WorldWideScience

Sample records for host identity protocol

  1. SAVAH: Source Address Validation with Host Identity Protocol

    Science.gov (United States)

    Kuptsov, Dmitriy; Gurtov, Andrei

    Explosive growth of the Internet and lack of mechanisms that validate the authenticity of a packet source produced serious security and accounting issues. In this paper, we propose validating source addresses in LAN using Host Identity Protocol (HIP) deployed in a first-hop router. Compared to alternative solutions such as CGA, our approach is suitable both for IPv4 and IPv6. We have implemented SAVAH in Wi-Fi access points and evaluated its overhead for clients and the first-hop router.

  2. Electronic Voting Protocol Using Identity-Based Cryptography

    Directory of Open Access Journals (Sweden)

    Gina Gallegos-Garcia

    2015-01-01

    Full Text Available Electronic voting protocols proposed to date meet their properties based on Public Key Cryptography (PKC, which offers high flexibility through key agreement protocols and authentication mechanisms. However, when PKC is used, it is necessary to implement Certification Authority (CA to provide certificates which bind public keys to entities and enable verification of such public key bindings. Consequently, the components of the protocol increase notably. An alternative is to use Identity-Based Encryption (IBE. With this kind of cryptography, it is possible to have all the benefits offered by PKC, without neither the need of certificates nor all the core components of a Public Key Infrastructure (PKI. Considering the aforementioned, in this paper we propose an electronic voting protocol, which meets the privacy and robustness properties by using bilinear maps.

  3. Electronic Voting Protocol Using Identity-Based Cryptography.

    Science.gov (United States)

    Gallegos-Garcia, Gina; Tapia-Recillas, Horacio

    2015-01-01

    Electronic voting protocols proposed to date meet their properties based on Public Key Cryptography (PKC), which offers high flexibility through key agreement protocols and authentication mechanisms. However, when PKC is used, it is necessary to implement Certification Authority (CA) to provide certificates which bind public keys to entities and enable verification of such public key bindings. Consequently, the components of the protocol increase notably. An alternative is to use Identity-Based Encryption (IBE). With this kind of cryptography, it is possible to have all the benefits offered by PKC, without neither the need of certificates nor all the core components of a Public Key Infrastructure (PKI). Considering the aforementioned, in this paper we propose an electronic voting protocol, which meets the privacy and robustness properties by using bilinear maps.

  4. Secure Protocol for “Host — NFC Reader” Communication

    Directory of Open Access Journals (Sweden)

    A. O. Menshenin

    2012-06-01

    Full Text Available The paper presents a secure protocol for communication between host and NFC reader. The protocol protection scheme uses symmetric cipher with cyclic session key generation and provides confidentiality, integrity, end parties authentication and resistance to replay attacks. Deployment scenario in a typical electronic payment system is also presented.

  5. Weaknesses of a dynamic identity based authentication protocol for multi-server architecture

    OpenAIRE

    Han, Weiwei

    2012-01-01

    Recently, Li et al. proposed a dynamic identity based authentication protocol for multi-server architecture. They claimed their protocol is secure and can withstand various attacks. But we found some security loopholes in the protocol. Accordingly, the current paper demonstrates that Li et al.'s protocol is vulnerable to the replay attack, the password guessing attack and the masquerade attack.

  6. A Composed Protocol of Quantum Identity Authentication Plus Quantum Key Distribution Based on Squeezed States

    International Nuclear Information System (INIS)

    Zhang Sheng; Wang Jian; Tang Chaojing; Zhang Quan

    2011-01-01

    It is established that a single quantum cryptography protocol usually cooperates with other cryptographic systems, such as an authentication system, in the real world. However, few protocols have been proposed on how to combine two or more quantum protocols. To fill this gap, we propose a composed quantum protocol, containing both quantum identity authentication and quantum key distribution, using squeezed states. Hence, not only the identity can be verified, but also a new private key can be generated by our new protocol. We also analyze the security under an optimal attack, and the efficiency, which is defined by the threshold of the tolerant error rate, using Gaussian error function. (general)

  7. Adequate Security Protocols Adopt in a Conceptual Model in Identity Management for the Civil Registry of Ecuador

    Science.gov (United States)

    Toapanta, Moisés; Mafla, Enrique; Orizaga, Antonio

    2017-08-01

    We analyzed the problems of security of the information of the civil registries and identification at world level that are considered strategic. The objective is to adopt the appropriate security protocols in a conceptual model in the identity management for the Civil Registry of Ecuador. In this phase, the appropriate security protocols were determined in a Conceptual Model in Identity Management with Authentication, Authorization and Auditing (AAA). We used the deductive method and exploratory research to define the appropriate security protocols to be adopted in the identity model: IPSec, DNSsec, Radius, SSL, TLS, IEEE 802.1X EAP, Set. It was a prototype of the location of the security protocols adopted in the logical design of the technological infrastructure considering the conceptual model for Identity, Authentication, Authorization, and Audit management. It was concluded that the adopted protocols are appropriate for a distributed database and should have a direct relationship with the algorithms, which allows vulnerability and risk mitigation taking into account confidentiality, integrity and availability (CIA).

  8. The effect of perceived overqualification on job satisfaction and career satisfaction among immigrants: Does host national identity matter?

    Science.gov (United States)

    Wassermann, Maria; Fujishiro, Kaori; Hoppe, Annekatrin

    2017-11-01

    Overqualification is a form of person-job misfit that is common among those who reside in a foreign country. It is associated with poor work-related well-being and can inhibit full adjustment to the host society. The goal of our study is to examine the impact of perceived overqualification on job satisfaction and career satisfaction among immigrants. Furthermore, we investigated immigrants' host national identity as a moderator of the impact of perceived overqualification on job satisfaction and career satisfaction. We analysed longitudinal online survey data from 124 Italian and Spanish immigrants who migrated to Germany between 2000 and 2014. Regression analyses show that perceived overqualification is negatively associated with job satisfaction six months later. Furthermore, host national identity moderates the association between perceived overqualification and job satisfaction: low overqualification is beneficial for job satisfaction whereas high overqualification is a threat for job satisfaction, especially for immigrants who identify strongly with the host society. We do not find corresponding direct and moderating effects on career satisfaction. We conclude that indicators of acculturation, such as host national identity, are worth considering in order to understand the impact of person-job misfit on work-related well-being among immigrants.

  9. Host identity is a dominant driver of mycorrhizal fungal community composition during ecosystem development.

    Science.gov (United States)

    Martínez-García, Laura B; Richardson, Sarah J; Tylianakis, Jason M; Peltzer, Duane A; Dickie, Ian A

    2015-03-01

    Little is known about the response of arbuscular mycorrhizal fungal communities to ecosystem development. We use a long-term soil chronosequence that includes ecosystem progression and retrogression to quantify the importance of host plant identity as a factor driving fungal community composition during ecosystem development. We identified arbuscular mycorrhizal fungi and plant species from 50 individual roots from each of 10 sites spanning 5-120 000 yr of ecosystem age using terminal restriction fragment length polymorphism (T-RFLP), Sanger sequencing and pyrosequencing. Arbuscular mycorrhizal fungal communities were highly structured by ecosystem age. There was strong niche differentiation, with different groups of operational taxonomic units (OTUs) being characteristic of early succession, ecosystem progression and ecosystem retrogression. Fungal alpha diversity decreased with ecosystem age, whereas beta diversity was high at early stages and lower in subsequent stages. A total of 39% of the variance in fungal communities was explained by host plant and site age, 29% of which was attributed to host and the interaction between host and site (24% and 5%, respectively). The strong response of arbuscular mycorrhizal fungi to ecosystem development appears to be largely driven by plant host identity, supporting the concept that plant and fungal communities are tightly coupled rather than independently responding to habitat. © 2014 The Authors. New Phytologist © 2014 New Phytologist Trust.

  10. A network identity authentication protocol of bank account system based on fingerprint identification and mixed encryption

    Science.gov (United States)

    Zhu, Lijuan; Liu, Jingao

    2013-07-01

    This paper describes a network identity authentication protocol of bank account system based on fingerprint identification and mixed encryption. This protocol can provide every bank user a safe and effective way to manage his own bank account, and also can effectively prevent the hacker attacks and bank clerk crime, so that it is absolute to guarantee the legitimate rights and interests of bank users.

  11. From Having Fun to Applause: The Study of Relationships among Festival Benefits, Festival Identity and Festival Support by Viewpoints of the Hosts and Guests

    Directory of Open Access Journals (Sweden)

    Kai-Chih Chang

    2017-12-01

    Full Text Available The sustainable development of the festival depends on the support and participation of residents and tourists. There are a number of practical and theoretical gaps regarding the hosts and guests in festival literature. This study attempts to fill the host–guest gap based on the theory of reasoned action to construct and exam a relationship model. Taking the 2016 Summer Festival during busy season as an example in Hualien, 1165 questionnaires were valid, and data were analyzed by SEM (structural equation modeling. Results showed that the hosts had higher perception than the guests in terms of the festival benefits, identity, and support. This study has two concept models: the guest model and the host model. In the host model, the local-development benefits have more positive relationships to affect the festival support and festival identity than the recreation-experience benefits. On the other hand, the recreation-experience benefits could affect the festival support, but the festival identity could not in the guest model. The results of this study indicate that the festival organizers or the public sectors must be pay attention to the viewpoints of the guests and hosts in order to achieve the sustainable development objectives.

  12. Globus Nexus: A Platform-as-a-Service Provider of Research Identity, Profile, and Group Management.

    Science.gov (United States)

    Chard, Kyle; Lidman, Mattias; McCollam, Brendan; Bryan, Josh; Ananthakrishnan, Rachana; Tuecke, Steven; Foster, Ian

    2016-03-01

    Globus Nexus is a professionally hosted Platform-as-a-Service that provides identity, profile and group management functionality for the research community. Many collaborative e-Science applications need to manage large numbers of user identities, profiles, and groups. However, developing and maintaining such capabilities is often challenging given the complexity of modern security protocols and requirements for scalable, robust, and highly available implementations. By outsourcing this functionality to Globus Nexus, developers can leverage best-practice implementations without incurring development and operations overhead. Users benefit from enhanced capabilities such as identity federation, flexible profile management, and user-oriented group management. In this paper we present Globus Nexus, describe its capabilities and architecture, summarize how several e-Science applications leverage these capabilities, and present results that characterize its scalability, reliability, and availability.

  13. Globus Nexus: A Platform-as-a-Service provider of research identity, profile, and group management

    Energy Technology Data Exchange (ETDEWEB)

    Chard, Kyle; Lidman, Mattias; McCollam, Brendan; Bryan, Josh; Ananthakrishnan, Rachana; Tuecke, Steven; Foster, Ian

    2016-03-01

    Globus Nexus is a professionally hosted Platform-as-a-Service that provides identity, profile and group management functionality for the research community. Many collaborative e-Science applications need to manage large numbers of user identities, profiles, and groups. However, developing and maintaining such capabilities is often challenging given the complexity of modern security protocols and requirements for scalable, robust, and highly available implementations. By outsourcing this functionality to Globus Nexus, developers can leverage best-practice implementations without incurring development and operations overhead. Users benefit from enhanced capabilities such as identity federation, flexible profile management, and user-oriented group management. In this paper we present Globus Nexus, describe its capabilities and architecture, summarize how several e-Science applications leverage these capabilities, and present results that characterize its scalability, reliability, and availability.

  14. Temporal Progression of Retinal Progenitor Cell Identity: Implications in Cell Replacement Therapies

    Directory of Open Access Journals (Sweden)

    Awais Javed

    2017-12-01

    Full Text Available Retinal degenerative diseases, which lead to the death of rod and cone photoreceptor cells, are the leading cause of inherited vision loss worldwide. Induced pluripotent or embryonic stem cells (iPSCs/ESCs have been proposed as a possible source of new photoreceptors to restore vision in these conditions. The proof of concept studies carried out in mouse models of retinal degeneration over the past decade have highlighted several limitations for cell replacement in the retina, such as the low efficiency of cone photoreceptor production from stem cell cultures and the poor integration of grafted cells in the host retina. Current protocols to generate photoreceptors from stem cells are largely based on the use of extracellular factors. Although these factors are essential to induce the retinal progenitor cell (RPC fate from iPSCs/ESCs, developmental studies have shown that RPCs alter fate output as a function of time (i.e., their temporal identity to generate the seven major classes of retinal cell types, rather than spatial position. Surprisingly, current stem cell differentiation protocols largely ignore the intrinsic temporal identity of dividing RPCs, which we argue likely explains the low efficiency of cone production in such cultures. In this article, we briefly review the mechanisms regulating temporal identity in RPCs and discuss how they could be exploited to improve cone photoreceptor production for cell replacement therapies.

  15. Integrated Detection of Pathogens and Host Biomarkers for Wounds

    Energy Technology Data Exchange (ETDEWEB)

    Jaing, C

    2012-03-19

    The increasing incidence and complications arising from combat wounds has necessitated a reassessment of methods for effective treatment. Infection, excessive inflammation, and incidence of drug-resistant organisms all contribute toward negative outcomes for afflicted individuals. The organisms and host processes involved in wound progression, however, are incompletely understood. We therefore set out, using our unique technical resources, to construct a profile of combat wounds which did or did not successfully resolve. We employed the Lawrence Livermore Microbial Detection Array and identified a number of nosocomial pathogens present in wound samples. Some of these identities corresponded with bacterial isolates previously cultured, while others were not obtained via standard microbiology. Further, we optimized proteomics protocols for the identification of host biomarkers indicative of various stages in wound progression. In combination with our pathogen data, our biomarker discovery efforts will provide a profile corresponding to wound complications, and will assist significantly in treatment of these complex cases.

  16. Blind quantum computation with identity authentication

    Science.gov (United States)

    Li, Qin; Li, Zhulin; Chan, Wai Hong; Zhang, Shengyu; Liu, Chengdong

    2018-04-01

    Blind quantum computation (BQC) allows a client with relatively few quantum resources or poor quantum technologies to delegate his computational problem to a quantum server such that the client's input, output, and algorithm are kept private. However, all existing BQC protocols focus on correctness verification of quantum computation but neglect authentication of participants' identity which probably leads to man-in-the-middle attacks or denial-of-service attacks. In this work, we use quantum identification to overcome such two kinds of attack for BQC, which will be called QI-BQC. We propose two QI-BQC protocols based on a typical single-server BQC protocol and a double-server BQC protocol. The two protocols can ensure both data integrity and mutual identification between participants with the help of a third trusted party (TTP). In addition, an unjammable public channel between a client and a server which is indispensable in previous BQC protocols is unnecessary, although it is required between TTP and each participant at some instant. Furthermore, the method to achieve identity verification in the presented protocols is general and it can be applied to other similar BQC protocols.

  17. An SDN-Based Authentication Mechanism for Securing Neighbor Discovery Protocol in IPv6

    Directory of Open Access Journals (Sweden)

    Yiqin Lu

    2017-01-01

    Full Text Available The Neighbor Discovery Protocol (NDP is one of the main protocols in the Internet Protocol version 6 (IPv6 suite, and it provides many basic functions for the normal operation of IPv6 in a local area network (LAN, such as address autoconfiguration and address resolution. However, it has many vulnerabilities that can be used by malicious nodes to launch attacks, because the NDP messages are easily spoofed without protection. Surrounding this problem, many solutions have been proposed for securing NDP, but these solutions either proposed new protocols that need to be supported by all nodes or built mechanisms that require the cooperation of all nodes, which is inevitable in the traditional distributed networks. Nevertheless, Software-Defined Networking (SDN provides a new perspective to think about protecting NDP. In this paper, we proposed an SDN-based authentication mechanism to verify the identity of NDP packets transmitted in a LAN. Using the centralized control and programmability of SDN, it can effectively prevent the spoofing attacks and other derived attacks based on spoofing. In addition, this mechanism needs no additional protocol supporting or configuration at hosts and routers and does not introduce any dedicated devices.

  18. Communities of Putative Ericoid Mycorrhizal Fungi Isolated from Alpine Dwarf Shrubs in Japan: Effects of Host Identity and Microhabitat.

    Science.gov (United States)

    Koizumi, Takahiko; Nara, Kazuhide

    2017-06-24

    Dwarf shrubs of the family Ericaceae are common in arctic and alpine regions. Many of these plants are associated with ericoid mycorrhizal (ERM) fungi, which allow them to take nutrients and water from the soil under harsh environmental conditions and, thus, affect host plant survival. Despite the importance of ERM fungi to alpine plant communities, limited information is available on the effects of microhabitat and host identity on ERM fungal communities. We investigated the communities of putative ERM fungi isolated from five dwarf shrub species (Arcterica nana, Diapensia lapponica, Empetrum nigrum, Loiseleuria procumbens, and Vaccinium vitis-idaea) that co-occur in an alpine region of Japan, with reference to distinct microhabitats provided by large stone pine (Pinus pumila) shrubs (i.e. bare ground, the edge of stone pine shrubs, and the inside of stone pine shrubs). We obtained 703 fungal isolates from 222 individual plants. These isolates were classified into 55 operational taxonomic units (OTUs) based on the sequencing of internal transcribed spacer regions in ribosomal DNA. These putative ERM fungal communities were dominated by Helotiales fungi for all host species. Cistella and Trimmatostroma species, which have rarely been detected in ERM roots in previous studies, were abundant. ERM fungal communities were significantly different among microhabitats (R 2 =0.28), while the host effect explained less variance in the fungal communities after excluding the microhabitat effect (R 2 =0.17). Our results suggest that the host effect on ERM fungal communities is minor and the distributions of hosts and fungal communities may be assessed based on microhabitat conditions.

  19. SPP: A data base processor data communications protocol

    Science.gov (United States)

    Fishwick, P. A.

    1983-01-01

    The design and implementation of a data communications protocol for the Intel Data Base Processor (DBP) is defined. The protocol is termed SPP (Service Port Protocol) since it enables data transfer between the host computer and the DBP service port. The protocol implementation is extensible in that it is explicitly layered and the protocol functionality is hierarchically organized. Extensive trace and performance capabilities have been supplied with the protocol software to permit optional efficient monitoring of the data transfer between the host and the Intel data base processor. Machine independence was considered to be an important attribute during the design and implementation of SPP. The protocol source is fully commented and is included in Appendix A of this report.

  20. Identity-Based Authentication for Cloud Computing

    Science.gov (United States)

    Li, Hongwei; Dai, Yuanshun; Tian, Ling; Yang, Haomiao

    Cloud computing is a recently developed new technology for complex systems with massive-scale services sharing among numerous users. Therefore, authentication of both users and services is a significant issue for the trust and security of the cloud computing. SSL Authentication Protocol (SAP), once applied in cloud computing, will become so complicated that users will undergo a heavily loaded point both in computation and communication. This paper, based on the identity-based hierarchical model for cloud computing (IBHMCC) and its corresponding encryption and signature schemes, presented a new identity-based authentication protocol for cloud computing and services. Through simulation testing, it is shown that the authentication protocol is more lightweight and efficient than SAP, specially the more lightweight user side. Such merit of our model with great scalability is very suited to the massive-scale cloud.

  1. Identity and Professional Networking.

    Science.gov (United States)

    Raj, Medha; Fast, Nathanael J; Fisher, Oliver

    2017-06-01

    Despite evidence that large professional networks afford a host of financial and professional benefits, people vary in how motivated they are to build such networks. To help explain this variance, the present article moves beyond a rational self-interest account to examine the possibility that identity shapes individuals' intentions to network. Study 1 established a positive association between viewing professional networking as identity-congruent and the tendency to prioritize strengthening and expanding one's professional network. Study 2 revealed that manipulating the salience of the self affects networking intentions, but only among those high in networking identity-congruence. Study 3 further established causality by experimentally manipulating identity-congruence to increase networking intentions. Study 4 examined whether identity or self-interest is a better predictor of networking intentions, providing support for the former. These findings indicate that identity influences the networks people develop. Implications for research on the self, identity-based motivation, and professional networking are discussed.

  2. Sequential studies of cell inhibition of host fibroblasts in 51 patients given HLA-identical marrow grafts

    International Nuclear Information System (INIS)

    Tsoi, M.-S.; Storb, R.; Weiden, P.; Santos, E.; Kopecky, K.J.; Thomas, E.D.

    1982-01-01

    Thirty-four patients with leukemia, two with lymphoma and 15 with aplastic anemia, were studied sequentially between 33 and 666 days after treatment with high-dose cyclophosphamide and/or total body irradiation and marrow transplantation from HLA-identical siblings. Peripheral blood mononuclear cells from patients and normals were tested for cell inhibition (CI) of cultured skin fibroblasts from patients and donors or unrelated individuals using the microcytotoxicity assay. In addition, blocking of Cl by factors in patient serum was studied. Twenty patients were tested three or more times during the first year, 15 patients were studied twice and 16 patients once. Results showed that during the first 2 mo postgrafting, mononuclear cells from 45% of the patients had neither Cl nor blocking activities, 50% had Cl and serum blocking, and 5% had Cl without blocking. As time after transplatation elapsed, the percentage of patients without Cl gradually increased, whereas the percentage of patients with Cl with or without blocking decreased. At the end of 1 yr, 89% of the patients showed neither Cl nor blocking compared with 11% who showed Cl and blocking. This trend was significant (p < 0.005). The results were in agreement with our previus conclusion that serum-blocking factors were not important in the maintenance of the stable chimeric state. Early after grafting, there was a suggestive correlation (p < 0.08) between the in vitro finding of Cl of host fibroblasts by chimeric cells and the in vivo finding of acute graft-vs-host disease. However, there was no evidence that presence or absence of serum-blocking factors early after grafting was correlated with presence or absence of graft-vs-host disease

  3. Satellite Communications Using Commercial Protocols

    Science.gov (United States)

    Ivancic, William D.; Griner, James H.; Dimond, Robert; Frantz, Brian D.; Kachmar, Brian; Shell, Dan

    2000-01-01

    NASA Glenn Research Center has been working with industry, academia, and other government agencies in assessing commercial communications protocols for satellite and space-based applications. In addition, NASA Glenn has been developing and advocating new satellite-friendly modifications to existing communications protocol standards. This paper summarizes recent research into the applicability of various commercial standard protocols for use over satellite and space- based communications networks as well as expectations for future protocol development. It serves as a reference point from which the detailed work can be readily accessed. Areas that will be addressed include asynchronous-transfer-mode quality of service; completed and ongoing work of the Internet Engineering Task Force; data-link-layer protocol development for unidirectional link routing; and protocols for aeronautical applications, including mobile Internet protocol routing for wireless/mobile hosts and the aeronautical telecommunications network protocol.

  4. Security extension for the Canetti-Krawczyk model in identity-based systems

    Institute of Scientific and Technical Information of China (English)

    LI Xinghua; MA Jianfeng; SangJae Moon

    2005-01-01

    The Canetti-Krawczyk (CK) model is a formalism for the analysis of keyexchange protocols, which can guarantee many security properties for the protocols proved secure by this model. But we find this model lacks the ability to guarantee key generation center (KGC) forward secrecy, which is an important security property for key-agreement protocols based on Identity. The essential reason leading to this weakness is that it does not fully consider the attacker's capabilities. In this paper, the CK model is accordingly extended with a new additional attacker's capability of the KGC corruption in Identity-based systems, which enables it to support KGC forward secrecy.

  5. RadNet: Open network protocol for radiation data

    International Nuclear Information System (INIS)

    Rees, B.; Olson, K.; Beckes-Talcott, J.; Kadner, S.; Wenderlich, T.; Hoy, M.; Doyle, W.; Koskelo, M.

    1998-01-01

    Safeguards instrumentation is increasingly being incorporated into remote monitoring applications. In the past, vendors of radiation monitoring instruments typically provided the tools for uploading the monitoring data to a host. However, the proprietary nature of communication protocols lends itself to increased computer support needs and increased installation expenses. As a result, a working group of suppliers and customers of radiation monitoring instruments defined an open network protocol for transferring packets on a local area network from radiation monitoring equipment to network hosts. The protocol was termed RadNet. While it is now primarily used for health physics instruments, RadNet's flexibility and strength make it ideal for remote monitoring of nuclear materials. The incorporation of standard, open protocols ensures that future work will not render present work obsolete; because RadNet utilizes standard Internet protocols, and is itself a non-proprietary standard. The use of industry standards also simplifies the development and implementation of ancillary services, e.g. E-main generation or even pager systems

  6. Improving an Anonymous and Provably Secure Authentication Protocol for a Mobile User

    Directory of Open Access Journals (Sweden)

    Jongho Moon

    2017-01-01

    Full Text Available Recently many authentication protocols using an extended chaotic map were suggested for a mobile user. Many researchers demonstrated that authentication protocol needs to provide key agreement, mutual authentication, and user anonymity between mobile user and server and resilience to many possible attacks. In this paper, we cautiously analyzed chaotic-map-based authentication scheme and proved that it is still insecure to off-line identity guessing, user and server impersonation, and on-line identity guessing attacks. To address these vulnerabilities, we proposed an improved protocol based on an extended chaotic map and a fuzzy extractor. We proved the security of the proposed protocol using a random oracle and AVISPA (Automated Validation of Internet Security Protocols and Applications tool. Furthermore, we present an informal security analysis to make sure that the improved protocol is invulnerable to possible attacks. The proposed protocol is also computationally efficient when compared to other previous protocols.

  7. Ethnic identity, majority norms, and the native–immigrant employment gap

    DEFF Research Database (Denmark)

    Gorinas, Cedric Jean-Laurent Elie

    2014-01-01

    Earlier studies do not agree on whether ethnic identity, i.e., immigrants’ attachment to the home country and the host country, can explain lower employment outcomes among immigrants. This study investigates the relationship between employment and ethnic identity and complements the literature by...

  8. Applications of Multi-Channel Safety Authentication Protocols in Wireless Networks.

    Science.gov (United States)

    Chen, Young-Long; Liau, Ren-Hau; Chang, Liang-Yu

    2016-01-01

    People can use their web browser or mobile devices to access web services and applications which are built into these servers. Users have to input their identity and password to login the server. The identity and password may be appropriated by hackers when the network environment is not safe. The multiple secure authentication protocol can improve the security of the network environment. Mobile devices can be used to pass the authentication messages through Wi-Fi or 3G networks to serve as a second communication channel. The content of the message number is not considered in a multiple secure authentication protocol. The more excessive transmission of messages would be easier to collect and decode by hackers. In this paper, we propose two schemes which allow the server to validate the user and reduce the number of messages using the XOR operation. Our schemes can improve the security of the authentication protocol. The experimental results show that our proposed authentication protocols are more secure and effective. In regard to applications of second authentication communication channels for a smart access control system, identity identification and E-wallet, our proposed authentication protocols can ensure the safety of person and property, and achieve more effective security management mechanisms.

  9. An improved authenticated key agreement protocol for telecare medicine information system.

    Science.gov (United States)

    Liu, Wenhao; Xie, Qi; Wang, Shengbao; Hu, Bin

    2016-01-01

    In telecare medicine information systems (TMIS), identity authentication of patients plays an important role and has been widely studied in the research field. Generally, it is realized by an authenticated key agreement protocol, and many such protocols were proposed in the literature. Recently, Zhang et al. pointed out that Islam et al.'s protocol suffers from the following security weaknesses: (1) Any legal but malicious patient can reveal other user's identity; (2) An attacker can launch off-line password guessing attack and the impersonation attack if the patient's identity is compromised. Zhang et al. also proposed an improved authenticated key agreement scheme with privacy protection for TMIS. However, in this paper, we point out that Zhang et al.'s scheme cannot resist off-line password guessing attack, and it fails to provide the revocation of lost/stolen smartcard. In order to overcome these weaknesses, we propose an improved protocol, the security and authentication of which can be proven using applied pi calculus based formal verification tool ProVerif.

  10. Demographics, behavior problems, and psychosexual characteristics of adolescents with gender identity disorder or transvestic fetishism.

    Science.gov (United States)

    Zucker, Kenneth J; Bradley, Susan J; Owen-Anderson, Allison; Kibblewhite, Sarah J; Wood, Hayley; Singh, Devita; Choi, Kathryn

    2012-01-01

    This study provided a descriptive and quantitative comparative analysis of data from an assessment protocol for adolescents referred clinically for gender identity disorder (n = 192; 105 boys, 87 girls) or transvestic fetishism (n = 137, all boys). The protocol included information on demographics, behavior problems, and psychosexual measures. Gender identity disorder and transvestic fetishism youth had high rates of general behavior problems and poor peer relations. On the psychosexual measures, gender identity disorder patients had considerably greater cross-gender behavior and gender dysphoria than did transvestic fetishism youth and other control youth. Male gender identity disorder patients classified as having a nonhomosexual sexual orientation (in relation to birth sex) reported more indicators of transvestic fetishism than did male gender identity disorder patients classified as having a homosexual sexual orientation (in relation to birth sex). The percentage of transvestic fetishism youth and male gender identity disorder patients with a nonhomosexual sexual orientation self-reported similar degrees of behaviors pertaining to transvestic fetishism. Last, male and female gender identity disorder patients with a homosexual sexual orientation had more recalled cross-gender behavior during childhood and more concurrent cross-gender behavior and gender dysphoria than did patients with a nonhomosexual sexual orientation. The authors discuss the clinical utility of their assessment protocol.

  11. The President’s Identity Theft Task Force: Combating Identity Theft a Strategic Plan

    Science.gov (United States)

    2007-04-11

    27 a. Safeguarding of Information in the Public Sector ............... 27 b. Responding to Data Breaches in the Public...72 APPENDICES Appendix A: Identity Theft Task Force’s Guidance Memorandum on Data Breach Protocol...government, and the private sector. Consumers, overwhelmed with weekly media reports of data breaches , feel vulnerable and uncertain of how to protect

  12. AIB-OR: improving onion routing circuit construction using anonymous identity-based cryptosystems.

    Science.gov (United States)

    Wang, Changji; Shi, Dongyuan; Xu, Xilei

    2015-01-01

    The rapid growth of Internet applications has made communication anonymity an increasingly important or even indispensable security requirement. Onion routing has been employed as an infrastructure for anonymous communication over a public network, which provides anonymous connections that are strongly resistant to both eavesdropping and traffic analysis. However, existing onion routing protocols usually exhibit poor performance due to repeated encryption operations. In this paper, we first present an improved anonymous multi-receiver identity-based encryption (AMRIBE) scheme, and an improved identity-based one-way anonymous key agreement (IBOWAKE) protocol. We then propose an efficient onion routing protocol named AIB-OR that provides provable security and strong anonymity. Our main approach is to use our improved AMRIBE scheme and improved IBOWAKE protocol in onion routing circuit construction. Compared with other onion routing protocols, AIB-OR provides high efficiency, scalability, strong anonymity and fault tolerance. Performance measurements from a prototype implementation show that our proposed AIB-OR can achieve high bandwidths and low latencies when deployed over the Internet.

  13. A robust ECC based mutual authentication protocol with anonymity for session initiation protocol.

    Science.gov (United States)

    Mehmood, Zahid; Chen, Gongliang; Li, Jianhua; Li, Linsen; Alzahrani, Bander

    2017-01-01

    Over the past few years, Session Initiation Protocol (SIP) is found as a substantial application-layer protocol for the multimedia services. It is extensively used for managing, altering, terminating and distributing the multimedia sessions. Authentication plays a pivotal role in SIP environment. Currently, Lu et al. presented an authentication protocol for SIP and profess that newly proposed protocol is protected against all the familiar attacks. However, the detailed analysis describes that the Lu et al.'s protocol is exposed against server masquerading attack and user's masquerading attack. Moreover, it also fails to protect the user's identity as well as it possesses incorrect login and authentication phase. In order to establish a suitable and efficient protocol, having ability to overcome all these discrepancies, a robust ECC-based novel mutual authentication mechanism with anonymity for SIP is presented in this manuscript. The improved protocol contains an explicit parameter for user to cope the issues of security and correctness and is found to be more secure and relatively effective to protect the user's privacy, user's masquerading and server masquerading as it is verified through the comprehensive formal and informal security analysis.

  14. A robust ECC based mutual authentication protocol with anonymity for session initiation protocol.

    Directory of Open Access Journals (Sweden)

    Zahid Mehmood

    Full Text Available Over the past few years, Session Initiation Protocol (SIP is found as a substantial application-layer protocol for the multimedia services. It is extensively used for managing, altering, terminating and distributing the multimedia sessions. Authentication plays a pivotal role in SIP environment. Currently, Lu et al. presented an authentication protocol for SIP and profess that newly proposed protocol is protected against all the familiar attacks. However, the detailed analysis describes that the Lu et al.'s protocol is exposed against server masquerading attack and user's masquerading attack. Moreover, it also fails to protect the user's identity as well as it possesses incorrect login and authentication phase. In order to establish a suitable and efficient protocol, having ability to overcome all these discrepancies, a robust ECC-based novel mutual authentication mechanism with anonymity for SIP is presented in this manuscript. The improved protocol contains an explicit parameter for user to cope the issues of security and correctness and is found to be more secure and relatively effective to protect the user's privacy, user's masquerading and server masquerading as it is verified through the comprehensive formal and informal security analysis.

  15. Competing Discourses in the Ongoing Identity Construction of Adult Immigrants

    Science.gov (United States)

    Steinbach, Marilyn

    2014-01-01

    Based on interviews with eight adult immigrants to Montreal, this article explores how discourses from their cultures of origin interact with discourses in the host culture to influence the process of identity construction during their acculturation to the host society. Drawing on sociocultural theory and psychological concepts of identity…

  16. Host based internet protocol (IP) packet analysis to enhance network security

    International Nuclear Information System (INIS)

    Ahmad, T.; Ahmad, S.Z.; Yasin, M.M.

    2007-01-01

    Data communication in a computer network environment is facing serious security threats from numerous sources such as viruses, worms, Zombies etc. These threats can be broadly characterized as internal or external security threats. Internal threats are mainly attributed to sneaker-nets, utility modems and unauthorized users, which can be minimized by skillful network administration, password management and optimum usage policy definition. The external threats need more serious attention as these attacks are mostly coming from public networks such as Internet. Frequency and complexity of such attacks is much higher as compared to internal attacks. This paper presents a host based network layer screening of external and internal IP packets for logging, analyzing and real-time detection of possible IP spoofing and Denial of Service attacks. This work can also be used in tuning security rules definition for gateway firewalls. Software has been developed which intercepts IP traffic and analyses it with respect to integrity and origin of I P packet. The received IP packets are parsed and analyzed for possible signs of intrusion. The results show that by watching and categorizing composition of various transport protocol such as TCP, UDP, ICMP and others along with verifying the origin of received IP packet can help in devising real-time firewall rule and blocking possible external attack. This is highly desirable for fighting against zero day attacks and can result in a better Mean Time between Failures (MTBF) to increase the survivability of computer network. Used in a right context, packet screening and filtering can be a useful tool for provision of reliable and stable network services. (author)

  17. In-memory interconnect protocol configuration registers

    Energy Technology Data Exchange (ETDEWEB)

    Cheng, Kevin Y.; Roberts, David A.

    2017-09-19

    Systems, apparatuses, and methods for moving the interconnect protocol configuration registers into the main memory space of a node. The region of memory used for storing the interconnect protocol configuration registers may also be made cacheable to reduce the latency of accesses to the interconnect protocol configuration registers. Interconnect protocol configuration registers which are used during a startup routine may be prefetched into the host's cache to make the startup routine more efficient. The interconnect protocol configuration registers for various interconnect protocols may include one or more of device capability tables, memory-side statistics (e.g., to support two-level memory data mapping decisions), advanced memory and interconnect features such as repair resources and routing tables, prefetching hints, error correcting code (ECC) bits, lists of device capabilities, set and store base address, capability, device ID, status, configuration, capabilities, and other settings.

  18. In-memory interconnect protocol configuration registers

    Science.gov (United States)

    Cheng, Kevin Y.; Roberts, David A.

    2017-09-19

    Systems, apparatuses, and methods for moving the interconnect protocol configuration registers into the main memory space of a node. The region of memory used for storing the interconnect protocol configuration registers may also be made cacheable to reduce the latency of accesses to the interconnect protocol configuration registers. Interconnect protocol configuration registers which are used during a startup routine may be prefetched into the host's cache to make the startup routine more efficient. The interconnect protocol configuration registers for various interconnect protocols may include one or more of device capability tables, memory-side statistics (e.g., to support two-level memory data mapping decisions), advanced memory and interconnect features such as repair resources and routing tables, prefetching hints, error correcting code (ECC) bits, lists of device capabilities, set and store base address, capability, device ID, status, configuration, capabilities, and other settings.

  19. Quantum identity authentication based on ping-pong technique for photons

    Energy Technology Data Exchange (ETDEWEB)

    Zhang Zheshen [State Key Laboratory of Advanced Optical Communication Systems and Networks, Department of Electronic Engineering, Shanghai Jiao Tong University, Shanghai 200030 (China)]. E-mail: zheshenzhang@hotmail.com; Zeng Guihua [State Key Laboratory of Advanced Optical Communication Systems and Networks, Department of Electronic Engineering, Shanghai Jiao Tong University, Shanghai 200030 (China)]. E-mail: ghzeng@sjtu.edu.cn; Zhou Nanrun [Department of Electronics Information Engineering, Nanchang University, Nanchang 330029 (China); Xiong Jin [State Key Laboratory of Advanced Optical Communication Systems and Networks, Department of Electronic Engineering, Shanghai Jiao Tong University, Shanghai 200030 (China)

    2006-08-07

    To prevent active attack, an one-way quantum identity authentication scheme is proposed by employing mechanism of ping-pong protocol and property of quantum controlled-NOT gate. It can verify the user's identity as well as distribute an updated key as the authentication key. Analytical results show the proposed scheme is secure under general individual attack.

  20. Quantum identity authentication based on ping-pong technique for photons

    International Nuclear Information System (INIS)

    Zhang Zheshen; Zeng Guihua; Zhou Nanrun; Xiong Jin

    2006-01-01

    To prevent active attack, an one-way quantum identity authentication scheme is proposed by employing mechanism of ping-pong protocol and property of quantum controlled-NOT gate. It can verify the user's identity as well as distribute an updated key as the authentication key. Analytical results show the proposed scheme is secure under general individual attack

  1. Analysis and Verification of a Key Agreement Protocol over Cloud Computing Using Scyther Tool

    OpenAIRE

    Hazem A Elbaz

    2015-01-01

    The mostly cloud computing authentication mechanisms use public key infrastructure (PKI). Hierarchical Identity Based Cryptography (HIBC) has several advantages that sound well align with the demands of cloud computing. The main objectives of cloud computing authentication protocols are security and efficiency. In this paper, we clarify Hierarchical Identity Based Authentication Key Agreement (HIB-AKA) protocol, providing lightweight key management approach for cloud computing users. Then, we...

  2. A Secure Protocol Based on a Sedentary Agent for Mobile Agent Environments

    OpenAIRE

    Abdelmorhit E. Rhazi; Samuel Pierre; Hanifa Boucheneb

    2007-01-01

    The main challenge when deploying mobile agent environments pertains to security issues concerning mobile agents and their executive platform. This paper proposes a secure protocol which protects mobile agents against attacks from malicious hosts in these environments. Protection is based on the perfect cooperation of a sedentary agent running inside a trusted third host. Results show that the protocol detects several attacks, such as denial of service, incorrect execution and re-execution of...

  3. Quantum broadcast communication and authentication protocol with a quantum one-time pad

    International Nuclear Information System (INIS)

    Chang Yan; Xu Chun-Xiang; Zhang Shi-Bin; Yan Li-Li

    2014-01-01

    A quantum broadcast communication and authentication protocol with a quantum one-time pad based on the Greenberger—Horne—Zeilinger state is proposed. A binary string is used to express the identity of the receiver, which is encoded as a single sequence of photons. The encoded photon sequence acts as a detection sequence and implements authentication. An XOR operation serves as a one-time pad and is used to ensure the security of the protocol. The binary string is reused even in a noisy channel and proves to be unconditionally secure. In contrast with the protocols proposed by Wang et al. [Chin. Phys. 16 1868 (2007)] and Yang et al. [Chin. Phys. B 19 070304 (2010)], the protocol in this study implements the identity authentication with a reusable binary string; no hash function or local unitary operation is used. The protocol in this study is also easier to implement and highly efficient without losing security. (general)

  4. Authentication Test-Based the RFID Authentication Protocol with Security Analysis

    Directory of Open Access Journals (Sweden)

    Minghui Wang

    2014-08-01

    Full Text Available To the problem of many recently proposed RFID authentication protocol was soon find security holes, we analyzed the main reason, which is that protocol design is not rigorous, and the correctness of the protocol cannot be guaranteed. To this end, authentication test method was adopted in the process of the formal analysis and strict proof to the proposed RFID protocol in this paper. Authentication Test is a new type of analysis and design method of security protocols based on Strand space model, and it can be used for most types of the security protocols. After analysis the security, the proposed protocol can meet the RFID security demand: information confidentiality, data integrity and identity authentication.

  5. Protocol Interoperability Between DDN and ISO (Defense Data Network and International Organization for Standardization) Protocols

    Science.gov (United States)

    1988-08-01

    services and protocols above the transport layer are usually implemented as user- callable utilities on the host computers, it is desirable to offer them...Networks, Prentice-hall, New Jersey, 1987 [ BOND 87] Bond , John, "Parallel-Processing Concepts Finally Come together in Real Systems", Computer Design

  6. A Generic Protocol for Intracellular Expression of Recombinant Proteins in Bacillus subtilis.

    Science.gov (United States)

    Phan, Trang; Huynh, Phuong; Truong, Tuom; Nguyen, Hoang

    2017-01-01

    Bacillus subtilis (B. subtilis) is a potential and attractive host for the production of recombinant proteins. Different expression systems for B. subtilis have been developed recently, and various target proteins have been recombinantly synthesized and purified using this host. In this chapter, we introduce a generic protocol to express a recombinant protein in B. subtilis. It includes protocols for (1) using our typical expression vector (plasmid pHT254) to introduce a target gene, (2) transformation of the target vector into B. subtilis, and (3) evaluation of the actual expression of a recombinant protein.

  7. A security analysis of the 802.11s wireless mesh network routing protocol and its secure routing protocols.

    Science.gov (United States)

    Tan, Whye Kit; Lee, Sang-Gon; Lam, Jun Huy; Yoo, Seong-Moo

    2013-09-02

    Wireless mesh networks (WMNs) can act as a scalable backbone by connecting separate sensor networks and even by connecting WMNs to a wired network. The Hybrid Wireless Mesh Protocol (HWMP) is the default routing protocol for the 802.11s WMN. The routing protocol is one of the most important parts of the network, and it requires protection, especially in the wireless environment. The existing security protocols, such as the Broadcast Integrity Protocol (BIP), Counter with cipher block chaining message authentication code protocol (CCMP), Secure Hybrid Wireless Mesh Protocol (SHWMP), Identity Based Cryptography HWMP (IBC-HWMP), Elliptic Curve Digital Signature Algorithm HWMP (ECDSA-HWMP), and Watchdog-HWMP aim to protect the HWMP frames. In this paper, we have analyzed the vulnerabilities of the HWMP and developed security requirements to protect these identified vulnerabilities. We applied the security requirements to analyze the existing secure schemes for HWMP. The results of our analysis indicate that none of these protocols is able to satisfy all of the security requirements. We also present a quantitative complexity comparison among the protocols and an example of a security scheme for HWMP to demonstrate how the result of our research can be utilized. Our research results thus provide a tool for designing secure schemes for the HWMP.

  8. Research Review: Gender identity in youth: treatment paradigms and controversies.

    Science.gov (United States)

    Turban, Jack L; Ehrensaft, Diane

    2017-10-26

    Pediatric gender identity has gained increased attention over the past several years in the popular media, political arena, and medical literature. This article reviews terminology in this evolving field, traditional models of gender identity development and their limitations, epidemiology and natural history of cross-gender identification among children and adolescents, co-occurring conditions and behaviors, research into the biological and psychosocial determinants of cross-gender identification, and research into the options regarding and benefits of clinical approaches to gender incongruent youth. Based on a critical review of the extant literature, both theoretical and empirical, that addresses the issue of pediatric gender identity, the authors synthesized what is presently known and what is in need of further research in order to elucidate the developmental trajectory and clinical needs of gender diverse youth. The field of pediatric gender identity has evolved substantially over the past several years. New research suggests that cross-gender identification is prevalent (approximately 1% of youth). These youth suffer disproportionately high rates of anxiety, depression, and suicidality. Although research into the etiology of cross-gender identification is limited, emerging data have shown that affirmative treatment protocols may improve the high rates of mental health difficulties seen among these patients. The field of pediatric gender identity has evolved dramatically. Emerging data suggest that these patients' high rates of anxiety, depression, and suicidality appear to be improved with affirmative protocols, although future longitudinal data are needed. © 2017 Association for Child and Adolescent Mental Health.

  9. A Federated Digital Identity Management Approach for Business Processes

    Science.gov (United States)

    Bertino, Elisa; Ferrini, Rodolfo; Musci, Andrea; Paci, Federica; Steuer, Kevin J.

    Business processes have gained a lot of attention because of the pressing need for integrating existing resources and services to better fulfill customer needs. A key feature of business processes is that they are built from composable services, referred to as component services, that may belong to different domains. In such a context, flexible multi-domain identity management solutions are crucial for increased security and user-convenience. In particular, it is important that during the execution of a business process the component services be able to verify the identity of the client to check that it has the required permissions for accessing the services. To address the problem of multi-domain identity management, we propose a multi-factor identity attribute verification protocol for business processes that assures clients privacy and handles naming heterogeneity.

  10. Multiprocessor Real-Time Locking Protocols for Replicated Resources

    Science.gov (United States)

    2016-07-01

    assignment problem, the ac- tual identities of the allocated replicas must be known. When locking protocols are used, tasks may experience delays due to both...Multiprocessor Real-Time Locking Protocols for Replicated Resources ∗ Catherine E. Jarrett1, Kecheng Yang1, Ming Yang1, Pontus Ekberg2, and James H...replicas to execute. In prior work on replicated resources, k-exclusion locks have been used, but this restricts tasks to lock only one replica at a time. To

  11. Communication protocol in chassis detecting wireless transmission system based on WiFi

    Science.gov (United States)

    In chassis detecting wireless transmission system, the wireless network communication protocol plays a key role in the information exchange and synchronization between the host and chassis PDA. This paper presents a wireless network transmission protocol based on TCP/IP which makes the rules of info...

  12. Distributed Network Protocols

    Science.gov (United States)

    1980-07-01

    MONITORING AGENCY NAME & ADDRESS(II different from Controlting Office) IS. SECURITY CLASS. (of this report) S Office of Naval Research Unclassified...All protocols are extended to networks with changing. topology. S80 8 4 246 DD0I iA 1473 EDITION OF INOV 65 IS OBSOLETE 8 0 24 SECURITY CLASSIFICATION...to the netowrk . f) Each node knows its adjacent links, but not necessarily the identity of its neighbors, i.e. the nodes at the other end of the links

  13. The effects of residents' social identity and involvement on their advocacy of incoming tourism

    OpenAIRE

    Palmer, Adrian; Koenig-Lewis, Nicole; Medi Jones, Lisa Elinor

    2013-01-01

    A long stream of literature has identified cognitive, emotional and evaluative dimensions of social identity. Previous studies have examined identity self-congruence of incoming tourists. However, the application of identity theory to the study of host communities' support of incoming tourism has been under-researched. This paper seeks to make a contribution by closing this gap by investigating residents' identity and its association with their propensity to become advocates for inward touris...

  14. Padua's Muslim: on the new Italian Islamic identities

    Directory of Open Access Journals (Sweden)

    Agustina Adela Zaros

    2015-06-01

    Full Text Available The proposed text reflects on the Muslim community and families in Padua including interviews in order to individuate the practices of the transmission of beliefs within the family and the continuity of the group. Mainly from the development of three main points: religious socialization, community representation as umma, according to the mandate of Give to Islam as well of the dichotomy we Muslims / they Christians discourses. Finally, the meanings of identities governed by ethnicity and / or religion and new generations with current debates and struggles identified as new collective identities. That is, the reinterpretation allows the emergence of a new collective identity that makes use of practices that are in tension with the host society emerging like a political force.

  15. Host-specific interactions with environmental factors shape the distribution of symbiodinium across the Great Barrier Reef.

    Directory of Open Access Journals (Sweden)

    Linda Tonk

    Full Text Available The endosymbiotic dinoflagellates (genus Symbiodinium within coral reef invertebrates are critical to the survival of the holobiont. The genetic variability of Symbiodinium may contribute to the tolerance of the symbiotic association to elevated sea surface temperatures (SST. To assess the importance of factors such as the local environment, host identity and biogeography in driving Symbiodinium distributions on reef-wide scales, data from studies on reef invertebrate-Symbiodinium associations from the Great Barrier Reef (GBR were compiled.The resulting database consisted of 3717 entries from 26 studies. It was used to explore ecological patterns such as host-specificity and environmental drivers structuring community complexity using a multi-scalar approach. The data was analyzed in several ways: (i frequently sampled host species were analyzed independently to investigate the influence of the environment on symbiont distributions, thereby excluding the influence of host specificity, (ii host species distributions across sites were added as an environmental variable to determine the contribution of host identity on symbiont distribution, and (iii data were pooled based on clade (broad genetic groups dividing the genus Symbiodinium to investigate factors driving Symbiodinium distributions using lower taxonomic resolution. The results indicated that host species identity plays a dominant role in determining the distribution of Symbiodinium and environmental variables shape distributions on a host species-specific level. SST derived variables (especially SSTstdev most often contributed to the selection of the best model. Clade level comparisons decreased the power of the predictive model indicating that it fails to incorporate the main drivers behind Symbiodinium distributions.Including the influence of different host species on Symbiodinium distributional patterns improves our understanding of the drivers behind the complexity of Symbiodinium

  16. Do we need 3D tube current modulation information for accurate organ dosimetry in chest CT? Protocols dose comparisons.

    Science.gov (United States)

    Lopez-Rendon, Xochitl; Zhang, Guozhi; Coudyzer, Walter; Develter, Wim; Bosmans, Hilde; Zanca, Federica

    2017-11-01

    To compare the lung and breast dose associated with three chest protocols: standard, organ-based tube current modulation (OBTCM) and fast-speed scanning; and to estimate the error associated with organ dose when modelling the longitudinal (z-) TCM versus the 3D-TCM in Monte Carlo simulations (MC) for these three protocols. Five adult and three paediatric cadavers with different BMI were scanned. The CTDI vol of the OBTCM and the fast-speed protocols were matched to the patient-specific CTDI vol of the standard protocol. Lung and breast doses were estimated using MC with both z- and 3D-TCM simulated and compared between protocols. The fast-speed scanning protocol delivered the highest doses. A slight reduction for breast dose (up to 5.1%) was observed for two of the three female cadavers with the OBTCM in comparison to the standard. For both adult and paediatric, the implementation of the z-TCM data only for organ dose estimation resulted in 10.0% accuracy for the standard and fast-speed protocols, while relative dose differences were up to 15.3% for the OBTCM protocol. At identical CTDI vol values, the standard protocol delivered the lowest overall doses. Only for the OBTCM protocol is the 3D-TCM needed if an accurate (<10.0%) organ dosimetry is desired. • The z-TCM information is sufficient for accurate dosimetry for standard protocols. • The z-TCM information is sufficient for accurate dosimetry for fast-speed scanning protocols. • For organ-based TCM schemes, the 3D-TCM information is necessary for accurate dosimetry. • At identical CTDI vol , the fast-speed scanning protocol delivered the highest doses. • Lung dose was higher in XCare than standard protocol at identical CTDI vol .

  17. Analysis of Host-Takeover During SPO1 Infection of Bacillus subtilis.

    Science.gov (United States)

    Stewart, Charles R

    2018-01-01

    When Bacillus subtilis is infected by bacteriophage SPO1, the phage directs the remodeling of the host cell, converting it into a factory for phage reproduction. Much synthesis of host DNA, RNA, and protein is shut off, and cell division is prevented. Here I describe the protocols by which we have demonstrated those processes, and identified the roles played by specific SPO1 gene products in causing those processes.

  18. Protocol for systematic review of school-based interventions to prevent and control obesity in African learners.

    Science.gov (United States)

    Adom, Theodosia; Puoane, Thandi; De Villiers, Anniza; Kengne, André Pascal

    2017-03-27

    The increasing prevalence of obesity and overweight in childhood in developing countries is a public health concern to many governments. Schools play a significant role in the obesity epidemic as well as provide favourable environments for change in behaviours in childhood which can be carried on into adulthood. There is dearth of information on intervention studies in poor-resource settings. This review will summarise the available evidence on school-based interventions that focused on promoting healthy eating and physical activity among learners aged 6-15 years in Africa and to identify factors that lead to successful interventions or potential barriers to success of these programmes within the African context. This protocol is developed following the guidelines of PRIMSA-P 2015. Relevant search terms and keywords generated from the subject headings and the African search filter will be used to conduct a comprehensive search of MEDLINE (PubMed), MEDLINE (EbscoHost), CINAHL (EbscoHost), Register Academic Search Complete (EbscoHost) and ISI Web of Science (Science Citation Index) for published literature on school-based interventions to prevent and control obesity in learners in Africa. Grey literature will be also be obtained. The searches will cover 1 January 2000 to 30 June 2016. No language limitations will be applied. Full-text articles of eligible studies will be screened. Risk of bias and quality of reporting will be assessed. Data will be extracted, synthesised and presented by country and major regional groupings. Meta-analysis will be conducted for identical variables across studies, where data allow. This protocol is developed following the guidelines of PRISMA-P 2015. No primary data will be collected hence ethics is not a requirement. The findings will be submitted for publication in peer-reviewed journals, in conferences and in policy documents for decision-making, where needed. Published by the BMJ Publishing Group Limited. For permission to use

  19. Protocol dependence of mechanical properties in granular systems.

    Science.gov (United States)

    Inagaki, S; Otsuki, M; Sasa, S

    2011-11-01

    We study the protocol dependence of the mechanical properties of granular media by means of computer simulations. We control a protocol of realizing disk packings in a systematic manner. In 2D, by keeping material properties of the constituents identical, we carry out compaction with various strain rates. The disk packings exhibit the strain rate dependence of the critical packing fraction above which the pressure becomes non-zero. The observed behavior contrasts with the well-studied jamming transitions for frictionless disk packings. We also observe that the elastic moduli of the disk packings depend on the strain rate logarithmically. Our results suggest that there exists a time-dependent state variable to describe macroscopic material properties of disk packings, which depend on its protocol.

  20. Closed Conference Signalling Using the Session Initiation Protocol.

    Science.gov (United States)

    Miladinovic, Igor; Stadler, Johannes

    2003-01-01

    Introduces an extension of the Session Initiation Protocol (SIP) for closed multiparty conferences; the extension expands SIP for discovery of participant identities in a conference, and ensures that each participant is notified before a new participant joins. Verifies this extension by applying it to two SIP conference models. Concludes with an…

  1. Porphyromonas gingivalis as a Model Organism for Assessing Interaction of Anaerobic Bacteria with Host Cells.

    Science.gov (United States)

    Wunsch, Christopher M; Lewis, Janina P

    2015-12-17

    Anaerobic bacteria far outnumber aerobes in many human niches such as the gut, mouth, and vagina. Furthermore, anaerobic infections are common and frequently of indigenous origin. The ability of some anaerobic pathogens to invade human cells gives them adaptive measures to escape innate immunity as well as to modulate host cell behavior. However, ensuring that the anaerobic bacteria are live during experimental investigation of the events may pose challenges. Porphyromonas gingivalis, a Gram-negative anaerobe, is capable of invading a variety of eukaryotic non-phagocytic cells. This article outlines how to successfully culture and assess the ability of P. gingivalis to invade human umbilical vein endothelial cells (HUVECs). Two protocols were developed: one to measure bacteria that can successfully invade and survive within the host, and the other to visualize bacteria interacting with host cells. These techniques necessitate the use of an anaerobic chamber to supply P. gingivalis with an anaerobic environment for optimal growth. The first protocol is based on the antibiotic protection assay, which is largely used to study the invasion of host cells by bacteria. However, the antibiotic protection assay is limited; only intracellular bacteria that are culturable following antibiotic treatment and host cell lysis are measured. To assess all bacteria interacting with host cells, both live and dead, we developed a protocol that uses fluorescent microscopy to examine host-pathogen interaction. Bacteria are fluorescently labeled with 2',7'-Bis-(2-carboxyethyl)-5-(and-6)-carboxyfluorescein acetoxymethyl ester (BCECF-AM) and used to infect eukaryotic cells under anaerobic conditions. Following fixing with paraformaldehyde and permeabilization with 0.2% Triton X-100, host cells are labeled with TRITC phalloidin and DAPI to label the cell cytoskeleton and nucleus, respectively. Multiple images taken at different focal points (Z-stack) are obtained for temporal

  2. Blocking Optimality in Distributed Real-Time Locking Protocols

    Directory of Open Access Journals (Sweden)

    Björn Bernhard Brandenburg

    2014-09-01

    Full Text Available Lower and upper bounds on the maximum priority inversion blocking (pi-blocking that is generally unavoidable in distributed multiprocessor real-time locking protocols (where resources may be accessed only from specific synchronization processors are established. Prior work on suspension-based shared-memory multiprocessor locking protocols (which require resources to be accessible from all processors has established asymptotically tight bounds of Ω(m and Ω(n maximum pi-blocking under suspension-oblivious and suspension-aware analysis, respectively, where m denotes the total number of processors and n denotes the number of tasks. In this paper, it is shown that, in the case of distributed semaphore protocols, there exist two different task allocation scenarios that give rise to distinct lower bounds. In the case of co-hosted task allocation, where application tasks may also be assigned to synchronization processors (i.e., processors hosting critical sections, Ω(Φ · n maximum pi-blocking is unavoidable for some tasks under any locking protocol under both suspension-aware and suspension-oblivious schedulability analysis, where Φ denotes the ratio of the maximum response time to the shortest period. In contrast, in the case of disjoint task allocation (i.e., if application tasks may not be assigned to synchronization processors, only Ω(m and Ω(n maximum pi-blocking is fundamentally unavoidable under suspension-oblivious and suspension-aware analysis, respectively, as in the shared-memory case. These bounds are shown to be asymptotically tight with the construction of two new distributed real-time locking protocols that ensure O(m and O(n maximum pi-blocking under suspension-oblivious and suspension-aware analysis, respectively.

  3. BAVP: Blockchain-Based Access Verification Protocol in LEO Constellation Using IBE Keys

    OpenAIRE

    Wei, Songjie; Li, Shuai; Liu, Peilong; Liu, Meilin

    2018-01-01

    LEO constellation has received intensive research attention in the field of satellite communication. The existing centralized authentication protocols traditionally used for MEO/GEO satellite networks cannot accommodate LEO satellites with frequent user connection switching. This paper proposes a fast and efficient access verification protocol named BAVP by combining identity-based encryption and blockchain technology. Two different key management schemes with IBE and blockchain, respectively...

  4. Biometric identity management for standard mobile medical networks.

    Science.gov (United States)

    Egner, Alexandru; Soceanu, Alexandru; Moldoveanu, Florica

    2012-01-01

    The explosion of healthcare costs over the last decade has prompted the ICT industry to respond with solutions for reducing costs while improving healthcare quality. The ISO/IEEE 11073 family of standards recently released is the first step towards interoperability of mobile medical devices used in patient environments. The standards do not, however, tackle security problems, such as identity management, or the secure exchange of medical data. This paper proposes an enhancement of the ISO/IEEE 11073-20601 protocol with an identity management system based on biometry. The paper describes a novel biometric-based authentication process, together with the biometric key generation algorithm. The proposed extension of the ISO/IEEE 11073-20601 is also presented.

  5. Remote Memory Access Protocol Target Node Intellectual Property

    Science.gov (United States)

    Haddad, Omar

    2013-01-01

    The MagnetoSpheric Multiscale (MMS) mission had a requirement to use the Remote Memory Access Protocol (RMAP) over its SpaceWire network. At the time, no known intellectual property (IP) cores were available for purchase. Additionally, MMS preferred to implement the RMAP functionality with control over the low-level details of the design. For example, not all the RMAP standard functionality was needed, and it was desired to implement only the portions of the RMAP protocol that were needed. RMAP functionality had been previously implemented in commercial off-the-shelf (COTS) products, but the IP core was not available for purchase. The RMAP Target IP core is a VHDL (VHSIC Hardware Description Language description of a digital logic design suitable for implementation in an FPGA (field-programmable gate array) or ASIC (application-specific integrated circuit) that parses SpaceWire packets that conform to the RMAP standard. The RMAP packet protocol allows a network host to access and control a target device using address mapping. This capability allows SpaceWire devices to be managed in a standardized way that simplifies the hardware design of the device, as well as the development of the software that controls the device. The RMAP Target IP core has some features that are unique and not specified in the RMAP standard. One such feature is the ability to automatically abort transactions if the back-end logic does not respond to read/write requests within a predefined time. When a request times out, the RMAP Target IP core automatically retracts the request and returns a command response with an appropriate status in the response packet s header. Another such feature is the ability to control the SpaceWire node or router using RMAP transactions in the extended address range. This allows the SpaceWire network host to manage the SpaceWire network elements using RMAP packets, which reduces the number of protocols that the network host needs to support.

