of a party, authorized officer, employee or...

  13. 36 CFR 1150.22 - Signature of documents.

    Science.gov (United States)

    2010-07-01

    ... 36 Parks, Forests, and Public Property 3 2010-07-01 2010-07-01 false Signature of documents. 1150.22 Section 1150.22 Parks, Forests, and Public Property ARCHITECTURAL AND TRANSPORTATION BARRIERS... Documents for Proceedings on Citations § 1150.22 Signature of documents. The signature of a party...

  14. 29 CFR 102.116 - Signature of orders.

    Science.gov (United States)

    2010-07-01

    ... 29 Labor 2 2010-07-01 2010-07-01 false Signature of orders. 102.116 Section 102.116 Labor Regulations Relating to Labor NATIONAL LABOR RELATIONS BOARD RULES AND REGULATIONS, SERIES 8 Certification and Signature of Documents § 102.116 Signature of orders. The executive secretary or the associate executive...

  15. 48 CFR 204.101 - Contracting officer's signature.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 3 2010-10-01 2010-10-01 false Contracting officer's signature. 204.101 Section 204.101 Federal Acquisition Regulations System DEFENSE ACQUISITION REGULATIONS... officer's signature. Follow the procedures at PGI 204.101 for signature of contract documents. [71 FR 9268...

  16. 32 CFR 842.6 - Signature on the claim form.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 6 2010-07-01 2010-07-01 false Signature on the claim form. 842.6 Section 842.6... ADMINISTRATIVE CLAIMS General Information § 842.6 Signature on the claim form. The claimant or authorized agent... authorized agent signing for a claimant shows, after the signature, the title or capacity and attaches...

  17. 38 CFR 18b.21 - Signature of documents.

    Science.gov (United States)

    2010-07-01

    ... 38 Pensions, Bonuses, and Veterans' Relief 2 2010-07-01 2010-07-01 false Signature of documents. 18b.21 Section 18b.21 Pensions, Bonuses, and Veterans' Relief DEPARTMENT OF VETERANS AFFAIRS... Documents § 18b.21 Signature of documents. The signature of a party, authorized officer, employee, or...

  18. 37 CFR 2.74 - Form and signature of amendment.

    Science.gov (United States)

    2010-07-01

    ... 37 Patents, Trademarks, and Copyrights 1 2010-07-01 2010-07-01 false Form and signature of... signature of amendment. (a) Form of Amendment. Amendments should be set forth clearly and completely... record. (b) Signature. A request for amendment of an application must be signed by the applicant, someone...

  19. 21 CFR 11.200 - Electronic signature components and controls.

    Science.gov (United States)

    2010-04-01

    ... signature components and controls. (a) Electronic signatures that are not based upon biometrics shall: (1) Employ at least two distinct identification components such as an identification code and password. (i... signatures based upon biometrics shall be designed to ensure that they cannot be used by anyone other than...

  20. Autobiographical memory functions of nostalgia in comparison to rumination and counterfactual thinking: similarity and uniqueness.

    Science.gov (United States)

    Cheung, Wing-Yee; Wildschut, Tim; Sedikides, Constantine

    2018-02-01

    We compared and contrasted nostalgia with rumination and counterfactual thinking in terms of their autobiographical memory functions. Specifically, we assessed individual differences in nostalgia, rumination, and counterfactual thinking, which we then linked to self-reported functions or uses of autobiographical memory (Self-Regard, Boredom Reduction, Death Preparation, Intimacy Maintenance, Conversation, Teach/Inform, and Bitterness Revival). We tested which memory functions are shared and which are uniquely linked to nostalgia. The commonality among nostalgia, rumination, and counterfactual thinking resides in their shared positive associations with all memory functions: individuals who evinced a stronger propensity towards past-oriented thought (as manifested in nostalgia, rumination, and counterfactual thinking) reported greater overall recruitment of memories in the service of present functioning. The uniqueness of nostalgia resides in its comparatively strong positive associations with Intimacy Maintenance, Teach/Inform, and Self-Regard and weak association with Bitterness Revival. In all, nostalgia possesses a more positive functional signature than do rumination and counterfactual thinking.

  1. Bacterial assemblages of the eastern Atlantic Ocean reveal both vertical and latitudinal biogeographic signatures

    Science.gov (United States)

    Friedline, C. J.; Franklin, R. B.; McCallister, S. L.; Rivera, M. C.

    2012-06-01

    Microbial communities are recognized as major drivers of the biogeochemical processes in the oceans. However, the genetic diversity and composition of those communities is poorly understood. The aim of this study is to investigate the composition of bacterial assemblages in three different water layer habitats: surface (2-20 m), deep chlorophyll maximum (DCM; 28-90 m), and deep (100-4600 m) at nine stations along the eastern Atlantic Ocean from 42.8° N to 23.7° S. The sampling of three discrete, predefined habitat types from different depths, Longhurstian provinces, and geographical locations allowed us to investigate whether marine bacterial assemblages show spatial variation and to determine if the observed spatial variation is influenced by current environmental conditions, historical/geographical contingencies, or both. The PCR amplicons of the V6 region of the 16S rRNA from 16 microbial assemblages were pyrosequenced, generating a total of 352 029 sequences; after quality filtering and processing, 257 260 sequences were clustered into 2871 normalized operational taxonomic units (OTU) using a definition of 97% sequence identity. Community ecology statistical analyses demonstrate that the eastern Atlantic Ocean bacterial assemblages are vertically stratified and associated with water layers characterized by unique environmental signals (e.g., temperature, salinity, and nutrients). Genetic compositions of bacterial assemblages from the same water layer are more similar to each other than to assemblages from different water layers. The observed clustering of samples by water layer allows us to conclude that contemporary environments are influencing the observed biogeographic patterns. Moreover, the implementation of a novel Bayesian inference approach that allows a more efficient and explicit use of all the OTU abundance data shows a distance effect suggesting the influence of historical contingencies on the composition of bacterial assemblages. Surface

  2. Bacterial assemblages of the eastern Atlantic Ocean reveal both vertical and latitudinal biogeographic signatures

    Directory of Open Access Journals (Sweden)

    C. J. Friedline

    2012-06-01

    Full Text Available Microbial communities are recognized as major drivers of the biogeochemical processes in the oceans. However, the genetic diversity and composition of those communities is poorly understood. The aim of this study is to investigate the composition of bacterial assemblages in three different water layer habitats: surface (2–20 m, deep chlorophyll maximum (DCM; 28–90 m, and deep (100–4600 m at nine stations along the eastern Atlantic Ocean from 42.8° N to 23.7° S. The sampling of three discrete, predefined habitat types from different depths, Longhurstian provinces, and geographical locations allowed us to investigate whether marine bacterial assemblages show spatial variation and to determine if the observed spatial variation is influenced by current environmental conditions, historical/geographical contingencies, or both. The PCR amplicons of the V6 region of the 16S rRNA from 16 microbial assemblages were pyrosequenced, generating a total of 352 029 sequences; after quality filtering and processing, 257 260 sequences were clustered into 2871 normalized operational taxonomic units (OTU using a definition of 97% sequence identity. Community ecology statistical analyses demonstrate that the eastern Atlantic Ocean bacterial assemblages are vertically stratified and associated with water layers characterized by unique environmental signals (e.g., temperature, salinity, and nutrients. Genetic compositions of bacterial assemblages from the same water layer are more similar to each other than to assemblages from different water layers. The observed clustering of samples by water layer allows us to conclude that contemporary environments are influencing the observed biogeographic patterns. Moreover, the implementation of a novel Bayesian inference approach that allows a more efficient and explicit use of all the OTU abundance data shows a distance effect suggesting the influence of historical contingencies on the composition of bacterial

  3. [Uniqueness seeking behavior as a self-verification: an alternative approach to the study of uniqueness].

    Science.gov (United States)

    Yamaoka, S

    1995-06-01

    Uniqueness theory explains that extremely high perceived similarity between self and others evokes negative emotional reactions and causes uniqueness seeking behavior. However, the theory conceptualizes similarity so ambiguously that it appears to suffer from low predictive validity. The purpose of the current article is to propose an alternative explanation of uniqueness seeking behavior. It posits that perceived uniqueness deprivation is a threat to self-concepts, and therefore causes self-verification behavior. Two levels of self verification are conceived: one based on personal categorization and the other on social categorization. The present approach regards uniqueness seeking behavior as the personal-level self verification. To test these propositions, a 2 (very high or moderate similarity information) x 2 (with or without outgroup information) x 2 (high or low need for uniqueness) between-subject factorial-design experiment was conducted with 95 university students. Results supported the self-verification approach, and were discussed in terms of effects of uniqueness deprivation, levels of self-categorization, and individual differences in need for uniqueness.

  4. Securing optical code-division multiple-access networks with a postswitching coding scheme of signature reconfiguration

    Science.gov (United States)

    Huang, Jen-Fa; Meng, Sheng-Hui; Lin, Ying-Chen

    2014-11-01

    The optical code-division multiple-access (OCDMA) technique is considered a good candidate for providing optical layer security. An enhanced OCDMA network security mechanism with a pseudonoise (PN) random digital signals type of maximal-length sequence (M-sequence) code switching to protect against eavesdropping is presented. Signature codes unique to individual OCDMA-network users are reconfigured according to the register state of the controlling electrical shift registers. Examples of signature reconfiguration following state switching of the controlling shift register for both the network user and the eavesdropper are numerically illustrated. Dynamically changing the PN state of the shift register to reconfigure the user signature sequence is shown; this hinders eavesdroppers' efforts to decode correct data sequences. The proposed scheme increases the probability of eavesdroppers committing errors in decoding and thereby substantially enhances the degree of an OCDMA network's confidentiality.

  5. Dilatonic imprints on exact gravitational wave signatures

    Science.gov (United States)

    McCarthy, Fiona; KubizÅák, David; Mann, Robert B.

    2018-05-01

    By employing the moduli space approximation, we analytically calculate the gravitational wave signatures emitted upon the merger of two extremally charged dilatonic black holes. We probe several values of the dilatonic coupling constant a , and find significant departures from the Einstein-Maxwell (a =0 ) counterpart studied in [Phys. Rev. D 96, 061501 (2017), 10.1103/PhysRevD.96.061501]. For (low-energy) string theory black holes (a =1 ) there are no coalescence orbits and only a memory effect is observed, whereas for an intermediate value of the coupling (a =1 /√{3 } ) the late-time merger signature becomes exponentially suppressed, compared to the polynomial decay in the a =0 case without a dilaton. Such an imprint shows a clear difference between the case with and without a scalar field (as, for example, predicted by string theory) in black hole mergers.

  6. Chameleon dark energy models with characteristic signatures

    International Nuclear Information System (INIS)

    Gannouji, Radouane; Moraes, Bruno; Polarski, David; Mota, David F.; Winther, Hans A.; Tsujikawa, Shinji

    2010-01-01

    In chameleon dark energy models, local gravity constraints tend to rule out parameters in which observable cosmological signatures can be found. We study viable chameleon potentials consistent with a number of recent observational and experimental bounds. A novel chameleon field potential, motivated by f(R) gravity, is constructed where observable cosmological signatures are present both at the background evolution and in the growth rate of the perturbations. We study the evolution of matter density perturbations on low redshifts for this potential and show that the growth index today γ 0 can have significant dispersion on scales relevant for large scale structures. The values of γ 0 can be even smaller than 0.2 with large variations of γ on very low redshifts for the model parameters constrained by local gravity tests. This gives a possibility to clearly distinguish these chameleon models from the Λ-cold-dark-matter (ΛCDM) model in future high-precision observations.

  7. Entanglement as a signature of quantum chaos.

    Science.gov (United States)

    Wang, Xiaoguang; Ghose, Shohini; Sanders, Barry C; Hu, Bambi

    2004-01-01

    We explore the dynamics of entanglement in classically chaotic systems by considering a multiqubit system that behaves collectively as a spin system obeying the dynamics of the quantum kicked top. In the classical limit, the kicked top exhibits both regular and chaotic dynamics depending on the strength of the chaoticity parameter kappa in the Hamiltonian. We show that the entanglement of the multiqubit system, considered for both the bipartite and the pairwise entanglement, yields a signature of quantum chaos. Whereas bipartite entanglement is enhanced in the chaotic region, pairwise entanglement is suppressed. Furthermore, we define a time-averaged entangling power and show that this entangling power changes markedly as kappa moves the system from being predominantly regular to being predominantly chaotic, thus sharply identifying the edge of chaos. When this entangling power is averaged over all states, it yields a signature of global chaos. The qualitative behavior of this global entangling power is similar to that of the classical Lyapunov exponent.

  8. Quark-gluon plasma: experimental signatures

    International Nuclear Information System (INIS)

    Drapier, O.

    1995-01-01

    The existence of a deconfining phase transition of nuclear matter is a clear prediction of lattice quantum chromodynamics calculations. The signatures of this quark-gluon plasma (QGP) have been searched for, since the first high energy ion beams became available at BNL and CERN in 1986, and gold and lead beams are now accelerated at 11 and 160 GeV per nucleon by the AGS and SPS. An overview of the main signatures expected in case of QGP formation is presented here. Although some recent results have been found in agreement with the predictions of the QGP scenario, no clear evidence for its formation has been observed at present. Nevertheless, new high statistics results are expected from CERN lead beams. In addition, future experiments are being prepared at RHIC and LHCC, providing an increase by two orders of magnitude of the c.m.s. energy within a few years. (author). 66 refs., 28 figs

  9. Supernova signatures of neutrino mass ordering

    Science.gov (United States)

    Scholberg, Kate

    2018-01-01

    A suite of detectors around the world is poised to measure the flavor-energy-time evolution of the ten-second burst of neutrinos from a core-collapse supernova occurring in the Milky Way or nearby. Next-generation detectors to be built in the next decade will have enhanced flavor sensitivity and statistics. Not only will the observation of this burst allow us to peer inside the dense matter of the extreme event and learn about the collapse processes and the birth of the remnant, but the neutrinos will bring information about neutrino properties themselves. This review surveys some of the physical signatures that the currently-unknown neutrino mass pattern will imprint on the observed neutrino events at Earth, emphasizing the most robust and least model-dependent signatures of mass ordering.

  10. Multiple floating metatarsals: a unique injury

    Directory of Open Access Journals (Sweden)

    Trikha Vivek

    2013-04-01

    Full Text Available 【Abstract】Concomitant dislocation of the tar-sometatarsal and metatarsophalangeal joints of foot is an extremely rare injury. Such injuries presenting in a single or adjacent dual rays have been described in few cases previously. We describe such an injury in adjacent three metatarsals of a polytrauma patient. These injuries are likely to be missed in the initial assessment of a polytrauma patient. These patients are at risk of an overlooked diagnosis but the consequences of missing this type of injury may be Vivek Trikha*, Tarun Goyal, Amit K Agarwal quite severe. This case is presented in view of its unique-ness along with possible mechanism of injury, the sequence of reduction and follow-up. Knowledge of such injury and its proper management may be useful to the trauma surgeons. Key words: Metatarsal bones; Metatarsophalangeal joint; Wounds and injuries

  11. Cryptographic key generation using handwritten signature

    OpenAIRE

    Freire, Manuel R.; Fiérrez, Julián; Ortega-García, Javier

    2006-01-01

    M. Freire-Santos ; J. Fierrez-Aguilar ; J. Ortega-Garcia; "Cryptographic key generation using handwritten signature", Biometric Technology for Human Identification III, Proc. SPIE 6202 (April 17, 2006); doi:10.1117/12.665875. Copyright 2006 Society of Photo‑Optical Instrumentation Engineers. One print or electronic copy may be made for personal use only. Systematic reproduction and distribution, duplication of any material in this paper for a fee or for commercial purposes, or modification of...

  12. Limits and signatures of relativistic spaceflight

    Science.gov (United States)

    Yurtsever, Ulvi; Wilkinson, Steven

    2018-01-01

    While special relativity imposes an absolute speed limit at the speed of light, our Universe is not empty Minkowski spacetime. The constituents that fill the interstellar/intergalactic vacuum, including the cosmic microwave background photons, impose a lower speed limit on any object travelling at relativistic velocities. Scattering of cosmic microwave photons from an ultra-relativistic object may create radiation with a characteristic signature allowing the detection of such objects at large distances.

  13. Signatures of quark-gluon plasma production

    International Nuclear Information System (INIS)

    Gyulassy, M.

    1985-01-01

    A critical analysis of a variety of proposed signatures for quark-gluon formation in ultrarelativistic nuclear collisions is given. The authors emphasize that longitudinal growth rather than the nuclear radius controls the time scales for expansion. The author pointed out the qualitative difference of the evolution of the plasma produced in the stopping regime E approx. 10 GeV/nucleon and the scaling regime E > 1 TeV/nucleon. This difference reflects itself in the the rmal profile function

  14. Selection signatures in worldwide sheep populations.

    OpenAIRE

    Fariello, Maria-Ines; Servin, Bertrand; Tosser-Klopp, Gwenola; Rupp, Rachel; Moreno, Carole; San Cristobal, Magali; Boitard, Simon; Drögemüller, Cord; The International Sheep Genomics Consortium, ISGC

    2014-01-01

    The diversity of populations in domestic species offers great opportunities to study genome response to selection. The recently published Sheep HapMap dataset is a great example of characterization of the world wide genetic diversity in sheep. In this study, we re-analyzed the Sheep HapMap dataset to identify selection signatures in worldwide sheep populations. Compared to previous analyses, we made use of statistical methods that (i) take account of the hierarchical structure of sheep popula...

  15. Selection Signatures in Worldwide Sheep Populations

    OpenAIRE

    Fariello, Maria-Ines; Servin, Bertrand; Tosser-Klopp, Gwenola; Rupp, Rachel; Moreno, Carole; Cristobal, Magali San; Boitard, Simon

    2014-01-01

    The diversity of populations in domestic species offers great opportunities to study genome response to selection. The recently published Sheep HapMap dataset is a great example of characterization of the world wide genetic diversity in sheep. In this study, we re-analyzed the Sheep HapMap dataset to identify selection signatures in worldwide sheep populations. Compared to previous analyses, we made use of statistical methods that (i) take account of the hierarchical structure of sheep popula...

  16. ALPs effective field theory and collider signatures

    DEFF Research Database (Denmark)

    Brivio, I.; Gavela, M. B.; Merlo, L.

    2017-01-01

    We study the leading effective interactions between the Standard Model fields and a generic singlet CP-odd (pseudo-) Goldstone boson. Two possible frameworks for electroweak symmetry breaking are considered: linear and non-linear. For the latter case, the basis of leading effective operators is d...... final states are most promising signals expected in both frameworks. In addition, non-standard Higgs decays and mono-Higgs signatures are especially prominent and expected to be dominant in non-linear realisations....

  17. Consciousness: a unique way of processing information.

    Science.gov (United States)

    Marchetti, Giorgio

    2018-02-08

    In this article, I argue that consciousness is a unique way of processing information, in that: it produces information, rather than purely transmitting it; the information it produces is meaningful for us; the meaning it has is always individuated. This uniqueness allows us to process information on the basis of our personal needs and ever-changing interactions with the environment, and consequently to act autonomously. Three main basic cognitive processes contribute to realize this unique way of information processing: the self, attention and working memory. The self, which is primarily expressed via the central and peripheral nervous systems, maps our body, the environment, and our relations with the environment. It is the primary means by which the complexity inherent to our composite structure is reduced into the "single voice" of a unique individual. It provides a reference system that (albeit evolving) is sufficiently stable to define the variations that will be used as the raw material for the construction of conscious information. Attention allows for the selection of those variations in the state of the self that are most relevant in the given situation. Attention originates and is deployed from a single locus inside our body, which represents the center of the self, around which all our conscious experiences are organized. Whatever is focused by attention appears in our consciousness as possessing a spatial quality defined by this center and the direction toward which attention is focused. In addition, attention determines two other features of conscious experience: periodicity and phenomenal quality. Self and attention are necessary but not sufficient for conscious information to be produced. Complex forms of conscious experiences, such as the various modes of givenness of conscious experience and the stream of consciousness, need a working memory mechanism to assemble the basic pieces of information selected by attention.

  18. Modularity, comparative cognition and human uniqueness

    OpenAIRE

    Shettleworth, Sara J.

    2012-01-01

    Darwin's claim ‘that the difference in mind between man and the higher animals … is certainly one of degree and not of kind’ is at the core of the comparative study of cognition. Recent research provides unprecedented support for Darwin's claim as well as new reasons to question it, stimulating new theories of human cognitive uniqueness. This article compares and evaluates approaches to such theories. Some prominent theories propose sweeping domain-general characterizations of the difference ...

  19. A unique theory of all forces

    International Nuclear Information System (INIS)

    Di Vecchia, Paolo

    1997-01-01

    In discussing the construction of a consistent theory of quantum gravity unified with the gauge interactions we are naturally led to a string theory. We review its properties and the five consistent supersymmetric string theories in ten dimensions. We finally discuss the evidence that these theories are actually special limits of a unique 11-dimensional theory, called M-theory, and a recent conjecture for its explicit formulation as a supersymmetric Matrix theory

  20. Staggering in signature partners of A∼190 mass region of superdeformed rotational bands

    International Nuclear Information System (INIS)

    Uma, V.S.; Goel, Alpana; Yadav, Archana

    2014-01-01

    This paper discuss about ΔI=1 signature splitting in signature partner pairs of A∼190 mass region. Around twenty signature partner pairs (usually called as two bands, each with a fixed signature) have been reported in this mass region. For these signature pairs, band head moment of inertia (J 0 ) and intrinsic structure of each pair of signature partners have been found as almost identical. Also, these signature partner pairs showed large amplitude signature splitting. As each of the two signature partner forms a regular spin sequence and signature bands are not equivalent in terms of energies. This difference in energies results in signature splitting

  1. On signature change in p-adic space-times

    International Nuclear Information System (INIS)

    Dragovic, B.G.

