WorldWideScience

Sample records for hash function md-192

  1. Cryptanalysis of an Iterated Halving-based hash function: CRUSH

    DEFF Research Database (Denmark)

    Bagheri, Nasour; Henricksen, Matt; Knudsen, Lars Ramkilde

    2009-01-01

    Iterated Halving has been suggested as a replacement to the Merkle–Damgård (MD) construction in 2004 anticipating the attacks on the MDx family of hash functions. The CRUSH hash function provides a specific instantiation of the block cipher for Iterated Halving. The authors identify structural pr...

  2. The suffix-free-prefix-free hash function construction and its indifferentiability security analysis

    DEFF Research Database (Denmark)

    Bagheri, Nasour; Gauravaram, Praveen; Knudsen, Lars R.

    2012-01-01

    In this paper, we observe that in the seminal work on indifferentiability analysis of iterated hash functions by Coron et al. and in subsequent works, the initial value $$(IV)$$ of hash functions is fixed. In addition, these indifferentiability results do not depend on the Merkle–Damgård (MD) str...

  3. Cryptanalysis of MD2

    DEFF Research Database (Denmark)

    Knudsen, Lars Ramkilde; Mathiassen, John Erik; Muller, Frédéric

    2010-01-01

    This paper considers the hash function MD2 which was developed by Ron Rivest in 1989. Despite its age, MD2 has withstood cryptanalytic attacks until recently. This paper contains the state-of-the-art cryptanalytic results on MD2, in particular collision and preimage attacks on the full hash...

  4. Perceptual Audio Hashing Functions

    Directory of Open Access Journals (Sweden)

    Emin Anarım

    2005-07-01

    Full Text Available Perceptual hash functions provide a tool for fast and reliable identification of content. We present new audio hash functions based on summarization of the time-frequency spectral characteristics of an audio document. The proposed hash functions are based on the periodicity series of the fundamental frequency and on singular-value description of the cepstral frequencies. They are found, on one hand, to perform very satisfactorily in identification and verification tests, and on the other hand, to be very resilient to a large variety of attacks. Moreover, we address the issue of security of hashes and propose a keying technique, and thereby a key-dependent hash function.

  5. The Usefulness of Multilevel Hash Tables with Multiple Hash Functions in Large Databases

    Directory of Open Access Journals (Sweden)

    A.T. Akinwale

    2009-05-01

    Full Text Available In this work, attempt is made to select three good hash functions which uniformly distribute hash values that permute their internal states and allow the input bits to generate different output bits. These functions are used in different levels of hash tables that are coded in Java Programming Language and a quite number of data records serve as primary data for testing the performances. The result shows that the two-level hash tables with three different hash functions give a superior performance over one-level hash table with two hash functions or zero-level hash table with one function in term of reducing the conflict keys and quick lookup for a particular element. The result assists to reduce the complexity of join operation in query language from O( n2 to O( 1 by placing larger query result, if any, in multilevel hash tables with multiple hash functions and generate shorter query result.

  6. Proposals for Iterated Hash Functions

    DEFF Research Database (Denmark)

    Knudsen, Lars Ramkilde; Thomsen, Søren Steffen

    2008-01-01

    The past few years have seen an increase in the number of attacks on cryptographic hash functions. These include attacks directed at specific hash functions, and generic attacks on the typical method of constructing hash functions. In this paper we discuss possible methods for protecting against...... some generic attacks. We also give a concrete proposal for a new hash function construction, given a secure compression function which, unlike in typical existing constructions, is not required to be resistant to all types of collisions. Finally, we show how members of the SHA-family can be turned...

  7. Proposals for iterated hash functions

    DEFF Research Database (Denmark)

    Knudsen, Lars Ramkilde; Thomsen, Søren Steffen

    2006-01-01

    The past few years have seen an increase in the number of attacks on cryptographic hash functions. These include attacks directed at specific hash functions, and generic attacks on the typical method of constructing hash functions. In this paper we discuss possible methods for protecting against...... some generic attacks. We also give a concrete proposal for a new hash function construction, given a secure compression function which, unlike in typical existing constructions, is not required to be resistant to all types of collisions. Finally, we show how members of the SHA-family can be turned...

  8. Security Analysis of Randomize-Hash-then-Sign Digital Signatures

    DEFF Research Database (Denmark)

    Gauravaram, Praveen; Knudsen, Lars Ramkilde

    2012-01-01

    At CRYPTO 2006, Halevi and Krawczyk proposed two randomized hash function modes and analyzed the security of digital signature algorithms based on these constructions. They showed that the security of signature schemes based on the two randomized hash function modes relies on properties similar...... functions, such as for the Davies-Meyer construction used in the popular hash functions such as MD5 designed by Rivest and the SHA family of hash functions designed by the National Security Agency (NSA), USA and published by NIST in the Federal Information Processing Standards (FIPS). We show an online...... 800-106. We discuss some important applications of our attacks and discuss their applicability on signature schemes based on hash functions with ‘built-in’ randomization. Finally, we compare our attacks on randomize-hash-then-sign schemes with the generic forgery attacks on the standard hash...

  9. The Grindahl Hash Functions

    DEFF Research Database (Denmark)

    Knudsen, Lars Ramkilde; Rechberger, Christian; Thomsen, Søren Steffen

    2007-01-01

    to the state. We propose two concrete hash functions, Grindahl-256 and Grindahl-512 with claimed security levels with respect to collision, preimage and second preimage attacks of 2^128 and 2^256, respectively. Both proposals have lower memory requirements than other hash functions at comparable speeds...

  10. Construction of secure and fast hash functions using nonbinary error-correcting codes

    DEFF Research Database (Denmark)

    Knudsen, Lars Ramkilde; Preneel, Bart

    2002-01-01

    constructions based on block ciphers such as the Data Encryption Standard (DES), where the key size is slightly smaller than the block size; IDEA, where the key size is twice the block size; Advanced Encryption Standard (AES), with a variable key size; and to MD4-like hash functions. Under reasonable...

  11. DEVELOPMENT AND IMPLEMENTATION OF HASH FUNCTION FOR GENERATING HASHED MESSAGE

    Directory of Open Access Journals (Sweden)

    Amir Ghaeedi

    2016-09-01

    Full Text Available Steganography is a method of sending confidential information in a way that the existence of the channel in this communication remains secret. A collaborative approach between steganography and digital signature provides a high secure hidden data. Unfortunately, there are wide varieties of attacks that affect the quality of image steganography. Two issues that required to be addressed are large size of the ciphered data in digital signature and high bandwidth. The aim of the research is to propose a new method for producing a dynamic hashed message algorithm in digital signature and then embedded into image for enhancing robustness of image steganography with reduced bandwidth. A digital signature with smaller hash size than other hash algorithms was developed for authentication purposes. A hash function is used in the digital signature generation. The encoder function encoded the hashed message to generate the digital signature and then embedded into an image as a stego-image. In enhancing the robustness of the digital signature, we compressed or encoded it or performed both operations before embedding the data into the image. This encryption algorithm is also computationally efficient whereby for messages with the sizes less than 1600 bytes, the hashed file reduced the original file up to 8.51%.

  12. On hash functions using checksums

    DEFF Research Database (Denmark)

    Gauravaram, Praveen; Kelsey, John; Knudsen, Lars Ramkilde

    2010-01-01

    We analyse the security of iterated hash functions that compute an input dependent checksum which is processed as part of the hash computation. We show that a large class of such schemes, including those using non-linear or even one-way checksum functions, is not secure against the second preimag...

  13. On hash functions using checksums

    DEFF Research Database (Denmark)

    Gauravaram, Praveen; Kelsey, John; Knudsen, Lars Ramkilde

    2008-01-01

    We analyse the security of iterated hash functions that compute an input dependent checksum which is processed as part of the hash computation. We show that a large class of such schemes, including those using non-linear or even one-way checksum functions, is not secure against the second preimag...

  14. The hash function BLAKE

    CERN Document Server

    Aumasson, Jean-Philippe; Phan, Raphael; Henzen, Luca

    2014-01-01

    This is a comprehensive description of the cryptographic hash function BLAKE, one of the five final contenders in the NIST SHA3 competition, and of BLAKE2, an improved version popular among developers. It describes how BLAKE was designed and why BLAKE2 was developed, and it offers guidelines on implementing and using BLAKE, with a focus on software implementation.   In the first two chapters, the authors offer a short introduction to cryptographic hashing, the SHA3 competition, and BLAKE. They review applications of cryptographic hashing, they describe some basic notions such as security de

  15. Spongent: A lightweight hash function

    DEFF Research Database (Denmark)

    Bogdanov, Andrey; Knežević, Miroslav; Leander, Gregor

    2011-01-01

    This paper proposes spongent - a family of lightweight hash functions with hash sizes of 88 (for preimage resistance only), 128, 160, 224, and 256 bits based on a sponge construction instantiated with a present-type permutation, following the hermetic sponge strategy. Its smallest implementations...

  16. Cryptanalysis of Tav-128 hash function

    DEFF Research Database (Denmark)

    Kumar, Ashish; Sanadhya, Somitra Kumar; Gauravaram, Praveen

    2010-01-01

    Many RFID protocols use cryptographic hash functions for their security. The resource constrained nature of RFID systems forces the use of light weight cryptographic algorithms. Tav-128 is one such 128-bit light weight hash function proposed by Peris-Lopez et al. for a low-cost RFID tag authentic...

  17. Cryptographic Hash Functions

    DEFF Research Database (Denmark)

    Gauravaram, Praveen; Knudsen, Lars Ramkilde

    2010-01-01

    functions, also called message authentication codes (MACs) serve data integrity and data origin authentication in the secret key setting. The building blocks of hash functions can be designed using block ciphers, modular arithmetic or from scratch. The design principles of the popular Merkle...

  18. Hash function based on chaotic map lattices.

    Science.gov (United States)

    Wang, Shihong; Hu, Gang

    2007-06-01

    A new hash function system, based on coupled chaotic map dynamics, is suggested. By combining floating point computation of chaos and some simple algebraic operations, the system reaches very high bit confusion and diffusion rates, and this enables the system to have desired statistical properties and strong collision resistance. The chaos-based hash function has its advantages for high security and fast performance, and it serves as one of the most highly competitive candidates for practical applications of hash function for software realization and secure information communications in computer networks.

  19. Incremental cryptography and security of public hash functions ...

    African Journals Online (AJOL)

    An investigation of incremental algorithms for crytographic functions was initiated. The problem, for collision-free hashing, is to design a scheme for which there exists an efficient “update” algorithm: this algorithm is given the hash function H, the hash h = H(M) of message M and the “replacement request” (j, m), and outputs ...

  20. Chaos-based hash function (CBHF) for cryptographic applications

    International Nuclear Information System (INIS)

    Amin, Mohamed; Faragallah, Osama S.; Abd El-Latif, Ahmed A.

    2009-01-01

    As the core of cryptography, hash is the basic technique for information security. Many of the hash functions generate the message digest through a randomizing process of the original message. Subsequently, a chaos system also generates a random behavior, but at the same time a chaos system is completely deterministic. In this paper, an algorithm for one-way hash function construction based on chaos theory is introduced. Theoretical analysis and computer simulation indicate that the algorithm can satisfy all performance requirements of hash function in an efficient and flexible manner and secure against birthday attacks or meet-in-the-middle attacks, which is good choice for data integrity or authentication.

  1. Chaos-based hash function (CBHF) for cryptographic applications

    Energy Technology Data Exchange (ETDEWEB)

    Amin, Mohamed [Dept. of Mathematics and Computer Science, Faculty of Science, Menoufia University, Shebin El-Koom 32511 (Egypt)], E-mail: mamin04@yahoo.com; Faragallah, Osama S. [Dept. of Computer Science and Engineering, Faculty of Electronic Engineering, Menoufia University, Menouf 32952 (Egypt)], E-mail: osam_sal@yahoo.com; Abd El-Latif, Ahmed A. [Dept. of Mathematics and Computer Science, Faculty of Science, Menoufia University, Shebin El-Koom 32511 (Egypt)], E-mail: ahmed_rahiem@yahoo.com

    2009-10-30

    As the core of cryptography, hash is the basic technique for information security. Many of the hash functions generate the message digest through a randomizing process of the original message. Subsequently, a chaos system also generates a random behavior, but at the same time a chaos system is completely deterministic. In this paper, an algorithm for one-way hash function construction based on chaos theory is introduced. Theoretical analysis and computer simulation indicate that the algorithm can satisfy all performance requirements of hash function in an efficient and flexible manner and secure against birthday attacks or meet-in-the-middle attacks, which is good choice for data integrity or authentication.

  2. Parallel keyed hash function construction based on chaotic maps

    International Nuclear Information System (INIS)

    Xiao Di; Liao Xiaofeng; Deng Shaojiang

    2008-01-01

    Recently, a variety of chaos-based hash functions have been proposed. Nevertheless, none of them works efficiently in parallel computing environment. In this Letter, an algorithm for parallel keyed hash function construction is proposed, whose structure can ensure the uniform sensitivity of hash value to the message. By means of the mechanism of both changeable-parameter and self-synchronization, the keystream establishes a close relation with the algorithm key, the content and the order of each message block. The entire message is modulated into the chaotic iteration orbit, and the coarse-graining trajectory is extracted as the hash value. Theoretical analysis and computer simulation indicate that the proposed algorithm can satisfy the performance requirements of hash function. It is simple, efficient, practicable, and reliable. These properties make it a good choice for hash on parallel computing platform

  3. Cryptanalysis of Tav-128 hash function

    DEFF Research Database (Denmark)

    Many RFID protocols use cryptographic hash functions for their security. The resource constrained nature of RFID systems forces the use of light weight cryptographic algorithms. Tav-128 is one such 128-bit light weight hash function proposed by Peris-Lopez et al. for a low-cost RFID tag...... authentication protocol. Apart from some statistical tests for randomness by the designers themselves, Tav-128 has not undergone any other thorough security analysis. Based on these tests, the designers claimed that Tav-128 does not posses any trivial weaknesses. In this article, we carry out the first third...... party security analysis of Tav-128 and show that this hash function is neither collision resistant nor second preimage resistant. Firstly, we show a practical collision attack on Tav-128 having a complexity of 237 calls to the compression function and produce message pairs of arbitrary length which...

  4. Collision analysis of one kind of chaos-based hash function

    International Nuclear Information System (INIS)

    Xiao Di; Peng Wenbing; Liao Xiaofeng; Xiang Tao

    2010-01-01

    In the last decade, various chaos-based hash functions have been proposed. Nevertheless, the corresponding analyses of them lag far behind. In this Letter, we firstly take a chaos-based hash function proposed very recently in Amin, Faragallah and Abd El-Latif (2009) as a sample to analyze its computational collision problem, and then generalize the construction method of one kind of chaos-based hash function and summarize some attentions to avoid the collision problem. It is beneficial to the hash function design based on chaos in the future.

  5. One-way hash function construction based on the spatiotemporal chaotic system

    International Nuclear Information System (INIS)

    Luo Yu-Ling; Du Ming-Hui

    2012-01-01

    Based on the spatiotemporal chaotic system, a novel algorithm for constructing a one-way hash function is proposed and analysed. The message is divided into fixed length blocks. Each message block is processed by the hash compression function in parallel. The hash compression is constructed based on the spatiotemporal chaos. In each message block, the ASCII code and its position in the whole message block chain constitute the initial conditions and the key of the hash compression function. The final hash value is generated by further compressing the mixed result of all the hash compression values. Theoretic analyses and numerical simulations show that the proposed algorithm presents high sensitivity to the message and key, good statistical properties, and strong collision resistance. (general)

  6. Final report for LDRD Project 93633 : new hash function for data protection.

    Energy Technology Data Exchange (ETDEWEB)

    Draelos, Timothy John; Dautenhahn, Nathan; Schroeppel, Richard Crabtree; Tolk, Keith Michael; Orman, Hilarie (PurpleStreak, Inc.); Walker, Andrea Mae; Malone, Sean; Lee, Eric; Neumann, William Douglas; Cordwell, William R.; Torgerson, Mark Dolan; Anderson, Eric; Lanzone, Andrew J.; Collins, Michael Joseph; McDonald, Timothy Scott; Caskey, Susan Adele

    2009-03-01

    The security of the widely-used cryptographic hash function SHA1 has been impugned. We have developed two replacement hash functions. The first, SHA1X, is a drop-in replacement for SHA1. The second, SANDstorm, has been submitted as a candidate to the NIST-sponsored SHA3 Hash Function competition.

  7. One-way hash function based on hyper-chaotic cellular neural network

    International Nuclear Information System (INIS)

    Yang Qunting; Gao Tiegang

    2008-01-01

    The design of an efficient one-way hash function with good performance is a hot spot in modern cryptography researches. In this paper, a hash function construction method based on cell neural network with hyper-chaos characteristics is proposed. First, the chaos sequence is gotten by iterating cellular neural network with Runge–Kutta algorithm, and then the chaos sequence is iterated with the message. The hash code is obtained through the corresponding transform of the latter chaos sequence. Simulation and analysis demonstrate that the new method has the merit of convenience, high sensitivity to initial values, good hash performance, especially the strong stability. (general)

  8. Hash function based on piecewise nonlinear chaotic map

    International Nuclear Information System (INIS)

    Akhavan, A.; Samsudin, A.; Akhshani, A.

    2009-01-01

    Chaos-based cryptography appeared recently in the early 1990s as an original application of nonlinear dynamics in the chaotic regime. In this paper, an algorithm for one-way hash function construction based on piecewise nonlinear chaotic map with a variant probability parameter is proposed. Also the proposed algorithm is an attempt to present a new chaotic hash function based on multithreaded programming. In this chaotic scheme, the message is connected to the chaotic map using probability parameter and other parameters of chaotic map such as control parameter and initial condition, so that the generated hash value is highly sensitive to the message. Simulation results indicate that the proposed algorithm presented several interesting features, such as high flexibility, good statistical properties, high key sensitivity and message sensitivity. These properties make the scheme a suitable choice for practical applications.

  9. Gene function prediction based on Gene Ontology Hierarchy Preserving Hashing.

    Science.gov (United States)

    Zhao, Yingwen; Fu, Guangyuan; Wang, Jun; Guo, Maozu; Yu, Guoxian

    2018-02-23

    Gene Ontology (GO) uses structured vocabularies (or terms) to describe the molecular functions, biological roles, and cellular locations of gene products in a hierarchical ontology. GO annotations associate genes with GO terms and indicate the given gene products carrying out the biological functions described by the relevant terms. However, predicting correct GO annotations for genes from a massive set of GO terms as defined by GO is a difficult challenge. To combat with this challenge, we introduce a Gene Ontology Hierarchy Preserving Hashing (HPHash) based semantic method for gene function prediction. HPHash firstly measures the taxonomic similarity between GO terms. It then uses a hierarchy preserving hashing technique to keep the hierarchical order between GO terms, and to optimize a series of hashing functions to encode massive GO terms via compact binary codes. After that, HPHash utilizes these hashing functions to project the gene-term association matrix into a low-dimensional one and performs semantic similarity based gene function prediction in the low-dimensional space. Experimental results on three model species (Homo sapiens, Mus musculus and Rattus norvegicus) for interspecies gene function prediction show that HPHash performs better than other related approaches and it is robust to the number of hash functions. In addition, we also take HPHash as a plugin for BLAST based gene function prediction. From the experimental results, HPHash again significantly improves the prediction performance. The codes of HPHash are available at: http://mlda.swu.edu.cn/codes.php?name=HPHash. Copyright © 2018 Elsevier Inc. All rights reserved.

  10. Improving the security of a parallel keyed hash function based on chaotic maps

    Energy Technology Data Exchange (ETDEWEB)

    Xiao Di, E-mail: xiaodi_cqu@hotmail.co [College of Computer Science and Engineering, Chongqing University, Chongqing 400044 (China); Liao Xiaofeng [College of Computer Science and Engineering, Chongqing University, Chongqing 400044 (China); Wang Yong [College of Computer Science and Engineering, Chongqing University, Chongqing 400044 (China)] [College of Economy and Management, Chongqing University of Posts and Telecommunications, Chongqing 400065 (China)

    2009-11-23

    In this Letter, we analyze the cause of vulnerability of the original parallel keyed hash function based on chaotic maps in detail, and then propose the corresponding enhancement measures. Theoretical analysis and computer simulation indicate that the modified hash function is more secure than the original one. At the same time, it can keep the parallel merit and satisfy the other performance requirements of hash function.

  11. Improving the security of a parallel keyed hash function based on chaotic maps

    International Nuclear Information System (INIS)

    Xiao Di; Liao Xiaofeng; Wang Yong

    2009-01-01

    In this Letter, we analyze the cause of vulnerability of the original parallel keyed hash function based on chaotic maps in detail, and then propose the corresponding enhancement measures. Theoretical analysis and computer simulation indicate that the modified hash function is more secure than the original one. At the same time, it can keep the parallel merit and satisfy the other performance requirements of hash function.

  12. Authentication codes from ε-ASU hash functions with partially secret keys

    NARCIS (Netherlands)

    Liu, S.L.; Tilborg, van H.C.A.; Weng, J.; Chen, Kefei

    2014-01-01

    An authentication code can be constructed with a family of e-Almost strong universal (e-ASU) hash functions, with the index of hash functions as the authentication key. This paper considers the performance of authentication codes from e-ASU, when the authentication key is only partially secret. We

  13. The FPGA realization of the general cellular automata based cryptographic hash functions: Performance and effectiveness

    Directory of Open Access Journals (Sweden)

    P. G. Klyucharev

    2014-01-01

    Full Text Available In the paper the author considers hardware implementation of the GRACE-H family general cellular automata based cryptographic hash functions. VHDL is used as a language and Altera FPGA as a platform for hardware implementation. Performance and effectiveness of the FPGA implementations of GRACE-H hash functions were compared with Keccak (SHA-3, SHA-256, BLAKE, Groestl, JH, Skein hash functions. According to the performed tests, performance of the hardware implementation of GRACE-H family hash functions significantly (up to 12 times exceeded performance of the hardware implementation of previously known hash functions, and effectiveness of that hardware implementation was also better (up to 4 times.

  14. Cache-Oblivious Hashing

    DEFF Research Database (Denmark)

    Pagh, Rasmus; Wei, Zhewei; Yi, Ke

    2014-01-01

    The hash table, especially its external memory version, is one of the most important index structures in large databases. Assuming a truly random hash function, it is known that in a standard external hash table with block size b, searching for a particular key only takes expected average t q =1...

  15. One-way hash function construction based on chaotic map network

    International Nuclear Information System (INIS)

    Yang Huaqian; Wong, K.-W.; Liao Xiaofeng; Wang Yong; Yang Degang

    2009-01-01

    A novel chaotic hash algorithm based on a network structure formed by 16 chaotic maps is proposed. The original message is first padded with zeros to make the length a multiple of four. Then it is divided into a number of blocks each contains 4 bytes. In the hashing process, the blocks are mixed together by the chaotic map network since the initial value and the control parameter of each tent map are dynamically determined by the output of its neighbors. To enhance the confusion and diffusion effect, the cipher block chaining (CBC) mode is adopted in the algorithm. Theoretic analyses and numerical simulations both show that the proposed hash algorithm possesses good statistical properties, strong collision resistance and high flexibility, as required by practical keyed hash functions.

  16. Hash function construction using weighted complex dynamical networks

    International Nuclear Information System (INIS)

    Song Yu-Rong; Jiang Guo-Ping

    2013-01-01

    A novel scheme to construct a hash function based on a weighted complex dynamical network (WCDN) generated from an original message is proposed in this paper. First, the original message is divided into blocks. Then, each block is divided into components, and the nodes and weighted edges are well defined from these components and their relations. Namely, the WCDN closely related to the original message is established. Furthermore, the node dynamics of the WCDN are chosen as a chaotic map. After chaotic iterations, quantization and exclusive-or operations, the fixed-length hash value is obtained. This scheme has the property that any tiny change in message can be diffused rapidly through the WCDN, leading to very different hash values. Analysis and simulation show that the scheme possesses good statistical properties, excellent confusion and diffusion, strong collision resistance and high efficiency. (general)

  17. Cryptanalysis of Lin et al.'s Efficient Block-Cipher-Based Hash Function

    NARCIS (Netherlands)

    Liu, Bozhong; Gong, Zheng; Chen, Xiaohong; Qiu, Weidong; Zheng, Dong

    2010-01-01

    Hash functions are widely used in authentication. In this paper, the security of Lin et al.'s efficient block-cipher-based hash function is reviewed. By using Joux's multicollisions and Kelsey et al.'s expandable message techniques, we find the scheme is vulnerable to collision, preimage and second

  18. On Randomizing Hash Functions to Strengthen the Security of Digital Signatures

    DEFF Research Database (Denmark)

    Halevi and Krawczyk proposed a message randomization algorithm called RMX as a front-end tool to the hash-then-sign digital signature schemes such as DSS and RSA in order to free their reliance on the collision resistance property of the hash functions. They have shown that to forge a RMX-hash-th...... that use Davies-Meyer schemes and a variant of RMX published by NIST in its Draft Special Publication (SP) 800-106. We discuss some important applications of our attack....

  19. On randomizing hash functions to strengthen the security of digital signatures

    DEFF Research Database (Denmark)

    Gauravaram, Praveen; Knudsen, Lars Ramkilde

    2009-01-01

    Halevi and Krawczyk proposed a message randomization algorithm called RMX as a front-end tool to the hash-then-sign digital signature schemes such as DSS and RSA in order to free their reliance on the collision resistance property of the hash functions. They have shown that to forge a RMX-hash-th...... schemes that use Davies-Meyer schemes and a variant of RMX published by NIST in its Draft Special Publication (SP) 800-106. We discuss some important applications of our attack....

  20. Large-Scale Unsupervised Hashing with Shared Structure Learning.

    Science.gov (United States)

    Liu, Xianglong; Mu, Yadong; Zhang, Danchen; Lang, Bo; Li, Xuelong

    2015-09-01

    Hashing methods are effective in generating compact binary signatures for images and videos. This paper addresses an important open issue in the literature, i.e., how to learn compact hash codes by enhancing the complementarity among different hash functions. Most of prior studies solve this problem either by adopting time-consuming sequential learning algorithms or by generating the hash functions which are subject to some deliberately-designed constraints (e.g., enforcing hash functions orthogonal to one another). We analyze the drawbacks of past works and propose a new solution to this problem. Our idea is to decompose the feature space into a subspace shared by all hash functions and its complementary subspace. On one hand, the shared subspace, corresponding to the common structure across different hash functions, conveys most relevant information for the hashing task. Similar to data de-noising, irrelevant information is explicitly suppressed during hash function generation. On the other hand, in case that the complementary subspace also contains useful information for specific hash functions, the final form of our proposed hashing scheme is a compromise between these two kinds of subspaces. To make hash functions not only preserve the local neighborhood structure but also capture the global cluster distribution of the whole data, an objective function incorporating spectral embedding loss, binary quantization loss, and shared subspace contribution is introduced to guide the hash function learning. We propose an efficient alternating optimization method to simultaneously learn both the shared structure and the hash functions. Experimental results on three well-known benchmarks CIFAR-10, NUS-WIDE, and a-TRECVID demonstrate that our approach significantly outperforms state-of-the-art hashing methods.

  1. Constructing a one-way hash function based on the unified chaotic system

    International Nuclear Information System (INIS)

    Long Min; Peng Fei; Chen Guanrong

    2008-01-01

    A new one-way hash function based on the unified chaotic system is constructed. With different values of a key parameter, the unified chaotic system represents different chaotic systems, based on which the one-way hash function algorithm is constructed with three round operations and an initial vector on an input message. In each round operation, the parameters are processed by three different chaotic systems generated from the unified chaotic system. Feed-forwards are used at the end of each round operation and at the end of each element of the message processing. Meanwhile, in each round operation, parameter-exchanging operations are implemented. Then, the hash value of length 160 bits is obtained from the last six parameters. Simulation and analysis both demonstrate that the algorithm has great flexibility, satisfactory hash performance, weak collision property, and high security. (general)

  2. Design and implementation of an ASIP-based cryptography processor for AES, IDEA, and MD5

    Directory of Open Access Journals (Sweden)

    Karim Shahbazi

    2017-08-01

    Full Text Available In this paper, a new 32-bit ASIP-based crypto processor for AES, IDEA, and MD5 is designed. The instruction-set consists of both general purpose and specific instructions for the above cryptographic algorithms. The proposed architecture has nine function units and two data buses. It has also two types of 32-bit instruction formats for executing Memory Reference (M.R., Register Reference (R.R., and Input/Output Reference (I/O R. instructions. The maximum achieved frequency is 166.916 MHz. The encoded output results of the encryption process of a 128-bit input block are obtained after 122, 146 and 170 clock cycles for AES-128, AES-192, and AES-256, respectively. Moreover, it takes 95 clock cycles to encrypt or decrypt a 64-bit input block by using IDEA. Finally, the MD5 hash algorithm requires 469 clock cycles to generate the coded outputs for a block of 512 bits. The performance of the proposed processor is compared to some previous and state-of-the-art implementations in terms of speed, latency, throughput, and flexibility.

  3. Internal differential collision attacks on the reduced-round Grøstl-0 hash function

    DEFF Research Database (Denmark)

    Ideguchi, Kota; Tischhauser, Elmar Wolfgang; Preneel, Bart

    2014-01-01

    . This results in collision attacks and semi-free-start collision attacks on the Grøstl-0 hash function and compression function with reduced rounds. Specifically, we show collision attacks on the Grøstl-0-256 hash function reduced to 5 and 6 out of 10 rounds with time complexities 248 and 2112 and on the Grøstl......-0-512 hash function reduced to 6 out of 14 rounds with time complexity 2183. Furthermore, we demonstrate semi-free-start collision attacks on the Grøstl-0-256 compression function reduced to 8 rounds and the Grøstl-0-512 compression function reduced to 9 rounds. Finally, we show improved...

  4. A novel method for one-way hash function construction based on spatiotemporal chaos

    Energy Technology Data Exchange (ETDEWEB)

    Ren Haijun [College of Software Engineering, Chongqing University, Chongqing 400044 (China); State Key Laboratory of Power Transmission Equipment and System Security and New Technology, Chongqing University, Chongqing 400044 (China)], E-mail: jhren@cqu.edu.cn; Wang Yong; Xie Qing [Key Laboratory of Electronic Commerce and Logistics of Chongqing, Chongqing University of Posts and Telecommunications, Chongqing 400065 (China); Yang Huaqian [Department of Computer and Modern Education Technology, Chongqing Education of College, Chongqing 400067 (China)

    2009-11-30

    A novel hash algorithm based on a spatiotemporal chaos is proposed. The original message is first padded with zeros if needed. Then it is divided into a number of blocks each contains 32 bytes. In the hashing process, each block is partitioned into eight 32-bit values and input into the spatiotemporal chaotic system. Then, after iterating the system for four times, the next block is processed by the same way. To enhance the confusion and diffusion effect, the cipher block chaining (CBC) mode is adopted in the algorithm. The hash value is obtained from the final state value of the spatiotemporal chaotic system. Theoretic analyses and numerical simulations both show that the proposed hash algorithm possesses good statistical properties, strong collision resistance and high efficiency, as required by practical keyed hash functions.

  5. A novel method for one-way hash function construction based on spatiotemporal chaos

    International Nuclear Information System (INIS)

    Ren Haijun; Wang Yong; Xie Qing; Yang Huaqian

    2009-01-01

    A novel hash algorithm based on a spatiotemporal chaos is proposed. The original message is first padded with zeros if needed. Then it is divided into a number of blocks each contains 32 bytes. In the hashing process, each block is partitioned into eight 32-bit values and input into the spatiotemporal chaotic system. Then, after iterating the system for four times, the next block is processed by the same way. To enhance the confusion and diffusion effect, the cipher block chaining (CBC) mode is adopted in the algorithm. The hash value is obtained from the final state value of the spatiotemporal chaotic system. Theoretic analyses and numerical simulations both show that the proposed hash algorithm possesses good statistical properties, strong collision resistance and high efficiency, as required by practical keyed hash functions.

  6. Cryptographic quantum hashing

    Science.gov (United States)

    Ablayev, F. M.; Vasiliev, A. V.

    2014-02-01

    We present a version of quantum hash functions based on non-binary discrete functions. The proposed quantum procedure is ‘classical-quantum’, that is, it takes a classical bit string as an input and produces a quantum state. The resulting function has the property of a one-way function (pre-image resistance); in addition it has properties analogous to classical cryptographic hash second pre-image resistance and collision resistance. We also show that the proposed function can be naturally used in a quantum digital signature protocol.

  7. Cryptographic quantum hashing

    International Nuclear Information System (INIS)

    Ablayev, F M; Vasiliev, A V

    2014-01-01

    We present a version of quantum hash functions based on non-binary discrete functions. The proposed quantum procedure is ‘classical-quantum’, that is, it takes a classical bit string as an input and produces a quantum state. The resulting function has the property of a one-way function (pre-image resistance); in addition it has properties analogous to classical cryptographic hash second pre-image resistance and collision resistance. We also show that the proposed function can be naturally used in a quantum digital signature protocol. (letter)

  8. Cryptanalysis of the 10-Round Hash and Full Compression Function of SHAvite-3-512

    DEFF Research Database (Denmark)

    Gauravaram, Praveen; Leurent, Gaëtan; Mendel, Florian

    2010-01-01

    In this paper, we analyze SHAvite-3-512 hash function, as proposed for round 2 of the SHA-3 competition. We present cryptanalytic results on 10 out of 14 rounds of the hash function SHAvite-3-512, and on the full 14 round compression function of SHAvite-3-512. We show a second preimage attack on ...

  9. Structure Sensitive Hashing With Adaptive Product Quantization.

    Science.gov (United States)

    Liu, Xianglong; Du, Bowen; Deng, Cheng; Liu, Ming; Lang, Bo

    2016-10-01

    Hashing has been proved as an attractive solution to approximate nearest neighbor search, owing to its theoretical guarantee and computational efficiency. Though most of prior hashing algorithms can achieve low memory and computation consumption by pursuing compact hash codes, however, they are still far beyond the capability of learning discriminative hash functions from the data with complex inherent structure among them. To address this issue, in this paper, we propose a structure sensitive hashing based on cluster prototypes, which explicitly exploits both global and local structures. An alternating optimization algorithm, respectively, minimizing the quantization loss and spectral embedding loss, is presented to simultaneously discover the cluster prototypes for each hash function, and optimally assign unique binary codes to them satisfying the affinity alignment between them. For hash codes of a desired length, an adaptive bit assignment is further appended to the product quantization of the subspaces, approximating the Hamming distances and meanwhile balancing the variance among hash functions. Experimental results on four large-scale benchmarks CIFAR-10, NUS-WIDE, SIFT1M, and GIST1M demonstrate that our approach significantly outperforms state-of-the-art hashing methods in terms of semantic and metric neighbor search.

  10. Fast and powerful hashing using tabulation

    DEFF Research Database (Denmark)

    Thorup, Mikkel

    2017-01-01

    Randomized algorithms are often enjoyed for their simplicity, but the hash functions employed to yield the desired probabilistic guarantees are often too complicated to be practical. Here, we survey recent results on how simple hashing schemes based on tabulation provide unexpectedly strong......, linear probing and Cuckoo hashing. Next, we consider twisted tabulation where one input character is "twisted" in a simple way. The resulting hash function has powerful distributional properties: Chernoffstyle tail bounds and a very small bias for minwise hashing. This is also yields an extremely fast...... pseudorandom number generator that is provably good for many classic randomized algorithms and data-structures. Finally, we consider double tabulation where we compose two simple tabulation functions, applying one to the output of the other, and show that this yields very high independence in the classic...

  11. Quantum Hash function and its application to privacy amplification in quantum key distribution, pseudo-random number generation and image encryption

    Science.gov (United States)

    Yang, Yu-Guang; Xu, Peng; Yang, Rui; Zhou, Yi-Hua; Shi, Wei-Min

    2016-01-01

    Quantum information and quantum computation have achieved a huge success during the last years. In this paper, we investigate the capability of quantum Hash function, which can be constructed by subtly modifying quantum walks, a famous quantum computation model. It is found that quantum Hash function can act as a hash function for the privacy amplification process of quantum key distribution systems with higher security. As a byproduct, quantum Hash function can also be used for pseudo-random number generation due to its inherent chaotic dynamics. Further we discuss the application of quantum Hash function to image encryption and propose a novel image encryption algorithm. Numerical simulations and performance comparisons show that quantum Hash function is eligible for privacy amplification in quantum key distribution, pseudo-random number generation and image encryption in terms of various hash tests and randomness tests. It extends the scope of application of quantum computation and quantum information.

  12. Quantum Hash function and its application to privacy amplification in quantum key distribution, pseudo-random number generation and image encryption

    Science.gov (United States)

    Yang, Yu-Guang; Xu, Peng; Yang, Rui; Zhou, Yi-Hua; Shi, Wei-Min

    2016-01-01

    Quantum information and quantum computation have achieved a huge success during the last years. In this paper, we investigate the capability of quantum Hash function, which can be constructed by subtly modifying quantum walks, a famous quantum computation model. It is found that quantum Hash function can act as a hash function for the privacy amplification process of quantum key distribution systems with higher security. As a byproduct, quantum Hash function can also be used for pseudo-random number generation due to its inherent chaotic dynamics. Further we discuss the application of quantum Hash function to image encryption and propose a novel image encryption algorithm. Numerical simulations and performance comparisons show that quantum Hash function is eligible for privacy amplification in quantum key distribution, pseudo-random number generation and image encryption in terms of various hash tests and randomness tests. It extends the scope of application of quantum computation and quantum information. PMID:26823196

  13. Meet-in-the-Middle Preimage Attacks on Hash Modes of Generalized Feistel and Misty Schemes with SP Round Function

    Science.gov (United States)

    Moon, Dukjae; Hong, Deukjo; Kwon, Daesung; Hong, Seokhie

    We assume that the domain extender is the Merkle-Damgård (MD) scheme and he message is padded by a ‘1’, and minimum number of ‘0’s, followed by a fixed size length information so that the length of padded message is multiple of block length. Under this assumption, we analyze securities of the hash mode when the compression function follows the Davies-Meyer (DM) scheme and the underlying block cipher is one of the plain Feistel or Misty scheme or the generalized Feistel or Misty schemes with Substitution-Permutation (SP) round function. We do this work based on Meet-in-the-Middle (MitM) preimage attack techniques, and develop several useful initial structures.

  14. Linear Subspace Ranking Hashing for Cross-Modal Retrieval.

    Science.gov (United States)

    Li, Kai; Qi, Guo-Jun; Ye, Jun; Hua, Kien A

    2017-09-01

    Hashing has attracted a great deal of research in recent years due to its effectiveness for the retrieval and indexing of large-scale high-dimensional multimedia data. In this paper, we propose a novel ranking-based hashing framework that maps data from different modalities into a common Hamming space where the cross-modal similarity can be measured using Hamming distance. Unlike existing cross-modal hashing algorithms where the learned hash functions are binary space partitioning functions, such as the sign and threshold function, the proposed hashing scheme takes advantage of a new class of hash functions closely related to rank correlation measures which are known to be scale-invariant, numerically stable, and highly nonlinear. Specifically, we jointly learn two groups of linear subspaces, one for each modality, so that features' ranking orders in different linear subspaces maximally preserve the cross-modal similarities. We show that the ranking-based hash function has a natural probabilistic approximation which transforms the original highly discontinuous optimization problem into one that can be efficiently solved using simple gradient descent algorithms. The proposed hashing framework is also flexible in the sense that the optimization procedures are not tied up to any specific form of loss function, which is typical for existing cross-modal hashing methods, but rather we can flexibly accommodate different loss functions with minimal changes to the learning steps. We demonstrate through extensive experiments on four widely-used real-world multimodal datasets that the proposed cross-modal hashing method can achieve competitive performance against several state-of-the-arts with only moderate training and testing time.

  15. Practical Attacks on AES-like Cryptographic Hash Functions

    DEFF Research Database (Denmark)

    Kölbl, Stefan; Rechberger, Christian

    2015-01-01

    to drastically reduce the complexity of attacks to very practical values for reduced-round versions. Furthermore, we describe new and practical attacks on Whirlpool and the recently proposed GOST R hash function with one or more of the following properties: more rounds, less time/memory complexity, and more...

  16. Efficient computation of hashes

    International Nuclear Information System (INIS)

    Lopes, Raul H C; Franqueira, Virginia N L; Hobson, Peter R

    2014-01-01

    The sequential computation of hashes at the core of many distributed storage systems and found, for example, in grid services can hinder efficiency in service quality and even pose security challenges that can only be addressed by the use of parallel hash tree modes. The main contributions of this paper are, first, the identification of several efficiency and security challenges posed by the use of sequential hash computation based on the Merkle-Damgard engine. In addition, alternatives for the parallel computation of hash trees are discussed, and a prototype for a new parallel implementation of the Keccak function, the SHA-3 winner, is introduced.

  17. One-way Hash function construction based on the chaotic map with changeable-parameter

    International Nuclear Information System (INIS)

    Xiao Di; Liao Xiaofeng; Deng Shaojiang

    2005-01-01

    An algorithm for one-way Hash function construction based on the chaotic map with changeable-parameter is proposed in this paper. A piecewise linear chaotic map with changeable-parameter P is chosen, and cipher block chaining mode (CBC) is introduced to ensure that the parameter P in each iteration is dynamically decided by the last-time iteration value and the corresponding message bit in different positions. The final Hash value is obtained by means of the linear transform on the iteration sequence. Theoretical analysis and computer simulation indicate that our algorithm can satisfy all the performance requirements of Hash function in an efficient and flexible manner. It is practicable and reliable, with high potential to be adopted for E-commerce

  18. One-way Hash function construction based on the chaotic map with changeable-parameter

    Energy Technology Data Exchange (ETDEWEB)

    Xiao Di [College of Computer Science and Engineering, Chongqing University, Chongqing 400044 (China) and College of Mechanical Engineering, Chongqing University, Chongqing 400044 (China)]. E-mail: xiaodi_cqu@hotmail.com; Liao Xiaofeng [College of Computer Science and Engineering, Chongqing University, Chongqing 400044 (China)]. E-mail: xfliao@cqu.edu.cn; Deng Shaojiang [College of Computer Science and Engineering, Chongqing University, Chongqing 400044 (China)

    2005-04-01

    An algorithm for one-way Hash function construction based on the chaotic map with changeable-parameter is proposed in this paper. A piecewise linear chaotic map with changeable-parameter P is chosen, and cipher block chaining mode (CBC) is introduced to ensure that the parameter P in each iteration is dynamically decided by the last-time iteration value and the corresponding message bit in different positions. The final Hash value is obtained by means of the linear transform on the iteration sequence. Theoretical analysis and computer simulation indicate that our algorithm can satisfy all the performance requirements of Hash function in an efficient and flexible manner. It is practicable and reliable, with high potential to be adopted for E-commerce.

  19. Analysis and Implementation of Cryptographic Hash Functions in Programmable Logic Devices

    Directory of Open Access Journals (Sweden)

    Tautvydas Brukštus

    2016-06-01

    Full Text Available In this day’s world, more and more focused on data pro-tection. For data protection using cryptographic science. It is also important for the safe storage of passwords for this uses a cryp-tographic hash function. In this article has been selected the SHA-256 cryptographic hash function to implement and explore, based on fact that it is now a popular and safe. SHA-256 cryp-tographic function did not find any theoretical gaps or conflict situations. Also SHA-256 cryptographic hash function used cryptographic currencies. Currently cryptographic currency is popular and their value is high. For the measurements have been chosen programmable logic integrated circuits as they less effi-ciency then ASIC. We chose Altera Corporation produced prog-rammable logic integrated circuits. Counting speed will be inves-tigated by three programmable logic integrated circuit. We will use programmable logic integrated circuits belong to the same family, but different generations. Each programmable logic integ-rated circuit made using different dimension technology. Choo-sing these programmable logic integrated circuits: EP3C16, EP4CE115 and 5CSEMA5F31. To compare calculations perfor-mances parameters are provided in the tables and graphs. Re-search show the calculation speed and stability of different prog-rammable logic circuits.

  20. Neighborhood Discriminant Hashing for Large-Scale Image Retrieval.

    Science.gov (United States)

    Tang, Jinhui; Li, Zechao; Wang, Meng; Zhao, Ruizhen

    2015-09-01

    With the proliferation of large-scale community-contributed images, hashing-based approximate nearest neighbor search in huge databases has aroused considerable interest from the fields of computer vision and multimedia in recent years because of its computational and memory efficiency. In this paper, we propose a novel hashing method named neighborhood discriminant hashing (NDH) (for short) to implement approximate similarity search. Different from the previous work, we propose to learn a discriminant hashing function by exploiting local discriminative information, i.e., the labels of a sample can be inherited from the neighbor samples it selects. The hashing function is expected to be orthogonal to avoid redundancy in the learned hashing bits as much as possible, while an information theoretic regularization is jointly exploited using maximum entropy principle. As a consequence, the learned hashing function is compact and nonredundant among bits, while each bit is highly informative. Extensive experiments are carried out on four publicly available data sets and the comparison results demonstrate the outperforming performance of the proposed NDH method over state-of-the-art hashing techniques.

  1. Remarks on Gödel's Code as a Hash Function

    Czech Academy of Sciences Publication Activity Database

    Mikuš, M.; Savický, Petr

    2010-01-01

    Roč. 47, č. 3 (2010), s. 67-80 ISSN 1210-3195 R&D Projects: GA ČR GAP202/10/1333 Institutional research plan: CEZ:AV0Z10300504 Keywords : Gödel numbering function * hash function * rational reconstruction * integer relation algorithm Subject RIV: BA - General Mathematics http://www.sav.sk/journals/uploads/0317151904m-s.pdf

  2. A comparative study of Message Digest 5(MD5) and SHA256 algorithm

    Science.gov (United States)

    Rachmawati, D.; Tarigan, J. T.; Ginting, A. B. C.

    2018-03-01

    The document is a collection of written or printed data containing information. The more rapid advancement of technology, the integrity of a document should be kept. Because of the nature of an open document means the document contents can be read and modified by many parties so that the integrity of the information as a content of the document is not preserved. To maintain the integrity of the data, it needs to create a mechanism which is called a digital signature. A digital signature is a specific code which is generated from the function of producing a digital signature. One of the algorithms that used to create the digital signature is a hash function. There are many hash functions. Two of them are message digest 5 (MD5) and SHA256. Those both algorithms certainly have its advantages and disadvantages of each. The purpose of this research is to determine the algorithm which is better. The parameters which used to compare that two algorithms are the running time and complexity. The research results obtained from the complexity of the Algorithms MD5 and SHA256 is the same, i.e., ⊖ (N), but regarding the speed is obtained that MD5 is better compared to SHA256.

  3. Online Hashing for Scalable Remote Sensing Image Retrieval

    Directory of Open Access Journals (Sweden)

    Peng Li

    2018-05-01

    Full Text Available Recently, hashing-based large-scale remote sensing (RS image retrieval has attracted much attention. Many new hashing algorithms have been developed and successfully applied to fast RS image retrieval tasks. However, there exists an important problem rarely addressed in the research literature of RS image hashing. The RS images are practically produced in a streaming manner in many real-world applications, which means the data distribution keeps changing over time. Most existing RS image hashing methods are batch-based models whose hash functions are learned once for all and kept fixed all the time. Therefore, the pre-trained hash functions might not fit the ever-growing new RS images. Moreover, the batch-based models have to load all the training images into memory for model learning, which consumes many computing and memory resources. To address the above deficiencies, we propose a new online hashing method, which learns and adapts its hashing functions with respect to the newly incoming RS images in terms of a novel online partial random learning scheme. Our hash model is updated in a sequential mode such that the representative power of the learned binary codes for RS images are improved accordingly. Moreover, benefiting from the online learning strategy, our proposed hashing approach is quite suitable for scalable real-world remote sensing image retrieval. Extensive experiments on two large-scale RS image databases under online setting demonstrated the efficacy and effectiveness of the proposed method.

  4. Rebound Attacks on the Reduced Grøstl Hash Function

    DEFF Research Database (Denmark)

    Mendel, Florian; Rechberger, C.; Schlaffer, Martin

    2010-01-01

    Grøstl is one of 14 second round candidates of the NIST SHA-3 competition. Cryptanalytic results on the wide-pipe compression function of Grøstl-256 have already been published. However, little is known about the hash function, arguably a much more interesting cryptanalytic setting. Also, Grøstl...

  5. FSH: fast spaced seed hashing exploiting adjacent hashes.

    Science.gov (United States)

    Girotto, Samuele; Comin, Matteo; Pizzi, Cinzia

    2018-01-01

    Patterns with wildcards in specified positions, namely spaced seeds , are increasingly used instead of k -mers in many bioinformatics applications that require indexing, querying and rapid similarity search, as they can provide better sensitivity. Many of these applications require to compute the hashing of each position in the input sequences with respect to the given spaced seed, or to multiple spaced seeds. While the hashing of k -mers can be rapidly computed by exploiting the large overlap between consecutive k -mers, spaced seeds hashing is usually computed from scratch for each position in the input sequence, thus resulting in slower processing. The method proposed in this paper, fast spaced-seed hashing (FSH), exploits the similarity of the hash values of spaced seeds computed at adjacent positions in the input sequence. In our experiments we compute the hash for each positions of metagenomics reads from several datasets, with respect to different spaced seeds. We also propose a generalized version of the algorithm for the simultaneous computation of multiple spaced seeds hashing. In the experiments, our algorithm can compute the hashing values of spaced seeds with a speedup, with respect to the traditional approach, between 1.6[Formula: see text] to 5.3[Formula: see text], depending on the structure of the spaced seed. Spaced seed hashing is a routine task for several bioinformatics application. FSH allows to perform this task efficiently and raise the question of whether other hashing can be exploited to further improve the speed up. This has the potential of major impact in the field, making spaced seed applications not only accurate, but also faster and more efficient. The software FSH is freely available for academic use at: https://bitbucket.org/samu661/fsh/overview.

  6. Multiview alignment hashing for efficient image search.

    Science.gov (United States)

    Liu, Li; Yu, Mengyang; Shao, Ling

    2015-03-01

    Hashing is a popular and efficient method for nearest neighbor search in large-scale data spaces by embedding high-dimensional feature descriptors into a similarity preserving Hamming space with a low dimension. For most hashing methods, the performance of retrieval heavily depends on the choice of the high-dimensional feature descriptor. Furthermore, a single type of feature cannot be descriptive enough for different images when it is used for hashing. Thus, how to combine multiple representations for learning effective hashing functions is an imminent task. In this paper, we present a novel unsupervised multiview alignment hashing approach based on regularized kernel nonnegative matrix factorization, which can find a compact representation uncovering the hidden semantics and simultaneously respecting the joint probability distribution of data. In particular, we aim to seek a matrix factorization to effectively fuse the multiple information sources meanwhile discarding the feature redundancy. Since the raised problem is regarded as nonconvex and discrete, our objective function is then optimized via an alternate way with relaxation and converges to a locally optimal solution. After finding the low-dimensional representation, the hashing functions are finally obtained through multivariable logistic regression. The proposed method is systematically evaluated on three data sets: 1) Caltech-256; 2) CIFAR-10; and 3) CIFAR-20, and the results show that our method significantly outperforms the state-of-the-art multiview hashing techniques.

  7. Authenticated hash tables

    DEFF Research Database (Denmark)

    Triandopoulos, Nikolaos; Papamanthou, Charalampos; Tamassia, Roberto

    2008-01-01

    Hash tables are fundamental data structures that optimally answer membership queries. Suppose a client stores n elements in a hash table that is outsourced at a remote server so that the client can save space or achieve load balancing. Authenticating the hash table functionality, i.e., verifying...... to a scheme that achieves different trade-offs---namely, constant update time and O(nε/logκε n) query time for fixed ε > 0 and κ > 0. An experimental evaluation of our solution shows very good scalability....

  8. Ranking Based Locality Sensitive Hashing Enabled Cancelable Biometrics: Index-of-Max Hashing

    OpenAIRE

    Jin, Zhe; Lai, Yen-Lung; Hwang, Jung-Yeon; Kim, Soohyung; Teoh, Andrew Beng Jin

    2017-01-01

    In this paper, we propose a ranking based locality sensitive hashing inspired two-factor cancelable biometrics, dubbed "Index-of-Max" (IoM) hashing for biometric template protection. With externally generated random parameters, IoM hashing transforms a real-valued biometric feature vector into discrete index (max ranked) hashed code. We demonstrate two realizations from IoM hashing notion, namely Gaussian Random Projection based and Uniformly Random Permutation based hashing schemes. The disc...

  9. Quantum hashing is maximally secure against classical leakage

    OpenAIRE

    Huang, Cupjin; Shi, Yaoyun

    2017-01-01

    Cryptographic hash functions are fundamental primitives widely used in practice. For such a function $f:\\{0, 1\\}^n\\to\\{0, 1\\}^m$, it is nearly impossible for an adversary to produce the hash $f(x)$ without knowing the secret message $x\\in\\{0, 1\\}^n$. Unfortunately, all hash functions are vulnerable under the side-channel attack, which is a grave concern for information security in practice. This is because typically $m\\ll n$ and an adversary needs only $m$ bits of information to pass the veri...

  10. Hash3: Proofs, Analysis and Implementation

    DEFF Research Database (Denmark)

    Gauravaram, Praveen

    2009-01-01

    This report outlines the talks presented at the winter school on Hash3: Proofs, Analysis, and Implementation, ECRYPT II Event on Hash Functions. In general, speakers may not write everything what they talk on the slides. So, this report also outlines such findings following the understanding of t...

  11. The LabelHash algorithm for substructure matching

    Directory of Open Access Journals (Sweden)

    Bryant Drew H

    2010-11-01

    Full Text Available Abstract Background There is an increasing number of proteins with known structure but unknown function. Determining their function would have a significant impact on understanding diseases and designing new therapeutics. However, experimental protein function determination is expensive and very time-consuming. Computational methods can facilitate function determination by identifying proteins that have high structural and chemical similarity. Results We present LabelHash, a novel algorithm for matching substructural motifs to large collections of protein structures. The algorithm consists of two phases. In the first phase the proteins are preprocessed in a fashion that allows for instant lookup of partial matches to any motif. In the second phase, partial matches for a given motif are expanded to complete matches. The general applicability of the algorithm is demonstrated with three different case studies. First, we show that we can accurately identify members of the enolase superfamily with a single motif. Next, we demonstrate how LabelHash can complement SOIPPA, an algorithm for motif identification and pairwise substructure alignment. Finally, a large collection of Catalytic Site Atlas motifs is used to benchmark the performance of the algorithm. LabelHash runs very efficiently in parallel; matching a motif against all proteins in the 95% sequence identity filtered non-redundant Protein Data Bank typically takes no more than a few minutes. The LabelHash algorithm is available through a web server and as a suite of standalone programs at http://labelhash.kavrakilab.org. The output of the LabelHash algorithm can be further analyzed with Chimera through a plugin that we developed for this purpose. Conclusions LabelHash is an efficient, versatile algorithm for large-scale substructure matching. When LabelHash is running in parallel, motifs can typically be matched against the entire PDB on the order of minutes. The algorithm is able to identify

  12. Efficient hash tables for network applications.

    Science.gov (United States)

    Zink, Thomas; Waldvogel, Marcel

    2015-01-01

    Hashing has yet to be widely accepted as a component of hard real-time systems and hardware implementations, due to still existing prejudices concerning the unpredictability of space and time requirements resulting from collisions. While in theory perfect hashing can provide optimal mapping, in practice, finding a perfect hash function is too expensive, especially in the context of high-speed applications. The introduction of hashing with multiple choices, d-left hashing and probabilistic table summaries, has caused a shift towards deterministic DRAM access. However, high amounts of rare and expensive high-speed SRAM need to be traded off for predictability, which is infeasible for many applications. In this paper we show that previous suggestions suffer from the false precondition of full generality. Our approach exploits four individual degrees of freedom available in many practical applications, especially hardware and high-speed lookups. This reduces the requirement of on-chip memory up to an order of magnitude and guarantees constant lookup and update time at the cost of only minute amounts of additional hardware. Our design makes efficient hash table implementations cheaper, more predictable, and more practical.

  13. 76 FR 11433 - Federal Transition To Secure Hash Algorithm (SHA)-256

    Science.gov (United States)

    2011-03-02

    ... ADMINISTRATION [FAR-N-2011-01; Docket No. 2011-0083; Sequence 1] Federal Transition To Secure Hash Algorithm (SHA... acquisition community to transition to Secure Hash Algorithm SHA-256. SHA-256 is a cryptographic hash function... persons attending. Please cite ``Federal Transition to Secure Hash Algorithm SHA-256'' in all...