  6. Comparison of a new whole-body continuous-table-movement protocol versus a standard whole-body MR protocol for the assessment of multiple myeloma

    International Nuclear Information System (INIS)

    Weckbach, S.; Michaely, H.J.; Schoenberg, S.O.; Dinter, D.J.; Stemmer, A.

    2010-01-01

    To evaluate a whole body (WB) continuous-table-movement (CTM) MR protocol for the assessment of multiple myeloma (MM) in comparison to a step-by-step WB protocol. Eighteen patients with MM were examined at 1.5T using a WB CTM protocol (axial T2-w fs BLADE, T1-w GRE sequence) and a step-by-step WB protocol including coronal/sagittal T1-w SE and STIR sequences as reference. Protocol time was assessed. Image quality, artefacts, liver/spleen assessability, and the ability to depict bone marrow lesions less than or greater than 1 cm as well as diffuse infiltration and soft tissue lesions were rated. Potential changes in the Durie and Salmon Plus stage and the detectability of complications were assessed. Mean protocol time was 6:38 min (CTM) compared to 24:32 min (standard). Image quality was comparable. Artefacts were more prominent using the CTM protocol (P = 0.0039). Organ assessability was better using the CTM protocol (P < 0.001). Depiction of bone marrow and soft tissue lesions was identical without a staging shift. Vertebral fractures were not detected using the CTM protocol. The new protocol allows a higher patient throughput and facilitates the depiction of extramedullary lesions. However, as long as vertebral fractures are not detectable, the protocol cannot be safely used for clinical routine without the acquisition of an additional sagittal sequence. (orig.)

  7. Cryptanalysis and improvement of quantum broadcast communication and authentication protocol with a quantum one-time pad

    International Nuclear Information System (INIS)

    Liu Zhi-Hao; Chen Han-Wu

    2016-01-01

    The security of quantum broadcast communication (QBC) and authentication protocol based on Greenberger–Horne–Zeilinger (GHZ) state and quantum one-time pad is analyzed. It is shown that there are some security issues in this protocol. Firstly, an external eavesdropper can take the intercept–measure–resend attack strategy to eavesdrop on 0.369 bit of every bit of the identity string of each receiver without being detected. Meanwhile, 0.524 bit of every bit of the secret message can be eavesdropped on without being detected. Secondly, an inner receiver can take the intercept–measure–resend attack strategy to eavesdrop on half of the identity string of the other’s definitely without being checked. In addition, an alternative attack called the CNOT-operation attack is discussed. As for the multi-party QBC protocol, the attack efficiency increases with the increase of the number of users. Finally, the QBC protocol is improved to a secure one. (paper)

  8. Identity's identities

    DEFF Research Database (Denmark)

    Jensen, Kim Ebensgaard

    -specialized language in which it also serves a number of functions – some of which are quite fundamental to society as such. In other words, the lexeme identity is a polysemic word and has multiple, well, identities. Given that it appears to have a number of functions in a variety of registers, including terminologies...... in Academic English and more everyday-based English, identity as a lexeme is definitely worth having a look at. This paper presents a lexicological study of identity in which some of its senses are identified and their behaviors in actual discourse are observed. Drawing on data from the 2011 section...... of the Corpus of Contemporary American English, a behavioral profile of the distributional characteristics of identity is set up. Behavioral profiling is a lexicographical method developed by the corpus linguist Stefan Th. Gries which, by applying semantic ID tagging and statistical analysis, provides a fine...

  9. [Acculturation, bicultural identity and psychiatric morbidity in young Turkish patients in Germany].

    Science.gov (United States)

    Gül, Vahdet; Kolb, Semra

    2009-01-01

    This study was designed to examine, with the use of Berry's acculturation concept (2003), personal self-esteem and collective esteem in the acculturation of young Turks in Germany. Further, it was aimed to examine whether ethnic identity is linked to better mental health. Consecutive psychiatric primary care patients with Turkish background were screened with the 5-item Acculturation Questionnaire, adopted from the Latin American Validated Acculturation Scale. The interviewed patients were also assessed for psychiatric disorders according to ICD-10. By using the acculturation questionnaire among 220 patients included to this study, 154 (70%) patients, (88 male- 57,14%, mean age:22,1 sd. +/- 3,26 and 66 female- 42,85%, mean age: 21,73 sd. +/- 1,19) were found to be relatively good adjusted (group 1), and of 66 (30%) patients (44 male- 66,6%, mean age:26,3 sd. +/-3,39 and 22 female- 33,3%, mean age:25,88 sd. +/- 3,41) were found to be relatively poor adjusted (group 2) to the host community. The psychiatric co-morbidity showed in these two groups two distinct patterns (pGermany as country of birth, whereas poor adaptation was related to: dominance of ethnic culture and language, and being born outside of Germany. The research presented provides firm evidence for a bicultural identity through assessments of several domains of acculturation: language spoken most of the time, language thought, ethnic identity, birthplace and the degree of adjustment to the host community. Cultural identity is one of the key determinants of mental health in evaluating adaptation to the host culture among immigrants. It is vital for the mental health professionals to understand the roles, context, and therapeutic consequences that originate from culture.

  10. The Use of Personal Identity Numbers in Sweden and Denmark

    DEFF Research Database (Denmark)

    Hyltén-Cavallius, Katarina

    2015-01-01

    The paper of Katarina Hyltén-Cavallius focuses on personal identity numbers in Sweden and Denmark. This paper looks into formal and informal structures, which organise society in a host member state and which can make it difficult for a non-national Union citizen to, in practice, access public an...

  11. Provable Fair Document Exchange Protocol with Transaction Privacy for E-Commerce

    Directory of Open Access Journals (Sweden)

    Ren-Junn Hwang

    2015-04-01

    Full Text Available Transaction privacy has attracted a lot of attention in the e-commerce. This study proposes an efficient and provable fair document exchange protocol with transaction privacy. Using the proposed protocol, any untrusted parties can fairly exchange documents without the assistance of online, trusted third parties. Moreover, a notary only notarizes each document once. The authorized document owner can exchange a notarized document with different parties repeatedly without disclosing the origin of the document or the identities of transaction participants. Security and performance analyses indicate that the proposed protocol not only provides strong fairness, non-repudiation of origin, non-repudiation of receipt, and message confidentiality, but also enhances forward secrecy, transaction privacy, and authorized exchange. The proposed protocol is more efficient than other works.

  12. Identification of the same polyomavirus species in different African horseshoe bat species is indicative of short-range host-switching events.

    Science.gov (United States)

    Carr, Michael; Gonzalez, Gabriel; Sasaki, Michihito; Dool, Serena E; Ito, Kimihito; Ishii, Akihiro; Hang'ombe, Bernard M; Mweene, Aaron S; Teeling, Emma C; Hall, William W; Orba, Yasuko; Sawa, Hirofumi

    2017-10-06

    Polyomaviruses (PyVs) are considered to be highly host-specific in different mammalian species, with no well-supported evidence for host-switching events. We examined the species diversity and host specificity of PyVs in horseshoe bats (Rhinolophus spp.), a broadly distributed and highly speciose mammalian genus. We annotated six PyV genomes, comprising four new PyV species, based on pairwise identity within the large T antigen (LTAg) coding region. Phylogenetic comparisons revealed two instances of highly related PyV species, one in each of the Alphapolyomavirus and Betapolyomavirus genera, present in different horseshoe bat host species (Rhinolophus blasii and R. simulator), suggestive of short-range host-switching events. The two pairs of Rhinolophus PyVs in different horseshoe bat host species were 99.9 and 88.8 % identical with each other over their respective LTAg coding sequences and thus constitute the same virus species. To corroborate the species identification of the bat hosts, we analysed mitochondrial cytb and a large nuclear intron dataset derived from six independent and neutrally evolving loci for bat taxa of interest. Bayesian estimates of the ages of the most recent common ancestors suggested that the near-identical and more distantly related PyV species diverged approximately 9.1E4 (5E3-2.8E5) and 9.9E6 (4E6-18E6) years before the present, respectively, in contrast to the divergence times of the bat host species: 12.4E6 (10.4E6-15.4E6). Our findings provide evidence that short-range host-switching of PyVs is possible in horseshoe bats, suggesting that PyV transmission between closely related mammalian species can occur.

  13. Chameleon Changes: An Exploration of Racial Identity Themes of Multiracial People

    Science.gov (United States)

    Miville, Marie L.; Constantine, Madonna G.; Baysden, Matthew F.; So-Lloyd, Gloria

    2005-01-01

    The current study explored essential themes of racial identity development among 10 self-identified multiracial adults from a variety of racial backgrounds. Participants were interviewed using a semistructured protocol, and the interviews were recorded, transcribed, and then coded for themes by research team members. Four primary themes were…

  14. Robust Multi-unit Auction Protocol against False-name Bids

    Science.gov (United States)

    Yokoo, Makoto; Sakurai, Yuko; Matsubara, Shigeo

    This paper presents a new multi-unit auction protocol (IR protocol) that is robust against false-name bids. Internet auctions have become an integral part of Electronic Commerce and a promising field for applying agent and Artificial Intelligence technologies. Although the Internet provides an excellent infrastructure for executing auctions, the possibility of a new type of cheating called false-name bids has been pointed out. A false-name bid is a bid submitted under a fictitious name. A protocol called LDS has been developed for combinatorial auctions of multiple different items and has proven to be robust against false-name bids. Although we can modify the LDS protocol to handle multi-unit auctions, in which multiple units of an identical item are auctioned, the protocol is complicated and requires the auctioneer to carefully pre-determine the combination of bundles to obtain a high social surplus or revenue. For the auctioneer, our newly developed IR protocol is easier to use than the LDS, since the combination of bundles is automatically determined in a flexible manner according to the declared evaluation values of agents. The evaluation results show that the IR protocol can obtain a better social surplus than that obtained by the LDS protocol.

  15. Identity, biology and bionomics of the Common Mime Chilasa clytia Linnaeus (Lepidoptera: Papilionidae

    Directory of Open Access Journals (Sweden)

    V.S. Revathy

    2014-12-01

    Full Text Available Investigations were made on the identity, biology and bionomics of the Common Mime Chilasa clytia Linnaeus.  Morphological details of the external genitalia were found to be useful in segregating the two forms clytia and dissimilis belonging to this species.  The biology took 32–36 days for completion.  Besides the host plants already recorded, Litsea coriacea was recorded as a new larval host plant of this butterfly.  

  16. Relations among Ethnic Identity, Parenting Style, and Adolescent Psychosocial Outcomes in European American and East Indian Immigrants.

    Science.gov (United States)

    Bhadha, Bakhtawar

    The challenges of identity formation are particularly difficult for minority youth because of the clash of traditional culture and the host culture. This study examined the effects of parenting style, acculturation, and parent and adolescent ethnic identity on the self-esteem and school performance of East Indian and European American adolescents.…

  17. Hard Identity and Soft Identity

    Directory of Open Access Journals (Sweden)

    Hassan Rachik

    2006-04-01

    Full Text Available Often collective identities are classified depending on their contents and rarely depending on their forms. Differentiation between soft identity and hard identity is applied to diverse collective identities: religious, political, national, tribal ones, etc. This classification is made following the principal dimensions of collective identities: type of classification (univocal and exclusive or relative and contextual, the absence or presence of conflictsof loyalty, selective or totalitarian, objective or subjective conception, among others. The different characteristics analysed contribute to outlining an increasingly frequent type of identity: the authoritarian identity.

  18. A Secure and Effective Anonymous Integrity Checking Protocol for Data Storage in Multicloud

    Directory of Open Access Journals (Sweden)

    Lingwei Song

    2015-01-01

    Full Text Available How to verify the integrity of outsourced data is an important problem in cloud storage. Most of previous work focuses on three aspects, which are providing data dynamics, public verifiability, and privacy against verifiers with the help of a third party auditor. In this paper, we propose an identity-based data storage and integrity verification protocol on untrusted cloud. And the proposed protocol can guarantee fair results without any third verifying auditor. The theoretical analysis and simulation results show that our protocols are secure and efficient.

  19. Estimation of the Thurstonian model for the 2-AC protocol

    DEFF Research Database (Denmark)

    Christensen, Rune Haubo Bojesen; Lee, Hye-Seong; Brockhoff, Per B.

    2012-01-01

    . This relationship makes it possible to extract estimates and standard errors of δ and τ from general statistical software, and furthermore, it makes it possible to combine standard regression modelling with the Thurstonian model for the 2-AC protocol. A model for replicated 2-AC data is proposed using cumulative......The 2-AC protocol is a 2-AFC protocol with a “no-difference” option and is technically identical to the paired preference test with a “no-preference” option. The Thurstonian model for the 2-AC protocol is parameterized by δ and a decision parameter τ, the estimates of which can be obtained...... by fairly simple well-known methods. In this paper we describe how standard errors of the parameters can be obtained and how exact power computations can be performed. We also show how the Thurstonian model for the 2-AC protocol is closely related to a statistical model known as a cumulative probit model...

  20. Struggling between two cultures: the religious and cultural identity of the Moroccan children community in Barcelona

    OpenAIRE

    Plocikiewicz, Magdalena

    2011-01-01

    The aim of that article is the religious and cultural identity and how it is formed in case of the children of immigrants from Morocco. The hypothesis is that the identity of that group is formed as the complex relation between the origin culture input and the secondary socialization within host society. In other words, their identity is a result of the combination of two, essentially different cultures the Moroccan and the Spanish/Catalan one. The goal is to provide a sociological understand...

  1. A Self-Stabilizing Synchronization Protocol for Arbitrary Digraphs

    Science.gov (United States)

    Malekpour, Mahyar R.

    2011-01-01

    This paper presents a self-stabilizing distributed clock synchronization protocol in the absence of faults in the system. It is focused on the distributed clock synchronization of an arbitrary, non-partitioned digraph ranging from fully connected to 1-connected networks of nodes while allowing for differences in the network elements. This protocol does not rely on assumptions about the initial state of the system, other than the presence of at least one node, and no central clock or a centrally generated signal, pulse, or message is used. Nodes are anonymous, i.e., they do not have unique identities. There is no theoretical limit on the maximum number of participating nodes. The only constraint on the behavior of the node is that the interactions with other nodes are restricted to defined links and interfaces. This protocol deterministically converges within a time bound that is a linear function of the self-stabilization period. We present an outline of a deductive proof of the correctness of the protocol. A bounded model of the protocol was mechanically verified for a variety of topologies. Results of the mechanical proof of the correctness of the protocol are provided. The model checking results have verified the correctness of the protocol as they apply to the networks with unidirectional and bidirectional links. In addition, the results confirm the claims of determinism and linear convergence. As a result, we conjecture that the protocol solves the general case of this problem. We also present several variations of the protocol and discuss that this synchronization protocol is indeed an emergent system.

  2. DDCMP protocol on a DMA serial-line board

    International Nuclear Information System (INIS)

    Hunt, D.N.; Kessler, G.C.

    1982-01-01

    The Nuclear Chemistry Division of Lawrence Livermore National Laboratory is in the midst of an upgrade to their radiation counting facility. The result of this upgrade wil be a computer-based data acquisition network, the Nuclear Chemistry Counting Facility Network (NCCF-NET). This network will consist of forty dedicated LSI-11/2 based controllers, ten interactive LSI-11/23 based workstations and a VAX-11/750 central node for data reduction and storage. One of the data acquisition instruments used in this network is a Nuclear Data pulse-height analyzer, the ND66L. This analyzer communicates to a host system over a 9600-baud serial line, using the DDCMP link level protocol. In order to relieve the host computer from the overhead of handling the DDCMP protocol, an in-house designed DMA serial line board was implemented to communicate with the ND66L. The hardware used and its environment will be duscussed along with the design and implementation of the firmware, which implements the serial DDCMP link

  3. Survival relative to new and ancestral host plants, phytoplasma infection, and genetic constitution in host races of a polyphagous insect disease vector

    Science.gov (United States)

    Maixner, Michael; Albert, Andreas; Johannesen, Jes

    2014-01-01

    Dissemination of vectorborne diseases depends strongly on the vector's host range and the pathogen's reservoir range. Because vectors interact with pathogens, the direction and strength of a vector's host shift is vital for understanding epidemiology and is embedded in the framework of ecological specialization. This study investigates survival in host-race evolution of a polyphagous insect disease vector, Hyalesthes obsoletus, whether survival is related to the direction of the host shift (from field bindweed to stinging nettle), the interaction with plant-specific strains of obligate vectored pathogens/symbionts (stolbur phytoplasma), and whether survival is related to genetic differentiation between the host races. We used a twice repeated, identical nested experimental design to study survival of the vector on alternative hosts and relative to infection status. Survival was tested with Kaplan–Meier analyses, while genetic differentiation between vector populations was quantified with microsatellite allele frequencies. We found significant direct effects of host plant (reduced survival on wrong hosts) and sex (males survive longer than females) in both host races and relative effects of host (nettle animals more affected than bindweed animals) and sex (males more affected than females). Survival of bindweed animals was significantly higher on symptomatic than nonsymptomatic field bindweed, but in the second experiment only. Infection potentially had a positive effect on survival in nettle animals but due to low infection rates the results remain suggestive. Genetic differentiation was not related to survival. Greater negative plant-transfer effect but no negative effect of stolbur in the derived host race suggests preadaptation to the new pathogen/symbiont strain before strong diversifying selection during the specialization process. Physiological maladaptation or failure to accept the ancestral plant will have similar consequences, namely positive assortative

  4. Performance analysis of routing protocols for IoT

    Science.gov (United States)

    Manda, Sridhar; Nalini, N.

    2018-04-01

    Internet of Things (IoT) is an arrangement of advancements that are between disciplinary. It is utilized to have compelling combination of both physical and computerized things. With IoT physical things can have personal virtual identities and participate in distributed computing. Realization of IoT needs the usage of sensors based on the sector for which IoT is integrated. For instance, in healthcare domain, IoT needs to have integration with wearable sensors used by patients. As sensor devices produce huge amount of data, often called big data, there should be efficient routing protocols in place. To the extent remote systems is worried there are some current protocols, for example, OLSR, DSR and AODV. It additionally tosses light into Trust based routing protocol for low-power and lossy systems (TRPL) for IoT. These are broadly utilized remote directing protocols. As IoT is developing round the corner, it is basic to investigate routing protocols that and evaluate their execution regarding throughput, end to end delay, and directing overhead. The execution experiences can help in settling on very much educated choices while incorporating remote systems with IoT. In this paper, we analyzed different routing protocols and their performance is compared. It is found that AODV showed better performance than other routing protocols aforementioned.

  5. Skin Microbiomes of California Terrestrial Salamanders Are Influenced by Habitat More Than Host Phylogeny

    Directory of Open Access Journals (Sweden)

    Alicia K. Bird

    2018-03-01

    Full Text Available A multitude of microorganisms live on and within plant and animal hosts, yet the ecology and evolution of these microbial communities remains poorly understood in many taxa. This study examined the extent to which environmental factors and host taxonomic identity explain microbiome variation within two salamander genera, Ensatina and Batrachoseps, in the family Plethodontidae. In particular, we assessed whether microbiome differentiation paralleled host genetic distance at three levels of taxonomy: genus and high and low clade levels within Ensatina eschscholtzii. We predicted that more genetically related host populations would have more similar microbiomes than more distantly related host populations. We found that salamander microbiomes possess bacterial species that are most likely acquired from their surrounding soil environment, but the relative representation of those bacterial species is significantly different on the skin of salamanders compared to soil. We found differences in skin microbiome alpha diversity among Ensatina higher and lower clade groups, as well as differences between Ensatina and Batrachoseps. We also found that relative microbiome composition (beta diversity did vary between Ensatina lower clades, but differences were driven by only a few clades and not correlated to clade genetic distances. We conclude this difference was likely a result of Ensatina lower clades being associated with geographic location and habitat type, as salamander identity at higher taxonomic levels (genus and Ensatina higher clades was a weak predictor of microbiome composition. These results lead us to conclude that environmental factors are likely playing a more significant role in salamander cutaneous microbiome assemblages than host-specific traits.

  6. Efficient Cooperative Protocols for Full-Duplex Relaying over Nakagami-m Fading Channels

    KAUST Repository

    Khafagy, Mohammad Galal

    2015-02-24

    In this work, efficient protocols are studied for full-duplex relaying (FDR) with loopback interference over Nakagami-m block fading channels. Recently, a selective decodeand- forward (DF) protocol was proposed for FDR, and was shown to outperform existing protocols in terms of outage over Rayleigh-fading channels. In this work, we propose an incremental selective DF protocol that offers additional power savings, yet yields the same outage performance. We evaluate their outage performance over independent non-identically distributed Nakagami-m fading links, and study their relative performance in terms of the signal-to-noise ratio cumulative distribution function via closed-form expressions. The offered diversity gain is also derived. In addition, we study their performance relative to their half-duplex counterparts, as well as known non-selective FDR protocols. We corroborate our theoretical results with simulation, and confirm that selective cooperation protocols outperform the known non-selective protocols in terms of outage. Finally, we show that depending on the loopback interference level, the proposed protocols can outperform their half-duplex counterparts when high spectral efficiencies are targeted.

  7. Efficient Cooperative Protocols for Full-Duplex Relaying over Nakagami-m Fading Channels

    KAUST Repository

    Khafagy, Mohammad Galal; Tammam, Amr; Alouini, Mohamed-Slim; Aissa, Sonia

    2015-01-01

    In this work, efficient protocols are studied for full-duplex relaying (FDR) with loopback interference over Nakagami-m block fading channels. Recently, a selective decodeand- forward (DF) protocol was proposed for FDR, and was shown to outperform existing protocols in terms of outage over Rayleigh-fading channels. In this work, we propose an incremental selective DF protocol that offers additional power savings, yet yields the same outage performance. We evaluate their outage performance over independent non-identically distributed Nakagami-m fading links, and study their relative performance in terms of the signal-to-noise ratio cumulative distribution function via closed-form expressions. The offered diversity gain is also derived. In addition, we study their performance relative to their half-duplex counterparts, as well as known non-selective FDR protocols. We corroborate our theoretical results with simulation, and confirm that selective cooperation protocols outperform the known non-selective protocols in terms of outage. Finally, we show that depending on the loopback interference level, the proposed protocols can outperform their half-duplex counterparts when high spectral efficiencies are targeted.

  8. Sex-specific effects of a parasite evolving in a female-biased host population.

    Science.gov (United States)

    Duneau, David; Luijckx, Pepijn; Ruder, Ludwig F; Ebert, Dieter

    2012-12-18

    Males and females differ in many ways and might present different opportunities and challenges to their parasites. In the same way that parasites adapt to the most common host type, they may adapt to the characteristics of the host sex they encounter most often. To explore this hypothesis, we characterized host sex-specific effects of the parasite Pasteuria ramosa, a bacterium evolving in naturally, strongly, female-biased populations of its host Daphnia magna. We show that the parasite proliferates more successfully in female hosts than in male hosts, even though males and females are genetically identical. In addition, when exposure occurred when hosts expressed a sexual dimorphism, females were more infected. In both host sexes, the parasite causes a similar reduction in longevity and leads to some level of castration. However, only in females does parasite-induced castration result in the gigantism that increases the carrying capacity for the proliferating parasite. We show that mature male and female Daphnia represent different environments and reveal one parasite-induced symptom (host castration), which leads to increased carrying capacity for parasite proliferation in female but not male hosts. We propose that parasite induced host castration is a property of parasites that evolved as an adaptation to specifically exploit female hosts.

  9. Sex-specific effects of a parasite evolving in a female-biased host population

    Directory of Open Access Journals (Sweden)

    Duneau David

    2012-12-01

    Full Text Available Abstract Background Males and females differ in many ways and might present different opportunities and challenges to their parasites. In the same way that parasites adapt to the most common host type, they may adapt to the characteristics of the host sex they encounter most often. To explore this hypothesis, we characterized host sex-specific effects of the parasite Pasteuria ramosa, a bacterium evolving in naturally, strongly, female-biased populations of its host Daphnia magna. Results We show that the parasite proliferates more successfully in female hosts than in male hosts, even though males and females are genetically identical. In addition, when exposure occurred when hosts expressed a sexual dimorphism, females were more infected. In both host sexes, the parasite causes a similar reduction in longevity and leads to some level of castration. However, only in females does parasite-induced castration result in the gigantism that increases the carrying capacity for the proliferating parasite. Conclusions We show that mature male and female Daphnia represent different environments and reveal one parasite-induced symptom (host castration, which leads to increased carrying capacity for parasite proliferation in female but not male hosts. We propose that parasite induced host castration is a property of parasites that evolved as an adaptation to specifically exploit female hosts.

  10. Sex-specific effects of a parasite evolving in a female-biased host population

    Science.gov (United States)

    2012-01-01

    Background Males and females differ in many ways and might present different opportunities and challenges to their parasites. In the same way that parasites adapt to the most common host type, they may adapt to the characteristics of the host sex they encounter most often. To explore this hypothesis, we characterized host sex-specific effects of the parasite Pasteuria ramosa, a bacterium evolving in naturally, strongly, female-biased populations of its host Daphnia magna. Results We show that the parasite proliferates more successfully in female hosts than in male hosts, even though males and females are genetically identical. In addition, when exposure occurred when hosts expressed a sexual dimorphism, females were more infected. In both host sexes, the parasite causes a similar reduction in longevity and leads to some level of castration. However, only in females does parasite-induced castration result in the gigantism that increases the carrying capacity for the proliferating parasite. Conclusions We show that mature male and female Daphnia represent different environments and reveal one parasite-induced symptom (host castration), which leads to increased carrying capacity for parasite proliferation in female but not male hosts. We propose that parasite induced host castration is a property of parasites that evolved as an adaptation to specifically exploit female hosts. PMID:23249484

  11. Key exchange using biometric identity based encryption for sharing encrypted data in cloud environment

    Science.gov (United States)

    Hassan, Waleed K.; Al-Assam, Hisham

    2017-05-01

    The main problem associated with using symmetric/ asymmetric keys is how to securely store and exchange the keys between the parties over open networks particularly in the open environment such as cloud computing. Public Key Infrastructure (PKI) have been providing a practical solution for session key exchange for loads of web services. The key limitation of PKI solution is not only the need for a trusted third partly (e.g. certificate authority) but also the absent link between data owner and the encryption keys. The latter is arguably more important where accessing data needs to be linked with identify of the owner. Currently available key exchange protocols depend on using trusted couriers or secure channels, which can be subject to man-in-the-middle attack and various other attacks. This paper proposes a new protocol for Key Exchange using Biometric Identity Based Encryption (KE-BIBE) that enables parties to securely exchange cryptographic keys even an adversary is monitoring the communication channel between the parties. The proposed protocol combines biometrics with IBE in order to provide a secure way to access symmetric keys based on the identity of the users in unsecure environment. In the KE-BIOBE protocol, the message is first encrypted by the data owner using a traditional symmetric key before migrating it to a cloud storage. The symmetric key is then encrypted using public biometrics of the users selected by data owner to decrypt the message based on Fuzzy Identity-Based Encryption. Only the selected users will be able to decrypt the message by providing a fresh sample of their biometric data. The paper argues that the proposed solution eliminates the needs for a key distribution centre in traditional cryptography. It will also give data owner the power of finegrained sharing of encrypted data by control who can access their data.

  12. Exploring Uyghur University Students' Identities Constructed through Multilingual Practices in China

    Science.gov (United States)

    Guo, Xiaoyan; Gu, Mingyue

    2018-01-01

    This article explores how a cohort of tertiary-level Uyghur students contested and negotiated their identities through multilingual practices in the receiving community. Drawing upon interview data from fieldwork, this study indicates that these students experienced essentialist understandings and negative views in the host society. Participants…

  13. A Lightweight Protocol for Secure Video Streaming.

    Science.gov (United States)

    Venčkauskas, Algimantas; Morkevicius, Nerijus; Bagdonas, Kazimieras; Damaševičius, Robertas; Maskeliūnas, Rytis

    2018-05-14

    The Internet of Things (IoT) introduces many new challenges which cannot be solved using traditional cloud and host computing models. A new architecture known as fog computing is emerging to address these technological and security gaps. Traditional security paradigms focused on providing perimeter-based protections and client/server point to point protocols (e.g., Transport Layer Security (TLS)) are no longer the best choices for addressing new security challenges in fog computing end devices, where energy and computational resources are limited. In this paper, we present a lightweight secure streaming protocol for the fog computing "Fog Node-End Device" layer. This protocol is lightweight, connectionless, supports broadcast and multicast operations, and is able to provide data source authentication, data integrity, and confidentiality. The protocol is based on simple and energy efficient cryptographic methods, such as Hash Message Authentication Codes (HMAC) and symmetrical ciphers, and uses modified User Datagram Protocol (UDP) packets to embed authentication data into streaming data. Data redundancy could be added to improve reliability in lossy networks. The experimental results summarized in this paper confirm that the proposed method efficiently uses energy and computational resources and at the same time provides security properties on par with the Datagram TLS (DTLS) standard.

  14. Privacy-Enhancing Security Protocol in LTE Initial Attack

    Directory of Open Access Journals (Sweden)

    Uijin Jang

    2014-12-01

    Full Text Available Long-Term Evolution (LTE is a fourth-generation mobile communication technology implemented throughout the world. It is the communication means of smartphones that send and receive all of the private date of individuals. M2M, IOT, etc., are the base technologies of mobile communication that will be used in the future cyber world. However, identification parameters, such as International Mobile Subscriber Identity (IMSI, Radio Network Temporary Identities (RNTI, etc., in the initial attach section for accessing the LTE network are presented with the vulnerability of being exposed as clear text. Such vulnerability does not end in a mere identification parameter, but can lead to a secondary attack using the identification parameter, such as replication of the smartphone, illegal use of the mobile communication network, etc. This paper proposes a security protocol to safely transmit identification parameters in different cases of the initial attach. The proposed security protocol solves the exposed vulnerability by encrypting the parameters in transmission. Using an OPNET simulator, it is shown that the average rate of delay and processing ratio are efficient in comparison to the existing process.

  15. Defining the identity of human adipose-derived mesenchymal stem cells.

    Science.gov (United States)

    Montelatici, Elisa; Baluce, Barbara; Ragni, Enrico; Lavazza, Cristiana; Parazzi, Valentina; Mazzola, Riccardo; Cantarella, Giovanna; Brambilla, Massimiliano; Giordano, Rosaria; Lazzari, Lorenza

    2015-02-01

    Adipose-derived mesenchymal stem cells (ADMSCs) are an ideal population for regenerative medical application. Both the isolation procedure and the culturing conditions are crucial steps, since low yield can limit further cell therapies, especially when minimal adipose tissue harvests are available for cell expansion. To date, a standardized procedure encompassing both isolation sites and expansion methods is missing, thus making the choice of the most appropriate conditions for the preparation of ADMSCs controversial, especially in view of the different applications needed. In this study, we compared the effects of three different commercial media (DMEM, aMEM, and EGM2), routinely used for ADMSCs expansion, and two supplements, FBS and human platelet lysate, recently proven to be an effective alternative to prevent xenogeneic antibody transfer and immune alloresponse in the host. Notably, all the conditions resulted in being safe for ADMSCs isolation and expansion with platelet lysate supplementation giving the highest isolation and proliferation rates, together with a commitment for osteogenic lineage. Then, we proved that the high ADMSC hematopoietic supportive potential is performed through a constant and abundant secretion of both GCSF and SCF. In conclusion, this study further expands the knowledge on ADMSCs, defining their identity definition and offers potential options for in vitro protocols for clinical production, especially related to HSC expansion without use of exogenous cytokines or genetic modifications.

  16. Genome-wide RNAi Screening to Identify Host Factors That Modulate Oncolytic Virus Therapy.

    Science.gov (United States)

    Allan, Kristina J; Mahoney, Douglas J; Baird, Stephen D; Lefebvre, Charles A; Stojdl, David F

    2018-04-03

    High-throughput genome-wide RNAi (RNA interference) screening technology has been widely used for discovering host factors that impact virus replication. Here we present the application of this technology to uncovering host targets that specifically modulate the replication of Maraba virus, an oncolytic rhabdovirus, and vaccinia virus with the goal of enhancing therapy. While the protocol has been tested for use with oncolytic Maraba virus and oncolytic vaccinia virus, this approach is applicable to other oncolytic viruses and can also be utilized for identifying host targets that modulate virus replication in mammalian cells in general. This protocol describes the development and validation of an assay for high-throughput RNAi screening in mammalian cells, the key considerations and preparation steps important for conducting a primary high-throughput RNAi screen, and a step-by-step guide for conducting a primary high-throughput RNAi screen; in addition, it broadly outlines the methods for conducting secondary screen validation and tertiary validation studies. The benefit of high-throughput RNAi screening is that it allows one to catalogue, in an extensive and unbiased fashion, host factors that modulate any aspect of virus replication for which one can develop an in vitro assay such as infectivity, burst size, and cytotoxicity. It has the power to uncover biotherapeutic targets unforeseen based on current knowledge.

  17. Bringing Federated Identity to Grid Computing

    Energy Technology Data Exchange (ETDEWEB)

    Teheran, Jeny [Fermilab

    2016-03-04

    The Fermi National Accelerator Laboratory (FNAL) is facing the challenge of providing scientific data access and grid submission to scientific collaborations that span the globe but are hosted at FNAL. Users in these collaborations are currently required to register as an FNAL user and obtain FNAL credentials to access grid resources to perform their scientific computations. These requirements burden researchers with managing additional authentication credentials, and put additional load on FNAL for managing user identities. Our design integrates the existing InCommon federated identity infrastructure, CILogon Basic CA, and MyProxy with the FNAL grid submission system to provide secure access for users from diverse experiments and collab orations without requiring each user to have authentication credentials from FNAL. The design automates the handling of certificates so users do not need to manage them manually. Although the initial implementation is for FNAL's grid submission system, the design and the core of the implementation are general and could be applied to other distributed computing systems.

  18. Effects of host genetics and environment on egg-associated microbiotas in brown trout (Salmo trutta).

    Science.gov (United States)

    Wilkins, Laetitia G E; Fumagalli, Luca; Wedekind, Claus

    2016-10-01

    Recent studies found fish egg-specific bacterial communities that changed over the course of embryogenesis, suggesting an interaction between the developing host and its microbiota. Indeed, single-strain infections demonstrated that the virulence of opportunistic bacteria is influenced by environmental factors and host immune genes. However, the interplay between a fish embryo host and its microbiota has not been studied yet at the community level. To test whether host genetics affects the assemblage of egg-associated bacteria, adult brown trout (Salmo trutta) were sampled from a natural population. Their gametes were used for full-factorial in vitro fertilizations to separate sire from dam effects. In total, 2520 embryos were singly raised under experimental conditions that differently support microbial growth. High-throughput 16S rRNA amplicon sequencing was applied to characterize bacterial communities on milt and fertilized eggs across treatments. Dam and sire identity influenced embryo mortality, time until hatching and composition of egg-associated microbiotas, but no link between bacterial communities on milt and on fertilized eggs could be found. Elevated resources increased embryo mortality and modified bacterial communities with a shift in their putative functional potential. Resource availability did not significantly affect any parental effects on embryo performance. Sire identity affected bacterial diversity that turned out to be a significant predictor of hatching time: embryos associated with high bacterial diversity hatched later. We conclude that both host genetics and the availability of resources define diversity and composition of egg-associated bacterial communities that then affect the life history of their hosts. © 2016 John Wiley & Sons Ltd.

  19. Identity Establishment and Capability Based Access Control (IECAC) Scheme for Internet of Things

    DEFF Research Database (Denmark)

    Mahalle, Parikshit N.; Anggorojati, Bayu; Prasad, Neeli R.

    2012-01-01

    Internet of Things (IoT) become discretionary part of everyday life and could befall a threat if security is not considered before deployment. Authentication and access control in IoT is equally important to establish secure communication between devices. To protect IoT from man in middle, replay...... and denial of service attacks, the concept of capability for access control is introduced. This paper presents Identity establishment and capability based access control (IECAC) protocol using ECC (Elliptical Curve Cryptography) for IoT along with protocol evaluation, which protect against the aforementioned...

  20. Structural basis for antagonizing a host restriction factor by C7 family of poxvirus host-range proteins.

    Science.gov (United States)

    Meng, Xiangzhi; Krumm, Brian; Li, Yongchao; Deng, Junpeng; Xiang, Yan

    2015-12-01

    Human sterile alpha motif domain-containing 9 (SAMD9) protein is a host restriction factor for poxviruses, but it can be overcome by some poxvirus host-range proteins that share homology with vaccinia virus C7 protein. To understand the mechanism of action for this important family of host-range factors, we determined the crystal structures of C7 and myxoma virus M64, a C7 family member that is unable to antagonize SAMD9. Despite their different functions and only 23% sequence identity, the two proteins have very similar overall structures, displaying a previously unidentified fold comprised of a compact 12-stranded antiparallel β-sandwich wrapped in two short α helices. Extensive structure-guided mutagenesis of C7 identified three loops clustered on one edge of the β sandwich as critical for viral replication and binding with SAMD9. The loops are characterized with functionally important negatively charged, positively charged, and hydrophobic residues, respectively, together forming a unique "three-fingered molecular claw." The key residues of the claw are not conserved in two C7 family members that do not antagonize SAMD9 but are conserved in distantly related C7 family members from four poxvirus genera that infect diverse mammalian species. Indeed, we found that all in the latter group of proteins bind SAMD9. Taken together, our data indicate that diverse mammalian poxviruses use a conserved molecular claw in a C7-like protein to target SAMD9 and overcome host restriction.

  1. Protocol for fermionic positive-operator-valued measures

    Science.gov (United States)

    Arvidsson-Shukur, D. R. M.; Lepage, H. V.; Owen, E. T.; Ferrus, T.; Barnes, C. H. W.

    2017-11-01

    In this paper we present a protocol for the implementation of a positive-operator-valued measure (POVM) on massive fermionic qubits. We present methods for implementing nondispersive qubit transport, spin rotations, and spin polarizing beam-splitter operations. Our scheme attains linear opticslike control of the spatial extent of the qubits by considering ground-state electrons trapped in the minima of surface acoustic waves in semiconductor heterostructures. Furthermore, we numerically simulate a high-fidelity POVM that carries out Procrustean entanglement distillation in the framework of our scheme, using experimentally realistic potentials. Our protocol can be applied not only to pure ensembles with particle pairs of known identical entanglement, but also to realistic ensembles of particle pairs with a distribution of entanglement entropies. This paper provides an experimentally realizable design for future quantum technologies.

  2. Two analytical models for evaluating performance of Gigabit Ethernet Hosts

    International Nuclear Information System (INIS)

    Salah, K.

    2006-01-01

    Two analytical models are developed to study the impact of interrupt overhead on operating system performance of network hosts when subjected to Gigabit network traffic. Under heavy network traffic, the system performance will be negatively affected due to interrupt overhead caused by incoming traffic. In particular, excessive latency and significant degradation in system throughput can be experienced. Also user application may livelock as the CPU power is mostly consumed by interrupt handling and protocol processing. In this paper we present and compare two analytical models that capture host behavior and evaluate its performance. The first model is based Markov processes and queuing theory, while the second, which is more accurate but more complex is a pure Markov process. For the most part both models give mathematically-equivalent closed-form solutions for a number of important system performance metrics. These metrics include throughput, latency and stability condition, CPU utilization of interrupt handling and protocol processing and CPU availability for user applications. The analysis yields insight into understanding and predicting the impact of system and network choices on the performance of interrupt-driven systems when subjected to light and heavy network loads. More, importantly, our analytical work can also be valuable in improving host performance. The paper gives guidelines and recommendations to address design and implementation issues. Simulation and reported experimental results show that our analytical models are valid and give a good approximation. (author)

  3. Herpesvirus papio 2 encodes a virion host shutoff function.

    Science.gov (United States)

    Bigger, John E; Martin, David W

    2002-12-05

    Infection of baboons with herpesvirus papio 2 (HVP-2) produces a disease that is similar to human infection with herpes simplex viruses (HSV). Molecular characterization of HVP-2 has demonstrated that the virion contains a factor which rapidly shuts off host cell protein synthesis after infection. Reduction of host cell protein synthesis occurs in parallel with the degradation of mRNA species. A homolog of the HSV virion host shutoff (vhs) gene was identified by Southern and DNA sequence analysis. The sequence of the HVP-2 vhs gene homolog had greater than 70% identity with the vhs genes of HSV 1 and 2. Disruption of the HVP-2 vhs open reading frame diminished the ability of the virus to shut off protein synthesis and degrade cellular mRNA, indicating that this gene was responsible for the vhs activity. The HVP-2 model system provides the opportunity to study the biological role of vhs in the context of a natural primate host. Further development of this system will provide a platform for proof-of-concept studies that will test the efficacy of vaccines that utilize vhs-deficient viruses.

  4. Gamma-Ray Burst Host Galaxies Have "Normal" Luminosities.

    Science.gov (United States)

    Schaefer

    2000-04-10

    The galactic environment of gamma-ray bursts can provide good evidence about the nature of the progenitor system, with two old arguments implying that the burst host galaxies are significantly subluminous. New data and new analysis have now reversed this picture: (1) Even though the first two known host galaxies are indeed greatly subluminous, the next eight hosts have absolute magnitudes typical for a population of field galaxies. A detailed analysis of the 16 known hosts (10 with redshifts) shows them to be consistent with a Schechter luminosity function with R*=-21.8+/-1.0, as expected for normal galaxies. (2) Bright bursts from the Interplanetary Network are typically 18 times brighter than the faint bursts with redshifts; however, the bright bursts do not have galaxies inside their error boxes to limits deeper than expected based on the luminosities for the two samples being identical. A new solution to this dilemma is that a broad burst luminosity function along with a burst number density varying as the star formation rate will require the average luminosity of the bright sample (>6x1058 photons s-1 or>1.7x1052 ergs s-1) to be much greater than the average luminosity of the faint sample ( approximately 1058 photons s-1 or approximately 3x1051 ergs s-1). This places the bright bursts at distances for which host galaxies with a normal luminosity will not violate the observed limits. In conclusion, all current evidence points to gamma-ray burst host galaxies being normal in luminosity.

  5. Identity Issues and Challenges Faced by Russian Immigrants in New Zealand

    Directory of Open Access Journals (Sweden)

    Elena Maydell

    2009-08-01

    Full Text Available Among the processes cosmopolitan societies undergo at the present moment, is the unprecedented increase in mass migration across cultures. What challenges are faced by both immigrants, who have to settle in novel socio-cultural environments, and by the host populations accepting them? The current qualitative study investigates the nature of identity construction among Russian-speaking immigrants in New Zealand, applying thematic analysis for the interpretation of the data collected via 23 in-depth interviews. Among the most common themes articulated by the participants was the feeling of identity loss. A taken-for-granted sense of identity, brought by the participants from their culture of origin, was not validated by their new society of residence, mostly due to the lack of appropriate cultural resources. The participants were faced with a challenge of re-constructing their old identity, or constructing a new one, utilising the available resources in the community around them. At the same time, there was a sub-group for whom this challenge brought the realisation that the nature of their identity is cosmopolitan, rather than located within any particular culture or geographical space.

  6. Insights into Host Cell Modulation and Induction of New Cells by the Corn Smut Ustilago maydis

    Directory of Open Access Journals (Sweden)

    Amey Redkar

    2017-05-01

    Full Text Available Many filamentous fungal pathogens induce drastic modulation of host cells causing abnormal infectious structures such as galls, or tumors that arise as a result of re-programming in the original developmental cell fate of a colonized host cell. Developmental consequences occur predominantly with biotrophic phytopathogens. This suggests that these host structures result as an outcome of efficient defense suppression and intimate fungal–host interaction to suit the pathogen’s needs for completion of its infection cycle. This mini-review mainly summarizes host cell re-programming that occurs in the Ustilago maydis – maize interaction, in which the pathogen deploys cell-type specific effector proteins with varying activities. The fungus senses the physiological status and identity of colonized host cells and re-directs the endogenous developmental program of its host. The disturbance of host cell physiology and cell fate leads to novel cell shapes, increased cell size, and/or the number of host cells. We particularly highlight the strategies of U. maydis to induce physiologically varied host organs to form the characteristic tumors in both vegetative and floral parts of maize.

  7. A Self-Stabilizing Distributed Clock Synchronization Protocol for Arbitrary Digraphs

    Science.gov (United States)

    Malekpour, Mahyar R.

    2011-01-01

    This report presents a self-stabilizing distributed clock synchronization protocol in the absence of faults in the system. It is focused on the distributed clock synchronization of an arbitrary, non-partitioned digraph ranging from fully connected to 1-connected networks of nodes while allowing for differences in the network elements. This protocol does not rely on assumptions about the initial state of the system, other than the presence of at least one node, and no central clock or a centrally generated signal, pulse, or message is used. Nodes are anonymous, i.e., they do not have unique identities. There is no theoretical limit on the maximum number of participating nodes. The only constraint on the behavior of the node is that the interactions with other nodes are restricted to defined links and interfaces. We present an outline of a deductive proof of the correctness of the protocol. A model of the protocol was mechanically verified using the Symbolic Model Verifier (SMV) for a variety of topologies. Results of the mechanical proof of the correctness of the protocol are provided. The model checking results have verified the correctness of the protocol as they apply to the networks with unidirectional and bidirectional links. In addition, the results confirm the claims of determinism and linear convergence. As a result, we conjecture that the protocol solves the general case of this problem. We also present several variations of the protocol and discuss that this synchronization protocol is indeed an emergent system.

  8. A Protocol for Provably Secure Authentication of a Tiny Entity to a High Performance Computing One

    Directory of Open Access Journals (Sweden)

    Siniša Tomović

    2016-01-01

    Full Text Available The problem of developing authentication protocols dedicated to a specific scenario where an entity with limited computational capabilities should prove the identity to a computationally powerful Verifier is addressed. An authentication protocol suitable for the considered scenario which jointly employs the learning parity with noise (LPN problem and a paradigm of random selection is proposed. It is shown that the proposed protocol is secure against active attacking scenarios and so called GRS man-in-the-middle (MIM attacking scenarios. In comparison with the related previously reported authentication protocols the proposed one provides reduction of the implementation complexity and at least the same level of the cryptographic security.

  9. In four shallow and mesophotic tropical reef sponges from Guam the microbial community largely depends on host identity

    NARCIS (Netherlands)

    Steinert, Georg; Taylor, Michael W.; Deines, Peter; Simister, Rachel L.; Voogd, De Nicole J.; Hoggard, Michael; Schupp, Peter J.

    2016-01-01

    Sponges (phylum Porifera) are important members of almost all aquatic ecosystems, and are renowned for hosting often dense and diverse microbial communities. While the specificity of the sponge microbiota seems to be closely related to host phylogeny, the environmental factors that could shape

  10. Meeting the Needs of Clients with Dissociative Identity Disorder: Considerations for Psychotherapy

    Science.gov (United States)

    Ringrose, Jo L.

    2011-01-01

    Psychotherapy for clients with Dissociative Identity Disorder (DID) is different to therapy with most clients because these clients are multiple, comprising one or more host, and one or more alter personalities. The necessary components to be addressed in order that clients can live successfully either as a multiple or as an integrated person are…

  11. A Protocol for Content-Based Communication in Disconnected Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Julien Haillot

    2010-01-01

    Full Text Available In content-based communication, information flows towards interested hosts rather than towards specifically set destinations. This new style of communication perfectly fits the needs of applications dedicated to information sharing, news distribution, service advertisement and discovery, etc. In this paper we address the problem of supporting content-based communication in partially or intermittently connected mobile ad hoc networks (MANETs. The protocol we designed leverages on the concepts of opportunistic networking and delay-tolerant networking in order to account for the absence of end-to-end connectivity in disconnected MANETs. The paper provides an overview of the protocol, as well as simulation results that show how this protocol can perform in realistic conditions.

  12. Model Checking A Self-Stabilizing Synchronization Protocol for Arbitrary Digraphs

    Science.gov (United States)

    Malekpour, Mahyar R.

    2012-01-01

    This report presents the mechanical verification of a self-stabilizing distributed clock synchronization protocol for arbitrary digraphs in the absence of faults. This protocol does not rely on assumptions about the initial state of the system, other than the presence of at least one node, and no central clock or a centrally generated signal, pulse, or message is used. The system under study is an arbitrary, non-partitioned digraph ranging from fully connected to 1-connected networks of nodes while allowing for differences in the network elements. Nodes are anonymous, i.e., they do not have unique identities. There is no theoretical limit on the maximum number of participating nodes. The only constraint on the behavior of the node is that the interactions with other nodes are restricted to defined links and interfaces. This protocol deterministically converges within a time bound that is a linear function of the self-stabilization period. A bounded model of the protocol is verified using the Symbolic Model Verifier (SMV) for a subset of digraphs. Modeling challenges of the protocol and the system are addressed. The model checking effort is focused on verifying correctness of the bounded model of the protocol as well as confirmation of claims of determinism and linear convergence with respect to the self-stabilization period.

  13. Metabolite comparisons and the identity of nutrients translocated from symbiotic algae to an animal host.

    Science.gov (United States)

    Whitehead, L F; Douglas, A E

    2003-09-01

    Dinoflagellate algae of the genus Symbiodinium in symbiosis with marine animals release much of their photosynthetic carbon to the animal host. The compounds translocated to the host ('mobile compounds') were investigated by metabolite comparison as follows: a substrate was identified as a candidate mobile compound when comparable profiles of metabolites were generated from host metabolism of this substrate (supplied exogenously) and the endogenous mobile compounds. When the sea anemone Anemonia viridis was incubated with NaH14CO2 under photosynthesizing conditions, most of the radioactivity in the animal tissue was recovered from the low-molecular-mass fraction and distributed in the ratio 1:2:1 between the neutral, acidic and basic sub-fractions. Prominent 14C-labelled compounds included glucose, malate and glucose-6-phosphate. When the symbiosis was incubated with 14C-labelled glucose plus succinate or fumarate (but none of eight other substrate combinations tested), the 14C-labelled metabolites closely matched those obtained with NaH14CO2. These data suggest that glucose and succinate/fumarate (or metabolically allied compounds) may be important photosynthetic compounds transferred from the Symbiodinium cells to the tissues of A. viridis. Metabolite comparisons can be applied to study nutritional interactions in symbioses involving photosynthetic algae and, with appropriate modification, other associations between microorganisms and plants or animals.

  14. Identity driven Capability based Access Control (ICAC) Scheme for the Internet of Things

    DEFF Research Database (Denmark)

    Mahalle, Parikshit N.; Anggorojati, Bayu; Prasad, Neeli R.

    2012-01-01

    Internet of Things (IoT) becomes discretionary part of everyday life. Scalability and manageability is daunting due to unbounded number of devices and services. Access control and authorization in IoT with least privilege is equally important to establish secure communication between multiple...... devices and services. In this paper, the concept of capability for access control is introduced where the identities of the involved devices are entrenched in the access capabilities. Identity driven capability based access control (ICAC) scheme presented in this paper helps to alleviate issues related...... to complexity and dynamics of device identities. ICAC is implemented for 802.11 and results shows that ICAC has less scalability issues and better performance analysis compared with other access control schemes. The ICAC evaluation by using security protocol verification tool shows that ICAC is secure against...

  15. Home and away: hybrid perspective on identity formation in 1.5 and second generation adolescent immigrants in Israel.

    Directory of Open Access Journals (Sweden)

    Robin A. Harper

    2013-12-01

    Full Text Available Immigration is not only about changing countries, but also about shifting identities. This change is especially important for adolescents. This article examines identity formation among 1.5 and 2nd generation adolescent immigrants to Israel. A survey of 125 children of immigrants aged 12-19 examined the role of social structures such as pace of life, culture, religion and language on identity formation in 1.5 and 2nd generational groups. We have identified several significant factors affecting the identities of children of migrants in each group. Looking beyond self-labeling, we argue that identity formation among children of immigrants is a continuous process in which the host country and origin country, both or neither of them, create dynamic hybrid patterns of identifications.

  16. Host age modulates within-host parasite competition.

    Science.gov (United States)

    Izhar, Rony; Routtu, Jarkko; Ben-Ami, Frida

    2015-05-01

    In many host populations, one of the most striking differences among hosts is their age. While parasite prevalence differences in relation to host age are well known, little is known on how host age impacts ecological and evolutionary dynamics of diseases. Using two clones of the water flea Daphnia magna and two clones of its bacterial parasite Pasteuria ramosa, we examined how host age at exposure influences within-host parasite competition and virulence. We found that multiply-exposed hosts were more susceptible to infection and suffered higher mortality than singly-exposed hosts. Hosts oldest at exposure were least often infected and vice versa. Furthermore, we found that in young multiply-exposed hosts competition was weak, allowing coexistence and transmission of both parasite clones, whereas in older multiply-exposed hosts competitive exclusion was observed. Thus, age-dependent parasite exposure and host demography (age structure) could together play an important role in mediating parasite evolution. At the individual level, our results demonstrate a previously unnoticed interaction of the host's immune system with host age, suggesting that the specificity of immune function changes as hosts mature. Therefore, evolutionary models of parasite virulence might benefit from incorporating age-dependent epidemiological parameters. © 2015 The Author(s) Published by the Royal Society. All rights reserved.

  17. Identity of Sarcocystis species of the water buffalo (Bubalus bubalis) and cattle (Bos taurus) and the suppression of Sarcocystis sinensis as a nomen nudum

    Science.gov (United States)

    There are uncertainties concerning the identity and host species specificity of Sarcocystis species of the water buffalo (Bubalus bubalis) and cattle (Bos taurus). Currently, in cattle three species are recognized with known endogenous stages, viz.: S. cruzi (with canine definitive host), S. hirsuta...

  18. BAVP: Blockchain-Based Access Verification Protocol in LEO Constellation Using IBE Keys

    Directory of Open Access Journals (Sweden)

    Songjie Wei

    2018-01-01

    Full Text Available LEO constellation has received intensive research attention in the field of satellite communication. The existing centralized authentication protocols traditionally used for MEO/GEO satellite networks cannot accommodate LEO satellites with frequent user connection switching. This paper proposes a fast and efficient access verification protocol named BAVP by combining identity-based encryption and blockchain technology. Two different key management schemes with IBE and blockchain, respectively, are investigated, which further enhance the authentication reliability and efficiency in LEO constellation. Experiments on OPNET simulation platform evaluate and demonstrate the effectiveness, reliability, and fast-switching efficiency of the proposed protocol. For LEO networks, BAVP surpasses the well-known existing solutions with significant advantages in both performance and scalability which are supported by theoretical analysis and simulation results.

  19. Evidence to support horses as natural intermediate hosts for Sarcocystis neurona.

    Science.gov (United States)

    Mullaney, Thomas; Murphy, Alice J; Kiupel, Matti; Bell, Julia A; Rossano, Mary G; Mansfield, Linda S

    2005-10-10

    Opossums (Didelphis spp.) are the definitive host for the protozoan parasite Sarcocystis neurona, the causative agent of equine protozoal myeloencephalitis (EPM). Opossums shed sporocysts in feces that can be ingested by true intermediate hosts (cats, raccoons, skunks, armadillos and sea otters). Horses acquire the parasite by ingestion of feed or water contaminated by opossum feces. However, horses have been classified as aberrant intermediate hosts because the terminal asexual sarcocyst stage that is required for transmission to the definitive host has not been found in their tissues despite extensive efforts to search for them [Dubey, J.P., Lindsay, D.S., Saville, W.J., Reed, S.M., Granstrom, D.E., Speer, C.A., 2001b. A review of Sarcocystis neurona and equine protozoal myeloencephalitis (EPM). Vet. Parasitol. 95, 89-131]. In a 4-month-old filly with neurological disease consistent with EPM, we demonstrate schizonts in the brain and spinal cord and mature sarcocysts in the tongue and skeletal muscle, both with genetic and morphological characteristics of S. neurona. The histological and electron microscopic morphology of the schizonts and sarcocysts were identical to published features of S. neurona [Stanek, J.F., Dubey, J.P., Oglesbee, M.J., Reed, S.M., Lindsay, D.S., Capitini, L.A., Njoku, C.J., Vittitow, K.L., Saville, W.J., 2002. Life cycle of Sarcocystis neurona in its natural intermediate host, the raccoon, Procyon lotor. J. Parasitol. 88, 1151-1158]. DNA from schizonts and sarcocysts from this horse produced Sarcocystis specific 334bp PCR products [Tanhauser, S.M., Yowell, C.A., Cutler, T.J., Greiner, E.C., MacKay, R.J., Dame, J.B., 1999. Multiple DNA markers differentiate Sarcocystis neurona and Sarcocystis falcatula. J. Parasitol. 85, 221-228]. Restriction fragment length polymorphism (RFLP) analysis of these PCR products showed banding patterns characteristic of S. neurona. Sequencing, alignment and comparison of both schizont and sarcocyst DNA

  20. An Identity-Based Anti-Quantum Privacy-Preserving Blind Authentication in Wireless Sensor Networks.

    Science.gov (United States)

    Zhu, Hongfei; Tan, Yu-An; Zhu, Liehuang; Wang, Xianmin; Zhang, Quanxin; Li, Yuanzhang

    2018-05-22

    With the development of wireless sensor networks, IoT devices are crucial for the Smart City; these devices change people's lives such as e-payment and e-voting systems. However, in these two systems, the state-of-art authentication protocols based on traditional number theory cannot defeat a quantum computer attack. In order to protect user privacy and guarantee trustworthy of big data, we propose a new identity-based blind signature scheme based on number theorem research unit lattice, this scheme mainly uses a rejection sampling theorem instead of constructing a trapdoor. Meanwhile, this scheme does not depend on complex public key infrastructure and can resist quantum computer attack. Then we design an e-payment protocol using the proposed scheme. Furthermore, we prove our scheme is secure in the random oracle, and satisfies confidentiality, integrity, and non-repudiation. Finally, we demonstrate that the proposed scheme outperforms the other traditional existing identity-based blind signature schemes in signing speed and verification speed, outperforms the other lattice-based blind signature in signing speed, verification speed, and signing secret key size.

  1. An Identity-Based Anti-Quantum Privacy-Preserving Blind Authentication in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Hongfei Zhu

    2018-05-01

    Full Text Available With the development of wireless sensor networks, IoT devices are crucial for the Smart City; these devices change people’s lives such as e-payment and e-voting systems. However, in these two systems, the state-of-art authentication protocols based on traditional number theory cannot defeat a quantum computer attack. In order to protect user privacy and guarantee trustworthy of big data, we propose a new identity-based blind signature scheme based on number theorem research unit lattice, this scheme mainly uses a rejection sampling theorem instead of constructing a trapdoor. Meanwhile, this scheme does not depend on complex public key infrastructure and can resist quantum computer attack. Then we design an e-payment protocol using the proposed scheme. Furthermore, we prove our scheme is secure in the random oracle, and satisfies confidentiality, integrity, and non-repudiation. Finally, we demonstrate that the proposed scheme outperforms the other traditional existing identity-based blind signature schemes in signing speed and verification speed, outperforms the other lattice-based blind signature in signing speed, verification speed, and signing secret key size.

  2. The Efficiency of Quantum Identity Testing of Multiple States

    OpenAIRE

    Kada, Masaru; Nishimura, Harumichi; Yamakami, Tomoyuki

    2008-01-01

    We examine two quantum operations, the Permutation Test and the Circle Test, which test the identity of n quantum states. These operations naturally extend the well-studied Swap Test on two quantum states. We first show the optimality of the Permutation Test for any input size n as well as the optimality of the Circle Test for three input states. In particular, when n=3, we present a semi-classical protocol, incorporated with the Swap Test, which approximates the Circle Test efficiently. Furt...

  3. Histophilus somni biofilm formation in cardiopulmonary tissue of the bovine host following respiratory challenge

    DEFF Research Database (Denmark)

    Sandal, Indra; Shao, Jian Q.; Annadata, Satish

    2009-01-01

    Biofilms form in a variety of host sites following infection with many bacterial species. However, the study of biofilms in a host is hindered due to the lack of protocols for the proper experimental investigation of biofilms in vivo. Histophilus somni is an agent of respiratory and systemic...... diseases in bovines, and readily forms biofilms in vitro. In the present study the capability of H. somni to form biofilms in cardiopulmonary tissue following experimental respiratory infection in the bovine host was examined by light microscopy, transmission electron microscopy, immunoelectron microscopy...... haemagglutinin (FHA), predicted to be involved in attachment. Thus, this investigation demonstrated that H. somni is capable of forming a biofilm in its natural host, that such a biofilm may be capable of harboring other bovine respiratory disease pathogens, and that the genes responsible for biofilm formation...

