WorldWideScience

Sample records for encode key components

  1. Key management of the double random-phase-encoding method using public-key encryption

    Science.gov (United States)

    Saini, Nirmala; Sinha, Aloka

    2010-03-01

    Public-key encryption has been used to encode the key of the encryption process. In the proposed technique, an input image has been encrypted by using the double random-phase-encoding method using extended fractional Fourier transform. The key of the encryption process have been encoded by using the Rivest-Shamir-Adelman (RSA) public-key encryption algorithm. The encoded key has then been transmitted to the receiver side along with the encrypted image. In the decryption process, first the encoded key has been decrypted using the secret key and then the encrypted image has been decrypted by using the retrieved key parameters. The proposed technique has advantage over double random-phase-encoding method because the problem associated with the transmission of the key has been eliminated by using public-key encryption. Computer simulation has been carried out to validate the proposed technique.

  2. Encoding plaintext by Fourier transform hologram in double random phase encoding using fingerprint keys

    Science.gov (United States)

    Takeda, Masafumi; Nakano, Kazuya; Suzuki, Hiroyuki; Yamaguchi, Masahiro

    2012-09-01

    It has been shown that biometric information can be used as a cipher key for binary data encryption by applying double random phase encoding. In such methods, binary data are encoded in a bit pattern image, and the decrypted image becomes a plain image when the key is genuine; otherwise, decrypted images become random images. In some cases, images decrypted by imposters may not be fully random, such that the blurred bit pattern can be partially observed. In this paper, we propose a novel bit coding method based on a Fourier transform hologram, which makes images decrypted by imposters more random. Computer experiments confirm that the method increases the randomness of images decrypted by imposters while keeping the false rejection rate as low as in the conventional method.

  3. Encoding plaintext by Fourier transform hologram in double random phase encoding using fingerprint keys

    International Nuclear Information System (INIS)

    Takeda, Masafumi; Nakano, Kazuya; Suzuki, Hiroyuki; Yamaguchi, Masahiro

    2012-01-01

    It has been shown that biometric information can be used as a cipher key for binary data encryption by applying double random phase encoding. In such methods, binary data are encoded in a bit pattern image, and the decrypted image becomes a plain image when the key is genuine; otherwise, decrypted images become random images. In some cases, images decrypted by imposters may not be fully random, such that the blurred bit pattern can be partially observed. In this paper, we propose a novel bit coding method based on a Fourier transform hologram, which makes images decrypted by imposters more random. Computer experiments confirm that the method increases the randomness of images decrypted by imposters while keeping the false rejection rate as low as in the conventional method. (paper)

  4. A SSVEP Stimuli Encoding Method Using Trinary Frequency-Shift Keying Encoded SSVEP (TFSK-SSVEP

    Directory of Open Access Journals (Sweden)

    Xing Zhao

    2017-06-01

    Full Text Available SSVEP is a kind of BCI technology with advantage of high information transfer rate. However, due to its nature, frequencies could be used as stimuli are scarce. To solve such problem, a stimuli encoding method which encodes SSVEP signal using Frequency Shift–Keying (FSK method is developed. In this method, each stimulus is controlled by a FSK signal which contains three different frequencies that represent “Bit 0,” “Bit 1” and “Bit 2” respectively. Different to common BFSK in digital communication, “Bit 0” and “Bit 1” composited the unique identifier of stimuli in binary bit stream form, while “Bit 2” indicates the ending of a stimuli encoding. EEG signal is acquired on channel Oz, O1, O2, Pz, P3, and P4, using ADS1299 at the sample rate of 250 SPS. Before original EEG signal is quadrature demodulated, it is detrended and then band-pass filtered using FFT-based FIR filtering to remove interference. Valid peak of the processed signal is acquired by calculating its derivative and converted into bit stream using window method. Theoretically, this coding method could implement at least 2n−1 (n is the length of bit command stimulus while keeping the ITR the same. This method is suitable to implement stimuli on a monitor and where the frequency and phase could be used to code stimuli is limited as well as implementing portable BCI devices which is not capable of performing complex calculations.

  5. Characterization of Genes Encoding Key Enzymes Involved in Anthocyanin Metabolism of Kiwifruit during Storage Period.

    Science.gov (United States)

    Li, Boqiang; Xia, Yongxiu; Wang, Yuying; Qin, Guozheng; Tian, Shiping

    2017-01-01

    'Hongyang' is a red fleshed kiwifruit with high anthocyanin content. In this study, we mainly investigated effects of different temperatures (25 and 0°C) on anthocyanin biosynthesis in harvested kiwifruit, and characterized the genes encoding key enzymes involved in anthocyanin metabolism, as well as evaluated the mode of the action, by which low temperature regulates anthocyanin accumulation in 'Hongyang' kiwifruit during storage period. The results showed that low temperature could effectively enhance the anthocyanin accumulation of kiwifruit in the end of storage period (90 days), which related to the increase in mRNA levels of ANS1, ANS2, DRF1, DRF2 , and UGFT2 . Moreover, the transcript abundance of MYBA1-1 and MYB5-1 , the genes encoding an important component of MYB-bHLH-WD40 (MBW) complex, was up-regulated, possibly contributing to the induction of specific anthocyanin biosynthesis genes under the low temperature. To further investigate the roles of AcMYB5-1/5-2/A1-1 in regulation of anthocyanin biosynthesis, genes encoding the three transcription factors were transiently transformed in Nicotiana benthamiana leaves. Overexpression of AcMYB5-1/5-2/A1-1 activated the gene expression of NtANS and NtDFR in tobacco. Our results suggested that low temperature storage could stimulate the anthocyanin accumulation in harvested kiwifruit via regulating several structural and regulatory genes involved in anthocyanin biosynthesis.

  6. An optimized encoding method for secure key distribution by swapping quantum entanglement and its extension

    International Nuclear Information System (INIS)

    Gao Gan

    2015-01-01

    Song [Song D 2004 Phys. Rev. A 69 034301] first proposed two key distribution schemes with the symmetry feature. We find that, in the schemes, the private channels which Alice and Bob publicly announce the initial Bell state or the measurement result through are not needed in discovering keys, and Song’s encoding methods do not arrive at the optimization. Here, an optimized encoding method is given so that the efficiencies of Song’s schemes are improved by 7/3 times. Interestingly, this optimized encoding method can be extended to the key distribution scheme composed of generalized Bell states. (paper)

  7. A key component of the Globe arrives

    CERN Multimedia

    2003-01-01

    The first component of the Palais de l'Equilibre arrived at CERN last week. Renamed the Globe of Innovation, this elegant wooden sphere will be inaugurated in October 2004. The convoy transporting the first component of the Palais de l'Equilibre, the keystone of the famous wooden globe, arrived at CERN on the night of 28th August in the middle of a violent storm and dramatic flashes of lightning. Erected in Neuchâtel last year for the EXPO.02 exhibition, the Palais de l'Equilibre was a gift to the Laboratory from the Swiss Confederation (see Bulletin 25/2003). The gift of the structure and 4 million Swiss francs, together with help from the Swiss army for the reassembly work, received the final approval of the Swiss Federal Council on 20th August 2003. Renamed the Globe of Innovation, the 27-metre-high sphere measuring 40 metres in diameter will house the Laboratory's new exhibition centre in 2005. The keystone, known as the "central vertex", is a crown measuring 6.5 m in diameter and 4.5 m high, located a...

  8. Design alternatives, components key to optimum flares

    International Nuclear Information System (INIS)

    Cunha-Leite, O.

    1992-01-01

    A properly designed flare works as an emissions control system with greater than 98% combustion efficiency. The appropriate use of steam, natural gas, and air-assisted flare tips can result in smokeless combustion. Ground flare, otherwise the elevated flare is commonly chosen because it handles larger flow releases more economically. Flaring has become more complicated than just lighting up waste gas. Companies are increasingly concerned about efficiency. In addition, U.S. Occupational Safety and Health Administration (OSHA) and U.S. Environmental Protection Agency (EPA) have become more active, resulting in tighter regulations on both safety and emissions control. These regulations have resulted in higher levels of concern and involvement in safety and emissions matters, not to mention smoke, noise, glare, and odor. This first to two articles on flare design and components looks at elevated flares, flare tips, incinerator-type flares, flare pilots, and gas seals. Part 2 will examine knockout drums, liquid-seal drums, ignition systems, ground flares, vapor recovery systems, and flare noise

  9. Biometrics based key management of double random phase encoding scheme using error control codes

    Science.gov (United States)

    Saini, Nirmala; Sinha, Aloka

    2013-08-01

    In this paper, an optical security system has been proposed in which key of the double random phase encoding technique is linked to the biometrics of the user to make it user specific. The error in recognition due to the biometric variation is corrected by encoding the key using the BCH code. A user specific shuffling key is used to increase the separation between genuine and impostor Hamming distance distribution. This shuffling key is then further secured using the RSA public key encryption to enhance the security of the system. XOR operation is performed between the encoded key and the feature vector obtained from the biometrics. The RSA encoded shuffling key and the data obtained from the XOR operation are stored into a token. The main advantage of the present technique is that the key retrieval is possible only in the simultaneous presence of the token and the biometrics of the user which not only authenticates the presence of the original input but also secures the key of the system. Computational experiments showed the effectiveness of the proposed technique for key retrieval in the decryption process by using the live biometrics of the user.

  10. Phase-encoded measurement device independent quantum key distribution without a shared reference frame

    Science.gov (United States)

    Zhuo-Dan, Zhu; Shang-Hong, Zhao; Chen, Dong; Ying, Sun

    2018-07-01

    In this paper, a phase-encoded measurement device independent quantum key distribution (MDI-QKD) protocol without a shared reference frame is presented, which can generate secure keys between two parties while the quantum channel or interferometer introduces an unknown and slowly time-varying phase. The corresponding secret key rate and single photons bit error rate is analysed, respectively, with single photons source (SPS) and weak coherent source (WCS), taking finite-key analysis into account. The numerical simulations show that the modified phase-encoded MDI-QKD protocol has apparent superiority both in maximal secure transmission distance and key generation rate while possessing the improved robustness and practical security in the high-speed case. Moreover, the rejection of the frame-calibrating part will intrinsically reduce the consumption of resources as well as the potential security flaws of practical MDI-QKD systems.

  11. Information verification cryptosystem using one-time keys based on double random phase encoding and public-key cryptography

    Science.gov (United States)

    Zhao, Tieyu; Ran, Qiwen; Yuan, Lin; Chi, Yingying; Ma, Jing

    2016-08-01

    A novel image encryption system based on double random phase encoding (DRPE) and RSA public-key algorithm is proposed. The main characteristic of the system is that each encryption process produces a new decryption key (even for the same plaintext), thus the encryption system conforms to the feature of the one-time pad (OTP) cryptography. The other characteristic of the system is the use of fingerprint key. Only with the rightful authorization will the true decryption be obtained, otherwise the decryption will result in noisy images. So the proposed system can be used to determine whether the ciphertext is falsified by attackers. In addition, the system conforms to the basic agreement of asymmetric cryptosystem (ACS) due to the combination with the RSA public-key algorithm. The simulation results show that the encryption scheme has high robustness against the existing attacks.

  12. Quantum key distribution using basis encoding of Gaussian-modulated coherent states

    Science.gov (United States)

    Huang, Peng; Huang, Jingzheng; Zhang, Zheshen; Zeng, Guihua

    2018-04-01

    The continuous-variable quantum key distribution (CVQKD) has been demonstrated to be available in practical secure quantum cryptography. However, its performance is restricted strongly by the channel excess noise and the reconciliation efficiency. In this paper, we present a quantum key distribution (QKD) protocol by encoding the secret keys on the random choices of two measurement bases: the conjugate quadratures X and P . The employed encoding method can dramatically weaken the effects of channel excess noise and reconciliation efficiency on the performance of the QKD protocol. Subsequently, the proposed scheme exhibits the capability to tolerate much higher excess noise and enables us to reach a much longer secure transmission distance even at lower reconciliation efficiency. The proposal can work alternatively to strengthen significantly the performance of the known Gaussian-modulated CVQKD protocol and serve as a multiplier for practical secure quantum cryptography with continuous variables.

  13. Key components of financial-analysis education for clinical nurses.

    Science.gov (United States)

    Lim, Ji Young; Noh, Wonjung

    2015-09-01

    In this study, we identified key components of financial-analysis education for clinical nurses. We used a literature review, focus group discussions, and a content validity index survey to develop key components of financial-analysis education. First, a wide range of references were reviewed, and 55 financial-analysis education components were gathered. Second, two focus group discussions were performed; the participants were 11 nurses who had worked for more than 3 years in a hospital, and nine components were agreed upon. Third, 12 professionals, including professors, nurse executive, nurse managers, and an accountant, participated in the content validity index. Finally, six key components of financial-analysis education were selected. These key components were as follows: understanding the need for financial analysis, introduction to financial analysis, reading and implementing balance sheets, reading and implementing income statements, understanding the concepts of financial ratios, and interpretation and practice of financial ratio analysis. The results of this study will be used to develop an education program to increase financial-management competency among clinical nurses. © 2015 Wiley Publishing Asia Pty Ltd.

  14. Characterization of Genes Encoding Key Enzymes Involved in Anthocyanin Metabolism of Kiwifruit during Storage Period

    OpenAIRE

    Li, Boqiang; Xia, Yongxiu; Wang, Yuying; Qin, Guozheng; Tian, Shiping

    2017-01-01

    ‘Hongyang’ is a red fleshed kiwifruit with high anthocyanin content. In this study, we mainly investigated effects of different temperatures (25 and 0°C) on anthocyanin biosynthesis in harvested kiwifruit, and characterized the genes encoding key enzymes involved in anthocyanin metabolism, as well as evaluated the mode of the action, by which low temperature regulates anthocyanin accumulation in ‘Hongyang’ kiwifruit during storage period. The results showed that low temperature could effectiv...

  15. Information hiding based on double random-phase encoding and public-key cryptography.

    Science.gov (United States)

    Sheng, Yuan; Xin, Zhou; Alam, Mohammed S; Xi, Lu; Xiao-Feng, Li

    2009-03-02

    A novel information hiding method based on double random-phase encoding (DRPE) and Rivest-Shamir-Adleman (RSA) public-key cryptosystem is proposed. In the proposed technique, the inherent diffusion property of DRPE is cleverly utilized to make up the diffusion insufficiency of RSA public-key cryptography, while the RSA cryptosystem is utilized for simultaneous transmission of the cipher text and the two phase-masks, which is not possible under the DRPE technique. This technique combines the complementary advantages of the DPRE and RSA encryption techniques and brings security and convenience for efficient information transmission. Extensive numerical simulation results are presented to verify the performance of the proposed technique.

  16. Gas centrifuge power supplies (inverters): Key components and subassemblies

    International Nuclear Information System (INIS)

    1987-08-01

    This document was prepared to serve as a guide for export control officials in their interpretation, understanding, and implementation of exports laws that relate to the international trigger list entry for gas centrifuge power supplies (also known as frequency changers, convertors, or inverters) and parts, components, and subassemblies of such power supplies. Particular emphasis is placed on descriptions of the key parts, components, and subassemblies of such power supplies, which were previously unspecified, so as to clarify the intent of the international trigger list entry

  17. Collaborative Encoding and Memory Accuracy: Examining the Effects of Interactive Components of Co-Construction Processes

    Science.gov (United States)

    Foley, Mary Ann; Fried, Adina Rachel; Cowan, Emily; Bays, Rebecca Brooke

    2014-01-01

    In 2 experiments, the effect of collaborative encoding on memory was examined by testing 2 interactive components of co-construction processes. One component focused on the nature of the interactive exchange between collaborators: As the partners worked together to create descriptions about ways to interact with familiar objects, constraints were…

  18. WRKY Transcription Factors: Key Components in Abscisic Acid Signaling

    Science.gov (United States)

    2011-01-01

    networks that take inputs from numerous stimuli and that they are involved in mediating responses to numerous phytohormones including salicylic acid ... jasmonic acid , ABA and GA. These roles in multiple signalling pathways may in turn partly explain the pleiotropic effects commonly seen when TF genes are...Review article WRKY transcription factors: key components in abscisic acid signalling Deena L. Rushton1, Prateek Tripathi1, Roel C. Rabara1, Jun Lin1

  19. A new two-code keying scheme for SAC-OCDMA systems enabling bipolar encoding

    Science.gov (United States)

    Al-Khafaji, Hamza M. R.; Ngah, Razali; Aljunid, S. A.; Rahman, T. A.

    2015-03-01

    In this paper, we propose a new two-code keying scheme for enabling bipolar encoding in a high-rate spectral-amplitude coding optical code-division multiple-access (SAC-OCDMA) system. The mathematical formulations are derived for the signal-to-noise ratio and bit-error rate (BER) of SAC-OCDMA system based on the suggested scheme using multi-diagonal (MD) code. Performance analyses are assessed considering the effects of phase-induced intensity noise, as well as shot and thermal noises in photodetectors. The numerical results demonstrated that the proposed scheme exhibits an enhanced BER performance compared to the existing unipolar encoding with direct detection technique. Furthermore, the performance improvement afforded by this scheme is verified using simulation experiments.

  20. Development of commercial hybrid electric vehicle with native key components

    Directory of Open Access Journals (Sweden)

    S. V. Bakhmutov

    2014-01-01

    Full Text Available The perspectives of development of medium weight cargo vehicles with hybrid powertrain including Russian native key components are considered in this article. Series-parallel scheme of HEV is more relevant owing to limitations of series and parallel schemes. An example of this technology is described. This technical solution has good facilities for variation of HEV and AWD type. The authors have patented it. In addition, another main issue is to choose the types of key components with good correlation for parameters of ICE, electric motors, batteries, and inverter. Using mathematical model of the vehicle a selection and correlation of technical characteristics were carried out to meet ecological and economical requirements. After computing calculation two control strategies were accepted. The first strategy contributes to good fuel consumption, while the other one is aimed at ecology. Researchers use test benches to confirm the results of calculation, and this one was built by the authors applying native components. The result of experiment on the test bench is the growth of fuel consumption of the medium weight cargo vehicle by 25% and compliance with ecological class Euro-4.

  1. A simple component-connection method for building binary decision diagrams encoding a fault tree

    International Nuclear Information System (INIS)

    Way, Y.-S.; Hsia, D.-Y.

    2000-01-01

    A simple new method for building binary decision diagrams (BDDs) encoding a fault tree (FT) is provided in this study. We first decompose the FT into FT-components. Each of them is a single descendant (SD) gate-sequence. Following the node-connection rule, the BDD-component encoding an SD FT-component can each be found to be an SD node-sequence. By successively connecting the BDD-components one by one, the BDD for the entire FT is thus obtained. During the node-connection and component-connection, reduction rules might need to be applied. An example FT is used throughout the article to explain the procedure step by step. Our method proposed is a hybrid one for FT analysis. Some algorithms or techniques used in the conventional FT analysis or the newer BDD approach may be applied to our case; our ideas mentioned in the article might be referred by the two methods

  2. Renewable: A key component of our global energy future

    Energy Technology Data Exchange (ETDEWEB)

    Hartley, D.

    1995-12-31

    Inclusion of renewable energy sources in national and international energy strategies is a key component of a viable global energy future. The global energy balance is going to shift radically in the near future brought about by significant increases in population in China and India, and increases in the energy intensity of developing countries. To better understand the consequences of such global shifts in energy requirements and to develop appropriate energy strategies to respond to these shifts, we need to look at the factors driving choices among supply options by geopolitical consumers and the impact these factors can have on the future energy mix.

  3. Electric vehicle recycling 2020: Key component power electronics.

    Science.gov (United States)

    Bulach, Winfried; Schüler, Doris; Sellin, Guido; Elwert, Tobias; Schmid, Dieter; Goldmann, Daniel; Buchert, Matthias; Kammer, Ulrich

    2018-04-01

    Electromobility will play a key role in order to reach the specified ambitious greenhouse gas reduction targets in the German transport sector of 42% between 1990 and 2030. Subsequently, a significant rise in the sale of electric vehicles (EVs) is to be anticipated in future. The amount of EVs to be recycled will rise correspondingly after a delay. This includes the recyclable power electronics modules which are incorporated in every EV as an important component for energy management. Current recycling methods using car shredders and subsequent post shredder technologies show high recycling rates for the bulk metals but are still associated with high losses of precious and strategic metals such as gold, silver, platinum, palladium and tantalum. For this reason, the project 'Electric vehicle recycling 2020 - key component power electronics' developed an optimised recycling route for recycling power electronics modules from EVs which is also practicable in series production and can be implemented using standardised technology. This 'WEEE recycling route' involves the disassembly of the power electronics from the vehicle and a subsequent recycling in an electronic end-of-life equipment recycling plant. The developed recycling process is economical under the current conditions and raw material prices, even though it involves considerably higher costs than recycling using the car shredder. The life cycle assessment shows basically good results, both for the traditional car shredder route and the developed WEEE recycling route: the latter provides additional benefits from some higher recovery rates and corresponding credits.

  4. Anomaly Monitoring Method for Key Components of Satellite

    Directory of Open Access Journals (Sweden)

    Jian Peng

    2014-01-01

    Full Text Available This paper presented a fault diagnosis method for key components of satellite, called Anomaly Monitoring Method (AMM, which is made up of state estimation based on Multivariate State Estimation Techniques (MSET and anomaly detection based on Sequential Probability Ratio Test (SPRT. On the basis of analysis failure of lithium-ion batteries (LIBs, we divided the failure of LIBs into internal failure, external failure, and thermal runaway and selected electrolyte resistance (Re and the charge transfer resistance (Rct as the key parameters of state estimation. Then, through the actual in-orbit telemetry data of the key parameters of LIBs, we obtained the actual residual value (RX and healthy residual value (RL of LIBs based on the state estimation of MSET, and then, through the residual values (RX and RL of LIBs, we detected the anomaly states based on the anomaly detection of SPRT. Lastly, we conducted an example of AMM for LIBs, and, according to the results of AMM, we validated the feasibility and effectiveness of AMM by comparing it with the results of threshold detective method (TDM.

  5. Legislation on violence against women: overview of key components.

    Science.gov (United States)

    Ortiz-Barreda, Gaby; Vives-Cases, Carmen

    2013-01-01

    This study aimed to determine if legislation on violence against women (VAW) worldwide contains key components recommended by the Pan American Health Organization (PAHO) and the United Nations (UN) to help strengthen VAW prevention and provide better integrated victim protection, support, and care. A systematic search for VAW legislation using international legal databases and other electronic sources plus data from previous research identified 124 countries/territories with some type of VAW legislation. Full legal texts were found for legislation from 104 countries/territories. Those available in English, Portuguese, and Spanish were downloaded and compiled and the selection criteria applied (use of any of the common terms related to VAW, including intimate partner violence (IPV), and reference to at least two of six sectors (education, health, judicial system, mass media, police, and social services) with regard to VAW interventions (protection, support, and care). A final sample from 80 countries/territories was selected and analyzed for the presence of key components recommended by PAHO and the UN (reference to the term "violence against women" in the title; definitions of different types of VAW; identification of women as beneficiaries; and promotion of (reference to) the participation of multiple sectors in VAW interventions). Few countries/territories specifically identified women as the beneficiaries of their VAW legislation, including those that labeled their legislation "domestic violence" law ( n = 51), of which only two explicitly mentioned women as complainants/survivors. Only 28 countries/territories defined the main forms of VAW (economic, physical, psychological, and sexual) in their VAW legislation. Most highlighted the role of the judicial system, followed by that of social services and the police. Only 28 mentioned the health sector. Despite considerable efforts worldwide to strengthen VAW legislation, most VAW laws do not incorporate the key

  6. The Candida albicans-specific gene EED1 encodes a key regulator of hyphal extension.

    LENUS (Irish Health Repository)

    Martin, Ronny

    2011-04-01

    The extension of germ tubes into elongated hyphae by Candida albicans is essential for damage of host cells. The C. albicans-specific gene EED1 plays a crucial role in this extension and maintenance of filamentous growth. eed1Δ cells failed to extend germ tubes into long filaments and switched back to yeast growth after 3 h of incubation during growth on plastic surfaces. Expression of EED1 is regulated by the transcription factor Efg1 and ectopic overexpression of EED1 restored filamentation in efg1Δ. Transcriptional profiling of eed1Δ during infection of oral tissue revealed down-regulation of hyphal associated genes including UME6, encoding another key transcriptional factor. Ectopic overexpression of EED1 or UME6 rescued filamentation and damage potential in eed1Δ. Transcriptional profiling during overexpression of UME6 identified subsets of genes regulated by Eed1 or Ume6. These data suggest that Eed1 and Ume6 act in a pathway regulating maintenance of hyphal growth thereby repressing hyphal-to-yeast transition and permitting dissemination of C. albicans within epithelial tissues.

  7. Multi-level and Multi-component Bitmap Encoding for Efficient Search Operations

    Directory of Open Access Journals (Sweden)

    Madhu BHAN, Department of Computer Applications

    2012-12-01

    Full Text Available The growing interest in data warehousing for decision makers is becoming more and more crucial to make faster and efficient decisions. On-line decision needs short response times. Many indexing techniques have been created to achieve this goal in read only environments. Indexing technique that has attracted attention in multidimensional databases is Bitmap Indexing. The paper discusses the various existing bitmap indexing techniques along with their performance characteristics. The paper proposes two new bitmap indexing techniques in the class of multi-level and multi-component encoding schemes and prove that the two techniques have better space–time performance than some of the existing techniques used for range queries. We provide an analytical model for comparing the performance of our proposed encoding schemes with that of the existing ones.

  8. Encoding mutually unbiased bases in orbital angular momentum for quantum key distribution

    CSIR Research Space (South Africa)

    Dudley, Angela L

    2013-07-01

    Full Text Available We encode mutually unbiased bases (MUBs) using the higher-dimensional orbital angular momentum (OAM) degree of freedom associated with optical fields. We illustrate how these states are encoded with the use of a spatial light modulator (SLM). We...

  9. Argo workstation: a key component of operational oceanography

    Science.gov (United States)

    Dong, Mingmei; Xu, Shanshan; Miao, Qingsheng; Yue, Xinyang; Lu, Jiawei; Yang, Yang

    2018-02-01

    Operational oceanography requires the quantity, quality, and availability of data set and the timeliness and effectiveness of data products. Without steady and strong operational system supporting, operational oceanography will never be proceeded far. In this paper we describe an integrated platform named Argo Workstation. It operates as a data processing and management system, capable of data collection, automatic data quality control, visualized data check, statistical data search and data service. After it is set up, Argo workstation provides global high quality Argo data to users every day timely and effectively. It has not only played a key role in operational oceanography but also set up an example for operational system.

  10. Polarization states encoded by phase modulation for high bit rate quantum key distribution

    International Nuclear Information System (INIS)

    Liu Xiaobao; Tang Zhilie; Liao Changjun; Lu Yiqun; Zhao Feng; Liu Songhao

    2006-01-01

    We present implementation of quantum cryptography with polarization code by wave-guide type phase modulator. At four different low input voltages of the phase modulator, coder encodes pulses into four different polarization states, 45 o , 135 o linearly polarized or right, left circle polarized, while the decoder serves as the complementary polarizers

  11. Water management as a key component of integrated weed management

    Directory of Open Access Journals (Sweden)

    Antonio Berti

    2010-09-01

    Full Text Available Water management within the cropping system is a key factor for an integrated weed management. Soil moisture affects seed persistence and seed dormancy, thus influencing their germination, the establishment of seedlings as well as the competition at adult stage and the number, vitality and dormancy of the new seeds produced by the weeds. The interactions among water availability and competition are very complex and still not fully understood. A research effort in this sector should the be very relevant for the development of new approaches of weed management, such as “Ecological weed management”, aiming to reduce weed density and competitiveness and, in the medium term, to prevent undesired modifications of the weed flora.

  12. Smart as a Key Component of the Sustainable City Development

    Directory of Open Access Journals (Sweden)

    Tomas Zelinka

    2016-10-01

    Full Text Available Smart City Initiatives are aiming on creation of a sustainable model for cities with the aim to improve quality of life of their citizens. A smart city represents an interdisciplinary field requiring high level of cooperation among experts from different fields and a contribution of the latest technologies in order to achieve the best results in the city's key areas. Such approach requires an effective cooperation across many fields, from technical or economic through legislation to social areas. Success of the smart city concept is not thinkable without an effective engagement of the end users, i.e. citizens of the smart cities. The traditional systems engineering methodologies fail and new approaches are urgently needed. A new Hybrid-Agile Methodology (HAM is introduced and its advantages with respect to smart city projects are discussed. However, application of methodologies cannot be successful without principal changes in how are all engaged parties thinking.

  13. WRKY transcription factors: key components in abscisic acid signalling.

    Science.gov (United States)

    Rushton, Deena L; Tripathi, Prateek; Rabara, Roel C; Lin, Jun; Ringler, Patricia; Boken, Ashley K; Langum, Tanner J; Smidt, Lucas; Boomsma, Darius D; Emme, Nicholas J; Chen, Xianfeng; Finer, John J; Shen, Qingxi J; Rushton, Paul J

    2012-01-01

    WRKY transcription factors (TFs) are key regulators of many plant processes, including the responses to biotic and abiotic stresses, senescence, seed dormancy and seed germination. For over 15 years, limited evidence has been available suggesting that WRKY TFs may play roles in regulating plant responses to the phytohormone abscisic acid (ABA), notably some WRKY TFs are ABA-inducible repressors of seed germination. However, the roles of WRKY TFs in other aspects of ABA signalling, and the mechanisms involved, have remained unclear. Recent significant progress in ABA research has now placed specific WRKY TFs firmly in ABA-responsive signalling pathways, where they act at multiple levels. In Arabidopsis, WRKY TFs appear to act downstream of at least two ABA receptors: the cytoplasmic PYR/PYL/RCAR-protein phosphatase 2C-ABA complex and the chloroplast envelope-located ABAR-ABA complex. In vivo and in vitro promoter-binding studies show that the target genes for WRKY TFs that are involved in ABA signalling include well-known ABA-responsive genes such as ABF2, ABF4, ABI4, ABI5, MYB2, DREB1a, DREB2a and RAB18. Additional well-characterized stress-inducible genes such as RD29A and COR47 are also found in signalling pathways downstream of WRKY TFs. These new insights also reveal that some WRKY TFs are positive regulators of ABA-mediated stomatal closure and hence drought responses. Conversely, many WRKY TFs are negative regulators of seed germination, and controlling seed germination appears a common function of a subset of WRKY TFs in flowering plants. Taken together, these new data demonstrate that WRKY TFs are key nodes in ABA-responsive signalling networks. © 2011 The Authors. Plant Biotechnology Journal © 2011 Society for Experimental Biology, Association of Applied Biologists and Blackwell Publishing Ltd.

  14. Transcriptome analysis elucidates key developmental components of bryozoan lophophore development

    KAUST Repository

    Wong, Yue Him

    2014-10-10

    The most recent phylogenomic study suggested that Bryozoa (Ectoprocta), Brachiopoda, and Phoronida are monophyletic, implying that the lophophore of bryozoans, phoronids and brachiopods is a synapomorphy. Understanding the molecular mechanisms of the lophophore development of the Lophophorata clade can therefore provide us a new insight into the formation of the diverse morphological traits in metazoans. In the present study, we profiled the transcriptome of the Bryozoan (Ectoproct) Bugula neritina during the swimming larval stage (SW) and the early (4 h) and late (24 h) metamorphic stages using the Illumina HiSeq2000 platform. Various genes that function in development, the immune response and neurogenesis showed differential expression levels during metamorphosis. In situ hybridization of 23 genes that participate in the Wnt, BMP, Notch, and Hedgehog signaling pathways revealed their regulatory roles in the development of the lophophore and the ancestrula digestive tract. Our findings support the hypothesis that developmental precursors of the lophophore and the ancestrula digestive tract are pre-patterned by the differential expression of key developmental genes according to their fate. This study provides a foundation to better understand the developmental divergence and/or convergence among developmental precursors of the lophophore of bryozoans, branchiopods and phoronids.

  15. Condition monitoring a key component in the preventive maintenance

    International Nuclear Information System (INIS)

    Isar, C.

    2006-01-01

    The preventive maintenance programs are necessary to ensure that nuclear safety significant equipment will function when it is supposed to. Diesel generator, pumps, motor operated valves and air operated control valves are typically operated every three months. When you drive a car, you depend on lot of sounds, the feel of the steering wheel and gauges to determine if the car is running correctly. Similarly with operating equipment for a power plant - sounds or vibration of the equipment or the gauges and test equipment indicate a problem or degradation, actions are taken to correct the deficiency. Due to safety and economical reason diagnostic and monitoring systems are of growing interest in all complex industrial production. Diagnostic systems are requested to detect, diagnose and localize faulty operating conditions at an early stage in order to prevent severe failures and to enable predictive and condition oriented maintenance. In this context it is a need for using various on-line and off-line condition monitoring and diagnostics, non-destructive inspection techniques and surveillance. The condition monitoring technique used in nuclear power plant Cernavoda are presented in this paper. The selection of components and parameters to be monitored, monitoring and diagnostics techniques used are incorporated into a preventive maintenance program. Modern measurement technique in combination with advanced computerized data processing and acquisition show new ways in the field of machine surveillance. The diagnostic capabilities of predictive maintenance technologies have increased recently year with advances made in sensor technologies. The paper will focus on the following condition monitoring technique: - oil analysis - acoustic leakage monitoring - thermography - valve diagnostics: motor operated valve, air operated valve and check valve - motor current signature - vibration monitoring and rotating machine monitoring and diagnostics For each condition monitoring

  16. Mutations in SNRPB, encoding components of the core splicing machinery, cause cerebro-costo-mandibular syndrome.

    Science.gov (United States)

    Bacrot, Séverine; Doyard, Mathilde; Huber, Céline; Alibeu, Olivier; Feldhahn, Niklas; Lehalle, Daphné; Lacombe, Didier; Marlin, Sandrine; Nitschke, Patrick; Petit, Florence; Vazquez, Marie-Paule; Munnich, Arnold; Cormier-Daire, Valérie

    2015-02-01

    Cerebro-costo-mandibular syndrome (CCMS) is a developmental disorder characterized by the association of Pierre Robin sequence and posterior rib defects. Exome sequencing and Sanger sequencing in five unrelated CCMS patients revealed five heterozygous variants in the small nuclear ribonucleoprotein polypeptides B and B1 (SNRPB) gene. This gene includes three transcripts, namely transcripts 1 and 2, encoding components of the core spliceosomal machinery (SmB' and SmB) and transcript 3 undergoing nonsense-mediated mRNA decay. All variants were located in the premature termination codon (PTC)-introducing alternative exon of transcript 3. Quantitative RT-PCR analysis revealed a significant increase in transcript 3 levels in leukocytes of CCMS individuals compared to controls. We conclude that CCMS is due to heterozygous mutations in SNRPB, enhancing inclusion of a SNRPB PTC-introducing alternative exon, and show that this developmental disease is caused by defects in the splicing machinery. Our finding confirms the report of SNRPB mutations in CCMS patients by Lynch et al. (2014) and further extends the clinical and molecular observations. © 2014 WILEY PERIODICALS, INC.

  17. Intrinsically stable phase-modulated polarization encoding system for quantum key distribution

    Energy Technology Data Exchange (ETDEWEB)

    Liu Xiaobao [Laboratory of Photonic Information Technology, School for Information and Optoelectronic Science and Engineering, South China Normal University, Guangzhou 510006 (China); Liao Changjun [Laboratory of Photonic Information Technology, School for Information and Optoelectronic Science and Engineering, South China Normal University, Guangzhou 510006 (China)], E-mail: chliao@scnu.edu.cn; Mi Jinglong; Wang Jindong; Liu Songhao [Laboratory of Photonic Information Technology, School for Information and Optoelectronic Science and Engineering, South China Normal University, Guangzhou 510006 (China)

    2008-12-22

    We demonstrate experimentally an intrinsically stable polarization coding and decoding system composed of optical-fiber Sagnac interferometers with integrated phase modulators for quantum key distribution. An interference visibility of 98.35% can be kept longtime during the experiment without any efforts of active compensation for coding all four desired polarization states.

  18. Epstein-Barr Virus-Encoded RNAs: Key Molecules in Viral Pathogenesis

    Energy Technology Data Exchange (ETDEWEB)

    Iwakiri, Dai [Institute for Genetic Medicine, Hokkaido University, N15 W7 Kita-Ku, Sapporo 060-0815 (Japan)

    2014-08-06

    The Epstein-Barr virus (EBV) is known as an oncogenic herpesvirus that has been implicated in the pathogenesis of various malignancies. EBV-encoded RNAs (EBERs) are non-coding RNAs expressed abundantly in latently EBV-infected cells. Herein, I summarize the current understanding of the functions of EBERs, including the interactions with cellular factors through which EBERs contribute to EBV-mediated pathogenesis. Previous studies have demonstrated that EBERs are responsible for malignant phenotypes in lymphoid cells, and can induce several cytokines that can promote the growth of various EBV-infected cancer cells. EBERs were also found to bind retinoic acid-inducible gene I (RIG-I) and thus activate its downstream signaling. Furthermore, EBERs induce interleukin-10, an autocrine growth factor for Burkitt’s lymphoma cells, by activating RIG-I/interferon regulatory factor 3 pathway, suggesting that EBER-mediated innate immune signaling modulation contributes to EBV-mediated oncogenesis. Recently, EBV-infected cells were reported to secret EBERs, which were then recognized by toll-like receptor 3 (TLR3), leading to the induction of type I interferon and inflammatory cytokines, and subsequent immune activation. Furthermore, EBER1 was detected in the sera of patients with active EBV-infectious diseases, suggesting that EBER1-meidated TLR3 signaling activation could account for the pathogenesis of active EBV-infectious diseases.

  19. Epstein-Barr Virus-Encoded RNAs: Key Molecules in Viral Pathogenesis

    International Nuclear Information System (INIS)

    Iwakiri, Dai

    2014-01-01

    The Epstein-Barr virus (EBV) is known as an oncogenic herpesvirus that has been implicated in the pathogenesis of various malignancies. EBV-encoded RNAs (EBERs) are non-coding RNAs expressed abundantly in latently EBV-infected cells. Herein, I summarize the current understanding of the functions of EBERs, including the interactions with cellular factors through which EBERs contribute to EBV-mediated pathogenesis. Previous studies have demonstrated that EBERs are responsible for malignant phenotypes in lymphoid cells, and can induce several cytokines that can promote the growth of various EBV-infected cancer cells. EBERs were also found to bind retinoic acid-inducible gene I (RIG-I) and thus activate its downstream signaling. Furthermore, EBERs induce interleukin-10, an autocrine growth factor for Burkitt’s lymphoma cells, by activating RIG-I/interferon regulatory factor 3 pathway, suggesting that EBER-mediated innate immune signaling modulation contributes to EBV-mediated oncogenesis. Recently, EBV-infected cells were reported to secret EBERs, which were then recognized by toll-like receptor 3 (TLR3), leading to the induction of type I interferon and inflammatory cytokines, and subsequent immune activation. Furthermore, EBER1 was detected in the sera of patients with active EBV-infectious diseases, suggesting that EBER1-meidated TLR3 signaling activation could account for the pathogenesis of active EBV-infectious diseases

  20. Direct transcriptional activation of BT genes by NLP transcription factors is a key component of the nitrate response in Arabidopsis.

    Science.gov (United States)

    Sato, Takeo; Maekawa, Shugo; Konishi, Mineko; Yoshioka, Nozomi; Sasaki, Yuki; Maeda, Haruna; Ishida, Tetsuya; Kato, Yuki; Yamaguchi, Junji; Yanagisawa, Shuichi

    2017-01-29

    Nitrate modulates growth and development, functioning as a nutrient signal in plants. Although many changes in physiological processes in response to nitrate have been well characterized as nitrate responses, the molecular mechanisms underlying the nitrate response are not yet fully understood. Here, we show that NLP transcription factors, which are key regulators of the nitrate response, directly activate the nitrate-inducible expression of BT1 and BT2 encoding putative scaffold proteins with a plant-specific domain structure in Arabidopsis. Interestingly, the 35S promoter-driven expression of BT2 partially rescued growth inhibition caused by reductions in NLP activity in Arabidopsis. Furthermore, simultaneous disruption of BT1 and BT2 affected nitrate-dependent lateral root development. These results suggest that direct activation of BT1 and BT2 by NLP transcriptional activators is a key component of the molecular mechanism underlying the nitrate response in Arabidopsis. Copyright © 2016 Elsevier Inc. All rights reserved.

  1. Effect of long-term actual spaceflight on the expression of key genes encoding serotonin and dopamine system

    Science.gov (United States)

    Popova, Nina; Shenkman, Boris; Naumenko, Vladimir; Kulikov, Alexander; Kondaurova, Elena; Tsybko, Anton; Kulikova, Elisabeth; Krasnov, I. B.; Bazhenova, Ekaterina; Sinyakova, Nadezhda

    The effect of long-term spaceflight on the central nervous system represents important but yet undeveloped problem. The aim of our work was to study the effect of 30-days spaceflight of mice on Russian biosatellite BION-M1 on the expression in the brain regions of key genes of a) serotonin (5-HT) system (main enzymes in 5-HT metabolism - tryptophan hydroxylase-2 (TPH-2), monoamine oxydase A (MAO A), 5-HT1A, 5-HT2A and 5-HT3 receptors); b) pivotal enzymes in DA metabolism (tyrosine hydroxylase, COMT, MAO A, MAO B) and D1, D2 receptors. Decreased expression of genes encoding the 5-HT catabolism (MAO A) and 5-HT2A receptor in some brain regions was shown. There were no differences between “spaceflight” and control mice in the expression of TPH-2 and 5-HT1A, 5-HT3 receptor genes. Significant changes were found in genetic control of DA system. Long-term spaceflight decreased the expression of genes encoding the enzyme in DA synthesis (tyrosine hydroxylase in s.nigra), DA metabolism (MAO B in the midbrain and COMT in the striatum), and D1 receptor in hypothalamus. These data suggested that 1) microgravity affected genetic control of 5-HT and especially the nigrostriatal DA system implicated in the central regulation of muscular tonus and movement, 2) the decrease in the expression of genes encoding key enzyme in DA synthesis, DA degradation and D1 receptor contributes to the movement impairment and dyskinesia produced by the spaceflight. The study was supported by Russian Foundation for Basic Research grant No. 14-04-00173.

  2. A random-key encoded harmony search approach for energy-efficient production scheduling with shared resources

    Science.gov (United States)

    Garcia-Santiago, C. A.; Del Ser, J.; Upton, C.; Quilligan, F.; Gil-Lopez, S.; Salcedo-Sanz, S.

    2015-11-01

    When seeking near-optimal solutions for complex scheduling problems, meta-heuristics demonstrate good performance with affordable computational effort. This has resulted in a gravitation towards these approaches when researching industrial use-cases such as energy-efficient production planning. However, much of the previous research makes assumptions about softer constraints that affect planning strategies and about how human planners interact with the algorithm in a live production environment. This article describes a job-shop problem that focuses on minimizing energy consumption across a production facility of shared resources. The application scenario is based on real facilities made available by the Irish Center for Manufacturing Research. The formulated problem is tackled via harmony search heuristics with random keys encoding. Simulation results are compared to a genetic algorithm, a simulated annealing approach and a first-come-first-served scheduling. The superior performance obtained by the proposed scheduler paves the way towards its practical implementation over industrial production chains.

  3. Fermilab and Berkeley Lab Collaborate with Meyer Tool on Key Component for European Particle Accelerator

    CERN Multimedia

    2004-01-01

    Officials of the U.S. Department of Energy's Fermi National Accelerator Laboratory and Lawrence Berkeley National Laboratory announced yesterday the completion of a key component of the U.S. contribution to the Large Hadron Collider, a particle accelerator under construction at CERN, in Geneva, Switzerland

  4. Chronic granulomatous disease caused by mutations other than the common GT deletion in NCF1, the gene encoding the p47phox component of the phagocyte NADPH oxidase

    NARCIS (Netherlands)

    Roos, Dirk; de Boer, Martin; Köker, M. Yavuz; Dekker, Jan; Singh-Gupta, Vinita; Ahlin, Anders; Palmblad, Jan; Sanal, Ozden; Kurenko-Deptuch, Magdalena; Jolles, Stephen; Wolach, Baruch

    2006-01-01

    Chronic granulomatous disease (CGD) is an inherited immunodeficiency caused by defects in any of four genes encoding components of the leukocyte nicotinamide dinucleotide phosphate, reduced (NADPH) oxidase. One of these is the autosomal neutrophil cytosolic factor 1 (NCF1) gene encoding the p47phox

  5. Patient-Centred Care in Canada: Key Components and the Path Forward.

    Science.gov (United States)

    Montague, Terrence; Gogovor, Amédé; Aylen, John; Ashley, Lisa; Ahmed, Sara; Martin, Lesli; Cochrane, Bonnie; Adams, Owen; Nemis-White, Joanna

    2017-01-01

    Canadians' health and its care continue to evolve. Chronic diseases affect more than 50% of our aging population, but the majority of public and professional stakeholders retain a sense of care quality. An emergent issue, however, is generating an increasingly wide debate. It is the concept of patient-centred care, including its definition of key components, and efficacy. To advance the evidence base, the 2013-2014 and 2016 Health Care in Canada (HCIC) surveys measured pan-stakeholder levels of support and implementation priorities for frequently proposed components of patient centricity in healthcare. The public's highest rated component was timely access to care, followed by perceived respect and caring in its delivery, with decisions made in partnership among patients and professional providers, and within a basic belief that care should be based on patients' needs versus their ability to pay. Health professionals' levels of support for key components largely overlapped the public's levels of support for key components, with an additional accent on care influenced by an evidence base and expert opinion. In terms of priority to actually implement enhanced patient-centred care options, timely access was universally dominant among all stakeholders. Caring, respectful care, also retained high implementation priority among both the public and professionals, as did care decisions made in partnership, and, among professionals, care driven by research and expert opinion. Low priorities, for both the public and professionals, were the actual measurements of patient-centred care delivery and its impact on outcomes. In summary, there is remarkable concordance among all stakeholders in terms of favoured interventions to enhance patient-centred care, namely, timely access, caring, partnering and communicative delivery of evidence-based care. Unfortunately, the lack of contemporary imperative around the value of measuring and reporting actual use and outcomes of favoured

  6. Displacement encoder

    International Nuclear Information System (INIS)

    Hesketh, T.G.

    1983-01-01

    In an optical encoder, light from an optical fibre input A is encoded by means of the encoding disc and is subsequently collected for transmission via optical fibre B. At some point in the optical path between the fibres A and B, the light is separated into component form by means of a filtering or dispersive system and each colour component is associated with a respective one of the coding channels of the disc. In this way, the significance of each bit of the coded information is represented by a respective colour thereby enabling the components to be re-combined for transmission by the fibre B without loss of information. (author)

  7. Mutations in GLDN, Encoding Gliomedin, a Critical Component of the Nodes of Ranvier, Are Responsible for Lethal Arthrogryposis.

    Science.gov (United States)

    Maluenda, Jérôme; Manso, Constance; Quevarec, Loic; Vivanti, Alexandre; Marguet, Florent; Gonzales, Marie; Guimiot, Fabien; Petit, Florence; Toutain, Annick; Whalen, Sandra; Grigorescu, Romulus; Coeslier, Anne Dieux; Gut, Marta; Gut, Ivo; Laquerrière, Annie; Devaux, Jérôme; Melki, Judith

    2016-10-06

    Arthrogryposis multiplex congenita (AMC) is a developmental condition characterized by multiple joint contractures resulting from reduced or absent fetal movements. Through linkage analysis, homozygosity mapping, and exome sequencing in four unrelated families affected by lethal AMC, we identified biallelic mutations in GLDN in the affected individuals. GLDN encodes gliomedin, a secreted cell adhesion molecule involved in the formation of the nodes of Ranvier. Transmission electron microscopy of the sciatic nerve from one of the affected individuals showed a marked lengthening defect of the nodes. The GLDN mutations found in the affected individuals abolish the cell surface localization of gliomedin and its interaction with its axonal partner, neurofascin-186 (NF186), in a cell-based assay. The axoglial contact between gliomedin and NF186 is essential for the initial clustering of Na + channels at developing nodes. These results indicate a major role of gliomedin in node formation and the development of the peripheral nervous system in humans. These data indicate that mutations of GLDN or CNTNAP1 (MIM: 616286), encoding essential components of the nodes of Ranvier and paranodes, respectively, lead to inherited nodopathies, a distinct disease entity among peripheral neuropathies. Copyright © 2016 American Society of Human Genetics. Published by Elsevier Inc. All rights reserved.

  8. Prescribed burning consumes key forest structural components: implications for landscape heterogeneity.

    Science.gov (United States)

    Holland, Greg J; Clarke, Michael F; Bennett, Andrew F

    2017-04-01

    Prescribed burning to achieve management objectives is a common practice in fire-prone regions worldwide. Structural components of habitat that are combustible and slow to develop are particularly susceptible to change associated with prescribed burning. We used an experimental, "whole-landscape" approach to investigate the effect of differing patterns of prescribed burning on key habitat components (logs, stumps, dead trees, litter cover, litter depth, and understorey vegetation). Twenty-two landscapes (each ~100 ha) were selected in a dry forest ecosystem in southeast Australia. Experimental burns were conducted in 16 landscapes (stratified by burn extent) while six served as untreated controls. We measured habitat components prior to and after burning. Landscape burn extent ranged from 22% to 89% across the 16 burn treatments. With the exception of dead standing trees (no change), all measures of habitat components declined as a consequence of burning. The degree of loss increased as the extent to which a landscape was burned also increased. Prescribed burning had complex effects on the spatial heterogeneity (beta diversity) of structural components within landscapes. Landscapes that were more heterogeneous pre-fire were homogenized by burning, while those that were more homogenous pre-fire tended to display greater differentiation post-burning. Thus, the notion that patch mosaic burning enhances heterogeneity at the landscape-scale depends on prior conditions. These findings have important management implications. Where prescribed burns must be undertaken, effects on important resources can be moderated via control of burn characteristics (e.g., burn extent). Longer-term impacts of prescribed burning will be strongly influenced by the return interval, given the slow rate at which some structural components accumulate (decades to centuries). Management of habitat structural components is important given the critical role they play in (1) provision of habitat

  9. Reduction of PM emissions from specific sources reflected on key components concentrations of ambient PM10

    Science.gov (United States)

    Minguillon, M. C.; Querol, X.; Monfort, E.; Alastuey, A.; Escrig, A.; Celades, I.; Miro, J. V.

    2009-04-01

    The relationship between specific particulate emission control and ambient levels of some PM10 components (Zn, As, Pb, Cs, Tl) was evaluated. To this end, the industrial area of Castellón (Eastern Spain) was selected, where around 40% of the EU glazed ceramic tiles and a high proportion of EU ceramic frits (middle product for the manufacture of ceramic glaze) are produced. The PM10 emissions from the ceramic processes were calculated over the period 2000 to 2007 taking into account the degree of implementation of corrective measures throughout the study period. Abatement systems (mainly bag filters) were implemented in the majority of the fusion kilns for frit manufacture in the area as a result of the application of the Directive 1996/61/CE, leading to a marked decrease in PM10 emissions. On the other hand, ambient PM10 sampling was carried out from April 2002 to July 2008 at three urban sites and one suburban site of the area and a complete chemical analysis was made for about 35 % of the collected samples, by means of different techniques (ICP-AES, ICP-MS, Ion Chromatography, selective electrode and elemental analyser). The series of chemical composition of PM10 allowed us to apply a source contribution model (Principal Component Analysis), followed by a multilinear regression analysis, so that PM10 sources were identified and their contribution to bulk ambient PM10 was quantified on a daily basis, as well as the contribution to bulk ambient concentrations of the identified key components (Zn, As, Pb, Cs, Tl). The contribution of the sources identified as the manufacture and use of ceramic glaze components, including the manufacture of ceramic frits, accounted for more than 65, 75, 58, 53, and 53% of ambient Zn, As, Pb, Cs and Tl levels, respectively (with the exception of Tl contribution at one of the sites). The important emission reductions of these sources during the study period had an impact on ambient key components levels, such that there was a high

  10. AIS as key component in modern vessel traffic management and information systems

    Energy Technology Data Exchange (ETDEWEB)

    Lamers, W. [DaimlerChrysler Aerospace AG (DASA), Ulm (Germany)

    1999-07-01

    The objective of this paper is to provide information in respect to universal shipborne identification system (UAIS) as main sensor in various vessel traffic applications. The presented paper will give general information concerning AIS functionality and the standardisation process. Based on experience from recent projects and various IALA working group activities, a typical future VTMIS architectures is also presented being based on AIS as key sensor. The required key performance of AIS associated with the HW components will be described. The results from European technology study Indris are presented and discussed. Finally, a summary and conclusion from the presented material will complete the technical paper. The elaboration of this presentation has been carried out as a joint task between Mr. Andre van Berg, MDS Suedafrika und Mr. Walter Lamers, DASA Ulm. (orig.)

  11. The iron-sulfur cluster assembly network component NARFL is a key element in the cellular defense against oxidative stress.

    Science.gov (United States)

    Corbin, Monique V; Rockx, Davy A P; Oostra, Anneke B; Joenje, Hans; Dorsman, Josephine C

    2015-12-01

    Aim of this study was to explore cellular changes associated with increased resistance to atmospheric oxygen using high-resolution DNA and RNA profiling combined with functional studies. Two independently selected oxygen-resistant substrains of HeLa cells (capable of proliferating at >80% O2, i.e. hyperoxia) were compared with their parental cells (adapted to growth at 20% O2, but unable to grow at >80% O2). A striking consistent alteration found to be associated with the oxygen-resistant state appeared to be an amplified and overexpressed region on chromosome 16p13.3 harboring 21 genes. The driver gene of this amplification was identified by functional studies as NARFL, which encodes a component of the cytosolic iron-sulfur cluster assembly system. In line with this result we found the cytosolic c-aconitase activity as well as the nuclear protein RTEL1, both Fe-S dependent proteins, to be protected by NARFL overexpression under hyperoxia. In addition, we observed a protective effect of NARFL against hyperoxia-induced loss of sister-chromatid cohesion. NARFL thus appeared to be a key factor in the cellular defense against hyperoxia-induced oxidative stress in human cells. Our findings suggest that new insight into age-related degenerative processes may come from studies that specifically address the involvement of iron-sulfur proteins. Copyright © 2015 The Authors. Published by Elsevier Inc. All rights reserved.

  12. Evolving Systems: Adaptive Key Component Control and Inheritance of Passivity and Dissipativity

    Science.gov (United States)

    Frost, S. A.; Balas, M. J.

    2010-01-01

    We propose a new framework called Evolving Systems to describe the self-assembly, or autonomous assembly, of actively controlled dynamical subsystems into an Evolved System with a higher purpose. Autonomous assembly of large, complex flexible structures in space is a target application for Evolving Systems. A critical requirement for autonomous assembling structures is that they remain stable during and after assembly. The fundamental topic of inheritance of stability, dissipativity, and passivity in Evolving Systems is the primary focus of this research. In this paper, we develop an adaptive key component controller to restore stability in Nonlinear Evolving Systems that would otherwise fail to inherit the stability traits of their components. We provide sufficient conditions for the use of this novel control method and demonstrate its use on an illustrative example.

  13. Terra Preta Sanitation: A Key Component for Sustainability in the Urban Environment

    Directory of Open Access Journals (Sweden)

    Thorsten Schuetze

    2014-11-01

    Full Text Available Terra Preta Sanitation (TPS plays a key role in sustainable sanitation (SuSan and in the sustainable management of resources such as water, energy, soil (agriculture, liquid and solid organic waste streams as well as in the development of sustainable urban environment and infrastructure systems. This paper discusses the advantages of, and requirements for, SuSan systems, focusing on TPS. Case studies showing the stepwise extension and re-development of conventional sanitation systems (CSS using TPS technologies and system approaches are presented and discussed. Decentralized TPS systems integrated in sustainable urban resource management were implemented in the German cities of Hamburg and Berlin. The compilation of best practice examples and findings using the newest TPS systems illustrates the immense potential of this approach for the transformation from conventional to SuSan systems. For this purpose, the potential savings of drinking water resources and the recycling potential of nutrient components are quantified. The results strongly suggest the need to encourage the development and application of innovative decentralized sanitation technologies, urban infrastructures, and resource management systems that have TP as a key component.

  14. Modelling Creativity: Identifying Key Components through a Corpus-Based Approach.

    Science.gov (United States)

    Jordanous, Anna; Keller, Bill

    2016-01-01

    Creativity is a complex, multi-faceted concept encompassing a variety of related aspects, abilities, properties and behaviours. If we wish to study creativity scientifically, then a tractable and well-articulated model of creativity is required. Such a model would be of great value to researchers investigating the nature of creativity and in particular, those concerned with the evaluation of creative practice. This paper describes a unique approach to developing a suitable model of how creative behaviour emerges that is based on the words people use to describe the concept. Using techniques from the field of statistical natural language processing, we identify a collection of fourteen key components of creativity through an analysis of a corpus of academic papers on the topic. Words are identified which appear significantly often in connection with discussions of the concept. Using a measure of lexical similarity to help cluster these words, a number of distinct themes emerge, which collectively contribute to a comprehensive and multi-perspective model of creativity. The components provide an ontology of creativity: a set of building blocks which can be used to model creative practice in a variety of domains. The components have been employed in two case studies to evaluate the creativity of computational systems and have proven useful in articulating achievements of this work and directions for further research.

  15. Establishing key components of yoga interventions for musculoskeletal conditions: a Delphi survey

    Science.gov (United States)

    2014-01-01

    Background Evidence suggests yoga is a safe and effective intervention for the management of physical and psychosocial symptoms associated with musculoskeletal conditions. However, heterogeneity in the components and reporting of clinical yoga trials impedes both the generalization of study results and the replication of study protocols. The aim of this Delphi survey was to address these issues of heterogeneity, by developing a list of recommendations of key components for the design and reporting of yoga interventions for musculoskeletal conditions. Methods Recognised experts involved in the design, conduct, and teaching of yoga for musculoskeletal conditions were identified from a systematic review, and invited to contribute to the Delphi survey. Forty-one of the 58 experts contacted, representing six countries, agreed to participate. A three-round Delphi was conducted via electronic surveys. Round 1 presented an open-ended question, allowing panellists to individually identify components they considered key to the design and reporting of yoga interventions for musculoskeletal conditions. Thematic analysis of Round 1 identified items for quantitative rating in Round 2; items not reaching consensus were forwarded to Round 3 for re-rating. Results Thirty-six panellists (36/41; 88%) completed the three rounds of the Delphi survey. Panellists provided 348 comments to the Round 1 question. These comments were reduced to 49 items, grouped under five themes, for rating in subsequent rounds. A priori group consensus of ≥80% was reached on 28 items related to five themes concerning defining the yoga intervention, types of yoga practices to include in an intervention, delivery of the yoga protocol, domains of outcome measures, and reporting of yoga interventions for musculoskeletal conditions. Additionally, a priori consensus of ≥50% was reached on five items relating to minimum values for intervention parameters. Conclusions Expert consensus has provided a non

  16. Pricing in health care organizations. A key component of the marketing mix.

    Science.gov (United States)

    Marlowe, D

    1989-01-01

    Pricing is one of the key components of a successful marketing mix. Pricing objectives, strategies, and tactics cannot stand alone, however. To be effective, price must work in harmony with other marketing and management activities. Despite its importance, use of pricing as a management tool is limited in health care compared to other industries. Many factors contribute to this situation, including the structure of the health-care exchange process, limited consumer knowledge, and a limited ability to measure costs. I will provide an overview of pricing information, both within and outside health care. Specifically, we will explore the definition of pricing, nonmonetary pricing, price elasticity, classical pricing theory, and the role of pricing in a health-care setting.

  17. Lifetime assessment and lifetime management for key components of nuclear power plants

    International Nuclear Information System (INIS)

    Dou Yikang; Sun Hanhong; Qu Jiadi

    2000-01-01

    On the bases of investigation on recent development of plant lifetime management in the world, the author gives some points of view on how to establish plant lifetime assessment (PLA) and management (PLM) systems for Chinese nuclear power plants. The main points lie in: 1) safety regulatory organizations, utilities and R and D institutes work cooperatively for PLA and PLM; 2) PLA and PLM make a interdependent cycle, which means that a good PLM system ensures authentic input for PLA, while veritable PLA provides valuable feedback for PLM improvement; 3) PLA and PLM should be initiated for some key components. The author also analyzes some important problems to be tackled in PLA and PLM from the view angle of a R and D institute

  18. Benchmarking Non Public Hospitals in Puerto Rico: A Key Component in the Financial Performance

    Directory of Open Access Journals (Sweden)

    Arisbel Ramos Martin

    2016-03-01

    Full Text Available Benchmarking is considered a key component of the organizational performance measurement system. This study examines a sample of 53 profit and nonprofit hospitals registered in the American Hospital Directory, through four financial dimensions: liquidity, efficiency, profitability and capital structure. The purpose of the study is to validate whether the financial industry benchmark differs or not from a group of 17 selected financial ratios of profit and nonprofit hospitals, to determine if their financial performance is efficient or inefficient in the Puerto Rico health care system. The findings from the research show that 53% or more of the 17 selected financial ratios, compared globally, suggest being efficient in both types of hospitals. This means that these financial ratios were greater than or equal to the industry benchmark.

  19. The arabidopsis thaliana AGRAVITROPIC 1 gene encodes a component of the polar-auxin-transport efflux carrier

    Science.gov (United States)

    Chen, R.; Hilson, P.; Sedbrook, J.; Rosen, E.; Caspar, T.; Masson, P. H.

    1998-01-01

    Auxins are plant hormones that mediate many aspects of plant growth and development. In higher plants, auxins are polarly transported from sites of synthesis in the shoot apex to their sites of action in the basal regions of shoots and in roots. Polar auxin transport is an important aspect of auxin functions and is mediated by cellular influx and efflux carriers. Little is known about the molecular identity of its regulatory component, the efflux carrier [Estelle, M. (1996) Current Biol. 6, 1589-1591]. Here we show that mutations in the Arabidopsis thaliana AGRAVITROPIC 1 (AGR1) gene involved in root gravitropism confer increased root-growth sensitivity to auxin and decreased sensitivity to ethylene and an auxin transport inhibitor, and cause retention of exogenously added auxin in root tip cells. We used positional cloning to show that AGR1 encodes a putative transmembrane protein whose amino acid sequence shares homologies with bacterial transporters. When expressed in Saccharomyces cerevisiae, AGR1 promotes an increased efflux of radiolabeled IAA from the cells and confers increased resistance to fluoro-IAA, a toxic IAA-derived compound. AGR1 transcripts were localized to the root distal elongation zone, a region undergoing a curvature response upon gravistimulation. We have identified several AGR1-related genes in Arabidopsis, suggesting a global role of this gene family in the control of auxin-regulated growth and developmental processes.

  20. Innovation in mental health services: what are the key components of success?

    Science.gov (United States)

    Brooks, Helen; Pilgrim, David; Rogers, Anne

    2011-10-26

    Service development innovation in health technology and practice is viewed as a pressing need within the field of mental health yet is relatively poorly understood. Macro-level theories have been criticised for their limited explanatory power and they may not be appropriate for understanding local and fine-grained uncertainties of services and barriers to the sustainability of change. This study aimed to identify contextual influences inhibiting or promoting the acceptance and integration of innovations in mental health services in both National Health Service (NHS) and community settings. A comparative study using qualitative and case study data collection methods, including semi-structured interviews with key stakeholders and follow-up telephone interviews over a one-year period. The analysis was informed by learning organisation theory. Drawn from 11 mental health innovation projects within community, voluntary and NHS settings, 65 participants were recruited including service users, commissioners, health and non-health professionals, managers, and caregivers. The methods deployed in this evaluation focused on process-outcome links within and between the 11 projects. Key barriers to innovation included resistance from corporate departments and middle management, complexity of the innovation, and the availability and access to resources on a prospective basis within the host organisation. The results informed the construction of a proposed model of innovation implementation within mental health services. The main components of which are context, process, and outcomes. The study produced a model of conducive and impeding factors drawn from the composite picture of 11 innovative mental health projects, and this is discussed in light of relevant literature. The model provides a rich agenda to consider for services wanting to innovate or adopt innovations from elsewhere. The evaluation suggested the importance of studying innovation with a focus on context, process

  1. Capacity building in water demand management as a key component for attaining millennium development goals

    Science.gov (United States)

    Gumbo, Bekithemba; Forster, Laura; Arntzen, Jaap

    Successful water demand management (WDM) implementation as a component of integrated water resource management (IWRM) can play a significant role in the alleviation of poverty through more efficient use of available water resources. The urban population in Southern African cities is characterised by so-called ‘water poor’ communities who typically expend a high percentage of their household income on poor quality water. Usually they have no access to an affordable alternative source. Although WDM as a component of IWRM is not a panacea for poverty, it can help alleviate poverty by facilitating water services management by municipal water supply agencies (MWSAs) in the region. WDM is a key strategy for achieving the millennium development goals (MDGs) and, as such, should be given due attention in the preparation of national IWRM and water efficiency plans. Various studies in the Southern African region have indicated that capacity building is necessary for nations to develop IWRM and water-use efficiency plans to meet the targets set out in the MDGs. WDM education and training of water professionals and end-users is particularly important in developing countries, which are resource and information-access poor. In response to these findings, The World Conservation Union (IUCN) and its consulting partners, the Training and Instructional Design Academy of South Africa (TIDASA), and Centre for Applied Research (CAR) designed, developed and presented a pilot WDM Guideline Training Module for MWSAs as part of Phase II of IUCN’s Southern Africa regional WDM project. Pilot training was conducted in July 2004 in Lusaka, Zambia for a group of 36 participants involved in municipal water supply from nine Southern African countries. This paper looks at the links between building the capacity of professionals, operational staff and other role-players in the municipal water supply chain to implement WDM as part of broader IWRM strategies, and the subsequent potential for

  2. Minor abnormalities of testis development in mice lacking the gene encoding the MAPK signalling component, MAP3K1.

    Directory of Open Access Journals (Sweden)

    Nick Warr

    2011-05-01

    Full Text Available In mammals, the Y chromosome is a dominant male determinant, causing the bipotential gonad to develop as a testis. Recently, cases of familial and spontaneous 46,XY disorders of sex development (DSD have been attributed to mutations in the human gene encoding mitogen-activated protein kinase kinase kinase 1, MAP3K1, a component of the mitogen-activated protein kinase (MAPK signal transduction pathway. In individuals harbouring heterozygous mutations in MAP3K1, dysregulation of MAPK signalling was observed in lymphoblastoid cell lines, suggesting a causal role for these mutations in disrupting XY sexual development. Mice lacking the cognate gene, Map3k1, are viable and exhibit the eyes open at birth (EOB phenotype on a mixed genetic background, but on the C57BL/6J genetic background most mice die at around 14.5 dpc due to a failure of erythropoiesis in the fetal liver. However, no systematic examination of sexual development in Map3k1-deficient mice has been described, an omission that is especially relevant in the case of C57BL/6J, a genetic background that is sensitized to disruptions to testis determination. Here, we report that on a mixed genetic background mice lacking Map3k1 are fertile and exhibit no overt abnormalities of testis development. On C57BL/6J, significant non-viability is observed with very few animals surviving to adulthood. However, an examination of development in Map3k1-deficient XY embryos on this genetic background revealed no significant defects in testis determination, although minor abnormalities were observed, including an increase in gonadal length. Based on these observations, we conclude that MAP3K1 is not required for mouse testis determination. We discuss the significance of these data for the functional interpretation of sex-reversing MAP3K1 mutations in humans.