    1991-01-01

    Change of signature by linear coordinate transformations in p-adic space-times is considered. In this paper it is shown that there exists arbitrary change of trivial signature in Q p n for all n ≥ 1 if p ≡ 1 (mod 4). In other cases it is possible to change only even number of the signs of the signature. The authors suggest new concept of signature with respect to distinct quadratic extensions, of Q p . If space-time dimension is restricted to four there is no signature change

  2. A Digital Signature Scheme Based on MST3 Cryptosystems

    Directory of Open Access Journals (Sweden)

    Haibo Hong

    2014-01-01

    Full Text Available As special types of factorization of finite groups, logarithmic signature and cover have been used as the main components of cryptographic keys for secret key cryptosystems such as PGM and public key cryptosystems like MST1, MST2, and MST3. Recently, Svaba et. al proposed a revised MST3 encryption scheme with greater security. Meanwhile, they put forward an idea of constructing signature schemes on the basis of logarithmic signatures and random covers. In this paper, we firstly design a secure digital signature scheme based on logarithmic signatures and random covers. In order to complete the task, we devise a new encryption scheme based on MST3 cryptosystems.

  3. New particles and their experimental signatures

    International Nuclear Information System (INIS)

    Ellis, J.; Gelmini, G.; Kowalski, H.

    1984-08-01

    This report summarizes work done by our theoretical working group on exotic particles before, during and since the Lausanne meeting. We discuss the motivations, rates and experimental signatures for new physics and new particles in the 1 TeV mass range. Section 2 reviews some of the motivations for expecting new physics in this range. Of particular interest is the physics of gauge symmetry breaking. In section 3 we discuss the rates and experimental signatures of new particles predicted by theoretical models of gauge symmetry breaking, notably the Higgs boson supersymmetry and technicolour. Among the signatures we discuss are multiple Wsup(+-) and/or Z 0 events (for the Higgs), missing transverse energy (for supersymmetry) and multiple anti tt events (for the Higgs and technicolour). We provide many examples of final state differential distributions in rapidity and Psub(T), particularly for Higgses and for supersymmetry. We also analyse some physics backgrounds to the new particle production processes which interest us. Examples include W + W - , Z 0 Z 0 , W(anti tt) and (anti tt) production as backgrounds to Higgs production. However, we do not consider in detail non-physics backgrounds such as the jet fluctuation background to missing energy signals for supersymmetry production. Section 4 summarizes our preliminary conclusions on the observability at a high energy hadron collider of the new particles studied in this report. (orig./HSI)

  4. Mirage: a visible signature evaluation tool

    Science.gov (United States)

    Culpepper, Joanne B.; Meehan, Alaster J.; Shao, Q. T.; Richards, Noel

    2017-10-01

    This paper presents the Mirage visible signature evaluation tool, designed to provide a visible signature evaluation capability that will appropriately reflect the effect of scene content on the detectability of targets, providing a capability to assess visible signatures in the context of the environment. Mirage is based on a parametric evaluation of input images, assessing the value of a range of image metrics and combining them using the boosted decision tree machine learning method to produce target detectability estimates. It has been developed using experimental data from photosimulation experiments, where human observers search for vehicle targets in a variety of digital images. The images used for tool development are synthetic (computer generated) images, showing vehicles in many different scenes and exhibiting a wide variation in scene content. A preliminary validation has been performed using k-fold cross validation, where 90% of the image data set was used for training and 10% of the image data set was used for testing. The results of the k-fold validation from 200 independent tests show a prediction accuracy between Mirage predictions of detection probability and observed probability of detection of r(262) = 0:63, p Pearson correlation) and a MAE = 0:21 (mean absolute error).

  5. SIGNATURES OF LONG-LIVED SPIRAL PATTERNS

    International Nuclear Information System (INIS)

    Martínez-García, Eric E.; González-Lópezlira, Rosa A.

    2013-01-01

    Azimuthal age/color gradients across spiral arms are a signature of long-lived spirals. From a sample of 19 normal (or weakly barred) spirals where we have previously found azimuthal age/color gradient candidates, 13 objects were further selected if a two-armed grand-design pattern survived in a surface density stellar mass map. Mass maps were obtained from optical and near-infrared imaging, by comparison with a Monte Carlo library of stellar population synthesis models that allowed us to obtain the mass-to-light ratio in the J band, (M/L) J , as a function of (g – i) versus (i – J) color. The selected spirals were analyzed with Fourier methods in search of other signatures of long-lived modes related to the gradients, such as the gradient divergence toward corotation, and the behavior of the phase angle of the two-armed spiral in different wavebands, as expected from theory. The results show additional signatures of long-lived spirals in at least 50% of the objects.

  6. On psychoanalytic supervision as signature pedagogy.

    Science.gov (United States)

    Watkins, C Edward

    2014-04-01

    What is signature pedagogy in psychoanalytic education? This paper examines that question, considering why psychoanalytic supervision best deserves that designation. In focusing on supervision as signature pedagogy, I accentuate its role in building psychoanalytic habits of mind, habits of hand, and habits of heart, and transforming theory and self-knowledge into practical product. Other facets of supervision as signature pedagogy addressed in this paper include its features of engagement, uncertainty, formation, and pervasiveness, as well as levels of surface, deep, and implicit structure. Epistemological, ontological, and axiological in nature, psychoanalytic supervision engages trainees in learning to do, think, and value what psychoanalytic practitioners in the field do, think, and value: It is, most fundamentally, professional preparation for competent, "good work." In this paper, effort is made to shine a light on and celebrate the pivotal role of supervision in "making" or developing budding psychoanalysts and psychoanalytic psychotherapists. Now over a century old, psychoanalytic supervision remains unparalleled in (1) connecting and integrating conceptualization and practice, (2) transforming psychoanalytic theory and self-knowledge into an informed analyzing instrument, and (3) teaching, transmitting, and perpetuating the traditions, practice, and culture of psychoanalytic treatment.

  7. Enhanced vibration diagnostics using vibration signature analysis

    International Nuclear Information System (INIS)

    Ahmed, S.; Shehzad, K.; Zahoor, Y.; Mahmood, A.; Bibi, A.

    2001-01-01

    Symptoms will appear in equipment, as well as in human beings. when 'suffering from sickness. Symptoms of abnormality in equipment are vibration, noise, deformation, temperature, pressure, electric current, crack, wearing, leakage etc. these are called modes of failure. If the mode of failure is vibration then the vibration signature analysis can be effectively used in order to diagnose the machinery problems. Much valuable information is contained within these vibration 'Spectra' or 'Signatures' but is only of use if the analyst can unlock its 'Secrets'. This paper documents a vibration problem in the motor of a centrifugal pump (Type ETA). It focuses mainly on the roll of modern vibration monitoring system in problem analysis. The problem experienced was the motor unstability and noise due to high vibration. Using enhanced vibration signature data, the problem was analyzed. which suggested that the rotor eccentricity was the cause of excessive noise and vibration in the motor. In conclusion, advanced electronic monitoring and diagnostic systems provide powerful information for machine's condition assessment and problem analysis. Appropriate interpretation and use of this information is important for accurate and effective vibration analysis. (author)

  8. Measurement-device-independent quantum digital signatures

    Science.gov (United States)

    Puthoor, Ittoop Vergheese; Amiri, Ryan; Wallden, Petros; Curty, Marcos; Andersson, Erika

    2016-08-01

    Digital signatures play an important role in software distribution, modern communication, and financial transactions, where it is important to detect forgery and tampering. Signatures are a cryptographic technique for validating the authenticity and integrity of messages, software, or digital documents. The security of currently used classical schemes relies on computational assumptions. Quantum digital signatures (QDS), on the other hand, provide information-theoretic security based on the laws of quantum physics. Recent work on QDS Amiri et al., Phys. Rev. A 93, 032325 (2016);, 10.1103/PhysRevA.93.032325 Yin, Fu, and Zeng-Bing, Phys. Rev. A 93, 032316 (2016), 10.1103/PhysRevA.93.032316 shows that such schemes do not require trusted quantum channels and are unconditionally secure against general coherent attacks. However, in practical QDS, just as in quantum key distribution (QKD), the detectors can be subjected to side-channel attacks, which can make the actual implementations insecure. Motivated by the idea of measurement-device-independent quantum key distribution (MDI-QKD), we present a measurement-device-independent QDS (MDI-QDS) scheme, which is secure against all detector side-channel attacks. Based on the rapid development of practical MDI-QKD, our MDI-QDS protocol could also be experimentally implemented, since it requires a similar experimental setup.

  9. Genomic DNA Methylation Signatures Enable Concurrent Diagnosis and Clinical Genetic Variant Classification in Neurodevelopmental Syndromes.

    Science.gov (United States)

    Aref-Eshghi, Erfan; Rodenhiser, David I; Schenkel, Laila C; Lin, Hanxin; Skinner, Cindy; Ainsworth, Peter; Paré, Guillaume; Hood, Rebecca L; Bulman, Dennis E; Kernohan, Kristin D; Boycott, Kym M; Campeau, Philippe M; Schwartz, Charles; Sadikovic, Bekim

    2018-01-04

    Pediatric developmental syndromes present with systemic, complex, and often overlapping clinical features that are not infrequently a consequence of Mendelian inheritance of mutations in genes involved in DNA methylation, establishment of histone modifications, and chromatin remodeling (the "epigenetic machinery"). The mechanistic cross-talk between histone modification and DNA methylation suggests that these syndromes might be expected to display specific DNA methylation signatures that are a reflection of those primary errors associated with chromatin dysregulation. Given the interrelated functions of these chromatin regulatory proteins, we sought to identify DNA methylation epi-signatures that could provide syndrome-specific biomarkers to complement standard clinical diagnostics. In the present study, we examined peripheral blood samples from a large cohort of individuals encompassing 14 Mendelian disorders displaying mutations in the genes encoding proteins of the epigenetic machinery. We demonstrated that specific but partially overlapping DNA methylation signatures are associated with many of these conditions. The degree of overlap among these epi-signatures is minimal, further suggesting that, consistent with the initial event, the downstream changes are unique to every syndrome. In addition, by combining these epi-signatures, we have demonstrated that a machine learning tool can be built to concurrently screen for multiple syndromes with high sensitivity and specificity, and we highlight the utility of this tool in solving ambiguous case subjects presenting with variants of unknown significance, along with its ability to generate accurate predictions for subjects presenting with the overlapping clinical and molecular features associated with the disruption of the epigenetic machinery. Copyright © 2017 American Society of Human Genetics. Published by Elsevier Inc. All rights reserved.

  10. The electronic identification, signature and security of information systems

    Directory of Open Access Journals (Sweden)

    Horovèák Pavel

    2002-12-01

    Full Text Available The contribution deals with the actual methods and technologies of information and communication systems security. It introduces the overview of electronic identification elements such as static password, dynamic password and single sign-on. Into this category belong also biometric and dynamic characteristics of verified person. Widespread is authentication based on identification elements ownership, such as various cards and authentication calculators. In the next part is specified a definition and characterization of electronic signature, its basic functions and certificate categories. Practical utilization of electronic signature consists of electronic signature acquirement, signature of outgoing email message, receiving of electronic signature and verification of electronic signature. The use of electronic signature is continuously growing and in connection with legislation development it exercises in all resorts.

  11. Uniqueness and non-uniqueness of semigroups generated by singular diffusion operators

    CERN Document Server

    Eberle, Andreas

    1999-01-01

    This book addresses both probabilists working on diffusion processes and analysts interested in linear parabolic partial differential equations with singular coefficients. The central question discussed is whether a given diffusion operator, i.e., a second order linear differential operator without zeroth order term, which is a priori defined on test functions over some (finite or infinite dimensional) state space only, uniquely determines a strongly continuous semigroup on a corresponding weighted Lp space. Particular emphasis is placed on phenomena causing non-uniqueness, as well as on the relation between different notions of uniqueness appearing in analytic and probabilistic contexts.

  12. Unique properties of Drosophila spermatocyte primary cilia

    Directory of Open Access Journals (Sweden)

    Maria Giovanna Riparbelli

    2013-09-01

    The primary cilium is an essential organelle required for animal development and adult homeostasis that is found on most animal cells. The primary cilium contains a microtubule-based axoneme cytoskeleton that typically grows from the mother centriole in G0/G1 phase of the cell cycle as a membrane-bound compartment that protrudes from the cell surface. A unique system of bidirectional transport, intraflagellar transport (IFT, maintains the structure and function of cilia. While the axoneme is dynamic, growing and shrinking at its tip, at the same time it is very stable to the effects of microtubule-targeting drugs. The primary cilia found on Drosophila spermatocytes diverge from the general rules of primary cilium biology in several respects. Among these unique attributes, spermatocyte cilia assemble from all four centrioles in an IFT-independent manner in G2 phase, and persist continuously through two cell divisions. Here, we show that Drosophila spermatocyte primary cilia are extremely sensitive to microtubule-targeting drugs, unlike their mammalian counterparts. Spermatocyte cilia and their axonemes fail to assemble or be maintained upon nocodazole treatment, while centriole replication appears unperturbed. On the other hand, paclitaxel (Taxol, a microtubule-stabilizing drug, disrupted transition zone assembly and anchoring to the plasma membrane while causing spermatocyte primary cilia to grow extensively long during the assembly/elongation phase, but did not overtly affect the centrioles. However, once assembled to their mature length, spermatocyte cilia appeared unaffected by Taxol. The effects of these drugs on axoneme dynamics further demonstrate that spermatocyte primary cilia are endowed with unique assembly properties.

  13. Unique supply function equilibrium with capacity constraints

    International Nuclear Information System (INIS)

    Holmberg, Paer

    2008-01-01

    Consider a market where producers submit supply functions to a procurement auction with uncertain demand, e.g. an electricity auction. In the Supply Function Equilibrium (SFE), every firm commits to the supply function that maximises expected profit in the one-shot game given the supply functions of competitors. A basic weakness of the SFE is the presence of multiple equilibria. This paper shows that with (i) symmetric producers, (ii) perfectly inelastic demand, (iii) a price cap, and (iv) capacity constraints that bind with a positive probability, there exists a unique, symmetric SFE. (author)

  14. Stationary Black Holes: Uniqueness and Beyond

    Directory of Open Access Journals (Sweden)

    Heusler Markus

    1998-01-01

    Full Text Available The spectrum of known black hole solutions to the stationary Einstein equations has increased in an unexpected way during the last decade. In particular, it has turned out that not all black hole equilibrium configurations are characterized by their mass, angular momentum and global charges. Moreover, the high degree of symmetry displayed by vacuum and electro-vacuum black hole space-times ceases to exist in self-gravitating non-linear field theories. This text aims to review some of the recent developments and to discuss them in the light of the uniqueness theorem for the Einstein-Maxwell system.

  15. Stationary Black Holes: Uniqueness and Beyond

    Directory of Open Access Journals (Sweden)

    Piotr T. Chruściel

    2012-05-01

    Full Text Available The spectrum of known black-hole solutions to the stationary Einstein equations has been steadily increasing, sometimes in unexpected ways. In particular, it has turned out that not all black-hole-equilibrium configurations are characterized by their mass, angular momentum and global charges. Moreover, the high degree of symmetry displayed by vacuum and electro vacuum black-hole spacetimes ceases to exist in self-gravitating non-linear field theories. This text aims to review some developments in the subject and to discuss them in light of the uniqueness theorem for the Einstein-Maxwell system.

  16. On uniqueness in diffuse optical tomography

    International Nuclear Information System (INIS)

    Harrach, Bastian

    2009-01-01

    A prominent result of Arridge and Lionheart (1998 Opt. Lett. 23 882–4) demonstrates that it is in general not possible to simultaneously recover both the diffusion (aka scattering) and the absorption coefficient in steady-state (dc) diffusion-based optical tomography. In this work we show that it suffices to restrict ourselves to piecewise constant diffusion and piecewise analytic absorption coefficients to regain uniqueness. Under this condition both parameters can simultaneously be determined from complete measurement data on an arbitrarily small part of the boundary

  17. Protein signatures using electrostatic molecular surfaces in harmonic space

    Directory of Open Access Journals (Sweden)

    C. Sofia Carvalho

    2013-10-01

    Full Text Available We developed a novel method based on the Fourier analysis of protein molecular surfaces to speed up the analysis of the vast structural data generated in the post-genomic era. This method computes the power spectrum of surfaces of the molecular electrostatic potential, whose three-dimensional coordinates have been either experimentally or theoretically determined. Thus we achieve a reduction of the initial three-dimensional information on the molecular surface to the one-dimensional information on pairs of points at a fixed scale apart. Consequently, the similarity search in our method is computationally less demanding and significantly faster than shape comparison methods. As proof of principle, we applied our method to a training set of viral proteins that are involved in major diseases such as Hepatitis C, Dengue fever, Yellow fever, Bovine viral diarrhea and West Nile fever. The training set contains proteins of four different protein families, as well as a mammalian representative enzyme. We found that the power spectrum successfully assigns a unique signature to each protein included in our training set, thus providing a direct probe of functional similarity among proteins. The results agree with established biological data from conventional structural biochemistry analyses.

  18. A metabolic signature of long life in Caenorhabditis elegans

    Directory of Open Access Journals (Sweden)

    Viney Jonathan M

    2010-02-01

    Full Text Available Abstract Background Many Caenorhabditis elegans mutations increase longevity and much evidence suggests that they do so at least partly via changes in metabolism. However, up until now there has been no systematic investigation of how the metabolic networks of long-lived mutants differ from those of normal worms. Metabolomic technologies, that permit the analysis of many untargeted metabolites in parallel, now make this possible. Here we use one of these, 1H nuclear magnetic resonance spectroscopy, to investigate what makes long-lived worms metabolically distinctive. Results We examined three classes of long-lived worms: dauer larvae, adult Insulin/IGF-1 signalling (IIS-defective mutants, and a translation-defective mutant. Surprisingly, these ostensibly different long-lived worms share a common metabolic signature, dominated by shifts in carbohydrate and amino acid metabolism. In addition the dauer larvae, uniquely, had elevated levels of modified amino acids (hydroxyproline and phosphoserine. We interrogated existing gene expression data in order to integrate functional (metabolite-level changes with transcriptional changes at a pathway level. Conclusions The observed metabolic responses could be explained to a large degree by upregulation of gluconeogenesis and the glyoxylate shunt as well as changes in amino acid catabolism. These responses point to new possible mechanisms of longevity assurance in worms. The metabolic changes observed in dauer larvae can be explained by the existence of high levels of autophagy leading to recycling of cellular components. See associated minireview: http://jbiol.com/content/9/1/7

  19. Single Nucleobase Identification Using Biophysical Signatures from Nanoelectronic Quantum Tunneling.

    Science.gov (United States)

    Korshoj, Lee E; Afsari, Sepideh; Khan, Sajida; Chatterjee, Anushree; Nagpal, Prashant

    2017-03-01

    Nanoelectronic DNA sequencing can provide an important alternative to sequencing-by-synthesis by reducing sample preparation time, cost, and complexity as a high-throughput next-generation technique with accurate single-molecule identification. However, sample noise and signature overlap continue to prevent high-resolution and accurate sequencing results. Probing the molecular orbitals of chemically distinct DNA nucleobases offers a path for facile sequence identification, but molecular entropy (from nucleotide conformations) makes such identification difficult when relying only on the energies of lowest-unoccupied and highest-occupied molecular orbitals (LUMO and HOMO). Here, nine biophysical parameters are developed to better characterize molecular orbitals of individual nucleobases, intended for single-molecule DNA sequencing using quantum tunneling of charges. For this analysis, theoretical models for quantum tunneling are combined with transition voltage spectroscopy to obtain measurable parameters unique to the molecule within an electronic junction. Scanning tunneling spectroscopy is then used to measure these nine biophysical parameters for DNA nucleotides, and a modified machine learning algorithm identified nucleobases. The new parameters significantly improve base calling over merely using LUMO and HOMO frontier orbital energies. Furthermore, high accuracies for identifying DNA nucleobases were observed at different pH conditions. These results have significant implications for developing a robust and accurate high-throughput nanoelectronic DNA sequencing technique. © 2017 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.

  20. Reactor coolant pump testing using motor current signatures analysis

    Energy Technology Data Exchange (ETDEWEB)

    Burstein, N.; Bellamy, J.

    1996-12-01

    This paper describes reactor coolant pump motor testing carried out at Florida Power Corporation`s Crystal River plant using Framatome Technologies` new EMPATH (Electric Motor Performance Analysis and Trending Hardware) system. EMPATH{trademark} uses an improved form of Motor Current Signature Analysis (MCSA), technology, originally developed at Oak Ridge National Laboratories, for detecting deterioration in the rotors of AC induction motors. Motor Current Signature Analysis (MCSA) is a monitoring tool for motor driven equipment that provides a non-intrusive means for detecting the presence of mechanical and electrical abnormalities in the motor and the driven equipment. The base technology was developed at the Oak Ridge National Laboratory as a means for determining the affects of aging and service wear specifically on motor-operated valves used in nuclear power plant safety systems, but it is applicable to a broad range of electric machinery. MCSA is based on the recognition that an electric motor (ac or dc) driving a mechanical load acts as an efficient and permanently available transducer by sensing mechanical load variations, large and small, long-term and rapid, and converting them into variations in the induced current generated in the motor windings. The motor current variations, resulting from changes in load caused by gears, pulleys, friction, bearings, and other conditions that may change over the life of the motor, are carried by the electrical cables powering the motor and are extracted at any convenient location along the motor lead. These variations modulate the 60 Hz carrier frequency and appear as sidebands in the spectral plot.