  4. A Data-origin Authentication Protocol Based on ONOS Cluster

    Directory of Open Access Journals (Sweden)

    Qin Hua

    2016-01-01

    Full Text Available This paper is aim to propose a data-origin authentication protocol based on ONOS cluster. ONOS is a SDN controller which can work under a distributed environment. However, the security of an ONOS cluster is seldom considered, and the communication in an ONOS cluster may suffer from lots of security threats. In this paper, we used a two-tier self-renewable hash chain for identity authentication and data-origin authentication. We analyse the security and overhead of our proposal and made a comparison with current security measure. It showed that with the help of our proposal, communication in an ONOS cluster could be protected from identity forging, replay attacks, data tampering, MITM attacks and repudiation, also the computational overhead would decrease apparently.

  5. Online identity: constructing interpersonal trust and openness through participating in hospitality social networks

    Directory of Open Access Journals (Sweden)

    Alexander Ronzhyn

    2013-06-01

    Full Text Available The present article describes the results of research on online identity construction during the participation in the hospitality social networks. Specifically the user references are analysed to understand patterns that form the image of a member. CouchSurfing service (couchsurfing.org allows users to leave short texts where the experience of hosting/being hosted by a CS member is described, is an evaluation of the CS members of each other’s personal traits, skills and common experience. Therefore references can become a good instrument for portraying a CouchSurfing member and understanding his or her particular traits. References form an important part of a user’s virtual identity in the network. Using a sample of references of Spanish CouchSurfing users, the research established main characteristics of the references, which are the openness, readiness to share ideas and experiences and trustworthiness. These concepts illustrate the typical traits associated with a user of the network and also shed light on the activities common during offl ine CS meetings

  6. Drosophila melanogaster as a High-Throughput Model for Host-Microbiota Interactions.

    Science.gov (United States)

    Trinder, Mark; Daisley, Brendan A; Dube, Josh S; Reid, Gregor

    2017-01-01

    Microbiota research often assumes that differences in abundance and identity of microorganisms have unique influences on host physiology. To test this concept mechanistically, germ-free mice are colonized with microbial communities to assess causation. Due to the cost, infrastructure challenges, and time-consuming nature of germ-free mouse models, an alternative approach is needed to investigate host-microbial interactions. Drosophila melanogaster (fruit flies) can be used as a high throughput in vivo screening model of host-microbiome interactions as they are affordable, convenient, and replicable. D. melanogaster were essential in discovering components of the innate immune response to pathogens. However, axenic D. melanogaster can easily be generated for microbiome studies without the need for ethical considerations. The simplified microbiota structure enables researchers to evaluate permutations of how each microbial species within the microbiota contribute to host phenotypes of interest. This enables the possibility of thorough strain-level analysis of host and microbial properties relevant to physiological outcomes. Moreover, a wide range of mutant D. melanogaster strains can be affordably obtained from public stock centers. Given this, D. melanogaster can be used to identify candidate mechanisms of host-microbe symbioses relevant to pathogen exclusion, innate immunity modulation, diet, xenobiotics, and probiotic/prebiotic properties in a high throughput manner. This perspective comments on the most promising areas of microbiota research that could immediately benefit from using the D. melanogaster model.

  7. Elliptic Curve Cryptography-Based Authentication with Identity Protection for Smart Grids.

    Directory of Open Access Journals (Sweden)

    Liping Zhang

    Full Text Available In a smart grid, the power service provider enables the expected power generation amount to be measured according to current power consumption, thus stabilizing the power system. However, the data transmitted over smart grids are not protected, and then suffer from several types of security threats and attacks. Thus, a robust and efficient authentication protocol should be provided to strength the security of smart grid networks. As the Supervisory Control and Data Acquisition system provides the security protection between the control center and substations in most smart grid environments, we focus on how to secure the communications between the substations and smart appliances. Existing security approaches fail to address the performance-security balance. In this study, we suggest a mitigation authentication protocol based on Elliptic Curve Cryptography with privacy protection by using a tamper-resistant device at the smart appliance side to achieve a delicate balance between performance and security of smart grids. The proposed protocol provides some attractive features such as identity protection, mutual authentication and key agreement. Finally, we demonstrate the completeness of the proposed protocol using the Gong-Needham-Yahalom logic.

  8. Elliptic Curve Cryptography-Based Authentication with Identity Protection for Smart Grids.

    Science.gov (United States)

    Zhang, Liping; Tang, Shanyu; Luo, He

    2016-01-01

    In a smart grid, the power service provider enables the expected power generation amount to be measured according to current power consumption, thus stabilizing the power system. However, the data transmitted over smart grids are not protected, and then suffer from several types of security threats and attacks. Thus, a robust and efficient authentication protocol should be provided to strength the security of smart grid networks. As the Supervisory Control and Data Acquisition system provides the security protection between the control center and substations in most smart grid environments, we focus on how to secure the communications between the substations and smart appliances. Existing security approaches fail to address the performance-security balance. In this study, we suggest a mitigation authentication protocol based on Elliptic Curve Cryptography with privacy protection by using a tamper-resistant device at the smart appliance side to achieve a delicate balance between performance and security of smart grids. The proposed protocol provides some attractive features such as identity protection, mutual authentication and key agreement. Finally, we demonstrate the completeness of the proposed protocol using the Gong-Needham-Yahalom logic.

  9. Preventing transfusion-associated graft-versus-host disease: state of the art

    Directory of Open Access Journals (Sweden)

    Fast LD

    2015-01-01

    Full Text Available Loren D Fast Division of Hematology/Oncology, Rhode Island Hospital and Warren Alpert School of Medicine at Brown University, Providence, RI, USA Abstract: The transfer of pathogens and the induction of immune responses are deleterious consequences that can result from the transfusion of blood products. Transfusion-associated graft-versus-host disease (TA-GVHD, the most severe immune consequence, occurs when recipient immune responses are incapable of effectively eliminating donor leukocytes, permitting unabated responses of the donor T lymphocytes. Currently, prevention of TA-GVHD is routinely accomplished by exposing blood products to γ-irradiation in order to prevent donor T cell proliferation. Alternative protocols are being developed to meet the challenges associated with the use of γ-irradiation. Use of pathogen reduction protocols, which interfere with nucleic acid replication by modifying nucleic acids, are increasing. Comparison of pathogen reduction protocols with γ-irradiation have found that both protocols are equally effective in preventing T lymphocyte proliferation and GVHD responses when testing in both in vitro and in vivo models. The potential use of pathogen reduction protocols to treat whole blood prior to separation into its components could provide a cost-effective method for preventing TA-GVHD in the future. Keywords: blood transfusion, GVHD, pathogen reduction, irradiation

  10. HOP: Achieving Efficient Anonymity in MANETs by Combining HIP, OLSR, and Pseudonyms

    Directory of Open Access Journals (Sweden)

    Campos Javier

    2011-01-01

    Full Text Available Offering secure and anonymous communications in mobile ad hoc networking environments is essential to achieve confidence and privacy, thus promoting widespread adoption of this kind of networks. In addition, some minimum performance levels must be achieved for any solution to be practical and become widely adopted. In this paper, we propose and implement HOP, a novel solution based on cryptographic Host Identity Protocol (HIP that offers security and user-level anonymity in MANET environments while maintaining good performance levels. In particular, we introduce enhancements to the authentication process to achieve Host Identity Tag (HIT relationship anonymity, along with source/destination HIT anonymity when combined with multihoming. Afterward we detail how we integrate our improved version of HIP with the OLSR routing protocol to achieve efficient support for pseudonyms. We implemented our proposal in an experimental testbed, and the results obtained show that performance levels achieved are quite good, and that the integration with OLSR is achieved with a low overhead.

  11. Efficient Fair Exchange from Identity-Based Signature

    Science.gov (United States)

    Yum, Dae Hyun; Lee, Pil Joong

    A fair exchange scheme is a protocol by which two parties Alice and Bob exchange items or services without allowing either party to gain advantages by quitting prematurely or otherwise misbehaving. To this end, modern cryptographic solutions use a semi-trusted arbitrator who involves only in cases where one party attempts to cheat or simply crashes. We call such a fair exchange scheme optimistic. When no registration is required between the signer and the arbitrator, we say that the fair exchange scheme is setup free. To date, the setup-free optimist fair exchange scheme under the standard RSA assumption was only possible from the generic construction of [12], which uses ring signatures. In this paper, we introduce a new setup-free optimistic fair exchange scheme under the standard RSA assumption. Our scheme uses the GQ identity-based signature and is more efficient than [12]. The construction can also be generalized by using various identity-based signature schemes. Our main technique is to allow each user to choose his (or her) own “random” public key in the identitybased signature scheme.

  12. Islamic Identity and Competitive Identities (Global, National and Ethnic Identity; A Case Study of Shiraz University Students

    Directory of Open Access Journals (Sweden)

    Mohammadtaghi Iman

    2013-06-01

    Full Text Available The verse of holy Koran "verily the most honored of you in the sight of Allah is [he who is] the most virtuous of you" directly shows that in god's willing there is no superiority of a man or a group than others except those who have piety to god. In fact, the Islamic identity focuses on the superiority of piety among humans and does not focus on superiority of a man or a group that causes Islamic identity theoretically be against other competitive identities such as ethnic, global and national identity. Therefore, this research aims to study the relationship between Islamic identity and competitive identities (ethnic, national and global. In this way based on Sheldon Stryker theory and survey method, 431 students have elected and have analyzed. The results have shown that there was positive significant relationship between Islamic identity, national and ethnic identity, and negative significant relationship between Islamic identity and global identity. In addition, multivariate regression results have shown that the variables national and global identities have explained 45 percent of the variation of Islamic identity variable. The results shows that national and ethnic identity amplify the Islamic identity and they have positive relationship with it and in fact they are not a competitive identity for Islamic identity but global identity has negative relationship with Islamic identity and therefore it is a competitive identity for Islamic identity.

  13. HostPhinder: A Phage Host Prediction Tool

    Directory of Open Access Journals (Sweden)

    Julia Villarroel

    2016-05-01

    Full Text Available The current dramatic increase of antibiotic resistant bacteria has revitalised the interest in bacteriophages as alternative antibacterial treatment. Meanwhile, the development of bioinformatics methods for analysing genomic data places high-throughput approaches for phage characterization within reach. Here, we present HostPhinder, a tool aimed at predicting the bacterial host of phages by examining the phage genome sequence. Using a reference database of 2196 phages with known hosts, HostPhinder predicts the host species of a query phage as the host of the most genomically similar reference phages. As a measure of genomic similarity the number of co-occurring k-mers (DNA sequences of length k is used. Using an independent evaluation set, HostPhinder was able to correctly predict host genus and species for 81% and 74% of the phages respectively, giving predictions for more phages than BLAST and significantly outperforming BLAST on phages for which both had predictions. HostPhinder predictions on phage draft genomes from the INTESTI phage cocktail corresponded well with the advertised targets of the cocktail. Our study indicates that for most phages genomic similarity correlates well with related bacterial hosts. HostPhinder is available as an interactive web service [1] and as a stand alone download from the Docker registry [2].

  14. An empirical investigation of the possibility of adaptability of arbuscular mycorrhizal fungi to new hosts.

    Science.gov (United States)

    Koyama, Akihiro; Pietrangelo, Olivia; Sanderson, Laura; Antunes, Pedro M

    2017-08-01

    Little is known about the adaptive capacity of arbuscular mycorrhizal (AM) fungi to novel hosts. Here we assessed the possibility of two heterospecific AM fungal isolates to adaptively change, in terms of host biomass response, as a function of host plant identity, over the course of a growing season. First, we produced pure inocula of Rhizophagus clarus and Rhizophagus intraradices, each starting from a single spore. Second, we "trained" each isolate individually in a community with two plants, sudangrass (Sorgum bicolour subsp. drummondii) and leek (Aliium ampeloprasum var. porrum), using a dual-compartment system to allow the establishment of a common mycorrhizal network between the two hosts. Third, we conducted a greenhouse experiment to reciprocally test each "trained" clone, obtained from each compartment, either with the same (home), or the other host (away) under two contrasting phosphorus levels. Overall, results did not support adaptive responses of the AM fungi to their hosts (i.e., greater host biomass under "home" relative to "away" conditions), but the opposite (i.e., greater host biomass under "away" relative to "home" conditions) was more frequently observed. These changes in AM fungal symbiotic functioning open the possibility for relatively rapid genetic change of arbuscular mycorrhizal fungi in response to new hosts, which represents one step forward from in vitro experiments.

  15. Cattle Tick Rhipicephalus microplus-Host Interface: A Review of Resistant and Susceptible Host Responses

    Directory of Open Access Journals (Sweden)

    Ala E. Tabor

    2017-12-01

    Full Text Available Ticks are able to transmit tick-borne infectious agents to vertebrate hosts which cause major constraints to public and livestock health. The costs associated with mortality, relapse, treatments, and decreased production yields are economically significant. Ticks adapted to a hematophagous existence after the vertebrate hemostatic system evolved into a multi-layered defense system against foreign invasion (pathogens and ectoparasites, blood loss, and immune responses. Subsequently, ticks evolved by developing an ability to suppress the vertebrate host immune system with a devastating impact particularly for exotic and crossbred cattle. Host genetics defines the immune responsiveness against ticks and tick-borne pathogens. To gain an insight into the naturally acquired resistant and susceptible cattle breed against ticks, studies have been conducted comparing the incidence of tick infestation on bovine hosts from divergent genetic backgrounds. It is well-documented that purebred and crossbred Bos taurus indicus cattle are more resistant to ticks and tick-borne pathogens compared to purebred European Bos taurus taurus cattle. Genetic studies identifying Quantitative Trait Loci markers using microsatellites and SNPs have been inconsistent with very low percentages relating phenotypic variation with tick infestation. Several skin gene expression and immunological studies have been undertaken using different breeds, different samples (peripheral blood, skin with tick feeding, infestation protocols and geographic environments. Susceptible breeds were commonly found to be associated with the increased expression of toll like receptors, MHC Class II, calcium binding proteins, and complement factors with an increased presence of neutrophils in the skin following tick feeding. Resistant breeds had higher levels of T cells present in the skin prior to tick infestation and thus seem to respond to ticks more efficiently. The skin of resistant breeds also

  16. A developmental, biopsychosocial model for the treatment of children with gender identity disorder.

    Science.gov (United States)

    Zucker, Kenneth J; Wood, Hayley; Singh, Devita; Bradley, Susan J

    2012-01-01

    This article provides a summary of the therapeutic model and approach used in the Gender Identity Service at the Centre for Addiction and Mental Health in Toronto. The authors describe their assessment protocol, describe their current multifactorial case formulation model, including a strong emphasis on developmental factors, and provide clinical examples of how the model is used in the treatment.

  17. Mobile Virtual Private Networking

    Science.gov (United States)

    Pulkkis, Göran; Grahn, Kaj; Mårtens, Mathias; Mattsson, Jonny

    Mobile Virtual Private Networking (VPN) solutions based on the Internet Security Protocol (IPSec), Transport Layer Security/Secure Socket Layer (SSL/TLS), Secure Shell (SSH), 3G/GPRS cellular networks, Mobile IP, and the presently experimental Host Identity Protocol (HIP) are described, compared and evaluated. Mobile VPN solutions based on HIP are recommended for future networking because of superior processing efficiency and network capacity demand features. Mobile VPN implementation issues associated with the IP protocol versions IPv4 and IPv6 are also evaluated. Mobile VPN implementation experiences are presented and discussed.

  18. Immigrant Arab adolescents in ethnic enclaves: physical and phenomenological contexts of identity negotiation.

    Science.gov (United States)

    Kumar, Revathy; Seay, Nancy; Karabenick, Stuart A

    2015-04-01

    Ecologically embedded social identity theories were used to examine the risk and protective factors associated with the identity negotiation and adjustment of recent immigrant Arab (IA) adolescents to the United States residing in ethnic enclaves. Yemeni, Lebanese, and Iraqi 8th-graders (n = 45) from 4 ethnic enclave schools participated in focus-group interviews. In-depth analyses of interviews revealed that living in an ethnic enclave enhanced IA adolescents' feelings of belonging to the community. However, the new immigrant status coupled with country of origin determined the permeability of intergroup boundaries with well-established Arab and Arab American peers. Their identity negotiations and social identity salience (national, religious, and pan-Arab) were informed by transitional experiences from home to host country and the prevailing political and cultural tensions between the two, recognition of national hierarchy within the Arab community, perceptions of discrimination by the larger society, changed educational aspirations consequent to immigration, and current physical (school and community) and phenomenological contexts. Findings suggest that current theoretical perspectives should be extended to incorporate phenomenological representations of past spaces and places not currently occupied to understand adolescents' multifaceted identity. (c) 2015 APA, all rights reserved).

  19. Constructing nurses' professional identity through social identity theory.

    Science.gov (United States)

    Willetts, Georgina; Clarke, David

    2014-04-01

    The profession of nursing continues to struggle with defining and clarifying its professional identity. The definitive recognition of nursing as a profession was the moving of training from the hospital apprentice model to the tertiary sector. However, this is only part of the story of professional identity in nursing. Once training finishes and enculturation into the workplace commences, professional identity becomes a complicated social activity. This paper proposes social identity theory as a valuable research framework to assist with clarifying and describing the professional identity of nurses. The paper outlines the key elements of a profession and then goes on to describe the main concepts of social identity theory. Lastly, a connection is made between the usefulness of using social identity theory in researching professional identity in nursing, recognizing the contextual nature of the social activity of the profession within its workplace environment. © 2013 Wiley Publishing Asia Pty Ltd.

  20. Beginning and ending of Anne Hebert's 'Burden of Dreams' : Polysemy of a journey of identity

    NARCIS (Netherlands)

    Lintvelt, Jaap

    2007-01-01

    The protagonist of Anne Hebert's Burden of Dreams (1992) goes on a journey from Quebec to Paris that contributes to the evolution of his personal and cultural identity The novel's title already tells us that "dreams" will play. a key role both on a thematic level and in shaping the reading protocol.

  1. Detecting and Preventing Beacon Replay Attacks in Receiver-Initiated MAC Protocols for Energy Efficient WSNs

    DEFF Research Database (Denmark)

    Di Mauro, Alessio; Fafoutis, Xenofon; Mödersheim, Sebastian Alexander

    2013-01-01

    In receiver-initiated MAC protocols for Wireless Sensor Networks (WSNs), communication is initiated by the receiver of the data through beacons containing the receiver's identity. In this paper, we consider the case of a network intruder that captures and replays such beacons towards legitimate...

  2. Resolving an identity crisis: Implicit drinking identity and implicit alcohol identity are related but not the same.

    Science.gov (United States)

    Ramirez, Jason J; Olin, Cecilia C; Lindgren, Kristen P

    2017-09-01

    Two variations of the Implicit Association Test (IAT), the Drinking Identity IAT and the Alcohol Identity IAT, assess implicit associations held in memory between one's identity and alcohol-related constructs. Both have been shown to predict numerous drinking outcomes, but these IATs have never been directly compared to one another. The purpose of this study was to compare these IATs and evaluate their incremental predictive validity. US undergraduate students (N=64, 50% female, mean age=21.98years) completed the Drinking Identity IAT, the Alcohol Identity IAT, an explicit measure of drinking identity, as well as measures of typical alcohol consumption and hazardous drinking. When evaluated in separate regression models that controlled for explicit drinking identity, results indicated that the Drinking Identity IAT and the Alcohol Identity IAT were significant, positive predictors of typical alcohol consumption, and that the Drinking Identity IAT, but not the Alcohol Identity IAT, was a significant predictor of hazardous drinking. When evaluated in the same regression models, the Drinking Identity IAT, but not the Alcohol Identity IAT, was significantly associated with typical and hazardous drinking. These results suggest that the Drinking Identity IAT and Alcohol Identity IAT are related but not redundant. Moreover, given that the Drinking Identity IAT, but not the Alcohol Identity IAT, incrementally predicted variance in drinking outcomes, identification with drinking behavior and social groups, as opposed to identification with alcohol itself, may be an especially strong predictor of drinking outcomes. Copyright © 2017 Elsevier Ltd. All rights reserved.

  3. Economical multiparty simultaneous quantum identity authentication based on Greenberger–Horne–Zeilinger states

    International Nuclear Information System (INIS)

    Yu-Guang, Yang; Qiao-Yan, Wen

    2009-01-01

    A multiparty simultaneous quantum identity authentication protocol based on Greenberger–Horne–Zeilinger (GHZ) states is proposed. The multi-user can be authenticated by a trusted third party (TTP) simultaneously. Compared with the scheme proposed recently (Wang et al 2006 Chin. Phys. Lett. 23(9) 2360), the proposed scheme has the advantages of consuming fewer quantum and classical resources and lessening the difficulty and intensity of necessary operations. (general)

  4. Post-secretory fate of host defence components in mucus.

    Science.gov (United States)

    Salathe, Matthias; Forteza, Rosanna; Conner, Gregory E

    2002-01-01

    Airway mucus is a complex mixture of secretory products that provide a multifaceted defence against infection. Among many antimicrobial substances, mucus contains a peroxidase identical to milk lactoperoxidase (LPO) that is produced by goblet cells and submucosal glands. Airway secretions contain the substrates for LPO, namely thiocyanate and hydrogen peroxide, at concentrations sufficient for production of the biocidal compound hypothiocyanite, a fact confirmed by us in vitro. In vivo, inhibition of airway LPO in sheep significantly inhibits bacterial clearance, suggesting that the LPO system is a major contributor to host defences. Since secretory products including LPO are believed to be steadily removed by mucociliary clearance, their amount and availability on the surface is thought to be controlled solely by secretion. In contrast to this paradigm, new data suggest that LPO and other substances are retained at the ciliary border of the airway epithelium by binding to surface-associated hyaluronan, thereby providing an apical, fully active enzyme pool. Thus, hyaluronan, secreted from submucosal gland cells, plays a previously unrecognized pivotal role in mucosal host defence by retaining LPO and possibly other substances important for first line host defence at the apical surface 'ready for use' and protected from ciliary clearance.

  5. Leadership identities

    DEFF Research Database (Denmark)

    Holmgreen, Lise-Lotte

    2018-01-01

    Questioning the assumption that identities can be controlled through a shared organisational culture, the article explores the inculcation of a discourse of diversity into leadership identities in a Danish bank and building society. Thus, it intends to demonstrate that, on the one hand, discourse...... plays a significant role in identity construction and, on the other, that leaders’ constructions may have many sources of inspiration within and outside the organisation, emphasising that identity construction is a complex process in which organisational efforts to promote a common leadership identity...... to construct their leadership identities. While the respondents present comparable identities to the interviewer, the analysis reveals that the they draw on different discourses and employ a number of different discursive means to present this identity. This, the article argues, may be the result of a number...

  6. Modelling within-host spatiotemporal dynamics of invasive bacterial disease.

    Directory of Open Access Journals (Sweden)

    Andrew J Grant

    2008-04-01

    Full Text Available Mechanistic determinants of bacterial growth, death, and spread within mammalian hosts cannot be fully resolved studying a single bacterial population. They are also currently poorly understood. Here, we report on the application of sophisticated experimental approaches to map spatiotemporal population dynamics of bacteria during an infection. We analyzed heterogeneous traits of simultaneous infections with tagged Salmonella enterica populations (wild-type isogenic tagged strains [WITS] in wild-type and gene-targeted mice. WITS are phenotypically identical but can be distinguished and enumerated by quantitative PCR, making it possible, using probabilistic models, to estimate bacterial death rate based on the disappearance of strains through time. This multidisciplinary approach allowed us to establish the timing, relative occurrence, and immune control of key infection parameters in a true host-pathogen combination. Our analyses support a model in which shortly after infection, concomitant death and rapid bacterial replication lead to the establishment of independent bacterial subpopulations in different organs, a process controlled by host antimicrobial mechanisms. Later, decreased microbial mortality leads to an exponential increase in the number of bacteria that spread locally, with subsequent mixing of bacteria between organs via bacteraemia and further stochastic selection. This approach provides us with an unprecedented outlook on the pathogenesis of S. enterica infections, illustrating the complex spatial and stochastic effects that drive an infectious disease. The application of the novel method that we present in appropriate and diverse host-pathogen combinations, together with modelling of the data that result, will facilitate a comprehensive view of the spatial and stochastic nature of within-host dynamics.

  7. IBE-Lite: a lightweight identity-based cryptography for body sensor networks.

    Science.gov (United States)

    Tan, Chiu C; Wang, Haodong; Zhong, Sheng; Li, Qun

    2009-11-01

    A body sensor network (BSN) is a network of sensors deployed on a person's body for health care monitoring. Since the sensors collect personal medical data, security and privacy are important components in a BSN. In this paper, we developed IBE-Lite, a lightweight identity-based encryption suitable for sensors in a BSN. We present protocols based on IBE-Lite that balance security and privacy with accessibility and perform evaluation using experiments conducted on commercially available sensors.

  8. Development of a manualized protocol of massage therapy for clinical trials in osteoarthritis

    Directory of Open Access Journals (Sweden)

    Ali Ather

    2012-10-01

    Full Text Available Abstract Background Clinical trial design of manual therapies may be especially challenging as techniques are often individualized and practitioner-dependent. This paper describes our methods in creating a standardized Swedish massage protocol tailored to subjects with osteoarthritis of the knee while respectful of the individualized nature of massage therapy, as well as implementation of this protocol in two randomized clinical trials. Methods The manualization process involved a collaborative process between methodologic and clinical experts, with the explicit goals of creating a reproducible semi-structured protocol for massage therapy, while allowing some latitude for therapists’ clinical judgment and maintaining consistency with a prior pilot study. Results The manualized protocol addressed identical specified body regions with distinct 30- and 60-min protocols, using standard Swedish strokes. Each protocol specifies the time allocated to each body region. The manualized 30- and 60-min protocols were implemented in a dual-site 24-week randomized dose-finding trial in patients with osteoarthritis of the knee, and is currently being implemented in a three-site 52-week efficacy trial of manualized Swedish massage therapy. In the dose-finding study, therapists adhered to the protocols and significant treatment effects were demonstrated. Conclusions The massage protocol was manualized, using standard techniques, and made flexible for individual practitioner and subject needs. The protocol has been applied in two randomized clinical trials. This manualized Swedish massage protocol has real-world utility and can be readily utilized both in the research and clinical settings. Trial registration Clinicaltrials.gov NCT00970008 (18 August 2009

  9. Identity at work: Exploring strategies for Identity Work

    Directory of Open Access Journals (Sweden)

    Byron G. Adams

    2012-01-01

    Full Text Available Orientation: This study explored strategies for identity work that are central to the negotiation and regulation of employee work identity.Research purpose: The main aim of this study was to explore employee narratives and identify the strategies available to them in the process of identity work, as they defined themselves at work.Motivation for the study: As there is a scarcity of research on identity work in South Africa, this study wanted to advance knowledge about identity work and the strategies used for regulating and negotiating an identity at work by exploring these constructs in this context.Research design, approach and method: A qualitative research process formed the basis for this study. Nineteen employees from a global manufacturing company participated in two semi-structured in-depth interviews. Grounded theory was applied to analyse and interpret the data.Main findings: Nine strategies for identity work were identified and categorised into four broad themes (personal philosophies; relationships; career management and negotiating balance.Practical/managerial implications: Employees followed various strategies for defining themselves at work and this may have some implications for employee work engagement and productivity.Contribution/value-add: This study expands on current theoretical knowledge of identity work, and provides insights into the strategies people use to regulate and negotiate their identities at work. 

  10. Host genetics affect microbial ecosystems via host immunity.

    Science.gov (United States)

    El Kafsi, Hela; Gorochov, Guy; Larsen, Martin

    2016-10-01

    Genetic evolution of multicellular organisms has occurred in response to environmental challenges, including competition for nutrients, climate change, physical and chemical stressors, and pathogens. However, fitness of an organism is dependent not only on defense efficacy, but also on the ability to take advantage of symbiotic organisms. Indeed, microbes not only encompass pathogenicity, but also enable efficient nutrient uptake from diets nondegradable by the host itself. Moreover, microbes play important roles in the development of host immunity. Here we review associations between specific host genes and variance in microbiota composition and compare with interactions between microbes and host immunity. Recent genome-wide association studies reveal that symbiosis between host and microbiota is the exquisite result of genetic coevolution. Moreover, a subset of microbes from human and mouse microbiota have been identified to interact with humoral and cellular immunity. Interestingly, microbes associated with both host genetics and host immunity are taxonomically related. Most involved are Bifidobacterium, Lactobacillus, and Akkermansia, which are dually associated with both host immunity and host genetics. We conclude that future therapeutics targeting microbiota in the context of chronic inflammatory diseases need to consider both immune and genetic host features associated with microbiota homeostasis.

  11. New perspectives on host-parasite interplay by comparative transcriptomic and proteomic analyses of Schistosoma japonicum.

    Directory of Open Access Journals (Sweden)

    Feng Liu

    2006-04-01

    Full Text Available Schistosomiasis remains a serious public health problem with an estimated 200 million people infected in 76 countries. Here we isolated ~ 8,400 potential protein-encoding cDNA contigs from Schistosoma japonicum after sequencing circa 84,000 expressed sequence tags. In tandem, we undertook a high-throughput proteomics approach to characterize the protein expression profiles of a number of developmental stages (cercariae, hepatic schistosomula, female and male adults, eggs, and miracidia and tissues at the host-parasite interface (eggshell and tegument by interrogating the protein database deduced from the contigs. Comparative analysis of these transcriptomic and proteomic data, the latter including 3,260 proteins with putative identities, revealed differential expression of genes among the various developmental stages and sexes of S. japonicum and localization of putative secretory and membrane antigens, enzymes, and other gene products on the adult tegument and eggshell, many of which displayed genetic polymorphisms. Numerous S. japonicum genes exhibited high levels of identity with those of their mammalian hosts, whereas many others appeared to be conserved only across the genus Schistosoma or Phylum Platyhelminthes. These findings are expected to provide new insights into the pathophysiology of schistosomiasis and for the development of improved interventions for disease control and will facilitate a more fundamental understanding of schistosome biology, evolution, and the host-parasite interplay.

  12. Adopted Koreans and the development of identity in the "third space"

    OpenAIRE

    Hübinette, Tobias

    2004-01-01

    Since 1953, 150,000 Korean children have been adopted to 15 main host countries in the West. They constitute the largest international adoptee group worldwide. An adopted Korean movement has existed on an international level since the 1990s and is today trying to formulate an identity and community of its own beyond Western adoption ideology and Korean nationalism. Tobias Hübinette outlines the history of international adoption from Korea, Western and Korean perspectives on international adop...

  13. Model Checking a Self-Stabilizing Distributed Clock Synchronization Protocol for Arbitrary Digraphs

    Science.gov (United States)

    Malekpour, Mahyar R.

    2011-01-01

    This report presents the mechanical verification of a self-stabilizing distributed clock synchronization protocol for arbitrary digraphs in the absence of faults. This protocol does not rely on assumptions about the initial state of the system, other than the presence of at least one node, and no central clock or a centrally generated signal, pulse, or message is used. The system under study is an arbitrary, non-partitioned digraph ranging from fully connected to 1-connected networks of nodes while allowing for differences in the network elements. Nodes are anonymous, i.e., they do not have unique identities. There is no theoretical limit on the maximum number of participating nodes. The only constraint on the behavior of the node is that the interactions with other nodes are restricted to defined links and interfaces. This protocol deterministically converges within a time bound that is a linear function of the self-stabilization period.

  14. A Lightweight RFID Grouping-Proof Protocol Based on Parallel Mode and DHCP Mechanism

    Directory of Open Access Journals (Sweden)

    Zhicai Shi

    2017-07-01

    Full Text Available A Radio Frequency Identification (RFID grouping-proof protocol is to generate an evidence of the simultaneous existence of a group of tags and it has been applied to many different fields. For current grouping-proof protocols, there still exist some flaws such as low grouping-proof efficiency, being vulnerable to trace attack and information leakage. To improve the secure performance and efficiency, we propose a lightweight RFID grouping-proof protocol based on parallel mode and DHCP (Dynamic Host Configuration Protocol mechanism. Our protocol involves multiple readers and multiple tag groups. During the grouping-proof period, one reader and one tag group are chosen by the verifier by means of DHCP mechanism. When only a part of the tags of the chosen group exist, the protocol can also give the evidence of their co-existence. Our protocol utilizes parallel communication mode between reader and tags so as to ensure its grouping-proof efficiency. It only uses Hash function to complete the mutual authentication among verifier, readers and tags. It can preserve the privacy of the RFID system and resist the attacks such as eavesdropping, replay, trace and impersonation. Therefore the protocol is secure, flexible and efficient. It only uses some lightweight operations such as Hash function and a pseudorandom number generator. Therefore it is very suitable to some low-cost RFID systems.

  15. The roles of host evolutionary relationships (genus: Nasonia) and development in structuring microbial communities.

    Science.gov (United States)

    Brucker, Robert M; Bordenstein, Seth R

    2012-02-01

    The comparative structure of bacterial communities among closely related host species remains relatively unexplored. For instance, as speciation events progress from incipient to complete stages, does divergence in the composition of the species' microbial communities parallel the divergence of host nuclear genes? To address this question, we used the recently diverged species of the parasitoid wasp genus Nasonia to test whether the evolutionary relationships of their bacterial microbiotas recapitulate the Nasonia phylogenetic history. We also assessed microbial diversity in Nasonia at different stages of development to determine the role that host age plays in microbiota structure. The results indicate that all three species of Nasonia share simple larval microbiotas dominated by the γ-proteobacteria class; however, bacterial species diversity increases as Nasonia develop into pupae and adults. Finally, under identical environmental conditions, the relationships of the microbial communities reflect the phylogeny of the Nasonia host species at multiple developmental stages, which suggests that the structure of an animal's microbial community is closely allied with divergence of host genes. These findings highlight the importance of host evolutionary relationships on microbiota composition and have broad implications for future studies of microbial symbiosis and animal speciation. © 2011 The Author(s). Evolution© 2011 The Society for the Study of Evolution.

  16. Chapter 23: Combined Heat and Power Evaluation Protocol. The Uniform Methods Project: Methods for Determining Energy Efficiency Savings for Specific Measures

    Energy Technology Data Exchange (ETDEWEB)

    Kurnik, Charles W. [National Renewable Energy Laboratory (NREL), Golden, CO (United States); Simons, George [Itron, Davis, CA (United States); Barsun, Stephan [Itron, Davis, CA (United States)

    2017-11-06

    The main focus of most evaluations is to determine the energy-savings impacts of the installed measure. This protocol defines a combined heat and power (CHP) measure as a system that sequentially generates both electrical energy and useful thermal energy from one fuel source at a host customer's facility or residence. This protocol is aimed primarily at regulators and administrators of ratepayer-funded CHP programs; however, project developers may find the protocol useful to understand how CHP projects are evaluated.

  17. Identity, identity politics, and neoliberalism

    Directory of Open Access Journals (Sweden)

    Wrenn Mary

    2014-01-01

    Full Text Available With the intensification of neoliberalism, it is useful to examine how some individuals might cope with the irrationality of the system. Neoliberalism cloaks the execution of the corporate agenda behind rhetorical manipulation that advocates for limited government. The corollary absence of government involvement on behalf of the citizenry writ large disarms the means of social redress for the individual. Democracy funded and fueled by corporate power thereby disenfranchises the individual, provoking some to search for empowerment through identity politics. The argument set forth suggests that individuals construct, reinforce, or escalate allegiance to identities as a coping mechanism, some of which manifest in violent identity politics.

  18. The Process of Identity Work: Negotiating a Work Identity

    NARCIS (Netherlands)

    Crafford, A.; Adams, B.G.; Saayman, T.; Vinkenburg, C.J.; Jansen, P.G.W.; Roodt, G.

    2015-01-01

    Identity work is an important process in negotiating, regulating and maintaining a coherent sense of self-(identity). In this chapter we discuss how identity work is particularly useful in establishing a work identity. The crux of the discussion in this chapter is based on the qualitative phase of

  19. National Identity, International Visitors: Narration and Translation of the Taipei 228 Memorial Museum

    Directory of Open Access Journals (Sweden)

    Chia-Li Chen

    2017-03-01

    Full Text Available Although many museums nowadays provide multilingual services, translations in museums have not received enough attention from researchers. The issue of how ideology is embedded in museum texts is translated is particularly underresearched. Since museums are often important sites for tourists to learn about a nation, translation plays a pivotal role in mediating how international visitors construct the host nation’s identity. The translation of national identity is even more important when sensitive topics are dealt with, such as exhibitions of the past in memorial museums. This paper takes the Taipei 228 Memorial Museum as a case study to examine how Taiwanese identity is formatted in the Chinese text and reframed in the English translation. The current study found inconsistent historical perspectives embedded in both texts, particularly in the English translation. We argue that, without awareness of ideological assumptions embedded in translations, museums run the risk of sending unintended messages to international visitors.

  20. Multipartite-to-bipartite entanglement transformations and polynomial identity testing

    International Nuclear Information System (INIS)

    Chitambar, Eric; Duan Runyao; Shi Yaoyun

    2010-01-01

    We consider the problem of deciding if some multiparty entangled pure state can be converted, with a nonzero success probability, into a given bipartite pure state shared between two specified parties through local quantum operations and classical communication. We show that this question is equivalent to the well-known computational problem of deciding if a multivariate polynomial is identically zero. Efficient randomized algorithms developed to study the latter can thus be applied to our question. As a result, a given transformation is possible if and only if it is generically attainable by a simple randomized protocol.

  1. A Key Establishment Protocol for RFID User in IPTV Environment

    Science.gov (United States)

    Jeong, Yoon-Su; Kim, Yong-Tae; Sohn, Jae-Min; Park, Gil-Cheol; Lee, Sang-Ho

    In recent years, the usage of IPTV (Internet Protocol Television) has been increased. The reason is a technological convergence of broadcasting and telecommunication delivering interactive applications and multimedia content through high speed Internet connections. The main critical point of IPTV security requirements is subscriber authentication. That is, IPTV service should have the capability to identify the subscribers to prohibit illegal access. Currently, IPTV service does not provide a sound authentication mechanism to verify the identity of its wireless users (or devices). This paper focuses on a lightweight authentication and key establishment protocol based on the use of hash functions. The proposed approach provides effective authentication for a mobile user with a RFID tag whose authentication information is communicated back and forth with the IPTV authentication server via IPTV set-top box (STB). That is, the proposed protocol generates user's authentication information that is a bundle of two public keys derived from hashing user's private keys and RFID tag's session identifier, and adds 1bit to this bundled information for subscriber's information confidentiality before passing it to the authentication server.

  2. A Self-Stabilizing Hybrid Fault-Tolerant Synchronization Protocol

    Science.gov (United States)

    Malekpour, Mahyar R.

    2015-01-01

    This paper presents a strategy for solving the Byzantine general problem for self-stabilizing a fully connected network from an arbitrary state and in the presence of any number of faults with various severities including any number of arbitrary (Byzantine) faulty nodes. The strategy consists of two parts: first, converting Byzantine faults into symmetric faults, and second, using a proven symmetric-fault tolerant algorithm to solve the general case of the problem. A protocol (algorithm) is also present that tolerates symmetric faults, provided that there are more good nodes than faulty ones. The solution applies to realizable systems, while allowing for differences in the network elements, provided that the number of arbitrary faults is not more than a third of the network size. The only constraint on the behavior of a node is that the interactions with other nodes are restricted to defined links and interfaces. The solution does not rely on assumptions about the initial state of the system and no central clock nor centrally generated signal, pulse, or message is used. Nodes are anonymous, i.e., they do not have unique identities. A mechanical verification of a proposed protocol is also present. A bounded model of the protocol is verified using the Symbolic Model Verifier (SMV). The model checking effort is focused on verifying correctness of the bounded model of the protocol as well as confirming claims of determinism and linear convergence with respect to the self-stabilization period.

  3. A comparison of the additional protocols of the five nuclear weapon states and the ensuing safeguards benefits to international nonproliferation efforts

    Energy Technology Data Exchange (ETDEWEB)

    Uribe, Eva C [Los Alamos National Laboratory; Sandoval, M Analisa [Los Alamos National Laboratory; Sandoval, Marisa N [Los Alamos National Laboratory; Boyer, Brian D [Los Alamos National Laboratory; Leitch, Rosalyn M [Los Alamos National Laboratory

    2009-01-01

    With the 6 January 2009 entry into force of the Additional Protocol by the United States of America, all five declared Nuclear Weapon States that are part of the Nonproliferation Treaty have signed, ratified, and put into force the Additional Protocol. This paper makes a comparison of the strengths and weaknesses of the five Additional Protocols in force by the five Nuclear Weapon States with respect to the benefits to international nonproliferation aims. This paper also documents the added safeguards burden to the five declared Nuclear Weapon States that these Additional Protocols put on the states with respect to access to their civilian nuclear programs and the hosting of complementary access activities as part of the Additional Protocol.

  4. Medical Identity

    DEFF Research Database (Denmark)

    Musaeus, Peter

    2015-01-01

    Purpose: To examine philosophical stances underpinning medical identity and assess the conceptual relationship between physician, medical practice and culture. Argument: Medical identity is about the ideals and moral positions that physicians take when justifying themselves. Medical identity...... hedonistic versus sentimentalist approaches to medical identity. The sociocultural philosophical analysis of medical identity can shed light on what it means conceptually for a physician to harbor beliefs associated with him/her being taken to be an autonomous professional. It is important because it touches...... on the meaning of being a compassionate, good and skilled physician, making its relevance to person-centered medicine self-evident. Conclusion: Medical identity should be analyzed with reference to literature, philosophy and medical practice in order for the physician to exercise a reflective position...

  5. Updating the U.S. SMART dispersant efficacy monitoring protocol

    International Nuclear Information System (INIS)

    Trudel, K.; Belore, R.; VanHaverbeke, M.; Mullin, J.

    2009-01-01

    The Special Monitoring of Applied Response Technologies (SMART) is a written dispersant effectiveness monitoring protocol developed in the United States in the mid 1990s. It has been the subject of considerable review and research since its development. This paper reported on the 2007-2008 review of the SMART dispersant effectiveness monitoring protocol which involved the following 3 tasks: (1) stakeholders reviewed their experience with SMART and identified the key deficiencies in the current protocol, (2) the SMART monitoring experience gathered during dispersant effectiveness testing at the Ohmsett National Oil Spill Response Test Facility was reviewed to evaluate the usefulness of existing SMART decision criteria, (3) available commercial off-the-shelf instruments (COTS) were surveyed to identify the instruments that might be more effective or simpler to use than those presently in use. The review concluded that the three-tiered approach in SMART was appropriate, but better guidance was needed for users. In addition, the fluorometer historically used for monitoring of dispersed oil was found to have several operating challenges and should be replaced with more modern equipment. It was recommended that all U.S. government sponsored monitoring teams work with identical instruments and operating protocols. The COTS survey identified 6 potentially suitable submersible and field-portable fluorometers and three particle-size analyzers. 26 refs., 5 tabs., 1 fig

  6. Identity at work: Exploring strategies for Identity Work

    Directory of Open Access Journals (Sweden)

    Byron G. Adams

    2012-09-01

    Research purpose: The main aim of this study was to explore employee narratives and identify the strategies available to them in the process of identity work, as they defined themselves at work. Motivation for the study: As there is a scarcity of research on identity work in South Africa, this study wanted to advance knowledge about identity work and the strategies used for regulating and negotiating an identity at work by exploring these constructs in this context. Research design, approach and method: A qualitative research process formed the basis for this study. Nineteen employees from a global manufacturing company participated in two semi-structured in-depth interviews. Grounded theory was applied to analyse and interpret the data. Main findings: Nine strategies for identity work were identified and categorised into four broad themes (personal philosophies; relationships; career management and negotiating balance. Practical/managerial implications: Employees followed various strategies for defining themselves at work and this may have some implications for employee work engagement and productivity. Contribution/value-add: This study expands on current theoretical knowledge of identity work, and provides insights into the strategies people use to regulate and negotiate their identities at work.

  7. Explaining the differential distribution of Clean Development Mechanism projects across host countries

    International Nuclear Information System (INIS)

    Winkelman, Andrew G.; Moore, Michael R.

    2011-01-01

    The Clean Development Mechanism (CDM) of the Kyoto Protocol represents an opportunity to involve all developing countries in the effort to reduce greenhouse gas emissions while also promoting sustainable development. To date, however, the majority of CDM projects have gone to emerging markets such as China, India, Brazil, and Mexico, while very few least developed countries have hosted projects. This paper investigates the differential distribution of CDM activities across countries. We develop a conceptual model for project profitability, which helps to identify potential country-level determinants of CDM activity. These potential determinants are employed as explanatory variables in regression analysis to explain the actual distribution of projects. Human capital and greenhouse gas emission levels influenced which countries have hosted projects and the amount of certified emission reductions (CER) created. Countries that offered growing markets for CDM co-products, such as electricity, were more likely to be CDM hosts, while economies with higher carbon intensity levels had greater CER production. These findings work against the least developed countries and help to explain their lack of CDM activity. - Research Highlights: → Regression models are used to explain the inter-country distribution of CDM projects. → Emissions and human capital are significant for hosting projects and CER creation. → An economy's emissions intensity is significant in determining CERs created. → Capacity building and electricity sector growth are significant in hosting projects. → The experience level for host countries in the CDM is significant for CER creation.

  8. New African species of Echinobothrium (Cestoda: Diphyllidea) and implications for the identities of their skate hosts.

    Science.gov (United States)

    Caira, J N; Rodriguez, N; Pickering, M

    2013-10-01

    Two new species of diphyllidean cestodes of the genus Echinobothrium, each hosted by a different skate species in the Raja miraletus complex, are described. Echinobothrium mercedesae n. sp. is described from R. cf. miraletus 2 off Senegal. Echinobothrium yiae n. sp. is described from R. cf. miraletus 1 off South Africa. Both species are small worms that differ from their 29 described congeners in the combination of number of cephalic peduncle spines per column, hook formula, number and arrangement of testes, and arrangement of vitelline follicles. They are easily distinguished from one another in that whereas the vitelline follicles of E. yiae n. sp. are circumcortical, they are lateral in E. mercedesae n. sp., and also in number of cephalic peduncle spines per column (14-17 vs. 10-12). Echinobothrium yiae n. sp. is also unusual in that the cephalic peduncle spines stop short of the anterior margin of the peduncle. In addition, although the paucity of available material precluded their formal description, evidence of 2 additional new species parasitizing R. miraletus also from Senegal is presented. In combination these worms provide support for the interpretation that what is currently recognized as Raja miraletus actually consists of a complex of geographically restricted species, rather than a polymorphic species of multiple parapatric or allopatrically distributed populations. This interpretation is not only supported by previously published molecular data, but also by newly collected morphological data involving differences in the color patterns of disc ocelli among host specimens of the 3 forms available as a result of digital efforts to ensure the accuracy of host identifications, which are also presented here.

  9. The effect of microbial colonization on the host proteome varies by gastrointestinal location.

    Science.gov (United States)

    Lichtman, Joshua S; Alsentzer, Emily; Jaffe, Mia; Sprockett, Daniel; Masutani, Evan; Ikwa, Elvis; Fragiadakis, Gabriela K; Clifford, David; Huang, Bevan Emma; Sonnenburg, Justin L; Huang, Kerwyn Casey; Elias, Joshua E

    2016-05-01

    Endogenous intestinal microbiota have wide-ranging and largely uncharacterized effects on host physiology. Here, we used reverse-phase liquid chromatography-coupled tandem mass spectrometry to define the mouse intestinal proteome in the stomach, jejunum, ileum, cecum and proximal colon under three colonization states: germ-free (GF), monocolonized with Bacteroides thetaiotaomicron and conventionally raised (CR). Our analysis revealed distinct proteomic abundance profiles along the gastrointestinal (GI) tract. Unsupervised clustering showed that host protein abundance primarily depended on GI location rather than colonization state and specific proteins and functions that defined these locations were identified by random forest classifications. K-means clustering of protein abundance across locations revealed substantial differences in host protein production between CR mice relative to GF and monocolonized mice. Finally, comparison with fecal proteomic data sets suggested that the identities of stool proteins are not biased to any region of the GI tract, but are substantially impacted by the microbiota in the distal colon.

  10. CILogon: An Integrated Identity and Access Management Platform for Science

    Science.gov (United States)

    Basney, J.

    2016-12-01

    , SeedMe, and XSEDE. The "CILogon 2.0" platform, launched in 2016, adds support for virtual organization (VO) membership management, identity linking, international collaborations, and standard integration protocols, through integration with the Internet2 COmanage collaboration software.

  11. Host-to-host variation of ecological interactions in polymicrobial infections

    Science.gov (United States)

    Mukherjee, Sayak; Weimer, Kristin E.; Seok, Sang-Cheol; Ray, Will C.; Jayaprakash, C.; Vieland, Veronica J.; Swords, W. Edward; Das, Jayajit

    2015-02-01

    Host-to-host variability with respect to interactions between microorganisms and multicellular hosts are commonly observed in infection and in homeostasis. However, the majority of mechanistic models used to analyze host-microorganism relationships, as well as most of the ecological theories proposed to explain coevolution of hosts and microbes, are based on averages across a host population. By assuming that observed variations are random and independent, these models overlook the role of differences between hosts. Here, we analyze mechanisms underlying host-to-host variations of bacterial infection kinetics, using the well characterized experimental infection model of polymicrobial otitis media (OM) in chinchillas, in combination with population dynamic models and a maximum entropy (MaxEnt) based inference scheme. We find that the nature of the interactions between bacterial species critically regulates host-to-host variations in these interactions. Surprisingly, seemingly unrelated phenomena, such as the efficiency of individual bacterial species in utilizing nutrients for growth, and the microbe-specific host immune response, can become interdependent in a host population. The latter finding suggests a potential mechanism that could lead to selection of specific strains of bacterial species during the coevolution of the host immune response and the bacterial species.

  12. Host-to-host variation of ecological interactions in polymicrobial infections.

    Science.gov (United States)

    Mukherjee, Sayak; Weimer, Kristin E; Seok, Sang-Cheol; Ray, Will C; Jayaprakash, C; Vieland, Veronica J; Swords, W Edward; Das, Jayajit

    2014-12-04

    Host-to-host variability with respect to interactions between microorganisms and multicellular hosts are commonly observed in infection and in homeostasis. However, the majority of mechanistic models used to analyze host-microorganism relationships, as well as most of the ecological theories proposed to explain coevolution of hosts and microbes, are based on averages across a host population. By assuming that observed variations are random and independent, these models overlook the role of differences between hosts. Here, we analyze mechanisms underlying host-to-host variations of bacterial infection kinetics, using the well characterized experimental infection model of polymicrobial otitis media (OM) in chinchillas, in combination with population dynamic models and a maximum entropy (MaxEnt) based inference scheme. We find that the nature of the interactions between bacterial species critically regulates host-to-host variations in these interactions. Surprisingly, seemingly unrelated phenomena, such as the efficiency of individual bacterial species in utilizing nutrients for growth, and the microbe-specific host immune response, can become interdependent in a host population. The latter finding suggests a potential mechanism that could lead to selection of specific strains of bacterial species during the coevolution of the host immune response and the bacterial species.

  13. Host specificity and coevolution of Flavobacteriaceae endosymbionts within the siphonous green seaweed Bryopsis.

    Science.gov (United States)

    Hollants, Joke; Leliaert, Frederik; Verbruggen, Heroen; De Clerck, Olivier; Willems, Anne

    2013-06-01

    The siphonous green seaweed Bryopsis harbors complex intracellular bacterial communities. Previous studies demonstrated that certain species form close, obligate associations with Flavobacteriaceae. A predominant imprint of host evolutionary history on the presence of these bacteria suggests a highly specialized association. In this study we elaborate on previous results by expanding the taxon sampling and testing for host-symbiont coevolution Therefore, we optimized a PCR protocol to directly and specifically amplify Flavobacteriaceae endosymbiont 16S rRNA gene sequences, which allowed us to screen a large number of algal samples without the need for cultivation or surface sterilization. We analyzed 146 Bryopsis samples, and 92 additional samples belonging to the Bryopsidales and other orders within the class Ulvophyceae. Results indicate that the Flavobacteriaceae endosymbionts are restricted to Bryopsis, and only occur within specific, warm-temperate and tropical clades of the genus. Statistical analyses (AMOVA) demonstrate a significant non-random host-symbiont association. Comparison of bacterial 16S rRNA and Bryopsis rbcL phylogenies, however, reveal complex host-symbiont evolutionary associations, whereby closely related hosts predominantly harbor genetically similar endosymbionts. Bacterial genotypes are rarely confined to a single Bryopsis species and most Bryopsis species harbored several Flavobacteriaceae, obscuring a clear pattern of coevolution. Copyright © 2013 Elsevier Inc. All rights reserved.

  14. Identity paradoxes

    Directory of Open Access Journals (Sweden)

    Đurić Jelena

    2010-01-01

    Full Text Available The article considers paradoxical nature of identity that emerges from: 1 the very concept of identity whose abstract generality unites various and even opposite features; 2 the processual nature of reality that is easier to express in the poetical metaphors or abstract principles than in unambiguous conceptual networks; 3 the oppose relationship between being and knowledge, mind and matter, subject and object, self and personality. Entangled in the labyrinth which evade efforts to be conceptually defined, the modern thinking of identity moves towards abandoning the idea of “self” on behalf of the “ego” and towards the misapprehension of identity as being identical. This corresponds to the “time of the lost spirit” stretched between the simultaneous need to find an identity and to give it up.

  15. A Self-Stabilizing Hybrid-Fault Tolerant Synchronization Protocol

    Science.gov (United States)

    Malekpour, Mahyar R.

    2014-01-01

    In this report we present a strategy for solving the Byzantine general problem for self-stabilizing a fully connected network from an arbitrary state and in the presence of any number of faults with various severities including any number of arbitrary (Byzantine) faulty nodes. Our solution applies to realizable systems, while allowing for differences in the network elements, provided that the number of arbitrary faults is not more than a third of the network size. The only constraint on the behavior of a node is that the interactions with other nodes are restricted to defined links and interfaces. Our solution does not rely on assumptions about the initial state of the system and no central clock nor centrally generated signal, pulse, or message is used. Nodes are anonymous, i.e., they do not have unique identities. We also present a mechanical verification of a proposed protocol. A bounded model of the protocol is verified using the Symbolic Model Verifier (SMV). The model checking effort is focused on verifying correctness of the bounded model of the protocol as well as confirming claims of determinism and linear convergence with respect to the self-stabilization period. We believe that our proposed solution solves the general case of the clock synchronization problem.

  16. Federated Identity Management

    OpenAIRE

    Chadwick, David W.

    2009-01-01

    Abstract. This paper addresses the topic of federated identity management. It discusses in detail the following topics: what is digital identity, what is identity management, what is federated identity management, Kim Camerons 7 Laws of Identity, how can we protect the users privacy in a federated environment, levels of assurance, some past and present federated identity management systems, and some current research in FIM.

  17. Social identity change: shifts in social identity during adolescence.

    Science.gov (United States)

    Tanti, Chris; Stukas, Arthur A; Halloran, Michael J; Foddy, Margaret

    2011-06-01

    This study investigated the proposition that adolescence involves significant shifts in social identity as a function of changes in social context and cognitive style. Using an experimental design, we primed either peer or gender identity with a sample of 380 early- (12-13 years), mid- (15-16 years), and late-adolescents (18-20 years) and then measured the effect of the prime on self-stereotyping and ingroup favouritism. The findings showed significant differences in social identity across adolescent groups, in that social identity effects were relatively strong in early- and late-adolescents, particularly when peer group identity rather than gender identity was salient. While these effects were consistent with the experience of change in educational social context, differences in cognitive style were only weakly related to ingroup favouritism. The implications of the findings for theory and future research on social identity during adolescence are discussed. Crown Copyright © 2010. Published by Elsevier Ltd. All rights reserved.

  18. Comparative Associations Between Achieved Bicultural Identity, Achieved Ego Identity, and Achieved Religious Identity and Adaptation Among Australian Adolescent Muslims.

    Science.gov (United States)

    Abu-Rayya, Hisham M; Abu-Rayya, Maram H; White, Fiona A; Walker, Richard

    2018-04-01

    This study examined the comparative roles of biculturalism, ego identity, and religious identity in the adaptation of Australian adolescent Muslims. A total of 504 high school Muslim students studying at high schools in metropolitan Sydney and Melbourne, Australia, took part in this study which required them to complete a self-report questionnaire. Analyses indicated that adolescent Muslims' achieved religious identity seems to play a more important role in shaping their psychological and socio-cultural adaptation compared to adolescents' achieved bicultural identity. Adolescents' achieved ego identity tended also to play a greater role in their psychological and socio-cultural adaptation than achieved bicultural identity. The relationships between the three identities and negative indicators of psychological adaptation were consistently indifferent. Based on these findings, we propose that the three identity-based forces-bicultural identity development, religious identity attainment, and ego identity formation-be amalgamated into one framework in order for researchers to more accurately examine the adaptation of Australian adolescent Muslims.

  19. Distinct effects of the nephridial symbionts Verminephrobacter and Candidatus Nephrothrix on reproduction and maturation of its earthworm host Eisenia andrei

    DEFF Research Database (Denmark)

    Viana, Flavia; Paz, Laura-Carlota; Methling, Karen

    2018-01-01

    to these two symbionts also hosts Agromyces-like bacteria in its mixed nephridial community: while growth was identical between control, Verminephrobacter-free and aposymbiotic worms, control worms produced significantly more cocoons and offspring than both Verminephrobacter-free and aposymbiotic worms...

  20. Host-to-host variation of ecological interactions in polymicrobial infections

    International Nuclear Information System (INIS)

    Mukherjee, Sayak; Seok, Sang-Cheol; Ray, Will C; Jayaprakash, C; Vieland, Veronica J; Das, Jayajit; Weimer, Kristin E; Swords, W Edward

    2015-01-01

    Host-to-host variability with respect to interactions between microorganisms and multicellular hosts are commonly observed in infection and in homeostasis. However, the majority of mechanistic models used to analyze host–microorganism relationships, as well as most of the ecological theories proposed to explain coevolution of hosts and microbes, are based on averages across a host population. By assuming that observed variations are random and independent, these models overlook the role of differences between hosts. Here, we analyze mechanisms underlying host-to-host variations of bacterial infection kinetics, using the well characterized experimental infection model of polymicrobial otitis media (OM) in chinchillas, in combination with population dynamic models and a maximum entropy (MaxEnt) based inference scheme. We find that the nature of the interactions between bacterial species critically regulates host-to-host variations in these interactions. Surprisingly, seemingly unrelated phenomena, such as the efficiency of individual bacterial species in utilizing nutrients for growth, and the microbe-specific host immune response, can become interdependent in a host population. The latter finding suggests a potential mechanism that could lead to selection of specific strains of bacterial species during the coevolution of the host immune response and the bacterial species. (paper)

  1. Swiss identity smells like chocolate: Social identity shapes olfactory judgments

    Science.gov (United States)

    Coppin, Géraldine; Pool, Eva; Delplanque, Sylvain; Oud, Bastiaan; Margot, Christian; Sander, David; Van Bavel, Jay J.

    2016-01-01

    There is extensive evidence that social identities can shape people’s attitudes and behavior, but what about sensory judgments? We examined the possibility that social identity concerns may also shape the judgment of non-social properties—namely, olfactory judgment. In two experiments, we presented Swiss and non-Swiss participants with the odor of chocolate, for which Switzerland is world-famous, and a control odor (popcorn). Swiss participants primed with Swiss identity reported the odor of chocolate (but not popcorn) as more intense than non-Swiss participants (Experiments 1 and 2) and than Swiss participants primed with individual identity or not primed (Experiment 2). The self-reported intensity of chocolate smell tended to increase as identity accessibility increased—but only among Swiss participants (Experiment 1). These results suggest that identity priming can counter-act classic sensory habituation effects, allowing identity-relevant smells to maintain their intensity after repeated presentations. This suggests that social identity dynamically influences sensory judgment. We discuss the potential implications for models of social identity and chemosensory perception. PMID:27725715

  2. Swiss identity smells like chocolate: Social identity shapes olfactory judgments.

    Science.gov (United States)

    Coppin, Géraldine; Pool, Eva; Delplanque, Sylvain; Oud, Bastiaan; Margot, Christian; Sander, David; Van Bavel, Jay J

    2016-10-11

    There is extensive evidence that social identities can shape people's attitudes and behavior, but what about sensory judgments? We examined the possibility that social identity concerns may also shape the judgment of non-social properties-namely, olfactory judgment. In two experiments, we presented Swiss and non-Swiss participants with the odor of chocolate, for which Switzerland is world-famous, and a control odor (popcorn). Swiss participants primed with Swiss identity reported the odor of chocolate (but not popcorn) as more intense than non-Swiss participants (Experiments 1 and 2) and than Swiss participants primed with individual identity or not primed (Experiment 2). The self-reported intensity of chocolate smell tended to increase as identity accessibility increased-but only among Swiss participants (Experiment 1). These results suggest that identity priming can counter-act classic sensory habituation effects, allowing identity-relevant smells to maintain their intensity after repeated presentations. This suggests that social identity dynamically influences sensory judgment. We discuss the potential implications for models of social identity and chemosensory perception.