  3. Engineering design of the IFMIF EVEDA reference test cell and key components

    Energy Technology Data Exchange (ETDEWEB)

    Tian, Kuo, E-mail: kuo.tian@kit.edu [Institute for Neutron Physics and Reactor Technology, Karlsruhe Institute of Technology, Karlsruhe (Germany); Arbeiter, Frederik; Chen, Yuming; Heinzel, Volker; Kondo, Keitaro [Institute for Neutron Physics and Reactor Technology, Karlsruhe Institute of Technology, Karlsruhe (Germany); Mittwollen, Martin [Institute for Material Handling and Logistics, Karlsruhe Institute of Technology, Karlsruhe (Germany)

    2014-10-15

    The latest design updates of the IFMIF-EVEDA reference test cell (TC) are described with emphasis on the following key components: active cooling pipes for concrete biological shielding walls and stainless steel liner, TC gas leak tight boundary, and piping and cabling inside TC and between TC and the access cell (AC). Water cooling is adopted for concrete shielding walls and the liner. Buried pipes are selected for active cooling of the TC surrounding shielding walls; directly welded pipes on the liner are used to remove nuclear heat of the liner. Technical features and layout of the cooling pipes are preliminary defined. The TC vacuum boundary, which includes the TC liner, an independent TC cover plate, a rubber based sealing gasket, and welding seams between interface shielding plugs and TC liner, is described. Engineering design of the piping and cabling plugs as well as the arrangement of pipes and cables under the TC covering plate and the AC floor are updated. Pipes and cable tunnels inside the shielding plugs are arranged with several bends for minimizing neutron streaming from inside to outside of the TC. Pipes, cables, and the corresponding penetrations between the TC and the AC are carefully arranged for convenient access and maintenances.

  4. Application of modern information technologies for monitoring of 600 RP key component performance and lifetime assessment

    International Nuclear Information System (INIS)

    Karpenko, S.N.; Korotkih, Yu.G.; Levin, A.A.; Sankov, E.I.; Pobedonostzev, A.B.; Shashkin, S.L.

    1997-01-01

    Safety and reliability of NPP operation in the first turn depend on reliability and quality of the main technological equipment. Diagnostics systems are envisaged for the equipment state inspection to determine its serviceability in NPP designs. An assessment of the equipment residual lifetime at operating plants is calculated as a difference between specified (according to the operation model accepted in the design phase) lifetime and actual time in operation. Real influence of operating modes on the main equipment lifetime, in this case, is not taken into account. Within a design of NPP with VPBER-600 passive safety RP a system for lifetime assessment of RP key component is provided as a part of a process control system. Specialists from OKBM and Scientific Research Institute of Mechanics participate in development of this system. Now the first stage of the work on creation of this system is completed. This paper describes the purpose, the basic configuration principles of the system, its position among other NPP systems, organization of user-system interaction. (author). 5 refs, 1 figs

  5. Identification of key molecular components of the resistance of cherry tomato against Phytophthora infestans

    International Nuclear Information System (INIS)

    Lopez Kleine, Liliana; Smart, Christine D; Fry, William E; Restrepo, Silvia

    2012-01-01

    Cherry tomato Solanum lycopersicum var cerasiforme CV matt's wild cherry is a very resistant cultivar to most Phytophthora infestans isolates. Two isolates were identified, us 940480 and us 970001 that cause an incompatible and a compatible interaction respectively. Us 970001 is one of the few isolates producing a compatible interaction with this cultivar. To identify genes with a differential gene expression between compatible and incompatible interactions, gene expression patterns were analyzed with tomato CDNA microarrays including 12,899 independent tomato CDNA clones at different time points after inoculation. A diverse set of statistical tools were used to identify key components of the plant response to the pathogen. Forty-three genes were up-regulated during the incompatible reaction at time point 36 hours, 15 globally at all-time points and twelve were found both in globally and at 36 hours. Northern blots analysis was performed to confirm differential expression showed by microarray analysis and to study the differential expression of more plant resistance genes (PR) genes between compatible and incompatible interactions for this interaction.

  6. IDENTIFICATION OF KEY MOLECULAR COMPONENTS OF THE RESISTANCE OF CHERRY TOMATO AGAINST Phytophthora infestans

    Directory of Open Access Journals (Sweden)

    LILIANA LÓPEZ KLEINE

    2012-09-01

    Full Text Available Cherry tomato Solanum lycopersicum var cerasiforme cv Matt’s wild cherry is a very resistant cultivar to most Phytophthora infestans isolates. Two isolates were identified, US940480 and US970001 that cause an incompatible and a compatible interaction respectively. US970001 is one of the few isolates producing a compatible interaction with this cultivar. To identify genes with a differential gene expression between compatible and incompatible interactions, gene expression patterns were analyzed with tomato cDNA microarrays including 12,899 independent tomato cDNA clones at different time points after inoculation. A diverse set of statistical tools were used to identify key components of the plant response to the pathogen. Forty-three genes were up-regulated during the incompatible reaction at time point 36 hours, 15 globally at all time points and twelve were found both in globally and at 36 hours. Northern blots analysis was performed to confirm differential expression showed by microarray analysis and to study the differential expression of more PR genes between compatible and incompatible interactions for this interaction.

  7. Photosynthesis of hydrogen and methane as key components for clean energy system

    Directory of Open Access Journals (Sweden)

    Seng Sing Tan et al

    2007-01-01

    Full Text Available While researchers are trying to solve the world's energy woes, hydrogen is becoming the key component in sustainable energy systems. Hydrogen could be produced through photocatalytic water-splitting technology. It has also been found that hydrogen and methane could be produced through photocatalytic reduction of carbon dioxide with water. In this exploratory study, instead of coating catalysts on a substrate, pellet form of catalyst, which has better adsorption capacity, was used in the photo-reduction of carbon dioxide with water. In the experiment, some water was first absorbed into titanium dioxide pellets. Highly purified carbon dioxide gas was then discharged into a reactor containing these wet pellets, which were then illuminated continuously using UVC lamps. Gaseous samples accumulated in the reactor were extracted at different intervals to analyze the product yields. The results confirmed that methane and hydrogen were photosynthesized using pellet form of TiO2 catalysts. Hydrogen was formed at a rate as high as 0.16 micromoles per hour (μmol h−1. The maximum formation rate of CH4 was achieved at 0.25 μmol h−1 after 24 h of irradiation. CO was also detected.

  8. Depletion of key protein components of the RISC pathway impairs pre-ribosomal RNA processing.

    Science.gov (United States)

    Liang, Xue-Hai; Crooke, Stanley T

    2011-06-01

    Little is known about whether components of the RNA-induced silencing complex (RISC) mediate the biogenesis of RNAs other than miRNA. Here, we show that depletion of key proteins of the RISC pathway by antisense oligonucleotides significantly impairs pre-rRNA processing in human cells. In cells depleted of Drosha or Dicer, different precursors to 5.8S rRNA strongly accumulated, without affecting normal endonucleolytic cleavages. Moderate yet distinct processing defects were also observed in Ago2-depleted cells. Physical links between pre-rRNA and these proteins were identified by co-immunoprecipitation analyses. Interestingly, simultaneous depletion of Dicer and Drosha led to a different processing defect, causing slower production of 28S rRNA and its precursor. Both Dicer and Ago2 were detected in the nuclear fraction, and reduction of Dicer altered the structure of the nucleolus, where pre-rRNA processing occurs. Together, these results suggest that Drosha and Dicer are implicated in rRNA biogenesis.

  9. Application of modern information technologies for monitoring of 600 RP key component performance and lifetime assessment

    Energy Technology Data Exchange (ETDEWEB)

    Karpenko, S N; Korotkih, Yu G; Levin, A A; Sankov, E I [Research Inst. of Mechanics of Lobachevski State Univ., Nizhny Novgorod (Russian Federation); Pobedonostzev, A B; Shashkin, S L [OKB Mechanical Engineering, Nizhny Novgorod (Russian Federation)

    1997-07-01

    Safety and reliability of NPP operation in the first turn depend on reliability and quality of the main technological equipment. Diagnostics systems are envisaged for the equipment state inspection to determine its serviceability in NPP designs. An assessment of the equipment residual lifetime at operating plants is calculated as a difference between specified (according to the operation model accepted in the design phase) lifetime and actual time in operation. Real influence of operating modes on the main equipment lifetime, in this case, is not taken into account. Within a design of NPP with VPBER-600 passive safety RP a system for lifetime assessment of RP key component is provided as a part of a process control system. Specialists from OKBM and Scientific Research Institute of Mechanics participate in development of this system. Now the first stage of the work on creation of this system is completed. This paper describes the purpose, the basic configuration principles of the system, its position among other NPP systems, organization of user-system interaction. (author). 5 refs, 1 figs.

  10. Heterologous expression of a Rauvolfia cDNA encoding strictosidine glucosidase, a biosynthetic key to over 2000 monoterpenoid indole alkaloids.

    Science.gov (United States)

    Gerasimenko, Irina; Sheludko, Yuri; Ma, Xueyan; Stöckigt, Joachim

    2002-04-01

    Strictosidine glucosidase (SG) is an enzyme that catalyses the second step in the biosynthesis of various classes of monoterpenoid indole alkaloids. Based on the comparison of cDNA sequences of SG from Catharanthus roseus and raucaffricine glucosidase (RG) from Rauvolfia serpentina, primers for RT-PCR were designed and the cDNA encoding SG was cloned from R. serpentina cell suspension cultures. The active enzyme was expressed in Escherichia coli and purified to homogeneity. Analysis of its deduced amino-acid sequence assigned the SG from R. serpentina to family 1 of glycosyl hydrolases. In contrast to the SG from C. roseus, the enzyme from R. serpentina is predicted to lack an uncleavable N-terminal signal sequence, which is believed to direct proteins to the endoplasmic reticulum. The temperature and pH optimum, enzyme kinetic parameters and substrate specificity of the heterologously expressed SG were studied and compared to those of the C. roseus enzyme, revealing some differences between the two glucosidases. In vitro deglucosylation of strictosidine by R. serpentina SG proceeds by the same mechanism as has been shown for the C. roseus enzyme preparation. The reaction gives rise to the end product cathenamine and involves 4,21-dehydrocorynantheine aldehyde as an intermediate. The enzymatic hydrolysis of dolichantoside (Nbeta-methylstrictosidine) leads to several products. One of them was identified as a new compound, 3-isocorreantine A. From the data it can be concluded that the divergence of the biosynthetic pathways leading to different classes of indole alkaloids formed in R. serpentina and C. roseus cell suspension cultures occurs at a later stage than strictosidine deglucosylation.

  11. The ultracondenser. A key component for successful power management; Der Ultrakondensator. Eine Schluesselkomponente fuer erfolgreiches Energiemanagement

    Energy Technology Data Exchange (ETDEWEB)

    Soucaze-Guillous, Benoit; Wieser, Christoph; Auer, Juergen [Maxwell Technologies GmbH, Gilching (Germany)

    2010-07-01

    Today's power distribution systems are stressed by a variety of consumers in comfort or safety oriented systems. Ongoing electrification still increases the load so that new approaches for future power distribution system concepts and storage technologies will be required. The energy storage in future vehicles has to fulfill certain requirements which can be met with using ultracaps as electrostatic storage: high current capability, low self discharge rate, good performance at low temperatures and high cycle life. Ultracaps demonstrate their strengths where batteries show weaknesses: at low temperatures. Even in the range down to -40 C they work with highest efficiency and highest possible reliability. In order to support the battery for cold start or as back-up for safety critical systems, the energy stored in a cell is not allowed to be lost by self discharge effects. Therefore Maxwell ultracaps are characterized by low self discharge rates. They help creating an efficient power distribution system by providing the still increasing peak power. In contrast to peak power continuous energy demand is covered by the power distribution system with its integrated primary energy source. Automotive manufacturers develop micro hybrid systems including start-stop and recuperation functions in order to meet legal emission limits. Especially in those applications high currents occur as short pulses. For start-stop typically current is at more than 500A. The ultracap is able to handle those high currents even under cycle conditions during whole vehicle life without any negative effects on safety, lifetime or performance. Availability of ultracapacitors will be guaranteed also in future, since the electrode as key component is extracted from an environment-friendly and renewable raw material: coconut shells. (orig.)

  12. Mock-up test on key components of ITER blanket remote handling system

    International Nuclear Information System (INIS)

    Takeda, Nobukazu; Kakudate, Satoshi; Nakahira, Masataka; Matsumoto, Yasuhiro; Taguchi, Koh; Kozaka, Hiroshi; Shibanuma, Kiyoshi; Tesini, Alessandro

    2009-01-01

    The maintenance operation of the ITER in-vessel component, such as a blanket and divertor, must be executed by the remote equipment because of the high gamma-ray environment. During the Engineering Design Activity (EDA), the Japan Atomic Energy Agency (then called as Japan Atomic Energy Research Institute) had been fabricated the prototype of the vehicle manipulator system for the blanket remote handling and confirmed feasibility of this system including automatic positioning of the blanket and rail deployment procedure of the articulated rail. The ITER agreement, which entered into force in the last year, formally decided that Japan will procure the blanket remote handling system and the JAEA, as the Japanese Domestic Agency, is continuing several R and Ds so that the system can be procured smoothly. The residual key issues after the EDA are rail connection and cable handling. The mock-ups of the rail connection mechanism and the cable handling system were fabricated from the last year and installed at the JAEA Naka Site in this March. The former was composed of the rail connecting mechanism, two rail segments and their handling systems. The latter one utilized a slip ring, which implemented 80 lines for power and 208 lines for signal, because there is an electrical contact between the rotating spool and the fixed base. The basic function of these systems was confirmed through the mock-up test. The rail connection mechanism, for example, could accept misalignment of 1.5-2 mm at least. The future test plan is also mentioned in the paper.

  13. Design of a hybrid reconfigurable Software Defined Radio transceiver based on frequency shift keying using multiple encoding schemes

    Directory of Open Access Journals (Sweden)

    Nikhil Marriwala

    2016-03-01

    The aim of this paper was to analyze Frequency Shift Keying (FSK Transceiver built using Laboratory Virtual Instrumentation Engineering Workbench (LabVIEW and to measure the reduction in data errors in the presence of Forward Error Correction (FEC channel coding algorithms namely the Convolution and the Turbo Codes. Through this design a graphical representation of Bit Error Rate (BER vs Eb/N0 where (Eb is Energy per bit and (N0 is Spectral noise density has been given in the presence of Additive White Gaussian Noise (AWGN introduced in the channel. FSK is widely used for data transmission over band pass channels; hence, we have chosen FSK for the implementation of SDR. The SDR transceiver module designed has been fully implemented and has the ability to navigate over a wide range of frequencies with programmable channel bandwidth and modulation characteristics. We are able to build an interactive FSK based SDR transceiver in a shorter time with the use of LabVIEW. The outputs achieved show a low BER for very high data rates in the presence of AWGN noise.

  14. Influence of material choice on cost estimation of some key components of the Sulfur Iodine thermochemical process

    International Nuclear Information System (INIS)

    Gilardi, T.; Rodriguez, G.; Gomez, A.; Leybros, J.; Borgard, J.M.; Carles, P.; Anzieu, P.

    2006-01-01

    In the frame of the preliminary design of an sulfur/iodine thermochemical plant coupled with a 600 MWth Helium cooled High Temperature Reactor, CEA has pre-designed all the components of the I/S plant and has started to the cost estimation of all the key components with some industrial cost evaluation methods proposed by CHAUVEL or PETER and TIMMERHAUS. The purpose of the paper is to present the strong influence of material choice on final cost estimation of these key components by comparing price with standard material (steel) and the most appropriate material selected to support the strong corrosion involved by several chemical reactions of the I/S process. These results reinforce the fact that material selection must be done with the best accuracy and that it will be a key factor in the global economy of these plant investment. (authors)

  15. Suppression of 9-cis-epoxycarotenoid dioxygenase, which encodes a key enzyme in abscisic acid biosynthesis, alters fruit texture in transgenic tomato.

    Science.gov (United States)

    Sun, Liang; Sun, Yufei; Zhang, Mei; Wang, Ling; Ren, Jie; Cui, Mengmeng; Wang, Yanping; Ji, Kai; Li, Ping; Li, Qian; Chen, Pei; Dai, Shengjie; Duan, Chaorui; Wu, Yan; Leng, Ping

    2012-01-01

    Cell wall catabolism during fruit ripening is under complex control and is key for fruit quality and shelf life. To examine the role of abscisic acid (ABA) in tomato (Solanum lycopersicum) fruit ripening, we suppressed SlNCED1, which encodes 9-cis-epoxycarotenoid dioxygenase (NCED), a key enzyme in the biosynthesis of ABA. To suppress SlNCED1 specifically in tomato fruits, and thus avoid the pleiotropic phenotypes associated with ABA deficiency, we used an RNA interference construct driven by the fruit-specific E8 promoter. ABA accumulation and SlNCED1 transcript levels in the transgenic fruit were down-regulated to between 20% and 50% of the levels measured in the control fruit. This significant reduction in NCED activity led to a down-regulation in the transcription of genes encoding major cell wall catabolic enzymes, specifically polygalacturonase (SlPG), pectin methyl esterase (SlPME), β-galactosidase precursor mRNA (SlTBG), xyloglucan endotransglycosylase (SlXET), endo-1,4-β-cellulose (SlCels), and expansin (SlExp). This resulted in an increased accumulation of pectin during ripening. In turn, this led to a significant extension of the shelf life to 15 to 29 d compared with a shelf life of only 7 d for the control fruit and an enhancement of fruit firmness at the mature stage by 30% to 45%. In conclusion, ABA affects cell wall catabolism during tomato fruit ripening via down-regulation of the expression of major catabolic genes (SlPG, SlPME, SlTBG, SlXET, SlCels, and SlExp).

  16. Suppression of 9-cis-Epoxycarotenoid Dioxygenase, Which Encodes a Key Enzyme in Abscisic Acid Biosynthesis, Alters Fruit Texture in Transgenic Tomato1[W][OA

    Science.gov (United States)

    Sun, Liang; Sun, Yufei; Zhang, Mei; Wang, Ling; Ren, Jie; Cui, Mengmeng; Wang, Yanping; Ji, Kai; Li, Ping; Li, Qian; Chen, Pei; Dai, Shengjie; Duan, Chaorui; Wu, Yan; Leng, Ping

    2012-01-01

    Cell wall catabolism during fruit ripening is under complex control and is key for fruit quality and shelf life. To examine the role of abscisic acid (ABA) in tomato (Solanum lycopersicum) fruit ripening, we suppressed SlNCED1, which encodes 9-cis-epoxycarotenoid dioxygenase (NCED), a key enzyme in the biosynthesis of ABA. To suppress SlNCED1 specifically in tomato fruits, and thus avoid the pleiotropic phenotypes associated with ABA deficiency, we used an RNA interference construct driven by the fruit-specific E8 promoter. ABA accumulation and SlNCED1 transcript levels in the transgenic fruit were down-regulated to between 20% and 50% of the levels measured in the control fruit. This significant reduction in NCED activity led to a down-regulation in the transcription of genes encoding major cell wall catabolic enzymes, specifically polygalacturonase (SlPG), pectin methyl esterase (SlPME), β-galactosidase precursor mRNA (SlTBG), xyloglucan endotransglycosylase (SlXET), endo-1,4-β-cellulose (SlCels), and expansin (SlExp). This resulted in an increased accumulation of pectin during ripening. In turn, this led to a significant extension of the shelf life to 15 to 29 d compared with a shelf life of only 7 d for the control fruit and an enhancement of fruit firmness at the mature stage by 30% to 45%. In conclusion, ABA affects cell wall catabolism during tomato fruit ripening via down-regulation of the expression of major catabolic genes (SlPG, SlPME, SlTBG, SlXET, SlCels, and SlExp). PMID:22108525

  17. Suppressors of RNA silencing encoded by tomato leaf curl ...

    Indian Academy of Sciences (India)

    2013-01-06

    Jan 6, 2013 ... Virus encoded RNA-silencing suppressors (RSSs) are the key components evolved by the viruses to ... severe disease symptom in the host (Briddon et al. ..... Voinnet O 2001 RNA silencing as a plant immune system against.

  18. Fractionation of the component processes underlying successful episodic encoding: a combined fMRI and divided-attention study.

    Science.gov (United States)

    Uncapher, Melina R; Rugg, Michael D

    2008-02-01

    Considerable evidence suggests that attentional resources are necessary for the encoding of episodic memories, but the nature of the relationship between attention and neural correlates of encoding is unclear. Here we address this question using functional magnetic resonance imaging and a divided-attention paradigm in which competition for different types of attentional resources was manipulated. Fifteen volunteers were scanned while making animacy judgments to visually presented words and concurrently performing one of three tasks on auditorily presented words: male/female voice discrimination (control task), 1-back voice comparison (1-back task), or indoor/outdoor judgment (semantic task). The 1-back and semantic tasks were designed to compete for task-generic and task-specific attentional resources, respectively. Using the "remember/know" procedure, memory for the study words was assessed after 15 min. In the control condition, subsequent memory effects associated with later recollection were identified in the left dorsal inferior frontal gyrus and in the left hippocampus. These effects were differentially attenuated in the two more difficult divided-attention conditions. The effects of divided attention seem, therefore, to reflect impairments due to limitations at both task-generic and task-specific levels. Additionally, each of the two more difficult divided-attention conditions was associated with subsequent memory effects in regions distinct from those showing effects in the control condition. These findings suggest the engagement of alternative encoding processes to those engaged in the control task. The overall pattern of findings suggests that divided attention can impact later memory in different ways, and accordingly, that different attentional resources, including task-generic and task-specific resources, make distinct contributions to successful episodic encoding.

  19. Mutations in GLDN, Encoding Gliomedin, a Critical Component of the Nodes of Ranvier, Are Responsible for Lethal Arthrogryposis

    OpenAIRE

    Maluenda, J?r?me; Manso, Constance; Quevarec, Loic; Vivanti, Alexandre; Marguet, Florent; Gonzales, Marie; Guimiot, Fabien; Petit, Florence; Toutain, Annick; Whalen, Sandra; Grigorescu, Romulus; Coeslier, Anne?Dieux; Gut, Marta; Gut, Ivo; Laquerri?re, Annie

    2016-01-01

    Arthrogryposis multiplex congenita (AMC) is a developmental condition characterized by multiple joint contractures resulting from reduced or absent fetal movements. Through linkage analysis, homozygosity mapping, and exome sequencing in four unrelated families affected by lethal AMC, we identified biallelic mutations in GLDN in the affected individuals. GLDN encodes gliomedin, a secreted cell adhesion molecule involved in the formation of the nodes of Ranvier. Transmission electron microscopy...

  20. Key components in ehealth interventions combining self-tracking and persuasive ecoaching to promote a healthier lifestyle: a scoping review

    NARCIS (Netherlands)

    Lentferink, Aniek; Oldenhuis, Hilbrand; de Groot, Martijn; Polstra, Louis; Velthuijsen, Hugo; van Gemert-Pijnen, Lisette

    Background: The combination of self-tracking and persuasive eCoaching in automated interventions is a new and promising approach for healthy lifestyle management. Objective: The aim of this study was to identify key components of self-tracking and persuasive eCoaching in automated healthy lifestyle

  1. Decoding the encoding of functional brain networks: An fMRI classification comparison of non-negative matrix factorization (NMF), independent component analysis (ICA), and sparse coding algorithms.

    Science.gov (United States)

    Xie, Jianwen; Douglas, Pamela K; Wu, Ying Nian; Brody, Arthur L; Anderson, Ariana E

    2017-04-15

    Brain networks in fMRI are typically identified using spatial independent component analysis (ICA), yet other mathematical constraints provide alternate biologically-plausible frameworks for generating brain networks. Non-negative matrix factorization (NMF) would suppress negative BOLD signal by enforcing positivity. Spatial sparse coding algorithms (L1 Regularized Learning and K-SVD) would impose local specialization and a discouragement of multitasking, where the total observed activity in a single voxel originates from a restricted number of possible brain networks. The assumptions of independence, positivity, and sparsity to encode task-related brain networks are compared; the resulting brain networks within scan for different constraints are used as basis functions to encode observed functional activity. These encodings are then decoded using machine learning, by using the time series weights to predict within scan whether a subject is viewing a video, listening to an audio cue, or at rest, in 304 fMRI scans from 51 subjects. The sparse coding algorithm of L1 Regularized Learning outperformed 4 variations of ICA (pcoding algorithms. Holding constant the effect of the extraction algorithm, encodings using sparser spatial networks (containing more zero-valued voxels) had higher classification accuracy (pcoding algorithms suggests that algorithms which enforce sparsity, discourage multitasking, and promote local specialization may capture better the underlying source processes than those which allow inexhaustible local processes such as ICA. Negative BOLD signal may capture task-related activations. Copyright © 2017 Elsevier B.V. All rights reserved.

  2. Identifying key components for an effective case report poster: an observational study.

    Science.gov (United States)

    Willett, Lisa L; Paranjape, Anuradha; Estrada, Carlos

    2009-03-01

    Residents demonstrate scholarly activity by presenting posters at academic meetings. Although recommendations from national organizations are available, evidence identifying which components are most important is not. To develop and test an evaluation tool to measure the quality of case report posters and identify the specific components most in need of improvement. Faculty evaluators reviewed case report posters and provided on-site feedback to presenters at poster sessions of four annual academic general internal medicine meetings. A newly developed ten-item evaluation form measured poster quality for specific components of content, discussion, and format (5-point Likert scale, 1 = lowest, 5 = highest). Evaluation tool performance, including Cronbach alpha and inter-rater reliability, overall poster scores, differences across meetings and evaluators and specific components of the posters most in need of improvement. Forty-five evaluators from 20 medical institutions reviewed 347 posters. Cronbach's alpha of the evaluation form was 0.84 and inter-rater reliability, Spearman's rho 0.49 (p words. Our evaluation tool provides empirical data to guide trainees as they prepare posters for presentation which may improve poster quality and enhance their scholarly productivity.

  3. Association between Type 2 Diabetes, Obesity and Key Immunological Components of IgE-mediated Inflammation

    Directory of Open Access Journals (Sweden)

    Sokolova Raditsa N.

    2017-06-01

    Full Text Available Background: Changes in lifestyle and obesity in recent decades have brought about a dramatic increase in type 2 diabetes mellitus (DM2 and allergic diseases. Clinical and epidemiological studies associate obesity with epidemics of allergic diseases. The link between obesity and DM2 with immunological components of IgE-mediated allergic inflammation is not yet conclusively established.

  4. Gene expression profiling in Entamoeba histolytica identifies key components in iron uptake and metabolism.

    Directory of Open Access Journals (Sweden)

    Nora Adriana Hernández-Cuevas

    Full Text Available Entamoeba histolytica is an ameboid parasite that causes colonic dysentery and liver abscesses in humans. The parasite encounters dramatic changes in iron concentration during its invasion of the host, with relatively low levels in the intestinal lumen and then relatively high levels in the blood and liver. The liver notably contains sources of iron; therefore, the parasite's ability to use these sources might be relevant to its survival in the liver and thus the pathogenesis of liver abscesses. The objective of the present study was to identify factors involved in iron uptake, use and storage in E. histolytica. We compared the respective transcriptomes of E. histolytica trophozoites grown in normal medium (containing around 169 µM iron, low-iron medium (around 123 µM iron, iron-deficient medium (around 91 µM iron, and iron-deficient medium replenished with hemoglobin. The differentially expressed genes included those coding for the ATP-binding cassette transporters and major facilitator transporters (which share homology with bacterial siderophores and heme transporters and genes involved in heme biosynthesis and degradation. Iron deficiency was associated with increased transcription of genes encoding a subset of cell signaling molecules, some of which have previously been linked to adaptation to the intestinal environment and virulence. The present study is the first to have assessed the transcriptome of E. histolytica grown under various iron concentrations. Our results provide insights into the pathways involved in iron uptake and metabolism in this parasite.

  5. Gene expression profiling in Entamoeba histolytica identifies key components in iron uptake and metabolism.

    Science.gov (United States)

    Hernández-Cuevas, Nora Adriana; Weber, Christian; Hon, Chung-Chau; Guillen, Nancy

    2014-01-01

    Entamoeba histolytica is an ameboid parasite that causes colonic dysentery and liver abscesses in humans. The parasite encounters dramatic changes in iron concentration during its invasion of the host, with relatively low levels in the intestinal lumen and then relatively high levels in the blood and liver. The liver notably contains sources of iron; therefore, the parasite's ability to use these sources might be relevant to its survival in the liver and thus the pathogenesis of liver abscesses. The objective of the present study was to identify factors involved in iron uptake, use and storage in E. histolytica. We compared the respective transcriptomes of E. histolytica trophozoites grown in normal medium (containing around 169 µM iron), low-iron medium (around 123 µM iron), iron-deficient medium (around 91 µM iron), and iron-deficient medium replenished with hemoglobin. The differentially expressed genes included those coding for the ATP-binding cassette transporters and major facilitator transporters (which share homology with bacterial siderophores and heme transporters) and genes involved in heme biosynthesis and degradation. Iron deficiency was associated with increased transcription of genes encoding a subset of cell signaling molecules, some of which have previously been linked to adaptation to the intestinal environment and virulence. The present study is the first to have assessed the transcriptome of E. histolytica grown under various iron concentrations. Our results provide insights into the pathways involved in iron uptake and metabolism in this parasite.

  6. Design and Fabrication Technique of the Key Components for Very High Temperature Reactor

    Energy Technology Data Exchange (ETDEWEB)

    Lee, Ho Jin; Song, Ki Nam; Kim, Yong Wan

    2006-12-15

    The gas outlet temperature of Very High Temperature Reactor (VHTR) may be beyond the capability of conventional metallic materials. The requirement of the gas outlet temperature of 950 .deg. C will result in operating temperatures for metallic core components that will approach very high temperature on some cases. The materials that are capable of withstanding this temperature should be prepared, or nonmetallic materials will be required for limited components. The Ni-base alloys such as Alloy 617, Hastelloy X, XR, Incoloy 800H, and Haynes 230 are being investigated to apply them on components operated in high temperature. Currently available national and international codes and procedures are needed reviewed to design the components for HTGR/VHTR. Seven codes and procedures, including five ASME Codes and Code cases, one French code (RCC-MR), and on British Procedure (R5) were reviewed. The scope of the code and code cases needs to be expanded to include the materials with allowable temperatures of 950 .deg. C and higher. The selection of compact heat exchangers technology depends on the operating conditions such as pressure, flow rates, temperature, but also on other parameters such as fouling, corrosion, compactness, weight, maintenance and reliability. Welding, brazing, and diffusion bonding are considered proper joining processes for the heat exchanger operating in the high temperature and high pressure conditions without leakage. Because VHTRs require high temperature operations, various controlled materials, thick vessels, dissimilar metal joints, and precise controls of microstructure in weldment, the more advanced joining processes are needed than PWRs. The improved solid joining techniques are considered for the IHX fabrication. The weldability for Alloy 617 and Haynes 230 using GTAW and SMAW processes was investigated by CEA.

  7. A novel method for the quantification of key components of manual dexterity after stroke

    OpenAIRE

    T?r?metz, Maxime; Colle, Florence; Hamdoun, Sonia; Maier, Marc A.; Lindberg, P?vel G.

    2015-01-01

    Background A high degree of manual dexterity is a central feature of the human upper limb. A rich interplay of sensory and motor components in the hand and fingers allows for independent control of fingers in terms of timing, kinematics and force. Stroke often leads to impaired hand function and decreased manual dexterity, limiting activities of daily living and impacting quality of life. Clinically, there is a lack of quantitative multi-dimensional measures of manual dexterity. We therefore ...

  8. Design and Fabrication Technique of the Key Components for Very High Temperature Reactor

    International Nuclear Information System (INIS)

    Lee, Ho Jin; Song, Ki Nam; Kim, Yong Wan

    2006-12-01

    The gas outlet temperature of Very High Temperature Reactor (VHTR) may be beyond the capability of conventional metallic materials. The requirement of the gas outlet temperature of 950 .deg. C will result in operating temperatures for metallic core components that will approach very high temperature on some cases. The materials that are capable of withstanding this temperature should be prepared, or nonmetallic materials will be required for limited components. The Ni-base alloys such as Alloy 617, Hastelloy X, XR, Incoloy 800H, and Haynes 230 are being investigated to apply them on components operated in high temperature. Currently available national and international codes and procedures are needed reviewed to design the components for HTGR/VHTR. Seven codes and procedures, including five ASME Codes and Code cases, one French code (RCC-MR), and on British Procedure (R5) were reviewed. The scope of the code and code cases needs to be expanded to include the materials with allowable temperatures of 950 .deg. C and higher. The selection of compact heat exchangers technology depends on the operating conditions such as pressure, flow rates, temperature, but also on other parameters such as fouling, corrosion, compactness, weight, maintenance and reliability. Welding, brazing, and diffusion bonding are considered proper joining processes for the heat exchanger operating in the high temperature and high pressure conditions without leakage. Because VHTRs require high temperature operations, various controlled materials, thick vessels, dissimilar metal joints, and precise controls of microstructure in weldment, the more advanced joining processes are needed than PWRs. The improved solid joining techniques are considered for the IHX fabrication. The weldability for Alloy 617 and Haynes 230 using GTAW and SMAW processes was investigated by CEA

  9. Oleic acid is a key cytotoxic component of HAMLET-like complexes.

    Science.gov (United States)

    Permyakov, Sergei E; Knyazeva, Ekaterina L; Khasanova, Leysan M; Fadeev, Roman S; Zhadan, Andrei P; Roche-Hakansson, Hazeline; Håkansson, Anders P; Akatov, Vladimir S; Permyakov, Eugene A

    2012-01-01

    HAMLET is a complex of α-lactalbumin (α-LA) with oleic acid (OA) that selectively kills tumor cells and Streptococcus pneumoniae. To assess the contribution of the proteinaceous component to cytotoxicity of HAMLET, OA complexes with proteins structurally and functionally distinct from α-LA were prepared. Similar to HAMLET, the OA complexes with bovine β-lactoglobulin (bLG) and pike parvalbumin (pPA) (bLG-OA-45 and pPA-OA-45, respectively) induced S. pneumoniae D39 cell death. The activation mechanisms of S. pneumoniae death for these complexes were analogous to those for HAMLET, and the cytotoxicity of the complexes increased with OA content in the preparations. The half-maximal inhibitory concentration for HEp-2 cells linearly decreased with rise in OA content in the preparations, and OA concentration in the preparations causing HEp-2 cell death was close to the cytotoxicity of OA alone. Hence, the cytotoxic action of these complexes against HEp-2 cells is induced mostly by OA. Thermal stabilization of bLG upon association with OA implies that cytotoxicity of bLG-OA-45 complex cannot be ascribed to molten globule-like conformation of the protein component. Overall, the proteinaceous component of HAMLET-like complexes studied is not a prerequisite for their activity; the cytotoxicity of these complexes is mostly due to the action of OA.

  10. Identification of the key parameters defining the life of graphite core components

    International Nuclear Information System (INIS)

    Mitchell, M.N.

    2005-01-01

    The Core Structures of a Pebble Bed rector core comprise graphite reflectors constructed from blocks. These blocks are subject to high flux and temperatures as well as significant gradients in flux and temperature. This loading combined with the behaviour of graphite under irradiation gives rise to complex stress states within the reflector blocks. At some point, the stress state will reach a critical level and cracks will initiate within the blocks. The point of crack initiation is a useful point to define as the end of the part's life. The life of these graphite reflector parts in a pebble bed reactor (PBR) core determines the service life of the Core Structures. The replacement of the Core Structures' components will be a costly and time consuming. It is important that the components of the Core Structures be designed for the best life possible. As part of the conceptual design of the Pebble Bed Modular Reactor (PBMR), the assessment of the life of these components was examined. To facilitate the understanding of the parameters that influence the design life of the PBMR, a study has been completed into the effect of various design parameters on the design life of a typical side reflector block. Parameters investigated include: block geometry, material property variations, and load variations. The results of this study are to be presented. (author)

  11. Stakeholder engagement: a key component of integrating genomic information into electronic health records.

    Science.gov (United States)

    Hartzler, Andrea; McCarty, Catherine A; Rasmussen, Luke V; Williams, Marc S; Brilliant, Murray; Bowton, Erica A; Clayton, Ellen Wright; Faucett, William A; Ferryman, Kadija; Field, Julie R; Fullerton, Stephanie M; Horowitz, Carol R; Koenig, Barbara A; McCormick, Jennifer B; Ralston, James D; Sanderson, Saskia C; Smith, Maureen E; Trinidad, Susan Brown

    2013-10-01

    Integrating genomic information into clinical care and the electronic health record can facilitate personalized medicine through genetically guided clinical decision support. Stakeholder involvement is critical to the success of these implementation efforts. Prior work on implementation of clinical information systems provides broad guidance to inform effective engagement strategies. We add to this evidence-based recommendations that are specific to issues at the intersection of genomics and the electronic health record. We describe stakeholder engagement strategies employed by the Electronic Medical Records and Genomics Network, a national consortium of US research institutions funded by the National Human Genome Research Institute to develop, disseminate, and apply approaches that combine genomic and electronic health record data. Through select examples drawn from sites of the Electronic Medical Records and Genomics Network, we illustrate a continuum of engagement strategies to inform genomic integration into commercial and homegrown electronic health records across a range of health-care settings. We frame engagement as activities to consult, involve, and partner with key stakeholder groups throughout specific phases of health information technology implementation. Our aim is to provide insights into engagement strategies to guide genomic integration based on our unique network experiences and lessons learned within the broader context of implementation research in biomedical informatics. On the basis of our collective experience, we describe key stakeholder practices, challenges, and considerations for successful genomic integration to support personalized medicine.

  12. Two novel cyclic peptides are key components of the antimicrobial activity of the Greenlandic isolate Pseudomonas sp. In5

    DEFF Research Database (Denmark)

    Hennessy, Rosanna Catherine; Phippen, Christopher; Nielsen, Kristian F.

    suppressive soil, Pseudomonas sp. In5 is therefore a promising potential biocontrol agent with potent activity against plant pathogens. Studies to date have shown nunamycin and nunapeptin as key components underpinning this antimicrobial activity. Current research is focussed on unravelling the regulation...... and antimicrobial mode of action of both peptides. Functional characterisation of the LuxR-type regulatory gene nunF by targeted knock-out and complementation resulted in the loss and gain of both antimicrobial activity and peptide synthesis respectively. Located downstream of the nunamycin biosynthetic genes, nun......F shows homology to syrF from P. syringae pv. syringae involved in the regulation of the antifungal peptide syringomycin. These results show that nunF is a key component of antimicrobial activity and synthesis of nunamycin and nunapeptin....

  13. Cloning and functional analysis of 9-cis-epoxycarotenoid dioxygenase (NCED) genes encoding a key enzyme during abscisic acid biosynthesis from peach and grape fruits.

    Science.gov (United States)

    Zhang, Mei; Leng, Ping; Zhang, Guanglian; Li, Xiangxin

    2009-08-15

    Ripening and senescence are generally controlled by ethylene in climacteric fruits like peaches, and the ripening process of grape, a non-climacteric fruit, may have some relationship to abscisic acid (ABA) function. In order to better understand the role of ABA in ripening and senescence of these two types of fruits, we cloned the 9-cis-epoxycarotenoid dioxygenase (NCED) gene that encodes a key enzyme in ABA biosynthesis from peaches and grapes using an RT-PCR approach. The NCED gene fragments were cloned from peaches (PpNCED1and PpNCED2, each 740bp) and grapes (VVNCED1, 741bp) using degenerate primers designed based on the conserved amino acids sequence of NCEDs in other plants. PpNCED1 showed 78.54% homology with PpNCED2, 74.90% homology with VVNCED1, and both showed high homology to NCEDs from other plants. The expression patterns of PpNCED1 and VVNCED1 were very similar. Both were highly expressed at the beginning of ripening when ABA content becomes high. The maximum ABA preceded ethylene production in peach fruit. ABA in the grape gradually increased from the beginning of ripening and reached the highest level at 20d before the harvest stage. However, ethylene remained at low levels during the entire process of fruit development, including ripening and senescence. ABA content, and ripening and softening of both types of fruits, were promoted or delayed by exogenous ABA or Fluridone (or NDGA) treatment. The roles of ABA and ethylene in the later ripening of fruit are complex. Based on results obtained in this study, we concluded that PpNCED1 and VVNCED1 initiate ABA biosynthesis at the beginning of fruit ripening, and that ABA accumulation might play a key role in the regulation of ripeness and senescence of both peach and grape fruits.

  14. Prokaryotic homologs of Argonaute proteins are predicted to function as key components of a novel system of defense against mobile genetic elements

    Directory of Open Access Journals (Sweden)

    van der Oost John

    2009-08-01

    Full Text Available Abstract Background In eukaryotes, RNA interference (RNAi is a major mechanism of defense against viruses and transposable elements as well of regulating translation of endogenous mRNAs. The RNAi systems recognize the target RNA molecules via small guide RNAs that are completely or partially complementary to a region of the target. Key components of the RNAi systems are proteins of the Argonaute-PIWI family some of which function as slicers, the nucleases that cleave the target RNA that is base-paired to a guide RNA. Numerous prokaryotes possess the CRISPR-associated system (CASS of defense against phages and plasmids that is, in part, mechanistically analogous but not homologous to eukaryotic RNAi systems. Many prokaryotes also encode homologs of Argonaute-PIWI proteins but their functions remain unknown. Results We present a detailed analysis of Argonaute-PIWI protein sequences and the genomic neighborhoods of the respective genes in prokaryotes. Whereas eukaryotic Ago/PIWI proteins always contain PAZ (oligonucleotide binding and PIWI (active or inactivated nuclease domains, the prokaryotic Argonaute homologs (pAgos fall into two major groups in which the PAZ domain is either present or absent. The monophyly of each group is supported by a phylogenetic analysis of the conserved PIWI-domains. Almost all pAgos that lack a PAZ domain appear to be inactivated, and the respective genes are associated with a variety of predicted nucleases in putative operons. An additional, uncharacterized domain that is fused to various nucleases appears to be a unique signature of operons encoding the short (lacking PAZ pAgo form. By contrast, almost all PAZ-domain containing pAgos are predicted to be active nucleases. Some proteins of this group (e.g., that from Aquifex aeolicus have been experimentally shown to possess nuclease activity, and are not typically associated with genes for other (putative nucleases. Given these observations, the apparent extensive

  15. Anorexia of ageing: a key component in the pathogenesis of both sarcopenia and cachexia.

    Science.gov (United States)

    Morley, John E

    2017-08-01

    The anorexia of aging was first recognized as a physiological syndrome 30 years ago. Its major causes are an alteration in fundal compliance with an increase in antral stretch and enhanced cholecystokinin activity leading to increased satiation.This anorexia leads to weight loss in aging persons and is one of the component causes of the aging related sarcopenia. This physiological anorexia also increases the risk of more severe anorexia when an older person has an increase in inflammatory cytokines such as occurs when they have an illness. This results in an increase in the anorexia due to cachexia in older persons. © 2017 The Authors. Journal of Cachexia, Sarcopenia and Muscle published by John Wiley & Sons Ltd on behalf of the Society on Sarcopenia, Cachexia and Wasting Disorders.

  16. Satellite lidar and radar: Key components of the future climate observing system

    Science.gov (United States)

    Winker, D. M.

    2017-12-01

    Cloud feedbacks represent the dominant source of uncertainties in estimates of climate sensitivity and aerosols represent the largest source of uncertainty in climate forcing. Both observation of long-term changes and observational constraints on the processes responsible for those changes are necessary. The existing 30-year record of passive satellite observations has not yet provided constraints to significantly reduce these uncertainties, though. We now have more than a decade of experience with active sensors flying in the A-Train. These new observations have demonstrated the strengths of active sensors and the benefits of continued and more advanced active sensors. This talk will discuss the multiple roles for active sensors as an essential component of a global climate observing system.

  17. Key components of effective collaborative goal setting in the chronic care encounter.

    Science.gov (United States)

    Bigi, Sarah

    2014-01-01

    Collaborative goal setting in patient-provider communication with chronic patients is the phase in which--after collecting the data regarding the patient's health--it is necessary to make a decision regarding the best therapy and behaviors the patient should adopt until the next encounter. Although it is considered a pivotal phase of shared decision making, there remain a few open questions regarding its components and its efficacy: What are the factors that improve or impede agreement on treatment goals and strategies?; What are the 'success conditions' of collaborative goal setting?; How can physicians effectively help patients make their preferences explicit and then co-construct with them informed preferences to help them reach their therapeutic goals? Using the theoretical framework of dialogue types, an approach developed in the field of Argumentation Theory, it will be possible to formulate hypotheses on the success conditions' and effects on patient commitment of collaborative goal setting.

  18. Periostin Is a Key Niche Component for Wound Metastasis of Melanoma.

    Directory of Open Access Journals (Sweden)

    Keitaro Fukuda

    Full Text Available Tissue injury promotes metastasis of several human cancers, although factors associated with wound healing that attract circulating tumor cells have remained unknown. Here, we examined the primary and metastatic lesions that appeared 1 month after trauma in a patient with acral lentiginous melanoma. The levels of mRNA for periostin (POSTN, type 1 collagen, and fibronectin were significantly increased in the metastatic lesion relative to the primary lesion. The increase of these extracellular matrix proteins at the wound site was reproduced in a mouse model of wound healing, with the upregulation of Postn mRNA persisting the longest. POSTN was expressed in the region surrounding melanoma cell nests in metastatic lesions of both wounded mice and the patient. POSTN attenuated the cell adhesion and promoted the migration of melanoma cells without affecting their proliferation in vitro. In the mouse model, the wound site as well as subcutaneously injected osteoblasts that secrete large amounts of POSTN invited the metastasis of remotely-transplanted melanoma cells on the sites. Osteoblasts with suppression of POSTN by shRNA showed a greatly reduced ability to promote such metastasis. Our results suggest that POSTN is a key factor in promoting melanoma cell metastasis to wound sites by providing a premetastatic niche.

  19. Asthma referrals: a key component of asthma management that needs to be addressed

    Directory of Open Access Journals (Sweden)

    Price D

    2017-07-01

    Full Text Available David Price,1,2 Leif Bjermer,3 David A Bergin,4 Rafael Martinez5 1Centre of Academic Primary Care, University of Aberdeen, Aberdeen, UK; 2Observational and Pragmatic Research Institute, Singapore; 3Department of Respiratory Medicine and Allergology, Lund University, Lund, Sweden; 4Novartis Ireland Limited, Dublin, Ireland; 5Novartis Pharma AG, Basel, Switzerland Abstract: Heterogeneity of asthma and difficulty in achieving optimal control are the major challenges in the management of asthma. To help attain the best possible clinical outcomes in patients with asthma, several guidelines provide recommendations for patients who will require a referral to a specialist. Such referrals can help in clearing the uncertainty from the initial diagnosis, provide tailored treatment options to patients with persistent symptoms and offer the patients access to health care providers with expertise in the management of the asthma; thus, specialist referrals have a substantial impact on disease prognosis and the patient’s health status. Hurdles in implementing these recommendations include lack of their dissemination among health care providers and nonadherence to these guidelines; these hurdles considerably limit the implementation of specialist referrals, eventually affecting the rate of referrals. In this review, recommendations for specialist referrals from several key international and national asthma guidelines and other relevant published literature are evaluated. Furthermore, we highlight why referrals are not happening, how this can be improved, and ultimately, what should be done in the specialist setting, based on existing evidence in published literature. Keywords: asthma, disease management, specialization, primary care physicians, referral

  20. Temporal Expression of the Bacillus subtilis secA Gene, Encoding a Central Component of the Preprotein Translocase

    NARCIS (Netherlands)

    Herbort, Markus; Klein, Michael; Manting, Erik H.; Driessen, Arnold J.M.; Freudl, Roland

    1999-01-01

    In Bacillus subtilis, the secretion of extracellular proteins strongly increases upon transition from exponential growth to the stationary growth phase. It is not known whether the amounts of some or all components of the protein translocation apparatus are concomitantly increased in relation to the

  1. Recruitment and Selection of Staff - Key Components for the Reform of the Romanian Police

    Directory of Open Access Journals (Sweden)

    Valeria-Liliana-Amelia Purda-Nicoară (Netotea-Suciu

    2011-05-01

    Full Text Available Human resource management is a complex and dynamic process, whose components interrelate and reinforce one another, constantly evolving due to internal influences or because of external pressures. This is a cyclical process, and its "beginning" is represented by the recruitment and selection of staff. In the present context, when the labor market has changed so dramatically, and the demands of the employers are also ever more complex, these activities prove to be essential for the further development and success of any organization. This happens because recruitment and selection of the most suitable people result in obtaining employees who possess multiple skills and qualifications, and who are able to readily obtain high performance, an enhancement of their motivations, building a strong and lasting team, and thus ensure excellent results for the company and the ability to adapt to the present day continuous changes. Therefore, professionally addressing the Romanian Police staff recruitment and selection is absolutely necessary. If the recruitment activities will point out the most suitable people, with potential for development in the organization, a quality selection activity may be the guarantee of identifying the candidates who have the knowledge, skills and abilities needed to transform the potential capabilities into professionalism. Only organizations that will know how to build multidisciplinary, competent and motivated teams will be ready to face new challenges.

  2. Two key temporally distinguishable molecular and cellular components of white adipose tissue browning during cold acclimation.

    Science.gov (United States)

    Jankovic, Aleksandra; Golic, Igor; Markelic, Milica; Stancic, Ana; Otasevic, Vesna; Buzadzic, Biljana; Korac, Aleksandra; Korac, Bato

    2015-08-01

    White to brown adipose tissue conversion and thermogenesis can be ignited by different conditions or agents and its sustainability over the long term is still unclear. Browning of rat retroperitoneal white adipose tissue (rpWAT) during cold acclimation involves two temporally apparent components: (1) a predominant non-selective browning of most adipocytes and an initial sharp but transient induction of uncoupling protein 1, peroxisome proliferator-activated receptor (PPAR) coactivator-1α, PPARγ and PPARα expression, and (2) the subsistence of relatively few thermogenically competent adipocytes after 45 days of cold acclimation. The different behaviours of two rpWAT beige/brown adipocyte subsets control temporal aspects of the browning process, and thus regulation of both components may influence body weight and the potential successfulness of anti-obesity therapies. Conversion of white into brown adipose tissue may have important implications in obesity resistance and treatment. Several browning agents or conditions ignite thermogenesis in white adipose tissue (WAT). To reveal the capacity of WAT to function in a brownish/burning mode over the long term, we investigated the progression of the rat retroperitoneal WAT (rpWAT) browning during 45 days of cold acclimation. During the early stages of cold acclimation, the majority of rpWAT adipocytes underwent multilocularization and thermogenic-profile induction, as demonstrated by the presence of a multitude of uncoupling protein 1 (UCP1)-immunopositive paucilocular adipocytes containing peroxisome proliferator-activated receptor (PPAR) coactivator-1α (PGC-1α) and PR domain-containing 16 (PRDM16) in their nuclei. After 45 days, all adipocytes remained PRDM16 immunopositive, but only a few multilocular adipocytes rich in mitochondria remained UCP1/PGC-1α immunopositive. Molecular evidence showed that thermogenic recruitment of rpWAT occurred following cold exposure, but returned to starting levels after cold

  3. Translational control and differential RNA decay are key elements regulating postsegregational expression of the killer protein encoded by the parB locus of plasmid R1

    DEFF Research Database (Denmark)

    Gerdes, K; Helin, K; Christensen, O W

    1988-01-01

    The parB locus of plasmid R1, which mediates plasmid stability via postsegregational killing of plasmid-free cells, encodes two genes, hok and sok. The hok gene product is a potent cell-killing protein. The hok gene is regulated at the translational level by the sok gene-encoded repressor, a small...

  4. The Prediction of Key Cytoskeleton Components Involved in Glomerular Diseases Based on a Protein-Protein Interaction Network.

    Science.gov (United States)

    Ding, Fangrui; Tan, Aidi; Ju, Wenjun; Li, Xuejuan; Li, Shao; Ding, Jie

    2016-01-01

    Maintenance of the physiological morphologies of different types of cells and tissues is essential for the normal functioning of each system in the human body. Dynamic variations in cell and tissue morphologies depend on accurate adjustments of the cytoskeletal system. The cytoskeletal system in the glomerulus plays a key role in the normal process of kidney filtration. To enhance the understanding of the possible roles of the cytoskeleton in glomerular diseases, we constructed the Glomerular Cytoskeleton Network (GCNet), which shows the protein-protein interaction network in the glomerulus, and identified several possible key cytoskeletal components involved in glomerular diseases. In this study, genes/proteins annotated to the cytoskeleton were detected by Gene Ontology analysis, and glomerulus-enriched genes were selected from nine available glomerular expression datasets. Then, the GCNet was generated by combining these two sets of information. To predict the possible key cytoskeleton components in glomerular diseases, we then examined the common regulation of the genes in GCNet in the context of five glomerular diseases based on their transcriptomic data. As a result, twenty-one cytoskeleton components as potential candidate were highlighted for consistently down- or up-regulating in all five glomerular diseases. And then, these candidates were examined in relation to existing known glomerular diseases and genes to determine their possible functions and interactions. In addition, the mRNA levels of these candidates were also validated in a puromycin aminonucleoside(PAN) induced rat nephropathy model and were also matched with existing Diabetic Nephropathy (DN) transcriptomic data. As a result, there are 15 of 21 candidates in PAN induced nephropathy model were consistent with our predication and also 12 of 21 candidates were matched with differentially expressed genes in the DN transcriptomic data. By providing a novel interaction network and prediction, GCNet

  5. Brain insulin signaling: a key component of cognitive processes and a potential basis for cognitive impairment in type 2 diabetes

    Science.gov (United States)

    McNay, Ewan C.; Recknagel, Andrew K.

    2011-01-01

    Understanding of the role of insulin in the brain has gradually expanded, from initial conceptions of the brain as insulin-insensitive through identification of a role in regulation of feeding to recent demonstration of insulin as a key component of hippocampal memory processes. Conversely, systemic insulin resistance such as that seen in type 2 diabetes is associated with a range of cogntive and neural deficits. Here we review the evidence for insulin as a cognitive and neural modulator, including potential effector mechanisms, and examine the impact that type 2 diabetes has on these mechanisms in order to identify likely bases for the cognitive impairments seen in type 2 diabetic patients. PMID:21907815

  6. The Drosophila Duox maturation factor is a key component of a positive feedback loop that sustains regeneration signaling.

    Science.gov (United States)

    Khan, Sumbul Jawed; Abidi, Syeda Nayab Fatima; Skinner, Andrea; Tian, Yuan; Smith-Bolton, Rachel K

    2017-07-01

    Regenerating tissue must initiate the signaling that drives regenerative growth, and sustain that signaling long enough for regeneration to complete. How these key signals are sustained is unclear. To gain a comprehensive view of the changes in gene expression that occur during regeneration, we performed whole-genome mRNAseq of actively regenerating tissue from damaged Drosophila wing imaginal discs. We used genetic tools to ablate the wing primordium to induce regeneration, and carried out transcriptional profiling of the regeneration blastema by fluorescently labeling and sorting the blastema cells, thus identifying differentially expressed genes. Importantly, by using genetic mutants of several of these differentially expressed genes we have confirmed that they have roles in regeneration. Using this approach, we show that high expression of the gene moladietz (mol), which encodes the Duox-maturation factor NIP, is required during regeneration to produce reactive oxygen species (ROS), which in turn sustain JNK signaling during regeneration. We also show that JNK signaling upregulates mol expression, thereby activating a positive feedback signal that ensures the prolonged JNK activation required for regenerative growth. Thus, by whole-genome transcriptional profiling of regenerating tissue we have identified a positive feedback loop that regulates the extent of regenerative growth.

  7. Recent Progress on the Key Materials and Components for Proton Exchange Membrane Fuel Cells in Vehicle Applications

    Directory of Open Access Journals (Sweden)

    Cheng Wang

    2016-07-01

    Full Text Available Fuel cells are the most clean and efficient power source for vehicles. In particular, proton exchange membrane fuel cells (PEMFCs are the most promising candidate for automobile applications due to their rapid start-up and low-temperature operation. Through extensive global research efforts in the latest decade, the performance of PEMFCs, including energy efficiency, volumetric and mass power density, and low temperature startup ability, have achieved significant breakthroughs. In 2014, fuel cell powered vehicles were introduced into the market by several prominent vehicle companies. However, the low durability and high cost of PEMFC systems are still the main obstacles for large-scale industrialization of this technology. The key materials and components used in PEMFCs greatly affect their durability and cost. In this review, the technical progress of key materials and components for PEMFCs has been summarized and critically discussed, including topics such as the membrane, catalyst layer, gas diffusion layer, and bipolar plate. The development of high-durability processing technologies is also introduced. Finally, this review is concluded with personal perspectives on the future research directions of this area.

  8. Overexpressing key component genes of the secretion pathway for enhanced secretion of an Aspergillus niger glucose oxidase in Trichoderma reesei.

    Science.gov (United States)

    Wu, Yilan; Sun, Xianhua; Xue, Xianli; Luo, Huiying; Yao, Bin; Xie, Xiangming; Su, Xiaoyun

    2017-11-01

    Vast interest exists in developing T. reesei for production of heterologous proteins. Although rich genomic and transcriptomic information has been uncovered for the T. reesei secretion pathway, little is known about whether engineering its key components could enhance expression of a heterologous gene. In this study, snc1, a v-SNARE gene, was first selected for overexpression in T. reesei. In engineered T. reesei with additional copies of snc1, the Aspergillus niger glucose oxidase (AnGOD) was produced to a significantly higher level (2.2-fold of the parental strain). hac1 and bip1, two more component genes in the secretion pathway, were further tested for overexpression and found to be also beneficial for AnGOD secretion. The overexpression of one component gene more or less affected the expression of the other two genes, suggesting a complex regulating mechanism. Our study demonstrates the potential of engineering the secretion pathway for enhancing heterologous gene production in T. reesei. Copyright © 2017 Elsevier Inc. All rights reserved.

  9. Divergent mechanisms underlie Smad4-mediated positive regulation of the three genes encoding the basement membrane component laminin-332 (laminin-5)

    International Nuclear Information System (INIS)

    Zboralski, Dirk; Böckmann, Miriam; Zapatka, Marc; Hoppe, Sabine; Schöneck, Anna; Hahn, Stephan A; Schmiegel, Wolff; Schwarte-Waldhoff, Irmgard

    2008-01-01

    Functional inactivation of the tumor suppressor Smad4 in colorectal and pancreatic carcinogenesis occurs coincident with the transition to invasive growth. Breaking the basement membrane (BM) barrier, a prerequisite for invasive growth, can be due to tumor induced proteolytic tissue remodeling or to reduced synthesis of BM molecules by incipient tumor cells. Laminin-332 (laminin-5), a heterotrimeric BM component composed of α3-, β3- and γ2-chains, has recently been identified as a target structure of Smad4 and represents the first example for expression control of an essential BM component by a tumor and invasion suppressor. Biochemically Smad4 is a transmitter of signals of the TGFβ superfamily of cytokines. We have reported previously, that Smad4 functions as a positive transcriptional regulator of constitutive and of TGFβ-induced transcription of all three genes encoding Laminin-332, LAMA3, LAMB3 and LAMC2. Promoter-reporter constructs harboring 4 kb upstream regions, each of the three genes encoding Laminin-322 as well as deletion and mutations constructs were established. Promoter activities and TGFβ induction were assayed through transient transfections in Smad4-negative human cancer cells and their stable Smad4-positive derivatives. Functionally relevant binding sites were subsequently confirmed through chromatin immunoprecipitation. Herein, we report that Smad4 mediates transcriptional regulation through three different mechanisms, namely through Smad4 binding to a functional SBE site exclusively in the LAMA3 promoter, Smad4 binding to AP1 (and Sp1) sites presumably via interaction with AP1 family components and lastly a Smad4 impact on transcription of AP1 factors. Whereas Smad4 is essential for positive regulation of all three genes, the molecular mechanisms are significantly divergent between the LAMA3 promoter as compared to the LAMB3 and LAMC2 promoters. We hypothesize that this divergence in modular regulation of the three promoters may lay the

  10. Modified Principal Component Analysis for Identifying Key Environmental Indicators and Application to a Large-Scale Tidal Flat Reclamation

    Directory of Open Access Journals (Sweden)

    Kejian Chu

    2018-01-01

    Full Text Available Identification of the key environmental indicators (KEIs from a large number of environmental variables is important for environmental management in tidal flat reclamation areas. In this study, a modified principal component analysis approach (MPCA has been developed for determining the KEIs. The MPCA accounts for the two important attributes of the environmental variables: pollution status and temporal variation, in addition to the commonly considered numerical divergence attribute. It also incorporates the distance correlation (dCor to replace the Pearson’s correlation to measure the nonlinear interrelationship between the variables. The proposed method was applied to the Tiaozini sand shoal, a large-scale tidal flat reclamation region in China. Five KEIs were identified as dissolved inorganic nitrogen, Cd, petroleum in the water column, Hg, and total organic carbon in the sediment. The identified KEIs were shown to respond well to the biodiversity of phytoplankton. This demonstrated that the identified KEIs adequately represent the environmental condition in the coastal marine system. Therefore, the MPCA is a practicable method for extracting effective indicators that have key roles in the coastal and marine environment.

  11. VfrB Is a Key Activator of the Staphylococcus aureus SaeRS Two-Component System.

    Science.gov (United States)

    Krute, Christina N; Rice, Kelly C; Bose, Jeffrey L

    2017-03-01

    In previous studies, we identified the fatty acid kinase virulence factor regulator B (VfrB) as a potent regulator of α-hemolysin and other virulence factors in Staphylococcus aureus In this study, we demonstrated that VfrB is a positive activator of the SaeRS two-component regulatory system. Analysis of vfrB , saeR , and saeS mutant strains revealed that VfrB functions in the same pathway as SaeRS. At the transcriptional level, the promoter activities of SaeRS class I ( coa ) and class II ( hla ) target genes were downregulated during the exponential growth phase in the vfrB mutant, compared to the wild-type strain. In addition, saePQRS expression was decreased in the vfrB mutant strain, demonstrating a need for this protein in the autoregulation of SaeRS. The requirement for VfrB-mediated activation was circumvented when SaeS was constitutively active due to an SaeS (L18P) substitution. Furthermore, activation of SaeS via human neutrophil peptide 1 (HNP-1) overcame the dependence on VfrB for transcription from class I Sae promoters. Consistent with the role of VfrB in fatty acid metabolism, hla expression was decreased in the vfrB mutant with the addition of exogenous myristic acid. Lastly, we determined that aspartic acid residues D38 and D40, which are predicted to be key to VfrB enzymatic activity, were required for VfrB-mediated α-hemolysin production. Collectively, this study implicates VfrB as a novel accessory protein needed for the activation of SaeRS in S. aureus IMPORTANCE The SaeRS two-component system is a key regulator of virulence determinant production in Staphylococcus aureus Although the regulon of this two-component system is well characterized, the activation mechanisms, including the specific signaling molecules, remain elusive. Elucidating the complex regulatory circuit of SaeRS regulation is important for understanding how the system contributes to disease causation by this pathogen. To this end, we have identified the fatty acid kinase

  12. Stakeholders perspectives on the key components of community-based interventions coordinating care in dementia: a qualitative systematic review.