  14. Hierarchical Recurrent Neural Hashing for Image Retrieval With Hierarchical Convolutional Features.

    Science.gov (United States)

    Lu, Xiaoqiang; Chen, Yaxiong; Li, Xuelong

    Hashing has been an important and effective technology in image retrieval due to its computational efficiency and fast search speed. The traditional hashing methods usually learn hash functions to obtain binary codes by exploiting hand-crafted features, which cannot optimally represent the information of the sample. Recently, deep learning methods can achieve better performance, since deep learning architectures can learn more effective image representation features. However, these methods only use semantic features to generate hash codes by shallow projection but ignore texture details. In this paper, we proposed a novel hashing method, namely hierarchical recurrent neural hashing (HRNH), to exploit hierarchical recurrent neural network to generate effective hash codes. There are three contributions of this paper. First, a deep hashing method is proposed to extensively exploit both spatial details and semantic information, in which, we leverage hierarchical convolutional features to construct image pyramid representation. Second, our proposed deep network can exploit directly convolutional feature maps as input to preserve the spatial structure of convolutional feature maps. Finally, we propose a new loss function that considers the quantization error of binarizing the continuous embeddings into the discrete binary codes, and simultaneously maintains the semantic similarity and balanceable property of hash codes. Experimental results on four widely used data sets demonstrate that the proposed HRNH can achieve superior performance over other state-of-the-art hashing methods.Hashing has been an important and effective technology in image retrieval due to its computational efficiency and fast search speed. The traditional hashing methods usually learn hash functions to obtain binary codes by exploiting hand-crafted features, which cannot optimally represent the information of the sample. Recently, deep learning methods can achieve better performance, since deep

  15. Cracking PwdHash: A Bruteforce Attack on Client-side Password Hashing

    OpenAIRE

    Llewellyn-Jones, David; Rymer, Graham Matthew

    2017-01-01

    PwdHash is a widely-used tool for client-side password hashing. Originally released as a browser extension, it replaces the user’s password with a hash that combines both the password and the website’s domain. As a result, while the user only remembers a single secret, the passwords received are all unique for each site. We demonstrate how the hashcat password recovery tool can be extended to allow passwords generated using PwdHash to be identified and recovered, revealing the user’s master p...

  16. Side channel analysis of some hash based MACs: A response to SHA-3 requirements

    DEFF Research Database (Denmark)

    Gauravaram, Praveen; Okeya, Katsuyuki

    2008-01-01

    The forthcoming NIST's Advanced Hash Standard (AHS) competition to select SHA-3 hash function requires that each candidate hash function submission must have at least one construction to support FIPS 198 HMAC application. As part of its evaluation, NIST is aiming to select either a candidate hash...

  17. Security analysis of a one-way hash function based on spatiotemporal chaos

    International Nuclear Information System (INIS)

    Wang Shi-Hong; Shan Peng-Yang

    2011-01-01

    The collision and statistical properties of a one-way hash function based on spatiotemporal chaos are investigated. Analysis and simulation results indicate that collisions exist in the original algorithm and, therefore, the original algorithm is insecure and vulnerable. An improved algorithm is proposed to avoid the collisions. (general)

  18. Hashing for Statistics over K-Partitions

    DEFF Research Database (Denmark)

    Dahlgaard, Soren; Knudsen, Mathias Baek Tejs; Rotenberg, Eva

    2015-01-01

    In this paper we analyze a hash function for k-partitioning a set into bins, obtaining strong concentration bounds for standard algorithms combining statistics from each bin. This generic method was originally introduced by Flajolet and Martin [FOCS'83] in order to save a factor Ω(k) of time per...... concentration bounds on the most popular applications of k-partitioning similar to those we would get using a truly random hash function. The analysis is very involved and implies several new results of independent interest for both simple and double tabulation, e.g. A simple and efficient construction...

  19. Implementation of 4-way Superscalar Hash MIPS Processor Using FPGA

    Science.gov (United States)

    Sahib Omran, Safaa; Fouad Jumma, Laith

    2018-05-01

    Due to the quick advancements in the personal communications systems and wireless communications, giving data security has turned into a more essential subject. This security idea turns into a more confounded subject when next-generation system requirements and constant calculation speed are considered in real-time. Hash functions are among the most essential cryptographic primitives and utilized as a part of the many fields of signature authentication and communication integrity. These functions are utilized to acquire a settled size unique fingerprint or hash value of an arbitrary length of message. In this paper, Secure Hash Algorithms (SHA) of types SHA-1, SHA-2 (SHA-224, SHA-256) and SHA-3 (BLAKE) are implemented on Field-Programmable Gate Array (FPGA) in a processor structure. The design is described and implemented using a hardware description language, namely VHSIC “Very High Speed Integrated Circuit” Hardware Description Language (VHDL). Since the logical operation of the hash types of (SHA-1, SHA-224, SHA-256 and SHA-3) are 32-bits, so a Superscalar Hash Microprocessor without Interlocked Pipelines (MIPS) processor are designed with only few instructions that were required in invoking the desired Hash algorithms, when the four types of hash algorithms executed sequentially using the designed processor, the total time required equal to approximately 342 us, with a throughput of 4.8 Mbps while the required to execute the same four hash algorithms using the designed four-way superscalar is reduced to 237 us with improved the throughput to 5.1 Mbps.

  20. Architecture-Conscious Hashing

    NARCIS (Netherlands)

    M. Zukowski (Marcin); S. Héman (Sándor); P.A. Boncz (Peter)

    2006-01-01

    textabstractHashing is one of the fundamental techniques used to implement query processing operators such as grouping, aggregation and join. This paper studies the interaction between modern computer architecture and hash-based query processing techniques. First, we focus on extracting maximum

  1. Cryptanalysis on a parallel keyed hash function based on chaotic maps

    International Nuclear Information System (INIS)

    Guo Wei; Wang Xiaoming; He Dake; Cao Yang

    2009-01-01

    This Letter analyzes the security of a novel parallel keyed hash function based on chaotic maps, proposed by Xiao et al. to improve the efficiency in parallel computing environment. We show how to devise forgery attacks on Xiao's scheme with differential cryptanalysis and give the experiment results of two kinds of forgery attacks firstly. Furthermore, we discuss the problem of weak keys in the scheme and demonstrate how to utilize weak keys to construct collision.

  2. Side channel analysis of some hash based MACs:A response to SHA-3 requirements

    DEFF Research Database (Denmark)

    The forthcoming NIST's Advanced Hash Standard (AHS) competition to select SHA-3 hash function requires that each candidate hash function submission must have at least one construction to support FIPS 198 HMAC application. As part of its evaluation, NIST is aiming to select either a candidate hash...... function which is more resistant to known side channel attacks (SCA) when plugged into HMAC, or that has an alternative MAC mode which is more resistant to known SCA than the other submitted alternatives. In response to this, we perform differential power analysis (DPA) on the possible smart card...... implementations of some of the recently proposed MAC alternatives to NMAC (a fully analyzed variant of HMAC) and HMAC algorithms and NMAC/HMAC versions of some recently proposed hash and compression function modes. We show that the recently proposed BNMAC and KMDP MAC schemes are even weaker than NMAC...

  3. Feature hashing for fast image retrieval

    Science.gov (United States)

    Yan, Lingyu; Fu, Jiarun; Zhang, Hongxin; Yuan, Lu; Xu, Hui

    2018-03-01

    Currently, researches on content based image retrieval mainly focus on robust feature extraction. However, due to the exponential growth of online images, it is necessary to consider searching among large scale images, which is very timeconsuming and unscalable. Hence, we need to pay much attention to the efficiency of image retrieval. In this paper, we propose a feature hashing method for image retrieval which not only generates compact fingerprint for image representation, but also prevents huge semantic loss during the process of hashing. To generate the fingerprint, an objective function of semantic loss is constructed and minimized, which combine the influence of both the neighborhood structure of feature data and mapping error. Since the machine learning based hashing effectively preserves neighborhood structure of data, it yields visual words with strong discriminability. Furthermore, the generated binary codes leads image representation building to be of low-complexity, making it efficient and scalable to large scale databases. Experimental results show good performance of our approach.

  4. Cryptanalysis of the LAKE Hash Family

    DEFF Research Database (Denmark)

    Biryukov, Alex; Gauravaram, Praveen; Guo, Jian

    2009-01-01

    We analyse the security of the cryptographic hash function LAKE-256 proposed at FSE 2008 by Aumasson, Meier and Phan. By exploiting non-injectivity of some of the building primitives of LAKE, we show three different collision and near-collision attacks on the compression function. The first attac...

  5. Robust hashing for 3D models

    Science.gov (United States)

    Berchtold, Waldemar; Schäfer, Marcel; Rettig, Michael; Steinebach, Martin

    2014-02-01

    3D models and applications are of utmost interest in both science and industry. With the increment of their usage, their number and thereby the challenge to correctly identify them increases. Content identification is commonly done by cryptographic hashes. However, they fail as a solution in application scenarios such as computer aided design (CAD), scientific visualization or video games, because even the smallest alteration of the 3D model, e.g. conversion or compression operations, massively changes the cryptographic hash as well. Therefore, this work presents a robust hashing algorithm for 3D mesh data. The algorithm applies several different bit extraction methods. They are built to resist desired alterations of the model as well as malicious attacks intending to prevent correct allocation. The different bit extraction methods are tested against each other and, as far as possible, the hashing algorithm is compared to the state of the art. The parameters tested are robustness, security and runtime performance as well as False Acceptance Rate (FAR) and False Rejection Rate (FRR), also the probability calculation of hash collision is included. The introduced hashing algorithm is kept adaptive e.g. in hash length, to serve as a proper tool for all applications in practice.

  6. Deep Constrained Siamese Hash Coding Network and Load-Balanced Locality-Sensitive Hashing for Near Duplicate Image Detection.

    Science.gov (United States)

    Hu, Weiming; Fan, Yabo; Xing, Junliang; Sun, Liang; Cai, Zhaoquan; Maybank, Stephen

    2018-09-01

    We construct a new efficient near duplicate image detection method using a hierarchical hash code learning neural network and load-balanced locality-sensitive hashing (LSH) indexing. We propose a deep constrained siamese hash coding neural network combined with deep feature learning. Our neural network is able to extract effective features for near duplicate image detection. The extracted features are used to construct a LSH-based index. We propose a load-balanced LSH method to produce load-balanced buckets in the hashing process. The load-balanced LSH significantly reduces the query time. Based on the proposed load-balanced LSH, we design an effective and feasible algorithm for near duplicate image detection. Extensive experiments on three benchmark data sets demonstrate the effectiveness of our deep siamese hash encoding network and load-balanced LSH.

  7. Quicksort, largest bucket, and min-wise hashing with limited independence

    DEFF Research Database (Denmark)

    Knudsen, Mathias Bæk Tejs; Stöckel, Morten

    2015-01-01

    Randomized algorithms and data structures are often analyzed under the assumption of access to a perfect source of randomness. The most fundamental metric used to measure how “random” a hash function or a random number generator is, is its independence: a sequence of random variables is said...... to be k-independent if every variable is uniform and every size k subset is independent. In this paper we consider three classic algorithms under limited independence. Besides the theoretical interest in removing the unrealistic assumption of full independence, the work is motivated by lower independence...... being more practical. We provide new bounds for randomized quicksort, min-wise hashing and largest bucket size under limited independence. Our results can be summarized as follows. Randomized Quicksort. When pivot elements are computed using a 5-independent hash function, Karloff and Raghavan, J.ACM’93...

  8. MULTIMEDIA DATA TRANSMISSION THROUGH TCP/IP USING HASH BASED FEC WITH AUTO-XOR SCHEME

    OpenAIRE

    R. Shalin; D. Kesavaraja

    2012-01-01

    The most preferred mode for communication of multimedia data is through the TCP/IP protocol. But on the other hand the TCP/IP protocol produces huge packet loss unavoidable due to network traffic and congestion. In order to provide a efficient communication it is necessary to recover the loss of packets. The proposed scheme implements Hash based FEC with auto XOR scheme for this purpose. The scheme is implemented through Forward error correction, MD5 and XOR for providing efficient transmissi...

  9. Efficient tabling of structured data with enhanced hash-consing

    DEFF Research Database (Denmark)

    Zhou, Neng-Fa; Have, Christian Theil

    2012-01-01

    techniques, called input sharing and hash code memoization, for reducing the time complexity by avoiding computing hash codes for certain terms. The improved system is able to eliminate the extra linear factor in the old system for processing sequences, thus significantly enhancing the scalability...... uses hash tables, but also systems that use tries such as XSB and YAP. In this paper, we apply hash-consing to tabling structured data in B-Prolog. While hash-consing can reduce the space consumption when sharing is effective, it does not change the time complexity. We enhance hash-consing with two...

  10. Deep Hashing Based Fusing Index Method for Large-Scale Image Retrieval

    Directory of Open Access Journals (Sweden)

    Lijuan Duan

    2017-01-01

    Full Text Available Hashing has been widely deployed to perform the Approximate Nearest Neighbor (ANN search for the large-scale image retrieval to solve the problem of storage and retrieval efficiency. Recently, deep hashing methods have been proposed to perform the simultaneous feature learning and the hash code learning with deep neural networks. Even though deep hashing has shown the better performance than traditional hashing methods with handcrafted features, the learned compact hash code from one deep hashing network may not provide the full representation of an image. In this paper, we propose a novel hashing indexing method, called the Deep Hashing based Fusing Index (DHFI, to generate a more compact hash code which has stronger expression ability and distinction capability. In our method, we train two different architecture’s deep hashing subnetworks and fuse the hash codes generated by the two subnetworks together to unify images. Experiments on two real datasets show that our method can outperform state-of-the-art image retrieval applications.

  11. A Novel Perceptual Hash Algorithm for Multispectral Image Authentication

    Directory of Open Access Journals (Sweden)

    Kaimeng Ding

    2018-01-01

    Full Text Available The perceptual hash algorithm is a technique to authenticate the integrity of images. While a few scholars have worked on mono-spectral image perceptual hashing, there is limited research on multispectral image perceptual hashing. In this paper, we propose a perceptual hash algorithm for the content authentication of a multispectral remote sensing image based on the synthetic characteristics of each band: firstly, the multispectral remote sensing image is preprocessed with band clustering and grid partition; secondly, the edge feature of the band subsets is extracted by band fusion-based edge feature extraction; thirdly, the perceptual feature of the same region of the band subsets is compressed and normalized to generate the perceptual hash value. The authentication procedure is achieved via the normalized Hamming distance between the perceptual hash value of the recomputed perceptual hash value and the original hash value. The experiments indicated that our proposed algorithm is robust compared to content-preserved operations and it efficiently authenticates the integrity of multispectral remote sensing images.

  12. Forensic hash for multimedia information

    Science.gov (United States)

    Lu, Wenjun; Varna, Avinash L.; Wu, Min

    2010-01-01

    Digital multimedia such as images and videos are prevalent on today's internet and cause significant social impact, which can be evidenced by the proliferation of social networking sites with user generated contents. Due to the ease of generating and modifying images and videos, it is critical to establish trustworthiness for online multimedia information. In this paper, we propose novel approaches to perform multimedia forensics using compact side information to reconstruct the processing history of a document. We refer to this as FASHION, standing for Forensic hASH for informatION assurance. Based on the Radon transform and scale space theory, the proposed forensic hash is compact and can effectively estimate the parameters of geometric transforms and detect local tampering that an image may have undergone. Forensic hash is designed to answer a broader range of questions regarding the processing history of multimedia data than the simple binary decision from traditional robust image hashing, and also offers more efficient and accurate forensic analysis than multimedia forensic techniques that do not use any side information.

  13. HashDist: Reproducible, Relocatable, Customizable, Cross-Platform Software Stacks for Open Hydrological Science

    Science.gov (United States)

    Ahmadia, A. J.; Kees, C. E.

    2014-12-01

    Developing scientific software is a continuous balance between not reinventing the wheel and getting fragile codes to interoperate with one another. Binary software distributions such as Anaconda provide a robust starting point for many scientific software packages, but this solution alone is insufficient for many scientific software developers. HashDist provides a critical component of the development workflow, enabling highly customizable, source-driven, and reproducible builds for scientific software stacks, available from both the IPython Notebook and the command line. To address these issues, the Coastal and Hydraulics Laboratory at the US Army Engineer Research and Development Center has funded the development of HashDist in collaboration with Simula Research Laboratories and the University of Texas at Austin. HashDist is motivated by a functional approach to package build management, and features intelligent caching of sources and builds, parametrized build specifications, and the ability to interoperate with system compilers and packages. HashDist enables the easy specification of "software stacks", which allow both the novice user to install a default environment and the advanced user to configure every aspect of their build in a modular fashion. As an advanced feature, HashDist builds can be made relocatable, allowing the easy redistribution of binaries on all three major operating systems as well as cloud, and supercomputing platforms. As a final benefit, all HashDist builds are reproducible, with a build hash specifying exactly how each component of the software stack was installed. This talk discusses the role of HashDist in the hydrological sciences, including its use by the Coastal and Hydraulics Laboratory in the development and deployment of the Proteus Toolkit as well as the Rapid Operational Access and Maneuver Support project. We demonstrate HashDist in action, and show how it can effectively support development, deployment, teaching, and

  14. An Ad Hoc Adaptive Hashing Technique forNon-Uniformly Distributed IP Address Lookup in Computer Networks

    Directory of Open Access Journals (Sweden)

    Christopher Martinez

    2007-02-01

    Full Text Available Hashing algorithms long have been widely adopted to design a fast address look-up process which involves a search through a large database to find a record associated with a given key. Hashing algorithms involve transforming a key inside each target data to a hash value hoping that the hashing would render the database a uniform distribution with respect to this new hash value. The close the final distribution is to uniform, the less search time would be required when a query is made. When the database is already key-wise uniformly distributed, any regular hashing algorithm, such as bit-extraction, bit-group XOR, etc., would easily lead to a statistically perfect uniform distribution after the hashing. On the other hand, if records in the database are instead not uniformly distributed as in almost all known practical applications, then even different regular hash functions would lead to very different performance. When the target database has a key with a highly skewed distributed value, performance delivered by regular hashing algorithms usually becomes far from desirable. This paper aims at designing a hashing algorithm to achieve the highest probability in leading to a uniformly distributed hash result from a non-uniformly distributed database. An analytical pre-process on the original database is first performed to extract critical information that would significantly benefit the design of a better hashing algorithm. This process includes sorting on the bits of the key to prioritize the use of them in the XOR hashing sequence, or in simple bit extraction, or even a combination of both. Such an ad hoc hash design is critical to adapting to all real-time situations when there exists a changing (and/or expanding database with an irregular non-uniform distribution. Significant improvement from simulation results is obtained in randomly generated data as well as real data.

  15. Compact binary hashing for music retrieval

    Science.gov (United States)

    Seo, Jin S.

    2014-03-01

    With the huge volume of music clips available for protection, browsing, and indexing, there is an increased attention to retrieve the information contents of the music archives. Music-similarity computation is an essential building block for browsing, retrieval, and indexing of digital music archives. In practice, as the number of songs available for searching and indexing is increased, so the storage cost in retrieval systems is becoming a serious problem. This paper deals with the storage problem by extending the supervector concept with the binary hashing. We utilize the similarity-preserving binary embedding in generating a hash code from the supervector of each music clip. Especially we compare the performance of the various binary hashing methods for music retrieval tasks on the widely-used genre dataset and the in-house singer dataset. Through the evaluation, we find an effective way of generating hash codes for music similarity estimation which improves the retrieval performance.

  16. FBC: a flat binary code scheme for fast Manhattan hash retrieval

    Science.gov (United States)

    Kong, Yan; Wu, Fuzhang; Gao, Lifa; Wu, Yanjun

    2018-04-01

    Hash coding is a widely used technique in approximate nearest neighbor (ANN) search, especially in document search and multimedia (such as image and video) retrieval. Based on the difference of distance measurement, hash methods are generally classified into two categories: Hamming hashing and Manhattan hashing. Benefitting from better neighborhood structure preservation, Manhattan hashing methods outperform earlier methods in search effectiveness. However, due to using decimal arithmetic operations instead of bit operations, Manhattan hashing becomes a more time-consuming process, which significantly decreases the whole search efficiency. To solve this problem, we present an intuitive hash scheme which uses Flat Binary Code (FBC) to encode the data points. As a result, the decimal arithmetic used in previous Manhattan hashing can be replaced by more efficient XOR operator. The final experiments show that with a reasonable memory space growth, our FBC speeds up more than 80% averagely without any search accuracy loss when comparing to the state-of-art Manhattan hashing methods.

  17. SPONGENT: The Design Space of Lightweight Cryptographic Hashing

    DEFF Research Database (Denmark)

    Bogdanov, Andrey; Knezevic, Miroslav; Leander, Gregor

    2013-01-01

    construction instantiated with present-type permutations. The resulting family of hash functions is called spongent. We propose 13 spongent variants--or different levels of collision and (second) preimage resistance as well as for various implementation constraints. For each of them, we provide several ASIC...

  18. Locality-sensitive Hashing without False Negatives

    DEFF Research Database (Denmark)

    Pagh, Rasmus

    2016-01-01

    We consider a new construction of locality-sensitive hash functions for Hamming space that is covering in the sense that is it guaranteed to produce a collision for every pair of vectors within a given radius r. The construction is efficient in the sense that the expected number of hash collisions......(n)/k, where n is the number of points in the data set and k ∊ N, and differs from it by at most a factor ln(4) in the exponent for general values of cr. As a consequence, LSH-based similarity search in Hamming space can avoid the problem of false negatives at little or no cost in efficiency. Read More: http...... between vectors at distance cr, for a given c > 1, comes close to that of the best possible data independent LSH without the covering guarantee, namely, the seminal LSH construction of Indyk and Motwani (FOCS ′98). The efficiency of the new construction essentially matches their bound if cr = log...

  19. Combination of advanced encryption standard 256 bits with md5 to secure documents on android smartphone

    Science.gov (United States)

    Pasaribu, Hendra; Sitanggang, Delima; Rizki Damanik, Rudolfo; Rudianto Sitompul, Alex Chandra

    2018-04-01

    File transfer by using a smartphone has some security issues like data theft by irresponsible parties. To improve the quality of data security systems on smartphones, in this research the integration of AES 256 bit algorithm by using MD5 hashing is proposed. The use of MD5 aims to increase the key strength of the encryption and decryption process of document files. The test results show that the proposed method can increase the key strength of the encryption and decryption process in the document file. Encryption and decryption time by using AES and MD5 combination is faster than using AES only on *.txt file type and reverse results for *.docx, *.xlsx, *.pptx and *.pdf file files.

  20. MULTIMEDIA DATA TRANSMISSION THROUGH TCP/IP USING HASH BASED FEC WITH AUTO-XOR SCHEME

    Directory of Open Access Journals (Sweden)

    R. Shalin

    2012-09-01

    Full Text Available The most preferred mode for communication of multimedia data is through the TCP/IP protocol. But on the other hand the TCP/IP protocol produces huge packet loss unavoidable due to network traffic and congestion. In order to provide a efficient communication it is necessary to recover the loss of packets. The proposed scheme implements Hash based FEC with auto XOR scheme for this purpose. The scheme is implemented through Forward error correction, MD5 and XOR for providing efficient transmission of multimedia data. The proposed scheme provides transmission high accuracy, throughput and low latency and loss.

  1. Scalable Packet Classification with Hash Tables

    Science.gov (United States)

    Wang, Pi-Chung

    In the last decade, the technique of packet classification has been widely deployed in various network devices, including routers, firewalls and network intrusion detection systems. In this work, we improve the performance of packet classification by using multiple hash tables. The existing hash-based algorithms have superior scalability with respect to the required space; however, their search performance may not be comparable to other algorithms. To improve the search performance, we propose a tuple reordering algorithm to minimize the number of accessed hash tables with the aid of bitmaps. We also use pre-computation to ensure the accuracy of our search procedure. Performance evaluation based on both real and synthetic filter databases shows that our scheme is effective and scalable and the pre-computation cost is moderate.

  2. Hashing in computer science fifty years of slicing and dicing

    CERN Document Server

    Konheim, Alan G

    2009-01-01

    Written by one of the developers of the technology, Hashing is both a historical document on the development of hashing and an analysis of the applications of hashing in a society increasingly concerned with security. The material in this book is based on courses taught by the author, and key points are reinforced in sample problems and an accompanying instructor s manual. Graduate students and researchers in mathematics, cryptography, and security will benefit from this overview of hashing and the complicated mathematics that it requires

  3. Building Modern GPU Brute-Force Collision Resistible Hash Algorithm

    Directory of Open Access Journals (Sweden)

    L. A. Nadeinsky

    2012-03-01

    Full Text Available The article considers methods of fixing storing passwords in hashed form security vulnerability. Suggested hashing algorithm is based on the specifics of architecture of modern graphics processors.

  4. Dakota - hashing from a combination of modular arithmetic and symmetric cryptography

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Knudsen, Lars Ramkilde; Thomsen, Søren Steffen

    In this paper a cryptographic hash function is proposed, where collision resistance is based upon an assumption that involves squaring modulo an RSA modulus in combination with a one-way function that does not compress its input, and may therefore be constructed from standard techniques and assum...

  5. Probabilistic hypergraph based hash codes for social image search

    Institute of Scientific and Technical Information of China (English)

    Yi XIE; Hui-min YU; Roland HU

    2014-01-01

    With the rapid development of the Internet, recent years have seen the explosive growth of social media. This brings great challenges in performing efficient and accurate image retrieval on a large scale. Recent work shows that using hashing methods to embed high-dimensional image features and tag information into Hamming space provides a powerful way to index large collections of social images. By learning hash codes through a spectral graph partitioning algorithm, spectral hashing (SH) has shown promising performance among various hashing approaches. However, it is incomplete to model the relations among images only by pairwise simple graphs which ignore the relationship in a higher order. In this paper, we utilize a probabilistic hypergraph model to learn hash codes for social image retrieval. A probabilistic hypergraph model offers a higher order repre-sentation among social images by connecting more than two images in one hyperedge. Unlike a normal hypergraph model, a probabilistic hypergraph model considers not only the grouping information, but also the similarities between vertices in hy-peredges. Experiments on Flickr image datasets verify the performance of our proposed approach.

  6. Dakota – Hashing from a Combination of Modular Arithmetic and Symmetric Cryptography

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Knudsen, Lars Ramkilde; Thomsen, Søren Steffen

    2008-01-01

    In this paper a cryptographic hash function is proposed, where collision resistance is based upon an assumption that involves squaring modulo an RSA modulus in combination with a one-way function that does not compress its input, and may therefore be constructed from standard techniques and assum...

  7. Local Deep Hashing Matching of Aerial Images Based on Relative Distance and Absolute Distance Constraints

    Directory of Open Access Journals (Sweden)

    Suting Chen

    2017-12-01

    Full Text Available Aerial images have features of high resolution, complex background, and usually require large amounts of calculation, however, most algorithms used in matching of aerial images adopt the shallow hand-crafted features expressed as floating-point descriptors (e.g., SIFT (Scale-invariant Feature Transform, SURF (Speeded Up Robust Features, which may suffer from poor matching speed and are not well represented in the literature. Here, we propose a novel Local Deep Hashing Matching (LDHM method for matching of aerial images with large size and with lower complexity or fast matching speed. The basic idea of the proposed algorithm is to utilize the deep network model in the local area of the aerial images, and study the local features, as well as the hash function of the images. Firstly, according to the course overlap rate of aerial images, the algorithm extracts the local areas for matching to avoid the processing of redundant information. Secondly, a triplet network structure is proposed to mine the deep features of the patches of the local image, and the learned features are imported to the hash layer, thus obtaining the representation of a binary hash code. Thirdly, the constraints of the positive samples to the absolute distance are added on the basis of the triplet loss, a new objective function is constructed to optimize the parameters of the network and enhance the discriminating capabilities of image patch features. Finally, the obtained deep hash code of each image patch is used for the similarity comparison of the image patches in the Hamming space to complete the matching of aerial images. The proposed LDHM algorithm evaluates the UltraCam-D dataset and a set of actual aerial images, simulation result demonstrates that it may significantly outperform the state-of-the-art algorithm in terms of the efficiency and performance.

  8. Discriminative Projection Selection Based Face Image Hashing

    Science.gov (United States)

    Karabat, Cagatay; Erdogan, Hakan

    Face image hashing is an emerging method used in biometric verification systems. In this paper, we propose a novel face image hashing method based on a new technique called discriminative projection selection. We apply the Fisher criterion for selecting the rows of a random projection matrix in a user-dependent fashion. Moreover, another contribution of this paper is to employ a bimodal Gaussian mixture model at the quantization step. Our simulation results on three different databases demonstrate that the proposed method has superior performance in comparison to previously proposed random projection based methods.

  9. Practical security and privacy attacks against biometric hashing using sparse recovery

    Science.gov (United States)

    Topcu, Berkay; Karabat, Cagatay; Azadmanesh, Matin; Erdogan, Hakan

    2016-12-01

    Biometric hashing is a cancelable biometric verification method that has received research interest recently. This method can be considered as a two-factor authentication method which combines a personal password (or secret key) with a biometric to obtain a secure binary template which is used for authentication. We present novel practical security and privacy attacks against biometric hashing when the attacker is assumed to know the user's password in order to quantify the additional protection due to biometrics when the password is compromised. We present four methods that can reconstruct a biometric feature and/or the image from a hash and one method which can find the closest biometric data (i.e., face image) from a database. Two of the reconstruction methods are based on 1-bit compressed sensing signal reconstruction for which the data acquisition scenario is very similar to biometric hashing. Previous literature introduced simple attack methods, but we show that we can achieve higher level of security threats using compressed sensing recovery techniques. In addition, we present privacy attacks which reconstruct a biometric image which resembles the original image. We quantify the performance of the attacks using detection error tradeoff curves and equal error rates under advanced attack scenarios. We show that conventional biometric hashing methods suffer from high security and privacy leaks under practical attacks, and we believe more advanced hash generation methods are necessary to avoid these attacks.

  10. Toward Optimal Manifold Hashing via Discrete Locally Linear Embedding.

    Science.gov (United States)

    Rongrong Ji; Hong Liu; Liujuan Cao; Di Liu; Yongjian Wu; Feiyue Huang

    2017-11-01

    Binary code learning, also known as hashing, has received increasing attention in large-scale visual search. By transforming high-dimensional features to binary codes, the original Euclidean distance is approximated via Hamming distance. More recently, it is advocated that it is the manifold distance, rather than the Euclidean distance, that should be preserved in the Hamming space. However, it retains as an open problem to directly preserve the manifold structure by hashing. In particular, it first needs to build the local linear embedding in the original feature space, and then quantize such embedding to binary codes. Such a two-step coding is problematic and less optimized. Besides, the off-line learning is extremely time and memory consuming, which needs to calculate the similarity matrix of the original data. In this paper, we propose a novel hashing algorithm, termed discrete locality linear embedding hashing (DLLH), which well addresses the above challenges. The DLLH directly reconstructs the manifold structure in the Hamming space, which learns optimal hash codes to maintain the local linear relationship of data points. To learn discrete locally linear embeddingcodes, we further propose a discrete optimization algorithm with an iterative parameters updating scheme. Moreover, an anchor-based acceleration scheme, termed Anchor-DLLH, is further introduced, which approximates the large similarity matrix by the product of two low-rank matrices. Experimental results on three widely used benchmark data sets, i.e., CIFAR10, NUS-WIDE, and YouTube Face, have shown superior performance of the proposed DLLH over the state-of-the-art approaches.

  11. ANALISA FUNGSI HASH DALAM ENKRIPSI IDEA UNTUK KEAMANAN RECORD INFORMASI

    Directory of Open Access Journals (Sweden)

    Ramen Antonov Purba

    2014-02-01

    Full Text Available Issues of security and confidentiality of data is very important to organization or individual. If the data in a network of computers connected with a public network such as the Internet. Of course a very important data is viewed or hijacked by unauthorized persons. Because if this happens we will probably corrupted data can be lost even that will cause huge material losses. This research discusses the security system of sending messages/data using the encryption aims to maintain access of security a message from the people who are not authorized/ eligible. Because of this delivery system is very extensive security with the scope then this section is limited only parsing the IDEA Algorithm with hash functions, which include encryption, decryption. By combining the encryption IDEA methods (International Data Encryption Algorithm to encrypt the contents of the messages/data with the hash function to detect changes the content of messages/data is expected security level to be better. Results from this study a software that can perform encryption and decryption of messages/data, generate the security key based on the message/data is encrypted.

  12. Object-Location-Aware Hashing for Multi-Label Image Retrieval via Automatic Mask Learning.

    Science.gov (United States)

    Huang, Chang-Qin; Yang, Shang-Ming; Pan, Yan; Lai, Han-Jiang

    2018-09-01

    Learning-based hashing is a leading approach of approximate nearest neighbor search for large-scale image retrieval. In this paper, we develop a deep supervised hashing method for multi-label image retrieval, in which we propose to learn a binary "mask" map that can identify the approximate locations of objects in an image, so that we use this binary "mask" map to obtain length-limited hash codes which mainly focus on an image's objects but ignore the background. The proposed deep architecture consists of four parts: 1) a convolutional sub-network to generate effective image features; 2) a binary "mask" sub-network to identify image objects' approximate locations; 3) a weighted average pooling operation based on the binary "mask" to obtain feature representations and hash codes that pay most attention to foreground objects but ignore the background; and 4) the combination of a triplet ranking loss designed to preserve relative similarities among images and a cross entropy loss defined on image labels. We conduct comprehensive evaluations on four multi-label image data sets. The results indicate that the proposed hashing method achieves superior performance gains over the state-of-the-art supervised or unsupervised hashing baselines.

  13. Robust visual hashing via ICA

    International Nuclear Information System (INIS)

    Fournel, Thierry; Coltuc, Daniela

    2010-01-01

    Designed to maximize information transmission in the presence of noise, independent component analysis (ICA) could appear in certain circumstances as a statistics-based tool for robust visual hashing. Several ICA-based scenarios can attempt to reach this goal. A first one is here considered.

  14. Range-efficient consistent sampling and locality-sensitive hashing for polygons

    DEFF Research Database (Denmark)

    Gudmundsson, Joachim; Pagh, Rasmus

    2017-01-01

    Locality-sensitive hashing (LSH) is a fundamental technique for similarity search and similarity estimation in high-dimensional spaces. The basic idea is that similar objects should produce hash collisions with probability significantly larger than objects with low similarity. We consider LSH for...... or union of a set of preprocessed polygons. Curiously, our consistent sampling method uses transformation to a geometric problem....

  15. Linear-XOR and Additive Checksums Don't Protect Damgard-Merkle Hashes

    DEFF Research Database (Denmark)

    Gauravaram, Praveen; Kelsey, John

    2008-01-01

    We consider the security of Damg\\aa{}rd-Merkle variants which compute linear-XOR or additive checksums over message blocks, intermediate hash values, or both, and process these checksums in computing the final hash value. We show that these Damg\\aa{}rd-Merkle variants gain almost no security...

  16. Speaker Linking and Applications using Non-Parametric Hashing Methods

    Science.gov (United States)

    2016-09-08

    nonparametric estimate of a multivariate density function,” The Annals of Math- ematical Statistics , vol. 36, no. 3, pp. 1049–1051, 1965. [9] E. A. Patrick...Speaker Linking and Applications using Non-Parametric Hashing Methods† Douglas Sturim and William M. Campbell MIT Lincoln Laboratory, Lexington, MA...with many approaches [1, 2]. For this paper, we focus on using i-vectors [2], but the methods apply to any embedding. For the task of speaker QBE and

  17. Molecular cloning and functional analysis of a blue light receptor gene MdCRY2 from apple (Malus domestica).

    Science.gov (United States)

    Li, Yuan-Yuan; Mao, Ke; Zhao, Cheng; Zhao, Xian-Yan; Zhang, Rui-Fen; Zhang, Hua-Lei; Shu, Huai-Rui; Hao, Yu-Jin

    2013-04-01

    MdCRY2 was isolated from apple fruit skin, and its function was analyzed in MdCRY2 transgenic Arabidopsis. The interaction between MdCRY2 and AtCOP1 was found by yeast two-hybrid and BiFC assays. Cryptochromes are blue/ultraviolet-A (UV-A) light receptors involved in regulating various aspects of plant growth and development. Investigations of the structure and functions of cryptochromes in plants have largely focused on Arabidopsis (Arabidopsis thaliana), tomato (Solanum lycopersicum), pea (Pisum sativum), and rice (Oryza sativa). However, no data on the function of CRY2 are available in woody plants. In this study, we isolated a cryptochrome gene, MdCRY2, from apple (Malus domestica). The deduced amino acid sequences of MdCRY2 contain the conserved N-terminal photolyase-related domain and the flavin adenine dinucleotide (FAD) binding domain, as well as the C-terminal DQXVP-acidic-STAES (DAS) domain. Relationship analysis indicates that MdCRY2 shows the highest similarity to the strawberry FvCRY protein. The expression of MdCRY2 is induced by blue/UV-A light, which represents a 48-h circadian rhythm. To investigate the function of MdCRY2, we overexpressed the MdCRY2 gene in a cry2 mutant and wild type (WT) Arabidopsis, assessed the phenotypes of the resulting transgenic plants, and found that MdCRY2 functions to regulate hypocotyl elongation, root growth, flower initiation, and anthocyanin accumulation. Furthermore, we examined the interaction between MdCRY2 and AtCOP1 using a yeast two-hybrid assay and a bimolecular fluorescence complementation assay. These data provide functional evidence for a role of blue/UV-A light-induced MdCRY2 in controlling photomorphogenesis in apple.

  18. Five Performance Enhancements for Hybrid Hash Join

    National Research Council Canada - National Science Library

    Graefe, Goetz

    1992-01-01

    .... We discuss five performance enhancements for hybrid hash join algorithms, namely data compression, large cluster sizes and multi-level recursion, role reversal of build and probe inputs, histogram...

  19. System using data compression and hashing adapted for use for multimedia encryption

    Science.gov (United States)

    Coffland, Douglas R [Livermore, CA

    2011-07-12

    A system and method is disclosed for multimedia encryption. Within the system of the present invention, a data compression module receives and compresses a media signal into a compressed data stream. A data acquisition module receives and selects a set of data from the compressed data stream. And, a hashing module receives and hashes the set of data into a keyword. The method of the present invention includes the steps of compressing a media signal into a compressed data stream; selecting a set of data from the compressed data stream; and hashing the set of data into a keyword.

  20. Data Collision Prevention with Overflow Hashing Technique in Closed Hash Searching Process

    Science.gov (United States)

    Rahim, Robbi; Nurjamiyah; Rafika Dewi, Arie

    2017-12-01

    Hash search is a method that can be used for various search processes such as search engines, sorting, machine learning, neural network and so on, in the search process the possibility of collision data can happen and to prevent the occurrence of collision can be done in several ways one of them is to use Overflow technique, the use of this technique perform with varying length of data and this technique can prevent the occurrence of data collisions.

  1. A scalable lock-free hash table with open addressing

    DEFF Research Database (Denmark)

    Nielsen, Jesper Puge; Karlsson, Sven

    2016-01-01

    and concurrent operations without any locks. In this paper, we present a new fully lock-free open addressed hash table with a simpler design than prior published work. We split hash table insertions into two atomic phases: first inserting a value ignoring other concurrent operations, then in the second phase......Concurrent data structures synchronized with locks do not scale well with the number of threads. As more scalable alternatives, concurrent data structures and algorithms based on widely available, however advanced, atomic operations have been proposed. These data structures allow for correct...

  2. Simultenious binary hash and features learning for image retrieval

    Science.gov (United States)

    Frantc, V. A.; Makov, S. V.; Voronin, V. V.; Marchuk, V. I.; Semenishchev, E. A.; Egiazarian, K. O.; Agaian, S.

    2016-05-01

    Content-based image retrieval systems have plenty of applications in modern world. The most important one is the image search by query image or by semantic description. Approaches to this problem are employed in personal photo-collection management systems, web-scale image search engines, medical systems, etc. Automatic analysis of large unlabeled image datasets is virtually impossible without satisfactory image-retrieval technique. It's the main reason why this kind of automatic image processing has attracted so much attention during recent years. Despite rather huge progress in the field, semantically meaningful image retrieval still remains a challenging task. The main issue here is the demand to provide reliable results in short amount of time. This paper addresses the problem by novel technique for simultaneous learning of global image features and binary hash codes. Our approach provide mapping of pixel-based image representation to hash-value space simultaneously trying to save as much of semantic image content as possible. We use deep learning methodology to generate image description with properties of similarity preservation and statistical independence. The main advantage of our approach in contrast to existing is ability to fine-tune retrieval procedure for very specific application which allow us to provide better results in comparison to general techniques. Presented in the paper framework for data- dependent image hashing is based on use two different kinds of neural networks: convolutional neural networks for image description and autoencoder for feature to hash space mapping. Experimental results confirmed that our approach has shown promising results in compare to other state-of-the-art methods.

  3. Parallel Algorithm of Geometrical Hashing Based on NumPy Package and Processes Pool

    Directory of Open Access Journals (Sweden)

    Klyachin Vladimir Aleksandrovich

    2015-10-01

    Full Text Available The article considers the problem of multi-dimensional geometric hashing. The paper describes a mathematical model of geometric hashing and considers an example of its use in localization problems for the point. A method of constructing the corresponding hash matrix by parallel algorithm is considered. In this paper an algorithm of parallel geometric hashing using a development pattern «pool processes» is proposed. The implementation of the algorithm is executed using the Python programming language and NumPy package for manipulating multidimensional data. To implement the process pool it is proposed to use a class Process Pool Executor imported from module concurrent.futures, which is included in the distribution of the interpreter Python since version 3.2. All the solutions are presented in the paper by corresponding UML class diagrams. Designed GeomNash package includes classes Data, Result, GeomHash, Job. The results of the developed program presents the corresponding graphs. Also, the article presents the theoretical justification for the application process pool for the implementation of parallel algorithms. It is obtained condition t2 > (p/(p-1*t1 of the appropriateness of process pool. Here t1 - the time of transmission unit of data between processes, and t2 - the time of processing unit data by one processor.

  4. Functional Characterization of the Apple RING E3 Ligase MdMIEL1 in Transgenic Arabidopsis

    Directory of Open Access Journals (Sweden)

    Jianping AN

    2017-03-01

    Full Text Available E3 ubiquitin ligases are involved in various physiological processes, and they play pivotal roles in growth and development. In this study, we identified a previously unknown gene in the apple fruit (Malus × domestica and named it MdMIEL1. The MdMIEL1 gene encoded a protein that contained a zinc-finger domain at its N-terminus and a RING-finger motif at its C-terminus. To investigate MdMIEL1 functions, we generated transgenic Arabidopsis lines expressing the MdMIEL1 gene under the control of the Cauliflower mosaic virus 35S promoter. Interestingly, ectopic expression of MdMIEL1 in Arabidopsis produced multiple phenotypes, including early germination, early flowering and a lateral root number increase relative to wild-type plants. Further analysis indicated that MdMIEL1 regulated lateral root initiation by increasing auxin accumulation in the roots. In a word, these results suggest that, MdMIEL1 as a novel RING-finger ubiquitin ligase influences plant growth and development, and highlight that MdMIEL1 regulates lateral root growth.

  5. An Access Control Protocol for Wireless Sensor Network Using Double Trapdoor Chameleon Hash Function

    Directory of Open Access Journals (Sweden)

    Tejeshwari Thakur

    2016-01-01

    Full Text Available Wireless sensor network (WSN, a type of communication system, is normally deployed into the unattended environment where the intended user can get access to the network. The sensor nodes collect data from this environment. If the data are valuable and confidential, then security measures are needed to protect them from the unauthorized access. This situation requires an access control protocol (ACP in the design of sensor network because of sensor nodes which are vulnerable to various malicious attacks during the authentication and key establishment and the new node addition phase. In this paper, we propose a secured ACP for such WSN. This protocol is based on Elliptic Curve Discrete Log Problem (ECDLP and double trapdoor chameleon hash function which secures the WSN from malicious attacks such as node masquerading attack, replay attack, man-in-the-middle attack, and forgery attacks. Proposed ACP has a special feature known as session key security. Also, the proposed ACP is more efficient as it requires only one modular multiplication during the initialization phase.

  6. All in a day's work: Password cracking for the rest of us

    OpenAIRE

    Blakstad, Jørgen Wahl; Nergård, Rune; Jaatun, Martin Gilje; Gligoroski, Danilo

    2009-01-01

    The majority of computer systems are still protected primarily with a user name and password, and many users employ the same password on multiple systems. Additionally, some of the most popular operating systems such as Windows XP, Windows Vista and the upcoming Windows 7, still use ad-hoc constructed hash functions such as LM, while many Linux variants use the broken hash function MD5. This paper describes an experiment where we have tested the strengthof a selection of passwords when conver...

  7. MiMC: Efficient encryption and cryptographic hashing with minimal multiplicative complexity

    DEFF Research Database (Denmark)

    Albrecht, Martin; Grassi, Lorenzo; Rechberger, Christian

    2016-01-01

    and cryptographic hash functions is to reconsider and simplify the round function of the Knudsen-Nyberg cipher from 1995. The mapping F(x) := x3 is used as the main component there and is also the main component of our family of proposals called “MiMC”. We study various attack vectors for this construction and give...... a new attack vector that outperforms others in relevant settings. Due to its very low number of multiplications, the design lends itself well to a large class of applications, especially when the depth does not matter but the total number of multiplications in the circuit dominates all aspects...

  8. An algorithm for the detection of move repetition without the use of hash-keys

    Directory of Open Access Journals (Sweden)

    Vučković Vladan

    2007-01-01

    Full Text Available This paper addresses the theoretical and practical aspects of an important problem in computer chess programming - the problem of draw detection in cases of position repetition. The standard approach used in the majority of computer chess programs is hash-oriented. This method is sufficient in most cases, as the Zobrist keys are already present due to the systemic positional hashing, so that they need not be computed anew for the purpose of draw detection. The new type of the algorithm that we have developed solves the problem of draw detection in cases when Zobrist keys are not used in the program, i.e. in cases when the memory is not hashed.

  9. The Speech multi features fusion perceptual hash algorithm based on tensor decomposition

    Science.gov (United States)

    Huang, Y. B.; Fan, M. H.; Zhang, Q. Y.

    2018-03-01

    With constant progress in modern speech communication technologies, the speech data is prone to be attacked by the noise or maliciously tampered. In order to make the speech perception hash algorithm has strong robustness and high efficiency, this paper put forward a speech perception hash algorithm based on the tensor decomposition and multi features is proposed. This algorithm analyses the speech perception feature acquires each speech component wavelet packet decomposition. LPCC, LSP and ISP feature of each speech component are extracted to constitute the speech feature tensor. Speech authentication is done by generating the hash values through feature matrix quantification which use mid-value. Experimental results showing that the proposed algorithm is robust for content to maintain operations compared with similar algorithms. It is able to resist the attack of the common background noise. Also, the algorithm is highly efficiency in terms of arithmetic, and is able to meet the real-time requirements of speech communication and complete the speech authentication quickly.

  10. Visual hashing of digital video : applications and techniques

    NARCIS (Netherlands)

    Oostveen, J.; Kalker, A.A.C.M.; Haitsma, J.A.; Tescher, A.G.

    2001-01-01

    his paper present the concept of robust video hashing as a tool for video identification. We present considerations and a technique for (i) extracting essential perceptual features from a moving image sequences and (ii) for identifying any sufficiently long unknown video segment by efficiently

  11. Adoption of the Hash algorithm in a conceptual model for the civil registry of Ecuador

    Science.gov (United States)

    Toapanta, Moisés; Mafla, Enrique; Orizaga, Antonio

    2018-04-01

    The Hash security algorithm was analyzed in order to mitigate information security in a distributed architecture. The objective of this research is to develop a prototype for the Adoption of the algorithm Hash in a conceptual model for the Civil Registry of Ecuador. The deductive method was used in order to analyze the published articles that have a direct relation with the research project "Algorithms and Security Protocols for the Civil Registry of Ecuador" and articles related to the Hash security algorithm. It resulted from this research: That the SHA-1 security algorithm is appropriate for use in Ecuador's civil registry; we adopted the SHA-1 algorithm used in the flowchart technique and finally we obtained the adoption of the hash algorithm in a conceptual model. It is concluded that from the comparison of the DM5 and SHA-1 algorithm, it is suggested that in the case of an implementation, the SHA-1 algorithm is taken due to the amount of information and data available from the Civil Registry of Ecuador; It is determined that the SHA-1 algorithm that was defined using the flowchart technique can be modified according to the requirements of each institution; the model for adopting the hash algorithm in a conceptual model is a prototype that can be modified according to all the actors that make up each organization.

  12. A Hash Based Remote User Authentication and Authenticated Key Agreement Scheme for the Integrated EPR Information System.

    Science.gov (United States)

    Li, Chun-Ta; Weng, Chi-Yao; Lee, Cheng-Chi; Wang, Chun-Cheng

    2015-11-01

    To protect patient privacy and ensure authorized access to remote medical services, many remote user authentication schemes for the integrated electronic patient record (EPR) information system have been proposed in the literature. In a recent paper, Das proposed a hash based remote user authentication scheme using passwords and smart cards for the integrated EPR information system, and claimed that the proposed scheme could resist various passive and active attacks. However, in this paper, we found that Das's authentication scheme is still vulnerable to modification and user duplication attacks. Thereafter we propose a secure and efficient authentication scheme for the integrated EPR information system based on lightweight hash function and bitwise exclusive-or (XOR) operations. The security proof and performance analysis show our new scheme is well-suited to adoption in remote medical healthcare services.

  13. Random multispace quantization as an analytic mechanism for BioHashing of biometric and random identity inputs.

    Science.gov (United States)

    Teoh, Andrew B J; Goh, Alwyn; Ngo, David C L

    2006-12-01

    Biometric analysis for identity verification is becoming a widespread reality. Such implementations necessitate large-scale capture and storage of biometric data, which raises serious issues in terms of data privacy and (if such data is compromised) identity theft. These problems stem from the essential permanence of biometric data, which (unlike secret passwords or physical tokens) cannot be refreshed or reissued if compromised. Our previously presented biometric-hash framework prescribes the integration of external (password or token-derived) randomness with user-specific biometrics, resulting in bitstring outputs with security characteristics (i.e., noninvertibility) comparable to cryptographic ciphers or hashes. The resultant BioHashes are hence cancellable, i.e., straightforwardly revoked and reissued (via refreshed password or reissued token) if compromised. BioHashing furthermore enhances recognition effectiveness, which is explained in this paper as arising from the Random Multispace Quantization (RMQ) of biometric and external random inputs.

  14. Rotation invariant deep binary hashing for fast image retrieval

    Science.gov (United States)

    Dai, Lai; Liu, Jianming; Jiang, Aiwen

    2017-07-01

    In this paper, we study how to compactly represent image's characteristics for fast image retrieval. We propose supervised rotation invariant compact discriminative binary descriptors through combining convolutional neural network with hashing. In the proposed network, binary codes are learned by employing a hidden layer for representing latent concepts that dominate on class labels. A loss function is proposed to minimize the difference between binary descriptors that describe reference image and the rotated one. Compared with some other supervised methods, the proposed network doesn't have to require pair-wised inputs for binary code learning. Experimental results show that our method is effective and achieves state-of-the-art results on the CIFAR-10 and MNIST datasets.

  15. Robust Image Hashing Using Radon Transform and Invariant Features

    Directory of Open Access Journals (Sweden)

    Y.L. Liu

    2016-09-01

    Full Text Available A robust image hashing method based on radon transform and invariant features is proposed for image authentication, image retrieval, and image detection. Specifically, an input image is firstly converted into a counterpart with a normalized size. Then the invariant centroid algorithm is applied to obtain the invariant feature point and the surrounding circular area, and the radon transform is employed to acquire the mapping coefficient matrix of the area. Finally, the hashing sequence is generated by combining the feature vectors and the invariant moments calculated from the coefficient matrix. Experimental results show that this method not only can resist against the normal image processing operations, but also some geometric distortions. Comparisons of receiver operating characteristic (ROC curve indicate that the proposed method outperforms some existing methods in classification between perceptual robustness and discrimination.

  16. A Robust and Effective Smart-Card-Based Remote User Authentication Mechanism Using Hash Function

    Science.gov (United States)

    Odelu, Vanga; Goswami, Adrijit

    2014-01-01

    In a remote user authentication scheme, a remote server verifies whether a login user is genuine and trustworthy, and also for mutual authentication purpose a login user validates whether the remote server is genuine and trustworthy. Several remote user authentication schemes using the password, the biometrics, and the smart card have been proposed in the literature. However, most schemes proposed in the literature are either computationally expensive or insecure against several known attacks. In this paper, we aim to propose a new robust and effective password-based remote user authentication scheme using smart card. Our scheme is efficient, because our scheme uses only efficient one-way hash function and bitwise XOR operations. Through the rigorous informal and formal security analysis, we show that our scheme is secure against possible known attacks. We perform the simulation for the formal security analysis using the widely accepted AVISPA (Automated Validation Internet Security Protocols and Applications) tool to ensure that our scheme is secure against passive and active attacks. Furthermore, our scheme supports efficiently the password change phase always locally without contacting the remote server and correctly. In addition, our scheme performs significantly better than other existing schemes in terms of communication, computational overheads, security, and features provided by our scheme. PMID:24892078

  17. A Robust and Effective Smart-Card-Based Remote User Authentication Mechanism Using Hash Function

    Directory of Open Access Journals (Sweden)

    Ashok Kumar Das

    2014-01-01

    Full Text Available In a remote user authentication scheme, a remote server verifies whether a login user is genuine and trustworthy, and also for mutual authentication purpose a login user validates whether the remote server is genuine and trustworthy. Several remote user authentication schemes using the password, the biometrics, and the smart card have been proposed in the literature. However, most schemes proposed in the literature are either computationally expensive or insecure against several known attacks. In this paper, we aim to propose a new robust and effective password-based remote user authentication scheme using smart card. Our scheme is efficient, because our scheme uses only efficient one-way hash function and bitwise XOR operations. Through the rigorous informal and formal security analysis, we show that our scheme is secure against possible known attacks. We perform the simulation for the formal security analysis using the widely accepted AVISPA (Automated Validation Internet Security Protocols and Applications tool to ensure that our scheme is secure against passive and active attacks. Furthermore, our scheme supports efficiently the password change phase always locally without contacting the remote server and correctly. In addition, our scheme performs significantly better than other existing schemes in terms of communication, computational overheads, security, and features provided by our scheme.

  18. A robust and effective smart-card-based remote user authentication mechanism using hash function.

    Science.gov (United States)

    Das, Ashok Kumar; Odelu, Vanga; Goswami, Adrijit

    2014-01-01

    In a remote user authentication scheme, a remote server verifies whether a login user is genuine and trustworthy, and also for mutual authentication purpose a login user validates whether the remote server is genuine and trustworthy. Several remote user authentication schemes using the password, the biometrics, and the smart card have been proposed in the literature. However, most schemes proposed in the literature are either computationally expensive or insecure against several known attacks. In this paper, we aim to propose a new robust and effective password-based remote user authentication scheme using smart card. Our scheme is efficient, because our scheme uses only efficient one-way hash function and bitwise XOR operations. Through the rigorous informal and formal security analysis, we show that our scheme is secure against possible known attacks. We perform the simulation for the formal security analysis using the widely accepted AVISPA (Automated Validation Internet Security Protocols and Applications) tool to ensure that our scheme is secure against passive and active attacks. Furthermore, our scheme supports efficiently the password change phase always locally without contacting the remote server and correctly. In addition, our scheme performs significantly better than other existing schemes in terms of communication, computational overheads, security, and features provided by our scheme.

  19. Experimental study and nuclear model calculations on the $^{192}Os (p, n)^{192}$Ir reaction Comparison of reactor and cyclotron production of the therapeutic radionuclide $^{192}$Ir

    CERN Document Server

    Hilgers, K; Sudar, S; 10.1016/j.apradiso.2004.12.010

    2005-01-01

    In a search for an alternative route of production of the important therapeutic radionuclide /sup 192/Ir (T/sub 1/2/=78.83 d), the excitation function of the reaction /sup 192/Os(p, n)/sup 192/Ir was investigated from its threshold up to 20MeV. Thin samples of enriched /sup 192/Os were obtained by electrodeposition on Ni, and the conventional stacked-foil technique was used for cross section measurements. The experimental data were compared with the results of theoretical calculations using the codes EMPIRE-II and ALICE-IPPE. Good agreement was found with EMPIRE-II, but slightly less with the ALICE-IPPE calculations. The theoretical thick target yield of /sup 192/Ir over the energy range E/sub p/=16 to 8MeV amounts to only 0.16MBq/ mu A.h. A comparison of the reactor and cyclotron production methods is given. In terms of yield and radionuclidic purity of /sup 192/Ir the reactor method appears to be superior; the only advantage of the cyclotron method could be the higher specific activity of the product.

  20. EFFICIENCY ANALYSIS OF HASHING METHODS FOR FILE SYSTEMS IN USER MODE

    Directory of Open Access Journals (Sweden)

    E. Y. Ivanov

    2013-05-01

    Full Text Available The article deals with characteristics and performance of interaction protocols between virtual file system and file system, their influence on processing power of microkernel operating systems. User mode implementation of ext2 file system for MINIX 3 OS is used to show that in microkernel operating systems file object identification time might increase up to 26 times in comparison with monolithic systems. Therefore, we present efficiency analysis of various hashing methods for file systems, running in user mode. Studies have shown that using hashing methods recommended in this paper it is possible to achieve competitive performance of the considered component of I/O stacks in microkernel and monolithic operating systems.