  3. The Hawaii protocol for scientific monitoring of coffee berry borer: a model for coffee agroecosystems worldwide

    Science.gov (United States)

    Coffee Berry Borer (CBB) is the most devastating insect pest for coffee crops worldwide. We developed a scientific monitoring protocol aimed at capturing and quantifying the dynamics and impact of this invasive insect pest as well as the development of its host plant across a heterogeneous landscape...

  4. Host Phylogeny Determines Viral Persistence and Replication in Novel Hosts

    Science.gov (United States)

    Longdon, Ben; Hadfield, Jarrod D.; Webster, Claire L.

    2011-01-01

    Pathogens switching to new hosts can result in the emergence of new infectious diseases, and determining which species are likely to be sources of such host shifts is essential to understanding disease threats to both humans and wildlife. However, the factors that determine whether a pathogen can infect a novel host are poorly understood. We have examined the ability of three host-specific RNA-viruses (Drosophila sigma viruses from the family Rhabdoviridae) to persist and replicate in 51 different species of Drosophilidae. Using a novel analytical approach we found that the host phylogeny could explain most of the variation in viral replication and persistence between different host species. This effect is partly driven by viruses reaching a higher titre in those novel hosts most closely related to the original host. However, there is also a strong effect of host phylogeny that is independent of the distance from the original host, with viral titres being similar in groups of related hosts. Most of this effect could be explained by variation in general susceptibility to all three sigma viruses, as there is a strong phylogenetic correlation in the titres of the three viruses. These results suggest that the source of new emerging diseases may often be predictable from the host phylogeny, but that the effect may be more complex than simply causing most host shifts to occur between closely related hosts. PMID:21966271

  5. Whole genome-based phylogeny of reptile-associated Helicobacter indicates independent niche adaptation followed by diversification in a poikilothermic host.

    Science.gov (United States)

    Gilbert, Maarten J; Duim, Birgitta; Timmerman, Arjen J; Zomer, Aldert L; Wagenaar, Jaap A

    2017-08-21

    Reptiles have been shown to host a significant Helicobacter diversity. In order to survive, reptile-associated Helicobacter lineages need to be adapted to the thermally dynamic environment encountered in a poikilothermic host. The whole genomes of reptile-associated Helicobacter lineages can provide insights in Helicobacter host adaptation and coevolution. These aspects were explored by comparing the genomes of reptile-, bird-, and mammal-associated Helicobacter lineages. Based on average nucleotide identity, all reptile-associated Helicobacter lineages in this study could be considered distinct species. A whole genome-based phylogeny showed two distinct clades, one associated with chelonians and one associated with lizards. The phylogeny indicates initial adaptation to an anatomical niche, which is followed by an ancient host jump and subsequent diversification. Furthermore, the ability to grow at low temperatures, which might reflect thermal adaptation to a reptilian host, originated at least twice in Helicobacter evolution. A putative tricarballylate catabolism locus was specifically present in Campylobacter and Helicobacter isolates from reptiles. The phylogeny of reptile-associated Helicobacter parallels host association, indicating a high level of host specificity. The high diversity and deep branching within these clades supports long-term coevolution with, and extensive radiation within the respective reptilian host type.

  6. Host phylogeny determines viral persistence and replication in novel hosts.

    Directory of Open Access Journals (Sweden)

    Ben Longdon

    2011-09-01

    Full Text Available Pathogens switching to new hosts can result in the emergence of new infectious diseases, and determining which species are likely to be sources of such host shifts is essential to understanding disease threats to both humans and wildlife. However, the factors that determine whether a pathogen can infect a novel host are poorly understood. We have examined the ability of three host-specific RNA-viruses (Drosophila sigma viruses from the family Rhabdoviridae to persist and replicate in 51 different species of Drosophilidae. Using a novel analytical approach we found that the host phylogeny could explain most of the variation in viral replication and persistence between different host species. This effect is partly driven by viruses reaching a higher titre in those novel hosts most closely related to the original host. However, there is also a strong effect of host phylogeny that is independent of the distance from the original host, with viral titres being similar in groups of related hosts. Most of this effect could be explained by variation in general susceptibility to all three sigma viruses, as there is a strong phylogenetic correlation in the titres of the three viruses. These results suggest that the source of new emerging diseases may often be predictable from the host phylogeny, but that the effect may be more complex than simply causing most host shifts to occur between closely related hosts.

  7. Comparison of Leptospira interrogans and Leptospira biflexa genomes: analysis of potential leptospiral-host interactions.

    Science.gov (United States)

    Mehrotra, Prachi; Ramakrishnan, Gayatri; Dhandapani, Gunasekaran; Srinivasan, Narayanaswamy; Madanan, Madathiparambil G

    2017-05-02

    Leptospirosis, a potentially life-threatening disease, remains the most widespread zoonosis caused by pathogenic species of Leptospira. The pathogenic spirochaete, Leptospira interrogans, is characterized by its ability to permeate human host tissues rapidly and colonize multiple organs in the host. In spite of the efforts taken to comprehend the pathophysiology of the pathogen and the heterogeneity posed by L. interrogans, the current knowledge on the mechanism of pathogenesis is modest. In an attempt to contribute towards the same, we demonstrate the use of an established structure-based protocol coupled with information on subcellular localization of proteins and their tissue-specificity, in recognizing a set of 49 biologically feasible interactions potentially mediated by proteins of L. interrogans in humans. We have also presented means to adjudge the physicochemical viability of the predicted host-pathogen interactions, for selected cases, in terms of interaction energies and geometric shape complementarity of the interacting proteins. Comparative analyses of proteins of L. interrogans and the saprophytic spirochaete, Leptospira biflexa, and their predicted involvement in interactions with human hosts, aided in underpinning the functional relevance of leptospiral-host protein-protein interactions specific to L. interrogans as well as those specific to L. biflexa. Our study presents characteristics of the pathogenic L. interrogans that are predicted to facilitate its ability to persist in human hosts.

  8. Imagining Homeland: Identity and Repertories of a Greek Labour-immigrant Musician in Germany

    Directory of Open Access Journals (Sweden)

    Smaragdi Boura

    2006-05-01

    Full Text Available Migration has always played an important and determinative role in the formation of the Greek life-cycle, since the existence of a Greek Diaspora originates back to the institution of the Greek nation. However, whether the migration phenomenon represents a typical and integral part of the Greek cultural tradition or mentality, or appears as a forced consequence of specific economic or political circumstances, it should be pointed out that it has proved to be a transformative factor for the lives of people involved in it. The fate of "metanastes" (immigrants and the life in "xenitia" (foreign host land appear to be a very common and prominent topic elaborated in the poetic texts of the Greek "dimotika tragoudia" (traditional songs and "laika tragoudia" (folk-popular songs. Through these repertoires, music reveals its power in conveying and symbolically communicating and expressing public notions, feelings and cultural messages that acquire a particular significance for immigrant communities. Furthermore, diasporic music—along with dance—constitutes one of the basic components of the immigrant's cultural heritage, representing: an expressive way of maintaining cultural identity; a fixed, however metaphorical, conjunctional link between the mother country and the host land; and, a fundamental context through which the migratory community identifies or reconstitutes itself in relation to the majority and other surrounding groups. The author uses fieldwork from a year spent amongst Greek immigrant communities in the Stuttgart region of Germany to address and reflect on issues around the role of music in identity construction and the way in which this connects with processes of integration, assimilation and transnationalism. Specifically, the paper explores the multiple identities and repertories of a Greek musician in Germany, by focusing on several aspects of the musician's life-portrait and providing both emic and etic interpretations. This

  9. The Supermalt identity

    DEFF Research Database (Denmark)

    Bech-Larsen, Tino; Esbjerg, Lars; Grunert, Klaus G.

    2007-01-01

    on consumers' self-identities. The second part explored the role of food and beverage products in the construction of self-identities. The final part focused on the construction of brand identity for Supermalt. Findings - The article provides information on the self-identities constructed by Afro......-Caribbean informants. The food and beverage consumption of informants reflects their mixed cultural identity. The brand identity Supermalt appears to be malleable, with ample room for consumer co-construction. Perceptions of brand identity differ markedly among informants, who are all able to construct Supermalt......Purpose - The objective of this article is to conduct a case study of the Supermalt brand of malt beer, which has become the preferred beverage of Afro-Caribbean consumers in Brixton on a very limited marketing budget. Design/methodology/approach - The article uses the concepts of personal identity...

  10. Fashioning Identity

    DEFF Research Database (Denmark)

    Mackinney-Valentin, Maria

    We dress to communicate who we are, or who we would like others to think we are, telling seductive fashion narratives through our adornment. Yet, today, fashion has been democratized through high-low collaborations, social media and real-time fashion mediation, complicating the basic dynamic...... of identity displays, and creating tension between personal statements and social performances. Fashioning Identity explores how this tension is performed through fashion production and consumption,by examining a diverse series of case studies - from ninety-year old fashion icons to the paradoxical rebellion...... by readdressing Fred Davis' seminal concept of 'identity ambivalence' in Fashion, Culture and Identity (1992), Mackinney-Valentin argues that we are in an epoch of 'status ambivalence', in which fashioning one's own identity has become increasingly complicated....

  11. The idealization of origins among immigrants or exiled: the double function of maintaining identity and acculturation

    Directory of Open Access Journals (Sweden)

    Stéphane Laurens

    2014-07-01

    Full Text Available In the case of emigrated or exiled individuals, the idealization of origins often becomes more marked in the beginning of the integration of these individuals in the host society. Thus, as they lose their language, their customs, to take those of the society of reception, they elaborate an idealized image of their past. This progressive differentiation between the idealized past and the actual reality facilitates the acculturation in the host society and at the same time allows for the preservation of their specific identity. It is this elaboration of the ideal and its emancipation of the daily realities, which will be approached here.

  12. Combining Phylogenetic and Occurrence Information for Risk Assessment of Pest and Pathogen Interactions with Host Plants

    Directory of Open Access Journals (Sweden)

    Ángel L. Robles-Fernández

    2017-08-01

    Full Text Available Phytosanitary agencies conduct plant biosecurity activities, including early detection of potential introduction pathways, to improve control and eradication of pest and pathogen incursions. For such actions, analytical tools based on solid scientific knowledge regarding plant-pest or pathogen relationships for pest risk assessment are needed. Recent evidence indicating that closely related species share a higher chance of becoming infected or attacked by pests has allowed the identification of taxa with different degrees of vulnerability. Here, we use information readily available online about pest-host interactions and their geographic distributions, in combination with host phylogenetic reconstructions, to estimate a pest-host interaction (in some cases infection index in geographic space as a more comprehensive, spatially explicit tool for risk assessment. We demonstrate this protocol using phylogenetic relationships for 20 beetle species and 235 host plant genera: first, we estimate the probability of a host sharing pests, and second, we project the index in geographic space. Overall, the predictions allow identification of the pest-host interaction type (e.g., generalist or specialist, which is largely determined by both host range and phylogenetic constraints. Furthermore, the results can be valuable in terms of identifying hotspots where pests and vulnerable hosts interact. This knowledge is useful for anticipating biological invasions or spreading of disease. We suggest that our understanding of biotic interactions will improve after combining information from multiple dimensions of biodiversity at multiple scales (e.g., phylogenetic signal and host-vector-pathogen geographic distribution.

  13. Security of Semi-Device-Independent Random Number Expansion Protocols.

    Science.gov (United States)

    Li, Dan-Dan; Wen, Qiao-Yan; Wang, Yu-Kun; Zhou, Yu-Qian; Gao, Fei

    2015-10-27

    Semi-device-independent random number expansion (SDI-RNE) protocols require some truly random numbers to generate fresh ones, with making no assumptions on the internal working of quantum devices except for the dimension of the Hilbert space. The generated randomness is certified by non-classical correlation in the prepare-and-measure test. Until now, the analytical relations between the amount of the generated randomness and the degree of non-classical correlation, which are crucial for evaluating the security of SDI-RNE protocols, are not clear under both the ideal condition and the practical one. In the paper, first, we give the analytical relation between the above two factors under the ideal condition. As well, we derive the analytical relation under the practical conditions, where devices' behavior is not independent and identical in each round and there exists deviation in estimating the non-classical behavior of devices. Furthermore, we choose a different randomness extractor (i.e., two-universal random function) and give the security proof.

  14. The effect of immigration status on physics identity and physical science career intentions

    Science.gov (United States)

    Lung, Florin; Potvin, Geoff; Sonnert, Gerhard; Sadler, Philip M.

    2012-02-01

    Using data collected from a nationally-representative sample of first-year college students, we examine how students' identity development as physics persons and their likelihood to pursue a career in physical science is predicted by differing immigrant experiences. We consider broad factors having a social, economic, or cultural nature as covariates in a propensity score model that assesses differences due to immigrant generation. Our results show that, when controlling for such factors as race/ethnicity, socio-economic status, and gender, students' physics identities and the likelihood of choosing a career in physical science are significantly higher amongst first generation students than second generation (or later) students. We conclude that physical science as a career option can be influenced by the experiences of being an immigrant and through the relationship between origin and host culture.

  15. Identity Assemblages

    DEFF Research Database (Denmark)

    Horn, Line Helverskov

    The study aims at exploring how identity is enacted within the context of a two-year programme in Service, Hospitality, and Tourism Management (SHTM). This research thus investigates how students and educators go about their daily lives in different educational contexts both on and off campus...... as a contribution to the body of literature of ANT-based studies. Second, it contributes to existing identity theories by exemplifying a socio-material approach to identity issues. Third, the study enables reflections upon how educational institutions as fundamentally identity-producing organisations acknowledge...

  16. Civil Identity

    DEFF Research Database (Denmark)

    Petersen, Lars Axel

    In this paper I will go through a catalogue of examples of contexts in which the term civil identity is currently used, ranging from the formal and technical process of linking a set of administrative and other events to an individual biological person by means of identity cards, fingerprints, iris...... of Israel to Luce Irigaray's Feminist agenda of elaborating gender specific civil identities. My intention is to investigate whether these different employments of 'civil identity' point towards a common, and fairly well defined object field asking questions of contemporary relevance to the philosophy...

  17. On Fay identity

    International Nuclear Information System (INIS)

    Michev, Iordan P.

    2006-01-01

    In the first part of this paper we consider the transformation of the cubic identities for general Korteweg-de Vries (KdV) tau functions from [Mishev, J. Math. Phys. 40, 2419-2428 (1999)] to the specific identities for trigonometric KdV tau functions. Afterwards, we consider the Fay identity as a functional equation and provide a wide set of solutions of this equation. The main result of this paper is Theorem 3.4, where we generalize the identities from Mishev. An open problem is the transformation of the cubic identities from Mishev to the specific identities for elliptic KdV tau functions

  18. Mutants in the host-pathogen system barley-powdery mildew

    International Nuclear Information System (INIS)

    Joergensen, J.H.

    1989-10-01

    Mutation induction was used to analyse the host/pathogen interaction of barley and Erysiphe graminis. By irradiation or chemical mutagens, a number of similar mutations were induced in the ml-o gene (locus) of barley. The mutants had non-specific and durable resistance, which is rather uncommon. Studies revealed, that in spite of their similarity (the same mutated locus, monogenic recessive inheritance), the mutants were not identical and represent unique sources of disease resistant germ plasm. To study more fundamentally the interference of induced mutations in host/pathogen interactions, barley carrying the dominant resistance gene M1-a 12 was irradiated to mutate this gene. Instead of the expected ''monogenic recessive susceptibility'', several different mutational events inside and outside the locus were found to modify the resistance towards a more or less susceptible reaction. A third interesting approach was to induce mutations in the pathogen and thus create new virulence genes. The result, that no true mutation towards virulence was obtained in extremely large populations, deserves attention and further study to be sure about its implication. 13 refs

  19. Identity and identity conflict in the workplace

    NARCIS (Netherlands)

    K.E. Horton (Kate); P.S. Bayerl (Saskia); G. Belschak-Jacobs (Gabriele)

    2014-01-01

    textabstractAs individuals, we define ourselves according to various characteristics that include our values and beliefs. This gives us our identity. As organisations become increasingly complex, understanding the concept of identity conflict may mean the difference between success and failure.

  20. A single-aliquot OSL protocol using bracketing regenerative doses to accurately determine equivalent doses in quartz

    CERN Document Server

    Folz, E

    1999-01-01

    In most cases, sediments show inherent heterogeneity in their luminescence behaviours and bleaching histories, and identical aliquots are not available: single-aliquot determination of the equivalent dose (ED) is then the approach of choice and the advantages of using regenerative protocols are outlined. Experiments on five laboratory bleached and dosed quartz samples, following the protocol described by Murray and Roberts (1998. Measurement of the equivalent dose in quartz using a regenerative-dose single aliquot protocol. Radiation Measurements 27, 171-184), showed the hazards of using a single regeneration dose: a 10% variation in the regenerative dose yielded some equivalent dose estimates that differed from the expected value by more than 5%. A protocol is proposed that allows the use of different regenerative doses to bracket the estimated equivalent dose. The measured ED is found to be in excellent agreement with the known value when the main regeneration dose is within 10% of the true equivalent dose.

  1. A single-aliquot OSL protocol using bracketing regenerative doses to accurately determine equivalent doses in quartz

    International Nuclear Information System (INIS)

    Folz, Elise; Mercier, Norbert

    1999-01-01

    In most cases, sediments show inherent heterogeneity in their luminescence behaviours and bleaching histories, and identical aliquots are not available: single-aliquot determination of the equivalent dose (ED) is then the approach of choice and the advantages of using regenerative protocols are outlined. Experiments on five laboratory bleached and dosed quartz samples, following the protocol described by Murray and Roberts (1998. Measurement of the equivalent dose in quartz using a regenerative-dose single aliquot protocol. Radiation Measurements 27, 171-184), showed the hazards of using a single regeneration dose: a 10% variation in the regenerative dose yielded some equivalent dose estimates that differed from the expected value by more than 5%. A protocol is proposed that allows the use of different regenerative doses to bracket the estimated equivalent dose. The measured ED is found to be in excellent agreement with the known value when the main regeneration dose is within 10% of the true equivalent dose

  2. Mistaken identity: activating conservative political identities induces "conservative" financial decisions.

    Science.gov (United States)

    Morris, Michael W; Carranza, Erica; Fox, Craig R

    2008-11-01

    Four studies investigated whether activating a social identity can lead group members to choose options that are labeled in words associated with that identity. When political identities were made salient, Republicans (but not Democrats) became more likely to choose the gamble or investment option labeled "conservative." This shift did not occur in a condition in which the same options were unlabeled. Thus, the mechanism underlying the effect appears to be not activated identity-related values prioritizing low risk, but rather activated identity-related language (the group label "conservative"). Indeed, when political identities were salient, Republicans favored options labeled "conservative" regardless of whether the options were low or high risk. Finally, requiring participants to explain the label "conservative" before making their choice did not diminish the effect, which suggests that it does not merely reflect inattention to content or construct accessibility. We discuss the implications of these results for the literatures on identity, priming, choice, politics, and marketing.

  3. Disease ecology across soil boundaries: effects of below-ground fungi on above-ground host-parasite interactions.

    Science.gov (United States)

    Tao, Leiling; Gowler, Camden D; Ahmad, Aamina; Hunter, Mark D; de Roode, Jacobus C

    2015-10-22

    Host-parasite interactions are subject to strong trait-mediated indirect effects from other species. However, it remains unexplored whether such indirect effects may occur across soil boundaries and connect spatially isolated organisms. Here, we demonstrate that, by changing plant (milkweed Asclepias sp.) traits, arbuscular mycorrhizal fungi (AMF) significantly affect interactions between a herbivore (the monarch butterfly Danaus plexippus) and its protozoan parasite (Ophryocystis elektroscirrha), which represents an interaction across four biological kingdoms. In our experiment, AMF affected parasite virulence, host resistance and host tolerance to the parasite. These effects were dependent on both the density of AMF and the identity of milkweed species: AMF indirectly increased disease in monarchs reared on some species, while alleviating disease in monarchs reared on other species. The species-specificity was driven largely by the effects of AMF on both plant primary (phosphorus) and secondary (cardenolides; toxins in milkweeds) traits. Our study demonstrates that trait-mediated indirect effects in disease ecology are extensive, such that below-ground interactions between AMF and plant roots can alter host-parasite interactions above ground. In general, soil biota may play an underappreciated role in the ecology of many terrestrial host-parasite systems. © 2015 The Author(s).

  4. The Impact of Host Family Relations and Length of Stay on Adolescent Identity Expression during Study Abroad

    Science.gov (United States)

    Grieve, Averil Marie

    2015-01-01

    This study focuses on the relationships between host family success, social integration, length of stay and acquisition of adolescent language by students on extended international homestay programmes. Degree of adolescent language acquisition and integration is measured by use of two hallmarks of adolescent language: markers of approximation…

  5. Teacher educators: their identities, sub-identities and implications for professional development

    NARCIS (Netherlands)

    Swennen, J.M.H.; Jones, K.; Volman, M.L.L.

    2010-01-01

    In this article we address the question: 'What sub-identities of teacher educators emerge from the research literature about teacher educators and what are the implications of the sub-identities for the professional development of teacher educators?' Like other professional identities, the identity

  6. Associate host in single-layer co-host polymer electrophosphorescent devices

    International Nuclear Information System (INIS)

    Wang Yuanmin; Teng Feng; Feng Bin; Wang Yongsheng; Xu Xurong

    2006-01-01

    The definition and role of 'host' in polymer LED materials are studied in the present work. 'Primary host' and 'associate host' have been proposed and the rules of how to select an associate host are reported. Based on our experiments and the analysis of the energy scheme of the devices, we suggest that the values of the lowest unoccupied molecular orbital (LUMO) and highest occupied molecular orbital (HOMO) are critical determinant in selecting a suitable associate host. On one hand, the associate host should be a hole-blocking material. This can confine the excitons in the active layer. On the other hand, the associate host should have a suitable LUMO that is convenient for electrons to transport

  7. Identity after Death

    DEFF Research Database (Denmark)

    Gerstrøm, Anna

    2015-01-01

    Purpose: The purpose of this paper is to explore how legacy organizational identity and death relate to each other and, thereby, contribute to closing the gap in knowledge on organizational identity constructions in times of death. Design/methodology/approach: The paper opted for an exploratory....../value: This paper addresses an apparent gap in the literature on identity and death; exploring identity narratives in a bankrupted bank, the paper considers constructions of legacy organizational identities in times of disruptive death....

  8. Identity/Time

    Directory of Open Access Journals (Sweden)

    Nancy J. Knauer

    2013-09-01

    Full Text Available This paper engages the unspoken fourth dimension of intersectionality—time. Using the construction of lesbian, gay, bisexual, and transgender (LGBT identities as an example, it establishes that identity, as it is lived and experienced, is not only multivalent, but also historically contingent. It then raises a number of points regarding the temporal locality of identity—the influence of time on issues of identity and understanding, its implications for legal interventions, social movement building, and paradigms of progressive change. As the title suggests, the paper asks us to consider the frame of identity over time.

  9. Host specificity and coevolution of Flavobacteriaceae endosymbionts within the siphonous green seaweed Bryopsis

    OpenAIRE

    Hollants, J.; Leliaert, F.; Verbruggen, H.; De Clerck, O.; Willems, A.

    2013-01-01

    The siphonous green seaweed Bryopsis harbors complex intracellular bacterial communities. Previous studies demonstrated that certain species form close, obligate associations with Flavobacteriaceae. A predominant imprint of host evolutionary history on the presence of these bacteria suggests a highly specialized association. In this study we elaborate on previous results by expanding the taxon sampling and testing for host–symbiont coevolution Therefore, we optimized a PCR protocol to directl...

  10. Differential recognition and hydrolysis of host carbohydrate antigens by Streptococcus pneumoniae family 98 glycoside hydrolases.

    Science.gov (United States)

    Higgins, Melanie A; Whitworth, Garrett E; El Warry, Nahida; Randriantsoa, Mialy; Samain, Eric; Burke, Robert D; Vocadlo, David J; Boraston, Alisdair B

    2009-09-18

    The presence of a fucose utilization operon in the Streptococcus pneumoniae genome and its established importance in virulence indicates a reliance of this bacterium on the harvesting of host fucose-containing glycans. The identities of these glycans, however, and how they are harvested is presently unknown. The biochemical and high resolution x-ray crystallographic analysis of two family 98 glycoside hydrolases (GH98s) from distinctive forms of the fucose utilization operon that originate from different S. pneumoniae strains reveal that one enzyme, the predominant type among pneumococcal isolates, has a unique endo-beta-galactosidase activity on the LewisY antigen. Altered active site topography in the other species of GH98 enzyme tune its endo-beta-galactosidase activity to the blood group A and B antigens. Despite their different specificities, these enzymes, and by extension all family 98 glycoside hydrolases, use an inverting catalytic mechanism. Many bacterial and viral pathogens exploit host carbohydrate antigens for adherence as a precursor to colonization or infection. However, this is the first evidence of bacterial endoglycosidase enzymes that are known to play a role in virulence and are specific for distinct host carbohydrate antigens. The strain-specific distribution of two distinct types of GH98 enzymes further suggests that S. pneumoniae strains may specialize to exploit host-specific antigens that vary from host to host, a factor that may feature in whether a strain is capable of colonizing a host or establishing an invasive infection.

  11. Design and Analysis of QoS Routing Framework integrated with OLSR protocol for Multimedia Traffic in Mobile Adhoc Networks

    Directory of Open Access Journals (Sweden)

    S. Soni

    2017-06-01

    Full Text Available MANETs (Mobile Ad-hoc Networks is the self organizing wireless structure of mobile hosts. Wireless media is used for communication in MANETs. Considering the developing requirements for multimedia and real-time traffic applications in real world, QoS (Quality-of-Service support is essential in MANETs. But most of the characteristics of MANETs make QoS support a difficult problem. It is challenging to support QoS routing in MANET due to dynamic behavior and mobility of the hosts. The OLSR (Optimized Link State Routing protocol can be efficiently used in MANETs to provide QoS routing because of its dynamic MPR (Multi Point Relay selection criteria and proactive nature. In this paper, a design of QoS routing framework integrated with OLSR protocol is proposed and also analyzed using network simulator. Proposed QoS framework combines a bandwidth estimation algorithm with explicit resource reservation, QoS routing and connection admission control (CAC. OLSR protocol is extended for QoS framework to solve performance issues related to node mobility using cross layer approach. Results after simulation conclude about efficiency of the proposed QoS routing framework.

  12. Vocational Identity and Ego Identity Status in Korean Nursing Students

    Directory of Open Access Journals (Sweden)

    Hyun-Young Koo, PhD, RN

    2016-03-01

    Conclusions: These findings show that nursing students in identity achievement status have secure and clear vocational identities. Further longitudinal and qualitative studies are needed to find out if identity formation among nursing students changes with age.

  13. Multi-Omics Analysis Reveals a Correlation between the Host Phylogeny, Gut Microbiota and Metabolite Profiles in Cyprinid Fishes

    Science.gov (United States)

    Li, Tongtong; Long, Meng; Li, Huan; Gatesoupe, François-Joël; Zhang, Xujie; Zhang, Qianqian; Feng, Dongyue; Li, Aihua

    2017-01-01

    Gut microbiota play key roles in host nutrition and metabolism. However, little is known about the relationship between host genetics, gut microbiota and metabolic profiles. Here, we used high-throughput sequencing and gas chromatography/mass spectrometry approaches to characterize the microbiota composition and the metabolite profiles in the gut of five cyprinid fish species with three different feeding habits raised under identical husbandry conditions. Our results showed that host species and feeding habits significantly affect not only gut microbiota composition but also metabolite profiles (ANOSIM, p ≤ 0.05). Mantel test demonstrated that host phylogeny, gut microbiota, and metabolite profiles were significantly related to each other (p ≤ 0.05). Additionally, the carps with the same feeding habits had more similarity in gut microbiota composition and metabolite profiles. Various metabolites were correlated positively with bacterial taxa involved in food degradation. Our results shed new light on the microbiome and metabolite profiles in the gut content of cyprinid fishes, and highlighted the correlations between host genotype, fish gut microbiome and putative functions, and gut metabolite profiles. PMID:28367147

  14. Ternutator identities

    International Nuclear Information System (INIS)

    Devchand, Chandrashekar; Fairlie, David; Nuyts, Jean; Weingart, Gregor

    2009-01-01

    The ternary commutator or ternutator, defined as the alternating sum of the product of three operators, has recently drawn much attention as an interesting structure generalizing the commutator. The ternutator satisfies cubic identities analogous to the quadratic Jacobi identity for the commutator. We present various forms of these identities and discuss the possibility of using them to define ternary algebras.

  15. A novel pathogenic aviadenovirus from red-bellied parrots (Poicephalus rufiventris) unveils deep recombination events among avian host lineages

    International Nuclear Information System (INIS)

    Das, Shubhagata; Fearnside, Kathleen; Sarker, Subir; Forwood, Jade K.; Raidal, Shane R.

    2017-01-01

    Competing roles of coevolution, selective pressure and recombination are an emerging interest in virus evolution. We report a novel aviadenovirus from captive red-bellied parrots (Poicephalus rufiventris) that uncovers evidence of deep recombination among aviadenoviruses. The sequence identity of the virus was most closely related to Turkey adenovirus D (42% similarity) and other adenoviruses in chickens, turkeys and pigeons. Sequencing and comparative analysis showed that the genome comprised 40,930 nucleotides containing 42 predicted open reading frames (ORFs) 19 of which had strong similarity with genes from other adenovirus species. The new genome unveiled a lineage that likely participated in deep recombination events across the genus Aviadenovirus accounting for an ancient evolutionary relationship. We hypothesize frequent host switch events and recombination among adenovirus progenitors in Galloanserae hosts caused the radiation of extant aviadenoviruses and the newly assembled Poicephalus adenovirus genome points to a potentially broader host range of these viruses among birds. - Highlights: •Shows how a single new genome can change overall phylogeny. •Reveals host switch events among adenovirus progenitors in Galloanserae hosts. •Points to a potentially broader host range of adenoviruses among birds and wildlife .

  16. A novel pathogenic aviadenovirus from red-bellied parrots (Poicephalus rufiventris) unveils deep recombination events among avian host lineages

    Energy Technology Data Exchange (ETDEWEB)

    Das, Shubhagata, E-mail: sdas@csu.edu.au [School of Animal and Veterinary Sciences, Faculty of Science, Charles Sturt University, New South Wales 2678 (Australia); Fearnside, Kathleen, E-mail: kathyfearnside@exemail.com.au [Hills District Veterinary Hospital, Unit 1, 276 New Line Road, Dural, NSW 2158 (Australia); Sarker, Subir, E-mail: S.Sarker@latrobe.edu.au [Department of Physiology, Anatomy and Microbiology, School of Life Sciences, La Trobe University, Melbourne, VIC 3086 (Australia); Forwood, Jade K., E-mail: jforwood@csu.edu.au [School of Biomedical Sciences, Faculty of Science, Charles Sturt University, Wagga Wagga, NSW 2650 (Australia); Raidal, Shane R., E-mail: shraidal@csu.edu.au [School of Animal and Veterinary Sciences, Faculty of Science, Charles Sturt University, New South Wales 2678 (Australia)

    2017-02-15

    Competing roles of coevolution, selective pressure and recombination are an emerging interest in virus evolution. We report a novel aviadenovirus from captive red-bellied parrots (Poicephalus rufiventris) that uncovers evidence of deep recombination among aviadenoviruses. The sequence identity of the virus was most closely related to Turkey adenovirus D (42% similarity) and other adenoviruses in chickens, turkeys and pigeons. Sequencing and comparative analysis showed that the genome comprised 40,930 nucleotides containing 42 predicted open reading frames (ORFs) 19 of which had strong similarity with genes from other adenovirus species. The new genome unveiled a lineage that likely participated in deep recombination events across the genus Aviadenovirus accounting for an ancient evolutionary relationship. We hypothesize frequent host switch events and recombination among adenovirus progenitors in Galloanserae hosts caused the radiation of extant aviadenoviruses and the newly assembled Poicephalus adenovirus genome points to a potentially broader host range of these viruses among birds. - Highlights: •Shows how a single new genome can change overall phylogeny. •Reveals host switch events among adenovirus progenitors in Galloanserae hosts. •Points to a potentially broader host range of adenoviruses among birds and wildlife .

  17. Ethnic Identity in Everyday Life: The Influence of Identity Development Status

    Science.gov (United States)

    Yip, Tiffany

    2013-01-01

    The current study explores the intersection of ethnic identity development and significance in a sample of 354 diverse adolescents (mean age 14). Adolescents completed surveys 5 times a day for 1 week. Cluster analyses revealed 4 identity clusters: diffused, foreclosed, moratorium, achieved. Achieved adolescents reported the highest levels of identity salience across situations, followed by moratorium adolescents. Achieved and moratorium adolescents also reported a positive association between identity salience and private regard. For foreclosed and achieved adolescents reporting low levels of centrality, identity salience was associated with lower private regard. For foreclosed and achieved adolescents reporting high levels of centrality, identity salience was associated with higher private regard. PMID:23581701

  18. Protocols for geologic hazards response by the Yellowstone Volcano Observatory

    Science.gov (United States)

    ,

    2010-01-01

    The Yellowstone Plateau hosts an active volcanic system, with subterranean magma (molten rock), boiling, pressurized waters, and a variety of active faults with significant earthquake hazards. Within the next few decades, light-to-moderate earthquakes and steam explosions are certain to occur. Volcanic eruptions are less likely, but are ultimately inevitable in this active volcanic region. This document summarizes protocols, policies, and tools to be used by the Yellowstone Volcano Observatory (YVO) during earthquakes, hydrothermal explosions, or any geologic activity that could lead to a volcanic eruption.

  19. Experiencing with Identity

    DEFF Research Database (Denmark)

    Pors, Justine Grønbæk

    2012-01-01

    This article studies how a political organization begins to experiment with its identity. By use of an empirical case of the Danish Ministry of Education, I examine how a political organization supplements its identity of a legislating power with identities of a supervisor, beacon and facilitator...... of evaluation in public schools. Out of a paralysis emerge new innovative strategies of governing, aimed at the schools’ self-governing capacity. The identity of the political system thus emerges as oscillations between different roles of a legislating power and a supervising coach. The case study suggests...... that a society of experimentalism is emerging. Thus, the relevant object of study is no longer organizational identity, but the experiments with different identities that modern organizations are performing....

  20. Towards Scalability for Federated Identity Systems for Cloud-Based Environments

    Directory of Open Access Journals (Sweden)

    André Albino Pereira

    2015-12-01

    Full Text Available As multi-tenant authorization and federated identity management systems for cloud computing matures, the provisioning of services using this paradigm allows maximum efficiency on business that requires access control. However, regarding scalability support, mainly horizontal, some characteristics of those approaches based on central authentication protocols are problematic. The objective of this work is to address these issues by providing an adapted sticky-session mechanism for a Shibboleth architecture using JASIG CAS. This alternative, compared with the recommended distributed memory approach, shown improved efficiency and less overall infrastructure complexity, as well as demanding less 58% of computational resources and improving throughput (requests per second by 11%.

  1. Identity Work and Emotions

    DEFF Research Database (Denmark)

    Winkler, Ingo

    2018-01-01

    This paper reviews the empirical literature on identity work and identifies two distinct approaches to incorporating emotion. The majority of empirical studies use emotion to describe the experiences of identity work. In doing so, the authors (a) mention the emotions that people feel in situations...... that trigger identity work, (b) illustrate identity work as an emotional endeavour, and (c) describe the emotional impact of successful and unsuccessful identity work. There is also an emerging literature that examines the mutual constitution of emotions and identity work. These authors address emotional...... labour, affective social identification, emotional attachment and detachment, and humour when studying identity work. This paper suggests that, to understand better the relation between emotions and identity work, future research should examine the role of emotions in problematizing identity...

  2. Efficacy of some natural hosts on the development of chrysoperla carnea (stephens) (neuroptera: chrysopidae) - a laboratory investigation

    International Nuclear Information System (INIS)

    Sarwar, M.; Ahmad, N.; Tofique, M.; Salam, A.

    2011-01-01

    Biology and feeding potential of the predator, Chrysoperla carnea (Stephens) (Neuroptera: Chrysopidae) were studied on different hosts with particular reference to cotton crop. Various hosts viz., aphids (nymphs/ adults) and the eggs of cotton bollworms were used for the rearing of C. carnea and compared with the factitious host, Angoumois grain moth (Sitotroga cerealella) eggs on which the culture of the predator is maintained for the last many generations at the laboratory. The studies indicated that larval and pupal durations of the predator were significantly affected by the change of the hosts and the total developmental period was significantly shorter when the predator was offered with aphids for feeding. The fecundity, fertility, pupation, hatch ability and longevity of the predator were also higher on aphids followed by pink bollworm, spotted bollworm, Angoumois grain moth and American bollworm eggs. However, the sex ratio was not affected due to change in the type of hosts. An identical trend in all the observed parameters was recorded in parental and first filial generations on all the tested hosts. Based on the studies, aphids appeared to be the most promising host for mass rearing of the predator. Further, successful predation on the cotton bollworm eggs manifested the potential of C. carnea for the management of cotton bollworms in the field. (author)

  3. Spacing Identity

    DEFF Research Database (Denmark)

    Stang Våland, Marianne; Georg, Susse

    2018-01-01

    In this paper, we analyze how architectural design, and the spatial and material changes this involves, contributes to the continuous shaping of identities in an organization. Based upon a case study of organizational and architectural change in a municipal administration at a time of major public...... sector reforms, we examine how design interventions were used to (re)form work and professional relationships. The paper examines how engagements with spatial arrangements and material artifacts affected people’s sense of both occupational and organizational identity. Taking a relational approach...... to sociomateriality, the paper contributes to the further theorizing of space in organization studies by proposing the concept of spacing identity to capture the fluidity of identity performance....

  4. The effects of host, geographic origin, and gender on the thermal requirements of Diaphorina citri (Hemiptera: Psyllidae).

    Science.gov (United States)

    Nava, Dori E; Gomez-Torres, Mariuxi L; Rodrigues, Marjorie D; Bento, José M S; Haddad, Marinéia L; Parra, José R P

    2010-04-01

    Diaphorina citri Kuwayama (Hemiptera: Psyllidae) is the vector of the bacteria that causes citrus greening and is considered one of the world's most important citrus diseases. We examined how host, geographic region, and gender affect the thermal requirements of D. citri. The insects were reared in climatic chambers at constant temperatures of 18, 20, 22, 25, 28, 30, and 32 +/- 1 degrees C, 70 +/- 10% RH, and a 14 h photophase. Host plants for D. citri included orange (Citrus sinensis [Rutaceae]) varieties Pêra and Natal, the rootstock, Rungpur lime (C. limonia [Rutaceae]) and the natural host, Orange jessamine (Murraya paniculata [Rutaceae]). To study the influence of geographic origin on thermal requirements, we studied D. citri populations from Piracicaba, SP (warmer region) and Itapetininga, SP (cooler region). The duration and survival of the development stages and the duration of the total development (egg-adult) did not differ significantly on the different hosts, but it did vary with temperature. Nymphs of D. citri created on the different hosts have the same thermal requirements. The thermal requirements for this species collected from the two climate regions were identical; males and females also had the same thermal requirements.

  5. Perspectives on Sexual Identity Formation, Identity Practices, and Identity Transitions Among Men Who Have Sex With Men in India.

    Science.gov (United States)

    Tomori, Cecilia; Srikrishnan, Aylur K; Ridgeway, Kathleen; Solomon, Sunil S; Mehta, Shruti H; Solomon, Suniti; Celentano, David D

    2018-01-01

    Men who have sex with men (MSM) remain at high risk for HIV infection. Culturally specific sexual identities, encompassing sexual roles, behavior, and appearance, may shape MSM's experiences of stigmatization and discrimination, and affect their vulnerability to HIV. This multi-site qualitative study (n = 363) encompassing 31 focus group discussions (FGDs) and 121 in-depth interviews (IDIs) across 15 sites in India investigated sexual identity formation, identity practices, and transitions and their implications for HIV prevention. IDIs and FGDs were transcribed, translated, and underwent thematic analysis. Our findings document heterogeneous sexual identity formation, with MSM who have more gender nonconforming behaviors or appearance reporting greater family- and community-level disapproval, harassment, violence, and exclusion. Concealing feminine aspects of sexual identities was important in daily life, especially for married MSM. Some participants negotiated their identity practices in accordance with socioeconomic and cultural pressures, including taking on identity characteristics to suit consumer demand in sex work and on extended periods of joining communities of hijras (sometimes called TG or transgender women). Participants also reported that some MSM transition toward more feminine and hijra or transgender women identities, motivated by intersecting desires for feminine gender expression and by social exclusion and economic marginalization. Future studies should collect information on gender nonconformity stigma, and any changes in sexual identity practices or plans for transitions to other identities over time, in relation to HIV risk behaviors and outcomes.

  6. Greenberger-Horne-Zeilinger state protocols for fully connected qubit networks

    International Nuclear Information System (INIS)

    Galiautdinov, Andrei; Coffey, Mark W.; Deiotte, Ron

    2009-01-01

    We generalize the recently proposed Greenberger-Horne-Zeilinger tripartite protocol [A. Galiautdinov and J. M. Martinis, Phys. Rev. A 78, 010305(R) (2008)] to fully connected networks of weakly coupled qubits interacting by way of anisotropic Heisenberg exchange g(XX+YY)+g-tildeZZ. Our model differs from the more familiar Ising-Heisenberg chain in that here every qubit interacts with every other qubit in the circuit. The assumption of identical couplings on all qubit pairs allows an elegant proof of the protocol for arbitrary N. In order to further make contact with experiment, we study fidelity degradation due to coupling imperfections by numerically simulating the N=3 and 4 cases. Our simulations indicate that the best fidelity at unequal couplings is achieved when (a) the system is initially prepared in the uniform superposition state (similarly to how it is done in the ideal case) and (b) the entangling time and the final rotations on each of the qubits are appropriately adjusted.

  7. The Use of Personal Identity Numbers in Sweden and Denmark: A Barrier to Union Citizens' Enjoyment of Free Movement Rights?

    DEFF Research Database (Denmark)

    Hyltén-Cavallius, Katarina

    2015-01-01

    The paper of Katarina Hyltén-Cavallius focuses on personal identity numbers in Sweden and Denmark. This paper looks into formal and informal structures, which organise society in a host member state and which can make it difficult for a non-national Union citizen to, in practice, access public an...

  8. Identity Presentation: The Construction of Identity in Asynchronous Discussion

    Directory of Open Access Journals (Sweden)

    Brian Morgan

    2008-08-01

    Full Text Available This study examines the use of e-mail as a tool for long term discussion between teachers and grade six students. E-mail messages between grade six students and teachers were collected over the course of one academic year. Methods of conversation analysis within a framework of social practice are used to examine the data. While identity is more readily constructed and more fully developed in contexts which allow for physical embodiment such as face-to-face discussion, this analysis found that identity can be constructed in a context that does not provide for the physical embodiment of identity: Identity was constructed using the social, cultural, and technological tools provided and supported by e-mail to develop social practices germane to the e-mail discussion. This study has implications for further understanding the relation between identity, goals, constraints and affordances, and the collaborative creation of social practices in asynchronous computer mediated communication. URN: urn:nbn:de:0114-fqs0803185

  9. Introduced ascidians harbor highly diverse and host-specific symbiotic microbial assemblages.

    Science.gov (United States)

    Evans, James S; Erwin, Patrick M; Shenkar, Noa; López-Legentil, Susanna

    2017-09-08

    Many ascidian species have experienced worldwide introductions, exhibiting remarkable success in crossing geographic borders and adapting to local environmental conditions. To investigate the potential role of microbial symbionts in these introductions, we examined the microbial communities of three ascidian species common in North Carolina harbors. Replicate samples of the globally introduced species Distaplia bermudensis, Polyandrocarpa anguinea, and P. zorritensis (n = 5), and ambient seawater (n = 4), were collected in Wrightsville Beach, NC. Microbial communities were characterized by next-generation (Illumina) sequencing of partial (V4) 16S rRNA gene sequences. Ascidians hosted diverse symbiont communities, consisting of 5,696 unique microbial OTUs (at 97% sequenced identity) from 47 bacterial and three archaeal phyla. Permutational multivariate analyses of variance revealed clear differentiation of ascidian symbionts compared to seawater bacterioplankton, and distinct microbial communities inhabiting each ascidian species. 103 universal core OTUs (present in all ascidian replicates) were identified, including taxa previously described in marine invertebrate microbiomes with possible links to ammonia-oxidization, denitrification, pathogenesis, and heavy-metal processing. These results suggest ascidian microbial symbionts exhibit a high degree of host-specificity, forming intimate associations that may contribute to host adaptation to new environments via expanded tolerance thresholds and enhanced holobiont function.

  10. Do we need 3D tube current modulation information for accurate organ dosimetry in chest CT? Protocols dose comparisons

    Energy Technology Data Exchange (ETDEWEB)

    Lopez-Rendon, Xochitl; Develter, Wim [KU Leuven, Department of Imaging and Pathology, Division of Medical Physics and Quality Assessment, Leuven (Belgium); Zhang, Guozhi; Coudyzer, Walter; Zanca, Federica [University Hospitals of the KU Leuven, Department of Radiology, Leuven (Belgium); Bosmans, Hilde [KU Leuven, Department of Imaging and Pathology, Division of Medical Physics and Quality Assessment, Leuven (Belgium); University Hospitals of the KU Leuven, Department of Radiology, Leuven (Belgium)

    2017-11-15

    To compare the lung and breast dose associated with three chest protocols: standard, organ-based tube current modulation (OBTCM) and fast-speed scanning; and to estimate the error associated with organ dose when modelling the longitudinal (z-) TCM versus the 3D-TCM in Monte Carlo simulations (MC) for these three protocols. Five adult and three paediatric cadavers with different BMI were scanned. The CTDI{sub vol} of the OBTCM and the fast-speed protocols were matched to the patient-specific CTDI{sub vol} of the standard protocol. Lung and breast doses were estimated using MC with both z- and 3D-TCM simulated and compared between protocols. The fast-speed scanning protocol delivered the highest doses. A slight reduction for breast dose (up to 5.1%) was observed for two of the three female cadavers with the OBTCM in comparison to the standard. For both adult and paediatric, the implementation of the z-TCM data only for organ dose estimation resulted in 10.0% accuracy for the standard and fast-speed protocols, while relative dose differences were up to 15.3% for the OBTCM protocol. At identical CTDI{sub vol} values, the standard protocol delivered the lowest overall doses. Only for the OBTCM protocol is the 3D-TCM needed if an accurate (<10.0%) organ dosimetry is desired. (orig.)

  11. Identity Styles and Religiosity: Examining the Role of Identity Commitment

    Science.gov (United States)

    Grajales, Tevni E.; Sommers, Brittany

    2016-01-01

    This study observed the role of identity styles, identity commitment, and identity statuses in predicting religiosity in a sample of undergraduate students attending a Seventh-day Adventist university (N = 138). Two structural models were evaluated via path analysis. Results revealed two strong models for the prediction of religiosity. Identity…

  12. A protocol for chemical mutagenesis in Strongyloides ratti.

    Science.gov (United States)

    Guo, Li; Chang, Zisong; Dieterich, Christoph; Streit, Adrian

    2015-11-01

    Genetic analysis using experimentally induced mutations has been a most valuable tool in the analysis of various organisms. However, genetic analysis of endoparasitic organisms tends to be difficult because of the limited accessibility of the sexually reproducing adults, which are normally located within the host. Nematodes of the genera Strogyloides and Parastrongyloides represent an exception to this because they can form facultative free-living sexually reproducing generations in between parasitic generations. Here we present a protocol for the chemical mutagenesis of Strongyloides ratti. Further we evaluate the feasibility of identifying the induced mutations by whole genome re-sequencing. Copyright © 2015 Elsevier Inc. All rights reserved.

  13. Protocols for the delivery of small molecules to the two-spotted spider mite, Tetranychus urticae.

    Directory of Open Access Journals (Sweden)

    Takeshi Suzuki

    Full Text Available The two-spotted spider mite, Tetranychus urticae, is a chelicerate herbivore with an extremely wide host range and an extraordinary ability to develop pesticide resistance. Due to its responsiveness to natural and synthetic xenobiotics, the spider mite is becoming a prime pest herbivore model for studies of the evolution of host range, plant-herbivore interactions and mechanisms of xenobiotic resistance. The spider mite genome has been sequenced and its transcriptional responses to developmental and various biotic and abiotic cues have been documented. However, to identify biological and evolutionary roles of T. urticae genes and proteins, it is necessary to develop methods for the efficient manipulation of mite gene function or protein activity. Here, we describe protocols developed for the delivery of small molecules into spider mites. Starting with mite maintenance and the preparation of the experimental mite populations of developmentally synchronized larvae and adults, we describe 3 methods for delivery of small molecules including artificial diet, leaf coating, and soaking. The presented results define critical steps in these methods and demonstrate that they can successfully deliver tracer dyes into mites. Described protocols provide guidelines for high-throughput setups for delivery of experimental compounds that could be used in reverse genetics platforms to modulate gene expression or protein activity, or for screens focused on discovery of new molecules for mite control. In addition, described protocols could be adapted for other Tetranychidae and related species of economic importance such as Varroa, dust and poultry mites.

  14. Political, religious and occupational identities in context: placing identity status paradigm in context.

    Science.gov (United States)

    Solomontos-Kountouri, Olga; Hurry, Jane

    2008-04-01

    This study critically contrasts global identity with domain-specific identities (political, religious and occupational) and considers context and gender as integral parts of identity. In a cross-sectional survey, 1038 Greek Cypriot adolescents (449 boys and 589 girls, mean age 16.8) from the three different types of secondary schools (state, state technical and private) and from different SES completed part of the Extended Objective Measure of Ego Identity Status-2 (EOMEIS-2). The macro-context of Greek Cypriot society is used to understand the role of context in adolescents' identities. Results showed that Greek Cypriot young people were not in the same statuses across their global, political, religious and occupational identities. This heterogeneity in the status of global identity and of each identity domain is partially explained by differences in gender, type of school and SES (socio-economic status). The fact that identity status is found to be reactive to context suggests that developmental stage models of identity status should place greater emphasis on context.

  15. Design and Analysis of an Enhanced Patient-Server Mutual Authentication Protocol for Telecare Medical Information System.

    Science.gov (United States)

    Amin, Ruhul; Islam, S K Hafizul; Biswas, G P; Khan, Muhammad Khurram; Obaidat, Mohammad S

    2015-11-01

    In order to access remote medical server, generally the patients utilize smart card to login to the server. It has been observed that most of the user (patient) authentication protocols suffer from smart card stolen attack that means the attacker can mount several common attacks after extracting smart card information. Recently, Lu et al.'s proposes a session key agreement protocol between the patient and remote medical server and claims that the same protocol is secure against relevant security attacks. However, this paper presents several security attacks on Lu et al.'s protocol such as identity trace attack, new smart card issue attack, patient impersonation attack and medical server impersonation attack. In order to fix the mentioned security pitfalls including smart card stolen attack, this paper proposes an efficient remote mutual authentication protocol using smart card. We have then simulated the proposed protocol using widely-accepted AVISPA simulation tool whose results make certain that the same protocol is secure against active and passive attacks including replay and man-in-the-middle attacks. Moreover, the rigorous security analysis proves that the proposed protocol provides strong security protection on the relevant security attacks including smart card stolen attack. We compare the proposed scheme with several related schemes in terms of computation cost and communication cost as well as security functionalities. It has been observed that the proposed scheme is comparatively better than related existing schemes.

  16. Strain diversity and host specificity in a specialized gut symbiont of honeybees and bumblebees.

    Science.gov (United States)

    Powell, Elijah; Ratnayeke, Nalin; Moran, Nancy A

    2016-09-01

    Host-restricted lineages of gut bacteria often include many closely related strains, but this fine-scale diversity is rarely investigated. The specialized gut symbiont Snodgrassella alvi has codiversified with honeybees (Apis mellifera) and bumblebees (Bombus) for millions of years. Snodgrassella alvi strains are nearly identical for 16S rRNA gene sequences but have distinct gene repertoires potentially affecting host biology and community interactions. We examined S. alvi strain diversity within and between hosts using deep sequencing both of a single-copy coding gene (minD) and of the V4 region of the 16S rRNA gene. We sampled workers from domestic and feral A. mellifera colonies and wild-caught Bombus representing 14 species. Conventional analyses of community profiles, based on the V4 region of the 16S rRNA gene, failed to expose most strain variation. In contrast, the minD analysis revealed extensive strain variation within and between host species and individuals. Snodgrassella alvi strain diversity is significantly higher in A. mellifera than in Bombus, supporting the hypothesis that colony founding by swarms of workers enables retention of more diversity than colony founding by a single queen. Most Bombus individuals (72%) are dominated by a single S. alvi strain, whereas most A. mellifera (86%) possess multiple strains. No S. alvi strains are shared between A. mellifera and Bombus, indicating some host specificity. Among Bombus-restricted strains, some are restricted to a single host species or subgenus, while others occur in multiple subgenera. Findings demonstrate that strains diversify both within and between host species and can be highly specific or relatively generalized in their host associations. © 2016 John Wiley & Sons Ltd.

  17. Poxvirus Host Range Genes and Virus-Host Spectrum: A Critical Review.

    Science.gov (United States)

    Oliveira, Graziele Pereira; Rodrigues, Rodrigo Araújo Lima; Lima, Maurício Teixeira; Drumond, Betânia Paiva; Abrahão, Jônatas Santos

    2017-11-07

    The Poxviridae family is comprised of double-stranded DNA viruses belonging to nucleocytoplasmic large DNA viruses (NCLDV). Among the NCLDV, poxviruses exhibit the widest known host range, which is likely observed because this viral family has been more heavily investigated. However, relative to each member of the Poxviridae family, the spectrum of the host is variable, where certain viruses can infect a large range of hosts, while others are restricted to only one host species. It has been suggested that the variability in host spectrum among poxviruses is linked with the presence or absence of some host range genes. Would it be possible to extrapolate the restriction of viral replication in a specific cell lineage to an animal, a far more complex organism? In this study, we compare and discuss the relationship between the host range of poxvirus species and the abundance/diversity of host range genes. We analyzed the sequences of 38 previously identified and putative homologs of poxvirus host range genes, and updated these data with deposited sequences of new poxvirus genomes. Overall, the term host range genes might not be the most appropriate for these genes, since no correlation between them and the viruses' host spectrum was observed, and a change in nomenclature should be considered. Finally, we analyzed the evolutionary history of these genes, and reaffirmed the occurrence of horizontal gene transfer (HGT) for certain elements, as previously suggested. Considering the data presented in this study, it is not possible to associate the diversity of host range factors with the amount of hosts of known poxviruses, and this traditional nomenclature creates misunderstandings.

  18. Poxvirus Host Range Genes and Virus–Host Spectrum: A Critical Review

    Science.gov (United States)

    Oliveira, Graziele Pereira; Rodrigues, Rodrigo Araújo Lima; Lima, Maurício Teixeira; Drumond, Betânia Paiva; Abrahão, Jônatas Santos

    2017-01-01

    The Poxviridae family is comprised of double-stranded DNA viruses belonging to nucleocytoplasmic large DNA viruses (NCLDV). Among the NCLDV, poxviruses exhibit the widest known host range, which is likely observed because this viral family has been more heavily investigated. However, relative to each member of the Poxviridae family, the spectrum of the host is variable, where certain viruses can infect a large range of hosts, while others are restricted to only one host species. It has been suggested that the variability in host spectrum among poxviruses is linked with the presence or absence of some host range genes. Would it be possible to extrapolate the restriction of viral replication in a specific cell lineage to an animal, a far more complex organism? In this study, we compare and discuss the relationship between the host range of poxvirus species and the abundance/diversity of host range genes. We analyzed the sequences of 38 previously identified and putative homologs of poxvirus host range genes, and updated these data with deposited sequences of new poxvirus genomes. Overall, the term host range genes might not be the most appropriate for these genes, since no correlation between them and the viruses’ host spectrum was observed, and a change in nomenclature should be considered. Finally, we analyzed the evolutionary history of these genes, and reaffirmed the occurrence of horizontal gene transfer (HGT) for certain elements, as previously suggested. Considering the data presented in this study, it is not possible to associate the diversity of host range factors with the amount of hosts of known poxviruses, and this traditional nomenclature creates misunderstandings. PMID:29112165

  19. Parties at the convention of the United Nations on climatic change and second meeting of the parties to the Kyoto protocol; Parties a la convention-cadre des Nations-Unies sur les changements climatiques et seconde reunion des parties au Protocole de Kyoto

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2006-07-01

    Kenya hosted the second meeting of the Parties to the Kyoto Protocol in conjunction with the twelfth session of the conference of the Parties to the climatic change convention, in Nairobi from 6 to 17 November 2006. This document presents in a first part the key areas discussed at Nairobi; in a second part the international framework with the consequences of the Kyoto protocol implementation; and in the last part the demonstrable progresses of the France in the policy effects, tendencies concerning the greenhouse gases and the respect of the commitments. (A.L.B.)

  20. The role of herbivore- and plant-related experiences in intraspecific host preference of a relatively specialized parasitoid.

    Science.gov (United States)

    Morawo, Tolulope; Fadamiro, Henry

    2017-09-06

    Parasitoids use odor cues from infested plants and herbivore hosts to locate their hosts. Specialist parasitoids of generalist herbivores are predicted to rely more on herbivore-derived cues than plant-derived cues. Microplitis croceipes (Cresson) (Hymenoptera: Braconidae) is a relatively specialized larval endoparasitoid of Heliothis virescens (F.) (Lepidoptera: Noctuidae), which is a generalist herbivore on several crops including cotton and soybean. Using M. croceipes/H. virescens as a model system, we tested the following predictions about specialist parasitoids of generalist herbivores: (i) naive parasitoids will show innate responses to herbivore-emitted kairomones, regardless of host plant identity and (ii) herbivore-related experience will have a greater influence on intraspecific oviposition preference than plant-related experience. Inexperienced (naive) female M. croceipes did not discriminate between cotton-fed and soybean-fed H. virescens in oviposition choice tests, supporting our first prediction. Oviposition experience alone with either host group influenced subsequent oviposition preference while experience with infested plants alone did not elicit preference in M. croceipes, supporting our second prediction. Furthermore, associative learning of oviposition with host-damaged plants facilitated host location. Interestingly, naive parasitoids attacked more soybean-fed than cotton-fed host larvae in two-choice tests when a background of host-infested cotton odor was supplied, and vice versa. This suggests that plant volatiles may have created an olfactory contrast effect. We discussed ecological significance of the results and concluded that both plant- and herbivore-related experiences play important role in parasitoid host foraging. © 2017 Institute of Zoology, Chinese Academy of Sciences.

  1. Maculosin, a host-specific phytotoxin for spotted knapweed from Alternaria alternata

    Science.gov (United States)

    Stierle, Andrea C.; Cardellina, John H.; Strobel, Gary A.

    1988-01-01

    Several diketopiperazines have been isolated from liquid cultures of Alternaria alternata, the causal agent of black leaf blight of spotted knapweed, Centaurea maculosa Lam. One of these compounds, maculosin [the diketopiperazine cyclo(-L-Pro-L-Tyr-)], was active in the nicked-leaf bioassay at 10-5 M; synthetic maculosin possessed chemical and biological activities identical to those of the natural product. Other diketopiperazines isolated from the fungus possessed either less activity or none at all. In tests against 19 plant species, maculosin was phytotoxic only to spotted knapweed. Thus maculosin is a host-specific phytotoxin from a weed pathogen. PMID:16593989

  2. Identities as organizational practices

    DEFF Research Database (Denmark)

    Oshima, Sae; Asmuß, Birte

    Identity has been widely acknowledged as playing a central role in various organizational processes, yet there is still a need to better understand the dynamics and functions of identity work in modern organizations. The present paper is centered within this concern, and examines identity......) reveal the intersubjective, multimodal and embodied nature of identity work; 2) demonstrate identity work as organizational practices, used in order to accomplish specific actions; and 3) pose a question on the view on identity as a layered/leveled phenomenon....