  1. Polarized X-Ray Emission from Magnetized Neutron Stars: Signature of Strong-Field Vacuum Polarization

    Science.gov (United States)

    Lai, Dong; Ho, Wynn C.

    2003-08-01

    In the atmospheric plasma of a strongly magnetized neutron star, vacuum polarization can induce a Mikheyev-Smirnov-Wolfenstein type resonance across which an x-ray photon may (depending on its energy) convert from one mode into the other, with significant changes in opacities and polarizations. We show that this vacuum resonance effect gives rise to a unique energy-dependent polarization signature in the surface emission from neutron stars. The detection of polarized x rays from neutron stars can provide a direct probe of strong-field quantum electrodynamics and constrain the neutron star magnetic field and geometry.

  2. Polarized x-ray emission from magnetized neutron stars: signature of strong-field vacuum polarization.

    Science.gov (United States)

    Lai, Dong; Ho, Wynn C G

    2003-08-15

    In the atmospheric plasma of a strongly magnetized neutron star, vacuum polarization can induce a Mikheyev-Smirnov-Wolfenstein type resonance across which an x-ray photon may (depending on its energy) convert from one mode into the other, with significant changes in opacities and polarizations. We show that this vacuum resonance effect gives rise to a unique energy-dependent polarization signature in the surface emission from neutron stars. The detection of polarized x rays from neutron stars can provide a direct probe of strong-field quantum electrodynamics and constrain the neutron star magnetic field and geometry.

  3. Unmanned Aerial Vehicles unique cost estimating requirements

    Science.gov (United States)

    Malone, P.; Apgar, H.; Stukes, S.; Sterk, S.

    Unmanned Aerial Vehicles (UAVs), also referred to as drones, are aerial platforms that fly without a human pilot onboard. UAVs are controlled autonomously by a computer in the vehicle or under the remote control of a pilot stationed at a fixed ground location. There are a wide variety of drone shapes, sizes, configurations, complexities, and characteristics. Use of these devices by the Department of Defense (DoD), NASA, civil and commercial organizations continues to grow. UAVs are commonly used for intelligence, surveillance, reconnaissance (ISR). They are also use for combat operations, and civil applications, such as firefighting, non-military security work, surveillance of infrastructure (e.g. pipelines, power lines and country borders). UAVs are often preferred for missions that require sustained persistence (over 4 hours in duration), or are “ too dangerous, dull or dirty” for manned aircraft. Moreover, they can offer significant acquisition and operations cost savings over traditional manned aircraft. Because of these unique characteristics and missions, UAV estimates require some unique estimating methods. This paper describes a framework for estimating UAV systems total ownership cost including hardware components, software design, and operations. The challenge of collecting data, testing the sensitivities of cost drivers, and creating cost estimating relationships (CERs) for each key work breakdown structure (WBS) element is discussed. The autonomous operation of UAVs is especially challenging from a software perspective.

  4. Young children's preference for unique owned objects.

    Science.gov (United States)

    Gelman, Susan A; Davidson, Natalie S

    2016-10-01

    An important aspect of human thought is the value we place on unique individuals. Adults place higher value on authentic works of art than exact replicas, and young children at times value their original possessions over exact duplicates. What is the scope of this preference in early childhood, and when do children understand its subjective nature? On a series of trials, we asked three-year-olds (N=36) to choose between two toys for either themselves or the researcher: an old (visibly used) toy vs. a new (more attractive) toy matched in type and appearance (e.g., old vs. brand-new blanket). Focal pairs contrasted the child's own toy with a matched new object; Control pairs contrasted toys the child had never seen before. Children preferred the old toys for Focal pairs only, and treated their own preferences as not shared by the researcher. By 3years of age, young children place special value on unique individuals, and understand the subjective nature of that value. Copyright © 2016 Elsevier B.V. All rights reserved.

  5. Event segmentation ability uniquely predicts event memory.

    Science.gov (United States)

    Sargent, Jesse Q; Zacks, Jeffrey M; Hambrick, David Z; Zacks, Rose T; Kurby, Christopher A; Bailey, Heather R; Eisenberg, Michelle L; Beck, Taylor M

    2013-11-01

    Memory for everyday events plays a central role in tasks of daily living, autobiographical memory, and planning. Event memory depends in part on segmenting ongoing activity into meaningful units. This study examined the relationship between event segmentation and memory in a lifespan sample to answer the following question: Is the ability to segment activity into meaningful events a unique predictor of subsequent memory, or is the relationship between event perception and memory accounted for by general cognitive abilities? Two hundred and eight adults ranging from 20 to 79years old segmented movies of everyday events and attempted to remember the events afterwards. They also completed psychometric ability tests and tests measuring script knowledge for everyday events. Event segmentation and script knowledge both explained unique variance in event memory above and beyond the psychometric measures, and did so as strongly in older as in younger adults. These results suggest that event segmentation is a basic cognitive mechanism, important for memory across the lifespan. Copyright © 2013 Elsevier B.V. All rights reserved.

  6. The Solar-flux Third Granulation Signature

    Science.gov (United States)

    Gray, David F.; Oostra, Benjamin

    2018-01-01

    The velocity shifts of spectral lines as a function of line strength, so-called the third signature of granulation, are investigated using three published solar-flux atlases. We use flux atlases because we wish to treat the Sun as a star, against which stellar observations can be compared and judged. The atlases are critiqued and compared to the lower-resolution observations taken with the Elginfield stellar spectrograph. Third-signature plots are constructed for the 6020–6340 Å region. No dependence on excitation potential or wavelength is found over this wavelength span. The shape of the plots from the three solar atlases is essentially the same, with rms line-core velocity differences of 30–35 m s‑1. High-resolution atlas data are degraded to the level of the Elginfield spectrograph and compared to direct observations taken with that spectrograph. The line-core velocities show good agreement, with rms differences of 38 m s‑1. A new standard curve is derived and compared with the previously published one. Only small differences in shape are found, but a significant (+97 m s‑1) change in the zero point is indicated. The bisector of the Fe I 6253 line is mapped onto the third-signature plots and flux deficits are derived, which measure the granule/lane flux imbalance. The lower spectral resolution lowers the flux deficit area slightly and moves the peak of the deficit 0.3–0.5 km s‑1 toward higher velocities. These differences, while significant, are not large compared to measurement errors for stellar data.

  7. Robust diamond meshes with unique wettability properties.

    Science.gov (United States)

    Yang, Yizhou; Li, Hongdong; Cheng, Shaoheng; Zou, Guangtian; Wang, Chuanxi; Lin, Quan

    2014-03-18

    Robust diamond meshes with excellent superhydrophobic and superoleophilic properties have been fabricated. Superhydrophobicity is observed for water with varying pH from 1 to 14 with good recyclability. Reversible superhydrophobicity and hydrophilicity can be easily controlled. The diamond meshes show highly efficient water-oil separation and water pH droplet transference.

  8. Signatures for quark clustering in nuclei

    Energy Technology Data Exchange (ETDEWEB)

    Carlson, C.E. [College of William and Mary, Williamsburg, VA (United States); Lassila, K.E. [Iowa State Univ., Ames, IA (United States)

    1994-04-01

    As a signature for the presence of quark clusters in nuclei, the authors suggest studying backward protons produced by electron scattering off deuterons and suggest a ratio that cancels out much of the detailed properties of deuterons or 6-quark clusters. The test may be viewed as a test that the short range part of the deuteron is still a 2-nucleon system. They make estimates to show how it fails in characteristic and significant ways if the two nucleons at short range coalesce into a kneaded 6-quark cluster.

  9. Study on the signatures for a magazine

    International Nuclear Information System (INIS)

    Chai, Jan Bom; Kim, Tae Hwan; Park, Sung Keun

    2004-01-01

    In this paper, diagnostic algorithms are developed to be utilized to monitor the condition of and to diagnose defects in the magazine of a fuelling machine installed in CANDU plants. The magazine plays a role in storing fuels, plugs and tools. Since the magazine operates in the high radiation area, it is impossible to give direct access to it for measuring the signals. Therefore, inlet and outlet pressures of a hydraulic motor, which can be acquired remotely, were selected as the measuring variables. The measured signals are further processed to extract the diagnostic signatures. They were examined and validated in the various experiments with the magazine mock-up

  10. Signatures for quark clustering in nuclei

    International Nuclear Information System (INIS)

    Carlson, C.E.; Lassila, K.E.

    1994-01-01

    As a signature for the presence of quark clusters in nuclei, the authors suggest studying backward protons produced by electron scattering off deuterons and suggest a ratio that cancels out much of the detailed properties of deuterons or 6-quark clusters. The test may be viewed as a test that the short range part of the deuteron is still a 2-nucleon system. They make estimates to show how it fails in characteristic and significant ways if the two nucleons at short range coalesce into a kneaded 6-quark cluster

  11. Strong signatures of right-handed compositeness

    Energy Technology Data Exchange (ETDEWEB)

    Redi, Michele [INFN, Sesto Fiorentino, Firenze (Italy); Sanz, Veronica [York Univ., Toronto, ON (Canada). Dept. of Physics and Astronomy; Sussex Univ., Brighton (United Kingdom). Dept. of Physics and Astronomy; Vries, Maikel de; Weiler, Andreas [Deutsches Elektronen-Synchrotron (DESY), Hamburg (Germany)

    2013-05-15

    Right-handed light quarks could be significantly composite, yet compatible with experimental searches at the LHC and precision tests on Standard Model couplings. In these scenarios, that are motivated by flavor physics, one expects large cross sections for the production of new resonances coupled to light quarks. We study experimental strong signatures of right-handed compositeness at the LHC, and constrain the parameter space of these models with recent results by ATLAS and CMS. We show that the LHC sensitivity could be significantly improved if dedicated searches were performed, in particular in multi-jet signals.

  12. Ulysses and the Signature of Things

    OpenAIRE

    Dukes, Hunter

    2017-01-01

    James Joyce’s depiction of autographic signatures resembles the “doctrine of signatures” — a pre-modern system of correspondence between medicinal plants and parts of the body. Certain aspects of this episteme reappear in the late nineteenth century. This recurrence is due, in large part, to developments in the technology of writing that threaten what Friedrich Kittler calls the “surrogate sensuality of handwriting.” Reading the “Nausicaa” episode of Ulysses against fin-de-siècle ideas about ...

  13. Characterizing Resident Space Object Earthshine Signature Variability

    Science.gov (United States)

    Van Cor, Jared D.

    There are three major sources of illumination on objects in the near Earth space environment: Sunshine, Moonshine, and Earthshine. For objects in this environment (satellites, orbital debris, etc.) known as Resident Space Objects (RSOs), the sun and the moon have consistently small illuminating solid angles and can be treated as point sources; this makes their incident illumination easily modeled. The Earth on the other hand has a large illuminating solid angle, is heterogeneous, and is in a constant state of change. The objective of this thesis was to characterize the impact and variability of observed RSO Earthshine on apparent magnitude signatures in the visible optical spectral region. A key component of this research was creating Earth object models incorporating the reflectance properties of the Earth. Two Earth objects were created: a homogeneous diffuse Earth object and a time sensitive heterogeneous Earth object. The homogeneous diffuse Earth object has a reflectance equal to the average global albedo, a standard model used when modeling Earthshine. The time sensitive heterogeneous Earth object was created with two material maps representative of the dynamic reflectance of the surface of the earth, and a shell representative of the atmosphere. NASA's Moderate-resolution Imaging Spectroradiometer (MODIS) Earth observing satellite product libraries, MCD43C1 global surface BRDF map and MOD06 global fractional cloud map, were utilized to create the material maps, and a hybridized version of the Empirical Line Method (ELM) was used to create the atmosphere. This dynamic Earth object was validated by comparing simulated color imagery of the Earth to that taken by: NASAs Earth Polychromatic Imaging Camera (EPIC) located on the Deep Space Climate Observatory (DSCOVR), and by MODIS located on the Terra satellite. The time sensitive heterogeneous Earth object deviated from MODIS imagery by a spectral radiance root mean square error (RMSE) of +/-14.86 [watts/m. 2sr

  14. DRUMS: a human disease related unique gene mutation search engine.

    Science.gov (United States)

    Li, Zuofeng; Liu, Xingnan; Wen, Jingran; Xu, Ye; Zhao, Xin; Li, Xuan; Liu, Lei; Zhang, Xiaoyan

    2011-10-01

    With the completion of the human genome project and the development of new methods for gene variant detection, the integration of mutation data and its phenotypic consequences has become more important than ever. Among all available resources, locus-specific databases (LSDBs) curate one or more specific genes' mutation data along with high-quality phenotypes. Although some genotype-phenotype data from LSDB have been integrated into central databases little effort has been made to integrate all these data by a search engine approach. In this work, we have developed disease related unique gene mutation search engine (DRUMS), a search engine for human disease related unique gene mutation as a convenient tool for biologists or physicians to retrieve gene variant and related phenotype information. Gene variant and phenotype information were stored in a gene-centred relational database. Moreover, the relationships between mutations and diseases were indexed by the uniform resource identifier from LSDB, or another central database. By querying DRUMS, users can access the most popular mutation databases under one interface. DRUMS could be treated as a domain specific search engine. By using web crawling, indexing, and searching technologies, it provides a competitively efficient interface for searching and retrieving mutation data and their relationships to diseases. The present system is freely accessible at http://www.scbit.org/glif/new/drums/index.html. © 2011 Wiley-Liss, Inc.

  15. Detecting beer intake by unique metabolite patterns

    DEFF Research Database (Denmark)

    Gürdeniz, Gözde; Jensen, Morten Georg; Meier, Sebastian

    2016-01-01

    Evaluation of health related effects of beer intake is hampered by the lack of accurate tools for assessing intakes (biomarkers). Therefore, we identified plasma and urine metabolites associated with recent beer intake by untargeted metabolomics and established a characteristic metabolite pattern...... representing raw materials and beer production as a qualitative biomarker of beer intake. In a randomized, crossover, single-blinded meal study (MSt1) 18 participants were given one at a time four different test beverages: strong, regular and non-alcoholic beers and a soft drink. Four participants were...... assigned to have two additional beers (MSt2). In addition to plasma and urine samples, test beverages, wort and hops extract were analyzed by UPLC-QTOF. A unique metabolite pattern reflecting beer metabolome, including metabolites derived from beer raw material (i.e. N-methyl tyramine sulfate and the sum...

  16. Is physical space unique or optional

    International Nuclear Information System (INIS)

    Ekstein, H.; Centre National de la Recherche Scientifique, 13 - Marseille

    1975-02-01

    There are two concepts of the physical space-time. One, S(F), is that of a fixed arena in which events take place. The other S(D), is that of a space-time shaped by events. The second depends on the state (initial conditions) or on the external field, the first does not. The main assertions of the present paper are: 1) the fixed space-time S(F) is neither incompatibles with nor made superfluous, by Einstein's theory. S(F) is experimentally explorable, unique, and probably identical with Minkowski space M. 2) The dynamical space S(D) is largely optional. It can be chosen to be M, but the natural choice is Einstein's pseudo-Riemanian manifold [fr

  17. ARAC: A unique command and control resource

    International Nuclear Information System (INIS)

    Bradley, M.M.; Baskett, R.L.; Ellis, J.S.

    1996-04-01

    The Atmospheric Release Advisory Capability (ARAC) at Lawrence Livermore National Laboratory (LLNL) is a centralized federal facility designed to provide real-time, world-wide support to military and civilian command and control centers by predicting the impacts of inadvertent or intentional releases of nuclear, biological, or chemical materials into the atmosphere. ARAC is a complete response system consisting of highly trained and experienced personnel, continually updated computer models, redundant data collection systems, and centralized and remote computer systems. With over 20 years of experience responding to domestic and international incidents, strong linkages with the Department of Defense, and the ability to conduct classified operations, ARAC is a unique command and control resource

  18. ARAC: A unique command and control resource

    Energy Technology Data Exchange (ETDEWEB)

    Bradley, M.M.; Baskett, R.L.; Ellis, J.S. [and others

    1996-04-01

    The Atmospheric Release Advisory Capability (ARAC) at Lawrence Livermore National Laboratory (LLNL) is a centralized federal facility designed to provide real-time, world-wide support to military and civilian command and control centers by predicting the impacts of inadvertent or intentional releases of nuclear, biological, or chemical materials into the atmosphere. ARAC is a complete response system consisting of highly trained and experienced personnel, continually updated computer models, redundant data collection systems, and centralized and remote computer systems. With over 20 years of experience responding to domestic and international incidents, strong linkages with the Department of Defense, and the ability to conduct classified operations, ARAC is a unique command and control resource.

  19. Unique computer system for safeguards use

    International Nuclear Information System (INIS)

    Kuckertz, T.H.; Pratt, J.C.

    1981-01-01

    Microprocessors have been used to implement specialized scientific data processing systems since 1976. One such system, the LeCroy 3500, is presently being used by the Detection and Verification Group of the Energy Division at Los Alamos National Laboratory for a large variety of tasks involving measurement of various nuclear parameters associated with radioactive materials. The system is unique because it can do not only sophisticated pulse height and multi-scale analyses but also other analyses that are limited only by the availability fo CAMAC modules that would acquire data from exotic experiments. The system is also field portable which extends the range of experiments that it can control. Four applications of this system are described in this paper: (1) plutonium storage vault monitoring, (2) coded aperture image reconstruction, (3) spatial distribution of gamma radiation, and (4) nuclear waste management. 7 figures

  20. 2XIIB vacuum vessel: a unique design

    International Nuclear Information System (INIS)

    Hibbs, S.M.; Calderon, M.O.

    1975-01-01

    The 2XIIB mirror confinement experiment makes unique demands on its vacuum system. The confinement coil set encloses a cavity whose surface is comprised of both simple and compound curves. Within this cavity and at the core of the machine is the operating vacuum which is on the order of 10 -9 Torr. The vacuum container fits inside the cavity, presenting an inside surface suitable for titanium getter pumping and a means of removing the heat load imposed by incandescent sublimator wires. In addition, the cavity is constructed of nonmagnetic and nonconducting materials (nonmetals) to avoid distortion of the pulsed confinement field. It is also isolated from mechanical shocks induced in the machine's main structure when the coils are pulsed. This paper describes the design, construction, and operation of the 2XIIB high-vacuum vessel that has been performing successfully since early 1974

  1. The unique ethics of sports medicine.

    Science.gov (United States)

    Johnson, Rob

    2004-04-01

    The ethical code by which physicians traditionally conduct themselves is based on the relationship between the physician and the patient: both work toward the goal of improving or maintaining health. Constraints on this relationship may be behaviors of patient choice (tobacco use, excessive alcohol use, sedentary behavior, and so on). The athlete-physician relationship is ethically different. Influences such as the physician's employer, the athlete's desire to play with pain and injury, and the economic consequences of playing or not complicate medical decisions. This perspective suggests something different and even unique about the ethics of the sports medicine practitioner. This article explores the differences fostering the ethical tight ropes that sports physicians walk in their sports medicine practices.

  2. MRI: unique costing and pricing issues.

    Science.gov (United States)

    Schwartz, H W; Jarl, D F

    1985-01-01

    Acquisition of magnetic resonance imaging (MRI) involves a plethora of costs not traditionally encountered in radiology procedure cost accounting models. Experiences with MRI gained at the University of Minnesota Hospitals and Clinics during 1984 uncovered a wide variety of unique costing issues which were eventually identified at the time when the MRI hospital charge was being established. Our experience at UMHC can provide those radiology departments now acquiring MRI with an earlier awareness of these special costing issues, hopefully resulting in better and more timely data collection. Current reimbursement and pricing issues are also having a dramatic impact on MRI costs at each institution and must be assessed in terms of third-party payor intentions.

  3. Skipper genome sheds light on unique phenotypic traits and phylogeny.

    Science.gov (United States)

    Cong, Qian; Borek, Dominika; Otwinowski, Zbyszek; Grishin, Nick V

    2015-08-27

    Butterflies and moths are emerging as model organisms in genetics and evolutionary studies. The family Hesperiidae (skippers) was traditionally viewed as a sister to other butterflies based on its moth-like morphology and darting flight habits with fast wing beats. However, DNA studies suggest that the family Papilionidae (swallowtails) may be the sister to other butterflies including skippers. The moth-like features and the controversial position of skippers in Lepidoptera phylogeny make them valuable targets for comparative genomics. We obtained the 310 Mb draft genome of the Clouded Skipper (Lerema accius) from a wild-caught specimen using a cost-effective strategy that overcomes the high (1.6 %) heterozygosity problem. Comparative analysis of Lerema accius and the highly heterozygous genome of Papilio glaucus revealed differences in patterns of SNP distribution, but similarities in functions of genes that are enriched in non-synonymous SNPs. Comparison of Lepidoptera genomes revealed possible molecular bases for unique traits of skippers: a duplication of electron transport chain components could result in efficient energy supply for their rapid flight; a diversified family of predicted cellulases might allow them to feed on cellulose-enriched grasses; an expansion of pheromone-binding proteins and enzymes for pheromone synthesis implies a more efficient mate-recognition system, which compensates for the lack of clear visual cues due to the similarities in wing colors and patterns of many species of skippers. Phylogenetic analysis of several Lepidoptera genomes suggested that the position of Hesperiidae remains uncertain as the tree topology varied depending on the evolutionary model. Completion of the first genome from the family Hesperiidae allowed comparative analyses with other Lepidoptera that revealed potential genetic bases for the unique phenotypic traits of skippers. This work lays the foundation for future experimental studies of skippers and

  4. Unique Fock quantization of scalar cosmological perturbations

    Science.gov (United States)

    Fernández-Méndez, Mikel; Mena Marugán, Guillermo A.; Olmedo, Javier; Velhinho, José M.