  1. HASH: the Hong Kong/AAO/Strasbourg Hα planetary nebula database

    International Nuclear Information System (INIS)

    Parker, Quentin A; Bojičić, Ivan S; Frew, David J

    2016-01-01

    By incorporating our major recent discoveries with re-measured and verified contents of existing catalogues we provide, for the first time, an accessible, reliable, on-line SQL database for essential, up-to date information for all known Galactic planetary nebulae (PNe). We have attempted to: i) reliably remove PN mimics/false ID's that have biased previous studies and ii) provide accurate positions, sizes, morphologies, multi-wavelength imagery and spectroscopy. We also provide a link to CDS/Vizier for the archival history of each object and other valuable links to external data. With the HASH interface, users can sift, select, browse, collate, investigate, download and visualise the entire currently known Galactic PNe diversity. HASH provides the community with the most complete and reliable data with which to undertake new science. (paper)

  2. Apple fruit acidity is genetically diversified by natural variations in three hierarchical epistatic genes MdSAUR37, MdPP2CH and MdALMTII.

    Science.gov (United States)

    Jia, Dongjie; Shen, Fei; Wang, Yi; Wu, Ting; Xu, Xuefeng; Zhang, Xinzhong; Han, Zhenhai

    2018-05-11

    Many efforts have been made to map quantitative trait loci (QTLs) to facilitate practical marker-assisted selection (MAS) in plants. In the present study, we identified four genome-wide major QTLs responsible for apple fruit acidity by MapQTL and BSA-seq analyses using two independent pedigree-based populations. Candidate genes were screened in major QTL regions, and three functional gene markers, including a non-synonymous A/G single nucleotide polymorphism (SNP) in the coding region of MdPP2CH, a 36-bp insertion in the promoter of MdSAUR37, and a previously reported SNP in MdALMTII, were validated to influence the malate content of apple fruits. In addition, MdPP2CH inactivated three vacuolar H + -ATPases (MdVHA-A3, MdVHA-B2 and MdVHA-D2) and one aluminium-activated malate transporter (MdALMTII) via dephosphorylation and negatively influenced fruit malate accumulation. The dephosphotase activity of MdPP2CH was suppressed by MdSAUR37, which implied a higher hierarchy of genetic interaction. Therefore, the MdSAUR37/MdPP2CH/MdALMTII chain cascaded hierarchical epistatic genetic effects to precisely determine apple fruit malate content. An A/G SNP (-1010) on MdMYB44 promoter region from a major QTL (qtl08.1) was closely associated with fruit malate content. The predicted phenotype values (PPVs) were estimated using the tentative genotype values of the gene markers, and the PPVs were significantly correlated with the observed phenotype values. Our findings provide an insight into plant genome-based selection in apples and will aid in conducting research to understand the physiological fundamentals of quantitative genetics. This article is protected by copyright. All rights reserved. This article is protected by copyright. All rights reserved.

  3. Simulation-Based Performance Evaluation of Predictive-Hashing Based Multicast Authentication Protocol

    Directory of Open Access Journals (Sweden)

    Seonho Choi

    2012-12-01

    Full Text Available A predictive-hashing based Denial-of-Service (DoS resistant multicast authentication protocol was proposed based upon predictive-hashing, one-way key chain, erasure codes, and distillation codes techniques [4, 5]. It was claimed that this new scheme should be more resistant to various types of DoS attacks, and its worst-case resource requirements were derived in terms of coarse-level system parameters including CPU times for signature verification and erasure/distillation decoding operations, attack levels, etc. To show the effectiveness of our approach and to analyze exact resource requirements in various attack scenarios with different parameter settings, we designed and implemented an attack simulator which is platformindependent. Various attack scenarios may be created with different attack types and parameters against a receiver equipped with the predictive-hashing based protocol. The design of the simulator is explained, and the simulation results are presented with detailed resource usage statistics. In addition, resistance level to various types of DoS attacks is formulated with a newly defined resistance metric. By comparing these results to those from another approach, PRABS [8], we show that the resistance level of our protocol is greatly enhanced even in the presence of many attack streams.

  4. A multi-pattern hash-binary hybrid algorithm for URL matching in the HTTP protocol.

    Directory of Open Access Journals (Sweden)

    Ping Zeng

    Full Text Available In this paper, based on our previous multi-pattern uniform resource locator (URL binary-matching algorithm called HEM, we propose an improved multi-pattern matching algorithm called MH that is based on hash tables and binary tables. The MH algorithm can be applied to the fields of network security, data analysis, load balancing, cloud robotic communications, and so on-all of which require string matching from a fixed starting position. Our approach effectively solves the performance problems of the classical multi-pattern matching algorithms. This paper explores ways to improve string matching performance under the HTTP protocol by using a hash method combined with a binary method that transforms the symbol-space matching problem into a digital-space numerical-size comparison and hashing problem. The MH approach has a fast matching speed, requires little memory, performs better than both the classical algorithms and HEM for matching fields in an HTTP stream, and it has great promise for use in real-world applications.

  5. Accelerating SPARQL queries by exploiting hash-based locality and adaptive partitioning

    KAUST Repository

    Al-Harbi, Razen; Abdelaziz, Ibrahim; Kalnis, Panos; Mamoulis, Nikos; Ebrahim, Yasser; Sahli, Majed

    2016-01-01

    State-of-the-art distributed RDF systems partition data across multiple computer nodes (workers). Some systems perform cheap hash partitioning, which may result in expensive query evaluation. Others try to minimize inter-node communication, which

  6. Rotational Rebound Attacks on Reduced Skein

    DEFF Research Database (Denmark)

    Khovratovich, Dmitry; Nikolić, Ivica; Rechberger, Christian

    2014-01-01

    ciphers, including the new standard SHA-3 (Keccak). The rebound attack is a start-from-the-middle approach for finding differential paths and conforming pairs in byte-oriented designs like Substitution-Permutation networks and AES. We apply our new compositional attack to the reduced version of the hash...... number of rounds. We also use neutral bits and message modification methods from the practice of collision search in MD5 and SHA-1 hash functions. These methods push the rotational property through more rounds than previous analysis suggested, and eventually establish a distinguishing property...

  7. HashLearn Now: Mobile Tutoring in India

    OpenAIRE

    Arun Kumar Agariya; Binay Krishna Shivam; Shashank Murali; Jyoti Tikoria

    2016-01-01

    Looking at today’s competitive exams scenario, a single mark may lead to a differentiation of rank in multiples of hundreds or even thousands. Looking at this problem from student’s perspective this article discusses the role of anywhere, anytime help for the students in getting answers for their problems on a real-time basis from the application known as HashLearn Now. The smart phones usage by students clearly signifies the importance of this application for getting their queries answered b...

  8. An enhanced biometric authentication scheme for telecare medicine information systems with nonce using chaotic hash function.

    Science.gov (United States)

    Das, Ashok Kumar; Goswami, Adrijit

    2014-06-01

    Recently, Awasthi and Srivastava proposed a novel biometric remote user authentication scheme for the telecare medicine information system (TMIS) with nonce. Their scheme is very efficient as it is based on efficient chaotic one-way hash function and bitwise XOR operations. In this paper, we first analyze Awasthi-Srivastava's scheme and then show that their scheme has several drawbacks: (1) incorrect password change phase, (2) fails to preserve user anonymity property, (3) fails to establish a secret session key beween a legal user and the server, (4) fails to protect strong replay attack, and (5) lacks rigorous formal security analysis. We then a propose a novel and secure biometric-based remote user authentication scheme in order to withstand the security flaw found in Awasthi-Srivastava's scheme and enhance the features required for an idle user authentication scheme. Through the rigorous informal and formal security analysis, we show that our scheme is secure against possible known attacks. In addition, we simulate our scheme for the formal security verification using the widely-accepted AVISPA (Automated Validation of Internet Security Protocols and Applications) tool and show that our scheme is secure against passive and active attacks, including the replay and man-in-the-middle attacks. Our scheme is also efficient as compared to Awasthi-Srivastava's scheme.

  9. Distributed hash table theory, platforms and applications

    CERN Document Server

    Zhang, Hao; Xie, Haiyong; Yu, Nenghai

    2013-01-01

    This SpringerBrief summarizes the development of Distributed Hash Table in both academic and industrial fields. It covers the main theory, platforms and applications of this key part in distributed systems and applications, especially in large-scale distributed environments. The authors teach the principles of several popular DHT platforms that can solve practical problems such as load balance, multiple replicas, consistency and latency. They also propose DHT-based applications including multicast, anycast, distributed file systems, search, storage, content delivery network, file sharing and c

  10. Accelerating SPARQL queries by exploiting hash-based locality and adaptive partitioning

    KAUST Repository

    Al-Harbi, Razen

    2016-02-08

    State-of-the-art distributed RDF systems partition data across multiple computer nodes (workers). Some systems perform cheap hash partitioning, which may result in expensive query evaluation. Others try to minimize inter-node communication, which requires an expensive data preprocessing phase, leading to a high startup cost. Apriori knowledge of the query workload has also been used to create partitions, which, however, are static and do not adapt to workload changes. In this paper, we propose AdPart, a distributed RDF system, which addresses the shortcomings of previous work. First, AdPart applies lightweight partitioning on the initial data, which distributes triples by hashing on their subjects; this renders its startup overhead low. At the same time, the locality-aware query optimizer of AdPart takes full advantage of the partitioning to (1) support the fully parallel processing of join patterns on subjects and (2) minimize data communication for general queries by applying hash distribution of intermediate results instead of broadcasting, wherever possible. Second, AdPart monitors the data access patterns and dynamically redistributes and replicates the instances of the most frequent ones among workers. As a result, the communication cost for future queries is drastically reduced or even eliminated. To control replication, AdPart implements an eviction policy for the redistributed patterns. Our experiments with synthetic and real data verify that AdPart: (1) starts faster than all existing systems; (2) processes thousands of queries before other systems become online; and (3) gracefully adapts to the query load, being able to evaluate queries on billion-scale RDF data in subseconds.

  11. The legal response to illegal "hash clubs" in Denmark

    DEFF Research Database (Denmark)

    Asmussen, V.; Moesby-Johansen, C.

    2004-01-01

    Fra midten af 1990'erne er der skudt en række hashklubber op i Danmark. Overordnet er der to slags klubber: salgssteder og væresteder. De første klubber er udelukkende organiseret om salget af hash, mens de andre er klubber, hvor man både kan købe hashen og opholde sig på stedet for at deltage i ...

  12. mdFoam+: Advanced molecular dynamics in OpenFOAM

    Science.gov (United States)

    Longshaw, S. M.; Borg, M. K.; Ramisetti, S. B.; Zhang, J.; Lockerby, D. A.; Emerson, D. R.; Reese, J. M.

    2018-03-01

    This paper introduces mdFoam+, which is an MPI parallelised molecular dynamics (MD) solver implemented entirely within the OpenFOAM software framework. It is open-source and released under the same GNU General Public License (GPL) as OpenFOAM. The source code is released as a publicly open software repository that includes detailed documentation and tutorial cases. Since mdFoam+ is designed entirely within the OpenFOAM C++ object-oriented framework, it inherits a number of key features. The code is designed for extensibility and flexibility, so it is aimed first and foremost as an MD research tool, in which new models and test cases can be developed and tested rapidly. Implementing mdFoam+ in OpenFOAM also enables easier development of hybrid methods that couple MD with continuum-based solvers. Setting up MD cases follows the standard OpenFOAM format, as mdFoam+ also relies upon the OpenFOAM dictionary-based directory structure. This ensures that useful pre- and post-processing capabilities provided by OpenFOAM remain available even though the fully Lagrangian nature of an MD simulation is not typical of most OpenFOAM applications. Results show that mdFoam+ compares well to another well-known MD code (e.g. LAMMPS) in terms of benchmark problems, although it also has additional functionality that does not exist in other open-source MD codes.

  13. NHash: Randomized N-Gram Hashing for Distributed Generation of Validatable Unique Study Identifiers in Multicenter Research.

    Science.gov (United States)

    Zhang, Guo-Qiang; Tao, Shiqiang; Xing, Guangming; Mozes, Jeno; Zonjy, Bilal; Lhatoo, Samden D; Cui, Licong

    2015-11-10

    A unique study identifier serves as a key for linking research data about a study subject without revealing protected health information in the identifier. While sufficient for single-site and limited-scale studies, the use of common unique study identifiers has several drawbacks for large multicenter studies, where thousands of research participants may be recruited from multiple sites. An important property of study identifiers is error tolerance (or validatable), in that inadvertent editing mistakes during their transmission and use will most likely result in invalid study identifiers. This paper introduces a novel method called "Randomized N-gram Hashing (NHash)," for generating unique study identifiers in a distributed and validatable fashion, in multicenter research. NHash has a unique set of properties: (1) it is a pseudonym serving the purpose of linking research data about a study participant for research purposes; (2) it can be generated automatically in a completely distributed fashion with virtually no risk for identifier collision; (3) it incorporates a set of cryptographic hash functions based on N-grams, with a combination of additional encryption techniques such as a shift cipher; (d) it is validatable (error tolerant) in the sense that inadvertent edit errors will mostly result in invalid identifiers. NHash consists of 2 phases. First, an intermediate string using randomized N-gram hashing is generated. This string consists of a collection of N-gram hashes f1, f2, ..., fk. The input for each function fi has 3 components: a random number r, an integer n, and input data m. The result, fi(r, n, m), is an n-gram of m with a starting position s, which is computed as (r mod |m|), where |m| represents the length of m. The output for Step 1 is the concatenation of the sequence f1(r1, n1, m1), f2(r2, n2, m2), ..., fk(rk, nk, mk). In the second phase, the intermediate string generated in Phase 1 is encrypted using techniques such as shift cipher. The result

  14. Laser welding parameters for manufacturing iridium-192 (Ir-192) source

    International Nuclear Information System (INIS)

    Anung Pujiyanto; Moch Subechi; Hotman Lubis; Diandono KY

    2013-01-01

    Number of cervical cancer patients in Indonesia is growing every year. One of cervical cancer treatment was fairly effective use brachytherapy treatment with radioisotope sources of iridium-192. Manufacturing of iridium sources for brachytherapy can be done by incorporating the iridium-192 into stainless steel microcapsules then welding using laser welder which the quality of the welding of iridium source (Ir-192) was determined by the welding parameters such as full power, energy frequency, average power and speed. Based on the result of leakage test using pressure -20 inch Hg and tensile test 2.5 bar showed the welding parameters III and IV did not have leakage and damaged. So that parameters III and IV are recommended to be applied to Ir-192 HDR's source. (author)

  15. Chosen-Prefix Collisions for MD5 and Applications

    NARCIS (Netherlands)

    M.M.J. Stevens (Marc); A.K. Lenstra (Arjen); B. de Weger (Benne)

    2012-01-01

    textabstractWe present a novel, automated way to find differential paths for MD5. Its main application is in the construction of \\emph{chosen-prefix collisions}. We have shown how, at an approximate expected cost of $2^{39}$ calls to the MD5 compression function, for any two chosen

  16. Cep192 controls the balance of centrosome and non-centrosomal microtubules during interphase.

    Directory of Open Access Journals (Sweden)

    Brian P O'Rourke

    Full Text Available Cep192 is a centrosomal protein that contributes to the formation and function of the mitotic spindle in mammalian cells. Cep192's mitotic activities stem largely from its role in the recruitment to the centrosome of numerous additional proteins such as gamma-tubulin and Pericentrin. Here, we examine Cep192's function in interphase cells. Our data indicate that, as in mitosis, Cep192 stimulates the nucleation of centrosomal microtubules thereby regulating the morphology of interphase microtubule arrays. Interestingly, however, cells lacking Cep192 remain capable of generating normal levels of MTs as the loss of centrosomal microtubules is augmented by MT nucleation from other sites, most notably the Golgi apparatus. The depletion of Cep192 results in a significant decrease in the level of centrosome-associated gamma-tubulin, likely explaining its impact on centrosome microtubule nucleation. However, in stark contrast to mitosis, Cep192 appears to maintain an antagonistic relationship with Pericentrin at interphase centrosomes. Interphase cells depleted of Cep192 display significantly higher levels of centrosome-associated Pericentrin while overexpression of Cep192 reduces the levels of centrosomal Pericentrin. Conversely, depletion of Pericentrin results in elevated levels of centrosomal Cep192 and enhances microtubule nucleation at centrosomes, at least during interphase. Finally, we show that depletion of Cep192 negatively impacts cell motility and alters normal cell polarization. Our current working hypothesis is that the microtubule nucleating capacity of the interphase centrosome is determined by an antagonistic balance of Cep192, which promotes nucleation, and Pericentrin, which inhibits nucleation. This in turn determines the relative abundance of centrosomal and non-centrosomal microtubules that tune cell movement and shape.

  17. Radial dose functions for 103Pd, 125I, 169Yb and 192Ir brachytherapy sources: an EGS4 Monte Carlo study

    International Nuclear Information System (INIS)

    Mainegra, E.

    2000-01-01

    Radial dose functions g(r) in water around 103 Pd, 125 I, 169 Yb and 192 Ir brachytherapy sources were estimated by means of the EGS4 simulation system and extensively compared with experimental as well as with theoretical results. The DLC-136/PHOTX cross section library, water molecular form factors, bound Compton scattering and Doppler broadening of the Compton-scattered photon energy were considered in the calculations. Use of the point source approach produces reasonably accurate values of the radial dose function only at distances beyond 0.5 cm for 103 Pd sources. It is shown that binding corrections for Compton scattering have a negligible effect on radial dose function for 169 Yb and 192 Ir seeds and for 103 Pd seeds under 5.0 cm from the source centre and for the 125 I seed model 6702 under 8.0 cm. Beyond those limits there is an increasing influence of binding corrections on radial dose function for 103 Pd and 125 I sources. Results in solid water medium underestimate radial dose function for low-energy sources by as much as 6% for 103 Pd and 2.5% for 125 I already at 2 cm from source centre resulting in a direct underestimation of absolute dose rate values. It was found necessary to consider medium boundaries when comparing results for the radial dose function of 169 Yb and 192 Ir sources to avoid discrepancies due to the backscattering contribution in the phantom medium. Values of g(r) for all source types studied are presented. Uncertainties lie under 1% within one standard deviation. (author)

  18. The discovery of 260Md and the decay properties of 258Fm, 258m,gMd and 259Md

    International Nuclear Information System (INIS)

    Lougheed, R.W.; Hulet, E.K.; Dougan, R.J.; Wild, J.F.; Dupzyk, R.J.; Henderson, C.M.; Moody, K.J.; Hahn, R.L.; Suemmerer, K.; Bethune, G.

    1986-01-01

    We have discovered a new neutron-rich isotope, 260 Md, from 18 O and 22 Ne bombardments of 254 Es. We observed a spontaneous-fission (SF) activity with a half-life of 32 days in electromagnetically separated fractions with mass number 260 from these bombardments and we measured the mass and kinetic energy distributions of this SF activity. The mass distribution was symmetric with the principal energy peak at a total kinetic energy (TKE) of 234 MeV, similar to previous observations for heavy fermium isotopes. Surprisingly, we also observed a smaller symmetric component with a TKE of 195 MeV. We interpret these two peaks in the TKE distribution as arising from two types of fission in the same nucleus, or bimodal fission. The observed fission activity may be either from the SF decay of 260 Md or from 260 Fm which would arise from electron-capture (EC) decay of 260 Md. We have eliminated the possible β - decay of 260 Md by measuring β - -SF time correlations for the decay of 260 Md and we plan to determine whether 260 Md decays by EC by measuring time correlations between fermium X-rays and SF events. We also measured various properties of the heavy fermium and mendelevium isotopes and obtained 1. more accurate cross-sections for the neutron-rich mendelevium isotopes which we use to predict the production rates of yet undiscovered nuclides, 2. improved half-life measurements for 258m,g Md and 259 Md, 3. confirmation of the EC decay of 258m Md by measurement of the fermium X-rays preceding the SF decay of 258 Fm and 4. very substantially improved mass and TKE distributions for the SF decay of 258 Fm and 259 Md. (orig.)

  19. GATHERING TECHNOLOGY BASED ON REGEX WEB PAGE DENOISING HASH ALIGNMENTS WEB CRAWLER WITHOUT LANDING THE MICRO - BLOG ABUNDANT%基于 Regex 网页去噪 Hash 比对的网络爬虫无登陆微博采集技术

    Institute of Scientific and Technical Information of China (English)

    陈宇; 孟凡龙; 刘培玉; 朱振方

    2015-01-01

    针对当前微博采集无精确去噪方法和微博无法无登陆采集现象,笔者提出了基于 Regex 网页去噪 Hash 对比的网络爬虫采集方案并利用插件采集实现了无登陆采集。该方法通过 Regex 构建 DFA 和 NFA 模型来去除网页噪声,通过 Hash 对比对确定采集页面,并通过插件权限提升实现无登陆技术。有效的避免了 Hash 值的变化与网页内容变化产生偏离的现象,解决了网络爬虫虚拟登录时多次对 URL 采集造成的身份认证问题。实验表明,该方法可以实时快速的获取微博信息,为舆情数据分析提供批量精准的数据。%In view of the current micro - blog acquisition without accurate denoising method and unable abundantly the non - debarkation gathering phenomenon,we present a web crawler acquisition scheme of Regex Webpage denoising Hash based on comparison and realize no landing collection by using plug - in acquisition. The method of Regex to construct DFA and NFA model to remove Webpage noise,comparing the Hash to determine the collection page,and the plug - in privilege without landing techniques are presented. Experiments show that,this method quickly gets micro - blog information in real time,and provides,accurate data for the mass public opinion data analysis.

  20. MdMYB9 and MdMYB11 are involved in the regulation of the JA-induced biosynthesis of anthocyanin and proanthocyanidin in apples.

    Science.gov (United States)

    An, Xiu-Hong; Tian, Yi; Chen, Ke-Qin; Liu, Xiao-Juan; Liu, Dan-Dan; Xie, Xing-Bin; Cheng, Cun-Gang; Cong, Pei-Hua; Hao, Yu-Jin

    2015-04-01

    Anthocyanin and proanthocyanidin (PA) are important secondary metabolites and beneficial to human health. Their biosynthesis is induced by jasmonate (JA) treatment and regulated by MYB transcription factors (TFs). However, which and how MYB TFs regulate this process is largely unknown in apple. In this study, MdMYB9 and MdMYB11 which were induced by methyl jasmonate (MeJA) were functionally characterized. Overexpression of MdMYB9 or MdMYB11 promoted not only anthocyanin but also PA accumulation in apple calluses, and the accumulation was further enhanced by MeJA. Subsequently, yeast two-hybrid, pull-down and bimolecular fluorescence complementation assays showed that both MYB proteins interact with MdbHLH3. Moreover, Jasmonate ZIM-domain (MdJAZ) proteins interact with MdbHLH3. Furthermore, chromatin immunoprecipitation-quantitative PCR and yeast one-hybrid assays demonstrated that both MdMYB9 and MdMYB11 bind to the promoters of ANS, ANR and LAR, whereas MdbHLH3 is recruited to the promoters of MdMYB9 and MdMYB11 and regulates their transcription. In addition, transient expression assays indicated that overexpression of MdJAZ2 inhibits the recruitment of MdbHLH3 to the promoters of MdMYB9 and MdMYB11. Our findings provide new insight into the mechanism of how MeJA regulates anthocyanin and PA accumulation in apple. © The Author 2014. Published by Oxford University Press on behalf of Japanese Society of Plant Physiologists. All rights reserved. For permissions, please email: journals.permissions@oup.com.

  1. A model of quantum communication device for quantum hashing

    International Nuclear Information System (INIS)

    Vasiliev, A

    2016-01-01

    In this paper we consider a model of quantum communications between classical computers aided with quantum processors, connected by a classical and a quantum channel. This type of communications implying both classical and quantum messages with moderate use of quantum processing is implicitly used in many quantum protocols, such as quantum key distribution or quantum digital signature. We show that using the model of a quantum processor on multiatomic ensembles in the common QED cavity we can speed up quantum hashing, which can be the basis of quantum digital signature and other communication protocols. (paper)

  2. SECOM: A novel hash seed and community detection based-approach for genome-scale protein domain identification

    KAUST Repository

    Fan, Ming

    2012-06-28

    With rapid advances in the development of DNA sequencing technologies, a plethora of high-throughput genome and proteome data from a diverse spectrum of organisms have been generated. The functional annotation and evolutionary history of proteins are usually inferred from domains predicted from the genome sequences. Traditional database-based domain prediction methods cannot identify novel domains, however, and alignment-based methods, which look for recurring segments in the proteome, are computationally demanding. Here, we propose a novel genome-wide domain prediction method, SECOM. Instead of conducting all-against-all sequence alignment, SECOM first indexes all the proteins in the genome by using a hash seed function. Local similarity can thus be detected and encoded into a graph structure, in which each node represents a protein sequence and each edge weight represents the shared hash seeds between the two nodes. SECOM then formulates the domain prediction problem as an overlapping community-finding problem in this graph. A backward graph percolation algorithm that efficiently identifies the domains is proposed. We tested SECOM on five recently sequenced genomes of aquatic animals. Our tests demonstrated that SECOM was able to identify most of the known domains identified by InterProScan. When compared with the alignment-based method, SECOM showed higher sensitivity in detecting putative novel domains, while it was also three orders of magnitude faster. For example, SECOM was able to predict a novel sponge-specific domain in nucleoside-triphosphatase (NTPases). Furthermore, SECOM discovered two novel domains, likely of bacterial origin, that are taxonomically restricted to sea anemone and hydra. SECOM is an open-source program and available at http://sfb.kaust.edu.sa/Pages/Software.aspx. © 2012 Fan et al.

  3. SECOM: A novel hash seed and community detection based-approach for genome-scale protein domain identification

    KAUST Repository

    Fan, Ming; Wong, Ka-Chun; Ryu, Tae Woo; Ravasi, Timothy; Gao, Xin

    2012-01-01

    With rapid advances in the development of DNA sequencing technologies, a plethora of high-throughput genome and proteome data from a diverse spectrum of organisms have been generated. The functional annotation and evolutionary history of proteins are usually inferred from domains predicted from the genome sequences. Traditional database-based domain prediction methods cannot identify novel domains, however, and alignment-based methods, which look for recurring segments in the proteome, are computationally demanding. Here, we propose a novel genome-wide domain prediction method, SECOM. Instead of conducting all-against-all sequence alignment, SECOM first indexes all the proteins in the genome by using a hash seed function. Local similarity can thus be detected and encoded into a graph structure, in which each node represents a protein sequence and each edge weight represents the shared hash seeds between the two nodes. SECOM then formulates the domain prediction problem as an overlapping community-finding problem in this graph. A backward graph percolation algorithm that efficiently identifies the domains is proposed. We tested SECOM on five recently sequenced genomes of aquatic animals. Our tests demonstrated that SECOM was able to identify most of the known domains identified by InterProScan. When compared with the alignment-based method, SECOM showed higher sensitivity in detecting putative novel domains, while it was also three orders of magnitude faster. For example, SECOM was able to predict a novel sponge-specific domain in nucleoside-triphosphatase (NTPases). Furthermore, SECOM discovered two novel domains, likely of bacterial origin, that are taxonomically restricted to sea anemone and hydra. SECOM is an open-source program and available at http://sfb.kaust.edu.sa/Pages/Software.aspx. © 2012 Fan et al.

  4. 40 CFR 192.03 - Monitoring.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 24 2010-07-01 2010-07-01 false Monitoring. 192.03 Section 192.03... of Residual Radioactive Materials from Inactive Uranium Processing Sites § 192.03 Monitoring. A groundwater monitoring plan shall be implemented, to be carried out over a period of time commencing upon...

  5. 49 CFR 192.151 - Tapping.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 3 2010-10-01 2010-10-01 false Tapping. 192.151 Section 192.151 Transportation... BY PIPELINE: MINIMUM FEDERAL SAFETY STANDARDS Design of Pipeline Components § 192.151 Tapping. (a) Each mechanical fitting used to make a hot tap must be designed for at least the operating pressure of...

  6. 22 CFR 192.52 - Disability benefits.

    Science.gov (United States)

    2010-04-01

    ... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Disability benefits. 192.52 Section 192.52... Disability or Death § 192.52 Disability benefits. (a) Principals who qualify for benefits under § 192.1 and... benefits may not be received from both OWCP and the local organizational authority for the same claim...

  7. Md Naimuddin

    Indian Academy of Sciences (India)

    Home; Journals; Pramana – Journal of Physics. Md Naimuddin. Articles written in Pramana – Journal of Physics. Volume 79 Issue 5 November 2012 pp 1255-1258 Poster Presentations. Model unspecific search for new physics in collision at s = 7 TeV · Shivali Malhotra Md Naimuddin Thomas Hebbeker Arnd Meyer ...

  8. MdCOP1 Ubiquitin E3 Ligases Interact with MdMYB1 to Regulate Light-Induced Anthocyanin Biosynthesis and Red Fruit Coloration in Apple1[W][OA

    Science.gov (United States)

    Li, Yuan-Yuan; Mao, Ke; Zhao, Cheng; Zhao, Xian-Yan; Zhang, Hua-Lei; Shu, Huai-Rui; Hao, Yu-Jin

    2012-01-01

    MdMYB1 is a crucial regulator of light-induced anthocyanin biosynthesis and fruit coloration in apple (Malus domestica). In this study, it was found that MdMYB1 protein accumulated in the light but degraded via a ubiquitin-dependent pathway in the dark. Subsequently, the MdCOP1-1 and MdCOP1-2 genes were isolated from apple fruit peel and were functionally characterized in the Arabidopsis (Arabidopsis thaliana) cop1-4 mutant. Yeast (Saccharomyces cerevisiae) two-hybrid, bimolecular fluorescence complementation, and coimmunoprecipitation assays showed that MdMYB1 interacts with the MdCOP1 proteins. Furthermore, in vitro and in vivo experiments indicated that MdCOP1s are necessary for the ubiquitination and degradation of MdMYB1 protein in the dark and are therefore involved in the light-controlled stability of the MdMYB1 protein. Finally, a viral vector-based transformation approach demonstrated that MdCOP1s negatively regulate the peel coloration of apple fruits by modulating the degradation of the MdMYB1 protein. Our findings provide new insight into the mechanism by which light controls anthocyanin accumulation and red fruit coloration in apple and even other plant species. PMID:22855936

  9. Fast Structural Alignment of Biomolecules Using a Hash Table, N-Grams and String Descriptors

    Directory of Open Access Journals (Sweden)

    Robert Preissner

    2009-04-01

    Full Text Available This work presents a generalized approach for the fast structural alignment of thousands of macromolecular structures. The method uses string representations of a macromolecular structure and a hash table that stores n-grams of a certain size for searching. To this end, macromolecular structure-to-string translators were implemented for protein and RNA structures. A query against the index is performed in two hierarchical steps to unite speed and precision. In the first step the query structure is translated into n-grams, and all target structures containing these n-grams are retrieved from the hash table. In the second step all corresponding n-grams of the query and each target structure are subsequently aligned, and after each alignment a score is calculated based on the matching n-grams of query and target. The extendable framework enables the user to query and structurally align thousands of protein and RNA structures on a commodity machine and is available as open source from http://lajolla.sf.net.

  10. MinHash-Based Fuzzy Keyword Search of Encrypted Data across Multiple Cloud Servers

    Directory of Open Access Journals (Sweden)

    Jingsha He

    2018-05-01

    Full Text Available To enhance the efficiency of data searching, most data owners store their data files in different cloud servers in the form of cipher-text. Thus, efficient search using fuzzy keywords becomes a critical issue in such a cloud computing environment. This paper proposes a method that aims at improving the efficiency of cipher-text retrieval and lowering storage overhead for fuzzy keyword search. In contrast to traditional approaches, the proposed method can reduce the complexity of Min-Hash-based fuzzy keyword search by using Min-Hash fingerprints to avoid the need to construct the fuzzy keyword set. The method will utilize Jaccard similarity to rank the results of retrieval, thus reducing the amount of calculation for similarity and saving a lot of time and space overhead. The method will also take consideration of multiple user queries through re-encryption technology and update user permissions dynamically. Security analysis demonstrates that the method can provide better privacy preservation and experimental results show that efficiency of cipher-text using the proposed method can improve the retrieval time and lower storage overhead as well.

  11. Characterization of an Autophagy-related Gene MdATG8i from apple

    Directory of Open Access Journals (Sweden)

    Ping eWang

    2016-05-01

    Full Text Available Nutrient deficiencies restrict apple (Malus sp. tree growth and productivity in Northwest China. The process of autophagy, a conserved degradation pathway in eukaryotic cells, has important roles in nutrient-recycling and helps improve plant performance during periods of nutrient-starvation. Little is known about the functioning of autophagy-related genes (ATGs in apple. In this study, one of the ATG8 gene family members MdATG8i was isolated from M. domestica. MdATG8i has conserved putative tubulin binding sites and ATG7 interaction domains. A 1865-bp promoter region cloned from apple genome DNA was predicated to have cis-regulatory elements responsive to light, environmental stresses and hormones. MdATG8i transcriptions were induced in response to leaf senescence, nitrogen depletion, and oxidative stress. At cellular level, MdATG8i protein was expressed in the nucleus and cytoplasm of onion epidermal cells. Yeast two-hybrid tests showed that MdATG8i could interact with MdATG7a and MdATG7b. In Arabidopsis, its heterologous expression was associated with enhanced vegetative growth, leaf senescence, and tolerance to nitrogen- and carbon-starvation. MdATG8i-overexpressing ‘Orin’ apple callus lines also displayed improved tolerance to nutrient-limited conditions. Our results demonstrate that MdATG8i protein could function in autophagy in a conserved way, as a positive regulator in the response to nutrient-starvation.

  12. Injector MD Days 2017

    CERN Document Server

    Rumolo, G

    2017-01-01

    The Injector Machine Development (MD) days 2017 were held on 23-24 March, 2017, at CERN with thefollowing main goals:Give a chance to the MD users to present their results and show the relevant progress made in 2016 onseveral fronts.Provide the MD users and the Operation (OP) crews with a general overview on the outcome and theimpact of all ongoing MD activities.Identify the open questions and consequently define - with priorities - a list of machine studies in theinjectors for 2017 (covering the operational beams, LHC Injectors Upgrade, High Luminosity LHC,Physics Beyond Colliders, other projects).Create the opportunity to collect and document the highlights of the 2016 MDs and define the perspectivesfor 2017.Discuss how to make best use of the MD time, in particular let the main MD user express their wishesand see whether/how OP teams can contribute to their fulfilment.

  13. CYP2C19*2 status in patients with Stevens-Johnson syndrome and toxic epidermal necrolysis

    Directory of Open Access Journals (Sweden)

    Laska AJ

    2017-05-01

    Full Text Available Amanda J Laska,1 Marie J Han,1 Josh A Lospinoso,2 Patrick J Brown,1 Thomas M Beachkofsky1 1Department of Dermatology, San Antonio Uniformed Services Health Education Consortium, San Antonio, TX, 2780th Military Intelligence Brigade, Ft Meade, MD, USA Purpose: Genetic polymorphisms have been linked to an increased predisposition to developing certain diseases. For example, patients of Han-Chinese descent carrying the HLA-B*1502 allele are at an increased risk of developing Stevens-Johnson syndrome and toxic epidermal necrolysis (SJS/TEN if given carbamazepine. Given the complexity of in vivo drug metabolism, it is plausible that the activity of enzyme systems unrelated to specific drug metabolism may be important. Although multiple biomarkers have been identified in unique ethnic groups, there has yet to be a study investigating the presence of the slow metabolizing allele of CYP2C19, denoted CYP2C19*2, in diverse groups and the risk of developing SJS/TEN. Patients and methods: This study looked into the carrier status of CYP2C19*2, a poor metabolizing variant of CYP2C19, in patients diagnosed with SJS/TEN. We looked at its status in our series as a whole and when patients were divided by ethnicity. Genomic DNA was extracted from formalin-fixed paraffin-embedded tissue of patients with biopsy-proven SJS/TEN and real-time polymerase chain reaction was used to assess for the presence of CYP2C19*2. Results: CYP2C19*2 status was determined in 47 patients. Twenty-nine of these 47 patients had a single medication implicated as causing their disease, and eight of these patients were heterozygous or homozygous for CYP2C19*2. There was insufficient evidence to conclude that the presence of CYP2C19*2 is an independent predictor of risk for developing SJS/TEN in our series as a whole. This analysis also confirmed that the frequency of the CYP2C19*2 polymorphism within the different ethnicities in our series did not vary statistically from reported ethnic

  14. Exploring intentions of physician-scientist trainees: factors influencing MD and MD/PhD interest in research careers.

    Science.gov (United States)

    Kwan, Jennifer M; Daye, Dania; Schmidt, Mary Lou; Conlon, Claudia Morrissey; Kim, Hajwa; Gaonkar, Bilwaj; Payne, Aimee S; Riddle, Megan; Madera, Sharline; Adami, Alexander J; Winter, Kate Quinn

    2017-07-11

    Prior studies have described the career paths of physician-scientist candidates after graduation, but the factors that influence career choices at the candidate stage remain unclear. Additionally, previous work has focused on MD/PhDs, despite many physician-scientists being MDs. This study sought to identify career sector intentions, important factors in career selection, and experienced and predicted obstacles to career success that influence the career choices of MD candidates, MD candidates with research-intense career intentions (MD-RI), and MD/PhD candidates. A 70-question survey was administered to students at 5 academic medical centers with Medical Scientist Training Programs (MSTPs) and Clinical and Translational Science Awards (CTSA) from the NIH. Data were analyzed using bivariate or multivariate analyses. More MD/PhD and MD-RI candidates anticipated or had experienced obstacles related to balancing academic and family responsibilities and to balancing clinical, research, and education responsibilities, whereas more MD candidates indicated experienced and predicted obstacles related to loan repayment. MD/PhD candidates expressed higher interest in basic and translational research compared to MD-RI candidates, who indicated more interest in clinical research. Overall, MD-RI candidates displayed a profile distinct from both MD/PhD and MD candidates. MD/PhD and MD-RI candidates experience obstacles that influence their intentions to pursue academic medical careers from the earliest training stage, obstacles which differ from those of their MD peers. The differences between the aspirations of and challenges facing MD, MD-RI and MD/PhD candidates present opportunities for training programs to target curricula and support services to ensure the career development of successful physician-scientists.

  15. Dicty_cDB: SFK192 [Dicty_cDB

    Lifescience Database Archive (English)

    Full Text Available 2F (Link to Original site) Representative DNA sequence >SFK192 (SFK192Q) /CSM/SF/SFK1-D/SFK192Q.Seq.d/ CTTATCCACATANA... 4.0 %: vesicles of secretory system >> prediction for SFK192 is nuc 5' end seq. ID SFK192F 5' end seq. >SFK192F.Seq CTTATCCACATANA

  16. Identification of 253Md

    International Nuclear Information System (INIS)

    Kadkhodayan, B.; Czerwinski, K.R.; Kreek, S.A.; Hannink, N.J.; Gregorich, K.E.; Lee, D.M.; Nurmia, M.J.; Hoffman, D.C.; Hall, H.L.

    1992-01-01

    We have measured the half-life and production cross section of the new isotope 253 Md, produced via the 243 Am( 13 C,3n) reaction. Isolation of Md from other activities was accomplished using elution with ammonium α-hydroxyisobutyrate from a cation exchange resin column. Experiments were performed with different irradiation time intervals, but the chemical separation always began and ended at exactly the same length of time after the end of irradiation. All separations with the same irradation lengths were combined and analyzed for growth and decay of the 3.0-d 253 Fm daughter and 20.47-d 253 Es, granddaugther of 253 Md. The amount of 253 Es in each fraction depends on the length of each irradiation and the 253 Md half-life. An increase in the length of irradiation will cause a corresponding increase in the amount of the new isotope 253 Md and hence, in the amount of 253 Es produced, provided the length of irradiations are not very long compared to the half-life of 253 Md. In this way, the Md half-life was estimated to be about 6 minutes with a production cross section of the order of 50 nb. (orig.)

  17. 49 CFR 192.225 - Welding procedures.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 3 2010-10-01 2010-10-01 false Welding procedures. 192.225 Section 192.225... BY PIPELINE: MINIMUM FEDERAL SAFETY STANDARDS Welding of Steel in Pipelines § 192.225 Welding procedures. (a) Welding must be performed by a qualified welder in accordance with welding procedures...

  18. 22 CFR 192.31 - Applicable benefits.

    Science.gov (United States)

    2010-04-01

    ... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Applicable benefits. 192.31 Section 192.31 Foreign Relations DEPARTMENT OF STATE HOSTAGE RELIEF VICTIMS OF TERRORISM COMPENSATION Medical Benefits for Captive Situations § 192.31 Applicable benefits. A person eligible for benefits under this part...

  19. 49 CFR 192.16 - Customer notification.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 3 2010-10-01 2010-10-01 false Customer notification. 192.16 Section 192.16... BY PIPELINE: MINIMUM FEDERAL SAFETY STANDARDS General § 192.16 Customer notification. (a) This section applies to each operator of a service line who does not maintain the customer's buried piping up...

  20. 49 CFR 192.243 - Nondestructive testing.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 3 2010-10-01 2010-10-01 false Nondestructive testing. 192.243 Section 192.243... BY PIPELINE: MINIMUM FEDERAL SAFETY STANDARDS Welding of Steel in Pipelines § 192.243 Nondestructive testing. (a) Nondestructive testing of welds must be performed by any process, other than trepanning, that...

  1. 22 CFR 192.11 - Applicable benefits.

    Science.gov (United States)

    2010-04-01

    ... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Applicable benefits. 192.11 Section 192.11 Foreign Relations DEPARTMENT OF STATE HOSTAGE RELIEF VICTIMS OF TERRORISM COMPENSATION Payment of Salary and Other Benefits for Captive Situations § 192.11 Applicable benefits. (a) Captives are entitled to...

  2. 22 CFR 192.51 - Death benefit.

    Science.gov (United States)

    2010-04-01

    ... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Death benefit. 192.51 Section 192.51 Foreign Relations DEPARTMENT OF STATE HOSTAGE RELIEF VICTIMS OF TERRORISM COMPENSATION Compensation for Disability or Death § 192.51 Death benefit. (a) The Secretary of State or Agency Head may provide for payment...

  3. 22 CFR 192.21 - Applicable benefits.

    Science.gov (United States)

    2010-04-01

    ... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Applicable benefits. 192.21 Section 192.21... Soldiers' and Sailors' Civil Relief Act to Captive Situations § 192.21 Applicable benefits. (a) Eligible persons are entitled to the benefits provided by the Soldiers' and Sailors' Civil Relief Act of 1940 (50 U...

  4. 76 FR 7817 - Announcing Draft Federal Information Processing Standard 180-4, Secure Hash Standard, and Request...

    Science.gov (United States)

    2011-02-11

    ...-02] Announcing Draft Federal Information Processing Standard 180-4, Secure Hash Standard, and Request... and request for comments. SUMMARY: This notice announces the Draft Federal Information Processing..., Information Technology Laboratory, Attention: Comments on Draft FIPS 180-4, 100 Bureau Drive--Stop 8930...

  5. Model-based recognition of 3-D objects by geometric hashing technique

    International Nuclear Information System (INIS)

    Severcan, M.; Uzunalioglu, H.

    1992-09-01

    A model-based object recognition system is developed for recognition of polyhedral objects. The system consists of feature extraction, modelling and matching stages. Linear features are used for object descriptions. Lines are obtained from edges using rotation transform. For modelling and recognition process, geometric hashing method is utilized. Each object is modelled using 2-D views taken from the viewpoints on the viewing sphere. A hidden line elimination algorithm is used to find these views from the wire frame model of the objects. The recognition experiments yielded satisfactory results. (author). 8 refs, 5 figs

  6. Scalable Content Authentication in H.264/SVC Videos Using Perceptual Hashing based on Dempster-Shafer theory

    Directory of Open Access Journals (Sweden)

    Ye Dengpan

    2012-09-01

    Full Text Available The content authenticity of the multimedia delivery is important issue with rapid development and widely used of multimedia technology. Till now many authentication solutions had been proposed, such as cryptology and watermarking based methods. However, in latest heterogeneous network the video stream transmission has been coded in scalable way such as H.264/SVC, there is still no good authentication solution. In this paper, we firstly summarized related works and proposed a scalable content authentication scheme using a ratio of different energy (RDE based perceptual hashing in Q/S dimension, which is used Dempster-Shafer theory and combined with the latest scalable video coding (H.264/SVC construction. The idea of aldquo;sign once and verify in scalable wayardquo; can be realized. Comparing with previous methods, the proposed scheme based on perceptual hashing outperforms previous works in uncertainty (robustness and efficiencies in the H.264/SVC video streams. At last, the experiment results verified the performance of our scheme.

  7. Oncologic and functional outcome of base of tongue cancer treated with external-beam radiation and I-192 implant

    International Nuclear Information System (INIS)

    Harrison, L.B.; Sessions, R.B.; Strong, E.W.; Fass, D.E.; Armstrong, J.G.; Zelefsky, M.J.

    1991-01-01

    This paper assesses tumor control and functional outcome for squamous cancer of the base of the tongue managed with external irradiation plus Ir-192 implant. Between January 1981 and June 1990, 36 previously untreated patients were treated with 5,000-5,400 cGy of external-beam radiation plus a 2,000-3,000 cGy boost to the base of tongue with an Ir-192 implant. Negative necks were irradiated alone, and positive necks were treated with irradiation followed by neck dissection. Crude local control by T stage are as follows: T1, 10 of 11; T2, 13 of 14; T3, 8 of 10; and T4 1 of 1. Actuarial local control is 87.5%. Of the four local failures, two were salvaged by surgery. Neck control was achieved in 35 of 36 patients. Complications occurred in 25%. When implantation was done with the nonlooping technique, the injury rate was statistically higher than when done with the looping technique (6 of 12 = 50% vs 3 of 24 = 12.5%, P = .02)

  8. 49 CFR 192.377 - Service lines: Copper.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 3 2010-10-01 2010-10-01 false Service lines: Copper. 192.377 Section 192.377 Transportation Other Regulations Relating to Transportation (Continued) PIPELINE AND HAZARDOUS MATERIALS SAFETY... § 192.377 Service lines: Copper. Each copper service line installed within a building must be protected...

  9. Apple (Malus domestica) MdERF2 negatively affects ethylene biosynthesis during fruit ripening by suppressing MdACS1 transcription.

    Science.gov (United States)

    Li, Tong; Jiang, Zhongyu; Zhang, Lichao; Tan, Dongmei; Wei, Yun; Yuan, Hui; Li, Tianlai; Wang, Aide

    2016-12-01

    Ripening in climacteric fruit requires the gaseous phytohormone ethylene. Although ethylene signaling has been well studied, knowledge of the transcriptional regulation of ethylene biosynthesis is still limited. Here we show that an apple (Malus domestica) ethylene response factor, MdERF2, negatively affects ethylene biosynthesis and fruit ripening by suppressing the transcription of MdACS1, a gene that is critical for biosynthesis of ripening-related ethylene. Expression of MdERF2 was suppressed by ethylene during ripening of apple fruit, and we observed that MdERF2 bound to the promoter of MdACS1 and directly suppressed its transcription. Moreover, MdERF2 suppressed the activity of the promoter of MdERF3, a transcription factor that we found to bind to the MdACS1 promoter, thereby increasing MdACS1 transcription. We determined that the MdERF2 and MdERF3 proteins directly interact, and this interaction suppresses the binding of MdERF3 to the MdACS1 promoter. Moreover, apple fruit with transiently downregulated MdERF2 expression showed higher ethylene production and faster ripening. Our results indicate that MdERF2 negatively affects ethylene biosynthesis and fruit ripening in apple by suppressing the transcription of MdACS1 via multiple mechanisms, thereby acting as an antagonist of positive ripening regulators. Our findings offer a deep understanding of the transcriptional regulation of ethylene biosynthesis during climacteric fruit ripening. © 2016 The Authors The Plant Journal © 2016 John Wiley & Sons Ltd.

  10. Hash-chain-based authentication for IoT

    Directory of Open Access Journals (Sweden)

    Antonio PINTO

    2016-12-01

    Full Text Available The number of everyday interconnected devices continues to increase and constitute the Internet of Things (IoT. Things are small computers equipped with sensors and wireless communications capabilities that are driven by energy constraints, since they use batteries and may be required to operate over long periods of time. The majority of these devices perform data collection. The collected data is stored on-line using web-services that, sometimes, operate without any special considerations regarding security and privacy. The current work proposes a modified hash-chain authentication mechanism that, with the help of a smartphone, can authenticate each interaction of the devices with a REST web-service using One Time Passwords (OTP while using open wireless networks. Moreover, the proposed authentication mechanism adheres to the stateless, HTTP-like behavior expected of REST web-services, even allowing the caching of server authentication replies within a predefined time window. No other known web-service authentication mechanism operates in such manner.

  11. Handwriting: Feature Correlation Analysis for Biometric Hashes

    Science.gov (United States)

    Vielhauer, Claus; Steinmetz, Ralf

    2004-12-01

    In the application domain of electronic commerce, biometric authentication can provide one possible solution for the key management problem. Besides server-based approaches, methods of deriving digital keys directly from biometric measures appear to be advantageous. In this paper, we analyze one of our recently published specific algorithms of this category based on behavioral biometrics of handwriting, the biometric hash. Our interest is to investigate to which degree each of the underlying feature parameters contributes to the overall intrapersonal stability and interpersonal value space. We will briefly discuss related work in feature evaluation and introduce a new methodology based on three components: the intrapersonal scatter (deviation), the interpersonal entropy, and the correlation between both measures. Evaluation of the technique is presented based on two data sets of different size. The method presented will allow determination of effects of parameterization of the biometric system, estimation of value space boundaries, and comparison with other feature selection approaches.

  12. Handwriting: Feature Correlation Analysis for Biometric Hashes

    Directory of Open Access Journals (Sweden)

    Ralf Steinmetz

    2004-04-01

    Full Text Available In the application domain of electronic commerce, biometric authentication can provide one possible solution for the key management problem. Besides server-based approaches, methods of deriving digital keys directly from biometric measures appear to be advantageous. In this paper, we analyze one of our recently published specific algorithms of this category based on behavioral biometrics of handwriting, the biometric hash. Our interest is to investigate to which degree each of the underlying feature parameters contributes to the overall intrapersonal stability and interpersonal value space. We will briefly discuss related work in feature evaluation and introduce a new methodology based on three components: the intrapersonal scatter (deviation, the interpersonal entropy, and the correlation between both measures. Evaluation of the technique is presented based on two data sets of different size. The method presented will allow determination of effects of parameterization of the biometric system, estimation of value space boundaries, and comparison with other feature selection approaches.

  13. 49 CFR 192.311 - Repair of plastic pipe.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 3 2010-10-01 2010-10-01 false Repair of plastic pipe. 192.311 Section 192.311... Lines and Mains § 192.311 Repair of plastic pipe. Each imperfection or damage that would impair the serviceability of plastic pipe must be repaired or removed. [Amdt. 192-93, 68 FR 53900, Sept. 15, 2003] ...

  14. 49 CFR 192.121 - Design of plastic pipe.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 3 2010-10-01 2010-10-01 false Design of plastic pipe. 192.121 Section 192.121... BY PIPELINE: MINIMUM FEDERAL SAFETY STANDARDS Pipe Design § 192.121 Design of plastic pipe. Subject to the limitations of § 192.123, the design pressure for plastic pipe is determined by either of the...

  15. 22 CFR 192.33 - Dispute.

    Science.gov (United States)

    2010-04-01

    ... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Dispute. 192.33 Section 192.33 Foreign Relations DEPARTMENT OF STATE HOSTAGE RELIEF VICTIMS OF TERRORISM COMPENSATION Medical Benefits for Captive... Director, Department of State, for a determination. If the person bringing the claim is not satisfied with...

  16. 22 CFR 192.41 - Applicable family benefits.

    Science.gov (United States)

    2010-04-01

    ... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Applicable family benefits. 192.41 Section 192.41 Foreign Relations DEPARTMENT OF STATE HOSTAGE RELIEF VICTIMS OF TERRORISM COMPENSATION Educational... circumstances and within the limitation of § 192.44, the Secretary of State, under the criteria and procedures...

  17. 49 CFR 192.235 - Preparation for welding.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 3 2010-10-01 2010-10-01 false Preparation for welding. 192.235 Section 192.235... BY PIPELINE: MINIMUM FEDERAL SAFETY STANDARDS Welding of Steel in Pipelines § 192.235 Preparation for welding. Before beginning any welding, the welding surfaces must be clean and free of any material that...

  18. 50 CFR 19.2 - Scope of regulations.

    Science.gov (United States)

    2010-10-01

    ... 50 Wildlife and Fisheries 6 2010-10-01 2010-10-01 false Scope of regulations. 19.2 Section 19.2... PLANTS (CONTINUED) AIRBORNE HUNTING Introduction § 19.2 Scope of regulations. The regulations contained... United States citizens whether within the territorial jurisdiction of the United States or on the high...

  19. 49 CFR 192.11 - Petroleum gas systems.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 3 2010-10-01 2010-10-01 false Petroleum gas systems. 192.11 Section 192.11... BY PIPELINE: MINIMUM FEDERAL SAFETY STANDARDS General § 192.11 Petroleum gas systems. (a) Each plant that supplies petroleum gas by pipeline to a natural gas distribution system must meet the requirements...

  20. Activity uniformity of Ir-192 seeds

    International Nuclear Information System (INIS)

    Ling, C.C.; Gromadzki, Z.C.

    1981-01-01

    A simple device that uses materials and apparatus commonly available in a radiotherapy department has been designed, fabricated and used in routine quality control relative to the activity uniformity of clinical Ir-192 seeds in ribbons. Detailed evaluation indicated that this system is easy to use and can yield relative activity measurements of individual Ir-192 seeds accurate to within 2%. With this device, activity uniformity of commercial Ir-192 seeds from two manufacturers has been assessed. For the seven shipments of Ir-192 seeds studied, the root mean square variations of individual seed strength from the average of each shipment ranged from 3.4 to 7.1%. Variation in seed activity by more than +- 10% from the average is not uncommon

  1. Comparison of the hypothetical (57)Co brachytherapy source with the (192)Ir source.

    Science.gov (United States)

    Toossi, Mohammad Taghi Bahreyni; Ghorbani, Mahdi; Rostami, Atefeh; Khosroabadi, Mohsen; Khademi, Sara; Knaup, Courtney

    2016-01-01

    The (57)Co radioisotope has recently been proposed as a hypothetical brachytherapy source due to its high specific activity, appropriate half-life (272 days) and medium energy photons (114.17 keV on average). In this study, Task Group No. 43 dosimetric parameters were calculated and reported for a hypothetical (57)Co source. A hypothetical (57)Co source was simulated in MCNPX, consisting of an active cylinder with 3.5 mm length and 0.6 mm radius encapsulated in a stainless steel capsule. Three photon energies were utilized (136 keV [10.68%], 122 keV [85.60%], 14 keV [9.16%]) for the (57)Co source. Air kerma strength, dose rate constant, radial dose function, anisotropy function, and isodose curves for the source were calculated and compared to the corresponding data for a (192)Ir source. The results are presented as tables and figures. Air kerma strength per 1 mCi activity for the (57)Co source was 0.46 cGyh(-1) cm 2 mCi(-1). The dose rate constant for the (57)Co source was determined to be 1.215 cGyh(-1)U(-1). The radial dose function for the (57)Co source has an increasing trend due to multiple scattering of low energy photons. The anisotropy function for the (57)Co source at various distances from the source is more isotropic than the (192)Ir source. The (57)Co source has advantages over (192)Ir due to its lower energy photons, longer half-life, higher dose rate constant and more isotropic anisotropic function. However, the (192)Ir source has a higher initial air kerma strength and more uniform radial dose function. These properties make (57)Co a suitable source for use in brachytherapy applications.

  2. 22 CFR 192.5 - Relationships among agencies.

    Science.gov (United States)

    2010-04-01

    ... inform the head of any agency whenever an employee of that agency, or Family Member of such employee, is... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Relationships among agencies. 192.5 Section 192... § 192.5 Relationships among agencies. (a) To assist in ensuring that eligible persons receive...

  3. 49 CFR 192.375 - Service lines: Plastic.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 3 2010-10-01 2010-10-01 false Service lines: Plastic. 192.375 Section 192.375... § 192.375 Service lines: Plastic. (a) Each plastic service line outside a building must be installed... terminate above ground level and outside the building, if— (i) The above ground level part of the plastic...