    Science.gov (United States)

    Backhouse, Amy; Richards, David A; McCabe, Rose; Watkins, Ross; Dickens, Chris

    2017-11-22

    Interventions aiming to coordinate services for the community-based dementia population vary in components, organisation and implementation. In this review we aimed to investigate the views of stakeholders on the key components of community-based interventions coordinating care in dementia. We searched four databases from inception to June 2015; Medline, The Cochrane Library, EMBASE and PsycINFO, this was aided by a search of four grey literature databases, and backward and forward citation tracking of included papers. Title and abstract screening was followed by a full text screen by two independent reviewers, and quality was assessed using the CASP appraisal tool. We then conducted thematic synthesis on extracted data. A total of seven papers from five independent studies were included in the review, and encompassed the views of over 100 participants from three countries. Through thematic synthesis we identified 32 initial codes that were grouped into 5 second-order themes: (1) case manager had four associated codes and described preferences for the case manager personal and professional attributes, including a sound knowledge in dementia and availability of local services; (2) communication had five associated codes and emphasized the importance stakeholders placed on multichannel communication with service users, as well as between multidisciplinary teams and across organisations; (3) intervention had 11 associated codes which focused primarily on the practicalities of implementation such as the contact type and frequency between case managers and service users, and the importance of case manager training and service evaluation; (4) resources had five associated codes which outlined stakeholder views on the required resources for coordinating interventions and potential overlap with existing resources, as well as arising issues when available resources do not meet those required for successful implementation; and (5) support had seven associated codes that

  13. Stakeholders perspectives on the key components of community-based interventions coordinating care in dementia: a qualitative systematic review

    Directory of Open Access Journals (Sweden)

    Amy Backhouse

    2017-11-01

    Full Text Available Abstract Background Interventions aiming to coordinate services for the community-based dementia population vary in components, organisation and implementation. In this review we aimed to investigate the views of stakeholders on the key components of community-based interventions coordinating care in dementia. Methods We searched four databases from inception to June 2015; Medline, The Cochrane Library, EMBASE and PsycINFO, this was aided by a search of four grey literature databases, and backward and forward citation tracking of included papers. Title and abstract screening was followed by a full text screen by two independent reviewers, and quality was assessed using the CASP appraisal tool. We then conducted thematic synthesis on extracted data. Results A total of seven papers from five independent studies were included in the review, and encompassed the views of over 100 participants from three countries. Through thematic synthesis we identified 32 initial codes that were grouped into 5 second-order themes: (1 case manager had four associated codes and described preferences for the case manager personal and professional attributes, including a sound knowledge in dementia and availability of local services; (2 communication had five associated codes and emphasized the importance stakeholders placed on multichannel communication with service users, as well as between multidisciplinary teams and across organisations; (3 intervention had 11 associated codes which focused primarily on the practicalities of implementation such as the contact type and frequency between case managers and service users, and the importance of case manager training and service evaluation; (4 resources had five associated codes which outlined stakeholder views on the required resources for coordinating interventions and potential overlap with existing resources, as well as arising issues when available resources do not meet those required for successful implementation

  14. A host basal transcription factor is a key component for infection of rice by TALE-carrying bacteria.

    Science.gov (United States)

    Yuan, Meng; Ke, Yinggen; Huang, Renyan; Ma, Ling; Yang, Zeyu; Chu, Zhaohui; Xiao, Jinghua; Li, Xianghua; Wang, Shiping

    2016-07-29

    Transcription activator-like effectors (TALEs) are sequence-specific DNA binding proteins found in a range of plant pathogenic bacteria, where they play important roles in host-pathogen interactions. However, it has been unclear how TALEs, after they have been injected into the host cells, activate transcription of host genes required for infection success. Here, we show that the basal transcription factor IIA gamma subunit TFIIAγ5 from rice is a key component for infection by the TALE-carrying bacterium Xanthomonas oryzae pv. oryzae, the causal agent for bacterial blight. Direct interaction of several TALEs with TFIIAγ5 is required for activation of disease susceptibility genes. Conversely, reduced expression of the TFIIAγ5 host gene limits the induction of susceptibility genes and thus decreases bacterial blight symptoms. Suppression or mutation of TFIIAγ5 can also reduce bacterial streak, another devastating disease of rice caused by TALE-carrying X. oryzae pv. oryzicola. These results have important implications for formulating a widely applicable strategy with which to improve resistance of plants to TALE-carrying pathogens.

  15. Nuclear power plant life management. An overview of identification of key components in relation with degradation mechanism - IAEA guidelines presentation

    International Nuclear Information System (INIS)

    Bezdikian, Georges

    2005-01-01

    Nuclear Power Plant (NPP) lifetime has a direct bearing on the cost of the electricity generated from it. The annual unit cost of electricity is dependent upon the operational time, and also annual costs and the capital cost assumptions function of Euros/kw. If the actual NPP lifetime has been underestimated then an economic penalty could be incurred. But the ageing degradation, of nuclear power plants is an important aspect that requires to be addressed to ensure: - that necessary safety margins are maintained throughout service life; - the adequate reliability and therefore the economic viability of older plants is maintained; - that unforeseen an uncontrolled degradation of critical plant components does not foreshorten the plant lifetime. Accommodating the inevitable obsolescence of some components has also to be addressed during plant life. Plant lifetime management requires the identification and life assessment of those components which not only limit the lifetime of the plant but also those which cannot be reasonably replaced. The planned replacement of major or 'key' components needs to be considered - where economic considerations will largely dictate replacement or the alternative strategy of power plant decommissioning. The necessary but timely planning for maintenance and replacements is a necessary consideration so that functions and reliability are maintained. The reasons for the current increasing attention in the area of plant life management are diverse and range from the fact that many of the older plants are approaching for the oldest plants more than 30 years in operation, and for important number of NPPs between 20 and 30 years. The impact of plant life management on the economics of generating electricity is the subject of ongoing studies and it can readily be seen that there can be both savings and additional costs associated with these activities. Not all degradation processes will be of significance in eroding safety margins and there is a

  16. Expression of factors and key components associated with the PI3K signaling pathway in colon cancer.

    Science.gov (United States)

    Chen, Hua; Gao, Junyi; Du, Zhenhua; Zhang, Xuequn; Yang, Fei; Gao, Wei

    2018-04-01

    The pathophysiology of colorectal cancer (CRC) has not been fully elucidated. The dysregulation of the phosphatidylinositol 3-kinase (PI3K) signaling pathway frequently contributes to the tumorigenesis and progression of human cancer. The aim of the present study was to explore the expression and clinical significance of a number of associated factors and key components of the PI3K signaling pathway, including phosphatidylinositol-4,5-bisphosphate 3-kinase catalytic subunit α (p110α), phosphorylated protein kinase B (p-Akt) Ser473, p-mammalian target of rapamycin (mTOR) Ser2448, cyclin D1, cyclin dependent kinase (CDK)4, RELA proto-oncogene, nuclear factor-κβ subunit (p65), Ras and extracellular signal-regulated kinase (ERK)1/2 in human CRC. The expression of target proteins was detected using immunohistochemistry (IHC) in 65 CRC cases and 15 colonic adenoma cases. The association between the expression of target proteins and clinical pathological parameters was analyzed using a χ 2 test. IHC results revealed that the expression of all target proteins was significantly increased in CRC tissues compared with in colonic adenoma tissues (P0.05). Cyclin D1, CDK4 and Ras were revealed to be expressed significantly higher in poorly differentiated CRC compared with moderately differentiated CRC (Pcancer tissues with lymph node metastasis compared with cancer tissues without lymph node metastasis (P<0.05). These results suggest that the target proteins may all participate in the tumorigenesis of CRC. Furthermore, cyclin D1, CDK4, Ras, p65 and ERK1/2 may be important in the progression of CRC. The results of the present study may provide novel predictive factors and therapeutic targets for CRC.

  17. Constructing a Cross-Domain Resource Inventory: Key Components and Results of the EarthCube CINERGI Project.

    Science.gov (United States)

    Zaslavsky, I.; Richard, S. M.; Malik, T.; Hsu, L.; Gupta, A.; Grethe, J. S.; Valentine, D. W., Jr.; Lehnert, K. A.; Bermudez, L. E.; Ozyurt, I. B.; Whitenack, T.; Schachne, A.; Giliarini, A.

    2015-12-01

    While many geoscience-related repositories and data discovery portals exist, finding information about available resources remains a pervasive problem, especially when searching across multiple domains and catalogs. Inconsistent and incomplete metadata descriptions, disparate access protocols and semantic differences across domains, and troves of unstructured or poorly structured information which is hard to discover and use are major hindrances toward discovery, while metadata compilation and curation remain manual and time-consuming. We report on methodology, main results and lessons learned from an ongoing effort to develop a geoscience-wide catalog of information resources, with consistent metadata descriptions, traceable provenance, and automated metadata enhancement. Developing such a catalog is the central goal of CINERGI (Community Inventory of EarthCube Resources for Geoscience Interoperability), an EarthCube building block project (earthcube.org/group/cinergi). The key novel technical contributions of the projects include: a) development of a metadata enhancement pipeline and a set of document enhancers to automatically improve various aspects of metadata descriptions, including keyword assignment and definition of spatial extents; b) Community Resource Viewers: online applications for crowdsourcing community resource registry development, curation and search, and channeling metadata to the unified CINERGI inventory, c) metadata provenance, validation and annotation services, d) user interfaces for advanced resource discovery; and e) geoscience-wide ontology and machine learning to support automated semantic tagging and faceted search across domains. We demonstrate these CINERGI components in three types of user scenarios: (1) improving existing metadata descriptions maintained by government and academic data facilities, (2) supporting work of several EarthCube Research Coordination Network projects in assembling information resources for their domains

  18. [PRODUCT OF THE BMI1--A KEY COMPONENT OF POLYCOMB--POSITIVELY REGULATES ADIPOCYTE DIFFERENTIATION OF MOUSE MESENCHYMAL STEM CELLS].

    Science.gov (United States)

    Petrov, N S; Vereschagina, N A; Sushilova, E N; Kropotov, A V; Miheeva, N F; Popov, B V

    2016-01-01

    Bmil is a key component of Polycomb (PcG), which in mammals controls the basic functions of mammalian somatic stem cells (SSC) such as self-renewal and differentiation. Bmi1 supports SSC via transcriptional suppression of genes associated with cell cycle and differentiation. The most studied target genes of Bmi1 are the genes of Ink4 locus, CdkI p16(Ink4a) and p1(Arf), suppression of which due to activating mutations of the BMI1 results in formation of cancer stem cells (CSC) and carcinomas in various tissues. In contrast, inactivation of BMI1 results in cell cycle arrest and cell senescence. Although clinical phenomena of hypo- and hyperactivation of BMI1 are well known, its targets and mechanisms of regulation of tissue specific SSC are still obscure. The goal of this study was to evaluate the regulatory role of BMI1 in adipocyte differentiation (AD) of mouse mesenchymal stem cells (MSC). Induction of AD in mouse MSC of the C3H10T1/2 cell line was associated with an increase in the expression levels of BMI1, the genes of pRb family (RB, p130) and demethylase UTX, but not methyltransferase EZH2, whose products regulate the methylation levels of H3K27. It was observed earlier that H3K27me3 may play the role of the epigenetic switch by promoting AD of human MSC via activating expression of the PPARγ2, the master gene of AD (Hemming et al., 2014). Here we show that inactivation of BMI1 using specific siRNA slows and decreases the levels of AD, but does not abolish it. This is associated with a complete inhibition of the expression of adipogenic marker genes--PPARγ2, ADIPOQ and a decrease in the expression of RB, p130, but not UTX. The results obtained give evidence that the epigenetic mechanism regulating AD differentiation in mouse and human MSC is different.

  19. Self-tracking and Persuasive eCoaching in Healthy Lifestyle Interventions : Work-in-progress Scoping Review of Key Components

    NARCIS (Netherlands)

    Lentferink, Aniek Joset; Oldenhuis, Hilbrand; Kulyk, Olga Anatoliyivna; de Groot, Martijn; Polstra, Louis; Velthuijsen, Hugo; Hermens, Hermanus J.; van Gemert-Pijnen, Lisette

    2016-01-01

    The combination of self-tracking and persuasive eCoaching in healthy lifestyle interventions is a promising approach. The objective of this study is to map the key components of existing healthy lifestyle interventions combining self-tracking and persuasive eCoaching using the scoping review

  20. Small Group Discussion as a Key Component in Online Assessment Training for Enhanced Student Learning in Web-Based Peer Assessment

    Science.gov (United States)

    Liu, Xiongyi; Li, Lan; Zhang, Zhihong

    2018-01-01

    The purpose of this study is to examine the effect of online assessment training, with synchronous group discussion as a key component, on subsequent web-based peer assessment results. Participants included 81 college students, mostly women, taking a business writing class. After initial submission of a draft counter-offer letter, they completed…

  1. Low cost, small form factor, and integration as the key features for the optical component industry takeoff

    Science.gov (United States)

    Schiattone, Francesco; Bonino, Stefano; Gobbi, Luigi; Groppi, Angelamaria; Marazzi, Marco; Musio, Maurizio

    2003-04-01

    In the past the optical component market has been mainly driven by performances. Today, as the number of competitors has drastically increased, the system integrators have a wide range of possible suppliers and solutions giving them the possibility to be more focused on cost and also on footprint reduction. So, if performances are still essential, low cost and Small Form Factor issues are becoming more and more crucial in selecting components. Another evolution in the market is the current request of the optical system companies to simplify the supply chain in order to reduce the assembling and testing steps at system level. This corresponds to a growing demand in providing subassemblies, modules or hybrid integrated components: that means also Integration will be an issue in which all the optical component companies will compete to gain market shares. As we can see looking several examples offered by electronic market, to combine low cost and SFF is a very challenging task but Integration can help in achieving both features. In this work we present how these issues could be approached giving examples of some advanced solutions applied to LiNbO3 modulators. In particular we describe the progress made on automation, new materials and low cost fabrication methods for the parts. We also introduce an approach in integrating optical and electrical functionality on LiNbO3 modulators including RF driver, bias control loop, attenuator and photodiode integrated in a single device.

  2. Using Additive Manufacturing to Mitigate the Risks of Limited Key Ship Components of the Zumwalt-Class Destroyer

    Science.gov (United States)

    2016-12-01

    and services are high tech and defense-specific in nature; therefore, there is often only one qualified provider/supplier available. Moreover...support for low-volume and obsolete parts. From commercial aviation and luxury car manufacturers to major defense contractors and the DOD, financial...components that are currently obsolete or approaching obsolescence through 2019 (Southard, 2016). The iPDA is critical to support the distributed

  3. A Comprehensive Study of Key Electric Vehicle (EV) Components, Technologies, Challenges, Impacts, and Future Direction of Development

    OpenAIRE

    Fuad Un-Noor; Sanjeevikumar Padmanaban; Lucian Mihet-Popa; Mohammad Nurunnabi Mollah; Eklas Hossain

    2017-01-01

    Electric vehicles (EV), including Battery Electric Vehicle (BEV), Hybrid Electric Vehicle (HEV), Plug-in Hybrid Electric Vehicle (PHEV), Fuel Cell Electric Vehicle (FCEV), are becoming more commonplace in the transportation sector in recent times. As the present trend suggests, this mode of transport is likely to replace internal combustion engine (ICE) vehicles in the near future. Each of the main EV components has a number of technologies that are currently in use or can become prominent in...

  4. Key issues in decomposing fMRI during naturalistic and continuous music experience with independent component analysis.

    Science.gov (United States)

    Cong, Fengyu; Puoliväli, Tuomas; Alluri, Vinoo; Sipola, Tuomo; Burunat, Iballa; Toiviainen, Petri; Nandi, Asoke K; Brattico, Elvira; Ristaniemi, Tapani

    2014-02-15

    Independent component analysis (ICA) has been often used to decompose fMRI data mostly for the resting-state, block and event-related designs due to its outstanding advantage. For fMRI data during free-listening experiences, only a few exploratory studies applied ICA. For processing the fMRI data elicited by 512-s modern tango, a FFT based band-pass filter was used to further pre-process the fMRI data to remove sources of no interest and noise. Then, a fast model order selection method was applied to estimate the number of sources. Next, both individual ICA and group ICA were performed. Subsequently, ICA components whose temporal courses were significantly correlated with musical features were selected. Finally, for individual ICA, common components across majority of participants were found by diffusion map and spectral clustering. The extracted spatial maps (by the new ICA approach) common across most participants evidenced slightly right-lateralized activity within and surrounding the auditory cortices. Meanwhile, they were found associated with the musical features. Compared with the conventional ICA approach, more participants were found to have the common spatial maps extracted by the new ICA approach. Conventional model order selection methods underestimated the true number of sources in the conventionally pre-processed fMRI data for the individual ICA. Pre-processing the fMRI data by using a reasonable band-pass digital filter can greatly benefit the following model order selection and ICA with fMRI data by naturalistic paradigms. Diffusion map and spectral clustering are straightforward tools to find common ICA spatial maps. Copyright © 2013 Elsevier B.V. All rights reserved.

  5. Key Components in eHealth Interventions Combining Self-Tracking and Persuasive eCoaching to Promote a Healthier Lifestyle: A Scoping Review.

    Science.gov (United States)

    Lentferink, Aniek J; Oldenhuis, Hilbrand Ke; de Groot, Martijn; Polstra, Louis; Velthuijsen, Hugo; van Gemert-Pijnen, Julia Ewc

    2017-08-01

    The combination of self-tracking and persuasive eCoaching in automated interventions is a new and promising approach for healthy lifestyle management. The aim of this study was to identify key components of self-tracking and persuasive eCoaching in automated healthy lifestyle interventions that contribute to their effectiveness on health outcomes, usability, and adherence. A secondary aim was to identify the way in which these key components should be designed to contribute to improved health outcomes, usability, and adherence. The scoping review methodology proposed by Arskey and O'Malley was applied. Scopus, EMBASE, PsycINFO, and PubMed were searched for publications dated from January 1, 2013 to January 31, 2016 that included (1) self-tracking, (2) persuasive eCoaching, and (3) healthy lifestyle intervention. The search resulted in 32 publications, 17 of which provided results regarding the effect on health outcomes, 27 of which provided results regarding usability, and 13 of which provided results regarding adherence. Among the 32 publications, 27 described an intervention. The most commonly applied persuasive eCoaching components in the described interventions were personalization (n=24), suggestion (n=19), goal-setting (n=17), simulation (n=17), and reminders (n=15). As for self-tracking components, most interventions utilized an accelerometer to measure steps (n=11). Furthermore, the medium through which the user could access the intervention was usually a mobile phone (n=10). The following key components and their specific design seem to influence both health outcomes and usability in a positive way: reduction by setting short-term goals to eventually reach long-term goals, personalization of goals, praise messages, reminders to input self-tracking data into the technology, use of validity-tested devices, integration of self-tracking and persuasive eCoaching, and provision of face-to-face instructions during implementation. In addition, health outcomes or

  6. The Impact of Key HIV Intervention Components as Predictors of Sexual Barrier Use: The Zambia Partner Project.

    Science.gov (United States)

    Chitalu, Ndashi; Mumbi, Mirriam; Cook, Ryan; Weiss, Stephen M; Jones, Deborah

    2016-01-01

    Behavioral interventions have utilized a variety of strategies and components to reduce HIV risk. This article describes the partner intervention, a couple-based group HIV risk reduction intervention implemented in 6 urban community health clinics in Lusaka, Zambia, and examines the components of the intervention and their relationship with condom use. Couple members completed assessments on condom use, acceptability, willingness to use condoms, communication, intimate partner violence (IPV), self-efficacy, and HIV information at baseline and 6 months' follow-up. This study examined the relative impact of elements of the intervention as predictors of condom use. Changes in acceptability had the greatest overall influence on condom use, followed by social support, relationship consensus, and willingness to use condoms. Changes in self-efficacy, IPV, negotiation, and information had no influence. Results support the use of multidimensional approaches in behavioral interventions and highlight the importance of identifying critical elements of interventions to maximize risk reduction outcomes. © The Author(s) 2014.

  7. Just-in-Time Adaptive Interventions (JITAIs) in Mobile Health: Key Components and Design Principles for Ongoing Health Behavior Support.

    Science.gov (United States)

    Nahum-Shani, Inbal; Smith, Shawna N; Spring, Bonnie J; Collins, Linda M; Witkiewitz, Katie; Tewari, Ambuj; Murphy, Susan A

    2018-05-18

    The just-in-time adaptive intervention (JITAI) is an intervention design aiming to provide the right type/amount of support, at the right time, by adapting to an individual's changing internal and contextual state. The availability of increasingly powerful mobile and sensing technologies underpins the use of JITAIs to support health behavior, as in such a setting an individual's state can change rapidly, unexpectedly, and in his/her natural environment. Despite the increasing use and appeal of JITAIs, a major gap exists between the growing technological capabilities for delivering JITAIs and research on the development and evaluation of these interventions. Many JITAIs have been developed with minimal use of empirical evidence, theory, or accepted treatment guidelines. Here, we take an essential first step towards bridging this gap. Building on health behavior theories and the extant literature on JITAIs, we clarify the scientific motivation for JITAIs, define their fundamental components, and highlight design principles related to these components. Examples of JITAIs from various domains of health behavior research are used for illustration. As we enter a new era of technological capacity for delivering JITAIs, it is critical that researchers develop sophisticated and nuanced health behavior theories capable of guiding the construction of such interventions. Particular attention has to be given to better understanding the implications of providing timely and ecologically sound support for intervention adherence and retention.

  8. The polyketide components of waxes and the Cer-cqu gene cluster encoding a novel polyketide synthase, the β-diketone synthase, DKS

    DEFF Research Database (Denmark)

    von Wettstein, Penny

    2017-01-01

    The primary function of the outermost, lipophilic layer of plant aerial surfaces, called the cuticle, is preventing non-stomatal water loss. Its exterior surface is often decorated with wax crystals, imparting a blue-grey color. Identification of the barley Cer-c, -q and -u genes forming the 101 kb...... Cer-cqu gene cluster encoding a novel polyketide synthase-the β-diketone synthase (DKS), a lipase/carboxyl transferase, and a P450 hydroxylase, respectively, establishes a new, major pathway for the synthesis of plant waxes. The major product is a β-diketone (14,16-hentriacontane) aliphatic that forms...

  9. Multicomponent reactions provide key molecules for secret communication.

    Science.gov (United States)

    Boukis, Andreas C; Reiter, Kevin; Frölich, Maximiliane; Hofheinz, Dennis; Meier, Michael A R

    2018-04-12

    A convenient and inherently more secure communication channel for encoding messages via specifically designed molecular keys is introduced by combining advanced encryption standard cryptography with molecular steganography. The necessary molecular keys require large structural diversity, thus suggesting the application of multicomponent reactions. Herein, the Ugi four-component reaction of perfluorinated acids is utilized to establish an exemplary database consisting of 130 commercially available components. Considering all permutations, this combinatorial approach can unambiguously provide 500,000 molecular keys in only one synthetic procedure per key. The molecular keys are transferred nondigitally and concealed by either adsorption onto paper, coffee, tea or sugar as well as by dissolution in a perfume or in blood. Re-isolation and purification from these disguises is simplified by the perfluorinated sidechains of the molecular keys. High resolution tandem mass spectrometry can unequivocally determine the molecular structure and thus the identity of the key for a subsequent decryption of an encoded message.

  10. A Comprehensive Study of Key Electric Vehicle (EV Components, Technologies, Challenges, Impacts, and Future Direction of Development

    Directory of Open Access Journals (Sweden)

    Fuad Un-Noor

    2017-08-01

    Full Text Available Electric vehicles (EV, including Battery Electric Vehicle (BEV, Hybrid Electric Vehicle (HEV, Plug-in Hybrid Electric Vehicle (PHEV, Fuel Cell Electric Vehicle (FCEV, are becoming more commonplace in the transportation sector in recent times. As the present trend suggests, this mode of transport is likely to replace internal combustion engine (ICE vehicles in the near future. Each of the main EV components has a number of technologies that are currently in use or can become prominent in the future. EVs can cause significant impacts on the environment, power system, and other related sectors. The present power system could face huge instabilities with enough EV penetration, but with proper management and coordination, EVs can be turned into a major contributor to the successful implementation of the smart grid concept. There are possibilities of immense environmental benefits as well, as the EVs can extensively reduce the greenhouse gas emissions produced by the transportation sector. However, there are some major obstacles for EVs to overcome before totally replacing ICE vehicles. This paper is focused on reviewing all the useful data available on EV configurations, battery energy sources, electrical machines, charging techniques, optimization techniques, impacts, trends, and possible directions of future developments. Its objective is to provide an overall picture of the current EV technology and ways of future development to assist in future researches in this sector.

  11. Plasma Membrane-Located Purine Nucleotide Transport Proteins Are Key Components for Host Exploitation by Microsporidian Intracellular Parasites

    Science.gov (United States)

    Heinz, Eva; Hacker, Christian; Dean, Paul; Mifsud, John; Goldberg, Alina V.; Williams, Tom A.; Nakjang, Sirintra; Gregory, Alison; Hirt, Robert P.; Lucocq, John M.; Kunji, Edmund R. S.; Embley, T. Martin

    2014-01-01

    Microsporidia are obligate intracellular parasites of most animal groups including humans, but despite their significant economic and medical importance there are major gaps in our understanding of how they exploit infected host cells. We have investigated the evolution, cellular locations and substrate specificities of a family of nucleotide transport (NTT) proteins from Trachipleistophora hominis, a microsporidian isolated from an HIV/AIDS patient. Transport proteins are critical to microsporidian success because they compensate for the dramatic loss of metabolic pathways that is a hallmark of the group. Our data demonstrate that the use of plasma membrane-located nucleotide transport proteins (NTT) is a key strategy adopted by microsporidians to exploit host cells. Acquisition of an ancestral transporter gene at the base of the microsporidian radiation was followed by lineage-specific events of gene duplication, which in the case of T. hominis has generated four paralogous NTT transporters. All four T. hominis NTT proteins are located predominantly to the plasma membrane of replicating intracellular cells where they can mediate transport at the host-parasite interface. In contrast to published data for Encephalitozoon cuniculi, we found no evidence for the location for any of the T. hominis NTT transporters to its minimal mitochondria (mitosomes), consistent with lineage-specific differences in transporter and mitosome evolution. All of the T. hominis NTTs transported radiolabelled purine nucleotides (ATP, ADP, GTP and GDP) when expressed in Escherichia coli, but did not transport radiolabelled pyrimidine nucleotides. Genome analysis suggests that imported purine nucleotides could be used by T. hominis to make all of the critical purine-based building-blocks for DNA and RNA biosynthesis during parasite intracellular replication, as well as providing essential energy for parasite cellular metabolism and protein synthesis. PMID:25474405

  12. Plasma membrane-located purine nucleotide transport proteins are key components for host exploitation by microsporidian intracellular parasites.

    Directory of Open Access Journals (Sweden)

    Eva Heinz

    2014-12-01

    Full Text Available Microsporidia are obligate intracellular parasites of most animal groups including humans, but despite their significant economic and medical importance there are major gaps in our understanding of how they exploit infected host cells. We have investigated the evolution, cellular locations and substrate specificities of a family of nucleotide transport (NTT proteins from Trachipleistophora hominis, a microsporidian isolated from an HIV/AIDS patient. Transport proteins are critical to microsporidian success because they compensate for the dramatic loss of metabolic pathways that is a hallmark of the group. Our data demonstrate that the use of plasma membrane-located nucleotide transport proteins (NTT is a key strategy adopted by microsporidians to exploit host cells. Acquisition of an ancestral transporter gene at the base of the microsporidian radiation was followed by lineage-specific events of gene duplication, which in the case of T. hominis has generated four paralogous NTT transporters. All four T. hominis NTT proteins are located predominantly to the plasma membrane of replicating intracellular cells where they can mediate transport at the host-parasite interface. In contrast to published data for Encephalitozoon cuniculi, we found no evidence for the location for any of the T. hominis NTT transporters to its minimal mitochondria (mitosomes, consistent with lineage-specific differences in transporter and mitosome evolution. All of the T. hominis NTTs transported radiolabelled purine nucleotides (ATP, ADP, GTP and GDP when expressed in Escherichia coli, but did not transport radiolabelled pyrimidine nucleotides. Genome analysis suggests that imported purine nucleotides could be used by T. hominis to make all of the critical purine-based building-blocks for DNA and RNA biosynthesis during parasite intracellular replication, as well as providing essential energy for parasite cellular metabolism and protein synthesis.

  13. Structural Characterisation of FabG from Yersinia pestis, a Key Component of Bacterial Fatty Acid Synthesis.

    Directory of Open Access Journals (Sweden)

    Jeffrey D Nanson

    Full Text Available Ketoacyl-acyl carrier protein reductases (FabG are ubiquitously expressed enzymes that catalyse the reduction of acyl carrier protein (ACP linked thioesters within the bacterial type II fatty acid synthesis (FASII pathway. The products of these enzymes, saturated and unsaturated fatty acids, are essential components of the bacterial cell envelope. The FASII reductase enoyl-ACP reductase (FabI has been the focus of numerous drug discovery efforts, some of which have led to clinical trials, yet few studies have focused on FabG. Like FabI, FabG appears to be essential for survival in many bacteria, similarly indicating the potential of this enzyme as a drug target. FabG enzymes are members of the short-chain alcohol dehydrogenase/reductase (SDR family, and like other SDRs, exhibit highly conserved secondary and tertiary structures, and contain a number of conserved sequence motifs. Here we describe the crystal structures of FabG from Yersinia pestis (YpFabG, the causative agent of bubonic, pneumonic, and septicaemic plague, and three human pandemics. Y. pestis remains endemic in many parts of North America, South America, Southeast Asia, and Africa, and a threat to human health. YpFabG shares a high degree of structural similarity with bacterial homologues, and the ketoreductase domain of the mammalian fatty acid synthase from both Homo sapiens and Sus scrofa. Structural characterisation of YpFabG, and comparison with other bacterial FabGs and the mammalian fatty acid synthase, provides a strong platform for virtual screening of potential inhibitors, rational drug design, and the development of new antimicrobial agents to combat Y. pestis infections.

  14. Structural Characterisation of FabG from Yersinia pestis, a Key Component of Bacterial Fatty Acid Synthesis.

    Science.gov (United States)

    Nanson, Jeffrey D; Forwood, Jade K

    2015-01-01

    Ketoacyl-acyl carrier protein reductases (FabG) are ubiquitously expressed enzymes that catalyse the reduction of acyl carrier protein (ACP) linked thioesters within the bacterial type II fatty acid synthesis (FASII) pathway. The products of these enzymes, saturated and unsaturated fatty acids, are essential components of the bacterial cell envelope. The FASII reductase enoyl-ACP reductase (FabI) has been the focus of numerous drug discovery efforts, some of which have led to clinical trials, yet few studies have focused on FabG. Like FabI, FabG appears to be essential for survival in many bacteria, similarly indicating the potential of this enzyme as a drug target. FabG enzymes are members of the short-chain alcohol dehydrogenase/reductase (SDR) family, and like other SDRs, exhibit highly conserved secondary and tertiary structures, and contain a number of conserved sequence motifs. Here we describe the crystal structures of FabG from Yersinia pestis (YpFabG), the causative agent of bubonic, pneumonic, and septicaemic plague, and three human pandemics. Y. pestis remains endemic in many parts of North America, South America, Southeast Asia, and Africa, and a threat to human health. YpFabG shares a high degree of structural similarity with bacterial homologues, and the ketoreductase domain of the mammalian fatty acid synthase from both Homo sapiens and Sus scrofa. Structural characterisation of YpFabG, and comparison with other bacterial FabGs and the mammalian fatty acid synthase, provides a strong platform for virtual screening of potential inhibitors, rational drug design, and the development of new antimicrobial agents to combat Y. pestis infections.

  15. Facile Synthesis of Smart Nanocontainers as Key Components for Construction of Self-Healing Coating with Superhydrophobic Surfaces.

    Science.gov (United States)

    Liang, Yi; Wang, MingDong; Wang, Cheng; Feng, Jing; Li, JianSheng; Wang, LianJun; Fu, JiaJun

    2016-12-01

    SiO2-imidazoline nanocomposites (SiO2-IMI) owning high loading capacity of corrosion inhibitor, 1-hexadecyl-3-methylimidazolium bromide (HMID), and a special acid/alkali dual-stimuli-accelerated release property have been synthesized via a one-step modified Stöber method. SiO2-IMI were uniformly distributed into the hydrophobic SiO2 sol to construct "host"-"guest" feedback active coating with a superhydrophobic surface (SiO2-IMI@SHSC) on aluminium alloy, AA2024, by dip-coating technique. SiO2-IMI as "guest" components have good compatibility with "host" sol-gel coating, and more importantly, once localized corrosion occurs on the surface of AA2024, SiO2-IMI can simultaneously respond to the increase in environmental pH around corrosive micro-cathodic regions and decrease in pH near micro-anodic regions, promptly releasing HMID to form a compact molecular film on the damaged surface, inhibiting corrosion spread and executing a self-healing function. The scanning vibrating electrode technique (SVET) was applied to illustrate the suppression process of cathodic/anodic corrosion activities. Furthermore, benefiting from the superhydrophobic surface, SiO2-IMI@SHSC remained its protective ability after immersion in 0.5 M NaCl solution for 35 days, which is far superior to the conventional sol-gel coating with the same coating thickness. The facile fabrication method of SiO2-IMI simplifies the construction procedure of SiO2-IMI@SHSC, which have great potential to replace non-environmental chromate conversion coatings for practical use.

  16. Facile Synthesis of Smart Nanocontainers as Key Components for Construction of Self-Healing Coating with Superhydrophobic Surfaces

    Science.gov (United States)

    Liang, Yi; Wang, MingDong; Wang, Cheng; Feng, Jing; Li, JianSheng; Wang, LianJun; Fu, JiaJun

    2016-04-01

    SiO2-imidazoline nanocomposites (SiO2-IMI) owning high loading capacity of corrosion inhibitor, 1-hexadecyl-3-methylimidazolium bromide (HMID), and a special acid/alkali dual-stimuli-accelerated release property have been synthesized via a one-step modified Stöber method. SiO2-IMI were uniformly distributed into the hydrophobic SiO2 sol to construct "host"-"guest" feedback active coating with a superhydrophobic surface (SiO2-IMI@SHSC) on aluminium alloy, AA2024, by dip-coating technique. SiO2-IMI as "guest" components have good compatibility with "host" sol-gel coating, and more importantly, once localized corrosion occurs on the surface of AA2024, SiO2-IMI can simultaneously respond to the increase in environmental pH around corrosive micro-cathodic regions and decrease in pH near micro-anodic regions, promptly releasing HMID to form a compact molecular film on the damaged surface, inhibiting corrosion spread and executing a self-healing function. The scanning vibrating electrode technique (SVET) was applied to illustrate the suppression process of cathodic/anodic corrosion activities. Furthermore, benefiting from the superhydrophobic surface, SiO2-IMI@SHSC remained its protective ability after immersion in 0.5 M NaCl solution for 35 days, which is far superior to the conventional sol-gel coating with the same coating thickness. The facile fabrication method of SiO2-IMI simplifies the construction procedure of SiO2-IMI@SHSC, which have great potential to replace non-environmental chromate conversion coatings for practical use.

  17. The Polyketide Components of Waxes and the Cer-cqu Gene Cluster Encoding a Novel Polyketide Synthase, the β-Diketone Synthase, DKS.

    Science.gov (United States)

    von Wettstein-Knowles, Penny

    2017-07-10

    The primary function of the outermost, lipophilic layer of plant aerial surfaces, called the cuticle, is preventing non-stomatal water loss. Its exterior surface is often decorated with wax crystals, imparting a blue-grey color. Identification of the barley Cer-c , -q and -u genes forming the 101 kb Cer-cqu gene cluster encoding a novel polyketide synthase-the β-diketone synthase (DKS), a lipase/carboxyl transferase, and a P450 hydroxylase, respectively, establishes a new, major pathway for the synthesis of plant waxes. The major product is a β-diketone (14,16-hentriacontane) aliphatic that forms long, thin crystalline tubes. A pathway branch leads to the formation of esterified alkan-2-ols.

  18. Low-cost manufacturing of the point focus concentrating module and its key component, the Fresnel lens. Final subcontract report, 31 January 1991--6 May 1991

    Energy Technology Data Exchange (ETDEWEB)

    Saifee, T.; Konnerth, A. III [Solar Kinetics, Inc., Dallas, TX (United States)

    1991-11-01

    Solar Kinetics, Inc. (SKI) has been developing point-focus concentrating PV modules since 1986. SKI is currently in position to manufacture between 200 to 600 kilowatts annually of the current design by a combination of manual and semi-automated methods. This report reviews the current status of module manufacture and specifies the required approach to achieve a high-volume manufacturing capability and low cost. The approach taken will include process development concurrent with module design for automated manufacturing. The current effort reviews the major manufacturing costs and identifies components and processes whose improvements would produce the greatest effect on manufacturability and cost reduction. The Fresnel lens is one such key component. Investigating specific alternative manufacturing methods and sources has substantially reduced the lens costs and has exceeded the DOE cost-reduction goals. 15 refs.

  19. The zebrafish maternal-effect gene cellular atoll encodes the centriolar component sas-6 and defects in its paternal function promote whole genome duplication.

    Science.gov (United States)

    Yabe, Taijiro; Ge, Xiaoyan; Pelegri, Francisco

    2007-12-01

    A female-sterile zebrafish maternal-effect mutation in cellular atoll (cea) results in defects in the initiation of cell division starting at the second cell division cycle. This phenomenon is caused by defects in centrosome duplication, which in turn affect the formation of a bipolar spindle. We show that cea encodes the centriolar coiled-coil protein Sas-6, and that zebrafish Cea/Sas-6 protein localizes to centrosomes. cea also has a genetic paternal contribution, which when mutated results in an arrested first cell division followed by normal cleavage. Our data supports the idea that, in zebrafish, paternally inherited centrosomes are required for the first cell division while maternally derived factors are required for centrosomal duplication and cell divisions in subsequent cell cycles. DNA synthesis ensues in the absence of centrosome duplication, and the one-cycle delay in the first cell division caused by cea mutant sperm leads to whole genome duplication. We discuss the potential implications of these findings with regards to the origin of polyploidization in animal species. In addition, the uncoupling of developmental time and cell division count caused by the cea mutation suggests the presence of a time window, normally corresponding to the first two cell cycles, which is permissive for germ plasm recruitment.

  20. Thought probes during prospective memory encoding: Evidence for perfunctory processes

    Science.gov (United States)

    McDaniel, Mark A.; Dasse, Michelle N.; Lee, Ji hae; Kurinec, Courtney A.; Tami, Claudina; Krueger, Madison L.

    2018-01-01

    For nearly 50 years, psychologists have studied prospective memory, or the ability to execute delayed intentions. Yet, there remains a gap in understanding as to whether initial encoding of the intention must be elaborative and strategic, or whether some components of successful encoding can occur in a perfunctory, transient manner. In eight studies (N = 680), we instructed participants to remember to press the Q key if they saw words representing fruits (cue) during an ongoing lexical decision task. They then typed what they were thinking and responded whether they encoded fruits as a general category, as specific exemplars, or hardly thought about it at all. Consistent with the perfunctory view, participants often reported mind wandering (42.9%) and hardly thinking about the prospective memory task (22.5%). Even though participants were given a general category cue, many participants generated specific category exemplars (34.5%). Bayesian analyses of encoding durations indicated that specific exemplars came to mind in a perfunctory manner rather than via strategic, elaborative mechanisms. Few participants correctly guessed the research hypotheses and changing from fruit category cues to initial-letter cues eliminated reports of specific exemplar generation, thereby arguing against demand characteristics in the thought probe procedure. In a final experiment, encoding duration was unrelated to prospective memory performance; however, specific-exemplar encoders outperformed general-category encoders with no ongoing task monitoring costs. Our findings reveal substantial variability in intention encoding, and demonstrate that some components of prospective memory encoding can be done “in passing.” PMID:29874277

  1. The β-Ketoacyl-CoA Synthase HvKCS1, Encoded by Cer-zh, Plays a Key Role in Synthesis of Barley Leaf Wax and Germination of Barley Powdery Mildew.

    Science.gov (United States)

    Li, Chao; Haslam, Tegan M; Krüger, Anna; Schneider, Lizette M; Mishina, Kohei; Samuels, Lacey; Yang, Hongxing; Kunst, Ljerka; Schaffrath, Ulrich; Nawrath, Christiane; Chen, Guoxiong; Komatsuda, Takao; von Wettstein-Knowles, Penny

    2018-04-01

    The cuticle coats the primary aerial surfaces of land plants. It consists of cutin and waxes, which provide protection against desiccation, pathogens and herbivores. Acyl cuticular waxes are synthesized via elongase complexes that extend fatty acyl precursors up to 38 carbons for downstream modification pathways. The leaves of 21 barley eceriferum (cer) mutants appear to have less or no epicuticular wax crystals, making these mutants excellent tools for identifying elongase and modification pathway biosynthetic genes. Positional cloning of the gene mutated in cer-zh identified an elongase component, β-ketoacyl-CoA synthase (CER-ZH/HvKCS1) that is one of 34 homologous KCSs encoded by the barley genome. The biochemical function of CER-ZH was deduced from wax and cutin analyses and by heterologous expression in yeast. Combined, these experiments revealed that CER-ZH/HvKCS1 has a substrate specificity for C16-C20, especially unsaturated, acyl chains, thus playing a major role in total acyl chain elongation for wax biosynthesis. The contribution of CER-ZH to water barrier properties of the cuticle and its influence on the germination of barley powdery mildew fungus were also assessed.

  2. Evidence for the Induction of Key Components of the NOTCH Signaling Pathway via Deltamethrin and Azamethiphos Treatment in the Sea Louse Caligus rogercresseyi

    Directory of Open Access Journals (Sweden)

    Sebastian Boltaña

    2016-05-01

    Full Text Available The extensive use of organophosphates and pyrethroids in the aquaculture industry has negatively impacted parasite sensitivity to the delousing effects of these antiparasitics, especially among sea lice species. The NOTCH signaling pathway is a positive regulator of ABC transporter subfamily C expression and plays a key role in the generation and modulation of pesticide resistance. However, little is known about the molecular mechanisms behind pesticide resistance, partly due to the lack of genomic and molecular information on the processes involved in the resistance mechanism of sea lice. Next-generation sequencing technologies provide an opportunity for rapid and cost-effective generation of genome-scale data. The present study, through RNA-seq analysis, determined that the sea louse Caligus rogercresseyi (C. rogercresseyi specifically responds to the delousing drugs azamethiphos and deltamethrin at the transcriptomic level by differentially activating mRNA of the NOTCH signaling pathway and of ABC genes. These results suggest that frequent antiparasitic application may increase the activity of inhibitory mRNA components, thereby promoting inhibitory NOTCH output and conditions for increased resistance to delousing drugs. Moreover, data analysis underscored that key functions of NOTCH/ABC components were regulated during distinct phases of the drug response, thus indicating resistance modifications in C. rogercresseyi resulting from the frequent use of organophosphates and pyrethroids.

  3. Pmr, a histone-like protein H1 (H-NS) family protein encoded by the IncP-7 plasmid pCAR1, is a key global regulator that alters host function.

    Science.gov (United States)

    Yun, Choong-Soo; Suzuki, Chiho; Naito, Kunihiko; Takeda, Toshiharu; Takahashi, Yurika; Sai, Fumiya; Terabayashi, Tsuguno; Miyakoshi, Masatoshi; Shintani, Masaki; Nishida, Hiromi; Yamane, Hisakazu; Nojiri, Hideaki

    2010-09-01

    Histone-like protein H1 (H-NS) family proteins are nucleoid-associated proteins (NAPs) conserved among many bacterial species. The IncP-7 plasmid pCAR1 is transmissible among various Pseudomonas strains and carries a gene encoding the H-NS family protein, Pmr. Pseudomonas putida KT2440 is a host of pCAR1, which harbors five genes encoding the H-NS family proteins PP_1366 (TurA), PP_3765 (TurB), PP_0017 (TurC), PP_3693 (TurD), and PP_2947 (TurE). Quantitative reverse transcription-PCR (qRT-PCR) demonstrated that the presence of pCAR1 does not affect the transcription of these five genes and that only pmr, turA, and turB were primarily transcribed in KT2440(pCAR1). In vitro pull-down assays revealed that Pmr strongly interacted with itself and with TurA, TurB, and TurE. Transcriptome comparisons of the pmr disruptant, KT2440, and KT2440(pCAR1) strains indicated that pmr disruption had greater effects on the host transcriptome than did pCAR1 carriage. The transcriptional levels of some genes that increased with pCAR1 carriage, such as the mexEF-oprN efflux pump genes and parI, reverted with pmr disruption to levels in pCAR1-free KT2440. Transcriptional levels of putative horizontally acquired host genes were not altered by pCAR1 carriage but were altered by pmr disruption. Identification of genome-wide Pmr binding sites by ChAP-chip (chromatin affinity purification coupled with high-density tiling chip) analysis demonstrated that Pmr preferentially binds to horizontally acquired DNA regions. The Pmr binding sites overlapped well with the location of the genes differentially transcribed following pmr disruption on both the plasmid and the chromosome. Our findings indicate that Pmr is a key factor in optimizing gene transcription on pCAR1 and the host chromosome.

  4. Overall Key Performance Indicator to Optimizing Operation of High-Pressure Homogenizers for a Reliable Quantification of Intracellular Components in Pichia pastoris.

    Science.gov (United States)

    Garcia-Ortega, Xavier; Reyes, Cecilia; Montesinos, José Luis; Valero, Francisco

    2015-01-01

    The most commonly used cell disruption procedures may present lack of reproducibility, which introduces significant errors in the quantification of intracellular components. In this work, an approach consisting in the definition of an overall key performance indicator (KPI) was implemented for a lab scale high-pressure homogenizer (HPH) in order to determine the disruption settings that allow the reliable quantification of a wide sort of intracellular components. This innovative KPI was based on the combination of three independent reporting indicators: decrease of absorbance, release of total protein, and release of alkaline phosphatase activity. The yeast Pichia pastoris growing on methanol was selected as model microorganism due to it presents an important widening of the cell wall needing more severe methods and operating conditions than Escherichia coli and Saccharomyces cerevisiae. From the outcome of the reporting indicators, the cell disruption efficiency achieved using HPH was about fourfold higher than other lab standard cell disruption methodologies, such bead milling cell permeabilization. This approach was also applied to a pilot plant scale HPH validating the methodology in a scale-up of the disruption process. This innovative non-complex approach developed to evaluate the efficacy of a disruption procedure or equipment can be easily applied to optimize the most common disruption processes, in order to reach not only reliable quantification but also recovery of intracellular components from cell factories of interest.

  5. Exposure of a 23F Serotype Strain of Streptococcus pneumoniae to Cigarette Smoke Condensate Is Associated with Selective Upregulation of Genes Encoding the Two-Component Regulatory System 11 (TCS11

    Directory of Open Access Journals (Sweden)

    Riana Cockeran

    2014-01-01

    Full Text Available Alterations in whole genome expression profiles following exposure of the pneumococcus (strain 172, serotype 23F to cigarette smoke condensate (160 μg/mL for 15 and 60 min have been determined using the TIGR4 DNA microarray chip. Exposure to CSC resulted in the significant (P<0.014–0.0006 upregulation of the genes encoding the two-component regulatory system 11 (TCS11, consisting of the sensor kinase, hk11, and its cognate response regulator, rr11, in the setting of increased biofilm formation. These effects of cigarette smoke on the pneumococcus may contribute to colonization of the airways by this microbial pathogen.

  6. Proposal to negotiate extensions to four collaboration agreements for the design of key components of the beam-delivery and linac systems for the Compact Linear Collider (CLIC) for a duration of two years

    CERN Document Server

    2017-01-01

    Proposal to negotiate extensions to four collaboration agreements for the design of key components of the beam-delivery and linac systems for the Compact Linear Collider (CLIC) for a duration of two years

  7. Key components of a service model providing early childhood support for women attending opioid treatment clinics: an Australian state health service review.

    Science.gov (United States)

    Harvey, Susan R; Schmied, Virginia; Nicholls, Daniel; Dahlen, Hannah

    2012-09-01

    To report the findings of a service review--specifically the strategy to provide early childhood services 'on site' at opioid treatment clinics to address access difficulties. Child and family health nurses are skilled in the assessment and support of families during early childhood. However, women with a history of substance abuse are often cautious when engaging with universal and other health services, with the result that the infant may miss recommended developmental screening and early referral to improve health outcomes. In 2006, an internal review was undertaken of the integration of early childhood and parenting services at opioid treatment clinics in a large Area Health Service of New South Wales, Australia. A qualitative study design, using semi-structured interview questions was used. Data were collected via six focus groups (4-15 participants in each group) and individual interview of child and family health nurses, nurse unit managers and clinical staff (n=58). Three key components of a model for providing early childhood support in collaboration with opioid treatment services were identified. First, the importance of building a trusting relationship between the woman and the child and family health nurses, second, maintaining continuity of care and a multidisciplinary/multiagency approach, and finally the importance of staff education, support and professional development. The provision of early childhood and parenting services on site, as part of a multidisciplinary 'one stop shop' approach to service delivery was a clear recommendation of the review. Reduction of access difficulties to specialised early childhood support is of benefit to clients, community health services attempting to provide a service to this difficult to reach population and to drug and alcohol services seeking to provide a high level of holistic care for clients. © 2012 Blackwell Publishing Ltd.

  8. Legislation on violence against women: overview of key components Legislación sobre la violencia contra la mujer: panorama de los elementos fundamentales

    Directory of Open Access Journals (Sweden)

    Gaby Ortiz-Barreda

    2013-01-01

    Full Text Available This study aimed to determine if legislation on violence against women (VAW worldwide contains key components recommended by the Pan American Health Organization (PAHO and the United Nations (UN to help strengthen VAW prevention and provide better integrated victim protection, support, and care. A systematic search for VAW legislation using international legal databases and other electronic sources plus data from previous research identified 124 countries/territories with some type of VAW legislation. Full legal texts were found for legislation from 104 countries/territories. Those available in English, Portuguese, and Spanish were downloaded and compiled and the selection criteria applied (use of any of the common terms related to VAW, including intimate partner violence (IPV, and reference to at least two of six sectors (education, health, judicial system, mass media, police, and social services with regard to VAW interventions (protection, support, and care. A final sample from 80 countries/territories was selected and analyzed for the presence of key components recommended by PAHO and the UN (reference to the term "violence against women" in the title; definitions of different types of VAW; identification of women as beneficiaries; and promotion of (reference to the participation of multiple sectors in VAW interventions. Few countries/territories specifically identified women as the beneficiaries of their VAW legislation, including those that labeled their legislation "domestic violence" law ( n = 51, of which only two explicitly mentioned women as complainants/survivors. Only 28 countries/territories defined the main forms of VAW (economic, physical, psychological, and sexual in their VAW legislation. Most highlighted the role of the judicial system, followed by that of social services and the police. Only 28 mentioned the health sector. Despite considerable efforts worldwide to strengthen VAW legislation, most VAW laws do not incorporate

  9. The genome sequence of the protostome Daphnia pulex encodes respective orthologues of a neurotrophin, a Trk and a p75NTR: Evolution of neurotrophin signaling components and related proteins in the bilateria

    Directory of Open Access Journals (Sweden)

    Wilson Karen HS

    2009-10-01

    Full Text Available Abstract Background Neurotrophins and their Trk and p75NTR receptors play an important role in the nervous system. To date, neurotrophins, Trk and p75NTR have only been found concomitantly in deuterostomes. In protostomes, homologues to either neurotrophin, Trk or p75NTR are reported but their phylogenetic relationship to deuterostome neurotrophin signaling components is unclear. Drosophila has neurotrophin homologues called Spätzles (Spz, some of which were recently renamed neurotrophins, but direct proof that these are deuterostome neurotrophin orthologues is lacking. Trks belong to the receptor tyrosine kinase (RTK family and among RTKs, Trks and RORs are closest related. Flies lack Trks but have ROR and ROR-related proteins called NRKs playing a neurotrophic role. Mollusks have so far the most similar proteins to Trks (Lymnaea Trk and Aplysia Trkl but the exact phylogenetic relationship of mollusk Trks to each other and to vertebrate Trks is unknown. p75NTR belongs to the tumor necrosis factor receptor (TNFR superfamily. The divergence of the TNFR families in vertebrates has been suggested to parallel the emergence of the adaptive immune system. Only one TNFR representative, the Drosophila Wengen, has been found in protostomes. To clarify the evolution of neurotrophin signaling components in bilateria, this work analyzes the genome of the crustacean Daphnia pulex as well as new genetic data from protostomes. Results The Daphnia genome encodes a neurotrophin, p75NTR and Trk orthologue together with Trkl, ROR, and NRK-RTKs. Drosophila Spz1, 2, 3, 5, 6 orthologues as well as two new groups of Spz proteins (Spz7 and 8 are also found in the Daphnia genome. Searching genbank and the genomes of Capitella, Helobdella and Lottia reveals neurotrophin signaling components in other protostomes. Conclusion It appears that a neurotrophin, Trk and p75NTR existed at the protostome/deuterostome split. In protostomes, a "neurotrophin superfamily" includes

  10. Secondary prevention through cardiac rehabilitation: physical activity counselling and exercise training: key components of the position paper from the Cardiac Rehabilitation Section of the European Association of Cardiovascular Prevention and Rehabilitation

    DEFF Research Database (Denmark)

    Corrà, Ugo; Piepoli, Massimo F; Carré, François

    2010-01-01

    , exercise training, diet/nutritional counselling, weight control management, lipid management, blood pressure monitoring, smoking cessation, and psychosocial management. Cardiac rehabilitation services are by definition multi-factorial and comprehensive, with physical activity counselling and exercise...... training as central components in all rehabilitation and preventive interventions. Many of the risk factor improvements occurring in CR can be mediated through exercise training programmes. This call-for-action paper presents the key components of a CR programme: physical activity counselling and exercise...

  11. Encoding information using laguerre gaussian modes

    CSIR Research Space (South Africa)

    Trichili, A

    2015-08-01

    Full Text Available The authors experimentally demonstrate an information encoding protocol using the two degrees of freedom of Laguerre Gaussian modes having different radial and azimuthal components. A novel method, based on digital holography, for information...

  12. Capturing how age-friendly communities foster positive health, social participation and health equity: a study protocol of key components and processes that promote population health in aging Canadians.

    Science.gov (United States)

    Levasseur, Mélanie; Dubois, Marie-France; Généreux, Mélissa; Menec, Verena; Raina, Parminder; Roy, Mathieu; Gabaude, Catherine; Couturier, Yves; St-Pierre, Catherine

    2017-05-25

    To address the challenges of the global aging population, the World Health Organization promoted age-friendly communities as a way to foster the development of active aging community initiatives. Accordingly, key components (i.e., policies, services and structures related to the communities' physical and social environments) should be designed to be age-friendly and help all aging adults to live safely, enjoy good health and stay involved in their communities. Although age-friendly communities are believed to be a promising way to help aging Canadians lead healthy and active lives, little is known about which key components best foster positive health, social participation and health equity, and their underlying mechanisms. This study aims to better understand which and how key components of age-friendly communities best foster positive health, social participation and health equity in aging Canadians. Specifically, the research objectives are to: 1) Describe and compare age-friendly key components of communities across Canada 2) Identify key components best associated with positive health, social participation and health equity of aging adults 3) Explore how these key components foster positive health, social participation and health equity METHODS: A mixed-method sequential explanatory design will be used. The quantitative part will involve a survey of Canadian communities and secondary analysis of cross-sectional data from the Canadian Longitudinal Study on Aging (CLSA). The survey will include an age-friendly questionnaire targeting key components in seven domains: physical environment, housing options, social environment, opportunities for participation, community supports and healthcare services, transportation options, communication and information. The CLSA is a large, national prospective study representative of the Canadian aging population designed to examine health transitions and trajectories of adults as they age. In the qualitative part, a multiple

  13. Workshop Report: International Workshop to Explore Synergies between Nuclear and Renewable Energy Sources as a Key Component in Developing Pathways to Decarbonization of the Energy Sector

    International Nuclear Information System (INIS)

    Bragg-Sitton, Shannon M.; Boardman, Richard; Ruth, Mark; Lyons, Peter B.

    2016-01-01

    An international workshop was organized in June 2016 to explore synergies between nuclear and renewable energy sources. Synergies crossing electricity, transportation, and industrial sectors were the focus of the workshop, recognizing that deep decarbonization will require efforts that go far beyond the electricity sector alone. This report summarizes the key points made within each presentation and highlights outcomes that were arrived at in the discussions.

  14. Workshop Report: International Workshop to Explore Synergies between Nuclear and Renewable Energy Sources as a Key Component in Developing Pathways to Decarbonization of the Energy Sector

    Energy Technology Data Exchange (ETDEWEB)

    Bragg-Sitton, Shannon M. [Idaho National Lab. (INL), Idaho Falls, ID (United States); Boardman, Richard [Idaho National Lab. (INL), Idaho Falls, ID (United States); Ruth, Mark [National Renewable Energy Lab. (NREL), Golden, CO (United States); Lyons, Peter B. [Dept. of Energy (DOE), Washington DC (United States)

    2016-08-01

    An international workshop was organized in June 2016 to explore synergies between nuclear and renewable energy sources. Synergies crossing electricity, transportation, and industrial sectors were the focus of the workshop, recognizing that deep decarbonization will require efforts that go far beyond the electricity sector alone. This report summarizes the key points made within each presentation and highlights outcomes that were arrived at in the discussions.

  15. A model for visual memory encoding.

    Directory of Open Access Journals (Sweden)

    Rodolphe Nenert

    Full Text Available Memory encoding engages multiple concurrent and sequential processes. While the individual processes involved in successful encoding have been examined in many studies, a sequence of events and the importance of modules associated with memory encoding has not been established. For this reason, we sought to perform a comprehensive examination of the network for memory encoding using data driven methods and to determine the directionality of the information flow in order to build a viable model of visual memory encoding. Forty healthy controls ages 19-59 performed a visual scene encoding task. FMRI data were preprocessed using SPM8 and then processed using independent component analysis (ICA with the reliability of the identified components confirmed using ICASSO as implemented in GIFT. The directionality of the information flow was examined using Granger causality analyses (GCA. All participants performed the fMRI task well above the chance level (>90% correct on both active and control conditions and the post-fMRI testing recall revealed correct memory encoding at 86.33 ± 5.83%. ICA identified involvement of components of five different networks in the process of memory encoding, and the GCA allowed for the directionality of the information flow to be assessed, from visual cortex via ventral stream to the attention network and then to the default mode network (DMN. Two additional networks involved in this process were the cerebellar and the auditory-insular network. This study provides evidence that successful visual memory encoding is dependent on multiple modules that are part of other networks that are only indirectly related to the main process. This model may help to identify the node(s of the network that are affected by a specific disease processes and explain the presence of memory encoding difficulties in patients in whom focal or global network dysfunction exists.

  16. A model for visual memory encoding.

    Science.gov (United States)

    Nenert, Rodolphe; Allendorfer, Jane B; Szaflarski, Jerzy P

    2014-01-01

    Memory encoding engages multiple concurrent and sequential processes. While the individual processes involved in successful encoding have been examined in many studies, a sequence of events and the importance of modules associated with memory encoding has not been established. For this reason, we sought to perform a comprehensive examination of the network for memory encoding using data driven methods and to determine the directionality of the information flow in order to build a viable model of visual memory encoding. Forty healthy controls ages 19-59 performed a visual scene encoding task. FMRI data were preprocessed using SPM8 and then processed using independent component analysis (ICA) with the reliability of the identified components confirmed using ICASSO as implemented in GIFT. The directionality of the information flow was examined using Granger causality analyses (GCA). All participants performed the fMRI task well above the chance level (>90% correct on both active and control conditions) and the post-fMRI testing recall revealed correct memory encoding at 86.33 ± 5.83%. ICA identified involvement of components of five different networks in the process of memory encoding, and the GCA allowed for the directionality of the information flow to be assessed, from visual cortex via ventral stream to the attention network and then to the default mode network (DMN). Two additional networks involved in this process were the cerebellar and the auditory-insular network. This study provides evidence that successful visual memory encoding is dependent on multiple modules that are part of other networks that are only indirectly related to the main process. This model may help to identify the node(s) of the network that are affected by a specific disease processes and explain the presence of memory encoding difficulties in patients in whom focal or global network dysfunction exists.

  17. Third harmonic generation imaging of intact human cerebral organoids to assess key components of early neurogenesis in Rett Syndrome (Conference Presentation)

    Science.gov (United States)

    Yildirim, Murat; Feldman, Danielle; Wang, Tianyu; Ouzounov, Dimitre G.; Chou, Stephanie; Swaney, Justin; Chung, Kwanghun; Xu, Chris; So, Peter T. C.; Sur, Mriganka

    2017-02-01

    Rett Syndrome (RTT) is a pervasive, X-linked neurodevelopmental disorder that predominantly affects girls. It is mostly caused by a sporadic mutation in the gene encoding methyl CpG-binding protein 2 (MeCP2).The clinical features of RTT are most commonly reported to emerge between the ages of 6-18 months and implicating RTT as a disorder of postnatal development. However, a variety of recent evidence from our lab and others demonstrates that RTT phenotypes are present at the earliest stages of brain development including neurogenesis, migration, and patterning in addition to stages of synaptic and circuit development and plasticity. We have used RTT patient-derived induced pluripotent stem cells to generate 3D human cerebral organoids that can serve as a model for human neurogenesis in vitro. We aim to expand on our existing findings in order to determine aberrancies at individual stages of neurogenesis by performing structural and immunocytochemical staining in isogenic control and MeCP2-deficient organoids. In addition, we aim to use Third Harmonic Generation (THG) microscopy as a label-free, nondestructive 3D tissue visualization method in order to gain a complete understanding of the structural complexity that underlies human neurogenesis. As a proof of concept, we have performed THG imaging in healthy intact human cerebral organoids cleared with SWITCH. We acquired an intrinsic THG signal with the following laser configurations: 400 kHz repetition rate, 65 fs pulse width laser at 1350 nm wavelength. In these THG images, nuclei are clearly delineated and cross sections demonstrate the depth penetration capacity (< 1mm) that extends throughout the organoid. Imaging control and MeCP2-deficient human cerebral organoids in 2D sections reveals structural and protein expression-based alterations that we expect will be clearly elucidated via both THG and three-photon fluorescence microscopy.

  18. A case study of translating ACGME practice-based learning and improvement requirements into reality: systems quality improvement projects as the key component to a comprehensive curriculum.

    Science.gov (United States)

    Tomolo, A M; Lawrence, R H; Aron, D C

    2009-10-01

    In 2002, the Accreditation Council for Graduate Medical Education (ACGME) introduced a new requirement: residents must demonstrate competency in Practice-Based Learning and Improvement (PBLI). Training in this domain is still not consistently integrated into programmes, with few, if any, adequately going beyond knowledge of basic content and addressing all components of the requirement. To summarise the implementation of a PBLI curriculum designed to address all components of the requirement and to evaluate the impact on the practice system. A case-study approach was used for identifying and evaluating the steps for delivering the curriculum, along with the Model for Improvement's successive Plan-Do-Study-Act (PDSA) cycles (July 2004-May 2006). Notes from curriculum development meetings, notes and presentation slides made by teams about their projects, resident curriculum exit evaluations curriculum and interviews. Residents reported high levels of comfort by applying PBLI-related knowledge and skills and that the curriculum improved their ability to do various PBLI tasks. The involvement of multiple stakeholders increased. Twelve of the 15 teams' suggestions with practical systems-relevant outcomes were implemented and sustained beyond residents' project periods. While using the traditional PDSA cycles was helpful, there were limitations. A PBLI curriculum that is centred around practice-based quality improvement projects can fulfil the objectives of this ACGME competency while accomplishing sustained outcomes in quality improvement. A comprehensive curriculum is an investment but offers organisational rewards. We propose a more realistic and informative representation of rapid PDSA cycle changes.

  19. Frizzled 2 is a key component in the regulation of TOR signaling-mediated egg production in the mosquito Aedes aegypti.

    Science.gov (United States)

    Weng, Shih-Che; Shiao, Shin-Hong

    2015-06-01

    The Wnt signaling pathway was first discovered as a key event in embryonic development and cell polarity in Drosophila. Recently, several reports have shown that Wnt stimulates translation and cell growth by activating the mTOR pathway in mammals. Previous studies have demonstrated that the Target of Rapamycin (TOR) pathway plays an important role in mosquito vitellogenesis. However, the interactions between these two pathways are poorly understood in the mosquito. In this study, we hypothesized that factors from the TOR and Wnt signaling pathways interacted synergistically in mosquito vitellogenesis. Our results showed that silencing Aedes aegypti Frizzled 2 (AaFz2), a transmembrane receptor of the Wnt signaling pathway, decreased the fecundity of mosquitoes. We showed that AaFz2 was highly expressed at the transcriptional and translational levels in the female mosquito 6 h after a blood meal, indicating amino acid-stimulated expression of AaFz2. Notably, the phosphorylation of S6K, a downstream target of the TOR pathway, and the expression of vitellogenin were inhibited in the absence of AaFz2. A direct link was found in this study between Wnt and TOR signaling in the regulation of mosquito reproduction. Copyright © 2015 Elsevier Ltd. All rights reserved.

  20. Legume information system (LegumeInfo.org): a key component of a set of federated data resources for the legume family.