  3. Mobile Identity Management

    NARCIS (Netherlands)

    Hoepman, J.J.

    2011-01-01

    Identity management consists of the processes and all underlying technologies for the creation, management, and usage of digital identities. Business rely on identity management systems to simplify the management of access rights to their systems and services for both their employees and their

  4. Host reproductive phenology drives seasonal patterns of host use in mosquitoes.

    Directory of Open Access Journals (Sweden)

    Nathan D Burkett-Cadena

    2011-03-01

    Full Text Available Seasonal shifts in host use by mosquitoes from birds to mammals drive the timing and intensity of annual epidemics of mosquito-borne viruses, such as West Nile virus, in North America. The biological mechanism underlying these shifts has been a matter of debate, with hypotheses falling into two camps: (1 the shift is driven by changes in host abundance, or (2 the shift is driven by seasonal changes in the foraging behavior of mosquitoes. Here we explored the idea that seasonal changes in host use by mosquitoes are driven by temporal patterns of host reproduction. We investigated the relationship between seasonal patterns of host use by mosquitoes and host reproductive phenology by examining a seven-year dataset of blood meal identifications from a site in Tuskegee National Forest, Alabama USA and data on reproduction from the most commonly utilized endothermic (white-tailed deer, great blue heron, yellow-crowned night heron and ectothermic (frogs hosts. Our analysis revealed that feeding on each host peaked during periods of reproductive activity. Specifically, mosquitoes utilized herons in the spring and early summer, during periods of peak nest occupancy, whereas deer were fed upon most during the late summer and fall, the period corresponding to the peak in births for deer. For frogs, however, feeding on early- and late-season breeders paralleled peaks in male vocalization. We demonstrate for the first time that seasonal patterns of host use by mosquitoes track the reproductive phenology of the hosts. Peaks in relative mosquito feeding on each host during reproductive phases are likely the result of increased tolerance and decreased vigilance to attacking mosquitoes by nestlings and brooding adults (avian hosts, quiescent young (avian and mammalian hosts, and mate-seeking males (frogs.

  5. Identity Management

    CERN Document Server

    Pace, A

    2008-01-01

    This paper introduces identity management concepts and discusses various issues associated with its implementation. It will try to highlight technical, legal, and social aspects that must been foreseen when defining the numerous processes that an identity management infrastructure must support. Grid interoperability as well as cross platform interoperability is addressed on the technical aspect, followed by a short discussion on social consequences on user’s privacy when completed traceability is enforced and some examples on how identity management has been implemented at CERN

  6. Identity management

    International Nuclear Information System (INIS)

    Pace, A

    2008-01-01

    This paper introduces identity management concepts and discusses various issues associated with their implementation. It will try to highlight technical, legal, and social aspects that must been foreseen when defining the numerous processes that an identity management infrastructure must support. Grid interoperability as well as cross platform interoperability is addressed on the technical aspect, followed by a short discussion on social consequences on user's privacy when completed traceability is enforced. The paper will finally give some examples on how identity management has been implemented at CERN

  7. Taxonomy and Analysis of IP Micro-Mobility Protocols in Single and Simultaneous Movements Scenarios

    Directory of Open Access Journals (Sweden)

    G. De Marco

    2007-01-01

    Full Text Available The micro-mobility is an important aspect in mobile communications, where the applications are anywhere and used anytime. One of the problems of micro-mobility is the hand-off latency. In this paper, we analyse two solutions for IP micro-mobility by means of a general taxonomy. The first one is based on the Stream Control Transmission Protocol (SCTP, which allows the dynamic address configuration of an association. The second one is based on the Session Initiation Protocol (SIP, which is the most popular protocol for multimedia communications over IP networks. We show that for the SCTP solution, there is room for further optimisations of the hand-off latency by adding slight changes to the protocol. However, as full end-to-end solution, SCTP is not able to handle simultaneous movement of hosts, whose probability in general cannot be neglected. On the other hand, the SIP can handle both single and simultaneous movements cases, although the hand-off latency can increase with respect to the SCTP solution. We show that for a correct and fast hand-off, the SIP server should be statefull.

  8. Identity management

    Energy Technology Data Exchange (ETDEWEB)

    Pace, A [CERN, Geneva (Switzerland)

    2008-07-01

    This paper introduces identity management concepts and discusses various issues associated with their implementation. It will try to highlight technical, legal, and social aspects that must been foreseen when defining the numerous processes that an identity management infrastructure must support. Grid interoperability as well as cross platform interoperability is addressed on the technical aspect, followed by a short discussion on social consequences on user's privacy when completed traceability is enforced. The paper will finally give some examples on how identity management has been implemented at CERN.

  9. Asian American Adolescent Identity

    OpenAIRE

    Ohm, Julie Juhye

    1999-01-01

    The formation of ego identity in Asian American late adolescents attending Virginia Tech was examined within the frameworks of Erikson's psychosocial theory and Berry, Trimble, and Olmedo's model of acculturation. Ego identity was measured using the Achieved sub-scale of the Revised Version of the Extended Objective Measure of Ego Identity Status, an instrument based on the theoretical constructs of Erikson. Ethnic identity was measured using the Multigroup Ethnic Identity Measure and America...

  10. Trophic relationships between the parasitic plant species Phelipanche ramosa (L. and different hosts depending on host phenological stage and host growth rate

    Directory of Open Access Journals (Sweden)

    Delphine Moreau

    2016-07-01

    Full Text Available Phelipanche ramosa (L. Pomel (branched broomrape is a holoparasitic plant that reproduces on crops and also on weeds, which contributes to increase the parasite seed bank in fields. This parasite extracts all its nutrients at the host's expense so that host-parasite trophic relationships are crucial to determine host and parasite growth. This study quantified the intensity with which P. ramosa draws assimilates from its host and analyzed whether it varied with host species, host phenological stage and host growth rate. A greenhouse experiment was conducted on three host species: the crop species Brassica napus (L. (oilseed rape and two weed species, Capsella bursa-pastoris (L. Medik. and Geranium dissectum (L.. Plants were grown with or without P. ramosa and under three light levels to modulate host growth rate. The proportion of host biomass loss due to parasitism by P. ramosa differed between host species (at host fructification, biomass loss ranged from 34% to 84%. Brassica napus and C. bursa-pastoris displayed a similar response to P. ramosa, probably because they belong to the same botanical family. The sensitivity to P. ramosa in each host species could be related to the precocity of P. ramosa development on them. Host compartments could be ranked as a function of their sensitivity to parasitism, with the reproductive compartment being the most severely affected, followed by stems and roots. The proportion of biomass allocated to leaves was not reduced by parasitism. The proportion of pathosystem biomass allocated to the parasite depended on host species. It generally increased with host stage progression but was constant across light induced-host growth rate, showing that P. ramosa adapts its growth to host biomass production. The rank order of host species in terms of sink strength differed from that in terms of host sensitivity. Finally, for B. napus, the biomass of individual parasite shoots decreased with increasing their number per

  11. Plasticity in host utilization by two host-associated populations of Aphis gossypii Glover.

    Science.gov (United States)

    Barman, A K; Gadhave, K R; Dutta, B; Srinivasan, R

    2018-06-01

    Biological and morphological plasticity in polyphagous insect herbivores allow them to exploit diverse host plant species. Geographical differences in resource availability can lead to preferential host exploitation and result in inconsistent host specialization. Biological and molecular data provide insights into specialization and plasticity of such herbivore populations. In agricultural landscapes, Aphis gossypii encounters several crop and non-crop hosts, which exist in temporal and spatial proximity. We investigated the host-specialization of two A. gossypii host-associated populations (HAPs), which were field collected from cotton and squash (cotton-associated population and melon-associated population), and later maintained separately in the greenhouse. The two aphid populations were exposed to seven plant species (cotton, okra, watermelon, squash, cucumber, pigweed, and morning glory), and evaluated for their host utilization plasticity by estimating aphid's fitness parameters (nymphal period, adult period, fecundity, and intrinsic rate of increase). Four phenotypical characters (body length, head capsule width, hind tibia length and cornicle length) were also measured from the resulting 14 different HAP × host plant combinations. Phylogenetic analysis of mitochondrial COI sequences showed no genetic variation between the two HAPs. Fitness parameters indicated a significant variation between the two aphid populations, and the variation was influenced by host plants. The performance of melon-aphids was poor (up to 89% reduction in fecundity) on malvaceous hosts, cotton and okra. However, cotton-aphids performed better on cucurbitaceous hosts, squash and watermelon (up to 66% increased fecundity) compared with the natal host, cotton. Both HAPs were able to reproduce on two weed hosts. Cotton-aphids were smaller than melon-aphids irrespective of their host plants. Results from this study suggest that the two HAPs in the study area do not have strict host

  12. The constitution of marginalized identity in Signs of identity by Juan Goytisolo

    Directory of Open Access Journals (Sweden)

    Jelica Veljović

    2014-12-01

    Full Text Available The main objective of the article is to investigate the modes of constitution of a marginalized and exiled identity in the novel Signs of identity by Juan Goytisolo. It is categorised as a “testimony and postwar novel”, and the subjects’ constant search of themselves, of their Self and all the elements that constitute their identity is central to the work. The novel is set in the postwar socio-historical period and the protagonist – Alvaro Mendiola – searches for his identity in his childhood memories and family pictures, but also amongst all the Others whose life stories intertwine with his journey of identification. Tracing his line of identity formation, we found three different routes: the first through the genealogical records, the second through the concept of Otherness and the last one through love. We find Identity as a kaleidoscope containing all the Others who served as moulds for his Identity, yet leaving it undefined and incomplete. Therefore, the identity of an exiled and marginalized individual is always in flux, continually reinitiating the constitution of the Self that had been eradicated from its first and formative imagery: the family and the fatherland.

  13. Human identity versus gender identity: The perception of sexual addiction among Iranian women.

    Science.gov (United States)

    Moshtagh, Mozhgan; Mirlashari, Jila; Rafiey, Hassan; Azin, Ali; Farnam, Robert

    2017-07-01

    This qualitative study was conducted to explore the images of personal identity from the perspective of women with sexual addiction. The data required for the study were collected through 31 in-depth interviews. Sensing a threat to personal identity, dissatisfaction with gender identity, dissociation with the continuum of identity, and identity reconstruction in response to threat were four of the experiences that were common among women with sexual addiction. Painful emotional experiences appear to have created a sense of gender and sexual conflict or weakness in these women and thus threatened their personal identity and led to their sexual addiction.

  14. Organizational Identity

    DEFF Research Database (Denmark)

    Hatch, Mary Jo; Schultz, Majken

    This text presents the classic works on organizational identity alongside more current thinking on the issues. Ranging from theoretical contributions to empirical studies, the readings in this volume address the key issues of organizational identity, and show how these issues have developed through...

  15. Graft irradiation abrogates graft-versus-host disease in combined pancreas-spleen transplantation

    International Nuclear Information System (INIS)

    Schulak, J.A.; Sharp, W.J.

    1986-01-01

    A model of combined pancreas-spleen transplantation (PST) was studied in LBN F1 recipients of Lewis grafts in order to evaluate the efficacy of pretransplant graft irradiation in preventing lethal graft-versus-host disease (GVHD). Recipients of unmodified PST uniformly developed severe GVHD and died (MST = 16.7 +/- 3.8 days). Whole body donor irradiation with either 500 or 250 rad prevented lethal GVHD. Similarly, ex vivo graft irradiation with either 1000 or 500 rad also resulted in normal weight gain, graft function, and host survival for the 6-week study period. Conversely, delay of graft irradiation until 3 days after transplantation failed to prevent this complication (MST = 15.8 +/- 3.7 days). Recipients of irradiated grafts displayed glucose tolerance tests that were identical to those in the control group indicating that the doses of radiation employed in these experiments were not deleterious to islet function. Irradiated spleen grafts appeared histologically normal at 6 weeks after transplantation. Cells derived from these grafts failed to stimulate lymph node enlargement in a popliteal lymph node assay for GVHD, suggesting that these spleens may have become repopulated with host cells. These experiments confirm that PST has the potential to cause lethal GVHD and suggest that pretransplant graft irradiation may be used to prevent its occurrence

  16. Identities in Harmony: Gender-Work Identity Integration Moderates Frame Switching in Cognitive Processing

    Science.gov (United States)

    Sacharin, Vera; Lee, Fiona; Gonzalez, Richard

    2009-01-01

    Professional women's identity integration--the perceived compatibility between work and gender identities--plays a role in how task or relationship information is processed. Seventy female business school students were primed with either their professional or their gender identity. Business women with higher identity integration showed an…

  17. Corporate Brand Identity in SMEs

    DEFF Research Database (Denmark)

    Mäläskä, Minna; Jones, Richard Ian

    Purpose: To study the emergence of corporate brand identity in SMEs and to develop a typology of brand identity drivers that reflects a co-creative approach to the emergence of brand identity. Design / Methodology / Approach : Existing approaches to brand identity are summarised. A narrative...... studies. The research is important since it suggests an iterative and co-creative approach to brand identity. A typology of brand identity formation for SMEs is presented: entrepreneur driven, market driven, stakeholder driven. Practical implications: The three paths to creating a strong brand identity...... challenge existing notions that brand identity is based solely on the values of the entrepreneur. This typology suggests that SMEs should be open to creating an identity that draws from their stakeholder eco-system. Originality / value: this research challenges the existing assumption that brand identity...

  18. Host and parasite morphology influence congruence between host and parasite phylogenies.

    Science.gov (United States)

    Sweet, Andrew D; Bush, Sarah E; Gustafsson, Daniel R; Allen, Julie M; DiBlasi, Emily; Skeen, Heather R; Weckstein, Jason D; Johnson, Kevin P

    2018-03-23

    Comparisons of host and parasite phylogenies often show varying degrees of phylogenetic congruence. However, few studies have rigorously explored the factors driving this variation. Multiple factors such as host or parasite morphology may govern the degree of phylogenetic congruence. An ideal analysis for understanding the factors correlated with congruence would focus on a diverse host-parasite system for increased variation and statistical power. In this study, we focused on the Brueelia-complex, a diverse and widespread group of feather lice that primarily parasitise songbirds. We generated a molecular phylogeny of the lice and compared this tree with a phylogeny of their avian hosts. We also tested for the contribution of each host-parasite association to the overall congruence. The two trees overall were significantly congruent, but the contribution of individual associations to this congruence varied. To understand this variation, we developed a novel approach to test whether host, parasite or biogeographic factors were statistically associated with patterns of congruence. Both host plumage dimorphism and parasite ecomorphology were associated with patterns of congruence, whereas host body size, other plumage traits and biogeography were not. Our results lay the framework for future studies to further elucidate how these factors influence the process of host-parasite coevolution. Copyright © 2018 Australian Society for Parasitology. Published by Elsevier Ltd. All rights reserved.

  19. HostPhinder: A Phage Host Prediction Tool

    DEFF Research Database (Denmark)

    Villarroel, Julia; Kleinheinz, Kortine Annina; Jurtz, Vanessa Isabell

    2016-01-01

    The current dramatic increase of antibiotic resistant bacteria has revitalised the interest in bacteriophages as alternative antibacterial treatment. Meanwhile, the development of bioinformatics methods for analysing genomic data places high-throughput approaches for phage characterization within...... bacterial hosts. HostPhinder is available as an interactive web service [1] and as a stand alone download from the Docker registry [2]....

  20. Electronic identity

    CERN Document Server

    de Andrade, Norberto Nuno Gomes; Argles, David

    2014-01-01

    With the increasing availability of electronic services, security and a reliable means by which identity is verified is essential.Written by Norberto Andrade the first chapter of this book provides an overview of the main legal and regulatory aspects regarding electronic identity in Europe and assesses the importance of electronic identity for administration (public), business (private) and, above all, citizens. It also highlights the role of eID as a key enabler of the economy.In the second chapter Lisha Chen-Wilson, David Argles, Michele Schiano di Zenise and Gary Wills discuss the user-cent

  1. Thinking identity differently: dynamics of identity in self and institutional boundary

    Science.gov (United States)

    Albrecht, Nancy J.; Fortney, Brian S.

    2011-03-01

    In research oriented universities, research and teaching are often viewed as separate. Aydeniz and Hodge present one professor's struggles to synthesize an identity from three different spaces, each with competing values and core beliefs. As Mr. G's story unfolds, and he reflects upon his negotiation between teaching and research responsibilities, we seek to expand the discussion by presenting a caution to identity researchers. The caution pertains to construction of understanding on how identities are created, and the role that individual stories take in how identities are created and enacted. In this forum contribution, we present several questions in the hopes of furthering the discussion on identity research, and our understanding of the conceptualization of institutional boundaries and objectivity, as well as questions on participant involvement in the process of research.

  2. Trophic Relationships between the Parasitic Plant Species Phelipanche ramosa (L.) and Different Hosts Depending on Host Phenological Stage and Host Growth Rate

    Science.gov (United States)

    Moreau, Delphine; Gibot-Leclerc, Stéphanie; Girardin, Annette; Pointurier, Olivia; Reibel, Carole; Strbik, Florence; Fernández-Aparicio, Mónica; Colbach, Nathalie

    2016-01-01

    Phelipanche ramosa (L.) Pomel (branched broomrape) is a holoparasitic plant that reproduces on crops and also on weeds, which contributes to increase the parasite seed bank in fields. This parasite extracts all its nutrients at the host’s expense so that host–parasite trophic relationships are crucial to determine host and parasite growth. This study quantified the intensity with which P. ramosa draws assimilates from its host and analyzed whether it varied with host species, host phenological stage and host growth rate. A greenhouse experiment was conducted on three host species: the crop species Brassica napus (L.) (oilseed rape) and two weed species, Capsella bursa-pastoris (L.) Medik. and Geranium dissectum (L.). Plants were grown with or without P. ramosa and under three light levels to modulate host growth rate. The proportion of host biomass loss due to parasitism by P. ramosa differed between host species (at host fructification, biomass loss ranged from 34 to 84%). B. napus and C. bursa-pastoris displayed a similar response to P. ramosa, probably because they belong to the same botanical family. The sensitivity to P. ramosa in each host species could be related to the precocity of P. ramosa development on them. Host compartments could be ranked as a function of their sensitivity to parasitism, with the reproductive compartment being the most severely affected, followed by stems and roots. The proportion of biomass allocated to leaves was not reduced by parasitism. The proportion of pathosystem biomass allocated to the parasite depended on host species. It generally increased with host stage progression but was constant across light induced-host growth rate, showing that P. ramosa adapts its growth to host biomass production. The rank order of host species in terms of sink strength differed from that in terms of host sensitivity. Finally, for B. napus, the biomass of individual parasite shoots decreased with increasing their number per host plant

  3. Multicultural identity processes.

    Science.gov (United States)

    Hong, Ying-Yi; Zhan, Siran; Morris, Michael W; Benet-Martínez, Verónica

    2016-04-01

    The study of multicultural identity has gained prominence in recent decades and will be even more urgent as the mobility of individuals and social groups becomes the 'new normal'. This paper reviews the state-of-the-art theoretical advancements and empirical discoveries of multicultural identity processes at the intrapersonal, interpersonal, and collective (e.g., organizational, societal) levels. First, biculturalism has more benefits for individuals' psychological and sociocultural adjustment than monoculturalism. Bicultural individuals' racial essentialist beliefs and Bicultural Identity Integration affect cultural frame switching, racial categorization, and creativity. Second, identity denial and identity-based discrimination by other people or groups threaten multicultural individuals' psychological health and performance. Third, multiculturalism and interculturalism policies are associated with different conceptions of and attitudes toward diversity, and have distinct outcomes for multicultural individuals and societies. Copyright © 2015 Elsevier Ltd. All rights reserved.

  4. Social Identity in People with Multiple Sclerosis: An Examination of Family Identity and Mood.

    Science.gov (United States)

    Barker, Alex B; Lincoln, Nadina B; Hunt, Nigel; dasNair, Roshan

    2018-01-01

    Mood disorders are highly prevalent in people with multiple sclerosis (MS). MS causes changes to a person's sense of self. The Social Identity Model of Identity Change posits that group membership can have a positive effect on mood during identity change. The family is a social group implicated in adjustment to MS. The objectives of this study were to investigate whether family identity can predict mood in people with MS and to test whether this prediction was mediated by social support and connectedness to others. This cross-sectional survey of 195 participants comprised measures of family identity, family social support, connectedness to others, and mood. Family identity predicted mood both directly and indirectly through parallel mediators of family social support and connectedness to others. Family identity predicted mood as posited by the Social Identity Model of Identity Change. Involving the family in adjustment to MS could reduce low mood.

  5. Effects of triclosan on host response and microbial biomarkers during experimental gingivitis.

    Science.gov (United States)

    Pancer, Brooke A; Kott, Diana; Sugai, James V; Panagakos, Fotinos S; Braun, Thomas M; Teles, Ricardo P; Giannobile, William V; Kinney, Janet S

    2016-05-01

    This exploratory randomized, controlled clinical trial sought to evaluate anti-inflammatory and -microbial effects of triclosan during experimental gingivitis as assessed by host response biomarkers and biofilm microbial pathogens. Thirty participants were randomized to triclosan or control dentifrice groups who ceased homecare for 21 days in an experimental gingivitis (EG) protocol. Plaque and gingival indices and saliva, plaque, and gingival crevicular fluid (GCF) were assessed/collected at days 0, 14, 21 and 35. Levels and proportions of 40 bacterial species from plaque samples were determined using checkerboard DNA-DNA hybridization. Ten biomarkers associated with inflammation, matrix degradation, and host protection were measured from GCF and saliva and analysed using a multiplex array. Participants were stratified as "high" or "low" responders based on gingival index and GCF biomarkers and bacterial biofilm were combined to generate receiver operating characteristic curves and predict gingivitis susceptibility. No differences in mean PI and GI values were observed between groups and non-significant trends of reduction of host response biomarkers with triclosan treatment. Triclosan significantly reduced levels of A. actinomycetemcomitans and P. gingivalis during induction of gingivitis. Triclosan reduced microbial levels during gingivitis development (ClinicalTrials.gov NCT01799226). © 2016 John Wiley & Sons A/S. Published by John Wiley & Sons Ltd.

  6. Identity-specific motivation: How distinct identities direct self-regulation across distinct situations.

    Science.gov (United States)

    Browman, Alexander S; Destin, Mesmin; Molden, Daniel C

    2017-12-01

    Research on self-regulation has traditionally emphasized that people's thoughts and actions are guided by either (a) domain-general motivations that emerge from a cumulative history of life experiences, or (b) situation-specific motivations that emerge in immediate response to the incentives present in a particular context. However, more recent studies have illustrated the importance of understanding the interplay between such domain-general and situation-specific motivations across the types of contexts people regularly encounter. The present research, therefore, expands existing perspectives on self-regulation by investigating how people's identities -the internalized roles, relationships, and social group memberships that define who they are-systemically guide when and how different domain-general motivations are activated within specific types of situations. Using the motivational framework described by regulatory focus theory (Higgins, 1997), Studies 1 and 2 demonstrate that people indeed have distinct, identity-specific motivations that uniquely influence their current self-regulation when such identities are active. Studies 3-5 then begin to explore how identity-specific motivations are situated within people's larger self-concept. Studies 3a and 3b demonstrate that the less compatible people's specific identities, the more distinct are the motivations connected to those identities. Studies 4-5 then provide some initial, suggestive evidence that identity-specific motivations are not a separate, superordinate feature of people's identities that then alter how they pursue any subordinate, identity-relevant traits, but instead that such motivations emerge from the cumulative motivational significance of the subordinate traits to which the identities themselves become attached. Implications for understanding the role of the self-concept in self-regulation are discussed. (PsycINFO Database Record (c) 2017 APA, all rights reserved).

  7. Ability of a Generalist Seed Beetle to Colonize an Exotic Host: Effects of Host Plant Origin and Oviposition Host.

    Science.gov (United States)

    Amarillo-Suárez, A; Repizo, A; Robles, J; Diaz, J; Bustamante, S

    2017-08-01

    The colonization of an exotic species by native herbivores is more likely to occur if that herbivore is a generalist. There is little information on the life-history mechanisms used by native generalist insects to colonize exotic hosts and how these mechanisms are affected by host properties. We examined the ability of the generalist seed beetle Stator limbatus Horn to colonize an exotic species. We compared its host preference, acceptability, performance, and egg size when ovipositing and developing on two native (Pithecellobium dulce (Roxb.) Benth and Senegalia riparia (Kunth)) and one exotic legume species (Leucaena leucocephala (Lam.)). We also analyzed the seed chemistry. We found that females recognize the exotic species as an unfavorable host for larval development and that they delayed oviposition and laid fewer and larger eggs on the exotic species than on the native species. Survivorship on the exotic host was 0%. Additionally, seeds of the native species contain five chemical compounds that are absent in the exotic species, and the exotic species contains three sterols, which are absent in the native legumes. Genetically based differences between beetles adapted to different hosts, plastic responses toward new hosts, and chemical differences among seeds are important in host colonization and recognition of the exotic host. In conclusion, the generalist nature of S. limbatus does not influence its ability to colonize L. leucocephala. Explanations for the colonization of exotic hosts by generalist native species and for the success of invasive species must be complemented with studies measuring local adaptation and plasticity.

  8. Memory transfer for emotionally valenced words between identities in dissociative identity disorder.

    Science.gov (United States)

    Huntjens, Rafaële J C; Peters, Madelon L; Woertman, Liesbeth; van der Hart, Onno; Postma, Albert

    2007-04-01

    The present study aimed to determine interidentity retrieval of emotionally valenced words in dissociative identity disorder (DID). Twenty-two DID patients participated together with 25 normal controls and 25 controls instructed to simulate DID. Two wordlists A and B were constructed including neutral, positive and negative material. List A was shown to one identity, while list B was shown to another identity claiming total amnesia for the words learned by the first identity. The identity claiming amnesia was tested for intrusions from list A words into the recall of words from list B and recognition of the words learned by both identities. Test results indicated no evidence of total interidentity amnesia for emotionally valenced material in DID. It is argued that dissociative amnesia in DID may more adequately be described as a disturbance in meta-memory functioning instead of an actual retrieval inability.

  9. Protocol Implementation Generator

    DEFF Research Database (Denmark)

    Carvalho Quaresma, Jose Nuno; Probst, Christian W.

    2010-01-01

    Users expect communication systems to guarantee, amongst others, privacy and integrity of their data. These can be ensured by using well-established protocols; the best protocol, however, is useless if not all parties involved in a communication have a correct implementation of the protocol and a...... Generator framework based on the LySatool and a translator from the LySa language into C or Java....... necessary tools. In this paper, we present the Protocol Implementation Generator (PiG), a framework that can be used to add protocol generation to protocol negotiation, or to easily share and implement new protocols throughout a network. PiG enables the sharing, verification, and translation...

  10. IL-6, Antioxidant Capacity and Muscle Damage Markers Following High-Intensity Interval Training Protocols.

    Science.gov (United States)

    Cipryan, Lukas

    2017-02-01

    The aim of this study was to investigate changes of interleukin-6 (IL-6), total antioxidant capacity (TAC) and muscle damage markers (creatine kinase (CK), myoglobin and lactate dehydrogenase (LDH)) in response to three different high-intensity interval training (HIIT) protocols of identical external work. Twelve moderately-trained males participated in the three HIIT trials which consisted of a warm-up, followed by 12 min of 15 s, 30 s or 60 s HIIT sequences with the work/rest ratio 1. The biochemical markers of inflammation, oxidative stress and muscle damage were analysed POST, 3 h and 24 h after the exercise. All HIIT protocols caused an immediate increase in IL-6, TAC, CK, myoglobin and LDH. The most pronounced between-trials differences were found for the POST-exercise changes in IL-6 (Effect size ± 90% confidence interval: 1.51 ± 0.63, 0.84 ± 0.34 and 1.80 ± 0.60 for the 15s/15s, 30s/30s and 60s/60s protocol, respectively) and myoglobin (1.11 ± 0.29, 0.45 ± 0.48 and 1.09 ± 0.22 for the 15s/15s, 30s/30s and 60s/60s protocol, respectively). There were no substantial between-trial differences in other biochemical variables. In conclusion, the 15s/15s and 60s/60s protocols might be preferred to the 30s/30s protocols in order to maximize the training stimulus.

  11. Ritual Identity

    NARCIS (Netherlands)

    van der Beek, Suzanne

    2017-01-01

    Rituals are often used as opportunities for self-reflection and identity construction. The Camino to Santiago de Compostela, which has become a singularly popular pilgrimage since the late 1980s, is an example of a ritual that is explicitly used to gain a deeper understanding of one’s identity

  12. Brand Identity.

    Science.gov (United States)

    Lawlor, John

    1998-01-01

    Instead of differentiating themselves by building "brand identities," colleges and universities often focus on competing with price. As a result, fewer and fewer institutions base their identities on value, the combination of quality and price. Methods of building two concepts to influence customers' brand image and brand loyalty are…

  13. Transfer of newly acquired stimulus valence between identities in dissociative identity disorder (DID).

    Science.gov (United States)

    Huntjens, Rafaële J C; Peters, Madelon L; Postma, Albert; Woertman, Liesbeth; Effting, Marieke; van der Hart, Onno

    2005-02-01

    Patients with Dissociative Identity Disorder (DID) frequently report episodes of interidentity amnesia, that is amnesia for events experienced by other identities. The goal of the present experiment was to test the implicit transfer of trauma-related information between identities in DID. We hypothesized that whereas declarative information may transfer from one identity to another, the emotional connotation of the memory may be dissociated, especially in the case of negative, trauma-related emotional valence. An evaluative conditioning procedure was combined with an affective priming procedure, both performed by different identities. In the evaluative conditioning procedure, previously neutral stimuli come to refer to a negative or positive connotation. The affective priming procedure was used to test the transfer of this acquired valence to an identity reporting interidentity amnesia. Results indicated activation of stimulus valence in the affective priming task, that is transfer of emotional material between identities.

  14. Vertical Protocol Composition

    DEFF Research Database (Denmark)

    Groß, Thomas; Mödersheim, Sebastian Alexander

    2011-01-01

    The security of key exchange and secure channel protocols, such as TLS, has been studied intensively. However, only few works have considered what happens when the established keys are actually used—to run some protocol securely over the established “channel”. We call this a vertical protocol.......e., that the combination cannot introduce attacks that the individual protocols in isolation do not have. In this work, we prove a composability result in the symbolic model that allows for arbitrary vertical composition (including self-composition). It holds for protocols from any suite of channel and application...

  15. Challenging Identities

    DEFF Research Database (Denmark)

    Identity is a keyword in a number of academic fields as well as in public debate and in politics. During the last decades, references to identity have proliferated, yet there is no simple definition available that corresponds to the use of the notion in all contexts. The significance of the notion...

  16. Men as victims: "victim" identities, gay identities, and masculinities.

    Science.gov (United States)

    Dunn, Peter

    2012-11-01

    The impact and meanings of homophobic violence on gay men's identities are explored with a particular focus on their identities as men and as gay men. Homosexuality can pose a challenge to conventional masculinities, and for some gay men, being victimized on account of sexual orientation reawakens conflicts about their masculinity that they thought they had resolved. Being victimized can reinvoke shame that is rooted in failure or unwillingness to uphold masculine norms. For some gay men, victimization therefore has connotations of nonmasculinity that make being a victim an undesirable status, yet that status must be claimed to obtain a response from criminal justice or victim services. Men who experience homophobic abuse are helped by accepting a victim identity, but only if they can quickly move on from it by reconstructing a masculine gay (nonvictim) identity. This process can be facilitated by agencies such as the police and victim services, provided they help men exercise agency in "fighting back," that is, resisting further victimization and recovering.

  17. Entrepreneurship Education as Identity Workspace

    DEFF Research Database (Denmark)

    Frederiksen, Signe Hedeboe

    2016-01-01

    Entrepreneurship education theory and practice show increasing interest in identity work as an important part of entrepreneurial learning. Entrepreneurship programs become identity workspaces where pedagogical designs stimulate entrepreneurial identity work and support individuals’ discovery...... of themselves as entrepreneurs. This article investigates how entrepreneurship education is practiced as an identity workspace, when reflective identity work is turned into a pedagogical strategy for entrepreneurial learning. I present empirical data from a qualitative fieldstudy in an eleven week mandatory...... and identities. Exposed to identity work practices in class, learners experienced conflicting demands participating as succesful students and participating as potential entrepreneurs. The study draws attention to how an education setting contextualises identity work as a social practice. It critisises...

  18. Parties at the convention of the United Nations on climatic change and second meeting of the parties to the Kyoto protocol

    International Nuclear Information System (INIS)

    2006-01-01

    Kenya hosted the second meeting of the Parties to the Kyoto Protocol in conjunction with the twelfth session of the conference of the Parties to the climatic change convention, in Nairobi from 6 to 17 November 2006. This document presents in a first part the key areas discussed at Nairobi; in a second part the international framework with the consequences of the Kyoto protocol implementation; and in the last part the demonstrable progresses of the France in the policy effects, tendencies concerning the greenhouse gases and the respect of the commitments. (A.L.B.)

  19. Comparison of Greenhouse Gas Offset Quantification Protocols for Nitrogen Management in Dryland Wheat Cropping Systems of the Pacific Northwest

    Directory of Open Access Journals (Sweden)

    Tabitha T. Brown

    2017-11-01

    Full Text Available In the carbon market, greenhouse gas (GHG offset protocols need to ensure that emission reductions are of high quality, quantifiable, and real. Lack of consistency across protocols for quantifying emission reductions compromise the credibility of offsets generated. Thus, protocol quantification methodologies need to be periodically reviewed to ensure emission offsets are credited accurately and updated to support practical climate policy solutions. Current GHG emission offset credits generated by agricultural nitrogen (N management activities are based on reducing the annual N fertilizer application rate for a given crop without reducing yield. We performed a “road test” of agricultural N management protocols to evaluate differences among protocol components and quantify nitrous oxide (N2O emission reductions under sample projects relevant to N management in dryland, wheat-based cropping systems of the inland Pacific Northwest (iPNW. We evaluated five agricultural N management offset protocols applicable to North America: two methodologies of American Carbon Registry (ACR1 and ACR2, Verified Carbon Standard (VCS, Climate Action Reserve (CAR, and Alberta Offset Credit System (Alberta. We found that only two protocols, ACR2 and VCS, were suitable for this study, in which four sample projects were developed representing feasible N fertilizer rate reduction activities. The ACR2 and VCS protocols had identical baseline and project emission quantification methodologies resulting in identical emission reduction values. Reducing N fertilizer application rate by switching to variable rate N (sample projects 1–3 or split N application (sample project 4 management resulted in a N2O emission reduction ranging from 0.07 to 0.16, and 0.26 Mg CO2e ha−1, respectively. Across the range of C prices considered ($5, $10, and $50 per metric ton of CO2 equivalent, we concluded that the N2O emission offset payment alone ($0.35–$13.0 ha−1 was unlikely to

  20. Development of a greenhouse-based inoculation protocol for the fungus Colletotrichum cereale pathogenic to annual bluegrass (Poa annua

    Directory of Open Access Journals (Sweden)

    Lisa A. Beirn

    2015-08-01

    Full Text Available The fungus Colletotrichum cereale incites anthracnose disease on Poa annua (annual bluegrass turfgrass. Anthracnose disease is geographically widespread throughout the world and highly destructive to cool-season turfgrasses, with infections by C. cereale resulting in extensive turf loss. Comprehensive research aimed at controlling turfgrass anthracnose has been performed in the field, but knowledge of the causal organism and its basic biology is still needed. In particular, the lack of a reliable greenhouse-based inoculation protocol performed under controlled environmental conditions is an obstacle to the study of C. cereale and anthracnose disease. Our objective was to develop a consistent and reproducible inoculation protocol for the two major genetic lineages of C. cereale. By adapting previously successful field-based protocols and combining with components of existing inoculation procedures, the method we developed consistently produced C. cereale infection on two susceptible P. annua biotypes. Approximately 7 to 10 days post-inoculation, plants exhibited chlorosis and thinning consistent with anthracnose disease symptomology. Morphological inspection of inoculated plants revealed visual signs of the fungus (appressoria and acervuli, although acervuli were not always present. After stringent surface sterilization of inoculated host tissue, C. cereale was consistently re-isolated from symptomatic tissue. Real-time PCR detection analysis based on the Apn2 marker confirmed the presence of the pathogen in host tissue, with both lineages of C. cereale detected from all inoculated plants. When a humidifier was not used, no infection developed for any biotypes or fungal isolates tested. The inoculation protocol described here marks significant progress for in planta studies of C. cereale, and will enable scientifically reproducible investigations of the biology, infectivity and lifestyle of this important grass pathogen.

  1. Cryptanalysis of quantum broadcast communication and authentication protocol with a one-time pad

    International Nuclear Information System (INIS)

    Cao Ya; Gao Fei

    2016-01-01

    Chang et al . [ Chin. Phys. B 23 010305 (2014)] have proposed a quantum broadcast communication and authentication protocol. However, we find that an intercept-resend attack can be preformed successfully by a potential eavesdropper, who will be able to destroy the authentication function. Afterwards, he or she can acquire the secret transmitted message or even modify it while escaping detection, by implementing an efficient man-in-the-middle attack. Furthermore, we show a simple scheme to defend this attack, that is, applying non-reusable identity strings. (paper)

  2. BRANDING AND IDENTITY BUILDING FOR A SMALL COMPANY : Focused on Visual Identity

    OpenAIRE

    Näveri, Mattea

    2015-01-01

    The topic of this thesis is branding and identity of a small business, with a focus on visual identity. The major part of this thesis focuses on the research done on visual identity and the basic ideation of branding. The other half specifically focuses on the visual identity, the creation of a logo for the company, defining typography and colour and ephemera, and particularly, the company’s business card. The main goal was to execute a unique, individualized branding, which showcases...

  3. Fatty acid-producing hosts

    Science.gov (United States)

    Pfleger, Brian F; Lennen, Rebecca M

    2013-12-31

    Described are hosts for overproducing a fatty acid product such as a fatty acid. The hosts include an exogenous nucleic acid encoding a thioesterase and, optionally, an exogenous nucleic acid encoding an acetyl-CoA carboxylase, wherein an acyl-CoA synthetase in the hosts are functionally delected. The hosts prefereably include the nucleic acid encoding the thioesterase at an intermediate copy number. The hosts are preferably recominantly stable and growth-competent at 37.degree. C. Methods of producing a fatty acid product comprising culturing such hosts at 37.degree. C. are also described.

  4. Efficient red, green, blue and white organic light-emitting diodes with same exciplex host

    Science.gov (United States)

    Chang, Chih-Hao; Wu, Szu-Wei; Huang, Chih-Wei; Hsieh, Chung-Tsung; Lin, Sung-En; Chen, Nien-Po; Chang, Hsin-Hua

    2016-03-01

    Recently, exciplex had drawn attention because of its potential for efficient electroluminescence or for use as a host in organic light-emitting diodes (OLEDs). In this study, four kinds of hole transport material/electron transport material combinations were examined to verify the formation of exciplex and the corresponding energy bandgaps. We successfully demonstrated that the combination of tris(4-carbazoyl-9-ylphenyl)amine (TCTA) and 3,5,3‧,5‧-tetra(m-pyrid-3-yl)phenyl[1,1‧]biphenyl (BP4mPy) could form a stable exciplex emission with an adequate energy gap. Using exciplex as a host in red, green, and blue phosphorescent OLEDs with an identical trilayer architecture enabled effective energy transfer from exciplex to emitters, achieving corresponding efficiencies of 8.8, 14.1, and 15.8%. A maximum efficiency of 11.3% and stable emission was obtained in white OLEDs.

  5. Exploring medical identity theft.

    Science.gov (United States)

    Mancilla, Desla; Moczygemba, Jackie

    2009-09-16

    The crime of medical identity theft is a growing concern in healthcare institutions. A mixed-method study design including a two-stage electronic survey, telephone survey follow-up, and on-site observations was used to evaluate current practices in admitting and registration departments to reduce the occurrence of medical identity theft. Survey participants were chief compliance officers in acute healthcare organizations and members of the Health Care Compliance Association. Study results indicate variance in whether or how patient identity is confirmed in healthcare settings. The findings of this study suggest that information systems need to be designed for more efficient identity management. Admitting and registration staff must be trained, and compliance with medical identity theft policies and procedures must be monitored. Finally, biometric identity management solutions should be considered for stronger patient identification verification.

  6. Quality or quantity: is nutrient transfer driven more by symbiont identity and productivity than by symbiont abundance?

    Science.gov (United States)

    Freeman, Christopher J; Thacker, Robert W; Baker, David M; Fogel, Marilyn L

    2013-06-01

    By forming symbiotic interactions with microbes, many animals and plants gain access to the products of novel metabolic pathways. We investigated the transfer of symbiont-derived carbon and nitrogen to the sponges Aplysina cauliformis, Aplysina fulva, Chondrilla caribensis, Neopetrosia subtriangularis and Xestospongia bocatorensis, all of which host abundant microbial populations, and Niphates erecta, which hosts a sparse symbiont community. We incubated sponges in light and dark bottles containing seawater spiked with (13)C- and (15)N-enriched inorganic compounds and then measured (13)C and (15)N enrichment in the microbial (nutrient assimilation) and sponge (nutrient transfer) fractions. Surprisingly, although most sponges hosting abundant microbial communities were more enriched in (13)C than N. erecta, only N. subtriangularis was more enriched in (15)N than N. erecta. Although photosymbiont abundance varied substantially across species, (13)C and (15)N enrichment was not significantly correlated with photosymbiont abundance. Enrichment was significantly correlated with the ratio of gross productivity to respiration (P:R), which varied across host species and symbiont phylotype. Because irradiance impacts P:R ratios, we also incubated A. cauliformis in (13)C-enriched seawater under different irradiances to determine whether symbiont carbon fixation and transfer are dependent on irradiance. Carbon fixation and transfer to the sponge host occurred in all treatments, but was greatest at higher irradiances and was significantly correlated with P:R ratios. Taken together, these results demonstrate that nutrient transfer from microbial symbionts to host sponges is influenced more by host-symbiont identities and P:R ratios than by symbiont abundance.

  7. Media identities and media-influenced indentifications Visibility and identity recognition in the media

    Directory of Open Access Journals (Sweden)

    Víctor Fco. Sampedro Blanco

    2004-10-01

    Full Text Available The media establish, in large part, the patterns of visibility and public recognition of collective identities. We define media identities as those that are the object of production and diffusion by the media. From this discourse, the communities and individuals elaborate media-influenced identifications; that is, processes of recognition or banishment; (rearticulating the identity markers that the media offer with other cognitive and emotional sources. The generation and appropriation of the identities are subjected to a media hierarchisation that influences their normalisation or marginalisation. The identities presented by the media and assumed by the audience as part of the official, hegemonic discourse are normalised, whereas the identities and identifications formulated in popular and minority terms are marginalised. After presenting this conceptual and analytical framework, this study attempts to outline the logics that condition the presentation, on the one hand, andthe public recognition, on the other hand, of contemporary identities.

  8. Importance of host feeding for parasitoids that attack honeydew-producing hosts

    NARCIS (Netherlands)

    Burger, J.M.S.; Komany, A.; Lenteren, van J.C.; Vet, L.E.M.

    2005-01-01

    Insect parasitoids lay their eggs in arthropods. Some parasitoid species not only use their arthropod host for oviposition but also for feeding. Host feeding provides nutrients to the adult female parasitoid. However, in many species, host feeding destroys an opportunity to oviposit. For parasitoids

  9. Host selection by the pine processionary moth enhances larval performance: An experiment

    Science.gov (United States)

    Pérez-Contreras, Tomás; Soler, Juan J.; Soler, Manuel

    2014-02-01

    The development of a phytophagous insect depends on the nutritional characteristics of plants on which it feeds. Offspring from different females, however, may vary in their ability to develop in different host species and therefore females should place their eggs on host plants that result in the highest performance for the insect offspring. Causes underlying the predicted relationships between host selection and offspring performance may be: (1) a genetic association between larval ability to exploit particular hosts and the female insect's host preference; and (2) phenotypic plasticity of larvae that may be due to (a) maternal effects (e.g. differential investment in eggs) or (b) diet. In this work, we analyse the performance (i.e. hatching success and larval size and mortality) of the pine processionary (Thaumetopoea pityocampa) caterpillar developing in Aleppo (Pinus halepensis) or maritime (Pinus pinaster) pines. Larvae of this moth species do not move from the individual pine selected by the mother for oviposition. By means of cross-fostering experiments of eggs batches and silk nests of larvae between these two pine species, we explored whether phenotypic plasticity of offspring traits or genetic correlations between mother and offspring traits account for variation in developmental characteristics of caterpillars. Our results showed that females preferentially selected Aleppo pine for oviposition. Moreover, the offspring had the highest probability of survival and reached a larger body size in this pine species independently of whether or not batches were experimentally cross-fostered. Notably, the interaction between identity of donor and receiver pine species of larvae nests explained a significant proportion of variance of larval size and mortality, suggesting a role of diet-induced phenotypic plasticity of the hatchlings. These results suggest that both female selection of the more appropriate pine species and phenotypic plasticity of larva explain the

  10. Coming to an Asexual Identity: Negotiating Identity, Negotiating Desire.

    Science.gov (United States)

    Scherrer, Kristin S

    2008-10-01

    Sexuality is generally considered an important aspect of self-hood. Therefore, individuals who do not experience sexual attraction, and embrace an asexual identity are in a unique position to inform the social construction of sexuality. This study explores the experiences of asexual individuals utilizing open ended Internet survey data from 102 self-identified asexual people. In this paper I describe several distinct aspects of asexual identities: the meanings of sexual, and therefore, asexual behaviors, essentialist characterizations of asexuality, and lastly, interest in romance as a distinct dimension of sexuality. These findings have implications not only for asexual identities, but also for the connections of asexuality with other marginalized sexualities.

  11. IL-6, Antioxidant Capacity and Muscle Damage Markers Following High-Intensity Interval Training Protocols

    OpenAIRE

    Cipryan, Lukas

    2017-01-01

    Abstract The aim of this study was to investigate changes of interleukin-6 (IL-6), total antioxidant capacity (TAC) and muscle damage markers (creatine kinase (CK), myoglobin and lactate dehydrogenase (LDH)) in response to three different high-intensity interval training (HIIT) protocols of identical external work. Twelve moderately-trained males participated in the three HIIT trials which consisted of a warm-up, followed by 12 min of 15 s, 30 s or 60 s HIIT sequences with the work/rest ratio...

  12. Host response to biomaterials the impact of host response on biomaterial selection

    CERN Document Server

    Badylak, Stephen F

    2015-01-01

    Host Response to Biomaterials: The Impact of Host Response on Biomaterial Selection explains the various categories of biomaterials and their significance for clinical applications, focusing on the host response to each biomaterial. It is one of the first books to connect immunology and biomaterials with regard to host response. The text also explores the role of the immune system in host response, and covers the regulatory environment for biomaterials, along with the benefits of synthetic versus natural biomaterials, and the transition from simple to complex biomaterial solutions. Fiel

  13. Current outcome of HLA identical sibling versus unrelated donor transplants in severe aplastic anemia

    DEFF Research Database (Denmark)

    Bacigalupo, Andrea; Socié, Gerard; Hamladji, Rose Marie

    2015-01-01

    We have analyzed 1448 patients with acquired aplastic anemia grafted between 2005 and 2009, and compared outcome of identical sibling (n=940) versus unrelated donor (n=508) transplants. When compared to the latter, sibling transplants were less likely to be performed beyond 180 days from diagnosis.......04). In conclusion, in multivariate analysis, the outcome of unrelated donor transplants for acquired aplastic anemia, is currently not statistically inferior when compared to sibling transplants, although patients are at greater risk of acute and chronic graft-versus-host disease. The use of peripheral blood grafts...

  14. Confirmation of the identity of the type host of the louse Halipeurus fallacis (Phthiraptera: Philopteridae).

    Science.gov (United States)

    Palma, Ricardo L

    2018-04-09

    Alexander (1954: 489) recorded a petrel (Aves: Procellariiformes) captured alive on board a ship in the Indian Ocean by Mr W.W.A. Phillips who, after removing some lice, liberated it the following morning. Alexander (1954) identified that petrel as the species "Pterodroma aterrima Bonaparte", now placed in the genus Pseudobulweria. The lice were kept in the collection of the then British Museum (Natural History), now the Natural History Museum, London, England. Jouanin (1955) published a new species of petrel from the Indian Ocean as Bulweria fallax. Jouanin (1957: 19) discussed the identity of the petrel identified by Alexander (1954) as Pterodroma aterrima, stating that the descriptive data given by Alexander (1954) did not clearly fit either P. aterrima or B. fallax. However, considering the geographical coordinates where the bird was captured, Jouanin (1957) believed it was more likely Bulweria fallax.

  15. Genetic diversity of Ralstonia solanacearum strains from China assessed by PCR-based fingerprints to unravel host plant- and site-dependent distribution patterns.

    Science.gov (United States)

    Xue, Qing-Yun; Yin, Yan-Ni; Yang, Wei; Heuer, Holger; Prior, Philippe; Guo, Jian-Hua; Smalla, Kornelia

    2011-03-01

    Bacterial wilt caused by Ralstonia solanacearum is a serious threat to crop production in China. A collection of 319 R. solanacearum strains isolated from 14 different diseased host plants collected in 15 Chinese provinces was investigated by BOX fingerprints in order to test the influence of the site and the host plant on their genetic diversity. Phylotype, fliC-RFLP patterns and biovar were determined for all strains and the sequevar for 39 representative strains. The majority of strains belonged to the Asian phylotype I, shared identical fliC-RFLP patterns and were assigned to four biovars (bv3:123; bv4:162; bv5:3; and bv6:11). Twenty strains were phylotype II, assigned to biovar 2, and had distinct fliC-RFLP patterns. BOX-PCR fingerprints generated from the genomic DNA of each strain revealed a high diversity of the phylotype I strains, where 28 types of BOX fingerprints could be distinguished. While many BOX clusters comprised isolates from different provinces and several host plants, some groups contained isolates that were plant or site specific. All phylotype II isolates originating from 10 provinces belonged to sequevar 1 and displayed identical BOX patterns as the potato brown rot strains from various regions of the world. © 2011 Federation of European Microbiological Societies. Published by Blackwell Publishing Ltd. All rights reserved.

  16. Identity Support, Identity Devaluation, and Well-Being among Lesbians

    Science.gov (United States)

    Beals, Kristin P.; Peplau, Letitia Anne

    2005-01-01

    This research tested predictions about the association of identity support and identity devaluation with psychological well-being (self-esteem, life satisfaction, and depression). Lesbian women completed baseline surveys (N=42), then provided daily experience reports during a 2-week period (n=38), and completed a 2-month follow-up survey (n=34).…

  17. Racial Identity Attitudes and Ego Identity Statuses in Dominican and Puerto Rican College Students

    Science.gov (United States)

    Sanchez, Delida

    2013-01-01

    This study explored the relation between racial identity attitudes and ego identity statuses in 94 Dominican and Puerto Rican Latino college students in an urban public college setting. Simultaneous regression analyses were conducted to test the relation between racial identity attitudes and ego identity statuses, and findings indicated that…

  18. Bridging Identities

    Science.gov (United States)

    Deaux, Kay; Burke, Peter

    2010-01-01

    Sociology and psychology are no strangers in the theoretical world of self and identity. Early works by William James (1890), a psychologist, and George Herbert Mead (1934), a sociologist, are often taken as a starting point by investigators in both fields. In more recent years, with the development of a number of identity theories in both fields,…

  19. Components of Sexual Identity

    Science.gov (United States)

    Shively, Michael G.; DeCecco, John P.

    1977-01-01

    This paper examines the four components of sexual identity: biological sex, gender identity, social sex-role, and sexual orientation. Theories about the development of each component and how they combine and conflict to form the individual's sexual identity are discussed. (Author)

  20. Korean Adoptee Identity: Adoptive and Ethnic Identity Profiles of Adopted Korean Americans

    Science.gov (United States)

    Beaupre, Adam J.; Reichwald, Reed; Zhou, Xiang; Raleigh, Elizabeth; Lee, Richard M.

    2015-01-01

    Adopted Korean adolescents face the task of grappling with their identity as Koreans and coming to terms with their adoptive status. In order to explore these dual identities, the authors conducted a person-centered study of the identity profiles of 189 adopted Korean American adolescents. Using cluster analytic procedures, the study examined…

  1. Two different strategies of host manipulation allow parasites to persist in intermediate-definitive host systems

    NARCIS (Netherlands)

    Vries, de L.J.; Langevelde, van F.

    2018-01-01

    Trophically transmitted parasites start their development in an intermediate host, before they finish the development in their definitive host when the definitive host preys on the intermediate host. In intermediate-definitive host systems, two strategies of host manipulation have been evolved:

  2. Chemical similarity between historical and novel host plants promotes range and host expansion of the mountain pine beetle in a naïve host ecosystem.

    Science.gov (United States)

    Erbilgin, Nadir; Ma, Cary; Whitehouse, Caroline; Shan, Bin; Najar, Ahmed; Evenden, Maya

    2014-02-01

    Host plant secondary chemistry can have cascading impacts on host and range expansion of herbivorous insect populations. We investigated the role of host secondary compounds on pheromone production by the mountain pine beetle (Dendroctonus ponderosae) (MPB) and beetle attraction in response to a historical (lodgepole pine, Pinus contorta var. latifolia) and a novel (jack pine, Pinus banksiana) hosts, as pheromones regulate the host colonization process. Beetles emit the same pheromones from both hosts, but more trans-verbenol, the primary aggregation pheromone, was emitted by female beetles on the novel host. The phloem of the novel host contains more α-pinene, a secondary compound that is the precursor for trans-verbenol production in beetle, than the historical host. Beetle-induced emission of 3-carene, another secondary compound found in both hosts, was also higher from the novel host. Field tests showed that the addition of 3-carene to the pheromone mixture mimicking the aggregation pheromones produced from the two host species increased beetle capture. We conclude that chemical similarity between historical and novel hosts has facilitated host expansion of MPB in jack pine forests through the exploitation of common host secondary compounds for pheromone production and aggregation on the hosts. Furthermore, broods emerging from the novel host were larger in terms of body size. © 2013 The Authors. New Phytologist © 2013 New Phytologist Trust.

  3. Regional Commonalities and Regional Identities: Forging a Normative Understanding of Southeast Asian Identity

    Directory of Open Access Journals (Sweden)

    Gürol Baba

    2016-01-01

    Full Text Available In the last two decades, most of the IR academia’s attention on Southeast Asian regionalism utilised constructivism and/or realism and has focused on ASEAN and its derivatives. This article aims to skew this angle by elaborating a possible relationship between Asian values and a normative understanding of Southeast Asian identity. The major reason for this article’s focus on a normative interpretation is that a practical application of Southeast Asian identity is not very achievable due to various ethnic, cultural, political, territorial, and historical diversities. While the region is diverse, there are also a number of commonalities among its states. Asian values, from a Confucian perspective, account for some of these commonalities. By using constructivists’ claims on both the links between norms and identity and the dynamic interaction between values and norms, this article argues that Asian values could contribute to the development of Amitav Acharya’s widely cited normative/ideational format of Southeast Asian identity. The article takes ASEAN identity as a case study and aims to show why a normative identity is more achievable than a practical identity among Southeast Asians, and how Asian values might contribute to the creation of this shared identity.

  4. Graft patency after off-pump coronary artery bypass surgery is inferior even with identical heparinization protocols

    DEFF Research Database (Denmark)

    Houlind, Kim; Fenger-Grøn, Morten; Holme, Susanne J

    2014-01-01

    OBJECTIVE: To determine whether graft patency after on-pump and off-pump coronary artery bypass surgery is similar when performed using the same heparinization protocol. METHODS: In a randomized, controlled, multicenter trial, 900 patients more than 70 years of age received either on-pump or off......-pump coronary artery bypass surgery. Heparin was given to achieve an activated clotting time of 400 seconds before arteriotomy in both groups. After the procedure, protamine sulfate was given to revert the activated clotting time to less than 120 seconds. Coronary angiography was performed 6 months after...

  5. Social Identity Change: Shifts in Social Identity during Adolescence

    Science.gov (United States)

    Tanti, Chris; Stukas, Arthur A.; Halloran, Michael J.; Foddy, Margaret

    2011-01-01

    This study investigated the proposition that adolescence involves significant shifts in social identity as a function of changes in social context and cognitive style. Using an experimental design, we primed either peer or gender identity with a sample of 380 early- (12-13 years), mid- (15-16 years), and late-adolescents (18-20 years) and then…

  6. Inter-identity autobiographical amnesia in patients with dissociative identity disorder.

    Science.gov (United States)

    Huntjens, Rafaële J C; Verschuere, Bruno; McNally, Richard J

    2012-01-01

    A major symptom of Dissociative Identity Disorder (DID; formerly Multiple Personality Disorder) is dissociative amnesia, the inability to recall important personal information. Only two case studies have directly addressed autobiographical memory in DID. Both provided evidence suggestive of dissociative amnesia. The aim of the current study was to objectively assess transfer of autobiographical information between identities in a larger sample of DID patients. Using a concealed information task, we assessed recognition of autobiographical details in an amnesic identity. Eleven DID patients, 27 normal controls, and 23 controls simulating DID participated. Controls and simulators were matched to patients on age, education level, and type of autobiographical memory tested. Although patients subjectively reported amnesia for the autobiographical details included in the task, the results indicated transfer of information between identities. The results call for a revision of the DID definition. The amnesia criterion should be modified to emphasize its subjective nature.

  7. Co-extinction in a host-parasite network: identifying key hosts for network stability.

    Science.gov (United States)

    Dallas, Tad; Cornelius, Emily

    2015-08-17

    Parasites comprise a substantial portion of total biodiversity. Ultimately, this means that host extinction could result in many secondary extinctions of obligate parasites and potentially alter host-parasite network structure. Here, we examined a highly resolved fish-parasite network to determine key hosts responsible for maintaining parasite diversity and network structure (quantified here as nestedness and modularity). We evaluated four possible host extinction orders and compared the resulting co-extinction dynamics to random extinction simulations; including host removal based on estimated extinction risk, parasite species richness and host level contributions to nestedness and modularity. We found that all extinction orders, except the one based on realistic extinction risk, resulted in faster declines in parasite diversity and network structure relative to random biodiversity loss. Further, we determined species-level contributions to network structure were best predicted by parasite species richness and host family. Taken together, we demonstrate that a small proportion of hosts contribute substantially to network structure and that removal of these hosts results in rapid declines in parasite diversity and network structure. As network stability can potentially be inferred through measures of network structure, our findings may provide insight into species traits that confer stability.

  8. Collective Endeavors to Address Institutional Contradiction between Gender Identity and Occupational Identity

    DEFF Research Database (Denmark)

    Villeseche, Florence

    or leaders and their social identity as women. Accordingly, I here seek to answer the following question: what dilemmas arise from the collective institutional work performed by actors facing institutional contradiction between their occupational and gender identity, and how are those dilemmas addressed? I......Women’s presence in the labor market is one of the major institutional changes of the past century. However, in particular at higher hierarchical levels, gender equality still remains a distant objective. The ideal-type of the worker, manager or leader is this largely a masculine one, thus...... associating the related occupational identity to a masculine gender social identity. Thus, it can be argued that women in organizations can face an “institutional contradiction” between their occupation and their gender – i.e a perceived discordancy between their social occupational identity as managers...

  9. Being Tolerant about Identity?

    NARCIS (Netherlands)

    van Rooij, R.; Gutzmann, D.; Köpping, J.; Meier, C.

    2014-01-01

    Identity and identification are very important concepts in philosophy and logic. They are crucial for the analysis of quantification and for counting. According to some philosophers, many examples that are supposed to show that identity is contingent, in fact show that the notion of identity is

  10. Post-colonial identity in Greenland?

    DEFF Research Database (Denmark)

    Gad, Ulrik Pram

    2009-01-01

    could be furthered by bringing politics back in. Based on a discourse analysis of the Greenlandic debate on language, this paper makes three claims: First, the identity projects promoted in Greenland are based on an essentialist conception of identity. Secondly, Greenlandic identity discourse combines......In the gradual unravelling of Greenland’s colonial relationship to Denmark, an essentialist conceptualization of Greenlandic identity has played a significant role. However, both our scholarly understanding of post-colonial Greenlandic identity and the process towards independence for Greenland...... elements of traditional Inuit culture and elements of colonial modernity. Thirdly, monolingual Greenlanders are those with the most to gain from abandoning the dichotomy of essentialist identities. Strategically, the paper suggests a post-post-colonial Greenlandic identity as a means of avoiding...