  4. Molecular Cloning and Expression Analysis of a Hexokinase Gene, MdHXK1 in Apple

    Directory of Open Access Journals (Sweden)

    Jin Zhao

    2016-03-01

    Full Text Available A hexokinase gene named MdHXK1 (MDP0000309677 was cloned from ‘Gala’ apple (Malus × domestica Borkh.. Sequence analysis showed that the MdHXK1 gene was 1 497 bp long and encoded 499 amino acids. The predicted molecular mass of this protein was 54.05 kD, and the pI was 5.76. A phylogenetic tree indicated apple MdHXK1 exhibited the highest sequence similarity to Pyrus bretschneideri PbHXK1. Analysis of the functional domain showed that the MdHXK1 protein included two conserved kinase domains. The prediction of subcellular localization suggested that the MdHXK1 protein was mainly localized in the cytoplasm. There was an indication that MdHXK1 existed as one copy in the apple genome by Southern blotting. Silico analysis suggested that the promoter sequence contained several typical cis-acting elements, including defense, sugar signaling and phytohormone responsive elements. Quantitative real-time PCR analysis demonstrated that the MdHXK1 gene was mainly expressed in stem and flower tissues. During the development of apple fruits, the expression of the MdHXK1 gene initially increased and then decreased. The changes on Glc phosphorylation relative activity and glucose concentration showed the same trend. In addition, the expression of this gene was induced by salt stress, low temperature, and abscisic acid (ABA. Finally, we obtained and purified the fused MdHXK1 protein by recombinant prokaryotic expression. Studies have demonstrated that MdHXK1 may participate in sugar metabolism in apple fruits. Enzyme encoded by MdHXK1 is a key factor in the mediation of sugar accumulation. Recently, researchers on hexokinase at home and abroad mainly focused on model plants, such as Arabidopsis, tobacco and rice, but orchard fruit like apple were underresearched. Our research established the foundation for the further study of the functions of MdHXK1.

  5. UnoHop: Efficient Distributed Hash Table with O(1 Lookup Performance

    Directory of Open Access Journals (Sweden)

    Herry Sitepu

    2008-05-01

    Full Text Available Distributed Hash Tables (DHTs with O(1 lookup performance strive to minimize the maintenance traffic which required for propagating membership changes information (events. These events distribution allows each node in the peer-to-peer network maintains accurate routing tables with complete membership information. We present UnoHop, a novel DHT protocol with O(1 lookup performance. The protocol uses an efficient mechanism to distribute events through a dissemination tree that constructed dynamically rooted at the node that detect the events. Our protocol produces symmetric bandwidth usage at all nodes while decreasing the events propagation delay.

  6. Refined repetitive sequence searches utilizing a fast hash function and cross species information retrievals

    Directory of Open Access Journals (Sweden)

    Reneker Jeff

    2005-05-01

    Full Text Available Abstract Background Searching for small tandem/disperse repetitive DNA sequences streamlines many biomedical research processes. For instance, whole genomic array analysis in yeast has revealed 22 PHO-regulated genes. The promoter regions of all but one of them contain at least one of the two core Pho4p binding sites, CACGTG and CACGTT. In humans, microsatellites play a role in a number of rare neurodegenerative diseases such as spinocerebellar ataxia type 1 (SCA1. SCA1 is a hereditary neurodegenerative disease caused by an expanded CAG repeat in the coding sequence of the gene. In bacterial pathogens, microsatellites are proposed to regulate expression of some virulence factors. For example, bacteria commonly generate intra-strain diversity through phase variation which is strongly associated with virulence determinants. A recent analysis of the complete sequences of the Helicobacter pylori strains 26695 and J99 has identified 46 putative phase-variable genes among the two genomes through their association with homopolymeric tracts and dinucleotide repeats. Life scientists are increasingly interested in studying the function of small sequences of DNA. However, current search algorithms often generate thousands of matches – most of which are irrelevant to the researcher. Results We present our hash function as well as our search algorithm to locate small sequences of DNA within multiple genomes. Our system applies information retrieval algorithms to discover knowledge of cross-species conservation of repeat sequences. We discuss our incorporation of the Gene Ontology (GO database into these algorithms. We conduct an exhaustive time analysis of our system for various repetitive sequence lengths. For instance, a search for eight bases of sequence within 3.224 GBases on 49 different chromosomes takes 1.147 seconds on average. To illustrate the relevance of the search results, we conduct a search with and without added annotation terms for the

  7. EPC: A Provably Secure Permutation Based Compression Function

    DEFF Research Database (Denmark)

    Bagheri, Nasour; Gauravaram, Praveen; Naderi, Majid

    2010-01-01

    The security of permutation-based hash functions in the ideal permutation model has been studied when the input-length of compression function is larger than the input-length of the permutation function. In this paper, we consider permutation based compression functions that have input lengths sh...

  8. Secure Hashing of Dynamic Hand Signatures Using Wavelet-Fourier Compression with BioPhasor Mixing and Discretization

    Directory of Open Access Journals (Sweden)

    Wai Kuan Yip

    2007-01-01

    Full Text Available We introduce a novel method for secure computation of biometric hash on dynamic hand signatures using BioPhasor mixing and discretization. The use of BioPhasor as the mixing process provides a one-way transformation that precludes exact recovery of the biometric vector from compromised hashes and stolen tokens. In addition, our user-specific discretization acts both as an error correction step as well as a real-to-binary space converter. We also propose a new method of extracting compressed representation of dynamic hand signatures using discrete wavelet transform (DWT and discrete fourier transform (DFT. Without the conventional use of dynamic time warping, the proposed method avoids storage of user's hand signature template. This is an important consideration for protecting the privacy of the biometric owner. Our results show that the proposed method could produce stable and distinguishable bit strings with equal error rates (EERs of and for random and skilled forgeries for stolen token (worst case scenario, and for both forgeries in the genuine token (optimal scenario.

  9. 75 FR 47203 - Airworthiness Directives; McDonnell Douglas Corporation Model MD-11 and MD-11F Airplanes Equipped...

    Science.gov (United States)

    2010-08-05

    ... Airworthiness Directives; McDonnell Douglas Corporation Model MD- 11 and MD-11F Airplanes Equipped With General... Sec. 39.13 by adding the following new AD: 2010-16-03 McDonnell Douglas Corporation: Amendment 39... applies to McDonnell Douglas Corporation Model MD-11 and MD-11F airplanes, certified in any category...

  10. Privacy-Preserving and Scalable Service Recommendation Based on SimHash in a Distributed Cloud Environment

    Directory of Open Access Journals (Sweden)

    Yanwei Xu

    2017-01-01

    Full Text Available With the increasing volume of web services in the cloud environment, Collaborative Filtering- (CF- based service recommendation has become one of the most effective techniques to alleviate the heavy burden on the service selection decisions of a target user. However, the service recommendation bases, that is, historical service usage data, are often distributed in different cloud platforms. Two challenges are present in such a cross-cloud service recommendation scenario. First, a cloud platform is often not willing to share its data to other cloud platforms due to privacy concerns, which decreases the feasibility of cross-cloud service recommendation severely. Second, the historical service usage data recorded in each cloud platform may update over time, which reduces the recommendation scalability significantly. In view of these two challenges, a novel privacy-preserving and scalable service recommendation approach based on SimHash, named SerRecSimHash, is proposed in this paper. Finally, through a set of experiments deployed on a real distributed service quality dataset WS-DREAM, we validate the feasibility of our proposal in terms of recommendation accuracy and efficiency while guaranteeing privacy-preservation.

  11. Developing improved MD codes for understanding processive cellulases

    International Nuclear Information System (INIS)

    Crowley, M F; Nimlos, M R; Himmel, M E; Uberbacher, E C; Iii, C L Brooks; Walker, R C

    2008-01-01

    The mechanism of action of cellulose-degrading enzymes is illuminated through a multidisciplinary collaboration that uses molecular dynamics (MD) simulations and expands the capabilities of MD codes to allow simulations of enzymes and substrates on petascale computational facilities. There is a class of glycoside hydrolase enzymes called cellulases that are thought to decrystallize and processively depolymerize cellulose using biochemical processes that are largely not understood. Understanding the mechanisms involved and improving the efficiency of this hydrolysis process through computational models and protein engineering presents a compelling grand challenge. A detailed understanding of cellulose structure, dynamics and enzyme function at the molecular level is required to direct protein engineers to the right modifications or to understand if natural thermodynamic or kinetic limits are in play. Much can be learned about processivity by conducting carefully designed molecular dynamics (MD) simulations of the binding and catalytic domains of cellulases with various substrate configurations, solvation models and thermodynamic protocols. Most of these numerical experiments, however, will require significant modification of existing code and algorithms in order to efficiently use current (terascale) and future (petascale) hardware to the degree of parallelism necessary to simulate a system of the size proposed here. This work will develop MD codes that can efficiently use terascale and petascale systems, not just for simple classical MD simulations, but also for more advanced methods, including umbrella sampling with complex restraints and reaction coordinates, transition path sampling, steered molecular dynamics, and quantum mechanical/molecular mechanical simulations of systems the size of cellulose degrading enzymes acting on cellulose

  12. Md-miR156ab and Md-miR395 Target WRKY Transcription Factors to Influence Apple Resistance to Leaf Spot Disease.

    Science.gov (United States)

    Zhang, Qiulei; Li, Yang; Zhang, Yi; Wu, Chuanbao; Wang, Shengnan; Hao, Li; Wang, Shengyuan; Li, Tianzhong

    2017-01-01

    MicroRNAs (miRNAs) are key regulators of gene expression that post-transcriptionally regulate transcription factors involved in plant physiological activities. Little is known about the effects of miRNAs in disease resistance in apple ( Malus × domestica ). We globally profiled miRNAs in the apple cultivar Golden Delicious (GD) infected or not with the apple leaf spot fungus Alternaria alternaria f. sp. mali (ALT1), and identified 58 miRNAs that exhibited more than a 2-fold upregulation upon ALT1 infection. We identified a pair of miRNAs that target protein-coding genes involved in the defense response against fungal pathogens; Md-miR156ab targets a novel WRKY transcription factor, MdWRKYN1, which harbors a TIR and a WRKY domain. Md-miR395 targets another transcription factor, MdWRKY26, which contains two WRKY domains. Real-time PCR analysis showed that Md-miR156ab and Md-miR395 levels increased, while MdWRKYN1 and MdWRKY26 expression decreased in ALT1-inoculated GD leaves; furthermore, the overexpression of Md-miR156ab and Md-miR395 resulted in a significant reduction in MdWRKYN1 and MdWRKY26 expression. To investigate whether these miRNAs and their targets play a crucial role in plant defense, we overexpressed MdWRKYN1 or knocked down Md-miR156ab activity, which in both cases enhanced the disease resistance of the plants by upregulating the expression of the WRKY-regulated pathogenesis-related (PR) protein-encoding genes MdPR3-1, MdPR3-2, MdPR4, MdPR5, MdPR10-1 , and MdPR10-2 . In a similar analysis, we overexpressed MdWRKY26 or suppressed Md-miR395 activity, and found that many PR protein-encoding genes were also regulated by MdWRKY26 . In GD, ALT-induced Md-miR156ab and Md-miR395 suppress MdWRKYN1 and MdWRKY26 expression, thereby decreasing the expression of some PR genes, and resulting in susceptibility to ALT1.

  13. Influence of source geometry and materials on the transverse axis dosimetry of 192Ir brachytherapy sources

    International Nuclear Information System (INIS)

    Wang, Ruqing; Sloboda, Ron S.

    1998-01-01

    Monte Carlo dose rates on the transverse axis in water and air kerma strengths normalized to unit source activity were calculated for a low dose rate steel-clad 192 Ir source, MicroSelectron high dose rate and pulsed dose rate 192 Ir sources, and a VariSource high dose rate 192 Ir source, as well as five other hypothetical cylindrical 192 Ir source designs. Based on these results, the dependence of dose rate and air kerma strength on source geometry and materials was analysed. Source geometry and attenuation in the core material are the important factors determining basic dosimetric characteristics. Core length, h, only affects the dose rate on the transverse axis at radial distances r 192 Ir sources is suggested, and similarities and differences in the dose rate constant and radial dose function between these sources are explained. (author)

  14. 49 CFR 192.287 - Plastic pipe: Inspection of joints.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 3 2010-10-01 2010-10-01 false Plastic pipe: Inspection of joints. 192.287... Than by Welding § 192.287 Plastic pipe: Inspection of joints. No person may carry out the inspection of joints in plastic pipes required by §§ 192.273(c) and 192.285(b) unless that person has been qualified by...

  15. 75 FR 80744 - Airworthiness Directives; McDonnell Douglas Corporation Model DC-9-81 (MD-81), DC-9-82 (MD-82...

    Science.gov (United States)

    2010-12-23

    ...-1203; Directorate Identifier 2010-NM-168-AD] RIN 2120-AA64 Airworthiness Directives; McDonnell Douglas... amends Sec. 39.13 by adding the following new airworthiness directive (AD): McDonnell Douglas Corporation... Douglas Corporation Model DC-9-81 (MD-81), DC-9-82 (MD-82), DC-9-83 (MD-83), DC-9-87 (MD-87) and MD-88...

  16. 49 CFR 192.321 - Installation of plastic pipe.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 3 2010-10-01 2010-10-01 false Installation of plastic pipe. 192.321 Section 192... Transmission Lines and Mains § 192.321 Installation of plastic pipe. (a) Plastic pipe must be installed below ground level except as provided by paragraphs (g) and (h) of this section. (b) Plastic pipe that is...

  17. 49 CFR 192.125 - Design of copper pipe.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 3 2010-10-01 2010-10-01 false Design of copper pipe. 192.125 Section 192.125... BY PIPELINE: MINIMUM FEDERAL SAFETY STANDARDS Pipe Design § 192.125 Design of copper pipe. (a) Copper... hard drawn. (b) Copper pipe used in service lines must have wall thickness not less than that indicated...

  18. MATCHING AERIAL IMAGES TO 3D BUILDING MODELS BASED ON CONTEXT-BASED GEOMETRIC HASHING

    Directory of Open Access Journals (Sweden)

    J. Jung

    2016-06-01

    Full Text Available In this paper, a new model-to-image framework to automatically align a single airborne image with existing 3D building models using geometric hashing is proposed. As a prerequisite process for various applications such as data fusion, object tracking, change detection and texture mapping, the proposed registration method is used for determining accurate exterior orientation parameters (EOPs of a single image. This model-to-image matching process consists of three steps: 1 feature extraction, 2 similarity measure and matching, and 3 adjustment of EOPs of a single image. For feature extraction, we proposed two types of matching cues, edged corner points representing the saliency of building corner points with associated edges and contextual relations among the edged corner points within an individual roof. These matching features are extracted from both 3D building and a single airborne image. A set of matched corners are found with given proximity measure through geometric hashing and optimal matches are then finally determined by maximizing the matching cost encoding contextual similarity between matching candidates. Final matched corners are used for adjusting EOPs of the single airborne image by the least square method based on co-linearity equations. The result shows that acceptable accuracy of single image's EOP can be achievable by the proposed registration approach as an alternative to labour-intensive manual registration process.

  19. Preparing MD-PhD students for clinical rotations: navigating the interface between PhD and MD training.

    Science.gov (United States)

    Goldberg, Charles; Insel, Paul A

    2013-06-01

    Many aspects of MD-PhD training are not optimally designed to prepare students for their future roles as translational clinician-scientists. The transition between PhD research efforts and clinical rotations is one hurdle that must be overcome. MD-PhD students have deficits in clinical skills compared with those of their MD-only colleagues at the time of this transition. Reimmersion programs (RPs) targeted to MD-PhD students have the potential to help them navigate this transition.The authors draw on their experience creating and implementing an RP that incorporates multiple types of activities (clinical exam review, objective structured clinical examination, and supervised practice in patient care settings) designed to enhance the participants' skills and readiness for clinical efforts. On the basis of this experience, they note that MD-PhD students' time away from the clinical environment negatively affects their clinical skills, causing them to feel underprepared for clinical rotations. The authors argue that participation in an RP can help students feel more comfortable speaking with and examining patients and decrease their anxiety regarding clinical encounters. The authors propose that RPs can have positive outcomes for improving the transition from PhD to clinical MD training in dual-degree programs. Identifying and addressing this and other transitions need to be considered to improve the educational experience of MD-PhD students.

  20. First thoughts on MD priorities for 2012

    CERN Document Server

    Zimmermann, F; Assmann, R

    2012-01-01

    In 2012, 22 days of beam time will be allocated for LHC MDs. In this paper, after recalling the 2011 LHC MD experience, the MD rrequests for 2012 are reviewed. Three primary MD themes for 2012 can be identified: 1)pushing performance in 2012, 2)preparing for 2014/15, and 3)towards maximum luminosity. Example topics include emittance growth in collision or enhanced satellites for theme 1), 25 ns operation for 2), and ATS optics for 3). Structures lists of MD requests and topics for each theme as well as some initial thoughts on the MD priorities are presented. For certain topics, "start-of-fill MDs" are proposed in order to most efficiently use of the available beam time.

  1. 49 CFR 192.191 - Design pressure of plastic fittings.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 3 2010-10-01 2010-10-01 false Design pressure of plastic fittings. 192.191... Components § 192.191 Design pressure of plastic fittings. (a) Thermosetting fittings for plastic pipe must conform to ASTM D 2517, (incorporated by reference, see § 192.7). (b) Thermoplastic fittings for plastic...

  2. 49 CFR 192.231 - Protection from weather.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 3 2010-10-01 2010-10-01 false Protection from weather. 192.231 Section 192.231 Transportation Other Regulations Relating to Transportation (Continued) PIPELINE AND HAZARDOUS MATERIALS SAFETY... weather. The welding operation must be protected from weather conditions that would impair the quality of...

  3. A hash based mutual RFID tag authentication protocol in telecare medicine information system.

    Science.gov (United States)

    Srivastava, Keerti; Awasthi, Amit K; Kaul, Sonam D; Mittal, R C

    2015-01-01

    Radio Frequency Identification (RFID) is a technology which has multidimensional applications to reduce the complexity of today life. Everywhere, like access control, transportation, real-time inventory, asset management and automated payment systems etc., RFID has its enormous use. Recently, this technology is opening its wings in healthcare environments, where potential applications include patient monitoring, object traceability and drug administration systems etc. In this paper, we propose a secure RFID-based protocol for the medical sector. This protocol is based on hash operation with synchronized secret. The protocol is safe against active and passive attacks such as forgery, traceability, replay and de-synchronization attack.

  4. 22 CFR 192.40 - Eligibility for benefits.

    Science.gov (United States)

    2010-04-01

    ... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Eligibility for benefits. 192.40 Section 192.40 Foreign Relations DEPARTMENT OF STATE HOSTAGE RELIEF VICTIMS OF TERRORISM COMPENSATION Educational... programs of the Department of Veterans' Affairs under chapter 35 of title 38, United States Code). (b) A...

  5. 49 CFR 192.277 - Ductile iron pipe.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 3 2010-10-01 2010-10-01 false Ductile iron pipe. 192.277 Section 192.277 Transportation Other Regulations Relating to Transportation (Continued) PIPELINE AND HAZARDOUS MATERIALS SAFETY... Ductile iron pipe. (a) Ductile iron pipe may not be joined by threaded joints. (b) Ductile iron pipe may...

  6. Paraoxonase 1 192 and 55 polymorphisms in osteosarcoma.

    Science.gov (United States)

    Ergen, Arzu; Kılıcoglu, Onder; Ozger, Harzem; Agachan, Bedia; Isbir, Turgay

    2011-08-01

    Paraoxonase is an HDL-associated enzyme that plays a preventive role against oxidative stres. Previous studies suggested that involved an amino acid substitution at position 192 gives rise to two alloenzymes with a low activity (Q allele) and a high activity (R allele) towards paraoxon. There also exists a second polymorphism of the human PON1 gene affecting amino acid 55, giving rise to a leucine (L-allele) substitution for methionine (M-allele). PON1 gene polymorphisms were studied in 50 patients with osteosarcoma and 50 healthy controls. Paraoxonase genotypes were determined by PCR-RFLP. We found a reduction in the frequency of PON1 192 R allele in patients (P=0.015). Besides, PON1 192 wild type QQ genotype (P=0.015) and PON1 55 wild type L allele (P=0.001) were higher in patients compared to healthy controls. PON1 192 QQ genotype was associated with osteosarcoma in multivariate logistic regression analysis. Our findings have suggested that PON1 192 wild type genotypes may be associated with a risk of developing osteosarcoma.

  7. SEMANTIC SEGMENTATION OF BUILDING ELEMENTS USING POINT CLOUD HASHING

    Directory of Open Access Journals (Sweden)

    M. Chizhova

    2018-05-01

    Full Text Available For the interpretation of point clouds, the semantic definition of extracted segments from point clouds or images is a common problem. Usually, the semantic of geometrical pre-segmented point cloud elements are determined using probabilistic networks and scene databases. The proposed semantic segmentation method is based on the psychological human interpretation of geometric objects, especially on fundamental rules of primary comprehension. Starting from these rules the buildings could be quite well and simply classified by a human operator (e.g. architect into different building types and structural elements (dome, nave, transept etc., including particular building parts which are visually detected. The key part of the procedure is a novel method based on hashing where point cloud projections are transformed into binary pixel representations. A segmentation approach released on the example of classical Orthodox churches is suitable for other buildings and objects characterized through a particular typology in its construction (e.g. industrial objects in standardized enviroments with strict component design allowing clear semantic modelling.

  8. Parameter-free Locality Sensitive Hashing for Spherical Range Reporting

    DEFF Research Database (Denmark)

    Ahle, Thomas Dybdahl; Pagh, Rasmus; Aumüller, Martin

    2017-01-01

    We present a data structure for *spherical range reporting* on a point set S, i.e., reporting all points in S that lie within radius r of a given query point q. Our solution builds upon the Locality-Sensitive Hashing (LSH) framework of Indyk and Motwani, which represents the asymptotically best...... solutions to near neighbor problems in high dimensions. While traditional LSH data structures have several parameters whose optimal values depend on the distance distribution from q to the points of S, our data structure is parameter-free, except for the space usage, which is configurable by the user...... query time bounded by O(t(n/t)ρ), where t is the number of points to report and ρ∈(0,1) depends on the data distribution and the strength of the LSH family used. We further present a parameter-free way of using multi-probing, for LSH families that support it, and show that for many such families...

  9. Spontaneous fission of 259Md

    International Nuclear Information System (INIS)

    Hulet, E.K.; Wild, J.F.; Lougheed, R.W.; Baisden, P.A.; Landrum, J.H.; Dougan, R.J.; Mustafa, M.; Ghiorso, A.; Nitschke, J.M.

    1979-01-01

    The mass and kinetic energy distributions of fission fragments from the spontaneous fission of th newly discovered nuclide 259 Md were obtained. 259 Md was identified as the E. C. daughter of 259 No, and was found to decay entirely (> 95%) by spontaneous fission with a 95-min half-life. From the kinetic energies measured for 397 pairs of coincident fragments, a mass distribution was derived that is symmetric with sigma = 13 amu. 259 Md, together with 258 Fm and 259 Fm, form a select group of three nuclides whose mass division in spontaneous fission is highly symmetric. Unlike the total-kinetic-energy (TKE) distributions of 258 Fm and 259 Fm, which peak at approx. = to 240 MeV, this distribution for 259 Md is broad and is 50 MeV lower in energy. Analysis of the mass and energy distributions shows that events near mass symmetry also exhibit a broad TKE distribution, with one-third of the symmetric events having TKEs less than 200 MeV. The associated of low TKEs with symmetric mass division in the fission of very heavy actinides is anomalous and inconsistent with theories based upon the emergence of fragment shells near the scission point. Either three-body fragmentation or peculiar fragment shapes are assumed as the cause for the large consumption of Coulomb energy observed for a significant fraction of symmetric fissions in 259 Md. 6 figures

  10. 47 CFR 0.192 - Emergency Response Interoperability Center.

    Science.gov (United States)

    2010-10-01

    ... 47 Telecommunication 1 2010-10-01 2010-10-01 false Emergency Response Interoperability Center. 0.192 Section 0.192 Telecommunication FEDERAL COMMUNICATIONS COMMISSION GENERAL COMMISSION ORGANIZATION..., industry representatives, and service providers. [75 FR 28207, May 20, 2010] ...

  11. Determination of two- and three-body correlation functions in ionic solutions by means of MD and EXAFS investigations

    International Nuclear Information System (INIS)

    D'Angelo, P.; Pavel, N.V.

    1999-01-01

    The solvation structure of Sr 2+ ions in acetonitrile has been studied by x-ray absorption spectroscopy (XAS) and molecular dynamics (MD) simulations. The extended x-ray absorption fine structure (EXAFS) above the Sr K-edge has been interpreted in the framework of the multiple scattering (MS) formalism and, for the first time, clear evidence of MS contributions has been found for non-complexing ions in solution. Molecular dynamics has been used to generate the partial pair g(r) and the three-body g(r 1 , r 2 , θ) distribution functions from which a model χ(k) has been constructed. An excellent agreement has been found between the theoretical and experimental data. This result demonstrates the ability of the XAS technique in probing three-body correlation functions in solutions. (au)

  12. 41 CFR 102-192.5 - What does this part cover?

    Science.gov (United States)

    2010-07-01

    ... 41 Public Contracts and Property Management 3 2010-07-01 2010-07-01 false What does this part cover? 102-192.5 Section 102-192.5 Public Contracts and Property Management Federal Property Management Regulations System (Continued) FEDERAL MANAGEMENT REGULATION ADMINISTRATIVE PROGRAMS 192-MAIL MANAGEMENT...

  13. Matching Aerial Images to 3D Building Models Using Context-Based Geometric Hashing

    Directory of Open Access Journals (Sweden)

    Jaewook Jung

    2016-06-01

    Full Text Available A city is a dynamic entity, which environment is continuously changing over time. Accordingly, its virtual city models also need to be regularly updated to support accurate model-based decisions for various applications, including urban planning, emergency response and autonomous navigation. A concept of continuous city modeling is to progressively reconstruct city models by accommodating their changes recognized in spatio-temporal domain, while preserving unchanged structures. A first critical step for continuous city modeling is to coherently register remotely sensed data taken at different epochs with existing building models. This paper presents a new model-to-image registration method using a context-based geometric hashing (CGH method to align a single image with existing 3D building models. This model-to-image registration process consists of three steps: (1 feature extraction; (2 similarity measure; and matching, and (3 estimating exterior orientation parameters (EOPs of a single image. For feature extraction, we propose two types of matching cues: edged corner features representing the saliency of building corner points with associated edges, and contextual relations among the edged corner features within an individual roof. A set of matched corners are found with given proximity measure through geometric hashing, and optimal matches are then finally determined by maximizing the matching cost encoding contextual similarity between matching candidates. Final matched corners are used for adjusting EOPs of the single airborne image by the least square method based on collinearity equations. The result shows that acceptable accuracy of EOPs of a single image can be achievable using the proposed registration approach as an alternative to a labor-intensive manual registration process.

  14. A Reusable Software Copy Protection Using Hash Result and Asymetrical Encryption

    Directory of Open Access Journals (Sweden)

    Aswin Wibisurya

    2014-12-01

    Full Text Available Desktop application is one of the most popular types of application being used in computer due to the one time install simplicity and the quick accessibility from the moment the computer being turned on. Limitation of the copy and usage of desktop applications has long been an important issue to application providers. For security concerns, software copy protection is usually integrated with the application. However, developers seek to reuse the copy protection component of the software. This paper proposes an approach of reusable software copy protection which consists of a certificate validator on the client computer and a certificate generator on the server. The certificate validator integrity is protected using hashing result while all communications are encrypted using asymmetrical encryption to ensure the security of this approach.

  15. Comparison of Various Similarity Measures for Average Image Hash in Mobile Phone Application

    Science.gov (United States)

    Farisa Chaerul Haviana, Sam; Taufik, Muhammad

    2017-04-01

    One of the main issue in Content Based Image Retrieval (CIBR) is similarity measures for resulting image hashes. The main key challenge is to find the most benefits distance or similarity measures for calculating the similarity in term of speed and computing costs, specially under limited computing capabilities device like mobile phone. This study we utilize twelve most common and popular distance or similarity measures technique implemented in mobile phone application, to be compared and studied. The results show that all similarity measures implemented in this study was perform equally under mobile phone application. This gives more possibilities for method combinations to be implemented for image retrieval.

  16. Muscular Dystrophy (MD)

    Science.gov (United States)

    ... patients may need assisted ventilation to treat respiratory muscle weakness and a pacemaker for cardiac abnormalities. View Full Treatment Information Definition The muscular dystrophies (MD) are a group of more than 30 ...

  17. Traceable calibration of hospital 192Ir HDR sources

    International Nuclear Information System (INIS)

    Govinda Rajan, K.N.; Bhatt, B.C.; Pendse, A.M.; Kannan, V.

    2002-01-01

    Presently, no primary standard exists for the standardization of remote afterloading 192 Ir HDR sources. These sources are, therefore, being standardized by a few Secondary Standard Dosimetry Laboratories (SSDLs), in terms of Air Kerma Strength (AKS) or Reference Air Kerma Rate (RAKR) using a 0.6 cc Farmer type chamber, set up as an Interim Standard. These SSDLs offer calibration to well type of ionization chambers that are normally used by the hospitals for calibrating the 192 lr HDR source. Presently, in many countries, including India, well chambers are not commercially available. Nor do these countries offer any calibration service for 192 lr HDR source. With the result users make use of well chambers imported from different countries with their calibration traceable to the country of origin. Since no intercomparisons between these countries have been reported, the measurement consistency between hospitals becomes questionable. The problem is compounded by the fact that these chambers are used for several years without re-calibration since no calibration service is locally available. For instance, in India, the chambers have been in use in hospitals, since 1994, without a second calibration. Not all hospitals use the well chamber for the calibration of the 192 lr HDR source. Many hospitals make use of 0.6 cc chambers, in air, at short source to chamber distances, for measuring the AKS of the source. The latter method is prone to much larger inaccuracy due to the use of very short source to chamber distances without proper calibration jigs, use of 60 Co calibration factor for 192 Ir HDR source calibrations, neglecting correction factors for room scatter, fluence non-uniformity, use of arbitrary buildup factors for the buildup cap of the chamber etc. A comparison of the procedures used at hospitals revealed that various arbitrary methods are in use at hospitals. An indigenously developed well chamber was calibrated against a Reference Standard traceable to the

  18. Radiation Parameters of High Dose Rate Iridium -192 Sources

    Science.gov (United States)

    Podgorsak, Matthew B.

    A lack of physical data for high dose rate (HDR) Ir-192 sources has necessitated the use of basic radiation parameters measured with low dose rate (LDR) Ir-192 seeds and ribbons in HDR dosimetry calculations. A rigorous examination of the radiation parameters of several HDR Ir-192 sources has shown that this extension of physical data from LDR to HDR Ir-192 may be inaccurate. Uncertainty in any of the basic radiation parameters used in dosimetry calculations compromises the accuracy of the calculated dose distribution and the subsequent dose delivery. Dose errors of up to 0.3%, 6%, and 2% can result from the use of currently accepted values for the half-life, exposure rate constant, and dose buildup effect, respectively. Since an accuracy of 5% in the delivered dose is essential to prevent severe complications or tumor regrowth, the use of basic physical constants with uncertainties approaching 6% is unacceptable. A systematic evaluation of the pertinent radiation parameters contributes to a reduction in the overall uncertainty in HDR Ir-192 dose delivery. Moreover, the results of the studies described in this thesis contribute significantly to the establishment of standardized numerical values to be used in HDR Ir-192 dosimetry calculations.

  19. ProtoMD: A prototyping toolkit for multiscale molecular dynamics

    Science.gov (United States)

    Somogyi, Endre; Mansour, Andrew Abi; Ortoleva, Peter J.

    2016-05-01

    ProtoMD is a toolkit that facilitates the development of algorithms for multiscale molecular dynamics (MD) simulations. It is designed for multiscale methods which capture the dynamic transfer of information across multiple spatial scales, such as the atomic to the mesoscopic scale, via coevolving microscopic and coarse-grained (CG) variables. ProtoMD can be also be used to calibrate parameters needed in traditional CG-MD methods. The toolkit integrates 'GROMACS wrapper' to initiate MD simulations, and 'MDAnalysis' to analyze and manipulate trajectory files. It facilitates experimentation with a spectrum of coarse-grained variables, prototyping rare events (such as chemical reactions), or simulating nanocharacterization experiments such as terahertz spectroscopy, AFM, nanopore, and time-of-flight mass spectroscopy. ProtoMD is written in python and is freely available under the GNU General Public License from github.com/CTCNano/proto_md.

  20. SIMULASI KUNCI ELEKTRONIK DENGAN ENKRIPSI MELALUI BLUETOOTH PADA PONSEL

    Directory of Open Access Journals (Sweden)

    Indri Neforawati

    2008-10-01

    Full Text Available Currently the facility provided by mobile phones is very diverse. Starting from the phone, SMS, camera, music player, all rolled into one. Obviously the phone can also be used as electronic keys to replace the existing analog key at this time. Usually, to open a door key one must use a key, so to access a lot of doors must have a lot of different keys. But if the phone is used as an electronic key access control must implement all the keys are not needed anymore, just with one phone can open many locks. Simulation of an electronic lock is designed to use the phone as a remote control, and the computer as a central controller. Communication between mobile phones and computers using Bluetooth. While functioning as a door lock which is connected via parallel port of computer. This electronic key system to apply Access Control using RC4 encryption and MD5 Hashing. Design modules are built using NetBeans IDE 4.1 and the MySQL database, with some additional libraries. Libraries that are mobility netbeans 4.1, mysql-connector-java-3.0.9, BlueCove, Bluelet-Benhui. Phones that use must support the Java MIDP 2.0 and JSR-82.Keywords: Hashing MD5, Enkripsi RC4, NetBeans IDE 4.1, mysql-connector-java-3.0.9

  1. 27 CFR 25.192 - Removal of sour or damaged beer.

    Science.gov (United States)

    2010-04-01

    ... beer. 25.192 Section 25.192 Alcohol, Tobacco Products and Firearms ALCOHOL AND TOBACCO TAX AND TRADE BUREAU, DEPARTMENT OF THE TREASURY LIQUORS BEER Removals Without Payment of Tax Removal of Beer Unfit for Beverage Use § 25.192 Removal of sour or damaged beer. (a) Containers. The brewer shall remove sour or...

  2. 41 CFR 102-192.10 - What authority governs this part?

    Science.gov (United States)

    2010-07-01

    ... MANAGEMENT Introduction to this Part § 102-192.10 What authority governs this part? This part is governed by... 41 Public Contracts and Property Management 3 2010-07-01 2010-07-01 false What authority governs this part? 102-192.10 Section 102-192.10 Public Contracts and Property Management Federal Property...

  3. The dose distribution surrounding 192Ir and 137Cs seed sources

    International Nuclear Information System (INIS)

    Thomason, C.; Mackie, T.R.; Wisconsin Univ., Madison, WI; Lindstrom, M.J.; Higgins, P.D.

    1991-01-01

    Dose distributions in water were measured using LiF thermoluminescent dosemeters for 192 Ir seed sources with stainless steel and with platinum encapsulation to determine the effect of differing encapsulation. Dose distribution was measured for a 137 Cs seed source. In addition, dose distributions surrounding these sources were calculated using the EGS4 Monte Carlo code and were compared to measured data. The two methods are in good agreement for all three sources. Tables are given describing dose distribution surrounding each source as a function of distance and angle. Specific dose constants were also determined from results of Monte Carlo simulation. This work confirms the use of the EGS4 Monte Carlo code in modelling 192 Ir and 137 Cs seed sources to obtain brachytherapy dose distributions. (author)

  4. Harvesting graphics power for MD simulations

    NARCIS (Netherlands)

    van Meel, J.A.; Arnold, A.; Frenkel, D.; Portegies Zwart, S.F.; Belleman, R.G.

    2008-01-01

    We discuss an implementation of molecular dynamics (MD) simulations on a graphic processing unit (GPU) in the NVIDIA CUDA language. We tested our code on a modern GPU, the NVIDIA GeForce 8800 GTX. Results for two MD algorithms suitable for short-ranged and long-ranged interactions, and a

  5. Harvesting graphics power for MD simulations

    NARCIS (Netherlands)

    Meel, J.A. van; Arnold, A.; Frenkel, D.; Portegies Zwart, S.F.; Belleman, R.G.

    We discuss an implementation of molecular dynamics (MD) simulations on a graphic processing unit (GPU) in the NVIDIA CUDA language. We tested our code on a modern GPU, the NVIDIA GeForce 8800 GTX. Results for two MD algorithms suitable for short-ranged and long-ranged interactions, and a

  6. 22 CFR 192.4 - Notification of eligible persons.

    Science.gov (United States)

    2010-04-01

    ... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Notification of eligible persons. 192.4 Section 192.4 Foreign Relations DEPARTMENT OF STATE HOSTAGE RELIEF VICTIMS OF TERRORISM COMPENSATION General... of State, or other Agency Head in domestic situations, shall be responsible for notifying each...

  7. 49 CFR 192.477 - Internal corrosion control: Monitoring.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 3 2010-10-01 2010-10-01 false Internal corrosion control: Monitoring. 192.477... Control § 192.477 Internal corrosion control: Monitoring. If corrosive gas is being transported, coupons... internal corrosion. Each coupon or other means of monitoring internal corrosion must be checked two times...

  8. 7 CFR 3015.192 - Institutions of higher education.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 15 2010-01-01 2010-01-01 false Institutions of higher education. 3015.192 Section....192 Institutions of higher education. (a) OMB Circular No. A-21, including any amendments to the... activities conducted by institutions of higher education (other than for-profit institutions). (b) Additional...

  9. Empirical model with independent variable moments of inertia for triaxial nuclei applied to 76Ge and 192Os

    Science.gov (United States)

    Sugawara, M.

    2018-05-01

    An empirical model with independent variable moments of inertia for triaxial nuclei is devised and applied to 76Ge and 192Os. Three intrinsic moments of inertia, J1, J2, and J3, are varied independently as a particular function of spin I within a revised version of the triaxial rotor model so as to reproduce the energy levels of the ground-state, γ , and (in the case of 192Os) Kπ=4+ bands. The staggering in the γ band is well reproduced in both phase and amplitude. Effective γ values are extracted as a function of spin I from the ratios of the three moments of inertia. The eigenfunctions and the effective γ values are subsequently used to calculate the ratios of B (E 2 ) values associated with these bands. Good agreement between the model calculation and the experimental data is obtained for both 76Ge and 192Os.

  10. Comment: 192 [Taxonomy Icon

    Lifescience Database Archive (English)

    Full Text Available Grey heron Ardea cinerea Ardea_cinerea_L.png 192.png Takeru Nakazato (Database Center for Life Science...zato (Database Center for Life Science) nakazato 2009/11/04 17:28:11 2010/01/14 20:04:35 ...

  11. MdATG18a overexpression improves tolerance to nitrogen deficiency and regulates anthocyanin accumulation through increased autophagy in transgenic apple.

    Science.gov (United States)

    Sun, Xun; Jia, Xin; Huo, Liuqing; Che, Runmin; Gong, Xiaoqing; Wang, Ping; Ma, Fengwang

    2018-02-01

    Nitrogen (N) availability is an essential factor for plant growth. Recycling and remobilization of N have strong impacts on crop yield and quality under N deficiency. Autophagy is a critical nutrient-recycling process that facilitates remobilization under starvation. We previously showed that an important AuTophaGy (ATG) protein from apple, MdATG18a, has a positive role in drought tolerance. In this study, we explored its biological role in response to low-N. Overexpression of MdATG18a in both Arabidopsis and apple improved tolerance to N-depletion and caused a greater accumulation of anthocyanin. The increased anthocyanin concentration in transgenic apple was possibly due to up-regulating flavonoid biosynthetic and regulatory genes (MdCHI, MdCHS, MdANS, MdPAL, MdUFGT, and MdMYB1) and higher soluble sugars concentration. MdATG18a overexpression enhanced starch degradation with up-regulating amylase gene (MdAM1) and up-regulated sugar metabolism related genes (MdSS1, MdHXKs, MdFK1, and MdNINVs). Furthermore, MdATG18a functioned in nitrate uptake and assimilation by up-regulating nitrate reductase MdNIA2 and 3 high-affinity nitrate transporters MdNRT2.1/2.4/2.5. MdATG18a overexpression also elevated other important MdATG genes expression and autophagosomes formation under N-depletion, which play key contributions to above changes. Together, these results demonstrate that overexpression of MdATG18a enhances tolerance to N-deficiencies and plays positive roles in anthocyanin biosynthesis through greater autophagic activity. © 2017 John Wiley & Sons Ltd.

  12. 41 CFR 102-192.170 - What are GSA's responsibilities in mail management?

    Science.gov (United States)

    2010-07-01

    ... 41 Public Contracts and Property Management 3 2010-07-01 2010-07-01 false What are GSA's responsibilities in mail management? 102-192.170 Section 102-192.170 Public Contracts and Property Management... PROGRAMS 192-MAIL MANAGEMENT GSA's Responsibilities and Services § 102-192.170 What are GSA's...

  13. Combining Rosetta with molecular dynamics (MD): A benchmark of the MD-based ensemble protein design.

    Science.gov (United States)

    Ludwiczak, Jan; Jarmula, Adam; Dunin-Horkawicz, Stanislaw

    2018-07-01

    Computational protein design is a set of procedures for computing amino acid sequences that will fold into a specified structure. Rosetta Design, a commonly used software for protein design, allows for the effective identification of sequences compatible with a given backbone structure, while molecular dynamics (MD) simulations can thoroughly sample near-native conformations. We benchmarked a procedure in which Rosetta design is started on MD-derived structural ensembles and showed that such a combined approach generates 20-30% more diverse sequences than currently available methods with only a slight increase in computation time. Importantly, the increase in diversity is achieved without a loss in the quality of the designed sequences assessed by their resemblance to natural sequences. We demonstrate that the MD-based procedure is also applicable to de novo design tasks started from backbone structures without any sequence information. In addition, we implemented a protocol that can be used to assess the stability of designed models and to select the best candidates for experimental validation. In sum our results demonstrate that the MD ensemble-based flexible backbone design can be a viable method for protein design, especially for tasks that require a large pool of diverse sequences. Copyright © 2018 Elsevier Inc. All rights reserved.

  14. 22 CFR 192.1 - Declarations of hostile action.

    Science.gov (United States)

    2010-04-01

    ... 192.1 Foreign Relations DEPARTMENT OF STATE HOSTAGE RELIEF VICTIMS OF TERRORISM COMPENSATION General § 192.1 Declarations of hostile action. (a)(1) The Secretary of State shall declare when and where individuals in the Civil Service of the United States, including members of the Foreign Service and foreign...

  15. 49 CFR 192.475 - Internal corrosion control: General.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 3 2010-10-01 2010-10-01 false Internal corrosion control: General. 192.475... Control § 192.475 Internal corrosion control: General. (a) Corrosive gas may not be transported by... taken to minimize internal corrosion. (b) Whenever any pipe is removed from a pipeline for any reason...

  16. MD210 Note: Creation of Hollow Bunches in the PSB

    CERN Document Server

    Oeftiger, Adrian; Findlay, Alan James; Hancock, Steven; Rumolo, Giovanni; CERN. Geneva. ATS Department

    2016-01-01

    MD210 aims for the creation of longitudinally hollow bunches in the CERN PS Booster. The first three sessions have been carried out using the radial loop feedback system in order to drive the beam on a dipolar parametric resonance (instead of the phase loop). It has been found that the damping by the phase loop inhibits the excitation of the resonance to a major extent. The hollow distributions generated under these circumstances fail to reach a satisfying bunching factor. Nonetheless, proving the principally successful application of this technique to the PS Booster promises good results once the phase loop system supports trim functions. The approach, actions and detailed results of the first three MD sessions are presented in this paper.

  17. Paradeisos: A perfect hashing algorithm for many-body eigenvalue problems

    Science.gov (United States)

    Jia, C. J.; Wang, Y.; Mendl, C. B.; Moritz, B.; Devereaux, T. P.

    2018-03-01

    We describe an essentially perfect hashing algorithm for calculating the position of an element in an ordered list, appropriate for the construction and manipulation of many-body Hamiltonian, sparse matrices. Each element of the list corresponds to an integer value whose binary representation reflects the occupation of single-particle basis states for each element in the many-body Hilbert space. The algorithm replaces conventional methods, such as binary search, for locating the elements of the ordered list, eliminating the need to store the integer representation for each element, without increasing the computational complexity. Combined with the "checkerboard" decomposition of the Hamiltonian matrix for distribution over parallel computing environments, this leads to a substantial savings in aggregate memory. While the algorithm can be applied broadly to many-body, correlated problems, we demonstrate its utility in reducing total memory consumption for a series of fermionic single-band Hubbard model calculations on small clusters with progressively larger Hilbert space dimension.

  18. 41 CFR 102-192.120 - Must we have an agency mail manager?

    Science.gov (United States)

    2010-07-01

    ... mail manager? 102-192.120 Section 102-192.120 Public Contracts and Property Management Federal Property... MANAGEMENT Agency Mail Manager Requirements § 102-192.120 Must we have an agency mail manager? Yes, every Federal agency as defined in § 102-192.35 must have an agency mail manager. Agencies that are not “large...

  19. MD2190: Q" Stabilization during injection

    CERN Document Server

    Schenk, Michael; Li, Kevin Shing Bruce; Malina, Lukas; Metral, Elias; Tomas Garcia, Rogelio; CERN. Geneva. ATS Department

    2018-01-01

    This MD is a follow-up study of MD1831, where single bunches were stabilized against impedance-driven instabilities at 6.5 TeV in the LHC with Q''. The goals are (i) to explore whether an amplitude detuning free Q'' knob can be implemented at injection energy, and (ii) whether Q'' can provide beam stability at injection, where the beams suffer mostly from electron cloud effects. Ideally, this would relax the use of the Landau octupoles and may help in preserving the beam quality by reducing dynamic aperture limitations originating from the octupoles. The MD has been split into two parts: First, optics corrections were put in place to minimize beta-beating and linear coupling introduced by the knobs. The corrections were achieved by means of orbit bumps and skew quadrupole knobs. Machine safety was then validated with loss maps. While the betatron loss maps were approved, the off-momentum maps showed a priori unexpected losses in several arcs and the MD was stopped at this point for reasons of machine protecti...

  20. 49 CFR 192.627 - Tapping pipelines under pressure.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 3 2010-10-01 2010-10-01 false Tapping pipelines under pressure. 192.627 Section... NATURAL AND OTHER GAS BY PIPELINE: MINIMUM FEDERAL SAFETY STANDARDS Operations § 192.627 Tapping pipelines under pressure. Each tap made on a pipeline under pressure must be performed by a crew qualified to make...

  1. Statistical against dynamical PLF fission as seen by the IMF-IMF correlation functions and comparisons with CoMD model

    Science.gov (United States)

    Pagano, E. V.; Acosta, L.; Auditore, L.; Cap, T.; Cardella, G.; Colonna, M.; De Filippo, E.; Geraci, E.; Gnoffo, B.; Lanzalone, G.; Maiolino, C.; Martorana, N.; Pagano, A.; Papa, M.; Piasecki, E.; Pirrone, S.; Politi, G.; Porto, F.; Quattrocchi, L.; Rizzo, F.; Russotto, P.; Trifiro’, A.; Trimarchi, M.; Siwek-Wilczynska, K.

    2018-05-01

    In nuclear reactions at Fermi energies two and multi particles intensity interferometry correlation methods are powerful tools in order to pin down the characteristic time scale of the emission processes. In this paper we summarize an improved application of the fragment-fragment correlation function in the specific physics case of heavy projectile-like (PLF) binary massive splitting in two fragments of intermediate mass(IMF). Results are shown for the reverse kinematics reaction 124 Sn+64 Ni at 35 AMeV that has been investigated by using the forward part of CHIMERA multi-detector. The analysis was performed as a function of the charge asymmetry of the observed couples of IMF. We show a coexistence of dynamical and statistical components as a function of the charge asymmetry. Transport CoMD simulations are compared with the data in order to pin down the timescale of the fragments production and the relevant ingredients of the in medium effective interaction used in the transport calculations.

  2. The small ubiquitin-like modifier E3 ligase MdSIZ1 promotes anthocyanin accumulation by sumoylating MdMYB1 under low-temperature conditions in apple.

    Science.gov (United States)

    Zhou, Li-Jie; Li, Yuan-Yuan; Zhang, Rui-Fen; Zhang, Chun-Ling; Xie, Xing-Bin; Zhao, Cheng; Hao, Yu-Jin

    2017-10-01

    MdMYB1 acts as a crucial component of the MYB-bHLH-WD40 complex to regulate anthocyanin biosynthesis in red-skinned apples (Malus domestica), but little is known about its post-translational regulation. Here, a small ubiquitin-like modifier E3 ligase MdSIZ1 was screened out as an MdMYB1-interacting protein with a yeast two-hybridization approach. The interaction between MdSIZ1 and MdMYB1 was further verified with pull-down and CoIP assays. Furthermore, it was found that MdSIZ1 directly sumoylated MdMYB1 proteins in vivo and in vitro, especially under moderately low temperature (17 °C) conditions, and that this sumoylation was required for MdMYB1 protein stability. Moreover, the transcription level of MdSIZ1 gene was remarkably induced by low temperature and phosphorus deficiency, and MdSIZ1 overexpression exerted a large positive influence on anthocyanin accumulation and red fruit coloration, suggesting its important role in the regulation of anthocyanin biosynthesis under stress conditions. Our findings reveal an important role for a small ubiquitin-like modifier modification of MYB transcription factors in regulation of anthocyanin biosynthesis in plants. © 2017 John Wiley & Sons Ltd.

  3. The Rebound Attack and Subspace Distinguishers: Application to Whirlpool

    DEFF Research Database (Denmark)

    Lamberger, Mario; Mendel, Florian; Schläffer, Martin

    2015-01-01

    We introduce the rebound attack as a variant of differential cryptanalysis on hash functions and apply it to the hash function Whirlpool, standardized by ISO/IEC. We give attacks on reduced variants of the 10-round Whirlpool hash function and compression function. Our results are collisions for 5...

  4. 41 CFR 102-192.25 - Does this part apply to me?

    Science.gov (United States)

    2010-07-01

    ... MANAGEMENT Introduction to this Part § 102-192.25 Does this part apply to me? Yes, this part applies to you... 41 Public Contracts and Property Management 3 2010-07-01 2010-07-01 false Does this part apply to me? 102-192.25 Section 102-192.25 Public Contracts and Property Management Federal Property...

  5. 49 CFR 192.357 - Customer meters and regulators: Installation.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 3 2010-10-01 2010-10-01 false Customer meters and regulators: Installation. 192... SAFETY TRANSPORTATION OF NATURAL AND OTHER GAS BY PIPELINE: MINIMUM FEDERAL SAFETY STANDARDS Customer Meters, Service Regulators, and Service Lines § 192.357 Customer meters and regulators: Installation. (a...

  6. 49 CFR 192.513 - Test requirements for plastic pipelines.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 3 2010-10-01 2010-10-01 false Test requirements for plastic pipelines. 192.513 Section 192.513 Transportation Other Regulations Relating to Transportation (Continued) PIPELINE AND... Test requirements for plastic pipelines. (a) Each segment of a plastic pipeline must be tested in...

  7. 49 CFR 192.57 - [Reserved

    Science.gov (United States)

    2010-10-01

    ... Other Regulations Relating to Transportation (Continued) PIPELINE AND HAZARDOUS MATERIALS SAFETY ADMINISTRATION, DEPARTMENT OF TRANSPORTATION (CONTINUED) PIPELINE SAFETY TRANSPORTATION OF NATURAL AND OTHER GAS BY PIPELINE: MINIMUM FEDERAL SAFETY STANDARDS Materials § 192.57 [Reserved] ...

  8. 49 CFR 192.61 - [Reserved

    Science.gov (United States)

    2010-10-01

    ... Other Regulations Relating to Transportation (Continued) PIPELINE AND HAZARDOUS MATERIALS SAFETY ADMINISTRATION, DEPARTMENT OF TRANSPORTATION (CONTINUED) PIPELINE SAFETY TRANSPORTATION OF NATURAL AND OTHER GAS BY PIPELINE: MINIMUM FEDERAL SAFETY STANDARDS Materials § 192.61 [Reserved] ...

  9. 22 CFR 192.2 - Application for determination of eligibility.

    Science.gov (United States)

    2010-04-01

    .... 192.2 Section 192.2 Foreign Relations DEPARTMENT OF STATE HOSTAGE RELIEF VICTIMS OF TERRORISM... addressed to the Director General of the Foreign Service, Department of State, Washington, DC 20520... State there is good cause for the late filing. Applications in connection with hostile action in...

  10. 49 CFR 192.283 - Plastic pipe: Qualifying joining procedures.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 3 2010-10-01 2010-10-01 false Plastic pipe: Qualifying joining procedures. 192... Materials Other Than by Welding § 192.283 Plastic pipe: Qualifying joining procedures. (a) Heat fusion... for making plastic pipe joints by a heat fusion, solvent cement, or adhesive method, the procedure...

  11. StandsSIM-MD: a Management Driven forest SIMulator

    Directory of Open Access Journals (Sweden)

    Susana Barreiro

    2016-07-01

    Full Text Available Aim of the study: The existing stand level forest simulators available in Portugal were not developed with the aim of including up-to-date model versions and were limited in terms of accounting for forest management. The simulators’ platform, sIMfLOR was recently created to implement different growth models with a common philosophy. The objective was developing one easily-updatable, user-friendly, forest management and climate change sensitive simulator capable of projecting growth for the main tree species in Portugal. Area of the study: Portugal. Material and methods: The new simulator was programmed in a modular form consisting of several modules. The growth module integrates different forest growth and yield models (empirical and process-based for the main wood production tree species in Portugal (eucalypt, umbrella and maritime pines; whereas the management module drives the growth projections along the planning horizon according to a range of forest management approaches and climate (at present only available for eucalypt. Main results: The main result is the StandsSIM-MD Management Driven simulator that overcomes the limitations of the existing stand level simulators. It is a step forward when compared to the models currently available in the sIMfLOR platform covering more tree species, stand structures and stand compositions. It is focused on end-users and it is based on similar concepts regarding the generation of required inputs and generated outputs. Research highlights: -          Forest Management Driven simulations approach -          Multiple Prescriptions-Per-Stand functionality -          StandsSIM-MD can be used to support landowners decisions on stand forest management -          StandsSIM-MD simulations at regional level can be combined with optimization routines Keywords: Forest simulator, Forest Management Approaches; StandsSIM-MD; forest management.

  12. Porovnání současných a nových hašovacích funkcí

    OpenAIRE

    Suchan, Martin

    2007-01-01

    The goal of this study is to present comparison of today's most widely used cryptographic hash functions and compare them with drafts of new hash functions, which are being currently developed for Advanced Hash Standard competition. This study also includes implementation of all described functions in programming language C#.

  13. 49 CFR 192.193 - Valve installation in plastic pipe.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 3 2010-10-01 2010-10-01 false Valve installation in plastic pipe. 192.193... Components § 192.193 Valve installation in plastic pipe. Each valve installed in plastic pipe must be designed so as to protect the plastic material against excessive torsional or shearing loads when the valve...

  14. Postgraduate research training: the PhD and MD thesis.

    Science.gov (United States)

    Higginson, I; Corner, J

    1996-04-01

    Higher research degrees, such as the PhD, MPhil and MD, have existed within universities for 80 years or more, although the differences between the MD and PhD remain confused. A higher research degree training provides individuals with greater research knowledge and skills, and benefits the specialty. Concern exists about the levels of supervision sometimes provided, failure to complete degrees, and the variable levels of research knowledge and skills attained. We propose that higher research degrees in palliative care have four functions: extending personal scholarship, generating knowledge, training for the individual and contributing to the growth of the specialty. Such an approach may include: a formalised first year with taught components such as in research MSc programmes, formal supervision and progress assessment. In palliative care, clinical and academic approaches need greater integration. Multiprofessional learning is essential. To allow individuals to undertake higher research degree programmes, fellowships or specific funding are needed.

  15. 49 CFR 192.619 - Maximum allowable operating pressure: Steel or plastic pipelines.

    Science.gov (United States)

    2010-10-01

    ... plastic pipelines. 192.619 Section 192.619 Transportation Other Regulations Relating to Transportation... Operations § 192.619 Maximum allowable operating pressure: Steel or plastic pipelines. (a) No person may operate a segment of steel or plastic pipeline at a pressure that exceeds a maximum allowable operating...

  16. Comparison of radiation shielding requirements for HDR brachytherapy using 169Yb and 192Ir sources

    International Nuclear Information System (INIS)

    Lymperopoulou, G.; Papagiannis, P.; Sakelliou, L.; Georgiou, E.; Hourdakis, C. J.; Baltas, D.