    Science.gov (United States)

    Dash, Sudhansu; Campbell, Jacqueline D; Cannon, Ethalinda K S; Cleary, Alan M; Huang, Wei; Kalberer, Scott R; Karingula, Vijay; Rice, Alex G; Singh, Jugpreet; Umale, Pooja E; Weeks, Nathan T; Wilkey, Andrew P; Farmer, Andrew D; Cannon, Steven B

    2016-01-04

    Legume Information System (LIS), at http://legumeinfo.org, is a genomic data portal (GDP) for the legume family. LIS provides access to genetic and genomic information for major crop and model legumes. With more than two-dozen domesticated legume species, there are numerous specialists working on particular species, and also numerous GDPs for these species. LIS has been redesigned in the last three years both to better integrate data sets across the crop and model legumes, and to better accommodate specialized GDPs that serve particular legume species. To integrate data sets, LIS provides genome and map viewers, holds synteny mappings among all sequenced legume species and provides a set of gene families to allow traversal among orthologous and paralogous sequences across the legumes. To better accommodate other specialized GDPs, LIS uses open-source GMOD components where possible, and advocates use of common data templates, formats, schemas and interfaces so that data collected by one legume research community are accessible across all legume GDPs, through similar interfaces and using common APIs. This federated model for the legumes is managed as part of the 'Legume Federation' project (accessible via http://legumefederation.org), which can be thought of as an umbrella project encompassing LIS and other legume GDPs. Published by Oxford University Press on behalf of Nucleic Acids Research 2015. This work is written by (a) US Government employee(s) and is in the public domain in the US.

  1. Significant differences in gene expression and key genetic components associated with high growth vigor in populus section tacamahaca as revealed by comparative transcriptome analysis

    International Nuclear Information System (INIS)

    Cheng, S.; Chen, M.; Li, Y.; Wang, J.; Sun, X.; Wang, J.

    2017-01-01

    To identify genetic components involved in high growth vigor in F1 Populus section Tacamahaca hybrid plants, high and low vigor plants showing significant differences in apical dominance during a rapid growth period were selected. Apical bud transcriptomes of high and low-growth-vigor hybrids and their parents were analyzed using high-throughput RNA sequencing on an Illumina HiSeq 2000 platform. A total of 5,542 genes were differently expressed between high growth vigor hybrid and its parents, the genes were significantly enriched in pathways related to processes such as photosynthesis, pyrimidine ribonucleotide biosynthetic processes and nucleoside metabolic processes. There were 1410 differentially expressed genes between high and low growth vigor hybrid, the genes were mainly involved in photosynthesis, chlorophyll biosynthetic process, carbon fixation in photosynthetic organisms, porphyrin and chlorophyll metabolism and nitrogen metabolism. Moreover, a k-core of a gene co-expression network analysis was performed to identify the potential functions of genes related to high growth vigor. The functions of 8 selected candidate genes were associated mainly with circadian rhythm, water transport, cellulose catabolic processes, sucrose biosynthesis, pyrimidine ribonucleotide biosynthesis, purine nucleotide biosynthesis, meristem maintenance, and carbohydrate metabolism. Our results may contribute to a better understanding of the molecular basis of high growth vigor in hybrids and its regulation. (author)

  2. S phase activation of the histone H2B promoter by OCA-S, a coactivator complex that contains GAPDH as a key component.

    Science.gov (United States)

    Zheng, Lei; Roeder, Robert G; Luo, Yan

    2003-07-25

    We have isolated and functionally characterized a multicomponent Oct-1 coactivator, OCA-S which is essential for S phase-dependent histone H2B transcription. The p38 component of OCA-S binds directly to Oct-1, exhibits potent transactivation potential, is selectively recruited to the H2B promoter in S phase, and is essential for S phase-specific H2B transcription in vivo and in vitro. Surprisingly, p38 represents a nuclear form of glyceraldehyde-3-phosphate dehydrogenase, and binding to Oct-1, as well as OCA-S function, is stimulated by NAD(+) but inhibited by NADH. OCA-S also interacts with NPAT, a cyclin E/cdk2 substrate that is broadly involved in histone gene transcription. These studies thus link the H2B transcriptional machinery to cell cycle regulators, and possibly to cellular metabolic state (redox status), and set the stage for studies of the underlying mechanisms and the basis for coordinated histone gene expression and coupling to DNA replication.

  3. Ctr9, a Key Component of the Paf1 Complex, Affects Proliferation and Terminal Differentiation in the Developing Drosophila Nervous System

    Directory of Open Access Journals (Sweden)

    Shahrzad Bahrampour

    2016-10-01

    Full Text Available The Paf1 protein complex (Paf1C is increasingly recognized as a highly conserved and broadly utilized regulator of a variety of transcriptional processes. These include the promotion of H3K4 and H3K36 trimethylation, H2BK123 ubiquitination, RNA Pol II transcriptional termination, and also RNA-mediated gene silencing. Paf1C contains five canonical protein components, including Paf1 and Ctr9, which are critical for overall complex integrity, as well as Rtf1, Leo1, and Cdc73/Parafibromin(Hrpt2/Hyrax. In spite of a growing appreciation for the importance of Paf1C from yeast and mammalian studies, there has only been limited work in Drosophila. Here, we provide the first detailed phenotypic study of Ctr9 function in Drosophila. We found that Ctr9 mutants die at late embryogenesis or early larval life, but can be partly rescued by nervous system reexpression of Ctr9. We observed a number of phenotypes in Ctr9 mutants, including increased neuroblast numbers, increased nervous system proliferation, as well as downregulation of many neuropeptide genes. Analysis of cell cycle and regulatory gene expression revealed upregulation of the E2f1 cell cycle factor, as well as changes in Antennapedia and Grainy head expression. We also found reduction of H3K4me3 modification in the embryonic nervous system. Genome-wide transcriptome analysis points to additional downstream genes that may underlie these Ctr9 phenotypes, revealing gene expression changes in Notch pathway target genes, cell cycle genes, and neuropeptide genes. In addition, we find significant effects on the gene expression of metabolic genes. These findings reveal that Ctr9 is an essential gene that is necessary at multiple stages of nervous system development, and provides a starting point for future studies of the Paf1C in Drosophila.

  4. Landscape encodings enhance optimization.

    Directory of Open Access Journals (Sweden)

    Konstantin Klemm

    Full Text Available Hard combinatorial optimization problems deal with the search for the minimum cost solutions (ground states of discrete systems under strong constraints. A transformation of state variables may enhance computational tractability. It has been argued that these state encodings are to be chosen invertible to retain the original size of the state space. Here we show how redundant non-invertible encodings enhance optimization by enriching the density of low-energy states. In addition, smooth landscapes may be established on encoded state spaces to guide local search dynamics towards the ground state.

  5. Landscape Encodings Enhance Optimization

    Science.gov (United States)

    Klemm, Konstantin; Mehta, Anita; Stadler, Peter F.

    2012-01-01

    Hard combinatorial optimization problems deal with the search for the minimum cost solutions (ground states) of discrete systems under strong constraints. A transformation of state variables may enhance computational tractability. It has been argued that these state encodings are to be chosen invertible to retain the original size of the state space. Here we show how redundant non-invertible encodings enhance optimization by enriching the density of low-energy states. In addition, smooth landscapes may be established on encoded state spaces to guide local search dynamics towards the ground state. PMID:22496860

  6. The KTOI Ecosystem Project Relational Database : a Report Prepared by Statistical Consulting Services for KTOI Describing the Key Components and Specifications of the KTOI Relational Database.

    Energy Technology Data Exchange (ETDEWEB)

    Shafii, Bahman [Statistical Consulting Services

    2009-09-24

    Data are the central focus of any research project. Their collection and analysis are crucial to meeting project goals, testing scientific hypotheses, and drawing relevant conclusions. Typical research projects often devote the majority of their resources to the collection, storage and analysis of data. Therefore, issues related to data quality should be of foremost concern. Data quality issues are even more important when conducting multifaceted studies involving several teams of researchers. Without the use of a standardized protocol, for example, independent data collection carried out by separate research efforts can lead to inconsistencies, confusion and errors throughout the larger project. A database management system can be utilized to help avoid all of the aforementioned problems. The centralization of data into a common relational unit, i.e. a relational database, shifts the responsibility for data quality and maintenance from multiple individuals to a single database manager, thus allowing data quality issues to be assessed and corrected in a timely manner. The database system also provides an easy mechanism for standardizing data components, such as variable names and values uniformly across all segments of a project. This is particularly an important issue when data are collected on a number of biological/physical response and explanatory variables from various locations and times. The database system can integrate all segments of a large study into one unit, while providing oversight and accessibility to the data collection process. The quality of all data collected is uniformly maintained and compatibility between research efforts ensured. While the physical database would exist in a central location, access will not be physically limited. Advanced database interfaces are created to operate over the internet utilizing a Web-based relational database, allowing project members to access their data from virtually anywhere. These interfaces provide users

  7. Optical image encryption method based on incoherent imaging and polarized light encoding

    Science.gov (United States)

    Wang, Q.; Xiong, D.; Alfalou, A.; Brosseau, C.

    2018-05-01

    We propose an incoherent encoding system for image encryption based on a polarized encoding method combined with an incoherent imaging. Incoherent imaging is the core component of this proposal, in which the incoherent point-spread function (PSF) of the imaging system serves as the main key to encode the input intensity distribution thanks to a convolution operation. An array of retarders and polarizers is placed on the input plane of the imaging structure to encrypt the polarized state of light based on Mueller polarization calculus. The proposal makes full use of randomness of polarization parameters and incoherent PSF so that a multidimensional key space is generated to deal with illegal attacks. Mueller polarization calculus and incoherent illumination of imaging structure ensure that only intensity information is manipulated. Another key advantage is that complicated processing and recording related to a complex-valued signal are avoided. The encoded information is just an intensity distribution, which is advantageous for data storage and transition because information expansion accompanying conventional encryption methods is also avoided. The decryption procedure can be performed digitally or using optoelectronic devices. Numerical simulation tests demonstrate the validity of the proposed scheme.

  8. Blind encoding into qudits

    International Nuclear Information System (INIS)

    Shaari, J.S.; Wahiddin, M.R.B.; Mancini, S.

    2008-01-01

    We consider the problem of encoding classical information into unknown qudit states belonging to any basis, of a maximal set of mutually unbiased bases, by one party and then decoding by another party who has perfect knowledge of the basis. Working with qudits of prime dimensions, we point out a no-go theorem that forbids 'shift' operations on arbitrary unknown states. We then provide the necessary conditions for reliable encoding/decoding

  9. An encoding device and a method of encoding

    DEFF Research Database (Denmark)

    2012-01-01

    The present invention relates to an encoding device, such as an optical position encoder, for encoding input from an object, and a method for encoding input from an object, for determining a position of an object that interferes with light of the device. The encoding device comprises a light source...... in the area in the space and may interfere with the light, which interference may be encoded into a position or activation....

  10. Cryptographic analysis on the key space of optical phase encryption algorithm based on the design of discrete random phase mask

    Science.gov (United States)

    Lin, Chao; Shen, Xueju; Li, Zengyan

    2013-07-01

    The key space of phase encryption algorithm using discrete random phase mask is investigated by numerical simulation in this paper. Random phase mask with finite and discrete phase levels is considered as the core component in most practical optical encryption architectures. The key space analysis is based on the design criteria of discrete random phase mask. The role of random amplitude mask and random phase mask in optical encryption system is identified from the perspective of confusion and diffusion. The properties of discrete random phase mask in a practical double random phase encoding scheme working in both amplitude encoding (AE) and phase encoding (PE) modes are comparably analyzed. The key space of random phase encryption algorithm is evaluated considering both the encryption quality and the brute-force attack resistibility. A method for enlarging the key space of phase encryption algorithm is also proposed to enhance the security of optical phase encryption techniques.

  11. Key components when teaching for excellence

    NARCIS (Netherlands)

    Wolfensberger, Marca; Wolfensberger, Marca; Drayer, Lyndsay; Volker, Judith

    2014-01-01

    The Research Centre for Talent Development in Higher Education and Society, based at Hanze University of Applied Sciences in the Netherlands, organised the first international conference “Evoking Excellence in Higher Education and Beyond”. This conference brought together scholars and educators from

  12. Two Genes Encoding Uracil Phosphoribosyltransferase Are Present in Bacillus subtilis

    DEFF Research Database (Denmark)

    Martinussen, Jan; Glaser, Philippe; Andersen, Paal S.

    1995-01-01

    Uracil phosphoribosyltransferase (UPRTase) catalyzes the key reaction in the salvage of uracil in many microorganisms. Surprisingly, two genes encoding UPRTase activity were cloned from Bacillus subtilis by complementation of an Escherichia coli mutant. The genes were sequenced, and the putative...

  13. On The Designed And Constructed Feedback Shift-Register Encoder

    African Journals Online (AJOL)

    An encoder capable of cyclical shifting of data, and which can therefore be used for Bose-Chaudhuri and Hocquenghem (BCH) coding, has been designed and constructed using discrete components. It comprises basically four bistable multivibrators and an exclusive-OR device. On completion, the encoder performed ...

  14. a permutation encoding te algorithm solution of reso tation encoding

    African Journals Online (AJOL)

    eobe

    Keywords: Genetic algorithm, resource constrained. 1. INTRODUCTION. 1. .... Nigerian Journal of Technology. Vol. 34, No. 1, January 2015. 128 ... 4. ENCODING OF CHROMOSOME. ENCODING OF CHROMOSOME .... International Multi conference of Engineers and ... method”, Naval Research Logistics, vol 48, issue 2,.

  15. Multichannel compressive sensing MRI using noiselet encoding.

    Directory of Open Access Journals (Sweden)

    Kamlesh Pawar

    Full Text Available The incoherence between measurement and sparsifying transform matrices and the restricted isometry property (RIP of measurement matrix are two of the key factors in determining the performance of compressive sensing (CS. In CS-MRI, the randomly under-sampled Fourier matrix is used as the measurement matrix and the wavelet transform is usually used as sparsifying transform matrix. However, the incoherence between the randomly under-sampled Fourier matrix and the wavelet matrix is not optimal, which can deteriorate the performance of CS-MRI. Using the mathematical result that noiselets are maximally incoherent with wavelets, this paper introduces the noiselet unitary bases as the measurement matrix to improve the incoherence and RIP in CS-MRI. Based on an empirical RIP analysis that compares the multichannel noiselet and multichannel Fourier measurement matrices in CS-MRI, we propose a multichannel compressive sensing (MCS framework to take the advantage of multichannel data acquisition used in MRI scanners. Simulations are presented in the MCS framework to compare the performance of noiselet encoding reconstructions and Fourier encoding reconstructions at different acceleration factors. The comparisons indicate that multichannel noiselet measurement matrix has better RIP than that of its Fourier counterpart, and that noiselet encoded MCS-MRI outperforms Fourier encoded MCS-MRI in preserving image resolution and can achieve higher acceleration factors. To demonstrate the feasibility of the proposed noiselet encoding scheme, a pulse sequences with tailored spatially selective RF excitation pulses was designed and implemented on a 3T scanner to acquire the data in the noiselet domain from a phantom and a human brain. The results indicate that noislet encoding preserves image resolution better than Fouirer encoding.

  16. Parallel encoders for pixel detectors

    International Nuclear Information System (INIS)

    Nikityuk, N.M.

    1991-01-01

    A new method of fast encoding and determining the multiplicity and coordinates of fired pixels is described. A specific example construction of parallel encodes and MCC for n=49 and t=2 is given. 16 refs.; 6 figs.; 2 tabs

  17. StrigoQuant: A genetically encoded biosensor for quantifying strigolactone activity and specificity

    KAUST Repository

    Samodelov, S. L.

    2016-11-05

    Strigolactones are key regulators of plant development and interaction with symbiotic fungi; however, quantitative tools for strigolactone signaling analysis are lacking. We introduce a genetically encoded hormone biosensor used to analyze strigolactone-mediated processes, including the study of the components involved in the hormone perception/signaling complex and the structural specificity and sensitivity of natural and synthetic strigolactones in Arabidopsis, providing quantitative insights into the stereoselectivity of strigolactone perception. Given the high specificity, sensitivity, dynamic range of activity, modular construction, ease of implementation, and wide applicability, the biosensor StrigoQuant will be useful in unraveling multiple levels of strigolactone metabolic and signaling networks.

  18. Transcriptional regulation of SlPYL, SlPP2C, and SlSnRK2 gene families encoding ABA signal core components during tomato fruit development and drought stress.

    Science.gov (United States)

    Sun, Liang; Wang, Yan-Ping; Chen, Pei; Ren, Jie; Ji, Kai; Li, Qian; Li, Ping; Dai, Sheng-Jie; Leng, Ping

    2011-11-01

    In order to characterize the potential transcriptional regulation of core components of abscisic acid (ABA) signal transduction in tomato fruit development and drought stress, eight SlPYL (ABA receptor), seven SlPP2C (type 2C protein phosphatase), and eight SlSnRK2 (subfamily 2 of SNF1-related kinases) full-length cDNA sequences were isolated from the tomato nucleotide database of NCBI GenBank. All SlPYL, SlPP2C, and SlSnRK2 genes obtained are homologous to Arabidopsis AtPYL, AtPP2C, and AtSnRK2 genes, respectively. Based on phylogenetic analysis, SlPYLs and SlSnRK2s were clustered into three subfamilies/subclasses, and all SlPP2Cs belonged to PP2C group A. Within the SlPYL gene family, SlPYL1, SlPYL2, SlPYL3, and SlPYL6 were the major genes involved in the regulation of fruit development. Among them, SlPYL1 and SlPYL2 were expressed at high levels throughout the process of fruit development and ripening; SlPYL3 was strongly expressed at the immature green (IM) and mature green (MG) stages, while SlPYL6 was expressed strongly at the IM and red ripe (RR) stages. Within the SlPP2C gene family, the expression of SlPP2C, SlPP2C3, and SlPP2C4 increased after the MG stage; SlPP2C1 and SlPP2C5 peaked at the B3 stage, while SlPP2C2 and SlPP2C6 changed little during fruit development. Within the SlSnRK2 gene family, the expression of SlSnRK2.2, SlSnRK2.3, SlSnRK2.4, and SlSnRK2C was higher than that of other members during fruit development. Additionally, most SlPYL genes were down-regulated, while most SlPP2C and SlSnRK2 genes were up-regulated by dehydration in tomato leaf.

  19. NMDA receptors and memory encoding.

    Science.gov (United States)

    Morris, Richard G M

    2013-11-01

    It is humbling to think that 30 years have passed since the paper by Collingridge, Kehl and McLennan showing that one of Jeff Watkins most interesting compounds, R-2-amino-5-phosphonopentanoate (d-AP5), blocked the induction of long-term potentiation in vitro at synapses from area CA3 of the hippocampus to CA1 without apparent effect on baseline synaptic transmission (Collingridge et al., 1983). This dissociation was one of the key triggers for an explosion of interest in glutamate receptors, and much has been discovered since that collectively contributes to our contemporary understanding of glutamatergic synapses - their biophysics and subunit composition, of the agonists and antagonists acting on them, and their diverse functions in different networks of the brain and spinal cord. It can be fairly said that Collingridge et al.'s (1983) observation was the stimulus that has led, on the one hand, to structural biological work at the atomic scale describing the key features of NMDA receptors that enables their coincidence function to happen; and, on the other, to work with whole animals investigating the contributions that calcium signalling via this receptor can have on rhythmical activities controlled by spinal circuits, memory encoding in the hippocampus (the topic of this article), visual cortical plasticity, sensitization in pain, and other functions. In this article, I lay out how my then interest in long-term potentiation (LTP) as a model of memory enabled me to recognise the importance of Collingridge et al.'s discovery - and how I and my colleagues endeavoured to take things forward in the area of learning and memory. This is in some respects a personal story, and I tell it as such. The idea that NMDA receptor activation is essential for memory encoding, though not for storage, took time to develop and to be accepted. Along the way, there have been confusions, challenges, and surprises surrounding the idea that activation of NMDA receptors can

  20. Quantum key distribution via quantum encryption

    CERN Document Server

    Yong Sheng Zhang; Guang Can Guo

    2001-01-01

    A quantum key distribution protocol based on quantum encryption is presented in this Brief Report. In this protocol, the previously shared Einstein-Podolsky-Rosen pairs act as the quantum key to encode and decode the classical cryptography key. The quantum key is reusable and the eavesdropper cannot elicit any information from the particle Alice sends to Bob. The concept of quantum encryption is also discussed. (21 refs).

  1. Selecting Operations for Assembler Encoding

    Directory of Open Access Journals (Sweden)

    Tomasz Praczyk

    2010-04-01

    Full Text Available Assembler Encoding is a neuro-evolutionary method in which a neural network is represented in the form of a simple program called Assembler Encoding Program. The task of the program is to create the so-called Network Definition Matrix which maintains all the information necessary to construct the network. To generate Assembler Encoding Programs and the subsequent neural networks evolutionary techniques are used.
    The performance of Assembler Encoding strongly depends on operations used in Assembler Encoding Programs. To select the most effective operations, experiments in the optimization and the predator-prey problem were carried out. In the experiments, Assembler Encoding Programs equipped with different types of operations were tested. The results of the tests are presented at the end of the paper.

  2. Review of Random Phase Encoding in Volume Holographic Storage

    Directory of Open Access Journals (Sweden)

    Wei-Chia Su

    2012-09-01

    Full Text Available Random phase encoding is a unique technique for volume hologram which can be applied to various applications such as holographic multiplexing storage, image encryption, and optical sensing. In this review article, we first review and discuss diffraction selectivity of random phase encoding in volume holograms, which is the most important parameter related to multiplexing capacity of volume holographic storage. We then review an image encryption system based on random phase encoding. The alignment of phase key for decryption of the encoded image stored in holographic memory is analyzed and discussed. In the latter part of the review, an all-optical sensing system implemented by random phase encoding and holographic interconnection is presented.

  3. Key issues

    International Nuclear Information System (INIS)

    Cook, N.G.W.

    1980-01-01

    Successful modeling of the thermo-mechanical and hydrochemical behavior of radioactive waste repositories in hard rock is possible in principle. Because such predictions lie outside the realm of experience, their adequacy depends entirely upon a thorough understanding of three fundamental questions: an understanding of the chemical and physical processess that determine the behavior of rock and all its complexities; accurate and realistic numerical models of the geologic media within which a repository may be built; and sufficient in-situ data covering the entire geologic region affected by, or effecting the behavior of a repository. At present sufficient is known to be able to identify most of those areas which require further attention. These areas extend all the way from a complete understanding of the chemical and physical processes determining the behavior of rock through to the exploration mapping and testing that must be done during the development of any potential repository. Many of the techniques, laboratory equipment, field instrumentation, and numerical methods needed to accomplish this do not exist at present. Therefore it is necessary to accept that a major investment in scientific research is required to generate this information over the next few years. The spectrum of scientific and engineering activities is wide extending from laboratory measurements through the development of numerical models to the measurement of data in-situ, but there is every prospect that sufficient can be done to resolve these key issues. However, to do so requires overt recognition of the many gaps which exist in our knowledge and abilities today, and of the need to bridge these gaps and of the significant costs involved in doing so

  4. Wavelength-encoded OCDMA system using opto-VLSI processors.

    Science.gov (United States)

    Aljada, Muhsen; Alameh, Kamal

    2007-07-01

    We propose and experimentally demonstrate a 2.5 Gbits/sper user wavelength-encoded optical code-division multiple-access encoder-decoder structure based on opto-VLSI processing. Each encoder and decoder is constructed using a single 1D opto-very-large-scale-integrated (VLSI) processor in conjunction with a fiber Bragg grating (FBG) array of different Bragg wavelengths. The FBG array spectrally and temporally slices the broadband input pulse into several components and the opto-VLSI processor generates codewords using digital phase holograms. System performance is measured in terms of the autocorrelation and cross-correlation functions as well as the eye diagram.

  5. Wavelength-encoded OCDMA system using opto-VLSI processors

    Science.gov (United States)

    Aljada, Muhsen; Alameh, Kamal

    2007-07-01

    We propose and experimentally demonstrate a 2.5 Gbits/sper user wavelength-encoded optical code-division multiple-access encoder-decoder structure based on opto-VLSI processing. Each encoder and decoder is constructed using a single 1D opto-very-large-scale-integrated (VLSI) processor in conjunction with a fiber Bragg grating (FBG) array of different Bragg wavelengths. The FBG array spectrally and temporally slices the broadband input pulse into several components and the opto-VLSI processor generates codewords using digital phase holograms. System performance is measured in terms of the autocorrelation and cross-correlation functions as well as the eye diagram.

  6. Simultaneous transmission for an encrypted image and a double random-phase encryption key

    Science.gov (United States)

    Yuan, Sheng; Zhou, Xin; Li, Da-Hai; Zhou, Ding-Fu

    2007-06-01

    We propose a method to simultaneously transmit double random-phase encryption key and an encrypted image by making use of the fact that an acceptable decryption result can be obtained when only partial data of the encrypted image have been taken in the decryption process. First, the original image data are encoded as an encrypted image by a double random-phase encryption technique. Second, a double random-phase encryption key is encoded as an encoded key by the Rivest-Shamir-Adelman (RSA) public-key encryption algorithm. Then the amplitude of the encrypted image is modulated by the encoded key to form what we call an encoded image. Finally, the encoded image that carries both the encrypted image and the encoded key is delivered to the receiver. Based on such a method, the receiver can have an acceptable result and secure transmission can be guaranteed by the RSA cipher system.

  7. Development and Synthesis of DNA-Encoded Benzimidazole Library.

    Science.gov (United States)

    Ding, Yun; Chai, Jing; Centrella, Paolo A; Gondo, Chenaimwoyo; DeLorey, Jennifer L; Clark, Matthew A

    2018-04-25

    Encoded library technology (ELT) is an effective approach to the discovery of novel small-molecule ligands for biological targets. A key factor for the success of the technology is the chemical diversity of the libraries. Here we report the development of DNA-conjugated benzimidazoles. Using 4-fluoro-3-nitrobenzoic acid as a key synthon, we synthesized a 320 million-member DNA-encoded benzimidazole library using Fmoc-protected amino acids, amines and aldehydes as diversity elements. Affinity selection of the library led to the discovery of a novel, potent and specific antagonist of the NK3 receptor.

  8. Semantic Keys and Reading

    Directory of Open Access Journals (Sweden)

    Zev bar-Lev

    2016-12-01

    Full Text Available Semantic Keys are elements (word-parts of written language that give an iconic, general representation of the whole word’s meaning. In written Sino-Japanese the “radical” or semantic components play this role. For example, the character meaning ‘woman, female’ is the Semantic Key of the character for Ma ‘Mama’ (alongside the phonetic component Ma, which means ‘horse’ as a separate character. The theory of semantic Keys in both graphic and phonemic aspects is called qTheory or nanosemantics. The most innovative aspect of the present article is the hypothesis that, in languages using alphabetic writing systems, the role of Semantic Key is played by consonants, more specifically the first consonant. Thus, L meaning ‘LIFT’ is the Semantic Key of English Lift, Ladle, Lofty, aLps, eLevator, oLympus; Spanish Leva, Lecantarse, aLto, Lengua; Arabic aLLah, and Hebrew① ªeL-ºaL ‘upto-above’ (the Israeli airline, Polish Lot ‘flight’ (the Polish airline; Hebrew ªeL, ªeLohim ‘God’, and haLLeluyah ‘praise-ye God’ (using Parallels, ‘Lift up God’. Evidence for the universality of the theory is shown by many examples drawn from various languages, including Indo-European Semitic, Chinese and Japanese. The theory reveals hundreds of relationships within and between languages, related and unrelated, that have been “Hiding in Plain Sight”, to mention just one example: the Parallel between Spanish Pan ‘bread’ and Mandarin Fan ‘rice’.

  9. Analysing and Comparing Encodability Criteria

    Directory of Open Access Journals (Sweden)

    Kirstin Peters

    2015-08-01

    Full Text Available Encodings or the proof of their absence are the main way to compare process calculi. To analyse the quality of encodings and to rule out trivial or meaningless encodings, they are augmented with quality criteria. There exists a bunch of different criteria and different variants of criteria in order to reason in different settings. This leads to incomparable results. Moreover it is not always clear whether the criteria used to obtain a result in a particular setting do indeed fit to this setting. We show how to formally reason about and compare encodability criteria by mapping them on requirements on a relation between source and target terms that is induced by the encoding function. In particular we analyse the common criteria full abstraction, operational correspondence, divergence reflection, success sensitiveness, and respect of barbs; e.g. we analyse the exact nature of the simulation relation (coupled simulation versus bisimulation that is induced by different variants of operational correspondence. This way we reduce the problem of analysing or comparing encodability criteria to the better understood problem of comparing relations on processes.

  10. Emotion experienced during encoding enhances odor retrieval cue effectiveness.

    Science.gov (United States)

    Herz, R S

    1997-01-01

    Emotional potentiation may be a key variable in the formation of odor-associated memory. Two experiments were conducted in which a distinctive ambient odor was present or absent during encoding and retrieval sessions and subjects were in an anxious or neutral mood during encoding. Subjects' mood at retrieval was not manipulated. The laboratory mood induction used in Experiment 1 suggested that anxiety might increase the effectiveness of an odor retrieval cue. This trend was confirmed in Experiment 2 by capturing a naturally stressful situation. Subjects who had an ambient odor cue available and were in a preexam state during encoding recalled more words than subjects in any other group. These data are evidence that heightened emotion experienced during encoding with an ambient odor can enhance the effectiveness of an odor as a cue to memory.

  11. Multiple-stage pure phase encoding with biometric information

    Science.gov (United States)

    Chen, Wen

    2018-01-01

    In recent years, many optical systems have been developed for securing information, and optical encryption/encoding has attracted more and more attention due to the marked advantages, such as parallel processing and multiple-dimensional characteristics. In this paper, an optical security method is presented based on pure phase encoding with biometric information. Biometric information (such as fingerprint) is employed as security keys rather than plaintext used in conventional optical security systems, and multiple-stage phase-encoding-based optical systems are designed for generating several phase-only masks with biometric information. Subsequently, the extracted phase-only masks are further used in an optical setup for encoding an input image (i.e., plaintext). Numerical simulations are conducted to illustrate the validity, and the results demonstrate that high flexibility and high security can be achieved.

  12. Influence of experimental parameters inherent to optical fibers on Quantum Key Distribution, the protocol BB84

    Directory of Open Access Journals (Sweden)

    L. Bouchoucha

    2018-03-01

    Full Text Available In this work, we represent the principle of quantum cryptography (QC that is based on fundamental laws of quantum physics. QC or Quantum Key Distribution (QKD uses various protocols to exchange a secret key between two communicating parties. This research paper focuses and examines the quantum key distribution by using the protocol BB84 in the case of encoding on the single-photon polarization and shows the influence of optical components parameters on the quantum key distribution. We also introduce Quantum Bit Error Rate (QBER to better interpret our results and show its relationship with the intrusion of the eavesdropper called Eve on the optical channel to exploit these vulnerabilities.

  13. Security enhanced BioEncoding for protecting iris codes

    Science.gov (United States)

    Ouda, Osama; Tsumura, Norimichi; Nakaguchi, Toshiya

    2011-06-01

    Improving the security of biometric template protection techniques is a key prerequisite for the widespread deployment of biometric technologies. BioEncoding is a recently proposed template protection scheme, based on the concept of cancelable biometrics, for protecting biometric templates represented as binary strings such as iris codes. The main advantage of BioEncoding over other template protection schemes is that it does not require user-specific keys and/or tokens during verification. Besides, it satisfies all the requirements of the cancelable biometrics construct without deteriorating the matching accuracy. However, although it has been shown that BioEncoding is secure enough against simple brute-force search attacks, the security of BioEncoded templates against more smart attacks, such as record multiplicity attacks, has not been sufficiently investigated. In this paper, a rigorous security analysis of BioEncoding is presented. Firstly, resistance of BioEncoded templates against brute-force attacks is revisited thoroughly. Secondly, we show that although the cancelable transformation employed in BioEncoding might be non-invertible for a single protected template, the original iris code could be inverted by correlating several templates used in different applications but created from the same iris. Accordingly, we propose an important modification to the BioEncoding transformation process in order to hinder attackers from exploiting this type of attacks. The effectiveness of adopting the suggested modification is validated and its impact on the matching accuracy is investigated empirically using CASIA-IrisV3-Interval dataset. Experimental results confirm the efficacy of the proposed approach and show that it preserves the matching accuracy of the unprotected iris recognition system.

  14. High-Efficient Parallel CAVLC Encoders on Heterogeneous Multicore Architectures

    Directory of Open Access Journals (Sweden)

    H. Y. Su

    2012-04-01

    Full Text Available This article presents two high-efficient parallel realizations of the context-based adaptive variable length coding (CAVLC based on heterogeneous multicore processors. By optimizing the architecture of the CAVLC encoder, three kinds of dependences are eliminated or weaken, including the context-based data dependence, the memory accessing dependence and the control dependence. The CAVLC pipeline is divided into three stages: two scans, coding, and lag packing, and be implemented on two typical heterogeneous multicore architectures. One is a block-based SIMD parallel CAVLC encoder on multicore stream processor STORM. The other is a component-oriented SIMT parallel encoder on massively parallel architecture GPU. Both of them exploited rich data-level parallelism. Experiments results show that compared with the CPU version, more than 70 times of speedup can be obtained for STORM and over 50 times for GPU. The implementation of encoder on STORM can make a real-time processing for 1080p @30fps and GPU-based version can satisfy the requirements for 720p real-time encoding. The throughput of the presented CAVLC encoders is more than 10 times higher than that of published software encoders on DSP and multicore platforms.

  15. Encoding, training and retrieval in ferroelectric tunnel junctions

    Science.gov (United States)

    Xu, Hanni; Xia, Yidong; Xu, Bo; Yin, Jiang; Yuan, Guoliang; Liu, Zhiguo

    2016-05-01

    Ferroelectric tunnel junctions (FTJs) are quantum nanostructures that have great potential in the hardware basis for future neuromorphic applications. Among recently proposed possibilities, the artificial cognition has high hopes, where encoding, training, memory solidification and retrieval constitute a whole chain that is inseparable. However, it is yet envisioned but experimentally unconfirmed. The poor retention or short-term store of tunneling electroresistance, in particular the intermediate states, is still a key challenge in FTJs. Here we report the encoding, training and retrieval in BaTiO3 FTJs, emulating the key features of information processing in terms of cognitive neuroscience. This is implemented and exemplified through processing characters. Using training inputs that are validated by the evolution of both barrier profile and domain configuration, accurate recalling of encoded characters in the retrieval stage is demonstrated.

  16. Learning from Number Board Games: You Learn What You Encode

    Science.gov (United States)

    Laski, Elida V.; Siegler, Robert S.

    2014-01-01

    We tested the hypothesis that encoding the numerical-spatial relations in a number board game is a key process in promoting learning from playing such games. Experiment 1 used a microgenetic design to examine the effects on learning of the type of counting procedure that children use. As predicted, having kindergartners count-on from their current…

  17. Multidimensionally encoded magnetic resonance imaging.

    Science.gov (United States)

    Lin, Fa-Hsuan

    2013-07-01

    Magnetic resonance imaging (MRI) typically achieves spatial encoding by measuring the projection of a q-dimensional object over q-dimensional spatial bases created by linear spatial encoding magnetic fields (SEMs). Recently, imaging strategies using nonlinear SEMs have demonstrated potential advantages for reconstructing images with higher spatiotemporal resolution and reducing peripheral nerve stimulation. In practice, nonlinear SEMs and linear SEMs can be used jointly to further improve the image reconstruction performance. Here, we propose the multidimensionally encoded (MDE) MRI to map a q-dimensional object onto a p-dimensional encoding space where p > q. MDE MRI is a theoretical framework linking imaging strategies using linear and nonlinear SEMs. Using a system of eight surface SEM coils with an eight-channel radiofrequency coil array, we demonstrate the five-dimensional MDE MRI for a two-dimensional object as a further generalization of PatLoc imaging and O-space imaging. We also present a method of optimizing spatial bases in MDE MRI. Results show that MDE MRI with a higher dimensional encoding space can reconstruct images more efficiently and with a smaller reconstruction error when the k-space sampling distribution and the number of samples are controlled. Copyright © 2012 Wiley Periodicals, Inc.

  18. Chlamydia trachomatis protein CT009 is a structural and functional homolog to the key morphogenesis component RodZ and interacts with division septal plane localized MreB.

    Science.gov (United States)

    Kemege, Kyle E; Hickey, John M; Barta, Michael L; Wickstrum, Jason; Balwalli, Namita; Lovell, Scott; Battaile, Kevin P; Hefty, P Scott

    2015-02-01

    Cell division in Chlamydiae is poorly understood as apparent homologs to most conserved bacterial cell division proteins are lacking and presence of elongation (rod shape) associated proteins indicate non-canonical mechanisms may be employed. The rod-shape determining protein MreB has been proposed as playing a unique role in chlamydial cell division. In other organisms, MreB is part of an elongation complex that requires RodZ for proper function. A recent study reported that the protein encoded by ORF CT009 interacts with MreB despite low sequence similarity to RodZ. The studies herein expand on those observations through protein structure, mutagenesis and cellular localization analyses. Structural analysis indicated that CT009 shares high level of structural similarity to RodZ, revealing the conserved orientation of two residues critical for MreB interaction. Substitutions eliminated MreB protein interaction and partial complementation provided by CT009 in RodZ deficient Escherichia coli. Cellular localization analysis of CT009 showed uniform membrane staining in Chlamydia. This was in contrast to the localization of MreB, which was restricted to predicted septal planes. MreB localization to septal planes provides direct experimental observation for the role of MreB in cell division and supports the hypothesis that it serves as a functional replacement for FtsZ in Chlamydia. © 2014 John Wiley & Sons Ltd.

  19. Chlamydia trachomatis protein CT009 is a structural and functional homolog to the key morphogenesis component RodZ and interacts with division septal plane localized MreB

    Science.gov (United States)

    Kemege, Kyle E.; Hickey, John M.; Barta, Michael L.; Wickstrum, Jason; Balwalli, Namita; Lovell, Scott; Battaile, Kevin P.; Hefty, P. Scott

    2015-01-01

    Summary Cell division in Chlamydiae is poorly understood as apparent homologs to most conserved bacterial cell division proteins are lacking and presence of elongation (rod shape) associated proteins indicate non-canonical mechanisms may be employed. The rod-shape determining protein MreB has been proposed as playing a unique role in chlamydial cell division. In other organisms, MreB is part of an elongation complex that requires RodZ for proper function. A recent study reported that the protein encoded by ORF CT009 interacts with MreB despite low sequence similarity to RodZ. The studies herein expand on those observations through protein structure, mutagenesis, and cellular localization analyses. Structural analysis indicated that CT009 shares high level of structural similarity to RodZ, revealing the conserved orientation of two residues critical for MreB interaction. Substitutions eliminated MreB protein interaction and partial complementation provided by CT009 in RodZ deficient E. coli. Cellular localization analysis of CT009 showed uniform membrane staining in Chlamydia. This was in contrast to the localization of MreB, which was restricted to predicted septal planes. MreB localization to septal planes provides direct experimental observation for the role of MreB in cell division and supports the hypothesis that it serves as a functional replacement for FtsZ in Chlamydia. PMID:25382739

  20. Virally encoded 7TM receptors

    DEFF Research Database (Denmark)

    Rosenkilde, M M; Waldhoer, M; Lüttichau, H R

    2001-01-01

    expression of this single gene in certain lymphocyte cell lineages leads to the development of lesions which are remarkably similar to Kaposi's sarcoma, a human herpesvirus 8 associated disease. Thus, this and other virally encoded 7TM receptors appear to be attractive future drug targets.......A number of herpes- and poxviruses encode 7TM G-protein coupled receptors most of which clearly are derived from their host chemokine system as well as induce high expression of certain 7TM receptors in the infected cells. The receptors appear to be exploited by the virus for either immune evasion...

  1. Secondary prevention through cardiac rehabilitation: physical activity counselling and exercise training: key components of the position paper from the Cardiac Rehabilitation Section of the European Association of Cardiovascular Prevention and Rehabilitation

    DEFF Research Database (Denmark)

    Corrà, Ugo; Piepoli, Massimo F; Carré, François

    2010-01-01

    of a healthy lifestyle. These secondary prevention targets are included in the overall goal of cardiac rehabilitation (CR). Cardiac rehabilitation can be viewed as the clinical application of preventive care by means of a professional multi-disciplinary integrated approach for comprehensive risk reduction...... and global long-term care of cardiac patients. The CR approach is delivered in tandem with a flexible follow-up strategy and easy access to a specialized team. To promote implementation of cardiac prevention and rehabilitation, the CR Section of the EACPR (European Association of Cardiovascular Prevention...... and Rehabilitation) has recently completed a Position Paper, entitled 'Secondary prevention through cardiac rehabilitation: A condition-oriented approach'. Components of multidisciplinary CR for seven clinical presentations have been addressed. Components include patient assessment, physical activity counselling...

  2. Place field assembly distribution encodes preferred locations.

    Directory of Open Access Journals (Sweden)

    Omar Mamad

    2017-09-01

    Full Text Available The hippocampus is the main locus of episodic memory formation and the neurons there encode the spatial map of the environment. Hippocampal place cells represent location, but their role in the learning of preferential location remains unclear. The hippocampus may encode locations independently from the stimuli and events that are associated with these locations. We have discovered a unique population code for the experience-dependent value of the context. The degree of reward-driven navigation preference highly correlates with the spatial distribution of the place fields recorded in the CA1 region of the hippocampus. We show place field clustering towards rewarded locations. Optogenetic manipulation of the ventral tegmental area demonstrates that the experience-dependent place field assembly distribution is directed by tegmental dopaminergic activity. The ability of the place cells to remap parallels the acquisition of reward context. Our findings present key evidence that the hippocampal neurons are not merely mapping the static environment but also store the concurrent context reward value, enabling episodic memory for past experience to support future adaptive behavior.

  3. Key distillation in quantum cryptography

    Science.gov (United States)

    Slutsky, Boris Aron

    1998-11-01

    Quantum cryptography is a technique which permits two parties to communicate over an open channel and establish a shared sequence of bits known only to themselves. This task, provably impossible in classical cryptography, is accomplished by encoding the data on quantum particles and harnessing their unique properties. It is believed that no eavesdropping attack consistent with the laws of quantum theory can compromise the secret data unknowingly to the legitimate users of the channel. Any attempt by a hostile actor to monitor the data carrying particles while in transit reveals itself through transmission errors it must inevitably introduce. Unfortunately, in practice a communication is not free of errors even when no eavesdropping is present. Key distillation is a technique that permits the parties to overcome this difficulty and establish a secret key despite channel defects, under the assumption that every particle is handled independently from other particles by the enemy. In the present work, key distillation is described and its various aspects are studied. A relationship is derived between the average error rate resulting from an eavesdropping attack and the amount of information obtained by the attacker. Formal definition is developed of the security of the final key. The net throughput of secret bits in a quantum cryptosystem employing key distillation is assessed. An overview of quantum cryptographic protocols and related information theoretical results is also given.

  4. Encoding and Retrieval Interference in Sentence Comprehension: Evidence from Agreement

    Directory of Open Access Journals (Sweden)

    Sandra Villata

    2018-01-01

    Full Text Available Long-distance verb-argument dependencies generally require the integration of a fronted argument when the verb is encountered for sentence interpretation. Under a parsing model that handles long-distance dependencies through a cue-based retrieval mechanism, retrieval is hampered when retrieval cues also resonate with non-target elements (retrieval interference. However, similarity-based interference may also stem from interference arising during the encoding of elements in memory (encoding interference, an effect that is not directly accountable for by a cue-based retrieval mechanism. Although encoding and retrieval interference are clearly distinct at the theoretical level, it is difficult to disentangle the two on empirical grounds, since encoding interference may also manifest at the retrieval region. We report two self-paced reading experiments aimed at teasing apart the role of each component in gender and number subject-verb agreement in Italian and English object relative clauses. In Italian, the verb does not agree in gender with the subject, thus providing no cue for retrieval. In English, although present tense verbs agree in number with the subject, past tense verbs do not, allowing us to test the role of number as a retrieval cue within the same language. Results from both experiments converge, showing similarity-based interference at encoding, and some evidence for an effect at retrieval. After having pointed out the non-negligible role of encoding in sentence comprehension, and noting that Lewis and Vasishth’s (2005 ACT-R model of sentence processing, the most fully developed cue-based retrieval approach to sentence processing does not predict encoding effects, we propose an augmentation of this model that predicts these effects. We then also propose a self-organizing sentence processing model (SOSP, which has the advantage of accounting for retrieval and encoding interference with a single mechanism.

  5. Encoding and Retrieval Interference in Sentence Comprehension: Evidence from Agreement

    Science.gov (United States)

    Villata, Sandra; Tabor, Whitney; Franck, Julie

    2018-01-01

    Long-distance verb-argument dependencies generally require the integration of a fronted argument when the verb is encountered for sentence interpretation. Under a parsing model that handles long-distance dependencies through a cue-based retrieval mechanism, retrieval is hampered when retrieval cues also resonate with non-target elements (retrieval interference). However, similarity-based interference may also stem from interference arising during the encoding of elements in memory (encoding interference), an effect that is not directly accountable for by a cue-based retrieval mechanism. Although encoding and retrieval interference are clearly distinct at the theoretical level, it is difficult to disentangle the two on empirical grounds, since encoding interference may also manifest at the retrieval region. We report two self-paced reading experiments aimed at teasing apart the role of each component in gender and number subject-verb agreement in Italian and English object relative clauses. In Italian, the verb does not agree in gender with the subject, thus providing no cue for retrieval. In English, although present tense verbs agree in number with the subject, past tense verbs do not, allowing us to test the role of number as a retrieval cue within the same language. Results from both experiments converge, showing similarity-based interference at encoding, and some evidence for an effect at retrieval. After having pointed out the non-negligible role of encoding in sentence comprehension, and noting that Lewis and Vasishth’s (2005) ACT-R model of sentence processing, the most fully developed cue-based retrieval approach to sentence processing does not predict encoding effects, we propose an augmentation of this model that predicts these effects. We then also propose a self-organizing sentence processing model (SOSP), which has the advantage of accounting for retrieval and encoding interference with a single mechanism. PMID:29403414

  6. Cloning and Characterization of upp, a Gene Encoding Uracil Phosphoribosyltransferase from Lactococcus lactis

    DEFF Research Database (Denmark)

    Martinussen, Jan; Hammer, Karin

    1994-01-01

    Uracil phosphoribosyltransferase catalyzes the key reaction in the salvage of uracil in many microorganisms. The gene encoding uracil phosphoribosyltransferase (upp) was cloned from Lactococcus lactis subsp. cremoris MG1363 by complementation of an Escherichia coli mutant. The gene was sequenced...

  7. Total sleep deprivation does not significantly degrade semantic encoding.

    Science.gov (United States)

    Honn, K A; Grant, D A; Hinson, J M; Whitney, P; Van Dongen, Hpa

    2018-01-17

    Sleep deprivation impairs performance on cognitive tasks, but it is unclear which cognitive processes it degrades. We administered a semantic matching task with variable stimulus onset asynchrony (SOA) and both speeded and self-paced trial blocks. The task was administered at the baseline and 24 hours later after 30.8 hours of total sleep deprivation (TSD) or matching well-rested control. After sleep deprivation, the 20% slowest response times (RTs) were significantly increased. However, the semantic encoding time component of the RTs remained at baseline level. Thus, the performance impairment induced by sleep deprivation on this task occurred in cognitive processes downstream of semantic encoding.

  8. Non-deterministic quantum CNOT gate with double encoding

    Science.gov (United States)

    Gueddana, Amor; Attia, Moez; Chatta, Rihab

    2013-09-01

    We define an Asymmetric Partially Polarizing Beam Splitter (APPBS) to be a linear optical component having different reflectivity (transmittance) coefficients, on the upper and the lower arms, for horizontally and vertically Polarized incident photons. Our CNOT model is composed by two APPBSs, one Half Wave Plate (HWP), two Polarizing Beam Splitters (PBSs), a Beam Splitter (BS) and a -phase rotator for specific wavelength. Control qubit operates with dual rail encoding while target qubit is based on polarization encoding. To perform CNOT operation in 4/27 of the cases, input and target incoming photons are injected with different wavelengths.

  9. Encoding information into precipitation structures

    International Nuclear Information System (INIS)

    Martens, Kirsten; Bena, Ioana; Droz, Michel; Rácz, Zoltan

    2008-01-01

    Material design at submicron scales would be profoundly affected if the formation of precipitation patterns could be easily controlled. It would allow the direct building of bulk structures, in contrast to traditional techniques which consist of removing material in order to create patterns. Here, we discuss an extension of our recent proposal of using electrical currents to control precipitation bands which emerge in the wake of reaction fronts in A + + B – → C reaction–diffusion processes. Our main result, based on simulating the reaction–diffusion–precipitation equations, is that the dynamics of the charged agents can be guided by an appropriately designed time-dependent electric current so that, in addition to the control of the band spacing, the width of the precipitation bands can also be tuned. This makes straightforward the encoding of information into precipitation patterns and, as an amusing example, we demonstrate the feasibility by showing how to encode a musical rhythm

  10. Other components

    International Nuclear Information System (INIS)

    Anon.

    1993-01-01

    This chapter includes descriptions of electronic and mechanical components which do not merit a chapter to themselves. Other hardware requires mention because of particularly high tolerance or intolerance of exposure to radiation. A more systematic analysis of radiation responses of structures which are definable by material was given in section 3.8. The components discussed here are field effect transistors, transducers, temperature sensors, magnetic components, superconductors, mechanical sensors, and miscellaneous electronic components

  11. Subcarrier multiplexing optical quantum key distribution

    International Nuclear Information System (INIS)

    Ortigosa-Blanch, A.; Capmany, J.

    2006-01-01

    We present the physical principles of a quantum key distribution system that opens the possibility of parallel quantum key distribution and, therefore, of a substantial improvement in the bit rate of such systems. Quantum mechanics allows for multiple measurements at different frequencies and thus we exploit this concept by extending the concept of frequency coding to the case where more than one radio-frequency subcarrier is used for independently encoding the bits onto an optical carrier. Taking advantage of subcarrier multiplexing techniques we demonstrate that the bit rate can be greatly improved as parallel key distribution is enabled

  12. Fabrication of high-resolution reflective scale grating for an optical encoder using a patterned self-assembly process

    International Nuclear Information System (INIS)

    Fan, Shanjin; Jiang, Weitao; Li, Xuan; Yu, Haoyu; Lei, Biao; Shi, Yongsheng; Yin, Lei; Chen, Bangdao; Liu, Hongzhong

    2016-01-01

    Steel tape scale grating of a reflective incremental linear encoder has a key impact on the measurement accuracy of the optical encoder. However, it is difficult for conventional manufacturing processes to fabricate scale grating with high-resolution grating strips, due to process and material problems. In this paper, self-assembly technology was employed to fabricate high-resolution steel tape scale grating for a reflective incremental linear encoder. Graphene oxide nanoparticles were adopted to form anti-reflective grating strips of steel tape scale grating. They were deposited in the tape, which had a hydrophobic and hydrophilic grating pattern when the dispersion of the nanoparticles evaporated. A standard lift-off process was employed to fabricate the hydrophobic grating strips on the steel tape. Simultaneously, the steel tape itself presents a hydrophilic property. The hydrophobic and hydrophilic grating pattern was thus obtained. In this study, octafluorocyclobutane was used to prepare the hydrophobic grating strips, due to its hydrophobic property. High-resolution graphene oxide steel tape scale grating with a pitch of 20 μ m was obtained through the self-assembly process. The photoelectric signals of the optical encoder containing the graphene oxide scale grating and conventional scale grating were tested under the same conditions. Comparison test results showed that the graphene oxide scale grating has a better performance in its amplitude and harmonic components than that of the conventional steel tape scale. A comparison experiment of position errors was also conducted, demonstrating an improvement in the positioning error of the graphene oxide scale grating. The comparison results demonstrated the applicability of the proposed self-assembly process to fabricate high-resolution graphene oxide scale grating for a reflective incremental linear encoder. (paper)

  13. Proactividad Medioambiental en la Empresa: Clasificación Empírica y Determinación de Aspectos Clave (Environmental proactiveness in the company: an empirical categorization and its key components

    Directory of Open Access Journals (Sweden)

    María del Val Segarra Oña

    2012-11-01

    Full Text Available La proactividad medioambiental es partefundamental de la responsabilidad socialcorporativa de las empresas y genera beneficiostanto tangibles como intangibles. En estetrabajo se presenta un modelo de evaluacióny clasificación empresarial en función de laorientación hacia el medioambiente. Un análisisempírico a través de técnicas cuantitativasaplicadas a noventa y seis empresas industrialesespañolas ubicadas en la Comunidad Valencianapermite clasificar la muestra en tres gruposdiferentes. Se identifican también los factores quedeterminan dicha orientación y que caracterizanel grado de proactividad medioambiental. Losresultados obtenidos, por una parte, permitenorientar adecuadamente las actividades internasde la empresa al poner de manifiesto las causasy efectos que la proactividad medioambientaltiene sobre la competitividad de las empresasy, por otra parte, deben servir de guía paradefinir, de manera eficiente, las políticas públicasencaminadas a mejorar y aumentar la implicaciónmedioambiental del tejido empresarial.   ABSTRACT Environmental proactiveness is afundamental component of any company´scorporate social responsibility that producesboth tangible and intangible benefits. Thispaper presents an evaluation and categorizationmodel from an environmental point of view.An empirical analysis made with quantitativetechniques to 96 Spanish industrial companieslocated in the Valencia Community, allowedus to distribute the sample in three distinctivegroups. The factors leading to that distributionand characterizing the degree of environmentalproactiveness were also identified. The resultsmake possible to steer a company´s internalactivities by highlighting the causes and effectsthat environmental proactiveness has on itscompetitiveness, and serve as a guide to shape uppublic policies aimed at increasing and improvingthe environmental involvement of businessnetworks.

  14. Providing the climatic component in human-climate interaction studies: 550,000 years of climate history in the Chew Bahir basin, a key HSPDP site in southern Ethiopia.

    Science.gov (United States)

    Foerster, V. E.; Asrat, A.; Bronk Ramsey, C.; Chapot, M. S.; Cohen, A. S.; Dean, J. R.; Deocampo, D.; Deino, A. L.; Guenter, C.; Junginger, A.; Lamb, H. F.; Leng, M. J.; Roberts, H. M.; Schaebitz, F.; Trauth, M. H.

    2017-12-01

    As a contribution towards an enhanced understanding of human-climate interactions, the Hominin Sites and Paleolakes Drilling Project (HSPDP) has cored six predominantly lacustrine archives of climate change spanning much of the last 3.5 Ma in eastern Africa. All six sites in Ethiopia and Kenya are adjacent to key paleoanthropological sites encompassing diverse milestones in human evolution, dispersal, and technological innovation. The 280 m-long Chew Bahir sediment core, recovered from a tectonically-bound basin in the southern Ethiopian rift in late 2014, covers the past 550 ka of environmental history, an interval marked by intense climatic changes and includes the transition to the Middle Stone Age and the origin and dispersal of modern Homo sapiens. We present the outcome of lithologic and stratigraphic investigations, first interpretations of high resolution MSCL and XRF scanning data, and initial results of detailed multi-indicator analysis of the Chew Bahir cores. These analyses are based on more than 14,000 discrete samples, including grain size analyses and X-ray diffraction. An initial chronology, based on Ar/Ar and OSL dating, allows temporal calibration of our reconstruction of dry-wet cycles. Both geochemical and sedimentological data show that the Chew Bahir deposits are sensitive recorders of climate change on millennial to centennial timescales. Initial statistical analyses identify phases marked by abrupt climatic changes, whereas several long-term wet-dry oscillations reveal variations mostly in the precession ( 15-25 kyr), but also in the obliquity ( 40 kyr) and eccentricity frequency bands ( 90-120 kyr). The Chew Bahir record will help decode climate variation on several different time scales, as a consequence of orbitally-driven high-latitude glacial-interglacial shifts and variations in greenhouse gases, Indian and Atlantic Ocean sea-surface temperatures, as well as local solar irradiance. This 550 ka record of environmental change in eastern

  15. Hall effect encoding of brushless dc motors

    Science.gov (United States)

    Berard, C. A.; Furia, T. J.; Goldberg, E. A.; Greene, R. C.

    1970-01-01

    Encoding mechanism integral to the motor and using the permanent magnets embedded in the rotor eliminates the need for external devices to encode information relating the position and velocity of the rotating member.

  16. Flipped-Adversarial AutoEncoders

    OpenAIRE

    Zhang, Jiyi; Dang, Hung; Lee, Hwee Kuan; Chang, Ee-Chien

    2018-01-01

    We propose a flipped-Adversarial AutoEncoder (FAAE) that simultaneously trains a generative model G that maps an arbitrary latent code distribution to a data distribution and an encoder E that embodies an "inverse mapping" that encodes a data sample into a latent code vector. Unlike previous hybrid approaches that leverage adversarial training criterion in constructing autoencoders, FAAE minimizes re-encoding errors in the latent space and exploits adversarial criterion in the data space. Exp...

  17. Electronic components

    CERN Document Server

    Colwell, Morris A

    1976-01-01

    Electronic Components provides a basic grounding in the practical aspects of using and selecting electronics components. The book describes the basic requirements needed to start practical work on electronic equipment, resistors and potentiometers, capacitance, and inductors and transformers. The text discusses semiconductor devices such as diodes, thyristors and triacs, transistors and heat sinks, logic and linear integrated circuits (I.C.s) and electromechanical devices. Common abbreviations applied to components are provided. Constructors and electronics engineers will find the book useful

  18. Two factors defining humus as a key structural component of soil organic matter and as a physicochemical speciation of carbon in its turnover wending its way through the micro environment of soil, sediments and natural waters

    Science.gov (United States)

    Aleksandrova, Olga

    2016-04-01

    on a change in the partitioning of roaming H-bonds, and in turn, define components, into which non-humified SOM can be disintegrated. Therefore, some physicochemical species of SOM, which can be observed in physicochemical processes of carbon turnover in soil, originate from disintegrated SOM bulged at the seams of weak H-bonds, and doesn't reveal strong properties of humus because humus structure is still bound to SOM via stronger H-bonds. Also, SL EPR examination of native and labeled soil samples revealed the substantial influence of hydrophobic interaction on physicochemical speciation of carbon in soil, and this interaction is mediated by humus [3]. Among different effects of hydrophobic interaction, the formation of condensed matter is of great interest. Condensed matter mediated by humic acids is shown to reveal specific quantum properties and invoke hydrodynamic instability on the surface of plant roots that results in uptake of the whole nano-pieces of humus by plant roots, as it was observed in [6, 7]. Considered effects of H-bonds with different bonding energy and hydrophobic interaction in SOM show that a carbon turnover in soil is mediated by humus, and humus play a substantial role as the physicochemical speciation in carbon turnover. Thus, model of 'humus' is still an up-to-date model. 1.Lehmann J. &Kleber H. (2015). Nature, 528, Issue 7580, 60 - 68. 2. M. Hutta, R. Gora, R. Halko, et al., (2011). J. Chromatogr. A., 1218, 8946. 3. Alexanderova O.N. (2015). J Soils Sediments, DOI 10.1007/s11368-015-1195-2 4. Aleksandrova O.N., Kholodov V.A., Perminova I.V. (2015). Russian Journal of Physical Chemistry A, 2015, Vol. 89, No. 8, pp. 1407-1413. 5. Aleksandrova O.N. (2013). J Geochem Explor 129:6-13. 6. Smirnov A.I. et al. (1991). J. of Magnetic Resonance 91, 386-391 7. Kulikova N.V. et al. (2012). Conference HIT-2012.

  19. Unprecedented loss of ammonia assimilation capability in a urease-encoding bacterial mutualist

    Directory of Open Access Journals (Sweden)

    Wernegreen Jennifer J

    2010-12-01

    Full Text Available Abstract Background Blochmannia are obligately intracellular bacterial mutualists of ants of the tribe Camponotini. Blochmannia perform key nutritional functions for the host, including synthesis of several essential amino acids. We used Illumina technology to sequence the genome of Blochmannia associated with Camponotus vafer. Results Although Blochmannia vafer retains many nutritional functions, it is missing glutamine synthetase (glnA, a component of the nitrogen recycling pathway encoded by the previously sequenced B. floridanus and B. pennsylvanicus. With the exception of Ureaplasma, B. vafer is the only sequenced bacterium to date that encodes urease but lacks the ability to assimilate ammonia into glutamine or glutamate. Loss of glnA occurred in a deletion hotspot near the putative replication origin. Overall, compared to the likely gene set of their common ancestor, 31 genes are missing or eroded in B. vafer, compared to 28 in B. floridanus and four in B. pennsylvanicus. Three genes (queA, visC and yggS show convergent loss or erosion, suggesting relaxed selection for their functions. Eight B. vafer genes contain frameshifts in homopolymeric tracts that may be corrected by transcriptional slippage. Two of these encode DNA replication proteins: dnaX, which we infer is also frameshifted in B. floridanus, and dnaG. Conclusions Comparing the B. vafer genome with B. pennsylvanicus and B. floridanus refines the core genes shared within the mutualist group, thereby clarifying functions required across ant host species. This third genome also allows us to track gene loss and erosion in a phylogenetic context to more fully understand processes of genome reduction.

  20. Prefrontal activity and impaired memory encoding strategies in schizophrenia.

    Science.gov (United States)

    Guimond, Synthia; Hawco, Colin; Lepage, Martin

    2017-08-01

    Schizophrenia patients have significant memory difficulties that have far-reaching implications in their daily life. These impairments are partly attributed to an inability to self-initiate effective memory encoding strategies, but its core neurobiological correlates remain unknown. The current study addresses this critical gap in our knowledge of episodic memory impairments in schizophrenia. Schizophrenia patients (n = 35) and healthy controls (n = 23) underwent a Semantic Encoding Memory Task (SEMT) during an fMRI scan. Brain activity was examined for conditions where participants were a) prompted to use semantic encoding strategies, or b) not prompted but required to self-initiate such strategies. When prompted to use semantic encoding strategies, schizophrenia patients exhibited similar recognition performance and brain activity as healthy controls. However, when required to self-initiate these strategies, patients had significant reduced recognition performance and brain activity in the left dorsolateral prefrontal cortex, as well as in the left temporal gyrus, left superior parietal lobule, and cerebellum. When patients were divided based on performance on the SEMT, the subgroup with more severe deficits in self-initiation also showed greater reduction in left dorsolateral prefrontal activity. These results suggest that impaired self-initiation of elaborative encoding strategies is a driving feature of memory deficits in schizophrenia. We also identified the neural correlates of impaired self-initiation of semantic encoding strategies, in which a failure to activate the left dorsolateral prefrontal cortex plays a key role. These findings provide important new targets in the development of novel treatments aiming to improve memory and ultimately patients' outcome. Copyright © 2017. Published by Elsevier Ltd.

  1. Fibre Optic Communication Key Devices

    CERN Document Server

    Grote, Norbert

    2012-01-01

    The book gives an in-depth description of the key devices of current and next generation fibre optic communication networks. In particular, the book covers devices such as semiconductor lasers, optical amplifiers, modulators, wavelength filters, and detectors but the relevant properties of optical fibres as well. The presentations include the physical principles underlying the various devices, the technologies used for the realization of the different devices, typical performance characteristics and limitations, and development trends towards more advanced components are also illustrated. Thus the scope of the book spans relevant principles, state-of-the-art implementations, the status of current research and expected future components.

  2. Tagging, Encoding, and Jones Optimality

    DEFF Research Database (Denmark)

    Danvy, Olivier; Lopez, Pablo E. Martinez

    2003-01-01

    A partial evaluator is said to be Jones-optimal if the result of specializing a self-interpreter with respect to a source program is textually identical to the source program, modulo renaming. Jones optimality has already been obtained if the self-interpreter is untyped. If the selfinterpreter...... is typed, however, residual programs are cluttered with type tags. To obtain the original source program, these tags must be removed. A number of sophisticated solutions have already been proposed. We observe, however, that with a simple representation shift, ordinary partial evaluation is already Jones......-optimal, modulo an encoding. The representation shift amounts to reading the type tags as constructors for higherorder abstract syntax. We substantiate our observation by considering a typed self-interpreter whose input syntax is higher-order. Specializing this interpreter with respect to a source program yields...

  3. Automatic encoding of polyphonic melodies in musicians and nonmusicians.

    Science.gov (United States)

    Fujioka, Takako; Trainor, Laurel J; Ross, Bernhard; Kakigi, Ryusuke; Pantev, Christo

    2005-10-01

    In music, multiple musical objects often overlap in time. Western polyphonic music contains multiple simultaneous melodic lines (referred to as "voices") of equal importance. Previous electrophysiological studies have shown that pitch changes in a single melody are automatically encoded in memory traces, as indexed by mismatch negativity (MMN) and its magnetic counterpart (MMNm), and that this encoding process is enhanced by musical experience. In the present study, we examined whether two simultaneous melodies in polyphonic music are represented as separate entities in the auditory memory trace. Musicians and untrained controls were tested in both magnetoencephalogram and behavioral sessions. Polyphonic stimuli were created by combining two melodies (A and B), each consisting of the same five notes but in a different order. Melody A was in the high voice and Melody B in the low voice in one condition, and this was reversed in the other condition. On 50% of trials, a deviant final (5th) note was played either in the high or in the low voice, and it either went outside the key of the melody or remained within the key. These four deviations occurred with equal probability of 12.5% each. Clear MMNm was obtained for most changes in both groups, despite the 50% deviance level, with a larger amplitude in musicians than in controls. The response pattern was consistent across groups, with larger MMNm for deviants in the high voice than in the low voice, and larger MMNm for in-key than out-of-key changes, despite better behavioral performance for out-of-key changes. The results suggest that melodic information in each voice in polyphonic music is encoded in the sensory memory trace, that the higher voice is more salient than the lower, and that tonality may be processed primarily at cognitive stages subsequent to MMN generation.