  11. On the fundamentals of identity

    NARCIS (Netherlands)

    van der Gaag, Mandy

    Various new perspectives on identity have been introduced or have increased in popularity over the past two decades. These include identity as dynamic system (Kunnen & Bosma, 2001), a narrative approach to identity (McAdams, 2001), multi-dimensional models of identity formation (Luyckx et al., 2006;

  12. The genotypic structure of a multi-host bumblebee parasite suggests a role for ecological niche overlap.

    Directory of Open Access Journals (Sweden)

    Rahel M Salathé

    Full Text Available The genotypic structure of parasite populations is an important determinant of ecological and evolutionary dynamics of host-parasite interactions with consequences for pest management and disease control. Genotypic structure is especially interesting where multiple hosts co-exist and share parasites. We here analyze the natural genotypic distribution of Crithidia bombi, a trypanosomatid parasite of bumblebees (Bombus spp., in two ecologically different habitats over a time period of three years. Using an algorithm to reconstruct genotypes in cases of multiple infections, and combining these with directly identified genotypes from single infections, we find a striking diversity of infection for both data sets, with almost all multi-locus genotypes being unique, and are inferring that around half of the total infections are resulting from multiple strains. Our analyses further suggest a mixture of clonality and sexuality in natural populations of this parasite species. Finally, we ask whether parasite genotypes are associated with host species (the phylogenetic hypothesis or whether ecological factors (niche overlap in flower choice shape the distribution of parasite genotypes (the ecological hypothesis. Redundancy analysis demonstrates that in the region with relatively high parasite prevalence, both host species identity and niche overlap are equally important factors shaping the distribution of parasite strains, whereas in the region with lower parasite prevalence, niche overlap more strongly contributes to the distribution observed. Overall, our study underlines the importance of ecological factors in shaping the natural dynamics of host-parasite systems.

  13. Filtering SPAM in P2PSIP Communities with Web of Trust

    Science.gov (United States)

    Heikkilä, Juho; Gurtov, Andrei

    Spam is a dominant problem on email systems today. One of the reasons is the lack of infrastructure for security and trust. As Voice over IP (VoIP) communication becomes increasingly popular, proliferation of spam calls is only a matter of time. As SIP identity scheme is practically similar to email, those share the same threats. We utilized Host Identity Protocol (HIP) to provide basic security, such as end-to-end encryption. To provide call filtering, however, other tools are needed. In this paper, we suggest applying trust paths familiar from the PGP web of trust to prevent unwanted communication in P2PSIP communities.

  14. Methods for CT automatic exposure control protocol translation between scanner platforms.

    Science.gov (United States)

    McKenney, Sarah E; Seibert, J Anthony; Lamba, Ramit; Boone, John M

    2014-03-01

    quantitative metrics (volumetric CT dose index or measured image noise) is feasible. Protocol translation has a dependency on patient size, especially between the GE and Siemens systems. Translation schemes that preserve dose levels may not produce identical image quality. Copyright © 2014 American College of Radiology. Published by Elsevier Inc. All rights reserved.

  15. The effects of host-feeding on stability of discrete-time host-parasitoid population dynamic models.

    Science.gov (United States)

    Emerick, Brooks; Singh, Abhyudai

    2016-02-01

    Discrete-time models are the traditional approach for capturing population dynamics of a host-parasitoid system. Recent work has introduced a semi-discrete framework for obtaining model update functions that connect host-parasitoid population levels from year-to-year. In particular, this framework uses differential equations to describe the host-parasitoid interaction during the time of year when they come in contact, allowing specific behaviors to be mechanistically incorporated. We use the semi-discrete approach to study the effects of host-feeding, which occurs when a parasitoid consumes a potential host larva without ovipositing. We find that host-feeding by itself cannot stabilize the system, and both populations exhibit behavior similar to the Nicholson-Bailey model. However, when combined with stabilizing mechanisms such as density-dependent host mortality, host-feeding contracts the region of parameter space that allows for a stable host-parasitoid equilibrium. In contrast, when combined with a density-dependent parasitoid attack rate, host-feeding expands the non-zero equilibrium stability region. Our results show that host-feeding causes inefficiency in the parasitoid population, which yields a higher population of hosts per generation. This suggests that host-feeding may have limited long-term impact in terms of suppressing host levels for biological control applications. Copyright © 2015 Elsevier Inc. All rights reserved.

  16. Personal Identity in Enhancement

    Directory of Open Access Journals (Sweden)

    Jana Podroužková

    2015-09-01

    Full Text Available The aim of this paper is to introduce the concept of human enhancement, its methods and its relation to personal identity. Also several approaches to personal identity will be described. Transhumanism is a special think tank supporting human enhancement through modern technologies and some of its representatives claim, that even great changes to human organisms will not affect their personal identity. I will briefly describe the most important means of human enhancment and consider the problem of personal identity for each of them separately.

  17. Known and Unknown Identity

    DEFF Research Database (Denmark)

    Henze-Pedersen, Sofie

    This qualitative study investigates the relationship between openness and identity among 18 adoptees. Many studies have argued that a high degree of openness is important for the identity formation of adoptees. However, few studies have explored this relationship. Two types of openness...... (biographical knowledge and communicative openness) are used to categorise the empirical material, making it possible to illuminate how different types of openness influence identity. The findings suggest that there is no direct link between a high degree of openness and positive identity formation. Instead...

  18. Responses to professional identity threat: Identity management strategies in incident narratives of health care professionals.

    Science.gov (United States)

    van Os, Annemiek; de Gilder, Dick; van Dyck, Cathy; Groenewegen, Peter

    2015-01-01

    The purpose of this paper is to explore sensemaking of incidents by health care professionals through an analysis of the role of professional identity in narratives of incidents. Using insights from social identity theory, the authors argue that incidents may create a threat of professional identity, and that professionals make use of identity management strategies in response to this identity threat. The paper draws on a qualitative analysis of incident narratives in 14 semi-structured interviews with physicians, nurses, and residents at a Dutch specialist hospital. The authors used an existing framework of identity management strategies to categorize the narratives. The analysis yielded two main results. First, nurses and residents employed multiple types of identity management strategies simultaneously, which points to the possible benefit of combining different strategies. Second, physicians used the strategy of patronization of other professional groups, a specific form of downward comparison. The authors discuss the implications of the findings in terms of the impact of identity management strategies on the perpetuation of hierarchical differences in health care. The authors argue that efforts to manage incident handling may profit from considering social identity processes in sensemaking of incidents. This is the first study that systematically explores how health care professionals use identity management strategies to maintain a positive professional identity in the face of incidents. This study contributes to research on interdisciplinary cooperation in health care.

  19. Neuroimaging in dementia and Alzheimer's disease: Current protocols and practice in the Republic of Ireland

    International Nuclear Information System (INIS)

    Kelly, I.; Butler, M.-L.; Ciblis, A.; McNulty, J.P.

    2016-01-01

    Introduction: Neuroimaging plays an essential supportive role in the diagnosis of dementia, assisting in establishing the dementia subtype(s). This has significant value in both treatment and care decisions and has important implications for prognosis. This study aims to explore the development and nature of neuroimaging protocols currently used in the assessment of dementia and Alzheimer's disease (AD). Methods: An online questionnaire was designed and distributed to lead radiography personnel working in computed tomography (CT), magnetic resonance imaging (MRI) and positron emission tomography (PET) departments (n = 94) in both hospital-based and out-patient imaging centres in the Republic of Ireland. Results: Response rates for each modality ranged from 42 to 44%. CT, MRI, and PET were used to specifically diagnose dementia or AD by 43%, 40% and 50% of responding centres respectively. Of these, dementia-specific neuroimaging protocols were utilised in 33%, 50% and 100% of CT, MRI and PET centres respectively, with the remainder using either standard or other non-specific protocols. Both radiologists and clinical specialist radiographers participated in the development of the majority of protocols. The Royal College of Radiologists (RCR) guidelines were most commonly referenced as informing protocol development, however, none of the MRI respondents were able to identify any guidelines used to inform MR protocol development. Conclusion: Currently there is no consensus in Ireland on optimal dementia/AD neuroimaging protocols, particularly for PET and MRI. Similarly the use of validated and published guidelines to inform protocols is not universal. - Highlights: • We examined the nature of neuroimaging protocols for dementia and Alzheimer's disease in Ireland. • Dementia or Alzheimer's disease-specific protocols were used by between 33 and 100% of centres depending on modality. • Stated dementia-specific protocols were identical for CT whereas

  20. Foraging behavior of Anastrepha Ludens, A. obliqua, and A. serpentina in response to feces extracts containing host marking pheromone.

    Science.gov (United States)

    Aluja, Martin; Díaz-Fleischer, Francisco

    2006-02-01

    Following oviposition, females of many Tephritid flies deposit host marking pheromones (HMPs) to indicate that the host fruit has been occupied. We describe the foraging behavior of these three economically important species (Anastrepha ludens and A. obliqua from the fraterculus species group and A. serpentina from the serpentina species group) when they encounter an artificial fruit (green agar spheres wrapped in Parafilm) marked with intra- and interspecific feces extracts that contain, among other substances, host marking pheromone. When flies encountered fruit treated with either 1 or 100 mg/ml feces extract, there were drastic and statistically significant reductions in tree residence time, mean time spent on fruit, and in the number of oviposition attempts or actual ovipositions when compared to the control treatment (clean fruit). These responses were almost identical irrespective of extract origin (i.e., fly species), indicating complete interspecific HMP cross-recognition by all three Anastrepha species tested. We discuss the ecological and practical implications of our findings.

  1. Linguistic identity matching

    CERN Document Server

    Lisbach, Bertrand

    2013-01-01

    Regulation, risk awareness and technological advances are increasingly drawing identity search functionality into business, security and data management processes, as well as fraud investigations and counter-terrorist measures.Over the years, a number of techniques have been developed for searching identity data, traditionally focusing on logical algorithms. These techniques often failed to take into account the complexities of language and culture that provide the rich variations  seen in names used around the world. A new paradigm has now emerged for understanding the way that identity data

  2. Exploring the identity and "sense of identity" of organisations

    Directory of Open Access Journals (Sweden)

    C L Van Tonder

    2006-04-01

    Full Text Available During the past two decades a steady increase in scholarly contributions in the area of organisation identity have been observed – to the point that the phenomenon is now the subject of a sustainable discourse in several disciplines. Many theoretical and conceptual dilemmas however remain, largely as a result of the low incidence of empirical research in the area. This study reports the results of an exploratory investigation that adapted Schley and Wagenfield’s (1979 concept of identity for use in an organisational setting. Interviews were conducted with 152 top managers representing 10 companies. The results indicate that organisational responses to the question “who am I?�? elicit distinctive organisational self-descriptions and some awareness of identity issues.

  3. Host density and competency determine the effects of host diversity on trematode parasite infection.

    Directory of Open Access Journals (Sweden)

    Jeremy M Wojdak

    Full Text Available Variation in host species composition can dramatically alter parasite transmission in natural communities. Whether diverse host communities dilute or amplify parasite transmission is thought to depend critically on species traits, particularly on how hosts affect each other's densities, and their relative competency as hosts. Here we studied a community of potential hosts and/or decoys (i.e. non-competent hosts for two trematode parasite species, Echinostoma trivolvis and Ribeiroia ondatrae, which commonly infect wildlife across North America. We manipulated the density of a focal host (green frog tadpoles, Rana clamitans, in concert with manipulating the diversity of alternative species, to simulate communities where alternative species either (1 replace the focal host species so that the total number of individuals remains constant (substitution or (2 add to total host density (addition. For E. trivolvis, we found that total parasite transmission remained roughly equal (or perhaps decreased slightly when alternative species replaced focal host individuals, but parasite transmission was higher when alternative species were added to a community without replacing focal host individuals. Given the alternative species were roughly equal in competency, these results are consistent with current theory. Remarkably, both total tadpole and per-capita tadpole infection intensity by E. trivolvis increased with increasing intraspecific host density. For R. ondatrae, alternative species did not function as effective decoys or hosts for parasite infective stages, and the diversity and density treatments did not produce clear changes in parasite transmission, although high tank to tank variation in R. ondatrae infection could have obscured patterns.

  4. Inter-Identity Autobiographical Amnesia in Patients with Dissociative Identity Disorder

    Science.gov (United States)

    Huntjens, Rafaële J. C.; Verschuere, Bruno; McNally, Richard J.

    2012-01-01

    Background A major symptom of Dissociative Identity Disorder (DID; formerly Multiple Personality Disorder) is dissociative amnesia, the inability to recall important personal information. Only two case studies have directly addressed autobiographical memory in DID. Both provided evidence suggestive of dissociative amnesia. The aim of the current study was to objectively assess transfer of autobiographical information between identities in a larger sample of DID patients. Methods Using a concealed information task, we assessed recognition of autobiographical details in an amnesic identity. Eleven DID patients, 27 normal controls, and 23 controls simulating DID participated. Controls and simulators were matched to patients on age, education level, and type of autobiographical memory tested. Findings Although patients subjectively reported amnesia for the autobiographical details included in the task, the results indicated transfer of information between identities. Conclusion The results call for a revision of the DID definition. The amnesia criterion should be modified to emphasize its subjective nature. PMID:22815769

  5. Inter-identity autobiographical amnesia in patients with dissociative identity disorder.

    Directory of Open Access Journals (Sweden)

    Rafaële J C Huntjens

    Full Text Available BACKGROUND: A major symptom of Dissociative Identity Disorder (DID; formerly Multiple Personality Disorder is dissociative amnesia, the inability to recall important personal information. Only two case studies have directly addressed autobiographical memory in DID. Both provided evidence suggestive of dissociative amnesia. The aim of the current study was to objectively assess transfer of autobiographical information between identities in a larger sample of DID patients. METHODS: Using a concealed information task, we assessed recognition of autobiographical details in an amnesic identity. Eleven DID patients, 27 normal controls, and 23 controls simulating DID participated. Controls and simulators were matched to patients on age, education level, and type of autobiographical memory tested. FINDINGS: Although patients subjectively reported amnesia for the autobiographical details included in the task, the results indicated transfer of information between identities. CONCLUSION: The results call for a revision of the DID definition. The amnesia criterion should be modified to emphasize its subjective nature.

  6. Fungal-host diversity among mycoheterotrophic plants increases proportionally to their fungal-host overlap.

    Science.gov (United States)

    Gomes, Sofia I F; Merckx, Vincent S F T; Saavedra, Serguei

    2017-05-01

    The vast majority of plants obtain an important proportion of vital resources from soil through mycorrhizal fungi. Generally, this happens in exchange of photosynthetically fixed carbon, but occasionally the interaction is mycoheterotrophic, and plants obtain carbon from mycorrhizal fungi. This process results in an antagonistic interaction between mycoheterotrophic plants and their fungal hosts. Importantly, the fungal-host diversity available for plants is restricted as mycoheterotrophic interactions often involve narrow lineages of fungal hosts. Unfortunately, little is known whether fungal-host diversity may be additionally modulated by plant-plant interactions through shared hosts. Yet, this may have important implications for plant competition and coexistence. Here, we use DNA sequencing data to investigate the interaction patterns between mycoheterotrophic plants and arbuscular mycorrhizal fungi. We find no phylogenetic signal on the number of fungal hosts nor on the fungal hosts shared among mycoheterotrophic plants. However, we observe a potential trend toward increased phylogenetic diversity of fungal hosts among mycoheterotrophic plants with increasing overlap in their fungal hosts. While these patterns remain for groups of plants regardless of location, we do find higher levels of overlap and diversity among plants from the same location. These findings suggest that species coexistence cannot be fully understood without attention to the two sides of ecological interactions.

  7. Local host specialization, host-switching, and dispersal shape the regional distributions of avian haemosporidian parasites.

    Science.gov (United States)

    Ellis, Vincenzo A; Collins, Michael D; Medeiros, Matthew C I; Sari, Eloisa H R; Coffey, Elyse D; Dickerson, Rebecca C; Lugarini, Camile; Stratford, Jeffrey A; Henry, Donata R; Merrill, Loren; Matthews, Alix E; Hanson, Alison A; Roberts, Jackson R; Joyce, Michael; Kunkel, Melanie R; Ricklefs, Robert E

    2015-09-08

    The drivers of regional parasite distributions are poorly understood, especially in comparison with those of free-living species. For vector-transmitted parasites, in particular, distributions might be influenced by host-switching and by parasite dispersal with primary hosts and vectors. We surveyed haemosporidian blood parasites (Plasmodium and Haemoproteus) of small land birds in eastern North America to characterize a regional parasite community. Distributions of parasite populations generally reflected distributions of their hosts across the region. However, when the interdependence between hosts and parasites was controlled statistically, local host assemblages were related to regional climatic gradients, but parasite assemblages were not. Moreover, because parasite assemblage similarity does not decrease with distance when controlling for host assemblages and climate, parasites evidently disperse readily within the distributions of their hosts. The degree of specialization on hosts varied in some parasite lineages over short periods and small geographic distances independently of the diversity of available hosts and potentially competing parasite lineages. Nonrandom spatial turnover was apparent in parasite lineages infecting one host species that was well-sampled within a single year across its range, plausibly reflecting localized adaptations of hosts and parasites. Overall, populations of avian hosts generally determine the geographic distributions of haemosporidian parasites. However, parasites are not dispersal-limited within their host distributions, and they may switch hosts readily.

  8. First identification of Echinococcus multilocularis in rodent intermediate hosts in Sweden

    Directory of Open Access Journals (Sweden)

    Andrea L. Miller

    2016-04-01

    Full Text Available Echinococcus multilocularis is a zoonotic tapeworm with a sylvatic lifecycle and an expanding range in Europe. Monitoring efforts following its first identification in 2011 in Sweden have focused on the parasite's definitive host, the red fox (Vulpes vulpes. However, identifying rodent intermediate hosts is important to recognize opportunities for parasite transmission. During 2013–2015, livers from a total of 1566 rodents from four regions in Sweden were examined for E. multilocularis metacestode lesions. Species identity of suspect parasite lesions was confirmed by PCR and sequencing. E. multilocularis positive lesions >6 mm in diameter were also examined histologically. One Microtus agrestis out of 187 (0.5%, 95%CI: 0–2.9%, 8/439 (1.8%, 95%CI: 0.8–3.6% Arvicola amphibius, 0/655 (0%, 95%CI: 0–0.6% Myodes glareolus, and 0/285 (0%, 95%CI: 0–1.3% Apodemus spp. contained E. multilocularis metacestode lesions. Presence of protoscoleces was confirmed in the infected M. agrestis and in three of eight infected A. amphibius. Six of the nine positive rodents were captured from the same field. This is the first report of E. multilocularis in intermediate hosts in Sweden. The cluster of positive rodents in one field shows that local parasite prevalence can be high in Sweden despite overall low national prevalence in foxes (<0.1%. The presence of protoscoleces in infected M. agrestis and A. amphibius indicate these species can serve as competent intermediate hosts in Sweden. However, their relative importance for E. multilocularis transmission in the Swedish environment is not yet possible to assess. In contrast, the negative findings in all M. glareolus and Apodemus spp. suggest that these species are of no importance.

  9. 7 CFR 52.771 - Identity.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 2 2010-01-01 2010-01-01 false Identity. 52.771 Section 52.771 Agriculture... United States Standards for Grades of Canned Red Tart Pitted Cherries 1 Identity and Grades § 52.771 Identity. Canned red tart pitted cherries is the product represented as defined in the standard of identity...

  10. Identity and the Management Project

    DEFF Research Database (Denmark)

    Jørgensen, Kenneth Mølbjerg; Dehlin, Erlend

    The paper discusses the concept of identity in relation to management. We take our starting point in Wittgenstein’s concept language games. We argue that identity is a question of using linguistic tools to construct reality. Two elements of the language game metaphor are central here: rules...... and family resemblance. As such, managing identity in organizations is closely linked to rules and family resemblance. Organizations manage identity through the definition of norms and values for right or wrong, appropriate or inappropriate, to name but a few. Norms and values are important as reference...... points for constructing identities. Managing identity has become more important because the rules-of-the-game have become more unstable. Managing identity is important if the bonds between individuals and organizations are to be sustained. But this task is contradictory and paradoxical of its very nature...

  11. Identity style and coping strategies.

    Science.gov (United States)

    Berzonsky, M D

    1992-12-01

    This study examined the relationship between identity style and strategies used to cope with stressors that potentially threaten one's sense of identity. Identity style refers to differences in the way individuals construct and revise or maintain their sense of identity. An informational style involves actively seeking out, evaluating, and utilizing self-relevant information. A normative style highlights the expectations and standards of significant others. A diffuse/avoidant style is characterized by procrastination and situation-specific reactions. Late-adolescent college subjects were administered measures of identity style, ways of coping with academic stressors, and test anxiety. Within this self-as-student context, subjects with diffuse and normative identity styles employed avoidant-oriented coping strategies (wishful thinking, distancing, and tension reduction). An informational style was associated with deliberate, problem-focused coping. Findings are discussed in terms of a process model of identity development.

  12. Tools for Understanding Identity

    Energy Technology Data Exchange (ETDEWEB)

    Creese, Sadie; Gibson-Robinson, Thomas; Goldsmith, Michael; Hodges, Duncan; Kim, Dee DH; Love, Oriana J.; Nurse, Jason R.; Pike, William A.; Scholtz, Jean

    2013-12-28

    Identity attribution and enrichment is critical to many aspects of law-enforcement and intelligence gathering; this identity typically spans a number of domains in the natural-world such as biographic information (factual information – e.g. names, addresses), biometric information (e.g. fingerprints) and psychological information. In addition to these natural-world projections of identity, identity elements are projected in the cyber-world. Conversely, undesirable elements may use similar techniques to target individuals for spear-phishing attacks (or worse), and potential targets or their organizations may want to determine how to minimize the attack surface exposed. Our research has been exploring the construction of a mathematical model for identity that supports such holistic identities. The model captures the ways in which an identity is constructed through a combination of data elements (e.g. a username on a forum, an address, a telephone number). Some of these elements may allow new characteristics to be inferred, hence enriching the holistic view of the identity. An example use-case would be the inference of real names from usernames, the ‘path’ created by inferring new elements of identity is highlighted in the ‘critical information’ panel. Individual attribution exercises can be understood as paths through a number of elements. Intuitively the entire realizable ‘capability’ can be modeled as a directed graph, where the elements are nodes and the inferences are represented by links connecting one or more antecedents with a conclusion. The model can be operationalized with two levels of tool support described in this paper, the first is a working prototype, the second is expected to reach prototype by July 2013: Understanding the Model The tool allows a user to easily determine, given a particular set of inferences and attributes, which elements or inferences are of most value to an investigator (or an attacker). The tool is also able to take

  13. Perceived consequences of hypothetical identity-inconsistent sexual experiences: effects of perceiver's sex and sexual identity.

    Science.gov (United States)

    Preciado, Mariana A; Johnson, Kerri L

    2014-04-01

    Most people organize their sexual orientation under a single sexual identity label. However, people may have sexual experiences that are inconsistent with their categorical sexual identity label. A man might identify as heterosexual but still experience some attraction to men; a woman might identify as lesbian yet enter into a romantic relationship with a man. Identity-inconsistent experiences are likely to have consequences. In the present study, we examined lay perceptions of the consequences of identity-inconsistent sexual experiences for self-perceived sexuality and for social relationships among a sexually diverse sample (N = 283). We found that the perceived consequences of identity-inconsistent experiences for self-perception, for social stigmatization, and for social relationships varied as a function of participant sex, participant sexual identity (heterosexual, gay, lesbian), and experience type (fantasy, attraction, behavior, love). We conclude that not all identity-inconsistent sexual experiences are perceived as equally consequential and that the perceived consequences of such experiences vary predictably as a function of perceiver sex and sexual identity. We discuss the role lay perceptions of the consequences of identity-inconsistent sexual experiences may play in guiding attitudes and behavior.

  14. Putting the five-factor model into context: evidence linking big five traits to narrative identity.

    Science.gov (United States)

    Raggatt, Peter

    2006-10-01

    The study examined relationships between the Big Five personality traits and thematic content extracted from self-reports of life history data. One hundred and five "mature age" university students (M=30.1 years) completed the NEO PI-R trait measure, and the Personality Web Protocol. The protocol examines constituents of identity by asking participants to describe 24 key "attachments" from their life histories (significant events, people, places, objects, and possessions). Participants sorted these attachments into clusters and provided a self-descriptive label for each cluster (e.g., "adventurous self"). It was predicted that the thematic content of these cluster labels would be systematically related to Big Five trait scores (e.g., that labels referring to strength or positive emotions would be linked to Extraversion). The hypothesized links were obtained for each of the Big Five trait domains except Conscientiousness. Results are discussed with a view to broadening our understanding of the Five-Factor Model in relation to units of personality other than traits.

  15. The change of expression configuration affects identity-dependent expression aftereffect but not identity-independent expression aftereffect

    Directory of Open Access Journals (Sweden)

    Miao eSong

    2015-12-01

    Full Text Available The present study examined the influence of expression configuration on cross-identity expression aftereffect. The expression configuration refers to the spatial arrangement of facial features in a face for conveying an emotion, e.g., an open-mouth smile versus a closed-mouth smile. In the first of two experiments, the expression aftereffect is measured using across-identity/cross-expression configuration factorial design. The facial identities of test faces were the same or different from the adaptor, while orthogonally, the expression configurations of those facial identities were also the same or different. The result shows that the change of expression configuration impaired the expression aftereffect when the facial identities of adaptor and tests were the same; however, the impairment effect disappears when facial identities were different, indicating the identity-independent expression representation is more robust to the change of the expression configuration in comparison with the identity-dependent expression representation. In the second experiment, we used schematic line faces as adaptors and real faces as tests to minimize the similarity between the adaptor and tests, which is expected to exclude the contribution from the identity-dependent expression representation to expression aftereffect. The second experiment yields a similar result as the identity-independent expression aftereffect observed in Experiment 1. The findings indicate the different neural sensitivities to expression configuration for identity-dependent and identity-independent expression systems.

  16. Negotiation of identities in intercultural communication

    Directory of Open Access Journals (Sweden)

    Janík Zdeněk

    2017-01-01

    Full Text Available Negotiation of identities in communication entails affirming the identities we want others to recognize in us and ascription of identities we mutually assign to each other in communication. The study of intercultural communication focuses on cultural identity as the principal identity component that defines intercultural communication. In this article, the assumption that cultural group membership factors determine the context of intercultural communication is questioned. The article examines how intercultural interlocutors negotiate their identities in various intercultural interactions. The aims of the research presented in this paper are: 1 to examine which identities - cultural, personal, or social - intercultural interlocutors activate in intercultural communication; 2 to determine whether interlocutors’ intercultural communication is largely influenced by their cultural identities; 3 and to identify situations in which they activate their cultural identities (3. The research data were collected from 263 international students studying at Masaryk University in Brno in the years 2010 - 2016. Although the research results are not conclusive, they indicate that cultural identities predominate in the students’ ethnocentric views and that stereotypes constrain the students’ cultural identities and affect the negotiation of identities in intercultural communication.

  17. Performance Analysis of the IEEE 802.11p Multichannel MAC Protocol in Vehicular Ad Hoc Networks.

    Science.gov (United States)

    Song, Caixia

    2017-12-12

    Vehicular Ad Hoc Networks (VANETs) employ multichannel to provide a variety of safety and non-safety applications, based on the IEEE 802.11p and IEEE 1609.4 protocols. The safety applications require timely and reliable transmissions, while the non-safety applications require efficient and high throughput. In the IEEE 1609.4 protocol, operating interval is divided into alternating Control Channel (CCH) interval and Service Channel (SCH) interval with an identical length. During the CCH interval, nodes transmit safety-related messages and control messages, and Enhanced Distributed Channel Access (EDCA) mechanism is employed to allow four Access Categories (ACs) within a station with different priorities according to their criticality for the vehicle's safety. During the SCH interval, the non-safety massages are transmitted. An analytical model is proposed in this paper to evaluate performance, reliability and efficiency of the IEEE 802.11p and IEEE 1609.4 protocols. The proposed model improves the existing work by taking serval aspects and the character of multichannel switching into design consideration. Extensive performance evaluations based on analysis and simulation help to validate the accuracy of the proposed model and analyze the capabilities and limitations of the IEEE 802.11p and IEEE 1609.4 protocols, and enhancement suggestions are given.

  18. Online Identities and Social Networking

    Science.gov (United States)

    Maheswaran, Muthucumaru; Ali, Bader; Ozguven, Hatice; Lord, Julien

    Online identities play a critical role in the social web that is taking shape on the Internet. Despite many technical proposals for creating and managing online identities, none has received widespread acceptance. Design and implementation of online identities that are socially acceptable on the Internet remains an open problem. This chapter discusses the interplay between online identities and social networking. Online social networks (OSNs) are growing at a rapid pace and has millions of members in them. While the recent trend is to create explicit OSNs such as Facebook and MySpace, we also have implicit OSNs such as interaction graphs created by email and instant messaging services. Explicit OSNs allow users to create profiles and use them to project their identities on the web. There are many interesting identity related issues in the context of social networking including how OSNs help and hinder the definition of online identities.

  19. Personal Identity Online

    DEFF Research Database (Denmark)

    Rodogno, Raffaele

    2012-01-01

    Philosophers concerned with the question of personal identity have typically been asking the so-called re-identification question: what are the conditions under which a person at one point in time is properly re-identified at another point in time? This is a rather technical question. In our...... everyday interactions, however, we do raise a number of personal identity questions that are quite distinct from it. In order to explore the variety of ways in which the Internet may affect personal identity, I propose in this study to broaden the typical philosophical horizon to other more mundane senses...... of the question. In Section 2, I describe a number of possible meanings of personal identity observed in everyday contexts and more philosophical ones. With some caveats, I argue that it is the specific context in which the question arises that disambiguates the meaning of the question. Online contexts are novel...

  20. Researcher Identity in Transition

    DEFF Research Database (Denmark)

    Castelló, Montserrat; Kobayashi, Sofie; McGinn, Michelle K.

    2015-01-01

    to reinterpretation, and ECRs need to attend to new or reimagined signals in their efforts to develop a researcher identity in this current context. In this article, we present a comprehensive framework for researcher identity in relation to the ways ECRs recognise and respond to divergent signals across spheres...... of activity. We illustrate this framework through eight identity stories drawn from our earlier research projects. Each identity story highlights the congruence (or lack of congruence) between signals across spheres of activity and emphasises the different ways ECRs respond to these signals. The proposed...... comprehensive framework allows for the analysis of researcher identity development through the complex and intertwined activities in which ECRs are involved. We advance this approach as a foundation for a sustained research agenda to understand how ECRs identify and respond to relevant signals, and...

  1. (Re)scaling identities

    DEFF Research Database (Denmark)

    Koefoed, Lasse Martin; Simonsen, Kirsten

    2012-01-01

    of Pakistani origin, the study employs theoretical ideas of estrangement, identification and recognition in order to obtain a thorough understanding of the complexity and the contradictory character of their spatial identities and affiliations. A turning point in the double processes of estrangement...... of identity....

  2. Identity without Membership?

    DEFF Research Database (Denmark)

    Dobusch, Leonhard; Schoeneborn, Dennis

    the formation of organizational identity in more fluid organizational settings. Drawing on an empirical study of the hacker collective Anonymous, we show that organizational identity is formed through public communicative events that are subject to meaning negotiation whether or not actions can be attributed...

  3. Ultra-Technological Refugees: Identity Construction through Consumer Culture among African Refugees in Israel

    Directory of Open Access Journals (Sweden)

    Tamar Arev

    2017-09-01

    Full Text Available Academic discourse tends to view the labor market as a central sphere in the refugee integration process, while other aspects related to the market economy, such as capital accumulation and the purchase of goods, gain less attention if at all. Studying these issues from the perspective of African refugees in Israel enables us to examine alternative means through which the refugee community seeks to integrate into the socio-economic arena in the host culture by adopting popular consumption patterns. The study explores consumer culture among refugees as a means through which they borrow, adopt and translate what they perceive to be the attributes of the desired lifestyle in the host country. Based on ethnographic work, the study examines the ways in which consumption practices form a socio-cultural bridge to blur social boundaries between refugees and Western society. By adopting commodity and consumption patterns, African refugees seek to become a part of the Israeli collective and distance themselves from the monolithic identity of alien-African-refugees.

  4. A host-guest-recognition-based electrochemical aptasensor for thrombin detection.

    Science.gov (United States)

    Fan, Hao; Li, Hui; Wang, Qingjiang; He, Pingang; Fang, Yuzhi

    2012-05-15

    A sensitive electrochemical aptasensor for thrombin detection is presented based on the host-guest recognition technique. In this sensing protocol, a 15 based thrombin aptamer (ab. TBA) was dually labeled with a thiol at its 3' end and a 4-((4-(dimethylamino)phenyl)azo) benzoic acid (dabcyl) at its 5' end, respectively, which was previously immobilized on one Au electrode surface by AuS bond and used as the thrombin probe during the protein sensing procedure. One special electrochemical marker was prepared by modifying CdS nanoparticle with β-cyclodextrins (ab. CdS-CDs), which employed as electrochemical signal provider and would conjunct with the thrombin probe modified electrode through the host-guest recognition of CDs to dabcyl. In the absence of thrombin, the probe adopted linear structure to conjunct with CdS-CDs. In present of thrombin, the TBA bond with thrombin and transformed into its special G-quarter structure, which forced CdS-CDs into the solution. Therefore, the target-TBA binding event can be sensitively transduced via detecting the electrochemical oxidation current signal of Cd of CdS nanoparticles in the solution. Using this method, as low as 4.6 pM thrombin had been detected. Copyright © 2012 Elsevier B.V. All rights reserved.

  5. Identity uncertainty and commitment making across adolescence : Five-year within-person associations using daily identity reports

    NARCIS (Netherlands)

    Becht, Andrik I.; Nelemans, Stefanie A.; Branje, Susan J. T.; Vollebergh, Wilma A. M.; Koot, Hans M.; Meeus, W.H.J.

    2017-01-01

    A central assumption of identity theory is that adolescents reconsider current identity commitments and explore identity alternatives before they make new commitments in various identity domains (Erikson, 1968; Marcia, 1966). Yet, little empirical evidence is available on how commitment and

  6. Protocol for generating multiphoton entangled states from quantum dots in the presence of nuclear spin fluctuations

    DEFF Research Database (Denmark)

    Denning, Emil Vosmar; Iles-Smith, Jake; McCutcheon, Dara P. S.

    2017-01-01

    Multiphoton entangled states are a crucial resource for many applications inquantum information science. Semiconductor quantum dots offer a promising route to generate such states by mediating photon-photon correlations via a confinedelectron spin, but dephasing caused by the host nuclear spin...... environment typically limits coherence (and hence entanglement) between photons to the spin T2* time of a few nanoseconds. We propose a protocol for the deterministic generation of multiphoton entangled states that is inherently robust against the dominating slow nuclear spin environment fluctuations, meaning...... that coherence and entanglement is instead limited only by the much longer spin T2 time of microseconds. Unlike previous protocols, the present schemeallows for the generation of very low error probability polarisation encoded three-photon GHZ states and larger entangled states, without the need for spin echo...

  7. Identity as wrapping up

    DEFF Research Database (Denmark)

    Nickelsen, Niels Christian Mossfeldt

    2015-01-01

    The aim of this paper is to provide an understanding of cross-professional collaboration and to develop a notion of professional identity based in practice. The background of the paper is science and technology studies and more precisely actor network theory. The method used: The empirical analysis...... in close relation to the making of a report concerning the cross-professional collaboration. Findings are that “Identity as wrapping up” points to the way in which certain actors, by other actors, are maneuvered into certain pockets in a network. Identity as wrapping up is emphasized as a way...... of participating, which is closely connected to the intention to control the relation towards the other. Thus identity as wrapping up is argued to be a strategy to optimize the situation of one’s own profession. Conclusion: This articulation of identity contributes to the actor network literature as well...

  8. Visual identity and rebranding

    Directory of Open Access Journals (Sweden)

    Katarzyna Wrona

    2015-06-01

    Full Text Available The goal of this article is to highlight the essence of visual identification and rebranding, as well as to discuss elements of corporate identity, which are subject to revitalization in the process of refreshing the image of a brand. In the first part the article the analysis of the term visual identification is conducted. In the analysis special attention is drawn to the role of visual identification in creating a coherent identity of an organization. In the subsequent chapters further components of corporate identity are presented in detail – starting with logotype, through business forms, advertisements, accompanying materials and Internet websites to signs on buildings. Moreover, corporate identity book as a collection of standards and guidelines for application of corporate identity rules is discussed. The deliberations are based on the study of literature. The last chapter presented the transformation of the brand of Institute of Aviation.

  9. Children's Social Identities

    Science.gov (United States)

    Bennett, Mark

    2011-01-01

    This paper provides a brief overview of recent developmental research on themes related to children's social identities. Initially, consideration is given to the capacity for social categorization, following which attention is given to children's developing conceptions of social identities, their identification with social groups, and the…

  10. A Cloud-User Protocol Based on Ciphertext Watermarking Technology

    Directory of Open Access Journals (Sweden)

    Keyang Liu

    2017-01-01

    Full Text Available With the growth of cloud computing technology, more and more Cloud Service Providers (CSPs begin to provide cloud computing service to users and ask for users’ permission of using their data to improve the quality of service (QoS. Since these data are stored in the form of plain text, they bring about users’ worry for the risk of privacy leakage. However, the existing watermark embedding and encryption technology is not suitable for protecting the Right to Be Forgotten. Hence, we propose a new Cloud-User protocol as a solution for plain text outsourcing problem. We only allow users and CSPs to embed the ciphertext watermark, which is generated and embedded by Trusted Third Party (TTP, into the ciphertext data for transferring. Then, the receiver decrypts it and obtains the watermarked data in plain text. In the arbitration stage, feature extraction and the identity of user will be used to identify the data. The fixed Hamming distance code can help raise the system’s capability for watermarks as much as possible. Extracted watermark can locate the unauthorized distributor and protect the right of honest CSP. The results of experiments demonstrate the security and validity of our protocol.

  11. Mesoscale spatiotemporal variability in a complex host-parasite system influenced by intermediate host body size.

    Science.gov (United States)

    Rodríguez, Sara M; Valdivia, Nelson

    2017-01-01

    Parasites are essential components of natural communities, but the factors that generate skewed distributions of parasite occurrences and abundances across host populations are not well understood. Here, we analyse at a seascape scale the spatiotemporal relationships of parasite exposure and host body-size with the proportion of infected hosts (i.e., prevalence) and aggregation of parasite burden across ca. 150 km of the coast and over 22 months. We predicted that the effects of parasite exposure on prevalence and aggregation are dependent on host body-sizes. We used an indirect host-parasite interaction in which migratory seagulls, sandy-shore molecrabs, and an acanthocephalan worm constitute the definitive hosts, intermediate hosts, and endoparasite, respectively. In such complex systems, increments in the abundance of definitive hosts imply increments in intermediate hosts' exposure to the parasite's dispersive stages. Linear mixed-effects models showed a significant, albeit highly variable, positive relationship between seagull density and prevalence. This relationship was stronger for small (cephalothorax length >15 mm) than large molecrabs (analysis of the variance-to-mean ratio of per capita parasite burden showed no relationship between seagull density and mean parasite aggregation across host populations. However, the amount of unexplained variability in aggregation was strikingly higher in larger than smaller intermediate hosts. This unexplained variability was driven by a decrease in the mean-variance scaling in heavily infected large molecrabs. These results show complex interdependencies between extrinsic and intrinsic population attributes on the structure of host-parasite interactions. We suggest that parasite accumulation-a characteristic of indirect host-parasite interactions-and subsequent increasing mortality rates over ontogeny underpin size-dependent host-parasite dynamics.

  12. Analyzing the effect of routing protocols on media access control protocols in radio networks

    Energy Technology Data Exchange (ETDEWEB)

    Barrett, C. L. (Christopher L.); Drozda, M. (Martin); Marathe, A. (Achla); Marathe, M. V. (Madhav V.)

    2002-01-01

    We study the effect of routing protocols on the performance of media access control (MAC) protocols in wireless radio networks. Three well known MAC protocols: 802.11, CSMA, and MACA are considered. Similarly three recently proposed routing protocols: AODV, DSR and LAR scheme 1 are considered. The experimental analysis was carried out using GloMoSim: a tool for simulating wireless networks. The main focus of our experiments was to study how the routing protocols affect the performance of the MAC protocols when the underlying network and traffic parameters are varied. The performance of the protocols was measured w.r.t. five important parameters: (i) number of received packets, (ii) average latency of each packet, (iii) throughput (iv) long term fairness and (v) number of control packets at the MAC layer level. Our results show that combinations of routing and MAC protocols yield varying performance under varying network topology and traffic situations. The result has an important implication; no combination of routing protocol and MAC protocol is the best over all situations. Also, the performance analysis of protocols at a given level in the protocol stack needs to be studied not locally in isolation but as a part of the complete protocol stack. A novel aspect of our work is the use of statistical technique, ANOVA (Analysis of Variance) to characterize the effect of routing protocols on MAC protocols. This technique is of independent interest and can be utilized in several other simulation and empirical studies.

  13. Comparing Microbiome Sampling Methods in a Wild Mammal: Fecal and Intestinal Samples Record Different Signals of Host Ecology, Evolution.

    Science.gov (United States)

    Ingala, Melissa R; Simmons, Nancy B; Wultsch, Claudia; Krampis, Konstantinos; Speer, Kelly A; Perkins, Susan L

    2018-01-01

    The gut microbiome is a community of host-associated symbiotic microbes that fulfills multiple key roles in host metabolism, immune function, and tissue development. Given the ability of the microbiome to impact host fitness, there is increasing interest in studying the microbiome of wild animals to better understand these communities in the context of host ecology and evolution. Human microbiome research protocols are well established, but wildlife microbiome research is still a developing field. Currently, there is no standardized set of best practices guiding the collection of microbiome samples from wildlife. Gut microflora are typically sampled either by fecal collection, rectal swabbing, or by destructively sampling the intestinal contents of the host animal. Studies rarely include more than one sampling technique and no comparison of these methods currently exists for a wild mammal. Although some studies have hypothesized that the fecal microbiome is a nested subset of the intestinal microbiome, this hypothesis has not been formally tested. To address these issues, we examined guano (feces) and distal intestinal mucosa from 19 species of free-ranging bats from Lamanai, Belize, using 16S rRNA amplicon sequencing to compare microbial communities across sample types. We found that the diversity and composition of intestine and guano samples differed substantially. In addition, we conclude that signatures of host evolution are retained by studying gut microbiomes based on mucosal tissue samples, but not fecal samples. Conversely, fecal samples retained more signal of host diet than intestinal samples. These results suggest that fecal and intestinal sampling methods are not interchangeable, and that these two microbiotas record different information about the host from which they are isolated.

  14. Comparing Microbiome Sampling Methods in a Wild Mammal: Fecal and Intestinal Samples Record Different Signals of Host Ecology, Evolution

    Directory of Open Access Journals (Sweden)

    Melissa R. Ingala

    2018-05-01

    Full Text Available The gut microbiome is a community of host-associated symbiotic microbes that fulfills multiple key roles in host metabolism, immune function, and tissue development. Given the ability of the microbiome to impact host fitness, there is increasing interest in studying the microbiome of wild animals to better understand these communities in the context of host ecology and evolution. Human microbiome research protocols are well established, but wildlife microbiome research is still a developing field. Currently, there is no standardized set of best practices guiding the collection of microbiome samples from wildlife. Gut microflora are typically sampled either by fecal collection, rectal swabbing, or by destructively sampling the intestinal contents of the host animal. Studies rarely include more than one sampling technique and no comparison of these methods currently exists for a wild mammal. Although some studies have hypothesized that the fecal microbiome is a nested subset of the intestinal microbiome, this hypothesis has not been formally tested. To address these issues, we examined guano (feces and distal intestinal mucosa from 19 species of free-ranging bats from Lamanai, Belize, using 16S rRNA amplicon sequencing to compare microbial communities across sample types. We found that the diversity and composition of intestine and guano samples differed substantially. In addition, we conclude that signatures of host evolution are retained by studying gut microbiomes based on mucosal tissue samples, but not fecal samples. Conversely, fecal samples retained more signal of host diet than intestinal samples. These results suggest that fecal and intestinal sampling methods are not interchangeable, and that these two microbiotas record different information about the host from which they are isolated.

  15. When moral identity symbolization motivates prosocial behavior: the role of recognition and moral identity internalization.

    Science.gov (United States)

    Winterich, Karen Page; Aquino, Karl; Mittal, Vikas; Swartz, Richard

    2013-09-01

    This article examines the role of moral identity symbolization in motivating prosocial behaviors. We propose a 3-way interaction of moral identity symbolization, internalization, and recognition to predict prosocial behavior. When moral identity internalization is low, we hypothesize that high moral identity symbolization motivates recognized prosocial behavior due to the opportunity to present one's moral characteristics to others. In contrast, when moral identity internalization is high, prosocial behavior is motivated irrespective of the level of symbolization and recognition. Two studies provide support for this pattern examining volunteering of time. Our results provide a framework for predicting prosocial behavior by combining the 2 dimensions of moral identity with the situational factor of recognition. PsycINFO Database Record (c) 2013 APA, all rights reserved

  16. The Identity Crisis. Security, Privacy and Usability Issues in Identity Management

    NARCIS (Netherlands)

    Alpár, G.; Hoepman, J.H.; Siljee, B.I.J.

    2011-01-01

    This paper studies the current "identity crisis" caused by the substantial security, privacy and usability shortcomings encountered in existing systems for identity management. Some of these issues are well known, while others are much less understood. This paper brings them together in a single,

  17. Impact of High-Level Expression of Heterologous Protein on Lactococcus lactis Host.

    Science.gov (United States)

    Kim, Mina; Jin, Yerin; An, Hyun-Joo; Kim, Jaehan

    2017-07-28

    The impact of overproduction of a heterologous protein on the metabolic system of host Lactococcus lactis was investigated. The protein expression profiles of L. lactis IL1403 containing two near-identical plasmids that expressed high- and low-level of the green fluorescent protein (GFP) were examined via shotgun proteomics. Analysis of the two strains via high-throughput LC-MS/MS proteomics identified the expression of 294 proteins. The relative amount of each protein in the proteome of both strains was determined by label-free quantification using the spectral counting method. Although expression level of most proteins were similar, several significant alterations in metabolic network were identified in the high GFP-producing strain. These changes include alterations in the pyruvate fermentation pathway, oxidative pentose phosphate pathway, and de novo synthesis pathway for pyrimidine RNA. Expression of enzymes for the synthesis of dTDP-rhamnose and N -acetylglucosamine from glucose was suppressed in the high GFP strain. In addition, enzymes involved in the amino acid synthesis or interconversion pathway were downregulated. The most noticeable changes in the high GFP-producing strain were a 3.4-fold increase in the expression of stress response and chaperone proteins and increase of caseinolytic peptidase family proteins. Characterization of these host expression changes witnessed during overexpression of GFP was might suggested the metabolic requirements and networks that may limit protein expression, and will aid in the future development of lactococcal hosts to produce more heterologous protein.

  18. HOST PLANT UTILIZATION, HOST RANGE OSCILLATIONS AND DIVERSIFICATION IN NYMPHALID BUTTERFLIES: A PHYLOGENETIC INVESTIGATION

    Science.gov (United States)

    Nylin, Sören; Slove, Jessica; Janz, Niklas

    2014-01-01

    It has been suggested that phenotypic plasticity is a major factor in the diversification of life, and that variation in host range in phytophagous insects is a good model for investigating this claim. We explore the use of angiosperm plants as hosts for nymphalid butterflies, and in particular the evidence for past oscillations in host range and how they are linked to host shifts and to diversification. At the level of orders of plants, a relatively simple pattern of host use and host shifts emerges, despite the 100 million years of history of the family Nymphalidae. We review the evidence that these host shifts and the accompanying diversifications were associated with transient polyphagous stages, as suggested by the “oscillation hypothesis.” In addition, we investigate all currently polyphagous nymphalid species and demonstrate that the state of polyphagy is rare, has a weak phylogenetic signal, and a very apical distribution in the phylogeny; we argue that these are signs of its transient nature. We contrast our results with data from the bark beetles Dendroctonus, in which a more specialized host use is instead the apical state. We conclude that plasticity in host use is likely to have contributed to diversification in nymphalid butterflies. PMID:24372598

  19. Reciprocal Associations between Educational Identity and Vocational Identity in Adolescence: A Three-wave Longitudinal Investigation.

    Science.gov (United States)

    Negru-Subtirica, Oana; Pop, Eleonora Ioana

    2018-04-01

    Education and vocation are core identity domains in adolescence. School is a normative social context in this developmental time frame and the formation of an educational identity is embedded in the goals that youth pursue in school. One of the main goals of education is to prepare young people for their future careers. Hence, educational identity should support the formation of vocational identity during adolescence. Considering the limited evidence on the longitudinal links between these two domain-specific identities, we conducted a three-wave investigation, testing the moderating role of age group, gender, and type of school. Participants (N = 1030; 59.3% female) were adolescents (M age  = 16.72 years, SD age  = 1.23, age range 14-19 years) who completed self-report measures of educational and vocational identity three times during an academic year. We underscored reciprocal associations between educational identity and vocational identity. The results indicate that strong educational commitments supported the formation of strong vocational commitments across time. Adolescents who were involved in the in-depth exploration of their educational choices also reported more vocational exploration during the school year. In turn, vocational identity processes also supported educational identity formation, especially the reconsideration of educational commitments. In terms of moderators, we underscored that vocational commitment making and vocational flexibility bolstered educational commitment only in early-to-middle adolescents. Educational in-depth exploration fostered the identification with vocational commitments only in girls. Educational reconsideration of commitment promoted vocational self-doubt only in adolescents attending work-bound high-schools. Implications for research and practice are discussed.

  20. Ego identity formation in middle adolescence.

    Science.gov (United States)

    Lavoie, J C

    1976-12-01

    Assumed determinants of ego identity were investigated in this study using sophomore, junior, and senior high school males and females. Subjects were administered the Marcia Ego Identity Status Scale and measures of sex-role identification, personality development, psychological functioning, self-concept, and parental socialization practices. Data analyses, using a median split on identity score, showed that high-identity adolescents obtained more positive scores on sex-role identification, personality development, psychological adjustment, and self-concept than low-identity adolescents. Socialization practices also differed for the two groups. The sex differences which emerged were congruent with the identity literature. Overall, the data supported Erikson's theory of ego identity development.

  1. Majorana fermion exchange in strictly one dimensional structures

    OpenAIRE

    Chiu, Ching-Kai; Vazifeh, M. M.; Franz, M.

    2014-01-01

    It is generally thought that adiabatic exchange of two identical particles is impossible in one spatial dimension. Here we describe a simple protocol that permits adiabatic exchange of two Majorana fermions in a one-dimensional topological superconductor wire. The exchange relies on the concept of "Majorana shuttle" whereby a $\\pi$ domain wall in the superconducting order parameter which hosts a pair of ancillary Majoranas delivers one zero mode across the wire while the other one tunnels in ...

  2. Professional entrepreneurial identity construction

    DEFF Research Database (Denmark)

    Ramsgaard, Michael Breum

    The present study investigates the construction of a professional identity as an entrepreneur in a sample of people with educational background in nutrition and health. The study examines the connection between professional identity construction and entrepreneurial business emergence using...... ‘entrepreneurial preparedness’ as parameter. This research seeks to address the following questions: What significant components or characteristics do entrepreneurs rely on in the early processes of constructing an entrepreneurial identity....

  3. Identities-in-action

    DEFF Research Database (Denmark)

    Stentoft, Diana; Valero, Paola

    2009-01-01

    The notion of identity is often used in mathematics education research in an attempt to link individual and social understandings of mathematical learning. In this paper we review existing research making use of the notion of identity, and we point to some of the strengths and weaknesses in the w...

  4. Balancing Fairness and Efficiency: The Impact of Identity-Blind and Identity-Conscious Accountability on Applicant Screening

    Science.gov (United States)

    Self, William T.; Mitchell, Gregory; Mellers, Barbara A.; Tetlock, Philip E.; Hildreth, J. Angus D.

    2015-01-01

    This study compared two forms of accountability that can be used to promote diversity and fairness in personnel selections: identity-conscious accountability (holding decision makers accountable for which groups are selected) versus identity-blind accountability (holding decision makers accountable for making fair selections). In a simulated application screening process, undergraduate participants (majority female) sorted applicants under conditions of identity-conscious accountability, identity-blind accountability, or no accountability for an applicant pool in which white males either did or did not have a human capital advantage. Under identity-conscious accountability, participants exhibited pro-female and pro-minority bias, particularly in the white-male-advantage applicant pool. Under identity-blind accountability, participants exhibited no biases and candidate qualifications dominated interview recommendations. Participants exhibited greater resentment toward management under identity-conscious accountability. PMID:26660723

  5. Gender identity development in adolescence.

    Science.gov (United States)

    Steensma, Thomas D; Kreukels, Baudewijntje P C; de Vries, Annelou L C; Cohen-Kettenis, Peggy T

    2013-07-01

    This article is part of a Special Issue "Puberty and Adolescence".This article aims to provide an outline of what is currently known on trajectories, and contributing factors to gender identity development in adolescence. We give a historical overview of the concept of gender identity, and describe general identity development in adolescence, gender identity development in the general population and in gender variant youth. Possible psychosocial (such as child and parental characteristics) and biological factors (such as the effects of prenatal exposure to gonadal hormones and the role of genetics) contributing to a gender variant identity are discussed. Studies focusing on a number of psychosocial and biological factors separately, indicate that each of these factors influence gender identity formation, but little is known about the complex interplay between the factors, nor about the way individuals themselves contribute to the process. Research into normative and gender variant identity development of adolescents is clearly lagging behind. However, studies on persons with gender dysphoria and disorders of sex development, show that the period of adolescence, with its changing social environment and the onset of physical puberty, seems to be crucial for the development of a non-normative gender identity. Copyright © 2013 Elsevier Inc. All rights reserved.

  6. Data from: Two different strategies of host manipulation allow parasites to persist in intermediate-definitive host systems

    NARCIS (Netherlands)

    Vries, de Lana; Langevelde, van F.

    2017-01-01

    Trophically-transmitted parasites start their development in an intermediate host, before they finish the development in their definitive host when the definitive host preys on the intermediate host. In intermediate-definitive host systems, two strategies of host manipulation have been evolved:

  7. Social Identity and Group Contests

    OpenAIRE

    Zaunbrecher, Henrik; Riedl, Arno

    2016-01-01

    Social identity has been shown to successfully enhance cooperation and effort in cooperation and coordination games. Little is known about the causal effect of social identity on the propensity to engage in group conflict. In this paper we explore theoretically and experimentally whether social identity increases investments in group contests. We show theoretically that increased social identity with the own group implies higher investments in Tullock contests. Empirically we find that induce...

  8. Social identity process within organizations

    OpenAIRE

    Bazarov, Takhir; Kuzmina, Maria

    2005-01-01

    Expanding and complex social realities cause new types of identity. Variety in organizations and workgroups (where people are involved), implies a special kind of social identity which can be defined as professional, organizational or managerial. The study of the social identity processes in organizations is a new interdisciplinary sphere that is presented especially commonly in European Social Psychology. The result of its theoretical comprehension is Social Identity Theory. In the article l...

  9. Characteristics of Place Identity as Part of Professional Identity Development among Pre-Service Teachers

    Science.gov (United States)

    Gross, Michal; Hochberg, Nurit

    2016-01-01

    How do pre-service teachers perceive place identity, and is there a connection between their formative place identity and the development of their professional teaching identity? These questions are probed among pre-service teachers who participated in a course titled "Integrating Nature into Preschool." The design of the course was…

  10. Critical Look at Physics Identity: An Operationalized Framework for Examining Race and Physics Identity

    Science.gov (United States)

    Hyater-Adams, Simone; Fracchiolla, Claudia; Finkelstein, Noah; Hinko, Kathleen

    2018-01-01

    Studies on physics identity are appearing more frequently and often responding to increased awareness of the underrepresentation of students of color in physics. In our broader research, we focus our efforts on understanding how racial identity and physics identity are negotiated throughout the experiences of Black physicists. In this paper, we…

  11. Host feeding in insect parasitoids: why destructively feed upon a host that excretes an alternative?

    NARCIS (Netherlands)

    Burger, J.S.M.; Reijnen, T.M.; Van Lenteren, J.C.; Vet, L.E.M.

    2004-01-01

    Host feeding is the consumption of host tissue by the adult female parasitoid. We studied the function of destructive host feeding and its advantage over non-destructive feeding on host-derived honeydew in the whitefly parasitoid Encarsia formosa Gahan (Hymenoptera: Aphelinidae). We allowed

  12. Local host adaptation and use of a novel host in the seed beetle Megacerus eulophus.

    Directory of Open Access Journals (Sweden)

    Gisela C Stotz

    Full Text Available Spatial variation in host plant availability may lead to specialization in host use and local host adaptation in herbivorous insects, which may involve a cost in performance on other hosts. We studied two geographically separated populations of the seed beetle Megacerus eulophus (Coleoptera: Bruchidae in central Chile: a population from the host Convolvulus chilensis (in Aucó and a population from C. bonariensis (in Algarrobo. In Aucó C. chilensis is the only host plant, while in Algarrobo both C. bonariensis and C. chilensis are available. We tested local adaptation to these native host plants and its influence on the use of another, exotic host plant. We hypothesized that local adaptation would be verified, particularly for the one-host population (Aucó, and that the Aucó population would be less able to use an alternative, high-quality host. We found evidence of local adaptation in the population from C. chilensis. Thus, when reared on C. chilensis, adults from the C. chilensis population were larger and lived longer than individuals from the C. bonariensis population, while bruchids from the two populations had the same body size and longevity when reared on C. bonariensis. Overall, bruchids from the C. chilensis population showed greater performance traits than those from the C. bonariensis population. There were no differences between the bruchid populations in their ability to use the alternative, exotic host Calystegia sepium, as shown by body size and longevity patterns. Results suggest that differences in local adaptation might be explained by differential host availability in the study populations.

  13. Religiosity as identity: toward an understanding of religion from a social identity perspective.

    Science.gov (United States)

    Ysseldyk, Renate; Matheson, Kimberly; Anisman, Hymie

    2010-02-01

    As a social identity anchored in a system of guiding beliefs and symbols, religion ought to serve a uniquely powerful function in shaping psychological and social processes. Religious identification offers a distinctive "sacred" worldview and "eternal" group membership, unmatched by identification with other social groups. Thus, religiosity might be explained, at least partially, by the marked cognitive and emotional value that religious group membership provides. The uniqueness of a positive social group, grounded in a belief system that offers epistemological and ontological certainty, lends religious identity a twofold advantage for the promotion of well-being. However, that uniqueness may have equally negative impacts when religious identity itself is threatened through intergroup conflict. Such consequences are illustrated by an examination of identities ranging from religious fundamentalism to atheism. Consideration of religion's dual function as a social identity and a belief system may facilitate greater understanding of the variability in its importance across individuals and groups.