    2006-01-01

    169 Yb has received a renewed focus lately as an alternative to 192 Ir sources for high dose rate (HDR) brachytherapy. Following the results of a recent work by our group which proved 169 Yb to be a good candidate for HDR prostate brachytherapy, this work seeks to quantify the radiation shielding requirements for 169 Yb HDR brachytherapy applications in comparison to the corresponding requirements for the current 192 Ir HDR brachytherapy standard. Monte Carlo simulation (MC) is used to obtain 169 Yb and 192 Ir broad beam transmission data through lead and concrete. Results are fitted to an analytical equation which can be used to readily calculate the barrier thickness required to achieve a given dose rate reduction. Shielding requirements for a HDR brachytherapy treatment room facility are presented as a function of distance, occupancy, dose limit, and facility workload, using analytical calculations for both 169 Yb and 192 Ir HDR sources. The barrier thickness required for 169 Yb is lower than that for 192 Ir by a factor of 4-5 for lead and 1.5-2 for concrete. Regarding 169 Yb HDR brachytherapy applications, the lead shielding requirements do not exceed 15 mm, even in highly conservative case scenarios. This allows for the construction of a lead door in most cases, thus avoiding the construction of a space consuming, specially designed maze. The effects of source structure, attenuation by the patient, and scatter conditions within an actual treatment room on the above-noted findings are also discussed using corresponding MC simulation results

  17. LSHSIM: A Locality Sensitive Hashing based method for multiple-point geostatistics

    Science.gov (United States)

    Moura, Pedro; Laber, Eduardo; Lopes, Hélio; Mesejo, Daniel; Pavanelli, Lucas; Jardim, João; Thiesen, Francisco; Pujol, Gabriel

    2017-10-01

    Reservoir modeling is a very important task that permits the representation of a geological region of interest, so as to generate a considerable number of possible scenarios. Since its inception, many methodologies have been proposed and, in the last two decades, multiple-point geostatistics (MPS) has been the dominant one. This methodology is strongly based on the concept of training image (TI) and the use of its characteristics, which are called patterns. In this paper, we propose a new MPS method that combines the application of a technique called Locality Sensitive Hashing (LSH), which permits to accelerate the search for patterns similar to a target one, with a Run-Length Encoding (RLE) compression technique that speeds up the calculation of the Hamming similarity. Experiments with both categorical and continuous images show that LSHSIM is computationally efficient and produce good quality realizations. In particular, for categorical data, the results suggest that LSHSIM is faster than MS-CCSIM, one of the state-of-the-art methods.

  18. The AINTEGUMENTA genes, MdANT1 and MdANT2, are associated with the regulation of cell production during fruit growth in apple (Malus × domestica Borkh.).

    Science.gov (United States)

    Dash, Madhumita; Malladi, Anish

    2012-06-25

    Fruit growth in apple (Malus × domestica Borkh.) is mediated by cell production and expansion. Genes involved in regulating these processes and thereby fruit growth, are not well characterized. We hypothesized that the apple homolog(s) of AINTEGUMENTA (ANT), an APETALA2-repeat containing transcription factor, regulates cell production during fruit growth in apple. Two ANT genes, MdANT1 and MdANT2, were isolated from apple and their expression was studied during multiple stages of fruit development. MdANT1 and MdANT2 expression was high during early fruit growth coincident with the period of cell production, rapidly declined during exit from cell production, and remained low during the rest of fruit development. The effects of increase in carbohydrate availability during fruit growth were characterized. Increase in carbohydrate availability enhanced fruit growth largely through an increase in cell production. Expression of MdANT1 and MdANT2 increased sharply by up to around 5-fold in response to an increase in carbohydrate availability. Expression of the ANT genes was compared across two apple genotypes, 'Gala' and 'Golden Delicious Smoothee' (GS), which differ in the extent of fruit growth, largely due to differences in cell production. In comparison to 'Gala', the larger fruit-size genotype, GS, displayed higher levels and a longer duration of MdANT1 and MdANT2 expression. Expression of the ANTs and cell cycle genes in the fruit core and cortex tissues isolated using laser capture microdissection was studied. During early fruit growth, expression of the MdANTs was higher within the cortex, the tissue that constitutes the majority of the fruit. Additionally, MdANT1 and MdANT2 expression was positively correlated with that of A- and B-type CYCLINS, B-type CYCLIN-DEPENDENT-KINASES (CDKBs) and MdDEL1. Multiple lines of evidence from this study suggest that MdANT1 and MdANT2 regulate cell production during fruit growth in apple. ANTs may coordinate the expression of

  19. Quasiparticle excitations in superdeformed {sup 192}Hg

    Energy Technology Data Exchange (ETDEWEB)

    Lauritsen, T.; Carpenter, M.P.; Janssens, R.V.F. [and others

    1995-08-01

    The nucleus {sup 192}Hg plays a pivotal role for superdeformation in the mass 190 region, since calculations of single-particle levels show large shell-gaps for the superdeformed (SD) shape at N = 112 and Z = 80. As a result, {sup 192}Hg is referred to as the doubly magic SD nucleus for the A = 190 region. In previous studies, only one superdeformed band was observed in this nucleus, and this fact was cited as indirect evidence that large shell gaps do indeed exist at the proposed particle numbers.

  20. 49 CFR 192.53 - General.

    Science.gov (United States)

    2010-10-01

    ... Other Regulations Relating to Transportation (Continued) PIPELINE AND HAZARDOUS MATERIALS SAFETY ADMINISTRATION, DEPARTMENT OF TRANSPORTATION (CONTINUED) PIPELINE SAFETY TRANSPORTATION OF NATURAL AND OTHER GAS BY PIPELINE: MINIMUM FEDERAL SAFETY STANDARDS Materials § 192.53 General. Materials for pipe and...

  1. 49 CFR 192.271 - Scope.

    Science.gov (United States)

    2010-10-01

    ... Other Regulations Relating to Transportation (Continued) PIPELINE AND HAZARDOUS MATERIALS SAFETY ADMINISTRATION, DEPARTMENT OF TRANSPORTATION (CONTINUED) PIPELINE SAFETY TRANSPORTATION OF NATURAL AND OTHER GAS BY PIPELINE: MINIMUM FEDERAL SAFETY STANDARDS Joining of Materials Other Than by Welding § 192.271...

  2. 49 CFR 192.273 - General.

    Science.gov (United States)

    2010-10-01

    ... Other Regulations Relating to Transportation (Continued) PIPELINE AND HAZARDOUS MATERIALS SAFETY ADMINISTRATION, DEPARTMENT OF TRANSPORTATION (CONTINUED) PIPELINE SAFETY TRANSPORTATION OF NATURAL AND OTHER GAS BY PIPELINE: MINIMUM FEDERAL SAFETY STANDARDS Joining of Materials Other Than by Welding § 192.273...

  3. The Structural Basis for Lipid and Endotoxin Binding in RP105-MD-1, and Consequences for Regulation of Host Lipopolysaccharide Sensitivity.

    Science.gov (United States)

    Ortiz-Suarez, Maite L; Bond, Peter J

    2016-01-05

    MD-1 is a member of the MD-2-related lipid-recognition (ML) family, and associates with RP105, a cell-surface protein that resembles Toll-like receptor 4 (TLR4). The RP105⋅MD-1 complex has been proposed to play a role in fine-tuning the innate immune response to endotoxin such as bacterial lipopolysaccharide (LPS) via TLR4⋅MD-2, but controversy surrounds its mechanism. We have used atomically detailed simulations to reveal the structural basis for ligand binding and consequent functional dynamics of MD-1 and the RP105 complex. We rationalize reports of endogenous phospholipid binding, by showing that they prevent collapse of the malleable MD-1 fold, before refining crystallographic models and uncovering likely binding modes for LPS analogs. Subsequent binding affinity calculations reveal that endotoxin specificity arises from the entropic cost of expanding the MD-1 cavity to accommodate bulky lipid tails, and support the role of MD-1 as a "sink" that sequesters endotoxin from TLR4 and stabilizes RP105/TLR4 interactions. Copyright © 2016 Elsevier Ltd. All rights reserved.

  4. The dose distribution surrounding sup 192 Ir and sup 137 Cs seed sources

    Energy Technology Data Exchange (ETDEWEB)

    Thomason, C [Wisconsin Univ., Madison, WI (USA). Dept. of Medical Physics; Mackie, T R [Wisconsin Univ., Madison, WI (USA). Dept. of Medical Physics Wisconsin Univ., Madison, WI (USA). Dept. of Human Oncology; Lindstrom, M J [Wisconsin Univ., Madison, WI (USA). Biostatistics Center; Higgins, P D [Cleveland Clinic Foundation, OH (USA). Dept. of Radiation Oncology

    1991-04-01

    Dose distributions in water were measured using LiF thermoluminescent dosemeters for {sup 192}Ir seed sources with stainless steel and with platinum encapsulation to determine the effect of differing encapsulation. Dose distribution was measured for a {sup 137}Cs seed source. In addition, dose distributions surrounding these sources were calculated using the EGS4 Monte Carlo code and were compared to measured data. The two methods are in good agreement for all three sources. Tables are given describing dose distribution surrounding each source as a function of distance and angle. Specific dose constants were also determined from results of Monte Carlo simulation. This work confirms the use of the EGS4 Monte Carlo code in modelling {sup 192}Ir and {sup 137}Cs seed sources to obtain brachytherapy dose distributions. (author).

  5. Advantages of using 192Ir γ-ray flaw detector for some products

    International Nuclear Information System (INIS)

    Qin Xiqi

    1989-01-01

    This paper describes the advantages of 192 Ir γ-ray flaw detector made in China in welding seam testings. The authors made a comparison between 192 Ir γ-ray and X-ray machine. 192 Ir γ-ray machine showed many advantages, such as shorter working hours and less labour intensity

  6. Limitations of Ir{sup 192} as a Radiographic Source for the Control of Reactor Pressure-Vessels; Limitations de {sup 192}Ir en Tant que Source pour l'Examen Radiographique des Caissons Etanches de Reacteurs; Nedostatki Iridiya-192 v kachestveradiograficheskogo istochnika dlya kontrolya za korpusami reaktorov vysokogodavleniya; Limitaciones del {sup 192}Ir como Fuente Radiografica en el Control de Recipientes de Presion para Reactores

    Energy Technology Data Exchange (ETDEWEB)

    Horvat, D. [Nuclear Institute ' ' J. Stefan' ' Ljubljana, Yugoslavia (Slovenia)

    1965-09-15

    Published data and the results of our own investigations have shown that the advantage of Ir{sup 192} with regard to the quality of radiographs is obvious when comparing it with Co{sup 60} even with thicknesses over 80 mm of irradiated steel. The application of Ir{sup 192} in practice is limited by the alternative: either a very long exposure time or a source of very high activity. Where the exposure (Ci. min) for 1 m of radiographed weld is plotted against the specific activity of the source, diagrams show that, for practically attainable specific activities kilo-curie sources must be used for greater thicknesses. For such sources, self-absorption may become an important factor. An analysis of the influence of self-absorption causing a reduction of the source effectiveness and the filtration effect in the source is made by determining an equivalent increase of thickness of irradiated steel and by calculating the effective linear absorption coefficient as a function of the source dimensions and the thickness of the irradiated steel. Even in cases of relatively large source dimensions the filtration effect does not diminish the effective linear absorption coefficient to such an extent that the advantage in quality against Co{sup 60} would be lost. Possibilities of improvement due to a new shape of radiographic sources are discussed. In the case of narrow primary beams these new sources give smaller effective dimensions and allow shorter source-to-film distances. A further advantage of Ir{sup 192} is obvious from the diagrams of the weight of the exposure equipment for Ir{sup 192} and Coso taking in account equivalent activities of both sources regarding the same exposure time. The economic disadvantages, because of the short half-life,of Ir{sup 192} are discussed and a rough economical comparison between Co{sup 60} and Ir{sup 192} at different extensiveness and densities of the radiographic control is given. (author) [French] Les donnees publiees et les resultats

  7. A dsRNA-binding protein MdDRB1 associated with miRNA biogenesis modifies adventitious rooting and tree architecture in apple.

    Science.gov (United States)

    You, Chun-Xiang; Zhao, Qiang; Wang, Xiao-Fei; Xie, Xing-Bin; Feng, Xiao-Ming; Zhao, Ling-Ling; Shu, Huai-Rui; Hao, Yu-Jin

    2014-02-01

    Although numerous miRNAs have been already isolated from fruit trees, knowledge about miRNA biogenesis is largely unknown in fruit trees. Double-strand RNA-binding (DRB) protein plays an important role in miRNA processing and maturation; however, its role in the regulation of economically important traits is not clear yet in fruit trees. EST blast and RACE amplification were performed to isolate apple MdDRB1 gene. Following expression analysis, RNA binding and protein interaction assays, MdDRB1 was transformed into apple callus and in vitro tissue cultures to characterize the functions of MdDRB1 in miRNA biogenesis, adventitious rooting, leaf development and tree growth habit. MdDRB1 contained two highly conserved DRB domains. Its transcripts existed in all tissues tested and are induced by hormones. It bound to double-strand RNAs and interacted with AtDCL1 (Dicer-Like 1) and MdDCL1. Chip assay indicated its role in miRNA biogenesis. Transgenic analysis showed that MdDRB1 controls adventitious rooting, leaf curvature and tree architecture by modulating the accumulation of miRNAs and the transcript levels of miRNA target genes. Our results demonstrated that MdDRB1 functions in the miRNA biogenesis in a conserved way and that it is a master regulator in the formation of economically important traits in fruit trees. © 2013 Society for Experimental Biology, Association of Applied Biologists and John Wiley & Sons Ltd.

  8. Apple MdACS6 Regulates Ethylene Biosynthesis During Fruit Development Involving Ethylene-Responsive Factor.

    Science.gov (United States)

    Li, Tong; Tan, Dongmei; Liu, Zhi; Jiang, Zhongyu; Wei, Yun; Zhang, Lichao; Li, Xinyue; Yuan, Hui; Wang, Aide

    2015-10-01

    Ethylene biosynthesis in plants involves different 1-aminocyclopropane-1-carboxylic acid synthase (ACS) genes. The regulation of each ACS gene during fruit development is unclear. Here, we characterized another apple (Malus×domestica) ACS gene, MdACS6. The transcript of MdACS6 was observed not only in fruits but also in other tissues. During fruit development, MdACS6 was initiated at a much earlier stage, whereas MdACS3a and MdACS1 began to be expressed at 35 d before harvest and immediateley after harvest, respectively. Moreover, the enzyme activity of MdACS6 was significantly lower than that of MdACS3a and MdACS1, accounting for the low ethylene biosynthesis in young fruits. Overexpression of MdACS6 (MdACS6-OE) by transient assay in apple showed enhanced ethylene production, and MdACS3a was induced in MdACS6-OE fruits but not in control fruits. In MdACS6 apple fruits silenced by the virus-induced gene silencing (VIGS) system (MdACS6-AN), neither ethylene production nor MdACS3a transcript was detectable. In order to explore the mechanism through which MdACS3a was induced in MdACS6-OE fruits, we investigated the expression of apple ethylene-responsive factor (ERF) genes. The results showed that the expression of MdERF2 was induced in MdACS6-OE fruits and inhibited in MdACS6-AN fruits. Yeast one-hybrid assay showed that MdERF2 protein could bind to the promoter of MdACS3a. Moreover, down-regulation of MdERF2 in apple flesh callus led to a decrease of MdACS3a expression, demonstrating the regulation of MdERF2 on MdACS3a. The mechanism through which MdACS6 regulates the action of MdACS3a was discussed. © The Author 2015. Published by Oxford University Press on behalf of Japanese Society of Plant Physiologists. All rights reserved. For permissions, please email: journals.permissions@oup.com.

  9. 49 CFR 19.2 - Definitions.

    Science.gov (United States)

    2010-10-01

    ... WITH INSTITUTIONS OF HIGHER EDUCATION, HOSPITALS, AND OTHER NON-PROFIT ORGANIZATIONS General § 19.2... acquired. Other charges, such as the cost of installation, transportation, taxes, duty or protective in... higher education, public and private hospitals, and other quasi-public and private non-profit...

  10. SSR Analysis of Genetic Diversity Among 192 Diploid Potato Cultivars

    Directory of Open Access Journals (Sweden)

    Xiaoyan Song

    2016-05-01

    Full Text Available In potato breeding, it is difficult to improve the traits of interest at the tetraploid level due to the tetrasomic inheritance. A promising alternative is diploid breeding. Thus it is necessary to assess the genetic diversity of diploid potato germplasm for efficient exploration and deployment of desirable traits. In this study, we used SSR markers to evaluate the genetic diversity of diploid potato cultivars. To screen polymorphic SSR markers, 55 pairs of SSR primers were employed to amplify 39 cultivars with relatively distant genetic relationships. Among them, 12 SSR markers with high polymorphism located at 12 chromosomes were chosen to evaluate the genetic diversity of 192 diploid potato cultivars. The primers produced 6 to 18 bands with an average of 8.2 bands per primer. In total, 98 bands were amplified from 192 cultivars, and 97 of them were polymorphic. Cluster analysis using UPGMA showed the genetic relationships of all accessions tested: 186 of the 192 accessions could be distinguished by only 12 pairs of SSR primers, and the 192 diploid cultivars were divided into 11 groups, and 83.3% constituted the first group. Clustering results showed relatively low genetic diversity among 192 diploid cultivars, with closer relationship at the molecular level. The results can provide molecular basis for diploid potato breeding.

  11. 41 CFR 102-192.30 - What types of mail does this part apply to?

    Science.gov (United States)

    2010-07-01

    ... 192-MAIL MANAGEMENT Introduction to this Part § 102-192.30 What types of mail does this part apply to... 41 Public Contracts and Property Management 3 2010-07-01 2010-07-01 false What types of mail does this part apply to? 102-192.30 Section 102-192.30 Public Contracts and Property Management Federal...

  12. Influence of paraoxonase-1 Q192R and cytochrome P450 2C19 polymorphisms on clopidogrel response

    Directory of Open Access Journals (Sweden)

    Li L

    2012-02-01

    Full Text Available Rolf P Kreutz1,2, Perry Nystrom2, Yvonne Kreutz2, Jia Miao2, Zeruesenay Desta2, Jeffrey A Breall1, Lang Li2, ChienWei Chiang2, Richard Kovacs1, David A Flockhart2, Yan Jin21Krannert Institute of Cardiology, 2Division of Clinical Pharmacology, Indiana University School of Medicine, Indianapolis, IN, USABackground: The metabolic activation of clopidogrel is a two-step process. It has been suggested that paraoxonase-1 (PON1 is a rate-limiting enzyme in the conversion of 2-oxo-clopidogrel to an active thiol metabolite. Conflicting results have been reported in regard to (1 the association of a common polymorphism of PON1 (Q192R with reduced rates of coronary stent thrombosis in patients taking clopidogrel and (2 its effects on platelet inhibition in patient populations of European descent. Methods: Blood samples from 151 subjects of mixed racial background with established coronary artery disease and who received clopidogrel were analyzed. Platelet aggregation was determined with light transmittance aggregometry and VerifyNow® P2Y12 assay. Genotyping for cytochrome P450 2C19 (CYP2C19*2 and *3 and PON1 (Q192R polymorphisms was performed.Results: Carriers of CYP2C19*2 alleles exhibited lower levels of platelet inhibition and higher on-treatment platelet aggregation than noncarriers. There was no significant difference in platelet aggregation among PON1 Q192R genotypes. Homozygous carriers of the wild-type variant of PON1 (QQ192 had similar on-treatment platelet reactivity to carriers of increased-function variant alleles during maintenance clopidogrel dosing, as well as after administration of a clopidogrel 600 mg loading dose.Conclusion: CYP2C19*2 allele is associated with impaired platelet inhibition by clopidogrel and high on-treatment platelet aggregation. PON1 (Q192R polymorphism does not appear to be a significant determinant of clopidogrel response.Keywords: PON1, platelet, aggregation, cytochrome P450 enzymes

  13. StandsSIM-MD: a Management Driven forest SIMulator

    Energy Technology Data Exchange (ETDEWEB)

    Barreiro, S.; Rua, J.; Tomé, M.

    2016-07-01

    Aim of the study. The existing stand level forest simulators available in Portugal were not developed with the aim of including up-to-date model versions and were limited in terms of accounting for forest management. The simulators’ platform, sIMfLOR was recently created to implement different growth models with a common philosophy. The objective was developing one easily-updatable, user-friendly, forest management and climate change sensitive simulator capable of projecting growth for the main tree species in Portugal. Area of the study: Portugal. Material and methods: The new simulator was programmed in a modular form consisting of several modules. The growth module integrates different forest growth and yield models (empirical and process-based) for the main wood production tree species in Portugal (eucalypt, umbrella and maritime pines); whereas the management module drives the growth projections along the planning horizon according to a range of forest management approaches and climate (at present only available for eucalypt). Main results: The main result is the StandsSIM-MD Management Driven simulator that overcomes the limitations of the existing stand level simulators. It is a step forward when compared to the models currently available in the sIMfLOR platform covering more tree species, stand structures and stand compositions. It is focused on end-users and it is based on similar concepts regarding the generation of required inputs and generated outputs. Research highlights: Forest Management Driven simulations approach. Multiple Prescriptions-Per-Stand functionality. StandsSIM-MD can be used to support landowners decisions on stand forest management. StandsSIM-MD simulations at regional level can be combined with optimization routines. (Author)

  14. 22 CFR 192.3 - Definitions.

    Science.gov (United States)

    2010-04-01

    ... Relations DEPARTMENT OF STATE HOSTAGE RELIEF VICTIMS OF TERRORISM COMPENSATION General § 192.3 Definitions. When used in this subchapter, unless otherwise specified, the terms— (a) Secretary of State includes any person to whom the Secretary of State has delegated the responsibilities of carrying out this...

  15. High dose rate 192Ir calibration: Indonesia experiences

    International Nuclear Information System (INIS)

    Nasukha; Tjiptanto, D.; Darmasyah, R.; Kurniawan, B.

    2002-01-01

    Indonesia with a population of more than 200 Million people which spread on about 5000 islands, up to now only has 23 radiotherapy centers and some not active anymore. As mention by Parkin et al that Cervix/Utery and breast cancer are the most estimated numbers of new cases of cancers in women for developing countries, stomach and lung cancers in men. Indonesia as a developing country is likely similar to other developing countries on numbers of new cases of cancers in women. But quite different in men, in Indonesia the most common cancers are nasopharynx and thyroid cancers. The use of lr-192 sources in high dose-rate (HDR) remotely afterloaded brachytherapy treatments have greatly increased in recent years and variety of such sources are commercially available. Nine radiotherapy centers in Indonesia installed Nucletron microSelectron HDR remote afterloader. Based on the data of CiptoMangunkusurno Hospital, Jakarta that the most common cancers are the cervix, breast, nasopharynx and thyroid cancers which of percentage are about 31%, 25 %, 13%, and 6 % respectively. It means that the use of HDR 192 Ir brachytherapy has to be an effective tool in the treatments. Two methods have been studied and applied to calibrate HDR 192 Ir brachytherapy in Indonesia, especially for Nucletron microSelectron HDR 192 lr remote afterloader brachytherapy. Calibration of HDR 192 Ir brachytherapy source has been done by Cavity lonization Chamber and with Well Type lonization Chamber. First, 0.6 cc of NE Farmer type dosimeter that was calibrated to 60 Co and 250 kV of x-rays in air kerma was used in this experiment. Position of measurement (detector and source) at the center of the room and about 1 meter from the floor. Eight variation of distances from 10 cm to 40 cms have been carried out measurement as recommended by IAEA-TECDOC-1079. Correction have been given for scatters, non-uniformity, and attenuation. To solve the problem of scatter correction factor was used Matlab programming

  16. MD1878: Operation with primary collimators at tighter settings

    CERN Document Server

    AUTHOR|(CDS)2078850; Amorim, David; Biancacci, Nicolo; Bruce, Roderik; Buffat, Xavier; Carver, Lee Robert; Fiascaris, Maria; Mereghetti, Alessio; Redaelli, Stefano; Rossi, Roberto; Salvachua Ferrando, Belen Maria; Soderen, Martin; Trad, Georges; CERN. Geneva. ATS Department

    2017-01-01

    Primary (TCP) collimators of the betatron cleaning insertion determine the betatron cut of the LHC beam. During the 2016 they were set at 5.5 nominal beam sigmas at 6.5 TeV (i.e. by using a normalized emittance ε* = 3:5 μm is used). Reducing their settings is a possible way to push the ß* at the LHC, which depends on the collimation hierarchy. This study aims at understanding possible limitations of operating the LHC with tighter settings of the primary collimators. This is a crucial input to the choice of operational configuration in terms of ß* at the LHC as well as at the HL-LHC. This study follows a successful MD done in block 3 to understand limitations from TCP impedance [1]. The outcome of this MD can also have an impact for the design of the FCC collimation system, which is currently based on the present TCP gaps. Studies of beam stability as a function of octupole current, transverse feedback gain (ADT) and transverse separation at the IPs were also carried out.

  17. MD290: Q4 IP6 Quench Level

    CERN Document Server

    Bednarek, Mateusz Jakub; Lechner, Anton; CERN. Geneva. ATS Department

    2016-01-01

    The detailed program proposed for the LHC Machine Development concerning a quench induced by fast losses on the MQY.4L6 quadrupole is presented. The merit of the MD, the necessary modifications of the machine protection systems are presented together with a preliminary analysis of the MD results.

  18. 41 CFR 102-192.155 - What should our agency-wide mail management policy statement cover?

    Science.gov (United States)

    2010-07-01

    ... 41 Public Contracts and Property Management 3 2010-07-01 2010-07-01 false What should our agency-wide mail management policy statement cover? 102-192.155 Section 102-192.155 Public Contracts and... REGULATION ADMINISTRATIVE PROGRAMS 192-MAIL MANAGEMENT Other Agency Responsibilities § 102-192.155 What...

  19. Assessing the allelotypic effect of two aminocyclopropane carboxylic acid synthase-encoding genes MdACS1 and MdACS3a on fruit ethylene production and softening in Malus

    Science.gov (United States)

    Dougherty, Laura; Zhu, Yuandi; Xu, Kenong

    2016-01-01

    Phytohormone ethylene largely determines apple fruit shelf life and storability. Previous studies demonstrated that MdACS1 and MdACS3a, which encode 1-aminocyclopropane-1-carboxylic acid synthases (ACS), are crucial in apple fruit ethylene production. MdACS1 is well-known to be intimately involved in the climacteric ethylene burst in fruit ripening, while MdACS3a has been regarded a main regulator for ethylene production transition from system 1 (during fruit development) to system 2 (during fruit ripening). However, MdACS3a was also shown to have limited roles in initiating the ripening process lately. To better assess their roles, fruit ethylene production and softening were evaluated at five time points during a 20-day post-harvest period in 97 Malus accessions and in 34 progeny from 2 controlled crosses. Allelotyping was accomplished using an existing marker (ACS1) for MdACS1 and two markers (CAPS866 and CAPS870) developed here to specifically detect the two null alleles (ACS3a-G289V and Mdacs3a) of MdACS3a. In total, 952 Malus accessions were allelotyped with the three markers. The major findings included: The effect of MdACS1 was significant on fruit ethylene production and softening while that of MdACS3a was less detectable; allele MdACS1–2 was significantly associated with low ethylene and slow softening; under the same background of the MdACS1 allelotypes, null allele Mdacs3a (not ACS3a-G289V) could confer a significant delay of ethylene peak; alleles MdACS1–2 and Mdacs3a (excluding ACS3a-G289V) were highly enriched in M. domestica and M. hybrid when compared with those in M. sieversii. These findings are of practical implications in developing apples of low and delayed ethylene profiles by utilizing the beneficial alleles MdACS1-2 and Mdacs3a. PMID:27231553

  20. Swiss national MD-PhD-program: an outcome analysis.

    Science.gov (United States)

    Kuehnle, Katrin; Winkler, David T; Meier-Abt, Peter J

    2009-09-19

    This study aims at a first evaluation of the outcome of the Swiss national MD-PhD program during the last 16 years. One hundred and twenty six former and current students in the Swiss national MD-PhD program were surveyed via a Web-based questionnaire in September 2007. Twenty-four questions assessed information regarding participant demographics, information on the PhD thesis and publication activity, current positions and research activity, as well as participant's opinions, attitudes and career goals. Eighty questionnaires were received from 126 MD-PhD students and graduates (63.5% response rate). The responders consisted of present students (36%), former graduates (56%), and dropouts (8%). The percentage of women in the program was 23%, and the average duration of the program was 4.2 +/- 1.4 years. Research interests were predominantly in the fields of neuroscience, immunology, molecular biology and cancer research. A considerable portion of the MD-PhD graduates had an excellent publication record stemming from their PhD research work, and 89% were planning to continue a research-orientated career. Over 50% of those MD-PhD graduates completing their thesis before 2002 had already reached an assistant or full professor position at the time of the survey. Nearly all participants considered the MD-PhD training helpful to their career and high quality standards were assigned to the acquired practical and intellectual skills. However, criticism was expressed concerning the general mentoring and the career related mentoring. Moreover, general mentoring and career related mentoring were significantly less well perceived in research groups employing more than seven PhD students at the same time. The MD-PhD students and graduates surveyed were satisfied with their education and most of them continued a research-orientated career. Regarding the overall positive evaluation, this study supports the view that MD-PhD graduates are well qualified for a successful career in

  1. Matching Real and Synthetic Panoramic Images Using a Variant of Geometric Hashing

    Science.gov (United States)

    Li-Chee-Ming, J.; Armenakis, C.

    2017-05-01

    This work demonstrates an approach to automatically initialize a visual model-based tracker, and recover from lost tracking, without prior camera pose information. These approaches are commonly referred to as tracking-by-detection. Previous tracking-by-detection techniques used either fiducials (i.e. landmarks or markers) or the object's texture. The main contribution of this work is the development of a tracking-by-detection algorithm that is based solely on natural geometric features. A variant of geometric hashing, a model-to-image registration algorithm, is proposed that searches for a matching panoramic image from a database of synthetic panoramic images captured in a 3D virtual environment. The approach identifies corresponding features between the matched panoramic images. The corresponding features are to be used in a photogrammetric space resection to estimate the camera pose. The experiments apply this algorithm to initialize a model-based tracker in an indoor environment using the 3D CAD model of the building.

  2. MD-11 PCA - Research flight team photo

    Science.gov (United States)

    1995-01-01

    On Aug. 30, 1995, a the McDonnell Douglas MD-11 transport aircraft landed equipped with a computer-assisted engine control system that has the potential to increase flight safety. In landings at NASA Dryden Flight Research Center, Edwards, California, on August 29 and 30, the aircraft demonstrated software used in the aircraft's flight control computer that essentially landed the MD-11 without a need for the pilot to manipulate the flight controls significantly. In partnership with McDonnell Douglas Aerospace (MDA), with Pratt & Whitney and Honeywell helping to design the software, NASA developed this propulsion-controlled aircraft (PCA) system following a series of incidents in which hydraulic failures resulted in the loss of flight controls. This new system enables a pilot to operate and land the aircraft safely when its normal, hydraulically-activated control surfaces are disabled. This August 29, 1995, photo shows the MD-11 team. Back row, left to right: Tim Dingen, MDA pilot; John Miller, MD-11 Chief pilot (MDA); Wayne Anselmo, MD-11 Flight Test Engineer (MDA); Gordon Fullerton, PCA Project pilot; Bill Burcham, PCA Chief Engineer; Rudey Duran, PCA Controls Engineer (MDA); John Feather, PCA Controls Engineer (MDA); Daryl Townsend, Crew Chief; Henry Hernandez, aircraft mechanic; Bob Baron, PCA Project Manager; Don Hermann, aircraft mechanic; Jerry Cousins, aircraft mechanic; Eric Petersen, PCA Manager (Honeywell); Trindel Maine, PCA Data Engineer; Jeff Kahler, PCA Software Engineer (Honeywell); Steve Goldthorpe, PCA Controls Engineer (MDA). Front row, left to right: Teresa Hass, Senior Project Management Analyst; Hollie Allingham (Aguilera), Senior Project Management Analyst; Taher Zeglum, PCA Data Engineer (MDA); Drew Pappas, PCA Project Manager (MDA); John Burken, PCA Control Engineer.

  3. 41 CFR 102-192.130 - What are your general responsibilities as an agency mail manager?

    Science.gov (United States)

    2010-07-01

    ... responsibilities as an agency mail manager? 102-192.130 Section 102-192.130 Public Contracts and Property... ADMINISTRATIVE PROGRAMS 192-MAIL MANAGEMENT Agency Mail Manager Requirements § 102-192.130 What are your general responsibilities as an agency mail manager? In addition to carrying out the responsibilities in Subparts B, C, D...

  4. 41 CFR 102-192.135 - Must we have a mail center manager at our facility?

    Science.gov (United States)

    2010-07-01

    ... center manager at our facility? 102-192.135 Section 102-192.135 Public Contracts and Property Management... PROGRAMS 192-MAIL MANAGEMENT Mail Center Manager Requirements § 102-192.135 Must we have a mail center manager at our facility? Yes, every facility that has more than two full time people dedicated to...

  5. Calibration procedure for thermoluminescent dosemeters in water absorbed doses for Iridium-192 high dose rate sources

    International Nuclear Information System (INIS)

    Reyes Cac, Franky Eduardo

    2004-10-01

    Thermoluminescent dosimeters are used in brachytherapy services quality assurance programs, with the aim of guaranteeing the correct radiation dose supplied to cancer patients, as well as with the purpose of evaluating new clinical procedures. This work describes a methodology for thermoluminescent dosimeters calibration in terms of absorbed dose to water for 192 Ir high dose rate sources. The reference dose used is measured with an ionization chamber previously calibrated for 192 Ir energy quality, applying the methodology proposed by Toelli. This methodology aims to standardizing the procedure, in a similar form to that used for external radiotherapy. The work evolves the adaptation of the TRS-277 Code of the International Atomic Energy Agency, for small and big cavities, through the introduction for non-uniform experimental factor, for the absorbed dose in the neighborhood of small brachytherapy sources. In order to simulate a water medium around the source during the experimental work, an acrylic phantom was used. It guarantees the reproducibility of the ionization chamber and the thermoluminescent dosimeter's location in relation to the radiation source. The values obtained with the ionization chamber and the thermoluminescent dosimeters, exposed to a 192 Ir high dose rate source, were compared and correction factors for different source-detector distances were determined for the thermoluminescent dosimeters. A numeric function was generated relating the correction factors and the source-detector distance. These correction factors are in fact the thermoluminescent dosimeter calibration factors for the 192 Ir source considered. As a possible application of this calibration methodology for thermoluminescent dosimeters, a practical range of source-detector distances is proposed for quality control of 192 Ir high dose rate sources. (author)

  6. 49 CFR 192.279 - Copper pipe.

    Science.gov (United States)

    2010-10-01

    ... Transportation Other Regulations Relating to Transportation (Continued) PIPELINE AND HAZARDOUS MATERIALS SAFETY ADMINISTRATION, DEPARTMENT OF TRANSPORTATION (CONTINUED) PIPELINE SAFETY TRANSPORTATION OF NATURAL AND OTHER GAS BY PIPELINE: MINIMUM FEDERAL SAFETY STANDARDS Joining of Materials Other Than by Welding § 192.279...

  7. 49 CFR 192.281 - Plastic pipe.

    Science.gov (United States)

    2010-10-01

    ... Transportation Other Regulations Relating to Transportation (Continued) PIPELINE AND HAZARDOUS MATERIALS SAFETY ADMINISTRATION, DEPARTMENT OF TRANSPORTATION (CONTINUED) PIPELINE SAFETY TRANSPORTATION OF NATURAL AND OTHER GAS BY PIPELINE: MINIMUM FEDERAL SAFETY STANDARDS Joining of Materials Other Than by Welding § 192.281...

  8. 49 CFR 192.59 - Plastic pipe.

    Science.gov (United States)

    2010-10-01

    ... Other Regulations Relating to Transportation (Continued) PIPELINE AND HAZARDOUS MATERIALS SAFETY ADMINISTRATION, DEPARTMENT OF TRANSPORTATION (CONTINUED) PIPELINE SAFETY TRANSPORTATION OF NATURAL AND OTHER GAS BY PIPELINE: MINIMUM FEDERAL SAFETY STANDARDS Materials § 192.59 Plastic pipe. (a) New plastic pipe...

  9. 49 CFR 192.55 - Steel pipe.

    Science.gov (United States)

    2010-10-01

    ... Other Regulations Relating to Transportation (Continued) PIPELINE AND HAZARDOUS MATERIALS SAFETY ADMINISTRATION, DEPARTMENT OF TRANSPORTATION (CONTINUED) PIPELINE SAFETY TRANSPORTATION OF NATURAL AND OTHER GAS BY PIPELINE: MINIMUM FEDERAL SAFETY STANDARDS Materials § 192.55 Steel pipe. (a) New steel pipe is...

  10. UQlust: combining profile hashing with linear-time ranking for efficient clustering and analysis of big macromolecular data.

    Science.gov (United States)

    Adamczak, Rafal; Meller, Jarek

    2016-12-28

    Advances in computing have enabled current protein and RNA structure prediction and molecular simulation methods to dramatically increase their sampling of conformational spaces. The quickly growing number of experimentally resolved structures, and databases such as the Protein Data Bank, also implies large scale structural similarity analyses to retrieve and classify macromolecular data. Consequently, the computational cost of structure comparison and clustering for large sets of macromolecular structures has become a bottleneck that necessitates further algorithmic improvements and development of efficient software solutions. uQlust is a versatile and easy-to-use tool for ultrafast ranking and clustering of macromolecular structures. uQlust makes use of structural profiles of proteins and nucleic acids, while combining a linear-time algorithm for implicit comparison of all pairs of models with profile hashing to enable efficient clustering of large data sets with a low memory footprint. In addition to ranking and clustering of large sets of models of the same protein or RNA molecule, uQlust can also be used in conjunction with fragment-based profiles in order to cluster structures of arbitrary length. For example, hierarchical clustering of the entire PDB using profile hashing can be performed on a typical laptop, thus opening an avenue for structural explorations previously limited to dedicated resources. The uQlust package is freely available under the GNU General Public License at https://github.com/uQlust . uQlust represents a drastic reduction in the computational complexity and memory requirements with respect to existing clustering and model quality assessment methods for macromolecular structure analysis, while yielding results on par with traditional approaches for both proteins and RNAs.

  11. 76 FR 5686 - Drawbridge Operation Regulation; Pocomoke River, Pocomoke City, MD

    Science.gov (United States)

    2011-02-02

    ... Operation Regulation; Pocomoke River, Pocomoke City, MD AGENCY: Coast Guard, DHS. ACTION: Notice of... River, mile 15.6, at Pocomoke City, MD. The deviation restricts the operation of the draw span to.... The Route 675 Bridge across Pocomoke River, mile 15.6 at Pocomoke City MD, has a vertical clearance in...

  12. 76 FR 48898 - Robert Leigh Kale, M.D., Decision and Order

    Science.gov (United States)

    2011-08-09

    ... DEPARTMENT OF JUSTICE Drug Enforcement Administration Robert Leigh Kale, M.D., Decision and Order... Enforcement Administration, issued an Order to Show Cause to Robert Leigh Kale, M.D. (Registrant), of Fort... Certificate of Registration, BK9514375, issued to Robert Leigh Kale, M.D., be, and it hereby is, revoked. I...

  13. Practical Pseudo-collisions for Hash Functions ARIRANG-224/384

    DEFF Research Database (Denmark)

    Guo, Jian; Matusiewicz, Krystian; Knudsen, Lars Ramkilde

    2009-01-01

    In this paper we analyse the security of the SHA-3 candidate ARIRANG. We show that bitwise complementation of whole registers turns out to be very useful for constructing high-probability differential characteristics in the function. We use this approach to find near-collisions with Hamming weigh...

  14. The IPEM code of practice for determination of the reference air kerma rate for HDR 192Ir brachytherapy sources based on the NPL air kerma standard

    International Nuclear Information System (INIS)

    Bidmead, A M; Sander, T; Nutbrown, R F; Locks, S M; Lee, C D; Aird, E G A; Flynn, A

    2010-01-01

    This paper contains the recommendations of the high dose rate (HDR) brachytherapy working party of the UK Institute of Physics and Engineering in Medicine (IPEM). The recommendations consist of a Code of Practice (COP) for the UK for measuring the reference air kerma rate (RAKR) of HDR 192 Ir brachytherapy sources. In 2004, the National Physical Laboratory (NPL) commissioned a primary standard for the realization of RAKR of HDR 192 Ir brachytherapy sources. This has meant that it is now possible to calibrate ionization chambers directly traceable to an air kerma standard using an 192 Ir source (Sander and Nutbrown 2006 NPL Report DQL-RD 004 (Teddington: NPL) http://publications.npl.co.uk). In order to use the source specification in terms of either RAKR, .K R (ICRU 1985 ICRU Report No 38 (Washington, DC: ICRU); ICRU 1997 ICRU Report No 58 (Bethesda, MD: ICRU)), or air kerma strength, S K (Nath et al 1995 Med. Phys. 22 209-34), it has been necessary to develop algorithms that can calculate the dose at any point around brachytherapy sources within the patient tissues. The AAPM TG-43 protocol (Nath et al 1995 Med. Phys. 22 209-34) and the 2004 update TG-43U1 (Rivard et al 2004 Med. Phys. 31 633-74) have been developed more fully than any other protocol and are widely used in commercial treatment planning systems. Since the TG-43 formalism uses the quantity air kerma strength, whereas this COP uses RAKR, a unit conversion from RAKR to air kerma strength was included in the appendix to this COP. It is recommended that the measured RAKR determined with a calibrated well chamber traceable to the NPL 192 Ir primary standard is used in the treatment planning system. The measurement uncertainty in the source calibration based on the system described in this COP has been reduced considerably compared to other methods based on interpolation techniques.

  15. 76 FR 20032 - Thomas E. Mitchell, M.D.; Dismissal of Proceeding

    Science.gov (United States)

    2011-04-11

    ... DEPARTMENT OF JUSTICE Drug Enforcement Administration [Docket No. 10-7] Thomas E. Mitchell, M.D... Control, Drug Enforcement Administration, issued an Order to Show Cause to Thomas E. Mitchell, M.D....100(b) and 0.104, I hereby order that the Order to Show Cause issued to Thomas E. Mitchell, M.D., be...

  16. 41 CFR 102-192.125 - What is the appropriate managerial level for an agency mail manager?

    Science.gov (United States)

    2010-07-01

    ... managerial level for an agency mail manager? 102-192.125 Section 102-192.125 Public Contracts and Property... ADMINISTRATIVE PROGRAMS 192-MAIL MANAGEMENT Agency Mail Manager Requirements § 102-192.125 What is the appropriate managerial level for an agency mail manager? The agency mail manager should be at a managerial...

  17. Wettability of graphitic-carbon and silicon surfaces: MD modeling and theoretical analysis

    International Nuclear Information System (INIS)

    Ramos-Alvarado, Bladimir; Kumar, Satish; Peterson, G. P.

    2015-01-01

    The wettability of graphitic carbon and silicon surfaces was numerically and theoretically investigated. A multi-response method has been developed for the analysis of conventional molecular dynamics (MD) simulations of droplets wettability. The contact angle and indicators of the quality of the computations are tracked as a function of the data sets analyzed over time. This method of analysis allows accurate calculations of the contact angle obtained from the MD simulations. Analytical models were also developed for the calculation of the work of adhesion using the mean-field theory, accounting for the interfacial entropy changes. A calibration method is proposed to provide better predictions of the respective contact angles under different solid-liquid interaction potentials. Estimations of the binding energy between a water monomer and graphite match those previously reported. In addition, a breakdown in the relationship between the binding energy and the contact angle was observed. The macroscopic contact angles obtained from the MD simulations were found to match those predicted by the mean-field model for graphite under different wettability conditions, as well as the contact angles of Si(100) and Si(111) surfaces. Finally, an assessment of the effect of the Lennard-Jones cutoff radius was conducted to provide guidelines for future comparisons between numerical simulations and analytical models of wettability

  18. 77 FR 7182 - Scott W. Houghton, M.D.; Decision and Order

    Science.gov (United States)

    2012-02-10

    ... DEPARTMENT OF JUSTICE Drug Enforcement Administration [Docket No. 12-09] Scott W. Houghton, M.D... CFR 0.100(b), I order that DEA Certificate of Registration BH8796077, issued to Scott W. Houghton, M.D., be, and it hereby is, revoked. I further order that any pending application of Scott W. Houghton, M.D...

  19. 41 CFR 102-192.140 - What are your general responsibilities as a Federal mail center manager?

    Science.gov (United States)

    2010-07-01

    ... responsibilities as a Federal mail center manager? 102-192.140 Section 102-192.140 Public Contracts and Property... ADMINISTRATIVE PROGRAMS 192-MAIL MANAGEMENT Mail Center Manager Requirements § 102-192.140 What are your general responsibilities as a Federal mail center manager? A Federal mail center manager should— (a) Implement policies and...

  20. Trends in MD/PhD Graduates Entering Psychiatry: Assessing the Physician-Scientist Pipeline.

    Science.gov (United States)

    Arbuckle, Melissa R; Luo, Sean X; Pincus, Harold Alan; Gordon, Joshua A; Chung, Joyce Y; Chavez, Mark; Oquendo, Maria A

    2018-06-01

    The goal of this study was to identify trends in MD/PhD graduates entering psychiatry, to compare these trends with other specialties, and to review strategies for enhancing the physician-scientist pipeline. Data on 226,588 medical students graduating from Liaison Committee on Medical Education accredited programs between 1999 and 2012 (6626 MD/PhDs) were used to evaluate the number, percentage, and proportion of MD/PhDs entering psychiatry in comparison with other specialties (neurology, neurosurgery, internal medicine, family medicine, and radiation oncology). Linear regression and multiple linear regression determined whether these values increased over time and varied by sex. Over 14 years, an average of 18 MD/PhDs (range 13-29) enrolled in psychiatry each year. The number of MD/PhDs going into psychiatry significantly increased, although these gains were modest (less than one additional MD/PhD per year). The proportion of students entering psychiatry who were MD/PhDs varied between 2.9 and 5.9 per 100 residents, with no significant change over time. There was also no change in the percentage of MD/PhDs entering psychiatry from among all MD/PhD graduates. The rate of increase in the number of MD/PhDs going into psychiatry did not differ significantly from other specialties except for family medicine, which is decreasing. The rate of MD/PhDs going into psychiatry was higher for women, suggesting closure of the sex gap in 17 years. Despite the increase in the number of MD/PhDs entering psychiatry, these numbers remain low. Expanding the cohort of physician-scientists dedicated to translational research in psychiatry will require a multipronged approach.

  1. [MD PhD programs: Providing basic science education for ophthalmologists].

    Science.gov (United States)

    Spaniol, K; Geerling, G

    2015-06-01

    Enrollment in MD PhD programs offers the opportunity of a basic science education for medical students and doctors. These programs originated in the USA where structured programs have been offered for many years, but now German universities also run MD PhD programs. The MD PhD programs provided by German universities were investigated regarding entrance requirements, structure and financing modalities. An internet and telephone-based search was carried out. Out of 34 German universities 22 offered MD PhD programs. At 15 of the 22 universities a successfully completed course of studies in medicine was required for enrollment, 7 programs admitted medical students in training and 7 programs required a medical doctoral thesis, which had to be completed with at least a grade of magna cum laude in 3 cases. Financing required scholarships in many cases. Several German universities currently offer MD PhD programs; however, these differ considerably regarding entrance requirements, structure and financing. A detailed analysis investigating the success rates of these programs (e.g. successful completion and career paths of graduates) would be of benefit.

  2. 41 CFR 102-192.40 - Where can we obtain more information about the classes of mail?

    Science.gov (United States)

    2010-07-01

    ... PROGRAMS 192-MAIL MANAGEMENT Introduction to this Part § 102-192.40 Where can we obtain more information... 41 Public Contracts and Property Management 3 2010-07-01 2010-07-01 false Where can we obtain more information about the classes of mail? 102-192.40 Section 102-192.40 Public Contracts and Property Management...

  3. MD1271: Effect of low frequency noise on the evolution of the emittance and halo population

    CERN Document Server

    Fitterer, Miriam; Valishev, Alexander; Bruce, Roderik; Hofle, Wolfgang; Hostettler, Michi; Papadopoulou, Parthena Stefania; Papotti, Giulia; Papaphilippou, Yannis; Pellegrini, Dario; Trad, Georges; Valuch, Daniel; Valentino, Gianluca; Wagner, Joschka; Cai, Xu; CERN. Geneva. ATS Department

    2018-01-01

    For the High Luminosity upgrade the β* in IR1 and IR5 will be further reduced compared to the current LHC. As the β* decreases the β-functions in the inner triplet (IT) increase resulting in a higher sensitivity of the HL-LHC to ground motion in the IT region or to increases of the low frequency noise. Noise can in general lead to emittance growth and higher halo population and diffusion rate. However, it is usually assumed in the literature that only frequencies close to the betatron frequencies and sidebands have an effect on the emittance and tail population. To test this theory, an MD was carried out to observe if also low frequency noise can lead to emittance growth and stronger halo population and diffusion. This MD conducted on 24.08.2016 follows a previous MD on 05.11.2015/06.11.2015

  4. Iridium-192 implants in the treatment of tonsillar region malignancies

    International Nuclear Information System (INIS)

    Puthawala, A.A.; Syed, A.M.; Gates, T.C.

    1985-01-01

    A total of 127 patients with histologically proved diagnosis of carcinoma of the tonsillar region and soft palate were treated over the past ten years utilizing interstitial iridium-192 implants. Eighty patients were treated for primary tumors and 47 patients for either recurrent or persistent tumors after definitive irradiation and/or surgery. All patients with primary tumors were treated by a combination of external megavoltage irradiation and interstitial iridium-192 implants, whereas patients with recurrent tumors were treated by interstitial implants alone. In the primary group, 95% of patients with T1 and T2 lesions and 79% with T3 and T4 lesions achieved complete local tumor control. The three-year absolute disease-free survival rate was 72%. Seventy-five percent local tumor control was obtained in patients with recurrent disease, with two-year absolute disease-free survival of 42%. Treatment-related complications such as soft-tissue necrosis or osteoradionecrosis occurred in 6% of patients in the primary group and 23% in recurrent group. This treatment regimen offers an excellent locoregional control with no significant functional or esthetic impairment. Most patients with primary lesions who fail this regimen can be salvaged by surgery or reirradiation using interstitial implants

  5. A Dynamic Linear Hashing Method for Redundancy Management in Train Ethernet Consist Network

    Directory of Open Access Journals (Sweden)

    Xiaobo Nie

    2016-01-01

    Full Text Available Massive transportation systems like trains are considered critical systems because they use the communication network to control essential subsystems on board. Critical system requires zero recovery time when a failure occurs in a communication network. The newly published IEC62439-3 defines the high-availability seamless redundancy protocol, which fulfills this requirement and ensures no frame loss in the presence of an error. This paper adopts these for train Ethernet consist network. The challenge is management of the circulating frames, capable of dealing with real-time processing requirements, fast switching times, high throughout, and deterministic behavior. The main contribution of this paper is the in-depth analysis it makes of network parameters imposed by the application of the protocols to train control and monitoring system (TCMS and the redundant circulating frames discarding method based on a dynamic linear hashing, using the fastest method in order to resolve all the issues that are dealt with.

  6. Radial dose distribution of 192Ir and 137Cs seed sources

    International Nuclear Information System (INIS)

    Thomason, C.; Higgins, P.

    1989-01-01

    The radial dose distributions in water around /sup 192/ Ir seed sources with both platinum and stainless steel encapsulation have been measured using LiF thermoluminescent dosimeters (TLD) for distances of 1 to 12 cm along the perpendicular bisector of the source to determine the effect of source encapsulation. Similar measurements also have been made around a /sup 137/ Cs seed source of comparable dimensions. The data were fit to a third order polynomial to obtain an empirical equation for the radial dose factor which then can be used in dosimetry. The coefficients of this equation for each of the three sources are given. The radial dose factor of the stainless steel encapsulated /sup 192/ Ir and that of the platinum encapsulated /sup 192/ Ir agree to within 2%. The radial dose distributions measured here for /sup 192/ Ir with either type of encapsulation and for /sup 137/ Cs are indistinguishable from those of other authors when considering uncertainties involved. For clinical dosimetry based on isotropic point or line source models, any of these equations may be used without significantly affecting accuracy

  7. Data Recovery of Distributed Hash Table with Distributed-to-Distributed Data Copy

    Science.gov (United States)

    Doi, Yusuke; Wakayama, Shirou; Ozaki, Satoshi

    To realize huge-scale information services, many Distributed Hash Table (DHT) based systems have been proposed. For example, there are some proposals to manage item-level product traceability information with DHTs. In such an application, each entry of a huge number of item-level IDs need to be available on a DHT. To ensure data availability, the soft-state approach has been employed in previous works. However, this does not scale well against the number of entries on a DHT. As we expect 1010 products in the traceability case, the soft-state approach is unacceptable. In this paper, we propose Distributed-to-Distributed Data Copy (D3C). With D3C, users can reconstruct the data as they detect data loss, or even migrate to another DHT system. We show why it scales well against the number of entries on a DHT. We have confirmed our approach with a prototype. Evaluation shows our approach fits well on a DHT with a low rate of failure and a huge number of data entries.

  8. 41 CFR 102-192.20 - How are “must” and “should” used in this part?

    Science.gov (United States)

    2010-07-01

    ... 192-MAIL MANAGEMENT Introduction to this Part § 102-192.20 How are “must” and “should” used in this... 41 Public Contracts and Property Management 3 2010-07-01 2010-07-01 false How are âmustâ and âshouldâ used in this part? 102-192.20 Section 102-192.20 Public Contracts and Property Management Federal...

  9. An Efficient Hybrid DSMC/MD Algorithm for Accurate Modeling of Micro Gas Flows

    KAUST Repository

    Liang, Tengfei

    2013-01-01

    Aiming at simulating micro gas flows with accurate boundary conditions, an efficient hybrid algorithmis developed by combining themolecular dynamics (MD) method with the direct simulationMonte Carlo (DSMC)method. The efficiency comes from the fact that theMD method is applied only within the gas-wall interaction layer, characterized by the cut-off distance of the gas-solid interaction potential, to resolve accurately the gas-wall interaction process, while the DSMC method is employed in the remaining portion of the flow field to efficiently simulate rarefied gas transport outside the gas-wall interaction layer. A unique feature about the present scheme is that the coupling between the two methods is realized by matching the molecular velocity distribution function at the DSMC/MD interface, hence there is no need for one-toone mapping between a MD gas molecule and a DSMC simulation particle. Further improvement in efficiency is achieved by taking advantage of gas rarefaction inside the gas-wall interaction layer and by employing the "smart-wall model" proposed by Barisik et al. The developed hybrid algorithm is validated on two classical benchmarks namely 1-D Fourier thermal problem and Couette shear flow problem. Both the accuracy and efficiency of the hybrid algorithm are discussed. As an application, the hybrid algorithm is employed to simulate thermal transpiration coefficient in the free-molecule regime for a system with atomically smooth surface. Result is utilized to validate the coefficients calculated from the pure DSMC simulation with Maxwell and Cercignani-Lampis gas-wall interaction models. ©c 2014 Global-Science Press.

  10. Calibration of {sup 192}Ir high dose rate brachytherapy sources

    Energy Technology Data Exchange (ETDEWEB)

    Marechal, M H [Instituto de Radioprotecao e Dozimetria, Rio de Jainero (Brazil); Almeida, C.E. de [Laboratorio de Ciencias Radiologicas, UERL, Rio de Janeiro (Brazil); Sibata, C H [Roswell Park Cancer Inst., Buffalo, NY (United States)

    1996-08-01

    A method for calibration of high dose rate sources used in afterloading brachytherapy systems is described. The calibration for {sup 192}Ir is determined by interpolating {sup 60}Co gamma-rays and 250 kV x-rays calibration factors. All measurements were done using the same build up caps as described by Goetsch et al and recommended by AAPM. The attenuation correction factors were determined to be 0.9903, 0.9928 and 0.9993 for {sup 192}Ir, {sup 60}Co and 250 kV x-ray, respectively. A wall + cap thickness of 0.421 g.cm{sup -2} is recommended for all measurements to ensure electronic equilibrium for {sup 60}Co and {sup 192}Ir gamma-ray beams. A mathematical formalism is described for determination of (N{sub x}){sub Ir}. (author). 5 refs, 1 fig.

  11. 49 CFR 192.373 - Service lines: Cast iron and ductile iron.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 3 2010-10-01 2010-10-01 false Service lines: Cast iron and ductile iron. 192.373... Regulators, and Service Lines § 192.373 Service lines: Cast iron and ductile iron. (a) Cast or ductile iron... cast iron pipe or ductile iron pipe is installed for use as a service line, the part of the service...

  12. 3MdB: the Mexican Million Models database

    Science.gov (United States)

    Morisset, C.; Delgado-Inglada, G.

    2014-10-01

    The 3MdB is an original effort to construct a large multipurpose database of photoionization models. This is a more modern version of a previous attempt based on Cloudy3D and IDL tools. It is accessed by MySQL requests. The models are obtained using the well known and widely used Cloudy photoionization code (Ferland et al, 2013). The database is aimed to host grids of models with different references to identify each project and to facilitate the extraction of the desired data. We present here a description of the way the database is managed and some of the projects that use 3MdB. Anybody can ask for a grid to be run and stored in 3MdB, to increase the visibility of the grid and the potential side applications of it.

  13. Rebound Attack on the Full LANE Compression Function

    DEFF Research Database (Denmark)

    Matusiewicz, Krystian; Naya-Plasencia, Maria; Nikolic, Ivica

    2009-01-01

    In this work, we apply the rebound attack to the AES based SHA-3 candidate Lane. The hash function Lane uses a permutation based compression function, consisting of a linear message expansion and 6 parallel lanes. In the rebound attack on Lane, we apply several new techniques to construct...... a collision for the full compression function of Lane-256 and Lane-512. Using a relatively sparse truncated differential path, we are able to solve for a valid message expansion and colliding lanes independently. Additionally, we are able to apply the inbound phase more than once by exploiting the degrees...