    2012-05-01

    We investigate the ambiguities in the Fock quantization of the scalar perturbations of a Friedmann-Lemaître-Robertson-Walker model with a massive scalar field as matter content. We consider the case of compact spatial sections (thus avoiding infrared divergences), with the topology of a three-sphere. After expanding the perturbations in series of eigenfunctions of the Laplace-Beltrami operator, the Hamiltonian of the system is written up to quadratic order in them. We fix the gauge of the local degrees of freedom in two different ways, reaching in both cases the same qualitative results. A canonical transformation, which includes the scaling of the matter-field perturbations by the scale factor of the geometry, is performed in order to arrive at a convenient formulation of the system. We then study the quantization of these perturbations in the classical background determined by the homogeneous variables. Based on previous work, we introduce a Fock representation for the perturbations in which: (a) the complex structure is invariant under the isometries of the spatial sections and (b) the field dynamics is implemented as a unitary operator. These two properties select not only a unique unitary equivalence class of representations, but also a preferred field description, picking up a canonical pair of field variables among all those that can be obtained by means of a time-dependent scaling of the matter field (completed into a linear canonical transformation). Finally, we present an equivalent quantization constructed in terms of gauge-invariant quantities. We prove that this quantization can be attained by a mode-by-mode time-dependent linear canonical transformation which admits a unitary implementation, so that it is also uniquely determined.

  5. Signatures of unstable semiclassical trajectories in tunneling

    International Nuclear Information System (INIS)

    Levkov, D G; Panin, A G; Sibiryakov, S M

    2009-01-01

    It was found recently that processes of multidimensional tunneling are generally described at high energies by unstable semiclassical trajectories. We study two observational signatures related to the instability of trajectories. First, we find an additional power-law dependence of the tunneling probability on the semiclassical parameter as compared to the standard case of potential tunneling. The second signature is a substantial widening of the probability distribution over final-state quantum numbers. These effects are studied using a modified semiclassical technique which incorporates stabilization of the tunneling trajectories. The technique is derived from first principles. We obtain expressions for the inclusive and exclusive tunneling probabilities in the case of unstable semiclassical trajectories. We also investigate the 'phase transition' between the cases of stable and unstable trajectories across certain 'critical' values of energy. Finally, we derive the relation between the semiclassical probabilities of tunneling from the low-lying and highly excited initial states. This puts on firm ground a conjecture made previously in the semiclassical description of collision-induced tunneling in field theory

  6. Theoretical Characterizaiton of Visual Signatures (Muzzle Flash)

    Science.gov (United States)

    Kashinski, D. O.; Scales, A. N.; Vanderley, D. L.; Chase, G. M.; di Nallo, O. E.; Byrd, E. F. C.

    2014-05-01

    We are investigating the accuracy of theoretical models used to predict the visible, ultraviolet and infrared spectra of product materials ejected from the muzzle of currently fielded systems. Recent advances in solid propellants has made the management of muzzle signature (flash) a principle issue in weapons development across the calibers. A priori prediction of the electromagnetic spectra of formulations will allow researchers to tailor blends that yield desired signatures and determine spectrographic detection ranges. We are currently employing quantum chemistry methods at various levels of sophistication to optimize molecular geometries, compute vibrational frequencies, and determine the optical spectra of specific gas-phase molecules and radicals of interest. Electronic excitations are being computed using Time Dependent Density Functional Theory (TD-DFT). A comparison of computational results to experimental values found in the literature is used to assess the affect of basis set and functional choice on calculation accuracy. The current status of this work will be presented at the conference. Work supported by the ARL, and USMA.

  7. Signature inversion in doubly odd 124La

    International Nuclear Information System (INIS)

    Chantler, H.J.; Paul, E.S.; Boston, A.J.; Choy, P.T.W.; Nolan, P.J.; Carpenter, M.P.; Davids, C.N.; Seweryniak, D.; Charity, R.; Devlin, M.; Sarantites, D.G.; Chiara, C.J.; Fossan, D.B.; Koike, T.; LaFosse, D.R.; Starosta, K.; Fletcher, A.M.; Smith, J.F.; Jenkins, D.G.; Kelsall, N.S.

    2002-01-01

    High-spin states have been studied in neutron-deficient 57 124 La 67 , populated through the 64 Zn( 64 Zn,3pn) reaction at 260 MeV. The Gammasphere γ-ray spectrometer has been used in conjunction with the Microball charged-particle detector, the Neutron Shell, and the Argonne Fragment Mass Analyzer, in order to select evaporation residues of interest. The known band structures have been extended and new bands found. Most of the bands are linked together, allowing more consistent spin and parity assignments. Comparison of band properties to cranking calculations has allowed configuration assignments to be made and includes the first identification of the g 9/2 proton-hole in an odd-odd lanthanum isotope. Two bands have been assigned a πh 11/2 xνh 11/2 structure; the yrast one exhibits a signature inversion in its level energies below I=18.5(ℎ/2π), while the excited one exhibits a signature inversion above I=18.5(ℎ/2π)

  8. Corticosteroid receptors adopt distinct cyclical transcriptional signatures.

    Science.gov (United States)

    Le Billan, Florian; Amazit, Larbi; Bleakley, Kevin; Xue, Qiong-Yao; Pussard, Eric; Lhadj, Christophe; Kolkhof, Peter; Viengchareun, Say; Fagart, Jérôme; Lombès, Marc

    2018-05-07

    Mineralocorticoid receptors (MRs) and glucocorticoid receptors (GRs) are two closely related hormone-activated transcription factors that regulate major pathophysiologic functions. High homology between these receptors accounts for the crossbinding of their corresponding ligands, MR being activated by both aldosterone and cortisol and GR essentially activated by cortisol. Their coexpression and ability to bind similar DNA motifs highlight the need to investigate their respective contributions to overall corticosteroid signaling. Here, we decipher the transcriptional regulatory mechanisms that underlie selective effects of MRs and GRs on shared genomic targets in a human renal cellular model. Kinetic, serial, and sequential chromatin immunoprecipitation approaches were performed on the period circadian protein 1 ( PER1) target gene, providing evidence that both receptors dynamically and cyclically interact at the same target promoter in a specific and distinct transcriptional signature. During this process, both receptors regulate PER1 gene by binding as homo- or heterodimers to the same promoter region. Our results suggest a novel level of MR-GR target gene regulation, which should be considered for a better and integrated understanding of corticosteroid-related pathophysiology.-Le Billan, F., Amazit, L., Bleakley, K., Xue, Q.-Y., Pussard, E., Lhadj, C., Kolkhof, P., Viengchareun, S., Fagart, J., Lombès, M. Corticosteroid receptors adopt distinct cyclical transcriptional signatures.

  9. Monotop signature from a fermionic top partner

    Science.gov (United States)

    Gonçalves, Dorival; Kong, Kyoungchul; Sakurai, Kazuki; Takeuchi, Michihisa

    2018-01-01

    We investigate monotop signatures arising from phenomenological models of fermionic top partners, which are degenerate in mass and decay into a bosonic dark matter candidate, either spin 0 or spin 1. Such a model provides a monotop signature as a smoking gun, while conventional searches with t t ¯ + missing transverse momentum are limited. Two such scenarios, (i) a phenomenological third generation extradimensional model with excited top and electroweak sectors, and (ii) a model where only a top partner and a dark matter particle are added to the standard model, are studied in the degenerate mass regime. We find that in the case of extra dimension a number of different processes give rise to effectively the same monotop final state, and a great gain can be obtained in the sensitivity for this channel. We show that the monotop search can explore top-partner masses up to 630 and 300 GeV for the third generation extradimensional model and the minimal fermionic top-partner model, respectively, at the high luminosity LHC.

  10. Automated defect spatial signature analysis for semiconductor manufacturing process

    Science.gov (United States)

    Tobin, Jr., Kenneth W.; Gleason, Shaun S.; Karnowski, Thomas P.; Sari-Sarraf, Hamed

    1999-01-01

    An apparatus and method for performing automated defect spatial signature alysis on a data set representing defect coordinates and wafer processing information includes categorizing data from the data set into a plurality of high level categories, classifying the categorized data contained in each high level category into user-labeled signature events, and correlating the categorized, classified signature events to a present or incipient anomalous process condition.

  11. Provably Secure and Subliminal-Free Variant of Schnorr Signature

    OpenAIRE

    Zhang , Yinghui; Li , Hui; Li , Xiaoqing; Zhu , Hui

    2013-01-01

    Part 2: Asian Conference on Availability, Reliability and Security (AsiaARES); International audience; Subliminal channels present a severe challenge to information security. Currently, subliminal channels still exist in Schnorr signature. In this paper, we propose a subliminal-free variant of Schnorr signature. In the proposed scheme, an honest-but-curious warden is introduced to help the signer to generate a signature on a given message, but it is disallowed to sign messages independently. ...

  12. Invariance Signatures: Characterizing contours by their departures from invariance

    OpenAIRE

    Squire, David; Caelli, Terry M.

    1997-01-01

    In this paper, a new invariant feature of two-dimensional contours is reported: the Invariance Signature. The Invariance Signature is a measure of the degree to which a contour is invariant under a variety of transformations, derived from the theory of Lie transformation groups. It is shown that the Invariance Signature is itself invariant under shift, rotation and scaling of the contour. Since it is derived from local properties of the contour, it is well-suited to a neural network implement...

  13. Analysis of Non-contact Acousto Thermal Signature Data (Postprint)

    Science.gov (United States)

    2016-02-01

    AFRL-RX-WP-JA-2016-0321 ANALYSIS OF NON-CONTACT ACOUSTO-THERMAL SIGNATURE DATA (POSTPRINT) Amanda K. Criner AFRL/RX...October 2014 – 16 September 2015 4. TITLE AND SUBTITLE ANALYSIS OF NON-CONTACT ACOUSTO-THERMAL SIGNATURE DATA (POSTPRINT) 5a. CONTRACT NUMBER...words) The non-contact acousto-thermal signature (NCATS) is a nondestructive evaluation technique with potential to detect fatigue in materials such as

  14. Gold, currencies and market efficiency

    Science.gov (United States)

    Kristoufek, Ladislav; Vosvrda, Miloslav

    2016-05-01

    Gold and currency markets form a unique pair with specific interactions and dynamics. We focus on the efficiency ranking of gold markets with respect to the currency of purchase. By utilizing the Efficiency Index (EI) based on fractal dimension, approximate entropy and long-term memory on a wide portfolio of 142 gold price series for different currencies, we construct the efficiency ranking based on the extended EI methodology we provide. Rather unexpected results are uncovered as the gold prices in major currencies lay among the least efficient ones whereas very minor currencies are among the most efficient ones. We argue that such counterintuitive results can be partly attributed to a unique period of examination (2011-2014) characteristic by quantitative easing and rather unorthodox monetary policies together with the investigated illegal collusion of major foreign exchange market participants, as well as some other factors discussed in some detail.

  15. A Proteomic Signature of Dormancy in the Actinobacterium Micrococcus luteus.

    Science.gov (United States)

    Mali, Sujina; Mitchell, Morgan; Havis, Spencer; Bodunrin, Abiodun; Rangel, Jonathan; Olson, Gabriella; Widger, William R; Bark, Steven J

    2017-07-15

    Dormancy is a protective state in which diverse bacteria, including Mycobacterium tuberculosis , Staphylococcus aureus , Treponema pallidum (syphilis), and Borrelia burgdorferi (Lyme disease), curtail metabolic activity to survive external stresses, including antibiotics. Evidence suggests dormancy consists of a continuum of interrelated states, including viable but nonculturable (VBNC) and persistence states. VBNC and persistence contribute to antibiotic tolerance, reemergence from latent infections, and even quorum sensing and biofilm formation. Previous studies indicate that the protein mechanisms regulating persistence and VBNC states are not well understood. We have queried the VBNC state of Micrococcus luteus NCTC 2665 (MI-2665) by quantitative proteomics combining gel electrophoresis, high-performance liquid chromatography, and tandem mass spectrometry to elucidate some of these mechanisms. MI-2665 is a nonpathogenic actinobacterium containing a small (2.5-Mb), high-GC-content genome which exhibits a well-defined VBNC state induced by nutrient deprivation. The MI-2665 VBNC state demonstrated a loss of protein diversity accompanied by increased levels of 18 proteins that are conserved across actinobacteria, 14 of which have not been previously identified in VNBC. These proteins implicate an anaplerotic strategy in the transition to VBNC, including changes in the glyoxylate shunt, redox and amino acid metabolism, and ribosomal regulatory processes. Our data suggest that MI-2665 is a viable model for dissecting the protein mechanisms underlying the VBNC stress response and provide the first protein-level signature of this state. We expect that this protein signature will enable future studies deciphering the protein mechanisms of dormancy and identify novel therapeutic strategies effective against antibiotic-tolerant bacterial infections. IMPORTANCE Dormancy is a protective state enabling bacteria to survive antibiotics, starvation, and the immune system

  16. Construction of Graduation Certificate Issuing System Based on Digital Signature Technique

    Directory of Open Access Journals (Sweden)

    Mohammed Issam Younis

    2015-06-01

    Full Text Available With the development of computer architecture and its technologies in recent years, applications like e-commerce, e-government, e-governance and e-finance are widely used, and they act as active research areas. In addition, in order to increase the quality and quantity of the ordinary everyday transactions, it is desired to migrate from the paper-based environment to a digital-based computerized environment. Such migration increases efficiency, saves time, eliminates paperwork, increases safety and reduces the cost in an organization. Digital signatures are playing an essential role in many electronic and automatic based systems and facilitate this migration. The digital signatures are used to provide many services and solutions that would not have been possible by the conventional hand-written signature. In the educational environment, the process of issuing the graduation certificates can no longer be restricted to the traditional methods. Hence, a computerized system for issuing certificates of graduation in an electronic form is needed and desired. This paper proposes a Graduation Certificates Issuing System (GCIS based on digital signature technology. In doing so, this research highlights the state-of-the-art and the art-of-the-practice for some existing digital signature-based systems in the literatures. In addition, eight intertwined elected services are identified, namely: message authentication, entity authentication, integrity, non-repudiation, time stamping, distinguished signing authorities, delegating signing capability and supporting workflow systems. Moreover, this research examines nine existing systems, showing their merits and demerits in terms of these elected services. Furthermore, the research describes the architectural design using the Unified Modeling Language (UML and provides the concrete implementation of the proposed GCIS. The GCIS is implemented using Visual Basic.Net programming language and SQL Server database

  17. Enhanced arbitrated quantum signature scheme using Bell states

    International Nuclear Information System (INIS)

    Wang Chao; Liu Jian-Wei; Shang Tao

    2014-01-01

    We investigate the existing arbitrated quantum signature schemes as well as their cryptanalysis, including intercept-resend attack and denial-of-service attack. By exploring the loopholes of these schemes, a malicious signatory may successfully disavow signed messages, or the receiver may actively negate the signature from the signatory without being detected. By modifying the existing schemes, we develop counter-measures to these attacks using Bell states. The newly proposed scheme puts forward the security of arbitrated quantum signature. Furthermore, several valuable topics are also presented for further research of the quantum signature scheme

  18. FIR signature verification system characterizing dynamics of handwriting features

    Science.gov (United States)

    Thumwarin, Pitak; Pernwong, Jitawat; Matsuura, Takenobu

    2013-12-01

    This paper proposes an online signature verification method based on the finite impulse response (FIR) system characterizing time-frequency characteristics of dynamic handwriting features. First, the barycenter determined from both the center point of signature and two adjacent pen-point positions in the signing process, instead of one pen-point position, is used to reduce the fluctuation of handwriting motion. In this paper, among the available dynamic handwriting features, motion pressure and area pressure are employed to investigate handwriting behavior. Thus, the stable dynamic handwriting features can be described by the relation of the time-frequency characteristics of the dynamic handwriting features. In this study, the aforesaid relation can be represented by the FIR system with the wavelet coefficients of the dynamic handwriting features as both input and output of the system. The impulse response of the FIR system is used as the individual feature for a particular signature. In short, the signature can be verified by evaluating the difference between the impulse responses of the FIR systems for a reference signature and the signature to be verified. The signature verification experiments in this paper were conducted using the SUBCORPUS MCYT-100 signature database consisting of 5,000 signatures from 100 signers. The proposed method yielded equal error rate (EER) of 3.21% on skilled forgeries.

  19. Energy efficiency

    International Nuclear Information System (INIS)

    2010-01-01

    After a speech of the CEA's (Commissariat a l'Energie Atomique) general administrator about energy efficiency as a first rank challenge for the planet and for France, this publications proposes several contributions: a discussion of the efficiency of nuclear energy, an economic analysis of R and D's value in the field of fourth generation fast reactors, discussions about biofuels and the relationship between energy efficiency and economic competitiveness, and a discussion about solar photovoltaic efficiency

  20. Alpbach Summer School - a unique learning experience

    Science.gov (United States)

    Kern, K.; Aulinas, J.; Clifford, D.; Krejci, D.; Topham, R.

    2011-12-01

    The Alpbach Summer School is a ten-day program that provides a unique opportunity for young european science and engineering students, both undergraduate and graduate, to learn how to approach the entire design process of a space mission. The theme of the 2010 Summer School was "New Space Missions to Understand Climate Change", a current, challenging, very broad and complex topic. The program was established more than 35 years ago and is organised in two interrelated parts: a series of lectures held by renowned experts in the field (in the case of this specific year, climate change and space engineering experts) that provides a technical and scientific background for the workshops that follow, the core of the Summer School. For the workshops the students are split into four international, interdisciplinary teams of about 15 students. In 2010 every team had to complete a number of tasks, four in total: (1) identify climate change research gaps and design a space mission that has not yet been flown or proposed, (2) define the science objectives and requirements of the mission, (3) design a spacecraft that meets the mission requirements, which includes spacecraft design and construction, payload definition, orbit calculations, but also the satellite launch, operation and mission costs and (4) write up a short mission proposal and present the results to an expert review panel. Achieving these tasks in only a few days in a multicultural, interdisciplinary team represents a major challenge for all participants and provides an excellent practical learning experience. Over the course of the program, students do not just learn facts about climate change and space engineering, but scientists also learn from engineers and engineers from scientists. The participants have to deepen their knowledge in an often unfamiliar field, develop organisational and team-work skills and work under pressure. Moreover, teams are supported by team and roving tutors and get the opportunity to

  1. Generation of flat wideband chaos with suppressed time delay signature by using optical time lens.

    Science.gov (United States)

    Jiang, Ning; Wang, Chao; Xue, Chenpeng; Li, Guilan; Lin, Shuqing; Qiu, Kun

    2017-06-26

    We propose a flat wideband chaos generation scheme that shows excellent time delay signature suppression effect, by injecting the chaotic output of general external cavity semiconductor laser into an optical time lens module composed of a phase modulator and two dispersive units. The numerical results demonstrate that by properly setting the parameters of the driving signal of phase modulator and the accumulated dispersion of dispersive units, the relaxation oscillation in chaos can be eliminated, wideband chaos generation with an efficient bandwidth up to several tens of GHz can be achieved, and the RF spectrum of generated chaotic signal is nearly as flat as uniform distribution. Moreover, the periodicity of chaos induced by the external cavity modes can be simultaneously destructed by the optical time lens module, based on this the time delay signature can be completely suppressed.

  2. Integrating Iris and Signature Traits for Personal Authentication Using User-SpecificWeighting

    Directory of Open Access Journals (Sweden)

    Serestina Viriri

    2012-03-01

    Full Text Available Biometric systems based on uni-modal traits are characterized by noisy sensor data, restricted degrees of freedom, non-universality and are susceptible to spoof attacks. Multi-modal biometric systems seek to alleviate some of these drawbacks by providing multiple evidences of the same identity. In this paper, a user-score-based weighting technique for integrating the iris and signature traits is presented. This user-specific weighting technique has proved to be an efficient and effective fusion scheme which increases the authentication accuracy rate of multi-modal biometric systems. The weights are used to indicate the importance of matching scores output by each biometrics trait. The experimental results show that our biometric system based on the integration of iris and signature traits achieve a false rejection rate (FRR of 0.08% and a false acceptance rate (FAR of 0.01%.