  14. An efficient deterministic secure quantum communication scheme based on cluster states and identity authentication

    International Nuclear Information System (INIS)

    Wen-Jie, Liu; Han-Wu, Chen; Zhi-Qiang, Li; Zhi-Hao, Liu; Wen-Bo, Hu; Ting-Huai, Ma

    2009-01-01

    A novel efficient deterministic secure quantum communication scheme based on four-qubit cluster states and single-photon identity authentication is proposed. In this scheme, the two authenticated users can transmit two bits of classical information per cluster state, and its efficiency of the quantum communication is 1/3, which is approximately 1.67 times that of the previous protocol presented by Wang et al [Chin. Phys. Lett. 23 (2006) 2658]. Security analysis shows the present scheme is secure against intercept-resend attack and the impersonator's attack. Furthermore, it is more economic with present-day techniques and easily processed by a one-way quantum computer. (general)

  15. Directional Selection from Host Plants Is a Major Force Driving Host Specificity in Magnaporthe Species.

    Science.gov (United States)

    Zhong, Zhenhui; Norvienyeku, Justice; Chen, Meilian; Bao, Jiandong; Lin, Lianyu; Chen, Liqiong; Lin, Yahong; Wu, Xiaoxian; Cai, Zena; Zhang, Qi; Lin, Xiaoye; Hong, Yonghe; Huang, Jun; Xu, Linghong; Zhang, Honghong; Chen, Long; Tang, Wei; Zheng, Huakun; Chen, Xiaofeng; Wang, Yanli; Lian, Bi; Zhang, Liangsheng; Tang, Haibao; Lu, Guodong; Ebbole, Daniel J; Wang, Baohua; Wang, Zonghua

    2016-05-06

    One major threat to global food security that requires immediate attention, is the increasing incidence of host shift and host expansion in growing number of pathogenic fungi and emergence of new pathogens. The threat is more alarming because, yield quality and quantity improvement efforts are encouraging the cultivation of uniform plants with low genetic diversity that are increasingly susceptible to emerging pathogens. However, the influence of host genome differentiation on pathogen genome differentiation and its contribution to emergence and adaptability is still obscure. Here, we compared genome sequence of 6 isolates of Magnaporthe species obtained from three different host plants. We demonstrated the evolutionary relationship between Magnaporthe species and the influence of host differentiation on pathogens. Phylogenetic analysis showed that evolution of pathogen directly corresponds with host divergence, suggesting that host-pathogen interaction has led to co-evolution. Furthermore, we identified an asymmetric selection pressure on Magnaporthe species. Oryza sativa-infecting isolates showed higher directional selection from host and subsequently tends to lower the genetic diversity in its genome. We concluded that, frequent gene loss or gain, new transposon acquisition and sequence divergence are host adaptability mechanisms for Magnaporthe species, and this coevolution processes is greatly driven by directional selection from host plants.

  16. The potential for host switching via ecological fitting in the emerald ash borer-host plant system.

    Science.gov (United States)

    Cipollini, Don; Peterson, Donnie L

    2018-02-27

    The traits used by phytophagous insects to find and utilize their ancestral hosts can lead to host range expansions, generally to closely related hosts that share visual and chemical features with ancestral hosts. Host range expansions often result from ecological fitting, which is the process whereby organisms colonize and persist in novel environments, use novel resources, or form novel associations with other species because of the suites of traits that they carry at the time they encounter the novel environment. Our objective in this review is to discuss the potential and constraints on host switching via ecological fitting in emerald ash borer, Agrilus planipennis, an ecologically and economically important invasive wood boring beetle. Once thought of as an ash (Fraxinus spp.) tree specialist, recent studies have revealed a broader potential host range than was expected for this insect. We discuss the demonstrated host-use capabilities of this beetle, as well as the potential for and barriers to the adoption of additional hosts by this beetle. We place our observations in the context of biochemical mechanisms that mediate the interaction of these beetles with their host plants and discuss whether evolutionary host shifts are a possible outcome of the interaction of this insect with novel hosts.

  17. John locke on personal identity.

    Science.gov (United States)

    Nimbalkar, Namita

    2011-01-01

    John Locke speaks of personal identity and survival of consciousness after death. A criterion of personal identity through time is given. Such a criterion specifies, insofar as that is possible, the necessary and sufficient conditions for the survival of persons. John Locke holds that personal identity is a matter of psychological continuity. He considered personal identity (or the self) to be founded on consciousness (viz. memory), and not on the substance of either the soul or the body.

  18. John Locke on Personal Identity**

    OpenAIRE

    Nimbalkar, Namita

    2011-01-01

    John Locke speaks of personal identity and survival of consciousness after death. A criterion of personal identity through time is given. Such a criterion specifies, insofar as that is possible, the necessary and sufficient conditions for the survival of persons. John Locke holds that personal identity is a matter of psychological continuity. He considered personal identity (or the self) to be founded on consciousness (viz. memory), and not on the substance of either the soul or the body.

  19. Mesoscale spatiotemporal variability in a complex host-parasite system influenced by intermediate host body size

    Directory of Open Access Journals (Sweden)

    Sara M. Rodríguez

    2017-08-01

    Full Text Available Background Parasites are essential components of natural communities, but the factors that generate skewed distributions of parasite occurrences and abundances across host populations are not well understood. Methods Here, we analyse at a seascape scale the spatiotemporal relationships of parasite exposure and host body-size with the proportion of infected hosts (i.e., prevalence and aggregation of parasite burden across ca. 150 km of the coast and over 22 months. We predicted that the effects of parasite exposure on prevalence and aggregation are dependent on host body-sizes. We used an indirect host-parasite interaction in which migratory seagulls, sandy-shore molecrabs, and an acanthocephalan worm constitute the definitive hosts, intermediate hosts, and endoparasite, respectively. In such complex systems, increments in the abundance of definitive hosts imply increments in intermediate hosts’ exposure to the parasite’s dispersive stages. Results Linear mixed-effects models showed a significant, albeit highly variable, positive relationship between seagull density and prevalence. This relationship was stronger for small (cephalothorax length >15 mm than large molecrabs (<15 mm. Independently of seagull density, large molecrabs carried significantly more parasites than small molecrabs. The analysis of the variance-to-mean ratio of per capita parasite burden showed no relationship between seagull density and mean parasite aggregation across host populations. However, the amount of unexplained variability in aggregation was strikingly higher in larger than smaller intermediate hosts. This unexplained variability was driven by a decrease in the mean-variance scaling in heavily infected large molecrabs. Conclusions These results show complex interdependencies between extrinsic and intrinsic population attributes on the structure of host-parasite interactions. We suggest that parasite accumulation—a characteristic of indirect host

  20. The theory of planned behaviour: self-identity, social identity and group norms.

    Science.gov (United States)

    Terry, D J; Hogg, M A; White, K M

    1999-09-01

    The aim of the present study was to examine further the role that self-identity plays in the theory of planned behaviour and, more specifically, to: (1) examine the combined effects of self-identity and social identity constructs on intention and behaviour, and (2) examine the effects of self-identity as a function of past experience of performing the behaviour. The study was concerned with the prediction of intention to engage in household recycling and reported recycling behaviour. A sample of 143 community residents participated in the study. It was prospective in design: measures of the predictors and intention were obtained at the first wave of data collection, whereas behaviour was assessed two weeks later. Self-identity significantly predicted behavioural intention, a relationship that was not dependent on the extent to which the behaviour had been performed in the past. As expected, there was also evidence that the perceived norm of a behaviourally relevant reference group was related to behavioural intention, but only for participants who identified strongly with the group, whereas the relationship between perceived behavioural control (a personal factor) and intention was strongest for low identifiers.

  1. Relations of Work Identity, Family Identity, Situational Demands, and Sex with Employee Work Hours

    Science.gov (United States)

    Greenhaus, Jeffrey H.; Peng, Ann C.; Allen, Tammy D.

    2012-01-01

    This study examined relations of multiple indicators of work identity and family identity with the number of weekly hours worked by 193 married business professionals. We found that men generally worked long hours regardless of the situational demands to work long hours and the strength of their work and family identities. Women's work hours, on…

  2. Family physicians' professional identity formation: a study protocol to explore impression management processes in institutional academic contexts.

    Science.gov (United States)

    Rodríguez, Charo; Pawlikowska, Teresa; Schweyer, Francois-Xavier; López-Roig, Sofia; Bélanger, Emmanuelle; Burns, Jane; Hugé, Sandrine; Pastor-Mira, Maria Ángeles; Tellier, Pierre-Paul; Spencer, Sarah; Fiquet, Laure; Pereiró-Berenguer, Inmaculada

    2014-09-06

    Despite significant differences in terms of medical training and health care context, the phenomenon of medical students' declining interest in family medicine has been well documented in North America and in many other developed countries as well. As part of a research program on family physicians' professional identity formation initiated in 2007, the purpose of the present investigation is to examine in-depth how family physicians construct their professional image in academic contexts; in other words, this study will allow us to identify and understand the processes whereby family physicians with an academic appointment seek to control the ideas others form about them as a professional group, i.e. impression management. The methodology consists of a multiple case study embedded in the perspective of institutional theory. Four international cases from Canada, France, Ireland and Spain will be conducted; the "case" is the medical school. Four levels of analysis will be considered: individual family physicians, interpersonal relationships, family physician professional group, and organization (medical school). Individual interviews and focus groups with academic family physicians will constitute the main technique for data generation, which will be complemented with a variety of documentary sources. Discourse techniques, more particularly rhetorical analysis, will be used to analyze the data gathered. Within- and cross-case analysis will then be performed. This empirical study is strongly grounded in theory and will contribute to the scant body of literature on family physicians' professional identity formation processes in medical schools. Findings will potentially have important implications for the practice of family medicine, medical education and health and educational policies.

  3. When dual identity becomes a liability: identity and political radicalism among migrants.

    Science.gov (United States)

    Simon, Bernd; Reichert, Frank; Grabow, Olga

    2013-03-01

    This article examines the role of dual identity in political radicalism among migrants. Dual identity is defined as identification with both one's ethnocultural minority in-group and one's society of residence. We employed a longitudinal research design using members of the two largest migrant groups in Germany (Turkish migrants and Russian migrants) as participants. We reasoned that when dual identity is burdened with incompatibility between component identifications, it may foster controversial or even destructive forms of political mobilization, such as radicalism. Multiple regression analysis controlling for other influences confirmed the hypothesized moderated relationship between dual identification and sympathy for radical action. When accompanied by high, as opposed to low, perceived identity incompatibility, dual identification predicted increases in sympathy for radical action among both Turkish migrants and Russian migrants. The implications for public life in ethnically and culturally heterogeneous societies are discussed.

  4. Co-creating Stakeholder and Brand Identities

    DEFF Research Database (Denmark)

    von Wallpach, Sylvia; Voyer, Benjamin; Kastanakis, Minas

    2017-01-01

    This article introduces the special section on reciprocal co-creation of stakeholder and brand identities. Branding research and practice traditionally focus on the managerial creation and implementation of brand identity. Based on recent paradigmatic shifts from managerial to co-creative branding...... and from consumer to multi-stakeholder approaches in marketing, this special section develops a dynamic, process-oriented perspective on brand identity. Brand identity continuously emerges as a dynamic outcome of social processes of stakeholder interaction. Reciprocally, brand identity plays a potentially...... important role in ongoing interactive identity development processes of stakeholders. The special section contributes to deepening the understanding of this reciprocal co-creation of stakeholder and brand identities, through a series of conceptual and empirical articles. The Introduction reviews four...

  5. Reconceptualising "Identity Slippage": Additional Language Learning and (L2) Identity Development

    Science.gov (United States)

    Armour, William

    2009-01-01

    This paper reconsiders the theoretical concept of "identity slippage" by considering a detailed exegesis of three model conversations taught to learners of Japanese as an additional language. To inform my analysis of these conversations and how they contribute to identity slippage, I have used the work of the systemic-functional linguist Jay Lemke…

  6. Elective Identities, (Culture, Identization and Integration)

    NARCIS (Netherlands)

    S.J. Magala (Slawomir)

    2002-01-01

    textabstractMost of contemporary individual and social identities (constructed with societal, cultural and technological resources) are radically autonomous, nomadic and virtual - i.e. they are de-traditionalized, open to negotiation and not based on a single interpretation of a tradition.

  7. An 'open source' networked identity

    DEFF Research Database (Denmark)

    Larsen, Malene Charlotte

    2013-01-01

    This paper examines the concept of identity in relation to youth practices on social network sites (SNS). The paper illustrates how writing “I love you” or other emotional statements on each other’s profiles on SNS is not only a common way for Danish teenagers to communicate and practice friendship...... communicative actions – are not only performing their own identity, but are becoming co-constructors of each other's identities, which the author characterizes as an 'open source' networked identity....

  8. Evaluation of a Bead-Free Coimmunoprecipitation Technique for Identification of Virus-Host Protein Interactions Using High-Resolution Mass Spectrometry.

    Science.gov (United States)

    DeBlasio, Stacy L; Bereman, Michael S; Mahoney, Jaclyn; Thannhauser, Theodore W; Gray, Stewart M; MacCoss, Michael J; Cilia Heck, Michelle

    2017-09-01

    Protein interactions between virus and host are essential for viral propagation and movement, as viruses lack most of the proteins required to thrive on their own. Precision methods aimed at disrupting virus-host interactions represent new approaches to disease management but require in-depth knowledge of the identity and binding specificity of host proteins within these interaction networks. Protein coimmunoprecipitation (co-IP) coupled with mass spectrometry (MS) provides a high-throughput way to characterize virus-host interactomes in a single experiment. Common co-IP methods use antibodies immobilized on agarose or magnetic beads to isolate virus-host complexes in solutions of host tissue homogenate. Although these workflows are well established, they can be fairly laborious and expensive. Therefore, we evaluated the feasibility of using antibody-coated microtiter plates coupled with MS analysis as an easy, less expensive way to identify host proteins that interact with Potato leafroll virus (PLRV), an insect-borne RNA virus that infects potatoes. With the use of the bead-free platform, we were able to detect 36 plant and 1 nonstructural viral protein significantly coimmunoprecipitating with PLRV. Two of these proteins, a 14-3-3 signal transduction protein and malate dehydrogenase 2 (mMDH2), were detected as having a weakened or lost association with a structural mutant of the virus, demonstrating that the bead-free method is sensitive enough to detect quantitative differences that can be used to pin-point domains of interaction. Collectively, our analysis shows that the bead-free platform is a low-cost alternative that can be used by core facilities and other investigators to identify plant and viral proteins interacting with virions and/or the viral structural proteins.

  9. Human Rights and the Excess of Identity

    Science.gov (United States)

    Al Tamimi, Yussef

    2017-01-01

    Identity is a central theme in contemporary politics, but legal academia lacks a rigorous analysis of this concept. The aim of this article is twofold: (i) firstly, it aims to reveal presumptions on identity in human rights law by mapping how the European Court of Human Rights approaches identity and (ii) secondly, it seeks to analyse these presumptions using theoretical insights on identity. By merging legal and theoretical analysis, this article contributes a reading of the Court’s case law which suggests that the tension between the political and apolitical is visible as a common thread in the Court’s use of identity. In case law concerning paternity, the Court appears to hold a specific view of what is presented as an unquestionable part of identity. This ostensibly pre-political notion of identity becomes untenable in cases where the nature of an identity feature, such as the headscarf, is contended or a minority has adopted a national identity that conflicts with the majoritarian national identity. The Court’s approach to identity in such cases reflects a paradox that is inherent to identity; identity is personal while simultaneously constituted and shaped by overarching power mechanisms. PMID:29881144

  10. Inter-identity autobiographical amnesia in patients with dissociative identity disorder

    OpenAIRE

    Huntjens, Rafaele JC; Verschuere, Bruno; McNally, Richard J

    2012-01-01

    Background: A major symptom of Dissociative Identity Disorder (DID; formerly Multiple Personality Disorder) is dissociative amnesia, the inability to recall important personal information. Only two case studies have directly addressed autobiographical memory in DID. Both provided evidence suggestive of dissociative amnesia. The aim of the current study was to objectively assess transfer of autobiographical information between identities in a larger sample of DID patients. Methods: Using a c...

  11. A Comparison Between Inter-Asterisk eXchange Protocol and Jingle Protocol: Session Time

    Directory of Open Access Journals (Sweden)

    H. S. Haj Aliwi

    2016-08-01

    Full Text Available Over the last few years, many multimedia conferencing and Voice over Internet Protocol (VoIP applications have been developed due to the use of signaling protocols in providing video, audio and text chatting services between at least two participants. This paper compares between two widely common signaling protocols: InterAsterisk eXchange Protocol (IAX and the extension of the eXtensible Messaging and Presence Protocol (Jingle in terms of delay time during call setup, call teardown, and media sessions.

  12. Comparison between stress myocardial perfusion SPECT recorded with cadmium-zinc-telluride and Anger cameras in various study protocols

    International Nuclear Information System (INIS)

    Verger, Antoine; Karcher, Gilles; Djaballah, Wassila; Fourquet, Nicolas; Rouzet, Francois; Le Guludec, Dominique; Koehl, Gregoire; Roch, Veronique; Imbert, Laetitia; Poussier, Sylvain; Fay, Renaud; Marie, Pierre-Yves

    2013-01-01

    The results of stress myocardial perfusion SPECT could be enhanced by new cadmium-zinc-telluride (CZT) cameras, although differences compared to the results with conventional Anger cameras remain poorly known for most study protocols. This study was aimed at comparing the results of CZT and Anger SPECT according to various study protocols while taking into account the influence of obesity. The study population, which was from three different institutions equipped with identical CZT cameras, comprised 276 patients referred for study using protocols involving 201 Tl (n = 120) or 99m Tc-sestamibi injected at low dose at stress ( 99m Tc-Low; stress/rest 1-day protocol; n = 110) or at high dose at stress ( 99m Tc-High; rest/stress 1-day or 2-day protocol; n = 46). Each Anger SPECT scan was followed by a high-speed CZT SPECT scan (2 to 4 min). Agreement rates between CZT and Anger SPECT were good irrespective of the study protocol (for abnormal SPECT, 201 Tl 92 %, 99m Tc-Low 86 %, 99m Tc-High 98 %), although quality scores were much higher for CZT SPECT with all study protocols. Overall correlations were high for the extent of myocardial infarction (r = 0.80) and a little lower for ischaemic areas (r = 0.72), the latter being larger on Anger SPECT (p 201 Tl or 99m Tc-Low group and in whom stress myocardial counts were particularly low with Anger SPECT (228 ± 101 kcounts) and dramatically enhanced with CZT SPECT (+279 ± 251 %). Concordance between the results of CZT and Anger SPECT is good regardless of study protocol and especially when excluding obese patients who have low-count Anger SPECT and for whom myocardial counts are dramatically enhanced on CZT SPECT. (orig.)

  13. The Drosophila melanogaster host model

    Science.gov (United States)

    Igboin, Christina O.; Griffen, Ann L.; Leys, Eugene J.

    2012-01-01

    The deleterious and sometimes fatal outcomes of bacterial infectious diseases are the net result of the interactions between the pathogen and the host, and the genetically tractable fruit fly, Drosophila melanogaster, has emerged as a valuable tool for modeling the pathogen–host interactions of a wide variety of bacteria. These studies have revealed that there is a remarkable conservation of bacterial pathogenesis and host defence mechanisms between higher host organisms and Drosophila. This review presents an in-depth discussion of the Drosophila immune response, the Drosophila killing model, and the use of the model to examine bacterial–host interactions. The recent introduction of the Drosophila model into the oral microbiology field is discussed, specifically the use of the model to examine Porphyromonas gingivalis–host interactions, and finally the potential uses of this powerful model system to further elucidate oral bacterial-host interactions are addressed. PMID:22368770

  14. The Drosophila melanogaster host model

    Directory of Open Access Journals (Sweden)

    Christina O. Igboin

    2012-02-01

    Full Text Available The deleterious and sometimes fatal outcomes of bacterial infectious diseases are the net result of the interactions between the pathogen and the host, and the genetically tractable fruit fly, Drosophila melanogaster, has emerged as a valuable tool for modeling the pathogen–host interactions of a wide variety of bacteria. These studies have revealed that there is a remarkable conservation of bacterial pathogenesis and host defence mechanisms between higher host organisms and Drosophila. This review presents an in-depth discussion of the Drosophila immune response, the Drosophila killing model, and the use of the model to examine bacterial–host interactions. The recent introduction of the Drosophila model into the oral microbiology field is discussed, specifically the use of the model to examine Porphyromonas gingivalis–host interactions, and finally the potential uses of this powerful model system to further elucidate oral bacterial-host interactions are addressed.

  15. The Drosophila melanogaster host model.

    Science.gov (United States)

    Igboin, Christina O; Griffen, Ann L; Leys, Eugene J

    2012-01-01

    The deleterious and sometimes fatal outcomes of bacterial infectious diseases are the net result of the interactions between the pathogen and the host, and the genetically tractable fruit fly, Drosophila melanogaster, has emerged as a valuable tool for modeling the pathogen-host interactions of a wide variety of bacteria. These studies have revealed that there is a remarkable conservation of bacterial pathogenesis and host defence mechanisms between higher host organisms and Drosophila. This review presents an in-depth discussion of the Drosophila immune response, the Drosophila killing model, and the use of the model to examine bacterial-host interactions. The recent introduction of the Drosophila model into the oral microbiology field is discussed, specifically the use of the model to examine Porphyromonas gingivalis-host interactions, and finally the potential uses of this powerful model system to further elucidate oral bacterial-host interactions are addressed.

  16. Queering Black Racial Identity Development

    Science.gov (United States)

    Johnson, Alandis A.; Quaye, Stephen John

    2017-01-01

    We used queer theory to encourage readers to think differently about previous theories about Black racial identity development. Queer theory facilitates new and deeper understandings of how Black people develop their racial identities, prompting more fluidity and nuance. Specifically, we present a queered model of Black racial identity development…

  17. Developing a workable teacher identity: Building and negotiating identity within a professional network

    Science.gov (United States)

    Rostock, Roseanne

    The challenge of attracting and retaining the next generation of teachers who are skilled and committed to meeting the growing demands of the profession is of increasing concern to researchers and policy makers, particularly since 45--50% of beginning teachers leave the profession within five years (Ingersoll & Smith, 2003). Reasons for such attrition include compensation, status and working conditions; however, there is growing evidence that a critical factor in new teacher retention hinges on teachers' ability to accomplish the difficult task of forming a workable professional identity in the midst of competing discourses about teaching (Alsup, 2006; Britzman, 2003). There is little research on professional identity development among those beginning teachers at highest risk for attrition (secondary math and science teachers, and those with strong academic backgrounds). This study explores the professional identity development of early-career math and science teachers who are part of the Knowles Science Teaching Foundation's (KSTF) teaching fellowship program, an external support network that aims to address many of the issues leading to high attrition among this particular population of teachers. Using narrative research methods, I examine three case studies of beginning teachers, exploring how they construct professional identity in relation to various discourse communities and negotiate tensions across multiple discourses. The cases identify both dominant discourses and counter-discourses that the teachers draw upon for important identity development resources. They also demonstrate that the way a teacher manages tensions across competing discourses is important to how well one can negotiate a workable professional identity. In particular, they emphasize the importance of engaging in borderland discourses (Gee, 1996) as a way of taking agency in one's own identity development as well as in transforming one's discourse communities. These cases shed light on how

  18. Constraints on the Nature and Distribution of Iridium Host Phases at the Cretaceous-Tertiary Boundary: Implications for Projectile Identity and dispersal on impact

    Science.gov (United States)

    Schuraytz, B. C.; Lindstrom, D. J.; Sharpton, V. L.

    1997-01-01

    Among Cretaceous-Tertiary boundary sites worldwide, variations in the concentrations and ratios of elements commonly enriched in meteorites complicate traditional geochemical attempts at impactor identification. Yet they may provide constraints on the physical and chemical processes associated with large-body disruption and dispersal, as well as with diagenesis of projectile components. To this end, we continue our efforts to identify the mineral host-phases of projectile-derived elements, particularly for Ir, and to document their partitioning between crater deposits and ejecta resulting from the Chicxulub basin-forming impact. Building on earlier work, we used INAA to measure Ir concentrations in successively smaller splits of finely powdered impact melt breccia from the Chicxulub Crater in Mexico (sample Y6Nl9-R(b)), and K/T boundary fish clay from Stevns Klint, Denmark (sample FC-1, split from 40 kg of homogenized material intended as an analytical standard). Results for the Chicxulub sample show a heterogeneous Ir distribution and document that at least five discrete Ir-bearing host phases were isolated in subsequent splits, having Ir masses equivalent to pure Ir spheres from about 0.8 to about 3.5 mm in diameter. Three of these are within a sufficiently reduced mass of powder to warrant searching for them using backscattered electron microscopy. In contrast, successively smaller splits of the Stevns Klint fish clay show no statistically significant deviation from the reported value of 32 +/- 2 ng/g Ir, suggesting a uniform Ir host-phase distribution. For the smallest split obtained thus far (100 +/- 40 ng/g Ir), a pure Ir sphere of equivalent Ir mass would be <0.05 min in diameter. (n.b. Although homogenizing and sieving of FC-1 to <75 min obviously obscured variations in stratigraphic distribution, it is unlikely to have affected the size-frequency distribution of Ir host phases.) We previously identified micrometer-scale Ir host phases by electron

  19. Understanding Identity and Organizations

    DEFF Research Database (Denmark)

    Christensen, Lars Thøger

    2013-01-01

    The article reviews the book "Understanding Identity and Organizations," by Kate Kenny, Andrea Whitle, and Hugh Wilmott.......The article reviews the book "Understanding Identity and Organizations," by Kate Kenny, Andrea Whitle, and Hugh Wilmott....

  20. Researching Identity and Interculturality

    DEFF Research Database (Denmark)

    Lønsmann, Dorte

    2016-01-01

    Review of: Researching Identity and Interculturality / by F. Dervin and K. Risager (eds.). Routledge 2015, 245 pp.......Review of: Researching Identity and Interculturality / by F. Dervin and K. Risager (eds.). Routledge 2015, 245 pp....

  1. Decellularization and Delipidation Protocols of Bovine Bone and Pericardium for Bone Grafting and Guided Bone Regeneration Procedures.

    Directory of Open Access Journals (Sweden)

    Chiara Gardin

    Full Text Available The combination of bone grafting materials with guided bone regeneration (GBR membranes seems to provide promising results to restore bone defects in dental clinical practice. In the first part of this work, a novel protocol for decellularization and delipidation of bovine bone, based on multiple steps of thermal shock, washes with detergent and dehydration with alcohol, is described. This protocol is more effective in removal of cellular materials, and shows superior biocompatibility compared to other three methods tested in this study. Furthermore, histological and morphological analyses confirm the maintenance of an intact bone extracellular matrix (ECM. In vitro and in vivo experiments evidence osteoinductive and osteoconductive properties of the produced scaffold, respectively. In the second part of this study, two methods of bovine pericardium decellularization are compared. The osmotic shock-based protocol gives better results in terms of removal of cell components, biocompatibility, maintenance of native ECM structure, and host tissue reaction, in respect to the freeze/thaw method. Overall, the results of this study demonstrate the characterization of a novel protocol for the decellularization of bovine bone to be used as bone graft, and the acquisition of a method to produce a pericardium membrane suitable for GBR applications.

  2. Researcher Identities in Transition

    DEFF Research Database (Denmark)

    Castelló, Montserrat; Wisker, Gina; Kobayashi, Sofie

    as other emergent ‘signals’, the latent or clear indications from institutions and academic communities regarding career directions and necessary professional skills and attitudes should be identified and interpreted for researchers to adequately develop their new identities. The aim of this paper......Researchers are now embarked upon what we define as a ‘risk career’, rather than, as previously, a relatively more predictable academic career. In this changing context, traditional milestones that enabled early career researchers to build their identities are disappearing. Instead, what we define...... is twofold: a) to present a comprehensive framework of the notion of researcher identity by means of analysing those spheres of activity related to researcher and career development; and b) to relate researcher identities to the experiences of early career researchers with issues concerning signals...

  3. Rights of Identity

    Directory of Open Access Journals (Sweden)

    Daniel Kofman

    2017-01-01

    Full Text Available A person’s identity is their sense of who and what they are, of who stands in significant relations to them, and of what is valuable to them. This is inevitably very broad, an immediate implication of which is that the concept of identity taken alone cannot do significant normative work. In some cases a person’s identity is bound up with the evil that they do or wish to do, and cannot thereby give them any right to do it. In other cases very powerful elements of a person’s identity – such as their attachment to loved ones – is certainly related to important rights, but it is not entirely clear that one needs the concept of identity to explicate or justify these rights; the deep involvement of their identity is arguably a byproduct of other important values in these cases (such as love, and those values can do the grounding work of the rights by themselves and more simply and clearly. Nevertheless, when suitably qualified, a person’s identity is central to accounting for important political rights. These ranges from rights to participate in cultural practices of one’s group, which sometimes implies duties on governments to support minorities threatened with extinction, to – at the outer limit – rights to arrange political administration. These rights are connected to both autonomy and fairness. Cultural rights are often taken either to be opposed to autonomy, or at best instrumental to personal autonomy (by providing ‘options’, but in fact, the ideal of autonomy, expressed by Mill as being the author of one’s life, requires that one be in control of significant aspects of one’s identity. Significant aspects of one’s identity are collectively determined within a culture. Cultures are not static, and their development is particularly affected by political boundaries. A fundamental right of autonomy implies, therefore, that groups be allowed, within reasonable constraints of general feasibility and stability, to arrange

  4. The Quest for Identity in Adolescence: Heterogeneity in Daily Identity Formation and Psychosocial Adjustment across 5 Years

    Science.gov (United States)

    Becht, Andrik I.; Nelemans, Stefanie A.; Branje, Susan J. T.; Vollebergh, Wilma A. M.; Koot, Hans M.; Denissen, Jaap J. A.; Meeus, Wim H. J.

    2016-01-01

    Identity formation is one of the key developmental tasks in adolescence. According to Erikson (1968) experiencing identity uncertainty is normative in adolescence. However, empirical studies investigating identity uncertainty on a daily basis are lacking. Hence, studying individual differences in daily certainty (i.e., identity commitment levels)…

  5. Identity Development in Deaf Adolescents

    Science.gov (United States)

    Kunnen, E. Saskia

    2014-01-01

    We studied identity development during 5 years in seven deaf adolescents who attended a school for deaf children in the highest level of regular secondary education (age between 14 and 18 years), administering identity interviews every year. Identity development is conceptualized as the processes of exploration and commitment formation (Bosma,…

  6. Ocular oxyspirurosis of primates in zoos: intermediate host, worm morphology, and probable origin of the infection in the Moscow zoo

    Directory of Open Access Journals (Sweden)

    Ivanova E.

    2007-12-01

    Full Text Available Over the last century, only two cases of ocular oxyspirurosis were recorded in primates, both in zoos, and two species were described: in Berlin, Germany, Oxyspirura (O. conjunctivalis from the lemurid Microcebus murinus, later also found in the lorisid Loris gracilis; in Jacksonville, Florida, O. (O. youngi from the cercopithecid monkey Erythrocebus patas. In the present case from the Moscow zoo, oxyspirurosis was recorded in several species of Old World lemuriforms and lorisiforms, and some South American monkeys. i The intermediate host was discovered to be a cockroach, as for O. (O. mansoni, a parasite of poultry. The complete sequence identity between ITS-1 rDNA from adult nematodes of the primate and that of the larval worms from the vector, Nauphoete cinerea, confirmed their conspecificity. ii Parasites from Moscow zoo recovered from Nycticebus c. coucang were compared morphologically to those from other zoos. The length and shape of the gubernaculum, used previously as a distinct character, were found to be variable. However, the vulvar bosses arrangement, the distal extremity of left spicule and the position of papillae of the first postcloacal pair showed that the worms in the different samples were not exactly identical and that each set seemed characteristic of a particular zoo. iii The presence of longitudinal cuticular crests in the infective stage as well as in adult worms was recorded. Together with several other morphological and biological characters (long tail and oesophagus, cockroach vector, this confirmed that Oxyspirura is not closely related to Thelazia, another ocular parasite genus. iv The disease in the Moscow zoo is thought to have started with Nycticebus pygmaeus imported fromVietnam, thus the suggestion was that Asiatic lorisids were at the origin of the Moscow set of cases. The natural host(s for the Berlin and Jacksonville cases remain unknown but they are unlikely to be the species found infected in zoos

  7. Comparison of DNA extraction protocols to detect Mycobacterium bovis in bovine tissue by PCR

    Directory of Open Access Journals (Sweden)

    Cássia Yumi Ikuta

    2016-11-01

    Full Text Available The current scenario of international beef trading has increased the pressure for better and faster diagnosis of bovine tuberculosis. Although traditional culture remains the gold standard method to confirm Mycobacterium bovis infection, it is exceedingly time consuming, and demands viable mycobacteria. Molecular methods overcome the flaws of the bacteriological methods with faster detection and identification. However, mycobacterial features like a complex cell wall and pathogen–host interaction make the molecular detection a challenge. Three protocols for DNA extraction (A, B and C from bovine tissues were tested to verify the most suitable technique for routine diagnostic assessment of their specificity and sensitivity. Thirty culture-positive and thirty culture-negative granulomatous lesions were included in the trial. From each sample, three tissue suspensions at different dilutions (10-1, 10-2 and 10-3 were prepared and submitted to DNA extraction. PCR procedures targeting IS6110 were performed, employing two volumes of DNA: 5 µL of all three dilutions, and 2.5 µL of the 10-1 dilution. Protocol A was able to detect members of the M. tuberculosis complex in most samples. The sensitivity of the test decreased with increase in tissue-suspension dilution. Although Protocol A presented the highest sensitivity followed by C and B, it showed the lowest specificity, which can be due to a failure in primary isolation caused by the lack of viable organisms or incubation time. Regardless classical bacteriological methods are still recommended by OIE, after evaluating the sensitivity of DNA extraction protocols and PCR procedures, we conclude that the best strategy for M. bovis detection is to follow Protocol A on concentrated tissue suspensions.

  8. Science Identity in Informal Education

    Science.gov (United States)

    Schon, Jennifer A.

    The national drive to increase the number of students pursuing Science Technology, Engineering, and Math (STEM) careers has brought science identity into focus for educators, with the need to determine what encourages students to pursue and persist in STEM careers. Science identity, the degree to which students think someone like them could be a scientist is a potential indicator of students pursuing and persisting in STEM related fields. Science identity, as defined by Carlone and Johnson (2007) consists of three constructs: competence, performance, and recognition. Students need to feel like they are good at science, can perform it well, and that others recognize them for these achievements in order to develop a science identity. These constructs can be bolstered by student visitation to informal education centers. Informal education centers, such as outdoor science schools, museums, and various learning centers can have a positive impact on how students view themselves as scientists by exposing them to novel and unique learning opportunities unavailable in their school. Specifically, the University of Idaho's McCall Outdoor Science School (MOSS) focuses on providing K-12 students with the opportunity to learn about science with a place-based, hands-on, inquiry-based curriculum that hopes to foster science identity development. To understand the constructs that lead to science identity formation and the impact the MOSS program has on science identity development, several questions were explored examining how students define the constructs and if the MOSS program impacted how they rate themselves within each construct. A mixed-method research approach was used consisting of focus group interviews with students and pre, post, one-month posttests for visiting students to look at change in science identity over time. Results from confirmatory factor analysis indicate that the instrument created is a good fit for examining science identity and the associated

  9. Host sharing and host manipulation by larval helminths in shore crabs: cooperation or conflict?

    Science.gov (United States)

    Poulin, Robert; Nichol, Katherine; Latham, A David M

    2003-04-01

    Larval helminths of different species that share the same intermediate host and are transmitted by predation to the same definitive host may cooperate in their attempts to manipulate the behaviour of the intermediate host, while at the same time having conflicts of interests over the use of host resources. A few studies have indicated that intermediate hosts harbouring larval helminths have altered concentrations of neurotransmitters in their nervous system, and thus measuring levels of neurotransmitters in host brains could serve to assess the respective and combined effect of different helminth species on host behaviour. Here, we investigate potential cooperation and conflict among three helminths in two species of crab intermediate hosts. The acanthocephalan Profilicollis spp., the trematode Maritrema sp. and an acuariid nematode, all use Macrophthalmus hirtipes (Ocypodidae) as intermediate host, whereas Profilicollis and Maritrema also use Hemigrapsus crenulatus (Grapsidae). All three helminths mature inside gulls or other shore birds. There was a significant decrease in the mean volume of Profilicollis cystacanths as the intensity of infection by this parasite increased in H. crenulatus, the only host in which this was investigated; however, there was no measurable effect of other helminth species on the size of acanthocephalans, suggesting no interspecific conflict over resource use within crabs. There was, in contrast, evidence of a positive interspecific association between the two most common helminth species: numbers of Profilicollis and Maritrema were positively correlated among crabs, independently of crab size, in M. hirtipes but not H. crenulatus. More importantly, we found that the total number of larval helminths per crab correlated significantly, and negatively, with concentrations of serotonin in crab brains, again only in M. hirtipes; numbers of each parasite species separately did not covary in either crab species with serotonin or dopamine, the

  10. Animal salmonelloses: a brief review of “host adaptation and host specificity” of Salmonella spp.

    Directory of Open Access Journals (Sweden)

    Grammato Evangelopoulou

    2013-07-01

    Full Text Available Salmonella enterica, the most pathogenic species of the genusSalmonella, includes more than 2,500 serovars, many of which are of great veterinary and medical significance. The emergence of food-borne pathogens, such as Salmonella spp., has increased knowledge about the mechanisms helping microorganisms to persist and spread within new host populations. It has also increased information about the properties they acquire for adapting in the biological environment of a new host. Thedifferences observed between serovars in their host preference and clinical manifestations are referred to as “serovar-host specificity” or “serovar-host adaptation”. The genus Salmonella, highly adaptive to vertebrate hosts, has many pathogenic serovars showing host specificity. Serovar Salmonella Typhi, causing disease to man and higher primates, is a good example of host specificity. Thus, understanding the mechanisms that Salmonella serovars use to overcome animal species' barriers or adapt to new hosts is also important for understanding the origins of any other infectious diseases or the emergence of new pathogens. In addition, molecular methods used to study the virulence determinants of Salmonella serovars, could also be used to model ways of studying the virulence determinants used by bacteria in general, when causing disease to a specific animal species

  11. Identity and Diversity in Today's World

    Science.gov (United States)

    Gee, James Paul

    2017-01-01

    This paper develops a thesis about identity and diversity. I first look at activity-based identities, identities like being a gardener, birder, citizen scientist or fan-fiction writer. These are freely chosen identities and they are proliferating at a great rate today thanks to participatory culture, the Maker Movement and digital and social…

  12. Lift of dilogarithm to partition identities

    International Nuclear Information System (INIS)

    Terhoeven, M.

    1992-11-01

    For the whole set of dilogarithm identities found recently using the thermodynamic Bethe-Ansatz for the ADET series of purely elastic scattering theories we give partition identities which involve characters of those conformal field theories which correspond to the UV-limits of the scattering theories. These partition identities in turn allow to derive the dilogarithm identities using modular invariance and a saddle point approximation. We conjecture on possible generalizations of this correspondance, namely, a lift from dilogarithm to partition identities. (orig.)

  13. Potential Sympatric Vectors and Mammalian Hosts of Venezuelan Equine Encephalitis Virus in Southern Mexico.

    Science.gov (United States)

    Sotomayor-Bonilla, Jesús; Abella-Medrano, Carlos Antonio; Chaves, Andrea; Álvarez-Mendizábal, Paulina; Rico-Chávez, Óscar; Ibáñez-Bernal, Sergio; Rostal, Melinda K; Ojeda-Flores, Rafael; Barbachano-Guerrero, Arturo; Gutiérrez-Espeleta, Gustavo; Aguirre, A Alonso; Daszak, Peter; Suzán, Gerardo

    2017-07-01

    Arboviruses are important zoonotic agents with complex transmission cycles and are not well understood because they may involve many vectors and hosts. We studied sympatric wild mammals and hematophagous mosquitoes having the potential to act as hosts and vectors in two areas of southern Mexico. Mosquitoes, bats, and rodents were captured in Calakmul (Campeche) and Montes Azules (Chiapas), between November 2010 and August 2011. Spleen samples from 146 bats and 14 rodents were tested for molecular evidence of Venezuelan equine encephalitis virus (VEEV), eastern equine encephalitis virus (EEEV), western equine encephalitis virus (WEEV), and West Nile virus (WNV) using PCR protocols. Bat ( Artibeus lituratus , Carollia sowelli , Glossophaga soricina , and Sturnira parvidens) and rodent ( Sigmodon hispidus and Oryzomys alfaroi ) species were positive for VEEV. No individuals were positive for WNV, EEEV, or WEEV. A total of 1,298 mosquitoes were collected at the same sites, and five of the mosquito species collected were known VEEV vectors (Aedes fulvus, Mansonia indubitans, Psorophora ferox, Psorophora cilipes, and Psorophora confinnis). This survey simultaneously presents the first molecular evidence, to our knowledge, of VEEV in bats and rodents from southern Mexico and the identification of potential sympatric vectors. Studies investigating sympatric nonhuman hosts, vectors, and arboviruses must be expanded to determine arboviral dynamics in complex systems in which outbreaks of emerging and reemerging zoonoses are continuously occurring.

  14. Host-Plant Specialization Mediates the Influence of Plant Abundance on Host Use by Flower Head-Feeding Insects.

    Science.gov (United States)

    Nobre, Paola A F; Bergamini, Leonardo L; Lewinsohn, Thomas M; Jorge, Leonardo R; Almeida-Neto, Mário

    2016-02-01

    Among-population variation in host use is a common phenomenon in herbivorous insects. The simplest and most trivial explanation for such variation in host use is the among-site variation in plant species composition. Another aspect that can influence spatial variation in host use is the relative abundance of each host-plant species compared to all available hosts. Here, we used endophagous insects that develop in flower heads of Asteraceae species as a study system to investigate how plant abundance influences the pattern of host-plant use by herbivorous insects with distinct levels of host-range specialization. Only herbivores recorded on three or more host species were included in this study. In particular, we tested two related hypotheses: 1) plant abundance has a positive effect on the host-plant preference of herbivorous insects, and 2) the relative importance of plant abundance to host-plant preference is greater for herbivorous species that use a wider range of host-plant species. We analyzed 11 herbivore species in 20 remnants of Cerrado in Southeastern Brazil. For 8 out of 11 herbivore species, plant abundance had a positive influence on host use. In contrast to our expectation, both the most specialized and the most generalist herbivores showed a stronger positive effect of plant species abundance in host use. Thus, we found evidence that although the abundance of plant species is a major factor determining the preferential use of host plants, its relative importance is mediated by the host-range specialization of herbivores.

  15. The effects of smoking self-identity and quitting self-identity on attempts to quit smoking

    NARCIS (Netherlands)

    van den Putte, B.; Yzer, M.C.; Willemsen, M.C.; de Bruijn, G.J.

    2009-01-01

    Objective: To examine the effect of two types of self-identity on attempts to quit smoking: self-identity in terms of smoking and self-identity in terms of quitting. Design: A prospective survey among an initial sample of 3,411 smokers. Smoking history variables and psychosocial variables from the

  16. A case of membranous nephropathy as a manifestation of graft-versus-host disease

    Directory of Open Access Journals (Sweden)

    Jae Hyun Han

    2013-03-01

    Full Text Available Nephrotic syndrome (NS rarely occurs after hematopoietic stem cell transplantation (HSCT as a late manifestation of graft-versus-host disease (GVHD. Herein, we report a case of HSCT-associated membranous nephropathy in a female patient with aplastic anemia. The patient received an allogeneic HSCT from her human leukocyte antigen-identical brother following myeloablative conditioning chemotherapy. NS occurred 21 months after HSCT without any concurrent features of chronic GVHD. The patient was treated with prednisolone and cyclosporine after renal biopsy confirmed membranous nephropathy, and achieved complete remission. Our report contradicts previous assumptions that concomitant chronic GVHD is responsible for the development of NS, suggesting that NS can develop as a new, independent manifestation of GVHD.

  17. A Network Topology Control and Identity Authentication Protocol with Support for Movable Sensor Nodes.

    Science.gov (United States)

    Zhang, Ying; Chen, Wei; Liang, Jixing; Zheng, Bingxin; Jiang, Shengming

    2015-12-01

    It is expected that in the near future wireless sensor network (WSNs) will be more widely used in the mobile environment, in applications such as Autonomous Underwater Vehicles (AUVs) for marine monitoring and mobile robots for environmental investigation. The sensor nodes' mobility can easily cause changes to the structure of a network topology, and lead to the decline in the amount of transmitted data, excessive energy consumption, and lack of security. To solve these problems, a kind of efficient Topology Control algorithm for node Mobility (TCM) is proposed. In the topology construction stage, an efficient clustering algorithm is adopted, which supports sensor node movement. It can ensure the balance of clustering, and reduce the energy consumption. In the topology maintenance stage, the digital signature authentication based on Error Correction Code (ECC) and the communication mechanism of soft handover are adopted. After verifying the legal identity of the mobile nodes, secure communications can be established, and this can increase the amount of data transmitted. Compared to some existing schemes, the proposed scheme has significant advantages regarding network topology stability, amounts of data transferred, lifetime and safety performance of the network.

  18. The French dosimetry protocol

    International Nuclear Information System (INIS)

    Dutreix, A.

    1985-01-01

    After a general introduction the protocol is divided in five sections dealing with: determination of the quality of X-ray, γ-ray and electron beams; the measuring instrument; calibration of the reference instrument; determination of the reference absorbed dose in the user's beams; determination of the absorbed dose in water at other points, in other conditions. The French protocol is not essentially different from the Nordic protocol and it is based on the experience gained in using both the American and the Nordic protocols. Therefore, only the main difference with the published protocols are discussed. (Auth.)

  19. Guidelines for Hosted Payload Integration

    Science.gov (United States)

    2014-06-06

    reduces risk. Need to consider mass simulator to protect host launch window. Average Payload Power Both BOL and EOL . Host must consider orbit...acceptance testing. Peak Payload Power Both BOL and EOL . Host must consider orbit constraints. Typically driven by Payload operations but must...post-retirement failure might cause damage to the Spacecraft Host or its payloads. Safe conditions at EOL should consider thermal and radiation

  20. Strengthen Cloud Computing Security with Federal Identity Management Using Hierarchical Identity-Based Cryptography

    Science.gov (United States)

    Yan, Liang; Rong, Chunming; Zhao, Gansen

    More and more companies begin to provide different kinds of cloud computing services for Internet users at the same time these services also bring some security problems. Currently the majority of cloud computing systems provide digital identity for users to access their services, this will bring some inconvenience for a hybrid cloud that includes multiple private clouds and/or public clouds. Today most cloud computing system use asymmetric and traditional public key cryptography to provide data security and mutual authentication. Identity-based cryptography has some attraction characteristics that seem to fit well the requirements of cloud computing. In this paper, by adopting federated identity management together with hierarchical identity-based cryptography (HIBC), not only the key distribution but also the mutual authentication can be simplified in the cloud.

  1. 21 CFR 610.14 - Identity.

    Science.gov (United States)

    2010-04-01

    ... 21 Food and Drugs 7 2010-04-01 2010-04-01 false Identity. 610.14 Section 610.14 Food and Drugs... BIOLOGICAL PRODUCTS STANDARDS General Provisions § 610.14 Identity. The contents of a final container of each filling of each lot shall be tested for identity after all labeling operations shall have been completed...

  2. Real-time PCR protocols for the quantification of the begomovirus tomato yellow leaf curl Sardinia virus in tomato plants and in its insect vector.

    Science.gov (United States)

    Noris, Emanuela; Miozzi, Laura

    2015-01-01

    Tomato yellow leaf curl Sardinia virus (TYLCSV) (Geminiviridae) is an important pathogen, transmitted by the whitefly Bemisia tabaci, that severely affects the tomato production in the Mediterranean basin. Here, we describe real-time PCR protocols suitable for relative and absolute quantification of TYLCSV in tomato plants and in whitefly extracts. Using primers and probe specifically designed for TYLCSV, the protocols for relative quantification allow to compare the amount of TYLCSV present in different plant or whitefly samples, normalized to the amount of DNA present in each sample using endogenous tomato or Bemisia genes as internal references. The absolute quantification protocol allows to calculate the number of genomic units of TYLCSV over the genomic units of the plant host (tomato), with a sensitivity of as few as ten viral genome copies per sample. The described protocols are potentially suitable for several applications, such as plant breeding for resistance, analysis of virus replication, and virus-vector interaction studies.

  3. [The host community of a child with food allergies: the personalized care project (PCP)].

    Science.gov (United States)

    Rancé, F

    2010-12-01

    The personalized care project (PCP) can manage allergic emergencies that may occur during school hours. Other objectives are to facilitate academic achievement, social and professional integration of children and adolescents with chronic illness such as food allergy, by promoting education through certain changes. The PCP is derived from official files including Circular N(o) 2003-135 of September 8 and the inter-ministerial circular of 25 June 2001. The family must request a protocol with the host school principal or school head. Then, the doctor of Education organizes the drafting of the document based on information provided by the physician (or allergist). Copyright © 2010 Elsevier Masson SAS. All rights reserved.

  4. Canopy soil bacterial communities altered by severing host tree limbs

    Directory of Open Access Journals (Sweden)

    Cody R. Dangerfield

    2017-09-01

    Full Text Available Trees of temperate rainforests host a large biomass of epiphytic plants, which are associated with soils formed in the forest canopy. Falling of epiphytic material results in the transfer of carbon and nutrients from the canopy to the forest floor. This study provides the first characterization of bacterial communities in canopy soils enabled by high-depth environmental sequencing of 16S rRNA genes. Canopy soil included many of the same major taxonomic groups of Bacteria that are also found in ground soil, but canopy bacterial communities were lower in diversity and contained different operational taxonomic units. A field experiment was conducted with epiphytic material from six Acer macrophyllum trees in Olympic National Park, Washington, USA to document changes in the bacterial communities of soils associated with epiphytic material that falls to the forest floor. Bacterial diversity and composition of canopy soil was highly similar, but not identical, to adjacent ground soil two years after transfer to the forest floor, indicating that canopy bacteria are almost, but not completely, replaced by ground soil bacteria. Furthermore, soil associated with epiphytic material on branches that were severed from the host tree and suspended in the canopy contained altered bacterial communities that were distinct from those in canopy material moved to the forest floor. Therefore, the unique nature of canopy soil bacteria is determined in part by the host tree and not only by the physical environmental conditions associated with the canopy. Connection to the living tree appears to be a key feature of the canopy habitat. These results represent an initial survey of bacterial diversity of the canopy and provide a foundation upon which future studies can more fully investigate the ecological and evolutionary dynamics of these communities.

  5. Primary Identity in Literature

    DEFF Research Database (Denmark)

    Graham, Brian Russell

    In our times, literary criticism, as well as larger political and cultural developments, is characterized by identity politics, meaning that our discourses are structured around the notion of different socially identifiable populations in society. In relation to literature, this results in our...... viewing the characters in literature in terms of these political identities. Literature is consequently discussed in relation to political causes. Literary criticism is animated by the same causes, and is viewed as having a direct intervention in society in relation to them. In this paper, I will discuss......, in relation to Frye’s works, the idea that the primary identities of characters in literature were and, to a considerable extent, continue to be those of family-member identities. As such, literature should not be appropriated to a political context too readily. Whereas viewing characters in terms of...

  6. Reciprocal cross infection of sticklebacks with the diphyllobothriidean cestode Schistocephalus solidus reveals consistent population differences in parasite growth and host resistance.

    Science.gov (United States)

    Kalbe, Martin; Eizaguirre, Christophe; Scharsack, Jörn P; Jakobsen, Per J

    2016-03-08

    In host-parasite evolutionary arms races, parasites are generally expected to adapt more rapidly, due to their large population sizes and short generation times. There exist systems, though, where parasites cannot outpace their hosts because of similar generation times in both antagonists. In those cases concomitant adaptation is expected. We tested this hypothesis in the three-spined stickleback-Schistocephalus solidus tapeworm system, where generation times are comparable in both organisms. We chose two populations of sticklebacks which differ prominently in the prevalence of S. solidus and consequently in its level of selective pressure. We performed a full factorial common garden experiment. Particularly, Norwegian (NO) and German (DE) sticklebacks, as well as hybrids between both stickleback populations and in both parental combinations, were exposed each to a single S. solidus originating from the same two host populations. We found the infection phenotype to depend on the host population, the parasite population, but not their interaction. NO-parasites showed higher infectivity than DE-parasites, with NO-sticklebacks also being more resistant to DE-parasites than to the sympatric NO-parasite. Reciprocally, DE-hosts were more susceptible to the allopatric NO-parasite while DE-parasites grew less than NO-parasites in all stickleback groups. Despite this asymmetry, the ratio of worm to host weight, an indicator of parasite virulence, was identical in both sympatric combinations, suggesting an optimal virulence as a common outcome of parallel coevolved systems. In hybrid sticklebacks, intermediate infection rates and growth of S. solidus from either origin suggests a simple genetic basis of resistance. However, comparison of infection phenotypes in NO-maternal and DE-maternal hybrid sticklebacks indicates local adaptation to the sympatric counterpart in both the host and the parasite. Host-parasite systems with similar generation time show evidence for

  7. Ethnic Identity, Bicultural Identity Integration, and Psychological Well-Being among Transracial Adoptees: A Longitudinal Study

    Science.gov (United States)

    Ferrari, Laura; Rosnati, Rosa; Manzi, Claudia; Benet-Martínez, Verònica

    2015-01-01

    The ethnic identity development plays a crucial role in adolescence and emerging adulthood and may be more complex for adoptees who do not share their ethnic identity with their adoptive families. Evidence from the studies was mixed, with strong ethnic identity not always found to be indicative of improved psychological adjustment. Recently…

  8. Biography, Identity, Improvisation, Sound: Intersections of Personal and Social Identity through Improvisation

    Science.gov (United States)

    Smilde, Rineke

    2016-01-01

    This essay addresses the relationship of improvisation and identity. Biographical research that was conducted by the author into professional musicians' lifelong learning showed the huge importance of improvisation for personal expression. Musically, the concept of "sound" appeared to serve as a strong metaphor for identity. In addition,…

  9. Optimal Experience and Optimal Identity: A Multinational Study of the Associations Between Flow and Social Identity

    Science.gov (United States)

    Mao, Yanhui; Roberts, Scott; Pagliaro, Stefano; Csikszentmihalyi, Mihaly; Bonaiuto, Marino

    2016-01-01

    Eudaimonistic identity theory posits a link between activity and identity, where a self-defining activity promotes the strength of a person’s identity. An activity engaged in with high enjoyment, full involvement, and high concentration can facilitate the subjective experience of flow. In the present paper, we hypothesized in accordance with the theory of psychological selection that beyond the promotion of individual development and complexity at the personal level, the relationship between flow and identity at the social level is also positive through participation in self-defining activities. Three different samples (i.e., American, Chinese, and Spanish) filled in measures for flow and social identity, with reference to four previously self-reported activities, characterized by four different combinations of skills (low vs. high) and challenges (low vs. high). Findings indicated that flow was positively associated with social identity across each of the above samples, regardless of participants’ gender and age. The results have implications for increasing social identity via participation in self-defining group activities that could facilitate flow. PMID:26924995

  10. Optimal Experience and Optimal Identity: A Multinational Study of the Associations Between Flow and Social Identity.

    Science.gov (United States)

    Mao, Yanhui; Roberts, Scott; Pagliaro, Stefano; Csikszentmihalyi, Mihaly; Bonaiuto, Marino

    2016-01-01

    Eudaimonistic identity theory posits a link between activity and identity, where a self-defining activity promotes the strength of a person's identity. An activity engaged in with high enjoyment, full involvement, and high concentration can facilitate the subjective experience of flow. In the present paper, we hypothesized in accordance with the theory of psychological selection that beyond the promotion of individual development and complexity at the personal level, the relationship between flow and identity at the social level is also positive through participation in self-defining activities. Three different samples (i.e., American, Chinese, and Spanish) filled in measures for flow and social identity, with reference to four previously self-reported activities, characterized by four different combinations of skills (low vs. high) and challenges (low vs. high). Findings indicated that flow was positively associated with social identity across each of the above samples, regardless of participants' gender and age. The results have implications for increasing social identity via participation in self-defining group activities that could facilitate flow.

  11. Identity theft and your practice.

    Science.gov (United States)

    Asbell, Lisa

    2010-01-01

    Medical identity theft is a growing problem in America. The federal government has passed laws to help "prevent" identity theft. However, several powerful medical associations are fighting the legislation. Americans need to know what is happening with these laws and why these laws are important to protect providers from lawsuits and consumers of healthcare from medical identity theft.

  12. Social Identity Simulation System (SISTEM)

    Science.gov (United States)

    2014-03-31

    Report Individuation Individuation refers to when an individual attempts to preserve self-esteem by psychologically separating oneself from a...its expected costs. The following subsections describe various strategies of social identity entrepreneurship in more detail. Calling for...Haslam, S. A., & Reicher, S. (2007). Identity Entrepreneurship and the consequences of identity failure: the dynamics of leadership in the BBC prison

  13. A Temporal Perspective on Organizational Identity

    DEFF Research Database (Denmark)

    Schultz, Majken; Hernes, Tor

    2013-01-01

    time perspective in the use of memory enabled a longer time perspective in formulating claims for future identity, (2) a broader scope of articulated identity claims for the future was related to the combination of a broader range of memory forms, and (3) the depth of claims for future identity...... was related to the way in which memory forms were combined. At a more general level, our paper illustrates how viewing identity construction from the perspective of an ongoing present adds a new dimension to understanding the temporal dynamics of organizational identity....

  14. Host range and genetic relatedness of Colletotrichum acutatum isolates from fruit crops and leatherleaf fern in Florida.

    Science.gov (United States)

    MacKenzie, S J; Peres, N A; Barquero, M P; Arauz, L F; Timmer, L W

    2009-05-01

    Isolates of Colletotrichum acutatum were collected from anthracnose-affected strawberry, leatherleaf fern, and Key lime; ripe-rot-affected blueberry; and postbloom fruit drop (PFD)-affected sweet orange in Florida. Additional isolates from ripe-rot-affected blueberry were collected from Georgia and North Carolina and from anthracnose-affected leatherleaf fern in Costa Rica. Pathogenicity tests on blueberry and strawberry fruit; foliage of Key lime, leatherleaf fern, and strawberry; and citrus flowers showed that isolates were highly pathogenic to their host of origin. Isolates were not pathogenic on foliage of heterologous hosts; however, several nonhomologous isolates were mildly or moderately pathogenic to citrus flowers and blueberry isolates were pathogenic to strawberry fruit. Based on sequence data from the internal transcribed spacer (ITS)1-5.8S rRNA-ITS2 region of the rDNA repeat, the glutaraldehyde-3-phosphate dehydrogenase intron 2 (G3PD), and the glutamine synthase intron 2 (GS), isolates from the same host were identical or very similar to each other and distinct from those isolated from other hosts. Isolates from leatherleaf fern in Florida were the only exception. Among these isolates, there were two distinct G3PD and GS sequences that occurred in three of four possible combinations. Only one of these combinations occurred in Costa Rica. Although maximum parsimony trees constructed from genomic regions individually displayed little or no homoplasy, there was a lack of concordance among genealogies that was consistent with a history of recombination. This lack of concordance was particularly evident within a clade containing PFD, Key lime, and leatherleaf fern isolates. Overall, the data indicated that it is unlikely that a pathogenic strain from one of the hosts examined would move to another of these hosts and produce an epidemic.

  15. Stories we live, identities we build: how are elementary teachers' science identities shaped by their lived experiences?

    Science.gov (United States)

    Avraamidou, Lucy

    2018-02-01

    The aim of this multiple case study was to uncover a series of critical events and experiences related to the formation of the science identities of four beginning elementary female teachers, through a life-history approach and a conceptualization of teacher identity as lived experience. Grounded within the theoretical framework of Figured Worlds, the study used qualitative, interpretive methods for data collection (interviews, biographies, teaching philosophies) and analysis. The analysis shed light on the ways in which various experiences situated within different Figured Worlds (science, family and childhood, schooling, out-of-school, university, professional) impacted the participants' identity trajectories. The findings provided three main insights that contribute to science identity research and have implications for elementary teacher preparation: (a) science teacher identity is multidimensional and extends beyond cognitive domains of becoming to include affective dimensions; (b) science teacher identity is relational, linked and shaped by various other constructs or sub-identities; (c) place and time, defined as a space with meaning created by experiences, and science teacher identity are inextricably bound to one another.

  16. Generalized Cherednik-Macdonald identities

    NARCIS (Netherlands)

    Stokman, J.V.

    2008-01-01

    We derive generalizations of the Cherednik-Macdonald constant term identities associated to root systems which depend, besides on the usual Multiplicity function, symmetrically on two additional parameters omega +/-. They are natural analogues of the Cherednik-Macdonald constant term q-identities in

  17. Constructing leadership identities through stories

    DEFF Research Database (Denmark)

    Frimann, Søren; Hersted, Lone

    2016-01-01

    This article analyzes the construction of leadership identities through stories found in four narrative interviews from a qualitative study and leadership development project based on social constructionism and action learning. We argue that leadership development and the construction of leadership...... that the concept of coauthoring is useful in developing leadership and leadership identities through reflexive dialogs and emerging stories....... identities in a postmodern paradigm are based on the negotiation and co-construction of meanings, relationships, and stories. The following questions are investigated: What happens when a group of leaders from different organizations construct, deconstruct, and reconstruct their identity as leaders through...