  14. Multi-Device to Multi-Device (MD2MD Content-Centric Networking Based on Multi-RAT Device

    Directory of Open Access Journals (Sweden)

    Cheolhoon Kim

    2017-11-01

    Full Text Available This paper proposes a method whereby a device can transmit and receive information using a beacon, and also describes application scenarios for the proposed method. In a multi-device to multi-device (MD2MD content-centric networking (CCN environment, the main issue involves searching for and connecting to nearby devices. However, if a device can’t find another device that satisfies its requirements, the connection is delayed due to the repetition of processes. It is possible to rapidly connect to a device without repetition through the selection of the optimal device using the proposed method. Consequently, the proposed method and scenarios are advantageous in that they enable efficient content identification and delivery in a content-centric Internet of Things (IoT environment, in which multiple mobile devices coexist.

  15. Apple F-box Protein MdMAX2 Regulates Plant Photomorphogenesis and Stress Response

    Directory of Open Access Journals (Sweden)

    Jian-Ping An

    2016-11-01

    Full Text Available MAX2 (MORE AXILLARY GROWTH2 is involved in diverse physiological processes, including photomorphogenesis, the abiotic stress response, as well as karrikin and strigolactone signaling-mediated shoot branching. In this study, MdMAX2, an F-box protein that is a homolog of Arabidopsis MAX2, was identified and characterized. Overexpression of MdMAX2 in apple calli enhanced the accumulation of anthocyanin. Ectopic expression of MdMAX2 in Arabidopsis exhibited photomorphogenesis phenotypes, including increased anthocyanin content and decreased hypocotyl length. Further study indicated that MdMAX2 might promote plant photomorphogenesis by affecting the auxin signaling as well as other plant hormones. Transcripts of MdMAX2 were noticeably up-regulated in response to NaCl and Mannitol treatments. Moreover, compared with the wild type, the MdMAX2-overexpressing apple calli and Arabidopsis exhibited increased tolerance to salt and drought stresses. Taken together, these results suggest that MdMAX2 plays a positive regulatory role in plant photomorphogenesis and stress response.

  16. RANCANG BANGUN APLIKASI ANTIVIRUS KOMPUTER DENGAN MENGGUNAKAN METODE SECURE HASH ALGORITHM 1 (SHA1 DAN HEURISTIC STRING

    Directory of Open Access Journals (Sweden)

    I Gusti Made Panji Indrawinatha

    2016-12-01

    Full Text Available Virus komputer merupakan perangkat lunak berbahaya yang dapat merusak data dan menggandakan diri pada sistem komputer. Untuk mendeteksi dan membersihkan virus dari sistem komputer, maka dibuatlah aplikasi antivirus. Dalam mendeteksi berbagai jenis virus sebuah aplikasi antivirus biasanya menggunakan beberapa metode. Pada penelitian ini akan membahas perancangan sebuah aplikasi antivirus menggunakan metode Secure Hash Algorithm 1 (SHA1 dan heuristic string sebagai metode pendeteksian virus. Dari pengujian yang dilakukan diperoleh hasil dimana saat tidak menggunakan heuristic, antivirus hanya mendeteksi 12 file dari 34 file sample virus atau memiliki tingkat akurasi pendeteksian sebesar 35%. sedangkan saat menggunakan heuristic, antivirus berhasil mendeteksi 31 file dari 34 file sample virus atau memiliki tingkat akurasi pendeteksian sebesar 91%.

  17. Waiting time distribution in M/D/1 queueing systems

    DEFF Research Database (Denmark)

    Iversen, Villy Bæk; Staalhagen, Lars

    1999-01-01

    The well-known formula for the waiting time distribution of M/D/1 queueing systems is numerically unsuitable when the load is close to 1.0 and/or the results for a large waiting time are required. An algorithm for any load and waiting time is presented, based on the state probabilities of M/D/1...

  18. Proteomics and SSH analyses of ALA-promoted fruit coloration and evidence for the involvement of a MADS-box gene, MdMADS1

    Directory of Open Access Journals (Sweden)

    Xinxin Feng

    2016-11-01

    Full Text Available Skin color is a key quality attribute of fruits and how to improve fruit coloration has long been a major concern. 5-Aminolevulinic acid (ALA, a natural plant growth regulator, can significantly increase anthocyanin accumulation in fruit skin and therefore effectively improve coloration of many fruits, including apple. However, the molecular mechanism how ALA stimulates anthocyanin accumulation in fruit skin remains unknown. Here, we investigated the impact of ALA on apple skin at the protein and mRNA levels. A total of 85 differentially expressed proteins in apple skins between ALA and water treatment (control were identified by complementary gel-based and gel-freeseparation techniques. Most of these differentially expressed proteins were up-regulated by ALA. Function analysis suggested that 87.06% of the ALA-responsive proteins were associated with fruit ripening. To further screen ALA-responsive regulators, we constructed a subtracted cDNA library (tester: ALA treatment; driver: control and obtained 104 differentially expressed unigenes, of which 38 unigenes were indicators for the fruit ripening-related gene. The differentially changed proteins and transcripts did not correspond well at an individual level, but showed similar regulated direction in function at the pathway level. Among the identified fruit ripening-related genes, the expression of MdMADS1, a developmental transcription regulator of fruit ripening, was positively correlated with expression of anthocyanin biosynthetic genes (MdCHS, MdDFR, MdLDOX and MdUFGT in apple skin under ALA treatment. Moreover, overexpression of MdMADS1 enhanced anthocyanin content in transformed apple calli, which was further enhanced by ALA. The anthocyanin content in MdMADS1-silenced calli was less than that in the control with ALA treatment, but higher than that without ALA treatment. These results indicated that MdMADS1 is involved in ALA-induced anthocyanin accumulation. In addition, anthocyanin

  19. Low dose rate Ir-192 interstitial brachytherapy for prostate cancer

    Energy Technology Data Exchange (ETDEWEB)

    Oki, Yosuke; Dokiya, Takushi; Yorozu, Atsunori; Suzuki, Takayuki; Saito, Shiro; Monma, Tetsuo; Ohki, Takahiro [National Tokyo Medical Center (Japan); Murai, Masaru; Kubo, Atsushi

    2000-04-01

    From December 1997 through January 1999, fifteen prostatic cancer patients were treated with low dose rate Ir-192 interstitial brachytherapy using TRUS and perineal template guidance without external radiotherapy. Up to now, as no apparent side effects were found, the safety of this treatment is suggested. In the future, in order to treat prostatic cancer patients with interstitial brachytherapy using I-125 or Pd-103, more investigation for this low dose rate Ir-192 interstitial brachytherapy is needed. (author)

  20. 75 FR 49992 - Peter W.S. Grigg, M.D.; Revocation of Registration

    Science.gov (United States)

    2010-08-16

    ... DEPARTMENT OF JUSTICE Drug Enforcement Administration Peter W.S. Grigg, M.D.; Revocation of... Order to Show Cause and Immediate Suspension of Registration to Peter W.S. Grigg, M.D. (Respondent), of... Registration, BG2107856, issued to Peter W.S. Grigg, M.D., be, and it hereby is, revoked. This Order is...

  1. A chimeric fusion of the hASH1 and EZH2 promoters mediates high and specific reporter and suicide gene expression and cytotoxicity in small cell lung cancer cells

    DEFF Research Database (Denmark)

    Poulsen, T.T.; Pedersen, N.; Juel, H.

    2008-01-01

    Transcriptionally targeted gene therapy is a promising experimental modality for treatment of systemic malignancies such as small cell lung cancer (SCLC). We have identified the human achaete-scute homolog 1 (hASH1) and enhancer of zeste homolog 2 (EZH2) genes as highly upregulated in SCLC compar...

  2. 49 CFR 192.65 - Transportation of pipe.

    Science.gov (United States)

    2010-10-01

    ... Transportation Other Regulations Relating to Transportation (Continued) PIPELINE AND HAZARDOUS MATERIALS SAFETY ADMINISTRATION, DEPARTMENT OF TRANSPORTATION (CONTINUED) PIPELINE SAFETY TRANSPORTATION OF NATURAL AND OTHER GAS BY PIPELINE: MINIMUM FEDERAL SAFETY STANDARDS Materials § 192.65 Transportation of pipe. (a) Railroad...

  3. 49 CFR 192.63 - Marking of materials.

    Science.gov (United States)

    2010-10-01

    ... Transportation Other Regulations Relating to Transportation (Continued) PIPELINE AND HAZARDOUS MATERIALS SAFETY ADMINISTRATION, DEPARTMENT OF TRANSPORTATION (CONTINUED) PIPELINE SAFETY TRANSPORTATION OF NATURAL AND OTHER GAS BY PIPELINE: MINIMUM FEDERAL SAFETY STANDARDS Materials § 192.63 Marking of materials. (a) Except as...

  4. 34 CFR 222.192 - What local funds may be considered as available for this project?

    Science.gov (United States)

    2010-07-01

    ... § 222.192 What local funds may be considered as available for this project? To determine the amount of... 34 Education 1 2010-07-01 2010-07-01 false What local funds may be considered as available for this project? 222.192 Section 222.192 Education Regulations of the Offices of the Department of...

  5. A hybrid cloud read aligner based on MinHash and kmer voting that preserves privacy

    Science.gov (United States)

    Popic, Victoria; Batzoglou, Serafim

    2017-05-01

    Low-cost clouds can alleviate the compute and storage burden of the genome sequencing data explosion. However, moving personal genome data analysis to the cloud can raise serious privacy concerns. Here, we devise a method named Balaur, a privacy preserving read mapper for hybrid clouds based on locality sensitive hashing and kmer voting. Balaur can securely outsource a substantial fraction of the computation to the public cloud, while being highly competitive in accuracy and speed with non-private state-of-the-art read aligners on short read data. We also show that the method is significantly faster than the state of the art in long read mapping. Therefore, Balaur can enable institutions handling massive genomic data sets to shift part of their analysis to the cloud without sacrificing accuracy or exposing sensitive information to an untrusted third party.

  6. Radiation control in the intensive care unit for high intensity iridium-192 brain implants

    International Nuclear Information System (INIS)

    Sewchand, W.; Drzymala, R.E.; Amin, P.P.; Salcman, M.; Salazar, O.M.

    1987-01-01

    A bedside lead cubicle was designed to minimize the radiation exposure of intensive care unit staff during routine interstitial brain irradiation by removable, high intensity iridium-192. The cubicle shields the patient without restricting intensive care routines. The design specifications were confirmed by exposure measurements around the shield with an implanted anthropomorphic phantom simulating the patient situation. The cubicle reduces the exposure rate around an implant patient by as much as 90%, with the exposure level not exceeding 0.1 mR/hour/mg of radium-equivalent 192 Ir. Evaluation of data accumulated for the past 3 years has shown that the exposure levels of individual attending nurses are 0.12 to 0.36 mR/mg of radium-equivalent 192 Ir per 12-hour shift. The corresponding range for entire nursing teams varies between 0.18 and 0.26. A radiation control index (exposure per mg of radium-equivalent 192 Ir per nurse-hour) is thus defined for individual nurses and nursing teams; this index is a significant guide to the planning of nurse rotations for brain implant patients with various 192 Ir loads. The bedside shield reduces exposure from 192 Ir implants by a factor of about 20, as expected, and the exposure from the lower energy radioisotope iodine-125 is barely detectable

  7. Developing the MD Explorer

    Science.gov (United States)

    Howie, Philip V.

    1993-04-01

    The MD Explorer is an eight-seat twin-turbine engine helicopter which is being developed using integrated product definition (IPD) team methodology. New techniques include NOTAR antitorque system for directional control, a composite fuselage, an all-composite bearingless main rotor, and digital cockpit displays. Three-dimensional CAD models are the basis of the entire Explorer design. Solid models provide vendor with design clarification, removing much of the normal drawing interpretation errors.

  8. MD Anderson's Population Health Approaches to Cancer Prevention.

    Science.gov (United States)

    Foxhall, Lewis; Moreno, Mark; Hawk, Ernest

    2018-02-01

    Texas's size and unique population demographics present challenges to addressing the state's cancer burden. The University of Texas MD Anderson Cancer Center is one of 69 National Cancer Institute-designated cancer centers across the United States. While these centers traditionally have focused on research, education and training, and providing research-driven patient care, they are in a unique position to collaboratively advance population health through cancer control. Unlike the traditional academic model of a three-legged stool representing research, education, and patient care, MD Anderson's mission includes a fourth leg that incorporates population health approaches. MD Anderson has leveraged state- and national-level data and freely available resources to develop population-health priorities and a set of evidence-based actions across policy, public and professional education, and community-based clinical service domains to address these priorities. Population health approaches complement dissemination and implementation research and treatment, and will be increasingly needed to address the growing cancer burden in Texas and the nation.

  9. Paraoxonase 1 Q192R (PON1-192) polymorphism is associated with reduced lipid peroxidation in healthy young men on a low-carotenoid diet supplemented with tomato juice.

    Science.gov (United States)

    Bub, Achim; Barth, Stephan W; Watzl, Bernhard; Briviba, Karlis; Rechkemmer, Gerhard

    2005-03-01

    The HDL-bound enzyme paraoxonase (PON) protects LDL from oxidation and may therefore attenuate the development of atherosclerosis. We examined the effect of tomato and carrot juice consumption on PON1 activity and lipid peroxidation in healthy young volunteers with different PON1-192 genotypes (Q/R substitution at position 192). In this randomized cross-over study twenty-two healthy, non-smoking men on a low-carotenoid diet received 330 ml/d tomato juice (37.0 mg lycopene, 1.6 mg beta-carotene) or carrot juice (27.1 mg beta-carotene, 13.1 mg alpha-carotene) for 2 weeks. Intervention periods were preceded by 2-week low-carotenoid intake. We determined the PON1-192 genotype by restriction fragment length polymorphism-polymerase chain reaction (RFLP-PCR) and measured ex vivo LDL oxidation (lag time), plasma malondialdehyde and PON1 activity at the beginning and end of each intervention period. At baseline, lag time was higher (Pjuice consumption had significant effects on PON1 activity. However, tomato juice consumption reduced (Pjuice had no significant effect on malondialdehyde irrespective of the PON1-192 genotype. Male volunteers with the QR/RR genotype showed an increased lipid peroxidation at baseline. Although tomato and carrot juice fail to affect PON1 activity, tomato juice intake reduced lipid peroxidation in healthy volunteers carrying the R-allele of the PON1-192 genotype and could thus contribute to CVD risk reduction in these individuals.

  10. On the k-independence required by linear probing and minwise independence

    DEFF Research Database (Denmark)

    Pǎtraşcu, Mihai; Thorup, Mikkel

    2016-01-01

    We show that linear probing requires 5-independent hash functions for expected constant-time performance, matching an upper bound of Pagh et al. [2009]. More precisely, we construct a random 4-independent hash function yielding expected logarithmic search time for certain keys. For (1 + ε......)-approximate minwise independence, we show that Ω(lg1 ε)-independent hash functions are required, matching an upper bound of Indyk [2001]. We also show that the very fast 2-independent multiply-shift scheme of Dietzfelbinger [1996] fails badly in both applications....

  11. 76 FR 17673 - Bienvenido Tan, M.D.; Denial of Application

    Science.gov (United States)

    2011-03-30

    ... (alprazolam) to help him sleep. Id. at 64. R.E. opted to buy the drugs from Respondent's dispensary and... DEPARTMENT OF JUSTICE Drug Enforcement Administration [Docket No. 09-12] Bienvenido Tan, M.D... Control, Drug Enforcement Administration, issued an Order to Show Cause to Bienvenido Tan, M.D...

  12. Evaluation of hydroacid complex in the forward osmosis–membrane distillation (FO–MD) system for desalination

    KAUST Repository

    Wang, Peng; Cui, Yue; Ge, Qingchun; Fern Tew, Tjin; Chung, Neal Tai-Shung

    2015-01-01

    The incorporation of membrane distillation (MD) into forward osmosis (FO) provides process sustainability to regenerate the draw solution and to produce clean water simultaneously. However, the reverse salt flux is the major hurdle in the FO-MD system because it not only reduces the effective osmotic driving force across the membrane but also increases the replenishment cost and scaling issue. For the first time, a hydroacid complex with abundant hydrophilic groups and ionic species is evaluated as the draw solutes in the hybrid FO-MD system consisting of multi-bore PVDF MD membranes for seawater/brackish desalination. In order to evaluate the practicality of the hydroacid complex in the FO-MD system, FO and MD experiments were conducted at elevated temperatures and concentrations. The hydroacid complex has displayed desired properties such as high solubility, low viscosity, excellent thermal stability and minimal reverse salt flux suitable for FO and MD operations. FO-MD desalination process was demonstrated with a highest seawater desalination flux of 6/32 LMH (FO/MD). This study may open up the prospective of employing the hydroacid complex as the draw solute in FO-MD hybrid systems for seawater /brackish desalination. © 2015 Elsevier B.V.

  13. Evaluation of hydroacid complex in the forward osmosis–membrane distillation (FO–MD) system for desalination

    KAUST Repository

    Wang, Peng

    2015-11-01

    The incorporation of membrane distillation (MD) into forward osmosis (FO) provides process sustainability to regenerate the draw solution and to produce clean water simultaneously. However, the reverse salt flux is the major hurdle in the FO-MD system because it not only reduces the effective osmotic driving force across the membrane but also increases the replenishment cost and scaling issue. For the first time, a hydroacid complex with abundant hydrophilic groups and ionic species is evaluated as the draw solutes in the hybrid FO-MD system consisting of multi-bore PVDF MD membranes for seawater/brackish desalination. In order to evaluate the practicality of the hydroacid complex in the FO-MD system, FO and MD experiments were conducted at elevated temperatures and concentrations. The hydroacid complex has displayed desired properties such as high solubility, low viscosity, excellent thermal stability and minimal reverse salt flux suitable for FO and MD operations. FO-MD desalination process was demonstrated with a highest seawater desalination flux of 6/32 LMH (FO/MD). This study may open up the prospective of employing the hydroacid complex as the draw solute in FO-MD hybrid systems for seawater /brackish desalination. © 2015 Elsevier B.V.

  14. 77 FR 5201 - Drawbridge Operation Regulation; Bear Creek, Dundalk, MD

    Science.gov (United States)

    2012-02-02

    ...-AA09 Drawbridge Operation Regulation; Bear Creek, Dundalk, MD AGENCY: Coast Guard, DHS. ACTION: Notice... operation of the Baltimore County highway bridge at Wise Avenue across Bear Creek, mile 3.4, between Dundalk... Avenue across Bear Creek, mile 3.4 between Dundalk and Sparrows Point, MD. This change would require the...

  15. Descriptive study of 192 adults with speech and language disturbances

    Directory of Open Access Journals (Sweden)

    Letícia Lessa Mansur

    Full Text Available CONTEXT: Aphasia is a very disabling condition caused by neurological diseases. In Brazil, we have little data on the profile of aphasics treated in rehabilitation centers. OBJECTIVE: To present a descriptive study of 192 patients, providing a reference sample of speech and language disturbances among Brazilians. DESIGN: Retrospective study. SETTING: Speech Pathology Unit linked to the Neurology Division of the Hospital das Clínicas of the Faculdade de Medicina da Universidade de São Paulo. SAMPLE: All patients (192 referred to our Speech Pathology service from 1995 to 2000. PROCEDURES: We collected data relating to demographic variables, etiology, language evaluation (functional evaluation, Boston Diagnostic Aphasia Examination, Boston Naming and Token Test, and neuroimaging studies. MAIN MEASUREMENTS: The results obtained in language tests and the clinical and neuroimaging data were organized and classified. Seventy aphasics were chosen for constructing a profile. Fourteen subjects with left single-lobe dysfunction were analyzed in detail. Seventeen aphasics were compared with 17 normal subjects, all performing the Token Test. RESULTS: One hundred subjects (52% were men and 92 (48% women. Their education varied from 0 to 16 years (average: 6.5; standard deviation: 4.53. We identified the lesion sites in 104 patients: 89% in the left hemisphere and 58% due to stroke. The incidence of aphasia was 70%; dysarthria and apraxia, 6%; functional alterations in communication, 17%; and 7% were normal. Statistically significant differences appeared when comparing the subgroup to controls in the Token Test. CONCLUSIONS: We believe that this sample contributes to a better understanding of neurological patients with speech and language disturbances and may be useful as a reference for health professionals involved in the rehabilitation of such disorders.

  16. Analysis of MD5 authentication in various routing protocols using simulation tools

    Science.gov (United States)

    Dinakaran, M.; Darshan, K. N.; Patel, Harsh

    2017-11-01

    Authentication being an important paradigm of security and Computer Networks require secure paths to make the flow of the data even more secure through some security protocols. So MD-5(Message Digest 5) helps in providing data integrity to the data being sent through it and authentication to the network devices. This paper gives a brief introduction to the MD-5, simulation of the networks by including MD-5 authentication using various routing protocols like OSPF, EIGRP and RIPv2. GNS3 is being used to simulate the scenarios. Analysis of the MD-5 authentication is done in the later sections of the paper.

  17. 49 CFR 192.197 - Control of the pressure of gas delivered from high-pressure distribution systems.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 3 2010-10-01 2010-10-01 false Control of the pressure of gas delivered from high-pressure distribution systems. 192.197 Section 192.197 Transportation Other Regulations Relating to... STANDARDS Design of Pipeline Components § 192.197 Control of the pressure of gas delivered from high...

  18. 192Ir Intraluminal brachytherapy for the prevention of urethral re-stricture

    International Nuclear Information System (INIS)

    Ma Changuo; Guo Hui; Du Chun; Yang Keqiang

    2008-01-01

    Objective: To evaluate the safety and efficacy of 192 Ir intraluminal brachytherapy for the prevention of urethral restricture after transurethral incision or transurethral resection of scar. Methods: From Mar. 2004 to Jun. 2006, 48 patients aging 18-81 years were treated by 192 Ir intraluminal brachytherapy. The length of stricture(0.5-5.5 cm) was ≤3.0 cm in 90% of the patients. The stricture was caused by trauma in 23 patients and prostate hyperplasia operation in 19 patients. The cause of remaining 6 patients was unclear. All patients were diagnosed by urethra photograph or endoscopy. Radiotherapy was the initial treatment in 26 patients and the second time treatment in 22. The irradiation dose was from 14 Gy to 18 Gy. Results: The median follow up was 10 months, and the total response rate was 98%. Only one patient recurred and received transurethral incision again. The uresis was fluency in 47 patients and the maximum flow rate was 13.9-36.4 (19.2 ± 10.3) ml/s. No secondary urethral bleeding or urethral cancer was observed. Conclusions: Being a safe and feasible treatment, 192 Ir intraluminal brachytherapy following transurethral incision or transurethral resection of scar can effectively prevent urethral re-stricture. (authors)

  19. Osmotically and thermally isolated forward osmosis-membrane distillation (fo-md) integrated module for water treatment applications

    KAUST Repository

    Ghaffour, Noreddine

    2016-09-01

    An integrated forward osmosis-membrane distillation (FO-MD) module and systems and methods incorporating the module is disclosed providing higher efficiencies and using less energy. The FO-MD module is osmotically and thermally isolated. The isolation can prevent mixing of FO draw solution/FO permeate and MD feed, and minimize dilution of FO draw solution and cooling of MD feed. The module provides MD feed solution and FO draw solution streams that flow in the same module but are separated by an isolation barrier. The osmotically and thermally isolated FO-MD integrated module, systems and methods offer higher driving forces of both FO and MD processes, higher recovery, and wider application than previously proposed hybrid FO- MD systems.

  20. Osmotically and thermally isolated forward osmosis-membrane distillation (fo-md) integrated module for water treatment applications

    KAUST Repository

    Ghaffour, NorEddine; Francis, Lijo; Li, Zhenyu; Valladares, Rodrigo; Alsaadi, Ahmad S.; Ghdaib, Muhannad Abu; Amy, Gary L.

    2016-01-01

    An integrated forward osmosis-membrane distillation (FO-MD) module and systems and methods incorporating the module is disclosed providing higher efficiencies and using less energy. The FO-MD module is osmotically and thermally isolated. The isolation can prevent mixing of FO draw solution/FO permeate and MD feed, and minimize dilution of FO draw solution and cooling of MD feed. The module provides MD feed solution and FO draw solution streams that flow in the same module but are separated by an isolation barrier. The osmotically and thermally isolated FO-MD integrated module, systems and methods offer higher driving forces of both FO and MD processes, higher recovery, and wider application than previously proposed hybrid FO- MD systems.

  1. 33 CFR 110.70a - Northeast River, North East, Md.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Northeast River, North East, Md. 110.70a Section 110.70a Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY ANCHORAGES ANCHORAGE REGULATIONS Special Anchorage Areas § 110.70a Northeast River, North East, Md. The water...

  2. Production of iridium-192 radiation sources: Indian Experience

    International Nuclear Information System (INIS)

    Sastry, K.V.S.; Kolhe, O.T.; Nagarja, P.S.; Paramr, Y.D.

    2002-01-01

    Board of Radiation and Isotope Technology (BRIT), a unit under the Department of Atomic Energy is fabricating and supplying Ir-192 industrial radiography sources for various models of radiography cameras for use in the industry for non-destructive testing. Basically these sources are fabricated by encapsulating the required quantity of the activity in stainless steel 316 L capsules using Tungsten Inert gas welding process and crimping/attaching to the respective pigtail assemblies of the radiography cameras. The inactive iridium pellets are irradiated in the DHRUVA reactor at a flux on 1.8 X 10 14 n/cm 2 /sec. The performance classification of these source encapsulation for various conditions of normal and accidental nature are tested by subjecting the prototype sources as per the standard laid down by the regulatory authority, Atomic Energy Regulatory Board, in India. The sources are fabricated as per the national and international standards. Activity of the sources varies from 37O GBq (10 Ci ) to 2.96 TBq (80 Ci ) source strength depending on the requirement of the user. The specific activity of the Ir-192 sources supplied is around 7.4 TBq/gm (200 Ci/gm ). Quality control /Assurance for the manufacture of the source begins from the procurement of the raw material and ends with the finished source. Ir- 192 in the form of -0.3 mm diameter (0.1 mm dia wire of Ir-25 % and Pt-75% sheathed in pure platinum of 0.1 mm thick) is being supplied for use in the treatment of cancer of cervix, tongue etc. by brachytherapy. This is supplied in lengths of 50 cm / 100 cm with 37 - 185 GBq/cm ( 1-5 mCi/cm) activity. Annually 925 TBq (25 kCi) of Ir-192 for industrial radiography and about 60 meters of wire for brachytherapy are being fabricated and supplied. Because of the quality of these sources BRIT not only caters to the Indian industry but also is able to export sources to the third world countries. (Author)

  3. Pengaruh Brand Ambassador Terhadap Minat Beli Konsumen MD Clinic By Lazeta

    Directory of Open Access Journals (Sweden)

    Nurvita Septya Ningrum

    2016-10-01

    Full Text Available This research at MD Clinic by Lazeta which is in the beauty services that offer health care and facial, under of PT. Medina Global Care. MD Cilinic by Lazeta use the brand ambassador of introducing their products. The selection of brand ambassador motivated by positive image brought by the celebrities. Brand ambassadors chosen by the company as a symbol or a marker to represent the wishes and needs of prospective customers. MD Clinic by Lazeta choose Syahnaz as a brand ambassador for their products which is expected to to represent the product of MD Clinic by Lazeta, so the message can be understood by the consumer, who eventually would to lead the purchase intention. The purpose of this research was to investigate the influence of brand ambassadors on consumer purchase intention MD Clinic by Lazeta, Study on Business Administration Students year in 2103 Telkom University. Researchers used quantitative research methods. This research is population research, because all population is being respondent in this research. Populations of this research are 137 respondents. Collecting data in this research is conducted by using questionnaire distributed to all respondents, which all Students on Business Administration Telkom University who knows the MD Clinic by Lazeta. Data were analyzed using simple regression analysis and descriptive analysis.The results showed that the Brand Ambassador impact of consumer purchase intention on MD Clinic by Lazeta at the Students on Business Administration Telkom University years in 2013. Based on the calculation of the coefficient of determination (R2 can be seen the influence of brand ambassador variable (X on purchase intention (Y is 42.9%. While the remaining 57.1% is influenced by other factors which not examined in this research such as, pricing, marketing strategy and others.

  4. 22 CFR 192.32 - Administration of benefits.

    Science.gov (United States)

    2010-04-01

    ....32 Foreign Relations DEPARTMENT OF STATE HOSTAGE RELIEF VICTIMS OF TERRORISM COMPENSATION Medical... behalf thereof, shall submit an application to the Office of Medical Services, Department of State..., on behalf of the Secretary of State, whether the care in question is authorized under § 192.31 of...

  5. 49 CFR 192.229 - Limitations on welders.

    Science.gov (United States)

    2010-10-01

    ... BY PIPELINE: MINIMUM FEDERAL SAFETY STANDARDS Welding of Steel in Pipelines § 192.229 Limitations on welders. (a) No welder whose qualification is based on nondestructive testing may weld compressor station pipe and components. (b) No welder may weld with a particular welding process unless, within the...

  6. 77 FR 29692 - Segun M. Rasaki, M.D.; Decision and Order

    Science.gov (United States)

    2012-05-18

    ... CFR 1316.67. Dated: May 4, 2012. Michele M. Leonhart, Administrator. Paul E. Soeffing, Esq., for the... reinstatement.'' Stuart A. Bergman, M.D., 70 Fed. Reg. 33,193 (DEA 2005); Roger A. Rodriguez, M.D., 70 Fed. Reg...

  7. 77 FR 35021 - Kwan Bo Jin, M.D.; Decision and Order

    Science.gov (United States)

    2012-06-12

    ...] DEA registration is not appropriate.'' Anibal P. Herrera, M.D., 61 FR 65,075, 65,078 (DEA 1996); see... ``there were serious questions as to the integrity of the registrant.'' Anibal P. Herrera, M.D., 61 FR 65...

  8. A pilot study of MD (psychiatry) theses-based research.

    Science.gov (United States)

    Srivastava, Shrikant; Agarwal, Vivek; Subramanyam, Alka; Srivastava, Mona; Sathyanarayana Rao, T S; Rao, G Prasad; Khurana, Hitesh; Singh, Archana

    2018-01-01

    Undertaking a research project is mandatory for MD Psychiatry trainees. The present study was undertaken to assess the type of research activity being undertaken as part of MD Psychiatry dissertation, and its contribution to national and international literature. Three medical colleges supplied the data about the topic, names of the supervisor and the candidate, collaboration, funding accrued, and publication details of MD-based research carried out between years 2000 and 2010 inclusive; 95 records were collected for the final analysis. The details of the publications provided were cross-checked on the internet, which would have taken care of missed publications as well. Most studies were single-point assessment clinical studies. Only 2 studies had been funded, 11 had collaboration with other departments within the same institute, and 5 had inter-institute collaborations. Majority of the studies were not published. Only 30 were published as full paper and 9 as abstracts. Of these 30 full publications, only 3 were published in journals having JCI impact factor values (1.4, 1.3, and 1.4, respectively). The main finding of this pilot study was that MD-based research has low contribution to the national and international literature, and those articles which are published are in low impact journals. Suggestions for modifying this state of affairs are discussed.

  9. MD 2485: Active halo control using narrowband and colored noise excitations

    CERN Document Server

    Garcia Morales, Hector; Kotzian, Gerd; Maclean, Ewen Hamish; Redaelli, Stefano; Valuch, Daniel; Wagner, Joschka; CERN. Geneva. ATS Department

    2018-01-01

    This MD note summarizes the actions carried out during the MD 2485 on Active halo control using narrowband and colored noise excitations. The goal of the MD was to repeat some promising cases already tested in the past and introduce a new excitation type based on applying a colored noise. Although we were able to repeat some cases using a narrowband excitation, due to a problem with the waveform generator, the colored noise excitation could not be accomplished as expected. In any case, we provide some results that may be useful for future MDs.

  10. Dynamics of biopolymers on nanomaterials studied by quasielastic neutron scattering and MD simulations

    Science.gov (United States)

    Dhindsa, Gurpreet K.

    Neutron scattering has been proved to be a powerful tool to study the dynamics of biological systems under various conditions. This thesis intends to utilize neutron scattering techniques, combining with MD simulations, to develop fundamental understanding of several biologically interesting systems. Our systems include a drug delivery system containing Nanodiamonds with nucleic acid (RNA), and two specific model proteins, beta-Casein and Inorganic Pyrophosphatase (IPPase). RNA and nanodiamond (ND) both are suitable for drug-delivery applications in nano-biotechnology. The architecturally flexible RNA with catalytic functionality forms nanocomposites that can treat life-threatening diseases. The non-toxic ND has excellent mechanical and optical properties and functionalizable high surface area, and thus actively considered for biomedical applications. In this thesis, we utilized two tools, quasielastic neutron scattering (QENS) and Molecular Dynamics Simulations to probe the effect of ND on RNA dynamics. Our work provides fundamental understanding of how hydrated RNA motions are affected in the RNA-ND nanocomposites. From the experimental and Molecular Dynamics Simulation (MD), we found that hydrated RNA motion is faster on ND surface than a freestanding one. MD Simulation results showed that the failure of Stokes Einstein relation results the presence of dynamic heterogeneities in the biomacromolecules. Radial pair distribution function from MD Simulation confirmed that the hydrophilic nature of ND attracts more water than RNA results the de-confinement of RNA on ND. Therefore, RNA exhibits faster motion in the presence of ND than freestanding RNA. In the second project, we studied the dynamics of a natively disordered protein beta-Casein which lacks secondary structures. In this study, the temperature and hydration effects on the dynamics of beta-Casein are explored by Quasielastic Neutron Scattering (QENS). We investigated the mean square displacement (MSD) of

  11. Rhodotorula taiwanensis MD1149 produces hypoacetylated PEFA compounds with increased surface activity compared to Rhodotorula babjevae MD1169

    Science.gov (United States)

    Rubinfeld, Bonnee; Leif, Roald; Mulcahy, Heather; Dugan, Lawrence; Souza, Brian

    2018-01-01

    Biosurfactants have several desirable characteristics in the industrial sector: detergency, antimicrobial effects, skin hydration, and emulsibility. Several yeast glycolipids are currently being utilized in these capacities: sophorolipids, ustilagic acid, and mannosylerythritol lipids (MELs). An emerging class of glycolipids, termed polyol esters of fatty acids (PEFA), have recently been reported for Rhodotorula babjevae, a basidiomycetous yeast species that secretes hyperacetylated congeners of PEFA (typically with 3–6 acetylation modifications). While screening Rhodotorula species for surfactant production, we identified a new environmental isolate identified as Rhodotorula taiwanensis MD1149 that dropped the surface tension of the liquid medium, indicating that it produced a potent biosurfactant. Acid depolymerization of the purified biosurfactants, followed by gas chromatography-mass spectrometry (GC-MS) analysis revealed that the biosurfactants were composed of PEFA compounds composed mainly of mannitol and arabitol esters of 3-hydroxy fatty acid, 3-methoxy fatty acid, and fatty acids with a single double bond; chain lengths were mainly C16 and C18. Liquid chromatography-mass spectrometry (LC-MS) confirmed the predicted accurate mass of these compounds. Interestingly, PEFA compounds produced by Rhodotorula taiwanensis MD1149 were more surface active due to their hypoacetylation profile (0–4 acetylation modifications) compared to Rhodotorula babjevae MD1169. These disparate surface active properties, based on acetylation, change the hydrophilic-lipophilic balance (HLB) of these compounds, and their potential utility within industrial applications. PMID:29293588

  12. Rhodotorula taiwanensis MD1149 produces hypoacetylated PEFA compounds with increased surface activity compared to Rhodotorula babjevae MD1169.

    Science.gov (United States)

    Lyman, Mathew; Rubinfeld, Bonnee; Leif, Roald; Mulcahy, Heather; Dugan, Lawrence; Souza, Brian

    2018-01-01

    Biosurfactants have several desirable characteristics in the industrial sector: detergency, antimicrobial effects, skin hydration, and emulsibility. Several yeast glycolipids are currently being utilized in these capacities: sophorolipids, ustilagic acid, and mannosylerythritol lipids (MELs). An emerging class of glycolipids, termed polyol esters of fatty acids (PEFA), have recently been reported for Rhodotorula babjevae, a basidiomycetous yeast species that secretes hyperacetylated congeners of PEFA (typically with 3-6 acetylation modifications). While screening Rhodotorula species for surfactant production, we identified a new environmental isolate identified as Rhodotorula taiwanensis MD1149 that dropped the surface tension of the liquid medium, indicating that it produced a potent biosurfactant. Acid depolymerization of the purified biosurfactants, followed by gas chromatography-mass spectrometry (GC-MS) analysis revealed that the biosurfactants were composed of PEFA compounds composed mainly of mannitol and arabitol esters of 3-hydroxy fatty acid, 3-methoxy fatty acid, and fatty acids with a single double bond; chain lengths were mainly C16 and C18. Liquid chromatography-mass spectrometry (LC-MS) confirmed the predicted accurate mass of these compounds. Interestingly, PEFA compounds produced by Rhodotorula taiwanensis MD1149 were more surface active due to their hypoacetylation profile (0-4 acetylation modifications) compared to Rhodotorula babjevae MD1169. These disparate surface active properties, based on acetylation, change the hydrophilic-lipophilic balance (HLB) of these compounds, and their potential utility within industrial applications.

  13. Improved security analysis of Fugue-256

    DEFF Research Database (Denmark)

    Gauravaram, Praveen; Bagheri, Nasour; Knudsen, Lars Ramkilde

    2011-01-01

    Fugue is a cryptographic hash function designed by Halevi, Hall and Jutla and was one of the fourteen hash algorithms of the second round of NIST’s SHA3 hash competition. We consider Fugue-256, the 256-bit instance of Fugue. Fugue-256 updates a state of 960 bits with a round transformation R para...

  14. 41 CFR 102-192.100 - How do we submit our annual mail management report to GSA?

    Science.gov (United States)

    2010-07-01

    ... management report to GSA? If your agency is a large agency, as defined in § 102-192.35, you must submit... 41 Public Contracts and Property Management 3 2010-07-01 2010-07-01 false How do we submit our annual mail management report to GSA? 102-192.100 Section 102-192.100 Public Contracts and Property...

  15. 78 FR 47412 - Tyson D. Quy, M.D.; Decision and Order

    Science.gov (United States)

    2013-08-05

    ... Green, Jr., M.D., 59 FR 51,453 (DEA 1994); David E. Trawick, D.D.S., 53 FR 5,326 (DEA 1988). Here, the...) (ten years); Norman Alpert, M.D., 58 FR 67,420, 67,421 (DEA 1993) (seven years). Here, the conditions...

  16. An evaluation of multi-probe locality sensitive hashing for computing similarities over web-scale query logs.

    Directory of Open Access Journals (Sweden)

    Graham Cormode

    Full Text Available Many modern applications of AI such as web search, mobile browsing, image processing, and natural language processing rely on finding similar items from a large database of complex objects. Due to the very large scale of data involved (e.g., users' queries from commercial search engines, computing such near or nearest neighbors is a non-trivial task, as the computational cost grows significantly with the number of items. To address this challenge, we adopt Locality Sensitive Hashing (a.k.a, LSH methods and evaluate four variants in a distributed computing environment (specifically, Hadoop. We identify several optimizations which improve performance, suitable for deployment in very large scale settings. The experimental results demonstrate our variants of LSH achieve the robust performance with better recall compared with "vanilla" LSH, even when using the same amount of space.

  17. 41 CFR 102-192.145 - Which program levels should have a mail manager?

    Science.gov (United States)

    2010-07-01

    ... should have a mail manager? 102-192.145 Section 102-192.145 Public Contracts and Property Management... have a mail manager? Every program level within a Federal agency that generates a significant quantity of outgoing mail should have its own mail manager. Each agency must decide which programs will have a...

  18. BayesMD: flexible biological modeling for motif discovery

    DEFF Research Database (Denmark)

    Tang, Man-Hung Eric; Krogh, Anders; Winther, Ole

    2008-01-01

    We present BayesMD, a Bayesian Motif Discovery model with several new features. Three different types of biological a priori knowledge are built into the framework in a modular fashion. A mixture of Dirichlets is used as prior over nucleotide probabilities in binding sites. It is trained on trans......We present BayesMD, a Bayesian Motif Discovery model with several new features. Three different types of biological a priori knowledge are built into the framework in a modular fashion. A mixture of Dirichlets is used as prior over nucleotide probabilities in binding sites. It is trained...

  19. Crystal twinning of human MD-2 recognizing endotoxin cores of lipopolysaccharide

    International Nuclear Information System (INIS)

    Ohto, Umeharu; Satow, Yoshinori

    2008-01-01

    Twinned crystals of humaan MD-2 are transformed into single crystals with cryoprotectant optimization. Twinning of crystals causes overlapping of two or more reciprocal lattice points, and hence structure amplitudes for a single crystalline domain are hardly obtained from X-ray diffraction intensities. MD-2 protein forms a stable complex with Toll-like receptor 4 and recognizes bacterial lipopolysaccharide (LPS). Excessive immune responses activated by LPS cause septic shocks. Saccharide-trimmed human MD-2 crystallizes in the tetragonal form with apparent Laue symmetry of 4/mmm, and diffraction intensities from these crystals indicate crystal twinning. The crystal consists of two different domains, A and B. The c A axis of domain A coincides with the c B axis of domain B with a smaller lattice, and the a A axis corresponds to the (a B + b B ) axis. This twinning severely imposes difficulty in structure determination. Through optimization of cryoprotectant, domain A was thoroughly transformed into domain B. The crystal containing only domain B is in space group P4 1 2 1 2 with one MD-2 molecule in the asymmetric unit. The structure of this form of MD-2 as well as its complex with antiendotoxic lipid IVa was successfully determined using the multiple isomorphous replacement method

  20. MD on UFOs at MKIs and MKQs

    CERN Document Server

    Baer, T; Bartmann, W; Bracco, C; Carlier, E; Dehning, B; Garrel, N; Goddard, B; Jackson, S; Jimenez, M; Kain, V; Mertens, V; Misiowiec, M; Nordt, A; Papotti, G; Uythoven, J; Wenninger, J; Zerlauth, M; Zamantzas, C; Zimmermann, F

    2012-01-01

    UFOs ("Unidentified Falling Objects") are expected to be one of the major known performance limitation of the LHC. In this MD, the production mechanism and the dynamics of UFOs at the injection kicker magnets (MKIs) and the tune kicker magnets (MKQs) were studied. This was done by pulsing the MKIs and MKQs on a gap in the partly filled machine. During the MD, in total 58 UFO-type beam loss patterns were observed directly after pulsing the MKIs. None were observed after pulsing the MKQs, which provides important input for possible mitigation strategies. The temporal and spatial distribution of the UFO events could be determined by using a dedicated BLM Study Buffer, the implications for the UFO dynamics are discussed.

  1. A machine-checked proof of correctness of Pastry

    OpenAIRE

    Azmy, Noran

    2016-01-01

    A distributed hash table (DHT) is a peer-to-peer network that offers the function of a classic hash table, but where different key-value pairs are stored at different nodes on the network. Like a classic hash table, the main function provided by a DHT is key lookup, which retrieves the value stored at a given key. Examples of DHT protocols include Chord, Pastry, Kademlia and Tapestry. Such DHT protocols certain correctness and performance guarantees, but formal verification typically ...

  2. Traceable calibration of hospital 192Ir HDR sources

    International Nuclear Information System (INIS)

    Govinda Rajan, K.N.; Sharma, S.D.; Palaniselvam, T.; Vandana, S.; Bhatt, B.C.; Vinatha, S.; Patki, V.S.; Pendse, A.M.; Kannan, V.

    2004-01-01

    A HDR 1000 PLUS well type ionization chamber, procured from Standard Imaging, USA, and maintained by medical Physics and Safety Section (MPSS), Bhabha Atomic Research Centre (BARC), India, as a reference well chamber 1 (RWCH1), was traceably calibrated against the primary standard established by Radiological Standards Laboratory (RSL), BARC for 192 Ir HDR source, in terms of air kerma strength (AKS). An indigenously developed well-type ionization chamber, reference well chamber 2 (RWCH2) and electrometer system, fabricated by CD High Tech (CDHT) Instruments Private Ltd., Bangalore, India, was in turn calibrated against RWCH1. The CDHT system (i.e. RWCH2 and CDHT electrometer system) was taken to several hospitals, in different regions of the country, to check the calibration status of 192 Ir HDR sources. The result of this calibration audit work is reported here. (author)

  3. Sustainable water recovery from oily wastewater via forward osmosis-membrane distillation (FO-MD).

    Science.gov (United States)

    Zhang, Sui; Wang, Peng; Fu, Xiuzhu; Chung, Tai-Shung

    2014-04-01

    This study proposed and investigated a hybrid forward osmosis - membrane distillation (FO-MD) system for sustainable water recovery from oily wastewater by employing lab-fabricated FO and MD hollow fiber membranes. Stable oil-in-water emulsions of different concentrations with small droplet sizes (oil droplets and partial permeation of acetic acid could be achieved. Finally, an integrated FO-MD system was developed to treat the oily wastewater containing petroleum, surfactant, NaCl and acetic acid at 60 °C in the batch mode. The water flux in FO undergoes three-stage decline due to fouling and reduction in osmotic driving force, but is quite stable in MD regardless of salt concentration. Oily wastewater with relatively high salinity could be effectively recovered by the FO-MD hybrid system while maintaining large water flux, at least 90% feed water recovery could be readily attained with only trace amounts of oil and salts, and the draw solution was re-generated for the next rounds of FO-MD run. Interestingly, significant amount of acetic acid was also retained in the permeate for further reuse as a chemical additive during the production of crude oil. The work has demonstrated that not only water but also organic additives in the wastewater could be effectively recovered by FO-MD systems for reuse or other utilizations. Copyright © 2014 Elsevier Ltd. All rights reserved.

  4. Center of excellence for mobile sensor data-to-knowledge (MD2K).

    Science.gov (United States)

    Kumar, Santosh; Abowd, Gregory D; Abraham, William T; al'Absi, Mustafa; Beck, J Gayle; Chau, Duen Horng; Condie, Tyson; Conroy, David E; Ertin, Emre; Estrin, Deborah; Ganesan, Deepak; Lam, Cho; Marlin, Benjamin; Marsh, Clay B; Murphy, Susan A; Nahum-Shani, Inbal; Patrick, Kevin; Rehg, James M; Sharmin, Moushumi; Shetty, Vivek; Sim, Ida; Spring, Bonnie; Srivastava, Mani; Wetter, David W

    2015-11-01

    Mobile sensor data-to-knowledge (MD2K) was chosen as one of 11 Big Data Centers of Excellence by the National Institutes of Health, as part of its Big Data-to-Knowledge initiative. MD2K is developing innovative tools to streamline the collection, integration, management, visualization, analysis, and interpretation of health data generated by mobile and wearable sensors. The goal of the big data solutions being developed by MD2K is to reliably quantify physical, biological, behavioral, social, and environmental factors that contribute to health and disease risk. The research conducted by MD2K is targeted at improving health through early detection of adverse health events and by facilitating prevention. MD2K will make its tools, software, and training materials widely available and will also organize workshops and seminars to encourage their use by researchers and clinicians. © The Author 2015. Published by Oxford University Press on behalf of the American Medical Informatics Association. All rights reserved. For Permissions, please email: journals.permissions@oup.com.

  5. MD simulation of cluster formation during sputtering

    International Nuclear Information System (INIS)

    Muramoto, T.; Okai, M.; Yamashita, Y.; Yorizane, K.; Yamamura, Y.

    2001-01-01

    The cluster ejection due to cluster impact on a solid surface is studied through molecular dynamics (MD) simulations. Simulations are performed for Cu cluster impacts on the Cu(1 1 1) surface for cluster energy 100 eV/atom, and for clusters of 6, 13, 28 and 55 atoms. Interatomic interactions are described by the AMLJ-EAM potential. The vibration energy spectrum is independent of the incident cluster size and energy. This comes from the fact that sputtered clusters become stable through the successive fragmentation of nascent large sputtered clusters. The vibration energy spectra for large sputtered clusters have a peak, whose energy corresponds to the melting temperature of Cu. The exponent of the power-law fit of the abundance distribution and the total sputtering yield for the cluster impacts are higher than that for the monatomic ion impacts with the same total energy, where the exponent δ is given by Y n ∝n δ and Y n is the yield of sputtered n-atom cluster. The exponent δ follows a unified function of the total sputtering yield, which is a monotonic increase function, and it is nearly equal to δ ∼ -3 for larger yield

  6. MdHB1 down-regulation activates anthocyanin biosynthesis in the white-fleshed apple cultivar 'Granny Smith'.

    Science.gov (United States)

    Jiang, Yonghua; Liu, Cuihua; Yan, Dan; Wen, Xiaohong; Liu, Yanli; Wang, Haojie; Dai, Jieyu; Zhang, Yujie; Liu, Yanfei; Zhou, Bin; Ren, Xiaolin

    2017-02-01

    Coloration in apple (Malus×domestica) flesh is mainly caused by the accumulation of anthocyanin. Anthocyanin is biosynthesized through the flavonoid pathway and regulated by MYB, bHLH, and WD40 transcription factors (TFs). Here, we report that the HD-Zip I TF MdHB1 was also involved in the regulation of anthocyanin accumulation. MdHB1 silencing caused the accumulation of anthocyanin in 'Granny Smith' flesh, whereas its overexpression reduced the flesh content of anthocyanin in 'Ballerina' (red-fleshed apple). Moreover, flowers of transgenic tobacco (Nicotiana tabacum 'NC89') overexpressing MdHB1 showed a remarkable reduction in pigmentation. Transient promoter activation assays and yeast one-hybrid results indicated that MdHB1 indirectly inhibited expression of the anthocyanin biosynthetic genes encoding dihydroflavonol-4-reductase (DFR) and UDP-glucose:flavonoid 3-O-glycosyltransferase (UFGT). Yeast two-hybrid and bimolecular fluorescence complementation determined that MdHB1 acted as a homodimer and could interact with MYB, bHLH, and WD40 in the cytoplasm, consistent with its cytoplasmic localization by green fluorescent protein fluorescence observations. Together, these results suggest that MdHB1 constrains MdMYB10, MdbHLH3, and MdTTG1 to the cytoplasm, and then represses the transcription of MdDFR and MdUFGT indirectly. When MdHB1 is silenced, these TFs are released to activate the expression of MdDFR and MdUFGT and also anthocyanin biosynthesis, resulting in red flesh in 'Granny Smith'. © The Author 2017. Published by Oxford University Press on behalf of the Society for Experimental Biology. All rights reserved. For permissions, please email: journals.permissions@oup.com.

  7. Post-quantum security of the sponge construction

    NARCIS (Netherlands)

    Czajkowski, J.; Groot Bruinderink, L.; Hülsing, A.T.; Schaffner, C.; Unruh, D.

    2017-01-01

    We investigate the post-quantum security of hash functions based on the sponge construction. A crucial property for hash functions in the post-quantum setting is the collapsing property (a strengthening of collision-resistance). We show that the sponge construction is collapsing (and in consequence

  8. Post-quantum security of the sponge construction

    NARCIS (Netherlands)

    Czajkowski, Jan; Groot Bruinderink, Leon; Hülsing, Andreas; Schaffner, Christian; Unruh, Dominique

    2018-01-01

    We investigate the post-quantum security of hash functions based on the sponge construction. A crucial property for hash functions in the post-quantum setting is the collapsing property (a strengthening of collision-resistance). We show that the sponge construction is collapsing (and in consequence

  9. Digital Image Authentication Algorithm Based on Fragile Invisible Watermark and MD-5 Function in the DWT Domain

    Directory of Open Access Journals (Sweden)

    Nehad Hameed Hussein

    2015-04-01

    Full Text Available Using watermarking techniques and digital signatures can better solve the problems of digital images transmitted on the Internet like forgery, tampering, altering, etc. In this paper we proposed invisible fragile watermark and MD-5 based algorithm for digital image authenticating and tampers detecting in the Discrete Wavelet Transform DWT domain. The digital image is decomposed using 2-level DWT and the middle and high frequency sub-bands are used for watermark and digital signature embedding. The authentication data are embedded in number of the coefficients of these sub-bands according to the adaptive threshold based on the watermark length and the coefficients of each DWT level. These sub-bands are used because they are less sensitive to the Human Visual System (HVS and preserve high image fidelity. MD-5 and RSA algorithms are used for generating the digital signature from the watermark data that is also embedded in the medical image. We apply the algorithm on number of medical images. The Electronic Patient Record (EPR is used as watermark data. Experiments demonstrate the effectiveness of our algorithm in terms of robustness, invisibility, and fragility. Watermark and digital signature can be extracted without the need to the original image.

  10. The hydration enthalpies of Md3+ and Lr3+

    International Nuclear Information System (INIS)

    Bruechle, W.; Schaedel, M.; Scherer, U.W.; Kratz, J.V.

    1987-10-01

    Lawrencium (3-min 260 Lr) and lighter actinides were produced in the bombardement of a 249 Bk target with 18 O ions and loaded onto a cation exchange column in 0.05 M α-hydroxy-isobutyrate solution at pH = 4.85 together with the radioactive lanthanide tracers 166 Ho, 171 Er, and 171 Tm. In elutions with 0.12 M α-hydroxy-isobutyrate solution (pH = 4.85) trivalent Lr was eluted exactly together with the Er tracer and Md close to Ho. Lr elutes much later than expected based on the known elution positions of the lighter actinides and the expected analogy to the elution positions of the homologous lanthanides. From the measured elution positions, ionic radii were calculated for Lr 3+ and Md 3+ . Semiempirical models allow the calculation of the heat of hydration from the ionic radii, resulting in ΔH hyd ≅ - 3654 kJ/mol for Md 3+ and ΔH hyd ≅ - 3689 kJ/mol for Lr 3+ . (orig.)

  11. 15 CFR 19.2 - Why has the Commerce Department issuing these regulations and what do they cover?

    Science.gov (United States)

    2010-01-01

    ... 15 Commerce and Foreign Trade 1 2010-01-01 2010-01-01 false Why has the Commerce Department issuing these regulations and what do they cover? 19.2 Section 19.2 Commerce and Foreign Trade Office of the Secretary of Commerce COMMERCE DEBT COLLECTION General Provisions § 19.2 Why has the Commerce...

  12. The brain and the biology of belief: An interview with Andrew Newberg, MD. Interview by Nancy Nachman-Hunt.

    Science.gov (United States)

    Newberg, Andrew

    2009-01-01

    Andrew Newberg, MD, is an associate professor in the Department of Radiology, Division of Nuclear Medicine, at the Hospital of the University of Pennsylvania, Philadelphia, with secondary appointments in the Departments of Psychiatry and Religious Studies. He is actively involved in neuroimaging research projects, including the study of the neurophysiological correlates of meditation and other types of complementary therapies. Dr Newberg's research now largely focuses on how brain function is associated with various mental states, in particular, the relationship between brain function and mystical or religious experiences. He has authored several books, including Why God Won't Go Away: Brain Science and the Biology of Belief (Ballantine/Random House, 2001) and coauthor with Eugene G. d'Aquili, MD, of The Mystical Mind: Probing the Biology of Religious Experience (Fortress Press, 1999). His most recent book is How God Changes Your Brain, with coauthor Mark Waldman (Ballantine Books, 2009).

  13. Failure to launch: the self-regulating Md-MYB10 R6 gene from apple is active in flowers but not leaves of Petunia.

    Science.gov (United States)

    Boase, Murray R; Brendolise, Cyril; Wang, Lei; Ngo, Hahn; Espley, Richard V; Hellens, Roger P; Schwinn, Kathy E; Davies, Kevin M; Albert, Nick W

    2015-10-01

    The Md - MYB10 R6 gene from apple is capable of self-regulating in heterologous host species and enhancing anthocyanin pigmentation, but the activity of MYB10 is dependent on endogenous protein partners. Coloured foliage due to anthocyanin pigments (bronze/red/black) is an attractive trait that is often lacking in many bedding, ornamental and horticultural plants. Apples (Malus × domestica) containing an allelic variant of the anthocyanin regulator, Md-MYB10 R6 , are highly pigmented throughout the plant, due to autoregulation by MYB10 upon its own promoter. We investigated whether Md-MYB10 R6 from apple is capable of functioning within the heterologous host Petunia hybrida to generate plants with novel pigmentation patterns. The Md-MYB10 R6 transgene (MYB10-R6 pro :MYB10:MYB10 term ) activated anthocyanin synthesis when transiently expressed in Antirrhinum rosea (dorsea) petals and petunia leaf discs. Stable transgenic petunias containing Md-MYB10 R6 lacked foliar pigmentation but had coloured flowers, complementing the an2 phenotype of 'Mitchell' petunia. The absence of foliar pigmentation was due to the failure of the Md-MYB10 R6 gene to self-activate in vegetative tissues, suggesting that additional protein partners are required for Md-MYB10 to activate target genes in this heterologous system. In petunia flowers, where endogenous components including MYB-bHLH-WDR (MBW) proteins were present, expression of the Md-MYB10 R6 promoter was initiated, allowing auto-regulation to occur and activating anthocyanin production. Md-MYB10 is capable of operating within the petunia MBW gene regulation network that controls the expression of the anthocyanin biosynthesis genes, AN1 (bHLH) and MYBx (R3-MYB repressor) in petals.