  3. Crystal structure analysis of a bacterial aryl acylamidase belonging to the amidase signature enzyme family

    International Nuclear Information System (INIS)

    Lee, Saeyoung; Park, Eun-Hye; Ko, Hyeok-Jin; Bang, Won Gi; Kim, Hye-Yeon; Kim, Kyoung Heon; Choi, In-Geol

    2015-01-01

    The atomic structure of a bacterial aryl acylamidase (EC 3.5.1.13; AAA) is reported and structural features are investigated to better understand the catalytic profile of this enzyme. Structures of AAA were determined in its native form and in complex with the analgesic acetanilide, p-acetaminophenol, at 1.70 Å and 1.73 Å resolutions, respectively. The overall structural fold of AAA was identified as an α/β fold class, exhibiting an open twisted β-sheet core surrounded by α-helices. The asymmetric unit contains one AAA molecule and the monomeric form is functionally active. The core structure enclosing the signature sequence region, including the canonical Ser-cisSer-Lys catalytic triad, is conserved in all members of the Amidase Signature enzyme family. The structure of AAA in a complex with its ligand reveals a unique organization in the substrate-binding pocket. The binding pocket consists of two loops (loop1 and loop2) in the amidase signature sequence and one helix (α10) in the non-amidase signature sequence. We identified two residues (Tyr"1"3"6 and Thr"3"3"0) that interact with the ligand via water molecules, and a hydrogen-bonding network that explains the catalytic affinity over various aryl acyl compounds. The optimum activity of AAA at pH > 10 suggests that the reaction mechanism employs Lys"8"4 as the catalytic base to polarize the Ser"1"8"7 nucleophile in the catalytic triad. - Highlights: • We determined the first structure of a bacterial aryl acylamidase (EC 3.5.1.13). • Structure revealed spatially distinct architecture of the substrate-binding pocket. • Hydrogen-bonding with Tyr"1"3"6 and Thr"3"3"0 mediates ligand-binding and substrate.

  4. Enhanced anti-counterfeiting measures for additive manufacturing: coupling lanthanide nanomaterial chemical signatures with blockchain technology

    Energy Technology Data Exchange (ETDEWEB)

    Kennedy, Zachary C.; Stephenson, David E.; Christ, Josef F.; Pope, Timothy R.; Arey, Bruce W.; Barrett, Christopher A.; Warner, Marvin G.

    2017-08-18

    The significant rise of additive manufacturing (AM) in recent years is in part due to the open sourced nature of the printing processes and reduced cost and capital barriers relative to traditional manufacturing. However, this democratization of manufacturing spurs an increased demand for producers and end-users to verify the authenticity and quality of individual parts. To this end, we introduce an anti-counterfeiting method composed of first embedding engineered nanomaterials into features of a 3D-printed part followed by non-destructive interrogation of these features to quantify a chemical signature profile. The part specific chemical signature data is then linked to a securitized, distributed, and time-stamped blockchain ledger entry. To demonstrate the utility of this approach, lanthanide-aspartic acid nanoscale coordination polymers (Ln3+- Asp NCs) / poly(lactic) acid (PLA) composites were formulated and transformed into a filament feedstock for fused deposition modeling (FDM) 3D printing. In the present case, a quick-response (QR) code containing the doped Ln3+-Asp NCs was printed using a dual-extruder FDM printer into pure PLA parts. The QR code provides a searchable reference to an Ethereum-based blockchain entry. The QR code physical features also serve as defined areas to probe the signatures arising from the embedded Ln3+-Asp NCs. Visible fluorescence emission with UV-excitation was quantified in terms of color using a smartphone camera and incorporated into blockchain entries. Ultimately, linking unique chemical signature data to blockchain databases is anticipated to make the costs of counterfeiting AM materials significantly more prohibitive and transactions between those in the supply chain more trustworthy.

  5. Crystal structure analysis of a bacterial aryl acylamidase belonging to the amidase signature enzyme family

    Energy Technology Data Exchange (ETDEWEB)

    Lee, Saeyoung; Park, Eun-Hye; Ko, Hyeok-Jin; Bang, Won Gi [Department of Biotechnology, College of Life Sciences and Biotechnology, Korea University, Anam-Dong, Seoungbuk-Gu, Seoul, 136-713 (Korea, Republic of); Kim, Hye-Yeon [Protein Structure Research Team, Korea Basic Science Institute, Ochang, Chungbuk, 363-883 (Korea, Republic of); Kim, Kyoung Heon [Department of Biotechnology, College of Life Sciences and Biotechnology, Korea University, Anam-Dong, Seoungbuk-Gu, Seoul, 136-713 (Korea, Republic of); Choi, In-Geol, E-mail: igchoi@korea.ac.kr [Department of Biotechnology, College of Life Sciences and Biotechnology, Korea University, Anam-Dong, Seoungbuk-Gu, Seoul, 136-713 (Korea, Republic of)

    2015-11-13

    The atomic structure of a bacterial aryl acylamidase (EC 3.5.1.13; AAA) is reported and structural features are investigated to better understand the catalytic profile of this enzyme. Structures of AAA were determined in its native form and in complex with the analgesic acetanilide, p-acetaminophenol, at 1.70 Å and 1.73 Å resolutions, respectively. The overall structural fold of AAA was identified as an α/β fold class, exhibiting an open twisted β-sheet core surrounded by α-helices. The asymmetric unit contains one AAA molecule and the monomeric form is functionally active. The core structure enclosing the signature sequence region, including the canonical Ser-cisSer-Lys catalytic triad, is conserved in all members of the Amidase Signature enzyme family. The structure of AAA in a complex with its ligand reveals a unique organization in the substrate-binding pocket. The binding pocket consists of two loops (loop1 and loop2) in the amidase signature sequence and one helix (α10) in the non-amidase signature sequence. We identified two residues (Tyr{sup 136} and Thr{sup 330}) that interact with the ligand via water molecules, and a hydrogen-bonding network that explains the catalytic affinity over various aryl acyl compounds. The optimum activity of AAA at pH > 10 suggests that the reaction mechanism employs Lys{sup 84} as the catalytic base to polarize the Ser{sup 187} nucleophile in the catalytic triad. - Highlights: • We determined the first structure of a bacterial aryl acylamidase (EC 3.5.1.13). • Structure revealed spatially distinct architecture of the substrate-binding pocket. • Hydrogen-bonding with Tyr{sup 136} and Thr{sup 330} mediates ligand-binding and substrate.

  6. MYRRHA. An innovative and unique research facility

    Energy Technology Data Exchange (ETDEWEB)

    Fernandez, Rafaeol; Neerdael, Bernard; Schyns, Marc; Dyck, Steven Van; Michiels, Sidney; Ait Abderrahim, Hamid, E-mail: myrrha@sckcen.be [Belgian Nuclear Research Centre (SCK-CEN), Mol (Belgium)

    2012-03-15

    The MYRRHA project started in 1998 by SCK{center_dot}CEN in collaboration with Ion Beam Applications (IBA, Louvain-la-Neuve), as an upgrade of the ADONIS project. MYRRHA is designed as a multi-purpose irradiation facility in order to support research programmes on fission and fusion reactor structural materials and nuclear fuel development. Applications of these are found in Accelerator Driven Systems (ADS) systems and in present generation as well as in next generation critical reactors. The first objective of MYRRHA however, will be to demonstrate on one hand the ADS concept at a reasonable power level and on the other hand the technological feasibility of transmutation of Minor Actinides (MA) and Long-Lived Fission Products (LLFP) arising from the reprocessing of radioactive waste. MYRRHA will also help the development of the Pb-alloys technology needed for the LFR (Lead Fast Reactor) Gen.IV concept. Transmutation of MA can be completed in an efficient way in fast neutron spectrum facilities. Both critical reactors and sub-critical ADS are potential candidates as dedicated transmutation systems. However, critical reactors, heavily loaded with fuel containing large amounts of MA, pose safety problems caused by unfavourable reactivity coefficients due to the little delayed neutron fraction. A sub-critical ADS operates in a flexible and safe manner even with a core loading containing a high amount of MA leading to achieve a high efficient transmutation. Thus, the sub-criticality is not a virtue but rather a necessity for an efficient and economical burning of the MA. Besides the reduction of the HLW burden, the MYRRHA project will serve the purpose of developing the lead alloys technology as a reactor coolant that can be used in one of the Generation IV reactor concepts namely the Lead Fast Reactor (LFR). Although carrying out the MYRRHA project will lead to the demonstration of the efficient and safe transmutation of MA in ADS systems as the ultimate goal the

  7. Might "Unique" Factors Be "Common"? On the Possibility of Indeterminate Common-Unique Covariances

    Science.gov (United States)

    Grayson, Dave

    2006-01-01

    The present paper shows that the usual factor analytic structured data dispersion matrix lambda psi lambda' + delta can readily arise from a set of scores y = lambda eta + epsilon, shere the "common" (eta) and "unique" (epsilon) factors have nonzero covariance: gamma = Cov epsilon,eta) is not equal to 0. Implications of this finding are discussed…

  8. Detecting Beer Intake by Unique Metabolite Patterns.

    Science.gov (United States)

    Gürdeniz, Gözde; Jensen, Morten Georg; Meier, Sebastian; Bech, Lene; Lund, Erik; Dragsted, Lars Ove

    2016-12-02

    Evaluation of the health related effects of beer intake is hampered by the lack of accurate tools for assessing intakes (biomarkers). Therefore, we identified plasma and urine metabolites associated with recent beer intake by untargeted metabolomics and established a characteristic metabolite pattern representing raw materials and beer production as a qualitative biomarker of beer intake. In a randomized, crossover, single-blinded meal study (MSt1), 18 participants were given, one at a time, four different test beverages: strong, regular, and nonalcoholic beers and a soft drink. Four participants were assigned to have two additional beers (MSt2). In addition to plasma and urine samples, test beverages, wort, and hops extract were analyzed by UPLC-QTOF. A unique metabolite pattern reflecting beer metabolome, including metabolites derived from beer raw material (i.e., N-methyl tyramine sulfate and the sum of iso-α-acids and tricyclohumols) and the production process (i.e., pyro-glutamyl proline and 2-ethyl malate), was selected to establish a compliance biomarker model for detection of beer intake based on MSt1. The model predicted the MSt2 samples collected before and up to 12 h after beer intake correctly (AUC = 1). A biomarker model including four metabolites representing both beer raw materials and production steps provided a specific and accurate tool for measurement of beer consumption.

  9. Unique features in the ARIES glovebox line

    International Nuclear Information System (INIS)

    Martinez, H.E.; Brown, W.G.; Flamm, B.; James, C.A.; Laskie, R.; Nelson, T.O.; Wedman, D.E.

    1998-01-01

    A series of unique features have been incorporated into the Advanced Recovery and Integrated Extraction System (ARIES) at the Los Alamos National Laboratory, TA-55 Plutonium Facility. The features enhance the material handling in the process of the dismantlement of nuclear weapon primaries in the glovebox line. Incorporated into these features are the various plutonium process module's different ventilation zone requirements that the material handling systems must meet. These features include a conveyor system that consists of a remotely controlled cart that transverses the length of the conveyor glovebox, can be operated from a remote location and can deliver process components to the entrance of any selected module glovebox. Within the modules there exists linear motion material handling systems with lifting hoist, which are controlled via an Allen Bradley control panel or local control panels. To remove the packaged products from the hot process line, the package is processed through an air lock/electrolytic decontamination process that removes the radioactive contamination from the outside of the package container and allows the package to be removed from the process line

  10. Clinical EPR: Unique Opportunities and Some Challenges

    Science.gov (United States)

    Swartz, Harold M.; Williams, Benjamin B.; Zaki, Bassem I.; Hartford, Alan C.; Jarvis, Lesley A.; Chen, Eunice; Comi, Richard J.; Ernstoff, Marc S.; Hou, Huagang; Khan, Nadeem; Swarts, Steven G.; Flood, Ann B.; Kuppusamy, Periannan

    2014-01-01

    Electron paramagnetic resonance (EPR) spectroscopy has been well established as a viable technique for measurement of free radicals and oxygen in biological systems, from in vitro cellular systems to in vivo small animal models of disease. However, the use of EPR in human subjects in the clinical setting, although attractive for a variety of important applications such as oxygen measurement, is challenged with several factors including the need for instrumentation customized for human subjects, probe and regulatory constraints. This paper describes the rationale and development of the first clinical EPR systems for two important clinical applications, namely, measurement of tissue oxygen (oximetry), and radiation dose (dosimetry) in humans. The clinical spectrometers operate at 1.2 GHz frequency and use surface loop resonators capable of providing topical measurements up to 1 cm depth in tissues. Tissue pO2 measurements can be carried out noninvasively and repeatedly after placement of an oxygen-sensitive paramagnetic material (currently India ink) at the site of interest. Our EPR dosimetry system is capable of measuring radiation-induced free radicals in the tooth of irradiated human subjects to determine the exposure dose. These developments offer potential opportunities for clinical dosimetry and oximetry, which include guiding therapy for individual patients with tumors or vascular disease, by monitoring of tissue oxygenation. Further work is in progress to translate this unique technology to routine clinical practice. PMID:24439333

  11. TDRSS S-shuttle unique receiver equipment

    Science.gov (United States)

    Weinberg, A.; Schwartz, J. J.; Spearing, R.

    1985-01-01

    Beginning with STS-9, the Tracking and Date Relay Satellite system (TDRSS) will start providing S- and Ku-band communications and tracking support to the Space Shuttle and its payloads. The most significant element of this support takes place at the TDRSS White Sands Ground Terminal, which processes the Shuttle return link S- and Ku-band signals. While Ku-band hardware available to other TDRSS users is also applied to Ku-Shuttle, stringent S-Shuttle link margins have precluded the application of the standard TDRSS S-band processing equipment to S-Shuttle. It was therfore found necessary to develop a unique S-Shuttle Receiver that embodies state-of-the-art digital technology and processing techniques. This receiver, developed by Motorola, Inc., enhances link margins by 1.5 dB relative to the standard S-band equipment and its bit error rate performance is within a few tenths of a dB of theory. An overview description of the Space Shuttle Receiver Equipment (SSRE) is presented which includes the presentation of block diagrams and salient design features. Selected, measured performance results are also presented.

  12. The AD: The unique anti-accelerator

    CERN Multimedia

    Slide show by Maximilien Brice. Voice (French only): Jacques Fichet. Content: Paola Catapano, Django Manglunki, CERN Bulletin

    2011-01-01

    Unlike other machines whose performance is measured in terms of energy records, AD's uniqueness resides in the fact that it can very effectively decelerate beams. At the hearth of antimatter production at CERN, the AD is making headlines in the world's press. This provides an excellent opportunity for us to retrace its history in images.   var flash_video_player=get_video_player_path(); insert_player_for_external('Video/Public/Movies/2011/CERN-MOVIE-2011-083/CERN-MOVIE-2011-083-0753-kbps-480x360-25-fps-audio-64-kbps-44-kHz-stereo', 'mms://mediastream.cern.ch/MediaArchive/Video/Public/Movies/2011/CERN-MOVIE-2011-083/CERN-MOVIE-2011-083-0480-kbps-384x288-25-fps-audio-128-kbps-48-kHz-stereo.wmv', 'false', 480, 360, 'http://mediaarchive.cern.ch/MediaArchive/Video/Public/Movies/2011/CERN-MOVIE-2011-083/CERN-MOVIE-2011-083-posterframe-480x360-at-5-percent.jpg', '1357551', true, '');  

  13. Hausdorff dimension of unique beta expansions

    International Nuclear Information System (INIS)

    Kong, Derong; Li, Wenxia

    2015-01-01

    Given an integer N ⩾ 2 and a real number β > 1, let Γ β, N be the set of all x=∑ i=1 ∞ d i /β i with d i  ∈ {0, 1, ···, N − 1} for all i ⩾ 1. The infinite sequence (d i ) is called a β-expansion of x. Let U β,N be the set of all x's in Γ β,N which have unique β-expansions. We give explicit formula of the Hausdorff dimension of U β,N for β in any admissible interval [β L , β U ], where β L is a purely Parry number while β U is a transcendental number whose quasi-greedy expansion of 1 is related to the classical Thue–Morse sequence. This allows us to calculate the Hausdorff dimension of U β,N for almost every β > 1. In particular, this improves the main results of Gábor Kallós (1999, 2001). Moreover, we find that the dimension function f(β) = dim H U β,N fluctuates frequently for β ∈ (1, N). (paper)

  14. Unique type of isolated cardiac valvular amyloidosis

    Directory of Open Access Journals (Sweden)

    Reehana Salma

    2006-10-01

    Full Text Available Abstract Background Amyloid deposition in heart is a common occurrence in systemic amyloidosis. But localised valvular amyloid deposits are very uncommon. It was only in 1922 that the cases of valvular amyloidosis were reported. Then in 1980, Goffin et al reported another type of valvular amyloidosis, which he called the dystrophic valvular amyloidosis. We report a case of aortic valve amyloidosis which is different from the yet described valvular amyloidosis. Case presentation A 72 years old gentleman underwent urgent aortic valve replacement. Intraoperatively, a lesion was found attached to the inferior surface of his bicuspid aortic valve. Histopathology examination of the valve revealed that the lesion contained amyloid deposits, identified as AL amyloidosis. The serum amyloid A protein (SAP scan was normal and showed no evidence of systemic amyloidosis. The ECG and echocardiogram were not consistent with cardiac amyloidosis. Conclusion Two major types of cardiac amyloidosis have been described in literature: primary-myelomatous type (occurs with systemic amyolidosis, and senile type(s. Recently, a localised cardiac dystrophic valvular amyloidosis has been described. In all previously reported cases, there was a strong association of localised valvular amyloidosis with calcific deposits. Ours is a unique case which differs from the previously reported cases of localised valvular amyloidosis. In this case, the lesion was not associated with any scar tissue. Also there was no calcific deposit found. This may well be a yet unknown type of isolated valvular amyloidosis.

  15. A Unique Civil Engineering Capstone Design Course

    Directory of Open Access Journals (Sweden)

    G Padmanabhan

    2018-02-01

    Full Text Available The North Dakota State University, USA, capstone course was developed as a unique model in response to the effort of the Accreditation Board of Engineering and Technology, USA, to streamline and improve design instruction in the curriculum and has steadily evolved to keep pace with the ever-changing technology and the expectations of the profession and the society we serve. A capstone design course by definition should be a design experience for students in the final year before graduation integrating all major design concepts they have learned up until then in the program. Carefully chosen real world projects with design content in all sub-disciplines of civil engineering are assigned in this team-taught course. Faculty and practicing professionals make presentations on design process; project management; leadership in an engineering environment; and public policy; global perspectives in engineering; and professional career and licensure. Practicing professionals also critique the final student presentations. Students work in teams with number of faculty serving as technical consultants, and a faculty mentor for each team to provide non-technical guidance and direction. The course requires students to demonstrate mastery of the curriculum and to work with others in a team environment. Course assessment includes evaluation of the final design, presentations, written technical reports, project design schedule, a project design journal, and reaction papers.

  16. Defining the genomic signature of totipotency and pluripotency during early human development.

    Directory of Open Access Journals (Sweden)

    Amparo Galan

    Full Text Available The genetic mechanisms governing human pre-implantation embryo development and the in vitro counterparts, human embryonic stem cells (hESCs, still remain incomplete. Previous global genome studies demonstrated that totipotent blastomeres from day-3 human embryos and pluripotent inner cell masses (ICMs from blastocysts, display unique and differing transcriptomes. Nevertheless, comparative gene expression analysis has revealed that no significant differences exist between hESCs derived from blastomeres versus those obtained from ICMs, suggesting that pluripotent hESCs involve a new developmental progression. To understand early human stages evolution, we developed an undifferentiation network signature (UNS and applied it to a differential gene expression profile between single blastomeres from day-3 embryos, ICMs and hESCs. This allowed us to establish a unique signature composed of highly interconnected genes characteristic of totipotency (61 genes, in vivo pluripotency (20 genes, and in vitro pluripotency (107 genes, and which are also proprietary according to functional analysis. This systems biology approach has led to an improved understanding of the molecular and signaling processes governing human pre-implantation embryo development, as well as enabling us to comprehend how hESCs might adapt to in vitro culture conditions.

  17. Measurement of MMP-9 and -12 degraded elastin (ELM) provides unique information on lung tissue degradation

    Science.gov (United States)

    2012-01-01

    Background Elastin is an essential component of selected connective tissues that provides a unique physiological elasticity. Elastin may be considered a signature protein of lungs where matrix metalloprotease (MMP) -9-and -12, may be considered the signature proteases of the macrophages, which in part are responsible for tissue damage during disease progression. Thus, we hypothesized that a MMP-9/-12 generated fragment of elastin may be a relevant biochemical maker for lung diseases. Methods Elastin fragments were identified by mass-spectrometry and one sequence, generated by MMP-9 and -12 (ELN-441), was selected for monoclonal antibody generation and used in the development of an ELISA. Soluble and insoluble elastin from lung was cleaved in vitro and the time-dependent release of fragments was assessed in the ELN-441 assay. The release of ELN-441 in human serum from patients with chronic obstructive pulmonary disease (COPD) (n = 10) and idiopathic pulmonary fibrosis (IPF) (n = 29) were compared to healthy matched controls (n = 11). Results The sequence ELN-441 was exclusively generated by MMP-9 and -12 and was time-dependently released from soluble lung elastin. ELN-441 levels were 287% higher in patients diagnosed with COPD (p elastin. This fragment was elevated in serum from patients with the lung diseases IPF and COPD, however these data needs to be validated in larger clinical settings. PMID:22818364

  18. Quantum liquid signatures in dwarf stars

    Energy Technology Data Exchange (ETDEWEB)

    Gabadadze, Gregory; Pirtskhalava, David, E-mail: gg32@nyu.edu, E-mail: dmp371@nyu.edu [Center for Cosmology and Particle Physics, Department of Physics, New York University, New York, NY 10003 (United States)

    2009-05-15

    We develop further the proposal of arXiv:0806.3692 that a new state of matter - charged condensate of spin-0 nuclei - may exist in helium-core dwarf stars. The charged condensate and its fluctuations are described by an effective field theory Lagrangian. The spectrum of bosonic fluctuations is gapped, while electrons, at temperatures of interest, give rise to gapless excitations near the Fermi surface. These properties determine the evolution of the dwarfs with condensed cores. In particular, we show that such dwarf stars would cool significantly faster than their crystallized counterparts. As a result, the luminosity function for the helium-core dwarfs will have a sharp drop-off after the condensation. It is tempting to interpret the recently discovered abrupt termination of a sequence of 24 helium-core dwarf candidates in NGC 6397 as a signature of the charged condensation.