  4. Emotional arousal and memory after deep encoding.

    Science.gov (United States)

    Leventon, Jacqueline S; Camacho, Gabriela L; Ramos Rojas, Maria D; Ruedas, Angelica

    2018-05-22

    Emotion often enhances long-term memory. One mechanism for this enhancement is heightened arousal during encoding. However, reducing arousal, via emotion regulation (ER) instructions, has not been associated with reduced memory. In fact, the opposite pattern has been observed: stronger memory for emotional stimuli encoded with an ER instruction to reduce arousal. This pattern may be due to deeper encoding required by ER instructions. In the current research, we examine the effects of emotional arousal and deep-encoding on memory across three studies. In Study 1, adult participants completed a writing task (deep-encoding) for encoding negative, neutral, and positive picture stimuli, whereby half the emotion stimuli had the ER instruction to reduce the emotion. Memory was strong across conditions, and no memory enhancement was observed for any condition. In Study 2, adult participants completed the same writing task as Study 1, as well as a shallow-encoding task for one-third of negative, neutral, and positive trials. Memory was strongest for deep vs. shallow encoding trials, with no effects of emotion or ER instruction. In Study 3, adult participants completed a shallow-encoding task for negative, neutral, and positive stimuli, with findings indicating enhanced memory for negative emotional stimuli. Findings suggest that deep encoding must be acknowledged as a source of memory enhancement when examining manipulations of emotion-related arousal. Copyright © 2018. Published by Elsevier B.V.

  5. Quantum key management

    Energy Technology Data Exchange (ETDEWEB)

    Hughes, Richard John; Thrasher, James Thomas; Nordholt, Jane Elizabeth

    2016-11-29

    Innovations for quantum key management harness quantum communications to form a cryptography system within a public key infrastructure framework. In example implementations, the quantum key management innovations combine quantum key distribution and a quantum identification protocol with a Merkle signature scheme (using Winternitz one-time digital signatures or other one-time digital signatures, and Merkle hash trees) to constitute a cryptography system. More generally, the quantum key management innovations combine quantum key distribution and a quantum identification protocol with a hash-based signature scheme. This provides a secure way to identify, authenticate, verify, and exchange secret cryptographic keys. Features of the quantum key management innovations further include secure enrollment of users with a registration authority, as well as credential checking and revocation with a certificate authority, where the registration authority and/or certificate authority can be part of the same system as a trusted authority for quantum key distribution.

  6. KEY COMPONENTS OF A MOTORCYCLE-TRAFFIC SYSTEM

    Directory of Open Access Journals (Sweden)

    H. HUSSAIN

    2005-01-01

    The small- and medium-sized type motorcycles (150c.c. and below made up 99% of the motorcycles population in Malaysia. A static motorcyclist measured about 0.8m in width, 2.0m in length, and requires an operating width of 1.3m. At a lane width of 1.7m or below, motorcycle flow applies the lane or headway concept. Above this optimum value, motorcycle flow adopted the space concept. This implied that a motorcycle path should be more than 1.7m wide to allow two motorcyclists to pass each other.

  7. Ocean gliders as key component within the AORAC-SA

    Science.gov (United States)

    Barrera, C.; Hernandez Brito, J.; Castro, A.; Rueda, M. J.; Llinas, O.

    2016-02-01

    The Atlantic Ocean Research Alliance Coordination and Support Action (AORAC-SA) is designed to provide scientific, technical and logistical support to the EU in developing and implementing transAtlantic Marine Research Cooperation between the European Union, the United States of America and Canada. The Coordination and Support Action (CSA) is carried out within the framework of the Atlantic Ocean Research Alliance (AORA) as outlined in the Galway Statement on Atlantic Ocean Cooperation (May 2013). The CSA will be responsible for the organization of expert and stakeholder meetings, workshops and conferences required by the AORA and related to identified research priorities support actions and other initiatives as they arise, taking into account related Horizon 2020 supported transAtlantic projects and on-going national and EU collaborative projects. The AORAC-SA support and governance structure comprises a Secretariat and Management Team, guided by a high-level Operational Board, representative of the major European Marine Research Programming and Funding Organizations as well as those of the USA and Canada. As example of this research cooperative framework, ocean gliders have become nowadays a common, innovative and sustainable ocean-observations tool for the Atlantic basin, linking research groups, govermental institutions and private companies from both sides in terms of technical developments, transatlantic missions in partnership, training forums, etc. aiming to develop common practices and protocols for a better ocean resources management and understanding. Within this context, the Oceanic Platform of the Canary Islands (PLOCAN), as AORAC-SA partner, is working on specific actions like ocean glider observations programs (endurance line) by AtlantOS project (www.atlantos-h2020.eu), related new technical developments by NeXOS FP-7 project (www.nexosproject.eu) and a yearly International Glider School forum hosting (www.gliderschool.eu).

  8. Becoming a health promoting school: key components of planning.

    Science.gov (United States)

    Senior, Elizabeth

    2012-03-01

    This article looks at the practicalities of implementing the health promoting school (HPS) framework, including conducting a whole school audit, to enable a primary school to successfully adopt the HPS principles. A partnership agreement was signed, between EACH Social and Community Health which is a local Community Health Centre and a primary school in the Eastern suburbs of Melbourne, in Australia. An audit was conducted of the school community with four follow up focus groups of students from grades 3 to 6. Qualitative data was gathered from 20 teachers at the school at a professional development day facilitated by the health promotion staff of the Community Health Centre. The results of the school audit identified that students in grades 3 to 6 and parents valued the outside environment of the school most highly. The staff valued staff attributes most highly. Suggestions from students to improve the school included improving the canteen and outside environment. Staff were most concerned about fitness of both the staff and the students. Parents also identified lack of healthy eating as a concern. The school community sees the value of adopting the HPS framework, however on-going structured support is required if the school is to successfully adopt the HPS approach. The school community needs to understand that the move toward cultural and environmental change is slow. Successful adoption of the HPS model requires time and collaboration. The emphasis needs to be on supporting teachers to change their school from within. Relationships are important.

  9. Prevention: a key component to saving lives and money.

    Science.gov (United States)

    Brown, Steve

    2009-03-01

    It's no mystery that one of the chief culprits to our current economic crisis is skyrocketing costs of providing health care, particularly to our nation's growing baby boom population. This makes the case all the more compelling to practice as much preventative care as possible to avoid a myriad of conditions that could lead to lengthy and costly hospital stays, and potentially even death.

  10. Extracellular proteins: Novel key components of metal resistance in cyanobacteria?

    Directory of Open Access Journals (Sweden)

    Joaquin eGiner-Lamia

    2016-06-01

    Full Text Available Metals are essential for all living organisms and required for fundamental biochemical processes. However, when in excess, metals can turn into highly-toxic agents able to disrupt cell membranes, alter enzymatic activities and damage DNA. Metal concentrations are therefore tightly controlled inside cells, particularly in cyanobacteria. Cyanobacteria are ecologically relevant prokaryotes that perform oxygenic photosynthesis and can be found in many different marine and freshwater ecosystems, including environments contaminated with heavy metals. As their photosynthetic machinery imposes high demands for metals, homeostasis of these micronutrients has been widely studied in cyanobacteria. So far, most studies have focused on how cells are capable of controlling their internal metal pools, with a strong bias towards the analysis of intracellular processes. Ultrastructure, modulation of physiology, dynamic changes in transcription and protein levels have been studied, but what takes place in the extracellular environment when cells are exposed to an unbalanced metal availability remains largely unknown. The interest in studying the subset of proteins present in the extracellular space has only recently begun and the identification and functional analysis of the cyanobacterial exoproteomes are just emerging. Remarkably, metal-related proteins such as the copper-chaperone CopM or the iron-binding protein FutA2 have already been identified outside the cell. With this perspective, we aim to raise the awareness that metal-resistance mechanisms are not yet fully known and hope to motivate future studies assessing the role of extracellular proteins on bacterial metal homeostasis, with a special focus on cyanobacteria.

  11. Transcriptome analysis elucidates key developmental components of bryozoan lophophore development

    KAUST Repository

    Wong, Yue Him; Ryu, Tae Woo; Ghosheh, Yanal; Qian, Pei-Yuan; Seridi, Loqmane; Bougouffa, Salim; Ravasi, Timothy

    2014-01-01

    metamorphosis. In situ hybridization of 23 genes that participate in the Wnt, BMP, Notch, and Hedgehog signaling pathways revealed their regulatory roles in the development of the lophophore and the ancestrula digestive tract. Our findings support the hypothesis

  12. The bowel: A key component of the immune system

    OpenAIRE

    Ramiro-Puig, E.; Pérez-Cano, F. J.; Castellote, C.; Franch, A.; Castell, M.

    2008-01-01

    El intestino se halla expuesto constantemente a una elevada carga antigénica procedente de la dieta y de bacterias comensales. El tejido linfoide asociado al intestino (Gut-Associated Lymphoid Tissue, GALT) constituye la parte más extensa y compleja del sistema inmunitario y es capaz de discriminar de forma eficaz entre patógenos invasivos y antígenos inocuos. El conocimiento de su particular subdivisión en tejido organizado, inductor de la respuesta inmunitaria (placas de Peyer y ganglios li...

  13. Authentification and trust: Key components in global SCM

    OpenAIRE

    KIDD, JB; STUMM, M

    2003-01-01

    Whilst there is growing pressure by standards authorities to have suppliers, logistics agents and end-users accept authentification codes (often 'bar' codes, and their derivatives) there is a growing awareness that we must trust in the probity of all involved in the supply chain. The 'chain' includes all members of the forward chain (manufacturing and its associated agents) and the reverse chain (the eco-disposal of end-of-life-goods). This paper discusses the intersection of the [technologic...

  14. Balanced Management: A Key Component of Managerial Effectiveness

    Science.gov (United States)

    Liccione, William J.

    2005-01-01

    The employee-employer relationship has changed. Previously, employees believed that their employers would recognize their loyalty and good work with steady compensation increases and job security. Since the mid-1980s, however, a steady stream of events has eroded this relationship: globalization, unfriendly takeovers, downsizing, and the efforts…

  15. Molybdenum-A Key Component of Metal Alloys

    Science.gov (United States)

    Kropschot, S.J.

    2010-01-01

    Molybdenum, whose chemical symbol is Mo, was first recognized as an element in 1778. Until that time, the mineral molybdenite-the most important source of molybdenum-was believed to be a lead mineral because of its metallic gray color, greasy feel, and softness. In the late 19th century, French metallurgists discovered that molybdenum, when alloyed (mixed) with steel in small quantities, creates a substance that is remarkably tougher than steel alone and is highly resistant to heat. The alloy was found to be ideal for making tools and armor plate. Today, the most common use of molybdenum is as an alloying agent in stainless steel, alloy steels, and superalloys to enhance hardness, strength, and resistance to corrosion.

  16. SnoVault and encodeD: A novel object-based storage system and applications to ENCODE metadata.

    Directory of Open Access Journals (Sweden)

    Benjamin C Hitz

    Full Text Available The Encyclopedia of DNA elements (ENCODE project is an ongoing collaborative effort to create a comprehensive catalog of functional elements initiated shortly after the completion of the Human Genome Project. The current database exceeds 6500 experiments across more than 450 cell lines and tissues using a wide array of experimental techniques to study the chromatin structure, regulatory and transcriptional landscape of the H. sapiens and M. musculus genomes. All ENCODE experimental data, metadata, and associated computational analyses are submitted to the ENCODE Data Coordination Center (DCC for validation, tracking, storage, unified processing, and distribution to community resources and the scientific community. As the volume of data increases, the identification and organization of experimental details becomes increasingly intricate and demands careful curation. The ENCODE DCC has created a general purpose software system, known as SnoVault, that supports metadata and file submission, a database used for metadata storage, web pages for displaying the metadata and a robust API for querying the metadata. The software is fully open-source, code and installation instructions can be found at: http://github.com/ENCODE-DCC/snovault/ (for the generic database and http://github.com/ENCODE-DCC/encoded/ to store genomic data in the manner of ENCODE. The core database engine, SnoVault (which is completely independent of ENCODE, genomic data, or bioinformatic data has been released as a separate Python package.

  17. Chaotic digital communication by encoding initial conditions.

    Science.gov (United States)

    Xiaofeng, Gong; Xingang, Wang; Meng, Zhan; Lai, C H

    2004-06-01

    We investigate the possibility to improve the noise performance of a chaotic digital communication scheme by utilizing further dynamical information. We show that by encoding the initial information of the chaotic carrier according to the transmitting bits, extra redundance can be introduced into the segments of chaotic signals corresponding to the consecutive bits. Such redundant information can be exploited effectively at the receiver end to improve the noise performance of the system. Compared to other methods (e.g., differential chaos shift keying), straightforward application of the proposed modulation/demodulation scheme already provides significant performance gain in the low signal-to-noise ratio (SNR) region. Furthermore, maximum likelihood precleaning procedure based on the Viterbi algorithm can be applied before the demodulation step to overcome the performance degradation in the high SNR region. The study indicates that it is possible to improve the noise performance of the chaotic digital communication scheme if further dynamics information is added to the system. (c) 2004 American Institute of Physics

  18. Group key management

    Energy Technology Data Exchange (ETDEWEB)

    Dunigan, T.; Cao, C.

    1997-08-01

    This report describes an architecture and implementation for doing group key management over a data communications network. The architecture describes a protocol for establishing a shared encryption key among an authenticated and authorized collection of network entities. Group access requires one or more authorization certificates. The implementation includes a simple public key and certificate infrastructure. Multicast is used for some of the key management messages. An application programming interface multiplexes key management and user application messages. An implementation using the new IP security protocols is postulated. The architecture is compared with other group key management proposals, and the performance and the limitations of the implementation are described.

  19. Modular Connector Keying Concept

    Science.gov (United States)

    Ishman, Scott; Dukes, Scott; Warnica, Gary; Conrad, Guy; Senigla, Steven

    2013-01-01

    For panel-mount-type connectors, keying is usually "built-in" to the connector body, necessitating different part numbers for each key arrangement. This is costly for jobs that require small quantities. This invention was driven to provide a cost savings and to reduce documentation of individual parts. The keys are removable and configurable in up to 16 combinations. Since the key parts are separate from the connector body, a common design can be used for the plug, receptacle, and key parts. The keying can then be set at the next higher assembly.

  20. Biometry, the safe key

    Directory of Open Access Journals (Sweden)

    María Fraile-Hurtado

    2010-12-01

    Full Text Available Biometry is the next step in authentication, why do not we take this stepforward in our communication security systems? Keys are the main disadvantage in the cryptography, what if we were our own key?

  1. Financial Key Ratios

    OpenAIRE

    Tănase Alin-Eliodor

    2014-01-01

    This article focuses on computing techniques starting from trial balance data regarding financial key ratios. There are presented activity, liquidity, solvency and profitability financial key ratios. It is presented a computing methodology in three steps based on a trial balance.

  2. Public Key Cryptography.

    Science.gov (United States)

    Tapson, Frank

    1996-01-01

    Describes public key cryptography, also known as RSA, which is a system using two keys, one used to put a message into cipher and another used to decipher the message. Presents examples using small prime numbers. (MKR)

  3. Key Management Laboratory

    Data.gov (United States)

    Federal Laboratory Consortium — FUNCTION: Provides a secure environment to research and develop advanced electronic key management and networked key distribution technologies for the Navy and DoD....

  4. Public Key Infrastructure Study

    National Research Council Canada - National Science Library

    Berkovits, Shimshon

    1994-01-01

    The National Institute of Standards and Technology (NIST) has tasked The MITRE Corporation to study the alternatives for automated management of public keys and of the associated public key certificates for the Federal Government...

  5. Encoder designed to work in harsh environments

    Energy Technology Data Exchange (ETDEWEB)

    Toop, L.

    2007-05-15

    Dynapar has developed the Acuro AX71 absolute encoder for use on offshore or land-based oil rig operations. It provides feedback on the operation of automated systems such as draw works, racking systems, rotary tables and top drives. By ensuring that automated systems function properly, this encoder responds to a need by the oil and gas industry to keep workers safe and improve efficiency, particularly for operations in rugged situations. The encoder provides feedback from motor systems to controllers, giving information about position and speed of downhole drill bits. This newly developed encoder is better than commonly used incremental encoders which are not precise in strong electrical noise environments. Rather, the absolute encoder uses a different method of reporting to the controller. A digital signal is transmitted constantly as the device operates. It is less susceptible to noise issues. It is highly accurate, tolerant of noise and is not affected by power outages. However, the absolute encoder is generally more delicate in drilling applications with high ambient temperatures and shock levels. Dynapar addressed this issue by developing compact stainless steel housing that is useful for corrosion resistance in marine applications. The AX71 absolute encoder can withstand up to 100 G of mechanical shock and ambient temperatures of up to 60 degrees C. The encoder is ATEX certified without barriers, and offers the high resolution feedback of 4,000 counts of multiturn rotation and 16,000 counts of position. 1 fig.

  6. Securing information using optically generated biometric keys

    Science.gov (United States)

    Verma, Gaurav; Sinha, Aloka

    2016-11-01

    In this paper, we present a new technique to obtain biometric keys by using the fingerprint of a person for an optical image encryption system. The key generation scheme uses the fingerprint biometric information in terms of the amplitude mask (AM) and the phase mask (PM) of the reconstructed fingerprint image that is implemented using the digital holographic technique. Statistical tests have been conducted to check the randomness of the fingerprint PM key that enables its usage as an image encryption key. To explore the utility of the generated biometric keys, an optical image encryption system has been further demonstrated based on the phase retrieval algorithm and the double random phase encoding scheme in which keys for the encryption are used as the AM and the PM key. The advantage associated with the proposed scheme is that the biometric keys’ retrieval requires the simultaneous presence of the fingerprint hologram and the correct knowledge of the reconstruction parameters at the decryption stage, which not only verifies the authenticity of the person but also protects the valuable fingerprint biometric features of the keys. Numerical results are carried out to prove the feasibility and the effectiveness of the proposed encryption system.

  7. Principal components

    NARCIS (Netherlands)

    Hallin, M.; Hörmann, S.; Piegorsch, W.; El Shaarawi, A.

    2012-01-01

    Principal Components are probably the best known and most widely used of all multivariate analysis techniques. The essential idea consists in performing a linear transformation of the observed k-dimensional variables in such a way that the new variables are vectors of k mutually orthogonal

  8. Latent semantics as cognitive components

    DEFF Research Database (Denmark)

    Petersen, Michael Kai; Mørup, Morten; Hansen, Lars Kai

    2010-01-01

    Cognitive component analysis, defined as an unsupervised learning of features resembling human comprehension, suggests that the sensory structures we perceive might often be modeled by reducing dimensionality and treating objects in space and time as linear mixtures incorporating sparsity...... emotional responses can be encoded in words, we propose a simplified cognitive approach to model how we perceive media. Representing song lyrics in a vector space of reduced dimensionality using LSA, we combine bottom-up defined term distances with affective adjectives, that top-down constrain the latent......, which we suggest might function as cognitive components for perceiving the underlying structure in lyrics....

  9. Method for making an improved magnetic encoding device

    Science.gov (United States)

    Fox, Richard J.

    1981-01-01

    A magnetic encoding device and method for making the same are provided for use as magnetic storage mediums in identification control applications which give output signals from a reader that are of shorter duration and substantially greater magnitude than those of the prior art. Magnetic encoding elements are produced by uniformly bending wire or strip stock of a magnetic material longitudinally about a common radius to exceed the elastic limit of the material and subsequently mounting the material so that it is restrained in an unbent position on a substrate of nonmagnetic material. The elements are spot weld attached to a substrate to form a binary coded array of elements according to a desired binary code. The coded substrate may be enclosed in a plastic laminate structure. Such devices may be used for security badges, key cards, and the like and may have many other applications.

  10. POPE: Partial Order Preserving Encoding

    Science.gov (United States)

    2016-09-09

    Girao, and M. Acharya. Concealed data aggregation for reverse multicast traffic in sensor networks : Encryption, key distribution, and routing adaptation...are common in “ big data ” applications while still maintain- ing search functionality and achieving stronger security. Specifi- cally, we propose a new...security and performance makes our scheme better suited for today’s insert-heavy databases. 1. INTRODUCTION Range queries over big data . A common

  11. The Key Lake project

    International Nuclear Information System (INIS)

    1991-01-01

    Key Lake is located in the Athabasca sand stone basin, 640 kilometers north of Saskatoon, Saskatchewan, Canada. The three sources of ore at Key Lake contain 70 100 tonnes of uranium. Features of the Key Lake Project were described under the key headings: work force, mining, mill process, tailings storage, permanent camp, environmental features, worker health and safety, and economic benefits. Appendices covering the historical background, construction projects, comparisons of western world mines, mining statistics, Northern Saskatchewan surface lease, and Key Lake development and regulatory agencies were included

  12. LOCKS AND KEYS SERVICE

    CERN Multimedia

    Locks and Keys Service

    2002-01-01

    The Locks and Keys service (ST/FM) will move from building 55 to building 570 from the 2nd August to the 9th August 2002 included. During this period the service will be closed. Only in case of extreme urgency please call the 164550. Starting from Monday, 12th August, the Locks and Keys Service will continue to follow the activities related to office keys (keys and locks) and will provide the keys for furniture. The service is open from 8h30 to 12h00 and from 13h00 to 17h30. We remind you that your divisional correspondents can help you in the execution of the procedures. We thank you for your comprehension and we remain at your service to help you in solving all the matters related to keys for offices and furniture. Locks and Keys Service - ST Division - FM Group

  13. Power calculation of linear and angular incremental encoders

    Science.gov (United States)

    Prokofev, Aleksandr V.; Timofeev, Aleksandr N.; Mednikov, Sergey V.; Sycheva, Elena A.

    2016-04-01

    Automation technology is constantly expanding its role in improving the efficiency of manufacturing and testing processes in all branches of industry. More than ever before, the mechanical movements of linear slides, rotary tables, robot arms, actuators, etc. are numerically controlled. Linear and angular incremental photoelectric encoders measure mechanical motion and transmit the measured values back to the control unit. The capabilities of these systems are undergoing continual development in terms of their resolution, accuracy and reliability, their measuring ranges, and maximum speeds. This article discusses the method of power calculation of linear and angular incremental photoelectric encoders, to find the optimum parameters for its components, such as light emitters, photo-detectors, linear and angular scales, optical components etc. It analyzes methods and devices that permit high resolutions in the order of 0.001 mm or 0.001°, as well as large measuring lengths of over 100 mm. In linear and angular incremental photoelectric encoders optical beam is usually formulated by a condenser lens passes through the measuring unit changes its value depending on the movement of a scanning head or measuring raster. Past light beam is converting into an electrical signal by the photo-detecter's block for processing in the electrical block. Therefore, for calculating the energy source is a value of the desired value of the optical signal at the input of the photo-detecter's block, which reliably recorded and processed in the electronic unit of linear and angular incremental optoelectronic encoders. Automation technology is constantly expanding its role in improving the efficiency of manufacturing and testing processes in all branches of industry. More than ever before, the mechanical movements of linear slides, rotary tables, robot arms, actuators, etc. are numerically controlled. Linear and angular incremental photoelectric encoders measure mechanical motion and

  14. The olfactory tubercle encodes odor valence in behaving mice.

    Science.gov (United States)

    Gadziola, Marie A; Tylicki, Kate A; Christian, Diana L; Wesson, Daniel W

    2015-03-18

    Sensory information acquires meaning to adaptively guide behaviors. Despite odors mediating a number of vital behaviors, the components of the olfactory system responsible for assigning meaning to odors remain unclear. The olfactory tubercle (OT), a ventral striatum structure that receives monosynaptic input from the olfactory bulb, is uniquely positioned to transform odor information into behaviorally relevant neural codes. No information is available, however, on the coding of odors among OT neurons in behaving animals. In recordings from mice engaged in an odor discrimination task, we report that the firing rate of OT neurons robustly and flexibly encodes the valence of conditioned odors over identity, with rewarded odors evoking greater firing rates. This coding of rewarded odors occurs before behavioral decisions and represents subsequent behavioral responses. We predict that the OT is an essential region whereby odor valence is encoded in the mammalian brain to guide goal-directed behaviors. Copyright © 2015 the authors 0270-6474/15/354515-13$15.00/0.

  15. On the relationships between generative encodings, regularity, and learning abilities when evolving plastic artificial neural networks.

    Directory of Open Access Journals (Sweden)

    Paul Tonelli

    Full Text Available A major goal of bio-inspired artificial intelligence is to design artificial neural networks with abilities that resemble those of animal nervous systems. It is commonly believed that two keys for evolving nature-like artificial neural networks are (1 the developmental process that links genes to nervous systems, which enables the evolution of large, regular neural networks, and (2 synaptic plasticity, which allows neural networks to change during their lifetime. So far, these two topics have been mainly studied separately. The present paper shows that they are actually deeply connected. Using a simple operant conditioning task and a classic evolutionary algorithm, we compare three ways to encode plastic neural networks: a direct encoding, a developmental encoding inspired by computational neuroscience models, and a developmental encoding inspired by morphogen gradients (similar to HyperNEAT. Our results suggest that using a developmental encoding could improve the learning abilities of evolved, plastic neural networks. Complementary experiments reveal that this result is likely the consequence of the bias of developmental encodings towards regular structures: (1 in our experimental setup, encodings that tend to produce more regular networks yield networks with better general learning abilities; (2 whatever the encoding is, networks that are the more regular are statistically those that have the best learning abilities.

  16. The Arabic Diatessaron Project: Digitalizing, Encoding, Lemmatization

    Directory of Open Access Journals (Sweden)

    Giuliano Lancioni

    2016-04-01

    Full Text Available The Arabic Diatessaron Project (henceforth ADP is an international research project in Digital Humanities that aims to collect, digitalise and encode all known manuscripts of the Arabic Diatessaron (henceforth AD, a text that has been relatively neglected in scholarly research. ADP’s final goal is to provide a number of tools that can enable scholars to effectively query, compare and investigate all known variants of the text that will be encoded as far as possible in compliance with the Text Encoding Initiative (TEI guidelines. The paper addresses a number of issues involved in the process of digitalising manuscripts included in the two existing editions (Ciasca 1888 and Marmardji 1935, adding variants in unedited manuscripts, encoding and lemmatising the text. Issues involved in the design of the ADP include presentation of variants, choice of the standard text, applicability of TEI guidelines, automatic translation between different encodings, cross-edition concordances and principles of lemmatisation.

  17. Quantum dense key distribution

    International Nuclear Information System (INIS)

    Degiovanni, I.P.; Ruo Berchera, I.; Castelletto, S.; Rastello, M.L.; Bovino, F.A.; Colla, A.M.; Castagnoli, G.

    2004-01-01

    This paper proposes a protocol for quantum dense key distribution. This protocol embeds the benefits of a quantum dense coding and a quantum key distribution and is able to generate shared secret keys four times more efficiently than the Bennet-Brassard 1984 protocol. We hereinafter prove the security of this scheme against individual eavesdropping attacks, and we present preliminary experimental results, showing its feasibility

  18. No evidence for induction of key components of the Notch signaling pathway (Notch-1, Jagged-1) by treatment with UV-B, 1,25(OH)(2)D(3), and/or epigenetic drugs (TSA, 5-Aza) in human keratinocytes in vitro.

    Science.gov (United States)

    Reichrath, Sandra; Reichrath, Jörg

    2012-01-01

    Notch signaling is of high importance for growth and survival of various cell types. We now analyzed the protein expression of two key components of the Notch signaling pathway (Notch-1, Jagged-1) in spontaneously immortalized (HaCaT) and in malignant (SCL-1) human keratinocytes, using western analysis. We found that Notch-1 and its corresponding ligand Jagged-1 are expressed in both cell lines, with no marked change following UV-B treatment. Moreover, treatment of both cell lines before or after UV-B irradiation with 1,25-dihydroxyvitamin D(3), the biologically active form of vitamin D, and/or epigenetic modulating drugs (TSA; 5-Aza) did not result in a marked modulation of the protein expression of Notch-1 or Jagged-1. Under the experimental conditions of this study, treatment with 1,25(OH)(2)D(3) protected human keratinocytes in part against the antiproliferative effects of UV-B-radiation. In conclusion, our findings do not point at a differential expression of these two key components of Notch signaling in non-malignant as compared to malignant human keratinocytes, indicating that alterations in their expression are not of importance for the photocarcinogenesis of human squamous cell carcinomas. Moreover, our findings do not support the hypothesis that modulation of Notch signaling may be involved in the photoprotective effect of 1,25-dihydroxyvitamin D(3), that we and others reported previously. Additionally, we demonstrate that epigenetic modulating drugs (TSA, 5-Aza) do not markedly modulate the expression Notch-1 or Jagged-1 in UV-B-treated human keratinocytes in vitro.

  19. Metropolitan Quantum Key Distribution with Silicon Photonics

    Directory of Open Access Journals (Sweden)

    Darius Bunandar

    2018-04-01

    Full Text Available Photonic integrated circuits provide a compact and stable platform for quantum photonics. Here we demonstrate a silicon photonics quantum key distribution (QKD encoder in the first high-speed polarization-based QKD field tests. The systems reach composable secret key rates of 1.039 Mbps in a local test (on a 103.6-m fiber with a total emulated loss of 9.2 dB and 157 kbps in an intercity metropolitan test (on a 43-km fiber with 16.4 dB loss. Our results represent the highest secret key generation rate for polarization-based QKD experiments at a standard telecom wavelength and demonstrate photonic integrated circuits as a promising, scalable resource for future formation of metropolitan quantum-secure communications networks.

  20. Metropolitan Quantum Key Distribution with Silicon Photonics

    Science.gov (United States)

    Bunandar, Darius; Lentine, Anthony; Lee, Catherine; Cai, Hong; Long, Christopher M.; Boynton, Nicholas; Martinez, Nicholas; DeRose, Christopher; Chen, Changchen; Grein, Matthew; Trotter, Douglas; Starbuck, Andrew; Pomerene, Andrew; Hamilton, Scott; Wong, Franco N. C.; Camacho, Ryan; Davids, Paul; Urayama, Junji; Englund, Dirk

    2018-04-01

    Photonic integrated circuits provide a compact and stable platform for quantum photonics. Here we demonstrate a silicon photonics quantum key distribution (QKD) encoder in the first high-speed polarization-based QKD field tests. The systems reach composable secret key rates of 1.039 Mbps in a local test (on a 103.6-m fiber with a total emulated loss of 9.2 dB) and 157 kbps in an intercity metropolitan test (on a 43-km fiber with 16.4 dB loss). Our results represent the highest secret key generation rate for polarization-based QKD experiments at a standard telecom wavelength and demonstrate photonic integrated circuits as a promising, scalable resource for future formation of metropolitan quantum-secure communications networks.

  1. Optimal attacks on qubit-based Quantum Key Recycling

    Science.gov (United States)

    Leermakers, Daan; Škorić, Boris

    2018-03-01

    Quantum Key Recycling (QKR) is a quantum cryptographic primitive that allows one to reuse keys in an unconditionally secure way. By removing the need to repeatedly generate new keys, it improves communication efficiency. Škorić and de Vries recently proposed a QKR scheme based on 8-state encoding (four bases). It does not require quantum computers for encryption/decryption but only single-qubit operations. We provide a missing ingredient in the security analysis of this scheme in the case of noisy channels: accurate upper bounds on the required amount of privacy amplification. We determine optimal attacks against the message and against the key, for 8-state encoding as well as 4-state and 6-state conjugate coding. We provide results in terms of min-entropy loss as well as accessible (Shannon) information. We show that the Shannon entropy analysis for 8-state encoding reduces to the analysis of quantum key distribution, whereas 4-state and 6-state suffer from additional leaks that make them less effective. From the optimal attacks we compute the required amount of privacy amplification and hence the achievable communication rate (useful information per qubit) of qubit-based QKR. Overall, 8-state encoding yields the highest communication rates.

  2. Encoding of coordination complexes with XML.

    Science.gov (United States)

    Vinoth, P; Sankar, P

    2017-09-01

    An in-silico system to encode structure, bonding and properties of coordination complexes is developed. The encoding is achieved through a semantic XML markup frame. Composition of the coordination complexes is captured in terms of central atom and ligands. Structural information of central atom is detailed in terms of electron status of valence electron orbitals. The ligands are encoded with specific reference to the electron environment of ligand centre atoms. Behaviour of ligands to form low or high spin complexes is accomplished by assigning a Ligand Centre Value to every ligand based on the electronic environment of ligand centre atom. Chemical ontologies are used for categorization purpose and to control different hybridization schemes. Complexes formed by the central atoms of transition metal, non-transition elements belonging to s-block, p-block and f-block are encoded with a generic encoding platform. Complexes of homoleptic, heteroleptic and bridged types are also covered by this encoding system. Utility of the encoded system to predict redox electron transfer reaction in the coordination complexes is demonstrated with a simple application. Copyright © 2017 Elsevier Inc. All rights reserved.

  3. Key improvements to XTR

    NARCIS (Netherlands)

    Lenstra, A.K.; Verheul, E.R.; Okamoto, T.

    2000-01-01

    This paper describes improved methods for XTR key representation and parameter generation (cf. [4]). If the field characteristic is properly chosen, the size of the XTR public key for signature applications can be reduced by a factor of three at the cost of a small one time computation for the

  4. Retention interval affects visual short-term memory encoding.

    Science.gov (United States)

    Bankó, Eva M; Vidnyánszky, Zoltán

    2010-03-01

    Humans can efficiently store fine-detailed facial emotional information in visual short-term memory for several seconds. However, an unresolved question is whether the same neural mechanisms underlie high-fidelity short-term memory for emotional expressions at different retention intervals. Here we show that retention interval affects the neural processes of short-term memory encoding using a delayed facial emotion discrimination task. The early sensory P100 component of the event-related potentials (ERP) was larger in the 1-s interstimulus interval (ISI) condition than in the 6-s ISI condition, whereas the face-specific N170 component was larger in the longer ISI condition. Furthermore, the memory-related late P3b component of the ERP responses was also modulated by retention interval: it was reduced in the 1-s ISI as compared with the 6-s condition. The present findings cannot be explained based on differences in sensory processing demands or overall task difficulty because there was no difference in the stimulus information and subjects' performance between the two different ISI conditions. These results reveal that encoding processes underlying high-precision short-term memory for facial emotional expressions are modulated depending on whether information has to be stored for one or for several seconds.

  5. Encoding entanglement-assisted quantum stabilizer codes

    International Nuclear Information System (INIS)

    Wang Yun-Jiang; Bai Bao-Ming; Li Zhuo; Xiao He-Ling; Peng Jin-Ye

    2012-01-01

    We address the problem of encoding entanglement-assisted (EA) quantum error-correcting codes (QECCs) and of the corresponding complexity. We present an iterative algorithm from which a quantum circuit composed of CNOT, H, and S gates can be derived directly with complexity O(n 2 ) to encode the qubits being sent. Moreover, we derive the number of each gate consumed in our algorithm according to which we can design EA QECCs with low encoding complexity. Another advantage brought by our algorithm is the easiness and efficiency of programming on classical computers. (general)

  6. Learning weighted sparse representation of encoded facial normal information for expression-robust 3D face recognition

    KAUST Repository

    Li, Huibin; Di, Huang; Morvan, Jean-Marie; Chen, Liming

    2011-01-01

    This paper proposes a novel approach for 3D face recognition by learning weighted sparse representation of encoded facial normal information. To comprehensively describe 3D facial surface, three components, in X, Y, and Z-plane respectively

  7. GOLGA2, Encoding A Master Regulator of Golgi Apparatus, Is Mutated in A Patient with A Neuromuscular Disorder

    OpenAIRE

    Shamseldin, Hanan E; Bennett, Alexis H; Alfadhel, Majid; Gupta, Vandana; Alkuraya, Fowzan S

    2016-01-01

    Golgi apparatus (GA) is a membrane-bound organelle that serves a multitude of critical cellular functions including protein secretion and sorting, and cellular polarity. Many Mendelian diseases are caused by mutations in genes encoding various components of GA. GOLGA2 encodes GM130, a necessary component for the assembly of GA as a single complex, and its deficiency has been found to result in severe cellular phenotypes. We describe the first human patient with a homozygous apparently loss of...

  8. Chemical Space of DNA-Encoded Libraries.

    Science.gov (United States)

    Franzini, Raphael M; Randolph, Cassie

    2016-07-28

    In recent years, DNA-encoded chemical libraries (DECLs) have attracted considerable attention as a potential discovery tool in drug development. Screening encoded libraries may offer advantages over conventional hit discovery approaches and has the potential to complement such methods in pharmaceutical research. As a result of the increased application of encoded libraries in drug discovery, a growing number of hit compounds are emerging in scientific literature. In this review we evaluate reported encoded library-derived structures and identify general trends of these compounds in relation to library design parameters. We in particular emphasize the combinatorial nature of these libraries. Generally, the reported molecules demonstrate the ability of this technology to afford hits suitable for further lead development, and on the basis of them, we derive guidelines for DECL design.

  9. Molecular mechanisms for protein-encoded inheritance

    Science.gov (United States)

    Wiltzius, Jed J. W.; Landau, Meytal; Nelson, Rebecca; Sawaya, Michael R.; Apostol, Marcin I.; Goldschmidt, Lukasz; Soriaga, Angela B.; Cascio, Duilio; Rajashankar, Kanagalaghatta; Eisenberg, David

    2013-01-01

    Strains are phenotypic variants, encoded by nucleic acid sequences in chromosomal inheritance and by protein “conformations” in prion inheritance and transmission. But how is a protein “conformation” stable enough to endure transmission between cells or organisms? Here new polymorphic crystal structures of segments of prion and other amyloid proteins offer structural mechanisms for prion strains. In packing polymorphism, prion strains are encoded by alternative packings (polymorphs) of β-sheets formed by the same segment of a protein; in a second mechanism, segmental polymorphism, prion strains are encoded by distinct β-sheets built from different segments of a protein. Both forms of polymorphism can produce enduring “conformations,” capable of encoding strains. These molecular mechanisms for transfer of information into prion strains share features with the familiar mechanism for transfer of information by nucleic acid inheritance, including sequence specificity and recognition by non-covalent bonds. PMID:19684598

  10. A deep auto-encoder model for gene expression prediction.

    Science.gov (United States)

    Xie, Rui; Wen, Jia; Quitadamo, Andrew; Cheng, Jianlin; Shi, Xinghua

    2017-11-17

    Gene expression is a key intermediate level that genotypes lead to a particular trait. Gene expression is affected by various factors including genotypes of genetic variants. With an aim of delineating the genetic impact on gene expression, we build a deep auto-encoder model to assess how good genetic variants will contribute to gene expression changes. This new deep learning model is a regression-based predictive model based on the MultiLayer Perceptron and Stacked Denoising Auto-encoder (MLP-SAE). The model is trained using a stacked denoising auto-encoder for feature selection and a multilayer perceptron framework for backpropagation. We further improve the model by introducing dropout to prevent overfitting and improve performance. To demonstrate the usage of this model, we apply MLP-SAE to a real genomic datasets with genotypes and gene expression profiles measured in yeast. Our results show that the MLP-SAE model with dropout outperforms other models including Lasso, Random Forests and the MLP-SAE model without dropout. Using the MLP-SAE model with dropout, we show that gene expression quantifications predicted by the model solely based on genotypes, align well with true gene expression patterns. We provide a deep auto-encoder model for predicting gene expression from SNP genotypes. This study demonstrates that deep learning is appropriate for tackling another genomic problem, i.e., building predictive models to understand genotypes' contribution to gene expression. With the emerging availability of richer genomic data, we anticipate that deep learning models play a bigger role in modeling and interpreting genomics.

  11. Implementing BosonSampling with time-bin encoding: Analysis of loss, mode mismatch, and time jitter

    Science.gov (United States)

    Motes, Keith R.; Dowling, Jonathan P.; Gilchrist, Alexei; Rohde, Peter P.

    2015-11-01

    It was recently shown by Motes, Gilchrist, Dowling, and Rohde [Phys. Rev. Lett. 113, 120501 (2014), 10.1103/PhysRevLett.113.120501] that a time-bin encoded fiber-loop architecture can implement an arbitrary passive linear optics transformation. This was shown in the case of an ideal scheme whereby the architecture has no sources of error. In any realistic implementation, however, physical errors are present, which corrupt the output of the transformation. We investigate the dominant sources of error in this architecture—loss and mode mismatch—and consider how it affects the BosonSampling protocol, a key application for passive linear optics. For our loss analysis we consider two major components that contribute to loss—fiber and switches—and calculate how this affects the success probability and fidelity of the device. Interestingly, we find that errors due to loss are not uniform (unique to time-bin encoding), which asymmetrically biases the implemented unitary. Thus loss necessarily limits the class of unitaries that may be implemented, and therefore future implementations must prioritize minimizing loss rates if arbitrary unitaries are to be implemented. Our formalism for mode mismatch is generalized to account for various phenomenon that may cause mode mismatch, but we focus on two—errors in fiber-loop lengths and time jitter of the photon source. These results provide a guideline for how well future experimental implementations might perform in light of these error mechanisms.

  12. Quantum Logical Operations on Encoded Qubits

    International Nuclear Information System (INIS)

    Zurek, W.H.; Laflamme, R.

    1996-01-01

    We show how to carry out quantum logical operations (controlled-not and Toffoli gates) on encoded qubits for several encodings which protect against various 1-bit errors. This improves the reliability of these operations by allowing one to correct for 1-bit errors which either preexisted or occurred in the course of operation. The logical operations we consider allow one to carry out the vast majority of the steps in the quantum factoring algorithm. copyright 1996 The American Physical Society

  13. Using XML to encode TMA DES metadata

    Directory of Open Access Journals (Sweden)

    Oliver Lyttleton

    2011-01-01

    Full Text Available Background: The Tissue Microarray Data Exchange Specification (TMA DES is an XML specification for encoding TMA experiment data. While TMA DES data is encoded in XML, the files that describe its syntax, structure, and semantics are not. The DTD format is used to describe the syntax and structure of TMA DES, and the ISO 11179 format is used to define the semantics of TMA DES. However, XML Schema can be used in place of DTDs, and another XML encoded format, RDF, can be used in place of ISO 11179. Encoding all TMA DES data and metadata in XML would simplify the development and usage of programs which validate and parse TMA DES data. XML Schema has advantages over DTDs such as support for data types, and a more powerful means of specifying constraints on data values. An advantage of RDF encoded in XML over ISO 11179 is that XML defines rules for encoding data, whereas ISO 11179 does not. Materials and Methods: We created an XML Schema version of the TMA DES DTD. We wrote a program that converted ISO 11179 definitions to RDF encoded in XML, and used it to convert the TMA DES ISO 11179 definitions to RDF. Results: We validated a sample TMA DES XML file that was supplied with the publication that originally specified TMA DES using our XML Schema. We successfully validated the RDF produced by our ISO 11179 converter with the W3C RDF validation service. Conclusions: All TMA DES data could be encoded using XML, which simplifies its processing. XML Schema allows datatypes and valid value ranges to be specified for CDEs, which enables a wider range of error checking to be performed using XML Schemas than could be performed using DTDs.

  14. Using XML to encode TMA DES metadata.

    Science.gov (United States)

    Lyttleton, Oliver; Wright, Alexander; Treanor, Darren; Lewis, Paul

    2011-01-01

    The Tissue Microarray Data Exchange Specification (TMA DES) is an XML specification for encoding TMA experiment data. While TMA DES data is encoded in XML, the files that describe its syntax, structure, and semantics are not. The DTD format is used to describe the syntax and structure of TMA DES, and the ISO 11179 format is used to define the semantics of TMA DES. However, XML Schema can be used in place of DTDs, and another XML encoded format, RDF, can be used in place of ISO 11179. Encoding all TMA DES data and metadata in XML would simplify the development and usage of programs which validate and parse TMA DES data. XML Schema has advantages over DTDs such as support for data types, and a more powerful means of specifying constraints on data values. An advantage of RDF encoded in XML over ISO 11179 is that XML defines rules for encoding data, whereas ISO 11179 does not. We created an XML Schema version of the TMA DES DTD. We wrote a program that converted ISO 11179 definitions to RDF encoded in XML, and used it to convert the TMA DES ISO 11179 definitions to RDF. We validated a sample TMA DES XML file that was supplied with the publication that originally specified TMA DES using our XML Schema. We successfully validated the RDF produced by our ISO 11179 converter with the W3C RDF validation service. All TMA DES data could be encoded using XML, which simplifies its processing. XML Schema allows datatypes and valid value ranges to be specified for CDEs, which enables a wider range of error checking to be performed using XML Schemas than could be performed using DTDs.

  15. Using XML to encode TMA DES metadata

    Science.gov (United States)

    Lyttleton, Oliver; Wright, Alexander; Treanor, Darren; Lewis, Paul

    2011-01-01

    Background: The Tissue Microarray Data Exchange Specification (TMA DES) is an XML specification for encoding TMA experiment data. While TMA DES data is encoded in XML, the files that describe its syntax, structure, and semantics are not. The DTD format is used to describe the syntax and structure of TMA DES, and the ISO 11179 format is used to define the semantics of TMA DES. However, XML Schema can be used in place of DTDs, and another XML encoded format, RDF, can be used in place of ISO 11179. Encoding all TMA DES data and metadata in XML would simplify the development and usage of programs which validate and parse TMA DES data. XML Schema has advantages over DTDs such as support for data types, and a more powerful means of specifying constraints on data values. An advantage of RDF encoded in XML over ISO 11179 is that XML defines rules for encoding data, whereas ISO 11179 does not. Materials and Methods: We created an XML Schema version of the TMA DES DTD. We wrote a program that converted ISO 11179 definitions to RDF encoded in XML, and used it to convert the TMA DES ISO 11179 definitions to RDF. Results: We validated a sample TMA DES XML file that was supplied with the publication that originally specified TMA DES using our XML Schema. We successfully validated the RDF produced by our ISO 11179 converter with the W3C RDF validation service. Conclusions: All TMA DES data could be encoded using XML, which simplifies its processing. XML Schema allows datatypes and valid value ranges to be specified for CDEs, which enables a wider range of error checking to be performed using XML Schemas than could be performed using DTDs. PMID:21969921

  16. Key Facts about Tularemia

    Science.gov (United States)

    ... Submit What's this? Submit Button Key Facts About Tularemia Recommend on Facebook Tweet Share Compartir This fact ... and Prevention (CDC) Tularemia Web site . What is Tularemia? Tularemia is a potentially serious illness that occurs ...

  17. Key technologies book

    International Nuclear Information System (INIS)

    1997-01-01

    In this book can be found all the useful information on the French industry key technologies of the years 2000-2005. 136 technologies at the junction of the science advances and of the markets expectations are divided into 9 sectors. Among them, only 4 are interesting here: the environment, the transports, the materials and the energy. In 1995, the secretary's office of State for industry has published a first synthesis book on these key technologies. This 1997 new key technologies book extends and completes the initial study. For each key technology, an encyclopedic sheet is given. Each sheet combines thus some exact and practical information on: advance state of the technology, market characteristics, development forecasts, occupation and involved sectors, technology acquisition cost, research programs but also contacts of the main concerned efficiency poles. (O.M.)

  18. The Key Lake project

    International Nuclear Information System (INIS)

    Glattes, G.

    1985-01-01

    Aspects of project financing for the share of the Canadian subsidiary of Uranerzbergbau-GmbH, Bonn, in the uranium mining and milling facility at Key Lake, Saskatchewan, by a Canadian bank syndicate. (orig.) [de

  19. Security of BB84 with weak randomness and imperfect qubit encoding

    Science.gov (United States)

    Zhao, Liang-Yuan; Yin, Zhen-Qiang; Li, Hong-Wei; Chen, Wei; Fang, Xi; Han, Zheng-Fu; Huang, Wei

    2018-03-01

    The main threats for the well-known Bennett-Brassard 1984 (BB84) practical quantum key distribution (QKD) systems are that its encoding is inaccurate and measurement device may be vulnerable to particular attacks. Thus, a general physical model or security proof to tackle these loopholes simultaneously and quantitatively is highly desired. Here we give a framework on the security of BB84 when imperfect qubit encoding and vulnerability of measurement device are both considered. In our analysis, the potential attacks to measurement device are generalized by the recently proposed weak randomness model which assumes the input random numbers are partially biased depending on a hidden variable planted by an eavesdropper. And the inevitable encoding inaccuracy is also introduced here. From a fundamental view, our work reveals the potential information leakage due to encoding inaccuracy and weak randomness input. For applications, our result can be viewed as a useful tool to quantitatively evaluate the security of a practical QKD system.

  20. Determining the Neural Substrate for Encoding a Memory of Human Pain and the Influence of Anxiety.

    Science.gov (United States)

    Tseng, Ming-Tsung; Kong, Yazhuo; Eippert, Falk; Tracey, Irene

    2017-12-06

    To convert a painful stimulus into a briefly maintainable construct when the painful stimulus is no longer accessible is essential to guide human behavior and avoid dangerous situations. Because of the aversive nature of pain, this encoding process might be influenced by emotional aspects and could thus vary across individuals, but we have yet to understand both the basic underlying neural mechanisms as well as potential interindividual differences. Using fMRI in combination with a delayed-discrimination task in healthy volunteers of both sexes, we discovered that brain regions involved in this working memory encoding process were dissociable according to whether the to-be-remembered stimulus was painful or not, with the medial thalamus and the rostral anterior cingulate cortex encoding painful and the primary somatosensory cortex encoding nonpainful stimuli. Encoding of painful stimuli furthermore significantly enhanced functional connectivity between the thalamus and medial prefrontal cortex (mPFC). With regards to emotional aspects influencing encoding processes, we observed that more anxious participants showed significant performance advantages when encoding painful stimuli. Importantly, only during the encoding of pain, the interindividual differences in anxiety were associated with the strength of coupling between medial thalamus and mPFC, which was furthermore related to activity in the amygdala. These results indicate not only that there is a distinct signature for the encoding of a painful experience in humans, but also that this encoding process involves a strong affective component. SIGNIFICANCE STATEMENT To convert the sensation of pain into a briefly maintainable construct is essential to guide human behavior and avoid dangerous situations. Although this working memory encoding process is implicitly contained in the majority of studies, the underlying neural mechanisms remain unclear. Using fMRI in a delayed-discrimination task, we found that the

  1. Tetrahydrocannabinol (THC) impairs encoding but not retrieval of verbal information.

    Science.gov (United States)

    Ranganathan, Mohini; Radhakrishnan, Rajiv; Addy, Peter H; Schnakenberg-Martin, Ashley M; Williams, Ashley H; Carbuto, Michelle; Elander, Jacqueline; Pittman, Brian; Andrew Sewell, R; Skosnik, Patrick D; D'Souza, Deepak Cyril

    2017-10-03

    Cannabis and agonists of the brain cannabinoid receptor (CB 1 R) produce acute memory impairments in humans. However, the extent to which cannabinoids impair the component processes of encoding and retrieval has not been established in humans. The objective of this analysis was to determine whether the administration of Δ 9 -Tetrahydrocannabinol (THC), the principal psychoactive constituent of cannabis, impairs encoding and/or retrieval of verbal information. Healthy subjects were recruited from the community. Subjects were administered the Rey-Auditory Verbal Learning Test (RAVLT) either before administration of THC (experiment #1) (n=38) or while under the influence of THC (experiment #2) (n=57). Immediate and delayed recall on the RAVLT was compared. Subjects received intravenous THC, in a placebo-controlled, double-blind, randomized manner at doses known to produce behavioral and subjective effects consistent with cannabis intoxication. Total immediate recall, short delayed recall, and long delayed recall were reduced in a statistically significant manner only when the RAVLT was administered to subjects while they were under the influence of THC (experiment #2) and not when the RAVLT was administered prior. THC acutely interferes with encoding of verbal memory without interfering with retrieval. These data suggest that learning information prior to the use of cannabis or cannabinoids is not likely to disrupt recall of that information. Future studies will be necessary to determine whether THC impairs encoding of non-verbal information, to what extent THC impairs memory consolidation, and the role of other cannabinoids in the memory-impairing effects of cannabis. Cannabinoids, Neural Synchrony, and Information Processing (THC-Gamma) http://clinicaltrials.gov/ct2/show/study/NCT00708994 NCT00708994 Pharmacogenetics of Cannabinoid Response http://clinicaltrials.gov/ct2/show/NCT00678730 NCT00678730. Copyright © 2017. Published by Elsevier Inc.

  2. Key-space analysis of double random phase encryption technique

    Science.gov (United States)

    Monaghan, David S.; Gopinathan, Unnikrishnan; Naughton, Thomas J.; Sheridan, John T.

    2007-09-01

    We perform a numerical analysis on the double random phase encryption/decryption technique. The key-space of an encryption technique is the set of possible keys that can be used to encode data using that technique. In the case of a strong encryption scheme, many keys must be tried in any brute-force attack on that technique. Traditionally, designers of optical image encryption systems demonstrate only how a small number of arbitrary keys cannot decrypt a chosen encrypted image in their system. However, this type of demonstration does not discuss the properties of the key-space nor refute the feasibility of an efficient brute-force attack. To clarify these issues we present a key-space analysis of the technique. For a range of problem instances we plot the distribution of decryption errors in the key-space indicating the lack of feasibility of a simple brute-force attack.

  3. A Novel Image Encryption Algorithm Based on DNA Encoding and Spatiotemporal Chaos

    Directory of Open Access Journals (Sweden)

    Chunyan Song

    2015-10-01

    Full Text Available DNA computing based image encryption is a new, promising field. In this paper, we propose a novel image encryption scheme based on DNA encoding and spatiotemporal chaos. In particular, after the plain image is primarily diffused with the bitwise Exclusive-OR operation, the DNA mapping rule is introduced to encode the diffused image. In order to enhance the encryption, the spatiotemporal chaotic system is used to confuse the rows and columns of the DNA encoded image. The experiments demonstrate that the proposed encryption algorithm is of high key sensitivity and large key space, and it can resist brute-force attack, entropy attack, differential attack, chosen-plaintext attack, known-plaintext attack and statistical attack.

  4. ERP Correlates of Encoding Success and Encoding Selectivity in Attention Switching

    Science.gov (United States)

    Yeung, Nick

    2016-01-01

    Long-term memory encoding depends critically on effective processing of incoming information. The degree to which participants engage in effective encoding can be indexed in electroencephalographic (EEG) data by studying event-related potential (ERP) subsequent memory effects. The current study investigated ERP correlates of memory success operationalised with two different measures—memory selectivity and global memory—to assess whether previously observed ERP subsequent memory effects reflect focused encoding of task-relevant information (memory selectivity), general encoding success (global memory), or both. Building on previous work, the present study combined an attention switching paradigm—in which participants were presented with compound object-word stimuli and switched between attending to the object or the word across trials—with a later recognition memory test for those stimuli, while recording their EEG. Our results provided clear evidence that subsequent memory effects resulted from selective attentional focusing and effective top-down control (memory selectivity) in contrast to more general encoding success effects (global memory). Further analyses addressed the question of whether successful encoding depended on similar control mechanisms to those involved in attention switching. Interestingly, differences in the ERP correlates of attention switching and successful encoding, particularly during the poststimulus period, indicated that variability in encoding success occurred independently of prestimulus demands for top-down cognitive control. These results suggest that while effects of selective attention and selective encoding co-occur behaviourally their ERP correlates are at least partly dissociable. PMID:27907075

  5. Secure quantum key distribution using squeezed states

    International Nuclear Information System (INIS)

    Gottesman, Daniel; Preskill, John

    2001-01-01

    We prove the security of a quantum key distribution scheme based on transmission of squeezed quantum states of a harmonic oscillator. Our proof employs quantum error-correcting codes that encode a finite-dimensional quantum system in the infinite-dimensional Hilbert space of an oscillator, and protect against errors that shift the canonical variables p and q. If the noise in the quantum channel is weak, squeezing signal states by 2.51 dB (a squeeze factor e r =1.34) is sufficient in principle to ensure the security of a protocol that is suitably enhanced by classical error correction and privacy amplification. Secure key distribution can be achieved over distances comparable to the attenuation length of the quantum channel

  6. Comparison is key.

    Science.gov (United States)

    Stone, Mark H; Stenner, A Jackson

    2014-01-01

    Several concepts from Georg Rasch's last papers are discussed. The key one is comparison because Rasch considered the method of comparison fundamental to science. From the role of comparison stems scientific inference made operational by a properly developed frame of reference producing specific objectivity. The exact specifications Rasch outlined for making comparisons are explicated from quotes, and the role of causality derived from making comparisons is also examined. Understanding causality has implications for what can and cannot be produced via Rasch measurement. His simple examples were instructive, but the implications are far reaching upon first establishing the key role of comparison.

  7. Key World Energy Statistics

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2010-07-01

    The IEA produced its first handy, pocket-sized summary of key energy data in 1997. This new edition responds to the enormously positive reaction to the book since then. Key World Energy Statistics produced by the IEA contains timely, clearly-presented data on supply, transformation and consumption of all major energy sources. The interested businessman, journalist or student will have at his or her fingertips the annual Canadian production of coal, the electricity consumption in Thailand, the price of diesel oil in Spain and thousands of other useful energy facts. It exists in different formats to suit our readers' requirements.

  8. Cloud-based uniform ChIP-Seq processing tools for modENCODE and ENCODE.

    Science.gov (United States)

    Trinh, Quang M; Jen, Fei-Yang Arthur; Zhou, Ziru; Chu, Kar Ming; Perry, Marc D; Kephart, Ellen T; Contrino, Sergio; Ruzanov, Peter; Stein, Lincoln D

    2013-07-22

    Funded by the National Institutes of Health (NIH), the aim of the Model Organism ENCyclopedia of DNA Elements (modENCODE) project is to provide the biological research community with a comprehensive encyclopedia of functional genomic elements for both model organisms C. elegans (worm) and D. melanogaster (fly). With a total size of just under 10 terabytes of data collected and released to the public, one of the challenges faced by researchers is to extract biologically meaningful knowledge from this large data set. While the basic quality control, pre-processing, and analysis of the data has already been performed by members of the modENCODE consortium, many researchers will wish to reinterpret the data set using modifications and enhancements of the original protocols, or combine modENCODE data with other data sets. Unfortunately this can be a time consuming and logistically challenging proposition. In recognition of this challenge, the modENCODE DCC has released uniform computing resources for analyzing modENCODE data on Galaxy (https://github.com/modENCODE-DCC/Galaxy), on the public Amazon Cloud (http://aws.amazon.com), and on the private Bionimbus Cloud for genomic research (http://www.bionimbus.org). In particular, we have released Galaxy workflows for interpreting ChIP-seq data which use the same quality control (QC) and peak calling standards adopted by the modENCODE and ENCODE communities. For convenience of use, we have created Amazon and Bionimbus Cloud machine images containing Galaxy along with all the modENCODE data, software and other dependencies. Using these resources provides a framework for running consistent and reproducible analyses on modENCODE data, ultimately allowing researchers to use more of their time using modENCODE data, and less time moving it around.

  9. SUPPLY CHAIN MANAGEMENT – KEY FACTORS

    Directory of Open Access Journals (Sweden)

    Magdalena Daniela DINU

    2014-06-01

    Full Text Available This paper exposes Supply Chain Management by its key factors. Briefly, where the Supply Chain Management is treated as strategic part of a company then maintaining both control and influence throughout the entire supply chain are key factors and critical to success. On the other hand, finding the right partner to manage the non-strategic Supply Chains would be another key factor too. To define the most important key factors within Supply Chain Management means a deeply understanding of both Supply Chain’ s components, procedures, workflow, processes and the importance of Supply Chain Management into maximizing company's value. SCORE model able to provide solid information about measuring performance and identifying priorities within Supply Chain Management will help us to understand the key factors by analyzing its elements: Plan, Source, Make, Deliver,Return, Enable. These elements covers all the challenging areas from first to third tier of Supply Chain Management.

  10. Keyed shear joints

    DEFF Research Database (Denmark)

    Hansen, Klaus

    This report gives a summary of the present information on the behaviour of vertical keyed shear joints in large panel structures. An attemp is made to outline the implications which this information might have on the analysis and design of a complete wall. The publications also gives a short...

  11. Cryptographic Key Management System

    Energy Technology Data Exchange (ETDEWEB)

    No, author

    2014-02-21

    This report summarizes the outcome of U.S. Department of Energy (DOE) contract DE-OE0000543, requesting the design of a Cryptographic Key Management System (CKMS) for the secure management of cryptographic keys for the energy sector infrastructure. Prime contractor Sypris Electronics, in collaboration with Oak Ridge National Laboratories (ORNL), Electric Power Research Institute (EPRI), Valicore Technologies, and Purdue University's Center for Education and Research in Information Assurance and Security (CERIAS) and Smart Meter Integration Laboratory (SMIL), has designed, developed and evaluated the CKMS solution. We provide an overview of the project in Section 3, review the core contributions of all contractors in Section 4, and discuss bene ts to the DOE in Section 5. In Section 6 we describe the technical construction of the CKMS solution, and review its key contributions in Section 6.9. Section 7 describes the evaluation and demonstration of the CKMS solution in different environments. We summarize the key project objectives in Section 8, list publications resulting from the project in Section 9, and conclude with a discussion on commercialization in Section 10 and future work in Section 11.

  12. Turn key contracts

    International Nuclear Information System (INIS)

    Feretic, D.

    1975-01-01

    The aim of this summary is to point out some specific areas which have to be covered in a turn-key contract and which are of primarily interest to the buyer of a nuclear plant. It will be assumed that the buyer is utility company in a developing country and a plant supplier a company in an industrial country. (orig./FW) [de

  13. Key numbers: Energy

    International Nuclear Information System (INIS)

    1994-01-01

    The key numbers of energy give statistical data related to production, consumption, and to foreign trade of each energy in the World and in France. A chapter is dedicated to environment and brings quantitative elements on pollutant emissions connected to energy uses

  14. Key performance indicators

    NARCIS (Netherlands)

    Zwetsloot, G.I.J.M.

    2014-01-01

    This paper addresses how organisations can use OSH performance indicators. This is an important way to mainstream OSH into business management. Key performance indicators (KPIs) should provide objective data on the OSH situation. It is often said that ‘what gets measured gets managed’. Without

  15. Locks and Keys Service

    CERN Multimedia

    Claude Ducastel

    The GS-LS-SEM section is pleased to inform you that as from Monday 30 November 2009, the opening hours of the Locks and Keys service will be the following: 08h30 - 12h30 / 13h30 - 16:30, Mondays to Fridays. GS-SEM-LS 73333

  16. Noise level and MPEG-2 encoder statistics

    Science.gov (United States)

    Lee, Jungwoo

    1997-01-01

    Most software in the movie and broadcasting industries are still in analog film or tape format, which typically contains random noise that originated from film, CCD camera, and tape recording. The performance of the MPEG-2 encoder may be significantly degraded by the noise. It is also affected by the scene type that includes spatial and temporal activity. The statistical property of noise originating from camera and tape player is analyzed and the models for the two types of noise are developed. The relationship between the noise, the scene type, and encoder statistics of a number of MPEG-2 parameters such as motion vector magnitude, prediction error, and quant scale are discussed. This analysis is intended to be a tool for designing robust MPEG encoding algorithms such as preprocessing and rate control.

  17. Indirect Encoding in Neuroevolutionary Ship Handling

    Directory of Open Access Journals (Sweden)

    Miroslaw Lacki

    2018-03-01

    Full Text Available In this paper the author compares the efficiency of two encoding schemes for artificial intelligence methods used in the neuroevolutionary ship maneuvering system. This may be also be seen as the ship handling system that simulates a learning process of a group of artificial helmsmen - autonomous control units, created with an artificial neural network. The helmsman observes input signals derived form an enfironment and calculates the values of required parameters of the vessel maneuvering in confined waters. In neuroevolution such units are treated as individuals in population of artificial neural networks, which through environmental sensing and evolutionary algorithms learn to perform given task efficiently. The main task of this project is to evolve a population of helmsmen with indirect encoding and compare results of simulation with direct encoding method.

  18. An Information Theoretic Characterisation of Auditory Encoding

    Science.gov (United States)

    Overath, Tobias; Cusack, Rhodri; Kumar, Sukhbinder; von Kriegstein, Katharina; Warren, Jason D; Grube, Manon; Carlyon, Robert P; Griffiths, Timothy D

    2007-01-01

    The entropy metric derived from information theory provides a means to quantify the amount of information transmitted in acoustic streams like speech or music. By systematically varying the entropy of pitch sequences, we sought brain areas where neural activity and energetic demands increase as a function of entropy. Such a relationship is predicted to occur in an efficient encoding mechanism that uses less computational resource when less information is present in the signal: we specifically tested the hypothesis that such a relationship is present in the planum temporale (PT). In two convergent functional MRI studies, we demonstrated this relationship in PT for encoding, while furthermore showing that a distributed fronto-parietal network for retrieval of acoustic information is independent of entropy. The results establish PT as an efficient neural engine that demands less computational resource to encode redundant signals than those with high information content. PMID:17958472

  19. Irradiation properties of T0 chopper components

    Energy Technology Data Exchange (ETDEWEB)

    Itoh, Shinichi, E-mail: shinichi.itoh@kek.jp [Neutron Science Division, Institute of Materials Structure Science, High Energy Accelerator Research Organization, Tsukuba 305-0801 (Japan); Ueno, Kenji; Ohkubo, Ryuji [Mechanical Engineering Center, Applied Research Laboratory, High Energy Accelerator Research Organization, Tsukuba 305-0801 (Japan); Sagehashi, Hidenori [Neutron Science Division, Institute of Materials Structure Science, High Energy Accelerator Research Organization, Tsukuba 305-0801 (Japan); Funahashi, Yoshisato [Mechanical Engineering Center, Applied Research Laboratory, High Energy Accelerator Research Organization, Tsukuba 305-0801 (Japan); Yokoo, Tetsuya [Neutron Science Division, Institute of Materials Structure Science, High Energy Accelerator Research Organization, Tsukuba 305-0801 (Japan)

    2011-10-21

    We investigated the irradiation properties of the components of a T0 chopper. The organic materials in the rotor bearing grease, the magnetic fluids in seals, and the rubber in the timing belt, as well as the semiconductor materials in the rotation sensor and motor encoder, were all irradiated with high-energy {gamma}-rays up to 100 kGy. No significant damage that shortens the lifetime of a T0 chopper was observed for the mechanical components. However, the semiconductor components were damaged by the irradiation. For the rotation sensor system detecting the rotor phase, the signal from a marker on the rotor shaft was transmitted outside the shielding by an optical fiber with radiation-proofing and the electrical circuits were removed from the beamline shielding. The lifetime of the motor encoder possibly meets the requirement for the maintenance period of the T0 chopper.