  14. 76 FR 81826 - Drawbridge Operation Regulation; Pocomoke River, Pocomoke City, MD

    Science.gov (United States)

    2011-12-29

    ... Operation Regulation; Pocomoke River, Pocomoke City, MD AGENCY: Coast Guard, DHS. ACTION: Notice of... River, mile 15.6, at Pocomoke City, MD. The deviation restricts the operation of the draw span to... five hours advance notice is given. The Route 675 Bridge across Pocomoke River, mile 15.6 at Pocomoke...

  15. The molecular mechanism underlying anthocyanin metabolism in apple using the MdMYB16 and MdbHLH33 genes.

    Science.gov (United States)

    Xu, Haifeng; Wang, Nan; Liu, Jingxuan; Qu, Changzhi; Wang, Yicheng; Jiang, Shenghui; Lu, Ninglin; Wang, Deyun; Zhang, Zongying; Chen, Xuesen

    2017-05-01

    MdMYB16 forms homodimers and directly inhibits anthocyanin synthesis via its C-terminal EAR repressor. It weakened the inhibitory effect of MdMYB16 on anthocyanin synthesis when overexpressing MdbHLH33 in callus overexpressing MdMYB16. MdMYB16 could interact with MdbHLH33. Anthocyanins are strong antioxidants that play a key role in the prevention of cardiovascular disease, cancer, and diabetes. The germplasm of Malus sieversii f. neidzwetzkyana is important for the study of anthocyanin metabolism. To date, only limited studies have examined the negative regulatory mechanisms underlying anthocyanin synthesis in apple. Here, we analyzed the relationship between anthocyanin levels and MdMYB16 expression in mature Red Crisp 1-5 apple (M. domestica) fruit, generated an evolutionary tree, and identified an EAR suppression sequence and a bHLH binding motif of the MdMYB16 protein using protein sequence analyses. Overexpression of MdMYB16 or MdMYB16 without bHLH binding sequence (LBSMdMYB16) in red-fleshed callus inhibited MdUFGT and MdANS expression and anthocyanin synthesis. However, overexpression of MdMYB16 without the EAR sequence (LESMdMYB16) in red-fleshed callus had no inhibitory effect on anthocyanin. The yeast one-hybrid assay showed that MdMYB16 and LESMdMYB16 interacted the promoters of MdANS and MdUFGT, respectively. Yeast two-hybrid, pull-down, and bimolecular fluorescence complementation assays showed that MdMYB16 formed homodimers and interacted with MdbHLH33, however, the LBSMdMYB16 could not interact with MdbHLH33. We overexpressed MdbHLH33 in callus overexpressing MdMYB16 and found that it weakened the inhibitory effect of MdMYB16 on anthocyanin synthesis. Together, these results suggested that MdMYB16 and MdbHLH33 may be important part of the regulatory network controlling the anthocyanin biosynthetic pathway.

  16. PuReMD-GPU: A reactive molecular dynamics simulation package for GPUs

    International Nuclear Information System (INIS)

    Kylasa, S.B.; Aktulga, H.M.; Grama, A.Y.

    2014-01-01

    We present an efficient and highly accurate GP-GPU implementation of our community code, PuReMD, for reactive molecular dynamics simulations using the ReaxFF force field. PuReMD and its incorporation into LAMMPS (Reax/C) is used by a large number of research groups worldwide for simulating diverse systems ranging from biomembranes to explosives (RDX) at atomistic level of detail. The sub-femtosecond time-steps associated with ReaxFF strongly motivate significant improvements to per-timestep simulation time through effective use of GPUs. This paper presents, in detail, the design and implementation of PuReMD-GPU, which enables ReaxFF simulations on GPUs, as well as various performance optimization techniques we developed to obtain high performance on state-of-the-art hardware. Comprehensive experiments on model systems (bulk water and amorphous silica) are presented to quantify the performance improvements achieved by PuReMD-GPU and to verify its accuracy. In particular, our experiments show up to 16× improvement in runtime compared to our highly optimized CPU-only single-core ReaxFF implementation. PuReMD-GPU is a unique production code, and is currently available on request from the authors

  17. PuReMD-GPU: A reactive molecular dynamics simulation package for GPUs

    Energy Technology Data Exchange (ETDEWEB)

    Kylasa, S.B., E-mail: skylasa@purdue.edu [Department of Elec. and Comp. Eng., Purdue University, West Lafayette, IN 47907 (United States); Aktulga, H.M., E-mail: hmaktulga@lbl.gov [Lawrence Berkeley National Laboratory, 1 Cyclotron Rd, MS 50F-1650, Berkeley, CA 94720 (United States); Grama, A.Y., E-mail: ayg@cs.purdue.edu [Department of Computer Science, Purdue University, West Lafayette, IN 47907 (United States)

    2014-09-01

    We present an efficient and highly accurate GP-GPU implementation of our community code, PuReMD, for reactive molecular dynamics simulations using the ReaxFF force field. PuReMD and its incorporation into LAMMPS (Reax/C) is used by a large number of research groups worldwide for simulating diverse systems ranging from biomembranes to explosives (RDX) at atomistic level of detail. The sub-femtosecond time-steps associated with ReaxFF strongly motivate significant improvements to per-timestep simulation time through effective use of GPUs. This paper presents, in detail, the design and implementation of PuReMD-GPU, which enables ReaxFF simulations on GPUs, as well as various performance optimization techniques we developed to obtain high performance on state-of-the-art hardware. Comprehensive experiments on model systems (bulk water and amorphous silica) are presented to quantify the performance improvements achieved by PuReMD-GPU and to verify its accuracy. In particular, our experiments show up to 16× improvement in runtime compared to our highly optimized CPU-only single-core ReaxFF implementation. PuReMD-GPU is a unique production code, and is currently available on request from the authors.

  18. Evaluation of the Radiological Safety of 192 Ir Apparatus for Industrial Gamma Radiography

    International Nuclear Information System (INIS)

    Aquino, J. O.; Silva, F. C. A. da; Ramalho, A. T.; Godoy, J. M. O.

    2004-01-01

    The majority of the 192Ir apparatus for industrial gamma radiography have been in usage in Brazil for more than 20 years. They are portable, and almost all operate according to category II. The main objective of this work was to assess the radiological safety of the 11 models of 192Ir apparatus most used in Brazil. The 11 models of 192Ir apparatus were studied with respect to compliance with the main safety requirements of three editions of international Standards ISO 3999. Six models were already manufactured incorporating the safety devices specified in the first edition of ISO 3999, issued in 1977. However, five models were not. The validity of their type B certificates for transport packages was also evaluated. (Author) 8 refs

  19. Maternal exposure to floricultural work during pregnancy, PON1 Q192R polymorphisms and the risk of low birth weight

    Energy Technology Data Exchange (ETDEWEB)

    Moreno-Banda, G.; Blanco-Munoz, J. [Population Health Research Center, National Institute of Public Health, Avenida Universidad 655, Colonia Santa Maria Ahuacatitlan, 62508 Cuernavaca, Morelos (Mexico); Lacasana, M., E-mail: marina.lacasana.easp@juntadeandalucia.es [Andalusian School of Public Health, Campus Universitario de la Cartuja, Cuesta del Observatorio, 4, 18080 Granada (Spain); CIBER of Epidemiology and Public Health (CIBERESP) (Spain); Rothenberg, S.J. [Population Health Research Center, National Institute of Public Health, Avenida Universidad 655, Colonia Santa Maria Ahuacatitlan, 62508 Cuernavaca, Morelos (Mexico); Center of Research and Advanced Studies, National Institute Polytechnic, Department of Toxicology, Av, Instituto Politecnico Nacional No. 2508, Col. San Pedro Zacatenco, Deleg. Gustavo A. Madero, 07360 Mexico, D.F. (Mexico); Aguilar-Garduno, C. [Andalusian School of Public Health, Campus Universitario de la Cartuja, Cuesta del Observatorio, 4, 18080 Granada (Spain); Andalusian Observatory of Environmental Health, Campus Universitario de la Cartuja, Cuesta del Observatorio, 4, 18080 Granada (Spain); Gamboa, R. [Department of Physiology, National Institute of Cardiology ' Ignacio Chavez' , Juan Badiano 4, Section XVI, 14080, Mexico DF (Mexico); Perez-Mendez, O. [Department of Molecular Biology and cardiovascular Diseases Genomic and Proteomic, National Institute of Cardiology ' Ignacio Chavez' , Juan Badiano 4, Section XVI, 14080, Mexico DF (Mexico)

    2009-10-15

    Background: Although there is evidence from animal studies of impaired reproductive function by exposure to organophosphates (OP), the effects on birth weight have not been sufficiently evaluated in epidemiological studies. Paraoxonase (PON1) detoxifies organophosphates by cleavage of active oxons. Some PON1 gene polymorphisms could reduce the enzyme activity and increase susceptibility to OP toxicity. Objective: To assess the association between maternal exposure to floriculture during pregnancy and the risk of low birth weight (< 2500 g) in their offspring, as well as to evaluate the interaction between this exposure and maternal genotype for PON1 Q192R polymorphisms. Materials and methods: A cross sectional study was carried out in two Mexican states (States of Mexico and Morelos) with high frequencies of greenhouse activity. We interviewed and collected blood samples from 264 females (floriculturists or partners of floricultural workers) who became pregnant during the 10 years prior to the interview. The questionnaire measured socioeconomic characteristics, tobacco and alcohol consumption, diseases and occupational and reproductive history. We also applied a food frequency questionnaire. Information was obtained pertaining to 467 pregnancies. DNA was extracted from white cells, and PON1 genotype was determined by Restriction Fragment Length Polymorphism for Q192R polymorphisms. Results were analyzed with generalized estimating equations models. Results: After adjusting for potential confounders, we detected a statistically significant interaction between maternal exposure to flower growing work during pregnancy and PON1 Q192R polymorphisms on risk of low birth weight. The risk of having a baby with LBW is nearly six times higher if a mother is a floriculture worker during pregnancy and has PON1 192RR genotype (OR 5.93, 95% CI 1.28, 27.5). Conclusion: These results suggest that the interaction between maternal floriculture work during pregnancy and 192RR PON1

  20. Maternal exposure to floricultural work during pregnancy, PON1 Q192R polymorphisms and the risk of low birth weight

    International Nuclear Information System (INIS)

    Moreno-Banda, G.; Blanco-Munoz, J.; Lacasana, M.; Rothenberg, S.J.; Aguilar-Garduno, C.; Gamboa, R.; Perez-Mendez, O.

    2009-01-01

    Background: Although there is evidence from animal studies of impaired reproductive function by exposure to organophosphates (OP), the effects on birth weight have not been sufficiently evaluated in epidemiological studies. Paraoxonase (PON1) detoxifies organophosphates by cleavage of active oxons. Some PON1 gene polymorphisms could reduce the enzyme activity and increase susceptibility to OP toxicity. Objective: To assess the association between maternal exposure to floriculture during pregnancy and the risk of low birth weight (< 2500 g) in their offspring, as well as to evaluate the interaction between this exposure and maternal genotype for PON1 Q192R polymorphisms. Materials and methods: A cross sectional study was carried out in two Mexican states (States of Mexico and Morelos) with high frequencies of greenhouse activity. We interviewed and collected blood samples from 264 females (floriculturists or partners of floricultural workers) who became pregnant during the 10 years prior to the interview. The questionnaire measured socioeconomic characteristics, tobacco and alcohol consumption, diseases and occupational and reproductive history. We also applied a food frequency questionnaire. Information was obtained pertaining to 467 pregnancies. DNA was extracted from white cells, and PON1 genotype was determined by Restriction Fragment Length Polymorphism for Q192R polymorphisms. Results were analyzed with generalized estimating equations models. Results: After adjusting for potential confounders, we detected a statistically significant interaction between maternal exposure to flower growing work during pregnancy and PON1 Q192R polymorphisms on risk of low birth weight. The risk of having a baby with LBW is nearly six times higher if a mother is a floriculture worker during pregnancy and has PON1 192RR genotype (OR 5.93, 95% CI 1.28, 27.5). Conclusion: These results suggest that the interaction between maternal floriculture work during pregnancy and 192RR PON1

  1. MD#2183: Calibration of the IR6 B2 diamond BLMs

    CERN Document Server

    Valette, Matthieu; Lindstrom, Bjorn Hans Filip

    2018-01-01

    In case of an asynchronous beam dump with a fully filled LHC machine, causing ~40 bunches to impact on the movable dump protection absorber (TCDQ), it is expected that all standard ionisation chamber Beam Loss Monitors (IC BLM) around the LHC dumping region in IR6 will be saturated. Diamond Beam Loss Monitors (dBLM) were therefore installed next to the TCDQ downstream of the extraction kickers. These detectors allow resolving losses at a nanosecond timescale and with a dynamic range of several orders of magnitude; thus, allowing to derive the number of nominal bunches impacting the TCDQ. After a first series of calibrations using asynchronous beam dump tests, an experiment was conducted during MD#1182 to demonstrate the possibility of resolving a nominal bunch hitting the TCDQ. During this first MD only the Beam 1 dBLM was calibrated appropriately, a second calibration MD was therefore performed in 2017 for the B2 system. Results from this MD and conclusions regarding dBLM saturation with a top energy nominal...

  2. Measurement of the Functional Status of Patients with Different Types of Muscular Dystrophy

    Directory of Open Access Journals (Sweden)

    Yi-Jing Lue

    2009-06-01

    Full Text Available Muscular dystrophy (MD comprises a group of diseases characterized by progressive muscle weakness that induces functional deterioration. Clinical management requires the use of a well-designed scale to measure patients' functional status. This study aimed to investigate the quality of the functional scales used to assess patients with different types of MD. The Brooke scale and the Vignos scale were used to grade arm and leg function, respectively. The Barthel Index was used to evaluate the function of daily living activity. We performed tests to assess the acceptability of these scales. The characteristics of the different types of MD are discussed. This was a multicenter study and included patients diagnosed with Duchenne muscular dystrophy (DMD (classified as severely progressive MD, Becker muscular dystrophy (BMD, limb girdle muscular dystrophy (LGMD and facioscapulohumeral muscular dystrophy (FSHD. BMD, LGMD, and FSHD were classified as slowly progressive MD. The results demonstrated that the Brooke scale was acceptable for grading arm function in DMD, but was unable to discriminate between differing levels of severity in slowly progressive MD. The floor effect was large for all types of slowly progressive MD (range, 20.0–61.9, and was especially high for BMD. The floor effect was also large for BMD (23.8% and FSHD (50.0% using the Vignos scale. Grades 6–8 of the Vignos scale were inapplicable because they included items involving the use of long leg braces for walking or standing, and some patients did not use long leg braces. In the Barthel Index, a ceiling effect was prominent for slowly progressive MD (58.9%, while a floor effect existed for DMD (17.9%. Among the slowly progressive MDs, FSHD patients had the best level of functioning; they had better leg function and their daily living activities were less affected than patients with other forms of slowly progressive MD. The results of this study demonstrate the acceptability of the

  3. 49 CFR 192.369 - Service lines: Connections to cast iron or ductile iron mains.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 3 2010-10-01 2010-10-01 false Service lines: Connections to cast iron or ductile iron mains. 192.369 Section 192.369 Transportation Other Regulations Relating to Transportation... ductile iron mains. (a) Each service line connected to a cast iron or ductile iron main must be connected...

  4. D.SYM.4 SHA-3 Design and Cryptanalysis Report

    DEFF Research Database (Denmark)

    Gauravaram, Praveen; Thomsen, Søren Steffen

    2011-01-01

    The competition to select a new secure hash function standard SHA-3 was initiated in response to surprising progress in the cryptanalysis of existing hash function constructions that started in 2004. In this report we survey design and cryptanalytic results of those 14 candidates that remain in t...

  5. 49 CFR 192.153 - Components fabricated by welding.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 3 2010-10-01 2010-10-01 false Components fabricated by welding. 192.153 Section....153 Components fabricated by welding. (a) Except for branch connections and assemblies of standard... welding, whose strength cannot be determined, must be established in accordance with paragraph UG-101 of...

  6. Enabling Medical Device Interoperability for the Integrated Clinical Environment

    Science.gov (United States)

    2016-02-01

    The MD PnP Program had already tested different technologies to carry out this migration (e.g. the Hibernate framework to persist Java objects into...Security, a powerful and highly customizable authentication and access control framework, and BCrypt, the Java implementation of a hashing algorithm...including C, C++, and Java . Our OpenICE demo code is written in JavaScript and runs in the web browser in order to make it as easy as possible for

  7. GSHR-Tree: a spatial index tree based on dynamic spatial slot and hash table in grid environments

    Science.gov (United States)

    Chen, Zhanlong; Wu, Xin-cai; Wu, Liang

    2008-12-01

    Computation Grids enable the coordinated sharing of large-scale distributed heterogeneous computing resources that can be used to solve computationally intensive problems in science, engineering, and commerce. Grid spatial applications are made possible by high-speed networks and a new generation of Grid middleware that resides between networks and traditional GIS applications. The integration of the multi-sources and heterogeneous spatial information and the management of the distributed spatial resources and the sharing and cooperative of the spatial data and Grid services are the key problems to resolve in the development of the Grid GIS. The performance of the spatial index mechanism is the key technology of the Grid GIS and spatial database affects the holistic performance of the GIS in Grid Environments. In order to improve the efficiency of parallel processing of a spatial mass data under the distributed parallel computing grid environment, this paper presents a new grid slot hash parallel spatial index GSHR-Tree structure established in the parallel spatial indexing mechanism. Based on the hash table and dynamic spatial slot, this paper has improved the structure of the classical parallel R tree index. The GSHR-Tree index makes full use of the good qualities of R-Tree and hash data structure. This paper has constructed a new parallel spatial index that can meet the needs of parallel grid computing about the magnanimous spatial data in the distributed network. This arithmetic splits space in to multi-slots by multiplying and reverting and maps these slots to sites in distributed and parallel system. Each sites constructs the spatial objects in its spatial slot into an R tree. On the basis of this tree structure, the index data was distributed among multiple nodes in the grid networks by using large node R-tree method. The unbalance during process can be quickly adjusted by means of a dynamical adjusting algorithm. This tree structure has considered the

  8. MD2036: UFO Dynamics Studies and UFO Fast Detection

    CERN Document Server

    Belanger, Philippe; Valette, Matthieu; Lindstrom, Bjorn Hans Filip; Grob, Laura Katharina; Schmidt, Rudiger; Wollmann, Daniel

    2017-01-01

    UFOs are one of the remaining unknown related to LHC operation. Therefore, improving the understanding of UFO dynamics and validating the developed models against direct beam measurements is of fundamental importance in view of LHC operation at 7 TeV and with HL-LHC beam intensities. If not understood, UFOs could also be a showstopper for future machines such as FCC. This MD demonstrates new methods to study the dynamic behaviour of a calibrated UFO, simulated by the interaction of wire scanners with the beam. The events created during the MD were monitored using diamond BLMs in IR7, providing bunch-by-bunch resolution measurements. The analysis presented herein shows that blown-up bunches can be used to identify the plane of movement of UFOs, that bunch profiles and bunch sizes can be measured with dBLMs with good precision, that simulation of expected losses are in good agreement with measurements for oscillating bunches and that the space resolution of the acquisition system used during the MD is about 10 ...

  9. 192Ir high dose rate (HDR) interstitial brain implant: optimisation

    International Nuclear Information System (INIS)

    Tyagi, Anuj; Singh, Dinesh; Chitra, S.; Gupta, J.P.

    2001-01-01

    The new modality of stepping source dosimetry system (SSDs) illustrates a remarkable improvement in attaining the uniform and homogeneous dose distribution within the target volume. The technique enables the physicist to correct for a certain amount of misplacement or curvature of implant geometry. The short course of brachytherapy provides good palliation in terms of functional improvements with low and acceptable toxicity in high-grade glioma. With continual refinements of the technique, brachytherapy performed by a skilled brachytherapy team offers an opportunity to improve patient survival and quality of life. Since 1997, micro selectron HDR 192 Ir treatments are done including gynecological, oesophageal, breast, surface mould, soft tissue sarcoma (STS) and brain in our hospital. In this paper, procedure of interstitial brain implant in glioma as implant technique, simulation and treatment planning will be discussed

  10. Toxicity of chlorpyrifos and chlorpyrifos oxon in a transgenic mouse model of the human paraoxonase (PON1) Q192R polymorphism

    Energy Technology Data Exchange (ETDEWEB)

    Cole, Toby B.; Walter, Betsy J.; Shih, Diana M.; Tward, Aaron D.; Lusis, Aldons J.; Timchalk, Chuck; Richter, Rebecca J.; Costa, Lucio G.; Furlong, Clement E.

    2005-08-01

    The Q192R polymorphism of paraoxonase (PON1) has been shown to affect hydrolysis of organophosphorus compounds. The Q192 and R192 alloforms exhibit equivalent catalytic efficiencies of hydrolysis for diazoxon, the oxon form of the pesticide (DZ). However, the R192 alloform has a higher catalytic efficiency of hydrolysis than does the Q192 alloform for chlorpyrifos oxon (CPO), the oxon form of the pesticide chlorpyrifos (CPS). The current study examined the relevance of these observations for in-vivo exposures to chlorpyrifos and chlorpyrifos oxon. Methods Using a transgenic mouse model we examined the relevance of the Q192R polymorphism for exposure to CPS and CPO in vivo. Transgenic mice were generated that expressed either human PON1Q192 or PON1R192 at equivalent levels, in the absence of endogenous mouse PON1. Dose-response and time course experiments were performed on adult mice exposed dermally to CPS or CPO. Morbidity and acetylcholinesterase (AChE) activity in the brain and diaphragm were determined in the first 24 h following exposure. Results Mice expressing PON1Q192 were significantly more sensitive to CPO, and to a lesser extent CPS, than were mice expressing PON1R192. The time course of inhibition following exposure to 1.2 mg/kg CPO revealed maximum inhibition of brain AChE at 6?12 h, with PON1R192, PON1Q192, and PON1? /? mice exhibiting 40, 70 and 85% inhibition, respectively, relative to control mice. The effect of PON1 removal on the dose?response curve for CPS exposure was remarkably consistent with a PBPK/PD model of CPS exposure. Conclusion These results indicate that individuals expressing only the PON1Q192 allele would be more sensitive to the adverse effects of CPO or CPS exposure, especially if they are expressing a low level of plasma PON1Q192.

  11. Dose Distributions of an 192Ir Brachytherapy Source in Different Media

    Directory of Open Access Journals (Sweden)

    C. H. Wu

    2014-01-01

    Full Text Available This study used MCNPX code to investigate the brachytherapy 192Ir dose distributions in water, bone, and lung tissue and performed radiophotoluminescent glass dosimeter measurements to verify the obtained MCNPX results. The results showed that the dose-rate constant, radial dose function, and anisotropy function in water were highly consistent with data in the literature. However, the lung dose near the source would be overestimated by up to 12%, if the lung tissue is assumed to be water, and, hence, if a tumor is located in the lung, the tumor dose will be overestimated, if the material density is not taken into consideration. In contrast, the lung dose far from the source would be underestimated by up to 30%. Radial dose functions were found to depend not only on the phantom size but also on the material density. The phantom size affects the radial dose function in bone more than those in the other tissues. On the other hand, the anisotropy function in lung tissue was not dependent on the radial distance. Our simulation results could represent valid clinical reference data and be used to improve the accuracy of the doses delivered during brachytherapy applied to patients with lung cancer.

  12. STRATEGI PEMASARAN PUBLIC RELATIONS MD ENTERTAINMENT PADA PEMASARAN FILM HABIBIE & AINUN

    OpenAIRE

    Trisna Adi Permana; Lilis Puspitasari

    2015-01-01

    Tujuan penelitian ini adalah untuk mengetahui perencanaan, implementasi serta evaluasi dari strategi Marketing Public Relations yang ditetapkan PR MD Entertainment pada film Habibie & Ainun pada tahun 2012-2013. Metode yang dilakukan adalah metode deskriptif yang bertujuan melukiskan secara sistematis fakta atau karakteristik populasi tertentu atau bidang tertentu secara faktual dan cermat. Hasil penelitian menunjukan PR MD Entertainment telah melakukan tahapan-tahapan atau Teknik...

  13. Dose calculation for iridium-192 sources by a personal computer

    International Nuclear Information System (INIS)

    Takahashi, Kenichi; Ishigaki, Hideyo; Udagawa, Kimio; Saito, Masami; Yamaguchi, Kyoko

    1988-01-01

    Recently Ir-192 sources have been used for interstitial radiotherapy instead of Ra-226 needles. One end of Ir-192 (single-pin) is formed with circlet and implanted Ir-192 sources are not always straight line. So the authors have developed a new dose calculation system, in which the authers employed conventional method considering oblique filteration for linear source and multi-point source method for curved source. Conventionally the positions of sources in three dimensions are determined from projections of the implanted sources on orthogonal or stereo radiographs. But it is frequentry impossible to define the end of sources on account of overlap. Then the authers have devised a method to determine the positions of sources from two radiographs which were taken with arbitrary directions. For tongue cancer injuries of mandibula so frequently occur after interstitial radiotherapy that the calculation of gingival dose is necessary. The positions of the gingival line are determined from two directional radiographs too. Further the three dimensional dose distributions can be displayed on the cathod ray tube. These calculations are performed by using a personal computer because of its distinctive features such as superiority in cost performance and flexibility for development and modification of programs. (author)

  14. Binding mode prediction and MD/MMPBSA-based free energy ranking for agonists of REV-ERBα/NCoR.

    Science.gov (United States)

    Westermaier, Yvonne; Ruiz-Carmona, Sergio; Theret, Isabelle; Perron-Sierra, Françoise; Poissonnet, Guillaume; Dacquet, Catherine; Boutin, Jean A; Ducrot, Pierre; Barril, Xavier

    2017-08-01

    The knowledge of the free energy of binding of small molecules to a macromolecular target is crucial in drug design as is the ability to predict the functional consequences of binding. We highlight how a molecular dynamics (MD)-based approach can be used to predict the free energy of small molecules, and to provide priorities for the synthesis and the validation via in vitro tests. Here, we study the dynamics and energetics of the nuclear receptor REV-ERBα with its co-repressor NCoR and 35 novel agonists. Our in silico approach combines molecular docking, molecular dynamics (MD), solvent-accessible surface area (SASA) and molecular mechanics poisson boltzmann surface area (MMPBSA) calculations. While docking yielded initial hints on the binding modes, their stability was assessed by MD. The SASA calculations revealed that the presence of the ligand led to a higher exposure of hydrophobic REV-ERB residues for NCoR recruitment. MMPBSA was very successful in ranking ligands by potency in a retrospective and prospective manner. Particularly, the prospective MMPBSA ranking-based validations for four compounds, three predicted to be active and one weakly active, were confirmed experimentally.

  15. MD 2179: Scraping of off-momentum halo after injection

    CERN Document Server

    Garcia Morales, Hector; Patecki, Marcin; Wretborn, Sven Joel; CERN. Geneva. ATS Department

    2018-01-01

    In this MD, a beam scraping was performed using the momentum primary collimator in IR3 where dispersion is high. A second scraping was performed using a TCSG in IR7 where dispersion is almost negligible. In such a way, we aim to disentangle the contribution of off-momentum particles to halo population. These scrapings will provide useful information to better understand the usual off-momentum losses we see at the start of the ramp. The MD results would also be used to benchmark simulations of off-momentum beam losses in order to gain confidence in simulation models.

  16. InforMD: a new initiative to raise public awareness about breast density.

    Science.gov (United States)

    Hugo, Honor J; Zysk, Aneta; Dasari, Pallave; Britt, Kara; Hopper, John L; Stone, Jennifer; Thompson, Erik W; Ingman, Wendy V

    2018-01-01

    On a mammogram, breast density (also known as mammographic density) is shown as white and bright regions and is associated with reduced sensitivity in cancer detection and increased breast cancer risk. However, many Australian women are unaware of the significance of breast density as it is not routinely reported or discussed. In order to address this lack of knowledge, Australian breast cancer researchers with expertise in mammographic density formed the InforMD alliance (INformation FORum on Mammographic Density) in 2016. The alliance is working to raise awareness of breast density with the goal of improving breast cancer diagnosis and health outcomes for women. The InforMD website (www.InforMD.org.au) was launched in October 2016, coinciding with a major nationwide public awareness campaign by the alliance during breast cancer awareness month. The website contains unbiased, accurate, updated information on breast density. The website also provides summaries of major research articles in layperson language, recent news items related to breast density, links to relevant information for health professionals, events, and feature articles. Members of the public and health professionals can also subscribe for news updates. The interactive online Forum section facilitates discussion between health professionals, scientists and members of the public. To increase online traffic to the website, Facebook (www.facebook.com/BeInforMD) and Twitter (https://twitter.com/BeInforMD_) pages were launched in December 2016. Since its launch, InforMD has generated considerable interest. The public awareness campaign reached over 7 million Australians through a combination of newspaper, TV, radio, and online news. The website has attracted 13,058 unique visitors and 30,353 page views (data as of 19/12/2017). Breast cancer researchers have a significant role to play in disseminating information to the public on breast density. A combination of mainstream and social media, together with

  17. Industrial radiography with Ir-192 using computed radiographic technique

    International Nuclear Information System (INIS)

    Ngernvijit, Narippawaj; Punnachaiya, Suvit; Chankow, Nares; Sukbumperng, Ampai; Thong-Aram, Decho

    2003-01-01

    The aim of this research is to study the utilization of a low activity Ir-192 gamma source for industrial radiographic testing using the Computed Radiography (CR) system. Due to a photo-salbutamol Imaging Plate (I P) using in CR is much more radiation sensitive than a type II film with lead foil intensifying screen, the exposure time with CR can be significantly reduced. For short-lived gamma-ray source like Ir-192 source, the exposure time must be proportionally increased until it is not practical particularly for thick specimens. Generally, when the source decays to an activity of about 5 Ci or less, it will be returned to the manufacturer as a radioactive waste. In this research, the optimum conditions for radiography of a 20 mm thick welded steel sample with 2.4 Ci Ir-192 was investigated using the CR system with high resolution image plate, i.e. type Bas-SR of the Fuji Film Co. Ltd. The I P was sandwiched by a pair of 0.25 mm thick Pb intensifying sere en. Low energy scattered radiations was filtered by placing another Pb sheet with a thickness of 3 mm under the cassette. It was found that the CR image could give a contrast sensitivity of 2.5 % using only 3-minute exposure time which was comparable to the image taken by the type II film with Pb intensifying screen using the exposure time of 45 minutes

  18. An apple B-box protein, MdCOL11, is involved in UV-B- and temperature-induced anthocyanin biosynthesis.

    Science.gov (United States)

    Bai, Songling; Saito, Takanori; Honda, Chikako; Hatsuyama, Yoshimichi; Ito, Akiko; Moriguchi, Takaya

    2014-11-01

    Our studies showed that an apple B-box protein, MdCOL11, the homolog of AtBBX22, is involved in UV-B- and temperature-induced anthocyanin biosynthesis in apple peel. Anthocyanin is responsible for the red pigmentation in apple peel and a R2R3 MYB gene, MdMYBA/1/10, a homolog of MdMYBA, controls its accumulation. Arabidopsis PAP1 is under the control of a series of upstream factors involved in light signal transduction and photomorphogenesis, such as ELONGATED HYPOCOTYL 5 (HY5) and B-box family (BBX) proteins. In this study, we identified and characterized the homolog of Arabidopsis BBX22 in apple, designated as MdCOL11. Overexpression of MdCOL11 in Arabidopsis enhanced the accumulation of anthocyanin. In apples, MdCOL11 was differentially expressed in all tissues, with the highest expression in petals and the lowest expression in the xylem. Transcripts of MdCOL11 noticeably accumulated at the ripening stage, concomitant with increases in the expressions of anthocyanin biosynthesis-related genes. In an in vitro treatment experiment, MdCOL11 was upregulated in an ultra-violet (UV)-B- and temperature-dependent manner, together with the inductions of anthocyanin biosynthesis-related genes and anthocyanin accumulation in apple peel. Furthermore, a dual-luciferase assay indicated that (1) MdCOL11 regulated the expression of MdMYBA and (2) MdCOL11 was a target of MdHY5. Taken together, our results suggest that MdCOL11 is involved in MdHY5-mediated signal transduction and regulates anthocyanin accumulation in apple peel, which sheds new light on anthocyanin accumulation in apples.

  19. Study of transition probabilities in 192Pt

    International Nuclear Information System (INIS)

    Roulet, C.; Sergolle, H.; Hubert, P.P.; Lindblad, T.

    1978-01-01

    The nucleus 192 Pt is Coulomb excited with 370 MeV 84 Kr projectiles. Levels up to spin 8 + (10 + ) in the ground band and up to 6 + in the γ-band are observed. The B(E2) values implied by the observed yields are compared with predictions of different nuclear models. Particular attention is paid to the ground band transition rates and the rotation-alignment model

  20. [Relationship between Q192R polymorphisms in paraoxonase 1 gene and young ischemic stroke].

    Science.gov (United States)

    Liu, Jing-li; Li, Jin-pin; Wang, Xiao-ling; Yang, Yi

    2010-04-06

    To investigate the relationship between polymorphisms in paraoxonase1 (PON1) gene Gln192Arg (Q192R) and arterial ischemic stroke in young adults. The Q192R genotype was analyzed by polymerase chain reaction in 131 young adults with ischemic stroke and 135 age- and gender-matched controls. The plasma lipids were also determined in patients and controls respectively. Furthermore, carotid artery intima-media thickness (IMT) in patients were measured by carotid ultrasonography. The distributions of Q192R genotype frequency were significantly different between patients with ischemic stroke and control individuals. And the patients had more RR genotypes than control individuals (P stroke were 1.743 (95% confidence interval [CI], 1.032-2.943) in subjects with RR genotype. We also studied the relationship between the polymorphisms and the lipid concentration in patients and control individuals. However, no significant association was detected between Q/R192 genotype and any of lipid measurements. Further, the prevalence of cigarette smoking, hypertension and diabetes showed no significant difference between RR and non-RR genotypes in patients. Body mass index (BMI) in two groups did not differ significantly. But IMT of patients with RR genotype obviously increased in comparison to those without RR genotype (P ischemic stroke in young adults. RR genotype is a genetic risk for young adults with ischemic stroke through an increased carotid artery intima-media thickness and an accelerated atherosclerotic process.

  1. Strategi Pemasaran Public Relations Md Entertainment Pada Pemasaran Film Habibie & Ainun

    OpenAIRE

    Permana, Trisna Adi; Puspitasari, Lilis

    2015-01-01

    Tujuan penelitian ini adalah untuk mengetahui perencanaan, implementasi serta evaluasi dari strategiMarketing Public Relations yang ditetapkan PR MD Entertainment pada film Habibie & Ainun pada tahun2012-2013. Metode yang dilakukan adalah metode deskriptif yang bertujuan melukiskan secara sistematisfakta atau karakteristik populasi tertentu atau bidang tertentu secara faktual dan cermat. Hasil penelitianmenunjukan PR MD Entertainment telah melakukan tahapan-tahapan atau Teknik PR pada film Ha...

  2. Dosimetry audit on the accuracy of 192Ir brachytherapy source strength determinations in Sweden

    Energy Technology Data Exchange (ETDEWEB)

    Carlsson Tedgren, Aasa

    2007-11-15

    The absorbed dose delivered to the patient in brachytherapy is directly proportional to the source strength in terms of the reference air-kerma rate (RAKR). Verification of this quantity by the hospitals is widely recognized as an important part of a quality assurance program. An external audit was performed on behalf of the Secondary Standard Dosimetry Laboratory at the Swedish Radiation Protection Authority (SSI). The aim was to investigate how accurately the source-strength in 192Ir brachytherapy is determined at Swedish hospitals. The SSI reference well-type ion chamber and calibrated equipment were used to measure the RAKR of an 192Ir source in each of the 14 Swedish afterloading units. Comparisons with values determined by vendors and hospitals were made. Agreement in values of RAKR as determined by SSI, hospitals and vendors were in all cases within the +-3% uncertainty (at a coverage factor of k=2), typically guaranteed by the vendors. The good agreement reflects the robustness and easy handling of well-type chambers designed for brachytherapy in use by all Swedish hospitals. The 192Ir calibration service planned at SSI will solve the hospitals current problem with recalibration of equipment. SSI can also advise hospitals to follow the IAEA recommendations for measurement techniques and maintenance of equipment. It is worthwhile for the hospitals to establish their own ratio (or deviation) with the vendor and follow it as function of time. Such a mean-ratio embeds systematic differences of various origins and have a lower uncertainty than has the RAKR alone, making it useful for early detection of problems with equipment or routines. SSI could also define requirements for the agreement between source strengths as determined by hospitals and vendors and couple this to an action plan, dependent on level of disagreement, and some kind of reporting to SSI

  3. Dosimetry audit on the accuracy of 192Ir brachytherapy source strength determinations in Sweden

    International Nuclear Information System (INIS)

    Carlsson Tedgren, Aasa

    2007-11-01

    The absorbed dose delivered to the patient in brachytherapy is directly proportional to the source strength in terms of the reference air-kerma rate (RAKR). Verification of this quantity by the hospitals is widely recognized as an important part of a quality assurance program. An external audit was performed on behalf of the Secondary Standard Dosimetry Laboratory at the Swedish Radiation Protection Authority (SSI). The aim was to investigate how accurately the source-strength in 192 Ir brachytherapy is determined at Swedish hospitals. The SSI reference well-type ion chamber and calibrated equipment were used to measure the RAKR of an 192 Ir source in each of the 14 Swedish afterloading units. Comparisons with values determined by vendors and hospitals were made. Agreement in values of RAKR as determined by SSI, hospitals and vendors were in all cases within the ±3% uncertainty (at a coverage factor of k=2), typically guaranteed by the vendors. The good agreement reflects the robustness and easy handling of well-type chambers designed for brachytherapy in use by all Swedish hospitals. The 192 Ir calibration service planned at SSI will solve the hospitals current problem with recalibration of equipment. SSI can also advise hospitals to follow the IAEA recommendations for measurement techniques and maintenance of equipment. It is worthwhile for the hospitals to establish their own ratio (or deviation) with the vendor and follow it as function of time. Such a mean-ratio embeds systematic differences of various origins and have a lower uncertainty than has the RAKR alone, making it useful for early detection of problems with equipment or routines. SSI could also define requirements for the agreement between source strengths as determined by hospitals and vendors and couple this to an action plan, dependent on level of disagreement, and some kind of reporting to SSI

  4. Angiotensin II induces kidney inflammatory injury and fibrosis through binding to myeloid differentiation protein-2 (MD2).

    Science.gov (United States)

    Xu, Zheng; Li, Weixin; Han, Jibo; Zou, Chunpeng; Huang, Weijian; Yu, Weihui; Shan, Xiaoou; Lum, Hazel; Li, Xiaokun; Liang, Guang

    2017-03-21

    Growing evidence indicates that angiotensin II (Ang II), a potent biologically active product of RAS, is a key regulator of renal inflammation and fibrosis. In this study, we tested the hypothesis that Ang II induces renal inflammatory injury and fibrosis through interaction with myeloid differentiation protein-2 (MD2), the accessory protein of toll-like receptor 4 (TLR4) of the immune system. Results indicated that in MD2 -/- mice, the Ang II-induced renal fibrosis, inflammation and kidney dysfunction were significantly reduced compared to control Ang II-infused wild-type mice. Similarly, in the presence of small molecule MD2 specific inhibitor L6H21 or siRNA-MD2, the Ang II-induced increases of pro-fibrotic and pro-inflammatory molecules were prevented in tubular NRK-52E cells. MD2 blockade also inhibited activation of NF-κB and ERK. Moreover, MD2 blockade prevented the Ang II-stimulated formation of the MD2/TLR4/MyD88 signaling complex, as well as the increased surface binding of Ang II in NRK-52E cells. In addition, Ang II directly bound recombinant MD2 protein, rather than TLR4 protein. We conclude that MD2 is a significant contributor in the Ang II-induced kidney inflammatory injury in chronic renal diseases. Furthermore, MD2 inhibition could be a new and important therapeutic strategy for preventing progression of chronic renal diseases.

  5. Image fusion in craniofacial virtual reality modeling based on CT and 3dMD photogrammetry.

    Science.gov (United States)

    Xin, Pengfei; Yu, Hongbo; Cheng, Huanchong; Shen, Shunyao; Shen, Steve G F

    2013-09-01

    The aim of this study was to demonstrate the feasibility of building a craniofacial virtual reality model by image fusion of 3-dimensional (3D) CT models and 3 dMD stereophotogrammetric facial surface. A CT scan and stereophotography were performed. The 3D CT models were reconstructed by Materialise Mimics software, and the stereophotogrammetric facial surface was reconstructed by 3 dMD patient software. All 3D CT models were exported as Stereo Lithography file format, and the 3 dMD model was exported as Virtual Reality Modeling Language file format. Image registration and fusion were performed in Mimics software. Genetic algorithm was used for precise image fusion alignment with minimum error. The 3D CT models and the 3 dMD stereophotogrammetric facial surface were finally merged into a single file and displayed using Deep Exploration software. Errors between the CT soft tissue model and 3 dMD facial surface were also analyzed. Virtual model based on CT-3 dMD image fusion clearly showed the photorealistic face and bone structures. Image registration errors in virtual face are mainly located in bilateral cheeks and eyeballs, and the errors are more than 1.5 mm. However, the image fusion of whole point cloud sets of CT and 3 dMD is acceptable with a minimum error that is less than 1 mm. The ease of use and high reliability of CT-3 dMD image fusion allows the 3D virtual head to be an accurate, realistic, and widespread tool, and has a great benefit to virtual face model.

  6. Learning binary code via PCA of angle projection for image retrieval

    Science.gov (United States)

    Yang, Fumeng; Ye, Zhiqiang; Wei, Xueqi; Wu, Congzhong

    2018-01-01

    With benefits of low storage costs and high query speeds, binary code representation methods are widely researched for efficiently retrieving large-scale data. In image hashing method, learning hashing function to embed highdimensions feature to Hamming space is a key step for accuracy retrieval. Principal component analysis (PCA) technical is widely used in compact hashing methods, and most these hashing methods adopt PCA projection functions to project the original data into several dimensions of real values, and then each of these projected dimensions is quantized into one bit by thresholding. The variances of different projected dimensions are different, and with real-valued projection produced more quantization error. To avoid the real-valued projection with large quantization error, in this paper we proposed to use Cosine similarity projection for each dimensions, the angle projection can keep the original structure and more compact with the Cosine-valued. We used our method combined the ITQ hashing algorithm, and the extensive experiments on the public CIFAR-10 and Caltech-256 datasets validate the effectiveness of the proposed method.

  7. 49 CFR 192.359 - Customer meter installations: Operating pressure.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 3 2010-10-01 2010-10-01 false Customer meter installations: Operating pressure... SAFETY TRANSPORTATION OF NATURAL AND OTHER GAS BY PIPELINE: MINIMUM FEDERAL SAFETY STANDARDS Customer Meters, Service Regulators, and Service Lines § 192.359 Customer meter installations: Operating pressure...

  8. 49 CFR 192.461 - External corrosion control: Protective coating.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 3 2010-10-01 2010-10-01 false External corrosion control: Protective coating... for Corrosion Control § 192.461 External corrosion control: Protective coating. (a) Each external protective coating, whether conductive or insulating, applied for the purpose of external corrosion control...

  9. Efficient Server-Aided Secure Two-Party Function Evaluation with Applications to Genomic Computation

    Science.gov (United States)

    2016-07-14

    sense that they can be used to securely evaluate arbitrary functions and offer attrac- tive performance compared to the state of the art . We apply the...seconds. The performance favor- ably compares to the state of the art (as detailed in section 7), in some cases achieving orders of magnitude...148 Table 1. Complexity of constructions in prior and our work. Party Communication Sym. key/hash op . Public key operations Security model [38], A O

  10. Overexpression of a Novel Apple NAC Transcription Factor Gene, MdNAC1, Confers the Dwarf Phenotype in Transgenic Apple (Malus domestica)

    Science.gov (United States)

    Jia, Dongfeng; Gong, Xiaoqing; Li, Mingjun; Li, Chao; Sun, Tingting

    2018-01-01

    Plant height is an important trait for fruit trees. The dwarf characteristic is commonly associated with highly efficient fruit production, a major objective when breeding for apple (Malus domestica). We studied the function of MdNAC1, a novel NAC transcription factor (TF) gene in apple related to plant dwarfing. Localized primarily to the nucleus, MdNAC1 has transcriptional activity in yeast cells. Overexpression of the gene results in a dwarf phenotype in transgenic apple plants. Their reduction in size is manifested by shorter, thinner stems and roots, and a smaller leaf area. The transgenics also have shorter internodes and fewer cells in the stems. Levels of endogenous abscisic acid (ABA) and brassinosteroid (BR) are lower in the transgenic plants, and expression is decreased for genes involved in the biosynthesis of those phytohormones. All of these findings demonstrate that MdNAC1 has a role in plants dwarfism, probably by regulating ABA and BR production. PMID:29702625

  11. An unusual dimeric structure and assembly for TLR4 regulator RP105-MD-1

    Energy Technology Data Exchange (ETDEWEB)

    Yoon, Sung-il; Hong, Minsun; Wilson, Ian A [Scripps

    2011-11-16

    RP105-MD-1 modulates the TLR4-MD-2-mediated, innate immune response against bacterial lipopolysaccharide (LPS). The crystal structure of the bovine 1:1 RP105-MD-1 complex bound to a putative endogenous lipid at 2.9 Å resolution shares a similar overall architecture to its homolog TLR4-MD-2 but assembles into an unusual 2:2 homodimer that differs from any other known TLR-ligand assembly. The homodimer is assembled in a head-to-head orientation that juxtaposes the N-terminal leucine-rich repeats (LRRs) of the two RP105 chains, rather than the usual tail-to-tail configuration of C-terminal LRRs in ligand-activated TLR dimers, such as TLR1-TRL2, TLR2-TLR6, TLR3-TLR3 and TLR4-TLR4. Another unusual interaction is mediated by an RP105-specific asparagine-linked glycan, which wedges MD-1 into the co-receptor binding concavity on RP105. This unique mode of assembly represents a new paradigm for TLR complexes and suggests a molecular mechanism for regulating LPS responses.

  12. Template-guided interstitial implants: Cs-137 reusable sources as a substitute for Ir-192

    International Nuclear Information System (INIS)

    Williamson, J.F.; Seminoff, T.

    1987-01-01

    Template-guided implantation of rigid steel or plastic guide needles for afterloading of radioactive sources is widely used in the treatment of gynecologic, rectal, and urologic malignant neoplasms. Iridium-192 is used almost universally, despite the high cost per implant, due to its short half-life and limited need for a flexible, trimmable source. A reusable afterloading system containing cesium-137 was developed. Each source has an effective active length of 6.8 cm and is encapsulated at the distal end of a 21-cm-long stainless steel tube. The sources can be afterloaded into the same plastic guide needles normally used for Ir-192 ribbons. Physical and dosimetric aspects of these sources are compared with those of Ir-192, and radiation protection and cost effectiveness are also discussed

  13. A projector of iridium 192 wires: motivations and preliminary studies

    International Nuclear Information System (INIS)

    Cosset, J.M.; Gerbaulet, A.; Chassagne, D.

    1979-01-01

    Though the majority of procedures involved in curietherapy with Iridium 192 wires cause very few problems concerning radiation protection, this is not true in all cases: in elderly of debilitated patients, young children, or when using special techniques (curietherapy for prostate of bladder cancers for example). In these cases, the need for frequent treatment exposes the therapists to increased doses. The projector of Iridium 192 wires was conceived in order to reduce this irradiated hazard. A simple manipulation places the radioactive wires in a lead container during treatment, and then replaces them in the right position after therapy. This apparatus appears to offer the possibility of: an almost total protection of the therapists, and thus an opportunity for enlarging the indications for curietherapy; an improved quality of treatment to the patient during the application [fr

  14. 49 CFR 192.111 - Design factor (F) for steel pipe.

    Science.gov (United States)

    2010-10-01

    ... NATURAL AND OTHER GAS BY PIPELINE: MINIMUM FEDERAL SAFETY STANDARDS Pipe Design § 192.111 Design factor (F... street, or a railroad; (3) Is supported by a vehicular, pedestrian, railroad, or pipeline bridge; or (4...

  15. 49 CFR Appendix B to Part 192 - Qualification of Pipe

    Science.gov (United States)

    2010-10-01

    ..., “Standard Specification for Carbon and Alloy Steel Pipe, Electric-Fusion-Welded for High Pressure Service at... by reference, see § 192.7). ASTM D2517—Thermosetting plastic pipe and tubing, “Standard Specification...

  16. Secured Hash Based Burst Header Authentication Design for Optical Burst Switched Networks

    Science.gov (United States)

    Balamurugan, A. M.; Sivasubramanian, A.; Parvathavarthini, B.

    2017-12-01

    The optical burst switching (OBS) is a promising technology that could meet the fast growing network demand. They are featured with the ability to meet the bandwidth requirement of applications that demand intensive bandwidth. OBS proves to be a satisfactory technology to tackle the huge bandwidth constraints, but suffers from security vulnerabilities. The objective of this proposed work is to design a faster and efficient burst header authentication algorithm for core nodes. There are two important key features in this work, viz., header encryption and authentication. Since the burst header is an important in optical burst switched network, it has to be encrypted; otherwise it is be prone to attack. The proposed MD5&RC4-4S based burst header authentication algorithm runs 20.75 ns faster than the conventional algorithms. The modification suggested in the proposed RC4-4S algorithm gives a better security and solves the correlation problems between the publicly known outputs during key generation phase. The modified MD5 recommended in this work provides 7.81 % better avalanche effect than the conventional algorithm. The device utilization result also shows the suitability of the proposed algorithm for header authentication in real time applications.

  17. Find an Orthopaedic Foot and Ankle MD/DO

    Science.gov (United States)

    ... All Site Content AOFAS / FootCareMD / Find a Surgeon Find a Foot & Ankle Orthopaedic Surgeon Page Content Who ... your prescribed treatment (surgical and/or non-surgical) ​ Find a Surgeon ​ Click here to find a foot ...

  18. 49 CFR 192.939 - What are the required reassessment intervals?

    Science.gov (United States)

    2010-10-01

    ....939 Section 192.939 Transportation Other Regulations Relating to Transportation (Continued) PIPELINE AND HAZARDOUS MATERIALS SAFETY ADMINISTRATION, DEPARTMENT OF TRANSPORTATION (CONTINUED) PIPELINE SAFETY TRANSPORTATION OF NATURAL AND OTHER GAS BY PIPELINE: MINIMUM FEDERAL SAFETY STANDARDS Gas...

  19. MD2725: 16L2 aperture measurement

    CERN Document Server

    Mirarchi, Daniele; Rossi, Roberto; CERN. Geneva. ATS Department

    2018-01-01

    Dumps induced by sudden increase of losses in the half-cell 16L2 have been a serious machine limitation during the 2017 run. The aim of this MD was to perform local aperture measurements in order to assess differences after the beam screen regeneration, compared to first measurements in 2017.

  20. Possibilities of production of neutron-rich Md isotopes in multi-nucleon transfer reactions

    Energy Technology Data Exchange (ETDEWEB)

    Mun, Myeong-Hwan; Lee, Young-Ouk [Korea Atomic Energy Research Institue, Daejeon (Korea, Republic of); Adamian, G.G.; Antonenko, N.V. [Joint Institute for Nuclear Research, Dubna (Russian Federation)

    2016-12-15

    The possibilities of production of yet unknown neutron-rich isotopes of Md are explored in several multi-nucleon transfer reactions with actinide targets and stable and radioactive beams. The projectile-target combinations and bombarding energies are suggested to produce new neutron-rich isotopes of Md in future experiments. (orig.)

  1. 49 CFR 192.947 - What records must an operator keep?

    Science.gov (United States)

    2010-10-01

    ... Section 192.947 Transportation Other Regulations Relating to Transportation (Continued) PIPELINE AND HAZARDOUS MATERIALS SAFETY ADMINISTRATION, DEPARTMENT OF TRANSPORTATION (CONTINUED) PIPELINE SAFETY TRANSPORTATION OF NATURAL AND OTHER GAS BY PIPELINE: MINIMUM FEDERAL SAFETY STANDARDS Gas Transmission Pipeline...

  2. 49 CFR 192.949 - How does an operator notify PHMSA?

    Science.gov (United States)

    2010-10-01

    ... 192.949 Transportation Other Regulations Relating to Transportation (Continued) PIPELINE AND HAZARDOUS MATERIALS SAFETY ADMINISTRATION, DEPARTMENT OF TRANSPORTATION (CONTINUED) PIPELINE SAFETY TRANSPORTATION OF NATURAL AND OTHER GAS BY PIPELINE: MINIMUM FEDERAL SAFETY STANDARDS Gas Transmission Pipeline Integrity...

  3. 49 CFR 192.1011 - What records must an operator keep?

    Science.gov (United States)

    2010-10-01

    ... Section 192.1011 Transportation Other Regulations Relating to Transportation (Continued) PIPELINE AND HAZARDOUS MATERIALS SAFETY ADMINISTRATION, DEPARTMENT OF TRANSPORTATION (CONTINUED) PIPELINE SAFETY TRANSPORTATION OF NATURAL AND OTHER GAS BY PIPELINE: MINIMUM FEDERAL SAFETY STANDARDS Gas Distribution Pipeline...

  4. Analyzing Permutations for AES-like Ciphers: Understanding ShiftRows

    DEFF Research Database (Denmark)

    Beierle, Christof; Jovanovic, Philipp; Lauridsen, Martin Mehl

    2015-01-01

    Designing block ciphers and hash functions in a manner that resemble the AES in many aspects has been very popular since Rijndael was adopted as the Advanced Encryption Standard. However, in sharp contrast to the MixColumns operation, the security implications of the way the state is permuted...... by the operation resembling ShiftRows has never been studied in depth. Here, we provide the first structured study of the influence of ShiftRows-like operations, or more generally, word-wise permutations, in AES-like ciphers with respect to diffusion properties and resistance towards differential- and linear...... normal form. Using a mixed-integer linear programming approach, we obtain optimal parameters for a wide range of AES-like ciphers, and show improvements on parameters for Rijndael-192, Rijndael-256, PRIMATEs-80 and Prøst-128. As a separate result, we show for specific cases of the state geometry...

  5. 49 CFR 192.487 - Remedial measures: Distribution lines other than cast iron or ductile iron lines.

    Science.gov (United States)

    2010-10-01

    ... cast iron or ductile iron lines. 192.487 Section 192.487 Transportation Other Regulations Relating to... iron or ductile iron lines. (a) General corrosion. Except for cast iron or ductile iron pipe, each... the purpose of this paragraph. (b) Localized corrosion pitting. Except for cast iron or ductile iron...

  6. 41 CFR 102-192.150 - What are your general responsibilities as a program level mail manager?

    Science.gov (United States)

    2010-07-01

    ... responsibilities as a program level mail manager? 102-192.150 Section 102-192.150 Public Contracts and Property... general responsibilities as a program level mail manager? Your responsibilities at the program level include— (a) Working closely with the agency mail manager and mail center managers who handle significant...

  7. Cognitive Functions and Neurodevelopmental Disorders Involving the Prefrontal Cortex and Mediodorsal Thalamus

    Directory of Open Access Journals (Sweden)

    Zakaria Ouhaz

    2018-02-01

    Full Text Available The mediodorsal nucleus of the thalamus (MD has been implicated in executive functions (such as planning, cognitive control, working memory, and decision-making because of its significant interconnectivity with the prefrontal cortex (PFC. Yet, whilst the roles of the PFC have been extensively studied, how the MD contributes to these cognitive functions remains relatively unclear. Recently, causal evidence in monkeys has demonstrated that in everyday tasks involving rapid updating (e.g., while learning something new, making decisions, or planning the next move, the MD and frontal cortex are working in close partnership. Furthermore, researchers studying the MD in rodents have been able to probe the underlying mechanisms of this relationship to give greater insights into how the frontal cortex and MD might interact during the performance of these essential tasks. This review summarizes the circuitry and known neuromodulators of the MD, and considers the most recent behavioral, cognitive, and neurophysiological studies conducted in monkeys and rodents; in total, this evidence demonstrates that MD makes a critical contribution to cognitive functions. We propose that communication occurs between the MD and the frontal cortex in an ongoing, fluid manner during rapid cognitive operations, via the means of efference copies of messages passed through transthalamic routes; the conductance of these messages may be modulated by other brain structures interconnected to the MD. This is similar to the way in which other thalamic structures have been suggested to carry out forward modeling associated with rapid motor responding and visual processing. Given this, and the marked thalamic pathophysiology now identified in many neuropsychiatric disorders, we suggest that changes in the different subdivisions of the MD and their interconnections with the cortex could plausibly give rise to a number of the otherwise disparate symptoms (including changes to olfaction

  8. 27 CFR 479.192 - Commerce in firearms and ammunition.