  19. Signatures of massive sgoldstinos at hadron colliders

    International Nuclear Information System (INIS)

    Perazzi, Elena; Ridolfi, Giovanni; Zwirner, Fabio

    2000-01-01

    In supersymmetric extensions of the Standard Model with a very light gravitino, the effective theory at the weak scale should contain not only the goldstino G-tilde, but also its supersymmetric partners, the sgoldstinos. In the simplest case, the goldstino is a gauge-singlet and its superpartners are two neutral spin-0 particles, S and P. We study possible signals of massive sgoldstinos at hadron colliders, focusing on those that are most relevant for the Tevatron. We show that inclusive production of sgoldstinos, followed by their decay into two photons, can lead to observable signals or to stringent combined bounds on the gravitino and sgoldstino masses. Sgoldstino decays into two gluon jets may provide a useful complementary signature

  20. Signatures of chromodynamics in hadron collisions

    International Nuclear Information System (INIS)

    Halzen, F.

    1979-01-01

    The quantum chromodynamics (QCD) describes the interaction of the parton constituents of hadrons (quarks and gluons) via eight colored photons (gluons) interacting with the quarks, and unlike the photons, with each other. The simple picture of Drell-Yan model has made surprising success. The marriage of the old fashion Drell-Yan parton model with QCD has not only made its phenomenological success in the study of lepton pair production, but has allowed to study quantitatively the gluon correction to the model. Information from beam dump and emulsion experiments on charm production is compared with the typical QCD diagram. The results indicate some possible non-perturbative contribution to the photon- and hadron-production of heavy quarks. The definite features of dilepton as well as large transverse momentum data are direct signature of gluons. (Kato, T.)

  1. Collider signatures of flavorful Higgs bosons

    International Nuclear Information System (INIS)

    Altmannshofer, Wolfgang; Eby, Joshua; Gori, Stefania; Lotito, Matteo

    2016-01-01

    Motivated by our limited knowledge of the Higgs couplings to the first two generation fermions, we analyze the collider phenomenology of a class of two Higgs doublet models (2HDMs) with a nonstandard Yukawa sector. One Higgs doublet is mainly responsible for the masses of the weak gauge bosons and the third-generation fermions, while the second Higgs doublet provides mass for the lighter fermion generations. The characteristic collider signatures of this setup differ significantly from well-studied 2HDMs with natural flavor conservation, flavor alignment, or minimal flavor violation. New production mechanisms for the heavy scalar, pseudoscalar, and charged Higgs involving second-generation quarks can become dominant. The most interesting decay modes include H/A → cc,tc,μμ,τμ and H"± → cb,cs,μν. As a result, searches for low-mass dimuon resonances are currently among the best probes of the heavy Higgs bosons in this setup.

  2. ALPs effective field theory and collider signatures

    Energy Technology Data Exchange (ETDEWEB)

    Brivio, I. [Universidad Autonoma de Madrid, Departamento de Fisica Teorica y Instituto de Fisica Teorica, IFT-UAM/CSIC, Madrid (Spain); University of Copenhagen, Niels Bohr International Academy, Copenhagen (Denmark); Gavela, M.B.; Merlo, L.; Rey, R. del [Universidad Autonoma de Madrid, Departamento de Fisica Teorica y Instituto de Fisica Teorica, IFT-UAM/CSIC, Madrid (Spain); Mimasu, K. [University of Sussex, Department of Physics and Astronomy, Brighton (United Kingdom); Universite Catholique de Louvain, Centre for Cosmology, Particle Physics and Phenomenology (CP3), Louvain-la-Neuve (Belgium); No, J.M. [University of Sussex, Department of Physics and Astronomy, Brighton (United Kingdom); King' s College London, Department of Physics, London (United Kingdom); Sanz, V. [University of Sussex, Department of Physics and Astronomy, Brighton (United Kingdom)

    2017-08-15

    We study the leading effective interactions between the Standard Model fields and a generic singlet CP-odd (pseudo-) Goldstone boson. Two possible frameworks for electroweak symmetry breaking are considered: linear and non-linear. For the latter case, the basis of leading effective operators is determined and compared with that for the linear expansion. Associated phenomenological signals at colliders are explored for both scenarios, deriving new bounds and analyzing future prospects, including LHC and High Luminosity LHC sensitivities. Mono-Z, mono-W, W-photon plus missing energy and on-shell top final states are most promising signals expected in both frameworks. In addition, non-standard Higgs decays and mono-Higgs signatures are especially prominent and expected to be dominant in non-linear realisations. (orig.)

  3. Signatures of Beam - and Anisotropy Driven Oscillitons

    Science.gov (United States)

    Sauer, K.; Dubinin, E.; McKenzie, J. F.

    Oscillitons represent a new class of stationary nonlinear waves, first found in bi-ion plasmas (Sauer et al., 1991) where mode splitting of the `individual' wave modes leads to conditions for phase- and group-standing waves near the `crossing points'. The corresponding structures have signatures of the usual solitons, superimposed by spatial oscillations. Oscillitons may also occur in single-ion plasmas, e.g. in the elec- tron whistler branch. The characteristic features of different types of oscillitons under realistic conditions in space plasmas including damping, beams and anisotropies are analyzed. Relevant mechanisms of coherent waves observed in different frequency ranges (Lion Roars at Earth, ion cyclotron waves near Io and Mars) are discussed.

  4. Thermal Signature Identification System (TheSIS)

    Science.gov (United States)

    Merritt, Scott; Bean, Brian

    2015-01-01

    We characterize both nonlinear and high order linear responses of fiber-optic and optoelectronic components using spread spectrum temperature cycling methods. This Thermal Signature Identification System (TheSIS) provides much more detail than conventional narrowband or quasi-static temperature profiling methods. This detail allows us to match components more thoroughly, detect subtle reversible shifts in performance, and investigate the cause of instabilities or irreversible changes. In particular, we create parameterized models of athermal fiber Bragg gratings (FBGs), delay line interferometers (DLIs), and distributed feedback (DFB) lasers, then subject the alternative models to selection via the Akaike Information Criterion (AIC). Detailed pairing of components, e.g. FBGs, is accomplished by means of weighted distance metrics or norms, rather than on the basis of a single parameter, such as center wavelength.

  5. Spin-3/2 Pentaquark Resonance Signature

    International Nuclear Information System (INIS)

    Ben Lasscock; John Hedditch; Derek Leinweber; Anthony Williams; Waseem Kamleh; Wolodymyr Melnitchouk; Anthony Thomas; Ross Young; James Zanotti

    2005-01-01

    We search for the standard lattice resonance signature of attraction between the resonance constituents which leads to a bound state at quark masses near the physical regime. We study a variety of spin-1/2 interpolators and for the first time, interpolators providing access to spin-3/2 pentaquark states. In looking for evidence of binding, a precise determination of the mass splitting between the pentaquark state and its lowest-lying decay channel is performed by constructing the effective mass splitting from the various two-point correlation functions. While the binding of the pentaquark state is not a requirement, the observation of such binding would provide compelling evidence for the existence of the theta+ pentaquark resonance. Evidence of binding is observed in the isoscalar spin-3/2 positive parity channel, making it an interesting state for further research

  6. Signature of Microbial Dysbiosis in Periodontitis.

    Science.gov (United States)

    Meuric, Vincent; Le Gall-David, Sandrine; Boyer, Emile; Acuña-Amador, Luis; Martin, Bénédicte; Fong, Shao Bing; Barloy-Hubler, Frederique; Bonnaure-Mallet, Martine

    2017-07-15

    Periodontitis is driven by disproportionate host inflammatory immune responses induced by an imbalance in the composition of oral bacteria; this instigates microbial dysbiosis, along with failed resolution of the chronic destructive inflammation. The objectives of this study were to identify microbial signatures for health and chronic periodontitis at the genus level and to propose a model of dysbiosis, including the calculation of bacterial ratios. Published sequencing data obtained from several different studies (196 subgingival samples from patients with chronic periodontitis and 422 subgingival samples from healthy subjects) were pooled and subjected to a new microbiota analysis using the same Visualization and Analysis of Microbial Population Structures (VAMPS) pipeline, to identify microbiota specific to health and disease. Microbiota were visualized using CoNet and Cytoscape. Dysbiosis ratios, defined as the percentage of genera associated with disease relative to the percentage of genera associated with health, were calculated to distinguish disease from health. Correlations between the proposed dysbiosis ratio and the periodontal pocket depth were tested with a different set of data obtained from a recent study, to confirm the relevance of the ratio as a potential indicator of dysbiosis. Beta diversity showed significant clustering of periodontitis-associated microbiota, at the genus level, according to the clinical status and independent of the methods used. Specific genera ( Veillonella , Neisseria , Rothia , Corynebacterium , and Actinomyces ) were highly prevalent (>95%) in health, while other genera ( Eubacterium , Campylobacter , Treponema , and Tannerella ) were associated with chronic periodontitis. The calculation of dysbiosis ratios based on the relative abundance of the genera found in health versus periodontitis was tested. Nonperiodontitis samples were significantly identifiable by low ratios, compared to chronic periodontitis samples. When

  7. Experimental signatures of gravitational wave bursters

    International Nuclear Information System (INIS)

    Dubath, Florian; Foffa, Stefano; Gasparini, Maria Alice; Maggiore, Michele; Sturani, Riccardo

    2005-01-01

    Gravitational wave bursters are sources which emit repeatedly bursts of gravitational waves, and have been recently suggested as potentially interesting candidates for gravitational wave (GW) detectors. Mechanisms that could give rise to a GW burster can be found for instance in highly magnetized neutron stars (the 'magnetars' which explain the phenomenon of soft gamma repeaters), in accreting neutron stars and in hybrid stars with a quark core. We point out that these sources have very distinctive experimental signatures. In particular, as already observed in the γ-ray bursts from soft gamma repeaters, the energy spectrum of the events is a power-law, dN∼E -γ dE with γ≅1.6, and they have a distribution of waiting times (the times between one outburst and the next) significantly different from the distribution of uncorrelated events. We discuss possible detection strategies that could be used to search for these events in existing gravitational wave detectors

  8. Continuous-variable quantum homomorphic signature

    Science.gov (United States)

    Li, Ke; Shang, Tao; Liu, Jian-wei

    2017-10-01

    Quantum cryptography is believed to be unconditionally secure because its security is ensured by physical laws rather than computational complexity. According to spectrum characteristic, quantum information can be classified into two categories, namely discrete variables and continuous variables. Continuous-variable quantum protocols have gained much attention for their ability to transmit more information with lower cost. To verify the identities of different data sources in a quantum network, we propose a continuous-variable quantum homomorphic signature scheme. It is based on continuous-variable entanglement swapping and provides additive and subtractive homomorphism. Security analysis shows the proposed scheme is secure against replay, forgery and repudiation. Even under nonideal conditions, it supports effective verification within a certain verification threshold.

  9. Machine monitoring via current signature analysis techniques

    International Nuclear Information System (INIS)

    Smith, S.F.; Castleberry, K.N.; Nowlin, C.H.

    1992-01-01

    A significant need in the effort to provide increased production quality is to provide improved plant equipment monitoring capabilities. Unfortunately, in today's tight economy, even such monitoring instrumentation must be implemented in a recognizably cost effective manner. By analyzing the electric current drawn by motors, actuator, and other line-powered industrial equipment, significant insights into the operations of the movers, driven equipment, and even the power source can be obtained. The generic term 'current signature analysis' (CSA) has been coined to describe several techniques for extracting useful equipment or process monitoring information from the electrical power feed system. A patented method developed at Oak Ridge National Laboratory is described which recognizes the presence of line-current modulation produced by motors and actuators driving varying loads. The in-situ application of applicable linear demodulation techniques to the analysis of numerous motor-driven systems is also discussed. The use of high-quality amplitude and angle-demodulation circuitry has permitted remote status monitoring of several types of medium and high-power gas compressors in (US DOE facilities) driven by 3-phase induction motors rated from 100 to 3,500 hp, both with and without intervening speed increasers. Flow characteristics of the compressors, including various forms of abnormal behavior such as surging and rotating stall, produce at the output of the specialized detectors specific time and frequency signatures which can be easily identified for monitoring, control, and fault-prevention purposes. The resultant data are similar in form to information obtained via standard vibration-sensing techniques and can be analyzed using essentially identical methods. In addition, other machinery such as refrigeration compressors, brine pumps, vacuum pumps, fans, and electric motors have been characterized

  10. Extracellular Signatures as Indicators of Processing Methods

    Energy Technology Data Exchange (ETDEWEB)

    Wahl, Karen L.

    2012-01-09

    As described in other chapters within this volume, many aspects of microbial cells vary with culture conditions and therefore can potentially be analyzed as forensic signatures of growth conditions. In addition to changes or variations in components of the microbes themselves, extracellular materials indicative of production processes may remain associated with the final bacterial product. It is well recognized that even with considerable effort to make pure products such as fine chemicals or pharmaceuticals, trace impurities from components or synthesis steps associated with production processes can be detected in the final product. These impurities can be used as indicators of production source or methods, such as to help connect drugs of abuse to supply chains. Extracellular residue associated with microbial cells could similarly help to characterize production processes. For successful growth of microorganisms on culture media there must be an available source of carbon, nitrogen, inorganic phosphate and sulfur, trace metals, water and vitamins. The pH, temperature, and a supply of oxygen or other gases must also be appropriate for a given organism for successful culture. The sources of these components and the range in temperature, pH and other variables has adapted over the years with currently a wide range of possible combinations of media components, recipes and parameters to choose from for a given organism. Because of this wide variability in components, mixtures of components, and other parameters, there is the potential for differentiation of cultured organisms based on changes in culture conditions. The challenge remains how to narrow the field of potential combinations and be able to attribute variations in the final bacterial product and extracellular signatures associated with the final product to information about the culture conditions or recipe used in the production of that product.

  11. Acoustic signature of thunder from seismic records

    Science.gov (United States)

    Kappus, Mary E.; Vernon, Frank L.

    1991-06-01

    Thunder, the sound wave through the air associated with lightning, transfers sufficient energy to the ground to trigger seismometers set to record regional earthquakes. The acoustic signature recorded on seismometers, in the form of ground velocity as a function of time, contains the same type features as pressure variations recorded with microphones in air. At a seismic station in Kislovodsk, USSR, a nearly direct lightning strike caused electronic failure of borehole instruments while leaving a brief impulsive acoustic signature on the surface instruments. The peak frequency of 25-55 Hz is consistent with previously published values for cloud-to-ground lightning strikes, but spectra from this station are contaminated by very strong wind noise in this band. A thunderstorm near a similar station in Karasu triggered more than a dozen records of individual lightning strikes during a 2-hour period. The spectra for these events are fairly broadband, with peaks at low frequencies, varying from 6 to 13 Hz. The spectra were all computed by multitaper analysis, which deals appropriately with the nonstationary thunder signal. These independent measurements of low-frequency peaks corroborate the occasional occurrences in traditional microphone records, but a theory concerning the physical mechanism to account for them is still in question. Examined separately, the individual claps in each record have similar frequency distributions, discounting a need for multiple mechanisms to explain different phases of the thunder sequence. Particle motion, determined from polarization analysis of the three-component records, is predominantly vertical downward, with smaller horizontal components indicative of the direction to the lightning bolt. In three of the records the azimuth to the lightning bolt changes with time, confirming a significant horizontal component to the lightning channel itself.

  12. Thermal-Signature-Based Sleep Analysis Sensor

    Directory of Open Access Journals (Sweden)

    Ali Seba

    2017-10-01

    Full Text Available This paper addresses the development of a new technique in the sleep analysis domain. Sleep is defined as a periodic physiological state during which vigilance is suspended and reactivity to external stimulations diminished. We sleep on average between six and nine hours per night and our sleep is composed of four to six cycles of about 90 min each. Each of these cycles is composed of a succession of several stages of sleep that vary in depth. Analysis of sleep is usually done via polysomnography. This examination consists of recording, among other things, electrical cerebral activity by electroencephalography (EEG, ocular movements by electrooculography (EOG, and chin muscle tone by electromyography (EMG. Recordings are made mostly in a hospital, more specifically in a service for monitoring the pathologies related to sleep. The readings are then interpreted manually by an expert to generate a hypnogram, a curve showing the succession of sleep stages during the night in 30s epochs. The proposed method is based on the follow-up of the thermal signature that makes it possible to classify the activity into three classes: “awakening,” “calm sleep,” and “restless sleep”. The contribution of this non-invasive method is part of the screening of sleep disorders, to be validated by a more complete analysis of the sleep. The measure provided by this new system, based on temperature monitoring (patient and ambient, aims to be integrated into the tele-medicine platform developed within the framework of the Smart-EEG project by the SYEL–SYstèmes ELectroniques team. Analysis of the data collected during the first surveys carried out with this method showed a correlation between thermal signature and activity during sleep. The advantage of this method lies in its simplicity and the possibility of carrying out measurements of activity during sleep and without direct contact with the patient at home or hospitals.

  13. Predicting cellular growth from gene expression signatures.

    Directory of Open Access Journals (Sweden)

    Edoardo M Airoldi

    2009-01-01

    Full Text Available Maintaining balanced growth in a changing environment is a fundamental systems-level challenge for cellular physiology, particularly in microorganisms. While the complete set of regulatory and functional pathways supporting growth and cellular proliferation are not yet known, portions of them are well understood. In particular, cellular proliferation is governed by mechanisms that are highly conserved from unicellular to multicellular organisms, and the disruption of these processes in metazoans is a major factor in the development of cancer. In this paper, we develop statistical methodology to identify quantitative aspects of the regulatory mechanisms underlying cellular proliferation in Saccharomyces cerevisiae. We find that the expression levels of a small set of genes can be exploited to predict the instantaneous growth rate of any cellular culture with high accuracy. The predictions obtained in this fashion are robust to changing biological conditions, experimental methods, and technological platforms. The proposed model is also effective in predicting growth rates for the related yeast Saccharomyces bayanus and the highly diverged yeast Schizosaccharomyces pombe, suggesting that the underlying regulatory signature is conserved across a wide range of unicellular evolution. We investigate the biological significance of the gene expression signature that the predictions are based upon from multiple perspectives: by perturbing the regulatory network through the Ras/PKA pathway, observing strong upregulation of growth rate even in the absence of appropriate nutrients, and discovering putative transcription factor binding sites, observing enrichment in growth-correlated genes. More broadly, the proposed methodology enables biological insights about growth at an instantaneous time scale, inaccessible by direct experimental methods. Data and tools enabling others to apply our methods are available at http://function.princeton.edu/growthrate.

  14. Peatlands as a unique climatic hotspots

    Science.gov (United States)

    Slowinska, S.; Marcisz, K.; Slowinski, M. M.; Blazejczyk, K.; Lamentowicz, M.

    2017-12-01

    Peatlands are unique environments, often acting as microrefugia of various taxa. High groundwater table, organic soils, specific vegetation and topography are important determinants of their local climatic conditions. However, relations between those determinants are not stable. For example, seasonal changes in weather patterns, hydrological dynamics, and local vegetation may alter microclimate. Additionally, long-term changes are important factor, as for example overgrowing due to significant change of microclimate conditions, what in turn changes geochemical and biological processes in the peat layer. We have been investigating interactions between abiotic and biotic factors of a small Sphagnum mire (ca. 6.0 ha) for over ten years now. The mire is located in Poland in transitional temperate climate and is the only place in polish lowlands where glacial relict Betula nana occurs. Identification of local climate of the mire, its microclimatic differentiation and its influence on surroundings were objectives of the study. We recorded water level fluctuations, photosynthetically active radiation (PAR), air temperature and humidity, and peat temperature at five monitoring plots at the mire and observed significant differences between them. We also investigated Sphagnum mosses growth and testate amoeba diversity and community structure to understand biological response of those differences. We observed that local climate of the mire was significantly different from open area reference place, it was much colder especially during nights. The average minimal temperature at the height 30 cm for growing seasons 2010-2012 was 3.7oC lower there and ground frosts occurred even in the summer. The climate of the mire affected the forest directly adjacent to it, and depending on weather conditions the strength and the distance of this interaction was different. Our results show that micro-environmental changes affects on biological processes and should be taken into consideration

  15. Lourdes: A uniquely Catholic approach to medicine.

    Science.gov (United States)

    Dichoso, Travis Jon

    2015-02-01

    As an American medical student, I spent the summer break between my first and second year in Lourdes, France, the site where the Immaculate Conception appeared eighteen times to St. Bernadette in 1858 as proclaimed approved by the Catholic Church and whose water is associated with over seven thousand unexplained cures. During this time I volunteered with St. Joseph's Service and Poste Secour, followed several medical teams taking care of large pilgrim groups, and shadowed Dr. Alessandro de Franciscis the president of Le Bureau des Constations Médicales, the office in Lourdes charged with investigating claims of miracles. Through my experiences, I found the mission of medicine in Lourdes to be twofold: to provide the critical care needed to give sick persons the chance to transform their experience of disease through their faith; and secondly, through the efforts of the Medical Bureau, to be an instrument by which we can comprehend the wonders of the work of God. I conclude that this twofold mission should inform the work of every Catholic in health care or research, and Lourdes provides the venue par excellence to cultivate this mission. Lay Summary: Lourdes is a pilgrimage site in southern France that has been associated with medical miracles for the past 150 years. The site is unique in that throughout its history, physicians, of any or no faith, have been invited to participate in the proceedings of the investigations of each claimed cure. The investigations have formalized into a process handled by the Lourdes Medical Bureau and the Lourdes International Medical Association. Travis Dichoso, an American medical student, writes about his experiences as part of this process.