  18. Harmonizing methods for wildlife abundance estimation and pathogen detection in Europe-a questionnaire survey on three selected host-pathogen combinations

    DEFF Research Database (Denmark)

    Schulz, Jana; Ryser-Degiorgis, Marie-Pierre; Kuiken, Thijs

    2017-01-01

    Background: The need for wildlife health surveillance as part of disease control in wildlife, domestic animals and humans on the global level is widely recognized. However, the objectives, methods and intensity of existing wildlife health surveillance programs vary greatly among European countries......, resulting in a patchwork of data that are difficult to merge and compare. This survey aimed at evaluating the need and potential for data harmonization in wildlife health in Europe. The specific objective was to collect information on methods currently used to estimate host abundance and pathogen prevalence...... estimation, there is an urgent need to develop tools for the routine collection of host abundance data in a harmonized way. Wildlife health experts are encouraged to apply the harmonized APHAEA protocols in epidemiological studies in wildlife and to increase cooperation....

  19. The HPA photon protocol and proposed electron protocol

    International Nuclear Information System (INIS)

    Pitchford, W.G.

    1985-01-01

    The Hospital Physicists Association (HPA) photon dosimetry protocol has been produced and was published in 1983. Revised values of some components of Csub(lambda) and refinements introduced into the theory in the last few years have enabled new Csub(lambda) values to be produced. The proposed HPA electron protocol is at present in draft form and will be published shortly. Both protocels are discussed. (Auth.)

  20. Education and identity of adult educators

    Directory of Open Access Journals (Sweden)

    Zoran Jelenc

    2010-10-01

    Full Text Available Adult education and learning has because of its wide extensiveness and variability huge difficulties with its identity. Difficulties appear in all three spheres of identity: professional identity of adult education; societal identity of the field; and personal identity with the profession. In our contribution we list and describe difficulties in all three identity areas. Insufficient identity is a great obstacle for continuing education and further training of those who work or wish to work in adult education or they are obliged to carry out such education. They are all named ‘adult educators’ but their roles and tasks in education are different. Contents and ways of realization of programs have to be adapted to that. We recommend: modular programs for different target groups should be created from a wide list of contents; more sophisticated methods of marketing and recruiting should be used for the better realization of programs; programs should enable participants to get publicly recognized certificates and in this way current program of pedagogical-andragogical education which does not follow enough above-named difficulties of identity should be replaced; successful programs should be distributed all over Slovenia and performed in cooperation with another providers.

  1. Moral identity and emotion in athletes.

    Science.gov (United States)

    Kavussanu, Maria; Willoughby, Adrian; Ring, Christopher

    2012-12-01

    The purpose of this study was to investigate the effects of moral identity on physiological responses to affective pictures, namely, the startle blink reflex and pain-related evoked potential. Male (n = 48) and female (n = 46) athletes participating in contact team sports were randomly assigned to either a moral identity group or a non-moral identity group and viewed a series of unpleasant, neutral, and pleasant sport-specific pictures. During picture viewing, a noxious electrocutaneous stimulus was delivered as the startle probe and the startle blink and pain-related evoked potential were measured. Upon completion of physiological measures, participants reviewed the pictures and rated them for valence and arousal. ANOVAs revealed that participants in the moral identity group displayed larger startle blinks and smaller pain-related potentials than did those in the non-moral identity group across all picture valence categories. However, the difference in the magnitude of startle blinks between the moral and non-moral identity groups was larger in response to unpleasant than pleasant and neutral pictures. Our findings suggest that moral identity affects physiological responses to sport-specific affective pictures, thereby providing objective evidence for the link between moral identity and emotion in athletes.

  2. The emergence, structure and development of ethnic identity during childhood: the case of Roma identity.

    Science.gov (United States)

    Pnevmatikos, Dimitris; Geka, Maria; Divane, Maria

    2010-12-01

    This study investigates the emergence, development and structure of ethnic identity during childhood. Forty Roma children living in Greece aged between 2.8 and 11.9 years answered questions about their awareness/recognition of four aspects of their ethnic identity-namely place of habitation, traditional costumes, the Roma language, and early betrothal of children-their identity and their sense of stability and constancy. The study also investigates how the children feel about the abandonment of those four aspects. The evidence from the current data supports the hypothesis that awareness of ethnic identity emerges before the age of 4. Moreover, this study offers direct empirical evidence of the multidimensionality of ethnic identity. A model of three concentric rings is proposed, extending from a core containing the most highly valued aspects of ethnic identity to the outer annulus that comprises the nonpermanent and nonstable aspects of ethnic identity. The aspects in each annulus differ in terms of the development of the sense of stability and constancy and the feelings associated with loss of the aspects in question. Even the youngest participants considered the aspects in the core to be stable and constant as well as emotionally charged; and even the 11-year-olds did not consider the aspects contained in the outer, more fluid annulus as stable and constant aspects of their ethnic identity. The development of an aspect is determined by what the majority of adults in a society, at a particular time in history, consider to be most important.

  3. Microscopy-based Assays for High-throughput Screening of Host Factors Involved in Brucella Infection of Hela Cells.

    Science.gov (United States)

    Casanova, Alain; Low, Shyan H; Emmenlauer, Mario; Conde-Alvarez, Raquel; Salcedo, Suzana P; Gorvel, Jean-Pierre; Dehio, Christoph

    2016-08-05

    Brucella species are facultative intracellular pathogens that infect animals as their natural hosts. Transmission to humans is most commonly caused by direct contact with infected animals or by ingestion of contaminated food and can lead to severe chronic infections. Brucella can invade professional and non-professional phagocytic cells and replicates within endoplasmic reticulum (ER)-derived vacuoles. The host factors required for Brucella entry into host cells, avoidance of lysosomal degradation, and replication in the ER-like compartment remain largely unknown. Here we describe two assays to identify host factors involved in Brucella entry and replication in HeLa cells. The protocols describe the use of RNA interference, while alternative screening methods could be applied. The assays are based on the detection of fluorescently labeled bacteria in fluorescently labeled host cells using automated wide-field microscopy. The fluorescent images are analyzed using a standardized image analysis pipeline in CellProfiler which allows single cell-based infection scoring. In the endpoint assay, intracellular replication is measured two days after infection. This allows bacteria to traffic to their replicative niche where proliferation is initiated around 12 hr after bacterial entry. Brucella which have successfully established an intracellular niche will thus have strongly proliferated inside host cells. Since intracellular bacteria will greatly outnumber individual extracellular or intracellular non-replicative bacteria, a strain constitutively expressing GFP can be used. The strong GFP signal is then used to identify infected cells. In contrast, for the entry assay it is essential to differentiate between intracellular and extracellular bacteria. Here, a strain encoding for a tetracycline-inducible GFP is used. Induction of GFP with simultaneous inactivation of extracellular bacteria by gentamicin enables the differentiation between intracellular and extracellular

  4. Host density increases parasite recruitment but decreases host risk in a snail-trematode system.

    Science.gov (United States)

    Buck, J C; Hechinger, R F; Wood, A C; Stewart, T E; Kuris, A M; Lafferty, K D

    2017-08-01

    Most species aggregate in local patches. High host density in patches increases contact rate between hosts and parasites, increasing parasite transmission success. At the same time, for environmentally transmitted parasites, high host density can decrease infection risk to individual hosts, because infective stages are divided among all hosts in a patch, leading to safety in numbers. We tested these predictions using the California horn snail, Cerithideopsis californica (=Cerithidea californica), which is the first intermediate host for at least 19 digenean trematode species in California estuaries. Snails become infected by ingesting trematode eggs or through penetration by free-swimming miracidia that hatch from trematode eggs deposited with final-host (bird or mammal) feces. This complex life cycle decouples infective-stage production from transmission, raising the possibility of an inverse relationship between host density and infection risk at local scales. In a field survey, higher snail density was associated with increased trematode (infected snail) density, but decreased trematode prevalence, consistent with either safety in numbers, parasitic castration, or both. To determine the extent to which safety in numbers drove the negative snail-density-trematode-prevalence association, we manipulated uninfected snail density in 83 cages at eight sites within Carpinteria Salt Marsh (California, USA). At each site, we quantified snail density and used data on final-host (bird and raccoon) distributions to control for between-site variation in infective-stage supply. After three months, overall trematode infections per cage increased with snail biomass density. For egg-transmitted trematodes, per-snail infection risk decreased with snail biomass density in the cage and surrounding area, whereas per-snail infection risk did not decrease for miracidium-transmitted trematodes. Furthermore, both trematode recruitment and infection risk increased with infective

  5. Intergroup Leadership Across Distinct Subgroups and Identities.

    Science.gov (United States)

    Rast, David E; Hogg, Michael A; van Knippenberg, Daan

    2018-03-01

    Resolving intergroup conflict is a significant and often arduous leadership challenge, yet existing theory and research rarely, if ever, discuss or examine this situation. Leaders confront a significant challenge when they provide leadership across deep divisions between distinct subgroups defined by self-contained identities-The challenge is to avoid provoking subgroup identity distinctiveness threat. Drawing on intergroup leadership theory, three studies were conducted to test the core hypothesis that, where identity threat exists, leaders promoting an intergroup relational identity will be better evaluated and are more effective than leaders promoting a collective identity; in the absence of threat, leaders promoting a collective identity will prevail. Studies 1 and 2 ( N = 170; N = 120) supported this general proposition. Study 3 ( N = 136) extended these findings, showing that leaders promoting an intergroup relational identity, but not a collective identity, improved intergroup attitudes when participants experienced an identity distinctiveness threat.

  6. Fingerprint recognition with identical twin fingerprints.

    Science.gov (United States)

    Tao, Xunqiang; Chen, Xinjian; Yang, Xin; Tian, Jie

    2012-01-01

    Fingerprint recognition with identical twins is a challenging task due to the closest genetics-based relationship existing in the identical twins. Several pioneers have analyzed the similarity between twins' fingerprints. In this work we continue to investigate the topic of the similarity of identical twin fingerprints. Our study was tested based on a large identical twin fingerprint database that contains 83 twin pairs, 4 fingers per individual and six impressions per finger: 3984 (83*2*4*6) images. Compared to the previous work, our contributions are summarized as follows: (1) Two state-of-the-art fingerprint identification methods: P071 and VeriFinger 6.1 were used, rather than one fingerprint identification method in previous studies. (2) Six impressions per finger were captured, rather than just one impression, which makes the genuine distribution of matching scores more realistic. (3) A larger sample (83 pairs) was collected. (4) A novel statistical analysis, which aims at showing the probability distribution of the fingerprint types for the corresponding fingers of identical twins which have same fingerprint type, has been conducted. (5) A novel analysis, which aims at showing which finger from identical twins has higher probability of having same fingerprint type, has been conducted. Our results showed that: (a) A state-of-the-art automatic fingerprint verification system can distinguish identical twins without drastic degradation in performance. (b) The chance that the fingerprints have the same type from identical twins is 0.7440, comparing to 0.3215 from non-identical twins. (c) For the corresponding fingers of identical twins which have same fingerprint type, the probability distribution of five major fingerprint types is similar to the probability distribution for all the fingers' fingerprint type. (d) For each of four fingers of identical twins, the probability of having same fingerprint type is similar.

  7. Fingerprint recognition with identical twin fingerprints.

    Directory of Open Access Journals (Sweden)

    Xunqiang Tao

    Full Text Available Fingerprint recognition with identical twins is a challenging task due to the closest genetics-based relationship existing in the identical twins. Several pioneers have analyzed the similarity between twins' fingerprints. In this work we continue to investigate the topic of the similarity of identical twin fingerprints. Our study was tested based on a large identical twin fingerprint database that contains 83 twin pairs, 4 fingers per individual and six impressions per finger: 3984 (83*2*4*6 images. Compared to the previous work, our contributions are summarized as follows: (1 Two state-of-the-art fingerprint identification methods: P071 and VeriFinger 6.1 were used, rather than one fingerprint identification method in previous studies. (2 Six impressions per finger were captured, rather than just one impression, which makes the genuine distribution of matching scores more realistic. (3 A larger sample (83 pairs was collected. (4 A novel statistical analysis, which aims at showing the probability distribution of the fingerprint types for the corresponding fingers of identical twins which have same fingerprint type, has been conducted. (5 A novel analysis, which aims at showing which finger from identical twins has higher probability of having same fingerprint type, has been conducted. Our results showed that: (a A state-of-the-art automatic fingerprint verification system can distinguish identical twins without drastic degradation in performance. (b The chance that the fingerprints have the same type from identical twins is 0.7440, comparing to 0.3215 from non-identical twins. (c For the corresponding fingers of identical twins which have same fingerprint type, the probability distribution of five major fingerprint types is similar to the probability distribution for all the fingers' fingerprint type. (d For each of four fingers of identical twins, the probability of having same fingerprint type is similar.

  8. Interplay Between Intended Brand Identity and Identities in a Nike Related Brand Community

    DEFF Research Database (Denmark)

    Kornum, Niels; Gyrd-Jones, Richard; Al Zagir, Nadia

    2017-01-01

    While branding research traditionally views brand identity as an inside-out management controlled phenomenon, recent research emphasizes that a wide variety of stakeholders in the brand ecosystem enact and co-create brand identity. Following this theoretical perspective, management forms the inte...

  9. Security Protocols in a Nutshell

    OpenAIRE

    Toorani, Mohsen

    2016-01-01

    Security protocols are building blocks in secure communications. They deploy some security mechanisms to provide certain security services. Security protocols are considered abstract when analyzed, but they can have extra vulnerabilities when implemented. This manuscript provides a holistic study on security protocols. It reviews foundations of security protocols, taxonomy of attacks on security protocols and their implementations, and different methods and models for security analysis of pro...

  10. Perancangan Corporate Identity Astro Rent Car Surabaya

    OpenAIRE

    Gunardi, Yohanes Calvin; Negara, I Nengah Sudika; Aryanto, Hendro

    2017-01-01

    Corporate Identity merupakan hal yang krusial dalam perkembangan sebuah Perusahaan dalam segi internal maupun eksternal. Dalam membuat perancangan Corporate identity yang efektif, perancangan ini menampilkan segala teori dan ilmu yang berhubungan dengan Corporate identity. Dengan adanya perancangan ini diharapkan para pembaca mengerti betapa pentingnya peran sebuah corporate identity yang tepat dan mengena.Kata kunci: corporate identity, Astro, logo.

  11. Investigating host-pathogen behavior and their interaction using genome-scale metabolic network models.

    Science.gov (United States)

    Sadhukhan, Priyanka P; Raghunathan, Anu

    2014-01-01

    Genome Scale Metabolic Modeling methods represent one way to compute whole cell function starting from the genome sequence of an organism and contribute towards understanding and predicting the genotype-phenotype relationship. About 80 models spanning all the kingdoms of life from archaea to eukaryotes have been built till date and used to interrogate cell phenotype under varying conditions. These models have been used to not only understand the flux distribution in evolutionary conserved pathways like glycolysis and the Krebs cycle but also in applications ranging from value added product formation in Escherichia coli to predicting inborn errors of Homo sapiens metabolism. This chapter describes a protocol that delineates the process of genome scale metabolic modeling for analysing host-pathogen behavior and interaction using flux balance analysis (FBA). The steps discussed in the process include (1) reconstruction of a metabolic network from the genome sequence, (2) its representation in a precise mathematical framework, (3) its translation to a model, and (4) the analysis using linear algebra and optimization. The methods for biological interpretations of computed cell phenotypes in the context of individual host and pathogen models and their integration are also discussed.

  12. Echinococcus multilocularis and Its Intermediate Host: A Model of Parasite-Host Interplay

    Directory of Open Access Journals (Sweden)

    Dominique Angèle Vuitton

    2010-01-01

    Full Text Available Host-parasite interactions in the E. multilocularis-intermediate host model depend on a subtle balance between cellular immunity, which is responsible for host's resistance towards the metacestode, the larval stage of the parasite, and tolerance induction and maintenance. The pathological features of alveolar echinococcosis. the disease caused by E. multilocularis, are related both to parasitic growth and to host's immune response, leading to fibrosis and necrosis, The disease spectrum is clearly dependent on the genetic background of the host as well as on acquired disturbances of Th1-related immunity. The laminated layer of the metacestode, and especially its carbohydrate components, plays a major role in tolerance induction. Th2-type and anti-inflammatory cytokines, IL-10 and TGF-β, as well as nitric oxide, are involved in the maintenance of tolerance and partial inhibition of cytotoxic mechanisms. Results of studies in the experimental mouse model and in patients suggest that immune modulation with cytokines, such as interferon-α, or with specific antigens could be used in the future to treat patients with alveolar echinococcosis and/or to prevent this very severe parasitic disease.

  13. Facial Identity and Self-Perception: An Examination of Psychosocial Outcomes in Cosmetic Surgery Patients.

    Science.gov (United States)

    Slavin, Benjamin; Beer, Jacob

    2017-06-01

    The psychosocial health of patients undergoing cosmetic procedures has often been linked to a host of pre-existing conditions, including the type of procedure being performed. Age, gender, and the psychological state of the patients also contribute to the perceived outcome. Specifically, the presence or absence of Body Dysmorphic Disorder (BDD) has been identified as an independent marker for unhappiness following cosmetic procedures.1 However, no study has, to our knowledge, identified a more precise indicator that is associated with higher rates of patient dissatisfaction from cosmetic procedure. This review identifies facial identity and self-perception as potential identifiers of future patient dissatisfaction with cosmetic procedures. Specifically, we believe that patients with a realistic facial identity and self-perception are more likely to be satisfied than those whose self-perceptions are distorted. Patients undergoing restorative procedures, including blepharoplasty, rhytidectomy, and liposuction, are more likely to have an increased outcome favorability rating than those undergoing type change procedures, such as rhinoplasty and breast augmentation. Age, which typically is an independent variable for satisfaction, tends to be associated with increased favorability ratings following cosmetic procedures. Female gender is a second variable associated with higher satisfaction. The authors believe that negative facial identity and self-perception are risk factors for patient dissatisfaction with cosmetic procedural outcomes. Based on this assumption, clinicians may want to focus on the face as a particular area of psychosocial concern. J Drugs Dermatol. 2017;16(6):617-620..

  14. Māori identity signatures: A latent profile analysis of the types of Māori identity.

    Science.gov (United States)

    Greaves, Lara M; Houkamau, Carla; Sibley, Chris G

    2015-10-01

    Māori are the indigenous peoples of New Zealand. However, the term 'Māori' can refer to a wide range of people of varying ethnic compositions and cultural identity. We present a statistical model identifying 6 distinct types, or 'Māori Identity Signatures,' and estimate their proportion in the Māori population. The model is tested using a Latent Profile Analysis of a national probability sample of 686 Māori drawn from the New Zealand Attitudes and Values Study. We identify 6 distinct signatures: Traditional Essentialists (22.6%), Traditional Inclusives (16%), High Moderates (31.7%), Low Moderates (18.7%), Spiritually Orientated (4.1%), and Disassociated (6.9%). These distinct Identity Signatures predicted variation in deprivation, age, mixed-ethnic affiliation, and religion. This research presents the first formal statistical model assessing how people's identity as Māori is psychologically structured, documents the relative proportion of these different patterns of structures, and shows that these patterns reliably predict differences in core demographics. We identify a range of patterns of Māori identity far more diverse than has been previously proposed based on qualitative data, and also show that the majority of Māori fit a moderate or traditional identity pattern. The application of our model for studying Māori health and identity development is discussed. (c) 2015 APA, all rights reserved).

  15. Corporate identity. Brand designs.

    Science.gov (United States)

    Mathieson, Steve

    2004-02-19

    The past two years have seen a steadily more consistent brand identity for the NHS. Branding will become more important as foundation status and PCT commissioning makes acute hospitals more competitive. This has put pressure on some trusts that have their own strong identities.

  16. Ethnic Identities of University Students

    Directory of Open Access Journals (Sweden)

    Gözde Özdikmenli-Demir

    2014-06-01

    Full Text Available The aim of this article is to understand the relationship between ethnic identity, victimization/witnessing community violence, ethnic discrimination, and aggression in a sample of university students living in the South East Region of Turkey. The participants were 263 university students of predominantly Kurdish ethnic origin. The results showed that males had higher levels of ethnic identity in the dimensions of exploration and commitment. Males also presented higher scores for witnessing community violence and lifetime exposure to ethnic discrimination. The most important predictor of participants’ ethnic identity was witnessing community violence. Participants who witnessed violent acts in their social environment had higher ethnic identity levels. Although the predictor variables could not explain an important part of the participants’ aggression levels, only perceived ethnic discrimination was positively related to aggressive behavior. The role of native language efficiency in ethnic identity is also discussed.

  17. Self-identity as a construct

    DEFF Research Database (Denmark)

    Sudzina, Frantisek

    Self-identity is a private assessment of one’s beliefs and values. The self is an active agent in the decision process that drives people to act in accordance with the behavior that they see appropriate for themselves. According to Triandis, one’s self-definition motivates behavior that is consis......Self-identity is a private assessment of one’s beliefs and values. The self is an active agent in the decision process that drives people to act in accordance with the behavior that they see appropriate for themselves. According to Triandis, one’s self-definition motivates behavior...... that is consistent with that definition. Self-identity has been shown to influence the acceptance and use of technology. Prior research has shown that self-identity includes the factors of innovativeness, tech savviness, and opinion leadership. The aim of the research is to test the self-identity construct...

  18. [Host plants of Aphis gossypii (Aphididae), vector of virus of Cucumis melo melon (Cucurbitaceae) in Costa Rica].

    Science.gov (United States)

    Sánchez, M V; Agüero, R; Rivera, C

    2001-03-01

    Plant species associated with commercial melon crops and surrounding areas were examined to identity the natural host plants of Aphis gossypii Glover. The study was conducted in two farms located in different melon production areas and plant life zones of Costa Rica. Plant species diversity, percent coverage and distribution over time were recorded during one year. Differences between locations were observed. A total of 86 plant species (49 families) and 72 plant species (40 families) were identified associated to the crop in farms A and B, respectively. In both farms a total of 24 species plants (16 families) were colonized by A. gossypii and 16 (10 families) are new reports of host plant species for this aphid. The new reports are: Justicia comata, Tetramerium nervosum, Alternanthera pubiflora, Cassia massoni, C. reticulata, Cleome viscosa, C. spinosa, Croton argenteus, Caperonia palustris, Chamaesyce gyssopilopia, Phyllantus amarus, Sida decumbens, Ludwigia erecta, Passiflora foetida, Guazuma ulmifolia and Corchorus orinocensis.

  19. Schooling girls in a rural community: An examination of female science identity and science career choices

    Science.gov (United States)

    Fowler, Melisa Diane Creasy

    There is a gap in existence between the number of males and females entering science careers. Research has begun to focus largely on how identity impacts the selection of such careers. While much research has been done to examine the factors that impact student identity, little work has been done to examine what happens to female students who have been successful in science in a rural K-12 school once they leave high school and enter the world of academia. Thus, this study examined the following questions: (1) How do three recent female high school graduates from rural K-12 high schools narrate their identity? (2) How do the females narrate their experiences in a rural community and high school in relation to their science identity? (3) What do the participants describe as influencing their academic and career choices as they transition into the life of a college student? This study involved three female participants from a small rural community in a southeastern state. Each female has lived their entire life in the community and has attended only one K-12 school. All three females ranked in the top ten of their senior class and excelled in their science coursework. Additionally, each female elected to attend college locally and to live at home. The study utilized the qualitative methodology of interpretive biography. The researcher used a guided interview protocol with participants which served as the basis for the creation of their narrative biographies. The biographies were then analyzed for emergent themes. Sociocultural theory, identity theory, and critical feminism provided the theoretical frameworks utilized in data analysis. Findings from this study suggested that there were many differing factors influencing the science identity and career choices of the females under study. However, the most salient factor impacting their choices was their desire to remain in their hometown. Directions for future research suggestions involve exploring female students who

  20. Development and Validation of a Q-Sort Measure of Identity Processing Style: The Identity Processing Style Q-Sort

    Science.gov (United States)

    Pittman, Joe F.; Kerpelman, Jennifer L.; Lamke, Leanne K.; Sollie, Donna L.

    2009-01-01

    Identity styles represent strategies individuals use to explore identity-related issues. Berzonsky (Berzonsky, M. D. (1992). Identity style and coping strategies. "Journal of Personality, 60", 771-788) identified three styles: informational, normative, and diffuse. In three studies, this paper presents (a) the identity processing style Q-sort…

  1. Changes in the cuticular hydrocarbon profile of the slave-maker ant queen, Polyergus breviceps emery, after killing a Formica host queen (Hymenoptera: Formicidae).

    Science.gov (United States)

    Johnson, C A; Vander Meer, R K; Lavine, B

    2001-09-01

    Queens of the slave-maker ant, Polyergus breviceps, take over nests of their Formica host species by fatally attacking the resident queen. As workers only begin grooming the P. breviceps queen once she has ceased her attack, we investigated whether a change in parasite queen chemistry may account for the change in worker behavior. Cuticular hydrocarbon profiles of newly mated P. breviceps queens and of queens of their two Formica host species were found to be species-specific. Profiles of newly mated P. breviceps queens that had attacked a Formica queen, however, were virtually identical to the queen profile of the species killed. Mass spectral analysis revealed that the hydrocarbons on the cuticles of newly mated P. breviceps changed from primarily normal alkanes to methyl and di-methyl branched alkanes after attacks. The results suggest that cuticular compounds from the host queen were transferred to the parasite queen during their aggressive interaction.

  2. Strengthening quitter self-identity: An experimental study.

    Science.gov (United States)

    Meijer, Eline; Gebhardt, Winifred A; van Laar, Colette; van den Putte, Bas; Evers, Andrea W M

    2018-06-10

    Smoking-related self-identity processes are important for smoking cessation. We examined whether quitter self-identity (i.e. identification with quitting smoking) could be strengthened through a writing exercise, and whether expected social support for quitting, manipulated through vignettes, could facilitate identification with quitting. Participants (N = 339 daily smokers) were randomly assigned to a 2 (identity: strengthened quitter self-identity vs. control) × 3 (social support: present vs. absent vs. neutral control) between-participants design. The main outcome was post-test quitter self-identity. Post-test quitter self-identity was not strengthened successfully. Only a small and marginally significant intervention effect was found on quitter self-identity, which did not generalise to positively influence quit-intention or behaviour. The social support manipulation did not facilitate quitter self-identity. Secondary content analyses showed that quitter self-identity was strengthened among participants who linked quitting smoking to their lifestyle, wanted to become quitters for health reasons, and whose reasons for becoming quitters included approach of positive aspects of quitting, but not among participants who linked quitter self-identity to their self-perceptions. Results provide insight into the content of smokers' self-conceptualizations as quitters. Writing exercises should be improved and tested to eventually successfully strengthen quitter identities.

  3. Perancangan Corporate Identity Brotherwood Decoration

    OpenAIRE

    Ciputra, Ongky Permana; Bangsa, Petrus Gogor; Christianna, Aniendya

    2015-01-01

    Sebagai Perusahaan interior di Surabaya, “BROTHERWOOD” sedang membangun citra positif melalui penguatan corporate identity secara menyeluruh.Oleh karena itu “Brotherwood” memerlukan corporate identity dan mengaplikasikannya pada media promosi dan informasi yang sesuai dengan karakter dari target audience dan target market-nya.Dengan menggunakan corporate identity diharapkan “Brotherwood” menjadi lebih dikenal oleh target audience dan target market-nya sehingga membuat market “Brotherwood” men...

  4. Heirs of Ambivalence: The Study of the Identity Crisis of the Second-Generation Indian Americans in Jhumpa Lahiri's Interpreter of Maladies

    Directory of Open Access Journals (Sweden)

    Hossein Aliakbari Harehdasht

    2018-03-01

    Full Text Available Jhumpa Lahiri’s Interpreter of Maladies is a collection of short stories which, for the most part, deals with the identity crisis of the Indian Americans who are trapped in-between their Indian heritage and the American culture. The crisis is manifest in their unremitting struggle to preserve, to integrate, and to adjust. The collection, due to its dealing with the in-between-ness, ambivalence, hybridity, and marginality of the displaced Indian Americans, is receptive to the postcolonial studies. This essay draws on the relevant ideas and concepts in the field of the diaspora identity to examine Lahiri's “A Temporary Matter,” “When Mr. Pirzada Came to Dine,” “Sexy,” and “This Blessed House” which portray identity crisis of the second-generation Bengali migrants. The ultimate objective is to investigate into the nature of the internal ambivalence of Lahiri's second-generation characters caused by the reciprocal influence of Host/Guest relationships. The significance of the present study is twofold; on the one hand, it accentuates the intellectual attention to the crisis of identity felt by the exponentially increasing second-generation diaspora; on the other hand, it attempts to attract concentrated scholarly interest in diaspora ambivalence which is one of Lahiri scholars’ less addressed concerns.

  5. Host community heterogeneity and the expression of host specificity in avian haemosporidia in the Western Cape, South Africa.

    Science.gov (United States)

    Jones, Sharon M; Cumming, Graeme S; Peters, Jeffrey L

    2018-05-16

    Similar patterns of parasite prevalence in animal communities may be driven by a range of different mechanisms. The influences of host heterogeneity and host-parasite interactions in host community assemblages are poorly understood. We sampled birds at 27 wetlands in South Africa to compare four hypotheses explaining how host community heterogeneity influences host specificity in avian haemosporidia communities: the host-neutral hypothesis, the super-spreader hypothesis, the host specialist hypothesis and the heterogeneity hypothesis. A total of 289 birds (29%) were infected with Plasmodium, Haemoproteus and/or Leucocytozoon lineages. Leucocytozoon was the most diverse and generalist parasite genus, and Plasmodium the most conservative. The host-neutral and host specialist hypotheses received the most support in explaining prevalence by lineage (Leucocytozoon) and genus (Plasmodium and Haemoproteus), respectively. We observed that haemosporidian prevalence was potentially amplified or reduced with variation in host and/or parasitic taxonomic levels of analysis. Our results show that Leucocytozoon host abundance and diversity was influential to parasite prevalence at varying taxonomic levels, particularly within heterogeneous host communities. Furthermore, we note that prevalent mechanisms of infection can potentially act as distinct roots for shaping communities of avian haemosporidia.

  6. Perceived parenting dimensions and identity styles: exploring the socialization of adolescents' processing of identity-relevant information.

    Science.gov (United States)

    Smits, Ilse; Soenens, Bart; Luyckx, Koen; Duriez, Bart; Berzonsky, Michael; Goossens, Luc

    2008-04-01

    This study examined the relationships between crucial dimensions of perceived parenting (support, behavioral control, and psychological control) and the three identity styles defined by Berzonsky [Berzonsky, M. D. (1990). Self-construction over the life span: A process perspective on identity formation. Advances in Personal Construct Psychology, 1, 155-186.]. Each identity style was hypothesized to relate to a specific pattern of perceived parenting dimensions. Hypotheses were examined in a sample of middle and late adolescents (n=674). An information-oriented style was positively predicted by parental support. Contrary to expectations, however, an information-oriented style was also positively predicted by psychological control. A normative identity style was positively predicted by support and behavioral control. In line with expectations, a diffuse-avoidant identity style was positively predicted by psychological control and negatively by maternal (but not paternal) behavioral control. Findings are discussed in light of the literature on the socialization of identity formation and directions for future research are outlined.

  7. Host range, host ecology, and distribution of more than 11800 fish parasite species

    Science.gov (United States)

    Strona, Giovanni; Palomares, Maria Lourdes D.; Bailly, Nicholas; Galli, Paolo; Lafferty, Kevin D.

    2013-01-01

    Our data set includes 38 008 fish parasite records (for Acanthocephala, Cestoda, Monogenea, Nematoda, Trematoda) compiled from the scientific literature, Internet databases, and museum collections paired to the corresponding host ecological, biogeographical, and phylogenetic traits (maximum length, growth rate, life span, age at maturity, trophic level, habitat preference, geographical range size, taxonomy). The data focus on host features, because specific parasite traits are not consistently available across records. For this reason, the data set is intended as a flexible resource able to extend the principles of ecological niche modeling to the host–parasite system, providing researchers with the data to model parasite niches based on their distribution in host species and the associated host features. In this sense, the database offers a framework for testing general ecological, biogeographical, and phylogenetic hypotheses based on the identification of hosts as parasite habitat. Potential applications of the data set are, for example, the investigation of species–area relationships or the taxonomic distribution of host-specificity. The provided host–parasite list is that currently used by Fish Parasite Ecology Software Tool (FishPEST, http://purl.oclc.org/fishpest), which is a website that allows researchers to model several aspects of the relationships between fish parasites and their hosts. The database is intended for researchers who wish to have more freedom to analyze the database than currently possible with FishPEST. However, for readers who have not seen FishPEST, we recommend using this as a starting point for interacting with the database.

  8. SSWAP: A Simple Semantic Web Architecture and Protocol for semantic web services.

    Science.gov (United States)

    Gessler, Damian D G; Schiltz, Gary S; May, Greg D; Avraham, Shulamit; Town, Christopher D; Grant, David; Nelson, Rex T

    2009-09-23

    SSWAP (Simple Semantic Web Architecture and Protocol; pronounced "swap") is an architecture, protocol, and platform for using reasoning to semantically integrate heterogeneous disparate data and services on the web. SSWAP was developed as a hybrid semantic web services technology to overcome limitations found in both pure web service technologies and pure semantic web technologies. There are currently over 2400 resources published in SSWAP. Approximately two dozen are custom-written services for QTL (Quantitative Trait Loci) and mapping data for legumes and grasses (grains). The remaining are wrappers to Nucleic Acids Research Database and Web Server entries. As an architecture, SSWAP establishes how clients (users of data, services, and ontologies), providers (suppliers of data, services, and ontologies), and discovery servers (semantic search engines) interact to allow for the description, querying, discovery, invocation, and response of semantic web services. As a protocol, SSWAP provides the vocabulary and semantics to allow clients, providers, and discovery servers to engage in semantic web services. The protocol is based on the W3C-sanctioned first-order description logic language OWL DL. As an open source platform, a discovery server running at http://sswap.info (as in to "swap info") uses the description logic reasoner Pellet to integrate semantic resources. The platform hosts an interactive guide to the protocol at http://sswap.info/protocol.jsp, developer tools at http://sswap.info/developer.jsp, and a portal to third-party ontologies at http://sswapmeet.sswap.info (a "swap meet"). SSWAP addresses the three basic requirements of a semantic web services architecture (i.e., a common syntax, shared semantic, and semantic discovery) while addressing three technology limitations common in distributed service systems: i.e., i) the fatal mutability of traditional interfaces, ii) the rigidity and fragility of static subsumption hierarchies, and iii) the

  9. Ebola virus host cell entry.

    Science.gov (United States)

    Sakurai, Yasuteru

    2015-01-01

    Ebola virus is an enveloped virus with filamentous structure and causes a severe hemorrhagic fever in human and nonhuman primates. Host cell entry is the first essential step in the viral life cycle, which has been extensively studied as one of the therapeutic targets. A virus factor of cell entry is a surface glycoprotein (GP), which is an only essential viral protein in the step, as well as the unique particle structure. The virus also interacts with a lot of host factors to successfully enter host cells. Ebola virus at first binds to cell surface proteins and internalizes into cells, followed by trafficking through endosomal vesicles to intracellular acidic compartments. There, host proteases process GPs, which can interact with an intracellular receptor. Then, under an appropriate circumstance, viral and endosomal membranes are fused, which is enhanced by major structural changes of GPs, to complete host cell entry. Recently the basic research of Ebola virus infection mechanism has markedly progressed, largely contributed by identification of host factors and detailed structural analyses of GPs. This article highlights the mechanism of Ebola virus host cell entry, including recent findings.

  10. Music, culture and identity

    Directory of Open Access Journals (Sweden)

    Ilir Ramadani

    2017-03-01

    Full Text Available At the time of globalization it is difficult to pretend avoiding music culture and identity from political, cultural and social developments. Thus, it is impossible for the music to be unshakable and to represent national identity by not taking and giving nothing to culture. The dynamics of life and the rapid development of technology make it impossible for the culture to remain unaffected in terms of sharing experiences social experiences. Culture represents our current course, both in terms of politics, also in the social and human aspects. Through the technology it is possible for our children to be equal with children of all other countries, to exchange information and to connect directly with all countries of the world. Musical education is one of the main factors of cultural development and preservation of national identity. Identity consists of everything we posses and reflect. We are those who distinguish from each other and have a common denominator compared to other nations.

  11. At the confluence of organisation development (OD and organisation identity theory (OIT: Enter identity interventions

    Directory of Open Access Journals (Sweden)

    C L Van Tonder

    2004-10-01

    Full Text Available The identity concept has been around in the form of “corporate identity" for some time, but its appearance as “organisation identity" is more recent. Emerging theory and initial empirical research suggest that an identity approach and “identity interventions" in particular, offer promising avenues to the organisation development practitioner for enhancing organisational focus, building resilience in the face of major change, and improving performance. Identity interventions in and of themselves, but also employed as pre-change interventions, build organisational capacity that would stave off premature organisational “death" and extend the organisation’s life expectancy. Opsomming Die identiteitskonsep is in die vorm van korporatiewe identiteit reeds ’n geruime tyd in omgang, maar die verskyning daarvan as “organisasie-identiteit? is meer onlangs. Ontluikende teorie en aanvanklike empiriese navorsing suggereer dat ’n identiteitsbenadering en "identiteitsintervensies" in die besonder, belowende geleenthede aan die organisasie- ontwikkelingspraktisyn bied om organisasiefokus te verbeter, die organisasie se veerkragtigheid ten aanskoue van omvangryke verandering te bou, en prestasie te verbeter. Identiteitsintervensies op sigself bou organisasiekapasiteit, maar kan ook as voorveranderingsintervensies aangewend word wat premature organisasie "sterftes" sal vermy en die organisasie se lewensverwagting sal verleng.

  12. integrated identity and integrated identity and access management

    African Journals Online (AJOL)

    eobe

    Management System (T-IAMS) is a fingerprint biometric database that centrally manages students' identity, course a fingerprint ... registration, library and medical services information. .... based application and a web-based application.

  13. G-identities of non-associative algebras

    International Nuclear Information System (INIS)

    Bakhturin, Yu A; Zaitsev, M V; Sehgal, S K

    1999-01-01

    The main class of algebras considered in this paper is the class of algebras of Lie type. This class includes, in particular, associative algebras, Lie algebras and superalgebras, Leibniz algebras, quantum Lie algebras, and many others. We prove that if a finite group G acts on such an algebra A by automorphisms and anti-automorphisms and A satisfies an essential G-identity, then A satisfies an ordinary identity of degree bounded by a function that depends on the degree of the original identity and the order of G. We show in the case of ordinary Lie algebras that if L is a Lie algebra, a finite group G acts on L by automorphisms and anti-automorphisms, and the order of G is coprime to the characteristic of the field, then the existence of an identity on skew-symmetric elements implies the existence of an identity on the whole of L, with the same kind of dependence between the degrees of the identities. Finally, we generalize Amitsur's theorem on polynomial identities in associative algebras with involution to the case of alternative algebras with involution

  14. Controlling the Regional Identity of hPSC-Derived Neurons to Uncover Neuronal Subtype Specificity of Neurological Disease Phenotypes

    Directory of Open Access Journals (Sweden)

    Kent Imaizumi

    2015-12-01

    Full Text Available The CNS contains many diverse neuronal subtypes, and most neurological diseases target specific subtypes. However, the mechanism of neuronal subtype specificity of disease phenotypes remains elusive. Although in vitro disease models employing human pluripotent stem cells (PSCs have great potential to clarify the association of neuronal subtypes with disease, it is currently difficult to compare various PSC-derived subtypes. This is due to the limited number of subtypes whose induction is established, and different cultivation protocols for each subtype. Here, we report a culture system to control the regional identity of PSC-derived neurons along the anteroposterior (A-P and dorsoventral (D-V axes. This system was successfully used to obtain various neuronal subtypes based on the same protocol. Furthermore, we reproduced subtype-specific phenotypes of amyotrophic lateral sclerosis (ALS and Alzheimer’s disease (AD by comparing the obtained subtypes. Therefore, our culture system provides new opportunities for modeling neurological diseases with PSCs.

  15. Social Media Social Comparison of Ability (but not Opinion) Predicts Lower Identity Clarity: Identity Processing Style as a Mediator.

    Science.gov (United States)

    Yang, Chia-Chen; Holden, Sean M; Carter, Mollie D K

    2018-01-11

    Social comparison on social media has received increasing attention, but most research has focused on one type of social comparison and its psycho-emotional implications. Little is known about how different types of social comparison influence youth's identity development. Drawing on the theories of identity processing styles and social comparison, we examined how two different forms of social comparison on social media related to three identity processing styles, which in turn predicted youth's global self-esteem and identity clarity. We surveyed 219 college freshmen (M age  = 18.29; 74% female) once in the Fall and once in the Spring. Social comparison of ability on social media was related to concurrent diffuse-avoidant identity processing style, which predicted lower identity clarity months later. In contrast, social comparison of opinion on social media did not influence college freshmen's global self-esteem and identity clarity through identity processing styles. The findings clarified the implications of online social comparison for youth's identity development.

  16. Interplay of Language Policy, Ethnic Identity and National Identity in Five Different Linguistic Settings

    Directory of Open Access Journals (Sweden)

    Mehdi Gran Hemat

    2012-11-01

    Full Text Available This study, as a concise and critical literature review, examines related studies that investigated the interplay of the three constructs: ethnic identity, national identity and language policy. To do this, five related research articles were located and their similarities and differences in terms of their findings and methodologies were compared and contrasted. The literature review reveals that the researchers have utilized both quantitative and qualitative methods to obtain data. The findings show that ethnic identity is the contextualization of history, beliefs, customs, spiritual values, etc. of a speech community which practice their culture and values via the medium of language. National identity which emerges in time can be defined as an embodiment of the all common cultural values and social practices of different ethnic groups inside the borders of any country, and this is also manifested through a common language used as the formal and official language of their country. However, identity is a notion that remains rather illusive in its operationalization. Finally, language policy may be representative of a body of law, regulation and authoritative linguistic planned programs which are imposed on societies by governments. Language policies as nation building activities can improve the sense of nationality and reduce ethnic discords, and in the event may also suppress the maintenance or development of ethnic identity.

  17. Business protocol in integrated Europe

    OpenAIRE

    Pavelová, Nina

    2009-01-01

    The first chapter devotes to definitions of basic terms such as protocol or business protocol, to differences between protocol and etiquette, and between social etiquette and business etiquette. The second chapter focuses on the factors influencing the European business protocol. The third chapter is devoted to the etiquette of business protocol in the European countries. It touches the topics such as punctuality and planning of business appointment, greeting, business cards, dress and appear...

  18. Quantum entanglement of identical particles

    International Nuclear Information System (INIS)

    Shi Yu

    2003-01-01

    We consider entanglement in a system with a fixed number of identical particles. Since any operation should be symmetrized over all the identical particles and there is the precondition that the spatial wave functions overlap, the meaning of identical-particle entanglement is fundamentally different from that of distinguishable particles. The identical-particle counterpart of the Schmidt basis is shown to be the single-particle basis in which the one-particle reduced density matrix is diagonal. But it does not play a special role in the issue of entanglement, which depends on the single-particle basis chosen. The nonfactorization due to (anti)symmetrization is naturally excluded by using the (anti)symmetrized basis or, equivalently, the particle number representation. The natural degrees of freedom in quantifying the identical-particle entanglement in a chosen single-particle basis are occupation numbers of different single-particle basis states. The entanglement between effectively distinguishable spins is shown to be a special case of the occupation-number entanglement

  19. STORYTELLING AND UNIVERSITY BRANDING IDENTITY

    Directory of Open Access Journals (Sweden)

    ANDREEA MONICA STATE

    2016-08-01

    Full Text Available The present article sets out to clarify the concepts of storytelling and branding, with a focus on university branding and visual identity – the latter being a vital element to a brand’s uniqueness. Storytelling is an important method of brand construction, and it entails a strong power of seduction. Branding is increasingly more about storytelling. Practically, a story is an image made up of facts, feelings and interpretations, which are often told to us solely by the university itself. As such, the brand appears on the market accompanied by its identity. Identity is what we aim to express with help of the brand. Implementing a system of visual identity that would help to harmoniously develop a university brand requires a handbook of visual identity. The present article aims to be a starting point for such a handbook serving the University of Bucharest, which currently does not own such a handbook

  20. Leisure Time and Social Identity

    Directory of Open Access Journals (Sweden)

    Rasoul Rabbani

    2010-01-01

    Full Text Available How could patterns of leisure represent social identity? Whether they are sub-ordinate to the class identity or in the contemporary context of consumption and the post-modern cultural transformations, they could represent some other different social identities based on the patterns of consumption? Considering “leisure time” as a part of “style of life”, the present study attempts to explore social identity. There are two parts in methodology; first the qualitative one, carried through deep interview technique; and the other, surveying through questionnaire. Results distinguish the determining role “social class”, and the combination of “gender” and social class play in modeling distinctions in leisure patterns. In other words, leisure –as the arena for individual choice- is restricted to the social class and gender –as the structural and contextual variables. The strong correlation identity has with the social class and gender denies the post-modern interpretations which emphasis on consumption as the cause of social differentiations.

  1. Three Identities of the Catalan-Qi Numbers

    OpenAIRE

    Mansour Mahmoud; Feng Qi

    2016-01-01

    In the paper, the authors find three new identities of the Catalan-Qi numbers and provide alternative proofs of two identities of the Catalan numbers. The three identities of the Catalan-Qi numbers generalize three identities of the Catalan numbers.

  2. Personal Identity in Japan

    Science.gov (United States)

    Sugimura, Kazumi; Mizokami, Shinichi

    2012-01-01

    This chapter explores characteristics of identity formation among Japanese adolescents and young adults living in a cultural context where individualism has been increasingly emphasized even while maintaining collectivism. We argue that, to develop a sense of identity in Japanese culture, adolescents and young adults carefully consider others'…

  3. Viral pathogen production in a wild grass host driven by host growth and soil nitrogen.

    Science.gov (United States)

    Whitaker, Briana K; Rúa, Megan A; Mitchell, Charles E

    2015-08-01

    Nutrient limitation is a basic ecological constraint that has received little attention in studies on virus production and disease dynamics. Nutrient availability could directly limit the production of viral nucleic acids and proteins, or alternatively limit host growth and thus indirectly limit metabolic pathways necessary for viral replication. In order to compare direct and indirect effects of nutrient limitation on virus production within hosts, we manipulated soil nitrogen (N) and phosphorus (P) availability in a glasshouse for the wild grass host Bromus hordeaceus and the viral pathogen Barley yellow dwarf virus-PAV. We found that soil N additions increased viral concentrations within host tissues, and the effect was mediated by host growth. Specifically, in statistical models evaluating the roles of host biomass production, leaf N and leaf P, viral production depended most strongly on host biomass, rather than the concentration of either nutrient. Furthermore, at low soil N, larger plants supported greater viral concentrations than smaller ones, whereas at high N, smaller plants supported greater viral concentrations. Our results suggest that enhanced viral productivity under N enrichment is an indirect consequence of nutrient stimulation to host growth rate. Heightened pathogen production in plants has important implications for a world facing increasing rates of nutrient deposition. © 2015 The Authors. New Phytologist © 2015 New Phytologist Trust.

  4. Host switching in a generalist parasitoid: contrasting transient and transgenerational costs associated with novel and original host species.

    Science.gov (United States)

    Jones, Thomas S; Bilton, Adam R; Mak, Lorraine; Sait, Steven M

    2015-01-01

    Parasitoids face challenges by switching between host species that influence survival and fitness, determine their role in structuring communities, influence species invasions, and affect their importance as biocontrol agents. In the generalist parasitoid, Venturia canescens (Gravenhorst) (Hymenoptera: Ichneumonidae), we investigated the costs in encapsulation, survival, and body size on juveniles when adult parasitoids switched from their original host, Plodia interpunctella (Hübner) (Lepidotera, Pyralidae) to a novel host, Ephestia kuehniella (Zeller) (Lepidoptera, Pyralidae), over multiple generations. Switching had an initial survival cost for juvenile parasitoids in the novel host, but increased survival occurred within two generations. Conversely, mortality in the original host increased. Body size, a proxy for fecundity, also increased with the number of generations in the novel host species, reflecting adaptation or maternal effects due to the larger size of the novel host, and therefore greater resources available to the developing parasitoid. Switching to a novel host appears to have initial costs for a parasitoid, even when the novel host may be better quality, but the costs rapidly diminish. We predict that the net cost of switching to a novel host for parasitoids will be complex and will depend on the initial reduction in fitness from parasitizing a novel host versus local adaptations against parasitoids in the original host.

  5. Three Identities of the Catalan-Qi Numbers

    Directory of Open Access Journals (Sweden)

    Mansour Mahmoud

    2016-05-01

    Full Text Available In the paper, the authors find three new identities of the Catalan-Qi numbers and provide alternative proofs of two identities of the Catalan numbers. The three identities of the Catalan-Qi numbers generalize three identities of the Catalan numbers.

  6. Exploring Japanese university English teachers' professional identity

    CERN Document Server

    Nagatomo, Diane Hawley

    2012-01-01

    This book examines the professional identities of Japanese university English teachers. It focuses on how relatively new teachers develop their professional identities, how gender impacts the professional identities of female professors, and how teaching practices and beliefs reflect personal and professional identity.

  7. Foreign Language Teaching and Cultural Identity.

    Science.gov (United States)

    Nasr, Raja T., Ed.; And Others

    A collection of works on the role of cultural identity in second language learning and teaching includes: "Linguas estrangeiras e ideologia" (Roberto Ballalai); "Cultural Identity and Bilinguality" (Josiane F. Hamers, Michel Blanc); "Foreign Language Teaching and Cultural Identity" (Lakshmie K. Cumaranatunge);…

  8. Value Conditionality of Identity

    Directory of Open Access Journals (Sweden)

    M M Yusupov

    2013-12-01

    Full Text Available The article considers theoretical approaches to the study of values and identity, and reveals the role of values in the formation of the ethnic, regional and Russian identity on the example of Chechnya and the North Caucasus, with the sociological indicators characterizing value orientations and self-identification.

  9. Self and social identity

    NARCIS (Netherlands)

    Ellemers, N; Spears, R; Doosje, B

    2002-01-01

    In this chapter, we examine the self and identity by considering the different conditions under which these are affected by the groups to which people belong. From a social identity perspective we argue that group commitment, on the one hand, and features of the social context, on the other hand,

  10. Host location by ichneumonid parasitoids is associated with nest dimensions of the host bee species.

    Science.gov (United States)

    Flores-Prado, L; Niemeyer, H M

    2012-08-01

    Parasitoid fitness depends on the ability of females to locate a host. In some species of Ichneumonoidea, female parasitoids detect potential hosts through vibratory cues emanating from them or through vibrational sounding produced by antennal tapping on the substrate. In this study, we (1) describe host location behaviors in Grotea gayi Spinola (Hymenoptera: Ichneumonidae) and Labena sp. on nests of Manuelia postica Spinola (Hymenoptera: Apidae), (2) compare nest dimensions between parasitized and unparasitized nests, (3) correlate the length of M. postica nests with the number of immature individuals developing, and (4) establish the relative proportion of parasitized nests along the breeding period of M. postica. Based on our results, we propose that these parasitoids use vibrational sounding as a host location mechanism and that they are able to assess host nest dimensions and choose those which may provide them with a higher fitness. Finally, we discuss an ancestral host-parasitoid relationship between Manuelia and ichneumonid species.

  11. Power Saving MAC Protocols for WSNs and Optimization of S-MAC Protocol

    Directory of Open Access Journals (Sweden)

    Simarpreet Kaur

    2012-11-01

    Full Text Available Low power MAC protocols have received a lot of consideration in the last few years because of their influence on the lifetime of wireless sensor networks. Since, sensors typically operate on batteries, replacement of which is often difficult. A lot of work has been done to minimize the energy expenditure and prolong the sensor lifetime through energy efficient designs, across layers. Meanwhile, the sensor network should be able to maintain a certain throughput in order to fulfill the QoS requirements of the end user, and to ensure the constancy of the network. This paper introduces different types of MAC protocols used for WSNs and proposes S‐MAC, a Medium‐Access Control protocol designed for Wireless Sensor Networks. S‐MAC uses a few innovative techniques to reduce energy consumption and support selfconfiguration. A new protocol is suggested to improve the energy efficiency, latency and throughput of existing MAC protocol for WSNs. A modification of the protocol is then proposed to eliminate the need for some nodes to stay awake longer than the other nodes which improves the energy efficiency, latency and throughput and hence increases the life span of a wireless sensor network.

  12. Hyperfractionated total body irradiation for T-depleted HLA identical bone marrow transplants

    International Nuclear Information System (INIS)

    Latini, P.; Checcaglini, F.; Maranzano, E.; Aristei, C.; Panizza, B.M.; Gobbi, G.; Raymondi, C.; Aversa, F.; Martelli, M.F.

    1988-01-01

    Twenty patients suffering from malignant hemopathies (mean age 31.7 years) were given hyperfractionated total body irradiation (TBI) as conditioning for T-depleted HLA identical allogeneic bone marrow transplantation. At an average of 12 months (range of 4.5-22 months) follow-up there were two cases of early death and two cases (11%) of rejection. There were no cases of acute or chronic graft versus host disease nor cases of interstitial pneumonitis. The average time for durable engraftment was 22 days. Disease-free survival at 12 months was 65%. To improve the results and further reduce the percent of rejection, the authors propose intensifying the immunosuppressive conditioning by increasing the cyclophosphamide dose and that of TBI so that a total dose of 1560 cGy is reached. 35 refs.; 1 figure

  13. MULTICULTURAL LITERATURE: THE IDENTITY CONSTRUCTION IN INDONESIAN NOVELS

    Directory of Open Access Journals (Sweden)

    Akhmad Taufiq

    2014-02-01

    Full Text Available This paper examines multicultural literature as a significant and strategic object of study in response to solving national problems. In this context, multicultural literature focuses mainly on multicultural problems frequently found in literary works. One of the main issues is concerned with identity. This article examines Indonesian novels, focusing mainly on the issues of identity: (1 identity and identity problems; (2 identity articulation; (3 text representation on identity discourse in Indonesian novels. The literature sociological approach was adopted to comprehend the reality in multicultural literary texts in Indonesian novels and its relation with the phenomena of identity problems in other field of studies. The results of study indicate that the process of identity articulation and text representation on identity discourse in multicultural social phenomena deserve more serious attention. Furthermore, the problems of identity and the process of identity articulation in multicultural society also require serious attention since identity problems are closely associated with nationality. National identity is not stable but dynamic in dealing with the development of a nation. The lack of concerns on this issue may cause a serious problem of national integrity.

  14. Experimental immunologically mediated aplastic anemia (AA) in H-2k identical, Mls (M) locus different mice

    Energy Technology Data Exchange (ETDEWEB)

    Knospe, W.H.; Steinberg, D.; Speck, B.

    1983-07-01

    Immunologically mediated aplastic anemia (AA) was experimentally induced in mice by injecting 10(7) lymph node cells (LNC) from donor mice of one inbred strain to another H-2k identical but Mls mismatched strain previously given 600 rad total body gamma irradiation (TBI). AA developed after 2 weeks to 6 months in selected strain combinations used and usually 60 to 90% of the mice died. Clinical signs of graft-versus-host disease did not occur and splenic atrophy rather than splenomegaly was the rule. Histologically these mice had a lesion of the hematopoietic microenvironment characterized by sinusoidal injury and stromal necrosis. Others have demonstrated injury to hematopoietic stem cells. C3H/He LNC induced AA whereas C3H/HeJ LNC failed to induce AA. The C3H/HeJ strain carries a macrophage defect and these results suggest that a macrophage-like cell may be a mediator of immunological injury in this experimental model. Although all strain combinations evaluated were H-2k identical and Mls mismatched, certain Mls combinations resulted in AA and identical Mls mismatched but different strains did not. Both strong (Mlsd) and weak (Mlsc) stimulating LNC induce AA but simple Mls differences do not explain the AA as similar Mls combinations but different strain combinations fail to induce AA.

  15. Host Factors in Ebola Infection.

    Science.gov (United States)

    Rasmussen, Angela L

    2016-08-31

    Ebola virus (EBOV) emerged in West Africa in 2014 to devastating effect, and demonstrated that infection can cause a broad range of severe disease manifestations. As the virus itself was genetically similar to other Zaire ebolaviruses, the spectrum of pathology likely resulted from variable responses to infection in a large and genetically diverse population. This review comprehensively summarizes current knowledge of the host response to EBOV infection, including pathways hijacked by the virus to facilitate replication, host processes that contribute directly to pathogenesis, and host-pathogen interactions involved in subverting or antagonizing host antiviral immunity.

  16. Generalized Jacobi identities in gauge theories

    International Nuclear Information System (INIS)

    Chaves, F.M.P.

    1990-01-01

    A spatial generalized Jacobi identity obeyed by the polarization-dependent factors of the vertices in a q q-bar - Wγ process is studied. The amplitude of a scattering gluon-gluon with five particles is worked out. By reorganizing this amplitude in analogy with an interaction process photon-pion, the non existence of the spatial generalized Jacobi identity, but instead many spatial partial identities that compose themselves, in the case of a four particle process, in one single identity is shown. A process with four particles, three of them scalar fields, but in the one loop approximation is studied. In this case also, the non existence of the spatial generalized Jacobi identity is demonstrated. (author)

  17. RELATIONSHIPS BETWEEN IDENTITY AND ACADEMIC MOTIVATION.

    Science.gov (United States)

    Matsushima, Rumi; Ozaki, Hitomi

    2015-08-01

    This study examined university students' academic motivation, focusing on individual differences in their sense of identity. The participants were 109 female Japanese students from two private universities (age range = 19-22 yr., M = 19.3, SD = 0.6). They completed four scales: the Multidimensional Ego Identity Scale, the Scale of Students' Attitude Toward Their Classes, the Academic Motivation Inventory, and the Scale of Lecture Self-Evaluation. Correlational analyses assessed the relationships between subscales. Then, path analysis was conducted to evaluate whether sense of identity affected attitude toward classes, academic motivation, and lecture self-evaluation. Differences particularly in psychosocial identity and self-identity accounted for significant variance in the students' attitudes toward classes, academic motivation, and lecture self-evaluation.

  18. Ecology of ticks in a taxocenosis of snakes from the Serra do Mendanha, Rio de Janeiro, Brazil, with new host records

    Directory of Open Access Journals (Sweden)

    Jorge A. L. Pontes

    2009-06-01

    Full Text Available We studied the ecology of ticks found in different species of a taxocenosis of snakes from the Serra do Mendanha, an area of Atlantic Rainforest located in the state of Rio de Janeiro, southeastern Brazil. Snakes were sampled monthly in the field during a period of 48 months. The specific identity of the hosts and their parasites, the number of parasites, and and snout-vent length and body mass of each host were recorded. A total of 25% of the species of snakes in the area were parasitized by ticks (larvae, nymphs and adult females Amblyomma rotundatum Koch, 1844 was the predominant parasite species. The infestation parameters varied among the species of snakes sampled, with the highest prevalence of A. rotundatum being observed in the viperid Bothrops jararaca (Wied, 1824 (71.4%, followed by the colubrids Xenodon neuwiedii Günther, 1820 (33%, Chironius laevicollis (Wied, 1824 and Spilotes pullatus (Linnaeus, 1758 (both with 22%. The latter three species also showed the highest rates of infestation by A. rotundatum. The results of the present study suggest that a combination of skin shedding, habitat of the host, type of scale and pattern of scale distribution on the body of the host can influence the degree to which a given species is parasitized by ticks

  19. Identity Management

    Data.gov (United States)

    Social Security Administration — Provides information for identity management services on the creation, modification and eventual deletion of accounts and entitlements based on user relationships on...

  20. Adaptation of the Utrecht-Management of Identity Commitments Scale (U-MICS) to the measurement of the parental identity domain.

    Science.gov (United States)

    Piotrowski, Konrad

    2018-04-01

    The present studies examined the psychometric properties of the Utrecht-Management of Identity Commitments Scale (U-MICS) adapted to the measurement of identity formation in the parental identity domain. As the parental identity domain has only been studied within the neo-Eriksonian approach to a very limited extent, the aim of these studies was to prepare a short, valid and reliable tool for the measurement of parental identity in order to fill this gap. The associations of commitment, in-depth exploration and reconsideration of commitment in the parental domain with well-being and with other identity constructs were analyzed. The results showed that parental identity formation is associated with mothers' satisfaction with life and trait anxiety and with identity formation in other areas as well. The initial results suggest that the adapted version of the U-MICS is a valid and reliable measure that can be used in future studies on parental identity formation. © 2017 The Author. Scandinavian Journal of Psychology published by Scandinavian Psychological Associations and John Wiley & Sons Ltd.