  20. Continuous Variable Quantum Key Distribution Using Polarized Coherent States

    Science.gov (United States)

    Vidiella-Barranco, A.; Borelli, L. F. M.

    We discuss a continuous variables method of quantum key distribution employing strongly polarized coherent states of light. The key encoding is performed using the variables known as Stokes parameters, rather than the field quadratures. Their quantum counterpart, the Stokes operators Ŝi (i=1,2,3), constitute a set of non-commuting operators, being the precision of simultaneous measurements of a pair of them limited by an uncertainty-like relation. Alice transmits a conveniently modulated two-mode coherent state, and Bob randomly measures one of the Stokes parameters of the incoming beam. After performing reconciliation and privacy amplification procedures, it is possible to distill a secret common key. We also consider a non-ideal situation, in which coherent states with thermal noise, instead of pure coherent states, are used for encoding.

  1. Incremental phonological encoding during unscripted sentence production

    Directory of Open Access Journals (Sweden)

    Florian T Jaeger

    2012-11-01

    Full Text Available We investigate phonological encoding during unscripted sentence production, focusing on the effect of phonological overlap on phonological encoding. Previous work on this question has almost exclusively employed isolated word production or highly scripted multiword production. These studies have led to conflicting results: some studies found that phonological overlap between two words facilitates phonological encoding, while others found inhibitory effects. One worry with many of these paradigms is that they involve processes that are not typical to everyday language use, which calls into question to what extent their findings speak to the architectures and mechanisms underlying language production. We present a paradigm to investigate the consequences of phonological overlap between words in a sentence while leaving speakers much of the lexical and structural choices typical in everyday language use. Adult native speakers of English described events in short video clips. We annotated the presence of disfluencies and the speech rate at various points throughout the sentence, as well as the constituent order. We find that phonological overlap has an inhibitory effect on phonological encoding. Specifically, if adjacent content words share their phonological onset (e.g., hand the hammer, they are preceded by production difficulty, as reflected in fluency and speech rate. We also find that this production difficulty affects speakers’ constituent order preferences during grammatical encoding. We discuss our results and previous works to isolate the properties of other paradigms that resulted in facilitatory or inhibitory results. The data from our paradigm also speak to questions about the scope of phonological planning in unscripted speech and as to whether phonological and grammatical encoding interact.

  2. Optical encoder based on a nondiffractive beam

    International Nuclear Information System (INIS)

    Lutenberg, Ariel; Perez-Quintian, Fernando; Rebollo, Maria A.

    2008-01-01

    Optical encoders are used in industrial and laboratory motion equipment to measure rotations and linear displacements. We introduce a design of an optical encoder based on a nondiffractive beam. We expect that the invariant profile and radial symmetry of the nondiffractive beam provide the design with remarkable tolerance to mechanical perturbations. We experimentally demonstrate that the proposed design generates a suitable output sinusoidal signal with low harmonic distortion. Moreover, we present a numerical model of the system based on the angular spectrum approximation whose predictions are in excellent agreement with the experimental results

  3. Fibre optic communication key devices

    CERN Document Server

    Grote, Norbert

    2017-01-01

    The book gives an in-depth description of key devices of current and next generation fibre optic communication networks. Devices treated include semiconductor lasers, optical amplifiers, modulators, wavelength filters and other passives, detectors, all-optical switches, but relevant properties of optical fibres and network aspects are included as well. The presentations include the physical principles underlying the various devices, technologies used for their realization, typical performance characteristics and limitations, but development trends towards more advanced components are also illustrated. This new edition of a successful book was expanded and updated extensively. The new edition covers among others lasers for optical communication, optical switches, hybrid integration, monolithic integration and silicon photonics. The main focus is on Indium phosphide-based structures but silicon photonics is included as well. The book covers relevant principles, state-of-the-art implementations, status of curren...

  4. Implementation-intention encoding in a prospective memory task enhances spontaneous retrieval of intentions.

    Science.gov (United States)

    Rummel, Jan; Einstein, Gilles O; Rampey, Hilary

    2012-01-01

    Although forming implementation intentions (Gollwitzer, 1999) has been demonstrated to generally improve prospective memory, the underlying cognitive mechanisms are not completely understood. It has been proposed that implementation-intention encoding encourages spontaneous retrieval (McDaniel & Scullin, 2010). Alternatively one could assume the positive effect of implementation-intention encoding is caused by increased or more efficient monitoring for target cues. To test these alternative explanations and to further investigate the cognitive mechanisms underlying implementation-intention benefits, in two experiments participants formed the intention to respond to specific target cues in a lexical decision task with a special key, but then had to suspend this intention during an intervening word-categorisation task. Response times on trials directly following the occurrence of target cues in the intervening task were significantly slower with implementation-intention encoding than with standard encoding, indicating that spontaneous retrieval was increased (Experiment 1). However, when activation of the target cues was controlled for, similar slowing was found with both standard and implementation-intention encoding (Experiment 2). The results imply that implementation-intention encoding as well as increased target-cue activation foster spontaneous retrieval processes.

  5. Ancel Keys: a tribute

    Directory of Open Access Journals (Sweden)

    VanItallie Theodore B

    2005-02-01

    Full Text Available Abstract Ancel Keys, Ph.D., who died in November, 2004, at the age of 100, was among the first scientists to recognize that human atherosclerosis is not an inevitable consequence of aging, and that a high-fat diet can be a major risk factor for coronary heart disease. During World War II, he and a group of talented co-workers at the University of Minnesota conducted a large-scale study of experimentally-induced human starvation. The data generated by this study – which was immediately recognized to be a classic – continue to be of inestimable value to nutrition scientists. In his later years, Keys spent more time at his home in Naples, Italy, where he had the opportunity to continue his personal study of the beneficial effects on health and longevity of a Mediterranean diet.

  6. Physician Appraisals: Key Challenges

    Directory of Open Access Journals (Sweden)

    Klich Jacek

    2017-06-01

    Full Text Available The main purpose of the article is to identify key criteria being used for physician appraisals and to find how communication skills of physicians are valued in those appraisals. ScienceDirect and EBSCOhost databases were used for this search. The results show that a physician appraisal is underestimated both theoretically and empirically. The particular gap exists with respect to the communication skills of physicians, which are rarely present in medical training syllabi and physician assessments. The article contributes to the theoretical discourse on physician appraisals and points out at the inconsistency between the high status of physicians as a key hospital resource on the one hand and, on the other hand, at inadequate and poorly researched assessment of their performance with a special emphasis on communication skills. The article may inspire health managers to develop and implement up-to-date assessment forms for physicians and good managerial practices in this respect in hospitals and other health care units.

  7. Comparative Analysis of Wolbachia Genomes Reveals Streamlining and Divergence of Minimalist Two-Component Systems

    Science.gov (United States)

    Christensen, Steen; Serbus, Laura Renee

    2015-01-01

    Two-component regulatory systems are commonly used by bacteria to coordinate intracellular responses with environmental cues. These systems are composed of functional protein pairs consisting of a sensor histidine kinase and cognate response regulator. In contrast to the well-studied Caulobacter crescentus system, which carries dozens of these pairs, the streamlined bacterial endosymbiont Wolbachia pipientis encodes only two pairs: CckA/CtrA and PleC/PleD. Here, we used bioinformatic tools to compare characterized two-component system relays from C. crescentus, the related Anaplasmataceae species Anaplasma phagocytophilum and Ehrlichia chaffeensis, and 12 sequenced Wolbachia strains. We found the core protein pairs and a subset of interacting partners to be highly conserved within Wolbachia and these other Anaplasmataceae. Genes involved in two-component signaling were positioned differently within the various Wolbachia genomes, whereas the local context of each gene was conserved. Unlike Anaplasma and Ehrlichia, Wolbachia two-component genes were more consistently found clustered with metabolic genes. The domain architecture and key functional residues standard for two-component system proteins were well-conserved in Wolbachia, although residues that specify cognate pairing diverged substantially from other Anaplasmataceae. These findings indicate that Wolbachia two-component signaling pairs share considerable functional overlap with other α-proteobacterial systems, whereas their divergence suggests the potential for regulatory differences and cross-talk. PMID:25809075

  8. NAGRADATA. Code key. Geology

    International Nuclear Information System (INIS)

    Mueller, W.H.; Schneider, B.; Staeuble, J.

    1984-01-01

    This reference manual provides users of the NAGRADATA system with comprehensive keys to the coding/decoding of geological and technical information to be stored in or retreaved from the databank. Emphasis has been placed on input data coding. When data is retreaved the translation into plain language of stored coded information is done automatically by computer. Three keys each, list the complete set of currently defined codes for the NAGRADATA system, namely codes with appropriate definitions, arranged: 1. according to subject matter (thematically) 2. the codes listed alphabetically and 3. the definitions listed alphabetically. Additional explanation is provided for the proper application of the codes and the logic behind the creation of new codes to be used within the NAGRADATA system. NAGRADATA makes use of codes instead of plain language for data storage; this offers the following advantages: speed of data processing, mainly data retrieval, economies of storage memory requirements, the standardisation of terminology. The nature of this thesaurian type 'key to codes' makes it impossible to either establish a final form or to cover the entire spectrum of requirements. Therefore, this first issue of codes to NAGRADATA must be considered to represent the current state of progress of a living system and future editions will be issued in a loose leave ringbook system which can be updated by an organised (updating) service. (author)

  9. Implementation of continuous-variable quantum key distribution with composable and one-sided-device-independent security against coherent attacks.

    Science.gov (United States)

    Gehring, Tobias; Händchen, Vitus; Duhme, Jörg; Furrer, Fabian; Franz, Torsten; Pacher, Christoph; Werner, Reinhard F; Schnabel, Roman

    2015-10-30

    Secret communication over public channels is one of the central pillars of a modern information society. Using quantum key distribution this is achieved without relying on the hardness of mathematical problems, which might be compromised by improved algorithms or by future quantum computers. State-of-the-art quantum key distribution requires composable security against coherent attacks for a finite number of distributed quantum states as well as robustness against implementation side channels. Here we present an implementation of continuous-variable quantum key distribution satisfying these requirements. Our implementation is based on the distribution of continuous-variable Einstein-Podolsky-Rosen entangled light. It is one-sided device independent, which means the security of the generated key is independent of any memoryfree attacks on the remote detector. Since continuous-variable encoding is compatible with conventional optical communication technology, our work is a step towards practical implementations of quantum key distribution with state-of-the-art security based solely on telecom components.

  10. Implementation of continuous-variable quantum key distribution with composable and one-sided-device-independent security against coherent attacks

    Science.gov (United States)

    Gehring, Tobias; Händchen, Vitus; Duhme, Jörg; Furrer, Fabian; Franz, Torsten; Pacher, Christoph; Werner, Reinhard F.; Schnabel, Roman

    2015-10-01

    Secret communication over public channels is one of the central pillars of a modern information society. Using quantum key distribution this is achieved without relying on the hardness of mathematical problems, which might be compromised by improved algorithms or by future quantum computers. State-of-the-art quantum key distribution requires composable security against coherent attacks for a finite number of distributed quantum states as well as robustness against implementation side channels. Here we present an implementation of continuous-variable quantum key distribution satisfying these requirements. Our implementation is based on the distribution of continuous-variable Einstein-Podolsky-Rosen entangled light. It is one-sided device independent, which means the security of the generated key is independent of any memoryfree attacks on the remote detector. Since continuous-variable encoding is compatible with conventional optical communication technology, our work is a step towards practical implementations of quantum key distribution with state-of-the-art security based solely on telecom components.

  11. RNAi suppressors encoded by pathogenic human viruses

    NARCIS (Netherlands)

    de Vries, Walter; Berkhout, Ben

    2008-01-01

    RNA silencing or RNAi interference (RNAi) serves as an innate antiviral mechanism in plants, fungi and animals. Human viruses, like plant viruses, encode suppressor proteins or RNAs that block or modulate the RNAi pathway. This review summarizes the mechanisms by which pathogenic human viruses

  12. Visual Memory : The Price of Encoding Details

    NARCIS (Netherlands)

    Nieuwenstein, Mark; Kromm, Maria

    2017-01-01

    Studies on visual long-term memory have shown that we have a tremendous capacity for remembering pictures of objects, even at a highly detailed level. What remains unclear, however, is whether encoding objects at such a detailed level comes at any cost. In the current study, we examined how the

  13. Encoders for block-circulant LDPC codes

    Science.gov (United States)

    Divsalar, Dariush (Inventor); Abbasfar, Aliazam (Inventor); Jones, Christopher R. (Inventor); Dolinar, Samuel J. (Inventor); Thorpe, Jeremy C. (Inventor); Andrews, Kenneth S. (Inventor); Yao, Kung (Inventor)

    2009-01-01

    Methods and apparatus to encode message input symbols in accordance with an accumulate-repeat-accumulate code with repetition three or four are disclosed. Block circulant matrices are used. A first method and apparatus make use of the block-circulant structure of the parity check matrix. A second method and apparatus use block-circulant generator matrices.

  14. 47 CFR 11.32 - EAS Encoder.

    Science.gov (United States)

    2010-10-01

    ... Telecommunication FEDERAL COMMUNICATIONS COMMISSION GENERAL EMERGENCY ALERT SYSTEM (EAS) Equipment Requirements § 11... operation. (vi) Indicator Display. The encoder shall be provided with a visual and/or aural indicator which... to +50 degrees C and a range of relative humidity of up to 95%. (c) Primary Supply Voltage Variation...

  15. Toward Chemical Implementation of Encoded Combinatorial Libraries

    DEFF Research Database (Denmark)

    Nielsen, John; Janda, Kim D.

    1994-01-01

    The recent application of "combinatorial libraries" to supplement existing drug screening processes might simplify and accelerate the search for new lead compounds or drugs. Recently, a scheme for encoded combinatorial chemistry was put forward to surmount a number of the limitations possessed...

  16. Fast optical source for quantum key distribution based on semiconductor optical amplifiers.

    Science.gov (United States)

    Jofre, M; Gardelein, A; Anzolin, G; Amaya, W; Capmany, J; Ursin, R; Peñate, L; Lopez, D; San Juan, J L; Carrasco, J A; Garcia, F; Torcal-Milla, F J; Sanchez-Brea, L M; Bernabeu, E; Perdigues, J M; Jennewein, T; Torres, J P; Mitchell, M W; Pruneri, V

    2011-02-28

    A novel integrated optical source capable of emitting faint pulses with different polarization states and with different intensity levels at 100 MHz has been developed. The source relies on a single laser diode followed by four semiconductor optical amplifiers and thin film polarizers, connected through a fiber network. The use of a single laser ensures high level of indistinguishability in time and spectrum of the pulses for the four different polarizations and three different levels of intensity. The applicability of the source is demonstrated in the lab through a free space quantum key distribution experiment which makes use of the decoy state BB84 protocol. We achieved a lower bound secure key rate of the order of 3.64 Mbps and a quantum bit error ratio as low as 1.14×10⁻² while the lower bound secure key rate became 187 bps for an equivalent attenuation of 35 dB. To our knowledge, this is the fastest polarization encoded QKD system which has been reported so far. The performance, reduced size, low power consumption and the fact that the components used can be space qualified make the source particularly suitable for secure satellite communication.

  17. Finite-key analysis for quantum key distribution with weak coherent pulses based on Bernoulli sampling

    Science.gov (United States)

    Kawakami, Shun; Sasaki, Toshihiko; Koashi, Masato

    2017-07-01

    An essential step in quantum key distribution is the estimation of parameters related to the leaked amount of information, which is usually done by sampling of the communication data. When the data size is finite, the final key rate depends on how the estimation process handles statistical fluctuations. Many of the present security analyses are based on the method with simple random sampling, where hypergeometric distribution or its known bounds are used for the estimation. Here we propose a concise method based on Bernoulli sampling, which is related to binomial distribution. Our method is suitable for the Bennett-Brassard 1984 (BB84) protocol with weak coherent pulses [C. H. Bennett and G. Brassard, Proceedings of the IEEE Conference on Computers, Systems and Signal Processing (IEEE, New York, 1984), Vol. 175], reducing the number of estimated parameters to achieve a higher key generation rate compared to the method with simple random sampling. We also apply the method to prove the security of the differential-quadrature-phase-shift (DQPS) protocol in the finite-key regime. The result indicates that the advantage of the DQPS protocol over the phase-encoding BB84 protocol in terms of the key rate, which was previously confirmed in the asymptotic regime, persists in the finite-key regime.

  18. Spectrotemporal dynamics of the EEG during working memory encoding and maintenance predicts individual behavioral capacity.

    Science.gov (United States)

    Bashivan, Pouya; Bidelman, Gavin M; Yeasin, Mohammed

    2014-12-01

    We investigated the effect of memory load on encoding and maintenance of information in working memory. Electroencephalography (EEG) signals were recorded while participants performed a modified Sternberg visual memory task. Independent component analysis (ICA) was used to factorise the EEG signals into distinct temporal activations to perform spectrotemporal analysis and localisation of source activities. We found 'encoding' and 'maintenance' operations were correlated with negative and positive changes in α-band power, respectively. Transient activities were observed during encoding of information in the bilateral cuneus, precuneus, inferior parietal gyrus and fusiform gyrus, and a sustained activity in the inferior frontal gyrus. Strong correlations were also observed between changes in α-power and behavioral performance during both encoding and maintenance. Furthermore, it was also found that individuals with higher working memory capacity experienced stronger neural oscillatory responses during the encoding of visual objects into working memory. Our results suggest an interplay between two distinct neural pathways and different spatiotemporal operations during the encoding and maintenance of information which predict individual differences in working memory capacity observed at the behavioral level. © 2014 Federation of European Neuroscience Societies and John Wiley & Sons Ltd.

  19. Manet key management via Mobile Ficlke Key protocol (MFK ...

    African Journals Online (AJOL)

    Manet key management via Mobile Ficlke Key protocol (MFK) ... Journal of Fundamental and Applied Sciences. Journal Home · ABOUT THIS JOURNAL ... No Abstract. Keywords: MANET; key management scheme; simulation environment ...

  20. Age-related effects on perceptual and semantic encoding in memory.

    Science.gov (United States)

    Kuo, M C C; Liu, K P Y; Ting, K H; Chan, C C H

    2014-03-07

    This study examined the age-related subsequent memory effect (SME) in perceptual and semantic encoding using event-related potentials (ERPs). Seventeen younger adults and 17 older adults studied a series of Chinese characters either perceptually (by inspecting orthographic components) or semantically (by determining whether the depicted object makes sounds). The two tasks had similar levels of difficulty. The participants made studied or unstudied judgments during the recognition phase. Younger adults performed better in both conditions, with significant SMEs detected in the time windows of P2, N3, P550, and late positive component (LPC). In the older group, SMEs were observed in the P2 and N3 latencies in both conditions but were only detected in the P550 in the semantic condition. Between-group analyses showed larger frontal and central SMEs in the younger sample in the LPC latency regardless of encoding type. Aging effect appears to be stronger on influencing perceptual than semantic encoding processes. The effects seem to be associated with a decline in updating and maintaining representations during perceptual encoding. The age-related decline in the encoding function may be due in part to changes in frontal lobe function. Copyright © 2013 IBRO. Published by Elsevier Ltd. All rights reserved.

  1. Spectral phase encoding of ultra-short optical pulse in time domain for OCDMA application.

    Science.gov (United States)

    Wang, Xu; Wada, Naoya

    2007-06-11

    We propose a novel reconfigurable time domain spectral phase encoding (SPE) scheme for coherent optical code-division-multiple-access application. In the proposed scheme, the ultra-short optical pulse is stretched by dispersive device and the SPE is done in time domain using high speed phase modulator. The time domain SPE scheme is robust to wavelength drift of the light source and is very flexible and compatible with the fiber optical system. Proof-of-principle experiments of encoding with 16-chip, 20 GHz/chip binary-phase-shift-keying codes and 1.25 Gbps data transmission have been successfully demonstrated together with an arrayed-wave-guide decoder.

  2. Bacteriophages encode factors required for protection in a symbiotic mutualism.

    Science.gov (United States)

    Oliver, Kerry M; Degnan, Patrick H; Hunter, Martha S; Moran, Nancy A

    2009-08-21

    Bacteriophages are known to carry key virulence factors for pathogenic bacteria, but their roles in symbiotic bacteria are less well understood. The heritable symbiont Hamiltonella defensa protects the aphid Acyrthosiphon pisum from attack by the parasitoid Aphidius ervi by killing developing wasp larvae. In a controlled genetic background, we show that a toxin-encoding bacteriophage is required to produce the protective phenotype. Phage loss occurs repeatedly in laboratory-held H. defensa-infected aphid clonal lines, resulting in increased susceptibility to parasitism in each instance. Our results show that these mobile genetic elements can endow a bacterial symbiont with benefits that extend to the animal host. Thus, phages vector ecologically important traits, such as defense against parasitoids, within and among symbiont and animal host lineages.

  3. Study and realisation of a double integration charge encoder at VXI standard

    International Nuclear Information System (INIS)

    Leconte, A.

    1994-07-01

    The 16 channels charge encoder herein described equips the Phoswich scintillators which, associated with photomultiplier tubes, constitutes the first ring of the INDRA Multidetector. This 4 π Multidetector, located at GANIL at Caen, is first presented. In this encoder, two integrations are made, offering a distinction between the fast component of the signal from the detector and the slow one (decreasing times: 2,4 ns and 320ns respectively). This measurement is performed by the integration of each component within an adjustable time-gate. Apart from the two integrations, the encoder realizes the detection of the impulsion with a constant fraction discriminator, the generation of the two gates and a test function. The use of surface mounted components together with the choice of the VXI interconnection standard, also presented in this report, allowed highly integrated electronics. The encoder uses the sliding scale principle. It also includes the electronics for some programmable adjustments, the remote visualisation of important signals and the logic for the conversion. (author). 22 refs

  4. An Intensional Concurrent Faithful Encoding of Turing Machines

    Directory of Open Access Journals (Sweden)

    Thomas Given-Wilson

    2014-10-01

    Full Text Available The benchmark for computation is typically given as Turing computability; the ability for a computation to be performed by a Turing Machine. Many languages exploit (indirect encodings of Turing Machines to demonstrate their ability to support arbitrary computation. However, these encodings are usually by simulating the entire Turing Machine within the language, or by encoding a language that does an encoding or simulation itself. This second category is typical for process calculi that show an encoding of lambda-calculus (often with restrictions that in turn simulates a Turing Machine. Such approaches lead to indirect encodings of Turing Machines that are complex, unclear, and only weakly equivalent after computation. This paper presents an approach to encoding Turing Machines into intensional process calculi that is faithful, reduction preserving, and structurally equivalent. The encoding is demonstrated in a simple asymmetric concurrent pattern calculus before generalised to simplify infinite terms, and to show encodings into Concurrent Pattern Calculus and Psi Calculi.

  5. Laboratory implementation of quantum-control-mechanism identification through Hamiltonian encoding and observable decoding

    International Nuclear Information System (INIS)

    Rey-de-Castro, R.; Rabitz, H.

    2010-01-01

    We report on the laboratory implementation of quantum-control-mechanism identification through Hamiltonian encoding and observable decoding (HE-OD). Over a sequence of experiments, HE-OD introduces a special encoded signature into the components of a previously determined control field expressed in a chosen representation. The outcome appears as a modulated signal in the controlled system observable. Decoding the modulated signal identifies the hierarchy of correlations between components of the control field in a particular representation. In cases where the initial quantum state and observable operator are fully known, then HE-OD can also identify the transition amplitudes of the various Dyson expansion orders contributing to the controlled dynamics. The basic principles of HE-OD are illustrated for second harmonic generation when the components of the field representation are simply taken as the pixels in the pulse shaper. The outcome of HE-OD agrees well with simulations, verifying the concept.

  6. Temporal information encoding in dynamic memristive devices

    Energy Technology Data Exchange (ETDEWEB)

    Ma, Wen; Chen, Lin; Du, Chao; Lu, Wei D., E-mail: wluee@eecs.umich.edu [Department of Electrical Engineering and Computer Science, University of Michigan, Ann Arbor, Michigan 48109 (United States)

    2015-11-09

    We show temporal and frequency information can be effectively encoded in memristive devices with inherent short-term dynamics. Ag/Ag{sub 2}S/Pd based memristive devices with low programming voltage (∼100 mV) were fabricated and tested. At weak programming conditions, the devices exhibit inherent decay due to spontaneous diffusion of the Ag atoms. When the devices were subjected to pulse train inputs emulating different spiking patterns, the switching probability distribution function diverges from the standard Poisson distribution and evolves according to the input pattern. The experimentally observed switching probability distributions and the associated cumulative probability functions can be well-explained using a model accounting for the short-term decay effects. Such devices offer an intriguing opportunity to directly encode neural signals for neural information storage and analysis.

  7. DNA-Encoded Dynamic Combinatorial Chemical Libraries.

    Science.gov (United States)

    Reddavide, Francesco V; Lin, Weilin; Lehnert, Sarah; Zhang, Yixin

    2015-06-26

    Dynamic combinatorial chemistry (DCC) explores the thermodynamic equilibrium of reversible reactions. Its application in the discovery of protein binders is largely limited by difficulties in the analysis of complex reaction mixtures. DNA-encoded chemical library (DECL) technology allows the selection of binders from a mixture of up to billions of different compounds; however, experimental results often show low a signal-to-noise ratio and poor correlation between enrichment factor and binding affinity. Herein we describe the design and application of DNA-encoded dynamic combinatorial chemical libraries (EDCCLs). Our experiments have shown that the EDCCL approach can be used not only to convert monovalent binders into high-affinity bivalent binders, but also to cause remarkably enhanced enrichment of potent bivalent binders by driving their in situ synthesis. We also demonstrate the application of EDCCLs in DNA-templated chemical reactions. © 2015 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.

  8. Storing data encoded DNA in living organisms

    Science.gov (United States)

    Wong,; Pak C. , Wong; Kwong K. , Foote; Harlan, P [Richland, WA

    2006-06-06

    Current technologies allow the generation of artificial DNA molecules and/or the ability to alter the DNA sequences of existing DNA molecules. With a careful coding scheme and arrangement, it is possible to encode important information as an artificial DNA strand and store it in a living host safely and permanently. This inventive technology can be used to identify origins and protect R&D investments. It can also be used in environmental research to track generations of organisms and observe the ecological impact of pollutants. Today, there are microorganisms that can survive under extreme conditions. As well, it is advantageous to consider multicellular organisms as hosts for stored information. These living organisms can provide as memory housing and protection for stored data or information. The present invention provides well for data storage in a living organism wherein at least one DNA sequence is encoded to represent data and incorporated into a living organism.

  9. Bacillus caldolyticus prs gene encoding phosphoribosyldiphosphate synthase

    DEFF Research Database (Denmark)

    Krath, Britta N.; Hove-Jensen, Bjarne

    1996-01-01

    The prs gene, encoding phosphoribosyl-diphosphate (PRPP) synthase, as well as the flanking DNA sequences were cloned and sequenced from the Gram-positive thermophile, Bacillus caldolyticus. Comparison with the homologous sequences from the mesophile, Bacillus subtilis, revealed a gene (gca......D) encoding N-acetylglucosamine-l-phosphate uridyltransferase upstream of prs, and a gene homologous to ctc downstream of prs. cDNA synthesis with a B. caldolyticus gcaD-prs-ctc-specified mRNA as template, followed by amplification utilising the polymerase chain reaction indicated that the three genes are co......-transcribed. Comparison of amino acid sequences revealed a high similarity among PRPP synthases across a wide phylogenetic range. An E. coli strain harbouring the B. caldolyticus prs gene in a multicopy plasmid produced PRPP synthase activity 33-fold over the activity of a haploid B. caldolyticus strain. B. caldolyticus...

  10. Nucleic acid compositions and the encoding proteins

    Science.gov (United States)

    Preston, III, James F.; Chow, Virginia; Nong, Guang; Rice, John D.; St. John, Franz J.

    2014-09-02

    The subject invention provides at least one nucleic acid sequence encoding an aldouronate-utilization regulon isolated from Paenibacillus sp. strain JDR-2, a bacterium which efficiently utilizes xylan and metabolizes aldouronates (methylglucuronoxylosaccharides). The subject invention also provides a means for providing a coordinately regulated process in which xylan depolymerization and product assimilation are coupled in Paenibacillus sp. strain JDR-2 to provide a favorable system for the conversion of lignocellulosic biomass to biobased products. Additionally, the nucleic acid sequences encoding the aldouronate-utilization regulon can be used to transform other bacteria to form organisms capable of producing a desired product (e.g., ethanol, 1-butanol, acetoin, 2,3-butanediol, 1,3-propanediol, succinate, lactate, acetate, malate or alanine) from lignocellulosic biomass.

  11. Asymmetric synthesis using chiral-encoded metal

    Science.gov (United States)

    Yutthalekha, Thittaya; Wattanakit, Chularat; Lapeyre, Veronique; Nokbin, Somkiat; Warakulwit, Chompunuch; Limtrakul, Jumras; Kuhn, Alexander

    2016-08-01

    The synthesis of chiral compounds is of crucial importance in many areas of society and science, including medicine, biology, chemistry, biotechnology and agriculture. Thus, there is a fundamental interest in developing new approaches for the selective production of enantiomers. Here we report the use of mesoporous metal structures with encoded geometric chiral information for inducing asymmetry in the electrochemical synthesis of mandelic acid as a model molecule. The chiral-encoded mesoporous metal, obtained by the electrochemical reduction of platinum salts in the presence of a liquid crystal phase and the chiral template molecule, perfectly retains the chiral information after removal of the template. Starting from a prochiral compound we demonstrate enantiomeric excess of the (R)-enantiomer when using (R)-imprinted electrodes and vice versa for the (S)-imprinted ones. Moreover, changing the amount of chiral cavities in the material allows tuning the enantioselectivity.

  12. Key aspects congenital infection

    Directory of Open Access Journals (Sweden)

    Yu. V. Lobzin

    2014-01-01

    Full Text Available The key questions to solve the problem of congenital infection in the Russian Federation are: using in national practice over world accepted terminology adapted to the recommendations of the World Health Organization; representation of the modern concepts of an infectious process in the classification of congenital infections; scientific development and introducing in clinical practice the «standard case definitions», applied to different congenital infections; optimization of protocols and clinical guidelines for diagnosis, treatment and prevention of congenital infections; improvement a knowledge in the infectious disease for all  pecialists involved in the risk assessment of congenital infections, manage pregnancy and children. Based on our experience and analysis of publications, the authors suggest possible solutions.

  13. Key figures. Year 2006

    International Nuclear Information System (INIS)

    2006-01-01

    This document summarizes in a series of tables the key data of the petroleum industry and of the other energies for the year 2006. Data of the two previous years are given for comparison: 1 - petroleum, France: exploration, reserves, production, transports (tankers, pipelines, crude and refined products), storage capacities, status of resources and uses, foreign trade (imports, prices, exports), refining (capacities, facilities), evolution of supplies, automotive fuels consumption; 2 - energies, France: production, consumption and trade data for coal, natural gas, electricity; total production and consumption of primary energy; consumption per sector of use; 3 - petroleum, world: crude production and reserves per geographical area, OPEC production, imports/exports and refining/consumption per geographical area, international quotation for crudes and refined products; 4 - energies, world: reserves, production and consumption data for coal, natural gas and electricity; uranium production and resources; total primary energy production and consumption per energy source and geographical area. (J.S.)

  14. Key figures. Year 2005

    International Nuclear Information System (INIS)

    2005-01-01

    This document summarizes in a series of tables the key data of the petroleum industry and of the other energies for the year 2005. Data of the two previous years are given for comparison: 1 - petroleum, France: exploration, reserves, production, transports (tankers, pipelines, crude and refined products), storage capacities, status of resources and uses, foreign trade (imports, prices, exports), refining (capacities, facilities), evolution of supplies, automotive fuels consumption; 2 - energies, France: production, consumption and trade data for coal, natural gas, electricity; total production and consumption of primary energy; consumption per sector of use; 3 - petroleum, world: crude production and reserves per geographical area, OPEC production, imports/exports and refining/consumption per geographical area, international quotation for crudes and refined products; 4 - energies, world: reserves, production and consumption data for coal, natural gas and electricity; uranium production and resources; total primary energy production and consumption per energy source and geographical area. (J.S.)

  15. A novel high-frequency encoding algorithm for image compression

    Science.gov (United States)

    Siddeq, Mohammed M.; Rodrigues, Marcos A.

    2017-12-01

    In this paper, a new method for image compression is proposed whose quality is demonstrated through accurate 3D reconstruction from 2D images. The method is based on the discrete cosine transform (DCT) together with a high-frequency minimization encoding algorithm at compression stage and a new concurrent binary search algorithm at decompression stage. The proposed compression method consists of five main steps: (1) divide the image into blocks and apply DCT to each block; (2) apply a high-frequency minimization method to the AC-coefficients reducing each block by 2/3 resulting in a minimized array; (3) build a look up table of probability data to enable the recovery of the original high frequencies at decompression stage; (4) apply a delta or differential operator to the list of DC-components; and (5) apply arithmetic encoding to the outputs of steps (2) and (4). At decompression stage, the look up table and the concurrent binary search algorithm are used to reconstruct all high-frequency AC-coefficients while the DC-components are decoded by reversing the arithmetic coding. Finally, the inverse DCT recovers the original image. We tested the technique by compressing and decompressing 2D images including images with structured light patterns for 3D reconstruction. The technique is compared with JPEG and JPEG2000 through 2D and 3D RMSE. Results demonstrate that the proposed compression method is perceptually superior to JPEG with equivalent quality to JPEG2000. Concerning 3D surface reconstruction from images, it is demonstrated that the proposed method is superior to both JPEG and JPEG2000.

  16. Motion-encoded dose calculation through fluence/sinogram modification

    International Nuclear Information System (INIS)

    Lu, Weiguo; Olivera, Gustavo H.; Mackie, Thomas R.

    2005-01-01

    Conventional radiotherapy treatment planning systems rely on a static computed tomography (CT) image for planning and evaluation. Intra/inter-fraction patient motions may result in significant differences between the planned and the delivered dose. In this paper, we develop a method to incorporate the knowledge of intra/inter-fraction patient motion directly into the dose calculation. By decomposing the motion into a parallel (to beam direction) component and perpendicular (to beam direction) component, we show that the motion effects can be accounted for by simply modifying the fluence distribution (sinogram). After such modification, dose calculation is the same as those based on a static planning image. This method is superior to the 'dose-convolution' method because it is not based on 'shift invariant' assumption. Therefore, it deals with material heterogeneity and surface curvature very well. We test our method using extensive simulations, which include four phantoms, four motion patterns, and three plan beams. We compare our method with the 'dose-convolution' and the 'stochastic simulation' methods (gold standard). As for the homogeneous flat surface phantom, our method has similar accuracy as the 'dose-convolution' method. As for all other phantoms, our method outperforms the 'dose-convolution'. The maximum motion encoded dose calculation error using our method is within 4% of the gold standard. It is shown that a treatment planning system that is based on 'motion-encoded dose calculation' can incorporate random and systematic motion errors in a very simple fashion. Under this approximation, in principle, a planning target volume definition is not required, since it already accounts for the intra/inter-fraction motion variations and it automatically optimizes the cumulative dose rather than the single fraction dose

  17. Optimal Achievable Encoding for Brain Machine Interface

    Science.gov (United States)

    2017-12-22

    dictionary-based encoding approach to translate a visual image into sequential patterns of electrical stimulation in real time , in a manner that...including the time for reviewing instructions, searching existing data sources, gathering and maintaining the data needed, and completing and...networks, and by applying linear decoding to complete recorded populations of retinal ganglion cells for the first time . Third, we developed a greedy

  18. Encoded libraries of chemically modified peptides.

    Science.gov (United States)

    Heinis, Christian; Winter, Greg

    2015-06-01

    The use of powerful technologies for generating and screening DNA-encoded protein libraries has helped drive the development of proteins as pharmaceutical ligands. However the development of peptides as pharmaceutical ligands has been more limited. Although encoded peptide libraries are typically several orders of magnitude larger than classical chemical libraries, can be more readily screened, and can give rise to higher affinity ligands, their use as pharmaceutical ligands is limited by their intrinsic properties. Two of the intrinsic limitations include the rotational flexibility of the peptide backbone and the limited number (20) of natural amino acids. However these limitations can be overcome by use of chemical modification. For example, the libraries can be modified to introduce topological constraints such as cyclization linkers, or to introduce new chemical entities such as small molecule ligands, fluorophores and photo-switchable compounds. This article reviews the chemistry involved, the properties of the peptide ligands, and the new opportunities offered by chemical modification of DNA-encoded peptide libraries. Copyright © 2015. Published by Elsevier Ltd.

  19. Encoding and decoding messages with chaotic lasers

    International Nuclear Information System (INIS)

    Alsing, P.M.; Gavrielides, A.; Kovanis, V.; Roy, R.; Thornburg, K.S. Jr.

    1997-01-01

    We investigate the structure of the strange attractor of a chaotic loss-modulated solid-state laser utilizing return maps based on a combination of intensity maxima and interspike intervals, as opposed to those utilizing Poincare sections defined by the intensity maxima of the laser (I=0,Ie<0) alone. We find both experimentally and numerically that a simple, intrinsic relationship exists between an intensity maximum and the pair of preceding and succeeding interspike intervals. In addition, we numerically investigate encoding messages on the output of a chaotic transmitter laser and its subsequent decoding by a similar receiver laser. By exploiting the relationship between the intensity maxima and the interspike intervals, we demonstrate that the method utilized to encode the message is vital to the system close-quote s ability to hide the signal from unwanted deciphering. In this work alternative methods are studied in order to encode messages by modulating the magnitude of pumping of the transmitter laser and also by driving its loss modulation with more than one frequency. copyright 1997 The American Physical Society

  20. A synthetic system for expression of components of a bacterial microcompartment.

    Science.gov (United States)

    Sargent, Frank; Davidson, Fordyce A; Kelly, Ciarán L; Binny, Rachelle; Christodoulides, Natasha; Gibson, David; Johansson, Emelie; Kozyrska, Katarzyna; Lado, Lucia Licandro; Maccallum, Jane; Montague, Rachel; Ortmann, Brian; Owen, Richard; Coulthurst, Sarah J; Dupuy, Lionel; Prescott, Alan R; Palmer, Tracy

    2013-11-01

    In general, prokaryotes are considered to be single-celled organisms that lack internal membrane-bound organelles. However, many bacteria produce proteinaceous microcompartments that serve a similar purpose, i.e. to concentrate specific enzymic reactions together or to shield the wider cytoplasm from toxic metabolic intermediates. In this paper, a synthetic operon encoding the key structural components of a microcompartment was designed based on the genes for the Salmonella propanediol utilization (Pdu) microcompartment. The genes chosen included pduA, -B, -J, -K, -N, -T and -U, and each was shown to produce protein in an Escherichia coli chassis. In parallel, a set of compatible vectors designed to express non-native cargo proteins was also designed and tested. Engineered hexa-His tags allowed isolation of the components of the microcompartments together with co-expressed, untagged, cargo proteins. Finally, an in vivo protease accessibility assay suggested that a PduD-GFP fusion could be protected from proteolysis when co-expressed with the synthetic microcompartment operon. This work gives encouragement that it may be possible to harness the genes encoding a non-native microcompartment for future biotechnological applications.

  1. Key Recovery Attacks on Recent Authenticated Ciphers

    DEFF Research Database (Denmark)

    Bogdanov, Andrey; Dobraunig, Christoph; Eichlseder, Maria

    2014-01-01

    In this paper, we cryptanalyze three authenticated ciphers: AVALANCHE, Calico, and RBS. While the former two are contestants in the ongoing international CAESAR competition for authenticated encryption schemes, the latter has recently been proposed for lightweight applications such as RFID systems...... and wireless networks. All these schemes use well-established and secure components such as the AES, Grain-like NFSRs, ChaCha and SipHash as their building blocks. However, we discover key recovery attacks for all three designs, featuring square-root complexities. Using a key collision technique, we can...

  2. Smooth Phase Interpolated Keying

    Science.gov (United States)

    Borah, Deva K.

    2007-01-01

    Smooth phase interpolated keying (SPIK) is an improved method of computing smooth phase-modulation waveforms for radio communication systems that convey digital information. SPIK is applicable to a variety of phase-shift-keying (PSK) modulation schemes, including quaternary PSK (QPSK), octonary PSK (8PSK), and 16PSK. In comparison with a related prior method, SPIK offers advantages of better performance and less complexity of implementation. In a PSK scheme, the underlying information waveform that one seeks to convey consists of discrete rectangular steps, but the spectral width of such a waveform is excessive for practical radio communication. Therefore, the problem is to smooth the step phase waveform in such a manner as to maintain power and bandwidth efficiency without incurring an unacceptably large error rate and without introducing undesired variations in the amplitude of the affected radio signal. Although the ideal constellation of PSK phasor points does not cause amplitude variations, filtering of the modulation waveform (in which, typically, a rectangular pulse is converted to a square-root raised cosine pulse) causes amplitude fluctuations. If a power-efficient nonlinear amplifier is used in the radio communication system, the fluctuating-amplitude signal can undergo significant spectral regrowth, thus compromising the bandwidth efficiency of the system. In the related prior method, one seeks to solve the problem in a procedure that comprises two major steps: phase-value generation and phase interpolation. SPIK follows the two-step approach of the related prior method, but the details of the steps are different. In the phase-value-generation step, the phase values of symbols in the PSK constellation are determined by a phase function that is said to be maximally smooth and that is chosen to minimize the spectral spread of the modulated signal. In this step, the constellation is divided into two groups by assigning, to information symbols, phase values

  3. Neurons in Primary Motor Cortex Encode Hand Orientation in a Reach-to-Grasp Task.

    Science.gov (United States)

    Ma, Chaolin; Ma, Xuan; Fan, Jing; He, Jiping

    2017-08-01

    It is disputed whether those neurons in the primary motor cortex (M1) that encode hand orientation constitute an independent channel for orientation control in reach-to-grasp behaviors. Here, we trained two monkeys to reach forward and grasp objects positioned in the frontal plane at different orientation angles, and simultaneously recorded the activity of M1 neurons. Among the 2235 neurons recorded in M1, we found that 18.7% had a high correlation exclusively with hand orientation, 15.9% with movement direction, and 29.5% with both movement direction and hand orientation. The distributions of neurons encoding hand orientation and those encoding movement direction were not uniform but coexisted in the same region. The trajectory of hand rotation was reproduced by the firing patterns of the orientation-related neurons independent of the hand reaching direction. These results suggest that hand orientation is an independent component for the control of reaching and grasping activity.

  4. Modality-specific alpha modulations facilitate long-term memory encoding in the presence of distracters.

    Science.gov (United States)

    Jiang, Haiteng; van Gerven, Marcel A J; Jensen, Ole

    2015-03-01

    It has been proposed that long-term memory encoding is not only dependent on engaging task-relevant regions but also on disengaging task-irrelevant regions. In particular, oscillatory alpha activity has been shown to be involved in shaping the functional architecture of the working brain because it reflects the functional disengagement of specific regions in attention and memory tasks. We here ask if such allocation of resources by alpha oscillations generalizes to long-term memory encoding in a cross-modal setting in which we acquired the ongoing brain activity using magnetoencephalography. Participants were asked to encode pictures while ignoring simultaneously presented words and vice versa. We quantified the brain activity during rehearsal reflecting subsequent memory in the different attention conditions. The key finding was that successful long-term memory encoding is reflected by alpha power decreases in the sensory region of the to-be-attended modality and increases in the sensory region of the to-be-ignored modality to suppress distraction during rehearsal period. Our results corroborate related findings from attention studies by demonstrating that alpha activity is also important for the allocation of resources during long-term memory encoding in the presence of distracters.

  5. Mutations in the NHEJ component XRCC4 cause primordial dwarfism.

    Science.gov (United States)

    Murray, Jennie E; van der Burg, Mirjam; IJspeert, Hanna; Carroll, Paula; Wu, Qian; Ochi, Takashi; Leitch, Andrea; Miller, Edward S; Kysela, Boris; Jawad, Alireza; Bottani, Armand; Brancati, Francesco; Cappa, Marco; Cormier-Daire, Valerie; Deshpande, Charu; Faqeih, Eissa A; Graham, Gail E; Ranza, Emmanuelle; Blundell, Tom L; Jackson, Andrew P; Stewart, Grant S; Bicknell, Louise S

    2015-03-05

    Non-homologous end joining (NHEJ) is a key cellular process ensuring genome integrity. Mutations in several components of the NHEJ pathway have been identified, often associated with severe combined immunodeficiency (SCID), consistent with the requirement for NHEJ during V(D)J recombination to ensure diversity of the adaptive immune system. In contrast, we have recently found that biallelic mutations in LIG4 are a common cause of microcephalic primordial dwarfism (MPD), a phenotype characterized by prenatal-onset extreme global growth failure. Here we provide definitive molecular genetic evidence supported by biochemical, cellular, and immunological data for mutations in XRCC4, encoding the obligate binding partner of LIG4, causing MPD. We report the identification of biallelic mutations in XRCC4 in five families. Biochemical and cellular studies demonstrate that these alterations substantially decrease XRCC4 protein levels leading to reduced cellular ligase IV activity. Consequently, NHEJ-dependent repair of ionizing-radiation-induced DNA double-strand breaks is compromised in XRCC4 cells. Similarly, immunoglobulin junctional diversification is impaired in cells. However, immunoglobulin levels are normal, and individuals lack overt signs of immunodeficiency. Additionally, in contrast to individuals with LIG4 mutations, pancytopenia leading to bone marrow failure has not been observed. Hence, alterations that alter different NHEJ proteins give rise to a phenotypic spectrum, from SCID to extreme growth failure, with deficiencies in certain key components of this repair pathway predominantly exhibiting growth deficits, reflecting differential developmental requirements for NHEJ proteins to support growth and immune maturation. Copyright © 2015 The American Society of Human Genetics. Published by Elsevier Inc. All rights reserved.

  6. Isolation and sequence analysis of a cDNA clone encoding the fifth complement component

    DEFF Research Database (Denmark)

    Lundwall, Åke B; Wetsel, Rick A; Kristensen, Torsten

    1985-01-01

    DNA clone of 1.85 kilobase pairs was isolated. Hybridization of the mixed-sequence probe to the complementary strand of the plasmid insert and sequence analysis by the dideoxy method predicted the expected protein sequence of C5a (positions 1-12), amino-terminal to the anticipated priming site. The sequence......, subcloned into M13 mp8, and sequenced at random by the dideoxy technique, thereby generating a contiguous sequence of 1703 base pairs. This clone contained coding sequence for the C-terminal 262 amino acid residues of the beta-chain, the entire C5a fragment, and the N-terminal 98 residues of the alpha......'-chain. The 3' end of the clone had a polyadenylated tail preceded by a polyadenylation recognition site, a 3'-untranslated region, and base pairs homologous to the human Alu concensus sequence. Comparison of the derived partial human C5 protein sequence with that previously determined for murine C3 and human...

  7. The Fusarium oxysporum gnt2, Encoding a Putative N-Acetylglucosamine Transferase, Is Involved in Cell Wall Architecture and Virulence

    Science.gov (United States)

    López-Fernández, Loida; Ruiz-Roldán, Carmen; Pareja-Jaime, Yolanda; Prieto, Alicia; Khraiwesh, Husam; Roncero, M. Isabel G.

    2013-01-01

    With the aim to decipher the molecular dialogue and cross talk between Fusarium oxysporum f.sp. lycopersci and its host during infection and to understand the molecular bases that govern fungal pathogenicity, we analysed genes presumably encoding N-acetylglucosaminyl transferases, involved in glycosylation of glycoproteins, glycolipids, proteoglycans or small molecule acceptors in other microorganisms. In silico analysis revealed the existence of seven putative N-glycosyl transferase encoding genes (named gnt) in F. oxysporum f.sp. lycopersici genome. gnt2 deletion mutants showed a dramatic reduction in virulence on both plant and animal hosts. Δgnt2 mutants had αalterations in cell wall properties related to terminal αor β-linked N-acetyl glucosamine. Mutant conidia and germlings also showed differences in structure and physicochemical surface properties. Conidial and hyphal aggregation differed between the mutant and wild type strains, in a pH independent manner. Transmission electron micrographs of germlings showed strong cell-to-cell adherence and the presence of an extracellular chemical matrix. Δgnt2 cell walls presented a significant reduction in N-linked oligosaccharides, suggesting the involvement of Gnt2 in N-glycosylation of cell wall proteins. Gnt2 was localized in Golgi-like sub-cellular compartments as determined by fluorescence microscopy of GFP::Gnt2 fusion protein after treatment with the antibiotic brefeldin A or by staining with fluorescent sphingolipid BODIPY-TR ceramide. Furthermore, density gradient ultracentrifugation allowed co-localization of GFP::Gnt2 fusion protein and Vps10p in subcellular fractions enriched in Golgi specific enzymatic activities. Our results suggest that N-acetylglucosaminyl transferases are key components for cell wall structure and influence interactions of F. oxysporum with both plant and animal hosts during pathogenicity. PMID:24416097

  8. The Fusarium oxysporum gnt2, encoding a putative N-acetylglucosamine transferase, is involved in cell wall architecture and virulence.

    Directory of Open Access Journals (Sweden)

    Loida López-Fernández

    Full Text Available With the aim to decipher the molecular dialogue and cross talk between Fusarium oxysporum f.sp. lycopersci and its host during infection and to understand the molecular bases that govern fungal pathogenicity, we analysed genes presumably encoding N-acetylglucosaminyl transferases, involved in glycosylation of glycoproteins, glycolipids, proteoglycans or small molecule acceptors in other microorganisms. In silico analysis revealed the existence of seven putative N-glycosyl transferase encoding genes (named gnt in F. oxysporum f.sp. lycopersici genome. gnt2 deletion mutants showed a dramatic reduction in virulence on both plant and animal hosts. Δgnt2 mutants had αalterations in cell wall properties related to terminal αor β-linked N-acetyl glucosamine. Mutant conidia and germlings also showed differences in structure and physicochemical surface properties. Conidial and hyphal aggregation differed between the mutant and wild type strains, in a pH independent manner. Transmission electron micrographs of germlings showed strong cell-to-cell adherence and the presence of an extracellular chemical matrix. Δgnt2 cell walls presented a significant reduction in N-linked oligosaccharides, suggesting the involvement of Gnt2 in N-glycosylation of cell wall proteins. Gnt2 was localized in Golgi-like sub-cellular compartments as determined by fluorescence microscopy of GFP::Gnt2 fusion protein after treatment with the antibiotic brefeldin A or by staining with fluorescent sphingolipid BODIPY-TR ceramide. Furthermore, density gradient ultracentrifugation allowed co-localization of GFP::Gnt2 fusion protein and Vps10p in subcellular fractions enriched in Golgi specific enzymatic activities. Our results suggest that N-acetylglucosaminyl transferases are key components for cell wall structure and influence interactions of F. oxysporum with both plant and animal hosts during pathogenicity.

  9. Neural activation patterns of successful episodic encoding: Reorganization during childhood, maintenance in old age

    Directory of Open Access Journals (Sweden)

    Yee Lee Shing

    2016-08-01

    Full Text Available The two-component framework of episodic memory (EM development posits that the contributions of medial temporal lobe (MTL and prefrontal cortex (PFC to successful encoding differ across the lifespan. To test the framework’s hypotheses, we compared subsequent memory effects (SME of 10–12 year-old children, younger adults, and older adults using functional magnetic resonance imaging (fMRI. Memory was probed by cued recall, and SME were defined as regional activation differences during encoding between subsequently correctly recalled versus omitted items. In MTL areas, children’s SME did not differ in magnitude from those of younger and older adults. In contrast, children’s SME in PFC were weaker than the corresponding SME in younger and older adults, in line with the hypothesis that PFC contributes less to successful encoding in childhood. Differences in SME between younger and older adults were negligible. The present results suggest that, among individuals with high memory functioning, the neural circuitry contributing to successful episodic encoding is reorganized from middle childhood to adulthood. Successful episodic encoding in later adulthood, however, is characterized by the ability to maintain the activation patterns that emerged in young adulthood.

  10. Key to good fit: body measurement problems specific to key ...

    African Journals Online (AJOL)

    Key to good fit: body measurement problems specific to key dimensions. ... to explore and describe the problems that the South African Clothing Industry currently ... A postal survey was conducted among South African apparel and footwear ...

  11. Flow hydrodynamics near inlet key of Piano Key Weir (PKW)

    Indian Academy of Sciences (India)

    Department of Water Resources Development and Management, Indian Institute ... on the hydrodynamic performance near inlet key of Piano Key Weir (PKW). ... nature of flows is clearly understood with the help of advanced instrumentation.

  12. SGD1, a key enzyme in tocopherol biosynthesis, is essential for plant development and cold tolerance in rice.

    Science.gov (United States)

    Wang, Di; Wang, Yunlong; Long, Wuhua; Niu, Mei; Zhao, Zhigang; Teng, Xuan; Zhu, Xiaopin; Zhu, Jianping; Hao, Yuanyuan; Wang, Yongfei; Liu, Yi; Jiang, Ling; Wang, Yihua; Wan, Jianmin

    2017-07-01

    Tocopherols, a group of Vitamin E compounds, are essential components of the human diet. In contrast to well documented roles in animals, the functions of tocopherols in plants are less understood. In this study, we characterized two allelic rice dwarf mutant lines designated sgd1-1 and sgd1-2 (small grain and dwarf1). Histological observations showed that the dwarf phenotypes were mainly due to cell elongation defects. A map-based cloning strategy and subsequent complementation test showed that SGD1 encodes homogentisate phytyltransferase (HPT), a key enzyme in tocopherol biosynthesis. Mutation of SGD1 resulted in tocopherol deficiency in both sgd1mutants. No oxidant damage was detected in the sgd1 mutants. Further analysis showed that sgd1-2 was hypersensitive to cold stress. Our results indicate that SGD1 is essential for plant development and cold tolerance in rice. Copyright © 2017 Elsevier B.V. All rights reserved.

  13. Evaluating standard terminologies for encoding allergy information.

    Science.gov (United States)

    Goss, Foster R; Zhou, Li; Plasek, Joseph M; Broverman, Carol; Robinson, George; Middleton, Blackford; Rocha, Roberto A

    2013-01-01

    Allergy documentation and exchange are vital to ensuring patient safety. This study aims to analyze and compare various existing standard terminologies for representing allergy information. Five terminologies were identified, including the Systemized Nomenclature of Medical Clinical Terms (SNOMED CT), National Drug File-Reference Terminology (NDF-RT), Medication Dictionary for Regulatory Activities (MedDRA), Unique Ingredient Identifier (UNII), and RxNorm. A qualitative analysis was conducted to compare desirable characteristics of each terminology, including content coverage, concept orientation, formal definitions, multiple granularities, vocabulary structure, subset capability, and maintainability. A quantitative analysis was also performed to compare the content coverage of each terminology for (1) common food, drug, and environmental allergens and (2) descriptive concepts for common drug allergies, adverse reactions (AR), and no known allergies. Our qualitative results show that SNOMED CT fulfilled the greatest number of desirable characteristics, followed by NDF-RT, RxNorm, UNII, and MedDRA. Our quantitative results demonstrate that RxNorm had the highest concept coverage for representing drug allergens, followed by UNII, SNOMED CT, NDF-RT, and MedDRA. For food and environmental allergens, UNII demonstrated the highest concept coverage, followed by SNOMED CT. For representing descriptive allergy concepts and adverse reactions, SNOMED CT and NDF-RT showed the highest coverage. Only SNOMED CT was capable of representing unique concepts for encoding no known allergies. The proper terminology for encoding a patient's allergy is complex, as multiple elements need to be captured to form a fully structured clinical finding. Our results suggest that while gaps still exist, a combination of SNOMED CT and RxNorm can satisfy most criteria for encoding common allergies and provide sufficient content coverage.

  14. 2D Barcode for DNA Encoding

    OpenAIRE

    Elena Purcaru; Cristian Toma

    2011-01-01

    The paper presents a solution for endcoding/decoding DNA information in 2D barcodes. First part focuses on the existing techniques and symbologies in 2D barcodes field. The 2D barcode PDF417 is presented as starting point. The adaptations and optimizations on PDF417 and on DataMatrix lead to the solution - DNA2DBC - DeoxyriboNucleic Acid Two Dimensional Barcode. The second part shows the DNA2DBC encoding/decoding process step by step. In conclusions are enumerated the most important features ...

  15. Dual beam encoded extended fractional Fourier transform security ...

    Indian Academy of Sciences (India)

    This paper describes a simple method for making dual beam encoded extended fractional Fourier transform (EFRT) security holograms. The hologram possesses different stages of encoding so that security features are concealed and remain invisible to the counterfeiter. These concealed and encoded anticounterfeit ...

  16. Optimal higher-order encoder time-stamping

    NARCIS (Netherlands)

    Merry, R.J.E.; Molengraft, van de M.J.G.; Steinbuch, M.

    2013-01-01

    Optical incremental encoders are used to measure the position of motion control systems. The accuracy of the position measurement is determined and bounded by the number of slits on the encoder. The position measurement is affected by quantization errors and encoder imperfections. In this paper, an

  17. Encoding of electrophysiology and other signals in MR images

    DEFF Research Database (Denmark)

    Hanson, Lars G; Lund, Torben E; Hanson, Christian G

    2007-01-01

    to the "magstripe" technique used for encoding of soundtracks in motion pictures, the electrical signals are in this way encoded as artifacts appearing in the MR images or spectra outside the region of interest. The encoded signals are subsequently reconstructed from the signal recorded by the scanner. RESULTS...

  18. The predominant WT1 isoform (+KTS) encodes a DNA-binding protein targeting the planar cell polarity gene Scribble in renal podocytes.

    Science.gov (United States)

    Wells, Julie; Rivera, Miguel N; Kim, Woo Jae; Starbuck, Kristen; Haber, Daniel A

    2010-07-01

    WT1 encodes a tumor suppressor first identified by its inactivation in Wilms' Tumor. Although one WT1 splicing variant encodes a well-characterized zinc finger transcription factor, little is known about the function of the most prevalent WT1 isoform, whose DNA binding domain is disrupted by a three-amino acid (KTS) insertion. Using cells that conditionally express WT1(+KTS), we undertook a genome-wide chromatin immunoprecipitation and cloning analysis to identify candidate WT1(+KTS)-regulated promoters. We identified the planar cell polarity gene Scribble (SCRB) as the first WT1(+KTS) target gene in podocytes of the kidney. WT1 and SCRB expression patterns overlap precisely in developing renal glomeruli of mice, and WT1(+KTS) binds to a 33-nucleotide region within the Scribble promoter in mouse and human cell lines and kidneys. Together, our results support a role for the predominant WT1(+KTS) isoform in transcriptional regulation and suggest a link between the WT1-dependent tumor suppressor pathway and a key component of the planar cell polarity pathway.

  19. The predominant WT1 isoform (+KTS) encodes a DNA binding protein targeting the planar cell polarity gene Scribble in renal podocytes

    Science.gov (United States)

    Wells, Julie; Rivera, Miguel N.; Kim, Woo Jae; Starbuck, Kristen; Haber, Daniel A.

    2010-01-01

    WT1 encodes a tumor suppressor, first identified by its inactivation in Wilms Tumor. While one WT1 splicing variant encodes a well-characterized zinc finger transcription factor, little is known about the function of the most prevalent WT1 isoform, whose DNA binding domain is disrupted by a three amino acid (KTS) insertion. Using cells which conditionally express WT1(+KTS), we undertook a genome-wide chromatin immunoprecipitation and cloning (ChIP-cloning) analysis to identify candidate WT1(+KTS) regulated promoters. We identified the planar cell polarity (PCP) gene Scribble (SCRB) as the first WT1(+KTS) target gene in podocytes of the kidney. WT1 and SCRB expression patterns overlap precisely in developing renal glomeruli of mice, and WT1(+KTS) binds to a 33 nucleotide region within the Scribble promoter in both mouse and human cell lines and kidneys. Together, our results support a role for the predominant WT1(+KTS) isoform in transcriptional regulation and suggest a link between the WT1-dependent tumor suppressor pathway and a key component of the planar cell polarity pathway. PMID:20571064

  20. The pde2 gene of Saccharomyces cerevisiae is allelic to rca1 and encodes a phosphodiesterase which protects the cell from extracellular cAMP.

    Science.gov (United States)

    Wilson, R B; Renault, G; Jacquet, M; Tatchell, K

    1993-07-05

    The high affinity cAMP phosphodiesterase, encoded by PDE2, is an important component of the cAMP-dependent protein kinase signaling system in Saccharomyces cerevisiae. An unexpected phenotype of pde2 mutants is sensitivity to external cAMP. This trait has been found independently for rca1 mutants and has been used to monitor the effects of cAMP on several biological processes. We demonstrate here that RCA1 is identical to PDE2. Further analysis of the phenotype of pde2 deletions reveal that exogenously added cAMP results in an increase in the internal level of cAMP. This increase slows down the rate of cell division by increasing the length of the G1 phase of the cell cycle and leads to increased cell volume. Also, cells with a disrupted PDE2 gene previously arrested by nutrient starvation rapidly lose thermotolerance when incubated with exogenous cAMP. From these observations we propose that a role of the PDE2-encoded phosphodiesterase may be to help insulate the internal cAMP pools from the external environment. This protective role might also be important in other eukaryotic organisms where cAMP is a key second messenger.

  1. Experimental aspects of deterministic secure quantum key distribution

    Energy Technology Data Exchange (ETDEWEB)

    Walenta, Nino; Korn, Dietmar; Puhlmann, Dirk; Felbinger, Timo; Hoffmann, Holger; Ostermeyer, Martin [Universitaet Potsdam (Germany). Institut fuer Physik; Bostroem, Kim [Universitaet Muenster (Germany)

    2008-07-01

    Most common protocols for quantum key distribution (QKD) use non-deterministic algorithms to establish a shared key. But deterministic implementations can allow for higher net key transfer rates and eavesdropping detection rates. The Ping-Pong coding scheme by Bostroem and Felbinger[1] employs deterministic information encoding in entangled states with its characteristic quantum channel from Bob to Alice and back to Bob. Based on a table-top implementation of this protocol with polarization-entangled photons fundamental advantages as well as practical issues like transmission losses, photon storage and requirements for progress towards longer transmission distances are discussed and compared to non-deterministic protocols. Modifications of common protocols towards a deterministic quantum key distribution are addressed.

  2. Trends in chassis and automobile electronics components

    Energy Technology Data Exchange (ETDEWEB)

    Hackenberg, Ulrich [Volkswagen AG, Wolfsburg (Germany)

    2008-07-01

    The rapidly-growing importance of electronics in automobile construction is in part determined by the debate on sustainability and the clear trend towards electric power trains. Another factor, however, is the decisive impact of electronics on the further development of components, e.g. for chassis. Apart from environmental protection, key motivators for component development include comfort, safety, infotainment and driver assistance. (orig.)

  3. High-Rate Field Demonstration of Large-Alphabet Quantum Key Distribution

    Science.gov (United States)

    2016-10-12

    count rate of Bob’s detectors. In this detector-limited regime , it is advantageous to increase M to encode as much information as possible in each...High- rate field demonstration of large-alphabet quantum key distribution Catherine Lee,1, 2 Darius Bunandar,1 Zheshen Zhang,1 Gregory R. Steinbrecher...October 12, 2016) 2 Quantum key distribution (QKD) enables secure symmetric key exchange for information-theoretically secure com- munication via one-time

  4. QualityML: a dictionary for quality metadata encoding

    Science.gov (United States)

    Ninyerola, Miquel; Sevillano, Eva; Serral, Ivette; Pons, Xavier; Zabala, Alaitz; Bastin, Lucy; Masó, Joan

    2014-05-01

    The scenario of rapidly growing geodata catalogues requires tools focused on facilitate users the choice of products. Having quality fields populated in metadata allow the users to rank and then select the best fit-for-purpose products. In this direction, we have developed the QualityML (http://qualityml.geoviqua.org), a dictionary that contains hierarchically structured concepts to precisely define and relate quality levels: from quality classes to quality measurements. Generically, a quality element is the path that goes from the higher level (quality class) to the lowest levels (statistics or quality metrics). This path is used to encode quality of datasets in the corresponding metadata schemas. The benefits of having encoded quality, in the case of data producers, are related with improvements in their product discovery and better transmission of their characteristics. In the case of data users, particularly decision-makers, they would find quality and uncertainty measures to take the best decisions as well as perform dataset intercomparison. Also it allows other components (such as visualization, discovery, or comparison tools) to be quality-aware and interoperable. On one hand, the QualityML is a profile of the ISO geospatial metadata standards providing a set of rules for precisely documenting quality indicator parameters that is structured in 6 levels. On the other hand, QualityML includes semantics and vocabularies for the quality concepts. Whenever possible, if uses statistic expressions from the UncertML dictionary (http://www.uncertml.org) encoding. However it also extends UncertML to provide list of alternative metrics that are commonly used to quantify quality. A specific example, based on a temperature dataset, is shown below. The annual mean temperature map has been validated with independent in-situ measurements to obtain a global error of 0.5 ° C. Level 0: Quality class (e.g., Thematic accuracy) Level 1: Quality indicator (e.g., Quantitative

  5. Convolutional encoder-decoder for breast mass segmentation in digital breast tomosynthesis

    Science.gov (United States)

    Zhang, Jun; Ghate, Sujata V.; Grimm, Lars J.; Saha, Ashirbani; Cain, Elizabeth Hope; Zhu, Zhe; Mazurowski, Maciej A.