  16. Evolution of a Unique Systems Engineering Capability

    Energy Technology Data Exchange (ETDEWEB)

    Robert M. Caliva; James A. Murphy; Kyle B. Oswald

    2011-06-01

    The Idaho National Laboratory (INL) is a science-based, applied engineering laboratory dedicated to supporting U.S. Department of Energy missions in nuclear and energy research, science, and national security. The INL’s Systems Engineering organization supports all of the various programs under this wide array of missions. As with any multifaceted organization, strategic planning is essential to establishing a consistent culture and a value discipline throughout all levels of the enterprise. While an organization can pursue operational excellence, product leadership or customer intimacy, it is extremely difficult to excel or achieve best-in-class at all three. In fact, trying to do so has resulted in the demise of a number of organizations given the very intricate balancing act that is necessary. The INL’s Systems Engineering Department has chosen to focus on customer intimacy where the customer’s needs are first and foremost and a more total solution is the goal. Frequently a total solution requires the employment of specialized tools to manage system complexity. However, it is only after understanding customer needs that tool selection and use would be pursued. This results in using both commercial-off-the-shelf (COTS) tools and, in some cases, requires internal development of specialized tools. This paper describes how a unique systems engineering capability, through the development of customized tools, evolved as a result of this customer-focused culture. It also addresses the need for a common information model or analysis framework and presents an overview of the tools developed to manage and display relationships between entities, support trade studies through the application of utility theory, and facilitate the development of a technology roadmap to manage system risk and uncertainty.

  17. Cascade de photons dans les boîtes quantiques uniques

    Science.gov (United States)

    Robert, I.; Moreau, E.; Gérard, J. M.; Abram, I.

    2002-06-01

    Nous présentons l'observation expérimentale de l'émission squentielle de photons par une boîte quantique unique sous pompage optique continu ou pulsé. Cette cascade radiative produit des paires de photons corrélés qui sont émis suivant un ordre bien défini. En effet, la fonction de corrélation croisée entre les deux photons formant la paire présente une allure asymétrique, de type groupement ou dégroupement de photons, suivant l'ordre temporel de détection des deux photons. Prédit théoriquement en physique atomique, ce comportement asymétrique de la fonction de corrélation de second ordre est la signature de l'émission successive de photons.

  18. Searches with long-lived or unusual signatures

    CERN Document Server

    Haug, S; The ATLAS collaboration

    2013-01-01

    We present recent ATLAS and CMS results from searches with long-lived and unusual signatures. They are based on analysis of LHC proton-proton collisions at center of mass energies at 7 and 8 TeV. Long-lived and heavy particles may cause peculiar signatures in the detectors, but are in several Standard Model extensions well motivated.

  19. 27 CFR 70.52 - Signature presumed authentic.

    Science.gov (United States)

    2010-04-01

    ... 27 Alcohol, Tobacco Products and Firearms 2 2010-04-01 2010-04-01 false Signature presumed authentic. 70.52 Section 70.52 Alcohol, Tobacco Products and Firearms ALCOHOL AND TOBACCO TAX AND TRADE... Collection of Excise and Special (Occupational) Tax Collection-General Provisions § 70.52 Signature presumed...

  20. 25 CFR 117.33 - Signature of illiterates.

    Science.gov (United States)

    2010-04-01

    ... 25 Indians 1 2010-04-01 2010-04-01 false Signature of illiterates. 117.33 Section 117.33 Indians BUREAU OF INDIAN AFFAIRS, DEPARTMENT OF THE INTERIOR FINANCIAL ACTIVITIES DEPOSIT AND EXPENDITURE OF... Signature of illiterates. An Indian who cannot write shall be required to endorse checks payable to his...

  1. 26 CFR 301.6064-1 - Signature presumed authentic.

    Science.gov (United States)

    2010-04-01

    ... 26 Internal Revenue 18 2010-04-01 2010-04-01 false Signature presumed authentic. 301.6064-1 Section 301.6064-1 Internal Revenue INTERNAL REVENUE SERVICE, DEPARTMENT OF THE TREASURY (CONTINUED....6064-1 Signature presumed authentic. An individual's name signed to a return, statement, or other...

  2. Field Education as the Signature Pedagogy of Social Work Education

    Science.gov (United States)

    Wayne, Julianne; Bogo, Marion; Raskin, Miriam

    2010-01-01

    In its EPAS, CSWE (2008) identifies field education as the signature pedagogy (Shulman, 2005b) of social work education. This article analyzes the field education-signature pedagogy fit. It finds congruence in selected organizational arrangements that are pervasive and routine, and disparities with respect to expectations about public student…

  3. 12 CFR 18.6 - Signature and attestation.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 1 2010-01-01 2010-01-01 false Signature and attestation. 18.6 Section 18.6 Banks and Banking COMPTROLLER OF THE CURRENCY, DEPARTMENT OF THE TREASURY DISCLOSURE OF FINANCIAL AND OTHER INFORMATION BY NATIONAL BANKS § 18.6 Signature and attestation. A duly authorized officer of the...

  4. 12 CFR 350.6 - Signature and attestation.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 4 2010-01-01 2010-01-01 false Signature and attestation. 350.6 Section 350.6 Banks and Banking FEDERAL DEPOSIT INSURANCE CORPORATION REGULATIONS AND STATEMENTS OF GENERAL POLICY DISCLOSURE OF FINANCIAL AND OTHER INFORMATION BY FDIC-INSURED STATE NONMEMBER BANKS § 350.6 Signature and...

  5. 13 CFR 134.209 - Requirement of signature.

    Science.gov (United States)

    2010-01-01

    ... 13 Business Credit and Assistance 1 2010-01-01 2010-01-01 false Requirement of signature. 134.209 Section 134.209 Business Credit and Assistance SMALL BUSINESS ADMINISTRATION RULES OF PROCEDURE GOVERNING... of signature. Every written submission to OHA, other than evidence, must be signed by the party...

  6. 48 CFR 4.101 - Contracting officer's signature.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 1 2010-10-01 2010-10-01 false Contracting officer's signature. 4.101 Section 4.101 Federal Acquisition Regulations System FEDERAL ACQUISITION REGULATION GENERAL ADMINISTRATIVE MATTERS Contract Execution 4.101 Contracting officer's signature. Only contracting officers shall...

  7. Selective forgery of RSA signatures with fixed-pattern padding

    NARCIS (Netherlands)

    Lenstra, A.K.; Shparlinski, I.E.; Naccache, D.; Paillier, P.

    2002-01-01

    We present a practical selective forgery attack against RSA signatures with fixed-pattern padding shorter than two thirds of the modulus length. Our result extends the practical existential forgery of such RSA signatures that was presented at Crypto 2001. For an n-bit modulus the heuristic

  8. Subsurface signatures and timing of extreme wave events along the ...

    Indian Academy of Sciences (India)

    The diagnostic event signatures include the extent and elevation of the deposits, as well as morphologic similarity ... Historical archives of the origin, timing, and impact of tsunamis, storms, and floods along the mar- gins of ... High-resolution GPR studies (by the IIT Madras group) of erosional signatures from the beach ridge.

  9. Restrictive partially blind signature for resource-constrained information systems

    NARCIS (Netherlands)

    Qiu, Weidong; Gong, Zheng; Liu, Bozhong; Long, Yu; Chen, Kefei

    2010-01-01

    Restrictive partially blind signature, which is designed for privacy oriented information systems, allows a user to obtain a blind signature from a signer whilst the blind message must obey some certain rules. In order to reduce storage and communication costs, several public-key cryptosystems are

  10. Electronic Signatures in Global and National Commerce Act. Public Law.

    Science.gov (United States)

    Congress of the U.S., Washington, DC.

    This document presents the text of Public Law 106-229, the "Electronic Signatures in Global and National Commerce Act." The act states that, with respect to any transaction in or affecting interstate or foreign commerce: a signature, contract, or other record relating to such transaction may not be denied legal effect, validity, or…

  11. Space Object Radiometric Modeling for Hardbody Optical Signature Database Generation

    Science.gov (United States)

    2009-09-01

    Introduction This presentation summarizes recent activity in monitoring spacecraft health status using passive remote optical nonimaging ...Approved for public release; distribution is unlimited. Space Object Radiometric Modeling for Hardbody Optical Signature Database Generation...It is beneficial to the observer/analyst to understand the fundamental optical signature variability associated with these detection and

  12. Detection of chemical explosives using multiple photon signatures

    International Nuclear Information System (INIS)

    Loschke, K.W.; Dunn, W.L.

    2008-01-01

    Full text: A template-matching procedure to aid in rapid detection of improvised explosive devices (IEDs) is being investigated. Multiple photon-scattered and photon-induced positron annihilation radiation responses are being used as part of a photon-neutron signature-based radiation scanning (SBRS) approach (see companion reference for description of the neutron component), in an attempt to detect chemical explosives at safe standoff distances. Many past and present photon interrogation methods are based on imaging. Imaging techniques seek to determine at high special resolution the internal structure of a target of interest. Our technique simply seeks to determine if an unknown target contains a detectable amount of chemical explosives by comparing multiple responses (signatures) that depend on both density and composition of portions of a target. In the photon component, beams of photons are used to create back-streaming signatures, which are dependent on the density and composition of part of the target being interrogated. These signatures are compared to templates, which are collections of the same signatures if the interrogated volume contained a significant amount of explosives. The signature analysis produces a figure-of-merit and a standard deviation of the figure-of-merit. These two metrics are used to filter safe from dangerous targets. Experiments have been conducted that show that explosive surrogates (fertilizers) can be distinguished from several inert materials using these photon signatures, demonstrating that these signatures can be used effectively to help IEDs

  13. Differential profiling of volatile organic compound biomarker signatures utilizing a logical statistical filter-set and novel hybrid evolutionary classifiers

    Science.gov (United States)

    Grigsby, Claude C.; Zmuda, Michael A.; Boone, Derek W.; Highlander, Tyler C.; Kramer, Ryan M.; Rizki, Mateen M.

    2012-06-01

    A growing body of discoveries in molecular signatures has revealed that volatile organic compounds (VOCs), the small molecules associated with an individual's odor and breath, can be monitored to reveal the identity and presence of a unique individual, as well their overall physiological status. Given the analysis requirements for differential VOC profiling via gas chromatography/mass spectrometry, our group has developed a novel informatics platform, Metabolite Differentiation and Discovery Lab (MeDDL). In its current version, MeDDL is a comprehensive tool for time-series spectral registration and alignment, visualization, comparative analysis, and machine learning to facilitate the efficient analysis of multiple, large-scale biomarker discovery studies. The MeDDL toolset can therefore identify a large differential subset of registered peaks, where their corresponding intensities can be used as features for classification. This initial screening of peaks yields results sets that are typically too large for incorporation into a portable, electronic nose based system in addition to including VOCs that are not amenable to classification; consequently, it is also important to identify an optimal subset of these peaks to increase classification accuracy and to decrease the cost of the final system. MeDDL's learning tools include a classifier similar to a K-nearest neighbor classifier used in conjunction with a genetic algorithm (GA) that simultaneously optimizes the classifier and subset of features. The GA uses ROC curves to produce classifiers having maximal area under their ROC curve. Experimental results on over a dozen recognition problems show many examples of classifiers and feature sets that produce perfect ROC curves.

  14. Unique aspects of the perinatal immune system.

    Science.gov (United States)

    Zhang, Xiaoming; Zhivaki, Dania; Lo-Man, Richard

    2017-08-01

    The early stages of life are associated with increased susceptibility to infection, which is in part due to an ineffective immune system. In the context of infection, the immune system must be stimulated to provide efficient protection while avoiding insufficient or excessive activation. Yet, in early life, age-dependent immune regulation at molecular and cellular levels contributes to a reduced immunological fitness in terms of pathogen clearance and response to vaccines. To enable microbial colonization to be tolerated at birth, epigenetic immune cell programming and early life-specific immune regulatory and effector mechanisms ensure that vital functions and organ development are supported and that tissue damage is avoided. Advancement in our understanding of age-related remodelling of immune networks and the consequent tuning of immune responsiveness will open up new possibilities for immune intervention and vaccine strategies that are designed specifically for early life.

  15. Study of Wind Effects on Unique Buildings

    Science.gov (United States)

    Olenkov, V.; Puzyrev, P.

    2017-11-01

    The article deals with a numerical simulation of wind effects on the building of the Church of the Intercession of the Holy Virgin in the village Bulzi of the Chelyabinsk region. We presented a calculation algorithm and obtained pressure fields, velocity fields and the fields of kinetic energy of a wind stream, as well as streamlines. Computational fluid dynamic (CFD) evolved three decades ago at the interfaces of calculus mathematics and theoretical hydromechanics and has become a separate branch of science the subject of which is a numerical simulation of different fluid and gas flows as well as the solution of arising problems with the help of methods that involve computer systems. This scientific field which is of a great practical value is intensively developing. The increase in CFD-calculations is caused by the improvement of computer technologies, creation of multipurpose easy-to-use CFD-packagers that are available to a wide group of researchers and cope with various tasks. Such programs are not only competitive in comparison with physical experiments but sometimes they provide the only opportunity to answer the research questions. The following advantages of computer simulation can be pointed out: a) Reduction in time spent on design and development of a model in comparison with a real experiment (variation of boundary conditions). b) Numerical experiment allows for the simulation of conditions that are not reproducible with environmental tests (use of ideal gas as environment). c) Use of computational gas dynamics methods provides a researcher with a complete and ample information that is necessary to fully describe different processes of the experiment. d) Economic efficiency of computer calculations is more attractive than an experiment. e) Possibility to modify a computational model which ensures efficient timing (change of the sizes of wall layer cells in accordance with the chosen turbulence model).

  16. Online Signature Verification using Recurrent Neural Network and Length-normalized Path Signature

    OpenAIRE

    Lai, Songxuan; Jin, Lianwen; Yang, Weixin

    2017-01-01

    Inspired by the great success of recurrent neural networks (RNNs) in sequential modeling, we introduce a novel RNN system to improve the performance of online signature verification. The training objective is to directly minimize intra-class variations and to push the distances between skilled forgeries and genuine samples above a given threshold. By back-propagating the training signals, our RNN network produced discriminative features with desired metrics. Additionally, we propose a novel d...

  17. A semi-classical approach to signature splitting and signature inversion in odd–odd nuclei

    International Nuclear Information System (INIS)

    Kumar, Vinod; Kumar, Suresh; Kumar, Sushil; Hasan, Zafrul; Koranga, B.S.; Kumar, Deepak; Negi, D.; Angus, Lee

    2011-01-01

    The signature inversion observed in rotational bands belonging to high-j configurations of odd–odd deformed nuclei has been analyzed within the framework of an axially symmetric rotor plus two-particle model. The Coriolis and n–p interaction are considered the main cause of energy staggering. However, γ-triaxial deformation and the numbers of valence protons, N p , and neutrons, N n also contribute to the energy staggering between odd- and even-spin states. (author)

  18. Signature scheme for the microscopic description of nuclear collective excitations

    International Nuclear Information System (INIS)

    Ogawa, K.

    1980-04-01

    The symmetries between the proton and neutron systems in a nucleus are described in terms of the signatures. Three kinds of signatures (i.e. the pn-, p anti n- and p anti p- (or n anti n-) signatures) are introduced and they are related to the appearance of various collective motions such as rotations or vibrations. It is shown that the pn-signature scheme provides a band-like structure of deformed nuclei, while the features associated with the quadrupole vibration are obtained in the p anti n- and p anti p-signature scheme. From the detail investigation of the p anti n-symmetric wave functions, it is concluded that the reguralities provided by the present shell model are more analogous to those of the γ-unstable surface vibration model (Wilets-Jean model) than to those of harmonic phonon model. (author)

  19. Molecular signatures define two main classes of meningiomas

    Directory of Open Access Journals (Sweden)

    Costello Joseph F

    2007-10-01

    Full Text Available Abstract Background Meningiomas are common brain tumors that are classified into three World Health Organization grades (benign, atypical and malignant and are molecularly ill-defined tumors. The purpose of this study was identify molecular signatures unique to the different grades of meningiomas and to unravel underlying molecular mechanisms driving meningioma tumorigenesis. Results We have used a combination of gene expression microarrays and array comparative genomic hybridization (aCGH to show that meningiomas of all three grades fall into two main molecular groups designated 'low-proliferative' and 'high-proliferative' meningiomas. While all benign meningiomas fall into the low-proliferative group and all malignant meningiomas fall into the high-proliferative group, atypical meningiomas distribute into either one of these groups. High-proliferative atypical meningiomas had an elevated median MIB-1 labeling index and a greater frequency of copy number aberrations (CNAs compared to low-proliferative atypical meningiomas. Additionally, losses on chromosome 6q, 9p, 13 and 14 were found exclusively in the high-proliferative meningiomas. We have identified genes that distinguish benign low-proliferative meningiomas from malignant high-proliferative meningiomas and have found that gain of cell-proliferation markers and loss of components of the transforming growth factor-beta signaling pathway were the major molecular mechanisms that distinguish these two groups. Conclusion Collectively, our data suggests that atypical meningiomas are not a molecularly distinct group but are similar to either benign or malignant meningiomas. It is anticipated that identified molecular and CNA markers will potentially be more accurate prognostic markers of meningiomas.

  20. Altered metabolic signature in pre-diabetic NOD mice.

    Directory of Open Access Journals (Sweden)

    Rasmus Madsen

    Full Text Available Altered metabolism proceeding seroconversion in children progressing to Type 1 diabetes has previously been demonstrated. We tested the hypothesis that non-obese diabetic (NOD mice show a similarly altered metabolic profile compared to C57BL/6 mice. Blood samples from NOD and C57BL/6 female mice was collected at 0, 1, 2, 3, 4, 5, 6, 7, 9, 11, 13 and 15 weeks and the metabolite content was analyzed using GC-MS. Based on the data of 89 identified metabolites OPLS-DA analysis was employed to determine the most discriminative metabolites. In silico analysis of potential involved metabolic enzymes was performed using the dbSNP data base. Already at 0 weeks NOD mice displayed a unique metabolic signature compared to C57BL/6. A shift in the metabolism was observed for both strains the first weeks of life, a pattern that stabilized after 5 weeks of age. Multivariate analysis revealed the most discriminative metabolites, which included inosine and glutamic acid. In silico analysis of the genes in the involved metabolic pathways revealed several SNPs in either regulatory or coding regions, some in previously defined insulin dependent diabetes (Idd regions. Our result shows that NOD mice display an altered metabolic profile that is partly resembling the previously observation made in children progressing to Type 1 diabetes. The level of glutamic acid was one of the most discriminative metabolites in addition to several metabolites in the TCA cycle and nucleic acid components. The in silico analysis indicated that the genes responsible for this reside within previously defined Idd regions.

  1. Kerala: a unique model of development.

    Science.gov (United States)

    Kannan, K P; Thankappan, K R; Ramankutty, V; Aravindan, K P

    1991-12-01

    This article capsules health in terms of morbidity, mortality, and maternal and child health; sex ratios, and population density in Kerala state in India from a more expanded report. Kerala state is known for its highly literate and female literate, and poor income population, but its well advanced state of demographic transition. There is a declining population growth rate, a high average marriage age, a low fertility rate, and a high degree of population mobility. One of the unique features of Kerala is the high female literacy, and the favorable position of women in decision making and a matrilineal inheritance mode. The rights of the poor and underprivileged have been upheld. The largest part of government revenue is spent on education followed by health. Traditional healing systems such the ayurveda are strong in Kerala, and Christian missionaries have contributed to a caring tradition. Morbidity is high and mortality is low because medical interventions have affected morality only. The reduction of poverty and environmentally related diseases has not been accomplished inspite of land reform, mass schooling, and general egalitarian policies. Mortality declines and a decline in birth rates have lead to a more adult and aged population, which increases the prevalence of chronic degenerative diseases. Historically, the death rate in Kerala was always lower (25/1000 in 1930 and 6.4 in 1986). The gains in mortality were made in reducing infant mortality (27/1000), which is 4 times less than India as a whole and comparable to Korea, Panama, Yugoslavia, Sri Lanka, and Colombia. Lower female mortality occurs in the 0-4 years. Life expectancy which was the same as India's in 1930 is currently 12 years higher than India's. Females have a higher expectation of life. The sex ratio in 1981 was 1032 compared to India's of 935. Kerala had almost replacement level in 1985. The crude birth rate is 21 versus 32 for India. In addition to the decline in death rates of those 5

  2. Unitary Evolution as a Uniqueness Criterion

    Science.gov (United States)

    Cortez, J.; Mena Marugán, G. A.; Olmedo, J.; Velhinho, J. M.