    Science.gov (United States)

    2010-04-01

    ... 27 Alcohol, Tobacco Products and Firearms 3 2010-04-01 2010-04-01 false Commerce in firearms and..., AND CERTAIN OTHER FIREARMS Other Laws Applicable § 479.192 Commerce in firearms and ammunition. For provisions relating to commerce in firearms and ammunition, including the movement of destructive devices...

  9. Comparison of 60Cobalt and 192Iridium sources in high dose rate afterloading brachytherapy

    International Nuclear Information System (INIS)

    Richter, J.; Baier, K.; Flentje, M.

    2008-01-01

    Purpose: 60 Co sources with dimensions identical to those of 192 Ir have recently been made available in clinical brachytherapy. A longer half time reduces demands on logistics and quality assurance and perhaps costs. Material and Methods: Comparison of the physical properties of 60 Co and 192 Ir with regard to brachytherapy. Results: Required activities for the same air kerma rate are lower by a factor of 2.8 for 60 Co. Differential absorption in tissues of different densities can be neglected. Monte Carlo calculations demonstrate that integral dose due to radial dose fall off is higher for 192 Ir in comparison to 60 Co within the first 22 cm from the source (normalization at 1 cm). At larger distances this relationship is reversed. Conclusion: Clinical examples for intracavitary and interstitial applications however, show practically identical dose distributions in the treatment volume. (orig.)

  10. Water at silica/liquid water interfaces investigated by DFT-MD simulations

    Science.gov (United States)

    Gaigeot, Marie-Pierre

    This talk is dedicated to probing the microscopic structural organization of water at silica/liquid water interfaces including electrolytes by first principles DFT-based molecular dynamics simulations (DFT-MD). We will present our very recent DFT-MD simulations of electrolytic (KCl, NaCl, NaI) silica/liquid water interfaces in order to unravel the intertwined structural properties of water and electrolytes at the crystalline quartz/liquid water and amorphous silica/liquid water interfaces. DFT-MD simulations provide direct knowledge of the structural organization of water and the H-Bond network formed between the water molecules within the different water layers above the silica surface. One can furthermore extract vibrational signatures of the water molecules within the interfacial layers from the DFT-MD simulations, especially non-linear SFG (Sum Frequency generation) signatures that are active at solid/liquid interfaces. The strength of the simulated spectra is that a detailed analysis of the signatures in terms of the water/water H-Bond networks formed within the interfacial water layers and in terms of the water/silica or water/electrolytes H-Bond networks can be given. Comparisons of SFG spectra between quartz/water/electrolytes and amorphous silica/water/electrolytes interfaces allow us to definitely conclude on how the structural arrangements of liquid water at these electrolytic interfaces modulate the final spectroscopic signatures. Invited speaker.

  11. Dosimetry audit on the accuracy of {sup 192}Ir brachytherapy source strength determinations in Sweden

    Energy Technology Data Exchange (ETDEWEB)

    Carlsson Tedgren, Aasa

    2007-11-15

    The absorbed dose delivered to the patient in brachytherapy is directly proportional to the source strength in terms of the reference air-kerma rate (RAKR). Verification of this quantity by the hospitals is widely recognized as an important part of a quality assurance program. An external audit was performed on behalf of the Secondary Standard Dosimetry Laboratory at the Swedish Radiation Protection Authority (SSI). The aim was to investigate how accurately the source-strength in {sup 192}Ir brachytherapy is determined at Swedish hospitals. The SSI reference well-type ion chamber and calibrated equipment were used to measure the RAKR of an {sup 192}Ir source in each of the 14 Swedish afterloading units. Comparisons with values determined by vendors and hospitals were made. Agreement in values of RAKR as determined by SSI, hospitals and vendors were in all cases within the {+-}3% uncertainty (at a coverage factor of k=2), typically guaranteed by the vendors. The good agreement reflects the robustness and easy handling of well-type chambers designed for brachytherapy in use by all Swedish hospitals. The {sup 192}Ir calibration service planned at SSI will solve the hospitals current problem with recalibration of equipment. SSI can also advise hospitals to follow the IAEA recommendations for measurement techniques and maintenance of equipment. It is worthwhile for the hospitals to establish their own ratio (or deviation) with the vendor and follow it as function of time. Such a mean-ratio embeds systematic differences of various origins and have a lower uncertainty than has the RAKR alone, making it useful for early detection of problems with equipment or routines. SSI could also define requirements for the agreement between source strengths as determined by hospitals and vendors and couple this to an action plan, dependent on level of disagreement, and some kind of reporting to SSI.

  12. Putting Wings on SPHINCS

    DEFF Research Database (Denmark)

    Kölbl, Stefan

    2018-01-01

    SPHINCS is a recently proposed stateless hash-based signature scheme and promising candidate for a post-quantum secure digital signature scheme. In this work we provide a comparison of the performance when instantiating SPHINCS with different cryptographic hash functions on both recent Intel...

  13. Hash functions and information theoretic security

    DEFF Research Database (Denmark)

    Bagheri, Nasoor; Knudsen, Lars Ramkilde; Naderi, Majid

    2009-01-01

    Information theoretic security is an important security notion in cryptography as it provides a true lower bound for attack complexities. However, in practice attacks often have a higher cost than the information theoretic bound. In this paper we study the relationship between information theoretic...

  14. Privacy amplification for quantum key distribution

    International Nuclear Information System (INIS)

    Watanabe, Yodai

    2007-01-01

    This paper examines classical privacy amplification using a universal family of hash functions. In quantum key distribution, the adversary's measurement can wait until the choice of hash functions is announced, and so the adversary's information may depend on the choice. Therefore the existing result on classical privacy amplification, which assumes the independence of the choice from the other random variables, is not applicable to this case. This paper provides a security proof of privacy amplification which is valid even when the adversary's information may depend on the choice of hash functions. The compression rate of the proposed privacy amplification can be taken to be the same as that of the existing one with an exponentially small loss in secrecy of a final key. (fast track communication)

  15. Associations between butane hash oil use and cannabis-related problems.

    Science.gov (United States)

    Meier, Madeline H

    2017-10-01

    High-potency cannabis concentrates are increasingly popular in the United States, and there is concern that use of high-potency cannabis might increase risk for cannabis-related problems. However, little is known about the potential negative consequences of concentrate use. This study reports on associations between past-year use of a high-potency cannabis concentrate, known as butane hash oil (BHO), and cannabis-related problems. A sample of 821 college students were recruited to complete a survey about their health and behavior. Participants who had used cannabis in the past year (33%, n=273) completed questions about their cannabis use, including their use of BHO and cannabis-related problems in eight domains: physical dependence, impaired control, academic-occupational problems, social-interpersonal problems, self-care problems, self-perception, risk behavior, and blackouts. Approximately 44% (n=121) of past-year cannabis users had used BHO in the past year. More frequent BHO use was associated with higher levels of physical dependence (RR=1.8, pcannabis-related academic/occupational problems (RR=1.5, p=0.004), poor self-care (RR=1.3, p=0.002), and cannabis-related risk behavior (RR=1.2, p=0.001). After accounting for sociodemographic factors, age of onset of cannabis use, sensation seeking, overall frequency of cannabis use, and frequency of other substance use, BHO use was still associated with higher levels of physical dependence (RR=1.2, p=0.014). BHO use is associated with greater physiological dependence on cannabis, even after accounting for potential confounders. Longitudinal research is needed to determine if cannabis users with higher levels of physiological dependence seek out BHO and/or if BHO use increases risk for physiological dependence. Copyright © 2017 Elsevier B.V. All rights reserved.

  16. 49 CFR 192.241 - Inspection and test of welds.

    Science.gov (United States)

    2010-10-01

    ... NATURAL AND OTHER GAS BY PIPELINE: MINIMUM FEDERAL SAFETY STANDARDS Welding of Steel in Pipelines § 192.241 Inspection and test of welds. (a) Visual inspection of welding must be conducted by an individual qualified by appropriate training and experience to ensure that: (1) The welding is performed in accordance...

  17. Usefulness of multidetector-row computed tomography (MD-CT) for diagnosis and evaluation of cardiovascular anomalies in infants

    International Nuclear Information System (INIS)

    Kani, Hiroyuki; Narabayashi, Isamu; Tanikake, Masato; Matsuki, Mitsuru; Uesugi, Yasuo

    2005-01-01

    We examined the effectiveness of multidetector-row CT (MD-CT) in the diagnosis and evaluation of cardiovascular anomalies in infants. MD-CT was performed 34 times on 21 patients with cardiovascular anomalies. We performed three evaluations: 1) The assessment of the specificity of MD-CT in detecting the morphological features of cardiovascular anomalies. 2) The diameters of aortae with coronary artery (CoA), and the diameters of pulmonary artery, measured by using MD-CT were compared with those by angiography. 3) The amount of exposure to radiation was measured. 1) MD-CT can detect CoA, pulmonary arteriovenous anomalies among extracardiac anomalies in all the patients. The diagnostic accuracy for intracardiac anomalies was poor as only six of the 15 anomalies could be accurately diagnosed. 2) The diameters of aortae and pulmonary artery obtained using MD-CT showed a good correlation with those obtained using arteriography (r=0.97, 0.95). 3) The average dose-length product was 269.2 mGy·cm. And the average effective dose was 5.1 mSv. MD-CT is not suitable for the evaluation of intracardiac anomalies, but is extremely effective in the evaluation of extracardiac major vascular anomalies. On the basis of the amount of information and noninvasive nature, MD-CT should be used first before angiography. (author)

  18. An assessment of communication skills of the MD/MS students of institute of medicine in Nepal

    Directory of Open Access Journals (Sweden)

    Jagdish Prasad Agrawal

    2013-09-01

    Full Text Available Introduction The main objective of this study was to assess the level of interpersonal communication skills of MD/MS resident doctors and to provide recommendations for the future. Methods Descriptive, cross sectional, qualitative and quantitative research design was used. 7- point Likert scale (0 to 6 MAAS-Global scoring instrument was used. The subjects of the research were the MD/MS residents from various departments of Maharajgunj Medical Campus (MMC of Institute of Medicine, Maharajgunj, Kathmandu. Out of 162 MD/MS residents, only 30 (18.5% MD/MS residents were selected for the sample size for the study from 1st, 2nd and 3rd year. One MD/MS resident was required four video recording to conduct four interviews with patients coming to the outpatient department. Results There was high degree of positive correlation between Information sharing and Management (r=0.746 whereas weak negative correlation on clarification and diagnosis (r=-0.011. Inter-rater correlation was established before hand and was satisfactory (p < 0.05. Conclusions This base line study of MD/MS residents shows that over all MD/MS residents are deficient in almost all the components of interpersonal communication skills. A communication skills training course in postgraduate medical education could improve the existing communication skills of the doctors in Nepal.

  19. Hybrid Pressure Retarded Osmosis−Membrane Distillation (PRO−MD) Process for Osmotic Power and Clean Water Generation

    KAUST Repository

    Han, Gang

    2015-05-20

    A novel pressure retarded osmosis−membrane distillation (PRO−MD) hybrid process has been experimentally conceived for sustainable production of renewable osmotic power and clean water from various waters. The proposed PRO−MD system may possess unique advantages of high water recovery rate, huge osmotic power generation, well controlled membrane fouling, and minimal environmental impacts. Experimental results show that the PRO−MD hybrid process is promising that not only can harvest osmotic energy from freshwater but also from wastewater. When employing a 2 M NaCl MD concentrate as the draw solution, ultrahigh power densities of 31.0 W/m2 and 9.3 W/m2 have been demonstrated by the PRO subsystem using deionized water and real wastewater brine as the feeds, respectively. Simultaneously, high purity potable water with a flux of 32.5−63.1 L/(m2.h) can be produced by the MD subsystem at 40−60 °C without any detrimental effects of fouling. The energy consumption in the MD subsystem might be further reduced by applying a heat exchanger in the hybrid system and using low-grade heat or solar energy to heat up the feed solution. The newly developed PRO−MD hybrid process would provide insightful guidelines for the exploration of alternative green technologies for renewable osmotic energy and clean water production.

  20. Overexpression of a repressor MdMYB15L negatively regulates anthocyanin and cold tolerance in red-fleshed callus.

    Science.gov (United States)

    Xu, Haifeng; Yang, Guanxian; Zhang, Jing; Wang, Yicheng; Zhang, Tianliang; Wang, Nan; Jiang, Shenghui; Zhang, Zongying; Chen, Xuesen

    2018-04-14

    The cold-induced metabolic pathway and anthocyanin biosynthesis play important roles in plant growth. In this study, we identified a bHLH binding motif in the MdMYB15L protein using protein sequence analyses. Yeast two-hybrid and pull-down assays showed that MdMYB15L could interact with MdbHLH33. Overexpressing MdMYB15L in red-fleshed callus inhibited the expression of MdCBF2 and resulted in reduced cold tolerance but did not affect anthocyanin levels. Chip-PCR and EMSA analysis showed that MdMYB15L could bind the type II cis-acting element found in the MdCBF2 promoter. Overexpressing MdMYB15L in red-fleshed callus overexpressing MdbHLH33 also reduced cold tolerance and reduced MdbHLH33-induced anthocyanin biosynthesis. Knocking out the bHLH binding sequence of MdMYB15L (LBSMdMYB15L) prevented LBSMdMYB15L from interacting with MdbHLH33. Overexpressing LBSMdMYB15L in red-fleshed callus overexpressing MdbHLH33 also reduced cold tolerance and reduced MdbHLH33-induced anthocyanin biosynthesis. Together, these results suggested that an apple repressor MdMYB15L might play a key role in the cold signaling and anthocyanin metabolic pathways. Copyright © 2018 Elsevier Inc. All rights reserved.

  1. Anomalous second ferromagnetic phase transition in Co{sub 0.08}Bi{sub 1.92}Se{sub 3} topological insulator

    Energy Technology Data Exchange (ETDEWEB)

    Zhang, Min, E-mail: zmzmi1987@163.com; Liu, Ligang; Yang, Hui

    2016-09-05

    We report the observation of ferromagnetism in topological insulator Co{sub 0.08}Bi{sub 1.92}Se{sub 3} single crystal. The structural, magnetic, and microstructure properties of Co{sub 0.08}Bi{sub 1.92}Se{sub 3} are investigated. The existence of complicated ferromagnetic ordering, indicates the anomalous second ferromagnetic phase transition below 30 K. Well-defined ferromagnetic hysteresis in the magnetization was found in the sample. The origin of bulk ferromagnetism in Co{sub 0.08}Bi{sub 1.92}Se{sub 3} is concerned with three aspects: Co cluster, RKKY interactions, and the spin texture of Co impurities. - Highlights: • The bulk ferromagnetism have been found in the C{sub o0.08}Bi{sub 1.92}Se{sub 3} single crystal. • The anomalous second ferromagnetic phase transition is found below 30 K. • The origin of bulk ferromagnetism in Co{sub 0.08}Bi{sub 1.92}Se{sub 3} is concerned with three aspects.

  2. Amniotic Fluid Soluble Myeloid Differentiation-2 (sMD-2) as Regulator of Intra-amniotic Inflammation in Infection-induced Preterm Birth.

    Science.gov (United States)

    Dulay, Antonette T; Buhimschi, Catalin S; Zhao, Guomao; Oliver, Emily A; Abdel-Razeq, Sonya S; Shook, Lydia L; Bahtiyar, Mert O; Buhimschi, Irina A

    2015-06-01

    TLR4 mediates host responses to pathogens through a mechanism that involves protein myeloid differentiation-2 (MD-2) and its soluble form sMD-2. The role of sMD2 in intra-amniotic inflammation-induced preterm birth has not been previously explored. Human amniotic fluid (AF) sMD-2 was studied by Western blotting in 152 AF samples of patients who had an amniocentesis to rule-out infection (yes infection, n = 50; no infection, n = 50) or women with normal pregnancy outcome (second trimester genetic karyotyping, n = 26; third trimester lung maturity testing, n = 26). Histological localization and mRNA expression of MD2 in fetal membranes were studied by immunohistochemistry and RT-PCR. The ability of fetal membrane to release sMD-2 and inflammatory cytokines was studied in vitro. Human AF contains three sMD-2 proteoforms whose levels of expression were lower at term. Intra-amniotic infection upregulated sMD-2. MD-2 mRNA and immunohistochemistry findings concurred. In vitro, LPS and monensin increased, while cycloheximide decreased sMD-2 production. Recombinant sMD-2 modulated TNF-α and IL-6 levels in a dose- and time-dependent fashion. sMD2 proteoforms are constitutively present in human AF. The intensity of the intra-amniotic inflammatory response to bacteria or perhaps to other TLR4 ligands may be facilitated through synthesis and release of sMD2 by the amniochorion. © 2015 John Wiley & Sons A/S. Published by John Wiley & Sons Ltd.

  3. User characteristics and effect profile of Butane Hash Oil: An extremely high-potency cannabis concentrate.

    Science.gov (United States)

    Chan, Gary C K; Hall, Wayne; Freeman, Tom P; Ferris, Jason; Kelly, Adrian B; Winstock, Adam

    2017-09-01

    Recent reports suggest an increase in use of extremely potent cannabis concentrates such as Butane Hash Oil (BHO) in some developed countries. The aims of this study were to examine the characteristics of BHO users and the effect profiles of BHO. Anonymous online survey in over 20 countries in 2014 and 2015. Participants aged 18 years or older were recruited through onward promotion and online social networks. The overall sample size was 181,870. In this sample, 46% (N=83,867) reported using some form of cannabis in the past year, and 3% reported BHO use (n=5922). Participants reported their use of 7 types of cannabis in the past 12 months, the source of their cannabis, reasons for use, use of other illegal substances, and lifetime diagnosis for depression, anxiety and psychosis. Participants were asked to rate subjective effects of BHO and high potency herbal cannabis. Participants who reported a lifetime diagnosis of depression (OR=1.15, p=0.003), anxiety (OR=1.72, pcannabis. BHO users also reported stronger negative effects and less positive effects when using BHO than high potency herbal cannabis (pcannabis. Copyright © 2017. Published by Elsevier B.V.

  4. 49 CFR 192.719 - Transmission lines: Testing of repairs.

    Science.gov (United States)

    2010-10-01

    ... pipe before it is installed. (b) Testing of repairs made by welding. Each repair made by welding in... 49 Transportation 3 2010-10-01 2010-10-01 false Transmission lines: Testing of repairs. 192.719... Transmission lines: Testing of repairs. (a) Testing of replacement pipe. If a segment of transmission line is...

  5. Thomas Secker M.D.: Archbishop and man-midwife.

    Science.gov (United States)

    Morgan-Guy, John

    2018-05-01

    This paper provides a biographical outline of the career of Thomas Secker, MD, who from 1758-68 was Archbishop of Canterbury. Although much has been written on Secker, this study seeks to highlight his training in medicine, which has been largely overlooked hitherto by historians.

  6. Superdeformation studies in the odd-odd nucleus {sup 192}Tl

    Energy Technology Data Exchange (ETDEWEB)

    Fischer, S.; Carpenter, M.P.; Janssens, R.V.F. [and others

    1995-08-01

    The study of yrast and near-yrast structures of odd-odd nuclei to high spins is somewhat limited due to the complexity of the spectra resulting from the many proton-neutron couplings near the Fermi surface. In superdeformed nuclei, the number of available protons and neutrons near the Fermi surface is somewhat limited due to the presence of large-shell gaps which stabilize the nuclear shape. A relatively small number of available neutron and proton configurations can lead to fragmentation of the SD intensity into a number of different bands. Two good examples of this phenomenon were found in {sup 192}Tl and {sup 194}Tl where the presence of six superdeformed bands were reported in both nuclei. We reexamined {sup 192}Tl at Gammasphere using the {sup 160}Gd({sup 37}Cl,5n) reaction at 178 MeV to populate states in the superdeformed well of this nucleus. While our previous study on {sup 192}Tl at ATLAS was very successful, a number of questions remained which formed the basis of our objectives in this experiment: obtain better {gamma}-ray energies for the known transitions and identify higher spin members in each band; determine how the bands feed the known yrast states in {sup 192}Tl as well as determine the complete spectrum in coincidence with the SD bands; look for M1 transitions connecting proposed signature partners; and attempt to identify other excitations in the superdeformed well. Analysis is underway and four of the six bands were confirmed. The reasons that two of the reported bands were not observed in this latest work is still under investigation. As of this time, no other superdeformed bands were identified in the data. Two of the confirmed SD bands have a constant moment of inertia and show indications of cross-talk between each other. This observation is not unexpected since the calculated M1 rates for the proposed configuration of the band, {pi}{sub 13/2} x {upsilon}j{sub 15/2}, indicate that M1 transitions linking the two SD bands should be observed.

  7. Humanized TLR4/MD-2 mice reveal LPS recognition differentially impacts susceptibility to Yersinia pestis and Salmonella enterica.

    Directory of Open Access Journals (Sweden)

    Adeline M Hajjar

    Full Text Available Although lipopolysaccharide (LPS stimulation through the Toll-like receptor (TLR-4/MD-2 receptor complex activates host defense against Gram-negative bacterial pathogens, how species-specific differences in LPS recognition impact host defense remains undefined. Herein, we establish how temperature dependent shifts in the lipid A of Yersinia pestis LPS that differentially impact recognition by mouse versus human TLR4/MD-2 dictate infection susceptibility. When grown at 37°C, Y. pestis LPS is hypo-acylated and less stimulatory to human compared with murine TLR4/MD-2. By contrast, when grown at reduced temperatures, Y. pestis LPS is more acylated, and stimulates cells equally via human and mouse TLR4/MD-2. To investigate how these temperature dependent shifts in LPS impact infection susceptibility, transgenic mice expressing human rather than mouse TLR4/MD-2 were generated. We found the increased susceptibility to Y. pestis for "humanized" TLR4/MD-2 mice directly paralleled blunted inflammatory cytokine production in response to stimulation with purified LPS. By contrast, for other Gram-negative pathogens with highly acylated lipid A including Salmonella enterica or Escherichia coli, infection susceptibility and the response after stimulation with LPS were indistinguishable between mice expressing human or mouse TLR4/MD-2. Thus, Y. pestis exploits temperature-dependent shifts in LPS acylation to selectively evade recognition by human TLR4/MD-2 uncovered with "humanized" TLR4/MD-2 transgenic mice.

  8. Humanized TLR4/MD-2 mice reveal LPS recognition differentially impacts susceptibility to Yersinia pestis and Salmonella enterica.

    Science.gov (United States)

    Hajjar, Adeline M; Ernst, Robert K; Fortuno, Edgardo S; Brasfield, Alicia S; Yam, Cathy S; Newlon, Lindsay A; Kollmann, Tobias R; Miller, Samuel I; Wilson, Christopher B

    2012-01-01

    Although lipopolysaccharide (LPS) stimulation through the Toll-like receptor (TLR)-4/MD-2 receptor complex activates host defense against Gram-negative bacterial pathogens, how species-specific differences in LPS recognition impact host defense remains undefined. Herein, we establish how temperature dependent shifts in the lipid A of Yersinia pestis LPS that differentially impact recognition by mouse versus human TLR4/MD-2 dictate infection susceptibility. When grown at 37°C, Y. pestis LPS is hypo-acylated and less stimulatory to human compared with murine TLR4/MD-2. By contrast, when grown at reduced temperatures, Y. pestis LPS is more acylated, and stimulates cells equally via human and mouse TLR4/MD-2. To investigate how these temperature dependent shifts in LPS impact infection susceptibility, transgenic mice expressing human rather than mouse TLR4/MD-2 were generated. We found the increased susceptibility to Y. pestis for "humanized" TLR4/MD-2 mice directly paralleled blunted inflammatory cytokine production in response to stimulation with purified LPS. By contrast, for other Gram-negative pathogens with highly acylated lipid A including Salmonella enterica or Escherichia coli, infection susceptibility and the response after stimulation with LPS were indistinguishable between mice expressing human or mouse TLR4/MD-2. Thus, Y. pestis exploits temperature-dependent shifts in LPS acylation to selectively evade recognition by human TLR4/MD-2 uncovered with "humanized" TLR4/MD-2 transgenic mice.

  9. The Expression of miR-192 and Its Significance in Diabetic Nephropathy Patients with Different Urine Albumin Creatinine Ratio

    Directory of Open Access Journals (Sweden)

    Xiaoyu Ma

    2016-01-01

    Full Text Available Objective. To investigate the expression of miR-192 and its significance in diabetic nephropathy (DN patients. Methods. 464 patients with type 2 diabetes mellitus (T2DM were divided into normal albuminuria group (NA, n=157, microalbuminuria group (MA, n=159, and large amount of albuminuria group (LA, n=148. 127 healthy persons were selected as the control group (NC, n=127. The serum miR-192 levels were detected by Real-Time PCR and transforming growth factor-β1 (TGF-β1 and fibronectin (FN were detected by enzyme-linked immunosorbent assay. The relationships among these parameters were analyzed by Pearson correlation analysis and multiple linear regression analysis. Results. The miR-192 in the LA group was significantly lower than other groups, which was lower in the MA group than in the NA group (P<0.01. The TGF-β1 and FN in the LA group were significantly higher than other groups, which were higher in the MA group than in the NA group (P<0.01. The expression of miR-192 was negatively correlated with TGF-β1, FN, and Ln (UACR and miR-192, TGF-β1, and FN were independent relevant factors affecting Ln (UACR in T2DM (P<0.01. Conclusions. These findings indicate that the levels of miR-192 were lower accompanied by the decrease of urine albumin creatinine ratio (UACR and the association between miR-192 and nephritic fibrosis in DN.

  10. 49 CFR 192.123 - Design limitations for plastic pipe.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 3 2010-10-01 2010-10-01 false Design limitations for plastic pipe. 192.123... Design limitations for plastic pipe. (a) Except as provided in paragraph (e) and paragraph (f) of this section, the design pressure may not exceed a gauge pressure of 100 psig (689 kPa) for plastic pipe used...

  11. Toward endobronchial Ir-192 high-dose-rate brachytherapy therapeutic optimization

    International Nuclear Information System (INIS)

    Gay, H A; Allison, R R; Downie, G H; Mota, H C; Austerlitz, C; Jenkins, T; Sibata, C H

    2007-01-01

    A number of patients with lung cancer receive either palliative or curative high-dose-rate (HDR) endobronchial brachytherapy. Up to a third of patients treated with endobronchial HDR die from hemoptysis. Rather than accept hemoptysis as an expected potential consequence of HDR, we have calculated the radial dose distribution for an Ir-192 HDR source, rigorously examined the dose and prescription points recommended by the American Brachytherapy Society (ABS), and performed a radiobiological-based analysis. The radial dose rate of a commercially available Ir-192 source was calculated with a Monte Carlo simulation. Based on the linear quadratic model, the estimated palliative, curative and blood vessel rupture radii from the center of an Ir-192 source were obtained for the ABS recommendations and a series of customized HDR prescriptions. The estimated radius at risk for blood vessel perforation for the ABS recommendations ranges from 7 to 9 mm. An optimized prescription may in some situations reduce this radius to 4 mm. The estimated blood perforation radius is generally smaller than the palliative radius. Optimized and individualized endobronchial HDR prescriptions are currently feasible based on our current understanding of tumor and normal tissue radiobiology. Individualized prescriptions could minimize complications such as fatal hemoptysis without sacrificing efficacy. Fiducial stents, HDR catheter centering or spacers and the use of CT imaging to better assess the relationship between the catheter and blood vessels promise to be useful strategies for increasing the therapeutic index of this treatment modality. Prospective trials employing treatment optimization algorithms are needed

  12. The role of MD and MBA training in the professional development of a physician: a survey of 30 years of graduates from the Wharton Health Care Management Program.

    Science.gov (United States)

    Patel, Mitesh S; Arora, Vishal; Patel, Mamta S; Kinney, June M; Pauly, Mark V; Asch, David A

    2014-09-01

    The number of medical schools offering MD and MBA training has increased fivefold in the last two decades. The authors evaluated graduates' perceptions of the role of such training on their career and professional development. In 2011, the authors surveyed physician graduates from the Wharton School MBA Program in Heath Care Management at the University of Pennsylvania from 1981 to 2010. Survey responses were analyzed and evaluated using grounded theory. Among 247 eligible graduates, 59.9% (148/247) completed the questionnaire and 89.9% (133/148) of them provided free-text responses. Approximately 85.1% (126/148) of respondents were male and 79.7% (118/148) entered residency training; however, both rates declined slightly over time. Among respondents within their first decade after graduation, 46.2% (24/52) reported clinical practice as their primary work sector compared with 39.5% (15/38) among respondents 11 to 20 years after graduation and 19.2% (5/26) of respondents 21 to 30 years after graduation. Overall, graduates reported mostly positive attitudes and often noted the benefits of career acceleration, professional flexibility, and credibility in multidisciplinary domains. The few negative remarks were focused on the opportunity cost of time and how peers in one discipline may negatively perceive the role of the other discipline's degree. Graduates with an MD and MBA report mostly positive attitudes towards their training, and many are pursuing leadership and primarily nonclinical roles later in their careers. These findings reveal new insights for policies affecting physician workforce. Further study is necessary to evaluate whether similar trends exist more broadly.

  13. XMSS : a practical forward secure signature scheme based on minimal security assumptions

    NARCIS (Netherlands)

    Buchmann, Johannes; Dahmen, Erik; Hülsing, Andreas; Yang, B.-Y.

    2011-01-01

    We present the hash-based signature scheme XMSS. It is the first provably (forward) secure and practical signature scheme with minimal security requirements: a pseudorandom and a second preimage resistant (hash) function family. Its signature size is reduced to less than 25% compared to the best

  14. High-spin states in the 192Pb and 193Pb isotopes

    International Nuclear Information System (INIS)

    Lagrange, J.M.; Pautrat, M.

    1991-01-01

    The 193 Pb and 192 Pb isotopes are produced through the 182 W( 16 O, 5n, 6n) reactions. The de-excitation γ-ray and conversion electron spectra lead to the conversion coefficients for most transitions. With the results of the γ-γ and e - -γ coincidences, the half-lives measured for several states, the angular distribution coefficients for the odd isotope and the transition multipolarities, the data on the 192 Pb level scheme has been much enhanced and the 193 Pb one studied for the first time. The experimental schemes are compared to those given by microscopic calculations, in a two or three quasi-particle approximation using a surface delta interaction with a reduced pairing component. The discrepancies between theory and experiment are attributed to the increasing influence of proton configurations

  15. 76 FR 15214 - Special Local Regulations for Marine Events; Potomac River, Charles County, MD

    Science.gov (United States)

    2011-03-21

    ...-AA08 Special Local Regulations for Marine Events; Potomac River, Charles County, MD AGENCY: Coast Guard... for Marine Events; Potomac River, Charles County, MD'' in the Federal Register (76 FR 1381). We... follows: Sec. 100.35-T05-1113 Special Local Regulations for Marine Events; Potomac River, Charles County...

  16. 76 FR 1381 - Special Local Regulations for Marine Events; Potomac River, Charles County, MD

    Science.gov (United States)

    2011-01-10

    ...-AA08 Special Local Regulations for Marine Events; Potomac River, Charles County, MD AGENCY: Coast Guard... Regulations for Marine Events; Potomac River, Charles County, MD. (a) Regulated area. The following location... local regulations during the ``Potomac River Sharkfest Swim'' amateur swim, a marine event to be held on...

  17. Summary of LHC MD 369: DOROS vs WBTN in IR Stripline BPMs

    CERN Document Server

    Draskovic, Drasko; Calvo Giraldo, Eva; Olexa, Jakub; Gasior, Marek; CERN. Geneva. ATS Department

    2015-01-01

    The aim of this MD is to quantify the impact of the stripline beam position monitor (BPM) directivity with two acquisition chain electronics systems, WBTN (Wide Band Time Normalizer) and DOROS (Diode ORbit and Oscillation System). This impact depends on the relative position and intensity of the two beams at the location of the monitor. This note explains all the procedures of the LHC MD 369, which took place on 20/07/2015 and presents the obtained results.

  18. Effect of salinity and temperature on treatment of concentrated wastewater from RO by FO-MD

    Science.gov (United States)

    Zhou, Yingru; Huang, Manhong; Deng, Qian

    2018-02-01

    In this study the appropriate temperature of the membrane distillation (MD) hot side (the permeation flux of MD was controlled by adjusting the hot side temperature) was selected according to the water flux of FO process so that the water transfer rate on both sides of FO and MD was consistent and the FO-MD process could be stable operation. When the salt concentration of feed solution was 30, 55, 80 and 100 g/L, the desalination rates changed little, which were 99.1%, 98.4%, 98.9% and 98.7%, respectively. The removal rate of COD was 93.8%, 94.2%, 91.6% and 92.7% which also changed little like the desalination rates. The removal rate of chromaticity increased with the increase of salinity, which attained 96.6%, 97.0%, 97.2% and 97.9%, respectively. This study proved that salinity of the feed solution affected little on the removal rate of contaminants but great on the water flux, with the increase of salinity from 30 to 100 g/L, the water flux was 6.05, 4.81, 4.33 and 3.87 LMH with the appropriate temperature (67.5±0.5, 64.5±0.5, 62.5±0.5 and 60.5±0.5 °C) of MD hot side. In a word, FO-MD was first used to treat the high salinity RO water with over 30 g/L total dissolved solids (TDS), FO-MD was a promising new process for high salinity wastewater treatment, and the hybrid system can solve the problem of lower draw solution concentration, and the high-quality production water will be obtained directly by this hybrid system with low membrane fouling tendency.

  19. Design and implementation of an ASIP-based cryptography processor for AES, IDEA, and MD5

    OpenAIRE

    Karim Shahbazi; Mohammad Eshghi; Reza Faghih Mirzaee

    2017-01-01

    In this paper, a new 32-bit ASIP-based crypto processor for AES, IDEA, and MD5 is designed. The instruction-set consists of both general purpose and specific instructions for the above cryptographic algorithms. The proposed architecture has nine function units and two data buses. It has also two types of 32-bit instruction formats for executing Memory Reference (M.R.), Register Reference (R.R.), and Input/Output Reference (I/O R.) instructions. The maximum achieved frequency is 166.916 MHz. T...

  20. Computer dosimetry of 192Ir wire

    International Nuclear Information System (INIS)

    Kline, R.W.; Gillin, M.T.; Grimm, D.F.; Niroomand-Rad, A.

    1985-01-01

    The dosimetry of 192 Ir linear sources with a commercial treatment planning computer system has been evaluated. Reference dose rate data were selected from the literature and normalized in a manner consistent with our clinical and dosimetric terminology. The results of the computer calculations are compared to the reference data and good agreement is shown at distances within about 7 cm from a linear source. The methodology of translating source calibration in terms of exposure rate for use in the treatment planning computer is developed. This may be useful as a practical guideline for users of similar computer calculation programs for iridium as well as other sources

  1. 77 FR 6708 - Special Local Regulations for Marine Events; Potomac River, Charles County, MD

    Science.gov (United States)

    2012-02-09

    ...-AA08 Special Local Regulations for Marine Events; Potomac River, Charles County, MD AGENCY: Coast Guard... River, Charles County, MD. (a) Regulated area. The following location is a regulated area: All waters of... local regulations during the ``Potomac River Sharkfest Swim'' amateur swim, a marine event to be held on...

  2. PC (programmable controller) 'HISEC 04-M/D, DG for industrial plant control

    International Nuclear Information System (INIS)

    Takakura, Mitsuro; Tennichi, Yasuhiro; Kato, Takayoshi; Yamaoka, Hiromasa

    1986-01-01

    While the decentralization and total digitization of control system have advanced, programmable controllers that electric control engineers can easily handle have developed in their function and performance. Besides, recent control system became large scale and complex, on the other hand, the needs of improving product quality and productivity increased, accordingly, the programmable controllers which can meet higher function and rapid control and realize the minimum interface in both hardware and software have been demanded. Hitachi Ltd. has completed the programmable controller ''HISEC 04-M/OG'', in which the heightening of performance was planned, the multiple controller system having process input and output equipments in common can be made, and the economical efficiency was pursued by adopting optical multiple transmission system, so as to be able to build up an optimum decentralized system. In this report, the outline of HISEC 04-M/D, DG and the function, a typical system constitution, and the function of a programming and debugging tool are described. When high reliability is required, a tripled system is offered. In this case, a multiport process input/output equipment is connected to three CPUs. (Kako, I.)

  3. Opinion of stakeholders on existing curriculum for postgraduate (MD) course in Pharmacology: A survey.

    Science.gov (United States)

    Badyal, Dinesh K; Daniel, Sujit R

    2016-10-01

    To survey the opinion about various curricular components of Doctor of Medicine (MD) pharmacology curriculum in India by stakeholders, including faculty and students. An online survey was done to evaluate the various curricular components of MD pharmacology curriculum being used in India. A total of 393 respondents including faculty, MD students, and other stakeholders completed the survey. The survey was developed using SurveyMonkey platform and link to survey was E-mailed to stakeholders. The results were expressed as percentages. There was a balanced representation of respondents from various designations, teaching experience, regions, and age groups. Most of the respondents (83%) were aware of the MD pharmacology curriculum. However, they reported that it is more inclined to knowledge domain. About half of respondents (53%) said that animal experiments are being used. The most common teaching methods mentioned are seminars (98.5%), journal clubs (95%), and practical exercises by postgraduates (73%), but there is less use of newer methods (25%) in theory and less of clinical pharmacology exercise (39%) in practical classes. The log books are maintained but not assessed regularly. Internal assessment is sparingly used. The MD pharmacology curriculum needs to be made uniform at the national level and updated to include the newer methods in teaching-learning and assessment. There should be sharing of newer methods at a common platform implemented at the national level.

  4. Review of 40-year MD theses in Medical Oncology

    International Nuclear Information System (INIS)

    Zeeneldin, A.; Diyaa, A.; Elgammal, M.; Buhoush, W.; Manar Moneer, M.

    2014-01-01

    Background and objective: It is almost 40 years since the foundation of the Medical Oncology (MO) Department. We aimed to appraise the clinical research to fulfill the Medical Doctorate (MD) degree in MO at the National Cancer Institute, Cairo University (NCI, CU). Methods: This review included 62 MD theses containing 66 studies. They were reviewed regarding aims, type of study, clinical trial phase, design and methodology, statistical tests, results, limitations, consent and IRB approval. Theses were grouped into 3 periods: 1970-1989, 1990-1999 and 2000- 2008. Results: Almost 76% of the studies were interventional and 24% were observational. Informed consent and Institutional Review Board approval were mentioned in 18 and 2 studies, respectively. While all studies mentioned the aims, none, clearly mentioned the research question. Outcomes were mainly efficacy followed by safety. Study design was inadequately considered, especially in 70’s–80’s period (p = 0.038). Median sample size and study duration were almost stable through the three periods (p = 0.441, 0.354, respectively). Most of the studies used both descriptive and analytical statistical methods. In a descending order, researched cancers were lymphoma, breast, leukemia, liver, urinary bladder, lung and colorectal. The commonest stages researched were IV and III. The number of studies focused on assessing biomarkers, biomarkers plus drugs/procedures, drugs and procedures are 20, 20, 16 and 6, respectively. Conclusion: With time, research within MD theses in MO increased quantitatively and qualitatively. Improvements were noticeable in documentation of study design.

  5. 75 FR 76688 - Drawbridge Operation Regulation; Isle of Wight (Sinepuxent) Bay, Ocean City, MD

    Science.gov (United States)

    2010-12-09

    ..., mile 0.5, at Ocean City, with a vertical clearance of 13 feet above mean high tide in the closed...-AA09 Drawbridge Operation Regulation; Isle of Wight (Sinepuxent) Bay, Ocean City, MD AGENCY: Coast... Ocean City, MD. This proposed rule will require any mariner requesting an opening in the evening hours...

  6. A Genetic Biomarker of Oxidative Stress, the Paraoxonase-1 Q192R Gene Variant, Associates with Cardiomyopathy in CKD: A Longitudinal Study

    Directory of Open Access Journals (Sweden)

    E. Dounousi

    2016-01-01

    Full Text Available Background. Oxidative stress is a hallmark of CKD and this alteration is strongly implicated in LV hypertrophy and in LV dysfunction. Methods and Patients. We resorted to the strongest genetic biomarker of paraoxonase-1 (PON1 activity, the Q192R variant in the PON1 gene, to unbiasedly assess (Mendelian randomization the cross-sectional and longitudinal association of this gene-variant with LV mass and function in 206 CKD patients with a 3-year follow-up. Results. The R allele of Q192R polymorphism associated with oxidative stress as assessed by plasma 8-isoPGF2α (P=0.03 and was dose-dependently related in a direct fashion to LVMI (QQ: 131.4 ± 42.6 g/m2; RQ: 147.7 ± 51.1 g/m2; RR: 167.3 ± 41.9 g/m2; P=0.001 and in an inverse fashion to systolic function (LV Ejection Fraction (QQ: 79 ± 12%; RQ: 69 ± 9%; RR: 65 ± 10% P=0.002. On longitudinal observation, this gene variant associated with the evolution of the same echocardiographic indicators [LVMI: 13.40 g/m2 per risk allele, P=0.005; LVEF: −2.96% per risk allele, P=0.001]. Multivariate analyses did not modify these associations. Conclusion. In CKD patients, the R allele of the Q192R variant in the PON1 gene is dose-dependently related to the severity of LVH and LV dysfunction and associates with the longitudinal evolution of these cardiac alterations. These results are compatible with the hypothesis that oxidative stress is implicated in cardiomyopathy in CKD patients.

  7. Problems associated with iridium-192 wire implants

    International Nuclear Information System (INIS)

    Arnott, S.J.; Law, J.; Ash, D.; Flynn, A.; Paine, C.H.; Durrant, K.R.; Barber, C.D.; Dixon-Brown, A.

    1985-01-01

    Three incidents are reported, from different radiotherapy centres, in which an implanted iridium-192 wire remained in the tissues of a patient after withdrawal of the plastic tubing in which it was contained. In each case the instrument used to cut the wire had probably formed a hook on the end of the wire which caused it to catch in the tissues. Detailed recommendations are made for avoiding such incidents in the future, the most important of which is that the patient should be effectively monitored after the supposed removal of all radioactive sources. (author)

  8. Dosimetry experience of 192IR sources used In HDR brachytherapy for cervical cancer

    International Nuclear Information System (INIS)

    Daci, Lulzime; Myrku, Rodina Cela

    2013-01-01

    Purpose/Objective: The 192IR Sources are the most commonly used in radiotherapy treatments HDR worldwide. According to international recommendations on quality assurance in HDR brachytherapy, an acceptance test based on the determination of the source strength of any new source shall be carried out before first application to verify the manufacturer’s calibration data. The present paper gives the experimental determination of the source strength for our brachytherapy sources used until now in brachytherapy treatments. Materials/Methods: At Mother Teresa University Hospital we have a cost-effective gynecological brachytherapy unit from Eckert & Ziegler BEBIG named GyneSource® that is a five channel HDR after loader equipped with an 192IR source. The software used is HDR plus™ 2.5 that delivers an optimized treatment plan and makes the process especially fast and we use intracavitary BEBIG applicators. From April 2009 up to December 2012, we have imported nine HDR 192IR Sources. The exchange of the source and acceptance test is done by the physicist of the clinic once the source is imported. The measurements are done with a Well-type ionization chamber HDR1000 Plus and the electrometer used is MAX4000. Only seven sources are compared as we miss the dosimetry data of the first source, and the forth source was not measured and not used because the machine was not working in that time. Results/Conclusions: Eight sources were accepted for clinically use as the measurement were within the tolerance. The source number four with e deviation of -1.92% has been double checked compared with a free in-air measurement with farmer type chamber that gave a deviation to source certificate of 4% that is still inside the tolerance to accept a source for clinical use. The deviations of measured Air Kerma rate to the value of the sources certificates of all our used 192IR sources are less than 2%, which are within the tolerance. The checked value of updated source strength in

  9. Development of an Iridium-192 seed for use in ophthalmic brachytherapy

    International Nuclear Information System (INIS)

    Mattos, Fabio R.; Rostelato, Maria Elisa C.M.; Zeituni, Carlos; Moura, Joao A.; Costa, Osvaldo L.; Feher, Anselmo; Moura, Eduardo S.; Souza, Carla D.; Peleias Junior, Fernando S.

    2011-01-01

    The Institute for Energy and Nuclear Research (IPEN), in partnership with the School or Medicine (UNIFESP), created a project that aims to develop and implement an ophthalmic therapeutic treatment for cancer with Iridium-192 seeds. The School of Medicine treats many cancer cases in the SUS (Brazilian Public Health System), and brachytherapy group of IPEN has extensive experience in prototype sources. The seed to be manufactured will perform as follows: a core of Iridium-192 is packaged inside small cylindrical seeds consist of a titanium capsule of 0.8 mm outer diameter, 0.05 mm wall thickness and 4 5 mm in length. The core is an alloy of platinum-iridium (20/80) of 3.0 mm in length and 0.3 mm in diameter. Material analysis, neutron activation and activity measurements were carried out. (author)

  10. Dosimetric intercomparison of permanent Ho-166 seed's implants and HDR Ir-192 brachytherapy in breast cancer.

    Science.gov (United States)

    de Campos, Tarcisio Passos Ribeiro; Nogueira, Luciana Batista; Trindade, Bruno; Cuperschmid, Ethel Mizrahy

    2016-01-01

    To provide a comparative dosimetric analysis of permanent implants of Ho(166)-seeds and temporary HDR Ir(192)-brachytherapy through computational simulation. Brachytherapy with Ir(192)-HDR or LDR based on temporary wires or permanent radioactive seed implants can be used as dose reinforcement for breast radiation therapy. Permanent breast implants have not been a practical clinical routine; although, I(125) and Pd(103)-seeds have already been reported. Biodegradable Ho(166)-ceramic-seeds have been addressed recently. Simulations of implants of nine Ho(166)-seeds and equivalent with HDR Ir(192)-brachytherapy were elaborated in MCNP5, shaped in a computational multivoxel simulator which reproduced a female thorax phantom. Spatial dose rate distributions and dose-volume histograms were generated. Protocol's analysis involving exposure time, seed's activities and dose were performed. Permanent Ho(166)-seed implants presented a maximum dose rate per unit of contained activity (MDR) of 1.1601 μGy h(-1) Bq(-1); and, a normalized MDR in standard points (8 mm, equidistant to 03-seeds - SP1, 10 mm - SP2) of 1.0% (SP1) and 0.5% (SP2), respectively. Ir(192)-brachytherapy presented MDR of 4.3945 × 10(-3) μGy h(-1) Bq(-1); and, 30% (SP1), and 20% (SP2). Therefore, seed's implant activities of 333 MBq (Ho(166)) and 259 GBq (Ir(192)) produced prescribed doses of 58 Gy (SP1; 5d) and 56 Gy (SP1, 5 fractions, 6 min), respectively. Breast Ho(166)-implants of 37-111 MBq are attractive due to the high dose rate near 6-10 mm from seeds, equivalent to Ir(192)-brachytherapy of 259 GBq (3 fractions, 6 min) providing similar dose in standard points at a week; however, with spatial dose distribution better confined. The seed positioning can be adjusted for controlling the breast tumor, in stages I and II, in flat and deep tumors, without any breast volumetric limitation.

  11. MD Test of a Ballistic Optics

    CERN Document Server

    Garcia-Tabares Valdivieso, Ana; Salvachua Ferrando, Belen Maria; Skowronski, Piotr Krzysztof; Solfaroli Camillocci, Matteo; Tomas Garcia, Rogelio; Wenninger, Jorg; Coello De Portugal - Martinez Vazquez, Jaime Maria; CERN. Geneva. ATS Department

    2016-01-01

    The ballistic optics is designed to improve the understanding of optical errors and BPM systematic effects in the critical triplet region. The particularity of that optics is that the triplet is switched off, effectively transforming the triplets on both sides of IR1 and IR5 into drift spaces. Advantage can be taken from that fact to localize better errors in the Q4-Q5-triplet region. During this MD this new optics was tested for the first time at injection with beam 2.

  12. Study and development of an Iridium-192 seed for use in ophthalmic cancer; Estudo e desenvolvimento de uma semente de iridio-192 para aplicacao em cancer oftalmico

    Energy Technology Data Exchange (ETDEWEB)

    Mattos, Fabio Rodrigues de

    2013-07-01

    Even ocular tumors are not among the cases with a higher incidence, they affect the population, especially children. The Institute of Energy and Nuclear Research (IPEN-CNEN/SP) in partnership with Escola Paulista de Medicina (UNIFESP), created a project to develop and implement a alternative treatment for ophthalmic cancer that use brachytherapy iridium-192 seeds. The project arose by reason of the Escola Paulista treat many cancer cases within the Unified Health System (SUS) and the research experience of sealed radioactive sources group at IPEN. The methodology was developed from the available infrastructure and the experience of researchers. The prototype seed presents with a core (192-iridium alloy of iridium-platinum) of 3.0 mm long sealed by a capsule of titanium of 0.8 mm outside diameter, 0.05 mm wall thickness and 4,5mm long. This work aims to study and develop a seed of iridium-192 from a platinum-iridium alloy. No study on the fabrication of these seeds was found in available literature. It was created a methodology that involved: characterization of the material used in the core, creation of device for neutron activation irradiation and and seed sealing tests. As a result, proved the feasibility of the method. As a suggestion for future work, studies regarding metrology and dosimetry of these sources and improvement of the methodology should be carried out, for future implementation in national scope. (author)

  13. Extrahepatic bile duct carcinoma treated by intraluminal irradiation with iridium-192 wire

    International Nuclear Information System (INIS)

    Ikeda, Hiro; Kuroda, Tomosumi; Uchida, Hideo

    1980-01-01

    A 57-year-old male with obstructive jaundice was diagnosed extrahepatic bile duct carcinoma at bifurcation by percutaneous transhepatic cholangiography (PTC). He was treated 3,300 rad of external irradiation and then intraluminal irradiation using the Iridium-192 wire by two times with the aid of PTC internal drainage, each was given by the dose of 1,600 rad at 5 mm inside the tumor from the PTC-tube. He had been well for about 1 year and then died because of ascites and cachexia. Autopsy revealed only microscopic tumor cells remaining around the common duct below the cystic junction. It was confirmed that intraluminal irradiation using the Iridium-192 wire was potentially curable and easily applicable to the bile duct carcinoma. (author)

  14. MD/MBA programs in the United States: evidence of a change in health care leadership.

    Science.gov (United States)

    Larson, David B; Chandler, Maria; Forman, Howard P

    2003-03-01

    Managerial sciences are playing an increasingly prominent role in the organization and delivery of health care. Despite popular media reports that a rising number of physicians are acquiring a background in this discipline through MD/MBA (medical and master of business administration) programs, no recent study has verified this. This study measured changes in the number and nature of the affiliations between management and medicine in the form of MD/MBA programs in the United States. Surveys of admission officers of 125 U.S. allopathic medical schools and of the overseers of each joint MD/MBA degree program were administered in May-October 2001. Main outcome measures included program growth, curriculum and degree requirements, application and admission requirements, and program leadership and organization. The number of MD/MBA programs grew from six to 33 between 1993 and 2001, and 17 more medical schools were considering establishing the joint-degree program. Ten, 15, and 20 programs produced 27, 42, and 61 graduates in 1999, 2000, and 2001, respectively, and over 100 students were expected to graduate per year when all 33 programs matured. Program structures and oversight indicate a spectrum of philosophies regarding the appropriate level of integration of the two degrees. MD/MBA programs apparently attempt to complement medical education with management education rather than the converse. The growth in the numbers of MD/MBA programs and participants indicates rising cooperation between medical and business schools and increasing interest in management education early in the careers of graduating physicians.

  15. Dose determination in breast tumor in brachytherapy using Iridium-192

    International Nuclear Information System (INIS)

    Okuno, S.F.

    1984-01-01

    Thermoluminescent dosimetry studies in vivo and in vitro aiming to determing radiation dose in the breast tumor, in brachytherapy using Iridium-192 was done. The correlation between radiation doses in tumor and external surface of the breast was investigated for correcting the time interval of radiation source implantation. (author) [pt

  16. 41 CFR 102-192.175 - What types of support does GSA offer to Federal agency mail management programs?

    Science.gov (United States)

    2010-07-01

    ... in mail management and mail operations; (b) Identifying better business practices and sharing them... 41 Public Contracts and Property Management 3 2010-07-01 2010-07-01 false What types of support does GSA offer to Federal agency mail management programs? 102-192.175 Section 102-192.175 Public...

  17. JST Thesaurus Headwords and Synonyms: Md [MeCab user dictionary for science technology term[Archive

    Lifescience Database Archive (English)

    Full Text Available MeCab user dictionary for science technology term Md 名詞 一般 * * * * メンデレビウム メンデレビウム メンデレビューム Thesaurus2015 200906022783221535 C CA03 UNKNOWN_1 Md

  18. Towards multidimensional radiotherapy (MD-CRT): biological imaging and biological conformality

    International Nuclear Information System (INIS)

    Ling, C. Clifton; Humm, John; Larson, Steven; Amols, Howard; Fuks, Zvi; Leibel, Steven; Koutcher, Jason A.

    2000-01-01

    Purpose: The goals of this study were to survey and summarize the advances in imaging that have potential applications in radiation oncology, and to explore the concept of integrating physical and biological conformality in multidimensional conformal radiotherapy (MD-CRT). Methods and Materials: The advances in three-dimensional conformal radiotherapy (3D-CRT) have greatly improved the physical conformality of treatment planning and delivery. The development of intensity-modulated radiotherapy (IMRT) has provided the 'dose painting' or 'dose sculpting' ability to further customize the delivered dose distribution. The improved capabilities of nuclear magnetic resonance imaging and spectroscopy, and of positron emission tomography, are beginning to provide physiological and functional information about the tumor and its surroundings. In addition, molecular imaging promises to reveal tumor biology at the genotype and phenotype level. These developments converge to provide significant opportunities for enhancing the success of radiotherapy. Results: The ability of IMRT to deliver nonuniform dose patterns by design brings to fore the question of how to 'dose paint' and 'dose sculpt', leading to the suggestion that 'biological' images may be of assistance. In contrast to the conventional radiological images that primarily provide anatomical information, biological images reveal metabolic, functional, physiological, genotypic, and phenotypic data. Important for radiotherapy, the new and noninvasive imaging methods may yield three-dimensional radiobiological information. Studies are urgently needed to identify genotypes and phenotypes that affect radiosensitivity, and to devise methods to image them noninvasively. Incremental to the concept of gross, clinical, and planning target volumes (GTV, CTV, and PTV), we propose the concept of 'biological target volume' (BTV) and hypothesize that BTV can be derived from biological images and that their use may incrementally improve

  19. Differential Fault Analysis on CLEFIA with 128, 192, and 256-Bit Keys

    Science.gov (United States)

    Takahashi, Junko; Fukunaga, Toshinori

    This paper describes a differential fault analysis (DFA) attack against CLEFIA. The proposed attack can be applied to CLEFIA with all supported keys: 128, 192, and 256-bit keys. DFA is a type of side-channel attack. This attack enables the recovery of secret keys by injecting faults into a secure device during its computation of the cryptographic algorithm and comparing the correct ciphertext with the faulty one. CLEFIA is a 128-bit blockcipher with 128, 192, and 256-bit keys developed by the Sony Corporation in 2007. CLEFIA employs a generalized Feistel structure with four data lines. We developed a new attack method that uses this characteristic structure of the CLEFIA algorithm. On the basis of the proposed attack, only 2 pairs of correct and faulty ciphertexts are needed to retrieve the 128-bit key, and 10.78 pairs on average are needed to retrieve the 192 and 256-bit keys. The proposed attack is more efficient than any previously reported. In order to verify the proposed attack and estimate the calculation time to recover the secret key, we conducted an attack simulation using a PC. The simulation results show that we can obtain each secret key within three minutes on average. This result shows that we can obtain the entire key within a feasible computational time.

  20. Effect of source encapsulation on the energy spectra of sup 192 Ir and sup 137 Cs seed sources

    Energy Technology Data Exchange (ETDEWEB)

    Thomason, C [Wisconsin Univ., Madison, WI (USA). Dept. of Medical Physics; Mackie, T R [Wisconsin Univ., Madison, WI (USA). Dept. of Medical Physics Wisconsin Univ., Madison, WI (USA). Dept. of Human Oncology; Lindstrom, M J [Wisconsin Univ., Madison, WI (USA). Biostatistics Center

    1991-04-01

    The effect of source encapsulation on the energy spectra of {sup 192}Ir and {sup 137}Cs seed sources, both with stainless steel and with platinum encapsulation, was determined from results of Monte Carlo simulation. The fractional scatter dose around these sources has also been determined from Monte Carlo simulation. The platinum-encapsulated {sup 192}Ir source exhibited greater attenuation of the primary spectrum, as expected, and, consistent with this greater attenuation, exhibited more scattered radiation. Significantly less scatter was seen with the {sup 137}Cs source than with either {sup 192}Ir source, as is consistent with the higher-energy photons from {sup 137}Cs. (author).