    2018-02-01

    Digital breast tomosynthesis (DBT) is a relatively new modality for breast imaging that can provide detailed assessment of dense tissue within the breast. In the domains of cancer diagnosis, radiogenomics, and resident education, it is important to accurately segment breast masses. However, breast mass segmentation is a very challenging task, since mass regions have low contrast difference between their neighboring tissues. Notably, the task might become more difficult in cases that were assigned BI-RADS 0 category since this category includes many lesions that are of low conspicuity and locations that were deemed to be overlapping normal tissue upon further imaging and were not sent to biopsy. Segmentation of such lesions is of particular importance in the domain of reader performance analysis and education. In this paper, we propose a novel deep learning-based method for segmentation of BI-RADS 0 lesions in DBT. The key components of our framework are an encoding path for local-to-global feature extraction, and a decoding patch to expand the images. To address the issue of limited training data, in the training stage, we propose to sample patches not only in mass regions but also in non-mass regions. We utilize a Dice-like loss function in the proposed network to alleviate the class-imbalance problem. The preliminary results on 40 subjects show promise of our method. In addition to quantitative evaluation of the method, we present a visualization of the results that demonstrate both the performance of the algorithm as well as the difficulty of the task at hand.

  6. V123 Beam Synchronous Encoder Module

    International Nuclear Information System (INIS)

    Kerner, T.; Conkling, C. R.; Oerter, B.

    1999-01-01

    The V123 Synchronous Encoder Module transmits events to distributed trigger modules and embedded decoders around the RHIC rings where they are used to provide beam instrumentation triggers [1,2,3]. The RHIC beam synchronous event link hardware is mainly comprised of three VMEbus board designs, the central input modules (V201), and encoder modules (V123), and the distributed trigger modules (V124). Two beam synchronous links, one for each ring, are distributed via fiberoptic and fanned out via twisted wire pair cables. The V123 synchronizes with the RF system clock derived from the beam bucket frequency and a revolution fiducial pulse. The RF system clock is used to create the beam synchronous event link carrier and events are synchronized with the rotation fiducial. A low jitter RF clock is later recovered from this carrier by phase lock loops in the trigger modules. Prioritized hardware and software triggers fill up to 15 beam event code transmission slots per revolution while tracking the ramping RF acceleration frequency and storage frequency. The revolution fiducial event is always the first event transmitted which is used to synchronize the firing of the abort kicker and to locate the first bucket for decoders distributed about the ring

  7. How can survival processing improve memory encoding?

    Science.gov (United States)

    Luo, Meng; Geng, Haiyan

    2013-11-01

    We investigated the psychological mechanism of survival processing advantage from the perspective of false memory in two experiments. Using a DRM paradigm in combination with analysis based on signal detection theory, we were able to separately examine participants' utilization of verbatim representation and gist representation. Specifically, in Experiment 1, participants rated semantically related words in a survival scenario for a survival condition but rated pleasantness of words in the same DRM lists for a non-survival control condition. The results showed that participants demonstrated more gist processing in the survival condition than in the pleasantness condition; however, the degree of item-specific processing in the two encoding conditions did not significantly differ. In Experiment 2, the control task was changed to a category rating task, in which participants were asked to make category ratings of words in the category lists. We found that the survival condition involved more item-specific processing than did the category condition, but we found no significant difference between the two encoding conditions at the level of gist processing. Overall, our study demonstrates that survival processing can simultaneously promote gist and item-specific representations. When the control tasks only promoted either item-specific representation or gist representation, memory advantages of survival processing occurred.

  8. Negative base encoding in optical linear algebra processors

    Science.gov (United States)

    Perlee, C.; Casasent, D.

    1986-01-01

    In the digital multiplication by analog convolution algorithm, the bits of two encoded numbers are convolved to form the product of the two numbers in mixed binary representation; this output can be easily converted to binary. Attention is presently given to negative base encoding, treating base -2 initially, and then showing that the negative base system can be readily extended to any radix. In general, negative base encoding in optical linear algebra processors represents a more efficient technique than either sign magnitude or 2's complement encoding, when the additions of digitally encoded products are performed in parallel.

  9. Towards understanding the known-key security of block ciphers

    DEFF Research Database (Denmark)

    Andreeva, Elena; Bogdanov, Andrey; Mennink, Bart

    2014-01-01

    ciphers based on ideal components such as random permutations and random functions as well as propose new generic known-key attacks on generalized Feistel ciphers. We introduce the notion of known-key indifferentiability to capture the security of such block ciphers under a known key. To show its...... meaningfulness, we prove that the known-key attacks on block ciphers with ideal primitives to date violate security under known-key indifferentiability. On the other hand, to demonstrate its constructiveness, we prove the balanced Feistel cipher with random functions and the multiple Even-Mansour cipher...... with random permutations known-key indifferentiable for a sufficient number of rounds. We note that known-key indifferentiability is more quickly and tightly attained by multiple Even-Mansour which puts it forward as a construction provably secure against known-key attacks....

  10. Mechanical design of machine components

    CERN Document Server

    Ugural, Ansel C

    2015-01-01

    Mechanical Design of Machine Components, Second Edition strikes a balance between theory and application, and prepares students for more advanced study or professional practice. It outlines the basic concepts in the design and analysis of machine elements using traditional methods, based on the principles of mechanics of materials. The text combines the theory needed to gain insight into mechanics with numerical methods in design. It presents real-world engineering applications, and reveals the link between basic mechanics and the specific design of machine components and machines. Divided into three parts, this revised text presents basic background topics, deals with failure prevention in a variety of machine elements and covers applications in design of machine components as well as entire machines. Optional sections treating special and advanced topics are also included.Key Features of the Second Edition:Incorporates material that has been completely updated with new chapters, problems, practical examples...

  11. Advanced Optoelectronic Components for All-Optical Networks

    National Research Council Canada - National Science Library

    Shapiro, Jeffrey H

    2002-01-01

    Under APOSR Grant F49620-96-1-0126, 'Advanced Optoelectronic Components for All-Optical Networks', we have worked to develop key technologies and components to substantially improve the performance...

  12. Two component system that regulates methanol and formaldehyde oxidation in Paracoccus denitrificans.

    NARCIS (Netherlands)

    Harms, N.; Reijnders, W.N.M.; Koning, S.; van Spanning, R.J.M.

    2001-01-01

    A chromosomal region encoding a two-component regulatory system, FlhRS, has been isolated from Paracoccus denitrificans. FlhRS-deficient mutants were unable to grow on methanol, methylamine, or choline as the carbon and energy source. Expression of the gene encoding glutathione-dependent

  13. Two-component system that regulates methanol and formaldehyde oxidation in Paracoccus denitrificans.

    NARCIS (Netherlands)

    Harms, N.; Reijnders, W.N.M.; Koning, S.; van Spanning, R.J.M.

    2001-01-01

    A chromosomal region encoding a two-component regulatory system, FlhRS, has been isolated from Paracoccus denitrificans. FlhRS-deficient mutants were unable to grow on methanol, methylamine, or choline as the carbon and energy source. Expression of the gene encoding glutathione-dependent

  14. Encoding circuit for transform coding of a picture signal and decoding circuit for encoding said signal

    NARCIS (Netherlands)

    1991-01-01

    Encoding circuit for transforming a picture signal into blocks of, for example, 8*8 coefficients, in which each block of coefficients is read motion-adaptively. In the case of motion within a sub-picture, the block of coefficients is read in such an order that the obtained series of coefficients

  15. Video encoder/decoder for encoding/decoding motion compensated images

    NARCIS (Netherlands)

    1996-01-01

    Video encoder and decoder, provided with a motion compensator for motion-compensated video coding or decoding in which a picture is coded or decoded in blocks in alternately horizontal and vertical steps. The motion compensator is provided with addressing means (160) and controlled multiplexers

  16. The self-pleasantness judgment modulates the encoding performance and the Default Mode Network activity

    Directory of Open Access Journals (Sweden)

    Perrone-Bertolotti eMarcela

    2016-03-01

    Full Text Available In this functional magnetic resonance imaging (fMRI study, we evaluated the effect of self-relevance on cerebral activity and behavioral performance during an incidental encoding task. Recent findings suggest that pleasantness judgments reliably induce self-oriented (internal thoughts and increase default mode network (DMN activity. We hypothesized that this increase in DMN activity would relate to increased memory recognition for pleasantly-judged stimuli (which depend on internally-oriented attention but decreased recognition for unpleasantly-judged items (which depend on externally-oriented attention. To test this hypothesis, brain activity was recorded from 21 healthy participants while they performed a pleasantness judgment requiring them to rate visual stimuli as pleasant or unpleasant. One hour later, participants performed a surprise memory recognition test outside of the scanner. Thus, we were able to evaluate the effects of pleasant and unpleasant judgments on cerebral activity and incidental encoding. The behavioral results showed that memory recognition was better for items rated as pleasant than items rated as unpleasant. The whole brain analysis indicated that successful encoding activates the inferior frontal and lateral temporal cortices, whereas unsuccessful encoding recruits two key medial posterior DMN regions, the posterior cingulate cortex and precuneus. A region of interest analysis including classic DMN areas, revealed significantly greater involvement of the medial Prefrontal Cortex in pleasant compared to unpleasant judgments, suggesting this region’s involvement in self-referential (i.e., internal processing. This area may be responsible for the greater recognition performance seen for pleasant stimuli. Furthermore, a significant interaction between the encoding performance (successful vs. unsuccessful and pleasantness was observed for the posterior cingulate cortex, precuneus and inferior frontal gyrus. Overall, our

  17. Brain Circuits Encoding Reward from Pain Relief.

    Science.gov (United States)

    Navratilova, Edita; Atcherley, Christopher W; Porreca, Frank

    2015-11-01

    Relief from pain in humans is rewarding and pleasurable. Primary rewards, or reward-predictive cues, are encoded in brain reward/motivational circuits. While considerable advances have been made in our understanding of reward circuits underlying positive reinforcement, less is known about the circuits underlying the hedonic and reinforcing actions of pain relief. We review findings from electrophysiological, neuroimaging, and behavioral studies supporting the concept that the rewarding effect of pain relief requires opioid signaling in the anterior cingulate cortex (ACC), activation of midbrain dopamine neurons, and the release of dopamine in the nucleus accumbens (NAc). Understanding of circuits that govern the reward of pain relief may allow the discovery of more effective and satisfying therapies for patients with acute or chronic pain.

  18. Premotor and Motor Cortices Encode Reward.

    Directory of Open Access Journals (Sweden)

    Pavan Ramkumar

    Full Text Available Rewards associated with actions are critical for motivation and learning about the consequences of one's actions on the world. The motor cortices are involved in planning and executing movements, but it is unclear whether they encode reward over and above limb kinematics and dynamics. Here, we report a categorical reward signal in dorsal premotor (PMd and primary motor (M1 neurons that corresponds to an increase in firing rates when a trial was not rewarded regardless of whether or not a reward was expected. We show that this signal is unrelated to error magnitude, reward prediction error, or other task confounds such as reward consumption, return reach plan, or kinematic differences across rewarded and unrewarded trials. The availability of reward information in motor cortex is crucial for theories of reward-based learning and motivational influences on actions.

  19. Radiofrequency encoded angular-resolved light scattering

    DEFF Research Database (Denmark)

    Buckley, Brandon W.; Akbari, Najva; Diebold, Eric D.

    2015-01-01

    The sensitive, specific, and label-free classification of microscopic cells and organisms is one of the outstanding problems in biology. Today, instruments such as the flow cytometer use a combination of light scatter measurements at two distinct angles to infer the size and internal complexity...... of cells at rates of more than 10,000 per second. However, by examining the entire angular light scattering spectrum it is possible to classify cells with higher resolution and specificity. Current approaches to performing these angular spectrum measurements all have significant throughput limitations...... Encoded Angular-resolved Light Scattering (REALS), this technique multiplexes angular light scattering in the radiofrequency domain, such that a single photodetector captures the entire scattering spectrum from a particle over approximately 100 discrete incident angles on a single shot basis. As a proof...

  20. Endogenous opioids encode relative taste preference.

    Science.gov (United States)

    Taha, Sharif A; Norsted, Ebba; Lee, Lillian S; Lang, Penelope D; Lee, Brian S; Woolley, Joshua D; Fields, Howard L

    2006-08-01

    Endogenous opioid signaling contributes to the neural control of food intake. Opioid signaling is thought to regulate palatability, the reward value of a food item as determined by orosensory cues such as taste and texture. The reward value of a food reflects not only these sensory properties but also the relative value of competing food choices. In the present experiment, we used a consummatory contrast paradigm to manipulate the relative value of a sucrose solution for two groups of rats. Systemic injection of the nonspecific opioid antagonist naltrexone suppressed sucrose intake; for both groups, however, this suppression was selective, occurring only for the relatively more valuable sucrose solution. Our results indicate that endogenous opioid signaling contributes to the encoding of relative reward value.

  1. Measurement strategy for spatially encoded photonic qubits

    International Nuclear Information System (INIS)

    Solis-Prosser, M. A.; Neves, L.

    2010-01-01

    We propose a measurement strategy which can, probabilistically, reproduce the statistics of any observable for spatially encoded photonic qubits. It comprises the implementation of a two-outcome positive operator-valued measure followed by a detection in a fixed transverse position, making the displacement of the detection system unnecessary, unlike previous methods. This strategy generalizes a scheme recently demonstrated by one of us and co-workers, restricted to measurement of observables with equatorial eigenvectors only. The method presented here can be implemented with the current technology of programmable multipixel liquid-crystal displays. In addition, it can be straightforwardly extended to high-dimensional qudits and may be a valuable tool in optical implementations of quantum information protocols with spatial qubits and qudits.

  2. MPEG-1 low-cost encoder solution

    Science.gov (United States)

    Grueger, Klaus; Schirrmeister, Frank; Filor, Lutz; von Reventlow, Christian; Schneider, Ulrich; Mueller, Gerriet; Sefzik, Nicolai; Fiedrich, Sven

    1995-02-01

    A solution for real-time compression of digital YCRCB video data to an MPEG-1 video data stream has been developed. As an additional option, motion JPEG and video telephone streams (H.261) can be generated. For MPEG-1, up to two bidirectional predicted images are supported. The required computational power for motion estimation and DCT/IDCT, memory size and memory bandwidth have been the main challenges. The design uses fast-page-mode memory accesses and requires only one single 80 ns EDO-DRAM with 256 X 16 organization for video encoding. This can be achieved only by using adequate access and coding strategies. The architecture consists of an input processing and filter unit, a memory interface, a motion estimation unit, a motion compensation unit, a DCT unit, a quantization control, a VLC unit and a bus interface. For using the available memory bandwidth by the processing tasks, a fixed schedule for memory accesses has been applied, that can be interrupted for asynchronous events. The motion estimation unit implements a highly sophisticated hierarchical search strategy based on block matching. The DCT unit uses a separated fast-DCT flowgraph realized by a switchable hardware unit for both DCT and IDCT operation. By appropriate multiplexing, only one multiplier is required for: DCT, quantization, inverse quantization, and IDCT. The VLC unit generates the video-stream up to the video sequence layer and is directly coupled with an intelligent bus-interface. Thus, the assembly of video, audio and system data can easily be performed by the host computer. Having a relatively low complexity and only small requirements for DRAM circuits, the developed solution can be applied to low-cost encoding products for consumer electronics.

  3. Functional dissociation between regularity encoding and deviance detection along the auditory hierarchy.

    Science.gov (United States)

    Aghamolaei, Maryam; Zarnowiec, Katarzyna; Grimm, Sabine; Escera, Carles

    2016-02-01

    Auditory deviance detection based on regularity encoding appears as one of the basic functional properties of the auditory system. It has traditionally been assessed with the mismatch negativity (MMN) long-latency component of the auditory evoked potential (AEP). Recent studies have found earlier correlates of deviance detection based on regularity encoding. They occur in humans in the first 50 ms after sound onset, at the level of the middle-latency response of the AEP, and parallel findings of stimulus-specific adaptation observed in animal studies. However, the functional relationship between these different levels of regularity encoding and deviance detection along the auditory hierarchy has not yet been clarified. Here we addressed this issue by examining deviant-related responses at different levels of the auditory hierarchy to stimulus changes varying in their degree of deviation regarding the spatial location of a repeated standard stimulus. Auditory stimuli were presented randomly from five loudspeakers at azimuthal angles of 0°, 12°, 24°, 36° and 48° during oddball and reversed-oddball conditions. Middle-latency responses and MMN were measured. Our results revealed that middle-latency responses were sensitive to deviance but not the degree of deviation, whereas the MMN amplitude increased as a function of deviance magnitude. These findings indicated that acoustic regularity can be encoded at the level of the middle-latency response but that it takes a higher step in the auditory hierarchy for deviance magnitude to be encoded, thus providing a functional dissociation between regularity encoding and deviance detection along the auditory hierarchy. © 2015 Federation of European Neuroscience Societies and John Wiley & Sons Ltd.

  4. Rotational error in path integration: encoding and execution errors in angle reproduction.

    Science.gov (United States)

    Chrastil, Elizabeth R; Warren, William H

    2017-06-01

    Path integration is fundamental to human navigation. When a navigator leaves home on a complex outbound path, they are able to keep track of their approximate position and orientation and return to their starting location on a direct homebound path. However, there are several sources of error during path integration. Previous research has focused almost exclusively on encoding error-the error in registering the outbound path in memory. Here, we also consider execution error-the error in the response, such as turning and walking a homebound trajectory. In two experiments conducted in ambulatory virtual environments, we examined the contribution of execution error to the rotational component of path integration using angle reproduction tasks. In the reproduction tasks, participants rotated once and then rotated again to face the original direction, either reproducing the initial turn or turning through the supplementary angle. One outstanding difficulty in disentangling encoding and execution error during a typical angle reproduction task is that as the encoding angle increases, so does the required response angle. In Experiment 1, we dissociated these two variables by asking participants to report each encoding angle using two different responses: by turning to walk on a path parallel to the initial facing direction in the same (reproduction) or opposite (supplementary angle) direction. In Experiment 2, participants reported the encoding angle by turning both rightward and leftward onto a path parallel to the initial facing direction, over a larger range of angles. The results suggest that execution error, not encoding error, is the predominant source of error in angular path integration. These findings also imply that the path integrator uses an intrinsic (action-scaled) rather than an extrinsic (objective) metric.

  5. Mitigating component performance variation

    Science.gov (United States)

    Gara, Alan G.; Sylvester, Steve S.; Eastep, Jonathan M.; Nagappan, Ramkumar; Cantalupo, Christopher M.

    2018-01-09

    Apparatus and methods may provide for characterizing a plurality of similar components of a distributed computing system based on a maximum safe operation level associated with each component and storing characterization data in a database and allocating non-uniform power to each similar component based at least in part on the characterization data in the database to substantially equalize performance of the components.

  6. Modular verification of chemical reaction network encodings via serializability analysis

    Science.gov (United States)

    Lakin, Matthew R.; Stefanovic, Darko; Phillips, Andrew

    2015-01-01

    Chemical reaction networks are a powerful means of specifying the intended behaviour of synthetic biochemical systems. A high-level formal specification, expressed as a chemical reaction network, may be compiled into a lower-level encoding, which can be directly implemented in wet chemistry and may itself be expressed as a chemical reaction network. Here we present conditions under which a lower-level encoding correctly emulates the sequential dynamics of a high-level chemical reaction network. We require that encodings are transactional, such that their execution is divided by a “commit reaction” that irreversibly separates the reactant-consuming phase of the encoding from the product-generating phase. We also impose restrictions on the sharing of species between reaction encodings, based on a notion of “extra tolerance”, which defines species that may be shared between encodings without enabling unwanted reactions. Our notion of correctness is serializability of interleaved reaction encodings, and if all reaction encodings satisfy our correctness properties then we can infer that the global dynamics of the system are correct. This allows us to infer correctness of any system constructed using verified encodings. As an example, we show how this approach may be used to verify two- and four-domain DNA strand displacement encodings of chemical reaction networks, and we generalize our result to the limit where the populations of helper species are unlimited. PMID:27325906

  7. Learning weighted sparse representation of encoded facial normal information for expression-robust 3D face recognition

    KAUST Repository

    Li, Huibin

    2011-10-01

    This paper proposes a novel approach for 3D face recognition by learning weighted sparse representation of encoded facial normal information. To comprehensively describe 3D facial surface, three components, in X, Y, and Z-plane respectively, of normal vector are encoded locally to their corresponding normal pattern histograms. They are finally fed to a sparse representation classifier enhanced by learning based spatial weights. Experimental results achieved on the FRGC v2.0 database prove that the proposed encoded normal information is much more discriminative than original normal information. Moreover, the patch based weights learned using the FRGC v1.0 and Bosphorus datasets also demonstrate the importance of each facial physical component for 3D face recognition. © 2011 IEEE.

  8. One-sided measurement-device-independent quantum key distribution

    Science.gov (United States)

    Cao, Wen-Fei; Zhen, Yi-Zheng; Zheng, Yu-Lin; Li, Li; Chen, Zeng-Bing; Liu, Nai-Le; Chen, Kai

    2018-01-01

    Measurement-device-independent quantum key distribution (MDI-QKD) protocol was proposed to remove all the detector side channel attacks, while its security relies on the trusted encoding systems. Here we propose a one-sided MDI-QKD (1SMDI-QKD) protocol, which enjoys detection loophole-free advantage, and at the same time weakens the state preparation assumption in MDI-QKD. The 1SMDI-QKD can be regarded as a modified MDI-QKD, in which Bob's encoding system is trusted, while Alice's is uncharacterized. For the practical implementation, we also provide a scheme by utilizing coherent light source with an analytical two decoy state estimation method. Simulation with realistic experimental parameters shows that the protocol has a promising performance, and thus can be applied to practical QKD applications.

  9. The University of Canberra quantum key distribution testbed

    International Nuclear Information System (INIS)

    Ganeshkumar, G.; Edwards, P.J.; Cheung, W.N.; Barbopoulos, L.O.; Pham, H.; Hazel, J.C.

    1999-01-01

    Full text: We describe the design, operation and preliminary results obtained from a quantum key distribution (QKD) testbed constructed at the University of Canberra. Quantum cryptographic systems use shared secret keys exchanged in the form of sequences of polarisation coded or phase encoded single photons transmitted over an optical communications channel. Secrecy of this quantum key rests upon fundamental laws of quantum physics: measurements of linear or circular photon polarisation states introduce noise into the conjugate variable and so reveal eavesdropping. In its initial realisation reported here, pulsed light from a 650nm laser diode is attenuated by a factor of 10 6 , plane-polarised and then transmitted through a birefringent liquid crystal modulator (LCM) to a polarisation sensitive single photon receiver. This transmitted key sequence consists of a 1 kHz train of weak coherent 100ns wide light pulses, polarisation coded according to the BB84 protocol. Each pulse is randomly assigned one of four polarisation states (two orthogonal linear and two orthogonal circular) by computer PCA operated by the sender ('Alice'). This quaternary polarisation shift keyed photon stream is detected by the receiver ('Bob') whose computer (PCB) randomly chooses either a linear or a circular polarisation basis. Computer PCB is also used for final key selection, authentication, privacy amplification and eavesdropping. We briefly discuss the realisation of a mesoscopic single photon QKD source and the use of the testbed to simulate a global quantum key distribution system using earth satellites. Copyright (1999) Australian Optical Society

  10. Identifying tier one key suppliers.

    Science.gov (United States)

    Wicks, Steve

    2013-01-01

    In today's global marketplace, businesses are becoming increasingly reliant on suppliers for the provision of key processes, activities, products and services in support of their strategic business goals. The result is that now, more than ever, the failure of a key supplier has potential to damage reputation, productivity, compliance and financial performance seriously. Yet despite this, there is no recognised standard or guidance for identifying a tier one key supplier base and, up to now, there has been little or no research on how to do so effectively. This paper outlines the key findings of a BCI-sponsored research project to investigate good practice in identifying tier one key suppliers, and suggests a scalable framework process model and risk matrix tool to help businesses effectively identify their tier one key supplier base.

  11. Security for Key Management Interfaces

    OpenAIRE

    Kremer , Steve; Steel , Graham; Warinschi , Bogdan

    2011-01-01

    International audience; We propose a much-needed formal definition of security for cryptographic key management APIs. The advantages of our definition are that it is general, intuitive, and applicable to security proofs in both symbolic and computational models of cryptography. Our definition relies on an idealized API which allows only the most essential functions for generating, exporting and importing keys, and takes into account dynamic corruption of keys. Based on this we can define the ...

  12. Probabilistic encoding of stimulus strength in astrocyte global calcium signals.

    Science.gov (United States)

    Croft, Wayne; Reusch, Katharina; Tilunaite, Agne; Russell, Noah A; Thul, Rüdiger; Bellamy, Tomas C

    2016-04-01

    Astrocyte calcium signals can range in size from subcellular microdomains to waves that spread through the whole cell (and into connected cells). The differential roles of such local or global calcium signaling are under intense investigation, but the mechanisms by which local signals evolve into global signals in astrocytes are not well understood, nor are the computational rules by which physiological stimuli are transduced into a global signal. To investigate these questions, we transiently applied receptor agonists linked to calcium signaling to primary cultures of cerebellar astrocytes. Astrocytes repetitively tested with the same stimulus responded with global signals intermittently, indicating that each stimulus had a defined probability for triggering a response. The response probability varied between agonists, increased with agonist concentration, and could be positively and negatively modulated by crosstalk with other signaling pathways. To better understand the processes determining the evolution of a global signal, we recorded subcellular calcium "puffs" throughout the whole cell during stimulation. The key requirement for puffs to trigger a global calcium wave following receptor activation appeared to be the synchronous release of calcium from three or more sites, rather than an increasing calcium load accumulating in the cytosol due to increased puff size, amplitude, or frequency. These results suggest that the concentration of transient stimuli will be encoded into a probability of generating a global calcium response, determined by the likelihood of synchronous release from multiple subcellular sites. © 2015 Wiley Periodicals, Inc.

  13. Quantum key distribution without sending a quantum signal

    International Nuclear Information System (INIS)

    Ralph, T C; Walk, N

    2015-01-01

    Quantum Key Distribution is a quantum communication technique in which random numbers are encoded on quantum systems, usually photons, and sent from one party, Alice, to another, Bob. Using the data sent via the quantum signals, supplemented by classical communication, it is possible for Alice and Bob to share an unconditionally secure secret key. This is not possible if only classical signals are sent. While this last statement is a long standing result from quantum information theory it turns out only to be true in a non-relativistic setting. If relativistic quantum field theory is considered we show it is possible to distribute an unconditionally secure secret key without sending a quantum signal, instead harnessing the intrinsic entanglement between different regions of space–time. The protocol is practical in free space given horizon technology and might be testable in principle in the near term using microwave technology. (paper)

  14. Public key infrastructure for DOE security research

    Energy Technology Data Exchange (ETDEWEB)

    Aiken, R.; Foster, I.; Johnston, W.E. [and others

    1997-06-01

    This document summarizes the Department of Energy`s Second Joint Energy Research/Defence Programs Security Research Workshop. The workshop, built on the results of the first Joint Workshop which reviewed security requirements represented in a range of mission-critical ER and DP applications, discussed commonalties and differences in ER/DP requirements and approaches, and identified an integrated common set of security research priorities. One significant conclusion of the first workshop was that progress in a broad spectrum of DOE-relevant security problems and applications could best be addressed through public-key cryptography based systems, and therefore depended upon the existence of a robust, broadly deployed public-key infrastructure. Hence, public-key infrastructure ({open_quotes}PKI{close_quotes}) was adopted as a primary focus for the second workshop. The Second Joint Workshop covered a range of DOE security research and deployment efforts, as well as summaries of the state of the art in various areas relating to public-key technologies. Key findings were that a broad range of DOE applications can benefit from security architectures and technologies built on a robust, flexible, widely deployed public-key infrastructure; that there exists a collection of specific requirements for missing or undeveloped PKI functionality, together with a preliminary assessment of how these requirements can be met; that, while commercial developments can be expected to provide many relevant security technologies, there are important capabilities that commercial developments will not address, due to the unique scale, performance, diversity, distributed nature, and sensitivity of DOE applications; that DOE should encourage and support research activities intended to increase understanding of security technology requirements, and to develop critical components not forthcoming from other sources in a timely manner.

  15. What makes deeply encoded items memorable? Insights into the levels of processing framework from neuroimaging and neuromodulation

    Directory of Open Access Journals (Sweden)

    Giulia eGalli

    2014-05-01

    Full Text Available When we form new memories, their mnestic fate largely depends upon the cognitive operations set in train during encoding. A typical observation in experimental as well as everyday life settings is that if we learn an item using semantic or deep operations, such as attending to its meaning, memory will be better than if we learn the same item using more shallow operations, such as attending to its structural features. In the psychological literature, this phenomenon has been conceptualised within the levels of processing framework and has been consistently replicated since its original proposal by Craik and Lockhart in 1972. However, the exact mechanisms underlying the memory advantage for deeply encoded items are not yet entirely understood. A cognitive neuroscience perspective can add to this field by clarifying the nature of the processes involved in effective deep and shallow encoding and how they are instantiated in the brain, but so far there has been little work to systematically integrate findings from the literature. This work aims to fill this gap by reviewing, first, some of the key neuroimaging findings on the neural correlates of deep and shallow episodic encoding and second, emerging evidence from studies using neuromodulatory approaches such as psychopharmacology and non invasive brain stimulation. Taken together, these studies help further our understanding of levels of processing. In addition, by showing that deep encoding can be modulated by acting upon specific brain regions or systems, the reviewed studies pave the way for selective enhancements of episodic encoding processes

  16. What makes deeply encoded items memorable? Insights into the levels of processing framework from neuroimaging and neuromodulation.

    Science.gov (United States)

    Galli, Giulia

    2014-01-01

    When we form new memories, their mnestic fate largely depends upon the cognitive operations set in train during encoding. A typical observation in experimental as well as everyday life settings is that if we learn an item using semantic or "deep" operations, such as attending to its meaning, memory will be better than if we learn the same item using more "shallow" operations, such as attending to its structural features. In the psychological literature, this phenomenon has been conceptualized within the "levels of processing" framework and has been consistently replicated since its original proposal by Craik and Lockhart in 1972. However, the exact mechanisms underlying the memory advantage for deeply encoded items are not yet entirely understood. A cognitive neuroscience perspective can add to this field by clarifying the nature of the processes involved in effective deep and shallow encoding and how they are instantiated in the brain, but so far there has been little work to systematically integrate findings from the literature. This work aims to fill this gap by reviewing, first, some of the key neuroimaging findings on the neural correlates of deep and shallow episodic encoding and second, emerging evidence from studies using neuromodulatory approaches such as psychopharmacology and non-invasive brain stimulation. Taken together, these studies help further our understanding of levels of processing. In addition, by showing that deep encoding can be modulated by acting upon specific brain regions or systems, the reviewed studies pave the way for selective enhancements of episodic encoding processes.

  17. Interactions among emotional attention, encoding, and retrieval of ambiguous information: An eye-tracking study.

    Science.gov (United States)

    Everaert, Jonas; Koster, Ernst H W

    2015-10-01

    Emotional biases in attention modulate encoding of emotional material into long-term memory, but little is known about the role of such attentional biases during emotional memory retrieval. The present study investigated how emotional biases in memory are related to attentional allocation during retrieval. Forty-nine individuals encoded emotionally positive and negative meanings derived from ambiguous information and then searched their memory for encoded meanings in response to a set of retrieval cues. The remember/know/new procedure was used to classify memories as recollection-based or familiarity-based, and gaze behavior was monitored throughout the task to measure attentional allocation. We found that a bias in sustained attention during recollection-based, but not familiarity-based, retrieval predicted subsequent memory bias toward positive versus negative material following encoding. Thus, during emotional memory retrieval, attention affects controlled forms of retrieval (i.e., recollection) but does not modulate relatively automatic, familiarity-based retrieval. These findings enhance understanding of how distinct components of attention regulate the emotional content of memories. Implications for theoretical models and emotion regulation are discussed. (c) 2015 APA, all rights reserved).

  18. The influence of encoding intention on electrophysiological indices of recognition memory.

    Science.gov (United States)

    van Hooff, Johanna Catharina

    2005-04-01

    The main aim of this study was to further specify the encoding and retrieval conditions that determine the success of an ERP-based memory assessment procedure, originally derived from lie detection studies. We examined whether event-related brain potentials (ERPs) recorded during successful and unsuccessful retrieval would vary according to intentional (study) and incidental (repetition) encoding conditions. Participants (N=20) were asked to indicate recognition of previously studied words (learned targets, p=0.2) and words that were used as distractors in a preceding recognition task (repeated targets, p=0.2). Words that were recognised elicited a P3 component, which was largely absent for new words and words that failed to be recognised. Encoding intention was found to increase the P3 amplitude slightly but had no influence on P3 scalp distribution, suggesting that the differently encoded targets were similarly processed during retrieval but to a different extent. The amplitude difference was explained in terms of variance in memory trace strength and decision confidence. With respect to negative findings for repeated items in our earlier study (Van Hooff, J.C., Golden, S. 2002. Validation of an event-related potential memory assessment procedure: Intentional learning as opposed to simple repetition. J. Psychophysiol., 16, 12-22.), it was suggested that the instruction to actively retrieve the repeated words was essential for obtaining reliable indications of the presence or absence of weak memory traces.

  19. Interaction between attentional systems and episodic memory encoding: the impact of conflict on binding of information.

    Science.gov (United States)

    Sperduti, Marco; Armougum, Allan; Makowski, Dominique; Blondé, Philippe; Piolino, Pascale

    2017-12-01

    Episodic memory (EM) is defined as a long-term memory system that stores information that can be retrieved along with details of the context of the original events (binding). Several studies have shown that manipulation of attention during encoding can impact subsequent memory performance. An influential model of attention distinguishes between three partially independent attentional networks: the alerting, the orienting and the executive or conflict resolution component. To date, the impact of the engagement of these sub-systems during encoding on item and relational context binding has not been investigated. Here, we developed a new task combining the Attentional Network Test and an incidental episodic memory encoding task to study this issue. We reported that when the alerting network was not solicited, resolving conflict hindered item encoding. Moreover, resolving conflict, independently of the cueing condition, had a negative impact on context binding. These novel findings could have a potential impact in the understanding EM formation, and memory disorders in different populations, including healthy elderly people.

  20. The effect of structural design parameters on FPGA-based feed-forward space-time trellis coding-orthogonal frequency division multiplexing channel encoders

    Science.gov (United States)

    Passas, Georgios; Freear, Steven; Fawcett, Darren

    2010-08-01

    Orthogonal frequency division multiplexing (OFDM)-based feed-forward space-time trellis code (FFSTTC) encoders can be synthesised as very high speed integrated circuit hardware description language (VHDL) designs. Evaluation of their FPGA implementation can lead to conclusions that help a designer to decide the optimum implementation, given the encoder structural parameters. VLSI architectures based on 1-bit multipliers and look-up tables (LUTs) are compared in terms of FPGA slices and block RAMs (area), as well as in terms of minimum clock period (speed). Area and speed graphs versus encoder memory order are provided for quadrature phase shift keying (QPSK) and 8 phase shift keying (8-PSK) modulation and two transmit antennas, revealing best implementation under these conditions. The effect of number of modulation bits and transmit antennas on the encoder implementation complexity is also investigated.

  1. Source-constrained retrieval influences the encoding of new information.

    Science.gov (United States)

    Danckert, Stacey L; MacLeod, Colin M; Fernandes, Myra A

    2011-11-01

    Jacoby, Shimizu, Daniels, and Rhodes (Psychonomic Bulletin & Review, 12, 852-857, 2005) showed that new words presented as foils among a list of old words that had been deeply encoded were themselves subsequently better recognized than new words presented as foils among a list of old words that had been shallowly encoded. In Experiment 1, by substituting a deep-versus-shallow imagery manipulation for the levels-of-processing manipulation, we demonstrated that the effect is robust and that it generalizes, also occurring with a different type of encoding. In Experiment 2, we provided more direct evidence for context-related encoding during tests of deeply encoded words, showing enhanced priming for foils presented among deeply encoded targets when participants made the same deep-encoding judgments on those items as had been made on the targets during study. In Experiment 3, we established that the findings from Experiment 2 are restricted to this specific deep judgment task and are not a general consequence of these foils being associated with deeply encoded items. These findings provide support for the source-constrained retrieval hypothesis of Jacoby, Shimizu, Daniels, and Rhodes: New information can be influenced by how surrounding items are encoded and retrieved, as long as the surrounding items recruit a coherent mode of processing.

  2. Exploring the influence of encoding format on subsequent memory.

    Science.gov (United States)

    Turney, Indira C; Dennis, Nancy A; Maillet, David; Rajah, M Natasha

    2017-05-01

    Distinctive encoding is greatly influenced by gist-based processes and has been shown to suffer when highly similar items are presented in close succession. Thus, elucidating the mechanisms underlying how presentation format affects gist processing is essential in determining the factors that influence these encoding processes. The current study utilised multivariate partial least squares (PLS) analysis to identify encoding networks directly associated with retrieval performance in a blocked and intermixed presentation condition. Subsequent memory analysis for successfully encoded items indicated no significant differences between reaction time and retrieval performance and presentation format. Despite no significant behavioural differences, behaviour PLS revealed differences in brain-behaviour correlations and mean condition activity in brain regions associated with gist-based vs. distinctive encoding. Specifically, the intermixed format encouraged more distinctive encoding, showing increased activation of regions associated with strategy use and visual processing (e.g., frontal and visual cortices, respectively). Alternatively, the blocked format exhibited increased gist-based processes, accompanied by increased activity in the right inferior frontal gyrus. Together, results suggest that the sequence that information is presented during encoding affects the degree to which distinctive encoding is engaged. These findings extend our understanding of the Fuzzy Trace Theory and the role of presentation format on encoding processes.

  3. From rapid place learning to behavioral performance: a key role for the intermediate hippocampus.

    Directory of Open Access Journals (Sweden)

    Tobias Bast

    2009-04-01

    Full Text Available Rapid place encoding by hippocampal neurons, as reflected by place-related firing, has been intensely studied, whereas the substrates that translate hippocampal place codes into behavior have received little attention. A key point relevant to this translation is that hippocampal organization is characterized by functional-anatomical gradients along the septotemporal axis: Whereas the ability of hippocampal neurons to encode accurate place information declines from the septal to temporal end, hippocampal connectivity to prefrontal and subcortical sites that might relate such place information to behavioral-control processes shows an opposite gradient. We examined in rats the impact of selective lesions to relevant parts of the hippocampus on behavioral tests requiring place learning (watermaze procedures and on in vivo electrophysiological models of hippocampal encoding (long-term potentiation [LTP], place cells. We found that the intermediate hippocampus is necessary and largely sufficient for behavioral performance based on rapid place learning. In contrast, a residual septal pole of the hippocampus, although displaying intact electrophysiological indices of rapid information encoding (LTP, precise place-related firing, and rapid remapping, failed to sustain watermaze performance based on rapid place learning. These data highlight the important distinction between hippocampal encoding and the behavioral performance based on such encoding, and suggest that the intermediate hippocampus, where substrates of rapid accurate place encoding converge with links to behavioral control, is critical to translate rapid (one-trial place learning into navigational performance.

  4. Model plant Key Measurement Points

    International Nuclear Information System (INIS)

    Schneider, R.A.

    1984-01-01

    For IAEA safeguards a Key Measurement Point is defined as the location where nuclear material appears in such a form that it may be measured to determine material flow or inventory. This presentation describes in an introductory manner the key measurement points and associated measurements for the model plant used in this training course

  5. Breaking chaotic shift key communication via adaptive key identification

    International Nuclear Information System (INIS)

    Ren Haipeng; Han Chongzhao; Liu Ding

    2008-01-01

    This paper proposes an adaptive parameter identification method for breaking chaotic shift key communication from the transmitted signal in public channel. The sensitive dependence property of chaos on parameter mismatch is used for chaos adaptive synchronization and parameter identification. An index function about the synchronization error is defined and conjugate gradient method is used to minimize the index function and to search the transmitter's parameter (key). By using proposed method, secure key is recovered from transmitted signal generated by low dimensional chaos and hyper chaos switching communication. Multi-parameters can also be identified from the transmitted signal with noise

  6. Temporal encoding in a nervous system.

    Directory of Open Access Journals (Sweden)

    Zane N Aldworth

    2011-05-01

    Full Text Available We examined the extent to which temporal encoding may be implemented by single neurons in the cercal sensory system of the house cricket Acheta domesticus. We found that these neurons exhibit a greater-than-expected coding capacity, due in part to an increased precision in brief patterns of action potentials. We developed linear and non-linear models for decoding the activity of these neurons. We found that the stimuli associated with short-interval patterns of spikes (ISIs of 8 ms or less could be predicted better by second-order models as compared to linear models. Finally, we characterized the difference between these linear and second-order models in a low-dimensional subspace, and showed that modification of the linear models along only a few dimensions improved their predictive power to parity with the second order models. Together these results show that single neurons are capable of using temporal patterns of spikes as fundamental symbols in their neural code, and that they communicate specific stimulus distributions to subsequent neural structures.

  7. Peafowl antipredator calls encode information about signalers.

    Science.gov (United States)

    Yorzinski, Jessica L

    2014-02-01

    Animals emit vocalizations that convey information about external events. Many of these vocalizations, including those emitted in response to predators, also encode information about the individual that produced the call. The relationship between acoustic features of antipredator calls and information relating to signalers (including sex, identity, body size, and social rank) were examined in peafowl (Pavo cristatus). The "bu-girk" antipredator calls of male and female peafowl were recorded and 20 acoustic parameters were automatically extracted from each call. Both the bu and girk elements of the antipredator call were individually distinctive and calls were classified to the correct signaler with over 90% and 70% accuracy in females and males, respectively. Females produced calls with a higher fundamental frequency (F0) than males. In both females and males, body size was negatively correlated with F0. In addition, peahen rank was related to the duration, end mean frequency, and start harmonicity of the bu element. Peafowl antipredator calls contain detailed information about the signaler and can potentially be used by receivers to respond to dangerous situations.

  8. Dynamical encoding of looming, receding, and focussing

    Science.gov (United States)

    Longtin, Andre; Clarke, Stephen Elisha; Maler, Leonard; CenterNeural Dynamics Collaboration

    This talk will discuss a non-conventional neural coding task that may apply more broadly to many senses in higher vertebrates. We ask whether and how a non-visual sensory system can focus on an object. We present recent experimental and modeling work that shows how the early sensory circuitry of electric sense can perform such neuronal focusing that is manifested behaviorally. This sense is the main one used by weakly electric fish to navigate, locate prey and communicate in the murky waters of their natural habitat. We show that there is a distance at which the Fisher information of a neuron's response to a looming and receding object is maximized, and that this distance corresponds to a behaviorally relevant one chosen by these animals. Strikingly, this maximum occurs at a bifurcation between tonic firing and bursting. We further discuss how the invariance of this distance to signal attributes can arise, a process that first involves power-law spike frequency adaptation. The talk will also highlight the importance of expanding the classic dual neural encoding of contrast using ON and OFF cells in the context of looming and receding stimuli. The authors acknowledge support from CIHR and NSERC.

  9. Reusable Component Services

    Data.gov (United States)

    U.S. Environmental Protection Agency — The Reusable Component Services (RCS) is a super-catalog of components, services, solutions and technologies that facilitates search, discovery and collaboration in...

  10. Hiding a Covert Digital Image by Assembling the RSA Encryption Method and the Binary Encoding Method

    Directory of Open Access Journals (Sweden)

    Kuang Tsan Lin

    2014-01-01

    Full Text Available The Rivest-Shamir-Adleman (RSA encryption method and the binary encoding method are assembled to form a hybrid hiding method to hide a covert digital image into a dot-matrix holographic image. First, the RSA encryption method is used to transform the covert image to form a RSA encryption data string. Then, all the elements of the RSA encryption data string are transferred into binary data. Finally, the binary data are encoded into the dot-matrix holographic image. The pixels of the dot-matrix holographic image contain seven groups of codes used for reconstructing the covert image. The seven groups of codes are identification codes, covert-image dimension codes, covert-image graylevel codes, pre-RSA bit number codes, RSA key codes, post-RSA bit number codes, and information codes. The reconstructed covert image derived from the dot-matrix holographic image and the original covert image are exactly the same.

  11. Improved magnetic encoding device and method for making the same. [Patent application

    Science.gov (United States)

    Fox, R.J.

    A magnetic encoding device and method for making the same are provided for use as magnetic storage media in identification control applications that give output signals from a reader that are of shorter duration and substantially greater magnitude than those of the prior art. Magnetic encoding elements are produced by uniformly bending wire or strip stock of a magnetic material longitudinally about a common radius to exceed the elastic limit of the material and subsequently mounting the material so that it is restrained in an unbent position on a substrate of nonmagnetic material. The elements are spot weld attached to a substrate to form a binary coded array of elements according to a desired binary code. The coded substrate may be enclosed in a plastic laminate structure. Such devices may be used for security badges, key cards, and the like and may have many other applications. 7 figures.

  12. Beyond initial encoding: Measures of the post-encoding status of memory traces predict long-term recall in infancy

    OpenAIRE

    Pathman, Thanujeni; Bauer, Patricia J.

    2012-01-01

    The first years of life are witness to rapid changes in long-term recall ability. In the present research, we contributed to explanation of the changes by testing the absolute and relative contributions to long-term recall of encoding and post-encoding processes. Using elicited imitation, we sampled the status of 16-, 20-, and 24-month-old infants’ memory representations at various time points after experience of events. In Experiment 1, infants were tested immediately, 1 week after encoding,...

  13. Software component quality evaluation

    Science.gov (United States)

    Clough, A. J.

    1991-01-01

    The paper describes a software inspection process that can be used to evaluate the quality of software components. Quality criteria, process application, independent testing of the process and proposed associated tool support are covered. Early results indicate that this technique is well suited for assessing software component quality in a standardized fashion. With automated machine assistance to facilitate both the evaluation and selection of software components, such a technique should promote effective reuse of software components.

  14. A Distributed Shared Key Generation Procedure Using Fractional Keys

    National Research Council Canada - National Science Library

    Poovendran, Radha; Corson, M. S; Baras, J. S

    1998-01-01

    We present a new class of distributed key generation and recovery algorithms suitable for group communication systems where the group membership is either static or slowly time-varying, and must be tightly controlled...

  15. Reactor component automatic grapple

    International Nuclear Information System (INIS)

    Greenaway, P.R.

    1982-01-01

    A grapple for handling nuclear reactor components in a medium such as liquid sodium which, upon proper seating and alignment of the grapple with the component as sensed by a mechanical logic integral to the grapple, automatically seizes the component. The mechanical logic system also precludes seizure in the absence of proper seating and alignment. (author)

  16. Repurposing learning object components

    NARCIS (Netherlands)

    Verbert, K.; Jovanovic, J.; Gasevic, D.; Duval, E.; Meersman, R.

    2005-01-01

    This paper presents an ontology-based framework for repurposing learning object components. Unlike the usual practice where learning object components are assembled manually, the proposed framework enables on-the-fly access and repurposing of learning object components. The framework supports two

  17. WE-DE-206-03: MRI Image Formation - Slice Selection, Phase Encoding, Frequency Encoding, K-Space, SNR

    International Nuclear Information System (INIS)

    Lin, C.

    2016-01-01

    Magnetic resonance imaging (MRI) has become an essential part of clinical imaging due to its ability to render high soft tissue contrast. Instead of ionizing radiation, MRI use strong magnetic field, radio frequency waves and field gradients to create diagnostic useful images. It can be used to image the anatomy and also functional and physiological activities within the human body. Knowledge of the basic physical principles underlying MRI acquisition is vitally important to successful image production and proper image interpretation. This lecture will give an overview of the spin physics, imaging principle of MRI, the hardware of the MRI scanner, and various pulse sequences and their applications. It aims to provide a conceptual foundation to understand the image formation process of a clinical MRI scanner. Learning Objectives: Understand the origin of the MR signal and contrast from the spin physics level. Understand the main hardware components of a MRI scanner and their purposes Understand steps for MR image formation including spatial encoding and image reconstruction Understand the main kinds of MR pulse sequences and their characteristics.

  18. WE-DE-206-03: MRI Image Formation - Slice Selection, Phase Encoding, Frequency Encoding, K-Space, SNR

    Energy Technology Data Exchange (ETDEWEB)

    Lin, C. [Indiana University School of Medicine (United States)

    2016-06-15

    Magnetic resonance imaging (MRI) has become an essential part of clinical imaging due to its ability to render high soft tissue contrast. Instead of ionizing radiation, MRI use strong magnetic field, radio frequency waves and field gradients to create diagnostic useful images. It can be used to image the anatomy and also functional and physiological activities within the human body. Knowledge of the basic physical principles underlying MRI acquisition is vitally important to successful image production and proper image interpretation. This lecture will give an overview of the spin physics, imaging principle of MRI, the hardware of the MRI scanner, and various pulse sequences and their applications. It aims to provide a conceptual foundation to understand the image formation process of a clinical MRI scanner. Learning Objectives: Understand the origin of the MR signal and contrast from the spin physics level. Understand the main hardware components of a MRI scanner and their purposes Understand steps for MR image formation including spatial encoding and image reconstruction Understand the main kinds of MR pulse sequences and their characteristics.

  19. Stress as a mnemonic filter: Interactions between medial temporal lobe encoding processes and post-encoding stress.

    Science.gov (United States)

    Ritchey, Maureen; McCullough, Andrew M; Ranganath, Charan; Yonelinas, Andrew P

    2017-01-01

    Acute stress has been shown to modulate memory for recently learned information, an effect attributed to the influence of stress hormones on medial temporal lobe (MTL) consolidation processes. However, little is known about which memories will be affected when stress follows encoding. One possibility is that stress interacts with encoding processes to selectively protect memories that had elicited responses in the hippocampus and amygdala, two MTL structures important for memory formation. There is limited evidence for interactions between encoding processes and consolidation effects in humans, but recent studies of consolidation in rodents have emphasized the importance of encoding "tags" for determining the impact of consolidation manipulations on memory. Here, we used functional magnetic resonance imaging in humans to test the hypothesis that the effects of post-encoding stress depend on MTL processes observed during encoding. We found that changes in stress hormone levels were associated with an increase in the contingency of memory outcomes on hippocampal and amygdala encoding responses. That is, for participants showing high cortisol reactivity, memories became more dependent on MTL activity observed during encoding, thereby shifting the distribution of recollected events toward those that had elicited relatively high activation. Surprisingly, this effect was generally larger for neutral, compared to emotionally negative, memories. The results suggest that stress does not uniformly enhance memory, but instead selectively preserves memories tagged during encoding, effectively acting as mnemonic filter. © 2016 Wiley Periodicals, Inc. © 2016 Wiley Periodicals, Inc.

  20. Key parameters controlling radiology departments

    International Nuclear Information System (INIS)

    Busch, Hans-Peter

    2011-01-01

    For radiology departments and outstanding practises control and optimization of processes demand an efficient management based on key data. Systems of key data deliver indicators for control of medical quality, service quality and economics. For practices effectiveness (productivity), for hospitals effectiveness and efficiency are in the focus of economical optimization strategies. Task of daily key data is continuous monitoring of activities and workflow, task of weekly/monthly key data is control of data quality, process quality and achievement of objectives, task of yearly key data is determination of long term strategies (marketing) and comparison with competitors (benchmarking). Key parameters have to be defined clearly and have to be available directly. For generation, evaluation and control of key parameters suitable forms of organization and processes are necessary. Strategies for the future will be directed more to the total processes of treatment. To think in total processes and to steer and optimize with suitable parameters is the challenge for participants in the healthcare market of the future. (orig.)

  1. High power RF transmission line component development

    International Nuclear Information System (INIS)

    Hong, B. G.; Hwang, C. K.; Bae, Y. D.; Yoon, J. S.; Wang, S. J.; Gu, S. H.; Yang, J. R.; Hahm, Y. S.; Oh, G. S.; Lee, J. R.; Lee, W. I.; Park, S. H.; Kang, M. S.; Oh, S. H.; Lee, W.I.

    1999-12-01

    We developed the liquid stub and phase shifter which are the key high RF power transmission line components. They show reliable operation characteristics and increased insulation capability, and reduced the size by using liquid (silicon oil, dielectric constant ε=2.72) instead of gas for insulating dielectric material. They do not have finger stock for the electric contact so the local temperature rise due to irregular contact and RF breakdown due to scratch in conductor are prevented. They can be utilized in broadcasting, radar facility which require high RF power transmission. Moreover, they are key components in RF heating system for fusion reactor. (author)

  2. High power RF transmission line component development

    Energy Technology Data Exchange (ETDEWEB)

    Hong, B. G.; Hwang, C. K.; Bae, Y. D.; Yoon, J. S.; Wang, S. J.; Gu, S. H.; Yang, J. R.; Hahm, Y. S.; Oh, G. S.; Lee, J. R.; Lee, W. I.; Park, S. H.; Kang, M. S.; Oh, S. H.; Lee, W.I

    1999-12-01

    We developed the liquid stub and phase shifter which are the key high RF power transmission line components. They show reliable operation characteristics and increased insulation capability, and reduced the size by using liquid (silicon oil, dielectric constant {epsilon}=2.72) instead of gas for insulating dielectric material. They do not have finger stock for the electric contact so the local temperature rise due to irregular contact and RF breakdown due to scratch in conductor are prevented. They can be utilized in broadcasting, radar facility which require high RF power transmission. Moreover, they are key components in RF heating system for fusion reactor. (author)

  3. Cortical encoding of timbre changes in cochlear implant users.

    Science.gov (United States)

    Zhang, Fawen; Benson, Chelsea; Cahn, Steven J

    2013-01-01

    Most cochlear implant (CI) users describe music as a noise-like and unpleasant sound. Using behavioral tests, most prior studies have shown that perception of pitch-based melody and timbre is poor in CI users. This article will focus on cortical encoding of timbre changes in CI users, which may allow us to find solutions to further improve CI benefits. Furthermore, the value of using objective measures to reveal neural encoding of timbre changes may be reflected in this study. A case-control study of the mismatch negativity (MMN) using electrophysiological technique was conducted. To derive MMNs, three randomly arranged oddball paradigms consisting of standard/deviant instrumental pairs: saxophone/piano, cello/trombone, and flute/French horn, respectively, were presented. Ten CI users and ten normal-hearing (NH) listeners participated in this study. After filtering, epoching, and baseline correction, independent component analysis (ICA) was performed to remove artifacts. The averaged waveforms in response to the standard stimuli (STANDARD waveform) and the deviant stimuli (DEVIANT waveform) in each condition were separately derived. The responses from nine electrodes in the fronto-central area were averaged to form one waveform. The STANDARD waveform was subtracted from the DEVIANT waveform to derive the difference waveform, for which the MMN was judged to be present or absent. The measures used to evaluate the MMN included the MMN peak latency and amplitude as well as MMN duration. The MMN, which reflects the ability to automatically detect acoustic changes, was present in all NH listeners but only approximately half of CI users. In CI users with present MMNs, the MMN peak amplitude and duration were significantly smaller and shorter compared to those in NH listeners. Our electrophysiological results were consistent with prior behavioral results that CI users' performance in timbre perception was significantly poorer than that in NH listeners. Our results may

  4. Encoding negative events under stress: high subjective arousal is related to accurate emotional memory despite misinformation exposure.

    Science.gov (United States)

    Hoscheidt, Siobhan M; LaBar, Kevin S; Ryan, Lee; Jacobs, W Jake; Nadel, Lynn

    2014-07-01

    Stress at encoding affects memory processes, typically enhancing, or preserving, memory for emotional information. These effects have interesting implications for eyewitness accounts, which in real-world contexts typically involve encoding an aversive event under stressful conditions followed by potential exposure to misinformation. The present study investigated memory for a negative event encoded under stress and subsequent misinformation endorsement. Healthy young adults participated in a between-groups design with three experimental sessions conducted 48 h apart. Session one consisted of a psychosocial stress induction (or control task) followed by incidental encoding of a negative slideshow. During session two, participants were asked questions about the slideshow, during which a random subgroup was exposed to misinformation. Memory for the slideshow was tested during the third session. Assessment of memory accuracy across stress and no-stress groups revealed that stress induced just prior to encoding led to significantly better memory for the slideshow overall. The classic misinformation effect was also observed - participants exposed to misinformation were significantly more likely to endorse false information during memory testing. In the stress group, however, memory accuracy and misinformation effects were moderated by arousal experienced during encoding of the negative event. Misinformed-stress group participants who reported that the negative slideshow elicited high arousal during encoding were less likely to endorse misinformation for the most aversive phase of the story. Furthermore, these individuals showed better memory for components of the aversive slideshow phase that had been directly misinformed. Results from the current study provide evidence that stress and high subjective arousal elicited by a negative event act concomitantly during encoding to enhance emotional memory such that the most aversive aspects of the event are well remembered and

  5. Effect of phase-encoding direction on group analysis of resting-state functional magnetic resonance imaging.

    Science.gov (United States)

    Mori, Yasuo; Miyata, Jun; Isobe, Masanori; Son, Shuraku; Yoshihara, Yujiro; Aso, Toshihiko; Kouchiyama, Takanori; Murai, Toshiya; Takahashi, Hidehiko

    2018-05-17

    Echo-planar imaging is a common technique used in functional magnetic resonance imaging (fMRI), however it suffers from image distortion and signal loss because of large susceptibility effects that are related to the phase-encoding direction of the scan. Despite this relationship, the majority of neuroimaging studies have not considered the influence of phase-encoding direction. Here, we aimed to clarify how phase-encoding direction can affect the outcome of an fMRI connectivity study of schizophrenia. Resting-state fMRI using anterior to posterior (A-P) and posterior to anterior (P-A) directions was used to examine 25 patients with schizophrenia (SC) and 37 matched healthy controls (HC). We conducted a functional connectivity analysis using independent component analysis and performed three group comparisons: A-P vs. P-A (all participants), SC vs. HC for the A-P and P-A datasets, and the interaction between phase-encoding direction and participant group. The estimated functional connectivity differed between the two phase-encoding directions in areas that were more extensive than those where signal loss has been reported. Although functional connectivity in the SC group was lower than that in the HC group for both directions, the A-P and P-A conditions did not exhibit the same specific pattern of differences. Further, we observed an interaction between participant group and the phase-encoding direction in the left temporo-parietal junction and left fusiform gyrus. Phase-encoding direction can influence the results of functional connectivity studies. Thus, appropriate selection and documentation of phase-encoding direction will be important in future resting-state fMRI studies. This article is protected by copyright. All rights reserved. This article is protected by copyright. All rights reserved.

  6. Olfactory bulb encoding during learning under anaesthesia

    Directory of Open Access Journals (Sweden)

    Alister U Nicol

    2014-06-01

    Full Text Available Neural plasticity changes within the olfactory bulb are important for olfactory learning, although how neural encoding changes support new associations with specific odours and whether they can be investigated under anaesthesia, remain unclear. Using the social transmission of food preference olfactory learning paradigm in mice in conjunction with in vivo microdialysis sampling we have shown firstly that a learned preference for a scented food odour smelled on the breath of a demonstrator animal occurs under isofluorane anaesthesia. Furthermore, subsequent exposure to this cued odour under anaesthesia promotes the same pattern of increased release of glutamate and GABA in the olfactory bulb as previously found in conscious animals following olfactory learning, and evoked GABA release was positively correlated with the amount of scented food eaten. In a second experiment, multiarray (24 electrodes electrophysiological recordings were made from olfactory bulb mitral cells under isofluorane anaesthesia before, during and after a novel scented food odour was paired with carbon disulfide. Results showed significant increases in overall firing frequency to the cued-odour during and after learning and decreases in response to an uncued odour. Analysis of patterns of changes in individual neurons revealed that a substantial proportion (>50% of them significantly changed their response profiles during and after learning with most of those previously inhibited becoming excited. A large number of cells exhibiting no response to the odours prior to learning were either excited or inhibited afterwards. With the uncued odour many previously responsive cells became unresponsive or inhibited. Learning associated changes only occurred in the posterior part of the olfactory bulb. Thus olfactory learning under anaesthesia promotes extensive, but spatially distinct, changes in mitral cell networks to both cued and uncued odours as well as in evoked glutamate and

  7. Encoding and Decoding Models in Cognitive Electrophysiology

    Directory of Open Access Journals (Sweden)

    Christopher R. Holdgraf

    2017-09-01

    Full Text Available Cognitive neuroscience has seen rapid growth in the size and complexity of data recorded from the human brain as well as in the computational tools available to analyze this data. This data explosion has resulted in an increased use of multivariate, model-based methods for asking neuroscience questions, allowing scientists to investigate multiple hypotheses with a single dataset, to use complex, time-varying stimuli, and to study the human brain under more naturalistic conditions. These tools come in the form of “Encoding” models, in which stimulus features are used to model brain activity, and “Decoding” models, in which neural features are used to generated a stimulus output. Here we review the current state of encoding and decoding models in cognitive electrophysiology and provide a practical guide toward conducting experiments and analyses in this emerging field. Our examples focus on using linear models in the study of human language and audition. We show how to calculate auditory receptive fields from natural sounds as well as how to decode neural recordings to predict speech. The paper aims to be a useful tutorial to these approaches, and a practical introduction to using machine learning and applied statistics to build models of neural activity. The data analytic approaches we discuss may also be applied to other sensory modalities, motor systems, and cognitive systems, and we cover some examples in these areas. In addition, a collection of Jupyter notebooks is publicly available as a complement to the material covered in this paper, providing code examples and tutorials for predictive modeling in python. The aim is to provide a practical understanding of predictive modeling of human brain data and to propose best-practices in conducting these analyses.

  8. Stereoscopic radiographic images with gamma source encoding

    International Nuclear Information System (INIS)

    Strocovsky, S.G.; Otero, D

    2012-01-01

    Conventional radiography with X-ray tube has several drawbacks, as the compromise between the size of the focal spot and the fluence. The finite dimensions of the focal spot impose a limit to the spatial resolution. Gamma radiography uses gamma-ray sources which surpass in size, portability and simplicity to X-ray tubes. However, its low intrinsic fluence forces to use extended sources that also degrade the spatial resolution. In this work, we show the principles of a new radiographic technique that overcomes the limitations associated with the finite dimensions of X-ray sources, and that offers additional benefits to conventional techniques. The new technique called coding source imaging (CSI), is based on the use of extended sources, edge-encoding of radiation and differential detection. The mathematical principles and the method of images reconstruction with the new proposed technique are explained in the present work. Analytical calculations were made to determine the maximum spatial resolution and the variables on which it depends. The CSI technique was tested by means of Monte Carlo simulations with sets of spherical objects. We show that CSI has stereoscopic capabilities and it can resolve objects smaller than the source size. The CSI decoding algorithm reconstructs simultaneously four different projections from the same object, while conventional radiography produces only one projection per acquisition. Projections are located in separate image fields on the detector plane. Our results show it is possible to apply an extremely simple radiographic technique with extended sources, and get 3D information of the attenuation coefficient distribution for simple geometry objects in a single acquisition. The results are promising enough to evaluate the possibility of future research with more complex objects typical of medical diagnostic radiography and industrial gamma radiography (author)

  9. Defective Pollen Wall 2 ( DPW2 ) Encodes an Acyl Transferase Required for Rice Pollen Development

    Energy Technology Data Exchange (ETDEWEB)

    Xu, Dawei [Shanghai Jiao Tong Univ. (China). Joint International Research Lab. of Metabolic and Developmental Sciences; Shi, Jianxin [Shanghai Jiao Tong Univ. (China). Joint International Research Lab. of Metabolic and Developmental Sciences; Rautengarten, Carsten [Univ. of Melbourne (Australia). ARC Centre of Excellence in Plant Cell Walls; Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States). Joint BioEnergy Inst. and Biological Systems and Engineering Division; Yang, Li [Shanghai Jiao Tong Univ. (China). Joint International Research Lab. of Metabolic and Developmental Sciences; Qian, Xiaoling [Shanghai Jiao Tong Univ. (China). Joint International Research Lab. of Metabolic and Developmental Sciences; Uzair, Muhammad [Shanghai Jiao Tong Univ. (China). Joint International Research Lab. of Metabolic and Developmental Sciences; Zhu, Lu [Shanghai Jiao Tong Univ. (China). Joint International Research Lab. of Metabolic and Developmental Sciences; Luo, Qian [Shanghai Jiao Tong Univ. (China). Joint International Research Lab. of Metabolic and Developmental Sciences; An, Gynheung [Kyung Hee Univ., Yongin (Korea). Crop Biotech Inst.; Waßmann, Fritz [Univ. of Bonn (Germany). Inst. of Cellular and Molecular Botany; Schreiber, Lukas [Univ. of Bonn (Germany). Inst. of Cellular and Molecular Botany; Heazlewood, Joshua L. [Univ. of Melbourne (Australia). ARC Centre of Excellence in Plant Cell Walls; Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States). Joint BioEnergy Inst. and Biological Systems and Engineering Division; Scheller, Henrik Vibe [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States). Joint BioEnergy Inst. and Biological Systems and Engineering Division; Univ. of California, Berkeley, CA (United States). Dept. of Plant and Microbial Biology; Hu, Jianping [Michigan State Univ., East Lansing, MI (United States). Dept. of Energy Plant Research Lab.; Zhang, Dabing [Shanghai Jiao Tong Univ. (China). Joint International Research Lab. of Metabolic and Developmental Sciences; Univ. of Adelaide, SA (Australia). School of Agriculture, Food and Wine; Liang, Wanqi [Shanghai Jiao Tong Univ. (China). Joint International Research Lab. of Metabolic and Developmental Sciences

    2016-05-31

    Aliphatic and aromatic lipids are both essential structural components of the plant cuticle, an important interface between the plant and environment. Although cross links between aromatic and aliphatic or other moieties are known to be associated with the formation of leaf cutin and root and seed suberin, the contribution of aromatic lipids to the biosynthesis of anther cuticles and pollen walls remains elusive. In this study, we characterized the rice (Oryza sativa) male sterile mutant, defective pollen wall 2 (dpw2), which showed an abnormal anther cuticle, a defective pollen wall, and complete male sterility. Compared with the wild type, dpw2 anthers have increased amounts of cutin and waxes and decreased levels of lipidic and phenolic compounds. DPW2 encodes a cytoplasmically localized BAHD acyltransferase. In vitro assays demonstrated that recombinant DPW2 specifically transfers hydroxycinnamic acid moieties, using v-hydroxy fatty acids as acyl acceptors and hydroxycinnamoyl-CoAs as acyl donors. Thus, The cytoplasmic hydroxycinnamoyl-CoA:v-hydroxy fatty acid transferase DPW2 plays a fundamental role in male reproduction via the biosynthesis of key components of the anther cuticle and pollen wall.