    2015-01-01

    It is well known that the process of quantizing field theories is plagued with ambiguities. First, there is ambiguity in the choice of basic variables describing the system. Second, once a choice of field variables has been made, there is ambiguity concerning the selection of a quantum representation of the corresponding canonical commutation relations. The natural strategy to remove these ambiguities is to demand positivity of energy and to invoke symmetries, namely by requiring that classical symmetries become unitarily implemented in the quantum realm. The success of this strategy depends, however, on the existence of a sufficiently large group of symmetries, usually including time-translation invariance. These criteria are therefore generally insufficient in non-stationary situations, as is typical for free fields in curved spacetimes. Recently, the criterion of unitary implementation of the dynamics has been proposed in order to select a unique quantization in the context of manifestly non-stationary systems. Specifically, the unitarity criterion, together with the requirement of invariance under spatial symmetries, has been successfully employed to remove the ambiguities in the quantization of linearly polarized Gowdy models as well as in the quantization of a scalar field with time varying mass, propagating in a static background whose spatial topology is either of a d-sphere (with d = 1, 2, 3) or a three torus. Following Ref. 3, we will see here that the symmetry and unitarity criteria allows for a complete removal of the ambiguities in the quantization of scalar fields propagating in static spacetimes with compact spatial sections, obeying field equations with an explicitly time-dependent mass, of the form ddot φ - Δ φ + s(t)φ = 0 . These results apply in particular to free fields in spacetimes which, like e.g. in the closed FRW models, are conformal to a static spacetime, by means of an exclusively time-dependent conformal factor. In fact, in such

  3. Highly Efficient Wireless Powering for Autonomous Structural Health Monitoring and Test/Evaluation Systems

    Science.gov (United States)

    2016-07-27

    of this work is to improve the efficiency, range, and safety (in terms of EMI/EMC and signature) of wireless powering of sensors using the recently...this work is to improve the efficiency, range, and safety (in terms of EMI/EMC and signature) of wireless powering of sensors using the recently...Force and DoD, such as, smart runways, nano-satellites, smart skins for hypersonic vehicles , autonomous portable devices, integrated circuits, and

  4. A unique 3D ultramicroporous triptycene-based polyimide framework for efficient gas sorption applications

    KAUST Repository

    Ghanem, Bader

    2016-10-03

    A novel 3D ultramicroporous triptycene-based polyimide framework with high surface area (1050 m2 g−1) and thermal stability was synthesized. It exhibits relatively high CO2 (3.4 mmol g−1 at 273 K and 1 bar), H2 (7 mmol g−1 at 77 K and 1 bar), and olefin sorption capacity, good CO2/N2 (45) and CO2/CH4 (9.6) selectivity at 273 K and 1 bar, as well as promising C2H4/CH4 and C3H6/CH4 selectivities at 298 K, making it a potential candidate for CO2 capture, H2 storage, and hydrocarbon gas separation applications.

  5. Unique reduced graphene oxide as efficient anode material in Li ion ...

    Indian Academy of Sciences (India)

    2018-03-29

    Mar 29, 2018 ... as an electrode material in dye-sensitized solar cell [1], super- capacitor [2] and Li ion battery ... Ar-filled glove box. In each of the coin cell, ... Li reacts with suitable materials' defects at low potential and as they charge, bonds ...

  6. An Efficient Energy Management Strategy, Unique Power Split & Energy Distribution, Based on Calculated Vehicle Road Loads

    Science.gov (United States)

    2012-08-01

    regenerative braking or simulated engine braking . AVL Hybrid Control System (HCU) coordinates and controls all system components as laid out in Figure... regenerative and friction brakes with a 34% dead-band on the brake pedal. Table 2 gives a summary and comparison of simulation results in terms of kg of...2012 NDIA GROUND VEHICLE SYSTEMS ENGINEERING AND TECHNOLOGY SYMPOSIUM POWER AND MOBILITY (P&M) MINI-SYMPOSIUM AUGUST 14-16, MICHIGAN AN

  7. A unique 3D ultramicroporous triptycene-based polyimide framework for efficient gas sorption applications

    KAUST Repository

    Ghanem, Bader; Belmabkhout, Youssef; Wang, Yingge; Zhao, Yunfeng; Han, Yu; Eddaoudi, Mohamed; Pinnau, Ingo

    2016-01-01

    A novel 3D ultramicroporous triptycene-based polyimide framework with high surface area (1050 m2 g−1) and thermal stability was synthesized. It exhibits relatively high CO2 (3.4 mmol g−1 at 273 K and 1 bar), H2 (7 mmol g−1 at 77 K and 1 bar), and olefin sorption capacity, good CO2/N2 (45) and CO2/CH4 (9.6) selectivity at 273 K and 1 bar, as well as promising C2H4/CH4 and C3H6/CH4 selectivities at 298 K, making it a potential candidate for CO2 capture, H2 storage, and hydrocarbon gas separation applications.

  8. Two Galaxies for a Unique Event

    Science.gov (United States)

    2009-04-01

    To celebrate the 100 Hours of Astronomy, ESO is sharing two stunning images of unusual galaxies, both belonging to the Sculptor group of galaxies. The images, obtained at two of ESO's observatories at La Silla and Paranal in Chile, illustrate the beauty of astronomy. ESO PR Photo 14a/09 Irregular Galaxy NGC 55 ESO PR Photo 14b/09 Spiral Galaxy NGC 7793 As part of the International Year of Astronomy 2009 Cornerstone project, 100 Hours of Astronomy, the ambitious "Around the World in 80 Telescopes" event is a unique live webcast over 24 hours, following night and day around the globe to some of the most advanced observatories on and off the planet. To provide a long-lasting memory of this amazing world tour, observatories worldwide are revealing wonderful, and previously unseen, astronomical images. For its part, ESO is releasing outstanding pictures of two galaxies, observed with telescopes at the La Silla and Paranal observatories. The first of these depicts the irregular galaxy NGC 55, a member of the prominent Sculptor group of galaxies in the southern constellation of Sculptor. The galaxy is about 70 000 light-years across, that is, a little bit smaller than our own Milky Way. NGC 55 actually resembles more our galactic neighbour, the Large Magellanic Cloud (LMC), although the LMC is seen face-on, whilst NGC 55 is edge-on. By studying about 20 planetary nebulae in this image, a team of astronomers found that NGC 55 is located about 7.5 million light-years away. They also found that the galaxy might be forming a bound pair with the gorgeous spiral galaxy NGC 300 . Planetary nebulae are the final blooming of Sun-like stars before their retirement as white dwarfs. This striking image of NGC 55, obtained with the Wide Field Imager on the 2.2-metre MPG/ESO telescope at La Silla, is dusted with a flurry of reddish nebulae, created by young, hot massive stars. Some of the more extended ones are not unlike those seen in the LMC, such as the Tarantula Nebula. The quality

  9. ROSAT Discovers Unique, Distant Cluster of Galaxies

    Science.gov (United States)

    1995-06-01

    Brightest X-ray Cluster Acts as Strong Gravitational Lens Based on exciting new data obtained with the ROSAT X-ray satellite and a ground-based telescope at the ESO La Silla Observatory, a team of European astronomers [2] has just discovered a very distant cluster of galaxies with unique properties. It emits the strongest X-ray emission of any cluster ever observed by ROSAT and is accompanied by two extraordinarily luminous arcs that represent the gravitationally deflected images of even more distant objects. The combination of these unusual characteristics makes this cluster, now known as RXJ1347.5-1145, a most interesting object for further cosmological studies. DISCOVERY AND FOLLOW-UP OBSERVATIONS This strange cluster of galaxies was discovered during the All Sky Survey with the ROSAT X-ray satellite as a moderately intense X-ray source in the constellation of Virgo. It could not be identified with any already known object and additional ground-based observations were therefore soon after performed with the Max-Planck-Society/ESO 2.2-metre telescope at the La Silla observatory in Chile. These observations took place within a large--scale redshift survey of X-ray clusters of galaxies detected by the ROSAT All Sky Survey, a so-called ``ESO Key Programme'' led by astronomers from the Max-Planck-Institut fur Extraterrestrische Physik and the Osservatorio Astronomico di Brera. The main aim of this programme is to identify cluster X-ray sources, to determine the distance to the X-ray emitting clusters and to investigate their overall properties. These observations permitted to measure the redshift of the RXJ1347.5-1145 cluster as z = 0.45, i.e. it moves away from us with a velocity (about 106,000 km/sec) equal to about one-third of the velocity of light. This is an effect of the general expansion of the universe and it allows to determine the distance as about 5,000 million light-years (assuming a Hubble constant of 75 km/sec/Mpc). In other words, we see these

  10. Noble Gas signatures of Enhanced Oil Recovery

    Science.gov (United States)

    Barry, P. H.; Kulongoski, J. T.; Tyne, R. L.; Hillegonds, D.; Byrne, D. J.; Landon, M. K.; Ballentine, C. J.

    2017-12-01

    Noble gases are powerful tracers of fluids from various oil and gas production activities in hydrocarbon reservoirs and nearby groundwater. Non-radiogenic noble gases are introduced into undisturbed oil and natural gas reservoirs through exchange with formation waters [1-3]. Reservoirs with extensive hydraulic fracturing, injection for enhanced oil recovery (EOR), and/or waste disposal also show evidence for a component of noble gases introduced from air [4]. Isotopic and elemental ratios of noble gases can be used to 1) assess the migration history of the injected and formation fluids, and 2) determine the extent of exchange between multiphase fluids in different reservoirs. We present noble gas isotope and abundance data from casing, separator and injectate gases of the Lost Hills and Fruitvale oil fields in the San Joaquin basin, California. Samples were collected as part of the California State Water Resource Control Board's Oil and Gas Regional Groundwater Monitoring Program. Lost Hills (n=7) and Fruitvale (n=2) gases are geochemically distinct and duplicate samples are highly reproducible. Lost Hills casing gas samples were collected from areas where EOR and hydraulic fracturing has occurred in the past several years, and from areas where EOR is absent. The Fruitvale samples were collected from a re-injection port. All samples are radiogenic in their He isotopes, typical of a crustal environment, and show enrichments in heavy noble gases, resulting from preferential adsorption on sediments. Fruitvale samples reflect air-like surface conditions, with higher air-derived noble gas concentrations. Lost Hills gases show a gradation from pristine crustal signatures - indicative of closed-system exchange with formation fluids - to strongly air-contaminated signatures in the EOR region. Pristine samples can be used to determine the extent of hydrocarbon exchange with fluids, whereas samples with excess air can be used to quantify the extent of EOR. Determining noble

  11. [Unique properties of highly radioresistant bacteria].

    Science.gov (United States)

    Romanovskaia, V A; Rokitko, P V; Malashenko, Iu R

    2000-01-01

    In connection with the Chernobyl Nuclear Power Plant (ChNPP) accident and the negative ecological after-effects for biota in this zone the interest has arisen to radioresistant bacteria, as to the most dynamic model of the given ecosystem, and to mechanisms which provide resistance of bacteria to ionizing radiation. The analysis of published data has shown that the radioresistant bacteria are not interrelated taxonomically and phylogenetically. The extreme radioresistant bacteria are represented by the Deinococcus species, which form a group phylogenetically close to the line Thermus-Meiothermus. Other radioresistant bacteria are the representatives of the genera Rubrobacter, Methylobacterium, Kocuria, Bacillus and some archebacteria. Data on natural habitats, of radioresistant bacteria are not numerous. In a number of cases it is difficult to distinguish their natural habitats, as they were isolated from the samples which were previously exposed to X-ray or gamma-irradiation, or from the ecosystems with the naturally raised radioactivity. To understand the strategy of survival of radioresistant bacteria, we briefly reviewed the mechanism of action of various species of radiation on cells and macromolecules; physiological signs of the cell damage caused by radiation; mechanisms eliminating (repairing) these damages. More details on mechanisms of the DNA repair in D. radiodurans are described. The extreme resistance of D. radiodurans to the DNA damaging factors is defined by 1) repair mechanisms which fundamentally differ from those in other procaryotes; 2) ability to increase the efficiency of a standard set of the DNA repairing proteins. Literary and own data on the effect of radiation on survival of various groups of bacteria in natural ecosystems are summarized. The ecological consequences of the ChNPP accident for soil bacteria in this region were estimated. The reduction of the number of soil bacteria and recession of microbial diversity under the effect of

  12. Polarization Signatures of Kink Instabilities in the Blazar Emission Region from Relativistic Magnetohydrodynamic Simulations

    International Nuclear Information System (INIS)

    Zhang, Haocheng; Taylor, Greg; Li, Hui; Guo, Fan

    2017-01-01

    Kink instabilities are likely to occur in the current-carrying magnetized plasma jets. Recent observations of the blazar radiation and polarization signatures suggest that the blazar emission region may be considerably magnetized. While the kink instability has been studied with first-principle magnetohydrodynamic (MHD) simulations, the corresponding time-dependent radiation and polarization signatures have not been investigated. In this paper, we perform comprehensive polarization-dependent radiation modeling of the kink instability in the blazar emission region based on relativistic MHD (RMHD) simulations. We find that the kink instability may give rise to strong flares with polarization angle (PA) swings or weak flares with polarization fluctuations, depending on the initial magnetic topology and magnetization. These findings are consistent with observations. Compared with the shock model, the kink model generates polarization signatures that are in better agreement with the general polarization observations. Therefore, we suggest that kink instabilities may widely exist in the jet environment and provide an efficient way to convert the magnetic energy and produce multiwavelength flares and polarization variations.

  13. Polarization Signatures of Kink Instabilities in the Blazar Emission Region from Relativistic Magnetohydrodynamic Simulations

    Energy Technology Data Exchange (ETDEWEB)

    Zhang, Haocheng; Taylor, Greg [Department of Physics and Astronomy, University of New Mexico, Albuquerque, NM 87131 (United States); Li, Hui; Guo, Fan [Theoretical Division, Los Alamos National Laboratory, Los Alamos, NM 87545 (United States)

    2017-02-01

    Kink instabilities are likely to occur in the current-carrying magnetized plasma jets. Recent observations of the blazar radiation and polarization signatures suggest that the blazar emission region may be considerably magnetized. While the kink instability has been studied with first-principle magnetohydrodynamic (MHD) simulations, the corresponding time-dependent radiation and polarization signatures have not been investigated. In this paper, we perform comprehensive polarization-dependent radiation modeling of the kink instability in the blazar emission region based on relativistic MHD (RMHD) simulations. We find that the kink instability may give rise to strong flares with polarization angle (PA) swings or weak flares with polarization fluctuations, depending on the initial magnetic topology and magnetization. These findings are consistent with observations. Compared with the shock model, the kink model generates polarization signatures that are in better agreement with the general polarization observations. Therefore, we suggest that kink instabilities may widely exist in the jet environment and provide an efficient way to convert the magnetic energy and produce multiwavelength flares and polarization variations.

  14. Feasibility of N-Gram Data-Structures for Next-Generation Pathogen Signature Design

    Energy Technology Data Exchange (ETDEWEB)

    Gardner, S N

    2009-01-26

    We determined the most appropriate data structure for handling n-gram (also known as k-mer) string comparisons and storage for genomic sequence data that will scale in terms of memory and speed. This is critical to maintain LLNL as the leader in pathogen detection, as it will guide the design of the 'Next Generation' system for computational signature prediction. There are two parts to k-mer analysis for signature prediction that we investigated. First is the enumeration and frequency counting of all observed k-mers in a sequence database (k-mer is a biological term equivalent to the CS term n-gram). Second is the down-selection and pairing of k-mers to generate a signature. We determined that for the first part, suffix arrays are the preferred method to enumerate k-mers, being memory efficient and relatively easy and fast to compute. For the second part, a subset of the k-mers can be stored and manipulated in a hash, that subset determination based on desired frequency characteristics such as most/least frequent from a set, shared among sequence sets, or discriminating across sequence sets.

  15. Novel criteria of uniqueness for signal reconstruction from phase

    NARCIS (Netherlands)

    Ma, C.

    1991-01-01

    An approach for ascertaining whether a signal is uniquely determined by its Fourier transform phase is proposed. It is shown that uniqueness corresponds to the nonsingularity of a matrix which can be formed from the finite-length real sequence. The criterion of uniqueness for reconstructing a

  16. Signature change events: a challenge for quantum gravity?

    International Nuclear Information System (INIS)

    White, Angela; Weinfurtner, Silke; Visser, Matt

    2010-01-01

    Within the framework of either Euclidean (functional integral) quantum gravity or canonical general relativity the signature of the manifold is a priori unconstrained. Furthermore, recent developments in the emergent spacetime programme have led to a physically feasible implementation of (analogue) signature change events. This suggests that it is time to revisit the sometimes controversial topic of signature change in general relativity. Specifically, we shall focus on the behaviour of a quantum field defined on a manifold containing regions of different signature. We emphasize that regardless of the underlying classical theory, there are severe problems associated with any quantum field theory residing on a signature-changing background. (Such as the production of what is naively an infinite number of particles, with an infinite energy density.) We show how the problem of quantum fields exposed to finite regions of Euclidean-signature (Riemannian) geometry has similarities with the quantum barrier penetration problem. Finally we raise the question as to whether signature change transitions could be fully understood and dynamically generated within (modified) classical general relativity, or whether they require the knowledge of a theory of quantum gravity.

  17. Forged Signature Distinction Using Convolutional Neural Network for Feature Extraction

    Directory of Open Access Journals (Sweden)

    Seungsoo Nam

    2018-01-01

    Full Text Available This paper proposes a dynamic verification scheme for finger-drawn signatures in smartphones. As a dynamic feature, the movement of a smartphone is recorded with accelerometer sensors in the smartphone, in addition to the moving coordinates of the signature. To extract high-level longitudinal and topological features, the proposed scheme uses a convolution neural network (CNN for feature extraction, and not as a conventional classifier. We assume that a CNN trained with forged signatures can extract effective features (called S-vector, which are common in forging activities such as hesitation and delay before drawing the complicated part. The proposed scheme also exploits an autoencoder (AE as a classifier, and the S-vector is used as the input vector to the AE. An AE has high accuracy for the one-class distinction problem such as signature verification, and is also greatly dependent on the accuracy of input data. S-vector is valuable as the input of AE, and, consequently, could lead to improved verification accuracy especially for distinguishing forged signatures. Compared to the previous work, i.e., the MLP-based finger-drawn signature verification scheme, the proposed scheme decreases the equal error rate by 13.7%, specifically, from 18.1% to 4.4%, for discriminating forged signatures.

  18. Modeling the lexical morphology of Western handwritten signatures.

    Directory of Open Access Journals (Sweden)

    Moises Diaz-Cabrera

    Full Text Available A handwritten signature is the final response to a complex cognitive and neuromuscular process which is the result of the learning process. Because of the many factors involved in signing, it is possible to study the signature from many points of view: graphologists, forensic experts, neurologists and computer vision experts have all examined them. Researchers study written signatures for psychiatric, penal, health and automatic verification purposes. As a potentially useful, multi-purpose study, this paper is focused on the lexical morphology of handwritten signatures. This we understand to mean the identification, analysis, and description of the signature structures of a given signer. In this work we analyze different public datasets involving 1533 signers from different Western geographical areas. Some relevant characteristics of signature lexical morphology have been selected, examined in terms of their probability distribution functions and modeled through a General Extreme Value distribution. This study suggests some useful models for multi-disciplinary sciences which depend on handwriting signatures.

  19. Server-Aided Verification Signature with Privacy for Mobile Computing

    Directory of Open Access Journals (Sweden)

    Lingling Xu

    2015-01-01

    Full Text Available With the development of wireless technology, much data communication and processing has been conducted in mobile devices with wireless connection. As we know that the mobile devices will always be resource-poor relative to static ones though they will improve in absolute ability, therefore, they cannot process some expensive computational tasks due to the constrained computational resources. According to this problem, server-aided computing has been studied in which the power-constrained mobile devices can outsource some expensive computation to a server with powerful resources in order to reduce their computational load. However, in existing server-aided verification signature schemes, the server can learn some information about the message-signature pair to be verified, which is undesirable especially when the message includes some secret information. In this paper, we mainly study the server-aided verification signatures with privacy in which the message-signature pair to be verified can be protected from the server. Two definitions of privacy for server-aided verification signatures are presented under collusion attacks between the server and the signer. Then based on existing signatures, two concrete server-aided verification signature schemes with privacy are proposed which are both proved secure.

  20. Starry messages: Searching for signatures of interstellar archaeology

    Energy Technology Data Exchange (ETDEWEB)

    Carrigan, Richard A., Jr.; /Fermilab

    2009-12-01

    Searching for signatures of cosmic-scale archaeological artifacts such as Dyson spheres or Kardashev civilizations is an interesting alternative to conventional SETI. Uncovering such an artifact does not require the intentional transmission of a signal on the part of the original civilization. This type of search is called interstellar archaeology or sometimes cosmic archaeology. The detection of intelligence elsewhere in the Universe with interstellar archaeology or SETI would have broad implications for science. For example, the constraints of the anthropic principle would have to be loosened if a different type of intelligence was discovered elsewhere. A variety of interstellar archaeology signatures are discussed including non-natural planetary atmospheric constituents, stellar doping with isotopes of nuclear wastes, Dyson spheres, as well as signatures of stellar and galactic-scale engineering. The concept of a Fermi bubble due to interstellar migration is introduced in the discussion of galactic signatures. These potential interstellar archaeological signatures are classified using the Kardashev scale. A modified Drake equation is used to evaluate the relative challenges of finding various sources. With few exceptions interstellar archaeological signatures are clouded and beyond current technological capabilities. However SETI for so-called cultural transmissions and planetary atmosphere signatures are within reach.