  10. Key figures for the regional- and distribution grid

    International Nuclear Information System (INIS)

    Vikingstad, S.

    1996-02-01

    In Norway, improving the efficiency of the hydroelectric grid operation is a stated goal of the Energy Act. Several studies have identified potential profits of such improvement. This publication focuses on costs and improvement potentials. Publication of key figures may stimulate grid owners, boards and administrations to improve the operating efficiency of their grids. The publication shows key figures for the regional- and distribution grid and is based on accounting data for 1994. The key figures are divided into: (1) Cost structure: The key figures express the relative contributions of each cost component to the total income of the grid, (2) Costs and physical quantities: The key figures show the cost of delivering the transport services, (3) Physical quantities: The key figures describe the working conditions of the energy utility. It appears that the cost structure of the sector varies considerably. The same is true of the cost related to the delivery of grid services. 30 figs., 6 tabs

  11. The role of depth of encoding in attentional capture

    NARCIS (Netherlands)

    Sasin, Edyta; Nieuwenstein, Mark; Johnson, Addie

    2015-01-01

    The aim of the current study was to examine whether depth of encoding influences attentional capture by recently attended objects. In Experiment 1, participants first had to judge whether a word referred to a living or a nonliving thing (deep encoding condition) or whether the word was written in

  12. Encoding Effects on First-Graders' Use of Manipulatives

    Science.gov (United States)

    Osana, Helena P.; Przednowek, Katarzyna; Cooperman, Allyson; Adrien, Emmanuelle

    2018-01-01

    The effects of prior encodings of manipulatives (red and blue plastic chips) on children's ability to use them as representations of quantity were tested. First graders (N = 73) were assigned to four conditions in which the encoding of plastic chips was experimentally manipulated. All children then participated in an addition activity that relied…

  13. The Contribution of Encoding and Retrieval Processes to Proactive Interference

    Science.gov (United States)

    Kliegl, Oliver; Pastötter, Bernhard; Bäuml, Karl-Heinz T.

    2015-01-01

    Proactive interference (PI) refers to the finding that memory for recently studied (target) material can be impaired by the prior study of other (nontarget) material. Previous accounts of PI differed in whether they attributed PI to impaired retrieval or impaired encoding. Here, we suggest an integrated encoding-retrieval account, which assigns a…

  14. Evaluation of color encodings for high dynamic range pixels

    Science.gov (United States)

    Boitard, Ronan; Mantiuk, Rafal K.; Pouli, Tania

    2015-03-01

    Traditional Low Dynamic Range (LDR) color spaces encode a small fraction of the visible color gamut, which does not encompass the range of colors produced on upcoming High Dynamic Range (HDR) displays. Future imaging systems will require encoding much wider color gamut and luminance range. Such wide color gamut can be represented using floating point HDR pixel values but those are inefficient to encode. They also lack perceptual uniformity of the luminance and color distribution, which is provided (in approximation) by most LDR color spaces. Therefore, there is a need to devise an efficient, perceptually uniform and integer valued representation for high dynamic range pixel values. In this paper we evaluate several methods for encoding colour HDR pixel values, in particular for use in image and video compression. Unlike other studies we test both luminance and color difference encoding in a rigorous 4AFC threshold experiments to determine the minimum bit-depth required. Results show that the Perceptual Quantizer (PQ) encoding provides the best perceptual uniformity in the considered luminance range, however the gain in bit-depth is rather modest. More significant difference can be observed between color difference encoding schemes, from which YDuDv encoding seems to be the most efficient.

  15. Interaction Between Encoding and Retrieval Operations in Cued Recall

    Science.gov (United States)

    Fisher, Ronald P.; Craik, Fergus I. M.

    1977-01-01

    Three experiments are described in which the qualitative nature of memorial processing was manipulated at both input (encoding) and output (retrieval). As in earlier research, it was found that retention levels were highest when the same type of information was used as a retrieval cue. Concludes that the notions of encoding specificity and depth…

  16. Distinctiveness of Encoding and Memory for Learning Tasks.

    Science.gov (United States)

    Glover, John A.; And Others

    1982-01-01

    A distinctiveness of encoding hypothesis, as applied to the facilitative effects that higher order objectives have on readers' prose recall, was evaluated in three experiments. Results suggest that distinctiveness of encoding may offer a theoretical basis for the effects of adjunct aids as well as a guide to their construction. (Author/GK)

  17. Decoding and Encoding Facial Expressions in Preschool-Age Children.

    Science.gov (United States)

    Zuckerman, Miron; Przewuzman, Sylvia J.

    1979-01-01

    Preschool-age children drew, decoded, and encoded facial expressions depicting five different emotions. Accuracy of drawing, decoding and encoding each of the five emotions was consistent across the three tasks; decoding ability was correlated with drawing ability among female subjects, but neither of these abilities was correlated with encoding…

  18. On The Designed And Constructed Feedback Shift-Register Encoder

    African Journals Online (AJOL)

    Information transmission in noisy channels can be achieved with vanishingly small probability of error by proper coding of the information as long as the encoding rate is less than the channel capacity. An encoder capable of cyclical shifting of data, and which can therefore be used for Bose-Chaudhuri and Hocquenghem ...

  19. Evidence for anomalous network connectivity during working memory encoding in schizophrenia: an ICA based analysis.

    Directory of Open Access Journals (Sweden)

    Shashwath A Meda

    2009-11-01

    Full Text Available Numerous neuroimaging studies report abnormal regional brain activity during working memory performance in schizophrenia, but few have examined brain network integration as determined by "functional connectivity" analyses.We used independent component analysis (ICA to identify and characterize dysfunctional spatiotemporal networks in schizophrenia engaged during the different stages (encoding and recognition of a Sternberg working memory fMRI paradigm. 37 chronic schizophrenia and 54 healthy age/gender-matched participants performed a modified Sternberg Item Recognition fMRI task. Time series images preprocessed with SPM2 were analyzed using ICA. Schizophrenia patients showed relatively less engagement of several distinct "normal" encoding-related working memory networks compared to controls. These encoding networks comprised 1 left posterior parietal-left dorsal/ventrolateral prefrontal cortex, cingulate, basal ganglia, 2 right posterior parietal, right dorsolateral prefrontal cortex and 3 default mode network. In addition, the left fronto-parietal network demonstrated a load-dependent functional response during encoding. Network engagement that differed between groups during recognition comprised the posterior cingulate, cuneus and hippocampus/parahippocampus. As expected, working memory task accuracy differed between groups (p<0.0001 and was associated with degree of network engagement. Functional connectivity within all three encoding-associated functional networks correlated significantly with task accuracy, which further underscores the relevance of abnormal network integration to well-described schizophrenia working memory impairment. No network was significantly associated with task accuracy during the recognition phase.This study extends the results of numerous previous schizophrenia studies that identified isolated dysfunctional brain regions by providing evidence of disrupted schizophrenia functional connectivity using ICA within

  20. Advantages and limitations of the use of optogenetic approach in studying fast-scale spike encoding.

    Directory of Open Access Journals (Sweden)

    Aleksey Malyshev

    Full Text Available Understanding single-neuron computations and encoding performed by spike-generation mechanisms of cortical neurons is one of the central challenges for cell electrophysiology and computational neuroscience. An established paradigm to study spike encoding in controlled conditions in vitro uses intracellular injection of a mixture of signals with fluctuating currents that mimic in vivo-like background activity. However this technique has two serious limitations: it uses current injection, while synaptic activation leads to changes of conductance, and current injection is technically most feasible in the soma, while the vast majority of synaptic inputs are located on the dendrites. Recent progress in optogenetics provides an opportunity to circumvent these limitations. Transgenic expression of light-activated ionic channels, such as Channelrhodopsin2 (ChR2, allows induction of controlled conductance changes even in thin distant dendrites. Here we show that photostimulation provides a useful extension of the tools to study neuronal encoding, but it has its own limitations. Optically induced fluctuating currents have a low cutoff (~70 Hz, thus limiting the dynamic range of frequency response of cortical neurons. This leads to severe underestimation of the ability of neurons to phase-lock their firing to high frequency components of the input. This limitation could be worked around by using short (2 ms light stimuli which produce membrane potential responses resembling EPSPs by their fast onset and prolonged decay kinetics. We show that combining application of short light stimuli to different parts of dendritic tree for mimicking distant EPSCs with somatic injection of fluctuating current that mimics fluctuations of membrane potential in vivo, allowed us to study fast encoding of artificial EPSPs photoinduced at different distances from the soma. We conclude that dendritic photostimulation of ChR2 with short light pulses provides a powerful tool to

  1. Nucleic acids encoding phloem small RNA-binding proteins and transgenic plants comprising them

    Science.gov (United States)

    Lucas, William J.; Yoo, Byung-Chun; Lough, Tony J.; Varkonyi-Gasic, Erika

    2007-03-13

    The present invention provides a polynucleotide sequence encoding a component of the protein machinery involved in small RNA trafficking, Cucurbita maxima phloem small RNA-binding protein (CmPSRB 1), and the corresponding polypeptide sequence. The invention also provides genetic constructs and transgenic plants comprising the polynucleotide sequence encoding a phloem small RNA-binding protein to alter (e.g., prevent, reduce or elevate) non-cell autonomous signaling events in the plants involving small RNA metabolism. These signaling events are involved in a broad spectrum of plant physiological and biochemical processes, including, for example, systemic resistance to pathogens, responses to environmental stresses, e.g., heat, drought, salinity, and systemic gene silencing (e.g., viral infections).

  2. Ixodes ticks belonging to the Ixodes ricinus complex encode a family of anticomplement proteins.

    Science.gov (United States)

    Daix, V; Schroeder, H; Praet, N; Georgin, J-P; Chiappino, I; Gillet, L; de Fays, K; Decrem, Y; Leboulle, G; Godfroid, E; Bollen, A; Pastoret, P-P; Gern, L; Sharp, P M; Vanderplasschen, A

    2007-04-01

    The alternative pathway of complement is an important innate defence against pathogens including ticks. This component of the immune system has selected for pathogens that have evolved countermeasures. Recently, a salivary protein able to inhibit the alternative pathway was cloned from the American tick Ixodes scapularis (Valenzuela et al., 2000; J. Biol. Chem. 275, 18717-18723). Here, we isolated two different sequences, similar to Isac, from the transcriptome of I. ricinus salivary glands. Expression of these sequences revealed that they both encode secreted proteins able to inhibit the complement alternative pathway. These proteins, called I. ricinus anticomplement (IRAC) protein I and II, are coexpressed constitutively in I. ricinus salivary glands and are upregulated during blood feeding. Also, we demonstrated that they are the products of different genes and not of alleles of the same locus. Finally, phylogenetic analyses demonstrate that ticks belonging to the Ixodes ricinus complex encode a family of relatively small anticomplement molecules undergoing diversification by positive Darwinian selection.

  3. Key economic sectors and services

    NARCIS (Netherlands)

    Arent, Douglas J.; Tol, Richard S.J.; Faust, Eberhard; Hella, Joseph P.; Kumar, Surender; Strzepek, Kenneth M.; Tóth, Ferenc L.; Yan, Denghua; Abdulla, Amjad; Kheshgi, Haroon; Xu, He; Ngeh, Julius

    2015-01-01

    Introduction and Context This chapter discusses the implications of climate change on key economic sectors and services, for example, economic activity. Other chapters discuss impacts from a physical, chemical, biological, or social perspective. Economic impacts cannot be isolated; therefore, there

  4. Algorithms for Lightweight Key Exchange.

    Science.gov (United States)

    Alvarez, Rafael; Caballero-Gil, Cándido; Santonja, Juan; Zamora, Antonio

    2017-06-27

    Public-key cryptography is too slow for general purpose encryption, with most applications limiting its use as much as possible. Some secure protocols, especially those that enable forward secrecy, make a much heavier use of public-key cryptography, increasing the demand for lightweight cryptosystems that can be implemented in low powered or mobile devices. This performance requirements are even more significant in critical infrastructure and emergency scenarios where peer-to-peer networks are deployed for increased availability and resiliency. We benchmark several public-key key-exchange algorithms, determining those that are better for the requirements of critical infrastructure and emergency applications and propose a security framework based on these algorithms and study its application to decentralized node or sensor networks.

  5. Key Injury and Violence Data

    Science.gov (United States)

    ... Traumatic Brain Injury Violence Prevention Key Injury and Violence Data Recommend on Facebook Tweet Share Compartir Injuries ... of death among persons 1-44. Injury- and violence-related deaths are only part of the problem ...

  6. Heterodyne detection using spectral line pairing for spectral phase encoding optical code division multiple access and dynamic dispersion compensation.

    Science.gov (United States)

    Yang, Yi; Foster, Mark; Khurgin, Jacob B; Cooper, A Brinton

    2012-07-30

    A novel coherent optical code-division multiple access (OCDMA) scheme is proposed that uses spectral line pairing to generate signals suitable for heterodyne decoding. Both signal and local reference are transmitted via a single optical fiber and a simple balanced receiver performs sourceless heterodyne detection, canceling speckle noise and multiple-access interference (MAI). To validate the idea, a 16 user fully loaded phase encoded system is simulated. Effects of fiber dispersion on system performance are studied as well. Both second and third order dispersion management is achieved by using a spectral phase encoder to adjust phase shifts of spectral components at the optical network unit (ONU).

  7. Grammatical constraints on phonological encoding in speech production.

    Science.gov (United States)

    Heller, Jordana R; Goldrick, Matthew

    2014-12-01

    To better understand the influence of grammatical encoding on the retrieval and encoding of phonological word-form information during speech production, we examine how grammatical class constraints influence the activation of phonological neighbors (words phonologically related to the target--e.g., MOON, TWO for target TUNE). Specifically, we compare how neighbors that share a target's grammatical category (here, nouns) influence its planning and retrieval, assessed by picture naming latencies, and phonetic encoding, assessed by word productions in picture names, when grammatical constraints are strong (in sentence contexts) versus weak (bare naming). Within-category (noun) neighbors influenced planning time and phonetic encoding more strongly in sentence contexts. This suggests that grammatical encoding constrains phonological processing; the influence of phonological neighbors is grammatically dependent. Moreover, effects on planning times could not fully account for phonetic effects, suggesting that phonological interaction affects articulation after speech onset. These results support production theories integrating grammatical, phonological, and phonetic processes.

  8. Convolutional over Recurrent Encoder for Neural Machine Translation

    Directory of Open Access Journals (Sweden)

    Dakwale Praveen

    2017-06-01

    Full Text Available Neural machine translation is a recently proposed approach which has shown competitive results to traditional MT approaches. Standard neural MT is an end-to-end neural network where the source sentence is encoded by a recurrent neural network (RNN called encoder and the target words are predicted using another RNN known as decoder. Recently, various models have been proposed which replace the RNN encoder with a convolutional neural network (CNN. In this paper, we propose to augment the standard RNN encoder in NMT with additional convolutional layers in order to capture wider context in the encoder output. Experiments on English to German translation demonstrate that our approach can achieve significant improvements over a standard RNN-based baseline.

  9. Improved entropy encoding for high efficient video coding standard

    Directory of Open Access Journals (Sweden)

    B.S. Sunil Kumar

    2018-03-01

    Full Text Available The High Efficiency Video Coding (HEVC has better coding efficiency, but the encoding performance has to be improved to meet the growing multimedia applications. This paper improves the standard entropy encoding by introducing the optimized weighing parameters, so that higher rate of compression can be accomplished over the standard entropy encoding. The optimization is performed using the recently introduced firefly algorithm. The experimentation is carried out using eight benchmark video sequences and the PSNR for varying rate of data transmission is investigated. Comparative analysis based on the performance statistics is made with the standard entropy encoding. From the obtained results, it is clear that the originality of the decoded video sequence is preserved far better than the proposed method, though the compression rate is increased. Keywords: Entropy, Encoding, HEVC, PSNR, Compression

  10. The distinction between key ideas in teaching school physics and key ideas in the discipline of physics

    Science.gov (United States)

    Deng, Zongyi

    2001-05-01

    The distinction between key ideas in teaching a high school science and key ideas in the corresponding discipline of science has been largely ignored in scholarly discourse about what science teachers should teach and about what they should know. This article clarifies this distinction through exploring how and why key ideas in teaching high school physics differ from key ideas in the discipline of physics. Its theoretical underpinnings include Dewey's (1902/1990) distinction between the psychological and the logical and Harré's (1986) epistemology of science. It analyzes how and why the key ideas in teaching color, the speed of light, and light interference at the high school level differ from the key ideas at the disciplinary level. The thesis is that key ideas in teaching high school physics can differ from key ideas in the discipline in some significant ways, and that the differences manifest Dewey's distinction. As a result, the article challenges the assumption of equating key ideas in teaching a high school science with key ideas in the corresponding discipline of science, and the assumption that having a college degree in science is sufficient to teach high school science. Furthermore, the article expands the concept of pedagogical content knowledge by arguing that key ideas in teaching high school physics constitute an essential component.

  11. Cryptographic Key Management and Critical Risk Assessment

    Energy Technology Data Exchange (ETDEWEB)

    Abercrombie, Robert K [ORNL

    2014-05-01

    The Department of Energy Office of Electricity Delivery and Energy Reliability (DOE-OE) CyberSecurity for Energy Delivery Systems (CSEDS) industry led program (DE-FOA-0000359) entitled "Innovation for Increasing CyberSecurity for Energy Delivery Systems (12CSEDS)," awarded a contract to Sypris Electronics LLC to develop a Cryptographic Key Management System for the smart grid (Scalable Key Management Solutions for Critical Infrastructure Protection). Oak Ridge National Laboratory (ORNL) and Sypris Electronics, LLC as a result of that award entered into a CRADA (NFE-11-03562) between ORNL and Sypris Electronics, LLC. ORNL provided its Cyber Security Econometrics System (CSES) as a tool to be modified and used as a metric to address risks and vulnerabilities in the management of cryptographic keys within the Advanced Metering Infrastructure (AMI) domain of the electric sector. ORNL concentrated our analysis on the AMI domain of which the National Electric Sector Cyber security Organization Resource (NESCOR) Working Group 1 (WG1) has documented 29 failure scenarios. The computational infrastructure of this metric involves system stakeholders, security requirements, system components and security threats. To compute this metric, we estimated the stakes that each stakeholder associates with each security requirement, as well as stochastic matrices that represent the probability of a threat to cause a component failure and the probability of a component failure to cause a security requirement violation. We applied this model to estimate the security of the AMI, by leveraging the recently established National Institute of Standards and Technology Interagency Report (NISTIR) 7628 guidelines for smart grid security and the International Electrotechnical Commission (IEC) 63351, Part 9 to identify the life cycle for cryptographic key management, resulting in a vector that assigned to each stakeholder an estimate of their average loss in terms of dollars per day of system

  12. Optical image encryption using password key based on phase retrieval algorithm

    Science.gov (United States)

    Zhao, Tieyu; Ran, Qiwen; Yuan, Lin; Chi, Yingying; Ma, Jing

    2016-04-01

    A novel optical image encryption system is proposed using password key based on phase retrieval algorithm (PRA). In the encryption process, a shared image is taken as a symmetric key and the plaintext is encoded into the phase-only mask based on the iterative PRA. The linear relationship between the plaintext and ciphertext is broken using the password key, which can resist the known plaintext attack. The symmetric key and the retrieved phase are imported into the input plane and Fourier plane of 4f system during the decryption, respectively, so as to obtain the plaintext on the CCD. Finally, we analyse the key space of the password key, and the results show that the proposed scheme can resist a brute force attack due to the flexibility of the password key.

  13. The Public-Key-Infrastructure of the Radiological Society of Germany

    International Nuclear Information System (INIS)

    Schuetze, B.; Kaemmerer, M.; Klos, G.; Mildenberger, P.

    2006-01-01

    Pretty Good Privacy (PGP) encoding is based on the Public-Key-Procedure and permits the safe transmission of medical data. Furthermore it allows the use of an electronic signature provided that keys used belong to the key owner and that the key owner's identity is guaranteed by a trusted third party. Under the auspices of the Radiological Society of Germany (Deutsche Roentgengesellschaft, DRG) its IT-Working Group (Arbeitsgemeinschaft fuer Informationstechnik, GIT) built up an appropriate Certification Authority including the required Public-Key-Infrastructure. These GIT certified PGP keys allow the legal use of telemedicine in Germany. Digital signatures based to those certified keys correspond to the advanced signature according to the German Signature Law

  14. The Public-Key-Infrastructure of the Radiological Society of Germany

    Energy Technology Data Exchange (ETDEWEB)

    Schuetze, B. [Johannes Gutenberg-University of Mainz, Department of Radiology, Langenbeckstr. 1, 55131 Mainz (Germany)]. E-mail: schuetze@medizin-informatik.org; Kaemmerer, M. [Johannes Gutenberg-University of Mainz, Department of Radiology, Langenbeckstr. 1, 55131 Mainz (Germany); Klos, G. [Johannes Gutenberg-University of Mainz, Department of Radiology, Langenbeckstr. 1, 55131 Mainz (Germany); Mildenberger, P. [Johannes Gutenberg-University of Mainz, Department of Radiology, Langenbeckstr. 1, 55131 Mainz (Germany)

    2006-03-15

    Pretty Good Privacy (PGP) encoding is based on the Public-Key-Procedure and permits the safe transmission of medical data. Furthermore it allows the use of an electronic signature provided that keys used belong to the key owner and that the key owner's identity is guaranteed by a trusted third party. Under the auspices of the Radiological Society of Germany (Deutsche Roentgengesellschaft, DRG) its IT-Working Group (Arbeitsgemeinschaft fuer Informationstechnik, GIT) built up an appropriate Certification Authority including the required Public-Key-Infrastructure. These GIT certified PGP keys allow the legal use of telemedicine in Germany. Digital signatures based to those certified keys correspond to the advanced signature according to the German Signature Law.

  15. Beyond Initial Encoding: Measures of the Post-Encoding Status of Memory Traces Predict Long-Term Recall during Infancy

    Science.gov (United States)

    Pathman, Thanujeni; Bauer, Patricia J.

    2013-01-01

    The first years of life are witness to rapid changes in long-term recall ability. In the current research we contributed to an explanation of the changes by testing the absolute and relative contributions to long-term recall of encoding and post-encoding processes. Using elicited imitation, we sampled the status of 16-, 20-, and 24-month-old…

  16. The Asymmetrical Effects of Divided Attention on Encoding and Retrieval Processes: A Different View Based on an Interference with the Episodic Register

    Science.gov (United States)

    Guez, Jonathan; Naveh-Benjamin, Moshe

    2013-01-01

    In this study, we evaluate the conceptualization of encoding and retrieval processes established in previous studies that used a divided attention (DA) paradigm. These studies indicated that there were considerable detrimental effects of DA at encoding on later memory performance, but only minimal effects, if any, on divided attention at retrieval. We suggest that this asymmetry in the effects of DA on memory can be due, at least partially, to a confound between the memory phase (encoding and retrieval) and the memory requirements of the task (memory “for” encoded information versus memory “at” test). To control for this confound, we tested memory for encoded information and for retrieved information by introducing a second test that assessed memory for the retrieved information from the first test. We report the results of four experiments that use measures of memory performance, retrieval latency, and performance on the concurrent task, all of which consistently show that DA at retrieval strongly disrupts later memory for the retrieved episode, similarly to the effects of DA at encoding. We suggest that these symmetrical disruptive effects of DA at encoding and retrieval on later retrieval reflect a disruption of an episodic buffer (EB) or episodic register component (ER), rather than a failure of encoding or retrieval operations per se. PMID:24040249

  17. The asymmetrical effects of divided attention on encoding and retrieval processes: a different view based on an interference with the episodic register.

    Science.gov (United States)

    Guez, Jonathan; Naveh-Benjamin, Moshe

    2013-01-01

    In this study, we evaluate the conceptualization of encoding and retrieval processes established in previous studies that used a divided attention (DA) paradigm. These studies indicated that there were considerable detrimental effects of DA at encoding on later memory performance, but only minimal effects, if any, on divided attention at retrieval. We suggest that this asymmetry in the effects of DA on memory can be due, at least partially, to a confound between the memory phase (encoding and retrieval) and the memory requirements of the task (memory "for" encoded information versus memory "at" test). To control for this confound, we tested memory for encoded information and for retrieved information by introducing a second test that assessed memory for the retrieved information from the first test. We report the results of four experiments that use measures of memory performance, retrieval latency, and performance on the concurrent task, all of which consistently show that DA at retrieval strongly disrupts later memory for the retrieved episode, similarly to the effects of DA at encoding. We suggest that these symmetrical disruptive effects of DA at encoding and retrieval on later retrieval reflect a disruption of an episodic buffer (EB) or episodic register component (ER), rather than a failure of encoding or retrieval operations per se.

  18. Can natural selection encode Bayesian priors?

    Science.gov (United States)

    Ramírez, Juan Camilo; Marshall, James A R

    2017-08-07

    The evolutionary success of many organisms depends on their ability to make decisions based on estimates of the state of their environment (e.g., predation risk) from uncertain information. These decision problems have optimal solutions and individuals in nature are expected to evolve the behavioural mechanisms to make decisions as if using the optimal solutions. Bayesian inference is the optimal method to produce estimates from uncertain data, thus natural selection is expected to favour individuals with the behavioural mechanisms to make decisions as if they were computing Bayesian estimates in typically-experienced environments, although this does not necessarily imply that favoured decision-makers do perform Bayesian computations exactly. Each individual should evolve to behave as if updating a prior estimate of the unknown environment variable to a posterior estimate as it collects evidence. The prior estimate represents the decision-maker's default belief regarding the environment variable, i.e., the individual's default 'worldview' of the environment. This default belief has been hypothesised to be shaped by natural selection and represent the environment experienced by the individual's ancestors. We present an evolutionary model to explore how accurately Bayesian prior estimates can be encoded genetically and shaped by natural selection when decision-makers learn from uncertain information. The model simulates the evolution of a population of individuals that are required to estimate the probability of an event. Every individual has a prior estimate of this probability and collects noisy cues from the environment in order to update its prior belief to a Bayesian posterior estimate with the evidence gained. The prior is inherited and passed on to offspring. Fitness increases with the accuracy of the posterior estimates produced. Simulations show that prior estimates become accurate over evolutionary time. In addition to these 'Bayesian' individuals, we also

  19. Secret key rates in quantum key distribution using Renyi entropies

    Energy Technology Data Exchange (ETDEWEB)

    Abruzzo, Silvestre; Kampermann, Hermann; Mertz, Markus; Bratzik, Sylvia; Bruss, Dagmar [Institut fuer Theoretische Physik III, Heinrich-Heine-Universitaet Duesseldorf (Germany)

    2010-07-01

    The secret key rate r of a quantum key distribution protocol depends on the involved number of signals and the accepted ''failure probability''. We reconsider a method to calculate r focusing on the analysis of the privacy amplification given by R. Renner and R. Koenig (2005). This approach involves an optimization problem with an objective function depending on the Renyi entropy of the density operator describing the classical outcomes and the eavesdropper system. This problem is analyzed for a generic class of QKD protocols and the current research status is presented.

  20. Three state quantum key distribution for small keys

    International Nuclear Information System (INIS)

    Batuwantudawe, J.; Boileau, J.-C.

    2005-01-01

    Full text: Quantum key distribution (QKD) protocols allow two parties, Alice and Bob, to establish secure keys. The most well-known protocol is BB84, using four distinct states. Recently, Phoenix et al. proposed a three state protocol. We explain the protocol and discuss its security proof. The three state protocol also has an interesting structure that allows for errors estimation from the inconclusive results (i.e.. where Alice and Bob choose different bases). This eliminates the need for sampling, potentially useful when qubits are limited. We discuss the effectiveness of this approach compared to BB84 for the case where a good error estimate is required. (author)

  1. Supply chain components

    OpenAIRE

    Vieraşu, T.; Bălăşescu, M.

    2011-01-01

    In this article I will go through three main logistics components, which are represented by: transportation, inventory and facilities, and the three secondary logistical components: information, production location, price and how they determine performance of any supply chain. I will discuss then how these components are used in the design, planning and operation of a supply chain. I will also talk about some obstacles a supply chain manager may encounter.

  2. Supply chain components

    Directory of Open Access Journals (Sweden)

    Vieraşu, T.

    2011-01-01

    Full Text Available In this article I will go through three main logistics components, which are represented by: transportation, inventory and facilities, and the three secondary logistical components: information, production location, price and how they determine performance of any supply chain. I will discuss then how these components are used in the design, planning and operation of a supply chain. I will also talk about some obstacles a supply chain manager may encounter.

  3. Control component retainer

    International Nuclear Information System (INIS)

    Walton, L.A.; King, R.A.

    1983-01-01

    An apparatus is described for retaining an undriven control component assembly disposed in a fuel assembly in a nuclear reactor of the type having a core grid plate. The first part of the mechanism involves a housing for the control component and the second part is a brace with a number of arms that reach under the grid plate. The brace and the housing are coupled together to firmly hold the control components in place even under strong flows of th coolant

  4. COMK ENCODES THE COMPETENCE TRANSCRIPTION FACTOR, THE KEY REGULATORY PROTEIN FOR COMPETENCE DEVELOPMENT IN BACILLUS-SUBTILIS

    NARCIS (Netherlands)

    VANSINDEREN, D; LUTTINGER, A; KONG, LY; DUBNAU, D; VENEMA, G; HAMOEN, L

    comK is a positive autoregulatory gene occupying a central position in the com petence-signal-transduction network. All regulatory routes identified in this network converge at the level of comK expression. The ComK protein is required for the transcriptional induction of comK and the late

  5. Quantum Key Distribution using Phase Encoding in Double-Pass Silica-on-Silicon Circuits with Grating Reflectors

    DEFF Research Database (Denmark)

    Kristensen, Martin; Maack, Johan; Thomasen, Andreas

    2014-01-01

    The advantages of D-shape fiber in combination with an optical analog of Ramsey fringes using LPGs are presented. The mode-profiles of the sensor were characterized experimentally to provide deeper knowledge about improved functionality....

  6. Virus-encoded chemokine receptors--putative novel antiviral drug targets

    DEFF Research Database (Denmark)

    Rosenkilde, Mette M

    2005-01-01

    Large DNA viruses, in particular herpes- and poxviruses, have evolved proteins that serve as mimics or decoys for endogenous proteins in the host. The chemokines and their receptors serve key functions in both innate and adaptive immunity through control of leukocyte trafficking, and have...... receptors belong to the superfamily of G-protein coupled 7TM receptors that per se are excellent drug targets. At present, non-peptide antagonists have been developed against many chemokine receptors. The potentials of the virus-encoded chemokine receptors as drug targets--ie. as novel antiviral strategies...

  7. Component design for LMFBR's

    International Nuclear Information System (INIS)

    Fillnow, R.H.; France, L.L.; Zerinvary, M.C.; Fox, R.O.

    1975-01-01

    Just as FFTF has prototype components to confirm their design, FFTF is serving as a prototype for the design of the commercial LMFBR's. Design and manufacture of critical components for the FFTF system have been accomplished primarily using vendors with little or no previous experience in supplying components for high temperature sodium systems. The exposure of these suppliers, and through them a multitude of subcontractors, to the requirements of this program has been a necessary and significant step in preparing American industry for the task of supplying the large mechanical components required for commercial LMFBR's

  8. Hot gas path component

    Science.gov (United States)

    Lacy, Benjamin Paul; Kottilingam, Srikanth Chandrudu; Porter, Christopher Donald; Schick, David Edward

    2017-09-12

    Various embodiments of the disclosure include a turbomachine component. and methods of forming such a component. Some embodiments include a turbomachine component including: a first portion including at least one of a stainless steel or an alloy steel; and a second portion joined with the first portion, the second portion including a nickel alloy including an arced cooling feature extending therethrough, the second portion having a thermal expansion coefficient substantially similar to a thermal expansion coefficient of the first portion, wherein the arced cooling feature is located within the second portion to direct a portion of a coolant to a leakage area of the turbomachine component.

  9. Decoy State Quantum Key Distribution

    Science.gov (United States)

    Lo, Hoi-Kwong

    2005-10-01

    Quantum key distribution (QKD) allows two parties to communicate in absolute security based on the fundamental laws of physics. Up till now, it is widely believed that unconditionally secure QKD based on standard Bennett-Brassard (BB84) protocol is limited in both key generation rate and distance because of imperfect devices. Here, we solve these two problems directly by presenting new protocols that are feasible with only current technology. Surprisingly, our new protocols can make fiber-based QKD unconditionally secure at distances over 100km (for some experiments, such as GYS) and increase the key generation rate from O(η2) in prior art to O(η) where η is the overall transmittance. Our method is to develop the decoy state idea (first proposed by W.-Y. Hwang in "Quantum Key Distribution with High Loss: Toward Global Secure Communication", Phys. Rev. Lett. 91, 057901 (2003)) and consider simple extensions of the BB84 protocol. This part of work is published in "Decoy State Quantum Key Distribution", . We present a general theory of the decoy state protocol and propose a decoy method based on only one signal state and two decoy states. We perform optimization on the choice of intensities of the signal state and the two decoy states. Our result shows that a decoy state protocol with only two types of decoy states--a vacuum and a weak decoy state--asymptotically approaches the theoretical limit of the most general type of decoy state protocols (with an infinite number of decoy states). We also present a one-decoy-state protocol as a special case of Vacuum+Weak decoy method. Moreover, we provide estimations on the effects of statistical fluctuations and suggest that, even for long distance (larger than 100km) QKD, our two-decoy-state protocol can be implemented with only a few hours of experimental data. In conclusion, decoy state quantum key distribution is highly practical. This part of work is published in "Practical Decoy State for Quantum Key Distribution

  10. Simultaneous classical communication and quantum key distribution using continuous variables*

    Science.gov (United States)

    Qi, Bing

    2016-10-01

    Presently, classical optical communication systems employing strong laser pulses and quantum key distribution (QKD) systems working at single-photon levels are very different communication modalities. Dedicated devices are commonly required to implement QKD. In this paper, we propose a scheme which allows classical communication and QKD to be implemented simultaneously using the same communication infrastructure. More specially, we propose a coherent communication scheme where both the bits for classical communication and the Gaussian distributed random numbers for QKD are encoded on the same weak coherent pulse and decoded by the same coherent receiver. Simulation results based on practical system parameters show that both deterministic classical communication with a bit error rate of 10-9 and secure key distribution could be achieved over tens of kilometers of single-mode fibers. It is conceivable that in the future coherent optical communication network, QKD will be operated in the background of classical communication at a minimal cost.

  11. Quantum key distribution session with 16-dimensional photonic states

    Science.gov (United States)

    Etcheverry, S.; Cañas, G.; Gómez, E. S.; Nogueira, W. A. T.; Saavedra, C.; Xavier, G. B.; Lima, G.

    2013-01-01

    The secure transfer of information is an important problem in modern telecommunications. Quantum key distribution (QKD) provides a solution to this problem by using individual quantum systems to generate correlated bits between remote parties, that can be used to extract a secret key. QKD with D-dimensional quantum channels provides security advantages that grow with increasing D. However, the vast majority of QKD implementations has been restricted to two dimensions. Here we demonstrate the feasibility of using higher dimensions for real-world quantum cryptography by performing, for the first time, a fully automated QKD session based on the BB84 protocol with 16-dimensional quantum states. Information is encoded in the single-photon transverse momentum and the required states are dynamically generated with programmable spatial light modulators. Our setup paves the way for future developments in the field of experimental high-dimensional QKD. PMID:23897033

  12. KeyPathwayMinerWeb

    DEFF Research Database (Denmark)

    List, Markus; Alcaraz, Nicolas; Dissing-Hansen, Martin

    2016-01-01

    , for instance), KeyPathwayMiner extracts connected sub-networks containing a high number of active or differentially regulated genes (proteins, metabolites) in the molecular profiles. The web interface at (http://keypathwayminer.compbio.sdu.dk) implements all core functionalities of the KeyPathwayMiner tool set......We present KeyPathwayMinerWeb, the first online platform for de novo pathway enrichment analysis directly in the browser. Given a biological interaction network (e.g. protein-protein interactions) and a series of molecular profiles derived from one or multiple OMICS studies (gene expression...... such as data integration, input of background knowledge, batch runs for parameter optimization and visualization of extracted pathways. In addition to an intuitive web interface, we also implemented a RESTful API that now enables other online developers to integrate network enrichment as a web service...

  13. Extreme expansion of NBS-encoding genes in Rosaceae.

    Science.gov (United States)

    Jia, YanXiao; Yuan, Yang; Zhang, Yanchun; Yang, Sihai; Zhang, Xiaohui

    2015-05-03

    Nucleotide binding site leucine-rich repeats (NBS-LRR) genes encode a large class of disease resistance (R) proteins in plants. Extensive studies have been carried out to identify and investigate NBS-encoding gene families in many important plant species. However, no comprehensive research into NBS-encoding genes in the Rosaceae has been performed. In this study, five whole-genome sequenced Rosaceae species, including apple, pear, peach, mei, and strawberry, were analyzed to investigate the evolutionary pattern of NBS-encoding genes and to compare them to those of three Cucurbitaceae species, cucumber, melon, and watermelon. Considerable differences in the copy number of NBS-encoding genes were observed between Cucurbitaceae and Rosaceae species. In Rosaceae species, a large number and a high proportion of NBS-encoding genes were observed in peach (437, 1.52%), mei (475, 1.51%), strawberry (346, 1.05%) and pear (617, 1.44%), and apple contained a whopping 1303 (2.05%) NBS-encoding genes, which might be the highest number of R-genes in all of these reported diploid plant. However, no more than 100 NBS-encoding genes were identified in Cucurbitaceae. Many more species-specific gene families were classified and detected with the signature of positive selection in Rosaceae species, especially in the apple genome. Taken together, our findings indicate that NBS-encoding genes in Rosaceae, especially in apple, have undergone extreme expansion and rapid adaptive evolution. Useful information was provided for further research on the evolutionary mode of disease resistance genes in Rosaceae crops.

  14. Key Lake spill. Final report

    International Nuclear Information System (INIS)

    1984-03-01

    On January 5, 1984 contaminated water overflowed a storage reservoir at the Key Lake uranium mill onto the ice on a neighboring lake, into a muskeg area and onto a road. Outflow continued for two days, partially undercutting a retaining dyke. This report concludes the spill was the result of poor operation by the Key Lake Mining Corp.. The environmental impact will be minimal after cleanup. Improvements can be made in the regulatory process, and it is necessary to prepare for possible future mishaps

  15. Key World Energy Statistics 2013

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2013-08-01

    The IEA produced its first handy, pocket-sized summary of key energy data in 1997 and every year since then it has been more and more successful. Key World Energy Statistics contains timely, clearly-presented data on supply, transformation and consumption of all major energy sources. The interested businessman, journalist or student will have at his or her fingertips the annual Canadian production of coal, the electricity consumption in Thailand, the price of diesel oil in Spain and thousands of other useful energy facts.

  16. Key China Energy Statistics 2012

    Energy Technology Data Exchange (ETDEWEB)

    Levine, Mark [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Fridley, David [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Lu, Hongyou [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Fino-Chen, Cecilia [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States)

    2012-05-01

    The China Energy Group at Lawrence Berkeley National Laboratory (LBNL) was established in 1988. Over the years the Group has gained recognition as an authoritative source of China energy statistics through the publication of its China Energy Databook (CED). The Group has published seven editions to date of the CED (http://china.lbl.gov/research/chinaenergy-databook). This handbook summarizes key statistics from the CED and is expressly modeled on the International Energy Agency’s “Key World Energy Statistics” series of publications. The handbook contains timely, clearly-presented data on the supply, transformation, and consumption of all major energy sources.

  17. Key China Energy Statistics 2011

    Energy Technology Data Exchange (ETDEWEB)

    Levine, Mark [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Fridley, David [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Lu, Hongyou [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Fino-Chen, Cecilia [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States)

    2012-01-15

    The China Energy Group at Lawrence Berkeley National Laboratory (LBNL) was established in 1988. Over the years the Group has gained recognition as an authoritative source of China energy statistics through the publication of its China Energy Databook (CED). In 2008 the Group published the Seventh Edition of the CED (http://china.lbl.gov/research/chinaenergy-databook). This handbook summarizes key statistics from the CED and is expressly modeled on the International Energy Agency’s “Key World Energy Statistics” series of publications. The handbook contains timely, clearly-presented data on the supply, transformation, and consumption of all major energy sources.

  18. Thermal performance of an innovative roof component

    Energy Technology Data Exchange (ETDEWEB)

    Dimoudi, A. [Department of Environmental Engineering, Democritus University of Thrace, Vassilisis Sofias 12, 67 100 Xanthi (Greece); Lykoudis, S. [Institute for Environmental Research and Sustainable Development, National Observatory of Athens, I. Metaxa and B. Pavlou, 152 36 Penteli (Greece); Androutsopoulos, A. [Buildings Department, Division of Energy Efficiency, Centre for Renewable Energy Sources (CRES), 19th km Marathonos Aven., 190 09 Pikermi (Greece)

    2006-11-15

    In this paper, the thermal performance of a ventilated roof component is investigated during the winter period. The ventilated roof component consists of a conventional roof structure - reinforced concrete with a layer of thermal insulation - an air gap that allows the movement of the ambient air and an external layer made of a prefabricated concrete slab. The experimental results of the ventilated roof component during the winter period are presented and its thermal performance is analysed. The effect of key construction parameters like the height of the air gap and the use of a radiant barrier in the air gap is also investigated. Analysis of the results showed that the performance of a ventilated roof component is comparable to a conventional structure during winter. The ventilated component is shown to be in compliance with Greek regulatory requirements in terms of U-value. (author)

  19. Latency Performance of Encoding with Random Linear Network Coding

    DEFF Research Database (Denmark)

    Nielsen, Lars; Hansen, René Rydhof; Lucani Rötter, Daniel Enrique

    2018-01-01

    the encoding process can be parallelized based on system requirements to reduce data access time within the system. Using a counting argument, we focus on predicting the effect of changes of generation (number of original packets) and symbol size (number of bytes per data packet) configurations on the encoding...... latency on full vector and on-the-fly algorithms. We show that the encoding latency doubles when either the generation size or the symbol size double and confirm this via extensive simulations. Although we show that the theoretical speed gain of on-the-fly over full vector is two, our measurements show...

  20. Datacube Interoperability, Encoding Independence, and Analytics

    Science.gov (United States)

    Baumann, Peter; Hirschorn, Eric; Maso, Joan

    2017-04-01

    representations. Further, CIS 1.1 offers a unified model for any kind of regular and irregular grids, also allowing sensor models as per SensorML. Encodings include ASCII formats like GML, JSON, RDF as well as binary formats like GeoTIFF, NetCDF, JPEG2000, and GRIB2; further, a container concept allows mixed representations within one coverage file utilizing zip or other convenient package formats. Through the tight integration with the Sensor Web Enablement (SWE), a lossless "transport" from sensor into coverage world is ensured. The corresponding service model of WCS supports datacube operations ranging from simple data extraction to complex ad-hoc analytics with WPCS. Notably, W3C is working has set out on a coverage model as well; it has been designed relatively independently from the abovementioned standards, but there is informal agreement to link it into the CIS universe (which allows for different, yet interchangeable representations). Particularly interesting in the W3C proposal is the detailed semantic modeling of metadata; as CIS 1.1 supports RDF, a tight coupling seems feasible.

  1. Effects of attention during encoding on sex differences in object location memory.

    Science.gov (United States)

    Barel, Efrat

    2018-04-16

    Attention plays a key role in memory processes and has been widely studied in various memory tasks. The role of attention in sex differences in object location memory is not clearly understood. In the present study, two experiments involving 186 participants and using an object array presented on paper were conducted to examine two encoding conditions: incidental and intentional. In each experiment, the participants were randomly assigned to divided versus full attention conditions. In the first experiment, which involved incidental encoding, women outperformed men in memorising location-exchanged objects in both the full and in the divided attention condition. In the second experiment, which involved intentional encoding, women outperformed men in memorising location-exchanged objects in the full attention condition, but not the divided attention condition. These findings deepen our knowledge regarding the role of attention in object location memory, specifically in terms of the conditions under which females have an advantage for detecting changes in an array of objects. © 2018 International Union of Psychological Science.

  2. Reduced prefrontal activation in pediatric patients with obsessive-compulsive disorder during verbal episodic memory encoding.

    Science.gov (United States)

    Batistuzzo, Marcelo Camargo; Balardin, Joana Bisol; Martin, Maria da Graça Morais; Hoexter, Marcelo Queiroz; Bernardes, Elisa Teixeira; Borcato, Sonia; Souza, Marina de Marco E; Querido, Cicero Nardini; Morais, Rosa Magaly; de Alvarenga, Pedro Gomes; Lopes, Antonio Carlos; Shavitt, Roseli Gedanke; Savage, Cary R; Amaro, Edson; Miguel, Euripedes C; Polanczyk, Guilherme V; Miotto, Eliane C

    2015-10-01

    Patients with obsessive-compulsive disorder (OCD) often present with deficits in episodic memory, and there is evidence that these difficulties may be secondary to executive dysfunction, that is, impaired selection and/or application of memory-encoding strategies (mediation hypothesis). Semantic clustering is an effective strategy to enhance encoding of verbal episodic memory (VEM) when word lists are semantically related. Self-initiated mobilization of this strategy has been associated with increased activity in the prefrontal cortex, particularly the orbitofrontal cortex, a key region in the pathophysiology of OCD. We therefore studied children and adolescents with OCD during uncued semantic clustering strategy application in a VEM functional magnetic resonance imaging (fMRI)-encoding paradigm. A total of 25 pediatric patients with OCD (aged 8.1-17.5 years) and 25 healthy controls (HC, aged 8.1-16.9) matched for age, gender, handedness, and IQ were evaluated using a block design VEM paradigm that manipulated semantically related and unrelated words. The semantic clustering strategy score (SCS) predicted VEM performance in HC (p semantic clustering in OCD. Copyright © 2015 American Academy of Child and Adolescent Psychiatry. Published by Elsevier Inc. All rights reserved.

  3. Components of Sexual Identity

    Science.gov (United States)

    Shively, Michael G.; DeCecco, John P.

    1977-01-01

    This paper examines the four components of sexual identity: biological sex, gender identity, social sex-role, and sexual orientation. Theories about the development of each component and how they combine and conflict to form the individual's sexual identity are discussed. (Author)

  4. Towards Cognitive Component Analysis

    DEFF Research Database (Denmark)

    Hansen, Lars Kai; Ahrendt, Peter; Larsen, Jan

    2005-01-01

    Cognitive component analysis (COCA) is here defined as the process of unsupervised grouping of data such that the ensuing group structure is well-aligned with that resulting from human cognitive activity. We have earlier demonstrated that independent components analysis is relevant for representing...

  5. Research on Error Modelling and Identification of 3 Axis NC Machine Tools Based on Cross Grid Encoder Measurement

    International Nuclear Information System (INIS)

    Du, Z C; Lv, C F; Hong, M S

    2006-01-01

    A new error modelling and identification method based on the cross grid encoder is proposed in this paper. Generally, there are 21 error components in the geometric error of the 3 axis NC machine tools. However according our theoretical analysis, the squareness error among different guide ways affects not only the translation error component, but also the rotational ones. Therefore, a revised synthetic error model is developed. And the mapping relationship between the error component and radial motion error of round workpiece manufactured on the NC machine tools are deduced. This mapping relationship shows that the radial error of circular motion is the comprehensive function result of all the error components of link, worktable, sliding table and main spindle block. Aiming to overcome the solution singularity shortcoming of traditional error component identification method, a new multi-step identification method of error component by using the Cross Grid Encoder measurement technology is proposed based on the kinematic error model of NC machine tool. Firstly, the 12 translational error components of the NC machine tool are measured and identified by using the least square method (LSM) when the NC machine tools go linear motion in the three orthogonal planes: XOY plane, XOZ plane and YOZ plane. Secondly, the circular error tracks are measured when the NC machine tools go circular motion in the same above orthogonal planes by using the cross grid encoder Heidenhain KGM 182. Therefore 9 rotational errors can be identified by using LSM. Finally the experimental validation of the above modelling theory and identification method is carried out in the 3 axis CNC vertical machining centre Cincinnati 750 Arrow. The entire 21 error components have been successfully measured out by the above method. Research shows the multi-step modelling and identification method is very suitable for 'on machine measurement'

  6. Trinary Encoder, Decoder, Multiplexer and Demultiplexer Using Savart Plate and Spatial Light Modulator

    Science.gov (United States)

    Ghosh, Amal K.; Singha Roy, Souradip; Mandal, Sudipta; Basuray, Amitabha

    Optoelectronic processors have already been developed with the strong potentiality of optics in information and data processing. Encoder, Decoder, Multiplexers and Demultiplexers are the most important components in modern system designs and in communications. We have implemented the same using trinary logic gates with signed magnitude defined as Modified Trinary Number (MTN). The Spatial Light Modulator (SLM) based optoelectronic circuit is suitable for high speed data processing and communications using photon as carrier. We also presented here a possible method of implementing the same using light with photon as carrier of information. The importance of the method is that all the basic gates needed may be fabricated based on basic building block.

  7. Abstract probabilistic CNOT gate model based on double encoding: study of the errors and physical realizability

    Science.gov (United States)

    Gueddana, Amor; Attia, Moez; Chatta, Rihab

    2015-03-01

    In this work, we study the error sources standing behind the non-perfect linear optical quantum components composing a non-deterministic quantum CNOT gate model, which performs the CNOT function with a success probability of 4/27 and uses a double encoding technique to represent photonic qubits at the control and the target. We generalize this model to an abstract probabilistic CNOT version and determine the realizability limits depending on a realistic range of the errors. Finally, we discuss physical constraints allowing the implementation of the Asymmetric Partially Polarizing Beam Splitter (APPBS), which is at the heart of correctly realizing the CNOT function.

  8. Grouted Connections with Shear Keys

    DEFF Research Database (Denmark)

    Pedersen, Ronnie; Jørgensen, M. B.; Damkilde, Lars

    2012-01-01

    This paper presents a finite element model in the software package ABAQUS in which a reliable analysis of grouted pile-to-sleeve connections with shear keys is the particular purpose. The model is calibrated to experimental results and a consistent set of input parameters is estimated so that dif...... that different structural problems can be reproduced successfully....

  9. Key to marine arthropod larvae

    Directory of Open Access Journals (Sweden)

    John A. Fornshell

    2012-03-01

    Full Text Available The scope of this key is restricted to the larvae of marine arthropods. The key is based solely on their morphology, patterns of body segmentation, numbers of appendages, and mode of locomotion. An effort has been made to treat all traditionally named larval forms, both planktonic and benthic. It is intended that this key be useful for a researcher working with archived museum specimens and therefore, does not include habitat information as a identifying trait, even though this information is usually available in the archived records. Within the phylum Arthropoda there are two sub-phyla and eleven classes having larval stages in the marineenvironment. Where feasible the original names of the various larval types have been used. Because this nomenclature is less commonly used today compared to the past, the more recent taxonomic affinities are included in parentheses after the original larval name. The key includes the following thirty-four larvae: Branchhiopoda nauplii; Cephalocarida nauplii; Mystacocarida nauplii; trilobite larva; protonymphon; hexapod larvae; Remipedia nauplii; nauplius - Y larvae; Cirripedia nauplii; Ascothoracida nauplii; Ostracoda nauplii; Euphausiacea nauplii; Penaeidea nauplii; Cyclopoida nauplii; Calanoida nauplii; Harpacticoida nauplii;Polyarthra nauplii; cypris larva; eryonecius larva; cypris-Y larva; elapthocaris larvae; mysis larvae; lucifer zoea; acetes zoea; acanthosoma larva; phyllosoma; antizoea larva; anomuran zoea; brachyuran zoea; calyptopis larvae; furcilia larva; crytopia larva; puerulus larva; alima larva.

  10. Symmetric Key Authentication Services Revisited

    NARCIS (Netherlands)

    Crispo, B.; Popescu, B.C.; Tanenbaum, A.S.

    2004-01-01

    Most of the symmetric key authentication schemes deployed today are based on principles introduced by Needham and Schroeder [15] more than twenty years ago. However, since then, the computing environment has evolved from a LAN-based client-server world to include new paradigms, including wide area

  11. Key World Energy Statistics 2012

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2012-07-01

    Key World Energy Statistics contains timely, clearly-presented data on supply, transformation and consumption of all major energy sources. The interested businessman, journalist or student will have at his or her fingertips the annual Canadian production of coal, the electricity consumption in Thailand, the price of diesel oil in Spain and thousands of other useful energy facts.

  12. [Key informers. When and How?].

    Science.gov (United States)

    Martín González, R

    2009-03-01

    When information obtained through duly designed and developed studies is not available, the solution to certain problems that affect the population or that respond to certain questions may be approached by using the information and experience provided by the so-called key informer. The key informer is defined as a person who is in contact with the community or with the problem to be studied, who is considered to have good knowledge of the situation and therefore who is considered an expert. The search for consensus is the basis to obtain information through the key informers. The techniques used have different characteristics based on whether the experts chosen meet together or not, whether they are guided or not, whether they interact with each other or not. These techniques include the survey, the Delphi technique, the nominal group technique, brainwriting, brainstorming, the Phillips 66 technique, the 6-3-5 technique, the community forum and the community impressions technique. Information provided by key informers through the search for consensus is relevant when this is not available or cannot be obtained by other methods. It has permitted the analysis of the existing neurological care model, elaboration of recommendations on visit times for the out-patient neurological care, and the elaboration of guidelines and recommendations for the management of prevalent neurological problems.

  13. The Key to School Security.

    Science.gov (United States)

    Hotle, Dan

    1993-01-01

    In addition to legislative accessibility requirements, other security issues facing school administrators who select a security system include the following: access control; user friendliness; durability or serviceability; life safety precautions; possibility of vandalism, theft, and tampering; and key control. Offers steps to take in considering…

  14. Translating working memory into action: behavioral and neural evidence for using motor representations in encoding visuo-spatial sequences.

    Science.gov (United States)

    Langner, Robert; Sternkopf, Melanie A; Kellermann, Tanja S; Grefkes, Christian; Kurth, Florian; Schneider, Frank; Zilles, Karl; Eickhoff, Simon B

    2014-07-01

    The neurobiological organization of action-oriented working memory is not well understood. To elucidate the neural correlates of translating visuo-spatial stimulus sequences into delayed (memory-guided) sequential actions, we measured brain activity using functional magnetic resonance imaging while participants encoded sequences of four to seven dots appearing on fingers of a left or right schematic hand. After variable delays, sequences were to be reproduced with the corresponding fingers. Recall became less accurate with longer sequences and was initiated faster after long delays. Across both hands, encoding and recall activated bilateral prefrontal, premotor, superior and inferior parietal regions as well as the basal ganglia, whereas hand-specific activity was found (albeit to a lesser degree during encoding) in contralateral premotor, sensorimotor, and superior parietal cortex. Activation differences after long versus short delays were restricted to motor-related regions, indicating that rehearsal during long delays might have facilitated the conversion of the memorandum into concrete motor programs at recall. Furthermore, basal ganglia activity during encoding selectively predicted correct recall. Taken together, the results suggest that to-be-reproduced visuo-spatial sequences are encoded as prospective action representations (motor intentions), possibly in addition to retrospective sensory codes. Overall, our study supports and extends multi-component models of working memory, highlighting the notion that sensory input can be coded in multiple ways depending on what the memorandum is to be used for. Copyright © 2013 Wiley Periodicals, Inc.

  15. Security proof of continuous-variable quantum key distribution using three coherent states

    Science.gov (United States)

    Brádler, Kamil; Weedbrook, Christian

    2018-02-01

    We introduce a ternary quantum key distribution (QKD) protocol and asymptotic security proof based on three coherent states and homodyne detection. Previous work had considered the binary case of two coherent states and here we nontrivially extend this to three. Our motivation is to leverage the practical benefits of both discrete and continuous (Gaussian) encoding schemes creating a best-of-both-worlds approach; namely, the postprocessing of discrete encodings and the hardware benefits of continuous ones. We present a thorough and detailed security proof in the limit of infinite signal states which allows us to lower bound the secret key rate. We calculate this is in the context of collective eavesdropping attacks and reverse reconciliation postprocessing. Finally, we compare the ternary coherent state protocol to other well-known QKD schemes (and fundamental repeaterless limits) in terms of secret key rates and loss.

  16. Distinct medial temporal networks encode surprise during motivation by reward versus punishment

    Science.gov (United States)

    Murty, Vishnu P.; LaBar, Kevin S.; Adcock, R. Alison

    2016-01-01

    Adaptive motivated behavior requires predictive internal representations of the environment, and surprising events are indications for encoding new representations of the environment. The medial temporal lobe memory system, including the hippocampus and surrounding cortex, encodes surprising events and is influenced by motivational state. Because behavior reflects the goals of an individual, we investigated whether motivational valence (i.e., pursuing rewards versus avoiding punishments) also impacts neural and mnemonic encoding of surprising events. During functional magnetic resonance imaging (fMRI), participants encountered perceptually unexpected events either during the pursuit of rewards or avoidance of punishments. Despite similar levels of motivation across groups, reward and punishment facilitated the processing of surprising events in different medial temporal lobe regions. Whereas during reward motivation, perceptual surprises enhanced activation in the hippocampus, during punishment motivation surprises instead enhanced activation in parahippocampal cortex. Further, we found that reward motivation facilitated hippocampal coupling with ventromedial PFC, whereas punishment motivation facilitated parahippocampal cortical coupling with orbitofrontal cortex. Behaviorally, post-scan testing revealed that reward, but not punishment, motivation resulted in greater memory selectivity for surprising events encountered during goal pursuit. Together these findings demonstrate that neuromodulatory systems engaged by anticipation of reward and punishment target separate components of the medial temporal lobe, modulating medial temporal lobe sensitivity and connectivity. Thus, reward and punishment motivation yield distinct neural contexts for learning, with distinct consequences for how surprises are incorporated into predictive mnemonic models of the environment. PMID:26854903

  17. From reference to sense: how the brain encodes meaning for speaking

    Directory of Open Access Journals (Sweden)

    Laura eMenenti

    2012-01-01

    Full Text Available In speaking, semantic encoding is the conversion of a nonverbal mental representation (the reference into a semantic structure suitable for expression (the sense. In this fMRI study on sentence production we investigate how the speaking brain accomplishes this transition from nonverbal to verbal representations. In an overt picture description task, we manipulated repetition of sense (the semantic structure of the sentence and reference (the described situation separately. By investigating brain areas showing response adaptation to repetition of each of these sentence properties, we disentangle the neuronal infrastructure for these two components of semantic encoding. We also performed a control experiment with the same stimuli and design but without any linguistic task to identify areas involved in perception of the stimuli per se. The bilateral inferior parietal lobes were selectively sensitive to repetition of reference, while left inferior frontal gyrus showed selective suppression to repetition of sense. Strikingly, a widespread network of areas associated with language processing (left middle frontal gyrus, bilateral superior parietal lobes and bilateral posterior temporal gyri all showed repetition suppression to both sense and reference processing. These areas are probably involved in mapping reference onto sense, the crucial step in semantic encoding. These results enable us to track the transition from nonverbal to verbal representations in our brains.

  18. Distinct medial temporal networks encode surprise during motivation by reward versus punishment.

    Science.gov (United States)

    Murty, Vishnu P; LaBar, Kevin S; Adcock, R Alison

    2016-10-01

    Adaptive motivated behavior requires predictive internal representations of the environment, and surprising events are indications for encoding new representations of the environment. The medial temporal lobe memory system, including the hippocampus and surrounding cortex, encodes surprising events and is influenced by motivational state. Because behavior reflects the goals of an individual, we investigated whether motivational valence (i.e., pursuing rewards versus avoiding punishments) also impacts neural and mnemonic encoding of surprising events. During functional magnetic resonance imaging (fMRI), participants encountered perceptually unexpected events either during the pursuit of rewards or avoidance of punishments. Despite similar levels of motivation across groups, reward and punishment facilitated the processing of surprising events in different medial temporal lobe regions. Whereas during reward motivation, perceptual surprises enhanced activation in the hippocampus, during punishment motivation surprises instead enhanced activation in parahippocampal cortex. Further, we found that reward motivation facilitated hippocampal coupling with ventromedial PFC, whereas punishment motivation facilitated parahippocampal cortical coupling with orbitofrontal cortex. Behaviorally, post-scan testing revealed that reward, but not punishment, motivation resulted in greater memory selectivity for surprising events encountered during goal pursuit. Together these findings demonstrate that neuromodulatory systems engaged by anticipation of reward and punishment target separate components of the medial temporal lobe, modulating medial temporal lobe sensitivity and connectivity. Thus, reward and punishment motivation yield distinct neural contexts for learning, with distinct consequences for how surprises are incorporated into predictive mnemonic models of the environment. Copyright © 2016 Elsevier Inc. All rights reserved.

  19. The reference frame for encoding and retention of motion depends on stimulus set size.

    Science.gov (United States)

    Huynh, Duong; Tripathy, Srimant P; Bedell, Harold E; Öğmen, Haluk

    2017-04-01

    The goal of this study was to investigate the reference frames used in perceptual encoding and storage of visual motion information. In our experiments, observers viewed multiple moving objects and reported the direction of motion of a randomly selected item. Using a vector-decomposition technique, we computed performance during smooth pursuit with respect to a spatiotopic (nonretinotopic) and to a retinotopic component and compared them with performance during fixation, which served as the baseline. For the stimulus encoding stage, which precedes memory, we found that the reference frame depends on the stimulus set size. For a single moving target, the spatiotopic reference frame had the most significant contribution with some additional contribution from the retinotopic reference frame. When the number of items increased (Set Sizes 3 to 7), the spatiotopic reference frame was able to account for the performance. Finally, when the number of items became larger than 7, the distinction between reference frames vanished. We interpret this finding as a switch to a more abstract nonmetric encoding of motion direction. We found that the retinotopic reference frame was not used in memory. Taken together with other studies, our results suggest that, whereas a retinotopic reference frame may be employed for controlling eye movements, perception and memory use primarily nonretinotopic reference frames. Furthermore, the use of nonretinotopic reference frames appears to be capacity limited. In the case of complex stimuli, the visual system may use perceptual grouping in order to simplify the complexity of stimuli or resort to a nonmetric abstract coding of motion information.

  20. Characterization of Sensitivity Encoded Silicon Photomultiplier (SeSP) with 1-Dimensional and 2-Dimensional Encoding for High Resolution PET/MR

    Science.gov (United States)

    Omidvari, Negar; Schulz, Volkmar

    2015-06-01

    This paper evaluates the performance of a new type of PET detectors called sensitivity encoded silicon photomultiplier (SeSP), which allows a direct coupling of small-pitch crystal arrays to the detector with a reduction in the number of readout channels. Four SeSP devices with two separate encoding schemes of 1D and 2D were investigated in this study. Furthermore, both encoding schemes were manufactured in two different sizes of 4 ×4 mm2 and 7. 73 ×7. 9 mm2, in order to investigate the effect of size on detector parameters. All devices were coupled to LYSO crystal arrays with 1 mm pitch size and 10 mm height, with optical isolation between crystals. The characterization was done for the key parameters of crystal-identification, energy resolution, and time resolution as a function of triggering threshold and over-voltage (OV). Position information was archived using the center of gravity (CoG) algorithm and a least squares approach (LSQA) in combination with a mean light matrix around the photo-peak. The positioning results proved the capability of all four SeSP devices in precisely identifying all crystals coupled to the sensors. Energy resolution was measured at different bias voltages, varying from 12% to 18% (FWHM) and paired coincidence time resolution (pCTR) of 384 ps to 1.1 ns was obtained for different SeSP devices at about 18 °C room temperature. However, the best time resolution was achieved at the highest over-voltage, resulting in a noise ratio of 99.08%.